In a Exchange 2010 project I’m working on, all the clients (laptops and desktops) are configured to use RPC/HTTPS on slow and fast networks.
Since the company does not allow Outlook Anywhere, we needed to change this configuration, and to disable the “Connect to my Exchange mailbox using HTTP” option in Outlook.
This information was hard to find, since it does not obviously writes this in clear text in registry. This information is written in hex in here: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Default Profile\13dbb0c8aa05101a9bb000aa002fc45a
The key that keeps this configuration are: 00036623
This also keeps the configuration of the choice of slow and fast network.
When RPC is enabled but not configured the HEX value = hex: 23,00,00,00
If you disable the “Connect to my Exchange mailbox using HTTP” in Outlook the KEY 00036623 is deleted.
To manually disable the RPC in Outlook, you have either delete the key or set it to 00036623 = hex:22,00,00,00
The following keys are also used for configuring RPC:
001f6622 contains the URL specified to your Exchange server
001f6625 Verifies that the certificated used contains the same URL
0003662 This key is for basic / NTLM authentication
This is what I've found out, and with a fresh install of Outlook 2007, the keys described above does not exists.
Regards
Thursday, March 25, 2010
Friday, March 19, 2010
Exchange 2010 performance monitoring/baselining - templates
For baselining or performance monitonring your Exchange 2010, you need to add alot of counters.
I've created the templates based on the http://technet.microsoft.com/en-us/library/dd335215.aspx which described the counters needed.
The following templates has been created:
- Common Server
- Mailbox server
- CAS server
- HUB server
These templates may be downloaded here:
http://cid-214999a8ebe4fcb4.skydrive.live.com/self.aspx/.Public/Exchange2010/Exchange%202010%20-%20PerformanceMonitoringTemplatest.zip
Regards,
Rune
I've created the templates based on the http://technet.microsoft.com/en-us/library/dd335215.aspx which described the counters needed.
The following templates has been created:
- Common Server
- Mailbox server
- CAS server
- HUB server
These templates may be downloaded here:
http://cid-214999a8ebe4fcb4.skydrive.live.com/self.aspx/.Public/Exchange2010/Exchange%202010%20-%20PerformanceMonitoringTemplatest.zip
Regards,
Rune
Manually create FileWitness Share
When creating the DAG in Exchange 2010, Microsoft recommends that the FSW is located on a HUB server in the environment. One of the reasons is that these servers are the Exchange owners, and the Exchange admins have full control. It is recommended to place the FSW share in a third location or in the primary location.
To provide failover functionality to the FSW, you can use file cluster, Force cluster @File Share Witness and Force Quorum Guidance or the old and no longer recommended method of DNS CNAME.
At one of my customers, we have placed the FSW on a file cluster, since this gives us the full
redundancy in the case of a datacenter failure. The customer has two datacenters, but they are in a single site.
And Microsoft recommends you to add the Exchange Trusted Subsystem group in the local admin group of the server holding the FSW. But this might not be compliant to security rules. This is as far as I have understood just so the set-databaseavailability command can create the folder and shares.
To pre-create the FSW share you need the following:
- Create a folder etc. D:\FilesWitness\DAGNAME
- Give the owner permission to Exchange Trusted Subsystem
- Give the Exchange Trusted Subsystem Full Control (NTFS)
- Share the folder with the following DAGNAME.FQDN (If you try a different share name, it won't work. This is somehow required)
- Give the DAGNAME$ computeraccount Full Control (Share)
When you've done this, you can run the
set-databaseavailabilitygroup -witnessserver CLUSTERSERVER - witnessdirectory D:\Filewitness\DAGNAME
You'll get the following warning message:
WARNING: Specified witness server Cluster.fqdn is not an Exchange server, or part of the Exchange Servers security group.WARNING: Insufficient permission to access file shares on witness server Cluster.fqdn. Until this problem is corrected, the database availability group may be more vulnerable to failures. You can use the set-databaseavailabilitygroup cmdlet to try the operation again. Error: Access is denied
This is expected, since the cmdlet tries to create the folder and share, but don't have the permissions to do this.
