Summary of Contents for Novell BUSINESS CONTINUITY CLUSTERING 1.1 SP2 - ADMINISTRATION
Page 1
AUTHORIZED DOCUMENTATION Administration Guide for NetWare 6.5 SP8 ® Novell ® Business Continuity Clustering 1.1 SP2 August 14, 2009 www.novell.com BCC 1.1 SP2: Administration Guide for NetWare 6.5 SP8...
Page 2
Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes.
Page 3
Novell Trademarks For Novell Trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/ trademarks/tmlist.html). Third-Party Materials All third-party trademarks are the property of their respective owners.
Page 7
6.2.3 Adding Search-and-Replace Values to the Resource Replacement Script ..74 6.2.4 Adding SAN Management Configuration Information ......75 6.2.5 Verifying BCC Administrator User Trustee Rights and Credentials .
Documentation Updates The latest version of this Novell Business Continuity Clustering 1.1 SP2 Administration Guide for NetWare 6.5 SP8 (same as OES 2 SP1 NetWare) is available on the Business Continuity Clustering Documentation Web site (http://www.novell.com/documentation/bcc/index.html) under BCC for OES 2 SP1.
Page 12
OES 2 SP1 Documentation Web site (http://www.novell.com/documentation/oes2/index.html). Documentation Conventions In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. ® A trademark symbol ( , etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark.
Moving applications and services to the Internet frees corporations from the restrictions of traditional LAN-based applications. ® ® By using Novell exteNd Director portal services, iChain , and ZENworks , all services, applications, and data can be rendered through the Internet, allowing for loss of service at one site but still providing full access to the services and data by virtue of the ubiquity of the Internet.
This section describes each deployment type, then compares the capabilities of each. Novell Business Continuity Clustering automates some of the configuration and processes used in a cluster of clusters. For information, see Section 1.3, “Novell Business Continuity Clusters,”...
Page 16
Stretch Clusters A stretch cluster consists of a single cluster where the nodes are located in two geographically separate data centers. All nodes in the cluster must be in the same Novell eDirectory tree, which requires the eDirectory replica ring to span data centers. The IP addresses for nodes and cluster resources in the cluster must share a common IP subnet.
Page 17
A cluster of clusters provides the ability to fail over selected cluster resources or all cluster resources from one cluster to another cluster. For example, the cluster resources in one cluster can fail over to separate clusters by using a multiple-site fan-out failover approach. A given service can be provided by multiple clusters.
Page 18
Comparison of Stretch Clusters and Cluster of Clusters Table 1-2 compares the capabilities of a stretch cluster and a cluster of clusters. Comparison of Stretch Cluster and Cluster of Clusters Table 1-2 Capability Stretch Cluster Cluster of Clusters Number of clusters Two or more Number of geographically Two or more...
Page 19
Capability Stretch Cluster Cluster of Clusters Data-block replication between Yes; typically uses storage-based Yes; typically uses storage-based sites mirroring, but host-based mirroring, but host-based mirroring is possible for distances mirroring is possible for distances For information about data up to 10 km. up to 10 km.
Page 20
Table 1-3 illustrates why a cluster of cluster solution is less problematic to deploy than a stretch cluster solution. Manual configuration is not a problem when using Novell Business Continuity Clustering for your cluster of clusters. Advantages and Disadvantages of Stretch Clusters versus Cluster of Clusters...
1.3 Novell Business Continuity Clusters A Novell Business Continuity Clustering cluster is an automated cluster of Novell Cluster Services clusters. It is similar to what is described in “Cluster of Clusters” on page...
Provides simplified business continuity cluster configuration and management by using the browser-based Novell iManager management tool. iManager is used for the configuration and monitoring of the overall system and for the individual resources.
Figure 1-3 shows a two-site business continuity cluster that uses storage-based data replication between the sites. BCC uses eDirectory and Identity Manager to synchronize cluster information between the two clusters. Two-Site Business Continuity Cluster Figure 1-3 Two independent clusters at geographically separate sites Building A Building B...
Figure 1-4 depicts a four-site business continuity cluster that uses storage-based data replication between the sites. BCC uses eDirectory and Identity Manager to synchronize cluster information between the two clusters. Multiple-Site Business Continuity Cluster Figure 1-4 Four independent clusters in geographically separate sites Building D Building C...
Section 1.5.4, “BCC Drivers for Identity Manager,” on page 25 1.5.1 Business Continuity Clusters A cluster of two to four Novell Cluster Services clusters that are managed together by Business Continuity Clustering software. All nodes in every peer cluster are running the same operating system.
2.1 What’s New for BCC 1.1 SP2 Business Continuity Clustering 1.1 SP2 for NetWare SP8 provides the following enhancements and changes: Support for NetWare 6.5 SP8 (same as Novell Open Enterprise Server (OES) 2 SP1 NetWare) Support for Novell Cluster Services 1.8.5 for NetWare Support for Identity Manager 3.5.1...
