Installing VERITAS Cluster Server. Topic 1: Using the VERITAS Product Installer After completing this topic, you will be able to install VCS using the.

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

Chapter 20 Oracle Secure Backup.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Copyright © 2014 EMC Corporation. All Rights Reserved. Linux Host Installation and Integration for Block Upon completion of this module, you should be.
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Intel® Manager for Lustre* Lustre Installation & Configuration
VCS I/O Fencing. I /O Fencing After completing this topic, you will be able to define I / O Fencing.
1 OBJECTIVES To generate a web-based system enables to assemble model configurations. to submit these configurations on different.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
SIS - Security Lab Introductory Session University of Pittsburgh 2006.
System Center Configuration Manager Push Software By, Teresa Behm.
ITE PC v4.0 Chapter 1 1 Operating Systems Computer Networks– 2.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Security SIG: Introduction to Tripwire Chris Harwood John Ives.
SGI Confidential Platform Service Manager. SGI Confidential PSM Front Chassis View Two 2.0 USB Ports, one of which connects to the front chassis.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved.
VMware vCenter Server Module 4.
Installing and Setting up mongoDB replica set PREPARED BY SUDHEER KONDLA SOLUTIONS ARCHITECT.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Linux Operations and Administration
Va-scanCopyright 2002, Marchany Unit 3 – Installing Solaris Randy Marchany VA Tech Computing Center.
1 SAMBA. 2 Module - SAMBA ♦ Overview The presence of diverse machines in the network environment is natural. So their interoperability is critical. This.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.

TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Objectives Define IP Address To be able to assign an IP address with its Subnet Mask and Default Gateway to a PC that operates using Windows 7 or Fedora.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public TSHOOT v6 Chapter 1 1 Chapter 1: Planning Maintenance for Complex Networks CCNP TSHOOT:
System Administration and Basic Functionality Version 4.0 – September 2007 Q-Advisor Quick Start.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Special Project Group 03 Chintan Shah Nisharg Patel Cynthia York.
Implementing Network Access Protection
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
By Rashid Khan Lesson 10-From Here to There: Remote Installation of the Windows XP Professional Client.
1 Installation When this module is complete, you will be able to:  Set a static IP address for your laptop  Install the snom ONE software  Navigate.
Module 8: Configuring Network Access Protection
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
VERITAS Cluster Server for Solaris Event Notification.
© 2010 Cisco Systems, Inc. All rights reserved. 1 Cisco PublicSTUC 1 STUC Tool Training Show Technical-Support Tool for Unity Connection By: Michael Hollowell.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
7200 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. 1/16 OfficeServ 7200 Enterprise IP Solutions Data Server S/W Upgrade.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—1-1 Getting Started with Cisco Unified Communications Manager Installing and Upgrading Cisco.
7200 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. 1/7 OfficeServ 7200 Enterprise IP Solutions Data Server S/W Upgrade.
PAYware Transact Terminal Interface Manager
Linux Operations and Administration
2: Operating Systems Networking for Home & Small Business.
VCS Building Blocks. Topic 1: Cluster Terminology After completing this topic, you will be able to define clustering terminology.
How to setup DSS V6 iSCSI Failover with XenServer using Multipath Software Version: DSS ver up55 Presentation updated: February 2011.
Operating Environment. Installation and Upgrade Options Solaris suninstall program Solaris Web Start Installation Custom Jumpstart procedure Standard.
3 Copyright © 2006, Oracle. All rights reserved. Installation and Administration Basics.
CACI Proprietary Information | Date 1 PD² SR13 Client Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
COMP1321 Digital Infrastructure Richard Henson March 2016.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
C Copyright © 2006, Oracle. All rights reserved. Oracle Secure Backup Additional Installation Topics.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Apache Web Server v. 2.2 Reference Manual Chapter 2 Starting Apache.
Introduction to networking (Yarnfield) Configure a router.
CACI Proprietary Information | Date 1 Upgrading to webMethods Product Suite Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8,
VMware ESX and ESXi Module 3.
Lab 1 introduction, debrief
System and Communication Faults
Networking for Home and Small Businesses – Chapter 2
Preparing a Site for VCS Implementation
Networking for Home and Small Businesses – Chapter 2
Networking for Home and Small Businesses – Chapter 2
Networking for Home and Small Businesses – Chapter 2
Networking for Home and Small Businesses – Chapter 2
Presentation transcript:

Installing VERITAS Cluster Server

Topic 1: Using the VERITAS Product Installer After completing this topic, you will be able to install VCS using the VPI utility.

Using the VERITAS Product Installer The VERITAS product installer, the recommended installation procedure for VCS:  Performs environment checking to ensure that prerequisites are met  Enables you to add product licenses  Is started from the installer file in the CD mount point directory  Runs the installvcs utility  Logs user input and program output to files in: /opt/VRTS/install/logs

The installvcs Utility The installvcs utility, called by the product installer:  Uses the platform-specific operating system command to install the VCS packages on all the systems in the cluster  Configures Ethernet network links for the VCS communications interconnect  Brings the cluster up with the ClusterService group, which manages the VCS Web GUI (if configured during installation) The installvcs utility requires remote root access to other systems in the cluster while the script is being run. The /.rhosts file: You can remove.rhosts files after VCS installation. ssh : No prompting is permitted. The installvcs utility requires remote root access to other systems in the cluster while the script is being run. The /.rhosts file: You can remove.rhosts files after VCS installation. ssh : No prompting is permitted.

Install VCS packages. Configure VCS. Automated VCS Installation Procedure Invoke installer Enter license keys. Select optional packages. Configure SMTP and SNMP notification. Start VCS. Configure the cluster (name, ID, interconnect). Configure the Web GUI (device name, IP address, subnet mask). User input to the script What the script does Enter system names. Verify communication and install VERITAS infrastructure packages. Set up VCS user accounts. Select root broker node.

Installing VCS Updates  Check for any updates before proceeding to configure your cluster:  Updates are usually provided as patches or maintenance packs.  Read the installation instructions included with the update to ensure that all prerequisites are met before you start the installation process.

Topic 2: VCS Configuration Files After completing this topic, you will be able to display the configuration files created during installation.

VCS File Locations Configuration files for the cluster interconnect /etc VCS engine and agent log files /var/VRTSvcs/log Apache servelet engine for Web GUI /opt/VRTSvcs/gui/ conf Cluster configuration files /etc/VRTSvcs/conf /config Executables, scripts, libraries /sbin, /usr/sbin, /opt/VRTSvcs/bin ContentsDirectories

 LLT configuration files: –/etc/llttab Specifies the cluster ID number, the host name, and the LLT network interfaces used for the cluster interconnect –/etc/llthosts Lists the host names of each cluster system with its corresponding LLT node ID number  GAB configuration file: /etc/gabtab Specifies how many systems are members of the cluster and starts GAB Communication Configuration Files

VCS configuration files  /etc/VRTSvcs/conf/config/types.cf  /etc/VRTSvcs/conf/config/main.cf include "types.cf" cluster VCS ( … ) system train1 ( ) system train2 ( ) group ClusterService ( … ) IP webip ( Device = eri0 Address = " " NetMask = " " ) … Cluster Configuration Files Cluster Name Information entered for Web-based Cluster Manager All the systems where VCS is installed All the systems where VCS is installed Solaris

Topic 3: Viewing the Default VCS Configuration After completing this topic, you will be able to view the VCS configuration created during installation.

Viewing Status View LLT status: # lltconfig llt is running View GAB status: # gabconfig -a GAB Port Memberships ================================ Port a gen a36e003 membership 01 Port h gen fd57002 membership 01 View VCS status: # hastatus –sum -- System State Frozen A S1 RUNNING 0 A S2 RUNNING 0

Topic 4: Other Installation Considerations After completing this topic, you will be able to describe other components to consider at installation time.

I/O Fencing Considerations I/O Fencing is the recommended method for protecting shared storage in a cluster environment.  Configure fencing after initial VCS installation if: –Your shared storage devices support SCSI-3 Persistent Reservations; and –You installed a 4.0 or later version of VCS; and –You are using Volume Manager 4.0 or later.

Lab 4: Installing VCS node1 node2 #./installer vcs1 Link 1:______ Link 2:______ Software location:_______________________________ Subnet:_______ Link 1:______ Link 2:______ Public:______ 4.x #./installvcs Pre-4.0