The hardware configuration must be a basic two-node IRIX FailSafe configuration:
Two nodes
A set of shared disks
One public Network Interface Card on each node, connected to the LAN
One private Network Interface Card on each node, connected directly, using a crossover cable, to the Network Interface Card of the other node
One serial line connected directly to the other node’s system controller
The following is a sample configuration for a primary companion named MONEY1 and a secondary companion named PERSONNEL1. For information about this configuration, consult your SGI documentation.
Configuration |
Primary companion |
Secondary companion |
---|---|---|
Logicalname |
MONEY1 |
PERSONNEL1 |
Hostname |
MONEY1 |
PERSONNEL1 |
$DSQUERY |
MONEY1 |
PERSONNEL1 |
Node ID |
1 |
2 |
Logical volume |
xlv1 |
xlv2 |
Mount point |
/vol1 |
/vol2 |
Public IP address |
10.22.110.133 |
10.22.110.132 |
Private IP address |
130.214.121.79 |
130.214.121.114 |
Public network accepts |
Heartbeat and control |
Heartbeat and control |
Private network accepts |
Heartbeat and control |
Heartbeat and control |
Port type |
MSC |
MSC |
Port password |
“xxxxxx” |
“xxxxxx” |
Logical name of reset owner |
PERSONNEL1 |
MONEY1 |
TTY device |
/dev/ttyd2 |
/dev/ttyd2 |
set reset parameter |
Checked |
Checked |
You can configure IRIX FailSafe using either a GUI (with
the fstask utility) or the command line (using
the cluster_mgr utility). Examples for
both methods are included for each step.For more information about
the command line arguments, see your SGI documentation.
SGI provides unsupported template command line files. Although these files are not supported by either SGI or Sybase; however, they have been used and tested within the Sybase Engineering organization. You can download these files from:
In the examples throughout the following sections, when
the command line argument is called for, it is assumed that the
corresponding script has already been edited to reflect your environment.
The following list is the steps required to set up IRIX FailSafe. The details of each action are listed in the subsequent sections:
“Defining the logical volume resource for the secondary node”
“Defining the Adaptive Server resources for the primary node”
“Defining the Adaptive Server resources for the secondary node”
Copyright © 2005. Sybase Inc. All rights reserved. |
![]() |