Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Exchange 2007 metabase

Posted on 2014-01-10
1
173 Views
Last Modified: 2016-11-23
We have Exchange 2007 installed on a server in a RAID 1 configuration.  We have some Exchange storage groups on a external enclosure (Dell MD1200) in a RAID 10 configuration. If one of the drives in the RAID 10 fails, I assume there is a short period of time until the mirrored drives takes over. During that short period of time, is there any chance of Exchange data being corrupted or any other issues with Exchange because Exchange is unable to read/write to the storage groups?  The Exchange metabase would be on the C: drive (RAID 1) and the storage groups would be on the D: drive (RAID 10).  Thanks.
0
Comment
Question by:smaragh
1 Comment
 
LVL 31

Accepted Solution

by:
Gareth Gudger earned 500 total points
ID: 39772393
There is really no guarantee. 99 out of 100 times the answer is that everything would be fine. But then I have also seen Exchange corruption seemingly come out of nowhere with no apparent hardware problems. On the other hand in the last two weeks one of my clients had a drive fail on their RAID 5 array on a file server and that caused all sorts of corruption, even though RAID 5 was supposed to protect against this sort of thing. If you don't have them already battery-backed write cache modules can help a lot, especially if your controller dies or after sudden power loss. The ultimately protection would be to implement an Exchange cluster but that was a bear in 2007. The DAGs in 2010 and later were significantly easier to setup and maintain. The other thing is backups. Test thoroughly that you can get data back out.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have put this article together as i needed to get all the information that might be available already into one general document that could be referenced once without searching the Internet for the different pieces. I have had a few issues where…
Learn about cloud computing and its benefits for small business owners.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question