Tuesday, August 27, 2013

SQL Server Startup Parameters


Hi, Every now and then we all have to reread something we may already know because frankly if you are like me, you can’t keep everything in your head. I tend to go back over tips and tricks and even database concepts when I have time so I will maybe remember enough about it so when a problem arises I at least know where to go look and find the answer. It is with, that I want to write about my latest re-education attempt.

I am working with a SQL Server database and something went wrong. Yea I know how weird nothing ever goes wrong with SQL Server or any other product out there. While this particular article is not about rebuilding or restoring a master database, it is about something that a lot of DBAs overlook startup parameters. 

SQL Server allows you to control a few of its configurable options during startup with the use of startup parameters. These parameters are usually useful for troubleshooting purposes – usually in case of extreme emergencies, but they can also be useful for some long-term configuration changes as well. Before we go any further, I want to add a little warning here – do not learn about startup parameters on any SQL Server installation that you are not willing to completely rebuild. It is possible to set a parameter and cause serious problems that may affect your installation, like setting the location of the master database to a false one.
You have two easy ways to set the startup parameters in a SQL Server installation. The first is from the command line by using the sqlservr.exe parameter command. This way is useful for those emergencies in which you have to start SQL Server in single user mode or with minimal configurations. The second method is by using Enterprise Manager and the startup parameters dialog box. This method is great for long-term parameter requirements like the locations of the master database data and log files and the location of the error logs. 

To change a parameter through the Enterprise Manager:
  • Open Enterprise Manager and right click on a registered installation.
  • Click Properties.
  • Click the Startup Parameters button.
  • Add your new parameters or remove an existing one. Be careful not to remove the default parameters that give the locations of the master database, the master database log, and the error logs unless you provide an alternate location.
If you take a look at the startup parameters dialog box, will see there are a few default parameters that are part of every SQL Server installation:
 -d master_data_file_path,
 -l master_log_file_path, and
 -e error_log_path.

You can use these default parameters to change the locations of the master database file, the master database log file, or SQL Server error logs. I would not do this unless you have a problem with the default location’s drive or if the master database or error logs outgrow their current directories and you need to move them to another drive. If you are simply moving the master database data file or log file to another location, then you can change the parameter from Enterprise Manger before you stop the instance. If you are moving the file because of a problem, stop the instance and use the sqlservr.exe command to restart the instance pointing to the new data file or log file location.

SQL Server does have a few optional startup parameters that you can set to help troubleshoot your installation or make some minor performance optimizations. 

-c  Shortens SQL Server’s startup time by starting the instance independent of the Service Control Manager. Starting SQL Server independent of the Service Control Manager will keep if from running as a Windows service. I have not had the need to use this parameter so I can only guess that it could be useful for troubleshooting startup issues.

-f  This parameter starts an instance of SQL Server with the minimal configurations and enables the sp_configure allow updates option. This parameter is very useful if a configuration option is set that disables SQL Server. You can use this parameter to start SQL Server and change the inappropriate configuration setting back to the original.

-g  This parameter will specify the amount of virtual address space that SQL Server will leave available for memory allocations within the SQL Server process, but outside the SQL Server memory pool. What does that mean? This memory allocation outside of the SQL Server memory pool is used for loading times such as extended stored procedures, dll files, OLE DB providers referenced by queries, and automation objects reference in Transact-SQL statements. The default size of this memory is 128 MB, which is usually fine for most SQL Server installations. Keep in mind that SQL Server installations under 2 GB (SQL Server 2000 Standard Edition) or 3 GB (Enterprise Edition) will only use 128 MB no matter what size you set with the -g parameter. You can however, use this parameter to optimize the memory on installations above the 2 GB and 3 GB cutoffs. Microsoft recommends that you do not use this parameter unless you see the following error in your error log.
WARNING: Clearing procedure cache to free contiguous memory
However, I have used this and seen others use this parameter for errors such as:
OLE DB provider ‘SQLOLEDB’ reported an error. The provider ran out of memory.

