background image

Overview

15

no

vd

ocx 

(e

n)

  

13

 Ma
y 20

09

Table 1-1

 compares the benefits and limitations of host-based and storage-based mirroring.

Table 1-1   

Comparison of Host-Based and Storage-Based Data Mirroring

1.2.3  Stretch Clusters vs. Cluster of Clusters

A stretch cluster and a cluster of clusters are two clustering implementations that you can use with 
Novell Cluster Services

TM

 to achieve your desired level of disaster recovery. This section describes 

each deployment type, then compares the capabilities of each. 

Novell Business Continuity Clustering automates some of the configuration and processes used in a 
cluster of clusters. For information, see 

Section 1.3, “Novell Business Continuity Clusters,” on 

page 21

.

Š

“Stretch Clusters” on page 16

Š

“Cluster of Clusters” on page 16

Š

“Comparison of Stretch Clusters and Cluster of Clusters” on page 18

Š

“Evaluating Disaster Recovery Implementations for Clusters” on page 20

Capability

Host-Based Mirroring

Storage-Based Mirroring

Geographic distance between 
sites

Up to 10 km

Can be up to and over 300 km. 
The actual distance is limited only 
by the SAN hardware and media 
interconnects for your 
deployment.

Mirroring the SBD partition

An SBD can be mirrored between 
two sites.

Yes, if mirroring is supported by 
the SAN hardware and media 
interconnects for your 
deployment.

Synchronous data-block 
replication of data between sites

Yes

Yes, requires a Fibre Channel 
SAN or iSCSI SAN.

Failover support

No additional configuration of the 
hardware is required.

Requires additional configuration 
of the SAN hardware.

Failure of the site interconnect

LUNs can become primary at 
both locations (split brain 
problem).

Clusters continue to function 
independently. Minimizes the 
chance of LUNs at both locations 
becoming primary (split brain 
problem).

SMI-S compliance

If the storage subsystems are not 
SMI-S compliant, the storage 
subsystems must be controllable 
by scripts running on the nodes of 
the cluster.

If the storage subsystems are not 
SMI-S compliant, the storage 
subsystems must be controllable 
by scripts running on the nodes of 
the cluster.

Содержание BUSINESS CONTINUITY CLUSTERING 1.1 SP2 - ADMINISTRATION

Страница 1: ...w novell com novdocx en 13 May 2009 AUTHORIZED DOCUMENTATION BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 Business Continuity Clustering 1 1 SP2 August 14 2009 Administration Guide for NetWare...

Страница 2: ...r re export to entities on the current U S export exclusion lists or to any embargoed or terrorist countries as specified in the U S export laws You agree to not use deliverables for prohibited nuclea...

Страница 3: ...Trademarks For Novell Trademarks see the Novell Trademark and Service Mark list http www novell com company legal trademarks tmlist html Third Party Materials All third party trademarks are the proper...

Страница 4: ...4 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Страница 5: ...entity Manager 25 2 What s New for BCC 1 1 for NetWare 27 2 1 What s New for BCC 1 1 SP2 27 2 2 What s New for BCC 1 1 SP1 27 2 3 What s New for BCC 1 1 27 3 Planning a Business Continuity Cluster 29...

Страница 6: ...and Configuring the Novell Business Continuity Clustering Software 50 4 4 1 Installing the BCC Engine 51 4 4 2 Installing the Identity Manager Templates 52 4 5 What s Next 53 5 Upgrading Business Cont...

Страница 7: ...irroring Failure Types and Responses 88 7 6 2 Host Based Mirroring Failure Types and Responses 89 8 Virtual IP Addresses 93 8 1 Virtual IP Address Definitions and Characteristics 93 8 1 1 Definitions...

Страница 8: ...0 10 4 Security Information for Dependent Products 120 A Console Commands for BCC 123 B Implementing a Multiple Tree BCC 127 B 1 Planning a Multiple Tree Solution 127 B 1 1 Cluster Synchronization 127...

