Solved

HPUX 11i v3 HA Cluster Configuration setup for Service Guard

Posted on 2012-03-25
1
876 Views
Last Modified: 2012-04-03
I looking for tips and howtos in setuping HA cluster configuration. I have two BL870c i2 in  a c7000 enclosure. I currently have both BL870c i2 blades connected to the same emc san?
Also I have ServiceGuard installed.
0
Comment
Question by:lsbrown1
1 Comment
 
LVL 20

Accepted Solution

by:
tfewster earned 500 total points
ID: 37763573
Setting up a Serviceguard cluster is well documented in the "Managing MC/ServiceGuard" manual and in the "Software Recovery Handbook" (an engineers guide), both available from the HP websites with a bit of searching. (Or just Google "Serviceguard Cluster ;-)

Set up as much redundancy as possible; Multiple Management Modules, PSUs, network interfaces, switches, SAN interfaces. Each server should have 2 separate paths to the EMC SAN, one via each Management Module. Ideally a Cluster should use separate hardware, but a Blade chassis has inbuilt redundancy so it's not unreasonable have both servers in one box unless you have a major disaster.

Use all available network paths between the two servers as Heartbeats, dedicated or not.

For a 2-node cluster, you need a Cluster Lock mechanism. As you're running both "servers" in a blade chassis with networks managed via the "Hypervisor", I'd suggest using a Cluster Lock Disk rather than a separate Quorum Server, as a network problem could take down the Cluster unnecessarily. The Lock Disk can be any shared LVM storage, even one used for data - The lock resolution mechanism doesn't overwrite the data section.

Make time for testing - Normally that would mean killing cmcld and pulling network and power cables to check the resilience and failover mechanism worked as expected. Within a c7000, also check that someone (else) changing the configuration can't kill both "servers" at once.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In tuning file systems on the Solaris Operating System, changing some parameters of a file system usually destroys the data on it. For instance, changing the cache segment block size in the volume of a T3 requires that you delete the existing volu…
I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now