{"id":1723,"date":"2009-04-23T23:50:51","date_gmt":"2009-04-23T21:50:51","guid":{"rendered":"http:\/\/www.corelan.be:8800\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/"},"modified":"2009-04-23T23:50:51","modified_gmt":"2009-04-23T21:50:51","slug":"first-look-at-exchange-2010-beta1-high-availability-using-dag","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/","title":{"rendered":"First look at Exchange 2010 Beta1 High Availability using DAG"},"content":{"rendered":"<p>Lab config : <\/p>\n<ul>\n<li>1 x Windows 2008 server Standard Edition, 64bit : DC + HUB\/CAS Server role : dionysus \u2013 192.168.0.21<\/li>\n<li>2 x Windows 2008 servers Enterprise Edition, 64bit : Mailbox server roles : exch2010mb1 (192.168.0.22) and exch2010mb2 (192.168.0.23)\n<ul>\n<li>2 Databases will be created (one on each mailbox server, created automatically when the Mailbox role is installed)<\/li>\n<li>One DAG will be created<\/li>\n<li>Both mailbox servers will be added into a DAG for High Availability.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> A lot of changes have been made to Exchange 2010 with regards to High Availability. SCC is no longer supported in 2010. SCR and CCR are combined into a \u201cDatabase Availability Group\u201d. Per DAG, you can combine up to 16 Exchange servers (which can span Active Directory sites) that will provide automatic database-level recovery from failures that affect individual databases.\u00a0 And you no longer need to deploy a Microsoft Cluster to achieve high availability. (The Failover Clustering Feature needs to be installed, but you don\u2019t need to configure it yourself). Furthermore, the Microsoft documentation states : <\/p>\n<blockquote><p><em>\u201cExchange 2010 has been re-engineered around the concept of continuous availability, in which the architecture has changed so that automatic failover protection is now provided at the individual mailbox database level instead of at the server level. In Exchange 2010, this is known as database mobility. As a result of this and other database cache architectural changes, failover actions now complete much faster than in previous versions of Exchange. For example, failover of a clustered mailbox server in a CCR environment running Exchange 2007 with Service Pack 1 completes in about 2 minutes. By comparison, failover of a mailbox database in an Exchange 2010 environment completes in 30 seconds (measured from the time when the failure is detected to when a database copy is mounted, assuming the copy is healthy and up-to-date with log replay). The combination of database-level failovers and significant faster failover times dramatically improves an organization's overall uptime.\u201d<\/em><\/p><\/blockquote>\n<p> Storage Groups are gone in Exchange 2010. All that is left are databases. Makes sense, because Microsoft always recommended to put only one database in a storage group, so the concept of storage groups became somewhat redundant. The entire Exchange 2010 set up can now be made highly available. In fact, you can put everything on just two servers and make it high available (whereas in 2007, the HUB\/CAS role could not be clustered, so you needed dedicated hardware for the mailbox servers and dedicated hardware for the HUB\/CAS servers).\u00a0 In 2010, this is no longer true. I could have installed my testlab on 2 servers only. For more info, check these pages : <a title=\"http:\/\/blogs.technet.com\/ewan\/archive\/2009\/04\/15\/exchange-2010-beta-high-availability-strategies.aspx\" href=\"https:\/\/web.archive.org\/web\/20090422050510\/http:\/\/blogs.technet.com:80\/ewan\/archive\/2009\/04\/15\/exchange-2010-beta-high-availability-strategies.aspx\">http:\/\/blogs.technet.com\/ewan\/archive\/2009\/04\/15\/exchange-2010-beta-high-availability-strategies.aspx<\/a> <a title=\"High Availability and Site Resilience\" href=\"http:\/\/technet.microsoft.com\/en-us\/library\/dd633496(EXCHG.140).aspx\">High Availability and Site Resilience<\/a> <a title=\"Database Availability Group (DAG) -Exchange 2010\" href=\"https:\/\/web.archive.org\/web\/20190502031809\/http:\/\/www.exchange-genie.com:80\/2009\/04\/database-availability-group-dag-exchange-2010\">Database Availability Group (DAG) -Exchange 2010<\/a> You can find more information about Exchange 2010 on Technet at\u00a0 <a title=\"http:\/\/technet.microsoft.com\/en-us\/library\/bb124558(EXCHG.140).aspx\" href=\"http:\/\/technet.microsoft.com\/en-us\/library\/bb124558(EXCHG.140).aspx\">http:\/\/technet.microsoft.com\/en-us\/library\/bb124558(EXCHG.140).aspx<\/a> \u00a0 <em><\/em> <\/p>\n<h3>HUB\/CAS - Installation Procedure<\/h3>\n<p> DC : default install, has AD Directory Services installed (and basics configured such as subnet under sites&amp;services, DNS etc) + IIS\/HTTP Activation\/etc (see list of prerequisites below). <em>Remark : if you want to disable IPv6 on Windows 2008, make sure to do it properly, or you will see event log entries that look like this :<\/em> <\/p>\n<blockquote><p><em><span style=\"font-size: xx-small;\">Source: MSExchange ADAccess Event ID: 2114 Task Category: Topology Level: Error<\/span><\/em> <em><span style=\"font-size: xx-small;\">Description: Process MSEXCHANGEADTOPOLOGYSERVICE.EXE (PID=952). Topology discovery failed, error 0x80040a02 (DSC_E_NO_SUITABLE_CDC). Look up the Lightweight Directory Access Protocol (LDAP) error code specified in the event description. To do this, use Microsoft Knowledge Base article 218185, \"Microsoft LDAP Error Codes.