Managing a TruCluster Server cluster is similar to managing a standalone Tru64 UNIX system. Of the more than 600 commands and utilities for system administration, fewer than 20 apply exclusively to clusters. You use most of those commands when creating a cluster, adding a new member to a cluster, or making an application highly available. If you know how to manage a Tru64 UNIX system, you already know most of what is needed to manage a TruCluster Server cluster.
This manual describes the relatively few situations where managing a cluster is different. For documentation about the other management procedures, see the Tru64 UNIX System Administration manual.
Before reading further, familiarize yourself with the material in the TruCluster Server Cluster Technical Overview manual. An understanding of the information in that manual is necessary to managing a cluster.
The chapter discusses the following topics:
Commands and utilities for clusters (Section 1.1)
Commands and features that are different in a cluster (Section 1.2)
In most cases, the fact that you are administering a cluster rather than a single system becomes apparent because of the occasional need to manage one of the following aspects of the TruCluster Server:
Cluster creation and configuration, which includes creating the initial cluster member, adding and deleting members, and querying the cluster configuration.
Cluster application availability (CAA), which you use to define and manage highly available applications.
Cluster aliases, which provide a single-system view of the cluster to clients network.
Cluster quorum and votes, which determine what constitutes a valid cluster and membership in that cluster, and thereby allows access to cluster resources.
Device request dispatcher, which provides transparent, highly available access to all devices in the cluster.
Cluster file system (CFS), which provides
clusterwide coherent access to all file systems, including
the root (/) file system.
Cluster interconnect, which provides the private, clusterwide communications path interconnect between cluster members.
In addition to the previous items, there are
some command-level exceptions when a cluster does
not appear to the user like a single computer system.
For example, when you execute the
wall
command, the message is sent only to users who are
logged in on the cluster member where the command
executes.
To send a message to all users who are logged
in on all cluster members, use the
wall -c
command.
1.1 Commands and Utilities for Clusters
Table 1-1
lists
commands that are specific to managing TruCluster Server
systems.
These commands manipulate or query aspects
of a cluster.
You can find descriptions for these
commands in the reference pages.
Table 1-1: Cluster Commands
| Function | Command | Description |
| Create and configure cluster members |
clu_create(8) |
Creates an initial cluster member on a Tru64 UNIX system. |
clu_add_member(8) |
Adds a member to a cluster. | |
clu_delete_member(8) |
Deletes a member from a cluster. | |
clu_check_config(8) |
Verifies that the TruCluster Server has been properly installed, and that the cluster is correctly configured. | |
clu_get_info(8) |
Displays information about a cluster and its members. | |
| Define and manage highly available applications |
caad(8) |
Starts the CAA daemon. |
caa_profile(8) |
Manages an application availability profile and performs basic syntax verification. | |
caa_balance(8) |
Balances application resources across members. | |
caa_register(8) |
Registers an application with CAA. | |
caa_relocate(8) |
Manually relocates a highly available application from one cluster member to another. | |
caa_report(8) |
Reports availability statistics for application resources. | |
caa_start(8) |
Starts a highly available application registered with the CAA daemon. | |
caa_stat(1) |
Provides status on applications registered with CAA. | |
caa_stop(8) |
Stops a highly available application. | |
caa_unregister(8) |
Unregisters a highly available application. | |
| Manage cluster alias |
cluamgr(8) |
Creates and manages cluster aliases. |
clua_active(8) |
Determines whether a cluster alias is active and reachable. | |
| Manage quorum and votes |
clu_quorum(8) |
Configures or deletes a quorum disk, or adjusts quorum disk votes, member votes, or expected votes. |
| Manage context-dependent symbolc links (CDSLs) |
mkcdsl(8) |
Makes or checks CDSLs. |
| Manage device request dispatcher |
drdmgr(8) |
Gets or sets distributed device attributes. |
| Manage cluster file system (CFS) |
cfsmgr(8) |
Manages a mounted file system in a cluster. |
| Query the status of Memory Channel |
imcs(1) |
Reports the status
of the Memory Channel application programming interface
(API) library,
libimc. |
imc_init(1) |
Initializes and configures
the Memory Channel API library,
libimc,
on the current host. |
1.2 Commands and Features That Are Different in a Cluster
The following tables list Tru64 UNIX commands and subsystems that have cluster-specific options, or that behave differently in a cluster than on a standalone Tru64 UNIX system.
In general, commands that manage processes are not cluster-aware and can be used only to manage the member on which they are executed.
Table 1-2 describes the differences in commands and utilities that manage files systems and storage.
In a standalone Tru64 UNIX system, the root
file system (/) is
root_domain#root.
In a cluster, the root
file system is always
cluster_root#root.
The boot partition for each cluster member
is
rootmemberID_domain#root.
For example, on the cluster member with member
ID 6, the boot partition,
/cluster/members/member6/boot_partition, is
root6_domain#root.
Table 1-2: File Systems and Storage Differences
| Command | Differences |
addvol(8) |
In a single
system, you cannot use
You can remove volumes from the
Logical Storage
Manager (LSM) volumes cannot be used within the
|
bttape(8) |
The
For more information about backing up and restoring files, see Section 9.8. |
df(1) |
The
|
iostat(1) |
The
Statistics pertain to traffic that is generated to and from the local member. |
LSM |
The
In a cluster,
the
The
The
The
For more information on LSM in a cluster, see Chapter 10. |
mount(8) |
Network file system (NFS) loopback mounts are not supported. For more information, see Section 7.6.2.4. Other commands that run through
|
Prestoserve |
Prestoserve is not supported in a cluster. |
showfsets(8) |
The
Fileset quotas and storage limitations are enforced by ensuring that clients do not cache so much dirty data that they exceed quotas or the actual amount of physical storage. |
UNIX file system (UFS) Memory file system (MFS) |
A UFS file system is served for read-only access based on connectivity. Upon member failure, CFS selects a new server for the file system. Upon path failure, CFS uses an alternate device request dispatcher path to the storage. A cluster member can mount a UFS file system read/write. The file system is accessible only by that member. There is no remote access; there is no failover. MFS file system mounts, whether read-only or read/write, are accessible only by the member that mounts it. The server for an MFS file system or a read/write UFS file system is the member that initializes the mount. |
verify(8) |
You can use
the
For more information, see Section 9.11.1. |
Table 1-3
describes the
differences in commands and utilities that manage
networking.
Table 1-3: Networking Differences
| Command | Differences |
Berkeley Internet Name Domain (BIND)
|
The
BIND client configuration is clusterwide. All cluster members have the same client configuration. Only one member of a cluster can be a BIND server. A BIND server is configured as a highly available service under CAA. The cluster alias acts as the server name. For more information, see Section 7.4. |
Broadcast messages |
The
Broadcast messages to the
default cluster alias from
In a cluster, a
|
Dynamic Host Configuration Protocol (DHCP) |
A cluster can
be a DHCP server, but cluster members cannot be DHCP
clients.
Do not run
For more information, see Section 7.1. |
dsfmgr(8) |
When using
the
The output from the
The
|
All members that are running mail must have the same mail configuration and, therefore, must have the same protocols enabled. All members must be either clients or servers. See Section 7.8 for details. The
|
|
Network file system (NFS) |
Use
Cluster members can run client versions of
For more information, see Section 7.6. |
Network management
|
If, as we recommended,
you configured networks during cluster configuration,
Releases prior to TruCluster Server Version 5.1B required that you run
the
|
Network Interface Failure Finder (NIFF) |
In order for NIFF
to monitor the network interfaces in the cluster,
niffd, the NIFF daemon, must run on each
cluster member.
