Managing Serviceguard A.11.20, March 2013
Contents
Publishing History .......................................................................................18
Preface......................................................................................................19
1 Serviceguard at a Glance.........................................................................21
What is Serviceguard? ...........................................................................................................21
Failover............................................................................................................................22
About Veritas CFS and CVM from Symantec..........................................................................23
Using Serviceguard Manager..................................................................................................24
Monitoring Clusters with Serviceguard Manager....................................................................24
Administering Clusters with Serviceguard Manager................................................................24
Configuring Clusters with Serviceguard Manager...................................................................24
Starting Serviceguard Manager...........................................................................................24
Using SAM............................................................................................................................24
What are the Distributed Systems Administration Utilities?............................................................25
A Roadmap for Configuring Clusters and Packages ....................................................................25
2 Understanding Serviceguard Hardware Configurations..................................27
Redundancy of Cluster Components..........................................................................................27
Redundant Network Components .............................................................................................28
Rules and Restrictions.........................................................................................................28
Redundant Ethernet Configuration .......................................................................................29
Cross-Subnet Configurations................................................................................................29
Configuration Tasks.......................................................................................................30
Restrictions...................................................................................................................30
For More Information.....................................................................................................31
Replacing Failed Network Cards..........................................................................................31
Redundant Disk Storage..........................................................................................................32
Supported Disk Interfaces....................................................................................................32
Using iSCSI LUNs as Shared Storage...............................................................................32
Data Protection .................................................................................................................33
Disk Mirroring .............................................................................................................33
Disk Arrays using RAID Levels and Multiple Data Paths ......................................................33
About Multipathing...................................................................................................33
Monitoring LVM Disks Through Generic Resources Monitoring Service......................................34
Monitoring LVM Disks Through Event Monitoring Service.........................................................34
Monitoring VxVM and CVM Disks.......................................................................................34
Replacing Failed Disk Mechanisms ......................................................................................34
Replacing Failed I/O Cards................................................................................................34
Sample SCSI Disk Configurations ........................................................................................35
Sample Fibre Channel Disk Configuration ............................................................................36
Redundant Power Supplies ......................................................................................................37
Larger Clusters ......................................................................................................................37
Active/Standby Model ......................................................................................................38
Point to Point Connections to Storage Devices .......................................................................38
3 Understanding Serviceguard Software Components......................................40
Serviceguard Architecture........................................................................................................40
Serviceguard Daemons.......................................................................................................40
Configuration Daemon: cmclconfd...................................................................................41
Cluster Daemon: cmcld..................................................................................................41
File Management Daemon: cmfileassistd..........................................................................42
Syslog Log Daemon: cmlogd..........................................................................................42
Contents 3