Novell BUSINESS CONTINUITY CLUSTERING 1.2 - ADMINISTRATION Administration Manual

Table of Contents

Advertisement

Quick Links

AUTHORIZED DOCUMENTATION
Administration Guide for Novell Open Enterprise Server 2 Support
*
Pack 1 for Linux
Novell
®

Business Continuity Clustering

1.2
February 18, 2010
www.novell.com
BCC 1.2: Administration Guide for OES 2 SP1 Linux

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the BUSINESS CONTINUITY CLUSTERING 1.2 - ADMINISTRATION and is the answer not in the manual?

Questions and answers

Summary of Contents for Novell BUSINESS CONTINUITY CLUSTERING 1.2 - ADMINISTRATION

  • Page 1: Business Continuity Clustering

    AUTHORIZED DOCUMENTATION Administration Guide for Novell Open Enterprise Server 2 Support Pack 1 for Linux Novell ® Business Continuity Clustering February 18, 2010 www.novell.com BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 2: Legal Notices

    Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes.
  • Page 3 Novell Trademarks For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/ trademarks/tmlist.html). Third-Party Materials All third-party trademarks are the property of their respective owners.
  • Page 4: Sp1 Linux

    BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 5: Table Of Contents

    Contents About This Guide 1 Overview of Business Continuity Clustering Disaster Recovery Implications ..........13 Disaster Recovery Implementations .
  • Page 6: Sp1 Linux

    Novell Cluster Services 1.8.6 for Linux ........
  • Page 7 Novell eDirectory ........
  • Page 8: Sp1 Linux

    Using Console Commands ..........129 Setting Up Linux Scan Commands in /opt/novell/ncs/bin/device_scan.sh ....132...
  • Page 9 Novell Cluster Services Configuration and Setup ....... . . 140...
  • Page 10: Sp1 Linux

    G Removing Business Continuity Clustering Core Software H Documentation Updates February 18, 2010 ............173 H.1.1 Updating (Patching) BCC 1.2.0 on OES 2 SP1 Linux .
  • Page 11: About This Guide

    This guide describes how to install, configure, and manage Novell Business Continuity Clustering 1.2 for Novell Open Enterprise Server (OES) 2 Support Pack 1 (SP1) for Linux servers in combination with Novell Cluster Services 1.8.6 for Linux clusters (the version released in OES 2 SP1 Linux).
  • Page 12: Sp1 Linux

    For information about NetWare 6.5 SP8, see the NetWare 6.5 SP8 Documentation Web site (http:// www.novell.com/documentation/nw65/index.html). Documentation Conventions In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. ® A trademark symbol ( , etc.) denotes a Novell trademark.
  • Page 13: Overview Of Business Continuity Clustering

    Clustering As corporations become more international, fueled in part by the reach of the Internet, the ® requirement for service availability has increased. Novell Business Continuity Clustering (BCC) offers corporations the ability to maintain mission-critical (24x7x365) data and application services to their users while still being able to perform maintenance and upgrades on their systems.
  • Page 14: Disaster Recovery Implementations

    Moving applications and services to the Internet frees corporations from the restrictions of traditional LAN-based applications. ® By using Novell exteNd Director portal services, Novell Access Manager, and ZENworks , all services, applications, and data can be rendered through the Internet, allowing for loss of service at one site but still providing full access to the services and data by virtue of the ubiquity of the Internet.
  • Page 15: Stretch Clusters Vs. Cluster Of Clusters

    Stretch Clusters A stretch cluster consists of a single cluster where the nodes are located in two geographically separate data centers. All nodes in the cluster must be in the same Novell eDirectory tree, which requires the eDirectory replica ring to span data centers. The IP addresses for nodes and cluster resources in the cluster must share a common IP subnet.
  • Page 16 At least one storage system must reside in each data center. The data is replicated between locations by using host-based mirroring or storage-based mirroring. For information about using mirroring solutions for data replication, see Section 1.2.2, “Host-Based versus Storage-Based Data Mirroring,” on page 14.
  • Page 17 Nodes in each cluster access only the storage systems co-located in the same data center. Typically, data is replicated by using storage-based mirroring. Each cluster has its own SBD partition. The SBD partition is not mirrored across the sites, which minimizes the chance for a split-brain problem occurring when using host-based mirroring.
  • Page 18 Capability Stretch Cluster Cluster of Clusters eDirectory Organizational Units Single OU container for all nodes. Each cluster can be in a different (OUs) OU. Each cluster is in a single As a best practice, place the OU container. cluster container in an OU separate from the rest of the tree.
  • Page 19 Table 1-3 illustrates why a cluster of cluster solution is less problematic to deploy than a stretch cluster solution. Manual configuration is not a problem when using Novell Business Continuity Clustering for your cluster of clusters. Advantages and Disadvantages of Stretch Clusters versus Cluster of Clusters...
  • Page 20: Business Continuity Clustering

    1.3 Business Continuity Clustering A Novell Business Continuity Clustering cluster is an automated cluster of Novell Cluster Services clusters. It is similar to what is described in “Cluster of Clusters” on page 16, except that the cluster configuration, maintenance, and synchronization have been automated by adding specialized software.
  • Page 21: Bcc Deployment Scenarios

    Provides simplified business continuity cluster configuration and management by using the browser-based Novell iManager management tool. iManager is used for the configuration and monitoring of the overall system and for the individual resources.
  • Page 22: Multiple-Site Business Continuity Cluster Solution

    Active Site/Passive Site: A primary site in which all services are normally active, and a secondary site which is effectively idle. The data is mirrored to the secondary site, and the applications and services are ready to load if needed. The active/active deployment option is typically used in a company that has more than one large site of operations.
  • Page 23: Low-Cost Business Continuity Cluster Solution

    Figure 1-4 depicts a four-site business continuity cluster that uses storage-based data replication between the sites. BCC uses eDirectory and Identity Manager to synchronize cluster information between the two clusters. Four-Site Business Continuity Cluster Figure 1-4 Four independent clusters in geographically separate sites Building D Building C...
  • Page 24: Key Concepts

    Section 1.5.4, “BCC Drivers for Identity Manager,” on page 24 1.5.1 Business Continuity Clusters A cluster of two to four Novell Cluster Services clusters that are managed together by Business Continuity Clustering software. All nodes in every peer cluster are running the same operating system.
  • Page 25: What's New For Bcc 1.2

    This section describes the changes and enhancements that were made to Novell Business Continuity Clustering (BCC) 1.2 for Novell Open Enterprise Server (OES) 2 Support Pack 1 (SP1) since the initial release of BCC 1.2. Section 2.1, “BCC 1.2.0 Patch (January 2010),” on page 25 Section 2.2, “Identity Manager 3.6.1 Support (June 2009),”...
  • Page 26: Identity Manager 3.6.1 Support (June 2009)

    Adds the host resource name and Novell Distributed File Services (DFS) GUID attributes to the Volume objects that are synchronized for a BCC-enabled volume resource. (Bug 535127) No longer creates duplicate NCP Server, Volume, and Pool objects when the landing zone is not the same location as the cluster server’s container.
  • Page 27 Support for Novell eDirectory Support for Novell iManager 2.7.2 Preferred node failover between clusters Enterprise data center capabilities Geographical failover of virtual machines as cluster resources Full support for CIM management in tools (requires OpenWBEM) What’s New for BCC 1.2...
  • Page 28 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 29: Planning A Business Continuity Cluster

