Cluster Server 7.4.1 Administrator's Guide - Linux
- Section I. Clustering concepts and terminology
- Introducing Cluster Server
- About Cluster Server
- About cluster control guidelines
- About the physical components of VCS
- Logical components of VCS
- Types of service groups
- About resource monitoring
- Agent classifications
- About cluster control, communications, and membership
- About security services
- Components for administering VCS
- About cluster topologies
- VCS configuration concepts
- Introducing Cluster Server
- Section II. Administration - Putting VCS to work
- About the VCS user privilege model
- Administering the cluster from the command line
- About administering VCS from the command line
- About installing a VCS license
- Administering LLT
- Starting VCS
- Stopping the VCS engine and related processes
- Logging on to VCS
- About managing VCS configuration files
- About managing VCS users from the command line
- About querying VCS
- About administering service groups
- Modifying service group attributes
- About administering resources
- Enabling and disabling IMF for agents by using script
- Linking and unlinking resources
- About administering resource types
- About administering clusters
- Configuring applications and resources in VCS
- VCS bundled agents for UNIX
- Configuring NFS service groups
- About NFS
- Configuring NFS service groups
- Sample configurations
- About configuring the RemoteGroup agent
- About configuring Samba service groups
- About testing resource failover by using HA fire drills
- Predicting VCS behavior using VCS Simulator
- Section III. VCS communication and operations
- About communications, membership, and data protection in the cluster
- About cluster communications
- About cluster membership
- About membership arbitration
- About membership arbitration components
- About server-based I/O fencing
- About majority-based fencing
- About the CP server service group
- About secure communication between the VCS cluster and CP server
- About data protection
- Examples of VCS operation with I/O fencing
- About cluster membership and data protection without I/O fencing
- Examples of VCS operation without I/O fencing
- Administering I/O fencing
- About the vxfentsthdw utility
- Testing the coordinator disk group using the -c option of vxfentsthdw
- About the vxfenadm utility
- About the vxfenclearpre utility
- About the vxfenswap utility
- About administering the coordination point server
- About configuring a CP server to support IPv6 or dual stack
- About migrating between disk-based and server-based fencing configurations
- Migrating between fencing configurations using response files
- Controlling VCS behavior
- VCS behavior on resource faults
- About controlling VCS behavior at the service group level
- About AdaptiveHA
- Customized behavior diagrams
- About preventing concurrency violation
- VCS behavior for resources that support the intentional offline functionality
- VCS behavior when a service group is restarted
- About controlling VCS behavior at the resource level
- VCS behavior on loss of storage connectivity
- Service group workload management
- Sample configurations depicting workload management
- The role of service group dependencies
- About communications, membership, and data protection in the cluster
- Section IV. Administration - Beyond the basics
- VCS event notification
- VCS event triggers
- Using event triggers
- List of event triggers
- Virtual Business Services
- Section V. Veritas High Availability Configuration wizard
- Introducing the Veritas High Availability Configuration wizard
- Administering application monitoring from the Veritas High Availability view
- Administering application monitoring from the Veritas High Availability view
- Administering application monitoring from the Veritas High Availability view
- Section VI. Cluster configurations for disaster recovery
- Connecting clusters–Creating global clusters
- VCS global clusters: The building blocks
- About global cluster management
- About serialization - The Authority attribute
- Prerequisites for global clusters
- Setting up a global cluster
- About IPv6 support with global clusters
- About cluster faults
- About setting up a disaster recovery fire drill
- Test scenario for a multi-tiered environment
- Administering global clusters from the command line
- About global querying in a global cluster setup
- Administering clusters in global cluster setup
- Setting up replicated data clusters
- Setting up campus clusters
- Connecting clusters–Creating global clusters
- Section VII. Troubleshooting and performance
- VCS performance considerations
- How cluster components affect performance
- How cluster operations affect performance
- VCS performance consideration when a system panics
- About scheduling class and priority configuration
- VCS agent statistics
- About VCS tunable parameters
- Troubleshooting and recovery for VCS
- VCS message logging
- Gathering VCS information for support analysis
- Troubleshooting the VCS engine
- Troubleshooting Low Latency Transport (LLT)
- Troubleshooting Group Membership Services/Atomic Broadcast (GAB)
- Troubleshooting VCS startup
- Troubleshooting issues with systemd unit service files
- Troubleshooting service groups
- Troubleshooting resources
- Troubleshooting sites
- Troubleshooting I/O fencing
- Fencing startup reports preexisting split-brain
- Troubleshooting CP server
- Troubleshooting server-based fencing on the VCS cluster nodes
- Issues during online migration of coordination points
- Troubleshooting notification
- Troubleshooting and recovery for global clusters
- Troubleshooting licensing
- Licensing error messages
- Troubleshooting secure configurations
- Troubleshooting wizard-based configuration issues
- Troubleshooting issues with the Veritas High Availability view
- VCS message logging
- VCS performance considerations
- Section VIII. Appendixes
Configuring an existing CP server to support IPv6 or dual stack
Perform the following steps to manually configure the CP server in HTTPS-based mode to support IPv6 or dual stack:
Modify the
/etc/vxcps.conf
file to include the IPv6 address of the CP server.If the CP server should support pure IPv6 communication, remove the existing IPv4 entries and add the new IPv6 addresses in the configuration file. If the CP server should support IPv6 and IPv4 communications, add the IPv6 addresses along with the existing IPv4 addresses.
