Solved

Mirror File server + file locking software

Posted on 2010-08-24
5
597 Views
Last Modified: 2013-12-09
Hi there,

I have a system i'm trying to setup.

The environment is dual server (one on one side of the country, one on the other). One of the sites (head-Office) has a relatively poor internet connection. The system contains some spreadsheets that are quite large, this prevents having one file server.

What I need is for the file servers to be mirrored and synchronised, but Site A to get files from their file server (locally) and Site B to get files from their server (locally also). If a file is in use in Site A, users from Site B will be unable to use that file. In Site A this currently works, if one user is accessing a spreadsheet and another users tries to use it they will be told that the file is in use (and can only be used read-only). This is perfect, if we could ahve this system multi-server it would be the solution.

Is there any software around that could do this? Windows preferably, but linux is an option.

Thanks in advanced
0
Comment
Question by:lemonville
  • 4
5 Comments
 
LVL 2

Expert Comment

by:cazzaboy
ID: 33519558
Hi there,

If you are using windows servers, then DFS would be the way to go. Check out this link http://technet.microsoft.com/en-us/library/cc732863(WS.10).aspx for a guide on how to get setup with DFS
0
 
LVL 1

Author Comment

by:lemonville
ID: 33537934
UNfortuantely, the domain controller seems to be and NT server so this won't suit. Any other options?
0
 
LVL 1

Author Comment

by:lemonville
ID: 33555366
Actually the main domain controllers appear to be Linux, so the above (which seems perfect) will not suit.

I'm very keen to hear any alternate options.

Cheers
0
 
LVL 1

Accepted Solution

by:
lemonville earned 0 total points
ID: 34158549
Unfortunately, we have not found a solution for this.

Our solution was to add a Terminal Server at the location of the file server.

This is less than ideal but better than nothing.
0
 
LVL 1

Author Closing Comment

by:lemonville
ID: 34186416
This is not a solution, but i'm not sure whether the question should be deleted either.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Outsource Your Fax Infrastructure to the Cloud (And come out looking like an IT Hero!) Relative to the many demands on today’s IT teams, spending capital, time and resources to maintain physical fax servers and infrastructure is not a high priority.
When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
In this video, we show how to convert an image-only PDF file into a PDF Searchable Image file, that is, a file with both the image (typically from scanning) and text, which is created in an automated fashion with Optical Character Recognition (OCR) …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now