Top
PRIMECLUSTER Global Link Services Configuration and AdministrationGuide 4.3Redundant Line Control Function

Preface

Purpose

This document describes the installation, configuration, operation, and maintenance of PRIMECLUSTER Global Link Services (hereafter GLS).

Who should use this document

This document is intended for system administrators who are familiar with GLS operations and cluster control. Anyone who installs, configures, and maintains GLS to increase the availability of the system should read this documentation. A basic knowledge of PRIMECLUSTER is assumed.

Abstract

The document consists of the following chapters, appendices, and glossary:

Chapter 1 Overview

This chapter explains the redundant line control function of GLS.

Chapter 2 Feature description

This chapter outlines the functions and features of GLS.

Chapter 3 Environment configuration

This chapter discusses how to set up and configure GLS.

Chapter 4 Operation

This chapter explains how to operate the redundant line control function.

Chapter 5 GLS operation on cluster systems

This chapter explains how to operate the redundant line control on a cluster system.

Chapter 6 Maintenance

This chapter focuses on a general approach to troubleshooting.

Chapter 7 Command references

This chapter outlines GLS commands.

Appendix A Messages and corrective actions

This appendix outlines messages and corrective actions to be taken to eliminate errors.

Appendix B Examples of configuring system environments

This appendix explains how to configure the system environment with redundant network control.

Appendix C Operation on the Virtual Machine Function (For RHEL5)

This appendix explains how to operate GLS on the virtual machine function (for RHEL5).

Appendix D Operation on the Virtual Machine Function (for RHEL6)

This appendix explains how to operate GLS on the virtual machine function (for RHEL6).

Appendix E Operation on VMware

This appendix explains how to operate GLS on VMware.

Appendix F Trouble shooting

This section explains the potential causes and solutions when trouble occurs while using a Redundant Line Control Function.

Appendix G Check list

This appendix describes items to be checked before operating GLS. Using this checklist before operation can reduce the risk of incorrect settings.

Appendix H Changes from previous versions

This appendix discusses changes to the GLS specification. It also suggests some operational guidelines.

Glossary

This section explains terms related to Redundant Line Control Function.

Notational convention

The document conforms to the following notational conventions:

Point

Text that requires special attention

Note

Information that users should be cautious of

Example

Describes operation using an example

Information

Information that users can refer to

See

Manuals users find workable

Abbreviations

In this document, the following product name is written by abbreviation.

Product names

Abbreviations

Red Hat Enterprise Linux 5

RHEL5

RHEL

Red Hat Enterprise Linux 6

RHEL6

PRIMEQUEST Virtual Machine Function

Virtual Machine Function

Linux Virtual Machine Function

RHEL5-Xen Virtual Machine Function

Trademark

UNIX is a registered trademark of The Open Group in the United States and other countries.

Linux is a registered trademark of Linus Torvalds.

Red Hat is a registered trademark of Red Hat, Inc. in the U.S. and other countries.

Ethernet is a trademark of Fuji Xerox Corporation.

PRIMECLUSTER is a registered trademark of Fujitsu Ltd.

VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions.

Date of publication and edition

May 2008, First edition
January 2010, Second edition
June 2011, Third edition
April 2012, 3.1 edition
December 2012, Fifth edition
July 2013, 5.1 edition

Using for application requiring high-security:

This Product is designed, developed and manufactured as contemplated for general use, including without limitation, general office use, personal use, household use, and ordinary industrial use, but is not designed, developed and manufactured as contemplated for use accompanying fatal risks or dangers that, unless extremely high safety is secured, could lead directly to death, personal injury, severe physical damage or other loss (hereinafter "High Safety Required Use"), including without limitation, nuclear reaction control in nuclear facility, aircraft flight control, air traffic control, mass transport control, medical life support system, missile launch control in weapon system. You shall not use this Product without securing the sufficient safety required for the High Safety Required Use. If you wish to use this Product for High Safety Required Use, please consult with our sales representatives before such use.

Requests

  • No part of this document may be reproduced or copied without permission of FUJITSU LIMITED.

  • The contents of this document may be revised without prior notice.

All Rights Reserved, Copyright (C) FUJITSU LIMITED 2008-2013.

Editing Record

Additions and changes

Section

Edition

Modified the description for the operation of HUB-to-HUB monitoring.

2.4.1.2 Using HUB-to-HUB monitoring feature

5.1

Added the consideration when changing a physical NIC configuration by using the ethtool command.

2.10.4 Duplicated operation via Virtual NIC mode

Added the setting examples for IPv6 and DualStack.

3.3.3 Virtual NIC mode

Added the Information and Note in "2) Setting PCL monitoring for other nodes."

3.10.1.1 Setting the monitoring destination information

Added the Note for specifying a takeover IP address by using the hanetparam command with -i option in Virtual NIC mode.

7.17 hanethvrsc Command

Described the following messages:

  • 858

  • 900

A.1.3 Console output messages (numbers 800 to 900)

Added information for the message priorities and facilities.

A.1.3 Console output messages (numbers 800 to 900)

Added the GS linkage mode for the supported redundant line switching methods in a KVM guest.

D.3.2 Support set for each redundant line switching mode

Modified the configuration setup example.

D.6.2 Setup example for creating a highly reliable network of guest domains on KVM hosts (Tagged VLAN)

Added the description "(6) Conditions to output the message for a NIC bundled in the GLS virtual interface."

H.8.3 A list of incompatible functions

Added the description "(2) Conditions to output the message for the GLS virtual interface."

H.9.3 A list of incompatible functions