1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Module 4: Creating and Managing Storage Groups and Stores docx

68 445 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Creating and Managing Storage Groups and Stores
Tác giả Steve Thues, Megan Camp, Bill Higgins (Volt Technical), Jennifer Morrison, Priya Santhanam (NIIT (USA) Inc), Samantha Smith, Alan Smithee, Scott Serna, Krista Anders, Chris Gould (Global Logic Ltd), Janice Howd, Elizabeth Molony, Steve Schwartz (Implement.Com), Bill Wade (Wadeware LLC), Karim Batthish, Paul Bowden, Kevin Kaufman, Barry Steinglass, Jeff Wilkes, Kimberly Jackson (Independent Contractor), Lynette Skinner, Kelly Baker, Marlene Lambert (Online Training Solutions, Inc), Eric Myers, Robert Stewart, Dean Murray, David Mahlmann, Lisa Pease, Julie Challenger, Rick Terek, John Williams, Laura King, Kathy Hershey, Bo Galford, Dave Phillips, David Bramble
Người hướng dẫn PTs. Nguyễn Văn A
Trường học Microsoft Corporation
Chuyên ngành Information Technology / Exchange Server
Thể loại Học luận
Năm xuất bản 2000
Thành phố Redmond
Định dạng
Số trang 68
Dung lượng 1,42 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Exchange 2000 Enterprise Server supports multiple mailbox and public information stores per server while Exchange 2000 Server supports only one mailbox store per server, but multiple pub

Trang 1

Contents

Overview 1

Introduction to Storage Groups and Stores 2

Creating and Managing Storage Groups

Lab A: Creating Storage Groups and

Multiple Exchange 2000 Databases 46

Lab B: Building a Full-Text Index 54

Trang 2

with all applicable copyright laws is the responsibility of the user No part of this document may

be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Microsoft Corporation If, however, your only means of access is electronic, permission to print one copy is hereby granted

Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property

 2000 Microsoft Corporation All rights reserved

Microsoft, Active Directory, BackOffice, Jscript, NetMeeting, Outlook, Windows, and Windows

NT, are either registered trademarks or trademarks of Microsoft Corporation in the U.S.A and/or other countries

Other product and company names mentioned herein may be the trademarks of their respective owners

Program Manager: Steve Thues

Product Manager: Megan Camp

Instructional Designers: Bill Higgins (Volt Technical), Jennifer Morrison, Priya Santhanam

(NIIT (USA) Inc), Samantha Smith, Alan Smithee

Instructional Software Design Engineers: Scott Serna

Subject Matter Experts: Krista Anders, Megan Camp, Chris Gould (Global Logic Ltd),

Janice Howd, Elizabeth Molony, Steve Schwartz (Implement.Com), Bill Wade (Wadeware LLC)

Technical Contributors: Karim Batthish, Paul Bowden, Kevin Kaufman, Barry Steinglass,

Jeff Wilkes

Graphic Artist: Kimberly Jackson (Independent Contractor)

Editing Manager: Lynette Skinner

Editor: Kelly Baker

Production Manager: Miracle Davis

Build Manager: Julie Challenger

Production Support: Marlene Lambert (Online Training Solutions, Inc)

Test Manager: Eric Myers

Courseware Testing: Robertson Lee (Volt)

Creative Director, Media/Sim Services: David Mahlmann

Web Development Lead: Lisa Pease

CD Build Specialist: Julie Challenger

Localization Manager: Rick Terek

Operations Coordinator: John Williams

Manufacturing Support: Laura King; Kathy Hershey

Lead Product Manager, Release Management: Bo Galford

Lead Product Manager, Messaging: Dave Phillips

Group Manager, Courseware Infrastructure: David Bramble

Group Product Manager, Content Development: Dean Murray

General Manager: Robert Stewart

Trang 3

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

Instructor Notes

This module provides students with an overview of the storage capability in Microsoft® Exchange 2000 through the use of storage groups and stores

Students will learn how to create and manage storage groups and stores, as well

as the various file types involved, and how data is written to databases

After completing this module, students will be able to:

! Explain the benefits of using multiple storage groups and stores, and demonstrate how to mount and dismount stores

! Describe the Extensible Storage Engine (ESE) features in Exchange 2000 that allow you to manipulate data

! Create and configure storage groups and stores to fit various business needs

! Explain how to plan multiple stores and storage groups, and identify ways to improve the reliability of the restoration process

! Describe the benefits of full-text indexing and identify the tools you can use

to troubleshoot indexing

Materials and Preparation

This section provides the materials and preparation tasks that you need to teach this module

Required Materials

To teach this module, you need the following:

! Microsoft PowerPoint® file 1572A_04.ppt

Preparation Tasks

To prepare for this module, you should:

