Veritas Cluster Server Bundled Agents Reference Guide



Similar documents
Veritas Cluster Server Bundled Agents Reference Guide

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Bundled Agents Reference Guide

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec ApplicationHA agent for Internet Information Services Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Mobile Management for Configuration Manager

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec Critical System Protection Agent Event Viewer Guide

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Cluster Server Implementation Guide for Microsoft SQL Server 2008

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec ApplicationHA 6.1 Generic Agent Configuration Guide - AIX on IBM PowerVM

Symantec Enterprise Vault Technical Note

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec ApplicationHA 6.1 Agent for DB2 Configuration Guide - AIX on IBM PowerVM

Symantec Client Firewall Policy Migration Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Symantec Cluster Server Implementation Guide for Microsoft SQL Server 2008 and 2008 R2

Symantec ApplicationHA Agent for Microsoft Exchange Server 2007 Configuration Guide

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec NetBackup Vault Operator's Guide

Symantec Protection Center Enterprise 3.0. Release Notes

Cluster Server Implementation Guide for Microsoft SQL Server 2014

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Symantec NetBackup Clustered Master Server Administrator's Guide

Cluster Server Implementation Guide for Microsoft SQL Server 2008 and 2008 R2

Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server

Symantec ApplicationHA Agent for Microsoft SQL Server 2012 Configuration Guide

Symantec Security Information Manager 4.8 Release Notes

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SQL 2008 and 2008 R2

Veritas Storage Foundation Scalable File Server Replication Guide 5.5

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

Symantec Enterprise Security Manager Patch Policy Release Notes

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Symantec Virtual Machine Management 7.1 User Guide

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SQL 2008 and 2008 R2

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide

Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SQL Server 2008 and 2008 R2

PGP CAPS Activation Package

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide

Symantec System Recovery 2011 Management Solution Administrator's Guide

Configuring Symantec AntiVirus for NetApp Storage system

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide

Symantec Enterprise Vault

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Encryption. Administrator Guide

Symantec Disaster Recovery Orchestrator Agent for Microsoft SQL Server 2012 Configuration Guide

Veritas Dynamic Multi-Pathing for Windows Release Notes

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007

Veritas Operations Manager Advanced 5.0 HSCL Pack 1 Release Notes

Symantec Secure Proxy Administration Guide

Symantec Enterprise Vault. Upgrading to Enterprise Vault

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Symantec Critical System Protection Agent Guide

How To Install Vc Storage Foundation For A Vc Cluster On A Microsoft Server On A Windows 7 Computer

Symantec ApplicationHA Agent for WebSphere Application Server Configuration Guide

Symantec High Availability Solution Guide for Custom Application in VMware Environment

Symantec Enterprise Security Manager Modules. Release Notes

Symantec NetBackup Clustered Master Server Administrator's Guide

Symantec Response Assessment module Installation Guide. Version 9.0

Symantec NetBackup for Hyper-V Administrator's Guide. Release 7.5

Symantec NetBackup AdvancedDisk Storage Solutions Guide. Release 7.5

Symantec NetBackup for Hyper-V Administrator's Guide. Release 7.6

Symantec ApplicationHA 6.1 Agent for JBoss Application Server Configuration Guide - Linux on KVM

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Veritas Cluster Server Bundled Agents Reference Guide

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide

Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide

Symantec NetBackup for Microsoft SQL Server Administrator's Guide

Symantec Management Platform Installation Guide. Version 7.0

Symantec NetBackup for DB2 Administrator's Guide

Transcription:

Veritas Cluster Server Bundled Agents Reference Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 1

Veritas Cluster Server Bundled Agents Reference Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: 5.1. Service Pack 1 Document version: 5.1.SP1.0 Legal Notice Copyright 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Veritas, and Veritas Storage Foundation are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ( Third Party Programs. Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice file accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com

Technical Support Contacting Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s maintenance offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers automatic software upgrade protection Global support that is available 24 hours a day, 7 days a week Advanced features, including Account Management Services For information about Symantec s Maintenance Programs, you can visit our Web site at the following URL: http://www.symantec.com/business/support/index.jsp Customers with a current maintenance agreement may access Technical Support information at the following URL: http://www.symantec.com/business/support/contact_techsupp_static.jsp Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: Product release level Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description:

5 Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration Customer service If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: http://customercare.symantec.com Customer service information is available at the following URL: http://customercare.symantec.com Customer Service is available to assist with the following types of issues: Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers Latest information about product updates and upgrades Information about upgrade assurance and maintenance contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manuals Maintenance agreement resources If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: Asia-Pacific and Japan Europe, Middle-East, and Africa North America and Latin America customercare_apac@symantec.com semea@symantec.com supportsolutions@symantec.com Additional enterprise services Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively.

