Documente Academic
Documente Profesional
Documente Cultură
s
) ha
y
m
om
c
csm Guide
e
t
@
Sun Cluster
3.2 Administration
n
b
e
u
ak Stud
y
(
in this
d
u
al use
m
o Guide
ka e tStudent
g
ban licens
a
b
ES-345 REV C
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
D61742GC20
Edition 2.0
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Disclaimer
This document contains proprietary information, is provided under a license agreement containing restrictions on use and
disclosure, and is protected by copyright and other intellectual property laws. You may copy and print this document solely for
your own use in an Oracle training course. The document may not be modified or altered in any way. Except as expressly
permitted in your license agreement or allowed by law, you may not use, share, download, upload, copy, print, display,
perform, reproduce, publish, license, post, transmit, or distribute this document in whole or in part without the express
authorization of Oracle.
The information contained in this document is subject to change without notice. If you find any problems in the document,
please report them in writing to: Oracle University, 500 Oracle Parkway, Redwood Shores, California 94065 USA. This
document is not warranted to be error-free.
Sun Microsystems, Inc. Disclaimer
This training manual may include references to materials, offerings, or products that were previously offered by Sun
Microsystems, Inc. Certain materials, offerings, services, or products may no longer be offered or provided.Oracle and its
affiliates cannot be held responsible for any such references should they appear in the text provided.
Restricted Rights Notice
If this documentation is delivered to the U.S. Government or anyone using the documentation on behalf of the U.S.
Government, the following notice is applicable:
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
Trademark Notice
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective
owners.
AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro
Devices. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used
under license and are trademarks or registered trademarks of SPARC International, Inc. UNIX is a registered trademark
licensed through X/Open Company, Ltd.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Table of Contents
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
a Cluster
Introducing k
Sun
o Hardware and SoftwareSTUFF ABOUT
t
g
e
NAS PG
an14FUZZY
nsPIC ZONE CLUSTER .........................................1-1
bObjectives
e
...........................................................................................
1-1
c
a
li
b
e
u
l
Relevance.............................................................................................
1-2
k
b
a
a
l y sfer Additional Resources ........................................................................ 1-3
u
d
Defining Clustering ........................................................................... 1-4
ab -tran
High-Availability (HA) Platforms.......................................... 1-4
g
n
n
o
a
n
Platforms for Scalable Applications ....................................... 1-5
ab
Sun Cluster 3.2 Hardware and Software Environment............... 1-6
Sun Cluster 3.2 Hardware Environment ........................................ 1-8
Cluster Host Systems................................................................ 1-9
Using Logical Domains (LDoms) as Cluster Host Systems 1-9
Cluster Transport Interface...................................................... 1-9
Public Network Interfaces ..................................................... 1-10
Boot Disks ................................................................................ 1-11
Administrative Workstation.................................................. 1-12
Cluster in a Box ....................................................................... 1-18
Sun Cluster 3.2 Software Support.................................................. 1-19
Software Revisions.................................................................. 1-20
Types of Applications in the Sun Cluster Software Environment....
.................................................................................................... 1-21
Cluster-Unaware (Off-the-Shelf) Applications................... 1-21
Sun Cluster 3.2 Software Data Service Support .......................... 1-26
HA and Scalable Data Service Support ............................... 1-26
vii
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Learning Services, Revision C
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
t Console
@the eCluster
n
b
Exploring Node Console Connectivity
and
u
ak Stud
y
Software............................................................................................
2-1
(
n
s
i
i
Objectives ...........................................................................................
2-1
lud se th
a
Relevance.............................................................................................
2-2
m
u
a
o
Additional k
Resourcest ........................................................................ 2-3
g
n
se Node Consoles ............................................ 2-4
Accessing
the
Cluster
a
n
b
e
a Accessing
lic Serial Port Consoles on Traditional Nodes......... 2-4
b
e
u
l
k rabSun Terminal Concentrator (Sun NTS).................................. 2-7
a
y
Terminal Concentrators ................................................ 2-7
ul nsfe Other
d
Alternatives
to a Terminal Concentrator (TC) for Nodes with
b
a
a
r
t
g
a Serial Port Console.............................................................. 2-8
an non
ab
viii
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2-19
Task 4 Configuring the /etc/clusters File................... 2-19
Task 5 Configuring the /etc/serialports File ............ 2-20
Task 6 Starting the cconsole Tool .................................... 2-21
Task 7 Using the ccp Control Panel .................................. 2-21
Preparing for Installation and Understanding Quorum Devices..3-1
Objectives ........................................................................................... 3-1
Relevance............................................................................................. 3-2
Additional Resources ........................................................................ 3-3
Configuring Cluster Servers............................................................. 3-4
Boot Device Restrictions .......................................................... 3-4
Boot Device Partitioning (ZFS-root)....................................... 3-6
Configuring Cluster Storage Connections ..................................... 3-8
Cluster Topologies .................................................................... 3-8
Clustered Pairs Topology ........................................................ 3-9
Single-Node Cluster Topology ............................................. 3-15
Describing Quorum Votes and Quorum Devices ....................... 3-19
Why Have Quorum Voting at All?....................................... 3-19
Failure Fencing ........................................................................ 3-20
Amnesia Prevention ............................................................... 3-20
Quorum Mathematics and Consequences .......................... 3-21
Two-Node Cluster Quorum Devices ................................... 3-22
Clustered-Pair Quorum Disk Devices ................................. 3-23
Pair+N Quorum Disks ........................................................... 3-24
N+1 Quorum Disks................................................................. 3-25
Quorum Devices in the Scalable Storage Topology........... 3-26
Quorum Server Quorum Devices.................................................. 3-29
Preventing Cluster Amnesia With Persistent Reservations....... 3-31
SCSI-2 and SCSI-3 Reservations............................................ 3-34
SCSI-3 Persistent Group Reservation (PGR) ....................... 3-35
SCSI-3 PGR Scenario With More Than Two Nodes........... 3-35
NAS Quorum and Quorum Server Persistent Reservations ....
............................................................................................. 3-37
Intentional Reservation Delays for Partitions With Fewer
Than Half of the Nodes....................................................... 3-37
Data Fencing ..................................................................................... 3-38
Configuring a Cluster Interconnect............................................... 3-40
Point-to-Point Cluster Interconnect...................................... 3-40
Switch-based Cluster Interconnect....................................... 3-41
Cluster Transport Interface Addresses and Netmask ....... 3-41
Choosing the Cluster Transport Netmask Based on
Anticipated Nodes and Private Subnets........................... 3-42
Identifying Public Network Adapters .......................................... 3-45
Configuring Shared Physical Adapters ........................................ 3-46
Configuring the Public Network .......................................... 3-46
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
ix
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Learning Services, Revision C
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
c
csm Guide
e
t
@ ......................................5-1
n
b
Performing Basic Cluster Administration
e
u
ak Stud
y
Objectives ...........................................................................................
5-1
(
n
s
i
i
Relevance.............................................................................................
5-2
th
lud ........................................................................
e
a
Additional Resources
5-3
us
am
o
Identifying
Cluster
Daemons ........................................................... 5-4
k
t
e
ngCluster
sCommands
Using
................................................................ 5-8
a
n
b
e
c
a
Commands
Relating
to
Basic Cluster Administration ........ 5-8
li
b
e
u
l
k rab Additional Commands............................................................. 5-9
a
y
Cluster Command Self-Documentation ................................ 5-9
ul nsfe Viewing
d
and Administering Cluster Global Properties............. 5-11
b
a
a
r
t
g
Renaming the Cluster............................................................. 5-11
an non
xi
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Learning Services, Revision C
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Using VERITAS Volume Manager With Sun Cluster Software .... 6-1
Objectives ........................................................................................... 6-1
Relevance............................................................................................. 6-2
Additional Resources ........................................................................ 6-3
Introducing VxVM in the Sun Cluster Software Environment... 6-4
Exploring VxVM Disk Groups......................................................... 6-5
Shared Storage Disk Groups ................................................... 6-5
VERITAS Management on Local Disks (Optional in VxVM 4.x
and Above).............................................................................. 6-5
Sun Cluster Management of Disk Groups ............................ 6-7
Sun Cluster Global Devices Within a Disk Group ............... 6-7
xii
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
VxVM Cluster Feature Used Only for Oracle RAC ............. 6-8
Initializing a VERITAS Volume Manager Disk ............................. 6-9
Traditional Solaris OS Disks and Cross-Platform Data Sharing
(CDS) Disks ............................................................................. 6-9
Reviewing the Basic Objects in a Disk Group.............................. 6-11
Disk Names or Media Names ............................................... 6-11
Subdisk ..................................................................................... 6-11
Plex ............................................................................................ 6-11
Volume ..................................................................................... 6-12
Layered Volume...................................................................... 6-12
Exploring Volume Requirements in the Sun Cluster Environment .
................................................................................................. 6-13
Simple Mirrors......................................................................... 6-13
Mirrored Stripe (Mirror-Stripe) ............................................ 6-14
Striped Mirrors (Stripe-Mirror)............................................. 6-15
Dirty Region Logs for Volumes in the Cluster ................... 6-16
Viewing the Installation and bootdg/rootdg Requirements in the
Sun Cluster Environment ............................................................ 6-17
Requirements for bootdg/rootdg....................................... 6-17
DMP Restrictions in Sun Cluster 3.2 .................................... 6-18
Installing Supported Multipathing Software...................... 6-19
Installing VxVM in the Sun Cluster 3.2 Software Environment 6-20
Using the installer or installvm Utility........................ 6-20
Manually Using vxdiskadm to Encapsulate the OS Disk . 6-24
Configuring a Pre-Existing VxVM for Sun Cluster 3.2
Software................................................................................. 6-24
Creating Shared Disk Groups and Volumes................................ 6-26
Listing Available Disks .......................................................... 6-26
Initializing Disks and Putting Them into a New Disk Group..
......................................................................................... 6-27
Verifying Disk Groups Imported on a Node ...................... 6-27
Building a Mirrored Striped Volume (RAID 0+1).............. 6-29
Building a Striped Mirrored Volume (RAID 1+0).............. 6-30
Examining Hot Relocation.............................................................. 6-31
Registering VxVM Disk Groups .................................................... 6-32
Using the clsetup Command to Register Disk Groups . 6-33
Viewing and Controlling Registered Device Groups ........ 6-34
Managing VxVM Device Groups .................................................. 6-35
Resynchronizing Device Groups .......................................... 6-35
Making Other Changes to Device Groups .......................... 6-35
Putting a Device Group Offline and Back Online .............. 6-35
Using Global and Failover File Systems on VxVM Volumes .... 6-37
Creating File Systems ............................................................. 6-37
Mounting File Systems........................................................... 6-37
Mirroring the Boot Disk With VxVM............................................ 6-39
Exercise: Configuring Volume Management............................... 6-40
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
xiii
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Learning Services, Revision C
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
Using Solaris Volume Manager With Sun Cluster Software ........ 7-1
Objectives ........................................................................................... 7-1
Relevance............................................................................................. 7-2
Additional Resources ........................................................................ 7-3
Exploring Solaris Volume Manager Disk Space Management ... 7-4
Solaris Volume Manager Partition-Based Disk Space
Management ........................................................................... 7-4
Solaris Volume Manager Disk Space Management With Soft
Partitions ................................................................................. 7-5
Exploring Solaris Volume Manager Disksets ................................ 7-8
Solaris Volume Manager Multi-Owner Disksets (for Oracle RAC) .
.................................................................................................... 7-9
Using Solaris Volume Manager Database Replicas (metadb
replicas) .......................................................................................... 7-10
Local Replica Management ................................................... 7-10
Shared Diskset Replica Management................................... 7-11
Shared Diskset Replica Quorum Mathematics................... 7-11
Shared Diskset Mediators ...................................................... 7-12
Installing Solaris Volume Manager and Tuning the md.conf File...
.................................................................................................. 7-13
Modifying the md.conf File (Solaris 9 OS Only)................ 7-13
Initializing the Local metadb Replicas on Local Disks ............... 7-14
Using DIDs Compared to Using Traditional c#t#d#........ 7-14
Leaving Dedicated Partitions Even When Using ZFS-root ......
......................................................................................... 7-14
Adding the Local metadb Replicas to the Local Disks ...... 7-15
Repartitioning a Mirror Boot Disk and Adding metadb
Replicas.................................................................................. 7-15
Using the metadb or metadb -i Command to Verify metadb
Replicas.................................................................................. 7-15
Creating Shared Disksets and Mediators ..................................... 7-17
Automatic Repartitioning and metadb Placement on Shared
Disksets.................................................................................. 7-18
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
xiv
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
xv
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Learning Services, Revision C
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ab
xvi
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
Introducing Data Services, Resource Groups, and HA-NFSy......10-1
) ha
Objectives .........................................................................................
m 10-1
m
Relevance...........................................................................................
co e 10-2
m
Additional Resources ......................................................................
10-3
cs Guid
e
Introducing Data Services in the Cluster......................................
10-4
t
@
n
b
Solaris 10 OS Non-GlobalkZones
Act
as
Virtual
Nodes
for
Data
u ude
a
t
y
Services ..................................................................................
10-4
(
S
n
s
i
i
Off-the-Shelf Application.......................................................
10-4
thData Service Agents ................... 10-6
lu3.2d Software
e
a
Sun Cluster
usof a Data Service Agent ....................... 10-7
am
o
Reviewing
Components
k
t
ngFaulteMonitor
se Components ................................................... 10-7
a
n
b
a Introducing
lic Data Service Packaging, Installation, and Registration
b
e
u
l
10-8
k rab
a
y
Data Service Packages and Resource Types ....................... 10-8
ul nsfe Introducing
d
Resources, Resource Groups, and the Resource Group
b
a
a
r
t
g
Manager.......................................................................................... 10-9
n non
a
b
Resource Groups ................................................................... 10-10
a
Resource Group Manager.................................................... 10-12
Describing Failover Resource Groups ........................................ 10-13
Resources and Resource Types ........................................... 10-14
Resource Type Versioning................................................... 10-14
Using Special Resource Types...................................................... 10-15
The SUNW.LogicalHostname Resource Type................... 10-15
The SUNW.SharedAddress Resource Type ....................... 10-15
Guidelines for Using Global and Failover File Systems.. 10-17
HAStoragePlus and ZFS ...................................................... 10-18
Generic Data Service............................................................. 10-18
Understanding Resource Dependencies and Resource Group
Dependencies............................................................................... 10-20
Resource Group Dependencies........................................... 10-21
Configuring Resource and Resource Groups Through Properties...
10-22
xvii
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Learning Services, Revision C
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
xviii
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relationships ..................................................................................11-1
Objectives ......................................................................................... 11-1
Relevance........................................................................................... 11-2
Additional Resources ...................................................................... 11-3
Using Scalable Services and Shared Addresses........................... 11-4
Exploring Characteristics of Scalable Services............................. 11-5
File and Data Access............................................................... 11-5
File Locking for Writing Data ............................................... 11-5
Using the SharedAddress Resource............................................. 11-6
Client Affinity.......................................................................... 11-6
Load-Balancing Weights ........................................................ 11-6
Exploring Resource Groups for Scalable Services....................... 11-7
Understanding Properties for Scalable Groups and Services ... 11-9
The Desired_primaries and Maximum_primaries
Properties .............................................................................. 11-9
The Load_balancing_policy Property ............................. 11-9
The Load_balancing_weights Property......................... 11-10
The Resource_dependencies Property ........................... 11-10
Adding Auxiliary Nodes for a SharedAddress Property ....... 11-11
Reviewing Command Examples for a Scalable Service ........... 11-12
Controlling Scalable Resources and Resource Groups............. 11-13
Resource Group Operations ................................................ 11-13
Fault Monitor Operations .................................................... 11-14
Using the clrg status and clrs status Commands for a
Scalable Application ................................................................... 11-15
Advanced Resource Group Relationships ................................. 11-16
Weak Positive Affinities and Weak Negative Affinities . 11-16
Strong Positive Affinities ..................................................... 11-17
Strong Positive Affinity With Failover Delegation .......... 11-18
Exercise: Installing and Configuring Sun Cluster Scalable Service
for Apache.................................................................................... 11-20
Preparation............................................................................. 11-20
Task 1 Preparing for Apache Data Service Configuration.....
.............................................................................. 11-21
Task 2 Configuring the Apache Environment............... 11-21
Task 3 Testing the Server on Each Node Before Configuring
the Data Service Resources ............................................... 11-23
Task 4 Registering and Configuring the Sun Cluster Apache
Data Service ........................................................................ 11-25
Task 5 Verifying Apache Web Server Access ................ 11-26
Task 6 Observing Cluster Failures .................................. 11-26
Task 7 Configuring Advanced Resource Group
Relationships ...................................................................... 11-27
Exercise Summary.......................................................................... 11-29
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
xix
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Learning Services, Revision C
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
xx
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
xxi
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Learning Services, Revision C
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
xxii
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Preface
s
) ha
y
m
omand
Describe the major Sun Cluster software components
c
functions
csm Guide
e
t console software
@the cluster
Configure access to node consoles and
n
b
e
u
akinstalling
tudSun Cluster software,
Understand the prerequisites
for
y
(
S
into understanding
with particular attention
quorum devices
d
his
t
u
l
e
a theuSun
s Cluster 3.2 software
Install and configure
m
a
o
k
t
e framework
Manage
ngthe Sun
sCluster
a
n
b
e
c
a
liVERITAS
Configure
Volume Manager for Sun Cluster data
b
e
u
l
k
b
ra
ya feConfigure
Solaris Volume Manager for Sun Cluster data
l
u
s
d
ab -tran Configure ZFS for Sun Cluster data
g
n non
a
Manage public network adapters using IPMP in the Sun Cluster 3.2
b
a
Upon completion of this course, you should be able to:
environment
Preface-xxiii
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Learning Services, Revision C
Course Map
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Course Map
The following course map enables you to see what you have
accomplished and where you are going in reference to the course goals.
Product Introduction
Introducing
Sun Cluster
Hardware and Software
s
) ha
Installation
ab
y
m
om
Exploring Node Console
Installing and Configuring
Preparing for Installation
c
mCluster
Connectivity and the
the s
and Understanding
ide
c Sun
u
Cluster Console Software
e
Software
Framework
Quorum Devices
G
t
@
n
b
ku tude
a
y
Operation
n ( this S
i
d
lu se
a
m toBasic
u
aPerforming
k
e
ng eAdministration
sCluster
a
n
b
a
lic
b
e
u
l
k rab
a
y
ul nsfe
Customization
d
b
a
a
r
-t
Using
ang non
Using VERITAS
Volume Manager for
Volume Management
Managing the
Public Network
With IPMP
Using ZFS
Introducing Data
Services, Resource
Groups, and HA-NFS
Configuring Scalable
Services and Advanced
Resource Group Relationships
Supplemental Exercises
Performing Supplemental
Exercises for Sun
Cluster 3.2 Software
Preface-xxiv
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Network administration.
Solaris OS administration
Refer to the Sun Services catalog for specific information and registration.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Preface-xxv
To be sure you are prepared to take this course, can you answer yes to the
following questions?
s
) ha
y
m
om
c
Preface-xxvi
Introductions
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Introductions
Now that you have been introduced to the course, introduce yourself to
each other and the instructor, addressing the items shown in the following
bullets.
Name
Company affiliation
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Preface-xxvii
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
d
s
i
mastery of an objective.
ec t Gu
@
n aids to convey a
b dvisual
Visual aids The instructor might useuseveral
e
k
a form.
tuVisual aids commonly
concept, such as a process, in a(y
visual
S
n
contain graphics, animation,
di ande video.
his
t
u
l
a us
m
a
k e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
ab
Preface-xxviii
Conventions
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Conventions
The following conventions are used in this course to represent various
training elements and alternative learning resources.
Icons
Additional resources Indicates other references that provide additional
information on the topics described in the module.
s
) ha
y
m
oonmthe current
Discussion Indicates a small-group or class discussion
c
Preface-xxix
Conventions
Typographical Conventions
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
Preface-xxx
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 1
Objectives
y
m
om
Upon completion of this module, you should be able to:
c
csm Guide
Define the concept of clustering
e
t
@ andesoftware
n
b
u
Describe the Sun Cluster 3.2 hardware
environment
k tud
a
y
Senvironment
Explain the Sun Clusteri3.2
n (hardware
s
i
d
h
t support
lu3.2 software
e
a
View the Sun Cluster
s
m to u
katypes
Describegthe
eof applications in the Sun Cluster 3.2 software
n
s
a
n
environment
ab lice
b
u Identify
le the Sun Cluster 3.2 software data service support
k
b
a
a
r
l y sfeExplore
u
the Sun Cluster 3.2 software high-availability (HA)
d
b tran framework
a
g onn
a
n
Define global storage services differences
ab
1-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relevance
s
) ha
y
m
om
c
ide for
csm Guprovide
What services does the Sun Cluster softwareeframework
@ ent
all the applications running in the cluster?
b
u
k tud
asystems
y
Do global devices and global file
(
Shave uses other than for
n
s
i
i
scalable applications in u
th
l thed cluster?
e
a
am to us
k
ng ense
a
b
a
lic
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
a
no
ab
1-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Additional resources The following references provide additional
information on the topics described in this module:
Sun Cluster System Administration Guide for Solaris OS, part number
820-7458 (for Sun Cluster 3.2 11/09).
Sun Cluster Software Installation Guide for Solaris OS, part number 8207356 (for Sun Cluster 3.2 11/09).
Sun Cluster Concepts Guide for Solaris OS, part number 821-0259 (for
Sun Cluster 3.2 11/09)
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
1-3
Defining Clustering
Defining Clustering
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Separate server nodes, each booting from its own, non-shared, copy of
the OS
s
) ha
y
m
om
c
csm Guide
e
t
@
n
b
General goal of providing a platformu
for
HA and
scalability for the
e
ak Stud
applications running in the cluster
y
(
din e thisapplications and cluster-aware
Support for a variety oflu
cluster-unaware
a us
applications
m
a
k e to
g
ban licens
a
High-Availability
b
e (HA) Platforms
u
l
k
b
ya fera
l
u
ns are generally marketed as the only way to provide highbd trClusters
a
a
g on- availability (HA) for the applications that run on them.
n
a
n
ab
HA Standards
HA standards are usually phrased with wording such as provides
5 nines availability. This means 99.999 percent uptime for the application
or about five minutes of downtime per year. One clean server reboot often
already exceeds that amount of downtime.
1-4
Defining Clustering
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
Fault-Tolerant Servers Are Notya
ankAlternative
tud to HA Clusters
(
S
in this
d
u
l
Many vendors provideaservers
that
e are marketed as fault-tolerant. These
s
m
u
servers are designed
to be able
tolerate any single hardware failure, for
kafailure,
to toprocessing
g
e
example memory
central
unit (CPU) failure, and so on,
n ens
a
b
without
a any downtime.
lic
b
e
u
l
k rab
a
y
l There
e is a common misconception that fault-tolerant servers are an
f
u
s
d
to HA clusters, or that a fault-tolerant server supersedes HA in
ab -tranalternative
some
way.
In
fact, while fault-tolerant servers can hide any hardware
g
n
n
o
a
n
failure, they are not designed to provide especially fast recovery in the
ab
case of a software failure, such as a Solaris OS kernel panic or an
application failure. Recovery in these circumstances on a single
fault-tolerant server might still require a full OS reboot which, as
previously stated, might already exceed maximum downtime permitted
by the HA standards to which you aspire.
1-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
t be physically
@
Global device implementation While data
storage must
n
b
e
u
connected on paths from at least two
ak different
tudnodes in the Sun
y
(
S
Cluster 3.2 hardware and software
all the storage in
in thenvironment,
is
d
u
the cluster is logicallyaavailable
l
sefrom every node in the cluster using
m
u
standard devicea
semantics.
k e to
g
s
This provides
to run applications on nodes that use
an ctheenflexibility
b
a
data
that arelinot even physically connected to the nodes. More
b
u
le about global device file naming and location can be
k
information
b
a
a
l y sfound
er in Global Storage Services on page 1-31.
f
u
d
ab -tran Global file system implementation The Sun Cluster software
g
n non
a
framework provides a global file service independent of any
b
a
1-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Tight integration with Solaris 10 zones The Sun Cluster 3.2 framework
is aware of Solaris 10 zones and can manage failover and scalable
applications running in non-global zones.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
1-7
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
One or more public network interfaces per system per subnet (with a
preferred minimum of at least two)
s
) ha
y
m
ab
Node 1
Redundant
Transport
Node 2
Boot Disks
Boot Disks
Multihost Storage
Figure 1-1
1-8
Multihost Storage
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
e
Systems
m
d
s
i
ec t Gu
@
n with Sun Cluster
b beginning
e
u
LDoms are fully supported as clusterknodes,
d
tu domains are supported.
ya andSguest
3.2 2/08 (Update 1). Both I/O domains
(
n
s
A discussion of requirements
for configuring guest
di andebest
hipractices
t
u
l
a
LDoms for use as Sun
s is included in an appendix.
unodes
am Cluster
o
k
t
e and match one or more LDoms and one or more
nglegaletonsmix
a
It is perfectly
b
c using LDoms in the same cluster.
a nodeslinot
physical
b
e
u
l
k rab
a
y
ul nsfe
d
b
a Cluster
tra Transport Interface
g
n
n
a
no
All nodes in a cluster are linked by a private cluster transport. The
transport can be used for the following purposes:
1-9
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Sun Cluster 3.2 now allows you to build configurations with a single
private network forming the cluster transport. This would be
recommended in production only if the single private network is already
redundant (using a lower level device aggregation).
Crossover cables are often used in a two-node cluster. Switches are
optional when you have two nodes and are required for more than two
nodes.
The following types of cluster transport hardware are supported:
s
) ha
y
m
om
c
csm Guide
Infiniband (Solaris 10 OS only)
e
@ ent
b
u
This is a relatively new industry standard
used outside
d
k interconnect
u
a
t
y
of the Sun Cluster environment( for interconnecting
a variety of hosts
S
n Cluster
s
i
diSun
h
and storage devices. Inlu
the
environment
it is supported
t
e
a
only as an interconnect
us hosts, not between hosts and
am between
o
k
t
storage devices.
ng ense
a
b
a
lic
b
e
u
l
kNetwork
Public
a
ab Interfaces
r
y
l
e
f
ns
bdu trEach
a
a
node must have public network interfaces under control of the
ang non Solaris OS IP Multipathing (IPMP) software. It is recommended to have at
ab
least two interfaces in each IPMP group. You may configure as many
IPMP groups as required.
A Sun Cluster server is not allowed to act as a router.
Not all available network interface cards (NICs) are supported in the Sun
Cluster 3.2 hardware environment.
1-10
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
Boot Disks
b
u
ak Stud
y
(
The Sun Cluster 3.2 environment
disks for each node be
in requires
d
thisarethatnotboot
u
local to the node. That a
is,l the boot
disks
connected
or not visible to
e
s
m
u
any other node. k
For
boot device was connected through a
a example,
to ifit the
g
e
Storage Area
Network
(SAN),
would
still be supported if the LUN is
n ens
a
b
not visible
a to any
lic other nodes.
b
e
u
l
k rab
a
y
l Itsisferecommended to mirror boot disks using any of the following
u
d
ab -tranmethods; the first two listed are recommended for their simplicity:
g
n non
ZFS (supported for boot disks starting in Solaris 10 10/08)
a
b
a
1-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
If you are using a serial port console access mechanism (ttya), then you
might likely have a terminal concentrator in order to provide the
convenience of remote access to your node consoles.A terminal
concentrator (TC) is a device that provides data translation from the
network to serial port interfaces. Each of the serial port outputs connects
to a separate node in the cluster through serial port A.
s
) ha
y
m
e and
m usecurity
d
s
i
keep these terminals behind locked doors requiringcstringent
eless convenient
G
checks to open them. This is acceptable (although
to
t
@
n
b
e
u
administer) for Sun Cluster 3.2 hardware
akas well.
tud
y
(
S
in this
d
u
al use
Administrative Workstation
m
ka e to
g
s
bantheliSun
enCluster
Included a
with
software is the administration console
c
b
e
software,
which
can
be
installed
on any SPARC or x86 Solaris OS
u
l
k
b
a
a
workstation.
The
software
can
be
a convenience in managing the multiple
y fer
l
u
s
n of the cluster from a centralized location. It does not affect the
bd trnodes
a
a
- cluster in any other way.
ang non
ab
1-12
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
m uide
csPublic
e
Gnet
t
@
Redundant
n
b
Transport
ku tude
a
y
n ( this S
i
d
lu se
a
am to u
k
ng ense
a
b
a
lic
b
e
u
l
k rab
a
y
Node
Node
Node
ul nsfeNode
d
b
a
tra
g
n
n
no
aba
See Module 3, Preparing for Installation and Understanding
Quorum Devices for more information about these subjects.
Figure 1-2
Pair + N Topology
1-13
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
omNAS
c
In the current release, Sun Cluster nodes can use the following
devices:
csm Guide
e
@ ent
b
iSCSI only: ST2510
u
k tud
yaStorageTek
(
S 5200 and 5300 Series
NFS only: NetApp Filer andnSun
s
i
i
d
h
t RAC only): Sun StorEdge 7000
lu for Oracle
iSCSI only (NFS allowed
e
a
s
am to u
Series (Amber k
Road)
ng ense
a
b
a
lic
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
no
aba
Switch
Switch
Node 1
Node 2
Node 3
Node 4
Figure 1-3
1-14
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Switch
Switch
Node 1
Node 2
s
) ha
y
m
om
Data Replication
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
Storage
inReplication
d
hisor Medium
t
u
l
(Private fiber,
public
network,
some combination)
e
a us
m
ka of Controller-Based
to
Figure 1-4 ng
Diagramse
Data Replication
a
n
b
e
a
lic
b
e
u
l
kThe original
b release of Sun Cluster 3.2 supported only Hitachi Truecopy.
a
a
r
y
feCluster 3.2 2/08 (Update 1) added support for EMC Symmetrix
ul nSun
s
d
b
Remote
Data Facility (SRDF). Sun Cluster 3.2 11/09 (Update 3) adds
a
a
r
t
g
support for Hitachi Universal Replicator.
n non
a
b
a
The data replication topology is ideal for wider area clusters where the data
replication solution is preferred to the extra connectivity that would be
involved to actually connect the storage to nodes that are far apart. The
reasons for this preference can be:
You might benefit from each node having a physically local copy of
the data because it can guarantee optimal data read behavior.
1-15
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
In Sun Cluster 3.2 certain types of transport adapters can be used as both
public network adapters and private network transport adapters
simultaneously. The purpose of this feature is to allow certain types of
servers that can never have more than two physical network adapters,
such as servers in a blade architecture, to be used as Sun Cluster nodes
with a fully redundant transport.
Using this feature, such servers could use each physical adapter as both a
single transport adapter and a single public network adapter. Both public
and private networks can still be fully redundant.
s
) ha
e
m
d
s
i
c support
ua
This feature makes use of network device driversethat
G
t
@
n how packets
b specifies
specification called 802.1q tagged VLANs. 802.1q
e
u
d
k
a trunked)
from multiple VLANs can be passed(y
(or
tuover the same physical
S
n
link by including a VLAN identifier
(VLAN-ID)
is in network packets. This
di ethe
thheader
VLAN-ID is encapsulateda
aslupart of
information at the media
s
m
u
access control (MAC)
by the switches and host
alevel and
kdrivers).
tointerpreted
g
e
adapters (or device
On
the
host
end,
multiple virtual adapters
n ens
a
b
can be configured
c top of a physical adapter. Each virtual adapter
a
lion
b
e
accepts
and
sends
packets
only for a particular VLAN.
u
l
k
b
a
a
l y sfer
u
d
n of the supported Sun Cluster interconnect devices support
asubset
ab -trAtagged
g
VLAN. The list, at the time of writing this course, is:
n
n
o
a
n
ab
1-16
ce
bge
ixge
ixgb
e1000g
ipge
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Figure 1-5 is a diagram of a two-node cluster where each node has only
two physical network adapters that are capable of tagged VLANs.
To public net
V3
V3
Adapter 1
V1
Adapter 1
Switch 0
V1
as
Node 1
Node y
2) h
m
m
co e
m
cs GuV3id
V3
e
@ ent
b
Adapter 2
u
Adapter 2
k tud
a
y
1 S
V2
V2
n (Switch
s
i
i
d
h
lu se t To public net
a
aV1m to uPublic VLAN V3
k
Private VLAN V2
Private VLAN
g nse
n
a
ab lice
b
u
le
k
b
a
a
l y Figure
er 1-5 Adapters Being Shared Between Public and Private Nets
f
u
s
d
ab -tran
g
n
As shown in Figure 1-5, the switches are interconnected to support the
ban no
two adapters on each node existing in the same IPMP group for public
network address failover. In addition, each switch is being used as a
private network interconnect. The isolation of traffic between the private
network and public network adapters is controlled by the VLAN-ID that
is assigned to the adapters themselves, which pass the information to the
network fabric. This requires switches that are capable of tagged VLANs.
1-17
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
Redundant public network interfaces per subnet are recommended.
c
csm Guide
Mirrored boot disks are recommended.
e
@ ent
b
u
d as possible. For
You should locate redundant components
ak as far
tuapart
y
(
S
example, on a system with multiple
(I/O) boards, you
in input/output
is
d
h
t
u
l
should put the redundanta
transport
interfaces,
the redundant public nets,
e
s
m
u
and the redundant storage
array
controllers
on
two different I/O boards.
a
o
k
t
ng ense
a
b
a
lic
Clusterkuinba Box
e
l
a erab
y
l
f
u ThenSun
s
d
b
Cluster 3.2 hardware environment supports clusters with both
a
a
r
t
g
an non (or all) nodes in the same physical frame. This is true for:
ab
1-18
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Solaris OS software
s
) ha
y
m
Figure 1-6
kernel
1-19
Software Revisions
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Solaris OS versions for Sun Cluster 3.2 updates earlier than Update 2
(1/09) (each node must run the same version):
Solaris OS versions for Sun Cluster 3.2 Update 2 (1/09) (each node
must run the same version):
s
) ha
y
m
m
o
c
node
Solaris OS versions for Sun Cluster 3.2 Update 3 (11/09)
(each
e
m
d
s
i
must run the same version):
ec t Gu
@
b 8doren9) (SPARC only)
Solaris 9 OS 9/05 or 9/05 HWk(Update
u
a (Updates
tu 7 and 8)
y10/09
(
S
Solaris 10 OS 5/09 through
n
i
dversions
hisSun Cluster 3.2 updates earlier
t
u
l
Veritas Volume Manager
for
e
a
am to us
than Update 2k(1/09)
e 9 OS/Solaris 10 OS (SPARC)
ng4.1 e
sSolaris
a
n
VxVM
MP1
b
a
licMP2 for Solaris 10 OS (x86)
b
e
VxVM
4.1
u
l
k rab
a
y
ul nsfe VxVM 5.0 Solaris 9 OS/Solaris 10 OS (SPARC)
d
b
a
tra Veritas Volume Manager Versions for Sun Cluster 3.2 Update 2
g
n
n
a
(1/09)
no
ab
Note New Solaris 10 OS updates might have some lag before being
officially supported in the cluster. If there is any question, consult Sun
support personnel who have access to the latest support matrices.
1-20
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
c
e the Sun
idin
Two main categories of cluster-unaware applications
run
csmcan
u
e
G
t
Cluster 3.2 environment. These are described
on the
following
pages of
@
n
b
e
u
d 11. The applications
this module and also in detail in modules
ak S10tuand
y
(
include the following:
in this
d
u
Failover applications
al use
m
ka e to
Scalableg
applications
ban licens
a
bcommon
The
e elements of all of these applications are the following:
u
l
k
b
ra clusters resource group manager (RGM) coordinates all stopping
ya feThe
l
u
s
bd tran and starting of the applications, which are never started and stopped
a
by traditional Solaris OS boot methods.
ang non
The majority of applications that run in a cluster are in the clusterunaware category and are part of the main focus of this course.
A data service agent for the application provides the glue to make it
work properly in the Sun Cluster software environment. This
includes methods to start and stop the application appropriately in
the cluster, as well as fault monitors specific to that application.
1-21
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Failover Applications
The failover model is the easiest to support in the cluster. Failover
applications run on only one node of the cluster at a time. The cluster
provides HA by providing automatic restart on the same node or a
different node of the cluster.
Failover services are usually paired with an application IP address. This is
an IP address that always fails over from node to node along with the
application. In this way, clients outside the cluster see a logical host name
with no knowledge of which node a service is running on. The client
should not even be able to tell that the service is running in a cluster.
s
) ha
y
m
om
c
idean IP
Multiple failover applications in the same resource group
share
csmcan
u
e
G
address, with the restriction that they must all@
fail overnto
the same node
t
b
e
u
together as shown in Figure 1-7.
ak Stud
y
(
in this
d
u
al use
Application IPs
m
a
to
Applications g k
e
an cMounts)
ns
(Local File
bSystem
e
a
li
Group
bResource
e
u
l
k
a erab
y
l
u nsf Node 1
Node 2
d
b
a
a
r
-t
ang non Figure 1-7 Multiple Failover Applications in the Same Resource Group
Note Both IPV4 addresses and IPV6 addresses are supported.
ab
1-22
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Scalable Applications
Scalable applications involve running multiple instances of an application
in the same cluster and making it look like a single service by means of a
global interface that provides a single IP address and load balancing.
While scalable applications (Figure 1-8) are still off-the-shelf, not every
application can be made to run as a scalable application in the Sun Cluster
3.2 software environment. Applications that write data without any type
of locking mechanism might work as failover applications but do not
work as scalable applications.
s
) ha
y
m
om
c
Client 1
Client 2
Client
3
sm uide
Requests
Requestsec
G
t
Network
@
n
b
ku tude
a
y
Node 1
n ( this S
i
d
lu se
Global Interface
a
Web
xyz.com
am to u
k
Page
ng enseTransport
a
Request
b
aDistributionlic
b
Node 2
Node 3
u
le
k
b
a
a
l y sfer
u
d
HTTP
ab -tran
HTTP
HTTP
g
Application
n
n
o
a
Application
Application
n
ab
<HTML>
<HTML>
<HTML>
</HTML>
</HTML>
</HTML>
Figure 1-8
1-23
Cluster-Aware Applications
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
It is not required that the Sun Cluster software framework RGM start
and stop these applications. Because these applications are
cluster-aware, they can be started in their own independent scripts,
or by hand.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
Parallel Database Applications
in this
d
u
al type
seof cluster application. Multiple
Parallel databases areaam
special
u
k server
to cooperate in the cluster, handling
instances of the database
g
e
s database and even providing parallel query
nsame
different queries
the
ban on
e
c
a
li queries. The following are supported in the Sun
capability
b on large
e
u
l
k
b
Cluster
environment:
a e3.2rasoftware
y
l
f
bdu transOracle 9i Real Application Clusters (RAC)
a
g onn
Oracle 10g RAC
a
n
ab
1-24
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
1-25
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
ab
1-26
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
o
c
ab
1-27
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
ab
The Sun Cluster 3.2 software environment requires the use of IPMP, a
standard Solaris OS feature, to control interface failures on a node. The
Sun Cluster software adds a layer of monitoring to detect total network
failure on one node and to drive the possible failover of applications to
another node.
1-28
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
t
@ enCluster-aware
Cluster-aware application
application
b
u
ak Stud
y
(
in this
d
u
clprivnet0
clprivnet0
al use
172.16.193.1
172.16.193.2
m
ka e to
g
ban licens
a
b 1-9 le Application Traffic Striping
u
Figure
k
a erab
y
l
u nsf
d
b
a
tra Note Non-global zones can optionally be given their own IP addresses on
g
n
n
no
the clprivnet0 subnet. You would only do this if you wanted to support
aba
cluster-aware applications inside non-global zones. At this time Oracle
RAC is not supported in non-global zones.
1-29
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
m
o
c
s
) ha
ab
1-30
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
csm Guide
e
Global Naming (DID devices) kub@ dent
ya Stu
(
n
i
his name for every disk drive,
The DID feature provides
adunique device
t
u
l
e
adriveuinsthe cluster. Shared disks that might have
CD-ROM drive, or tape
m
a
knameseontodifferent nodes (different controller numbers)
different logical
g
aa ncluster-wide
are given
ns unique DID instance number. Different local
b
e
c
a
liuse the same logical name (for example, c0t0d0 for each
disks
b that may
e
u
l
k
b disk) are each given different unique DID instance numbers.
a nodes
aroot
r
y
l
e
f
bdu trans
a
ang non
Global devices
ab
1-31
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Junction
Node 1
Node 2
d1=c0t0d0
d2=c2t18d0
c0
d2=c5t18d0
d3=c0t0d0
c2
c5
c0
Node 3
d4=c0t0d0
d5=c1t6d0
d8191=/dev/rmt/0
c0
c1
rmt/0
s
) ha
y
m
om
c
sm uide
c
e
G
Figure 1-10 DID devices
t
@
n
b
ku tude
a
y
( standard
S eight Solaris OS disk
Device files are created for each iof
n the
s
i
d
h
t /dev/did/rdsk directories; for
partitions in both the /dev/did/dsk
lu seand
a
example: /dev/did/dsk/d2s3
and
/dev/did/rdsk/d2s3.
am to u
k
ngare ejust
saeglobal naming scheme and not a global access
a
n
DIDs themselves
b
a
lic
b
scheme.
e
u
l
k rab
a
y
fe
ul DIDs
s
are used as components of Solaris Volume Manager volumes and in
d
n
b
a
a
trchoosing
cluster quorum devices, as described in Module 3, Preparing
g
n
n
o
a
for Installation and Understanding Quorum Devices
n
t0d0
Boot Disk
t18d0
Array Disk
t0d0
Boot Disk
t0d0
Boot Disk
t6d0
CD-ROM
ab
Global Devices
The global devices feature of Sun Cluster 3.2 software provides
simultaneous access to the raw (character) device associated with storage
devices from all nodes, regardless of where the storage is physically
attached.
This includes individual DID disk devices, CD-ROMs and tapes, as well
as VERITAS Volume Manager volumes and Solaris Volume Manager
volumes.
1-32
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
Node 1
Primary
Node 2
Node 3
Nodec4sm
ide
u
for nfsdg
e
G
t
@
n
b
ku tude
a
y
n ( this S
i
d
lu se
a
am to u
k
ng ense
a
b
nfsdg/nfsvol
a
lic
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
Figure 1-11 Node Access Diagram
no
aba
1-33
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
81M
5%
/global/.devices/node@1
csm Guide
e
@ ent
b
81M
5%
/global/.devices/node@2
u
ak Stud
y
(
in this
The device names under the /global/.devices/node@nodeID
arena can
d
u
l
e
be used directly, but, because
a theyusare unwieldy, the Sun Cluster 3.2
m
a
environment provides
symbolic
k e to links into this namespace.
g
an cens
b
a
For VERITAS
Volume
li Manager and Solaris Volume Manager, the Sun
bsoftware
e
u
l
Cluster
links
the standard device access directories into the
k
b
a
a
r
y
e
fnamespace:
ul global
s
d
n
b
a
tra ls -l /dev/vx/rdsk/nfsdg
proto192:/dev/vx#
g
n
n
a
root
40 Nov 25 03:57
no 1 root
ablrwxrwxrwx
# df -h
/dev/lofi/127
94M
3.6M
/dev/lofi/126
94M
3.6M
/dev/vx/rdsk/nfsdg ->/global/.devices/node@1/dev/vx/rdsk/nfsdg/
1-34
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Note You do have raw (character) device access from one node, through
the /dev/global device paths, to the boot disks of other nodes. In other
words, while you cannot mount one nodes root disk from another node,
you can overwrite it with newfs or dd. It is not necessarily advisable to
take advantage of this feature.
s
) ha
y
m
om
c
csm Guide
e
@ ent
The UNIX File System (ufs), kub
a Stud
y
(
The VERITAS File System
(VxFS)
in this
d
u
e(hsfs)
The High Sierra File
al System
s
m
u
ka e to
g
The Sun Cluster
an csoftware
ns makes a file system global with a global mount
b
e
a
option.
islitypically in the /etc/vfstab file, but can be put on the
b Thislline
e
u
command
k
b of a standard mount command:
a
a
r
y
fe/dev/vx/dsk/nfs-dg/vol-01 /global/nfs
u-ol global
s
# mount
d
n
b
a
tra
g
n
n
The equivalent mount entry in the /etc/vfstab file is:
no
aba
The global file system capability is independent of the structure of the
actual file system layout on disk. However, only certain file system types
are supported by Sun Cluster3.2 to be file systems underlying the global
file system. These are:
/dev/vx/dsk/nfs-dg/vol-01 /dev/vx/rdsk/nfs-dg/vol-01 \
/global/nfs ufs 2 yes global
The global file system works on the same principle as the global device
feature. That is, only one node at a time is the primary and actually
communicates with the underlying file system. All other nodes use
normal file semantics but actually communicate with the primary over the
cluster transport. The primary node for the file system is always the same
as the primary node for the device on which it is built.
The global file system is also known by the following names:
1-35
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Shared QFS is a different solution to the Sun Cluster global file system
that also provides simultaneous access from multiple nodes to the same
file system data.
Unlike the Sun Cluster global file system, Shared QFS provides access to
the file system data only from nodes directly connected to the storage. File
data access is provided directly over the storage connections, rather than
by proxy. File system metadata (inodes, directories and the like) are still
provided by proxy from a single node at a time for a particular filesystem,
although the metadata server functionality can fail over. The Shared QFS
functionality is presented in the following diagram:
s
) ha
y
m
om
c
Node 1
csm Guide
e
t2
@ Node
Metadata
n
b
e
u
Server
ak Stud
y
(
in this
d
u
l
e
File a
Data
File Data
s
m
u
a
o
k et
Metadata g
n
ba licens
Shared QFS
a
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
no
aba
Shared QFS has been supported in Sun Cluster 3.1 and Sun Cluster 3.2
only as a filesystem for storing Oracle RAC data and binaries. In the near
future it will be supported as a general-purpose shared file system, for all
applications that require simultaneous access to the same data from
multiple nodes.
1-36
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
UFS
VxFS
s
) ha
y
m
om
c
Solaris ZFS (Solaris 10 OS only)
csm Guide
e
t Services
@
n
Failover File System Access Is Notufor
Scalable
b
e
ak Stud
y
(
n this for failover services that run
Failover file system access d
is iappropriate
u
only on the nodes physically
e to storage devices.
al uconnected
s
m
ka e to
g
Failover file
system access is not suitable for scalable services.
ban licens
a
b filelesystem access, when used appropriately, can have a
u
Failover
k
a performance
ab benefit over global file system access. There is overhead in
r
y
l
e
f
s global file system infrastructure of maintaining replicated state
bdu tranthe
a
g on- information on multiple nodes simultaneously.
n
a
n
ab
1-37
Solaris 10 Zones
Solaris 10 Zones
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
LDoms and Zones
@ ent
b
u
ak Stud
y
(
A zone is a lightweight virtual machine,
in thinisthat it only appears to be an
d
u
independent instance of Solaris.
e does not have a separate kernel or
al Auzone
s
m
address space.
ka e to
g
baa nfulllivirtual
ensmachine with its own kernel and complete
An LDomais
c
b of theleSolaris OS. An LDom can do anything that a Solaris
instance
u
k
a emachine
ab can, including containing its own zones.
r
y
physical
l
f
bdu trans
a
g onn
a
nSun Cluster Distinct Zone Features
ab
Sun Cluster has three distinct ways of dealing with zones, as outlined in
the subsections below. You can mix and match zone features in the same
cluster. A particular zone can be used with only one of the features.
1-38
Solaris 10 Zones
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le HA-Containers feature
k
b
Figure
1-12
a
a
l y sfer
u
d
ab -tranAn advantage of this feature is that the zone can be treated as a
g
n non
a
completely cluster-unaware entity. Whichever applications happen to run
b
a
when the zone boots will fail over as the zone itself fails or switches from
node to node.
1-39
Solaris 10 Zones
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
l
e zones
afailover
Figure 1-13 Application
between
s
m
u
ka e to
g
n ehas
nsseveral advantages over the HA-containers
Note that this
bamodel
c
a
li
model:
b
e
u
l
k
a Applications
ab fail from zone to zone, rather than the whole zone
r
y
l
e
f
bdu transfailing over. This will result in faster failover.
a
g onn
The same application-specific code (Sun Cluster agent) can be used,
a
n
ab
1-40
Solaris 10 Zones
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Zone Cluster
This is the newest model for zones, introduced in Sun Cluster 3.2 1/09
(Update 2). Here, we think of a set of zones (across different nodes) as
forming their own cluster, a zone cluster within the normal global
cluster. Several zone clusters can exist within the global cluster, as
illustrated by Figure 1-14:
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b 1-14le Zone clusters within a global cluster
u
Figure
k
a erab
y
l
u nsf
d
b
a
tra You can accomplish many of the same tasks using a zone cluster and the
g
n
n
previous feature, with a slightly different point of view. Here, the
no
aba
configuration of the cluster applications in the zones is isolated from the
the rest of the configuration, much like the processes in a zone are isolated
from other zones.
Zone cluster is addressed in detail in the Sun Cluster 3.2 Advanced
Administration course (ES-445), rather than in this course.
1-41
By the end of this exercise, you should be able to identify Sun Cluster
hardware components located in the training lab.
Preparation
No special preparation is required for this lab.
Task
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
k tud
aaccess
y
(
If this course is being run without local
the equipment, take this
n of tthe
sSunStoCluster
i
i
d
h
opportunity to review the essentials
hardware and
u
l
e
a
software, or to familiarize
uswith the remote lab environment.
am yourself
o
k
t
ng ense
a
b
a
lic
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
no
aba
You will participate in a guided tour of the training lab. While
participating in the guided tour, you will identify the Sun Cluster
hardware components including the cluster nodes, terminal concentrator,
and administrative workstation.
1-42
Exercise Summary
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Exercise Summary
Experiences
Interpretations
Conclusions
Applications
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
1-43
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Exercise Summary
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
1-44
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 2
Objectives
y
m
om
Upon completion of this module, you should be able to:
c
ide
csa m
u
Describe the different methods for accessing
console
e
G
t
@
n
b
Configure the Sun Cluster console
deon the administration
kusoftware
u
a
t
y
workstation
n ( this S
i
d
Use the Cluster console
lu tools
e
a
s
m
u
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
ab
2-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relevance
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
2-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Additional resources The following references provide additional
information on the topics described in this module:
Sun Cluster System Administration Guide for Solaris OS, part number
820-4679 (for Sun Cluster 3.2 1/09).
Sun Cluster Software Installation Guide for Solaris OS, part number 8204677 (for Sun Cluster 3.2 1/09).
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
2-3
This section describes different methods for achieving access to the Sun
Cluster 3.2 node consoles. It is expected that a Sun Cluster 3.2
environment administrator:
Does not require node console access for most operations described
during the duration of the course. Most cluster operations require
only that you be logged in on a cluster node as root or as a user
with cluster authorizations in the Role-Based Access Control (RBAC)
subsystem. It is acceptable to have direct telnet, rlogin, or ssh
access to the node.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
Accessing Serial Port Consoles
in thon
is Traditional Nodes
d
u
al use
m
Traditional Sun Cluster
ka 3.2enodes
to usually use serial port ttyA as the
g
console.
ban licens
a
byou have
u
le a graphics monitor and system keyboard you are
k
Even
if
b
a
a
l ysupposed
erto redirect console access to the serial port or emulation thereof.
f
u
s
d
ab -tran
g
n non
a
b
a
The rule for console connectivity is simple. You can connect to the node
ttyA interfaces any way you prefer, if whatever device you have
connected directly to the interfaces does not spuriously issue BREAK
signals on the serial line.
BREAK signals on the serial port bring a cluster node to the OK prompt,
killing all cluster operations on that node.