! Read all of the materials for this module

! Complete the labs

! Practice delivering the class with the PowerPoint slides, taking special note

of the animation slides

! Practice the demonstrations

Presentation:

120 Minutes

Lab:

60 Minutes

Trang 4

Module Strategy

Use the following strategy to present this module:

! Introduction to Storage Groups and Stores

In this section, you will help the students gain an understanding of the purpose of storage groups and stores Showing students how to mount and dismount a store will help them to learn this process

! ESE Features in Exchange 2000

In this section, you will help students to understand where files are stored and the various file extensions that ESE uses Make sure students

understand how to use log files and circular logging

! Creating and Managing Storage Groups and Stores The focus of this section is to present a more in-depth discussion of what storage groups and stores are and how best to manage them Your explanation of how storage groups and stores can be configured to match the requirements of the users accessing them, as well as the need for security, will help students to determine how best to manage their own storage groups and stores The discussion of how to move transaction log files and database files will enable students to place them where it is most appropriate

! Database Considerations

In this section, you will lead a discussion of how various clients send messages to Exchange 2000 and how that information is written to the database Your presentation of how to plan multiple storage groups and stores will assist students in using this feature more efficiently The points that you present to students on how they can improve the reliability of their backup process will add to their capability in this area

! Introduction to Indexing

In this section, discuss the advantages of full-text indexing and the search architecture that provides the functionality In addition, you will lead students in a discussion of the process for creating and changing the properties of an index, and how to use the various tools available for troubleshooting

Trang 5

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

Customization Information

This section identifies the lab setup requirements for a module and the configuration changes that occur on student computers during the labs This information is provided to assist you in replicating or customizing Microsoft Official Curriculum (MOC) courseware

The labs in this module are also dependent on the classroom configuration that is specified in the Customization Information section at the

end of the Classroom Setup Guide for course 1572A, Implementing and Managing Microsoft Exchange 2000

! Complete the labs for Module 2, “Installing Microsoft Exchange 2000,” in course 1572A, Implementing and Managing Microsoft Exchange 2000

! Install Exchange 2000 at D:\Program Files\Exchsrvr on each server into an organization named Northwind Traders Components installed are Microsoft Exchange Messaging and Collaboration Services, Microsoft Exchange System Management Tools, and Microsoft Exchange Instant Messaging Service Have the students create a custom MMC in the C:\Documents and

Settings\All Users\Desktop that is saved as your_firstname Console The

MMC contains the Active Directory Users and Computers snap-in and the Exchange System snap-in

Setup Requirement 2

The labs in this module require a custom OU, a user account for each student, a mailbox for each student, an Outlook profile, an account named

Jonyour_servername, and for the Domain Admins group to be delegated full

control of the organization To prepare student computers to meet this requirement, perform one of the following actions::

! Complete the labs for Module 3, “Administering Microsoft Exchange 2000,” in course 1572A, Implementing and Managing Microsoft Exchange

2000

! Create an organizational unit in Active Directory that is named

your_servernameOU for each server in the classroom Create a user account

in each server’s OU for each student The account is a member of the Domain Admins group and has a mailbox on the student’s Exchange server Create an Outlook profile for each student on their own server that opens their mailbox Delegate the full administrator role on the Northwind Traders

organization Create an account named your_servername with a mailbox in

the default mailbox store of each server in the classroom

Important

Trang 6

Lab Results

Performing the labs in this module introduces the following configuration changes:

! A storage group named Executive Storage Group is created

! A mailbox store named your_servername Executive Mailbox Store is

created

! Full-text indexing is enabled on the default mailbox store of each server in the classroom

Trang 7

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

Overview

! Introduction to Indexing

Storage groups and stores in Microsoft® Exchange 2000 provide the containers

in which you store data You have great flexibility in configuring these containers to fit your environment and to efficiently handle data

At the end of this module, you will be able to:

! Explain the benefits of having multiple storage groups and stores, and demonstrate how to mount and dismount stores

! Describe the Extensible Storage Engine (ESE) features in Exchange 2000 that allow you to manipulate data

! Create and configure storage groups and stores to fit your various business needs

! Explain how to plan multiple stores and storage groups, and identify how to improve the reliability of the restoration process

! Describe the benefits of full-text indexing and identify the tools you can use

In this module we are going

to define storage, discuss

how it works, and identify

the tasks you will perform as

an administrator

Trang 8

# Introduction to Storage Groups and Stores

Exchange 2000 supports multiple message databases on each server Creating multiple databases enables greater scalability, efficient management, increased reliability and a reduction of backup and restore times

Topic Objective

To provide an introduction to

the concepts of storage

groups and stores

Lead-in

A message database is

used to store messages on

a server

Trang 9

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

There are two types of stores in Exchange 2000, mailbox stores and public information stores A mailbox store contains user data and a public store contains public folder (or shared) data Each store is a logical database that has

an associated streaming store file containing native Internet content Each store consists of the following database files:

