Forum Replies Created

Viewing 15 posts - 46 through 60 (of 9,658 total)

  • Reply To: Principal owns a service?

    EXCELLENT. That gave me exactly what I needed. Vended solution services somehow set up inside of SQL Server.

    Now I just need to figure out how to fix the problem, which...

  • Reply To: Are the posted questions getting worse?

    Big shop or small shop?

    I was just reflecting this morning that the employer I currently work for has both. One small unit that has its own collection of  DBAs, about...

  • Reply To: Principal owns a service?

    That did not come up in Google. I just looked at it, and the principal ID for all lines is dbo, not the SQL login in question.

    Is "name" in that...

  • Reply To: Doing NSLookup on SQL Query Results

    And now the non-obsolete version that appears to work as well (possibly better?).

    $IPAddys = Import-Csv C:\TEMP\FailedSQLLoginSearch_AllSvrs.csv | Select-Object -Property ServerName, LoginName, HostName -Unique 
    $results=@()
    Foreach ($ips in $IPAddys)
    {
    ...
  • Reply To: Doing NSLookup on SQL Query Results

    WHOO HOO! Figured it out. Needed to throw a hash table in there...

    Thank you, Frederico. Without your code I never would have reached this. Now I'm just fiddling with user-friendly...

  • Reply To: Doing NSLookup on SQL Query Results

    Frederico, the expressions line you gave me isn't working for me. The information writing to the screen is " is unreachable." as if $n.NAME is null or empty and the...

  • Reply To: Doing NSLookup on SQL Query Results

    At the moment, configuring extended events is not something I can do. We need to jump through hoops to make changes to production servers and this is a high priority...

  • Reply To: Doing NSLookup on SQL Query Results

    Yes, I was messing around and forgot to change xlxs to csv.

    Oddly, I'm not getting a file created with your posted suggestion. I'm going to noodle around a little more...

  • Reply To: Are the posted questions getting worse?

    Sigh. I wish I could take comfort in "Your emergency is not my emergency." Sadly, my job makes other people's emergencies my emergency.

    Any powershell gurus around? I'm still in my...

  • Reply To: Execute AS and Impersonate

    YAY! WITH EXECUTE AS OWNER solved my issue. No extra permissions required, no impersonation permission granted to the user group. Thank you all so much! I appreciate you.

  • Reply To: Execute AS and Impersonate

    AOR = Area of Responsibility. Think of it like departments or smaller chunks of a business division. I am separating out their jobs from the jobs owned by the DBAs...

  • Reply To: Execute AS and Impersonate

    OKAY. Now the WITH EXECUTE AS <user> / OWNER is the syntax I could not for the life of me find. I might try that.

    The security is being implemented across...

  • Reply To: Execute AS and Impersonate

    Ken McKelvey wrote:

    Another approach would be to sign the stored procedure and create a certificate user in MSDB with appropriate permissions. It can get a bit involved but the following may...

  • Reply To: Execute AS and Impersonate

    Mr. Brian Gale wrote:

    One approach I can think of to this is to have the end users insert their job request into a table. Then you have a SQL job that runs...

  • Reply To: Execute AS and Impersonate

    ScottPletcher wrote:

    I would think you would want to use "EXEC AS" on the proc itself rather than inside the proc.

    Sadly, without giving IMPERSONATE to the users, I cannot let them...

Viewing 15 posts - 46 through 60 (of 9,658 total)