1 / 59

SQL Server 2008 Databázová platforma

SQL Server 2008 Databázová platforma. High Availability, Management, Security, Upgrade. Ľubo Goryl (lgoryl@microsoft.com) Technology Solution Professional Microsoft Slovakia. Agenda. High availability Management Security. Why Do You Need High Availability?.

Albert_Lan
Download Presentation

SQL Server 2008 Databázová platforma

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SQL Server 2008 Databázová platforma • High Availability, Management, Security, Upgrade • Ľubo Goryl (lgoryl@microsoft.com) • TechnologySolution Professional • Microsoft Slovakia

  2. Agenda • High availability • Management • Security

  3. Why Do You Need High Availability? • Downtime causes lost customer revenue and decreased staff productivity Availability during planned downtime Patching and Service Pack Installation Hardware and Software Upgrade System Reconfiguration Database Maintenance Application Upgrade Protection against unplanned downtime Human Error #1 Cause of Failure Site Disasters Hardware Malfunction Data Corruption Software Crash

  4. Always On Technologies • Increasing Availability • Decreasing Downtime • Improving Manageability

  5. SQL Server 2008 High Availability Features

  6. Database MirroringOverview • Hot Standby protects against database or server failure • Provides a fault-tolerant database • Cost effective as no specialized hardware is required • Straightforward setup and administration • Automatic or manual failover • SQL Server 2008 does not require a database restart after manual failover • Automatic, transparent client redirect • No shared components; two separate copies of data • SQL Server 2008 compresses the log stream from principal to mirror

  7. Database Mirroring Synchronous, high-safety configuration with automatic failover Data is mirrored synchronously as part of a transaction Automatic failover if principal server fails Automatic client redirection Client Witness Principal Mirror

  8. Database Mirroring Synchronous, high-safety configuration without automatic failover Data is mirrored synchronously as part of a transaction Manual failover if principal server fails Client Principal Mirror

  9. Database Mirroring Asynchronous, high-performance configuration Data is mirrored asynchronously Manual failover if principal server fails Client Principal Mirror

  10. Database Mirroring Synchronous, high-safety configuration • SQL Server 2008 uses a checksum to validate page writes • Inconsistent pages can be recovered automatically from the mirror server Principal Mirror

  11. Disaster Recovery with Database Mirroring

  12. Log Shipping • Provides database redundancy • Cost effective as no specializedhardware is required • Straightforward setup andadministration • Running read operationssuch as reports on asecondary server is permitted • Users are disconnected when logrestore occurs • Can maintain multiple secondary servers • Optional Monitor server • Records history and status of backup/restore jobs • May set up to raise alerts when jobs fail

  13. Microsoft Clustering • Server hardware redundancy • Using a shared disk subsystem • Entire instance virtualized and fails over as a unit • Can include non-SQL Server resources • Clustering can be combined with database mirroring, log shipping, or replication • Geographically dispersed failover clustering provides protection even if the disk array fails

  14. Microsoft ClusteringSQL Server 2008 Editions Standard Enterprise As many nodes as the operating system supports 2-node clusters only

  15. SQL Server 2008 Support for Windows Server 2008 Clustering

  16. Transactional Replication • High performance ─ latency measured in seconds • Minimal load on the server • Cost effective as no specialized hardware is required • Straightforward setup and administration • Two types • Standard transactional replication • Easy to design, set up, and manage • Subscriber (standby) can be used for reporting • Peer-to-peer transactional replication • Multi-master model; schema is identical on all sites • Supports distributed applications with data partitioning; enables load balancing • Does not handle conflicts; designed to avoid/prevent conflicts

  17. Transactional ReplicationReplication Options Transactional Replication Reporting + Redundancy Peer-to-Peer Replication Query Scale Out + Redundancy London New York Boston Shanghai New Jersey Seattle Tokyo

  18. Logreader Agent Logreader Agent Logreader Agent Dist DB Dist DB Dist DB Distribution Agent Distribution Agent Distribution Agent Peer-to-Peer Transactional ReplicationHow does it work? “West” “East” “South”

  19. Peer-to-Peer Transactional ReplicationSQL Server 2008 Enhancements • Configure replication easily with the new graphical topology viewer • Add new nodes withouttaking application offline • Protect against accidental conflicts with SQL Server 2008 conflict detection

  20. Backup • Permanent copy of data • Online restore • Bring database online as soon as primary file group is restored • Access restored portion of database while remainder is restored • Backup compression inSQL Server 2008 • Reduce volume significantly • Faster restore and backups • Applied per instance and per backup • Cost effective ─ no specialized hardware is required • Straightforward setup and administration