You can disable node recognition of a BREAK signal by a hardware
keyswitch position (on some nodes), a software keyswitch position (on
midrange and high-end sersvers), or a file setting (on all nodes).
For those servers with a hardware keyswitch, turn the key to the third
position to power the server on and disable the BREAK signal.
2-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
2-5
s
) ha
y
m
om
c
sm uide
c
Administrative
e
G
Cluster Console
t
@
Console
n
b
Software
ku tude
a
y
n ( this S
i
Network
d
lu se
a
Terminal
am to u
k
Concentrator
ng ense
a
Network
b
a Interface
lic
b
e
Serial Ports
u
l
k
b
a
a
Serial port A
y fer
l
7
4
8
2
3
5
6
1
u
s
bd tran
a
g onSetup port
n
a
n
b
Node 1
Node 2
a
Setup Device
Figure 2-1
Most TCs enable you to administer TCP pass-through ports on the TC.
When you connect with telnet to the TCs IP address and pass through
port, the TC transfers traffic directly to the appropriate serial port
(perhaps with an additional password challenge).
2-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
c
e
The Sun TC supports an extra level of passwordcchallenge,
sm uiadper-port
e
G
password that you have to enter before going
through
to the serial port.
t
@
n
b
ku tude
a
y
Full instructions about installing(and configuring
the Sun TC are in
n this S
i
d
Appendix A, Terminal Concentrator.
lu se
a
am to u
k
ng Concentrators
se
Other Terminal
a
n
b
e
a
lic
b
e
u
l
kYou can
b any type of TC as long as it does not issue BREAK signals
a
achoose
r
y
l
e
f
s the serial ports when it is powered on, powered off, reset, or any other
bdu tranon
a
- time that might be considered spurious.
ang non
# telnet tc-ipname 5002
If your TC cannot meet that requirement, you can still disable recognition
of the BREAK signal or enable an alternate abort signal for your node.
Some terminal concentrators support Secure Shell (the Sun NTS does not
support Secure Shell). This might influence your choice, if you are
concerned about passing TC traffic in the clear on the network.
2-7
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Use dumb terminals for each node console. If these are in a secure
physical environment, this is certainly the most secure, but least
convenient, method.
s
) ha
y
m
om
c
node1:\
csm Guide
e
@ ent
:dv=/dev/term/a:br#9600:el=^C^S^Q^U^D:ie=%$:oe=^D:
b
u
node2:\
ak Stud
y
(
:dv=/dev/term/b:br#9600:el=^C^S^Q^U^D:ie=%$:oe=^D:
in this
d
u
This allows you to access
econsoles by accessing the launchpad
al node
s
m
u
workstation and
kamanually
to typing tip node1 or tip node2.
g
e
s a Solaris OS workstation instead of a TC is
One advantage
ban liceofnusing
a
that
tighten the security in the Solaris OS workstation.
b it is easier
e youto could
u
l
k
b
For
example,
easily disable telnet and rlogin access and
a era
y
l
f
that administrators access the tip launchpad through Secure
bdu transrequire
a
Shell.
ang non
ab
2-8
Servers such as Sun Fire V890: you can choose to have console access
through the Remote System Control (RSC) device and software
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
2-9
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
as
h
The console software includes a common window feature that lets you issue
)
y
keystrokes simultaneously to all the nodes in the cluster (or even tom
all the
om
nodes in multiple clusters).
c
sm uide
c
e
G
The Sun Cluster 3.2 software environment itself
has no dependency
on the
t
@
n
b
e an administrative
administration workstations console software.
ku Ittuisdjust
a
y
convenience.
n ( this S
i
d
lu se
a
am to u
Console Software
Installation
k
ng ense
a
b
a
licconsole software is contained in a single package,
b
The u
administrative
e
l
k raThe
b SUNWccon package is installed manually from the Sun
a
SUNWccon.
y
l
e
f
s 3.2. There are internationalized packages as well (SUNWjccon,
n
bdu trCluster
a
a
- SUNWkccon, and so on) but you always have to install SUNWccon first.
ang non
ab
2-10
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
o
c
want to
In certain scenarios, some tools might be unusable, but
you might
e
m
d
s
i
c toGyou.
install this software to use the tools that makeesense
u
t
@
b den
u
k
For example, if you are using dumb
tuto attach to the node
(yaterminals
S
consoles, you will not be ableinto use the
cconsole
variation, but you can
is
d
h
t
u
use the other three after
e are booted.
althe nodes
s
m
u
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
ab
2-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
All the tools have the same general look and feel. The tool automatically
shows one new window for each node, and a small common keystroke
window (Figure 2-2). You can type in each individual window as desired.
Input directed to the common window is automatically replicated to all
the other windows.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Figure 2-2
2-12
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
As shown, you can use the tools manually to connect to a single cluster
node or to the entire cluster.
#
#
#
#
#
s
) ha
y
m
om
c
ideoperation.
csm Gforubest
Set the TERM environment variable to vt100 oredtterm
@ ent
b
u
ak Stud
y
(
Cluster Console Common
in Window
d
his
t
u
l
e
a us
m
a
The common window,
k eshown
to in Figure 2-3, allows you to enter
g
commands
all host
at the same time. All of the
nssystemso windows
baarentotied
e
windows
together,
when
you
move the common window, the
c
a
li
b
e
u
l
khost windows
b follow. The Options menu allows you to ungroup the
a
a
r
y
windows,
l
e move them into a new arrangement, and group them again.
f
u
s
d
ab -tran
g
an non
Each node in the cluster has a host window. You can enter commands in
each host window separately.
ab
Figure 2-3
2-13
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
k tud
Figure 2-4 Cluster Control Panel (ya
n this S
i
d
lu Panel
e
a
s
Starting the Cluster Control
m
u
ka e to
g
an cControl
To start thebCluster
ns Panel, type the following command:
e
a
li
e
u
l
#b
/opt/SUNWcluster/bin/ccp
[clustername] &
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
2-14
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
When you install the Sun Cluster console software on the administrative
console, you must manually create the clusters and serialports files
and populate them with the necessary information.
s
) ha
y
m
om
c
2-15
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ab
2-16
s
) ha
y
m
om
c
Preparation
csm Guide
e
t is already installed
n
bOS@software
This exercise assumes that the Solarisk10
e
u
a the following
tud steps to prepare for
on all of the cluster systems. Perform
y
(
S
in this
the lab:
d
u
e assigned to your cluster.
al for the
s
m
u
1. Ask your instructor
name
ka e to
g
s
Cluster
n_______________________________
banname:
e
c
a
b Recordletheli information in Table 2-1 about your assigned cluster
2.
u
k
a ebefore
ab proceeding with this exercise.
r
y
l
f
s
bdu tranTable
a
2-1 Cluster Names and Addresses
g onn
a
n
ab
System
Name
IP Address
Administrative
console
TC
Node 1
Node 2
Node 3 (if any)
2-17
Ask your instructor for the location of the Sun Cluster software.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
1. If necessary, edit the /etc/hosts file on your administrative
c
mTC uand
console, and add the IP addresses and names of
sthe
idethe host
c
e
G
systems in your cluster.
t
@
n
b
e hosts has files
dfor
kufile entry
2. Verify that the /etc/nsswitch.conf
u
a
t
y
( service.
SConsult your instructor
listed first before any otherin
name
s
i
d
h
t such as dns should be used.
about whether any other
lu nameseservice,
a
m to u
hosts: fileska
dns
ng ense
a
b
a
lic
b
e
u
l
Task a
2k Installing
the Cluster Console Software
b
a
r
y
ul nsfe
d
b
a
the following steps to install the cluster console software:
a
trPerform
g
n
n
a
no
Perform the following steps:
ab
1.
3.
(# or $) cd sc32_location/Solaris_{sparc_or_x86}/Products
(# or $) cd sun_cluster/Solaris_10/Packages
2-18
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
# ls -d SUNWccon
SUNWccon
5.
as
h
1. Verify that the following search paths and variables are present
in
)
y
m
the .profile file in your home directory:
om
c
PATH=$PATH:/opt/SUNWcluster/bin
MANPATH=$MANPATH:/opt/SUNWcluster/man
csm Guide
e
export PATH MANPATH
@ ent
b
u
ak Stud
y
(
n in your
ifile
Note Create the .profile
d
hishome directory if necessary, and
t
u
l
e
add the changes. ma
us
a
o
k
t
ngthe .profile
se file to verify changes:
2. Execute
a
n
b
e
a
ic
b
(# orle$)l . $HOME/.profile
u
k rab
a
y
ul nsfe
d
b
a
tra Note You can also log out and log in again to set the new variables.
g
n
n
a
no
ab
2-19
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Edit the /etc/clusters file, and add a line using the cluster and
node names assigned to your system.
Note If you are using a remote lab environment, the /etc/clusters file
might already be set up for you. Examine the file.
s
) ha
y
m
om
c
csm Guide
hostname tcname tcport
e
@ ent
b
u
k tud
Sample /etc/serialports File (ya
S
n
s
i
i
d
h
t
pnode1
cluster-tc
lu s5002
e
a
pnode2
cluster-tc
5003
am to u 5004
k
pnode3
cluster-tc
ng ense
a
b
a the following
lic to configure the /etc/serialports file:
b
Perform
e
u
l
k rab
a
y
ul nsfeEdit the /etc/serialports file and add lines using the node and
d
b
TC names assigned to your system.
a
tra
g
n
n
a
no
The /etc/serialports file has an entry for each cluster host describing
the connection path. This example is for a three-node cluster using a Sun
NTS.
ab
2-20
Note In the remote lab environment, this file might already be set up for
you. Examine the file.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Make sure power is on for the TC and all of the cluster hosts.
2.
ab
as
Note Substitute the name of your cluster for clustername. Consult
your
h
)
y so you
instructor about whether the console access device supports ssh;
if
m
sm uand
idepress the
cwindow,
e
3. Place the cursor in the cconsole Common
G
t
@
n
b
Return key several times. You should
see
a
response
on all of the
u ude
k
a
cluster host windows. If not,
ask
your
instructor
for
assistance.
t
(y is S
n
i
4. If your console device
th dedicated interface, you might
udis anseALOM
l
a
need to enter an
command
to access the actual node consoles.
mALOM
u
a
o
k
t
Consult g
your instructor.
n
se
a
n
b
e
5. Ifathe cluster
lic host systems are not booted, boot them now.
b
e
u
l
k ok
bboot
a
a
r
y
ul n6.sfeAfter all cluster host systems have completed their boot, log in as
d
b
a
tra
user root.
g
n
n
o
a
n
7.
2.
3.
2-21
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
2-22
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 3
Objectives
ab
y
m
om
Upon completion of this module, you should be able to:
c
idehardware
csm Guand
List the Sun Cluster software boot disk requirements
e
@ ent
restrictions
b
u
k tud
atopologies
y
Identify typical cluster storage
(
n this S
i
d
Describe quorum a
votes
lu andsequorum devices
u reservations and cluster amnesia
am quorum
o
Describe persistent
k
t
ngdataefencing
se
a
n
Describe
b
a
lic
b
e
u
l
k Configure
b a supported cluster interconnect system
a
a
r
y
ul nsfeIdentify public network adapters
d
b
a
tra
Configure shared physical adapters
g
n
n
a
no
3-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relevance
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
3-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Additional resources The following references provide additional
information on the topics described in this module:
Sun Cluster System Administration Guide for Solaris OS, part number
820-7458 (for Sun Cluster 3.2 11/09).
Sun Cluster Software Installation Guide for Solaris OS, part number 8207356 (for Sun Cluster 3.2 11/09).
Sun Cluster Concepts Guide for Solaris OS, part number 821-0259 (for
Sun Cluster 3.2 11/09)
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
3-3
You must plan your cluster installation before you install the Solaris OS on
your cluster nodes. If you install Solaris blindly on cluster nodes you
are likely to miss several cluster-specific considerations and requirements,
outlined in the following subsections.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
d 10 OS (revisions
ak 9), S
The Solaris 9 OS 9/05 (Update (8yand
and
tuSolaris
vary, listed in Module 1) d
are
insupported:
his
t
u
l
e
a of theusSolaris OS, including the update
The same version
m
a
k example,
to Solaris 10 11/09), must be installed on all
revision
(for
g
e
s
nodes
ban inlictheencluster.
a
b VERITAS
u
le Dynamic Multipathing (DMP) is not supported.
k
b
a
a
l y sferSee Module 6, Using VERITAS Volume Manager With Sun
u
d
ab -tran Cluster Software for more details about this restriction.
g
n non
a
The supported versions of VERITAS Volume Manager must
b
a
have the DMP device drivers enabled, but Sun Cluster 3.2
software still does not support an actual multipathing topology
under control of Volume Manager DMP.
3-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
c
csm Guide
e
t
n
b@
e
u
Note The /globaldevices mount k
point
is modified
during the Sun
d
u
a
t
y
Cluster 3.2 software installation.(It is automatically
to
n twhere
s Snodeid renamed
i
i
d
h
/global/.devices/node@nodeid,
represents
the
u se
l
a
number that is assigned
m totoa node
u when it becomes a cluster member.
a
k
The original /globaldevices
mount point is removed. The
g nse
n
a
/globaldevices
file
system
must
have ample space and ample inode
b lice
a
capacity
b forlecreating both block-special devices and character-special
u
k
b is especially important if a large number of disks are in the
devices.
a eraThis
y
l
f
s A file system size of 512 Mbytes should suffice for even the largest
bdu trancluster.
a
- cluster configurations.
ang non
Starting in Sun Cluster 3.2 1/09 you can choose to use a lofi
device rather than a dedicated partition for the
/global/.devices/node@nodeid file system. A lofi device is
a virtual disk device that uses a file as the backing store for the
entire contents of a file system. If you choose this option, do not
create a /globaldevices placeholder. You will then be able to
choose the lofi option as you build the cluster using scinstall,
as discussed in Module 4.
Note scinstall will automatically provision the backing store for the
lofi device in a file named /.globaldevices. While 512MB is still
recommended when you use a dedicated partition, scinstall uses
100MB as the size of the backing store when you use a lofi device.
3-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
sm uide
c
e
# example Jumpstart profile no ZFS root
but not G
@
n
b
e
u
# dedicated /globaldevices --- will
choose
lofi in scinstall
d
k
a Stu
install_type initial_install (y
n
system_type standalone udi
his
t
l
e
a us
partitioning explicit
m
a
k e to
cluster SUNWCXall
g
filesys c0t0d0s0
an cefree
ns /
b
a
filesys
c0t0d0s1
li 1024 swap
b
e
u
l
k
filesys
32
a erc0t0d0s7
ab
y
l
f
bdu trans
a
ang non Note The logging option is the default starting in Solaris 9 9/04
ab
3-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
m
o
c
3-7
While previous versions of the Sun Cluster software had strict rules
regarding how many nodes were supported in various disk topologies,
the only rules in the Sun Cluster 3.2 software regarding the data storage
for the cluster are the following:
Sun Cluster software never supports more than sixteen nodes. Some
storage configurations have restrictions on the total number of nodes
supported.
as
Shared storage devices do not need to connect to all nodes of the) h
ytwo
cluster. However, these storage devices must connect to at least
m
nodes.
om
c
csm Guide
e
@ ent
b
Cluster Topologies
u
ak Stud
y
(
din ways
hiniswhich cluster nodes can be
Cluster topologies describe ltypical
t
u
e
adevices.uWhile
s Sun Cluster does not require you
connected to data storage
m
a
o
k
t
to configure a cluster
using
specific topologies, the following
g bynsto
eprovide
ndescribed
a
topologies b
are
the vocabulary to discuss a clusters
e
c
a
i
l
connection
b scheme.
e The following are some typical topologies:
u
l
k
b
ra pairs topology
ya Clustered
l
e
f
u
s
bd tran Pair+N topology
a
g onn
a
n
N+1 topology
ab
3-8
Non-storage topology
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Switch
s
) ha
y
m
om
c
Node 3
Node 4 ide
Node 2
Node 1
csm
u
e
G
t
@
b den
u
k
ya Stu
(
n
di e this
u
l
a us
m
a
k e to
g
Storage an Storage
Storage
Storage
b licens
a
b 3-1 le Clustered Pairs Topology Configuration
u
Figure
k
a erab
y
l
u nsf
d
b
a
tra The features of clustered pairs configurations are as follows:
g
n
n
no
Nodes are configured in pairs. You can have any even number of
aba
All nodes are part of the same cluster. You are likely to design
applications that run on the pair of nodes physically connected to the
data storage for that application, but you are not restricted to this
design.
Because each pair has its own storage, no one node must have a
significantly higher storage capacity than the others.
The cost of the cluster interconnect is spread across all the nodes.
3-9
Pair+N Topology
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Switch
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
Storage
al use
Storage
m
ka e to
g
n eTopology
Figure 3-2 ba
Pair+N
ns
c
a
li
b
e
u
l
k
a features
abof the Pair+N configurations are as follows:
The
r
y
l
e
f
bdu transAll shared storage is connected to a single pair.
a
g onn
a
Additional cluster nodes support scalable data services or failover
n
ab
Node 1
Node 2
Node 3
Node 4
data services with the global device and file system infrastructure.
3-10
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
N+1 Topology
The N+1 topology, shown in Figure 3-3, enables one system to act as the
storage backup for every other system in the cluster. All of the secondary
paths to the storage devices are connected to the redundant or secondary
system, which can be running a normal workload of its own.
Switch
Switch
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
Storage
Storage
Storage
g
n
s
ba licen
a
b 3-3 le N+1 Topology Configuration
Figure
u
k
a erab
y
l
f
u nThe
s
d
b
a features of the N+1 configurations are as follows:
a
r
t
g
n non
a
The secondary node is the only node in the configuration that is
b
a
Node 1
Primary
Node 2
Primary
Node 3
Primary
Node 4
Secondary
The backup node is more cost effective because it does not require
additional data storage.
3-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
In a scalable, or N*N topology, shown in Figure 3-4, more than two nodes
can be physically connected to the same storage.
Switch
Switch
as
Node 3
Node 4y) h
Node 2
Node 1
m
m
co e
m
cs Guid
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
Storage
Storage
g
n
s
ba licen
a
b
u
le
k
b
a
a
Figure
3-4
Scalable
Storage Topology
y fer
l
u
s
bd tran
a
g on- This configuration is required for running the ORACLE Real Application
n
a
n
Clusters (RAC) across more than two nodes.
ab
For ordinary, cluster-unaware applications, each particular disk group or
diskset in the shared storage still only supports physical traffic from one
node at a time. However, having more than two nodes physically
connected to the storage adds flexibility and reliability to the cluster.
3-12
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Switch
s
) ha
y
m
om
c
e
cs3 m GuidNode
Node 1
Node 2
Ne
ode
4
t
@
b den
u
k
ya Stu
(
Network (not the cluster tranport)
n
di e this
u
l
a us
m
a
k e to
g
ban licens
a
NAS Device (Sun or Netapp)
b
e
u
l
k
b
ya fera
l
u
s 3-5 NAS Device-Only Topology
bd tranFigure
a
g onn
a
n
ab
Note There is support for using a NAS device as a quorum device, and
support for NAS data fencing. These concepts are described in more detail
later in this module.
To support the specific NetApp Filer implementation you must install a
package called NTAPclnas on the cluster nodes. This package is available
for NetApp customers with a support contract from
http://now.netapp.com.
3-13
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Switch
s
) ha
Switch
y
m
Node 1
Node
om2
c
csm Guide
e
Data Replication
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
kaStorage
toReplication Medium
g
e
an cfiber,
nspublic network, or some combination)
b(Private
e
a
li
b
e
u
l
k
a erab
y
l
u nsf
d
b
a 3-6 Data Replication Topology
a
trFigure
g
n
n
no
aba
At the time of the writing this course, the supported mechanisms for
performing the data replication are Hitachi TrueCopy, Hitachi Universal
Replicator and EMC SRDF,
The data replication topology is ideal for wider area clusters where the
data replication solution is preferred to the extra connectivity that would
be involved to actually connect the storage to nodes that are far apart.
This topology would be ideal with the quorum server feature introduced
in Sun Cluster 3.2.
3-14
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Non-Storage Topology
This can be suitable for an application that is purely compute-based and
requires no data storage. Prior to Sun Cluster 3.2, two-node clusters
require shared storage because they require a quorum device. Starting with
Sun Cluster 3.2, you could choose to use a quorum server device instead,
described later in this module.
s
) ha
ab
y
m
om
c
csm Guide
e
tto manage a cluster,
@ how
Single node clusters are ideal for usersu
learning
n
b
e
d
k agenttudevelopment
to observe cluster behavior (possibly
purposes), or
afor
y
(
S
to begin a cluster with the intention
of
adding
nodes
as
time
goes on.
n
i
is
d
h
t
u
al use
m
Sun Cluster 3.2 provides,
o the first time, the ability to experience
ka even
tfor
g
e
application n
failovers,
s on a single-node cluster; you could have an
a
n
b
e
application
a thatlicfails over between different non-global zones on the node.
b
u
le
k
b
a
a
l y Single
ernode clusters can also be useful in the Sun Cluster Geographic
f
u
s
d
Edition product, which manages a partnership of two clusters with data
ab -tranreplication
g
across a wide area. Each member of such a partnership must
an non
be a full Sun Cluster installation, and a one-node cluster on either or both
ends is acceptable.
3-15
Sun Cluster Geographic Edition allows you to implement a disasterrecovery scenario by forming a conceptual cluster of clusters across a
wide area. Application data is then replicated using data replication.
A typical scenario using Sun Cluster Geographic Edition is illustrated in
Figure 3-7:
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in tPrimary
Figure 3-7 Data Replication d
Between
his and Secondary Clusters
u
l
e
a us
m
a
o software has the following
k e tEdition
The Sun Cluster g
Geographic
properties: an
b licens
a
b Cluster
Sun
u
le Geographic Edition software is configured on top of
k
b
a
a
l y sstandard
er Sun Cluster software on the participating clusters.
f
u
d
ab -tran Exactly two clusters are involved in the relationship shown in the
g
n non
diagram, and are said to form a partnership.
a
b
a
3-16
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
co e
Figure 3-8 Each Cluster is Primary for a Differentm
Application
cs Guid
e
t
@ it isepossible
n
b
While each partnership has only two clusters,
for a single
u
d
k
u
a
cluster to be a member of different
partnerships,
as
shown
in
figure
t
y
(
S
n
Figure 3-9
di e this
u
l
a us
m
a
k e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Figure 3-9
3-17
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
3-18
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
Quorum server quorum devices.
c
ide votes
csmofGallupossible
There must be a majority (more than 50 percent
e
t
present) to form a cluster or remainbin@
a cluster.
n
e
u
ak Stud
y
(
in this
d
u
Why Have Quorum Voting
e All?
al usat
m
ka e to
g
n presented
Given thearules
ns in the bulleted items listed in the previous
b
e
c
a
section,
it is clear
li by looking at a simple two-node cluster why you need
b quorum
e
u
l
extra
k
b device votes. If a two-node cluster had only node votes, then
a
a
r
y
feneed to have both nodes booted to run the cluster. This defeats one of
ul nyou
s
d
b
the
a major goals of the cluster, which is to be able to survive node failure.
a
r
t
g
an non
But why have quorum voting at all? If there were no quorum rules, you
could run as many nodes in the cluster as were able to boot at any point in
time. However, the quorum vote and quorum devices solve the following
two major problems:
Failure fencing
Amnesia prevention
These are two distinct problems and it is actually quite clever that they are
solved by the same quorum mechanism in the Sun Cluster 3.x software.
Other vendors cluster implementations have two distinct mechanisms for
solving these problems, making cluster management more complicated.
3-19
Failure Fencing
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Node 1 (1)
s
) ha
y
m
CCR Database
CCR Database
om
c
Quorum
Quorum
cs=m Guide
device
device =
e
@ ent
b
u
ak Stud
y
(
in this
QD(1)
d
u
al use
m
ka eStorage
to array
g
n ens
baFailure
Figure 3-10
a
lic Fencing
b
e
u
l
k rab
a
y
e
ul nsfPrevention
d
Amnesia
b
a
tra
g
n
n
no If it were allowed to happen, a cluster amnesia scenario would involve one
aba
Interconnect
or more nodes being able to form the cluster (boot first in the cluster) with
a stale copy of the cluster configuration. Imagine the following scenario:
1.
2.
3.
4.
You try to boot Node 2 to form a new cluster. If allowed, the cluster
would have lost configuration changes.
There is more information about how quorum votes and quorum devices
prevent amnesia in Preventing Cluster Amnesia With Persistent
Reservations on page 3-31.
3-20
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
m greater
Quorum devices are not required in clusters
swith
idethan two
c
u
e
G availability.
nodes, but they are recommended for@
higher cluster
t
n
b
ku tude configured by
A single quorum device can be
automatically
a
y
S using a shared disk quorum
scinstall, for a two-node
only,
n (cluster
s
i
i
d
h
device only.
lu se t
a
u are manually configured after the Sun
am devices
o
All other quorum
k
t
g nsinstallation
e
nsoftware
Cluster
is complete.
a
b
e
c
a
li devices are configured (specified) using DID device
b Disk quorum
e
u
l
k
a enames.
ab
r
y
l
f
bdu trans
a
g onn
a
n Quorum Mathematics and Consequences
ab
The total possible quorum votes (number of nodes plus the number of
disk quorum votes defined in the cluster)
The total needed quorum votes, which is greater than 50 percent of the
possible votes
3-21
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
A node that cannot find the needed number of votes at boot time
freezes waiting for other nodes to join to obtain the needed vote
count.
A node that is booted in the cluster but can no longer find the needed
number of votes kernel panics.
s
) ha
y
m
om
c
Interconnect
csm Guide
e
@ ent
b
u
Node 1 (1)
ak Stud Node 2 (1)
y
(
in this
d
u
al use
m
ka e to
g
QD(1)
ban licens
a
b
u
le
k
b
a
a
Storage Array
y fer
l
u
s
bd trFigure
an 3-11 Two-Node Cluster Quorum Devices
a
g
n non
a
b
a
3-22
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Switch
Node 1
(1)
Node 2
(1)
Node 3
(1)
Node 4
(1)
s
) ha
y
m
m
o
c
QD(1)
e
m
d
s
i
ec t Gu
@
QD(1)
QD(1)
b den
u
k
Sun StorEdgeya
( is Stu
MultiPackin
System
lud se th
a
u
Figure 3-12 Clustered-Pair
Devices
am toQuorum
k
ng ense
a
b
aare manylicpossible split-brain scenarios. Not all of the possible
There
b
e
u
lcombinations
split-brain
allow the continuation of clustered operation.
k
b
a
a
r
y
Thefe
following is true for a clustered pair configuration without the extra
ul nquorum
s
d
b
device shown in Figure 3-12.
a
a
r
t
g
n non
a
There are six possible votes.
b
a
One quorum device from each pair was configured to allow one
node from each pair together to form the cluster and to keep the
cluster up.
If both quorum devices fail, the cluster can still come up.
The nodes wait until all are present (booted).
If Nodes 1 and 2 fail, there are not enough votes for Nodes 3 and 4 to
continue running.
3-23
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Switch
Node 1
(1)
Node 2
(1)
Node 3
(1)
Node 4
(1)
s
) ha
y
m
QD(1)
om
c
sm uide
c
e
G
QD(1)
t
@
n
b
ku tude
a
QD(1)
y
n ( this S
i
d
lu se
a
m toDevices
Figure 3-13 Pair+N a
Quorum
u
k
ng ense
a
b
The following
a is true
lic for the Pair+N configuration shown in Figure 3-13:
b
e
u
l
k Thereraare
b three quorum disks.
a
y
l
e
f
bdu transThere are seven possible votes.
a
g onn
A quorum is four votes.
a
n
ab
3-24
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Switch
Node 1
(1)
Node 2
(1)
Node 3
(1)
s
) ha
y
m
om
c
csm Guide
e
QD(1)
QD(1)
@ ent
b
u
ak Stud
y
(
in this
d
u
e
al Devices
Figure 3-14 N+1 Quorum
s
m
u
ka e to
g
The following
ban lisictrue
ensfor the N+1 configuration shown in Figure 3-14:
a
b Thereleare five possible votes.
u
k
a erab
y
l
u nsf A quorum is three votes.
d
b
a
tra
g
If Nodes 1 and 2 fail, Node 3 can continue.
n
n
o
a
n
b
a
3-25
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Switch
Node 1
(1)
Node 2
(1)
Node 3
(1)
s
) ha
y
m
om
c
sm uide
c
e
QD(2)
G
t
@
n
b
ku tude
a
y
( is SStorage Topology
Figure 3-15 Quorum Devices ininthe Scalable
d
lu se th
a
u devices shown in Figure 3-15:
aformthe quorum
The following is true
o
k
t
g nse
The a
single
banquorum
e device has a vote count equal to the votes of the
c
i
l
b
unodes directly
le attached to it minus one.
k
b
a
a
l y sfer
u
d
an This rule is universal. In all the previous examples, there were two
ab -trNote
g
n non nodes (with one vote each) directly connected to the quorum device, so
a
b
a
Note It would seem that in the same race, Node 2 could win and
eliminate both Nodes 2 and 3. The section entitled Intentional
Reservation Delays for Partitions With Fewer Than Half of the Nodes on
page 3-37 shows why this is unlikely.
3-26
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Switch
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tranFigure 3-16 NAS Device Used as a Quorum Device
g
n non
a
b
a
Node 1 (1)
Node 2 (1)
Node 3 (1)
Node 4 (1)
Sun NAS uses the native iSCSI built into Solaris 10. You can not use
Sun NAS as quorum device in Solaris 9.
Note At the time of writing this course, you can only use Sun NAS 5200
and 5300 as a 2-node quorum device. Its iSCSI LUNs do not fully support
the SCSI-3 PGR. protocol required for a quorum device attached to more
than two nodes. No other supported NAS devices have this restriction.
3-27
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
On the NAS device side, the requirements for operation as a Sun Cluster
quorum device are as follows:
You must install the iSCSI license from your NAS device vendor.
You must configure an iSCSI Logical Unit (LUN) for use as the
quorum device.
When booting the cluster, you must always boot the NAS device
before you boot the cluster nodes.
A cluster can use a NAS device for only a single quorum device.
There should be no need for other quorum devices. This is true
because, in a cluster of more than two nodes, the quorum acts like a
SCSI-3 quorum device attached to all the nodes.
s
) ha
y
m
om
c
3-28
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
Node 1 (1) am
Node 2 (1)
Node 3 (1)
Node 4 (1)
o
k
t
ng ense
a
b
c transport)
a thelicluster
b
Network (not
e
u
l
k rab
a
y
ul nsfe
d
b
scqsd daemon (3 votes for this cluster)
a
tra
g
[ can be quorum for other clusters too ]
n
n
o
a
n
b
a
Switch
3-29
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
A quorum server can be used on any cluster where you prefer the
logic of having a single cluster quorum device with quorum device
votes automatically assigned to be one fewer than the node votes.
For example, with a clustered pairs topology, you might prefer the
simplicity of a quorum server quorum device. In that example, any
single node could boot into the cluster by itself, if it could access the
quorum server. Of course, you might not be able to run clustered
applications unless the storage for a particular application is also
available, but those relationships can be controlled properly by the
application resource dependencies that we will learn about in
Module 10.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
3-30
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
3.
s
) ha
y
m
m allowed
ide to boot
cswere
In this simple scenario, the problem is that if you
u
e
G
t
@
Node 2 at the end, it would not have thebcorrect
copy
of the CCR. Node 2
n
e is no other copy
dthere
ku(because
would have to use the copy that it a
has
u
t
y
( changes
Sto the cluster configuration
available) and you would loseinthe
s
i
d
h
made in Step 2.
lu se t
a
am to u
k
e quorum involves persistent reservations that
The Sun Cluster
ng software
sbooting
a
n
b
e
prevent
Node
2
from
into the cluster. It is not able to count the
c
a
i
l
b
quorum
device
u
le as a vote. Therefore, Node 2 waits until the other node
k
b
a
a
boots
to
achieve
the correct number of quorum votes.
y fer
l
u
s
bd tran
a
ang non
ab
3-31
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Survives even after the quorum device itself is powered on and off
Clearly, this involves writing some type of information on the disk itself.
The information is called a reservation key and is as follows:
s
) ha
y
m
om
c
e
Exactly one nodes key is recorded on the devicesm
reservation
idany
c as the
u
holder, but this node has no special priviligesegreater
than
other
G
t
@
n
b
registrant. You can think of the reservation
e as the last node to
u holder
d
k
u
a
t
ever manipulate the keys, but the
(y reservation
S holder can later be
n
s
i
i
fenced out by another registrant.
lud se th
a
u
am
Figure 3-18 and Figure
3-19 onto
page 3-33 consider two nodes booted into a
k
ngto aequorum
se device.
cluster connected
a
n
b
a
lic
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
Node 2
tra Node 1
g
n
n
o
a
n
ab
Quorum Device
Node 1 key
Node 2 key
3-32
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
If Node 1 needs to fence out Node 2 for any reason it will preempt Node
2s registered key off of the device. If a nodes key is preempted from the
device, it is fenced from the device. If there is a split brain, each node is
racing to preempt the others key.
Node 1
Node 2
Quorum Device
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
n Cluster
ithe
Figure 3-19 Node 2 Leaves
d
his
t
u
l
e
a us
m
a
to is clear. The reservation is persistent, so if a
Now the rest g
of k
the equation
e
s cluster, a node cannot count the quorum device
node is b
booting
an into
nthe
e
c
a
i
vote
key is already registered on the quorum device.
b unlessleitslreservation
u
k
a Therefore,
ab in the scenario illustrated in the previous paragraph, if Node 1
r
y
l
e
f
subsequently
goes down so there are no remaining cluster nodes, only
u ns
d
b
1s key remains registered on the device. If Node 2 tries to boot first
a
tra Node
g
n
n
into
the
cluster, it will not be able to count the quorum vote, and must
o
a
n
b
a
wait for Node 1 to boot.
Node 1 key
Node 2 key
After Node 1 joins the cluster, it can detect Node 2 across the transport
and add Node 2s reservation key back to the quorum device so that
everything is equal again.
A reservation key only gets added back to a quorum device by another
node in the cluster whose key is already there.
3-33
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Sun Cluster 3.2 supports both SCSI-2 and SCSI-3 disk reservations. The
default policy is called pathcount:
Disks to which there are more than two paths (for example, any disk
with physical connections from more than two nodes) must use
SCSI-3.
Module 5 describes how you can change the first of these policies so that
you could use SCSI-3 even for disks with only two paths. The next several
subsections outline the differences between SCSI-2 and SCSI-3
reservations
s
) ha
y
m
om
c
e
SCSI-2 Reservations and SCSI-2 Persistent Group
Reservation
csm G
uid
e
Emulation (PGRE)
@ ent
b
u
d
aaksimple
tureservation
SCSI-2 reservations themselves provide
mechanism
y
(
S
n out
s
i
i
(first one to reserve the deviced
fences
the
other
one)
but
it
is not
h
t
u
l
e
persistent and does not involve
a registered
s keys. In other words, SCSI-2 is
u
amfencing
sufficient to supportkthe
goals
in Sun Cluster but does not include
o
t
g
e
the persistence
required to implement amnesia prevention.
ban licens
a
b
e
u
lamnesia
To
implement
prevention using SCSI-2 quorum devices,
k
b
a
a
r
y
Cluster
fe must make use of Persistent Group Reservation Emulation
ul Sun
s
d
n
(PGRE)
b
a to implement the reservation keys. PGRE has the following
a
r
t
g
an non characteristics:
ab
Reservation keys are written (by the Sun Cluster software, not
directly by the SCSI reservation mechanism) on private cylinders of
the disk (cylinders that are not visible in the format command, but
are still directly writable by the Solaris OS).
The reservation keys have no impact on using the disk as a regular
data disk, where you will not see the private cylinders.
3-34
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
e two
m more
idthan
With more than two disk paths (that is, anycs
time
u
e
Guse SCSI-3.
nodes are connected to a device), Sun@
Cluster n
must
t
b
ku tude
a
y
( is S
n
i
d
SCSI-3 PGR Scenario
More
th Than Two Nodes
luWith
e
a
am to us
k
In Figure 3-20,
ngfourennodes
se are all physically connected to a quorum drive.
a
b
Remember
the
single
c quorum drive has three quorum votes.
a
i
l
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran Node 1
Node 3
Node 4
g
Node 2
an non
ab
Node 1 key
Node 2 key
Node 3 key
Node 4 key
Quorum Device
3-35
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
In each pair, the node with the lower reservation key tries to eliminate the
registered reservation key of the other pair. The SCSI-3 protocol assures
that only one pair will remain registered (the operation is atomic). This is
shown in Figure 3-21.
Node 1
Node 2
Node 3
Node 4
s
) ha
y
m
om
c
sm uide
c
e
G
Quorum Device
t
@
n
b
Node 1 key
ku tud(3evotes)
a
Node 2 key
y
n ( this S
i
Node 3 key
d
u se
Nodea
4lkey
am to u
k
ng ense
a
b
a OnelPair
Figureb3-21
ic of Nodes Eliminating the Other
e
u
l
k rab
a
y
e
fdiagram,
ul In n
the
Node 1 has successfully won the race to eliminate the
s
d
b
a
a
keys
for
Nodes
2
and 4. Because Nodes 2 and 4 have their reservation key
r
t
g
n
n
they cannot count the three votes of the quorum device.
no eliminated,
aba
Because they fall below the needed quorum, they will kernel panic.
Cluster amnesia is avoided in the same way as in a two-node quorum
device. If you now shut down the whole cluster, Node 2 and Node 4
cannot count the quorum device because their reservation key is
eliminated. They would have to wait for either Node 1 or Node 3 to join.
One of those nodes can then add back reservation keys for Node 2 and
Node 4.
3-36
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
ab
om
c
idetalk to each
Imagine the same scenario just presented, but three
nodesu
can
csm
e
Gas shown in
other while the fourth is isolated on the cluster
transport,
t
@
n
b
Figure 3-22.
ku tude
a
y
n ( this S
i
d
lu seNode 3
a
m 2to u (isolated)
aNode
Node 1
Node 4
k
g
e
(delay)
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
Quorum Device
an non
Node 1 key
Node 2 key
Node 3 key
Node 4 key
3-37
Data Fencing
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Data Fencing
As an extra precaution, nodes that are eliminated from the cluster because
of quorum problems also lose access to all shared data devices.
The reason for this is to eliminate a potential timing problem. The node or
nodes that remain in the cluster have no idea whether the nodes being
eliminated from the cluster are actually still running. If they are running,
they will have a kernel panic (after they recognize that they have fallen
beneath the required quorum votes). However, the surviving node or
nodes cannot wait for the other nodes to kernel panic before taking over
the data. The reason nodes are being eliminated is that there has been a
communication failure with them.
s
) ha
y
m
data
data corruption, before a surviving node or nodes reconfigures
the
e
m
d
s
i
c from
and applications, it fences the eliminated node or e
nodes
uall shared
G
t
@
data devices, in the following manner:
b den
u
k
u
treservation
ya SCSI-2
With the default pathcount policy,
is used for
(
S
n
s
i
i
two-path devices and SCSI-3
devices
th with more than two paths.
lud for
e
a
s SCSI-3 even if there are only two
mpolicy
uuse
You can change a
the
to
o
k
t
paths (seenModule
g n5).
se
a
b
e
a do uselthe
Ifbyou
ic default SCSI-2 for a two-path device, data fencing is
e
u
l
k just rthe
breservation and does not include any PGRE.
a
a
y
feNetApp Filer NAS devices, a surviving node informs the NAS
ul nsFor
d
b
a
tra device to eliminate the NFS share from the eliminated node or nodes.
g
n
n
a
no
ab
3-38
Data Fencing
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
sm uide
c
e
Quroum Device on a Disk with No Fencing
G
t
@
n
b
e
ku ontua ddisk
a
Sun Cluster can support a quorum
device
on which it is doing
y
( is S
n
i
neither SCSI-2 nor SCSI-3 fencing.Sun
Cluster
will
implement
a
d e th
u
l
software reservationa
process, s
whereby races for the quorum devices can
m
u
a
be decided atomically
and
reliably
without use of any SCSI-2 or SCSI-3
o
k et
g
protocols.aThe
persistent
for a disk with no fencing works
nsas areservation
bthe nsame
e
exactly
way
disk
on
which
you are doing SCSI-2 fencing
c
a
li
b
e
u
l
k(the persistent
b reservation is emulated using PGRE).
a
a
r
y
ul nsfe
d
b
a
tra
g
n
n
no
aba
3-39
Node 1
s
) ha
y
m
om
c
csm Guide
e
t board
@ eSystem
hme2
System board
hme2
n
b
u
ak Stud
y
(
in Interconnect
Figure 3-23 Point-to-Point Cluster
d
his
t
u
l
e
a us
m
a
k 3.2esoftware
to installation, you must provide the
During the Sun Cluster
g
n eninterfaces
s
names of the
for each cable.
baend-point
c
a
i
l
b
u
le provide the wrong interconnect interface names during
k
b
Caution
If
you
a
a
l ythe initial
erSun Cluster software installation, the first node is installed
f
u
s
d
an errors, but when you try to manually install the second node, the
ab -trwithout
g
n non installation hangs. You have to correct the cluster configuration error on
a
b
a
the first node and then restart the installation on the second node.
System board
3-40
hme1
hme1
System board
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
Switch
csm Guide
e
@ ent
b
u
ak Stud
y
(
Node 4
Node 2
Node 1
in thisNode 3
d
u
l
e
a us
m
a
k e to
g
Figure 3-24
Switch-based Cluster Interconnect
ban licens
a
b
u
le
k
b
a
a
l y Note
er If you specify more than two nodes during the initial portion of
f
u
s
d
ab -tranthe Sun Cluster software installation, the use of switches is assumed.
g
n non
a
b
a
Cluster Transport Interface Addresses and Netmask
During the Sun Cluster software installation, the cluster interconnects are
assigned IP addresses based on a base address of 172.16.0.0. If
necessary, you can override the default address, but this is not
recommended. Uniform addresses can be a benefit during problem
isolation.
3-41
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
omon
Choosing the Cluster Transport Netmask Based
c
e
Anticipated Nodes and Private Subnetsecsm uid
G
t
@
n
b
deby hand, the cluster
kunetmask
u
a
While you can choose the cluster transport
t
y
n ( this S
prefers instead that you specify:
i
d
lu number
e of private networks
a
s
The maximum anticipated
m
u
a
kanticipated
to number of nodes
g
e
The maximum
an cens
b
a
li anticipated number of virtual clusters
The
b maximum
e
u
l
k
a Virtual
abclusters are another term for zone clusters. This feature is
r
y
l
e
f
in detail in the Advanced Sun Cluster Administration
bdu transdiscussed
a
course.
ang non
ab
3-42
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
dladm show-dev
unknown
speed:
unknown
speed:
unknown
speed:
unknown
speed:
100
100
100
100
Mbps
Mbps
Mbps
Mbps
duplex:
duplex:
duplex:
duplex:
full
full
full
full
s
) ha
y
m
# ifconfig -a
om
c
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4>
csm Guide mtu
8232 index 1 inet 127.0.0.1 netmask ff000000
e
@ ent
b
ce0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4>
mtu
u
d
k
u
a
1500 index 2 inet 129.200.9.2
netmask
ffffff00
broadcast
t
(y is S
n
129.200.9.255
i
lud se th
ether 8:0:20:96:3:86
a
kam e interface
to u (at this point, it might be an actual
3. Choose g
a candidate
s ready to be set up as a secondary public net, or
private
annet,cor
none
b
e
a
notliconnected to anything at all).
b whenle
u
k
a erab
y
l
u nsf
d
b
a
tra
g
n
n
a
no
ab
3-43
Make sure that the interface you are looking at is not actually on the
public net:
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
a.
b.
s
) ha
y
m
omcheck
5. Now that you know your adapter is not on the public
net,
to
c
e
m
see if it is connected on a private net. Make up some
unused
id subnet
casprivate
unetwork.
e
G
address just to test out interconnectivity across
Do
t
@
n
b
e
not use addresses in the existing public
dspace.
ku subnet
u
a
t
y
# ifconfig ce1 192.168.1.1
n ( thupis S
i
d
u try toseguess the matching candidate on
6. Perform Steps 4 and a
5 lto
u
am atocorresponding
the other node.kChoose
IP address, for example
g
e
192.168.1.2.
an cens
b
a
i can ping across each private network, for
lnodes
7. Test
b that lthe
e
u
k
a example:
ab
r
y
l
e
f
ping 192.168.1.2
bdu trans#192.168.1.2
a
is alive
ang non
ab
8.
After you have identified the new network interfaces, bring them
down again. Cluster installation fails if your transport network
interfaces are still up from testing.
# ifconfig ce1 down unplumb
9.
3-44
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
# ls -l /etc/hostname.*
@ ent
b
u
# ifconfig -a
ak Stud
y
(
inpublicthnetwork
is
d
You can verify your secondary
adapter, if applicable, by:
u
l
e
a
s
u
aitm
Making sure
is notto
one of those you identified to be used as the
k
g nse
ntransport
private
a
b
ceit can snoop public network broadcast traffic
a
i
l
Making
sure
b
u
le
k
b
a
a
ifname plumb
l y sfe##r ifconfig
u
d
snoop
-d
ifname
b tran (other window
a
or node)# ping -s pubnet_broadcast_addr
g onn
a
n
ab
Your primary public network adapter should be the only one currently
configured on the public network. You can verify this with the following
command:
3-45
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
Configuring the Public Network
ak Stud
y
(
in this
d
u
e network personality, all you have
To configure a shared adapters
al public
s
m
u
to do is configure the
kaadapter
toinstance according to the mathematical
g
e
formula above.
s is going to be used for the public network
anVLAN
nID3
bwhat
e
identity of
would
otherwise
be ce1, therefore you configure the
c
a
li
b
e
u
l
adapter
k instance
b ce3001 by creating a file /etc/hostname.ce3001. When
a
a
r
y
instance
ce3001
is plumbed, the adapter driver understands that it is
l
e
f
u
s
d
an tagged VLAN ID 3 on physical instance number 1.
ab -trusing
g
n non
a
b
a
Allocating a Different VLAN ID for the Private Network
3-46
Preparation
s
) ha
y
m
omhosts through
To begin this exercise, you must be connected to the cluster
c
m asuiuser
de root.
the cconsole tool, and you should be logged into
csthem
e
G
t
@
n
b
de variable names, such
kusee italicized
u
a
t
y
Note During this exercise, when
you
S
n (node1,
s
i
i
as IPaddress, enclosure_name,
or
clustername embedded in a
d
h
t
lu thesnames
e
a
command string, substitute
appropriate
for your cluster.
m
u
a
o
k et
g
n
ba licens
a
Taskku
1b Verifying
the Solaris OS
le
b
a
a
l y sfer
u
d
ab -tranIn this section, you verify that the boot disk is correctly partitioned on all
g
nodes.
an non
ab
2.
3.
Type swap -l on each node and verify that it has at least 750 Mbytes
of swap space. When you have ZFS-root, swap space is on a zvol.
3-47
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
Task 3 Selecting Quorum Devices
ak Stud
y
(
in this
d
u
Perform the following steps:
al use
m
ka ofequorum
to devices you must configure after the
1. Record the g
number
an software
ns installation.
clusterbhost
e
c
a
li
b
e
u
Number
of
quorum
devices: __________
l
k
b
a
a
l y sfer
u
d
an Consult with your instructor if you are not sure about your
ab -trNote
g
an non
2.
ab
Verify that the storage arrays in your cluster are properly connected
for your target topology. Recable the storage arrays if necessary.
3.
3-48
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
d uses an
2. Complete the form in Figure 3-25
ak if your
tucluster
y
(
S
Ethernet-based point-to-point
interconnect
configuration.
n this
i
d
lu se
a
Node 2
Node 1
am to u
k
Primary ng
Primary
se
a
n
b
Interconnect
Interconnect
e
c
a
i
l
b
Interface
Interface
e
u
l
k
b
ra
ya fSecondary
l
e
Secondary
u
s
bd tran Interconnect
Interconnect
a
g
n
Interface
Interface
n
o
a
n
b
a
Note You can use the strategy presented on page 3-43, if you are remote
from the cluster equipment, you want to pretend you are remote, or your
instructor does not want to tell you so that you gain experience doing it
yourself. Do not use IP addresses in the existing public network space.
Complete the form in Figure 3-26 on page 3-50 if your cluster uses an
Ethernet-based cluster interconnect with switches.
a.
3-49
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Note You can use the strategy presented on page 3-43, if you are remote
from the cluster equipment, you want to pretend you are remote, or your
instructor does not want to tell you so that you gain experience doing it
yourself.
b.
Node 1
Switch 1
Node 2
Primary
interconnect
interface
Primary
interconnect
interface
Secondary
interconnect
interface
Secondary
interconnect
interface
s
) ha
y
m
om
Node 3
Node 4
c
m
Primary
Primary
s interconnect
ide
c
u
interconnect
e
G interface
interface
t
@
n
b
Secondary
Secondary
ku tude interconnect
a
interconnect
y
interface
interface
n ( this S
i
d
lu se
a
am to uSwitch 2
k
ng ense
a
b
a
lic Interconnect With Switches Form
b
Figure
3-26 Ethernet
e
u
l
k rab
a
y
fe
ul 4. nsVerify
d
that each Ethernet interconnect interface is connected to the
b
a
a
r
t
g
correct switch. If you are remote, and you do not want to take your
n non
a
b
instructors word for it, you can verify that all nodes can ping each
a
Note If you have any doubt about the interconnect cabling, consult with
your instructor now. Do not continue this exercise until you are confident
that your cluster interconnect system is cabled correctly, and that you
know the names of the cluster transport adapters.
3-50
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Ask for help from your instructor in identifying public network interfaces
on each node that can be used in IPMP groups.
Perform the following steps to select public network interfaces:
1.
Note You can use the strategy presented on page 3-45, if you are remote
from the cluster equipment, you want to pretend you are remote, or your
instructor does not want to tell you so that you gain experience doing it
yourself. Do not use IP addresses in the existing public network range.
s
) ha
y
m
om
c
ide
Table 3-2 Logical Names of Potential IPMP Ethernet
csm Interfaces
u
e
G
t
@
n
b
Primary IPMP ku Backup
deIPMP
System
u
a
t
y
interface (
S
n this interface
i
d
lu se
Node 1
a
am to u
k
Node 2
ng ense
a
b
a3 (if any)lic
Node
b
u
le
k
b
a
a
Node
4
(if
y fer any)
l
u
bd trans
a
g onn
a
n
ab
Note It is important that you are sure about the logical name of each
public network interface (ce1, qfe3, and so on).
3-51
Exercise Summary
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Exercise Summary
Experiences
Interpretations
Conclusions
Applications
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
3-52
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 4
Objectives
ab
y
m
om
Upon completion of this module, you should be able to:
c
m uide
csconfiguration
Understand the Sun Cluster installation and
steps
e
G
t
@
n
b
e Java Enterprise
Install the Sun Cluster packageskusing
Sun
a u Sthe
tud
System (Java ES) installer (y
in this
d
u
Describe the Sun a
Cluster
configuration
l framework
e
s
m
u
a installation
Configure akcluster
using all-at-once and typical modes
to
g
e
n
s
n installation using one-at-a-time and custom
Configure
ba liacecluster
a
b modesle
u
k
a eConfigure
ab additional nodes for the one-at-a-time method
r
y
l
f
bdu trans Describe the Solaris OS files and settings that are automatically
a
configured by scinstall
ang non
4-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relevance
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
4-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Additional resources The following references provide additional
information on the topics described in this module:
Sun Cluster System Administration Guide for Solaris OS, part number
820-7458 (for Sun Cluster 3.2 11/09).
Sun Cluster Software Installation Guide for Solaris OS, part number 8207356 (for Sun Cluster 3.2 11/09).
