Creating a High Availability Cluster on Microsoft Windows Server 2008

After viewing a document on how to create shared storage for a cluster, Why not create one? Well, the process is similar to Windows 2003, now we will do it for Windows 2008, A new cluster, and it will be for a file server, failover clustering, The process for another type of cluster is similar. With this we will achieve high availability, that if one of the servers falls (node) Don't worry., since there are other nodes that can take the resources and lift the services so that users can work practically without noticing the fall of the node they were working against. Also comment that maintaining a cluster is expensive, This is, We will always keep in mind that both servers will have the same applications installed, in the same way and with the same versions, all this to avoid future problems. It is also advisable to balance the cluster […]

Creating an iSCSI Target on Windows Unified Data Storage Server

In this document, we'll see how we can create an iSCSI Target with our Windows operating system, No third-party apps, we can create or assign virtual disks to the iSCSI Target to later use them in shared storage, To set up a cluster… What we will need is a compatible Operating System, or a Windows Unified Data Storage Server, It's an OS. OEM, This is, that are already pre-installed with the equipment when we purchase it from our manufacturer. If we have a Windows Server 2003 o Windows Server 2008, we should update it to these editions, I will comment on this in another document, to be able to have OEM operating systems on virtual machines (For example).

Encrypting Hard Drive with Bitlocker on Windows 2008 o Windows Vista

This is one of the new features that Windows Server presents to us 2008 also available on Windows Vista, the possibility of encrypting our hard drive so that it is impossible to remove any type of data, all encrypted. We can store this key on a USB device such as a USB Pendrive or directly on a floppy disk, without this, The computer will not be able to reboot or decrypt the disk. The typical thing for when they boot our computer from a LiveCD of some tool to extract data or break the Windows password. It's ideal for when you go to the USA and your laptop is taken away at customs, he, Even though they definitely ask you for the password or… They take out the rubber glove ;), but in principle it is information that could not be accessed since it is encrypted.

Renaming a Windows Server Domain Controller 2008

In this document, we will discuss the proper steps for renaming a Microsoft Windows Server-based domain controller 2008, I know it's something unusual, but we will have to take it into account for when it is time, since there are several reasons that come to mind ;). We can run this wizard through GUI or via command line, I will choose this last option since it will be valid for Windows Server servers 2008 Core. We will take into account that if the server has the role of Certificate Authority or Certificate Authority (AC) We will not be able to change the name.

Resize System Disk in Windows 2008

Yes!!! ya por fín Microsoft nos deja redimensionar las particiones de nuestros discos duros, sean particiones del sistema o no. En estos breves pasos vemos cómo se podría realizar. Es algo bastante interesante ya que si queremos crear o redimensionar particiones o volúmenes, antes debíamos usar aplicaciones de terceros, especialmente es interesante, ya que para realizar copias de seguridad del estado del sistema de nuestro equipo, debemos realizarlo en otro disco duro o partición.

Cloning Windows Server 2008

In this document, describes how to clone a Windows server 2008, using the Sysprep utility, as NewSID development has been discontinued. First of all, I show the official links of the application: What is Sysprep: HTTP://technet.microsoft.com/en-us/library/cc721940.aspx How Sysprep Works: HTTP://technet.microsoft.com/en-us/library/cc766514.aspx Command-line parameters: HTTP://technet.microsoft.com/en-us/library/cc721973.aspx I think that today everyone knows what Sysprep is and that its use is mandatory whenever we are going to clone any machine, whether it's a server or a post, whether physical or virtual, all machines must have a different SID, this is what Sysprep does, prepare the machine with a different SID and give us the possibility to change the name.

Taking Active Directory Snapshots on Windows Server 2008

Well, the other day I saw this in an official Microsoft doc and it had to be tested. It refers to being able to take snapshots of our Active Directory, for the simple fact of taking it to another computer and performing some tests with LDAP tools for example, or to see how our Active Directory was doing at any given time, in case we have to do an authoritative AD restore and we don't know what an object or container is called (HTTP://www.bujarra.com/?p=1593), or to use with ADrestore to find out what a Tombstone is called (HTTP://www.bujarra.com/?p=1567)… In any case, it is not advisable to have many snapshots that are not going to be used due to loss of performance.

Doing an Authoritative Restore of Active Directory on Windows Server 2008

Well, ahora veremos una pequeña diferencia con el otro tipo de restauración, esta es una restauración autoritativa. Para realizar esta restauración es obligatorio haber realizado antes una restauración no autoritativa (HTTP://www.bujarra.com/?p=1582). Con esta restauración lo que realizamos es una replicación de los objetos que acabamos de restaurar a los otros controladores de dominio, indicando que ‘nuestroDirectorio Activo es el origen de la réplica. Para realizar está restauración, no debemos reiniciar el servidor DC tras la restauración no autoritativa.

Doing a non-authoritative restore of Active Directory on Windows Server 2008

GOOD, In this document we will see how we can restore our Active Directory backup in case we need it to recover from a catastrophe. To do this,, We will need a backup of the system state (HTTP://www.bujarra.com/?p=1574) or a full copy of the server. This is called performing a non-authoritative restore of Active Directory, since we will not indicate which objects we want it to forcibly replicate to the other domain controllers.