-m  This parameter may be one of the most used, especially if you are studying for the SQL Server tests. The 
-m  parameter will start SQL Server in the single user mode and enable the sp_configure allow updates configuration option. Starting SQL Server in the single user mode does not issue a CHECKPOINT command. This parameter allows you work on your system databases if you encounter a problem with one of them. If you ever have to rebuild your master database you will be familiar with this parameter.

-n  This parameter turns off SQL Server logging its errors to the Windows application log. It is recommended that if you use this parameter you should also use the -e startup parameter, which you should be doing anyway. This is another parameter that I have not used and personally, I would not recommend turning off the Windows application logging.

-s  This parameter is used to start a named instance of SQL Server. Without the use of this parameter, SQL Server will try to start the default instance, which may or may not be present or the one you want to start.
/Ttrace# Used to start a Trace Flag when you start SQL Server. This parameter is useful for general troubleshooting purposes.

-x  This parameter will disable the keeping of the CPU time and CACHE-HIT ratio statistics. While this parameter allows maximum performance, I do not use it as the benefits of the CACHE-HIT ratio outweigh the small performance gain this parameter buys you. 

A quick guide to the startup parameters found in SQL Server that you could use for those extreme emergencies. Most of the time, you will not have to use these parameters but they are nice to know for that rare instance that you have system database problems or when you need to start a Trace Flag.

Note:- Hi readers, If you found this post is useful / save your precious time kindly give your feed back in comment box.

Thanks
R.karthikeyan
   (RKB)

How to unprotect Excel Sheet with Macro

 The AllInternalPasswords Macro
This macro, for which the true origin is lost in antiquity, will unlock all the internal passwords in your workbook. It will report which password strings worked (so that if you have other workbooks by the same author, you can try it on them), but it will NOT report the original password (it can't - it's never stored - only the hash is saved in the file). I first saw it in a post by Bob McCormick. Norman Harker did an outstanding job in modifying it for workbook as well as worksheet protection. we mostly cleaned it up and made it a bit more efficient.
It shouldn't take more than a few seconds (certainly less than a minute) to find each password if you have a relatively up to date computer.
Working passwords will be returned in the form
    AAABABBABABX
where the first 11 characters will be As or Bs and the X represents a character from ASCII 32 (" " or space) to ASCII 126 ("~", or tilde). While the sheet or workbook will automatically be unprotected, the macro suggests you write this code down, not only for future use, but, people being creatures of habit, it may work on another sheet/workbook by the same author. Again, since it's not returning the original password, it's unlikely to be useful in breaking file or VBA project passwords.

DISCLAIMER: Please note that breaking password protection MAY violate laws or regulations in your jurisdiction. In the United States (currently) it is certainly OK to break password protection on sheets that you developed for your personal use, or for which you have permission from the author or owner. It's probably OK if you own the workbook, even if it was written by someone else. But neither Norman nor I are intellectual property lawyers in ANY jurisdiction, so, if in doubt, ask the original author, and if you can't ask - don't use it!

 

 
IF You find this is post helpful/useful just leave your comments
 
 Thanks
R.karthikeyan 

Thursday, August 1, 2013

How to Restore Deleted files from Network Drive


You may have noticed that when you delete a file stored on a network location or mapped network drive that the file is permanently deleted. It does not go to the local computer's recycle bin and does not go to the server's recycle bin. I have discovered a work-around that extends recycle bin coverage to include mapped network drives. The solution is not 100% perfect, but works extremely well and does not rely on Shadow Copies or 3rd-party software.

Here's how:
1. Map a network drive to the network share you want to use. Make sure that the drive is re-connected on logon. If you don't know how to do this, search Google.
2. Browse to C:\users\<user name>.
3. Right-click on one of the folders in this location (I chose saved games) and click properties.
4. Select the Location tab.
5. Click Move, browse to to root of the drive you mapped in step 1, and click Select Folder.
6. Click Ok and click yes in the dialogue box that appears.
7. Repeat these same steps for all users on the computer.

You can now verify that the network drive is protected by the recycle bin by right-clicking on the recycle bin and clicking properties. The network drive should be listed in the Recycle Bin Locations column.

