VCS 5.1 Admin guide for AIX.pdf - Veritasu2122 Cluster...

This preview shows page 1 out of 734 pages.

Unformatted text preview: Veritas™ Cluster Server Administrator’s Guide AIX 5.1 2 Veritas Cluster Server Administrator’s Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: 5.1 Document version: 5.1.0 Legal Notice Copyright © 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Veritas and Veritas Storage Foundation are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 3 Technical Support Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec’s maintenance offerings include the following: ■ A range of support options that give you the flexibility to select the right amount of service for any size organization ■ Telephone and Web-based support that provides rapid response and up-to-the-minute information ■ Upgrade assurance that delivers automatic software upgrade protection ■ Global support that is available 24 hours a day, 7 days a week Advanced features, including Account Management Services For information about Symantec’s Maintenance Programs, you can visit our Web site at the following URL: ■ Contacting Technical Support Customers with a current maintenance agreement may access Technical Support information at the following URL: Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: ■ Product release level ■ Hardware information ■ Available memory, disk space, and NIC information ■ Operating system ■ Version and patch level ■ Network topology ■ Router, gateway, and IP address information ■ Problem description: 4 ■ ■ ■ Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration If your Symantec product requires registration or a license key, access our non-technical support Web page at the following URL: customercare.symantec.com Customer service Customer Care information is available at the following URL: customercare.symantec.com Customer Service is available to assist with the following types of issues: ■ Questions regarding product licensing or serialization ■ Product registration updates, such as address or name changes ■ General product information (features, language availability, local dealers) ■ Latest information about product updates and upgrades ■ Information about upgrade assurance and maintenance contracts ■ Information about the Symantec Buying Programs ■ Advice about Symantec's technical support options ■ Nontechnical presales questions ■ Issues that are related to CD-ROMs or manuals Documentation feedback Your feedback on product documentation is important to us. Send suggestions for improvements and reports on errors or omissions. Include the title and document version (located on the second page), and chapter and section titles of the text on which you are reporting. Send feedback to: [email protected] 5 Maintenance agreement resources If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: Asia-Pacific and Japan [email protected] Europe, Middle-East, and Africa [email protected] North America and Latin America [email protected] Additional enterprise services Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively. Enterprise services that are available include the following: Symantec Early Warning Solutions These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur. Managed Security Services These services remove the burden of managing and monitoring security devices and events, ensuring rapid response to real threats. Consulting Services Symantec Consulting Services provide on-site technical expertise from Symantec and its trusted partners. Symantec Consulting Services offer a variety of prepackaged and customizable options that include assessment, design, implementation, monitoring, and management capabilities. Each is focused on establishing and maintaining the integrity and availability of your IT resources. Educational Services Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs. To access more information about Enterprise services, please visit our Web site at the following URL: Select your country or language from the site index. 6 Contents Section I Clustering concepts and terminology Chapter 1 Introducing Veritas Cluster Server What is a VCS cluster? ........................................................................................18 Can my application be clustered? ......................................................................20 Physical components of VCS ..............................................................................22 Logical components of VCS ................................................................................23 Putting the pieces together ................................................................................35 Chapter 2 About cluster topologies Basic failover configurations .............................................................................38 Advanced failover configurations .....................................................................42 Cluster topologies and storage configurations ...............................................45 Chapter 3 VCS configuration concepts About configuring VCS .......................................................................................52 About the VCS configuration language ............................................................52 About the main.cf file ..........................................................................................53 The types.cf file ....................................................................................................55 About VCS attributes ...........................................................................................57 About VCS keywords and reserved words ........................................................61 VCS environment variables ................................................................................62 Section II Administration-Putting VCS to work Chapter 4 About the VCS user privilege model About VCS user privileges and roles .................................................................72 How administrators assign roles to users ........................................................75 User privileges for OS user groups for clusters running in secure mode ...76 About VCS privileges for users with multiple roles .......................................77 8 Contents Chapter 5 Administering the cluster from Cluster Manager (Java console) About the Cluster Manager (Java Console) ...................................................... 80 Getting started ..................................................................................................... 81 Reviewing components of the Java Console .................................................... 84 About Cluster Monitor ........................................................................................ 86 About Cluster Explorer ....................................................................................... 92 Accessing additional features of the Java Console ....................................... 104 Administering Cluster Monitor ....................................................................... 112 Administering user profiles ............................................................................. 117 Administering service groups ......................................................................... 121 Administering resources .................................................................................. 143 Administering systems ..................................................................................... 163 Administering clusters ..................................................................................... 165 Executing commands ........................................................................................ 166 Editing attributes ............................................................................................... 167 Querying the cluster configuration ................................................................ 169 Setting up VCS event notification using the Notifier wizard ..................... 170 Administering logs ............................................................................................ 173 Administering VCS Simulator ......................................................................... 177 Chapter 6 Administering the cluster from the command line About administering VCS from the command line ...................................... 180 Installing a VCS license .................................................................................... 185 Administering LLT ............................................................................................ 187 Starting VCS ....................................................................................................... 190 Stopping VCS ...................................................................................................... 192 Logging on to VCS ............................................................................................. 196 Managing VCS configuration files .................................................................. 198 Managing VCS users from the command line ............................................... 207 Querying VCS ..................................................................................................... 210 Administering service groups ......................................................................... 217 Administering agents ........................................................................................ 223 Administering resources .................................................................................. 224 Administering systems ..................................................................................... 231 Administering clusters ..................................................................................... 232 Enabling and disabling Security Services ...................................................... 237 Administering resource types ......................................................................... 239 Using the -wait option in scripts ..................................................................... 241 Running HA fire drills ....................................................................................... 243 Administering simulated clusters from the command line ........................ 244 Contents Chapter 7 Configuring applications and resources in VCS About configuring resources and applications .............................................246 About VCS bundled agents ...............................................................................246 Configuring the RemoteGroup agent ..............................................................251 Configuring NFS service groups ......................................................................254 Configuring the Coordination Point agent ....................................................263 Testing resource failover using HA fire drills ...............................................263 Chapter 8 Predicting VCS behavior using VCS Simulator About VCS Simulator ........................................................................................266 Simulator ports ..................................................................................................266 Administering VCS Simulator from the Java Console .................................267 Administering VCS Simulator from the command line ...............................274 Section III VCS communication and operations Chapter 9 About communications, membership, and data protection in the cluster About cluster communications ........................................................................282 About cluster membership ...............................................................................286 About membership arbitration ........................................................................289 About data protection .......................................................................................307 Examples of VCS operation with I/O fencing ................................................308 About cluster membership and data protection without I/O fencing .......318 Examples of VCS operation without I/O fencing ..........................................320 Summary of best practices for cluster communications .............................325 Chapter 10 Administering I/O fencing About administering I/O fencing ....................................................................328 About the vxfentsthdw utility ..........................................................................328 About the vxfenadm utility ..............................................................................336 About the vxfenclearpre utility .......................................................................340 About the vxfenswap utility .............................................................................341 Administering the coordination point server ...............................................349 Chapter 11 Controlling VCS behavior About VCS behavior on resource faults ..........................................................362 Controlling VCS behavior at the service group level ...................................365 Controlling VCS behavior at the resource level ............................................373 Changing agent file paths and binaries ..........................................................386 9 10 Contents VCS behavior on loss of storage connectivity ............................................... 387 Service group workload management ............................................................ 390 Sample configurations depicting workload management .......................... 393 Chapter 12 The role of service group dependencies About service group dependencies ................................................................. 410 Service group dependency configurations .................................................... 415 Group Dependency FAQs .................................................................................. 423 Linking service groups ...................................................................................... 424 VCS behavior with service group dependencies ........................................... 424 Section IV Administration-Beyond the basics Chapter 13 VCS event notification About VCS event notification .......................................................................... 430 Components of VCS event notification .......................................................... 432 VCS events and traps ........................................................................................ 435 Monitoring aggregate events ........................................................................... 443 Detecting complementary events ................................................................... 444 Configuring notification ................................................................................... 444 Chapter 14 VCS event triggers About VCS event triggers ................................................................................. 446 Using event triggers .......................................................................................... 446 List of event triggers ......................................................................................... 447 Section V Cluster configurations for disaster recovery Chapter 15 Connecting clusters–Creating global clusters How VCS global clusters work ......................................................................... 466 VCS global clusters: The building blocks ....................................................... 467 Prerequisites for global clusters ..................................................................... 474 About setting up global clusters ...................................................................... 476 Setting up a global cluster ................................................................................ 478 When a cluster faults ........................................................................................ 489 Setting up a fire drill ......................................................................................... 492 Multi-tiered application support using the RemoteGroup agent in a global environment ............................................................................................... 499 Test scenario for a multi-tiered environment ............................................... 501 Contents Chapter 16 Administering global clusters from Cluster Manager (Java console) About global clusters .........................................................................................508 Adding a remote cluster .................................
View Full Document

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture