Blog

Viewing Deadlock Graphs

Deadlocks can be frustrating to troubleshoot. I’ve blogged about deadlock priority in the past but what about deadlock graphs? Let’s take a look at deadlock graphs and what I think is the best way to decipher them. Test Deadlock Setup Let’s open up two query windows in SSMS. In the first window, we’ll have these … Continue reading Viewing Deadlock Graphs

Why Do I See ASYNC_NETWORK_IO Waits?

What are the top wait types that you come across on your SQL Servers? Is ASYNC_NETWORK_IO one of them? Let’s go over why you might be seeing ASYNC_NETWORK_IO waits and how to get them cleaned up. Slow Application Processing ASYNC_NETWORK_IO waits can occur when your application isn’t processing your SQL Server data fast enough and … Continue reading Why Do I See ASYNC_NETWORK_IO Waits?

What is a Read-Ahead Read?

What are read-ahead reads and how do they impact SQL Server performance? Read-ahead reads allow SQL Server to think ahead to pull pages into the buffer cache before they are actually requested for a query. Up to 64 contiguous pages from a file can be read and the ability to read-ahead can be used for … Continue reading What is a Read-Ahead Read?

Delete vs. Truncate

Delete and Truncate can both be used to remove data from a database but they are far from identical. They both have some differences that should be considered when being used. I’ve specifically seen confusion before about how each affects IDENTITY columns and how each is handled by the transaction log so let’s take a … Continue reading Delete vs. Truncate

CASE Expression Examples

CASE expressions are used to evaluate a condition or conditions and return a value. I’ve most often seen this in SELECT statements but that’s not a limit. In fact, documentation states that CASE can be used in any statement or clause that allows a valid expression. I used it differently than SELECT this week in … Continue reading CASE Expression Examples

Changes for sa Login Safety

Every SQL Server install includes the sa login as a sysadmin. This can be good for consistency; however, that also makes it a prime target for attackers trying to get into your SQL Server. That is one of many reasons why you should make the following changes to protect your sa login from being used … Continue reading Changes for sa Login Safety

Loading…

Something went wrong. Please refresh the page and/or try again.


Follow My Blog

Get new content delivered directly to your inbox.