블로그 이미지
LifeisSimple

calendar

1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30

Notice

2013. 1. 14. 13:21 Photograph by ../일상

아이폰의 고질적인 문제인 홈버튼... 


딱밤도 해보고 별짓을 다 해보는데.. 결국은 큰 효과는 없네요.. 


이럴때 요런 방법을 사용하면... 나름의 효과를 거둘수 있다고 합니다. 



http://tvcast.naver.com/v/23086



위의 동영상을 참고~

posted by LifeisSimple
2013. 1. 14. 11:26 Brain Trainning/DataBase

MSSQL 과 MySQL 의 함수 비교자료 입니다. 

MSSQL 을 사용하다 MySQL 도입을 검토하거나 그 반대의 경우 나름의 유용한 자료가 될 듯 합니다.


January 7, 2013

Comparing SQL Server and MySQL Functions

By Rob Gravelle

This article is the second part in a series examining some of the challenges in porting your databases between MS SQL Server and MySQL.  In Part 1, we looked at some of the differences between data types utilized by each DBMS.  Today, in moving on to functions, you’ll see how functions may require additional effort on your part to produce equivalent results.

Function Categories

Functions can be divided into three distinct categories:

  1. Equivalent Functions: Those that can be safely migrated from one database type to another without any modifications whatsoever.
  2. Emulated Functions: Functions that are available in one database, but not the other.  Another problematic issue is that some MySQL functions have a variable parameter count.  In either case, some conversion work is required. 
  3. Non-supported Functions: Those which cannot be easily ported because of logical/physical organization and security model differences.

Equivalent Functions

You’ll be happy to know that the following functions are usable in both MySQL and SQL Server queries without any modifications:

ASCII, LEFT, LOWER, LTRIM, REPLACE, REVERSE, RIGHT, RTRIM, SOUNDEX, SPACE, SUBSTRING, UPPER, ABS, ACOS, ASIN, ATAN, ATAN2, CEILING, COS, COT, DEGREES, EXP, FLOOR, LOG, LOG10, PI, POWER, RADIANS, RAND, ROUND, SIGN, SIN, SQRT, TAN, DAY, MONTH, COALESCE, NULLIF, CAST, CONVERT.

Emulated Functions

Functions that have no equivalent on the other platform are where the bulk of your efforts will go, as converting these can be like trying to fit a round peg into a square hole.

The Transact-SQL
CASE function

CASE WHEN @a > @b 
     THEN @a 
     ELSE @b - @a 
END 

This can be converted to the MySQL  IF(expr1, expr2, expr3)  function.  Here’s how it works:

If expr1 is TRUE (expr1 <> 0 and expr1 <> NULL), IF() returns expr2; otherwise it returns expr3.

MySQL example:

if(@a>@b, @a, @b-@a) 
Converting Binary Data into a Varchar

IN SQL SERVER 2008 the convert function was extended to support binary data to hex string conversion. Hence, you might see something like this:

CONVERT(NVARCHAR(34), 0xc23eed6b65c93e44a41a2818e274194f, 1) AS BINARY_TO_STRING

The MySQL BIN(N)  function, which returns a string representation of the binary value of N, can be utilized in its stead.

The Transact-SQL  DATALENGTH Function

This one is easy to convert because both the SQL Server DATALENGTH and MySQL BIT_LENGTH functions will return the length of a string in bits.

String Concatenation

SQL Server does not support the ANSI SQL CONCAT() function.  Instead, it uses the plus operator (+) for string concatenation:

'A'+'B'+'C', 'A'+'#'+'B'+'#'+'C' 

In MySQL, use the CONCAT(str1, str2, ….) or CONCAT_WS(separator, str1, str2, ...)  functions, which return the concatenated arguments:

CONCAT('A','B','C'), CONCAT_WS('#','A','B','C') 
Converting Numbers between Different Number Bases

It is sometimes useful to convert a number to a non-base 10 string. In SQL Server, that requires using the CAST function or employing a user-defined function.  In MySQL, you can forget about all that, as the ANSI SQL CONV(N, from_base, to_base)  function will allow you to convert from one base to another with ease.

Finding the Position of the First Occurrence of a Substring within a String

The Transact-SQL CHARINDEX function maps exactly to the ANSI  SQL LOCATE() function.

Inserting a String within Another

In SQL Server, the REPLACE function can be used to replace part of a string with another. For instance, the following example replaces the string def in abcdefghi with xyz.

SELECT REPLACE('abcdefghicde','def','xyz');

MySQL’s INSERT(str, pos, len, newstr) function is a reasonable facsimile, as it returns the string str, with the substring that begins at position pos and is len characters long replaced by the string newstr.

Loading Data and Statements from a File

T-SQL bulk load statements and extended stored procedures that load data and executable statements from a text file can be replace with LOAD_FILE(file_name)  in MySQL.

Getting the Current Date

Transact-SQL’s  NOW function maps to GETDATE in ANSI SQL.

Generating a Repeating String

Transact-SQL’s  REPLICATE function maps exactly to REPEAT in ANSI SQL.

Testing for NULL

Transact-SQL relies on the CASE and IS NULL clauses to check for NULL values. In MySQL, you can simply use the ISNULL(expr) function instead.  If expr is NULL, ISNULL() returns 1; otherwise it returns 0.

Comparing Two Strings

Transact-SQL relies on comparison operators to compare strings, whereas ANSI SQL provides the STRCMP(expr1, expr2)  function.

Formatting Dates

While Transact-SQL uses a combination of date, string, and convert functions to format dates as strings, ANSI SQL has the built-in DATE_FORMAT(date, format) function specifically for formatting dates.

Adding an Interval to a Given Date

The Transact-SQL DATEADD function does have equivalents in Oracle, DB2, and PostgreSQL. MySQL includes the same function, except that it’s called DATE_ADD:

SELECT DATE_ADD('2010-12-31 23:59:59', INTERVAL 1 DAY);

returns '2011-01-01 23:59:59'
Converting between Seconds and a Time

In Transact-SQL, converting between seconds and a time such as 12:34:00 can be accomplished using a combination of the CONVERT and DATEADD functions.  For instance, here is a statement that converts seconds to a time:

CONVERT(char(8), DATEADD(second, Diff, '0:00:00'), 108)

MySQL can convert between seconds and a time more easily using the SEC_TO_TIME(seconds)  and TIME_TO_SEC(time) functions.

Retrieving the Last Inserted ID

The Transact-SQL @@IDENTITY and SCOPE_IDENTITY functions are used to retrieve the last inserted ID.  MySQL possesses a similar function called LAST_INSERT_ID for this purpose.