    Planning a Business Continuity Cluster ® Use the guidelines in this section to design your Novell Business Continuity Clustering solution. The success of your business continuity cluster depends on the stability and robustness of the individual peer clusters. BCC cannot overcome weaknesses in a poorly designed cluster environment.
  • Page 30: Lan Connectivity Guidelines

    When configuring Spanning Tree Protocol (STP), ensure that Portfast is enabled, or consider Rapid Spanning Tree. The default settings for STP inhibit the heartbeat for over 30 seconds whenever there is a change in link status. Test your STP configuration with Novell Cluster Services running to make sure that a node is not cast out of the cluster when a broken link is restored.
  • Page 31: San Connectivity Guidelines

    The primary objective of SAN (storage area network) connectivity in a cluster is to provide solid and stable connectivity between cluster nodes and the storage system. Before installing Novell Cluster Services and Novell Business Continuity Clustering, make sure the SAN configuration is established and verified.
  • Page 32: Storage Design Guidelines

    3.6 eDirectory Design Guidelines Your Novell eDirectory solution for each of the peer clusters in the business continuity cluster must consider the following configuration elements. Make sure your approach is consistent across all peer clusters.
  • Page 33: Cluster Context

    3.6.2 Cluster Context Place each cluster in a separate Organizational Unit (OU). All server objects and cluster objects for a given cluster should be in the same OU. Cluster Resources in Separate OUs Figure 3-1 3.6.3 Partitioning and Replication Partition the cluster OU and replicate it to dedicated eDirectory servers holding a replica of the ®...
  • Page 34: Cluster Design Guidelines

    Cluster Resource Identity in Two Clusters Figure 3-2 3.7 Cluster Design Guidelines Your Novell Cluster Services solution for each of the peer clusters in the business continuity cluster must consider the following configuration guidelines. Make sure your approach is consistent across all peer clusters.
  • Page 35 ID 1 to volume . Cluster-enabled volumes use _ADMIN high volume IDs, starting from 254 in descending order. Novell Client uses the volume ID to access a volume. When existing clusters are configured and enabled within the same business continuity cluster, the volume IDs for the existing shared volumes might also share the same volume IDs.
  • Page 36 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 37: Installing Business Continuity Clustering

    This section describes how to install, set up, and configure Novell Business Continuity Clustering 1.2 for Novell Open Enterprise Server (OES) 2 SP1 Linux for your specific needs. Section 4.1, “Requirements for BCC 1.2 for OES 2 SP1 Linux,” on page 37 Section 4.2, “Downloading the Business Continuity Clustering Software,”...
  • Page 38: Business Continuity Clustering License

    4.1.1 Business Continuity Clustering License Novell Business Continuity Clustering software requires a license agreement for each business continuity cluster. For purchasing information, see Novell Business Continuity Clustering (http:// www.novell.com/products/businesscontinuity/howtobuy.html). 4.1.2 Business Continuity Cluster Component Locations Figure 4-1 illustrates where the various components needed for a business continuity cluster are installed.
  • Page 39: Oes 2 Sp1 Linux

    4.1.3 OES 2 SP1 Linux Novell Open Enterprise Server (OES) 2 Support Pack 1 (SP1) for Linux must be installed and running on every node in each peer cluster that will be part of the business continuity cluster. See the OES 2 SP1: Linux Installation Guide (http://www.novell.com/documentation/oes2/...
  • Page 40: Novell Edirectory 8.8

    To add or change peer cluster credentials, you must access iManager on a server that is in the same eDirectory tree as the cluster where you are adding or changing peer credentials. 4.1.5 Novell eDirectory 8.8 Novell eDirectory 8.8 is supported with Business Continuity Clustering 1.2. See the eDirectory 8.8 documentation (http://www.novell.com/documentation/edir88/index.html) for more information.
  • Page 41 IMPORTANT: The user who installs BCC must have the eDirectory credentials necessary to extend the schema. If the eDirectory administrator username or password contains special characters (such as $, #, and so on), you might need to escape each special character by preceding it with a backslash (\) when you enter credentials for some interfaces.
  • Page 42: Slp

    Identity Manager software, the eDirectory driver, and the Identity Manager management tools for Novell iManager 2.7.2. BCC driver templates are applied to the eDirectory driver to create BCC-specific drivers that automatically synchronize BCC configuration information between the Identity Manager nodes in peer clusters.
  • Page 43 Identity Manager Management Utilities The Identity Manager management utilities must be installed on the same server as Novell iManager. The Identity Manager utilities and iManager can be installed on a cluster node, but installing them on a non-cluster node is the recommended configuration. For information about iManager requirements for BCC, see Section 4.1.8, “Novell iManager 2.7.2,”...
  • Page 44: Novell Imanager 2.7.2

    4.1.8 Novell iManager 2.7.2 Novell iManager 2.7.2 (the version released with OES 2 SP1 Linux) must be installed and running on a server in the eDirectory tree where you are installing Business Continuity Clustering software. You need to install the BCC plug-in, the Clusters plug-in, and the Storage Management plug-in in order to manage the BCC in iManager.
  • Page 45: Openwbem

    OpenWBEM must be running and configured to start using . For information, see the chkconfig OES 2: OpenWBEM Services Administration Guide (http://www.novell.com/documentation/oes2/ mgmt_openwbem_lx_nw/data/front.html). The CIMOM daemons on all nodes in the business continuity cluster must be configured to bind to all IP addresses on the server.
  • Page 46: Mirroring Shared Disk Systems Between Peer Clusters

    See your storage system vendor documentation for more information on configuring LUN masking. When you create a Novell Cluster Services system that uses a shared storage system, it is important to remember that all of the servers that you grant access to the shared device, whether in the cluster or not, have access to all of the volumes on the shared storage space unless you specifically prevent such access.
  • Page 47: Ports

    Web browser, click Tools > Options > Languages, then set the first language preference in the list to a supported language. Refer to the Novell iManager documentation (http://www.novell.com/documentation/imanager27/) for information about supported languages. Web Browser Character Encoding Setting Supported language codes are Unicode (UTF-8) compliant.
  • Page 48: Downloading The Business Continuity Clustering Software

    4.2 Downloading the Business Continuity Clustering Software Before you install Novell Business Continuity Clustering, download and copy the software to a directory on your workstation. To download Novell Business Continuity Clustering 1.2 for Linux, go to the Novell Downloads Web site (http://download.novell.com) and select the Business Continuity Clustering product.
  • Page 49: Assigning Trustee Rights For The Bcc Administrator User To The Cluster Objects

    In order for the BCC Administrator user to gain access to the cluster administration files ( /admin/ ) on other Linux cluster nodes in your BCC, you must add that user to the Novell novell/cluster Cluster Services administration group (such as ) on each cluster node.
  • Page 50: Installing And Configuring The Novell Business Continuity Clustering Software

    4.4 Installing and Configuring the Novell Business Continuity Clustering Software It is necessary to run the Novell Business Continuity Clustering installation program when you want Install and configure Business Continuity Clustering engine software on the cluster nodes for the clusters that will be part of a business continuity cluster.
  • Page 51: Installing The Business Continuity Clustering Rpms

