Please enter search query.
Search <book_title>...
Cluster Server 8.0.2 Administrator's Guide - Windows
Last Published:
2024-05-25
Product(s):
InfoScale & Storage Foundation (8.0.2)
Platform: Windows
- Section I. Clustering concepts and terminology
- Introducing Cluster Server
- About Cluster Server
- About cluster control guidelines
- About the physical components of VCS
- Logical components of VCS
- Types of service groups
- Agent classifications
- About cluster control, communications, and membership
- About security services
- About cluster topologies
- VCS configuration concepts
- Introducing Cluster Server
- Section II. Administration - Putting VCS to work
- About the VCS user privilege model
- Getting started with VCS
- Administering the cluster from the command line
- About administering VCS from the command line
- Stopping the VCS engine and related processes
- About managing VCS configuration files
- About managing VCS users from the command line
- About querying VCS
- About administering service groups
- Modifying service group attributes
- About administering resources
- About administering resource types
- About administering clusters
- Configuring resources and applications in VCS
- About configuring resources and applications
- About Virtual Business Services
- About Intelligent Resource Monitoring (IMF)
- About fast failover
- How VCS monitors storage components
- About storage configuration
- About configuring network resources
- About configuring file shares
- About configuring IIS sites
- About configuring services
- Before you configure a service using the GenericService agent
- About configuring processes
- About configuring Microsoft Message Queuing (MSMQ)
- About configuring the infrastructure and support agents
- About configuring applications using the Application Configuration Wizard
- Adding resources to a service group
- Configuring the service group in a non-shared storage environment
- About the VCS Application Manager utility
- About testing resource failover using virtual fire drills
- Modifying the cluster configuration
- Section III. Administration - Beyond the basics
- Controlling VCS behavior
- VCS behavior on resource faults
- About controlling VCS behavior at the service group level
- Customized behavior diagrams
- VCS behavior for resources that support the intentional offline functionality
- About controlling VCS behavior at the resource level
- Service group workload management
- Sample configurations depicting workload management
- The role of service group dependencies
- VCS event notification
- VCS event triggers
- List of event triggers
- Controlling VCS behavior
- Section IV. Cluster configurations for disaster recovery
- Connecting clusters–Creating global clusters
- VCS global clusters: The building blocks
- About global cluster management
- About serialization - The Authority attribute
- Prerequisites for global clusters
- Setting up a global cluster
- Configuring replication resources in VCS
- About IPv6 support with global clusters
- About cluster faults
- About setting up a disaster recovery fire drill
- Test scenario for a multi-tiered environment
- Administering global clusters from Cluster Manager (Java console)
- Administering global clusters from the command line
- About global querying in a global cluster setup
- Administering clusters in global cluster setup
- Setting up replicated data clusters
- Connecting clusters–Creating global clusters
- Section V. Troubleshooting and performance
- VCS performance considerations
- How cluster components affect performance
- How cluster operations affect performance
- VCS performance consideration when a system panics
- VCS agent statistics
- Troubleshooting and recovery for VCS
- VCS message logging
- Handling network failure
- Troubleshooting VCS startup
- Troubleshooting service groups
- Troubleshooting and recovery for global clusters
- VCS utilities
- VCS performance considerations
- Section VI. Appendixes
- Appendix A. VCS user privileges—administration matrices
- Appendix B. Cluster and system states
- Appendix C. VCS attributes
- Appendix D. Configuring LLT over UDP
- Appendix E. Handling concurrency violation in any-to-any configurations
- Appendix F. Accessibility and VCS
- Appendix G. Executive Order logging
About sample XML configuration
Sample XML configuration files are provided for reference.
For two-node secure cluster configuration with LLT over ethernet:
Use this configuration file to create a secure cluster with systems SYSTEM1 and SYSTEM2.
<Operation Type="New"> <Domain Name="DOMAIN.com"> <SystemList> <System Name="SYSTEM1"/> <System Name="SYSTEM2"/> </SystemList> <Cluster Name="MYCLUSTER" ID="0"> <Node Name="SYSTEM1"> <LLTLink Name="Adapter0" MAC="00:03:47:08:91:56" LowPri="0"/> <LLTLink Name="Adapter1" MAC="00:03:47:08:91:C6" LowPri="0"/> </Node> <Node Name="SYSTEM2"> <LLTLink Name="Adapter0" MAC="00:03:47:08:91:CC" LowPri="0"/> <LLTLink Name="Adapter1" MAC="00:03:47:08:94:4E" LowPri="0"/> </Node> <Security Type="Secured"> <VxSSRoot Name="SYSTEM1"/> </Security> <HadHelperUser Name="Administrator" Password="hvnTkvK"/> </Cluster> </Domain> </Operation>
For two-node secure cluster configuration with LLT over UDP:
Use this configuration file to create a secure cluster with systems SYSTEM1 and SYSTEM2.
<Operation Type="new"> <Domain Name="DOMAIN.com"> <Cluster Name="MYCLUSTER" ID="1" UseUDP="1"> <Node Name="SYSTEM1"> <LLTLink Name="Adapter1" MAC="00:50:56:91:50:97" UDPLinkIP="XX.XXX.XXX.10" UDPPort="50000" LowPri="0"/> <LLTLink Name="Adapter2" MAC="00:50:56:91:9A:AC" UDPLinkIP="XX.XXX.XXX.11" UDPPort="50001" LowPri="1"/> </Node> <Node Name="SYSTEM2"> <LLTLink Name="Adapter1" MAC="00:50:56:91:F0:29" UDPLinkIP="XX.XXX.XXX.13" UDPPort="50000" LowPri="0"/> <LLTLink Name="Adapter2" MAC="00:50:56:91:50:00" UDPLinkIP="XX.XXX.XXX.90" UDPPort="50001" LowPri="1"/> </Node> <Security Type="Secured"></Security> <HadHelperUser Name="Administrator" Password="pass@123"/> </Cluster> <SystemList> <System Name="SYSTEM1"/> <System Name="SYSTEM2"/> </SystemList> </Domain> </Operation>
For two-node secure cluster deletion:
Use this configuration file to delete a secure cluster with systems SYSTEM1 and SYSTEM2.
<Operation Type="Delete"> <Domain Name="DOMAIN.com"> <SystemList> <System Name="SYSTEM1"/> <System Name="SYSTEM2"/> </SystemList> <Cluster Name="MYCLUSTER" ID="0" ConnecttoCluster="No" IgnoreOfflineGroups="Yes"> <Security Type="Secured"> <VxSSRoot Name="SYSTEM1"/> </Security> <HadHelperUser Remove="No" Name=" Administrator" Password="hvnTkvK"/> </Cluster> </Domain> </Operation>