A

access control lists (ACLs), Validating Failover
account passwords, Security
ACLs (access control lists), Validating Failover
active/active clustering, SQL Server 2000 Failover Clustering versus Previous SQL Server Clustering Implementations
active/passive clustering, SQL Server 2000 Failover Clustering versus Previous SQL Server Clustering Implementations
Address Windowing Extensions (AWE), Address Windowing Extensions (AWE), SQL Server Memory Recommendations
addresses, failover clusters, Adding or Removing a Cluster Node from the Virtual Server Definition and Adding, Changing, or Updating a TCP/IP Address
administration, Databases, the Quorum, and Failover Clustering, Types of Server Clusters, Verifying the Application with Failover, Replication, Administrative Tasks for High Availability, Security, Securing Your SQL Server Installations, Securing Your SQL Server–Based Applications, Intrusive Maintenance, Defragmenting Indexes, Logical vs. Physical Fragmentation, Example: Defragmenting a VLDB That Uses Log Shipping, Changing Database Options, Changing Database Options, Memory and Multiple Instances on the Same Server or Server Cluster, Memory and Multiple Instances on the Same Server or Server Cluster, Memory and Multiple Instances on the Same Server or Server Cluster, Memory and Multiple Instances on the Same Server or Server Cluster, Transferring Logins, Users, and Other Objects Between Instances, Transferring Logins, Users, and Other Objects Between Instances, Transferring Logins, Users, and Other Objects Between Instances, Using a DTS Package to Transfer Objects
application security, Securing Your SQL Server Installations
database configuration, Changing Database Options
database corruption, Example: Defragmenting a VLDB That Uses Log Shipping
defragmenting indexes, Intrusive Maintenance
defragmenting VLDBs, Logical vs. Physical Fragmentation
DTS package transfers, Using a DTS Package to Transfer Objects
failover clusters., Verifying the Application with Failover (see )
files and filegroups, Databases, the Quorum, and Failover Clustering
logical vs. physical fragmentation, Defragmenting Indexes
login transfers between instances, Transferring Logins, Users, and Other Objects Between Instances
login transfers to standby, Memory and Multiple Instances on the Same Server or Server Cluster
maintenance, Securing Your SQL Server–Based Applications
memory., Changing Database Options (see )
object transfers between instances, Transferring Logins, Users, and Other Objects Between Instances
object transfers to standby, Memory and Multiple Instances on the Same Server or Server Cluster
resource management, Memory and Multiple Instances on the Same Server or Server Cluster
server clusters., Types of Server Clusters (see )
server security, Security
SQL Server 2000 upgrade and, Replication
user transfers between instances, Transferring Logins, Users, and Other Objects Between Instances
user transfers to standby, Memory and Multiple Instances on the Same Server or Server Cluster
affinity mask option, Memory and Processor
alerts, Database File Size, Simplifying and Automating Backups, Tools for Monitoring and Alerting, Microsoft Operations Manager, Automated Collection of Data
automating data collection, Automated Collection of Data
configuring for file size, Database File Size
setting up, Tools for Monitoring and Alerting
SQL Server, Microsoft Operations Manager
transaction log backups, Simplifying and Automating Backups
ALTER DATABASE Transact-SQL command, Database File Size
Analysis Services, SQL Server 2000, Memory, SQL Server Administrative Information
administrative information in run books, SQL Server Administrative Information
cluster awareness and, Memory
antivirus software, Geographically Dispersed Clusters, Installing a SQL Server Virtual Server
failover clusters and, Installing a SQL Server Virtual Server
server clusters and, Geographically Dispersed Clusters
API (application programming interface), Server Clusters
application programming interface (API), Server Clusters
applications, Clients and SQL Server 2000 Failover Clustering, Log Shipping Transactions, Replication Issues, Raw Disk Space Needed, IP Addresses, Ports, and Network Card Usage, Applications and Failover Clustering, Verifying the Application with Failover, Clients, Applications, and Log Shipping, SQL Server Administrative Information, Application Compatibility with Instances, Phase 5: Deploying and Stabilizing, SQL Server Version Upgrades or Migrations, Securing Your SQL Server Installations
compatibility with database instances, Application Compatibility with Instances
database, Raw Disk Space Needed
dependencies, not configuring as, Applications and Failover Clustering
deploying, Phase 5: Deploying and Stabilizing
failover capability, IP Addresses, Ports, and Network Card Usage
failover clustering and, Clients and SQL Server 2000 Failover Clustering, Verifying the Application with Failover
log shipping and, Log Shipping Transactions, Clients, Applications, and Log Shipping
replication, Replication Issues
run books and, SQL Server Administrative Information
security, Securing Your SQL Server Installations
upgrades, SQL Server Version Upgrades or Migrations
arbitration process, Server Clusters, Failover Clustering, and Disks
architecture, Understanding Your Hardware, Timestamp Columns, Step 2: Considering Technologies, SQL Server Administrative Information, Application Compatibility with Instances
disk subsystem, Application Compatibility with Instances
hardware, Understanding Your Hardware
high availability, Step 2: Considering Technologies
replication, Timestamp Columns
security, SQL Server Administrative Information
ASR (Authoritative System Restore), Collected Wisdom and Good Ideas for Backup and Restore
attaching/detaching databases, Upgrading from Previous Versions of SQL Server Clustering
attacks, Microsoft.com’s Barriers to Availability
auditing, Security, The Change Plan, Securing Your SQL Server Installations
data center security, Security
events with SQL Profiler, Securing Your SQL Server Installations
production change plan, The Change Plan
authentication, Authentication for Log Shipping, Securing Your SQL Server Installations, Securing Your SQL Server Installations
application security and, Securing Your SQL Server Installations
log shipping and, Authentication for Log Shipping
types of, Securing Your SQL Server Installations
Authoritative System Restore (ASR), Collected Wisdom and Good Ideas for Backup and Restore
authorization, Location
autogrow settings, Database File Size
Automatic Recovery, Understanding the Write-Ahead Log
Automatic switch to standby, Choosing Between Failover Clustering and Log Shipping or Replication
automating backups, Simplifying and Automating Backups, Simplifying and Automating Backups, Simplifying and Automating Backups, Simplifying and Automating Backups, Simplifying and Automating Backups, Collected Wisdom and Good Ideas for Backup and Restore
alerts, Simplifying and Automating Backups
preventing human intervention errors, Collected Wisdom and Good Ideas for Backup and Restore
schedule for, Simplifying and Automating Backups
time interval criteria, Simplifying and Automating Backups
transaction log backups, Simplifying and Automating Backups
automating collection of data, Using System Monitor
AUTO_SHRINK property, Shrinking Databases and Files
availability, Preparing for High Availability, The Project Team, Guiding Principles for High Availability, Identifying Risks, Identifying Risks, Where Does Availability Start?, Assessing Your Environment for Availability, Assessing Your Environment for Availability, Barriers to Availability, Documentation, Real-World High Availability Solutions, The Scenario, Step 2: Considering Technologies, Reporting Server and Log Shipped Secondary
architecture, Step 2: Considering Technologies
assessing, Where Does Availability Start?
barriers to, Barriers to Availability
calculating, Identifying Risks
conditions and constraints, The Scenario
cost of, Assessing Your Environment for Availability
customers and, Assessing Your Environment for Availability
defined, Preparing for High Availability, Guiding Principles for High Availability
documentation, Documentation
guiding principles of, The Project Team
nines, Identifying Risks
reporting server, Reporting Server and Log Shipped Secondary
AWE (Address Windowing Extensions), Address Windowing Extensions (AWE), SQL Server Memory Recommendations
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.221.182.150