Mailbox Server Switchver vs Failover

Posted on 2013-01-22
Last Modified: 2013-01-24
Is there any difference between doing a manual "Server Switchover" versus allowing the Mailbox Database to automatically failover to a passive copy in a DAG?

Technet article explains both and states that during a server failover for server hardware maintenance that "A passive database copy will be in the state that existed at the time when the system was shut down."

Is it possible to affect any client OWA, ActiveSync in even the smallest way for example if they had a draft open in Webmail for example?

If not what would be the reason to ever initiate a manual switchover prior to restarting a Mailbox Server?
Question by:mroger_au
  • 3
  • 2
LVL 52

Expert Comment

by:Manpreet SIngh Khatra
ID: 38808556
Switch over as you say is more of a Manual intervention to get the second server up and running more like LAG

DAG failover is quick and shouldnt affect, LAG is a bit time consuming and could be some issues

My question how would you instantaneously understand you need to do Manual failover ?

- Rancy

Author Comment

ID: 38809372
I am wondering if I need to restart a mailbox server for system maintenance if there is any reason why I shouldn't just reboot it and let the passive database take over.

Is there any reason to do a manual "Switchover Server" from the EMC prior to restarting a Mailbox server? Or do system maintenance outside of business hours?
LVL 52

Expert Comment

by:Manpreet SIngh Khatra
ID: 38809515
No if its DAG it should be automatic but for ensureing no donwtime you can switch over and After Production hours is the best way forwrad

- Rancy

Author Comment

ID: 38812366
OK. But from a technical point of view as long as the DAG is working as designed it is not possible for any client to lose even a single email while the databases failover?
LVL 52

Accepted Solution

Manpreet SIngh Khatra earned 500 total points
ID: 38814110
Yes no emails should be lost even in Failover mode

- Rancy

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Find out what you should include to make the best professional email signature for your organization.
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
how to add IIS SMTP to handle application/Scanner relays into office 365.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now