T-SQL: show uptime of SQL server & and status of agent
Interested to see how long your SQL server agent is up and running, or you want to see if that agent is operational? You can use the t-sql code below to find out:
I.T. minded
Interested to see how long your SQL server agent is up and running, or you want to see if that agent is operational? You can use the t-sql code below to find out:
The SQL statement below will give you the top 100 longest running SQL statements in your database, sorted by duration.
Looking for a table, but you don’t remember in which database it’s located? The code below will create a stored procedure, which you can use in order to find a table in multiple databases.
You can use the t-sql code below in order display the size of each table in a specific database.
Sometimes you need to do maintenance on a database, and you don’t really want to use single user mode or disable accounts. In that situation you could kill all connections to a specific database.In order to achieve that, you can use the t-sql code below.
You can use the following shell commands in order to redirect a port to another port.
Using the “stress” application, you can simulate high memory usage of your system.You may use the following command line:
You can create a temporary lock in T-SQL for -for example- testing:
With ffmpeg you can also decrease the size (aka: quality) of a mp4 file on linux command line.You can use the following example, which will generate a +/- 5Mb file :
You can optimize Jpeg images on linux command line (= reduce the size to load images faster).In order to achieve that, you can make use of the ‘jpegoptim’ application.On ubuntu/debian systems: To optimize the jpeg file:
Create a file ‘allowed-hosts’ in the ‘work_dir’ (can be found in the denyhosts.conf file), which is /var/lib/denyhosts on Ubuntu, containing the ip.See the example below:
Find IP Address to Unblock Log in to your server via SSH and type in the following command: iptables -L -n Look for the IP address you want to unblock / unban. Now we must find the jail name this IP address is in. To do so, type the following:…
First, edit the config file : vi Then, check the line : ignoreip = Add now add all ip you want. Each IP or range IP must be placed here with a space. Ex: 192.168.0.1 192.168.5.0/32 Save. And restart Fail2Ban: service fail2ban restart
Within HAProxy it is possible to redirect all http traffic to https.It is sufficient to add the following rule within the frontend section:
Within HAProxy it is possible to redirect all http traffic to https. It is sufficient to add the following rule within the frontend section: frontend incoming80 bind 10.1.1.13:80 redirect scheme https if !{ ssl_fc }
If you configure HAProxy by default, the backends will receive the IP address of the HAProxy as incoming IP address. Some applications (or people) don’t want that. It is possible to configure haproxy as transparent proxy, so that the IP of the client is being used. First of all you…