Download presentation
Presentation is loading. Please wait.
Published byBuck Little Modified over 9 years ago
1
{ Mission-Critical Applications } { Manageability } Mikael Colliander Senior Consultant Microsoft Corporation
2
Managing increasing IT and regulatory requirements Meeting SLAs for system availability Ensuring performance as load increases
3
Dynamic Development Beyond Relational Pervasive Insight Enterprise Data Platform Mobile and Desktop OLAP FILE XML RDBMS Services Query AnalysisReportingIntegrationSynch Search Cloud Server
4
Optimize performance Manage mixed workloads Scale performance Ensure system availability Minimize planned downtime Concurrent data access Secure data access Protect your system Simplify compliance Mission-Critical Applications
5
Highly secure data access Highly secure configuration Rich authentication Granular authorization Help protect your data Transparent data encryption Extensible key management Simplify compliance All actions auditable Enterprise-wide security policies
6
Encrypt data and log files Protect backup files and detached database files Transparent to application No application modifications required to take advantage of encryption Secure with Database Encryption Key (DEK); DEK encrypted with A password Service Master Key Can use a Hardware Security Module (HSM) to store keys Use encrypted data in another server Import DEK to new server Attach encrypted database files Restore an encrypted backup SQL Server 2008 DEK Client Application ata Encrypted Data Page
7
Simplify key management Consolidate and simplify encryption across the enterprise Store keys in removable hardware such as USB drives
8
Create an Audit object Automatically log actions Log To various formats A file, the Windows Application Log, or the Windows Security Log Create an audit specification Include server and database actions in an audit Predefined action groups Individual action filters
9
Simplify Compliance Secure Access Trustworthy Computing Granular Authorization Data Encryption Rich Authentication Auditing Secure Configurations Protect Data Principals and Securables Roles Catalog Security Execution Context User Schema Separation Kerberos/NTLM Password Policy Enforcement End Point Authentication Encrypted Login Credentials Single Sign-On Native Cryptographic Capabilities Transparent Data Encryption Extensible Key Management Enterprise-wide Security Policies Security Updates Surface Area Minimized All Actions Audited Audit Actions to File, Windows Application Log, and Windows Security log Capture and Audit DDL Activities
10
Optimize performance Manage mixed workloads Scale performance Ensure system availability Minimize planned downtime Concurrent data access Secure data access Protect your system Simplify compliance Mission-Critical Applications
11
Help ensure system availability Failover clustering Database mirroring Log shipping Replication Minimize planned downtime Backup compression Dynamically add resources Online operations Enhance concurrent data access Database snapshots Snapshot isolation levels
12
More than 1 drive letter per clustered SQL Server instance (Mount points) Build upon Windows Server 2008 Supports up to 16-node clusters Supports an OR relationship between dependencies Nodes need not be on the same subnet Windows Server 2008 Cluster Validation Tool
13
Performance improvements Log compression Automatic page repair Prevents a corrupt data page from making a database unavailable Mirroring partner detects bad database page Requests valid copy from partner Log Stream compression
14
Principal Witness Data Log Mirror Data Log 1. Bad Page Detected X 2. Request page 3. Find page 4. Retrieve page 5. Transfer page 6. Write Page
15
Backup compression Standard backup commands and interface Off by default, configurable Restore from any SQL Server 2008 Edition Dynamically add resources Online-Add CPU Online-Add memory Backup Compression
16
{ Ensure System Availability } Using backup compression Increases database availability by reducing backup time Easy to use and configure Backup compression ratio is easily calculated Can be used for initializing database mirroring and Log Shipping Exploring database mirroring Automatic page repair can prevent damaged pages from making a database unavailable
17
Optimize performance Manage mixed workloads Scale performance Ensure system availability Minimize planned downtime Concurrent data access Secure data access Protect your system Simplify compliance Mission-Critical Applications
18
Optimize performance Data compression Enhanced partitioning DW query optimizations Improved indexed views Performance data collection (covered in manageability session) Manage mixed workloads Resource Governor Scale up/scale out
19
Storage cost savings Shrink large tables such as DW fact tables Improves query performance Results in less I/O but with some CPU cost Higher buffer hit rates Achieves a 2x to 7x compression ratio Row-level, variable-width Page-level dictionary Differential encoding between rows Independent of other features Works for data and indexes
20
