Au 548 Inst
Au 548 Inst
Au 548 Inst
cover
HACMP System
Administration I: Planning and
Implementation
(Course code AU54)
Instructor Guide
ERC 8.0
Trademarks
IBM® is a registered trademark of International Business Machines Corporation.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
AIX® AIX 5L™ Approach®
BladeCenter® Cross-Site® DB2®
DS4000™ DS6000™ DS8000™
Enterprise Storage Server® General Parallel File GPFS™
System™
HACMP™ NetView® Notes®
POWER™ POWER5™ pSeries®
Redbooks® Requisite® SP™
System i5™ System p™ System p5™
System Storage™ Tivoli® TotalStorage®
WebSphere®
Windows is a trademark of Microsoft Corporation in the United States, other countries, or
both.
Intel is a trademark or registered trademark of Intel Corporation or its subsidiaries in the
United States and other countries.
UNIX® is a registered trademark of The Open Group in the United States and other
countries.
Linux® is a registered trademark of Linus Torvalds in the United States, other countries, or
both.
Other company, product, or service names may be trademarks or service marks of others.
The information contained in this document has not been submitted to any formal IBM test and is distributed on an “as is” basis without
any warranty either express or implied. The use of this information or the implementation of any of these techniques is a customer
responsibility and depends on the customer’s ability to evaluate and integrate them into the customer’s operational environment. While
each item may have been reviewed by IBM for accuracy in a specific situation, there is no guarantee that the same or similar results will
result elsewhere. Customers attempting to adapt these techniques to their own environments do so at their own risk.
© Copyright International Business Machines Corporation 1998, 2008. All rights reserved.
This document may not be reproduced in whole or in part without the prior written permission of IBM.
Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions
set forth in GSA ADP Schedule Contract with IBM Corp.
V4.0
Instructor Guide
TOC Contents
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
TMK Trademarks
The reader should recognize that the following terms, which appear in the content of this
training document, are official trademarks of IBM or other companies:
IBM® is a registered trademark of International Business Machines Corporation.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
AIX® AIX 5L™ Approach®
BladeCenter® Cross-Site® DB2®
DS4000™ DS6000™ DS8000™
Enterprise Storage Server® General Parallel File GPFS™
System™
HACMP™ NetView® Notes®
POWER™ POWER5™ pSeries®
Redbooks® Requisite® SP™
System i5™ System p™ System p5™
System Storage™ Tivoli® TotalStorage®
WebSphere®
Windows is a trademark of Microsoft Corporation in the United States, other countries, or
both.
Intel is a trademark or registered trademark of Intel Corporation or its subsidiaries in the
United States and other countries.
UNIX® is a registered trademark of The Open Group in the United States and other
countries.
Linux® is a registered trademark of Linus Torvalds in the United States, other countries, or
both.
Other company, product, or service names may be trademarks or service marks of others.
Duration: 5 days
Purpose
This course is designed to prepare students to install and configure a
highly available cluster using HACMP for AIX.
Audience
The audience for this course is students who are experienced AIX
system administrators with TCP/IP networking and AIX LVM
experience who are responsible for the planning and installation of an
HACMP 5.4.1 cluster on an IBM System p server running AIX 5L V5.3
or later (the lab exercises are conducted on AIX 6.1).
Prerequisites
Students should ideally be qualified as IBM Certified Specialists - p5
and pSeries Administration and Support AIX 5L and in addition have
TCP/ IP, LVM storage and disk hardware implementation skills. These
skills are addressed in the following courses (or can be obtained
through equivalent education and experience):
• AU16: AIX 5L System Administration II: Problem Determination
• AU07: AIX V4 Configuring TCP/IP
Objectives
After completing this course, you should be able to:
• Explain what high availability is.
• Outline the capabilities of HACMP for AIX.
• Design and plan a highly available cluster.
• Install and configure HACMP for AIX in the following modes of
operation:
- Single resource group on a primary node with standby node
- Two resource groups in a mutual takeover configuration
• Configure resource group startup, fallover, and fallback policies
• Perform basic system administration tasks for HACMP.
• Perform basic customization for HACMP.
• Perform basic problem determination and recovery.
Curriculum relationship
• This course should be taken before AU61
• AU61: HACMP System Administration II: Administration and
Problem Determination
pref Agenda
This agenda assumes a start time of 9:00 a.m., a 10 minute break at each hour, a one-hour
lunch break at noon, and a stop time of 4:30 p.m.
Day 1
(00:30) Welcome
(02:00) Unit 1 - Introduction to HACMP for AIX 5L
(03:00) Unit 2- Networking considerations for high availability
(00:30) Exercise 1
(01:00) Exercise 2
Day 2
(02:00) Unit 3- Shared storage considerations for high availability
(00:45) Unit 4 - Planning for applications and resource groups
(01:30) Unit 5 - HACMP installation
(01:00) Exercise 3
(00:30) Exercise 4
(00:30) Exercise 5
Day 3
(03:00) Unit 6 - Initial cluster configuration
(03:00) Exercise 6
Day 4
(03:00) Unit 7 - Basic HACMP administration
(01:30) Unit 8 - Events
(03:00) Exercise 7
(00:30) Exercise 8
Day 5
(01:00) Unit 9 - Integrating NFS into HACMP
(01:30) Unit 10 - Problem determination and recovery
(01:00) Exercise 9
(00:30) Exercise 10
Text highlighting
The following text highlighting conventions are used throughout this book:
Bold Identifies file names, file paths, directories, user names, and
principals.
Italics Identifies links to Web sites, publication titles, is used where the
word or phrase is meant to stand out from the surrounding text,
and identifies parameters whose actual names or values are to
be supplied by the user.
Monospace Identifies attributes, variables, file listings, SMIT menus, code
examples of text similar to what you might see displayed,
examples of portions of program code similar to what you might
write as a programmer, and messages from the system.
Monospace bold Identifies commands, daemons, menu paths, and what the user
would enter in examples of commands and SMIT menus.
Estimated time
00:30
Course objectives
After completing this unit, you should be able to:
Ɣ Define high availability.
Ɣ Outline the capabilities of HACMP for AIX
Ɣ Design and plan a highly available cluster
Ɣ Install and configure HACMP in the following modes of
operation:
– Single resource group on a primary node with a standby node
– Two resource groups in a mutual takeover configuration
Ɣ Perform basic system administration tasks for HACMP
Ɣ Perform basic problem determination and recovery
Notes:
Course agenda (1 of 5)
Day 1
– Welcome
– Unit 1 - Introduction to HACMP for AIX 5L
– Unit 2 - Networking Considerations for High Availability
– Exercise 1
– Exercise 2
Notes:
Course agenda (2 of 5)
Day 2
– Unit 3 - Shared Storage Considerations for High Availability
– Unit 4 - Planning for Applications and Resource Groups
– Unit 5 - HACMP Installation
– Exercise 3
– Exercise 4
– Exercise 5
Notes:
Course agenda (3 of 5)
Day 3
– Unit 6 - Initial Cluster Configuration
– Exercise 6
Notes:
Course agenda (4 of 5)
Day 4
– Unit 7 - Basic HACMP Administration
– Unit 8 - Events
– Exercise 7
– Exercise 8
Notes:
Course agenda (5 of 5)
Day 5
– Unit 9 - Integrating NFS into HACMP
– Unit 10 - Problem Determination and Recovery
– Exercise 9
– Exercise 10
Notes:
Lab exercises
Points to note:
– Work as a team and split the workload.
– Manuals are available online.
– HACMP software has been loaded and might have already been
installed.
– TCP/IP and LVM have not been configured.
– Each lab must be completed successfully before continuing on to the
next lab, as each lab is a prerequisite for the next one.
– If you have any questions, ask your instructor.
Notes:
Notes:
Notes:
Estimated time
02:00
References
SC23-4864-10 HACMP for AIX, Version 5.4.1:
Concepts and Facilities Guide
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit objectives
Ɣ After completing this unit, you should be able to:
Ɣ Define High Availability and explain why it is needed
Ɣ List the key considerations when designing and implementing
a high availability cluster
Ɣ Outline the features and benefits of HACMP for AIX
Ɣ Describe the components of an HACMP for AIX cluster
Ɣ Explain how HACMP for AIX operates in typical cases
Notes:
Objectives
In this unit, we introduce the concept of High Availability, examine why you might want
to implement a High Availability solution, and compare High Availability with some
alternative availability technologies.
HACMP terminology
This course uses the following terminology:
- HACMP means any version and release of the HACMP product.
- HACMP x means version x and any release of that version.
- HACMP x.y means a specific version and release.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Workload Fallover
WAN
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Uempty Drawback
The base product HACMP 5 only partially solves the site SPOF in the case where data
does not have to be replicated. This can be done with LVM mirroring using SAN
technology.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Examine the availability benefits of the High Availability solution.
Details — Ensure that you cover the benefits of a High Availability solution when compared
with a stand-alone and enhanced solution. Explain that High Availability solutions do fail,
but they just recover very quickly.
Additional information — Point out to the students that having one of anything is a single
point of failure. Ask them if they are the only person in their company who is trained to
support HACMP. If a student asks you how quickly HACMP takes to recover following
fallover, answer “It depends, and we will see what it depends upon later in the course.”
Point out that HACMP 5 has limited support for site failures in the base product and will be
looked at in the next visual.
Transition statement — We haven’t eliminated sites as a single point of failure, but can
we?
Uempty
Metro Mirror/PPRC
GLVM
GeoRM
Toronto Brussels
Data Replication
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
HACMP characteristics
IBM’s HACMP product is a mature and robust technology for building a high-availability
solution. A high-availability solution based upon HACMP provides automated failure
detection, diagnosis, recovery and reintegration. With an appropriate application,
HACMP can also work in a concurrent access or parallel processing environment, thus
offering excellent horizontal scalability.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Terminology
A clear understanding of the above concepts and terms is important as they appear
over and over again both in the remainder of the course and throughout the HACMP
documentation, log files and SMIT screens.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
clstrmgr clstrmgr
ur c e
Reso group
Shared Storage
Node
Node
Fallover
Cluster is comprised of physical components (topology) and logical components
(resource groups and resources).
© Copyright IBM Corporation 2008
Notes:
Fundamental concepts
HACMP is based on the fundamental concepts of cluster, resource group, and cluster
manager (clstrmgr).
Cluster
A cluster is comprised basically of nodes, networks, and network adapters. These
objects are referred to as Topology objects.
Resource group
A resource group is typically comprised of an application, network address, and volume
group using shared disks. These objects are referred to as Resource objects.
Uempty clstrmgr
The cluster manager daemons together are the software components that
communicate with each other to control on which node a resource group is activated or
where the resource group is moved on a fallover based on parameters set up by the
administrator. The clstrmgr runs on all the nodes of the cluster.
Here is a simple diagram of a two-node cluster, using shared disk, and providing
fallover for a single application.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show a high-level example of a cluster running HACMP.
Details — Briefly explain the concept of the cluster, point out the nodes, the client
connection, and the fallover capability for the workload.
Additional information — We cover the details of topology and resources on the next
pages.
Transition statement — So, let’s have a look at the topology components.
Uempty
N tw
Communication
on or
N
e
-IP k
Interface
n
tio
i ca
un e
m evic
m
Co D
No
de
r
ste
Clu
Notes:
Topology components
A cluster’s topology is the cluster, nodes (pSeries servers), networks (connections
between the nodes), the communication interfaces (for example, Ethernet or token-ring
network adapters), and the communication devices (/dev/rhdisk for heartbeat on disk or
/dev/tty for RS232 for example).
Nodes
In the context of HACMP, the term node means any IBM pSeries system that is a
member of a high-availability cluster running HACMP.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Networks
Networks consist of IP and non-IP networks. The non-IP networks ensure that cluster
monitoring can be done if there is a total loss of IP communication. Non-IP networks are
strongly recommended to be configured in an HACMP.
Networks can also be logical or physical. Logical networks have been used with the IBM
SP environments when different frames were in different subnets but needed to be
treated as if they were in the same network for HACMP purposes.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
– Physical
SAN IBM
• SCSI or Fibre Channel
– Virtual SCSI DS8000 Fibre
Notes:
Supported nodes
As you can see, the range of systems that supports HACMP is, well, everything. The
only requirement is that the system should have at least four adapter slots spare (two
for network adapters and two for disk adapters). Any other adapters (for example,
graphics adapters) occupy additional slots. The internal Ethernet adapter fitted to most
entry-level pSeries servers cannot be included in the calculations. It should be noted
that even with four adapter slots free, there is still be a single point of failure as the
cluster is able to accommodate only a single TCP/IP local area network between the
nodes.
HACMP 5 works with pSeries servers in a “no-single-point-of-failure” server
configuration. HACMP for AIX supports the System p models that are designed for
server applications and that meet the minimum requirements for internal memory,
internal disk, and I/O slots. For a current list of systems that are supported with the
version of HACMP that you want to use, see the Sales manual at
Uempty www.ibm.com/common/ssi, choose the HW & SW desc (Sales Manual, RPQ) option
from the pull-down menu, click Advanced Search. Type hacmp in the Title: field, go to
the bottom of the screen, and click Search. The list of HACMP documents will display.
LPAR support
There is also support for dynamically adding LPAR resources in AIX V5.2 or later LPAR
environments to take advantage of Capacity Upgrade of Demand (CUoD).
HACMP 5.2 (and later) supports Virtual SCSI (VSCSI) and Virtual LAN (VLAN) on
POWER5 (IBM System p5 and IBM System i5). See
http://www-03.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/FLASH10390 for
more details.
Supported networks
HACMP 5 supports client users on a LAN using TCP/IP. HACMP monitors and performs
IP address switching for the following TCP/IP-based communications adapters on
cluster nodes:
- Ethernet
- EtherChannel
- Token ring
- FDDI
- SP Switches
- ATM
- ATM LAN Emulation
HACMP also supports non-IP networks, such as RS232/442, Target Mode SCSI
(TMSCSI), Target Mode SSA (TMSSA), and Heartbeat on Disk (using Enhanced
Concurrent Mode Volume Groups).
It is highly recommended to have both IP and non-IP networks defined to HACMP. For a
list of specific adapters, you can consult the Sales Manual.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unsupported networks
The following networks are not supported:
- Serial Optical Channel Converter (SOCC)
- SLIP
- Fibre Channel Switch (FCS)
- 802_ether
- Virtual IP Address (VIPA) facility of AIX
The pseudo IP address provided by VIPA cannot be reliably monitored by RSCT
or HACMP. The failure of the underlying devices that are used to service the
pseudo device cannot be coordinated with HACMP recovery processing. VIPA
can be configured and used outside of HACMP, but when using these facilities
on an HACMP cluster node, ensure that they are configured on the subnets that
are completely different from the subnets used by HACMP. If any VIPA
addresses are configured on the same subnet that is used for an HACMP
network, HACMP might not be able to properly detect failures and manage
recovery.
- Aggregate IP Interface with the SP Switch2
With the SP Switch2 you have css0 and css1, PSSP allows you to configure an
Aggregate IP switch. This is an ml0 interface with its own IP address. This ml0
interface is not supported by HACMP.
- IP V6
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Ap
pl
ou e
ica
Gr lum
p
tio
Vo
n
Se
Se le
rv
Fi tem
er
Ad rvic s
dr e I
es P Sy
s
ur c e Group
Re s o
s
Node e Policies
im
Run-t ces
ur
Reso
© Copyright IBM Corporation 2008
Notes:
Resource group
A resource group is a collection of resources treated as a unit along with the nodes that
they can potentially be activated on and what policies the cluster manager should use to
decide which node to choose during startup, fallover, and fallback. A cluster can have
more than one resource group (usually one for each application), thus allowing for very
flexible configurations. Resource groups will be covered in more detail in Unit 4.
Resources
Resources are logical components that can be put into a resource group. Because they
are logical components, they can be moved without human intervention.
The resources shown in the visual are a typical set of resources used in resource
groups, such as:
Uempty Service IP Address - Users need to be able to connect to the application. Typically,
the users are given an IP address or hostname to connect to. This IP
address/hostname becomes a resource in the resource group because it must be
associated with the same node that is running the application. The IP
address/hostname resource is referred to as the Service IP Label in the resource
group. More than one Service IP Label may be configured for a resource group.
Volume Group - If the application requires shared disk storage, this storage is
contained within volume groups.
Filesystem - An application often requires that certain filesystems be mounted.
Application Server - The application itself must be part of the resource group
(strictly speaking, the application server actually consists of scripts which start and
stop the application as required by HACMP). The use of Application Server can be
confusing because this term is used popularly by application vendors to describe a
layer in their implementation. The use of the term in HACMP describes the start/stop
methods (scripts) for the application. It is an object that points to the start/stop
methods.
In addition to the resources listed in the figure, you can also associate with a resource
group the following:
NFS mounts - An application might require that an NFS filesystem be mounted by
the node running the application
NFS exports - A resource group might be configured to provide NFS server
services by NFS exporting some of its filesystems.
Finally, attributes, such as “Force vary on of volume groups,” can be assigned. These
will be covered later in this course in Unit 6.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce the concept of resources and resource groups.
Details — Explain that resources are logical components that can be moved from one
node to another without manual intervention. Explain that resources are grouped together
for administrative purposes in to resource groups.
Additional information — The difference between topology and resources is that the
topology components are physical; that is, nodes, networks, and network adapters, which
would require manual intervention to move from one place to another. In contrast,
resources are logical entities, which can be moved from node to node without human
intervention.
Transition statement — After understanding the components, what is the internal
structure at a high-level?
Uempty
What is HACMP?
Ɣ An application which:
– Controls where resource groups run
– Monitors and reacts to events
– Provides tools for cluster-wide configuration and synchronization
– Relies on other AIX Subsystems (ODM, LVM, RSCT, TCP/IP,
SRC, and so on)
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
process that can run on both servers and clients (the source code is provided). The
clstat command uses clinfo to display status via ASCII, Xwindow, or Web browser
interfaces.
- In HACMP 5, clcomdES allows the cluster managers to communicate in a secure
manner without using rsh and the /.rhost files.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
OLPW Configuration
smit via web Assistant
clstrmgrES Verification
CSPOC Auto tests
DARE SNMP
Tivoli Application
Integration Monitoring
Notes:
Additional features
HACMP also has additional software to provide facilities for administration, testing,
remote monitoring, and verification:
- Application monitoring should be used to monitor the cluster’s applications and
restart them should they fail. Multiple monitors can be defined for an application,
including monitoring the startup.
- Configuration changes can be made to the cluster while the cluster is running. This
facility is known as Dynamic Automatic Reconfiguration Event (or DARE for short).
- C-SPOC is a series of SMIT menus that allow AIX-related cluster tasks to be
propagated across all nodes in the cluster. It includes an RG_Move facility, which
allows a resource group to be placed offline or on another node without stopping the
cluster manager.
Uempty - Administration is made easier by the use of Online Planning Worksheets (OLPW)
and a Web-based SMIT interface.
- A two-node configuration assist facility enables you to configure an HACMP cluster
with very little input.
- Verification is provided at HACMP startup time, as part of synchronization, as a
manual process and a daily Automatic Cluster Configuration Monitoring function.
- There is an automatic correction facility, which will be covered in more detail in the
HACMP Administration II: Administration and Problem Determination course.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Examine some of the other components of the HACMP software.
Details — Outline each component and the role that it performs.
Additional information — Note that Automatic Cluster Configuration Monitoring is usually
called automatic cluster verification and that it requires that clcomdES is active and that the
/usr/es/sbin/cluster/etc/rhosts file is present and has something in it.
Transition statement — HACMP can be customized to achieve availability goals for your
particular environment.
Uempty
Notes:
Customization required
HACMP is shipped with event scripts (Korn Shell scripts) which handle the failure
scenarios.
Application Server start/stop scripts are written to control the application(s) based on
the status of the cluster nodes. Most often, all the script writing that is required to
integrate an application into the cluster is done in the Application Server start/stop
scripts.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Smart Assists are provided in HACMP (since HACMP 5.2) to help ease the
customization for the applications that they address. In HACMP 5.4 and later, an API is
provided that allows third-party application vendors to write Smart Assists.
In the rare circumstance where you have a requirement to customize some special
fallover behavior, this is done with pre- and post-event scripts.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Let’s review
1. Which of the following items are examples of topology components in HACMP? (Select
all that apply.)
a. Node
b. Network
c. Service IP label
d. Hard disk drive
2. True or False?
All nodes in an HACMP cluster must have roughly equivalent performance
characteristics.
3. Which of the following is a characteristic of high availability?
a. High availability always requires specially designed hardware components.
b. High availability solutions always require manual intervention to ensure
recovery following fallover.
c. High availability solutions never require customization.
d. High availability solutions use redundant standard equipment (no specialized
hardware).
4. True or False?
A thorough design and detailed planning is required for all high availability solutions.
Notes:
Additional information —
Transition statement — Now that we have looked at High Availability in general, let’s take
a closer look at how HACMP for AIX works.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
In this topic, we take a look at what HACMP does.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
HACMP functions:
– Monitors the states of nodes, networks, network adapters
and devices
– Strives to keep resource groups highly available
– Optionally, monitors the state of the applications, and can be
customized to react to every possible failure
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
?
Ɣ How the cluster responds to the recovery of a failed component
depends on what has recovered, what the resource group's fallback
policy is, and the resource group dependencies:
– Typically, administrators need to indicate or confirm that the
fixed component is approved for use. Some components are
integrated automatically; for instance, when a communication
interface recovers.
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
A A
One node is primary
A A
Notes:
Standby
Standby configurations are configurations where one (or more) nodes have no
workload.
Uempty Drawbacks
- One node is not used (this is ideal for availability but not from a utilization
perspective).
- A second outage on the fallback is possible.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Describe a typical two-node cluster with a single application.
Details — You might want to set the stage for the next visual by pointing out that the
fallback after the primary node recovers results in a second outage from the users’
perspective (who are unlikely to be impressed by the notion that this second outage of the
day is actually good news indicating that things are back to normal).
Additional information — Point out a reason why this could be if one node was much
more capable (better performance) than the standby node.
Do not go into what all the policies are on these visuals. At this point, the policy is just a
summary of the behaviors being described.
Transition statement — What if we want to avoid the fallback outage?
Uempty
A UK returns
USA fails
Eliminates another
A outage A
Reduces downtime
Notes:
Minimize downtime
A resource group can be configured to not fall back to the primary node (or any other
higher priority node) when it recovers. This avoids the second outage, which results
when the fallback occurs.
The cluster administrator can request that HACMP move the resource group back to
the higher priority node at an appropriate time or it can simply be left on its current node
indefinitely (an approach that calls into question the terms primary and secondary, but
which is actually quite a reasonable approach in many situations).
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain how the cluster administrator might avoid the fallback outage.
Details —
Additional information —
Transition statement — Now, we look at takeover configurations. Most two-node clusters
actually have two applications.
Uempty
A B
Very common
B A A B
No one node/LPAR
is left idle
Notes:
Takeover
Takeover configurations imply that there is workload on all nodes which might or might
not be under the control of HACMP, but that a node can take over the work of another
node in the cluster.
Mutual takeover
An extension of the primary node with a secondary node configuration is to have two
resource groups, one failing from right to left and the other failing from left to right. This
is referred to as mutual takeover.
Mutual takeover configurations are very popular configurations for HACMP because
they support two highly available applications at a cost, which is not that much more
than would be required to run the two applications in separate stand-alone
configurations.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Additional costs
Note that there are at least a few additional costs:
- Each cluster node probably needs to be somewhat larger than the stand-alone
nodes because they must each be capable of running both applications, possibly in
a slightly degraded mode, should one of the nodes fail.
- Additional software licenses might be required for the applications when they run on
their respective back-up nodes (this is a potentially significant cost item, which is
often forgotten in the early cluster planning stages).
- HACMP for AIX license fees.
- This is not intended to be an all inclusive list of additional costs.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Concurrent mode
HACMP also supports resource groups in which the application is active on multiple
nodes simultaneously. In such a resource group, all nodes run a copy of the application
and share simultaneous access to the disk. This style of cluster is often referred to as a
concurrent access cluster or concurrent access environment.
Service labels
Since the application is active on multiple nodes, each node has its own service IP
label. The client systems must be configured to randomly (or otherwise) select which
service IP address to communicate with, and be prepared to switch to another service
IP address should the one that they’re dealing with stop functioning (presumably,
because the node with the service IP address has failed). It is also possible to configure
an IP multiplexer between the clients and the cluster which redistributes the client
Uempty sessions to the cluster nodes, although care must be taken to ensure that the IP
multiplexer does not itself become a single point of failure.
How to choose
Whether this mode of operation can be used for your application is a function of the
application, not of HACMP.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain concurrent access clusters.
Details — Point out that in a concurrent access cluster, all nodes run the same application
as the same point in time, accessing the same data on shared disk.
Additional information — Be prepared to discuss some of the ways that client systems
can select which server to use and switch to another server when their server fails (see
student notes).
Transition statement — As we consider the implementation details, what should we be
thinking about?
Uempty
Points to ponder
Ɣ Resource groups:
– Must be serviced by at least two nodes
– Can have different policies
– Can be migrated (manually or automatically) to rebalance loads
Ɣ Clusters:
– Must have at least one IP network and one non-IP network
– Need not have any shared storage
– Can have any combination of supported nodes *
– Can be split across two sites
• Might or might not require replicating data (HACMP/XD).
Ɣ Applications:
– Can be restarted via monitoring
– Must be manageable via scripts (start/restart and stop)
Notes:
Importance of planning
Planning, designing, configuring, testing, and operating a successful HACMP cluster
requires considerable attention to detail. In fact, a careful methodical approach to all the
phases of the cluster’s life-cycle is probably the most important factor in determining the
ultimate success of the cluster.
Methodical approach
A careful methodical approach considers the relevant points above, and many other
issues that are discussed this week or that are discussed in the HACMP
documentation.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — List some of the many issues that must be considered when planning an
HACMP cluster.
Details —
Additional information —
Transition statement — Along those same lines, what other very important things should
be considered?
Uempty
High
availability Data
Networking Continuous
availability
Continuous
operation
Hardware
Environment
Software
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Zero downtime
An example of zero down time is the intensive care room. Also HACMP is not designed
to handle many failures at once.
Security issues
One security issue that is now addressed is the need to eliminate .rhost files. Also
there is better encryption possible with inter node communications, but this might not be
enough for some security environments.
Unstable environments
The prime cause of problems with HACMP is poor design, planning, implementation,
and administration. If you have an unstable environment, with poorly trained
Uempty administrators, easy access to the root password, and a lack of change control,
HACMP is not the solution for you.
With HACMP, the only thing more expensive than employing a professional to plan,
design, install, configure, customize, and administer the cluster is employing an
amateur.
Other characteristics of poorly managed systems are:
- Lack of change control
- Failure to treat cluster as single entity
- Too many cooks
- Lack of documented operational procedures
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain the circumstances when HACMP is not the right solution for you.
Details — Emphasize that training is an exceptionally important requirement for the staff
who will be supporting the HACMP environment.
Additional information —
Transition statement — Let’s start to look now at what we will do this week.
Uempty
A A
B B
Notes:
Goals
During this week you will design, plan, configure, customize, and administer a two-node
high-availability cluster running HACMP 5.4.1 on an AIX system.
You will learn how to build a standby environment for one application as well as a
mutual takeover environment for two applications. In the mutual takeover environment,
each system will eventually be running its own highly available application, and
providing fallover back-up for the other system.
Some classroom environments will involve creating the cluster on a single pSeries
system between two LPARs. Although this is not a recommended configuration for
production, it provides the necessary components for a fruitful HACMP configuration
experience.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce the case study scenario for this week.
Details — No need to dwell on this page, just emphasize the fact that each team builds a
two-node cluster, with each node providing fallover back-up for the other. The scenario is
covered in more detail later on. This page is just designed to set the scene.
Additional information —
Transition statement — OK, let’s start to look at an overview of the planning and
implementation process.
Uempty
Notes:
Implementation process
The process should include at least the following:
• Work as a team. It cannot be stressed enough that it will be necessary to work with
others when you build your HACMP cluster in your own environment. Practice here will
be useful.
• Look at the AIX environment.
- For storage, plan for adapters and LVM components required for application.
- For networks, plan and for communication interfaces, devices, name resolution via
/etc/hosts and service address for the application.
- For application build start and stop script and test outside of the control of HACMP.
• Install the HACMP for AIX software and reboot.
• Configure the topology and resource groups (and resources).
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Public Network
Notes:
Hint
• Create a cluster diagram--a picture is worth 10 thousand words (because of inflation, a
thousand is not enough!).
• Use the Online Planning Worksheets. They can be used without installing HACMP and
can be used to generate AND save HACMP configurations.
• Try to reduce SPOFs.
• Always include a non-IP network.
• Access storage over multiple paths or mirror across power and buses.
• Document test plan. HACMP also provides test scripts called auto test.
• Be methodical.
• Execute the test plan prior to placing the cluster into production!
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Manuals on CD
The HACMP 5.4.1 manuals are:
SC23-4867-09 HACMP for AIX, Version 5.4.1: Master Glossary
SC23-4864-10 HACMP for AIX, Version 5.4.1: Concepts and Facilities Guide
SC23-5209-01 HACMP for AIX, Version 5.4.1: Installation Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1: Planning Guide
SC23-4862-10 HACMP for AIX, Version 5.4.1: Administration Guide
SC23-5177-04 HACMP for AIX, Version 5.4.1: Troubleshooting Guide
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Checkpoint
1. True or False?
Resource Groups can be moved from node to node.
2. True or False?
HACMP/XD is a complete solution for building
geographically distributed clusters.
3. Which of the following capabilities does HACMP not
provide? (Select all that apply.)
a. Time synchronization
b. Automatic recovery from node and network adapter failure
c. System Administration tasks unique to each node; back-up and
restoration
d. Fallover of just a single resource group
4. True or False?
All nodes in a resource group must have equivalent
performance characteristics.
© Copyright IBM Corporation 2008
Notes:
Checkpoint solutions
1. True or False?
Resource Groups can be moved from node to node.
2. True or False?
HACMP/XD is a complete solution for building
geographically distributed clusters.
3. Which of the following capabilities does HACMP not
provide? (Select all that apply.):
a. Time synchronization
b. Automatic recovery from node and network adapter failure
c. System Administration tasks unique to each node; back-up
and restoration
d. Fallover of just a single resource group
4. True or False?
All nodes in a resource group must have equivalent
performance characteristics.
© Copyright IBM Corporation 2008
Additional information —
Transition statement — Time for the unit summary.
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit summary
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 1. Introduction to HACMP for AIX 1-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Estimated time
03:00
References
SC23-5209-01 HACMP for AIX, Version 5.4.1: Installation Guide
SC23-4864-10 HACMP for AIX, Version 5.4.1:
Concepts and Facilities Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1: Planning Guide
SC23-4862-10 HACMP for AIX, Version 5.4.1: Administration Guide
SC23-5177-04 HACMP for AIX, Version 5.4.1: Troubleshooting Guide
SC23-4867-09 HACMP for AIX, Version 5.4.1: Master Glossary
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit objectives
After completing this unit, you should be able to:
Ɣ Discuss how HACMP uses networks
Ɣ Describe the HACMP networking terminology
Ɣ Explain and set up IP Address Takeover (IPAT)
Ɣ Configure an IP network for HACMP
Ɣ Configure a non-IP network
Ɣ Explain how client systems are likely to be affected by failure
recovery
Ɣ Minimize the impact of failure recovery on client systems
Notes:
Unit objectives
This unit discusses networking in the context of HACMP.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Topic 1 objectives
This topic explores how HACMP uses networks. The HACMP concept of IP Address
Takeover (IPAT), where application addresses are relocated when failures occur will be
looked at in more detail in a later section.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
2
RSCT RSCT
3
clcomd clcomd
Notes:
Uempty administrators. Just being able to detect node, network, and NIC failures imposes
several requirements on how the networks are designed. Being able to distinguish
between certain failures (for example the failure of a network and the failure of a node),
imposes yet more requirements on the network design.
Reliable Scalable Cluster Technology (RSCT) provides facilities for monitoring node
membership; network interface and communication interface health; and event
notification, synchronization, and coordination via reliable messaging.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — To list the three ways that HACMP uses networks.
Details — This visual is deliberately vague regarding network types or technologies. Try to
avoid using terms such as IP networks because HACMP also requires non-IP networks, a
requirement that is best left unmentioned at this point in the course.
Additional information —
Transition statement — Let’s see what it takes to provide the users with highly available
access to the cluster.
Uempty
– Careful network design and implementation all the way out to the client's systems
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Network as SPOF
The network itself is, of course, a single point of failure because the failure of the
network will disrupt the users’ ability to communicate with the cluster. The probability of
this SPOF being an issue can be reduced by careful network design, an approach that
is often considered sufficient.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
IP network
en0 en1 en0 en1
non-IP network
uk
usa
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — To reinforce the three failure types that HACMP handles directly.
Details —
Additional information —
Transition statement — To detect the failure of a NIC, node, or network, HACMP must
monitor the cluster’s NICs, nodes and networks.
Uempty
Heartbeat packets
Ɣ HACMP sends heartbeat packets across networks.
Ɣ Heartbeat packets are sent and received by every NIC.
Ɣ This is sufficient to detect all NIC, node, and network failures.
Ɣ Heartbeat packets are not acknowledged.
Application
usa Data uk
Notes:
Heartbeat packets
HACMP’s primary monitoring mechanism is to send heartbeat packets. The cluster
sends heartbeat packets from every NIC and to every NIC and to and from non-IP
devices.
Heartbeating pattern
In a typical two-node cluster with two NICs on the network, the heartbeat packets are
sent in the pair-wise fashion shown above. The pattern gets more complicated when the
cluster gets larger as HACMP uses a pattern that is intended to satisfy three
requirements:
- That each NIC be used to send heartbeat packets (to verify that the NIC is capable
of sending packets)
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
- That heartbeat packets be sent to each NIC (to verify that the NIC is capable of
receiving heartbeat packets)
- That no more heartbeat packets are sent than are necessary to achieve the first two
requirements (to minimize the load on the network)
The details of how HACMP satisfies the third requirement are discussed in a later unit.
Detecting failures
Heartbeat packets are not acknowledged. Instead, each node knows what the
heartbeat pattern is and simply expects to receive appropriate heartbeat packets on
appropriate network interfaces. Noticing that the expected heartbeat packets have
stopped arriving is sufficient to detect failures.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Application
usa Data uk
Notes:
Diagnosis
The heartbeat patterns just discussed are sufficient to detect a failure in the sense of
realizing that something is wrong. They are not sufficient to diagnose a failure in the
sense of figuring out exactly what is broken.
For example, if the en1 interface on the usa node fails as in the visual above, usa stops
receiving heartbeat packets via its en1 interface, and uk stops receiving heartbeat
packets via its en1 interface. Usa and uk both realize that something has failed, but
neither of them has enough information to determine what has failed.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Failure diagnosis
Ɣ When a failure is detected, HACMP (RSCT topology services)
uses specially crafted packet transmission patterns to
determine (that is, diagnose) the actual failure by ruling out
other alternatives.
Ɣ Example:
1. RSCT on usa notices that heartbeat packets are no longer arriving via en1 and
notifies uk (which has also noticed that heartbeat packets are no longer arriving via
its en1).
2. RSCT on both nodes send diagnostic packets between various combinations of
NICs (including out via one NIC and back in via another NIC on the same node).
3. The nodes soon realize that all packets involving usa's en1 are vanishing but
packets involving uk's en1 are being received.
4. Diagnosis: usa's en1 has failed.
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Result is a
partitioned cluster
Application
and likely data
Data divergence.
usa uk
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain what happens when all communication is lost between nodes or
groups of nodes.
Details —
Additional information —
Transition statement — Let’s see how we avoid partitioned clusters.
Uempty
non-IP network
Application
Data
usa uk
© Copyright IBM Corporation 2008
Notes:
Required?
To be completely accurate, you do not have to configure a non-IP network. But for the
reasons outlined as follows, you will want to implement at least one non-IP network and
possibly more. So it is not technically accurate that a non-IP network is required, but it is
definitely practically accurate that one is required. That is why the title indicates
required, while the content of the visual indicates should.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
non-IP network
Note:
Doesn’t apply for single
adapter networks, like
etherchannel or
virtual ethernet.
usa uk
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
usa uk usa uk
Notes:
Node recovery
In contrast, a node is not considered to have recovered until the Cluster Services has
been started on the node. This allows the node to be rebooted and otherwise exercised
as part of the repair process without HACMP declaring failures or performing
reintegration or both, while the repair action is occurring.
The reintegration of a component might trigger quite significant actions. For example, if
a node is reintegrated, which has a high priority within a resource group, then,
depending on how the resource group is configured, the resource group might fall back.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Additional information —
Transition statement — It is time that we got a little deeper in the HACMP concepts,
terminology, and configuration rules.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Topic 2 objectives
This section will explore HACMP networking concepts, terms and configuration rules in
more detail.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Supported IP networks
HACMP supports all of the popular IP networking technologies (and a few that are
possibly not quite as popular). Note that the IEEE 802.3 Ethernet frame type is not
supported.
Uempty from a node or nodes to the rest of the cluster nodes via all routes, IP and non-IP will be
treated as a loss of quorum. This in turn will cause the node or nodes to stop accessing
the data. This is to prevent (or minimize) data corruption in the event of a domain merge
(split brain). This is implemented only with Resource Groups that have a startup policy
of Online on All Nodes (OOAN, also known as concurrent resource groups).
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — List the IP and non-IP networking technologies supported by HACMP 5.4.1.
Details —
Additional information —
Transition statement — Let’s look at the difference of local versus remotely attached
nodes.
Uempty
Network types
HACMP categorizes all networks:
Ɣ IP networks:
Ɣ Non-IP networks:
Notes:
IP networks
As mentioned before, IP networks are used by HACMP for:
- HACMP heartbeat (failure detection and diagnosis)
- Communications between HACMP daemons on different nodes
- Client network traffic
IP network attribute
The default for this attribute is public. Oracle uses the private network attribute
setting to select networks for Oracle inter-node communications. This attribute is not
used by HACMP itself. See the HACMP for AIX: Planning Guide for more information.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
If the VIO Server has only a single physical interface on a network, then a failure of
that physical interface will be detected by HACMP. However, that failure will isolate
the node from the network.