! The streaming database file (.stm)

The stm file contains common Internet formatted content, such as native Multipurpose Internet Mail Extensions (MIME) content, that protocols other than the Messaging Application Programming Interface (MAPI) protocol places in the store

! The rich text database file (.edb)

The edb file contains data placed in the store through MAPI, as well as the database tables that define mailboxes, messages, folders and attachments Because the stm file only contains raw document content, which is referenced

by the corresponding edb file, the streaming database and rich text database files that comprise a particular database are inseparable

Topic Objective

To define stores and explain

how to mount and dismount

stores

Lead-in

A store is a database that

houses data

Trang 10

Benefits of Multiple Message Databases

The benefits of multiple message databases include:

! Increased system reliability because a failure in one database does not affect users in another database

! Faster and more flexible backup scheduling is possible because databases are typically smaller

! Decreased recovery time in the event of hardware failure because each database can be restored individually

Exchange 2000 Enterprise Server supports multiple mailbox and public information stores per server while Exchange 2000 Server supports only one mailbox store per server, but multiple public information stores The mailbox store on Exchange 2000 Server is limited to 16 gigabytes (GB) in size

Mounting and Dismounting Stores

When the information store service is running, stores can be individually mounted and dismounted

You can choose the Mount Store or Dismount Store commands to bring the

store online or take it offline This is a toggle option that only displays the available action For example, if the selected store is currently mounted, the

Dismount Store command appears The store must be mounted before the

client can access it You must also dismount a store before moving its transaction log files and database files, or before restoring it from backup

Users are not automatically warned that the server is dismounting a store You will see a warning stating that dismounting the database will disconnect all users when you select this option Use the mailbox subcontainer

in the Exchange System Manager to see what users have mailboxes in the store

Note

Delivery Tip

Ask students to describe the

consequences of

dismounting a store while

users are connected

Warning

Trang 11

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

Overview of Storage Groups

A storage group is a set of stores that share the same set of transaction log files

A storage group contains up to five stores that use one set of transaction log files Exchange 2000 uses storage groups to reduce the overhead of multiple sets of transaction log files You can manage these stores as a group or independently

Benefits of Storage Groups

Storage groups enable you to:

! Support more users on each server because multiple smaller stores can be created and managed more easily

! Perform backup and restore activities on a single store while other stores in the storage group remain in operation

! Host multiple businesses on a single server Each company can have its own store or storage group You can configure and maintain each storage group according to the requirements of the associated company

! Provide individual support for critical mailboxes For example, you may have one or more critical mailboxes that must be recovered individually as quickly as possible in the event of an emergency or disaster You can configure each mailbox in its own dedicated store, enabling you to perform individual backup and recovery The more stores and storage groups you create, the more Exchange 2000 resources are required For this reason, it is important to weigh the impact on resources against the business need for creating additional stores and storage groups

! Use circular logging for a specific storage group Circular logging enables Exchange 2000 to use and reuse a small set of transaction log files For example, you may have a store that generates a volume of transactions that

do not need to be recovered, such as a public information store that receives

a newsfeed If you place this store in its own storage group it can use circular logging You should disable circular logging for the other storage group(s) in this instance

Topic Objective

To explain the benefits of

storage groups, the types of

stores, and the number

allowed on a single server

Lead-in

A storage group is a set of

databases, called stores,

which share the same set of

transaction log files

Trang 12

Storage Group Limits

You can create up to four storage groups for each Exchange 2000 server Exchange 2000 creates an additional temporary storage group during restore operations Each storage group can support five stores Stores do not have a size limit, although administrators should limit their size so that they can easily backup or restore the stores

Transaction Log Files

Transaction log files are history files recording server activity These files are useful in restoring and backing up Exchange 2000 data All Exchange 2000 transaction logs are 5 megabytes (MB) in size

Each storage group uses its own set of transaction log files For example, if a storage group contains five stores, all transactions for all five stores are recorded in a single series of transaction log files You can determine where to locate the transaction log files for each storage group

Transaction log files are the most important files for recovery because they reflect all the transactions that have taken place up to the point of a system failure ESE even saves those transactions that have not yet been written to the database file To increase performance and reliability, place the log files on separate hard disk spindles for each storage group Make sure that these log files are on separate hard disk spindles from the database files for the stores in the storage group

Each storage group contains one current transaction log file This file is always

named Exx.log The First Storage Group files are located in the C:\Program

Files\Exchsrvr\Mdbdata folder The second storage group files are located in

the C:|\Program Files\Exchsrvr\Second_storage_group_name folder

For Your Information

The administrator has

control over the location of

the transaction log and ESE

database files through

Exchange System Manager

Trang 13

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

ESE enables storage groups and stores to function ESE manages the Exchange

2000 database There are three basic aspects of database management: storing data; adding, deleting or changing data; and recovering data in the case of a system failure

ESE is also used with the Active Directory® directory service and other software clients, such as the Key Management Server, that need to store and retrieve data quickly ESE is a dynamic-link library (DLL) that is included within each application or component that uses its features

The main function of ESE is to handle transactions A transaction is a series of

modifications to a database that leaves the database in a consistent state These

modifications are called operations An operation is the smallest change that

can be made to a database Operations include such activities as insert, delete, replace, or commit Several operations make up a single transaction A single operation may leave the database in an inconsistent state

The Extensible Storage

Engine (ESE) is the

technology behind

Exchange 2000 storage and

Active Directory

Trang 14

! Atomic Operations performed in a transaction are either all completed or

none of them are completed

! Consistent A transaction takes a database from one consistent state to

another

! Isolated Changes are not visible until all operations within the transaction

are completed When all operations are complete, the transaction is

considered committed

! Durable Committed transactions are preserved even if the system crashes

An example of an ACID transaction would be as follows: You move a mail message from the Inbox folder to another folder named Important This is a single transaction To complete this transaction, Exchange 2000 must perform the following operations:

1 Delete the mail message from the Inbox folder

2 Insert the mail message into the Important folder

3 Update the information about each folder to correctly reflect the number of items in each folder and the number of unread items

4 Commit the transaction

Topic Objective

To describe ACID

transactions

Lead-in

ESE supports full Atomic,

Consistent, Isolated, and

Durable transactions

Trang 15

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

Because these operations are accomplished within a single transaction, Exchange 2000 will perform all of these operations or none at all The commit operation is not recorded until all operations have been carried out

If the system fails, ESE will reverse operations that were not part of a committed transaction This means, using the previous example, that if the mail message is deleted first, then the system fails and the operation is rolled back (reversed) when the database restarts The consequence of this action is that a mail message would never be lost while moving it, nor would Exchange 2000 end up with two copies of a mail message that was moved

Trang 16

Storing Data

Database Current Transaction Log

.edb stm log

on the hard disk

Current Transaction Log

A database file is often several GBs in size, and writing changes to the database file requires finding each page that needs modification It is much faster to append a transaction to the end of a transaction log file than to write it into the database file ESE uses transaction log files to save a record of individual database operations on the hard disk, as they occur The change made to the page is written sequentially into the transaction log file immediately after the change is made in memory When all the operations of a transaction are written

to the transaction log files, the integrity of the data is secure

Topic Objective

To describe the location of

data stored in an ESE

Stress that when referring to

the database it has two

components, stm and edb

files

Delivery Tip

Ask students to describe

system exposure when

changes are made to

information in the database

using Exchange 2000

Trang 17

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

Log Sequence Numbers (dbTime)

Each database page has a Log Sequence Number, called dbTime, which gives the relative time the page was last changed This is not a time stamp, but a counter that increases by one every time a change is made By performing this operation, ESE can track if the page in memory is more current than the page in the database file

Dynamic Buffer Allocation

With dynamic buffer allocation, ESE can use as much memory as the server has available, and therefore requests can be processed quickly

ESE dynamically grows or shrinks the buffer cache depending on how much memory is available and whether there are memory requirements from other non-ESE services, such as Internet Information Services (IIS), running on the same computer If memory is not being used by other services on the server, then ESE takes as much memory as it needs When other services need memory ESE will give up some memory by copying pages to the database file and shrinking the size of its buffer

For Your Information

Allocating buffers was

manually performed by

using the Performance

Wizard in Exchange Server

5.5, but is performed

automatically in Exchange

2000

Trang 18

File Generation

! .edb – Rich Text Database File

! .log – Transaction Log File

ESE generates several different files, with different extensions for different purposes, as it is storing data.The following table outlines the types of files that ESE generates

Current Streaming Database (.stm)

The streaming store, or native store, contains common Internet formatted content, including native MIME content, voice, video, and so on There are mailbox stores and public stores

Current Rich Text Database (.edb)

The rich text store contains MAPI formatted content A common MAPI client is Microsoft Outlook® 2000 This allows a rich message property set, such as text formatting and color There are mailbox stores and public stores

Current transaction log file

(Exx.log, for example

E00.log)

The current transaction log file secures transactions before they are written from memory to an ESE database file There is only one current transaction log per storage group recording transactions for multiple databases Previous transaction log

files (Exxnnnnn.log, for

example E0000001.log)

The previous transaction log files maintain older transactions These transactions may or may not have been written from memory to the database file

Checkpoint file (Exx.chk,

for example E00.chk)

The checkpoint file contains a pointer that specifies which transaction log file contains the last transaction that was committed to the database file A recovery should begin with this file Transactions older than the checkpoint file pointer are guaranteed to be in the database, while transactions newer than the checkpoint may or may not have been committed to the database Reserved transaction log

files (Res1.log and Res2.log)

The reserved transaction log file reserves log file space in case an out-of-disk-space situation arises There are two log files reserved

Topic Objective

To identify file extensions,

and the purpose of each

type of file, for ESE

generated database files

Lead-in

ESE generates several files

as it is storing data

Trang 19

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

(continued)

Temp files (tmp.edb) Temp files are used during upgrades as well as for

transient storage during information store maintenance, creating indexes, and sorting data The Tmp.edb file is not backed up and is automatically deleted when the store process shuts down gracefully There is no need to back

up this file

Patch files Patch files are temporary log files that store special

transactions during an online backup

Trang 20

Previous Log Files

Previous Logs Current Log

E0000001.LOG E0000002.LOG

.

Current Logs Are Renamed After 5 MB of Data Is Accepted

E0000003.LOG

Renamed

3 MB

New E00.log (5 MB)

In Exchange 2000, each transaction log file can contain up to 5 MB of data When the current transaction log file becomes filled (after every 5 MB of transactions are written), it is renamed to indicate that it is a previous log file,

and a new log file is created with the Exx.log file name The Exx.log file and

renamed log files are stored in the same subdirectory

Log File Size

Exchange 2000 log files are always 5 MB in size Microsoft Explorer reports the transaction log files as exactly 5,242,880 bytes

If your transaction log files do not reflect this exact size, they are most likely damaged

Generation Numbers

To keep track of the transaction log files, ESE assigns each log file a generation number For example, when Exchange 2000 starts for the first time, with the First Storage Group, it creates a transaction log file named E00.log with a generation number of 1 When that log file is full and Exchange 2000 rolls over

to a new log file, the new transaction log file becomes E00.log with a generation number of 2, and the old E00.log file is renamed to E0000001.log The five digits in previous log file names are hexadecimal numbers, while the generation number inside a log file is a decimal number The generation number

in the current transaction log file tells ESE how to rename this log file when it

is full

When a store is created in a new storage group, a new set of transaction logs is generated (There is one set of transaction logs per storage group.) The current transaction log in the second storage group is called E01.log This follows the same process described above, and the old E01.log file is renamed to

E0100001.log

Topic Objective

To describe the disposition

of previous log files

Lead-in

When the transaction log file

is full, a new log file is

created and the current log

file becomes a previous log

file

Delivery Tip

The animation starts with a

partially full Exx.log file The

animation shows the Exx.log

file filling up, being renamed

to E000003.log, and then a

new Exx.log file being

created

Important

For Your Information

Active Directory ESE log

files in Microsoft Windows®

Trang 21

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

Log File Signature

If you were to shut down the server and delete all the transaction log files, ESE would create a new series of transaction log files starting with a generation number of 1 when you restart the database service Because log files can have the same name, ESE stamps the header in each file in the series with a unique signature so it can distinguish between different series of log files

Previous Log Files

You should never delete previous transaction log files manually, unless recovery from possible data loss is not important By maintaining the old data

in transaction logs, the server could, if needed, use an older copy of the database and apply transaction logs to that database to bring it up-to-date

Trang 22

Checkpoint Files

E0000001.log E00.chk

Transaction Log Entries Written

to the Database

Transaction Log Entries Not Yet Written to the Database

The checkpoint is a pointer within the Exx.chk file that indicates the last

transaction that was completely written to the database file When all the pages that were changed by operations in a given transaction are written to the database file, the checkpoint is advanced to the transaction with the next

unwritten entry Separate Exx.chk files are maintained for each storage group

using ESE For example, the First Storage Group would have a check file of E00.chk The second storage group would have a check file of E01.chk

If you are using circular logging, you do not want to get rid of the checkpoint file The checkpoint allows for implementing circular logging Circular logging deletes log files older than the checkpoint; these are log files that are not needed for recovery to complete

The following process describes the steps the system follows to recover data with the checkpoint file:

1 ESE reads the Exx.chk file when Exchange 2000 starts up

2 ESE opens the transaction log file referenced by the checkpoint

3 All committed transactions are written to the database file

4 Transactions not ending in a commit operation in the transaction log file (which would occur in the case of a system failure) are discarded

5 In a normal shutdown, the current transaction log file is Exx.log, and all transactions are written to the database file

Topic Objective

To explain the function of

the checkpoint file

Lead-in

The checkpoint file tracks

the location of the last

committed transaction that

has been fully copied to the

database file

Delivery Tip

Use the illustration to point

out that some transactions

past the checkpoint have

been written to the database

file, while others have not

Make it clear to students

that the checkpoint only

designates that everything

before it has definitely been

written to the database It

does not imply that no

transactions after the

checkpoint have been

written, only that not all have

been

Warning

Trang 23

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

If the checkpoint file does not exist, the database service starts from the beginning of the oldest transaction log file it finds on disk and checks every operation in every log file to determine whether it was written to the database

