Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Storage & Clustering Community Blog
Showing posts tagged with Cluster Server
Showing posts in English
deepak rawal | 26 Oct 2012 | 0 comments

Configuration wizard for creating a cluster provides option to setup LLT with Ethernet or UDP/IP protocol. This post provides some details on which option to choose. 

Cluster configuration wizard (VCW) detects NIC cards available for configuring LLT network links on each windows server.  Selecting NIC(s) for each server configures LLT to use Ethernet protocol.  If is important to make sure that each NIC is connected (either directly OR via a layer 2 switch) via separate network hardware for increased fault tolerance.  This is relatively easy to ascertain for Ethernet, since connection traverses a few network components. All windows servers connected to same Ethernet  are able to discover each other (ARP) dynamically.  This makes changing network configuration for cluster relatively simple. LLT traffic network overhead is low.  For large number of virtual machines hosted on a hypervisor in a datacenter, this type of...

Kushal Shah | 25 Oct 2012 | 0 comments

 

If failover is slow even after setting FastFailover attribute, check the following on all the nodes under cluster.
 
– Fast failover feature is installed.
 
– Fast failover license is present.
 
– Check SCSI-3 settings.
 
   •  Can be verified from VEA GUI under Control Panel>System Settings, SCSI support tab.
 
   •  During VMDG resource online, following error message is displayed in VEA GUI if SCSI-2 is set and Fast failover is enabled.
 
      “Fast failover is supported only with SCSI-3.”
 
– Dissimilarity in number of disks on active and passive nodes.
 
   •  Check for the number of missing disks under the diskgroup on both...
anishv | 25 Oct 2012 | 0 comments

Symantec ApplicationHA on IBM LPAR (PowerVM) is now offered with IBM PureFlex System, a new class of expert integrated systems, delivering simplicity of deployment and operation to the customers. Pre-packaged in a Virtual Appliance form factor, the customer receives ApplicationHA together with AIX 7.1 in one image. The image is available on trialware at https://www4.symantec.com/Vrt/offer?a_id=151397

ApplicationHA can be configured to control and provide visibility to the application of your choice, including Oracle, DB2, Apache, WebSphere etc.

This is a good endorsement from IBM of Symantec's ApplicationHA product. We are looking into expanding this activity to include more products from Symantec.

With this activity, Symantec has joined an elite group of third party vendors including VMWare & Juniper who bundle their offerings as part of IBM PureFlex systems.

AHerr | 25 Oct 2012 | 0 comments

 

The introduction of a new release of SFHA is always met with the question of what has changed in this release?

The goal of this document is to explain what has changed in the different areas of the product.

It conveniently groups the changes in the areas where they are implemented.

We have also broken out our major features introduced within this release into a section in the beginning of the document in case you are just interested in learning more about the new Storage Foundation and VCS features.  It also includes information on the newly released VCS 6.0.2 capabilities within Linux VMware Virtual Machines.

This document does not have information on feature implementation but does point out which document to consult for more information.

Additional product documentation is available  at https://sort.symantec.com/documents

Maria Bledsoe | 23 Oct 2012 | 0 comments

When you saw Data Center Down! did you have questions? Wonder why the failover took 4 minutes? What it was like to set up a DR scenario on a roof? How San Jose City Hall let us do this?

In this LIVE show, the production and engineering crews of the Data Center Down! answered these questions and more. They explored what it’s really like to throw a 500lb server rack loaded with enterprise software from the roof and have it all failover to a secondary site - without any visual effects or camera tricks.

The engineers went through the technology that made it happen. The video crew talked about the high stakes production.

Watch the replay of the webcast now - https://www4.symantec.com/Vrt/offer?a_id=150981

Doreet | 23 Oct 2012 | 0 comments

Taneja says "Symantec Veritas Cluster Server Takes Vrtual Server HA to the Next Level"

This is an awesome testimonial from Jeff Byrnes, an analyst from Taneja Group, who provides expert analysis and consulting services for the computer storage and server industries.

“All in all, we think the latest Veritas Cluster Server for VMware release adds significant value to customers running business-critical applications in virtualized environments.”

Doreet | 22 Oct 2012 | 1 comment

ESG Labs just published a blog on the ESG website discussing Storage Foundation performance and capabilities on Linux as contrasted to the native tools.

This is AWESOME!!! Check it out!

http://www.esg-global.com/blogs/come-one-come-all-to-the-greatest-show-on-earth/

bpascua | 15 Oct 2012 | 0 comments

This week Telefonica the owner of O2 have controversially announced they will start selling their O2 mobile customer data to third parties. Through Telefonica's Dynamic Insights business unit they are looking to drive revenue out of mining data to sell to third parties. They will take their phone network data and anonymise  and aggregate it. The product will be called Smart Steps and will be sold to public sector companies to enable them to measure compare and understand what factors influence the number of people visiting a location. The aim is so that retailers can then make informed decisions on things like locations and opening times for shops. The big question is around privacy in the use of their customer data. People reacted very strongly when Google started using customer data for their targeted advertising and this seems to be in the same vein. As a mobile phone user I am not sure how happy I am effectively having my movements traced even though I understand this...

dennis_wenk | 05 Oct 2012 | 0 comments

Basel II Accord for International Banking Operational Risk is defined as, “Risk of loss from inadequate or failed internal; processes, people, and systems or external events “.   When Processes, People or Systems fail, whether it be from internal or external events, the losses can be substantial.  As an example, the Ponemon Institute estimates that worldwide organizational are losing over $35 Billion monthly from data center downtime.  Nicholas G. Carr point out in his seminal Harvard Business Review article IT Doesn’t Matter, “today, an IT disruption can paralyze a company’s ability to make products, deliver its services, and connect with its customers, not to mention foul its reputation … even a brief disruption in availability of technology can be devastating.”

There are two primary ways for an organization to increase value.  The first way is to...

dennis_wenk | 05 Oct 2012 | 0 comments

The Effectiveness of internal control systems is now an issue for public policy and formal law. Section 404 of the Sarbanes-Oxley law is aimed at helping companies prevent financial reporting mistakes and fraud. The rule requires companies to include in their annual reports:

  • A statement of management's responsibility for establishing and maintaining "adequate" controls over financial reporting
  • Management's assessment of the effectiveness of the company's internal controls
  • A statement identifying the framework used by management to evaluate the effectiveness
  • An auditor's report on management's evaluation of internal controls
  • Any material weaknesses identified in the internal controls review

While the rule only requires companies to disclose material weaknesses in their annual reports, many companies have begun alerting investors about deficiencies and potential problems. The rule is intended...