MICROSOFT_PRESS_EBOOK_INTRO_SQL SERVER_2016_PREVIEW_ED_PDF.PDF

(4586 KB) Pobierz
Introducing
Microsoft
SQL Server 2016
Preview 2
Stacia Varga, Denny Cherry, Joseph D’Antoni
Mission-Critical Applications, Deeper Insights,
Hyperscale Cloud
Introducing Microsoft
SQL Server 2016
Mission-Critical Applications,
Deeper Insights, Hyperscale
Cloud
Preview 2
Stacia Varga, Denny Cherry, and
Joseph D’Antoni
PUBLISHED BY
Microsoft Press
A division of Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052-6399
Copyright © 2016 by Microsoft Corporation
All rights reserved. No part of the contents of this book may be reproduced or transmitted in any
form or by any means without the written permission of the publisher.
ISBN: 978-1-5093-0193-5
Printed and bound in the United States of America.
First Printing
Microsoft Press books are available through booksellers and distributors worldwide. If you need
support related to this book, email Microsoft Press Support at mspinput@microsoft.com. Please tell us
what you think of this book at http://aka.ms/tellpress.
This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and
information expressed in this book, including URL and other Internet website references, may change
without notice.
Some examples depicted herein are provided for illustration only and are fictitious. No real association
or connection is intended or should be inferred.
Microsoft and the trademarks listed at http://www.microsoft.com on the “Trademarks” webpage are
trademarks of the Microsoft group of companies. All other marks are property of their respective
owners.
Acquisitions and Developmental Editor:
Devon Musgrave
Project Editor:
John Pierce
Editorial Production:
Flyingspress
Cover:
Twist Creative
Seattle
Contents at a
glance
Chapter 2
Chapter 3
Chapter 4
Chapter 6
Chapter 7
Better security
Higher availability
Improved database engine
More analytics
Better reporting
1
20
35
50
77
Contents
Chapter 2
Better security ........................................................................................................................ 1
Always Encrypted ..................................................................................................................................................................... 1
Getting started with Always Encrypted ...................................................................................................................... 1
Creating a table with encrypted values ...................................................................................................................... 7
CREATE TABLE statement for encrypted columns ................................................................................................. 7
Migrating existing tables to Always Encrypted ....................................................................................................... 9
Row-Level Security ............................................................................................................................................................... 11
Creating inline table functions .................................................................................................................................... 11
Creating security policies .............................................................................................................................................. 14
Using block predicates ................................................................................................................................................... 15
Dynamic data masking ....................................................................................................................................................... 15
Dynamic data masking of a new table .................................................................................................................... 16
Dynamic data masking of an existing table .......................................................................................................... 16
Understanding dynamic data masking and permissions ................................................................................. 17
Masking encrypted values ............................................................................................................................................ 18
Using dynamic data masking in SQL Database.................................................................................................... 18
Chapter 3
Higher availability ............................................................................................................... 20
AlwaysOn Availability Groups .......................................................................................................................................... 20
Supporting disaster recovery with basic availability groups........................................................................... 21
Using group Managed Service Accounts ............................................................................................................... 23
Triggering failover at the database level ................................................................................................................ 23
Supporting distributed transactions ......................................................................................................................... 24
Scaling out read workloads .......................................................................................................................................... 25
Defining automatic failover targets .......................................................................................................................... 26
Reviewing the improved log transport performance ........................................................................................ 27
Windows Server 2016 Technical Preview high-availability enhancements .................................................... 28
Creating workgroup clusters ....................................................................................................................................... 28
Configuring a cloud witness ........................................................................................................................................ 29
Using Storage Spaces Direct ....................................................................................................................................... 32
iv
Zgłoś jeśli naruszono regulamin