Resource Management Allocate resources Assign logins to workloads Map workloads to resources Define limits Prevent run-away queries Conduct online maintenance Prioritize your workloads Define priorities Dynamic re-allocation Backup Admin Tasks Continuous Loading ExecReports Ad-hoc Reports Report Workload OLTP Workload Admin Workload Admin Pool Application Pool Min Memory 10% Max Memory 20% Max CPU 20% Max CPU 90%
21
{ Manage Mixed Workloads } Using Resource Governor Configure the Resource Governor by using T-SQL and Management Studio Monitor the Resource Governor by using Management Studio and DMVs Change resource pool limits online and observe the change
22
SQL Server 2008 provides Increased levels of security Availability Scalability to meet your growing data needs
23
{ Manageability }
24
Growing product capabilities Increased management complexity Data volumes and users continue to grow Need relevant information for tuning and optimization Data center consolidation and virtualization Increased need for management scalability
25
Manage by policies Monitor with insight Manage across the enterprise Configure Scale Monitor Report Troubleshoot Tune Audit
26
Manageability Multi-server management Visual administration Program tasks Consolidate performance information Report relevant insights Tune with best practices Define configurations Automate compliance Integrate with systems management
27
Manage across enterprise Manage single instance
28
CategoriesCategories TargetsTargets FacetsFacetsConditionsConditionsPoliciesPolicies
29
Reduce my surface area XPCmdShell == False SQLCLR == True DBMail == False RemoteDAC == False Reduce my surface area XPCmdShell == False SQLCLR == True DBMail == False RemoteDAC == False My table names must end with “%_tbl” Only Express and Developer Editions are allowed on developer workstations
30
Manual checking by administrator On Demand SQL Server Agent job checks periodically and logs non-compliance On Schedule, log out-of-compliance DDL trigger rolls back non-compliant changes Changes are attempted, prevent out-of-compliance Event Notification logs non-compliant changes Changes are attempted, log out-of-compliance
31
SQL Server 2008 supports Microsoft System Center Data Protection Manager 2007 Provides enterprise-wide SQL Server backup and restore operations Provides data center redundancy Operations Manager 2007 SQL Server 2008 Management Pack
32
{ Manage by Policies } Simplify management with policies Make complex configuration management easier by combining multiple conditions into a single policy Manage Surface Area Configuration by policy, making compliance with security requirements easier to define and enforce Flexibility allows prevention or detection as well as monitoring and logging
33
Manageability Multi-server management Visual administration Program tasks Consolidate performance information Report relevant insights Tune with best practices Define configurations Automate compliance Integrate with systems management
34
Performance data collection OS perf indicators Performance data Extensible collection Central repository Consolidate information Open interface Management reports Canned reports Extensible
35
Data providers SQL Trace Performance Counters Transact-SQL Low overhead data collection Performance data repository Centralized data storage Comprehensive reporting
36
Management Data Warehouse Management Data Warehouse Management Studio Data Collection Management Studio Data Collection Target DataCollectorDataCollector CollectionSetsCollectionSets CollectionSetsCollectionSets Configuration Configuration Collection Set Reports
37
Use standard reports For user databases For data collector Disk usage Query statistics Server activity Build custom reports
38
Performance Reports Database Engine Tuning Advisor SQL Server Profiler Best Practices Policies Best Practices Analyzer
39
{ Monitor with Insight } Gain system insight with Performance Data Collection Use built-in reports based on data collection to get insight into performance issues Monitor disk activity, query performance, server activity Performance Data Collection is extensible Build custom data collection sets Policy-based management integrates with Data Collection
40
Manageability Multi-server management Visual administration Program tasks Consolidate performance information Report relevant insights Tune with best practices Define configurations Automate compliance Integrate with systems management
41
Enterprise-wide policies Manage policies centrally Publish to all servers Monitor across multiple servers Multi-server configuration Single configuration server Custom server groups Multi-server queries
42
Centralized management Intellisense for productive management Error List window View dependencies Configuration servers Multi-server queries Replication Monitor
43
SQLCMD Create batch files Automate multiple scripts Server Management Objects (SMO) Create custom.NET management tools Powershell Integrated with Windows management scripting
44
SQL Server 2008 enables you to manage infrastructure effectively by using Policy-based management to implement security and administration best practices Performance insights that let you consolidate monitoring information and effectively tune your systems Multi-server management across the enterprise
45
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.