Concatenating Column Values

To concatenate the contents of a column into a string requires a few steps in T-SQL:

declare @v varchar(max) 
set @v='' 

select @v=@v+','+isnull(field_a,'') from table_1 
select substring(@v,2,len(@v)) 

It’s much easier in ANSI SQL, thanks to the GROUP_CONCAT function.  It comes in two flavors to support 
different formats:

  • GROUP_CONCAT( Language SEPARATOR ‘-’ ) will use the dash instead of  the default comma separator.
  • SELECT GROUP_CONCAT( Language ORDER BY Language DESC ) can be used to change the sorting order.

Note that GROUP_CONCAT ignores NULL values.

Non-supported Functions

Any SQL Server-centric functions have to be either removed and/or rewritten using a combination of ANSI SQL statements.  Once completed, the new code can be saved as a user-defined function for easy reuse.

Conversion Tools

There are purportedly some automated tools that can convert stored procedures between SQL Server and MySQL, such as SQLWays by Ispirer.   According to their site and anecdotal reports, it converts stored procedures, functions, packages and triggers.  All this automation doesn’t come cheap; at about a grand USD, it may be more cost effective to manually convert your procs.


출처 : http://www.databasejournal.com/features/mysql/comparing-sql-server-and-mysql-functions.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+DatabaseJournalNews+%28Database+Journal+News%29&utm_content=Google+Feedfetcher

posted by LifeisSimple
2013. 1. 9. 09:46 Brain Trainning/DataBase

SQL Server and Anti-Virus


Every once in a while, one of my SQL Server Consulting clients asks me for my opinions about running Anti-Virus on production SQL Servers. And, amazingly enough, I actually (personally feel and) argue that anti-virus really shouldn’t be run in production data centers. Along those lines, I personally haven’t run anti-virus for over a decade on any of my own machines. Though, on the other hand, I do recommend that non-technical friends and family all run anti-virus (even though I tell them it typically won’t keep ‘crapware’ off of their computers in far too many cases).

Why I Dislike Anti-Virus Solutions On Production Servers

Simply stated, anti-virus solutions cost money to license, can be expensive to maintain, and can commonly cause expensive problems in production – such as when anti-virus solutions block custom code or configuration options or when they block access to critical IO requests.

More importantly, though, I feel that anti-virus solutions on production servers can sadly provide a sense of false-security to many NON-TECHNICAL managers – who falsely sometimes assume that anti-virus is some kind of a magical ‘security blanket’. Because the reality is that anti-virus solutions are far from magical; they can’t simply stop all inbound attacks by virtue of the fact that you pay money for protection from viruses. Instead, anti-virus solutions simply chronicle vast ‘definitions’ of recognized and cataloged attack-vectors and then ‘monitor’ system-activity for similar attack vectors and signatures during run-time.

In other words: anti-virus solutions can’t protect against zero-day exploits, and can only focus on ‘known’ exploits instead. Or, at least, that’s the theory – because recent testing and validation shows that most anti-virus solutions can’t even keep up with the rapid pace of new exploits very well.

Consequently, if you curtail or restrict access on production servers to only competent IT folks (who won’t be browsing the web or opening email attachments from their RDP sessions on production servers), and keep your servers well fire-walled and patched, then you’ll typically never really even going to need to worry about viruses. Or, stated differently, since the vast majority of viruses either take advantage of well-known exploits or require users to ‘invite’ these virus in, then avoiding ‘risky behavior’ is going to do a much better job of protecting against viruses than software can. In most cases.

SQL Server and Anti-Virus

Another huge concern when it comes to your data, SQL Server, and anti-virus solutions is the fact that anti-virus solutions simply can’t protect against bigger security threats and problemsthat exist in your applications or environment because of your code and practices. In other words: anti-virus software monitors system activity for attacks against well-known vulnerabilities – something that’s not going to be of any use if you’re running custom software to manage your data.

Which, in turn, is where things like SQL Injection come into play – because anti-virus solutions simply can’t protect against coding problems or application vulnerabilities within YOUR business applications as anti-virus is only, really, designed to protect against known vulnerabilities.

SQL Server, Anti-Virus, and Regulatory Compliance (oh my!)

Regardless of my own thoughts about whether or not anti-virus is actually worthwhile on production servers, the reality is that regulatory compliance is riddled with the need for anti-virus – meaning that if you’re looking to become PCI compliant, or trying to stay ahead of SOXor HIPPA, you’re going to need anti-virus.

In my mind, anti-virus is required for these types of compliance primarily either because the legislators who wrote these laws were either non-technical enough to assume that anti-virus is ‘magical’ in some way or another to the point where it had to be included, or that they were (most likely) susceptible to anti-virus lobbyists when these regulations were being written. And that’s not to say that there isn’t any benefit to having anti-virus on production servers. Admins are, after all, human and prone to mistakes. My point, however, is that regulatory compliance isn’t a magical ‘seal of security’ or panacea against being hacked – as, for example, PCI compliant companies (sadly) get hacked and experience data leaks and other problems – even when running anti-virus.

Of course, regardless of how I feel about anti-virus and regulatory compliance, there’s no way you’re going to be able to get around this requirement – and I’m certainly not advocating that you try and argue with auditors that anti-virus isn’t ‘worth it’ or arguing that merely having ‘smart IT’ folks on those servers is protection enough. Because they won’t buy it – and that’ll cause all sorts of problems (i.e., it’ll give them the wrong idea, raise all sorts of red flags, and cost you more headaches and your organization tons of additional cost).

So, long story short: don’t bank on anti-virus as being able to provide you with any ‘real’ protection IF you’re already practicing ‘safe computing’ out on your servers. But, by the same token, in many situations, you’re going to need to run anti-virus on your SQL Servers.

Anti-Virus and SQL Server – Playing Nicely Together

Simply put, the best way to get SQL Server and anti-virus programs to play nicely together is to think in terms of compartmentalization. Or, in other words: let anti-virus programs deal with what they do best, and let SQL Server handle what it does best and avoid, at all possible costs, any interaction between the two. 

So, for example, if you’ve properly configured and secured SQL Server (and if you’re using it correctly) it will only need access to a handful of resources on your server including:

  • Binaries. Or the the paths to the actual executables for any of your running SQL Server Services (MSSQL, SQL Server Agent, SSAS, etc). Typically these are found, by default, in the C:\Program Files\Microsoft SQL Server folder – though this could easily be a different path on many production machines. (And, note, you’ll likely want to make sure that C:\Program Files (x86)\Microsoft SQL Server is included in any exclusions as well on x64 machines).
  • SQL Server Error Logs. Not your database log files, but the text files that SQL Server uses to keep its own ‘event logs’ running or up-to-date. (Which, in turn is also different than Windows’ system event logs as well.) By default the path to these files is, in turn, covered in the paths outlined above – or it’s part of the ‘program files’ data associated with your binaries – though you CAN move the location of these logs if desired (as an advanced operation via the startup parameters).)
  • Data And Log Files. Yup – your actual .mdf, .ndf, and .ldf files – or the locations of your data files and log files. (Which you’ll want to make sure get excluded from anything that anti-virus monitors – otherwise creation of new databases, file-growth operations, and other normal ‘stuff’ can/will get blocked by anti-virus operations – which would be fatal in many cases.)
  • Backups. Yup, the path to any of your backups – or backup locations is also something you’ll want to make sure that anti-virus doesn’t monitor.

