SQL Server 2014 Hybrid Cloud Features

download SQL Server 2014 Hybrid Cloud Features

of 34

Embed Size (px)



Transcript of SQL Server 2014 Hybrid Cloud Features

  • Cloud Fundamentals
  • Low Control Shared Lowercost Dedicated Highercost High Control Hybrid Cloud SQL Server Physical Machines (raw iron) SQL Server Private Cloud Virtualized Machines+ Appliances SQL Server in WA VM Virtualized Machines Virtualized Databases WA SQL Database
  • The Benefits of the Cloud = Managed for You Standalone Servers IaaS PaaS SaaS Applications Runtimes Database Operating System Virtualization Server Storage Networking
  • Account Blob Table Queue
  • ContainerAccount prpass backups vhds Blob DB001.BAK DB002.BAK VM001.VHD
  • blob DB001.BAK http://prpass.blob.core.windows.net/backups/client001/sales/DB001.BAK BlobContainerAccount prpass backups DB001.BAK DB002.BAK vhds VM001.VHD
  • Azure Publish Settings File Run Windows PowerShell as an administrator as follows: 1.Choose Start, in the Search box, type Windows Powershell. 2.Right-click the Windows PowerShell link, and then choose Run as administrator. At the Windows PowerShell command prompt, type the following command, and then press Enter. Get-AzurePublishSettingsFile A web browser opens at https://windows.azure.com/download/publishprofile.aspx for signing in to Windows Azure. Sign in to the Windows Azure Management Portal, and then follow the instructions to download your Windows Azure publishing settings. Save the file as a .publishsettings type file to your computer.
  • Management Certificate makecert -sky exchange -r -n "CN=[CertificateName]" -pe -a sha1 -len 2048 -ss My "[CertificateName].cer" certmgr.msc
  • SQL Server Credential Record that contains the authentication information (credentials) required to connect to a resource outside SQL Server. --================================== -- Create Credential -- Authenticate with Azure Storage Account --================================== CREATE CREDENTIAL TitanCloud WITH IDENTITY = 'titanazurestorage', SECRET = ';
  • CREATE CREDENTIAL mystoragecred WITH IDENTITY = mystorage', SECRET = BACKUP DATABASE mydb TO URL ='https://mystorage.blob.core.windows.net/backup- container/mydb-20130411.bak' WITH CREDENTIAL = mystoragecred', FORMAT, COMPRESSION, STATS = 5, MEDIANAME = mydb backup 20130411', MEDIADESCRIPTION = 'Backup of mydb' Backup DB to Azure using Microsoft.SqlServer.Management.Smo; Backup mybackup = new Backup(); mybackup.CredentialName = strCredential; mybackup.Database = strDatabase; mybackup.CompressionOption = BackupCompressionOptions.On; mybackup.Devices.AddDevice(desturl, DeviceType.Url); mybackup.SqlBackup(myLocalServer); $url = "https://[storage].blob.core.windows.net/backups/db.bak" $credential = "mycredential" $server = "SQLSERVER:SQL[computer]DEFAULT" CD $server Backup-SqlDatabase -Database AdventureWorks2012 -backupFile $url -SqlCredential $credential -CompressionOption On
  • Main benefit Large scale management and no need to manage backup policy Context-aware e.g. workload/throttling Minimal knobs control retention period Manage whole instance, or particular DBs Leverage Backup to Windows Azure Inherently off-site Geo-redundant Minimal storage costs Zero hardware management Example: EXEC smart_admin.sp_set_db_backup @database_name='TestDB', @storage_url=, @retention_days=30, @credential_name='MyCredential', @enable_backup=1
  • Backup DB to Azure Tool http://www.microsoft.com/en-us/download/details.aspx?id=40740
  • SQL Server Backup to Azure Capabilities
  • Deploy DB to Azure VM Wizard Main benefits Easy to use Perfect for DBAs new to Azure and for ad hoc scenarios Complexity hidden Detailed Azure knowledge is not needed Almost no overhead: the defining factor for time to transfer is DB size
  • SQL Server Data Files in Azure Storage Ability to move data & log files in Windows Azure Storage, while keeping the compute node of SQL Server on-premise Transparent Data Encryption (TDE) is supported No application changes required Centralized copy of data and log files Enjoy unlimited storage capacity in Azure Storage (built in HA, SLA, geo-DR) Secure because TDE encryption key can be stored on-premise Restore database is simply an attach operation
  • Questions?
  • prpass.org twitter.com/prpass facebook.com/prpass