When this is done, the FSW should be configured correct. To verify this, the following files should be created:
- VerifyShareWriteAccess- Witness
This should do the trick, and the FSW is ready to work, and follow the active datacenter.
There could be a slightly drawback with using a file cluster as FSW. If the file cluster gets in a split brain scenario, then the Exchange solution could get affected. A result of this could be two active database servers on the same database, resulting in corrupt data. But this is theoretically, and in special circumstances.
Rune
To provide failover functionality to the FSW, you can use file cluster, Force cluster @File Share Witness and Force Quorum Guidance or the old and no longer recommended method of DNS CNAME.
At one of my customers, we have placed the FSW on a file cluster, since this gives us the full
redundancy in the case of a datacenter failure. The customer has two datacenters, but they are in a single site.
And Microsoft recommends you to add the Exchange Trusted Subsystem group in the local admin group of the server holding the FSW. But this might not be compliant to security rules. This is as far as I have understood just so the set-databaseavailability command can create the folder and shares.
To pre-create the FSW share you need the following:
- Create a folder etc. D:\FilesWitness\DAGNAME
- Give the owner permission to Exchange Trusted Subsystem
- Give the Exchange Trusted Subsystem Full Control (NTFS)
- Share the folder with the following DAGNAME.FQDN (If you try a different share name, it won't work. This is somehow required)
- Give the DAGNAME$ computeraccount Full Control (Share)
When you've done this, you can run the
set-databaseavailabilitygroup -witnessserver CLUSTERSERVER - witnessdirectory D:\Filewitness\DAGNAME
You'll get the following warning message:
WARNING: Specified witness server Cluster.fqdn is not an Exchange server, or part of the Exchange Servers security group.WARNING: Insufficient permission to access file shares on witness server Cluster.fqdn. Until this problem is corrected, the database availability group may be more vulnerable to failures. You can use the set-databaseavailabilitygroup cmdlet to try the operation again. Error: Access is denied
This is expected, since the cmdlet tries to create the folder and share, but don't have the permissions to do this.
When this is done, the FSW should be configured correct. To verify this, the following files should be created:
- VerifyShareWriteAccess- Witness
This should do the trick, and the FSW is ready to work, and follow the active datacenter.
There could be a slightly drawback with using a file cluster as FSW. If the file cluster gets in a split brain scenario, then the Exchange solution could get affected. A result of this could be two active database servers on the same database, resulting in corrupt data. But this is theoretically, and in special circumstances.
Rune
Exchange 2010 DAG datacenter failure
One of the neat features in Exchange 2010 is the DAG. This seems to have the most built-in features for solutions where the datacenters are spread across AD sites, but alot of companies out there don't have multiple AD sited.
One customer I'm at right now don't, and due to this we are trying out the datacenter failure scenario. And to get the solution up and running, my experience is that you have to do some manal steps, and its important to do this in the right order. This is descibed below.
One datacenter fails, and the Cluster does not get MajorityNodeSet.
Datacenter contains 2 MBX servers and 1 HUB/CAS witch is the FSW for the DAG.
To recover from this failure, this are the steps:
- Stop Cluster service on remaining DAG members I secondary datacenter
- On one DAG member do a net start clussvc /forcequorum
o In my case, the databases got mounted already here
To change the FSW on the DAG now will not work, since the DAG can’t communicate with the failed DAG servers.
To remove the affected DAG members and change FSW, you have to complete the following:
- Start cluster admin and evict the failed DAG member servers
- Remove all database replication
o Get-mailboxdatabasecopystsatus -server failedmbxserver
o Remove-mailboxdatabasecopy databasename\affectedMBX
- Remove-databaseavailabilitygroupserver DAGNAME –mailboxserver failedmbxserver
Now you will be able to change the FSW for the DAG.