Accordingly, to get anti-virus to play nicely with SQL Server, you’ll want to make sure that it’s been instructed to exclude all of the paths listed above from any type of scans or real-time monitoring. (Likewise, if your anti-virus tries to monitor processes, you’ll want to make sure  that it stays away from all of your SQL Server Services such as MMSSQLSERVER (sqlservr.exe), the Full-Text Daemon, the SQL Server Agent, the sqlwriter.exe process, and any other services you might be running (such as MSDTC, SSAS, SSRS, integration services, and so on).

From here, you can let anti-virus do whatever it needs to do and monitor overall system interactions, operations, and processes as needed – but without doing any monitoring of SQL Server. And, in my experience, once you’ve correctly configured anti-virus and SQL Server to avoid any type of interactions or overlap, then you’ll hardly even notice or remember that your SQL Server host is even running anti-virus – which is exactly the situation that you want to be in.

출처 : http://www.sqlmag.com/blog/practical-sql-server-45/sql-server-2012/sql-server-antivirus-144988?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+SQLBytes+%28SQL%3ENews%3ENews%29&utm_content=Google+Feedfetcher

posted by LifeisSimple
2012. 9. 11. 13:55 Brain Trainning/DataBase


출처 : http://www.sqlservercentral.com/articles/Security/65169/

Configuring Kerberos Authentication

By Brian Kelley, 2011/03/25 (first published: 2008/12/11)

In my experience, configuring a SQL Server for Kerberos authentication, especially a SQL Server named instance, can be one of the most confusing things to do for a DBA or system administrator the first time around. The reason it can be so confusing is there are several "moving parts" that must all be in sync for Kerberos authentication to work. And what can make things all the more confusing is that in general, if we don't touch a thing, people and applications can connect to our database servers but as soon as we start down the road of configuring Kerberos authentication, they suddenly can't. And it can be rather frustrating to figure out why. In this article we'll look at both the hows and the whys.

If I Don't Do Anything, Why Does it Usually Work?

When it comes to authenticating a login (checking to see if you are who you say you are), SQL Server only does authentication when the login is a SQL Server based one. I've chosen my words carefully here, because it is important to understand that when it's a Windows-based login, SQL Server passes off the authentication to an operating system component, the Windows Security Support Provider Interface (SSPI). That's why when you have Kerberos authentication errors, you usually get some message about SSPI context. Basically, SQL Server realizes it's a Windows login, gets the information it'll need to pass on so SSPI can do it's checks, and then it waits to see what SSPI says. If SSPI says the login is good, SQL Server allows the login to complete the connection. If SSPI says the login is bad, SQL Server rejects the login and returns whatever error information SSPI provides. Now, there is one exception to SQL Server farming out Windows authentication to SSPI, but that occurs in Named Pipes and so we won't get into it because hopefully you're not using Named Pipes as your protocol.

Once we understand that SQL Server is handing off responsibility for authentication to SSPI, it's time to understand what SSPI is going to do. SSPI is going to first try and authenticate using Kerberos. This is the preferred protocol for Windows 2000 and above. In order to do this, there needs to be a Service Principal Name (SPN) in place. We'll talk more about that later. If there's no SPN, Kerberos can't happen. If Kerberos can't happen whether due to no SPN or another reason (across forests with no forest level trust), SSPI will drop back to the old security protocol, NT LAN Manager, or NTLM. So if we don't do anything, authentication will drop back to NTLM and everything tends to work. That is, until we have to do multiple "hops," like through SQL Server Reporting Services set up on a separate server or when we want to do Windows authentication across a linked server connection (see Figure 1).

Figure 1:

In Figure 1, the same set of credentials (Domain\User) is being passed from the client to a server and then from that server to a second server. Each time the credentials are passed, we call that a hop. Since we're not changing the credentials (for instance, we're not going to a second Windows account, such as a service account, or a SQL Server login, we say that there have been two hops, or what we call that a double hop situation. NTLM doesn't permit double hop situations (or triple or quadruple…); It is prevented by design. So in either of these particular scenarios, if we don't have Kerberos authentication set up, we can't make the second hop. We'll see errors logging in attributed to login (null)or NT AUTHORITY\ANONYMOUS LOGON. By default, Kerberos authentication only permits a single hop, but using a feature called Kerberos delegation, multiple hops can be configured and these double hop scenarios can be allowed. While Kerberos delegation is beyond the scope of this article, it is important to note that Kerberos delegation cannot happen without Kerberos authentication, and that's how DBAs usually get pulled into the fray.

What's So Bad About NTLM?

In general, NTLM (or at least, the revised versions) do a good job of authenticating the user and basically being secure. However, NTLM suffers from the following drawbacks:

  • It is susceptible to "replay" attacks.
  • It assumes the server is trustworthy.
  • It requires more authentication traffic than Kerberos.
  • It doesn't provide for a means of going past that first hop.

Let's look at each one of these to understand why they are drawbacks, starting with a replay attack. A replay attack is when an attacker is able to capture network traffic and re-use it. For instance, imagine I'm logging on to your SQL Server. An attacker has a packet sniffer and is able to capture that logon sequence. If, at a later point, that attacker could put that traffic back on the network and it work, that would be a replay attack. The classic example given is an attacker captures a bank transaction for some amount of money. Let's say you pay Mr. Attacker US$500 for services rendered. If the attacker can capture the network traffic and replay it multiple times, the bank will deduct US$500 from your account each time and deposit it into his. To the bank, the repeated transactions looked legitimate (although admittedly, with everyone worried about fraud nowadays, we would hope this kind of thing gets flagged and checked out). If this is the case, then the protocol for that transaction we're using is to blame because it provided us no protection from such an attack. Such is the case with NTLM. It provides no protection. Kerberos, on the other hand, includes a time stamp of when the network traffic was sent. If you're outside the window of the acceptable time range (by default this is 5 minutes), Kerberos rejects that network traffic. So in the case above, imagine if the bank put a timestamp on the transaction and had an acceptable time range within 10 seconds. If Mr. Attacker tried to replay the transaction after that 10 second window was up, the bank would know something was going on.

