InfoScale™ 9.0 Cluster Server Administrator's Guide - Windows
- Section I. Clustering concepts and terminology
- Introducing Cluster Server
- About Cluster Server
- About cluster control guidelines
- About the physical components of VCS
- Logical components of VCS
- Types of service groups
- Agent classifications
- About cluster control, communications, and membership
- About security services
- About cluster topologies
- VCS configuration concepts
- Introducing Cluster Server
- Section II. Administration - Putting VCS to work
- About the VCS user privilege model
- Getting started with VCS
- Administering the cluster from the command line
- About administering VCS from the command line
- Stopping the VCS engine and related processes
- About managing VCS configuration files
- About managing VCS users from the command line
- About querying VCS
- About administering service groups
- Modifying service group attributes
- About administering resources
- About administering resource types
- About administering clusters
- Configuring resources and applications in VCS
- About configuring resources and applications
- About Virtual Business Services
- About Intelligent Resource Monitoring (IMF)
- About fast failover
- How VCS monitors storage components
- About storage configuration
- About configuring network resources
- About configuring file shares
- About configuring IIS sites
- About configuring services
- Before you configure a service using the GenericService agent
- About configuring processes
- About configuring Microsoft Message Queuing (MSMQ)
- About configuring the infrastructure and support agents
- About configuring applications using the Application Configuration Wizard
- Adding resources to a service group
- About application monitoring on single-node clusters
- Configuring the service group in a non-shared storage environment
- About the VCS Application Manager utility
- About testing resource failover using virtual fire drills
- Modifying the cluster configuration
- Section III. Administration - Beyond the basics
- Controlling VCS behavior
- VCS behavior on resource faults
- About controlling VCS behavior at the service group level
- Customized behavior diagrams
- VCS behavior for resources that support the intentional offline functionality
- About controlling VCS behavior at the resource level
- Service group workload management
- Sample configurations depicting workload management
- The role of service group dependencies
- VCS event notification
- VCS event triggers
- List of event triggers
- Controlling VCS behavior
- Section IV. Cluster configurations for disaster recovery
- Connecting clusters–Creating global clusters
- VCS global clusters: The building blocks
- About global cluster management
- About serialization - The Authority attribute
- Prerequisites for global clusters
- Setting up a global cluster
- Configuring replication resources in VCS
- About IPv6 support with global clusters
- About cluster faults
- About setting up a disaster recovery fire drill
- Test scenario for a multi-tiered environment
- Administering global clusters from Cluster Manager (Java console)
- Administering global clusters from the command line
- About global querying in a global cluster setup
- Administering clusters in global cluster setup
- Setting up replicated data clusters
- Connecting clusters–Creating global clusters
- Section V. Troubleshooting and performance
- VCS performance considerations
- How cluster components affect performance
- How cluster operations affect performance
- VCS performance consideration when a system panics
- VCS agent statistics
- Troubleshooting and recovery for VCS
- VCS message logging
- Handling network failure
- Troubleshooting VCS startup
- Troubleshooting service groups
- Troubleshooting and recovery for global clusters
- VCS utilities
- VCS performance considerations
- Section VI. Appendixes
- Appendix A. VCS user privileges—administration matrices
- Appendix B. Cluster and system states
- Appendix C. VCS attributes
- Appendix D. Configuring LLT over UDP
- Appendix E. Handling concurrency violation in any-to-any configurations
- Appendix F. Accessibility and VCS
- Appendix G. Executive Order logging
Reconfiguring a cluster
You may need to reconfigure your cluster after changing an adapter on a cluster node, to update the LLT information, or to configure Veritas Security Services.
To reconfigure a cluster
- Launch the Cluster Configuration Wizard from the Apps menu on the Start screen.
- Read the information on the Welcome panel and click Next.
- In the Configuration Options panel, click Cluster Operations and click Next.
- In the Domain Selection panel, select or type the name of the domain in which the cluster resides and click Next.
To discover information about all the systems and users in the domain
Uncheck the Specify systems and users manually check box.
Click Next.
Proceed to step 8.
To specify systems and user names manually (recommended for large domains)
Check the Specify systems and users manually check box.
Additionally, you may instruct the wizard to retrieve a list of systems and users in the domain by selecting appropriate check boxes.
Click Next.
If you checked Retrieve system list from domain, proceed to step 6. Otherwise proceed to the next step.
- In the System Selection panel, type the name of the system and click Add.
Proceed to step 8.
- In the System Selection panel, specify the systems for the cluster to be reconfigured.
Enter the system name and click Add to add the system to the Selected Systems list. Alternatively, you can select the systems from the Domain Systems list and click the right-arrow icon.