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
4-3
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
It is required that these be done as separate steps, although both steps can
be automated as part of Solaris jumpstart.
s
) ha
y
m
b
a Flash images are supported with a ZFS-root environment starting
a
r
t
g
an non with Solaris 10 10/09 (Update 8).
ab
The full collection of Java ES software (Sun Cluster, Java System Web
Server, Messaging Server, Directory Server, and so on).
The download currently comes as a single zip file (for either SPARC or
x86 version) or a single DVD image containing both.
4-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
No license keys are required for the Sun Cluster software. You must,
however, furnish paper license numbers to obtain service.
s
) ha
ab
y
m
om
c
sm uide
c
e
G
Sun Cluster framework patches
t
@
n
b
deSun Cluster framework
ku aftertuthe
Available patches should be added
a
y
( ithe
SSun Cluster framework is
packages are installed but
n before
s
i
d
h
configured.
lu se t
a
u
am
o
You add these
patches
manually before you configure the Sun
k
t
g nsewith scinstall.
nframework
Cluster
a
b
ctoe add new patches after the cluster is already installed
ayou need
i
l
b
If
u
le
k
b
a
a
and
your
applications are already running, you will usually be able
y fer
l
u
s
bd tran to do so in a rolling fashion.
a
ang non
You cannot add these until you install the particular agent being
patched.
4-5
s
) ha
Before you can use the Java ES installer to install the Sun Cluster software
framework on a cluster node, you must meet the following prerequisites:
y
m
m
1. Boot disks must be configured according to Sun Clusterostandards,
c
4-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
e of Java
remote management interface that is implemented
sm asuaidseries
c
e
G this interface is
objects. In the standard Sun Cluster implementation,
t
@
n
b
e
used only by the Sun Cluster Manager
and by the data
dinterface
ku web
u
a
t
y
service wizards that are part
n ( ofthclsetup.
sS
i
i
d
Java Runtime Environment
lu se1.5
a
u
am toDevelopment
The Java Management
Kit (JMDK) runtime libraries
k
g
e
n
s
These
ba Javaliclibraries
en are required by the management objects.
a
b The Sun
u
le Java Web Console Application 3.0.2
k
b
a
a
r Java Web Console serves as a single point of entry and single
l y sfeSun
u
d
ab -tran sign-on (SSO) for a variety of Web-based applications, including the
g
Sun Cluster Manager used in the Sun Cluster software.
an non
ab
4-7
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
For the initial release of Sun Cluster 3.2, there is one component listed on
the Java ES install screens as a separate application.
This is Java DB, Suns implementation of the Apache pure-Java database
standard known as Derby.
Like the shared components, it is automatically selected when installing
the Sun Cluster software.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
4-8
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
# DISPLAY=display-name-or-IP:display-#;
@ ent export DISPLAY
b
u
# cd cdrom-or-dvd-spooled-arena-path/Solaris_sparc
ak Stud
y
(
# ./installer
in this
d
u
e the initial screen for the graphical
al usshows
The screen shownainmFigure 4-1
k ES installer
to (the splash screen is not shown, and some
version of thegJava
e
nasslicense acceptance, are also omitted on following
other screens,
ban lsuch
e
c
a
i
b
pages).
e
u
l
k
a erab
y
l
u nsf
d
b
a
tra
g
n
n
a
no
You run the installer from the Solaris_sparc or Solaris_x86
subdirectory of CD-ROM 1 of 2 (or of the DVD or combined spooled
arena).
ab
Figure 4-1
4-9
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
Note that you do not need to explicitly select the All Shared
c
ab
Figure 4-2
4-10
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The screen shown in Figure 4-3 shows only the shared components which
the Java ES installer has determined must be installed or upgraded.
Note in this example some shared components listed on a previous page
of this module, such as JRE 1.5 and Web Console are not shown. This is
because the base OS we are running (Solaris 10 Update 8) already contains
the correct versions of these components; this determination is made
automatically, correctly, and silently by the Java ES installer.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Figure 4-3
4-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
For some of the other Java System applications, the Java ES installer has
the ability to actually configure the applications. It does not have this
ability for the Sun Cluster framework, and you must choose the Configure
Later option, as shown in Figure 4-4.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l yFigure
er Choose Configure Later for Sun Cluster
f
4-4
u
s
d
ab -tran
g
n non
a
b
a
Note If you choose Configure Now you will get a screen saying that
this option is not applicable for Sun Cluster. However, you will also get an
extra screen asking if you want to enable the remote configuration utility
(discussed later). If you choose Configure Later as is shown here, the
installer assumes you do want to enable remote configuration.
Software Installation
After confirmation, the installer proceeds to install the shared components
(the auxiliary software identified on page 4-7), and then the actual
Sun Cluster framework packages.
You do not need to reboot your node before proceeding to the
configuration of the Sun Cluster framework. You will be allowing the
configuration utility, scinstall, to reboot all of your nodes.
4-12
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The root login environment should include the following search path and
man page information:
PATH=$PATH:/usr/cluster/bin
MANPATH=$MANPATH:/usr/cluster/man:/usr/share/man
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
4-13
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om the
c
ab
nodes into the cluster, a special flag called the installmode flag is set in
the cluster CCR. When this flag is set, the following happens:
This allows you to complete the rebooting of the second node into the
cluster while maintaining the quorum mathematics rules. If the second
node had a vote (making a total of two in the cluster), the first node
would kernel panic when the second node was rebooted after the cluster
software was installed because the first node would lose operational
quorum.
4-14
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
)h
y
m
On a two-node cluster only, you have the option of having m
the scinstall
co edevice
utility insert a script that automatically chooses your quorum
as
m
d
s
i
the second node boots into the cluster. The defaults
always
u be to
ec will
G
t
accept the option.
@
b den
u
k
tu
yathe firstSdual-ported
(
The quorum device chosen will
be
disk or LUN (the
n
di e this
one with the lowest DIDlu
number).
a us
m
a
kallow automatic
to quorum configuration, the installmode
g
If you choose
to
e
s after the quorum device is automatically
ban licenreset
flag isaautomatically
b
configured.
u
le
k
b
a
a
l y sfer
u
d
b tranYou can disable the two-node cluster automatic quorum configuration for
a
g on- one of the following reasons:
n
a
n
ab
You want to choose the quorum device yourself.
4-15
In clusters with more than two nodes, the scinstall inserts a script to
automatically reset the installmode flag. It will not automatically
configure a quorum device. If you want a quorum device, you still have to
do that manually after the installation. By resetting installmode, each
node is assigned its proper single quorum vote.
s
) ha
y
m
om
c
4-16
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
m
otransport,
c
If you need to specify a different IP address range for the
you
e
m
d
s
i
can do so. rather than being asked initially for a specific
netmask,
you will
c Gu
e
be asked for the anticipated maximum number
t and physical
@ ofenodes
n
b
u
private networks. A suggested netmask
is
then
calculated
for you.
k tud
a
y
n ( this S
i
d
lu sand
Cluster Transport Adapters
e Switches
a
m
u
ka toe identify
to transport adapters on at least the first
g
You must benprepared
s
a you
nrun
bwhich
e
node on
scinstall. On other nodes you will normally let
c
a
li its auto-discovery
b
e
u
scinstall
use
feature to automatically determine the
l
k
b
a
a
l y transport
er adapters.
f
u
s
d
ab -tranYou can define a two-node cluster topology as using switches or just
g
an non
using point-to-point cables. This does not even need to match the actual
topology; the software really has no way of telling. It is just the definitions
in the Cluster Configuration Repository (CCR), and whichever way you
define it will be the way it is presented when you view the cluster
configuration using command-line commands or the graphical web-based
administration tool.
Names that you provide for switches are arbitrary, and are just used to
match up transport connections between the various nodes.
Port names for specific switch connections are arbitrary except for SCI
switches. For SCI, the port name must match the switch port number to
which an actual cable is connected.
4-17
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
You can choose one of two options for this file system:
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
4-18
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
sm uide
c
e
DES authentication, also known as secure remote
procedure
G call (secure
t
@
n
b
RPC) authentication, is a much stronger
authentication
u ude that cannot be
k
a
spoofed by something simple like
yspoofingSIPt addresses.
(
n
di e this
u
l
a us
m
a
k e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
A bogus node adding itself to the cluster can add bogus information
to the CCR or copy out the CCR.
4-19
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
There are the four different ways of using the interactive scinstall
utility to configure a new cluster:
Typical installation
Custom installation
Typical installation
Custom installation
s
) ha
y
m
om
Configuring the Entire Cluster at Once
c
csm Guide
e
t run
@cluster,
If you choose the option to configure the entire
you
n
b
e
u
scinstall on only one node. You should
aware
ak be S
tudof the following
y
(
behavior:
in this
d
u
e be the last node to join the cluster
The node you are driving
will
al from
s
m
u
because it needs
kato configure
to and reboot all the other nodes first.
g
e
s node IDs are assigned to the nodes, you
anabout
nwhich
If youbcare
e
c
a
lifrom the node that you want to be the highest node ID,
b drive
should
e
u
l
k
a anderlist
abthe other nodes in reverse order.
y
l
f
bdu transThe Sun Cluster software packages must already be installed on all
a
g onnodes (by the Java ES installer). Therefore you do not need remote
n
a
n
shell access (neither rsh nor ssh) between the nodes. The remote
ab
4-20
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
If you choose this method, you run scinstall separately on each node.
You must complete scinstall and reboot into the cluster on the first
node. This becomes the sponsoring node for the remaining nodes.
If you have more than two nodes you can run scinstall simultaneously
on all but the first node, but it might be hard to predict which node gets
assigned which node ID. If you care, you should just run scinstall on
the remaining nodes one at a time, and wait for each node to boot into the
cluster before starting the next one.
s
) ha
ab
y
m
e
idand
csmTypical
u
Both the all-at-once and one-at-a-time methodsehave
Custom
G
t
@
n
b
configuration options (to make a total of
u fouruvariations).
de
k
a
t
y
Sthe following responses:
n ( assumes
s
i
i
The Typical configurationdmode
h
lu se t
a
u172.16.0.0 with netmask 255.255.240.0
It uses network
amaddress
o
k
t
for thencluster
interconnect.
g nse
a
b
e you want to perform autodiscovery of cluster
cthat
Itaassumes
i
l
b
u transport
le adapters on the other nodes with the all-at-once method.
k
b
a
a
r the one-node-at-a-time method, it asks you if you want to use
l y sfe(On
u
d
ab -tran autodiscovery in both Typical and Custom modes.)
g
It uses the names switch1 and switch2 for the two transport
an non
4-21
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
e
* 1) Create a new cluster or add a cluster node csm uid
e
G server
2) Configure a cluster to be JumpStarted from
this install
t
@
n
b
3) Manage a dual-partition upgrade
ku tude
a
y
( is S
4) Upgrade this cluster node
dinthis
h
5) Print release informationlu
for
node
tcluster
e
a
am to us
k
* ?) Help with menu options
ng ense
* q) Quit
a
b
a
lic
b
e
u
l
Option: 1 ak
ab
r
y
l
e
f
s Cluster Node Menu ***
du ranand
bCluster
*** New
a
g on-t
n
a
n select from any one of the following options:
ab Please
Please select from one of the following (*) options:
4-22
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
Press Control-d at any time to return to the Main
Menu.
u
ak Stud
y
(
in this
d
u
e
al uyes
Do you want to continue (yes/no) [yes]?
s
m
ka e to
g
an ceMode
ns
Typical or
bCustom
a
li
b
e
u
l
k
b <<<
aCustom
aMode
>>> Typical or
r
y
l
e
f
du rans
b
a
tool
-t supports two modes of operation, Typical mode and Custom.
gThis
n
n
o
a
nmost clusters, you can use Typical mode. However, you might need
ab For
to select the Custom mode option if not all of the Typical defaults
can be applied to your cluster.
For more information about the differences between Typical and Custom
modes, select the Help option from the menu.
Please select from one of the following options:
1) Typical
2) Custom
?) Help
q) Return to the Main Menu
Option [1]: 1
4-23
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
m uide
csthe
Please list the names of the other nodes planned for
initial
e
G
t
@
cluster configuration. List one node name per bline.
When
finished,
n
e
u
d
k
type Control-D:
ya Stu
(
n
di e this
u
Node name (Control-D to finish):
vincent
l
a ^D us
m
Node name (Control-D to finish):
a
k e to
g
ban licens
a
b
This is the complete
list
u
le of nodes:
k
b
a
a
l y sfer
u
vincent
d
abtheo-tran
g
n non
a
b
a
s
) ha
4-24
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
ce1
ce2
ce3
Other
s
) ha
y
m
m
o
c
yes
Will this be a dedicated cluster transport adapter (yes/no)
[yes]?
e
m
d
s
i
ec t Gu
@
b den
u
k
a Stu
ytraffic
(
Searching for any unexpected network
n
i
is on "ce2" ... done
d
h
t
u
Verification completed. No traffic
was
detected
over a 10 second
l
e
a
s
sample period.
am to u
k
ng transport
se adapter for "vincent":
a
n
Select the second cluster
b
e
a
lic
b
e
u
l
k rab
a
1)yce1
u2)l ce2nsfe
d
b
a
a 3)-trce3
g
n
n
no 4) Other
aba
Option:2
Option: 3
Will this be a dedicated cluster transport adapter (yes/no) [yes]? yes
4-25
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
Option: 2
(
in this
d
u
e also, you will need to
al network
This adapter is used on the public
s
m
u
ka adapter
configure it as a tagged VLAN
to for cluster transport.
g
e
an cens
b
a
What is the cluster
VLAN ID for this adapter? 5
li
b transport
e
u
l
k
b
a any
aunexpected
r
y
l
e
Searching
for
network traffic on "ce5000" ... done
f
u ns
d
b
Verification
a
tra completed. No traffic was detected over a 10 second
g
n
sample
period.
n
no
aba
s
) ha
1)
2)
3)
4)
4-26
bge1
ce0
ce1
Other
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
sm oruifideyou
cnow,
If you disable automatic quorum device selection
e
G you must
t
@
intend to use a quorum device that is not abshared
disk,
n
de once both nodes
ku tquorum
instead use clsetup(1M) to manually configure
u
a
y
S
have joined the cluster for the first
n ( time.
s
i
i
d
h
lu se t
a
u
Do you want to disable automatic
device selection (yes/no)
am to quorum
k
[no]? no
ng ense
a
b
a
lic
b
e
u
l
k rab
a
y
Verification and cluster check
fe
ul nInstallation
s
d
b
a
ra
tokay
g
n
Is
it
to create the new cluster (yes/no) [yes]? yes
n
a
no
ab
4-27
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
om
c
de
csm
Do you want to use a lofi device instead and continue
theGui
e
@ ent
installation (yes/no) [yes]? yes
b
u
ak Stud
y
(
in this
d
u
e
al uMessages
Installation and Configuration
s
m
ka e to
g
Installation and Configuration
ban licens
a
bof thelecluster transport configuration.
u
k
Starting discovery
a erab
y
l
u nsf
d
b
The
a following
tra connections were discovered:
g
n
n
o
ntheo:ce2
switch1 vincent:ce2
aba
s
) ha
theo:ce3
switch2
vincent:ce3
4-28
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Rebooting ...
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
4-29
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
* ?) Help with menu options
in this
d
* q) Quit
u
al use
m
ka e to
Option: 1
g
an cens
b
a
i Menu ***
*** New Cluster andbCluster lNode
e
u
l
k
b
raany
ya from
l
e
Pleaseuselect
one of the following options:
f
s
d
n
b
a
tra a new cluster
g
n
1)
Create
n
n2)o Create just the first node of a new cluster on this machine
aba
s
) ha
* 1)
2)
3)
4)
5)
4-30
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
o
c
4-31
Cluster Name
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
orangecat
s
) ha
y
m
om
This step allows you to run cluster check to verify that c
certain
sm uhave
basic hardware and software pre-configuration requirements
idebeen
c
e
G
met. If cluster check detects potential problems
with configuring
t
@
n
b
this machine as a cluster node, a report ofku
violated
dechecks is
u
a
t
y
prepared and available for display on the
n ( tscreen.
sS
i
i
d
h
lu(yes/no)
e [yes]? no
a
Do you want to run cluster check
s
m
u
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
ab
4-32
Cluster Nodes
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
theo
^D
s
) ha
y
m
m
o
c
vincent
e
m
d
s
i
theo
ec t Gu
@
b den
u
k
Is it correct (yes/no) [yes]? yes
ya Stu
(
n
di e this
u
l
a DES
Authenticating Nodes
With
m
us
a
o
k
t
ngto eAdd
seNodes <<<
>>> Authenticating Requests
a
n
b
a
lic
b
e
u
l
k node
Once the first
itself as a single node cluster,other
a
rabestablishes
y
l
e
nodes u
attempting
to
add
themselves
to the cluster configuration must
f
s
d
n
b
bea found ton
ra the list of nodes you just provided. You can modify this
g
n
list
by
using
claccess(1CL) or other tools once the cluster has been
n
o
a
n
b
established.
a
This is the complete list of nodes:
4-33
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
co e
m
>>> Point-to-Point Cables <<<
cs Guid
e
b@ dent
The two nodes of a two-node cluster may useku
a directly-connected
tu
ya are Sconfigured.
interconnect. That is, no cluster switches
However,
(
n
s
i
i
when there are greater than two nodes,
this
interactive
form
of
d
h
t
u
l
e
a
scinstall assumes that there m
one switch for each
s
a will tobe uexactly
k
private network.
ng ense
a
b
a cluster
Does this two-node
lic use switches (yes/no) [yes]? yes
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
>>>
Cluster
Switches
<<<
n
o
a
n
b
a
All cluster transport adapters in this
"switch". And, each adapter on a given
different switch.Interactive scinstall
switch for each private network in the
What is the name of the first switch in the cluster [switch1]? <CR>
What is the name of the second switch in the cluster [switch2]? <CR>
4-34
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
ce1
ce2
ce3
Other
s
) ha
y
m
m
o
c
Option: 2
e
m
d
s
i
ec t Gu
@
Will this be a dedicated cluster transport adapter
n [yes]? yes
b (yes/no)
e
u
d
k
ya Stu
(
n
di e this
u
l
aadapter.
m
us
Adapter "ce2" is an Ethernet
a
o
k
t
ng ensenetwork traffic on "ce2" ... done
a
Searching for any
unexpected
b
a
lic No traffic was detected over a 10 second
b
Verification
completed.
e
u
l
k rab
a
sampleyperiod.
ul nsfe
d
b
aThe "dlpi"
tra transport type will be set for this cluster.
g
n
n
no
aba
Name of the switch to which "ce2" is connected [switch1]? <CR>
4-35
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
1)
2)
3)
4)
ce1
ce2
ce3
Other
Option: 3
Will this be a dedicated cluster transport adapter (yes/no) [yes]?yes
Adapter "ce3" is an Ethernet adapter.
y
m
m
Searching for any unexpected network traffic on "ce3" ... done
o
c
s
) ha
4-36
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
ab
s
The default private netmask and network address result in an IP ha
)
y 10
address range that supports a cluster with a maximum of 64 nodes,
m
de
sm ui[yes]?yes
c(yes/no)
Is it okay to accept the default network address
e
G
t
@
n
b
u ude[yes]? no
k(yes/no)
Is it okay to accept the default netmask
a
t
y
(
S
n
di and
his address will dictate
t
u
The combination of private netmask
network
l
e
a us private networks, and virtual
m
the maximum number of both
nodeso and
a
k e tby a cluster. Given your private
clusters that can be
supported
g
n
a program
ns will generate a range of recommended
network address,
bthis
e
c
a
liare based on the maximum number of nodes and
b that
private netmasks
e
u
l
k
anetworks
aband the virtual clusters that you anticipate for
private
r
y
l
e
f
s
this
n
bdu cluster.
a
a
r
-t
n
o
ang In
n specifying the anticipated maximum number of nodes and private
networks and virtual clusters for this cluster, it is important that
you give serious consideration to future growth potential. While both
the private netmask and network address can be changed later, the
tools for making such changes require that all nodes in the cluster
be booted in noncluster mode.
Maximum number of nodes anticipated for future growth [64]?
4-37
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
sm uide
c
e
G
>>> Global Devices File System <<<
t
@
n
b
u ude
kfile
a
t
y
Each node in the cluster must have a local
system
mounted on
(
S
n
s
i
i
/global/.devices/node@<nodeID> before
participate
thnotsuccessfully
lud siteiscan
as a cluster member. Since the a
"nodeID"
assigned until
m set
uthis up for you.
awill
o
scinstall is run, scinstall
k
t
ng ense
a
b
c either an already-mounted file system or
a nameliof
You must supply the
b
e
u
l
raw disk partition
k rawhich
b scinstall can use to create the global
a
y
devices
lfile system.
fe This file system or partition should be at least
uin
s
d
n
512
MB
size.
b
a
tra
g
n
n
no
you can use a loopback file (lofi), with a new file
aba Alternatively,
Global Devices File System
4-38
Global Fencing
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
t cluster
@after
If you choose to turn off global fencing now,
your
n
b
e
u
starts you can still use the cluster(1CL)
ak command
tud to turn on global
y
(
S
fencing.
in this
d
u
al fencing
se (yes/no) [no]? no
m
u
Do you want to turn off a
global
k e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
ab
4-39
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
o
c
4-40
Automatic Reboot
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Option Confirmation
s
) ha
y
m
om
Your responses indicate the following options to scinstall:
c
sm uide
c
e
G
Your responses indicate the following options to@
scinstall:
t
n
b
ku tude
a
y
scinstall -i \
n ( this S
i
-C orangecat \
d
lu se
a
-F \
am to u
k
-G lofi \
ng ense
-T node=vincent,node=theo,authtype=sys
\
a
b
c
a
-w
li
b
e
u
l
k
netaddr=172.16.0.0,netmask=255.255.255.192,maxnodes=4,maxprivatenets=4,nu
a er\ab
y
l
mvirtualclusters=2
u nsf
d
b
a trtype=dlpi,name=ce2 -A trtype=dlpi,name=ce3 \
a
tr-A
g
n
-B
-B type=switch,name=switch2 \
n
o -m type=switch,name=switch1
a
n
b
endpoint=:ce2,endpoint=switch1
\
a
>>> Confirmation <<<
-m endpoint=:ce3,endpoint=switch2 \
-P task=quorum,state=INIT
Are these the options you want to use (yes/no) [yes]? yes
Do you want to continue with the this configuration step (yes/no)
[yes]? yes
4-41
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Configuration Messages
Some of the post-installation steps for which scinstall is printing out
messages here (NTP, hosts file, nsswitch.conf file, and IPMP) are
described later in this module.
Initializing
Initializing
Initializing
Initializing
Initializing
Initializing
Initializing
Initializing
Initializing
y
m
om
c
s
) ha
Rebooting ...
4-42
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ab
4-43
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
o
c
For more information about the differences between Typical and Custom
modes, select the Help option from the menu.
Please select from one of the following options:
1) Typical
2) Custom
?) Help
q) Return to the Main Menu
Option [1]: 1
4-44
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Sponsoring Node
After entering the name of the sponsoring node (first node already booted
into the cluster and the cluster name), the authentication and the cluster
name are checked with the sponsoring node.
>>> Sponsoring Node <<<
For any machine to join a cluster, it must identify a node in that
cluster willing to "sponsor" its membership in the cluster. When
configuring a new cluster, this "sponsor" node is typically the first
node used to build the new cluster. However,if the cluster is already
established, the "sponsoring" node can be any node in that cluster.
s
) ha
ab
y
m
om
c
csm Guide
e
@ ent
b
u
k tud
aauthenticate
y
And, if the target cluster uses DES (to
new machines
S
nas new
s
i
i
attempting to configure themselves
cluster
members,
the
d
h
t
u
l
e
a
necessary encryption keys m
before any attempt to
s
uconfigured
a must tbe
o
k
join.
ng ense
a
b
a of the
What is the b
name
lic sponsoring node? vincent
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra Cluster Name
g
n
n
a
no
Already established clusters can keep a list of hosts which are able
to configure themselves as new cluster members.This machine should be
in the join list of any cluster which it tries to join. If the list
does not include this machine, you may need to add it by using
claccess(1CL) or other tools.
4-45
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
>>> Autodiscovery of Cluster Transport <<<
c
sm uide
c
e
G
If you are using Ethernet or Infiniband adapters
as the tcluster
@
n
b
transport adapters, autodiscovery is the best
defor configuring
ku method
u
a
t
y
the cluster transport.
n ( this S
i
d
lu(yes/no)
e [yes]? yes
a
Do you want to use autodiscovery
s
m
u
ka e to
g
an cens
b
a
Probing ........
li
b
e
u
l
k
a connections
ab
r
y
l
e
The following
were discovered:
f
u ns
d
b
a
tra
g
n
vincent:ce2
switch1 theo:ce2
n
o
a
n
b
vincent:ce3
switch2 theo:ce3
a
Is it okay to add these connections to the configuration (yes/no)
[yes]? yes
4-46
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
scinstall -i \
o
c
-C orangecat \
e
m
d
s
i
-N vincent \
ec t Gu
@
-G lofi \
b den
u
k
-A trtype=dlpi,name=ce2 -A trtype=dlpi,name=ce3
\
ya \ Stu
(
-m endpoint=:ce2,endpoint=switch1
n
di e this
u
-m endpoint=:ce3,endpoint=switch2
l
a us
m
a
o use (yes/no) [yes]? yes
k want
tto
Are these the options
you
g
e
ban licens
a
Do you wantub
to continue
le with this configuration step (yes/no) [yes]?
k
b
a
a
yes
l y sfer
u
d
ab -tran
g
an non
ab
4-47
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Configuration Message
Adding
Adding
Adding
Adding
Adding
y
m
m
o
c
s
) ha
Verifying the major number for the "did" driver with "vincent" ... done
Rebooting ...
4-48
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
/etc/hosts
/etc/nsswitch.conf
/etc/inet/ntp.conf.cluster
/etc/hostname.xxx
s
) ha
y
m
/etc/notrouter
om
c
/etc/vfstab
ab
It makes sure the files keyword precedes every other name service
for every entry in the file.
4-49
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ab
4-50
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
4-51
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
4-52
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
ab
s
If you are going to be manually choosing quorum devices that are ) ha
yquorum
physically attached disks or LUNs (as opposed to a NAS device
m
4-53
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
vincent:/dev/rdsk/c1t9d0
theo:/dev/rdsk/c1t9d0
vincent:/dev/rdsk/c1t10d0
theo:/dev/rdsk/c1t10d0
vincent:/dev/rdsk/c1t11d0
theo:/dev/rdsk/c1t11d0
vincent:/dev/rdsk/c2t0d0
theo:/dev/rdsk/c2t0d0
vincent:/dev/rdsk/c2t1d0
theo:/dev/rdsk/c2t1d0
vincent:/dev/rdsk/c2t2d0
theo:/dev/rdsk/c2t2d0
vincent:/dev/rdsk/c2t3d0
theo:/dev/rdsk/c2t3d0
vincent:/dev/rdsk/c2t8d0
theo:/dev/rdsk/c2t8d0
vincent:/dev/rdsk/c2t9d0
theo:/dev/rdsk/c2t9d0
vincent:/dev/rdsk/c2t10d0
theo:/dev/rdsk/c2t10d0
vincent:/dev/rdsk/c2t11d0
theo:/dev/rdsk/c2t11d0
theo:/dev/rdsk/c0t0d0
theo:/dev/rdsk/c0t1d0
theo:/dev/rdsk/c0t6d0
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
r
l y sfeQuorum
u
Choosing
and Resetting the installmode
d
b tran
a
(Two-Node Cluster)
g Attribute
nn
o
a
n
ab
Before a new cluster can operate normally, you must reset the
installmode attribute on all nodes. On a two-node cluster where
automatic quorum selection was disabled, the installmode will still be
set on the cluster. You must choose a quorum device as a prerequisite to
resetting installmode.
4-54
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
Please do not proceed if any additional
ud yet to join the
aknodesSthave
y
(
cluster.
in this
d
u
e yes
al [yes]?
s
Is it okay to continue (yes/no)
m
u
ka e to
g
Do you want to add
bananylicquorum
ens devices (yes/no) [yes]? yes
a
b
u
le Quorum Devices types in Sun Cluster. Please
k
b
Following
are
supported
a
a
r
y SunfeCluster
l to
refer
documentation for detailed information on these
u
s
d
b tranquorum device topologies.
supported
a
g onn
a
n
ab
What is the type of device you want to use?
1) Directly attached shared disk
2) Network Attached Storage (NAS) from Network Appliance
3) Quorum Server
q)
Option: 1
>>> Add a SCSI Quorum Disk <<<
4-55
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
SCSI-3 PGR disks be used for all disks with more than two
node-to-disk paths.
You can use a disk containing user data or one that is a member of a
device group as a quorum device.
For more information on supported quorum device topologies, see the
Sun Cluster documentation.
Is it okay to continue (yes/no) [yes]? yes
Which global device do you want to use (d<N>)?
d4
yes
s
) ha
y
m
clquorum add d4
om
c
yes
clquorum reset
claccess deny-all
Cluster initialization is complete.
4-56
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Quorum
Resource groups
Data Services
Cluster interconnect
Device groups and volumes
Private hostnames
New nodes
Other cluster tasks
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
4-57
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
sm uide
1) Quorum
c
e
G
2) Resource groups
t
@
n
b
3) Data Services
ku tude
a
y
4) Cluster interconnect
n ( this S
5) Device groups and volumes udi
al use
6) Private hostnames
m
ka e to
7) New nodes
g
8) Other clusteraproperties
b n licens
a
ub menu
leoptions
?) Helpak
with
b
a
l y sfer
q)uQuit
d
ab -tran
g
n Option:
on 1
a
n
b
a
Please select from one of the following options:
4-58
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
The status sub-command of the cluster utilities shows the current status
of various cluster components, such as:
y
m
om
c
Nodes
4-59
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Present
------3
Possible
-------3
s
) ha
y
m
om
c
Node Name
Present
Possible
Status
sm uide
c
e
G
---------------------------@
t
n
b
vincent
1
1
Online
ku tude
a
y
theo
1
1
Online
n ( this S
i
d
lu se
a
m to u
--- Quorum Votes by Device ---ka
ng ense
a
b
a
Device Name
Present
Status
lic Possible
b
e
u
l
----------------------k ------b
a
a
r
y
d4
1
Online
ul ns1fe
d
b
a
tra
g
n
n
no The following two commands are identical, and show status of the private
aba
--- Quorum Votes by Node ---
4-60
Endpoint2
--------theo:ce3
theo:ce2
Status
-----Path online
Path online
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
Cluster ===
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
anControl ===
ab Access
r
t
Host
g
n non
a
b
a
Cluster Name:
clusterid:
installmode:
heartbeat_timeout:
heartbeat_quantum:
private_netaddr:
private_netmask:
max_nodes:
max_privatenets:
num_zoneclusters:
udp_session_timeout:
global_fencing:
Node List:
Cluster name:
Allowed hosts:
Authentication Protocol:
orangecat
0x49E30B79
disabled
10000
1000
172.16.0.0
255.255.255.192
6
4
2
480
pathcount
vincent, theo
orangecat
None
sys
vincent
1
yes
clusternode1-priv
disabled
1
1
1
1
0x49E30B7900000001
4-61
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
ce2, ce3
theo
2
yes
clusternode2-priv
disabled
1
1
1
1
0x49E30B7900000002
ce2, ce3
y
m
om
c
Transport Cable:
vincent:ce2,switch1@1
Endpoint1:
vincent:ce2
csm Guide
e
t
@
Endpoint2:
switch1@1
n
b
e
u
State:
ak SEnabled
tud
y
(
s
in thivincent:ce3,switch2@1
d
Transport Cable:
u
l
e
a us
Endpoint1:
vincent:ce3
m
a
o
k
t
Endpoint2:
switch2@1
g nse
n
a
State:
Enabled
ab lice
b
u
le
k
b
Transport Cable:
theo:ce2,switch1@2
a
a
y fer
l
u
Endpoint1:
theo:ce2
s
bd tran
a
Endpoint2:
switch1@2
g
n
n
State:
Enabled
no
aba
s
) ha
Transport Cable:
Endpoint1:
Endpoint2:
State:
theo:ce3,switch2@2
theo:ce3
switch2@2
Enabled
switch1
Enabled
switch
1 2
Enabled
Enabled
Transport Switch:
switch2
4-62
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Enabled
switch
1 2
Enabled
Enabled
d2
yes
1
/dev/did/rdsk/d2s2
shared_disk
scsi2
vincent, theo
s
) ha
y
m
om
c
4-63
s
) ha
y
m
om
c
Note The PATH and MANPATH need not be identical to those below; the
important part is that you include the path to the cluster utilities and man
pages, as highlighed. You may have a better, more explicit path already.
Consult your instructor if you are unsure.
PATH=$PATH:/usr/cluster/bin
MANPATH=$MANPATH:/usr/cluster/man:/usr/share/man
export PATH MANPATH
4-64
2.
If you edit the file, verify that the changes are correct by logging out
and in again as user root.
3.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m uide
cssave
Perform the following steps on all nodes. Youe
will
Gtime if you
t
@
n
b
perform the installation simultaneouslyuon all nodes.
k tude
a
y
n ( this S
i
d
luhave you
Note These instructions
e do a graphical installation. Feel free to
a
s
m
u
try the non-graphical
o (./installer -nodisplay), or do
ka installation
tsome
g
e
graphical installations
on
nodes and non-graphical installations on
n ens
a
b
other a
nodes tolicompare
the two.
c
b
e
u
l
k rab
a
y
1. feOn your administrative workstation or display, figure out the
l
u
d
b trans number of your display. In the RLDC environment, each student or
a
group might have a different display number. The output might look
ang non
ab
2.
On the administrative workstation or display, enable remote Xwindows display from the nodes:
(# or $) /usr/openwin/bin/xhost +nodename1
(# or $) /usr/openwin/bin/xhost +nodename2
(# or $) /usr/openwin/bin/xhost +nodename3
3.
On your cluster node, set and export the DISPLAY, if it is not already
set:
# env|grep DISPLAY
# DISPLAY=display-name-or-IP:display-#
# export DISPLAY
4-65
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
# cd sc32_software_location/Solaris_sparc
# ./installer
a.
b.
c.
Choose Sun Cluster 3.2 (not Sun Cluster Agents or Sun Cluster
Geographic Edition). This is #5 only on the non-graphical
installer. You will notice that Java DB is also automatically
selected, and you cannot deselect it as long as Sun Cluster is
selected.
s
d. Feel free to skip multilingual support if English-only is fine )forha
y
you, or feel free to select it (it adds significant time to the
m
e
pushy.
m
d
s
i
ec t Gu
e. Confirm upgrade of the shared components.
@
b den
u
k
f.
Verify that system requirements
tu
ya areSmet.
(
n
s
g. Choose Configure u
Later
choose Configure
di (ifeyou
hiaccidentally
t
l
a
Now, you will
be asked
if you want to enable remote
usYes).
amplease
o
k
t
configuration;
say
g nse
ban licthat
e you want to continue with the installation.
h. aConfirm
b
u
le
k
b
a
a
l y 4 sConfiguring
er
f
u
d
Task
a New Cluster The All-Nodesb tran
a
Method
onang nat-Once
ab
If you prefer to use the one-node-at-a-time method, skip this task and
complete Task 5 instead.
Perform the following steps to configure the entire cluster using the allnodes-at-once method:
4-66
1.
Log in as user root on the node that you want to have assigned the
highest node ID in the cluster. This is the node you will drive from.
2.
3.
b.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
d.
e.
Enter the names of the other nodes in your cluster. They will be
rebooted and assigned Node IDs in reverse order to what you
type.
f.
Select the adapters that will be used for the cluster transport. If
you are asked (with a tagged VLAN-capable adapter) if it is a
dedicated cluster transport adapter, answer Yes.
g.
h.
Accept the offer to use the lofi method for the global devices
file system for each node as scinstall detects that there is no
dedicated file system.
s
) ha
ab
y
m
omnode reboots,
c
4. You will observe the following error messages aseach
small normal.
ide
just the very first time, into the cluster. They
care
u
e
G
t
@
n
b
/usr/cluster/bin/scdidadm: Could not load DID
instance
list.
ku tude
a
/usr/cluster/bin/scdidadm: Cannot open /etc/cluster/ccr/did_instances.
y
in ( tadditional
is S error message every time a
5. You will observe theufollowing
d
h
e is also normal.
al cluster.
s
node boots into
the
This
m
u
ka e to
g
s on clprivnet0 - will use link layer
n(18)
ip: joining multicasts
banfailed
e
c
a
li
b
broadcasts for umulticast
e
l
k
a erab
y
l
u nsf
d
b
a
tra
g
n
n
a
no Task 5 Configuring a New Cluster The One-Nodeat-a-Time Method
2.
4-67
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Choose Option 2 from the Install Menu, Create just the first
node of a new cluster on this machine.
c.
d.
e.
f.
g.
h.
as
h
i.
Agree to use the lofi method for the global device file system.
)
my
j.
For a two-node cluster, do not disable the automaticm
quorum
selection (answer No).
co e
m
cs Guid
k. Reply yes to the automatic reboot question.
e
@ ent
b
u
l.
Examine the scinstall command
options
k tud for correctness.
a
y
Accept them if they seem (appropriate.
n this S
i
d
You must wait for
luthis node
a
seto complete rebooting to proceed to
m
u
the second a
node.
k e to
g
n ethe
3. You willaobserve
nsfollowing error messages as the node reboots,
b
c
a
just
first
li time, into the cluster. They are all normal.
b the very
e
u
l
k
/usr/cluster/bin/scdidadm:
a erab Could not load DID instance list.
y
l
u nsf
/usr/cluster/bin/scdidadm:
Cannot open /etc/cluster/ccr/did_instances.
d
b
a
a
r
g on-t 4. You will observe the following additional error message every time a
n
a
n
node boots into the cluster. This is also normal.
ab
ip: joining multicasts failed (18) on clprivnet0 - will use link layer
broadcasts for multicast
Perform the following steps on each additional node in the cluster. If you
have more than two nodes, you could perform these steps on all the other
nodes simultaneously, although then it will be hard to predict which node
gets which node ID. If you want this to be predictable, do one node at a
time.
1.
2.
4-68
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
c.
d.
e.
f.
g.
Agree to use the lofi method for the global device file system.
h.
s
) ha
ab
y
m
j.
You will see the same normal boot error messages
omonthe
c
two-node cluster:
1.
2.
4-69
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
In a three node-cluster, wait after the third node boots until you see
console messages (on all nodes) indicating that the quorum votes are
being reset.
2.
s
) ha
y
m
csm Guide
e
t be local
@devices
Note Pay careful attention. The first few DID
might
n
b
e
u
disks, such as the boot disk and a CD-ROM
ud6). Examine the
ak (target
t
y
(
S
standard logical path to make sure
the DIDisdevice you select is a disk in a
inmore
d
h one node.
tthan
storage array and is connected
to
u
l
e
a
am to us
k
3. On Node n
1,g
type the clsetup
command. Navigate to the section for
e
s
a
n
adding
ba newlicquorum
e device and supply the name of the first DID
a
b
udevice b(global
le device) that you selected in the previous step. You
k
a
a
should
see
output similar to the following.
y fer
l
u
s
bd tran clquorum add d12
a
May 3 22:29:13 vincent cl_runtime: NOTICE: CMM:
ang non
ab
4.
5.
6.
4-70
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Perform the following steps on all nodes to verify the completed cluster
installation:
1.
2.
3.
s
Each shared (dual-ported) DID device should show a logicalypath
) ha
from each cluster node.
m
m
co e
4. On any node, type the cluster show command.
m
cs Guidand quorum
The cluster status, node names, transporte
configuration,
@ ent
b
device information should be complete.
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
4-71
Exercise Summary
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Exercise Summary
Experiences
Interpretations
Conclusions
Applications
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
4-72
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 5
s
) ha
ab
y
m
om
Identify the cluster daemons
c
csm Guide
Use cluster commands
e
@ ent
b
View and administer cluster global
properties
u
ak Stud
y
(
View and administer quorum
in this
d
u
View and administer
e and settings
al diskuspaths
m
o
ka e tinterconnect
View and
administer
components
g
n
s
ba
en command and the Sun Cluster Manager
Use
the clsetup
c
a
i
l
b
u
le basic cluster startup and shutdown operations, including
k
b
Perform
a
a
r
l y sfebooting
nodes in non-cluster mode and placing nodes in
u
d
n
b
maintenance state
a
tra
g
n
n
a
Modify the private network settings from non-cluster mode
no
Upon completion of this module, you should be able to:
5-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relevance
Why are you sometimes required to add a new quorum device before
deleting an old one?
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
5-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Additional resources The following references provide additional
information on the topics described in this module:
Sun Cluster System Administration Guide for Solaris OS, part number
820-7458 (for Sun Cluster 3.2 11/09)
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
5-3
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
om
c
csm Guide
e
@ ent
b
u
ak running
The following is taken from a clusterynode
tudSolaris 10 OS:
(
S
in this
d
u
al use
# ps -ef|grep clust
m
ka? e0:01
to cluster
root
4
0
0 03:27:08
g
an ce?ns 0:00 /usr/cluster/lib/sc/cl_execd
root 1569 1568
0 03:30:27
b
a
li ? 0:00 /usr/cluster/lib/sc/clexecd
root 1570
1 b
0 03:30:27
e
u
l
k
b
root 1568
?
0:00 /usr/cluster/lib/sc/cl_execd
a1 0era03:30:27
y
l
f
root 1546
1 s 0 03:30:27 ?
0:00 /usr/cluster/lib/sc/failfastd
n
bdu 1570
a
root a1571
0
03:30:27
?
0:00 /usr/cluster/lib/sc/clexecd
r
t
g
n
n
root
1
0 03:29:37 ?
0:00 /usr/cluster/lib/sc/qd_userd
a 1513
no
abroot
1566
1
0 03:30:27 ?
0:00 /usr/cluster/lib/sc/pmmd
s
) ha
root 1585
1
0 03:30:28 ?
0:00
/usr/cluster/lib/sc/ifconfig_proxy_serverd
root 1586
1
0 03:30:28 ?
0:00
/usr/cluster/lib/sc/rtreg_proxy_serverd
root 3072 1566
0 03:30:41 ?
0:01 /usr/cluster/lib/sc/rgmd -z
global
root 1956
1
0 03:30:34 ?
0:00 /usr/lib/inet/xntpd -c
/etc/inet/ntp.conf.cluster
root 2836
1
0 03:30:39 ?
0:00 /usr/cluster/lib/sc/cl_eventd
root 2824
1
0 03:30:39 ?
0:00 /usr/cluster/lib/sc/scqdmd
root 2904
1
0 03:30:40 ?
0:00 /usr/cluster/lib/sc/rpc.fed
root 2821
1
0 03:30:39 ?
0:00 /usr/cluster/lib/sc/scdpmd
root 2845
1
0 03:30:40 ?
0:00 /usr/cluster/bin/cl_pnmd
root 3057
1
0 03:30:41 ?
0:00 /usr/cluster/lib/sc/rgmd
root 2805
1
0 03:30:39 ?
0:00 /usr/cluster/lib/sc/cl_ccrad
5-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
clexecd This is used by cluster
threads
ud to execute userland
akkernel
t
y
(
S
commands (such as the irun_reserve
n this and dofsck commands). It is
d
also used to run cluster
commands
remotely (like the cluster
u
l
e
a
s
shutdown command).
am to u
k
Thisa
daemon
ng eregisters
se with failfastd so that the failfast device
n
b
a willlicpanic the kernel if this daemon is killed and not restarted
driver
b
e
u
lseconds.
in 30
k
b
a
a
r
l y sfecl_eventd
u
This daemon registers and forwards cluster events
d
b tran (such as nodes
a
entering and leaving the cluster). There is also a
g onn
protocol
whereby
user applications can register themselves to receive
a
n
ab
cluster events.
rgmd This is the resource group manager, which manages the state
of all cluster-unaware applications.
The failfast driver panics the kernel if this daemon is killed and not
restarted in 30 seconds.
5-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The failfast driver panics the kernel if this daemon is killed and not
restarted in 30 seconds.
s
) ha
y
m
om
c
sm uide
c
e
G
It is automatically restarted if it is stopped.
t
@
n
b
u events
de into a binary log
kcluster
cl_eventlogd This daemon logs
u
a
t
y
( course,
Sthere is no published
file. At the time of writing ifor
n this
s
i
d
h
t
interface to this log. lu
e
a
s
uif it is stopped.
am
It is automatically
restarted
o
k
t
ngThisedaemon
se provides access from userland
a
n
cl_ccrad
b
c
a
liapplications
b
management
to the CCR.
e
u
l
k
b
a
ya Itfeis rautomatically
restarted if it is stopped.
l
u
s
d
ab -tran scdpmd This daemon monitors the status of disk paths, so that
g
n non
they can be reported in the output of the cldev status command.
a
b
a
5-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
5-7
The name of the command is related to the cluster object you are
trying to display or administer.
s
) ha
y
m
om
c
csm Guiordestatus,
e
When using subcommands to display configuration
@ ent but you can
the default is to show all objects u
(ofbthat category),
d a specific object.
akto show
tuonly
give an optional last argument
y
(
S
in this
d
u
al use
m
Commands Relating
ka toeBasic
to Cluster Administration
g
an cens
b
a
li
The following
commands
are presented in more detail in this module
b
e
u
l
k
b
because
they
relate
to
configuration,
status, or administration that is
a era
y
l
f
useful
point in the course. Every command has a full name. Some
ns at thishave
bdu trcommands
a
an abbreviated name (long and short names are hard
a
g
n
n
no linked to the same executable):
aba
5-8
cluster:
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Commands
The following commands relate to administration of device groups and
cluster application resources, which are the topics of Modules 6 through
10. No additional information is presented about them in this module:
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
Cluster Command Self-Documentation
u
al use
m
ka commands
to have excellent man pages, they are also
g
e
While all the
cluster
s
ban liceinnthat:
self-documenting
a
b
u
lerun a command without any sub-command, the usage
k
b
If a
you
a
r
l y sfemessage
always lists the possible sub-commands:
u
d
n
b
a
tra
#g clquorum
n
n
no (C961689) Not enough arguments.
aba clquorum:
clquorum:
Usage:
5-9
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
# clquorum add
clquorum: (C456543) You must specify the name of the quorum
device to add.
clquorum: (C101856) Usage error.
Usage:
s
) ha
y
m
om
c
csm Guide
e
Add a quorum device to the cluster configuration
@ ent
b
u
ak Stud
y
(
OPTIONS:
in this
d
u
l text.
e
ahelp
s
-?
Display this
m
u
ka e to
g
-a
Automatically
an cens add a Shared Disk quorum device for 2b
a
li
node cluster.
b
e
u
l
k
a erab
y
l
f | <clconfiguration>}
{u -i
s
d
n
b
Specify XML configuration as input.
a
tra
g
n
n
no
aba
-p <name>=<value>
Specify the properties.
-t <type>
Specify the device type.
-v
Verbose output.
Note If you perform the man cluster command on the Solaris 10 OS,
you might get the wrong man page because there is a man page for a
completely unrelated SQL command called cluster. To fix that, you can
put /usr/cluster/man as the first directory in your MANPATH variable, or
you can type man -s1cl cluster.
5-10
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
orangecat
0x49D36C52
disabled
10000
1000
172.16.0.0
255.255.240.0
64
10
12
480
pathcount
vincent, theo
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b the
u
Renaming
le Cluster
k
b
a
a
l y sfer
u
d
ab -tranYou can rename the cluster using the cluster rename command. The
g
cluster name is not particularly important and is not required as an
n non
a
b
argument in any other commands:
a
# cluster rename -c blackcat
# cluster show -t global
Cluster ===
Cluster Name:
clusterid:
installmode:
heartbeat_timeout:
heartbeat_quantum:
private_netaddr:
.
.
# cluster rename -c orangecat
blackcat
0x49D36C52
disabled
10000
1000
172.16.0.0
5-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
# cluster set -p heartbeat_timeout=4000
c
64
10
12
480
pathcount
vincent, theo
5-12
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
Node ID:
Enabled:
privatehostname:
reboot_on_path_failure:
globalzoneshares:
defaultpsetmin:
quorum_vote:
quorum_defaultvote:
quorum_resv_key:
Transport Adapter List:
Node Name:
Node ID:
Enabled:
privatehostname:
1
yes
clusternode1-priv
disabled
1
1
1
1
0x49D36C5200000001
ce2, ce3
theo
2
yes
clusternode2-priv
5-13
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
disabled
1
1
1
1
0x49D36C5200000002
ce2, ce3
s
) ha
y
m
om
c
ab
Node ID:
Enabled:
privatehostname:
reboot_on_path_failure:
globalzoneshares:
defaultpsetmin:
quorum_vote:
quorum_defaultvote:
quorum_resv_key:
Transport Adapter List:
1
yes
vinny-priv
disabled
1
1
1
1
0x49D36C5200000001
ce2, ce3
5-14
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
# clnode show-rev -v
Solaris Cluster 3.2u3 for Solaris 10 sparc
SUNWscu:
3.2.0,REV=2006.12.05.22.58, 125511-02 126106-37 800149-01
SUNWsccomu:
3.2.0,REV=2006.12.05.22.58, 125511-02 126106-37 800149-01
SUNWsczr:
3.2.0,REV=2006.12.05.22.58, 125511-02 126106-37 800149-01
SUNWsccomzu:
3.2.0,REV=2006.12.05.22.58, 125511-02 126106-37 800149-01
SUNWsczu:
3.2.0,REV=2006.12.05.22.58, 125511-02 126106-37 800149-01
SUNWscsckr:
3.2.0,REV=2006.12.05.22.58, 125992-05 800149-01
SUNWscscku:
3.2.0,REV=2006.12.05.22.58, 125992-05 800149-01
SUNWscr:
3.2.0,REV=2006.12.05.22.58, 125511-02 126106-37 800149-01
SUNWscrtlh:
3.2.0,REV=2006.12.05.22.58, 126106-37 800149-01
SUNWscnmr:
3.2.0,REV=2009.09.25.13.28
SUNWscnmu:
3.2.0,REV=2009.09.25.13.28
SUNWscdev:
3.2.0,REV=2006.12.05.22.58, 125511-02 126106-37 800149-01
SUNWscgds:
3.2.0,REV=2006.12.05.22.58, 126106-37 800149-01
SUNWscsmf:
3.2.0,REV=2006.12.05.22.58, 126106-37 800149-01
SUNWscman:
3.2.0,REV=2006.09.26.13.45, 128556-04 800141-01
SUNWscsal:
3.2.0,REV=2006.12.05.22.58, 126106-37 800149-01
SUNWscsam:
3.2.0,REV=2006.12.05.22.58, 126106-37 800149-01
SUNWscvm:
3.2.0,REV=2006.12.05.22.58, 800149-01
SUNWmdmr:
3.2.0,REV=2006.12.05.22.58, 800149-01
SUNWmdmu:
3.2.0,REV=2006.12.05.22.58, 125514-05 800149-01
SUNWscmasa:
3.2.0,REV=2006.12.05.22.58, 126106-37 800149-01
SUNWscmasar:
3.2.0,REV=2006.12.05.22.58, 126106-37 800149-01
SUNWscmasasen: 3.2.0,REV=2006.12.05.22.58, 126106-37 800149-01
SUNWscmasau:
3.2.0,REV=2006.12.05.22.58, 125511-02 126106-37 800149-01
SUNWscmautil: 3.2.0,REV=2006.12.05.22.58, 125508-08 126106-37 800149-01
SUNWscmautilr: 3.2.0,REV=2006.12.05.22.58, 800149-01
SUNWjfreechart: 3.2.0,REV=2006.12.05.22.58, 139921-02 800149-01
SUNWscspmr:
3.2.0,REV=2006.12.05.22.58, 800149-01
SUNWscspmu:
3.2.0,REV=2006.12.05.22.58, 125508-08 126106-37 800149-01
SUNWscderby:
3.2.0,REV=2006.12.05.22.58, 126106-37 800149-01
SUNWsctelemetry: 3.2.0,REV=2006.12.05.22.58,125511-02 126106-37800149-01
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
5-15
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
5-16
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
theo
Online
Present
------1
Possible
-------1
Status
-----Online
# clq show d2
Quorum Devices ===
Quorum Device Name:
d2
5-17
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
yes
1
/dev/did/rdsk/d2s2
shared_disk
scsi2
vincent, theo
s
) ha
y
m
om requires
c
e
m
d
s
i
you to perform repairs in that order (add and then
cremove).
uIf you have
ethe
G
t
more than two nodes you could actually perform
operations
in any
@
n
b
e
u
order:
ak Stud
y
(
in this
# clq add d5
d
u
# clq remove d2
al use
m
# clq status -t shared_disk ka
to
g
e
ban licens
Cluster Quorum ===
a
b
u
le
k
b
a
a
r
--- Quorum Votes
--l y by
eDevice
f
u
s
d
abName -tran Present
g
Device
Possible
Status
n
n
o
a
n
------------------ab----------d5
Online
5-18
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
# clq status
om
c
csm Guide
e
Cluster Quorum ===
@ ent
b
u
ak Stud
--- Quorum Votes Summary --y
(
in this
d
u
Needed
Present
Possible
al use
m
-----------ka -------to
e
2
3 ng
3
ba licens
a
b
u
le
k
b
a
a
--- Quorum
l yVotessfebyr Node --u
d
abName-tran Present
Node
Possible
Status
g
n
n
o
a
n
--------------------------ab
vincent
theo
1
1
1
1
Online
Online
Present
------1
Possible
-------1
Status
-----Online
5-19
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
qservydude
yes
1
qservydude
quorum_server
vincent, theo
192.168.101.1
9000
s
) ha
y
m
om
c
5-20
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Option: 2
>>> Add a Netapp NAS Quorum Device <<<
A Netapp NAS device can be configured as a quorum device for Sun
Cluster. The NAS configuration data includes a device name, which is
given by the user and must be unique across all quorum devices, the
filer name, and a LUN id, which defaults to 0 if not specified.
