Solved

How to configure Virtual IP for 2 AIX machines.

Posted on 2011-09-26
2
1,032 Views
Last Modified: 2013-11-14
With clustering software we can have virtual IP address configured so that if server A is down server B can serve the request and request can be sent to both nodes when both servers are up and running through the virtual IP address.. Now we are planning to use Netapps NFS in this case I can't configure Virtual IP address for both servers.

Any suggestion on, how to configure Virtual IP (for 2 AIX servers) would be appreciated.
0
Comment
Question by:syedmquadri
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 250 total points
ID: 36707977
Hi,

do you mean PowerHA (formerly HAC/MP) when you're talking about "Clustering Software"?

The IP Address Takeover (IPAT) mechanism of PowerHA has nothing to do with Virtual IP Address Interfaces (VIPA).
IPAT just works with IP aliasing  (default) or, if so desired with interface reconfiguration.

>> ... request can be sent to both nodes when both servers are up ...<<

This is not possible with PowerHA, so I really think you should explain a bit more what kind of clustering software you're using and what your requirement actually is.

wmp

 
0
 
LVL 14

Expert Comment

by:sjm_ee
ID: 36708189
If you are designing the solution and really want a single request to be performed by "both nodes" that is on both node A AND node B, then you probably want to use a queueing mechanism such as IBM MQseries (or whatever it is now called in Websphere). If you want a single request to be performed by one of node A or node B with each running the same applicaiton at the same time then you probably want to use a load balancer such as Cisco LocalDirector or IBM Network Dispatcher (or whatever it is now called in Websphere). Note that these techniques require applications which are able to support such as solution design.
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Create your own, high-performance VM backup appliance by installing NAKIVO Backup & Replication directly onto a Synology NAS!
In the first part of this tutorial we will cover the prerequisites for installing SQL Server vNext on Linux.
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.
Suggested Courses

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question