The Exx.chk file is not required to replay transactions ESE determines which transactions have already been written by reading the transaction log files directly and looking at the dbTime value of each operation When you use a checkpoint you save ESE from starting at the first transaction log file and checking every operation

Note

Trang 24

Reserved Log Files

Microsoft Exchange Services

Writes

2

Out of Disk Space

If the current transaction log contains 5 MB of data, ESE will rename the file and create a new transaction log If the server is running low on hard disk space, and 5 MB is not available, a new current transaction log cannot be created

In the event that the server runs out of disk space, each storage group reserves two log files, Res1.log and Res2.log, which are stored in the transaction log file folder These files hold no data, but reserve 5MB of hard disk space each ESE

uses reserved log files when attempting to create a new Exx.log file and there is

not enough disk space In this situation, the following occurs:

1 ESE sends an error message to the respective database service

2 ESE writes any operations in memory to a reserved transaction log, starting with Res2.log This may include several transactions that are on their way to the server, depending on how busy Exchange 2000 is

3 The database service records the event in Event Log in Windows 2000

4 The database service shuts down

Reserved transaction log files are 5 MB in size, as are all transaction log files

Once the out-of-disk-space error occurs, you cannot make any additions to the database because there is no hard disk space ESE will record any transactions

in process, roll back all existing uncommitted transactions, and record the uncommitted transactions in the transaction log file before the system can shut down the database safely When transactions in memory have been committed,

ESE will rename the file last used, either Res1.log or Res2.log, to Exx.log

The amount of information contained in the reserved log files can be up to 5

MB each If there is more than 10 MB of information to be written to the reserved log files, including rollback operations and new operations, ESE will terminate and an error will result

Topic Objective

To explain the function of

reserved log files

Lead-in

There are two transaction

log files that are created at

the initialization of an ESE

database to provide

resources in low disk space

situations

For Your Information

Point out that the system

warning for out of disk

space occurs long before

the actual available storage

space reaches zero

Note

Trang 25

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

Storage Group 1 Transaction Logs

Storage Group 1 Transaction Logs

Mirror Set E:\

Storage Group 2 Transaction Logs

Storage Group 2 Transaction Logs

Mirror Set F:\

recoverability by storing log files on a separate disk from the database files

Choosing a Separate Disk

The speed of the Exchange 2000 database depends greatly on how quickly operations are copied from memory to the transaction log

Log files are written sequentially and are optimised for disk writes and minimum disk head movement For this reason, you should configure the transaction logs to be on a separate, high performance disk that does not have other input/output (I/O) operations occurring For example, you should not store the checkpoint file on the same disk as the transaction log files Likewise, you should not store a swap file on this disk either During normal operation, ESE does not read from log files, so the faster ESE can write to the transaction log file disk the better the server performance The best performance is normally obtained with a hardware mirror array

Topic Objective

To describe the file location

options for Exchange 2000

transaction log and

database files

Lead-in

Transaction log files should

be stored separately from

the database files and

should be stored on high

performance disks

Delivery Tip

Ask students to:

1 Describe the importance

of storing transaction logs

on a separate disk

2 Share any experiences of

the consequence of not

storing transaction logs on a

separate disk

Trang 26

Specifying the Location of Store Files

Exchange 2000 performance can be optimized by carefully planning your store and storage group needs, in addition to locating heavily accessed files on fast hard disks

Each storage group should use a separate, fast hard disk for transaction log files The following list gives suggestions to increase performance:

! Format any disk that stores transaction logs and databases with the NTFS file system in Windows 2000

! Use a hardware redundant array of independent disks (RAID) to protect the database drive array, and keep hot spares available if supported by your RAID controller

! Distribute the drives that store the databases across many small computer system interface (SCSI) channels or controllers, but configure them as a single logical drive to minimize SCSI bus saturation

Improving Recoverability

If you store log files on a separate disk from the database, your chances of recovering all your data in the event of a hardware failure increases substantially If a hard disk failure occurs on the disk that contains the database file, the database file can be restored to a new disk Because the log files maintain all transactions, ESE can replay the transactions and return the restored database file to a current consistent state

Disk Configuration Example

An example of disk configuration is as follows:

! C:\ system and boot (mirror set)

! D:\ Page file

! E:\ Transaction logs for storage group 1 (mirror set)

! F:\ Transaction logs for storage group 2 (mirror set)

! G:\ Database files for both storage groups (multiple drives configured as hardware stripe set with parity)