Non-ip networks
HACMP uses non-IP networks for:
- Alternative non-IP path for HACMP heartbeat and messaging
- Differentiates between node/network failure
- Eliminates IP as a single point of failure
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Interface
Interface
Network
Network
Interface
Network
Card
Card
Card
Card
ne non
tw -IP
or
k
Communication Device
Serial Serial
Port
non IP - rs232 Port
Notes:
Terminology
HACMP has quite a few special terms that are used repeatedly throughout the
documentation and the HACMP smit screens. Over the next few visuals we will discuss
some of the network related terminology in detail.
- node
An IBM system p server operating within an HACMP cluster
- node name
The name of a node from HACMP’s perspective
- IP label
For TCP/IP networks, the name specified in the /etc/hosts file or by the Domain
Name Service for a specific IP address
Uempty In many configurations, HACMP nodes will have multiple NICs, and thus multiple IP
labels, but only one hostname. We will look at the relationship between hostname,
node name, and IP labels in the next visual.
In HACMP, IP labels are either service IP labels or non-service IP labels. We will
discuss this distinction in the next few visuals.
- IP network
A network that uses the TCP/IP family of protocols
- non-IP network or serial network
A point-to-point network, which does not rely on the TCP/IP family of protocols
- communication interface
A network connection onto an IP network (slightly better definition coming shortly)
- communication device
A port or device connecting a node to a non-IP network (slightly better definition
coming shortly)
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the topology components and their names.
Details — Many of these concepts are covered in more detail shortly.
Additional information —
Transition statement — Let’s consider the question of naming a node.
Uempty
Naming nodes
Ɣ A node can have several names, including the AIX hostname, the
HACMP node name, and one of the IP labels. These concepts
should not be confused.
AIX hostname HACMP node name
# hostname # usr/es/sbin/cluster/utlities/get_local_nodename
gastown vancouver
# uname -n
gastown
IP labels
# netstat -i
Name Mtu Network Address Ipkts Ierrs Opkts Oerrs Coll
lo0 16896 link#1 5338 0 5345 0 0
lo0 16896 127 localhost 5338 0 5345 0 0
lo0 16896 ::1 5338 0 5345 0 0
tr0 1500 link#2 0.4.ac.49.35.58 76884 0 61951 0 0
tr0 1500 192.168.1 vancouverboot1 76884 0 61951 0 0
tr1 1492 link#3 0.4.ac.48.22.f4 476 0 451 13 0
tr1 1492 192.168.2 vancouverboot2 476 0 451 13 0
tr2 1492 link#4 0.4.ac.4d.37.4e 5667 0 4500 0 0
tr2 1492 195.16.20 db-app-svc 5667 0 4500 0 0
© Copyright IBM Corporation 2008
Notes:
Hostname
Each node within an HACMP cluster has a hostname associated with it that was
assigned when the machine was first installed onto the network. For example, a
hypothetical machine might have been given the name gastown.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
IP labels
Each IP address used by an HACMP cluster almost certainly has an IP label associated
with it. In non-HACMP systems, it is not unusual for the system’s only IP label to be the
same as the system’s hostname. This is rarely a good naming convention within an
HACMP cluster because there are just so many IP labels to deal with, and having to
pick which one gets a name that is the same as a node’s hostname is a pointless
exercise.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Ɣ Communication Device:
A communication device refers to one end of a point-to-point
non-IP network connection, such as /dev/tty1, /dev/hdisk1 or
/dev/tmssa1.
Ɣ Communication Adapter:
A communication adapter is an X.25 adapter used to support a
Highly Available Communication Link.
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Uempty Note: In earlier versions of HACMP, the terms boot IP label and boot IP address were
used to refer to what is now being called non-service IP label / address. The older terms
still appear in a few places in the HACMP 5.x documentation.
Service interface
A communications interface configured with a service IP label / address (either by alias
or by replacement).
Non-service interface
A communications interface not configured with a service IP label / address. Used as a
backup for a service IP label / address.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Define a few more HACMP network component terms.
Details —
Additional information —
Transition statement — Let’s take a look at some of the rules for configuring IP networks
in HACMP.
Uempty
Notes:
General rules
The primary purpose of these rules is to ensure that cluster heartbeating can reliably
monitor NICs, networks and nodes.
The two basic approaches are:
- Heartbeating over IP interfaces (the default)
- Heartbeating over IP aliases
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
In either case:
- HACMP requires that each node in the cluster have at least one direct, non-routed
network connection with every other node.
- Between cluster nodes, do not place intelligent switches, routers, or other network
equipment that do not transparently pass through UDP broadcasts and other
packets to all cluster nodes. Bridges, hubs, and other passive devices that do not
modify the packet flow may be safely placed between cluster nodes.
netmon
netmon, the network monitor portion of RSCT Topology Services, enables you to create
a configuration file that specifies additional network addresses to which ICMP ECHO
requests can be sent as an additional way to monitor interfaces. netmon is outside the
scope of this class. See the HACMP for AIX: Planning Guide for information on using
netmon.
Unmonitorable NICs
One final point: If no other mechanism has been configured into the cluster, HACMP
attempts to monitor an otherwise unmonitorable NIC by checking to see if packets are
arriving and being sent via the interface. This approach is not sufficiently robust to be
relied upon-- use heartbeating via IP aliases or netmon to get the job done right.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Discuss the IP network configuration rules as they’ve been revealed so far.
Details —
Additional information — Use of heartbeat over alias is an exception to the subnet rule.
This will be covered later.
Transition statement — Let’s take a look some IP network configuration examples.
Uempty
Notes:
Examples
The visual shows some non-service IP address examples. We’ll see the service IP
address examples later, when we discuss IPAT.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Provide examples of how the IP networking rules work in practice.
Details — Go through each example and explain why it is either valid or not.
Additional information —
Transition statement — Let’s take a look at the rules for non-IP networks.
Uempty
Notes:
Non-ip networks
Non-IP networks are point-to-point; that is, each connection between two nodes is
considered a network and a separate non-IP network label because it is created in
HACMP.
For example, the visual shows four RS232 networks, in a ring configuration, connecting
four nodes to provide full cluster non-IP connectivity.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Rules
The rules for non-IP networks are considerably simpler than the rules for IP networks
although they are just as important.
The basic rule is that you must configure enough non-IP networks to provide a non-IP
communication path, possibly via intermediate nodes, between every pair of nodes in
the cluster. In other words, every node must have a non-IP network connection to at
least one other node. Additional communication paths, such as the ring or mesh
topologies discussed in the visual, provide more robustness.
In addition, there are some considerations based on the type of non-IP network you are
using.
Uempty Disks that are RAID arrays, or subsets of RAID arrays, might have lower limits.
Check with the disk or disk subsystem manufacturer to determine the number of
seeks per second that a disk or disk subsystem can support. However, if you choose
to use a disk that has significant I/O load, increase the value for the timeout
parameter for the disk heartbeat network.
- When SDD is installed and the enhanced concurrent volume group is associated
with an active vpath device, ensure that the disk heartbeating communication device
is defined to use the /dev/vpath device (rather than the associated /dev/hdisk
device).
- If a shared volume group is mirrored, at least one disk in each mirror should be used
for disk heartbeating.
This is particularly important if you plan to set the forced varyon option for a resource
group.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — List the rules for non-IP networks.
Details — The details of planning the various non-IP network types are provided for
reference and come straight out of the Install Guide. You do not need to cover all these
details here, unless your students are interested.
Additional information —
Transition statement — There’s a new disk heartbeat network introduced in HA 5.4.1
called multi-node disk heartbeat. Let’s see the requirements.
Uempty
ecmvg MNDHB 1
n1
(e.g.. Oracle RAC
lv1 MNDHB 2
Voting disks)
n2 MNDHB 3
lv2
lv3
n3
Notes:
Fencing
When a cluster partition occurs HACMP will determine the “losing side” and fence those
nodes away from the shared storage.
“Fencing” uses the same function as LVM uses when quorum is lost on a mirrored volume
group with quorum on – access to the disks is blocked and any further I/O attempts fail.
Note that the VG does not have to be defined with quorum and mirroring.
The “losing side” is determined by a simple quorum calculation – a node must have access
to at least one more than half of the disks.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Rationale
In earlier releases of HACMP, the only way to guarantee that a known IP address would
always be available on each node for administrative purposes was to configure a
separate network, which was never used for IPAT. Such a configuration limits the
usefulness of the administrative network because the loss of that network adapter
would result in an inability to reach the node for administrative purposes.
Additionally, there are applications and functions that require a reliable address that is
used to reach a specific node, one that does not move from one node to another. GLVM
is one AIX function that requires an address to be bound to a node but kept highly
available amongst adapters on that network. Applications such as Tivoli Management
Region (TMR), require that a static IP address be assigned to each node it manages.
This is accomplished through a persistent address.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain persistent node IP labels.
Details — These are a very useful administrative feature. Make sure that the students
understand why they are useful (they provide a highly available IP address, that is always
associated with a particular node).
Additional information —
Transition statement — Let’s see how we did.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Review.
Details —
Additional information —
Transition statement — Now let’s take a look at how to configure IP address takeover.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Topic 3 objectives
This section explains how to configure both variants of IP Address Takeover.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
IP Address Takeover
Ɣ Each highly available application is likely to require its own IP
address (called a service IP address).
Ɣ This service IP address is placed in the application's resource
group.
– HACMP is responsible for ensuring that the service IP address is available on the node
currently responsible for the resource group.
I P r v ic e
el
NF
Sy
F il e m
la b
S Se
e
st
ex
ro e
NF
G lu m
S po
up
mo r ts
ver
un
ts Vo ti on S
er
Ap p lic a
Reso
ur
Grou ce
p
Notes:
Service IP address
Most highly available applications work best, from the user’s perspective, if the
application’s IP address never changes. This capability is provided by HACMP using a
feature called IP Address Takeover. An IP address is selected that is associated with
the application. This IP address is called a service IP address because it is used to
deliver a service to the use. It is placed in the application’s resource group. HACMP
then ensures that the service IP address is kept available on whichever node the
resource group is currently on. The process of moving an IP address to another NIC or
to a NIC on another node is called IP address takeover (IPAT).
Uempty for which the client software can be configured to check multiple IP addresses when it is
looking for the server.
Also, IPAT is not supported for resource groups configured with a Startup Policy of
Online on All Node (concurrent access) because the application in such a resource
group is active on all the nodes that are currently up. Consequently, clients of a
concurrent access resource group must be capable of finding their server by checking
multiple IP addresses.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce IP Address Takeover.
Details —
Additional information —
Transition statement — Let’s look at the two ways to implement IPAT.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Which is better?
We will examine the advantages and disadvantages of each method in the next few
pages. Remember that the question is not which is better but rather which is better
suited to a particular context.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
* Refer to earlier discussion of heartbeating and failure diagnosis for explanation of why
© Copyright IBM Corporation 2008
Notes:
Requirements
Before configuring an HACMP network to use IPAT via IP aliasing, ensure that:
- The network is a type that supports IPAT via IP aliasing:
• Ethernet
• Token-ring
• FDDI
• SP switch
- No service IP labels on the network require hardware address takeover (HWAT)
- The non-service IP addresses on each node are all on separate IP subnets
- The service IP addresses are on separate IP subnets from all non-service IP
addresses
subnet IP labels
192.168.10/24 n1boot1, n2boot1
192.168.11/24 n1boot2, n2boot2
9.47.87/24 appA-svc
9.47.88/24 appB-svc
Planning considerations
A node on a network that uses IPAT via aliasing can be the primary node for multiple
resource groups on the same network, regardless of the number of actual boot
interfaces on the node. Still, users should plan their networks carefully to balance the
RG load across the cluster.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Consequently, any load balancing is the responsibility of the cluster administrator (and
will require customization, which is beyond the scope of this course).
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
9.47.87.22 (alias)
192.168.10.1 (ODM) 192.168.11.1 (ODM) 192.168.10.2 (ODM) 192.168.11.2 (ODM)
Notes:
Operation
HACMP uses AIX’s IP aliasing capability to alias service IP labels included in resource
groups onto interfaces (NICs) on the node that runs the resource group. With aliasing,
the non-service IP address (stored in the ODM) is still present.
Note that one advantage of sorts of IPAT via IP aliasing is that the non-service IP
addresses do not need to be routable from the client/user systems.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
9.47.87.22 (alias)
192.168.10.1 (ODM) 192.168.11.1 (ODM) 192.168.10.2 (ODM) 192.168.11.2 (ODM)
Notes:
Interface failure
If a communication interface fails, HACMP moves the service IP addresses to another
communication interface, which is still available, on the same network. If no remaining
available NICs are on the node for the network, then HACMP initiates a fallover for that
resource group.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show what happens when an interface fails.
Details —
Additional information —
Transition statement — Let’s see what happens when a node fails.
Uempty
9.47.87.22 (alias)
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-93
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show what happens with IPAT when a node fails.
Details —
Additional information —
Transition statement — Because several service IP labels can share the same interface;
therefore, HACMP provides a network attribute to control distribution of service IP labels.
Uempty
IPAT via IP aliasing: Distribution preference for
service IP label aliases
ƔNetwork level attribute that controls the placement of service IP
labels onto communication interfaces
– Useful for
• Load balancing
• Isolating traffic for VPN requirements
– If there are insufficient interfaces available to satisfy the preference,
HACMP allocates service IP label aliases and persistent IP labels to
an existing active network interface card
ƔFour choices:
– Anti-Collocation
– Collocation
– Collocation with Persistent Label
– Anti-Collocation with Persistent Label
Figure 2-34. IPAT via IP aliasing: Distribution preference for service IP label aliases AU548.0
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-95
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
- VPN requirements:
Enables you to configure the type of the distribution preference suitable for the VPN
firewall external connectivity requirements.
HACMP will try to meet preferences, but will always keep service labels active:
The distribution preference is exercised as long as there are acceptable network
interfaces available. However, HACMP always keeps service IP labels active, even if
the preference cannot be satisfied.
How to configure
You use the extended path to configure distribution preferences. Follow this path:
smitty hacmp -> Extended Configuration -> Extended Resource Configuration ->
HACMP Extended Resources Configuration -> Configure Resource Distribution
Preferences -> Configure Service IP Labels/Address Distribution Preference -> pick
your network -> toggle through the Distribution Preference menu options.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-97
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Summary
The visual summarizes IPAT via IP aliasing. Some additional considerations are
discussed as follows.
Advantages
Probably the most significant advantage to IPAT via IP aliasing is that it supports
multiple service IP labels per network per resource group on the same communication
interface and allows a node to easily support quite a few resource groups. In other
words, IPAT enables you to share several service labels on one interface. Thus, it can
require fewer adapters and interfaces than IPAT via replacement.
Uempty Disadvantages
Probably the most significant disadvantage is that IPAT via IP aliasing does not support
hardware address takeover. You will rely on Gratuitous ARP as the means of resetting
the ARP entries on IPAT.
In addition, because you must have a subnet for each interface and a subnet for each
service IP label, IPAT via IP aliasing can require a lot of subnets.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-99
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show a summary of the IPAT via IP aliasing configuration rules and behavior.
Details —
Additional information —
Transition statement — Now let’s take a look at IPAT via IP replacement.
Uempty
Notes:
History
In the beginning, IPAT via IP replacement was the only form of IPAT available. IPAT via
IP aliasing became available when AIX could support multiple IP addresses associated
with a single NIC via IP aliasing. Because IPAT via IP aliasing is more flexible and
usually requires less network interface cards, IPAT via IP replacement is no longer the
recommended method. Many existing cluster implementations still have IPAT via
Replacement. When upgrading to versions of HACMP that support IPAT via Aliasing,
consider converting IPAT via Replacement configurations to Aliasing only if there is
another reason compelling you to do so. Otherwise, leave the IPAT via Replacement
configuration as it is. Any new implementations should strongly consider using IPAT via
Aliasing.
This visual gives a brief overview of IPAT via IP replacement. A detailed discussion can
be found in Appendix C.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-101
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Configuration rules
The visual summarizes the configuration rules. Notice that they are almost the opposite
to the rules for IPAT via IP aliasing.
Advantages
Probably the most significant advantage of IPAT via IP replacement is that it supports
hardware address takeover (HWAT). HWAT may be needed if your local clients or
routers do not support gratuitous ARP. This will be discussed in a few pages.
Another advantage is that it requires fewer subnets. If you are limited in the number of
subnets available for your cluster, this may be important.
Note: If reducing the number of subnets needed is important, another alternative may
be to use heartbeating via aliasing, see “Heartbeating over IP aliases” on page 2-58.
Disadvantages
Probably the most significant disadvantages are that IPAT via IP replacement limits the
number of service IP labels per subnet per resource group on one communications
interface to one and makes it rather expensive (and complex) to support lots of
resource groups in a small cluster. In other words, you need more network adapters to
support more applications.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-103
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-105
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-107
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Hostname resolution
Ɣ All of the cluster's IP labels must be defined in every cluster
node's /etc/hosts file:
127.0.0.1 loopback localhost 127.0.0.1 loopback localhost
# cluster explorers # cluster explorers
# netmask 255.255.255.0 # netmask 255.255.255.0
Notes:
/etc/hosts
Make sure that the /etc/hosts file on each cluster node contain all of the IP labels used
by the cluster (you do not want HACMP to be in a position where it must rely on an
external DNS server to do IP label to address mappings).
Maintaining /etc/hosts
The easiest way to ensure that all of the /etc/hosts file contain all of the required
addresses is to get one /etc/hosts file set up correctly and then copy it to all of the other
nodes or use the filecollections facility of HACMP 5.x.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-109
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the two last sets of conventions in /etc/hosts file examples.
Details —
Additional information —
Transition statement — Now let’s talk about other network configuration options, starting
with Etherchannel.
Uempty
sw1
sw2
Shared Storage
Heartbeat on disk
appB 192.168.3.20
appA 192.168.3.10
Notes:
Etherchannel details
Etherchannel is a “trunking” technology that allows grouping several Ethernet links.
Traffic is distributed across the links, providing higher performance and redundant
parallel paths. When a link fails, traffic is redirected to the remaining links within the
channel without user intervention and with minimal packet loss.
EtherChannel was invented by Kalpana in the early 1990s and bought by CISCO in
1994. Other popular trunking technologies exist: Adaptec's Duralink trunking / Nortel
MLT MultiLink Trunking.
Interoperability between technologies is a problem.
A standard IEEE 802.3ad was finalized in 2000.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-111
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain what etherchannel is and the configuration option.
Details — Indicate that this is meant to be a high-level view of etherchannel and its
implementation with HACMP.
Additional information —
Transition statement — Let’s look at limitations and rules for etherchannel with HACMP.
Uempty
Notes:
Very useful information can be found in the following documents (although dated, the
information is still very relevant).
A Techdoc regarding experiences and configuration:
http://www-03.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/TD101785
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-113
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain rules and limitations of etherchannel with HACMP.
Details —
Additional information —
Transition statement — The next configuration option to consider is virtual ethernet
networking.
Uempty
Frame1 ent1 ent0 ent2 ent5 ent0 ent5 ent2 ent1 ent0
(phy) (phy) (virt) (virt) (virt) (virt) (virt) (phy) (phy)
Hypervisor
Hypervisor
Virtual I/O Server (VIOS1) AIX Client LPAR 2 Virtual I/O Server (VIOS2)
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-115
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Cover one configuration option where Virtual Ethernet networking is used on
an LPAR system.
Details — This slide might generate a lot of discussion. Cover this at a high level. Indicate
that the virtual networking concepts are beyond the scope of the class but explain as much
as you can within a reasonable amount of time.
Additional information —
Transition statement — How does HACMP see this?
Uempty
Hypervisor
Virtual I/O Server (VIOS1) AIX Client LPAR Virtual I/O Server (VIOS2)
Notes:
Additional information
Single adapter Ethernet networks in HACMP require the use of a netmon.cf file.
Note that there does not have to be link aggregation at the VIO Server level.
You could configure a single NIC and rely on the other VIO Server for redundancy.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-117
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Examine the HACMP view of the virtual ethernet configuration.
Details — HACMP sees the single adapter in the HACMP LPARs as a single network
adapter (next visual) and that the netmon.cf file should be configured on the them to
provide topsvcs with assistance in monitoring the network.
Additional information —
Transition statement — So we see that virtual ethernet networking results in the need to
configure HACMP with a single network adapter. Let’s look at that.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-119
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain why single adapter networks are needed and might not be a good
idea.
Details —
Additional information —
Transition statement — So how do we get all these IP addresses that we’ve been talking
about?
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-121
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain what they need to get from the networking folks.
Details —
Additional information —
Transition statement — Let’s take a look at some changes to the AIX boot sequence that
occur when IPAT is configured in a cluster.
Uempty
/etc/rc /usr/sbin/cluster/etc/harc.net
mount all /etc/rc.net -boot
cfgif
/etc/rc.tcpip
daemons start < Cluster Services startup > clstrmgr
event node_up
/etc/rc.nfs node_up_local
daemons start get_disk_vg_fs
exportfs acquire_service_addr
telinit -a
/etc/rc.tcpip
daemons start
/etc/rc.nfs
daemons start
IPAT changes the init
exportfs
sequence
Notes:
/etc/inittab changes
A node with a network configured for IPAT must not start inetd until HACMP has had a
chance to assign the appropriate IP addresses to the node’s interfaces. Consequently,
the AIX start sequence is modified slightly if a node has a resource group that uses
either form of IPAT.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-123
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Examine the changes to the AIX boot sequence that result when IPAT is
configured.
Details —
Additional information —
Transition statement — Let’s take a closer look at the inittab.
Uempty
Changes to /etc/inittab
init:2:initdefault:
brc::sysinit:/sbin/rc.boot 3 >/dev/console 2>&1 # Phase 3 of system boot
. . .
srcmstr:23456789:respawn:/usr/sbin/srcmstr # System Resource Controller
harc:2:wait:/usr/es/sbin/cluster/etc/harc.net # HACMP for AIX network startup
rctcpip:a:wait:/etc/rc.tcpip > /dev/console 2>&1 # Start TCP/IP daemons
rcnfs:a:wait:/etc/rc.nfs > /dev/console 2>&1 # Start NFS Daemons
. . .
qdaemon:a:wait:/usr/bin/startsrc -sqdaemon
writesrv:a:wait:/usr/bin/startsrc -swritesrv
. . .
ctrmc:2:once:/usr/bin/startsrc -s ctrmc > /dev/console 2>&1
ha_star:h2:once:/etc/rc.ha_star >/dev/console 2>&1
dt:2:wait:/etc/rc.dt
cons:0123456789:respawn:/usr/sbin/getty /dev/console
xfs:0123456789:once:/usr/lpp/X11/bin/xfs
hacmp:2:once:/usr/es/sbin/cluster/etc/rc.init >/dev/console 2>&1
clinit:a:wait:/bin/touch /usr/es/sbin/cluster/.telinit # HACMP for AIX These must be the last
entries of run level a in inittab!
pst_clinit:a:wait:/bin/echo Created /usr/es/sbin/cluster/.telinit > /dev/console # HACMP for
AIX These must be the last entries of run level a in inittab!
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-125
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the changes that occur in the /etc/inittab file when IPAT is implemented.
Details —
Additional information —
Transition statement — Let’s take a look at some common HACMP network configuration
problems with HACMP.
Uempty
Notes:
Configuration problems
The visual shows some common IP configuration errors to watch out for.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-127
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — List some common networking configuration errors.
Details —
Additional information —
Transition statement — Let’s see how we’ve done.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-129
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Review.
Details —
Additional information — 5b is not correct because you would need two “standby
adapters” and you only have two adapters.
Transition statement — Next let’s look at what happens after IPAT from the client’s point
of view.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-131
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Topic 4 objectives
This section looks at the impact of IPAT on client systems.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-133
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Uempty or so seconds when moving an IP address within a node or it can take a few minutes or
more in the case of a fallover.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-135
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain what the user is likely to see when something fails.
Details —
Additional information —
Transition statement — Let’s take a look at one more issue that might affect some client
systems.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-137
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show how an ARP cache entry might become out-of-date.
Details — Point out that if the client system’s ARP entry for 192.168.5.1 after the IP
address move is 00.04.ac.62.72.49, then it won’t be able to communicate with the server.
On the other hand, if it is 00.04.ac.48.22.f4, then everything will be just fine.
Additional information —
Transition statement — Before we get too excited about this ARP cache issue, it is
important to understand that not all client systems are likely to be in a position to be
affected by the issue.
Uempty
192.168.8.3 192.168.8.3
00:04:ac:27:18:09 00:04:ac:27:18:09
ARP: ARP:
xweb (192.168.5.1) 00:04:ac:62:72:49 192.168.8.1 xweb (192.168.5.1) ??? 192.168.8.1
client (192.168.8.3) 00:04:ac:27:18:09 00:04:ac:42:9c:e2 client (192.168.8.3) 00:04:ac:27:18:09 00:04:ac:42:9c:e2
192.168.5.99 192.168.8.99
00:04:ac:29:31:37 00:04:ac:29:31:37
xweb 192.168.5.1 (alias) 192.168.5.1 (alias) xweb
192.168.10.1 (ODM) 192.168.11.1 (ODM) 192.168.10.1 (ODM) 192.168.11.1 (ODM)
00:04:ac:62:72:49 00:04:ac:48:22:f4 00:04:ac:62:72:49 00:04:ac:48:22:f4
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-139
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain that only local systems’ (and routers’) ARP cache entries are relevant.
Details —
Additional information —
Transition statement — Now let’s look at an AIX feature that generally causes the ARP
cache issue to become a non-issue.
Uempty
Gratuitous ARP
Ɣ AIX supports a feature called gratuitous ARP.
– AIX sends out a gratuitous (that is, unrequested) ARP update whenever an IP address is
set or changed on a NIC.
Ɣ Other systems on the local physical network are expected to
update their ARP caches when they receive the gratuitous ARP
packet.
Ɣ Remember: Only systems on the cluster's local physical network
must respect the gratuitous ARP packet.
Ɣ So ARP update problems have been minimized.
Ɣ Gratuitous ARP is required if using IPAT via aliasing.
Notes:
Gratuitous ARP
AIX supports a feature called gratuitous ARP. Whenever an IP address associated with
a NIC changes, AIX broadcasts out a gratuitous (in other words, unsolicited) ARP
update. This gratuitous ARP packet is generally received and used by all systems on
the cluster’s local physical network to update their ARP cache entries.
The result is that all relevant ARP caches are updated almost immediately after the IP
address is assigned to the NIC.
The problem is that not all systems respond or even necessarily receive these
gratuitous ARP cache update packets. If a local system either does not receive or
ignores the gratuitous ARP cache packet then its ARP cache remains out-of-date.
Note that unless the network is very overloaded, local systems generally either always
or never act upon the gratuitous ARP update packet.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-141
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain how gratuitous ARP can make the ARP cache issue go away.
Details —
Additional information —
Transition statement — Let’s take a look at gratuitous ARP support issues.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-143
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Discuss the key gratuitous ARP support issues.
Details —
Additional information —
Transition statement — What if gratuitous ARP is not supported?
Uempty
Ɣ Suggestion:
Do not get involved with using either clinfo or HWAT to deal with
ARP cache issues until you have verified that there actually are
ARP issues that need to be dealt with.
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-145
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Present the list of alternative ways of dealing with the ARP cache issue.
Details — Present these as alternatives to HWAT and gratuitous ARP configurations in the
event a student (or a few) find themselves in a situation where they can’t do one or the
other. This should be presented as reference material but not stressed as something that
will be required configuration activity in most clusters.
Additional information —
Transition statement — Let’s look at the first option.
Uempty
snmpd
clinfo
clstrmgr clinfo.rc
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-147
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Present the clinfo on the client option for dealing with the ARP cache issue.
Details — Go through the SNMP hops shown on the diagram to illustrate how HACMP
integrates with SNMP and how clinfo “gets the news of the cluster event.”
Additional information —
Transition statement — Let’s look at the second option.
Uempty
clinfo.rc
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-149
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Present the clinfo in the cluster option for dealing with the ARP cache issue.
Details —
Additional information —
Transition statement — Let’s have a look at the key part of the clinfo.rc script.
Uempty
TOTAL_CLIENT_LIST="${PING_CLIENT_LIST}"
if [[ -s /etc/cluster/ping_client_list ]] ; then
#
# The file "/etc/ping_client_list" should contain only a line
# setting the variable "PING_CLIENT_LIST" in the form given
# in the example above. This allows the client list to be
# kept in a file that is not altered when maintenance is
# applied to clinfo.rc.
#
. /etc/cluster/ping_client_list
TOTAL_CLIENT_LIST="${TOTAL_CLIENT_LIST} ${PING_CLIENT_LIST}"
fi
#
# WARNING!!! For this shell script to work properly, ALL entries in
# the TOTAL_CLIENT_LIST must resolve properly to IP addresses or hostnames
# (must be found in /etc/hosts, DNS, or NIS). This is crucial.
. . .
Notes:
clinfo.rc
The clinfo.rc script must be edited manually on the cluster nodes that run clinfo.
There is no reason why clinfo cannot also be run on the client systems; although,
these changes are only required on the cluster nodes that are running clinfo.rc.
Remember: All the cluster nodes should be running clinfo if clinfo is being used
within the cluster, to deal with ARP cache issues (because you never know which
cluster nodes will survive whatever has gone wrong).
Edit the /usr/es/sbin/cluster/etc/clinfo.rc file on each server node. Add the IP
label or IP address of each system that accesses service IP addresses managed by
HACMP to the PING_CLIENT_LIST list. Then start the clinfo daemon (clinfo can be
started as part of starting Cluster Services on the cluster nodes).
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-151
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
/etc/cluster/ping_client_list
You can also provide the list of clients to be pinged in the file
/etc/cluster/ping_client_list. This is probably the best method as it ensures that the
list of clients to ping is not overlaid by future changes to clinfo.rc.
More details
This script is invoked by HACMP as follows:
clinfo.rc {join,fail,swap} interface_name
The next set of details likely do not make sense until we are further into the course.
When clinfo is notified that the cluster is stable after undergoing a failure recovery of
some sort or when clinfo first connects to clsmuxpd (the SNMP part of HACMP), it
receives a new map (description of the cluster’s state). It checks for changed states of
interfaces:
- If a new state is UP, clinfo calls clinfo.rc join interface_name.
- If a new state is DOWN, clinfo calls clinfo.rc fail interface_name.
- If clinfo receives a node_down_complete event, it calls clinfo.rc with the fail
parameter for each interface currently UP.
- If clinfo receives a fail_network_complete event, it calls clinfo.rc with the
fail parameter for all associated interfaces.
- If clinfo receives a swap_complete event, it calls clinfo.rc swap
interface_name.
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-153
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-155
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce HWAT.
Details — Details are in Appendix C.
Additional information —
Transition statement — Let’s review.
Uempty
Checkpoint
1. True or False?
Clients are required to exit and restart their application after a
fallover.
2. True or False?
All client systems are potentially directly affected by the ARP cache
issue.
3. True or False?
clinfo must not be run both on the cluster nodes and on the
client systems.
4. If clinfo is run by cluster nodes to address ARP cache
issues, you must add the list of clients to ping to either the
__________________________ or the
__________________________ file.
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-157
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Review.
Details —
Checkpoint solutions
1. True or False?
Clients are required to exit and restart their application after a
fallover.
2. True or False?
All client systems are potentially directly affected by the ARP cache
issue.
3. True or False?
clinfo must not be run both on the cluster nodes and on the
client systems.
4. If clinfo is run by cluster nodes to address ARP cache
issues, you must add the list of clients to ping to either the
/etc/cluster/ping_client_list or the
/usr/es/sbin/cluster/etc/clinfo.rc file.
Additional information —
Transition statement — Let’s summarize.
Uempty
Unit summary (1 of 2)
Key points from this unit:
Ɣ HACMP uses networks to:
– Provide highly available client access to applications in the cluster
– Detect and diagnose NIC, node, and network failures using RSCT heartbeats
– Communicate with HACMP daemons on other nodes
Ɣ All HACMP clusters require a non-IP network
– Differentiate between node, IP subsystem and network failures
– Prevent cluster partitioning
Ɣ HACMP networking terminology
– Service IP label/address: HA address used by client to access application
– Non-service IP label/address: Applied to NIC at boot time; stored in AIX ODM
– Persistent IP label/address: Node bound HA address for admin access to a node
– Communication interface: Association between a NIC and an IP label/address
– Communication device: Device used in non-IP network
– Communication adapter: X.25 adapter used in a HA communication link
– IP Address Takeover (IPAT): Moves service IP address to working NIC after a failure
• IPAT via aliasing: Adds the service address to a NIC using IP aliasing
• IPAT via replacement: Replaces the non-service address with the service address
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-159
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Summarize the most important topics that have been discussed in this unit.
Details —
Additional information —
Transition statement — More summary.
Uempty
Unit summary (2 of 2)
Key points from this unit (continued):
Ɣ HACMP has very specific requirements for subnets.
– IPAT via aliasing
• NICs on a node must be on different subnets, which must use the same subnet
mask.
• There must be at least one subnet in common with all nodes.
• Service addresses must be on different subnet than any non-service address.
• A service address can be on same subnet with another service address.
– IPAT via replacement
• NICs on a node must be on different subnets; which must use the same subnet
mask.
• Each service address must be in same subnet as one of the non-service addresses
on the highest priority node.
• Multiple service addresses must be in the same subnet.
– Heartbeating over IP alias (any form of IPAT)
• Service and non-service addresses can coexist on the same subnet, or be on
separate subnets.
• One subnet required for heartbeating; does not need to be routed.
Ɣ HACMP can update local clients’ ARP cache after IPAT.
– Gratuitous ARP (default)
– clinfo on clients
– clinfo on server nodes
– Hardware address takeover (HWAT)
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 2. Networking considerations for high availability 2-161
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — More summary
Details —
Additional information —
Transition statement — We are finished with this unit.
Estimated time
02:00
References
SC23-5209-01 HACMP for AIX, Version 5.4.1: Installation Guide
SC23-4864-10 HACMP for AIX, Version 5.4.1:
Concepts and Facilities Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1: Planning Guide
SC23-4862-10 HACMP for AIX, Version 5.4.1: Administration Guide
SC23-5177-04 HACMP for AIX, Version 5.4.1: Troubleshooting Guide
SC23-4867-09 HACMP for AIX, Version 5.4.1: Master Glossary
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
http://www-03.ibm.com/servers/storage
http://www.redbooks.ibm.com
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit objectives
After completing this unit, you should be able to:
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
SCSI
disks
Node Virtual Node
1 SCSI 2
disks
SAN via
storage VIO Server
rootvg
rootvg rootvg
rootvg
Notes:
Uempty be checked for compatibility with HACMP at the level you intend to implement, both AIX
and HACMP levels.
Non-concurrent access
In a non-concurrent access environment, the disks are owned by only one node at a
time. If the owning node fails, the cluster node with the next highest priority in the
resource group node list acquires ownership of the shared disks as part of fallover
processing. This ensures that the data stored on the disks remains accessible to client
applications.
In a non-concurrent access environment, a highly available application potentially runs
on only one node for extended periods of time. Only one disk connection is active at a
time and the shared storage is not shared in any real time sense. Rather, it is storage
that can be associated automatically (without human intervention) with the node where
the application is currently running. Non-concurrent access mode is sometimes called
serial access mode, because only one node has access to the shared storage at a time.
We will focus on non-concurrent shared storage in this unit.
Concurrent access
In concurrent access environments, the shared disks are activated on more than one
node simultaneously. Therefore, when a node fails, disk takeover is not required. In this
case, access to the shared storage must be controlled by some locking mechanism in
the application.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain what shared storage is.
Details —
Additional information —
Transition statement — And then there’s private storage.
Uempty
SCSI
disks
Node Virtual Node
1 SCSI 2
disks
SAN via
storage VIO Server
rootvg
rootvg rootvg
rootvg
Notes:
Private storage
Private storage is, of course, accessible to only a single cluster node. It might be
physically located within each system’s box or externally in a rack or even in an external
storage subsystem. The key point is that private storage is not physically accessible
from more than one cluster node.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain what private storage is.
Details —
Additional information — We will discuss how to decide which data should be in shared
storage and which should be in private storage in the Planning for applications and
resource groups unit.
Transition statement — We must carefully control how the nodes access the shared
storage so that corruption does not occur.
Uempty
Notes:
Why?
The shared storage is physically connected to each node that the application might run
on. In a non-concurrent access environment, the application actually runs on only one
node at a time and modification or even access to the data from any other node during
this time could be catastrophic (the data could be corrupted in ways which take days or
even weeks to notice).
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain why access to shared storage must be controlled.
Details — Point out that concurrent access applications also require controlled or at least
coordinated access to the shared data but that this is the application’s responsibility.
Additional information —
Transition statement — Let’s look at how access to the shared storage is controlled in the
typical situation where only one node at a time needs access to the shared storage for
extended periods of time.
Uempty
Node A B Node
1 2
ODM ODM
ODM ODM
C D
Notes:
Introduction
There are two mechanisms to control ownership of shared storage. Although these two
mechanisms do not seem to have formal names, in this unit, we refer to them as the:
- Reserve/release-based shared storage protection mechanism and the
- RSCT-based shared storage protection mechanism
We use the term protection rather than access control both because it is a bit shorter
and because it reminds us that the purpose of the mechanism is to protect the shared
storage.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Reserve/release-based protection
varyonvg C D
Notes:
Disk reservation
Reserve/release-based shared storage protection relies on the disk technology
supporting a mechanism called disk reservation. Disks which support this mechanism
can be, in effect, told to refuse to accept almost all commands from any node other than
the one which issued the reservation. AIX’s LVM automatically issues a reservation
request for each disk in a volume group when the volume group is varied online by the
varyonvg command. The varyonvg command fails for any disks that are currently
reserved by other nodes. If it fails for enough disks, that it almost certainly does since if
one disk is reserved by another node, the others presumably are also, then the varyon
of the volume group fails.
Uempty must be some mechanism to ensure that any meta-data VGDA changes made to the
volume group on the active node will be updated in the ODM on the inactive nodes in
the cluster. For example, if you change the size of a logical volume on the active node,
the other nodes’ ODMs will still list the logical volume at the original size. When an
inactive node is made active and if the volume group were varied on without updating
the ODM, the information in the ODM on the node and the VGDA on the disks would
disagree. This will cause problems.
When using reserve/release-based shared storage protection, HACMP provides a
last-chance mechanism called lazy update to update the ODM on the takeover node at
the time of fallover. This is meant to be a final attempt at synchronizing the VGDA
content with a takeover node’s ODM at fallover time. For obvious reasons (like the fact
that it can’t overcome some VGDA/ODM mismatches) relying on lazy update should be
avoided.
Lazy update
Lazy update works by using the volume group timestamp in the ODM. When HACMP
needs to varyon a volume group, it compares the ODM timestamp to the timestamp in
the VGDA. If the timestamps disagree, lazy update does an exportvg/importvg to
recreate the ODM on the node. If the timestamps agree, no extra steps are required.
It is, of course, possible to update the ODM on inactive nodes when the change to the
VGDA meta-data is made. In this way, extra time at fallover is avoided. The ODM can
be updated manually or you can use Cluster Single Point of Control (C-SPOC), which
can automate this task. Lazy update and the various options for updating ODM
information on inactive nodes are discussed in detail in a later unit in this course.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce reserve/release-based shared storage protection.
Details — You might be asked “What if enough of the disks are not reserved to be able to
get the volume group online?” Try to delay this issue for a few visuals as it gets dealt with
shortly.
Additional information —
Transition statement — Let’s see how a volume group is handed off as part of moving a
resource group from a node that is still operational.
Uempty
dbvg
C D
varyonvg
Node A B Node
1 2
ODM
ODM ODM
ODM
Node2:
varyoffvg httpvg
dbvg C D
varyonvg
Notes:
Manual takeover
With reserve/release-based shared storage protection, HACMP passes volume groups
between nodes by issuing a varyoffvg command on one node and a varyonvg
command on the other node. The coordination of these commands (ensuring that the
varyoffvg is performed before the varyonvg) is the responsibility of HACMP.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Illustrate how a volume group is moved manually.
Details —
Additional information —
Transition statement — Now let’s see what happens if the other node has failed.
Uempty
Node Node
A B varyonvg
1 2
ODM
ODM ODM
ODM
varyonvg C D
Node A B Node
varyonvg
1 2
ODM ODM
ODM
varyonvg C D
Notes:
Implications
Note that if the right node had not really failed then it would lose its reserves on the
shared disks (rather abruptly) when the left node varied them on. This will be seen in
the left node’s error log and should be acted on immediately, because this indicates you
are in a situation where both nodes can access and update the data on the disks (each
believing that it is the only node accessing and updating the data). An failure takeover
isn’t possible unless all paths used by HACMP to communicate between the two nodes
have been severed.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Uempty find enough of the volume group’s physical volumes (and other factors such as whether
quorum checking is enabled on the volume group).
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain ghost disks.
Details —
Additional information —
Transition statement — Let’s now look at the other protection mechanism, RSCT based
storage protection.
Uempty
Node Node
1 passive varyon A B active varyon 2
ODM
ODM ODM
Notes:
Introduction
HACMP 5.x supports the new style of shared storage protection, which relies on AIX’s
RSCT component to coordinate the ownership of shared storage when using enhanced
concurrent volume groups in non-concurrent mode.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
the active state). The LVM on each node prohibits updates to the volume group’s data
unless the node has the volume group varied on in the active state.
It is the responsibility of the RSCT component to ensure that each volume group is
varied online in the active state on not more than one node. Since this mechanism does
not rely on any disk reservation mechanism, it is compatible with all disk technologies
supported by HACMP.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Introduction
Defining an enhanced concurrent volume group allows the LVM to use RSCT to
manage varyonvg and varyoffvg processing.
Concurrent access
In a concurrent access environment, all the nodes will varyon the volume group.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Provide some details on the enhanced concurrent volume groups that came
up earlier in the fast disk takeover discussion.
Details —
Additional information —
Transition statement — So, what are active and passive modes all about?
Uempty
Notes:
Active varyon
If using enhanced concurrent volume groups in a non-concurrent access environment,
only one node will varyon the VG in active mode, allowing full access.
Passive varyon
Other nodes will varyon the VG in passive mode. In passive mode, only very limited
operations are allowed on the volume group. They are:
- Reading volume group configuration information (for example, lsvg)
- Reading logical volume configuration information (for example, lslv)
Most operations are prohibited. They are”
- Any operations on filesystems and logical volumes (for example, mounts, open,
create, modify, delete, and so forth)
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Ɣ On passive node:
toronto # lsvg ecmvg
VOLUME GROUP: ecmvg VG IDENTIFIER: 0009314700004c00000000f
e2eaa2d6d
VG STATE: active PP SIZE: 8 MB
VG PERMISSION: passive-only TOTAL PPs: 537 (4296 MB)
... ... ...
Concurrent: Enhanced-Capable Auto-Concurrent: Disabled
Notes:
Introduction
The VG PERMISSION field in the output of lsvg shows if a volume group is varied on in
active or passive mode.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Although the details of the processing of enhanced concurrent mode volume groups are
largely beyond the scope of this class, it is very useful to understand the basics. The Group
Services component of RSCT is used to control the ownership of the volume group, thus
the name we’re using, RSCT-based.
Group Services
Group Services is a component that allows nodes to participate in groups to control
resources of common interest where each node has a vote in how the resource is
controlled. HACMP belongs to two Group Services groups for the control of the cluster
related resources amongst all the nodes in the cluster (but that’s another story for another
class, AU600 - HACMP Internals). When a node would like to effect a change on a
resource, it proposes that change to the group via a protocol (communications with the
other Group Services daemons). The Group Services daemon for HACMP is grpsvcs.
gsclvmd
Uempty The daemon that controls this group membership is gsclvmd. It is important to understand
that this daemon depends on the Group Services being active and that Group Services is
activated when Cluster Services is started. That should reinforce the point that ECMVGs
are to be used with HACMP only!
Voting on LVM changes and changing the ODM
All members (loosely) have a vote. If all approve, the change is made, to include all that the
code written for that change involves. In the case of ECMVGs, that is a change to the
VGDA / VGSA that results in changes made to each participating node’s ODM.
So, it should be rather obvious that a missing member will be lost to the changes that have
occurred during its absence. For this reason, great care must be taken to ensure that
either, all changes are made with all members present, or any changes made with missing
members are propagated to the missing members very soon after their reactivation.
Warning
Filesystem changes are not handled by this process. This is where C-SPOC is necessary.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce the basic workings of Enhanced concurrent mode volume groups.
Details —
Additional information —
Transition statement — But how can I see what’s going on with the processing of
ECMVGs?
Uempty
Notes:
Now that you have an idea how EMCVGs work, you need to know how to see what’s going
on.
Start simple; look at processes
Looking for the VGID of each volume group that is “suspected” to be an ECMVG in the
process table is a good start. Verify that there is a running gsclvmd daemon for each VGID.
If not, you made a mistake somewhere.
Look at the gsclvmd daemon
Using lssrc -ls gsclvmd you can also see the VGID and associated gslcmvd. This would
be much more interesting in the case where many ECMVGs were defined.
The Group Services daemon provides some information as well
As shown in the visual, the lssrc -ls grpsvcs command gives details on this node’s
groups, including, but certainly not limited to the ECMVG groups. Note the two groups, one
for VGSA changes and one for VGDA changes.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the methods that can be used to get status on the underlying processes
that support ECMVGs.
Details —
Additional information —
Transition statement — Let’s take a closer look how manual changes in ownership are
accomplished when using the RSCT-based storage protection mechanism.
Uempty
ODM ODM
1. A decision is made to
active
varyon C D
passive
varyon
move httpvg from the
dbvg
right node to the left.
Node passive httpvg passive Node
A B
1 varyon varyon 2
ODM ODM
3. Left node obtains active
active
C D
passive varyon of httpvg
varyon varyon
dbvg
(varyonvg).
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Illustrate how a voluntary takeover of a volume group is done using Fast Disk
Takeover.
Details —
Additional information —
Transition statement — Now let’s see what happens when the takeover is involuntary.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Illustrate how disk takeover as a result of failure occurs when Fast Disk
Takeover is in effect.
Details — Try to not get too bogged down on the question of how to ensure that a node
has actually failed if other nodes believe that it has failed as this topic is revisited in the
networking unit and in the problem determination unit.
Additional information —
Transition statement — So how do you use fast disk takeover?
Uempty
Notes:
Considerations
As with any technology, the implications of using fast disk takeover must be properly
understood if the full benefits are to be experienced.
Note: If RSCT is not running, it is possible (although it takes some work) to manually
varyon an enhanced concurrent volume group to active mode, while it is varied on in active
mode on another node. Although this is possible, it is an unlikely occurrence. This small
risk can easily be avoided by never varying on your shared volume groups manually.
Requirements
Fast disk takeover is used only if all of the requirements listed previously have been
met.
Because RSCT is independent of disk technology, all disks supported by HACMP can
be used in an enhanced concurrent mode volume group.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — List the requirements for fast disk takeover.
Details — This is the point where you should deal with concerns about whether fast disk
takeover is appropriate in a cluster. Remind students that some disk technologies do not
support disk reservation; so the only way to protect shared storage on these disk
technologies is to use RSCT-based shared storage protection (that is, fast disk takeover).
Also point out that Fast Disk Takeover is volume group-specific, meaning that if a Resource
Group contains volume groups that are both enhanced concurrent mode and
non-enhanced concurrent mode, Fast Disk Takeover will apply only to those that are
enhanced concurrent mode.
Additional information —
Transition statement — It’s review time.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Review topic 1.
Details —
Additional information —
Transition statement — In the next topic, we’ll discuss some of the disk technologies
available for shared storage in an HACMP environment.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Compatibility
• Flashes can be found at
http://www-03.ibm.com/support/techdocs/atsmastr.nsf/Web/Flashes
• Hints, Tips, and Technotes can be found at
http://www-03.ibm.com/support/techdocs/atsmastr.nsf/Web/Technotes
• HACMP Release Notes
Shipped with the product
Redundancy
Your goal is to eliminate single points of failure. When considering this for storage, it
involves defining more than one disk drive for every piece of data on the storage
subsystem and multiple paths to get to the data from the server. This is referred to as
Uempty data redundancy. HACMP does not provide data redundancy. In all likelihood, you will
be choosing a storage subsystem to provide the data redundancy. You might choose a
JBOD (Just a Bunch Of Disks) storage device, in which case you will have to provide
the redundancy in AIX. Multiple paths to get to the data from the server is accomplished
through multi-pathing software. That software must be checked for compatibility with
HACMP.
HACMP is oblivious to the storage device and redundancy method chosen. Although
not in the scope of this class, the selected storage subsystem will be affected by the
factors listed as follows (among others). The selected storage subsystem will then
determine what you will look for in terms of compatibility with the chosen HACMP
version and features.
- Data access performance requirements
- Capacity
- Support for multi-pathing
- Price
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Set the groundwork for the discussions that will follow regarding storage.
Details — Ensure that the students understand that HACMP doesn’t provide data
redundancy. The selected storage subsystem will probably do that. The selected storage
subsystem will dictate the compatibility requirements and who to contact and where to look
to determine the compatibility requirements. All roads lead to doing your homework through
Flashes, IBM and vendor support, HACMP Release notes.
Additional information —
Transition statement — Now let’s look at virtualized storage on the Power5 and Power6.
Uempty
Hypervisor
no_reserve
vscsi0
HBA
VIOS 2
vscsi1
MPIO hdisk0 } sharedvg
MPIO hdisk0 vhost0
HBA
hdisk0
Stg FRAME 1
Dev VIOS 1
HBA
MPIO hdisk0 vhost0 HACMP Node2
HBA
Hypervisor
no_reserve
vscsi0
HBA
VIOS 2
vscsi1
MPIO hdisk0 } sharedvg
MPIO hdisk0 vhost0
HBA
Notes:
Overview
This type of configuration is becoming prevalent with the adoption of the Virtualization
capabilities of the POWER5 and later architecture. A full discussion of the
implementation of this configuration is beyond the scope of the class. The intent is to
indicate that this is a supported configuration, some of the terms to learn, requirements,
and a configuration overview. Consult the IBM Sales Manual and IBM Support (and
anyone else you can find who will talk to you about this from an experienced standpoint)
for the latest requirements and considerations.
Legend
Stg Dev - Storage Subsystem providing access to disks, like a DS8300, DS4000, EMC,
HDS, SSA, and so on.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
VIOS - Virtual I/O Server, the special LPAR on a Power5/6 systems that provides
virtualized storage (and networking) devices for use by client LPARs
HBA - Host Bus Adapter, also known as Fibre Channel Adapter, this is the connection
to the SAN, giving the VIOS access to storage in the SAN (LUNs).
MPIO - Multipath I/O, built into AIX since V5.1, creates path devices for each instance of
a disk/LUN that is recognized by AIX, presenting only a single hdisk device from these
multiple paths.
vhost0 - Virtual SCSI (server) adapter on the Virtual IO Server that provides the client
LPARs with access to virtual SCSI disks.
vscsi0 - Virtual SCSI (client) adapter on the client LPAR that provides the client access
to the VIOS’s Virtual SCSI (server) adapter and therefore access to the virtual SCSI
disks.
Hypervisor - The Power5/6 component that manages access between the vhost and
vscsi adapters.
Minimum requirements
As of the writing of this version of the course, the minimum requirements for HACMP
with Virtual SCSI (VSCSI) and Virtual LAN (VLAN) on POWER5/6 models were:
HACMP supports the IBM VIO Server V1.4
August 10, 2007
IBM* High Availability Cluster Multiprocessing (HACMP*) for AIX 5L*, Versions 5.2, 5.3,
and 5.4 extends support to include IBM Virtual I/O Server (VIO Server) Version 1.4
virtual SCSI and virtual Ethernet devices on all HACMP supported IBM POWER5* and
POWER6* servers along with IBM BladeCenter JS21. This includes HACMP nodes
running in LPARs on supported IBM System i5* processors.
HACMP supports the IBM VIO Server Versions 1.2 and 1.3
March 8, 2007
IBM* High Availability Cluster Multiprocessing (HACMP*) for AIX 5L*, Version 5.2, V5.3,
and V5.4 extends support to include IBM Virtual I/O Server (VIO Server) Version 1.2
and 1.3 on all HACMP supported IBM POWER5* servers. This includes HACMP nodes
running in LPARs on supported IBM System* i5 processors.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Uempty • If the VIO Server has only a single physical interface on a network, then a failure of that
physical interface will be detected by HACMP. However, that failure will isolate the node
from the network.
Although some of these might be viewed as configuration restrictions, many are direct
consequences of I/O Virtualization.
Service can be obtained from the IBM Electronic Fix Distribution site at:
http://www-03.ibm.com/servers/eserver/support/unixservers/aixfixes.html
All the details on requirements and specifications are in this Flash:
http://www-03.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/FLASH10390
Configuration overview
Configuration is mostly performed on the VIOS and Hardware Management Console.
The use of MPIO at the AIX level is also essential to ensuring data availability if access
to a VIOS is lost. Ensure that you reactivate any path in MPIO that was lost after it is
recovered to avoid total loss of access to data on a subsequent path failure. The
HACMP consideration, in addition to the correct software levels as outlined previously is
that enhanced concurrent volume groups are used in this configuration. Otherwise, this
is just another volume group to be managed in a resource group, to the cluster
manager.
On Storage device
Map LUNs to the two corresponding VIO servers
On Hardware Management Console
Define Mappings – (vhost & vscsi)
On VIO Server 1
Set “no_reserve” attribute
$ chdev -dev <hdisk#> -attr reserve_policy=no_reserve
Export the LUNs out to each client
$ mkvdev –vdev hdisk# -vadapter vhost0
On VIO Server 2
Set “no_reserve” attribute
$ chdev -dev <hdisk#> -attr reserve_policy=no_reserve
Export the LUNs out to each client
$ mkvdev –vdev hdisk# -vadapter vhost0
On Clients
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
- Configure the MPIO Default PCM to conduct health checks down all paths and
recover when a path is restored. This requires a reboot to take affect.
# chdev -l <hdisk#> -a hcheck_interval=20 -a hcheck_mode=nonactive
-P
- Create the shared volume group as Enhanced Concurrent VG on first Client
(bos.clvm.enh required).
- Varyoffvg on Client 1.
- Import VG onto Client 2.
- Define to HACMP as a shared resource in a resource group.
References
Courses that address this configuration:
- AU620, HACMP System Administration III: Virtualization and Disaster Recovery
- AU730, System p LPAR and Virtualization I: Planning and Configuration
- AU780, System p LPAR and Virtualization II: Implementing Advanced
Configurations
Redbooks (www.redbooks.ibm.com):
- REDP-4027-00: HACMP 5.3, Dynamic LPAR and Virtualization
• Provides details later in the document on HACMP and Virtualization along with
failure scenarios in the VIO infrastructure and performance considerations
- SG24-7940-02: Advanced POWER Virtualization on IBM System p5 Servers:
Introduction and Configuration - Chapter 4
- REDP-4194: IBM System p Advanced POWER Virtualization Best Practices
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Overview
Use the pointers already provided to access IBM Flashes to determine if the IBM
hardware that you’ve chosen is supported with HACMP and the HACMP requirements.
Also read the Release Notes provided with the HACMP product for the latest
information on requirements.
SDD
With most IBM SAN Storage devices, the multi-pathing software will be the Subsystem
Device Driver (SDD). It is supported with HACMP (with appropriate PTFs).
To use C-SPOC with VPATH disks, SDD 1.3.1.3, or later, is required.
For levels and maintenance, check:
http://www-1.ibm.com/support/docview.wss?rs=540&context=ST52G7&uid=ssg1S
4000065&loc=en_US&cs=utf-8&lang=en
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Ɣ As explained in the Student Notes below, IBM does not provide the
requirements for HACMP compatibility with non-IBM storage.
– Contact the support organization or online reference materials for the vendor of the non-
IBM storage.
– Contact IBM support.
Notes:
Uempty accommodate device specific behaviors and operations that might not be automatically
supported by HACMP. If a client has an HACMP cluster containing storage hardware
other than that supported by HACMP, and they report a problem, IBM Service will
address the problem as follows:
If the problem is unrelated to that hardware, it will be addressed the same as any other
problem.
If the problem is related to that hardware, and the hardware is covered by a cooperative
service agreement with the storage vendor, the problem will be forwarded to the storage
vendor.
If the problem is related to hardware for which no cooperative service agreement is in
place, the client will be asked to refer the problem to the hardware manufacturer.
Determining compatibility
When contacting both IBM and non-IBM sources for information, indicate your intent to
configure the non-IBM storage device with HACMP and request driver, patch,
multi-pathing software and microcode requirements, and experiences with this
combination.
Also read the Release Notes provided with the HACMP product for the latest
information on requirements.
EMC
When using the EMC URL listed above to gather EMC information, here is the path to
take to find the HACMP compatibility information.
- Navigate to
http://www.emc.com/interoperability/matrices/EMCSupportMatrix.pdf
- Search for HACMP.
- You will get many hits; look in the sections that apply to your storage devices.
- Then look for the HACMP version that you are installing.
- Finally, look for the device driver, PowerPath, and AIX patch information for your
configuration.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Outline strategy to use to determine what is necessary to integrate non-IBM
SAN storage devices with HACMP.
Details — Indicate that this is a customer responsibility but that contacting IBM support is
useful. Also indicate that the multi-pathing software version might be different when in an
HACMP environment than normally used.
Additional information —
Transition statement — For those who aren’t using SAN storage, let’s take a look at SCSI
considerations with HACMP.
Uempty
Maximum 25m
Host Host
System System
T T SCSI
SCSI
Controller
5 6 Controller
SCSI 4 SCSI 3 SCSI 2 SCSI 1
Module Module Module Module
Notes:
SCSI termination
In HACMP environments, SCSI terminators must be external so that the bus is still
terminated after a failed system unit has been removed.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Uempty There are devices that can be inserted into the middle of SCSI buses, which claim to
allow the bus to be severed at the point of insertion. Unless you can get IBM to
specifically state that they support such a device, then you should not use it.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain the key SCSI technology issues related to HACMP.
Details — Mention that the most likely IBM storage device that will be connected using
SCSI is the 2104 Expandable Storage Plus. The graphic in the visual shows a common
connection method for a SCSI device.
If students argue that SCSI cables are hot swappable, then ask them whether they are
willing to risk their cluster’s data on that basis.
Additional information —
Transition statement — Now let’s look at Physical Volume Identifiers (PVIDs).
Uempty
# lspv
hdisk0 000206238a9e74d7 rootvg
hdisk1 00020624ef3fafcc None
hdisk2 00206983880a1580 None
hdisk3 00206983880a1ed7 None
hdisk4 00206983880a31a7 None
Node 1
A B
ODM
C D
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
disks (LUN) that are in the volume group must be defined to each system with common
PVIDs.
Using the previous command on each system to determine which systems see which
PVIDs and the volume group affinity is the first step to ensuring that all systems that will
share a volume group have the necessary disks (LUNs) defined. The example shows
that the system sees four disks (LUNs) that have PVIDs assigned, but none of them are
in a volume group yet. The next logical step would be to check the other systems for
common PVIDs. All PVIDs that are found in common would be the PVIDs (and
therefore hdisks) that could be used to create shared volume groups. C-SPOC uses
this method to list the PVIDs that can be used to create a cluster-wide shared volume
group. If C-SPOC finds no common PVIDs across the selected systems for a shared
volume group, no PVIDs are listed. Knowing the PVID-to-hdisk relationship on all the
cluster nodes is therefore very important when creating a shared volume group. This is
true whether using C-SPOC or not.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Introduction
HACMP enables you to use either physical storage disks manufactured by IBM or by an
Original Equipment Manufacturer (OEM) as part of a highly available infrastructure.
Depending on the type of OEM disk, custom methods enable you (or an OEM disk
vendor) to either:
- Tell HACMP that an unknown disk should be treated the same way as a known and
supported disk type, or
- Specify the custom methods that provide the low-level disk processing functions
supported by HACMP for that particular disk type
Uempty following three files can be edited to perform this configuration. (There is no SMIT menu
to edit these files.)
• /etc/cluster/disktype.lst
This file is referenced by HACMP during disk takeover.
You can use this file to tell HACMP that it can process a particular type of disk the same
way it processes a disk type that it supports. The file contains a series of lines of the
following form:
<PdDvLn field of the hdisk><tab><supported disk type>
To determine the value of the PdDvLn field for a particular hdisk, enter the following
command:
# lsdev -Cc disk -l <hdisk name> -F PdDvLn
The known and supported disk types are:
Disk Name in HACMP Disk Type
SCSIDISK SCSI -2 Disk
SSA IBM Serial Storage Architecture
FCPARRAY Fibre Attached Disk Array
ARRAY SCSI Disk Array
FSCSI Fibre Attached SCSI Disk
For example, to have a disk whose PdDvLn field was “disk/fcal/HAL9000” be treated
the same as IBM fibre SCSI disks, a line would be added that read:
disk/fcal/HAL9000 FSCSI
A sample disktype.lst file, which contains comments, is provided.
• /etc/cluster/lunreset.lst
This file is referenced by HACMP during disk takeover.
HACMP will use either a target ID reset or a LUN reset for parallel SCSI devices based
on whether a SCSI inquiry of the device returns a 2 or a 3. Normally, only SCSI-3
devices support LUN reset. However, some SCSI-2 devices will support an LUN reset.
So, HACMP will check the Vendor Identification returned by a SCSI inquiry against
the lines of this file. If the device is listed in this file, then a LUN reset is used. This file is
intended to be customer modifiable.
For example, if the “HAL 9000" disk subsystem returned an ANSI level of '2' to inquiry,
but supported LUN reset, and its Vendor ID was “HAL” and its Product ID was “9000”,
then this file should be modified to add a line which was either:
HAL
or
HAL 9000
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
depending on whether vendor or vendor plus product match was desired. Note the
use of padding of Vendor ID to 8 characters.
A sample /etc/cluster/lunreset.lst file, which contains comments, is provided.
• /etc/cluster/conraid.dat
This file is referenced by HACMP during varyon of a concurrent volume group.
You can use this file to tell HACMP that a particular disk is a RAID disk that can be used
in classical concurrent mode. The file contains a list of disk types, one disk type per line.
The value of the Disk Type field for a particular hdisk is returned by the following
command:
# lsdev -Cc disk -l <hdisk name> -F type
Note: This file only applies to classical concurrent volume groups. Thus this file has no
effect in AIX V5.3 or greater, which does not support classical concurrent VGs.
HACMP does not include a sample conraid.dat file. The file is referenced by the
/usr/sbin/cluster/events/utils/cl_raid_vg script, which does include some
comments.
Additional considerations
The previously described files in /etc/cluster are not modified by HACMP after they
have been configured and are not removed if the product is uninstalled. This ensures
that customized modifications are unaffected by the changes in HACMP. By default, the
files initially contain comments explaining their format and usage.
Remember that the entries in these files are classified by disk type, not by the number
of disks of the same type. If several disks of the same type are attached to a cluster,
there should be only one file entry for that disk type.
Finally, unlike other configuration information, HACMP does not automatically
propagate these files across nodes in a cluster. It is your responsibility to ensure that
these files contain the appropriate content on all cluster nodes. You can use the
HACMP File Collections facility to propagate this information to all cluster nodes.
More information
For detailed information about configuring OEM disks for use with HACMP, see:
SC23-5209-01 HACMP for AIX, Version 5.4.1: Installation Guide
Appendix B: OEM Disk, Volume Group, and Filesystems
Accommodation
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce OEM disk accommodation.
Details — Provide an overview. The notes provide details, but you do not need to lecture
through all of that unless students are interested.
Additional information — Can OEM disks be used in Enhanced Concurrent VGs? I never
got a firm answer to this during course development. I believe that they can. Appendix D of
the Planning and Installation Guide is a little confusing and never explicitly says that OEM
disks can be used with enhanced concurrent VGs.
In the Install Guide, it says:
“With enhanced concurrent mode:
Any disk supported by HACMP for attachment to multiple nodes can be included in an
enhanced concurrent mode volume group.
...”
This seems to imply that OEM disks can be used for enhanced concurrent. I assume that
you need to edit the disktype.lst file. Or is that not even required? All of the disk
processing steps listed in Appendix D seem only to apply for reserve/release shared
storage protection or classical concurrent VGs.
Transition statement — Let’s review what we’ve covered in this topic.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Review topic 2.
Details —
Additional information —
Transition statement — In the next topic, we’ll look at the shared storage facilities
provided by AIX.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Figure 3-30. Topic 3 objectives: Shared storage from the AIX perspective AU548.0
Notes:
This topic discusses shared storage from the AIX perspective.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Physical
Logical
Partitions
Partitions
PVID
hdisk1
Volume
Group
Notes:
LVM review
The set of operating system commands, library subroutines, and other tools that allow
the user to establish and control logical volume storage is called the logical volume
manager.
LVM controls disk resources by mapping data between a simple and flexible logical
view of storage space and the actual physical disks. The logical volume manager does
this by using a layer of device driver code that runs above the traditional physical device
drivers.
Logical volumes
This logical view of the disk storage, which is called a logical volume (LV), is provided to
applications and is independent of the underlying physical disk structure. The LV is
made up of logical partitions.
Volume groups
Physical volumes and their associated logical volumes are grouped into volume group.
Operating system files are stored in the rootvg volume group. Application data are
usually stored in one or more additional volume groups.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Illustrate what the Logical Volume Manager does.
Details — Cover the terms mentioned in the visual--namely, logical volume, logical
partitions, physical volume, PVID, hdisk, and volume group. Emphasize physical versus
logical.
Additional information — This is a review. If it starts to turn into a “teach new stuff” foil,
then the students are not ready for this course and are going to have a tough week.
Transition statement — Let’s see how this looks from the file system’s perspective.
Uempty
LVM relationships
LVM manages the components of the disk subsystem. Applications talk to the
disks through LVM.
This example shows an application writing to a filesystem, which has its LVs
mirrored in a volume group physically residing on separate hdisks.
LVM
Physical Logical
Partitions Partitions
Volume Group
write to
/filesystem
Mirrored
Logical
Volume
Application
Notes:
LVM relationships
An application writes to a file system. A file system provides the directory structure and
is used to map the application data to logical partitions of a logical volume. Because an
LVM exists, the application is isolated from the physical disks. The LVM can be
configured to map a logical partition to up to three physical partitions and have each
physical partition (copy) reside on a different disk.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show how a file system write operation is eventually written to both copies of
the mirrored logical volume which underlies the file system.
Details — As in the student notes. You can also discuss having the disks far apart from
each other--different adapters and so forth.
Additional information —
Transition statement —
Uempty
ODM-LVM relationships
Ɣ LVM information is kept in two places:
– ODM (Object Data Manager)
– VGDA (Volume Group Descriptor Area)
Ɣ NOTE: This applies to changes made to the LVM constructs, not the data within
Notes:
Before going too far, it’s important to understand that the LVM data we’ve discussed is kept
in both the VGDA of all the disks in the volume group AND in the ODM of the system
making changes to the volume group (or creating it). This creates a rather obvious
problem. How do you keep the ODM up-to-date in every system other than the system that
is making a change to the volume group.
Understand that this is only a consideration when changes are made to the LVM constructs
themselves; for example, adding a filesystem/logical volume, increasing the size of a
logical volume, adding/removing a disk, and so forth.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-93
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain the volume group currency challenge when creating shared volume
groups.
Details —
Additional information —
Transition statement — Because of this, volume group creation is slightly different when
making a shared VG for HACMP.
Uempty
VGDA
ODM ODM
#1 #2 #3 #4
mkvg unmount cfgmgr varyoffvg
chvg varyoffvg importvg
mklv (log) chvg
logform
mklv (data)
crfs
#5
Start Cluster Services
Notes:
Introduction
The steps to add a shared volume groups are:
1. Ensure consistent PVIDs on all nodes where VG to be defined
2. Create a new VG and its contents
3. Varyoff VG on Node1
4. Import VG on Node2 and set VG characteristics correctly
5. Varyoff VG on Node2
6. Start Cluster Services
Note that the slide presents only a high-level view of the commands required to perform
these steps. More details are provided as follows.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-95
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
0. Ensure common PVIDs across all nodes that will share volume group
As discussed earlier, HACMP has no requirement that hdisk names on all the nodes are
consistent, but that all the nodes have access to the same disks and have discovered
the PVIDs.
a. Ensure disks are cabled/zoned/masked so that the disks will be seen by both nodes.
b. Add the shared disk(s) to AIX on the primary node (Node1 in the example):
cfgmgr
c. Assign a PVID to the disk(s)
chdev -a pv=yes -l disk_name
where disk_name is hdisk#, hdiskpower# or vpath#.
d. Add the disks to AIX on the secondary node (Node2)
cfgmgr
e. Using the PVIDs, verify that the necessary PVIDs are seen on both nodes. If not,
correct them.
lspv
C-SPOC
Fortunately, there is an easier way.
These steps will be done automatically if the cluster is active and C-SPOC is used.
Otherwise, you can use the commands listed here in the notes.
Unfortunately, we are not looking at the easier way until we get to the C-SPOC unit.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-97
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the manual way to create a volume group and have it configured on two
nodes.
Details —
Additional information —
Transition statement — Let’s take a look at how mirroring is used in a high-availability
cluster.
Uempty
LVM mirroring
Ɣ As mentioned in an earlier topic, HACMP does not provide data redundancy
Ɣ AIX LVM mirroring is a method that can be used to provide data redundancy
Ɣ LVM mirroring has some key advantages over other types of mirroring:
– Up to three-way mirroring of all logical volume types, including concurrent logical volumes,
sysdumpdev, paging space, and raw logical volumes
– Disk type and disk bus independence
– Optional parameters for maximizing speed or reliability
– Changes to most LVM parameters can be done while the affected components are in use
– The splitlvcopy command can be used to perform online backups
LVM
Physical Logical
Partitions
Volume Group
Partitions
write to
/filesystem
Mirrored
Logical
Volume
Application
Notes:
Introduction
Reliable storage is essential for a highly available cluster. LVM mirroring is one option to
achieve this. Other options are a hardware RAID disk array configured in RAID-5 mode
or some other solution which provides sufficient redundancy such as an external
storage subsystem like the ESS (DS6000/DS8000), EMC, and so forth.
LVM mirroring
Some of the features of LVM mirroring are:
- Data can be mirrored on three disks rather than having just two copies of data. This
provides higher availability in the case of multiple failures, but does require more
disks for the three copies.
- The disks used in the physical volumes could be of mixed attachment types.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-99
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
- Instead of entire disks, individual logical volumes are mirrored. This provides
somewhat more flexibility in how the mirrors are organized. It also allows for an odd
number of disks to be used and provides protection for disk failures when more than
one disk is used.
- The disks can be configured so that mirrored pairs are in separate sites or in
different power domains. In this case, after a total power failure on one site,
operations can continue using the disks on the other site that still has power. No
information is displayed on the physical location of each disk when mirrored logical
volumes are being created, unlike when creating RAID 1 or RAID 0+1 arrays; so
allocating disks on different sites requires considerable care and attention.
- Mirrored pairs can be on different adapters.
- Read performance is good for short length operations as data can be read from
either of two disks; so the one with the shortest queue of commands can be used.
Write performance requires a write to two disks.
- Extra mirrored copies can be created and then split off for backup purposes.
- Data can be striped across several mirrored disks, an approach that avoids hot
spots caused by excessive activity on a few disks by distributing the I/O operations
across all the member disks.
- There are parameters, such as Mirror Write Consistency, Scheduling Policy, and
Enable Write Verify, which can help maximize performance and reliability.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-101
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
1 create shared volume group Name the VG something meaningful like shared_vg1
Notes:
Introduction
This visual describes a procedure for creating a shared volume group and a mirrored
file system. There is an easier-to-use method provided by an HACMP facility called
C-SPOC, which is discussed later in the course. The C-SPOC method cannot be used
until the HACMP cluster’s topology and at least one resource group have been
configured.
The procedure described in the visual permits the creation of shared file systems before
performing any HACMP related configuration (an approach favored by some cluster
configurators).
It is also valuable to notice that unique names are being used for all of the LVM
components, including JFS Log logical volumes. Pay very close attention to that when
creating LVM components manually. If a JFS Log is not specified when creating a
filesystem, one will be created (if one doesn’t exist, that is) with a system generated
Uempty name. This could conflict with one that already exists on a system that will be sharing
this volume group.
Detailed procedure
Here are the steps in somewhat more detail:
a. Use the smit mkvg fastpath to create the volume group.
b. Make sure that the volume group is created with the Activate volume group
AUTOMATICALLY at system restart parameter set to no (or use smit chvg to
set it to no). This gives HACMP control over when the volume group is brought
online. It is also necessary to prevent, for example, a backup node from attempting
to online the volume group at a point in time when it is already online on a primary
node.
c. Use the smit mklv fastpath to create a logical volume for the jfs2log with the
parameters indicated in the figure above (make sure that you specify a type of
jfs2log or AIX ignores the logical volume and creates a new one, which has a
system generated name, when you create file system below).
d. Use the logform -V jfs2log <lvname>command to initialize a logical volume for
use as a JFS2 log device.
e. Use the smit mklv fastpath again to create a logical volume for the file system with
the parameters indicated in the figure above.
f. Use the smit crjfs2lvstd fastpath to create a JFS file system in the now existing
logical volume.
Verify by mounting the file system and using the lsvg command. Notice that if copies
were set to 2, then the number for PPs should be twice the number for LPs and that if
you specified separate physical volumes then the values for PVs should be 2 (the
number of copies).
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-103
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the manual way to create a volume group and mirrored filesystem.
Details —
Additional information —
Transition statement — Another volume group availability consideration when configuring
for high availability is quorum. We now take a look at quorum.
Uempty
Quorum checking
Enabled for Quorum checking Disabled for
VG status volume group volume group
(# of VGDAs required) (# of VGDAs required)
Notes:
Introduction
If you plan to mirror your data at the AIX level to provide redundancy, you will need to
consider AIX quorum checking on a volume group. If you aren’t mirroring your data at
the AIX level, quorum isn’t an issue.
Quorum
Quorum is the check used by the LVM at the volume group level to resolve possible
data conflicts and to prevent data corruption. Quorum is a method by which >50% of
VGDAs must be available in a volume group before any LVM actions can continue.
Note: For a VG with three or more disks, there is one copy of the VGDA on each disk.
For a one disk VG, there are two copies of the VGDA. For a 2-disk VG, the first disk has
two copies and the second has one copy of the VGDA. The VGDA is identical for all
disks in the VG.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-105
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Quorum is especially important in an HA cluster. If LVM can varyon a volume group with
half or less of the disks, it might be possible for two nodes to varyon the same VG at the
same time, using different subsets of the disks in the VG. This is a very bad situation
which we will discuss in the next visual.
Normally, LVM verifies quorum when the VG is varied on and continuously while the VG
is varied on.
Uempty group offline due to a loss of quorum for the volume group on the node, HACMP
selectively moves the resource group to another node.
You can change this default behavior by customizing resource recovery to use a notify
method instead of fallover. For more information, see Chapter 3: Configuring HACMP
Cluster Topology and Resources (Extended) in the Administration Guide.
Note: HACMP launches selective fallover and moves the affected resource group only
in the case of the LVM_SA_QUORCLOSE error. This error can occur if you use mirrored
volume groups with quorum enabled. However, other types of “volume group failure”
errors could occur. HACMP does not react to any other type of volume group errors
automatically. In these cases, you still need to configure customized error notification
methods, or use AIX Automatic Error Notification methods to react to volume group
failures.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-107
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Present the basic quorum rules.
Details — How to deal with quorum issues, such as getting a quorum-checking-disabled
volume group online with less than 100% of the VGDAs available, is discussed in more
detail shortly.
Additional information —
Transition statement — The first option to look at is eliminating the quorum issues.
Uempty
Ɣ Overall considerations
– Distribute hard disks across more than one bus
– Use different power sources
Notes:
Introduction
Eliminating quorum issues is done either by mirroring with quorum disabled, or by not
mirroring at the AIX level.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-109
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
- If you are mirrored across two disk subsystems, consider a quorum buster disk to
prevent loss if quorum if you lose access to one subsystem. This is discussed in the
later in the notes.
Distribute hard disks across more than one bus
Use multipathing software and two Fibre Channel adapters.
Use three adapters per node in SCSI.
Use two adapters per node, per loop in SSA.
Use different power sources
Connect each power supply in the storage device to a different power source.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-111
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Introduction
If you decide to mirror at the AIX level and to leave quorum checking on, you will want to
have HACMP handle the loss of access to a volume group if half the disks are lost. Be
sure you understand what you’re deciding to do, though. If you allow HACMP to handle
the loss of access to the volume group, this means that the loss of half the disks (only
one of your two copies of the data) will result in the user’s loss of access to the
application until it can be taken by another cluster node. You’ve purchased the
additional hardware and set up the mirroring precisely to avoid downtime if you lose
access to part of the hardware, but this strategy will result in downtime. You make the
call (see disabling quorum in the previous visual).
varyonvg -f
AIX provides the ability to varyon a volume group if a quorum of disks is not available.
This is called forced varyon. The varyonvg -f command allows a volume group to be
Uempty made active that does not currently have a quorum of available disks. All disks that
cannot be brought to an active state will be put in a removed state. At least one disk
must be available for use in the volume group.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-113
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain HACMP 5.x’s forced varyon feature and the related
HACMP_MIRROR_VARYON environment variable.
Details —
Additional information —
Transition statement — Correct use of the forced varyon feature or the
HACMP_MIRROR_VARYON feature requires that you pay attention to a few things.
Uempty
Notes:
More information
Refer to the HACMP for AIX Administration Guide Version 5.4.1 (Chapter 15) and the
HACMP for AIX Planning Guide Version 5.4.1 (Chapter 5) for more information about
forced varyon and quorum issues.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-115
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Provide recommendations for using forced varyon or the
HACMP_MIRROR_VARYON variable.
Details —
Additional information —
Transition statement — In concluding this unit, let’s take a look at some of the issues that
you must consider when configuring LVM components in an HACMP environment.
Uempty
Notes:
Unique names
Because your LVM definitions are used on multiple nodes in the cluster, you must make
sure that the names created on one node are not in use on another node. The safest
way to do this is to use C-SPOC. If creating the LVM components outside C-SPOC, you
must explicitly create and name each entity [do not forget to explicitly create, name and
format (using logform) the jfslog logical volumes] with a name known to be unique
across the nodes in the cluster.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-117
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-119
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Introduction
You can configure OEM volume groups in AIX and use HACMP as an IBM High
Availability solution to manage such volume groups.
Note: Different OEMs can use different terminology to refer to similar constructs. For
example, the Veritas Volume Manage (VxVM) term Disk Group is analogous to the AIX
LVM term Volume Group. We will use the term volume groups to refer to OEM and
Veritas volume groups.
Uempty automatically. After you add Veritas volume groups to HACMP resource groups, you
can select the methods for the volume groups from the pick lists in HACMP SMIT
menus for OEM volume groups support.
Note: Veritas Foundation Suite is also referred to as Veritas Storage Foundation (VSF).
Additional considerations
The custom volume group processing methods that you specify for a particular OEM
volume group is added to the local node only. This information is not propagated to
other nodes; you must copy this custom volume group processing method to each node
manually. Alternatively, you can use the HACMP File Collections facility to make the
disk, volume, and file system methods available on all nodes.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-121
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Discuss HACMP accommodation for OEM volume groups.
Details —
Additional information —
Transition statement — HACMP also provides some support for OEM file systems.
Uempty
Notes:
Introduction
You can configure OEM file systems in AIX and use HACMP as an IBM High Availability
solution to manage such file systems.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-123
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Additional considerations
The custom file system processing methods that you specify for a particular OEM file
system is added to the local node only. This information is not propagated to other
nodes; you must copy this custom file system processing method to each node
manually. Alternatively, you can use the HACMP File Collections facility to make the
disk, volume, and filesystem methods available on all nodes.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-125
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Checkpoint
1.True or False?
Lazy update attempts to keep VGDA constructs in sync between
cluster nodes (reserve/release-based shared storage protection).
2.Which of the following commands will bring a volume group
online?
a.getvtg <vgname>
b.mountvg <vgname>
c.attachvg <vgname>
d.varyonvg <vgname>
3.True or False?
Quorum should always be disabled on shared volume groups.
4.True or False?
Filesystem and logical volume attributes cannot be changed while
the cluster is operational.
5.True or False?
An enhanced concurrent volume group is required for the heartbeat
over disk feature.
© Copyright IBM Corporation 2008
Notes:
Checkpoint solutions
1.True or False?
Lazy update attempts to keep VGDA constructs in sync between
cluster nodes (reserve/release-based shared storage protection).
2.Which of the following commands will bring a volume group
online?
a.getvtg <vgname>
b.mountvg <vgname>
c.attachvg <vgname>
d.varyonvg <vgname>
3.True or False?
Quorum should always be disabled on shared volume groups.
4.True or False?
Filesystem and logical volume attributes cannot be changed while
the cluster is operational.
5.True or False?
An enhanced concurrent volume group is required for the heartbeat
over disk feature.
© Copyright IBM Corporation 2008
Additional information —
Transition statement — Let’s summarize the unit.
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-127
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit summary
Key points from this unit:
Ɣ Access to shared storage must be controlled
– Non-concurrent (serial) access
• Reserve/release-based protection:
Slower and may result in ghost disks
• RSCT-based protection (fast disk takeover):
Faster, no ghost disks, and some risk of partitioned cluster in the event of
communication failure
• Careful planning is needed for both methods of shared storage protection to
prevent fallover due to communication failures
– Concurrent access
• Access must be managed by the parallel application
Ɣ HACMP supports several disk technologies
– Must be well understood to eliminate single points of failure
Ɣ Shared storage should be protected with redundancy
– LVM mirroring
• LVM configuration options must be understood to ensure availability
• LVM quorum checking and forced varyon must be understood to ensure
availability
– Hardware RAID
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 3. Shared storage considerations for high availability 3-129
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Estimated time
00:45
References
SC23-5209-01 HACMP for AIX, Version 5.4.1 Installation Guide
SC23-4864-10 HACMP for AIX, Version 5.4.1:
Concepts and Facilities Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1 Planning Guide
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit objectives
After completing this unit, you should be able to:
Ɣ List and explain the requirements for an application to be
supported in an HACMP environment
Ɣ Describe the HACMP start and stop scripts
Ɣ Describe the resource group behavior policies supported by
HACMP
Ɣ Enter the configuration information into the Planning
Worksheets
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Resource Group
Shared
Disk
List of Nodes
Policies: Where to run
Resources
Application Server
Service Address
Volume Group
© Copyright IBM Corporation 2008
Notes:
Uempty b. Add resources to the Resource Group. These are the resources
that HACMP will move during a fallover.
i. Application server name, Service address, and Volume
group
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the connection between applications and HACMP resources and
resource groups.
Details —
Additional information — Point out that this is just an introduction to resource groups to
show how applications are added. Resource groups will be covered more in depth later in
the course.
Transition statement — Now, we look more closely at considerations for applications that
you want to make highly available.
Uempty
Application considerations
Ɣ Automation
– No intervention
Ɣ Dependencies
– Using names unique to one node
– Other applications
Ɣ Interference
– Conflicts with HACMP
Ɣ Robustness
– Application can withstand problems
Ɣ Implementation
– Other aspects to plan for
Ɣ Monitoring using HACMP
– This is critical
• Used to be overlooked
• Nearly mandatory for
– “Unmanaged” resource groups
– Non-disruptive Startup/Upgrade
© Copyright IBM Corporation 2008
Notes:
Introduction
Many applications can be put under the control of HACMP but there are some
considerations that should be taken into account.
Automation
One key requirement for an application to function successfully under HACMP is that
the application must be able to start and stop without any manual intervention. Because
the cluster daemons call the start and stop scripts, there is no option for interaction.
Additionally, upon an HACMP fallover, the recovery process calls the start script to bring
the application online on a standby node. This allows for a fully automated recovery
Other requirements for start and stop scripts will be covered on the next visual.
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Dependencies
Dependencies to be careful of when coding the scripts include:
• Referring to a locally attached device.
• Hard coding, such as /dev/tty0, which might not be the same on another node.
• Using a hostname that is not the same on other nodes.
• Software licensing: Software can be licensed to a particular CPU ID. If this is the
case with your application, realize that a fallover of the software will not
successfully restart. You might be able to avoid this problem by having a copy of
the software resident on all cluster nodes. Know whether your application uses
software that is licensed to a particular CPU ID.
Application dependencies:
Dependencies that in the past you had to worry about but now you may not have to:
• One application must be up before another one.
• Applications must both run on the same node.
These can now be handled by Runtime Dependency options. An overview of these
is given later in this unit.
Interference
An application can execute properly on both the primary and standby nodes. However,
when HACMP is started, a conflict with the application or environment might occur that
prevents HACMP from functioning successfully. Two areas to look out for are using
IPX/SPX Protocol and Manipulating Network Routes.
Robustness
Beyond basic stability, an application under HACMP should meet other robustness
characteristics, such as successful start after hardware failure and survival of real
memory loss. It should also be able to survive the loss of the kernel or processor state.
Implementation
There are several aspects of an application to consider as you plan for implementing it
under HACMP. Consider characteristics, such as time to start, time to restart after
failure, and time to stop. Also consider:
• Writing effective scripts.
• Consider file storage locations.
• Using inittab and cron Table: Inittab is processed before HACMP is started. Cron
table is local to a each node. Time/date should be synchronized.
We will look at writing scripts and data locations in the following visuals.
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Discuss application considerations.
Details —
Additional information — This is taken from appendix B, Planning and Install Guide.
Transition statement — Let’s take a closer look at writing scripts.
Uempty
Ɣ Use assists
Notes:
Introduction:
Application start scripts should not assume the state of the environment; defensive
programming can correct any irregular conditions that occur. Remember that cluster
manager spawns these scripts off a separate job in the background and carries on
processing. The application start scripts must be able to handle an unknown previous
shutdown state.
Items to check
- Environment:
Verify the environment. Are the prerequisite conditions satisfied? These might
include access to a file system, adequate paging space, IP labels and free file
system space. The start script should exit and run a command to notify system
administrators if the requirements are not met.
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Using assists
IBM provides a priced feature for HACMP that provides all the code and monitoring for
three applications: WebSphere, DB2, and Oracle Real Application Server (RAC). In
these cases you would not have to write the scripts yourself.
There are also “plug-in” filesets that provide help for integrating print server, DHCP, and
DNS. These filesets are part of the base HACMP product.
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Introduction
Deciding where data should go should be thought out well. For some data, the answer
is clear. For other cases, it depends. Putting data on shared storage allows for only one
copy but may not be available when needed. Putting data on private storage is subject
to having different copies but upgrades can be done easier.
Private storage
Private storage must be used for the operating system components. It can also be used
for configuration files, license files, and application binaries subject to the trade-offs
mentioned in the introduction.
It depends
License files deserves a special mention. If using node locked, then you should use
private storage. In any case, you must learn the license requirements of the application
to make a proper determination.
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Discuss where the application should go--private or shared storage.
Details —
Additional information —
Transition statement — Now, it’s time to look at how we control on which node the
application will run.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Startup policy
Ɣ Online on home node only
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain the startup policies.
Details —
Additional information — HACMP 5.3 and later supports only node distribution policy.
Network distribution policy is no longer supported.
Transition statement — Let’s take a closer look at the “On all nodes” policy before going
on to the Fallover policy choices.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Fallover policy
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain the Fallover policy and choices for dynamic node priority.
Details —
Additional information — Point out that dynamic node priority does not have much use in
a 2-node cluster. Dynamic node priority is not a runtime policy prior to HACMP 5.4.
Transition statement — Next, we look at the Fallback policies.
Uempty
Fallback policy
Ɣ Never fallback
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
appropriate time. After starting the node, HACMP automatically starts the resource
group fallover at the specified time.
Runtime policies will be covered in more detail in the HACMP Administration II
Administration and Problem Determination course.
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Valid combinations
HACMP enables you to configure only valid combinations of startup, fallover, and
fallback behaviors for resource groups.
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Node 1 Node 2
Child/Parent Parent/Child
RG RG
Child RG
ƔParent/Child Dependency
– One resource group can be the parent of another resource group
ƔLocation Dependency
– A resource group may be on the same node/site or on a different node/site than
another resource group
ƔImplemented as Run-Time Policy
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose —
Details —
Additional information — Point out that this is not covered in detail in this course.
Transition statement — So, now it’s time to have a checkup.
Uempty
Checkpoint
1. True or False
Applications are defined to HACMP in a configuration file that lists what
binary to use.
2. What policies would be the best to use for a 2-node “active-active”
cluster using IPAT to minimize both applications running on the
same node?
a. home, next, never
b. first, next, higher
c. distribution, next, never
d. all, error, never
e. home, next, higher
3. Which type of data should not be placed in private data storage?
a. Application log data
b. License file
c. Configuration files
d. Application binaries
4. Which policy is not a Run-time policy?
a. Settling
b. Delayed Fallback Timer
c. Dynamic Node Priority © Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Checkpoint review.
Details —
Checkpoint solutions
1. True or False
Applications are defined to HACMP in a configuration file that lists
what binary to use.
2.What policies would be the best to use for a 2-node “active-
active” cluster using IPAT to minimize both applications running
on the same node?
a.home, next, never
b.first, next, higher
c.distribution, next, never
d.all, error, never
e.home, next, higher
3.Which type of data should not be placed in private data storage?
a.Application log data
b.License file
c.Configuration files
d.Application binaries
4.Which policy is not a Run-time policy?
a.Settling
b.Delayed Fallback Timer
c.Dynamic Node Priority
Additional information —
Transition statement — Let’s summarize what we discussed in this unit.
Uempty
Unit summary
Key points from this unit:
Ɣ To define an application to HACMP, you must:
– Create an application server resource (start and stop scripts)
– Create a resource group (node list, policies, resources)
Ɣ Considerations for putting an application under HACMP control
– Automation
– Dependencies
– Interference
– Robustness
– Implementation details
– Monitoring
– Shared storage requirements
Ɣ Considerations for start and stop scripts:
– Environment
– Multiple instances
– Script location
– Error handling
– Coding issues
Ɣ Resource group policies control how HACMP manages the application
– Startup policy (with optional Settling timer)
– Fallover policy
– Fallback policy (with optional Delayed fallback)
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 4. Planning for applications and resource groups 4-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Summarize.
Details —
Additional information —
Transition statement — We’re done.
Estimated time
01:30
References
SC23-5209-01 HACMP for AIX, Version 5.4.1: Installation Guide
SC23-4864-10 HACMP for AIX, Version 5.4.1:
Concepts and Facilities Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1: Planning Guide
SC23-4862-10 HACMP for AIX, Version 5.4.1: Administration Guide
SC23-5177-04 HACMP for AIX, Version 5.4.1: Troubleshooting Guide
SC23-4867-09 HACMP for AIX, Version 5.4.1: Master Glossary
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
Unit objectives
After completing this unit, you should be able to:
Ɣ State where installation fits in the implementation process
Ɣ Describe how to install HACMP 5.4.1
Ɣ List the prerequisites for HACMP 5.4.1
Ɣ List and explain the purpose of the major HACMP 5.4.1
components
Notes:
Notes:
This topic covers the installation of the HACMP 5.4.1 filesets.
Notes:
Different opinions
Different people have different ideas about the exact order in which a cluster should be
configured. For example, some people prefer to leave the configuration of the shared
storage (step 5 above) until after they’ve synchronized the cluster’s topology (step 7) as
Uempty this allows them to take advantage of HACMP’s C-SPOC facility to configure the shared
storage.
One other area where different views are common is exactly when to install and
configure the application. If the application is installed, configured and tested
reasonably thoroughly prior to installing and configuring HACMP then most issues
which arise during later cluster testing are probably HACMP issues rather than
application issues. The other common perspective is that HACMP should be installed
and configured prior to installing and configuring the applications as this allows the
applications to be installed into the exact context that they will ultimately run in. There is
no correct answer to this issue. When to install and configure the applications is just
one more point that will have to be resolved during the cluster planning process.
Instructor notes:
Purpose — Outline the steps involved in building a cluster.
Details — Emphasize the importance of a disciplined approach. Ad hoc cluster
implementation might be more fun but it is unlikely to yield a successful cluster.
Additional information —
Transition statement — So, what have we done so far in the course?
Uempty
Notes:
Instructor notes:
Purpose — Review what we have done so far
Details — Review what the storage, network, and application steps have been done and
that these are the AIX activities that you need to build before configuring a cluster.
Additional information —
Transition statement — Before all else fails...
Uempty
Notes:
Instructor notes:
Purpose — Remind the students about the HACMP manuals.
Details — The manuals can be installed without installing HACMP code.
Additional information —
Transition statement — Let’s have a look at how HACMP is packaged on the CD.
Uempty
Notes:
Files on the CD
This visual shows the files that are on the CD. They will be expanded to show the table
of contents when using SMIT to do the install. The AIX 5.2 and 6.1 directories contain
the required rsct filesets for implementing HACMP V5.4.1 with AIX V5.2 and 6.1,
respectively. The pubs directory contains the PDF and HTML versions of the HACMP
documentation at the time the CD was created.
Instructor notes:
Purpose — Describe the contents of the CD.
Details —
Additional information —
Transition statement — So, what are the filesets that are seen from the .toc file via smit?
Uempty
Notes:
Fileset considerations
Listed are some of the filesets that you see when doing smit install_all in HACMP 5.4.1.
Using smit install_latest will not show the msg filesets so you should use install_all and
select the filesets.
Notice that cluster.es contains both client and server components. You can install either
or both depending on what the system’s HACMP function will be.
When you install cluster.es.server you will get cluster.es.cspoc as well.
The same filesets should be installed on all nodes or Verify will give warnings every
time it executes.
You should install the documentation filesets on at least one non-cluster node (ensuring
that the HACMP PDF-based documentation is available even if none of the cluster
nodes will boot could prove really useful someday).
Notice that some of the filesets require other products such as Tivoli or NetView. You
should not install these filesets unless you have these products. HAView is never
installed on the cluster node, it is installed on the NetView server.
The cluster.es.cfs fileset can only be used if GPFS is installed. You might not need the
plug-ins.
The Web-based smit is not to be confused with WebSM. Web-based smit is Web
application that allows you to see the HACMP smit configuration screens and to see
status.
The cluster.es.clvm fileset, which was formerly required for Enhanced Concurrent Mode
volume group support and concurrent mode resource group support, has been
removed. The function required for Enhanced Concurrent Mode volume groups and
concurrent mode resource groups have been built into the HACMP base code. The
license key for concurrent mode resource groups is no longer required.
Notes:
Installation suggestions
Listed above are the minimum prerequisites. As time goes by, these will almost
certainly be superseded by later levels. The point is that these are the components that
must be considered when preparing your environment for HACMP.
Before you try to install, look at the following for the latest prerequisites:
- HACMP for AIX 5L Installation Guide, Version 5.4.1
- Release notes / README on the HACMP for AIX 5L, Version 5.4.1 CDs
- The HACMP for AIX 5L, Version 5.4.1 Announcement Letter
• Go to the HACMP web site
http://www-03.ibm.com/systems/p/advantages/ha/ and click the
Announcement Letter link under the heading Learn more on the right side.
Uempty Because you are unlikely to want to upgrade a new cluster anytime soon, it is generally
wisest to start with the latest available AIX and HACMP patches. The URL for checking
on the latest patches is:
http://www14.software.ibm.com/webapp/set2/sas/f/hacmp/home.html
Finally, it’s always a good idea to call IBM support and ask if there are any known issues
with the versions of AIX and HACMP that you plan to install/upgrade. Indicate that you
intend to install the latest HACMP PTF (fix pack or whatever it may be called a the time)
and ask if it’s known to be stable. Depending on the timing of your installation, it might
be advisable to either stay one maintenance level behind on AIX and HACMP or both,
or it might be wise to wait for an imminent maintenance level for AIX and HACMP or
both.
Those listed in bold are the ones that needed to be added to a base AIX image. Ensure
that when you install these on a system that has been updated to a Technology Level /
Service Pack (TL / SP), that you update these newly installed HACMP prerequisites to
the same TL / SP.
For the RSCT prerequisites on AIX 6.1, the three filesets that are on the CD are
required in addition to the base RSCT filesets with the AIX 6.1 installation. Place the
RSCT filesets that are on the CD in the same directory as the prerequisites listed on the
slide.
IBM High Availability Cluster Multiprocessing (HACMP*) for AIX 5L*, V5.3 and V5.4
updates support for the IBM System Storage SAN Volume Controller (SVC) Storage
Software V4.1.
Please refer to the following information for support details. Note: TL = Technology Level
Uempty • HACMP does not support Global Mirror functions of SVC Copy Services.
• HACMP V5.3 does not support moving resource groups across sites.
• For specific HACMP C-SPOC restrictions, refer to the HACMP/XD for Metro Mirror:
Planning and Administration Guide.
• SDDPCM requires the configuration of Enhanced Concurrent Mode volume groups.
Other notes:
• SDD supports both Shared or Enhanced Concurrent Mode volume groups.
• Ensure that your SVC is properly configured to support SDD/SDDPCM host
multipathing. This involves adding all the WWWNs for a host's WWPN's into a single
Host object on the SVC. For example, for an HACMP node name Node_A with two
WWPNs of WWNN_1 and WWNN_2, run svctask mkhost -name Node_A -hbawwpn
WWNN_1 WWNN_2
The same requirements exist for HACMP implementation on the Power 6 p520 and
p550 systems as for VIOS 1.5.
Instructor notes:
Purpose — List the prerequisites for HACMP 5.4.1.
Details — Point out that ensuring that the cluster is built using the latest software probably
defers the date when the cluster must be upgraded because it is running software that is
about to go off maintenance. Refer the students to the Installation Guide, the release
notes/README that comes with the HACMP CDs, and the HACMP 5.4.1 announcement
letter to get the latest.
Additional information —
Transition statement — There are a few final things to check before you start to configure
your cluster.
Uempty
Ɣ Network setup
– /etc/hosts file is configured on all nodes correctly
– Name resolution works
– IP and non-IP networks are configured
– Subnets configured correctly
• The subnet mask identical.
• All interfaces on different subnets
– Routing configured correctly
– Test connectivity
Ɣ Shared storage configured correctly
Notes:
Description of checklist
This is a checklist of items that you should verify before starting to configure an HACMP
cluster. It is not a complete list because each situation is different. It would probably be
wise to develop your own checklist during the cluster planning process, and then verify
it just before embarking on the actual HACMP configuration of the cluster.
Code installation
Correct filesets includes making sure that the same HACMP filesets are installed on
each node. Documentation can be installed before installing HACMP. The
documentation is delivered as either pdf only for HACMP 5.4.1, previous versions
provided an html version too.
Network setup
The /etc/hosts file should have entries for all IP labels and all nodes. The file should be
the same on all nodes. Name resolution should be tested on all labels and nodes. To do
this you can use the host command. You should test address to name and name to
address and verify that they are the same on all nodes. You should ensure that a route
exists to all logical networks from all nodes. Finally, you should test connectivity by
pinging all nodes from all nodes on all interfaces.
Shared storage
Check to see that the disks are configured and recognized the same (if possible) and
can be accessed from all nodes that will share it.
Notes:
Let’s review
Notes:
Additional information —
Transition statement — Now let’s take a look at what was installed.
Notes:
HACMP Layer
Provides highly available services to
applications
AIX Layer
Provides operating system services (SRC, snmpd)
Notes:
Uempty - Doing “whatever else it takes” to make the applications highly available
Note that because most applications are not really aware of how they are started and
stopped or if they are being monitored and “recovered” or even if they are being made
highly available, the applications running within the application layer, as a rule, are
“blissfully unaware” of the existence of the HACMP layer or even the RSCT layer.
To make the applications highly available and to know when to start and stop, and, if
configured, monitor and “recover” the applications, the HACMP layer must be aware of
the overall status of the cluster including the state of the topology (which nodes,
networks and network interfaces are in working order) and the resources (which
resources are being made available where).
The HACMP layer relies upon the RSCT layer to provide a number of key services
including topology status information and a reliable messaging service.
Instructor notes:
Purpose — Illustrate the major “layers” of software on an HACMP cluster node.
Details — Do not get too bogged down in details. The key point here is that RSCT provides
services, such as cluster topology monitoring, which is used by HACMP and that HACMP
provides “high availability services” to applications. The fact that RSCT, HACMP and the
applications are themselves “above” AIX should be fairly obvious as should be the fact that
the LVM and TCP/IP components are below the RSCT, HACMP and applications layers.
Do not get bogged down on the question of whether the LVM and TCP/IP components are
themselves a layer or are part of the AIX layer.
Additional information —
Transition statement — Let’s now take a more detailed look at the components and
features of HACMP.
Uempty
Notes:
HACMP components
HACMP consists of the following components:
• A cluster manager (recovery driver and resource manager)
• RSCT
• SNMP related facilities
• The Cluster Information Program
• A highly available NFS server
• Shared external disk access
• Cluster Secure Communication Subsystem
Instructor notes:
Purpose — Show the major components of HACMP.
Details —
Additional information —
Transition statement — Let’s take a look at the Cluster Manager.
Uempty
Cluster Manager
Ɣ Is a subsystem/daemon that runs on each cluster node
Ɣ Is primarily responsible for responding to unplanned events:
– Recover from software and hardware failures
– Respond to user-initiated events:
• Request to online/offline a node
• Request to move/online/offline a resource group
• And so forth
Ɣ Is a client to RSCT
Ɣ Provides snmp retrievable status information
Ɣ Is implemented by the subsystem clstrmgrES
Ɣ Started in /etc/inittab and “always” running
Notes:
Instructor notes:
Purpose — Introduce the cluster manager.
Details —
Additional information — Might want to draw/show overview picture that was in unit 1.
Transition statement — Let’s take a look at the communications component that is new in
HACMP 5 systems.
Uempty
Notes:
Notes:
clcomd basics
The most obvious part of the cluster secure communication facility is the cluster
communication daemon (clcomd). This daemon replaces a number of ad hoc
communication mechanisms with a single facility thus funneling all cluster
communication through one point. This funneling, in turn, makes it feasible to then use
a VPN to actually send the traffic between nodes and to be sure that all the traffic is
going through the VPN.
Uempty processes are very efficient. These processes might still take a matter of minutes to
complete as comparison processing and resource manipulation may be occurring.
Other aspects of clcomd’s implementation which further improve performance include:
- Caching coherent copies of each nodes’ ODMs, which reduces the amount of
information which must be transmitted across the cluster during a verification
operation
- Maintaining long-term socket connections between nodes avoids the necessity to
constantly create and destroy the short term sessions, which are a natural result of
using rsh and other similar mechanisms
Instructor notes:
Purpose — Introduce the cluster communication daemon (clcomd).
Details —
Additional information —
Transition statement — To eliminate the need for /.rhosts files, clcomd must provide an
alternative authentication mechanism. Let’s have a look at it.
Uempty
Notes:
moved to a new cluster or if the entire cluster configuration is being redone from
scratch, it might be necessary to empty /usr/es/sbin/cluster/etc/rhosts or manually
populate it with the IP addresses of the source node. Subsequently, the file can be
emptied, because all clcomd communications will be authenticated based on the
HACMP ODM files. The file must exist, or clcomd will fail to allow any inbound
communications. In fact, testing has shown that once the nodes are established in the
HACMP ODM, you can put anything in the /usr/sbin/cluster/etc/rhosts file and it will
be ignored. Again, the key thing is that the file exists and that the HACMP ODM
contains the node/adapter information for the source of the clcomd session.
RSCT
Ɣ Is included with AIX
Ɣ Provides:
– Scalability to large clusters
– Cluster failure notification
– Coordination of changes
Ɣ Includes key components:
– Topology Services
• Heartbeat services
– Group Services
• Coordinates and monitors state changes of an application in the cluster
– RMC: Resource Monitoring and Control
• Provides process monitoring, dynamic node priority variables and user-
defined events
Ɣ Works with HACMP's Cluster Manager which is an RSCT
(group services) client
Notes:
AIX
Process
Monitor
HACMP
HA Recovery Driver
Database RSCT ~
Resource RMC Cluster Recovery
Monitor (ctrmc) Manager Programs
Switch
Resource
Monitor
Recovery
Commands
RSCT RSCT
Group ~
Topology
Services Services HACMP Event
Scripts
Group Membership
heartbeats messages Event Subscription
Voting Protocols between nodes
Notes:
Topology services
Responsible for building heartbeat rings for the purpose of detecting, diagnosing, and
reporting state changes to the RSCT Group Services component, which in turn reports
them to the Cluster Manger. Topology Services is also responsible for the transmission
of any RSCT-related messages between cluster nodes.
Group services
Associated with RSCT Topology Services is the RSCT Group Services daemon which
is responsible for “coordinating and monitoring changes to the state of an application
Uempty running on multiple nodes”. In the HACMP context, the “application running on multiple
nodes” is the HACMP cluster manager. Group Services reports failures to the Cluster
Manager as it becomes aware of them from Topology Services. The Cluster Manager
then drives cluster-wide coordinated responses to the failure through the use of Group
Services voting protocols.
Monitors
The monitors in the upper left of the diagram monitor various aspects of the local node’s
state, including the status of certain processes (for example, the application if
application monitoring has been configured), database resources, and the SP Switch (if
one is configured on the node). These monitors report state changes related to
monitored entities to the RSCT RMC Manager.
RMC manager
The RSCT RMC Manager receives notification of events from the monitors. It analyzes
these events and notifies RSCT clients of those events which they have expressed an
interest in.
The HACMP cluster manager, an RSCT client, registers itself with both the RSCT RMC
Manager and the RSCT Group Services components.
Cluster manager
After an event has been reported to the HACMP Cluster Manager, it responds to this
event the use of HACMP’s recovery commands and event scripts to respond to the
event. The scripts are coordinated via the RSCT group services component.
Instructor notes:
Purpose — Show how the various RSCT components interact with the HACMP cluster
manager.
Details —
Additional information — If asked, Event Management Services (emsvcs) is still started
at the start of Cluster Services but only used in conjunction with some Oracle RAC
releases. It can be stopped manually after Cluster Services has started without any
negative ramifications.
Transition statement — Let’s take a quick look at how RSCT’s Topology Services
component does heartbeating on an IP network.
Uempty
Heartbeat rings
Heartbeat
25.8.60.6 25.8.60.5
25.8.60.2 25.8.60.4
25.8.60.3
Notes:
Example
For example, the IP addresses in the foil can be sorted as 25.8.60.6, 25.8.60.5,
25.8.60.4, 25.8.60.3 and 25.8.60.2. This ordering results in the following heartbeat path:
25.8.60.6 --> 25.8.60.5-->25.8.60.4-->25.8.60.3-->25.8.60.2-->25.8.60.6
Notes:
Notes:
Instructor notes:
Purpose — Introduce clinfo.
Details —
Additional information —
Transition statement — Let’s take a quick look at HACMP’s highly available NFS support.
Uempty
Ɣ NFS V4
– It requires Stable Storage location accessible from all nodes in the resource group
– Resource Group can have more than two nodes
– NFSv4 application server and monitor are automatically added
– It requires a new fileset be installed
Notes:
Notes:
Checkpoint
1. Which component detects an adapter failure?
a. Cluster Manager
b. RSCT
c. clcomd
d. clinfo
2. Which component provides SNMP information?
a. Cluster Manager
b. RSCT
c. clsmuxpd
d. clinfo
3. Which component is required for clstat to work?
a. Cluster Manager
b. RSCT
c. clcomd
d. clinfo
4. Which component removes requirement for the /.rhosts file?
a. Cluster Manager
b. RSCT
c. clcomd
d. clinfo
Notes:
Checkpoint solutions
1. Which component detects an adapter failure?
a. Cluster Manager
b. RSCT
c. clcomd
d. clinfo
2. Which component provides SNMP information?
a. Cluster Manager
b. RSCT
c. clsmuxpd
d. clinfo
3. Which component is required for clstat to work?
a. Cluster Manager
b. RSCT
c. clcomd
d. clinfo
4. Which component removes requirement for the /.rhosts file?
a. Cluster Manager
b. RSCT
c. clcomd
d. clinfo
Additional information —
Transition statement —
Unit summary
Notes:
Estimated time
03:00
References
SC23-5209-01 HACMP for AIX, Version 5.4.1 Installation Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1 Planning Guide
SC23-4862-10 HACMP for AIX, Version 5.4.1 Administration Guide
SC23-5177-04 HACMP for AIX, Version 5.4.1 Troubleshooting Guide
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit objectives
After completing this unit, you should be able to:
ƔConfigure a mutual takeover HACMP 5.4.1 cluster
– Use the Initialization and Standard Configuration path
(Standard Path)
– Use the Two-Node Cluster Configuration Assistant
(Two-node Assistant)
ƔConfigure HACMP topology to include:
– IP address takeover via alias
• This is the default in the Standard Path
– Non-IP networks (rs232, diskhb)
– Persistent address
ƔVerify, synchronize, and test a cluster
ƔStart cluster services
ƔSave the cluster configuration
Notes:
Objectives
This unit will show how to configure a 2-node hot-standby or mutual takeover cluster
with a heartbeat over disk non-IP network using the standard configuration menus.
Follow the markers at the bottom of the screens to see the steps to extend the basic
hot-standby to a mutual takeover. It will then demonstrate how to start up and shut
down Cluster Services. It will then show the steps necessary to modify the configuration
of the cluster to add a persistent IP label, add a heartbeat on disk non-IP network and
synchronize the changes. The final step is making a snapshot backup of the cluster
configuration.
You will be walked through the methods of configuring the cluster, using the Initialization
and Standard Configuration path. You will make the above mentioned extensions using
the Extended Configuration path. You will also see the simplest, most limited, method;
that is, the Two-Node Configuration Assistant.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
usa uk
usaadm ukadm
X X
Two non-IP:
heartbeat on disk
Look for the to
rs-232 Y Y signify a mutual
takeover task (repeat
the step) in the slides
that follow
Or: A two node mutual takeover configuration (active / active)
– Second resource group with uk as its home (primary) node and usa as its backup
node
© Copyright IBM Corporation 2008
Notes:
Uempty The X in the figure represents the application xwebserver and the arrow represents
what happens on a fallover. The persistent addresses and both non-IP networks that
will be added in this unit are also shown.
The cluster will be tested for reaction to node, network, and network adapter failure, and
later in the week, we will also configure additional features, including NFS export and
cross-mount.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Outline the cluster configuration that will be implemented during this course.
Details — Talk the students through what we are about to build. Explain that it is practically
identical to what they will be building in the lab exercise.
Additional information —
Transition statement — Let’s take a moment to review what we have done so far in the
course.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Review where we are and where we are going.
Details —
Additional information —
Transition statement — So what do we need to assume about the network (IP and
non-IP) before configuring topology?
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Document the network configuration within which the first phase of this unit will
“operate.”
Details — Because the initial phase of this unit will build a cluster with IPAT via IP aliasing,
the network adapters and service IP labels have been configured appropriately for IPAT via
IP aliasing. Go over this configuration briefly with the students to ensure that they have a
reasonable grasp of the state of the cluster immediately prior to configuration.
Additional information —
Transition statement — We’ve now come to a fork in the road of sorts.
Uempty
Configuration methods
Ɣ HACMP provides two menu paths with three methods to
configure topology and resources:
– Initialization and Standard Configuration
• Two-node cluster configuration assistant
– Limited configuration
> Only supports two-node hot standby cluster
– Builds cluster configuration based on AIX configuration
> All adapter addresses treated as boot addresses
> All volume groups assigned to one resource group
– Creates everything needed for simple cluster (Topology, Resources,
Resource Group)
> No persistent addresses
> No non-IP network other than Heartbeat on Disk (only if enhanced concurrent
mode volume group present)
• Standard configuration
– Topology done in one step
> Based on IP addresses configured
– You then must configure resource groups and synchronize
– Desirable method to create more than two-node hot standby cluster
– Extended Configuration
• More steps, but provides access to all the options
Notes:
Configuration methods
- Standard Configuration
With this method, you must do the following tasks:
i. Topology (simplified via “Configure an HACMP Cluster and Nodes”)
ii. Configure Resources and Resource Groups
iii. Verify and Synchronize
- Two-Node Cluster Configuration Assistant
With this method, all the steps of Standard Configuration are done at once, including
adding a non-IP disk heartbeat network if you created an enhanced concurrent
volume group. Note that this is a simple two-node configuration with one resource
group containing all configured volume groups. This can be a starting point for
creating a more robust cluster but should not be viewed as a shortcut to creating a
cluster without a thorough understanding of how HACMP works.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
- Extended Configuration
With this method you follow similar steps as the Standard Configuration but
Topology has more steps and there are many more options. Some options can only
be done using this method, such as adding a non-IP network.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Base configuration
Prior to using any of the methods to configure the cluster, there are basic AIX
configuration steps that must be performed. As described in the unit on networking
considerations, you chose IP addresses and subnets to match your IP Address
Takeover method. Now you must ensure that those boot addresses are configured on
each of the cluster node’s network adapters. Take care to ensure that you have
configured these addresses correctly, including the subnet mask. When using either the
Two-node assistant or the Standard path, the addresses on the adapters for all the
systems being configured into the cluster are used to create the adapter and network
objects in the HACMP ODM. A simple mistake here will result in incorrect network
configurations in HACMP.
Next, you must ensure that all the addresses, boot, service, and persistent, are in the
/etc/host files for all the systems in the cluster. Check for resolution, forward and
reverse, by address and by name on all the systems in the cluster. Then verify that you
Uempty can reach all the boot addresses from each system via ping (including the local
addresses).
Now switch to your storage configuration. To instruct HACMP to manage your
application’s volume groups, you must add those volume groups to resource groups. To
minimize risk of error in data entry, add the volume groups to the resource groups using
a pick list. To do that, the volume groups must be configured prior to the resource group
configuration (and an HACMP discovery must be done). If you use the two-node
assistant, all volume groups (other than rootvg) will be picked up and used in the
resource group that is configured. Take caution here. If you use the Standard path, you
choose the volume groups to place in the resource groups. Choosing them from a pick
list is the right approach. Configure at least one Enhanced Concurrent Mode Volume
Group for use in a heartbeat on disk non-IP network.
You would ensure that the start and stop scripts were placed on all the systems in the
cluster and that you specify interface name/address for all the other systems when
configuring the cluster. In our example you’d ensure that the scripts were on usa and
that you chose an interface name/address for the other node (uk).
You will choose application server and resource group names when you configure them
using Initialization and Standard Configuration. As you will see a little later, if you use
the Two-node Configuration Assistant, the application server name will be used to
generate the HACMP names for the cluster and resource group.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce the configuration paths.
Details —
Additional information —
Transition statement — So, now we are ready to start the configuration process.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the top level HACMP smit menu.
Details — Emphasize the smit fastpath.
Additional information — You might decide to set aside these visuals at about this point
and telnet into one of the student’s cluster nodes (with their permission of course) so that
you can give a “live demo” of how to configure a cluster. If you take this route, try to ensure
that you cover at least the same ground that the remainder of this unit covers.
Transition statement — Let’s build a cluster starting with the standard configuration
menu.
Uempty
Configuration Assistants
Configure an HACMP Cluster and Nodes
Configure Resources to Make Highly Available
Configure HACMP Resource Groups
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Note however that the Two-node Configuration Assistant does do the synchronization
step. More on the Two-node Configuration Assistant later.
The method
The menu shows the tasks as they are to be performed. Each follows the other with
each having submenus to be traversed.
You will start by configuring the cluster itself. This is done via the Configure an HACMP
Cluster and Nodes option. This will build the cluster, nodes, adapters and network
objects for IP based networks. Non-IP networks will be added later.
That is followed by the configuration of the resources that will be made highly available.
This includes the service addresses, application servers (specifying your application
start and stop script names) and the option to use C-SPOC to create your shared LVM
structures. This is done via the Configure Resources to Make Highly Available
option.
To make the resources available to HACMP for management, you must put them in
resource groups. You will create resource group(s) objects and then fill them with the
resources that were defined above. There will be nodes listed in a specific order for
acquiring the resources and the service addresses and volume groups that support the
application. This is done via the Configure HACMP Resource Groups option.
Caution
If changes are made on one node but not synchronized and then more changes are
made on a second node and then synchronized, the changes made on the first node
are lost.
If you want to avoid “losing” work, make sure that you don’t flip back and forth between
nodes while doing configuration work (that is, work on only one node at least until
you’ve synchronized your changes).
Recommendation
Pick one of your cluster nodes to be the one node that you use to make changes.
Configuration assistants
Besides the Two-node Configuration Assistant, HACMP provides, via an additional
feature, configuration assistants for WebSphere, Oracle, and DB2, called Smart
Assistants.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
[Entry Fields]
* Cluster Name [ibmcluster]
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
NODE uk:
Network net_ether_01
ukboot1 192.168.15.31
ukboot2 192.168.16.31
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Configuration Assistants
Configure an HACMP Cluster and Nodes
Configure Resources to Make Highly Available
Configure HACMP Resource Groups
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the remaining steps and introduce the panels that will be followed.
Details —
Additional information —
Transition statement — Now that we have the topology configured, let’s move on to the
service addresses.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show that we will start with Service IP Label definitions.
Details —
Additional information —
Transition statement — Now, choose to add a service label.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the standard path menu selection for configuring service IP labels and
addresses.
Details —
Additional information —
Transition statement — Next, we actually choose the service label to use.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the menu for selecting the service label.
Details —
Additional information —
Transition statement — Next, we must choose the name of the network on which the IP
Label/Address will be bound.
Uempty
Notes:
Menu filled in
This screen shows the parameters for the xweb resource group’s service IP label.
When we’re sure that this is what we intend to do, press Enter to define the service IP
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
label. The label is then available from a pick list when you add resources to a resource
group later.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Uempty The start script should then start the application. It is a good idea to then wait until it is
sure that the application has completely started. The cluster manager doesn’t verify that
the application has started or that the start script exits with a 0 return code. Of course if
you configure an application monitor, the cluster manager will monitor the startup and/or
the continuous running of the application. Application monitors are not covered in this
class. They are covered in detail in the HACMP System Administration II class, AU610.
The stop script’s responsibility is to stop the application. It must not exit until the
application is totally stopped as HACMP will start to unmount filesystems and release
other resources as soon as the stop script terminates. The attempt to release these
resources might fail if there are remnants of the application still running.
The start and stop scripts must exist and be executable on all cluster nodes defined in
the resource group (that is, they must reside on a local non-shared filesystem) or you
will not be able to verify and synchronize the cluster. If you are using the auto-correction
facility of verification, the start/stop scripts from the node where they exist will be copied
to all other nodes.
HACMP 5.2 and later provides a file collection facility to help keep the start and stop
scripts in synch. Be sure this is what you want. In most cases this is acceptable.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Finish the application server definition.
Details —
Additional information —
Transition statement — Optionally, you can use the next menu item to create your shared
volume groups.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the optional menu to define shared volume groups through C-SPOC.
Details —
Additional information — Review start and stop script requirements.
Transition statement — If you created any volume groups, you’ll want to discover them.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the “discover” menu in the extended configuration path.
Details — Explain that it is probably a good idea to run this at this point regardless of
whether volume groups were created in the previous step. It’s a good idea to prepare the
pick-lists prior to creating the resource groups.
Additional information —
Transition statement — Now that we have created the resources, we are ready to create
the resource group definition.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the menu to “Add a Resource Group”.
Details —
Additional information —
Transition statement — Now, let’s select add a resource group.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the “Add Resource Group” screen.
Details —
Additional information —
Transition statement — Time to add the resources to the newly created resource group.
Uempty
+----------------------------------------------------------------------+
¦ Select a Resource Group ¦
¦ ¦
¦ Move cursor to desired item and press Enter. ¦
¦ ¦
¦ xwebgroup ¦
| ywebgroup ¦
¦ ¦
¦ F1=Help F2=Refresh F3=Cancel ¦
¦ F8=Image F10=Exit Enter=Do ¦
¦ /=Find n=Find Next ¦
+----------------------------------------------------------------------+
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show how to get to the “Change/Show Resources or a Resource Group
(standard)” screen.
Details —
Additional information —
Transition statement — We’ve selected the xwebgroup resource group; so let’s press
Enter.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Although the Extended Path hasn’t been covered in detail, the configuring of resources
in a Resource Group can be done through that path. When using the Extended Path,
there are many more options. Make note of this as you may want to check this in the lab
or may need to know this when configuring your cluster at home.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Uempty verification errors but only if you are using Extended Configuration. Deciding to do so is
a decision that must be approached with the greatest of care, because it is very unusual
for a verification error to occur that can be safely overridden.
Also, remember the earlier discussion about synchronization--any HACMP
configuration changes made on any other cluster node will be lost if you complete a
synchronization on this cluster node.
Log files are created to show progress and problems. Check /var/adm/hacmp/clverify
for the logs. These log files have been vastly improved over the years with more details
on the commands being run during verify to help in determining the problems
encountered during verify.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
It’s a start
We have accomplished a large portion of the cluster configuration. The nodes, IP
addresses (service and boot), networks, application servers, volume groups, and
resource groups have been configured. This configuration has been synchronized
across the cluster nodes. We indicate that some level of testing could be performed at
this point. You can wait until after we do the rest of the configuration to test everything,
or break it up as we have it here.
What’s left?
Recall the strong recommendation to include at least one non-IP network in your
cluster? Well, we haven’t done that yet. And what about access to the cluster nodes
using a reliable non-service, non-boot IP address? We can accomplish that with a
persistent address. Finally, it is always a good idea to create backups after producing
Uempty this much good work. It is advisable to create both a snapshot of the cluster
configuration and a mksysb of the systems.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show our progress in configuring the cluster and what is left.
Details —
Additional information —
Transition statement — Some initial configuration steps require the use of Extended
Configuration. Let’s now take a look at them.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the top-level extended configuration path menu.
Details —
Additional information —
Transition statement — We start with non-IP networks, which are elements of the
cluster’s topology.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the extended path’s Topology Configuration menu.
Details —
Additional information —
Transition statement — A non-IP network is defined by specifying the end-points; so we
need to head down into the communication interfaces/devices part of the HACMP menus.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the extended path’s communication interfaces and devices menu.
Details —
Additional information — Just a menu--move on.
Transition statement — The first step is to select the Add Communication
Interfaces/Devices entry.
Uempty
+--------------------------------------------------------------------------+
¦ Select a category ¦
¦ ¦
¦ Move cursor to desired item and press Enter. ¦
¦ ¦
¦ Add Discovered Communication Interface and Devices ¦
¦ Add Predefined Communication Interfaces and Devices ¦
¦ ¦
¦ F1=Help F2=Refresh F3=Cancel ¦
¦ F8=Image F10=Exit Enter=Do ¦
F1¦ /=Find n=Find Next ¦
F9+--------------------------------------------------------------------------+
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Illustrate the choice that must be made between discovered and pre-defined
communication interfaces and devices.
Details —
Additional information —
Transition statement — Select the Discovered choice, and we’re faced with another
question.
Uempty
+--------------------------------------------------------------------------+
¦ Select a category ¦
¦ ¦
¦ Move cursor to desired item and press Enter. ¦
¦ ¦
¦ # Discovery last performed: (Feb 12 18:20) ¦
¦ Communication Interfaces ¦
¦ Communication Devices ¦
¦ ¦
¦ F1=Help F2=Refresh F3=Cancel ¦
¦ F8=Image F10=Exit Enter=Do ¦
F1¦ /=Find n=Find Next ¦
F9+--------------------------------------------------------------------------+
Notes:
Is it an interface or a device?
Now we need to indicate whether we are adding a communication interface or a
communication device. Non-IP networks use communication devices as end-points
(dev/tty, for example); so select Communication Devices to continue.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the choice that must be made between adding communication
interfaces versus communication devices.
Details —
Additional information —
Transition statement — We’re adding a non-IP network; so choose Communication
Devices choice.
Uempty
Notes:
We’re now presented with a list of the “discovered” communication devices.
You can either choose to add an rs232 (using the /dev/tty entries) network or a diskhb
network (using the /dev/hdisk entries). If you’re interested, we cover SSA in Appendix D.
rs232 networks
The steps to follow to create and test the rs232 network:
a. /dev/tty1 on usa is connected to /dev/tty1 on uk using a fully wired rs232 null-modem
cable (don’t risk a potentially catastrophic partitioned cluster by failing to configure a
non-IP network or by using cheap cables). Select these two devices, and press
Enter to define the network.
b. Before you use this smit screen to define the non-IP network, make sure that you
verify that the link between the two nodes is actually working.
c. For our example, the non-IP rs232 network connecting usa to uk can be tested as
follows:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
i. Issue the command stty < /dev/tty1 on one node. The command should
hang.
ii. Issue the command stty < /dev/tty1 on the other node. The command should
immediately report the tty’s status and the command that was hung on the first
node should also immediately report its tty’s status.
iii. These commands should not be run while HACMP is using the tty.
iv. If you get the behavior described above (especially including the hang in the first
step that “recovers” in the second step), then the ports are probably connected
together properly (check the HACMP log files when the cluster is up to be sure).
If you get any other behavior then you probably are using the wrong cable or the
rs232 cable isn’t connected the way that you think it is).
diskhb networks
The steps to follow to configure and test a Heartbeat on Disk network:
a. Make sure you choose a pair of entries (such as /dev/hdisk5 shown in the figure),
one for each of two nodes. Note that it is actually the pvids that must match since
this is the same disk.
b. You can test the connection using the command /usr/sbin/rsct/bin/dhb_read as
follows:
- On Node A, enter dhb_read -p hdisk5 -r
- On Node B, enter dhb_read -p hdisk5 -t
- You should then see on both nodes: “Link operating normally.”
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
+-------------------------------------------------------------------------------------+
¦ Select a Node ¦
¦ ¦
¦ Move cursor to desired item and press Enter. ¦
¦ ¦
¦ usa ¦
¦ uk ¦
¦ ¦
¦ F1=Help F2=Refresh F3=Cancel ¦
¦ F8=Image F10=Exit Enter=Do ¦
¦ /=Find n=Find Next ¦
+-------------------------------------------------------------------------------------+
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Synchronize
smitty hacmp -> Extended Configuration
[Entry Fields]
* Verify, Synchronize or Both [Both] +
* Automatically correct errors found during [No] +
verification?
Notes:
Uempty Force synchronization if verification fails? - This is almost always a very bad idea.
Make sure that you really and truly must set this option to Yes before doing so.
Verify changes only? - Setting this option to “Yes” will cause the verification to focus
on aspects of the configuration that changed since the last synchronization. As a result,
the verification will run slightly faster. This might be useful during the mid to early stages
of cluster configuration. It seems rather risky once the cluster is in production.
Logging - You can increase the amount of logging related to this verification and
synchronization by setting this option to “Verbose.” This can be quite useful if you are
having trouble figuring out what is going wrong with a failed verification.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the extended configuration path’s “HACMP Verification and
Synchronization” visual.
Details — Point out the correction feature of HACMP 5.2 and later. It will be covered in
more detail in the problem determination unit of this course.
Additional information —
Transition statement — Time to save our configuration.
Uempty
Snapshot Configuration
Notes:
Creating a snapshot
smit hacmp -> Extended Configuration -> Snapshot Configuration
A snapshot captures the HACMP ODM files, which allows you to recover the cluster
definitions. There is also an info file. The info file is discussed further in the AU61
course HACMP Administration II: Administration and Troubleshooting.
If necessary there is, from the Snapshot Configuration menu, another option to restore
(apply) a snapshot.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain the methods of saving the configuration and focus on this visual on the
snapshot method.
Details —
Additional information —
Transition statement — What about the xml method?
Uempty
[Entry Fields]
* File Name [/var/hacmp/log/cluster.haw] /
Cluster Notes []
Snapshot Configuration
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show how to save configuration data to an xml file.
Details —
Additional information —
Transition statement — You’ve seen the Standard path and Extended path options
required to create a complete cluster. What about a simple 2-node, hot-standby cluster
configuration?
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-93
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Figure 6-40. What does the two-node assistant give you? AU548.0
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-95
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show how to see the HACMP resource group configuration.
Details — Make sure that the students see that the entire resource group has now been
defined.
Additional information —
Transition statement — Before moving on, let’s see where we are in the process.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-97
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show that we are finished with setting up a cluster configuration.
Details —
Additional information —
Transition statement — So, let’s fire up HACMP.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-99
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show how to get to the smit screen for starting Cluster Services via the smit
menu hierarchy.
Details —
Additional information —
Transition statement — Starting with the top-level HACMP menu, choose System
Management (C-SPOC).
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-101
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the top level System Management (C-SPOC) menu.
Details —
Additional information —
Transition statement — Next, we will select Manage HACMP Services selection.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-103
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the Manage HACMP Services screen.
Details —
Additional information —
Transition statement — Finally, we are there!
Uempty
Notes:
Startup choices
There are a few choices to make. For the moment, we will just recommend the defaults,
except selecting both nodes and turning on the Cluster Information Daemon. The other
options are discussed in the next unit in more detail.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-105
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the “Start Cluster Services” screen.
Details — Explain the choices but try to avoid getting too bogged down.
Additional information — More information will come in the next unit.
Transition statement — What if you want to start over completely?
Uempty
Removing a cluster
ƔUse Extended Topology Configuration
Configure an HACMP Cluster
# > /usr/es/sbin/cluster/etc/rhosts
© Copyright IBM Corporation 2008
Notes:
Starting over
If you have to start over, you can:
- Stop cluster services on all nodes.
- Use Extended Configuration, as shown above to remove the cluster (on all nodes).
- Remove the entries (but not the file) from /usr/es/sbin/cluster/etc/rhosts (on all
nodes).
If you really want to start over, then you can:
- installp -u cluster
- rm -r /usr/es/* (be very careful here)
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-107
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show how to start over.
Details —
Additional information —
Transition statement — Time to say we are done.
Uempty
We're there!
Ɣ We've configured a two-node cluster with multiple resource
groups, including all the steps with a :
– Each resource group has a different home (primary) node
– Each resource group falls back to its home node on recovery
Ɣ This is called a two-node mutual takeover cluster
usa uk
X X
Y Y
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-109
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Indicate that we’ve got to where we were going.
Details —
Additional information —
Transition statement — Just a few questions to answer now...
Uempty
Checkpoint
1. True or False?
It is possible to configure a recommended simple two-node cluster environment using
just the standard configuration path.
2. In which of the top-level HACMP menu choices is the menu for starting and
stopping cluster nodes?
a.Initialization and Standard Configuration
b.Extended Configuration
c.System Management (C-SPOC)
d.Problem Determination Tools
3. In which of the top-level HACMP menu choices is the menu for defining a non-IP
heartbeat network?
a.Initialization and Standard Configuration
b.Extended Configuration
c.System Management (C-SPOC)
d.Problem Determination Tools
4. True or False?
It is possible to configure HACMP faster by having someone help you on the other
node.
5. True or False?
You must specify exactly which filesystems you want mounted when you put resources
into a resource group.
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-111
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Checkpoint questions
Details —
Checkpoint solutions
1. True or False?
It is possible to configure a recommended simple two-node cluster environment using
just the standard configuration path.
You can’t create the non-IP network from the standard path.
2. In which of the top-level HACMP menu choices is the menu for starting and
stopping cluster nodes?
a.Initialization and Standard Configuration
b.Extended Configuration
c.System Management (C-SPOC)
d.Problem Determination Tools
3. In which of the top-level HACMP menu choices is the menu for defining a non-IP
heartbeat network?
a.Initialization and Standard Configuration
b.Extended Configuration
c.System Management (C-SPOC)
d.Problem Determination Tools
4. True or False?
It is possible to configure HACMP faster by having someone help you on the other
node.
5. True or False?
You must specify exactly which filesystems you want mounted when you put resources
into a resource group.
Additional information —
Transition statement — Time for a break and lab.
Uempty
Checkpoint
1.True or False?
It is possible to configure a recommended simple two-node cluster environment
using just the standard configuration path.
2.In which of the top-level HACMP menu choices is the menu for starting and
stopping cluster nodes?
a.Initialization and Standard Configuration
b.Extended Configuration
c.System Management (C-SPOC)
d.Problem Determination Tools
3.In which of the top-level HACMP menu choices is the menu for defining a non-IP
heartbeat network?
a.Initialization and Standard Configuration
b.Extended Configuration
c.System Management (C-SPOC)
d.Problem Determination Tools
4.True or False?
It is possible to configure HACMP faster by having someone help you on the other
node.
5.True or False?
You must specify exactly which filesystems you want mounted when you put
resources into a resource group.
Notes:
Some notes from the developer :-)
This is a photograph of Lake Louise in the Canadian Rocky Mountains (located about a
90 minute drive west of Calgary). If you are ever there, make sure that you rent one of
the canoes in the photograph and go for a paddle out on the lake. There’s also a
number of quite spectacular and not particularly strenuous hikes that start from near the
point that this photograph was taken. The hike that goes up to the “tea house” is
definitely worth an afternoon (you can pay money to go up on horseback if you don’t
feel like walking for free).
Also, can you read this? ;-)
Aoccdrnig to a rscheearchr at an Elingsh uinervtisy, it deosn't mttaer in waht oredr the
ltteers in a wrod are, the olny iprmoetnt tihng is taht the frist and lsat ltteer is at the rghit
pclae. The rset can be a toatl mses and you can sitll raed it wouthit porbelm. Tihs is
bcuseae we do not raed ervey lteter by it slef but the wrod as a wlohe.
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-113
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Give the students a break.
Details —
Additional information —
Transition statement — Please make sure that your clothes aren’t wet before fiddling with
the computers in lab!
Uempty
Checkpoint solutions
1. True or False?
It is possible to configure a recommended simple two-node cluster environment
using just the standard configuration path.
You can’t create the non-IP network from the standard path.
2. In which of the top-level HACMP menu choices is the menu for starting and
stopping cluster nodes?
a. Initialization and Standard Configuration
b. Extended Configuration
c. System Management (C-SPOC)
d. Problem Determination Tools
3. In which of the top-level HACMP menu choices is the menu for defining a non-
IP heartbeat network?
a. Initialization and Standard Configuration
b. Extended Configuration
c. System Management (C-SPOC)
d. Problem Determination Tools
4. True or False?
It is possible to configure HACMP faster by having someone help you on the other
node.
5. True or False?
You must specify exactly which filesystems you want mounted when you put
resources into a resource group.
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 6. Initial cluster configuration 6-115
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose —
Details —
Additional information —
Transition statement —
Estimated time
03:00
References
SC23-5209-01 HACMP for AIX, Version 5.4.1: Installation Guide
SC23-4864-10 HACMP for AIX, Version 5.4.1:
Concepts and Facilities Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1: Planning Guide
SC23-4862-10 HACMP for AIX, Version 5.4.1: Administration Guide
SC23-5177-04 HACMP for AIX, Version 5.4.1: Troubleshooting Guide
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit objectives
After completing this unit, you should be able to:
Ɣ Use the SMIT Standard and Extended menus to make
topology and resource group changes
Ɣ Describe the benefits and capabilities of C-SPOC
Ɣ Perform routine administrative changes using C-SPOC
Ɣ Start and stop Cluster Services
Ɣ Perform resource group move operations
Ɣ Discuss the benefits and capabilities of DARE
Ɣ Use the snapshot facility to return to a previous cluster
configuration or to roll back changes
Ɣ Configure and use Web SMIT
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
usa uk
X X
Y Y
Z Z
Notes:
Introduction
We’re now going to embark on a series of hypothetical scenarios to illustrate a number
of routine cluster administration tasks. Some of these scenarios are more realistic than
others.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
[Entry Fields]
* Resource Group Name [zwebgroup]
* Participating Node Names (Default Node Priority) [usa uk] +
Does the order in which the node names are specified matter?
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
+--------------------------------------------------------------------------+
¦ Select a Service IP Label/Address type ¦
¦ ¦
¦ Move cursor to desired item and press Enter. ¦
¦ ¦
¦ Configurable on Multiple Nodes ¦
¦ Bound to a Single Node ¦
¦ ¦
¦ F1=Help F2=Refresh F3=Cancel ¦
¦ F8=Image F10=Exit Enter=Do ¦
F1¦ /=Find n=Find Next ¦
F9+--------------------------------------------------------------------------+
Notes:
Introduction
We need to define a service IP label for the zwebgroup resource group.
Uempty are no other limits on the number of resource groups with service labels that can be
configured on an IPAT via IP aliasing network (although, eventually, you run out of CPU
power or memory or something for all the applications associated with these resource
groups).
Network name
The next step is to associate this Service Label with one of the HACMP networks. This
is not shown in the visual.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show how to define the third service IP label.
Details — Point out to the students that having a third service IP label on a two-node
network requires IPAT via IP aliasing.
Additional information — The rules for IPAT via IP replacement are simple:
• For non-distribution policies, each node can have at most 1 RG per network and each
node must have as many interfaces as there are resource groups.
• For distribution policies only one resource group per node or per network. In the case of
per node then only one resource group can be used with two nodes. In the case of per
network one would have to have a different interface per RG on each node and
implement a different network across the nodes for each RG.
Note: In HACMP 5.3, only per-node distribution policy is supported.
Transition statement — After selecting the Service label type and selecting the network,
we can fill in the Service Label information.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the Extended Path screen to add a service label that shows HWAT.
Details —
Additional information —
Transition statement — Next, we need a third application.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the screen to add a application server.
Details —
Additional information —
Transition statement — Let’s complete the resource group definition with the resource
attributes that we need.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the adding of resources to the zwebgroup resource group.
Details —
Additional information —
Transition statement — And the second screen.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the second screen in the Extended Path menu to add resources to a
resource group.
Details —
Additional information —
Transition statement — Okay, so now we synchronize.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the synchronize changes step.
Details — This one gets about three seconds of air time; although, you might want to recap
how this new resource group behaves.
Additional information —
Transition statement — Now, we get money for new node.
Uempty
usa uk india
X X X
Y Y Y
Z Z
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Set the scene for the next scenario.
Details — Not much to say here that isn’t said on the visual.
Additional information —
Transition statement — Let’s first review the steps for how we add a node to the HACMP
configuration.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the process involved in adding a node to an existing cluster.
Details — Give the students some time to digest this foil and be prepared for at least a
short discussion (there’s quite a bit of information on this foil).
Additional information — Remind the students that we will look at only the HACMP
configuration aspects of the task of adding a node to an existing cluster.
Transition statement — Let’s see how we add a node to the HACMP configuration.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
separated.
This path will be taken to initiate communication with the node.
The command launched by this SMIT screen contacts the clcomd at each address and
asks them to come together in a new cluster. Obviously, HACMP must already be
installed on the new nodes.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Introduction
This visual, and the next one, show how to add two more non-IP networks to our cluster.
Make sure that the topology of the non-IP networks that you describe to HACMP
corresponds to the actual topology of the physical rs232 cables.
In the following notes, we discuss why we need to add two more non-IP rs-232 links.
Note that if you are using heartbeat on disk the same two steps are required. There
must be a unique disk shared between india and usa, and india and uk to define the
two heartbeat on disk networks (one between india and usa, the other between india
and uk). You can’t use an hdisk on one node for a heartbeat on disk network with two
different nodes.
Mesh configuration
The most redundant configuration would be a mesh, each node connected to every
other node. However, if you have more than three nodes, this means extra complexity
and can mean a lot of extra hardware, depending on which type of non-IP network you
are using.
Note: For a three node cluster, a ring and a mesh are the same.
Three-node example
In the example in the visual, we already have a non-IP network between usa and uk; so
we need to configure one between india and usa (on this page) and another one
between uk and india (on the next page).
If, for example, we left out the uk and india non-IP network, then the loss of the usa
node would leave the uk and india nodes without a non-IP path between them.
Five-node example
In even larger clusters, it is still necessary to configure only a ring of non-IP networks.
For example, if the nodes are A, B, C, D, and E, then five non-IP networks would be the
minimum requirement: A to B, B to C, C to D, E to F, and F to A being one possibility. Of
course, other possibilities exist, such as A to B, B to D, D to C, C to E, and E to F.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the pair of tty ports to use for the first non-IP rs232 network.
Details — Make it clear that they must have a ring of non-IP networks encompassing all
nodes.
Additional information — Some students might suggest various star-shaped non-IP
network configurations.
It really is simplest to configure the nodes in a ring of non-IP networks. If they have extra
technology available to them, they can configure the cluster in two rings.
Transition statement — Next, we need to define the uk-india non-IP network.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the screen used to define the last of the non-IP rs232 networks.
Details —
Additional information —
Transition statement — And then we synchronize the changes.
Uempty
Notes:
Synchronize
At this point, all this configuration exists only on the node where the data was entered.
To populate the other node’s HACMP ODM’s, you must synchronize. When we’ve
synchronized our changes, the india node is an official member of the cluster.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the synchronizing of the first set of changes in this scenario.
Details —
Additional information —
Transition statement — Now, we can start Cluster Services on the new node.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the task of starting Cluster Services on the new node.
Details —
Additional information —
Transition statement — Now, we need to add the new india node to the ywebgroup and
xwebgroup resource groups.
Uempty
[Entry Fields]
Resource Group Name ywebgroup
New Resource Group Name []
Participating Node Names (Default Node Priority) [uk usa india] +
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the adding of the new india node to the ywebgroup resource group.
Details — Emphasize that the non-HACMP work of getting india ready to run the
xwebserver and ywebserver applications must be completed before this step is performed.
Also be sure to mention that this requires a synchronization.
Additional information —
Transition statement — Unfortunately, it seems that there is a problem.
Uempty
usa uk india
X X
Y Y
Z Z
Notes:
Removing a node
In this scenario, we take a look at how to remove a node from an HACMP cluster.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Set the stage for the next scenario: removing a node from a cluster.
Details —
Additional information —
Transition statement — So, how exactly do you remove a node from a cluster?
Uempty
Notes:
Removing a node
Although removing a node from a cluster is another fairly involved process, some of the
work has little, if anything, to do with HACMP.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the process involved in removing a node from a cluster.
Details — Point out that this is basically the reverse of the procedure for adding a node to
the cluster.
Additional information — Removing the dearly departed node from the
/usr/es/sbin/cluster/etc/rhosts file is very important because this is what prevents the
departed node from being used to fiddle with the cluster’s configuration in the future!
Transition statement — We’re not going to show you these screens because there is
really not much that is new or particularly interesting in them. On the other hand, the
zwebgroup resource group has become an issue.
Uempty
Removing an application
Ɣ The zwebserver application has been causing problems and a
decision has been made to move it out of the cluster
usa uk
X X
Y Y
Z Z
Notes:
Removing an application
In this scenario, we remove a resource group.
It looks like this imaginary organization could do with a bit more long range planning.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Set the stage for the next scenario: removing a resource group.
Details —
Additional information —
Transition statement — Let’s see what it takes to remove a resource group.
Uempty
Notes:
Introduction
The procedure for removing a resource group is actually fairly straightforward.
Cluster snapshot
HACMP supports something called a cluster snapshot. This would be an excellent time
to take a cluster snapshot, just in case we decide to go back to the old configuration.
We will discuss snapshots later in this unit.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
the case of shared volume groups, tie up physical resources, that could presumably be
better used elsewhere.
A cluster should not have any “useless” resources or components because anything
that simplifies the cluster tends to improve availability by reducing the likelihood of
human error.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
+--------------------------------------------------------------------------+
¦ Select a Resource Group ¦
¦ ¦
¦ Move cursor to desired item and press Enter. ¦
¦ ¦
¦ xwebgroup ¦
¦ ywebgroup ¦
¦ zwebgroup ¦
¦ ¦
¦ F1=Help F2=Refresh F3=Cancel ¦
¦ F8=Image F10=Exit Enter=Do ¦
F1¦ /=Find n=Find Next ¦
F9+--------------------------------------------------------------------------+
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
+--------------------------------------------------------------------------+
¦ ARE YOU SURE? ¦
¦ ¦
¦ Continuing may delete information you may want ¦
¦ to keep. This is your last chance to stop ¦
¦ before continuing. ¦
¦ Press Enter to continue. ¦
¦ Press Cancel to return to the application. ¦
¦ ¦
¦ F1=Help F2=Refresh F3=Cancel ¦
F1¦ F8=Image F10=Exit Enter=Do ¦
F9+--------------------------------------------------------------------------+
Press Enter (if you are sure). Be sure to synchronize and run
through validation testing.
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
1. True or False?
You cannot add a node while HACMP is running.
2. You have decided to add a third node to your existing two-
node HACMP cluster. What very important step follows
adding the node definition to the cluster configuration
(whether through Standard or Extended Path)?
a. Take a well deserved break, bragging to co-workers about
your success.
b. Install HACMP software.
c. Configure a non-IP network.
d. Start Cluster Services on the new node.
e. Add a resource group for the new node.
3. Why would you choose to use the Extended Path to add
resources to a resource group versus the Standard Path?
__________________________________________________
© Copyright IBM Corporation 2008
Notes:
1. True or False?
You cannot add a node while HACMP is running.
2. You have decided to add a third node to your existing two-
node HACMP cluster. What very important step follows
adding the node definition to the cluster configuration
(whether through Standard or Extended Path)?
a. Take a well deserved break, bragging to co-workers about
your success.
b. Install HACMP software.
c. Configure a non-IP network.
d. Start Cluster Services on the new node.
e. Add a resource group for the new node.
3. Why would you choose to use the Extended Path to add
resources to a resource group versus the Standard Path?
If you need access to the fields that are not shown in the Standard Path (like for
NFS or to set “Filesystems mounted before IP configured”).
__________________________________________________
© Copyright IBM Corporation 2008
Additional information —
Transition statement — In the next topic, we’ll look at change management in a cluster
and how C-SPOC can be used to help with that.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Introduction
You must develop good change management procedures for managing an HACMP
cluster. As you will see, C-SPOC utilities can be used to help, but do not do the job by
themselves. Having well documented and tested procedures to follow, as well as
restricting who can make changes (for example you should not have more than two or
three persons with root privileges) minimizes loss of availability when making changes.
The snapshot utility should be used before any change is made.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Recommendations
Ɣ Implement and adhere to a change control/management
process
Ɣ Wherever possible, use HACMP's C-SPOC facility to make
changes to the cluster (details to follow)
Ɣ Document routine operational procedures in a step-by-step list
fashion (for example, shutdown, startup, increase size of a
filesystem)
Ɣ Restrict access to the root password to trained High Availability
cluster administrators
Ɣ Always take a snapshot (explained later) of your existing
configuration before making a change
Notes:
Uempty • As the cluster administrator you should make yourself part of every change
meeting that occurs on your HACMP systems.
• Think about the implications of the change on the cluster configuration and
function, keeping in mind the networking concepts we’ve discussed as well as
any changes to the application’s data organization or start/stop procedures.
- The onus should be on the requester of the change to demonstrate that it is
necessary; not on the cluster administrators to demonstrate that it is unwise
- Management must support the process.
• Defend cluster administrators against unreasonable request or pressure.
• Do not allow politics to affect a change's priority or schedule.
- Every change, even the minor ones, must follow the process.
• No system, cluster, or database administrator can be allowed to sneak
changes past the process.
• The notion that a change might be permitted without following the process must
be considered to be absurd.
Other recommendations
Ensure that you request sufficient time during the maintenance window for testing the
cluster. If this isn’t possible, advise all parties of the risks of running without testing.
Update any documentation as soon as possible after the change is made to reflect the
new configuration or function of the cluster, if anything changes.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — List some basic recommendations for cluster administration practices.
Details — Make it clear that these are not necessarily sufficient in all situations.
Additional information —
Transition statement — Now that we have discussed change management, let’s look at
C-SPOC itself and how it works.
Uempty
Target Target
node node
Initiating
node
Target Target
node node
Notes:
More details
All the nodes in the resource group must be available or the C-SPOC command will be
performed partially across the cluster, only on the active nodes. This can lead to
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
problems later when nodes are brought up and are out of sync with the other nodes in
the cluster.
As you saw in the LVM unit, LVM changes, if made through C-SPOC, can be
synchronized automatically (for enhanced concurrent mode volume groups, and then
only the LV information, not the filesystem information).
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Uempty You have a choice of any or all nodes in the cluster to start services. Use F4 to get a
pick list. If the field is left blank, services will be started on all nodes.
When Cluster Services is started, it “wants” to acquire resources in Resource Groups, if
so configured, and make applications available. Beginning with HACMP V5.4, the
function of managing resource groups can be deferred. The option to choose in that
case is Manually. To allow Cluster Services to acquire resources and make
applications available if so configured (pre-HACMP v5.4 behavior), choose the default,
Automatically.
You can broadcast a message that cluster services are being started.
You have the option to start the Client Information Daemon, clinfo, along with the start of
Cluster Services. This is usually a good idea as it allows you to use the clstat cluster
monitor utility.
Finally, there are options regarding verification. Before Cluster Services is started, a
verification is run to ensure that you are not starting a node with an inconsistent
configuration. You can choose to ignore verification errors and start anyway. This is not
something that you would do unless you are very aware of the reason for the
verification error, you understand the ramifications of starting with the error and you
must activate Cluster Services. An alternative that is safer would be to choose to
Interactively correct errors found during verification. Not all errors can be corrected,
but you have a better chance of getting cluster services activated in a clean
configuration with this option.
The options that you choose here are retained in the HACMP ODM and repopulated on
reentry.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the SMIT menu to start cluster services.
Details — Focus on the option to manage resource groups.
Additional information —
Transition statement — How do I know that Cluster Services has started?
Uempty
Also consider using the cldump command. This relies solely on SNMP to get the
current cluster status.
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
It’s easy to encourage patience when writing a course. The author is extremely
impatient and rarely follows his own advice. That doesn’t make it right! I have learned
the value of patience the hard way, by not being patient and paying the price.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Base Cluster Logs
The cluster.log file is a good starting point to see what events have been run. You can also
see errors and timestamps to help in navigating the hacmp.out log file. It can be said that
looking at the hacmp.out file is as much art as it is science. The more you become
comfortable with what you expect to see, the easier it will be to navigate. As you see, the
format of the entries helps you to understand what is being done, on what resource and
how long it’s been running.
More detailed log
You might also want to consult the clstrmgr.debug log too. This is the Cluster Manager
daemon log. It can be difficult to understand as it’s very detailed internal processing, but
error messages found here might be useful as well as an understanding of whether the
Cluster Manager is busy doing something even when no event processing is occurring.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Uempty You have a choice of any or all nodes in the cluster to stop services. Use F4 to get a
pick list. If the field is left blank, services will be stopped on all nodes.
You can broadcast a message that cluster services are being stopped.
Finally, the options regarding Resource Group management. Prior to HACMP V5.4, the
options were graceful, takeover and, forced. Graceful meant to Bring Resource Groups
Offline prior to stopping cluster services. Takeover meant to Move Resource Groups to
other available nodes, if applicable, according to the current locations and Fallover
policies of the Resource Groups. As you can see, these options map directly to the
current options and their functions are self-explanatory.
But what about forced down you say? Prior to HACMP V5.4, forcing down Cluster
Services was supported sometimes, in some scenarios, and resulted in an environment
that was potentially unstable (that is, potentially unavailable), Forcing cluster services
down when using Enhanced Concurrent Mode Volume Groups was not supported
because Group Services and gsclvmd were brought down as part of the forced down
operation. Group Services and gsclvmd are the components that maintain the volume
group’s VGDA/VGSA integrity across all nodes. With HACMP V5.4 and later, forcing
down cluster services is supported by moving the resource groups to an Unmanaged
state. In addition, the cluster manager and the RSCT infrastructure remain active
permitting this action with Enhanced Concurrent Mode Volume Groups; thus, the option
in the menu shown, Unmanage Resource Groups. While in this state, the cluster
manager remains in the ST_STABLE state. It doesn’t die gracefully and respawn as
stated earlier and doesn’t return to the ST_INIT state. This allows the Cluster Manager
to participate in cluster activities and keep track of changes that occur in the cluster.
As with starting cluster services, the options that you choose here are retained in the
HACMP ODM and repopulated on reentry.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the SMIT menu to stop cluster services.
Details — Cover the resource group management options thoroughly, making sure that
students understand the correlation to past options and the functions that are performed.
Take time to ensure that the Unmanaged state is understood. Having a reliable forced
down option will probably be welcome by many students who are veterans of HACMP, so
be prepared to answer questions and take some time.
Additional information —
Transition statement — But how do I know that cluster services has stopped?
Uempty
uk # clstat -a
clstat - HACMP Cluster Status Monitor
usa # lssrc -ls clstrmgrES
-------------------------------------
Current state: ST_INIT
Cluster: ibmcluster (1156578448)
Wed Aug 30 10:44:20 2006
State: UP Nodes: 2
SubState: STABLE
Ɣ Same three rules
Node: usa State: DOWN 1. patience
Interface: usaboot1 (2) Address:
192.168.15.29 2. patience
State: DOWN
Interface: usaboot2 (2) Address:
3. patience
192.168.16.29
State: DOWN
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Node: usa
Interface: usaboot1 (2)
State: UP
Address: 192.168.15.29
Ɣ Ditto on the rules
State: UP
…
Interface: xweb (2) Address: 192.168.5.92
State: UP
Resource Group: xwebgroup State: Unmanaged
Notes:
Uempty Again, the clstat utility can be a good mechanism to use. Note that it was run on another
system, not the one where cluster services was stopped. Notice that the resource group
shows online. This is valid. It also shows the state as Unmanaged. You only stopped
Cluster Services, not the resources.
The quickest way to see that there are unmanaged resources is to use clRGinfo. Note
that is shows the state of the resource group as Unmanaged on both nodes. In fact, it
will show Unmanaged on any node where that resource group can acquired if this is not
an “online on all nodes” startup policy resource group. It will show Unmanaged only on
the node where Cluster Services was stopped if the resource group startup policy is
“online on all nodes.”
As in the previous slides on verifying the state, another option is to use WebSMIT. This
is the solution for those of you who want to see a graphical representation of cluster
status. You will see more of that later in this unit.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain what is to be checked to verify that cluster services has stopped when
Unmanaged resource groups are involved.
Details — Again take time because of the way this behaves. Pay close attention to the fact
that clstat shows the node and resources up with the state of the resource group set to
Unmanaged and that the state of the Cluster Manager daemon is still ST_STABLE. For
those familiar with HACMP prior to V5.4, this was an indication that Cluster Services were
active. That is no longer true. The truest way to see Unmanaged is via clRGinfo -p.
Additional information —
Transition statement — Let’s look at the most important of the C-SPOC menus, those for
LVM management.
Uempty
Notes:
Introduction
This is the menu for using C-SPOC to perform LVM change management and
synchronization. As was mentioned in the LVM unit, you can make changes in AIX
directly and then synchronize or, if you can make the changes using C-SPOC utilities,
where the synchronization is automatic.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-93
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
How it works
When you create a shared volume group, you must rerun the discovery mechanism
(refer to top-level menu in the enhanced configuration path) to get HACMP to know
about the volume group. You must then add the volume group to a resource group
before you can use C-SPOC to add shared logical volumes or filesystems.
Synchronization
Note that you only need to add the volume group to a resource group using SMIT from
one of the cluster nodes, and then you can start working with C-SPOC from the same
node. You do not need to synchronize the cluster between adding the volume group to a
resource group and working with it using C-SPOC unless you want to use C-SPOC
from some other node. Remember that the volume group is not really a part of the
resource group until you synchronize the addition of the volume group to the resource
group.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-95
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
[Entry Fields]
Node Names usa,uk
PVID 00055207bbf6edab 0000>
VOLUME GROUP name [xwebvg]
Physical partition SIZE in megabytes 64 +
Volume group MAJOR NUMBER [207] #
Enhanced Concurrent Mode true +
Enable Cross-Site LVM Mirroring Verification false +
Warning :
Changing the volume group major number may result
in the command being unable to execute
successfully on a node that does not have the
major number currently available. Please check
for a commonly available major number on all nodes
before changing this setting.
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-97
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-99
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
The volume group must be in a resource group that is online; otherwise, it does not display in the pop-up
list. © Copyright IBM Corporation 2008
Notes:
Uempty present; otherwise, it creates a new log logical volume) and adds the file system to
the node where the volume group is varied on (whether it was varied on by the
C-SPOC utility or it was already online). All other nodes in the resource group run an
importvg -L for non-enhanced concurrent mode volume groups, or an imfs for
enhanced concurrent mode volume groups.
- A previously defined cluster logical volume (in a shared volume group)
SMIT checks the list of nodes that can own the resource group that contains the
volume group where the logical volume is located. It adds the file system to the node
where the volume group is varied on (whether it was varied on by the C-SPOC utility
or it was already online). All other nodes in the resource group run an importvg -L
for non-enhanced concurrent mode volume groups, or an imfs for enhanced
concurrent mode volume groups.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-101
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show how to create a shared file system using C-SPOC.
Details — As in student notes.
Additional information — Note that the HA manuals say that the highly available NFS
server capability of HACMP does not support the exporting of JFS2 file systems that have
an inline log. However, we have heard that the manuals are wrong about this and that
HACMP now does support inline logs. Don’t know when this changed.
We used to recommend that: “To allow for the possibility that you might choose to export a
JFS2 filesystem in the future, it is generally best to always use external JFS2 log logical
volumes with JFS2 file systems.”
Transition statement — Now that we’ve got the file system’s logical volume and a JFS log
logical volume, let’s create the file system.
Uempty
[Entry Fields]
Node Names usa,uk
LOGICAL VOLUME name xweblv
* MOUNT POINT [/xwebfs]
PERMISSIONS read/write +
Mount OPTIONS [] +
Block Size (bytes) 4096 +
Inline Log? no +
Inline Log size (MBytes) [] #
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-103
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the C-SPOC screen for creating a file system on an existing logical
volume.
Details —
Additional information —
Transition statement — Let’s take a look at the very important issue of change
management.
Uempty
VGDA = ODM
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-105
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-107
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
#exportvg sharedvg
#importvg -V123 -y sharedvg hdisk3
#chvg -an sharedvg
#varyoffvg sharedvg
Notes:
After making a change to an LVM component, such as creating a new logical volume and
file system as shown in the figure, you must propagate the change to the other nodes in the
cluster that are sharing the volume group using the steps described. Make sure that the
auto activate is turned off (chvg -an sharedvg) after the importvg command is executed
because the cluster manager will control the use of the varyonvg command on the node
where the volume group should be varied on.
Other than the sheer complexity of this procedure, the real problem with it is that it requires
that the resource group be down while the procedure is being carried out.
Fortunately, there are better ways...
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-109
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
11 12 1 11 12 1
10 2 10 2
9 3 9 3
8 4 8 4
7 6 5 7 6 5
Notes:
HACMP has a facility called Lazy Update that it uses to attempt to synchronize LVM
changes during a fallover.
HACMP uses a copy of the timestamp kept in the ODM and a timestamp from the volume
group’s VGDA. AIX updates the ODM timestamp whenever the LVM component is
modified on that system. When a cluster node attempts to vary on the volume group,
HACMP for AIX compares the timestamp from the ODM with the timestamp in the VGDA
on the disk (use /usr/es/sbin/cluster/utilities/clvgdata hdiskn to find the VGDA timestamp for
a volume group). If the values are different, the HACMP for AIX software exports and
re-imports the volume group before activating it. If the timestamps are the same, HACMP
for AIX activates the volume group without exporting and re-importing. The time needed for
takeover expands by a few minutes if a Lazy Update occurs.
This method requires no downtime; although, as indicated, it does increase the fallover
time minimally for the first fallover after the LVM change was made.
Uempty Realize though that this mechanism will not fix every situation where nodes are
out-of-sync. Further, having the takeover process fix problems with the LVM meta-data at
takeover time is not the preferred method of handling the synchronization.
To preserve permissions/ownership over an import, the volume group must be a Big or
Scalable VG and the logical volumes must be modified using chlv with the -U (for user id),
-G for group id, -P (for permissions) flags. The importvg must be done with a -R.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-111
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain the Lazy Update Facility in HACMP.
Details —
Additional information —
Transition statement — The third method to make changes is to use C-SPOC
synchronization.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-113
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-115
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-117
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
You can use C-SPOC to both make the change and to distribute the change.
This approach has two major advantages: no downtime is required and you can be
confident that the nodes are in sync. It might take a little longer to run than the normal chfs
application, but it is well worth the wait.
Other C-SPOC screens exist for pretty much any operation that you are likely to want to do
with a shared volume group.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-119
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
+--------------------------------------------------------------------------+
¦ File System Name ¦
¦ ¦
¦ Move cursor to desired item and press Enter. ¦
¦ ¦
¦ # Resource Group File System ¦
¦ xwebgroup /xwebfs ¦
¦ ¦
¦ ¦
¦ F1=Help F2=Refresh F3=Cancel ¦
¦ F8=Image F10=Exit Enter=Do ¦
F1¦ /=Find n=Find Next ¦
F9+--------------------------------------------------------------------------+
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-121
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
[Entry Fields]
Resource Group Name xwebgroup
File system name /xwebfs
NEW mount point [/xwebfs]
SIZE of file system (in 512-byte blocks) [4000000]
Mount GROUP []
PERMISSIONS read/write +
Mount OPTIONS [] +
Start Disk Accounting? no +
Block Size (bytes) 4096
Inline Log? no
Inline Log size (MBytes) 0
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-123
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-125
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
– Obvious problem is that the behavior of the Resource Group might be unexpected in
that it might contradict the policy in the Resource Group
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-127
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain the old priority override location concept.
Details — We do not discuss the rules for the concurrent resource groups (resource
groups whose startup policy is Online on All Available Nodes) because add yet another
layer of complexity to an already complex issue and very few students ever have anything
to do with concurrent access resource groups.
Additional information — Be prepared to discuss the rules for concurrent access
resource groups if a student needs or wants to know what they are (refer to Chapter 15 of
the HACMP for AIX Administration Guide for more information).
Transition statement — HACMP 5.4 introduced a further simplification of the POL.
Uempty
Ɣ Changes to /usr/es/sbin/cluster/utilities/clRGinfo –p
– Now shows location of “temporary” highest priority and timestamp of move
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-129
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain the new priority override location concept.
Details — We do not discuss the rules for the concurrent resource groups (resource
groups whose startup policy is Online on All Available Nodes) because they add yet
another layer of complexity to an already complex issue and very few students ever have
anything to do with concurrent access resource groups.
Additional information — Be prepared to discuss the rules for concurrent access
resource groups if a student needs or wants to know what they are (refer to Chapter 15 of
the HACMP for AIX Administration Guide for more information).
Transition statement — Now that we’ve got an idea about the priority override location,
let’s take a look at moving a resource group.
Uempty
ňņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņʼn
Ň Select a Destination Node Ň
Ň Ň
Ň Move cursor to desired item and press Enter. Ň
Ň Ň
Ň Ň
Ň # *Denotes Originally Configured Highest Priority Node Ň
Ň *usa Ň
Ň uk Ň
Ň india Ň
Ň Ň
Ň F1=Help F2=Refresh F3=Cancel Ň
Ň F8=Image F10=Exit Enter=Do Ň
F1Ň /=Find n=Find Next Ň
F9Ŋņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņŋ
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-131
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
For HACMP 5.3 and earlier, if Persist Across Cluster Reboot is set to true, then the
priority override location will be persistent. Otherwise, it will be non-persistent.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-133
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
[Entry Fields]
Resource Group to be Moved xwebgroup
Destination Node uk
Notes:
This screen follows; press enter to move the xwebgroup to the uk node.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-135
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-137
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
ňņņņņņņņņņņņņņ-ņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņʼn
Ň Select an Online Node Ň
Ň Ň
Ň Move cursor to desired item and press Enter. Ň
Ň Ň
Ň uk Ň
Ň Ň
Ň F1=Help F2=Refresh F3=Cancel Ň
Ň F8=Image F10=Exit Enter=Do Ň
F1Ň /=Find n=Find Next Ň
F9Ŋņņņņņņņņņņņņ-ņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņņŋ
Notes:
Now choose the node where the resource group will be taken offline.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-139
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
[Entry Fields]
Resource Group to Bring Offline xwebgroup
Node On Which to Bring Resource Group Offline uk
The option to “persist across cluster reboot” is available prior to HACMP V5.4
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-141
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-143
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Figure 7-61. Log files generated by HACMP - before HACMP 5.4.1 AU548.0
Notes:
Log files
The visual summarizes the HACMP log files.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-145
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Figure 7-62. Log files generated by HAMCP - HACMP 5.4.1 and later AU548.0
Notes:
When installed from scratch, HACMP 5.4.1 will use /var/hacmp/log as the default for all log
files.
You can view the current settings through SMIT using the HACMP Log Viewing and
Management path.
Of course, if you install on top of an existing configuration, or apply a snapshot, your
settings will be preserved; however, if you want to redirect all log files there is a new SMIT
path that enables you to redirect them all at once.
HACMP uses korn shell scripts to perform recovery operations. An effort was made in
HACMP 5.4.1 to clean up these scripts and consolidate the use of things like “VERBOSE
LOGGING”, “set –x” and the PS4 settings. This produces more consistent results in
hacmp.out and makes it easier to read and follow.
Similarly for key components such as clcomd and clver, the logging was made more
consistent.
Uempty The clsnap command was also updated to collect everything needed at the same time
rather than multiple commands and multiple options.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-147
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Address the log file changes that occurred in HACMP 5.4.1 and will be present
in future releases.
Details —
Additional information —
Transition statement — Okay, any questions for me? If not, let’s review.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-149
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Topic review. Let’s look at the solutions.
Details —
Additional information —
Transition statement — HACMP has the ability to make many types of changes to a
cluster while the cluster remains online. In the next topic, we take a look at how HACMP
can do that.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-151
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-153
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Dynamic reconfiguration
Ɣ HACMP provides a facility that allows changes to cluster
topology and resources to be made while the cluster is active.
Ɣ This facility is known as DARE.
Ɣ DARE requires three copies of the HACMP ODM.
Notes:
How it works
Dynamic Reconfiguration is made possible by the fact that HACMP holds three copies
of the ODM, known as the Default, Staging, and Active configuration directory. By
holding three copies of the ODM, HACMP can make changes on one node and
propagate them to other nodes in the cluster while an active configuration is currently
being used.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-155
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-157
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Topology Changes
Change the name of the cluster
Change the name of a cluster node
Change a communication interface attribute
Changing whether a network uses IPAT via IP aliasing or via IP replacement
Change the name of a network module
Add a network interface module
Removing a network interface module
Resource Changes
Change the name of a resource group
Change the name of an application server
Change the node relationship
Ɣ DARE cannot run if two nodes are not at the same HACMP level
Notes:
Limitations
Some changes require a restart of Cluster Services.
Also, DARE requires that all nodes are at the same HACMP level.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-159
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
HACMP HACMP
Move cursor to desired item and press Enter. Move cursor to desired item and press Enter.
SCD
F1=Help F2=Refresh F3=Cancel Esc+8=Image F1=Help F2=Refresh F3=Cancel Esc+8=Image
Esc+9=Shell Esc+0=Exit Enter=Do Esc+9=Shell Esc+0=Exit Enter=Do
Type
text
Notes:
How it works
DARE uses three copies of the HACMP ODM to propagate live updates to the cluster
topology or resource configuration across the cluster. This is done in five steps detailed
above. Although it is possible to make a nearly arbitrarily large set of changes to the
configuration and then synchronize them all in one operation, it is usually better to make
a modest change, synchronize it, verify that it works, and then move on to more
changes.
Note that many changes are incompatible with the cluster’s current AIX configuration.
Such changes are, therefore, not possible to synchronize using DARE. Instead, the
cluster has to be taken down while the appropriate AIX configuration changes are
applied. (It is sometimes possible to remove some resources from a resource group,
synchronize, change the AIX configuration of the resources, add them back into the
resource group, and synchronize again; although, there is likely to be little point in
running the resource group without the resources).
Uempty HACMP 5.x synchronizes both topology changes and resource changes whenever it is
run. This is a change from previous releases of HACMP.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-161
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain the steps in DARE.
Details — Talk the students through the sequence of events for a DARE operation. Point
out that the ACD is copied to a snapshot before the change takes effect and that the SCD
is only cleared once the change has been committed on all nodes in the cluster.
Additional information — HACMP 5.x makes no distinction between synchronizing the
cluster’s topology and synchronizing the cluster’s resources.
Transition statement — So, when the SMIT panel has been edited on one of our cluster
nodes, we have to synchronize the new configuration.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-163
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the standard configuration path’s menu entry for verifying and
synchronizing the HACMP configuration.
Details — As in the student notes.
Additional information —
Transition statement — The extended configuration path’s verification and
synchronization mechanism is more flexible.
Uempty
Notes:
Emulate or actual
The default of Actual causes the changes being verified and synchronized to “take
effect” (become the actual cluster configuration) if the verification succeeds. Setting this
field to Emulate causes HACMP to verify and then go through the motions of a
synchronize without actually causing the changes to take effect. This is useful to get a
sense of what side effects the synchronization is likely to result in. For example, if the
proposed change would trigger a fallover or a fallback (because node priorities have
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-165
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Logging
This field can be set to Standard to request the default level of logging or to Verbose to
request a more, ummmm, verbose level of logging! If you are having problems getting a
change to verify and do not understand why it will not verify, then setting the logging
level to Verbose might provide additional information.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-167
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Rolling back an unwanted change that has not yet been synchronized
If you have made changes that you have decided to not synchronize, they can be
discarded using the Restore HACMP Configuration Database from Active
Configuration menu entry shown above. It is located under the Problem
Determination Tools menu (accessible from the top-level HACMP SMIT menu).
Prior to rolling back the DCD on all nodes, the current contents of the DCD on the node
used to initiate the roll back is saved as a snapshot (in case they should prove useful in
the future). The snapshot will have a rather long name similar to:
Restored_From_ACD.Sep.18.19.33.58
This name can be interpreted to indicate that the snapshot was taken at 19:33:58 on
September 18th (the year is not preserved in the name).
Because the change being discarded is sometimes a change that has been emulated,
this operation is sometimes called rolling back an emulated change. This is a misnomer
Uempty as the operation rolls back any change that has not yet been verified and synchronized
by restoring all node’s DCDs to the contents of the currently active cluster configuration.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-169
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain how you can roll back from an unwanted change that has not yet been
synchronized.
Details —
Additional information —
Transition statement — But, what if you actually did the synchronize and then found that
you wanted to roll back?
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-171
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-173
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
HACMP HACMP
Move cursor to desired item and press Enter. Move cursor to desired item and press Enter.
SCD
F1=Help F2=Refresh F3=Cancel Esc+8=Image F1=Help F2=Refresh F3=Cancel Esc+8=Image
Esc+9=Shell Esc+0=Exit Enter=Do Esc+9=Shell Esc+0=Exit Enter=Do
Type
text
Bang!
Notes:
Uempty running with different configurations, a situation that results in one or more cluster
nodes crashing).
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-175
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce the concept of the SCD acting as a dynamic reconfiguration lock.
Details — More details on this can be found in the HACMP Concepts and Facilities Guide.
Additional information —
Transition statement — So, how do we clean out the SCD?
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-177
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain how we can clear out the SCD.
Details — Run this SMIT menu only in situations where DARE changes were not
successfully synchronized because of a node crash at a bad moment.
Additional information —
Transition statement — Okay, any questions for me? If not, let’s review.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-179
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Let’s review questions.
Details —
Additional information —
Transition statement — The next topic discusses WebSMIT, a convenient Web-based
interface to SMIT.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-181
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Implementing WebSMIT
After completing this topic, you should be able to:
Ɣ Configure and use WebSMIT
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-183
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Web-enabled SMIT
Ɣ HACMP 5.2 and up includes a web-enabled user interface that
provides easy access to:
– HACMP configuration and management functions
– Interactive cluster status display and manipulation
– HACMP online documentation
Ɣ The Web-enabled SMIT (WebSMIT) interface is similar to the
ASCII SMIT interface. You do not need to learn a new user
interface or terminology and can easily switch between ASCII
SMIT and WebSMIT
Ɣ To use the WebSMIT interface, you must configure and run a
Web server process on the cluster nodes to be administered
– The configuration has been made simpler with HACMP 5.4 and later
• Use websmit_config utility
Notes:
Introduction
WebSMIT combines the advantages of SMIT with the ease of access from any system
that runs a browser.
For those looking for a graphical interface for managing and monitoring HACMP,
WebSMIT provides those capabilities via a Web browser. It provides real-time graphical
status of the cluster components, similar to the clstat.cgi. It also provides context menu
access to those components to control by launching a WebSMIT menu containing the
action or actions to take. There are multiple views, Node-by-node, Resource Group,
Associations, component Details, and so on.
Configuration
This utility uses snmp; so it is imperative that you have your snmp interface to the
cluster manager functioning. To test that, attempt a cldump command on the system
Uempty where you will be running the WebSMIT utility. A configuration utility is provided
(websmit_config) requiring that only a supported HTTP server be installed to configure
the system for use as a WebSMIT server. A robust control tool is provided as well to
control the HTTP server functioning. The tool is called websmitctl. Check it out in lab.
Features
- Off-line/Unavailable status is displayed as “grayed out.”
- Most WebSMIT items can be assigned a custom color set.
- Auto-configuration improvements.
- Language support is more sophisticated.
- An “instant help” system.
- Resource-type awareness in the display.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-185
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce WebSMIT.
Details —
Additional information —
Transition statement — The next visual shows the WebSMIT main page.
Uempty
Notes:
Introduction
To connect to WebSMIT, point your browser to the cluster node that you have
configured for WebSMIT.
WebSMIT uses port 42267 by default.
After authentication, this will be the first screen that you see. Note the Navigation Frame
(left side) and the Activity Frame (right side). Also, note that we’re looking at
configuration options only. Each pane is tabulated to provide access to different status,
functions or controls.
Navigation Frame tabs:
- SMIT - access to HACMP SMIT
- N&N - a Node-by-node relationship and status view of the cluster (if snmp can get
cluster information)
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-187
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
- RGs - a Resource Group relationship and status view of the cluster status
Use the Expand All or Collapse All links to get the full view or clean up the view.
Activity Frame tabs:
- Configuration - permanent access to HACMP SMIT from Activity Frame
- Details - comes to top when a component is selected in Navigation Frame, and
displays configuration information about the component
- Associations - shows component relationship to other HACMP components for
component that is selected in the Navigation Frame
- Doc - If the HACMP pubs were installed (html or pdf version), this tab will display
links to access them
Don’t attempt to navigate using the browser’s Back or Forward buttons. Note the
FastPath box at the bottom of the Configuration tab. This allows you to go directly to
any (that is any) SMIT panel if you know the fastpath. What’s the fastpath to the SMIT
top menu?
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-189
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Status
Notice that the icons (on the screen anyway) indicate online (not grayed out) or offline
(grayed out). This is real-time status. More to come on the next visual, regarding the
associations.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-191
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
WebSMIT associations
Notes:
Associations
If you don’t click fast enough (or just pause long enough) between selecting the
Resource Group and clicking the Associations tab, you’ll see the Details tab come to
the top of the Activity Frame with the configuration details of the Resource Group.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-193
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Discuss the ability to see the relationships between the cluster components via
Associations.
Details —
Additional information —
Transition statement — Online Documentation allows you to view the HACMP manuals.
Uempty
Notes:
Online documentation
This screen enables you to view the HACMP manuals in either HTML or PDF format.
You must install the HACMP documentation file sets.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-195
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Discuss the Online Documentation screen.
Details —
Additional information —
Transition statement — Finally, let’s look at simple configuration process.
Uempty
WebSMIT configuration
Ɣ Base Directory is /usr/es/sbin/cluster/wsm
Ɣ Consult the documentation
– Readme located at /usr/es/sbin/cluster/wsm/README
– Manuals installed from cluster.doc.en_US.es.html and cluster.doc.en_US.es.pdf
• Configure and run a Web server on cluster nodes
– ./websmit_config takes it from there
Ɣ Optionally, implement stricter security
– Customize ./wsm_smit.conf
– Setuid program ./cgi-bin/wsm_cmd_exec permissions must be set correctly
Ɣ Consult log files for progress status
– ./logs/wsm_smit.log
– ./logs/wsm_smit.script
Ɣ Optionally, control the SMIT panels that can be accessed
– ./wsm_smit.allow
– ./wsm_smit.deny
– ./wsm_smit.redirect
Notes:
Documentation
The primary source for information on configuring WebSMIT is the WebSMIT README
file as shown in the visual. The HACMP Planning and Installation Guide provides some
additional information on installation and the HACMP Administration Guide provides
information on using WebSMIT.
Web server
To use WebSMIT, you must configure one (or more) of your cluster nodes as a Web
server. You must use either IBM HTTP Server (IBMIHS) V6.0 (or later) or Apache 1.3
(or later). Refer to the specific documentation for the Web server you choose.
This configuration is done using the websmit_config utility, located in
/usr/es/sbin/cluster/wsm. See the README file for details.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-197
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
WebSMIT security
Because WebSMIT gives you root access to all the nodes in your cluster, you must
carefully consider the security implications.
WebSMIT uses a configuration file, wsm_smit.conf, that contains settings for
WebSMIT's security related features. This file is installed as
/usr/es/sbin/cluster/wsm/wsm_smit.conf, and it may not be moved to another location.
The default settings used provide the highest level of security in the default AIX/Apache
environment. However, you should carefully consider the security characteristics of your
system before putting WebSMIT to use. You might be able to use different combinations
of security settings for AIX, Apache, and WebSMIT to improve the security of the
application in your environment.
WebSMIT uses the following configurable mechanisms to implement a secure
environment:
- Non-standard port
- Secure http (https)
- User authentication
- Session time-out
- wsm_cmd_exec setuid program
• Use non-standard port
WebSMIT can be configured to allow access only over a specified port using the
wsm_smit.conf AUTHORIZED_PORT setting. If you do not specify an AUTHORIZED_PORT,
or specify a port of 0, then any connections via any port will be accepted. It is strongly
recommended that you explicitly specify the AUTHORIZED_PORT, and that you use a
non-standard port. The default setting for this configuration variable is 42267.
• Allow only secure http
If your HTTP server supports secure HTTP, it is strongly recommended that you require
all WebSMIT connections to be established via HTTPS. This will ensure that you are
not transmitting sensitive information about your cluster over the Internet in plain text.
WebSMIT can be configured to require secure http access using the wsm_smit.conf
REDIRECT_TO_HTTPS setting. If the value for this setting is 1, then users connecting to
WebSMIT via an insecure connection will be redirected to a secure http connection.
The default value for REDIRECT_TO_HTTPS is 1.
Note: Regarding the REDIRECT_TO_HTTPS variable, the README file states:
“This variable will only function correctly if the AUTHORIZED_PORT feature is disabled.”
This did not appear to be true in our testing.
• Require user authentication
If Apache's built-in authentication is not being used, WebSMIT can be configured to use
AIX authentication using the wsm_smit.conf file REQUIRE_AUTHENTICATION setting. If
the value for this setting is 1 and there is no .htaccess file controlling access to
Uempty WebSMIT, the user will be required to provide AIX authentication information before
gaining access.
(Refer to the documentation included with Apache for more details about Apache's
built-in authentication.)
The default value for REQUIRE_AUTHENTICATION is 1. If REQUIRE_AUTHENTICATION is
set, then the HACMP administrator must specify one or more users who are allowed to
access the system. This can be done using the wsm_smit.conf ACCEPTED_USERS
setting. Only users whose names are specified will be allowed access to WebSMIT, and
all ACCEPTED_USERS will be provided with root access to the system. By default, only the
root user is allowed access via the ACCEPTED_USERS setting.
Warning
Because AIX authentication mechanisms are in use, login failures can cause an account to
be locked. It is recommended that a separate user be created for the sole purpose of
accessing WebSMIT. If the root user has a login failure limit, failed WebSMIT login attempts
could quickly lock the root account.
• Session time-out
Continued access to WebSMIT is controlled through the use of a non-persistent session
cookie. Cookies must be enabled in the client browser in order to use AIX
authentication for access control. If the session is used continuously, then the cookie
will not expire. However, the cookie is designed to time out after an extended period of
inactivity. WebSMIT allows the user to adjust the time-out period using the
wsm_smit.conf SESSION_TIMEOUT setting. This configuration setting must have a value
expressed in minutes. The default value for SESSION_TIMEOUT is 20 (minutes).
• Controlling access to wsm_cmd_exec (setuid)
A setuid program is supplied with WebSMIT that allows non-root users to execute
commands with root permissions (wsm_cmd_exec). The setuid bit for this program must
be turned on in order for the WebSMIT system to function.
For security reasons, wsm_cmd_exec must not have read permission for non-root users.
Do not allow a non-root user to copy the executable to another location or to
“decompile” the program.
Thus the utility wsm_cmd_exec (located in /usr/es/sbin/cluster/wsm/cgi-bin/) must be
set with 4511 permissions.
See the README for details.
Care must be taken to limit access to this executable. WebSMIT allows the user to
dictate the list of users who are allowed to use the wsm_cmd_exec program using the
wsm_smit.conf REQUIRED_WEBSERVER_UID setting. The real user ID of the process
must match the UID of one of the users listed in wsm_smit.conf for the program to
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-199
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
carry out any of its functionality. The default value for REQUIRED_WEBSERVER_UID is
nobody.
By default, a Web server CGI process runs as user nobody, and by default, non-root
users cannot execute programs as user nobody. If your HTTP server configuration
executes CGI programs as a different user, it is important to ensure that the
REQUIRED_WEBSERVER_UID value matches the configuration of your Web server. It is
strongly recommended that the HTTP server be configured to run CGI programs as a
user who is not authorized to open a login shell (as with user nobody).
Log files
All operations of the WebSMIT interface are logged to the wsm_smit.log file and are
equivalent to the logging done with smitty -v. Script commands are also captured in
the wsm_smit.script log file.
WebSMIT log files are created by the CGI scripts using a relative path of <../logs>. If
you copy the CGI scripts to the default location for the IBM HTTP Server, the final path
to the logs is /usr/HTTPServer/logs.
The WebSMIT logs are not subject to manipulation by the HACMP Log Viewing and
Management SMIT panel. Also, just like smit.log and smit.script, the files grow
indefinitely.
The snap -e utility captures the WebSMIT log files if you leave them in the default
location (/usr/es/sbin/cluster/wsm/logs); but if you install WebSMIT somewhere else,
snap -e will not find them.
Uempty - wsm_smit.deny
Entering a SMIT panel ID in this file will cause WebSMIT to deny access to that
panel. If the same SMIT panel ID is stored in both the .allow and .deny files, .deny
processing takes precedence.
- wsm_smit.redirect
Instead of simply rejecting access to a specific page, you can redirect the user to a
different page. The default .redirect file has entries to redirect the user from specific
HACMP SMIT panels that are not supported by WebSMIT.
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-201
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Discuss WebSMIT configuration
Details — There’s a lot of details here. You probably do not need to go through all of this in
detail. You should probably discuss the mechanisms for making WebSMIT secure in detail.
And just provide a quick summary of the other information.
Additional information —
Transition statement — Okay, we’re done with this unit (finally). Let’s do a Checkpoint to
review what we covered.
Uempty
Checkpoint
1. True or False?
A star configuration is a good choice for your non-IP networks.
2. True or False?
Using DARE, you can change from IPAT via aliasing to IPAT via
replacement without stopping the cluster.
3. True or False?
RSCT will automatically update /etc/filesystems when using enhanced
concurrent mode volume groups
4. True or False?
With HACMP V5.4, a resource group’s priority override location can be
cancelled by selecting a destination node of
Restore_Node_Priority_Order.
5. You want to create an Enhanced Concurrent Mode Volume Group that
will be used in a Resource Group that will have an “Online on Home
Node” Startup policy. Which C-SPOC menu should you use?
a. HACMP Logical Volume Management
b. HACMP Concurrent Logical Volume Management
6. You want to add a logical volume to the volume group you created in the
question above. Which C-SPOC menu should you use?
a. HACMP Logical Volume Management
b. HACMP Concurrent Logical Volume Management
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-203
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Checkpoint
Details —
Checkpoint solutions
1. True or False?
A star configuration is a good choice for your non-IP networks.
2. True or False?
Using DARE, you can change from IPAT via aliasing to IPAT via
replacement without stopping the cluster.
3. True or False?
RSCT will automatically update /etc/filesystems when using enhanced
concurrent mode volume groups
4. True or False?
With HACMP V5.4, a resource group’s priority override location can be
cancelled by selecting a destination node of
Restore_Node_Priority_Order.
5. You want to create an Enhanced Concurrent Mode Volume Group that
will be used in a Resource Group that will have an “Online on Home
Node” Startup policy. Which C-SPOC menu should you use?
a. HACMP Logical Volume Management
b. HACMP Concurrent Logical Volume Management
6. You want to add a logical volume to the volume group you created in the
question above. Which C-SPOC menu should you use?
a. HACMP Logical Volume Management
b. HACMP Concurrent Logical Volume Management
Additional information —
Transition statement — Let’s summarize this unit.
Uempty
Unit summary
Key points from this unit:
Ɣ Implementing procedures for change management is a critical part of
administering an HACMP cluster
Ɣ C-SPOC provides facilities for performing common cluster-wide
administration tasks from any node within the cluster:
– Perform routine administrative changes
– Start and stop cluster services
– Perform resource group move operations
– Start and stop cluster services
Ɣ The SMIT Standard and Extended menus are used to make topology
and resource group changes
Ɣ The Dynamic Automatic Reconfiguration Event facility (DARE)
provides the mechanism to make changes to cluster topology and
resources without stopping the cluster
Ɣ The Cluster Snapshot facility allows the user to save and restore a
cluster configuration
Ɣ WebSMIT provides access to HACMP SMIT menus from any system
with a Web browser
© Copyright IBM Corporation 2008
© Copyright IBM Corp. 1998, 2008 Unit 7. Basic HACMP administration 7-205
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Summarize the unit.
Details —
Additional information —
Transition statement — We’re done with this unit.
Estimated time
01:30
References
SC23-5209-01 HACMP for AIX, Version 5.4.1: Installation Guide
SC23-4864-10 HACMP for AIX, Version 5.4.1:
Concepts and Facilities Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1: Planning Guide
SC23-4862-10 HACMP for AIX, Version 5.4.1: Administration Guide
SC23-5177-04 HACMP for AIX, Version 5.4.1: Troubleshooting Guide
SC23-4867-09 HACMP for AIX, Version 5.4.1: Master Glossary
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
Unit objectives
After completing this unit, you should be able to:
Ɣ Describe what an HACMP event is
Ɣ Describe the sequence of events when:
– The first node starts in a cluster
– A new node joins an existing cluster
– A node leaves a cluster voluntarily
Ɣ Explain what happens when HACMP processes an event
Ɣ Describe how to customize the event flow
Ɣ State how to monitor other devices
Notes:
Notes:
Notes:
Recovery Command
Recovery Command
Recovery __
__
Programs __ Event Script
#
## Beginning of Event Definition Node Up ###
#
ODM 0
# 6) Resource variable only used for event manager events
Group Services/ES
Topology Services/ES
Notes:
Recovery programs
cluster_notify.rp reconfig_configuration.rp
external_resource_state_change.rp reconfig_configuration_dependency_acquire.rp
external_resource_state_change_complete.rp reconfig_configuration_dependency_complete.rp
fail_interface.rp reconfig_configuration_dependency_release.rp
fail_standby.rp reconfig_resource.rp
join_interface.rp reconfig_topology.rp
join_standby.rp resource_state_change.rp
migrate.rp resource_state_change_complete.rp
network_down.rp rg_move.rp
network_up.rp rg_offline.rp
node_down.rp rg_online.rp
node_down_dependency.rp server_down.rp
node_down_dependency_complete.rp server_restart.rp
node_up.rp site_down.rp
node_up_dependency.rp site_isolation.rp
node_up_dependency_complete.rp site_merge.rp
site_up.rp
swap_adapter.rp
Notes:
Recovery programs
This visual lists the recovery programs that are used by the resource manager
component of the Cluster Manager Services to determine what event scripts to invoke.
These form the first step in processing an event.
site_up.rp
Notes:
Event scripts
(called by cluster manager) (called by other events)
Notes:
Event scripts
This is the list of HACMP events that are managed by HACMP.
The events on the left are directly called by the cluster manager or process_resources
in response to unexpected happenings. The events on the right are invoked by primary
or other secondary events on an as-needed basis.
Each of these events can have an optional notify command, one or more pre-event
scripts, one or more post-event scripts and an optional recovery command associated
with it.
process_resources
process_resources Cluster Manager
clrgpa
RGPA
Cluster Status?
next task
Resource
Manager
Update RM cl_RMupdate
Update RM
Exit
Notes:
Script process_resources
The script process_resources handles the calls from event scripts to the Resource
Group Policy Administrator (RGPA):
- Loops through each returned task (JOB_TYPE):
• Calls cl_RMupdate as required to update the Cluster Manager with the status
change
• Processes the next JOB_TYPE that the RGPA passes (via clrgpa) until all tasks
in the list are completed.
- There is one JOB_TYPE for each resource type. Some can be run once each event,
useful for parallel processing of resources
This is meant to show you that the process_resources script is responsible for
interacting with the event scripts. You will see the JOB_TYPE in the /tmp/hacmp.out log
file.
lls
process_resources (ACQUIRE)
servic
ca process_resources (SERVICE_LABELS)
acquire_service_addr
RC acquire_aconn_service en0 net_ether_01
process_resources (DISKS)
process_resources (VGS)
clstrmgrES process_resources (LOGREDO)
process_resources (FILESYSTEMS)
Event
cal process_resources (SYNC_VGS)
Manager ls process_resources (TELINIT)
process_resources (NONE)
RC < Event Summary >
2) node_up_complete
for each RG:
process resources (APPLICATIONS)
start_server app01
process_resources (ONLINE)
process_resources (NONE)
< Event Summary >
© Copyright IBM Corporation 2008
Notes:
Startup processing
Implicit in this example is the assumption that there is actually a resource group to start
on the node. If there are no resource groups to start on the node, then node_up_local
and node_up_local_complete do very little processing at all.
g
n nin
ru t
ar
clstrmgrES clstrmgrES S t st e r s
u e
Event Messages Event Cl rvic
Manager Manager c a se
ca
ll
ll
R
RC
C
call
1) node_up 2) node_up
ca
RC
process_resources (release)
3) node_up_complete 4) node_up_complete
for each RG: for each RG:
process_resources (SYNC_VGS) process resources (APPLICATIONS)
process_resources (NONE) start_server app02
< Event Summary > process_resources (ONLINE)
process_resources (NONE)
© Copyright IBM Corporation 2008
< Event Summary >
Figure 8-10. Another node joins the cluster AU548.0
Notes:
n ing p
run Sto ter
s
Clu vices
clstrmgrES clstrmgrES
ca
Event Event ll ser1) node_down takeover
Manager Messages Manager
for each RG:
RC
ca C
process_resources (RELEASE)
ll
R
process_resources (APPLICATIONS)
stop_server app02
3) node_down takeover
ca
process_resources (FILESYSTEMS)
ll
process_resources (VGS)
ca
Same sequence
RC
process_resources (SERVICE_LABELS)
ll
as node up
RC
release_service_addr
< Event Summary >
4) node_down_complete 2) node_down_complete
for each RG: process_resources (OFFLINE)
process_resources (APPLICATIONS) process_resources (SYNC_VGS)
start_server app02 < Event Summary >
process_resources (ONLINE)
< Event Summary >
© Copyright IBM Corporation 2008
Notes:
Node failure
The situation is only slightly different if the node on the right had failed suddenly.
Because it is not in a position to run any events, the calls to process_resources listed
under the right hand node do not get run.
Let’s review
1. Which of the following are examples of primary HACMP events (select all that
apply)?
a. node_up
b. node_up_local
c. node_up_complete
d. start_server
e. Rg_up
2. When a node joins an existing cluster, what is the correct sequence for these
events?
a. node_up on new node, node_up on existing node, node_up_complete on new
node, node_up_complete on existing node
b. node_up on existing node, node_up on new node, node_up_complete on new
node, node_up_complete on existing node
c. node_up on new node, node_up on existing node, node_up_complete on
existing node, node_up_complete on new node
d. node_up on existing node, node_up on new node, node_up_complete on
existing node, node_up_complete on new node
Notes:
Additional information —
Transition statement —
Notes:
In this topic, we examine how to customize events in HACMP.
Event Manager
Recovery
clcallev HACMP Event
HACMP Event Command
No Counter Yes
RC=0
>0
ODM Yes No
HACMP “Event Error”
Classes
Notify Command
© Copyright IBM Corporation 2008
Notes:
Uempty issues, or both, beyond the normal scope of HACMP. These customization
opportunities are as follows:
- Each HACMP event can have a single optional Notify Command associated with it.
This command is run once at the very start of processing the event and once again
right as the last step in processing the event. This is the oldest form of HACMP
event-related customization. It is not used all that often anymore because better
mechanisms now exist. It is still supported in order to avoid breaking long existing
clusters that rely upon it.
- Each HACMP event can have zero or more pre-event scripts associated with it.
Each of these pre-event scripts are run after the optional notify command (if it has
been configured). When all of the pre-event scripts have been executed, the
HACMP event script itself is executed.
- A recovery command can be specified for each HACMP event. This recovery
command is run if the HACMP event script fails. When the recovery command
completes, the HACMP event script is run again. Associated with each recovery
command is a count of the maximum number of times that the HACMP event script
might fail in a single overall attempt to run the event before HACMP should declare
the failure as “not fixable by the recovery command”.
- Each HACMP event can have zero or more post-event scripts associated with it.
Each of these are run after the HACMP event script itself completes and before the
optional notify command.
Instructor notes:
Purpose — Review HACMP’s event customization processing capabilities.
Details —
Additional information —
Transition statement — Let’s see how we add a customized event to HACMP starting
with pre- and post-events.
Uempty
Notes:
Instructor notes:
Purpose — Examine the custom cluster event menu.
Details —
Additional information —
Transition statement — Next, we have to go to the menu to create our object. Let’s see
how to do that.
Uempty
Notes:
Script considerations
HACMP does not develop the script content for you, neither does it synchronize the
script content between cluster nodes (indeed the content can be different on each
node). The only requirements that HACMP imposes are that the script must exist on
each node in a local (non-shared) location, be executable and have the same path and
name on every node.
Of course, an additional requirement is that the script perform as required under all
circumstances!
In HACMP 5.2 and later there is a file collections feature if you wish to have your
changes kept in sync.
[Entry Fields]
Event Name node_down
Description Script run after the >
* Event Command [/usr/es/sbin/cluster/>
Notify Command []
Pre-event Command [] +
Post-event Command [stop_printq] +
Recovery Command []
* Recovery Counter [0] #
Notes:
Recovery commands
Ɣ If an event script fails to exit 0, Recovery Commands can be
executed
Recovery
HACMP Event
Command
No Counter Yes
RC=0
>0
No
Notes:
Notes:
Points to note
Ɣ The execute bit must be set on all pre-, post-, notify, and
recovery scripts.
Ɣ Synchronization does not copy pre- and post-event script
content from one node to another.
Ɣ You need to copy all your pre- and post-event scripts to all
nodes.
Ɣ Your pre- and post-event scripts must handle non-zero exit
codes.
Ɣ All scripts must declare the shell they will run in, such as:
#!/bin/ksh
Notes:
Notes:
Uempty - In cases of volume group failures, the occurrence of the AIX error label
LVM_SA_QUORCLOSE indicates that a volume group went off-line on a node in the
cluster. This causes the selective fallover of the affected resource group.
Remember that in each case when HACMP uses Selective Fallover, an rg_move event
is launched as a response to a resource failure. You can recognize that HACMP uses
Selective Fallover when you identify that an rg_move event is run in the cluster.
Instructor notes:
Purpose — Discuss selective fallover and the rg_move event.
Details —
Additional information —
Transition statement — We looked at customizing the event flow but how can we
customize HACMP to make an event when a device fails?
Uempty
CPU
Notes:
Instructor notes:
Purpose — Introduce error notification.
Details — With error notification, you can monitor any error that can be logged in the AIX
error log.
Additional information —
Transition statement — Let’s see how we use the HACMP menu to create an error
notification method.
Uempty
Notes:
Menu path
smitty hacmp -> Problem Determination Tools -> HACMP Error Notification
Instructor notes:
Purpose — Outline the SMIT menu for error notification.
Details —
Additional information —
Transition statement — What if you don’t want the automatic error notification. Let’s look
at the automatic error notification method menu.
Uempty
Notes:
Instructor notes:
Purpose — Show how to enable automatic error notification methods.
Details —
Additional information —
Transition statement — Now that we’ve turned it on, let’s see how to determine which
events it applies to.
Uempty
Listing automatic error notification (non-virtual HACMP
nodes)
COMMAND STATUS
Command: OK stdout: yes stderr: no
Before command completion, additional instructions may appear below.
[TOP]
bondar:
bondar: HACMP Resource Error Notify Method
bondar:
bondar: hdisk0 /usr/es/sbin/cluster/diag/cl_failover
bondar: scsi0 /usr/es/sbin/cluster/diag/cl_failover
bondar: hdisk11 /usr/es/sbin/cluster/diag/cl_logerror
bondar: hdisk5 /usr/es/sbin/cluster/diag/cl_logerror
bondar: hdisk9 /usr/es/sbin/cluster/diag/cl_logerror
bondar: hdisk7 /usr/es/sbin/cluster/diag/cl_logerror
bondar: ssa0 /usr/es/sbin/cluster/diag/cl_logerror
hudson:
hudson: HACMP Resource Error Notify Method
[MORE...9]
F1=Help F2=Refresh F3=Cancel F6=Command
F8=Image F9=Shell F10=Exit /=Find
n=Find Next
Figure 8-25. Listing automatic error notification (non-virtual HACMP nodes) AU548.0
Notes:
COMMAND STATUS
Command: OK stdout: yes stderr: no
Before command completion, additional instructions may appear below.
rt1s1vlp5:
rt1s1vlp5: HACMP Resource Error Notify Method
rt1s1vlp5:
rt1s1vlp5: hdisk0 /usr/es/sbin/cluster/diag/cl_failover
rt1s1vlp5: hdisk1 /usr/es/sbin/cluster/diag/cl_logerror
rt1s1vlp6:
rt1s1vlp6: HACMP Resource Error Notify Method
rt1s1vlp6:
rt1s1vlp6: hdisk0 /usr/es/sbin/cluster/diag/cl_failover
rt1s1vlp6: hdisk1 /usr/es/sbin/cluster/diag/cl_logerror
Figure 8-26. Listing automatic error notification (virtual HACMP nodes) AU548.0
Notes:
We already saw that there were errors when running the automatic error notification setup
on HACMP nodes that have only virtual I/O resources. Here we see that it will cover the
disks, but the adapters are not protected. Should you cover them? Probably not, because
they’re virtual.
Notes:
Menu path
smitty hacmp -> Problem Determination Tools -> HACMP Error Notification ->
Add a Notify Method
Instructor notes:
Purpose — Show the smit screen for adding an error notification method.
Details —
Additional information —
Transition statement — Let’s see how we might do some initial testing of an error
notification method.
Uempty
Emulating errors (1 of 2)
Notes:
Menu path
smitty hacmp -> Problem Determination Tools -> HACMP Error Notification ->
Emulate Error Log Entry
it would be best to cause the actual hardware error that is of concern to verify that the
error notification method has been associated with the correct AIX error label.
Note that the emulated error does not have the same resource name as an actual
record, but otherwise passes the same arguments to the method as the actual one.
Emulating errors (2 of 2)
Notes:
Notes:
Checkpoint
1. Which of the following runs if an HACMP event script fails?
(select all that apply)
a.Pre-event scripts
b.Post-event scripts
c.Error notification methods
d.Recovery commands
e.Notify methods
2. How does an event script get started?
a.Manually by an administrator
b.Called by the SNMP SMUX (clsmuxpd)
c.Called by the cluster manager using a recovery program
d.Called by the topology services daemon
3. True or False?
Pre-event scripts are automatically synchronized.
4. True or False?
Writing error notification methods is a normal part of
configuring a cluster. © Copyright IBM Corporation 2008
Notes:
Checkpoint solutions
1. Which of the following runs if an HACMP event script fails?
(select all that apply)
a.Pre-event scripts
b.Post-event scripts
c.Error notification methods
d.Recovery commands
e.Notify methods
2. How does an event script get started?
a.Manually by an administrator
b.Called by the SNMP SMUX (clsmuxpd)
c.Called by the cluster manager using a recovery program
d.Called by the topology services daemon
3. True or False?
Pre-event scripts are automatically synchronized.
4. True or False?
Writing error notification methods is a normal part of
configuring a cluster. © Copyright IBM Corporation 2008
Additional information —
Transition statement — Okay, let’s summarize what we have seen in this unit.
Unit summary
Notes:
Estimated time
01:00
References
SC23-5209-01 HACMP for AIX, Version 5.4.1: Installation Guide
SC23-4864-10 HACMP for AIX, Version 5.4.1:
Concepts and Facilities Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1: Planning Guide
SC23-4862-10 HACMP for AIX, Version 5.4.1: Administration Guide
SC23-5177-04 HACMP for AIX, Version 5.4.1: Troubleshooting Guide
SC23-4867-09 HACMP for AIX, Version 5.4.1: Master Glossary
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit objectives
After completing this unit, you should be able to:
Ɣ Explain the concepts of NFS
Ɣ Configure HACMP to support NFS
Ɣ Discuss why Volume Group major numbers must be unique
when using NFS with HACMP
Ɣ Outline the NFS configuration parameters for HACMP
Notes:
Objectives
In this unit, we examine how NFS can be integrated in to HACMP to provide a Highly
Available Network File System.
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
NFS mount
NFS Server
read-write
NFS mount
read-only
JFS mount
read-only
NFS mount
Notes:
NFS
NFS is a suite of protocols that allow file sharing across an IP network. An NFS server
is a provider of file service (that is, a file, a directory or a file system). An NFS client is a
recipient of a remote file service. A system can be both an NFS client and server at the
same time.
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
NFS Server
n x nfsd and mountd
n x biod
/etc/exports
/etc/filesystems NFS Client and Server
n x biod
n x nfsd and mountd
© Copyright IBM Corporation 2008
Notes:
NFS processes
The NFS server uses a process called mountd to allow remote clients to mount a local
disk or CD resource across the network. One or more nfsd processes handle I/O on the
server side of the relationship.
The NFS client uses the mount command to establish a mount to a remote storage
resource which is offered for export by the NFS server. One or more block I/O
daemons, biod, run on the client to handle I/O on the client side.
The server maintains details of data resources offered to clients in the /etc/exports file.
Clients can automatically mount network file systems using the /etc/filesystems file.
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
A /fsa
# mount /fsa
usa uk
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
/fsa A
# mount /fsa
usa uk
© Copyright IBM Corporation 2008
Notes:
Fallover
If the node offering the NFS export should fail, a standby node takes over the shared
disk resource, locally mounts the file system, and exports the file system or directory for
remote mount.
If the client was not accessing the disk resource during the period of the fallover, then it
is not aware of the change in which node is serving the NFS export.
Note that the aservice service IP label is in the resource group, which is exporting
/fsa. The HACMP NFS server support requires that resource groups that export NFS
filesystems be configured to use IPAT because the client system is not capable of
dealing with two different IP addresses for its NFS server, depending on which node the
NFS server service happens to be running on.
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Uempty that all the filesystems in the aaavg volume group should be treated as resources
within the resource group.
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain the SMIT configuration for NFS within HACMP.
Details — Explain to the students each of the parameters relevant to this example. There
is no need to explain cross-mounting at this stage because that is the very next foil’s topic.
Additional information —
Transition statement — Within the cluster, we can achieve a kind of concurrent access
journaled filesystem between two or more nodes in the cluster. Let’s see how.
Uempty
aservice
/fsa
/a /a
Notes:
Cross-mounting
We can use HACMP to mount an NFS exported filesystem locally on all the nodes
within the cluster. This allows two or more nodes to have access to the same disk
resource in parallel. An example of such a configuration might be a shared repository
for the product manuals (read only) or a shared /home filesystem (read-write). One
node mounts the filesystem locally, then exports the filesystem. All nodes within the
resource group then NFS mount the filesystem.
By having all nodes in the resource group act as an NFS client, including the node that
holds the resource group, it is not necessary for the takeover node to unmount the
filesystem before becoming the NFS server.
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
aservice
/a /fsa /a
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
aservice
export /fsa
/fsa
A
Notes:
Cross-mounting details
The key change, compared to the configuration that did not use cross-mounting, is that
this configuration’s resource group lists /fsa as an NFS filesystem and specifies that it
is to be mounted on /a. This causes every node in the resource group to act as an NFS
client with aservice:/fsa mounted at /a. Only the node that actually has the resource
group is acting as an NFS server for the /fsa filesystem.
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
net_ether_01
net_ether_02
aGservice aservice
export /fsa
A /fsa
# mount /fsa
# mount aservice:/fsa /a # mount aservice:/fsa /a
usa uk
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Cross-mount syntax
Note the rather strange /a;/fsa syntax for specifying the directory to be
cross-mounted. This rather unusual syntax is explained in the next foil.
Note that the resource group must include a service IP label, which is on the
net_ether_01 network (aservice in the previous foil).
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
/a;/fsa
# mount aservice:/fsa /a
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
# ls -l /dev/*webvg
crw-rw---- 1 root system 201, 0 Sep 04 23:23 /dev/xwebvg
crw-rw---- 1 root system 203, 0 Sep 05 18:27 /dev/ywebvg
crw-rw---- 1 root system 205, 0 Sep 05 23:31 /dev/zwebvg
– The command lvlstmajor will list the available major numbers for each node in the cluster
For example:
# lvlstmajor
43...200,202,206...
– The VG major number may be set at the time of creating the VG using SMIT mkvg or by using the
-V flag on the importvg command, for example:
– C-SPOC will "suggest" a VG major number which is unique across the nodes
when it is used to create a shared volume group
Notes:
VG major numbers
Volume group major numbers must be the same for any given volume group across all
nodes in the cluster. This is a requirement for any volume group that has filesystems
which are NFS exported to clients (either within or without the cluster).
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Checkpoint
1. True or False?
HACMP supports all NFS export configuration options.
2. Which of the following is a special consideration when using
HACMP to NFS export filesystems? (select all that apply)
a. NFS exports must be read-write.
b. Secure RPC must be used at all times.
c. A cluster may not use NFS cross-mounts if there are client systems
accessing the NFS exported filesystems.
d. A volume group that contains filesystems that are NFS exported must
have the same major device number on all cluster nodes in the
resource group.
3. What does [/abc;/xyz] mean when specifying a directory to cross-
mount?
a. /abc is the name of the filesystem that is exported and /xyz is where it
should be mounted
b. /abc is where the filesystem should be mounted, and /xyz is the name
of the filesystem that is exported
4. True or False?
HACMP's NFS exporting feature supports only clusters of two nodes.
5. True or False?
IPAT is required in resource groups that export NFS filesystems.
Notes:
Checkpoint solutions
1. True or False? *
HACMP supports all NFS export configuration options.
2. Which of the following is a special consideration when using HACMP to NFS
export filesystems? (select all that apply)
a. NFS exports must be read-write.
b. Secure RPC must be used at all times.
c. A cluster may not use NFS cross-mounts if there are client systems accessing the
NFS exported filesystems.
d. A volume group that contains filesystems that are NFS exported must have
the same major device number on all cluster nodes in the resource group.
3. What does [/abc;/xyz] mean when specifying a directory to cross-mount?
a. /abc is the name of the filesystem that is exported and /xyz is where it should be
mounted
b. /abc is where the filesystem should be mounted, and /xyz is the name of the
filesystem that is exported
4. True or False? **
HACMP's NFS exporting feature supports only clusters of two nodes.
5. True or False?
IPAT is required in resource groups that export NFS filesystems.
Additional information — Read the questions to the students. Ask the students for their
answer. Point out the correct answer and explain why it is the correct answer.
Transition statement — Let’s summarize what we’ve covered.
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit summary
Key points from this unit:
Ɣ HACMP provides a means to make Network File System (NFS) highly
available
– Configure Filesystem/Directory to Export and Filesystems
mounted before IP started in resource group
– VG major number must be the same on all nodes
– Clients NFS mount using service address
– In case of node failure, takeover node acquires the service address,
acquires the disk resource, mounts the file system and NFS exports the
file system
– Clients see NFS server not responding during the fallover
Ɣ NFS file systems can be cross-mounted across all nodes
– Faster takeover: Takeover node does not have to unmount the file system
– A preferred network can be selected
– Really only for read only file systems: NFS cross-mounted file systems
can be mounted read-write, but concurrent write attempts will produce
inconsistent results
– Use GPFS for true concurrent access
Ɣ Non-default export options can be specified in
/usr/es/sbin/cluster/etc/exports
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 9. Integrating NFS into HACMP 9-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Estimated time
01:30
References
SC23-5209-01 HACMP for AIX, Version 5.4.1: Installation Guide
SC23-4864-10 HACMP for AIX, Version 5.4.1:
Concepts and Facilities Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1: Planning Guide
SC23-4862-10 HACMP for AIX, Version 5.4.1: Administration Guide
SC23-5177-04 HACMP for AIX, Version 5.4.1: Troubleshooting Guide
SC23-4867-09 HACMP for AIX, Version 5.4.1: Master Glossary
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit objectives
After completing this unit, you should be able to:
Ɣ List reasons why HACMP can fail
Ɣ Identify configuration and administration errors
Ɣ List the problem determination tools available in smit
Ɣ Explain why the Dead Man's Switch invokes
Ɣ Explain when the System Resource Controller kills a node
Ɣ Isolate and recover from failed event scripts
Ɣ Correctly escalate a problem to IBM support
Notes:
In this unit we examine some of the reasons why HACMP might fail, and how to perform
basic problem determination to recover from failure.
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
X
X
A
usa uk
Notes:
Root causes
Often the root cause of problems with HACMP is the absence of design and planning at
the outset, or poor design and planning. As you will have now figured out, a couple of
hours spent in planning HACMP reaps rewards later on in terms of how easy it is to
configure, administer, and diagnose problems with the cluster.
HACMP verifies all topology and resource configuration parameters and most IP
configuration parameters before synchronization takes place. This means that provided
the cluster synchronizes and starts successfully, the cluster should remain stable.
The prime reason for cluster failure when the environment is in production is
administrative mistakes and an absence of change control.
Typically, HACMP clusters are very stable. During the writing of this course, a customer
complained to IBM that his HACMP cluster had failed on him because a node had failed
and his workload did not get taken over by the standby node. Upon investigation it was
Uempty proven that in fact an earlier (undetected) failure had resulted in the standby node
taking over the workload and a subsequent component failure resulted in a second
point of failure. How many points of failure does HACMP handle?
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Outline the key reasons why HACMP might fail.
Details — Emphasize that HACMP is a very mature, robust, and stable product, which is
not prone to failure. Indeed, HACMP is often purchased to handle a worst case scenario.
So, what does that mean if a failure occurs and HACMP also fails?
Additional information —
Transition statement — The best form of cure is prevention; so you should always test
your cluster before going live and after every change.
Uempty
Notes:
Importance of testing
Every cluster should be thoroughly tested before going live. It is important that you
develop and document a cluster test plan for your environment. Start by taking your
cluster diagram and highlighting all the things that could go wrong, then write down
what you expect the cluster to do in response to that failure. Periodically, test your
cluster to ensure that fallover works correctly and correct your test plan if your
assumptions about what will happen differ from that which HACMP actually performs
(for example, shutdown -F does not cause fallover). HACMP 5.2 and later provides a
test tool, which will be discussed later in this unit.
Although it is recommended that testing of the cluster services be performed using
Move Resource Groups, it is especially important to conduct this testing if HACMP is to
be used to reduce Planned Downtime (for upgrades/maintenance) as this will be the
cluster function that will be used. This method of testing, however, should not replace
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
the testing of a node failure due to crash (for example, halt -q or just stop the LPAR at
the HMC).
All efforts should be made to verify application functions (user level testing) as the
cluster function tests are being performed. Verifying that the cluster functions “correctly”
without verifying that the application functions correctly as part of the cluster function
test is not recommended. Getting the end-user commitment is sometimes the hardest
part of this process.
Use of emulation
You can emulate some common cluster status change events. Remember that
whenever you make a change to cluster configuration, test the change before putting
the cluster back into production if at all possible.
You should always emulate a DARE change before actually doing it. If a DARE change
does not succeed during emulation, then it will definitely not succeed when you actually
do it.
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
HACMP Verification
View Current State
HACMP Log Viewing and Management
Recover From HACMP Script Failure
Restore HACMP Configuration Database from Active Configuration
Release Locks Set By Dynamic Reconfiguration
Clear SSA Disk Fence Registers
HACMP Cluster Test Tool
HACMP Trace Facility
HACMP Event Emulation
HACMP Error Notification
Manage RSCT Services
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
HACMP Verification
[Entry
Fields]
* Automatic cluster configuration verification Enabled +
Node name Default +
* HOUR (00 - 23) [00] +#
© Copyright IBM Corporation 2008
Notes:
How it works
The clverify utility runs on one user-selectable HACMP cluster node once every 24
hours. By default, the first node in alphabetical order runs the verification at midnight.
When automatic cluster configuration, monitoring detects errors in cluster configuration,
clverify triggers a general_notification event. The output of this event is logged in
hacmp.out throughout the cluster on each node that is running cluster services.
clverify maintains the log file /var/hacmp/log/clverify/clverify.log.
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Automatic correction
[Entry Fields]
* Verify, Synchronize or Both [Both] +
* Automatically correct errors found during [No] +
verification?
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Make students aware of test tools.
Details —
Additional information —
Transition statement — Let’s see what commands can be used to diagnose problems
that might occur from time to time in a cluster.
Uempty
Mandatory clstrmgrES
Cluster
Components clinfoES
Optional
Notes:
clstart subsystems
Listed here are the processes that are listed in the startup smit menu for HACMP. It’s
interesting to note that these cluster processes are not displayed by the command
when they are inactive. This was a display option (or probably better a non-display
option) that HACMP chose to use when the subsystems were defined during the install
process. This option can be changed (one subsystem at a time) using the chssys -s
subystem_name -a “-D” command.
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
alternative command that works in HACMP 5.3 but is not guaranteed for the future is
easier. It is lssrc -ls clstrmgrES | grep state. Look for ST_STABLE for a prolonged
period of time as an indication that cluster services has started successfully. Another
command that will give you state information in HACMP 5.3 is the command
/usr/es/sbin/cluster/utilities/cldump. Finally, you can use the smit path: Problem
Determination Tools -> View Current State.
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
# lssrc -s clcomdES
Subsystem Group PID Status
clcomdES clcomdES 13420 active
# lssrc -s ctrmc
Subsystem Group PID Status
ctrmc rsct 2954 active
#
Notes:
Supporting subsystems
Listed here are the additional processes we would expect to find running on an HACMP
cluster node.
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
– RS232
• stty < /dev/tty# (on 2 connected nodes)
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce some of the tools used to test network communications.
Details —
Additional information —
Transition statement — Let’s look now at what can happen if the cluster manager does
not get enough CPU.
Uempty
Ɣ Why?
– Clstrmgr starved of CPU
• Excessive I/O traffic
• Excessive TCP/IP traffic over an interface
Ɣ Was it DMS?
– Copy the system dump to a file
– kdb on the dump file
– stat subcommand
– Look for 'HACMP dms timeout halting...'
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Review the behavior of the Dead Man’s Switch.
Details — Emphasize that the purpose of the dead man’s switch is to ensure that if other
cluster nodes suspect that this cluster node is dead then it is actually dead.
Additional information —
Transition statement — How might we avoid DMS time-outs?
Uempty
1. Isolate the cause of excessive I/O or TCP/IP traffic and fix it,
and if that does not work...
2. Reduce the failure detection rate for the slowest network…
3. Increase the frequency of the syncd, and if that does not
work...
4. Tune I/O pacing, and if that does not work...
5. Buy a bigger machine
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
The command /usr/sbin/rsct/bin/hatsdmsinfo can be used to see how often the DMS
timer is being reset.
Although we don't recommend changing the DMS time-out value, we are sometimes
asked about how to increase the time-out period on the dead man’s switch to make it
less likely that the DMS will pop and crash the node. There is no strict time-out setting;
it is monitored by RSCT and is calculated as twice the value of the longest failure
detection rate of all configured HA network in the cluster. If, for example, you have two
networks, an Ethernet, and a disk heartbeat network, the Ethernet has the longer failure
detection rate, 10 seconds versus 8 for the diskhb network; so the DMS time-out is set
to 2*10, or 20 seconds. If the failure detection rate is being modified to extend the DMS
time-out, it is best to ensure that all networks have the same failure detection period. To
set the DMS timeout value to 30 seconds, while making the failure detection the same
for both networks, the custom NIM settings would be: Ethernet:
Failure Cycle 16
Interval between Heartbeats (seconds) 1
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
[Entry Fields]
HIGH water mark for pending write I/Os per file [33] +#
LOW water mark for pending write I/Os per file [24] +#
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Ɣ What happens:
– Group Services and clstrmgr exit on some node(s)
Notes:
Node isolation
When you have a partitioned cluster, the node or nodes on each side of the partition
detect this and run a node_down for the node or nodes on the opposite side of the
partition. If, while running this or after communication is restored, the two sides of the
partition do not agree on which nodes are still members of the cluster, a decision is
made as to which partition should remain up, and the other partition is shutdown by a
Group Services (GS) merge from nodes in the other partition or by a node sending a GS
merge to itself.
In clusters consisting of more than two nodes, the decision is based on which partition
has the most nodes left in it, and that partition stays up. With an equal number of nodes
in each partition (as is always the case in a two-node cluster), the node or nodes that
remain up are determined by the node number (lowest node number in cluster
remains), which is also generally the first in alphabetical order.
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Review the circumstances under which a partitioned cluster can occur.
Details — Point out that a partitioned cluster can be detected only when it stops occurring,
that is, heartbeat begins to flow again. A partitioned cluster is a poorly designed cluster,
one that does not have a non IP network. Bad idea!
Additional information — This used to be referred to as DGSP.
Transition statement — Well, how can you avoid a partitioned cluster?
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain how to avoid partitioned clusters.
Details —
Additional information —
Transition statement — If something does go wrong, getting the needed support
information quickly will be necessary; fortunately, HACMP does this for you.
Uempty
Notes:
Uses the clsnap command under the covers – local collection only. The clsnap utility runs
with the report option first to verify there is enough space.
The user can disable these specific FFDC actions by setting the environment variable
FFDC_COLLECTION to “disable” before starting cluster services.
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Provide information on the First Failure Data Capture (FFDC) feature.
Details — If a failure occurs, IBM Support will ask for data to be collected. With HACMP
5.4.1 and later, this will be done automatically. Point out the directory location and the fact
that it’s done after recovery of the node.
Additional information —
Transition statement — Now, let’s consider the case of an HACMP event script that does
not finish in a reasonable time.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
[Entry Fields]
Max. Event-only Duration (in seconds) [180] #
Max. Resource Group Processing Time (in seconds) [180] #
Notes:
smit menu
smit hacmp -> Extended Configuration -> Extended Event Configuration ->
Change/Show Time Until Warning
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
The procedure
The procedure is outlined in the visual above. Using the /var/hacmp/adm/cluster.log
file with the command grep EVENT /var/hacmp/adm/cluster.log | more makes it
easier to find when the config too long event first occurred. Be sure to find the earliest
AIX error message--not just the first AIX error message. You must manually complete
what the event would have done before doing recover from script failure, which is
Uempty described on the next visual. You can also use the cluster.log in combination with
hacmp.out.
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Explain how to deal with an HACMP event script failure.
Details — Make it clear that the failure of an HACMP event script is a major incident
requiring immediate attention as the entire HACMP cluster effectively stops protecting any
of the highly available applications until the issue is resolved.
Additional information —
Transition statement — Let’s look at the smit screen which causes HACMP to try to
resume after an event script failure.
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Review how HACMP can be used to recover from a script failure.
Details — Point out that this menu does not fix problems in event scripts, rather it returns
an unstable cluster to a stable state after manual intervention.
Additional information —
Transition statement — Let’s take a look at a basic troubleshooting methodology.
Uempty
A troubleshooting methodology
Ɣ Save the log files from all available nodes as soon as possible
Ɣ Attempt to duplicate the problem
Ɣ Approach the problem methodically
Ɣ Distinguish between what you know and what you assume
Ɣ Keep an open mind
Ɣ Isolate the problem
Ɣ Go from the simple to the complex
Ɣ Make one change at a time
Ɣ Stick to a few simple troubleshooting tools
Ɣ Do not neglect the obvious
Ɣ Watch for what the cluster is not doing
Ɣ Keep a record of the tests you have completed
Notes:
Troubleshooting suggestions
Save the log files from every available cluster node while they are still available
Things might get much worse than they already are. Having access to all relevant
cluster log files and application log files could prove very important. These log files
might be overwritten while you are investigating the problem or they might be lost
entirely if more hardware failures occur. Save copies of them very early in the
troubleshooting exercise to ensure that they are not lost.
Attempt to duplicate the problem
While keeping in mind the importance of not making a bad situation worse by causing
even more problems, it is often useful to try to duplicate the circumstances that are
believed to have been in effect when the problem occurred; this can lead to a greater
understanding of exactly what went wrong.
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Important
Finally, remember that many cluster problems are the result of poor cluster design,
untrained cluster administrators or the lack of a proper change control methodology.
Without a doubt, the easiest and fastest way to deal with a problem is to ensure that it
cannot happen in the first place.
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Introduce and explain a troubleshooting methodology that has proven to be
useful in the past.
Details — Talk through each of the points until you are sure that the students understand
them.
Additional information — Refer to student notes for details. Refer students to the
HACMP Administration II course which gives them more experience with problem
determination.
Transition statement — Okay, so what if you have no choice but to escalate the problem
to IBM?
Uempty
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Outline the information that should be compiled for contacting IBM support.
Details — Make it clear to students that IBM technical support is a chargeable service and
that HACMP support is separate from AIX support. This information should be prepared in
advance to contacting IBM and much of it can be gathered before problems occur.
Additional information —
Transition statement — Okay, any questions for me? If not, let’s do the checkpoint
questions.
Uempty
Checkpoint
1. What is the most common cause of cluster failure?
(Select all that apply.)
a. Bugs in AIX or HACMP
b. Cluster administrator error
c. Marauding space aliens from another galaxy
d. Cosmic rays
e. Poor/inadequate cluster design
2. True or False?
Event emulation can emulate all cluster events.
3. If the cluster manager process dies, what will happen to
the cluster node?
a. It continues running but without HACMP to monitor and protect it.
b. It continues running AIX but any resource groups will fallover.
c. Nobody knows because this has never happened before.
d. The System Resource Controller sends an e-mail to root and issue a
halt -q.
e. The System Resource Controller sends an e-mail to root and issue a
shutdown -F.
4. True or False?
A non-IP network is strongly recommended. Failure to include a non-
IP network can cause the cluster to fail or malfunction in rather ugly
ways.
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Read the questions to the students. Get the students to state what they
believe to be the correct answer. Identify the correct answer to the students and explain
why it is the correct answer.
Details —
Checkpoint solutions
1. What is the most common cause of cluster failure? (Select all that apply.)
a. Bugs in AIX or HACMP
b. Cluster administrator error
c. Marauding space aliens from another galaxy
d. Cosmic rays
e. Poor/inadequate cluster design
2. True or False?
Event emulation can emulate all cluster events.
3. If the cluster manager process dies, what will happen to the cluster
node?
a. It continues running but without HACMP to monitor and protect it.
b. It continues running AIX but any resource groups will fallover.
c. Nobody knows because this has never happened before.
d. The System Resource Controller sends an e-mail to root and
issue a halt -q.
e. The System Resource Controller sends an e-mail to root and issue a
shutdown -F.
4. True or False?
A non-IP network is strongly recommended. Failure to include a non-
IP network can cause the cluster to fail or malfunction in rather ugly
ways.
*The correct answer is almost certainly "cluster administrator error" although
"poor/inadequate cluster design" would be a very close second.
© Copyright IBM Corporation 2008
Additional information —
Transition statement — And now the summary.
Uempty
Unit summary
Notes:
© Copyright IBM Corp. 1998, 2008 Unit 10. Problem determination and recovery 10-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose —
Details —
Additional information —
Transition statement —
Checkpoint solutions
1. True or False?
Resource Groups can be moved from node to node.
2. True or False?
HACMP/XD is a complete solution for building
geographically distributed clusters.
3. Which of the following capabilities does HACMP not
provide? (Select all that apply.):
a. Time synchronization
b. Automatic recovery from node and network adapter failure
c. System Administration tasks unique to each node; back-up
and restoration
d. Fallover of just a single resource group
4. True or False?
All nodes in a resource group must have equivalent
performance characteristics.
© Copyright IBM Corporation 2008
Checkpoint solutions
1. True or False?
Clients are required to exit and restart their application after a
fallover.
2. True or False?
All client systems are potentially directly affected by the ARP cache
issue.
3. True or False?
clinfo must not be run both on the cluster nodes and on the
client systems.
4. If clinfo is run by cluster nodes to address ARP cache
issues, you must add the list of clients to ping to either the
/etc/cluster/ping_client_list or the
/usr/es/sbin/cluster/etc/clinfo.rc file.
Checkpoint solutions
1.True or False?
Lazy update attempts to keep VGDA constructs in sync between
cluster nodes (reserve/release-based shared storage protection).
2.Which of the following commands will bring a volume group
online?
a.getvtg <vgname>
b.mountvg <vgname>
c.attachvg <vgname>
d.varyonvg <vgname>
3.True or False?
Quorum should always be disabled on shared volume groups.
4.True or False?
Filesystem and logical volume attributes cannot be changed while
the cluster is operational.
5.True or False?
An enhanced concurrent volume group is required for the heartbeat
over disk feature.
© Copyright IBM Corporation 2008
Checkpoint solutions
1. True or False
Applications are defined to HACMP in a configuration file that lists
what binary to use.
2.What policies would be the best to use for a 2-node “active-
active” cluster using IPAT to minimize both applications running
on the same node?
a.home, next, never
b.first, next, higher
c.distribution, next, never
d.all, error, never
e.home, next, higher
3.Which type of data should not be placed in private data storage?
a.Application log data
b.License file
c.Configuration files
d.Application binaries
4.Which policy is not a Run-time policy?
a.Settling
b.Delayed Fallback Timer
c.Dynamic Node Priority
Checkpoint solutions
1. Which component detects an adapter failure?
a. Cluster Manager
b. RSCT
c. clcomd
d. clinfo
2. Which component provides SNMP information?
a. Cluster Manager
b. RSCT
c. clsmuxpd
d. clinfo
3. Which component is required for clstat to work?
a. Cluster Manager
b. RSCT
c. clcomd
d. clinfo
4. Which component removes requirement for the /.rhosts file?
a. Cluster Manager
b. RSCT
c. clcomd
d. clinfo
Checkpoint solutions
1. True or False?
It is possible to configure a recommended simple two-node cluster environment
using just the standard configuration path.
You can’t create the non-IP network from the standard path.
2. In which of the top-level HACMP menu choices is the menu for starting and
stopping cluster nodes?
a. Initialization and Standard Configuration
b. Extended Configuration
c. System Management (C-SPOC)
d. Problem Determination Tools
3. In which of the top-level HACMP menu choices is the menu for defining a non-
IP heartbeat network?
a. Initialization and Standard Configuration
b. Extended Configuration
c. System Management (C-SPOC)
d. Problem Determination Tools
4. True or False?
It is possible to configure HACMP faster by having someone help you on the other
node.
5. True or False?
You must specify exactly which filesystems you want mounted when you put
resources into a resource group.
1. True or False?
You cannot add a node while HACMP is running.
2. You have decided to add a third node to your existing two-
node HACMP cluster. What very important step follows
adding the node definition to the cluster configuration
(whether through Standard or Extended Path)?
a. Take a well deserved break, bragging to co-workers about
your success.
b. Install HACMP software.
c. Configure a non-IP network.
d. Start Cluster Services on the new node.
e. Add a resource group for the new node.
3. Why would you choose to use the Extended Path to add
resources to a resource group versus the Standard Path?
If you need access to the fields that are not shown in the Standard Path (like for
NFS or to set “Filesystems mounted before IP configured”).
__________________________________________________
© Copyright IBM Corporation 2008
Checkpoint solutions
1. True or False?
A star configuration is a good choice for your non-IP networks.
2. True or False?
Using DARE, you can change from IPAT via aliasing to IPAT via
replacement without stopping the cluster.
3. True or False?
RSCT will automatically update /etc/filesystems when using enhanced
concurrent mode volume groups
4. True or False?
With HACMP V5.4, a resource group’s priority override location can be
cancelled by selecting a destination node of
Restore_Node_Priority_Order.
5. You want to create an Enhanced Concurrent Mode Volume Group that
will be used in a Resource Group that will have an “Online on Home
Node” Startup policy. Which C-SPOC menu should you use?
a. HACMP Logical Volume Management
b. HACMP Concurrent Logical Volume Management
6. You want to add a logical volume to the volume group you created in the
question above. Which C-SPOC menu should you use?
a. HACMP Logical Volume Management
b. HACMP Concurrent Logical Volume Management
Unit 8 - Events
AP Unit 8 - Events
Checkpoint solutions
1. Which of the following runs if an HACMP event script fails?
(select all that apply)
a.Pre-event scripts
b.Post-event scripts
c.Error notification methods
d.Recovery commands
e.Notify methods
2. How does an event script get started?
a.Manually by an administrator
b.Called by the SNMP SMUX (clsmuxpd)
c.Called by the cluster manager using a recovery program
d.Called by the topology services daemon
3. True or False?
Pre-event scripts are automatically synchronized.
4. True or False?
Writing error notification methods is a normal part of
configuring a cluster. © Copyright IBM Corporation 2008
Checkpoint solutions
1. True or False? *
HACMP supports all NFS export configuration options.
2. Which of the following is a special consideration when using HACMP to NFS
export filesystems? (select all that apply)
a. NFS exports must be read-write.
b. Secure RPC must be used at all times.
c. A cluster may not use NFS cross-mounts if there are client systems accessing the
NFS exported filesystems.
d. A volume group that contains filesystems that are NFS exported must have
the same major device number on all cluster nodes in the resource group.
3. What does [/abc;/xyz] mean when specifying a directory to cross-mount?
a. /abc is the name of the filesystem that is exported and /xyz is where it should be
mounted
b. /abc is where the filesystem should be mounted, and /xyz is the name of the
filesystem that is exported
4. True or False? **
HACMP's NFS exporting feature supports only clusters of two nodes.
5. True or False?
IPAT is required in resource groups that export NFS filesystems.
Checkpoint solutions
1. What is the most common cause of cluster failure? (Select all that apply.)
a. Bugs in AIX or HACMP
b. Cluster administrator error
c. Marauding space aliens from another galaxy
d. Cosmic rays
e. Poor/inadequate cluster design
2. True or False?
Event emulation can emulate all cluster events.
3. If the cluster manager process dies, what will happen to the cluster
node?
a. It continues running but without HACMP to monitor and protect it.
b. It continues running AIX but any resource groups will fallover.
c. Nobody knows because this has never happened before.
d. The System Resource Controller sends an e-mail to root and
issue a halt -q.
e. The System Resource Controller sends an e-mail to root and issue a
shutdown -F.
4. True or False?
A non-IP network is strongly recommended. Failure to include a non-
IP network can cause the cluster to fail or malfunction in rather ugly
ways.
*The correct answer is almost certainly "cluster administrator error" although
"poor/inadequate cluster design" would be a very close second.
© Copyright IBM Corporation 2008
Checkpoint solutions
1. For IPAT via replacement (select all that apply)
a. Each service IP address must be in the same subnet as one of
the non-service addresses
b. Each service IP address must be in the same subnet
c. Each service IP address cannot be in any non-service address subnet
2. True or False?
If the takeover node is not the home node for the resource group and
the resource group does not have a Startup policy of Online Using
Distribution Policy, the service IP address replaces the IP address of a
NIC with an IP address in the same subnet as the subnet of the
service IP address.
3. True or False?
In order to use HWAT, you must enable and complete the
ALTERNATE ETHERNET address field in the SMIT devices menu.
4. True or False?
You must stop the cluster in order to change from IPAT via aliasing to
IPAT via replacement.
==========================================
Enhancements of the HACMP Software
==========================================
------------------------------------
5.4.1 Enhancements
------------------------------------
• Integrated support for utilizing AIX Workload Partition (WPAR) to maintain high
availability for your applications by configuring them as a resource group and assigning
the resource group to an AIX WPAR. By using HACMP in combination with AIX WPAR,
you can leverage the advantages of application environment isolation and resource
© Copyright IBM Corp. 1998, 2008 Appendix B. Release Notes for HACMP 5.4.1 B-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
control provided by AIX WPAR along with the high availability feature of HACMP
V5.4.1.
• HACMP/XD support of PPRC Consistency Groups to maintain data consistency for
application-dependent writes on the same logical subsystem (LSS) pair or across
multiple LSS pairs. HACMP/XD responds to PPRC consistency group failures by
automatically freezing the pairs and managing the data mirroring.
• A new Geographical Logical Volume Manager (GLVM) Status Monitor that provide the
ability to monitor GLVM status and state. These monitors enable you to keep better
track of the status of your application data when using the HACMP/XD GLVM option for
data replication.
• Improved support for NFS V4, which includes additional configuration options, as well
as improved recovery time. HACMP can support both NFS V4 and V2/V3 within the
same high availability environment.
• Usability improvements for the WebSMIT Graphical User Interface, which include the
ability to customize the color and appearance of the display. Improvements to First
Failure Data Capture and additional standardized logging increase the reliability and
serviceability of HACMP 5.4.1.
• New options for detecting and responding to a partitioned cluster. Certain failures or
combinations of failures can lead to a partitioned cluster, which, in the worse case, can
lead to data divergence (out of sync data between the primary and backup nodes in a
cluster). HACMP V5.4.1 introduces new features for detecting a partitioned cluster and
avoiding data divergence through earlier detection and reporting.
• Serviceability Improvements for HACMP. New log files have been added. The default
locations of all managed log files have been moved to a subdirectory of /var/hacmp.
------------------------------------
5.4.0 Enhancements
------------------------------------
AP - Start and restart cluster services automatically according to how you define the
resources.
- Stop cluster services and also bring the resources and applications offline, move
them to other nodes, or keep them running on the same nodes (but stop managing
them for high availability).
- Terminology that describes stopping cluster services has changed:
• Instead of stopping cluster services gracefully, this option is known as stopping
cluster services and bringing resource groups offline. The cluster services are
stopped.
• Instead of stopping cluster services gracefully with takeover, this option is known
as stopping cluster services and moving the resource groups to other nodes.
• Instead of a forced down, this option is known as stopping cluster services
immediately and placing resource groups in an unmanaged state. This option
leaves resource groups on the local node active.
• Resource Group Management (clRGmove) improvements
- Improved SMIT interface.
- Easier to move the resource groups for cluster management.
- When you move a resource group, you can move it without setting the Priority
Override Location (POL) for the node to which it was moved. POL is a setting you
had to specify for manually moved resource groups in releases prior to HACMP 5.4.
- Improved handling of non-concurrent resource groups with No Fallback resource
group and site policies.
- Clear method to maintain the previously configured behavior for a resource group.
- Improved status and troubleshooting with WebSMIT and clRGinfo.
• Verification enhancements
- The final verification report lists any nodes, networks and/or network interfaces that
are in the 'failed' state at the time that cluster verification is run. The final verification
report also lists other 'failed' components, if accessible from the Cluster Manager,
such as applications, resource groups, sites, and application monitors that are in the
suspended state.
- Volume group verification checks have been restructured for faster processing.
- Messages have been reformatted for consistency and to remove repetitious entries.
- New Verification checks:
• Can each node reach each other node in the cluster through non-IP
connections?
• Are netmasks and broadcast addresses valid?
© Copyright IBM Corp. 1998, 2008 Appendix B. Release Notes for HACMP 5.4.1 B-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
AP - You can configure multiple XD_data networks for the mirroring function. IPAT via IP
Aliases is not allowed for HAGEO.
- You can configure multiple XD_rs232 networks for cluster heartbeating.
====================================
Installation and Migration Notes
====================================
• For HACMP version 5.4, planning and installation information is split into two separate
guides: the Planning Guide and the Installation Guide.
• HACMP for Linux: Installation and Administration Guide v5.4 is the first edition of a new
manual.
• The Online Planning Worksheets (OLPW) application is now available for download
from the installable image, worksheets.jar, that is located at this URL:
http://www.ibm.com/systems/p/ha/ha_olpw.html
Once you accept the license agreement, locate the worksheets.jar file and click on it.
Or, run the following command from the AIX 5L command line:
java -jar worksheets.jar
• You can apply a PTF to HACMP 5.4.1 on an individual node using rolling migration,
while your critical applications and resources continue running on that node although
they will not be highly available during the upgrade.
• Methods of installation and migration supported in previous releases of HACMP are still
supported.
------------------------------------
5.4.1 migration restriction
------------------------------------
HACMP 5.4.1 is a modification release. There are both base-level filesets and update (ptf)
images. Users should use a consistent method for upgrading their HACMP cluster nodes.
Do not mix base-level filesets on some nodes and update (ptf) images on others in the
same cluster.
-------------------------------------------------------------------------
© Copyright IBM Corp. 1998, 2008 Appendix B. Release Notes for HACMP 5.4.1 B-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
This note applies only to 64-bit systems. You may ignore this note if all of your cluster
nodes are 32 bit.
The NFS daemon nfsd must be restarted on each cluster node with grace periods enabled
after installing cluster.es.nfs.rte before configuring NFSv4 exports. This step is required;
otherwise, NFSv4 exports will fail to export with the misleading error message
exportfs: <export_path>: No such file or directory
The following commands enable grace periods and restart the NFS daemon.
chnfs -I -g on -x
stopsrc -s nfsd
startsrc -s nfsd
Please note that this will impact the availability of all exported filesystems on the machine,
therefore the best time to perform this step is when all resource groups with NFS exports
are offline or failed over to another node in the resource group.
-----------------------------------------------------
Clstat cluster node status for 'forced down' nodes
-----------------------------------------------------
The behavior of stopping a cluster node with the option to unmanage resource groups
(previously known as the force option) was significantly modified with HACMP 5.4.0. Prior
to the HACMP 5.4.0 release, this operation did bring the cluster manager daemon to a
“stopped” state and this was reflected by clstat showing the cluster node's status as
DOWN.
The modifications to this feature in HACMP 5.4.0 necessitated leaving the cluster manager
daemon in an online state (there were multiple motivations for this change in behavior--
one was that it was required to allow Enhanced Concurrent Mode Volume Groups to
remain online). Consequently, clstat run on an HACMP 5.4.0 or later cluster will display
such cluster node's status as UP instead of DOWN as they were displayed before HACMP
5.4.0.
AP One other thing to keep in mind is that when migrating a cluster from before HACMP 5.4.0
to HACMP 5.4.0 or later, where some nodes are pre- 5.4.0 and others are 5.4.0 or later,
clstat run on cluster node A will display cluster node B's status following the conventions of
cluster node A. For example, if clstat is run on a 5.4.1 cluster node, it will display all forced
down nodes as UP whereas running the same clstat command on an HACMP 5.3.0 cluster
node will show those same nodes as DOWN.
------------------------------------
IMPORTANT NOTE ON UPGRADING
------------------------------------
Install the HACMP 5.3 APAR IY85489 to avoid having to start a 5.3 node from a 5.4 node.
Unless you have this APAR, when you have upgraded any node to HACMP 5.4, if you need
to start a 5.3 node while any 5.4 nodes are active, you must start the 5.3 node from a 5.4
node.
If you are upgrading and have nodes that are 5.2 or earlier and must start the 5.2 or earlier
node, start it from a “downlevel” node of 5.2 or lower.
==============================================
Required Release of AIX 5L for HACMP 5.4.1
==============================================
AIX 5L 5.2 ML8 with RSCT version 2.3.9 (APAR IY84921) or higher
AIX 5L 5.3 ML4 with RSCT version 2.4.5 (APAR IY84920) or higher
AIX 5L 6.1 with RSCT version 2.5.0 or higher
==============================================
HACMP Configuration Restrictions
==============================================
HACMP configuration restrictions remain the same as in previous releases and are as
follows:
• Maximum nodes per cluster: 32
• Maximum number of sites: 2
• Minimum number of nodes per site: 1
© Copyright IBM Corp. 1998, 2008 Appendix B. Release Notes for HACMP 5.4.1 B-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
======================
Notes on Functionality
======================
===================================
HACMP 5.4.1 Documentation
===================================
--------------------------------
Order Numbers and Document Names
--------------------------------
Order numbers for 5.4.1 documentation are as follows:
------------------------------------------------------
Documentation for HACMP 5.4.1 is supplied in PDF format. You may want to install the
documentation before doing the full install of the product, to read the chapters on
installation procedures or the description of migration.
Image cluster.doc.en_US.es
--------------------------
cluster.doc.en_US.es.html HAES Web-based HTML
Documentation - U.S. English
© Copyright IBM Corp. 1998, 2008 Appendix B. Release Notes for HACMP 5.4.1 B-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Image cluster.doc.en_US.glvm
----------------------------
cluster.doc.en_US.glvm.html HACMP GLVM HTML Documentation
- U.S. English
cluster.doc.en_US.glvm.pdf HACMP GLVM PDF Documentation
- U.S. English
Image cluster.doc.en_US.pprc
----------------------------
cluster.doc.en_US.pprc.html PPRC Web-based HTML
Documentation - U.S. English
cluster.doc.en_US.pprc.pdf PPRC PDF Documentation
- U.S. English
Image cluster.doc.en_US.assist
------------------------------
cluster.doc.en_US.assist.db2.html HACMP Smart Assist for
DB2 HTML Documentation
- U.S. English
cluster.doc.en_US.assist.db2.pdf HACMP Smart Assist for
DB2 PDF Documentation
- U.S. English
cluster.doc.en_US.assist.oracle.html HACMP Smart Assist for
Oracle HTML Documentation
- U.S. English
cluster.doc.en_US.assist.oracle.pdf HACMP Smart Assist for
Oracle PDF Documentation
- U.S. English
cluster.doc.en_US.assist.websphere.html HACMP Smart Assist for
AP WebSphere HTML
Documentation
- U.S. English
cluster.doc.en_US.assist.websphere.pdf HACMP Smart Assist for
WebSphere PDF
Documentation
- U.S. English
After you install the documentation, store it on a server that is accessible through the
Internet. You can view the documentation in the Mozilla Firefox browser.
Note: Installing all of the documentation requires about 46 MB of space in the /usr
filesystem. (PDF files = 26 MB, HTML files = 20 MB.)
5. Select all filesets that you wish to install and execute the command.
/usr/share/man/info/en_US/cluster/HAES
The titles of the HACMP for AIX 5L products, Version 5.4.1, documentation set are:
© Copyright IBM Corp. 1998, 2008 Appendix B. Release Notes for HACMP 5.4.1 B-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
---------------------------------------------
Accessing Documentation
---------------------------------------------
NOTE: The Smart Assist Guides and the Smart Assist Developer's Guide are installed with
the base fileset. They are described in a separate Smart Assists release notes
Use the following command to determine the exact files loaded into product directories
when installing the HACMP for AIX 5L, version 5.4.1:
lslpp -f “cluster*”
==================
PRODUCT MAN PAGES
==================
Man pages for HACMP commands and utilities are installed in the following directory:
/usr/share/man/cat1
========================
Accessing IBM on the Web
========================
AP
========
Feedback
========
IBM welcomes your comments. You can send any comments via e-mail to:
hafeedbk@us.ibm.com
© Copyright IBM Corp. 1998, 2008 Appendix B. Release Notes for HACMP 5.4.1 B-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
References
SC23-5209-01 HACMP for AIX, Version 5.4.1: Installation Guide
SC23-4864-10 HACMP for AIX, Version 5.4.1:
Concepts and Facilities Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1: Planning Guide
SC23-4862-10 HACMP for AIX, Version 5.4.1: Administration Guide
SC23-5177-04 HACMP for AIX, Version 5.4.1: Troubleshooting Guide
SC23-4867-09 HACMP for AIX, Version 5.4.1: Master Glossary
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit objectives
After completing this unit, you should be able to:
Ɣ Explain and set up IP Address Takeover (IPAT) via IP
replacement
Notes:
AP Instructor notes:
Purpose — To tell the students what we will talk about in this unit.
Details —
Additional information —
Transition statement — Let’s look at what you need to do to configure IPAT via IP
replacement.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
* See earlier discussion of heartbeating and failure diagnosis for explanation of why
Notes:
Requirements
Keep the following items in mind when you configure a network for IPAT via IP
replacement:
- There must be at least one logical IP subnet that has a communication interface
(NIC) on each node. (In HACMP 4.5 terminology, these were called boot adapters.)
- Each service IP address must be in the same logical IP subnet as one of the
non-service addresses. Contrast with IPAT via IP aliasing, where service addresses
are required to not be in a boot subnet.
- If you have more than one service IP address, they must all be in the same subnet.
The reason for this will become clear when we discuss what happens during a
takeover, see “IPAT via IP replacement after a node fails” on page C-12.
- None of the other non-service addresses may be in the same subnet as the service
IP address (this is true regardless of whether IPAT via IP replacement is being used
AP because the NICs on each node are required to be on different IP subnets in order
to support heartbeating).
- All network interfaces must have the same subnet mask.
subnet IP labels
n1-if1, n2-if1, appA-svc,
192.168.10/24
appB-svc
192.168.11/24 n1-if2, n2-if2
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show how to configure a network for IPAT via IP replacement.
Details —
Additional information —
Transition statement — Let’s have a look at IPAT via IP replacement in operation.
AP
Notes:
Operation
When the resource group comes up on its home node, the resource group’s service IP
address replaces the interface IP address of the NIC (AIX ODM), which is in the same
subnet as the service IP label (that is, the boot adapter in HACMP 4.x terminology).
Note that this approach implies that there cannot be two resource groups in the cluster
that both use IPAT via IP replacement and use the same node as their home node
unless their respective service IP addresses are in different subnets (in other words,
associated with different physical networks).
Also, since the service IP address replaces the existing IP address on the NIC, it is not
possible to have two or more service IP addresses in the same resource group, which
are in the same IP subnet (as there will not be an adapter to assign the second service
IP address to).
When the resource group comes up on any node other than its home node, the
resource group’s service IP address replaces the interface IP address of one of the
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
NICs which is not in the same subnet as the service IP address (this is primarily to allow
some other resource group to use the node as its home node).
AP Instructor notes:
Purpose — Show what happens when an IPAT via IP replacement resource group comes
up on a node.
Details —
Additional information —
Transition statement — Let’s see what happens if a NIC fails.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
NIC A NIC B
9.47.11.1 (ODM) 9.47.10.22 (service) 9.47.10.2 (ODM) 9.47.11.2 (ODM)
Notes:
Interface failure
If a communications interface (NIC A), which is currently assigned an IPAT via IP
replacement service IP address, fails, then HACMP moves the service IP address to
one of the other communication interfaces (NIC B) on the same node (to one of the
standby adapters using HACMP 4.x terminology).
If there are no available (that is, functional) NICs left, the relevant network then HACMP
initiates a fallover.
Interface swap
The failed communications interface (NIC A) is then reconfigured with the address of
the communication interface (NIC B) as this allows the heartbeat mechanism to watch
for when the failed communication interface (NIC A) recovers.
AP Instructor notes:
Purpose — Show what happens when a NIC fails with IPAT via IP replacement.
Details —
Additional information —
Transition statement — Let’s look at what happens if a node fails.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Node failure
If the node currently responsible for an IPAT via IP replacement using resource group
fails, then HACMP initiates a fallover. When the resource group comes up on the
takeover node, the service IP addresses are assigned to NICs on the fallover node:
- Home node or Startup policy of Online Using Distribution Policy (rotate in
HACMP 4.x terminology)
If the takeover node is the home node for the resource group or the resource group
has a Startup policy of Online Using Distribution Policy (rotate in HACMP 4.x
terminology), the Service IP addresses replace the IP addresses of a
communications interface (NIC) with an IP address in the same subnet as the
service IP address.
- Not the home node and not Online Using Distribution Policy
If the takeover node is not the home node for the resource group and the resource
group does not have a Startup policy of Online Using Distribution Policy, the
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show what happens when a node fails with IPAT via IP replacement in effect.
Details —
Additional information —
Transition statement — Let’s summarize IPAT via IP replacement.
AP
Notes:
Advantages
Probably the most significant advantage of IPAT via IP replacement is that it supports
hardware address takeover (HWAT), which will be discussed in a few pages.
Another advantage is that it requires fewer subnets. If you are limited in the number of
subnets available for your cluster, this may be important.
Note: Another alternative, if you are limited on the number of subnets you have
available, is to use heartbeating via IP aliases. See Heartbeating Over IP Aliases in the
HACMP for AIX, Version 5.4.1 Planning Guide.
Disadvantages
Probably the most significant disadvantages are that IPAT via IP replacement limits the
number of service IP labels per subnet per resource group on one communications
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
interface to one and makes it rather expensive (and complex) to support lots of
resource groups in a small cluster. In other words, you need more network adapters to
support more applications.
Also, IPAT via replacement usually takes more time than IPAT via aliasing.
Note that HACMP tries to keep the service IP Labels available by swapping IP
addresses with other communication interfaces (standby adapters in HACMP 4.x
terminology) even if there are no resource groups currently on the node that uses IPAT
via IP replacement.
AP Instructor notes:
Purpose — Show a summary of the IPAT via IP replacement configuration rules and
behavior.
Details —
Additional information —
Transition statement — One reason for using IPAT via replacement is if you need to use
hardware address takeover (HWAT). Let’s review why you might need to use HWAT.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Review
When using IPAT via aliasing, you can use AIX’s gratuitous ARP features to update
client and router ARP caches after a takeover. However, there may be issues.
AP to be causing the cluster and the cluster administrator far more serious problems than
the ARP cache issue involves.)
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Discuss the key gratuitous ARP support issues.
Details —
Additional information —
Transition statement — What if gratuitous ARP is not supported?
AP
Ɣ Suggestion:
Do not get involved with using either clinfo or HWAT to deal with
ARP cache issues until you've verified that there actually are ARP
issues which need to be dealt with.
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Present the list of alternative ways of dealing with the ARP cache issue.
Details —
Additional information —
Transition statement — Let’s look at the third option, HWAT.
AP
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
HWAT considerations
There are a few points which must be kept in mind when contemplating HWAT:
- The hardware address that is associated with the service IP address must be unique
within the physical network that the service IP address is configured for.
- HWAT is not supported by IPAT via IP aliasing because each NIC can have more
than one IP address, but each NIC can only have one hardware address.
- HWAT is only supported for Ethernet, token ring, and FDDI networks (MCA FDDI
network cards do not support HWAT). ATM networks do not support HWAT.
- HWAT increases the takeover time (usually by just a few seconds).
- HWAT is an optional capability which must be configured into the HACMP cluster
(we will see how to do that in a few minutes).
- Cluster nodes using HWAT on token ring networks must be configured to reboot
after a system crash because the token ring card will continue to intercept packets
for its hardware address until the node starts to reboot.
AP Instructor notes:
Purpose — Introduce HWAT.
Details —
Additional information —
Transition statement — Let’s take a look at what happens with HWAT.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
bondar-if1 hudson-if1
9.47.9.1 9.47.9.2
tr1 255.255.255.0 tr1
255.255.255.0
tr1
00:04:ac:48:22:f4 00:04:ac:62:72:61
Before hudson-if2
bondar-if2
tr0 9.47.5.3
255.255.255.0
resource 9.47.5.2
255.255.255.0 tr0
00:04:ac:48:22:f6
00:04:ac:62:72:49
group is
started
Bondar Hudson
hudson-if1
bondar-if1 9.47.9.2
9.47.9.1 255.255.255.0
tr1 255.255.255.0 00:04:ac:62:72:61
00:04:ac:48:22:f4
After hudson-if2
xweb
tr0 9.47.5.1
255.255.255.0
resource 9.47.5.2
255.255.255.0 tr0
00:04:ac:48:22:f6
40:04:ac:62:72:49
group is
started
Bondar Hudson
© Copyright IBM Corporation 2008
Notes:
AP Instructor notes:
Purpose — Show what happens with HWAT at startup.
Details —
Additional information —
Transition statement — Let’s see what happens when a node or an interface fails.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Bondar Hudson
xweb
bondar-if1 9.47.5.1
9.47.9.1 255.255.255.0
255.255.255.0 40:04:ac:62:72:49
00:04:ac:48:22:f4
Bondar Hudson
© Copyright IBM Corporation 2008
Notes:
AP Instructor notes:
Purpose — Discuss what happens when a NIC or a node fails.
Details —
Additional information —
Transition statement — Let’s see what happens when a node recovers.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
hudson-if1
bondar-if1 9.47.9.2
9.47.9.1 255.255.255.0
tr1 255.255.255.0 00:04:ac:62:72:61 tr1
00:04:ac:48:22:f4
After HACMP is
xweb
started the node hudson-if2
9.47.5.2
tr0 9.47.5.1 reintegrates 255.255.255.0 tr0
255.255.255.0
40:04:ac:62:72:49 according to its 00:04:ac:48:22:f6
resource group
parameters
Bondar Hudson
© Copyright IBM Corporation 2008
Notes:
AP Instructor notes:
Purpose — Discuss what happens when a node recovers.
Details —
Additional information —
Transition statement — Let’s look at how to implement IPAT using replacement and
HWAT. We’ll start with a scenario.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
bondar hudson
D D
A A
Notes:
Reality check
A side note is probably in order: although most TCP/IP-capable systems respect
gratuitous ARP, there are strange devices out there that do not. This scenario is phony
but it presents a real if rather unlikely problem. For example, the ATM network does not
support gratuitous ARP and so could be a candidate for the use of HWAT.
AP Instructor notes:
Purpose — Introduce the next scenario: hardware address takeover.
Details —
Additional information —
Transition statement — Let’s have a look at how we go about implementing hardware
address takeover.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Implementing HWAT
To use HWAT, we must use IPAT via replacement.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Describe the procedure for implementing HWAT on a network that is currently
using IPAT via IP aliasing.
Details —
Additional information —
Transition statement — First, we stop HACMP.
AP
Stopping HACMP
# smit clstop
Stop Cluster Services
Type or select values in entry fields.
Press Enter AFTER making all desired changes.
[Entry Fields]
* Stop now, on system restart or both now +
Stop Cluster Services on these nodes [bondar,hudson] +
BROADCAST cluster shutdown? true +
* Shutdown mode graceful +
Notes:
Stop HACMP
Make sure that HACMP is shut down gracefully, as we can’t have the application
running while we are changing service IP addresses.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the shutting down of the cluster.
Details —
Additional information —
Transition statement — Next, we remove the existing service IP labels.
AP
+--------------------------------------------------------------------------+
¦ Select Service IP Label(s)/Address(es) to Remove ¦
¦ ¦
¦ Move cursor to desired item and press F7. ¦
¦ ONE OR MORE items can be selected. ¦
¦ Press Enter AFTER making all selections. ¦
¦ ¦
¦ xweb ¦
¦ yweb ¦
¦ zweb ¦
¦ F1=Help F2=Refresh F3=Cancel ¦
¦ F7=Select F8=Image F10=Exit ¦
F1¦ Enter=Do /=Find n=Find Next ¦
F9+--------------------------------------------------------------------------+
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the removal of the old service IP labels.
Details —
Additional information —
Transition statement — Next, we need to convert the IP network to IPAT via IP
replacement.
AP
Notes:
Introduction
Here we change the net_ether_01 network to disable IPAT via aliasing.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the screen used to change the parameters of an IP network.
Details —
Additional information —
Transition statement — Now, we need to assign new IP addresses to the service IP
labels.
AP
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the updated /etc/hosts file for IPAT via IP replacement.
Details — You might need to spend some time giving examples of how other cluster
networks would be configured for IPAT via replacement.
Additional information —
Transition statement — Now, we need to create some alternate hardware addresses.
These locally administered hardware addresses (called Locally Administered Addresses or
LAAs) will be used if HACMP needs to move the service IP label to a different interface or a
different node. The issue here is that they must be unique on your network. Let’s discuss
one method for creating LAAs.
AP
Creating a
locally administered address (LAA)
Ɣ Each service IP label using HWAT will need an LAA
Ɣ The LAA must be unique on the cluster's physical network
Ɣ The MAC address based technologies (Ethernet, Token ring and
FDDI) use six byte hardware addresses of the form:
xx.xx.xx.xx.xx.xx
Ɣ The factory-set MAC address of the NIC will start with 0, 1, 2 or 3
– A MAC address that starts with 0, 1, 2 or 3 is called a Globally Administered Address
(GAA) because it is assigned to the NIC's vendor by a central authority
Notes:
Hardware addresses
Hardware addresses must be unique, at a minimum, on the local network to which they
are connected. The factory set hardware address for each network interface card (NIC)
is administered by a central authority and should be unique in the world. These
addresses are called Globally Administered Addresses (GAAs).
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Discuss how to create an LAA.
Details —
Additional information —
Transition statement — Let’s create two LAAs for our cluster.
AP
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show how to convert two Globally Administered Addresses (GAAs) into
Locally Administered Addresses (LAAs).
Details — Be prepared to use some of the GAAs on network cards in the classroom into
LAAs (that is, you need to be familiar with the procedure before you teach this foil).
Additional information —
Transition statement — Before we define the new service IP labels to HACMP, let’s take a
look at a couple of issues.
AP
Notes:
Issues
The main thing to remember is that you do NOT configure the ALTERNATE hardware
address field in the SMIT devices panel.
You must leave that blank and configure this using the SMIT HACMP menus.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Discuss the importance of using HACMP to apply the LAAs, not the SMIT
devices panel.
Details —
Additional information —
Transition statement — Now, let’s define the new service IP labels to HACMP.
AP
Don't forget to specify the second LAA for the second service IP label.
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the screen used to define a service IP label being used to also specify a
LAA.
Details —
Additional information —
Transition statement — Now, synchronize the changes.
AP
Notes:
Synchronize
Don’t forget to synchronize.
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Show the synchronization step.
Details — The students might wonder why the synchronization step is always shown
explicitly. The synchronization foil marks the end of each scenario (except when an extra
synchronization is done during a scenario). It also could be a useful reminder if this unit is
used as a reference document once the students return to their offices.
Additional information —
Transition statement — Let’s review.
AP
Checkpoint
1. For IPAT via replacement (select all that apply)
a. Each service IP address must be in the same subnet as one of the
non-service addresses
b. Each service IP address must be in the same subnet
c. Each service IP address cannot be in any non-service address subnet
2. True or False?
If the takeover node is not the home node for the resource group and
the resource group does not have a Startup policy of Online Using
Distribution Policy, the service IP address replaces the IP address of a
NIC with an IP address in the same subnet as the subnet of the
service IP address.
3. True or False?
In order to use HWAT, you must enable and complete the
ALTERNATE ETHERNET address field in the SMIT devices menu.
4. True or False?
You must stop the cluster in order to change from IPAT via aliasing to
IPAT via replacement.
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Review.
Details —
Checkpoint solutions
1. For IPAT via replacement (select all that apply)
a. Each service IP address must be in the same subnet as one of
the non-service addresses
b. Each service IP address must be in the same subnet
c. Each service IP address cannot be in any non-service address subnet
2. True or False?
If the takeover node is not the home node for the resource group and
the resource group does not have a Startup policy of Online Using
Distribution Policy, the service IP address replaces the IP address of a
NIC with an IP address in the same subnet as the subnet of the
service IP address.
3. True or False?
In order to use HWAT, you must enable and complete the
ALTERNATE ETHERNET address field in the SMIT devices menu.
4. True or False?
You must stop the cluster in order to change from IPAT via aliasing to
IPAT via replacement.
Additional information —
Transition statement — Let’s summarize.
AP
Unit summary
Key points from this unit:
Ɣ IPAT via IP replacement:
– May require fewer subnets than IPAT via aliasing
– May require more NICs than IPAT via aliasing
– Supports hardware address takeover
Ɣ HACMP replaces non-service IP labels with service IP labels on the
same subnet as the service IP label when the resource group is started
on its home node or if the Startup Policy is distributed
Ɣ HACMP replaces non-service IP labels with service IP labels on a
different subnet from the service IP label when the resource group is
moved to any other node
Ɣ IPAT via IP replacement configuration issues
– Service IP address must be the same subnet as one of the non-service subnets
– All service IP addresses must be in the same subnet
– You must have at least as many NICs on each node as service IP addresses
Ɣ Hardware Address Takeover (HWAT) issues
– Alternate hardware address (Locally Administered Address or LAA) must be configured
in HACMP. Do NOT use standard SMIT field.
– Alternate hardware address must be unique.
© Copyright IBM Corporation 2008
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix C. IPAT via IP replacement C-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Summary.
Details —
Additional information —
Transition statement — What’s next?
Estimated time
00:15
References
SC23-5209-01 HACMP for AIX, Version 5.4.1: Installation Guide
SC23-4864-10 HACMP for AIX, Version 5.4.1:
Concepts and Facilities Guide
SC23-4861-10 HACMP for AIX, Version 5.4.1: Planning Guide
SC23-4862-10 HACMP for AIX, Version 5.4.1: Administration Guide
SC23-5177-04 HACMP for AIX, Version 5.4.1: Troubleshooting Guide
SC23-4867-09 HACMP for AIX, Version 5.4.1: Master Glossary
http://www-03.ibm.com/systems/p/library/hacmp_docs.html
HACMP manuals
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit objectives
After completing this unit, you should be able to:
Ɣ Perform the steps necessary to configure Target Mode SSA
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
bondar hudson
D D
A A
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Use the smitty ssaa fastpath to get to AIX's SSA Adapters menu.
© Copyright IBM Corporation 2008
Notes:
Required software
Target mode SSA support requires that the devices.ssa.tm.rte file set be installed on
all cluster nodes.
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Instructor notes:
Purpose — Demonstrate how to set the SSA node numbers and explain why they need to
be set.
Details —
Additional information —
Transition statement — The next step is to configure the target mode SSA devices from
the AIX device configuration perspective.
Uempty
Notes:
Introduction
Once each node has a unique SSA node number, the AIX configuration manager needs
to be used to define the tmssa devices. Each node must have tmssa devices which
refer to each of the other nodes that they can see via the SSA loops. When cfgmgr is
run on a node, it sets up the node to accept tmssa packets, and it then defines tmssa
devices referring to any other nodes which respond to tmssa packets. In order for this to
all work, the other nodes must all be set up to accept and respond to tmssa packets.
Procedure
The end result is that the following procedure gets all the required tmssa devices
defined:
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
1. Run cfgmgr on each cluster node in turn. This sets up each node to handle tmssa
packets, and defines the tmssa devices on each node to refer to nodes which have
already been setup for tmssa.
2. Run cfgmgr on each node in turn again (depending upon exactly what order you do this
in, it is actually possible to skip running cfgmgr on one of the nodes, but it is probably
not worth the trouble of being sure that the last cfgmgr run wasn’t required).
3. Verify the tmssar devices exist:
Run
# lsdev -C | grep tmssa
on each node. There should be a tmssar device (which is actually a target mode SSA
router acting as a pseudo device) configured on each node.
4. Verify the tmssa devices exist:
Run
# ls /dev/tmssa*
on each node. Note that each node has target mode SSA devices called
/dev/tmssa#.im and /dev/tmssa#.tm where # refers to the other node’s node number.
5. Test the target mode connection:
Enter the following command on the node with id 1 (make sure you specify the tm suffix
and not the im suffix):
# cat < /dev/tmssa2.tm
(This command should hang)
On the node with ID 2, enter the following command (make sure that you specify the im
suffix and not the tm suffix):
# cat /etc/hosts > /dev/tmssa1.im
(The /etc/hosts file should be displayed on the first node)
This validates that the target mode serial network in functional. Please note that any
text file may be substituted for /etc/hosts and you have to specify different tmssa
device names if you configured different SSA node numbers for each node. This is
simply an example.
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Extended Configuration
Move cursor to desired item and press Enter.
Discover HACMP-related Information from Configured Nodes
Extended Topology Configuration
Extended Resource Configuration
Extended Event Configuration
Extended Performance Tuning Parameters Configuration
Security and Users Configuration
Snapshot Configuration
Extended Verification and Synchronization
Notes:
HACMP discover
By discovering the new devices, they will appear in SMIT pick lists when we configure
the tmssa non-IP network. Strictly speaking, it is not necessary to rerun the HACMP
discovery as it is possible to configure tmssa networks by entering in the tmssa device
names explicitly. As this is a rather error-prone process, it is probably best to use the
HACMP discovery mechanism to discover the devices for us.
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
+--------------------------------------------------------------------------+
¦ Select a category ¦
¦ ¦
¦ Move cursor to desired item and press Enter. ¦
¦ ¦
¦ Add Discovered Communication Interface and Devices ¦
¦ Add Predefined Communication Interfaces and Devices ¦
¦ ¦
¦ F1=Help F2=Refresh F3=Cancel ¦
¦ F8=Image F10=Exit Enter=Do ¦
F1¦ /=Find n=Find Next ¦
F9+--------------------------------------------------------------------------+
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
+--------------------------------------------------------------------------+
¦ Select a category ¦
¦ ¦
¦ Move cursor to desired item and press Enter. ¦
¦ ¦
¦ # Discovery last performed: (Feb 12 18:20) ¦
¦ Communication Interfaces ¦
¦ Communication Devices ¦
¦ ¦
¦ F1=Help F2=Refresh F3=Cancel ¦
¦ F8=Image F10=Exit Enter=Do ¦
F1¦ /=Find n=Find Next ¦
F9+--------------------------------------------------------------------------+
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
Final step
Select the tmssa devices on each node and press Enter to define the network.
Refer to Chapter 13 of the HACMP v5.3 Planning and Installation Guide for information
on configuring all supported types of non-IP networks.
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
Unit summary
Key points from this unit:
Notes:
© Copyright IBM Corp. 1998, 2008 Appendix D. Configuring target mode SSA D-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Instructor Guide
backpg
Back page
®