    3 In YaST, select Software > Software Manager, search for BCC, select the three files, then .rpm click Accept to install the packages. novell-business-continuity-cluster.rpm novell-business-continuity-cluster-idm.rpm yast-novell-bcc.rpm You can also double-click the Software Updater icon in the Notification area, then select the files.
  • Page 52: Configuring Bcc Software

    9 Accept or change the eDirectory Administrator user name and specify the Administrator user’s password. 10 Click Next. 11 Review your setup on the Novell Business Continuity Clustering Configuration Summary page, then click Next to install the BCC software. 12 Click Finish to save the BCC configuration and exit the tool.
  • Page 53: Using A Yast Auto-Configuration File To Install And Configure Business Continuity Clustering

    2 Use one of the following methods to open the BCC Configuration page: In YaST, select Miscellaneous > Novell-BCC. At a terminal console prompt, enter yast2 novell-bcc 3 When prompted, deselect the Install Core Business Continuity Clustering Software and Configure Core Software option and select the Install Identity Manager Templates option, then click Next.
  • Page 54: Media

    <?xml version="1.0"?> <!DOCTYPE profile SYSTEM "/usr/share/autoinstall/dtd/profile.dtd"> <profile xmlns="http://www.suse.com/1.0/yast2ns" xmlns:config="http:// www.suse.com/1.0/configns"> <configure> <bcc> <config-type>New</config-type> <start-now>Yes</start-now> <cluster-dn>cn=my_cluster.o=novell</cluster-dn> <ldap-server>10.1.1.0</ldap-server> <ldap-port>389</ldap-port> <ldap-secure-port>636</ldap-secure-port> <admin-dn>cn=admin.o=novell</admin-dn> <admin-password>password</admin-password> </bcc> </configure> </profile> Edit the above example to apply to your own specific system settings. 2 Copy the XML file you created in Step 1 to each node in the cluster.
  • Page 55: Installing And Configuring Business Continuity Clustering On Each Cluster Node

    4 Install Business Continuity Clustering software by opening a shell and running the following commands in the order indicated: yast2 sw_single -i \ novell-business-continuity-cluster \ novell-cluster-services-cli \ yast2-bcc 5 Autoconfigure the Business Continuity Clustering software by running the following command...
  • Page 56: What's Next

    4.6 What’s Next After you have installed BCC on every node in each cluster that you want to be in the business continuity cluster, continue with the following steps: Chapter 8, “Configuring the Identity Manager Drivers for BCC,” on page 67 If you are adding a new cluster to an existing business continuity cluster, follow the instructions “Synchronizing Identity Manager Drivers”...
  • Page 57: Updating (Patching) Bcc 1.2.0 On Oes 2 Sp1 Linux

    Beginning in January 2010, patches are available for Novell Business Continuity Clustering (BCC) 1.2.0 in the Novell Open Enterprise Server (OES) 2 SP1 Linux patch channel. BCC administrators can use a rolling update approach to download and install the BCC 1.2.0 patch for each node in every peer cluster in the business continuity cluster.
  • Page 58: Installing The Bcc Patch On A Fully Patched Oes 2 Sp1 Linux Bcc Cluster

    5.2 Installing the BCC Patch on a Fully Patched OES 2 SP1 Linux BCC Cluster Use the procedure in this section to apply the BCC patch to a fully patched OES 2 SP1 Linux BCC cluster. In this scenario, it is recommended, but not required, that you migrate the cluster resources to a different node before installing the BCC patch.
  • Page 59 2 On one peer cluster, use a rolling update approach to install the BCC 1.2.0 patch: 2a On the Identity Manager node in the cluster, apply the OES 2 SP1 Linux patches, then reboot the server if you are prompted to do so. 2b On one of the nodes in the cluster, migrate its cluster resources to another node in the cluster.
  • Page 60 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 61: Upgrading The Identity Manager Nodes To Identity Manager

    Business Continuity Clustering 1.2 supports using Identity Manager 3.6.1 (32-bit and 64-bit) on Novell Open Enterprise Server (OES) 2 SP1 Linux. Updating to Identity Manager 3.6.1 is needed only for 64-bit support, or to take advantage of bug fixes that might be offered in 3.6.1.
  • Page 62 2 On a 64-bit machine, reinstall the operating system with the 64-bit OES 2 SP1 Linux, then install Identity Manager 3.6.1 and iManager 2.7.2 on the system as described in Section 4.1.7, “Identity Manager 3.6 Bundle Edition,” on page 3 Re-create the BCC drivers in Identity Manager. For information about creating drivers, see Chapter 8, “Configuring the Identity Manager Drivers for BCC,”...
  • Page 63: Converting Bcc Clusters From Netware To Linux

    Linux Before you can upgrade from servers running BCC 1.0 (NetWare only) or BCC 1.1 SP1 for NetWare to BCC 1.2 for OES 2 SP1 Linux, you must upgrade the operating system and Novell Cluster Services on each server in every cluster to NetWare 6.5 SP8 (OES 2 SP1 NetWare), then upgrade the BCC software in the clusters to BCC 1.1 SP2 for NetWare.
  • Page 64: Converting Clusters From Netware To Linux

    5 Configure the BCC Administrator user and group for the Linux cluster. On Linux, the BCC Administrator user must be Linux-enabled with Linux User Management. The user must also be added to the Novell Cluster Services administration group (such as ncsgroup) on each cluster node. Follow the steps outlined in Section 4.3, “Configuring a BCC...
  • Page 65: Deleting And Re-Creating The Bcc Identity Manager Drivers

    See “Finalizing the Cluster Conversion” in the OES 2 SP1: Novell Cluster Services 1.8.6 for Linux Administration Guide. 7.6 What’s Next After the BCC is upgraded, continue with Chapter 9, “Configuring BCC for Peer Clusters,” on...
  • Page 66 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 67: Configuring The Identity Manager Drivers For Bcc

    Configuring the Identity Manager Drivers for BCC ® Novell Business Continuity Clustering (BCC) software provides two drivers for Identity Manager that are used to synchronize cluster resources and User objects between the clusters in the business continuity cluster. After you install BCC, you must configure the Identity Manager drivers for BCC in order to properly synchronize and manage your business continuity cluster.
  • Page 68 The BCC drivers are installed and configured on the Identity Manager node in each of the peer clusters in the business continuity cluster. Each of the driver connections has a Publisher channel (sending) and a Subscriber channel (listening) for sharing information between any two peer clusters.
  • Page 69 If the clusters are in different trees, or if the User objects are in a separate eDirectory partition than Cluster objects, you also need to install an instance of the User Object Synchronization driver on a different port, as shown in Table 8-3 Table 8-4.
  • Page 70 Driver Set Summary for a Single-Tree, Three-Cluster Business Continuity Cluster Table 8-6 Driver Set for Cluster Driver Instance Driver Set for Cluster One Driver Set for Cluster Two Three Cluster Resource C1 to C2, port 2002 C2 to C1, port 2002 C3 to C1, port 2003 Cluster Resource C1 to C3, port 2003...
  • Page 71 Single-Tree Four-Cluster Driver Set Example Table 8-9 Cluster Resource Subscriber Node Publisher Node Cluster One Cluster Two Cluster Three Cluster Four Cluster One Not applicable CR, port 2002 CR, port 2003 CR, port 2004 (master node) Cluster Two CR, port 2002 Not applicable No channel No channel...
  • Page 72: Prerequisites For Configuring The Bcc Drivers For Identity Manager

    8.2 Prerequisites for Configuring the BCC Drivers for Identity Manager Section 8.2.1, “Identity Manager,” on page 72 Section 8.2.2, “Novell eDirectory,” on page 73 Section 8.2.3, “Landing Zone Container,” on page 73 8.2.1 Identity Manager Before you installed Business Continuity Clustering, you set up and configured the Identity Manager engine and an Identity Manager driver for eDirectory on one node in each cluster.
  • Page 73: Novell Edirectory

    The cluster node where Identity Manager is installed must have an eDirectory full replica with at least read/write access to all eDirectory objects that will be synchronized between clusters. For information about the full replica requirements, see Section 4.1.5, “Novell eDirectory 8.8,” on page 8.2.3 Landing Zone Container The landing zone that you specify for drivers must already exist.
  • Page 74 For example, specify Cluster1 BCC Driver Set, where Cluster1 is the name of the cluster where you are configuring a driver instance. 5c Browse to select the context that contains the cluster objects for the cluster where you are configuring a driver instance. For example, cluster1.clusters.siteA.example 5d Deselect (disable) the Create a new partition on this driver set option, then click Next.
  • Page 75 You must specify the same port number for the same template in the destination cluster when you set up the driver instance in that peer cluster. For example, if you specify 2003 as the port number for the resource synchronization driver instance for Cluster1 to Cluster 2, you must specify 2003 as the port number for the Cluster 2 to Cluster 1 resource synchronization driver instance for the peer driver you create on Cluster2.
  • Page 76: Creating Ssl Certificates

    Do the follow to upgrade each BCC driver set you created in “Configuring the BCC Drivers” on page 73 14a In iManager, click Identity Manager, then click Identity Manager Overview. 14b Search for the driver sets that you have added, then click the driver set link to bring up the Driver Set Overview.
  • Page 77: Synchronizing Identity Manager Drivers

    8.6 Synchronizing Identity Manager Drivers If you are adding a new cluster to an existing business continuity cluster, you must synchronize the BCC-specific Identity Manager drivers after you have created the BCC-specific Identity Manager drivers and SSL certificates. If the BCC-specific Identity Manager drivers are not synchronized, clusters cannot be enabled for business continuity.
  • Page 78 Three-Cluster Identity Manager Synchronization Loop Figure 8-1 Cluster IDM Sync Cluster Cluster Three A preferred method is to make Cluster One an Identity Manager synchronization master in which Cluster One synchronizes with Cluster Two, and Cluster Two and Cluster Three both synchronize with Cluster One.
  • Page 79: Changing The Identity Manager Synchronization Drivers

    Alternate Three-Cluster Identity Manager Synchronization Scenario Figure 8-3 Cluster IDM Sync Cluster Cluster Three In a single-tree scenario with a four-cluster business continuity cluster, Cluster One is an Identity Manager synchronization master in which Cluster One synchronizes data with each of the peer clusters, as illustrated in Figure 8-4.
  • Page 80: What's Next

    In order for a cluster to appear in the list of possible peer clusters, that cluster must have the following: Business Continuity Clustering software installed. Identity Manager installed. The BCC-specific Identity Manager drivers configured and running. Be enabled for business continuity. 8.9 What’s Next After the Identity Manager drivers for BCC are configured, you are ready to set up BCC for the clusters and cluster resources.
  • Page 81: Configuring Bcc For Peer Clusters

    Chapter 8, “Configuring the Identity Manager Drivers for BCC,” on page Preform the following tasks on each peer Novell Cluster Services cluster that you want to be part of the business continuity cluster: Section 9.1, “Enabling Clusters for Business Continuity,” on page 81 Section 9.2, “Adding Peer Cluster Credentials,”...
  • Page 82: Adding Peer Cluster Credentials

    3c For each driver, click the upper right corner of the driver icon to see if a driver is started or stopped. 3d If the driver is stopped, start it by selecting Start. 4 In Roles and Tasks, click Clusters, then click the Cluster Options link. 5 Specify a cluster name, or browse and select one.
  • Page 83: Using Imanager To Add Credentials

    When adding the administrator username, do not include the context for the user. For example, instead of bccadmin bccadmin.prv.novell Rather than using the Admin user to administer your BCC, you should consider creating another user with sufficient rights to the appropriate contexts in your eDirectory tree to manage your BCC.
  • Page 84: Adding Search-And-Replace Values To The Resource Replacement Script

    9.3 Adding Search-and-Replace Values to the Resource Replacement Script To enable a resource for business continuity, certain values (such as IP addresses) specified in resource load and unload scripts need to be changed in corresponding resources in the peer clusters. You need to add the search-and-replace strings that are used to transform cluster resource load and unload scripts from another cluster to the one where you create the replacement script.
  • Page 85: Adding Storage Management Configuration Information

    IMPORTANT: Make sure to use a trailing dot in the search-and-replace value. If a trailing dot is not used, 10.1.1 could be replaced with an IP value such as 192.168.100 instead of 192.168.1. 4 (Optional) Select the Use Regular Expressions check box to use wildcard characters in your search-and-replace values.
  • Page 86 Perl script code that you customize for your SAN can be added to a BCC-enabled cluster resource load script and unload script through the BCC management interface. You can include parameters that are passed to each Perl script. BCC passes the parameters in the format of , and so on.
  • Page 87 Edit flags This is an advanced feature, and should not be used except under the direction of Novell Support. 7c Click Apply and OK on the Script Details page, then click OK on the Resource Properties page to save your script changes.
  • Page 88: Configuring Cimom Daemons To Bind To Ip Addresses

    # The default is 0.0.0.0 http_server.listen_addresses = 0.0.0.0 For more information about managing OpenWBEM, see the OES 2: OpenWBEM Services Administration Guide (http://www.novell.com/documentation/oes2/mgmt_openwbem_lx_nw/data/ front.html). 9.6 Enabling Linux POSIX File Systems to Run on Secondary Clusters If you are using Linux POSIX* file systems in cluster resources on the clusters in your BCC and you want to migrate or fail over those file systems to peer clusters, you must add a script to convert the EVMS CSM (Cluster Segment Manager) container for the file system.
  • Page 89: Verifying Bcc Administrator User Trustee Rights And Credentials

    2 Specify your username and password, specify the tree where you want to log in, then click Login. 3 In Roles and Tasks, click Clusters, then click the Cluster Options link. 4 Specify a cluster name, or browse and select one. 5 Under Cluster Objects, select the business-continuity-enabled cluster resource that contains the Reiser or Ext3 file system, then click Details.
  • Page 90: Disabling Bcc For A Peer Cluster

    In order for the BCC Administrator user to gain access to the cluster administration files ( /admin/ ) on other Linux cluster nodes in your BCC, you must add that user to the novell/cluster on each cluster node. For instructions, see “Adding the BCC Administrator User to the ncsgroup ncsgroup on Each Cluster Node”...
  • Page 91: Managing A Business Continuity Cluster

    Managing a Business Continuity Cluster ® This section can help you effectively manage a business continuity cluster with the Novell Business Continuity Clustering software. It describes how to migrate cluster resources from one Novell Cluster Services cluster to another, to modify peer credentials for existing clusters, and to generate reports of the cluster configuration and status.
  • Page 92: Migrating Cluster Resources Between Clusters

    Migrating a pool resource to another cluster causes the following to happen: 1. If the source cluster can be contacted, the state of the resource is changed to offline. 2. The resource changes from primary to secondary on the source cluster. 3.
  • Page 93: Bringing A Downed Cluster Back In Service

    looking at the cluster itself, such as Running or Offline. If the cluster resource is not assigned to the cluster you are managing from (that is, not in the current cluster), then the status is shown as Secondary. 6 In the list of cluster, select the cluster where you want to migrate the selected resources, then click OK.
  • Page 94: Viewing The Current Status Of A Business Continuity Cluster

    6 Edit the administrator username and password that the selected cluster will use to connect to the selected peer cluster, then click OK. When specifying a username, you do not need to include the Novell eDirectory context for the user name.
  • Page 95: Generating A Cluster Report

    10.5 Generating a Cluster Report You can generate a report for each cluster in the business continuity cluster to list information on a specific cluster, such as current cluster configuration, cluster nodes, and cluster resources. You can print or save the report by using your browser. 1 Start your Internet browser and enter the URL for iManager.
  • Page 96 Primary Cluster Fails but Primary Storage System Does Not This type of failure can be temporary (transient) or long-term. There should be an initial response and then a long-term response based on whether the failure is transient or long term. The initial response is to BCC migrate the resources to a peer cluster.
  • Page 97: Host-Based Mirroring Failure Types And Responses

    Intersite Storage System Connectivity Is Lost Recover the connection. If divergence of the storage systems occurred, remirror from the good side to the bad side. Intersite LAN Connectivity Is Lost User connectivity might be lost to a given service or data, depending on where the resources are running and whether multiple clusters run the same service.
  • Page 98 Secondary Cluster and Secondary Storage System Both Fail Secondary clusters are not currently running the resource. Bring up your secondary storage system before bringing up your cluster servers. Then run the command Cluster Scan For New Devices on a primary cluster server to ensure remirroring takes place. When you bring the secondary cluster back up, the storage system is still secondary to the primary cluster.
  • Page 99: Configuring Bcc For Cluster Resources

    Cluster Services clusters for a business continuity cluster by using Novell Business Continuity Clustering software, you are ready to configure the cluster resources for BCC. You can enable one or multiple cluster resources in each of the peer clusters for business continuity that if you want to be able to fail over between peer clusters.
  • Page 100: Shared Disk Cluster Resources

    The clusters in the other eDirectory tree cannot decrypt the NSS volumes. 11.1.3 Shared Disk Cluster Resources Table 11-1 for resources that explain how to create shared disk cluster resources on Novell Open Enterprise Server 2 Linux servers: Shared Disk Cluster Resources on OES 2 Linux Servers...
  • Page 101: Configuring Search-And-Replace Values For An Individual Cluster Resource

    Section 9.3, “Adding Search-and-Replace Values to the Resource Replacement Script,” on page Before you create a replacement script for an individual resource, you should contact Novell Support. The search-and-replace data that you add is resource-specific, and it is not synchronized via Identity Manager between the clusters in the business continuity cluster.
  • Page 102: Assigning Preferred Peer Clusters For The Resource

    The search-and-replace values you specify here apply to only to the resource you are enabling for business continuity. If you want the search-and-replace values to apply to any or all cluster resources, add them to the entire cluster instead of just to a specific resource. IMPORTANT: If you change the resource-specific search-and-replace data after initially adding it, you must update the resource load script and unload script in one of the peer clusters by editing it and adding a space or a comment to it.
  • Page 103: Assigning Preferred Nodes In Peer Clusters

    Cluster Resource New or Existing Action NSS pool Existing Add the storage management configuration information. For information, see “Adding Storage Management Configuration Information” on page 3 After the cluster resource information is synchronized to all of the peer clusters in the resource’s Assigned clusters list, you must specify your node preferences separately for each of the peer clusters.
  • Page 104: Disabling Bcc For A Cluster Resource

    11.6 Disabling BCC for a Cluster Resource After enabling a resource for business continuity, it is possible to disable it. You might want to disable BCC for a cluster resource in any of the following cases: You accidentally enabled the resource for business continuity. You no longer want the cluster resource to be able to fail over between peer clusters.
  • Page 105: Changing The Ip Address Of A Cluster Resource

    8 On the Details page, click the Business Continuity tab, deselect the Enable Business Continuity Features check box, then click Apply. 9 Wait for Identity Manager to synchronize the changes. This could take from 30 seconds to one minute, depending on your configuration. 10 Delete the Cluster Resource object on the clusters where you no longer want the resource to run.
  • Page 106 Wait for Identity Manager to synchronize the change to all peer clusters before continuing. You can check the other peer clusters to make sure that the cluster resource you BCC-disabled no longer appears in their list of resources. 5 Select Clusters > Cluster Options, select the shared NSS pool, then select Offline. WARNING: If you attempt to delete a cluster resource without first offlining it, deletion errors occur, and the data associated with the clustered pool is not recoverable.
  • Page 107: Troubleshooting Business Continuity Clustering

    Troubleshooting Business Continuity Clustering ® This section contains the following topics to help you troubleshoot Novell Business Continuity Clustering 1.2 for Linux. Section 12.1, “NSS Takes Up to 10 Minutes to Load When the Server Is Rebooted,” on page 108 Section 12.2, “Identity Manager Plug-Ins Do Not Appear in iManager,”...
  • Page 108: Nss Takes Up To 10 Minutes To Load When The Server Is Rebooted

    12.1 NSS Takes Up to 10 Minutes to Load When the Server Is Rebooted In some environments, a timing problem prevents the NDP user space application ( ) from ndpapp loading, and in turn, NSS cannot be loaded until the problem resolves itself. You can increase the UDEV event handling limits to 1024 to circumvent this problem.
  • Page 109: Driver Port Number Conflicts

    Ping the peer cluster to see if it is up to the selected peer cluster. and reachable. Ensure that Novell Cluster Services is running on the servers in the peer cluster, then ensure that BCC is running on the peer clusters.
  • Page 110: Excluded Users

    7 In the Authentication context field, view and if necessary change the port numbers next to the IP address. For example, the Authentication context field might contain a value similar to 10.1.1.12:2003:2003. In this example, the first port number (2003) is the port number for the corresponding Identity Manager driver on the cluster that this cluster is synchronizing with.
  • Page 111: Ssl Certificates

    BCC. For Linux, ensure that the BCC Administrator user is a LUM-enabled user. To LUM-enable a user, “Managing User and Group Objects in eDirectory” (http://www.novell.com/documentation/oes/ lumadgd/data/aeucqum.html) in the Novell Linux User Management Technology Guide.
  • Page 112: Clusters Cannot Communicate

    Turns on tracing. With tracing turned on, certain sections of code that fail will report a message containing the condition that failed along with a file and line number in the code indicating where the condition failed. This is helpful for reporting problems to Novell Support.
  • Page 113: Identity Manager Drivers For Cluster Synchronization Do Not Start

    12.10 Identity Manager Drivers for Cluster Synchronization Do Not Start If the Identity Manager drivers for cluster synchronization do not start, the problem might be caused by one of the following conditions: A certificate has not been created. For information, see “Creating SSL Certificates”...
  • Page 114: Tracing Identity Manager Communications

    (both drivers). For information about setting trace levels for driver sets, see “Adding Trace Levels in iManager” (http://www.novell.com/documentation/idm36/idm_common_driver/data/b1rc6ea.html). For information about using , see “Using ndstrace” (http://www.novell.com/ ndstrace documentation/edir88/edir88tshoot/data/bq0gvax.html) in the Novell eDirectory 8.8 Troubleshooting Guide (http://www.novell.com/documentation/edir88/edir88tshoot/data/ front.html).
  • Page 115: Peer Cluster Communication Is Not Working

    On the resource object, change the NCS:BCC State attribute to 0 to set the resource to the primary state. Also, increment the NCS:Revision attribute one number so that Novell Cluster Services recognizes that the resource properties have been updated. See...
  • Page 116: Administration Of Peer Clusters Is Not Functional

    For information, see “Moving a Cluster, or Changing IP Addresses, LDAP Server, or Administrator Credentials for a Cluster” in the OES 2 SP1: Novell Cluster Services 1.8.6 for Linux Administration Guide. The virtual server has an extra IP address. IP address changes should always be made on the Protocols page of the iManager cluster plug- in, not in load and unload scripts.
  • Page 117: The Ip Address, Virtual Server Dn, Or Pool Name Does Not Appear On The Imanager Cluster Configuration Page

    If you get an error in iManager with a blank error string (no text appears with the error message) while attempting to bring a resource online, it is possible that Novell Cluster Services views the resource as secondary even though BCC has changed the resource to primary and iManager shows the resource as primary.
  • Page 118: Mapping Drives To Home Directories By Using The %Home_Directory Variable

    SLP Server Name is the name being advertised in SLP as specified in the resource load script. This method requires a client reboot. TID 10057730 (http://support.novell.com/docs/Tids/Solutions/10057730.html) information on modifying the server cache Time To Live (TTL) value on the Novell Client 12.22 Mapping Drives to Home Directories by Using the %HOME_DIRECTORY Variable Consider the following when mapping drives in login scripts in a BCC.
  • Page 119: Bcc Error Codes

    Error returned from the NICI API. 1016 Cannot find peer cluster data. 1017 Invalid BCC API version. 1018 Could not find a pool for the specified cluster resource. 1019 Error managing the SAN via the Novell SAN Management Interface. Troubleshooting Business Continuity Clustering 119...
  • Page 120: Clustered Pool Is Stuck In An Edirectory Synchronization State

    Error Code Number Message 1020 CIM Client error. 1021 Error creating a system resource (mutex, semaphore, etc.). 1022 File IO error. 1023 No data. 1024 Not a member of the cluster. 1025 Invalid token in the script. 1026 Invalid or unknown cluster. 1027 The NSMI script is too long.
  • Page 121: Security Considerations

    Section 13.3, “General Security Guidelines,” on page 126 Section 13.4, “Security Information for Dependent Products,” on page 126 13.1 Security Features ® The following table contains a summary of the security features of Novell Business Continuity Clustering 1.2: Business Continuity Clustering 1.2 Security Features...
  • Page 122: Security Configuration

    13.2 Security Configuration This section provides a summary of security-related configuration settings for Business Continuity Clustering 1.2. Section 13.2.1, “BCC Configuration Settings,” on page 122 Section 13.2.2, “Changing the NCS: BCC Settings Attributes in the BCC XML Configuration,” on page 123 Section 13.2.3, “Disabling SSL for Inter-Cluster Communication,”...
  • Page 123: Changing The Ncs: Bcc Settings Attributes In The Bcc Xml Configuration

    XML Configuration WARNING: You should not change the configuration settings for the NCS:BCC Settings attribute unless instructed to do so by Novell Support. Doing so can have adverse affects on your cluster nodes and BCC. The following XML for the NCS:BCC Settings attribute is saved on the local Cluster object in eDirectory.
  • Page 124: Disabling Ssl For Inter-Cluster Communication

    To turn off SSL for inter-cluster communication, or to specify a different communication port, you need to modify the Novell Cluster Services Cluster object that is stored in eDirectory by using an ®...
  • Page 125 Disabling SSL communication to a specific peer cluster requires changing the BCC management address to the peer cluster. The address is contained in the NCS:BCC Peers attribute that is stored on the NCS Cluster object. For example, a default NCS:BCC Peers attribute could appear similar to the following example where https:// is assumed and is never specified explicitly: <peer>...
  • Page 126: Restricting The Network Address For Administration

    Value Protocol Used Port Used 10.1.1.10:1234 HTTPS 1234 http://10.1.1.10 HTTP 5988 http://10.1.1.10:1234 HTTP 1234 13.2.4 Restricting the Network Address for Administration You can restrict the network address to the loopback address (127.0.0.1) to increase the security for the BCC Administrator user (bccadmin). BCC makes a secure connection to OpenWBEM over port 5989 on both the remote and local boxes.
  • Page 127 Administration Guide. Linux User Management (LUM) OES 2 SP1: Novell Linux User Management Technology Guide. Novell Cluster Services for Linux In the OES 2 SP1: Novell Cluster Services 1.8.6 for Linux Administration Guide, see “Configuration Requirements” “Assigning Install Rights for Container Administrators”...
  • Page 128 128 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 129: A Console Commands For Bcc

    ® Novell Business Continuity Clustering (BCC) provides server console commands to help you perform certain BCC management tasks. Some of the commands can also be used to manage Novell Cluster Services clusters. IMPORTANT: For Novell Cluster Services console commands, see “Console Commands for...
  • Page 130 Console Command Description Disables BCC for the specified cluster resource. The cluster disable [resource] resource you specify must belong to a cluster that has already been enabled for BCC. If no resource is specified, the entire cluster is disabled for BCC. IMPORTANT: Before you disable BCC for a given peer cluster, you must first disable BCC for each of the cluster resources running on that cluster.
  • Page 131 Output is sent to the system log. cluster refresh This command should not be used except under the direction of Novell Support. cluster resetresources Changes the state of all resources on this cluster to offline and secondary. This is a recovery procedure that should be run when a peer cluster in a business continuity cluster is brought back into service.
  • Page 132: Setting Up Linux Scan Commands In /Opt/Novell/Ncs/Bin/Device_Scan.sh

    By default, the scripts is empty so that administrators can add the Linux shell commands they need to refresh their systems. Any changes that are made to the script are not overwritten when Novell Cluster Services is upgraded. 1 In a text editor, open the script file , add the Linux /opt/novell/ncs/bin/device_scan.sh...
  • Page 133: B Setting Up Auto-Failover

    Setting Up Auto-Failover ® Auto-failover is available beginning in Novell Business Continuity Clustering 1.1. To set up the auto-failover feature, you must enable it, then configure the auto-failover settings. WARNING: Auto-failover is disabled by default and is not recommended. It should only be enabled after a thorough examination and review of your network and geographic site infrastructure.
  • Page 134: Creating An Auto-Failover Policy

    8 Click the Auto-Failover link just under the tabs. 9 Select the Enable Automatic Failover of Business Continuity Cluster Resources check box, then click Apply. 10 Continue with Section B.2, “Creating an Auto-Failover Policy,” on page 134 to create a failover policy.
  • Page 135 These conditions can be combined in any order to construct a more robust rule that helps to avoid an undesired failover. For failover to occur, each condition of only one rule must be satisfied for the specified cluster or clusters. For rules with monitor conditions that are automatically created by using the Cluster Membership Monitoring Settings table, you can add a condition that tests if the connection to the peer cluster is up.
  • Page 136: Adding Or Editing Monitor Configurations

    The nodepnt and nodecnt monitors do not support optional parameters. 6 Click Apply to save your settings. NOTE: See the BCC NDK documentation (http://developer.novell.com/documentation/cluster/ index.html?page=/documentation/cluster/ncss_enu/data/bktitle.html) for more information on creating custom failover policies. 136 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 137: C Configuring Host-Based File System Mirroring For Nss Pools

    For information about storage-based mirroring, consult your storage system vendor or see the storage system vendor documentation. Host-based synchronous mirroring functionality is included with the Novell Storage Services file system (NSS mirroring) that is part of OES 2 SP1 Linux. NSS mirroring is a checkpoint-based synchronous mirroring solution.
  • Page 138: Creating And Mirroring Nss Pools On Shared Storage

    OES 2 SP1: NSS File System Administration Guide. Novell CIFS for Linux and Novell AFP for Linux are available in OES 2 SP1 Linux and later. If you plan to mark CIFS or AFP as an advertising protocol for the NSS pool resource, make sure these protocols are installed and running when you create the pool resource.
  • Page 139 (NetWare Core Protocol ) is used by NSS to enforce the Novell trustee model of file access for all users of the data, and also as an advertising protocol for NCP clients. Selecting NCP causes commands to be added to the pool resource load and unload scripts to activate the NCP protocol on the cluster.
  • Page 140: Creating Nss Volumes

    C.4 Checking NSS Volume Mirror Status After you have configured NSS mirroring with Novell Cluster Services , you should check to ensure that it is working properly in a cluster environment.
  • Page 141 IMPORTANT: If you create or delete a pool or partition on shared storage that is part of a business continuity cluster, you must run the command on a server in cluster scan for new devices each of the peer clusters. Configuring Host-Based File System Mirroring for NSS Pools 141...
  • Page 142 142 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 143: D Configuration Worksheet For The Bcc Drivers For Identity Manager

    Configuration Worksheet for the BCC Drivers for Identity Manager ® Use this worksheet to gather the information you need to configure the Novell Business Continuity Clustering 1.2 drivers for Identity Manager. Repeat this process for each connection between clusters. For information about how to set up the drivers, see Chapter 8, “Configuring the Identity...
  • Page 144 Driver Set Information Value Create a new partition on this driver set Deselect this option. Driver Instance for the Connection from Source to Destination Driver Set Information Value Pre-configured driver template to import (pick one): BCCClusterResourceSynchronization.xml UserObjectSynchronization.xml TIP: The User Object Synchronization driver is needed only when creating a driver instance for communications between clusters in different trees.
  • Page 145: Cluster2 To Cluster1

    Driver Set Information Value Landing zone for this driver instance Specify the distinguished name of the container where the cluster-enabled pool, NCP server, and volume objects for the destination cluster will be placed when they are synchronized to the source cluster for this driver instance.
  • Page 146 Driver Set Information Value Create a new partition on this driver set Deselect this option. Driver Instance for the Connection from Source to Destination Driver Set Information Value Preconfigured driver template to import (pick the same one that you selected for the Cluster1-to- Cluster2 synchronization): BCCClusterResourceSynchronization.xml UserObjectSynchronization.xml...
  • Page 147 Driver Set Information Value Distinguished name of the source cluster for this driver instance Example: cluster2.clusters.siteB.example TIP: Browse to select the cluster. Landing zone for this driver instance Specify the distinguished name of the container where the cluster-enabled pool, NCP server, and volume objects for the destination cluster will be placed when they are synchronized to the source cluster for this driver instance.
  • Page 148 148 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 149: Requirements And Assumptions

    IP address range. In Novell Business Continuity Cluster (BCC) 1.2 for Novell Open Enterprise Server 2 SP1 Linux, you can configure BCC to act as a dynamic DNS (Domain Name System) client. Section E.1, “Requirements and Assumptions,” on page 149 Section E.2, “Configuring the DNS Server for Dynamic DNS,”...
  • Page 150: Tsig Keys

    Another option for your DNS servers is to put them in your Novell Cluster Services cluster. This creates a DNS service that is extremely resilient to failure. For information, see “Configuring DNS with Novell Cluster Services” in the OES 2 SP1: Novell DNS/DHCP Administration Guide for Linux.
  • Page 151: Configuring The Dns Server With The Public Key

    Replace cluster_dns_name with the name of the host. For BCC, the cluster node that hosts the Novell Cluster Services Master IP Address resource updates the DNS server. Because this can be any node in the cluster, use the fully qualified name of the cluster as the host name.
  • Page 152: Configuring The Dns Server Zones

    To continue our example, the key section for the file might look /var/lib/named/keys.conf like this: key cluster1.clusters.site1.company.com. { algorithm HMAC-MD5; secret "SCUT8rIUoGByvcI1Iok7tY7YvcEaHaM3zusCxXmboBxVcJvUxr335HCg lXcDQRPrJrzIKQhH4dJ4cY10ebOJFw=="; 5 Save the file. 6 Continue with Section E.2.3, “Configuring the DNS Server Zones,” on page 152. E.2.3 Configuring the DNS Server Zones To configure the DNS zones to accept authorized DNS updates: 1 On the DNS server, open a terminal console, then log in as the...
  • Page 153 Test Equipment Sample Value DNS Server IP address 10.1.1.172 Linux client computer wkstn1.clusters.site1.company.com FTP server (testing to see its IP address) 10.1.1.215 ftp.clusters.site1.company.com For example, enter: dig #10.1.1.172 ftp.clusters.site1.company.com The output shows that the IP address for ftp.clusters.site1.company.com is 10.1.1.215: ;...
  • Page 154 ; <<>> DiG 9.3.2 <<>> @10.1.1.172 -x 10.1.1.215 ; (1 server found) ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34957 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0 ;;...
  • Page 155 nsupdate -v -k /home/yourhomedir/ Kcluster1.clusters.site1.company.com.+157+60303.private > server 10.1.1.172 53 > update delete 215.1.1.10.in-addr.arpa PTR > update add 216.1.1.10.in-addr.arpa 300 PTR ftp.clusters.site1.company.com > show Outgoing update query: ;; ->>HEADER<<- opcode: UPDATE, status: NOERROR, id: ;; flags: ; ZONE: 0, PREREQ: 0, UPDATE: 0, ADDITIONAL: 0 ;;...
  • Page 156 8b Use the dig utility with the IP address to find the DNS name. dig @10.1.1.172 -x 10.1.1.216 ; <<>> DiG 9.3.2 <<>> @10.1.1.172 -x 10.1.1.216 ; (1 server found) ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14497 ;;...
  • Page 157: Configuring The Cluster Resources For Dynamic Dns

    E.3 Configuring the Cluster Resources for Dynamic DNS After the DNS server is configured for dynamic DNS, you must configure each of the BCC-enabled cluster resources to take advantage of it. You modify the BCC load scripts for each of the cluster resources so that the script automatically updates the DNS server with the correct IP address of the given resource during a BCC migration to a peer cluster.
  • Page 158 6 Specify the following settings for the script: Parameter Description CIM-Enabled Used for CIM (Common Information Model) and SMI-S (Storage Management Initiative Specification) enabled scripts that manage a physical SAN. These are not used for the dynamic DNS script. Deselect the check box. After this check box is deselected, the CIMON IP/ DNS, Namespace, Port, Secure, Username, and Password controls are all disabled.
  • Page 159 Edit Flags This is an advanced option that should only be enabled when instructed to do so by Novell Support, so leave it disabled (deselected). 7 Specify the Script Parameters. Click New to insert a new editable row into the Script Parameters table. The left field is the parameter name and the right field is the parameter value.
  • Page 160: Public And Private Keys

    E.3.2 Public and Private Keys The BCC load and unload scripts always run on the node that is hosting the Novell Cluster Services master resource (that is, the Master_IP_Address_Resource). This resource can be hosted on any node in the Novell Cluster Services cluster, which means the BCC load and unload scripts can also be executed on any node in the cluster.
  • Page 161: Testing The Dynamic Dns Solution

    2 Open the copy of the script in a text editor, then modify the BCC variables by modifying lines 62 – 66 of the script. The uppercase string surrounded by the percent character ( % ) is the BCC variable and should be replaced with the real value (such as %DNS_SERVER_ADDR%).
  • Page 162 162 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 163: Understanding Internal Virtual Ip Networks

    IP address range. In Novell Business Continuity Cluster (BCC) 1.2 for Novell Open Enterprise Server 2 SP1 Linux, you can configure BCC to use virtual IP addresses for BCC-enabled resources as an alternate approach to assigning secondary IP addresses to resources.
  • Page 164: Virtual Ip Address Benefits

    F.2 Virtual IP Address Benefits In spite of their simplicity, virtual IP addresses offer the following advantages over their physical counterparts: Improves availability. The virtual IP addresses are bound to virtual adapters instead of physical adapters. The host mask for the virtual adapter allows each cluster resource to have its own entry in the routing tables.
  • Page 165: Unlimited Mobility

    F.2.2 Unlimited Mobility Unlike physical IP addresses which are limited in their mobility, virtual IP addresses are highly mobile. The degree of mobility is determined by the number of servers that an IP address on a specific server could be moved to. In other words, if you choose a physical IP address as an IP address of a network resource, you are limiting the set of potential servers to which this resource could be transparently failed-over.
  • Page 166: Routing Protocol

    Section F.3.4, “IP Addresses for BCC-Enabled Cluster Resources,” on page 166 Section F.3.5, “Host Mask,” on page 167 F.3.1 Routing Protocol In theory, any state-of-the-art routing protocol could be used for the virtual IP network. This section describes how to set up the virtual router using the OSPF (Open Shortest Path First) routing protocol because it is a commonly used protocol.
  • Page 167: Host Mask

    IP network whose route is being advertised by a single node within a cluster. Because Novell Cluster Services™ can migrate a service and its virtual IP address from one node to another, the virtual IP network must migrate to the same node as the service. If multiple virtual IP...
  • Page 168: Configuring Virtual Ip Addresses

    IP address information for the dummy0 adapter. For example, the old and new lines are emphasized in the following sample load script: #!/bin/bash . /opt/novell/ncs/lib/ncsfuncs exit_on_error nss /poolact=POOL1 exit_on_error ncpcon mount TVOL1=101 ###exit_on_error add_secondary_ipaddress 10.10.0.101 exit_on_error ip addr add 10.50.0.101/32 dev dummy0 exit_on_error ncpcon bind --ncpservername=CL1-POOL1-VS -- ipaddress=10.50.0.101...
  • Page 169 5 To verify that a virtual IP address is bound, enter at a display secondary ipaddress terminal console of the cluster node where the virtual IP address is assigned. This displays all bound virtual IP addresses. 6 Repeat the previous steps for the remaining cluster resources. Using Virtual IP Addresses with BCC 1.2 169...
  • Page 170 170 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 171 Removing Business Continuity Clustering Core Software ® If you need to uninstall Novell Business Continuity Clustering, you can do so by using the Business Continuity Clustering installation program. 1 Log in as the user on the server. root 2 Use one of the following methods to open the BCC Configuration page: In YaST, select Miscellaneous >...
  • Page 172 172 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 173: H Documentation Updates

    Documentation Updates ® This section contains information about documentation content changes made to the Novell Business Continuity Clustering 1.2 Administration Guide for Linux since the initial 1.2 release. If you are an existing user, review the change entries to readily identify modified content. If you are a new user, simply read the guide in its current state.
  • Page 174: H.2.2 What's New For Bcc 1.2

    BCC-enabled cluster resource. Information,” on page 85 H.3.2 Console Commands for BCC Location Change Section A.2, “Setting Up This section is new. Linux Scan Commands in / opt/novell/ncs/bin/ device_scan.sh,” on page 132 174 BCC 1.2: Administration Guide for OES 2 SP1 Linux...
  • Page 175: H.3.3 Installing Business Continuity Clustering

    H.3.3 Installing Business Continuity Clustering Location Change “Identity Manager Engine Each Identity Manager node must be online in its peer cluster and Identity and eDirectory Driver” on Manager must be running properly whenever you attempt to modify the page 43 BCC configuration or manage the BCC-enabled cluster resources.
  • Page 176: H.3.8 Using Virtual Ip Addresses With Bcc 1.2

    H.3.8 Using Virtual IP Addresses with BCC 1.2 Location Change Appendix F, “Using Virtual IP This section is new. Addresses with BCC 1.2,” on page 163 H.4 September 9, 2009 Updates were made to the following sections. The changes are explained below. Section H.4.1, “Configuring BCC for Cluster Resources,”...
  • Page 177: H.5.1 Console Commands For Bcc

    H.5.1 Console Commands for BCC Location Change Appendix A, “Console Updated to add a link to Novell Cluster Services console commands. Commands for BCC,” on page 129 H.5.2 Installing Business Continuity Clustering Location Change Section 4.1.7, “Identity Identity Manager 3.6.1 supports the 64-bit OES 2 SP2 operating system.
  • Page 178: H.7 April 28, 2009

    Location Change Chapter 7, “Converting BCC Updated for clarity. Clusters from NetWare to Linux,” on page 63 H.7 April 28, 2009 Updates were made to the following sections. The changes are explained below. Section H.7.1, “Converting BCC Clusters from NetWare to Linux,” on page 178 H.7.1 Converting BCC Clusters from NetWare to Linux Location Change...

Table of Contents