SunEnterprise Cluster Administration

download SunEnterprise Cluster Administration

of 682

Transcript of SunEnterprise Cluster Administration

  • 8/13/2019 SunEnterprise Cluster Administration

    1/680

    Sun Microsystems, Inc.MS BRM01-209500 Eldorado BoulevardBroomeld, Colorado 80021U.S.A.

    SunEnterpriseClusterAdministration

    Rev. A, September 1999

    ES-330

    StudentGuide WithInstructorNotes

  • 8/13/2019 SunEnterprise Cluster Administration

    2/680

    Pleaseecycle

    Copyright 1999 Sun Microsystems, Inc., 901San Antonio Road, Palo Alto, California 94303, U.S.A. All rights reserved.

    This product or document is protected by copyright and distributedunder licenses restricting its use, copying,distribution, and decompilation. No part of this product or document may be reproduced in any form by any meanswithout prior written authorization of Sun and its licensors, if any.

    Third-party software, including font technology, is copyrightedand licensed from Sun suppliers.

    Parts of theproduct may be derivedfromBerkeley BSD systems, licensedfrom the Universityof California. UNIX is aregistered trademark in the U.S.and other countries, exclusively licensed through X/Open Company, Ltd.

    Sun,Sun Microsystems, the Sun Logo, Sun Enterprise, Sun StorEdge Volume Manager, SolsticeDiskSuite, SolarisOperating Environment, Sun StorEdge A5000,Solstice SyMon, NFS,JumpStart, Sun VTS,OpenBoot, and AnswerBookare trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S.and other countries.

    All SPARC trademarks areusedunder license and are trademarks or registered trademarks of SPARC International, Inc.in the U.S.and other countries. Products bearing SPARCtrademarks arebased uponan architecture developed by SunMicrosystems, Inc.

    TheOPEN LOOK and Sun Graphical User Interface was developed by Sun Microsystems, Inc. forits users and licensees.Sun acknowledges the pioneering efforts of Xerox in researching and developing the conceptof visual or graphical userinterfaces for the computerindustry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface,which license also covers Suns licensees who implement OPEN LOOK GUIsand otherwise comply with Suns writtenlicense agreements.

    U.S. Government approval required when exporting the product.

    RESTRICTED RIGHTS: Use,duplication, or disclosureby the U.S.Govt is subject to restrictions of FAR 52.227-14(g)(2)(6/87) and FAR 52.227-19(6/87), or DFAR 252.227-7015 (b)(6/95) and DFAR 227.7202-3(a).

    DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS,AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTYOF MERCHANTABILITY, FITNESS FOR APARTICULARPURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCHDISCLAIMERS ARE HELDTO BE LEGALLY INVALID.

  • 8/13/2019 SunEnterprise Cluster Administration

    3/680

    iiiCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    ContentsAbout This Course ................................................................................... xvii

    Course Overview ........................................................................... xviiiCourse Map........................................................................................ xixModule-by-Module Overview......................................................... xxCourse Objectives........................................................................... xxivSkills Gained by Module................................................................. xxvGuidelines for Module Pacing ..................................................... xxviTopics Not Covered...................................................................... xxviiHow Prepared Are You?............................................................. xxviiiIntroductions ................................................................................... xxixHow to Use Course Materials ........................................................ xxxCourse Icons and Typographical Conventions ......................... xxxii

    Icons .........................................................................................xxxiiTypographical Conventions............................................... xxxiii

    Notes to the Instructor................................................................. xxxivPreparing for ES-330 Classes...............................................xxxix

    Sun Cluster Overview ...............................................................................1-1Objectives ........................................................................................... 1-1Relevance............................................................................................ 1-2Additional Resources ....................................................................... 1-3Sun Cluster 2.2 Release Features .................................................... 1-4Cluster Hardware Components...................................................... 1-6

    Administration Workstation ...................................................1-7Terminal Concentrator.............................................................1-7Cluster Host Systems................................................................1-7Redundant Private Networks .................................................1-8Cluster Disk Storage .................................................................1-8

    High Availability Features .............................................................. 1-9High Availability Hardware Design......................................1-9Sun Cluster High Availability Software..............................1-10Software Redundant Array of Inexpensive Disks

    (RAID) Technology..............................................................1-10

  • 8/13/2019 SunEnterprise Cluster Administration

    4/680

    iv Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Controller-Based RAID Technology ....................................1-10Year 2000 Compliance............................................................1-10

    High Availability Strategies .......................................................... 1-11Redundant Servers..................................................................1-12Redundant Data ......................................................................1-12

    Redundant Public Networks.................................................1-12Redundant Private Networks ...............................................1-12Cluster Configurations................................................................... 1-13

    Highly Available Data Service Configuration....................1-13Parallel Database Configuration...........................................1-14

    Sun Cluster Application Support ................................................. 1-15Highly Available Data Service Support...............................1-16Parallel Database Support .....................................................1-16

    Logical Hosts ................................................................................... 1-17Logical Host Failure Process .................................................1-18Cluster Configuration Databases..........................................1-18

    Fault Monitoring ............................................................................. 1-19Data Service Fault Monitoring..............................................1-20Cluster Fault Monitoring .......................................................1-20

    Failure Recovery Summary ........................................................... 1-22Exercise: Lab Equipment Familiarization.................................... 1-25

    Preparation...............................................................................1-25Tasks .........................................................................................1-25

    Check Your Progress ...................................................................... 1-26Think Beyond .................................................................................. 1-27

    Terminal Concentrator ..............................................................................2-1Objectives ........................................................................................... 2-1Relevance............................................................................................ 2-2Additional Resources ....................................................................... 2-3Cluster Administration Interface.................................................... 2-4

    Major Elements..........................................................................2-6Terminal Concentrator Overview .................................................. 2-7

    Operating System Load............................................................2-9Setup Port...................................................................................2-9Terminal Concentrator Setup Programs................................2-9

    Terminal Concentrator Setup........................................................ 2-10Connecting to Port 1 ...............................................................2-11Enabling Setup Mode .............................................................2-11Setting the Terminal Concentrator IP Address...................2-12Setting the Terminal Concentrator Load Source................2-12Specify the Operating System Image ...................................2-13Setting the Serial Port Variables............................................2-14

    Terminal Concentrator Troubleshooting..................................... 2-15Manually Connecting to a Node...........................................2-15Using the telnet Command to Abort a Node...................2-16

  • 8/13/2019 SunEnterprise Cluster Administration

    5/680

    vCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Connecting to the Terminal Concentrator CLI...................2-16Using the Terminal Concentrator help Command ...........2-16Identifying and Resetting a Locked Port.............................2-17Erasing Terminal Concentrator Settings..............................2-17

    Exercise: Configuring the Terminal Concentrator ..................... 2-18

    Preparation...............................................................................2-18Tasks .........................................................................................2-18Exercise Summary...................................................................2-28

    Check Your Progress ...................................................................... 2-29Think Beyond .................................................................................. 2-30

    Administration Workstation Installation ..............................................3-1Objectives ........................................................................................... 3-1Relevance............................................................................................ 3-2Additional Resources ....................................................................... 3-3Sun Enterprise Cluster Software Summary .................................. 3-4

    Sun Cluster Software Installation...........................................3-6Administrative Workstation Software Packages..................3-6scinstall Command Line Options......................................3-8

    Sun Cluster Installation Program Startup ..................................... 3-9Initial Installation Startup......................................................3-10Existing Installation Startup..................................................3-11Installation Mode ....................................................................3-12

    Administration Workstation Environment................................. 3-13New Search and Man Page Paths.........................................3-13Host Name Resolution Changes...........................................3-14Remote Login Control ............................................................3-14Remote Display Enabling ......................................................3-15Controlling rcp and rsh Access ...........................................3-15

    Cluster Administration Tools Configuration.............................. 3-16Cluster Administration Interface..........................................3-17Administration Tool Configuration Files............................3-18

    Cluster Administration Tools........................................................ 3-19The Cluster Control Panel .....................................................3-20Cluster Console .......................................................................3-21

    Cluster Administration Tools........................................................ 3-24Cluster Help Tool....................................................................3-24

    Exercise: Installing the Sun Cluster Client Software ................. 3-25Preparation...............................................................................3-25Tasks .........................................................................................3-26Updating the Name Service ..................................................3-26Installing OS Patches ..............................................................3-26Running the scinstall Utility ............................................3-27Configuring the Administration Workstation

    Environment .........................................................................3-28

  • 8/13/2019 SunEnterprise Cluster Administration

    6/680

    vi Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Verifying the Administration WorkstationEnvironment .........................................................................3-28

    Configuring the /etc/clusters File ..................................3-29Configuring the /etc/serialports File............................3-29Starting the cconsole Tool ...................................................3-30

    Configuring the Cluster Host Systems Environment........3-31Verifying the Cluster Host Systems Environment.............3-31Exercise Summary...................................................................3-33

    Check Your Progress ...................................................................... 3-34Think Beyond .................................................................................. 3-35

    Preinstallation Configuration ..................................................................4-1Objectives ........................................................................................... 4-1Relevance............................................................................................ 4-2Additional Resources ....................................................................... 4-3Cluster Topologies............................................................................ 4-4

    Clustered Pairs Topology ........................................................4-5Ring Topology ...........................................................................4-6N+1 Topology............................................................................4-7Shared-Nothing Topology.......................................................4-8Scalable Topology .....................................................................4-9

    Cluster Quorum Devices................................................................ 4-10Disk Drive Quorum Device...................................................4-11Array Controller Quorum Device ........................................4-12Quorum Device in a Ring Topology ....................................4-13Quorum Device in a Scalable Topology ..............................4-14

    Cluster Interconnect System Overview ....................................... 4-16Interconnect Types..................................................................4-17Interconnect Configurations..................................................4-17

    Cluster Interconnect System Configuration................................ 4-18Cluster Interconnect Addressing..........................................4-19Point-to-Point Connections....................................................4-20SCI High-Speed Switch Connection.....................................4-21SCI Card Identification...........................................................4-22SCI Card Self-Test Information.............................................4-22SCI Card Scrubber Jumpers...................................................4-23Ethernet Hub Connection......................................................4-24Ethernet Card Identification..................................................4-25

    Public Network Management ....................................................... 4-26PNM Configuration................................................................4-28

    Shared CCD Volume ...................................................................... 4-29Shared CCD Volume Creation..............................................4-31Disabling a Shared CCD ........................................................4-31

    Cluster Configuration Information .............................................. 4-32Using prtdiag to Verify System Configuration ................4-33

  • 8/13/2019 SunEnterprise Cluster Administration

    7/680

    viiCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Interpreting prtdiag Output................................................4-35Identifying Storage Arrays ....................................................4-36

    Storage Array Firmware Upgrades.............................................. 4-37Array Firmware Patches ........................................................4-38

    Exercise: Preinstallation Preparation ........................................... 4-39

    Preparation...............................................................................4-39Tasks .........................................................................................4-39Cluster Topology.....................................................................4-40Quorum Device Configuration.............................................4-40Ethernet Cluster Interconnect Configuration .....................4-41SCI Cluster Interconnect Configuration ..............................4-43Node Locking Configuration ................................................4-46

    Check Your Progress ...................................................................... 4-48Think Beyond .................................................................................. 4-49

    Cluster Host Software Installation .........................................................5-1Objectives ........................................................................................... 5-1Relevance............................................................................................ 5-2Additional Resources ....................................................................... 5-3Sun Cluster Server Software Overview ......................................... 5-4

    Server Package Set Contents ...................................................5-6Sun Cluster Licensing...............................................................5-8

    Sun Cluster Installation Overview ................................................. 5-9Sun Cluster Volume Managers ..................................................... 5-10

    Volume Manager Choices......................................................5-11Sun Cluster Host System Configuration ..................................... 5-12

    Cluster Host System Questions ............................................5-13SCI Interconnect Configuration............................................5-14Ethernet Interconnect Configuration ...................................5-15

    Sun Cluster Public Network Configuration................................ 5-16Sun Cluster Logical Host Configuration ..................................... 5-18Data Protection Configuration...................................................... 5-20

    Failure Fencing ........................................................................5-21Node Locking ..........................................................................5-22Quorum Device .......................................................................5-23

    Application Configuration ............................................................ 5-26Post-Installation Configuration..................................................... 5-28

    Installation Verification..........................................................5-29Correcting Minor Configuration Errors ..............................5-30Software Directory Paths .......................................................5-31SCI Interconnect Configuration............................................5-32

    Exercise: Installing the Sun Cluster Server Software................. 5-34Preparation...............................................................................5-34Tasks .........................................................................................5-35Update the Name Service ......................................................5-35Installing Solaris Operating System Patches.......................5-35

  • 8/13/2019 SunEnterprise Cluster Administration

    8/680

    viii Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Storage Array Firmware Revision........................................5-36Installation Preparation..........................................................5-36Server Software Installation ..................................................5-37SCI Interconnect Configuration............................................5-38Cluster Reboot .........................................................................5-40

    Configuration Verification.....................................................5-40Testing Basic Cluster Operation ...........................................5-41Check Your Progress ...................................................................... 5-42Think Beyond .................................................................................. 5-43

    System Operation .......................................................................................6-1Objectives ........................................................................................... 6-1Relevance............................................................................................ 6-2Additional Resources ....................................................................... 6-3Cluster Administration Tools.......................................................... 6-4

    Basic Cluster Control ( scadmin ).............................................6-6Cluster Control Panel ....................................................................... 6-8

    Starting the Cluster Control Panel..........................................6-9Adding New Applications to the Cluster Control

    Panel.........................................................................................6-9Console Tool Variations.........................................................6-10

    The hastat Command................................................................... 6-11General Cluster Status............................................................6-12Logical Host Configuration...................................................6-13Private Network Status ..........................................................6-14Public Network Status............................................................6-15Data Service Status..................................................................6-16Cluster Error Messages ..........................................................6-17

    Sun Cluster Manager Overview ................................................... 6-18Sun Cluster Manager Startup................................................6-19Initial Sun Cluster Manager Display....................................6-20

    Sun Cluster Manager Displays ..................................................... 6-21SCM Cluster Configuration Display ....................................6-22System Log Filter.....................................................................6-25The SCM Help Display...........................................................6-26

    Cluster SNMP Agent ...................................................................... 6-27Cluster MIB Tables..................................................................6-28SNMP Traps.............................................................................6-29Configuring the Cluster SNMP Agent Port ........................6-30

    Exercise: Using System Operations.............................................. 6-31Preparation...............................................................................6-31Tasks .........................................................................................6-32Starting the Cluster Control Panel........................................6-32Using the hastat Command ................................................6-32Using the Sun Cluster Manager............................................6-33Exercise Summary...................................................................6-35

  • 8/13/2019 SunEnterprise Cluster Administration

    9/680

    ixCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Check Your Progress ...................................................................... 6-36Think Beyond .................................................................................. 6-37

    Volume Management Using CVM and SSVM ....................................7-1Objectives ........................................................................................... 7-1Relevance............................................................................................ 7-2Additional Resources ....................................................................... 7-3Disk Space Management.................................................................. 7-4

    CVM and SSVM Disk Space Management............................7-5Private Region Contents ..........................................................7-7Public Region Usage.................................................................7-7Private and Public Region Format..........................................7-8Initialized Disk Types...............................................................7-8

    CVM and SSVM Encapsulation ...................................................... 7-9Preferred Boot Disk Configuration ......................................7-10Prerequisites for Boot Disk Encapsulation..........................7-11Primary and Mirror Configuration Differences .................7-11The /etc/vfstab File ............................................................7-12Boot PROM Changes..............................................................7-12Un-encapsulating the Boot Disk ...........................................7-13

    CVM and SSVM Disk Grouping................................................... 7-14Cluster Volume Manager Disk Groups ...............................7-15Sun StorEdge Volume Manager Disk Groups....................7-16

    Volume Manager Status Commands ........................................... 7-17Checking Disk Status..............................................................7-19Saving Configuration Information.......................................7-19

    Optimizing Recovery Times.......................................................... 7-20Dirty Region Logging.............................................................7-21The Veritas VxFS File System................................................7-21

    CVM and SSVM Post-Installation ................................................ 7-22Initializing the rootdg Disk Group......................................7-22Matching the vxio Driver Major Numbers ........................7-23StorEdge Volume Manager Dynamic Multi-Pathing ........7-24

    Exercise: Configuring Volume Management.............................. 7-26Preparation...............................................................................7-26Tasks .........................................................................................7-27Installing the CVM or SSVM Software ................................7-28Disabling Dynamic Multipathing (DMP)............................7-29Creating a Simple rootdg Slice..............................................7-30Encapsulating the Boot Disk .................................................7-31Selecting Demonstration Volume Disks..............................7-32Configuring the CVM/SSVM Demonstration

    Volumes.................................................................................7-35Verifying the CVM/SSVM Demonstration File

    Systems..................................................................................7-36

  • 8/13/2019 SunEnterprise Cluster Administration

    10/680

    x Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Verifying the Cluster ..............................................................7-37Exercise Summary...................................................................7-38

    Check Your Progress ...................................................................... 7-39Think Beyond .................................................................................. 7-40

    Volume Management Using SDS ...........................................................8-1Objectives ........................................................................................... 8-1Relevance............................................................................................ 8-2Additional Resources ....................................................................... 8-3Disk Space Management.................................................................. 8-4

    SDS Disk Space Management .................................................8-5Solstice DiskSuite Initialization....................................................... 8-6

    Replica Configuration Guidelines ..........................................8-7SDS Disk Grouping........................................................................... 8-8Dual-String Mediators.................................................................... 8-10

    Shared Diskset Replica Placement........................................8-11Metatrans Devices........................................................................... 8-12

    Metatrans Device Structure ...................................................8-14SDS Status ........................................................................................ 8-15

    Checking Volume Status........................................................8-16Checking Mediator Status......................................................8-16

    Volume Manager Status................................................................. 8-17Checking Replica Status.........................................................8-17

    Volume Manager Status................................................................. 8-18Recording SDS Configuration Information.........................8-18

    SDS Post-Installation ...................................................................... 8-19Configuring State Database Replicas ...................................8-19Configuring the Disk ID (DID) Driver.................................8-20Configuring Dual-String Mediators.....................................8-21

    Exercise: Configuring Volume Management.............................. 8-22Preparation...............................................................................8-22Tasks .........................................................................................8-23Installing the SDS Software ...................................................8-24Configuring the SDS Disk ID Driver....................................8-25Resolving DID Driver Major Number Conflicts.................8-26Initializing the SDS State Databases.....................................8-28SDS Volume Overview...........................................................8-29Selecting SDS Demo Volume Disks Drives.........................8-31Configuring the SDS Demonstration Volumes ..................8-32Configuring Dual-String Mediators.....................................8-32Verifying the SDS Demonstration File Systems .................8-34Verifying the Cluster ..............................................................8-35Exercise Summary...................................................................8-36

    Check Your Progress ...................................................................... 8-37Think Beyond .................................................................................. 8-38

  • 8/13/2019 SunEnterprise Cluster Administration

    11/680

    xiCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Cluster Configuration Database .............................................................9-1Objectives ........................................................................................... 9-1Relevance............................................................................................ 9-2Additional Resources ....................................................................... 9-3Cluster Configuration Information ................................................ 9-4

    The CDB Database ....................................................................9-5The CCD Database....................................................................9-6Cluster Database Consistency......................................................... 9-8

    Data Propagation ......................................................................9-8The CCD Update Protocol .......................................................9-9Database Consistency Checking...........................................9-10Database Majority ...................................................................9-10

    Shared CCD Volume ...................................................................... 9-11Shared CCD Operation ..........................................................9-13Creating a Shared CCD..........................................................9-13Disabling a Shared CCD ........................................................9-15

    CCD Administration ...................................................................... 9-16Verifying CCD Global Consistency.......................................9-16Checkpointing the CCD.........................................................9-17Restoring the CCD From a Backup Copy............................9-17Creating a Purified Copy of the CCD ..................................9-17Disabling the CCD Quorum..................................................9-18Recommended CCD Administration Tasks........................9-18Common Mistakes ..................................................................9-18