\" Use the information in that article to learn more about the cause and resolution to this error. Use the Ping or PathPing command-line tools to test network connectivity to local domain controllers.<\/span><\/em><\/p><\/blockquote>\n<p> <em>Check out\u00a0 <\/em><a title=\"http:\/\/blogs.technet.com\/sbs\/archive\/2008\/10\/24\/issues-after-disabling-ipv6-on-your-nic-on-sbs-2008.aspx\" href=\"https:\/\/web.archive.org\/web\/20100501141627\/http:\/\/blogs.technet.com:80\/sbs\/archive\/2008\/10\/24\/issues-after-disabling-ipv6-on-your-nic-on-sbs-2008.aspx\"><em>http:\/\/blogs.technet.com\/sbs\/archive\/2008\/10\/24\/issues-after-disabling-ipv6-on-your-nic-on-sbs-2008.aspx<\/em><\/a><em> and use the registry edit described in that document in order to properly disable IPv6 (and don\u2019t forget to comment out the hosts file entry \u201clocalhost ::1\u201d)<\/em> On the DC (machine that will become HUB\/CAS \u2013 I know, bad idea to do this in real life, but hey \u2013 it\u2019s a test environment) : I\u2019ve logged in with enterprise\/schema admin permissions Prerequisites : <\/p>\n<ul>\n<li>IIS\u00a0 (don\u2019t forget to enable IIS7 .Net Extensibility, the various Authentication options under \u201cSecurity\u201d and to enable \u201cDynamic Content Compression\u201d)<\/li>\n<\/ul>\n<blockquote><p><a href=\"\/wp-content\/uploads\/2009\/04\/image1.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb1.png\" border=\"0\" alt=\"image\" width=\"147\" height=\"106\" \/><\/a> Also, enable \u201cIIS6 Metabase Compatibility\u201d and \u201cIIS6 Management Console\u201d<\/p><\/blockquote>\n<ul>\n<li>HTTP Activation Feature (under .Net Framework 3.0 Features\\WCF Activation)<\/li>\n<\/ul>\n<blockquote><p><a href=\"\/wp-content\/uploads\/2009\/04\/image2.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb2.png\" border=\"0\" alt=\"image\" width=\"189\" height=\"74\" \/><\/a><\/p><\/blockquote>\n<ul>\n<li>Windows Process Activation Service Process Model\u00a0 (automatically installed while installing IIS)<\/li>\n<li>MS KB 951725 : <a title=\"http:\/\/support.microsoft.com\/kb\/951725\" href=\"http:\/\/support.microsoft.com\/kb\/951725\">http:\/\/support.microsoft.com\/kb\/951725<\/a> (Needs a reboot)<\/li>\n<li>MS KB 950888 : <a title=\"http:\/\/support.microsoft.com\/?kbid=950888\" href=\"http:\/\/support.microsoft.com\/?kbid=950888\">http:\/\/support.microsoft.com\/?kbid=950888<\/a> (Needs a reboot)<\/li>\n<li>.NET Framework 3.5 (<a title=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=110461\" href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=110461\">http:\/\/go.microsoft.com\/fwlink\/?LinkId=110461<\/a>) \u2013 this one needs access to the internet, or use this link : <a title=\"dotnetfx35.exe\" href=\"http:\/\/download.microsoft.com\/download\/2\/0\/e\/20e90413-712f-438c-988e-fdaa79a8ac3d\/dotnetfx35.exe\">dotnetfx35.exe<\/a> to download the full package.<\/li>\n<li>WinRM 2.0 (CTP3) Remote Management 2.0 : <a title=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=135126\" href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=135126\">http:\/\/go.microsoft.com\/fwlink\/?LinkId=135126<\/a> (for Windows 2008 64bit : <a title=\"WinRM CTP3 on Vista and WS08 (x64)\" href=\"https:\/\/connect.microsoft.com\/WSMAN\/Downloads\/DownloadDetails.aspx?DownloadID=15749\">WinRM CTP3 on Vista and WS08 (x64)<\/a>) \u2013 (Needs a reboot)<\/li>\n<li>Powershell v2 : <a title=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=135123\" href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=135123\">http:\/\/go.microsoft.com\/fwlink\/?LinkId=135123<\/a><\/li>\n<\/ul>\n<p> <em>A quick note on requirements satisfaction and automated installs: The following website (\u00a0<\/em><a href=\"http:\/\/www.exchangemaster.net\/index.php?option=com_content&amp;task=view&amp;id=98&amp;Itemid=57\"><em>http:\/\/www.exchangemaster.net\/index.php?option=com_content&amp;task=view&amp;id=98&amp;Itemid=57<\/em><\/a><em>\u00a0) shows a quick technique and script to automate the installation of the requirements<\/em> <span> <\/span> Anyways, When all requirements are met : Launch setup.exe and choose \u201cInstall Microsoft Exchange\u201d <a href=\"\/wp-content\/uploads\/2009\/04\/image3.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb3.png\" border=\"0\" alt=\"image\" width=\"274\" height=\"209\" \/><\/a> \u00a0<a href=\"\/wp-content\/uploads\/2009\/04\/image131.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image131-thumb.png\" border=\"0\" alt=\"image\" width=\"189\" height=\"167\" \/><\/a> <a href=\"\/wp-content\/uploads\/2009\/04\/image4.