6 Enterprise services that are available include the following: Symantec Early Warning Solutions Managed Security Services Consulting Services Educational Services These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur. These services remove the burden of managing and monitoring security devices and events, ensuring rapid response to real threats. Symantec Consulting Services provide on-site technical expertise from Symantec and its trusted partners. Symantec Consulting Services offer a variety of prepackaged and customizable options that include assessment, design, implementation, monitoring, and management capabilities. Each is focused on establishing and maintaining the integrity and availability of your IT resources. Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs. To access more information about Enterprise services, please visit our Web site at the following URL: www.symantec.com Select your country or language from the site index.

Contents Chapter 1 Chapter 2 Introducing VCS bundled agents About VCS bundled agents...16 Resources and their attributes...16 Modifying agents and their resources...17 Attributes...17 Attribute data types...17 Attribute dimensions...18 Categories of bundled agents...19 Storage agents...19 Network agents...19 FileShare agents...19 Printshare agents...20 Services and applications agents...20 VCS infrastructure and support agents...20 Which agents should I use?...21 Storage agents About Storage agents...24 DiskReservation (DiskRes agent...24 Agent functions...25 State definitions...25 Resource type definition...25 Attribute definitions...25 Sample configuration...27 Mount agent...28 Dependency...28 Agent functions...28 State definitions...28 Resource type definition...29 Attribute definitions...29 Sample configurations...32 Volume Manager Diskgroup (VMDg agent...33 Agent functions...33 State definitions...33 Resource type definition...33

8 Contents Attribute definitions... 34 Sample configuration... 36 MountV agent... 37 Dependency... 37 Agent functions... 37 State definitions... 37 About CheckFSAccess function... 38 Resource type definition... 40 Attribute definitions... 40 Sample configuration... 43 Chapter 3 Network agents About Network agents... 46 NIC agent... 46 Agent functions... 46 State definitions... 47 Resource type definition... 47 Attribute definitions... 48 Sample configuration... 49 IP agent... 50 Dependency... 50 Agent functions... 50 State definitions... 50 Resource type definitions... 50 Attribute definitions... 51 Sample configuration... 51 IPMultiNicPlus agent... 52 Agent functions... 52 State definitions... 53 Resource type definition... 53 Attribute definitions... 54 Sample configuration... 56 Lanman agent... 57 Dependency... 57 Agent functions... 58 State definitions... 58 Resource type definition... 59 Attribute definitions... 60 Sample configurations... 70

Contents 9 Chapter 4 Chapter 5 Chapter 6 FileShare agents About FileShare agents...74 FileShare agent...74 Dependencies...74 Agent functions...75 State definitions...75 About ForceControl function...76 Resource type definition...77 Attribute definitions...78 Sample configuration...85 CompositeFileShare agent...87 Dependencies...87 Agent functions...88 State definitions...88 About ForceControl function...88 Resource type definition...89 Attribute definitions...90 Sample configuration...98 PrintShare agents About PrintShare agents...100 PrintSpool agent...100 Dependencies...100 Agent functions...101 State definitions...101 Resource type definition...101 Attribute definitions...101 Sample configuration...102 PrintShare agent...104 Dependency...104 Agent functions...104 State definitions...104 Resource type definition...104 Attribute definitions...105 Sample configuration...105 Services and applications agents About services and application agents...108 Microsoft Virtual Machine (MSVirtualMachine agent...108 Dependencies...108 Agent functions...109 State definitions...109

