background image

Contents

7

no

vd

ocx 

(e

n)

  

13

 Ma
y 20

09

6.2.3

Adding Search-and-Replace Values to the Resource Replacement Script. . . . . . . .  74

6.2.4

Adding SAN Management Configuration Information . . . . . . . . . . . . . . . . . . . . . . . .  75

6.2.5

Verifying BCC Administrator User Trustee Rights and Credentials . . . . . . . . . . . . . .  78

6.3

BCC-Enabling Cluster Resources  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  78
6.3.1

Enabling a Cluster Resource for Business Continuity . . . . . . . . . . . . . . . . . . . . . . . .  78

6.3.2

Adding Resource Script Search-and-Replace Values . . . . . . . . . . . . . . . . . . . . . . . .  79

6.3.3

Selecting Peer Clusters for the Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  80

6.3.4

Adding SAN Array Mapping Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  81

7 Managing a Business Contiuity Cluster

83

7.1

Migrating a Cluster Resource to a Peer Cluster. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  83
7.1.1

Understanding BCC Resource Migration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  83

7.1.2

Migrating Cluster Resources between Clusters. . . . . . . . . . . . . . . . . . . . . . . . . . . . .  84

7.2

Changing Cluster Peer Credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

7.3

Viewing the Current Status of a Business Continuity Cluster. . . . . . . . . . . . . . . . . . . . . . . . . .  85
7.3.1

Using iManager to View the Cluster Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  85

7.3.2

Using Console Commands to View the Cluster Status . . . . . . . . . . . . . . . . . . . . . . .  86

7.4

Generating a Cluster Report  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  86

7.5

Disabling Business Continuity Cluster Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  86

7.6

Resolving Business Continuity Cluster Failures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  87
7.6.1

SAN-Based Mirroring Failure Types and Responses  . . . . . . . . . . . . . . . . . . . . . . . .  88

7.6.2

Host-Based Mirroring Failure Types and Responses  . . . . . . . . . . . . . . . . . . . . . . . .  89

8 Virtual IP Addresses

93

8.1

Virtual IP Address Definitions and Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  93
8.1.1

Definitions  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  93

8.1.2

Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

8.2

Virtual IP Address Benefits  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  94
8.2.1

High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

8.2.2

Unlimited Mobility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  97

8.2.3

Support for Host Mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  97

8.2.4

Source Address Selection for Outbound Connections  . . . . . . . . . . . . . . . . . . . . . . .  97

8.3

Reducing the Consumption of Additional IP Addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  98

8.4

Configuring Virtual IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
8.4.1

Displaying Bound Virtual IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  100

9 Troubleshooting Business Continuity Clustering 1.1

101

9.1

Cluster Connection States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  101

9.2

Driver Ports  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  103

9.3

Excluded Users  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  103

9.4

Security Equivalent User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  104

9.5

Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  105

9.6

Clusters Cannot Communicate  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  105

9.7

BCC Startup Flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  106

9.8

Problems with Installing BCC on NetWare. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  106

9.9

Identity Manager Drivers for Cluster Synchronization Do Not Start . . . . . . . . . . . . . . . . . . . .  106

9.10 Identity Manager Drivers Do Not Synchronize Objects from One Cluster to Another  . . . . . .  107
9.11 Tracing Identity Manager Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  108
9.12 Peer Cluster Communication Not Working. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  108
9.13 Administration of Peer Clusters Not Functional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  109
9.14 A Resource Does Not Migrate to a Peer Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  109
9.15 A Resource Cannot Be Brought Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  109

Summary of Contents for BUSINESS CONTINUITY CLUSTERING 1.1 SP2 - ADMINISTRATION

Page 1: ...w novell com novdocx en 13 May 2009 AUTHORIZED DOCUMENTATION BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 Business Continuity Clustering 1 1 SP2 August 14 2009 Administration Guide for NetWare...

Page 2: ...r re export to entities on the current U S export exclusion lists or to any embargoed or terrorist countries as specified in the U S export laws You agree to not use deliverables for prohibited nuclea...

Page 3: ...Trademarks For Novell Trademarks see the Novell Trademark and Service Mark list http www novell com company legal trademarks tmlist html Third Party Materials All third party trademarks are the proper...

Page 4: ...4 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Page 5: ...entity Manager 25 2 What s New for BCC 1 1 for NetWare 27 2 1 What s New for BCC 1 1 SP2 27 2 2 What s New for BCC 1 1 SP1 27 2 3 What s New for BCC 1 1 27 3 Planning a Business Continuity Cluster 29...

Page 6: ...and Configuring the Novell Business Continuity Clustering Software 50 4 4 1 Installing the BCC Engine 51 4 4 2 Installing the Identity Manager Templates 52 4 5 What s Next 53 5 Upgrading Business Cont...

Page 7: ...irroring Failure Types and Responses 88 7 6 2 Host Based Mirroring Failure Types and Responses 89 8 Virtual IP Addresses 93 8 1 Virtual IP Address Definitions and Characteristics 93 8 1 1 Definitions...

Page 8: ...0 10 4 Security Information for Dependent Products 120 A Console Commands for BCC 123 B Implementing a Multiple Tree BCC 127 B 1 Planning a Multiple Tree Solution 127 B 1 1 Cluster Synchronization 127...

Page 9: ...09 E 1 1 Console Commands for BCC 141 E 1 2 Installing Business Continuity Clustering 141 E 1 3 Upgrading Business Continuity Clustering for NetWare 142 E 2 April 28 2009 142 E 2 1 Converting BCC Clus...

Page 10: ...10 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Page 11: ...ltiple Tree BCC on page 127 Appendix C Setting Up Auto Failover on page 133 Appendix D Configuring Host Based File System Mirroring for NSS Pools on page 137 Audience This guide is intended for intend...

Page 12: ...tity Management Documentation Web site http www novell com documentation idm35 index html For the latest information about OES 2 SP1 for Linux and NetWare see the OES 2 SP1 Documentation Web site http...

Page 13: ...manual process that takes a great deal of planning and synchronizing Even configuration changes must be carefully planned and replicated One mistake and the redundant site is no longer able to effect...

Page 14: ...n page 14 Section 1 2 3 Stretch Clusters vs Cluster of Clusters on page 15 1 2 1 LAN Based versus Internet Based Applications Traditional LAN applications require a LAN infrastructure that must be rep...

Page 15: ...ng Storage Based Mirroring Geographic distance between sites Up to 10 km Can be up to and over 300 km The actual distance is limited only by the SAN hardware and media interconnects for your deploymen...

Page 16: ...mirrored between the sites Failure of the site interconnect can result in LUNs becoming primary at both locations split brain problem if host based mirroring is used In the stretch cluster architectu...

Page 17: ...tion The SBD partition is not mirrored across the sites which minimizes the chance for a split brain problem occurring when using host based mirroring For information about using mirroring solutions f...

Page 18: ...t be in a single IP subnet Because the subnet spans multiple locations you must ensure that your switches handle gratuitous ARP Address Resolution Protocol IP addresses in a given cluster are in a sin...

Page 19: ...iple clusters multiple site fan out failover Failover requires additional configuration Cluster resource configurations Configured for a single cluster Configured for the primary cluster that hosts th...

Page 20: ...can be in different OUs in the same eDirectory tree or in different eDirectory trees IP addresses for each cluster can be on different IP subnets Cluster resources can fail over to separate clusters m...

Page 21: ...business continuity infrastructure Unlike competitive solutions that attempt to build stretch clusters BCC uses a cluster of clusters Each site has its own independent clusters and the clusters in eac...

Page 22: ...lustering deployment scenarios that can be used to achieve the desired level of disaster recovery Three possible scenarios include Section 1 4 1 Two Site Business Continuity Cluster Solution on page 2...

Page 23: ...ing up to four sites Each cluster can support up to 32 nodes Services and applications can do fan out failover between sites Replication of data blocks is typically done by SAN hardware but it can be...

Page 24: ...es to allow the business to continue Internet based applications allow employees to work from any place that offers an Internet connection including homes and hotels 1 4 3 Low Cost Business Continuity...

Page 25: ...vell Cluster Services It is also BCC enabled so that it can be migrated and failed over between nodes in different peer clusters 1 5 3 Landing Zone The landing zone is an eDirectory context in which t...

Page 26: ...26 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Page 27: ...for 64 bit architectures Support for Novell eDirectoryTM 8 8 Support for Novell iManager 2 7 2 2 2 What s New for BCC 1 1 SP1 Business Continuity Clustering 1 1 SP1 for NetWare 6 5 SP6 provides the fo...

Page 28: ...uide for NetWare 6 5 SP8 novdocx en 13 May 2009 Automatic failover No need for administrator intervention Based on a configurable minimum number of nodes or a percentage of nodes Extensible monitoring...

Page 29: ...inue in the event of a disaster Design the infrastructure based on your business needs Determine your design criteria by asking and answering the following questions What are the key services that dri...

Page 30: ...ed Cluster Resources on page 31 3 3 1 VLAN Use a dedicated VLAN virtual local area network for each cluster The cluster protocol is non routable so you cannot direct communications to specific IP addr...

Page 31: ...the IP address and the name of the virtual server for the cluster resource never need to change The IP address of an inbound cluster resource is transformed to use an IP address in the same subnet of...

Page 32: ...ing host based mirroring or storage based mirroring Storage based mirroring is recommended When using host based mirroring make sure that the mirrored partitions are accessible for the nodes of only o...

Page 33: ...enabled its configuration is automatically synchronized with every peer cluster in the business continuity cluster by using customized Identity Manager drivers The following eDirectory objects are cr...

Page 34: ...ad use names that are independent of the clusters and that are unique across all peer clusters For example replace the clustername with something static such as BCC Cluster Resource poolname_SERVER Cl...

Page 35: ...ity cluster the volume IDs for the existing shared volumes might also share the same volume IDs To resolve this conflict manually edit the load script for each volume that has been enabled for busines...

Page 36: ...36 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Page 37: ...software Section 4 1 1 Business Continuity Clustering Licensing on page 38 Section 4 1 2 Business Continuity Cluster Component Locations on page 38 Section 4 1 3 NetWare 6 5 SP8 OES 2 SP1 NetWare on...

Page 38: ...wing abbreviations BCC Novell Business Continuity Clustering 1 1 SP2 for NetWare NCS Novell Cluster Services 1 8 5 for NetWare IDM Identity Manager 3 5 1 Bundle Edition eDir Novell eDirectory 8 8 NW 6...

Page 39: ...ster Names on page 39 Storage on page 39 eDirectory on page 39 Peer Cluster Credentials on page 40 Cluster Names Each cluster must have a unique name even if the clusters reside in different Novell eD...

Page 40: ...with a backslash when you enter credentials Rights Needed for Individual Cluster Management The BCC Administrator user is not automatically assigned the rights necessary to manage all aspects of each...

Page 41: ...ration Guide 4 1 7 Identity Manager 3 5 1 Bundle Edition The Identity Manager 3 5 1 Bundle Edition is required for synchronizing the configuration of the peer clusters in your business continuity clus...

Page 42: ...ts that will be synchronized between clusters This does not apply to all eDirectory objects in the tree For information about the eDirectory full replica requirements see Section 4 1 5 Novell eDirecto...

Page 43: ...s release of Business Continuity Clustering You must install the Clusters plug in and the Storage Management plug in storagemgmt npm Other storage related plug ins are Novell Storage ServicesTM NSS ns...

Page 44: ...munications If you are using a firewall the port must be opened for CIMOM communications Beginning in OES 2 NetWare 6 5 SP7 the Clusters plug in and all other storage related plug ins for iManager req...

Page 45: ...d File System Mirroring for NSS Pools on page 137 For information about storage based mirroring consult the vendor for your storage system or see the vendor documentation 4 1 14 LUN Masking for Shared...

Page 46: ...other than one of iManager s supported languages To avoid problems in your Web browser click Tools Options Languages then set the first language preference in the list to a supported language Refer to...

Page 47: ...e 6 5 SP8 go to the Novell Business Continuity Clustering download site http download novell com Download buildid bdkmSxRgKVk 4 3 Configuring a BCC Administrator User The BCC Administrator user is a t...

Page 48: ...rite check boxes are selected for the All Attributes Rights property 7 Click Done to save your changes 8 Repeat Step 3 through Step 7 for the other clusters in your business continuity cluster 4 3 3 A...

