Cluster Foundation Configuration and Administration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Cluster Foundation Configuration and Administration Guide Cluster Foundation PRIMECLUSTER Cluster Foundation (CF) Configuration and Administration Guide 4.3 (Oracle Solaris) Edition August 2015 Copyright and Trademarks Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. EMC, PowerPath, SRDF, and Symmetrix are registered trademarks of EMC Corporation. PRIMECLUSTER is a registered trademark of Fujitsu Limited. All hardware and software names used are trademarks of their respective manufacturers. Export Controls Exportation/release of this document may require necessary procedures in accordance with the regulations of your resident country and/or US export control laws. Requests Delivery subject to availability; right of technical modifications reserved. All Rights Reserved, Copyright (C) FUJITSU LIMITED 2012-2015. Preface Cluster Foundation CF Registry and Integrity Monitor Cluster resource management GUI administration LEFTCLUSTER state CF topology table Shutdown Facility CF over IP Diagnostics and troubleshooting CF messages and codes Manual pages Glossary Abbreviations Figures Tables Index Contents 1 Preface . 1 1.1 Contents of this manual . 1 1.2 PRIMECLUSTER manuals . 2 1.3 Conventions . 3 1.3.1 Notation . 3 1.3.1.1 Prompts . 4 1.3.1.2 The keyboard . 4 1.3.1.3 Typefaces . 4 1.3.1.4 Example 1 . 4 1.3.1.5 Example 2 . 5 1.3.2 Command syntax . 5 1.4 Important notes and cautions . 5 1.5 Abbreviations . 6 1.6 Revision history . 6 2 Cluster Foundation . 7 2.1 CF, CIP, and CIM configuration . 7 2.1.1 Differences between CIP and CF over IP . 11 2.1.2 cfset . 13 2.1.3 CF security . 15 2.1.4 Example of creating a cluster . 16 2.1.5 Adding a new node to CF . 38 2.2 CIP configuration file . 39 2.3 Cluster Configuration Backup and Restore (CCBR) . 41 3 CF Registry and Integrity Monitor . 47 3.1 CF Registry . 47 3.2 Cluster Integrity Monitor . 48 3.2.1 Configuring CIM . 48 3.2.2 Query of the quorum state . 49 3.2.3 Reconfiguring quorum . 50 4 Cluster resource management . 53 4.1 Overview . 53 4.2 Kernel parameters for Resource Database . 54 4.3 Resource Database configuration . 57 4.4 Registering hardware information . 59 4.4.1 Setup exclusive device list . 59 4.4.2 Exclusive device list for EMC Symmetrix . 60 4.4.2.1 emcpower Devices and native Devices . 61 4.4.2.2 BCV, R2, GateKeeper, CKD . 61 J2S2-1588-01ENZ0(01) Contents 4.4.2.3 VCMDB . 62 4.4.2.4 Simplified setup for exclusive device list - clmakediskinfo, clmkdiskinfo 62 4.4.3 Automatic resource registration . 63 4.5 Start up synchronization . 65 4.5.1 Start up synchronization and the new node . 67 4.6 Adding a new node . 67 4.6.1 Backing up the Resource Database . 69 4.6.2 Reconfiguring the Resource Database . 70 4.6.3 Configuring the Resource Database on the new node . 71 4.6.4 Adjusting StartingWaitTime . 72 4.6.5 Restoring the Resource Database . 72 5 GUI administration . 75 5.1 Overview . 76 5.2 Starting Cluster Admin GUI and logging in . 76 5.3 Main CF table . 79 5.4 CF route tracking . 81 5.5 Node details . 84 5.6 Displaying the topology table . 85 5.7 Starting and stopping CF . 87 5.7.1 Starting CF . 89 5.7.2 Stopping CF . 92 5.8 Marking nodes DOWN . 93 5.9 Using PRIMECLUSTER log viewer . 94 5.9.1 Search based on time filter . 97 5.9.2 Search based on keyword . 98 5.9.3 Search based on severity levels . 99 5.10 Displaying statistics . 100 5.11 Heartbeat monitor . 105 5.12 Adding and removing a node from CIM . 106 5.13 Unconfigure CF . 109 5.14 CIM Override . 110 6 LEFTCLUSTER state . 111 6.1 Description of the LEFTCLUSTER state . 