A
- access control lists (ACLs), Validating Failover
- account passwords, Security
- ACLs (access control lists), Validating Failover
- active/active clustering, SQL Server 2000 Failover Clustering versus Previous SQL Server Clustering Implementations
- active/passive clustering, SQL Server 2000 Failover Clustering versus Previous SQL Server Clustering Implementations
- Address Windowing Extensions (AWE), Address Windowing Extensions (AWE), SQL Server Memory Recommendations
- addresses, failover clusters, Adding or Removing a Cluster Node from the Virtual Server Definition and Adding, Changing, or Updating a TCP/IP Address
- administration, Databases, the Quorum, and Failover Clustering, Types of Server Clusters, Verifying the Application with Failover, Replication, Administrative Tasks for High Availability, Security, Securing Your SQL Server Installations, Securing Your SQL Server–Based Applications, Intrusive Maintenance, Defragmenting Indexes, Logical vs. Physical Fragmentation, Example: Defragmenting a VLDB That Uses Log Shipping, Changing Database Options, Changing Database Options, Memory and Multiple Instances on the Same Server or Server Cluster, Memory and Multiple Instances on the Same Server or Server Cluster, Memory and Multiple Instances on the Same Server or Server Cluster, Memory and Multiple Instances on the Same Server or Server Cluster, Transferring Logins, Users, and Other Objects Between Instances, Transferring Logins, Users, and Other Objects Between Instances, Transferring Logins, Users, and Other Objects Between Instances, Using a DTS Package to Transfer Objects
- application security, Securing Your SQL Server Installations
- database configuration, Changing Database Options
- database corruption, Example: Defragmenting a VLDB That Uses Log Shipping
- defragmenting indexes, Intrusive Maintenance
- defragmenting VLDBs, Logical vs. Physical Fragmentation
- DTS package transfers, Using a DTS Package to Transfer Objects
- failover clusters., Verifying the Application with Failover (see )
- files and filegroups, Databases, the Quorum, and Failover Clustering
- logical vs. physical fragmentation, Defragmenting Indexes
- login transfers between instances, Transferring Logins, Users, and Other Objects Between Instances
- login transfers to standby, Memory and Multiple Instances on the Same Server or Server Cluster
- maintenance, Securing Your SQL Server–Based Applications
- memory., Changing Database Options (see )
- object transfers between instances, Transferring Logins, Users, and Other Objects Between Instances
- object transfers to standby, Memory and Multiple Instances on the Same Server or Server Cluster
- resource management, Memory and Multiple Instances on the Same Server or Server Cluster
- server clusters., Types of Server Clusters (see )
- server security, Security
- SQL Server 2000 upgrade and, Replication
- user transfers between instances, Transferring Logins, Users, and Other Objects Between Instances
- user transfers to standby, Memory and Multiple Instances on the Same Server or Server Cluster
- affinity mask option, Memory and Processor
- alerts, Database File Size, Simplifying and Automating Backups, Tools for Monitoring and Alerting, Microsoft Operations Manager, Automated Collection of Data
- automating data collection, Automated Collection of Data
- configuring for file size, Database File Size
- setting up, Tools for Monitoring and Alerting
- SQL Server, Microsoft Operations Manager
- transaction log backups, Simplifying and Automating Backups
- ALTER DATABASE Transact-SQL command, Database File Size
- Analysis Services, SQL Server 2000, Memory, SQL Server Administrative Information
- administrative information in run books, SQL Server Administrative Information
- cluster awareness and, Memory
- antivirus software, Geographically Dispersed Clusters, Installing a SQL Server Virtual Server
- failover clusters and, Installing a SQL Server Virtual Server
- server clusters and, Geographically Dispersed Clusters
- API (application programming interface), Server Clusters
- application programming interface (API), Server Clusters
- applications, Clients and SQL Server 2000 Failover Clustering, Log Shipping Transactions, Replication Issues, Raw Disk Space Needed, IP Addresses, Ports, and Network Card Usage, Applications and Failover Clustering, Verifying the Application with Failover, Clients, Applications, and Log Shipping, SQL Server Administrative Information, Application Compatibility with Instances, Phase 5: Deploying and Stabilizing, SQL Server Version Upgrades or Migrations, Securing Your SQL Server Installations
- compatibility with database instances, Application Compatibility with Instances
- database, Raw Disk Space Needed
- dependencies, not configuring as, Applications and Failover Clustering
- deploying, Phase 5: Deploying and Stabilizing
- failover capability, IP Addresses, Ports, and Network Card Usage
- failover clustering and, Clients and SQL Server 2000 Failover Clustering, Verifying the Application with Failover
- log shipping and, Log Shipping Transactions, Clients, Applications, and Log Shipping
- replication, Replication Issues
- run books and, SQL Server Administrative Information
- security, Securing Your SQL Server Installations
- upgrades, SQL Server Version Upgrades or Migrations
- arbitration process, Server Clusters, Failover Clustering, and Disks
- architecture, Understanding Your Hardware, Timestamp Columns, Step 2: Considering Technologies, SQL Server Administrative Information, Application Compatibility with Instances
- disk subsystem, Application Compatibility with Instances
- hardware, Understanding Your Hardware
- high availability, Step 2: Considering Technologies
- replication, Timestamp Columns
- security, SQL Server Administrative Information
- ASR (Authoritative System Restore), Collected Wisdom and Good Ideas for Backup and Restore
- attaching/detaching databases, Upgrading from Previous Versions of SQL Server Clustering
- attacks, Microsoft.com’s Barriers to Availability
- auditing, Security, The Change Plan, Securing Your SQL Server Installations
- data center security, Security
- events with SQL Profiler, Securing Your SQL Server Installations
- production change plan, The Change Plan
- authentication, Authentication for Log Shipping, Securing Your SQL Server Installations, Securing Your SQL Server Installations
- application security and, Securing Your SQL Server Installations
- log shipping and, Authentication for Log Shipping
- types of, Securing Your SQL Server Installations
- Authoritative System Restore (ASR), Collected Wisdom and Good Ideas for Backup and Restore
- authorization, Location
- autogrow settings, Database File Size
- Automatic Recovery, Understanding the Write-Ahead Log
- Automatic switch to standby, Choosing Between Failover Clustering and Log Shipping or Replication
- automating backups, Simplifying and Automating Backups, Simplifying and Automating Backups, Simplifying and Automating Backups, Simplifying and Automating Backups, Simplifying and Automating Backups, Collected Wisdom and Good Ideas for Backup and Restore
- alerts, Simplifying and Automating Backups
- preventing human intervention errors, Collected Wisdom and Good Ideas for Backup and Restore
- schedule for, Simplifying and Automating Backups
- time interval criteria, Simplifying and Automating Backups
- transaction log backups, Simplifying and Automating Backups
- automating collection of data, Using System Monitor
- AUTO_SHRINK property, Shrinking Databases and Files
- availability, Preparing for High Availability, The Project Team, Guiding Principles for High Availability, Identifying Risks, Identifying Risks, Where Does Availability Start?, Assessing Your Environment for Availability, Assessing Your Environment for Availability, Barriers to Availability, Documentation, Real-World High Availability Solutions, The Scenario, Step 2: Considering Technologies, Reporting Server and Log Shipped Secondary
- architecture, Step 2: Considering Technologies
- assessing, Where Does Availability Start?
- barriers to, Barriers to Availability
- calculating, Identifying Risks
- conditions and constraints, The Scenario
- cost of, Assessing Your Environment for Availability
- customers and, Assessing Your Environment for Availability
- defined, Preparing for High Availability, Guiding Principles for High Availability
- documentation, Documentation
- guiding principles of, The Project Team
- nines, Identifying Risks
- reporting server, Reporting Server and Log Shipped Secondary
- AWE (Address Windowing Extensions), Address Windowing Extensions (AWE), SQL Server Memory Recommendations
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.