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb4.png\" border=\"0\" alt=\"image\" width=\"188\" height=\"167\" \/><\/a> Continue setup without additional language files <a href=\"\/wp-content\/uploads\/2009\/04\/image5.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb5.png\" border=\"0\" alt=\"image\" width=\"143\" height=\"58\" \/><\/a> Accept the warning and click next Accept the License Agreement <a href=\"\/wp-content\/uploads\/2009\/04\/image6.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb6.png\" border=\"0\" alt=\"image\" width=\"143\" height=\"106\" \/><\/a> Error Reporting : choose Yes or No and click next Installation Type : Choose custom <a href=\"\/wp-content\/uploads\/2009\/04\/image7.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb7.png\" border=\"0\" alt=\"image\" width=\"143\" height=\"106\" \/><\/a> Select the Hub Transport, Client Access Roles (Exchange Management Console will be selected automatically). Disk space required for these 2 roles : 1094Mb <a href=\"\/wp-content\/uploads\/2009\/04\/image8.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb8.png\" border=\"0\" alt=\"image\" width=\"143\" height=\"100\" \/><\/a> Enter Exchange Organization name <a href=\"\/wp-content\/uploads\/2009\/04\/image9.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb9.png\" border=\"0\" alt=\"image\" width=\"322\" height=\"114\" \/><\/a> Choose whether you wan to join the Exchange Customer Experience Improvement Program Readiness check will now run \u2013 wait until this process has completed. <a href=\"\/wp-content\/uploads\/2009\/04\/image10.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb10.png\" border=\"0\" alt=\"image\" width=\"240\" height=\"110\" \/><\/a> <a href=\"\/wp-content\/uploads\/2009\/04\/image11.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb11.png\" border=\"0\" alt=\"image\" width=\"239\" height=\"155\" \/><\/a> Review outcome of the Readiness Check process (and perform all requested actions before continuing) Click install to start the installation <a href=\"\/wp-content\/uploads\/2009\/04\/image12.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb12.png\" border=\"0\" alt=\"image\" width=\"261\" height=\"178\" \/><\/a> The first server is now set up. Close the installation program, reboot and verify that all relevant MS Exchange services are started <a href=\"\/wp-content\/uploads\/2009\/04\/image13.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb13.png\" border=\"0\" alt=\"image\" width=\"299\" height=\"125\" \/><\/a> Open AD U&amp;C and verify that the server is added to the \u201cExchange Servers\u201d group in the MS Exchange Security OU <a href=\"\/wp-content\/uploads\/2009\/04\/image14.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb14.png\" border=\"0\" alt=\"image\" width=\"327\" height=\"221\" \/><\/a> The Exchange Management Console looks very similar to the one in Exchange 2007 : <a href=\"\/wp-content\/uploads\/2009\/04\/image15.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb15.png\" border=\"0\" alt=\"image\" width=\"278\" height=\"101\" \/><\/a> \u00a0<a href=\"\/wp-content\/uploads\/2009\/04\/image16.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb16.png\" border=\"0\" alt=\"image\" width=\"276\" height=\"111\" \/><\/a> At this point, under \u201cServer Configuration\u201d - \u201cClient Access\u201d\u00a0 or\u00a0 \u201cHub transport\u201d, you should be able to see the first server. <a href=\"\/wp-content\/uploads\/2009\/04\/image17.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb17.png\" border=\"0\" alt=\"image\" width=\"298\" height=\"161\" \/><\/a> When you look at the Management Console, you can see an additional (top) level node called \u201cMicrosoft Exchange On-Premises\u201d When you select this top level node, you get the following overview : <a href=\"\/wp-content\/uploads\/2009\/04\/image18.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb18.png\" border=\"0\" alt=\"image\" width=\"287\" height=\"150\" \/><\/a> You can run the \u201cGather Organizational Information\u201d task from the Actions pane to enumerate server\/user information and populate the summary screens : <a href=\"\/wp-content\/uploads\/2009\/04\/image19.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb19.png\" border=\"0\" alt=\"image\" width=\"234\" height=\"118\" \/><\/a> <a href=\"\/wp-content\/uploads\/2009\/04\/image20.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb20.png\" border=\"0\" alt=\"image\" width=\"260\" height=\"237\" \/><\/a> \u00a0 One way of validating that the CAS server works is by trying to connect to OWA. Although you will get a certificate warning and there are no mailbox servers yet, you should at least get a password prompt when entering https:\/\/fqdn.of.server\/owa <a href=\"\/wp-content\/uploads\/2009\/04\/image21.