Flylib.com
Microsoft SQL Server 2000 High Availability
Microsoft SQL Server 2000 High Availability
ISBN: 0735619204
EAN: 2147483647
Year: 2006
Pages: 137
Authors:
Allan Hirt
,
Cathan Cook
,
Kimberly Tripp
,
Frank McBath
BUY ON AMAZON
Table of Contents
BackCover
Microsoft SQL Server 2000 High Availability
Foreword
Preface
Part I: The High Availability Primer
Chapter 1: Preparing for High Availability
High Availability - What It Is and How to Get It
Agreeing on a Solution
Availability Calculations and Nines
Types of Unavailability
Where Does Availability Start?
Summary
Chapter 2: The Basics of Achieving High Availability
Staffing
Manage Change or Be Managed by It
System and Process Standardization
Documentation
Summary
Chapter 3: Making a High Availability Technology Choice
Windows Clustering
Geographically Dispersed Clusters
SQL Server 2000
Decisions, Decisions ...
Summary
Part II: Technology Building Blocks
Chapter 4: Disk Configuration for High Availability
Capacity Planning
Types of Disk Subsystems
Server Clusters, Failover Clustering, and Disks
Pre-Windows Disk Configuration
File Placement and Protection
Database File Size
Configuration Example
Summary
Chapter 5: Designing Highly Available Microsoft Windows Servers
High Availability Options for Windows
Server Clusters
Server Cluster Administration
Network Load Balancing
Summary
Part III: Microsoft SQL Server Technology
Chapter 6: Microsoft SQL Server 2000 Failover Clustering
Implementing SQL Server 2000 Failover Clustering
Verifying Your Failover Cluster Installation
Administering SQL Server Virtual Servers
Troubleshooting SQL Server 2000 Failover Clusters
Disaster Recovery for Failover Clustering
Summary
Chapter 7: Log Shipping
Basic Considerations for All Forms of Log Shipping
Log Shipping and Database Backups
Service Packs and Log Shipping
Files, Filegroups, and Transaction Logs
Custom Log Shipping Versus Microsoft s Implementation
Configuring and Administering the Built-In Functionality Using SQL Server 2000 Enterprise Edition
Creating a Custom Coded Log Shipping Solution
Log Shipping From SQL Server 7.0 to SQL Server 2000
Summary
Chapter 8: Replication
Highly Available Replication Architecture
Disaster Recovery with a Replicated Environment
Log Shipping and Replication
Summary
Chapter 9: Database Environment Basics for Recovery
Backup
Summary
Chapter 10: Implementing Backup and Restore
Implementing Your Backup Strategy
Database Recovery
Collected Wisdom and Good Ideas for Backup and Restore
Backing Up the Operating System
Backing Up and Restoring Clustered Environments
Summary
Part IV: Putting the Pieces of the Puzzle Together
Chapter 11: Real-World High Availability Solutions
Conditions and Constraints
The Planning Process
Exercise Summary
Case Study: Microsoft.com
Summary
Chapter 12: Disaster Recovery Techniques for Microsoft SQL Server
Testing Disaster Recovery Plans
Executing Disaster Recovery Plans
Disaster Recovery Techniques
Summary
Chapter 13: Highly Available Upgrades
Upgrading, Consolidating, and Migrating to SQL Server 2000
Windows Version Upgrades
SQL Server Version Upgrades or Migrations
Attaching and Detaching Databases Versus Backup and Restore
Service Packs and Hotfixes
Summary
Part V: Administering Highly Available Microsoft SQL Servers
Chapter 14: Administrative Tasks for High Availability
Security
Maintenance
Changing Database Options
Memory Management for SQL Server 2000
Managing SQL Server Resources with Other Tools
Summary
Chapter 15: Monitoring for High Availability
Monitoring Basics
Implementing a Monitoring Solution
Monitoring Your Monitor and Other Critical Services
Capacity Planning and Monitoring
Summary
Glossary
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Microsoft SQL Server 2000 High Availability
ISBN: 0735619204
EAN: 2147483647
Year: 2006
Pages: 137
Authors:
Allan Hirt
,
Cathan Cook
,
Kimberly Tripp
,
Frank McBath
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Process for Assessing Risk
Risk Assessment Best Practices
Risk-Assessment Methodologies
Determining What Tools to Use
Appendix D. Dealing with Consultants and Outside Vendors
The .NET Developers Guide to Directory Services Programming
Searching with the DirectorySearcher
Using Attribute Scope Query
ADSI Schema Mapping Mechanism
Choosing an Object Class
Locating Domain Controllers
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Scope Risk
Identifying Project Schedule Risk
Managing Project Constraints and Documenting Risks
Conclusion
Appendix A Selected Detail From the PERIL Database
Software Configuration Management
Configuration Control
Appendix A Project Plan
Appendix D Problem Change Report
Appendix E Test Plan
Appendix N Corrective Action Processing (CAP)
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 31. Navigate Public Transportation
Hack 32. Locate a Phone Number
Hack 34. Publish Your Own Hiking Trail Maps
Hack 37. View Your GPS Tracklogs in Google Maps
Hack 62. Find the Latitude and Longitude of a Street Address
Python Standard Library (Nutshell Handbooks) with
The math Module
The getpass Module
The quopri Module
Overview
The dbm Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies