Solved

MS SQL Server 2008 Clustering

Posted on 2012-03-30
1
189 Views
Last Modified: 2012-04-10
Hi,
I am looking for a details on how MS windows clustering works forSQL server clustering.

What is shared nothing architecture? What is Quorum?

Thanks
0
Comment
Question by:crazywolf2010
1 Comment
 
LVL 28

Accepted Solution

by:
Ryan McCauley earned 500 total points
ID: 37794105
As a general overview, here's my favorite walk-through, which takes you through clustering Windows Server and then clustering SQL Server on top of it, and explains the steps in a reasonable amount of details as it goes along:

http://dbperf.wordpress.com/2010/07/10/walkthrough-cluster-setup-sql-win-2008/

There's also a brief walk-through/explanation on this MSDN blog that gives some more details, though it's not SQL Server specific:

http://blogs.msdn.com/b/clustering/archive/2008/01/18/7151154.aspx

To your specific questions, though:

Shared Nothing: This just means that there's no single component whose failure would cause downtime for a clustered application. For example, in a two node cluster with a quorum drive, a failure of the quorum disk (or the connection to it) would cause a failure of the clustered applications. However, if you add a third node to the cluster, it can fall back to node majority using networking, so you gain some reliability.

What is quorum: Usually this is a physical disk (a LUN on your SAN or a shared disk in your drive cage) that the cluster nodes use to help determine who is in charge of what applications (they also use the network, but the disk exists as a fallback). Clustering Windows Server, at least in the default configuration, requires a Quorum disk. You can switch the cluster model to "node majority", but there are risks involved, especially for smaller clusters.

What are you wanting to learn - how clustering works as a concept, the specific aspects of how clustering impacts SQL Server's operation, or something else?
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In SQL Server, when rows are selected from a table, does it retrieve data in the order in which it is inserted?  Many believe this is the case. Let us try to examine for ourselves with an example. To get started, use the following script, wh…
In this article I will describe the Backup & Restore method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question