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb21.png\" border=\"0\" alt=\"image\" width=\"246\" height=\"229\" \/><\/a> \u00a0 Nice, but not very useful so far, we don\u2019t have a mailbox server or mailboxes yet \ud83d\ude42 \u00a0 <\/p>\n<h3>Mailbox Server \u2013 Installation Procedure<\/h3>\n<p> Again, make sure all requirements for installing a Exchange 2010 Mailbox server have been verified : <\/p>\n<ul>\n<li>.Net Framework 3.5<\/li>\n<li>Windows Remote Management 2.0<\/li>\n<li>Windows Powershell v2<\/li>\n<li>IIS (same requirements as hub\/cas role)<\/li>\n<li>KB 951725<\/li>\n<li>Failover Clustering Feature (if you want to use the DAG functionality)<\/li>\n<li>Office System Converter : Microsoft Filter Pack (<a title=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=123380\" href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=123380\">http:\/\/go.microsoft.com\/fwlink\/?LinkId=123380<\/a>)<\/li>\n<\/ul>\n<p> \u00a0 Log on with Exchange administrator permissions and local admin permissions, and launch the Exchange server installation. Select Custom installation and select the Mailbox Role <a href=\"\/wp-content\/uploads\/2009\/04\/image22.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb22.png\" border=\"0\" alt=\"image\" width=\"234\" height=\"158\" \/><\/a> Choose whether you want to allow Outlook 2003 and older clients to connect or not (so whether you want to create a public folder or not) Review the Readiness Check results and start the installation <a href=\"\/wp-content\/uploads\/2009\/04\/image23.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb23.png\" border=\"0\" alt=\"image\" width=\"267\" height=\"121\" \/><\/a> <\/p>\n<blockquote><p>Note : if you are trying to install the Exchange 2010 Beta 1 mailbox role on a cluster node, you will get the following error in the output of the Readiness Check : <em>\u201cThe cluster service is installed on this computer. The machine must not be a member of a cluster prior to installing Exchange\u201d<\/em> As explained at the top of this document, you simply don\u2019t need clustering for high availability in Exchange 2010.<\/p><\/blockquote>\n<p> Let\u2019s continue with the setup. <a href=\"\/wp-content\/uploads\/2009\/04\/image24.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb24.png\" border=\"0\" alt=\"image\" width=\"217\" height=\"203\" \/><\/a> When enabled, Exchange Management Console will open after pressing Finish. Verify that the new mailbox server is listed. <a href=\"\/wp-content\/uploads\/2009\/04\/image25.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb25.png\" border=\"0\" alt=\"image\" width=\"340\" height=\"131\" \/><\/a> Verify that all required Exchange services (for Mailbox servers) have been installed and are started : <a href=\"\/wp-content\/uploads\/2009\/04\/image26.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb26.png\" border=\"0\" alt=\"image\" width=\"451\" height=\"176\" \/><\/a> Create a mailbox and verify that you can access the mailbox using OWA : <a href=\"\/wp-content\/uploads\/2009\/04\/image27.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb27.png\" border=\"0\" alt=\"image\" width=\"396\" height=\"263\" \/><\/a> Looks fine. Now it\u2019s time to add some redundancy\/high availability to the mailbox server by creating a DAG (see <a title=\"Managing Database Availability Groups\" href=\"http:\/\/technet.microsoft.com\/en-us\/library\/dd298065(EXCHG.140).aspx\">Managing Database Availability Groups<\/a>). A DAG uses a subset of Microsoft Clustering services \/ Failover Clustering (on Windows 2008) and requires a File Share Witness (just like a cluster would).\u00a0 Before creating the DAG, create a folder (on the CAS\/HUB server, share the folder and make sure the mailbox servers can access the share).\u00a0 In my lab, I have created share \\\\dionysus\\FileShareWitness.\u00a0 (Or alternatively, the folder and share the folder on the File Share Witness target server will be created automatically if they don\u2019t not exist yet, but only when the second node is added to the DAG. (So don\u2019t be surprised that the folder and share are not created if only one server is added to the DAG). In fact, the File Share Witness is only used when you have an even number of servers in the DAG. If you have an uneven number of servers, the FSW is not used. First, make sure the Failover Clustering Feature is installed on the server that you want to add to the DAG (It only needs to be installed, not configured. If a failover cluster was configured when you installed Exchange, you would not have been able to install the Mailbox Role in the first place) In EMC, under \u201cOrganization Configuration\u201d - \u201cMailbox\u201d, click \u201cNew Database Availability Group\u201d <a href=\"\/wp-content\/uploads\/2009\/04\/image28.