For Your Information

The location of the

checkpoint file is set using

the system path location for

the storage group and is

configured through

Exchange System Manager

Trang 27

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

Circular Logging

E000004.log E000003.log

E000002.log

7 15 5 25

1 10

4 17 8 3

E000001.log

9 44 2 18

12 35

6 13 11 22

14 40 16 99

52 21

19 33 31 20

4 15 23 42

61 48

26 34 46 29

E000004.log E000003.log

E000002.log

7 15 5 25

1 10

4 17 8 3

E000001.log

9 44 2 18

12 35

6 13 11 22

14 40 16 99

52 21

19 33 31 20

4 15 23 42

61 48

26 34 46 29

E000005.log

27 30 62 53

82 71

36 70 94 47

Circular logging uses transaction log techniques but does not maintain previous transaction log files for long periods of time Instead, Exchange 2000 maintains

a few log files (typically a set of four log files), renames older logs, and overwrites the oldest log when a new transaction log file is needed You can enable or disable circular logging for each storage group independently by using Exchange System Manager Circular logging is disabled by default in Exchange 2000

Reducing the Use of Hard Disk Space

The main advantage for using circular logging is to keep hard disk space available by reducing the build up of transaction log files However, you should keep circular logging disabled, as it is by default, and institute an appropriate backup strategy that will properly remove log files

The major disadvantage of circular logging is that in the event of a database failure, only data from the last backup will be restored This is because more recent transactions have been lost (overwritten)

Reusing a Set of Log Files

When you enable circular logging, multiple log files may be present in the Mdbdata folder This is normal, because ESE uses four log files before reusing

a previous log file For example, logs E0000010.log, E0000011.log, E0000012.log, and E0000013.log would become E0000011.log, E0000012.log, E0000013.log, and E0000014.log, respectively The circular log numbers increase in hexadecimals

Topic Objective

To explain how circular

logging works and when you

should use it

Lead-in

Circular logging is a method

of maintaining a limited

number of transaction logs

that are reused as existing

logs fill up

Delivery Tip

The animation starts with a

single log file displayed and

full The animation fills all

renaming log files until the

first log file is renamed and

overwritten

Delivery Tip

Ask students to explain

when circular logging is

appropriate and when it is

inappropriate

Trang 28

If the checkpoint is still referring to the lowest numbered log file, and a new log file needs to be created, then ESE increases the set of log files to five to avoid overwriting the checkpoint

It is not advisable to use circular logging in an environment where data recovery is important

Using Circular Logging

You should consider using circular logging if data recovery is not important and you do not have a regular backup process in place This would be the situation

on a front-end server that did not have mailboxes or public folders and where data would never need to be recovered If the data on the server is critical to your company, keep circular logging disabled

For Your Information

ESE tries to keep the

number of log files under 5

MB, but 5 MB is not an

Delivery Tip

Please mention several

times during this module

that circular logging does

not support recovery and

should be disabled if data

recovery is an option that is

desired

Trang 29

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

Your ability to create and manage storage groups and stores will give you added flexibility in managing data and performing maintenance functions You have the ability to custom configure both storage groups and stores according to business needs

Topic Objective

To explain how to create a

storage group, create and

configure stores, and move

both transaction log files

and database files

Lead-in

Your ability to create and

manage storage groups and

stores will give you added

flexibility in managing data

and performing

maintenance functions

Trang 30

Creating Storage Groups

To create a new storage group, perform the following steps:

1 From Exchange System Manager, expand the appropriate administrative

group, and then expand the Servers container to locate the server on which

a new storage group is to be added

2 Right-click on that server

3 Click New, and then click Storage Group

The options available when creating storage groups include:

! Zero out deleted database pages Select this option if you want to remove

all fragments of deleted items that still exist in your database This option automatically writes zeroes (0) to deleted 4 KB pages within all stores in the storage group This zeroing occurs during online backup, after the database page is written to tape Therefore, the database pages on backup tape are not zeroed until the next backup Selecting this option will affect server

performance

! Enable circular logging Select this option to enable circular logging for a

storage group Circular logging reduces hard disk space requirements by limiting the number of transaction log files, while eliminating the ability to recover transactions Enable circular logging only on storage groups that contain non-critical data Circular logging is disabled by default

Topic Objective

To explain how to create

storage groups

Lead-in

You use the Exchange

System Manager to create

Storage Groups that can

contain one or more

databases, or stores, on a

single server

Delivery Tip

Present an online

demonstration of the steps

and tabs, used to create a

new storage group Point

out the options for the

location of the transaction

log files as well as the

system path location

Trang 31

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

Use the Details tab to enter additional information, such as:

! Creator of the storage group

! Purpose of the storage group

A default storage group, called First Storage Group, is created during the installation process The :\\Program_Files\Exchsrvr\Mdbdata folder is also created during installation The mailbox store and public folder store database file names default to priv1.edb, priv1.stm, pub1.edb, and pub1.stm respectively

If you create a new store, the database nameswill match the store name by default For example, you create a new store name called VIPMailboxes The database names would be vipmailboxes.*

