InfoScale™ 9.0 Storage Foundation and High Availability Configuration and Upgrade Guide - Linux
- Section I. Introduction to SFHA
- Section II. Configuration of SFHA
- Preparing to configure
- Preparing to configure SFHA clusters for data integrity
- About planning to configure I/O fencing
- Setting up the CP server
- Configuring the CP server manually
- Configuring CP server using response files
- Configuring SFHA
- Configuring Storage Foundation High Availability using the installer
- Configuring a secure cluster node by node
- Completing the SFHA configuration
- Verifying and updating licenses on the system
- Configuring Storage Foundation High Availability using the installer
- Configuring SFHA clusters for data integrity
- Setting up disk-based I/O fencing using installer
- Setting up server-based I/O fencing using installer
- Manually configuring SFHA clusters for data integrity
- Setting up disk-based I/O fencing manually
- Setting up server-based I/O fencing manually
- Configuring server-based fencing on the SFHA cluster manually
- Setting up non-SCSI-3 fencing in virtual environments manually
- Setting up majority-based I/O fencing manually
- Performing an automated SFHA configuration using response files
- Performing an automated I/O fencing configuration using response files
- Section III. Upgrade of SFHA
- Planning to upgrade SFHA
- Preparing to upgrade SFHA
- Upgrading Storage Foundation and High Availability
- Performing a rolling upgrade of SFHA
- Performing a phased upgrade of SFHA
- About phased upgrade
- Performing a phased upgrade using the product installer
- Performing an automated SFHA upgrade using response files
- Upgrading SFHA using YUM
- Performing post-upgrade tasks
- Post-upgrade tasks when VCS agents for VVR are configured
- About enabling LDAP authentication for clusters that run in secure mode
- Planning to upgrade SFHA
- Section IV. Post-installation tasks
- Section V. Adding and removing nodes
- Adding a node to SFHA clusters
- Adding the node to a cluster manually
- Adding a node using response files
- Configuring server-based fencing on the new node
- Removing a node from SFHA clusters
- Removing a node from a SFHA cluster
- Removing a node from a SFHA cluster
- Adding a node to SFHA clusters
- Section VI. Configuration and upgrade reference
- Appendix A. Installation scripts
- Appendix B. SFHA services and ports
- Appendix C. Configuration files
- Appendix D. Configuring the secure shell or the remote shell for communications
- Appendix E. Sample SFHA cluster setup diagrams for CP server-based I/O fencing
- Appendix F. Configuring LLT over UDP
- Using the UDP layer for LLT
- Manually configuring LLT over UDP using IPv4
- Using the UDP layer of IPv6 for LLT
- Manually configuring LLT over UDP using IPv6
- About configuring LLT over UDP multiport
- Appendix G. Using LLT over RDMA
- Configuring LLT over RDMA
- Configuring RDMA over an Ethernet network
- Configuring RDMA over an InfiniBand network
- Tuning system performance
- Manually configuring LLT over RDMA
- Troubleshooting LLT over RDMA
Setting up non-SCSI-3 I/O fencing in virtual environments using installer
If you have installed Arctera InfoScale Enterprise in virtual environments that do not support SCSI-3 PR-compliant storage, you can configure non-SCSI-3 fencing.
To configure I/O fencing using the installer in a non-SCSI-3 PR-compliant setup
- Start the installer with -fencing option.
# /opt/VRTS/install/installer -fencing
The installer starts with a copyright message and verifies the cluster information.
- Confirm that you want to proceed with the I/O fencing configuration at the prompt.
The program checks that the local node running the script can communicate with remote nodes and checks whether SFHA 9.0 is configured properly.
- For server-based fencing, review the I/O fencing configuration options that the program presents. Type 1 to configure server-based I/O fencing.
Select the fencing mechanism to be configured in this Application Cluster [1-7,q] 1
- Enter n to confirm that your storage environment does not support SCSI-3 PR.
Does your storage environment support SCSI3 PR? [y,n,q] (y) n
- Confirm that you want to proceed with the non-SCSI-3 I/O fencing configuration at the prompt.
- For server-based fencing, enter the number of CP server coordination points you want to use in your setup.
- The installer assumes that these values are identical from the view of the SFHA cluster nodes that host the applications for high availability.
For server-based fencing, enter the following details for each CP server:
Enter the virtual IP address or the fully qualified host name.
Enter the port address on which the CP server listens for connections.
The default value is 443. You can enter a different port address. Valid values are between 49152 and 65535.
- For server-based fencing, verify and confirm the CP server information that you provided.
- Verify and confirm the SFHA cluster configuration information.
Review the output as the installer performs the following tasks:
Updates the CP server configuration files on each CP server with the following details for only server-based fencing, :
Registers each node of the SFHA cluster with the CP server.
Adds CP server user to the CP server.
Adds SFHA cluster to the CP server user.
Updates the following configuration files on each node of the SFHA cluster
/etc/vxfenmode
file/etc/vxenviron
file/etc/sysconfig/vxfen
file/etc/llttab
file/etc/vxfentab
(only for server-based fencing)
- Review the output as the installer stops SFHA on each node, starts I/O fencing on each node, updates the VCS configuration file main.cf, and restarts SFHA with non-SCSI-3 fencing.
For server-based fencing, confirm to configure the CP agent on the SFHA cluster.
- Confirm whether you want to send the installation information to us.
- After the installer configures I/O fencing successfully, note the location of summary, log, and response files that installer creates.
The files provide useful information which can assist you with the configuration, and can also assist future configurations.