?
Solved

SQL server 2008 cluster & file ownerships

Posted on 2012-03-30
3
Medium Priority
?
255 Views
Last Modified: 2012-04-10
Hi,
I need to understand file ownership on SQL server cluster which is based on Microsoft cluster technology.

I have a SAN drive , a clustered disk (I drive)  mounted on both SQL server nodes but only one can see it . The other can access it via windows share but can't see it as a drive.

Now I thought is wrong mainly because if it's a clustered resource then both node should able to see it at any given time.

How does drive sharing works under Microsoft cluster technology?

Please paste me some MVP blog links than MS doc pages.

Thanks
0
Comment
Question by:crazywolf2010
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 22

Accepted Solution

by:
65td earned 2000 total points
ID: 37789198
•Microsoft uses what is called a shared-nothing model when it comes to managing disks. Shared-nothing means that each physical disk or hardware fault-tolerant disk set on the shared SCSI bus can be owned (accessed) by only one node of the cluster at a time.


see under Disk Configuration section:
http://support.microsoft.com/kb/259267
0
 

Author Comment

by:crazywolf2010
ID: 37789504
Hi,
Could you please paste me a link or a document which details on how shared nothing model works?

Thanks
0
 
LVL 22

Expert Comment

by:65td
ID: 37829869
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

INTRODUCTION: While tying your database objects into builds and your enterprise source control system takes a third-party product (like Visual Studio Database Edition or Red-Gate's SQL Source Control), you can achieve some protection using a sing…
Naughty Me. While I was changing the database name from DB1 to DB_PROD1 (yep it's not real database name ^v^), I changed the database name and notified my application fellows that I did it. They turn on the application, and everything is working. A …
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question