There is a lot of interest, and still a lot to be learned, about how storage replication will work with failover...
clusters when Microsoft offers up its newest (and still unnamed) version of Microsoft Server. Microsoft has provided us with some basic information about what we can expect.
Until the release of Windows Server 2012, Microsoft required failover clusters to make use of shared storage. The shared storage requirement for cluster nodes has since been removed, but cluster nodes must still have access to a cluster volume. One way of meeting this requirement will be through the use of storage replication.
According to Microsoft, the storage replication feature will allow failover clusters to be stretched to metropolitan distances -- essentially from one side of a city to another. The reason for the limitation on the distance over which a cluster can be stretched has to do with the way that the replication process works.
Storage replication is based on the SMB 3.0 protocol and the storage replication process is designed to be synchronous. Synchronous replication allows a server volume to be replicated without any data loss occurring. In contrast, asynchronous replication occurs on a scheduled basis, so if something happens to the primary server, the replica might not be in perfect sync with the primary server, which would mean that an unplanned failover could potentially result in data loss.
Microsoft has indicated that it will be possible to manage storage replicas for individual nodes and clusters through the Microsoft Failover Cluster Manager. This is the same tool that is currently used for managing Microsoft failover clusters. As such, administrators will be able to continue to manage failover clusters in familiar ways; the tool is simply being extended to expose the new functionality. In addition, storage replication will also be able to be scripted through PowerShell.
Microsoft addresses the Active Directory issues with Windows Failover Clusters
Dig Deeper on Storage pooling
Related Q&A from Brien Posey
While you may want to jump on the data management and protection train, consider first how combining the two in one product will affect your systems ... Continue Reading
Hackers can gain remote access to users' desktops through RDP hijacking. As a result, IT pros must know what they can do to prevent such an attack. Continue Reading
When IT pros are seeking an alternative to Outlook, they should consider the features their users need the most and select an email client that best ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.