Страница 9: ...09 E 1 1 Console Commands for BCC 141 E 1 2 Installing Business Continuity Clustering 141 E 1 3 Upgrading Business Continuity Clustering for NetWare 142 E 2 April 28 2009 142 E 2 1 Converting BCC Clus...

Страница 10: ...10 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Страница 11: ...ltiple Tree BCC on page 127 Appendix C Setting Up Auto Failover on page 133 Appendix D Configuring Host Based File System Mirroring for NSS Pools on page 137 Audience This guide is intended for intend...

Страница 12: ...tity Management Documentation Web site http www novell com documentation idm35 index html For the latest information about OES 2 SP1 for Linux and NetWare see the OES 2 SP1 Documentation Web site http...

Страница 13: ...manual process that takes a great deal of planning and synchronizing Even configuration changes must be carefully planned and replicated One mistake and the redundant site is no longer able to effect...

Страница 14: ...n page 14 Section 1 2 3 Stretch Clusters vs Cluster of Clusters on page 15 1 2 1 LAN Based versus Internet Based Applications Traditional LAN applications require a LAN infrastructure that must be rep...

Страница 15: ...ng Storage Based Mirroring Geographic distance between sites Up to 10 km Can be up to and over 300 km The actual distance is limited only by the SAN hardware and media interconnects for your deploymen...

Страница 16: ...mirrored between the sites Failure of the site interconnect can result in LUNs becoming primary at both locations split brain problem if host based mirroring is used In the stretch cluster architectu...

Страница 17: ...tion The SBD partition is not mirrored across the sites which minimizes the chance for a split brain problem occurring when using host based mirroring For information about using mirroring solutions f...

Страница 18: ...t be in a single IP subnet Because the subnet spans multiple locations you must ensure that your switches handle gratuitous ARP Address Resolution Protocol IP addresses in a given cluster are in a sin...

Страница 19: ...iple clusters multiple site fan out failover Failover requires additional configuration Cluster resource configurations Configured for a single cluster Configured for the primary cluster that hosts th...

Страница 20: ...can be in different OUs in the same eDirectory tree or in different eDirectory trees IP addresses for each cluster can be on different IP subnets Cluster resources can fail over to separate clusters m...

Страница 21: ...business continuity infrastructure Unlike competitive solutions that attempt to build stretch clusters BCC uses a cluster of clusters Each site has its own independent clusters and the clusters in eac...

Страница 22: ...lustering deployment scenarios that can be used to achieve the desired level of disaster recovery Three possible scenarios include Section 1 4 1 Two Site Business Continuity Cluster Solution on page 2...

Страница 23: ...ing up to four sites Each cluster can support up to 32 nodes Services and applications can do fan out failover between sites Replication of data blocks is typically done by SAN hardware but it can be...

Страница 24: ...es to allow the business to continue Internet based applications allow employees to work from any place that offers an Internet connection including homes and hotels 1 4 3 Low Cost Business Continuity...

Страница 25: ...vell Cluster Services It is also BCC enabled so that it can be migrated and failed over between nodes in different peer clusters 1 5 3 Landing Zone The landing zone is an eDirectory context in which t...

Страница 26: ...26 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Страница 27: ...for 64 bit architectures Support for Novell eDirectoryTM 8 8 Support for Novell iManager 2 7 2 2 2 What s New for BCC 1 1 SP1 Business Continuity Clustering 1 1 SP1 for NetWare 6 5 SP6 provides the fo...

Страница 28: ...uide for NetWare 6 5 SP8 novdocx en 13 May 2009 Automatic failover No need for administrator intervention Based on a configurable minimum number of nodes or a percentage of nodes Extensible monitoring...

Страница 29: ...inue in the event of a disaster Design the infrastructure based on your business needs Determine your design criteria by asking and answering the following questions What are the key services that dri...

Страница 30: ...ed Cluster Resources on page 31 3 3 1 VLAN Use a dedicated VLAN virtual local area network for each cluster The cluster protocol is non routable so you cannot direct communications to specific IP addr...

Страница 31: ...the IP address and the name of the virtual server for the cluster resource never need to change The IP address of an inbound cluster resource is transformed to use an IP address in the same subnet of...

