Storage Foundation and High Availability Solutions 7.4.2 Solutions Guide - Windows

Last Published:
Product(s): InfoScale & Storage Foundation (7.4.2)
Platform: Windows
  1. Section I. Introduction
    1. Introducing Storage Foundation and High Availability Solutions
      1.  
        About the solutions guides
      2.  
        About Quick Recovery
      3.  
        About high availability
      4.  
        About campus clusters
      5.  
        About disaster recovery
      6.  
        About Microsoft clustering solutions
      7.  
        How this guide is organized
    2. Using the Solutions Configuration Center
      1.  
        About the Solutions Configuration Center
      2.  
        Starting the Solutions Configuration Center
      3.  
        Options in the Solutions Configuration Center
      4.  
        About launching wizards from the Solutions Configuration Center
      5.  
        Remote and local access to Solutions wizards
      6.  
        Solutions wizards and logs
      7.  
        Workflows in the Solutions Configuration Center
    3. SFW best practices for storage
      1. Best practices for storage availability
        1.  
          Adding software mirrors for critical data
        2.  
          Locating data objects for optimum recovery
        3.  
          Managing three-way software mirrors for reliability
        4.  
          Software striping and mirroring on top of hardware RAID for high availability
      2. Best practices configuring SFW disk groups for availability
        1.  
          Configuring disk groups for separate storage capacity pools or common pools
        2.  
          Allocating disk groups for availability in clusters
      3. Best practices for storage performance
        1.  
          Host-based mirroring for increased read performance and failure tolerance
        2.  
          Software striping across hardware for increased performance
        3.  
          Using software RAID 5 for read-mostly data
      4. Best practices for I/O performance tuning
        1.  
          Striping for I/O-request-intensive applications
        2.  
          Striping for data-transfer-intensive applications
      5. Best practices for storage capacity management
        1.  
          Managing storage allocation for flexibility
        2.  
          Aggregating hardware RAID for very large volumes
        3.  
          Managing unallocated space for free space savings
        4.  
          Reserving spares for failure-tolerant volume recovery
  2. Section II. Quick Recovery
    1. Quick Recovery overview
      1.  
        About the Quick Recovery solution
      2.  
        Need for implementing the SFW Quick Recovery solution
      3.  
        Understanding the underlying components of SFW's Quick Recovery process
      4. Overview of the Quick Recovery process
        1.  
          Creating initial snapshots
        2.  
          Refreshing a snapshot
        3.  
          Recovering a database
      5. Other applications for point-in-time snapshots
        1.  
          Off-host backups
        2.  
          Reporting and analysis
        3.  
          Application testing and training
    2. Quick Recovery example
      1. Example of quick recovery of an Oracle database
        1.  
          Creating a split-mirror snapshot of the database
        2.  
          Recovering the database using the split-mirror snapshot and database logs
      2.  
        Tips and references about FlashSnap
  3. Section III. High Availability
    1. High availability: Overview
      1.  
        About high availability
      2.  
        About clusters
      3. How VCS monitors storage components
        1.  
          Shared storage - if you use NetApp filers
        2.  
          Shared storage - if you use SFW to manage cluster dynamic disk groups
        3.  
          Shared storage - if you use Windows LDM to manage shared disks
        4.  
          Non-shared storage - if you use SFW to manage dynamic disk groups
        5.  
          Non-shared storage - if you use Windows LDM to manage local disks
        6.  
          Non-shared storage - if you use VMware storage
    2. Deploying InfoScale Enterprise for high availability: New installation
      1.  
        About the high availability solution
      2.  
        Tasks for a new high availability (HA) installation - additional applications
      3.  
        Reviewing the InfoScale installation requirements
      4. Notes and recommendations for cluster and application configuration
        1.  
          IPv6 support
      5.  
        Reviewing the configuration
      6.  
        Configuring the storage hardware and network
      7.  
        About installing the Veritas InfoScale products
      8. Configuring disk groups and volumes
        1. Planning disk groups and volumes
          1.  
            Planning your File Share storage
          2.  
            Planning your IIS storage
          3.  
            Planning your storage for additional applications
          4.  
            Considerations for a fast failover configuration
        2.  
          Creating a dynamic disk group
        3.  
          Creating dynamic volumes
        4.  
          About managing disk groups and volumes
        5.  
          Importing a disk group and mounting a volume
        6.  
          Unmounting a volume and deporting a disk group
      9. Configuring the cluster using the Cluster Configuration Wizard
        1.  
          Configuring notification
      10. About modifying the cluster configuration
        1.  
          Adding nodes to a cluster
        2.  
          Removing nodes from a cluster
        3.  
          Reconfiguring a cluster
        4. Configuring the ClusterService group
          1.  
            Configuring notification
          2.  
            Configuring the wide-area connector process for global clusters
        5.  
          Deleting a cluster configuration
      11. About installing and configuring the application or server role
        1.  
          About configuring a File Share server role
        2.  
          About installing and configuring the IIS application
        3.  
          About installing additional applications
      12. Configuring the service group
        1. About configuring file shares
          1.  
            Before you configure a file share service group
          2.  
            Configuring file shares using the wizard
          3.  
            Creating non-scoped file shares configured with VCS
