Implementing HP Serviceguard.pdf - Implementing HP Serviceguard A.11.20(H6487S Student Guide Rev 1.11 HP Restricted Implementing HP Serviceguard

Implementing HP Serviceguard.pdf - Implementing HP...

This preview shows page 1 out of 746 pages.

You've reached the end of your free preview.

Want to read all 746 pages?

Unformatted text preview: Implementing HP Serviceguard A.11.20 (H6487S) Student Guide Rev. 1.11 HP Restricted Implementing HP Serviceguard A.11.20 (H6487S) Student Guide Rev. 1.11 HP Restricted Use of this material to deliver training without prior written permission from HP is prohibited. Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. This is an HP copyrighted work that may not be reproduced without the written permission of HP. You may not use these materials to deliver training to any person outside of your organization without the written permission of HP. UNIX® is a registered trademark of The Open Group. Printed in US Implementing HP Serviceguard A.11.20 Student guide March 2011 HP Restricted — Contact HP Education for customer training materials. Contents Module 1 Introduction to High Availability Objectives ...................................................................................................1 1–1. Course Agenda ....................................................................................2 1–2. Additional Resources.............................................................................3 1–3. What Are the Risks?..............................................................................4 1–4. Reducing the Risk: Redundant Data .........................................................5 1–5. Disk Configurations...............................................................................6 1–6. Reducing the Risk: Asymmetric Clusters.....................................................7 1–7. Reducing the Risk: Minimizing Downtime ..................................................9 1–8. Reducing the Risk: Network Redundancy ............................................... 10 1–9. Multi-Network Environment ....................................................................11 1–10. Redundant LAN Cards....................................................................... 12 1–11. Redundant Hubs ................................................................................ 13 1–12. Redundant Routers............................................................................. 14 1–13. Redundant Client Networks ................................................................ 15 1–14. LAB: Hardware Inventory ................................................................... 16 Module 2 High Availability with Serviceguard Objectives ...................................................................................................1 2–1. Introducing Serviceguard .......................................................................2 2–2. High Availability with Serviceguard .........................................................4 2–3. Features and Benefits of Serviceguard......................................................6 2–4. How Serviceguard Works ......................................................................8 2–5. Serviceguard Packages..........................................................................9 2–6. Redistributing Application Packages....................................................... 10 2–7. Minimizing Planned Downtime ...............................................................11 2–8. Serviceguard Bundle/Products.............................................................. 12 2–9. HP Serviceguard Solutions.................................................................... 13 2–10. Serviceguard and Integrity VM............................................................ 14 2–11. Cluster File System ............................................................................. 15 2–12. Multi-Node Packages and Package Dependencies .................................. 17 2–13. Oracle RAC and CFS....................................................................... 18 2–14. Storage choices based on your priorities............................................... 19 2–15. SGeRAC and LVM MORE...................................................................20 2–16. System Management Homepage ......................................................... 21 2–17. Serviceguard Manager ...................................................................... 23 2–18. Serviceguard Storage Management Suite ............................................. 25 2–19. Metrocluster ..................................................................................... 26 Rev. 1.11 HP Restricted i Implementing HP Serviceguard A.11.20 (H6487S) 2–20. Continentalclusters ............................................................................ 28 2–21. Lab ................................................................................................. 29 Module 3 Storage for Serviceguard Objectives ...................................................................................................1 3–1. Serviceguard Disk Space Management Overview ......................................2 3-2. Boot and Root disk concepts....................................................................4 3-3. General disk concepts............................................................................5 3-4. Volume management in Serviceguard for HP-UX .........................................7 3–5. LUN, Disk, and DVD DSF Names for 11.31................................................9 3–6. Review of LVM Concepts...................................................................... 10 3–7. Configure a Shareable LVM Volume Group ............................................. 12 3–8. Step 1: Create LVM Resources on System A ............................................. 13 3–9. Step 2: Export Volume Group from System A ........................................... 16 3–10. Step 3: Import Volume Group to System B ............................................. 17 3–11. LVM Issues with Serviceguard .............................................................. 19 3–12. Common LVM Commands .................................................................. 21 3–13. LVM and VxVM Command Comparison................................................ 24 3–14. Configure a Shareable VxVM Disk Group............................................. 25 3–15. Step 1: Configure the rootdg ( no vg00 )............................................... 26 3–16. Step 1: Configure the rootdg (if vg00 already exists) ............................... 