Please refer to the clquorum(1M) man page and other Sun Cluster
documentation for details.
s
) ha
The NAS quorum device must be setup before configuring it with Sun
Cluster. For more information on setting up Netapp NAS filer,
creating the device, and installing the license and the Netapp
binaries, see the Sun Cluster documentation.
y
m
om
c
csm Guide
e
t
Is it okay to continue (yes/no) [yes]? yes b@
n
e
u
ak Stud
y
(
What name do you want to use for this
in quorum
is device? netappq
d
h
t
u
l
e mynetapp
a[netapps]?
s
What is the name of the filer
m
u
ka e to
g
ns [0]? 0
What is the LUN id
filer
baonn the
e
c
a
li
b
e
u
l
k
Is it okay
a to eproceed
ab with the update (yes/no) [yes]? yes
r
y
l
f
s
n
bdu add
a
a
r
clquorum
-t
netapp_nas -p filer=mynetapp -p lun_id=0 netappq
t
g
n
n
no
aba
Adding Sun NAS iSCSI LUN as a Quorum Device
Sun NAS devices also support using an iSCSI LUN as a quorum device.
Unlike NetApp, Sun NAS uses the standard Solaris 10 iscsiadm client to
make Sun NAS iSCSI LUNs appear as if they were regular shared disk
devices.
In order for the node to get visibility to a Sun NAS iSCSI LUN you would
need to administer it on each node:
# iscsiadm modify discovery -s enable
# iscsiadm list discovery
Discovery:
Static: enabled
Send Targets: disabled
5-21
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
At that point, from a single cluster node, you could repopulate the DID
device space and create a normal-looking shared disk device quorum:
# cldev populate
# cldev list -v
# clq add d#
s
) ha
y
m
m
Registering NAS Mounted Directories (for m
Data
co e
d
Fencing: both NetApp and Sun NAS) ecs Gui
@ ent
b
u
d
atokregister
tuon
y
Use the clnas add-dir subcommand
the NAS device the
(
S
n
s
i
i
specific directories that are being
used to
thserve cluster data. The Sun
ludis then
e
a
Cluster client implementation
able
to perform data fencing on
s
m
u
a
o
these specific directories.
k et
g
n
a cens
b
a
li NAS directories for failure fencing looks similar to
Registering
b thelespecific
u
k
the
a following:
ab
r
y
l
e
f
ns add-dir -d /vol/vol_01_03 mynetapp
bdu tr#aclnas
a
- # clnas add-dir -d /vol/vol_01_04 mynetapp
ang non
ab
You can verify the configuration of the NAS device in the CCR using the
clnas show command as in the following example:
# clnas show
Filers of type "netapp":
Filer name:
type:
password:
userid:
directories:
directories:
5-22
mynetapp
netapp
*******
root
/vol/vol_01_03
/vol/vol_01_04
We will see at least one reason you may like to turn off
monitoring for non-shared disks.
s
) ha
y
m
om
c
csm Guide
e
Displaying Disk Paths
@ ent
b
u
ak Stud
y
(
cldev list -v is the best summary
in thiofs node-to-disk paths, and the
d
u
corresponding DID device
e
al numbers:
s
m
u
k-va e to
# cldev list
g
DID Device
an cens Full Device Path
b
a
------------------------li
b
e
u
l
k
vincent:/dev/rdsk/c0t0d0
a d1 erab
y
l
d2
vincent:/dev/rdsk/c0t1d0
f
u ns
d
b
vincent:/dev/rdsk/c0t6d0
a
tra d3
g
n
d4
vincent:/dev/rdsk/c1t0d0
n
o
a
n
b
d4
theo:/dev/rdsk/c1t0d0
a
d5
vincent:/dev/rdsk/c1t1d0
d5
theo:/dev/rdsk/c1t1d0
d6
vincent:/dev/rdsk/c1t2d0
.
. //Omitted for brevity
.
d17
theo:/dev/rdsk/c2t9d0
d18
vincent:/dev/rdsk/c2t10d0
d18
theo:/dev/rdsk/c2t10d0
d19
vincent:/dev/rdsk/c2t11d0
d19
theo:/dev/rdsk/c2t11d0
d20
theo:/dev/rdsk/c0t0d0
d21
theo:/dev/rdsk/c0t1d0
d22
theo:/dev/rdsk/c0t6d0
5-23
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
By default, the daemon scdpmd probes disk paths periodically, once every
few minutes.
Disk path status changes are logged into /var/adm/messages with the
syslogd LOG_INFO facility level. All failures are logged by using the
LOG_ERR facility level.
The cldevice status command shows the status of disk paths as last
recorded by the daemon. That is, you could yank out a disk or sever a
disk path and the status might still be reported as Ok for a couple of
minutes, until the next time the daemon probes the paths:
s
) ha
y
m
om
c
Device Instance
Node
sm Status
ide
c
u
e
-----------------G-----t
@
n
b
/dev/did/rdsk/d1
vincent
u ude Ok
k
a
t
y
(
S
n
/dev/did/rdsk/d10
Ok
di theo
his
t
u
l
e
Ok
a usvincent
m
a
o
k et
g
/dev/did/rdsk/d11
theo
Ok
n
ba licens
vincent
Ok
a
b
e
u
l
k rab
a
y
/dev/did/rdsk/d12
theo
Ok
l
e
f
u
s
d
vincent
Ok
ab -tran
g
n non /dev/did/rdsk/d13
a
b
theo
Ok
a
# cldev status
5-24
vincent
Ok
/dev/did/rdsk/d14
theo
vincent
Ok
Ok
/dev/did/rdsk/d15
theo
vincent
Ok
Ok
/dev/did/rdsk/d16
theo
vincent
Ok
Ok
/dev/did/rdsk/d17
theo
vincent
Ok
Ok
/dev/did/rdsk/d18
theo
Ok
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Ok
/dev/did/rdsk/d19
theo
vincent
Ok
Ok
/dev/did/rdsk/d2
vincent
Ok
/dev/did/rdsk/d20
theo
Ok
/dev/did/rdsk/d21
theo
Ok
/dev/did/rdsk/d4
theo
vincent
Ok
Ok
s
) ha
y
m
om
c
/dev/did/rdsk/d6
theo
csm GuiOkde
e
@ ent Ok
vincent
b
u
ak Stud
y
(
/dev/did/rdsk/d7
Ok
in theo
is
d
h
t
vincent
Ok
u
l
e
a
s
am to u theo
k
/dev/did/rdsk/d8
Ok
g nse
n
a
vincent
Ok
ab lice
b
u
le
k
b
/dev/did/rdsk/d9
theo
Ok
a
a
y fer
l
u
vincent
Ok
s
bd tran
a
g on- You can limit the output to a specific DID device by giving its name as an
n
a
n
ab
/dev/did/rdsk/d5
theo
vincent
Ok
Ok
argument. You can also display only those paths that have a specific
status, as in the following example:
# cldev status -s Fail
Device Instance
---------------
Node
----
Status
------
5-25
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Node
---theo
vincent
Status
-----Unmonitored
Unmonitored
s
) ha
y
m
om
/dev/did/rdsk/d9
theo
Unmonitored
c
sm uide
c
e
G+ as the
As is the convention for all cluster commands,@
you can use
t
n
b
wildcard. So cldev monitor + would turn
de back on for all
ku monitoring
u
a
t
y
devices, regardless of their previous(state.
n this S
i
d
lu se
a
kam e to u Devices and Enabling
Unmonitoring Allg Non-Shared
reboot_on_path_failure
ban licens
a
b
u
le
k
b
a
a
l yIf yousfset
erthe node property reboot_on_path_failure to enabled (the
u
d
default
an is disabled), then a node automatically reboots if all the
ab -trmonitored
g
disk paths from that node are broken and there is another node
n
n
o
a
n
that still has working paths to at least one of the shared devices.
ab
5-26
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
none
global
5-27
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The cluster immediately begins to use SCSI-3 fencing for any nonquorum disk that seems to support SCSI-3.
s
) ha
The following command changes the global policy. You can see that SCSI2 behavior is left intact for an existing quorum disk. There is no output or
change in per-disk properties for other, non-quorum disks.
y
m
om
c
# cluster set -p global_fencing=prefer3
e
m uidremains
Warning: Device instance d4 is a quorum device - fencingcs
protocol
e
G
PATHCOUNT for the device.
t
@
n
b
Updating shared devices on node 1
ku tude
a
y
( is S
Updating shared devices on node 2
n
i
d
# cldev show d4
lu se th
a
am to u
k
DID Device Instances ===
ng ense
a
b
lic
DID Device Name: b a
/dev/did/rdsk/d4
e
u
l
k
b
Full Device Path:
vincent:/dev/rdsk/c1t0d0
a era
y
l
f
Full Device
Path:
theo:/dev/rdsk/c1t0d0
bdu trans
Replication:
none
a
g
n
n
default_fencing:
pathcount
o
a
n
b
a
# clq show d4
Quorum Devices ===
Quorum Device Name:
Enabled:
Votes:
Global Name:
Type:
Access Mode:
Hosts (enabled):
5-28
d4
yes
1
/dev/did/rdsk/d4s2
shared_disk
scsi2
vincent, theo
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
ab
as
h
)
2. Change the per-disk default_fencing policy back to the value
y
m
global.
m
o
c
want to
3. Add it back as a quorum device (at which point
you might
e
m
d
s
i
c asGa uplace-holder).
remove any other quorum device that is e
acting
t
@
n
b
e
u
akthe procedure:
The folowing example demonstrates
tud
y
(
S
in this
d
# clq add d5
u
l
e
s
# clq remove d4 ma
u
kadefault_fencing=global
to
# cldev setg-p
d4
e
n
s
a
n
Updating
shared
devices
on
node
1
ce devices on node 2
ab shared
i
l
Updating
b
uclq add
led4
k
b
#
a
a
l y #sclq
er remove d5
f
u
d
ab -tran# clq show d4
g
an non
Quorum Devices ===
d4
yes
1
/dev/did/rdsk/d4s2
shared_disk
scsi3
vincent, theo
5-29
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
You can turn off SCSI fencing for particular disks devices. This feature,
introduced in Sun Cluster 3.2 1/09 (Update 2), allows the use of Serial
Advanced Technology Attachment (SATA) devices as shared storage
devices. These devices do not support SCSI fencing of any sort.
It is not recommended in any way that you eliminate fencing for devices
that support fencing.
s
) ha
The per-disk default_fencing property has values that specify that you
do not want fencing for that disk:
y
m
m existing
nofencing (turns off fencing after scrubbing the diskcofoany
e
m
reservation keys)
d
s
i
u
ec anyt G
nofencing-noscrub (turns off fencingbwithout
scrubbing)
@
n
e
u
d
k
ya Softufencing for a particular
(
The following example shows the
elimination
n
di e this
u
disk device:
l
a us
m
a
# cldev set -p default_fencing=nofencing
d5
k e to
g
n
s
Updating shared
devices
on
node
1
a cen
bshared
a
Updating
li devices on node 2
b
e
u
l
k
a erab
y
l
u nsf
d
b
a
tra
g
n
n
no
aba
5-30
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
.
c
theo:/dev/rdsk/c1t0d0
none
scsi3
5-31
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Sun Cluster will quietly implement its own software quorum mechanism
to reliably and atomically simulate the SCSI-2 or SCSI-3 race for the
quorum device. The persistent reservations will be implemented using
PGRE, exactly as when a SCSI-2 device is used as a quorum device.
The following command shows the verification that a quorum device is
using the software quorum mechanism, since its SCSI fencing has been
eliminated:
# clq show d4
Quorum Devices ===
Quorum Device Name:
Enabled:
Votes:
Global Name:
Type:
Access Mode:
Hosts (enabled):
d4
yes
1
/dev/did/rdsk/d6s2
shared_disk
sq_disk
vincent, theo
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
5-32
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
The clintr status command shows status of all private network paths
between all pairs of nodes:
y
m
om
c
You can cable a new private network and get it defined in the cluster
without any reboots or interruption to any existing service.
The private network definitions in the cluster configuration repository are
somewhat complex. You must perform one of the following actions:
5-33
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
For example, the following commands define a new private network for a
two-node cluster. The definitions define a switch. This does not mean that
the switch needs to physically exist, it is just a definition in the cluster.
#
#
#
#
#
clintr
clintr
clintr
clintr
clintr
add
add
add
add
add
vincent:ce4
theo:ce4
switch3
vincent:ce4,switch3
theo:ce4,switch3
s
) ha
y
m
om
c
csm Guide
# clintr status
e
@ ent
b
u
Cluster Transport Paths ===
ak Stud
y
(
in this
d
u
Endpoint1
Endpoint2
Status
l
e
a
s
u
-------------am t--------o
k
vincent:ce3 ng
Path online
se theo:ce3
a
n
vincent:ce2
theo:ce2
Path online
b
e
c
a
i
l
b
vincent:ce4
theo:ce4
Path online
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
5-34
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
Please select from one of the following options:
c
sm uide
c
e
1) Quorum
G
t
@
n
b
2) Resource groups
ku tude
3) Data Services (ya
n this S
i
4) Cluster interconnect
d
lu and
e volumes
5) Device groups
a
s
m
u
6) Private
ka ehostnames
to
g
n Newenodes
s
ncluster
ba7)
8) Other
tasks
c
a
li
b
e
u
l
k rab
a
y
l
e ?) Help with menu options
f
u
s
d
q) Quit
ab -tran
g
an non
ab
5-35
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Even if you use the clsetup utility, you still need to know about how
things are done in the Sun Cluster software environment.
For example, if you go to the cluster interconnect submenu, you see the
following:
*** Cluster Interconnect Menu ***
Please select from one of the following options:
1)
2)
3)
4)
5)
6)
7)
8)
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
?) Help
al use
m
q) Return
kato the
toMain Menu
g
e
ban licens
Option:
a
b
u
le
k
b
a
a
l yFor example,
er if you wanted to permanently delete an entire private
f
u
s
d
an you need to perform the following tasks in the correct order:
ab -trnetwork,
g
n non 1. Disable the cable or cables that define the transport.
a
b
a
2.
3.
4.
Nothing bad happens if you try to do things in the wrong order; you are
just informed that you missed a step. But this would be the same with the
command-line or with clsetup.
The clsetup command saves you from needing to remember the
commands, sub-commands, and options.
5-36
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
tthe Java language to
@ with
You can use any modern Web-browser u
enabled
n
b
e
d Manager.
access the Sun Java Web Console y
and
akthe Sun
tuCluster
(
S
in this
d
u
Usage of Sun Cluster Manager
al usisemuch like the usage of clsetup in that:
m
ka need
ttoounderstand the cluster tasks before
You stillgreally
e
s
accomplishing
ban licenanything.
a
b It saves
u
leyou from having to remember the syntax of the lower-level
k
b
a
a
r
l y sfecommands.
u
d
ab -tran It accomplishes all its actions through the lower-level commands,
g
n non
and shows the lower-level commands as it runs them.
a
b
a
The Java ES installer also automatically installs or upgrades the Sun Java
Web Console, if needed, regardless of whether you choose to install Sun
Cluster Manager.
Many of the exercises in the modules following this one offer you the
opportunity to view and manage device and resource groups through Sun
Cluster Manager. However, this course does not focus on the details of
using Sun Cluster Manager as the method of accomplishing the task.
Similar to clsetup, after you understand the nature of a task, Sun Cluster
Manager can guide you through it. This is frequently easier than
researching and typing the syntax correctly using the lower-level
commands.
5-37
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Use the following URL on a Web browser enabled with Java technology to
access the Sun Java Web Console.
https://nodename:6789
Figure 5-1 shows the Sun Java Web Console login window. Cookies must
be enabled on your Web browser to allow Sun Java Web Console login
and usage.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Figure 5-1
Log in with the user name of root and the root password.
Alternatively, you can create a non-root user or role authorized to have
full or limited access through RBAC. By default, any user will be able to
log in to Sun Cluster Manager through the Sun Java Web Console and
have view-only access.
5-38
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Figure 5-2
5-39
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Figure 5-3
5-40
Running Cluster Commands as Non-root User or Role Using Role Based Access
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
solaris.cluster.read
This authorization gives the ability to do any status, list, show
subcommands. By default every user has this authorization, since it
is in the Basic Solaris User profile
solaris.cluster.modify
s
) ha
y
m
om
c
solaris.cluster.admin
csm Guide
e
t
This gives the ability to do switch,b@
online,
offline,
enable,
n
e
u
d
k
disable subcommands. ya
tu
(
S
n
di e this
u
l
a usRBAC authorizations of a much finer
m
Note Sun Cluster
3.1 required
a
k authorizations
to
g
granularityn
(separate
to manage quorum, interconnect,
e
sso on). These old
a
n
b
e
resource
groups,
and
authorizations are syill accessible
c
a
i
l
b
and
for back-compatibility, but they are no longer required.
u are supported
le
k
b
a
a
l y sfer
u
d
ab -tranLike any RBAC authorizations, the cluster authorizations can be:
g
n non
a
Assigned directly to a user
b
a
This gives the ability to do add, create, delete, remove and
related subcommands
5-41
Controlling Clusters
Controlling Clusters
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak installation,
Note After an initial Sun Cluster software
tud there are no
y
(
S
s concerned.
configured resource groups with
inwhichtto
d
hibe
u
l
e
a us
m
a
k e to
g
ban alicCluster
ens
ShuttingaDown
b
u
le
k
b
a
a
r down the entire cluster with the cluster shutdown
l yYou can
eshut
f
u
s
d
from any active cluster node. When your cluster is in
an
ab -trcommand
g
production
and running clustered applications, you will have a goal of
n
n
o
a
n
never having to do this. The whole purpose of the Sun Cluster
ab
environment is that you should always be able to keep at least one node
running.
vincent:/# cluster shutdown -y -g0
Apr 9 03:59:49 vincent cl_runtime: NOTICE: CMM: node
reconfiguration #20 completed.
Apr 9 03:59:49 vincent cl_runtime: NOTICE: CMM: Quorum
device /dev/did/rdsk/d4s2: owner set to node 1.
vincent:/# /etc/rc0.d/K05stoprgm: Calling clzc halt -n
vincent +
/etc/rc0.d/K05stoprgm: Calling scswitch -S (evacuate)
/etc/rc0.d/K05stoprgm: disabling failfasts
Apr 9 03:59:58 vincent syseventd[413]: SIGHUP caught reloading modules
Apr 9 03:59:59 vincent syseventd[413]: Daemon restarted
5-42
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Controlling Clusters
svc.startd: The system is coming down. Please wait.
svc.startd: 150 system services are now being stopped.
Apr 9 04:00:05 vincent cl_eventlogd[3143]: Going down on
signal 15.
Apr 9 04:00:37 vincent syslogd: going down on signal 15
Apr 9 04:00:37 rpc.metad: Terminated
svc.startd: The system is down.
syncing file systems...NOTICE: clcomm: Path vincent:ce2 theo:ce2 being drained
NOTICE: clcomm: Path vincent:ce3 - theo:ce3 being drained
NOTICE: CMM: Node theo (nodeid = 2) is down.
NOTICE: CMM: Cluster members: vincent.
TCP_IOC_ABORT_CONN: local = 000.000.000.000:0, remote =
172.016.004.002:0, start = -2, end = 6
TCP_IOC_ABORT_CONN: aborted 0 connection
NOTICE: CMM: node reconfiguration #22 completed.
done
NOTICE: CMM: Quorum device /dev/did/rdsk/d4s2: owner set to
node 1.
WARNING: CMM: Node being shut down.
Program terminated
{0} ok
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
5-43
Controlling Clusters
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
To boot a node to non-cluster mode you supply the -x boot option, which
gets passed through to the kernel.
y
m
om
c
m -x
ide
Booting a SPARC Platform Machine With
csthe
u
e
G
t
@
n
b
Command
ku tude
a
y
in ( isthsimple:
is S
For a SPARC-based machine,ubooting
d
al use
m
{1} ok boot -x
ka e to
g
Resetting ...
ban licens
a
b
u
le
k
b
a
a
Rebooting with
command:
boot
-x
y fer
l
u
s
d /pci@1f,700000/scsi@2/disk@0,0:a
Boot device:
File and args: -x
n
b
a
a
r
t
SunOS
Generic_141444-09 64-bit
g Release
n- 5.10 Version
n
o
a
Copyright
1983-2009
Sun
Microsystems,
Inc. All rights reserved.
n
ab
Use is subject to license terms
Hostname: vincent
Reading ZFS config: done.
Mounting ZFS filesystems: (5/5)
vincent console login: root
Password:
# cluster status
cluster: (C152734) This node is not in cluster mode.
5-44
Controlling Clusters
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
+----------------------------------------------------------------------+
| Solaris 10 11/09 s10x_u8wos_08 X86
|
| Solaris failsafe
|
+---------------------------------------------------------------------+
Use the ^ and v keys to select which entry is highlighted.
Press enter to boot the selected OS, 'e' to edit the
commands before booting, or 'c' for a command-line.
The highlighted entry will be booted automatically in 20 seconds.
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
l OS highlighted,
e
a10
s
With the normal Solaris
press the e key to edit the boot
m
u
a the following
o
k
t
parameters. You
see
screen:
ng ense
a
b
a
lic lower / 2095552K upper memory)
b
e
u
l
GNU GRUB version
0.95
(615K
k rab
a
y
ul nsfe
d
+----------------------------------------------------------------------+
b
a (hd0,0,a)
tra
| root n
|
g
n
o
a
n
|
ab | kernel /platform/i86pc/multiboot
| module /platform/i86pc/boot_archive
|
+----------------------------------------------------------------------+
Use the ^ and v keys to select which entry is highlighted.
Press 'b' to boot, 'e' to edit the selected command in the
boot sequence, 'c' for a command-line, 'o' to open a new line
after ('O' for before) the selected line, 'd' to remove the
selected line, or escape to go back to the main menu.
5-45
Controlling Clusters
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
You need to use the arrows to highlight the line that begins with kernel,
then press the e again to edit that specific line and add the -x
[ Minimal BASH-like line editing is supported. For the first word, TAB
lists possible command completions. Anywhere else TAB lists the possible
completions of a device/filename. ESC at any time exits. ]
grub edit> kernel /platform/i86pc/multiboot -x
Press return to get back to the screen listing boot parameters, where you
will see your -x in the appropriate place. Now you can press b to boot.
s
) ha
y
m
om
c
+----------------------------------------------------------------------+
csm Guide |
| root (hd0,0,a)
e
@ ent
b
| kernel /platform/i86pc/multiboot -x
|
u
d
k
u
a
| module /platform/i86pc/boot_archive
|
t
(y is S
n
+----------------------------------------------------------------------+
i
h highlighted.
tis
lud entry
Use the ^ and v keys to select which
e
a
us command in the
Press 'b' to boot, 'e' to k
edit
amthetoselected
g command-line,
boot sequence, 'c' forna
'o' to open a new line
se
a
n
b
e
after ('O' for before)
line, 'd' to remove the
a the
lic selected
b
e
selected line,
or
escape
to
go
back
to the main menu.
u
l
k
b
a
a
l y5.10sVersion
er Generic_141445-14 64-bit
f
u
d
SunOS Release
an Sun Microsystems, Inc. All rights reserved.
ab 1983-2009
r
t
Copyright
g
n is subject
on to license terms.
a
Use
n
b
a
GNU GRUB version 0.95 (615K lower / 2095552K upper memory)
Hostname: gabi
5-46
Controlling Clusters
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
Present
------0
Possible
-------0
Status
-----Offline
In addition, the vote count for any dual-ported quorum device physically
attached to the node is also set to 0.
You can reset the maintenance state for a node by rebooting the node into
the cluster. The node and any dual-ported quorum devices regain their
votes.
5-47
Controlling Clusters
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Switch
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak SQD(1)
tud
y
(
QD(1)
in this
d
u
al use
m
ka e Quorum
to
Figure 5-4 Clustered-Pair
Devices
g
n
s
a
n
ab lice
b
Imagine
u thereblise no way that you can add a quorum device between
k
a
ra 3 as we described in an earlier module (maybe you have no
ynodes f2eand
l
u
s
n available storage controllers).
bd trmore
a
a
g onn
a
n
Now imagine that node 4 has died. At that point in time, the cluster
ab
Node 1
(1)
Node 2
(1)
Node 3
(1)
Node 4
(1)
survives, but you can tell that if you lose node 3, you will lose the whole
cluster, because you would have only three of the total possible six
quorum votes.
If you put node 4 into maintenance mode, you would eliminate its
quorum vote, and the quorum vote of the shared quorum device between
nodes three and four. There would temporarily be a total possible value of
four quorum votes, making the required number of votes 3. This would
allow you to survive the death of node 3.
5-48
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
m
o
c
same
Note In the current revision nodes can communicate
using the
e
m
d
s
i
Remote Procedure Calls that are used use to communicate
ec t Guduring
@
scinstall. No other remote shell accessbis required
n between nodes. In
e
u
d
k
previous revisions of Sun Cluster 3.2,
you
have
to
set
up rsh or ssh
a Stu
y
(
equivalence for root manually.
in this
d
u
al use
m
# clsetup
ka e to
g
ban licens
a
*** Main Menuub
***
le
k
b
a
a
l yfromsfone
er of the following options:
u
Select
d
ab -tran
g
an non1) Change Network Addressing and Ranges for the Cluster Transport
2) Show Network Addressing and Ranges for the Cluster Transport
?) Help with menu options
q) Quit
Option:
>>> Change Network Addressing and Ranges for the Cluster Transport <<<
Network addressing for the cluster transport is currently configured
as follows:
5-49
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
172.16.0.0
255.255.240.0
64
10
12
yes
no
s
) ha
192.168.5.0
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
Maximum number of nodes anticipated ifor
n future
is growth [2]? 4
d
h
t
u
e
al anticipated
s
Maximum number of private networks
for future growth
m
u
a
o
k
t
[2]?4
ng ense
a
b
c about number of virtual clusters
a
liask
// Note this script
does not
b
e
u
l
k rab
a
y
fe of 255.255.255.0 to meet anticipated future
ula netmask
Specify
s
d
n
b
a
requirements
tra of 4 cluster nodes and 4 private networks.
g
n
n
o
aba Whatn netmask do you want to use [255.255.255.0]? <CR>
.
.
.
.
.
.
yes
5-50
s
) ha
y
m
om
c
e
idthe
csmtool
Boot all nodes into the cluster and run the cconsole
on
u
e
G
t
@
administration workstation.
n
b
ku tude
a
y
n ( this S
i
d
Note During this exercise,
you see italicized names, such as
lu when
e
a
s
IPaddress, enclosure_name,
am to unode1, or clustername embedded in a
k
command string,
g substitute
e the names appropriate for your cluster.
n
s
a
n
ab lice
b
u
le
k
b
a
a
l y 1sferVerifying Basic Cluster Configuration and
Task
u
d
an
ab Status
r
t
g
n non
a
b
a
Preparation
Perform the following steps to verify the basic status of your cluster:
1.
2.
5-51
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
3.
4.
_____
_____
_____
5.
6.
s
) ha
y
m
om
c
ab
4.
5.
5-52
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Add the quorum server quorum device. The name you give to the
device on the cluster side (the last argument to the command) is
unimportant, you can use anything you want.
# clq add -t quorum_server \
-p qshost=qserver_name_or_IP -p port=9000 qservdude
# clq status
as
h
2. Delete your disk quorum device(s). If you have a quorum server
)
y
m
device you need no other quorum devices:
om
c
# clq remove old-d-# [old-d#]
csm Guide
e
# clq status
@ ent
b
u
akAddSback
3. (Optional): Reverse the process.
tudthe disk quorum devices
y
(
and remove the quorum
inserverthquorum
is device. If you have a cluster
d
u
l having
with non-storage a
nodes,
a
quorum server quorum device is
e
s
m
u
not necessarily
owhat you want, because it will allow the nonka exactly
talive
g
e
storagennode
to s
stay
even if both storage nodes have failed.
a
n
b
e
#a clq add
licd# [d#]
b
e
u
l
k #raclq
b remove qservdude
a
y
l
e
f
bdu trans
a
ang non
ab
5-53
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Verify that all nodes are active cluster members. If you have a
three-node cluster (Pair +1), shut down the node not attached to
storage with init 0.
2.
3.
s
) ha
y
m
om
c
4. Boot Node 1.
e
csm G
uidis because
Node 1 should hang waiting for operational e
quorum.
This
t the quorum
@ enfrom
b
the reservation key for Node 1 has been
removed
u
ak Stud
disk(s).
y
(
in should
d
hiscomplete the cluster software
5. Now boot Node 2. Both
nodes
t
u
l
e
ajoin inuclustered
s
startup sequence and
operation.
m
a
o
k
t
ng ense
a
b
a
lic the Cluster Private IP Address
Task 5 uChanging
b
e
l
k rab
a
y
Range
ul nsfe
d
b
a
a
trPerform
g
n
the following steps:
n
o
a
n
b
a
# init 0
1.
5-54
2.
3.
4.
On the chosen node only, run the procedure to change the cluster
private IP address range:
a.
b.
c.
d.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
f.
g.
h.
i.
j.
5.
When the command succeeds, reboot all nodes back into the cluster.
6.
s
) ha
y
m
om
c
m uide
csglobal.
b. Verify the output of cluster show e-t
G
t
@
n
b
ku tude
a
y
n ( this S
i
d
lu se
a
am to u
k
ng ense
a
b
a
lic
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
no
aba
a.
5-55
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
1.
s
) ha
y
m
om
c
sm uide
c
e
a.
Run the browser on your remote display.
G
t
@
n
b
de through ssh.
ku thetutraffic
b. Run the browser locally anda
tunnel
y
n ( this S
i
d
lu se
a
Note Consult your instructor
u how this will be accomplished.
am toabout
k
ntheg user
se
a
n
2. Log inbas
root with the root password.
e
a
ic
l
b
e
u
l
3. k Navigate
b to the Sun Cluster Manager application.
a
a
r
y
fe
yourself with Sun Cluster Manager navigation and the
ul 4. nsFamiliarize
d
b
a
topological
views.
a
r
g on-t
n
a
n
ab
If you are running the class with remote equipment, you might be
able to use a Web browser to access Sun Cluster Manager in one of
two ways:
5-56
Exercise Summary
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Exercise Summary
Experiences
Interpretations
Conclusions
Applications
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
5-57
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Exercise Summary
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
5-58
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 6
Objectives
ab
y
m
om
Upon completion of this module, you should be able to:
c
e
csm GVolume
uid Manager
Describe the most important concepts of e
VERITAS
tthe Sun Cluster 3.2
@
(VxVM) and issues involved in using
VxVMein
n
b
u
ak Stud
software environment
y
(
in this and shared storage disk
Differentiate between
bootdg/rootdg
d
u
al use
groups
m
a
o
kVERITAS
tVolume
g
Initialize
a
Manager disk
e
n ens
a
b
a
ic basic objects in a disk group
Describe
lthe
b
e
u
l
k Describe
a
ab the types of volumes that will be created for Sun Cluster 3.2
r
y
l
e
f
bdu trans software environments
a
Describe the general procedures and restrictions for installing and
ang non
Use basic commands to put disks in disk groups and build volumes
Describe the two flags used to mark disks under the typical hot
relocation
6-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Are there any VxVM feature restrictions when VxVM is used in the
Sun Cluster software environment?
In what way does Sun Cluster provide high availability for disk
groups?
Can your prevent Sun Cluster from providing a global device service
for your volumes?
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
6-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Additional resources The following references provide additional
information on the topics described in this module:
Sun Cluster System Administration Guide for Solaris OS, part number
820-7458 (for Sun Cluster 3.2 11/09).
Sun Cluster Software Installation Guide for Solaris OS, part number 8207356 (for Sun Cluster 3.2 11/09).
Sun Cluster Concepts Guide for Solaris OS, part number 821-0259 (for
Sun Cluster 3.2 11/09)uide for Solaris OS, part number 820-4676 (for
Sun Cluster 3.2 1/09).
s
) ha
y
m
6-3
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ab
6-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
ab
as
h
All of the data associated with applications that run in the Sun Cluster
3.2
)
yto at
software environment must be in storage that is physically ported
m
least two nodes. Disk groups are created using only disks
oinmmultiple
c
e
arrays that are connected to the same collection ofsnodes.
m
d
i
ec t Gu
@
b den
u
k
VERITAS Management on (Local
tu (Optional in
ya Disks
S
n
VxVM 4.x and Above)ludi
his
t
e
a us
m
a
k VxVM
torequired that each node have an independent
Prior to VxVM
4.0,
g
e
ns In these earlier versions you could not
disk group
rootdg.
bannamed
e
c
a
li else in VxVM until rootdg was configured. You
b anything
configure
e
u
l
k
a needed
atobhave this disk group even if you did not intend VxVM to
r
y
l
e
f
s
your boot disk. In that case, you needed at least one (preferably
bdu tranmanage
a
- two, for HA) sacrificial local disks so that you could have a rootdg.
ang non
Starting in VxVM 4.x, it is optional to have any disk group at all configured
for the local disks. You can choose not to configure any VxVM
configurations on local disks, and you are still able to create your shared
storage disk groups.
If you want to have VxVM 4.x or 5.x manage your boot disk (that is, to
encapsulate your boot disk), then you have this disk (and presumably
another because there is no reason to encapsulate root if you are not going
to mirror it) in a dedicated local VxVM disk group. This group can have
any group name. VxVM automatically sets up a symbolic link so that
whatever the actual group name is there will be a link to it called bootdg.
6-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Node 2
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
Boot Disks
Boot Disks
an cens
b
a
i
(bootdg->rootdg
[optional ])
(bootdg->rootdg
[optional])
l
b
e
u
l
k
a 6-1
abTypical Disk Organization in a Sun Cluster Software
r
y
l
e
Figure
f
Environment
bdu trans
a
g
n non
a
b
a
s
) ha
6-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
It physically reads and writes data to the drives within the disk
group.
ab
as
It can voluntarily give up ownership of the disk group by deporting
h
)
y
the disk group.
m
om
c
csm Guide
Sun Cluster Management of Disk Groups
e
@ ent
b
u
ak Stuthed cluster is responsible for
y
After a disk group is managed by
the cluster,
(
n import
ito
issuing all VxVM commands
d
hisand deport disk groups. The node
t
u
l
e
adisk group
currently importingm
the
s becomes the primary device group
u
a
o
k et
server.
g
n
a cens
b
a
li disk groups so that the Sun Cluster software has
Registering
VxVM
b
e
u
l
k
a knowledge
ab of them is described inRegistering VxVM Disk Groups on
r
y
l
e
f
page
6-32.
bdu trans
a
ang non
While the fact that only one node imports a disk group remains true in the
Sun Cluster software environment, Sun Cluster softwares global device
infrastructure makes it appear that devices in the disk group are accessible
from all nodes in the cluster, including nodes that are not even physically
connected to the disks in the disk group.
All nodes that are not the current primary for a particular disk group
actually access the device data through the cluster transport. This applies
even for other nodes that are physically connected to the disks.
6-7
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
o
c
6-8
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
Traditional Solaris OS Disks and Cross-Platform
Data
m
m
Sharing (CDS) Disks
co
csm Guide
e
VxVM has two different ways of initializing
t is the traditional
@disks.enOne
b
u
way which uses separate Solaris OS disk
slices
for
the
k tud private region (slice
a
y
3) and the public region (slice 4).( This is a S
n this disk layout specific to the
i
d
Solaris OS.
lu se
a
u
am
o
k
t
As shown in Figure
6-2,
the
private
region is small. For example, in VxVM
ng ense
a
5.0 it is b
32MB.
a
lic
b
e
u
l
k rab
Private region
a
y
l
e
f
bdu trans
a
ang non
ab
Configuration and
Management Information
Data storage
Figure 6-2
Public region
6-9
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Starting in VxVM 4.0, the new default way to partition disks is called
Cross-Platform Data Sharing (CDS) disks. The VxVM configuration on
these disks can be read by VxVM running on all its supported platforms,
not just on the Solaris OS. As shown in Figure 6-3 this layout combines
the configuration and data storage into one large partition (slice 7)
covering the entire disk.
Private
CDS
private
and
public
regions
both
managed
internally
in s7
s
) ha
y
m
om
c
Public
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
Figure 6-3 CDS Disk Layout
u
al use
m
ka e to you are not able to access VxVM disks
g
In the Sun Cluster
environment
s
nthan
ban other
e
from anyaservers
in the same cluster, it does not matter
c
liyou choosethose
b
e
which
disk
layout
for
your
data disks.
u
l
k
b
a
a
l y sfer
u
d
ancannot use CDS disks for the bootdg.
ab -trYou
g
n non
a
b
While initializing a disk and putting it in a disk group are two separate
a
operations, the vxdiskadd utility can perform both steps for you. The
defaults are always to use CDS disks, but the vxdiskadd command can
guide you through setting up your disks either way
Note You cannot use the CDS layout for EFI disks. The EFI label is
required for disks of size 1 Terabyte or greater. VxVM can deal with these
properly, but only using the sliced layout that is specific to the Solaris OS.
6-10
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
6-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Volume
The volume is the actual logical storage device created and used by all
disk consumers. The disk consumers may be file systems, swap space, or
applications, such as Oracle using raw volumes.
Only volumes are given block and character device files.
The basic volume creation method (vxassist) lets you specify parameters
for your volume. This method automatically creates the subdisks and
plexes for you.
Layered Volume
s
) ha
y
m
om
c
ab
6-12
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Simple Mirrors
s
) ha
y
m
m arrays
ostorage
c
Figure 6-4 demonstrates subdisks from disks in different
e
m
d
s
i
forming the plexes of a mirrored volume.
ec t Gu
@
b den
u
k
ya Stu
(
n
di e this
u
l
a us
m
a
k evolume
to nfsvol
g
an cens
b
a
c1t0d0
c2t0d0
li
b
e
u
l
disk01
disk02
k
b
disk01-01
disk02-01
a
a
r
y
ul nsfe
d
b
a
tra
plex1
plex2
g
n
n
o
a
n
ab
Figure 6-4
6-13
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Figure 6-5 demonstrates subdisks from disks in the same array striped
together. This is mirrored with a similar configuration to the other array.
volume nfsvol
s
) ha
y
m
disk01-01
disk02-01
om
c
disk03-01
disk04-01
sm uide
c
e
G
plex1
plex2
t
@
n
b
ku tude
a
y
n ( this S
i
d
lu se
a
am to u
k
ng ense
c1t1d0
c2t1d0
a
b
c
a
(disk03)
(disk04)
i
l
b
e
u
l
k
Figure
a 6-5
abMirror-Stripe Volume
r
y
l
e
f
bdu trans
a
g onn
a
n
ab
c1t0d0
(disk01)
6-14
c2t0d0
(disk02)
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Figure 6-6 shows two mirrored sub-volumes, both mirrored across storage
arrays, striped together to form the final volume.
volume nfsvol
subvolume
s
) ha
y
c2t0d0
m
disk01-01
disk02-01
om disk02
c
sm uide
c
e
G
plex1
plex2
t
@
n
b
subvolume ku
de
u
a
t
y
n ( this S
i
d
disk03-01
lu sedisk04-01
a
am to u
k
e
plex2
ng ensplex1
c1t1d0
c2t1d0
a
b
disk03
c
a
disk04
li
single striped plex
b
e
u
l
k rab
a
y
l Figure
e 6-6 Stripe-Mirror Volume
f
u
s
d
ab -tran
g
Fortunately, as demonstrated later in the module, this is easy to create.
n non
a
b
a
c1t0d0
disk01
6-15
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
m datauimarked
de in
cofsthe
With the DRL, VxVM knows exactly which regions
e
Gnot marked in
t
@
the DRL bitmap might need to be resynchronized.
Regions
n
b
dtoe be resynchronized.
kunot need
the bitmap are known to be clean, anda
do
u
t
y
n ( this S
i
d
luvolume
You use a DRL for any large
cluster. The whole purpose of
a
sein the
m
u
the cluster is making a
everything
behave
as
well
as possible after crashes.
o
k
t
ng ense
a
b
a
Size of
DRL
lic
b
e
u
l
k rab
a
y
are
fe small. Use the vxassist command to size them. The size of the
ul DRLs
s
d
n
b
a that the command chooses depends on the version of VxVM, but
a
trlogs
g
n
might
be, for example, 26 kilobytes (Kbytes) of DRL per 1 Gbyte of
n
a
no
ab
storage.
If you grow a volume, just delete the DRL, and then use the vxassist
command to add it back again so that it is sized properly.
Location of DRL
You can put DRL subdisks on the same disk as the data if the volume will
not be heavily written. An example of this is Web data.
For a heavily written volume, performance is better with a DRL on a
different disk than the data. For example, you could dedicate one disk to
holding all the DRLs for all the volumes in the group. They are so small
that performance on this one disk is still fine.
6-16
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The vxio major number must be identical on all nodes This is the
entry in the /etc/name_to_major file for the vxio device driver. If
the major number is not the same on all nodes, the global device
infrastructure cannot work on top of VxVM.
as
h
VxVM must be installed on all nodes physically connected to shared
)
y
storage On non-storage nodes, you can install VxVM ifm
you will
use it to encapsulate and mirror the boot disk.
om
c
e
idManager
If not (for example, you might be using Solaris
csmVolume
u
e
Gnode requires
software to mirror root storage), then
a non-storage
t
@
n
b
only that the vxio major number
deto the
kube added
u
a
t
y
/etc/name_to_major file.
n ( this S
i
d
luon allsstorage
A license is required
nodes not attached to Sun
e
a
m
u
StorEdge A5x00
o If you choose not to install VxVM on a nonka arrays.
t
g
e
storage
node you do not need a license for that node.
ban licens
a
b
u
le
k
b
a
a
Requirements
for bootdg/rootdg
l y sfer
u
d
ab -tran
g
n non
You can have an optional bootdg (pointing to an actual arbitrary group
a
b
a
name) on VxVM 4.x and above. You will likely have this only if you want
6-17
There are several cluster-specific issues with encapsulating the boot disk.
These caveats all involve the fact that among the file systems being
encapsulated on your boot disk is the /global/.devices/node@# file
system. The requirements are the following:
s
) ha
y
m
om
c
csm Guide
e
t the clvxvm
@
n
b
If you want to encapsulate the boot disk, you
shouldeuse
u
ak ofSthis
utility which automates the correct creation
tudvolume (with different
y
(
in on each
volume names and minor numbers
d
hisnode). This is described later
t
u
l
in this module.
e
a us
m
a
k e to
g
s
ban licinenSun
DMP Restrictions
Cluster 3.2
a
b
e
u
l
k rab
a
y
fe of VxVM supported by Sun Cluster 3.2 (VxVM 4.1 and 5.0)
versions
ul In n
s
d
b
a cannot permanently disable the DMP feature. Even if you take steps
a
tryou
g
n
n
to
disable DMP, it automatically re-enables itself each time the system is
o
a
n
b
a
booted.
The reason for these restrictions is that this file system is mounted as a
global file system. The typical Solaris OS /etc/mnttab logic still demands
that each device and major/minor combination be unique.
Having multiple paths from the same node to the same storage under
control of VxVM DMP is still not supported. You can:
6-18
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
3.
4.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
6-19
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ab
ends. This is many more than the minimal software required to run
VxVM in the cluster.
6-20
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The following are the only VxVM packages required on all the nodes:
VRTSvxvm
VRTSvlic
The VxVM 4.1 and 5.0 packages are distributed on the media as .tar.gz
files. The installer and installvm utilities extract these correctly.
If you want to install VxVM without using the utilities you copy and
extract these archives manually and then install them with pkgadd on
each node. You then have to manually use vxinstall to license and
initialize the software.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
6-21
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The installvm guides you logically through the tasks. The initial screens
look similar to the following:
Veritas Volume Manager 5.0 Installation Program
Copyright (c) 2006 Symantec Corporation. All rights reserved. Symantec, the
Symantec Logo are trademarks or registered trademarks of Symantec Corporation or
its affiliates in the U.S. and other countries. Other names may be trademarks of
their respective owners.
The Licensed Software and Documentation are deemed to be "commercial computer
software" and "commercial computer software documentation" as defined in FAR
Sections 12.212 and DFARS Section 227.7202.
y
m
om
c
Enter the system names separated by spaces on which to install VxVM: vincent
m utheo
s
ide
c
Initial system check:
e
G
t
@
n
b
e
installvm requires that ssh commands used between systems
dwithout
kuexecute
u
a
t
y
prompting for passwords or confirmations. If installvm
hangs
or
asks
for a login
( is S
n
i
password or hangs, stop installvm and run it again
with
the
ssh
configured
for
thoption.
ludthes-rsh
password free logins, or configure rsh andause
e
am to u
k
Checking ssh communication with
theo
SunOS 5.10
g ns.............................
e
n
a
Checking VxVM installation
on
vincent
.........................
not
b on ltheo
e ............................ not installed
c
a
i
Checking VxVM installation
installed
b
e
u
l
k
a erab
y
l
f
uinstalled
s
d
VxVM can b
be
without optional packages to conserve disk space.
n
a
tra
g
n
n
a
nopackages are typically installed to simplify future upgrades.
abAdditional
s
) ha
1)
2)
3)
6-22
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
c
Running clvxvm encapsulate
csm Guide
e
If you choose this option, clvxvm negotiates
t major number. It
@the vxio
n
b
e
u
then encapsulates your root disk by performing
the
following
tasks:
k tud
a
y
( in aisdisk
S group named rootdg, and
ndisk
It encapsulates your boot
i
d
h
u se t
llink.
creates the bootdg
a
u
o
kamvolume
t
It gives g
different
names for the volumes containing the
e
n
s
/global/.devices/node@#
file systems on each node.
ba licen
a
b It editslethe vfstab file for this same volume, replacing the DID
u
k
a edevice
ab with the original c#t#d#s#. This allows VxVM encapsulation
r
y
l
f
bdu trans to properly recognize this is a partition on the OS disk.
a
It installs a script to reminor the bootdg on reboot.
ang non
Note VxVM itself (not our utilities) still puts in a nologging option for
the root file system when you encapsulate. This is a leftover from an old
problem that has been fixed. You must remove the nologging option
from /etc/vfstab manually and reboot one more time.
6-23
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Give a different name for the root disk on each node. Do not use the
default disk name on each node.
The result is that the volume name for the
/global/.devices/node@# file system is different on each node.
2.
Make sure you do not enter any shared disk storage drives in the
bootdg.
s
) ha
y
m
om
c
e
csmoutGthat
uidit must
Without making this change, VxVM cannot figure
e
t
@VxVMenvolume
edit that line after the reboot to put inuthe
name.
b
d
k
tu reboot after that
ya aSsecond
4. Reboot with boot -x. VxVM arranges
(
n
which brings you back u
into
di theecluster.
his
t
l
a uallsbut one of the nodes because of the
m
5. That second reboot
fails on
a
k numbers
tofor bootdg (the conflict is really just for
g
conflict innminor
e
ba licens
the /global/.devices/node@#
volume).
a
b
e give the root password to go into single user mode.
uOn those
lnodes,
k
b
a
a
l y sUse
erthe following command to fix the problem:
f
u
d
ab -tran # vxdg reminor bootdg 50*nodeid
g
n non
a
For example, use 50 for Node 1, 100 for Node 2, and so forth. This
b
a
3.
6.
Reboot the nodes for which you had to repair the minor numbers.
6-24
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
If you need to change the vxio major number to make it agree with the
other nodes, do the following:
1.
2.
3.
Reboot.
4.
s
) ha
y
m
om
c
csm Guide
e
If this is on a volume manager device:
@ ent
b
u
aksameSname
1. Rename the volume if it has(y
the
tud as the /globaldevices
in tvolume
is of any other node. You might
or /global/.devices/node@#
d
h
u
l
e
need to manuallyaedit the s
/etc/vfstab file.
m
u
a
o
k eoperation
t
2. Performg
a reminor
on the rootdg if it is using the same set
n
s
a
n
of b
minor
numbers
as
another
node. Follow the same procedure as
e
c
a
i
l
b Step 5leon page 6-24.
u
k
a erab
y
l
u nsf
d
b
a
tra
g
n
n
a
no
If you are still at a point before cluster installation, you need to have a
/globaldevices placeholder file system or at least a correctly sized
device ready for cluster installation.
ab
6-25
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ide
csm Ginvalid
u
e
@ ent invalid
b
u
invalid
k tud
a
y
invalid
n ( this S
i
d
invalid
lu se
a
invalid
am to u
k
invalid
g
e
n
s
invalid
ba licen
a
invalid
b
e
u
l
k
invalid
a erab
y
l
invalid
f
u ns
d
b
invalid
a
tra
g
n
invalid
n
o
a
n
b
invalid
a
vincent:/# vxdisk -o alldgs list
DEVICE
TYPE
DISK
c0t0d0s2
auto:sliced
rootdg_1
c0t1d0s2
auto:none
c1t0d0s2
auto:none
c1t1d0s2
auto:none
c1t2d0s2
auto:none
c1t3d0s2
auto:none
c1t8d0s2
auto:none
c1t9d0s2
auto:none
c1t10d0s2
auto:none
c1t11d0s2
auto:none
c2t0d0s2
auto:none
c2t1d0s2
auto:none
c2t2d0s2
auto:none
c2t3d0s2
auto:none
c2t8d0s2
auto:none
c2t9d0s2
auto:none
c2t10d0s2
auto:none
-
GROUP
rootdg
-
STATUS
online
online
online
online
online
online
online
online
online
online
online
online
online
online
online
online
online
invalid
invalid
The command vxdisk list with the option -o alldgs scans every disk
to see if there is any disk group information, even about disk groups not
currently imported on this node. In this output you can see that there is
no disk group information configured on other disks other than the first
disk.
Disks with the invalid state are not yet initialized by VxVM.