          4.  
            Making non-scoped file shares accessible while using virtual server name or IP address if NetBIOS and WINS are disabled
        2. About configuring IIS sites
          1.  
            Before you configure an IIS service group
          2.  
            Fixing the IPv6 address configuration for FTP sites
          3.  
            Installing IIS on Windows Server Core
          4.  
            Configuring an IIS service group using the wizard
        3. About configuring applications using the Application Configuration Wizard
          1.  
            Before you configure service groups using the Application Configuration wizard
          2. Adding resources to a service group
            1.  
              Configuring a GenericService resource
            2.  
              Configuring processes
            3.  
              Configuring a ServiceMonitor resource
            4.  
              Configuring VCS components
          3.  
            Configuring service groups using the Application Configuration Wizard
        4. About configuring the Oracle service group using the wizard
          1.  
            Prerequisites for configuring the Oracle service group
          2.  
            Creating an Oracle service group using the wizard
          3.  
            Configuring dependent services
        5.  
          Enabling fast failover for disk groups (optional)
      13.  
        Configuring the service group in a non-shared storage environment
      14.  
        Verifying the cluster configuration
      15.  
        Possible tasks after completing the configuration
      16.  
        Adding nodes to a cluster
      17. Modifying the application service groups
        1.  
          Modifying a file share service group using the wizard
        2.  
          Modifying an IIS service group using the wizard
        3.  
          Modifying an application service group
        4. About modifying an Oracle service group
          1.  
            Prerequisites for modifying the Oracle service group
          2.  
            Modifying an Oracle service group
          3.  
            Deleting an Oracle service group
          4. Configuring detail monitoring
            1.  
              Enabling detail monitoring
            2.  
              Disabling detail monitoring
    3. Adding DMP to a clustering configuration
      1.  
        About Dynamic Multi-Pathing
      2.  
        Overview of configuration tasks for adding DMP DSMs
      3.  
        Reviewing the prerequisites
      4.  
        Reviewing the configuration
      5.  
        Setting up DMP in a new cluster configuration
      6.  
        Setting up DMP in an existing cluster configuration
  4. Section IV. Campus Clustering
    1. Introduction to campus clustering
      1.  
        About Campus Clusters
      2.  
        Sample campus cluster configuration
      3.  
        Differences between campus clusters and local clusters
    2. Deploying InfoScale Enterprise for campus cluster
      1.  
        About the Campus Cluster solution
      2. Notes and recommendations for cluster and application configuration
        1.  
          IPv6 support
        2.  
          Campus cluster requirements
      3. Reviewing the configuration
        1.  
          Overview of campus clustering with VCS
        2.  
          Reinstating faulted hardware
        3.  
          Setting the ForceImport attribute
      4.  
        Installing and configuring the hardware
      5.  
        Configuring the storage hardware and network
      6.  
        About installing the Veritas InfoScale products
      7. Configuring the cluster using the Cluster Configuration Wizard
        1.  
          Configuring notification
      8. Creating disk groups and volumes
        1.  
          About cluster disk groups and volumes
        2.  
          Example disk group and volume configuration in campus cluster
        3.  
          Considerations when creating disks and volumes for campus clusters
        4.  
          Viewing the available disk storage
        5.  
          Creating a dynamic disk group
        6.  
          Adding disks to campus cluster sites
        7.  
          Creating volumes for campus clusters
      9. Installing the application on cluster nodes
        1.  
          About configuring a File Share server role in a campus cluster
        2.  
          About installing and configuring the IIS application in a campus cluster
        3.  
          About installing additional applications in a campus cluster
        4.  
          Deporting and importing a disk group in a campus cluster
      10.  
        Configuring service groups
      11.  
        Verifying the cluster configuration
  5. Section V. Replicated Data Clusters
    1. Introduction to Replicated Data Clusters
      1.  
        About Replicated Data Clusters
      2.  
        How VCS Replicated Data Clusters work
      3. Setting up a Replicated Data Cluster configuration
        1.  
          Setting up replication
        2.  
          Configuring the service groups
      4.  
        Migrating the service group
    2. Deploying Replicated Data Clusters: New application installation
      1.  
        Tasks for a new replicated data cluster installation - additional applications
      2. Notes and recommendations for cluster and application configuration
        1.  
          IPv6 support
      3.  
        Sample configuration
      4.  
        Configuring the storage hardware and network
      5.  
        About installing the Veritas InfoScale products
      6.  
        Setting up security for Volume Replicator
      7. Configuring the cluster using the Cluster Configuration Wizard
        1.  
          Configuring notification
      8. Configuring disk groups and volumes
        1. Planning disk groups and volumes
          1.  
            Planning your File Share storage
          2.  
            Planning your IIS storage
          3.  
            Planning your storage for additional applications
        2.  
          Creating a dynamic disk group
        3.  
          Creating dynamic volumes
        4. About managing disk groups and volumes
          1.  
            Importing a disk group and mounting a volume
          2.  
            Unmounting a volume and deporting a disk group
      9. Installing and configuring the application or server role
        1.  
          Configuring a File Share server role
        2.  
          Installing and configuring the IIS application
        3.  
          Installing additional applications
      10. Configuring the service group
        1. About configuring file shares
          1.  
            Before you configure a file share service group
          2.  
            Configuring file shares using the wizard
          3.  
            Creating non-scoped file shares configured with VCS
          4.  
            Making non-scoped file shares accessible while using virtual server name or IP address if NetBIOS and WINS are disabled
        2. About configuring IIS sites
          1.  
            Before you configure an IIS service group
          2.  
            Fixing the IPv6 address configuration for FTP sites
          3.  
            Installing IIS on Windows Server Core
          4.  
            Configuring an IIS service group using the wizard
        3. About configuring applications using the Application Configuration Wizard
          1.  
            Before you configure service groups using the Application Configuration wizard
          2. Adding resources to a service group
            1.  
              Configuring a GenericService resource
            2.  
              Configuring processes
            3.  
              Configuring a ServiceMonitor resource
            4.  
              Configuring VCS components
          3.  
            Configuring service groups using the Application Configuration Wizard
      11.  
        Creating the primary system zone for the application service group
      12.  
        Verifying the cluster configuration
      13.  
        Creating a parallel environment in the secondary zone
      14.  
        Adding nodes to a cluster
      15.  
        Creating the Replicated Data Sets with the wizard
      16. Configuring a RVG service group for replication
        1.  
          Creating the RVG service group
        2. Configuring the resources in the RVG service group for RDC replication
          1.  
            Configuring the IP and NIC resources
          2. Configuring the VMDg or VMNSDg resources for the disk groups
            1.  
              Modifying the DGGuid attribute for the new disk group resource in the RVG service group
          3.  
            Adding the Volume Replicator RVG resources for the disk groups
          4.  
            Linking the Volume Replicator RVG resources to establish dependencies
          5.  
            Deleting the VMDg or VMNSDg resource from the application service group
        3. Configuring the RVG Primary resources
          1.  
            Creating the RVG Primary resources
          2.  
            Linking the RVG Primary resources to establish dependencies
          3.  
            Bringing the RVG Primary resources online
        4.  
          Configuring the primary system zone for the RVG service group
      17.  
        Setting a dependency between the service groups
      18. Adding the nodes from the secondary zone to the RDC
        1.  
          Adding the nodes from the secondary zone to the RVG service group
        2.  
          Configuring secondary zone nodes in the RVG service group
        3.  
          Configuring the RVG service group NIC resource for fail over (VMNSDg only)
        4.  
          Configuring the RVG service group IP resource for failover
        5.  
          Configuring the RVG service group VMNSDg resources for fail over
        6.  
          Adding the nodes from the secondary zone to the application service group
        7.  
          Configuring the zones in the application service group
        8.  
          Configuring the application service group IP resource for fail over (VMNSDg only)
        9.  
          Configuring the application service group NIC resource for fail over (VMNSDg only)
      19. Verifying the RDC configuration
        1.  
          Bringing the service group online
        2.  
          Switching online nodes
      20.  
        Additional instructions for GCO disaster recovery
  6. Section VI. Disaster Recovery
    1. Disaster recovery: Overview
      1.  
        About a disaster recovery solution
      2.  
        Need for implementing a disaster recovery solution
      3.  
        Overview of the recovery process
      4. Components of Volume Replicator that enable disaster recovery
        1.  
          Understanding replication
        2. Modes of replication
          1.  
            Synchronous replication
          2.  
            Asynchronous replication
          3.  
            Synchronous override replication
        3.  
          Features of Volume Replicator that help in disaster recovery
    2. Deploying disaster recovery: New application installation
      1.  
        Tasks for a new disaster recovery installation - additional applications
      2.  
        Tasks for setting up DR in a non-shared storage environment
      3. Notes and recommendations for cluster and application configuration
        1.  
          IPv6 support
      4. Reviewing the configuration
        1.  
          Supported disaster recovery configurations for service group dependencies
      5.  
        Configuring the storage hardware and network
      6. About managing disk groups and volumes
        1.  
          Importing a disk group and mounting a volume
        2.  
          Unmounting a volume and deporting a disk group
      7. Setting up the secondary site: Configuring SFW HA and setting up a cluster
        1. About installing the Veritas InfoScale products
          1. Installing the server components using the installation wizard
            1.  
              Applying the selected installation and product options to multiple systems
          2.  
            Installing the client components
        2.  
          Configuring the cluster using the Cluster Configuration Wizard
        3.  
          Configuring notification
      8.  
        Verifying that your application or server role is configured for HA at the primary site
      9. Setting up your replication environment
        1.  
          Setting up security for Volume Replicator
        2. Requirements for EMC SRDF array-based hardware replication
          1.  
            Software requirements for configuring EMC SRDF
          2.  
            Replication requirements for EMC SRDF
        3. Requirements for Hitachi TrueCopy array-based hardware replication
          1.  
            Software requirements for Hitachi TrueCopy
          2.  
            Replication requirements for Hitachi TrueCopy
      10.  