Some warnings:
1. This only protects files accessed through the mapped network drive, and not by UNC paths. So for example, if you mapped \\server\share to z:, and delete something off the z drive, it will go to the recycle bin. However, if you browse to \\server\share and delete a file, it will be deleted directly.
2. I don't know what will happen if your network drive is not available, so beware. This may not work well with laptops.
3. What ever files that were supposed to be stored in the folder you select in step 3 will now be stored on your mapped network drive by default. This can actually be quite useful.

Feel free to post you opinion about this post. 

Thanks
R.karthikeyan

Saturday, July 20, 2013

Robocopy and a Few Examples

 
Robocopy (Robust File Copy) is a command-line file copy utility that comes with Windows Vista / Windows 2008 or newer. Until Vista, Robocopy was a part of  Windows Resource Kit Tools as a free download (http://www.microsoft.com/downloads/details.aspx?FamilyID=9D467A69-57FF-4AE7-96EE-B18C4790CFFD&displaylang=en ). Unlike normal copy commands, Robocopy is designed for reliable copy or mirroring while maintaining the permissions, attributes, owner information, timestamps and properties of the objects copied.

A few of my customers were complaining that there is not enough documentation on robocopy usage and examples. I am trying to document some of the common scenarios where robocopy can be useful.


Robocopy Syntax
ROBOCOPY <source> <destination> [file…] [options]

<source>        Source Directory (local or network path)
<destination>  Destination Directory (local or network path) and
[file…]              Specifies the file or files to be copied. You can use wildcard characters (* or ?), if you want. If the File parameter is not specified, *.* is used as the default value.
 
 **Skip to the end of this document for more information on Robocopy Options and Switches .

Examples of Microsoft's Robocopy Syntax


#1

To copy contents of C:\UserFolder to C:\FolderBackup:
         Robocopy C:\UserFolder C:\FolderBackup
This is the simplest usage for Robocopy

#2
To copy all contents including empty directories of SourceFolder to DestinationFolder:
Robocopy C:\SourceDir C:\DestDir /E

#3
List only files larger than 32 MBytes(33553332 bytes) in size.
            Robocopy.exe c:\sourceFolder d:\targetfolder /min:33553332 /l
List only files less than 32 MBytes(33553332 bytes) in size.
          Robocopy.exe c:\sourceFolder d:\targetfolder /max:33553332 /l
Note: /l - will list files matching the criteria. if /l is omitted, files matching the criteria will be copied to the taget location

#4
Move files over 14 days old (note the MOVE option will fail if any files are open and locked).
ROBOCOPY C:\SourceFoldern D:\DestinationFolder /move /minage:14
Similarly you could use the below switches
/maxage: <N>     Specifies the maximum file age (to exclude files older than N days or date).
/minage: <N>      Specifies the minimum file age (exclude files newer than N days or date).
/maxlad: <N>      Specifies the maximum last access date (excludes files unused since N).
/minlad: <N>       Specifies the minimum last access date (excludes files used since N) If N is less than 1900, N specifies the number of days. Otherwise, N specifies a date in the format YYYYMMDD

#5
/MIR is an option to ROBOCOPY where you mirror a directory tree with all the subfolders including the empty directories and you purge files and folders on the destination server that no longer exists in source.
ROBOCOPY \\sourceserver\share \\destinationserver\share /MIR
Or
ROBOCOPY source-drive:\DIR destination-drive:\DIR /MIR

#6
The following command will mirror the directories using Robocopy:
Robocopy \\SourceServer\Share \\DestinationServer\Share /MIR /FFT /Z /XA:H /W:5
 /MIR specifies that Robocopy should mirror the source directory and the destination directory. Note that this will delete files at the destination if they were deleted at the source.
/FFT uses fat file timing instead of NTFS. This means the granularity is a bit less precise. For across-network share operations this seems to be much more reliable - just don't rely on the file timings to be completely precise to the second.
/Z
ensures Robocopy can resume the transfer of a large file in mid-file instead of restarting.
/XA:H makes Robocopy ignore hidden files, usually these will be system files that we're not interested in.
/W:5 reduces the wait time between failures to 5 seconds instead of the 30 second default.