6-26
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
# vxdg list
c
NAME
STATE
ID
sm uide
c
e
G
rootdg
enabled
1152724944.22.vincent
t
@
n
b
nfsdg
enabled,cds
1152725899.26.vincent
ku tude
a
y
n ( this S
i
d
u contains
lgroup
e the name of the node on which it
Note The ID of a disk
a
s
m
u
was created. Later,
kayou might
to see the same disk group with the same ID
g
e
imported a
b onnalidifferent
ens node.
c
a
b
u
le
k
b
# vxdisk list
a
a
y TYPEfer
DEVICE ul
DISK
GROUP
STATUS
s
d
n
b
c0t0d0s2
rootdg_1
rootdg
online
a
traauto:sliced
g
n
c0t1d0s2
auto:none
online invalid
n
o
a
n
b
auto:cdsdisk
nfs1
nfsdg
online
a c1t0d0s2
The following command shows which groups are imported:
c1t1d0s2
c1t2d0s2
c1t3d0s2
c1t8d0s2
c1t9d0s2
c1t10d0s2
c1t11d0s2
c2t0d0s2
c2t1d0s2
c2t2d0s2
c2t3d0s2
c2t8d0s2
c2t9d0s2
c2t10d0s2
c2t11d0s2
auto:cdsdisk
auto:none
auto:none
auto:none
auto:none
auto:none
auto:none
auto:cdsdisk
auto:cdsdisk
auto:none
auto:none
auto:none
auto:none
auto:none
auto:none
nfs3
nfs2
nfs4
-
nfsdg
nfsdg
nfsdg
-
online
online
online
online
online
online
online
online
online
online
online
online
online
online
online
invalid
invalid
invalid
invalid
invalid
invalid
invalid
invalid
invalid
invalid
invalid
invalid
6-27
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The following shows the status of an entire group where no volumes have
been created yet:
# vxprint -g nfsdg
TY NAME
ASSOC
dg nfsdg nfsdg
KSTATE
-
LENGTH
-
PLOFFS
-
STATE
-
TUTIL0
-
PUTIL0
-
dm
dm
dm
dm
71061376
71061376
71061376
71061376
nfs1
nfs2
nfs3
nfs4
c1t0d0s2
c2t0d0s2
c1t1d0s2
c2t1d0s2
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
6-28
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
default
default
30000
1152725899.26.vincent
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
d
v nfsvol
ENABLED ACTIVE y204800
fsgen
ak StuSELECT
(
pl nfsvol-01 nfsvol
ENABLED ACTIVE
204800
CONCAT
RW
n
i
is
d
h
t
u
sd nfs1-01
nfsvol-01 nfs1
0l
c1t0d0
ENA
e204800 0
aACTIVE
s
m
u
pl nfsvol-02 nfsvol
ENABLED
204800
CONCAT
RW
ka e0 to
g
sd nfs2-01
nfsvol-02 nnfs2
204800
0
c2t0d0
ENA
s
a
n
b
e
a
lic
b
e
u
l
k raaMirrored
b
a
Building
Striped Volume (RAID 0+1)
y
l
e
f
u
s
bd tran
a
g on- The following example rebuilds the mirror. Each plex is striped between
n
a
n
two disks in the same array so mirroring is still across controllers.
ab
dm
dm
dm
dm
nfs1
nfs2
nfs3
nfs4
c1t0d0s2
c2t0d0s2
c1t1d0s2
c2t1d0s2
auto
auto
auto
auto
65536
65536
65536
65536
71061376
71061376
71061376
71061376
default
default
30000
1152725899.26.vincent
dm
dm
dm
dm
c1t0d0s2
c2t0d0s2
c1t1d0s2
c2t1d0s2
auto
auto
auto
auto
65536
65536
65536
65536
71061376
71061376
71061376
71061376
ENABLED
ENABLED
ACTIVE
ACTIVE
204800
204800
SELECT
STRIPE
nfs1
nfs2
nfs3
nfs4
v nfsvol
pl nfsvol-01
nfsvol
fsgen
2/128
RW
6-29
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
nfs1-01
nfs3-01
nfsvol-02
nfs2-01
nfs4-01
nfsvol-01
nfsvol-01
nfsvol
nfsvol-02
nfsvol-02
nfs1
nfs3
ENABLED
nfs2
nfs4
0
0
ACTIVE
0
0
102400
102400
204800
102400
102400
0/0
1/0
STRIPE
0/0
1/0
c1t0d0
c1t1d0
2/128
c2t0d0
c2t1d0
ENA
ENA
RW
ENA
ENA
s
) ha
# vxassist -g
# vxassist -g
# vxprint -ht
.
.
dg nfsdg
pl
sd
pl
sd
nfsvol-P01
nfs1-02
nfsvol-P02
nfs2-02
nfsvol-L01
nfsvol-P01
nfsvol-L01
nfsvol-P02
ENABLED
nfs1
ENABLED
nfs2
ACTIVE
0
ACTIVE
0
102400
102400
102400
102400
CONCAT 0
CONCAT
0
c1t0d0
c2t0d0
v
pl
sd
pl
sd
nfsvol-L02
nfsvol-P03
nfs3-02
nfsvol-P04
nfs4-02
nfsvol-L02
nfsvol-P03
nfsvol-L02
nfsvol-P04
ENABLED
ENABLED
nfs3
ENABLED
nfs4
ACTIVE
ACTIVE
0
ACTIVE
0
102400
102400
102400
102400
102400
SELECT
CONCAT
0
CONCAT
0
fsgen
RW
c1t1d0
ENA
RW
c2t1d0
ENA
y
m
om
c
csm Guide
e
@ ent
default
default 30000
1152725899.26.vincent
b
u
ak Stud
y
(
dm nfs1
c1t0d0s2 auto
65536 in 71061376
is -d
h
t
dm nfs2
c2t0d0s2 auto
65536
71061376
u
e
al
dm nfs3
c1t1d0s2 auto am
65536 us
71061376 k 65536
to 71061376 dm nfs4
c2t1d0s2 auto
g
e
ban licens
a
v nfsvol
- ub
ENABLED
ACTIVE
204800
SELECT nfsvol-0 fsgen
e
l
k
b
pl nfsvol-03 ynfsvol
RW
a era ENABLED ACTIVE 204800 STRIPE 2/128
l
f
u
sv nfsvol-S01
nfsvol-03
nfsvol-L01
1
102400
0/0
2/2
ENA
s
bd trnfsvol-03
an
a
sv nfsvol-S02
nfsvol-L02 1
102400
1/0
2/2
ENA
g
n
n
no abva nfsvol-L01
ENABLED ACTIVE
102400 SELECT fsgen
6-30
RW
ENA
RW
ENA
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
SPARE
e
t disks to use for
@
n
b
Disks marked with the SPARE flag
are
the
preferred
e
u
k be used
astill
tudto build normal volumes.
hot relocation. These disks can
y
(
S
in this
d
NOHOTUSE
u
al use
m
Disks marked
ka withe the
to NOHOTUSE flag are excluded from
g
consideration
ban licenforshot relocation.
a
b following
u
le example, disk nfs2 is set as a preferred disk for hot
k
In
the
b
a
a
l y relocation,
er and disk nfs1 is excluded from hot relocation usage:
f
u
s
d
ab -tran# vxedit -g nfsdg set spare=on nfs2
g
n non
a
# vxedit -g nfsdg set nohotuse=on nfs1
b
a
Under normal hot relocation, disks can be marked with one of the two
following flags, but not both:
The flag settings are visible in the output of the vxdisk list and
vxprint commands.
6-31
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
6-32
Primary
-------
Secondary
---------
Status
------
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The -n option (node list) should list all the nodes and only the nodes
physically connected to the disk groups disks.
s
) ha
ab
y
m
om
c
e
idnode
csa m
u
The failback=true/false affects whether
preferred
takes
e
G
t
@
n
b
back its device group when it joins
e The default value is
u the cluster.
d
k
u
a
false. If it is true, it only works
if
preferenced
is also set to true.
t
y
(
S
n
di e this
u
l
a us
m
a
Using the clsetup
Command
to Register Disk Groups
k e to
g
an cens
b
a
li can guide you through the previous options in a
Thebclsetup utility
e
u
l
k
environment. From the main menus, selecting Menu
a menu-driven
a5b(Device
r
y
l
e
f
Option
Groups and Volumes) gives you the following submenu:
u ns
d
b
a
aDevice-trGroups
***
Menu ***
g
n
n
a
no
?) Help
q) Return to the Main Menu
6-33
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Use the cldg show command to show the properties of a device group (or
all device groups). Use cldg status to see the status.
# cldg show nfsdg
Device Groups ===
Device Group Name: nfsdg
Type:
failback:
Node List:
preferenced:
numsecondaries:
diskgroup name:
VxVM
false
vincent, theo
true
1
nfsdg
s
) ha
y
m
om
c
csm Guide
# cldg status
e
@ ent
b
u
Cluster Device Groups ===
ak Stud
y
(
in this
d
u
--- Device Group Status --al use
m
ka Secondary
to
g
Device Group Name
Primary
Status
e
n ens--------a
b
---------------------------c
a
i
l
b
nfsdg
theo
Online
u vincent
le
k
b
a
a
l y sfer
u
d
an By default, even if there are more than two nodes in the node list
ab -trNote
g
n non for a device group, only one node shows up as secondary. If the primary
a
b
a
fails, the secondary becomes primary and another (spare) node becomes
secondary.
6-34
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ab
6-35
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
6-36
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Failover file systems Mounted only on the node running the failover
data service, which must be physically connected to the storage
UFS and VxFS are two file system types that can be used as either global
or failover file systems. These examples and the exercises assume you are
using UFS.
s
) ha
y
m
m
co fileesystems
For UFS or VxFS, the distinction between a global and a failover file
system is made in the /etc/vfstab mount-at-boot and options columns.
A global file system entry should look similar to the following, and it
should be identical on all nodes (including nodes not physically
connected to the storage):
/dev/vx/dsk/nfsdg/nfsvol /dev/vx/rdsk/nfsdg/nfsvol /global/nfs ufs 2 yes global
A local failover file system entry looks like the following, and it should be
identical on all nodes who may run services which access the file system
(can only be nodes physically connected to the storage):
/dev/vx/dsk/nfsdg/nfsvol /dev/vx/rdsk/nfsdg/nfsvol /localnfs ufs 2 no -
6-37
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Note The logging option is the default for all OS versions supported
with Sun Cluster 3.2. You do not need to specify it explicitly.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
6-38
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Initialize and add another local drive to bootdg, if this has not been
done yet. This drive must be at least as big as the boot drive. Give
the drive the VxVM logical name rootmir, for example. This is done
as part of the vxdiskadd dialogue.
Make sure that you do not make the disk a CDS disk (choose
sliced).
s
) ha
y
m
omvolumes
2. Use the vxmirror command, or the vxdiskadm Mirror
on a
c
e
m
disk option to mirror all the volumes on the
drive.
csboot G
uid
e
@ ent
b
u
Caution Do not mirror each volume
This
ud withbe vxassist.
akseparately
tcannot
y
(
S
leaves you in a state that the mirrored
drive
unencapsulated.
in this the second disk you will not be
dunencapsulate
That is, if you ever need lto
u
a use
able to.
m
ka e to
g
nsdrive correctly as shown, the second drive can also
If you mirror
root
ban the
e
c
a
li That is because correct restricted subdisks are laid
bunencapsulated.
be
e
u
l
k
a down
onto
ab the new drive. These can later be turned into regular Solaris
r
y
l
e
f
bdu tranOSs partitions because they are on cylinder boundaries.
a
ang non
# vxmirror -g bootdg rootdg_1 rootmir
# vxdiskadd c0t8d0
ab
.
.
3.
The previous command also creates aliases for both the original root
partition and the new mirror. You need to manually set your bootdevice variable so you can boot off both the original and the mirror.
# eeprom|grep vx
devalias vx-rootdg_1 /pci@1f,4000/scsi@3/disk@0,0:a
devalias vx-rootmir /pci@1f,4000/scsi@3/disk@8,0:a
# eeprom boot-device="vx-rootdg_1 vx-rootmir"
4.
Verify that the system has been instructed to use these device aliases
on boot:
# eeprom|grep use-nvramrc
use-nvramrc?=true
6-39
s
) ha
y
m
ab
6-40
Preparation
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Record the location of the VxVM software you will install during this
exercise.
Location: _____________________________
During this exercise, you create two data service disk groups. Each data
service disk group contains a single mirrored volume. Encapsulating the
boot disk is an optional exercise at the end. The setup is shown in
Figure 6-7.
Node 1
Boot Disk
Boot Disk
bootdg
bootdg
Node 2
c0
s
) ha
y
m
ccccc
om
c1
c2
c2
c
c c1
nfsdg
nfsvol
webdg
webvol
Figure 6-7
Note During this exercise, when you see italicized names, such as
IPaddress, enclosure_name, node1, or clustername embedded in a
command string, substitute the names appropriate for your cluster.
6-41
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Before proceeding with this exercise, you must have a clear picture of the
disk drives that are used throughout this course. You may have one or
more disks configured as quorum devices (or you may have a quorum
server quorum device). It is perfectly acceptable to use a quorum disk as
one of your disk group drives as well. In this exercise, you must identify
the boot disk and two disks in each storage array for use in the two
demonstration disk groups, nfsdg and webdg.
Perform the following step to select disk drives:
s
) ha
y
m
om
c
Table 6-1
csm Guide
e
@ entDID # (d#)
c#t#d#
b
u
ak Stud
y
(
Boot disk
in this
d
u
al use
Quorum disk(s)
m
ka e to
g
an cens
b
a
nfsdgbdisk 1
li
e
u
l
k
anfsdg edisk
a2b(different controller
r
y
l
f
ns m disk 1, if possible)
bdu trafrom
a
g onn
a
n
ab
webdg disk 1
6-42
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
# cd vxvm_sw_dir/volume_manager/pkgs
om
c
cs\m Guide
# cp VRTSvlic.tar.gz VRTSvxvm.tar.gz
e
@ ent
VRTSvmman.tar.gz /var/tmp
b
u
ak Stud
y
(
# cd /var/tmp
in this
d
u
# gzcat VRTSvlic.tar.gz
xf al use|| tar
m
# gzcat VRTSvxvm.tar.gz
tar
xf a
o
k
t
# gzcat
| tar xf ngVRTSvmman.tar.gz
se
a
n
b
e
a the new
2. b Add
lic VxVM packages. Answer yes to all questions
e
u
l
k (including
b conflicts in directories).
a
a
r
y
ul nsfe# pkgadd -d /var/tmp VRTSvlic VRTSvxvm VRTSvmman
d
b
a
tra 3. Add the VxVM 5.0 patches for MP3 and RP1 in that order.
g
n
n
a
no
1.
ab
At the time of writing the course, the MP3 patch is 122058-11 and the
RP1 patch is 139352-02.
# cd location_of_vxvm_patches_for_course
# patchadd -M . 122058-11 139352-02
4.
b.
c.
6-43
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Run the following commands on all nodes on which you have installed
VxVM:
# clvxvm initialize
Note At the time of writing this course, this fails when you have ZFS
root. Please manually verify that the vxio major number in
/etc/name_to_major is the same on all cluster nodes. If it is not, edit the
file so it is the same on all nodes. Be careful that you dont conflict with
any numbers already in a file (you can just choose a major number higher
than that in any of the files).
s
) ha
y
m
om
c
e
idon
Task 4 Adding vxio on Any Non-Storage
csmNode
u
e
G
t
@
Which You Have Not Installed VxVM
n
b
ku tude
a
y
( is S
n which
i
If you have a non-storage nodedon
hyou have not installed VxVM,
t
u
l
e
edit /etc/name_to_majoraand addsa line at the bottom containing the
uon the storage nodes:
am as tused
same vxio major number
o
k
ng ense
a
vxio
same_major_number_as_other_nodes
b
a
lic
b
e
u
l
k rab
a
y
e
ul Note
f Be careful and assure that on the non-storage node the major
s
d
n
b
a
a
is not already used by some other device driver on another line in
trnumber
g
n
n
o
a
the file. If it is, you will have to change the vxio major number on all
n
ab
6-44
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
an cens
b
a
Caution
If you
li are prompted about encapsulating the disk, you should
b
e
u
l
k
If you are prompted about clearing old disk usage status from a
a replyerno.
abtraining
y
l
previous
class, you should reply yes. In your work environment,
f
u ns
d
b
careful when answering these questions because you can destroy
a
tra be
g
n
n
critical
data or cluster node access information.
o
a
n
b
a
2.
Verify the status of the disk group and the names and ownership of
the disks in the nfsdg disk group.
# vxdg list
# vxdisk list
3.
On Node 1, verify that the new nfsdg disk group is globally linked.
# ls -l /dev/vx/dsk/nfsdg
lrwxrwxrwx
1 root
root
12 Dec
/dev/vx/dsk/nfsdg ->
/global/.devices/node@1/dev/vx/dsk/nfsdg
4.
2008
6-45
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Use the vxprint command on both nodes. Notice that Node 2 does
not see the disk groups created and still imported on Node 1.
6.
Issue the following command on the node that currently owns the
disk group:
# newfs /dev/vx/rdsk/nfsdg/nfsvol
It should fail with a no such device or address error.
s
) ha
y
m
om
c
ab
6-46
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Perform the following steps to register the two new disk groups with the
Sun Cluster framework software:
1.
as
h
2. On Node 1, use the clsetup utility to register the webdg disk
group.
)
y
m
# clsetup
om
c
ab
Note Read the previous question carefully. On a cluster with more than
two nodes, you will be asked if all nodes are connected to the disks. In a
Pair +1 configuration, for example, you need to answer no and respond
when you are asked which nodes are connected to the disks.
Which node is the preferred primary for this device
group? node2
Enable "failback" for this disk device group (yes/no)
[no]? yes
5.
6-47
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
s
) ha
y
m
om
c
csm Guide
e
Note Do not use the line continuation character
@ (\)einntthe vfstab file.
b
u
ak fileSsystem.
tud
y
(
3. On Node 1, mount the /global/nfs
in this
d
u
# mount /global/nfs
al use
m
a systemtois mounted and available on all nodes.
4. Verify that thekfile
g
n ense
a
# mount
b
a /global/nfs
lic
#bls
e
u
l
k lost+found
a
ab
r
y
l
e
f
bdu trans
a
g Task
n- 10 Creating a Global web File System
n
o
a
n
ab
/dev/vx/dsk/nfsdg/nfsvol /dev/vx/rdsk/nfsdg/nfsvol \
/global/nfs ufs 2 yes global
2.
On all nodes, create a global mount point for the new file system.
# mkdir /global/web
6-48
On all nodes, add a mount entry in the /etc/vfstab file for the new
file system with the global mount option.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
/dev/vx/dsk/webdg/webvol /dev/vx/rdsk/webdg/webvol \
/global/web ufs 2 yes global
Note Do not use the line continuation character (\) in the vfstab file.
4.
5.
Verify that the file system is mounted and available on all nodes.
# mount
# ls /global/web
lost+found
s
) ha
y
m
om
c
csm Guide
e
Task 11 Testing Global File Systems
@ ent
b
u
ak theSgeneral
tud behavior of globally
y
(
Perform the following steps to confirm
in Cluster
dSun
his3.2 software environment:
available file systems in lthe
t
u
e
a us
am into
1. On Node 2,kmove
tothe /global/nfs file system.
g
e
# cdan
ns
b /global/nfs
e
c
a
li1, try to unmount the /global/nfs file system (umount
b On Node
2.
e
u
l
k
a e/global/nfs).
ab
You should get an error that the file system is busy.
r
y
l
f
u
s
bd tran3. On Node 2, move out of the /global/nfs file system (cd /) and try
a
g onto unmount it again on Node 1.
n
a
n
b
a
4.
5.
6-49
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Make sure the device group is online (to the Sun Cluster software).
# cldg status
2.
On the node that is primary for the device group, create a 100-Mbyte
test volume in the nfsdg disk group.
# vxassist -g nfsdg make testvol 100m layout=mirror
3.
4.
s
) ha
Prove that the new volume can not be used in the cluster (you will
get an error message):
y
m
# newfs /dev/vx/rdsk/nfsdg/testvol
om
c
ab
group.
6-50
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
s
) ha
y
m
m
o
c
with how
4. Disable the device group failback feature. It is m
inconsistent
e
d
s
i
u be configured
the device groups work with the applications
will
ec that
G
t
@
in Modules 9 and 10:
b den
u
k
tu
# cldg set -p failback=false
ya nfsdg
(
S
n
# cldg set -p failback=false
di e thiswebdg
u
l
# cldg show
a us
m
a
k e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
3.
ab
6-51
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
3.
4.
s
) ha
y
m
om for
5. You will see error messages about the singleton device
groups
c
ab
6-52
Exercise Summary
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Exercise Summary
Experiences
Interpretations
Conclusions
Applications
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
6-53
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 7
Objectives
ab
y
m
om
Upon completion of this module, you should be able to:
c
m uide
cspartitioning
Describe Solaris Volume Manager traditional
and soft
e
G
t
@
partitions
n
b
ku tude
a
y
Differentiate between shared
disksets
( is Sand local disksets
n
i
th multi-owner diskset
Describe Solaris Volume
lud Manager
e
a
us(metadb) management issues and the role
amdatabase
o
Describe volume
k
t
ngVolume
seManager mediators
of Solaris
a
n
b
e
c Solaris Volume Manager software
a
lithe
b
Configure
e
u
l
k rab
a
y
l
eCreate the local metadb replicas
f
u
s
d
ab -tran Add disks to shared disksets
g
an non
7-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relevance
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
7-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Additional resources The following references provide additional
information on the topics described in this module:
Sun Cluster System Administration Guide for Solaris OS, part number
820-7458 (for Sun Cluster 3.2 11/09).
Sun Cluster Software Installation Guide for Solaris OS, part number 8207356 (for Sun Cluster 3.2 11/09).
Sun Cluster Concepts Guide for Solaris OS, part number 821-0259 (for
Sun Cluster 3.2 11/09)
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
7-3
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
a
Solaris Volume Manager Partition-Based Disk Space
s
a
Management
y) h
m
m
comanagement
ab
Slice 4
Volume d12 submirror
Slice 6
Physical Disk Drive
Figure 7-1
7-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The following are limitations with using only partitions as Solaris Volume
Manager building blocks:
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
Soft partitions add an enormous
in amount
is of flexibility to the capability of
h
t
Solaris Volume Manager:lud
a use
m
a to manage
They allowkyou
to volumes whose size meets your exact
g
e
requirements
ns physically repartitioning Solaris OS disks.
ban licewithout
a
b They lallow
e you to create more than seven volumes using space from
u
k
b
ya fearasingle large drive or LUN.
l
u
bd trans They can grow if there is space left inside the parent component. The
a
g onspace does not have to be physically contiguous. Solaris Volume
n
a
n
b
Manager finds whatever space it can to allow your soft partition to
a
Soft partitioning supports the creation of virtual partitions within Solaris
OS disk partitions or within other volumes. These virtual partitions can
range in size from one block to the size of the base component. You are
limited in the number of soft partitions only by the size of the base
component.
7-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Make soft partitions on disk partitions, and then use those to build
your submirrors as shown in Figure 7-2.
s
) ha
y
m
om
Volume d30 submirror
c
7-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Build mirrors using entire partitions, and then use soft partitions to
create the volumes with the size you want as shown in Figure 7-3.
Slice 7 (metadb)
Slice 7 (metadb)
slice s0
slice s0
submirror
submirror
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this volume
d
u
al use
m
soft partition
ka e to
g
ban licens
a
b
u
le Using Soft Partitions to Create Volumes
k
b
Figure
7-3
a
a
l y sfer
u
d
ab -tranAll the examples later in this module use the second strategy. The
g
n non
a
advantages of this are the following:
b
a
Hot spare management is consistent with how hot spare pools work.
The only disadvantage of this scheme is that you have large mirror
devices even if you are only using a small amount of space. This slows
down resynching of mirrors.
7-7
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
e
csm Grequires
uid that each
To create any shared disksets, Solaris Volume e
Manager
@ entdisks. The only
host (node) must have a local diskset on
non-shared
b
u
k theythave
requirement for these local disks is
ud local diskset metadbs,
athat
y
(
S
which are described later. Figure
in 7-4thshows
is the contents of two shared
d
u
disksets in a typical cluster,
ewith the local disksets on each node.
al along
s
m
u
ka e to
g
Diskset nfsds Diskset webds
ban licens
a
b
u
le
k
b
a
a
r 1
l y sfeNode
Node 2
u
d
n
b
a
tra
g
n
n
a
no
Shared disksets are given a name that often reflects the intended usage of
the diskset (for example, nfsds).
ab
Boot Disks
(Local Diskset)
Figure 7-4
7-8
Boot Disks
(Local Diskset)
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
7-9
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
as
There are separate sets of metadb replicas for the local disksets and for) h
y
each shared diskset. For example, in Figure 7-4 on page 7-8 (which
shows
m
two nodes and two shared disksets), there are four distinctccollections
om of
metadb replicas.
csm Guide
e
t
n
b@same
You can put several copies of the metadbk
on
the
partition.
You might
e
u
d
u
a
t
do this to balance the numbers of metadb
across disks or
(y ireplicas
S subsections.
n
s
i
partitions, for reasons described
in
the
following
lud se th
a
am to u
k
ng ense
Local ReplicaaManagement
b
a
lic
b
e
u
l
k managing
When
a
ab local replicas:
r
y
l
e
f
bdu transYou must add local replicas manually.
a
You can put local replicas on any dedicated partitions on the local
ang non
ab
7-10
You must spread local replicas evenly across disks and controllers.
If you have less than three local replicas, Solaris Volume Manager
logs warnings. You can put more than one copy in the same partition
to satisfy this requirement. For example, with two local disks, set up
a dedicated partition on each disk and put three copies on each disk.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
Note Override the behavior of the last bullet item by inserting the line:
y
m
om
c
e nothing
idhas
in the /etc/system file. This flag is a misnomer
in thatuit
csm
e
G boot fully with
to do with using SVM to mirror root. It simply
does n
lett you
@
b
de available.
kulocal tmetadbs
exactly 50% (but not less than 50% a
) of
u
y
n ( this S
i
d
lu se
a
u
am to Management
Shared Diskset kReplica
ng ense
a
b
a the following
lic
Consider
issues when managing shared diskset replicas:
b
e
u
l
k
a eThere
ab are separate metadb replicas for each diskset.
r
y
l
f
bdu trans They are automatically added to disks as you add disks to disk sets.
a
g onn
They will be, and must remain, on slice 7.
a
n
ab
set md:mirrored_root_flag=1
You must use the metadb command to remove and add replicas if
you replace a disk containing replicas.
7-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
When you have nodes connected to exactly two storage arrays, the
implication of the replica mathematics described in the previous section is
that if one storage array fails, your diskset can keep operating, but cannot
transfer primary control from node to node.
This is unacceptable in the Sun Cluster environment, because it can take a
while to fix a broken array or controller, and you still want to be able to
gracefully survive a node failure during that period.
The Sun Cluster 3.2 software environment includes special add-ons to
Solaris Volume Manager called mediators. Mediators allow you to identify
the nodes themselves as tie-breaking votes in the case of failure of exactly 50
percent of the metadb replicas of a shared diskset. The mediator data is
stored in the memory of a running Solaris OS process on each node. If you
lose an array, the node mediators will change to golden status, indicating
they count as extra votes for the shared diskset quorum mathematics (one
from each node). This allows you to maintain normal diskset operations
with exactly 50 percent of the metadb replicas surviving. You can also lose
a node at this point (you would still have at least one golden mediator).
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
7-12
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
Table 7-1 Modifications to the md.conf File
ak Stud
y
(
in this
Default
Variable
Description lud
Value
a use
m
o
ka e tnumber
g
nmd
128
The
maximum
Solaris Volume Manager
n this
s to limitofthevolumes.
a
n
b
e
uses
setting
names
of
volumes as well.
c this number too high can use the
a Setting
i
l
b
a lot of inodes for device
u
le
k
b
a
a
files
in
your
/global/.devices/node@#
file system. The
y fer
l
u
s
maximum value is 8192.
bd tran
a
gmd_nsets
n- 4
The maximum number of disksets. This includes the local
n
o
a
n
b
diskset. This number should be set to the number of shared
a
7-13
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
m
m
In the Sun Cluster environment, you can add any metadbc
oropartition
by
e
m
component using either its cluster DID (/dev/did/rdsk/d#s#)
or
d
s
i
ec t Gu
using the traditional c#t#d#.
@
b den
u
k
tu it you are restricted
ya Without
Use the DID naming for all shared disksets.
(
S
n
s node. You might assume
to having identical controllerunumbers
di e on
hieach
t
l
a be surprised
this will always be true,mthen
when you add a new node or
s
u
a
o
repair a node.
k et
g
n
a cens
b
a
li c#t#d# naming scheme for local metadb replicas and
Use the
b traditional
e
u
l
k
devices.
recovery easier in the case that you need to access
a eThis
abmakes
r
y
l
these
structures
when
booted in non-clustered mode. Omit the /dev/rdsk
f
u ns
d
b
aabbreviate traditional names in all of the Solaris Volume Manager
a
trto
g
n
commands.
n
a
no
ab
7-14
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
)h
y
midentical
This procedure assumes you have a second local disk, which
has
m
co command
geometry to the first. In that case, you can use the fmthard
to
e
m
d
s
i
replicate the boot disks partition table onto the
disk:
u
ecsecond
G
t
@
b den
# prtvtoc /dev/rdsk/c0t0d0s0|fmthard -s - /dev/rdsk/c0t8d0s0
u
k
tu
yain place.
fmthard: New volume table of contents now
(
S
n
di e this
u
l
a us
# metadb -a -c 3 c0t8d0s7
m
a
k e to
g
an cens
b
a
Using the
li or metadb -i Command to Verify
b metadb
e
u
l
k
metadb
a eReplicas
ab
r
y
l
f
bdu trans
a
g on- The output of the metadb command includes one line for each replica. The
n
a
n
-i option adds the legend information about the flag abbreviations.
ab
# metadb -i
flags
first blk
block count
a
u
16
8192
/dev/dsk/c0t0d0s7
a
u
8208
8192
/dev/dsk/c0t0d0s7
a
u
16400
8192
/dev/dsk/c0t0d0s7
a
u
16
8192
/dev/dsk/c0t8d0s7
a
u
8208
8192
/dev/dsk/c0t8d0s7
a
u
16400
8192
/dev/dsk/c0t8d0s7
r - replica does not have device relocation information
o - replica active prior to last mddb configuration change
u - replica is up to date
l - locator for this replica was read successfully
c - replica's location was in /etc/lvm/mddb.cf
p - replica's location was patched in kernel
m - replica is master, this is replica selected as input
7-15
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
replica
replica
replica
replica
replica
replica
replica
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
7-16
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
n -a -h vincent theo
# metaset
anfsds
ab -t-s
r
g
#
metaset
-s
nfsds
-a -m vincent theo
n
n
o
a
n
ab
# metaset -s nfsds -a /dev/did/rdsk/d9 /dev/did/rdsk/d17
# metaset
Set name = nfsds, Set number = 1
Host
vincent
theo
Owner
Yes
Mediator Host(s)
vincent
theo
Aliases
Drive Dbase
d9
Yes
d17
Yes
7-17
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
# metadb -s nfsds
flags
a
u
a
u
r
r
# medstat -s nfsds
Mediator
vincent
theo
first blk
16
16
Status
Ok
Ok
block count
8192
/dev/did/dsk/d9s7
8192
/dev/did/dsk/d17s7
Golden
No
No
s
) ha
y
Automatic Repartitioning and metadb Placement on
m
m
Shared Disksets
co
csm Guide
e
t
When a disk is added to a diskset, it is automatically
as
@ erepartitioned
n
b
u
follows:
ak Stud
y
(
in(starting
A small portion of the drive
d
hiatscylinder 0) is mapped to slice
t
u
l
e
7 or slice 6 to be usedafor statesdatabase replicas (at least 4 Mbytes in
am to u
size).
k
ng ense
a
b
a
lic
b
e
u
l
Note
Cluster
3.2 is the first Sun Cluster version to fully support
k Sun
b
a
a
r
y
disks
with
Extensible
Firmware Interface (EFI) labels, which are required
l
e
f
u
s
d
andisks of size greater than 1 Terabyte (Tbyte). These disks have no slice
ab -trfor
g
an non 7. Solaris Volume Manager automatically detects an EFI disk, and uses
ab
The rest of the drive is mapped to slice 0 (on a standard VTOC disk,
even slice 2 is deleted).
The drive is not repartitioned if the disk already has no slice 2 and slice 7
already has the following characteristics:
7-18
It starts at cylinder 0.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Slice 7 (metadb)
s
) ha
y
m
om
c
Slice 0
csm Guide
e
@ ent
b
u
ak Stud
y
(
Physical disk drive din
his
t
u
l
e
a us
m
Figure 7-5 Automatically
a
k e toAdding a metadb to Slice 7
g
ban licens
a
b If itleis impossible to add the same number of disks from each
u
Note
k
a controller
abto a diskset, you should manually run the command
r
y
l
e
f
s
-s setname -b in order to balance the number of metadb
bdu tranmetadb
a
g
replicas
across
controllers.
n
n
o
a
n
ab
7-19
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
ab
Volumes
DIDs
/dev/did/rdsk/d9s0
Figure 7-6
7-20
/dev/did/rdsk/d17s0
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
This module uses the former model for all the examples.
s
) ha
The following is an example of the commands that are used to build the
configuration described in Figure 7-6 on page 7-20:
ab
y
m
m
# metainit -s nfsds d101 1 1 /dev/did/rdsk/d9s0
o
c
400m
has been grown
400m
has been grown
Note The volumes are being increased by 400 Mbytes, to a total size of
600 Mbytes.
7-21
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
d count
k tBlock
u
a
y
409600
n ( this S
i
d
819200
lu se
a
am to u
k
nfsds/d100: Mirror
ng ense
Submirror 0: nfsds/d101
a
b
lic
State: Okay b a
e
u
l
knfsds/d102
Submirror 1:
a
ab
r
y
l
e
State:
Resyncing
f
ns
bduintrprogress:
a
Resync
0 % done
a
g
n
Pass:
1
n
o
aba Readn option: roundrobin (default)
# metastat -s nfsds
nfsds/d11: Soft Partition
Device: nfsds/d100
State: Okay
Size: 1228800 blocks (600 MB)
Extent
Start Block
0
409664
1
1638528
7-22
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Device
d17s0
Start Block
0
Dbase
No
Block count
409600
819200
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
7-23
Managing Solaris Volume Manager Disksets and Sun Cluster Device Groups
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
# cldg show nfsds
in this
d
u
al use
Device Groups ===
m
ka e to
g
Device Group Name:
nfsds
an cens
b
a
i
l
Type:
SVM
b
e
u
l
k
failback:
false
a erab
y
l
Node List:
vincent, theo
f
u ns
d
b
preferenced:
true
a
tra
g
n
numsecondaries:
1
n
noname:
nfsds
aba diskset
Device Group Name
----------------nfsds
Primary
------vincent
Secondary
--------theo
Status
-----Online
7-24
Managing Solaris Volume Manager Disksets and Sun Cluster Device Groups
Dec 10 14:06:03 vincent Cluster.Framework: stderr: metaset: vincent:
Device busy
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Primary
------theo
Secondary
--------vincent
Status
-----Online
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
7-25
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
sm uide
c
e
G
The properties of existing Solaris Volume Manager
device
groups can be
t
@
n
b
e could be
changed. For example, the failback property
ku oftuadgroup
a
y
modified with the following command:
n ( this S
i
d
lu nfsds
# cldg set -p failback=true
e
a
s
m
u
ka e to
g
ns Offline
ban lGroup
e
Putting a Device
c
a
i
b
e
u
l
k
a canetake
aba Solaris Volume Manager device group out of service, as far
r
y
l
You
f
bdu trasanthes cluster is concerned, for emergency repairs.
a
ang non
ab
To put the device group offline, all of the Solaris Volume Manager
volumes must be unused (unmounted, or otherwise not open). Then you
can issue the following command:
# cldg offline nfsds
You rarely need to take the device group offline because almost all repairs
can be done while the device group is in service.
To place the device group back online, type one of the following
commands (you do not need both):
# cldg online nfsds
# cldg online -n node_to_switch_to nfsds
7-26
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Failover file systems These are mounted only on the node running
the failover data service, which must be physically connected to the
storage.
ab
as
h
The file system type can be UFS or VxFS regardless of whether you
are
)
y in
m
using global or failover file systems. The examples and the labexercises
om
this module assumes that you are using UFS.
c
csm Guide
e
@ ent
b
Creating File Systems
u
ak Stud
y
(
dinand
his file system is not made at the
t
The distinction between lglobal
failover
u
e
a Use
time of file system creation.
m
usnewfs as normal to create a UFS file
a
o
k
t
system on thegvolume: e
n ens
ba/dev/md/nfsds/rdsk/d10
# newfs
a
lic
b
e
u
l
k rab
a
y
l
fe
uMounting
s
d
n
File Systems
b
a
a
r
t
g
an non
The distinction between a global and a failover file system is made in the
/etc/vfstab mount-at-boot and options columns.
A global file system entry should look similar to the following, and it
should be identical on all nodes including nodes not physically connected
to the storage:
/dev/md/nfsds/dsk/d10 /dev/md/nfsds/rdsk/d10 /global/nfs ufs 2 yes global
A failover file system entry looks similar to the following, and it should
be identical on all nodes that might run services that access the file system
(they can only be nodes that are physically connected to the storage).
/dev/md/nfsds/dsk/d10 /dev/md/nfsds/rdsk/d10 /localnfs ufs 2 no -
7-27
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
e root
All partitions on the boot drive are mirrored. The
exampleid
has
sm
c
u
e
(/), swap, and /global/.devices/node@1. That is,
Gyou will be
t
@
n
b
manually creating three separate mirror
devices.
ku tude
a
y
( of ithe
Sboot disk and the new
The geometry and partitionin
tables
s
d
h
t
mirror are identical. Copying
table from one disk to the
lu sthee partition
a
other was previously
demonstrated
in Repartitioning a Mirror Boot
u
am
o
k
t
Disk and Adding
metadb
Replicas
on page 7-15.
g nse
n
a
b bootlicdisk
e and mirror have three copies of the local metadb
Bothathe
b
ureplicas.bThis
le was done previously.
k
a
a
l y sSoft
erpartitions are not used on the boot disk. That way, if you need to
f
u
d
ab -tran back out, you can just go back to mounting the standard partitions
g
by editing the /etc/vfstab manually.
an non
ab
7-28
23%
0%
/
/devices
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
0
0
0
1920832
0
0
1926208
1919440
0
0
0
0
0
0
1472 1919360
0
0
0
0
6848 1919360
80 1919360
0%
0%
0%
1%
0%
0%
1%
1%
/system/contract
/proc
/etc/mnttab
/etc/svc/volatile
/system/object
/dev/fd
/tmp
/var/run
/dev/did/dsk/d11s3
491520
3735
438633
1%
/global/.devices/node@2
491520
3677
438691
1%
/global/.devices/node@1
/dev/did/dsk/d1s3
s
) ha
y
m
# swap -l
om
c
swapfile
dev swaplo blocks
free
/dev/dsk/c0t0d0s1
32,1
16 8170064 8170064
csm Guide
e
@ ent
b
u
# metadb
ak Stud
y
(
flags
first blk
in block
iscount
d
h
t
a m pc luo
16
8192
/dev/dsk/c0t0d0s7
u
e
al us8192
a
pc luo
8208am
/dev/dsk/c0t0d0s7
k e to 8192
a
pc luo
16400
/dev/dsk/c0t0d0s7
g
n
s
a
n
a m pc luo
8192
/dev/dsk/c0t8d0s7
ce
ab 16
i
l
a
pc luo
8208
8192
/dev/dsk/c0t8d0s7
b
u
le16400
k
b
a
pc
luo
8192
/dev/dsk/c0t8d0s7
a
a
y fer
l
u
s
bd tran
a
g onBuilding
n
Volumes for Each Partition Except for Root
a
n
ab
For all boot disk partitions except root, follow the same general strategy:
1.
Create simple sub-mirror volumes for the existing partition and the
other disk partition. Use the -f option for the existing partition.
2.
3.
Edit the /etc/vfstab file manually to use the new mirror volume
instead of the original partition.
4.
7-29
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
For the root boot disk partition, follow the same general strategy:
1.
Create simple sub-mirror volumes for the existing partition and for
the other disk partition. Use the -f option for the existing partition.
2.
3.
s
) ha
y
m
om
c
sm uide If
Examples are shown for root, swap, and /global/.devices/node@#.
c
e
Gbe the same as
you had any other OS disk partitions, the procedure
would
t
@
n
b
for the non-root slices. Only for /global/.devices/node@#
do you need
ku tude
a
y
to worry about making a different mirror
volume
name
on
each
node.
( is S
n
i
lud se th
# metainit -f d11 1 1ac0t0d0s0
u
d11: Concat/Stripe
is setup
am
o
k
t
# metainit d12
ng1 e1 nc0t8d0s0
se
a
b
d12: Concat/Stripe
is
setup
c
a
i
l
b
# metainit
d10
u
le -m d11
k
b
a
a
d10:
Mirror
y fer is setup
l
u
d10
ns
bd tr#ametaroot
a
ang non # metainit -f d21 1 1 c0t0d0s1
Running the Commands
ab
swap
7-30
no
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
c
Rebooting and Attaching the Second Submirror
csm Guide
e
@ entot each volume. The
After a reboot, you can attach the secondbsubmirror
u
k background,
synchronizing of the mirrors runsyin
athe
tud and can take a long
(
S
time.
in this
d
u
al use
# init 6
m
ka e to
# df -k
g
s
/dev/md/dsk/d10
26843000
25510407
5%
/
an cen1064163
b
a
/devices
0
0
0%
/devices
li 0
b
e
u
l
k
ctfs
0
0
0
0%
/system/contract
a erab
y
l
proc
0
0
0
0%
/proc
f
u ns
d
b
mnttab
0
0
0
0%
/etc/mnttab
a
tra
g
n
swap
1920832
1472
1919360
1%
/etc/svc/volatile
n
a
no
objfs
0
fd
0
swap
1926208
swap
1919440
/dev/md/dsk/d30
95702
/global/.devices/node@1
/dev/did/dsk/d22s5
95702
/global/.devices/node@2
# swap -l
swapfile
/dev/md/dsk/d20
0
0
0
0
6848 1919360
80 1919360
5317
80815
0%
0%
1%
1%
7%
5010
6%
81122
/system/object
/dev/fd
/tmp
/var/run
7-31
y
m
om
c
Task 6 Creating a Global web File System
csm Guide
Task 7 Testing Global File Systems
e
@ ent
b
u
Task 8 Managing Disk Device Groups
ak Stud
y
(
Task 9 Viewing and Managing
in Solaris
is Volume Manager Device
d
h
t
u
Groups Using Sun Cluster
e
al Manager
s
m
u
ka e to
g
n
s
Preparationaba licen
b
u
le
k
b
a
a
l yThis sexercise
er assumes you are running the Sun Cluster 3.2 software
f
u
d
on Solaris 10 OS.
an
ab -trenvironment
g
an non
s
) ha
ab
At least one local disk on each node must have a small unused slice that
you can use for the local metadb replicas. The examples in this exercise
use slice 7 of the boot disk.
If you happen to be using ZFS root, slice 7 should have been reserved
ahead of time to accomodate this lab.
7-32
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Node 1
Boot Disk
Boot Disk
c0
Node 2
c0
(replicas) (replicas)
c1
c2
c1
c2
Quorum Disk
Diskset
and Volumes
nfsds
s
) ha
y
m
om
c
webds
Mirror Disk
Primary Disk
sm uide
c
e
d100
G
t
@
n
b
Array A
Array
B
ku tude
a
y
S
n ( Volume
s
i
i
Figure 7-7 Configuring Solaris
Manager
d
h
lu se t
a
am to u
k
g nse
Note a
During
ban lithis
e exercise, when you see italicized names, such as
c
b
IPaddress,
u
leenclosure_name, node1, or clustername embedded in a
k
b
a
a
command
y fer string, substitute the names appropriate for your cluster.
l
u
bd trans
a
g onn
a
n
ab
Primary Disk
Mirror Disk
d100
7-33
Before you can use Solaris Volume Manager to create disksets and
volumes, you must initialize the state database and create one or more
replicas.
Perform the following steps on each node of the cluster:
1.
Verify that the boot disk has a small slice s7 reserved for metadbs. In
the standard setup, the boot disk (c#t#d# below) should be
configured as the ZFS root pool.
# zpool status
# prtvtoc /dev/rdsk/c#t#d#s0
s
) ha
y
m
om
c
e
csm Gnodes.
uid Check
Caution Your boot disk path may be different onedifferent
@ ent
carefully on each node.
b
u
ak Stud
y
(
2. Use the metadb command to
increateththree
is replicas on the unused boot
d
u
l
disk slice.
e
a us
m
a
# metadb -ak-f -c t3oc#t#d#s7
e
ng verify
sthat
a
n
3. On allbnodes,
the replicas are configured and operational.
e
c
a
i
l
b
u# metadb
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n nTask
on 2 Selecting the Solaris Volume Manager Demo
a
b
a
Volume Disk Drives
Perform the following steps to select the Solaris Volume Manager demo
volume disk drives:
7-34
1.
2.
3.
Record the logical path and DID path numbers of four disks that you
will use to create the demonstration disksets and volumes in
Table 7-2. Remember to mirror across arrays.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Note You need to record only the last portion of the DID path. The first
part is the same for all DID devices: /dev/did/rdsk.
Table 7-2 Logical Path and DID Numbers
Diskset
Volumes
example
d100
nfsds
d100
webds
d100
Primary
Disk
Mirror
Disk
c2t3d0 d4
c3t18d0 d15
s
) ha
y
m
om
c
csm Guide
e
t
Note Make sure the disks you select arebnot
They must be
@localendevices.
u
dual-hosted and available to more than
ud host.
ak oneStcluster
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
7-35
On Node 1, create the nfsds diskset, and configure the nodes that
are physically connected to it.
# metaset -s nfsds -a -h node1 node2
2.
s
) ha
y
m
3. Add the two disks chosen previously, one from each array,
mto the
o
c
nfsds diskset.
e
m
d
s
i
ec t \Gu
# metaset -s nfsds -a /dev/did/rdsk/dx
@
b den
/dev/did/rdsk/dy
u
k
ya Stu
(
4. Verify the status of the new n
diskset.
di e this
u
# metaset -s nfsds
l
a us
m
# medstat -s a
nfsds
k e to
# cldg status
g
an cens
b
a
5. Create
li on each of your disks in the nfsds diskset.
b a submirror
e
u
l
k
a # emetainit
ab -s nfsds d0 1 1 /dev/did/rdsk/dxs0
r
y
l
f
bdu trans# metainit -s nfsds d1 1 1 /dev/did/rdsk/dys0
a
g on- 6. Create a mirror volume, d99, using the d0 submirror.
n
a
n
ab
# metainit -s nfsds d99 -m d0
7.
8.
Create a 500 Mbyte soft partition, d100, on top of your mirror. This is
the volume you will actually use for your file system data.
# metainit -s nfsds d100 -p d99 500m
9.
7-36
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
On Node 1, create the webds diskset, and configure the nodes that
are physically connected to it.
# metaset -s webds -a -h node1 node2
2.
s
) ha
y
m
webds diskset.
e
m
d
s
i
ec t Gu\
# metaset -s webds -a /dev/did/rdsk/dx
@
b den
/dev/did/rdsk/dy
u
k
ya Stu
(
4. Verify the status of the new
diskset.
n
i
is
# metaset -s a
webds
lud se th
# medstat -s
amwebdsto u
k
# cldg
ngstatus
se
a
n
b
e
a a submirror
5. b Create
on each of your disks in the webds diskset.
lic
e
u
l
k
b
a e#rametainit
-s webds d0 1 1 /dev/did/rdsk/dws0
y
l
f
u
s
bd tran # metainit -s webds d1 1 1 /dev/did/rdsk/dzs0
a
g on- 6. Create a mirror volume, d99, using the d0 submirror.
n
a
n
ab
# metainit -s webds d99 -m d0
7.
8.
Create a 500 Mbyte soft partition, d100, on top of your mirror. This is
the volume you will actually use for your file system data.
# metainit -s webds d100 -p d99 500m
9.
7-37
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Perform the following steps on Node 1 to create a global file system in the
nfsds diskset:
1.
2.
On all nodes, create a global mount point for the new file system.
Note If you have already done the VxVM exercises, and already have a
mounted /global/nfs file system, you can choose a different mount
point for this one.
s
) ha
y
m
# mkdir /global/nfs
om
c
ab
7-38
# ls /global/nfs
lost+found
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Perform the following steps on Node 1 to create a global file system in the
webds diskset:
1.
2.
On all nodes, create a global mount point for the new file system.
Note If you have already done the VxVM exercises, and already have a
mounted /global/web file system, you can choose a different mount
point for this one.
s
) ha
ab
y
m
# mkdir /global/web
om
c
7-39
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
3.
On Node 2, move out of the /global/nfs file system (cd /) and try
to unmount it again on Node 1.
4.
5.
2.
s
) ha
y
m
om
c
sm uide
c
e
Task 8 Managing Disk Device Groups
G
t
@
n
b
ku tude
a
y
Perform the following steps to migrate
n ( tahdisk
s Sdevice group (diskset)
i
i
d
between cluster nodes:
lu se
a
uare online (to the Sun Cluster software).
am groups
1. Make sure thekdevice
o
t
ng ense
# cldgastatus
b
a
lic
b
e
u
l
k rab
a
y
fe
You can bring a device group online to a selected node as follows:
ul Note
s
d
n
b
# cldg switch -n node_to_switch_to devgrpname
a
a
r
t
g
an non
ab
# cldg show
3.
4.
5.
Use the cldg switch command from either node to migrate the
nfsds diskset to Node 1.
# cldg switch -n node1 nfsds
7-40
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
3.
4.
s
) ha
y
m
omgroups
5. You will see error messages about the singleton device
c
for
e
m
d
s
each DID. This is normal.
i
ec t Gu
@
6. Click the name of your Solaris Volume
n device groups (near
b Manager
e
u
d
k
the bottom of the list).
ya Stu
(
n
7. Use the Switch Primaries
di button
htoisswitch the primary for the device
t
u
l
e
a us
group.
m
a
k e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
7-41
Exercise Summary
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Exercise Summary
Experiences
Interpretations
Conclusions
Applications
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
7-42
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 8
s
) ha
y
m
m
odata
Understand when ZFS can be used for Sun Cluster
c
e
m
d
s
i
Build ZFS storage pools and file systems ec
u
G
t
@
b den
Use ZFS root in the Sun Cluster environment
u
k
ya Stu
(
n
di e this
u
l
a us
m
a
k e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Upon completion of this module, you should be able to:
8-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relevance
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
8-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Additional resources The following references provide additional
information on the topics described in this module:
Sun Cluster System Administration Guide for Solaris OS, part number
820-7458 (for Sun Cluster 3.2 11/09).
Sun Cluster Software Installation Guide for Solaris OS, part number 8207356 (for Sun Cluster 3.2 11/09).
