Solved

HPUX 11i v3 HA Cluster Configuration setup for Service Guard

Posted on 2012-03-25
1
871 Views
Last Modified: 2012-04-03
I looking for tips and howtos in setuping HA cluster configuration. I have two BL870c i2 in  a c7000 enclosure. I currently have both BL870c i2 blades connected to the same emc san?
Also I have ServiceGuard installed.
0
Comment
Question by:lsbrown1
1 Comment
 
LVL 20

Accepted Solution

by:
tfewster earned 500 total points
ID: 37763573
Setting up a Serviceguard cluster is well documented in the "Managing MC/ServiceGuard" manual and in the "Software Recovery Handbook" (an engineers guide), both available from the HP websites with a bit of searching. (Or just Google "Serviceguard Cluster ;-)

Set up as much redundancy as possible; Multiple Management Modules, PSUs, network interfaces, switches, SAN interfaces. Each server should have 2 separate paths to the EMC SAN, one via each Management Module. Ideally a Cluster should use separate hardware, but a Blade chassis has inbuilt redundancy so it's not unreasonable have both servers in one box unless you have a major disaster.

Use all available network paths between the two servers as Heartbeats, dedicated or not.

For a 2-node cluster, you need a Cluster Lock mechanism. As you're running both "servers" in a blade chassis with networks managed via the "Hypervisor", I'd suggest using a Cluster Lock Disk rather than a separate Quorum Server, as a network problem could take down the Cluster unnecessarily. The Lock Disk can be any shared LVM storage, even one used for data - The lock resolution mechanism doesn't overwrite the data section.

Make time for testing - Normally that would mean killing cmcld and pulling network and power cables to check the resilience and failover mechanism worked as expected. Within a c7000, also check that someone (else) changing the configuration can't kill both "servers" at once.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
forget admin password 8 23
error while running the scirpt 24 116
SSH commands for Nas4free 21 303
Solaris 10.  Nmap installation fails 2 40
Hello fellow BSD lovers, I've created a patch process for patching openjdk6 for BSD (FreeBSD specifically), although I tried to keep all BSD versions in mind when creating my patch. Welcome to OpenJDK6 on BSD First let me start with a little …
Using libpcap/Jpcap to capture and send packets on Solaris version (10/11) Library used: 1.      Libpcap (http://www.tcpdump.org) Version 1.2 2.      Jpcap(http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/index.html) Version 0.6 Prerequisite: 1.      GCC …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now