Professional Documents
Culture Documents
Version#1.0 – Draft
24 Oct 2011
HP RESTRICTED
HP Enterprise Services
Contents
1 Guide Document Control ........................................................................ 1
1.1 Document Approvers .......................................................................................... 1
1.2 Amendment Record ............................................................................................ 1
1.3 Related Documentation ....................................................................................... 1
2 Introduction .......................................................................................... 3
2.1 Purpose ............................................................................................................ 3
2.2 Audience ........................................................................................................... 3
2.3 Terminology and Acronyms ................................................................................. 3
4 Prerequisites ......................................................................................... 7
4.1 Infrastructure Dependencies for Solution ............................................................... 7
4.1.1 Physical Dependencies .................................................................................. 7
4.1.2 Functional Dependencies ............................................................................... 7
4.1.3 Software Dependencies ................................................................................. 8
4.1.4 Process Dependencies ................................................................................... 9
5 Security ............................................................................................... 11
5.1 Security Roles .................................................................................................. 11
5.2 Security Implementation ................................................................................... 11
5.2.1 Legal and Regulatory Compliance ................................................................. 11
5.2.2 Vulnerability Scan ....................................................................................... 11
6 Preparation .......................................................................................... 12
6.1 Preparation Roles ............................................................................................. 12
6.1.1 Role Definitions .......................................................................................... 12
6.1.2 Role Ownership .......................................................................................... 12
6.2 Preparation Tasks ............................................................................................. 13
6.2.1 Server Deployment Prepare Tasks ................................................................ 13
6.2.2 Storage Deployment Prepare Tasks .............................................................. 13
6.2.3 Network Deployment Prepare Tasks .............................................................. 13
6.2.4 Software Deployment Preparation Tasks ........................................................ 14
9 Implementation ................................................................................... 17
9.1 Veritas Cluster Server Implementation ................................................................ 17
9.1.1 Overview ................................................................................................... 17
9.1.2 Implementation Roles ................................................................................. 17
9.1.3 Implementation Process Diagram ................................................................. 17
9.1.4 Implementation Activities ............................................................................ 18
9.1.5 Transformation Services .............................................................................. 68
9.1.6 Event Monitoring Activation ......................................................................... 68
9.1.7 Reporting Activation ................................................................................... 69
9.1.8 Cost Recovery Activation ............................................................................. 69
9.1.9 Pre-Acceptance Testing ............................................................................... 69
9.1.10 Customer Acceptance Testing ................................................................... 70
9.1.11 Operations Turnover ................................................................................ 70
9.1.12 Backing Off ............................................................................................ 70
9.1.13 De-implementation.................................................................................. 70
9.1.14 Completion ............................................................................................. 70
11 Contacts .............................................................................................. 72
Figures
Figure 1 - VCS cluster components .................................................................................. 6
Figure 2 - Implementation Process Diagram.................................................................... 18
2 Introduction
This section describes the purpose and audience of, and the terminology relating to, this
document.
2.1 Purpose
This guide provides detailed information regarding how to configure and implement the
services and Capability functions defined within the Technical Reference Guide. In most cases,
following the guidelines in this document would result in the creation of client instance-specific
configuration information and procedures typically used by Production Change Management
and operations personnel to make additions and changes to the production environment for an
instance of the service.
This document is specifically focused on deploying Veritas Cluster Server (VCS) 5.1 SP1 and
Veritas Storage Foundation (VSF) on Red Hat 5.6 Enterprise Server Linux.
The implementation assumes that infrastructure is already in place. The scope of this
document is to cover all installation and configuration aspects of VCS and VSF running on
Utility Services platform and Tier 4 setup.
This deployment guide is part of a group of related documents for the Veritas Cluster Service
implementation offering. It identifies, from a business / management perspective, everything
that must be done before, during, and after solution deployment to ensure success.
2.2 Audience
The primary audiences for this Capability Guide are Applied Engineering and Operations, who
will use the guide as a deployment in conjunction with the Technical Reference Guide and
Operation Guide.
Secondary audiences for this guide are Sales, Solution Development including Solution and
Portfolio Architects, and Production Change Management organizations, or those who need to
understand the technical aspects of the Capability.
