OPEN-E DSS V7 Application Series nine active/active iSCSI cluster deployments (i)

Source: Internet
Author: User
Tags failover

Continued open-e DSS V7 application series of eight remote access and administrator password recovery

I. Definition and classification of clusters

A cluster is a parallel or distributed system consisting of a number of interconnected computers, from the outside, they are simply a system that provides a unified service to the outside. High availability is one of its distinguishing features.

Cluster-by-platform providers can classify OS platform providers, database platform providers, application server platform providers, storage providers, etc., according to the implementation function can be divided into high availability clusters (Fail-over Cluster) highly available (failover) cluster , High performance clusters (HPC) performance clusters, load balancing clusters, and so on.

Second, the cluster mode

Can be divided into active/Standby mode, Active/Active mode, Active/passive mode.

Metaphor:

The two brothers open the breakfast shop, business is not big, but every morning between 7 and 9 customers a lot and can not be interrupted. In order to ensure that the breakfast shop in 2 hours to ensure continuous service, the two brothers to discuss a few ways:

Method One: Active/standby (Active/Standby mode)

Peacetime boss Business, the second of this time at home waiting, once the eldest brother can not do business, the dick on the top, this is called Active/standby.

Method Two: Active/passive (Active/passive mode).

Peacetime boss Business, the second this time on the side of the helper, once the eldest brother can not do business, the second immediately on top, this is called active/passive (Active/passive mode).

Method Three: Active/active (Active/Active mode).

Usually the eldest brother sells steamed buns, the second side also sells soya-bean milk, eldest brother has the problem, the second sells the steamed bun again, sells the soya bean milk, the second, the eldest brother sells the steamed bun again, sells the soya bean milk. This is called active/active (Active/Active mode).

Bun =application Package (application), mutual care called Heartbeat (Heartbeat Service), the replacement of each other's work is called Failover/takeover (failover).

Iii. DSS support for clustering

DSS supports active/Active mode and active/passive mode clustering.

Detailed cluster deployment documentation is available on the official DSS website. http://www.open-e.com/support/library/how-to-resources/

can also be downloaded from the attachment

Iv. deploying an Active/Active mode iSCSI failover Cluster

On the Reference website: Step-by-Step Guide to Open-e DSS V7 active-active iSCSI Failover technical documentation.

1. Hardware environment

such as

From this, you can consider an iSCSI cluster to implement active/Active mode, requiring two DSS servers and two storage clients.

Each DSS server requires 6 NICs, eth0 for managing the network, ETH1, Eth2, and Eth3, Eth4 22 for multi-pathing, and Eth5 for volume replication.

Each DSS server establishes a volume group of two volumes LV0000, LV0001 respectively. Where the first server LV0000 as the source, the other server's LV0000 as the target, the second server's LV0001 as the source, and the first server LV0001 as the target. Set up two volume replication tasks separately.

Two iSCSI targets were established on each DSS server, connecting LV0000 and LV0001 volumes, respectively. The two DSS servers are set up with 4 virtual IP addresses.

Two client computers:

There are also 6 NICs in order to achieve the multipath of the access. One of the most important is Ping node network card. To simplify deployment, the author uses two NICs, one for managing network connections and one for pinging Node.

650) this.width=650; "title=" DSS164 "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" DSS164 "src=" http:// S3.51cto.com/wyfs02/m02/80/81/wkiol1ddrppwf6wraakpb9utxkk764.jpg "width=" 851 "height=" 614 "/>

2. Pre-deployment operations

To prevent frequent occurrences of such hints,

650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px, "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m00/80/81/wkiol1ddrptxmnlpaacqoq5bjvy762.jpg "width=" 974 "height=" 430 "/>

Users can use the IE option's "Security", "Internet", "Custom Level"

650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot One "src=" http:// S3.51cto.com/wyfs02/m01/80/81/wkiol1ddrpxzrdf2aad9ags6rkk348.jpg "width=" 413 "height=" 490 "/>

Modify "Show mixed content" to "enabled".

650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px, "border=" 0 "alt=" snapshot of "src=" http:// S3.51cto.com/wyfs02/m02/80/83/wkiom1ddrasseb8kaadctorx3j8695.jpg "width=" 419 "height=" 494 "/>

650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m02/80/82/wkiol1ddrpfdfuc7aafufh0x78o626.jpg "width=" 970 "height=" 458 "/>

Also, in advanced, set the relevant options under security in the following settings.

650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src="/HTTP// S3.51cto.com/wyfs02/m02/80/82/wkiol1ddrpmw0empaaelwqdxl68532.jpg "width=" 416 "height=" 489 "/>

At the same time, add two DSS server IP addresses to the trusted site.

650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m00/80/83/wkiom1ddraidwnh5aad1zgpfpcc127.jpg "width=" 414 "height=" 494 "/>

3. DSS Server Preparation

The author uses two virtual machines to install DSS V7 to emulate the DSS server. The following are the settings for the DSS host:

Two hard drives, six NICs. (In practice, various network traffic should be isolated, such as through a VLAN)

650) this.width=650; "title=" Snapshot 8 "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" Snapshot 8 "src=" http:// S3.51cto.com/wyfs02/m01/80/83/wkiom1ddranzzdl0aafwx9thjs0388.jpg "width=" 735 "height=" 664 "/>

4. Deployment process

The following actions are performed in Web-managed mode.

4.1 Set the first server name to Dss01, and the hostname to DSSNODE01

"Settings"-"Network Interface"

650) this.width=650; "title=" Snapshot 9 "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" Snapshot 9 "src=" http:// S3.51cto.com/wyfs02/m01/80/83/wkiom1ddraqhdyykaaeklndshhg569.jpg "width=" 976 "height=" 530 "/>

4.2 Binding eth1 and Eth2

Sets the binding mode and IP address. About the binding mode of the NIC see http://www.cnblogs.com/dkblog/p/3613407.html

650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m01/80/82/wkiol1ddrp6rgjhzaaest8lacc0986.jpg "width=" 713 "height=" 664 "/>

4.3 Binding eth3 and Eth4

650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src="/HTTP// S3.51cto.com/wyfs02/m02/80/83/wkiom1ddrazqwuoiaaej0eamvqw504.jpg "width=" 653 "height=" 629 "/>

4.4 Set the IP address of the ETH5.


650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m00/80/83/wkiom1ddra2dep1raadj3ge_7h0078.jpg "width=" 919 "height=" 571 "/>

4.5 Set up the following steps on the second DSS host


650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m00/80/83/wkiom1ddra7gq9dxaadyyies6ns948.jpg "width=" 980 "height=" 493 "/>

650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m00/80/82/wkiol1ddrqlrmj0-aaei87im-sw595.jpg "width=" 617 "height=" 679 "/>

650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m01/80/83/wkiom1ddrbhhcu9aaad6qjz55h4124.jpg "width=" 657 "height=" 581 "/>

650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px, "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m01/80/82/wkiol1ddrqsbvhlcaadlb_7o14c293.jpg "width=" 980 "height=" 510 "/>

The rest of the procedure is described in the next chapter.

OPEN-E DSS V7 Application series of ten Active/Active iSCSI cluster deployments (ii)

This article is from the "Start from the Heart" blog, please be sure to keep this source http://ycrsjxy.blog.51cto.com/618627/1782382

OPEN-E DSS V7 Application Series nine active/active iSCSI cluster deployments (i)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.