Share this
SQL Server Distributed Availability Group with Forwarder in Microsoft Azure
by Sandeep Arora on Sep 16, 2021 12:00:00 AM
Architecture diagram

To create a distributed availability group, you need two availability groups (AG) each with its own listener, which you then combine.In this case, one availability group is on-premises and the other needs to be created in Microsoft Azure. This example doesn’t cover all of the details like creating an extended network setup between on-premises network and Azure or joining Azure active directory domain services to and on-premises forest; instead, it highlights the key requirements for setting up the availability group in Azure and then configuring the distributed AG between the on-premises availability group (represented as AOAG-1) and the Azure availability group (represented as AOAG-2).
Prerequisites
- You must know how to create security groups in Azure.
- You know how to add windows server nodes to an active directory.
- You know how to set up a Windows cluster.
- You know how to create always-on availability groups (AOAG) and add databases to availability groups.
- You also need to be aware of SQL server licensing requirements for setting up a distributed AG.
Assumptions
- You already have an always on availability group with listener configured successfully on your primary site (on-premises).
- You already have an active Azure subscription.
- You already have a resource group created and ready to create resources.
- You already have an Azure virtual network and subnets configured where you intend to create the Azure SQL always on availability groups infrastructure.
- You already have connectivity between your on-premises and Azure virtual network.
- You already have a jump box or a bastion host configured to RDP into the Azure virtual machines that we will be creating as a part of this setup.
- You have integrated your on-premises active directory with Azure. There are multiple ways to do so, but the architecture reference must show only integration with ADDS.
- You might be asking, “Why can’t I just connect back to on-premises AD when I have connectivity between two sites?” You are right! But think about what happens when your on-premises site goes down: Your users and your nodes cannot authenticate back to the active directory.
- Since we are creating a DR site on Azure, it is also necessary that you configure an active directory in Azure and have integration with the on-premises active directory.
- The Azure region where you are deploying Azure virtual machines has availability zones.
Creating an app registration for terraform
In order to create Azure resources using terraform, you will need to create an app registration.
- Navigate to Azure Active Directory.
- Under Manage open the App registrations blade.
- Add a new registration by clicking on New registration.

- Register the application with the name terraform. Leave all options as default.

- Add a secret that will be used as a password to authenticate terraform. Provide a description and expiry period for the secret.

- Copy the Secret ID and value and keep it safe. We will use it later for provisioning of resources with terraform.

- Make a note of the client ID and tenant ID as well. You should find them under the Overview blade.

8. Now we need to grant this application access to subscription so it can create Azure resources. Navigate to your Azure subscription and then open Access control (IAM) blade. Go to + Add > Add role assignment and grant contributor access to the terraform app, then Save.

Already provisioned Azure resources
I had the resource group, network and network security group already created and provisioned in my Azure environment. If you want to replicate my setup for your test, you can run the below commands in Bash in Azure Cloud Shell:
resourceGroupName=’sqlserver-dag’
location='eastus' # Variables for a new Virtual Network with two subnets vnetName='network-1' frontEnd='mgmt-subnet' backEnd='dbsubnet' # Create a resource group az group create -n $resourceGroupName -l $location # Create a virtual network with a front-end subnet az network vnet create \ -n $vnetName \ -g $resourceGroupName \ --address-prefix 10.1.0.0/24 \ --subnet-name $frontEnd \ --subnet-prefix 10.1.0.32/27 # Create the db subnet with service endpoints enabled for Storage az network vnet subnet create \ -n $backEnd \ -g $resourceGroupName \ --address-prefix 10.1.0.0/27 \ --vnet-name $vnetName \ --service-endpoints Microsoft.Storage #Create NSG for be associated with Network interfaces of virtual machines az network nsg create -g $resourceGroupName -n sql-ha-nsg -l $location
You need to make sure that private-endpoint-network-policies are off for the subnet where you are deploying the SQL virtual machines. Use the below code to turn it off:
az network vnet subnet update --name <<Your DB Subnet Name>> --resource-group <<Your Resource Group Name>> --vnet-name <<Your VNET Name>> --disable-private-endpoint-network-policies true
I had to run the below command for my subnet:
az network vnet subnet update --name dbsubnet --resource-group sqlserver-dag --vnet-name network-1 --disable-private-endpoint-network-policies true
Implementing SQL server HA azure infrastructure with terraform
1. Clone the git repository with terraform locally to your desktop:
git clone https://github.com/sa-proj/proj-azure.git
2. Navigate to the local repository:
cd proj-azure
3. Update the terraform.tfvars with values as per your environment. Please see the next section for more details on how to update the values in the file. The file also has comments to help you understand their purpose.