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb28.png\" border=\"0\" alt=\"image\" width=\"354\" height=\"251\" \/><\/a> Or in Powershell : <\/p>\n<div>\u00a0<\/div>\n<div>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">[PS] C:\\&gt;New-DatabaseAvailabilityGroup -Name <span style=\"color: #006080\">'DAG1'<\/span><\/pre>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">\u00a0\u00a0\u00a0\u00a0 -FileShareWitnessShare <span style=\"color: #006080\">'\\\\dionysus\\FileShareWitness'<\/span>\u00a0<\/pre>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\"> -FileShareWitnessDirectory <span style=\"color: #006080\">'c:\\FileShareWitness'<\/span> Name Member Servers Operational Servers ---- -------------- ------------------- DAG1 {} [PS] C:\\&gt;Set-DatabaseAvailabilityGroup -id <span style=\"color: #006080\">'DAG1'<\/span>\u00a0<\/pre>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\"> -NetworkEncryption <span style=\"color: #006080\">'InterSubnetOnly'<\/span>\u00a0<\/pre>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\"> -NetworkCompression <span style=\"color: #006080\">'InterSubnetOnly'<\/span><\/pre>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">WARNING: The command completed successfully but no settings of <span style=\"color: #006080\">'DAG1'<\/span> have been modified. [PS] C:\\&gt;<\/pre>\n<\/p><\/div>\n<p> <strong><em>A quick note on Powershell : there are some known issues with the Beta1 version and remote powershell, so if something doesn\u2019t work, then try the \u201cLocal Powershell\u201d version.<\/em><\/strong> Verify that you can access the FileShareWitness share from all mailbox servers that need to be joined to the DAG \u2018Cluster\u2019.\u00a0 The servers must have read\/write access. Add the first server into the DAG. You can add a server using the GUI or via Powershell. If you want to use the GUI (not advised \u2013 see below), select the newly created DAG, right-click and choose \u201cManage Database Availability Group Membership\u201d <a href=\"\/wp-content\/uploads\/2009\/04\/image29.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb29.png\" border=\"0\" alt=\"image\" width=\"274\" height=\"120\" \/><\/a> Add the mailbox server(s) into the DAG <a href=\"\/wp-content\/uploads\/2009\/04\/image30.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb30.png\" border=\"0\" alt=\"image\" width=\"238\" height=\"112\" \/><\/a> Powershell : <\/p>\n<div>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">Add-DatabaseAvailabilityGroupServer -Identity <span style=\"color: #006080\">'DAG1'<\/span> -MailboxServer <span style=\"color: #006080\">'EXCH2010MB1'<\/span> <span style=\"color: #006080\"> -DatabaseAvailabilityGroupIpAddress 192.168.0.24<\/span><\/pre>\n<\/p><\/div>\n<p> (You only need to specify the DatabaseAvailabilityGroupIpAddress when adding the first server to the DAG. If you don\u2019t specify this parameter, a IPv4 address will be leased from DHCP).\u00a0 Keep in mind that you cannot specify the IP address when using the GUI, so it\u2019s advised to use powershell when adding the first server to the DAG.\u00a0 This parameter is not required when adding more servers to the DAG.) <a href=\"\/wp-content\/uploads\/2009\/04\/image31.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb31.png\" border=\"0\" alt=\"image\" width=\"335\" height=\"131\" \/><\/a> After adding the first server into to the DAG, a computer object will be created. (So you must have permissions to add a computer object in AD). Alternatively, you can create a disabled computer object in AD prior to creating the DAG.\u00a0 <a href=\"\/wp-content\/uploads\/2009\/04\/image32.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb32.png\" border=\"0\" alt=\"image\" width=\"385\" height=\"91\" \/><\/a> \u00a0 Review the DAG network(s) and verify that the DAG replication (log shipping and seeding) will occur over the correct network interfaces\/subnets (if you have multiple NIC\u2019s). You can rename the networks if that makes more sense for you. The DAG network is also used by clients to connect to mailbox databases in the DAG.\u00a0 If replication is not enabled, the network can only be used by clients. My mailbox servers have 2 nic\u2019s : one in the network range accessible for clients (192.168.0.0\/24) and one in a separate back-end network range.\u00a0 The first network can be used for clients and for replication, the back-end will only be used for replication : <\/p>\n<div>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">[PS] C:\\&gt;Get-DatabaseAvailabilityGroupNetwork | FL RunspaceId : 61102664-677b-463e-88dc-0d41c8442f18 Name : DAGNetwork01 Description : Subnets : {{192.168.0.0\/24,Up}} Interfaces : {{exch2010mb1,Up,192.168.0.22}} MapiAccessEnabled : True ReplicationEnabled : True IgnoreNetwork : False Identity : DAG1\\DAGNetwork01 IsValid : True RunspaceId : 61102664-677b-463e-88dc-0d41c8442f18 Name : DAGNetwork02 Description : Subnets : {{1.1.1.0\/24,Up}} Interfaces : {{exch2010mb1,Up,1.1.1.10}} MapiAccessEnabled : False ReplicationEnabled : True IgnoreNetwork : False Identity : DAG1\\DAGNetwork02 IsValid : True<\/pre>\n<\/p><\/div>\n<p> \u00a0 Take a look at the database configuration on the mailbox server after adding it into the DAG. Initially, the database master was set to exch2010mb1 and the master type was set to \u201cServer\u201d, but now the master is set to \u201cDAG1\u201d and the Master Type is set to \u201cDatabase Availability Group\u201d <\/p>\n<div>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">[PS] C:\\&gt;Get-MailboxDatabase -server EXCH2010MB1 | FL