Solved

How to change log shipping roles?

Posted on 2010-11-30
5
588 Views
Last Modified: 2012-05-10
I set up log shipping on database LogShippingDB on two servers - ServerA and ServerB. ServerA is primary and ServerB is secondary in standby mode. It works well. I am trying to change roles. So ServerB will be primary and ServerA will be secondary in standby mode.
- Do I need to re-configure log shipping when ServerB will be primary?
- If I disable old log shipping setting on ServerA, it will remove all log shipping jobs set up before. If I would like to keep all setting. What should I do? Rename the database LogShippingDB on ServerA?
- What's are good steps for changing old primary to secondary in standby mode and changing old secondary to primary?
Thanks!
0
Comment
Question by:luyan
  • 3
  • 2
5 Comments
 
LVL 16

Accepted Solution

by:
EvilPostIt earned 500 total points
ID: 34240491
Havnt tested it but you may be able to do a tail log backup from the primary and then restore it to the secondary with recovery. Although this is manual and you will have to remove and add log shipping again to ensure the job are copy and restoring in the right direction.

To be honest, if you want to be able to switch back and forth it would probably be a better idea to use mirroring.
0
 

Author Comment

by:luyan
ID: 34242185
Thanks EvilPostIT for your answer! Do you have any good document for configuring and using mirroring?
Thanks!
0
 

Author Comment

by:luyan
ID: 34293862
When something wrong on ServerA, I put the secondary node ServerB as the primary. When the issue is fixed, what should I do to change it back- ServerA as primary node, and ServerB as secondary node again? And put ServerB as standby database again?
Thanks!
0
 
LVL 16

Expert Comment

by:EvilPostIt
ID: 34299256
Is it still mirroring? or is the mirror broken.

Appologies about not replying before. Must have missed that notification.
0
 

Author Comment

by:luyan
ID: 34301928
Thanks!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Why is this different from all of the other step by step guides?  Because I make a living as a DBA and not as a writer and I lived through this experience. Defining the name: When I talk to people they say different names on this subject stuff l…
This article will show you how to create an ISO CD-ROM/DVD-ROM image (*.iso), and MD5 checksum signature, for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5). It's a good idea to compare checksums, because many installations fail because of a corr…
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
Viewers will learn how to use the SELECT statement in SQL and will be exposed to the many uses the SELECT statement has.

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now