Shared Flashcard Set

Details

DBA, Chapter 16 - final
Log Shipping
14
Computer Science
Undergraduate 4
04/12/2011

Additional Computer Science Flashcards

 


 

Cards

Term
Log Shipping works on what level?
Definition
Database Level
Term
Can you have log shipping within the same instance?
Definition
Yes
Term
Log Shipping is usually deployed with either _______ or _________
Definition
Failover Clustering or Database Mirroring
Term
log-shipping does not take into account any _______ that might exist
Definition
cross-database dependencies
Term
the secondary database can be in two different modes: _______ or ______
Definition
Standby Mode or No Recovery Mode
Term
what's the caveat of having the secondary database on Standby Mode?
Definition
You cannot restore while users are connected
Term
What's the caveat of No Recovery mode?
Definition
users can't read from it
Term
what are three components of log shipping and what are their purposes?
Definition
1. Primary Database: Accessible and Accepts transactions
2. Secondary DB has a continuous chain of transaction logs applied to it to keep it current with the primary
3. The monitor instance sends alerts when the log shipping session is out of sync
Term
Log Shipping relies on jobs being run by ________
Definition
SQL Server Agent
Term
what is the data loss exposure on log shipping?
Definition
twice the interval of the transaction log backups
Term
because a db cannot stand on its own, what else should you copy to the secondary
Definition
Instance Level Objects
Security Objects
Linked Servers
SSIS packages
Endpoints
SQL Server Agent objects
Instance level DDL Triggers
Term
In log shipping, failure detection and failover are _______ operations.
Definition
manual
Term
what is the log shipping failover process?
Definition
1. Restore any transaction logs to make the secondary as current as possible
2. Restore the last tran log using the WITH RECOVERY option
3. Execute ALTER LOGIN for each SQL Server login on the secondary to remap db users to appropriate logins
4. if necessary, start endpoints
5. verify security permissions
6. Change connection strings on applications to point to secondary
7. Start any jobs that are needed, such as the database backup
Term
when the original primary is repaired - it should be _________
Definition
demoted to secondary
Supporting users have an ad free experience!