Storage Foundation and High Availability 8.0.2 Configuration and Upgrade Guide - Linux
- Section I. Introduction to SFHA
- Introducing Storage Foundation and High Availability
- Section II. Configuration of SFHA
- Preparing to configure
- Preparing to configure SFHA clusters for data integrity
- About planning to configure I/O fencing
- Setting up the CP server
- Configuring the CP server manually
- Configuring CP server using response files
- Configuring SFHA
- Configuring Storage Foundation High Availability using the installer
- Configuring a secure cluster node by node
- Completing the SFHA configuration
- Verifying and updating licenses on the system
- Configuring Storage Foundation High Availability using the installer
- Configuring SFHA clusters for data integrity
- Setting up disk-based I/O fencing using installer
- Setting up server-based I/O fencing using installer
- Manually configuring SFHA clusters for data integrity
- Setting up disk-based I/O fencing manually
- Setting up server-based I/O fencing manually
- Configuring server-based fencing on the SFHA cluster manually
- Setting up non-SCSI-3 fencing in virtual environments manually
- Setting up majority-based I/O fencing manually
- Performing an automated SFHA configuration using response files
- Performing an automated I/O fencing configuration using response files
- Section III. Upgrade of SFHA
- Planning to upgrade SFHA
- Preparing to upgrade SFHA
- Upgrading Storage Foundation and High Availability
- Performing a rolling upgrade of SFHA
- Performing a phased upgrade of SFHA
- About phased upgrade
- Performing a phased upgrade using the product installer
- Performing an automated SFHA upgrade using response files
- Performing post-upgrade tasks
- Post-upgrade tasks when VCS agents for VVR are configured
- About enabling LDAP authentication for clusters that run in secure mode
- Planning to upgrade SFHA
- Section IV. Post-installation tasks
- Section V. Adding and removing nodes
- Adding a node to SFHA clusters
- Adding the node to a cluster manually
- Adding a node using response files
- Configuring server-based fencing on the new node
- Removing a node from SFHA clusters
- Removing a node from a SFHA cluster
- Removing a node from a SFHA cluster
- Adding a node to SFHA clusters
- Section VI. Configuration and upgrade reference
- Appendix A. Installation scripts
- Appendix B. SFHA services and ports
- Appendix C. Configuration files
- Appendix D. Configuring the secure shell or the remote shell for communications
- Appendix E. Sample SFHA cluster setup diagrams for CP server-based I/O fencing
- Appendix F. Configuring LLT over UDP
- Using the UDP layer for LLT
- Manually configuring LLT over UDP using IPv4
- Using the UDP layer of IPv6 for LLT
- Manually configuring LLT over UDP using IPv6
- About configuring LLT over UDP multiport
- Appendix G. Using LLT over RDMA
- Configuring LLT over RDMA
- Configuring RDMA over an Ethernet network
- Configuring RDMA over an InfiniBand network
- Tuning system performance
- Manually configuring LLT over RDMA
- Troubleshooting LLT over RDMA
Configuring disk-based I/O fencing using installer
Note:
The installer stops and starts SFHA to complete I/O fencing configuration. Make sure to unfreeze any frozen VCS service groups in the cluster for the installer to successfully stop SFHA.
To set up disk-based I/O fencing using the installer
- Start the installer with -fencing option.
# /opt/VRTS/install/installer -fencing
The installer starts with a copyright message and verifies the cluster information.
Note the location of log files which you can access in the event of any problem with the configuration process.
- Enter the host name of one of the systems in the cluster.
- Confirm that you want to proceed with the I/O fencing configuration at the prompt.
The program checks that the local node running the script can communicate with remote nodes and checks whether SFHA 8.0.2 is configured properly.
- Review the I/O fencing configuration options that the program presents. Type 2 to configure disk-based I/O fencing.
1. Configure Coordination Point client based fencing 2. Configure disk based fencing 3. Configure majority based fencing 4. Configure fencing in disabled mode Select the fencing mechanism to be configured in this Application Cluster [1-4,q.?] 2
- Review the output as the configuration program checks whether VxVM is already started and is running.
If the check fails, configure and enable VxVM before you repeat this procedure.
If the check passes, then the program prompts you for the coordinator disk group information.
- Choose whether to use an existing disk group or create a new disk group to configure as the coordinator disk group.
The program lists the available disk group names and provides an option to create a new disk group. Perform one of the following:
To use an existing disk group, enter the number corresponding to the disk group at the prompt.
The program verifies whether the disk group you chose has an odd number of disks and that the disk group has a minimum of three disks.
To create a new disk group, perform the following steps:
Enter the number corresponding to the Create a new disk group option.
The program lists the available disks that are in the CDS disk format in the cluster and asks you to choose an odd number of disks with at least three disks to be used as coordinator disks.
Veritas recommends that you use three disks as coordination points for disk-based I/O fencing.
If the available VxVM CDS disks are less than the required, installer asks whether you want to initialize more disks as VxVM disks. Choose the disks you want to initialize as VxVM disks and then use them to create new disk group.
Enter the numbers corresponding to the disks that you want to use as coordinator disks.
Enter the disk group name.
- Verify that the coordinator disks you chose meet the I/O fencing requirements.
You must verify that the disks are SCSI-3 PR compatible using the vxfentsthdw utility and then return to this configuration program.
- After you confirm the requirements, the program creates the coordinator disk group with the information you provided.
- Verify and confirm the I/O fencing configuration information that the installer summarizes.
Review the output as the configuration program does the following:
Stops VCS and I/O fencing on each node.
Configures disk-based I/O fencing and starts the I/O fencing process.
Updates the VCS configuration file main.cf if necessary.
Copies the /etc/vxfenmode file to a date and time suffixed file /etc/vxfenmode-date-time. This backup file is useful if any future fencing configuration fails.
Updates the I/O fencing configuration file /etc/vxfenmode.
Starts VCS on each node to make sure that the SFHA is cleanly configured to use the I/O fencing feature.
- Review the output as the configuration program displays the location of the log files, the summary files, and the response files.
- Configure the Coordination Point Agent.
Do you want to configure Coordination Point Agent on the client cluster? [y,n,q] (y)
- Enter a name for the service group for the Coordination Point Agent.
Enter a non-existing name for the service group for Coordination Point Agent: [b] (vxfen) vxfen
- Set the level two monitor frequency.
Do you want to set LevelTwoMonitorFreq? [y,n,q] (y)
- Decide the value of the level two monitor frequency.
Enter the value of the LevelTwoMonitorFreq attribute: [b,q,?] (5)
Installer adds Coordination Point Agent and updates the main configuration file.
- Enable auto refresh of coordination points.
Do you want to enable auto refresh of coordination points if registration keys are missing on any of them? [y,n,q,b,?] (n)
See Configuring CoordPoint agent to monitor coordination points.