Enviar búsqueda
Cargar
havcs-410-101 a-2-10-srt-_pg_1
•
1 recomendación
•
1,275 vistas
R
raryal
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 434
Descargar ahora
Descargar para leer sin conexión
Recomendados
havcs-410-101 a-2-10-srt-pg_4
havcs-410-101 a-2-10-srt-pg_4
raryal
havcs-410-101 a-2-10-srt-pg_3
havcs-410-101 a-2-10-srt-pg_3
raryal
havcs-410-101 a-2-10-srt-pg_2
havcs-410-101 a-2-10-srt-pg_2
raryal
Microsoft OCSP LUNA SA PCI Integration Guide
Microsoft OCSP LUNA SA PCI Integration Guide
Chris x-MS
fuji-synapse-deployment-guide-white-paper
fuji-synapse-deployment-guide-white-paper
David Kleinman
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
Symantec
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
EMC
White Paper: EMC Infrastructure for VMware Cloud Environments
White Paper: EMC Infrastructure for VMware Cloud Environments
EMC
Recomendados
havcs-410-101 a-2-10-srt-pg_4
havcs-410-101 a-2-10-srt-pg_4
raryal
havcs-410-101 a-2-10-srt-pg_3
havcs-410-101 a-2-10-srt-pg_3
raryal
havcs-410-101 a-2-10-srt-pg_2
havcs-410-101 a-2-10-srt-pg_2
raryal
Microsoft OCSP LUNA SA PCI Integration Guide
Microsoft OCSP LUNA SA PCI Integration Guide
Chris x-MS
fuji-synapse-deployment-guide-white-paper
fuji-synapse-deployment-guide-white-paper
David Kleinman
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
Symantec
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
EMC
White Paper: EMC Infrastructure for VMware Cloud Environments
White Paper: EMC Infrastructure for VMware Cloud Environments
EMC
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
EMC
Avamaradminlabguideh 2v6-0-130120060710-phpapp02
Avamaradminlabguideh 2v6-0-130120060710-phpapp02
satheeshkumar Subramaniam
vRealize Operations (vROps) Management Pack for Cisco UCS User Guide
vRealize Operations (vROps) Management Pack for Cisco UCS User Guide
Blue Medora
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
webhostingguy
Exchange 2010 on_v_mware_-_best_practices_guide[1]
Exchange 2010 on_v_mware_-_best_practices_guide[1]
jabramo
EMC NetWorker Module for Microsoft SQL Server, Release 5.0
EMC NetWorker Module for Microsoft SQL Server, Release 5.0
webhostingguy
Suse service virtualization_image_set up_guide_140214
Suse service virtualization_image_set up_guide_140214
Darrel Rader
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answers
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answers
douglascarnicelli
H10986 emc its-oracle-br-wp
H10986 emc its-oracle-br-wp
smdsamee384
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...
EMC
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
EMC
Bb sql serverdell
Bb sql serverdell
Steve Feldman
Perf best practices_v_sphere5.0
Perf best practices_v_sphere5.0
Ram Prasad Ohnu
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5
EMC
Terface techbook en
Terface techbook en
Accurate Pool & Spa Services, llc
V Mware Qualcomm Case1
V Mware Qualcomm Case1
davidbe
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
EMC
Orion npm administratorguide
Orion npm administratorguide
ditodudee
LMS 5000 System Manual rev e
LMS 5000 System Manual rev e
Dana Lee Church
SQL Server 2000 Database Administration
SQL Server 2000 Database Administration
LearnItFirst.com
APM81SP1_RevA_Installation_Book
APM81SP1_RevA_Installation_Book
David_Tickner
Vce vdi reference_architecture_knowledgeworkerenvironments
Vce vdi reference_architecture_knowledgeworkerenvironments
Itzik Reich
Más contenido relacionado
La actualidad más candente
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
EMC
Avamaradminlabguideh 2v6-0-130120060710-phpapp02
Avamaradminlabguideh 2v6-0-130120060710-phpapp02
satheeshkumar Subramaniam
vRealize Operations (vROps) Management Pack for Cisco UCS User Guide
vRealize Operations (vROps) Management Pack for Cisco UCS User Guide
Blue Medora
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
webhostingguy
Exchange 2010 on_v_mware_-_best_practices_guide[1]
Exchange 2010 on_v_mware_-_best_practices_guide[1]
jabramo
EMC NetWorker Module for Microsoft SQL Server, Release 5.0
EMC NetWorker Module for Microsoft SQL Server, Release 5.0
webhostingguy
Suse service virtualization_image_set up_guide_140214
Suse service virtualization_image_set up_guide_140214
Darrel Rader
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answers
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answers
douglascarnicelli
H10986 emc its-oracle-br-wp
H10986 emc its-oracle-br-wp
smdsamee384
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...
EMC
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
EMC
Bb sql serverdell
Bb sql serverdell
Steve Feldman
Perf best practices_v_sphere5.0
Perf best practices_v_sphere5.0
Ram Prasad Ohnu
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5
EMC
Terface techbook en
Terface techbook en
Accurate Pool & Spa Services, llc
V Mware Qualcomm Case1
V Mware Qualcomm Case1
davidbe
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
EMC
Orion npm administratorguide
Orion npm administratorguide
ditodudee
LMS 5000 System Manual rev e
LMS 5000 System Manual rev e
Dana Lee Church
SQL Server 2000 Database Administration
SQL Server 2000 Database Administration
LearnItFirst.com
La actualidad más candente
(20)
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Avamaradminlabguideh 2v6-0-130120060710-phpapp02
Avamaradminlabguideh 2v6-0-130120060710-phpapp02
vRealize Operations (vROps) Management Pack for Cisco UCS User Guide
vRealize Operations (vROps) Management Pack for Cisco UCS User Guide
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Backup of Microsoft SQL Server in EMC Symmetrix Environments ...
Exchange 2010 on_v_mware_-_best_practices_guide[1]
Exchange 2010 on_v_mware_-_best_practices_guide[1]
EMC NetWorker Module for Microsoft SQL Server, Release 5.0
EMC NetWorker Module for Microsoft SQL Server, Release 5.0
Suse service virtualization_image_set up_guide_140214
Suse service virtualization_image_set up_guide_140214
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answers
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answers
H10986 emc its-oracle-br-wp
H10986 emc its-oracle-br-wp
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...
White Paper - EMC IT's Oracle Backup and Recovery-4X Cheaper, 8X Faster, and ...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
Bb sql serverdell
Bb sql serverdell
Perf best practices_v_sphere5.0
Perf best practices_v_sphere5.0
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5
EMC Hybrid Cloud Solution with VMware: Hadoop Applications Solution Guide 2.5
Terface techbook en
Terface techbook en
V Mware Qualcomm Case1
V Mware Qualcomm Case1
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Orion npm administratorguide
Orion npm administratorguide
LMS 5000 System Manual rev e
LMS 5000 System Manual rev e
SQL Server 2000 Database Administration
SQL Server 2000 Database Administration
Similar a havcs-410-101 a-2-10-srt-_pg_1
APM81SP1_RevA_Installation_Book
APM81SP1_RevA_Installation_Book
David_Tickner
Vce vdi reference_architecture_knowledgeworkerenvironments
Vce vdi reference_architecture_knowledgeworkerenvironments
Itzik Reich
NetApp VM .tr-3749
NetApp VM .tr-3749
Accenture
Practical Guide to Business Continuity & Disaster Recovery
Practical Guide to Business Continuity & Disaster Recovery
atif_kamal
Ugps user guide_v_e
Ugps user guide_v_e
Advantec Distribution
Ugps user guide_v_e
Ugps user guide_v_e
Advantec Distribution
Javaeetutorial6
Javaeetutorial6
David Rajah Selvaraj
ASUS P4V8X-X
ASUS P4V8X-X
Chris x-MS
Web logic installation document
Web logic installation document
Taoqir Hassan
Cell management (e ran3.0 05)
Cell management (e ran3.0 05)
Danilo Silvestri
Adf tutorial oracle
Adf tutorial oracle
César Augusto Castillo Farfán
Security Guide for Oracle Fusion - E10543
Security Guide for Oracle Fusion - E10543
aakash2meet
Panelviewplusmanual
Panelviewplusmanual
Vane Gimenez
Active directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revf
sandeep updahayay
Active directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revf
Bilguun Ganbat
HPE Matrix Operating Environment 7.5 Recovery Management User Guide
HPE Matrix Operating Environment 7.5 Recovery Management User Guide
Victor Rocha
Netbackup intallation guide
Netbackup intallation guide
rajan981
121ontapi
121ontapi
Nawaz Sk
Motorola solutions wing 4.4 wireless controller system reference guide (part ...
Motorola solutions wing 4.4 wireless controller system reference guide (part ...
