Prevent Recovery 
Amnesia Forget The Backups
Prevent Recovery Amnesia - Forget The Backups
Recovery Objectives
RTO 
Amount of time which data or hardware is desired to be 
restored after data corruption or hardware failure 
Usually referred to in 9’s 
• 5 9’s = 99.999 % up time 
• Just over 5 minutes of allowable downtime per year (means 
maintenance) 
• 4 9s = 52.5 minutes 
• 3 9s = 8.75 hrs 
• 5 9s between 9-5 different than 5 9s 24/7
RPO 
Point in time that data can be restored from. 
• Minutes 
• Hours 
• Days 
• Weeks 
Basically – How much work can be lost?
SLA 
RPO & RTO together = Service Level Agreement 
• Need to know for each database you are responsible for 
• Press business managers / owners for business driven 
decisions on what acceptable values are 
• MUST consider the business implications of downtime and 
data loss
Recovery Strategy
Recovery Strategy 
Backups are worthless 
• If can’t restore to meet business requirements 
Most critical of DBA duties 
Practice, practice, practice 
Practice different scenarios 
• Point in time 
• Corrupt page 
Don’t forget the Keys!
Keys & Offsite Storage 
Backup certificates and keys 
• First thing done on any server 
• If lost, data could be too 
Keys to backup 
• Service Master Key 
• Database Master Key 
• Symmetric, Asymmetric & Certificates 
Offsite storage 
• Necessary evil 
• Mitigate the risks
Backup Models
Simple 
No log backup 
Auto reclaims 
Changes since most recent backup unprotected 
Only recover to end of backup
Full 
Requires log backups 
No work lost due to lost or damaged data file 
Restore to an arbitrary point in time 
Normally no loss of data, but slight risk
Bulk Logged 
Special purpose 
Reduce log space 
No point in time recovery supported 
Temporary use for bulk operations
Demo 
Log 
• Growth 
• Free space
Backup Scope
Database 
• Entire database 
• Includes 
• Schema 
• Data contents 
• Transaction log to restore from scratch 
• Simplest way to restore 
• Lot of disk space 
• Lot of time
Partial 
Alternative to database backups for VLDB 
Good for read-only data 
Includes 
• Primary filegroup 
• All read/write filegroups 
• Specified read-only filegroups
File 
Individual files and / or filegroups 
Compliment partial backups 
Usually included in complex backup models
Backup Types
Full 
All data within the backup scope 
Entire contents of files and filegroups 
Does not truncate transaction log 
• Simple recovery model only 
Base for other backup types
Differential 
Only what changed since last full backup 
Faster 
Must restore full backup first
Log 
Transaction log 
Must have full backup first 
Not an option with simple recovery mode 
Truncates log by writing committed transaction to disk
Tail Log 
Captures log records not yet backed up 
Keeps log chain intact 
Required to recover to latest point in time 
Not all scenarios require
Demo 
Restore 
• Point in time
Compression
Compression 
Saves space & I/O 
Heavy impact on CPU 
Set at server level 
• Time of backup 
Compression ratio 
• Msdb.dbo.backupset 
• Backup_size / compressed_backup_size
Encryption
Encryption 
New for SQL 2014 
Encrypt while backing up 
Requires Database Master Key 
• Certificate 
• Asymmetric key (EKM only) 
If using TDE 
• Use different certificates & keys to increase security
More for 2014
New backup Features 
SQL Server Backup to URL 
• SQL 2012 SP1 CU2 
• T-SQL, PowerShell, SMO 
• 2014 adds SSMS 
SQL Server Managed Backup to Windows Azure 
• Database or Instance level 
• Recommended for SQL Server instance on Azure VMs 
Encryption for Backups
Backup Myths
Myths 
Backup operations cause blocking 
Concurrent transaction backup can’t be done when 
full/differential in progress 
Backups always test page checksums 
Backups read through the buffer pool 
Full or differential backups clear the log 
Backups perform consistency checks 
If the backup works, so will the restore
Myths 
Tail of log backups are always possible 
Use snapshots instead of backups 
Log backups are the size of the log 
Cannot backup a corrupt database 
Log backups always clear the log 
No need to backup the system databases 
Always plan a good backup strategy 
Always plan a good recovery strategy!
Keep In Touch 
• @CBELLDBA 
• chris@WaterOxConsulting.com 
• www.WaterOxConsulting.com

