Top
PRIMECLUSTER Global Link Services Configuration and AdministrationGuide 4.3Redundant Line Control Function

Preface

Purpose

This document describes the installation, configuration, operation, and maintenance of PRIMECLUSTER Global Link Services (hereafter GLS).

Who should use this document

This document is intended for system administrators who are familiar with GLS operations and cluster control. Anyone who installs, configures, and maintains GLS to increase the availability of the system should read this documentation. A basic knowledge of PRIMECLUSTER is assumed.

Abstract

The document consists of the following chapters, appendices, and glossary:

Chapter 1 Overview

This chapter explains the redundant line control function of GLS.

Chapter 2 Feature description

This chapter outlines the functions and features of GLS.

Chapter 3 Environment configuration

This chapter discusses how to set up and configure GLS.

Chapter 4 Operation

This chapter explains how to operate the redundant line control function.

Chapter 5 GLS operation on cluster systems

This chapter explains how to operate the redundant line control on a cluster system.

Chapter 6 Maintenance

This chapter focuses on a general approach to troubleshooting.

Chapter 7 Command references

This chapter outlines GLS commands.

Appendix A Messages and corrective actions

This appendix outlines messages and corrective actions to be taken to eliminate errors.

Appendix B Examples of configuring system environments

This appendix explains how to configure the system environment with redundant network control.

Appendix C Operation on the Virtual Machine Function (For RHEL5)

This appendix explains how to operate GLS on the virtual machine function (for RHEL5).

Appendix D Operation on the Virtual Machine Function (for RHEL6)

This appendix explains how to operate GLS on the virtual machine function (for RHEL6).

Appendix E Operation on VMware

This appendix explains how to operate GLS on VMware.

Appendix F Trouble shooting

This section explains the potential causes and solutions when trouble occurs while using a Redundant Line Control Function.

Appendix G Check list

This appendix describes items to be checked before operating GLS. Using this checklist before operation can reduce the risk of incorrect settings.

Appendix H Changes from previous versions

This appendix discusses changes to the GLS specification. It also suggests some operational guidelines.

Notational convention

The document conforms to the following notational conventions:

Point

Text that requires special attention

Note

Information that users should be cautious of

Example

Describes operation using an example

Information

Information that users can refer to

See

Manuals users find workable

Abbreviations

In this document, the following product name is written by abbreviation.

Product names

Abbreviations

Red Hat Enterprise Linux 5

RHEL5

RHEL

Red Hat Enterprise Linux 6

RHEL6

PRIMEQUEST Virtual Machine Function

Virtual Machine Function

Linux Virtual Machine Function

RHEL5-Xen Virtual Machine Function

Trademark

UNIX is a registered trademark of The Open Group in the United States and other countries.

Linux is trademark or registered trademark of Mr. Linus Torvalds,in the United States and other countries.

Red Hat, RPM and all Red Hat based marks and logs are trademarks or registered trademarks of Red Hat, Inc. in the United States and other countries.

Ethernet is a trademark of Fuji Xerox Corporation.

PRIMECLUSTER is a registered trademark of Fujitsu Ltd.

VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions.

Date of publication and edition

May 2008, First edition
January 2010, Second edition
June 2011, Third edition
April 2012, 3.1 edition

Using for application requiring high-security:

This Product is designed, developed and manufactured as contemplated for general use, including without limitation, general office use, personal use, household use, and ordinary industrial use, but is not designed, developed and manufactured as contemplated for use accompanying fatal risks or dangers that, unless extremely high safety is secured, could lead directly to death, personal injury, severe physical damage or other loss (hereinafter "High Safety Required Use"), including without limitation, nuclear reaction control in nuclear facility, aircraft flight control, air traffic control, mass transport control, medical life support system, missile launch control in weapon system. You shall not use this Product without securing the sufficient safety required for the High Safety Required Use. If you wish to use this Product for High Safety Required Use, please consult with our sales representatives before such use.

Requests

  • No part of this document may be reproduced or copied without permission of FUJITSU LIMITED.

  • The contents of this document may be revised without prior notice.

All Rights Reserved, Copyright (C) FUJITSU LIMITED 2008-2012.

Revision history

Added and changed

Location

Edition

Added PRIMERGY as a connectable host device of GS linkage mode.

1.1 What is redundant line control?
1.1.1 Functional comparison
2.1.4 GS linkage mode
2.1.4.3 Connectable remote host
3.1.1 Selecting mode

3.1

Added descriptions of "GS linkage mode in a cluster configuration".

2.2.3 Configuring multiple logical virtual interfaces
3.6.3 Multiple logical virtual interface definition

Added a description to Point when a communication route failure is detected on the standby side.

2.5.2 Network monitoring function

Added a description to use NICs which support LRO (large-receive-offload) function.

2.10.4 Duplicated operation via Virtual NIC mode

Added descriptions of setting up subnet masks.

3.1.2.3 Virtual NIC mode
3.3.3 Virtual NIC mode

Added Information when activating interfaces on the standby side where a static route is configured to "(5) Route configuration".

3.2.2.1 Setup common to modes

Added a description when a virtual interface is registered to a cluster resource in "ONBOOT" of "Configuration of virtual interface".

3.3.3 Virtual NIC mode

Contents are totally changed.

3.4.3 Virtual NIC mode

Added a description to Note when making SELinux enabled.

3.12.2 Setting user command execution function

Added information about setting time from detecting monitoring failures of remote hosts until executing user commands in GS linkage mode.

3.12.2.2 Settings for GS linkage mode

Updated a list of the collected information.

6.1.1 Command to collect materials

Added notes when a logical virtual interface of GS linkage mode is used as a takeover IP address.

7.1 hanetconfig Command

Added a description to notes when the strhanet command is executed for a virtual interface of a virtual NIC mode.

7.2 strhanet Command

Added a description to notes on activating a VLAN interface connected to a virtual interface of a virtual NIC mode and a virtual bridge.

7.2 strhanet Command

Added conditions where setting of the hanetmask command is required to Note.

7.5 hanetmask Command

Added Note when the virtual interface of the virtual NIC mode is registered to a cluster resource.

7.17 hanethvrsc Command

Added Note on the virtual interface of the virtual NIC mode in the single configuration.

7.20 resethanet Command

Changed references which described in Action:

  • 870

  • 871

  • 875

A.1.2 Error output message (numbers 100 to 700)

Changed the contents described in /etc/syslog.conf and /etc/rsyslog.conf.

A.1.3 Console output messages (numbers 800 to 900)

Added "6) Setting a subnet mask of the takeover virtual interface".

B.7.3 Example of the Cluster system (1:1 Standby)
B.7.4 Example of the Cluster system (Mutual Standby)
B.7.5 Example of the Cluster system (Cascade)

Changed references which described in [Setting up domain-0 (host OS)].

C.8.2 Setup example for creating a highly reliable guest domains using GLS on domain-0 (Untagged VLAN and multiple network configuration)
C.8.3 Setup example for creating a highly reliable domains using GLS on domain-0 (Tagged VLAN and multiple network configuration)

Changed the figure of an example.

C.8.3 Setup example for creating a highly reliable domains using GLS on domain-0 (Tagged VLAN and multiple network configuration)

Added "(5) Order to start and stop of GLS service".

H.8.3 A list of incompatible functions