RunspaceId : 7355ebc1-f541-40e1-9b66-ebe3a864dda2 StandbyMachines : {} JournalRecipient : MailboxRetention : 30.00:00:00 OfflineAddressBook : OriginalDatabase : PublicFolderDatabase : ProhibitSendReceiveQuota : 2.3 GB (2,469,396,480 bytes) Recovery : False ProhibitSendQuota : 2 GB (2,147,483,648 bytes) IndexEnabled : True IsExcludedFromProvisioning : False IsSuspendedFromProvisioning : False ReplicationType : None AdministrativeGroup : Exchange Administrative Group (FYDIBOHF23SPDLT) AllowFileRestore : False BackgroundDatabaseMaintenance : True BackupInProgress : CopyEdbFilePath : DatabaseCreated : True Description : EdbFilePath : C:\\Program Files\\Microsoft\\Exchange Server\\V1 4\\Mailbox\\Mailbox Database 1790164108\\Mailbox Database 1790164108.edb ExchangeLegacyDN : \/o=Corelantest Organization\/ou=Exchange Admin istrative Group (FYDIBOHF23SPDLT)\/cn=Configur ation\/cn=Servers\/cn=DIONYSUS\/cn=Microsoft Pri vate MDB HasLocalCopy : False DatabaseCopies : {Mailbox Database 1790164108} Servers : {EXCH2010MB1} ReplayLagTimes : {00:00:00} TruncationLagTimes : {00:00:00} RpcClientAccessServer : dionysus.corelantest.be MountedOnServer : DeletedItemRetention : 14.00:00:00 SnapshotLastFullBackup : SnapshotLastIncrementalBackup : SnapshotLastDifferentialBackup : SnapshotLastCopyBackup : LastFullBackup : LastIncrementalBackup : LastDifferentialBackup : LastCopyBackup : DatabaseSize : DatabaseAvailableSpace : MaintenanceSchedule : {zo.1:00-zo.5:00, ma.1:00-ma.5:00, di.1:00-di .5:00, wo.1:00-wo.5:00, <span style=\"color: #0000ff\">do<\/span>.1:00-<span style=\"color: #0000ff\">do<\/span>.5:00, vr.1 :00-vr.5:00, za.1:00-za.5:00} MountAtStartup : True Mounted : Organization : Corelantest Organization QuotaNotificationSchedule : {zo.1:00-zo.1:15, ma.1:00-ma.1:15, di.1:00-di .1:15, wo.1:00-wo.1:15, <span style=\"color: #0000ff\">do<\/span>.1:00-<span style=\"color: #0000ff\">do<\/span>.1:15, vr.1 :00-vr.1:15, za.1:00-za.1:15} RetainDeletedItemsUntilBackup : False Server : EXCH2010MB1 MasterServerOrAvailabilityGroup : DAG1 MasterType : DatabaseAvailabilityGroup ServerName : EXCH2010MB1 IssueWarningQuota : 1.899 GB (2,039,480,320 bytes) EventHistoryRetentionPeriod : 7.00:00:00 Name : Mailbox Database 1790164108 LogFolderPath : C:\\Program Files\\Microsoft\\Exchange Server\\V1 4\\Mailbox\\Mailbox Database 1790164108 CircularLoggingEnabled : False CopyLogFolderPath : LogFilePrefix : E00 LogFileSize : 1024 AdminDisplayName : Mailbox Database 1790164108 ExchangeVersion : 0.10 (14.0.100.0) DistinguishedName : CN=Mailbox Database 1790164108,CN=Databases,C N=Exchange Administrative Group (FYDIBOHF23SP DLT),CN=Administrative Groups,CN=Corelantest Organization,CN=Microsoft Exchange,CN=Service s,CN=Configuration,DC=corelantest,DC=be Identity : Mailbox Database 1790164108 Guid : 8360edd9-4cec-49ab-9e14-04b1fcd3f8ac ObjectCategory : corelantest.be\/Configuration\/Schema\/ms-Exch-P rivate-MDB ObjectClass : {top, msExchMDB, msExchPrivateMDB} WhenChanged : 22\/04\/2009 15:00:30 WhenCreated : 22\/04\/2009 14:17:14 OrganizationId : OriginatingServer : dionysus.corelantest.be IsValid : True<\/pre>\n<\/p><\/div>\n<p> \u00a0 Install the second mailbox server. Verify that all required services are running on the second mailbox server. Especially the Microsoft Exchange Replication Service and the Cluster service are important for the DAG process (and for adding the second mailbox server to the DAG) Add the second mailbox server to the DAG. From this point forward, database level recovery for the database will be enabled automatically. <\/p>\n<div>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">[PS] C:\\&gt;Get-DatabaseAvailabilityGroup -id <span style=\"color: #006080\">\"DAG1\"<\/span> | FL Name : DAG1 Servers : {EXCH2010MB2, EXCH2010MB1} FileShareWitnessShare : \\\\dionysus\\FileShareWitness FileShareWitnessDirectory : c:\\FileShareWitness AlternateFileShareWitnessShare : AlternateFileShareWitnessDirectory : NetworkCompression : InterSubnetOnly NetworkEncryption : InterSubnetOnly DatacenterActivationMode : Off StoppedMailboxServers : {} StartedMailboxServers : {} OperationalServers : ControllingActiveManager : ReplicationPort : 0 NetworkNames : {} AdminDisplayName : ExchangeVersion : 0.10 (14.0.100.0) DistinguishedName : CN=DAG1,CN=Database Availability Groups,CN =Exchange Administrative Group (FYDIBOHF23 SPDLT),CN=Administrative Groups,CN=Corelan test Organization,CN=Microsoft Exchange,CN =Services,CN=Configuration,DC=corelantest, DC=be Identity : DAG1 Guid : ffc0918d-b674-4bad-b44d-39059493b178 ObjectCategory : corelantest.be\/Configuration\/Schema\/ms-Exc h-MDB-Availability-Group ObjectClass : {top, msExchMDBAvailabilityGroup} WhenChanged : 23\/04\/2009 22:29:23 WhenCreated : 23\/04\/2009 22:29:23 OrganizationId : OriginatingServer : dionysus.corelantest.be IsValid : True<\/pre>\n<\/p><\/div>\n<p> \u00a0 Now create database copies. Open \u201cDatabase Management\u201d (Organization Configuration \u2013 Mailbox), select the Mailbox database you want to make highly-available, right-click and choose \u201cAdd Mailbox Database Copy\u201d <a href=\"\/wp-content\/uploads\/2009\/04\/image33.