When performing health checks on a database, I look at how many users are granted SUPER privileges. If you're reading this, you know why. SUPER privileges pose a potential security risk and should be limited to a few users that need this far-reaching access to...
Welcome to our blog, which is more than just a record of our experiences. It’s a resource.
Our blog is an invaluable resource for anyone struggling with the challenges of managing a database, applications, or clouds.
We understand the difficulties involved in troubleshooting, building, improving, securing, and operating these platforms,
and we’re here to share our insights and expertise with you. Browse through our collection of blog posts below,
and don’t hesitate to leave your comments and feedback.
Resolving SQLCODE -551 on View Creation
I recently faced an interesting challenge. I was working to replace (rebuild) a view with updated DDL, but when executing the CREATE OR REPLACE VIEW statement, Db2 returned error code SQL0551N. This error means that the user ID doesn't have authority to perform the...
Percona XtraBackup Example
For this example, the following software versions were in use: Ubuntu v20.04.3MySQL server v5.7.35Percona XtraBackup v2.4.24 It is important to note that Percona XtraBackup 8.0 is not compatible with MySQL version 5.7 and was introduced for use with MySQL version 8.0....
MariaDB Galera Cluster WSREP_SST_METHOD Explained
This blog article will explain what the SST method choices are and what you need to consider when choosing one over another. To start with, the wsrep_sst_method is a configuration parameter used with Galera Clustering. This parameter tells the database server which...
Encrypted Replication for MySQL
Encrypted connections for MySQL replication are the default as of 8.0. The following simple example shows a basic setup for encrypted replication using Ubuntu 20.04 and MySQL Community 8.0.27. The steps may be similar for other Linux distributions. The necessary files...
Validating Db2 Software Download Integrity
With the release of Db2 11.5.7.0, IBM has finally started providing cryptographically signed installation image files. This is important because it provides a means to verify that the installation image has not been tampered with or corrupted during download....
Is it Safe to Drop a Tablespace?
When IBM switched from old-school DMS and SMS tablespaces to Automatic Storage tablespaces, it became significantly easier for DBAs to create and manage tablespaces. This can lead to a proliferation of tablespaces; over time, some of these tablespaces may no longer be...
Deadlocking – A Common But Frustrating Issue
Deadlocking is a common issue in SQL Server that can have a direct negative impact on your users. What is deadlocking and how can it be resolved? All relational database management systems provide some kind of locking by design. There are times you want a table to be...
How to Navigate IBM Passport Advantage to Download Software and Licenses
IBM Passport Advantage is the offering that can be used by customers as a one-stop-shop to view their IBM licensing entitlements, purchase orders and a plethora of other information. Oftentimes, when you need to download the latest binaries for a product that you need...
Finding the Size of Individual Indexes
Recently I had a client ask me if there was a way to calculate the size of individual indexes on a table and how to interpret what is reported by the table function sysproc.admin_get_index_info. The client asked whether the value is reported as a sum per table or per...









