DESKTOP

Design and Deploy High Availability for Exchange 2007 : Create Bookmark Create Note or Tag Implement Standby Continuous Replication (SCR)

10/12/2010 3:52:05 PM
SCR provides a solution that we did not have with the RTM of Exchange and the initial clustered solutions of CCR and SCC—a combination of site resilience and high availability.

By site resilience, what we mean is under a 2003 cluster, both nodes had to be in the same subnet. There was still a way of placing each node in different locations or physical sites. However, they needed to be on the same network, and you might be using a virtual LAN to accomplish the illusion for the cluster.

However, with Server 2008 and Exchange 2007 SP1, we have new clustering abilities and site resilience added to the mix. We can now place our nodes in two different sites.

The simplest use of SCR is along the same lines of LCR, but across two different systems (not just two different disks). You can see how this can be taken to the next level, and you can place these systems in two different sites. However, SCR can do much more. It can create secondary copies of CCR and SCC sources. The source might be a cluster, but the target of the SCR configuration doesn’t have to be a clustered target. It can be a single mailbox server or a passive node waiting to spring into action.

Due to the complexity of SCR, we do not cover each possible scenario. Rather, we suggest that you research your specific needs and solutions online. However, we review the basic requirements and configuration options to get SCR up and running.

Some of the requirements for an SCR solution include the following:

  • As with other implementations, there can only be one database per storage group.

  • Both the source (or active copy) and target (or passive copy) have to be in the same AD domain.

  • The source and target have to use the same OS. The target must have the Mailbox role installed (if a cluster, it must be a passive role).

  • Either the Enterprise or Standard Editions can be used for SCR.

  • The database and storage group paths have to be the same for both the source and target.

  • SCR does not use cluster services—it uses the replication service to perform the continuous replication process.

  • There is a 50-log lag between the source and target by default. There is also a 24-hour replay time that you can configure.

In our simple scenario, imagine we have two servers—Ex01 (our source) and Ex02 (our target)—and each has the typical installation with Hub Transport, CAS, and Mailbox roles. Both are running Server 2008, and they are both in the same AD domain.

To implement SCR in a simple scenario where you wish to have the database and log files under a storage group called SCR1 on one system replicated over to another system, perform the following:

Open the Exchange Management Shell and type the following command:

Enable-StorageGroupCopy -Identity SCR1 -StandbyMachine Ex02 -ReplayLagTime 0.0:4:0 -TruncationLagTime 0.0:5:0

What exactly did we type here?

Well, the -StandbyMachine is the location of the target system for the passive copy. The -ReplayLagTime is a predetermined amount of lag before replaying of the copied log files occurs. This is to prevent a corrupt database and logs from continuing. The format is days.hours:minutes:seconds, so we gave this a 4-minute delay (although the default time is 24 hours, with the maximum being 7 days). There is a predetermined 50-log limit by default, so that regardless of our settings, there is always a 50-log delay to prevent corruption of the passive database. Finally, we have the -TruncationLagTime where we specify the amount of time the replayed log files can sit before they are deleted from the target.

There are several ways of knowing that your SCR procedure worked. The first is to check the event viewer and look for Event ID 2114, which tells you that replication has begun.

You can also open an EMS shell and type Get-StorageGroupCopyStatus -StandbyMachine (target server name) and you will be shown if the status is healthy, if logs have replayed, and so on.

You can also perform the same test we did with LCR, which is to look at the source transaction log location and the target transaction log folder and see that copies are being made (taking into consideration that there is a delay built in).

Note

Remember, there is no visual confirmation from the EMC that you have succeeded in your task of enabling SCR. If you look at the target server, you do not see anything different in the EMC regarding that server. Perhaps SP2 includes a more graphical implementation of SCR, but for now we need to use the EMS to perform a visual check of the target server to see whether something is replicating.


You may wonder: What if your source goes bad and you need to bring the SCR copy online? There are a few different options for activating SCR copies. In fact, Microsoft has an excellent article at http://technet.microsoft.com/en-us/library/bb691321.aspx.

Other  
  •  Windows Server 2008 : Utilize System Center VMM
  •  Windows Server 2008 : Create Virtual Hard Drives and Machines
  •  Windows Server 2008 : Manage Hyper-V Remotely
  •  Windows Server 2008 : Install the Hyper-V Role
  •  Windows 7 : Rolling Back to a Stable State with System Restore
  •  Windows 7 : Configuring System Protection Options
  •  Windows 7 : Using the Windows Backup Program
  •  Active Directory Federation Services (ADFS)
  •  Active Directory Rights Management Service (RMS)
  •  Active Directory Lightweight Directory Service (LDS)
  •  Windows Server 2003 : Securing and Troubleshooting Authentication
  •  Windows Server 2003 : Managing User Profiles
  •  Windows Server 2003 : Creating Multiple User Objects
  •  Windows Server 2003 : Creating and Managing User Objects
  •  Understanding Application Domains
  •  Building and Deploying Applications for Windows Azure : Activating the Storage Account Account
  •  Deploying Applications to Windows Azure
  •  Building and Deploying Applications for Windows Azure : Creating a Demo Project
  •  Network Programming with Windows Sockets : Datagrams
  •  Network Programming with Windows Sockets : An Alternative Thread-Safe DLL Strategy
  •  
    Top 10
    Windows 7 : Protecting Your Computer with Windows Defender and Windows Firewall - Introducing Action Center
    Talking Up Security At Iswec 2012 (Part 2)
    Samsung 305U1A
    Programming .NET Security : Extending the .NET Framework (part 2) - Using the AuthorMembershipCondition Membership Condition
    Cloud Application Architectures : Database Management
    Embedding Media Content into the web page
    Nikon unveiled the 24-85mm lens designed for format FX and 18-300mm for DX
    UK tech skills crisis
    iPhone Application Developmen : Using the View-Based Application Template (part 2) - Preparing the View Controller Outlets and Actions
    Designing a Windows Server 2008 R2 Active Directory : Renaming an AD DS Domain
    Most View
    Infrastructure Security: The Host Level
    Building Android Apps : Simple Bells and Whistles
    Tools for the job (Part 2) - Boot-repair-disk, Trinity Rescue Kit & PartedMagic
    Programmatic Security (part 6) - Assembly-Wide Permissions
    Windows Tips & Tricks (May 2012) - Part 1 : Define a standard action for the shutdown button
    Eclipse Stealth FX812R795 Extreme with Eclipse Stealth Flight Pack
    Windows Server 2008 R2 : Manage Remote Desktop Services (part 1) - Administer Remote Desktop Session Host
    Serialize to an In-Memory Stream
    Enabling ActiveSync in Exchange Server 2010
    Garmin Nuvi 50LM - nuviGating Our Way
    Algorithms for Compiler Design: STRAIGHTFORWARD CODE GENERATION
    Deploying a Native SharePoint 2010 Search Service Application
    Troubleshooting and Testing Network Settings
    IIS 7.0 : Managing Administration Extensions
    The IIS 7.0 Configuration System and the IIS 6.0 Metabase
    SharePoint 2010 : Operations Management with the SharePoint Central Administration Tool (part 4) - Reviewing Backup and Restore Settings in SPCA
    Compiler Design: Transforming NFA To DFA
    Windows 7 : Windows Driver Foundation Architecture (part 3) - Driver Frameworks
    The Revolution Of Visual Resolution (Part 4) - ViewSonic VX2336S-LED, AG Neovo L-W27, Hannsg HL272HPB
    Is The Personal Blog Dead? (Part 1) - The Rise Of Social Media