10 Contents Resource type definition...110 Attribute definitions...110 Sample configuration...111 Internet Information Services agent...112 Agent functions...112 State definitions...112 Resource type definition...112 Attribute definitions...113 Sample configurations...115 GenericService agent...119 Agent functions...119 State definitions...119 Resource type definition...120 Attribute definitions...120 Sample configuration...122 ServiceMonitor agent...123 Agent functions...123 State definitions...123 Resource type definition...124 Attribute definitions...124 Sample configurations...126 Process agent...127 Agent functions...127 State definitions...127 Resource type definition...128 Attribute definitions...128 Sample configuration...132 MSMQ agent...133 Dependencies...133 Agent functions...133 State definitions...134 Resource type definition...134 Attribute definitions...134 Sample configuration...135 Chapter 7 VCS infrastructure and support agents About VCS infrastructure and support agents...138 NotifierMngr agent...139 Agent functions...139 State definitions...139 Resource type definition...140 Attribute definitions...140 Sample configuration...143

Contents 11 Registry Replication (RegRep agent...144 Dependency...144 Agent functions...144 State definitions...145 Resource type definition...145 Attribute definitions...146 Sample configuration...150 VRTSWebApp agent...152 Dependency...152 Agent functions...152 State definitions...152 Resource type definition...152 Attribute definitions...153 Sample configuration...154 Proxy agent...155 Agent functions...155 State definitions...155 Resource type definition...155 Attribute definitions...156 Sample configurations...157 Phantom agent...158 Agent functions...158 State definitions...158 Attribute definitions...158 Sample configuration...158 FileNone agent...159 Agent functions...159 State definitions...159 Resource type definition...159 Attribute definitions...159 Sample configuration...159 ElifNone agent...160 Agent functions...160 State definitions...160 Resource type definition...160 Attribute definitions...160 Sample configuration...160 FileOnOff agent...161 Agent functions...161 State definitions...161 Resource type definition...161 Attribute definitions...161 Sample configuration...161

12 Contents FileOnOnly agent...162 Agent functions...162 State definitions...162 Resource type definition...162 Attribute definitions...162 Sample configuration...162 RemoteGroup agent...163 Dependency...163 Agent functions...163 State definitions...164 Resource type definition...164 Attribute definitions...165 Sample scenario...170 Chapter 8 Chapter 9 VCS hardware replication agent for NetApp About hardware replication agents for NetApp...174 NetApp Filer agent...175 Agent function...175 Resource type definition...175 Attribute definitions...175 Sample configuration...175 NetApp SnapDrive agent...176 Dependency...176 Agent functions...176 Resource type definition...176 Attribute definitions...177 Sample configuration...177 NetApp SnapMirror agent...178 Dependency...178 Agent functions...178 Action function...179 Resource type definition...179 Attribute definitions...180 Sample configuration...181 Troubleshooting bundled agents About troubleshooting bundled agents...184 VCS logging...184 Troubleshooting storage agents...185 Disk Reservation agent error messages...185 Mount agent error messages...190 Volume Manager (VMDg agent error messages...198

Contents 13 MountV agent error messages...200 Troubleshooting network agents...204 NIC agent error messages...204 IP agent error messages...206 IPMultiNicPlus agent error messages...208 Lanman agent error messages...211 Troubleshooting FileShare agents...215 FileShare agent error messages...215 CompositeFileShare agent error messages...216 Troubleshooting PrintShare agents...219 PrintSpool agent error messages...219 PrintShare agent error messages...221 Troubleshooting services and application agents...223 MSVirtualMachine agent error messages...223 IIS agent error messages...224 GenericService agent error messages...227 ServiceMonitor agent error messages...231 Process agent error messages...234 Troubleshooting infrastructure and support agents...238 Notifier Manager agent error messages...238 Registry Replication agent error messages...239 VRTSWebApp agent error messages...241 Proxy agent error messages...242 Phantom agent error message...242 FileNone agent error message...242 ElifNone agent error message...242 FileOnOff agent error messages...243 FileOnOnly agent error messages...243 Troubleshooting NetApp agents...244 Index 247

14 Contents

Chapter 1 Introducing VCS bundled agents This chapter contains the following topics: About VCS bundled agents on page 16 Resources and their attributes on page 16 Modifying agents and their resources on page 17 Attributes on page 17 Categories of bundled agents on page 19 Which agents should I use? on page 21