For more information, see
Section 6.2.
|
Network Information Service (NIS) |
NIS runs as a highly available application. The default cluster alias name is used to identify the NIS master. For more information, see Section 7.2. |
Network Time Protocol (NTP) |
All cluster members require time synchronization. NTP meets this requirement. Each cluster member is automatically configured as an NTP peer of the other members. You do not need to do any special NTP configuration. For more information, see Section 7.5. |
routed(8) |
Releases prior to TruCluster Server Version 5.1B required that you run
the
When you create the initial cluster member,
For more information about routers, see Section 6.3. |
Table 1-4
describes the
differences in printing management.
Table 1-4: Printing Differences
| Command | Differences |
A cluster-specific
printer attribute,
The file
For more information, see Section 7.3. |
|
| Advanced Printing Software | For information on installing and using Advanced Printing Software in a cluster, see the Tru64 UNIX Advanced Printing Software System Administration and Operation Guide. |
Table 1-5
describes the
differences in managing security.
For information
on enhanced security in a cluster, see the Tru64 UNIX
Security Administration
manual.
Table 1-5: Security Differences
| Command | Differences |
A cluster is a single security domain. To have root privileges on the cluster, you can log in as root on the cluster alias or on any one of the cluster members. Similarly, access control lists (ACLs) and user authorizations and privileges are clusterwide. With the
exception of audit log files, security related files,
directories, and databases are shared throughout the
cluster.
Audit log files are specific to each member
an audit daemon,
To generate an audit report for the entire
cluster, you can pass the name of the audit log CDSL
to the audit reduction tool,
If you want enhanced security, we strongly recommend that you configure enhanced security before cluster creation. A clusterwide shutdown and reboot are required to configure enhanced security after cluster creation. |
|
An
The same requirement holds for
For more information, see Section 5.3. |
Table 1-6
describes the
differences in commands and utilities for configuring
and managing systems.
Table 1-6: General System Management Differences
| Command | Differences |
| Dataless Management Services (DMS) | DMS is not supported in a TruCluster Server environment. A cluster can be neither a DMS client nor a server. |
Events have
a
For a list of cluster events, see Appendix A. |
|
There is no
clusterwide
The
You can use
The
You can shut
down a cluster to a halt, but you cannot reboot ( To shut down a single cluster member, execute the
For more information, see
|
|
hwmgr(8) |
In a cluster,
the
Use the
When
neither the
|
Process control |
A range of
possible process identifiers (PIDs) is assigned to
each cluster member to provide unique process IDs
clusterwide.
The
|
kill(1) |
If the passed parameter is greater than zero (0), the signal is sent to the process whose PID matches the passed parameter, no matter on which cluster member it is running. If the passed parameter is less than -1, the signal is sent to all processes (cluster-wide) whose process group ID matches the absolute value of the passed parameter. Even though the PID for
|
rcmgr(8) |
The hierarchy
of the
For more information, see Section 5.1. |
sysman -clone |
Configuration cloning and replication is not supported in a cluster. Attempts to use the
|
System accounting services and the associated commands |
These commands are not cluster-aware. Executing one of these commands returns information for only the cluster member on which the command executes. It does not return information for the entire cluster. See Section 5.15. |
Table 1-7
describes features
that TruCluster Server does not support.
Table 1-7: Features Not Supported
| Feature | Comments |
Archiving |
The
For more information about backing up and restoring files, see Section 9.8. |
LSM |
The
For more information on LSM in a cluster, see Chapter 10. |
mount(8) |
NFS loopback mounts are not supported. For more information, see Section 7.6.2.4. Other commands
that run through
|
Prestoserve |
Prestoserve is not supported in a cluster. |
routed(8) |
Releases prior to TruCluster Server Version 5.1B required that you run
the
When you create the initial
cluster member,
For more information about routers, see Section 6.3. |
| Dataless Management Services (DMS) | DMS is not supported in a TruCluster Server environment. A cluster can be neither a DMS client nor a server. |
| UNIX file system (UFS) | A cluster member can mount a UFS file system read/write. The file system is accessible only by that member. There is no remote access; there is no failover. |
sysman -clone |
Configuration cloning and replication is not supported in a cluster. Attempts to use the
|