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb33.png\" border=\"0\" alt=\"image\" width=\"285\" height=\"122\" \/><\/a> Select the server that needs to get a copy of the mailbox database, set the replay and truncation lag times and click \u201cAdd\u201d <a href=\"\/wp-content\/uploads\/2009\/04\/image34.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb34.png\" border=\"0\" alt=\"image\" width=\"300\" height=\"210\" \/><\/a> Via Powershell : <\/p>\n<div>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">Add-MailboxDatabaseCopy -Identity <span style=\"color: #006080\">'Mailbox Database 1790164108'<\/span> <span style=\"background-color: #f4f4f4;\"> <\/span>-MailboxServer <span style=\"color: #006080\">'EXCH2010MB2'<\/span> -ReplayLagTime <span style=\"color: #006080\">'00:10:00'<\/span> <span style=\"color: #006080\"> <\/span>-TruncationLagTime <span style=\"color: #006080\">'00:15:00'<\/span> -ActivationPreference <span style=\"color: #006080\">'2'<\/span><\/pre>\n<\/p><\/div>\n<p> The \u2013MailBoxServer parameter must refer to the target Mailbox server. Verify that the mailbox is being replicated : <\/p>\n<div>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">[PS] C:\\&gt;Get-MailboxDatabase -id <span style=\"color: #006080\">\"Mailbox Database 1790164108\"<\/span> | FL Servers, ReplicationType Servers : {EXCH2010MB1, EXCH2010MB2} ReplicationType : Remote<\/pre>\n<\/p><\/div>\n<p> Wait until the copy has completed <\/p>\n<div>\n<pre style=\"font-size: 8pt; margin: 0em; overflow: visible; width: 100%; color: black; line-height: 12pt; font-family: consolas, 'Courier New', courier, monospace; background-color: #f4f4f4; border-style: none; padding: 0px;\">[PS] C:\\&gt;Get-MailboxDatabaseCopyStatus -id <span style=\"color: #006080\">\"Mailbox Database 1790164108\"<\/span> Name CopyStatus CopyQueueLen ReplayQueueL LastInspect gth ength edLogTime ---- ---------- ------------ ------------ ----------- Mailbox Database 17901641 Mounted 0 0 08\\EXCH2010MB1 Mailbox Database 17901641 Healthy 0 1 23\/04\/2009 08\\EXCH2010MB2 23:22:29<\/pre>\n<\/p><\/div>\n<p> and then test failover My test mailbox is currently hosted on mailbox server EXCH2010MB1. Bring node exch2010mb1 down. (For MSCS\/Failover Clustering lovers, you can still see the cluster status using the Failover Cluster Management console) <a href=\"\/wp-content\/uploads\/2009\/04\/image35.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb35.png\" border=\"0\" alt=\"image\" width=\"326\" height=\"139\" \/><\/a> As soon as the node goes down, the database will be mounted on the second server : <a href=\"\/wp-content\/uploads\/2009\/04\/image36.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb36.png\" border=\"0\" alt=\"image\" width=\"404\" height=\"92\" \/><\/a> and after a short while, the copy status is changed from Healthy over Initializing to ServiceDown <a href=\"\/wp-content\/uploads\/2009\/04\/image37.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb37.png\" border=\"0\" alt=\"image\" width=\"403\" height=\"92\" \/><\/a> The mailbox database is now hosted on EXCH2010MB2 <a href=\"\/wp-content\/uploads\/2009\/04\/image38.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb38.png\" border=\"0\" alt=\"image\" width=\"410\" height=\"74\" \/><\/a> See if you can still connect to the mailbox : <a href=\"\/wp-content\/uploads\/2009\/04\/image39.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb39.png\" border=\"0\" alt=\"image\" width=\"317\" height=\"139\" \/><\/a> Bring the first node up again and verify that data gets synced again and the failback completes properly (and the mailbox database is hosted on exch2010mb1 again) First, the CopyStatus on the previously failed node goes to unknown, then \u2013 while it\u2019s copying &amp; replaying log files \u2013 it goes to Failed, and finally it goes back to healthy <a href=\"\/wp-content\/uploads\/2009\/04\/image40.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb40.png\" border=\"0\" alt=\"image\" width=\"407\" height=\"243\" \/><\/a> The current mailbox server is now still set to exch2010mb2, which is not a problem. If you want to make exch2010mb1 the active node again for this mailbox database, use the following cmdlet : move-activemailboxdatabase \u2013id \"Mailbox Database 1790164108\" \u2013ActivateOnServer EXCH2010MB1 <a href=\"\/wp-content\/uploads\/2009\/04\/image41.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb41.png\" border=\"0\" alt=\"image\" width=\"410\" height=\"140\" \/><\/a> The mailboxdatabasecopystatus reflects the new situation : <a href=\"\/wp-content\/uploads\/2009\/04\/image42.