Page 49: ...ould start with the node that has the highest IP address first and work down in IP address order This speeds the rate at which the Novell Cluster Services master node acquires the change 4 3 4 Assigni...

Page 50: ...the highest IP address first and work down in IP address order This speeds the rate at which the Novell Cluster Services master node acquires the change 4 4 Installing and Configuring the Novell Busi...

Page 51: ...e your business continuity cluster You must have previously installed iManager on the server where you plan to install the templates Identity Manager Templates for NetWare iManager Servers Installs th...

Page 52: ...while the other servers in the cluster continue running Then another server is restarted and then another until all servers in the cluster have been restarted This lets you keep your cluster up and r...

Page 53: ...he fully distinguished name for the server where you want to install the templates Then click Next If you don t know the fully distinguished name for the server you can browse and select it Windows iM...

Page 54: ...54 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Page 55: ...Section 5 4 Upgrading Clusters from BCC 1 1 SP1 to SP2 for NetWare on page 63 5 1 Guidelines for Upgrading Use the guidelines in this section to upgrade clusters one peer cluster at a time Section 5...

Page 56: ...upgrade from BCC 1 0 to BCC 1 1 SP2 is to disable BCC on the peer clusters upgrade to NetWare 6 5 SP8 re install BCC 1 1 SP2 and re configure BCC for the clusters This approach leaves you without the...

Page 57: ...ts 9b Upgrade Identity Manager from version 2 x to 3 51 IMPORTANT Do not start the drivers yet The upgrade updates the Identity Manager software and its plug ins for iManager 2 7 2 on the same node 9c...

Page 58: ...ing the BCC Cluster from 1 0 to 1 1 SP1 on page 58 Section 5 3 2 Upgrading the BCC Cluster from 1 1 SP1 to 1 1 SP2 on page 60 5 3 1 Upgrading the BCC Cluster from 1 0 to 1 1 SP1 Perform a rolling clus...

Page 59: ...compliant For installation instructions for BCC 1 1 SP1 see Running the Business Continuity Cluster Installation Program http www novell com documentation bcc bcc_administration_nw data ht05s5vv html...

Page 60: ...Section 4 3 Configuring a BCC Administrator User on page 47 10 Verify that Novell Cluster Services and BCC 1 1 SP1 appear to be functioning correctly by performing the following tests 10a Create a new...

Page 61: ...P1 Readme http www novell com documentation oes2 oes_readme data readme html NOTE The DirXML plug ins will be replaced by Identity Manager 3 5 1 plug ins in Step 5 on page 62 3c1 In iManager uninstall...

Page 62: ...7 for each peer cluster 9 Verify that Novell Cluster Services and Business Continuity Clustering appear to be functioning correctly by migrating a BCC enabled resource between peer clusters 10 Create...

Page 63: ...in the Identity Manager node of every peer cluster in the business continuity cluster 2 Issue the cluster leave command on one node in the cluster 3 Upgrade NetWare 6 5 from version SP6 to SP8 and ap...

Page 64: ...usters role 5 Repeat Step 2 through Step 4g for each node in the cluster 6 Issue the cluster join command on each node in the cluster 7 On each node in the cluster upgrade Business Continuity Clusteri...

Page 65: ...Manager see the Identity Manager 3 51 Installation Guide http www novell com documentation idm35 install data front html 1 Upgrade Identity Manager to version 3 51 IMPORTANT Do not start the drivers y...

Page 66: ...pool resource BCC migrate it between peer clusters and verify that it migrates correctly 2 Make a load script change for example add a space character and save the change to an existing BCC resource...

Page 67: ...emplate is used to configure drivers when the clusters in your business continuity cluster are in different eDirectoryTM trees You might also need to set up User Object Synchronization drivers between...

Page 68: ...Each field contains an example of the type of information that should go into the field Descriptions of the information required are also included with each field Driver name Specify a unique name for...

Page 69: ...have all server objects in one container The container where the cluster pool and volume objects are placed when they are synchronized to this cluster This container is referred to as the landing zon...

Page 70: ...paces beginning or end in the specified context and do not use the cn DriverName ou OrganizationalUnitName o OrganizationName format 5 Specify the requested driver information for the driver in the ot...

Page 71: ...Identity Manager synchronization loops Identity Manager synchronization loops can cause excessive network traffic and slow server communication and performance For example in a three cluster business...

Page 72: ...our BCC synchronization scenario 1 In the Connections section of the Business Continuity Cluster Properties page select one or more peer clusters that you want a cluster to synchronize to then click E...

Page 73: ...is http server_ip_address nps iManager html Replace server_ip_address with the IP address or DNS name of the server that has iManager and the Identity Manager preconfigured templates for iManager inst...

Page 74: ...xt for the user For example use bccadmin instead of bccadmin prv novell Rather than using the Admin user to administer your BCC you should consider creating another user with sufficient rights to the...

Page 75: ...92 168 1 3 and 192 168 1 4 addresses respectively IMPORTANT Make sure to use a trailing dot in the search and replace value If a trailing dot is not used 10 1 1 could be replaced with an IP value such...

Page 76: ...oad and unload scripts 7a Under BCC Load Scripts click New to bring up a page that lets you create a script to promote mirrored LUNs on a cluster You can also delete a script edit a script by clicking...

Page 77: ...lds to become active on this page Synchronous If this check box is not selected multiple scripts can be run concurrently Selecting the box causes scripts to run individually one after another Most SAN...

Page 78: ...g load and unload scripts search and replace data specific to the resource and selecting peer clusters for the resource IMPORTANT In a business continuity cluster you should have only one NSS pool for...

Page 79: ...r_ip_address with the IP address or DNS name of the server that has iManager and the Identity Manager preconfigured templates for iManager installed 2b Specify your username and password specify the t...

Page 80: ...d replace values The following links provide information on regular expressions and wildcard characters Regular Expressions http www opengroup org onlinepubs 007908799 xbd re html Regular Expressions...

Page 81: ...u are creating a new cluster pool resource click Next then add the SAN management configuration information For information see Adding SAN Management Configuration Information on page 75 If this is an...

Page 82: ...82 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Page 83: ...er feature that fails over resources between peer clusters we recommend that you manually migrate cluster resources between the peer clusters instead For information about configuring and using automa...

Page 84: ...s iManager html Replace server_ip_address with the IP address or DNS name of the server that has iManager and the Identity Manager preconfigured templates for iManager installed 2 Specify your usernam...

Page 85: ...tory trees and you specify a common username and password each eDirectory tree in the business continuity cluster must have the same username and password 7 3 Viewing the Current Status of a Business...

Page 86: ...and select one 5 Click the Run Report button 7 5 Disabling Business Continuity Cluster Resources After enabling a resource for business continuity it is possible to disable it You might want to disabl...

Page 87: ...rimary peer cluster 7a Click the Preferred Nodes tab 7b From the Assigned Nodes list select the servers in the peer clusters you want to unassign from the resource then click the left arrow button to...

Page 88: ...term There should be an initial response and then a long term response based on whether the failure is transient or long term The initial response is to restore the cluster to normal operations The lo...

Page 89: ...AN Fails but Secondary Cluster Does Not When the secondary SAN fails the secondary cluster also fails Bring the secondary SAN back up and follow your SAN vendor s instructions to remirror Then bring t...

Page 90: ...on a primary cluster server to ensure that remirroring takes place When you bring the secondary cluster back up the LUNs are still in a secondary state to the primary SAN Primary SAN Fails but Primar...

Page 91: ...able to access servers in the primary cluster but can possibly access servers in the secondary cluster If both clusters are up nothing additional is required An error is displayed Wait for connectivit...

Page 92: ...92 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Page 93: ...IP addresses and virtual NICs behave like physical IP addresses and physical NICs and they are similarly configured by using either the INETCFG server based utility or the Novell Remote Manager Web ba...

Page 94: ...ver NIC failures This assumes that the server is running a routing protocol and is advertising its internal virtual IP network which only it knows about and can reach to other network nodes Physical I...

Page 95: ...o advertise reachability to the 1 0 0 0 FF 0 0 0 network and the client would continue to forward packets to Router 1 Thes undeliverable packets would ultimately be dropped by Router 1 Therefore in sp...