112 6.2 Recovering from LEFTCLUSTER . 114 6.2.1 Caused by a panic/hung node . 114 6.2.2 Caused by staying in the kernel debugger too long . 114 6.2.3 Caused by a cluster partition . 115 6.2.4 Caused by reboot . 117 7 CF topology table . 119 J2S2-1588-01ENZ0(01) Contents 7.1 Basic layout . 121 7.2 Selecting devices . 122 7.3 Examples . 123 8 Shutdown Facility . 127 8.1 Overview . 127 8.2 Available SAs and MAs . 129 8.2.1 RCI . 129 8.2.2 XSCF . 131 8.2.3 ALOM . 133 8.2.4 ILOM . 133 8.2.5 NPS . 134 8.3 SF split-brain handling . 135 8.3.1 Administrative LAN . 135 8.3.2 SF split-brain handling . 136 8.3.2.1 RMS ShutdownPriority attribute . 136 8.3.2.2 Shutdown Facility weight assignment . 137 8.3.2.3 Disabling split-brain handling . 137 8.3.3 Runtime processing . 137 8.3.4 Configuration notes . 138 8.4 Configuring the Shutdown Facility . 140 8.5 SF administration . 140 8.5.1 Starting and stopping SF . 141 8.5.1.1 Starting and stopping SF manually . 141 8.5.1.2 Starting and stopping SF automatically . 141 8.6 Logging . 141 9 CF over IP . 143 9.1 Overview . 143 9.2 Configuring CF over IP . 145 10 Diagnostics and troubleshooting . 147 10.1 Beginning the process . 147 10.2 Symptoms and solutions . 151 10.2.1 Join-related problems . 152 10.3 PCI Hot Plug . 161 10.4 Collecting troubleshooting information . 162 10.4.1 Executing the fjsnap command . 162 10.4.2 System dump . 163 10.4.3 SCF dump . 164 11 CF messages and codes . 165 11.1 cfconfig messages . 166 11.1.1 Usage message . 166 J2S2-1588-01ENZ0(01) Contents 11.1.2 Error messages . 167 11.2 cipconfig messages . 174 11.2.1 Usage message . 175 11.2.2 Error messages . 175 11.3 cftool messages . 177 11.3.1 Usage message . 177 11.3.2 Error messages . 178 11.4 rcqconfig messages . 181 11.4.1 Usage message . 181 11.4.2 Error messages . 182 11.5 rcqquery messages . 193 11.5.1 Usage message . ..
Recommended publications
  • SYSTEM V RELEASE 4 Migration Guide
    - ATlaT UN/~ SYSTEM V RELEASE 4 Migration Guide UNIX Software Operation Copyright 1990,1989,1988,1987,1986,1985,1984,1983 AT&T All Rights Reserved Printed In USA Published by Prentice-Hall, Inc. A Division of Simon & Schuster Englewood Cliffs, New Jersey 07632 No part of this publication may be reproduced or transmitted in any form or by any means-graphic, electronic, electrical, mechanical, or chemical, including photocopying, recording in any medium, tap­ ing, by any computer or information storage and retrieval systems, etc., without prior permissions in writing from AT&T. IMPORTANT NOTE TO USERS While every effort has been made to ensure the accuracy of all information in this document, AT&T assumes no liability to any party for any loss or damage caused by errors or omissions or by state­ ments of any kind in this document, its updates, supplements, or special editions, whether such er­ rors are omissions or statements resulting from negligence, accident, or any other cause. AT&T furth­ er assumes no liability arising out of the application or use of any product or system described herein; nor any liability for incidental or consequential damages arising from the use of this docu­ ment. AT&T disclaims all warranties regarding the information contained herein, whether expressed, implied or statutory, including implied warranties of merchantability or fitness for a particular purpose. AT&T makes no representation that the interconnection of products in the manner described herein will not infringe on existing or future patent rights, nor do the descriptions contained herein imply the granting or license to make, use or sell equipment constructed in accordance with this description.
