Solved

NLB, Clustering, & Terminal Server

Posted on 2006-11-13
7
314 Views
Last Modified: 2013-11-15
I currently have a Terminal server that, due to unexpected growth, is getting maxed out.  I need to add another, but the issue is that the program that remote users access is a database.  Now common sense would suggest that a database on TS1 will not magically keep itself in synch with the newly added terminal server TS2.  It sounds like I may need to setup NLB for the 2 terminal servers, and setup a shared database (possibly clustering?).  We currently have a DC, and 1 TS, with 20 clients currently and about 20 TS users.  If anyone has any solutions for this scenario, or any other ideas, that would be most excellent.  Thanks.
0
Comment
Question by:bleujaegel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 26

Expert Comment

by:Pber
ID: 17937885
I presume your DB is SQL.  I don't know if you want to go down the Server cluster path.  Clustering isn't something to be taken lightly.  There are many issue with clustering that might outweigh the benefits.  We have 4 SQL clusters and I cringe everytime they go down.
Clustering isn't cheap either since you require shared storage like a SAN.
You could do SQL replication, but that is complex and a resource hog.  SQL Log shipping is another way to protect your DB.

Also since you have a small setup, keeping it simple might be the best bet.

In your case I would just move the Database onto it's own server.  Then point TS1 and TS2 to your new DB1 and NLB the TS servers as you mentioned.
If your DB server goes down, everyone is out of luck.  That is the situation you are in right now, if TS1 goes down, everyone is down.  If you have good backups, you should be ok.
0
 
LVL 2

Author Comment

by:bleujaegel
ID: 17939770
Can you give me an example of how to point a Terminal Server to a database on another computer?  
0
 
LVL 26

Expert Comment

by:Pber
ID: 17940008
What kind of database is it?
What is the application that they use to access the database?
0
Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

 
LVL 2

Author Comment

by:bleujaegel
ID: 17940161
MS SQL.  Also, if another db was used instead, is there usually a big difference in how you would point Terminal Servers to the DB?  Just curious.  Thanks.
0
 
LVL 26

Accepted Solution

by:
Pber earned 500 total points
ID: 17940834
Usually an application will communicate to the DB server through an OBDC DSN connection.  (Start\Programs\Administrative Tools\Data Sources (OBDC).  Usually under the System DSN tab.

If you application communicates via an OBDC connection, then the OBDC connection can be configured to point to remote servers.

0
 
LVL 2

Author Comment

by:bleujaegel
ID: 17941328
Excellent.  Thanks for the input.
0
 
LVL 26

Expert Comment

by:Pber
ID: 17946411
Glad to help.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By default, Carbonite Server Backup manages your encryption key for you using Advanced Encryption Standard (AES) 128-bit encryption. If you choose to manage your private encryption key, your backups will be encrypted using AES 256-bit encryption.
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question