Top
PRIMECLUSTER  Installation and Administration Guide 4.4
FUJITSU Software

6.7 Setting Up Cluster Applications

This section explains how to set up a cluster application.

You can use any one of the nodes of the cluster system for the settings described in this section.

Cluster application setup flow

The setup flow for a cluster application is explained for each topology, below.

For information on these topologies, see "2.3 Determining the Cluster System Operation Mode."

1) 1:1 standby for standby operation

Set up 1:1 standby for standby operation as follows.

2) Mutual standby for standby operation

Set up mutual standby for standby operation as follows.

3) N:1 standby for standby operation

Set up N:1 standby for standby operation as follows.

4) Cascaded standby operation

Set up cascaded standby operation as follows.

5) Priority transfer of standby operation

Set up the priority transfer of standby operation as follows.

6) Scalable operation

Set up a scalable operation as follows.

See

Note

  • Set up the cluster application and resources based on the cluster application and resource information in "Setup (cluster application)"of PRIMECLUSTER Designsheets that was created in the design stage, and the sheet corresponding to each resource. If you need to change the cluster application after it is created, the designsheets are helpful. Make sure to create the designsheets before performing necessary operation.

  • You cannot share one resource with multiple userApplication.

  • Generate and Activate process fail if RMS is running. Using Cluster Admin or hvdisp, you need to confirm that RMS has not started before creating a cluster application. If RMS has already started, stop RMS from Cluster Admin or execute the "hvshut" command to stop RMS on all the nodes of the cluster system. For details on "hvdisp" and "hvshut", see the pages of these commands respectively.

  • Set up "remote file copy" and "remote command execution" for the RMS Wizard. See the notes on "5.1.1 Setting Up CF and CIP."
    If the cluster interconnect is not protected by security, cancel the "remote file copy" and "remote command execution" settings on all the cluster nodes after setting up the cluster applications.