Solved

How to relocate Exchange Storage Group Log safely with minimal downtime possible ?

Posted on 2012-03-26
5
493 Views
Last Modified: 2012-04-01
Hi people,

I'd like to redirect or repoint only one of the Exchange Server 2007 SP1 Storage Group transaction Log from one Disk to another one. Since this server configured using CCR to the DR mailbox server, what is the best and most approrpiate way to avoid data loss or minimize downtime ?

Thanks.
0
Comment
  • 2
  • 2
5 Comments
 
LVL 6

Expert Comment

by:KalluSureshKumar
ID: 37769838
Best way without down time. Add additional Storage group pointing to your new disk. Move the mailboxes . and remove the old storage group .
0
 
LVL 3

Expert Comment

by:dreamraghu
ID: 37769841
Follow the below technet article:
http://technet.microsoft.com/en-us/library/bb201703(v=exchg.80).aspx

After doing the steps mentioned in Active node, we have to do reseeding in the passive node.
0
 
LVL 7

Author Comment

by:Senior IT System Engineer
ID: 37769850
ok, Here's what I got in mind.

Create 100 GB disk as temporary Transaction log holder on each of the Mailbox Server nodes (Prod and DR).
Therefore in the event of full transaction log disk space, I can do the following:

1.      Make sure the replication is suspended (no need to dismount the DB as it is dismounted already when the log drive is full).
2.      Manually copy the transaction log into the new temporary log drive in both nodes
3.      Change the SG log file location from the EMC into the new location.
4.      Mount the Database
5.      Resume the SG replication copy
6.      Full backup the affected SG with The backup Software (Backup Exec / HP Data protector)
0
 
LVL 3

Accepted Solution

by:
dreamraghu earned 500 total points
ID: 37769964
Correction:

Create 100 GB disk as temporary Transaction log holder on each of the Mailbox Server nodes (Prod)

Therefore in the event of full transaction log disk space, I can do the following:

1.      Make sure the replication is suspended (no need to dismount the DB as it is dismounted already when the log drive is full).
2.      Manually copy the transaction log into the new temporary log drive in production node - If you manually copy the log files to a new folder, we will not be able to change the path from the EMC, you have to use the ADSI edit tool to change the location: msExchESEParmLogFilePath
(or) if you want to move manually, you can right click on the SG and select the option "Move Storage Group Path" -> Log files path -> browse to the new location.

4.      Mount the Database
5.      Reseed the database to the DR site copy.
6.      Full backup the affected SG with The backup Software (Backup Exec / HP Data protector)
0
 
LVL 7

Author Comment

by:Senior IT System Engineer
ID: 37769986
Thanks Raghu,

At first I was thinking to just swap the drive letter so that the new log drive is using the same letter, but then Window warned me that it requires Reboot which isn't what I want.
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Read this checklist to learn more about the 15 things you should never include in an email signature.
This article runs through the process of deploying a single EXE application selectively to a group of user.
This tutorial will walk an individual through the steps necessary to install and configure the Windows Server Backup Utility. Directly connect an external storage device such as a USB drive, or CD\DVD burner: If the device is a USB drive, ensure i…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question