Sun Cluster Concepts Guide for Solaris OS, part number 821-0259 (for
Sun Cluster 3.2 11/09)
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
8-3
Beginning in the initial release of Sun Cluster 3.2 ZFS became available as
a failover file system for application data. You will be able to store data
only for failover applications (not scalable applications), as such, you will
be able to run the applications only on nodes physically connected to the
storage.
s
) ha
When you use ZFS, you will generally not need any other software
volume manager (neither VxVM nor Solaris Volume Manager), nor will
you need to perform any cluster device group management.
y
m
om
c
8-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
NAME
STATE
READ WRITE CKSUM
om
c
marcpool
ONLINE
0
0
0
csm Guide
e
mirror
ONLINE
0
0
0
@ ent
b
c1t0d0 ONLINE
0
0
0
u
k tud
c2t0d0 ONLINE
0
0(ya 0
n this S
i
d
lu se
errors: No known data errors
a
am to u
k
g npool
When a ZFS
nstorage
se is created, a default root file system is created
a
b
e
for theapool. The
licdefault mount point for that file system is /poolname.
b
e
u
l
kNow we
bcan create additional filesystems within the pool. ZFS
a
a
r
y
automatically
creates mount points and mounts the file systems. You do
l
e
f
u
s
d
ab -trannot need to add /etc/vfstab entries.
g
nvincent:/#
on zfs create marcpool/myfs1
a
n
b
a
vincent:/# zfs create marcpool/myfs2
marcpool
AVAIL REFER
19.6G
21K
19.6G
18K
19.6G
18K
size
used
20G
20G
20G
19K
18K
18K
MOUNTPOINT
/marcpool
/marcpool/myfs1
/marcpool/myfs2
avail capacity
20G
20G
20G
1%
1%
1%
Mounted on
/marcpool
/marcpool/myfs1
/marcpool/myfs2
8-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The mount points default to /poolname/fsname, but you can change them
to whatever you want:
vincent:/# zfs set mountpoint=/oracle marcpool/myfs1
vincent:/# zfs set mountpoint=/shmoracle marcpool/myfs2
vincent:/# df -h |grep marcpool
marcpool
20G
18K
20G
1%
/marcpool
marcpool/myfs1
20G
18K
20G
1%
/oracle
marcpool/myfs2
20G
18K
20G
1%
/shmoracle
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
When you grow a ZFS storage pool, y
the
ud check that you are
aksystem
twill
(
S
using the same kind of underlying
as
in RAID
isdevices already in the pool.
d
h
t
u
While it is not recommended,
you
can
specify
pools with mixed RAID
l
e
a
s
moption
uto the zpool command.
behavior by using thea-f
o
k
t
ng ense
a
b
The following
a example
lic shows adding new mirrored disks into a mirrored
b
e
pool:
u
l
k rab
a
y
fe add marcpool mirror c1t3d0 c2t3d0
ul # zpool
s
d
n
b
a
tra
g
n
n
o
nQuotas
aba
and Reservations
You can grow a ZFS storage Pool by adding new devices any time. There
is no such thing as growing or shrinking individual ZFS file systems, and
you get way more flexibility by being able to set quotas and reservations
on the file systems, as shown in the next section.
You control the amount of space associated with each individual file
system within the pool using quotas and reservations.
The default (without quotas and reservations) is that all file systems share
all the space in the pool. Any file system can hog all the space in the pool,
and any file system can be deprived of space by another file system being
a hog.
A quota sets a maximum amount of space for a file system (to prevent it
being a hog).
8-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
A reservation sets a guaranteed amount of space for the file system. This is
just a guaranteed amount, not translating to any particular physical file
blocks.
Quotas and reservations can be grown at any time, within the bounds of
the total size of the pool. Quotas and reservations can be shrunk at any
time, as long as the current usage of a file system is below the new
lowered values. This scheme gives way more flexibility than traditional
resizing of legacy types of file systems.
The following is an example of setting a quota and a reservation on a file
system.
# zfs set quota=20g marcpool/myfs2
# zfs set reservation=6g marcpool/myfs2
s
) ha
ab
y
m
om
c
ZFS Snapshots
csm Guide
e
@ ent
b
u
ak snapshot
ZFS has an instantaneous point-in-time
tud feature.
y
(
S
in this
d
u
e any any additional space pool. If there
Initially, snapshots do not
al consume
s
m
u
are no changes to
o file system , the parent and the snapshot
kathe parent
t
g
e
point to the
ZFS implements a copy-on-write policy for
nsameedisk
nsablocks.
bain
the parent;
this
way
ZFS
snapshot
appears to grow over time due to it
c
a
i
ldifferent
b
e
u
l
occupying
the
blocks
(the
original
blocks) from the parent after
k
b
a
a
parent
l y the
er has made modifications.
f
u
s
d
n
alist
ab zfs
r
theo:/#
t
g
USED AVAIL REFER MOUNTPOINT
anNAME non
orapool
orapool/oracle
2.70G
2.70G
30.5G
30.5G
24.5K
2.70G
/orapool
/oracle
8-7
The commands that ZFS uses to transfer ownership of a pool from one
host to another are zpool export and zpool import. The pool is always
the unit of ownership. A new node importing a pool need never have
seen it or heard of it before; the zpool import command will
automatically scan the connected storage looking for pools:
vincent# zpool export marcpool
theo# zpool import
zpool import
pool: marcpool
id: 17715066435682450109
state: ONLINE
action: The pool can be imported using its name or numeric
identifier.
config:
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
marcpool
ONLINE
u
ak ONLINE
mirror
tud
y
(
S
c0t2d0
in thisONLINE
d
u
c1t2d0
al use ONLINE
m
ka marcpool
to
g
e
theo# zpool n
import
ba licens
a
b
u
le
k
b
a
a
r
ZFS
Failover in the Cluster
l yPool
eAutomatic
f
u
s
d
ab -tran
g
n non The Sun Cluster device group management layer does not manage ZFS
a
b
storage pools in any way.
a
Automating the failover of ZFS storage in the cluster is achieved using
application-level resources, which are covered in a later module in this
book.
8-8
Solaris 10 10/08 introduced the ability to use ZFS as the root file system.
Sun Cluster 3.2 1/09 (update 2) and later support this feature. ZFS root
has little bearing on proper cluster operations. ZFSs advantages in
simplicity and flexibility, and the ability to manage and rollback
snapshots, may make ZFS root a preferred choice even if you require
other volume managers to manage data.
Recall the /global/.devices/node@# file system must be a UFS. When
you have ZFS root it will likely reside on a lofi device using
/.globaldevices as the backing store.
s
) ha
ab
y
m
m
o
c
8-9
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
A disk that will be used as a mirror in the root pool would likely be
configured identically. For example, if after installation you were going to
add a disk of identical geometry to your root pool, you could copy the
partitioning of the original root pool disk and then add the mirror:
# prtvtoc /dev/rdsk/c0t0d0s2|fmthard -s - /dev/rdsk/c0t1d0s2
# zpool attach rpool c0t0d0s0 c0t1d0s0
# installboot -F zfs /usr/platform/`uname -i`/lib/fs/zfs/bootblk \
/dev/rdsk/c0t1d0s0
Note You must install the ZFS boot block manually, as shown in the last
command above, when you attach a mirror to a ZFS root pool. If you
choose to mirror the root pool as you install Solaris (using the interactive
installer or Jumpstart), the boot block will automatically be placed on both
disks.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
Typical ZFS Root Configuration
m
ka e to
g
nsis automated by the Solaris installer. There are no
Provisioning
root
baofnZFS
e
c
a
li for Sun Cluster, besides the recommendation for
brequirements
special
e
u
l
k
a eminimum
ab swap space. Note that swap space and dump space are
750MB
r
y
l
f
provisioned on ZFS volumes (zvols).
ns
bdu trautomatically
a
a
g status
n#n
zpool
o
a
n
ab pool: rpool
state: ONLINE
scrub: resilver completed after 0h4m with 0 errors on Fri Apr 10
03:34:06 2009
config:
NAME
rpool
mirror
c0t0d0s0
c0t1d0s0
STATE
ONLINE
ONLINE
ONLINE
ONLINE
8-10
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
# swap -l
in this
d
u
swapfile
dev al swaplo
e blocks free
s
m
u
/dev/zvol/dsk/rpool/swap 256,1
16
4194288 4194288
a
o
k
t
ng ense
a
b
# dumpadm
a kernellicpages
b
Dump content:
u
le
k
b
a
a
Dump
device:
/dev/zvol/dsk/rpool/dump
(dedicated)
y fer
l
u
s
Savecore
/var/crash/host01
n
bd directory:
a
a
r
t
Savecore
enabled:
yes
g onn
a
n
ab
8-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
3. Rollback your snapshot
e
@ ent
b
4. Reboot the system
u
ak Stud
Rebooting with command: boot -F failsafe n (y
is and args: -F failsafe
di e thFile
Boot device: /pci@1f,700000/scsi@2/disk@0,0:a
u
l
a us 64-bit
SunOS Release 5.10 Version Generic_141444-09
m
a
k e toInc. All rights reserved.
Copyright 1983-2009 Sun Microsystems,
g
ns
Use is subject to license
banterms.
e
c
a
li
Hardware watchdog enabled
b
e
u
l
k
Configuring devices.
a erab
y
l
f OS instances...
Searchingdu
for installed
s
n
b
a
tra
g
n
n
ROOT/s10s_u6wos_07b
was found on rpool.
a
no
abDo
you wish to have it mounted read-write on /a? [y,n,?] y
2.
Confirm that the system mounts the root pool for you under /a
when it volunteers to do so.
mounting rpool on /a
Starting shell.
# zfs list
NAME
USED AVAIL REFER
rpool
8.84G 58.1G
94K
rpool/ROOT
4.83G 58.1G
18K
rpool/ROOT/s10s_u8wos_08b
4.83G 58.1G 4.67G
rpool/ROOT/s10s_u8wos_08b@installM 170M
- 4.64G
rpool/dump
2.00G 58.1G 2.00G
rpool/export
38K 58.1G
20K
rpool/export/home
18K 58.1G
18K
rpool/swap
2G 60.1G 3.56M
# zfs rollback rpool/ROOT/s10s_u8wos_08b@installM
# reboot
8-12
MOUNTPOINT
/a/rpool
legacy
/a
/a/export
/a/export/hom
-
Task 1 Create a ZFS Pool and File System for Cluster Data
s
) ha
y
m
oa m
1. Select disk drives from the shared storage to use in
new ZFS pool
c
m
for data. Select a disk from shared storage. Make
de you do
s sureuithat
c
e
Ggroups. Note the
not use any disks already in use in existing
device
t
@
n
b
e step 2). The following
logical device name (referred to k
asuc#t#d#din
u
a
t
y
example checks against VxVM,
Solaris
Volume
Manager, and ZFS
( is S
n
i
disks.
lud se th
a
m twith
udisks that may already be in use with
acareful
o
k
Be especially
g nManager.
nVolume
se
Solaris
The metaset command lists their DID
a
b
e
c
a
i
l
device
name.
Make
sure
you
understand the c#t#d# associated with
b
e
u
l
k
a ethose
ab DID devices and choose other disks for ZFS. Consult with your
r
y
l
f
instructor if you are unsure.
bdu trans # vxdisk -o alldgs list
a
ang non
# zpool status
ab
# metaset
# cldev list -v
2.
From one node connected to the storage, create a zpool that provides
mirroring for your two disks:
# zpool create nfspool mirror c#t#d# c#t#d#
# zpool status
3.
4.
8-13
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
# cd /testnfs
# touch file1 file2 file3
# vi letter_to_mom
Hi Mom, ZFS is much better than that legacy stuff
y
m
om
2. Modify the content of your file system:
c
# cd /testnfs
csm Guide
e
# touch file4
@ ent
b
u
# rm file2
ak Stud
y
(
# vi letter_to_mom
din ethan
histhat legacy stuff
Hi Mom, ZFS is muchlubetter
t
a usabout my class
Here is more information
m
a
k e to
g
an cens
b
a
li Migrate your ZFS Pool to Another
Task 3uManually
b
e
l
k
a erab
Node
y
l
u nsf
d
b
a
tr1.a Export your pool:
g
n
n
no
aba
# cd /
s
) ha
3.
Recover the snapshot that had migrated along with the pool:
#
#
#
#
8-14
zpool import
zpool import nfspool
zpool status
zfs list -r nfspool
df -h
cd /
zfs rollback nfspool/nfs@SAVEMYWORK
cd /testnfs
ls
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
1.
2.
zpool status
zfs list -r rpool
swap -l
dumpadm
Find another unused local disk (same controller as your root disk).
Consult your instructor if necessary.
# format
3.
Modify the partitioning of your second disk to match that of the first
disk, assuming they are of identical geometry:
s
) ha
ab
y
m
om(argument
Warning make sure the first disk in the command below
to
c
e
m
prtvtoc) is the original root disk, and the second
one (argument
to
csthis
uid you
e
G
fmthard) is your new intended mirror. If you
get
backwards
will
t
@
n
b
have trouble!
ku tude
a
y
S
n| (fmthard
s
i
i
d
h
# prtvtoc /dev/rdsk/origdisk-c#t#d#s0
-s - /dev/rdsk/newdiskt
u
l
e
a
c#t#d#s0
am to us
k
4. Add the
to
ngmirror
seyour root pool. Make sure you use slice 0, and not
a
n
b
e
slice
2.
a
lic
b
e
u
l
k #razpool
b attach rpool origdisk-c#t#d#s0 newdisk-c#t#d#s0
a
y
#
zpool
status
l
e
f
u
s
d
ab -tran5. Install the boot block on your second disk:
g
an# installboot
-F zfs /usr/platform/`uname -i`/lib/fs/zfs/bootblk \
non
/dev/rdsk/c#t#d#s0
8-15
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
8-16
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 9
s
) ha
y
m
om
Define the purpose of IPMP
c
m uide
Define the concepts of an IPMP group ecs
t Gon a single
@
n
b
List examples of network adaptersuin
IPMP e
groups
ak Stud
Solaris OS server
y
(
inthe in.mpathd
d
his daemon
t
Describe the operation
of
u
l
e
a us
m
a
List the options
to
k ethetoifconfig command that support IPMP and
g
configure
IPMP using /etc/hostname.xxx files
ban licens
a
b Configure
e IPMP manually with ifconfig commands
u
l
k
b
ra a forced failover of an adapter in an IPMP group
ya fePerform
l
u
s
bd tran Describe the integration of IPMP into the Sun Cluster software
a
environment
ang non
Upon completion of this module, you should be able to:
ab
9-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relevance
Should you configure IPMP before or after you install the Sun
Cluster software?
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
9-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Additional resources The following references provide additional
information on the topics described in this module:
Sun Cluster System Administration Guide for Solaris OS, part number
819-2971
Sun Cluster Software Installation Guide for Solaris OS, part number 8192970
Sun Cluster Concepts Guide for Solaris OS, part number 819-2969
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
9-3
Introducing IPMP
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Introducing IPMP
IPMP has been a standard part of the base Solaris OS since Solaris 8 OS
Update 3 (01/01).
IPMP enables you to configure redundant network adapters, on the same
server (node) and on the same subnet, as an IPMP failover group.
The IPMP daemon detects failures and repairs of network connectivity for
adapters, and provides failover and failback of IP addresses among
members of the same group. Existing TCP connections to the IP addresses
that fail over as part of an IPMP group are interrupted for short amounts
of time without data loss and without being disconnected.
s
) ha
y
m
In the Sun Cluster 3.2 software environment, you must use IPMP
om to
c
ab
9-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
When both IPv4 and IPv6 are configured on a physical adapter, the
group names are always the same (and thus need not be specified
explicitly for IPv6).
y
m
om
c
csm Guide
e
All members of a group must be on the
subnet.
t The members,
n
b@same
e
if possible, should be connectedktouphysically
separate
switches on
d
u
a
t
y
the same subnet.
n ( this S
i
d
lu subnets
Adapters on different
e must be in different groups.
a
s
m
u
kamultiple
You can have
togroups on the same subnet.
g
e
s
You
angroup with only one member. However, there is no
bacann have
e
c
a
li and there is no automatic failover.
b redundancy
e
u
l
k
a eEach
abEthernet adapter must have a unique MAC address. This is
r
y
l
f
bdu trans achieved by setting the local-mac-address? variable to true in the
a
g onOpenBoot PROM. This is automatically set correctly by
n
a
n
b
scinstall.
a
Network adapters in the same group must be of the same type. For
example, you cannot combine Ethernet adapters and Asynchronous
Transfer Mode (ATM) adapters in the same group.
9-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Note Using IPMP without test addresses reduces network traffic and
reduces the administrative strain of allocating the addresses. However, the
testing is less robust. For example, this author has personally experienced
adapters with a valid link state but broken receive logic. Such an adapter
would be properly faulted using test addresses. The remaining examples
in the module focus on creating IPMP configurations with test addresses.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
If you do choose to have an IPv6 test
address,
k tudthat test address will
a
y
( is(theSaddress automatically
always be the link-local IPv6naddress
i
d
assigned to the adapter,
only
th be used on the local subnet).
uthat can
l
e
a
s IPV6 (Optional) on page 9-16 to see
See Configuring m
Adapters u
for
a
o
k
t
how to set up
g IPv6nsoneyour adapters.
n
a
ab lice
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
ab
9-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
You are allowed (and must) configure only the test interface on the
adapter. Any attempt to manually configure any other addresses
fails.
s
) ha
y
m
om
c
csm Guide
e
t
n
b@groups
e
u
Note The examples of two-memberkIPMP
in
d the Sun Cluster
u
a
t
y
software environment will not use
any standby
S adapters. This allows the
n (additional
s
i
i
d
h
Sun Cluster software to balance
IP addresses associated with
u se t
l
a
applications across both
u of the group.
am members
o
k
t
g nse IPMP group in the Sun Cluster software
If you had
anthree-member
a
b
ce up one of the members as a standby would still be a
a
i
l
environment,
setting
b
u option.
le
k
b
valid
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
You must have at least one member of the group that is not a
standby adapter.
9-7
s
) ha
y
m
om
c
Group:
csm Guide
therapy
e
@ ent
b
u
qfe0
qfe4 ak
tud
y
(
S
in this
d
u
e
al failover
s
mutual
m
u
ka e to
g
ban licens
a
Solaris OS Server
b
e
u
l
k
b
ya fera
l
u
bd trans
a
g on- Figure 9-1 Server With Two Member Adapters in a Single IPMP Group
n
a
n
ab
9-8
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Group:
therapy
qfe0
qfe4
qfe8 (standby)
s
) ha
y
m
om
failover
c
csm Guide
e
Solaris Operating System
@Server ent
b
u
ak Stud
y
(
din Members
his of a Single IPMP Group
Figure 9-2 Server WithluThree
t
e
a us
m
a
k e to
g
s Different Subnets
Two IPMPbGroups
an cenon
a
li
b
e
u
l
k
a Figure
a9-3bshows how different IPMP groups must be used for adapters
r
y
l
e
f
bdu tranons different subnets.
a
g onn
a
n
ab
Group:
therapy
qfe0
qfe4
qfe1
Group:
mentality
qfe5
Solaris OS Server
Figure 9-3
9-9
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Figure 9-4 shows two different IPMP groups configured on the same
subnet. Failover still occurs only within each particular group.
Group:
therapy
qfe0
qfe4
Group:
mentality
qfe1
qfe5
s
) ha
y
m
Solaris OS Server
om
c
csm Guide
e
@ ent
b
u
k Subnet
aSame
tud
Figure 9-4 Two IPMP Groups on (the
y
S
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
9-10
Describing IPMP
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Describing IPMP
The in.mpathd daemon controls the behavior of IPMP. This behavior can
be summarized as a three-part scheme:
s
) ha
ab
y
m
om
c
de
The following paragraphs describe the functionality
csmofGtheuiin.mpathd
e
daemon in a configuration using test addresses.
@ Inenthet Solaris 10 OS,
b
u
without test addresses, adapter failure
akdetection
tudand repair is based solely
y
(
S
on the link state of the adapter.
in this
d
u
ein.mpathd daemon sends Internet
alused,uthe
s
When test addresses
are
m
a
o
kProtocol
t(ICMP)
Control Message
echo probes (pings) to the targets
g
e
n
s
a
n
connected
the link
all adapters that belong to a group to detect
ce Theontest
abandtorepair.
i
l
failures
address is used as the source address of these
b
e
u
l
k
b
ra
ya pings.
l
e
f
u
s
bd tran
a
- Note Using test addresses, even in Solaris 10, is more robust. You can
ang non
Network Path Failure Detection
have broken adapters, ports, or cables and still have a valid link state.
2.
Targets are chosen from the routing table in memory in the following
order:
a.
host
b.
network
c.
default
If no targets are discovered through the routing table, the targets are
discovered by a ping command to the 224.0.0.1 (all-hosts) multicast
IP address.
9-11
Describing IPMP
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
as
h
One strategy is to enter specific static host routes to IP addresses that are
)
y the
on the same subnet as your adapters. These will then be chosen first
as
m
9-12
Configuring IPMP
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Configuring IPMP
This section outlines how IPMP is configured through options to the
ifconfig command.
You will specify the correct IPMP-specific ifconfig options in the
/etc/hostname.xxx files. After these are correct, you never have to
change them again.
ab
as
h
Several new ifconfig options have been added for use with IPMP.) They
y
are the following:
m
om in a
c
addif Use this option to create the next available virtual interface
for the specified adapter. The maximum number of virtual interfaces
per physical interface is 8192.
9-13
Configuring IPMP
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
t specifically
@applications,
Note The bug concerns failure of certainuRPC
n
b
e
ak S
when the deprecated flag is on the physical
adapter.
tud You should always
y
(
use the deprecated flag with test
inaddresses;
is therefore, you should ensure
d
thadapter.
u
the test addresses are not a
onl the physical
The examples in this
e
s
m
u
module follow the convention
kathe choice.
toof placing the test interface on a virtual
g
e
interface, whenngiven
ba licens
a
b
u
le
k
b
a
a
l y ifconfig
er
f
Using
Commands to Configure IPMP
u
s
d
b tran
a
g onn
a
While you will configure your /etc/hostname.xxx files once and never
n
ab
The convention changed due to a bug relating to having a deprecated
flag on the physical adapter. Refer to bug #4710499 for more information.
This /etc/hosts fragment shows the dedicated IP address for the test
interface for each adapter. While it is not required to have host names for
these, it is a good practice to put names in /etc/hosts to keep track of
the addresses.
# cat /etc/hosts
.
#physical host address
172.20.4.192
vincent
# test addresses for vincent (node 1)
172.20.4.194
vincent-qfe1-test
9-14
Configuring IPMP
172.20.4.195
vincent-qfe2-test
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer the /etc/hostname.xxx Files for IPMP
u
Configuring
d
ab -tran
g
n
n# catno/etc/hostname.qfe1
a
b
a
9-15
Configuring IPMP
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
9-16
Configuring IPMP
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b Generally,
Note
u
le you do not need to edit the default
k
b
a
a
/etc/default/mpathd
configuration file.
y fer
l
u
s
bd tran
a
g on- The three settings you can alter in this file are:
n
a
n
ab
9-17
s
) ha
y
m
om
c
9-18
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
c
ide by hand
You still need to correctly customize multi-adapter
IPMP u
groups
csm
e
Gscinstall uses
t
to use the appropriate test addresses. Thebfile
created
by
@
n
deas the test address, but
kuaddress)
the data address (for example, the node
u
a
t
y
( iTos customize
S
you will want a different test n
address.
your configuration,
i
d
h
t
you can choose to wait until
scinstall,
as you are doing in this
u after
e
albe
s
module (where youm
will
modifying
some
files
rewritten by
u
a
o
k
t
scinstall), or
g youncan
econfigure IPMP before scinstall.
n
s
a
ceto make IPMP configuration part of your Solaris OS
ab choose
i
l
b
You
might
e
u
lsoftware
k
b
a
JumpStart
installation, by copying in the correct
a
y fer
l
u
/etc/hostname.xxx
files as part of a JumpStart software finish script.
s
bd tran
a
ang non
vincent:/# cat /etc/hostname.qfe1
vincent group sc_ipmp0 -failover
It makes no difference to IPMP whether you use the same group names or
different group names for IPMP across nodes. IPMP itself is aware only of
what is going on within the local Solaris OS.
It is a helpful convention to use the same group names on all nodes that
are connected to the same subnet.
9-19
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
9-20
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
t
@ cluster
n
bthese
e
u
Clearly, IPMP itself is unaware of anykof
d requirements.
u
a
t
y
Instead, the Sun Cluster 3.2 software
uses
a
cluster-specific
public
( is S
n
i
network management daemon
thto perform this cluster integration.
lud s(pnmd)
e
a
am to u
k
nofgthe
se Daemon in Sun Cluster 3.2
Capabilities
pnmd
a
n
b
e
a
lic
Software
b
e
u
l
k rab
a
y
fe cluster environment, the pnmd daemon has the following
ul nInsthe
d
b
a
tra capabilities:
g
n
n
no
aba
Communicate with pnmd on other nodes to transmit the status of
IPMP groups
When pnmd detects that all members of a local IPMP group have failed, it
consults a file named /var/cluster/run/pnm_callbacks. This file
contains entries that would have been created by the activation of
LogicalHostname and SharedAddress resources. (There is more
information about this in Module 9, Introducing Data Services, Resource
Groups, and HA-NFS, and Module 10, Configuring Scalable Services
and Advanced Resource Group Relationships.)
9-21
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
in.mpathd
akin.mpathd
tud
y
(
S
in pnmdthis
d
pnmd
u
al use
m
ka e to
g
hafoip_ipmp_callback
n ens
baresources
a
failover
lic
b
e
u
l
k rab
a
y
e
f9-5
ul Figure
s
d
IPMP Cluster Integration
n
b
a
a
r
t
g onn
a
n
ab
9-22
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Group Name
---------therapy
therapy
therapy
therapy
Status
-----Online
Online
Online
Online
Adapter
------qfe2
qfe1
qfe2
qfe1
Status
-----Online
Online
Online
Online
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
9-23
Perform the following tasks on all cluster nodes. It is assumed that the
Sun Cluster software is installed and operational, and that the only IPMP
configuration is the single-adapter group called sc_ipmp0 automatically
created by scinstall.
In this exercise, you complete the following tasks:
s
) ha
y
m
e
Task 6 Verifying IPMP Failover and Failbackcsm uid
e
G
t
@
n
b
ku tude
a
y
Preparation
n ( this S
i
d
lu se
a
No preparation is required
am fortothisu exercise.
k
ng ense
a
b
b a le licthe local-mac-address? Variable
Task 1kuVerifying
a erab
y
l
u nsf
d
b
Perform
the following steps on each node in the cluster:
a
a
r
t
g
n non 1. Verify that the EEPROM local-mac-address? variable is set to
a
b
a
true:
# eeprom "local-mac-address?"
The variable is set to true by the scinstall utility at cluster
installation time, so the only reason it should be false now is if it
were changed manually. If it needs to be changed to true, do so
now.
9-24
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Make sure you know which are the redundant adapters on the
public network. You might have already written this down in the
exercises for Module 3, Preparing for Installation and
Understanding Quorum Devices.
2.
s
) ha
ab
y
m
9-25
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
s
) ha
y
m
sm uide
c
e
On each node, create the appropriate /etc/hostname.xxxG
to place
@ ent files
adapters in IPMP groups. The group nameuisbunimportant.
The following
ak that
tuared configured on your
are just examples, so use the adapter(ynames
S
in this
public network.
d
u
al use
m
ka utility
toshould have already modified the
g
e
Note The scinstall
ns(one of the two below) that already existed at the
ban licefile
/etc/hostname.xxx
a
b
u
le was used to configure your cluster. Your adapter was
time
scinstall
k
b
a
a
in
l yplaced
eran IPMP group called sc_ipmp0. You will be completely
f
u
s
d
this file to place the adapter in a real, multi-adapter IPMP
an
ab -troverwriting
g
group,
as
in
the
examples. While scinstall places the -failover flag on
an non
ab
the node address, you will be using it only with dedicated test addresses.
# vi /etc/hostname.qfe1
vincent group therapy netmask + broadcast + up
addif vincent-qfe1-test -failover deprecated netmask + broadcast + up
# vi /etc/hostname.qfe2
vincent-qfe2-test group therapy -failover deprecated \
netmask + broadcast + up
9-26
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
3.
s
) ha
y
m
If you have physical access, reattach the broken cable. If you have no
physical access, use the following to repair your sabotage:
# ifconfig adapter_name modremove ldterm@2
6.
7.
9-27
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
9-28
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 10
Objectives
ab
y
m
om
Upon completion of this module, you should be able to:
c
iindea cluster to
csmservice
u
Describe how data service agents enable aedata
G
t
@
operate properly
n
b
ku tude
a
y
List the components of a data
service
( is Sagent
n
i
d e thinstallation, and registration
Describe data service
lupackaging,
a
m topurpose
us of resource groups
aprimary
Describe the
k
ng ebetween
se failover and scalable data services
a
n
Differentiate
b
a
lic
b
e
u
l
k Describe
b how to use special resource types
a
a
r
y
ul nsfeList the components of a resource group
d
b
a
tra
Differentiate between standard, extension, and resource group
g
n
n
a
no
properties
10-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relevance
What is a data service agent used for in the Sun Cluster 3.2
software?
y
m
om
What are the specific requirements for setting up NFS
in
the Sun
c
e
m
Cluster 3.2 software environment?
d
s
i
ec t Gu
@
b den
u
k
ya Stu
(
n
di e this
u
l
a us
m
a
k e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
10-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Additional resources The following references provide additional
information on the topics described in this module:
Sun Cluster System Administration Guide for Solaris OS, part number
820-7458 (for Sun Cluster 3.2 11/09).
Sun Cluster Software Installation Guide for Solaris OS, part number 8207356 (for Sun Cluster 3.2 11/09).
Sun Cluster Concepts Guide for Solaris OS, part number 821-0259 (for
Sun Cluster 3.2 11/09)
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
10-3
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
m and
omodule
On the Solaris 10 OS, the entire framework described in this
c
e
m
d
s
the next module treats every non-global zone as a virtual
node.
That
is,
i
c applications.
u
e
G
non-global zones can host clustered failover and
scalable
@ ent
b
u
k tud
yathe
(
S
The intention of this feature is ton
allow
flexibility
of configuring nons
i
i
d
h
global zones on multiple nodes,
t your application fail over (or
lu andsehaving
a
be load balanced) between
non-global
zones
on different nodes. You
m to u
aapplications
k
might prefer to have
running
in
non-global zones for a
g
e
n
s
a including
variety of reasons,
n the security sandbox that they provide (you
b
e
c
a
i
l
could b
give application
the root password to a non-global
eare onlyadministrators
u
l
k
b
zone,
and
they
super
within
that
zone).
a era
y
l
f
ns it is not strictly the intention of this feature, you could even have
bdu trWhile
a
a
ang non applications fail over between non-global zones on the same physical
ab
Off-the-Shelf Application
For most applications supported in the Sun Cluster software environment,
software customization is not required to enable the application to run
correctly in the cluster. A Sun Cluster 3.2 software agent is provided to
enable the data service to run correctly in the cluster environment.
10-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Application Requirements
You should identify requirements for all of the data services before you
begin Solaris OS and Sun Cluster software installation. Failure to do so
might result in installation errors that require you to completely reinstall
the Solaris OS and Sun Cluster software.
s
) ha
y
m
om
c
csm Guide
e
t you might
@ enzones,
b
If you are running applications inunon-global
k local tstorage
ud visible to the noninstall the application only inya
the
(
S
global zones.
in this
d
u
e file system using shared storage
al or failover
s
A global file system
m
u
ka e to binaries on a shared file system, you have
g
If you n
put
the application
ntosmaintain and manage. However, you must shut
baone lcopy
e
only
c
a
b downlethe idata service in the entire cluster to upgrade the application
u
k
a esoftware.
ab If you can spare a small amount of downtime for upgrades,
r
y
l
f
bdu trans place a single copy of the application and configuration files on a
a
shared global or failover file system.
ang non
Placing the software and configuration files on the individual cluster
nodes lets you upgrade application software later without shutting
down the service. The disadvantage is that you have several copies
of the software and configuration files to maintain and administer.
ab
10-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Data Service
Agent
Standard
Application
start
stop
y
m
om
c
fault
sm uide
monitorsec
G
t
@
n
b
ku tude
a
y
n ( this S
i
d
e Data Service Agent
alu usand
Figure 10-1 Standard m
Application
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
10-6
s
) ha
ab
y
m
m
ofrom
c
Sun Cluster software provides an API that can be called
shell
e
m
d
s
i
programs, and an API that can be called from C or
programs.
Most of
u
ec C++
G
the program components of data service b
methods
that
are
supported
by
t
@
n
e
u
Sun products are actually compiledaCkand C++
tudprograms.
y
(
S
in this
d
u
al use
Fault Monitor Components
m
ka e to
g
ns
ban licecomponents
Fault a
monitoring
specific to data services in Sun Cluster 3.2
b
e
software
are
run
on
the
local
node
only. This is the same node that is
u
l
k
b
a
a
the data service. Fault monitoring components are intended to
l y running
erapplication
f
u
s
d
detect
failure and can suggest either application restarts or
b tranfailovers in the cluster.
a
ang non
The actual capabilities of these fault monitors are application-specific and
often poorly documented, the general strategy for fault monitors in the
Sun Cluster 3.2 environment is to monitor the health of the following:
Note Data service fault monitors do not need to monitor the health of
the public network itself because this is already done by the combination
of in.mpathd and pnmd, as described in Module 8, Managing the Public
Network With IPMP.
10-7
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
as
h
If you intend to run certain clustered applications only in Solaris 10 non)
y
m
global zones, you might install the agents only in these non-global
zones.
oinmthe global
Alternatively, you might choose to install the agents always
c
to all
e
m
zone, without the -G option, and have them automatically
propagate
d
s
i
ec t Gu
existing and future non-global zones.
@
b den
u
k
ya Stu
(
n
Data Service Packages u
and
di Resource
his Types
t
l
e
a us
m
a
k encapsulates
to
Each data servicegagent
all the information about the agent
e
n
s
a
n
as a resource
type.
ab lice
b
u this resource
le type is registered with the cluster software, you do not
k
b
a
When
a
r
l yneedstofeknow
u
the location or names of the components of the agent. You
d
n need to reference
b tronly
a
a
the applications resource type to determine all the
ang non correct information about methods and fault monitors for that component.
ab
Note The package that you add by using the pkgadd command to install
an agent, and the corresponding resource type might have different
names. For example, when you install the SUNWschtt package, a resource
type called SUNW.iws becomes available.
10-8
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Resource
Group
Manager
s
) ha
y
m
om
controls
c
sm uide
c
e
G
Resource
t
@
n
b
Group
ku tude
a
y
n ( this Scontains
i
contains
d
lu se
a
am to u
k
Resource
Resource
g nse
n
a
ab lice
b
u
is a
leis a
k
b
a
a
l y sfer
u
d
Resource Type
Resource Type
ab -tran
g
n
n
no
aba
Figure 10-2 Resource Group Manager
10-9
Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
In the context of clusters, the word resource refers to any element above
the layer of the cluster framework that can be turned on or off, and can be
monitored within the cluster.
An example of a resource would be an instance of a running data service.
For example, an Apache web server with a single httpd.conf file, counts
as one resource.
Each resource is an instance of a specific resource type. For example, each
Apache web server is an instance of SUNW.apache resource type.
s
) ha
y
m
om
c
csm Guide
A particular resource is identified by the following:
e
@ ent
b
u
Its resource type
ak Stud
y
(
A unique name, which is used
in Sun Cluster utilites
in as identification
is
d
h
t
u
e
al are
A set of properties,
which
parameters
that define the
s
m
u
a
o
k a particular
configuration of
t resource
g
e
n
s
a cen
b
a
limultiple resources of the same type in the cluster, either
You can
b configure
e
u
l
k
in
athe same
abor different resource groups.
r
y
l
e
f
s
nexample,
bdu trFor
a
a
you might want to run two failover Apache web server
g on- application services
n
that reside, by default, on different nodes in the
a
n
ab
cluster, but could fail over to the same node if there were only one node
Other types of resources represent IP addresses and data storage that are
required by the application service.
available. In this case, you have two resources, both of type SUNW.apache,
in two different resource groups.
Resource Groups
Resource groups are collections of resources. Resource groups are either
failover or scalable.
10-10
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
10-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
m
Benefits of Putting All Services in a Single Resourcem
Group
co e
m
s
If you put all data services in the same failover c
resource
group
uid of a
e
G
two-node cluster, the node that is not currently
t the resource group
@ hosting
n
b
e
u
is in a pure backup mode. Some customers
prefer
services this
ud to deployprovides
ak this
tconfiguration
y
(
S
way, in a single resource group,
because
more
n
s
i
i
d
h
predictable behavior. If the
node currently
running all the data services is
t
luthere
e
a
s
performing optimally,
and
is
a
failover,
you can predict that the new
m to u
asame
k
node will have
the
performance,
assuming
equivalent servers.
g
e
n
s
ba licen
a
b
u
le Manager
k
b
Resource
Group
a
a
l y sfer
u
d
ab -tranThe rgmd daemon maintains all the information about data services that
g
an non
are known to the cluster as resources in resource groups. The rgmd
ab
10-12
daemon launches all methods that start resources in resource groups and
performs all failovers.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
Application Resource
y
m
om
c
csm Guide
e
b@ dent
Data Storage Resource ku
ya Stu
(
n
Resource iType:
d e this
u
SUNW.HAStoragePlus
l
a us
m
a
k e to
g
ns Host Resource
ban liceLogical
a
b
u
le
k
b
a
a
Resource Type:
y fer
l
u
SUNW.LogicalHostname
s
bd tran
a
g onn
a
n
ab
Failover Resource Group
Resource Type:
SUNW.nfs
10-13
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
ta few other
@services,
In addition to resource types that relate tou
data
n
b
e
d These resource
special resource types relate to IP addresses
ak and
tustorage.
y
(
S
types are described in Using Special
in Resource
is Types on page 10-15.
d
h
t
u
al use
m
ka e to
g
Resource TypenVersioning
ba licens
a
b 3.2lesoftware gives you the ability to use different versions of
u
Sun
Cluster
k
a etypes.
ab For example, old and new versions of data service agents
r
y
l
resource
f
s
nco-exist
bdu trcan
as separate types. Individual resources of an original resource
a
a
g
an non type can be upgraded to a new type on a resource-by-resource basis.
ab
Officially, the version number is appended to the resource type name. For
example, the official name of the NFS resource type is SUNW.nfs:3.2.
When using a resource type name, the version suffix can be dropped if
there is no ambiguity. For that matter, the vendor prefix can also be
dropped. For example, when you initially install Sun Cluster 3.2 software,
all of the following names can be used to refer to the nfs resource type:
10-14
SUNW.nfs:3.2
SUNW.nfs
nfs:3.2
nfs
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
ab
as
h
That is, each IP address described by a SUNW.LogicalHostname resource
)
y If the
migrates from node to node, along with the services for that group.
m
10-15
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
k tud
In fact, managing global storage withyaaSUNW.HAStoragePlus
resource
(
S
n
is optional, but serves the following
di euseful
hispurposes:
t
u
l
The START methodmofaSUNW.HAStoragePlus
is used to check if the
us
a
o
k
t
global devices
g or nfilesesystems in question are accessible from the
n
a
node where
b the
eresource group is going online.
c
a
i
l
b
u
Usually,
you
le use the Resource_dependencies standard property to
k
b
a
a
l y sconfigure
er a dependency so that the application resources depend on
f
u
d
SUNW.HAStoragePlus resource. In this way, the resource group
ab -tran the
g
manager
does not try to start services if the storage the services
n
n
o
a
n
depend on is not available.
ab
Global raw devices and global file system management, which include
failing over from a failed node, are part of the Sun Cluster software
framework. So it might seem redundant to provide a resource type that
also manages these global devices and file systems.
10-16
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
e
m
A scalable service
d
s
i
c Gu
e
t physically
@
A failover service that must fail over
to a node
not
n
b
e
u
connected to the storage
ak Stud
y
(
s for different failover services
incontains
A single file system that
d
hidata
t
u
l
e
a on udifferent
that may be running
nodes
s
m
a
o
k dataefrom
t a node that is not currently running the
Access to
the
g
n
s
service
ba licen
a
b
u
le
k
b
a
a
If
your
storage
is physically connected to all possible nodes for the
y fer
l
u
s
group containing the HAStoragePlus resource, you can migrate
bd tranresource
a
the
underlying
ownership of the storage along with the service, as a
ang non
performance benefit.
ab
The Nodelist property for the resource group contains only nodes
that are physically connected to the storage; that is, if the Nodelist
for the resource groups is the same as the Nodelist for the device
group.
Only services in a single resource group are using the file system.
If these conditions are true, a failover file system provides a higher level
of performance than a global file system, especially for services that are
file system intensive.
10-17
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m have to
oyou
To manage failover of ZFS filesystems within the cluster, all
c
e
m
d
s
do is configure an HAStoragePlus instance with the
value
of
the
Zpools
i
c over.GYou
u do not
efail
property indicating one or more pools that should
t
@
n All of the ZFS
bwhatsoever.
e
u
need to configure any /etc/vfstab entries
d
k
tuconfiguration database.
yathe zpool
mount information is self-contained(in
S
n
di e this
u
l
a us
m
a
Note A single HAStoragePlus
k e to instance can refer to multiple traditional
g
(non-ZFS) filesystems,
an cenorsmultiple ZFS zpools, but not both. When you
b
a
use thebZpools property
the values of the properties for traditional
li
e
u
l
k
filesystems
and AffinityOn) are ignored.
b
a era(FilesystemMountPoints
y
l
f
bdu trans
a
- ZFS technology is zone-aware, and ZFS zpools that are configured into a
ang non non-global zone via HAStoragePlus are only exposed in that zone. They
ab
10-18
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
In the lab exercises for this module, you will get an opportunity to use an
instance of the SUNW.gds type to put your own customized application
under control of the Sun Cluster software.
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
10-19
s
) ha
y
m
you are explicitly issuing the command (clrs disable) to disable the
dependee, you can do it. Note the prime directive (the first bullet item
above), does not explicitly forbid you from stopping the resources in the
wrong order.
10-20
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
has
ab
m
m
o
cdependee,
In this slight variation, when RGM is informed thatm
the
de issues a
s theuiRGM
coffline,
resource B, is offline, or when it is put explicitly
e
G
t
@
restart on resource A. Resource A explicitly
depends
on resource B;
n
b
deB actually restarts.
ku until
therefore, resource As start will be
blocked
u
a
t
y
n ( this S
i
d
lu se
a
m to u
Resource Group
aDependencies
k
ng ense
a
b
a grouplicdependencies imply an ordering relationship between
Resource
b
u
leIf resource group G has a group dependency on resource
two groups:
k
b
a
a
l y group
erH, group G cannot be brought online unless group H is online.
f
u
s
d
H cannot be brought offline unless group G is offline. This type of
ab -tranGroup
g
dependency considers the state of the group only rather than the
an non
resources inside it.
10-21
You configure specific resources within the cluster by defining values for
resource properties and resource group properties. Properties consist of a
set of name=value pairs.
These properties are used by the data service agent and by rgmd. There is
no way they can be accessed directly by the application software itself,
because it is cluster-unaware software.
s
) ha
Some properties are essential for running the service in the cluster. Scripts
specifically used to run the service in the cluster can read these property
values and use them to locate configuration files, or can use them to pass
command-line parameters to the actual services.
y
m
om
c
sm uide
c
e
G
Other properties are essential only for data service
fault tmonitoring.
@
n
b
Misconfiguring these properties might leave
de running fine, but
ku thetuservice
a
y
cause fault monitoring to fail.
n ( this S
i
d
lu dozens
e of properties. Fortunately, many
a
s
Each resource can literally
have
m
u
kafor particular
to types of resources are automatically
important properties
g
e
provided with
anreasonable
nsdefault values. Therefore, most administrators
b
e
c
a
li environments never need to deal with the
of SunbCluster software
e
u
l
k
properties.
a erab
y
l
u nsf
d
b
a
tra Resource Properties
g
n
n
Standard
no
aba
The names of standard resource properties can be used with any type of
resource.
You can access a full list of standard resource properties and their general
meanings by typing:
# man r_properties
Of the dozens of properties listed, only a handful are critical for a
particular resource type. Other properties can be ignored, or can have
default values that are unlikely to be changed.
10-22
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The following properties are standard resource properties; that is, they
can have meaningful values for many different types of resources.
s
) ha
ab
y
m
m
To set up a weak dependency, so that resource A has a weak
odependency
c
e
on resource B, set the Resource_dependencies_weak
propertyidon
m
s
u
ec nottaGreal
resource A. (Recall that this implies an ordering, but
@
b den
dependency.)
u
k
ya Stu
(
Resource_dependencies_weak=resB
n
di e this
u
l
a us
m
a
The Resource_dependencies_restart
and
k e to
g
Resource_dependencies_offline_restart
Properties
ban licens
a
bthe twolkinds
e of restart dependencies, set the
u
To k
set
b
a
a
or
l yResource_dependencies_restart
er
f
u
s
d
property on resource A.
an
ab -trResource_dependencies_offline_restart
g
Resource_dependencies_restart=resB
an non
Resource_dependencies_offline_restart=resB
10-23
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Value of the
Failover_mode
Property
Failure to Start
Failure to
Stop
Can Fault
Monitor
Cause
RGM to
Fail RG
Over?
Can Fault
Monitor Cause
RGM to Restart
the Resource?
Yes
Yes
No
No
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak YesStud Yes
SOFT
The whole resource The
y
(
group is switched
STOP_FAILED
in this
d
u
l is setson
to another node.
e
aflag
m
u
ka ethetoresource.
g
anresource
HARD
The whole
Yes
Yes
ns The node
b
e
c
a
i
l
group
b is switched
enode. reboots.
u
l
k
b
to
another
ya fera
l
u
RESTART_ONLY
No
Yes
bd transOther resources in The
a
the
same
resource
STOP_FAILED
g
n non
a
group can still start flag is set on
b
a
NONE
LOG_ONLY
Other resources in
the same resource
group can still start
(if nondependent).
The
STOP_FAILED
flag is set on
the resource.
(if nondependent).
the resource.
Other resources in
the same resource
group can still start
(if non-dependent).
The
STOP_FAILED
flag is set on
the resource.
10-24
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Extension Properties
Names of extension properties are specific to resources of a particular
type. You can get information about extension properties from the man
page for a specific resource type. For example:
# man SUNW.apache
# man SUNW.HAStoragePlus
For example, if you are setting up the Apache web server, you must create
a value for the Bin_dir property, which points to the directory containing
the apachectl script that you want to use to start the web server.
The HAStoragePlus type has the following important extension
properties regarding filesystems.
s
) ha
ab
y
m
m
o
c
FilesystemMountPoints=list_of_storage_mount_points
e
m
d
s
i
AffinityOn=True/False
ec t Gu
@
-------------------b den
u
k
Zpools=list_of_zpools
ya Stu
(
n
di properties
his to identify which storage
t
u
l
Use the first of these extension
e
a The
m
ussecond extension property is a parameter
resource is being described.
a
o
k
t
g nframework
that tells the
cluster
to switch physical control of the storage
se the service.
annode
bthe
e
groupato
running
Switching control to the node that
c
i
l
b
isurunning lthe
e service optimizes performance when services in a single
k
b
a
a
failover
resource
group are the only services accessing the storage. The
y fer
l
u
s
property (Zpools) is used only for specifying pool names for a
bd tranthird
a
failover
ZFS resource, in which case the first two properties are not used.
ang non
Many resource types (including LDAP and DNS) have an extension
property called Confdir_list that points to the configuration.
Confdir_list=/global/dnsconflocation
Many have other ways of identifying their configuration and data. There
is no hard-and-fast rule about extension properties.
10-25
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The following properties are associated with a resource group, rather than
an individual resource.
s
) ha
y
m
om
c
ide or
The Nodelist property for a resource group describes
what u
nodes
csm
e
G
zones the resource group can run on.
t
@
n
b
ku tude
a
y
(an ordered
S list, from most preferred
The value of this property is always
n
s
i
i
d
h
t zone acts as a virtual node
node to least preferred node.
luA non-global
e
a
s
from the point of view of
a
resource
group
node list. As mentioned before,
m to u
a
k
while it is not strictly
intention
of the cluster zone integration feature,
g the
e
n
s
a
n
it is possible
for
the
same
groupss
node list to include multiple zones on
b lice
a
the same
b physical
e node.
u
l
k
b
ya fera
l
u
nsFailback Property
bd trThe
a
a
ang non
The Nodelist Property
ab
If the Failback property is TRUE (not the default), the resource group
automatically switches back when a preferred node or zone (earlier in the
node list) joins the cluster.
10-26
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
If the fault monitor for one particular resource requests that a group be
failed off a particular node or zone, and then the fault monitor for
the same resource requests another failover that would bring the
group back to the original node or zone, the RGM rejects the second
failover if it is within the interval.
s
) ha
y
m
om
c
idefaulty start
csm
u
e
Note The Pingpong_interval property is meant
to prohibit
G
t
@
n
b
scripts or properties and faulty fault monitors,
or
problem
applications,
u ude
k
a
t
from causing endless ping-ponging
(y between
S nodes or zones.
n
s
i
i
lud se th
a
u
am
o
The Pathprefix
Property
k
t
ng ense
a
b
a
ThebPathprefix
licproperty points to a directory in a shared-storage file
e
u
l
ksystemrathat
b is used for the administrative purposes of services in the
a
y
fe group.
ul nresource
s
d
b
a
tra Currently, the only data service that must have the Pathprefix property
g
n
n
no
set is NFS, which uses the property to find its dfstab file. NFS needs the
aba
dfstab file so that it knows what to share. NFS also uses the same arena
to store file lock state information. File lock state information is typically
stored in the /etc directory on a stand-alone NFS server, but it must be in
the shared storage in the cluster.
An NFS resource must have its dfstab file named:
value_of_Pathprefix_for_RG/SUNW.nfs/dfstab.resource_name
When you create an NFS resource, the resource checks that the
Pathprefix property is set on its resource group, and that the dfstab file
exists.
10-27
You may specify non-global zone names in the place of node names in the
following contexts:
s
) ha
y
m
om
c
idae
The form nodename:zonename is used to specify
a zoneuon
csm
e
G
t
@
particular node.
n
b
desame or different
kunodes
u
a
t
You can easily give zones on different
the
y
S
n ( tothbeisdifferent
i
zone names. They are considered
virtual nodes by the
d
u
l
e
cluster either way. a
m to us
a
k
The syntax g
-n nodename
e -z zonename is identical to
n
s
a
n
-n nodename:zonename.
ab lice
b
uThe syntax
le-n node1,node2,... -z zonename
k
b
a
a
l y sisfea rshorthand for -n node1:zonename,node2:zonename,... In
u
d
ab -tran other words, it is a shorthand you when specifying multiple zones
g
n non
on different nodes that have the same zone name.
a
b
a
The commands to perform these operations are presented in the next few
sections, but there are some general rules in using zone names:
10-28
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
Registering Resource
Types
al use
m
ka e to
g
The following
s show registration of resource types. The first
an examples
nnode
bspecifies
e
example
a
list of all current and future nodes. The second
c
a
li
b
e
u
l
kexample
blimits the node list to only the nodes mentioned.
a
a
r
y
fe register SUNW.nfs
ul n#sclrt
d
b
a
tra # clrt register -n vincent,theo SUNW.apache
g
n
n
no
aba
If you do specify a node list, you are restricting the resource type to certain
nodes or zones. The cluster then allows you to specify only those nodes or
zones for the resource groups that contain resources of that type. The only
property of a registered resource type that you can modify with the clrt
command is the node list.
Yo
10-29
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Node List
--------<All>
<All>
<All>
<All>
vincent theo
s
) ha
y
m
csm Guide
Registered Resource Types ===
e
@ ent
b
u
Resource Type:
SUNW.apache:4.1
ak Stud
y
(
RT_description:
s Server on Sun Cluster
inApache
iWeb
d
h
t
u
RT_version:
e
al u4.1
s
m
API_version:
2
ka e to /opt/SUNWscapc/bin
g
RT_basedir:
ban licens
Single_instance:
False
a
b
Proxy:
False
u
le
k
b
a
a
Init_nodes:
All potential masters
y fer
l
u
s
Installed_nodes:
vincent theo
bd tran
a
Failover:
False
g onn
a
SUNWscapc
n
ab Pkglist:
RT_system:
Global_zone:
False
False
Note The Failover (False) means that the resource type is not limited
to being failover only (that is, it can be failover or scalable). Global_zone
(False) means that methods for the resource type will run in a nonglobal zone when the type is configured in a non-global zone.
Unregistering Types
You can unregister only types for which there are no remaining resources:
# clrt unregister nfs
10-30
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ab
nfs-rg
<NULL>
Failover
Unmanaged
False
10-31
vincent theo
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
ora-rg
<NULL>
Failover
Unmanaged
False
vincent:frozone theo:frozone
s
) ha
y
m
om
c
Resource Group:
nfs-rg
Pathprefix:
/global/nfs/admin
csm Guide
e
@ ent
b
u
# clrg show -v nfs-rg
ak Stud
y
(
in this
d
Resource Groups and Resources ===
u
al use
m
ka e to
Resource Group:
nfs-rg
g
n
s
a
n
RG_description:
<NULL>
ab lice
RG_mode:
Failover
b
e
u
l
k
b
RG_state: ya
Unmanaged
ra
l
e
f
u
RG_project_name:
default
s
bd tran
a
RG_affinities:
<NULL>
g
n
n
RG_SLM_type:
manual
no
aba Auto_start_on_new_cluster:
True
Resource Groups and Resources ===
Failback:
Nodelist:
Maximum_primaries:
Desired_primaries:
RG_dependencies:
Implicit_network_dependencies:
Global_resources_used:
Pingpong_interval:
Pathprefix:
RG_System:
Suspend_automatic_recovery:
10-32
False
vincent theo
1
1
<NULL>
True
<All>
3600
/global/nfs/admin
False
False
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
as
h
Multiple logical IP resources on different subnets must be separate
)
y
resources, although they can still be in the same resourcem
group.
om
c
m
d
s
i
address, or both.
ec t Gu
@
ncommands assume
b these
If you do not specify the Hostnamelist,
e
u
d
k
tuof Hostnamelist.
that the resource name is also
yathe value
(
S
n
is to use on each node, in the
dofi which
hadapters
NetIfList: Indication
t
u
l
e
a us
format: ipmp_grp@node_id,ipmp_grp@node_id,..
m
a
k e toNetIfList, the commands try to figure out if
g
If you n
do
not specify
nsIPMP group per node on the subnet indicated by
bais only
e
there
one
c
a
li If so, the value of NetIfList is automatically
b Hostnamelist.
e
u
l
k
a ederived.
ab When you use the -N shorthand of the clrslh command
r
y
l
f
bdu trans you can use the node names, but the actual value of the property will
a
contain the node ids.
ang non
ab
10-33
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
omnfs-res
# clrs create -t nfs -g nfs-rg -p Resource_dependencies=nfs-stor
c
e
m
d
s
i
ec t Gu
@
b den
u
k
tu
Displaying Resource Configuration
Information
ya S
(
n
di e this
u
l
a clrsusshow to display the configuration of
You can use clrs list
and
m
a
k theeIPtoresources):
any resource (including
g
ban licens
# clrs list -v
a
b
le Type
Resource Name ku Resource
Resource Group
b
a
a
r
y
-------------------------------------l
e
f
u
s
d
nfs-stor
nfs-rg
ab -tran SUNW.HAStoragePlus:8
g
orangecat-nfs
SUNW.LogicalHostname:3
nfs-rg
n
n
o
a
n
SUNW.nfs:3.2
nfs-rg
abnfs-res
# clrs show nfs-res
Resources ===
Resource:
Type:
Type_version:
Group:
R_description:
Resource_project_name:
Enabled{vincent}:
Enabled{theo}:
Monitored{vincent}:
Monitored{theo}:
10-34
nfs-res
SUNW.nfs:3.2
3.2
nfs-rg
default
True
True
True
True
-p resource_dependencies nfs-res
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Resources ===
Resource:
Resource_dependencies:
nfs-res
nfs-stor
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
10-35
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
s
) ha
y
m
om
c
ab
3.
6.
10-36
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
at_creation You can only set the property as you do the clrs
create command to add the resource.
anytime You can change anytime with the clrs set command.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
10-37
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
econtrol
currently not online on any nodes, but still subject to
automatic
sm
iitdonline
u
and recovery. That is, the cluster will still manageeitcand bring
if
G
t
@
n
b
the entire cluster reboots, or if the cluster reconfigures
u ude because any node
k
a
fails or joins.
t
y
(
S
n
di e this
u
l
a us
m
a
Introduction to Resource
k e toState
g
an cens
b
a
li have a persistent disabled/enabled state flag that
Individual
b resources
e
u
l
k
survives
of its groups state, and survives cluster reboots. A
a etransitions
abis disabled
r
y
l
resource
that
when its group is unmanaged or offline will still
f
u ns
d
b
a disabled (and will not run) when the group goes online. If you change
a
trbe
g
n
the
enabled/disabled state of a resource while the group is online, it turns
n
a
no
ab
on and off the resource. If you do so while the group is not online, it
affects what will happen to the resource when the group goes online.
If a resource is enabled, then another similar state flag can disable and
enable just the fault monitoring for the resource.
When a resource is created using clrs create or clrslh create or
clrssa create it is automatically put into the enabled state, regardless
of the state of its resource group.
10-38
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
t
n
b@nfs-rg
# clrg switch [-M] [-e] -nknode
e
u
d
a The
tugroup
y
(
S
Remaster a failover resource
group.
switches to its
n this
i
d
preferred node, even
luif it issealready running on another node.
a
u
# clrg remaster
am nfs-rg
o
k
t
nagresource
segroup. The group remains in the managed state, so
Offline
a
n
b
e
itais still subject
lic to automatic recovery:
b
e
u
l
k #raclrg
b offline nfs-rg
a
y
l
e
f
bdu trans Restart a resource group:
a
g onn
# clrg restart nfs-rg
a
n
b
a
Resource Operations
Use these commands to do the following:
10-39
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
10-40
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
Group online
o
c
resources running
e
m
d
s
if
enabled
i
res1: disabled/enabled
ec t Gu
res2: disabled/enabled
@
b den
u
k
tu clrg switch -n node rg
ya Sres
(
clrs
disable/enable
n
di e this
u
l
ma to us clrg online -n node rg
clrg offlinekrg
a
(enabled/disabled
clrg online rg (brings it on preferred node)
g nse
n
state
preserved)
(enabled/disabled state of resource preserved)
a
b lice
a
b
u
le
k
Group: Offline
b
a
a
r
y
No resources running
res1: disabled/enabled
l
e
f
u
s
d
res2: disabled/enabled
ab -tran
Resources may be
g
an non
enabled or disabled
ab
clrg unmanage rg
(must disable each
resource first)
clrg online -M rg
clrg online -M
-n node rg
clrg manage rg
res1: disabled/enabled
res2: disabled/enabled
Group: Unmanaged
10-41
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
You can still transition the resource group any way you like using
the commands presented on the previous pages.
s
) ha
y
m
om
c
csm Guide
e
t group is to
@ resource
The reason you might want to suspend an online
n
b
e
u
perform maintenance on itthat is, start
udsome applications
akand Sstop
t
y
(
manually, but while preserving the
online
status of the group and other
in can
isbe
d
h
t
components, so that dependencies
still
honored correctly.
u
l
e
a
s
am to u
k
g suspend
The reason younmight
an offline resource group is so that it does
sewhen
a
n
not go online
automatically
you did not intend it to do so.
b
e
c
a
i
l
b
u
le
k
b
a
a
you put a resource group offline (but it is still
l yFor example,
erandwhen
f
u
s
d
managed
not
suspended),
a node failure still causes the group to go
b tran
a
- online.
ang non
ab
10-42
Displaying Resource and Resource Group Status Using the clrg status and clrs
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
# clrg status
y
m
Group Name
Node Name
Suspended
Status
csm Guide
e
@ ent
-------------------------- b-----u
nfs-rg
vincent
No
Offline
ud
ak S
t
y
(
theo
Noin
is Online
d
h
t
u
al use
# clrs status -g nfs-rg
m
ka e to
g
Cluster Resources ===
ban licens
a
b
u
le State
k
b
Resource Name
Node
Name
Status Message
a
a
r
y f--------l
e
u
-----------------------------s
bd tran vincent
a
nfs-stor
Offline
Offline
g
n
n
theo
Online
Online
no
aba
orangecat-nfs
vincent
theo
Offline
Online
Offline
Online - LogicalHostname online.
nfs-res
vincent
theo
Offline
Online
Offline
Online - Service is online.
10-43
Using the clsetup Utility for Resource and Resource Group Operations
as
h
The Resource Group menu for the clsetup utility looks similar to the
)
y
m
following:
m
o
c
Option:
10-44
Using the Data Service Wizards in clsetup and Sun Cluster Manager
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
c
The NFS wizard, for example, can create and online the NFS resource
group and resources, just like the Resource Group menu items could. It
can also create the vfstab entry for your storage (it will not actually build
your volume or file sytstem), and provision the proper share command
for you. The idea is that it can guide you through the task in a wizard-like
fashion, without even mentioning the terminology of resources and
resource groups.
10-45
s
) ha
y
m
m
Task 7 Putting Failover Application Data in a ZFS FileoSystem
c
e
m
Task 8 Making a Customized Application Fail
Over
With
a
Generic
d
s
i
ec t Gu
Data Service Resource
@
b den
u
k
Task 9 Viewing and Managing Resources
a Stuand Resource Groups
y
(
Using Sun Cluster Managerin
d e this
u
l
a us
m
a
o
Preparation ng k se t
ba licen
a
b
e are explained in this section:
u
ltasks
The
following
k
b
a
a
l y sPreparing
er to register and configure the Sun Cluster HA for NFS data
f
u
d
ab -tran service
g
an non
ab
Registering and configuring the Sun Cluster HA for NFS data service
Note During this exercise, when you see italicized terms, such as
IPaddress, enclosure_name, node1, or clustername, embedded in a
command string, substitute the names appropriate for your cluster.
10-46
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Install the Sun Cluster HA-NFS data service agent on all nodes:
# cd sc32_location/Solaris_sparc/Product
# cd sun_cluster_agents/Solaris_10/Packages
# pkgadd -d . SUNWscnfs
s
) ha
ab
y
m
om
c
sm uide
c
e
2. Modify the /etc/default/nfs file on all nodes. Change
G the line that
t
@
n
b
currently reads:
ku tude
a
y
GRACE_PERIOD=90
n ( this S
i
d
luperiodsto
and lower the grace
e 10:
a
m
u
GRACE_PERIOD=10
ka e to
g
ban licens
a
b Thisleshould speed up HA-NFS switchovers and failovers. If your
u
Note
k
a clienterand
abserver are both running Solaris 10 OS, you will be using NFS
y
l
f
s 4 by default. This is a stateful protocol which will intentionally
bdu tranVersion
a
- delay resumption of NFS activity so that clients have a chance to reclaim
ang non
their state any time the server is recovering (which will include any
cluster switchover or failover). The GRACE_PERIOD controls the length of
the delay.
3.
Verify that the /global/nfs file system is mounted and ready for
use.
# df -h
10-47
Add an entry to the /etc/hosts file on each cluster node and on the
administrative workstation for the logical host name resource
clustername-nfs. Substitute the IP address supplied by your
instructor.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
IP_address
clustername-nfs
Note In the RLDC, the /etc/hosts file on the vnchost already contains
the appropriate entry for each cluster. Verify that the entry for your cluster
exists on the vnchost, and use the same IP address to create the entry on
your cluster nodes.
Perform the remaining steps on just one node of the cluster.
s
) ha
y
m
om
c
# cd /global/nfs
csm Guide
e
@ ent
# mkdir admin
b
u
# cd admin
ak Stud
y
(
# mkdir SUNW.nfs
in this
d
u
6. Create the dfstab.nfs-res
ein the
al ufile
s
m
/global/nfs/admin/SUNW.nfs
directory. Add the entry to share the
ka e to
g
/global/nfs/data
an censdirectory.
b
a
#bcd SUNW.nfs
li
e
u
l
k
b
a # eviradfstab.nfs-res
y
l
f
bdu transshare -F nfs -o rw /global/nfs/data
a
g onn
a
7. Create the directory specified in the dfstab.nfs-res file.
n
ab
5.
Create the administrative directory that contains the dfstab.nfsres file for the NFS resource.
#
#
#
#
cd /global/nfs
mkdir /global/nfs/data
chmod 777 /global/nfs/data
touch /global/nfs/data/sample.file
Note You are changing the mode of the data directory only for the
purposes of this lab. In practice, you would be more specific about the
share options in the dfstab.nfs-res file.
10-48
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
s
) ha
y
m
om
c
m uide
csresource
3. Create the logical host name resource to the
group.
e
G
t
@
b den
# clrslh create -g nfs-rg clustername-nfs
u
k
tu If all of your nodes are
ya resource.
(
S
4. Create the SUNW.HAStoragePlus
n
di (two-node
hiscluster, for example), you should
connected to the storage
t
u
l
e
a us to true. If you have a third, nonstorage
set the value ofm
AffinityOn
a
k esettothe value of AffinityOn to false.
node, you
should
g
an create
ns-t HAStoragePlus -g nfs-rg \
e
#ab
clrs
c
li
b -p AffinityOn=[true|false]
\
e
u
l
k
b
a
a
-p
FilesystemMountPoints=/global/nfs
nfs-stor
y fer
l
u
s
bd tran5. Create the SUNW.nfs resource.
a
# clrs create -t nfs -g nfs-rg \
ang non
# clrg create -n node1,node2,[node3] \
-p Pathprefix=/global/nfs/admin nfs-rg
ab
-p Resource_dependencies=nfs-stor nfs-res
6.
Note The very first time you do this you may see a console warning
message concerning lockd: cannot contact statd. Both daemons
are restarted (successfully) and you can ignore the message.
7.
10-49
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Perform the following steps to verify that NFS clients can access the file
system of the Sun Cluster HA for NFS software package:
1.
2.
3.
Edit the $HOME/test.nfs script and verify that the logical host name
and NFS file system names are correct.
s
) ha
y
m
ab
10-50
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
On one node of the cluster, determine the name of the node currently
primary for the nfs-rg resource group.
3.
On one node of the cluster, transfer control of the NFS service from
one node to another.
s
) ha
y
m
e
4. Observe the messages displayed by the test.nfs
csm Gscript.
uid
e
t the switchover
@ during
5. How long was the data service interrupted
n
b
e
u
from one physical host to another?
ak Stud
y
(
in this
__________________________________________________
d
u
al and
seshare commands on all nodes to verify
u
6. Use the cldgam
status
k ethetonodes are now mounting and exporting.
g
whichn
file
systems
a cens
b
a
li
b __________________________________________________
e
u
l
k
a e__________________________________________________
ab
r
y
l
f
bdu trans __________________________________________________
a
- 7. Use the ifconfig command on all nodes to observe the additional
ang non
# clrg switch -n dest-node nfs-rg
ab
8.
10-51
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
Single public network interface failure (pull a public network cable h
,a
)
or sabotage the adapter using ifconfig modinsert as youm
didyin
Module 8)
om
c
ab
10-52
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
If you have a nonstorage third node, delete the nonstorage node from
the group node list, and set the affinity:
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
3. Unmount the global NFS
infile system.
d
his
t
u
l
e
a us
# umount /global/nfs
m
a
k editethe
to/etc/vfstab file to make /global/nfs a
4. On eachgnode,
n system
ns(if you have a non-storage node, you can either
local
bafile
e
c
a
liedit, or just remove the line completely):
b makelthis
e
u
k
a ea.rabChange yes to no in the mount-at-boot column.
y
l
u nsf
d
b
b. Remove the word global from the mount options. Replace it
a
tra
g
n
n
with a minus sign (-). Make sure you still have seven fields on
no
aba
that line.
#
#
#
#
#
#
5.
clrg
clrs
clrs
clrs
clrs
clrs
6.
Observe the file system behavior. The file system should be mounted
only on the node running the NFS service and should fail over
appropriately.
10-53
In this task, you will migrate your server-side data to a failover ZFS
filesystem.
Note This task assumes that there are no longer any non-storage nodes
included in your NFS resource group. This should be the case if you have
completed Task 6. If you have a non-storage node in your resource group
(and have not done Task 6), remove it from the group using clrg
remove-node -n nonstorage-node-name.
s
) ha
y
m
om
c
m uide
csZFS
1. Identify the node that is currently importingethe
storage pool
G
t
@
n
(nfspool) that you created in the ZFS
module.
b
ku tude
a
y
# zpool status
n ( this S
i
d
lu se
a
2. On the node identified
step
u 1, verify that the nfspool/nfs dataset
am int(this
o
is mounted g
at k
/testnfs
will match the destination for the cpio
e
n
s
a
n
done in
ce
ab stepl4).
i
b
u# df -hble| grep nfspool/nfs
k
a
rayour NFS failover resources (and current failover filesystem)
y3. Move
l
e
f
u
s
bd tran to the node identified in step 1:
a
g onn
a
# clrg switch -n node_importing_the_zpool nfs-rg
n
ab
Peform the following steps only on the single node that is currently the
primary for the NFS resource group:
4.
From the node identified in step 1, disable your NFS service and
migrate the data to your ZFS file system:
#
#
#
#
#
10-54
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
5.
Disable your old (non-ZFS) NFS resource, and remount the ZFS
under /global/nfs. If you have already done task 6 then the
traditional /global/nfs is already a failover file system, and it will
be unmounted by the clrs disable (so the umount is there just in
case you had not done task 6).
#
#
#
#
#
6.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
d file system from your
aklegacy
tuNFS
y
7. Remove or comment out the
old
(
S
in this
/etc/vfstab on bothdnodes.
u
e behavior of the NFS application,
al andufailover
s
m
8. Observe switchover
a
know
to the zpool containing your ZFS file system.
whichn
will
include
g
e
ba licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
10-55
In this task, you can see how easy it is to get any daemon to fail over in
the cluster, by using the Generic Data Service (so that you do not have to
invent your own resource type).
Perform the following steps on the nodes indicated:
1.
On all nodes (or do it on one node and copy the file to other nodes in
the same location), create a daemon that represents your customized
application:
# vi /var/tmp/myappdaemon
#!/bin/ksh
while :
do
sleep 10
done
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
k nodes.
aall
tud
2. Make sure the file is executable(y
on
S
n failover
inew
d
his resource group for your
t
3. From any one node, create
a
u
l
e
a us
application:
m
a
k -n node1,node2,[node3]
to
g
e
# clrg create
myapp-rg
n ens
a
b
a one node,
4. From
licregister the Generic Data Service resource type:
b
e
u
l
k # clrt
a
abregister SUNW.gds
r
y
l
e
f
bdu tr5.ansFrom one node, create the new resource and enable the group:
a
g onn
# clrs create -g myapp-rg -t SUNW.gds \
a
n
b
a
-p Start_Command=/var/tmp/myappdaemon \
-p Probe_Command=/bin/true -p Network_aware=false \
myapp-res
# clrg online -M myapp-rg
6.
10-56
Verify that you can manually switch the group from node to
node.
b.
Kill the daemon. Wait a little while and note that it restarts on
the same node. Wait until clrs status shows that the
resource is fully online again.
c.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
3.
4.
s
) ha
y
m
om
c
10-57
Exercise Summary
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Exercise Summary
Experiences
Interpretations
Conclusions
Applications
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
10-58
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 11
Objectives
ab
y
m
om
Upon completion of this module, you should be able to:
c
csm Guide
Describe the characteristics of scalable services
e
@ ent
b
u
Describe the function of the load-balancer
ak Stud
y
(
Create the failover resource
in group
isfor the SharedAddress resource
d
h
t
u
egroup for the scalable service
alresource
Create the scalable
s
m
u
kathe eSharedAddress
to
Describeghow
resource works with scalable
n
s
a
n
services
ab lice
b
u Addbauxiliary
le
nodes
k
a
a
r
y
ul nsfeCreate these resource groups
d
b
a
tra
Control scalable resources and resource groups
g
n
n
a
no
11-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relevance
What reason might you have to have separate resource groups with
a requirement that group A run only on a node also running group
B? Why not just combine them into one group?
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
11-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Sun Cluster System Administration Guide for Solaris OS, part number
820-7458 (for Sun Cluster 3.2 11/09).
Sun Cluster Software Installation Guide for Solaris OS, part number 8207356 (for Sun Cluster 3.2 11/09).
Sun Cluster Concepts Guide for Solaris OS, part number 821-0259 (for
Sun Cluster 3.2 11/09)
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
11-3
y
m
om
c
csm Guide
e
Client 1
Client 2
@Client e3 nt
b
u
Requests
Requests
ak Stud
y
Network
(
in this
d
u
Node 1
al use
m
a
to
Global Interface g k
e
Web
xyz.coman
b licens
Page
a
bRequest le Transport
u
k
a Distribution
ab
r
y
Node 2
Node 3
l
e
f
u
s
d
ab -tran
g
n non
HTTP
a
b
HTTP
HTTP
Application
a
s
) ha
Application
Application
<HTML>
<HTML>
<HTML>
</HTML>
</HTML>
</HTML>
11-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
abes
Similar to the failover services, all the data for the scalable service must
h
)
y
in the shared storage.
m
om
c
e must use
Unlike the failover service, a file system-oriented scalable
service
sm can
idstill
cresource
u
e
the global file system. A SUNW.HAStoragePlus
be
G
t
@
n
b
configured to manage dependencies between
eservice and the storage.
u uthe
d
k
a
t
(y is S
n
i
th
ludData
File Locking for Writing
e
a
am to us
k
ngbarriers
seto taking just any application and turning it into a
One of the
big
a
n
b
e
a servicelicis that a service that is cluster-unaware may have been
scalable
b
u
le a way as to ignore file-locking issues.
k
b
writtenain
such
a
l y sfer
u
d
ab -tranIn Sun Cluster 3.2 software, an application that performs data
g
n non
modification without any type of locking or file synchronization
a
b
a
mechanism generally cannot be used as a scalable service.
While Sun Cluster 3.2 software provides the global data access methods, it
does not automatically call any file-locking primitives for you.
Web servers that do file writing in common gateway interface (CGI)
scripts, although not written specifically for a scalable platform, are
usually written in such a way that multiple instances can be launched
simultaneously even on a stand-alone server. Therefore, they already have
the locking in place to make them ideal to work as scalable services in Sun
Cluster 3.2 software.
Web servers that perform file writing using Java servlets must be
examined much more closely. A servlet might use thread synchronization
rather than file locking to enforce serial write access to a critical resource.
This does not translate properly into a scalable service.
11-5
The glue that holds a scalable service together in Sun Cluster 3.2 software
is the SharedAddress resource.
This resource provides not only a single IP address that makes the
scalable service look similar to a single server from the point of view of
the client, but also provides the load balancing of requests to all the nodes
or zones on which a scalable service is active.
Client Affinity
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
A single SharedAddress
ka resource
to can provide standard (per connection
g
e
load balancing)
thentype
s of sticky load balancing required by
banAand
e
shoppingacarts.
scalable
services agent registers which type of load
c
li
b
e
u
l
balancing
k rais brequired, based on a property of the data service.
a
y
ul nsfe
d
b
a Load-Balancing
tra
g
Weights
n
n
o
a
n
ab
Sun Cluster 3.2 software also lets you control the weighting that should be
applied for load balancing. The default weighting is equal (connections or
clients, depending on the stickiness) per node or zone, but through the
use of properties described in the following sections, a better node or zone
can be made to handle a greater percentage of requests.
Note You could have a single SharedAddress resource that provides
load balancing for the same application using multiple IP addresses on
the same subnet. You could have multiple SharedAddress resources that
provide load balancing for the same application using IP addresses on
different subnets. The load balancing properties discussed on this page
are set per scalable application, not per address.
11-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
oGroup
c
Scalable Resource Group
Failover Resource
e
m
d
s
i
ec t Gu
@
n
b SUNW.SharedAddress
e
u
SUNW.HAStoragePlus
d
k
tu
ya SResource
(
Resource
n
di e this
u
l
a us
m
a
k e to
g
ban licens
a
bResource_dependencies
u
le
k
b
a
a
l y sfer
u
d
ab -tran SUNW.apache Resource
g
n non
a
b
a
Figure 11-2 Scalable and Failover Resource Groups
11-7
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Properties:[Nodelist=vincent,theo Mode=Failover
Failback=False...]
s
) ha
y
m
m
o
c
apache-lh
SUNW.SharedAddress
HostnameList=apache-lh
e
m
d
s
i
Netiflist=therapy@1,therapy@2
ec t Gu
@
b den
u
k
ya Stu
Resource group name: apache-rg
(
n
di e this Mode=Scalable
u
Properties: [Nodelist=vincent,theo
l
a Maximum_primaries=2]
m
us
Desired_primaries=2
a
o
k
t
g contents:
ngroup
se See Table 11-2.
Resource
a
n
b
e
a
lic
b
e
u
l
Table 11-2 apache-rg
k Resource
b Group Contents
a
a
r
y
fe
ul
d
Resource
Name ansResource Type
Properties
b
a
r
t
g
n non
a
web-stor
SUNW.HAStoragePlus FilesystemMountPoints=/global/web
b
a
Resource Name
Resource Type
Properties
AffinityOn=False
apache-res
11-8
SUNW.apache
Bin_dir=/global/web/bin
Load_balancing_policy=LB_WEIGHTED
Load_balancing_weights=3@1,1@2
Scalable=TRUE
Port_list=80/tcp
Resource_dependencies=web-stor,
apache-lh
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ideis
csm property
u
If these values are greater than 1, the Mode=Scalable
e
G
t
@
automatically set.
n
b
ku tude
a
y
n ( this S
i
d
Note If you create a resource
using clrg create -S, the
lu sgroup
e
a
u
Desired_primaries
properties are both
amand tMaximum_primaries
o
k
automatically
ngset etonthe
senumber of nodes in the nodelist for the group.
a
b
a
lic
b
e
u
l
k rab
a
y
l Load_balancing_policy
fe
Property
uThe
s
d
n
b
a
tra
g
n
n
This is a property of the data service resource. It has one of the following
no
aba
values:
11-9
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ab
11-10
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
But
node list of every scalable service that might run onm
it, you are
fine.
e
d
s
i
c the primary
u for the
you might want to restrict which nodes mightebe
G
t
@
SharedAddress, while still allowing a u
larger
nlist for the scalable
b node
e
d
k
services dependent on it.
ya Stu
(
n
di hasea tspecial
his auxiliary nodes property that
u
l
The SharedAddress resource
a us
m
allows you to augment
node list of its group, just for the purposes of
a
knodesethe
toscalable
g
supporting n
more
for
services. This is set with the -X option
s
a
n
b
e
to clrssa
a create.
lic
b
e
u
l
k rab
a
y
l Insthe
e following example, you want only nodes vincent and theo to be
f
u
d
primaries for the SharedAddress (to actually host it on the public net
ab -tranthe
g
and
do the load balancing). But you might be supporting scalable services
an non
that run on vincent, theo, and apricot:
11-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
3.
y
m
om
4. Bring the resource group online:
c
s
) ha
ab
-p Resource_dependencies=web-stor,apache-lh \
-p Bin_dir=/global/web/bin \
-p Port_list=80/tcp \
-p Scalable=TRUE \
apache-res
8.
11-12
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
c
csm Guide
e
# clrg online -n node,node [-M]
t
@[-e]eapache-rg
n
b
u
akto theSspecified
Switch a scalable resource group
tud nodes. On any other
y
(
nodes, it is switched off.
in this
d
u
l [-e]
e-n node,node,.. apache-rg
a[-M]
# clrg switch
s
m
u
a
kscalable
to
Remaster
a
resource
group. The group switches to its most
g
e
n
s
a
n
preferred
b linodes
e (the number of nodes is controlled by
c
a
b
It may go offline on some nodes if it was
u Desired_primaries).
le
k
b
a
a
previously
running
on
more nodes or on nodes that were less
y fer
l
u
s
bd tran preferred.
a
# clrg remaster apache-rg
ang non
11-13
Resource Operations
Use the following commands to:
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
11-14
Using the clrg status and clrs status Commands for a Scalable Application
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Node Name
--------vincent
theo
Suspended
--------No
No
Status
-----Online
Offline
s
) ha
y
m
om
c
web-rg
vincent
No
Online
theo
No
Online
csm Guide
e
@ ent
b
u
ak Stud
y
(
# clrs status -g sa-rg,web-rg
in this
d
u
al use
Cluster Resources ===
m
ka e to
g
Resource Name
NodebName
an censState Status Message
a
li
-----------------------------b--------e
u
l
k
orangecat-web
Online Online - SharedAddress online.
a vincent
ab
r
y
l
e
theo
Offline Offline
f
u ns
d
b
a
tra vincent
g
n
web-stor
Online Online
n
o
a
n
b
theo
Online Online
a
apache-res
vincent
theo
Online
Online
11-15
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
# clrg set -p RG_affinities=++rg1 rg2
c
csm Guide
e
rg2 is referred to as the source and rg1 as the @
target.
t
n
b
e
u
ak Stud
y
(
din Weak
hisNegative Affinities
Weak Positive Affinitiesluand
t
e
a us
m
a
kof affinities
toplace only a preference, not a requirement,
g
The first two kinds
e
ns group.
banoflthe
e
on the location
source
c
a
i
b
e
u
l
k
a ea rweak
ab positive affinity says that the source group prefers to switch
y
Setting
l
f
nsnode already running the target group, if any. If the target group is
bdu trtoathe
a
- not running at all, that is fine. You can freely switch online and offline
ang non either group, and freely, explicitly, place either on any node that you want.
ab
Setting a weak negative affinity means that the source group prefers any
other node besides the target. Once again, it is just a preference. You can
freely, explicitly, place either group on whatever node you want.
Weak positive and weak negative group affinities are denoted by a single
plus or single minus sign, respectively.
In this example, group rg2 is given a weak positive affinity for rg1. This
does not affect the current location of either group.
# clrg set -p RG_affinities=+rg1 rg2
WARNING: resource group rg2 declares a weak positive
affinity for resource group rg1; but this affinity is not
satisfied by the current state of the two resource groups
11-16
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
# clrg switch -n specific-node
aksrc-grp
tud
y
(
S
in this
d
u
l
There can be multiple a
resource
groups
e as the value of the property. In
s
m
u
other words, a source
can
have
more
than one target. In addition, a source
a
o
k
t
can have both
positive
weak negative affinities. In these cases,
ngweak
se aand
a
n
b
e
the source
prefers
to
choose
node
satisfying the greatest possible
c
a
i
l
b
number
of lweak
e affinities. For example, select a node that satisfies two
u
k
b
a
a
weak
positive
affinities and two weak negative affinities rather than a
y fer
l
u
s
that satisfies three weak positive affinities and no weak negative
bd trannode
a
affinities.
g onn
a
n
ab
However, weak affinities are not enforced when you manually bring or
switch a group onto a specific node. The following command will
succeed, even if the source group has a weak affinity for a target running
on a different node.
The only node or nodes on which the source can be online are nodes
on which the target is online.
If the source and target are currently running on one node, and you
switch the target to another node, it drags the source with it.
11-17
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
If you offline the target group, it will offline the source as well.
If a resource in the source group fails, the source group still cannot
fail over to a node where the target is not running. (See the next
section for the solution to this example.)
The source and target are closely tied together. If you have two failover
resource groups with a strong positive affinity relationship, it might make
sense to make them just one group. So why does strong positive affinity
exist?
s
) ha
y
m
om
c
The only difference between the +++ and the ++ is that here (with +++), if
a resource in the source group fails and its fault monitor suggests a
failover, the failover can succeed. What happens is that the RGM moves
the target group over to where the source wants to fail over to, and then
the source is dragged correctly.
11-18
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
You need to be careful with strong negative
d because the HA of
k taffinities
u
a
y
the source group can be compromised.
n ( this S
i
d
lu se
a
am to u
k
ng ense
a
b
a
lic
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
no
aba
For example, if you have a two-node cluster with both the source and
target groups online (on different nodes), and one node crashes
(whichever it is), only the target group can remain running because the
source group absolutely, categorically refuses to run on the same node.
11-19
Exercise: Installing and Configuring Sun Cluster Scalable Service for Apache
s
) ha
y
m
m uide
Task 7 Configuring Advanced Resource Group
csRelationships
e
G
t
@
n
b
ku tude
a
y
Preparation
n ( this S
i
d
lu se
a
The following tasks are
uin this section:
amexplained
o
k
t
g SunnCluster
nfor
se HA for Apache registration and
Preparing
a
b
e
a
configuration
lic
b
e
u
l
k Registering
a
ab and configuring the Sun Cluster HA for Apache data
r
y
l
e
f
bdu transservice
a
g onVerifying Apache web server access and scalable capability
n
a
n
b
a
Note During this exercise, when you see italicized names, such as
IPaddress, enclosure_name, node1, or clustername embedded in a
command string, substitute the names appropriate for your cluster.
11-20
Exercise: Installing and Configuring Sun Cluster Scalable Service for Apache
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
clustername-web
s
) ha
ab
y
m
om entry
Note In the RLDC, the vnchost already contains thec
appropriate
dethe
for each cluster. Verify that the entry for your cluster
smexistsuion
c
e
G on your cluster
vnchost, and use the same IP address to create
the entry
t
@
n
b
nodes. In a non-RLDC environment, create
/etc/hosts
entry on your
de
ku the
u
a
t
y
administrative workstation as well.
n ( this S
i
d
lu se
a
am to u
k
Task 2 Configuring
ng ensethe Apache Environment
a
b
a
lic
b
e
u
l
kOn (any)
bone node of the cluster, perform the following steps:
a
a
r
y
ul n1.sfeMake a resource-specific copy of the /usr/apache2/bin/apachectl
d
b
a
tra
script and edit it:
g
n
n
o
a
n
# mkdir /global/web/bin
# cp /usr/apache2/bin/apachectl /global/web/bin
# vi /global/web/bin/apachectl
a.
b.
HTTPD='/usr/apache2/bin/httpd -f /global/web/conf/httpd.conf'
11-21
Exercise: Installing and Configuring Sun Cluster Scalable Service for Apache
2.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
# mkdir /global/web/conf
# cp /etc/apache2/httpd.conf-example /global/web/conf/httpd.conf
3.
New Entry
KeepAlive On
KeepAlive Off
s
) ha
y
m
Listen 80
Listen clustername-web:80 om
c e
m
ServerName 127.0.0.1
ServerName clustername-web
s
c Guid
e
@ ent
DocumentRoot "/var/apache2/htdocs" DocumentRoot b
"/global/web/htdocs"
u
ak"/global/web/htdocs">
tud
y
<Directory "/var/apache2/htdocs">
<Directory
(
S
in this
d
u
ScriptAlias /cgi-bin/
e /cgi-bin/
al ScriptAlias
s
m
u
"/var/apache2/cgi-bin/" [one kline]
"/global/web/cgi-bin/"
[one line]
a
to
g
e
<Directory "/var/apache2/cgi-bin">
ban licens <Directory "/global/web/cgi-bin">
a
b
u
le
k
b
a
a
l y4. sCreate
er directories for the Hypertext Markup Language (HTML)
f
u
d
ab -tran and CGI files and populate with the sample files.
g
# cp -rp /var/apache2/htdocs /global/web
n non
a
b
# cp -rp /var/apache2/cgi-bin /global/web
a
5.
11-22
Exercise: Installing and Configuring Sun Cluster Scalable Service for Apache
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
# /global/web/bin/apachectl start
3.
as
h
?
0:00 /usr/apache2/bin/httpd
)
y
start
m
?
0:00 /usr/apache2/bin/httpd
om
c
start
csm Guide
e
?
0:00 /usr/apache2/bin/httpd
@ ent
b
start
u
d
ak 0:01
?
tu/usr/apache2/bin/httpd
y
(
S
start
in this
d
u
al? use 0:00 /usr/apache2/bin/httpd
m
ka e ?start
to
g
0:00 /usr/apache2/bin/httpd
n ens
a
b
start
a
lic
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
no
aba
vincent:/# ps -ef|grep apache2
webservd 4604 4601
0 10:20:05
-f /global/web/conf/httpd.conf -k
webservd 4603 4601
0 10:20:05
-f /global/web/conf/httpd.conf -k
webservd 4605 4601
0 10:20:05
-f /global/web/conf/httpd.conf -k
root 4601
1
0 10:20:04
-f /global/web/conf/httpd.conf -k
webservd 4606 4601
0 10:20:05
-f /global/web/conf/httpd.conf -k
webservd 4602 4601
0 10:20:05
-f /global/web/conf/httpd.conf -k
11-23
Exercise: Installing and Configuring Sun Cluster Scalable Service for Apache
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
4.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
dinPagee this
Figure 11-3 Apache Serverlu
Test
a us
m
a
k e to
g
n econnect,
ns you might need to disable proxies or set a
Note If you
bacannot
c
a
i
bexception
proxy
inl your web browser.
e
u
l
k
a erab
y
l
f the Apache web server.
u 5. nsStop
d
b
a
tra
g
#n
/global/web/bin/apachectl
stop
n
o
a
n
ab
6. Verify that the server has stopped.
# ps -ef | grep apache2
root 8394 8393 0 17:11:14 pts/6
7.
11-24
Exercise: Installing and Configuring Sun Cluster Scalable Service for Apache
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Register the resource type required for the Apache data service.
# clrt register SUNW.apache
2.
3.
s
) ha
ab
y
m
e
m
d
s
i
4. Bring the failover resource group online. c
e t Gu
@
# clrg online -M sa-rg
b den
u
k
u all nodes of the cluster.
ton
ya to run
5. Create a scalable resource group
(
S
n
i nodes.)
(The example assumes
dtwo
his
t
u
l
e
a-S -n unode1,node2
s
# clrg create
web-rg
m
a
o
k
t
g nresource
6. Add anstorage
se to the scalable group.
a
b
e
a -tlicSUNW.HAStoragePlus \
# clrs create -gbweb-rg
u
le
k
-p FilesystemMountPoints=/global/web
-p AffinityOn=false web-stor
b
a
a
r
y
l
e
f
bdu tran7.s Add an application resource to the scalable resource group.
a
ang non
# clrs create -g web-rg -t SUNW.apache -p Bin_dir=/global/web/bin \
-p Scalable=TRUE -p Resource_dependencies=clustername-web,web-stor \
apache-res
8.
# clrg status
# clrs status
11-25
Exercise: Installing and Configuring Sun Cluster Scalable Service for Apache
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Perform the following steps to verify the Apache web server access and
scalable utility:
1.
2.
s
) ha
y
m
om
c
e
Task 6 Observing Cluster Failures ecsm uid
G
t
@
n
b
u at autime,
de and fix each one
k(one
a
Cause as many of the following failures
t
y
( can,isgiven
S your physical access to
n you
before going on to the next one)
as
i
d
h
lu se t
the cluster.
a
am to u
k
Perform the following
ng ensteps
se to observe the behavior of the scalable
a
b
service: a
lic
b
e
u
l
k Fail raasingle
b public network interface on the node where the
a
1.
y
l
e
f
bdu transSharedAddress resource is online.
a
g on- 2. Fail all public network interfaces on that node.
n
a
n
ab
3. Reboot one of the nodes running the scalable service.
4.
11-26
Fail (or bring to the OK prompt) one of the nodes running the
scalable service.
Exercise: Installing and Configuring Sun Cluster Scalable Service for Apache
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
If you have not yet done so, complete Task 8 in Module 10.
2.
3.
s
) ha
y
m
om
c
ab
web-rg
8.
9.
11-27
Exercise: Installing and Configuring Sun Cluster Scalable Service for Apache
10. Bring myapp-rg online without specifying the node. Where does it
end up? Why does it not end up on the first node of its own node
list?
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
11-28
Exercise Summary
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Exercise Summary
Experiences
Interpretations
Conclusions
Applications
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
11-29
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Module 12
Objectives
y
m
om
Upon completion of this module, you should be able to:
c
ide
csm
u
Configure a scalable application in non-global
zones
e
G
t
@
n
b
Configure HA-Oracle in a Sun Cluster
software
de environment as a
ku 3.2
u
a
t
y
failover application
n ( this S
i
d
Configure Oracle a
RAC
lu 11gsinea Sun Cluster 3.2 software environment
am to u
k
ng ense
a
b
a
lic
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
a
no
ab
12-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Relevance
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Relevance
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
12-2
Additional Resources
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Additional Resources
Additional resources The following references provide additional
information on the topics described in this module:
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
12-3
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
Preparation
u
ak Stud
y
(
s background information in
din eread
hithe
Before continuing with this lexercise,
t
u
a us
this section.
m
a
k e to
g
ns Clustered Applications in Zones
banRunning
e
Background
c
a
li
b
e
u
l
k
a ofethe
abclustered applications are supported in non-global zones. The
r
y
Many
l
f
ns group manager (RGM) is fully knowledgeable about zones and
bdu trresource
a
a
g on- treats them as if they were virtual nodes as far as configuring resource
n
a
n
groups.
ab
12-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Allocate a dedicated public net IP address for the zone. Make sure
you use an IP that is not going to conflict with any other node or
previously used application IP or IPMP test address. Make sure you
use a different IP for the zone on each node. You will identify the
address in step 2. You are not required to put it in any /etc/hosts
file.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
2. Configure the zone.
u
ak Stud
y
(
in this
d
# zonecfg -z myzone
u
e
alzoneuconfigured
s
myzone: No such
m
ka toe begin
to configuring a new zone.
Use 'create'
g
zonecfg:myzone>
an cens create
b
a
set zonepath=/myzone
li
b zonecfg:myzone>
e
u
l
k
set autoboot=true
a ezonecfg:myzone>
ab
r
y
l
zonecfg:myzone>
add net
f
u ns
d
b
zonecfg:myzone:net> set address=x.y.z.w
a
tra
g
n
zonecfg:myzone:net> set physical=node_pubnet_adapter
n
o
a
n
b
zonecfg:myzone:net> end
a
Note Only scalable load-balanced applications require a dedicated nonglobal zone IP address. You could run failover applications in non-global
zones without dedicating public network IP addresses for the zones.
zonecfg:myzone> commit
zonecfg:myzone> exit
3.
12-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
1.
2.
Connect to the zone console and configure the zone. It will look
similar to a standard Solaris OS that is booting after a sysunconfig:
# zlogin -C myzone
[Connected to zone 'myzone' console]
s
) ha
Wait until the SMF services are all loaded, and navigate through the
configuration screens. Get your terminal type correct, or you may
have trouble with the rest of the configuration screens. vt100 usually
works. Do not choose sun.
y
m
om
c
csm Guide
e
t
n
b@
e
u
Note While the zone on each node willkhave
the
same
d zone name
u
a
t
y
(SolarisishostS name in the configuration
(myzone), give each zone a different
n
i
d
h
screens (myzone-nodename),lu
so you cantdistinguish
between them (and so
e
a
s
that the Apache proof ofm
concept CGI
program
will
make
sense).
u
a
o
k
t
g nse
nhave
a
Whenb
you
efinished the system configuration in the zone, it will
c
a
i
l
reboot
You can stay connected to the zone console.
b automatically.
e
u
l
k
b
a /etc/hosts file in the zone (on each node) and add the IP
rthe
y3.a Edit
l
e
f
u
s
bd tran address for clustername-web. Use the same name and IP address
a
g onthat you have in the /etc/hosts file in the global zone.
n
a
n
ab
4. Edit the /etc/default/login file in the zone to allow root logins:
# vi /etc/default/login
[Comment out the CONSOLE=/dev/console line]
# exit
5.
12-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
From any one node, offline both the scalable and shared address
resource groups:
# clrg offline web-rg sa-rg
2.
s
) ha
ab
y
m
om
c
# mkdir -p /myzone/root/global/web
12-7
Perform the following steps to verify the correct operation of Apache, and
to demonstrate that the load balancing is working when the scalable
application is running across non-global zones.
1.
On any node, from the global zone, verify the cluster application
status:
# clrg status
# clrs status
2.
On each node, log in to the non-global zone and verify that the
Apache application is running within the zone:
s
) ha
y
m
om
c
12-8
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
e
m Oracle
idSoftware
Task 3C: Create a Shared Storage File System
csfor
u
e
G
(ZFS)
t
@
n
b
de
ku Environment
u
a
Task 4 Preparing the oracle
User
t
y
( is S
nControl
i
d
Task 5 Disabling Access
th of X Server on the Admin
u
l
e
a
Workstation m
us
a
o
k
t
Task 6ng
Running
sethe runInstaller Installation Script
a
n
b
e
a 7 Preparing
Task
an Oracle Instance for Cluster Integration
lic
b
e
u
l
k
a eTask
ab8 Registering the SUNW.HAStoragePlus Type
r
y
l
f
bdu trans Task 9 Installing and Registering Oracle Data Service
a
g onn
Task 10 Creating Resources and Resource Groups for Oracle
a
n
ab
Preparation
Before continuing with this exercise, read the background information in
this section.
12-9
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Background
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
For ease of installation and management, this lab takes the strategy of
installing the Oracle binaries themselves directly in shared storage.
Therefore, you only need to perform the Oracle installation once. The
disadvantage is that there would be no way to perform maintenance or
patching on the software while keeping your application available on
another node.
y
m
om
c
csm Guide
e
@ ent
b
u
d
tucopies
yakseparate
(
S
In production, you might want toninstall
of the software
s
i
i
d
h
locally on each node (with the
course,
being in the shared
t
lu data,toseofinstall,
a
storage). While it is more
difficult
you
get the advantage of
m to u
arolling
k
being able to perform
maintenance
(including
patching) of the
g
e
n
s
a node
software onbone
while
n keeping your database alive on the other
e
c
a
i
l
node. b
u
le
k
b
a
a
l y sfer
u
d
n of File System and Storage
b trChoice
a
a
g onn
a
n
A failover file system is optimal for performance (although actual failover
ab
time is longer, the application runs faster after it is up and running).
However, you cannot use a failover file system if you want your
application to fail over to a nonstorage node.
This exercise uses a failover file system. You will not be able to use a nonstorage node (just pretend it does not exist), but it is unlikely anyone
would ever use a global file system or a non-storage node for HA-Oracle.
In this exercise there are options to use VxVM, SVM, or ZFS. Choose only
one of tasks, 3A, 3B, or 3C depending on your choice of storage
management.
12-10
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
ab
12-11
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Select a disk from shared storage. Make sure that you do not use any
disks already in use in existing device groups. Note the logical
device name (referred to as c#d#t# in step 2). The following
example checks against VxVM, Solaris Volume Manager, and ZFS
disks.
s
) ha
y
m
om
c
sm uide
c
e
# vxdisk -o alldgs list
G
t
@
n
b
# zpool status
ku tude
a
# metaset
y
n ( this S
i
# cldev list -v
d
lu thissdisk
e
a
2. Create a disk group
using
m
u
ka e to -i c#t#d#
g
# /etc/vx/bin/vxdisksetup
n oradg
ns ora1=c#t#d#
bainit
e
# vxdg
c
a
li
b a volume
e
u
l
3.
Create
to hold the Oracle binaries and data.
k
b
a
a
r
y
ul ns#fevxassist -g oradg make oravol 6g
d
b
a
tr4.a Register the new disk group (and its volume) with the cluster. The
g
n
n
no
nodelist property contains all nodes physically connected to the
aba
storage.
6.
# mkdir /oracle
# vi /etc/vfstab
/dev/vx/dsk/oradg/oravol /dev/vx/rdsk/oradg/oravol /oracle ufs 2 no -
7.
On the node on which you created the storage group, mount the file
system and change its ownership:
# mount /oracle
# chown oracle:dba /oracle
12-12
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
Select a disk from shared storage.. Make sure that you do not use any
disks already in use in existing device groups. Note the DID device
name (referred to as d# in step 2). The following example checks
against VxVM, Solaris Volume Manager, and ZFS disks.
y
m
om
c
sm uide
c
e
# vxdisk -o alldgs list
G
t
@
n
b
# zpool status
ku tude
a
# metaset
y
( is S
# cldev list -v din
u se th
l
a
2. Create a diskset
u disk.
amusingtothis
k
# metaset
orads
se -a -h node1 node2
ang ce-s
#ab
metaset
-snorads -a /dev/did/rdsk/d#
li
b Createlea soft
u
3.
partition (d100) of a mirror volume for Oracle. (SVM
k
b
a
a
r
y
ul nsfestill calls it a mirror, although we only have one submirror. This
d
b
gives us flexibility to add the other half of the mirror at our leisure
a
a
r
t
g
later.)
n non
a
b
a
# metainit -s orads d11 1 1 /dev/did/rdsk/d#s0
# metainit -s orads d10 -m d11
# metainit -s orads d100 -p d10 6g
4.
5.
# mkdir /oracle
# vi /etc/vfstab
/dev/md/orads/dsk/d100 /dev/md/orads/rdsk/d100 /oracle ufs 2 no -
6.
On the node on which you created the storage, mount the file system
and modify its permission:
# mount /oracle
# chown oracle:dba /oracle
12-13
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Perform the following steps on any one node physically connected to the
storage.
Note Just to simplify, we will create a ZFS storage pool with one disk.
You can always add another disk and mirror the existing disk later.
1.
Select a disk from shared storage.. Make sure that you do not use any
disks already in use in existing device groups. Note the device name
(referred to as c#t#d# in step 2). The following example checks
against VxVM, Solaris Volume Manager, and ZFS disks.
s
) ha
y
m
# zpool status
csm Guide
e
# metaset
@ ent
b
# cldev list -v
u
aksystem
tuford Oracle. Verify that
y
(
S
2. Create a ZFS storage pool and
a
file
inand change
d
his its permissions:
your file system is mounted
t
u
l
e
a uc#t#d#
s
m
# zpool create
orapool
a
o
k
t
# zfs create
orapool/orafs
e
ng e-onsmountpoint=/oracle
a
b
# df
-h
a oracle:dba
lic
#bchown le
/oracle
u
k
b
a
a
l y sfer
u
d
a4n Preparing the oracle User Environment
abTask
r
t
g
n non
a
b
a
2.
12-14
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
$ exit
s
) ha
m
m
co ethe
perform
ab
Dialog
Action
12-15
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Action
Install Location
s
) ha
y
m
othemOracle
A popup will warn you against using
c
e
m
d
s
Base as the home directory. Click
Yes.
i
ec t Gu
@
n
Product Specific Prerequisite
The tests will either u
allbsucceed...or..
e
d
k
Checks
you will be warned
swap space
tu
ya about
(
S
n
requirements.
di e this
u
l
a us
m
Click
Next,
and if you get a pop-up warning
a
k window,
toclick
g
e
Yes to proceed.
n ens
a
b
a
lic Deselect the following (so our install goes faster):
Available Product Components
b
e
u
l
k rab
a
Enterprise Edition Options
y
l
e
f
u
s
bd tran
Oracle Programmer 11.1.0.6.0
a
g
n
n
a
no
ab
Click Next.
Create Database
Summary
Select Protocols
12-16
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Action
More Listeners
Click Next.
s
) ha
y
m
om
DBCA Step 1: Database Templates
Select the General Purpose or Transaction
c
Click Finish.
12-17
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Action
Click Next.
Confirmation
s
) ha
y
m
ab
12-18
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Configure an Oracle user for the fault monitor (as user oracle):
$ sqlplus /nolog
SQL> connect / as sysdba
SQL> create user sc_fm identified by sc_fm;
SQL> grant create session, create table to sc_fm;
SQL> grant select on v_$sysstat to sc_fm;
SQL> alter user sc_fm default tablespace users quota 1m on users;
SQL> quit
s
) ha
ab
y
m
om
c
e (as user
2. Test the new Oracle user account used by thesm
c faultGmonitor
uid
e
oracle):
@ ent
b
u
$ sqlplus sc_fm/sc_fm
ak Stud
y
SQL> select * from sys.v_$sysstat;
(
in this
SQL> quit
d
u
e oracle). You can be creative about
al (asuuser
s
m
3. Create a sample
table
ka e to
your data
values:
g
an cens
$ sqlplus /nolog ab
li
b sysdba
e
l
SQL> connect k
/ uas
atableemytable
ab (Name VARCHAR(20), age NUMBER(4));
r
y
SQL> create
l
f
s mytable values ('vincent', 14);
du rainto
SQL>binsert
n
a
-t into mytable values ('theo', 14);
g insert
n
o
anSQL>
n
SQL> commit;
SQL> select * from mytable;
SQL> quit
Note This sample table is created only for a quick verification that the
database is running properly.