The second drawback with NTLM is that the server isn't verified. The client connects to MySQLServer. Or at least, it thinks it is connecting to MySQLServer. The NTLM protocol may have the ability to validate that Domain\User is connecting, but it doesn't allow Domain\User to verify that he or she is really talking to MySQLServer. This is where the Service Principal Name (SPN) comes into play. When the client attempts to connect via Kerberos, the SPN for the service being connected to is checked. In a Windows 2000 or higher domain, the SPN is stored within Active Directory, and the Active Directory domain controller is trusted by the client. Therefore, if the service, such as a SQL Server service, checks out based on the SPN the client finds for that service within Active Directory, it knows that it can trust the server is truly MySQLServer.

The third drawback is the amount of authentication traffic used by NTLM versus Kerberos. In NTLM, every time authentication happens, a check has to be made back to a domain controller (DC). With Kerberos, tickets are issued to both the client and the server containing the information each needs to validate the other. Therefore, the client and the server only have to check in with a domain controller once during the lifespan of those tickets (default is 600 minutes or 10 hours) to get the tickets in the first place. After that, they both have the information they need without checking back with a DC.

The final drawback is one we've already discussed, and that is situations where we want to make multiple hopes. Quite frankly, NTLM leaves us with no options. We have to make each hop different from the previous one, whether we like it or not. Kerberos delegation ensures we can pass the credentials through all the hops until we reach the final destination.

What Is an SPN, Why Do I Need to Configure It, and How Do I Do So?

A Service Principal Name (SPN) provides the information to the client about the service. Basically, each SPN consists of 3 or 4 pieces of information:

  • The type of service (for SQL Server it is called MSSQLSvc)
  • The name of the server
  • The port (if this needs to be specified)
  • The service account running the service.

All of these need to match up for the client to be able to validate the service. If any of these are wrong, Kerberos authentication won't happen. In some cases, we'll get that SSPI context error and in fact, SSPI won't even drop back to using NTLM, meaning we don't connect at all. Therefore, the key is to get everything correct when we set the SPN.

In order to set an SPN, you must either be a Domain Admin level user or you must be the computer System account (or an account that talks on the network as the System account, such as the Network Service account). Typically, we advise that SQL Server should be run as a local or domain user, so that rules out the second case. We also advise that SQL Server shouldn't be a domain admin level account, and that rules out the first case. What this means is a domain admin level account will need to set the SPN manually. Thankfully, Microsoft provides a nice utility called SETSPN in the Support Tools on the OS CD/DVD to do so. It can also be downloaded from the Microsoft site.

Using SETSPN

SETSPN has three flags we're interested in:

  • -L : This lists the SPNs for a particular account
  • -A : This adds a new SPN
  • -D : This deletes an existing SPN

The key to understanding SPNs is to realize they are tied to an account, whether that be a user or computer account. If we want to see what SPNs are listed for a particular account, here is the syntax:

SETSPN -L <Account>

For instance, if I have a server called MyWebServer, I can list the SPNs assigned to that computer account by:

SETSPN -L MyWebServer

If, instead, I am running my SQL Server under the MyDomain\MyServiceAccount user account, I can check the SPNs listed for that account by:

SETSPN -L MyDomain\MyServiceAccount

To add an SPN, it's important that we know the service account SQL Server is running under. Also, it is important to know the TCP port SQL Server is listening on. If it's a default instance, the port by default is 1433, although this can be changed. If it's a named instance, unless we have gone in and manually set a static port, SQL Server could change the port at any time. Therefore, it's important to set a port statically. I've described how to do so in the a blog post. Once we have those bits of information, we can add an SPN via the following syntax:

SETSPN -A MSSQLSvc/<SQL Server Name>:<port> <account>

If we're dealing with a default instance listening on port 1433, we can leave off the :<port> (but it is still a good idea to have an entry both with and without the port). One other thing to remember is it is important to specify SPNs for both the NetBIOS name (e.g. MySQLServer) as well as the fully qualified domain name (e.g. MySQLServer.mydomain.com). So applying this to a default instance on MyDBServer.mydomain.com running under the service account MyDomain\SQLServerService, we'd execute the following commands:

SETSPN -A MSSQLSvc/MyDBServer MyDomain\SQLServerService
SETSPN -A MSSQLSvc/MyDBServer:1433 MyDomain\SQLServerService
SETSPN -A MSSQLSvc/MyDBServer.mydomain.com MyDomain\SQLServerService
SETSPN -A MSSQLSvc/MyDBServer.mydomain.com:1433 MyDomain\SQLServerService

For a named instance, we typically only require two commands, because there isn't a case where a client is just connecting to the name of the server. For instance, let's assume we have a named instance called Instance2 listening on port 4444 on that same server using that same service account. In that case we'd execute the following commands:

SETSPN -A MSSQLSvc/MyDBServer:4444 MyDomain\SQLServerService
SETSPN -A MSSQLSvc/MyDBServer.mydomain.com:4444 MyDomain\SQLServerService

And in those rare cases where we need to delete an SPN (for instance, we change the service account or switch ports), we can use the -D switch. It's syntax is parallel to the -A switch:

SETSPN -D MSSQLSvc/<SQL Server Name>:<port> <account>

I've Done All of That. How Can I Verify Logins Are Connecting Via Kerberos?

Within SQL Server there is a very simple query we can execute to determine what type of authentication was performed on each connection. Here's the query:

SELECT  
    
s.session_id 
  
c.connect_time 
  
s.login_time 
  
s.login_name 
  
c.protocol_type 
  
c.auth_scheme 
  
s.HOST_NAME 
  
s.program_name 
FROM sys.dm_exec_sessions s 
  
JOIN sys.dm_exec_connections c 
    
ON s.session_id c.session_id

The query returns a lot of information to help you identify the connections. The connect_time and login_time should be pretty close together and it gives you a window of when the initial connection was made. The login_name, along with host_name and program_name, help you identify the exact login. From there the protocol_type helps you narrow down the connection if you have different endpoints for your SQL Server other than just TSQL (for instance, mirroring or HTTP). And finally, the auth_scheme will reveal, for a Windows account, what security protocol was used. If Kerberos authentication was successful, you should see the auth_scheme reflect Kerberos instead of NTLM.

posted by LifeisSimple
2012. 8. 10. 13:52 Brain Trainning/DataBase

역시 가상화 환경으로 넘어가며 발생하는 오류들... 

IO쪽 오류가 많은 것 같은데... 이 녀석들은 VM Snapshot 등과도 관련이 있는 듯... 


SQL Server PVSCSI 어댑터를 사용 하도록 구성 된 VMware ESX 환경에 "운영 체제 오류 1117 (I/O 장치 오류)"을 보고

기술 자료: 2519834 - 이 문서가 적용되는 제품 보기.