Generate the server certificate for the CP server to facilitate communication over the IPv6 channel along with IPv4.
Perform these tasks sequentially:
If not already present, create an OpenSSL configuration file (https_ssl_cert.conf ) to add the new DNS.
Edit the
https_ssl_cert.conf
file to add DNS entries for the IPv4 and the IPv6 addresses.To support communication over pure IPv6 networks, remove the existing IPv4 entries from the file.
For example:
[req] distinguished_name = req_distinguished_name req_extensions = v3_req [req_distinguished_name] countryName = Country Name (2 letter code. eg, US) countryName_default = US localityName = Locality Name (eg, city) organizationalUnitName = Organizational Unit Name (eg, section) commonName = Common Name (eg, YOUR name) commonName_max = 64 emailAddress = Email Address emailAddress_max = 40 [v3_req] keyUsage = keyEncipherment, dataEncipherment extendedKeyUsage = serverAuth subjectAltName = @alt_names [alt_names] DNS.1 = cpsone.company.com DNS.2 = ipv6Address DNS.3 = ipv4Address
Recreate the server certificates by reusing the CA certificate, the server key, the newly created
https_ssl_cert.conf
file, and the cluster UUID.Note:
The CA certificate and the server key are already present on the setup. Get the cluster UUID from the
/etc/vx/.uuids/clusuuid
file.# /opt/VRTSperl/non-perl-libs/bin/openssl req -new -key /var/VRTScps/security/keys/server_private.key -config https_ssl_cert.conf -subj '/C=US/L=city/OU=section/CN={<UUID>}' -out /var/VRTScps/security/certs/server.csr # /opt/VRTSperl/non-perl-libs/bin/openssl x509 -req -days 100 -in /var/VRTScps/security/certs/server.csr -CA /var/VRTScps/security/certs/ca.crt -CAkey /var/VRTScps/security/keys/ca.key -set_serial 01 -extensions v3_req -extfile https_ssl_cert.conf -out /var/VRTScps/security/certs/server.crt
On the CP server, create a copy of the existing client certificates with the IPv4 addresses and rename the copy to include the IPv6 addresses in the certificate name.
For example, if the IPv6 address is 2002::2 and the hostname is xyz:
# cp /var/VRTSvxfen/security/certs/ca_xyz.crt /var/VRTSvxfen/security/certs/ca_2002\:\:2.crt # cp /var/VRTSvxfen/security/certs/client_xyz.crt /var/VRTSvxfen/security/certs/client_2002\:\:2.crt
On each client node, create a copy of the existing client certificates with the IPv4 addresses and rename the copy to include IPv6 addresses in the certificate name.
For example, if the IPv4 address is 10.209.81.122 and IPv6 address is 2002::2:
# cp /var/VRTSvxfen/security/certs/ca_10.209.81.122.crt /var/VRTSvxfen/security/certs/ca_2002\:\:2.crt # cp /var/VRTSvxfen/security/certs/client_10.209.81.122.crt /var/VRTSvxfen/security/certs/client_2002\:\:2.crt
Stop VCS on the CP server.
# hastop -local
Update the
main.cf
file to include the newly added IPv6 resources, the quorum resource, and the dependencies for the newly added IPv6 resources.IP cpsvip2 ( Critical = 0 Device @cps1 = eth1 Address = "ipv6Address" PrefixLen = 64 ) NIC cpsnic2 ( Critical = 0 Device @cps1 = eth1 NetworkHosts @cps1 = {ipv6AddressOfNetworkHost} ) Quorum quorum ( QuorumResources = { cpsvip1, cpsvip2 } ) cpsvip1 requires cpsnic1 cpsvip2 requires cpsnic2 vxcpserv requires quorum
Restart the CP server.
To start VCS in a single-node cluster, run # hastart -onenode.
To start VCS in an SFHA cluster, run # hastart.
Perform the following tasks sequentially on each client node:
Create the
/etc/vxfenmode.test
file with the new IPv6 address of the CP server.From any client node, start the
vxfenswap
utility.Verify that fencing is running successfully on each node using the vxfenadm -d command.