More Related Content

PPTX
Building perfect sql servers, every time -oops
PPTX
BackupAgent and LabTech webinar - how to leverage cloud backup to increase pr...
PDF
Real liferecoverypresentation
PDF
The six key steps to AEM architecture
PPTX
With Dedicated Server Hosting Experience Fast Speeds Scalability Stringent ...
PPTX
Visibility With Veeam One
PPTX
Do you know where your server is?
Building perfect sql servers, every time -oops
BackupAgent and LabTech webinar - how to leverage cloud backup to increase pr...
Real liferecoverypresentation
The six key steps to AEM architecture
With Dedicated Server Hosting Experience Fast Speeds Scalability Stringent ...
Visibility With Veeam One
Do you know where your server is?

What's hot (12)

PPTX
Geek Sync I Capacity Planning for Improved Uptime
PPTX
Leveraging Functional Tools and AWS for Performance Testing
PPTX
E2 evc 3-2-1-rule - mikeresseler
PDF
Dana Quinn Velocity Keynote
PPTX
PHD Virtual: Optimizing Backups for Any Storage
PPTX
PHD Virtual Image-based Backup for Citrix XenServer
PDF
Should you be hosting your DAM software on-premise or in the cloud?
PDF
Backup Exec Blueprints▶ Deduplication
PPTX
5 Quick Wins for the Cloud
PDF
Devoxx2017
PDF
Scaling Confluence Architecture: A Sneak Peek Under the Hood
PPTX
Hosting at UK.ResellerClub
Geek Sync I Capacity Planning for Improved Uptime
Leveraging Functional Tools and AWS for Performance Testing
E2 evc 3-2-1-rule - mikeresseler
Dana Quinn Velocity Keynote
PHD Virtual: Optimizing Backups for Any Storage
PHD Virtual Image-based Backup for Citrix XenServer
Should you be hosting your DAM software on-premise or in the cloud?
Backup Exec Blueprints▶ Deduplication
5 Quick Wins for the Cloud
Devoxx2017
Scaling Confluence Architecture: A Sneak Peek Under the Hood
Hosting at UK.ResellerClub
Ad

Viewers also liked (10)

PPTX
Amnesia
PPTX
Amnestic diorder wani
PPTX
Kkocabiyik ispeech
PPTX
Screening procedure for amnesia
PPT
Amnesias
PPTX
Amnesia
PPTX
Memory and Amnesia slides
PPTX
Amnesia
Amnesia
Amnestic diorder wani
Kkocabiyik ispeech
Screening procedure for amnesia
Amnesias
Amnesia
Memory and Amnesia slides
Amnesia
Ad

Similar to Prevent Recovery Amnesia - Forget The Backups (20)

ODP
Pdb my sql backup london percona live 2012
PDF
MySQL Enterprise Backup
PPTX
I got 99 Problems but my backup ain't one by Richard Douglas
PPTX
Backup beyond just a strategy with SQL Server
PDF
SQL Server Backup and Restore
PPTX
Backup and restore
PDF
MySQL enterprise backup overview
PDF
SQL server Backup Restore Revealed
PPSX
MS SQL Backups explained by a DBA
PPTX
24 HOP edición Español - Sql server 2014 backup encryption - Percy Reyes
PPTX
database backup and recovery
PPTX
Unit Three: Database Recovery Points & Procedures
PPT
Backup and Recovery Implementation
PDF
Presentation backup and recovery best practices for very large databases (v...
PDF
OSBConf 2016: The Database Backup is done - what next? - by Jörg Brühe
PDF
UKOUG - RMAN Back to Basics - Oct 2017
PPTX
Backup And Recovery Planning
PDF
MySQL Enterprise Backup
PPTX
Presentation on BACKUP(Nursing informatics )
PPTX
Database Backup and Recovery in DBMS.pptx
Pdb my sql backup london percona live 2012
MySQL Enterprise Backup
I got 99 Problems but my backup ain't one by Richard Douglas
Backup beyond just a strategy with SQL Server
SQL Server Backup and Restore
Backup and restore
MySQL enterprise backup overview
SQL server Backup Restore Revealed
MS SQL Backups explained by a DBA
24 HOP edición Español - Sql server 2014 backup encryption - Percy Reyes
database backup and recovery
Unit Three: Database Recovery Points & Procedures
Backup and Recovery Implementation
Presentation backup and recovery best practices for very large databases (v...
OSBConf 2016: The Database Backup is done - what next? - by Jörg Brühe
UKOUG - RMAN Back to Basics - Oct 2017
Backup And Recovery Planning
MySQL Enterprise Backup
Presentation on BACKUP(Nursing informatics )
Database Backup and Recovery in DBMS.pptx