#7
Use Robocopy to copy all changes to files in a directory called c:\data to a directory that contains the date, like data_20091124.  Create a batch file as follows.
@echo off
set day=%date:~0,2%
set month=%date:~3,2%
set year=%date:~6,4%
Robocopy "c:\data" "c:\backup\data\%day%-%month%-%year%\" /MAXAGE:1

#8
To mirror the directory "C:\directory" to "\\server2\directory" excluding \\server2\directory\dir2" from being deleted (since it isn't present in C:\directory) use the following command:
Robocopy "C:\Folder" "\\Machine2\Folder" /MIR /XD  \\server2\ directory\dir2"
Robocopy can be setup as a simply Scheduled Task that runs daily, hourly, weekly etc. Note that Robocopy also contains a switch that will make Robocopy monitor the source for changes and invoke synchronization each time a configurable number of changes has been made. This may work in your scenario, but be aware that Robocopy will not just copy the changes, it will scan the complete directory structure just like a normal mirroring procedure. If there are a lot of files & directories, this may hamper performance.

#9
You have copied the contents from source to destination but now you made changes to the Security permissions at source. You wanted to copy only the permission changes and not data.

ROBOCOPY <Source> <Target> /E /Copy:S /IS /IT

Copy option have the following flags to use:
D     Data
A     Attributes
T     Time stamps
S     NTFS access control list (ACL)
O    Owner information
U     Auditing information
The default value for CopyFlags is DAT (data, attributes, and time stamps).
/IS - Includes the same files.
/IT - Includes "tweaked" files.

Sidenote: ROBOCOPY  c:\sourcefolder d:\targetfolder /zb /sec /e /nocopy may give you similar results but useful ONLY when more permissions are added. it will not consider or update the target for permissions removed at the source.


Robocopy, short for Robust File Copy, is a command-line directory replication and file copy command utility that was first made available as feature in Windows Vista and Windows Server 2008, although it has been available as part of Windows Resources Kit. In Windows 7 and Windows Server 2008, Robocopy utility is further enhanced with ability to multi-threaded copy operation feature.

Multi-threaded support allows Robocopy to open multiple
threads simultaneously, allowing many files to be copied in parallel. With multi-threaded copying, total time required to complete the operation will be drastically reduced and cut, when comparing with with typical copying one file at time in serial sequential order.

As Robocopy is
generally a command-line only utility (although a GUI add-on is available for Robocopy), the new multi-threaded operation capability has to be called via a new switch supported by Robocopy. The new multi-threaded copy feature can be enabled and turned on with the following parameter:
/MT[:n]
Where n will instruct Robocopy to do multi-threaded copies with n threads (default 8). The value of n must be at least 1 and not greater than 128 (between 1 to 128), with 1 as single thread. In fact, Robocopy will copy files and folders in multi-threaded operation by default, with 8 threads in one go. Note that /MT[:n] switch is not compatible with the /IPG and /EFSRAW operations.

For example,
Robocopy C:\Folder1 C:\Folder2 /MT:32

#10
To copy a directory tree along with the source timestamps for folders
Robocopy C:\Folder1 C:\Folder2 /MIR /dcopy:T

#11
To copy a directory using /IPG to limit bandwidth usage. General rule of thumb /IPG:750 will use roughly 1Mbps.

Robocopy /ipg:750 /z /r:3 /w:3 /tee /LOG+:c:\robolog.txt //server1/share //server2/share

More Information

Robocopy Options and Switches: http://technet.microsoft.com/en-us/library/cc733145(WS.10).aspx

