Audit_Points_Unmesh
Audit_Points_Unmesh
environment:
1. Database Monitoring Alerts (Transaction Logs, Connection Counts)
Transaction Logs: Set up alerts for log file utilization, warning if it
exceeds a certain percentage (e.g., 80%). This helps prevent unexpected
log file growth and transaction issues.
Connection Counts: Use SQL Server’s Performance Monitor counters
(e.g., "User Connections") to monitor the number of connections. Set
thresholds to alert if connections exceed expected limits, indicating
potential connection leaks or application issues.
2. Backup Strategy, Frequency, and Verification
Strategy: Use a combination of full, differential, and transaction log
backups depending on recovery objectives.
Frequency: Common practice is full backups daily, differential backups
every few hours, and transaction log backups every 15-30 minutes.
Verification: Regularly restore backups to a test environment to verify
backup integrity. Additionally, check backup files with RESTORE
VERIFYONLY to ensure they are valid.
3. Monitoring for Full Table Scans
Enable the SQL Server Profiler or use Extended Events to track queries
causing full table scans, which can lead to performance degradation.
Consider adding missing indexes or optimizing query designs to prevent
full scans.
4. Monitoring for Excessive/Surge Connections
Configure alerts on "User Connections" in SQL Server Performance Monitor.
Sudden spikes in connections can indicate application issues or attacks,
and alerts should be sent if the connection count reaches predefined
thresholds.
5. Monitoring Transaction Log Sizing/Volume Trends
Monitor transaction log growth in SQL Server Management Studio (SSMS)
or through Dynamic Management Views (DMVs) like sys.dm_db_log_stats.
This helps identify abnormal log growth, possibly from long-running
transactions or bulk operations.
6. Authentication and Access Control Strategy (RO/RW Segregation)
Authentication: SQL Server supports both Windows Authentication and
SQL Server Authentication. Prefer Windows Authentication where possible
for integrated security.
Access Control: Use roles to separate permissions. For read-only (RO)
and read-write (RW) access, create specific roles and assign users based
on their access requirements. Implement row-level security if needed for
finer control.
7. Monitoring Table Record/Row Counts and Trends
Periodically log row counts using a scheduled job that queries
sys.partitions or similar views to monitor trends in data growth for
individual tables.
8. Monitoring Table Sizes and Trends
Use sp_spaceused or DMVs like sys.dm_db_partition_stats to monitor the
size of tables. Log this data over time to analyze growth trends and
identify large tables that may impact performance.
9. Data Replication and Sharding Strategy (Consistency/Latency
Thresholds)