Page 96: ...irectly follow from the highly reachable nature of virtual IP addresses They completely and uniquely identify a multihomed server A multihomed server with a virtual IP address no longer needs to carry...

Page 97: ...to a different IP network If the service is hosted on a physical IP address accommodating these changes involves rehosting the service on a different IP address pulled out from the new network and ap...

Page 98: ...recommend using a host mask To understand why consider the fact that each service in a clustered environment must have its own unique IP address or a unique virtual IP address Furthermore consider th...

Page 99: ...er resource load script for a standard NetWare volume called HOMES This example uses host masks and assumes the virtual board has been named VNIC Notice that the command to add a secondary IP address...

Page 100: ...ying Bound Virtual IP Addresses To verify that a virtual IP address is bound enter display secondary ipaddress at the server console of the cluster server where the virtual IP address is assigned This...

Page 101: ...2 Peer Cluster Communication Not Working on page 108 Section 9 13 Administration of Peer Clusters Not Functional on page 109 Section 9 14 A Resource Does Not Migrate to a Peer Cluster on page 109 Sect...

Page 102: ...r Enter the correct username and password that this cluster will use to connect to the selected peer cluster Cannot Connect 3 This cluster cannot connect to the selected peer cluster Ping the peer clu...

Page 103: ...Sync icon 6 Click the red or blue icon again then click the Identity Manager tab if it is not already selected 7 In the Authentication context field view and if necessary change the port numbers next...

Page 104: ...using the eDirectory Admin user to administer your BCC you should consider creating another user with sufficient rights to the appropriate contexts in your eDirectory tree to manage your BCC The IDM D...

Page 105: ...tor user from filling the sys volume by copying an excessive number of files to the sys tmp directory 9 5 Certificates If SSL certificates are not present or have not been created Identity Manager dri...

Page 106: ...ee during the BCC installation To resolve this and similar problems rename the c program files common files novell directory on the Windows machine where the installation is being run and restart the...

Page 107: ...changes the order of the lines within the autoexec ncf file 9 10 Identity Manager Drivers Do Not Synchronize Objects from One Cluster to Another If objects are not synchronizing between clusters the p...

Page 108: ...1f for the Identity Manager XSLTraceLevel attribute also setting the trace level to 4 1h Repeat Step 1d through Step 1g for the other driver sets you want to trace 2 At the NetWare server console load...

Page 109: ...A Resource Cannot Be Brought Online If you cannot bring a BCC enabled resource online it is possible the resource might be set as secondary If the NCS BCC State attribute is equal to 1 the resource i...

Page 110: ...idly Identity Manager merges all changes into one so if you quickly add a change and then delete it Identity Manager might view it as no change You should make a change and verify that the change has...

Page 111: ...irectory the attribute points to Clustered Volume Object Class NCS Volume Resource NCS NCP Server Virtual NCP Servers NCS Volumes All Volumes Virtual NCP Server Object Class NCP Server Resource Cluste...

Page 112: ...le still resolves to the old volume object and the map command fails Using a temporary environment variable has been tested and does not work For example set FOO HOME_DIRECTORY MAP u FOO Using a false...

Page 113: ...ait for a signal file w20 causes NSMI to wait 20 seconds before proceeding Failure to add the wait causes the temporary LDIF file to be deleted before ICE can read it This causes ICE to fail 9 24 BCC...

Page 114: ...2 Operation not supported 1013 Error obtaining lock on synchronization object 1014 Invalid credentials 1015 Error returned from the NICI API 1016 Cannot find peer cluster data 1017 Invalid BCC API ver...

Page 115: ...No Details Users are authenticated Yes Administrative users are authenticated via eDirectory Users are authorized Yes Users are authorized via eDirectory trustees Access to configuration information...

Page 116: ...ed or impact the security of BCC Table 10 2 BCC Security Configuration Settings Configuration Setting Possible Values Default Value Recommended Value for Best Security Inter cluster communications sch...

Page 117: ...trator user Any LUM enabled eDirectory User This is the user you specify when you are setting the BCC credentials The BCC Administrator user is not automatically assigned the rights necessary to manag...

