SQL redundancy question

Posted on 2007-10-16
Last Modified: 2010-03-19
I have a 64 bit SQL 2005 server that is running our mission critical program.  I back it up every night but if something bad happened we could loose tens of thousands of dollars per hour until it's back up.

I have some money and approval from the suits to build a redundant system.  I planning on buying another server and sql 2005 and have the Database Mirroring and Failover Clustering configured to always have the system up.

My shares are in a DFS setup and it's working very well.

Is my proposal to build a whole new server the best solution?  Is there a better program to replicate the information between servers?  Can I run the SQL instance in a DFS namespace?
Question by:4Beardog
    LVL 18

    Expert Comment

    You can go two ways:
    1. build a complete Windows cluster, including a SQL Server or
    2. build two separate Servers, run SQL Server on both and mirror the database (you want a third very small SQL Server instance to fulfill the witness role in the mirroring scenario)

    But you need the second machine in both scenarios.

    Hope this helps ...
    LVL 5

    Accepted Solution

    Two things to watch out for (out of the many):

    1. A cluster typically needs to be built from the ground up as only specific hardware can be used. This might impact your existing system.

    2. In a mirrored configuration the speed of the network connecting the principal and the mirror is critical to the performance of the mirror, especially in syncronous mode. I would always recommend a dedicated connection for the mirror running twice as fast as you need - which only testing will determine.

    I prefer the mirrored config as it means you can have a completely seperate system in a different building or location and avoids the issue of the shared disk in a cluster. In a cluster the shared disk is still a Single point of failure.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    I've encountered valid database schemas that do not have a primary key.  For example, I use LogParser from Microsoft to push IIS logs into a SQL database table for processing and analysis.  However, occasionally due to user error or a scheduled task…
    In SQL Server, when rows are selected from a table, does it retrieve data in the order in which it is inserted?  Many believe this is the case. Let us try to examine for ourselves with an example. To get started, use the following script, wh…
    Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    13 Experts available now in Live!

    Get 1:1 Help Now