How can i monitor when a storage group or a mailbox store gets dismounted

Posted on 2006-04-29
Last Modified: 2013-11-15
we have an exchange cluster , and sometimes we find the mailmox stores dismounted. Once i check the event viewer though there is no record of such ab event. Is there any way i can see in the event viewer events related to the mailbox store ?

Question by:c_hockland
    LVL 12

    Expert Comment

    There really should be events logged in the Application Log where the source is either MSExchangeIS or ESE. And especially if the store is dismounted because of some problem (out of disk space, too many transaction logs, ...)

    Which version of Exchange?
    Do you perform regular on-line full Information store backups?
    Is only one storage group affected or several/all storage groups?
    How about the public stores, do they dismount?

    How many people have administrative access to that server, that are able to dismount stores?

    Author Comment

    1. exchange 2003
    2. regular backups = daily
    3. only the storage group i ran Perfect Disk on (defrag)
    4. There 8 admins with full exchange rights

    No EVENTS on any of the logs

    any ideas?
    LVL 12

    Expert Comment

    After a bit of searching there seem to be no major problems with Perfectdisk that cause the store to dismount automatically, but I have no experience with the product.

    Is there any chance that, by running a defrag on the drive or store, that the system has created some sort of scheduled defrag task that dismounts the store whenever it pleases?
    LVL 12

    Accepted Solution

    Also check if the online maintenance and online backup schedules are over-lapping. I have experienced issues with this. It also dismounts the stores or crashes the Information Store service.

    Amit Aggarwal.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Learn more about how the humble email signature can be used as more than just an electronic business card. When used correctly, a signature can easily be tailored for different purposes by different departments within an organization.
    The Delta outage: 650 cancelled flights, more than 1200 delayed flights, thousands of frustrated customers, tens of millions of dollars in damages – plus untold reputational damage to one of the world’s most trusted airlines. All due to a catastroph…
    This tutorial will walk an individual through the process of installing of Data Protection Manager on a server running Windows Server 2012 R2, including the prerequisites. Microsoft .Net 3.5 is required. To install this feature, go to Server Manager…
    This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now