Страница 32: ...ing host based mirroring or storage based mirroring Storage based mirroring is recommended When using host based mirroring make sure that the mirrored partitions are accessible for the nodes of only o...

Страница 33: ...enabled its configuration is automatically synchronized with every peer cluster in the business continuity cluster by using customized Identity Manager drivers The following eDirectory objects are cr...

Страница 34: ...ad use names that are independent of the clusters and that are unique across all peer clusters For example replace the clustername with something static such as BCC Cluster Resource poolname_SERVER Cl...

Страница 35: ...ity cluster the volume IDs for the existing shared volumes might also share the same volume IDs To resolve this conflict manually edit the load script for each volume that has been enabled for busines...

Страница 36: ...36 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Страница 37: ...software Section 4 1 1 Business Continuity Clustering Licensing on page 38 Section 4 1 2 Business Continuity Cluster Component Locations on page 38 Section 4 1 3 NetWare 6 5 SP8 OES 2 SP1 NetWare on...

Страница 38: ...wing abbreviations BCC Novell Business Continuity Clustering 1 1 SP2 for NetWare NCS Novell Cluster Services 1 8 5 for NetWare IDM Identity Manager 3 5 1 Bundle Edition eDir Novell eDirectory 8 8 NW 6...

Страница 39: ...ster Names on page 39 Storage on page 39 eDirectory on page 39 Peer Cluster Credentials on page 40 Cluster Names Each cluster must have a unique name even if the clusters reside in different Novell eD...

Страница 40: ...with a backslash when you enter credentials Rights Needed for Individual Cluster Management The BCC Administrator user is not automatically assigned the rights necessary to manage all aspects of each...

Страница 41: ...ration Guide 4 1 7 Identity Manager 3 5 1 Bundle Edition The Identity Manager 3 5 1 Bundle Edition is required for synchronizing the configuration of the peer clusters in your business continuity clus...

Страница 42: ...ts that will be synchronized between clusters This does not apply to all eDirectory objects in the tree For information about the eDirectory full replica requirements see Section 4 1 5 Novell eDirecto...

Страница 43: ...s release of Business Continuity Clustering You must install the Clusters plug in and the Storage Management plug in storagemgmt npm Other storage related plug ins are Novell Storage ServicesTM NSS ns...

Страница 44: ...munications If you are using a firewall the port must be opened for CIMOM communications Beginning in OES 2 NetWare 6 5 SP7 the Clusters plug in and all other storage related plug ins for iManager req...

Страница 45: ...d File System Mirroring for NSS Pools on page 137 For information about storage based mirroring consult the vendor for your storage system or see the vendor documentation 4 1 14 LUN Masking for Shared...

Страница 46: ...other than one of iManager s supported languages To avoid problems in your Web browser click Tools Options Languages then set the first language preference in the list to a supported language Refer to...

Страница 47: ...e 6 5 SP8 go to the Novell Business Continuity Clustering download site http download novell com Download buildid bdkmSxRgKVk 4 3 Configuring a BCC Administrator User The BCC Administrator user is a t...

Страница 48: ...rite check boxes are selected for the All Attributes Rights property 7 Click Done to save your changes 8 Repeat Step 3 through Step 7 for the other clusters in your business continuity cluster 4 3 3 A...

Страница 49: ...ould start with the node that has the highest IP address first and work down in IP address order This speeds the rate at which the Novell Cluster Services master node acquires the change 4 3 4 Assigni...

Страница 50: ...the highest IP address first and work down in IP address order This speeds the rate at which the Novell Cluster Services master node acquires the change 4 4 Installing and Configuring the Novell Busi...

Страница 51: ...e your business continuity cluster You must have previously installed iManager on the server where you plan to install the templates Identity Manager Templates for NetWare iManager Servers Installs th...

Страница 52: ...while the other servers in the cluster continue running Then another server is restarted and then another until all servers in the cluster have been restarted This lets you keep your cluster up and r...

Страница 53: ...he fully distinguished name for the server where you want to install the templates Then click Next If you don t know the fully distinguished name for the server you can browse and select it Windows iM...

