443 chapter7.planning for high availability in the Enterprise

Source: Internet
Author: User
Tags failover

Planning for high availability in the Enterprise
Lesson 1: Assessing database availability requirements
1. Calculating availability
(1) A = (F-(MR + r)/F
A: Availability
F: Mean time between failures
MR: mean time to recognize
R: mean time to repair
(2) availability is determined by how quickly you can recover a system after it has suffered a failure. some people call this disaster recovery. recovering a system form a failure is both disaster recovery and high availability.
2. High Availability framework
(1) A basic roadmap for availability that can be found with the Framework.

3. availability requirements
(1) Gather availability requirement is the first step of planning any availability architecture. However, this is the most difficult element in the entire process. The difficulty is in trying to obtain realistic availability requirements.
(2) the interview process that you go through shoshould result in the following pieces of information for each application.
Average number of users affected
Type of user affected: internal or external
How the application is used
Which segment of the biz is affected
What percentage of overall biz operation is affected
Maximum amount of time the application can be offline before the biz is irreparable damaged.
4. Barriers to availability
(1) process failure
The first level of protection is controlling physical access to machines
The second level of protection is controlling physical access to the server room
The third level of protect is change control, which is one of the most-often overlooked processes within an IT environment change control processes exist to ensure that any change to an OS is tested as well as has ented. you shoshould test all service pack and hot fixes to ensure compatibility with your system configuration. there are two paths for changing control: planed and emergency.
(2) user errors. user errors are the second most common cause of system being offline. this is the most difficult category of availability issues to resolve because user errors are not technical issues. the only solution to this type of problem is to restore a backup to a secondary server, extract the data, and merge it back into the database.
(3) natural and man-made disasters
Tornadoes
Hurricanes and typhoons
Earthquakes
Tidal Waves and tsunamis
Volcanic eruptions
Fires
Lightning
Floods
Nuclear Explosions and meteors
(4) hardware failure
(5) software failure
(6) network failure
(7) security failure
5. Cost of downtime
(1) the total cost of downtime is determined for each application within an environment. This value is derived by evaluating the percentage of the total revenue for which a particle application is responsible.
(2) Calculating downtime cost for applications that are directly responsible for generating revenue is reasonably straightforward.
(3) cost of downtime for applications that do not directly generate revenue but support biz operations are a bit more difficult to calculate.
(4) After you have the figures for the downtime cost, multiply them by a factor of 3.
(5) By factoring all the intangible aspects-such as loss of image, bad publicity, potential loss of staff, etc-you can better evaluate the costs associated with not having systems available.
6. budget restrictions

Lesson 2: design database storage
1. RAID configurations
(1) RAID 0

(2) RAID 1

(3) RAID 5

(4) mirror of stripes

(5) stripe of mirrors

(6) SAN configuration. you can configure a SAN with any combination of RAID levels previous discussed. you can also configure the storage within the array by using either a file system approach or a full disk approach.
(7) file system configuration. in file system configuration, small portions of unsupported disks drives are combined together into a storage unit, which is then presented to the OS as if it were a single disk drive.

(8) full disk configuration. You can construct a full disk configuration by attaching ing one or more disks in their entirely into a storage unit.

2. tempdb placement
(1) The tempdb database is considered by being to be a "throwaway" database. although you shoshould nerver use tempdb to store persistent data because it is lost when the instance is restarted, it is still critical to the operation of a SQL Server.
(2) If the storage array of a user database were to fail, the database on that storage array wocould be affected. however, all other database wowould still be accessible. if the storage array for tempdb or any system databases fails, the entire instance of SQL Server becomes unavailable.
(3) At a minimum, you need to place tempdb on a storage array that has minimum redundancy, such as RAID 5 array.
(4) If tempdb becomes a bottleneck within the system, you should move it to a dedicated storage array to reduce the disk connection.
3. filegroups
(1) filegroups are the most overlooked structure within a database.
(2) Add filegroup and move tempdb Database

Lesson 3: planning a database migration strategy
1. Standby categories
(1) You can have three different categories of standby technology: Hot, warm and cold. The standby category that a participant technology fits into does not have to do with the following:
Time
Proximity
Scalability
Complexity
How fast the failover operation is
(2) Cold Standby. is not relevant for high-availability ubuntures. this is a spare server that you can employ if the primary server fails. it does not necessarily have any software installed or hardware configured and is not processing any updates or data
(3) warm standby. if it requires a manual process to fail over. even if a technology automatically detects an error, if the technology does not have a built-in mechanic to automatically fail over, it is a warm standby
(4) Hot Standby. provides automatic failure detection as well as an automatic failover.
(5) Sample
Grouping ing operation state standby category
High Performance warm standby
High Protection warm standby
High Availability hot standby
If witness unavailable warm standby
2. process change
(1) The most significant step that can be taken for availability is to continuously evaluate and make improvements to processes and operational procedures.
(2) continuously reviewing and monitoring security helps ensure that database don't become unavailable because of security breaches.
Implement DDL triggers to role y an administrator any time a permission is granted or revoked directly using a grant statement or indirectly through role membership
Implement DDL triggers to policy administrators when logins, database users, schemas, or certificates are created, modified, or dropped.
All DDL events that enable encryption showould trigger a notification so that DBAs can ensure that the proper master keys and certificates are backed up as well as created on any standby system
(3) tracking the creation, alteration, or deletion of any object within your SQL Server instances ensure that DBAs are always aware of any changes to databases and can address unauthorized changes immediately.
(4) If you do not have change control processes in place, you need to implement at least a system to document the changes as a first step. your change control procedure needs to undergo periodic review to ensure that current procedures still meet biz objectives.
(5) At a minimum, you need to review all processes and procedure within your environment that allow high availability to occur every three months.
(6) Database backups need to be periodically reviewed to ensure that restore operations can still occur within an acceptable time frames.
3. Technology Implementation
(1) deploy a log shipping or database processing ing Solution
(2) replication Solution
(3) failover clustering Solution
(4) A migration cannot be started unless you already have very detailed documentation. detailed documentation that lists all the security accounts, security settings, configuration options, databases, instance-level objects, DTS Packages, SSIS packages, remote/linked servers, and so on have to be compiled

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.