- SQL Server Reference Guide
- Introduction
- SQL Server Reference Guide Overview
- Table of Contents
- Microsoft SQL Server Defined
- SQL Server Editions
- SQL Server Access
- Informit Articles and Sample Chapters
- Online Resources
- Microsoft SQL Server Features
- SQL Server Books Online
- Clustering Services
- Data Transformation Services (DTS) Overview
- Replication Services
- Database Mirroring
- Natural Language Processing (NLP)
- Analysis Services
- Microsot SQL Server Reporting Services
- XML Overview
- Notification Services for the DBA
- Full-Text Search
- SQL Server 2005 - Service Broker
- Using SQL Server as a Web Service
- SQL Server Encryption Options Overview
- SQL Server 2008 Overview
- SQL Server 2008 R2 Overview
- SQL Azure
- The Utility Control Point and Data Application Component, Part 1
- The Utility Control Point and Data Application Component, Part 2
- Microsoft SQL Server Administration
- The DBA Survival Guide: The 10 Minute SQL Server Overview
- Preparing (or Tuning) a Windows System for SQL Server, Part 1
- Preparing (or Tuning) a Windows System for SQL Server, Part 2
- Installing SQL Server
- Upgrading SQL Server
- SQL Server 2000 Management Tools
- SQL Server 2005 Management Tools
- SQL Server 2008 Management Tools
- SQL Azure Tools
- Automating Tasks with SQL Server Agent
- Run Operating System Commands in SQL Agent using PowerShell
- Automating Tasks Without SQL Server Agent
- Storage – SQL Server I/O
- Service Packs, Hotfixes and Cumulative Upgrades
- Tracking SQL Server Information with Error and Event Logs
- Change Management
- SQL Server Metadata, Part One
- SQL Server Meta-Data, Part Two
- Monitoring - SQL Server 2005 Dynamic Views and Functions
- Monitoring - Performance Monitor
- Unattended Performance Monitoring for SQL Server
- Monitoring - User-Defined Performance Counters
- Monitoring: SQL Server Activity Monitor
- SQL Server Instances
- DBCC Commands
- SQL Server and Mail
- Database Maintenance Checklist
- The Maintenance Wizard: SQL Server 2000 and Earlier
- The Maintenance Wizard: SQL Server 2005 (SP2) and Later
- The Web Assistant Wizard
- Creating Web Pages from SQL Server
- SQL Server Security
- Securing the SQL Server Platform, Part 1
- Securing the SQL Server Platform, Part 2
- SQL Server Security: Users and other Principals
- SQL Server Security – Roles
- SQL Server Security: Objects (Securables)
- Security: Using the Command Line
- SQL Server Security - Encrypting Connections
- SQL Server Security: Encrypting Data
- SQL Server Security Audit
- High Availability - SQL Server Clustering
- SQL Server Configuration, Part 1
- SQL Server Configuration, Part 2
- Database Configuration Options
- 32- vs 64-bit Computing for SQL Server
- SQL Server and Memory
- Performance Tuning: Introduction to Indexes
- Statistical Indexes
- Backup and Recovery
- Backup and Recovery Examples, Part One
- Backup and Recovery Examples, Part Two: Transferring Databases to Another System (Even Without Backups)
- SQL Profiler - Reverse Engineering An Application
- SQL Trace
- SQL Server Alerts
- Files and Filegroups
- Partitioning
- Full-Text Indexes
- Read-Only Data
- SQL Server Locks
- Monitoring Locking and Deadlocking
- Controlling Locks in SQL Server
- SQL Server Policy-Based Management, Part One
- SQL Server Policy-Based Management, Part Two
- SQL Server Policy-Based Management, Part Three
- Microsoft SQL Server Programming
- An Outline for Development
- Database
- Database Services
- Database Objects: Databases
- Database Objects: Tables
- Database Objects: Table Relationships
- Database Objects: Keys
- Database Objects: Constraints
- Database Objects: Data Types
- Database Objects: Views
- Database Objects: Stored Procedures
- Database Objects: Indexes
- Database Objects: User Defined Functions
- Database Objects: Triggers
- Database Design: Requirements, Entities, and Attributes
- Business Process Model Notation (BPMN) and the Data Professional