        Assigning user privileges (secure clusters only)
      11. About configuring disaster recovery with the DR wizard
        1.  
          Configuring disaster recovery with the DR wizard
      12.  
        Cloning the storage on the secondary site using the DR wizard (Volume Replicator replication option)
      13.  
        Creating temporary storage on the secondary site using the DR wizard (array-based replication)
      14. Installing and configuring the application or server role (secondary site)
        1.  
          Installing the FileShare application
        2.  
          Installing the IIS application
        3.  
          Installing additional applications
      15.  
        Cloning the service group configuration from the primary site to the secondary site
      16.  
        Configuring the application service group in a non-shared storage environment
      17. Configuring replication and global clustering
        1.  
          Configuring Volume Replicator replication and global clustering
        2. Configuring EMC SRDF replication and global clustering
          1.  
            Optional settings for EMC SRDF
        3. Configuring Hitachi TrueCopy replication and global clustering
          1.  
            Optional settings for HTC
        4.  
          Configuring global clustering only
      18.  
        Creating the replicated data sets (RDS) for Volume Replicator replication
      19.  
        Creating the Volume Replicator RVG service group for replication
      20. Configuring the global cluster option for wide-area failover
        1.  
          Linking clusters: Adding a remote cluster to a local cluster
        2.  
          Converting a local service group to a global service group
        3.  
          Bringing a global service group online
      21.  
        Verifying the disaster recovery configuration
      22.  
        Establishing secure communication within the global cluster (optional)
      23.  
        Adding multiple DR sites (optional)
      24. Possible task after creating the DR environment: Adding a new failover node to a Volume Replicator environment
        1.  
          Preparing the new node
        2.  
          Preparing the existing DR environment
        3.  
          Modifying the replication and application service groups
        4.  
          Reversing replication direction
      25. Maintaining: Normal operations and recovery procedures (Volume Replicator environment)
        1.  
          Normal operations: Monitoring the status of the replication
        2.  
          Performing planned migration
        3. Disaster recovery procedures
          1.  
            Restoring the primary host
      26.  
        Recovery procedures for service group dependencies
    3. Testing fault readiness by running a fire drill
      1.  
        About disaster recovery fire drills
      2. About the Fire Drill Wizard
        1.  
          About Fire Drill Wizard general operations
        2. About Fire Drill Wizard operations in a Volume Replicator environment
          1.  
            Preparing the fire drill configuration
          2.  
            About running the fire drill
          3.  
            About restoring the fire drill configuration
          4.  
            About deleting the fire drill configuration
        3.  
          About Fire Drill Wizard operations in a Hitachi TrueCopy or EMC SRDF environment
      3.  
        About post-fire drill scripts
      4.  
        Tasks for configuring and running fire drills
      5. Prerequisites for a fire drill
        1.  
          Prerequisites for a fire drill in a Volume Replicator environment
        2.  
          Prerequisites for a fire drill in a Hitachi TrueCopy environment
        3.  
          Prerequisites for a fire drill in an EMC SRDF environment
      6. Preparing the fire drill configuration
        1.  
          System Selection panel details
        2.  
          Service Group Selection panel details
        3.  
          Secondary System Selection panel details
        4.  
          Fire Drill Service Group Settings panel details
        5.  
          Disk Selection panel details
        6.  
          Hitachi TrueCopy Path Information panel details
        7.  
          HTCSnap Resource Configuration panel details
        8.  
          SRDFSnap Resource Configuration panel details
        9.  
          Fire Drill Preparation panel details
      7.  
        Running a fire drill
      8.  
        Re-creating a fire drill configuration that has changed
      9.  
        Restoring the fire drill system to a prepared state
      10. Deleting the fire drill configuration
        1.  
          Fire Drill Deletion panel details
      11.  
        Considerations for switching over fire drill service groups
  7. Section VII. Microsoft Clustering Solutions
    1. Microsoft clustering solutions overview
      1.  
        About Microsoft clustering with high availability
      2.  
        About Microsoft clustering with Volume Replicator
      3.  
        About Microsoft clustering with campus clustering
      4. About the SFW-Microsoft clustering-Volume Replicator configuration
        1.  
          Configuring the quorum device for high availability
    2. Deploying SFW with Microsoft failover clustering
      1.  
        Tasks for deploying InfoScale Storage with Microsoft failover clustering
      2.  
        Reviewing the configuration
      3.  
        Configuring the storage hardware and network
      4.  
        Establishing a Microsoft failover cluster
      5. Tasks for installing InfoScale Foundation or InfoScale Storage for Microsoft failover clustering
        1.  
          Pre-installation task: moving the online groups
        2.  
          About installing the Veritas InfoScale products
        3. Installing the server components using the installation wizard
          1.  
            Applying the selected installation and product options to multiple systems
          2.  
            Registering the InfoScale Storage resource DLLs
        4.  
          Installing the client components
        5.  
          Post-installation task: moving the online groups
      6. Creating SFW disk groups and volumes
        1.  
          Planning disk groups and volumes
        2.  
          Creating a dynamic disk group
        3.  
          Creating dynamic volumes
      7.  
        Creating a group for the application in the failover cluster
      8.  
        Installing the application on cluster nodes
      9.  
