Contents
vii
Verifying the Hardware and Software Installation
................................................
5-55
Cluster Communications
................................................................................
5-55
Access to Shared Storage from All Nodes
......................................................
5-55
OSDs
..............................................................................................................
5-55
Other Verification Tasks
................................................................................
5-56
Power Distribution and Power Sequencing Guidelines
.........................................
5-56
Overview
........................................................................................................
5-56
Server Power Distribution
..............................................................................
5-57
Storage Subsystem Power Distribution
..........................................................
5-57
Power Sequencing
..........................................................................................
5-58
Chapter 6
Cluster Management
Cluster Management Concepts
................................................................................
6-2
Powering Off a Node Without Interrupting Cluster Services
...........................
6-2
Managing a Cluster in a Degraded Condition
...................................................
6-2
Managing Network Clients Connected to a Cluster
.........................................
6-3
Cluster Events
...................................................................................................
6-3
Management Applications
.......................................................................................
6-4
Monitoring Server and Network Hardware
......................................................
6-4
Monitoring Storage Subsystem Hardware
........................................................
6-5
Managing Shared Storage
.................................................................................
6-5
Monitoring the Database
..................................................................................
6-7
Remotely Managing a Cluster
..........................................................................
6-7
Software Maintenance
.............................................................................................
6-8
Deinstalling the OSDs
......................................................................................
6-8
Upgrading Oracle8
i
Server
.............................................................................
6-11
Upgrading the OSDs
.......................................................................................
6-11
Deinstalling a Partial OSD Installation
...........................................................
6-13
Managing Changes to Shared Storage Components
..............................................
6-14
Adding New Storagesets to Increase Shared Storage Capacity
......................
6-14
Replacing a Failed Drive in a Storage Subsystem
..........................................
6-15
Replacing a Host Adapter
...............................................................................
6-16
Adding a Shared Storage Subsystem
..............................................................
6-19
Replacing a Cluster Node
......................................................................................
6-19
Removing the Node
........................................................................................
6-20
Adding the Replacement Node
.......................................................................
6-20
Adding a Cluster Node
..........................................................................................
6-24
Preparing the New Node
.................................................................................
6-25
Preparing the Existing Cluster Nodes
.............................................................
6-27
Installing the Cluster Software
.......................................................................
6-27
Monitoring Cluster Performance
...........................................................................
6-29
Tools Overview
..............................................................................................
6-29
Using Secure Path Manager
............................................................................
6-30
Uninstalling Secure Path
................................................................................
6-33