- Set-databaseavailabilitygroup DAGNAME –witnessserver FQDN
Now everything should be cleaned and in order.
One thing I noted is when doing these steps in the wrong order, running the remove-databaseavailabilitygroupserver DAGNAME before evicting the nodes from the cluster.
The databases that had a copy to the failed MBXserver, got the following errors in their properties. This was a hell to clean up.
Get-mailboxdatabase databasename fl
Server : ActiveMBXServer
MasterServerOrAvailabilityGroup : FAILEDMBXServer
MasterType : Server
To cleanup this, I had to rejoin the failed MBXservers to the DAG,and enable database replication.
Even though the replication seemed to work fine, it didn’t. It wasn’t possible to switch the active database between the servers in the DAG due to the properties on the database.
Then remove the old failed MBXserver from the DAG to a single MBX server with the existing database. Then rejoin the MBXserver to the DAG, and then the properties was OK.
When a database is member of the DAG, the correct way this should be is:
Server : ActiveMBXServer
MasterServerOrAvailabilityGroup : DAGNAME
MasterType : DatabaseAvailabilityGroup
This is my experience with the datacenter failure, but I'll post more later.
Rune
One customer I'm at right now don't, and due to this we are trying out the datacenter failure scenario. And to get the solution up and running, my experience is that you have to do some manal steps, and its important to do this in the right order. This is descibed below.
One datacenter fails, and the Cluster does not get MajorityNodeSet.
Datacenter contains 2 MBX servers and 1 HUB/CAS witch is the FSW for the DAG.
To recover from this failure, this are the steps:
- Stop Cluster service on remaining DAG members I secondary datacenter
- On one DAG member do a net start clussvc /forcequorum
o In my case, the databases got mounted already here
To change the FSW on the DAG now will not work, since the DAG can’t communicate with the failed DAG servers.
To remove the affected DAG members and change FSW, you have to complete the following:
- Start cluster admin and evict the failed DAG member servers
- Remove all database replication
o Get-mailboxdatabasecopystsatus -server failedmbxserver
o Remove-mailboxdatabasecopy databasename\affectedMBX
- Remove-databaseavailabilitygroupserver DAGNAME –mailboxserver failedmbxserver
Now you will be able to change the FSW for the DAG.
- Set-databaseavailabilitygroup DAGNAME –witnessserver FQDN
Now everything should be cleaned and in order.
One thing I noted is when doing these steps in the wrong order, running the remove-databaseavailabilitygroupserver DAGNAME before evicting the nodes from the cluster.
The databases that had a copy to the failed MBXserver, got the following errors in their properties. This was a hell to clean up.
Get-mailboxdatabase databasename fl
Server : ActiveMBXServer
MasterServerOrAvailabilityGroup : FAILEDMBXServer
MasterType : Server
To cleanup this, I had to rejoin the failed MBXservers to the DAG,and enable database replication.
Even though the replication seemed to work fine, it didn’t. It wasn’t possible to switch the active database between the servers in the DAG due to the properties on the database.
Then remove the old failed MBXserver from the DAG to a single MBX server with the existing database. Then rejoin the MBXserver to the DAG, and then the properties was OK.
When a database is member of the DAG, the correct way this should be is:
Server : ActiveMBXServer
MasterServerOrAvailabilityGroup : DAGNAME
MasterType : DatabaseAvailabilityGroup
This is my experience with the datacenter failure, but I'll post more later.
Rune
The remote certificate is invalid according to the validation procedure on Sharepoint 2007 Search page
Today I was going to check on my Sharepoint 2007 Search settings on the SSP admin pages.
When I opened the search page on the Shared Service Providers, and got the following message"The remote certificate is invalid according to the validation procedure."
This communication in the SSP towards the Office Server Web Services is based on SSL communication, default port 56738.
The certificate used is a self assigned sertificate for the host.
I opened the Internet Information Manager and checked the SSL status for the web site. It had a red cross on it, and had expired.
