Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Exchange Server 2010: Deploying Exchange Databases (part 1) - Configuring Exchange Databases

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/23/2011 6:26:06 PM

1. Configuring Exchange Databases

Exchange Server 2010 stores mailboxes and public folders in Exchange databases. Mailbox servers can contain both public folder and mailbox databases. Each database is stored in a single Extensible Storage Engine database (.edb) file. The database file in which a particular message is stored does not change, regardless of the type of client that sends or reads the message.


Note:

CREATING AND CONFIGURING EXCHANGE DATABASES

You must be assigned the Organization Management role to enable you to create and manage mailbox or public folder databases on any Mailbox server or the Server Management role to create databases on a specific server in an Exchange organization. Users assigned the View Only Organization Management role can view database properties but cannot modify any of those properties.


Each database has a single set of transaction logs that record changes to the database, including messages sent to or from the database. Transaction logs can be used in disaster recovery scenarios if high-availability features are not implemented. However, their primary function is to ensure that Exchange Server 2010 follows the Atomicity, Consistency, Isolation, and Durability model for databases. Each individual database and its transaction logs are by default stored in the same folder but in a different folder from all other databases. By default, the folders that hold the databases are stored in the folder path C:\Program Files\Microsoft\Exchange\Server\v14\Mailbox, as shown in Figure 1.

Figure 1. Exchange database folders


A single folder by default holds both the database and its transaction logs. You should, however, consider storing transaction logs in separate folders and on a different hard disk from the databases. Because transaction logs can be used in disaster recovery in situations where high-availability solutions are not implemented, you might be unable to restore to the point of failure if you lose both the database and its transaction logs in the same disk crash.


Note:

Exchange Server 2000 and Exchange Server 2003 enabled multiple databases to share a single set of transaction logs through the use of storage groups. Exchange Server 2007 also offered this functionality but only for databases that did not have high-availability features enabled. In Exchange Server 2010, each database must have its own set of transaction logs. If you see an answer in the 70-662 examination that proposes shared transaction logs or a storage group, then you can reject this answer.


The folder that contains an Exchange database (.edb) file can also contain other types of files. Figure 2 shows the files in a public folder database folder. The possible file types in an Exchange database folder are as follows:

  • Checkpoint file (.chk) Determines which transactions in the current transaction log need to be committed to the database.

  • Current transaction log file (exx.log) The file into which new transactions are written. When this file reaches its storage limit of 1 megabyte (MB), Exchange Server 2010 closes the log file, renames it, and creates a new current transaction log file.

  • Closed transaction log file (.log) Closed transaction log files have the same file type (.log) as the current transaction file but have a longer file name. For example, a current transaction file E00.log might be named E000000000001.log when its size reaches 1 MB.

  • Reserved transaction log files (.jrs) Exchange Server 2010 uses these files as emergency storage when the disk becomes full and it cannot create a new transaction log. The database is taken offline, and any transactions that cannot be written to the current log are written to a reserved transaction log file. Reserved transaction log files are 1 MB in size.

  • Temporary workspace file (<log prefix>tmp.log) The transaction log file for the temporary workspace (for example, E00tmp.log). The size of this file cannot exceed 1 MB.

  • Exchange database file (.edb) Stores content for mailbox and public folder databases. The size limit for this type of file is 64 terabytes (TB), although in practice a lower size limit will probably be imposed by disk size restrictions.

Figure 2. Public folder database files


Detailed instructions for configuring a mailbox database are given later in this lesson. However, for high-level configuration of database options in the EMC, click Mailbox under Organization Configuration and select the Database Management tab, as shown in Figure 3. Right-click the database you want to configure and click Properties. This accesses the General, Maintenance, Limits, and Client Settings tabs.

Figure 3. Selecting the Database Management tab


The General tab gives information about the database, such as its backup status, when it was last modified, the server on which it is mounted, the path to the database file, and servers that have a copy of the database.

Circular Logging

Circular logging can be used in situations where limited storage capacity is an issue. However, Microsoft recommends that Exchange Server 2010 databases not be configured to use circular logging if you also plan to use the Volume Shadow Copy Service to enable third-party backup and recovery operations.

If circular logging is enabled, transaction logs in the same directory as a database may be deleted when that database is restored so that only point-in-time recovery operations are possible. Also, incremental and differential backup operations are not permitted if circular logging is enabled.

Finally, if circular logging is enabled while you are performing a backup or recovery operation, the restoration of individual databases will be prohibited.


On the Client Settings tab, you can specify the default public folder database and, if appropriate, the default offline address book for all mailboxes in a database.

The Limits tab, shown in Figure 4, lets you specify the storage limits for the database, at what database size a warning is issued, and the database file sizes at which Send and Send and Receive are prohibited. You can configure the notification schedule for sending messages to users who have exceeded these limits. The tab permits you to specify deletion settings that determine how long the database retains mailboxes and deleted items within mailboxes after a user deletes them.

Figure 4. The Limits tab



Note:

RECOVERABLE ITEMS AND THE DUMPSTER

For more information about recoverable items and single item recovery, access http://technet.microsoft.com/en-us/library/ee364754.aspx and follow the links.

Other -----------------
- Windows Server 2003 : Deploying the Internet Authentication Service (part 2) - Deploying IAS as a RADIUS Server
- Windows Server 2003 : Deploying the Internet Authentication Service (part 1) - Exploring RADIUS Server Scenarios & Exploring RADIUS Proxy Scenarios
- Microsoft SharePoint 2010 PerformancePoint Services : Examining Dashboard Designer (part 2)
- Microsoft SharePoint 2010 PerformancePoint Services : Examining Dashboard Designer (part 1)
- Microsoft SharePoint 2010 PerformancePoint Services : Uninstalling Dashboard Designer
- Windows Communication Foundation Primer : Consuming WCF services
- Windows Communication Foundation Primer : The role of service bindings & Hosting services
- Manage the Active Directory Domain Services Schema : Configuring Attributes to Be Indexed for Containerized Searches
- Manage the Active Directory Domain Services Schema : Configure Attributes Not to Be Copied When Duplicating Users
- Manage the Active Directory Domain Services Schema : Configure Attributes to Be Copied When Duplicating Users
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server