En ny standard for høytilgjengelighet Jon Jahren Produktsjef, Microsoft

Slides:



Advertisements
Similar presentations
SSRS 2008 Architecture Improvements Scale-out SSRS 2008 Report Engine Scalability Improvements.
Advertisements

Module 12: Auditing SQL Server Environments
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Vinod Kumar M MTC – Technology Specialist Level: 300.
Performance and Scalability. Optimizing PerformanceScaling UpScaling Out.
Vinod Kumar Technology Evangelist | Microsoft
Keith Burns Microsoft UK Mission Critical Database.
Jeremy Boyd Director – Mindscape MSDN Regional Director
Executive Overview. PLEASE READ (hidden slide) To deliver this presentation effectively, you need to be familiar with Windows Server 2008 R2 management.
Module 14: Scalability and High Availability. Overview Key high availability features available in Oracle and SQL Server Key scalability features available.
BARBARIN DAVID SQL Server Senior Consultant Pragmantic SA SQL Server Denali : New administration features.
Chapter 9 Overview  Reasons to monitor SQL Server  Performance Monitoring and Tuning  Tools for Monitoring SQL Server  Common Monitoring and Tuning.
Module 8: Monitoring SQL Server for Performance. Overview Why to Monitor SQL Server Performance Monitoring and Tuning Tools for Monitoring SQL Server.
Managing and Monitoring SQL Server 2005 Shankar Pal Program Manager SQL Server, Redmond.
SQL Server 2008 for Hosting Key Questions to Address How can SQL Server save your costs? How can SQL Server help you increase customer base? How can.
Understanding Active Directory
Windows Optimized Desktop: Enhance Security & Control.
Gopal Ashok Program Manager Microsoft Corp Session Code: DAT 312.
Il-Sung Lee Senior Program Manager Microsoft Corporation DAT304.
Ravi Sankar Technology Evangelist | Microsoft Corporation
{ Mission-Critical Applications } { Manageability } Mikael Colliander Senior Consultant Microsoft Corporation.
Walter Pitrof Technology Solution Professional Microsoft Switzerland Backup, Restore und Disaster Recovery mit Data Protection Manager 2012 Philipp Witschi.
Building Highly Available Systems with SQL Server™ 2005 Vineet Gupta Evangelist – Data and Integration Microsoft Corp.
Identity and Access Management Business Ready Security Solutions.
Performance and Scalability. Performance and Scalability Challenges Optimizing PerformanceScaling UpScaling Out.
Course Topics Administering SQL Server 2012 Jump Start 01 | Install and Configure SQL Server04 | Manage Data 02 | Maintain Instances and Databases05 |
Chapter 10 : Designing a SQL Server 2005 Solution for High Availability MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design.
High-Availability Methods Lesson 25. Skills Matrix.
Stephan Hurni Consultant Trivadis AG, SQL Server notes from the field.
Training Workshop Windows Azure Platform. Presentation Outline (hidden slide): Technical Level: 200 Intended Audience: Developers Objectives (what do.
Sofia, Bulgaria | 9-10 October SQL Server 2005 High Availability for developers Vladimir Tchalkov Crossroad Ltd. Vladimir Tchalkov Crossroad Ltd.
2 An Overview of SQL Server 2008 New Features Jeremy Boyd Mindscape MSDN Regional Director & MVP – SQL Server DAT302.
Your Data Any Place, Any Time Online Transaction Processing.
DATABASE MIRRORING  Mirroring is mainly implemented for increasing the database availability.  Is configured on a Database level.  Mainly involves two.
Session objectives Discuss whether or not virtualization makes sense for Exchange 2013 Describe supportability of virtualization features Explain sizing.
Speaker Name 00/00/2013. Solution Requirements.
Under New Management Andrew Fryer Microsoft UK Andrew Fryer Microsoft UK.
Connect with life Vinod Kumar Technology Evangelist - Microsoft
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
Enhancing Scalability and Availability of the Microsoft Application Platform Damir Bersinic Ruth Morton IT Pro Advisor Microsoft Canada
Mike Zeff Development Advisor ISV Microsoft New Zealand.
Your Data Any Place, Any Time Performance and Scalability.
Course Topics Administering SQL Server 2012 Jump Start 01 | Install and Configure SQL Server04 | Manage Data 02 | Maintain Instances and Databases05 |
Your Data Any Place, Any Time Always On Technologies.
Connect with life Praveen Srivatsa Founder and CEO – AstraSoft.NET Vinod Kumar Technology Evangelist – Databases and BI.
Praveen Srivatsa Director| AstrhaSoft Consulting blogs.asthrasoft.com/praveens |
Log Shipping, Mirroring, Replication and Clustering Which should I use? That depends on a few questions we must ask the user. We will go over these questions.
Customer challenges Security features Protect data-at-rest Transparent Data Encryption Data/Key separation Extensible Key Managements Use strong authentication.
Comprehensive Flexible Global Storage and Search Responsive Available Secure Manageable Federation Coordination Consolidation Transformation Synchronization.
Data Platform and Analytics Foundational Training
Microsoft Virtual Academy
System Center Marketing
System Center Marketing
AlwaysOn Readable Secondary
Deployment Planning Services
6/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
A Technical Overview of Microsoft® SQL Server™ 2005 High Availability Beta 2 Matthew Stephen IT Pro Evangelist (SQL Server)
Installation and database instance essentials
Introduction to SQL Server Management for the Non-DBA
Required 9s and data protection: introduction to sql server 2012 alwayson, new high availability solution Santosh Balasubramanian Senior Program Manager.
Test Upgrade Name Title Company 9/18/2018 Microsoft SharePoint
Your Data Any Place, Any Time
LitwareHR v2: an S+S reference application
Windows Server 2008 Iain McDonald Director of Program Management
Andrew Fryer Microsoft UK
Your Data Any Place, Any Time
Windows Azure Hybrid Architectures and Patterns
Making Windows Azure Relevant to IT Professionals
Microsoft Virtual Academy
Designing Database Solutions for SQL Server
Presentation transcript:

En ny standard for høytilgjengelighet Jon Jahren Produktsjef, Microsoft

Optimize performance Manage mixed workloads Scale performance Ensure system availability Minimize planned downtime Concurrent data access Secure data access Protect your system Simplify compliance Mission-Critical Applications

Highly secure data access Highly secure configuration Rich authentication Granular authorization Help protect your data Transparent data encryption Extensible key management Simplify compliance All actions auditable Enterprise-wide security policies

Encrypt data and log files Protect backup files and detached database files Transparent to application No application modifications required to take advantage of encryption Secure with Database Encryption Key (DEK); DEK encrypted with A password Service Master Key Can use a Hardware Security Module (HSM) to store keys Use encrypted data in another server Import DEK to new server Attach encrypted database files Restore an encrypted backup SQL Server 2008 DEK Client Application ata Encrypted Data Page

Simplify key management Consolidate and simplify encryption across the enterprise Store keys in removable hardware such as USB drives

Create an Audit object Automatically log actions Log To various formats A file, the Windows Application Log, or the Windows Security Log Create an audit specification Include server and database actions in an audit Predefined action groups Individual action filters

Define security policies Define audit, access policies by using Policy Management Framework Authentication standard Password policies Define surface area configurations as policies Apply across the enterprise Using Configuration Servers Helps to ensure enterprise-wide compliance

Simplify Compliance Secure Access Trustworthy Computing Granular Authorization Data Encryption Rich Authentication Auditing Secure Configurations Protect Data Principals and Securables Roles Catalog Security Execution Context User Schema Separation Kerberos/NTLM Password Policy Enforcement End Point Authentication Encrypted Login Credentials Single Sign-On Native Cryptographic Capabilities Transparent Data Encryption Extensible Key Management Enterprise-wide Security Policies Security Updates Surface Area Minimized All Actions Audited Audit Actions to File, Windows Application Log, and Windows Security log Capture and Audit DDL Activities

Optimize performance Manage mixed workloads Scale performance Ensure system availability Minimize planned downtime Concurrent data access Secure data access Protect your system Simplify compliance Mission-Critical Applications

Help ensure system availability Failover clustering Database mirroring Log shipping Replication Minimize planned downtime Backup compression Dynamically add resources Online operations Enhance concurrent data access Database snapshots Snapshot isolation levels

Major changes in cluster setup: In place upgrade not possible (but probably not desirable anyway) SQL Server cluster setup has moved to the 7.0 model of setting SQL Servers up and then reconfiguring individually into the cluster Other changes: New Cluster Validation Tool Improvements in operations (e.g. troubleshooting using Event Tracing instead of the cluster log) 16 nodes now supported No longer need all cluster nodes in the same subnet For more details see the AppCompat/Upgrade course or:

Comm it Write to local log Transmit to mirror Write to remote log Log Acknowledg e Committe d in log Constantly redoing on mirror Acknowledge DB DB Log

Three modes of operation High Availability - synchronous mirroring with a witness Automatic detection/failover No data loss High Protection - synchronous mirroring without a witness Manual failover No data loss, but possibly downtime High Performance - asynchronous mirroring Manual failover Some data loss possible (but not guaranteed)

Consequences of failure depend on what failed and the mode of the database mirroring partnership SQL Server crashes Instant detection of failure Windows/hardware crashes Failure detection depends on partner timeout setting Log drive pulled out Failure detection takes 40 seconds Corrupt page Failure detection depends on what hits the corrupt page

Performance improvements Log compression Automatic page repair Prevents a corrupt data page from making a database unavailable Mirroring partner detects bad database page Requests valid copy from partner Log Stream compression

Comparison of transactions per second against network bandwidth, with and without log compression Percentage increases in throughput is most dramatic for low network bandwidths

Comparison of CPU usage against network bandwidth with and without log stream compression CPU goes up when compression is on, both because of compression/decompression, but also because the server can now process more transactions per second

Principal Witness Data Log Mirror Data Log 1. Bad Page Detected X 2. Request page 3. Find page 4. Retrieve page 5. Transfer page 6. Write Page

Add and remove nodes without stopping Visual configuration with Topology Wizard Ability to detect conflicts Improved Replication Monitor Select columns and filter rows for viewing

Backup compression Standard backup commands and interface Off by default, configurable Restore from any SQL Server 2008 Edition Dynamically add resources Online-Add CPU Online-Add memory Backup Compression

System Monitor snapshot of backup of 322MB AdventureWorks DB 21 A LOT more CPU used (avg 25%) BUT runtime = 21.6s (45% improvement) and backup stored in 76.7MB (4.2x compression ratio) Hardly any CPU used (avg 5%), runtime = 39.5s, compression ratio of 0. Uncompressed Compressed

System Monitor snapshot of backup of 322MB AdventureWorks DB 22 More CPU used (avg 14.5%) BUT runtime = 36s (almost 50% improvement) Hardly any CPU used (avg 8%), runtime = 71.0s Uncompressed Compressed

Common questions: “How much compression will I see?” “Will it be comparable to, say, SQL Litespeed?” One simple answer: “It depends!” All data compresses differently – the compression ratio achieved depends on: The type of data in the database Whether the data in the database is already compressed Whether the data/database is encrypted

SS2005 added the ability to use hot-add memory SS2008 extends the dynamic workload handling capabilities of SQL Server by allowing hot-add CPU ‘Hot-add’ means being able to plug it into the computer while the computer is running, and then reconfiguring SQL Server to make use of the new hardware ONLINE There are some restrictions for use: The hardware must support hot-add (obviously ) SS2008 Enterprise Edition only 64-bit Windows Server 2008 Datacenter/Enterprise SQL Server won’t automatically start using new CPUs They may not be meant for SQL Server’s use

DBCC CHECKDB is a critical tool for early discovery of database corruptions (usually caused by the IO subsystem) Deep-dive notification Some algorithms in CHECKDB are written for speed, and so will detect a corruption, but not where exactly the corruption is. In this case, a 2 nd pass must be done to pinpoint the corruption This can be very time consuming and its unclear what is going on – CHECKDB seems like it’s not progressing but IOs are happening SQL Server 2008 has new error log output to highlight this process Higher efficiency parallel page scanner Long-running indexed view and XML index contents checks moved under WITH EXTENDED_LOGICAL_CHECKS option to reduce default run-time 25

Advanced eventing infrastructure for servers Ability to define events to monitor and a variety of ways to consume the events Synchronous or asynchronous Trigger actions when an event fires Use predicates to filter events from consumers Causality tracking (through inherited IDs) High performance and good scalability Cost of firing a single event is extremely small ETW (Event Tracing for Windows) enabled Controlled through T-SQL DDL statements 26

Example scenario (taken from Books Online): Problem Troubleshooting excessive CPU usage on the server DMVs show that all queries are ad-hoc user queries but don’t have enough info about queries that have been run Solution Create an Extended Events session that: Fires an event when a T-SQL statement executes Defines an event action to collect the query plan Defines a predicate on a CPU usage threshold Defines a consumer to write the event payload to a trace file Examination of the traced query plans allows pinpointing the problem 27

Lock escalation on partitioned tables reduces concurrency as the table lock locks ALL partitions Only way to solve this currently is to disable escalation IXX FG1 Partitioned Table Partition 1 Partition 2 Partition 3 Query 1 ESCALATE Query 2 update

SQL Server 2008 allows lock escalation to the partition level, allowing concurrent access to other partitions Escalation to partition level does not block other queries IX X FG1 Partitioned Table Partition 1 Partition 2 Partition 3 Query 1 ESCALATE Query 2 update

Optimize performance Manage mixed workloads Scale performance Ensure system availability Minimize planned downtime Concurrent data access Secure data access Protect your system Simplify compliance Mission-Critical Applications

Optimize performance Data compression Enhanced partitioning DW query optimizations Improved indexed views Performance data collection (covered in manageability session) Manage mixed workloads Resource Governor Scale up/scale out

SQL Server 2008 provides Increased levels of security Availability Scalability to meet your growing data needs

© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.