Problem solve Get help with specific problems with your technologies, process and projects.

Replicating SQL Server over the Internet, part 2

Continued from part 1...

To address your security concern while replicating data on different sides of a firewall, it is advantageous to follow the best practices for securing your SQL Servers. For SQL Server security recommendations visit Enterprise SQL Server Auditing and Security Best Practices. This URL is to a recent presentation delivered at the SQL PASS 2003 Community Summit and should serve as a solid foundation. It is also beneficial to work with the ISP and your security department to explore encryption and network security options to properly protect your organization's most valuable asset.

With Yukon, the next release of SQL Server, high availability will be improved with the introduction of database mirroring while being able to continue to leverage the existing SQL Server 2000 features. Database mirroring is very similar to log shipping except with a very short amount of latency between the principal and mirror database which are purportedly managed by a witness. With this technology the two data sets will operate independently with near real-time database transaction log entries passed between the principal and the mirror with the ability to failover in an automated manner within three seconds. This new technology from Microsoft for SQL Server will solve a near real-time data availability need with two independent data sets. For more information visit An Overview of SQL Server Yukon for the DBA.

For More Information

This was last published in February 2004

Dig Deeper on SQL Server Replication

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.