- Business Questions for Database Design, Part One
- Business Questions for Database Design, Part Two
- Database Design: Finalizing Requirements and Defining Relationships
- Database Design: Creating an Entity Relationship Diagram
- Database Design: The Logical ERD
- Database Design: Adjusting The Model
- Database Design: Normalizing the Model
- Creating The Physical Model
- Database Design: Changing Attributes to Columns
- Database Design: Creating The Physical Database
- Database Design Example: Curriculum Vitae
- NULLs
- The SQL Server Sample Databases
- The SQL Server Sample Databases: pubs
- The SQL Server Sample Databases: NorthWind
- The SQL Server Sample Databases: AdventureWorks
- The SQL Server Sample Databases: Adventureworks Derivatives
- UniversalDB: The Demo and Testing Database, Part 1
- UniversalDB: The Demo and Testing Database, Part 2
- UniversalDB: The Demo and Testing Database, Part 3
- UniversalDB: The Demo and Testing Database, Part 4
- Getting Started with Transact-SQL
- Transact-SQL: Data Definition Language (DDL) Basics
- Transact-SQL: Limiting Results
- Transact-SQL: More Operators
- Transact-SQL: Ordering and Aggregating Data
- Transact-SQL: Subqueries
- Transact-SQL: Joins
- Transact-SQL: Complex Joins - Building a View with Multiple JOINs
- Transact-SQL: Inserts, Updates, and Deletes
- An Introduction to the CLR in SQL Server 2005
- Design Elements Part 1: Programming Flow Overview, Code Format and Commenting your Code
- Design Elements Part 2: Controlling SQL's Scope
- Design Elements Part 3: Error Handling
- Design Elements Part 4: Variables
- Design Elements Part 5: Where Does The Code Live?
- Design Elements Part 6: Math Operators and Functions
- Design Elements Part 7: Statistical Functions
- Design Elements Part 8: Summarization Statistical Algorithms
- Design Elements Part 9:Representing Data with Statistical Algorithms
- Design Elements Part 10: Interpreting the Data—Regression
- Design Elements Part 11: String Manipulation
- Design Elements Part 12: Loops
- Design Elements Part 13: Recursion
- Design Elements Part 14: Arrays
- Design Elements Part 15: Event-Driven Programming Vs. Scheduled Processes
- Design Elements Part 16: Event-Driven Programming
- Design Elements Part 17: Program Flow
- Forming Queries Part 1: Design
- Forming Queries Part 2: Query Basics
- Forming Queries Part 3: Query Optimization
- Forming Queries Part 4: SET Options
- Forming Queries Part 5: Table Optimization Hints
- Using SQL Server Templates
- Transact-SQL Unit Testing
- Index Tuning Wizard
- Unicode and SQL Server
- SQL Server Development Tools
- The SQL Server Transact-SQL Debugger
- The Transact-SQL Debugger, Part 2
- Basic Troubleshooting for Transact-SQL Code
- An Introduction to Spatial Data in SQL Server 2008
- Performance Tuning
- Performance Tuning SQL Server: Tools and Processes
- Performance Tuning SQL Server: Tools Overview
- Creating a Performance Tuning Audit - Defining Components
- Creating a Performance Tuning Audit - Evaluation Part One
- Creating a Performance Tuning Audit - Evaluation Part Two
- Creating a Performance Tuning Audit - Interpretation
- Creating a Performance Tuning Audit - Developing an Action Plan
- Understanding SQL Server Query Plans
- Performance Tuning: Implementing Indexes
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 1
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 2
- Performance Monitoring Tools: Windows System Monitor
- Performance Monitoring Tools: Logging with System Monitor
- Performance Monitoring Tools: User Defined Counters
- General Transact-SQL (T-SQL) Performance Tuning, Part 1
- General Transact-SQL (T-SQL) Performance Tuning, Part 2
- General Transact-SQL (T-SQL) Performance Tuning, Part 3
- Performance Monitoring Tools: An Introduction to SQL Profiler
- Performance Tuning: Introduction to Indexes
- Performance Monitoring Tools: SQL Server 2000 Index Tuning Wizard
- Performance Monitoring Tools: SQL Server 2005 Database Tuning Advisor
- Performance Monitoring Tools: SQL Server Management Studio Reports
- Performance Monitoring Tools: SQL Server 2008 Activity Monitor
- The SQL Server 2008 Management Data Warehouse and Data Collector
- Performance Monitoring Tools: Evaluating Wait States with PowerShell and Excel
- Practical Applications
- Choosing the Back End
- The DBA's Toolbox, Part 1
- The DBA's Toolbox, Part 2
- Scripting Solutions for SQL Server
- Building a SQL Server Lab
- Using Graphics Files with SQL Server
- Enterprise Resource Planning
- Customer Relationship Management (CRM)
- Building a Reporting Data Server
- Building a Database Documenter, Part 1
- Building a Database Documenter, Part 2
- Data Management Objects
- Data Management Objects: The Server Object
- Data Management Objects: Server Object Methods
- Data Management Objects: Collections and the Database Object
- Data Management Objects: Database Information
- Data Management Objects: Database Control
- Data Management Objects: Database Maintenance
- Data Management Objects: Logging the Process
- Data Management Objects: Running SQL Statements
- Data Management Objects: Multiple Row Returns
- Data Management Objects: Other Database Objects
- Data Management Objects: Security
- Data Management Objects: Scripting
- Powershell and SQL Server - Overview
- PowerShell and SQL Server - Objects and Providers
- Powershell and SQL Server - A Script Framework
- Powershell and SQL Server - Logging the Process
- Powershell and SQL Server - Reading a Control File
- Powershell and SQL Server - SQL Server Access
- Powershell and SQL Server - Web Pages from a SQL Query
- Powershell and SQL Server - Scrubbing the Event Logs
- SQL Server 2008 PowerShell Provider
- SQL Server I/O: Importing and Exporting Data
- SQL Server I/O: XML in Database Terms
- SQL Server I/O: Creating XML Output
- SQL Server I/O: Reading XML Documents
- SQL Server I/O: Using XML Control Mechanisms
- SQL Server I/O: Creating Hierarchies
- SQL Server I/O: Using HTTP with SQL Server XML
- SQL Server I/O: Using HTTP with SQL Server XML Templates
- SQL Server I/O: Remote Queries
- SQL Server I/O: Working with Text Files
- Using Microsoft SQL Server on Handheld Devices
- Front-Ends 101: Microsoft Access
- Comparing Two SQL Server Databases
- English Query - Part 1
- English Query - Part 2
- English Query - Part 3
- English Query - Part 4
- English Query - Part 5
- RSS Feeds from SQL Server
- Using SQL Server Agent to Monitor Backups
- Reporting Services - Creating a Maintenance Report
- SQL Server Chargeback Strategies, Part 1
- SQL Server Chargeback Strategies, Part 2
- SQL Server Replication Example
- Creating a Master Agent and Alert Server
- The SQL Server Central Management System: Definition
- The SQL Server Central Management System: Base Tables
- The SQL Server Central Management System: Execution of Server Information (Part 1)
- The SQL Server Central Management System: Execution of Server Information (Part 2)
- The SQL Server Central Management System: Collecting Performance Metrics
- The SQL Server Central Management System: Centralizing Agent Jobs, Events and Scripts
- The SQL Server Central Management System: Reporting the Data and Project Summary
- Time Tracking for SQL Server Operations
- Migrating Departmental Data Stores to SQL Server
- Migrating Departmental Data Stores to SQL Server: Model the System
- Migrating Departmental Data Stores to SQL Server: Model the System, Continued
- Migrating Departmental Data Stores to SQL Server: Decide on the Destination
- Migrating Departmental Data Stores to SQL Server: Design the ETL
- Migrating Departmental Data Stores to SQL Server: Design the ETL, Continued
- Migrating Departmental Data Stores to SQL Server: Attach the Front End, Test, and Monitor
- Tracking SQL Server Timed Events, Part 1
- Tracking SQL Server Timed Events, Part 2
- Patterns and Practices for the Data Professional
- Managing Vendor Databases