If you specify only one node of an existing cluster, the wizard discovers all nodes for that cluster.
- The System Report panel displays the validation status, whether Accepted or Rejected, of all the systems you specified earlier.
A system can be rejected for any of the following reasons:
The system does not respond to a ping request.
WMI access is disabled on the system.
The wizard is unable to retrieve information about the system's architecture or operating system.
VCS is either not installed on the system or the version of VCS is different from what is installed on the system on which you are running the wizard.
Click on a system name to see the validation details. If you wish to include a rejected system, rectify the error based on the reason for rejection and then run the wizard again.
Click Next to proceed.
- In the Cluster Configuration Options panel, click Edit Existing Cluster and click Next.
- In the Cluster Selection panel, select the cluster to be reconfigured and click Next. If you chose to specify the systems manually in step 4, only the clusters configured with the specified systems are displayed.
- In the Edit Cluster Options panel, click Reconfigure and click Next.
In the Cluster User Information dialog box, enter the user name and password for a user with administrative privileges to the cluster and click OK.
The Cluster User Information dialog box appears only when you reconfigure a non-secure cluster.
In the second Edit Cluster Options dialog box, select any of the following options and click Next:
Change private network heartbeat links
Select this option to change the private network heartbeat links. If the selected cluster is a single-node cluster, the option is to remove the private heartbeat links.
If the cluster has more than one node, the options are to add or remove private heartbeat links.
See step 12.
Change HAD Helper User account
Selection this options to change the user account for the VCS Helper service.
See step 13.
Configure VCS Authentication Service
Select this option to configure the VCS authentication service for single sign-on. Single sign-on configures a secure cluster.
If the option to change the private network heartbeat links was selected, do one of the following:
To configure the VCS private network over Ethernet, do the following:
Select the check boxes next to the two NICs to be assigned to the private network.
Arctera recommends reserving two NICs exclusively for the private network. However, you could lower the priority of one NIC and use the low-priority NIC for public and private communication.
If you have only two NICs on a selected system, it is recommended that you lower the priority of at least one NIC that will be used for private as well as public network communication.
To lower the priority of a NIC, right-click the NIC and select Low Priority from the pop-up menu.
If your configuration contains teamed NICs, the wizard groups them as "NIC Group #N" where "N" is a number assigned to the teamed NIC. A teamed NIC is a logical NIC, formed by grouping several physical NICs together. All NICs in a team have an identical MAC address. Arctera recommends that you do not select teamed NICs for the private network.
The wizard configures the LLT service (over UDP) on the selected network adapters. The specified UDP ports are used for the private network communication.The wizard will configure the LLT service (over Ethernet) on the selected network adapters.
To configure the VCS private network over the User Datagram Protocol (UDP) layer, do the following:
Select Configure LLT over UDP on IPv4 network or Configure LLT over UDP on IPv6 network depending on how LLT is configured on the existing nodes in the cluster.
Select the check boxes next to the NICs to be assigned to the private network. You can assign maximum eight network links.
Arctera recommends reserving two NICs exclusively for the VCS private network.
If you have only two NICs on a selected system, it is recommended that you lower the priority of at least one NIC that will be used for private as well as public network communication.
To lower the priority of a NIC, right-click the NIC and select Low Priority from the pop-up menu.
Specify a unique UDP port for each of the link. Click Edit Ports if you wish to edit the UDP ports for the links. The default ports numbers are 50000 to 50007. You can use ports in the range 49152 to 65535. Click OK.
For each selected NIC, verify the displayed IP address. If a selected NIC has multiple IP addresses assigned, double-click the field and choose the desired IP address from the drop-down list. In case of IPv4, each IP address can be in a different subnet.
The IP address is used for the VCS private communication over the specified UDP port.
For each selected NIC, double-click the respective field in the Link column and choose a link from the drop-down list. Specify a different link (Link1 or Link2) for each NIC. Each link is associated with a UDP port that you specified earlier.
- If the option to change the VCS HAD Helper User account was selected, in the VCS Helper Service User Account dialog box, specify the name of a domain user in whose context the VCS Helper service will run.
The VCS High Availability Daemon, which runs in the context of the local system built-in account, uses the VCS Helper service user context to access the network.
Select one of the following:
Existing user
Choose an existing user account context for the VCS Helper service.
New user
Create a new user account context for the VCS Helper service.
Enter a valid user name for the selected account and click Next.
Do not append the domain name to the user name; do not enter user names as DOMAIN\user or user@DOMAIN.
Enter a password for the selected account and click OK.
- Review the summary information and click Reconfigure.
- The wizard starts running commands to apply the changes. After all services have been successfully configured, click Finish.