{"id":1330,"date":"2018-01-11T10:46:32","date_gmt":"2018-01-11T18:46:32","guid":{"rendered":"http:\/\/3.209.169.194\/blogs\/glenn\/?p=1330"},"modified":"2018-12-20T11:49:42","modified_gmt":"2018-12-20T19:49:42","slug":"checking-your-intel-processor-features-regarding-the-meltdown-exploit","status":"publish","type":"post","link":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/","title":{"rendered":"Checking Your Intel Processor Features Regarding the Meltdown Exploit"},"content":{"rendered":"<p><font size=\"2\">By now, you have probably heard plenty about the <a href=\"https:\/\/meltdownattack.com\/\">Spectre and Meltdown<\/a> exploits that affect many modern processors. The Meltdown exploit (CVE-2017-5754) in particular only affects Intel processors. <\/font><\/p>\n<p><font size=\"2\">Microsoft has already patched most of their <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in\">client<\/a> and <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4072698\/windows-server-guidance-to-protect-against-the-speculative-execution\">server<\/a> operating systems to mitigate against Meltdown. Depending on the exact model of Intel processor you are using, the Microsoft operating system patch will take advantage of processor support for two specific features and instructions which help minimize the performance impact of the operating system patch for Meltdown by using <a href=\"https:\/\/en.wikipedia.org\/wiki\/Kernel_page-table_isolation\">kernel page-table isolation<\/a>.<\/font><\/p>\n<p><font size=\"2\">These two instructions are process-context identifiers (PCID) and invalidate process-context identifiers (INVPCID). If your Intel processor supports both of these instructions, then the patched version of Windows will take advantage of that to give you better performance than you would otherwise get without those two instructions.<\/font><\/p>\n<p><font size=\"2\">I have <a href=\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/\">previously written about how to use PowerShell<\/a> to check your Meltdown and Spectre mitigation status in Windows. Using that PowerShell module will give you a complete view of your Meltdown and Spectre mitigation status.<\/font><\/p>\n<p><font size=\"2\">If your Intel processor supports both PCID and INVPCID, then you will see this message at the bottom of the PowerShell results:<\/font><\/p>\n<blockquote>\n<p><font size=\"2\">Windows OS support for PCID performance optimization is enabled: True [not required for security]<\/font><\/p>\n<\/blockquote>\n<p><font size=\"2\">Another way to check what features that your processor supports (whether it is AMD or Intel) is the <a href=\"https:\/\/docs.microsoft.com\/en-us\/sysinternals\/downloads\/coreinfo\">Coreinfo v3.31 tool<\/a> from Microsoft. You need to download the zip file, and then unzip it and copy the coreinfo.exe file to where you want it.<\/font><\/p>\n<p><font size=\"2\">You can then simply use a command prompt to run Coreinfo \u2013f &gt; CoreInfoResults.txt to dump the core feature information for the processor to a text file in the same directory as the coreinfo.exe file as you see in Figure 1.<\/font><\/p>\n<p><font size=\"2\"><br \/><\/font><\/p>\n<p><a href=\"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/image-7.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1028\" height=\"378\" title=\"image\" style=\"display: inline; background-image: none;\" alt=\"image\" src=\"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/image_thumb-7.png\" border=\"0\"><\/a><\/p>\n<p><font size=\"2\"><strong>Figure 1: Running Coreinfo with the \u2013f flag and saving the results to a text file<\/strong><\/font><\/p>\n<p><font size=\"2\"><br \/><\/font><\/p>\n<p><font size=\"2\">If your Intel processor supports the PCID feature and the INVPCID instruction, you will see an asterisk in the result (which is towards the bottom of the file), as you see below:<\/font><\/p>\n<blockquote>\n<p><font size=\"2\">PCID&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp;&nbsp; Supports PCIDs and settable CR4.PCIDE<br \/>\nINVPCID&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp;&nbsp; Supports INVPCID instruction<\/font><\/p>\n<\/blockquote>\n<p><font size=\"2\">If your Intel processor <strong><u>does not<\/u><\/strong> support either or both of the PCID feature and the INVPCID instruction, you will see a dash in the result, as you see below:<\/font><\/p>\n<blockquote>\n<p><font size=\"2\">PCID&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;&nbsp; Supports PCIDs and settable CR4.PCIDE<br \/> INVPCID&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;&nbsp; Supports INVPCID instruction<\/font><\/p>\n<\/blockquote>\n<p><font size=\"2\">It is possible to for a processor to support PCID and not support INVPCID. My understanding from the Microsoft Powershell code is that you need both to get <font size=\"2\">Windows OS support for the PCID performance optimization. <\/font><\/font><\/p>\n<p><font size=\"2\">From what information that I have been able to dig up (and from also asking a source at Intel), PCID is supported in some <a href=\"https:\/\/en.wikipedia.org\/wiki\/Westmere_(microarchitecture)\">Westmere<\/a> family and most <a href=\"https:\/\/en.wikipedia.org\/wiki\/Sandy_Bridge\">Sandy Bridge<\/a> family processors, with server processors getting support before client processors. According to <a href=\"https:\/\/software.intel.com\/sites\/default\/files\/managed\/39\/c5\/325462-sdm-vol-1-2abcd-3abcd.pdf\">Intel documentation<\/a>, INVPCID support was introduced in the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Haswell_(microarchitecture)\">Haswell<\/a> family processors.<\/font><\/p>\n<p><font size=\"2\">This means you will get <font size=\"2\">Windows OS support for the PCID performance optimization in <a href=\"https:\/\/ark.intel.com\/products\/series\/78583\/Intel-Xeon-Processor-E5-v3-Family\">Intel Xeon E5-2600 v3<\/a> product family (Haswell-EP) and later processors, along with the <a href=\"https:\/\/ark.intel.com\/products\/series\/78585\/Intel-Xeon-Processor-E7-v3-Family\">Intel Xeon E7 v3<\/a> product family (Haswell-EX) and later processors.<\/font><\/font><\/p>\n<p><font size=\"2\">In my mind, this is even more justification for a new server or hopefully a complete data platform upgrade, where you get a brand new server running Windows Server 2016, along with SQL Server 2017. If you are thinking along the same lines, <a href=\"https:\/\/www.sqlskills.com\/services\/\">SQLskills<\/a> can help you plan and implement an upgrade and migration.<\/font><\/p>\n<p><font size=\"2\"><br \/><\/font><\/p>\n<p><font size=\"3\"><strong>Update: 1-12-2018<\/strong><\/font><\/p>\n<p><font size=\"2\">I ran CoreInfo on every Intel client machine that I own (a total of 16 machines, which is way too many)! The oldest is a 2008-vintage <a href=\"https:\/\/ark.intel.com\/products\/33924\/Intel-Core2-Quad-Processor-Q9550-12M-Cache-2_83-GHz-1333-MHz-FSB\">Intel Core2 Quad Q9550<\/a> (Yorkfield), which as expected, has neither PCID or INVPCID support. The next oldest is a 2009-vintage <a href=\"https:\/\/ark.intel.com\/products\/43122\/Intel-Core-i7-720QM-Processor-6M-Cache-1_60-GHz\">Intel Core i7-720QM<\/a> (Clarksfield) which also has neither PCID or INVPCID support. I don\u2019t have any Nehalem or Westmere machines.<\/font><\/p>\n<p><font size=\"2\">After that, my oldest machine is a Q1 2011-vintage <a href=\"https:\/\/ark.intel.com\/products\/52214\/Intel-Core-i7-2600K-Processor-8M-Cache-up-to-3_80-GHz\">Intel Core i7-2600K<\/a> (Sandy Bridge), which has PCID support, but does not have INVPCID support. The situation is the same for a Q1 2012-vintage <a href=\"https:\/\/ark.intel.com\/products\/65523\/Intel-Core-i7-3770K-Processor-8M-Cache-up-to-3_90-GHz\">Intel Core i7-3770K<\/a> (Ivy Bridge) which has PCID support, but does not have INVPCID support.<\/font><\/p>\n<p><font size=\"2\">With a Q2 2013-vintage <a href=\"https:\/\/ark.intel.com\/products\/75048\/Intel-Core-i5-4670K-Processor-6M-Cache-up-to-3_80-GHz\">Intel Core i5-4670K<\/a> (Haswell), we finally get both PCID and INVPCID support. My newest Intel machine has a Q4 2017-vintage <a href=\"https:\/\/ark.intel.com\/products\/126684\/Intel-Core-i7-8700K-Processor-12M-Cache-up-to-4_70-GHz\">Intel Core i7-8700K<\/a> (Coffee Lake) which also has both PCID and INVPCID support.<\/font><\/p>\n<p><font size=\"2\"><br \/><\/font><\/p>\n<p><\/p>\n<p><font size=\"2\"><br \/><\/font><\/p>\n<p><font size=\"2\"><br \/><\/font><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By now, you have probably heard plenty about the Spectre and Meltdown exploits that affect many modern processors. The Meltdown exploit (CVE-2017-5754) in particular only affects Intel processors. Microsoft has already patched most of their client and server operating systems to mitigate against Meltdown. Depending on the exact model of Intel processor you are using, [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,20,343],"tags":[366],"class_list":["post-1330","post","type-post","status-publish","format-standard","hentry","category-sql-server-hardware","category-intel","category-security","tag-meltdown"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Checking Your Intel Processor Features Regarding the Meltdown Exploit - Glenn Berry<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Checking Your Intel Processor Features Regarding the Meltdown Exploit - Glenn Berry\" \/>\n<meta property=\"og:description\" content=\"By now, you have probably heard plenty about the Spectre and Meltdown exploits that affect many modern processors. The Meltdown exploit (CVE-2017-5754) in particular only affects Intel processors. Microsoft has already patched most of their client and server operating systems to mitigate against Meltdown. Depending on the exact model of Intel processor you are using, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/\" \/>\n<meta property=\"og:site_name\" content=\"Glenn