InfoScale™ 9.0 Storage Foundation Cluster File System High Availability Configuration and Upgrade Guide - AIX
- Section I. Introduction to SFCFSHA
- Introducing Storage Foundation Cluster File System High Availability
- Section II. Configuration of SFCFSHA
- Preparing to configure
- Preparing to configure SFCFSHA clusters for data integrity
- About planning to configure I/O fencing
- Setting up the CP server
- Configuring the CP server manually
- Configuring SFCFSHA
- Configuring a secure cluster node by node
- Verifying and updating licenses on the system
- Configuring SFCFSHA clusters for data integrity
- Setting up disk-based I/O fencing using installer
- Setting up server-based I/O fencing using installer
- Performing an automated SFCFSHA configuration using response files
- Performing an automated I/O fencing configuration using response files
- Configuring CP server using response files
- Manually configuring SFCFSHA clusters for data integrity
- Setting up disk-based I/O fencing manually
- Setting up server-based I/O fencing manually
- Configuring server-based fencing on the SFCFSHA cluster manually
- Setting up non-SCSI-3 fencing in virtual environments manually
- Setting up majority-based I/O fencing manually
- Section III. Upgrade of SFCFSHA
- Planning to upgrade SFCFSHA
- Preparing to upgrade SFCFSHA
- Upgrading the operating system
- Performing a full upgrade of SFCFSHA using the installer
- Performing a rolling upgrade of SFCFSHA
- Performing a phased upgrade of SFCFSHA
- About phased upgrade
- Performing a phased upgrade using the product installer
- Performing an automated SFCFSHA upgrade using response files
- Upgrading Volume Replicator
- Performing post-upgrade tasks
- Planning to upgrade SFCFSHA
- Section IV. Post-configuration tasks
- Section V. Configuration of disaster recovery environments
- Section VI. Adding and removing nodes
- Adding a node to SFCFSHA clusters
- Adding the node to a cluster manually
- Setting up the node to run in secure mode
- Adding a node using response files
- Configuring server-based fencing on the new node
- Removing a node from SFCFSHA clusters
- Adding a node to SFCFSHA clusters
- Section VII. Configuration and Upgrade reference
- Appendix A. Support for AIX Live Update
- Appendix B. Installation scripts
- Appendix C. Configuration files
- Appendix D. Configuring the secure shell or the remote shell for communications
- Appendix E. High availability agent information
- Appendix F. Sample SFCFSHA cluster setup diagrams for CP server-based I/O fencing
- Appendix G. Changing NFS server major numbers for VxVM volumes
- Appendix H. Configuring LLT over UDP
- Using the UDP layer for LLT
- Manually configuring LLT over UDP using IPv4
- Using the UDP layer of IPv6 for LLT
- Manually configuring LLT over UDP using IPv6
Setting up non-SCSI-3 I/O fencing in virtual environments using installer
If you have installed Arctera InfoScale Enterprise in virtual environments that do not support SCSI-3 PR-compliant storage, you can configure non-SCSI-3 fencing.
To configure I/O fencing using the installer in a non-SCSI-3 PR-compliant setup
- Start the installer with -fencing option.
# /opt/VRTS/install/installer -fencing
The installer starts with a copyright message and verifies the cluster information.
- Confirm that you want to proceed with the I/O fencing configuration at the prompt.
The program checks that the local node running the script can communicate with remote nodes and checks whether Storage Foundation Cluster File System High Availability 9.0 is configured properly.
- For server-based fencing, review the I/O fencing configuration options that the program presents. Type 1 to configure server-based I/O fencing.
Select the fencing mechanism to be configured in this Application Cluster [1-7,q] 1
- Enter n to confirm that your storage environment does not support SCSI-3 PR.
Does your storage environment support SCSI3 PR? [y,n,q] (y) n
- Confirm that you want to proceed with the non-SCSI-3 I/O fencing configuration at the prompt.
- For server-based fencing, enter the number of CP server coordination points you want to use in your setup.
- The installer assumes that these values are identical from the view of the SFCFSHA cluster nodes that host the applications for high availability.
For server-based fencing, enter the following details for each CP server:
Enter the virtual IP address or the fully qualified host name.
Enter the port address on which the CP server listens for connections.
The default value is 443. You can enter a different port address. Valid values are between 49152 and 65535.
- For server-based fencing, verify and confirm the CP server information that you provided.
- Verify and confirm the SFCFSHA cluster configuration information.
Review the output as the installer performs the following tasks:
Updates the CP server configuration files on each CP server with the following details for only server-based fencing, :
Registers each node of the SFCFSHA cluster with the CP server.
Adds CP server user to the CP server.
Adds SFCFSHA cluster to the CP server user.
Updates the following configuration files on each node of the SFCFSHA cluster
/etc/vxfenmode
file/etc/default/vxfen
file/etc/vxenviron
file/etc/llttab
file/etc/vxfentab
(only for server-based fencing)
- Review the output as the installer stops Storage Foundation Cluster File System High Availability on each node, starts I/O fencing on each node, updates the VCS configuration file main.cf, and restarts Storage Foundation Cluster File System High Availability with non-SCSI-3 fencing.
For server-based fencing, confirm to configure the CP agent on the SFCFSHA cluster.
- Confirm whether you want to send the installation information to us.
- After the installer configures I/O fencing successfully, note the location of summary, log, and response files that installer creates.
The files provide useful information which can assist you with the configuration, and can also assist future configurations.