Advantec Distribution
Viewse um006 -en-e (1)
Viewse um006 -en-e (1)
Julio Antonio Guerrero Cofre
Similar a havcs-410-101 a-2-10-srt-_pg_1
(20)
APM81SP1_RevA_Installation_Book
APM81SP1_RevA_Installation_Book
Vce vdi reference_architecture_knowledgeworkerenvironments
Vce vdi reference_architecture_knowledgeworkerenvironments
NetApp VM .tr-3749
NetApp VM .tr-3749
Practical Guide to Business Continuity & Disaster Recovery
Practical Guide to Business Continuity & Disaster Recovery
Ugps user guide_v_e
Ugps user guide_v_e
Ugps user guide_v_e
Ugps user guide_v_e
Javaeetutorial6
Javaeetutorial6
ASUS P4V8X-X
ASUS P4V8X-X
Web logic installation document
Web logic installation document
Cell management (e ran3.0 05)
Cell management (e ran3.0 05)
Adf tutorial oracle
Adf tutorial oracle
Security Guide for Oracle Fusion - E10543
Security Guide for Oracle Fusion - E10543
Panelviewplusmanual
Panelviewplusmanual
Active directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revf
HPE Matrix Operating Environment 7.5 Recovery Management User Guide
HPE Matrix Operating Environment 7.5 Recovery Management User Guide
Netbackup intallation guide
Netbackup intallation guide
121ontapi
121ontapi
Motorola solutions wing 4.4 wireless controller system reference guide (part ...
Motorola solutions wing 4.4 wireless controller system reference guide (part ...
Viewse um006 -en-e (1)
Viewse um006 -en-e (1)
Último
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Deepika Singh
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Último
(20)
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
havcs-410-101 a-2-10-srt-_pg_1
1.
VERITAS Cluster Server
for UNIX, Fundamentals (Lessons) HA-VCS-410-101A-2-10-SRT (100-002149-A)
2.
COURSE DEVELOPERS Bilge Gerrits Siobhan
Seeger Dawn Walker LEAD SUBJECT MATTER EXPERTS Geoff Bergren Connie Economou Paul Johnston Dave Rogers Jim Senicka Pete Toemmes TECHNICAL CONTRIBUTORS AND REVIEWERS Billie Bachra Barbara Ceran Bob Lucas Gene Henriksen Margy Cassidy Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind with regard to this guide, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. VERITAS Software Corporation shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. Copyright Copyright © 2005 VERITAS Software Corporation. All rights reserved. No part of the contents of this training material may be reproduced in any form or by any means or be used for the purposes of training or education without the written permission of VERITAS Software Corporation. Trademark Notice VERITAS, the VERITAS logo, and VERITAS FirstWatch, VERITAS Cluster Server, VERITAS File System, VERITAS Volume Manager, VERITAS NetBackup, and VERITAS HSM are registered trademarks of VERITAS Software Corporation. Other product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. VERITAS Cluster Server for UNIX, Fundamentals Participant Guide April 2005 Release VERITAS Software Corporation 350 Ellis Street Mountain View, CA 94043 Phone 650–527–8000 www.veritas.com
3.
Table of Contents
i Copyright © 2005 VERITAS Software Corporation. All rights reserved. Course Introduction VERITAS Cluster Server Curriculum ................................................................ Intro-2 Course Prerequisites......................................................................................... Intro-3 Course Objectives............................................................................................. Intro-4 Certification Exam Objectives........................................................................... Intro-5 Cluster Design Input .......................................................................................... Intro-6 Sample Design Input.......................................................................................... Intro-7 Sample Design Worksheet................................................................................. Intro-8 Lab Design for the Course ................................................................................ Intro-9 Lab Naming Conventions ................................................................................ Intro-10 Classroom Values for Labs............................................................................... Intro-11 Course Overview............................................................................................. Intro-12 Legend ............................................................................................................ Intro-15 Lesson 1: VCS Building Blocks Introduction ............................................................................................................. 1-2 Cluster Terminology ................................................................................................ 1-4 A Nonclustered Computing Environment ................................................................ 1-4 Definition of a Cluster .............................................................................................. 1-5 Definition of VERITAS Cluster Server and Failover............................................... 1-6 Definition of an Application Service........................................................................ 1-7 Definition of Service Group...................................................................................... 1-8 Service Group Types................................................................................................. 1-9 Definition of a Resource......................................................................................... 1-10 Resource Dependencies .......................................................................................... 1-11 Resource Attributes................................................................................................. 1-12 Resource Types and Type Attributes...................................................................... 1-13 Agents: How VCS Controls Resources .................................................................. 1-14 Using the VERITAS Cluster Server Bundled Agents Reference Guide ................ 1-15 Cluster Communication......................................................................................... 1-16 Low-Latency Transport .......................................................................................... 1-17 Group Membership Services/Atomic Broadcast (GAB) ........................................ 1-18 The Fencing Driver................................................................................................. 1-19 The High Availability Daemon............................................................................... 1-20 Comparing VCS Communication Protocols and TCP/IP....................................... 1-21 Maintaining the Cluster Configuration................................................................... 1-22 VCS Architecture................................................................................................... 1-24 How does VCS know what to fail over?................................................................. 1-24 How does VCS know when to fail over?................................................................ 1-24 Supported Failover Configurations........................................................................ 1-25 Active/Passive......................................................................................................... 1-25 N-to-1...................................................................................................................... 1-26 N + 1 ....................................................................................................................... 1-27 Active/Active.......................................................................................................... 1-28 N-to-N..................................................................................................................... 1-29 Table of Contents
4.
ii VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Lesson 2: Preparing a Site for VCS Planning for Implementation ................................................................................... 2-4 Implementation Needs .............................................................................................. 2-4 The Implementation Plan .......................................................................................... 2-5 Using the Design Worksheet..................................................................................... 2-6 Hardware Requirements and Recommendations ................................................... 2-7 SCSI Controller Configuration for Shared Storage .................................................. 2-9 Hardware Verification............................................................................................ 2-12 Software Requirements and Recommendations................................................... 2-13 Software Verification............................................................................................. 2-15 Preparing Cluster Information ............................................................................... 2-16 VERITAS Security Services.................................................................................. 2-17 Lab 2: Validating Site Preparation ........................................................................ 2-19 Lesson 3: Installing VERITAS Cluster Server Introduction ............................................................................................................. 3-2 Using the VERITAS Product Installer...................................................................... 3-4 Viewing Installation Logs......................................................................................... 3-4 The installvcs Utility................................................................................................. 3-5 Automated VCS Installation Procedure.................................................................... 3-6 Installing VCS Updates.......................................................................................... 3-10 VCS Configuration Files........................................................................................ 3-11 VCS File Locations................................................................................................. 3-11 Communication Configuration Files...................................................................... 3-12 Cluster Configuration Files.................................................................................... 3-13 Viewing the Default VCS Configuration ................................................................ 3-14 Viewing Installation Results .................................................................................. 3-14 Viewing Status ....................................................................................................... 3-15 Other Installation Considerations.......................................................................... 3-16 Fencing Considerations.......................................................................................... 3-16 Cluster Manager Java GUI..................................................................................... 3-17 Lab 3: Installing VCS ............................................................................................ 3-20 Lesson 4: VCS Operations Introduction ............................................................................................................. 4-2 Managing Applications in a Cluster Environment.................................................... 4-4 Key Considerations ................................................................................................... 4-4 VCS Management Tools........................................................................................... 4-5 Service Group Operations....................................................................................... 4-6 Displaying Attributes and Status............................................................................... 4-7 Bringing Service Groups Online............................................................................... 4-9 Taking Service Groups Offline ............................................................................... 4-11 Switching Service Groups...................................................................................... 4-12 Freezing a Service Group....................................................................................... 4-13 Bringing Resources Online .................................................................................... 4-14 Taking Resources Offline ...................................................................................... 4-15 Clearing Resource Faults ....................................................................................... 4-16
5.
Table of Contents
iii Copyright © 2005 VERITAS Software Corporation. All rights reserved. Using the VCS Simulator ...................................................................................... 4-18 The Simulator Java Console ................................................................................... 4-19 Creating a New Simulator Configuration ............................................................... 4-20 Simulator Command-Line Interface ....................................................................... 4-21 Using the Java GUI with the Simulator.................................................................. 4-22 Lab 4: Using the VCS Simulator ........................................................................... 4-24 Lesson 5: Preparing Services for VCS Introduction ............................................................................................................. 5-2 Preparing Applications for VCS............................................................................... 5-4 Application Service Component Review.................................................................. 5-4 Configuration and Migration Procedure................................................................... 5-5 One-Time Configuration Tasks ............................................................................... 5-6 Identifying Components............................................................................................ 5-6 Configuring Shared Storage...................................................................................... 5-7 Configuring the Network.......................................................................................... 5-8 Configuring the Application ................................................................................... 5-12 Testing the Application Service............................................................................. 5-13 Bringing Up Resources........................................................................................... 5-14 Verifying Resources................................................................................................ 5-18 Testing the Integrated Components ........................................................................ 5-19 Stopping and Migrating an Application Service..................................................... 5-20 Stopping Application Components......................................................................... 5-20 Manually Migrating an Application Service........................................................... 5-21 Validating the Design Worksheet.......................................................................... 5-22 Documenting Resource Attributes.......................................................................... 5-22 Checking Resource Attributes ................................................................................ 5-23 Documenting Resource Dependencies ................................................................... 5-24 Validating Service Group Attributes ...................................................................... 5-25 Lab 5: Preparing Application Services .................................................................. 5-27 Lesson 6: VCS Configuration Methods Introduction ............................................................................................................. 6-2 Overview of Configuration Methods........................................................................ 6-4 Effects on the Cluster................................................................................................ 6-5 Controlling Access to VCS ...................................................................................... 6-6 Relating VCS and UNIX User Accounts.................................................................. 6-6 Simplifying VCS Administrative Access ................................................................. 6-7 User Accounts........................................................................................................... 6-8 Changing Privileges................................................................................................ 6-10 VCS Access in Secure Mode.................................................................................. 6-11 Online Configuration ............................................................................................. 6-12 How VCS Changes the Online Cluster Configuration ........................................... 6-13 Opening the Cluster Configuration......................................................................... 6-14 Saving the Cluster Configuration............................................................................ 6-15 Closing the Cluster Configuration .......................................................................... 6-16 How VCS Protects the Cluster Configuration ........................................................ 6-17
6.
iv VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Offline Configuration ............................................................................................. 6-18 Offline Configuration Examples............................................................................ 6-19 Starting and Stopping VCS ................................................................................... 6-22 How VCS Starts Up by Default ............................................................................. 6-22 VCS Startup with a .stale File................................................................................ 6-25 Forcing VCS to Start from a Wait State................................................................. 6-26 Building the Configuration Using a Specific main.cf File..................................... 6-28 Stopping VCS......................................................................................................... 6-30 Lab 6: Starting and Stopping VCS ........................................................................ 6-32 Lesson 7: Online Configuration of Service Groups Introduction ............................................................................................................. 7-2 Online Configuration Procedure.............................................................................. 7-4 Creating a Service Group.......................................................................................... 7-4 Adding a Service Group.......................................................................................... 7-5 Adding a Service Group Using the GUI ................................................................... 7-5 Adding a Service Group Using the CLI.................................................................... 7-6 Classroom Exercise: Creating a Service Group........................................................ 7-7 Design Worksheet Example...................................................................................... 7-8 Adding Resources................................................................................................... 7-9 Online Resource Configuration Procedure ............................................................... 7-9 Adding Resources Using the GUI: NIC Example.................................................. 7-10 Adding an IP Resource........................................................................................... 7-12 Classroom Exercise: Creating Network Resources Using the GUI....................... 7-13 Adding a Resource Using the CLI: DiskGroup Example...................................... 7-16 Classroom Exercise: Creating Storage Resources using the CLI .......................... 7-20 The Process Resource ............................................................................................ 7-23 Classroom Exercise: Creating a Process Resource ................................................ 7-24 Solving Common Configuration Errors.................................................................. 7-26 Flushing a Service Group....................................................................................... 7-27 Disabling a Resource.............................................................................................. 7-28 Copying and Deleting a Resource.......................................................................... 7-29 Testing the Service Group .................................................................................... 7-30 Linking Resources.................................................................................................. 7-31 Resource Dependencies ......................................................................................... 7-32 Classroom Exercise: Linking Resources................................................................ 7-33 Design Worksheet Example................................................................................... 7-34 Setting the Critical Attribute .................................................................................. 7-35 Classroom Exercise: Testing the Service Group.................................................... 7-36 A Completed Process Service Group..................................................................... 7-37 Lab 7: Online Configuration of a Service Group ................................................... 7-41 Lesson 8: Offline Configuration of Service Groups Introduction ............................................................................................................. 8-2 Offline Configuration Procedures............................................................................ 8-4 New Cluster............................................................................................................... 8-4 Example Configuration File...................................................................................... 8-5 Existing Cluster......................................................................................................... 8-7
7.
Table of Contents
v Copyright © 2005 VERITAS Software Corporation. All rights reserved. First System .............................................................................................................. 8-7 Using the Design Worksheet................................................................................. 8-10 Resource Dependencies .......................................................................................... 8-11 A Completed Configuration File ............................................................................ 8-12 Offline Configuration Tools.................................................................................... 8-14 Editing Configuration Files .................................................................................... 8-14 Using the VCS Simulator ....................................................................................... 8-15 Solving Offline Configuration Problems ................................................................ 8-16 Common Problems ................................................................................................. 8-16 All Systems in a Wait State .................................................................................... 8-17 Propagating an Old Configuration.......................................................................... 8-17 Recovering from an Old Configuration.................................................................. 8-18 Configuration File Backups.................................................................................... 8-19 Testing the Service Group .................................................................................... 8-20 Service Group Testing Procedure........................................................................... 8-20 Lab 8: Offline Configuration of Service Groups..................................................... 8-22 Lesson 9: Sharing Network Interfaces Introduction ............................................................................................................. 9-2 Sharing Network Interfaces..................................................................................... 9-4 Conceptual View....................................................................................................... 9-4 Alternate Network Configurations ........................................................................... 9-6 Using Proxy Resources............................................................................................. 9-6 The Proxy Resource Type......................................................................................... 9-7 Using Parallel Service Groups ................................................................................ 9-8 Determining Service Group Status ........................................................................... 9-8 Phantom Resources................................................................................................... 9-9 The Phantom Resource Type.................................................................................. 9-10 Configuring a Parallel Service Group..................................................................... 9-11 Properties of Parallel Service Groups..................................................................... 9-12 Localizing Resource Attributes.............................................................................. 9-13 Localizing a NIC Resource Attribute ..................................................................... 9-13 Lab 9: Creating a Parallel Service Group.............................................................. 9-15 Lesson 10: Configuring Notification Introduction ........................................................................................................... 10-2 Notification Overview ............................................................................................ 10-4 Message Queue....................................................................................................... 10-4 Message Severity Levels......................................................................................... 10-5 Configuring Notification......................................................................................... 10-6 The NotifierMngr Resource Type........................................................................... 10-8 Configuring the ResourceOwner Attribute........................................................... 10-10 Configuring the GroupOwner Attribute................................................................ 10-11 Configuring the SNMP Console........................................................................... 10-12 Using Triggers for Notification............................................................................. 10-13 Lab 10: Configuring Notification.......................................................................... 10-15
8.
vi VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Lesson 11: Configuring VCS Response to Resource Faults Introduction ........................................................................................................... 11-2 VCS Response to Resource Faults ...................................................................... 11-4 Failover Decisions and Critical Resources ............................................................. 11-4 How VCS Responds to Resource Faults by Default............................................... 11-5 The Impact of Service Group Attributes on Failover.............................................. 11-7 Practice: How VCS Responds to a Fault............................................................... 11-10 Determining Failover Duration ............................................................................. 11-11 Failover Duration on a Resource Fault ................................................................. 11-11 Adjusting Monitoring............................................................................................ 11-13 Adjusting Timeout Values .................................................................................... 11-14 Controlling Fault Behavior................................................................................... 11-15 Type Attributes Related to Resource Faults.......................................................... 11-15 Modifying Resource Type Attributes.................................................................... 11-18 Overriding Resource Type Attributes ................................................................... 11-19 Recovering from Resource Faults....................................................................... 11-20 Recovering a Resource from a FAULTED State.................................................. 11-20 Recovering a Resource from an ADMIN_WAIT State ........................................ 11-22 Fault Notification and Event Handling................................................................. 11-24 Fault Notification .................................................................................................. 11-24 Extended Event Handling Using Triggers ............................................................ 11-25 The Role of Triggers in Resource Faults .............................................................. 11-25 Lab 11: Configuring Resource Fault Behavior .................................................... 11-28 Lesson 12: Cluster Communications Introduction ........................................................................................................... 12-2 VCS Communications Review .............................................................................. 12-4 VCS On-Node Communications............................................................................ 12-4 VCS Inter-Node Communications ......................................................................... 12-5 VCS Communications Stack Summary ................................................................. 12-5 Cluster Interconnect Specifications........................................................................ 12-6 Cluster Membership.............................................................................................. 12-7 GAB Status and Membership Notation.................................................................. 12-7 Viewing LLT Link Status ...................................................................................... 12-9 The lltstat Command.............................................................................................. 12-9 Cluster Interconnect Configuration...................................................................... 12-10 Configuration Overview....................................................................................... 12-10 LLT Configuration Files ....................................................................................... 12-11 The sysname File.................................................................................................. 12-15 The GAB Configuration File ............................................................................... 12-16 Joining the Cluster Membership.......................................................................... 12-17 Seeding During Startup........................................................................................ 12-17 LLT, GAB, and VCS Startup Files ...................................................................... 12-18 Manual Seeding.................................................................................................... 12-19 Probing Resources During Startup....................................................................... 12-20
9.
