I need to apply a service pack to an Exchange Server 2010 database availability group that is in a clustered Exchange...
2010 mailbox server, but I'm not really sure about the process. Can you please advise?
Sure, there are just a few steps to accomplish what you're trying to do:
- Move all the active database copies off of one of the database availability group (DAG) members so that the Exchange 2010 mailbox server only contains passive database roles. If the target server currently holds the primary Active Manager role, you must move that role to another DAG member.
- Put your Exchange 2010 mailbox server into maintenance mode and verify that there is nothing running that might be potentially disruptive to your upgrade.
- Verify the health of your DAG. To do so, run the script Microsoft recommends on its TechNet page.
- Upgrade the DAG member.
- When the upgrade process completes, bring the database availability group member back online and upgrade the next DAG member in the clustered Exchange 2010 mailbox server.
Remember, it is normal for your DAG to contain a mixture of patched and unpatched Exchange servers for a certain period of time. In the case of a service pack, you can move a database copy from a nonpatched server to a patched server. You can’t however, move a database from a patched server to a nonpatched server. This is extremely important as you plan your DAG member upgrade sequence.
ABOUT THE AUTHOR:
Brien Posey is an eight-time Microsoft MVP with two decades of IT experience. Before becoming a freelance technical writer, Brien worked as a CIO at a national chain of hospitals and health care facilities. He has also served as a network administrator for some of the nation’s largest insurance companies and for the Department of Defense at Fort Knox.
Dig Deeper on Exchange Server Deployment and Migration Advice
Related Q&A from Brien Posey
While you may want to jump on the data management and protection train, consider first how combining the two in one product will affect your systems ... Continue Reading
Hackers can gain remote access to users' desktops through RDP hijacking. As a result, IT pros must know what they can do to prevent such an attack. Continue Reading
When IT pros are seeking an alternative to Outlook, they should consider the features their users need the most and select an email client that best ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.