The VCS and OS skill sets are listed below and it is expected the lead OS administrator is at
least an Intermediate OS administrator, and has prior experience with Symantec VERITAS
Cluster Server (VCS), Storage Foundation and storage configuration.
Term/Acronym Definition
Capability A capability is a defined set of competencies (a combination of
skills, processes, tools, technologies, and experiences)
required to deliver projects and services, specifically to
produce a defined set of delivery outputs.
A capability enables the delivery of one or more offerings and
is managed strategically at a global level.
From an organizational perspective, the term capability is an
Enterprise Services organizational entity responsible for
managing a related set of capabilities and the service offerings
most closely related to those capabilities.
Term/Acronym Definition
I/O Fencing I/O fencing protects the data on shared disks when nodes in a cluster
detect a change in the cluster membership that indicates a split-brain
condition.
DC Data Center
CP Server Coordinator Point Server
3 Capability Overview
This section describes the solution(s); what the solution accomplishes the major solution
components, how the solution relates to or complements other solutions and how the
elements are affected by this implementation.
Failover clusters are used in the service offerings (tier 3 and tier 4) to provide enhanced
application up-time and failure tolerance. The details of implementation will vary by offering.
4 Prerequisites
This section includes all prerequisite actions, software/firmware levels, and dependencies
required before the implementation of this solution.
The solution is based on the HP Standard Reference Architecture (SRA). Key SRA components
are:
• Central HP managed Openview monitoring stations
• Central HP managed Workflow system
• Enterprise System List (ESL)
• Radio for inventory collection and software distribution
• Enterprise Root Model (ERM) to manage HP owned administrative accounts
• OMC infrastructure to connect in a secure manner to the customer servers. This includes
management of Active Cards / Active keys.
• VPN connectivity from home office to the HP network for weekend work and standby.
4.1.3.1 Tools
Tools used in Utility Service solution are described in Utility Standard Reference Architecture
Tools section of the Utility Services Foundational Technical Architecture –Technical Reference
Guide. The URL to locate is available at Related Documentation section.
4.1.3.2 License
OS License can be provided by HP or by the Customer as defined in contract. There are also
VCS and SF licenses required for each cluster in defined environment.
• Red Hat Enterprise Linux 5 (RHEL 5) with Update 3 (2.6.18-128.el5 kernel) or later on
AMD Opteron or Intel Xeon EM64T (x86_64)
• SUSE Linux Enterprise Server 10 (SLES 10) with SP2 (2.6.16.60-0.21 kernel) on AMD
Opteron or Intel Xeon EM64T (x86_64)
• SUSE Linux Enterprise Server 11 (SLES 11) (2.6.27.19-5 kernel) on AMD Opteron or Intel
Xeon EM64T (x86_64)
• Oracle Enterprise Linux (OEL 5) with Update 3 (2.6.18-128.el5 kernel) or later on AMD
Opteron or Intel Xeon EM64T (x86_64)
Lists the RPMs that VCS requires for a given Linux operating system
Hardware
– VCS need at least two dedicated NICs for heartbeat in additional to one NIC for
public; you can also configure aggregated interfaces.
– VCS need disks/SAN support SCSI-3 persistent reservation if you plan to use VCS
I/O fencing feature
• You must have three coordinator disks
• Each of the coordinator disks must use a physically separate disk or LUN
• The coordinator disks must exist in a disk group
5 Security
This section describes the overall security strategy for this solution. Security for the Utility
Services Foundational Technical Architecture is detailed in the Utility Service Security Plan.
This network vulnerability scan is done external to the server and requires no software or
agent to be installed on the end server. Work with the Information Security team to request
an initial network vulnerability scan of the servers once built but prior to deployment. The first
pre-install scan is free. Any additional scans will be charged. To request a pre-install scan, go
to the network assessment team page select the Pre-Installation Scan Request Form.
Choose Scan Request Form in the left navigation. Review/address the scan findings and
update the Implementation Plan Builder (IPB) which can be accessed from the same URL.
Update for system admin responsible findings.
For the detailed pre-install scans processes, go to the Pre-install Scan Process page.
