SQL 2008 Log shipping set-up in Database Mirroring

Posted on 2011-10-04
Last Modified: 2012-05-12
Hello there,

I am planning to set-up Log shipping in Database mirroring for DR failover. I will be using Principal server in Data Centre to be Log shipping Primary Server and a server in DR site to be secondary standby server. Log shipping to be scheduled every 4 hours between sites.
In the event of Data Centre going down, secondary log shipping server in DR centre can be manaully connected to users.

Has any one tried this before?Is this a possible solution for DR/

Please advise.

Thanks and Regards
Question by:goprasad
    LVL 32

    Accepted Solution


    First take a look at this article

    If your server is accessed through the internet from the principal and mirror, you have to do things the hard way.
    You will need an ftp server and a client that supports SSL or SSH, There are free ones out there.
    On your principal, create a maintenance job that does your log backups and schedule it as neccessary.
    On the second step of the job, invoke your ftp client and send the log backup to the remote server.

    On the remote server, you will create another maintenance plan to restore the transaction log sent to it

    That's it in a nutshell

    Author Comment

    Front-end applications are Sharepoint and web based.
    LVL 10

    Expert Comment

    when u use log shipping or mirroing the DR Databases will be down ,i mean in no restoration mode , where users cannot connect to the database , or in stabdby mode only users can select from the databse

    Author Comment

    Hello ewangoya:

    To my original quesion, will the scenario works, where in if the In the event of Data Centre going down, can we direct users manually to secondary log shipping server in DR centre?

    Log shipping from the Data Centre to DR is over the wire scheduled for every 4 hours.

    Please advise.
    LVL 32

    Expert Comment


    It should work, just remember to change the database from stand by mode
    4 hours does seem a bit of a stretch unless they don't do allot of edits

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Join & Write a Comment

    There have been several questions about Large Transaction Log Files in SQL Server 2008, and how to get rid of them when disk space has become critical. This article will explain how to disable full recovery and implement simple recovery that carries…
    In this article I will describe the Backup & Restore method as one possible migration process and I will add the extra tasks needed for an upgrade when and where is applied so it will cover all.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    25 Experts available now in Live!

    Get 1:1 Help Now