Berry\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-11T18:46:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-20T19:49:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/image_thumb-7.png\" \/>\n<meta name=\"author\" content=\"Glenn Berry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Glenn Berry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/\",\"url\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/\",\"name\":\"Checking Your Intel Processor Features Regarding the Meltdown Exploit - Glenn Berry\",\"isPartOf\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/image_thumb-7.png\",\"datePublished\":\"2018-01-11T18:46:32+00:00\",\"dateModified\":\"2018-12-20T19:49:42+00:00\",\"author\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/#primaryimage\",\"url\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/image_thumb-7.png\",\"contentUrl\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/image_thumb-7.png\",\"width\":1028,\"height\":378},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Checking Your Intel Processor Features Regarding the Meltdown Exploit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website\",\"url\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/\",\"name\":\"Glenn Berry\",\"description\":\"Semi-random musings about SQL Server performance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7\",\"name\":\"Glenn Berry\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g\",\"caption\":\"Glenn Berry\"},\"sameAs\":[\"https:\/\/www.sqlskills.com\/blogs\/glenn\/\"],\"url\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/author\/glenn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Checking Your Intel Processor Features Regarding the Meltdown Exploit - Glenn Berry","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/","og_locale":"en_US","og_type":"article","og_title":"Checking Your Intel Processor Features Regarding the Meltdown Exploit - Glenn Berry","og_description":"By now, you have probably heard plenty about the Spectre and Meltdown exploits that affect many modern processors. The Meltdown exploit (CVE-2017-5754) in particular only affects Intel processors. Microsoft has already patched most of their client and server operating systems to mitigate against Meltdown. Depending on the exact model of Intel processor you are using, [&hellip;]","og_url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/","og_site_name":"Glenn Berry","article_published_time":"2018-01-11T18:46:32+00:00","article_modified_time":"2018-12-20T19:49:42+00:00","og_image":[{"url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/image_thumb-7.png","type":"","width":"","height":""}],"author":"Glenn Berry","twitter_misc":{"Written by":"Glenn Berry","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/","url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/","name":"Checking Your Intel Processor Features Regarding the Meltdown Exploit - Glenn Berry","isPartOf":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/#primaryimage"},"image":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/image_thumb-7.png","datePublished":"2018-01-11T18:46:32+00:00","dateModified":"2018-12-20T19:49:42+00:00","author":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7"},"breadcrumb":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/#primaryimage","url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/image_thumb-7.png","contentUrl":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/image_thumb-7.png","width":1028,"height":378},{"@type":"BreadcrumbList","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-intel-processor-features-regarding-the-meltdown-exploit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sqlskills.com\/blogs\/glenn\/"},{"@type":"ListItem","position":2,"name":"Checking Your Intel Processor Features Regarding the Meltdown Exploit"}]},{"@type":"WebSite","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website","url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/","name":"Glenn Berry","description":"Semi-random musings about SQL Server performance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sqlskills.com\/blogs\/glenn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7","name":"Glenn Berry","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g","caption":"Glenn Berry"},"sameAs":["https:\/\/www.sqlskills.com\/blogs\/glenn\/"],"url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/author\/glenn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/posts\/1330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/comments?post=1330"}],"version-history":[{"count":0,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/posts\/1330\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/media?parent=1330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/categories?post=1330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/tags?post=1330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}