28 3–17. Step 2: Configure VxVM Disks.............................................................30 3–19. Step 3 : Configure VxVM Disk Group ................................................... 33 3–19. Step 4: Configure a VxVM Volume....................................................... 35 3–20. Step 5: Import / Deport the Disk Group on Node2 ................................38 3–21. CFS Filesystem ..................................................................................40 3–22. Which is better? It depends ................................................................ 42 3–23. For Further Study .............................................................................. 43 3–24. Labs ...............................................................................................44 Module 4 Cluster Concepts and Configuration Objectives ...................................................................................................1 4–1. Definition of a Cluster ............................................................................2 4–2. Major Components of a Cluster ..............................................................3 4–3. Network Interface Configuration .............................................................4 4–4. Cluster Lock Configuration Using LVM Disks ..............................................6 4–5. Cluster Lock Configuration Using a Quorum Server ....................................7 4–6. Quorum Server Redundancy...................................................................9 4–7. Cluster Lock Configuration using Lock LUN .............................................. 10 4–8. Lock LUN support for HP-UX ..................................................................11 4–9. Lock LUN rules ................................................................................... 12 4–10. Comparison..................................................................................... 13 4–11. Heartbeat Configuration ..................................................................... 14 4–12. cmcld Process ................................................................................. 16 4–13. Cluster Formation Requirements ........................................................... 17 ii HP Restricted Rev. 1.11 Contents 4–14. Steps to Configure a Cluster................................................................ 19 4–15. Step 1: Set Up Trusted Hosts................................................................ 21 4–16. Step 1: Build Cluster Configuration ASCII File......................................... 22 4–17. Cluster Management Options .............................................................. 26 4–18. Step 3: Compile and Distribute Binary File ............................................ 39 4–19. Step 4: Start the Serviceguard Daemons ...............................................44 4–20. Cluster Configuration Procedure..........................................................46 4–21. Viewing the Cluster — cmviewcl Command.........................................48 4–22. Checking the Cluster Log....................................................................50 LAB: Build a Cluster .................................................................................... 51 LAB: Create a Cluster using an LVM Cluster Lock Disk ....................................... 52 LAB: Convert the Cluster to Use a Quorum Server ............................................ 62 Module 5 Additional Cluster Features Objectives ...................................................................................................1 5–1. Additional Cluster Features .....................................................................2 5–2. Serviceguard Volume Groups .................................................................3 5–3. Marking Volume Groups for use in Serviceguard .......................................5 5–4. Exclusive Mode Volume Group Activation .................................................7 5–5. Cluster Formation and Reformations.........................................................8 5–6. Ways to Initially Form the Cluster ............................................................9 5–7. Node Failures and Node Joins.............................................................. 10 5–8. Cluster Reformation Example ................................................................ 12 5–9. Local LAN Card Failover - Normal Network Flow ..................................... 14 5–10. Local LAN Card Failover - Network Flow to Standby LAN Card ................ 15 5–11. Labs ................................................................................................ 16 5–13. LAB : Serviceguard Disks/Serviceguard Volume Groups .......................... 17 5–14. LAB: Exiting and Joining the Cluster .................................................... 21 5–15. LAB: Local LAN Card Failover ............................................................. 24 Module 6 Packages and Services Objectives ...................................................................................................1 6–1. Packaging Concepts..............................................................................2 6–2. Sample Package Configuration ...............................................................4 6–3. Sample Configuration after Node Failure .................................................5 6–4. Package Switching................................................................................7 6–5. Viewing Package Status (1) .....................................................................9 6–6. Viewing Package Status (2) .................................................................. 10 6–7. Package Owner and State.................................................................... 14 6–8. Modifying Package Status.................................................................... 17 6–9. Review Commands for Controlling a Cluster ............................................ 18 6–10. Configuration of Packages..................................................................20 6–11. Package Modules Types...................................................................... 21 6–12. Modularized Package Control Script..................................................... 22 6–13. Modularized Package Control File........................................................ 23 Rev. 1.11 HP Restricted iii Implementing HP Serviceguard A.11.20 (H6487S) 6–14. 6–15. 6–16. 6–17. 6–18. 6–19. 6–20. Package Configuration Procedure ........................................................ 24 Create the Package Configuration File .................................................. 