16 Introducing VCS bundled agents About VCS bundled agents About VCS bundled agents Bundled agents are VCS processes that manage resources of predefined resource types. The agents manage resources according to commands received from the VCS engine, HAD. Bundled agents are a part of VCS, and are installed when VCS is installed. A system has one agent per resource type that monitors all resources of that type; for example, a single IP agent manages all IP resources. When the agent is started, it obtains the necessary configuration information from VCS. It then periodically monitors the resources, and updates VCS with the resource status. Agents typically: Bring resources online. Take resources offline. Monitor resources and report state changes to VCS. This document describes the VCS bundled agents along with their resource type definitions, attribute definitions, and sample configurations. The chapter on configuring resources and applications in the Veritas Cluster Server Administrator s Guide describes how to configure these agents. Resources and their attributes Resources are the key parts of a system and are known by their type, such as a disk, a volume, or an IP address. Resource types are defined in the types.cf file by a collection of attributes. The VCS configuration file, main.cf, contains the values for the resource attributes and has an include directive to the types.cf file. There are three categories of resources: On-Off, On-Only, and Persistent. The category of a resource governs the functions that the corresponding agent performs. For example, if the resources of an agent are of type On-Off, the agent could online and offline the resources. If the resources of an agent are of type On-Only, the agent could online the resources but cannot offline them. For persistent resources, the agent can neither online nor offline a resource. An attribute s given value configures the resource to function in a specific way. By modifying the value of a resource attribute, you can change the way the VCS agent manages the resource. For example, the IP agent monitors an IP address resource. The specific address to be monitored is identified by the attribute Address whose value is the specific IP address.

Introducing VCS bundled agents Modifying agents and their resources 17 Modifying agents and their resources Use Cluster Manager (Java Console, Cluster Management Console (Single Cluster Mode also known as Web Console, or the VCS command line to dynamically modify the configuration of the resources managed by an agent. See the Veritas Cluster Server Administrator s Guide for instructions on how to complete these tasks. Attributes Configure VCS components with attributes. Attributes contain data about the cluster, systems, service groups, resources, resource types, agent, and heartbeats if you want to use global clusters. Each attribute has a definition and a value. Some attributes also have default values. Attribute data types Table 1-1 Data Type Attribute Data Types Description string Enclose strings, which are a sequence of characters, in double quotes (". You do not have to enclose strings in quotes when they begin with a letter, and contains only letters, numbers, dashes (-, and underscores (_. For example: A string defining a network interface such ashme0 does not require quotes as it contains only letters and numbers. Enclosing the string in double quotes is also acceptable "ashme0". A string defining an IP address requires quotes: "100.101.102.1" because the address contains periods. A string can contain double quotes, but the quotes must be immediately preceded by a backslash. In a string, represent a backslash with two forward slashes (\\. integer boolean Signed integer constants are a sequence of digits from 0 to 9. You can precede them with a dash. They are base 10. Integers cannot exceed the value of a 32-bit signed integer: 21471183247. A boolean is an integer with the possible values of 0 (false and 1 (true.

18 Introducing VCS bundled agents Attributes Attribute dimensions Table 1-2 Dimension scalar vector keylist association Attribute Dimensions Description A scalar has only one value. This is the default dimension. A vector is an ordered list of values. Each value is indexed using a positive integer beginning with zero. A set of brackets ([] denotes that the dimension is a vector. Find the specified brackets after the attribute name on the attribute definition in the types.cf file. A keylist is an unordered list of unique strings in that list. An association is an unordered list of name-value pairs. An equal sign separates each pair. A set of braces ({} denotes that an attribute is an association. Braces are specified after the attribute name on the attribute definition in the types.cf file, for example: str SnmpConsoles{}.

Introducing VCS bundled agents Categories of bundled agents 19 Categories of bundled agents Bundled agents are categorized according to the type of resources they make available. Storage agents Network agents Storage agents make your shared disks, disk groups, volumes, and mounts highly available. DiskReservation (DiskRes agent Monitors shared disks configured using Windows Disk Management. Mount agent Monitors mount paths configured using Windows Disk Management. Volume Manager Diskgroup (VMDg agent Monitors shared disks configured using Storage Foundation for Windows (SFW. MountV agent Monitors mount points configured on SFW-managed shared disks. NetAppSnapDrive agent Monitors the Logical Unit Numbers (LUNs on the NetApp Filers. NetAppFiler agent Monitors the state of the NetApp Filers. Network agents make your IP addresses and computer names highly available. FileShare agents NIC Agent Monitors a NIC (Network Interface Card. IP Agent Monitors an IP address. IPMultiNicPlus Agent Monitors multiple adapters and an IP address. Lanman Agent Monitors a virtual computer name. Fileshare agents make shared directories and subdirectories highly available. FileShare Agent Monitors a shared directory. CompositeFileShare Agent Monitors multiple shared directories.

20 Introducing VCS bundled agents Categories of bundled agents Printshare agents The Printshare agents work together to make a shared network printer highly available. PrintSpool Agent Monitors a print spooler. Services and applications agents PrintShare Agent Monitors a shared network printer. Services and application agents make web sites, applications, generic services, and processes highly available. Microsoft Virtual Machine (MSVirtualMachine Agent Monitors virtual machines configured using Microsoft Virtual Server. Internet Information Services (IIS Agent Monitors IIS sites and services. GenericService Agent Monitors generic services. ServiceMonitor Agent Monitors a service or starts a user-defined script. Process Agent Monitors a process. MSMQ Agent Creates a MSMQ service for a MSMQ resource, brings the MSMQ resource online, takes it offline, and monitors its status. VCS infrastructure and support agents The VCS infrastructure and support agents provide high availability for VCS-related operations. NotifierMngr Agent Monitors a notifier process. Registry Replication (RegRep Agent Synchronizes the registries of cluster nodes by monitoring changes to the registry of the active node. VRTSWebApp Agent Monitors the Web applications running on a Web server. Proxy Agent Monitors the state of a resource on a local or remote system. Phantom Agent Determines the state of service groups having resources of type None only. RemoteGroup Agent Monitors and manages service groups in a remote cluster. You can use the following agents to test VCS functionality: ElifNone Agent Monitors a file. FileNone Agent Monitors a file.

Introducing VCS bundled agents Which agents should I use? 21 FileOnOff Agent Creates a file, monitors it, and deletes it. FileOnOnly Agent Creates and monitors a file. Which agents should I use? This information in the table enables you to decide which agent to use depending on the resource you want to make highly available. Table 1-3 Resources and corresponding VCS agents Resource to Make Highly Available Shared Storage Disks and volumes managed using SFW or Windows Logical Disk Manager or NetApp IP address Adapter and the associated IP address Computer name (virtual name Agents to Use In case of SFW, use VMDg and MountV In case of LDM, use DiskRes and Mount In case of a NetApp storage environment, use NetAppFiler and NetAppSnapDrive NIC, IP or IPMultiNICPlus Lanman File shares Directory Shared printer Sites configured using Internet Information Services (IIS Processes (*.pl, *.sh, *.exe, and *.bat Windows service residing in the Service Control Manager (SCM Windows Registry Veritas Web Applications Virtual machines configured using Microsoft Virtual Server Fileshare or CompositeFileShare Printspool, Printshare IIS Process GenericService or ServiceMonitor Registry Replication (RegRep VRTSWebApp MSVirtualMachine

22 Introducing VCS bundled agents Which agents should I use? Table 1-3 Resources and corresponding VCS agents Resource to Make Highly Available Service group in another cluster Agents to Use RemoteGroup

Chapter 2 Storage agents This chapter contains the following topics: About Storage agents on page 24 DiskReservation (DiskRes agent on page 24 Mount agent on page 28 Volume Manager Diskgroup (VMDg agent on page 33 MountV agent on page 37