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px\" title=\"image\" src=\"\/wp-content\/uploads\/2009\/04\/image-thumb42.png\" border=\"0\" alt=\"image\" width=\"423\" height=\"99\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lab config : 1 x Windows 2008 server Standard Edition, 64bit : DC + HUB\/CAS Server role : dionysus \u2013 192.168.0.21 2 x Windows 2008 servers Enterprise Edition, 64bit : Mailbox server roles : exch2010mb1 (192.168.0.22) and exch2010mb2 (192.168.0.23) 2 Databases will be created (one on each mailbox server, created automatically when the Mailbox role &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"First look at Exchange 2010 Beta1 High Availability using DAG\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[349,26],"tags":[509],"class_list":["post-1723","post","type-post","status-publish","format-standard","hentry","category-exchange","category-windows-server","tag-exchange"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>First look at Exchange 2010 Beta1 High Availability using DAG - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"First look at Exchange 2010 Beta1 High Availability using DAG - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Lab config : 1 x Windows 2008 server Standard Edition, 64bit : DC + HUB\/CAS Server role : dionysus \u2013 192.168.0.21 2 x Windows 2008 servers Enterprise Edition, 64bit : Mailbox server roles : exch2010mb1 (192.168.0.22) and exch2010mb2 (192.168.0.23) 2 Databases will be created (one on each mailbox server, created automatically when the Mailbox role &hellip; Continue reading &quot;First look at Exchange 2010 Beta1 High Availability using DAG&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2009-04-23T21:50:51+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/23\\\/first-look-at-exchange-2010-beta1-high-availability-using-dag\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/23\\\/first-look-at-exchange-2010-beta1-high-availability-using-dag\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"First look at Exchange 2010 Beta1 High Availability using DAG\",\"datePublished\":\"2009-04-23T21:50:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/23\\\/first-look-at-exchange-2010-beta1-high-availability-using-dag\\\/\"},\"wordCount\":2346,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"MS Exchange\"],\"articleSection\":[\"MS Exchange\",\"Windows Server\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/23\\\/first-look-at-exchange-2010-beta1-high-availability-using-dag\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/23\\\/first-look-at-exchange-2010-beta1-high-availability-using-dag\\\/\",\"name\":\"First look at Exchange 2010 Beta1 High Availability using DAG - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2009-04-23T21:50:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/23\\\/first-look-at-exchange-2010-beta1-high-availability-using-dag\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/23\\\/first-look-at-exchange-2010-beta1-high-availability-using-dag\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2009\\\/04\\\/23\\\/first-look-at-exchange-2010-beta1-high-availability-using-dag\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"First look at Exchange 2010 Beta1 High Availability using DAG\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"First look at Exchange 2010 Beta1 High Availability using DAG - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/","og_locale":"en_US","og_type":"article","og_title":"First look at Exchange 2010 Beta1 High Availability using DAG - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Lab config : 1 x Windows 2008 server Standard Edition, 64bit : DC + HUB\/CAS Server role : dionysus \u2013 192.168.0.21 2 x Windows 2008 servers Enterprise Edition, 64bit : Mailbox server roles : exch2010mb1 (192.168.0.22) and exch2010mb2 (192.168.0.23) 2 Databases will be created (one on each mailbox server, created automatically when the Mailbox role &hellip; Continue reading \"First look at Exchange 2010 Beta1 High Availability using DAG\"","og_url":"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2009-04-23T21:50:51+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"First look at Exchange 2010 Beta1 High Availability using DAG","datePublished":"2009-04-23T21:50:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/"},"wordCount":2346,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["MS Exchange"],"articleSection":["MS Exchange","Windows Server"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/","url":"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/","name":"First look at Exchange 2010 Beta1 High Availability using DAG - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2009-04-23T21:50:51+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2009\/04\/23\/first-look-at-exchange-2010-beta1-high-availability-using-dag\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"First look at Exchange 2010 Beta1 High Availability using DAG"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":5798,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/1723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=1723"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/1723\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=1723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=1723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=1723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}