26 Edit the Package Configuration File ...................................................... 36 Verify and Distribute the Binary File ...................................................... 37 Enhancements to cmapplyconf/cmcheckconf .........................................38 The Package Script Log File................................................................. 39 Lab ................................................................................................40 Module 7 Package Policies Objectives ...................................................................................................1 7–1. Package Policies ...................................................................................2 7–2. Package Type.......................................................................................5 7–3. Failover Policies....................................................................................7 7–4. FAILOVER_POLICY: CONFIGURED_NODE ...............................................9 7–5. FAILOVER_POLICY: MIN_PACKAGE_NODE.......................................... 10 7–6. Failback Policies ...................................................................................11 7–7. Example of Automatic Failback .............................................................. 12 7–8. Access Control Policies ......................................................................... 13 7–9. Node Fail Fast and Service Fail Fast ...................................................... 15 7–10. Package Dependencies ...................................................................... 18 7–11. Dependency Rules ............................................................................. 19 7–12. Complex Dependencies .....................................................................20 7–13. Complex Dependencies ..................................................................... 21 7–14. Cross node dependencies example ...................................................... 22 7–15. Exclusionary dependency example ...................................................... 23 7–16. cmapplyconf warning ........................................................................ 24 7–17. Complex dependency challenge .......................................................... 25 7–18. Package Priorities.............................................................................. 26 7–19. Setting Package Priority...................................................................... 27 7–20. Resource Dependency ....................................................................... 28 7–21. cmrunpkg review ............................................................................... 29 7–22. Package Weight/Node capacity.........................................................30 7–23. Node Capacity / Package Weight challenge ........................................ 31 7–24. Configuration file example ................................................................. 32 7–25. Node Capacity Configuration............................................................. 33 7–26. Package Weight Configuration Methods...............................................34 7–27. Package Weight/Node Capacity Rules................................................. 35 7–28. Configuration for Figure 1.................................................................. 36 7–29. Capacity “package_limit”................................................................... 37 7–30. Limit number of packages on a node use case.......................................38 7–31. Limit package load on a node use case (1) ............................................ 39 7–32. Limit package load on a node use case (2) ...........................................40 7–33. Limit package load on a node using “package_limit” use case ................. 41 7–34. Package priority & package weight rules .............................................. 42 7–35. Priority and Weight challenge............................................................. 43 iv HP Restricted Rev. 1.11 Contents 7–36. Labs ...............................................................................................44 7–37. LAB: FAILBACK POLICY...................................................................... 45 7–38. LAB: Access Control Policy ................................................................. 47 7–39. LAB: SERVICE_FAIL_FAST_ENABLED (Optional)...................................... 49 7–40. LAB: NODE_FAIL_FAST_ENABLED (Optional)........................................ 51 LAB: Package Priorities ................................................................................54 LAB: Package Weights................................................................................. 58 Module 8 Application Monitoring Scripts and ECMT Toolkits Objectives ...................................................................................................1 8–1. Package Startup and shutdown ...............................................................2 8–2. Rules for Service Processes .....................................................................3 8–3. Application Monitoring Script .................................................................5 8–4. Example: The logprog Program ............................................................7 8–5. HA Toolkit Overview (or how to use monitoring) ........................................8 8–6. ECMT Version B.06.00.........................................................................11 8–7. Modular toolkit architecture .................................................................. 13 8–8. Modular Oracle db toolkit deployment................................................... 14 8–9. Configuration directory operations for Modular Packages .......................... 16 8–10. Labs ................................................................................................ 17 8–11. LAB: logprog Package Monitoring Script ............................................. 18 Module 9 Cluster Troubleshooting Objectives ...................................................................................................1 9–1. Troubleshooting in Serviceguard..............................................................2 9–2. Approaches to identifying problems.........................................................3 9–3. Double-checking supported configurations ................................................4 9–4. Log files ........................................
View Full Document

  • Spring '20
  • Development Company, Logical volume management, Serviceguard

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture