HP serviceguard t2808-90006 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software-Handbücher HP serviceguard t2808-90006 herunter. HP serviceguard t2808-90006 User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - May 2008 Second Edition

HP Serviceguard Extended Distance Cluster for Linux A.01.00 Deployment Guide Manufacturing Part Number: T2808-90006May 2008 Second Edition

Seite 3 - Contents

Managing an MD DeviceStarting the MD DeviceAppendix A100Starting the MD DeviceAfter you create an MD device, you would need to stop and start the MD d

Seite 4

Managing an MD DeviceRemoving and Adding an MD Mirror Component DiskAppendix A 101Removing and Adding an MD Mirror Component DiskThere are certain fai

Seite 5

Managing an MD DeviceRemoving and Adding an MD Mirror Component DiskAppendix A102Example A-3 Removing a failed MD component disk from /dev/md0 arrayTo

Seite 6

Index103Aasynchronous data replication, 39Cclusterextended distance, 22FibreChannel, 52metropolitan, 23wide area, 27cluster maintenance, 49configuring

Seite 7 - Printing History

Index104persistent device names, 66physical data replication, 39power sourcesredundant, 44QQLogic cards, 70RRAID Monitoring ServiceConfigure, 78raid.c

Seite 8 - HP Printing Division:

11PrefaceRelated PublicationsThe following documents contain additional useful information:• Clusters for High Availability: a Primer of HP Solution

Seite 10

Disaster Tolerance and Recovery in a Serviceguard ClusterChapter 1 131 Disaster Tolerance and Recovery in a Serviceguard ClusterThis chapter introduce

Seite 11

Disaster Tolerance and Recovery in a Serviceguard ClusterEvaluating the Need for Disaster ToleranceChapter 114Evaluating the Need for Disaster Toleran

Seite 12

Disaster Tolerance and Recovery in a Serviceguard ClusterEvaluating the Need for Disaster ToleranceChapter 1 15line inoperable as well as the computer

Seite 13 - Recovery in a Serviceguard

Disaster Tolerance and Recovery in a Serviceguard ClusterWhat is a Disaster Tolerant Architecture?Chapter 116What is a Disaster Tolerant Architecture?

Seite 14

Disaster Tolerance and Recovery in a Serviceguard ClusterWhat is a Disaster Tolerant Architecture?Chapter 1 17impact. For these types of installations

Seite 15

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 118Understanding Types of Disaster T

Seite 16

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 1 19architecture are followed. Exten

Seite 17

2Legal Notices © Copyright 2006-2008 Hewlett-Packard Development Company, L.P.Publication Date: 2008Valid license from HP required for possession, use

Seite 18 - Clusters

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 120Figure 1-3 Extended Distance Clus

Seite 19

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 1 21Figure 1-4 Two Data Center Setup

Seite 20

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 122Also note that the networking in

Seite 21

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 1 23Cluster Extension (CLX) ClusterA

Seite 22

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 124Figure 1-5 shows a CLX for a Linu

Seite 23

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 1 25Benefits of CLX• CLX offers a mo

Seite 24

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 126• Disk resynchronization is indep

Seite 25

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 1 27"objective" can be set

Seite 26

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 128Figure 1-6 Continental Cluster Co

Seite 27 - Continental Cluster

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 1 29Benefits of Continentalclusters•

Seite 28

3Contents1. Disaster Tolerance and Recovery in a Serviceguard ClusterEvaluating the Need for Disaster Tolerance . . . . . . . . . . . . . . . . . . .

Seite 29

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 130replicate the data between two da

Seite 30

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 1 31Table 1-1 Comparison of Disaster

Seite 31

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 132Key LimitationNo ability to check

Seite 32

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 1 33Maximum Distance100 Kilometers S

Seite 33

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 134Application Failover typeAutomati

Seite 34

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 1 35Data Replication LinkDark Fiber

Seite 35

Disaster Tolerance and Recovery in a Serviceguard ClusterUnderstanding Types of Disaster Tolerant ClustersChapter 136DTS Software/Licenses RequiredSGL

Seite 36

Disaster Tolerance and Recovery in a Serviceguard ClusterDisaster Tolerant Architecture GuidelinesChapter 1 37Disaster Tolerant Architecture Guideline

Seite 37

Disaster Tolerance and Recovery in a Serviceguard ClusterDisaster Tolerant Architecture GuidelinesChapter 138Protecting Data through ReplicationThe mo

Seite 38

Disaster Tolerance and Recovery in a Serviceguard ClusterDisaster Tolerant Architecture GuidelinesChapter 1 39depending on the volume of data. Some ap

Seite 39

Contents4Creating a Multiple Disk Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72To Create and Assembl

Seite 40

Disaster Tolerance and Recovery in a Serviceguard ClusterDisaster Tolerant Architecture GuidelinesChapter 140Figure 1-7 Physical Data Replication MD S

Seite 41

Disaster Tolerance and Recovery in a Serviceguard ClusterDisaster Tolerant Architecture GuidelinesChapter 1 41• The logical order of data writes is no

Seite 42

Disaster Tolerance and Recovery in a Serviceguard ClusterDisaster Tolerant Architecture GuidelinesChapter 142• Because there are multiple read devices

Seite 43

Disaster Tolerance and Recovery in a Serviceguard ClusterDisaster Tolerant Architecture GuidelinesChapter 1 43Figure 1-8 Logical Data Replication Adva

Seite 44

Disaster Tolerance and Recovery in a Serviceguard ClusterDisaster Tolerant Architecture GuidelinesChapter 144• If the primary database fails and is co

Seite 45

Disaster Tolerance and Recovery in a Serviceguard ClusterDisaster Tolerant Architecture GuidelinesChapter 1 45Figure 1-9 Alternative Power Sources Hou

Seite 46

Disaster Tolerance and Recovery in a Serviceguard ClusterDisaster Tolerant Architecture GuidelinesChapter 146Disaster Tolerant Local Area NetworkingEt

Seite 47

Disaster Tolerance and Recovery in a Serviceguard ClusterDisaster Tolerant Architecture GuidelinesChapter 1 47Disaster Tolerant Cluster LimitationsDis

Seite 48

Disaster Tolerance and Recovery in a Serviceguard ClusterManaging a Disaster Tolerant EnvironmentChapter 148Managing a Disaster Tolerant EnvironmentIn

Seite 49

Disaster Tolerance and Recovery in a Serviceguard ClusterManaging a Disaster Tolerant EnvironmentChapter 1 49Even if recovery is automated, you may ch

Seite 51 - Software RAID

Disaster Tolerance and Recovery in a Serviceguard ClusterAdditional Disaster Tolerant Solutions InformationChapter 150Additional Disaster Tolerant Sol

Seite 52 - Networking

Building an Extended Distance Cluster Using Serviceguard and Software RAIDChapter 2 512 Building an Extended Distance Cluster Using Serviceguard and S

Seite 53 - Location Architectures

Building an Extended Distance Cluster Using Serviceguard and Software RAIDTypes of Data Link for Storage and NetworkingChapter 252Types of Data Link f

Seite 54

Building an Extended Distance Cluster Using Serviceguard and Software RAIDTwo Data Center and Quorum Service Location ArchitecturesChapter 2 53Two Dat

Seite 55

Building an Extended Distance Cluster Using Serviceguard and Software RAIDTwo Data Center and Quorum Service Location ArchitecturesChapter 254• Fibre

Seite 56

Building an Extended Distance Cluster Using Serviceguard and Software RAIDTwo Data Center and Quorum Service Location ArchitecturesChapter 2 55Figure

Seite 57

Building an Extended Distance Cluster Using Serviceguard and Software RAIDTwo Data Center and Quorum Service Location ArchitecturesChapter 256There ar

Seite 58

Building an Extended Distance Cluster Using Serviceguard and Software RAIDRules for Separate Network and Data LinksChapter 2 57Rules for Separate Netw

Seite 59

Building an Extended Distance Cluster Using Serviceguard and Software RAIDGuidelines on DWDM Links for Network and DataChapter 258Guidelines on DWDM L

Seite 60 - Chapter 260

Building an Extended Distance Cluster Using Serviceguard and Software RAIDGuidelines on DWDM Links for Network and DataChapter 2 59• Fibre Channel swi

Seite 61

Contents6

Seite 62 - Understanding Software RAID

Building an Extended Distance Cluster Using Serviceguard and Software RAIDGuidelines on DWDM Links for Network and DataChapter 260

Seite 63 - Software

Configuring your Environment for Software RAIDChapter 3 613 Configuring your Environment for Software RAIDThe previous chapters discussed conceptual i

Seite 64

Configuring your Environment for Software RAIDUnderstanding Software RAIDChapter 362Understanding Software RAIDRedundant Array of Independent Disks (R

Seite 65 - Chapter 3 65

Configuring your Environment for Software RAIDInstalling the Extended Distance Cluster SoftwareChapter 3 63Installing the Extended Distance Cluster So

Seite 66 - Configuring the Environment

Configuring your Environment for Software RAIDInstalling the Extended Distance Cluster SoftwareChapter 364Complete the following procedure to install

Seite 67

Configuring your Environment for Software RAIDInstalling the Extended Distance Cluster SoftwareChapter 3 65In the output, the product name, xdc -A.01.

Seite 68

Configuring your Environment for Software RAIDConfiguring the EnvironmentChapter 366Configuring the EnvironmentAfter setting up the hardware as descri

Seite 69 - Parameter

Configuring your Environment for Software RAIDConfiguring the EnvironmentChapter 3 67that are of identical sizes. Differences in disk set size results

Seite 70

Configuring your Environment for Software RAIDConfiguring the EnvironmentChapter 368• Ensure that the Quorum Server link is close to the Ethernet link

Seite 71 - Using Persistent Device Names

Configuring your Environment for Software RAIDConfiguring Multiple Paths to StorageChapter 3 69Configuring Multiple Paths to StorageHP requires that y

Seite 72

7Printing History The printing date and part number indicate the current edition. The printing date changes when a new edition is printed. (Minor co

Seite 73

Configuring your Environment for Software RAIDConfiguring Multiple Paths to StorageChapter 370The QLogic cards are configured to hold up any disk acce

Seite 74

Configuring your Environment for Software RAIDUsing Persistent Device NamesChapter 3 71Using Persistent Device NamesWhen there is a disk related failu

Seite 75

Configuring your Environment for Software RAIDCreating a Multiple Disk DeviceChapter 372Creating a Multiple Disk DeviceAs mentioned earlier, the first

Seite 76 - RAID Configuration File

Configuring your Environment for Software RAIDCreating a Multiple Disk DeviceChapter 3 732. Assemble the MD device on the other node by running the fo

Seite 77

Configuring your Environment for Software RAIDCreating Volume Groups and Configuring VG Exclusive Activation on the MD MirrorChapter 374Creating Volum

Seite 78 - Editing the raid.conf File

Configuring your Environment for Software RAIDCreating Volume Groups and Configuring VG Exclusive Activation on the MD MirrorChapter 3 75Found duplica

Seite 79

Configuring your Environment for Software RAIDConfiguring the Package Control Script and RAID Configuration FileChapter 376Configuring the Package Con

Seite 80

Configuring your Environment for Software RAIDConfiguring the Package Control Script and RAID Configuration FileChapter 3 77# Specify the method of ac

Seite 81

Configuring your Environment for Software RAIDConfiguring the Package Control Script and RAID Configuration FileChapter 378To Edit the XDC_CONFIG FILE

Seite 82

Configuring your Environment for Software RAIDConfiguring the Package Control Script and RAID Configuration FileChapter 3 79more time elapses than wha

Seite 83

8HP Printing Division:Business Critical Computing Business Unit Hewlett-Packard Co.19111 Pruneridge Ave.Cupertino, CA 95014

Seite 84 - Chapter 384

Configuring your Environment for Software RAIDConfiguring the Package Control Script and RAID Configuration FileChapter 380For example, let us assume

Seite 85 - Handling

Configuring your Environment for Software RAIDConfiguring the Package Control Script and RAID Configuration FileChapter 3 81Now consider an XDC config

Seite 86

Configuring your Environment for Software RAIDConfiguring the Package Control Script and RAID Configuration FileChapter 382Again, if the network is se

Seite 87 - Chapter 4 87

Configuring your Environment for Software RAIDConfiguring the Package Control Script and RAID Configuration FileChapter 3 83• RAID_MONITOR_INTERVALThi

Seite 88

Configuring your Environment for Software RAIDConfiguring the Package Control Script and RAID Configuration FileChapter 384

Seite 89 - 1. Restore the links in both

Disaster Scenarios and Their HandlingChapter 4 854 Disaster Scenarios and Their HandlingThe previous chapters provided information on deploying Softwa

Seite 90

Disaster Scenarios and Their HandlingChapter 486The following table lists all the disaster scenarios that are handled by the Extended Distance Cluster

Seite 91

Disaster Scenarios and Their HandlingChapter 4 87A package (P1) is running on a node (Node 1). The package uses a mirror (md0) that consists of two st

Seite 92

Disaster Scenarios and Their HandlingChapter 488A package (P1) is running on a node (Node 1). The package uses a mirror (md0) that consists of two sto

Seite 93 - 1. Reconnect the FC links

Disaster Scenarios and Their HandlingChapter 4 89This is a multiple failure scenario where the failures occur in a particular sequence in the configur

Seite 94

9PrefaceThis guide introduces the concept of Extended Distance Clusters (XDC). It describes how to configure and manage HP Serviceguard Extended Dis

Seite 95

Disaster Scenarios and Their HandlingChapter 490This is a multiple failure scenario where the failures occur in a particular sequence in the configura

Seite 96 - Chapter 496

Disaster Scenarios and Their HandlingChapter 4 91This failure is the same as the previous failure except that the package (P1) is configured with RPO_

Seite 97 - A Managing an MD Device

Disaster Scenarios and Their HandlingChapter 492In this case, the package (P1) runs with RPO_TARGET set to 60 seconds.Package P1 is running on node N1

Seite 98

Disaster Scenarios and Their HandlingChapter 4 93This scenario is an extension of the previous failure scenario. In the previous scenario, when the pa

Seite 99 - Stopping the MD Device

Disaster Scenarios and Their HandlingChapter 494In this case, the package (P1) runs with RPO-TARGET set to 60 seconds.In this case, initially the pack

Seite 100 - Starting the MD Device

Disaster Scenarios and Their HandlingChapter 4 95In this case, initially the package (P1) is running on node N1. P1 uses a mirror md0 consisting of S1

Seite 101 - Component Disk

Disaster Scenarios and Their HandlingChapter 496

Seite 102

Managing an MD DeviceAppendix A 97A Managing an MD DeviceThis chapter includes additional information on how to manage the MD device. For the latest i

Seite 103

Managing an MD DeviceViewing the Status of the MD DeviceAppendix A98Viewing the Status of the MD Device After creating an MD device, you can view its

Seite 104

Managing an MD DeviceStopping the MD DeviceAppendix A 99Stopping the MD DeviceAfter you create an MD device, it begins to run. You need to stop the de

Kommentare zu diesen Handbüchern

Keine Kommentare