24 Storage agents About Storage agents About Storage agents Storage agents make your shared storage highly available. Use the Disk Reservation and Mount agents to provide high availability for shared disks and volumes managed using Windows Logical Disk Management (LDM. Note: The Disk Reservation and Mount agents are not supported in an SFW environment. Use the Volume Manager Diskgroup (VMDg and MountV agents to provide high availability for shared disks and volumes managed using Storage Foundation for Windows. In case of a NetApp storage environment, the Logical Unit Numbers (LUNs on the NetApp Filer are made highly available by the NetApp Filer and NetApp SnapDrive agents instead of the VMDg and MountV agents respectively. See VCS hardware replication agent for NetApp on page 173 for more information on these agents. DiskReservation (DiskRes agent The DiskReservation agent monitors shared disks. The agent also prevents data corruption caused by network partitioning, a condition in which two cluster systems provide the same services simultaneously. This condition occurs due to network link failure and may cause data corruption. The agent ensures only one cluster system holds persistent reservation to shared disks. During a typical network partition, one system (SystemA has the DiskRes resource online and holds reservation to shared disks. Another system (SystemB attempts to come online and reserve the shared disks. To avoid network partitioning, SystemB issues a bus reset and waits for the interval specified in the GracePeriod attribute to determine if SystemA is functioning. If SystemA is functioning, SystemA reacquires reservation to the shared disks. Otherwise, SystemB attempts to reserve the shared disks. The system that gains reservation to the disks is designated owner of the resource, and the resource is brought online on that system. By default, a system is designated owner of the resource if it reserves 80 percent of the shared disks. You can modify the agent s configuration to change the ownership criteria. Note: This agent is not supported in an SFW environment.

Storage agents DiskReservation (DiskRes agent 25 Agent functions State definitions online Reserves the shared disks each second. offline Releases the reservation to the shared disks. monitor Verifies the system holds the reservation to the shared disks. ONLINE Indicates the system holds the reservation to the shared disks. OFFLINE Indicates the system does not hold the reservation to the shared disks. UNKNOWN Indicates the agent could not determine the status of the shared disks. Resource type definition Attribute definitions type DiskRes ( static i18nstr ArgList[] = {Signatures, ConfigPercentage, FailFastInterval, GracePeriod} str Signatures[] int ConfigPercentage = 80 int FailFastInterval = 1 int GracePeriod = 5 Table 2-1 DiskRes agent required attributes Required Attribute Type and Dimension Description Signatures string-vector An array specifying the signature of each SCSI disk. To retrieve the disk signature, use the VCS utility, havol with the scsitest option. See the VCS Administrator s Guide for instructions on how to use the utility.

26 Storage agents DiskReservation (DiskRes agent Table 2-2 DiskRes agent optional attributes Optional Attributes Type and Dimension Description ConfigPercentage integer-scalar The percentage of shared disks a system must reserve to be designated owner of the DiskRes resource. When a system acquires reservation to the number of disks that equals this value, the resource is brought online on the system. Set this attribute to at least 51 percent. If you set this attribute to a value less than 50 percent, the agent changes it to 51 percent. Default is 80 percent. Note: If you set this attribute to a value less than 51 percent, the agent internally treats it to be 51 percent. However, this is not updated in the GUI. FailFastInterval integer-scalar Number of seconds the resource waits before bringing down the system after reservation fails. If during this interval the resource acquires reservation, it is not brought down. The resource is brought down in case of a reservation conflict, that is, if another system acquires reservation to the shared disks. Note that if a resource is brought down under these conditions, all service groups on the system might fail over to another system in the cluster. This attribute is ignored if UseSCSI3 is set to True. Default is 1 second. GracePeriod integer-scalar Number of seconds the agent waits before taking over disk reservation after issuing a bus reset. This attribute is ignored if UseSCSI3 is set to True. Default is 5 seconds.

Storage agents DiskReservation (DiskRes agent 27 Table 2-2 DiskRes agent optional attributes Optional Attributes Type and Dimension Description UseSCSI3 boolean-scalar If the value is True, the agent uses SCSI-3 persistent reservations for shared disks. The default value of this attribute is False, which means that the DiskRes agent uses SCSI-2 reservations by default. Before configuring this attribute, ensure that your shared storage is SCSI-3 compliant. Default: False Sample configuration In the following example, the Disk Reservation agent is configured to monitor three shared disks. The resource is brought online on a system when it acquires reservation to all disks. DiskRes DiskRes_A ( Signatures = {2336572, 2336573, 2336574} ConfigPercentage = 100; Note that if the shared disk is reserved by another application, the DiskReservation agent resets the disk reservation. If you use the command hastop -all -force to stop HAD on a system, the system holds reservation to the disk even after HAD is stopped and the disk is not visible from any other system. To see the shared disk from other systems, bring down the DiskReservation resource gracefully, using the command hastop -all. You could also use the havol utility to remove the reservation on the shared disks. See the description of the havol utility in the Veritas Cluster Server Administrator s Guide for instructions.