- Consolidation Options
- Connecting to a SQL Azure Database from Microsoft Access
- SharePoint 2007 and SQL Server, Part One
- SharePoint 2007 and SQL Server, Part Two
- SharePoint 2007 and SQL Server, Part Three
- Querying Multiple Data Sources from a Single Location (Distributed Queries)
- Importing and Exporting Data for SQL Azure
- Working on Distributed Teams
- Professional Development
- Becoming a DBA
- Certification
- DBA Levels
- Becoming a Data Professional
- SQL Server Professional Development Plan, Part 1
- SQL Server Professional Development Plan, Part 2
- SQL Server Professional Development Plan, Part 3
- Evaluating Technical Options
- System Sizing
- Creating a Disaster Recovery Plan
- Anatomy of a Disaster (Response Plan)
- Database Troubleshooting
- Conducting an Effective Code Review
- Developing an Exit Strategy
- Data Retention Strategy
- Keeping Your DBA/Developer Job in Troubled Times
- The SQL Server Runbook
- Creating and Maintaining a SQL Server Configuration History, Part 1
- Creating and Maintaining a SQL Server Configuration History, Part 2
- Creating an Application Profile, Part 1
- Creating an Application Profile, Part 2
- How to Attend a Technical Conference
- Tips for Maximizing Your IT Budget This Year
- The Importance of Blue-Sky Planning
- Application Architecture Assessments
- Transact-SQL Code Reviews, Part One
- Transact-SQL Code Reviews, Part Two
- Cloud Computing (Distributed Computing) Paradigms
- NoSQL for the SQL Server Professional, Part One
- NoSQL for the SQL Server Professional, Part Two
- Object-Role Modeling (ORM) for the Database Professional
- Business Intelligence
- BI Explained
- Developing a Data Dictionary
- BI Security
- Gathering BI Requirements
- Source System Extracts and Transforms
- ETL Mechanisms
- Business Intelligence Landscapes
- Business Intelligence Layouts and the Build or Buy Decision
- A Single Version of the Truth
- The Operational Data Store (ODS)
- Data Marts – Combining and Transforming Data
- Designing Data Elements
- The Enterprise Data Warehouse — Aggregations and the Star Schema
- On-Line Analytical Processing (OLAP)
- Data Mining
- Key Performance Indicators
- BI Presentation - Client Tools
- BI Presentation - Portals
- Implementing ETL - Introduction to SQL Server 2005 Integration Services
- Building a Business Intelligence Solution, Part 1
- Building a Business Intelligence Solution, Part 2
- Building a Business Intelligence Solution, Part 3
- Tips and Troubleshooting
- SQL Server and Microsoft Excel Integration
- Tips for the SQL Server Tools: SQL Server 2000
- Tips for the SQL Server Tools – SQL Server 2005
- Transaction Log Troubles
- SQL Server Connection Problems
- Orphaned Database Users
- Additional Resources
- Tools and Downloads
- Utilities (Free)
- Tool Review (Free): DBDesignerFork
- Aqua Data Studio
- Microsoft SQL Server Best Practices Analyzer
- Utilities (Cost)
- Quest Software's TOAD for SQL Server
- Quest Software's Spotlight on SQL Server
- SQL Server on Microsoft's Virtual PC
- Red Gate SQL Bundle
- Microsoft's Visio for Database Folks
- Quest Capacity Manager
- SQL Server Help
- Visual Studio Team Edition for Database Professionals
- Microsoft Assessment and Planning Solution Accelerator
- Aggregating Server Data from the MAPS Tool
I have several sections in this Guide, from Administration to Programming, and points in between. The activity I describe in this overview has so many applications, I wasn’t sure where to put it it’s that important. I decided on the Professional Development section, since this part of the Guide is devoted to helping you advance your career. Application Profiling is not strictly a database administrator or developer activity it’s an architectural discipline that will help set you apart from the average IT worker. And as I’ve mentioned before, it’s a perfect role for the data professional, since we are the ultimate custodians of the organization’s information.