Table of Contents
vii Copyright © 2005 VERITAS Software Corporation. All rights reserved. Lesson 13: System and Communication Faults Introduction ........................................................................................................... 13-2 Ensuring Data Integrity.......................................................................................... 13-4 VCS Response to System Failure ........................................................................... 13-5 Failover Duration on a System Fault ...................................................................... 13-6 Cluster Interconnect Failures ................................................................................ 13-7 Single LLT Link Failure......................................................................................... 13-7 Jeopardy Membership............................................................................................. 13-8 Recovery Behavior................................................................................................ 13-11 Modifying the Default Recovery Behavior........................................................... 13-12 Potential Split Brain Condition............................................................................. 13-13 Interconnect Failures with a Low-Priority Public Link........................................ 13-14 Interconnect Failures with Service Group Heartbeats .......................................... 13-16 Preexisting Network Partition............................................................................... 13-17 Changing the Interconnect Configuration............................................................ 13-18 Modifying the Cluster Interconnect Configuration............................................... 13-19 Adding LLT Links................................................................................................ 13-20 Lab 13: Testing Communication Failures............................................................ 13-22 Optional Lab: Configuring the InJeopardy Trigger .............................................. 13-23 Lesson 14: I/O Fencing Introduction ........................................................................................................... 14-2 Data Protection Requirements.............................................................................. 14-4 Understanding the Data Protection Problem........................................................... 14-4 Split Brain Condition.............................................................................................. 14-7 Data Protection Requirements ................................................................................ 14-8 I/O Fencing Concepts and Components............................................................... 14-9 I/O Fencing Components...................................................................................... 14-10 I/O Fencing Operations....................................................................................... 14-12 Registration with Coordinator Disks .................................................................... 14-12 Service Group Startup........................................................................................... 14-13 System Failure ...................................................................................................... 14-14 Interconnect Failure .............................................................................................. 14-15 I/O Fencing Behavior............................................................................................ 14-19 I/O Fencing with Multiple Nodes ......................................................................... 14-20 I/O Fencing Implementation................................................................................ 14-21 Communication Stack........................................................................................... 14-21 Fencing Driver ...................................................................................................... 14-23 Fencing Implementation in Volume Manager...................................................... 14-24 Fencing Implementation in VCS .......................................................................... 14-25 Coordinator Disk Implementation ........................................................................ 14-26 Configuring I/O Fencing ...................................................................................... 14-27 Fencing Effects on Disk Groups........................................................................... 14-31 Stopping and Recovering Fenced Systems........................................................ 14-32 Stopping Systems Running I/O Fencing............................................................... 14-32 Recovery with Running Systems.......................................................................... 14-33 Recovering from a Partition-In-Time ................................................................... 14-34 Lab 14: Configuring I/O Fencing ......................................................................... 14-36
10.
viii VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Lesson 15: Troubleshooting Introduction ........................................................................................................... 15-2 Monitoring VCS..................................................................................................... 15-4 VCS Logs............................................................................................................... 15-5 UMI-Based Support ............................................................................................... 15-7 Using the VERITAS Support Web Site................................................................. 15-8 Troubleshooting Guide.......................................................................................... 15-9 Procedure Overview............................................................................................... 15-9 Using the Troubleshooting Job Aid ..................................................................... 15-10 Cluster Communication Problems....................................................................... 15-11 Checking GAB...................................................................................................... 15-11 Checking LLT ...................................................................................................... 15-12 Duplicate Node IDs.............................................................................................. 15-13 Problems with LLT .............................................................................................. 15-14 VCS Engine Problems ........................................................................................ 15-15 Startup Problems .................................................................................................. 15-15 STALE_ADMIN_WAIT ..................................................................................... 15-16 ADMIN_WAIT.................................................................................................... 15-17 Service Group and Resource Problems.............................................................. 15-18 Service Groups Problems..................................................................................... 15-18 Resource Problems............................................................................................... 15-27 Agent Problems and Resource Type Problems.................................................... 15-30 Archiving VCS-Related Files............................................................................... 15-32 Making Backups................................................................................................... 15-32 The hasnap Utility................................................................................................ 15-33 Lab 15: Troubleshooting ..................................................................................... 15-35 Index
11.
Course Introduction
12.
Intro–2 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. VERITAS Cluster Server Curriculum The VERITAS Cluster Server curriculum is a series of courses that are designed to provide a full range of expertise with VERITAS Cluster Server (VCS) high availability solutions—from design through disaster recovery. VERITAS Cluster Server, Fundamentals This course covers installation and configuration of common VCS configurations, focusing on two-node clusters running application and database services. VERITAS Cluster Server, Implementing Local Clusters This course focuses on multinode VCS clusters and advanced topics related to more complex cluster configurations. VERITAS Cluster Server Agent Development This course enables students to create and customize VCS agents. High Availability Design Using VERITAS Cluster Server This course enables participants to translate high availability requirements into a VCS design that can be deployed using VERITAS Cluster Server. Disaster Recovery Using VVR and Global Cluster Option This course covers cluster configurations across remote sites, including replicated data clusters (RDCs) and the Global Cluster Option for wide-area clusters. Learning Path VERITAS Cluster Server, Implementing Local Clusters Disaster Recovery Using VVR 4.0 and Global Cluster Option High Availability Design Using VERITAS Cluster Server VERITAS Cluster Server, Fundamentals VERITAS Cluster Server Curriculum VERITAS Cluster Server Agent Development
13.
Course Introduction Intro–3 Copyright
© 2005 VERITAS Software Corporation. All rights reserved. Course Prerequisites This course assumes that you have an administrator-level understanding of one or more UNIX platforms. You should understand how to configure systems, storage devices, and networking in multiserver environments. Course Prerequisites To successfully complete this course, you should have the following expertise: UNIX operating system and network administration System and network device configuration VERITAS Volume Manager configuration
14.
Intro–4 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Course Objectives In the VERITAS Cluster Server for UNIX, Fundamentals course, you are given a high availability design to implement in the classroom environment using VERITAS Cluster Server. The course simulates the job tasks you perform to configure a cluster, starting with preparing the site and application services that will be made highly available. Lessons build upon each other, exhibiting the processes and recommended best practices you can apply to implementing any design cluster. The core material focuses on the most common cluster implementations. Other cluster designs emphasizing additional VCS capabilities are provided to illustrate the power and flexibility of VERITAS Cluster Server. Course Objectives After completing the VERITAS Cluster Server for UNIX, Fundamentals course, you will be able to: Manage services in an existing VCS environment. Install and configure a cluster according to a specified sample design. Use a design worksheet to put applications under VCS control. Customize cluster behavior to implement specified requirements. Respond to resource, system, and communication failures.
15.
Course Introduction Intro–5 Copyright
© 2005 VERITAS Software Corporation. All rights reserved. Certification Exam Objectives The high-level objectives for the Implementation of HA Solutions certification exam are shown in the slide. Note: Not all objectives are covered by the VERITAS Cluster Server for UNIX, Fundamentals course. The VERITAS Cluster Server for UNIX, Implementing Local Clusters course is also required to provide complete training on all certification exam objectives. Detailed objectives are provided on the VERITAS Web site, along with sample exams. Certification Exam Objectives The summary of VERITAS Certified High Availability Implementation Exam objectives covered in this lesson are: Verify and adjust the preinstallation environment. Install VCS. Configure the high availability environment. Perform advanced cluster configuration. Validate the implementation and make adjustments for high availability. Document and maintain the high availability solution. For the complete set of exam objectives, follow the Certification link from www.veritas.com/education.
16.
Intro–6 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Cluster Design Input The staff responsible for the deployment of a VCS cluster may not necessarily be the same people who developed the cluster design. To ensure a successful deployment process, define the information that needs to be passed to the deployment team from a VCS design. A VCS design includes the following information: • Cluster information, including cluster communications – The cluster name and ID number – Ethernet ports that will be used for the cluster interconnect – Any other VCS communication channels required • Member system names • High availability services information – The service name and type – Systems where the service can start up and run – Startup policies – Failover policies – Interactions with other services – Resources required by the services, and their relationships • User information and privilege levels • Notification requirements: SNMP/SMTP notification and triggers • Customization requirements: Enterprise and custom agents; cluster, service group, system, resource, and agent attributes that are not VCS default values Cluster Design Input A VCS cluster design includes: Cluster information, including cluster communications System information Application service information, including detailed information about required software and hardware resources User account information Notification requirements Customization requirements This course provides cluster design information needed to prepare, install, and configure a cluster.
17.
Course Introduction Intro–7 Copyright
© 2005 VERITAS Software Corporation. All rights reserved. Sample Design Input A VCS design may come in many different formats with varying levels of detail. In some cases, you may have only the information about the application services that need to be clustered and the desired operational behavior in the cluster. For example, you may be told that the application service uses multiple network ports and requires local failover capability among those ports before it fails over to another system. In other cases, you may have the information you need as a set of service dependency diagrams with notes on various aspects of the desired cluster operations. If you receive the design information that does not detail the resource information, develop a detailed design worksheet before starting the deployment, as shown in the following “Cluster Design Worksheet.” Using a design worksheet to document all aspects of your high availability environment helps ensure that you are well-prepared to start implementing your cluster design. You are provided with a design worksheet showing sample values to use throughout this course as a tool for implementing the cluster design in the lab exercises. You can use a similar format to collect all the information you need before starting deployment at your site. Sample Design Input IP 192.168.3.132 Web Service • Start up on system S1. • Restart Web server process 3 times before faulting it. • Fail over to S2 if any resource faults. • Notify patg@company.com if any resource faults. • • Web Server Volume WebVol Disk Group WebDG NIC eri0 IP Address 192.168.3.132 Components required to provide the Web service. Components required to provide the Web service. Mount /web
18.
Intro–8 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Sample Design Worksheet Example: main.cf group WebSG ( SystemList = { S1 = 0, S2 = 1 } AutoStartList = { S1 } ) IP WebIP ( Device = eri0 Address = 192.168.3.132 Netmask = 255.255.255.0 ) Service Group Definition Sample Value Group WebSG Required Attributes FailOverPolicy Priority SystemList S1=0 S2=1 Optional Attributes AutoStartList S1 Resource Definition Sample Value Service Group WebSG Resource Name WebIP Resource Type IP Required Attributes Device eri0 Address 192.168.3.132 Optional Attributes Netmask 255.255.255.0 Critical? Yes (1) Enabled? Yes (1)
19.
Course Introduction Intro–9 Copyright
© 2005 VERITAS Software Corporation. All rights reserved. Lab Design for the Course The diagram shows a conceptual view of the cluster design used as an example throughout this course and implemented in hands-on lab exercises. Each aspect of the cluster configuration is described in greater detail, where applicable, in course lessons. The cluster consists of: • Two nodes • Five high availability services; four failover service groups and one parallel network service group • Fibre connections to SAN shared storage from each node through a switch • Two private Ethernet interfaces for the cluster interconnect network • Ethernet connections to the public network Additional complexity is added to the design to illustrate certain aspects of cluster configuration in later lessons. The design diagram shows a conceptual view of the cluster design described in the worksheet. Lab Design for the Course trainxx trainxx vcsx their_nameSG1 their_nameSG2 your_nameSG1 your_nameSG2 NetworkSG
20.
Intro–10 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Lab Naming Conventions To simplify the labs, use your name or a nickname as a prefix for cluster objects created in the lab exercises. This includes Volume Manager objects, such as disk groups and volumes, as well as VCS service groups and resources. Following this convention helps distinguish your objects when multiple students are working on systems in the same cluster and helps ensure that each student uses unique names. The lab exercises represent your name with the word name in italics. You substitute the name you select whenever you see the name placeholder in a lab step. valueSGAttribute3 Optional Attributes valueSGAttribute2 valueSGAttribute1 Required Attributes nameSGGroup Sample Value Service Group Definition Lab Naming Conventions . . . valueResAttribute2 nameIPResource Name valueResAttribute1 Required Attributes IPResource Type nameSGService Group Name Sample ValueResource Definition Substitute your name, or a nickname, wherever tables or instructions indicate name in labs. Following this convention simplifies labs and helps prevent naming conflicts with your lab partner.
21.
Course Introduction Intro–11 Copyright
© 2005 VERITAS Software Corporation. All rights reserved. Classroom Values for Labs Your instructor will provide the classroom-specific information you need to perform the lab exercises. You can record these values in your lab books using the tables provided, or your instructor may provide separate handouts showing the classroom values for your location. In some lab exercises, sample values may be shown in tables as a guide to the types of values you must specify. Substitute the values provided by your instructor to ensure that your configuration is appropriate for your classroom. If you are not sure of the configuration for your classroom, ask your instructor. DNS Address Subnet Your ValueNetwork Definition Classroom Values for Labs Lab files directory . . . VCS installation dir Your ValueSoftware Location Use the classroom values provided by your instructor at the beginning of each lab exercise. Lab tables are provided to at the beginning of the lab to record these values. Alternately, your instructor may hand out printed tables. If sample values are provided as guidelines, substitute your classroom-specific values provided by your instructor.
22.
Intro–12 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Course Overview This training provides comprehensive instruction on the installation and initial configuration of VERITAS Cluster Server (VCS). The course covers principles and methods that enable you to prepare, create, and test VCS service groups and resources using tools that best suit your needs and your high availability environment. You learn to configure and test failover and notification behavior, cluster additional applications, and further customize your cluster according to specified design criteria. Lesson 1: VCS Building Blocks Lesson 2: Preparing a Site for VCS Lesson 3: Installing VCS Lesson 4: VCS Operations Lesson 5: Preparing Services for VCS Lesson 6: VCS Configuration Methods Lesson 7: Online Configuration of Service Groups Lesson 8: Offline Configuration of Service Groups Lesson 9: Sharing Network Interfaces Lesson 10: Configuring Notification Lesson 11: Configuring VCS Response to Faults Lesson 12: Cluster Communications Lesson 13: System and Communication Faults Lesson 14: I/O Fencing Lesson 15: Troubleshooting Course Overview
23.
Course Introduction Intro–13 Copyright
© 2005 VERITAS Software Corporation. All rights reserved. Course Resources This course uses this participant guide containing lessons presented by your instructor and lab exercises to enable you to practice your new skills. Lab materials are provided in three forms, with increasing levels of detail to suit a range of student expertise levels. • Appendix A: Lab Synopses has high-level task descriptions and design worksheets. • Appendix B: Lab Details includes the lab procedures and detailed steps. • Appendix C: Lab Solutions includes the lab procedures and steps with the corresponding command lines required to perform each step. • Appendix D: Job Aids provides supplementary material that can be used as on-the-job guides for performing some common VCS operations. • Appendix E: Design Worksheet Template provides a blank design worksheet. Additional supplements may be used in the classroom or provided to you by your instructor. Course Resources Participant Guide – Lessons – Appendix A: Lab Synopses – Appendix B: Lab Details – Appendix C: Lab Solutions – Appendix D: Job Aids – Appendix E: Design Worksheet Template Supplements – VCS Simulator: van.veritas.com – Troubleshooting Job Aid – VCS Command-Line Reference card – Tips & Tricks: www.veritas.com/education
24.
Intro–14 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Course Platforms This course material applies to the VCS platforms shown in the slide. Indicators are provided in slides and text where there are differences in platforms. Refer to the VERITAS Cluster Server user documentation for your platform and version to determine which features are supported in your environment. Course Platforms This course covers the following versions of VCS: VCS 4.1, 4.0, and 3.5 for Solaris VCS 4.0 for Linux VCS 4.0 for AIX VCS 3.5 for HP-UX
25.
Course Introduction Intro–15 Copyright
© 2005 VERITAS Software Corporation. All rights reserved. Legend These are common symbols used in this course. Symbol Description Server, node, or cluster system (terms used interchangeably) Server or cluster system that has faulted Storage Application service Cluster interconnect Wide area network (WAN) cloud
26.
Intro–16 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Client systems on a network VCS service group Offline service group VCS resource Symbol Description
27.
Lesson 1 VCS Building
Blocks
28.
1–2 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Introduction Overview This lesson introduces basic VERITAS Cluster Server terminology and concepts, and provides an overview of the VCS architecture and supporting communication mechanisms. Importance The terms and concepts covered in this lesson provide a foundation for learning the tasks you need to perform to deploy the VERITAS Cluster Server product, both in the classroom and in real-world applications. Lesson Introduction Lesson 1: VCS Building Blocks Lesson 2: Preparing a Site for VCS Lesson 3: Installing VCS Lesson 4: VCS Operations Lesson 5: Preparing Services for VCS Lesson 6: VCS Configuration Methods Lesson 7: Online Configuration of Service Groups Lesson 8: Offline Configuration of Service Groups Lesson 9: Sharing Network Interfaces Lesson 10: Configuring Notification Lesson 11: Configuring VCS Response to Faults Lesson 12: Cluster Communications Lesson 13: System and Communication Faults Lesson 14: I/O Fencing Lesson 15: Troubleshooting
29.
Lesson 1 VCS
Building Blocks 1–3 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 Outline of Topics • Cluster Terminology • Cluster Communication • Maintaining the Cluster Configuration • VCS Architecture • Supported Failover Configurations Describe the failover configurations supported by VCS. Supported Failover Configurations Describe the VCS architecture.VCS Architecture Describe how the cluster configuration is maintained. Maintaining the Cluster Configuration Describe cluster communication mechanisms. Cluster Communication Define clustering terminology.Cluster Terminology After completing this lesson, you will be able to: Topic Lesson Topics and Objectives
30.
1–4 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Cluster Terminology A Nonclustered Computing Environment An example of a traditional, nonclustered computing environment is a single server running an application that provides public network links for client access and data stored on local or SAN storage. If a single component fails, application processing and the business service that relies on the application are interrupted or degraded until the failed component is repaired or replaced. A Nonclustered Computing Environment
31.
Lesson 1 VCS
Building Blocks 1–5 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 Definition of a Cluster A clustered environment includes multiple components configured such that if one component fails, its role can be taken over by another component to minimize or avoid service interruption. This allows clients to have high availability to their data and processing, which is not possible in nonclustered environments. The term cluster, simply defined, refers to multiple independent systems or domains connected into a management framework for increased availability. Clusters have the following components: • Up to 32 systems—sometimes referred to as nodes or servers Each system runs its own operating system. • A cluster interconnect, which allows for cluster communications • A public network, connecting each system in the cluster to a LAN for client access • Shared storage (optional), accessible by each system in the cluster that needs to run the application Definition of a Cluster A cluster is a collection of multiple independent systems working together under a management framework for increased service availability. Application Node Storage Cluster Interconnect
32.
1–6 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Definition of VERITAS Cluster Server and Failover In a highly available environment, HA software must perform a series of tasks in order for clients to access a service on another server in the event a failure occurs. The software must: • Ensure that data stored on the disk is available to the new server, if shared storage is configured (Storage). • Move the IP address of the old server to the new server (Network). • Start up the application on the new server (Application). VERITAS Cluster Server (VCS) is a software solution for automating these tasks. VCS monitors and controls applications running in the cluster and, if a failure is detected, automates application restart. When another server is required to restart the application, VCS performs a failover—this is the process of stopping the application on one system and starting them on another system. Definition of VERITAS Cluster Server and Failover VCS detects faults and performs automated failover. Application Node Failed Node Storage Cluster Interconnect
33.
Lesson 1 VCS
Building Blocks 1–7 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 Definition of an Application Service An application service is a collection of hardware and software components required to provide a service, such as a Web site an end-user may access by connecting into a particular network IP address or host name. Each application service typically requires components of the following three types: • Application binaries (executables) • Network • Storage If an application service needs to be switched to another system, all of the components of the application service must migrate together to re-create the service on another system. Note: These are the same components that the administrator must manually move from a failed server to a working server to keep the service available to clients in a nonclustered environment. Application service examples include: • A Web service consisting of a Web server program, IP addresses, associated network interfaces used to allow access into the Web site, a file system containing Web data files, and a volume and disk group containing the file system. • A database service may consist of one or more IP addresses, relational database management system (RDBMS) software, a file system containing data files, a volume and disk group on which the file system resides, and a NIC for network access. Definition of an Application Service An application service is a collection of all the hardware and software components required to provide a service. If the service must be migrated to another system, all components need to be moved in an orderly fashion. Examples include Web servers, databases, and applications.
34.
1–8 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Definition of Service Group A service group is a virtual container that enables VCS to manage an application service as a unit. The service group contains all the hardware and software components required to run the service, which enables VCS to coordinate failover of the application service resources in the event of failure or at the administrator’s request. A service group is defined by these attributes: • The cluster-wide unique name of the group • The list of the resources in the service group, usually determined by which resources are needed to run a specific application service • The dependency relationships between the resources • The list of cluster systems on which the group is allowed to run • The list of cluster systems on which you want the group to start automatically Definition of a Service Group A service group is a virtual container that enables VCS to manage an application service as a unit. All components required to provide the service, and the relationships between these components, are defined within the service group. A service groups has attributes that define its behavior, such as where it can start and run.
35.
Lesson 1 VCS
Building Blocks 1–9 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 Service Group Types Service groups can be one of three types: • Failover This service group runs on one system at a time in the cluster. Most application services, such as database and NFS servers, use this type of group. • Parallel This service group runs simultaneously on more than one system in the cluster. This type of service group requires an application that can be started on more than one system at a time without threat of data corruption. • Hybrid (4.x) A hybrid service group is a combination of a failover service group and a parallel service group used in VCS 4.x replicated data clusters (RDCs), which are based on VERITAS Volume Replicator. This service group behaves as a failover group within a defined set of systems, and a parallel service group within a different set of systems. RDC configurations are described in the VERITAS Disaster Recovery Using VVR and Global Cluster Option course. Service Group Types Failover: – The service group can be online on only one cluster system at a time. – VCS migrates the service group at the administrator’s request and in response to faults. Parallel – The service group can be online on multiple cluster systems simultaneously. – An example is Oracle Real Application Cluster (RAC). Hybrid This is a special-purpose type of service group used to manage service groups in replicated data clusters (RDCs), which are based on VERITAS Volume Replicator.
36.
1–10 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Definition of a Resource Resources are VCS objects that correspond to hardware or software components, such as the application, the networking components, and the storage components. VCS controls resources through these actions: • Bringing a resource online (starting) • Taking a resource offline (stopping) • Monitoring a resource (probing) Resource Categories • Persistent – None VCS can only monitor persistent resources—they cannot be brought online or taken offline. The most common example of a persistent resource is a network interface card (NIC), because it must be present but cannot be stopped. FileNone and ElifNone are other examples. – On-only VCS brings the resource online if required, but does not stop it if the associated service group is taken offline. NFS daemons are examples of on-only resources. FileOnOnly is another on-only example. • Nonpersistent, also known as on-off Most resources fall into this category, meaning that VCS brings them online and takes them offline as required. Examples are Mount, IP, and Process. FileOnOff is an example of a test version of this resource. Definition of a Resource Resources are VCS objects that correspond to the hardware or software components of an application service. Each resource must have a unique name throughout the cluster. Choosing names that reflect the service group name makes it easy to identify all resources in that group, for example, WebIP in the WebSG group. Resources are always contained within service groups. Resource categories include: – Persistent None (NIC) On-only (NFS) – Nonpersistent On-off (Mount)
37.
Lesson 1 VCS
Building Blocks 1–11 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 Resource Dependencies Resources depend on other resources because of application or operating system requirements. Dependencies are defined to configure VCS for these requirements. Dependency Rules These rules apply to resource dependencies: • A parent resource depends on a child resource. In the diagram, the Mount resource (parent) depends on the Volume resource (child). This dependency illustrates the operating system requirement that a file system cannot be mounted without the Volume resource being available. • Dependencies are homogenous. Resources can only depend on other resources. • No cyclical dependencies are allowed. There must be a clearly defined starting point. Resource Dependencies Resources in a service group have a defined dependency relationship, which determines the online and offline order of the resource. A parent resource depends on a child resource. There is no limit to the number of parent and child resources. Persistent resources, such as NIC, cannot be parent resources. Dependencies cannot be cyclical. Parent/child Child Parent
38.
1–12 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Resource Attributes Resources attributes define the specific characteristics on individual resources. As shown in the slide, the resource attribute values for the sample resource of type Mount correspond to the UNIX command line to mount a specific file system. VCS uses the attribute values to run the appropriate command or system call to perform an operation on the resource. Each resource has a set of required attributes that must be defined in order to enable VCS to manage the resource. For example, the Mount resource on Solaris has four required attributes that must be defined for each resource of type Mount: • The directory of the mount point (MountPoint) • The device for the mount point (BlockDevice) • The type of file system (FSType) • The options for the fsck command (FsckOpt) The first three attributes are the values used to build the UNIX mount command shown in the slide. The FsckOpt attribute is used if the mount command fails. In this case, VCS runs fsck with the specified options (-y) and attempts to mount the file system again. Some resources also have additional optional attributes you can define to control how VCS manages a resource. In the Mount resource example, MountOpt is an optional attribute you can use to define options to the UNIX mount command. For example, if this is a read-only file system, you can specify -ro as the MountOpt value. Resource Attributes Resource attributes define an individual resource. The attribute values are used by VCS to manage the resource. Resources can have required and optional attributes, as specified by the resource type definition. mount –F vxfs /dev/vx/dsk/WebDG/WebVol /Webmount –F vxfs /dev/vx/dsk/WebDG/WebVol /Web WebMount resource WebMount resource SolarisSolaris
39.
Lesson 1 VCS
Building Blocks 1–13 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 Resource Types and Type Attributes Resources are classified by resource type. For example, disk groups, network interface cards (NICs), IP addresses, mount points, and databases are distinct types of resources. VCS provides a set of predefined resource types—some bundled, some add-ons—in addition to the ability to create new resource types. Individual resources are instances of a resource type. For example, you may have several IP addresses under VCS control. Each of these IP addresses individually is a single resource of resource type IP. A resource type can be thought of as a template that defines the characteristics or attributes needed to define an individual resource (instance) of that type. You can view the relationship between resources and resource types by comparing the mount command for a resource on the previous slide with the mount syntax on this slide. The resource type defines the syntax for the mount command. The resource attributes fill in the values to form an actual command line. Resource Types Resources are classified by type. The resource type specifies the attributes needed to define a resource of that type. For example, a Mount resource has different properties than an IP resource. mount [-F FSType] [options] block_device mount_pointmount [-F FSType] [options] block_device mount_point SolarisSolaris
40.
1–14 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Agents: How VCS Controls Resources Agents are processes that control resources. Each resource type has a corresponding agent that manages all resources of that resource type. Each cluster system runs only one agent process for each active resource type, no matter how many individual resources of that type are in use. Agents control resources using a defined set of actions, also called entry points. The four entry points common to most agents are: • Online: Resource startup • Offline: Resource shutdown • Monitor: Probing the resource to retrieve status • Clean: Killing the resource or cleaning up as necessary when a resource fails to be taken offline gracefully The difference between offline and clean is that offline is an orderly termination and clean is a forced termination. In UNIX, this can be thought of as the difference between exiting an application and sending the kill -9 command to the process. Each resource type needs a different way to be controlled. To accomplish this, each agent has a set of predefined entry points that specify how to perform each of the four actions. For example, the startup entry point of the Mount agent mounts a block device on a directory, whereas the startup entry point of the IP agent uses the ifconfig command to set the IP address on a unique IP alias on the network interface. VCS provides both predefined agents and the ability to create custom agents. Agents have one or more entry points that perform a set of actions on resources. Each system runs one agent for each active resource type. Agents: How VCS Controls Resources Each resource type has a corresponding agent process that manages all resources of that type. online offline monitor clean NIC eri0 IP 10.1.2.3 Mount /web /log Volume WebVol logVol Disk Group WebDG
41.
