Storage Foundation and High Availability Solutions 7.4.2 Solutions Guide - Windows
- Section I. Introduction
- Introducing Storage Foundation and High Availability Solutions
- Using the Solutions Configuration Center
- SFW best practices for storage
- Section II. Quick Recovery
- Section III. High Availability
- High availability: Overview
- How VCS monitors storage components
- Deploying InfoScale Enterprise for high availability: New installation
- Notes and recommendations for cluster and application configuration
- Configuring disk groups and volumes
- Configuring the cluster using the Cluster Configuration Wizard
- About modifying the cluster configuration
- About installing and configuring the application or server role
- Configuring the service group
- About configuring file shares
- About configuring IIS sites
- About configuring applications using the Application Configuration Wizard
- About configuring the Oracle service group using the wizard
- Modifying the application service groups
- Adding DMP to a clustering configuration
- High availability: Overview
- Section IV. Campus Clustering
- Introduction to campus clustering
- Deploying InfoScale Enterprise for campus cluster
- Notes and recommendations for cluster and application configuration
- Reviewing the configuration
- Configuring the cluster using the Cluster Configuration Wizard
- Creating disk groups and volumes
- Installing the application on cluster nodes
- Section V. Replicated Data Clusters
- Introduction to Replicated Data Clusters
- Deploying Replicated Data Clusters: New application installation
- Notes and recommendations for cluster and application configuration
- Configuring the cluster using the Cluster Configuration Wizard
- Configuring disk groups and volumes
- Installing and configuring the application or server role
- Configuring the service group
- About configuring file shares
- About configuring IIS sites
- About configuring applications using the Application Configuration Wizard
- Configuring a RVG service group for replication
- Configuring the resources in the RVG service group for RDC replication
- Configuring the VMDg or VMNSDg resources for the disk groups
- Configuring the RVG Primary resources
- Adding the nodes from the secondary zone to the RDC
- Verifying the RDC configuration
- Section VI. Disaster Recovery
- Disaster recovery: Overview
- Deploying disaster recovery: New application installation
- Notes and recommendations for cluster and application configuration
- Reviewing the configuration
- About managing disk groups and volumes
- Setting up the secondary site: Configuring SFW HA and setting up a cluster
- Setting up your replication environment
- About configuring disaster recovery with the DR wizard
- Installing and configuring the application or server role (secondary site)
- Configuring replication and global clustering
- Configuring the global cluster option for wide-area failover
- Possible task after creating the DR environment: Adding a new failover node to a Volume Replicator environment
- Maintaining: Normal operations and recovery procedures (Volume Replicator environment)
- Testing fault readiness by running a fire drill
- About the Fire Drill Wizard
- Prerequisites for a fire drill
- Preparing the fire drill configuration
- Deleting the fire drill configuration
- Section VII. Microsoft Clustering Solutions
- Microsoft clustering solutions overview
- Deploying SFW with Microsoft failover clustering
- Tasks for installing InfoScale Foundation or InfoScale Storage for Microsoft failover clustering
- Creating SFW disk groups and volumes
- Implementing a dynamic quorum resource
- Deploying SFW with Microsoft failover clustering in a campus cluster
- Reviewing the configuration
- Establishing a Microsoft failover cluster
- Tasks for installing InfoScale Foundation or InfoScale Storage for Microsoft failover clustering
- Creating disk groups and volumes
- Implementing a dynamic quorum resource
- Installing the application on the cluster nodes
- Deploying SFW and VVR with Microsoft failover clustering
- Part 1: Setting up the cluster on the primary site
- Reviewing the prerequisites and the configuration
- Part 2: Setting up the cluster on the secondary site
- Part 3: Adding the Volume Replicator components for replication
- Part 4: Maintaining normal operations and recovery procedures
- Section VIII. Server Consolidation
- Server consolidation overview
- Server consolidation configurations
- Typical server consolidation configuration
- Server consolidation configuration 1 - many to one
- Server consolidation configuration 2 - many to two: Adding clustering and DMP
- About this configuration
- SFW features that support server consolidation
Reconfiguring a cluster
You may need to reconfigure your cluster after changing an adapter on a cluster node, to update the LLT information, or to configure Veritas Security Services.
To reconfigure a cluster
- Launch the Cluster Configuration Wizard from the Apps menu on the Start screen.
- Read the information on the Welcome panel and click Next.
- In the Configuration Options panel, click Cluster Operations and click Next.
- In the Domain Selection panel, select or type the name of the domain in which the cluster resides and click Next.
To discover information about all the systems and users in the domain
Uncheck the Specify systems and users manually check box.
Click Next.
Proceed to step 8.
To specify systems and user names manually (recommended for large domains)
Check the Specify systems and users manually check box.
Additionally, you may instruct the wizard to retrieve a list of systems and users in the domain by selecting appropriate check boxes.
Click Next.
If you checked Retrieve system list from domain, proceed to step 6. Otherwise proceed to the next step.
- In the System Selection panel, type the name of the system and click Add.
Proceed to step 8.
- In the System Selection panel, specify the systems for the cluster to be reconfigured.
Enter the system name and click Add to add the system to the Selected Systems list. Alternatively, you can select the systems from the Domain Systems list and click the right-arrow icon.
If you specify only one node of an existing cluster, the wizard discovers all nodes for that cluster.
- The System Report panel displays the validation status, whether Accepted or Rejected, of all the systems you specified earlier.
A system can be rejected for any of the following reasons:
The system does not respond to a ping request.
WMI access is disabled on the system.
The wizard is unable to retrieve information about the system's architecture or operating system.
VCS is either not installed on the system or the version of VCS is different from what is installed on the system on which you are running the wizard.
Click on a system name to see the validation details. If you wish to include a rejected system, rectify the error based on the reason for rejection and then run the wizard again.
Click Next to proceed.
- In the Cluster Configuration Options panel, click Edit Existing Cluster and click Next.
- In the Cluster Selection panel, select the cluster to be reconfigured and click Next. If you chose to specify the systems manually in step 4, only the clusters configured with the specified systems are displayed.
- In the Edit Cluster Options panel, click Reconfigure and click Next.
In the Cluster User Information dialog box, enter the user name and password for a user with administrative privileges to the cluster and click OK.
The Cluster User Information dialog box appears only when you reconfigure a non-secure cluster.
In the second Edit Cluster Options dialog box, select any of the following options and click Next:
Change private network heartbeat links
Select this option to change the private network heartbeat links. If the selected cluster is a single node cluster, the option is to remove the private heartbeat links.
If the cluster has more than one node, the options are to add or remove private heartbeat links.
See step 12.
Change HAD Helper User account
Selection this options to change the user account for the VCS Helper service.
See step 13.
Configure VCS Authentication Service
Select this option to configure the VCS authentication service for single sign-on. Single sign-on configures a secure cluster.
If the option to change the private network heartbeat links was selected, do one of the following:
To configure the VCS private network over Ethernet, do the following:
Select the check boxes next to the two NICs to be assigned to the private network.
Veritas recommends reserving two NICs exclusively for the private network. However, you could lower the priority of one NIC and use the low-priority NIC for public and private communication.
If you have only two NICs on a selected system, it is recommended that you lower the priority of at least one NIC that will be used for private as well as public network communication.
To lower the priority of a NIC, right-click the NIC and select Low Priority from the pop-up menu.
If your configuration contains teamed NICs, the wizard groups them as "NIC Group #N" where "N" is a number assigned to the teamed NIC. A teamed NIC is a logical NIC, formed by grouping several physical NICs together. All NICs in a team have an identical MAC address. Veritas recommends that you do not select teamed NICs for the private network.
The wizard configures the LLT service (over UDP) on the selected network adapters. The specified UDP ports are used for the private network communication.The wizard will configure the LLT service (over Ethernet) on the selected network adapters.
To configure the VCS private network over the User Datagram Protocol (UDP) layer, do the following:
Select Configure LLT over UDP on IPv4 network or Configure LLT over UDP on IPv6 network depending on how LLT is configured on the existing nodes in the cluster.
Select the check boxes next to the NICs to be assigned to the private network. You can assign maximum eight network links.
Veritas recommends reserving two NICs exclusively for the VCS private network.
If you have only two NICs on a selected system, it is recommended that you lower the priority of at least one NIC that will be used for private as well as public network communication.
To lower the priority of a NIC, right-click the NIC and select Low Priority from the pop-up menu.
Specify a unique UDP port for each of the link. Click Edit Ports if you wish to edit the UDP ports for the links. The default ports numbers are 50000 to 50007. You can use ports in the range 49152 to 65535. Click OK.
For each selected NIC, verify the displayed IP address. If a selected NIC has multiple IP addresses assigned, double-click the field and choose the desired IP address from the drop-down list. In case of IPv4, each IP address can be in a different subnet.
The IP address is used for the VCS private communication over the specified UDP port.
For each selected NIC, double-click the respective field in the Link column and choose a link from the drop-down list. Specify a different link (Link1 or Link2) for each NIC. Each link is associated with a UDP port that you specified earlier.
- If the option to change the VCS HAD Helper User account was selected, in the VCS Helper Service User Account dialog box, specify the name of a domain user in whose context the VCS Helper service will run.
The VCS High Availability Daemon, which runs in the context of the local system built-in account, uses the VCS Helper service user context to access the network.
Select one of the following:
Existing user
Choose an existing user account context for the VCS Helper service.
New user
Create a new user account context for the VCS Helper service.
Enter a valid user name for the selected account and click Next.
Do not append the domain name to the user name; do not enter user names as DOMAIN\user or user@DOMAIN.
Enter a password for the selected account and click OK.
- Review the summary information and click Reconfigure.
- The wizard starts running commands to apply the changes. After all services have been successfully configured, click Finish.