Solved

Utilizing multiple mail servers w/ sendmail

Posted on 1998-04-13
2
281 Views
Last Modified: 2013-12-16

Hello....

I'm wanting to setup a second mail server that will queue messages that weren't able to be received by the primary mail server because it was too busy.  I'm really looking for info on how most people set something like this up, configuration and just an overview.  Thanks.
0
Comment
Question by:adamolson
2 Comments
 
LVL 1

Accepted Solution

by:
mzito earned 700 total points
ID: 1812979
Very simple.  Configure your DNS to have two MX records- one for your primary (we'll call it a.foo.com) and one for your secondary (b.foo.com).  In your BIND setup, it'll look something like this:

    IN    MX     10      a.foo.com
    IN    MX     100      b.foo.com

Then, setup sendmail as follows: a.foo.com is responsible for a.foo.com and foo.com (I assume you already have this set up properly, since you said you want to add the second server).  b.foo.com is responsible for just b.foo.com.  When mail is unable to be reached @a.foo.com, the sending mail server will automatically retry using b.foo.com.  When b.foo.com recieves the mail, it will attempt to deliver to a.foo.com.  If it fails, it will see that itself is the second host, and continue queueing the message.  The two important things to remember is to make sure b.foo.com is NOT responsible for a.foo.com or foo.com (I mean, don't define it in the Cw macro), otherwise it will try to deliver locally. Also, make sure that b.foo.com is not a CNAME to another machine, but rather, that machine's true hostname.  I hope this helps, and if you have any more problems or questions, feel free to email me @ mzito@wwprsd.mercernet.net

Best Wishes,
Matthew Zito
0
 
LVL 1

Author Comment

by:adamolson
ID: 1812980
Adjusted points to 700
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
AIX 5.3 group password policy changes 7 27
Using Grep to Find a file 8 85
UNiX Script filesystem space usage Part2 54 79
Linux hostname change 2 54
I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now