VCS 5.1 Installation guide for AIX.pdf - Veritasu2122...

This preview shows page 1 out of 436 pages.

Unformatted text preview: Veritas™ Cluster Server Installation Guide AIX 5.1 Veritas Cluster Server Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: 5.1 Document version: 5.1.1 Legal Notice Copyright © 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Veritas and Veritas Storage Foundation are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 Technical Support Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec’s maintenance offerings include the following: ■ A range of support options that give you the flexibility to select the right amount of service for any size organization ■ Telephone and Web-based support that provides rapid response and up-to-the-minute information ■ Upgrade assurance that delivers automatic software upgrade protection ■ Global support that is available 24 hours a day, 7 days a week ■ Advanced features, including Account Management Services For information about Symantec’s Maintenance Programs, you can visit our Web site at the following URL: Contacting Technical Support Customers with a current maintenance agreement may access Technical Support information at the following URL: Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: ■ Product release level ■ Hardware information ■ Available memory, disk space, and NIC information ■ Operating system ■ Version and patch level ■ Network topology ■ Router, gateway, and IP address information ■ Problem description: ■ Error messages and log files ■ Troubleshooting that was performed before contacting Symantec ■ Recent software configuration changes and network changes Licensing and registration If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: customercare.symantec.com Customer service Customer service information is available at the following URL: Customer Service is available to assist with the following types of issues: ■ Questions regarding product licensing or serialization ■ Product registration updates, such as address or name changes ■ General product information (features, language availability, local dealers) ■ Latest information about product updates and upgrades ■ Information about upgrade assurance and maintenance contracts ■ Information about the Symantec Buying Programs ■ Advice about Symantec's technical support options ■ Nontechnical presales questions ■ Issues that are related to CD-ROMs or manuals Documentation feedback Your feedback on product documentation is important to us. Send suggestions for improvements and reports on errors or omissions. Include the title and document version (located on the second page), and chapter and section titles of the text on which you are reporting. Send feedback to: [email protected] Maintenance agreement resources If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: Asia-Pacific and Japan [email protected] Europe, Middle-East, and Africa [email protected] North America and Latin America [email protected] Additional enterprise services Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively. Enterprise services that are available include the following: Symantec Early Warning Solutions These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur. Managed Security Services These services remove the burden of managing and monitoring security devices and events, ensuring rapid response to real threats. Consulting Services Symantec Consulting Services provide on-site technical expertise from Symantec and its trusted partners. Symantec Consulting Services offer a variety of prepackaged and customizable options that include assessment, design, implementation, monitoring, and management capabilities. Each is focused on establishing and maintaining the integrity and availability of your IT resources. Educational Services Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs. To access more information about Enterprise services, please visit our Web site at the following URL: Select your country or language from the site index. Contents Technical Support ............................................................................................... 4 Section 1 Installation overview and planning .................. 19 Chapter 1 Introducing VCS ................................................................... 21 About Veritas Cluster Server .......................................................... About VCS basics ......................................................................... About multiple nodes .............................................................. About shared storage .............................................................. About LLT and GAB ................................................................ About network channels for heartbeating ................................... About preexisting network partitions ........................................ About VCS seeding ................................................................. About Veritas product licensing ...................................................... About VCS features ...................................................................... About Veritas Operations Services ............................................ About VCS notifications .......................................................... About global clusters .............................................................. About I/O fencing ................................................................... About VCS optional components .................................................... About Symantec Product Authentication Service (AT) ................... About Cluster Manager (Java Console) ........................................ About Veritas Cluster Server Management Console ...................... About VCS Simulator .............................................................. Chapter 2 21 21 22 23 23 24 24 24 25 26 27 27 28 28 29 29 30 30 30 Planning to install VCS ....................................................... 33 VCS installation requirements ........................................................ Hardware requirements .......................................................... Supported AIX operating systems ............................................. Required AIX patches for VCS .................................................. Required Solaris patches for VCS .............................................. Supported software ................................................................ I/O fencing requirements ........................................................ VCS installation methods .............................................................. 33 33 35 35 35 36 36 39 8 Contents About the VCS installation program .......................................... About the Web-based installer .................................................. About response files ............................................................... Typical VCS cluster setup models .................................................... 40 42 43 44 Section 2 Preinstallation tasks .................................................. 49 Chapter 3 Preparing to install VCS ..................................................... 51 About preparing to install VCS ....................................................... 51 Performing preinstallation tasks ..................................................... 51 Obtaining VCS license keys ...................................................... 52 Setting up the private network ................................................. 53 Setting up inter-system communication ..................................... 55 Setting up shared storage ........................................................ 56 Setting the PATH variable ....................................................... 59 Setting the MANPATH variable ................................................ 59 Optimizing LLT media speed settings on private NICs ................... 60 Guidelines for setting the media speed of the LLT interconnects .................................................................. 60 Mounting the product disc ....................................................... 60 Performing automated preinstallation check ............................... 62 Reformatting VCS configuration files on a stopped cluster ............. 62 Getting your VCS installation and configuration information ready ................................................................................... 63 Section 3 Installation using the script-based installer ........................................................................ 69 Chapter 4 Installing VCS ....................................................................... 71 Installing VCS using the installer .................................................... 71 Chapter 5 Preparing to configure VCS ............................................... 77 Preparing to configure the clusters in secure mode ............................ Installing the root broker for the security infrastructure ............... Creating authentication broker accounts on root broker system ........................................................................... Creating encrypted files for the security infrastructure ................. Preparing the installation system for the security infrastructure ................................................................. About configuring VCS clusters for data integrity .............................. 77 81 82 83 85 86 Contents About I/O fencing components ................................................. 87 About I/O fencing configuration files ......................................... 88 About planning to configure I/O fencing ..................................... 91 Setting up the CP server ................................................................ 96 Installing the CP server using the installer ................................. 97 Configuring security on the CP server ........................................ 98 Setting up shared storage for the CP server database .................... 99 Configuring the CP server using the configuration utility .............. 99 Configuring the CP server manually ......................................... 106 Verifying the CP server configuration ...................................... 108 Chapter 6 Configuring VCS ................................................................. 109 Overview of tasks for VCS configuration using installvcs program ............................................................................. Starting the software configuration ............................................... Specifying systems for configuration ............................................. Configuring the basic cluster ........................................................ Configuring the virtual IP of the cluster .......................................... Configuring the cluster in secure mode ........................................... Adding VCS users ....................................................................... Configuring SMTP email notification ............................................. Configuring SNMP trap notification ............................................... Configuring global clusters .......................................................... Completing the VCS configuration ................................................. Verifying and updating licenses on the system ................................. Checking licensing information on the system ........................... Updating product licenses using vxlicinst ................................. Chapter 7 109 110 111 111 113 115 119 119 121 123 124 125 125 126 Configuring VCS clusters for data integrity ................. 129 Setting up disk-based I/O fencing using installvcs program ................ Initializing disks as VxVM disks .............................................. Configuring disk-based I/O fencing using installvcs program ....................................................................... Checking shared disks for I/O fencing ...................................... Setting up server-based I/O fencing using installvcs program ............. Verifying security configuration on VCS cluster to use CP server coordination point ......................................................... Configuring server-based I/O fencing ....................................... 129 129 130 133 137 138 140 9 10 Contents Section 4 Installation using the Web-based installer ...................................................................... 149 Chapter 8 Installing VCS ..................................................................... 151 Before using the Veritas Web-based installer ................................... Starting the Veritas Web-based installer ......................................... Obtaining a security exception on Mozilla Firefox ............................ Performing a pre-installation check with the Veritas Web-based installer .............................................................................. Installing VCS with the Veritas Web-based installer .......................... Chapter 9 151 152 152 152 153 Configuring VCS ................................................................. 155 Configuring VCS using the web-based installer ................................ 155 Section 5 Installation using response files ....................... 159 Chapter 10 Performing automated VCS installation ....................... 161 Installing VCS using response files ................................................ 161 Response file variables to install VCS ............................................. 162 Sample response file for installing VCS .......................................... 164 Chapter 11 Performing automated VCS configuration ................... 167 Configuring VCS using response files ............................................. 167 Response file variables to configure VCS ......................................... 168 Sample response file for configuring VCS ....................................... 174 Chapter 12 Performing automated I/O fencing configuration for VCS ........................................................................... 177 Configuring I/O fencing using response files ................................... Response file variables to configure disk-based I/O fencing ................ Sample response file for configuring disk-based I/O fencing ............... Response file variables to configure server-based I/O fencing ............. Sample response file for configuring server-based I/O fencing ............ 177 178 179 180 182 Contents Section 6 Manual installation ................................................... 185 Chapter 13 Performing preinstallation tasks .................................... 187 Modifying /etc/pse.conf to enable the Ethernet driver ....................... 187 Preparing for a manual installation ............................................... 188 Requirements for installing VCS ................................................... 188 Chapter 14 Manually installing VCS ................................................... 189 About VCS manual installation ..................................................... Installing VCS software manually .................................................. Viewing the list of VCS filesets ................................................ Installing VCS filesets for a manual installation ......................... Adding a license key for a manual installation ........................... Copying the installation guide to each node ............................... Installing VCS using NIM and the installer ...................................... Preparing the bundle and script resources on NIM server ............ Installing VCS on the NIM client using SMIT ............................. Installing VCS and the operating system on the NIM client using SMIT ............................................................................ Installing VCS on an alternate disk ................................................ Preparing to install VCS on an alternate disk ............................. Installing VCS on an alternate disk .......................................... Verifying the installation ....................................................... Chapter 15 189 189 190 191 192 194 194 194 196 197 198 198 199 202 Manually configuring VCS ............................................... 205 Configuring LLT for a manual installation ....................................... 205 Setting up /etc/llthosts for a manual installation ........................ 206 Setting up /etc/llttab for a manual installation .......................... 206 LLT directives for a manual installation .................................... 206 Additional considerations for LLT for a manual installation ......... 207 Configuring GAB for...
View Full Document

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture