前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >VCS学习笔记

VCS学习笔记

作者头像
数据和云01
发布2018-09-05 10:24:49
8430
发布2018-09-05 10:24:49
举报
文章被收录于专栏:数据库新发现数据库新发现

1.What is a Cluster?--什么是Cluster?

VERITAS Cluster Server(VCS) connects, or clusters, multiple, independent systems into a management framework for increased availability. Each system, or node, runs its own operating system and cooperates at the software level to form a cluster. VCS links commodity hardware with intelligent software to provide application failover and control. When a node or a monitored application fails, other nodes can take predefined action to take over and bring up services elsewhere in the cluster.

2.Detecting Failure--失败检测 VCS can detect application failure and node failure among cluster members.

(1).Detecting Application Failure At the highest level, VCS is typically deployed to keep business-critical applications online and available to users. VCS provides a mechanism to detect failure of an application and any underlying resources or services supporting the application. VCS issues specific commands, tests, or scripts that monitor the overall health of an application. VCS also determines the health of underlying system resources supporting the application, such as file systems and network interfaces.

(2).Detecting Node Failure One of the most difficult tasks in clustering is correctly discriminating between loss of a system and loss of communication between systems. There are several technologies used for this purpose, including heartbeat networks between servers, quorum disks, and SCSI reservation. VCS uses a redundant network heartbeat along with SCSI III-based membership coordination and data protection for detecting failure on a node and on fencing.

3.Switchover and Failover

Failover and switchover are the processes of bringing up application services on a different node in a cluster. In both cases, an application and its network identity are brought up on a selected node. Client systems access a virtual IP address that moves with the service. Client systems are unaware of which server they are using.

A virtual IP address is an address brought up in addition to the base address of systems in the cluster. For example, in a 2-node cluster consisting of db-server1 and db-server2, a virtual address may be called db-server. Clients will then access db-server and be unaware of which physical server is actually hosting the db-server. Virtual IP addresses use a technology known as IP Aliasing.

(1)The Switchover Process A switchover is an orderly shutdown of an application and its supporting resources on one server and a controlled startup on another server. Typically this means unassigning the virtual IP, stopping the application, and deporting shared storage. On the other server, the process is reversed. Storage is imported, file systems are mounted, the application is started, and the virtual IP address is brought up.

(2)The Failover Process A failover is similar to a switchover, except the ordered shutdown of applications on the original node may not be possible. In this case services are simply started on another node. The process of starting the application on the node is identical in a failover or switchover. This means the application must be capable of restarting following a crash of its original host.

4.Cluster Control, Communications, and Membership (1)High-Availability Daemon (HAD) The high-availability daemon, or HAD, is the main VCS daemon running on each system. It is responsible for building the running cluster configuration from the configuration files, distributing the information when new nodes join the cluster, responding to operator input, and taking corrective action when something fails. It is typically known as the VCS engine. The engine uses agents to monitor and manage resources.

(2)Low Latency Transport (LLT) VCS uses private network communications between cluster nodes for cluster maintenance. The Low Latency Transport functions as a high-performance, low-latency replacement for the IP stack, and is used for all cluster communications. VERITAS requires two completely independent networks between all cluster nodes, which provide the required redundancy in the communication path and enable VCS to discriminate between a network failure and a system failure. LLT has two major functions.

(3)Group Membership Services/Atomic Broadcast (GAB) The Group Membership Services/Atomic Broadcast protocol (GAB) is responsible for cluster membership and cluster communications. ◆ Cluster Membership GAB maintains cluster membership by receiving input on the status of the heartbeat from each node via LLT. When a system no longer receives heartbeats from a peer, it marks the peer as DOWN and excludes the peer from the cluster. In most configurations, the I/O fencing module is used to prevent network partitions. ◆ Cluster Communications GAB’s second function is reliable cluster communications. GAB provides guaranteed delivery of point-to-point and broadcast messages to all nodes.

5.I/O Fencing Module The I/O fencing module implements a quorum-type functionality to ensure only one cluster survives a split of the private network. I/O fencing also provides the ability to perform SCSI-III persistent reservations on failover. The shared VERITAS Volume Manager disk groups offer complete protection against data corruption by nodes assumed to be excluded from cluster membership.

本文参与 腾讯云自媒体分享计划,分享自作者个人站点/博客。
原始发表:2004年09月02日,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 作者个人站点/博客 前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体分享计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
相关产品与服务
数据库
云数据库为企业提供了完善的关系型数据库、非关系型数据库、分析型数据库和数据库生态工具。您可以通过产品选择和组合搭建,轻松实现高可靠、高可用性、高性能等数据库需求。云数据库服务也可大幅减少您的运维工作量,更专注于业务发展,让企业一站式享受数据上云及分布式架构的技术红利!
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档