Upload
others
View
4
Download
0
Embed Size (px)
Citation preview
{ Mission-Critical Applications }
Nick WardApplication Platform and Development SpecialistMicrosoft [email protected]
2008
2005
Trusted
Easy to Use
Business Intelligence
2000
7.0
Ease of use
Dynamic Development
Beyond Relational
Pervasive Insight
Enterprise Data Platform
Mobile andDesktop
OLAP
FILE
XML
RDBMS
Services
Query
Analysis
Reporting Integration
Synch
Search
CloudServer
Managing increasing IT and regulatory requirements
Meeting SLAs for system availability
Ensuring performance as load increases
Optimize performance
Manage mixed workloads
Scale performance
Ensure system availability
Minimize planned downtime
Concurrent data access
Secure data access
Protect your system
Simplify compliance
Mission-Critical Applications
Secure data access
Protect your system
Simplify compliance
Mission-Critical Applications
Highly secure data accessHighly secure configuration
Rich authentication
Granular authorization
Help protect your dataTransparent data encryption
Extensible key management
Simplify complianceAll actions auditable
Enterprise-wide security policies
Encrypt data and log files
Transparent to application
Secure with Database Encryption Key (DEK)
Use encrypted data in another server
Transparent data encryption
SQL Server 2008
DEK
Client Application
Encrypted Data Page
Extensible key management
Simplify key management
Consolidate and simplify encryption across
the enterprise
Store keys in removable hardware such as USB drives
Help protect your data with transparent data encryption
Applications do not need to be aware of the encryption
Data is highly protected because encrypted database files cannot be read without the Database Encryption Key
Encryption keys can be exported and imported to trusted servers
{ Protect Data Access }
What data was
modified, and by
whom?
How many
failed log-
in
attempts?
Who has viewed
sensitive records
recently?
Enhanced auditing
Enhanced auditing
Audit all events on a server, or filter as appropriate
Different audit levels database or server
Multi-server auditing deployment and collection
Log To various formats (file, Windows the Windows Application Log, or the Windows Security Log)
Enterprise security policies
Define audit, access policies by using Policy Based Management
Authentication standard
Password policies
Define surface area configurations as policies
Apply across the enterprise
Using Configuration Servers
Helps to ensure enterprise-wide compliance
Simplify ComplianceSecure Access
Trustworthy Computing
Granular Authorization
Data Encryption
Rich AuthenticationAuditing
Secure Configurations
Protect Data
Principals and Securables
Roles
Catalog Security
Execution Context
User SchemaSeparation
Kerberos/NTLM
Password Policy Enforcement
End Point Authentication
Encrypted Login Credentials
Single Sign-On
Native Cryptographic Capabilities
Transparent Data Encryption
Extensible Key Management
Enterprise-wide Security Policies
Security Updates
Surface Area Minimized
All Actions Audited
Audit Actions to File, Windows Application Log, and Windows Security log
Capture and Audit DDL Activities
Optimize performance
Manage mixed workloads
Scale performance
Ensure system availability
Minimize planned downtime
Concurrent data access
Secure data access
Protect your system
Simplify compliance
Mission-Critical Applications
Ensure system availability
Minimize planned downtime
Concurrent data access
Mission-Critical Applications
Help ensure system availability
Failover clustering
Database mirroring
Log shipping
Replication
Minimize planned downtime
Backup compression
Dynamically add resources
Online operations
Enhance concurrent data access
Database snapshots
Snapshot isolation levels
Failover clustering
Windows Server 2008 Clustering
Supports up to 16-node clusters
More than 1 drive letter per clustered SQL Server instance
Nodes can be on different subnets
Supports an OR relationship between dependencies (e.g. server name resource available when either IP address is available)
Windows Server 2008 Cluster Validation Tool
Quorum disk no longer a single point of failure
Database mirroring
Performance improvements
Log compression
Automatic page repairPrevents a corrupt data page from making a database unavailable
Mirroring partner detects bad database page
Requests valid copy from partner
Log Stream compression
Principal
Witness
DataLog
Mirror
Data Log
Automatic page repair
1. Bad Page
Detected
X
2. Request page
3. Find page
4. Retrieve page
5. Transfer page
6. Write Page
Peer-to-peer replication
Add and remove nodes without stopping
Visual configuration with Topology Wizard
Ability to detect conflicts
Improved Replication Monitor
Select columns and filter rows for viewing
Backup compressionStandard backup commands and interface
Off by default,configurable
