Solved

Double - Take Availibility ( for Ms Exchange )

Posted on 2012-12-31
3
531 Views
Last Modified: 2013-01-09
Hi,
I wonder how to setup double-take availability for and exchange server ( physical server ) to destination virtual machine.

Actually how does replication works with double-take availability ? I means physical server where we ran exchange 2010 now have been installed and running, so if I have new virtual machine installed, do I need to install the exchange server in virtual machine ? or double-take availability will do restore through it programs and start synchronization ?
0
Comment
Question by:motioneye
  • 2
3 Comments
 
LVL 32

Expert Comment

by:Rodney Barnhardt
ID: 38733070
I am not familiar with Double-Take, but why are you worrying with something like that? You could just set up a separate Exchange server and use the DAG's. The fail over works very well.


However, below is a link on how to configure Double-Take and how the fail over works with 2010.

http://en.community.dell.com/techcenter/partners/w/wiki/3668.exchange-2010-dag-protection-using-double-take-availability-6-0.aspx
0
 

Author Comment

by:motioneye
ID: 38733099
Hi,
I'm sorry, I dont know what is DAG's ?
0
 
LVL 32

Accepted Solution

by:
Rodney Barnhardt earned 500 total points
ID: 38733111
It is the data base the Exchange 2010 keeps all of the data. In Exchange 2010, they are referred to Database Availability Groups. Basically, there is a primary and a secondary, if there is a failure, clients are pointed to the database on the second mailbox server. We run two mailbox server at our production site and two mailbox servers at our DR site. The data is constantly sync'd. Once copy is set to stay 24 hrs behind the rest in the event of a corrupt database.

http://www.msexchange.org/articles_tutorials/exchange-server-2010/high-availability-recovery/uncovering-exchange-2010-database-availability-groups-dags-part1.html
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Following basic email etiquette rules will help you write a professional email and achieve a good, lasting impression with your contacts.
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now