    [Show full text]
  • A Survey of Distributed File Systems
    A Survey of Distributed File Systems M. Satyanarayanan Department of Computer Science Carnegie Mellon University February 1989 Abstract Abstract This paper is a survey of the current state of the art in the design and implementation of distributed file systems. It consists of four major parts: an overview of background material, case studies of a number of contemporary file systems, identification of key design techniques, and an examination of current research issues. The systems surveyed are Sun NFS, Apollo Domain, Andrew, IBM AIX DS, AT&T RFS, and Sprite. The coverage of background material includes a taxonomy of file system issues, a brief history of distributed file systems, and a summary of empirical research on file properties. A comprehensive bibliography forms an important of the paper. Copyright (C) 1988,1989 M. Satyanarayanan The author was supported in the writing of this paper by the National Science Foundation (Contract No. CCR-8657907), Defense Advanced Research Projects Agency (Order No. 4976, Contract F33615-84-K-1520) and the IBM Corporation (Faculty Development Award). The views and conclusions in this document are those of the author and do not represent the official policies of the funding agencies or Carnegie Mellon University. 1 1. Introduction The sharing of data in distributed systems is already common and will become pervasive as these systems grow in scale and importance. Each user in a distributed system is potentially a creator as well as a consumer of data. A user may wish to make his actions contingent upon information from a remote site, or may wish to update remote information.
    [Show full text]
  • Chapter 1 – 15 Essay Question Review
    Chapter 1 – 15 Essay Question Review Chapter 1 1. Explain why an operating system can be viewed as a resource allocator. Ans: A computer system has many resources that may be required to solve a problem: CPU time, memory space, file-storage space, I/O devices, and so on. The operating system acts as the manager of these resources. Facing numerous and possibly conflicting requests for resources, the operating system must decide how to allocate them to specific programs and users so that it can operate the computer system efficiently and fairly. Feedback: 1.1.2 2. Explain the purpose of an interrupt vector. Ans: The interrupt vector is merely a table of pointers to specific interrupt-handling routines. Because there are a fixed number of interrupts, this table allows for more efficient handling of the interrupts than with a general-purpose, interrupt-processing routine. Feedback: 1.2.1 3. What is a bootstrap program, and where is it stored? Ans: A bootstrap program is the initial program that the computer runs when it is powered up or rebooted. It initializes all aspects of the system, from CPU registers to device controllers to memory contents. Typically, it is stored in read-only memory (ROM) or electrically erasable programmable read-only memory (EEPROM), known by the general term firmware, within the computer hardware. Feedback: 1.2.1 4. What role do device controllers and device drivers play in a computer system? Ans: A general-purpose computer system consists of CPUs and multiple device controllers that are connected through a common bus.
    [Show full text]
  • Solaris 10 System Administration - Part II
    Solaris 10 System Administration - Part II Duration: 5 Days Course Code: SSA2 Overview: This Solaris System Administration training course will provide delegates with practical experience of configuring various aspects of a Oracle Solaris system up to and including Solaris version 10. This course extends the skills a delegate will have gained from attending the Solaris System Administration - Part 1 course. Delegates will cover more specialised tasks such as managing the system log and configuring remote file sharing with NFS whilst gaining the key skills required to prepare for the Oracle Solaris 10 System Administrator Certified Professional Part II exam (1Z0-878) . Target Audience: This Solaris 10 System Administration - Part II course is aimed at IT staff responsible for administering a networked server in a local area network,running the Oracle Solaris operating environment. It will extend their skills beyond basic administration tasks. Objectives: Administering Solaris systems involves many specialised tasks including; monitoring system events with syslog,performing network installations,dealing with various aspects of the network environment and assigning system roles to users. Delegates taking this class will gain the necessary knowledge and skills to perform these tasks. Prerequisites: Attendance on the Solaris Introduction and Solaris 10 System Administration - Part I courses or similar knowledge is required. Shell Programming knowledge is beneficial but not essential. This skill can be gained by attending the Solaris Shell Programming
    [Show full text]
  • Using Sun QFS and Sun Storage Archive Manager on Linux Clients
    Using Sun QFS and Sun Storage Archive Manager on Linux Clients Part No: E22975 June 2012 Copyright © 2011, 2012, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS. Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including anyoperating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications.