Restore from any SQL Server 2008 Edition
Dynamicallyadd resources
Online-Add CPU
Online-Add memory
0
1
2
3
4
5
6
Backup Size
Backup Time
Restore Time
No Compression
Compression
Backup Compression
{ Ensure System Availability }
Using backup compressionIncreases database availability by reducing backup time
Easy to use and configure
Backup compression ratio is easily calculated
Can be used for initializing database mirroring and Log Shipping
Exploring database mirroringAutomatic page repair can prevent damaged pages from making a database unavailable
Optimize performance
Manage mixed workloads
Scale performance
Ensure system availability
Minimize planned downtime
Concurrent data access
Secure data access
Protect your system
Simplify compliance
Mission-Critical Applications
Optimize performance
Manage mixed workloads
Scale performance
Mission-Critical Applications
Optimize performance
Data compression
Enhanced partitioning
DW query optimizations
Improved indexed views
Performance data collection(covered in manageability session)
Manage mixed workloads
Resource Governor
Exec Reports
Reporting
Workload
Resource Governor
Resource Management
Allocate resources
Assign logins to workloads
Map workloads to resources
Define limits
Prevent run-away queries
Conduct online maintenance
Prioritize your workloads
Define priorities
Dynamic re-allocation
TransactionProcessing
Ad-hoc Reporting
Ad-hoc
Workload
OLTP
Workload
High PriorityPool
Low Priority Pool
Min Memory 10%
Max Memory 20%
Max CPU 20%Max CPU 90%
Batch Reports
{ Manage Mixed Workloads }
Using Resource GovernorConfigure the Resource Governor by using T-SQL and Management Studio
Monitor the Resource Governor by using Management Studio and DMVs
Change resource pool limits online and observe the change
16C
479
tpsE
64C
1,126
tpsE
TPC-E
16C
34,000
users
18,000
users
64C
63,650
QphH
TPC-H10TB
16C
419
tpsE
on Windowson Industry Standard Servers
Results as of 2/27/08. IBM System x3850 M2 (w/ SQL Server 2005), 419 tpsE, 1,527 $/tpsE, available 12/7/07; IBM System x3850 M2
(w/ SQL Server 2008), 479 tpsE, 1,591 $/tpsE, available 8/30/08; NEC Express5800/1320Xf, 1,126 tpsE, 2,771 $/tpsE, available
8/30/08. Source: Transaction Processing Performance Council (www.tpc.org).
Results as of 2/27/08. HP Integrity
Superdome, 63,650 QphH@10TB, 38.54
$/QphH@10TB, available 8/30/08. Source:
Transaction Processing Performance Council
(www.tpc.org).
Highest performance on 4-socket Industry Standard Servers. Certification Number 2005030: SAP SD standard R/3 Enterprise 4.70 application benchmark certified on 6/27/05
with 18,000 SD benchmark users & comp. Certification Number 2008003: SAP SD standard SAP ERP 6.0 (2005) application benchmark in 3-Tier configuration certified on
02/26/08 with 34,000 SD benchmark users & comp. For more details, see www.sap.com/benchmark.
SAP Benchmarks: Certification Number 2005030: The SAP SD standard R/3 Enterprise 4.70 application benchmark performed on June 21, 2005 by HP in Redmond, WA, USA
was certified on June 27, 2005 with the following data: Number of benchmark users & comp.: 18,000 SD (Sales & Distribution) Average dialog response time: 1.87 seconds
Throughput: Fully Processed Order Line items/hour: 1,819,000 Dialog steps/hour: 5,457,000 SAPS: 90,950 Average DB request time (dia/upd): 0.052 sec / 0.066 sec CPU
utilization of database server: 85% CPU utilization of application servers: 67% (dia: 85%, upd: 19%, msg/enq: 29%) Operating System database server: Windows Server 2003
Enterprise Edition (64-bit) Operating System application servers: Windows Server 2003 Enterprise Edition (32-bit) RDBMS database server: SQL Server 2005 (64-bit) R/3
Release: 4.70 (32-bit) Total database disk space: 135 GB Configuration: Database server: HP ProLiant DL585, 4-way SMP, Dual-core AMD Opteron processor Model 875 (2.2
GHz), 128 KB L1 cache, 2 MB L2 cache, 32 GB main memory
SAP-SD3-tier
Optimize performance
Manage mixed workloads
Scale performance
Ensure system availability
Minimize planned downtime
Concurrent data access
Secure data access
Protect your system
Simplify compliance
Mission-Critical Applications
SQL Server User Group
http://www.sqlserver.org
TechEd 2008
Learn more about mission-critical applications
http://www.microsoft.com/sql/2008/solutions/oltp.mspx
Learn more about SQL Server 2008http://www.microsoft.com/sql/2008/default.mspx
Discover SQL Server 2008: Webcasts, Virtual Labs, and White Papershttp://www.microsoft.com/sql/2008/learning/default.mspx
SQL Server 2008 traininghttp://www.microsoft.com/learning/sql/2008/default.mspx
Download latest SQL Server CTPhttp://www.microsoft.com/sql/2008/prodinfo/download.mspx
Join the SQL PASS communityhttp://www.sqlpass.org
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market
conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.