Page 28
Automatic failover No need for administrator intervention Based on a configurable minimum number of nodes or a percentage of nodes Extensible monitoring framework Disabled by default BCC 1.1 SP2: Administration Guide for NetWare 6.5 SP8...
Planning a Business Continuity Cluster ® Use the guidelines in this section to design your Novell Business Continuity Clustering solution. The success of your business continuity cluster depends on the stability and robustness of the individual peer clusters. BCC cannot overcome weaknesses in a poorly designed cluster environment.
When configuring Spanning Tree Protocol (STP), ensure that Portfast is enabled, or consider Rapid Spanning Tree. The default settings for STP inhibit the heartbeat for over 30 seconds whenever there is a change in link status. Test your STP configuration with Novell Cluster Services running to make sure that a node is not cast out of the cluster when a broken link is restored.
The primary objective of SAN (storage area network) connectivity in a cluster is to provide solid and stable connectivity between cluster nodes and the storage system. Before installing Novell Cluster Services and Novell Business Continuity Clustering, make sure the SAN configuration is established and verified.
3.6 eDirectory Design Guidelines Your Novell eDirectory solution for each of the peer clusters in the business continuity cluster must consider the following configuration elements. Make sure your approach is consistent across all peer clusters.
3.6.2 Cluster Context Place each cluster in a separate Organizational Unit (OU). All server objects and cluster objects for a given cluster should be in the same OU. Cluster Resources in Separate OUs Figure 3-1 3.6.3 Partitioning and Replication Partition the cluster OU and replicate it to dedicated eDirectory servers holding a replica of the ®...
Cluster Resource Identity in Two Clusters Figure 3-2 3.7 Cluster Design Guidelines Your Novell Cluster Services solution for each of the peer clusters in the business continuity cluster must consider the following configuration guidelines. Make sure your approach is consistent across all peer clusters.
Page 35
ID 1 to volume . Cluster-enabled volumes use _ADMIN high volume IDs, starting from 254 in decending order. Novell Client uses the volume ID to access a volume. When existing clusters are configured and enabled within the same business continuity cluster, the volume IDs for the existing shared volumes might also share the same volume IDs.
Section 4.5, “What’s Next,” on page 53 4.1 Requirements for BCC 1.1 SP2 for NetWare The requirements in this section must be met prior to installing Novell Business Continuity Clustering software. Section 4.1.1, “Business Continuity Clustering Licensing,” on page 38 Section 4.1.2, “Business Continuity Cluster Component Locations,”...
4.1.1 Business Continuity Clustering Licensing Novell Business Continuity Clustering software requires a license agreement for each business continuity cluster. For purchasing information, see Novell Business Continuity Clustering (http:// www.novell.com/products/businesscontinuity/howtobuy.html). 4.1.2 Business Continuity Cluster Component Locations Figure 4-1 illustrates where the various components needed for a business continuity cluster are installed.
4.1.4 Novell Cluster Services 1.8.5 for NetWare You need two to four clusters with Novell Cluster Services™ 1.8.5 (the version that ships with NetWare 6.5 SP8 (same as OES 1 SP2 NetWare) installed and running on each node in the cluster.
To add or change peer cluster credentials, you must access iManager on a server that is in the same eDirectory tree as the cluster where you are adding or changing peer credentials. 4.1.5 Novell eDirectory 8.8 Novell eDirectory 8.8 is supported with Business Continuity Clustering 1.1 Support Pack 1. See the eDirectory 8.8 documentation (http://www.novell.com/documentation/edir88/index.html) for more information.
“Identity Manager Management Utilities” on page 42 Downloading the Bundle Edition The bundle edition is a limited release of Novell Identity Manager 3.5.1 for NetWare 6.5 SP8 (same as OES 2 SP1 NetWare) that allows you to use the Identity Manager software, the eDirectory driver, and the Identity Manager management tools for Novell iManager 2.7.2.
Page 42
Identity Manager Management Utilities The Identity Manager management utilities must be installed on the same server as Novell iManager. The Identity Manager utilities and iManager can be installed on a cluster node, but installing them on a non-cluster node is the recommended configuration. For information about iManager requirements for BCC, see Section 4.1.8, “Novell iManager 2.7.2,”...
4.1.8 Novell iManager 2.7.2 Novell iManager 2.7.2 (the version released with NetWare 6.5 SP8 (OES 2 SP1 NetWare)) must be installed and running on a server in the eDirectory tree where you are installing Business Continuity Clustering software. You need to install the BCC plug-in, the Clusters plug-in, and the Storage Management plug-in in order to manage the BCC in iManager.
4.1.11 OpenWBEM OpenWBEM must be configured to start in , and be running when you manage the autoexec.ncf cluster with Novell iManager. For information on setup and configuration, see the OES 2: OpenWBEM Services Administration Guide (http://www.novell.com/documentation/oes2/ mgmt_openwbem_lx_nw/data/front.html). Port 5989 is the default setting for secure HTTP (HTTPS) communications. If you are using a firewall, the port must be opened for CIMOM communications.
See your storage system vendor documentation for more information on configuring LUN masking. When you create a Novell Cluster Services system that uses a shared storage system, it is important to remember that all of the servers that you grant access to the shared device, whether in the cluster or not, have access to all of the volumes on the shared storage space unless you specifically prevent such access.
Web browser, click Tools > Options > Languages, then set the first language preference in the list to a supported language. Refer to the Novell iManager documentation (http://www.novell.com/documentation/imanager27/) for information about supported languages. Web Browser Character Encoding Setting Supported language codes are Unicode (UTF-8) compliant.
4.2 Downloading the Business Continuity Clustering Software Before you install Novell Business Continuity Clustering, download and copy the software to a directory on your Windows workstation. To download Novell Business Continuity Clustering 1.1 SP2 for NetWare 6.5 SP8, go to the Novell Business Continuity Clustering download site (http:// download.novell.com/Download?buildid=bdkmSxRgKVk~).
You must also ensure that the BCC Administrator user has file system rights to the directory of each of the nodes in your BCC. This is necessary because _ADMIN:\Novell\Cluster volume is virtual, and is created each time the server starts. For this reason, you cannot...
This can be done in a rolling fashion. You should start with the node that has the highest IP address first and work down in IP address order. This speeds the rate at which the Novell Cluster Services master node acquires the change. 4.3.4 Assigning Trustee Rights for the BCC Administrator User...
4.4 Installing and Configuring the Novell Business Continuity Clustering Software It is necessary to run the Novell Business Continuity Clustering installation program when you want Install the Business Continuity Clustering engine software on cluster nodes for the clusters that will be part of a business continuity cluster.
Windows server later in the installation. Novell Business Continuity Clustering: Installs the core Business Continuity Clustering engine files. This core software must be installed on all nodes in each Novell Cluster Services cluster that will be part of a business continuity cluster.
This lets you keep your cluster up and running and lets your users continue to access the network while cluster nodes are being restarted. 9 Repeat the above steps for each Novell Cluster Services cluster that will be part of the business continuity cluster.
Identity Manager Templates for Windows iManager Servers: Installs the templates on the local Windows iManager server. You will be asked to specify the path to Tomcat (a default path is provided) on the Windows server later in the installation. 4 Do one of the following: NetWare iManager Server: If you chose to install the Identity Manager iManager templates on a NetWare server, specify the name of the eDirectory tree and the fully distinguished name for the server where you want to install the templates.
BCC 1.1 SP2 for NetWare requires that every node in each peer cluster be upgraded to NetWare 6.5 SP8 (same as OES 2 SP1 NetWare) with the latest patches for NetWare and Novell Cluster Services. For information, see the following resources: NetWare: “Upgrading to OES 2 SP1...
8b Update NetWare 6.5 from version SP5 or SP6 to version SP8, and apply the latest patches for NetWare and Novell Cluster Services. For information, see the NetWare Installation Guide (http://www.novell.com/ documentation/oes2/inst_oes_nw/data/b7211uh.html)
Page 57
NPM files, and then re-installing the correct iManager NPMs, as described in TID 3009687: You must specify an IP address; iManager plug-ins not working after update to SP6 (http://www.novell.com/support/php/ search.do?cmd=displayKC&docType=kc&externalId=3009687). Novell Archive and Version Services ( arkmgmt.npm Novell Cluster Services ( ncsmgmt.npm Novell Storage Services nssmgmt.npm...
5.3 Upgrading Clusters from BCC 1.0 to BCC 1.1 SP2 for NetWare Upgrading from BCC 1.0 to BCC 1.1 SP2 while leaving the BCC configuration in place is a two- phased process where you must perform an intermediate upgrade to BCC 1.1 SP1 on NetWare 6.5 SP6 as follows: Initial Configuration Intermediate Configuration...
Page 59
For information, see “Updating an OES NetWare Server” (http://www.novell.com/ documentation/oes/install-nw/data/b7211uh.html) in the OES NetWare Installation Guide. See the Business Continuity Clustering 1.1 Readme file (http://www.novell.com/ documentation/bcc/pdfdoc/readme/readme111.pdf) for instructions on mandatory patches. 3c Issue the command on the node. cluster join 3d Upgrade Business Continuity Clustering from version 1.0 to 1.1 SP1 by installing BCC...
IMPORTANT: Make sure the administrator username meets the requirements specified in Section 4.3, “Configuring a BCC Administrator User,” on page 10 Verify that Novell Cluster Services and BCC 1.1 SP1 appear to be functioning correctly by performing the following tests: 10a Create a new BCC enabled pool resource, BCC migrate it between peer clusters, and verify that it migrates correctly.
Page 61
OES 2 SP1 Readme (http:// www.novell.com/documentation/oes2/oes_readme/data/readme.html). NOTE: The DirXML plug-ins will be replaced by Identity Manager 3.5.1 plug-ins in Step 5 on page 3c1 In iManager, uninstall the old iManager plug-ins for Novell Cluster Services ), NSS ( ), Archive and Version Services (ncsmgmt.npm nssmgmt.npm...
Page 62
BCC Cluster from 1.0 to 1.1 SP1,” on page 12 Start the new Identity Manager drivers for each peer cluster. 13 Verify that Novell Cluster Services and BCC 1.1 SP2 appear to be functioning correctly by performing the following tests: 13a Create a new BCC enabled pool resource, BCC migrate it between peer clusters, and verify that it migrates correctly.
3 Upgrade NetWare 6.5 from version SP6 to SP8, and apply the latest patches for NetWare and Novell Cluster Services. You can perform a script upgrade by using NWCONFIG. For information, see “3.0 Upgrading to OES 2 SP1 NetWare” (http://www.novell.com/ documentation/oes2/inst_oes_nw/data/b7211uh.html) in the OES 2 SP1: NetWare Installation Guide.
NOTE: The DirXML plug-ins will be replaced by Identity Manager 3.5.1 plug-ins in Section 5.4.3, “Upgrading Identity Manager,” on page 4a In iManager, uninstall the old iManager plug-ins for Novell Cluster Services ), NSS ( ), Archive and Version Services ( (ncsmgmt.npm...
Section 4.1.7, “Identity Manager 3.5.1 Bundle Edition,” on page Make sure that the Identity Manager node meets the 3.5.1 upgrade requirements. For information, see “Upgrading” (http://www.novell.com/documentation/idm35/install/data/ ampxjxi.html) in the Identity Manager 3.5.1 Installation Guide. For information about installing or upgrading Identity Manager, see the Identity Manager 3.51...
4 Start the new Identity Manager drivers for each peer cluster. 5.4.5 Verifying the BCC Upgrade Verify that Novell Cluster Services and BCC 1.1 SP2 appear to be functioning correctly by performing the following tests: 1 Create a new BCC enabled pool resource, BCC migrate it between peer clusters, and verify that it migrates correctly.
Business Continuity Cluster The Identity Manager preconfigured templates for iManager that were installed when you ran the Novell Business Continuity Clustering installation must be configured so you can properly manage your business continuity cluster. The preconfigured templates include the following: Cluster Resource Synchronization: A set of policies, filters, and objects that synchronize cluster resource information between any two of the peer clusters.
2003 as the port number for the resource synchronization template in the peer driver for the other cluster. Full Distinguished Name (DN) of the cluster this driver services: For example, Cluster1.siteA.Novell. BCC 1.1 SP2: Administration Guide for NetWare 6.5 SP8...
Page 69
BCC enabled resource are also placed in the landing zone. IMPORTANT: The context must already exist and must be specified using dot format without the tree name. For example, siteA.Novell. Prior to performing this step, you could create a separate container in eDirectory specifically for these cluster pool and volume objects.
6.1.2 Creating SSL Certificates It is recommended that you create an SSL certificate for the Cluster Resource Synchronization driver. Creating one certificate creates the certificate for a driver pair. For example, creating an SSL certificate for the Cluster Resource Synchronization driver also creates the certificate for the Cluster Resource Synchronization drivers on the other clusters.
6 Click Add, browse to and select the Cluster object for the new cluster you are adding to the business continuity cluster, then click OK. Selecting the Cluster object causes the BCC-specific Identity Manager drivers to synchronize. If you have multiple eDirectory trees in your BCC, see Section B.5, “Synchronizing the BCC- Specific Identity Manager Drivers,”...
Page 72
Three-Cluster Identity Manager Synchronization Master Figure 6-2 Cluster Cluster Cluster Three You could also have Cluster One synchronize with Cluster Two, Cluster Two synchronize with Cluster Three, and Cluster Three synchronize back to Cluster Two as illustrated in Figure 6-3. Alternate Three-Cluster Identity Manager Synchronization Scenario Figure 6-3 Cluster...
6.2 Configuring Clusters for Business Continuity The following tasks must be performed on each separate Novell Cluster Services cluster that you want to be part of the business continuity cluster: Section 6.2.1, “Enabling Clusters for Business Continuity,” on page 73 Section 6.2.2, “Adding Cluster Peer Credentials,”...
When adding the administrator username, do not include the context for the user. For example, instead of bccadmin bccadmin.prv.novell Rather than using the Admin user to administer your BCC, you should consider creating another user with sufficient rights to the appropriate contexts in your eDirectory tree to manage your BCC.
To add resource script search-and-replace values: 1 In iManager, click Clusters > Cluster Options, select the Cluster object, click Properties, then select the Busines Continuity. 2 In the Resource Script Replacements section of the Business Continuity Cluster Properties page, click New. 3 Add the desired search-and-replace values.
Page 76
You can also add commands and Perl scripts to the resource scripts to call other scripts. Any command that can be run at the NetWare server console can be used. The scripts or commands you add are stored in eDirectory. If you add commands to call outside scripts, those scripts must exist on every server in the cluster.
Page 77
Most SAN vendors do not support running multiple scripts concurrently. Edit Flags: This is an advanced feature, and should not be used except under the direction of Novell Support. 7c Click Apply and OK on the Script Details page, then click OK on the Resource Properties page to save your script changes.
You must also ensure that the BCC Administrator user has file system rights to the directory of all nodes in your BCC. This is necessary because _ADMIN:\Novell\Cluster the_ADMIN volume is virtual, and is created each time the server starts. For this reason, you cannot assign eDirectory trustee rights to the volume.
You should contact Novell Support prior to adding search-and-replace values for individual cluster resources. To enable a resource for business continuity, certain values (such as IP addresses, DNS names, and tree names) specified in resource load and unload scripts need to be changed in corresponding resources in the other clusters.
To add resource script search-and-replace values specific to this resource: 1 In the Resource Replacement Script section of the page, click New. If a resource has already been configured for business continuity, you can click Edit to change existing search-and-replace values or click Delete to delete them. 2 Add the desired search-and-replace values, then click OK.
2 Do one of the following: If you are creating a new non-pool cluster resource that contains a Reiser or Ext3 file system, click Finish. If this is an existing non-pool cluster resource that contains a Reiser or Ext3 file system, click Apply.
Managing a Business Contiuity Cluster ® This section can help you effectively manage a business continuity cluster with the Novell Business Continuity Clustering software. It describes how to migrate cluster resources from one Novell Cluster Services cluster to another, to modify peer credentials for existing clusters, and to generate reports of the cluster configuration and status.
A custom Perl script can be created for disk mapping on Fibre Channel SANs. The purpose of this script is to make the LUNs in the SAN available to the destination cluster. A reverse script is also created for testing purposes so pool resources can be migrated back to the source cluster. 5.
6 Edit the administrator username and password that the selected cluster will use to connect to the selected peer cluster, then click OK. When specifying a username, you do not include the Novell eDirectory context for the user name. NOTE: If the business continuity cluster has clusters in multiple eDirectory trees, and you specify a common username and password, each eDirectory tree in the business continuity cluster must have the same username and password.
7.3.2 Using Console Commands to View the Cluster Status At the server console of a server in the business continuity cluster, enter the following commands to get different kinds of status information: cluster view cluster status cluster connections 7.4 Generating a Cluster Report You can generate a report for each cluster in the business continuity cluster to list information on a specific cluster, such as current cluster configuration, cluster nodes, and cluster resources.
If BCC enabled resources need to be BCC disabled, remove the secondary peer clusters from the resource’s assigned list, then disable BCC only from the primary cluster, either by using iManager or command line. Do not BCC disable the same resource from multiple peer clusters. To disable BCC for a cluster resource: 1 Start your Internet browser and enter the URL for iManager.
NOTE: The terms promote and demote are used here in describing the process of changing LUNs to a state of primary or secondary, but your SAN vendor documentation might use different terms such as mask and unmask. Section 7.6.1, “SAN-Based Mirroring Failure Types and Responses,” on page 88 Section 7.6.2, “Host-Based Mirroring Failure Types and Responses,”...
Secondary Cluster Fails but Secondary SAN Does Not No additional response is necessary for this failure other than recovering the secondary cluster. When you bring the secondary cluster back up, the LUNs are still in a secondary state to the primary SAN.
Page 90
Primary Cluster Fails but Primary SAN Does Not Response for this failure is the same as for SAN-based mirroring described in Primary Cluster Fails but Primary SAN Does Not Section 7.6.1, “SAN-Based Mirroring Failure Types and Responses,” on page 88. Do not disable MSAP (Multiple Server Activation Prevention), which is enabled by default.
Page 91
Intersite LAN Connectivity Is Lost Users might not be able to access servers in the primary cluster but can possibly access servers in the secondary cluster. If both clusters are up, nothing additional is required. An error is displayed. Wait for connectivity to resume.
Regardless of their virtual nature, virtual IP addresses and virtual NICs behave like physical IP addresses and physical NICs, and they are similarly configured by using either the INETCFG server-based utility or the Novell Remote Manager Web-based utility. Section 8.1, “Virtual IP Address Definitions and Characteristics,” on page 93 Section 8.2, “Virtual IP Address Benefits,”...
8.1.2 Characteristics Virtual IP addresses are unique in that they are bound to a virtual “ether” medium instead of to a “physical” network medium such as Ethernet. In other words, the virtual IP address space is different than the physical IP address space. As a result, virtual IP network numbers need to be different from physical IP network numbers.
Page 95
The following figure illustrates a multihomed server with all nodes running a dynamic routing protocol. Multihomed Server Running a Dynamic Routing Protocol Figure 8-1 Server 1.1.1.1 2.2.2.1 1.1.1.2 2.2.2.2 Router 1 Router 2 3.3.3.1 3.3.3.2 3.3.3.3 Client In this network, the server is a multihomed server hosting a critical network service. For simplicity, assume that all nodes are running some dynamic routing protocol.
Page 96
Multihomed Server Using Virtual IP Addresses Figure 8-2 4.4.4.1 (Virtual IP) Server 1.1.1.1 2.2.2.1 1.1.1.2 2.2.2.2 Router 1 Router 2 3.3.3.1 3.3.3.2 3.3.3.3 Client In this configuration, if the 1.1.1.1 interface were to fail, the client would ultimately learn the new route through Router 2 and would correctly forward packets to Router 2 instead of Router 1.
8.2.2 Unlimited Mobility Unlike physical IP addresses, which are limited in their mobility, virtual IP addresses are highly mobile. The degree of mobility is determined by the number of servers that an IP address on a specific server could be moved to. In other words, if you choose a physical IP address as an IP address of a network resource, you are limiting the set of potential servers to which this resource could transparently fail over to.
IP address or, a unique virtual IP address. Furthermore, consider that each virtual IP address belongs to a virtual IP network whose route is being advertised by a single node within a cluster. Because Novell Cluster Services can migrate a service and its virtual IP address from one node to another, the virtual IP network must migrate to the same node as the service.
4. If the cluster resource is a clustered-enabled pool or volume, the IP address of that resource ® needs to be changed to the virtual IP address. You can do this by using ConsoleOne , Novell Remote Manager, or iManager. This change is not needed for any non-volume cluster resources like DHCP.
8.4.1 Displaying Bound Virtual IP Addresses To verify that a virtual IP address is bound, enter at the server display secondary ipaddress console of the cluster server where the virtual IP address is assigned. This displays all bound virtual IP addresses. A maximum of 256 virtual IP addresses can be bound. 100 BCC 1.1 SP2: Administration Guide for NetWare 6.5 SP8...
Troubleshooting Business Continuity Clustering 1.1 ® This section contains the following topics to help you troubleshoot Novell Business Continuity Clustering 1.1. Section 9.1, “Cluster Connection States,” on page 101 Section 9.2, “Driver Ports,” on page 103 Section 9.3, “Excluded Users,” on page 103 Section 9.4, “Security Equivalent User,”...
Page 102
Ping the peer cluster to see if it is up to the selected peer cluster. and reachable. Ensure that BCC is running on the peer cluster and that Novell Cluster Services is running on the servers in the peer cluster.
2 Using an editor, open the file that is referenced in the message that appears. You can get additional information on how to use the log file by entering at the help log NetWare server console. 9.2 Driver Ports If your Identity Manager driver or drivers won’t start, check for a port number conflict. Identity Manager driver port numbers must not be the same as other driver port numbers in the cluster or ports being used by other services such as Apache.
To see the excluded users list: 1 Start your Internet browser and enter the URL for iManager. The URL is http://server_ip_address/nps/iManager.html. Replace server_ip_address with the IP address or DNS name of the server that has iManager and the Identity Manager preconfigured templates for iManager installed.
If SSL certificates are not present or have not been created, Identity Manager drivers might not start or function properly. Novell recommends using SSL certificates for encryption and security. NOTE: You should create or use a different certificate than the default (dummy) certificate (BCC Cluster Sync KMO) that is included with BCC.
This is helpful for reporting problems to Novell Support. 9.8 Problems with Installing BCC on NetWare Occasional problems might exist when installing BCC software on NetWare cluster servers.
Selecting the Auto Start option is recommended. Unknown communications problems. Section 9.11, “Tracing Identity Manager Communications,” on page 108. -670 errors in the DSTrace logs. See TID # 10090395 (http://support.novell.com/docs/Tids/ Solutions/10090395.html) This is commonly caused by loading before SAS, which causes problems when rconag6.nlm Identity Manager tries to load.
This is because BCC and iManager use the tree key to encrypt the credentials. Setting credentials by using iManager in a different tree uses an invalid tree encryption. LIBC has not been updated. See TID # 2974119 (http://support.novell.com/docs/Readmes/ InfoDocument/2974119.html). A firewall is blocking port 5988 or 5989 (CIM).
On the resource object, change the NCS:BCC State attribute to 0 to set the resource to the primary state. Also, increment the NCS:Revision attribute one number so that Novell Cluster Services recognizes that the resource properties have been updated. See...
To resolve this problem, edit the resource unload script and change the line to NUDP DEL name ip . Unlike the command, the command does not wait for all NCP NUDP ODEL name ip ODEL connections to close. This makes it much faster. NOTE: The cluster resource must be brought offline and then back online for changes to the unload script to take effect.
If you get an error in iManager with a blank error string (no text appears with the error message) while attempting to bring a resource online, it is possible that Novell Cluster Services views the resource as secondary even though BCC has changed the resource to primary and iManager shows the resource as primary.
SLP Server Name is the name being advertised in SLP as specified in the resource load script. This method requires a client reboot. TID 10057730 (http://support.novell.com/docs/Tids/Solutions/10057730.html) information on modifying the server cache Time To Live (TTL) value on the Novell Client 9.23 Mapping Drives to Home Directories by Using the %HOME_DIRECTORY Variable...
#!ICE -b -D LDAP -d cn=root,ou=servers,o=lab -w novell -S LDIF -f #@ -s0 -w20 version: 1 dn: cn=HOMES_REF, ou=servers,o=lab changetype: modify replace: hostServer hostServer: cn=BCC_CLUSTER_HOMES_SERVER,ou=From_BCCP,ou=servers,o=lab The first line in the sample script instructs NSMI to run the ICE utility. The -b parameter automatically closes the ICE window.
Page 114
1017 Invalid BCC API version. 1018 Could not find a pool for the specified cluster resource. 1019 Error managing the SAN via the Novell SAN Management Interface. 1020 CIM Client error. 1021 Error creating a system resource (mutex, semaphore, etc.).
Section 10.3, “General Security Guidelines,” on page 120 Section 10.4, “Security Information for Dependent Products,” on page 120 10.1 Security Features ® The following table contains a summary of the security features of Novell Business Continuity Clustering 1.2: Business Continuity Clustering 1.2 Security Features...
10.2 Security Configuration The following subsections provide a summary of security-related configuration settings for Business Continuity Clustering 1.1: Section 10.2.1, “BCC Configuration Settings,” on page 116 Section 10.4, “Security Information for Dependent Products,” on page 120 10.2.1 BCC Configuration Settings The following table lists the BCC configuration settings that are security-related or impact the security of BCC: BCC Security Configuration Settings...
XML Configuration WARNING: You should not change the configuration settings for the NCS:BCC Settings attribute unless instructed to do so by Novell Support. Doing so can have adverse affects on your cluster nodes and BCC. The following XML for the NCS:BCC Settings attribute is saved on the local Cluster object in eDirectory.
Page 118
<idlePriorityThreshold>3</idlePriorityThreshold> <initialNormalThreads>3</initialNormalThreads> <initialPriorityThreads>2</initialPriorityThreads> <ipcResponseTimeout>15</ipcResponseTimeout> <maximumPriorityThreads>20</maximumPriorityThreads> <minimumPriorityThreads>2</minimumPriorityThreads> <resourceOfflineTimeout>300</resourceOfflineTimeout> <resourceOnlineTimeout>300</resourceOnlineTimeout> <scanForNewDevicesDelay>5</scanForNewDevicesDelay> </bccSettings> Table 10-3 provides additional information on each setting: BCC XML Settings Table 10-3 Setting Description Default Value The name of the LUM-enabled group that bccgroup <adminGroupName> BCC uses on Linux. <authorizationCacheTTL>...
To turn off SSL for inter-cluster communication, or to specify a different communication port, you need to modify the Novell Cluster Services Cluster object that is stored in eDirectory by using an ®...
The changes do not take effect until either a reboot of each cluster node, or a restart of the Business Continuity Clustering software on each cluster node. The following table provides an example of possible combinations of scheme and port specifier for tag for values of the NCS:BCC Peers attribute: <address>...
Page 121
“Enabling and Configuring iSCSI Initiator Security” in the OES 2 SP 1: iSCSI 1.1.3 for NetWare Administration Guide. Novell Cluster Services for NetWare In the OES 2 SP2: Novell Cluster Services 1.8.5 for NetWare Administration Guide, see “Configuration Requirements”. Novell Storage Services for NetWare...
Console Commands for BCC ® Novell Business Continuity Clustering (BCC) provides server console commands to help you perform certain BCC management tasks. Some of the commands can also be used to manage Novell Cluster Services clusters. Table A-1 lists the server console commands for managing a business continuity cluster and gives a brief description of each command.
Page 124
Console Command Description Enables Business Continuity Clustering for the cluster enable [resource] specified resource. The resource you specify must be a member of a cluster that has already been enabled for Business Continuity Clustering. If no resource is specified, the entire cluster is enabled for Business Continuity Clustering.
Page 125
Console Command Description cluster refresh This command should not be used except under the direction of Novell Support. Console Commands for BCC 125...
® (SP) 2 for NetWare 6.5 SP8 (same as Novell Open Enterprise Server (OES) 2 SP1 NetWare), the information is also useful for configuring and managing BCC in a multiple-tree environment. This section contains additional instructions and information for multiple-tree BCC implementations.
The BCCAdmin user needs administrator rights in the container where the User objects reside so that User objects can be synchronized between eDirectory trees. For information, see Section 4.1.5, “Novell eDirectory 8.8,” on page B.1.3 SSL Certificates for Drivers In a multiple-tree business continuity cluster, you should create separate SSL certificates for the Cluster Resource Synchronization driver and for the User Object Synchronization driver.
Descriptions of the information required are also included with each field. Additional information for the wizard page fields can be found in “Importing the Sample Driver Configuration” (http://www.novell.com/documentation/dirxmldrivers/edirectory/data/ bozojif.html) in the Identity Manager Driver for eDirectory Implementation Guide. 9 In the left column of the iManager page, click Identity Manager, then click Identity Manager Overview.
To create an SSL certificate: 1 Start your Internet browser and enter the URL for iManager. The URL is http://server_ip_address/nps/iManager.html. Replace server_ip_address with the IP address or DNS name of the server that has iManager and the Identity Manager preconfigured templates for iManager installed. 2 Specify your username and password, specify the tree where you want to log in, then click Login.
B.6 Preventing Identity Manager Synchronization Loops If you have three or more clusters each in separate eDirectory trees in your business continuity cluster, you should set up IDM User object and Cluster Resource object synchronization in a manner that prevents Identity Manager synchronization loops. Identity Manager synchronization loops can cause excessive network traffic and slow server communication and performance.
You could also have Cluster One synchronize with Cluster Two, Cluster Two synchronize with Cluster Three, and Cluster Three synchronize back to Cluster Two as illustrated in Figure B-3. Alternate Three-Cluster Identity Manager Synchronization Scenario Figure B-3 Cluster IDM Sync Cluster Cluster Three...
Setting Up Auto-Failover ® Auto-failover is available beginning in Novell Business Continuity Clustering 1.1. To set up the auto-failover feature, you must enable it, then configure the auto-failover settings. WARNING: Auto-failover is disabled by default and is not recommended. It should only be enabled after a thorough examination and review of your network and geographic site infrastructure.
8 Click the Auto-Failover link just under the tabs. 9 Select the Enable Automatic Failover of Business Continuity Cluster Resources check box, then click Apply. 10 Continue with Section C.2, “Creating an Auto-Failover Policy,” on page 134 to create a failover policy.
Page 135
These conditions can be combined in any order to construct a more robust rule that helps to avoid an undesired failover. For failover to occur, each condition of only one rule must be satisfied for the specified cluster or clusters. For rules with monitor conditions automatically created by using the Cluster Membership Monitoring Settings table, you can add a condition that tests if the connection to the peer cluster is up.
The nodepnt and nodecnt monitors do not support optional parameters. 6 Click Apply to save your settings. NOTE: See the BCC NDK documentation (http://developer.novell.com/documentation/cluster/ index.html?page=/documentation/cluster/ncss_enu/data/bktitle.html) for more information on creating custom failover policies. 136 BCC 1.1 SP2: Administration Guide for NetWare 6.5 SP8...
For information about storage-based mirroring, consult your storage system vendor or see the storage system vendor documentation. Host-based synchronous mirroring functionality is included with the Novell Storage Services (NSS) file system (NSS mirroring) that is part of NetWare 6.5. NSS mirroring is a checkpoint-based synchronous mirroring solution.
Section D.2, “Creating NSS Volumes,” on page 139 Section D.3, “Novell Cluster Services Configuration and Setup,” on page 140 Section D.4, “Checking NSS Volume Mirror Status,” on page 140 D.1 Creating and Mirroring NSS Partitions on Shared Storage NSS provides a software RAID 1 configuration option that mirrors NSS pool partitions. The partitions are automatically created by the NSS management tools when you create a pool and when you mirror the pool.
You can select one or all of the advertising protocols. NCP™ is the protocol used by Novell clients, CIFS is the protocol used by Microsoft clients, and AFP is the protocol used by Macintosh clients. Selecting any of the protocols causes lines to be added to the pool resource load and unload scripts to activate the selected protocols on the cluster.
“Configuring a Cluster Resource for (Cluster Enabling) an NSS Pool and Its Volumes” in the OES 2 SP2: Novell Cluster Services 1.8.5 for NetWare Administration Guide. When you cluster-enable a shared disk pool, the commands to start and stop the pool resource are automatically added to the resource load and unload scripts.
If you are a new user, simply read the guide in its current state. Refer to the publication date, which appears on the title page, to determine the release date of this guide. For the most recent version of the Novell Business Continuity Clustering 1.1 for NetWare Administration Guide, see the Business Continuity Clustering Documentation Web site (http:// www.novell.com/documentation/bcc/).
E.1.3 Upgrading Business Continuity Clustering for NetWare Location Change Section 5.2, “Disabling BCC This section is new. 1.0, Upgrading Servers to NetWare 6.5 SP8, then Enabling BCC 1.1 SP2,” on page 56 E.2 April 28, 2009 Updates were made to the following sections. The changes are explained below. Section E.2.1, “Converting BCC Clusters from NetWare to Linux,”...
Need help?
Do you have a question about the BUSINESS CONTINUITY CLUSTERING 1.1 SP2 - ADMINISTRATION and is the answer not in the manual?
Questions and answers