Fail Over Clustering

Posted on 2012-09-05
Last Modified: 2012-10-03
Dear Team,
                          While I am configuring  5 node clustering in a scenario 3 node in active and 2 node in passive. Whether all the three node will have access to the Witness disk simultaneously. Please explain me the witness disk access in 5 node clustering were 3 node in active and 2 node passive. How to come to an idea of active and passive in a clustering environment.
Question by:columbuseng
    LVL 39

    Expert Comment

    by:Krzysztof Pytko
    Witness disk would be available only on one active node all other (4 nodes) are able to get it in case of the first one failure.

    Active node is that on which resources are available and users can access them
    Passive node has no resources on it and it is specified as possible resource owner in case of active would fail. Then resources from failed node are taken over by passive node which becomes an active one


    Author Comment

            In my environment , 3 nodes where active . As you said only one active node will access the witness disk . Whats the use of other 2 active nodes in this scenario. Why it is said to be active.
    LVL 39

    Accepted Solution


    if they have no any resources on them then they are not ACTIVE. They are PASSIVE
    Only one node at the time may hold quorum/witness disk. Those 2 nodes are passive and are awaiting for failure of the first node. In that case, quorum./witness disk is being moved to another node (defined in quorum/witness disk as preferred/possible owner) After that when some resources are on it, this node becomes an active node.

    In case that node1 has quorum/witness disk and node2 has resources for FileServer (in example) then node1 and node2 are active but node3 is passive.


    Featured Post

    Want to promote your upcoming event?

    Is your company attending an event or exhibiting at a trade show soon? Are you speaking at a conference? Spread the word by using a promotional banner in your email signature. This will ensure your organization’s most important contacts are in the know.

    Join & Write a Comment

    I had a question today where the user wanted to know how to delete an SSL Certificate, so I thought that I would quickly add this How to! Article for your reference. WHY WOULD YOU WANT TO DELETE A CERTIFICATE? 1. If an incorrect certificate was …
    Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
    This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
    This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…

    730 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now