Interestingly, many people don’t either know how to do a proper application profile or don’t know how important it really is to the other activities they do. It is completely integral to performance tuning, disaster recovery, hardware planning and more. Many shops in fact do perform parts of an application profile when they implement one of those initiatives, but since they only focus on one aspect, they end up having to repeat the work for the next initiative.
In this two-part overview, I’ll explain what an application profile is, and how you can perform one for your environment. You’ll learn which elements are important for all profiles, and which you might care about for a particular purpose. At the end of this exercise, you should be able to create your own application profile, which will not look like any other application profile does at another shop and that’s completely acceptable. Your situation will dictate the elements you care about and the format and presentation you want to use to best serve your organization.
Definition
An application profile is a description of the computer programs running in your organization. It includes information needed to ensure that you are licensed and legal, you know the performance requirements and patterns in the application, and that you have planned for high availability and disaster recovery. This means you’ll have information that involves how important the application is to the organization, how it is secured and other elements. You decide how deep you need to go with the information, and each application might have different levels of detail depending on the need.
Keeping it Current
It’s important that this information is up-to-date. I’ve seen organizations embark on a profiling effort because a certain driver (compliance with a set of accounting laws here in the U.S. normally drives this) and then “go stale” because no one kept up with it. If you make the information too detailed and if you don’t set up a methodology to make sure all responsible parties know when and how to update it, you’re not getting the full benefit of the data.
The point is, make sure you make it easy to create, update and report on the data. If you don’t, it won’t be kept up to date. It’s just that simple.
Storage and Presentation
There are a lot of ways to store this data. In fact, as you’ll discover, you probably have much of this data stored already, although perhaps in various locations.
I recommend a database (I’m sure you saw that coming) and I’ve even detailed out a methodology for storing IT data in a central location using SQL Server 2008 called the Central Management System, or SQL CMS. You can read about that project on my Codeplex project site. The interesting thing about using that system is that you will already have performance and storage data there, so linking the application data to that allows for rich reporting and analysis.
The SQL CMS also permits integration into systems you already have, such as Microsoft’s System Center or other IT compliance software. And by linking this information and adding only the elements you need, updating and access is made much easier.
If your needs are simpler, you can just use a spreadsheet. It provides analysis and reporting, although with more “hard wiring,” and it takes more effort to keep it up to date. And as a wise friend once taught me, the harder something is to do, the less likely you are to do it. It’s that simple.
In any case, make sure that you think the process through, and protect the data as you would any application. Ensure that only the proper access is granted, and make sure you back it up and maintain it effectively.
Reasons to Implement an Application Profiling Effort
I’ve mentioned one of the reasons you want to profile the applications in your organization compliance with accounting or other laws. You also need this information for a performance tuning exercise. I’ve seen several shops start to tune a database without a comprehensive examination of the data path from the application to the database. When you create an application profile, you already have that information, and performance tuning as well as troubleshooting are much simpler.
Another reason to detail the applications in your organization is consolidation. There are lots of ways to consolidate your IT infrastructure, and one that many people don’t consider is application de-duplication. You may find, as you perform this analysis, that you have two or more applications that do the same kind of work. If you simply collapsed those into one application, you save licensing, maintenance, data storage and more. The best kind of consolidation or performance tuning is to remove the work altogether.
Security is another reason to profile your applications. Knowing what data is stored where, and who has access to it, is crucial to a good security strategy.
And of course the largest driver for application profiling is high-availability and disaster recovery. Both of those are sometimes gathered under a “Business Continuity” plan that your organization maintains in case of a catastrophe.