4. Initialize the Azure provider:
terraform init
5. Create and verify the execution plan:
terraform plan
6. Execute the actions proposed in the plan and create Azure resources:
terraform apply --auto-approve
If you open your resource group in Azure Portal, you will see resources being created.
7. Once you are done, you can destroy all resources as well:
terraform destroy
Bonus: Check out this great article published by one of my friends at Spacelift, in case you want to get more insights on How to Destroy Resources from Terraform.
Explanation of terraform files
This is the most important file as all values for variables are to be supplied here.
- You will need to add subscription_id, client_id, client_secret and tenant_id so terraform can authenticate to Azure and create all resources.
- The location\region specified must have availability zones; otherwise, you will need to modify the script to work with availability sets.
- Make sure to complete your capacity planning before entering the VM size. I have kept to the smallest possible size so it doesn’t cost much during the testing phase.
- The usernames and passwords for VM are lying in plain text, which is not the best practice. Ideally I should have used the key vault in data.tf and should have retrieved those values from there. However, since this is a test setup, I wanted to keep things simple.
- For disk size, again make sure you complete your capacity planning. I am using one disk for data, log and tempdb, which is not a recommended practice. You will need to modify the terraform to use separate disks for SQL data files.
- The DNS IP address is the one that gets added to the network interface on the operating system, so make sure it is reachable and all ports are open for the machine to connect to DNS and register to active directory.
- sqlInternalLB-ip will be the IP address used for the always-on listener for availability group in Azure.
terraform.tfvars
subscription_id = “xxxxxx-xxxxxx-xxxxxxx-xx” #Azure subscription id
client_id = "xxxxxx-xxxxxx-xxxxxxx-xx" #Client id generated at time for app registration. Overview Blade. client_secret = "xxxxxx-xxxxxx-xxxxxxx-xx" #Secret value generated at time of secret registration for app tenant_id = "xxxxxx-xxxxxx-xxxxxxx-xx" #Azure tenant id sql-1-vm-name = "sqlserver-1" #Name of SQL-1 Host - Will be same for VM Hostname sql-2-vm-name = "sqlserver-2" #Name of SQL-2 Host - Will be same for VM Hostname subnet_name = "dbsubnet" #Subnet Name where we want to deploy the cluster - Needs to already present. vnet_name = "network-1" #VNET Name where we want to deploy the cluster - Needs to already present. sqlserver-1-ip = "10.1.0.10" #IP Address from the subnet for SQL-1 Host sqlserver-2-ip = "10.1.0.11" #IP Address from the subnet for SQL-1 Host resource_group = "sqlserver-dag" #Resource Group where the resources will be deployed - Needs to already present. location = "East US" #Location where we want to deploy the cluster. The Location needs to support Availability Zones vm_size = "Standard_DS1_v2" #Size of the VM after checking OnPrem Sizing details username = "localadmin" #Windows Machine Local User - Can't use admin or administrator password = "P@$$w0rd4321!" #Windows Machine Local User password - must be strong password sqladmin_user = "sqladmin" #SQL Auth User Name to be set as sysadmin - Can't use sa sqladmin_pass = "P@$$w0rd4321!" #SQL Auth User Name Password osdisksize = 127 #Size of OS Disk after checking OnPrem Sizing details datadisksize = 127 #Size of Data Disk for .mdf files after checking OnPrem Sizing details disk_type = "Premium_LRS" #The type of storage to use for the managed disk. Premium is recommended load-balancer-name = "sqlInternalLB" #Name of the Internal Load Balancer sqlInternalLB-ip = "10.1.0.20" #IP of the Load Balancer - Same as Always On Listener IP nsg_name = "sql-ha-nsg" #Network Security Group name for firewall that is attached to VM Nic dns_ipaddress = "10.1.0.6" #Primary DNS IP Address
dns_ipaddress = “10.1.0.6” #Primary DNS IP Address
This file has a virtual machine configuration (same for Node 2).
- I am using SQL 2019 Enterprise edition on Windows Server 2019. You can modify this under publisher, offer and SKU section.
- Only one disk is used here, but you can modify the template for individual disks for data, log and tempdb.
- The last section of the template downloads a PowerShell script that updates the network interface on OS and also installs a failover clustering feature on the node.
- It also disables and enables SQL services that come bundled in the image.
sqlserver-1.tf
resource "azurerm_network_interface" "sqlserver-nic-1" { name = "${var.sql-1-vm-name}-nic" resource_group_name = var.resource_group location = var.location ip_configuration { name = "${var.sql-1-vm-name}-ipc1" private_ip_address_allocation = "static" subnet_id = "${data.azurerm_subnet.dbsubnet.id}" private_ip_address = var.sqlserver-1-ip } } resource "azurerm_windows_virtual_machine" "sql-1-vm" { name = var.sql-1-vm-name resource_group_name = var.resource_group location = var.location zone = 1 size = var.vm_size admin_username = var.username admin_password = var.password network_interface_ids = [azurerm_network_interface.sqlserver-nic-1.id] computer_name = var.sql-1-vm-name os_disk { name = "${var.sql-1-vm-name}-osdisk" caching = "ReadWrite" storage_account_type = "StandardSSD_LRS" disk_size_gb = var.osdisksize } source_image_reference { publisher = "MicrosoftSQLServer" offer = "sql2019-ws2019" sku = "enterprise" version = "latest" } } resource "azurerm_managed_disk" "sql-1-vm-datadisk" { name = "${var.sql-1-vm-name}-datadisk" location = var.location zones = [1] resource_group_name = var.resource_group storage_account_type = var.disk_type create_option = "Empty" disk_size_gb = var.datadisksize } resource "azurerm_virtual_machine_data_disk_attachment" "sql-1-vm-datadisk" { managed_disk_id = azurerm_managed_disk.sql-1-vm-datadisk.id virtual_machine_id = azurerm_windows_virtual_machine.sql-1-vm.id lun = "10" caching = "ReadWrite" } resource "azurerm_mssql_virtual_machine" "sqlvm-1" { virtual_machine_id = azurerm_windows_virtual_machine.sql-1-vm.id sql_license_type = "PAYG" r_services_enabled = false sql_connectivity_port = 1433 sql_connectivity_type = "PRIVATE" sql_connectivity_update_username = var.sqladmin_user sql_connectivity_update_password = var.sqladmin_pass storage_configuration { disk_type = "NEW" storage_workload_type = "OLTP" data_settings { default_file_path = "X:\\DATA" luns = [azurerm_virtual_machine_data_disk_attachment.sql-1-vm-datadisk.lun] } log_settings { default_file_path = "X:\\LOG" luns = [azurerm_virtual_machine_data_disk_attachment.sql-1-vm-datadisk.lun] } temp_db_settings { default_file_path = "X:\\TEMPDB" luns = [azurerm_virtual_machine_data_disk_attachment.sql-1-vm-datadisk.lun] } } } resource "azurerm_virtual_machine_extension" "sql-1-prep" { depends_on=[azurerm_windows_virtual_machine.sql-1-vm] name = "${var.sql-1-vm-name}-vm-extension-prep" virtual_machine_id = azurerm_windows_virtual_machine.sql-1-vm.id publisher = "Microsoft.Compute" type = "CustomScriptExtension" type_handler_version = "1.9" protected_settings = <<PROTECTED_SETTINGS { "commandToExecute": "powershell.exe -Command \"./prepare-clusternode.ps1 -dnsIP ${var.dns_ipaddress}; exit 0;\"" } PROTECTED_SETTINGS settings = <<SETTINGS { "fileUris": [ "https://raw.githubusercontent.com/pythianarora/total-practice/master/sample-sql-ha/prepare-clusternode.ps1" ] } SETTINGS }
The below configuration is going to create an internal load balancer.
- The load balancer is going to be used for always-on listener and I have used a standard SKU because it offers 99.99 per cent availability SLA. The basic one has no SLA.
- Another thing to mention is that load balancer waits before the virtual machines are created because the VMs will lose internet access once they are added to ILB. The VMs need to download a PowerShell, which requires internet access.
- You will see that a backend rule for port 5022 is added. This is a requirement for distributed AG listeners. While setting up a distributed AG, the LISTENER_URL specifies the listener for each availability group along with the database mirroring endpoint of the availability group that is port 5022. If you remove this block of the code, you can use the rest of the terraform template to provision infrastructure for always on in Azure.
- The health probe is what the load balancer will use to know which node is the active node.
loadbalancer.tf
#Create the SQL Load Balancer for AG resource "azurerm_lb" "sqlinternalLB" { name = var.load-balancer-name location = var.location resource_group_name = var.resource_group sku = "Standard" depends_on = [azurerm_virtual_machine_extension.sql-1-prep, azurerm_virtual_machine_extension.sql-2-prep] frontend_ip_configuration { name = "${var.load-balancer-name}-fipc" private_ip_address_allocation = "Static" private_ip_address = var.sqlInternalLB-ip subnet_id = "${data.azurerm_subnet.dbsubnet.id}" } } #Create the load balencer backend pool resource "azurerm_lb_backend_address_pool" "sqlLBBE" { loadbalancer_id = azurerm_lb.sqlinternalLB.id name = "${var.load-balancer-name}-backendpool" } #Add the first VM to the load balencer resource "azurerm_network_interface_backend_address_pool_association" "sqlvm1BEAssoc" { network_interface_id = azurerm_network_interface.sqlserver-nic-1.id ip_configuration_name = "${var.sql-1-vm-name}-ipc1" backend_address_pool_id = azurerm_lb_backend_address_pool.sqlLBBE.id } #Add the second VM to the load balencer resource "azurerm_network_interface_backend_address_pool_association" "sqlvm2BEAssoc" { network_interface_id = azurerm_network_interface.sqlserver-nic-2.id ip_configuration_name = "${var.sql-2-vm-name}-ipc1" backend_address_pool_id = azurerm_lb_backend_address_pool.sqlLBBE.id } #Create the load balencer rules #rule to connect to listener on default port resource "azurerm_lb_rule" "sqlLBRule" { resource_group_name = var.resource_group loadbalancer_id = "${azurerm_lb.sqlinternalLB.id}" name = "${var.load-balancer-name}-default-port-lbr" protocol = "Tcp" frontend_port = 1433 backend_port = 1433 frontend_ip_configuration_name = "${var.load-balancer-name}-fipc" probe_id = "${azurerm_lb_probe.sqlLBProbe.id}" backend_address_pool_id = azurerm_lb_backend_address_pool.sqlLBBE.id enable_floating_ip = true } #rule to connect to listener on port 5022 required for distributed ag #if this non distributed AG setup then you can remove this rule resource "azurerm_lb_rule" "sqlLBHAEndpointRule" { resource_group_name = var.resource_group loadbalancer_id = "${azurerm_lb.sqlinternalLB.id}" name = "${var.load-balancer-name}-hadr-endpoint-lbr" protocol = "Tcp" frontend_port = 5022 backend_port = 5022 frontend_ip_configuration_name = "${var.load-balancer-name}-fipc" probe_id = "${azurerm_lb_probe.sqlLBProbe.id}" backend_address_pool_id = azurerm_lb_backend_address_pool.sqlLBBE.id enable_floating_ip = true } #Create a health probe for the load balencer resource "azurerm_lb_probe" "sqlLBProbe" { resource_group_name = var.resource_group loadbalancer_id = "${azurerm_lb.sqlinternalLB.id}" name = "${var.load-balancer-name}-SQLAOProbe" port = 59999 protocol = "Tcp" interval_in_seconds = 5 number_of_probes = 2 }
Creating always-on availability groups on Azure VMs
- Update\create a network security group to allow necessary permissions to RDP to VM from jump server in Management subnet.
- Update the network security group to allow necessary permissions from the on-premises subnet where SQL Server is hosted.
- Ideally these will be port 1433 (Default Port for SQL Server) and 5022 (Default HADR Endpoint).
- Log in to the virtual machines using the admin password specified in the terraform.tfvars file.
- Add the virtual machines to the active directory and restart the servers.
- Setup a Windows cluster on the new nodes provisioned in Azure.
- Add Cloud Witness as a quorum for the cluster. The terraform output will provide the storage account name; you will need an access key for the storage account to configure Cloud Witness.
- Create an always-on availability group on the new cluster on Azure.
- Make sure you add an A record for the listener in your DNS. The IP address of the listener and internal load balancer will be the same.
Identifying all resources
Before creating a distributed AG list, record the availability groups and their listeners because they are required for the next steps:
Resource Type | On-premises | Microsoft Azure |
Availability Group Name | aoag1 | aoag2 |
Availability Group Listener Name | laoag1 | laoag2 |
Domain Name | sainfra.com | sainfra.com |
Creating a distributed AG on an on-premises cluster
To create your distributed availability group using automatic seeding, use the following T-SQL
CREATE AVAILABILITY GROUP [dag]
WITH (DISTRIBUTED) AVAILABILITY GROUP ON 'aoag1' WITH ( LISTENER_URL = 'tcp://laoag1.sainfra.com:5022', AVAILABILITY_MODE = ASYNCHRONOUS_COMMIT, FAILOVER_MODE = MANUAL, SEEDING_MODE = AUTOMATIC ), 'aoag2' WITH ( LISTENER_URL = 'tcp://laoag2.sainfra.com:5022', AVAILABILITY_MODE = ASYNCHRONOUS_COMMIT, FAILOVER_MODE = MANUAL, SEEDING_MODE = AUTOMATIC ); GO
It is important that you have your firewall rules configured properly and your load balancer to have the port 5022 enabled in the backend rules. See Microsoft’s documentation for more details.
Join the distributed AG to the cluster in Azure
To join your distributed availability group using automatic seeding, use the following T-SQL:
ALTER AVAILABILITY GROUP [dag]
JOIN AVAILABILITY GROUP ON 'aoag1' WITH ( LISTENER_URL = 'tcp://laoag1.sainfra.com:5022', AVAILABILITY_MODE = ASYNCHRONOUS_COMMIT, FAILOVER_MODE = MANUAL, SEEDING_MODE = AUTOMATIC ), 'aoag2' WITH ( LISTENER_URL = 'tcp://laoag2.sainfra.com:5022', AVAILABILITY_MODE = ASYNCHRONOUS_COMMIT, FAILOVER_MODE = MANUAL, SEEDING_MODE = AUTOMATIC ); GO
Congratulations! You have successfully provisioned distributed availability groups with your forwarder in Microsoft Azure.
Share this
- Technical Track (967)
- Oracle (410)
- MySQL (140)
- Cloud (128)
- Microsoft SQL Server (117)
- Open Source (90)
- Google Cloud (81)
- Microsoft Azure (63)
- Amazon Web Services (AWS) (58)
- Big Data (52)
- Google Cloud Platform (46)
- Cassandra (44)
- DevOps (41)
- Pythian (33)
- Linux (30)
- Database (26)
- Performance (25)
- Podcasts (25)
- Site Reliability Engineering (25)
- PostgreSQL (24)
- Oracle E-Business Suite (23)
- Oracle Database (22)
- Docker (21)
- DBA (20)
- Security (20)
- Exadata (18)
- MongoDB (18)
- Oracle Cloud Infrastructure (OCI) (18)
- Oracle Exadata (18)
- Automation (17)
- Hadoop (16)
- Oracleebs (16)
- Amazon RDS (15)
- Ansible (15)
- Snowflake (15)
- ASM (13)
- Artificial Intelligence (AI) (13)
- BigQuery (13)
- Replication (13)
- Advanced Analytics (12)
- Data (12)
- GenAI (12)
- Kubernetes (12)
- LLM (12)
- Authentication, SSO and MFA (11)
- Cloud Migration (11)
- Machine Learning (11)
- Rman (11)
- Datascape Podcast (10)
- Monitoring (10)
- Apache Cassandra (9)
- ChatGPT (9)
- Data Guard (9)
- Infrastructure (9)
- Oracle Applications (9)
- Python (9)
- Series (9)
- AWR (8)
- High Availability (8)
- Oracle EBS (8)
- Oracle Enterprise Manager (OEM) (8)
- Percona (8)
- Apache Beam (7)
- Data Governance (7)
- Innodb (7)
- Microsoft Azure SQL Database (7)
- Migration (7)
- Myrocks (7)
- Performance Tuning (7)
- Data Enablement (6)
- Data Visualization (6)
- Database Performance (6)
- Oracle Enterprise Manager (6)
- Orchestrator (6)
- RocksDB (6)
- Serverless (6)
- Azure Data Factory (5)
- Azure Synapse Analytics (5)
- Covid-19 (5)
- Disaster Recovery (5)
- Generative AI (5)
- Google BigQuery (5)
- Mariadb (5)
- Microsoft (5)
- Scala (5)
- Windows (5)
- Xtrabackup (5)
- Airflow (4)
- Analytics (4)
- Apex (4)
- Cloud Security (4)
- Cloud Spanner (4)
- CockroachDB (4)
- Data Management (4)
- Data Pipeline (4)
- Data Security (4)
- Data Strategy (4)
- Database Administrator (4)
- Database Management (4)
- Database Migration (4)
- Dataflow (4)
- Fusion Middleware (4)
- Google (4)
- Oracle Autonomous Database (Adb) (4)
- Oracle Cloud (4)
- Prometheus (4)
- Redhat (4)
- Slob (4)
- Ssl (4)
- Terraform (4)
- Amazon Relational Database Service (Rds) (3)
- Apache Kafka (3)
- Apexexport (3)
- Aurora (3)
- Business Intelligence (3)
- Cloud Armor (3)
- Cloud Database (3)
- Cloud FinOps (3)
- Cosmos Db (3)
- Data Analytics (3)
- Data Integration (3)
- Database Monitoring (3)
- Database Troubleshooting (3)
- Database Upgrade (3)
- Databases (3)
- Dataops (3)
- Digital Transformation (3)
- ERP (3)
- Google Chrome (3)
- Google Cloud Sql (3)
- Google Workspace (3)
- Graphite (3)
- Heterogeneous Database Migration (3)
- Liquibase (3)
- Oracle Data Guard (3)
- Oracle Live Sql (3)
- Oracle Rac (3)
- Perl (3)
- Rdbms (3)
- Remote Teams (3)
- S3 (3)
- SAP (3)
- Tensorflow (3)
- Adf (2)
- Adop (2)
- Amazon Data Migration Service (2)
- Amazon Ec2 (2)
- Amazon S3 (2)
- Apache Flink (2)
- Ashdump (2)
- Atp (2)
- Autonomous (2)
- Awr Data Mining (2)
- Cloud Cost Optimization (2)
- Cloud Data Fusion (2)
- Cloud Hosting (2)
- Cloud Infrastructure (2)
- Cloud Shell (2)
- Cloud Sql (2)
- Conferences (2)
- Cosmosdb (2)
- Cost Management (2)
- Cyber Security (2)
- Data Analysis (2)
- Data Discovery (2)
- Data Engineering (2)
- Data Migration (2)
- Data Modeling (2)
- Data Quality (2)
- Data Streaming (2)
- Data Warehouse (2)
- Database Consulting (2)
- Database Migrations (2)
- Dataguard (2)
- Docker-Composer (2)
- Enterprise Data Platform (EDP) (2)
- Etl (2)
- Events (2)
- Gemini (2)
- Health Check (2)
- Infrastructure As Code (2)
- Innodb Cluster (2)
- Innodb File Structure (2)
- Innodb Group Replication (2)
- NLP (2)
- Neo4J (2)
- Nosql (2)
- Open Source Database (2)
- Oracle Datase (2)
- Oracle Extended Manager (Oem) (2)
- Oracle Flashback (2)
- Oracle Forms (2)
- Oracle Installation (2)
- Oracle Io Testing (2)
- Podcast (2)
- Power Bi (2)
- Redshift (2)
- Remote DBA (2)
- Remote Sre (2)
- SAP HANA Cloud (2)
- Single Sign-On (2)
- Webinars (2)
- X5 (2)
- Actifio (1)
- Adf Custom Email (1)
- Adrci (1)
- Advanced Data Services (1)
- Afd (1)
- Ahf (1)
- Alloydb (1)
- Amazon (1)
- Amazon Athena (1)
- Amazon Aurora Backtrack (1)
- Amazon Efs (1)
- Amazon Redshift (1)
- Amazon Sagemaker (1)
- Amazon Vpc Flow Logs (1)
- Analysis (1)
- Analytical Models (1)
- Anisble (1)
- Anthos (1)
- Apache (1)
- Apache Nifi (1)
- Apache Spark (1)
- Application Migration (1)
- Ash (1)
- Asmlib (1)
- Atlas CLI (1)
- Awr Mining (1)
- Aws Lake Formation (1)
- Azure Data Lake (1)
- Azure Data Lake Analytics (1)
- Azure Data Lake Store (1)
- Azure Data Migration Service (1)
- Azure OpenAI (1)
- Azure Sql Data Warehouse (1)
- Batches In Cassandra (1)
- Business Insights (1)
- Chown (1)
- Chrome Security (1)
- Cloud Browser (1)
- Cloud Build (1)
- Cloud Consulting (1)
- Cloud Data Warehouse (1)
- Cloud Database Management (1)
- Cloud Dataproc (1)
- Cloud Foundry (1)
- Cloud Manager (1)
- Cloud Networking (1)
- Cloud SQL Replica (1)
- Cloud Scheduler (1)
- Cloud Services (1)
- Cloud Strategies (1)
- Compliance (1)
- Conversational AI (1)
- DAX (1)
- Data Analytics Platform (1)
- Data Box (1)
- Data Classification (1)
- Data Cleansing (1)
- Data Encryption (1)
- Data Estate (1)
- Data Flow Management (1)
- Data Insights (1)
- Data Integrity (1)
- Data Lake (1)
- Data Leader (1)
- Data Lifecycle Management (1)
- Data Lineage (1)
- Data Masking (1)
- Data Mesh (1)
- Data Migration Assistant (1)
- Data Migration Service (1)
- Data Mining (1)
- Data Monetization (1)
- Data Policy (1)
- Data Profiling (1)
- Data Protection (1)
- Data Retention (1)
- Data Safe (1)
- Data Sheets (1)
- Data Summit (1)
- Data Vault (1)