Lesson 1 VCS
Building Blocks 1–15 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 Using the VERITAS Cluster Server Bundled Agents Reference Guide The VERITAS Cluster Server Bundled Agents Reference Guide describes the agents that are provided with VCS and defines the required and optional attributes for each associated resource type. Excerpts of the definitions for the NIC, Mount, and Process resource types are included in the “Job Aids” appendix. VERITAS also provides a set of agents that are purchased separately from VCS, known as enterprise agents. Some examples of enterprise agents are: • Oracle • NetBackup • Informix • iPlanet Select the Agents and Options link on the VERITAS Cluster Server page at www.veritas.com for a complete list of agents available for VCS. To obtain PDF versions of product documentation for VCS and agents, see the Support Web site at http://support.veritas.com. Using the VERITAS Cluster Server Bundled Agents Reference Guide Solaris HP-UXAIX Linux The VERITAS Cluster Server Bundled Agents Reference Guide defines all VCS resource types for all bundled agents. See http://support.veritas.com for product documentation. The VERITAS Cluster Server Bundled Agents Reference Guide defines all VCS resource types for all bundled agents. See http://support.veritas.com for product documentation.
42.
1–16 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Cluster Communication VCS requires a cluster communication channel between systems in a cluster to serve as the cluster interconnect. This communication channel is also sometimes referred to as the private network because it is often implemented using a dedicated Ethernet network. VERITAS recommends that you use a minimum of two dedicated communication channels with separate infrastructures—for example, multiple NICs and separate network hubs—to implement a highly available cluster interconnect. Although recommended, this configuration is not required. The cluster interconnect has two primary purposes: • Determine cluster membership: Membership in a cluster is determined by systems sending and receiving heartbeats (signals) on the cluster interconnect. This enables VCS to determine which systems are active members of the cluster and which systems are joining or leaving the cluster. In order to take corrective action on node failure, surviving members must agree when a node has departed. This membership needs to be accurate and coordinated among active members—nodes can be rebooted, powered off, faulted, and added to the cluster at any time. • Maintain a distributed configuration: Cluster configuration and status information for every resource and service group in the cluster is distributed dynamically to all systems in the cluster. Cluster communication is handled by the Group Membership Services/Atomic Broadcast (GAB) mechanism and the Low Latency Transport (LLT) protocol, as described in the next sections. Cluster Communication The cluster interconnect serves to: Determine which systems are members of the cluster using a heartbeat mechanism. Maintain a single view of the status of the cluster configuration on all systems in the cluster membership. A cluster interconnect provides a communication channel between cluster nodes.
43.
Lesson 1 VCS
Building Blocks 1–17 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 Low-Latency Transport VERITAS uses a high-performance, low-latency protocol for cluster communications. LLT is designed for the high-bandwidth and low-latency needs of not only VERITAS Cluster Server, but also VERITAS Cluster File System, in addition to Oracle Cache Fusion traffic in Oracle RAC configurations. LLT runs directly on top of the Data Link Provider Interface (DLPI) layer over Ethernet and has several major functions: • Sending and receiving heartbeats over network links • Monitoring and transporting network traffic over multiple network links to every active system • Balancing cluster communication load over multiple links • Maintaining the state of communication • Providing a nonroutable transport mechanism for cluster communications Low-Latency Transport (LLT) LLT LLT LLT: Is responsible for sending heartbeat messages Transports cluster communication traffic to every active system Balances traffic load across multiple network links Maintains the communication link state Is a nonroutable protocol Runs on an Ethernet network
44.
1–18 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Group Membership Services/Atomic Broadcast (GAB) GAB provides the following: • Group Membership Services: GAB maintains the overall cluster membership by way of its Group Membership Services function. Cluster membership is determined by tracking the heartbeat messages sent and received by LLT on all systems in the cluster over the cluster interconnect. Heartbeats are the mechanism VCS uses to determine whether a system is an active member of the cluster, joining the cluster, or leaving the cluster. If a system stops sending heartbeats, GAB determines that the system has departed the cluster. • Atomic Broadcast: Cluster configuration and status information are distributed dynamically to all systems in the cluster using GAB’s Atomic Broadcast feature. Atomic Broadcast ensures all active systems receive all messages for every resource and service group in the cluster. Group Membership Services/Atomic Broadcast (GAB) GAB: Performs two functions: – Manages cluster membership; referred to as GAB membership – Sends and receives atomic broadcasts of configuration information Is a proprietary broadcast protocol Uses LLT as its transport mechanism LLTLLT GAB LLT GAB
45.
Lesson 1 VCS
Building Blocks 1–19 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 The Fencing Driver The fencing driver prevents multiple systems from accessing the same Volume Manager-controlled shared storage devices in the event that the cluster interconnect is severed. In the example of a two-node cluster displayed in the diagram, if the cluster interconnect fails, each system stops receiving heartbeats from the other system. GAB on each system determines that the other system has failed and passes the cluster membership change to the fencing module. The fencing modules on both systems contend for control of the disks according to an internal algorithm. The losing system is forced to panic and reboot. The winning system is now the only member of the cluster, and it fences off the shared data disks so that only systems that are still part of the cluster membership (only one system in this example) can access the shared storage. The winning system takes corrective action as specified within the cluster configuration, such as bringing service groups online that were previously running on the losing system. The Fencing Driver Fencing: Monitors GAB to detect cluster membership changes Ensures a single view of cluster membership Prevents multiple nodes from accessing the same Volume Manager 4.x shared storage devices LLT GAB Fence Fence LLT GAB Reboot
46.
1–20 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. The High Availability Daemon The VCS engine, also referred to as the high availability daemon (had), is the primary VCS process running on each cluster system. HAD tracks all changes in cluster configuration and resource status by communicating with GAB. HAD manages all application services (by way of agents) whether the cluster has one or many systems. Building on the knowledge that the agents manage individual resources, you can think of HAD as the manager of the agents. HAD uses the agents to monitor the status of all resources on all nodes. This modularity between had and the agents allows for efficiency of roles: • HAD does not need to know how to start up Oracle or any other applications that can come under VCS control. • Similarly, the agents do not need to make cluster-wide decisions. This modularity allows a new application to come under VCS control simply by adding a new agent—no changes to the VCS engine are required. On each active cluster system, HAD updates all the other cluster systems of changes to the configuration or status. In order to ensure that the had daemon is highly available, a companion daemon, hashadow, monitors had and if had fails, hashadow attempts to restart it. Likewise, had restarts hashadow if hashadow stops. The High Availability Daemon (HAD) The VCS engine, the high availability daemon: – Runs on each system in the cluster – Maintains configuration and state information for all cluster resources – Manages all agents The hashadow daemon monitors HAD. HAD hashadow LLT GAB Fence
47.
Lesson 1 VCS
Building Blocks 1–21 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 Comparing VCS Communication Protocols and TCP/IP To illustrate the suitability and use of GAB and LLT for VCS communications, compare GAB running over LLT with TCP/IP, the standard public network protocols. GAB Versus TCP GAB is a multipoint-to-multipoint broadcast protocol; all systems in the cluster send and receive messages simultaneously. TCP is a point-to-point protocol. GAB Versus UDP GAB also differs from UDP, another broadcast protocol. UDP is a fire-and-forget protocol—it merely sends the packet and assumes it is received. GAB, however, checks and guarantees delivery of transmitted packets, because it requires broadcasts to all nodes including the originator. LLT Versus IP LLT is driven by GAB, has specific targets in its domain and assumes constant connection between servers, known as a connection-oriented protocol. IP is a connectionless protocol— it assumes that packets can take different paths to reach the same destination. Comparing VCS Communication Protocols and TCP/IP HAD hashadow LLT GAB iPlanet NIC TCP IP NIC User Processes Kernel Processes Hardware
48.
1–22 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Maintaining the Cluster Configuration HAD maintains configuration and state information for all cluster resources in memory on each cluster system. Cluster state refers to tracking the status of all resources and service groups in the cluster. When any change to the cluster configuration occurs, such as the addition of a resource to a service group, HAD on the initiating system sends a message to HAD on each member of the cluster by way of GAB atomic broadcast, to ensure that each system has an identical view of the cluster. Atomic means that all systems receive updates, or all systems are rolled back to the previous state, much like a database atomic commit. The cluster configuration in memory is created from the main.cf file on disk in the case where HAD is not currently running on any cluster systems, so there is no configuration in memory. When you start VCS on the first cluster system, HAD builds the configuration in memory on that system from the main.cf file. Changes to a running configuration (in memory) are saved to disk in main.cf when certain operations occur. These procedures are described in more detail later in the course. Maintaining the Cluster Configuration HAD maintains a replica of the cluster configuration in memory on each system. Changes to the configuration are broadcast to HAD on all systems simultaneously by way of GAB using LLT. The configuration is preserved on disk in the main.cf file. HAD main.cf hashadow HAD hashadow
49.
Lesson 1 VCS
Building Blocks 1–23 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 VCS Configuration Files Configuring VCS means conveying to VCS the definitions of the cluster, service groups, resources, and resource dependencies. VCS uses two configuration files in a default configuration: • The main.cf file defines the entire cluster, including cluster name, systems in the cluster, and definitions of service groups and resources, in addition to service group and resource dependencies. • The types.cf file defines the resource types. Additional files similar to types.cf may be present if agents have been added. For example, if the Oracle enterprise agent is added, a resource types file, such as OracleTypes.cf, is also present. The cluster configuration is saved on disk in the /etc/VRTSvcs/conf/ config directory, so the memory configuration can be re-created after systems are restarted. Note: The VCS installation utility creates the $VCS_CONF environment variable containing the /etc/VRTSvcs path. The short path to the configuration directory is $VCS_CONF/conf/config. VCS Configuration Files include "types.cf" cluster vcs ( UserNames = { admin = ElmElgLimHmmKumGlj } Administrators = { admin } CounterInterval = 5 ) system S1 ( ) system S2 ( ) group WebSG ( SystemList = { S1 = 0, S2 = 1 } ) Mount WebMount ( MountPoint = "/web" BlockDevice = "/dev/vx/dsk/WebDG/WebVol" FSType = vxfs FsckOpt = "-y" ) main.cf A simple text file is used to store the cluster configuration on disk. The file contents are described in detail later in the course. A simple text file is used to store the cluster configuration on disk. The file contents are described in detail later in the course.