        Completing the setup of the application group in the failover cluster
      10. Implementing a dynamic quorum resource
        1.  
          Creating a dynamic cluster disk group and a mirrored volume for the quorum resource
        2.  
          Adding a VMDg resource for the quorum
        3.  
          Changing the quorum resource to a dynamic mirrored quorum resource
      11.  
        Verifying the cluster configuration
      12.  
        Configuring InfoScale Storage in an existing Microsoft Failover Cluster
    3. Deploying SFW with Microsoft failover clustering in a campus cluster
      1.  
        Tasks for deploying InfoScale Storage with Microsoft failover clustering in a campus cluster
      2. Reviewing the configuration
        1.  
          Overview of campus clustering with Microsoft clustering
        2. Campus cluster failure with Microsoft clustering scenarios
          1.  
            Dealing with a failover situation
        3. Microsoft clustering quorum and quorum arbitration
          1.  
            Quorum
          2.  
            Cluster ownership of the quorum resource
          3.  
            The vxclus utility
      3.  
        Configuring the storage hardware and network
      4. Establishing a Microsoft failover cluster
        1.  
          Connecting the two nodes
      5. Tasks for installing InfoScale Foundation or InfoScale Storage for Microsoft failover clustering
        1.  
          Pre-installation task: moving the online groups
        2.  
          About installing the Veritas InfoScale products
        3.  
          Post-installation task: moving the online groups
      6. Creating disk groups and volumes
        1.  
          Example disk group and volume configuration in campus cluster
        2.  
          Considerations when creating disks and volumes for campus clusters
        3.  
          Viewing the available disk storage
        4.  
          Creating a dynamic disk group
        5.  
          Adding disks to campus cluster sites
        6.  
          Creating volumes for campus clusters
      7. Implementing a dynamic quorum resource
        1.  
          Creating a dynamic cluster disk group and a mirrored volume for the quorum resource
        2.  
          Adding a VMDg resource for the quorum
        3.  
          Changing the quorum resource to a dynamic mirrored quorum resource
      8.  
        Setting up a group for the application in the failover cluster
      9. Installing the application on the cluster nodes
        1.  
          Pointers for installing the application on the first node
        2.  
          Pointers for installing the application on the second node
      10.  
        Completing the setup of the application group in the cluster
      11.  
        Verifying the cluster configuration
    4. Deploying SFW and VVR with Microsoft failover clustering
      1.  
        Tasks for deploying InfoScale Storage and Volume Replicator with Microsoft failover clustering
      2. Part 1: Setting up the cluster on the primary site
        1. Reviewing the prerequisites and the configuration
          1.  
            Reviewing the configuration
        2.  
          Installing and configuring the hardware
        3.  
          Installing Windows and configuring network settings
        4.  
          Establishing a Microsoft failover cluster
        5.  
          Installing InfoScale Storage (primary site)
        6.  
          Setting up security for Volume Replicator
        7.  
          Creating SFW disk groups and volumes
        8.  
          Completing the primary site configuration
      3. Part 2: Setting up the cluster on the secondary site
        1.  
          Repeating cluster configuration steps for the secondary site
      4. Part 3: Adding the Volume Replicator components for replication
        1.  
          Volume Replicator components overview
        2.  
          Configuring the Replicator Log volumes for Volume Replicator
        3.  
          Creating the Replicated Data Sets with the wizard
        4.  
          Creating resources for Volume Replicator
        5. Creating an RVG resource and setting the dependencies
          1.  
            Creating an RVG resource
          2.  
            Setting the application resource dependency on the RVG resource
      5. Part 4: Maintaining normal operations and recovery procedures
        1.  
          Normal operations: Monitoring the status of the replication
        2.  
          Performing planned migration
        3. Disaster recovery procedures
          1.  
            Bringing up the application on the secondary host
          2.  
            Restoring the primary host
  8. Section VIII. Server Consolidation
    1. Server consolidation overview
      1.  
        Server consolidation definition
      2.  
        Need for implementing server consolidation
      3.  
        Advantages of using SFW with server consolidation
      4.  
        Overview of the server consolidation process
    2. Server consolidation configurations
      1. Typical server consolidation configuration
        1.  
          Proof of concept
      2. Server consolidation configuration 1 - many to one
        1. About this configuration
          1.  
            Proof of concept
          2.  
            Phased approach: Flexible use of storage devices
        2.  
          Preparing to consolidate
        3.  
          Migrating the data to the large server
        4.  
          Adding the storage array
        5.  
          Completing the consolidation process
      3. Server consolidation configuration 2 - many to two: Adding clustering and DMP
        1. About this configuration
          1.  
            More on DMP paths
        2.  
          Adding the new hardware
        3.  
          Establishing the Microsoft failover cluster
        4.  
          Adding SFW support to the cluster
        5.  
          Setting up Microsoft failover cluster groups for the applications
        6.  
          Installing applications on the second computer
        7.  
          Completing the setup of the application group in the Microsoft cluster
        8.  
          Changing the quorum resource to the dynamic quorum resource
        9.  
          Verifying the cluster configuration
        10.  
          Enabling DMP
      4. SFW features that support server consolidation
        1.  
          Automatic volume growth
        2.  
          Features that support storage in a SAN
        3.  
          Performance monitoring

Configuring the cluster using the Cluster Configuration Wizard

After installing the software, set up the components required to run Cluster Server. The VCS Cluster Configuration Wizard (VCW) sets up the cluster infrastructure, including LLT and GAB, the user account for the VCS Helper service, and provides an option for configuring the VCS Authentication Service in the cluster. The wizard also configures the ClusterService group, which contains resources for notification and global clusters (GCO). You can also use VCW to modify or delete cluster configurations.

Note:

After configuring the cluster you must not change the names of the nodes that are part of the cluster. If you wish to change a node name, run VCW to remove the node from the cluster, rename the system, and then run VCW again to add that system to the cluster.

Note the following prerequisites before you proceed:

  • The required network adapters (NICs), and SCSI controllers are installed and connected to each system.

    Veritas recommends the following actions for network adapters:

    • Disable the ethernet auto-negotiation options on the private NICs to prevent:

      • Loss of heartbeats on the private networks

      • VCS from mistakenly declaring a system as offline

      Contact the NIC manufacturer for details on this process.

    • Remove TCP/IP from the private NICs to lower system overhead.

  • Verify that the public network adapters on each node use static IP addresses (DHCP is not supported) and name resolution is configured for each node.

  • Veritas recommends that you use three network adapters (two NICs exclusively for the VCS private network and one for the public network) per system. You can implement the second private link as a low-priority link over a public interface. Route each private NIC through a separate hub or switch to avoid single points of failure. Veritas recommends that you disable TCP/IP from private NICs to lower system overhead.

    Note:

    If you wish to use Windows NIC teaming, you must select the Static Teaming mode. Only the Static Teaming mode is currently supported.

  • Use independent hubs or switches for each VCS communication network (GAB and LLT). You can use cross-over Ethernet cables for two-node clusters. GAB supports hub-based or switch network paths, or two-system clusters with direct network links.

  • Verify the DNS settings for all systems on which the application is installed and ensure that the public adapter is the first adapter in the Connections list.

    When enabling DNS name resolution, make sure that you use the public network adapters, and not those configured for the VCS private network.

  • The logged on user must have local Administrator privileges on the system where you run the wizard. The user account must be a domain user account.

  • The logged on user must have administrative access to all systems selected for cluster operations. Add the domain user account to the local Administrator group of each system.

  • If you plan to create a new user account for the VCS Helper service, the logged on user must have Domain Administrator privileges or must belong to the Domain Account Operators group.

  • When configuring a user account for the Veritas VCS Helper service, make sure that the user account is a domain user. The Veritas High Availability Engine (HAD), which runs in the context of the local system built-in account, uses the Veritas VCS Helper service user context to access the network. This account does not require Domain Administrator privileges.

  • Make sure the VCS Helper service domain user account has "Add workstations to domain" privilege enabled in the Active Directory.

  • Verify that each system can access the storage devices and each system recognizes the attached shared disk.

    Use Windows Disk Management on each system to verify that the attached shared LUNs (virtual disks) are visible.

  • If you plan to set up a disaster recovery (DR) environment, you must configure the wide-area connector process for global clusters.

  • If you are setting up a Replicated Data Cluster configuration, add only the systems in the primary zone (zone 0) to the cluster, at this time.

To configure a VCS cluster using the wizard

  1. Start the VCSCluster Configuration Wizard from the Apps menu on the Start screen.
  2. Read the information on the Welcome panel and click Next.
  3. On the Configuration Options panel, click Cluster Operations and click Next.
  4. On the Domain Selection panel, select or type the name of the domain in which the cluster resides and select the discovery options.

    To discover information about all systems and users in the domain, do the following:

    • Clear Specify systems and users manually.

    • Click Next.

      Proceed to step 8.

    To specify systems and user names manually (recommended for large domains), do the following:

    • Select Specify systems and users manually.

      Additionally, you may instruct the wizard to retrieve a list of systems and users in the domain by selecting appropriate check boxes.

    • Click Next.

      If you chose to retrieve the list of systems, proceed to step 6. Otherwise, proceed to the next step.

  5. On the System Selection panel, type the name of each system to be added, click Add, and then click Next.

    Do not specify systems that are part of another cluster.

    Proceed to step 8.

  6. On the System Selection panel, specify the systems for the cluster and then click Next.

    Do not select systems that are part of another cluster.

    Enter the name of the system and click Add to add the system to the Selected Systems list, or click to select the system in the Domain Systems list and then click the > (right-arrow) button.

  7. The System Report panel displays the validation status, whether Accepted or Rejected, of all the systems you specified earlier. Review the status and then click Next.

    Select the system to see the validation details. If you wish to include a rejected system, rectify the error based on the reason for rejection and then run the wizard again.

    A system can be rejected for any of the following reasons:

    • System is not pingable.

    • WMI access is disabled on the system.

    • Wizard is unable to retrieve the system architecture or operating system.

    • Product is either not installed or there is a version mismatch.

  8. On the Cluster Configuration Options panel, click Create New Cluster and then click Next.
  9. On the Cluster Details panel, specify the details for the cluster and then click Next.

    Specify the cluster details as follows:

    Cluster Name

    Type a name for the new cluster. Veritas recommends a maximum length of 32 characters for the cluster name.

    Cluster ID

    Select a cluster ID from the suggested cluster IDs in the drop-down list, or type a unique ID for the cluster. The cluster ID can be any number from 0 to 65535.

    Note:

    If you chose to specify systems and users manually in step 4 or if you share a private network between more than one domain, make sure that the cluster ID is unique.

    Operating System

    From the drop-down list, select the operating system.

    All the systems in the cluster must have the same operating system and architecture.

    Available Systems

    Select the systems that you wish to configure in the cluster.

    Check the Select all systems check box to select all the systems simultaneously.

    The wizard discovers the NICs on the selected systems. For single-node clusters with the required number of NICs, the wizard prompts you to configure a private link heartbeat. In the dialog box, click Yes to configure a private link heartbeat.

  10. The wizard validates the selected systems for cluster membership. After the systems are validated, click Next.

    If a system is not validated, review the message associated with the failure and restart the wizard after rectifying the problem.

    If you chose to configure a private link heartbeat in step 9, proceed to the next step. Otherwise, proceed to step 12.

  11. On the Private Network Configuration panel, configure the VCS private network and then click Next. You can configure the VCS private network either over the ethernet or over the User Datagram Protocol (UDP) layer using IPv4 or IPv6 network.

    Do one of the following:

    • To configure the VCS private network over ethernet, complete the following steps:

    • Select Configure LLT over Ethernet.

    • Select the check boxes next to the two NICs to be assigned to the private network. You can assign a maximum of eight network links.

      Veritas recommends reserving two NICs exclusively for the private network. However, you could lower the priority of one of the NICs and use the low-priority NIC for both public and as well as private communication.

    • If there are only two NICs on a selected system, Veritas recommends that you lower the priority of at least one NIC that will be used for private as well as public network communication.

      To lower the priority of a NIC, right-click the NIC and select Low Priority from the pop-up menu.

    • If your configuration contains teamed NICs, the wizard groups them as "NIC Group #N" where "N" is a number assigned to the teamed NIC. A teamed NIC is a logical NIC, formed by grouping several physical NICs together. All NICs in a team have an identical MAC address. Veritas recommends that you do not select teamed NICs for the private network.

      The wizard configures the LLT service (over ethernet) on the selected network adapters.

    • To configure the VCS private network over the User Datagram Protocol (UDP) layer, complete the following steps:

    • Select Configure LLT over UDP on IPv4 network or Configure LLT over UDP on IPv6 network depending on the IP protocol that you wish to use.

      The IPv6 option is disabled if the network does not support IPv6.

    • Select the check boxes next to the NICs to be assigned to the private network. You can assign a maximum of eight network links. Veritas recommends reserving two NICs exclusively for the VCS private network.

    • For each selected NIC, verify the displayed IP address. If a selected NIC has multiple IP addresses assigned, double-click the field and choose the desired IP address from the drop-down list. In case of IPv4, each IP address can be in a different subnet.

      The IP address is used for the VCS private communication over the specified UDP port.

    • Specify a unique UDP port for each of the link. Click Edit Ports if you wish to edit the UDP ports for the links. You can use ports in the range 49152 to 65535. The default ports numbers are 50000 and 50001 respectively. Click OK.

      For each selected NIC, double-click the respective field in the Link column and choose a link from the drop-down list. Specify a different link (Link1 or Link2) for each NIC. Each link is associated with a UDP port that you specified earlier.

      The wizard configures the LLT service (over UDP) on the selected network adapters. The specified UDP ports are used for the private network communication.

  12. On the VCS Helper Service User Account panel, specify the name of a domain user for the VCS Helper service.

    The Veritas High Availability Engine (HAD), which runs in the context of the local system built-in account, uses the Veritas VCS Helper service user context to access the network. This account does not require Domain Administrator privileges.

    Specify the domain user details as follows:

    • To specify an existing user, do one of the following:

      • Click Existing user and select a user name from the drop-down list.

      • If you chose not to retrieve the list of users in step 4, type the user name in the Specify User field and then click Next.

    • To specify a new user, click New user and type a valid user name in the Create New User field and then click Next.

      Do not append the domain name to the user name; do not type the user name as Domain\user or user@domain.

    • In the Password dialog box, type the password for the specified user and click OK, and then click Next.

  13. On the Configure Security Service Option panel, specify security options for the cluster communications and then click Next.

    Do one of the following:

    • To use VCS cluster user privileges, click Use VCS User Privileges and then type a user name and password.

      The wizard configures this user as a VCS Cluster Administrator. In this mode, communication between cluster nodes and clients, including Cluster Manager (Java Console), occurs using the encrypted VCS cluster administrator credentials. The wizard uses the VCSEncrypt utility to encrypt the user password.

      The default user name for the VCS administrator is admin and the password is password. Both are case-sensitive. You can accept the default user name and password for the VCS administrator account or type a new name and password.

      Veritas recommends that you specify a new user name and password.

    • To use the single sign-on feature, click Use Single Sign-on.

      In this mode, the VCS Authentication Service is used to secure communication between cluster nodes and clients by using digital certificates for authentication and SSL to encrypt communication over the public network. VCS uses SSL encryption and platform-based authentication. The Veritas High Availability Engine (HAD) and Veritas Command Server run in secure mode.

      The wizard configures all the cluster nodes as root brokers (RB) and authentication brokers (AB). Authentication brokers serve as intermediate registration and certification authorities. Authentication brokers have certificates signed by the root. These brokers can authenticate clients such as users and services. The wizard creates a copy of the certificates on all the cluster nodes.

  14. Review the summary information on the Summary panel, and click Configure.

    The wizard configures the VCS private network. If the selected systems have LLT or GAB configuration files, the wizard displays an informational dialog box before overwriting the files. In the dialog box, click OK to overwrite the files. Otherwise, click Cancel, exit the wizard, move the existing files to a different location, and rerun the wizard.

    The wizard starts running commands to configure VCS services. If an operation fails, click View configuration log file to see the log.

  15. On the Completing Cluster Configuration panel, click Next to configure the ClusterService group; this group is required to set up components for notification and for global clusters.

    To configure the ClusterService group later, click Finish.

    At this stage, the wizard has collected the information required to set up the cluster configuration. After the wizard completes its operations, with or without the ClusterService group components, the cluster is ready to host application service groups. The wizard also starts the VCS engine (HAD) and the Veritas Command Server at this stage.

  16. On the Cluster Service Components panel, select the components to be configured in the ClusterService group and then click Next.

    Do the following:

    • Check the Notifier Option check box to configure notification of important events to designated recipients.

    • Check the GCO Option check box to configure the wide-area connector (WAC) process for global clusters.The WAC process is required for inter-cluster communication.

      Configure the GCO Option using this wizard only if you are configuring a Disaster Recovery (DR) environment and are not using the Disaster Recovery wizard.

      You can configure the GCO Option using the DR wizard. The Disaster Recovery chapters in the application solutions guides discuss how to use the Disaster Recovery wizard to configure the GCO option.

More Information

Configuring notification