Continued open-e DSS V7 application series of eight remote access and administrator password recovery
I. Definition and classification of clusters
A cluster is a parallel or distributed system consisting of a number of interconnected computers, from the outside, they are simply a system that provides a unified service to the outside. High availability is one of its distinguishing features.
Cluster-by-platform providers can classify OS platform providers, database platform providers, application server platform providers, storage providers, etc., according to the implementation function can be divided into high availability clusters (Fail-over Cluster) highly available (failover) cluster , High performance clusters (HPC) performance clusters, load balancing clusters, and so on.
Second, the cluster mode
Can be divided into active/Standby mode, Active/Active mode, Active/passive mode.
Metaphor:
The two brothers open the breakfast shop, business is not big, but every morning between 7 and 9 customers a lot and can not be interrupted. In order to ensure that the breakfast shop in 2 hours to ensure continuous service, the two brothers to discuss a few ways:
Method One: Active/standby (Active/Standby mode)
Peacetime boss Business, the second of this time at home waiting, once the eldest brother can not do business, the dick on the top, this is called Active/standby.
Method Two: Active/passive (Active/passive mode).
Peacetime boss Business, the second this time on the side of the helper, once the eldest brother can not do business, the second immediately on top, this is called active/passive (Active/passive mode).
Method Three: Active/active (Active/Active mode).
Usually the eldest brother sells steamed buns, the second side also sells soya-bean milk, eldest brother has the problem, the second sells the steamed bun again, sells the soya bean milk, the second, the eldest brother sells the steamed bun again, sells the soya bean milk. This is called active/active (Active/Active mode).
Bun =application Package (application), mutual care called Heartbeat (Heartbeat Service), the replacement of each other's work is called Failover/takeover (failover).
Iii. DSS support for clustering
DSS supports active/Active mode and active/passive mode clustering.
Detailed cluster deployment documentation is available on the official DSS website. http://www.open-e.com/support/library/how-to-resources/
can also be downloaded from the attachment
Iv. deploying an Active/Active mode iSCSI failover Cluster
On the Reference website: Step-by-Step Guide to Open-e DSS V7 active-active iSCSI Failover technical documentation.
1. Hardware environment
such as
From this, you can consider an iSCSI cluster to implement active/Active mode, requiring two DSS servers and two storage clients.
Each DSS server requires 6 NICs, eth0 for managing the network, ETH1, Eth2, and Eth3, Eth4 22 for multi-pathing, and Eth5 for volume replication.
Each DSS server establishes a volume group of two volumes LV0000, LV0001 respectively. Where the first server LV0000 as the source, the other server's LV0000 as the target, the second server's LV0001 as the source, and the first server LV0001 as the target. Set up two volume replication tasks separately.
Two iSCSI targets were established on each DSS server, connecting LV0000 and LV0001 volumes, respectively. The two DSS servers are set up with 4 virtual IP addresses.
Two client computers:
There are also 6 NICs in order to achieve the multipath of the access. One of the most important is Ping node network card. To simplify deployment, the author uses two NICs, one for managing network connections and one for pinging Node.
650) this.width=650; "title=" DSS164 "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" DSS164 "src=" http:// S3.51cto.com/wyfs02/m02/80/81/wkiol1ddrppwf6wraakpb9utxkk764.jpg "width=" 851 "height=" 614 "/>
2. Pre-deployment operations
To prevent frequent occurrences of such hints,
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px, "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m00/80/81/wkiol1ddrptxmnlpaacqoq5bjvy762.jpg "width=" 974 "height=" 430 "/>
Users can use the IE option's "Security", "Internet", "Custom Level"
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot One "src=" http:// S3.51cto.com/wyfs02/m01/80/81/wkiol1ddrpxzrdf2aad9ags6rkk348.jpg "width=" 413 "height=" 490 "/>
Modify "Show mixed content" to "enabled".
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px, "border=" 0 "alt=" snapshot of "src=" http:// S3.51cto.com/wyfs02/m02/80/83/wkiom1ddrasseb8kaadctorx3j8695.jpg "width=" 419 "height=" 494 "/>
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m02/80/82/wkiol1ddrpfdfuc7aafufh0x78o626.jpg "width=" 970 "height=" 458 "/>
Also, in advanced, set the relevant options under security in the following settings.
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src="/HTTP// S3.51cto.com/wyfs02/m02/80/82/wkiol1ddrpmw0empaaelwqdxl68532.jpg "width=" 416 "height=" 489 "/>
At the same time, add two DSS server IP addresses to the trusted site.
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m00/80/83/wkiom1ddraidwnh5aad1zgpfpcc127.jpg "width=" 414 "height=" 494 "/>
3. DSS Server Preparation
The author uses two virtual machines to install DSS V7 to emulate the DSS server. The following are the settings for the DSS host:
Two hard drives, six NICs. (In practice, various network traffic should be isolated, such as through a VLAN)
650) this.width=650; "title=" Snapshot 8 "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" Snapshot 8 "src=" http:// S3.51cto.com/wyfs02/m01/80/83/wkiom1ddranzzdl0aafwx9thjs0388.jpg "width=" 735 "height=" 664 "/>
4. Deployment process
The following actions are performed in Web-managed mode.
4.1 Set the first server name to Dss01, and the hostname to DSSNODE01
"Settings"-"Network Interface"
650) this.width=650; "title=" Snapshot 9 "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" Snapshot 9 "src=" http:// S3.51cto.com/wyfs02/m01/80/83/wkiom1ddraqhdyykaaeklndshhg569.jpg "width=" 976 "height=" 530 "/>
4.2 Binding eth1 and Eth2
Sets the binding mode and IP address. About the binding mode of the NIC see http://www.cnblogs.com/dkblog/p/3613407.html
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m01/80/82/wkiol1ddrp6rgjhzaaest8lacc0986.jpg "width=" 713 "height=" 664 "/>
4.3 Binding eth3 and Eth4
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src="/HTTP// S3.51cto.com/wyfs02/m02/80/83/wkiom1ddrazqwuoiaaej0eamvqw504.jpg "width=" 653 "height=" 629 "/>
4.4 Set the IP address of the ETH5.
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m00/80/83/wkiom1ddra2dep1raadj3ge_7h0078.jpg "width=" 919 "height=" 571 "/>
4.5 Set up the following steps on the second DSS host
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m00/80/83/wkiom1ddra7gq9dxaadyyies6ns948.jpg "width=" 980 "height=" 493 "/>
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m00/80/82/wkiol1ddrqlrmj0-aaei87im-sw595.jpg "width=" 617 "height=" 679 "/>
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px; "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m01/80/83/wkiom1ddrbhhcu9aaad6qjz55h4124.jpg "width=" 657 "height=" 581 "/>
650) this.width=650; "title=" snapshot "style=" border-right-width:0px;background-image:none;border-bottom-width:0px; padding-top:0px;padding-left:0px;padding-right:0px;border-top-width:0px, "border=" 0 "alt=" snapshot "src=" http:// S3.51cto.com/wyfs02/m01/80/82/wkiol1ddrqsbvhlcaadlb_7o14c293.jpg "width=" 980 "height=" 510 "/>
The rest of the procedure is described in the next chapter.
OPEN-E DSS V7 Application series of ten Active/Active iSCSI cluster deployments (ii)
This article is from the "Start from the Heart" blog, please be sure to keep this source http://ycrsjxy.blog.51cto.com/618627/1782382
OPEN-E DSS V7 Application Series nine active/active iSCSI cluster deployments (i)