Страница 54: ...54 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Страница 55: ...Section 5 4 Upgrading Clusters from BCC 1 1 SP1 to SP2 for NetWare on page 63 5 1 Guidelines for Upgrading Use the guidelines in this section to upgrade clusters one peer cluster at a time Section 5...

Страница 56: ...upgrade from BCC 1 0 to BCC 1 1 SP2 is to disable BCC on the peer clusters upgrade to NetWare 6 5 SP8 re install BCC 1 1 SP2 and re configure BCC for the clusters This approach leaves you without the...

Страница 57: ...ts 9b Upgrade Identity Manager from version 2 x to 3 51 IMPORTANT Do not start the drivers yet The upgrade updates the Identity Manager software and its plug ins for iManager 2 7 2 on the same node 9c...

Страница 58: ...ing the BCC Cluster from 1 0 to 1 1 SP1 on page 58 Section 5 3 2 Upgrading the BCC Cluster from 1 1 SP1 to 1 1 SP2 on page 60 5 3 1 Upgrading the BCC Cluster from 1 0 to 1 1 SP1 Perform a rolling clus...

Страница 59: ...compliant For installation instructions for BCC 1 1 SP1 see Running the Business Continuity Cluster Installation Program http www novell com documentation bcc bcc_administration_nw data ht05s5vv html...

Страница 60: ...Section 4 3 Configuring a BCC Administrator User on page 47 10 Verify that Novell Cluster Services and BCC 1 1 SP1 appear to be functioning correctly by performing the following tests 10a Create a new...

Страница 61: ...P1 Readme http www novell com documentation oes2 oes_readme data readme html NOTE The DirXML plug ins will be replaced by Identity Manager 3 5 1 plug ins in Step 5 on page 62 3c1 In iManager uninstall...

Страница 62: ...7 for each peer cluster 9 Verify that Novell Cluster Services and Business Continuity Clustering appear to be functioning correctly by migrating a BCC enabled resource between peer clusters 10 Create...

Страница 63: ...in the Identity Manager node of every peer cluster in the business continuity cluster 2 Issue the cluster leave command on one node in the cluster 3 Upgrade NetWare 6 5 from version SP6 to SP8 and ap...

Страница 64: ...usters role 5 Repeat Step 2 through Step 4g for each node in the cluster 6 Issue the cluster join command on each node in the cluster 7 On each node in the cluster upgrade Business Continuity Clusteri...

Страница 65: ...Manager see the Identity Manager 3 51 Installation Guide http www novell com documentation idm35 install data front html 1 Upgrade Identity Manager to version 3 51 IMPORTANT Do not start the drivers y...

Страница 66: ...pool resource BCC migrate it between peer clusters and verify that it migrates correctly 2 Make a load script change for example add a space character and save the change to an existing BCC resource...

Страница 67: ...emplate is used to configure drivers when the clusters in your business continuity cluster are in different eDirectoryTM trees You might also need to set up User Object Synchronization drivers between...

Страница 68: ...Each field contains an example of the type of information that should go into the field Descriptions of the information required are also included with each field Driver name Specify a unique name for...

Страница 69: ...have all server objects in one container The container where the cluster pool and volume objects are placed when they are synchronized to this cluster This container is referred to as the landing zon...

Страница 70: ...paces beginning or end in the specified context and do not use the cn DriverName ou OrganizationalUnitName o OrganizationName format 5 Specify the requested driver information for the driver in the ot...

Страница 71: ...Identity Manager synchronization loops Identity Manager synchronization loops can cause excessive network traffic and slow server communication and performance For example in a three cluster business...

Страница 72: ...our BCC synchronization scenario 1 In the Connections section of the Business Continuity Cluster Properties page select one or more peer clusters that you want a cluster to synchronize to then click E...

Страница 73: ...is http server_ip_address nps iManager html Replace server_ip_address with the IP address or DNS name of the server that has iManager and the Identity Manager preconfigured templates for iManager inst...