Robocopy Copy Options

Option
Description
/s
Copies subdirectories. Note that this option excludes empty directories.
/e
Copies subdirectories. Note that this option includes empty directories.
/lev:<N>
Copies only the top N levels of the source directory tree.
/z
Copies files in Restart mode.
/b
Copies files in Backup mode.
/zb
Uses Restart mode. If access is denied, this option uses Backup mode.
/efsraw
Copies all encrypted files in EFS RAW mode.
/copy:<CopyFlags>
Specifies the file properties to be copied. The following are the valid values for this option:
D Data
A Attributes
T Time stamps
S NTFS access control list (ACL)
O Owner information
U Auditing information
The default value for CopyFlags is DAT (data, attributes, and time stamps).
/dcopy:T
Copies directory time stamps.
/sec
Copies files with security (equivalent to /copy:DAT).
/copyall
Copies all file information (equivalent to /copy:DATSOU).
/nocopy
Copies no file information (useful with /purge).
/secfix
Fixes file security on all files, even skipped ones.
/timfix
Fixes file times on all files, even skipped ones.
/purge
Deletes destination files and directories that no longer exist in the source.
/mir
Mirrors a directory tree (equivalent to /e plus /purge).
/mov
Moves files, and deletes them from the source after they are copied.
/move
Moves files and directories, and deletes them from the source after they are copied.
/a+:[RASHCNET]
Adds the specified attributes to copied files.
/a-:[RASHCNET]
Removes the specified attributes from copied files.
/create
Creates a directory tree and zero-length files only.
/fat
Creates destination files by using 8.3 character-length FAT file names only.
/256
Turns off support for very long paths (longer than 256 characters).
/mon:<N>
Monitors the source, and runs again when more than N changes are detected.
/mot:<M>
Monitors source, and runs again in M minutes if changes are detected.
/rh:hhmm-hhmm
Specifies run times when new copies may be started.
/pf
Checks run times on a per-file (not per-pass) basis.
/ipg:n
Specifies the inter-packet gap to free bandwidth on slow lines.
/sl
Copies the symbolic link instead of the target.
 
Important
When using the /SECFIX copy option, specify the type of security information you want to copy by also using one of these additional copy options:
·         /COPYALL
·         /COPY:O
·         /COPY:S
·         /COPY:U
·         /SEC

File Selection Options

Option
Description
/a
Copies only files for which the Archive attribute is set.
/m
Copies only files for which the Archive attribute is set, and resets the Archive attribute.
/ia:[RASHCNETO]
Includes only files for which any of the specified attributes are set.
/xa:[RASHCNETO]
Excludes files for which any of the specified attributes are set.
/xf <FileName>[ ...]
Excludes files that match the specified names or paths. Note that FileName can include wildcard characters (* and ?).
/xd <Directory>[ ...]
Excludes directories that match the specified names and paths.
/xct
Excludes changed files.
/xn
Excludes newer files.
/xo
Excludes older files.
/xx
Excludes extra files and directories. Extra files are files that exist in the destination directory.
/xl
Excludes "lonely" files and directories.
/is
Includes the same files.
/it
Includes "tweaked" files.
/max:<N>
Specifies the maximum file size (to exclude files bigger than N bytes).
/min:<N>
Specifies the minimum file size (to exclude files smaller than N bytes).
/maxage:<N>
Specifies the maximum file age (to exclude files older than N days or date).
/minage:<N>
Specifies the minimum file age (exclude files newer than N days or date).
/maxlad:<N>
Specifies the maximum last access date (excludes files unused since N).
/minlad:<N>
Specifies the minimum last access date (excludes files used since N) If N is less than 1900, N specifies the number of days. Otherwise, N specifies a date in the format YYYYMMDD.
/xj
Excludes junction points, which are normally included by default.
/fft
Assumes FAT file times (two-second precision).
/dst
Compensates for one-hour DST time differences.
/xjd
Excludes junction points for directories.
/xjf
Excludes junction points for files.
 
Retry Options
Option
Description
/r:<N>
Specifies the number of retries on failed copies. The default value of N is 1,000,000 (one million retries).
/w:<N>
Specifies the wait time between retries, in seconds. The default value of N is 30 (wait time 30 seconds).
/reg
Saves the values specified in the /r and /w options as default settings in the registry.
/tbd
Specifies that the system will wait for share names to be defined (retry error 67).

