Multiple MX records for CPANEL Hosting accounts.

Posted on 2004-11-28
Last Modified: 2010-03-17

I have a 4 part question, where each part depends on the answer to the preceding part. I am assigning 500 points because of difficulty.

For redundancy purposes, I would like to set up multiple mail servers for "" in CPANEL web hosting interface.

I am familiar with the setting up of of multiple MX records and pointing them to the appropriate A record in the DNS zones. My concern is that if the CPANEL server loses connectivity, then even if I have setup multiple MX records in the DNS zone, they will be of no use as the DNS zone data would be down on the failed server, is that in fact correct?

If that is so, would I need dual servers in different data centers with the servers clustered and synchronised from cpanel, so that DNS changes on one server are replicated on the other server?

Would  I  need to set up actual email accounts on the backup email server as well as the primary server?

 Finally, will the client need to setup 2 different email accounts(, in Microsoft Outlook, for one email address.

Thanks for your help.

Godfrey Heron

Question by:irieisle
    1 Comment
    LVL 40

    Accepted Solution

    As to:

    (A & B) If you are in accordance with the requirements for DNS you have at least a primary and secondary DNS server for the domain(s). The secondary is a slave to the primary which means that it has the same data and will respond to queries if the primary is down. This slaving is a function of DNS and operates at a level below CPANEL.

    (C) If you want clients to be able to send/receive mail while the primary is down you will need email accounts on the backup server.

    (D) Yes, if the goal is to avoid a single point of failure. You might be able to hack an IMAP/POP proxy (like Perdition) and have it switch requests to the backend if the primary is down. But then you'd have to arrainge to move mail from the backup server to the primary when the primay went back on line.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
    Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    758 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now