Module 8: Examining Active Directory Replication
Download
Report
Transcript Module 8: Examining Active Directory Replication
Module 9: Planning for
Active Directory Data
Recovery and
Maintenance
Overview
Active Directory Data Store Model
Active Directory Data Store Process
Introduction to Active Directory Data Store Files
Maintaining Active Directory
Recovering Active Directory
Planning for Active Directory Backup
Active Directory Data Store Model
Database
File
+
Transaction Log Entries
Not Written to Database
Client Access
Interfaces
The Current Database
Directory System Agent
Database Layer
Extensible Storage Engine Database
NTFS
Active Directory Data Store Process
Create
New User
Transaction Created
Transaction
Log File
Written
Transaction Committed
Transaction Written
Buffered
Database
Written
Transaction Completed
Disk
Database
Written
Introduction to Active Directory Data Store Files
Data Log Files
Transaction Logs
Database File
Checkpoint File
Reserved Logs
Patch File
The Active Directory Database File
Contains All Objects in Active Directory
Single File for Each Domain Controller
Should Be Regularly Backed Up
Can Be Included in Routine File Backup
Stores Information in Tables
The Transaction Log Files
Each Previous Log Is Renamed After 10 MB of Data Is
Accepted
Current Log
Previous Logs
1 MB
3 MB
Renamed
10 MB
Edb.log
New
Edb.log
(10 MB)
EdbOOOO1.log
EdbOOOO2.log
EdbOOOO3.log
.
.
.
Logging Can Be Circular or
Non-circular
Checkpoint Files
Transaction Log
Entries Written
to the Database
Edb.chk
Transaction Log
Entries Not Yet
Written to the
Database
Ntds.dit
Edb.log
Reserved Log Files
Low Disk Space Situations
Assumes the Role of a Normal Transaction Log
Transaction Logs
Res1.log
Res2.log
Patch Files
Patch (.pat) Files Are Only Used During Online Backup
Ntds.pat
Ntds.pat File
Committed
Uncommitted
Ntds.dit File
Maintaining Active Directory
Automatic Database Cleanup
Manual Database Cleanup
Automatic Database Cleanup
Garbage Collection Occurs at 12-Hour Intervals
Unneeded transaction log files deleted
Obsolete objects deleted
Online database defragmentation performed
Manual Database Cleanup
Offline Database Defragmentation Tool
Reorders objects
Can reduce database size
LostAndFound Container
Contains misplaced objects
Should be examined occasionally
Recovering Active Directory
Non-Authoritative Restore
Authoritative Restore
Recovery Without Restore
Non-Authoritative Restore
Depends on Backup, Replication, and Transaction Logs
for Recovery and Includes
Placing domain controller in directory safe mode
Restoring data
Writing flag to registry to trigger a consistency check and
re-indexing
Replicating bringing the restored server to the current
database state
Authoritative Restore
Authoritative Restore Is a Partial Restore
Recovery Without Restore
Use Transaction Logging for Recovery
No restore needed
Circular logging must not be enabled
Planning for Active Directory Backup
Preferred Disk Configurations
Determining Hardware Needs
Creating a Backup Strategy
Preferred Disk Configurations
Enhanced System Performance and Reliability
Preferred Configuration
Place Windows 2000 system files, and Active Directory
database file and transaction log files on separate disks
Determining Hardware Needs
Predict the Size of Your Active Directory
Determine number of objects
Take into consideration the addition of attributes
Test Your Prediction
Double Your Prediction for Actual Production
Creating a Backup Strategy
Hardware
Backup Method
Off-Site Storage
Test Restores
Best Practices
Plan for Backup and Recovery Early
Keep the Database Files and Transaction Logs on Separate Drives
Predict Active Directory Size
Develop, Document, and Enforce a Backup Policy
Lab A: Active Directory Disaster Recovery
Lab B: Active Directory Database Planning
Review
Active Directory Data Store Model
Active Directory Data Store Process
Introduction to Active Directory Data Store Files
Maintaining Active Directory
Recovering Active Directory
Planning for Active Directory Backup