50.
1–24 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. VCS Architecture The slide shows how the major components of the VCS architecture work together to manage application services. How does VCS know what to fail over? Each cluster system has its own copy of configuration files, libraries, scripts, daemons, and executable programs that are components of VCS. Cluster systems share a common view of the cluster configuration. An application service consists of all the resources that the application requires in order to run, including the application itself, and networking and storage resources. This application service provides the structure for a service group, which is the unit of failover. Dependencies define whether a resource or service group failure impacts other resources or service groups. Dependencies also define the order VCS brings service groups and resources online or takes them offline. How does VCS know when to fail over? Agents communicate the status of resources to HAD, the VCS engine. The agents alert the engine when a resource has faulted. The VCS engine determines what to do and initiates any necessary action. VCS Architecture Agents monitor resources on each system and provide status to HAD on the local system. HAD on each system sends status information to GAB. GAB broadcasts configuration information to all cluster members. LLT transports all cluster communications to all cluster nodes. HAD on each node takes corrective action, such as failover, when necessary.
51.
Lesson 1 VCS
Building Blocks 1–25 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 Supported Failover Configurations The following examples illustrate the wide variety of failover configurations supported by VCS. Active/Passive In this configuration, an application runs on a primary or master server. A dedicated redundant server is present to take over on any failover. The redundant server is not configured to perform any other functions. The redundant server is on standby with full performance capability. The next examples show types of active/passive configurations: Active/Passive Before Failover After Failover
52.
1–26 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. N-to-1 This configuration reduces the cost of hardware redundancy while still providing a dedicated spare. One server protects multiple active servers, on the theory that simultaneous multiple failures are unlikely. This configuration is used when shared storage is limited by the number of servers that can attach to it and requires that after the faulted system is repaired, the original configuration is restored. Active/Passive N-to-1 Before Failover After Failover
53.
Lesson 1 VCS
Building Blocks 1–27 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 N + 1 When more than two systems can connect to the same shared storage, as in a SAN environment, a single dedicated redundant server is no longer required. When a server fails in this environment, the application service restarts on the spare. Unlike the N-to-1 configuration, after the failed server is repaired, it can then become the redundant server. Before Failover After Repair Active/Passive N + 1 After Failover
54.
1–28 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Active/Active In an active/active configuration, each server is configured to run a specific application service, as well as to provide redundancy for its peer. In this configuration, hardware usage appears to be more efficient because there are no standby servers. However, each server must be robust enough to run multiple application services, increasing the per-server cost up front. Active/Active Before Failover After Failover
55.
Lesson 1 VCS
Building Blocks 1–29 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 1 N-to-N This configuration is an active/active configuration that supports multiple application services running on multiple servers. Each application service is capable of being failed over to different servers in the cluster. Careful testing is required to ensure that all application services are compatible to run with other application services that may fail over to the same server. N-to-N Before Failover After Failover
56.
1–30 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Summary This lesson introduced the basic VERITAS Cluster Server terminology and gave an overview of VCS architecture and supporting communication mechanisms. Next Steps Your understanding of basic VCS functions enables you to prepare your site for installing VCS. Additional Resources • High Availability Design Using VERITAS Cluster Server This course will be available in the future from VERITAS Education if you are interested in developing custom agents or learning more about high availability design considerations for VCS environments. • VERITAS Cluster Server Bundled Agents Reference Guide This guide describes each bundled agent in detail. • VERITAS Cluster Server User’s Guide This guide provides detailed information on procedures and concepts for configuring and managing VCS clusters. Lesson Summary Key Points – HAD is the primary VCS process, which manages resources by way of agents. – Resources are organized into service groups. – Each system in a cluster has an identical view of the state of resources and service groups. Reference Materials – High Availability Design Using VERITAS Cluster Server course – VERITAS Cluster Server Bundled Agents Reference Guide – VERITAS Cluster Server User’s Guide
57.
Lesson 2 Preparing a
Site for VCS
58.
2–2 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Introduction Overview This lesson describes guidelines and considerations for planning to deploy VERITAS Cluster Server (VCS). You also learn how to prepare your site for installing VCS. Importance Before you install VERITAS Cluster Server, you must prepare your environment to meet the requirements needed to implement a cluster. By following these guidelines, you can ensure that your system hardware and software are configured to install VCS. Lesson Introduction Lesson 1: VCS Building Blocks Lesson 2: Preparing a Site for VCS Lesson 3: Installing VCS Lesson 4: VCS Operations Lesson 5: Preparing Services for VCS Lesson 6: VCS Configuration Methods Lesson 7: Online Configuration of Service Groups Lesson 8: Offline Configuration of Service Groups Lesson 9: Sharing Network Interfaces Lesson 10: Configuring Notification Lesson 11: Configuring VCS Response to Faults Lesson 12: Cluster Communications Lesson 13: System and Communication Faults Lesson 14: I/O Fencing Lesson 15: Troubleshooting
59.
Lesson 2 Preparing
a Site for VCS 2–3 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 2 Outline of Topics • Planning for Implementation • Hardware Requirements and Recommendations • Software Requirements and Recommendations • Preparing Cluster Information Collect cluster design information to prepare for installation. Preparing Cluster Information Describe general VCS software requirements. Software Requirements and Recommendations Describe general VCS hardware requirements. Hardware Requirements and Recommendations Plan for VCS implementation.Planning for Implementation After completing this lesson, you will be able to: Topic Lesson Topics and Objectives
60.
2–4 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Planning for Implementation Implementation Needs Confirm Technical Personnel Availability Verify that you have identified the key internal personnel required for deployment and ensure that they are available as needed. Also, consider including other IT staff who will be involved in ongoing maintenance of the cluster. The deployment phase is an opportunity for transferring knowledge about how to manage applications and cluster services. Confirm System and Site Access Consider site security and equipment access: • What is the time window allowed for deployment? • When will you have access to the systems? • Is there special security in the server room that you need to be aware of? • Which user name and password will you use to obtain access to the systems? Consider that you will need initial access to systems for verification purposes prior to the onset of implementation. Implementation Needs Access to staffing resources, as required – Network, system, and application administrators required for configuration and testing – Future cluster operators and administrators who should be involved in deployment in preparation for managing the cluster Physical access to the equipment in accordance with security policy Access to support resources, such as VERITAS, operating system, application vendor telephone, and Web sites
61.
Lesson 2 Preparing
a Site for VCS 2–5 Copyright © 2005 VERITAS Software Corporation. All rights reserved. 2 The Implementation Plan VCS installation, configuration, and testing has an impact on running application services and operations. When preparing for VCS installation and configuration, develop an implementation plan that takes into account how VERITAS products can be installed with minimal impact on the services already running. You can use an implementation plan to: • Describe any actions necessary to prepare the environment for VCS installation. • Describe the impacts on staff and services during the implementation. • Determine how to minimize the time period during which services are not available. • Determine the impact of clustering application services on operational procedures. For example, applications under VCS control should no longer be stopped or started without taking VCS into consideration, which may impact the way backups are taken on a server. VERITAS recommends that you prepare a detailed design worksheet to be used during VCS installation and configuration if you are not provided with a completed worksheet resulting from the design phase. A sample design worksheet is provided for the deployment tasks that are carried out during this course. The Implementation Plan • Prepare a plan stating the impact of VCS implementation on running services and operations. For example, you may need to add network interfaces, patch the operating system, or upgrade applications. • Determine how to minimize downtime for existing services, taking into consideration the time needed for operational testing. • Plan any actions necessary to prepare the environment for VCS installation as described throughout this lesson. Consider how these activities may affect running services. • Prepare or complete a design worksheet that is used during VCS installation and configuration, if this worksheet is not provided.
62.
2–6 VERITAS Cluster
Server for UNIX, Fundamentals Copyright © 2005 VERITAS Software Corporation. All rights reserved. Using the Design Worksheet This course assumes that you are given a completed design worksheet, which you can use to prepare the site for VCS installation and deployment. As you configure your cluster environment in preparation for installation, verify that the information in the design worksheet is accurate and complete. If you are not provided with a completed design worksheet, you can use the site preparation phase as an opportunity to record information in a new worksheet. You can then use this worksheet later when you are installing VCS. Cluster Definition Value Cluster Name vcs Required Attributes UserNames admin=password ClusterAddress 192.168.3.91 Administrators admin System Definition Value System S1 System S2 Using the Design Worksheet S1 S2 Validate the design worksheet as you prepare the site. Validate the design worksheet as you prepare the site. adminAdministrators 192.168.3.91ClusterAddress admin=passwordUserNames Required Attributes vcsCluster Name ValueCluster Definition S1System S2System ValueSystem Definition
Descargar ahora