[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

W2K8 Data Center using Hyper-V in a failover cluster

Posted on 2009-05-14
3
Medium Priority
?
450 Views
Last Modified: 2013-11-06
I have a Windows 2008 Data Center Cluster, I am running Hyper-V on it.  I have two high availability vitural servers on the cluster.  When I fail the cluster over, I have an application that cannot find the virtual server.  I am unable to ping the virtual server once it has been failed over.  When I fail the server back to node 1 everything works fine.  Both nodes of the cluster are identical to each other.
0
Comment
Question by:33031a
  • 2
3 Comments
 
LVL 3

Expert Comment

by:jbatt
ID: 24395408
Do you have a virtual hostname and IP assigned? Is it in DNS?
0
 

Author Comment

by:33031a
ID: 24450025
Yes to both questions.  I resolved the issue.  The physical nic on my server had a bad driver.  I upgraded the driver and all is well.
0
 

Accepted Solution

by:
33031a earned 0 total points
ID: 24450030
I was able to resolve the issue on my own.
0

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction There are many ways to achieving a goal - some are wrong, some are right - and some just appear to be right, but are wrong.  Hyper-V Clustering and VMM has taught me all three, and I'm here to share with you how to avoid the pitfalls…
Know what services you can and cannot, should and should not combine on your server.
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses
Course of the Month18 days, 23 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question