Measuring and Improving SQL Server Query Plan Cache EfficiencyThe query plan cache hit ratio in SQL Server indicates the percentage of queries that are executed using an already generated and available execution plan stored in the SQL Server memory cache. If no suitable plan exists for a query submitted to SQL Server, the query optimizer must create a new plan, which consumes valuable resources and time—a situation known as a “cache miss”. This article though does not cover how SQL Server decides whether a suitable matching plan already exists for reuse. Some level of cache misses are expected, especially right after the…
Author: drweb
Chronosphere today added additional capabilities to its log management platform that enable DevOps teams to both reduce costs and surface more actionable insights.Alok Bhide, head of product innovation for Chronosphere, said Chronosphere Logs 2.0 provides DevOps teams with more granular control over how log data is collected and stored. The overall goal is to make it simpler for DevOps teams to not only leverage analytics to identify which log data is actually being used but also more easily correlate it with metrics, events and traces, he added.Additionally, Chronosphere has added a Logs Quotas tool that enables DevOps teams to enforce…
When managing multiple SQL Server environments—such as development, staging, and production—running the same deployment script manually across each instance is not only repetitive but also risky. Copy-pasting scripts into Management Studio, manually connecting to each server, or trying to remember passwords can introduce unnecessary human error. A better approach is to automate the process using a Python script and a shared SQL file. This allows you to define specific connection details for each environment and safely run the same deployment logic across all targets in a consistent, repeatable manner. Let us learn about Automating SQL Server Deployments Across Multiple Databases…
During a demo of Redgate Monitor Enterprise to a customer, they asked about how to search for permission changes. This post examines how you can do that in Redgate Monitor.This is part of a series of posts on Redgate Monitor. Click to see the other posts.Permission ChangesRedgate Monitor Enterprise adds a few security features to the tool that track things that organizations can struggle to track as their estates grow. There is a security menu item at the top of your Redgate Monitor web page. You can see this expanded on our demo system at monitor.red-gate.com.Click the permission entry and…
As a Senior Developer at Creative2, you will take ownership of creating development deliverables, presenting your innovative ideas to fellow developers and clients alike. Supported by a dynamic team of designers, project managers, and marketers, you will address immediate needs while driving long-term systems thinking to enhance both Creative2 internal products and solutions we develop for our clients. This role demands a strong command of backend, frontend, and system principles, with a wealth of experience applying this knowledge across various platforms. Join us and be part of a team that is actively shaping how innovative organizations do business. BENEFITS 401(k)…
DevOps.com is now providing a weekly DevOps jobs report through which opportunities for DevOps professionals will be highlighted as part of an effort to better serve our audience.Our goal in these challenging economic times is to make it just that much easier for DevOps professionals to advance their careers.Of course, the pool of available DevOps talent is still relatively constrained, so when one DevOps professional takes on a new role, it tends to create opportunities for others.The five job postings shared this week are selected based on the company looking to hire, the vertical industry segment and naturally, the pay…
Tutorials With the release of Junie, the AI coding agent by JetBrains, PhpStorm has entered the realm of agentic IDEs. Now, the PhpStorm IDE doesn’t just provide classical developer productivity tools and AI assistance features, but can also do massive amounts of work for PHP developers autonomously. Unlike other coding agent plugins, Junie is native to PhpStorm, which means it uses PhpStorm’s core features, such as source code navigation, project structure navigation, Search Everywhere, and code inspections to plan and execute multistep tasks and supervise the outcome. You can install Junie like any other PhpStorm plugin and open it in…
Backups are like insurance; you don’t need them every day, but when disaster strikes, such as accidental file deletion, a disk failure, or a ransomware attack, it’s enough to ruin everything if you’re not prepared. That’s where smart backup planning comes in. In this guide, I’ll show you how to schedule incremental backups using rsync and cron. I’ll explain what incremental backups are, how rsync works under the hood, and how to automate the whole process with cron. What Is an Incremental Backup? An incremental backup means you’re only backing up the files that have changed since the last backup.…
SQL Bits 2025 was amazing, as always. It’s been my favorite conference to attend, with lots of friends, a family atmosphere, and some amazing speakers from whom I learn many things.This year I wasn’t picked as a speaker, which is fine. Their committee didn’t like my submissions for some reason, which happens. I’m disappointed, but that’s it. I am fine with any event who chooses me or choose not to have me. However, since Grant and Kellyn were accepted, I planned a trip to Cambridge for the following week. A month or so ago, Redgate asked me to just attend…
Here’s how these tools can make Kubernetes security easier and help you avoid common pitfalls.Image from haalkab on Pixabay.Kubernetes is hands-down the go-to tool for managing containerized applications, yet it comes with one specific challenge: security! With its complexity, ensuring your Kubernetes deployment is secure and aligned with best practices can be overwhelming.But there’s good news. Tools like Kyverno and OPA Gatekeeper are here to help you protect your clusters. These policy enforcement engines make sure your Kubernetes resources are safe and compliant before they even enter your cluster. Sounds like a game-changer, right?Here’s how these tools can simplify your Kubernetes…