    Exercise: CCD Administration...................................................... 9-19Preparation...............................................................................9-19Tasks .........................................................................................9-19

    Maintaining the CCD Database...........................................9-20Exercise Summary...................................................................9-21Check Your Progress ...................................................................... 9-22Think Beyond .................................................................................. 9-23

    Public Network Management ................................................................10-1Objectives ......................................................................................... 10-1Relevance.......................................................................................... 10-2Additional Resources ..................................................................... 10-3Public Network Management ....................................................... 10-4The Network Monitoring Process ................................................ 10-6

    What Happens?.......................................................................10-7How PNM Works ........................................................................... 10-8

    PNM Support Issues...............................................................10-9TEST Routine..........................................................................10-11FAILOVER Routine.................................................................10-12DETERMINE_NET_FAILURE Routine ...................................10-13

    The pnmset Command................................................................. 10-14Other PNM Commands ............................................................... 10-17

  • 8/13/2019 SunEnterprise Cluster Administration

    12/680

    xii Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    The pnmstat Command.......................................................10-17The pnmptor Command.......................................................10-19The pnmrtop Command.......................................................10-19

    Exercise: Configuring the NAFO Groups ................................. 10-20Preparation.............................................................................10-20

    Tasks .......................................................................................10-20Creating a NAFO Group......................................................10-21Disabling the Interface Groups Feature.............................10-22Exercise Summary.................................................................10-23

    Check Your Progress .................................................................... 10-24Think Beyond ................................................................................ 10-25

    Logical Hosts .............................................................................................11-1Objectives ......................................................................................... 11-1Relevance.......................................................................................... 11-2Additional Resources ..................................................................... 11-3Logical Hosts ................................................................................... 11-4Configuring a Logical Host ........................................................... 11-7

    Using the scconf -L Command Option ................................11-8Logical Host Variations................................................................ 11-10

    Basic Logical Host.................................................................11-10Cascading Failover................................................................11-11Disabling Automatic Takeover ...........................................11-12Multiple Disk Group and hostnames...................................11-12

    Administrative File System Overview....................................... 11-13Administrative File System Components..........................11-14Using the scconf -F Command Option.........................11-15

    Logical Host File Systems ............................................................ 11-17Adding a New Logical Host File System...........................11-18Sample Logical Host vfstab File .......................................11-18

    Logical Host Control .................................................................... 11-19Forced Logical Host Migration ...........................................11-19Logical Host Maintenance Mode........................................11-20

    Exercise: Preparing Logical Hosts .............................................. 11-21Preparation.............................................................................11-21Tasks .......................................................................................11-21Preparing the Name Service................................................11-22Activating the Cluster ..........................................................11-22Logical Host Restrictions .....................................................11-23Creating the Logical Hosts ..................................................11-24Creating the CVM/SSVM Administrative File

    System..................................................................................11-25Creating the SDS Administrative File System..................11-25Exercise Summary.................................................................11-28

    Check Your Progress .................................................................... 11-29Think Beyond ................................................................................ 11-30

  • 8/13/2019 SunEnterprise Cluster Administration

    13/680

    xiiiCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    The HA-NFS Data Service ......................................................................12-1Objectives ......................................................................................... 12-1Relevance.......................................................................................... 12-2Additional Resources ..................................................................... 12-3HA-NFS Overview.......................................................................... 12-4

    HA-NFS Support Issues.........................................................12-5Start NFS Methods.......................................................................... 12-7Stop NFS Methods .......................................................................... 12-9HA-NFS Fault Monitoring........................................................... 12-10

    HA-NFS Fault Monitoring Probes......................................12-10Fault Probes ................................................................................... 12-12Local Fault Probes......................................................................... 12-13Remote Fault Probes..................................................................... 12-14Giveaway and Takeaway Process .............................................. 12-15

    Sanity Checking.....................................................................12-16Processes Related to NFS Fault Monitoring.............................. 12-17

    HA-NFS Support Files.................................................................. 12-18Adding Mount Information to the vfstab File................12-19Adding Share Information to the dfstab File ................12-19Sample vfstab and dfstab Files.......................................12-20Removing HA-NFS File Systems From a Logical

    Host......................................................................................12-20Using the hareg Command......................................................... 12-21

    Registering a Data Service ...................................................12-21Unregistering a Data Service...............................................12-24Starting and Stopping a Data Service.................................12-25

    File Locking Recovery .................................................................. 12-26

    Exercise: Setting Up HA-NFS File Systems............................... 12-27Preparation.............................................................................12-27Tasks .......................................................................................12-27Verifying the Environment..................................................12-28Preparing the HA-NFS File Systems..................................12-29Registering HA-NFS Data Service......................................12-30Verifying Access by NFS Clients ........................................12-31Observing HA-NFS Failover Behavior ..............................12-32

    Check Your Progress .................................................................... 12-33Think Beyond ................................................................................ 12-34

    System Recovery ......................................................................................13-1Objectives ......................................................................................... 13-1Relevance.......................................................................................... 13-2Additional Resources ..................................................................... 13-3Sun Cluster Reconfiguration Control........................................... 13-4

    Cluster Membership Monitor................................................13-6Switch Management Agent ...................................................13-6Public Network Management ...............................................13-6

  • 8/13/2019 SunEnterprise Cluster Administration

    14/680

    xiv Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Failfast Driver ( /dev/ff ).......................................................13-6Data Service Fault Monitors ..................................................13-7Disk Management Software ..................................................13-7Database Management Software ..........................................13-7

    Sun Cluster Failfast Driver ............................................................ 13-8

    Failfast Messages...................................................................13-10Sun Cluster Reconfiguration Sequence...................................... 13-11Reconfiguration Triggering Events ....................................13-13Independent Reconfiguration Processes ...........................13-13

    Sun Cluster Reconfiguration Steps............................................. 13-14Reconfiguration Process Priorities......................................13-16Reconfiguration Step Summary..........................................13-17

    Cluster Interconnect Failures ...................................................... 13-18CIS Failure Description ........................................................13-18CIS Failure Symptoms..........................................................13-19Correcting Ethernet CIS Failures ........................................13-20

    Correcting SCI Interconnect Failures .................................13-20Two-Node Partitioned Cluster Failure ...................................... 13-21CVM or SSVM Partitioned Cluster.....................................13-21SDS Partitioned Cluster .......................................................13-22

    Logical Host Reconfiguration ..................................................... 13-23Sanity Checking.....................................................................13-24

    Exercise: Failure Recovery........................................................... 13-25Preparation.............................................................................13-25Tasks .......................................................................................13-25Losing a Private Network Cable.........................................13-26Partitioned Cluster (Split Brain) .........................................13-26

    Public Network Failure (NAFO group).............................13-27Logical Host Fault Monitor Giveaway ..............................13-27Cluster Failfast.......................................................................13-28Exercise Summary.................................................................13-29

    Check Your Progress .................................................................... 13-30Think Beyond ................................................................................ 13-31

    Sun Cluster High Availability Data Service API ..............................14-1Objectives ......................................................................................... 14-1Relevance.......................................................................................... 14-2Additional Resources ..................................................................... 14-3Overview.......................................................................................... 14-4Data Service Requirements............................................................ 14-6

    Client-Server Data Service.....................................................14-6Data Service Dependencies ...................................................14-6No Dependence on Physical Hostname of Server..............14-7Handles Multi-homed Hosts.................................................14-7Handles Additional IP Addresses for Logical Hosts.........14-7

  • 8/13/2019 SunEnterprise Cluster Administration

    15/680

    xvCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Data Service Methods..................................................................... 14-9START Methods......................................................................14-9STOP Methods.......................................................................14-10ABORT Methods...................................................................14-10NET Methods.........................................................................14-11

    Fault Monitoring Methods ..................................................14-12Giveaway and Takeaway............................................................. 14-14Giveaway Scenario................................................................14-15Takeaway Scenario ...............................................................14-16

    Method Considerations................................................................ 14-17START and STOP Method Examples......................................... 14-19

    Example 1...............................................................................14-19Example 2...............................................................................14-20

    Data Service Dependencies ......................................................... 14-21The haget Command Options............................................14-24

    The hactl Command................................................................... 14-26

    The hactl Command Options............................................14-27The halockrun Command .......................................................... 14-28The hatimerun Command .......................................................... 14-29The pmfadm Command................................................................ 14-30What Is Different From HA 1.3?................................................. 14-31The hads C Library Routines ..................................................... 14-32Exercise: Using the Sun Cluster Data Service API ................... 14-33

    Preparation.............................................................................14-33Tasks .......................................................................................14-33Using the haget Command.................................................14-34

    Check Your Progress .................................................................... 14-36

    Think Beyond ................................................................................ 14-37Highly Available DBMS ........................................................................15-1

    Objectives ......................................................................................... 15-1Relevance.......................................................................................... 15-2Additional Resources ..................................................................... 15-3Sun Cluster HA-DBMS Overview................................................ 15-4

    Database Binary Placement ...................................................15-5Supported Database Versions ...............................................15-5HA-DBMS Components.........................................................15-6Multiple Data Services ...........................................................15-6

    Typical HA-DBMS Configuration................................................ 15-7Configuring and Starting HA-DBMS........................................... 15-8Stopping and Unconfiguring HA-DBMS .................................... 15-9

    Removing a Logical Host.....................................................15-10Removing a DBMS From a Logical Host...........................15-10

    The HA-DBMS Start Methods..................................................... 15-11The HA-DBMS Stop and Abort Methods.................................. 15-13

    The HA-DBMS Stop Methods.............................................15-13

  • 8/13/2019 SunEnterprise Cluster Administration

    16/680

    xvi Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    The HA-DBMS Abort Methods...........................................15-14HA-DBMS Fault Monitoring....................................................... 15-15

    Local Fault Probe Operation ...............................................15-16Remote Fault Probe Operation............................................15-16HA-DBMS Action Files ........................................................15-17

    HA-DBMS Failover Procedures..........................................15-19Configuring HA-DBMS for High Availability ......................... 15-20Multiple Data Services .........................................................15-20Raw Partitions Versus File Systems ...................................15-21

    Configuration Overview.............................................................. 15-22General HA-DBMS Configuration Issues..........................15-22User and Group Entries .......................................................15-23Database Software Location ................................................15-23

    Oracle Installation Preparation ................................................... 15-24Sybase Installation Preparation .................................................. 15-26Informix Installation Preparation ............................................... 15-28

    Preparing the Logical Host.......................................................... 15-30Preparing the Database Configuration Files.....................15-31Enable Fault Monitoring Access .........................................15-31Registering the HA-DBMS Data Service ...........................15-32Adding Entries to the CCD..................................................15-32Bring the HA-DBMS for Oracle Servers Into Service ......15-32

    HA-DBMS Control........................................................................ 15-33Setting HA-DBMS Monitoring Parameters.......................15-33Starting and Stopping HA-DBMS Monitoring .................15-37

    HA-DBMS Client Overview........................................................ 15-38Maintaining the List of Monitored Databases ..................15-39

    HA-DBMS Recovery..................................................................... 15-40Client Recovery .....................................................................15-40HA-DBMS Recovery Time...................................................15-41

    HA-DBMS Configuration Files ................................................... 15-42HA-Oracle Configuration Files...........................................15-43HA-Sybase Configuration Files ..........................................15-44HA-Informix Configuration Files.......................................15-45

    Exercise: HA-DBMS Installation................................................. 15-46Preparation.............................................................................15-46Tasks .......................................................................................15-46Exercise Summary.................................................................15-47

    Check Your Progress .................................................................... 15-48Think Beyond ................................................................................ 15-49

    Cluster Configuration Forms ..................................................................A-1Cluster Name and Address Information...................................... A-2

    Multi-Initiator SCSI Configuration ...................................................... B-1Preparing for Multi-Initiator SCSI................................................. B-2

    Background............................................................................... B-2

  • 8/13/2019 SunEnterprise Cluster Administration

    17/680

    xviiCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Changing All Adapters ................................................................... B-3Changing the Initiator ID........................................................ B-3Drive Firmware ........................................................................ B-3

    The nvramrc Script .......................................................................... B-4Changing an Individual Initiator ID for Multipacks .................. B-5

    Sun Storage Array Overviews ................................................................C-1Disk Storage Concepts..................................................................... C-2

    Multi-host Access.....................................................................C-2Host-Based RAID (Software RAID Technology).................C-5Controller-Based RAID (Hardware RAID

    Technology) ...........................................................................C-6Redundant Dual Active Controller Driver...........................C-7Dynamic Multi-Path Driver....................................................C-8Hot Swapping...........................................................................C-9

    SPARCstorage Array 100.............................................................. C-10SPARCstorage Array 100 Features......................................C-10SPARCstorage Array 100 Addressing ................................C-11

    RSM Storage Array ........................................................................ C-12RSM Storage Array Features ................................................ C-12RSM Storage Array Addressing...........................................C-13

    SPARCstorage Array 214/219...................................................... C-14SPARCstorage Array 214/219 Features .............................C-14SPARCstorage Array 214 Addressing ................................C-15

    Sun StorEdge A3000 (RSM Array 2000)...................................... C-16StorEdge A3000 Features ...................................................... C-16StorEdge A3000 Addressing.................................................C-17

    StorEdge A1000/D1000................................................................. C-19Shared Features ......................................................................C-19StorEdge A1000 Differences................................................. C-20StorEdge A1000 Addressing.................................................C-20StorEdge D1000 Differences ................................................. C-21StorEdge D1000 Addressing.................................................C-21

    Sun StorEdge A3500 ...................................................................... C-22StorEdge A3500 Features ...................................................... C-22StorEdge A3500 Addressing.................................................C-24

    Sun StorEdge A5000 ...................................................................... C-25A5000 Features .......................................................................C-25StorEdge A5000 Addressing.................................................C-27

    Sun StorEdge A7000 ...................................................................... C-29Sun StorEdge A7000 Enclosure............................................C-29StorEdge A7000 Functional Elements.................................C-31StorEdge A7000 Addressing.................................................C-33Combining SSVM and A7000 Devices................................C-34

    SPARCstorage MultiPack ............................................................. C-35SPARCstorage MultiPack Features .....................................C-36

  • 8/13/2019 SunEnterprise Cluster Administration

    18/680

    xviii SunEnterpriseClusterAdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    SPARCstorage MultiPack Addressing................................C-36Storage Configuration ................................................................... C-37

    Identifying Storage Devices..................................................C-37Identifying Controller Configurations................................C-40

    Oracle Parallel Server ...............................................................................D-1Oracle Overview .............................................................................. D-2

    Oracle 7.x and Oracle 8.x Similarities ...................................D-3Oracle 7.x and Oracle 8.x Differences ...................................D-5

    Oracle Configuration Files.............................................................. D-7The /etc/system File .............................................................D-8The /etc/opt/SUNWcluster/conf/ clustname

    .ora_cdb File ........................................................................D-9The init_ora File..................................................................D-10

    Oracle Database Volume Access.................................................. D-11Oracle Volume Types ............................................................D-13CVM Volume Pathnames .....................................................D-13Changing Permission or Ownership of Volumes .............D-13

    DLM Reconfiguration.................................................................... D-14DLM Reconfiguration Steps .................................................D-15

    Volume Manager Reconfiguration with CVM .......................... D-16Initial Volume Configuration...............................................D-18Volume Reconfiguration With CVM...................................D-18

    Oracle Parallel Server Specific Software..................................... D-19The SUNWudlm Package Summary...................................D-19

    Glossary ......................................................................................... Glossary-1

    Acronyms Glossary ................................................................... Acronyms-1

  • 8/13/2019 SunEnterprise Cluster Administration

    19/680

    xixCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    AboutThis Course

    Course Goal

    This course provides students with the essential information and skillsto install and administer a Sun Enterprise Cluster system runningSun Cluster 2.2 software.

    Use this module to get the students excited about this course.

    With regard to the overheads: To avoid confusion among the students, it is very important to tell them that the page numbers on the overheads have no relation to the page numbers in their course materials. They should use the title of each overhead as a reference.

    The strategy provided by the About This Course is to introduce students to the course before they introduce themselves to you and one another. By familiarizing them with the content of the course first, their introductions will have more meaning in relation to the course prerequisites and objectives.

    Use this introduction to the course to determine how well students are equipped with the prerequisite knowledge and skills. The pacing chart Guidelines for Module Pacing section on page xxviii enables you to determine what adjustments you need to make in order to accommodate the learning needs of students.

  • 8/13/2019 SunEnterprise Cluster Administration

    20/680

    xx Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services, September 1999, Rev. A

    Course Overview

    This course provides students with the essential information and skillsto install and administer Sun Enterprise Cluster hardware running Sun

    Cluster 2.2 software.

    The most important tasks for the system administrator are Sun Clustersoftware installation and conguration, hardware conguration,system operations, and system recovery. During this course, thesetopics are presented in the order in which a typical cluster installationtakes place.

  • 8/13/2019 SunEnterprise Cluster Administration

    21/680

    About This Course xxiCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Course Map

    The following course map enables you to see what you haveaccomplished and where you are going in reference to the course goal.

  • 8/13/2019 SunEnterprise Cluster Administration

    22/680

    xxii Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services, September 1999, Rev. A

    Module-by-Module Overview

    This course contains the following modules:

    Module 1 Sun Cluster OverviewThis lecture-only module introduces all of the basic conceptsassociated with Sun Enterprise Cluster systems.

    Lab exercise There is no lab for this module.

    Module 2 Terminal Concentrator

    This module introduces the critical administrative functionssupported by the Terminal Concentrator interface, and explains basic Terminal Concentrator theory, and the installation andconguration process.

    Lab exercise Congure the Terminal Concentrator cabling andoperating parameters for proper operation in the Sun EnterpriseCluster environment.

  • 8/13/2019 SunEnterprise Cluster Administration

    23/680

    About This Course xxiiiCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Module-by-Module Overview

    Module 3 Administration Workstation

    The lecture portion of this module presents an overview of SunCluster (SC) administration workstation software les and thegeneral process used to install all cluster software.

    Lab exercise Install the SC software on the administrationworkstation, congure the cluster administrative les, and startone of the cluster administration tools, cconsole .

    Module 4 Preinstallation Conguration

    This module provides the information necessary to prepare a SunEnterprise Cluster (SEC) system for the Sun Cluster softwareinstallation. It focuses on issues relevant to selecting andconguring an appropriate cluster topology.

    Lab exercise Select and congure a target cluster topology. Youwill verify that the conguration is ready to start the cluster hostsoftware installation.

    Module 5 Cluster Host Software Installation

    The lecture presents an overview of the Sun Cluster host softwareles and distribution.

    Lab exercise Install the Sun Cluster software on the cluster hostsystems.

    Module 6 System Operation

    This module discusses the Sun Cluster Manager graphicaladministration tool, along with the cluster administrationcommand-line features.

    Lab exercise Start and stop the cluster software using the

    scadmin command and verify cluster status with the SCMapplication and the hastat command.

  • 8/13/2019 SunEnterprise Cluster Administration

    24/680

    xxiv Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services, September 1999, Rev. A

    Module-by-Module Overview

    Module 7 Volume Management with CVM and SSVM

    This module reviews the basic space management techniques used by the Cluster Volume Manager and the Sun StorEdge VolumeManager. The installation and initialization processes for CVMand SSVM are presented along with post-installation issues.

    Lab exercise Install and initialize either CVM or SSVM. You willuse script les to create demonstration volumes.

    Module 8 Volume Management with Solstice DiskSuite

    This module reviews the basic space management techniques used by the Solstice DiskSuite (SDS) volume manager. Theinstallation and initialization processes for SDS are presentedalong with post-installation issues.

    Lab exercise Install and initialize SDS. You will use script les tocreate demonstration volumes.

    Module 9 Cluster Conguration Database

    This module discusses the purpose, structure, and administrationof the cluster database (CDB) and the cluster congurationdatabase (CCD).

    Lab exercise Perform basic administration operations on theCDB and CCD les. This includes verifying consistency betweencluster hosts, making backup copies, and checking for errors.

    Module 10 Public Network Management

    This module describes the operation, conguration, andmanagement of the Sun Cluster Public Network Management(PNM) mechanism. The creation of network adapter failovergroups (NAFO) and their relationship to logical hosts is also

    discussed.

    Lab exercise Congure a NAFO group on each cluster host anddisable the Solaris Operating System Interface Groups feature.

  • 8/13/2019 SunEnterprise Cluster Administration

    25/680

    About This Course xxvCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Module-by-Module Overview

    Module 11 Logical Hosts

    This module discusses the purpose of Sun Cluster logical hostsand their relationship to data services. The structure and creationof logical hosts is presented along with some common variations.

    Lab exercise Congure and test two logical hosts.

    Module 12 The HA-NFS Data Service

    This module describes and demonstrates the conguration andmanagement of Sun Cluster HA-NFS le systems.

    Lab exercise Create, register, and test a demonstration HA-NFSdata service. Switch the data service between cluster hosts.

    Module 13 System Recovery

    This module summarizes the basic recovery process for a numberof cluster failure scenarios. It includes background informationand details about operator intervention.

    Lab exercise Create and recover from cluster interconnectfailures, partitioned cluster, public network interface failures, alogical host failure, and a cluster node failfast failure.

    Module 14 The Sun Cluster High Availability Data Service API

    This module provides an overview of how to integrateapplications into the Sun Cluster High Availability framework. Italso describes key failover actions performed by the Sun ClusterHigh Availability software.

    Lab exercise There is no lab for this module

    Module 15 Highly Available DBMS

    This module describes the conguration and operation of a highlyavailable database in the Sun Cluster environment.

    Lab exercise There is no lab for this module.

  • 8/13/2019 SunEnterprise Cluster Administration

    26/680

    xxvi Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services, September 1999, Rev. A

    Course Objectives

    Upon completion of this course, you should be able to:

    Describe major Sun Cluster components and functions Verify system cabling

    Configure the Terminal Concentrator for proper operation

    Install, remove, and update Sun Cluster software

    Troubleshoot software installation and configuration errors

    Configure environmental variables for correct Sun Clusteroperation

    Use the Sun Cluster administration tools

    Initialize one of the supported volume managers

    Describe the differences between the supported volume managers

    Prepare the Public Network Management failover environment

    Create and congure logical hosts

    Install and congure highly available data services

    Describe the Sun Cluster failure recovery mechanisms Identify and recover from selected Sun Cluster failures

    Ask the students how many signed up for this course because of the information in the Sun Educational Services course catalog, what their knowledge and expectations of the objectives stated there are, and use this information as a tool to manage your time in covering the material in this course.

  • 8/13/2019 SunEnterprise Cluster Administration

    27/680

    About This Course xxviiCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Skills Gained by Module

    The skills for Sun Enterprise Cluster Administration are shown incolumn 1 of the following matrix. The black boxes indicate the main

    coverage for a topic; the gray boxes indicate the topic is brieydiscussed.

    Refer students to this matrix as you progress through the course to show them the progress they are making in learning the skills advertised for this course.

    Module

    Skills Gained 1 2 3 4 5 6 7 8 9 10 11 12 13 14

    Describe the major Sun Enterprise Clustercomponents and functions

    Verify disk storage cabling

    Configure the Terminal Concentrator

    Configure the cluster interconnect system

    Install the Sun Cluster 2.2 software

    Troubleshoot software installation andconfiguration errors

    Configure environmental variables for correctSEC operation

    Use SEC administration tools

    Initialize either the Enterprise VolumeManager, Cluster Volume Manager, or SolsticeDiskSuite

    Describe the SEC recovery mechanisms

    Configure the Sun Cluster 2.2 HighlyAvailable NFS data service

    Create public network adapter backup groupswith the public network management utility(PNM

    Identify and recover from selected SECfailures

  • 8/13/2019 SunEnterprise Cluster Administration

    28/680

    xxviii SunEnterpriseClusterAdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services, September 1999, Rev. A

    Guidelines for Module Pacing

    The following table provides a rough estimate of pacing for thiscourse:

    Module Day 1 Day 2 Day 3 Day 4 Day 5

    About This Course AM

    Product Introduction AM

    Terminal Concentrator AM/PM

    AdministrationWorkstation Installation

    PM

    PreinstallationConguration

    AM

    Cluster Host SoftwareInstallation

    AM/PM

    System Operation PM

    Volume Management AM

    Cluster CongurationData

    PM

    Public NetworkManagement

    PM

    Logical Hosts AM

    HA-NFS Data Service AM/PM

    System Recovery PM

    Sun Cluster HighAvailability Data Service

    API

    AM

    HA-DBMS AM/PM

  • 8/13/2019 SunEnterprise Cluster Administration

    29/680

    About This Course xxixCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Topics Not Covered

    This course does not cover the topics shown on the above overhead.Many of the topics listed on the overhead are covered in other courses

    offered by Sun Educational Services:

    Database management Covered in database vendor courses

    Network administration Covered in SA-380: Solaris 2.x Network Administration

    Solaris administration Covered in SA-235: Solaris 2.X System Administration I and SA-286: Solaris System Administration II

    Database performance and tuning Covered in database vendorcourses

    Disk storage management Covered in SO-352: Disk ManagementWith Solstice DiskSuite, SA-345: Volume Manager with SPARCstorage Array, and SA-347: Volume Manager with StorEdge A5000

    Refer to the Sun Educational Services catalog for specic informationand registration.

  • 8/13/2019 SunEnterprise Cluster Administration

    30/680

    xxx Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services, September 1999, Rev. A

    How Prepared Are You?

    To be sure you are prepared to take this course, can you answer yes tothe questions shown on the above overhead?

    Virtual volume management administration is a central portion of the Sun Enterprise Cluster functionality.

    Solaris Operating Environment system administration is anintegral part of Sun Enterprise Cluster administration. You cannotseparate the two.

    Resolving all Sun Enterprise Cluster issues requires morehardware knowledge than in most other system applications.

    Sun Enterprise Cluster systems are frequently composed of enterprise-class components. You must be used to dealing withthis type of high-end hardware.

    If any students indicate they cannot do these requirements, meet with them at the first break to decide how to proceed with the class. Do they want to take the class at a later date? Is there some way to get the extra help needed during the week?

    It might be appropriate here to recommend resources from the Sun Educational Services catalog that provide training for topics not covered in this course.

  • 8/13/2019 SunEnterprise Cluster Administration

    31/680

    About This Course xxxiCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Introductions

    Now that you have been introduced to the course, introduce yourself to each other and the instructor, addressing the items shown on the

    above overhead.

  • 8/13/2019 SunEnterprise Cluster Administration

    32/680

    xxxii SunEnterpriseClusterAdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services, September 1999, Rev. A

    How to Use Course Materials

    To enable you to succeed in this course, these course materials employa learning model that is composed of the following components:

    Course map Each module starts with an overview of the contentso you can see how the module ts into your overall course goal.

    Relevance The Relevance section for each module providesscenarios or questions that introduce you to the informationcontained in the module and provoke you to think about how themodule content relates to cluster administration.

    Overhead image Reduced overhead images for the course areincluded in the course materials to help you easily follow wherethe instructor is at any point in time. Overheads do not appear onevery page.

    Lecture The instructor will present information specic to thetopic of the module. This information will help you learn theknowledge and skills necessary to succeed with the exercises.

  • 8/13/2019 SunEnterprise Cluster Administration

    33/680

    About This Course xxxiiiCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    How to Use Course Materials

    Exercise Lab exercises will give you the opportunity to practiceyour skills and apply the concepts presented in the lecture.

    Check your progress Module objectives are restated, sometimesin question format, so that before moving on to the next moduleyou are sure that you can accomplish the objectives of the currentmodule.

    Think beyond Thought-provoking questions are posed to helpyou apply the content of the module or predict the content in thenext module.

  • 8/13/2019 SunEnterprise Cluster Administration

    34/680

    xxxiv SunEnterpriseClusterAdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services, September 1999, Rev. A

    Course Icons and Typographical Conventions

    The following icons and typographical conventions are used in thiscourse to represent various training elements and alternative learning

    resources.

    Icons

    Additional resources Indicates additional reference materials areavailable.

    Discussion Indicates a small-group or class discussion on the currenttopic is recommended at this time.

    Exercise objective Indicates the objective for the lab exercises thatfollow. The exercises are appropriate for the material being discussed.

    Note Additional important, reinforcing, interesting or specialinformation.

    !Caution A potential hazard to data or machinery.

    Warning Anything that poses personal danger or irreversibledamage to data or the operating system.

  • 8/13/2019 SunEnterprise Cluster Administration

    35/680

    About This Course xxxvCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Course Icons and Typographical Conventions

    Typographical Conventions

    Courier is used for the names of commands, les, and directories, aswell as on-screen computer output. For example:

    Use ls -al to list all les.system% You have mail.

    Courier bold is used for characters and numbers that you type. Forexample:

    system% su

    Password:

    Courier italic is used for variables and command-lineplaceholders that are replaced with a real name or value. For example:

    To delete a le, type rm filename .

    Palatino italics is used for book titles, new words or terms, or wordsthat are emphasized. For example:

    Read Chapter 6 in Users Guide.

    These are called class options.You must be root to do this.

  • 8/13/2019 SunEnterprise Cluster Administration

    36/680

    xxxvi SunEnterpriseClusterAdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services, September 1999, Rev. A

    Notes to the Instructor

    Philosophy

    The Sun Enterprise Cluster Administration course has been created toallow for interactions between the instructor and the student as well as between the students themselves. In an effort to enable you toaccomplish the course objectives easily, and in the time frame given, aseries of tools have been developed and support materials created foryour discretionary use.

    A consistent structure has been used throughout this course. Thisstructure is outlined in the Course Goal section. The suggested owfor each module is:

    1. Module objectives2. Context questions/module rationale3. Lecture information with appropriate overheads4. Lab exercises5. Discussion: either as whole class or in small groups

    To allow the instructor exibility and give time for meaningfuldiscussions during the relevance periods, the lectures, and thesmall-group discussions, a timing table is included in the Course

    Tools section.

    Course Tools

    To enable you to follow this structure, the following supplementarymaterials are provided with this course:

    Relevance

    These questions or scenarios set the context of the module. It is

    suggested that the instructor ask these questions and discuss theanswers. The answers are provided only in the instructors guide.

  • 8/13/2019 SunEnterprise Cluster Administration

    37/680

    About This Course xxxviiCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Notes to the Instructor

    Course Tools

    Course map

    The course map allows the students to get a visual picture of thecourse. It also helps students know where they have been, wherethey are, and where they are going. The course map is presentedin the About This Course in the students guide.

    Lecture overheads

    Overheads for the course are provided in two formats:

    The paper-based format can be copied onto standardtransparencies and used on a standard overhead projector. Theseoverheads are also provided in the students guide.

    The Web browserbased format is in HTML and can be projectedusing a projection system which displays from a workstation. Thisformat gives the instructor the ability to allow the students to viewthe overhead information on individual workstations. It alsoallows better random access to the overheads.

    Small-group discussion

    After the lab exercises, it is a good idea to debrief the students.Gather them back into the classroom and have them discuss theirdiscoveries, problems, and issues in programming the solution tothe problem in small groups of four or ve, one-on-one, or one-on-many.

    General timing recommendations

    Each module contains a Relevance section. This section maypresent a scenario relating to the content presented in the module,

    or it may present questions that stimulate students to think aboutthe content that will be presented. Engage the students in relatingexperiences or posing possible answers to the questions. Spend nomore that 1015 minutes on this section

  • 8/13/2019 SunEnterprise Cluster Administration

    38/680

    xxxviii Sun Enterprise Cluster AdministrationCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services, September 1999, Rev. A

    Notes to the Instructor

    Course Tools

    Module self-check

    Each module contains a checklist for students under Check Your

    Progress. Give them a little time to read through this checklist before going on to the next lecture. Ask them to see you for itemsthey do not feel comfortable checking off.

    Module Lecture(Minutes)Lab

    (Minutes)Total Time(Minutes)

    About This Course 30 0 30

    Sun Cluster Overview 135 0 135

    Terminal Concentrator 60 45 105

    Administration Workstation Installation 60 60 120

    Preinstallation Conguration 90 60 150

    Cluster Host Software Installation 60 45 105

    Volume Management 60 60 120

    System Operation 60 60 120

    Cluster Configuration Database 60 45 105

    Public Network Management 60 75 135

    Logical Hosts 60 60 120

    The HA-NFS Data Service 60 75 135

    System Recovery 60 75 135

    Sun Cluster High Availability Data Service API 90 0 90

    HA-DBMS 75 0 75

  • 8/13/2019 SunEnterprise Cluster Administration

    39/680

    About This Course xxxixCopyright 1999Sun Microsystems, Inc.All Rights Reserved. Enterprise Services September 1999, Rev. A

    Instructor Setup Notes

    Purpose of This Guide

    This guide provides all of the details that an instructor needs to know both to initially set up the classroom environment and to prepare theenvironment for each class offering.

    Minimum Resource Requirements

    Network

    Each two-node cluster and administration workstation combinationneeds a minimum of ve network connections. This would normally be a private network in training, typically just network hub boxes. Anadditional two connections are needed for each additional node.

    Hardware

    This is far too complex to answer here. Check the cluster engineeringWeb sites for cluster conguration guides. Basically, this course can berun on any two/three/four-node cluster with either a Ethernet or SCI

    interconnect system.Each cluster should have two dual-hosted storage arrays with aminimum of 5 disks each.

    Software

    If your students are going to use the Sun StorEdge Volume Manager orthe Cluster Volume Manager, the cluster hosts ca