Date post: | 22-Jul-2015 |
Category: |
Education |
Upload: | julian-castiblanco-p |
View: | 147 times |
Download: | 0 times |
Julián Castiblanco P.http://julycastiblanco.blogspot.com/
MCT-MCITP-MCTS SQL Server 2008/2005
Líder ITPros-DC
SESIÓN 6- Security & Recovery
CONTENIDO DEL CURSO
CONTENIDO DEL CURSO
Seguridad
Server Role
SQL Server Login
Windows Group
Domain User Account
Local User Account
SQL Server
Database
Windows
Securables
Permissions
Principals
User
Database Role
Application Role
Qué es un Principal?
• Resources that can be secured
• Securables are contained within scopes
Server
Database
Schema
Qué son los objetos asegurables?
GRANT, REVOKE, DENY
• GRANT is used to assign a permission
• DENY is used to explicitly deny a permission
– Used where permissions inherited through group or role membership
– Should only be used in exceptional circumstances
• REVOKE removes either a GRANT or a DENY
Grant, Revoke, DENY?
Aseguramiento y Recuperación
Buffer Cache
Data pages are located in,
or read into, the buffer cache
and then modified2
Modification is recorded
in transaction log on disk3
Checkpoint writes
dirty pages
to database
4
Data modification is
sent by application1
Transaction logs provide a history of actions executed by a database management system to guarantee ACID properties
Cómo Funciona el log transaccional?
Backup Types Description
Full All data files and active part of the transaction log
Differential The parts of the database that have changed since the last full database backup
Partial The primary filegroup, every read/write filegroup, and any specified read-only filegroups
Transaction Log Any database changes recorded in the log files
Tail-log Backup Log backup taken of the tail of the log just before a restore operation
File/File Group Specified files or filegroups
Copy Only The database or log (without affecting the backup sequence)
Tipos de Backups?
Full Database Backups:
Backup all data and part of the log records
Can be used to restore the whole database
Permit recovery to backup times only
Sunday Monday Tuesday
Estrategia de Full Backup
BACKUP DATABASEAdventureWorks2008R2 TO DISK ='L:\SQLBackups\AW.bak'
WITH INIT;
• Backup entire database
• Backup active portion of log file
Como se genera un Full Backup
A Database and Transaction Log Backup Strategy:
Involves at least full and transaction log backups
Enables point in time recovery
Database can be fully restored in the case of data file loss
Sunday Monday
Estrategias de Log Back Up
BACKUP LOG AdventureWorks2008R2 TO DISK = 'L:\SQLBackups\AW_Log.bak'WITH NOINIT;
• Backup the transaction log only
• Backs up log from the last successfully executed log backup to the current end of the log
• Truncates inactive log records unless options specified
Note: Database must be in full or bulk-logged recovery model
Creación de un Log Back Up
A Differential Backup Strategy:
Involves performing full and differential database backups
Includes differential backups with only changed data
Is useful if only a subset of a database is modified more frequently than the rest of the database
Monday Tuesday
Estrategias de Backup Diferencial
BACKUP DATABASE AdventureWorks2008R2 TO DISK = 'L:\SQLBackups\AW_Diff.bak'WITH DIFFERENTIAL, INIT;
• Backup the extents changed since the last full database backup
• Store active part of the transaction log to be able to recover the database
• Independent of other differential backups
Note: You cannot create a differential database backup if no full backup has ever been created
Creación de Backup Diferencial