The request for pre-install scans must be received five (5) business days before it is needed,
to avoid charges.
6 Preparation
6.1 Preparation Roles
This section identifies the roles that will be needed to perform the preparation for the
implementation of this solution. Refer to the Roles and Responsibilities section of the Utility
Services Foundational Technical Architecture - Technical Reference Guide for definitions. The
URL is available at Related Documentation section.
• Utility Services Hardware - Software Bill of Materials - The URL is available at Related
Documentation section.
• Procurve/Cisco Productions Manual
• ProCurve Support Page
• Cisco Support Page
7 Implementation Considerations
7.1 Sizing Considerations
This section describes the sizing issues that must be addressed in order to ensure a successful
implementation.
Sizing for the cross-site network to support tier4 is discussed in Tier 4 Data Center Network
Interlink Sizing Guidance. The URL to locate Tier 4 Data Center Network Interlink Sizing
Guidance document is available at Related Documentation section.
For more information on Management server capacity requirement, refer Management Servers
section in Utility Services Foundational Technical Architecture –Technical Reference Guide. The
URL is available at Related Documentation section.
Refer to the Utility Services Foundational Technical Architecture –Technical Reference Guide
for the list of processes for this Capability. The URL is available at Related Documentation
section.
I/O fencing should be used for each offering as a standard to protect data integrity. In case
that customer will not use it the risk acceptance document should be signed for this. Commented [PM1]: Link to document which should
cover this
8 Configuration Standards
This section consolidates all configuration standards. These are then referenced, as
appropriate, in the Technical Reference Guide.
The cluster software used is Veritas Cluster Service and Storage Foundation 5.1 SP1.
This Tier4 solution uses ISS Medium equipment for the cluster nodes and ISS virtual
equipment in the CP Server.
9 Implementation
9.1 Veritas Cluster Server Implementation
9.1.1 Overview
This section describes the roles, processes, tools, hardware and software used to deliver the
services defined by this feature/attribute.
In /etc/multipath.conf set the exclude rules using wwid option in sections blacklist{} and
blacklist_exceptions{}
Remove all entries but BootLUN from /etc/multipath.bindings (if more than BootLUN is
allocated from SAN).
Refresh the initrd image to ensure the fixed multipath options are used during system boot.
Select 2) Enable keyless licensing and complete system licensing later (keyless mode
has been used during PoC)
The valid license key should be entered in production environment either from HP or from
customer, depending on the contract.
To verify compare output from multipath and VxVM, disk WWN and device files must be the
same.
The SAN boot disk should be renamed to BootLUN to keep the consistency, and along with
local SmartArray device should be excluded from VxVM.
# vi /etc/man.config
MANPATH /opt/VRTS/man
# vi /etc/profile
PATH=$PATH:/opt/VRTS/bin
For disks, plexes, service groups and other cluster naming follow VCS naming standards
SymantecStorageFoundationHA_NamingStandars
Note: DMP nodes must have the same name on both cluster nodes
For further setup and configuration of cluster system group and resources refer to Utility
Services R3.2 VCS Operations Guide.
Insert the generated key in authorized keys file cat id_rsa.pub >> authorized_keys
Select 2) Enable keyless licensing and complete system licensing later (keyless mode
has been used during PoC)
The valid license key should be entered in production environment either from HP or from
customer, depending on the contract.
Insert NIC, IP address and UDP port for cluster heartbeat links and low latency link
Select y for continue with heartbeat configuration and confirm the cluster verification by y
Enter the NIC for virtual IP, Virtual IP and NetMask for that IP
For adding VCS users select n to leave the default user=admin and password=password and n
to skip additional user creation
Choose 2) Veritas Cluster Server (VCS) and confirm End user license agreement by
selecting y
Select 3) Install all Veritas Cluster Server rpms, enter the node name wycvlcp001
Select 2) Enable keyless licensing and complete system licensing later (keyless mode
has been used during PoC)
Select n for Global Cluster Option and y for configure VCS cluster on wycvlcp001
Insert NIC, IP address and UDP port for cluster heartbeat link and low latency link
Enter name of CP Server cp001 , virtual IP on which CP server process should depend
15.141.111.248, default port 14250, secure communication between CP server and
application clusters select n and Enter for default path of database /etc/VRTScps/db
Choose eth0 as network interface for virtual IP 15.141.111.248, select y to add NetworkHosts
and 255.255.252.0 as netmask for virtual IP.
The ssh-keys from every node have to be added to the CP server (cp001.centrica.hpecs.net)
prior to start this configuration.
# /opt/VRTS/install/installvcs -fencing
Enter 3 for number of CP including CP servers and disks, 2 for number of disks
Enter FQDN of CP server cp001.centrica.hpecs.net, dmp as fencing mechanism for the disk
and enter both disks (W02_lck_01 and D02_lck_01) from the list and Enter continute
Enter disk group name for coordinating disk vxfencoorddg and confirm with y all above
settings
Check cluster with hastatus -summary, hagrp -resources vxfen, hares –state
coordpoint, vxfenadm -d
haconf -makerw
hares -add AppDG DiskGroup AppSG
hares -modify AppDG Enabled 1
hares -modify AppDG DiskGroup AppDG
hares -modify AppDG StartVolumes 1
haconf -dump -makero
For further setup and configuration of cluster system group and resources refer to Utility
Services R3.2 VCS Operations Guide.
For monitoring of the VxVM use VOLMON module of UXMON. And for cluster monitoring there
is specific module in UXMON called VCMON. It’s used to monitor resource group status and
switching in a Veritas Cluster system. The main functionalities are to monitor:
For details refer to UXMON 02.01.03 User Guide for OMU8 on the link
http://enhanced1.sharepoint.hp.com/teams/GDCC-
OM/Solution%20Repository/UXMON/UXMON_0201/Release%20Document%20Library/UXMON-
02.01.03_OMU8_User_Guide.pdf
Turning monitoring to production is part of release to production acceptance activities, More
detail info refer
http://teams2.sharepoint.hp.com/teams/OBRTPA/RTPA%20Documentation/Forms/AllItems.as
px?View=%7b62F37A60%2d8DEE%2d4FBF%2d88AF%2dE54BC657AECC%7d
Once server is in production, OVPA and OVSC should send information to CRDW, which is used
by reporting tool, Utility Service production reports can get from below sites:
https://hook.grenoble.hp.com/
https://os-customer-
reporting.emea.hp.com/businessobjects/enterprise115/desktoplaunch/InfoView/main/main.do
?objId=0
http://custom-reports.tools.emea.hp.com/
If the server is not in report, deliver lead should open a ticket with reporting tool support
team.
For Applications, this section should reference Applications Delivery standards on time capture,
internal billing, and so on. Details are required if this Capability requires any special
considerations that are not part of the Applications Delivery standards. Consult the Capability
Manager with any questions or to clarify existing standards.
Once servers are in production in ESL, Utility service starts the cross charge
The Release to production check is part of the BTR process - RTPA checks. The BTR process
can be found at http://irockweb.gre.hp.com/btr/.
This section describes the elements involved in Client acceptance testing for this solution.
To start operation, RTPA has to be followed and training have to be provided to Level 1, 2 and
3 teams, detail of RTPA process refer http://intranet.hp.com/eds/ww/wg/ito-do/Pages/IO-
RTPAPROCESS.aspx
Backing off is in implementation phase. Utility Service customer can use the same process for
requesting new servers to request Backing off, the percent of backing off depend on the
contact.
9.1.13 De-implementation
Certain factors may materialize that would call for the de-implementation of this solution.
Factors such as Client disengagement, end-of-life for offering, or upgrading to something else.
The DOS and SOW should be referenced to check for any special requirements the Client may
have when returning data to them, including details on the format of the returned data, and
particular requirements regarding the end of the service.
For Server with Windows, Linux or VMware OS installed, the de-implementation process
includes two parts: physical server decommission and virtual machine decommission, detail
info refer Utility Service server decommission process, The URL is available at Related
Documentation section.
9.1.14 Completion
This section describes any tasks that are required after successful implementation of this
solution. This section includes the following:
11 Contacts
This section identifies document contacts for technical changes, business issues, and so forth.