This server is abount 1 month old, and this should not be a problem!
To fix this issue I had to reassign a new self certificate to the web site, and this was accomplished in the following steps:
- Download IIS Resource Kit and install /extract
- Find Selfssl.exe and run the following command.
- Selfssl.exe /T /S: /V:validity days
- Default expire value for certificate is 01.01.9999:)
Did a iisreset, and the site was working properly.
When I opened the search page on the Shared Service Providers, and got the following message"The remote certificate is invalid according to the validation procedure."
This communication in the SSP towards the Office Server Web Services is based on SSL communication, default port 56738.
The certificate used is a self assigned sertificate for the host.
I opened the Internet Information Manager and checked the SSL status for the web site. It had a red cross on it, and had expired.
This server is abount 1 month old, and this should not be a problem!
To fix this issue I had to reassign a new self certificate to the web site, and this was accomplished in the following steps:
- Download IIS Resource Kit and install /extract
- Find Selfssl.exe and run the following command.
- Selfssl.exe /T /S:
- Default expire value for certificate is 01.01.9999:)
Did a iisreset, and the site was working properly.
At least one service or driver failed during system startup. Use Event Viewer to examine the event log for details.
This issue occures when a service is depending on other services to start.
Like the SQL reporting service are depending on the SQL service to access the Reporting database.
It the reporting service failes a similar event may be shown in the event viewer.
"At least one service or driver failed during system startup. Use Event Viewer to examine the event log for details."
As KB 884495, the time-out value for service startup process can be changed. In this way, the service have more time to load when the computer starts.
To increase the service startup time, create the following registry entry:
Subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ControlName: ServicesPipeTimeoutType: REG_DWORDData: The number of milliseconds that you want to give the services to start inTypically, a data value of 35,000 is sufficient to keep the service from timing out. However, you can reduce or increase this value according to your specific startup requirements. For example, to use a time-out value of 60 seconds, assign a data value of 60,000 to the ServicesPipeTimeout registry entry. A larger data value does not decrease your computer's performance. To create this registry entry, follow these steps:
1.
Click Start, click Run, type regedit, and then click OK.
2.
Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
3.
Right-click Control, point to New, and then click DWORD Value.
4.
In the New Value #1 box, type ServicesPipeTimeout, and then press ENTER.
5.
Right-click ServicesPipeTimeout, and then click Modify.
6.
Click Decimal, type the number of milliseconds that you want to wait until the service times out, and then click OK.For example, to wait 60 seconds before the service times out, type 60000.
7.
Quit Registry Editor, and then restart the computer.
Like the SQL reporting service are depending on the SQL service to access the Reporting database.
It the reporting service failes a similar event may be shown in the event viewer.
"At least one service or driver failed during system startup. Use Event Viewer to examine the event log for details."
As KB 884495, the time-out value for service startup process can be changed. In this way, the service have more time to load when the computer starts.
To increase the service startup time, create the following registry entry:
Subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ControlName: ServicesPipeTimeoutType: REG_DWORDData: The number of milliseconds that you want to give the services to start inTypically, a data value of 35,000 is sufficient to keep the service from timing out. However, you can reduce or increase this value according to your specific startup requirements. For example, to use a time-out value of 60 seconds, assign a data value of 60,000 to the ServicesPipeTimeout registry entry. A larger data value does not decrease your computer's performance. To create this registry entry, follow these steps:
1.
Click Start, click Run, type regedit, and then click OK.
2.
Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
3.
Right-click Control, point to New, and then click DWORD Value.
4.
In the New Value #1 box, type ServicesPipeTimeout, and then press ENTER.
5.
Right-click ServicesPipeTimeout, and then click Modify.
6.
Click Decimal, type the number of milliseconds that you want to wait until the service times out, and then click OK.For example, to wait 60 seconds before the service times out, type 60000.
7.
Quit Registry Editor, and then restart the computer.
Subscribe to:
Posts (Atom)