Standby Servers: Log-Shipping vs Replication

Standby Servers: Log-Shipping vs Replication

 

http://www.sqlservercentral.com/articles/Replication/logshippingvsreplication/1399/

Many previous articles on log-shipping and replication have concentrated on solving set-up and configuration issues. This article outlines the differences between them, for the purposes of maintaining a standby server. To put this in context,log-shipping and replication are two methods which are often compared to clustering , however clustering is really a technology created to solve a different business requirement - that of automatic fail-over. In solving this requirement it has some intrinsic restrictions: the distance between nodes is extremely limited meaning  the entire system must be in the same geographic location, and the data itself physically resides in one place. This latter point sounds obvious, but consequently there is no possibility of using the topology to distribute query load e.g. to have a reporting server . On the more prosaic side it also has a reputation as being relatively difficult to set up and maintain and the licenses required are not cheap. So, many DBAs take advantage of their existing skill set to implement a methodology which maintains a standby server, accept that fail-over will be a manual process but hope to gain the bonus of having standalone reporting capability. Commonly the choice is between log-shipping and replication, but one needs a clear understanding of which methodology is the more appropriate. The table below outlines some of the key differences, which are then explained further.

 

 Log-Shipping Replication
What is the latency? >1minPotentially as low as a few seconds
Is the schema altered at the publisher? No Snapshot - no
Transactional - no
Updating subscribers or merge - yes
Is the schema altered at the subscriber? NoPossibly (see text)
Are there schema requirements? NonePrimary keys required for transactional table articles
Can we select individual articles? No Yes
Is the subscriber/standby database 'protected'? Yes No
Is system data transferred? MostlyNo
Is the subscriber/standby server useable as reporting server? Unlikely (see text)Yes

What is the latency?

Log-shipping can backup once every minute and the copy and load frequency can also be every minute. If you use transactional replication or merge replication, the latency can be as low as a few seconds, assuming the relevant -POLLINGINTERVAL agent parameters are minimized. Snapshot replication will have a much higher latency as it requires an exclusive lock on the publisher's replicated tables - consequently it is often considered an offline solution.

Is the schema altered at the publisher?  

Log-shipping and snapshot replication do not alter the publisher's schema. Updating subscribers (transactional and snapshot) and merge replication will add a guid column if there isn't one there already with the rowguid property. This may cause some queries on the publisher to fail, e.g. if you had TSQL inside a stored procedure which did the following:

INSERT INTO ExistingTable
SELECT * FROM ReplicatedTable

Is the schema altered at the subscriber?  

Log-shipping makes no alterations to the schema. Snapshot and transactional replication may make subtle schema changes; standard transactional and snapshot will not transfer identity attributes - they become normal numerical columns (int, smallint, numeric...) on the subscriber. Some DBAs try to get round this by doing a nosync initialization and ensuring the table on the subscriber has the Identity 'Yes (Not for Replication)' attribute, which essentially allows the replication process to do identity inserts. However, on use of the fail-over server this methodology fails as the internal identity counter has not been incremented, and use of DBCC CHECKIDENT to reseed may not work on columns created with this attribute (see BOL). This problem is not apparent if merge or queued updating subscribers are selected.

Are there schema requirements?

There are no requirements for log-shipping whereas all forms of transactional replication require primary keys on table articles.

Can we select individual articles?  

Log-shipping takes the whole set of tables, stored procedures, triggers etc existing in the published database, while replication has the granularity to select articles individually.

Is the Standby database 'protected'?  

Log-shipping restores the logs to the standby server with NoRecovery or with Standby - both options disallow edits to be made to the data . Replication doesn't enforce such a restriction so explicit permissions would be required to prevent changes to subscriber data.

Is system data transferred?  

A front-end application usually requires the presence of some system data. What I am referring to here is data in the system catalog or the database catalog: logins, messages, users, permissions etc. In the case of log-shipping, the database catalog is transferred but not the system catalog, while replication transfers neither.

Is the subscriber/standby server useable as reporting server?

Log-shipping can't usually allow the standby server to be used for reporting as it requires an exclusive lock on the database to restore the log i.e. during the restore users will be forcibly removed, or the log-shipping job will fail. Replication can allow reporting queries to be run, and as typically concurrent replication is not a big resource drain, such queries usually run quickly.

Conclusions

Hopefully this article provides enough info to make a more informative choice. Although this is a little simplistic, generally I recommend log-shipping for fail-over , followed by transactional replication with queued updating subscribers. The order is reversed if there is a possibility of needing to go back to the production server once it is repaired (in which case one can simply run the queue reader agent) or if there is a requirement for a standby server to function additionally  as a reporting server.

Paul Ibison, http://ssisblog.replicationanswers.com/

June 2004

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
目标检测(Object Detection)是计算机视觉领域的一个核心问题,其主要任务是找出图像中所有感兴趣的目标(物体),并确定它们的类别和位置。以下是对目标检测的详细阐述: 一、基本概念 目标检测的任务是解决“在哪里?是什么?”的问题,即定位出图像中目标的位置并识别出目标的类别。由于各类物体具有不同的外观、形状和姿态,加上成像时光照、遮挡等因素的干扰,目标检测一直是计算机视觉领域最具挑战性的任务之一。 二、核心问题 目标检测涉及以下几个核心问题: 分类问题:判断图像中的目标属于哪个类别。 定位问题:确定目标在图像中的具体位置。 大小问题:目标可能具有不同的大小。 形状问题:目标可能具有不同的形状。 三、算法分类 基于深度学习的目标检测算法主要分为两大类: Two-stage算法:先进行区域生成(Region Proposal),生成有可能包含待检物体的预选框(Region Proposal),再通过卷积神经网络进行样本分类。常见的Two-stage算法包括R-CNN、Fast R-CNN、Faster R-CNN等。 One-stage算法:不用生成区域提议,直接在网络中提取特征来预测物体分类和位置。常见的One-stage算法包括YOLO系列(YOLOv1、YOLOv2、YOLOv3、YOLOv4、YOLOv5等)、SSD和RetinaNet等。 四、算法原理 以YOLO系列为例,YOLO将目标检测视为回归问题,将输入图像一次性划分为多个区域,直接在输出层预测边界框和类别概率。YOLO采用卷积网络来提取特征,使用全连接层来得到预测值。其网络结构通常包含多个卷积层和全连接层,通过卷积层提取图像特征,通过全连接层输出预测结果。 五、应用领域 目标检测技术已经广泛应用于各个领域,为人们的生活带来了极大的便利。以下是一些主要的应用领域: 安全监控:在商场、银行
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值