현상

다음 사항을 고려 하십시오.
  • 게스트 OS로는 Windows Server 2008 또는 Windows Server 2008 R2 실행 중인 VMWare ESX 가상 컴퓨터의 경우
  • 게스트 VM Vmware에서 PVSCSI (Paravirtual SCSI) 어댑터를 사용 하도록 구성 했습니다. Paravirtual SCSI 구성 ESX 환경에서 PVSCSI.sys 드라이버를 사용 합니다.
이 환경에서 SQL Server 2008 또는 2008 R2 SQL Server의 인스턴스를 실행 하면 다음과 유사한 오류 메시지가 발생할 수 있습니다.

오류 메시지 1

오류: 17053, 심각도: 16, 상태: 1.

LogWriter: 시스템 오류가 발생 했습니다 (요청이 있는 I/O 장치 오류. 때문에 수행할 수 없습니다) 1117 작동 합니다.

로그 플러시 동안 쓰기 오류가 있습니다.


오류: 9001, 심각도: 21, 상태: 4.

'DBNAME' 데이터베이스의 로그를 사용할 수 없습니다.

spid51 오류: 9001, 심각도: 21, 상태: 4.

spid51 'DBNAME' 데이터베이스의 로그를 사용할 수 없습니다. 이벤트 로그에서 관련된 오류 메시지를 확인 합니다. 오류를 해결 하 고 데이터베이스를 다시 시작 합니다.



spid12s 오류: 9001, 심각도: 21, 상태: 4.

spid12s 'DBNAME' 데이터베이스의 로그를 사용할 수 없습니다. 이벤트 로그에서 관련된 오류 메시지를 확인 합니다. 오류를 해결 하 고 데이터베이스를 다시 시작 합니다.

spid51 데이터베이스 DBNAME 9001 루틴 'XdesRMFull::Commit' 오류 때문에 종료 되었습니다. 모든 데이터베이스 연결이 중단 된 후 데이터베이스 스냅샷 시도 됩니다에 대 한 다시 시작 합니다.

오류 메시지 2

오류: 823, 심각도: 24, 상태: 3.

운영 체제가 오프셋 0x000000b5940000에 대 한 쓰기 중 오류 1117 (요청을 수행할 수 없습니다는 I/O 장치 오류. 때문에) SQL Server 파일에서 반환 ' H:\MSSQL\DBNAME.MDF'. SQL Server 오류 로그와 시스템 이벤트 로그에 메시지를 추가로 자세한 내용을 제공할 수 있습니다. 이 데이터베이스 무결성을 위협 하 고 즉시 수정 해야 하는 심각한 시스템 수준의 오류 조건을 것입니다. 전체 데이터베이스 일관성 확인 (DBCC CHECKDB)를 완료 합니다. 이 오류는 여러 가지 요인에 의해 발생할 수 있습니다. 자세한 내용은 SQL Server 온라인 설명서를 참조 하십시오.



spid10s 오류: 18400, 심각도: 16, 상태: 1.

spid10s 백그라운드 검사점 스레드에서 복구할 수 없는 오류가 발생 했습니다. 스레드가 해당 리소스를 정리할 수 있도록 검사점 프로세스가 종료 됩니다. 이 정보 메시지입니다. 사용자 작업이 필요 하지 않습니다.


오류 메시지 3

spid13s 오류: 17053, 심각도: 16, 상태: 1.

spid13s ReadFileHdr: 1117 (요청을 수행할 수 없습니다는 I/O 장치 오류. 때문에) 운영 체제 오류가 발생 했습니다.

오류 spid13s: 5159, 심각도: 24, 상태: 3.

파일 "H:\MSSQL\DBNAME_log spid13s 운영 체제 오류 1117 (요청이 있는 I/O 장치 오류. 때문에 수행할 수 없습니다).LDF "동안 Readfilehdr입니다.

또한 문제 발생 및 없음 관찰 패턴이 나 추세를 따릅니다. 때때로 SQL Server 트랜잭션 로그 플러시 작업의 일부로 I/O 요청을 보낼 때 위의 I/O 오류가 발생할 수 있습니다. 해당 작업의 실패 데이터베이스 복구 프로세스를 시작 하 고 오프 라인으로 데이터베이스를 만들 수 있습니다.

해결 방법

이 문제를 해결 하려면 VMware 기술 자료의 다음 문서에서 설명 하는 단계를 따르는 것이 좋습니다.

PVSCSI를 사용 하는 방법에 대 한 자세한 내용은 VMware 기술 자료의 다음 문서를 참조 하십시오.

SQL 오류 메시지 823 SQL Server I/O 프로세스에 대 한 자세한 내용은 Microsoft 기술 자료의 다음 문서 번호를 클릭 합니다.
828339 823 오류 메시지 SQL Server 시스템 문제 또는 하드웨어 문제를 나타낼 수 있습니다.

추가 정보

참고 "현상" 절에서 설명 하는 오류는 다른 원인 때문일. 현재 문서의 OS 오류 1117 오류 메시지의 경우에 적합 합니다.

VMWare이 이번 paravirtual SCSI 어댑터를 사용 하면 다음 VMWare ESX 버전 바뀌었는지 확인 합니다.
  • ESX/ESXi 4.0 U1
  • ESX/ESXi 4.1
  • ESXi 5.0
이 문제와 관련된 된 패치에 대 한 자세한 내용은, VMWare 기술 자료 문서 2004578 해결 방법 절에 지정 된 참조 하십시오.이 문제를 완화 하기 위해 VMware 지원으로 작동 하도록 하는 것이 좋습니다.

다음 표에서 제품이 나이 SQL Server 인스턴스 및 버전에 대해 규칙이 평가 되는 SQL Server 제품의이 상태를 자동으로 확인 하는 도구에 대 한 자세한 정보를 제공 합니다.
규칙 소프트웨어규칙 제목규칙 설명규칙 평가 기준이 제품 버전
시스템 센터 관리자가상 컴퓨터 SCSI 구성 SQL Server 대 한 안정성 문제가 발생할 수 있습니다.시스템 센터 관리자 SQL Server VMware 가상 VMware PVSCSI 컨트롤러를 사용 하도록 구성 된 플랫폼에서 실행 되 고 있는지 확인 합니다. 문제를 해결 하려면이 문서에서 참조 하는 VMWare 문서에서 지침을 따릅니다.SQL Server 2008
2008 R2 SQL Server
SQL Server 2012



Microsoft의 현재 보기를 게시 날짜를 기준으로이 문제에 대 정보 및 솔루션에서이 문서를 나타냅니다. 이 방법은 Microsoft 또는 타사 공급자를 통해 사용할 수 있습니다. 모든 타사 공급자나 타사 솔루션이이 문서를 설명 하는 Microsoft 특별히 권장 하지 않습니다. 수 또한 있을 다른 타사 공급자나 타사 솔루션이이 문서에서 설명 하지 않습니다. Microsoft는 변화 하는 시장 환경에 대처 해야 하므로이 정보는 약정으로 Microsoft에서 해석 해서는 안. Microsoft 없습니다 보장 또는 모든 정보 또는 Microsoft 또는 모든 언급 한 타사 공급자에 의해 제공 되는 솔루션의 정확성을 보증 합니다. 

