Solved

Utilizing multiple mail servers w/ sendmail

Posted on 1998-04-13
2
276 Views
Last Modified: 2013-12-16

Hello....

I'm wanting to setup a second mail server that will queue messages that weren't able to be received by the primary mail server because it was too busy.  I'm really looking for info on how most people set something like this up, configuration and just an overview.  Thanks.
0
Comment
Question by:adamolson
2 Comments
 
LVL 1

Accepted Solution

by:
mzito earned 700 total points
Comment Utility
Very simple.  Configure your DNS to have two MX records- one for your primary (we'll call it a.foo.com) and one for your secondary (b.foo.com).  In your BIND setup, it'll look something like this:

    IN    MX     10      a.foo.com
    IN    MX     100      b.foo.com

Then, setup sendmail as follows: a.foo.com is responsible for a.foo.com and foo.com (I assume you already have this set up properly, since you said you want to add the second server).  b.foo.com is responsible for just b.foo.com.  When mail is unable to be reached @a.foo.com, the sending mail server will automatically retry using b.foo.com.  When b.foo.com recieves the mail, it will attempt to deliver to a.foo.com.  If it fails, it will see that itself is the second host, and continue queueing the message.  The two important things to remember is to make sure b.foo.com is NOT responsible for a.foo.com or foo.com (I mean, don't define it in the Cw macro), otherwise it will try to deliver locally. Also, make sure that b.foo.com is not a CNAME to another machine, but rather, that machine's true hostname.  I hope this helps, and if you have any more problems or questions, feel free to email me @ mzito@wwprsd.mercernet.net

Best Wishes,
Matthew Zito
0
 
LVL 1

Author Comment

by:adamolson
Comment Utility
Adjusted points to 700
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

This tech tip describes how to install the Solaris Operating System from a tape backup that was created using the Solaris flash archive utility. I have used this procedure on the Solaris 8 and 9 OS, and it shoudl also work well on the Solaris 10 rel…
Installing FreeBSD… FreeBSD is a darling of an operating system. The stability and usability make it a clear choice for servers and desktops (for the cunning). Savvy?  The Ports collection makes available every popular FOSS application and packag…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now