  21. BackupBackup Media Mirroring • Protection against lost or damaged backup media • All backup types can be mirrored (database, log, etc.) • Each device must be the same type • All devices must be present during Backup, but only one backup set is required for Restore

  22. Database Snapshot • Provides a read-only, consistent copy of database • Snapshot remains unchanged while database is modified • Protects against user error and data corruption • Very fast to create • Preserves disk space • “Copy-on-Write” technology • Can be created for any database • Cost effective as no specialized hardware is required • Straightforward setup and administration Client

  23. Logical Recovery Standby Putting It All Together • Database Mirroring • Primary disaster site for databases • Log Shipping • Additional disaster sites for databases • Logical recovery • Replication • Database reporting and read scale out with redundancy • Clustering • Local server redundancy • Always On Storage Partner Solutions • Site storage HA • Highest hardware reliability Database Scale Out for Queries Replication Database Mirroring Hot Standby Clustering Production Database Log Shipping Warm Standby Log Shipping with Restore Delay Backup

  24. SQL Server High-Availability Licensing

  25. Enhanced Restore Operations

  26. Online Index Operations • Create, rebuild, and drop indexes online CREATE CLUSTERED INDEX idx_Prd ON Products WITH (ONLINE = ON) Scan Sort/Merge Bulk Insert INSERT UPDATE DELETE Target (new index) Source (Existing Products table) SELECT Idx_Prd

  27. Partial Database Availability • Database remains partially available whensecondary files are damaged Primary File group Additional Data File groups

  28. Locking and Concurrency

  29. Dynamic Configuration Add hardware resources without taking the database server offline

  30. Table and Index Partitioning • Partition tables and indexes across multiple physical files • Reduce the impact of I/O-intensive operations • Manage backup and archival based on partitions • Control lock escalation at the partition level to increase concurrency

  31. Dedicated Administrator Connection

  32. SQL Server 2008 Manageability

  33. Monitor Troubleshoot Tune Configure Audit Report • SQL Server 2008 ManageabilityProductive Administration Scale • Manage by Intent • Monitor with Insight • Scale with Ease

  34. SQL Server 2008Management Capabilities

  35. Policy-Based ManagementDefining Policies Targets Categories

  36. Policy-based management

  37. Intelligent Monitoring

  38. End-to-End System Health InsightPerformance Studio

  39. Performance Tuning Tools

  40. Interactive Administration • Centralized management of all SQL Server instances and services • Intellisensefor productive management

  41. Gain Management Insight • Standard Reports • Custom Reports • Performance Dashboards

  42. Programmatic Management C:\>sqlcmd –I Insert..

  43. Automated Maintenance • SQL Server Agent • Jobs, operators, and alerts • Maintenance plans • Multi-server management

  44. SQL Server 2008 Security-Enhanced Database Platform

  45. SQL Server 2008 Security Trustworthy Computing Reliability Confidentiality Integrity GranularAuthorization Data Encryption Rich Authentication Highly SecureConfiguration Auditing Kerberos/NTLM Password Policy Enforcement End Point Authentication Login credentials encrypted Single sign-on Principals andSecurables Roles Catalog security Execution Context User SchemaSeparation Native cryptographic capabilities *Transparent Data Encryption *Extensible Key Management *All Action Audit Audit actions to file, Windows Application Log, and Windows Security log Capture and audit DDL activities *Surface Area Reduction through automated policies Security updates *: New Features in SQL Server 2008

  46. Transparent Data Encryption Scenarios Without the required password or HSM to decrypt the DEK, the database cannot be opened.

  47. Data Encryption • Why consider encryption? • Additional layer of security • Required by someregulatory compliance laws • In SQL Server 2000 • Vendor support required • In SQL Server 2005 • Built-in support for explicit data encryption • In SQL Server 2008 • Transparent data encryption • Extensible key management ThreatDetected EmergencyProcedure Server HighlyProtected

  48. Transparent Data Encryption

  49. Encryption Algorithm Support • Algorithms and key lengths vary by OpSys; depends on CSP (Cryptographic Services Provider) • Performance depends on size of data being ciphered

  50. It’s all About the Keys • Encryption keys must be protected • Some keys must be backed up • If the keys are lost, data may be lost • Therefore, ability to restore keys must exist • Keys may need to be regenerated • In case of compromise of the keys • Keys may need to be shared across systems • In the case, where encrypteddata is being shared

More Related