4levels teams with the top technology providers to enhance your operations   |   Domains & Hosting   |  Get Support   | My 4levels
GET IN TOUCH
+27 (0)11 848 6229

Veritas

4levels-IT-Default-Header

Veritas Cluster Server 6.x for Unix: Advanced Administration


Course Description


Overview

This class covers how to set up advanced network and data protection configurations, customize VCS behavior using triggers and service group dependencies, and manage system outages. Students also learn how to control VCS behavior for service group startup and failover. In addition, students learn how to reconfigure cluster membership, upgrade a cluster, and configure campus clusters.
Hands-On This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment.
 

Audience

This course is for system administrators, architects, and technical support personnel who are responsible for implementing, managing, and supporting clusters in complex enterprise environments.  

Prerequisites

You must have administrator-level experience with UNIX or Linux, TCP/IP networking, and clustering using Veritas Cluster Server.  

Key topics

Reviewing an Existing VCS Environment
  • Understanding the VCS architecture
  • Building the cluster configuration
  • Configuring VCS
Configuring LLT
  • LLT over bonded interfaces
  • LLT over UDP
  • LLT over RDMA
  • LLT with different network interfaces
  • Manually configuring LLT
Using Multiple Public Network Interfaces
  • Configuring multiple service groups with network resources
  • MultiNICB and IPMultiNICB
  • MultiNICA and IPMultiNIC
Using Triggers to Customize VCS Behavior
  • Understanding triggers
  • Configuring triggers
  • Using multiple trigger scripts
  • Controlling applications with triggers
Managing Service Group Dependencies
  • Common application relationships
  • Service group dependencies
  • Service group dependency examples
  • Configuring service group dependencies
  • Limitations of service group dependencies
Using I/O Fencing for Application Data Integrity
  • Data protection requirements
  • I/O fencing concepts
  • I/O fencing operations
  • I/O fencing implementation
  • Fencing configuration
Using Coordination Point Server for Application Data Integrity
  • Coordination point concepts
  • Server-based fencing architecture
  • CPS operations
  • Installing and configuring a CP server
  • Configuring I/O fencing with CPS
  • Coordination point agent
Administering Fencing Configurations
  • Installing and configuring clustered CP servers
  • Administering CPS
  • Administering disk-based I/O fencing
  • Configuring preferred fencing
Reconfiguring Cluster Memberships
  • Removing a cluster node
  • Adding a cluster node
  • Merging clusters
Controlling Application Startup and Shutdown
  • Resource online and offline processes
  • Cluster startup
  • Startup rules and policies
  • Limits and Prerequisites
Controlling Application Failover
  • Failover rules and policies
  • Limits and Prerequisites
  • AdaptiveHA
Customizing Application Failover Behavior
  • VCS response to resource faults
  • Controlling failover with service group attributes
  • Controlling failover with resource type attributes
Managing System Outages
  • Differentiating between a system shutdown and an outage
  • Controlling cluster shutdown
  • Controlling applications during a system outage
Administering Campus Clusters
  • Disaster recovery solutions with SFHA
  • Preparing to set up a campus cluster configuration
  • Configuring Storage Foundation for campus clustering
  • Configuring a VCS service group for campus clusters
  • Testing site-awareness
  • Failure scenarios with campus clusters
  • Legacy campus clustering
Upgrading Storage Foundation High Availability
  • Planning to upgrade SFHA
  • Online upgrade
  • Full upgrade
  • Rolling upgrade
  • Phased upgrade
  • Finding and installing SFHA patches
 

Objectives

By the completion of this course, you will be able to:
  • Set up alternative configurations for the public and private networks.
  • Use triggers and service group dependencies to control service groups.
  • Implement different types of fencing configurations for data protection.
  • Reconfigure cluster memberships.
  • Customize service group startup, shutdown, and¬†failover.
  • Manage system outages.
  • Administer campus clusters.
  • Upgrade a cluster.

Course Duration

5 Days
  • Brands we have partnered with to add value to your business


    We are committed to helping our clients reach their business goals

    4levels’ preferred access to the latest technologies, premier technical support and advanced training helps provide you with specialist and customized solutions that help you achieve your business goals.

4levels Solutions sign up form


Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur excepteur sint occaecat cupidatat non

4levels Solutionslogin form