If you crate a new store that has the same name as an existing store, the new database names would be enumerated For example, if you created an additional store called Priv1, and you already had the default priv1.* database files, there would be unique database file names assigned for the new databases These names would be enumerated starting with 0 In this example, Priv1 store would have database files of Priv10.* If you created a new store of Priv10, the new database files would be named with Priv100.*

You cannot create duplicate store names The system will always rename the newly created store preventing you from creating duplicate names

Delivery Tip

Point out to students that

the store in the Exchange

System Manager will not

always match the database

file names and that

renaming a store will not

update the names of the

database files Having the

store name and the

database file names

different could cause some

confusion

Trang 32

Creating Stores

Public Folder Store (Server1) Properties

Full-Text Indexing Details Policies Security

Database Replication Limits General

Public Folder Store (Server1) Associated public folder tree:

First Administrative Group/Public Folders Clients support S/MIME signatures Display plain text messages in a fixed-sized font

Apply

Additional stores can be created in the default First Storage Group or in any new storage group that you have created.To create a new store, right-click the storage group under which you want the new store to be created, and then select

New, Public Store or New, Mailbox Store

When you create a new store, you will be prompted with the following series of tabs that enable you to configure the features described

! General For public folder stores, you can define the public store name and

associated public folder tree For mailbox stores, you can define the mailbox name, the associated public store, and the offline address book For both store types, you can define whether the clients that will connect to this store support S/MIME signatures, and whether you want all incoming plain text messages displayed in a fixed-sized font

! Database You can specify the database file locations, and online

maintenance schedule (the time at which online maintenance will start) You can also choose not to mount this store at startup

! Replication (Public Store only) You can configure how frequently you

want public folder changes initiated on the server to be replicated to other servers You can also configure the replication interval (default is 15 minutes), in addition to the maximum size of system messages used to replicate public folder content

Topic Objective

To explain how to create

stores

Lead-in

When you create stores,

you have options to

configure the stores to best

fit your environment

Delivery Tip

Present an online

demonstration of each of the

tabs mentioned as well as

the functionality for

configuring store features

Delivery Tip

Explain that the option

Archive all messages sent

or received by mailboxes

on this store was referred

to as journaling in previous

versions of Exchange

Trang 33

BETA MATERIALS FOR MICROSOFT CERTIFIED TRAINER PREPARATION PURPOSES ONLY

! Limits You can define the size of the store at which deleted items are

actually purged from the server, and whether they must be backed up before purging You define when storage warning messages are sent to the folder

or mailbox owner, when the folder or mailbox will be prohibited from sending mail, as well as how often you want the warning message to be

sent

! The following will help you to define a broader scope of limits:

• For mailbox stores, you define when a mailbox will be prohibited from

sending and receiving messages You have an option called Keep deleted mailboxes for (days) that enables you to define the number of

days you want to retain deleted mailboxes on the server This option provides a way for you to recover a user’s mailbox after the user has been deleted

• For a public store, you identify the length of time any document is housed in a public folder residing on this server You must configure this time period for each public store You should consider using policies to define this configuration across the organization

! Full-Text Indexing You can enable indexing on each store You can then

configure the index to be updated automatically

! Details You can enter administrative notes about the store under the Details tab The Details tab also provides a summary of the creation and

modification dates and times for the store

! Policies The Policies tab identifies which policies have been applied to the

store

! Security The Security tab views or defines the accounts that have

permissions on this object, and the level of permissions granted them You

can use the Advanced button to configure auditing and allocate a new

object owner

Trang 34

Managing Storage Groups and Stores

Managing the Store

Managing the Store

Mailbox Store (K1-LONDON)

Mailbox Store (K1-LONDON)

First Storage Group

Priv1

Priv1 Pub1

First Storage Group

First Storage Group

Transaction Logs log

Database Files stm edb

Your approach to store management will have an impact on the productivity and effectiveness of users accessing those stores

Moving Transaction Log Files

You can relocate transaction log files using the General tab on the Properties

page for the storage group When you change the location of the transaction log files, all stores in the storage group are dismounted, the transaction log files are moved, and then the stores are remounted

To move transactions files successfully, you must use Exchange System Manager

Moving the Database File

You can move the database file corresponding to any public store or mailbox store to another location on the server To move database files, perform the following steps:

1 Expand the appropriate storage group and obtain the properties of the store

2 Select the Database tab

3 Click the Browse button for the database file (.edb), the streaming store

(.stm), or both, and then specify the new path that they will be moved to

4 A system message warns you that the database will be temporarily dismounted during the move operation and that it will be inaccessible to any user Once you select to proceed, you will not be able to intervene Be sure that no users are using the database during the move operation

Ask students what they think

would happen if they didn’t

use the Exchange System

Manager to move the files

Ngày đăng: 21/12/2013, 05:18