Académique Documents
Professionnel Documents
Culture Documents
bexcdz111810cs
Syncsort Incorporated, 2011 All rights reserved. This document contains proprietary and confidential material, and is only for use by licensees of the BEX proprietary software system. This publication may not be reproduced in whole or in part, in any form, except with written permission from Syncsort Incorporated. Backup Express, BEX, and BEX Instant Virtualization are trademarks of Syncsort Incorporated. All other company and product names used herein may be the trademarks of their respective companies.
Table of Contents
Chapter 1. Introduction to Cluster Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 Clustering Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 BEX Cluster Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 Windows Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 Introduction to Windows Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 Physical Representation of a Windows Cluster . . . . . . . . . . . . . . . . . . . . . 2.1 Logical Representation of a Windows Cluster in BEX . . . . . . . . . . . . . . . 2.1 Setting Up a Windows Cluster to Use BEX . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Configuring BEX for Windows Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4 MS SQL Server and MS Exchange Support in Clusters . . . . . . . . . . . . . . . . . 2.6 Considerations for SQL Server Restores in a Cluster . . . . . . . . . . . . . . . . 2.6 MS Exchange Folder Level Setup in a Cluster . . . . . . . . . . . . . . . . . . . . . 2.6 BEX Windows Cluster Support in a SAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.7 Backup and Restore for Windows Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.8 Manual Setup Procedure for Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.9 NetWare 6.x Clusters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1 Introduction to NetWare 6.x Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1 A NetWare 6.x Cluster Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1 Physical Representation of a NetWare 6.x Cluster . . . . . . . . . . . . . . . . . . 3.1 Logical Representation of a NetWare 6.x Cluster in BEX . . . . . . . . . . . . 3.2 Setup and Configuration of NetWare 6.x Clusters . . . . . . . . . . . . . . . . . . . . . 3.3 Before Starting Cluster Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 Installation for NetWare Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 Configuration of BEX for NetWare Clusters . . . . . . . . . . . . . . . . . . . . . . . 3.4 Post-Setup Procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.6 BEX NetWare Cluster Support in a SAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.6 Backup and Restore for NetWare Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.6 Novell OES Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.1 Introduction to Novell Open Enterprise Server (OES) Clusters . . . . . . . . . . 4.1 A Novell OES Cluster Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.1 Physical Representation of a Mixed OES Cluster . . . . . . . . . . . . . . . . . . . 4.1 Logical Representation of a Mixed OES Cluster in BEX . . . . . . . . . . . . . 4.2 Setup and Configuration of OES Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4 Before BEX Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4 BEX Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4 Configuration of BEX for OES Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4 Post-Setup Procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6 BEX Cluster Support in a SAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6 Backup and Restore for Open Enterprise Server (OES) Clusters . . . . . . . . . 4.7
Chapter 2.
Chapter 3.
Chapter 4.
ii
For current information about operating system, file system, and hardware compatibility, see: http://www.syncsort.com/pdf/bex_compatibility_guide.pdf.
1.1
Chapter 1.
1.2
C:
D:
C:
Node Y
D:
2.1
Chapter 2. (physical and virtual) must be members of the same node group. A node group for a cluster must contain all the nodes for that cluster and no other nodes. The following illustration shows a logical representation for the cluster depicted in the topic above. You define two physical nodes (Node X and Node Y) and one virtual node (BexClus). The virtual node contains all the shared resources (G: and H:). Logically then, the cluster node group simply contains three nodes: Node X, Node Y, and BexClus. Each of the three nodes contains two disks.
BexClus
H:
C:
Node X
D:
C:
Node Y
D:
All shared resources (for example, files on shared disks, MS Exchange, MS SQL Server) are viewed by BEX as local resources of the virtual node. This concept is illustrated by the following extract from a BEX File Backup window. In this depiction, WIN2003CLUST2 and WIN2003CLUST3 are physical nodes and BEX_W2K3CLUST is the virtual cluster node. Q:, SQL$SQL2K5SRV:, X:, Y:, and Z: are shared resources. W2K3CLUST is the node group.
2.2
With this structure, BEX ensures that backups of the shared resources are performed through the virtual node and backups of local resources are performed through the physical nodes. For File mode backups, if a failover occurs during backup of a shared resource, the backup task first fails, then BEX retries the task through an available node. Because the resource runs on an available node, the task completes successfully. For Advanced Recovery for SnapVault backups, failover during backup results in an unsuccessful backup job. The user must rerun the job or wait until the next scheduled instance of that job.
2.3
Chapter 2. If you add a new node to a cluster later on, when installing BEX on that node, select Yes in response to the question Is this the last node in the cluster to install BEX?.
Note: BEX offers a standalone cluster setup utility, WinClusterConfigurator, which is documented in javautil.txt in the BEX document library.
2.4
2.5
Chapter 2.
File Mode Backup and Restore SQL Server Versions MS Exchange Versions SQL Server 7.0, 2000 on Windows 2000/ 2003 MS Exchange 5.5, 2000, 2003, 2007 on Windows 2000/2003
Advanced Recovery for SnapVault Backup and Restore SQL Server 2000/2005 on Windows 2003 MS Exchange 2003/ 2007 on Windows 2003
Advanced Recovery for Open Storage Backup and Restore SQL Server 2000/2005 on Windows 2003 MS Exchange 2003/ 2007 on Windows 2003
For a discussion of the BEX naming conventions for SQL Server and Exchange disks, see Chapter 8. SQL Server Interface and Chapter 9. Microsoft Exchange Interface in the BEX Interface Guide. For additional Advanced Recovery considerations and restrictions, see Chapter 5. Considerations for Clusters and Applications in the BEX Disk-to-Disk Guide.
2.6
interested in using BEX to manage Exchange servers at the database level only, there is no need to run these procedures. Note: If you are upgrading from a previous release of BEX and your BEX enterprise is already set up for folder level Exchange support, you should not need to execute these procedures. However, if all Exchange servers on a given cluster do not have identical profiles or the profiles do not have identical passwords, you must do the following: 1. Copy your EXMAPI_PROFILE registry entry, and modify the copied entry to include a _SERVERNAME extension, where SERVERNAME is a unique Exchange server name in a given cluster. 2. In the new EXMAPI_PROFILE_SERVERNAME and EXMAPI_PASSWORD_SERVERNAME registry entries, specify a common profile value and common password value for the various Exchange Servers on each cluster.
To verify that the device paths are properly configured, use the BEX detect utility. Run detect from each physical cluster node. You must confirm that the same set of SAN devices are defined on each cluster node, and that the Device ID identifying each SAN device is the same for each node. To use the detect utility, go to the desired node and run the following from a command prompt: detect -q For example, if you had a cluster with two physical nodes that is part of a two tape drive SAN, run detect -q first on Node 1, then again on Node 2. The output might appear as follows: Detect Output for Node 1:
2.7
Chapter 2.
SCSI Devices found: -----------------Device Adapter File ID ------------ ------\\.\Tape0 2 \\.\Tape1 2 \\.\sync_sa0 2 \\.\Tape2 2
BUS --0 0 0 0
Target ID -----0 0 0 0
LUN --2 5 3 1
STATUS -----0 0 0 0
Device Type -----------------------Sequential Access Device Sequential Access Device Medium Changer Device Sequential Access Device
String --------------------SONY SDX-500C SONY SDX-500C BHTi 216 QUANTUM DLT8000 BEX Auto ---Yes Yes Yes Yes
Confirm that both SAN Devices (Sony SDX-500C) are on both nodes. Use the Serial Number field to assure they are the same. Then confirm that the Device ID for each of the two SAN Devices is identical on Node 1 and Node 2. The Device ID is in the Device File field. In this example, \\.\Tape0 is the Device ID for the drive whose serial number is 0000902585; and \\.\Tape1 is the Device ID for the drive whose serial number is 0000911832. This is true for both nodes, so you have a valid SAN setup for the cluster. ( \\.\Tape2 is a locally attached drive for Node 1. \\.\sync_sa0 is the robotic arm.) Note: Using a cluster node to control the robotic arm is not recommended. If detect shows that your SAN/cluster setup is not valid, reconfigure the paths between cluster nodes and SAN devices as needed.
2.8
When restoring, if the cluster resource is intact, restore data as you normally would. If the cluster is not intact, restore to a new location. The following considerations apply to Windows Cluster backup and restore: For Advanced Recovery for SnapVault backups and restores through virtual nodes, failover during the BEX job is not supported. When backing up Windows virtual nodes, the following two job options should be increased from a value of 1 (the default) to a value of 5: Down Node Retries (increase from 1 retry to 5 retries). Task Retry Intervals (increase from 1 minute to 5 minutes).
For more information about these job options, see Job Source Options for File Backup on page C.2 of the BEX Operations Guide.
2.9
Chapter 2. MyPassword --path c:\Program Files\BEX\bin\cmagent.exe --mode auto This command inserts CMAGENTservicehostname0 in the list of services on the node. Remember to repeat this step on every physical node in the cluster. For usage notes, execute bexsvc.exe --help. The SSICMAPI variable is in the registry under HKEY_LOCAL_MACHINE\SOFTWARE\Syncsort\BackupExpress\hostname\0. The following is an example of a registry entry: Name SSICMAPI Data -sbs 65535 -tnd -hn 71.100.200.10
4. Install an additional communication agent service on each physical node in the cluster. This becomes the communication agent for the virtual node. To install the service, create the registry entry: HKEY_LOCAL_MACHINE\SOFTWARE\Syncsort\BackupExpress\virtual_node_name \0 and run the following command from the tools folder of BEX on each physical node in the cluster: bexsvc.exe --ins --name CMAGENTservicevirtual_node_name0 --args -SSICMENV BackupExpress\virtual_node_name\0 --acc MyDomain\MyAdministrator --pass MyPassword --path c:\Program Files\BEX\bin\cmagent.exe --mode man This command inserts CMAGENTservicevirtual_node_name0 in the list of services on the node. Remember to repeat this step on every physical node in the cluster. For usage notes, execute bexsvc.exe --help. The following guidelines apply for installation of the communication agent for the virtual node: The naming convention for this additional communication agent service is CMAGENTservicevirtual_node_name0. For the environmental variable, the convention is SSICMAPI. CMAGENTservicevirtual_node_name0 and SSICMAPI must be replicated exactly on every physical node in the cluster.
5. Assign a new, unused IP address to the virtual node. This must be an available public network address that will be bound to the public network NIC. To do this, in the Windows registry of each physical node, append the hostname flag -hn virtual_IP_address to the SSICMAPI variable that you associated with CMAGENTservicevirtual_node_name0. This variable is in the registry under HKEY_LOCAL_MACHINE\SOFTWARE\Syncsort\BackupExpress\virtual_node_name \0. The following is a registry entry example for this step: Name SSICMAPI Data -sbs 65535 -tnd -hn 71.100.200.11
2.10
The data value for SSICMAPI should be identical except for the IP address. 6. Set up BEX as part of a Microsoft managed (Windows) cluster by using the Microsoft Cluster Administrator. In this step, you organize BEX as a separate group called BEX, and you add BEX IP Address, BEX Network Name, and BEX Cmagent resources to that group. You can do this from the Cluster Management console or from the command line on any of the physical cluster nodes. Each of these options is described below. Option 1. Cluster Management Console From the Cluster Management Console, do the following: a. Organize the virtual nodes in the cluster as a separate group called BEX. Make sure this group is owned by all physical nodes. b. Add the BEX IP Address to the group BEX as an IP Address resource type. Make sure you use the same IP Address that you specified for SSICMAPI. c. Add the BEX Network Name to the group BEX as a Network Name resource type. The BEX Network Name resolves the IP address you have given to the virtual node. d. Add the BEX Cmagent for the virtual nodes to the group BEX as a Generic Service resource type. Use the service name CMAGENTservicevirtual_node_name0. Note: In the steps above, you must not change names that are in bold typeface. Bring the BEX group online. Option 2. Command Line From the command line of any physical cluster node, enter a series of cluster commands. Follow the example below. The example makes the following assumptions: NodeX and NodeY are the names of the physical nodes in the cluster. BexClus is the name of the virtual node. 71.100.100.113 is the IP address of the virtual node.
2.11
Chapter 2.
2.12
NetWare
SYS:
Node X
71.10.10.11
VOL1: P1
Shared Connection
VOL2: VOL3: P2
NetWare
SYS:
Node Y
71.10.10.12
3.1
Chapter 3.
The following illustration shows a logical representation for the NetWare 6.x cluster represented in the section above:
NetWare
SYS:
Node X
71.10.10.11
P1 VOL1:
VOL2:
Node V1
71.10.10.21
VOL3: P2
NetWare
SYS:
Node Y1
71.10.10.12
The BEX Node Group contains two physical nodes (Node X and Node Y) and one virtual nodes (Node V1). The virtual node contains the shared resources (P1 and P2). Logically then, the cluster group simply contains three nodes: Node X, Node Y, and Node V1. Each of the three nodes contains one or more storage pools or disks. All shared resources are viewed by BEX as local resources of the virtual node. With this structure, BEX ensures that backups of the shared resources are performed through the virtual node and backups of local resources are performed through the physical nodes.
3.2
If a physical cluster node fails over to another node in the cluster during backup of a shared resource, BEX continues to execute the backup by retrying the task through the failover node.
3.3
Chapter 3. To perform the installation, run the NetWare Installation Services (NIS) program from your BEX CD-ROM as follows: 1. On the server console, make sure that CDROM.NLM is loaded. If not, load it from the prompt. 2. Insert the BEX CD-ROM. Switch to the X GUI screen and click on the Novell button on the taskbar. Select Install. A screen displaying all the installed products on the server appears. 3. Click on Add. A screen appears asking where you want to install the software (default is SYS:BACKEX). Accept the default, type in a different path, or click on the browse button to navigate down the directory tree to select a different location. 4. Accept the license agreement and continue through other screens. A progress bar appears indicating the progress of files being copied to your volume. 5. Read the README file. When installation is completed on all physical cluster nodes, bring the shared resource offline, then online. During installation, the following tasks are accomplished. You do NOT need to manually execute these three tasks. 1. The host address of the each physical node is registered. The environmental variable SSICMAPI is appended with the hostname flag -hn local_IP_address. 2. In AUTOEXEC.NCF, a BEX specific module, BEXNW.NCF, is loaded. BEXNW.NCF includes load statements for the modules iflibd.nlm, bexbeat.nlm and cmagent.nlm. This sets up the communication agent. Also, the module SHUTBEX.NCF is created. Usage of SHUTBEX.NCF is described later in this chapter. 3. The IP address of the cluster master IP resource is assigned to the virtual node. The virtual node is mapped to each physical node in the cluster. 4. The cluster is configured for BEX. Each physical node and a single virtual node are added to a BEX node group.
3.4
The Input logic node name for physical_node_name dialog box appears. 4. Enter a logical name for the node or leave the logical name the same as the physical. 5. Click OK. The Input Authentication Information dialog box appears. 6. Enter the name and password for the TSA. 7. Click TEST. The test confirmation box appears. 8. Click OK. BEX scans the node. After scanning, the Unconfigured Cluster Nodes dialog box appears. 9. Select all of the unconfigured nodes. 10. Select desired options. 11. Click OK. The Input Authentication Information dialog box appears. 12. Enter the name and password for the TSA. 13. Click TEST. The test confirmation box appears. 14. Click OK. 15. Repeat steps 9 through 14 until all physical nodes are installed. All of the nodes are added to the node group and are displayed as illustrated below.
3.5
Chapter 3.
Post-Setup Procedures
Run the BEX utility VerifyNetWareSMDRs to verify your BEX NetWare node configuration. For information about this utility, see NetWare Node Configuration Verification on page 2.21 in the BEX Configuration Guide.
When restoring, if the cluster is intact, restore data as you normally would. If the cluster is not intact, restore to a new location.
3.6
Each of three physical computers (Node X, Node Y, and Node Z) contains a local disk. Node X is an OES NetWare node, Node Y is an OES Linux node with NSS file system, Node Z is an OES Linux node with a traditional Linux file system. In addition, the three computers, or client machines, share two storage resources (VOL1 and VOL2) via a single shared connection. (A shared resource can be a storage pool or storage volume.) Though not shown in the illustration, each of the three client machines is instantly able to sense if another has failed or is down.
4.1
Chapter 4.
The following illustration shows a logical representation for the mixed OES cluster represented in the example above:
The BEX Node Group contains three physical nodes (Node X, Node Y, and Node Z) and one virtual nodes (Node V1). The virtual node contains the shared resources (VOL1 and VOL2). Logically then, the cluster group simply contains four nodes: Node X, Node Y, Node Z, and Node V1. Each of the four nodes contains one or more storage pools or disks.
4.2
All shared resources are viewed by BEX as local resources of the virtual node. With this structure, BEX ensures that backups of the shared resources are performed through the virtual node and backups of local resources are performed through the physical nodes. This concept is illustrated by the following extract from a BEX Backup File window.
In this depiction: OES-CLUSTER is the node group cluster is the virtual cluster node V1: is a shared resource oes-lx-c1, oes-lx-c2, and OES-NWA are physical nodes.
If a physical cluster node fails during backup of a shared resource, BEX continues to execute the backup by retrying the task through the failover node.
4.3
Chapter 4.
BEX Installation
On each physical node in the cluster, install BEX client software in the default location. BEX client software must not be installed on a shared disk. To perform installation: Use the BEX Installation CD-ROM. Follow the instructions in Chapter 2. Local Installation in the BEX Installation Guide.
During installation, the IP address of the Cluster Master IP Address resource is assigned to the virtual node. The virtual node is mapped to each physical node in the cluster. At the conclusion of installation, each physical node and the single virtual node must be added to a BEX node group. See Configuration of BEX for OES Clusters on page 4.4.
4.4
Youll need to enter a logical name and an IP address for the virtual node. For the IP address, use the Cluster Master IP Address which was created automatically during Cluster Services installation. You can identify the Cluster Master IP Address by using Novell Clustering Services (NCS). Note: The clusters virtual node must be added before the physical nodes. 4. On the Add Node dialog, click ADD. The Input Authentication Information dialog box appears. 5. Enter the user name and password required to log in to the Novell eDirectory tree. For OES Linux nodes, the root password is also requested. 6. Click OK. BEX scans the node. After scanning, the Unconfigured Cluster Nodes dialog box appears, listing all unconfigured cluster nodes. 7. Select all unconfigured cluster nodes by using CTRL-click to select multiple nodes or SHIFT-click to select a range of nodes. 8. Select desired options. 9. Click OK. For each node, the Input Authentication Information dialog box appears. a. Enter the user name and password required to log in to the OES node. For OES Linux nodes, the root password is also requested. b. Click TEST. A test confirmation box appears. c. Click OK. All of the nodes are added to the node group and are displayed as illustrated below.
4.5
Chapter 4.
Post-Setup Procedures
Run the BEX utility VerifyNetWareSMDRs to verify your BEX OES node configuration. For information about this utility, see NetWare Node Configuration Verification on page 2.21 in the BEX Configuration Guide.
4.6
4.7
Chapter 4.
4.8