Recently uploaded (20)

PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
Configure Apache Mutual Authentication
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Zenith AI: Advanced Artificial Intelligence
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Architecture types and enterprise applications.pdf
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Microsoft Excel 365/2024 Beginner's training
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Configure Apache Mutual Authentication
A comparative study of natural language inference in Swahili using monolingua...
Zenith AI: Advanced Artificial Intelligence
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Final SEM Unit 1 for mit wpu at pune .pptx
Enhancing emotion recognition model for a student engagement use case through...
2018-HIPAA-Renewal-Training for executives
Convolutional neural network based encoder-decoder for efficient real-time ob...
Abstractive summarization using multilingual text-to-text transfer transforme...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
A proposed approach for plagiarism detection in Myanmar Unicode text
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Architecture types and enterprise applications.pdf
sbt 2.0: go big (Scala Days 2025 edition)
Credit Without Borders: AI and Financial Inclusion in Bangladesh
1 - Historical Antecedents, Social Consideration.pdf
Microsoft Excel 365/2024 Beginner's training

Prevent Recovery Amnesia - Forget The Backups

  • 1. Prevent Recovery Amnesia Forget The Backups
  • 4. RTO Amount of time which data or hardware is desired to be restored after data corruption or hardware failure Usually referred to in 9’s • 5 9’s = 99.999 % up time • Just over 5 minutes of allowable downtime per year (means maintenance) • 4 9s = 52.5 minutes • 3 9s = 8.75 hrs • 5 9s between 9-5 different than 5 9s 24/7
  • 5. RPO Point in time that data can be restored from. • Minutes • Hours • Days • Weeks Basically – How much work can be lost?
  • 6. SLA RPO & RTO together = Service Level Agreement • Need to know for each database you are responsible for • Press business managers / owners for business driven decisions on what acceptable values are • MUST consider the business implications of downtime and data loss
  • 8. Recovery Strategy Backups are worthless • If can’t restore to meet business requirements Most critical of DBA duties Practice, practice, practice Practice different scenarios • Point in time • Corrupt page Don’t forget the Keys!
  • 9. Keys & Offsite Storage Backup certificates and keys • First thing done on any server • If lost, data could be too Keys to backup • Service Master Key • Database Master Key • Symmetric, Asymmetric & Certificates Offsite storage • Necessary evil • Mitigate the risks
  • 11. Simple No log backup Auto reclaims Changes since most recent backup unprotected Only recover to end of backup
  • 12. Full Requires log backups No work lost due to lost or damaged data file Restore to an arbitrary point in time Normally no loss of data, but slight risk
  • 13. Bulk Logged Special purpose Reduce log space No point in time recovery supported Temporary use for bulk operations
  • 14. Demo Log • Growth • Free space
  • 16. Database • Entire database • Includes • Schema • Data contents • Transaction log to restore from scratch • Simplest way to restore • Lot of disk space • Lot of time
  • 17. Partial Alternative to database backups for VLDB Good for read-only data Includes • Primary filegroup • All read/write filegroups • Specified read-only filegroups
  • 18. File Individual files and / or filegroups Compliment partial backups Usually included in complex backup models
  • 20. Full All data within the backup scope Entire contents of files and filegroups Does not truncate transaction log • Simple recovery model only Base for other backup types
  • 21. Differential Only what changed since last full backup Faster Must restore full backup first
  • 22. Log Transaction log Must have full backup first Not an option with simple recovery mode Truncates log by writing committed transaction to disk
  • 23. Tail Log Captures log records not yet backed up Keeps log chain intact Required to recover to latest point in time Not all scenarios require
  • 24. Demo Restore • Point in time
  • 26. Compression Saves space & I/O Heavy impact on CPU Set at server level • Time of backup Compression ratio • Msdb.dbo.backupset • Backup_size / compressed_backup_size
  • 28. Encryption New for SQL 2014 Encrypt while backing up Requires Database Master Key • Certificate • Asymmetric key (EKM only) If using TDE • Use different certificates & keys to increase security
  • 30. New backup Features SQL Server Backup to URL • SQL 2012 SP1 CU2 • T-SQL, PowerShell, SMO • 2014 adds SSMS SQL Server Managed Backup to Windows Azure • Database or Instance level • Recommended for SQL Server instance on Azure VMs Encryption for Backups
  • 32. Myths Backup operations cause blocking Concurrent transaction backup can’t be done when full/differential in progress Backups always test page checksums Backups read through the buffer pool Full or differential backups clear the log Backups perform consistency checks If the backup works, so will the restore
  • 33. Myths Tail of log backups are always possible Use snapshots instead of backups Log backups are the size of the log Cannot backup a corrupt database Log backups always clear the log No need to backup the system databases Always plan a good backup strategy Always plan a good recovery strategy!
  • 34. Keep In Touch • @CBELLDBA • chris@WaterOxConsulting.com • www.WaterOxConsulting.com