Microsoft 어떠한 보증도 및 표현, 보증 및 조건을 명시적, 묵시적 또는 법정 여부를 제외 합니다. 이러한 포함 되어 있지만 표현, 보증, 또는 조건을 제목, 비침해, 만족 스러운 조건, 상품성, 및, 모든 서비스, 솔루션, 제품 또는 다른 자료 또는 정보를 관련 하 여 특정 목적에 적합성에 국한 되지는지 않습니다. 어떠한 경우에 Microsoft는이 문서에 언급 된 타사 솔루션을 지지 것입니다.

속성

기술 자료: 2519834 - 마지막 검토: 2012년 4월 19일 목요일 - 수정: 1.0
본 문서의 정보는 다음의 제품에 적용됩니다.
  • Microsoft SQL Server 2008 Enterprise
  • Microsoft SQL Server 2008 R2 Datacenter
  • Microsoft SQL Server 2008 R2 Enterprise
  • Microsoft SQL Server 2008 R2 Standard
  • Microsoft SQL Server 2008 Standard
  • Microsoft SQL Server 2008 R2 Developer
  • Microsoft SQL Server 2008 Developer
키워드: 
kbmt KB2519834 KbMtko
기계 번역된 문서
중요: 본 문서는 전문 번역가가 번역한 것이 아니라 Microsoft 기계 번역 소프트웨어로 번역한 것입니다. Microsoft는 번역가가 번역한 문서 및 기계 번역된 문서를 모두 제공하므로 Microsoft 기술 자료에 있는 모든 문서를 한글로 접할 수 있습니다. 그러나 기계 번역 문서가 항상 완벽한 것은 아닙니다. 따라서 기계 번역 문서에는 마치 외국인이 한국어로 말할 때 실수를 하는 것처럼 어휘, 구문 또는 문법에 오류가 있을 수 있습니다. Microsoft는 내용상의 오역 또는 Microsoft 고객이 이러한 오역을 사용함으로써 발생하는 부 정확성, 오류 또는 손해에 대해 책임을 지지 않습니다. Microsoft는 이러한 문제를 해결하기 위해 기계 번역 소프트웨어를 자주 업데이트하고 있습니다.
이 문서의 영문 버전 보기:2519834

posted by LifeisSimple
2012. 8. 10. 12:04 Brain Trainning/DataBase

요즘... VMWare로 시퀄을 운영하면서 다양한 오류를 접한다... (참고)


http://www.sql-server-performance.com/forum/threads/troubleshooting-problem.9521/


Troubleshooting problem

Discussion in 'General DBA Questions' started by xiebo2010cxMay 14, 2007.

  1. xiebo2010cxNew Member


    SQL 2K EE SP4 on Windows 2k3 servers, here it is the errors found from errorlog when opening by text file.


    DB services and SQLAgent services are both on. when using EM to view, Database and Management folds showed no items.


    2007-05-11 14:31:10.42 spid3 LogWriter: Operating system error 21(The device is not ready.) encountered.
    2007-05-11 14:31:10.42 spid3 Write error during log flush. Shutting down server
    2007-05-11 14:31:30.42 spid52 Error: 9001, Severity: 21, State: 1
    2007-05-11 14:31:30.42 spid52 The log for database 'tempdb' is not available..
    2007-05-11 14:31:50.52 spid52 Error: 9001, Severity: 21, State: 1
    2007-05-11 14:31:50.52 spid52 The log for database 'tempdb' is not available..
    2007-05-11 14:32:10.53 spid52 Error: 9001, Severity: 21, State: 1
    2007-05-11 14:32:10.53 spid52 The log for database 'tempdb' is not available..
    2007-05-11 14:32:30.55 spid52 Error: 9001, Severity: 21, State: 1
    2007-05-11 14:32:30.55 spid52 The log for database 'tempdb' is not available..
    2007-05-11 14:32:50.56 spid52 Error: 9001, Severity: 21, State: 1
    2007-05-11 14:32:50.56 spid52 The log for database 'tempdb' is not available..

    ------------------
    Bug explorer/finder/seeker/locator
    ------------------
  2. xiebo2010cxNew Member

    it seems all the drives have enough disk space ( more than 40GB free space)

    ------------------
    Bug explorer/finder/seeker/locator
    ------------------
  3. xiebo2010cxNew Member

    My another server had the similar problem.

    2007-05-09 11:48:11.84 spid1 SQL Server has encountered 1 occurrence(s) of IO requests taking longer than 15 seconds to complete on file [g:mssqldata emdb.ldf] in database [tempdb] (2). The OS file handle is 0x000004D0. The offset of the latest long IO is: 0x00000001af7c00
    2007-05-09 11:48:22.64 spid2 LogWriter: Operating system error 1167(The device is not connected.) encountered.
    2007-05-09 11:48:22.64 spid2 Write error during log flush. Shutting down server
    2007-05-09 11:48:28.42 spid54 Error: 9001, Severity: 21, State: 1
    2007-05-09 11:48:28.42 spid54 The log for database 'tempdb' is not available..
    2007-05-09 11:48:44.59 logon Login succeeded for user 'TEST'. Connection: Trusted.
    2007-05-09 11:48:48.62 spid54 Error: 9001, Severity: 21, State: 1
    2007-05-09 11:48:48.62 spid54 The log for database 'tempdb' is not available..
    2007-05-09 11:48:52.66 logon Login succeeded for user 'TEST'. Connection: Trusted.


    ------------------
    Bug explorer/finder/seeker/locator
    ------------------
  4. MohammedUNew Member

    Looks like there is a Hard Ware/access related issue, make sure all disk are available and sql can access them...

    Error clearly stats that log file is not available for tempdb means you are totally done....

    Also take a look to the following article...... 

    http://support.microsoft.com/default.aspx?scid=kb;EN-US;838765


    MohammedU.
    Moderator
    SQL-Server-Performance.com

    All postings are provided “AS IS” with no warranties for accuracy.
  5. satyaModerator

    Even though the drive has enough space the processess demanding more log space on TEMPDB and amount of time SQL is taking to increase the size is the main issue. So you have to limit the number of processess or perform in smaller batches to ensure the TEMPDB log can cope up the pressure, it is also a good thing to configure the TEMPDB accordingly.

    Satya SKJ
    Microsoft SQL Server MVP
    Writer, Contributing Editor & Moderator
    http://www.SQL-Server-Performance.Com
    This posting is provided AS IS with no rights for the sake of knowledge sharing. Knowledge is of two kinds. We know a subject ourselves or we know where we can find information on it.

posted by LifeisSimple
2012. 6. 19. 09:17 Brain Trainning/DataBase

Database Backup 에 써드파티 툴을 사용할때 다음과 같은 문제가 발생할 수 있습니다. 

이때는 몇가지 조치 방법이 있는데...


BackupMedium::ReportIoError: 백업 장치 ' D:\Backup\ DBDB.BAK'에서 write 오류가 발생했습니다. 운영 체제 오류 = 1784(제공된 사용자 버퍼가 요청된 작업에 적합하지 않습니다.).

Internal I/O request 0x5DDAABE8: Op: Write, pBuffer: 0x07DA0000, Size: 983040, Position: 5664283136, UMS: Internal: 0xC00000E8, InternalHigh: 0x0, Offset: 0x519E1A00, OffsetHigh: 0x1, m_buf: 0x07DA0000, m_len: 983040, m_ac

tualBytes: 0, m_errcode: 1784, BackupFile: D:\Backup\ DBDB.BAK

BACKUP failed to complete the command BACKUP DATABASE [DBDB] TO [bkstorms] WITH  INIT ,  NOUNLOAD ,  NAME = N' DBDB  backup',  NOSKIP ,  STATS = 10,  NOFORMAT 

2012-06-18 23:03:20.70 spid55    Database  DBDB : IO is frozen for snapshot

2012-06-18 23:03:25.98 spid62    Database  DBDB : IO is thawed


1. sqlvdi.dll 파일을 다시 Registry 등록하는 방법이 있고요


2. 두번째는 SQL Backup Simulator 를 사용해 보는 방법이 있습니다. 


SQL Server Backup Simulator

RATE THIS

We at SQL Server support team, continue to invest our time in writing tools and utilities which can aid you in troubleshooting SQL Server issues. SQL Server Backup Simulator is one such tool which will help you while troubleshooting issues in taking backup of SQL Server using 3rd party utilities like IBM Tivoli, Symantec BackupExec, Quest Litespeed, Redgate SQL Backup etc., which use sqlvdi.dll to communicate to SQL Server.

Let me tell you the thought process of bringing this tool to you all. We have been shipping simple.exe along with SQL Server samples which you can use to test backup of SQL Server databases using VDI but there is no tool available for you to troubleshoot VDI backup/restore issues. So necessity of such a tool was mother of the need for coding SQL Server Backup Simulator.

This tool does nothing magical, all it does is perform validation of the SQLVDI infrastructure and takes a sample backup to verify if everything from a SQLVDI perspective is working correctly for a 3rd party backup application to perform a VDI backup of a SQL database.

Steps to perform validation:

Launch this application using the service account credentials of the 3rd Party backup restore application so that we can perform validation and test backup/restore using those security credentials.

Once you launch the application, it reads all local SQL Server instances and gives you a choice to select one to perform validation:

 

Once you select the instance and hit “Validate VDI installation” it performs these steps:

1. Read the Operating System architecture

2. Read the SQL Server installation architecture

3. Read SQL Server build

4. Verify whether the login connected to SQL Server has sysadmin privilege

5. Read sqlvdi.dll loaded into SQL Server memory

6. Read version information about sqlvdi.dll located in %PROGRAMFILES% & %PROGRAMFILES86%

7. Verify whether the build numbers of all these dll’s are matching

You might be wondering as why we do these checks. Based on the history of issues we have seen, there are many different errors occur during SQLVDI backup/restore but the root cause would be that sysadmin permission is missing or version of sqlvdi.dll loaded into SQL Server is different from what client application is using etc.,.

So this GUI tool will help users determine whether the SQLVDI.DLL is functioning correctly and where you need to concentrate your troubleshooting efforts in case of SQL backup/restore operations are failing due to VDI errors.

Steps to perform Backup:

Once you complete the validation, switch to the Simulate window and select Backup or Restore and then select the database from the pre-loaded list.

Select the folder location where SQL Server Backup Simulator can store/read the backup file “SQLBackupSim.bak” (This file name is hardcoded)

Before clicking Start, you can enable the checkbox “Use 64-bit Process” to use 64-bit client exe to connect to SQL Server which loads 64-bit sqlvdi.dll. If you don’t enable this checkbox, we connect to SQL Server using 32-bit client exe which will load 32-bit sqlvdi.dll.

Here is a screenshot of Backup/Restore simulation:

 

 

We don’t guarantee that all your sqlvdi issues can be resolved using this tool but what we can assure you is that this tool will provide a value-add in troubleshooting sqlvdi backup/restore failures because if backup/restore works fine with this tool, they you can focus on the backup application code which is reporting the failure.

Known Issues:

1. Backup path should not contain blank spaces.

2. Application crashes when attempting to take a backup of a SQL instance running in WOW (32-bit SQL on 64-bit server) using the 32-bit version of SQLVDI.DLL

Upcoming Features:

We are planning to provide compression features etc.., in the next release of this tool.

Download location:

Please feel free to download this tool and post your comments/feedbacks/questions/issues at http://code.msdn.microsoft.com/sqlbackupsim

To know more about VDI, download 'SQL Server 2005 Virtual Backup Device Interface (VDI) Specification' from http://www.microsoft.com/downloads/details.aspx?familyid=416f8a51-65a3-4e8e-a4c8-adfe15e850fc&displaylang=en

 

Regards, 
Sakthivel Chidambaram 
SE, Microsoft SQL Server Support

Reviewed by, 
Amit Banerjee 
SEE, Microsoft SQL Server Support

posted by LifeisSimple
2012. 6. 12. 17:36 Brain Trainning/DataBase

Creating a merged (slipstreamed) drop containing SQL Server 2008 RTM + Service Pack 1

[Updated on April 7th, along with the availability of SQL Server 2008 SP1]

Today, I am going to show you how to create new source media that will slipstream the original source media and SQL Server 2008 Service Pack 1. Once you have created this drop, you can install SQL Server 2008 SP1 in a single step! These instructions are included with the Service Pack 1 release but there are some issues with the documentation that will be addressed in the next revision of the on-line documentation. There is not a lot of user interface that indicates you are slipstreaming, but there are a few clues, see at the bottom for screen shots.

These steps will take a little longer to perform than the steps for the basic slipstream describe here, but once completed you will be able to run a slipstream installation from the same location. It is recommended you verify you can complete a slipstream installation from the new drop on a test machine before deploying into production.

These instructions are for English SQL Server but will work with any language of SQL Server if you obtain the correct service package language.