Страница 74: ...xt for the user For example use bccadmin instead of bccadmin prv novell Rather than using the Admin user to administer your BCC you should consider creating another user with sufficient rights to the...

Страница 75: ...92 168 1 3 and 192 168 1 4 addresses respectively IMPORTANT Make sure to use a trailing dot in the search and replace value If a trailing dot is not used 10 1 1 could be replaced with an IP value such...

Страница 76: ...oad and unload scripts 7a Under BCC Load Scripts click New to bring up a page that lets you create a script to promote mirrored LUNs on a cluster You can also delete a script edit a script by clicking...

Страница 77: ...lds to become active on this page Synchronous If this check box is not selected multiple scripts can be run concurrently Selecting the box causes scripts to run individually one after another Most SAN...

Страница 78: ...g load and unload scripts search and replace data specific to the resource and selecting peer clusters for the resource IMPORTANT In a business continuity cluster you should have only one NSS pool for...

Страница 79: ...r_ip_address with the IP address or DNS name of the server that has iManager and the Identity Manager preconfigured templates for iManager installed 2b Specify your username and password specify the t...

Страница 80: ...d replace values The following links provide information on regular expressions and wildcard characters Regular Expressions http www opengroup org onlinepubs 007908799 xbd re html Regular Expressions...

Страница 81: ...u are creating a new cluster pool resource click Next then add the SAN management configuration information For information see Adding SAN Management Configuration Information on page 75 If this is an...

Страница 82: ...82 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Страница 83: ...er feature that fails over resources between peer clusters we recommend that you manually migrate cluster resources between the peer clusters instead For information about configuring and using automa...

Страница 84: ...s iManager html Replace server_ip_address with the IP address or DNS name of the server that has iManager and the Identity Manager preconfigured templates for iManager installed 2 Specify your usernam...

Страница 85: ...tory trees and you specify a common username and password each eDirectory tree in the business continuity cluster must have the same username and password 7 3 Viewing the Current Status of a Business...

Страница 86: ...and select one 5 Click the Run Report button 7 5 Disabling Business Continuity Cluster Resources After enabling a resource for business continuity it is possible to disable it You might want to disabl...

Страница 87: ...rimary peer cluster 7a Click the Preferred Nodes tab 7b From the Assigned Nodes list select the servers in the peer clusters you want to unassign from the resource then click the left arrow button to...

Страница 88: ...term There should be an initial response and then a long term response based on whether the failure is transient or long term The initial response is to restore the cluster to normal operations The lo...

Страница 89: ...AN Fails but Secondary Cluster Does Not When the secondary SAN fails the secondary cluster also fails Bring the secondary SAN back up and follow your SAN vendor s instructions to remirror Then bring t...

Страница 90: ...on a primary cluster server to ensure that remirroring takes place When you bring the secondary cluster back up the LUNs are still in a secondary state to the primary SAN Primary SAN Fails but Primar...

Страница 91: ...able to access servers in the primary cluster but can possibly access servers in the secondary cluster If both clusters are up nothing additional is required An error is displayed Wait for connectivit...

Страница 92: ...92 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Страница 93: ...IP addresses and virtual NICs behave like physical IP addresses and physical NICs and they are similarly configured by using either the INETCFG server based utility or the Novell Remote Manager Web ba...

Страница 94: ...ver NIC failures This assumes that the server is running a routing protocol and is advertising its internal virtual IP network which only it knows about and can reach to other network nodes Physical I...

Страница 95: ...o advertise reachability to the 1 0 0 0 FF 0 0 0 network and the client would continue to forward packets to Router 1 Thes undeliverable packets would ultimately be dropped by Router 1 Therefore in sp...

Страница 96: ...irectly follow from the highly reachable nature of virtual IP addresses They completely and uniquely identify a multihomed server A multihomed server with a virtual IP address no longer needs to carry...

Страница 97: ...to a different IP network If the service is hosted on a physical IP address accommodating these changes involves rehosting the service on a different IP address pulled out from the new network and ap...

Страница 98: ...recommend using a host mask To understand why consider the fact that each service in a clustered environment must have its own unique IP address or a unique virtual IP address Furthermore consider th...

