Open DACPAC File in Visual Studio
DACPAC file can be used to deploy database code using CICD tools like Azure DevOps. Learn how to open DACPAC file in Visual Studio.
Open DACPAC File in Visual Studio Read More »
DACPAC file can be used to deploy database code using CICD tools like Azure DevOps. Learn how to open DACPAC file in Visual Studio.
Open DACPAC File in Visual Studio Read More »
This article describes how to connect to Azure analysis services from Power BI using Azure Active directory authentication with MFA.
Connect to Azure Analysis Services from Power BI Read More »
This guide will help you find SP related to table in the SQL Server database or Azure SQL database using client tools like SSMS.
Find Stored Procedures related to Table in SQL Server Read More »
This article will provide step-by-step instructions to enable and disable triggers in Azure Data Factory using PowerShell.
Disable and Enable triggers in Azure Data Factory using PowerShell Read More »
This article describes how to update secret in azure key vault using PowerShell using AAD and managed identity authentication.
Update Secret in Azure Key Vault using PowerShell Read More »
Microsoft recently introduced a feature in ADF to disable activity. This article describes how to disable activity in Azure Data Factory.
Activate and Deactivate Activity in Azure Data Factory Read More »
Follow these quick steps to periodically delete old files from Azure storage account.
Automatically Delete Old Files from Azure Storage Account Read More »
A deadlock occurs when two or more processes or transactions block each other from continuing because each has locked a database resource that the other transaction needs. This article describes how to find deadlock in SQL Server database.
Find deadlock in SQL Server Read More »
This article describes how to solve error: Principle ‘Data factory’ could not be found or this principal type is not supported
Principle could not be found or this principal type is not supported Read More »
The server principal is not able to access the database “master” under the current security context.