Top
PRIMECLUSTER Global Link Services Configuration and AdministrationGuide 4.3Redundant Line Control Function

Preface

Purpose

This document describes the installation, configuration, operation, and maintenance of PRIMECLUSTER Global Link Services (hereafter GLS).

Who should use this document

This document is intended for system administrators who are familiar with GLS operations and cluster control. Anyone who installs, configures, and maintains GLS to increase the availability of the system should read this documentation. A basic knowledge of PRIMECLUSTER is assumed.

Abstract

The document consists of the following chapters, appendices, and glossary:

Chapter 1 Overview

This chapter explains the redundant line control function of GLS.

Chapter 2 Feature description

This chapter outlines the functions and features of GLS.

Chapter 3 Environment configuration

This chapter discusses how to set up and configure GLS.

Chapter 4 Operation

This chapter explains how to operate the redundant line control function.

Chapter 5 GLS operation on cluster systems

This chapter explains how to operate the redundant line control on a cluster system.

Chapter 6 Maintenance

This chapter focuses on a general approach to troubleshooting. It presents a troubleshooting strategy and identifies commands that are available in Resource Coordinator for finding and correcting problems. Further, it discusses how to collect troubleshooting information.

Chapter 7 Command references

This chapter outlines GLS commands.

Appendix A Messages and corrective actions

This appendix outlines messages and corrective actions to be taken to eliminate errors.

Appendix B Examples of configuring system environments

This appendix explains how to configure the system environment with redundant network control.

Appendix C Operation on the Virtual Machine Function

This appendix explains how to operate GLS on the virtual machine function.

Appendix D Trouble shooting

This section explains the potential causes and solutions when trouble occurs while using a Redundant Line Control Function.

Appendix E Check list

This appendix describes items to be checked before operating GLS. Using this checklist before operation can reduce the risk of incorrect settings.

Appendix F Changes from previous versions

This appendix discusses changes to the GLS specification. It also suggests some operational guidelines.

Related documentation

Please refer to the following documents according to need.

Notational convention

The document conforms to the following notational conventions:

Point

Text that requires special attention

Note

Information that users should be cautious of

Example

Describes operation using an example

Information

Information that users can refer to

See

Manuals users find workable

Abbreviations

In this document, the following product name is written by abbreviation.

Product names

Abbreviations

Red Hat Enterprise Linux AS v.2.1
Red Hat Enterprise Linux ES v.2.1

RHEL2.1

RHEL

Red Hat Enterprise Linux AS v.3
Red Hat Enterprise Linux ES v.3

RHEL3

Red Hat Enterprise Linux AS v.4

RHEL4

Red Hat Enterprise Linux 5

RHEL5

SUSE Linux Enterprise Server 9

SLES9

SLES

SUSE Linux Enterprise Server 10

SLES10

PRIMEQUEST Virtual Machine Function

Virtual Machine Function

Linux Virtual Machine Function

RHEL5-Xen Virtual Machine Function

Export Controls

Exportation/release of this document may require necessary procedures in accordance with the regulations of your resident country and/or US export control laws.

Trademark

UNIX is a registered trademark of The Open Group in the United States and other countries.

Linux is trademark or registered trademark of Mr. Linus Torvalds in the United States and other countries.

Red Hat, RPM and all Red Hat based marks and logos are trademarks or registered trademarks of Red Hat, Inc. in the United States and other countries.

Ethernet is a trademark of Fuji Xerox Corporation.

PRIMECLUSTER is a registered trademark of Fujitsu Limited.

Other product names that appear in this manual are product names, trademarks, or registered trademarks of respective companies.

Date of publication and edition

January 2010, Second edition
May 2010, 2.1 edition
December 2010, 2.2 edition
September 2011, 2.3 edition
August 2012, 2.4 edition
July 2015, 2.5 edition

Using for application requiring high-security:

This Product is designed, developed and manufactured as contemplated for general use, including without limitation, general office use, personal use, household use, and ordinary industrial use, but is not designed, developed and manufactured as contemplated for use accompanying fatal risks or dangers that, unless extremely high safety is secured, could lead directly to death, personal injury, severe physical damage or other loss (hereinafter "High Safety Required Use"), including without limitation, nuclear reaction control in nuclear facility, aircraft flight control, air traffic control, mass transport control, medical life support system, missile launch control in weapon system. You shall not use this Product without securing the sufficient safety required for the High Safety Required Use. If you wish to use this Product for High Safety Required Use, please consult with our sales representatives before such use.

Requests

  • No part of this document may be reproduced or copied without permission of FUJITSU LIMITED.

  • The contents of this document may be revised without prior notice.

All Rights Reserved, Copyright (C) FUJITSU LIMITED 2008-2015.

Revision History

Revision

Location

Edition

Added the descriptions on IPv6.

3.2.2.1 Setup common to modes

2.1 edition

Added the descriptions on default gateway configuration.

Added the descriptions to the note.

Added the descriptions to "When using an IPv6 address".

3.2.2.3 System setup in NIC switching mode

Changed the notes.

3.3.2 NIC switching mode

3.4.2 NIC switching mode

B.4.11 Example of the Cluster system in Takeover physical IP address (pattern II)

Changed the setting of HOST-A.

B.4.11 Example of the Cluster system in Takeover physical IP address (pattern II)

Changed the description for NIC switching mode.

2.7.2 User command execution function

2.2 edition

Added the description for the upper limit of configuration.

3.1.2.5 Upper limit of configuration

7.1 hanetconfig Command

7.13 hanetobserv Command

Changed the description for the default gateway configuration.

3.2.2.1 Setup common to modes

Added descriptions in Information.

3.8.1.3 Transfer route error detection time for NIC switching mode

Changed the description in Note.

6.3.2 Active maintenance

Added descriptions in Note.

7.7 hanetpoll Command

Changed the example of the print command.

7.15 hanethvrsc Command

Changed the maximum size of shared memory segment.

3.2.1 Setup kernel parameters

2.3 edition

Added the descriptions in Note.

6.3.2 Active maintenance

C.6.1 Setup example for creating a highly reliable network of guest domains using GLS on domain-0 (Untagged VLAN and single network configuration)

C.6.2 Setup example for creating a highly reliable guest domains using GLS on domain-0 (Untagged VLAN and multiple network configuration)

C.6.3 Setup example for creating a highly reliable domains using GLS on domain-0 (Tagged VLAN and multiple network configuration)

Added the descriptions in Notes.

2.1.2.5 Notes

2.4 edition

Added the description for switching a transfer path when a hang-up of the ping command was detected.

2.4.1 HUB monitoring function

2.5.1 Communication target monitoring

3.8.1.3 Transfer route error detection time for NIC switching mode

3.9.1.2 Transfer route error detection time in GS linkage mode

2.5 edition

Added the script argument that is called from the user command execution function when a transfer path failure is detected.

3.11.2.1 Settings for NIC switching mode

Added the message number: 931.

A.1.3 Console output messages (numbers 800 to 900)