Solved

DAG and FSW issues

Posted on 2014-01-28
5
139 Views
Last Modified: 2014-11-24
I have a 2 (AD)site exchange 2010 DAG set up.  I moved the FSW to a third site on a Domain controller (I know not optimal).  I recently shut down one site and thought that the high availability would keep the second site on line as the FSW and the one Server(hub/mailbox) would accomplish having the 2 votes needed to have quorum and stay on line and take over.

I look at the cluster properties and it shows that the FSW is still the old one I initially set up.  It also shows that the Quorum type is nodeandfilesharemajority.

Any help would be much appreciated!

Thanks
0
Comment
Question by:cdshreve
  • 2
  • 2
5 Comments
 
LVL 16

Expert Comment

by:Rajitha Chimmani
ID: 39816016
Each cluster resource has private and public properties. Refer the link below and check if you see your changes.

http://technet.microsoft.com/en-us/library/dd351172.aspx
0
 

Author Comment

by:cdshreve
ID: 39816101
Should have let you all know we have Win 2008 R2 boxes for the Exchange servers and the DC.
Since it is a DC you can't add the Exchange Trusted Subsystem universal security group to the local Administrators group on it but it let exchange create the folders and files.

Other than that I think I covered everything in that article....
0
 
LVL 16

Expert Comment

by:Rajitha Chimmani
ID: 39816141
0
 
LVL 23

Accepted Solution

by:
Malli Boppe earned 500 total points
ID: 39816629
You probably havn't moved thre FSW properly.
Can you run the below commands to move it to the third site.

http://www.msexchange.org/kbase/ExchangeServerTips/ExchangeServer2010/HighAvailability/MoveFileShareWitnessFSW.html
0
 

Author Comment

by:cdshreve
ID: 39818754
That is the command I used to move it to the third site and I added the actual directory.

So I tried moving it to a CAS server on the 2nd site, and it works like a charm.  soooo, it looks to be an issue with the DC in the third site.  Could it be a FW issue?  What ports does it use to communicate to the FSW?
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Marketers need statistics and metrics like everybody else needs oxygen. In this article we explain how to enable marketing campaign statistics for Microsoft Exchange mail.
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
In this Micro Tutorial viewers will learn how to restore their server from Bare Metal Backup image created with Windows Server Backup feature. As an example Windows 2012R2 is used.
In this Micro Tutorial viewers will learn how to restore single file or folder from Bare Metal backup image of their system. Tutorial shows how to restore files and folders from system backup. Often it is not needed to restore entire system when onl…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now