    [Show full text]
  • File-System Interface
    C H A P T E R File -System 11 Interface For most users, the file system is the most visible aspect of an operating system. It provides the mechanism for on-line storage of and access to both data and programs of the operating system and all the users of the computer system. The file system consists of two distinct parts: a collection of files, each storing related data, and a directory structure, which organizes and provides information about all the files in the system. File systems live on devices, which we described in the preceding chapter and will continue to discuss in the following one. In this chapter, we consider the various aspects of files and the major directory structures. We also discuss the semantics of sharing files among multiple processes, users, and computers. Finally, we discuss ways to handle file protection, necessary when we have multiple users and we want to control who may access files and how files may be accessed. CHAPTER OBJECTIVES • To explain the function of file systems. • To describe the interfaces to file systems. • To discuss file-system design tradeoffs, including access methods, file sharing, file locking, and directory structures. • To explore file-system protection. 11.1 File Concept Computers can store information on various storage media, such as magnetic disks, magnetic tapes, and optical disks. So that the computer system will be convenient to use, the operating system provides a uniform logical view of stored information. The operating system abstracts from the physical properties of its storage devices to define a logical storage unit, the file .
    [Show full text]
  • 4-Bay SMB Rack-Mount Unified Network Storage Enclosure
    Product Highlights Flexible Storage Options Features a combination of storage options such as NAS, iSCSI SAN & Cloud Storage with easy rack mount installation Enterprise Friendly Manageability Thin provisioning provides more efficient use of network storage while saving customers money Reliable data storage system The DNS-1560-04 features a ZFS file system that is capable of storing high volumes of data as well as protecting against data corruption. DNS-1560-04 4-Bay SMB Rack-mount Unified Network Storage Enclosure Features Small and medium businesses face an ever-increasing need for data consolidation and sharing. D-Link’s DNS-1560-04 1U 4-bay Rackmount SMB NAS/iSCSI Unified Storage is a unified solution Storage for these growing data storage requirements, and provides a multitude of options for managing • Four easy-to-load hard drive bays accept any and securing important files. capacity 3.5” SATA or 2.5” internal drive • Multiple RAID types for a wide range of storage Unified Storage Solution options (JBOD, RAID 0, 1, 5, 6,10) • Amazon S3 cloud replication & disaster recovery The DNS-1550-04 is a unified solution that provides iSCSI and NAS functionalities. It boasts strong iSCSI read/ write performance whose average data throughput is higher than many Enterprise Storage Options competing products. It also provides versatile RAID support meaning you never run the risk • Multiple protocols: SMB, NFS, AFP, FTP, WebDAV of losing valuable data. It features 4 Serial ATA (SATA) disk drive bays that support hard drives & iSCSI in RAID level 0, 1, 5, 6, 10, or JBOD configurations. DNS-1560-04 supports multiple protocols • ZFS-based file system to offer high reliability including SMB, NFS, AFP, FTP, WebDAV as well as iSCSI.
    [Show full text]
  • 11. Distributed File System
    1 SOFTWARE ARCHITECTURE 11. DISTRIBUTED FILE SYSTEM Tatsuya Hagino [email protected] slides URL https://vu5.sfc.keio.ac.jp/sa/ 2 File Sharing • Online Storage • Use Web site for upload and download files. • Use special client software. • Dropbox, Google drive, Sky drive, iCloud, etc. • File Sharing Application • Use FTP for upload and download files. • Use P2P file sharing software. • Used in a groupware. • Some does version management . • File Sharing by OS • Share remote files like local files. • Access transparency 3 Online Storage • Place files in Internet Cloud. • Use Web interface to manipulate (upload, download, rename, delete, share with others, etc.) • Special software may be used to automatically synchronize with local folders. • Use accounts or URL to share files with others. Internet Cloud Online Storage Download Upload File to share mail URL 4 Automatic Synchronization • Special software for synchronization • Each online storage has own synchronization software. • When local files are changed, they are automatically uploaded. • When online storage files are changed, they are automatically downloaded. • Mechanism • Periodically compare the local folder and the online storage. • Update when there are changes. • If not connected to Internet, no update. • Update when connected. Internet Cloud local synchronize online folder storage 5 Merging Modifications • When a file is shared by multiple people: • Multiple people may change the same file. • When different lines are changed: • merge changed • can be done automatically • When the same line is changed: • if the change is the same, no problem. • if it is different, conflict needs to be sorted manually. online online storage storage line 3 and 8 are changed merge conflict receive receive line 3 change line 8 change line 3 changed line 8 changed line 5 changed line 5 changed 6 Version Control System repository • Manage file changes.