Page 118: ...eout BCC CIM client connect timeout in seconds 15 seconds cimReceiveTimeout BCC CIM client receive timeout in seconds 30 seconds cimSendTimeout BCC CIM client send timeout in seconds 30 seconds idlePr...

Page 119: ...e address 10 1 1 10 address peer To disable SSL for inter cluster communication you would change the address attribute to specify http with the IP address as shown in the following example peer cluste...

Page 120: ...tilities SSH and any other type of access to these files Services that are used to send BCC data to other servers or e mail accounts or that protect BCC data should be examined periodically to ensure...

Page 121: ...o iSCSI Targets and Enabling and Configuring iSCSI Initiator Security in the OES 2 SP 1 iSCSI 1 1 3 for NetWare Administration Guide Novell Cluster Services for NetWare In the OES 2 SP2 Novell Cluster...

Page 122: ...122 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Page 123: ...Console Command Description cluster credentials cluster Lets you change the administrator username and password that this cluster uses to connect to the specified peer cluster The cluster you specify...

Page 124: ...esources Changes the state of all resources on this cluster to offline and secondary This is a recovery procedure that should be run when a cluster in a BCC is brought back into service You should run...

Page 125: ...Console Commands for BCC 125 novdocx en 13 May 2009 cluster refresh This command should not be used except under the direction of Novell Support Console Command Description...

Page 126: ...126 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Page 127: ...er Synchronization on page 127 Section B 1 2 User Synchronization on page 127 Section B 1 3 SSL Certificates for Drivers on page 128 B 1 1 Cluster Synchronization Creating the Cluster Synchronization...

Page 128: ...unidirectional Two certificates are required if the data flow for the driver is bidirectional one certificate for each direction For example create one SSL certificate for data flowing from TreeA to...

Page 129: ...n XML 8 Fill in the values on the wizard page as prompted then click Next Each field contains an example of the type of information that should go into the field Descriptions of the information requir...

Page 130: ...ing a new cluster to an existing business continuity cluster in a multiple tree BCC you must synchronize the BCC specific Identity Manager drivers for the Cluster and User objects If the BCC specific...

Page 131: ...r synchronization loop occurs when Cluster One is configured to synchronize with Cluster Two Cluster Two is configured to synchronize with Cluster Three and Cluster Three is configured to synchronize...

Page 132: ...continuity B 7 Migrating Resources to Another Cluster IMPORTANT If you are migrating a pool to a cluster in another tree and you want to maintain that pool s volume trustee assignments you must migrat...

Page 133: ...een restored some of the data on each cluster is different This is called data divergence Also the mirroring or synchronization process either fails or attempts to overwrite any changed data on one cl...

Page 134: ...rcent or the total number of nodes the condition cannot be satisfied because the cluster will not be up to report this state If a cluster has been totally downed you must bring up the master node in t...

Page 135: ...at cluster membership information for a specific cluster will be reported to peer clusters when the connection to that specific cluster is down For example a rule might contain only one condition that...

Page 136: ...the cluster or clusters that you want this monitor to apply to 3 Specify the maximum health indication that the monitor will report This value is used when creating a failover policy to validate the...

Page 137: ...is provided by storage hardware manufacturers For information about storage based mirroring consult your storage system vendor or see the storage system vendor documentation Host based synchronous mi...

Page 138: ...g All servers in the cluster connected to a shared storage system One or more drive arrays configured on the shared storage system The drives on the shared storage system marked as shared NSS is insta...

Page 139: ...g protocols NCP is the protocol used by Novell clients CIFS is the protocol used by Microsoft clients and AFP is the protocol used by Macintosh clients Selecting any of the protocols causes lines to b...

Page 140: ...SP2 Novell Cluster Services 1 8 5 for NetWare Administration Guide When you cluster enable a shared disk pool the commands to start and stop the pool resource are automatically added to the resource...

Page 141: ...content changes appear in reverse chronological order according to the publication date Within a dated entry changes are grouped by section and sequenced alphabetically Each change entry provides a l...

Page 142: ...verting BCC Clusters from NetWare to Linux on page 142 E 2 1 Converting BCC Clusters from NetWare to Linux Location Change Section 5 2 Disabling BCC 1 0 Upgrading Servers to NetWare 6 5 SP8 then Enabl...

Reviews: