
Introducing Microsoft SQL Server 2016 Mission-Critical Applications, Deeper Insights, Hyperscale Cloud Preview 2 Stacia Varga, Denny Cherry, Joseph D’Antoni Introducing Microsoft SQL Server 2016 Mission-Critical Applications, Deeper Insights, Hyperscale Cloud Preview 2 Stacia Varga, Denny Cherry, and Joseph D’Antoni PUBLISHED BY Microsoft Press A division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2016 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-1-5093-0193-5 Printed and bound in the United States of America. First Printing Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at [email protected]. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com on the “Trademarks” webpage are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions and Developmental Editor: Devon Musgrave Project Editor: John Pierce Editorial Production: Flyingspress Cover: Twist Creative Seattle Contents at a glance Chapter 2 Better security 1 Chapter 3 Higher availability 20 Chapter 4 Improved database engine 35 Chapter 6 More analytics 50 Chapter 7 Better reporting 77 Contents Chapter 2 Better security ........................................................................................................................ 1 Always Encrypted ..................................................................................................................................................................... 1 Getting started with Always Encrypted ...................................................................................................................... 1 Creating a table with encrypted values ...................................................................................................................... 7 CREATE TABLE statement for encrypted columns ................................................................................................. 7 Migrating existing tables to Always Encrypted ....................................................................................................... 9 Row-Level Security ............................................................................................................................................................... 11 Creating inline table functions .................................................................................................................................... 11 Creating security policies .............................................................................................................................................. 14 Using block predicates ................................................................................................................................................... 15 Dynamic data masking ....................................................................................................................................................... 15 Dynamic data masking of a new table .................................................................................................................... 16 Dynamic data masking of an existing table .......................................................................................................... 16 Understanding dynamic data masking and permissions ................................................................................. 17 Masking encrypted values ............................................................................................................................................ 18 Using dynamic data masking in SQL Database.................................................................................................... 18 Chapter 3 Higher availability ............................................................................................................... 20 AlwaysOn Availability Groups .......................................................................................................................................... 20 Supporting disaster recovery with basic availability groups........................................................................... 21 Using group Managed Service Accounts ............................................................................................................... 23 Triggering failover at the database level ................................................................................................................ 23 Supporting distributed transactions ......................................................................................................................... 24 Scaling out read workloads .......................................................................................................................................... 25 Defining automatic failover targets .......................................................................................................................... 26 Reviewing the improved log transport performance ........................................................................................ 27 Windows Server 2016 Technical Preview high-availability enhancements .................................................... 28 Creating workgroup clusters ....................................................................................................................................... 28 Configuring a cloud witness ........................................................................................................................................ 29 Using Storage Spaces Direct ....................................................................................................................................... 32 iv Introducing site-aware failover clusters .................................................................................................................. 32 Windows Server Failover Cluster logging .............................................................................................................. 33 Performing rolling cluster operating system upgrades .................................................................................... 33 Chapter 4 Improved database engine ................................................................................................ 35 TempDB enhancements ..................................................................................................................................................... 35 Configuring data files for TempDB ........................................................................................................................... 36 Eliminating specific trace flags .................................................................................................................................... 37 Query Store ............................................................................................................................................................................. 38 Enabling Query Store...................................................................................................................................................... 38 Understanding Query Store components .............................................................................................................. 39 Reviewing information in the query store .............................................................................................................. 40 Using Force Plan ............................................................................................................................................................... 42 Managing the query store ............................................................................................................................................ 43 Tuning with the query store ........................................................................................................................................ 44 Stretch Database ................................................................................................................................................................... 44 Understanding Stretch Database architecture ..................................................................................................... 45 Security and Stretch Database .................................................................................................................................... 45 Identifying tables for Stretch Database ................................................................................................................... 46 Configuring Stretch Database ....................................................................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages107 Page
-
File Size-