Managing a TruCluster Server cluster is similar to managing a standalone Tru64 UNIX system. Of the more than 600 commands and utilities for system administration, fewer than 20 apply exclusively to clusters. You use most of those commands when creating a cluster, adding a new member to a cluster, or making an application highly available. If you know how to manage a Tru64 UNIX system, you already know most of what is needed to manage a TruCluster Server cluster.
This manual describes the relatively few situations where managing a cluster is different. For documentation about the other management procedures, see the Tru64 UNIX System Administration guide.
Before reading further, familiarize yourself with the material in the TruCluster Server Cluster Technical Overview. An understanding of the information in that manual is necessary to managing a cluster.
The chapter discusses the following topics:
Commands and utilities for clusters (Section 1.1)
Commands and features that are different in a cluster (Section 1.2)
In most cases, the fact that you are administering a cluster rather than a single system becomes apparent because of the occasional need to manage one of the following aspects of the TruCluster Server:
Cluster creation and configuration, which includes creating the initial cluster member, adding and deleting members, and querying the cluster configuration.
Cluster application availability (CAA), which you use to define and manage highly available applications.
Cluster aliases, which provide a single-system view of the cluster to clients network.
Cluster quorum and votes, which determine what constitutes a valid cluster and membership in that cluster, and thereby allows access to cluster resources.
Device request dispatcher, which provides transparent, highly available access to all devices in the cluster.
Cluster File System (CFS), which provides
clusterwide coherent access to all file systems, including
the root (/
) file system.
Memory Channel, which provides the private, clusterwide communications path interconnect between cluster members.
In addition to the previous items, there are
some command-level exceptions when a cluster does
not appear to the user like a single computer system.
For example, when you execute the
wall
command, the message is sent only to users who are
logged in on the cluster member where the command
executes.
To send a message to all users who are logged
in on all cluster members, use the
wall -c
command.
1.1 Commands and Utilities for Clusters
Table 1-1
lists
commands that are specific to managing TruCluster Server
systems.
These commands manipulate or query aspects
of a cluster.
You can find descriptions for these
commands in the reference pages.
Table 1-1: Cluster Commands
Function | Command | Description |
Create and configure cluster members |
clu_create (8) |
Creates an initial cluster member on a Tru64 UNIX system. |
clu_add_member (8) |
Adds a member to a cluster. | |
clu_delete_member (8) |
Deletes a member from a cluster. | |
clu_check_config (8) |
Verifies that the TruCluster Server has been properly installed, and that the cluster is correctly configured. | |
clu_get_info (8) |
Displays information about a cluster and its members. | |
Define and manage highly available applications |
caad (8) |
Starts the CAA daemon. |
caa_profile (8) |
Manages an application availability profile and performs basic syntax verification. | |
caa_register (8) |
Registers an application with CAA. | |
caa_relocate (8) |
Manually relocates a highly available application from one cluster member to another. | |
caa_start (8) |
Starts a highly available application registered with the CAA daemon. | |
caa_stat (1) |
Provides status on applications registered with CAA. | |
caa_stop (8) |
Stops a highly available application. | |
caa_unregister (8) |
Unregisters a highly available application. | |
Manage cluster alias |
cluamgr (8) |
Creates and manages cluster aliases. |
Manage quorum and votes |
clu_quorum (8) |
Configures or deletes a quorum disk, or adjusts quorum disk votes, member votes, or expected votes. |
Manage context-dependent symbolc links (CDSLs) |
mkcdsl (8) |
Makes or checks CDSLs. |
Manage device request dispatcher |
drdmgr (8) |
Gets or sets distributed device attributes. |
Manage Cluster File System (CFS) |
cfsmgr (8) |
Manages a mounted file system in a cluster. |
Query the status of Memory Channel |
imcs (1) |
Reports the status
of the Memory Channel application programming interface
(API) library,
libimc . |
imc_init (1) |
Initializes and configures
the Memory Channel API library,
libimc ,
on the current host. |
1.2 Commands and Features That Are Different in a Cluster
The following tables list Tru64 UNIX commands and subsystems that have cluster-specific options, or that behave differently in a cluster than on a standalone Tru64 UNIX system.
In general, commands that manage processes are not cluster-aware and can be used only to manage the member on which they are executed.
Table 1-2 describes the differences in commands and utilities that manage files systems and storage.
In a standalone Tru64 UNIX system, the root
file system (/
) is
root_domain#root
.
In a cluster, the root
file system is always
cluster_root#root
.
The boot partition for each cluster member
is
root
memberID_domain#root
.
For example, on the cluster member with member
ID 6, the boot partition,
/cluster/members/member6/boot_partition
, is
root6_domain#root
.
Table 1-2: File Systems and Storage Differences
Command | Differences |
addvol (8)
|
In a single
system, you cannot use
You can remove volumes from the
Logical Storage
Manager (LSM) volumes cannot be used within the
|
bttape (8) |
The
For more information about backing up and restoring files, see Section 9.8. |
df (1) |
The
|
iostat (1) |
The
Statistics pertain to traffic that is generated to and from the local member. |
LSM |
The
In a cluster,
the
The
The
The
For more information on LSM in a cluster, see Chapter 10. |
mount (8) |
Network File System (NFS) loopback mounts are not supported. For more information, see Section 7.6.2.3. Other commands
that run through
|
Prestoserve |
Prestoserve is not supported in a cluster. |
showfsets (8)
|
The
Fileset quotas and storage limitations are enforced by ensuring that clients do not cache so much dirty data that they exceed quotas or the actual amount of physical storage. |
UNIX File System (UFS) Memory File System (MFS) |
A UFS file system is served for read-only access based on connectivity. Upon member failure, CFS selects a new server for the file system. Upon path failure, CFS uses an alternate device request dispatcher path to the storage. A cluster member can mount a UFS file system read/write. The file system is accessible only by that member. There is no remote access; there is no failover. MFS file system mounts, whether read-only or read/write, are accessible only by the member that mounts it. The server for an MFS file system or a read/write UFS file system is the member that initializes the mount. |
verify (8) |
You can use
the
For more information, see Section 9.11.1. |
Table 1-3
describes the
differences in commands and utilities that manage
networking.
Table 1-3: Networking Differences
Command | Differences |
Berkeley Internet Name Domain (BIND)
|
The
BIND client configuration is clusterwide. All cluster members have the same client configuration. Only one member of a cluster can be a BIND server. A BIND server is configured as a highly available service under CAA. The cluster alias acts as the server name. For more information, see Section 7.4. |
Broadcast messages |
The
Broadcast messages to the default cluster alias from
In a cluster, a
|
Dynamic Host Configuration Protocol (DHCP) |
A cluster can
be a DHCP server, but cluster members cannot be DHCP
clients.
Do not run
For more information, see Section 7.1. |
dsfmgr (8) |
When using
the
The output from the
The
|
All members that are running mail must have the same mail configuration and, therefore, must have the same protocols enabled. All members must be either clients or servers. See Section 7.8 for details. The
|
|
Network File System (NFS) |
Use
Cluster members can run client versions of
For more information, see Section 7.6. |
Network management
|
If, as we recommended,
you configured networks during cluster configuration,
If you later run
|
Network Interface Failure Finder (NIFF) |
In order for NIFF
to monitor the network interfaces in the cluster,
niffd , the NIFF daemon, must run on each
cluster member.
For more information, see
Section 6.1.
|
Network Information Service (NIS) |
NIS runs as a highly available application. The default cluster alias name is used to identify the NIS master. For more information, see Section 7.2. |
Network Time Protocol (NTP) |
All cluster members require time synchronization. NTP meets this requirement. Each cluster member is automatically configured as an NTP peer of the other members. You do not need to do any special NTP configuration. For more information, see Section 7.5. |
routed (8) |
When you create the initial cluster member,
For more information about routers, see Section 6.2. |
Table 1-4
describes the
differences in printing management.
Table 1-4: Printing Differences
Command | Differences |
A cluster-specific
printer attribute,
The file
For more information, see Section 7.3. |
|
Advanced Printing Software | For information on installing and using Advanced Printing Software in a cluster, see the configuration notes chapter in the Tru64 UNIX Advanced Printing Software Release Notes. |
Table 1-5
describes the
differences in managing security.
For information
on enhanced security in a cluster, see the Tru64 UNIX
Security
manual.
Table 1-5: Security Differences
Command | Differences |
A cluster is a single security domain. To have root privileges on the cluster, you can log in as root on the cluster alias or on any one of the cluster members. Similarly, access control lists (ACLs) and user authorizations and privileges are clusterwide. With the exception of audit log files,
security related files, directories, and databases
are shared throughout the cluster.
Audit log files
are specific to each member -- an audit daemon,
To generate
an audit report for the entire cluster, you can pass
the name of the audit log CDSL to the audit reduction
tool,
If you want enhanced security, we strongly recommend that you configure enhanced security before cluster creation. A clusterwide shutdown and reboot are required to configure enhanced security after cluster creation. |
|
An
The same requirement holds
for
For more information, see Section 5.3. |
Table 1-6
describes the
differences in commands and utilities for configuring
and managing systems.
Table 1-6: General System Management Differences
Command | Differences |
Dataless Management Services (DMS) | DMS is not supported in a TruCluster Server environment. A cluster can be neither a DMS client nor a server. |
Events have
a
For a list of cluster events, see Appendix A. |
|
There is no
clusterwide
The
You can use
The
You can shut
down a cluster to a halt, but you cannot reboot ( To shut down a single cluster member, execute the
For more information, see
|
|
hwmgr (8)
|
In a cluster,
the
Use the
When
neither the
|
Process control |
A range of
possible process identifiers (PIDs) is assigned to each cluster member
to provide unique process IDs clusterwide.
The
|
kill (1)
|
If the passed parameter is greater than zero (0), the signal is sent to the process whose PID matches the passed parameter, no matter on which cluster member it is running. If the passed parameter is less than -1, the signal is sent to all processes (cluster-wide) whose process group ID matches the absolute value of the passed parameter. Even though the PID for
|
rcmgr (8)
|
The hierarchy
of the
For more information, see Section 5.1. |
sysman -clone |
Configuration cloning and replication is not supported in a cluster. Attempts to use the
|
System accounting services and the associated commands |
These commands are not cluster-aware. Executing one of these commands returns information for only the cluster member on which the command executes. It does not return information for the entire cluster. See Section 5.13. |
Table 1-7
describes features
that TruCluster Server does not support.
Table 1-7: Features Not Supported
Feature | Comments |
Archiving |
The
For more information about backing up and restoring files, see Section 9.8. |
LSM |
The
For more information on LSM in a cluster, see Chapter 10. |
mount (8) |
NFS loopback mounts are not supported. For more information, see Section 7.6.2.3. Other commands
that run through
|
Prestoserve |
Prestoserve is not supported in a cluster. |
routed (8) |
The
When you create the initial cluster member,
For more information about routers, see Section 6.2. |
Dataless Management Services (DMS) | DMS is not supported in a TruCluster Server environment. A cluster can be neither a DMS client nor a server. |
UNIX File System (UFS) | A cluster member can mount a UFS file system read/write. The file system is accessible only by that member. There is no remote access; there is no failover. |
sysman -clone |
Configuration cloning and replication is not supported in a cluster. Attempts to use the
|