MSSQL Create Unique Constraints
Example to create a unique constraint on a column.
ALTER TABLE tablename ADD CONSTRAINT CK_Columnname UNIQUE (Columnname)
Example to create a unique constraint on a column.
ALTER TABLE tablename ADD CONSTRAINT CK_Columnname UNIQUE (Columnname)
Domain (per domain)
Schema (per forrest)
Configuration (per forrest)
Domain DNS Zones (W2K3)
Forrest DNS Zones (W2K3)
Custum Application Directory Partition(s) (W2K3) (Enlist op DC)
INNER JOIN: Only records with joing fields in both tables.
LEFT OUTER JOIN: All records from table 1 and only matching fields from table 2 that match on join field.
RIGHT OUTER JOIN: All records from table 2 and only matchin records from table 2 that match on join field
Below an example…
SELECT DISTINCT [Database].[dbo].[Table1].[Field1] AS [Table1-Field1] ,[Database].[dbo].[Table1].[Field2] AS [Table1-Field2] ,[Database].[dbo].[Table2].[Field3] AS [Table2-Field3] FROM [Database].[dbo].[Table1] INNER JOIN [Database].[dbo].[Table2] ON [Database].[dbo].[Table2].[Field0] = [Database].[dbo].[Table1].[Field0] WHERE [Database].[dbo].[Table1].[Field1] [Database].[dbo].[Table2].[Field3] ORDER BY [Database].[dbo].[Table1].[Field1],[Database].[dbo].[Table1].[Field1];
Commands or tools to move or view Active Directory Flexible Single Master Operations roles.
Schema Master (1 per forrest)
regsvr32 schmmgmt.dll mmc -> Schema
Domain Naming Master (1 per forrest)
AD Domains and Trusts
RID Master (uitgave SID’s) (1 per domain)
AD Users and Computers
Infrastructure Master (AD infrastructuur) (1 per domain)
AD Users and Computers
PDC Emulator (Time Server, log-on NT4 clients, Password chenges) (1 per domain)
AD Users and Computers
Under some circumstances it is not posible to remove cluster services from a node. To completely remove the cluster config you can execute the following from the commandline.
cluster node /forcecleanup
max aantal subnetten: 2^n (-2) // n = aantal masked bits *subnet* mask max aantal hosts in subnet = 2^n -2 // n = ongemaskeerde bits next multiple of 8 = next mult. of 8 greater or eq. to CIDR netmask not. interesting value = (next multiple of 8) / 8 incremental value = 2^ (next multiple of 8 - CIDR netmask notation) bijv. 192.168.10.50/27: incremental value = 2^(32-27) = 2^5 = 32 interesting value = 32 / 8 = 4 netwerkadressen: 192.168.10.0, 192.168.10.32, 192.168.10.64, enz. broadcastadressen: 192.168.10.31, 192.168.10.63, 192.168.10.95, enz. netwerk 192.168.10.32 broadcast 192.168.1.63 (192.168.10.(64-1)) bijv. 10.6.127.255/14: incremental value: 2^(16-14) = 2^2 = 4 interesting value = 16 / 8 = 2 netwerkadres: 10.4.0.0 broadcast: 10.7.255.255 ( 10.(8.0.0-1)
Below script creates al selfgesigned certificate from a private key and removes the password from the key so you can you can use the key-pair in Apache.
# Create Key and Certificate Signing Request (option -des3 creates a triple des encrypted key)... openssl genrsa -des3 -out server.key 4096 openssl req -new -key server.key -out server.csr # Remove password from key and sign certificate with key... cp server.key server.key.org openssl rsa -in server.key.org -out server.key openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt # Re-encrypt private key... openssl rsa -des -in server.key.org -out server.key openssl rsa -aes256 -in server.key.org -out server.key
For ease you can add all key and signing options to a config file. This way you can also add a subjectAlternate to the certificate.
>openssl req -new -config server.cnf -key server.key -out server.csr # server.cnf # [ req ] default_bits = 4096 prompt = no encrypt_key = no distinguished_name = dn req_extensions = req_ext [ dn ] C = NL O = Totietoot CN = examplefqdn.totietoot.nl [ req_ext ] subjectAltName = DNS:examplefqdn.totietoot.nl, DNS:examplealtname.totietoot.nl
Use the following command to convert the key-pair to pkcs12 format.
openssl pkcs12 -export -in server.crt -inkey server.key [-name tomcat] -out server.p12 -CAfile chain.pem -caname root -chain
Convert pkcs12 file to java keystore (jks):
keytool -importkeystore -deststorepass <password> -destkeypass <password> -destkeystore server.jks -srckeystore server.p12 -srcstoretype PKCS12 -srcstorepass <password> -alias <name>
Decode a certificate request or a x509 certificate:
openssl req -in server.csr -noout -text
openssl x509 -in server.crt -noout -text
Convert a PFX file to PEM-format (single file)…
openssl pkcs12 -in server.pfx -out key-n-certs.pem -nodes
Check certificate and connection using openssl…
openssl s_client -showcerts -connect f.q.d.n:1234 openssl s_client -starttls smtp -showcerts -connect f.q.d.n:25 -servername f.q.d.n
Convert certificate (PEM) to public key…
openssl x509 -inform pem -in certificate.cer -pubkey -noout > pubkey.pem
Add a (CA) certificate to the JAVA CACerts certificate truststore…
"C:\Java\jdk1.8.0_121\bin\keytool" -import -alias ADCERT-CA-1 -keystore "C:\Java\jdk1.8.0_121\jre\lib\security\cacerts" -trustcacerts -file ADCERT-CA-1.cer
Check BIND configuration.
named-checkconf -z
Check a specific zone from a file.
named-checkzone zonename zonefile
Display all iSCSI targets on give ip-address.
iscsiadm --mode discovery --type sendtargets --portal 192.168.1.250
Connect to a give target.
iscsiadm --mode node --targetname iqn.1994-04.org.netbsd.iscsi-target:target0 --portal 192.168.1.250:3260 --login
Close connection to a iSCSI target.
iscsiadm --mode node --targetname iqn.1994-04.org.netbsd.iscsi-target:target0 --portal 192.168.1.250:3260 --logout
Mount a iSCSI disk with lable ISCSI-0 on directory ‘/mnt/iscsi-0’.
mount /dev/disk/by-label/ISCSI-0 /mnt/iscsi-0
Display node records.
iscsiadm --mode node
iscsiadm --mode node --targetname iqn.1994-04.org.netbsd.iscsi-target:target0 --portal 192.168.1.250:3260