Страница 99: ...er resource load script for a standard NetWare volume called HOMES This example uses host masks and assumes the virtual board has been named VNIC Notice that the command to add a secondary IP address...

Страница 100: ...ying Bound Virtual IP Addresses To verify that a virtual IP address is bound enter display secondary ipaddress at the server console of the cluster server where the virtual IP address is assigned This...

Страница 101: ...2 Peer Cluster Communication Not Working on page 108 Section 9 13 Administration of Peer Clusters Not Functional on page 109 Section 9 14 A Resource Does Not Migrate to a Peer Cluster on page 109 Sect...

Страница 102: ...r Enter the correct username and password that this cluster will use to connect to the selected peer cluster Cannot Connect 3 This cluster cannot connect to the selected peer cluster Ping the peer clu...

Страница 103: ...Sync icon 6 Click the red or blue icon again then click the Identity Manager tab if it is not already selected 7 In the Authentication context field view and if necessary change the port numbers next...

Страница 104: ...using the eDirectory Admin user to administer your BCC you should consider creating another user with sufficient rights to the appropriate contexts in your eDirectory tree to manage your BCC The IDM D...

Страница 105: ...tor user from filling the sys volume by copying an excessive number of files to the sys tmp directory 9 5 Certificates If SSL certificates are not present or have not been created Identity Manager dri...

Страница 106: ...ee during the BCC installation To resolve this and similar problems rename the c program files common files novell directory on the Windows machine where the installation is being run and restart the...

Страница 107: ...changes the order of the lines within the autoexec ncf file 9 10 Identity Manager Drivers Do Not Synchronize Objects from One Cluster to Another If objects are not synchronizing between clusters the p...

Страница 108: ...1f for the Identity Manager XSLTraceLevel attribute also setting the trace level to 4 1h Repeat Step 1d through Step 1g for the other driver sets you want to trace 2 At the NetWare server console load...

Страница 109: ...A Resource Cannot Be Brought Online If you cannot bring a BCC enabled resource online it is possible the resource might be set as secondary If the NCS BCC State attribute is equal to 1 the resource i...

Страница 110: ...idly Identity Manager merges all changes into one so if you quickly add a change and then delete it Identity Manager might view it as no change You should make a change and verify that the change has...

Страница 111: ...irectory the attribute points to Clustered Volume Object Class NCS Volume Resource NCS NCP Server Virtual NCP Servers NCS Volumes All Volumes Virtual NCP Server Object Class NCP Server Resource Cluste...

Страница 112: ...le still resolves to the old volume object and the map command fails Using a temporary environment variable has been tested and does not work For example set FOO HOME_DIRECTORY MAP u FOO Using a false...

Страница 113: ...ait for a signal file w20 causes NSMI to wait 20 seconds before proceeding Failure to add the wait causes the temporary LDIF file to be deleted before ICE can read it This causes ICE to fail 9 24 BCC...

Страница 114: ...2 Operation not supported 1013 Error obtaining lock on synchronization object 1014 Invalid credentials 1015 Error returned from the NICI API 1016 Cannot find peer cluster data 1017 Invalid BCC API ver...

Страница 115: ...No Details Users are authenticated Yes Administrative users are authenticated via eDirectory Users are authorized Yes Users are authorized via eDirectory trustees Access to configuration information...

Страница 116: ...ed or impact the security of BCC Table 10 2 BCC Security Configuration Settings Configuration Setting Possible Values Default Value Recommended Value for Best Security Inter cluster communications sch...

Страница 117: ...trator user Any LUM enabled eDirectory User This is the user you specify when you are setting the BCC credentials The BCC Administrator user is not automatically assigned the rights necessary to manag...

Страница 118: ...eout BCC CIM client connect timeout in seconds 15 seconds cimReceiveTimeout BCC CIM client receive timeout in seconds 30 seconds cimSendTimeout BCC CIM client send timeout in seconds 30 seconds idlePr...

Страница 119: ...e address 10 1 1 10 address peer To disable SSL for inter cluster communication you would change the address attribute to specify http with the IP address as shown in the following example peer cluste...

Страница 120: ...tilities SSH and any other type of access to these files Services that are used to send BCC data to other servers or e mail accounts or that protect BCC data should be examined periodically to ensure...

Страница 121: ...o iSCSI Targets and Enabling and Configuring iSCSI Initiator Security in the OES 2 SP 1 iSCSI 1 1 3 for NetWare Administration Guide Novell Cluster Services for NetWare In the OES 2 SP2 Novell Cluster...

Страница 122: ...122 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Страница 123: ...Console Command Description cluster credentials cluster Lets you change the administrator username and password that this cluster uses to connect to the specified peer cluster The cluster you specify...

Страница 124: ...esources Changes the state of all resources on this cluster to offline and secondary This is a recovery procedure that should be run when a cluster in a BCC is brought back into service You should run...

Страница 125: ...Console Commands for BCC 125 novdocx en 13 May 2009 cluster refresh This command should not be used except under the direction of Novell Support Console Command Description...

Страница 126: ...126 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...

Страница 127: ...er Synchronization on page 127 Section B 1 2 User Synchronization on page 127 Section B 1 3 SSL Certificates for Drivers on page 128 B 1 1 Cluster Synchronization Creating the Cluster Synchronization...

Страница 128: ...unidirectional Two certificates are required if the data flow for the driver is bidirectional one certificate for each direction For example create one SSL certificate for data flowing from TreeA to...

Страница 129: ...n XML 8 Fill in the values on the wizard page as prompted then click Next Each field contains an example of the type of information that should go into the field Descriptions of the information requir...

Страница 130: ...ing a new cluster to an existing business continuity cluster in a multiple tree BCC you must synchronize the BCC specific Identity Manager drivers for the Cluster and User objects If the BCC specific...

Страница 131: ...r synchronization loop occurs when Cluster One is configured to synchronize with Cluster Two Cluster Two is configured to synchronize with Cluster Three and Cluster Three is configured to synchronize...

Страница 132: ...continuity B 7 Migrating Resources to Another Cluster IMPORTANT If you are migrating a pool to a cluster in another tree and you want to maintain that pool s volume trustee assignments you must migrat...

Страница 133: ...een restored some of the data on each cluster is different This is called data divergence Also the mirroring or synchronization process either fails or attempts to overwrite any changed data on one cl...

Страница 134: ...rcent or the total number of nodes the condition cannot be satisfied because the cluster will not be up to report this state If a cluster has been totally downed you must bring up the master node in t...

Страница 135: ...at cluster membership information for a specific cluster will be reported to peer clusters when the connection to that specific cluster is down For example a rule might contain only one condition that...

Страница 136: ...the cluster or clusters that you want this monitor to apply to 3 Specify the maximum health indication that the monitor will report This value is used when creating a failover policy to validate the...

Страница 137: ...is provided by storage hardware manufacturers For information about storage based mirroring consult your storage system vendor or see the storage system vendor documentation Host based synchronous mi...

Страница 138: ...g All servers in the cluster connected to a shared storage system One or more drive arrays configured on the shared storage system The drives on the shared storage system marked as shared NSS is insta...

Страница 139: ...g protocols NCP is the protocol used by Novell clients CIFS is the protocol used by Microsoft clients and AFP is the protocol used by Macintosh clients Selecting any of the protocols causes lines to b...

Страница 140: ...SP2 Novell Cluster Services 1 8 5 for NetWare Administration Guide When you cluster enable a shared disk pool the commands to start and stop the pool resource are automatically added to the resource...

Страница 141: ...content changes appear in reverse chronological order according to the publication date Within a dated entry changes are grouped by section and sequenced alphabetically Each change entry provides a l...

Страница 142: ...verting BCC Clusters from NetWare to Linux on page 142 E 2 1 Converting BCC Clusters from NetWare to Linux Location Change Section 5 2 Disabling BCC 1 0 Upgrading Servers to NetWare 6 5 SP8 then Enabl...

Отзывы: