34
IBM Certification Study Guide AIX HACMP
Here the resource groups are the same as the ones in the mutual takeover
configuration. Also, similar to the previous configuration, nodes 1 and 2 each
have priorities of 1 for one of the resource groups, A or B. The only thing
different in this configuration is that there is a third node which has a priority
of 2 for both the resource groups.
During normal operations, node 3 is either idle or is providing non-critical
services. In the case of either node 1 or node 2 failing, node 3 takes over the
failed node’s resource groups and starts providing its services. When a failed
node rejoins the cluster, it reacquires the resource group for which it has the
highest priority.
So, in this configuration, you are protected against the failure of two nodes
and there is no performance degradation after the failure of one node.
2.4.2.2 Concurrent Disk Access Configurations
A concurrent disk access configuration usually has all its disk storage defined
as part of one concurrent resource group. The nodes associated with a
concurrent resource group have no priorities assigned to them.
If a 7135 RAIDiant Array Subsystem is used for storage, you can have a
maximum of four nodes concurrently accessing a set of storage resources. If
you are using the 7133 SSA Disk Subsystem, you can have up to eight nodes
concurrently accessing it.This is because of the physical characteristics of
SCSI versus SSA.
In the case of a node failure, a concurrent resource group is not explicitly
taken over by any other node, since it is already active on the other nodes.
However, in order to somewhat mask a node failure from the end users, you
should also have cascading resource groups, each containing the service IP
address for each node in the cluster. When a node fails, its service IP
address will be taken over by another node and users can continue to access
critical services at the same IP address that they were using before the node
failed.
2.4.3 IP Address Takeover
The goal of IP Address Takeover is to make the server’s service address
highly available and to give clients the possibility of always connecting to the
same IP address. In order to achieve this, you must do the following:
• Decide which types of networks and point-to-point connections to use in
the cluster (see 2.2, “Cluster Networks” on page 11 for supported network
types)
Содержание AIX HACMP
Страница 2: ......
Страница 10: ...viii IBM Certification Study Guide AIX HACMP...
Страница 12: ...x IBM Certification Study Guide AIX HACMP...
Страница 14: ...xii IBM Certification Study Guide AIX HACMP...
Страница 18: ...xvi IBM Certification Study Guide AIX HACMP...
Страница 24: ...6 IBM Certification Study Guide AIX HACMP...
Страница 110: ...92 IBM Certification Study Guide AIX HACMP...
Страница 133: ...HACMP Installation and Cluster Definition 115...
Страница 134: ...116 IBM Certification Study Guide AIX HACMP...
Страница 160: ...142 IBM Certification Study Guide AIX HACMP...
Страница 200: ...182 IBM Certification Study Guide AIX HACMP...
Страница 216: ...198 IBM Certification Study Guide AIX HACMP...
Страница 222: ...204 IBM Certification Study Guide AIX HACMP...
Страница 226: ...208 IBM Certification Study Guide AIX HACMP...
Страница 232: ...214 IBM Certification Study Guide AIX HACMP...
Страница 240: ...Printed in the U S A SG24 5131 00 IBM Certification Study Guide AIX HACMP SG24 5131 00...