- Data Warehouse Modernization (1)
- Database Auditing (1)
- Database Consultant (1)
- Database Link (1)
- Database Modernization (1)
- Database Provisioning (1)
- Database Provisioning Failed (1)
- Database Replication (1)
- Database Scaling (1)
- Database Schemas (1)
- Database Security (1)
- Databricks (1)
- Datascape 59 (1)
- DeepSeek (1)
- Duet AI (1)
- Edp (1)
- Gcp Compute (1)
- Gcp-Spanner (1)
- Global Analytics (1)
- Google Analytics (1)
- Google Cloud Architecture Framework (1)
- Google Cloud Data Services (1)
- Google Cloud Partner (1)
- Google Cloud Spanner (1)
- Google Cloud VMware Engine (1)
- Google Compute Engine (1)
- Google Dataflow (1)
- Google Datalab (1)
- Google Grab And Go (1)
- Graph Algorithms (1)
- Graph Databases (1)
- Graph Inferences (1)
- Graph Theory (1)
- GraphQL (1)
- Healthcheck (1)
- Information (1)
- Infrastructure As A Code (1)
- Innobackupex (1)
- Innodb Concurrency (1)
- Innodb Flush Method (1)
- It Industry (1)
- Kubeflow (1)
- LMSYS Chatbot Arena (1)
- Linux Host Monitoring (1)
- Linux Storage Appliance (1)
- Looker (1)
- MMLU (1)
- Managed Services (1)
- Migrate (1)
- Migrating Ssis Catalog (1)
- Migration Checklist (1)
- MongoDB Atlas (1)
- MongoDB Compass (1)
- Newsroom (1)
- Nifi (1)
- OPEX (1)
- ORAPKI (1)
- Odbcs (1)
- Odbs (1)
- On-Premises (1)
- Ora-01852 (1)
- Ora-7445 (1)
- Oracle Cursor (1)
- Oracle Database Appliance (1)
- Oracle Database Se2 (1)
- Oracle Database Standard Edition 2 (1)
- Oracle Database Upgrade (1)
- Oracle Database@Google Cloud (1)
- Oracle Exadata Smart Scan (1)
- Oracle Licensing (1)
- Oracle Linux Virtualization Manager (1)
- Oracle Oda (1)
- Oracle Openworld (1)
- Oracle Parallelism (1)
- Oracle RMAN (1)
- Oracle Rdbms (1)
- Oracle Real Application Clusters (1)
- Oracle Reports (1)
- Oracle Security (1)
- Oracle Wallet (1)
- Perfomrance (1)
- Performance Schema (1)
- Policy (1)
- Prompt Engineering (1)
- Public Cloud (1)
- Pythian News (1)
- Rdb (1)
- Replication Compatibility (1)
- Replication Error (1)
- Retail (1)
- Scaling Ir (1)
- Securing Sql Server (1)
- Security Compliance (1)
- Serverless Computing (1)
- Sso (1)
- Tenserflow (1)
- Teradata (1)
- Vertex AI (1)
- Vertica (1)
- Videos (1)
- Workspace Security (1)
- Xbstream (1)
- May 2025 (1)
- March 2025 (2)
- February 2025 (1)
- January 2025 (2)
- December 2024 (1)
- October 2024 (2)
- September 2024 (7)
- August 2024 (4)
- July 2024 (2)
- June 2024 (6)
- May 2024 (3)
- April 2024 (2)
- February 2024 (1)
- January 2024 (11)
- December 2023 (10)
- November 2023 (11)
- October 2023 (10)
- September 2023 (8)
- August 2023 (6)
- July 2023 (2)
- June 2023 (13)
- May 2023 (4)
- April 2023 (6)
- March 2023 (10)
- February 2023 (6)
- January 2023 (5)
- December 2022 (10)
- November 2022 (10)
- October 2022 (10)
- September 2022 (13)
- August 2022 (16)
- July 2022 (12)
- June 2022 (13)
- May 2022 (11)
- April 2022 (4)
- March 2022 (5)
- February 2022 (4)
- January 2022 (14)
- December 2021 (16)
- November 2021 (11)
- October 2021 (6)
- September 2021 (11)
- August 2021 (6)
- July 2021 (9)
- June 2021 (4)
- May 2021 (8)
- April 2021 (16)
- March 2021 (16)
- February 2021 (6)
- January 2021 (12)
- December 2020 (12)
- November 2020 (17)
- October 2020 (11)
- September 2020 (10)
- August 2020 (11)
- July 2020 (13)
- June 2020 (6)
- May 2020 (9)
- April 2020 (18)
- March 2020 (21)
- February 2020 (13)
- January 2020 (15)
- December 2019 (10)
- November 2019 (11)
- October 2019 (12)
- September 2019 (16)
- August 2019 (15)
- July 2019 (10)
- June 2019 (16)
- May 2019 (20)
- April 2019 (21)
- March 2019 (14)
- February 2019 (18)
- January 2019 (18)
- December 2018 (5)
- November 2018 (16)
- October 2018 (12)
- September 2018 (20)
- August 2018 (27)
- July 2018 (31)
- June 2018 (34)
- May 2018 (28)
- April 2018 (27)
- March 2018 (17)
- February 2018 (8)
- January 2018 (20)
- December 2017 (14)
- November 2017 (4)
- October 2017 (1)
- September 2017 (3)
- August 2017 (5)
- July 2017 (4)
- June 2017 (2)
- May 2017 (7)
- April 2017 (7)
- March 2017 (8)
- February 2017 (8)
- January 2017 (5)
- December 2016 (3)
- November 2016 (4)
- October 2016 (8)
- September 2016 (9)
- August 2016 (10)
- July 2016 (9)
- June 2016 (8)
- May 2016 (13)
- April 2016 (16)
- March 2016 (13)
- February 2016 (11)
- January 2016 (6)
- December 2015 (11)
- November 2015 (11)
- October 2015 (5)
- September 2015 (16)
- August 2015 (4)
- July 2015 (1)
- June 2015 (3)
- May 2015 (6)
- April 2015 (5)
- March 2015 (5)
- February 2015 (4)
- January 2015 (3)
- December 2014 (7)
- October 2014 (4)
- September 2014 (6)
- August 2014 (6)
- July 2014 (16)
- June 2014 (7)
- May 2014 (6)
- April 2014 (5)
- March 2014 (4)
- February 2014 (10)
- January 2014 (6)
- December 2013 (8)
- November 2013 (12)
- October 2013 (9)
- September 2013 (6)
- August 2013 (7)
- July 2013 (9)
- June 2013 (7)
- May 2013 (7)
- April 2013 (4)
- March 2013 (7)
- February 2013 (4)
- January 2013 (4)
- December 2012 (6)
- November 2012 (8)
- October 2012 (9)
- September 2012 (3)
- August 2012 (5)
- July 2012 (5)
- June 2012 (7)
- May 2012 (11)
- April 2012 (1)
- March 2012 (8)
- February 2012 (1)
- January 2012 (6)
- December 2011 (8)
- November 2011 (5)
- October 2011 (9)
- September 2011 (6)
- August 2011 (4)
- July 2011 (1)
- June 2011 (1)
- May 2011 (5)
- April 2011 (2)
- February 2011 (2)
- January 2011 (2)
- December 2010 (1)
- November 2010 (7)
- October 2010 (3)
- September 2010 (8)
- August 2010 (2)
- July 2010 (4)
- June 2010 (7)
- May 2010 (2)
- April 2010 (1)
- March 2010 (3)
- February 2010 (3)
- January 2010 (2)
- November 2009 (6)
- October 2009 (6)
- August 2009 (3)
- July 2009 (3)
- June 2009 (3)
- May 2009 (2)
- April 2009 (8)
- March 2009 (6)
- February 2009 (4)
- January 2009 (3)
- November 2008 (3)
- October 2008 (7)
- September 2008 (6)
- August 2008 (9)
- July 2008 (9)
- June 2008 (9)
- May 2008 (9)
- April 2008 (8)
- March 2008 (4)
- February 2008 (3)
- January 2008 (3)
- December 2007 (2)
- November 2007 (7)
- October 2007 (1)
- August 2007 (4)
- July 2007 (3)
- June 2007 (8)
- May 2007 (4)
- April 2007 (2)
- March 2007 (2)
- February 2007 (5)
- January 2007 (8)
- December 2006 (1)
- November 2006 (3)
- October 2006 (4)
- September 2006 (3)
- July 2006 (1)
- May 2006 (2)
- April 2006 (1)
- July 2005 (1)
No Comments Yet
Let us know what you think