Any of these reasons are enough to make the effort worthwhile. All of them together make it essential.
Elements of an Application Profile
You don’t have to go to a very detailed level for every application. While most Office Productivity (Like Microsoft Office) applications are required for the business, they are often used locally, and data is stored outside the database. So while you want to store the name, license count, and installed base in a system, it might not be as important for performance tuning, for instance.
However even Office Productivity applications might store their data in a database. Every time the users set up Microsoft SharePoint document libraries, for instance, they are storing some data in a database. That means it’s up to you to track it, secure it, make it available, back it up and so on. So make sure you include at least the names and locations these applications are installed so that you are sure being thorough in your examination.
As far as the level of detail required, that will be up to you. I normally include more detail for those applications my organization deems “mission critical.” That means I’ve taken all the application names and purposes to a high-level business strategy meeting and asked the executives to do a “life boat” exercise. I ask them “If I could only keep one application running, which one of these would that be?” After they argue it out, I then ask “What if I could keep another one alive, which one would that be?”, and so on until I have a complete ranking, which the business helps me develop. The top applications have a lot of detail, and the rest have less.
Make sure you include enough detail to make the process worthwhile, and not so much that you won’t maintain it. And by “you” I mean the entire IT organization. If you design the inputs and outputs in a meaningful way you’ll let the person farthest down the chain update the data so it is current, but still accurate.
Application Meta Data
The first element you need to include is of course the application itself. The primary sub-elements are its name and some sort of identifier (which you might already have in System Center or other tracking software), the version, and its general purpose.
More detailed elements might include licensing, the sales location or in the case of open-source software the repository where you got it. Something that is interesting to include is the contact information for the person you dealt with when you bought or obtained the software. You might think that the vendor maintains this information for you, but having that info handy can save you tons of time when you need it.
I also include the date I got the software, and since I’m using a database for this information I normalize the tables where I store it so that I have a history of versions, upgrades and so on. Again, many packages such as System Center already provide this data, you just have to link it to the rest of the elements, which is why that identifier is so important, even if you “home grow” your own system.
Business Value / Risk Assignment
This element, which you might actually break out into two elements, is the result of the ranking exercise I mentioned earlier. I’ve done the first part of the work, which is gathering the names and purposes and licenses of all the applications in my organization, and presented it to the executives. I’ve explained that there are a limited amount of resources available to keep software running, such as servers, storage and people, and they have determined the impact of each application not working. That gives me a business value of “high,” “medium,” and “low, or perhaps “critical,” “important,” “routine,” or some other designation. You can also use numbers to represent those values in case the descriptors change.
The Risk Assessment part could be combined, or perhaps you want to break that out to say that a particular application is more “fragile” than another. Perhaps it takes more resources to operate, is likely to change to another vendor, or some other vector. In that case, assign a risk element to the application data as well.
This element (or both, if you’ve split them) is important to know when you’re doing a consolidation exercise. You don’t want to virtualize, for instance, two highly-critical applications onto the same hardware. That presents far too high a risk to the organization.
This information also helps you when you are evaluating your High-Availability (HA) and Disaster Recovery (DR) strategies. In this case, you need to evaluate the Recovery Point Objective (RPO) and Recovery Time Objective (RTO) goals for this application which make up the next two elements you need to track.
And that’s where we’ll stop for Part One I’ll pick up in Part Two with what RPO and RTO actually mean, and the rest of the elements in an Application Profile.
InformIT Articles and Sample Chapters
Business Continuity isn’t only the purview of the data professional. Rich Schiesser covers the Business Continuity plan in this series on Conducting an Effective Table Top Exercise (TTE).
Books and eBooks
Bruce Michelson has a long relationship with the hardware part of Business Continuity, and his book, Closed Loop Lifecycle Planning®: A Complete Guide to Managing Your PC Fleet, will show you his thoughts on the process.
Online Resources
This entire process fits nicely within the Microsoft Operations Framework, or MOF, which I use a great deal. You can learn a lot at their primary site.