1. Copy your original SQL Server 2008 source media to c:\SQLServer2008_FullSP1

2. Download Service Pack 1 from http://www.microsoft.com/downloads/details.aspx?FamilyID=66ab3dbb-bf3e-4f46-9559-ccc6a4f9dc19. The three architectures of Service Pack 1 should be included, the package names are as follows:

  • SQLServer2008SP1-KB968369-IA64-ENU.exe
  • SQLServer2008SP1-KB968369-x64-ENU.exe
  • SQLServer2008SP1-KB968369-x86-ENU.exe

3. Extract the packages as follows:

  • SQLServer2008SP1-KB968369-IA64-ENU.exe /x:c:\SQLServer2008_FullSP1\PCU
  • SQLServer2008SP1-KB968369-x64-ENU.exe /x:c:\SQLServer2008_FullSP1\PCU
  • SQLServer2008SP1-KB968369-x86-ENU.exe /x:c:\SQLServer2008_FullSP1\PCU

Ensure you complete this step for all architectures to ensure the original media is updated correctly.

4. Copy Setup.exe and Setup.rll from the PCU extracted location to original source media location

  • robocopy C:\SQLServer2008_FullSP1\PCU c:\SQLServer2008_FullSP1 Setup.exe
  • robocopy C:\SQLServer2008_FullSP1\PCU c:\SQLServer2008_FullSP1 Setup.rll

5. Copy all files not the folders, except the Microsoft.SQL.Chainer.PackageData.dll, in c:\SQLServer2008_FullSP1\PCU\<architecture> to C:\SQLServer2008_FullSP1 \<architecture> to update the original files.

  • robocopy C:\SQLServer2008_FullSP1\pcu\x86 C:\SQLServer2008_FullSP1\x86 /XF Microsoft.SQL.Chainer.PackageData.dll
  • robocopy C:\SQLServer2008_FullSP1\pcu\x64 C:\SQLServer2008_FullSP1\x64 /XF Microsoft.SQL.Chainer.PackageData.dll
  • robocopy C:\SQLServer2008_FullSP1\pcu\ia64 C:\SQLServer2008_FullSP1\ia64 /XF Microsoft.SQL.Chainer.PackageData.dll

NOTE: if you accidentally copy the Microsoft.SQL.Chainer.PackageData.dll file, you may see this error when you launch Setup.exe. If this happens, restore  Microsoft.SQL.Chainer.PackageData.dll back to the original version.

clip_image002

6. Determine if you have a defaultsetup.ini at the following locations:

  • C:\SQLServer2008_FullSP1\x86
  • C:\SQLServer2008_FullSP1\x64
  • C:\SQLServer2008_FullSP1\ia64

If you have a defaultsetup.ini, add PCUSOURCE="{Full path}\PCU".

NOTE: The {Full path} needs to be the absolute path to the PCU folder. If you will just be running from local folder it would be C:\SQLServer2008_FullSP1. If you will eventually share this folder out, {Full path} would be \\MyServer\SQLServer2008_FullSP1.

See question #11 here if you would like to use a relative path.

     ;SQLSERVER2008 Configuration File

     [SQLSERVER2008]

     ...

     PCUSOURCE="{Full path}\PCU"

If you do NOT have a defaultsetup.ini, create one with the following content:

    ;SQLSERVER2008 Configuration File

    [SQLSERVER2008]

    PCUSOURCE="{full path}\PCU"

  and copy to the following locations

  • C:\SQLServer2008_FullSP1\x86
  • C:\SQLServer2008_FullSP1\x64
  • C:\SQLServer2008_FullSP1\ia64

      This file will tell the setup program where to locate the SP1 source media that you extracted in step 3.

7. Now run setup.exe as you normally would.

       

How can I tell I am slipstreaming?

1) You should see the "Update Setup Media Language Rule" on the Installation Rules dialog:

 InstallationRules

2) You should see the Action indicate it is being slipstreamed and the Slipstream node should be shown:

ReadyToInstall

3) You should see the PCUSource being specified in the Summary log:

Summary

 

4) After installing, if you run the "SQL Server features discovery report" off of the Installation Center you will see the following versions:

image

posted by LifeisSimple
2012. 6. 12. 10:42 Brain Trainning/DataBase

Download Service Pack 1 for Microsoft® SQL Server® 2008 R2

Quick details

Version:10.50.2500.0Date published:7/11/2011

Files in this download

The links in this section correspond to files available for this download. Download the files appropriate for you.

File nameSize
SQLManagementStudio_x64_ENU.exe155.9 MBDOWNLOAD
SQLManagementStudio_x86_ENU.exe153.1 MBDOWNLOAD
SQLServer2008R2SP1-KB2528583-IA64-ENU.exe296.5 MBDOWNLOAD
SQLServer2008R2SP1-KB2528583-x64-ENU.exe309.0 MBDOWNLOAD
SQLServer2008R2SP1-KB2528583-x86-ENU.exe201.1 MBDOWNLOAD


Microsoft® SQL Server® 2008 R2 서비스 팩 1 다운로드

간단 정보

버전:10.50.2500.0게시 날짜:2011-07-11

이 다운로드의 파일

이 섹션의 링크는 다운로드에 포함된 파일로 연결됩니다. 적절한 파일을 다운로드하십시오.

파일 이름크기
SQLManagementStudio_x64_KOR.exe178.0 MB다운로드
SQLManagementStudio_x86_KOR.exe175.3 MB다운로드
SQLServer2008R2SP1-KB2528583-IA64-KOR.exe300.4 MB다운로드
SQLServer2008R2SP1-KB2528583-x64-KOR.exe314.8 MB다운로드
SQLServer2008R2SP1-KB2528583-x86-KOR.exe206.3 MB다운로드

posted by LifeisSimple
2012. 5. 25. 13:43 BookStory

책이 몇권 땡기는데 ㅡㅡ;;

http://www.yes24.com/eventworld/event02.aspx?EveNo=59802&CategoryNumber=001001003&FetchSize=0




비주얼라이즈 디스

저자
네이선 야우 지음
출판사
에이콘출판 | 2012-04-26 출간
카테고리
컴퓨터/IT
책소개
빅데이터 시대의 데이터 시각화+인포그래픽 기법『비주얼라이즈 디스...
가격비교

데이터 분석 및 시각화 하는 방법을 알려줄 이책... 



MongoDB in Action 몽고디비 인 액션

저자
카일 뱅커 지음
출판사
제이펍 | 2012-04-20 출간
카테고리
컴퓨터/IT
책소개
MongoDB나 NoSQL에 경험 없는 개발자를 위한 쉽고 실전...
가격비교


예전에 좀 하다가 더이상 진행하지 않았던 MongoDB 이야기



Head First Statistics

저자
돈 그리피스 지음
출판사
한빛미디어 | 2012-04-01 출간
카테고리
컴퓨터/IT
책소개
『Head First Statistics』은 데이터 분석에 필요...
가격비교

요즘 점점 땡기는 통계 등등... 


이런 책들이 요즘 땡긴다... 



posted by LifeisSimple
prev 1 2 3 4 5 6 7 ··· 36 next