Click here to change the language.

This page is carefully and closely monitored. Any changes you make will be evaluated and then quickly accepted, refined, or reverted.

This Readme document contains important information to read before installing Microsoft SQL Server 2008 R2 SP1. It describes how to obtain SQL Server 2008 R2 SP1, how to find Books Online, how to find Upgrade Advisor, how to find supplemental product information in the Release Notes, and copyright attributions for the product.

This Readme file is available on your installation media, as well as from this Readme page.

What's New

For information about the new features in SQL Server 2008 R2, see What's New in SQL Server 2008 R2. For information about what is new in SP1, see the Release Notes.

Obtaining SQL Server 2008 R2 SP1

SQL Server 2008 R2 SP1 is available for download at the SQL Server 2008 R2 SP1 download page. Follow the instructions that are provided at the download site for downloading SQL Server 2008 R2 SP1. You can install SP1, even if you only have SQL Server Management Studio installed (where you don't have an instance of SQL Server installed yet).

Use Books Online for Installation Assistance

Find Books Online

SQL Server Books Online is the primary documentation for getting assistance with installing SQL Server. You can view Books Online on MSDN. For documentation on upgrading installed SQL Server 2008 R2 components with a SQL Server 2008 R2 servicing update, see SQL Server 2008 R2 Servicing Documentation.

Find Installation Information in Books Online

Analyze Your Upgrade with Upgrade Advisor

The Upgrade Advisor tool analyzes your current instance of SQL Server and provides important information you should know before upgrading. For more information about SQL Server 2008 R2 Upgrade Advisor, see the Upgrade Advisor section of this Feature Pack download page.

Failover Clustering Rolling Patch and Service Pack Process

This knowledge base (KB) article describes how to apply a Microsoft SQL Server 2008 R2 update to a failover cluster instance. Although the article says "SQL Server 2008", it also applies to Microsoft SQL Server 2008 R2 Enterprise and Microsoft SQL Server 2008 R2 Standard (see the "APPLIES TO" section at the bottom of the article for a full list).

Important

  • If you update a SQL Server failover cluster instance on an active node, SQL Server services will be stopped. This causes SQL Server downtime. To avoid downtime, install a rolling update on passive nodes as explained in this article.
  • To avoid a mixed version of possible owner nodes in the failover cluster instance, use the Cluster Administrator tool (Cluadmin.exe), to remove nodes from the possible owner nodes list in the failover cluster instance. You should avoid having a mixed version of possible owner nodes to prevent possible data corruption.
  • In SQL Server 2008 R2, the cluster service checks the SQL Network Name resource for a list of possible owners. The SQL Network Name resource is also checkpointed. This behavior differs from SQL Server 2005. In SQL Server 2005, the SQL Server resource itself is checkpointed.

Read the Release Notes for the Latest Product Information

The Release Notes provide supplemental information about product behaviors that apply only to this release or that are not documented in this release of Books Online. You can find the Release Notes on the Release Notes page.

Copyright Attributions

  1. This product contains software derived from the Xerox Secure Hash Function.
  2. This product includes software from the 'zlib' general purpose compression library.
  3. Portions of this software are based in part on the work of RSA Data Security, Inc. Because Microsoft has included the RSA Data Security, Inc., software in this product, Microsoft is required to include the text below that accompanied such software:

    Copyright © 1990, RSA Data Security, Inc. All rights reserved.

    License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc., MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc., MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work.

    RSA Data Security, Inc., makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind.

    These notices must be retained in any copies of any part of this documentation and/or software.
  4. The Reporting Services mapping feature uses data from TIGER/Line Shapefiles provided courtesy of the U.S. Census Bureau (http://www.census.gov/). TIGER/Line Shapefiles are an extract of selected geographic and cartographic information from the Census MAF/TIGER database. TIGER/Line Shapefiles are available without charge from the U.S. Census Bureau. To obtain more information about the TIGER/Line shapefiles, go to http://www.census.gov/geo/www/tiger. The boundary information in the TIGER/Line Shapefiles is for statistical data collection and tabulation purposes only; its depiction and designation for statistical purposes does not constitute a determination of jurisdictional authority, rights of ownership, or entitlement, and does not reflect legal land descriptions. Census TIGER and TIGER/Line are registered trademarks of the U.S. Bureau of the Census.