    [Show full text]
  • File System the File System Is the Most Visible Aspect of an Operating System
    File System The file system is the most visible aspect of an operating system. It provides the mechanism for on-line storage of and access to both data and Program of the operating system and all the users of the computer system. The file system consists of two distinct parts: a collection of files, each storing related data, and a directory structure, which organizes and provides information about all the files in the system. File Concept The operating system abstracts from the physical properties of its storage devices to define a logical storage unit, the file. Files are mapped, by the operating system, onto physical devices. File Structure None - sequence of words, bytes Simple record structure Lines Fixed length Variable length Complex Structures Formatted document Relocatable load file File Attributes Name – only information kept in human-readable form Identifier – unique tag (number) identifies file within file system Type – needed for systems that support different types Location – pointer to file location on device Size – current file size Protection – controls who can do reading, writing, executing Time, date, and user identification – data for protection, security, and usage monitoring Information about files are kept in the directory structure, which is maintained on the disk. File Operations: File is an abstract data type Create Write Read Reposition within file Delete Truncate Open(Fi) – search the directory structure on disk for entry Fi, and move the content of entry to memory Close (Fi) – move the content of entry Fi
    [Show full text]
  • File-System Interface
    Chapter 10: File-System Interface File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection Objectives To explain the function of file systems To describe the interfaces to file systems To discuss file-system design tradeoffs, including access methods, file sharing, file locking, and directory structures To explore file-system protection File Concept Contiguous logical address space Types: Data numeric character binary Program File Structure None - sequence of words, bytes Simple record structure Lines Fixed length Variable length Complex Structures Formatted document Relocatable load file Can simulate last two with first method by inserting appropriate control characters Who decides: Operating system Program File Attributes Name – only information kept in human-readable form Identifier – unique tag (number) identifies file within file system Type – needed for systems that support different types Location – pointer to file location on device Size – current file size Protection – controls who can do reading, writing, executing Time, date, and user identification – data for protection, security, and usage monitoring Information about files are kept in the directory structure, which is maintained on the disk File Operations File is an abstract data type Create Write Read Reposition within file Delete Truncate Open(Fi) – search the directory structure on disk for entry Fi, and move the content of entry to memory Close (Fi) – move the content of entry Fi in memory
    [Show full text]
  • Solaris Common Messages and Troubleshooting Guide
    Solaris Common Messages and Troubleshooting Guide Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 U.S.A. Part No: 805-4036–10 October, 1998 Copyright 1998 Sun Microsystems, Inc. 901 San Antonio Road, Palo Alto, California 94303-4900 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, SunSoft, SunDocs, SunExpress, and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and SunTM Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
    [Show full text]
  • Network Attached Storage (NAS) © 2009 EMC Corporation
    Section 2 : Storage Networking Technologies and Virtualization Network-Attached Storage Chapter 7 EMC Proven Professional The #1 Certification Program in the information storage and management industry © 2009 EMC Corporation. All rights reserved. Chapter Objectives After completing this chapter, you will be able to: o Describe NAS, its benefits and components o Discuss different NAS implementations o Describe NAS file-sharing protocols o Discuss NAS management options © 2009 EMC Corporation. All rights reserved. File Sharing Environment o File system is a structured way of storing and organizing data files o File Sharing o Storing and accessing data files over network o File system must be mounted in order to access files o Traditional client/server model, implemented with file-sharing protocols for remote file sharing o Example: FTP, CIFS (also known as SMB), NFS, DFS © 2009 EMC Corporation. All rights reserved. File Sharing Technology Evolution Networked File Sharing Portable Media Networked PCs Stand Alone PC for File Sharing Network Attached Storage (NAS) © 2009 EMC Corporation. All rights reserved. What is NAS ? NAS is shared storage on a network infrastructure Clients Application Print Server Server NAS Device © 2009 EMC Corporation. All rights reserved. General Purpose Servers vs. NAS Devices Applications File System Print Drivers Operating System File System Network Operating System Network Single Function NAS Device • Dedicated for file-serving • Uses real-time OS dedicated for file- serving purpose General Purpose Servers (Windows or UNIX) © 2009 EMC Corporation. All rights reserved. Benefits of NAS o Support comprehensive access to information o Improves efficiency – uses special purpose OS o Improved flexibility – platform independent o Centralizes storage o Simplifies management o Scalability o High availability – provide redundant components o Provides security integration to environment (user authentication and authorization) © 2009 EMC Corporation.
    [Show full text]