Veritas cluster admin guide for windows


















For single-node clusters with the required number of NICs, the wizard prompts you to configure a private link heartbeat. In the dialog box, click Yes to configure a private link heartbeat.

If a system is not validated, review the message associated with the failure and restart the wizard after rectifying the problem. If you chose to configure a private link heartbeat in step 9 , proceed to the next step. Otherwise, proceed to step To configure the VCS private network over ethernet, complete the following steps:.

Select the check boxes next to the two NICs to be assigned to the private network. You can assign a maximum of eight network links. Veritas recommends reserving two NICs exclusively for the private network. However, you could lower the priority of one of the NICs and use the low-priority NIC for both public and as well as private communication.

If there are only two NICs on a selected system, Veritas recommends that you lower the priority of at least one NIC that will be used for private as well as public network communication. Veritas recommends that you do not select teamed NICs for the private network.

The wizard configures the LLT service over ethernet on the selected network adapters. Select the check boxes next to the NICs to be assigned to the private network.

If a selected NIC has multiple IP addresses assigned, double-click the field and choose the desired IP address from the drop-down list.

In case of IPv4, each IP address can be in a different subnet. Specify a unique UDP port for each of the link. You can use ports in the range to The default ports numbers are and respectively. Click OK. For each selected NIC, double-click the respective field in the Link column and choose a link from the drop-down list. Each link is associated with a UDP port that you specified earlier. The specified UDP ports are used for the private network communication. Click Existing user and select a user name from the drop-down list.

If you chose not to retrieve the list of users in step 4 , type the user name in the Specify User field and then click Next. To specify a new user, click New user and type a valid user name in the Create New User field and then click Next. In the Password dialog box, type the password for the specified user and click OK , and then click Next. In this mode, communication between cluster nodes and clients, including Cluster Manager Java Console , occurs using the encrypted VCS cluster administrator credentials.

The wizard uses the VCSEncrypt utility to encrypt the user password. The default user name for the VCS administrator is admin and the password is password. Both are case-sensitive. You can accept the default user name and password for the VCS administrator account or type a new name and password. To use the single sign-on feature, click Use Single Sign-on. In this mode, the VCS Authentication Service is used to secure communication between cluster nodes and clients by using digital certificates for authentication and SSL to encrypt communication over the public network.

The wizard configures all the cluster nodes as root brokers RB and authentication brokers AB. Authentication brokers serve as intermediate registration and certification authorities. Authentication brokers have certificates signed by the root. These brokers can authenticate clients such as users and services.

The wizard creates a copy of the certificates on all the cluster nodes. The wizard configures the VCS private network.

If the selected systems have LLT or GAB configuration files, the wizard displays an informational dialog box before overwriting the files. In the dialog box, click OK to overwrite the files. Otherwise, click Cancel , exit the wizard, move the existing files to a different location, and rerun the wizard. The wizard starts running commands to configure VCS services. If an operation fails, click View configuration log file to see the log. To configure the ClusterService group later, click Finish.

At this stage, the wizard has collected the information required to set up the cluster configuration. After the wizard completes its operations, with or without the ClusterService group components, the cluster is ready to host application service groups. Check the Notifier Option check box to configure notification of important events to designated recipients. The WAC process is required for inter-cluster communication. The Disaster Recovery chapters in the application solutions guides discuss how to use the Disaster Recovery wizard to configure the GCO option.

Configuring notification. Configuring Wide-Area Connector process for global clusters. Support Documentation Cluster Server 7. Cluster Server 7. Last Published: Section I. Configuring the cluster using the Cluster Configuration Wizard After installing the software, set up the components required to run Cluster Server. Note the following prerequisites before you proceed: The required network adapters NICs , and SCSI controllers are installed and connected to each system. Veritas recommends the following actions for network adapters: Disable the ethernet auto-negotiation options on the private NICs to prevent: Loss of heartbeats on the private networks VCS from mistakenly declaring a system as offline.

Veritas Access supports adding a cloud service as a storage tier for a scale-out file system. You can move data between the tiers based on file name patterns and when the files were last accessed or modified. Use scheduled policies to move data between the tiers on a regular basis. You can also retrieve data archived in Amazon Glacier. See Configuring the cloud as a tier for scale-out file systems. Veritas Access supports read caching on solid state drives SSDs for applications running on Veritas Access file systems.

See About SmartIO for solid-state drives. Veritas Access's built-in SmartTier feature can reduce the cost of storage by moving data to lower-cost storage. Veritas Access storage tiering also facilitates the moving of data between different drive architectures and on-premises. Veritas Access supports snapshots for recovering from data corruption.

If files, or an entire file system, are deleted or become corrupted, you can replace them from the latest uncorrupted snapshot. In cases where Veritas Access is used to store deduplicated backup data from another source, there is no need to set up a separate deduplication mechanism.

It is recommended to use Veritas Deduplication for long-term data retention instead of the OpenDedup solution. You can compress files to reduce the space used, while retaining the accessibility of the files and having the compression be transparent to applications. Compressed files look and behave almost exactly like uncompressed files: the compressed files have the same name, and can be read and written as with uncompressed files. See About compressing files. Built-in NetBackup client for backing up your file systems to a NetBackup master or media server.

Once data is backed up, a storage administrator can delete unwanted data from Veritas Access to free up expensive primary storage for more data. See About Veritas Access episodic replication. See About Veritas Access continuous replication.

See Configuring the NIS-related settings. With support for partitioned directories, directory entries are redistributed into various hash directories. These hash directories are not visible in the name-space view of the user or operating system.

For every new create, delete, or lookup, this feature performs a lookup for the respective hashed directory and performs the operation in that directory. This leaves the parent directory inode and its other hash directories unobstructed for access, which vastly improves file system performance. By default this feature is not enabled. Enables you to create an isolated storage pool with a self-contained configuration. An isolated storage pool protects the pool from losing the associated metadata even if all the configuration disks in the main storage pool fail.

See About configuring storage pools. Media server - Streaming media represents a new wave of rich Internet content. Recent advancements in video creation, compression, caching, streaming, and other content delivery technology have brought audio and video together to the Internet as rich media.

You can use Veritas Access to store your rich media, videos, movies, audio, music, and photos. See About creating a tuned file system for a specific workload. Veritas Access Administrator's Guide. Last Published:



0コメント

  • 1000 / 1000