Recently I encountered a SQL Server 2005 Replication setup where an error message was appearing about every 5 minutes in the SQL Server error logs. The error message was coming from the failing distribution cleanup job. Examining the job history I was able to determine the real error message. The first step in debugging was to confirm if xp_cmdshell was enabled….
If you are a regular reader of this blog, you know that I was at the Hotsos Symposium 2008 this year. You might not know that I also had a chance to take few days off and spend 1+ week vacation in Texas after the symposium — enjoyed the sun and warm weather. My family liked that even more than I did. Unfortunately, when I was back home last weekend, I discovered pretty unpleasant view from my windows…
Welcome to the 89th edition of Log Buffer, the weekly review of database blogs.
Ah, the perils of working in a shared, client environment. One client has us using a login that is not exclusive to us. I prefer using bash; the client is set to use zsh. This is not a problem in and of itself. However, there is a section in the .profile that is causing me issues, let me show you.
In Spotting the Wolf in Sheep’s Clothing, Frank Mash writes about a specific person who is spreading fear, uncertainty and doubt about MySQL. Now, this always gets me, especially with MySQL. For how long will MySQL be the bastard stepchild of the database world? Because really, it’s been a full-fledged DBMS for at least 5 years. Don’t hate MySQL for the wrong reasons and there are plenty of reasons to hate MySQL. But hating MySQL because “it sucks” or because “it doesn’t have blah feature” — which, 9 times out of 10, it has — is just wrong.
I was asked this question recently, and I thought it was a great little tidbit of knowledge to pass along. The short answer is “no”. The slightly longer answer was written up by Jan Kneschke when dealing with a forum post about proxy + connection pooling.
At this year’s MySQL Conference & Expo, taking place in Santa Clara, California in mid-April, I’m giving two sessions: Best Practices for Database Administrators,Database Security Using White-Hat Google Hacking. You can see more info about me here, including descriptions of the workshops.
I would not wish this task on my worst enemy. My friend, good luck and best wishes but I’m afraid I just can’t help you, because that much suffering is way too much for me.
Here’s another question that came to me about 2 weeks ago from a user group member that I never had time to research and answer. I have directed the original author to this post so questions you pose in the comments can be answered.
I was asked this question in an e-mail — feel free to ask your questions in the comments, as I will point the original author to this post to answer those questions. There is not a lot of data here, so instead of me asking questions in an e-mail I figured I would open it up to the (MySQL) world. Without further ado, here’s the question…