Week 2 Challenge: You can download a zip file with multiple backup files created on SQL Server 2008 that can be restored and used on SQL 2008, SQL Server 2008R2, SQL Server 2012 or SQL Server 2014. The story… A backup was run yesterday, after that backup several changes were made to the database, inserts deletes, updates, and more. Sometime …

Week 2 Challenge Details Read more »

Most DBAs know the usual difference between TRUNCATE and DELETE FROM, however one not so obvious difference between the two is how things are handled if the table is corrupt. For instance, if you look at the corrupt database from the Database Corruption Challenge Week 1, you see the following If you want to clear out the corrupt Revenue table, …

Difference Between TRUNCATE TABLE and DELETE FROM Table Read more »

After posting the winning solution for Corruption Challenge 1 from Brent Ozar, I realized that he and I both solved the corruption by using the REPAIR_ALLOW_DATA_LOSS option on CheckDb. A very nasty move, however it did repair the corruption.   After reading some feedback, one of the winners stated: As soon as he ran REPAIR_ALLOW_DATA_LOSS, I knew we weren’t on …

Corruption Challenge 1 – An alternative solution Read more »

Since the corruption challenge completed yesterday, I have had several request asking how I created the corrupt database. So here is the script that I used to create the Database Corruption Challenge 1. First the initial setup. Most of this I stole from a query training session that I did several weeks ago. All I really needed was a table …

Corruption Challenge 1 – how I corrupted the database Read more »

On Saturday morning, I announced the Database Corruption Challenge, and I had to abbreviate it as the DBCC, why not, acronym overloading isn’t always a bad thing. There were 91 participants, 22 of which ended up with correct answers with no corruption and no data loss. I created a database, with 3 bytes of corruption in one of the leaf …

A Weekend Full of Database Corruption Read more »

The integrity of a Microsoft SQL Server database can be severely undermined by corruption, leading to data inaccessibility and potential operational disasters. My comprehensive approach to identifying and rectifying such corruption is often considered an essential tool in the SQL Server administrator’s kit, underlining its significance in maintaining database health. Transcribed from a presentation on Database Corruption by Steve Stedman …

SQL Server Corruption: More about Detecting Corruption Read more »

The integrity of a Microsoft SQL Server database can be severely undermined by corruption, leading to data inaccessibility and potential operational disasters. Steve Stedman’s comprehensive approach to identifying and rectifying such corruption is often considered an essential tool in the SQL Server administrator’s kit, underlining its significance in maintaining database health. Transcribed from a presentation on Database Corruption by Steve …

SQL Server Corruption: More about Detecting Corruption Read more »

Transcribed from a presentation on Database Corruption by Steve Stedman and Derrick Bovenkamp. Derrick : How do we find corruption? Oh, man, I wish it was as easy as taking out the magnifying glass there. Steve : Yeah, if we had this magic magnifying glass that would let us look at the data bytes like that, that’d be cool. But …

SQL Server Corruption: More about Detecting Corruption Read more »

Announcing our Newest SQL Server Course We are so excited to release our newest SQL Server Course ​”Getting Started with Microsoft SQL Server” ​ We are launching this course with a 50% OFF discount code! Coupon Code: 50OFF-INTRO DBCC ShrinkDatabase – I want to shrink my database. TL;DR summary: Don’t do it. Stop reading here if you want, but just …

September Blog Post Wrap-up Read more »