Editor's Notes

  • #33: Backup blocking No. Backup operations do not take locks on user objects. Backups do cause a really heavy read load on the I/O subsystem so it might *look* like the workload is being blocked, but it isn't really. It's just being slowed down. There's a special case where a backup that has to pick up bulk-logged extents will take a file lock which could block a checkpoint operation – but DML is never blocked. Concurrent No, this changed in SQL Server 2005. Checksums No. It only does it when you use the WITH CHECKSUM option – which you should Buffer pool No. The backup subsystem opens its own channels to the database files to avoid the performance hit of having to read everything into SQL Server's memory and back out to the backup device (and also effectively flushing the buffer pool in the process). If you ask the for page-checksum checking, it uses it's own small portion of memory. Clear the log No. A log backup includes all the log since the last log backup – nothing can change that – no matter whether that log was also backed up by a full or differential backup. In the FULL or BULK_LOGGED recovery models, the *only* thing that clears the log is a log backup. Consistence checks A la DBCC CHECKDB - No. Nothing else to say. Backup works so will restore No. Please don't fall into this trap. You must regularly validate your backups to give yourself a high level of confidence that they will work if a disaster occurs.
  • #34: Tail always possible No. A tail-of-the-log backup is one that backs up all the log generated since the last log backup, in an exceptional situation. If the data files are damaged, you can still do a tail-of-the-log backup EXCEPT if the un-backed-up log contains a minimally-logged operation. That would require reading data extents – which cannot be done if the data files are damaged. For this reason, the BULK_LOGGED recovery model should not be used on databases that have 24×7 user transactions. Snapshots No. A database snapshot is only usable while the database on which it is based is usable and online. If the source database is corrupted, the database snapshot most likely is too. If the source database goes suspect, so does the database snapshot. Also, having multiple database snapshots (equating to multiple log backups) incurs an increasing performance drain – as every page that changes in the source database may need to be synchronously written to all existing snapshots before it can be written to the source database data files, and all existing database snapshots will grow as more pages are pushed into them. Log backup size of log No. The log has to accomodate the space necessary to roll back active transactions, the amount of space returned by DBCC SQLPERF (LOGSPACE) on a busy system doesn't accurately refect the amount of log records in the log. This blog spot explains: Search Engine Q&A #25: Why isn't my log backup the same size as my log? And apart from that, a log backup is just all the log generated since the last log backup – not the whole log file usually – and if it happens to be, the first part of the explanation comes into play. Cannot backup corrupt db No. In most cases you can use the WITH CONTINUE_AFTER_ERROR option to back up the corrupt database.  If that fails (maybe because of a damaged boot page or file-header page), there are no other options apart from OS-level file backups. Log backup always clears the log No. If there's no concurrent data backup running, a log backup will always *try* to clear the log, and only succeed in clearing the inactive portion of the log – the log that's only considered 'required' by SQL Server because it hasn't yet been backed up. If anything else is holding the log 'required', it cannot be cleared, even though it has been backed up. Subsequent log backups will check again and again until the time comes when that portion of the log can be cleared. The TechNet Magazine article Understanding Logging and Recovery in SQL Server I wrote last year explains a lot more about how the log works. System dbs No. You should always back up the system databases. Master contains all the security info, what databases exist – msdb contains all the SSIS packages, Agent jobs, backup history – model contains the configuration for new databases. Don't fall into the trap of only backing up user databases otherwise you'll be in a world of hurt if you have to do a bare-metal install Good backup strategy No. Now you're thinking 'Huh?'… You should plan a restore strategy. Use the business requirements and technical limitations to figure out what you need to be able to restore in what time, and then use that to figure out what backups you need to take to allow those restores to happen.