Logging Options

Option
Description
/l
Specifies that files are to be listed only (and not copied, deleted, or time stamped).
/x
Reports all extra files, not just those that are selected.
/v
Produces verbose output, and shows all skipped files.
/ts
Includes source file time stamps in the output.
/fp
Includes the full path names of the files in the output.
/bytes
Prints sizes, as bytes.
/ns
Specifies that file sizes are not to be logged.
/nc
Specifies that file classes are not to be logged.
/nfl
Specifies that file names are not to be logged.
/ndl
Specifies that directory names are not to be logged.
/np
Specifies that the progress of the copying operation (the number of files or directories copied so far) will not be displayed.
/eta
Shows the estimated time of arrival (ETA) of the copied files.
/log:<LogFile>
Writes the status output to the log file (overwrites the existing log file).
/log+:<LogFile>
Writes the status output to the log file (appends the output to the existing log file).
/unicode
Displays the status output as Unicode text.
/unilog:<LogFile>
Writes the status output to the log file as Unicode text (overwrites the existing log file).
/unilog+:<LogFile>
Writes the status output to the log file as Unicode text (appends the output to the existing log file).
/tee
Writes the status output to the console window, as well as to the log file.
/njh
Specifies that there is no job header.
/njs
Specifies that there is no job summary.

Job Options

Option
Description
/job:<JobName>
Specifies that parameters are to be derived from the named job file.
/save:<JobName>
Specifies that parameters are to be saved to the named job file.
/quit
Quits after processing command line (to view parameters)./nosd:
/nodd
Indicates that no destination directory is specified.
/if
Includes the specified files.
 
Taken from Microsoft site:- http://social.technet.microsoft.com/wiki/contents/articles/1073.robocopy-and-a-few-examples.aspx
 
 
 

Share this

Labels

WINDOWS SERVER (22) Windows (20) IIS (15) Interview questions (10) TFS (9) Troubleshooting Tips (9) Fortigate Firewall (8) SQL (8) Backup (6) Team Foundation Server (6) Webserver (6) Windows Administration Task (6) Microsoft certification (5) Virtualization (5) ADDS (4) Active Directory (4) FTP (4) PHP (4) SQL 2012 (4) SQL Server (4) server (4) DBA (3) MSSQL (3) Networking (3) Offer (3) Webhosting (3) Windows 8 (3) 74-409 (2) Agile Methodology (2) Apache (2) CLI Commands (2) DNS (2) Dedicated server (2) Difference between Active and Passive Connection Mode (2) Fortinet (2) GPO (2) IIS8 (2) IPAddress (2) IPV6 (2) MVA (2) Microsoft News (2) NAT (2) Software Development (2) TFS2013 (2) Uncategorized Post (2) XAMPP (2) firewall Administration. (2) powershell (2) .htaccess (1) ALM (1) Agile vs Scrum Difference (1) Blogging TIPS (1) CPanel (1) Command for Administrator (1) DC (1) DHCP (1) Domain joining nano server (1) Exam 74-409 (1) Excel TIps (1) File server (1) Fortigate Firewall HA (1) Fortigate Firmware Upgrade (1) Free Exam 70-740 (1) Free Voucher (1) Generation2 VM (1) Group Policy (1) HP (1) HP ILO IP CHange (1) HP OA IP Change (1) HP Proliant Servers (1) HTTP to HTTPS (1) Hyper-V (1) IAS (1) IIS Server hardening (1) ILO (1) Install dll (1) MCSA 2016 (1) Microsoft Virtual Academy (1) Microsoft file sharing Port (1) Migration (1) MySQL (1) NPS (1) Nano server (1) Network Drive (1) OA (1) Plesk Panel (1) Ports (1) Ports for windows file sharing (1) RADIUS (1) RDP (1) Remote Desktop Connection (1) SCRUM (1) SQL ErrorLog (1) SQL TEMPDB (1) Second Shot (1) Server 2012 (1) Startup Parameters (1) TEMPDB Movement (1) TIPS (1) Team Foundation Server 2013 (1) Temp profile. (1) Troubleshooting DNS (1) URL Rewriting (1) VDOM (1) VPS (1) VSS (1) Virtual Labs (1) Visual Studio (1) Visual Studio 2012 (1) Visual Studio 2013 (1) Visual source safe (1) Waterfall Model vs Agile Methodology (1) Windows 2016 (1) Windows 7 (1) Windows Server 2012 (1) Windows command line (1) XP (1) certification path (1) exam (1) free online courses (1) protocols/ports for windows file sharing on a firewall (1) sql error (1) what features has been installed in your SQL Server (1) windows 2012 (1) windows Time Service (1) work item types difference (1)

E-Books

Blogger Gadgets