Solved

SQL Server 2008 Replication?

Posted on 2011-09-07
3
223 Views
Last Modified: 2012-05-12
Greetings,

We have a group that has opted to have a SQL Server db server replicated to a SQL Server db server in a cloud host. The problem we have with this is that the local source server has to connect to the target db server via cloud host vpn. Is this a bad idea? Also this group is using merge replication. The db server being hosted in the cloud host serves as a standby server that they light use as well. Should they use log shipping or some sort of transactional replication instead of merge replication? Please advise.
0
Comment
Question by:Omega002
3 Comments
 
LVL 28

Accepted Solution

by:
Ryan McCauley earned 250 total points
ID: 36502998
Merge replication is used when you want transactions hat take place on either server to be replicated to the other. I can't tell from your question, but when people use the replicated server for "light use", will they be making changes or just running read-only reports? If they'll be making changes, Merge replication makes sense, but if it's just read-only, then something like transactional replication would be more appropriate.

I prefer transactional replication, but it requires that a normal SQL connection can be opened, which it sounds like it can. If you can't (or don't want to) open a regular SQL connection, then you can use log shipping to send the logs via FTP or some other method, and then they're applied at the destination.

To answer directly, I don't think running the replication over a VPN to the cloud host is a bad idea - it's probably the safest way to get your data there.
0
 
LVL 39

Assisted Solution

by:lcohan
lcohan earned 250 total points
ID: 36505820
I agree with ryanmccauley and I would definitely use anything else but Merge replication for a  StandBy SQL server on the cloud.

http://msdn.microsoft.com/en-us/library/ms178034.aspx
0
 

Author Comment

by:Omega002
ID: 36506195
You guys provided excellent insight on my questions. Thanks
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I have written a PowerShell script to "walk" the security structure of each SQL instance to find:         Each Login (Windows or SQL)             * Its Server Roles             * Every database to which the login is mapped             * The associated "Database User" for this …
     When we have to pass multiple rows of data to SQL Server, the developers either have to send one row at a time or come up with other workarounds to meet requirements like using XML to pass data, which is complex and tedious to use. There is a …
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now