4.
5.
12-19
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
6.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
(a) Modify the HOST variable to match logical host name ora-lh.
(b) Add the following lines at the top:
SID_LIST_LISTENER =
(SID_LIST =
(SID_DESC =
(SID_NAME = MYORA)
(ORACLE_HOME = /oracle/product/11.1.0/db_1)
(GLOBALDBNAME = MYORA)
)
)
s
) ha
y
m
$ vi $ORACLE_HOME/network/admin/tnsnames.ora om
c e
m
Modify the HOST variable to match logical host
name
s
c Gora-lh
uid
e
@ ent
b
u
ak Stud
y
Task 8 Registering the SUNW.HAStoragePlus
Type
(
n this
i
d
lu se
a
m to u
Perform the followingatask:
k
ng(if not
se in a previous exercise), register the
If necessary
done
a
n
b
e
a
SUNW.HAStoragePlus
type from any one node in the cluster:
lic
b
e
u
l
k
a # eclrt
abregister SUNW.HAStoragePlus
r
y
l
f
bdu trans
a
on- 9 Installing and Registering Oracle Data
ang nTask
7.
ab
Service
Perform the following steps as indicated to install and register the Oracle
data service:
1.
2.
12-20
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
3.
s
) ha
ab
y
m
e
-p FilesystemMountPoints=/oracle \ sm
d
i
ec t Gu
-p AffinityOn=true ora-stor
@
b den
u
k
For ZFS:
ya Stu
(
n
i -tthHAStoragePlus
# clrs create -g ora-rg
\
is
dora-stor
u
l
-p Zpools=orapool
e
a us
m
a
k e to
g
4. Putbthe
anresource
nsgroup online (required by the dependency
e
c
a
li in the next step):
b specification
e
u
l
k
b online -M ora-rg
a e#raclrg
y
l
f
bdu tran5.s Create an oracle_server resource by creating and running a script.
a
(the command is too long to type interactively in some shells):
ang non
a.
# vi /var/tmp/setup-ora-res.sh
#!/bin/sh
/usr/cluster/bin/clrs create -g ora-rg \
-t oracle_server \
-p Resource_dependencies=ora-stor \
-p ORACLE_sid=MYORA -p ORACLE_home=/oracle/product/11.1.0/db_1 \
-p Alert_log_file=/oracle/diag/rdbms/myora/MYORA/trace/alert_MYORA.log \
-p Connect_string=sc_fm/sc_fm \
ora-server-res
b.
# sh /var/tmp/setup-ora-res.sh
12-21
Exercise 2: Integrating Oracle 11g Into Sun Cluster 3.2 Software as a Failover
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
6.
m
m
co software
Perform the following steps as indicated to verify that the Oracle
e
m
d
s
i
properly runs in the cluster:
ec t Gu
@
n running the
b nodedcurrently
1. Switch user to oracle user on the cluster
e
u
k
ora-rg resource group:
ya Stu
(
n
di e this
# su - oracle
u
l
a theucluster
s node currently running the oram
2. Query the database
from o
a
k
t
rg resource
nggroup:
se
a
n
b
e
a
$ sqlplus
SYS/cangetin@MYORA
as sysdba
lic
b
e
u
l
* from mytable;
k SQL>raselect
b
a
y
SQL>
quit
ul nsfe
d
b
a
tr3.a As user root (from any cluster node), switch the resource group to
g
n
n
another node:
a
no
ab
Query the database from the cluster node currently running the orarg resource group (as user oracle):
$ sqlplus SYS/cangetin@MYORA as sysdba
SQL> select * from mytable;
SQL> quit
5.
12-22
Verify that the database fails over properly under various failure
conditions:
a.
b.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
t
@
n
b
Task 4 Installing Oracle Distributed
Lock Manager
e
u
k tud
athe
y
Task 5 Creating and Enabling
(
S Framework Resource Group
n thisRAC
i
d
lu sCreating
Task 6A (If using a
VxVM):
Shared Volume Manager
e
m
u
Framework Resource
Group
ka e to
g
n Using
Taska6B(If
nsSolaris Volume Manager) Creating Shared Volume
b
e
c
a
i
Resource Group
lFramework
b Manager
e
u
l
k
a eTask
ab7A Creating Raw Volumes (VxVM)
r
y
l
f
bdu trans Task 7B Creating Raw Volumes (Solaris Volume Manager)
a
g onn
Task 8 Configuring Oracle Virtual IPs
a
n
ab
12-23
Preparation
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Background
Oracle 11g RAC software in the Sun Cluster environment encompasses
several layers of software, as follows:
RAC Framework
s
) ha
This layer sits just above the Sun Cluster framework. It encompasses
the UNIX distributed lock manager (udlm) and a RAC-specific
cluster membership monitor (cmm). In the Solaris 10 OS, you must
create a resource group rac-framework-rg to control this layer (in
the Solaris 9 OS, it is optional).
y
m
om
c
csm Guide
e
Shared Volume Manager framework
@ ent
b
u
k thetRAC
ud framework starting
afrom
This framework has been split off
y
(
S
in Sun Cluster 3.2 11/09 (Update
in 3).
d
hItisis required specifically and
t
u
l
only for shared volume
manager
support.
e
a us
m
a
kReadyeServices
to (CRS)
Oracle Cluster
g
s
an cenOracles
CRSaisbessentially
own implementation of a resource group
i
l
b
umanager.
leThat is, for Oracle RAC database instances and their
k
b
a
a
and related resources, CRS takes the place of the
l y sassociated
erClusterlisteners
f
u
d
Sun
resource
group manager.
b tran
a
g onOracle Database
n
a
n
b
a
The actual Oracle RAC database instances run on top of CRS. The
database software must be installed separately (it is a different
product) after CRS is installed and enabled. The database product
has hooks that recognize that it is being installed in a CRS
environment.
12-24
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Oracle RAC DB
Oracle CRS
Shared VM
Framework
RAC
Framework
s
) ha
y
m
m
o
c
Note Use of global devices (using normal device groups) or a global file
system is not supported. The rationale is that if you used global devices or
a global file system, your cluster transport would now be used for both
the application-specific RAC traffic and for the underlying device traffic.
The performance detriment this might cause might eliminate the
advantages of using RAC in the first place.
12-25
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
Note All the cluster command examples
d the rest of the RAC
k shown
anodes.
tufor
y
(
S
exercise assume you have two storage
You
can make the
n
s
i
i
d
h
t than two storage nodes on
appropriate substitutions if lyou
more
u have
e
a
s
which you choose to install
RAC.
There
m to u are some storage volumes that are
a
k
created on a per-node
g basis,
e this will be noted further in the sections
n
s
a
n
where you b
ce storage volumes.
a create lyour
i
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
Select the nodes on which the Oracle 11g RAC software will be installed
and configured. The nodes you select must all be attached to shared
storage.
ab
12-26
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
as
h
3. On one of the nodes remaining in the cluster, type the following
to
)
y
m
allow the nonstorage node to remove itself:
om
c
# claccess allow -h name_of_non_storage_node
ab
12-27
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
s
) ha
y
m
om
# passwd oracle
c
Enter a license for the CVM feature of VxVM. Your instructor will
tell you from where you can paste a CVM license.
# vxlicinst
3.
Verify that you now have a second license for the CVM_FULL feature:
# vxlicrep
4.
12-28
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
# cd sc32_location/Solaris_sparc/Product
# cd sun_cluster_agents/Solaris_10/Packages
# pkgadd -d . SUNWscucm SUNWudlm SUNWudlmr SUNWscor
s
) ha
y
m
# metadb
om
c
e
3. Add metadbs on the root drive, only if they s
idexist:
c domnotGyet
u
e
# metadb -a -f -c 3 c#t#d#s7
@ ent
b
u
ak Stud
y
(
inDistributed
d
Task 4 Installing Oracle
Lock Manager
his
t
u
l
e
a
am to us
k
Perform thenfollowing
g nssteps
e on all selected cluster nodes as user root.
a
b
e
a thelicORCLudlm package:
1. b Install
e
u
lORACLE_clusterware_location/udlm
k
b
a
#
cd
a
l y sfe#r cp ORCLudlm.tar.Z /var/tmp
u
d
ab -tran # cd /var/tmp
g
n non
# zcat ORCLudlm.tar.Z|tar xf a
b
a
# pkgadd -d . ORCLudlm
2.
2.
The pkgadd command prompts you for the group that is to be DBA
for the database. Respond using dba:
Please enter the group which should be able to act as
the DBA of the database (dba): [?] dba
12-29
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
If all goes well, you will see a message on the console: co
e
m
d
s
i
u
Unix DLM version(2) and SUN Unix DLM Library Version
ec (1):compatible
G
t
@
b den
u
k
ya Stu
(
n
Task 6A (If using VxVM): Creating
di e thisShared Volume
u
l
a us Group
Manager FrameworkmResource
a
k e to
g
n ens nodes, run the following commands as root:
On any oneb
ofathe selected
a
lic
b
e
u
l
# clrt registerak
vucmm_framework
ab
r
y
l
e
# clrt register
vucmm_cvm
f
s
du r-S
n
# clrgab
create
-n node1,node2 shvm-framework-rg
a
g on-t
n
a
n
-g shvm-framework-rg -t vucmm_framework vucmm-framework-res
ab# clrs create
# clrg online -M rac-framework-rg
12-30
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
as
h
# clrs create -g shvm-framework-rg -t vucmm_framework vucmm-framework-res
)
y
m
om
# clrs create -g shvm-framework-rg -t vucmm_svm \
c
-p Resource_dependencies=vucmm-framework-res vucmm-svm-res
csm Guide
e
@ ent
b
# clrg online -M shvm-framework-rg
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
ab
12-31
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
To create the raw volumes for the Oracle 11g RAC database, perform the
following steps from the single node that is the CVM Master.
1.
2.
Select a single disk from shared storage for a new disk group. Make
sure you do not use any disks already in use in existing device
groups. The following example checks against VxVM, ZFS and
Solaris Volume Manager disks, just in case you are running any
combination.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
n willthcreate
Note Just to speed up the lab,
iwe
is unmirrored volumes. You
d
u
l
can always add another disk
and
mirror
all
volumes later at your leisure,
e
a us
m
a going
or pretend that youkwere
to to.
g
e
n ens
baaCVM
3. Create
a
licshared disk group using this disk:
b
e
u
l
k # /etc/vx/bin/vxdisksetup
c#t#d#
a
ab-s init ora-rac-dg -i
r
y
l
e
#
vxdg
ora1=cAtAdA
f
bdu tr4.ansCreate the volumes for the database. You can use the provided
a
g onn
a
create_rac_vxvm_volumes script. This script is reproduced here, if
n
ab
#
#
#
#
vxassist
vxassist
vxassist
vxassist
vxassist
vxassist
vxassist
vxassist
vxassist
vxassist
vxassist
vxassist
vxassist
vxassist
12-32
-g
-g
-g
-g
-g
-g
-g
-g
-g
-g
-g
-g
-g
-g
ora-rac-dg
ora-rac-dg
ora-rac-dg
ora-rac-dg
ora-rac-dg
ora-rac-dg
ora-rac-dg
ora-rac-dg
ora-rac-dg
ora-rac-dg
ora-rac-dg
ora-rac-dg
ora-rac-dg
ora-rac-dg
make
make
make
make
make
make
make
make
make
make
make
make
make
make
raw_system 750m
raw_spfile 100m
raw_users 120m
raw_temp 100m
raw_undotbs1 312m
raw_undotbs2 312m
raw_sysaux 550m
raw_control1 110m
raw_control2 110m
raw_redo11 120m
raw_redo12 120m
raw_redo21 120m
raw_redo22 120m
raw_ocr 256m
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ withenthet newly created
b
6. Change the owner and group associated
u
ak here):
tud
volumes (assumes sh or ksh
syntax
y
(
S
in this
d
# cd /dev/vx/rdsk/ora-rac-dg
u
l
e
s
# for vol inm
*a
u
a
to
> do g k
e
s
> b
vxedit
set user=oracle group=dba $vol
an c-genora-rac-dg
a
i
l
>
done
b
u
le
k
b
a
a
l y sfer
u
d
an7B Creating Raw Volumes (Solaris Volume
ab Task
r
t
g
an nonManager)
Note Do not be concerned with error messages that appear at the end of
running the above commands. You will probably get errors indicating that
the end of the device does not align exactly on a 1kk (1MB) boundary.
ab
To create the raw volumes for the Oracle 11g RAC database, perform steps
15 from any one of the selected cluster nodes. Step 6 is the only step that
is run on all selected nodes.
1.
Select a single disk from shared storage for a new disk set. Make sure
you do not use any disk already in use in existing device groups.
Note the device identifier (DID) number of your selected disk
(referred to as d# in step 2). The following example checks against
VxVM, ZFS, and Solaris Volume Manager disks, just in case you are
running any combination.
#
#
#
#
12-33
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Note Just to speed up the lab, we will create unmirrored volumes. You
can always add another disk and mirror the parent volume later at your
leisure, or pretend that you were going to.
2.
3.
Create a big mirror from which to partition all the necessary data
volumes (still call it a mirror although it has only one submirror;
then you could easily just add the second half of the mirror later at
your leisure)
s
) ha
y
m
om
# metainit -s ora-rac-ds d11 1 1 /dev/did/rdsk/d#s0
c
ab
12-34
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
c
From either node, zero out the configuration and voting devices. This
eliminates problems that might arise from data left over from a
previous class:
On all selected nodes, change the owner and group associated with the
newly created volumes.
# chown oracle:dba /dev/md/ora-rac-ds/dsk/*
# chown oracle:dba /dev/md/ora-rac-ds/rdsk/*
12-35
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
Edit the /etc/hosts file and create public network entries for new
virtual IPs. You will have one IP per node that you are using with
Oracle RAC. If you use consecutive IP addresses, then the
configuration assistant in the next task automatically guesses the
second IP when you type in the first. Make sure you do not conflict
with any other physical or logical IPs that you or any other students
have been using during the week.
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
# vi /etc/hosts
in this
d
x.y.z.w
nodename1-vip
u
al use
x.y.z.w+1
nodename2-vip
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
ab
12-36
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
$ vi .profile
ORACLE_BASE=/oracle
ORACLE_HOME=$ORACLE_BASE/product/11.1.0/db_1
CRS_HOME=$ORACLE_BASE/product/11.1.0/crs
TNS_ADMIN=$ORACLE_HOME/network/admin
DBCA_RAW_CONFIG=$ORACLE_BASE/dbca_raw_config
#SRVM_SHARED_CONFIG=/dev/md/ora-rac-ds/rdsk/d101
SRVM_SHARED_CONFIG=/dev/vx/rdsk/ora-rac-dg/raw_spfile
DISPLAY=display-station-name-or-IP:display#
if [ `/usr/sbin/clinfo -n` -eq 1 ]; then
ORACLE_SID=sun1
fi
if [ `/usr/sbin/clinfo -n` = 2 ]; then
ORACLE_SID=sun2
fi
PATH=/usr/ccs/bin:$ORACLE_HOME/bin:$CRS_HOME/bin:/usr/bin:/usr/sbin
export ORACLE_BASE ORACLE_HOME TNS_ADMIN DBCA_RAW_CONFIG CRS_HOME
export SRVM_SHARED_CONFIG ORACLE_SID PATH DISPLAY
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran3. You might need to make a modification in the file, depending on
g
your choice of VxVM or Solaris Volume Manager. Make sure the line
n non
a
b
beginning SRVM_SHARED_CONFIG lists the correct option and that the
a
other choice is deleted or commented out.
4.
Make sure your actual X-Windows display is set correctly on the line
that begins with DISPLAY=.
5.
Read in the contents of your new .profile file and verify the
environment.
$ . ./.profile
$ env
6.
12-37
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
bAdd entries
u
le for undotbs3, redo1_3, and redo2_3 using the
Note
k
b
a
a
l yappropriate
er additional volumes names you created if you have a third
f
u
s
d
an Extrapolate appropriately for each additional node.
ab -trnode.
g
n non
a
b
a
12-38
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y Note
er Add entries for undotbs3, redo1_3, and redo2_3 using the
f
u
s
d
ab -tranappropriate additional volumes names you created if you have a third
g
n non
node. Extrapolate appropriately for each additional node.
a
b
a
12-39
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
s
) ha
y
m
om
c
Click Next.
Product Specific Prerequisite
Checks
12-40
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Action
s
) ha
y
m
om
c
e be
If you get some error concerning s
am
node that
idcannot
c
u
e
G
clustered (null), it is probably
because
you do not have
t
@
n
b
an /oracle/.rhosts
file.
You
must
have
one even on
u ude
k
a
t
the node on which
(y youisareSrunning the installer.
n
i
th section!
Specify Network Interface
Be very
careful
this
lud with
e
a
Usage
am to us
k
mark
in the instructions in this box,
ng To
se anitadapter
a
n
highlight
and
click
Then choose the appropriate
b
e
cradio button and clickEdit.
a
i
l
b
OK
u
le
k
b
a
a
l y sfer
u
Mark your actual public adapters as public.
d
b tran
a
ang non
Mark only the clprivnet0 interface as private.
Click Next.
ab
12-41
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Action
Summary
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
/oracle/oraInventory/orainstRoot.sh
ak Stud
y
/oracle/product/11.1.0/crs/root.sh
(
in this
d
u
e the voting device and
al scriptusformats
The second
m
ka thee CRS
enables
to daemons on each node. Entries are put
g
so that the daemons run at boot time.
ban inlic/etc/inittab
ens
a
b
u
le On the first node, you may have to wait the whole 600
k
b
a
a
l y sfer
seconds for the verification to complete (have a snack
u
d
n
b
courtesy of your training center).
a
tra
g
n
n
a
no
On all selected nodes, one at a time, starting with the
node on which you are running the installer, open a
terminal window as user root and run the scripts:
ab
End of Installation
12-42
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
On the node from which you installed CRS, as the user oracle, run the
the database installer. This is in a different directory than the CRS
software location:
$ cd ORACLE11gR1-db-location
$ ./runInstaller
s
) ha
y
m
m
3. Respond to the dialog boxes by using Table 12-3.co
e
m
d
s
i
ec t Gu
Table 12-3 Install Oracle Database Software Dialog Actions@
b den
u
k
ya Stu
Dialog
Action
(
n
i
is
lud se th
Welcome
Click a
Next.
u
am thetoCustom
k
Select Installation Type
Select
radio button, and click Next.
g nse
n
a
e especially that the destination path is
Install Location
ab licVerify,
b
u
le /oracle/product/11.1.0/db_1
k
b
a
a
l y sfer
u
d
Click Next. When you see the warning about the Oracle
ab -tran
g
Base, click Yes.
n
n
o
a
n
ab
Specify Hardware Cluster
Installation Mode
12-43
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Action
Available Product
Components
Click Next.
Privileged Operating System
Groups
s
) ha
y
m
Create Database
Verify that Create a Database is selected, and click
om Next.
c
e
m
Summary
Verify, and click Install
d
s
i
ec t Gu
@
Oracle Net Configuration
Verify that the Perform Typical
Configuration
check
n
e
ubNext.
d
k
Assistant Welcome
box is not selected, andaclick
tu
y
(
S
n
Listener Configuration,
Verify the Listener
di name
hisisLISTENER, and click Next.
t
u
l
e
a us
Listener Name
m
a
k thateTCP
to is among the Selected Protocols, and
g
Select Protocols
Verify
ns
ban click
Next.
e
c
a
li
b
e
u
l
k
TCP/IP Protocola
that the Use the Standard Port Number of 1521
ab Verify
r
y
l
e
Configuration
radio
button
is selected, and click Next.
f
u ns
d
b
aListeners-tra
More
Verify that the No radio button is selected, and click
g
n
n
o
a
Next
(be patient with this one, it takes a few seconds to
n
ab
move on)
Click Next.
Naming Methods
Configuration
Done
Click Finish.
12-44
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Action
s
) ha
y
m
om
c
Summary
12-45
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Action
Database Configuration
Assistant
s
Accept the default path name for the local bin directory. ha
)
y
m
End of Installation
Click Exit and confirm.
csm Guide
e
@ ent
b
u
ak Stud to Control
y
(
Task 14 Create Sun Cluster
Resources
in this
d
u
Oracle RAC Through CRS
al use
m
ka e to
g
s on only one of your selected nodes to create
Perform the following
an censteps
b
a
Sun Cluster
resources
li that monitor your RAC storage, and that allow you
bSun Cluster
e
u
l
to
use
k
b to control your RAC instances through CRS:
a
a
r
y
fe the types required for RAC storage and RAC instance
ul 1. nsRegister
d
b
a
tra control:
g
n
n
a
no
12-46
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
If you are using VxVM, do this one and skip the next one:
# clrs create -g rac-storage-rg -t ScalDeviceGroup \
-p DiskGroupName=ora-rac-dg \
-p Resource_dependencies=rac-cvm-res{local_node} \
rac-storage-res
If you are using Solaris Volume Manager, perform this one:
# clrs create -g rac-storage-rg -t ScalDeviceGroup \
-p DiskGroupName=ora-rac-ds \
-p Resource_dependencies=rac-svm-res{local_node} \
rac-storage-res
s
) ha
y
m
om
c
ab
12-47
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Note For the following command, make sure you understand which
node has node id 1, which has node id 2, and so forth, so that you match
correctly with the names of the database sub-instances. You can use
clinfo -n to verify the node id on each node.
# vi /var/tmp/cr_rac_control
clrs create -g rac-control-rg -t scalable_rac_server_proxy \
-p DB_NAME=sun \
-p ORACLE_SID{name_of_node1}=sun1 \
-p ORACLE_SID{name_of_node2}=sun2 \
-p ORACLE_home=/oracle/product/11.1.0/db_1 \
-p Crs_home=/oracle/product/11.1.0/crs \
-p Resource_dependencies_offline_restart=rac-storage-res{local_node} \
-p Resource_dependencies=rac-framework-res \
rac-control-res
y
m
om
c
csm Guide
e
# sh /var/tmp/cr_rac_control
@ ent
b
u
ak Stud
y
(
# clrg online -M rac-control-rg
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
12-48
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
ab
4.
5.
On the node for which you shutdown Oracle, verify as the oracle
user that the instance is unavailable:
$ crs_stat -t
$ sqlplus SYS@sun2 as sysdba
Enter password: cangetin
12-49
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
8.
9.
On the surviving node, you should see (after 45 seconds or so), the
CRS-controlled virtual IP for the crashed node migrate to the
surviving node. Run the following as user oracle:
s
) ha
y
m
om
c
m uinode2
ora.node2.vip application
ONLINE sONLINE
de
ora.node1.vip application
ONLINEec ONLINE
node2
G
t
@
n
b
u that
10. While this virtual IP has failed over,kverify
dethere is actually no
u
a
t
y
( iCRS.
S This virtual IP fails over
failover listener controlled by
Oracle
n
s
i
d
h
merely so a client quickly
gets a TCP
t disconnect without having to
luClient
e
a
s
wait for a long time-out.
software
then has a client-side option
m to u
a
k
to fail over g
to the other
e instance.
n
s
a
n
$ sqlplus
as sysdba
ce
ab SYS@sun1
i
l
b
uSQL*Plus:
le Release 11.1.0.6.0 - Production on Tue Mar 25
k
b
a
a
10:56:18
2009
y fer
l
u
s
bd tran Copyright (c) 1982, 2005, ORACLE. All rights reserved.
a
ang non
$ crs_stat -t|grep vip
ab
Enter password:
ERROR:
ORA-12541: TNS:no listener
Enter user-name: ^D
11. Boot the node that you had halted, by typing boot or go at the OK
prompt in the console. If you choose the latter, the node will panic
and reboot.
12. After the node boots, monitor the automatic recovery of the virtual
IP, the listener, and the database instance on the surviving node:
$ crs_stat -t
$ /usr/cluster/bin/clrs status
It can take several minutes for the full recovery. Keep repeating the
steps.
12-50
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
12-51
Exercise Summary
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Exercise Summary
Experiences
Interpretations
Conclusions
Applications
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
12-52
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Appendix A
Terminal Concentrator
This appendix describes the configuration of the Sun Terminal
Concentrator (TC) as a remote connection mechanism to the serial
consoles of the nodes in the Sun Cluster software environment.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
A-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
The Sun Terminal Concentrator (Annex NTS) has its own internal
operating system and resident administration programs.
Note If any other TC is substituted, it must not send an abort signal to
the attached host systems when it is powered on.
Figure A-1 shows that the TC is a self-contained unit with its own
operating system.
s
) ha
y
m
PROM
sm uide
c
e
Operating System
G
t
@
n
b
oper.52.enet
ku tude
a
y
Serial Ports
n7 ( 8this S
i
5
6
1
4
d
2
3
lu se
a
Serial port A
am to u
k
ng ense
Setup port
a
b
a Node
Node 2
lic1
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
traSetup Device
g
n
n
no
aba
Memory
Network
Interface
Figure A-1
A-2
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
2.
s
) ha
ab
y
m
Setup Port
om
c
e
smis used
idonly
cthat
u
Serial port 1 on the TC is a special purpose port
during
e
G
t
@
n
b
initial setup. It is used primarily to set u
up the IP e
address and load
d
k
u
a
sequence of the TC. You can access
port
1
from
either
a tip connection or
t
y
(
S
n
from a locally connected terminal.
di e this
u
l
a us
m
a
k e toSetup Programs
g
Terminal Concentrator
ban licens
a
bmust configure
u
le
k
You
the TC nonvolatile random access memory (NVRAM)
b
a
a
r
y
l
e
with
the
appropriate
IP address, boot path, and serial port information.
f
u ns
d
b
a
tra Use the following resident programs to specify this information:
g
n
n
a
addr
no
seq
image
admin
Terminal Concentrator
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
A-3
Connecting to Port 1
To perform basic TC setup, you must connect to the TC setup port.
Figure A-2 shows a tip hardwire connection from the administrative
console. You can also connect an American Standard Code for Information
Interchange (ASCII) terminal to the setup port.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
e1
al touPort
s
m
Figure A-2 Setup Connection
ka e to
g
ban licens
a
bSetupleMode
Enabling
u
k
a erab
y
l
f Setup mode, press the TC Test button shown in Figure A-3 until
u To nenable
s
d
b
a TC power indicator begins to blink rapidly, then release the Test
a
trthe
g
n
n
no button and press it again briefly.
aba
1
STATUS
POWER
UNIT
NET
Power indicator
Figure A-3
ATTN
LOAD
ACTIVE
Test button
After you have enabled Setup mode, a monitor:: prompt should appear
on the setup device. Use the addr, seq, and image commands to complete
the configuration.
A-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
Load Broadcast Y/N [Y]:: y ub@ ent
ak Stud
y
(
in this
d
u
l
Setting the TerminalaConcentrator
Load Source
e
s
m
u
ka e to
g
The following
an example
ns shows how to use the seq program to specify the
b
e
c
a
type
li mechanism to be used:
b of loading
e
u
l
k
a emonitor::
ab
seq
r
y
l
f
u
s
a list of 1 to 4 interfaces to attempt to use for
bd tran Enter
a
downloading
code or upline dumping. Enter them in the
g onn
a
order they should be tried, separated by commas or
n
ab
spaces. Possible interfaces are:
Ethernet: net
SELF: self
Enter interface sequence [self]::
Terminal Concentrator
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
A-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Note Although you can load the TCs operating system from an external
server, this introduces an additional layer of complexity that is prone to
failure.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
monitor::
y
(
in this
d
u
al use
m
Note Do not define
kaa dump
toor load address that is on another network
g
e
because you a
receive additional
questions about a gateway address. If you
nspress Control-C
b n you
e
make a mistake,
can
to abort the setup and start
c
a
li
b
e
u
l
again.
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
o
the Serial Port Variables
nSetting
aba
Enter Image name ["oper.52.enet"]::
Enter TFTP Load Directory ["9.2.7/"]::
Enter TFTP Dump path/filename
["dump.129.150.182.100"]::
The TC port settings must be correct for proper cluster operation. This
includes the type and mode port settings. Port 1 requires different type
and mode settings. You should verify the port settings before installing the
cluster host software. The following is an example of the entire procedure:
admin-ws# telnet terminal_concentrator_name
Trying terminal concentrator IP address ...
Connected to terminal concentrator IP address.
Escape character is '^]'.
Rotaries Defined:
cli
Enter Annex port name or number: cli
Annex Command Line Interpreter * Copyright 1991
Xylogics, Inc.
annex: su
A-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
Terminal Concentrator
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
A-7
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
admin:
admin:
admin:
admin:
admin:
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
A-8
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Router
hme0
hme1
s
) ha
129.50.2.12
y
m
om
c
Network
sm uide
c129.50.2
129.50.1
e
G
t
@
Terminal Concentrator (129.50.1.35)
n
b
ku tude
a
config.annex
y
n ( this S
i
d
%gateway
lu129.50.1.23
e metric 1 active
a
net default gateway
s
m
u
ka e to
g
ban licens
a
b Nodele1
u
Node 2
Node 3
Node 4
k
b
a
a
r
y
ul nsfe
d
b
a
tra Figure A-4 Terminal Concentrator Routing
g
n
n
no
aba
129.50.1.23
129.50.2.17
Terminal Concentrator
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
A-9
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
To create a default route for the TC, you must edit an electrically erasable
programmable read-only memory (EEPROM) file in the TC named
config.annex. You must also disable the TC routing function. The
following is a summary of the general process:
admin-ws# telnet tc1.central
Trying 129.50.1.35 ...
Connected to 129.50.1.35.
Escape character is ^].
[Return] [Return]
Enter Annex port name or number: cli
...
annex: su
Password: root_password
annex# edit config.annex
(Editor starts)
Ctrl-W:save and exit Ctrl-X:exit Ctrl-F:page down
Ctrl-B:page up
%gateway
net default gateway 129.50.1.23 metric 1 active ^W
annex# admin set annex routed n
You may need to reset the appropriate port, Annex
subsystem or reboot the Annex for changes to take
effect.
annex# boot
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non Note You must enter an IP routing address appropriate for your site.
a
b
a
While the TC is rebooting, the node console connections are not available.
A-10
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
Router
csm Guide
e
@ ent
b
u
ak Network
tud
y
(
S
in this
d
Network
u
al use
m
ka e to
TC
g
n
s
a
n
ab lice TC
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
Node 2
g
n
n
o
a
n
ab
Node 1
Administrative Console
Figure A-5
Terminal Concentrator
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
A-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m have
You can then log in to the node attached to port 5002. After o
you
c
ab
A-12
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
ab
y
m
om
c
csm Guide
e
t
@ eCommand
n
b
Using the Terminal Concentrator
help
u
ak Stud
y
(
ina terminal
d
his concentrator, you can get online
t
After you connect directly
into
u
l
e
a us
help as follows: am
k e to
g
s
annex:
nhangup
ban help
e
c
a
annex:
help
li
b
e
u
l
k
a erab
y
l
f
uIdentifying
s
d
n
and Resetting a Locked Port
b
a
a
r
t
g
an non
If a node crashes, it can leave a telnet session active that effectively locks
the port from further use. You can use the who command to identify which
port is locked, and then use the admin program to reset the locked port.
The command sequence is as follows:
annex: who
annex: su
Password:
annex# admin
Annex administration MICRO-XL-UX R7.0.1, 8 ports
admin : reset 6
admin : quit
annex# hangup
Terminal Concentrator
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
A-13
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Using the TC erase command can be dangerous. Use it only when you
have forgotten the superuser password. It returns all settings to their
default values. When the addr command is then run to give the TC its IP
address, the password will be set to this IP. For security reasons, the
erase command is available only through the port 1 interface. A typical
procedure is as follows:
monitor :: erase
1) EEPROM(i.e. Configuration information)
2) FLASH(i.e. Self boot image)
s
) ha
y
m
om
c
A-14
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Appendix B
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
B-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Multi-Initiator Overview
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Multi-Initiator Overview
This section applies only to SCSI storage devices and not to Fibre Channel
storage used for the multihost disks.
In a stand-alone server, the server node controls the SCSI bus activities
using the SCSI host adapter circuit connecting this server to a particular
SCSI bus. This SCSI host adapter circuit is referred to as the SCSI initiator.
This circuit initiates all bus activities for this SCSI bus. The default SCSI
address of SCSI host adapters in Sun systems is 7.
Cluster configurations share storage between multiple server nodes.
When the cluster storage consists of singled-ended or differential SCSI
devices, the configuration is referred to as multi-initiator SCSI. As this
terminology implies, more than one SCSI initiator exists on the SCSI bus.
s
) ha
y
m
om
c
m uide
ca sSCSI
The SCSI specification requires that each device on
have a
e
Gbus
t
@
unique SCSI address. (The host adapter is u
also
a device
on
the
SCSI bus.)
n
b
e
d
k
The default hardware configuration in
tu environment
yaa multi-initiator
(
S
results in a conflict because all SCSI
host
adapters
default to 7.
n
i
is
d
h
t
u
al use
m
To resolve this conflict,
on each
SCSI bus leave one of the SCSI host
ka address
toof
g
e
adapters with the
SCSI
7, and set the other host adapters to
n ens
a
b
unused SCSI
Proper planning dictates that these unused
a addresses.
lic both
b
e
SCSI
addresses
include
currently and eventually unused addresses.
u
l
k
b
a
a
l yAn example
er of addresses unused in the future is the addition of storage
f
u
s
d
by
installing
new drives into empty drive slots. In most configurations,
b tran
a
- the available SCSI address for a second host adapter is 6.
ang non
ab
B-2
You can change the selected SCSI addresses for these host adapters by
setting the scsi-initiator-id OpenBoot PROM property. You can set
this property globally for a node or on a per host adapter basis.
Instructions for setting a unique scsi-initiator-id for each SCSI host
adapter are included in the chapter for each disk enclosure in Sun
Cluster Hardware Guides.
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Ensure that each device in the SCSI chain has a unique SCSI address.
The default SCSI address for host adapters is 7. Reserve SCSI address
7 for one host adapter in the SCSI chain. This procedure refers to the
host adapter you choose for SCSI address 7 as the host adapter on
the second node. To avoid conflicts, in step 7 you change the
scsi-initiator-id of the remaining host adapter in the SCSI chain
to an available SCSI address. This procedure refers to the host
adapter with an available SCSI address as the host adapter on the
first node. Depending on the device and configuration settings of the
device, either SCSI address 6 or 8 is usually available.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
Caution Even k
though
a a tslot
o in the device might not be in use, you
g
e
should avoid
setting
scsi-initiator-id
for the first node to the SCSI
n ens
a
b
address
a for thatlicdisk slot. This precaution minimizes future complications
b
u
leadditional disk drives.
if you install
k
b
a
a
l y sfer
u
d
more information, refer to OpenBoot 3.x Command Reference Manual
ab -tranFor
g
and
the labels inside the storage device.
n
n
o
a
n
ab
2.
Install the host adapters in the nodes that will be connected to the
device.
Connect the cables to the device, as shown in Figure B-1 on page B-4.
B-3
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Make sure that the entire SCSI bus length to each device is less than
6 meters. This measurement includes the cables to both nodes, as
well as the bus length internal to each device, node, and host
adapter. Refer to the documentation that shipped with the device for
other restrictions regarding SCSI operation.
Node 1
Host Adapter A
Host Adapter B
Node 2
Host adapter B
Host Adapter A
SCSI IN
9-14
1-6
SCSI IN
IN
9-14
1-6
IN
s
) ha
y
m
m
o
c
SCSI OUT
SCSI OUT
e
m
d
s
i
ec2 t Gu
Enclosure 1
Enclosure
@
b den
u
k
a Stu
SCSI (y
n
cables
di e this
u
l
a us
m
a
Figure B-1 Example
of
a
Sun
MultiPack Desktop Array
k Mirrored
toStorEdge
g
e
Enclosure
Pair
ban licens
a
b
u
le AC power cord for each device of the pair to a different
k
4.
Connect
the
b
a
a
l y spower
er source.
f
u
d
ab -tr5.an Without allowing the node to boot, power on the first node. If
g
n non
a
necessary, abort the system to continue with OpenBoot PROM
b
a
OUT
OUT
Monitor tasks.
6.
7.
B-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ok nvstore
ok
9.
B-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
13. Continue with the Solaris OS, Sun Cluster software, and
volume
m
o
c
s
) ha
B-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Ensure that each device in the SCSI chain has a unique SCSI address.
The default SCSI address for host adapters is 7. Reserve SCSI
address 7 for one host adapter in the SCSI chain. This procedure
refers to the host adapter you choose for SCSI address 7 as the host
adapter on the second node. To avoid conflicts, in step 7 you change
the scsi-initiator-id of the remaining host adapter in the SCSI
chain to an available SCSI address. This procedure refers to the host
adapter with an available SCSI address as the host adapter on the
first node. SCSI address 6 is usually available.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
l
edevice might not be in use, you should
aslot
s
m
u
Note Even though
a
in
the
a
kscsi-initiator-id
to
avoid setting
the
for the first node to the SCSI
g
e
nthat disk
s This precaution
a
n
b
address
for
slot.
minimizes future complications
e
c
a
i
l
b
ifuyou install
leadditional disk drives.
k
b
a
a
r
l y For
emore
f
u
s
d
information, refer to OpenBoot 3.x Command Reference Manual
b tranand the labels
a
inside the storage device.
g onn
a
n
ab
2.
Install the host adapters in the node that will be connected to the
array.
For the procedure on installing host adapters, refer to the
documentation that shipped with your nodes.
3.
B-7
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Make sure that the entire bus length connected to each array is less
than 25 meters. This measurement includes the cables to both nodes,
as well as the bus length internal to each array, node, and the host
adapter.
Node 1
Host Adapter A
Host Adapter B
Node 2
Host Adapter B
Host Adapter A
Disk array 1
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ud Mirrored Pair
akD1000
tArray
y
(
S
Figure B-2 Example of a Sun StorEdge
in this
d
u
al cordufor
seeach array of the pair to a different
m
4. Connect the ACa
power
k e to
g
power source.
an cens
b
a
5. Power
b onlethelifirst node and the arrays.
u
k
a Find
athebpaths to the host adapters.
6.
r
y
l
e
f
bdu transok show-disks
a
g onn
Identify and record the two controllers that will be connected to the
a
n
ab
storage devices and record these paths. Use this information to
Disk array 2
B-8
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
ok nvquit
ok
9.
B-9
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
t and volume
@software,
13. Continue with the Solaris OS, Sun Cluster
n
b
e
u
k tud
management software installationatasks.
y
(
n this S
i
d
lu serefer to Sun Cluster 3.1 Installation
For software installation procedures,
a
Guide.
am to u
k
ng ense
a
b
a
lic
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
a
no
ab
B-10
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
Table B-1 and Table B-2 on page B-12 list useful nvramrcoeditor
m and
c
nvedit
nvedit keystroke commands, respectively. For an m
entire list of
e
d
s
i
c OpenBoot
editor and nvedit keystroke commands, refereto
u 3.x
G
t
@
Command Reference Manual.
b den
u
k
ya Stu
(
Table B-1 The nvramrc Editor
Commands
n
di e this
u
l
a us
Command Description
m
a
k e to
g
nvedit an Enters
nsthe nvramc editor. If the data remains in the
b ltemporary
e
c
a
buffer from a previous nvedit session,
i
b
e
u
l
resumes
editing
previous contents. Otherwise, reads the
k
b
a
a
r
y
contents of nvramrc into the temporary buffer and begin
ul nsfe
d
b
editing it. This command works on a buffer, and you can
a
a
r
t
g
save the contents of this buffer by using the nvstore
an non
ab
command.
nvstore
nvquit
nvrecover
nvrun
B-11
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Description
^A
^B
^C
^F
^K
^L
s
) ha
y
m
^N
Moves to the next line of the nvramrc editing buffer
om
c
m stays
^O
Inserts a new line at the cursor positionsand
idonethe
c
u
e
G
current line
t
@
n
b
de editing buffer
kofuthe nvramrc
^P
Moves to the previous y
line
u
a
t
( is S
n line
i
^R
Replaces the current
d
lu se th
a
m tocharacter
u
Delete
Deletes
aprevious
k
ng eannew
se line at the cursor position and advances to
Return baInserts
a thelnext
ic line
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
tra
g
n
n
a
no
ab
B-12
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Appendix C
Quorum Server
This appendix describes basic operation of the quorum server software.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
C-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
The actual quorum server daemon, /usr/cluster/lib/sc/scqsd
e
csm Gserver,
uid
The utility to start, stop, query, and clear theequorum
tclqs)
@ name
n
/usr/cluster/bin/clquorumserver
(short
b
e
u
ak Stud
y
A single configuration file, /etc/scqsd/scqsd.conf
(
in this
d
u
An rc script (Solaris 9)
SMF service
10) to automatically
alordaemon
seat boot(Solaris
m
u
start the quorumaserver
time.
k e to
g
ban licens
a
NoteubRegardless
le of the OS that the quorum server is running on, you
k
b
a
a
always
use
the
y fer clquorumserver (clqs) command if you need to start and
l
u
nsthe daemon manually. This includes starting the daemon the first
bd trstop
a
a
- time after installation, without having to reboot. See page 4.
ang non
The package installation will install:
ab
C-2
9000/tcp
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
You can change the port number or data directory for the single instance,
or you could add more lines representing more daemons. There isnt a
particular practical reason to run multiple daemons, since the single
instance can handle as many clusters as you like. If you do run multiple
daemons, each must have a different port and directory. You can
optionally associate each instance with a text identifier (using -i
textid). If there is no text identifier (and there is none in the default line
already in the configuration file), the server instance will be identified by
its port number.
Quorum Server
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
C-3
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
0:00 /usr/cluster/lib/sc/scqsd
0:00 /usr/cluster/lib/sc/scqsd
as
h
Normally, you will not need to run these commands very much, since
the
)
y
m
boot/shutdown scripts will do the job for you.
om
c
m uide
csSide)
Displaying Quorum Server Data (on the Server
e
G
t
@
n
b
u the uquorum
de server machine)
k(on
The following is an example of querying
a
t
y
S can happily add access to
the state of the quorum server. Once
you
n (again,
s
i
i
d
h
t as you like:
the quorum server from as many
lu clusters
e
a
s
am to u
# clqs show
k
g ===
n9000
se
=== Quorum Server on port
a
n
b
e
a
lic
b
e
u
l
--- Cluster aorangecat
k rab(id 0x4480DAF7) Reservation --y
dul ransfe
Nodeab
ID:
2
t
g
0x4480daf700000002
n Reservation
on key:
a
n
b
a
---
Node ID:
Registration key:
1
0x4480daf700000001
Node ID:
Registration key:
2
0x4480daf700000002
---
Node ID:
Reservation key:
---
C-4
1
0x448de82f00000001
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
---
Node ID:
Reservation key:
---
1
0x448de82f00000001
1
0x448e2ae600000001
Node ID:
Registration key:
1
0x448e2ae600000001
Node ID:
Registration key:
2
0x448e2ae600000002
s
) ha
y
m
m
o
c
are
For each cluster, the command displays the registrants
(nodesethat
m
d
s
i
c Gu holder. The
currently not fenced out of the cluster) and theereservation
t to ever perform
@
reservation holder would be equivalent to
the last node
n
b
e
u
any quorum fencing in the cluster;yit
aisk really
tuthedregistrants that are more
(
S
interesting.
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
ab
Quorum Server
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
C-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent that is actually
b
Note Be careful not to clear quorum server
information
u
ud out a JBOD disk
ak Styanking
still in use. It is exactly equivalent to(y
physically
s words, the cluster itself
in tInhiother
device, which is a quorum disk
device.
d
u
l
e
using the quorum server as
a a quorum
s device will not find out until it is
m
u
a
too late!
o
k et
g
n
ba licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
an non
ab
C-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Appendix D
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
D-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Role
A role is like a user, except for the following:
You can not log in to it directly. You must log in as a user and then
use the su command to switch to the role.
s
) ha
y
m
om
c
e
A role is meant to replace an old-style privileged user,
dthe
smwhere
i
c
u
e
intention is that multiple administrators assume this identity
G when they
t
@
n
b
need to do privileged tasks. The advantage
is
that
you
must
log in as a
u ude
k
a
t
regular user and also know the password
for the role and be allowed to
n (y this S
i
assume the role to assume the d
identity.
lu se
a
uand shadow databases just like regular
athempasswd
o
Roles have entries in
k
t
ngroles
seassigned one of the pf-shells so they can run
users. Most often,
are
a
n
b
e
acommands,
privileged
lic but this is not a requirement.
b
e
u
l
k rab
a
y
ul nsfe
d
Authorization
b
a
tra
g
n
n
a
no
ab
D-2
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Assigning Authorizations
Authorizations can be assigned to users or roles, or they can be part of
rights profiles, which are collections of authorizations and command
privileges. The rights profiles could then be assigned to users or roles,
rather than the individual authorizations.
Command Privileges
Command privliges have been enhanced in the Solaris 10 OS:
s
) ha
y
m
om with a
Command privileges allow users or roles to run certainccommands
e is
different real user ID (uid), effective user ID (euid),
smor both.
idThis
c
u
e
G bit, this RBAC
similar to turning the setuid bit on. But unlike
the setuid
t
@
n
b
mechanism lets you restrict which users
deare allowed to obtain
ku or roles
u
a
t
y
command privileges.
n ( this S
i
d
lu se
a
Starting With Solaris
am 10toOSu
k
ng enthe
seSolaris 9 command privileges feature to support
baaugments
Solarisa10
lic
b
fine
grainedle
privileges over a specific command. For example, a user can be
u
kgiven rthe
a
abprivilege to run a specific command and have root-like ability to
y
l
e
f
s all files regardless of their permissions, but still be denied the
bdu tranread
a
- privilege to write all files.
ang non
ab
Profiles
Profiles are collections of authorizations and command privileges.
Authorizations can be assigned directly to a user or role or through
inclusion in a profile assigned to the user or role.
Command privileges can be assigned only to a user or role through its
inclusion in a profile.
D-3
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
y
m
om
c
ide
csmprivileges
u
Figure 12-2 shows the relationships between command
e
G
authorizations, profiles, users, and roles. ub@ ent
ak Stud
y
(
in su this
users
roles
d
u
l
e
a
am to us
k
ng ense
a
b
profiles
a
lic
b
e
u
l
k rab
a
y
ul nsfe
d
b
a
auths
command privs
tra
g
n
n
o
a
n
s
) ha
RBAC Relationships
ab
D-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
solaris.cluster.admin
solaris.cluster.modify
s
) ha
ab
c e
m
s
c Gauthorization
uid
e
The Sun Cluster 3.1 environment had a finer granularity
t but not required:
@
n
b
system. It is still recognized (for backward
compatibility)
e
u
ak Stud
y
(
solaris.cluster.system.{read,
in this admin, modify}
d
u
e denotes three separate authorizations:
This, just for easeaofl notation,
s
m
u
ka e to
solaris.cluster.system.read
g
ban licens
solaris.cluster.system.admin
a
b
u
le
k
b
solaris.cluster.system.modify
a
a
l y sfer
u
d
b tran solaris.cluster.node.{read,admin,modify}
a
solaris.cluster.quorum.{read.admin.modify}
ang non
solaris.cluster.device.{read,admin,modify}
solaris.cluster.transport.{read,admin, modify}
solaris.cluster.resource.{read,admin,modify}
solaris.cluster.network.{read,admin,modify}
solaris.cluster.install
solaris.cluster.appinstall
solaris.cluster.gui
D-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The following example assigns Sun Cluster admin privileges (but not
modify privileges) directly to a user (rather than through a profile).
# usermod -A solaris.cluster.admin youzer
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
D-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
Appendix E
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
E-1
Copyright 2009 Sun Microsystems, Inc. All Rights Reserved. Sun Services, Revision C
LDom Support
LDom Support
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
LDoms are supported as Sun Cluster nodes, beginning with Sun Cluster
3.2 2/08 (Update 1). The following qualifications apply:
You can mix and match LDoms and physical machines (or hardware
domains) in the same cluster.
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
s
) ha
E-2
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
Figure E-1
E-3
Public Network
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
IPMP Groups
s
) ha
IPMP groups must be configured in the guest LDom that is serving as the
cluster node, regardless of whether groups are configured in the I/O
domain. The guest domains IPMP group is independent of any that you
configure in an I/O domain. IP address failover (LogicalHostname)
works only when IPMP is configured on the public network of the cluster
node.
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
Cluster Interconnect
in this
d
u
al use
m
You must configurektwo
domain physical adapters as virtual
a separate
to I/O
g
e
switches bridging
the
Sun
Cluster
node
(guest LDom) to the private
n ens
a
b
network. a
There is aicspecial flag mode=sc for these switches to indicate
lof traffic.
b
e
priority
handling
u
l
k
a erab
y
l
f
u Thenfollowing
s
d
example is run in the control domain. The name primary is
b
a domain name
a
r
t
the
for the I/O domain itself (which happens to be the
g
n
n
o
a
n
control domain). A virtual switch is added and then a virtual adapter is
ab
provided for the switch for the guest domain.
# ldm list
NAME STATE
FLAGS
CONS
VCPU MEMORY
UTIL UPTIME
primary active -n-cv- SP
4
4G
0.4% 12h 40m
myLDom1 active -n---- 5000
4
2G
0.2% 8h 3m
# ldm add-vsw net-dev=e1000g2 mode=sc privnet1 primary
# ldm add-vnet vnet2 privnet1 myLDom1
The guest domain will see an adapter named vnet2 which can be
configured as a cluster transport.
E-4
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
The I/O domain can provide almost any kind of local virtual disk as the
boot disk for the guest domain (Sun Cluster node):
file
zvol
disk partition
Just about the only gotcha, which this author came about unfortunately
and accidentally, is that if the guest domain is provided physical disk(s),
and both the I/O domain and guest domain use ZFS-root, make sure to
name the guests root pool differently from the I/O domain. If the names
conflict the I/O domain will be confused about which disks are in its root
pool when it boots. The guest domain will not be confused (it can only see
the disks/virtual disks that it has been provided), but its boot disk can
already be corrupted by the I/O domain if there is a ZFS pool name
conflict.
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
e Devices for a Guest LDom
al Data)
s
Shared Storage (Cluster
m
u
ka e to
g
For shared
andatacdevices
ns you must map entire physical disks/LUNs into
b
e
a
li This is the only way that quorum and data fencing is
thebguest domain.
e
u
l
k
a goingertoabwork properly. Do not create any other kind of virtual disk
y
l
f for Sun Cluster data:
u ndevice
s
d
b
a
tra # ldm add-vdsdev /dev/rdsk/c2t2d0 clustdata1@primary-vds0
g
n
n
no
aba
The guest domain (cluster node) will now have access to the disk.
These disks are given names such as c0d1 in the guest domain. As cluster
disks, they will work just fine. They will be assigned DID numbers just
like any other disk, be usable as quorum devices, and so on.
E-5
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
m
o
c
E-6
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
aass
h
You must use export different physical data disks to LDoms acting
)
y
m
nodes in different clusters.
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
E-7
Unauthorized reproduction or distribution prohibited Copyright 2010, Oracle and/or its affiliates
s
) ha
y
m
om
c
csm Guide
e
@ ent
b
u
ak Stud
y
(
in this
d
u
al use
m
ka e to
g
ban licens
a
b
u
le
k
b
a
a
l y sfer
u
d
ab -tran
g
n non
a
b
a
E-8