Ob'nannya computers in a cluster windows 10. Desktop cluster

Zharoznizhuvalny for children is recognized as a pediatrician. Allegedly, there are situations of inconvenient help for feverish women, if the children are in need of giving innocently. Todi dad take on the versatility and constipation of fever-lowering drugs. How can you give children a breast? How can you beat the temperature of older children? What are the best ones?

Entry

Server cluster is a whole group of independent servers on top of a server cluster service, which is used as a single system. Clusters of servers move along the path of combining several servers based on Windows® 2000 Advanced Server and Windows 2000 Datacenter Server for residential robots, without high rіven availability, scale and kerovanosti for resources and supplements.

For the head of the server cluster є securing uninterrupted access to additional data and resources in the form of hardware or software or scheduled maintenance. If one of the servers in the cluster appears to be inaccessible through the link, or else there is a contact for the visitor technical service, Information resources and programs are redefined by the other available universities in the cluster.

For cluster systems vicoristannya term " visoka availability "є we shorten, nіzh vikorystannya term " vidmovost_ykist " Oscillations of the technology for securing the efficiency allow for a greater level of efficiency in the possession of the latest injections and mechanisms of renewal. As a rule, a high level of hardware overworld, plus additional specialization programmatically secure, which allows you to practically secretly update the robot in case of any kind of software and hardware security. The price of cost is much more expensive in the context of the vicarious cluster technologies, the odds of organizing the overpayment for additional equipment, since it’s idle for the whole main hour, and the victor will be afraid to be deprived of money. Vidmovost_ykі servers are available for supplementary services, such as service providers, an intensive rate of expensive transactions in such spheres of activity, as in the center of processing payments, ATM machines and funds.

If the service of clusters is not a guarantee of uninterrupted robots, there is a high level of availability, sufficient for robots, more critically important programs. The service of clusters can provide information to the robot and the resources, automatically recognize the host and update the system and send it to the robot. It will ensure the smooth management of the work assignments in the middle of the cluster, and will increase the availability of the system and start.

The main passages, which are available at the victorian service of the clusters:

  • Visoka availability. At every vidmov and any university, the cluster service transfers the management of resources, such as, for example, hard drives and blank addresses, which go to the cluster's university. If you see a software or hardware device, the software for the restarting cluster of additional software, ending with a mercy, at the current university, or changing all the new installation of the university, if you have seen it on the go. Koristuvachi can save a short-hour attendance at service staff.
  • The turn of the message is displayed. The service of clusters is automatically re-rooted in a more robust way in the cluster, if the university, which has seen it, becomes available again.
  • Kerovanism. The administrator of the cluster - the price is equipped, as you can use it to manage the cluster as a single system, as well as to manage the programs. The administrator of the cluster will not give a glimpse of the presentation of the robots, so that they stink on the same server. You can move the programs on the separate servers in between the cluster, overtightening the cluster with the target. So it is possible to change the data itself. Tsey method can be used for manual delivery of robotic server installation, as well as for server installation of the same sub-location for carrying out scheduled technical service. In addition, the Cluster Administrator allows remote monitoring of the cluster's camp, of all universities and resources.
  • Scalability. For this purpose, the productivity of the cluster could be adapted to growing vimogs, the service of the clusters was able to scale up. As far as the productivity of the cluster is concerned, it becomes a disadvantage for the processing of the new planting, folded by the cluster supplements, before the cluster there can be additional supplementary ones.

This document reveals the instructions for installing clusters on servers that govern Windows 2000 Advanced Server and Windows 2000 Datacenter Server, and describes the process of installing cluster services on the servers of cluster universities. The Daniye posibnik does not describe the establishment and adjustment of cluster supplements, but without additional help you will go through the entire process of establishing a simple two-node cluster.

System vimogues before the server cluster shutdown

Step-by-step checklists help you prepare before being installed. Coverage instructions will be presented later on from these lists.

Vimogi to software security

  • Operator Microsoft system Windows 2000 Advanced Server or Windows 2000 Datacenter Server installed on all servers in the cluster.
  • The service for resolving names has been installed, such as Domain Naming System (DNS), Windows Internet Naming System (WINS), HOSTS, etc.
  • Terminal server for remote cluster administration. Tsya vimoga is not obov'yazkovuyu, but it is recommended to deprive you of the best management of the cluster.

Vimogi to hardware security

  • Vimogi to the hardware security of the cluster vimogam analogous vimogam for the installation of operating systems Windows 2000 Advanced Server or Windows 2000 Datacenter Server. You can know who you are on the side of the joke the Microsoft directory.
  • Cluster setup is certified and listed on the Microsoft Hardware Cluster Service List (HCL). Remaining version the list can be found on the side of the joke Windows 2000 Hardware Compatibility List the Microsoft catalog, choosing the category "Cluster" joke.

Two computers that display the HCL list on the skin:

  • Hard disk from a secure system partition and an installed operating system Windows 2000 Advanced Server or Windows 2000 Datacenter Server. Tsey drive is not guilty of butti connections to the bus of the outboard attachment, which is shown below.
  • Okremiy PCI-controller attached to the optical channel (Fiber Channel) or SCSI for connecting the external attachment. Tsey controller is guilty of being present for additional payment to the controller entangling disc.
  • Two PCI adapters, installed on the skin computer of the cluster.
  • Reinsurance at the HCL list of top disk attachments, connections to all universities in the cluster. Wono vistupatime yak disk cluster. Recommended configuration for additional hardware RAID arrays.
  • Cables for connecting the outhouse to all computers. To correct the instructions for the configuration of the annexes, to return to the documentation of the virobnik. If you connect to the SCSI bus, you can return to the A program for additional information.
  • All possession on the computers of the cluster will become identical. To simplify the process of configuring and to relieve you of potential problems due to the complexity.

Vimogi before setting up the configuration of the hemline

  • Unique NetBIOS cluster.
  • Five unique static IP addresses: two addresses for mesh adapters private fancy, two - for fencing adapters of public fingering, and one addresses for the cluster.
  • Domain regional record for the service of clusters
  • The leather university is guilty of the mother of two mesh adapters - one for the connection to the public mesh, one for the internal cluster interconnection of the universities. Configuring one adapter for a one-hour connection to the public and private pattern is not available. The availability of an okremovy private fingering adapter is required for compatibility with HCL.

Vimogi to the disks of the outhouse.

  • All the drives are connected to the outhouse, including the quorum disc, they are physically connected to the outgoing bus.
  • All discs, plugged in to the original tire, may be available to the skin university. The price can be changed on the stage of installation and configuration of the host adapter. For lectures Go to the documentation for the adapter file.
  • SCSI attachments The fault is due to the fact that the unique number of SCSI ID is assigned, except for the one on the SCSI bus. one
  • Usi disks with a spilny attachment can be adjusted as basic disks (not dynamical)
  • Effortlessly, the disks of the out-of-the-box attachment can be formatted from the NTFS file system.

In the end, it is recommended to add all drives to the external attachment in the hardware RAID array. If we want it and not є to be tricky, shutting down hard-to-manage RAID configurations is a key moment in the safeguarding of disk troubles.

Inserting a cluster

Zagalny look at the installation

Before the hour of establishment, the deyakі of the university will be rewarded, and the deyakі re-zavantazhenі. The price is necessary in order to preserve the integrity of the tribute, rosttasvanih on disks, plugged in to the original bus of the outbuilding. The tribute can be done at that moment, if the number of universities at once try to write on the same disk, not theft by the program's security of the cluster.

Table 1 will help you visually, such as universities and annexes, which will not be remembered, if they are included in the skin stage of the installation.

Tsey posibnik describes the root of a two-node cluster. Tim doesn’t mensh, if you’ll set up a cluster with more than two schools, you can vikoristovuvati the meaning of a hundred "Vuzol 2" designation of the camp of the largest universities.

Table 1. The last of the increase in annexes before the hour of the establishment of the cluster

Croc Vuzol 1 Vuzol 2 Pristіy zberіgannya Commentary
Insertion of parameters in a mesh Uvimk. Uvimk. Vimk. Get over it, all the annexes of the donation, plugged in to the zalnoy bus, vimknenia. Uninstall usi universities.
Adjustment of sleeping discs Uvimk. Vimk. Uvimk. Vimknit usi universities. Umknit the spilny pristіy, and then uvіmknі the first university.
Reconfiguration of spilny discs Vimk. Uvimk. Uvimk. Uninstall the first higher education institution, remove the other higher education institution. For consumer repeat for universities 3 and 4.
Configuruvannya of the first university Uvimk. Vimk. Uvimk. Vimknit usi universities; hide the first university.
Configuring another university Uvimk. Uvimk. Uvimk. On the occasion of the successful configuration of the first university, we would like to add another university. For consumer repeat for universities 3 and 4.
Completed installation Uvimk. Uvimk. Uvimk. Until the moment, all universities may be turned on.

Before the installation of the software security of the cluster, it is necessary to select the following crocs:

  • Install the cluster operating system on the skin computer Windows system 2000 Advanced Server or Windows 2000 Datacenter Server.
  • Nalashtuvati parameters.
  • Nalashtuvati disks of the spilny annex.

Visit the center of the skin cluster before the team, as you start before the establishment of the service of the cluster at the first university.

For configuring the cluster service on the server under Windows 2000 keruvans, your regional record is guilty of the administrator's rights for the skin university. All the universities of the cluster are guilty of one hour member servers, or controllers of the same domain. It is unacceptable to change the registration of common servers and domain controllers in the cluster.

Installing the operating system in Windows 2000

For Windows installations In 2000, the dermatological institute of the cluster was turned up to documentation, the yak V was taken out in a set with an operating system.

A number of documents have the structure of the name of the certificate "Step-by-Step Guide to Common Infrastructure for Windows 2000 Server Deployment"... However, you can vikoristovuvati be-like the name.

First of all to fix the establishment of the service of the clusters

Adjustment of parameters

Note: At the whole stage of the installation, we need to install the outbuildings, and then increase the connections to the universities. We are guilty of including the possibility of one-hour access to the decile universities to the auxiliary annex until that moment, if the service of the cluster is installed, taken, at one of the universities, and there will be connections.

At the skin university, there are at least two mesh adapters installed - one for connecting to a public mesh, and one for connecting to a private mesh, which is stored from the cluster's universities.

The grid adapter of the private framing will secure the interaction between the universities, the transfer of the views through the streaming mill of the cluster and the kerv of the cluster. A cross-section adapter of a public hemline of a skin university is a single cluster from a huge hemline, from a client computer.

Switch over, so that all the adapters of the fence are correctly connected physically: the adapters of the private fence are not connected to the other adapters in the private fence, and the adapters of the public fence are connected to the switches in the public fence. The diagram of the connection is shown on the little one. 1. Make this change on the skin node of the cluster, and then go to the adjustment of the disks in the outhouse.

Figure 1: Butt of a two-node cluster

Configuring the Private Fingering Adapter

Visit the center of the cluster on the first university of the cluster.

  1. More choose the command Power.
  2. Click the right mouse button on the pictogram.

Note: Yakiy mesh adapter I will service the private net, and I will publish it, lay it down physical connection knitted cables... Have this document we will allow for allowance, the first adapter (Connected by local framing) is connected to the public hedge, and the other adapter (Connected to the local hedge 2) is connected to the private hedge of the cluster. Your vipadku may have a lot of money.

  1. Mill. Vіkno Stan Z'єdnannya through local edge 2 showing the status of the connection. If the connection is located at the installed station, turn the cables and the correctness of the connection. Usunennya problems, persh nіzh prodovzhiti. Push the button Close.
  2. I know to click the right mouse button on the icon Connecting through a local mesh 2, select a command Power press the button Nalashtuvati.
  3. Viber tab Dodatkovo. Show up in the image on the little one 2.
  4. For custom-made adapters for a private hem, the robot is guilty, but I will be presented with a replacement value, as I will be victorious for a change. Add the quality of your stock to the list to open. Do not pick on the value "Auto Sense" abo "Auto Select" for a choice of performance, for a selection of adapters, you can skip packages for an hour. But the value of the width of the stitch adapter, the actual value for the parameter Connection type abo Speed.

Malunok 2: Dodatkovі nalashtuvannya mesh adapter

Increased cluster adapters, plugged in to one mesh, the fault is the same, but the same values ​​are set and the parameters Duplex mode, Flow control, Connection type, etc. Navigate as well as in small universities vicoristvuyutsya at least as little possession, the values ​​of these parameters may be the same.

  1. Oberit Internet Protocol (TCP / IP) at the list of components, which can be used for connections.
  2. Push the button Power.
  3. Set the mixer to the position Vikoristovuvati on the IP address then enter the address 10.1.1.1 ... (For another university, pick the address 10.1.1.2 ).
  4. Set the mask for the image: 255.0.0.0 .
  5. Push the button Dodatkovo that vibrate tab WINS. Set the value of the pump to the position Vimknuti NetBIOS over TCP / IP... Natisnit OK to turn to the front menu. Choose a crock leash for your private fancy adapter.

Your dialogue window of the ma viglyadati, as pictured on the baby 3.

Figure 3: IP Addresses Connected to a Private Fingerprint

Configuring the hemstitch adapter

Note: As far as the publishers of the hedge are concerned, the DHCP server, IP addresses for the hedge adapter can be assigned automatically. However, it is not recommended for adapters to universities in a cluster. We recommend that you assign permanent IP addresses for all public and private hemline adapters in universities. In general, when the DHCP server is displayed, access to the cluster's nodes can be difficult. As soon as you accept DHCP for unused adapters in public domains, pick up three terms and rent an address - this will give you a guarantee that the dynamically assigned address will be lost to a valid one, as a DHCP server will be unavailable for an hour. Always assign permanent IP addresses to the private mesh adapters. Remember, the cluster service can only be developed from one hedgehog interface in skin care. If you need additional help with the signs of the hedgehog address in Windows 2000, you will need to update the operating system.

Changing the hedgehog keys

For clarity, it is recommended to change the name of the connection to the hem. For example, you can change the name of the connection Connecting through a local mesh 2 on the ... This method can help you to more simply identify the pattern and correctly identify the roles.

  1. Click the right mouse button on the icon 2.
  2. The context menu has a command Change.
  3. Enter Connecting to a private cluster at the text field and press the keyboard INTRODUCTION.
  4. Repeat steps 1-3 and change the name of the connection Connecting to a local mesh on the Connected to the hem.

Figure 4: Renamed heirlooms

  1. Renamed the connection to the guilty mark, as shown on little 4. Close the window Merezha add-on access up to fathoms... New names of the lower ones will automatically replicate to the other universities in the cluster when they are turned on.

Reconstruction of the neyzhnyh z'єdnan and the permissiveness of the men

To rewrite the robot stocking, select these crocs for all skin knot adapters. For all the guilty nobles, IP-addresses and all fancy adapters in the cluster. You can edit the information by clicking on the command ipconfig on the skin institute:

  1. Push the button Start, vibrate command Viconati and type a command cmd at the text box. Natisnit OK.
  2. Recruit a team ipconfig / all that press the key INTRODUCTION... Please provide information about the IP protocol setup for the leather fencing adapter on the local machine.
  3. I have not seen it yet. command line, visit croc 1.
  4. Recruit a team ping ipaddress de ipaddress- the whole IP-address of the type of adapter on the other university. Acceptable for a buttstock, with the following IP-addresses:
University number Ім'я of a stitching connection Netting adapter IP addresses
1 Connected to the public 172.16.12.12
1 Connecting to a private cluster 10.1.1.1
2 Connected to the public 172.16.12.14
2 Connecting to a private cluster 10.1.1.2

At the end of the day, you need a viconati command ping 172.16.12.14і ping 10.1.1.2 z vuzla 1, that visconati command ping 172.16.12.12і ping 10.1.1.1 from university 2.

To reconsider the status of the names, check the team ping, vikoristovuchi yak argument іm'ya computer'you replace yo's IP-address. For example, how to reconvert the separate building for the first university in the cluster with hq-res-dc01, visit the team ping hq-res-dc01 from any client computer.

Retrieval of accessories to the domain

The efforts of the universities of the cluster are guilty of being members of the same domain and the ability to interconnect with the domain controller and DNS server. Universities can set up a server to a domain or a controller of one and the same domain. Whenever you check one of the universities as a domain controller, all of the cluster's universities are also responsible for setting up a domain controller. For all users it will be transferred, but for universities, it is the domain controllers.

Note: For otrimannya posilan on dodatkovu dokumentatsiyu schodo tune domains, DNS and DHCP services in Windows 2000 div. Linked resources for example a document.

  1. Click with the right mouse button My computer choose the command Power.
  2. Viber tab Merezheva identification... At the dialogue window The power of the system Wee shake outside of me computer to the domain. Our domain name is reskit.com.
  3. If you set up a university as an ordinary server, then on the whole stage you can bring it to the domain. Push the button Power that touch vkaz_vok, then bring the computer to the domain.
  4. Close the window The power of the systemі My computer.

stem regional record cluster services

For the service of clusters, it is necessary to set up a domain domain record, as soon as it starts. The program of the establishment of the requirement for the introduction of regional taxes for the service of clusters, which is the responsibility of the regional record, until the ear of the establishment of the service. Oblikovy is not guilty of being overwhelmed by any koristuvache domain, but is guilty of vicarists only for robotic clusters.

  1. Push the button Start, select a command Programs / Administration, run the snap-in.
  2. Rozgorn_ty category reskit.com I’m not open yet
  3. Vibrate on the list Users.
  4. Click the right mouse button on Users, vibrate at the context menu Make, Oberit Koristuvach.
  5. Enter the name for the regional record of the cluster, as shown on little 5, and press the button Dal.

Figure 5: Submission of Cluster

  1. Install the pawns Protect the password change with koristuvachі The term for the password is not enclosed... Push the button Dalі that button Ready, just shoot the koristuvach.

Note: As long as your administrative security does not allow vikoristovuyu passwords from the same term, you will be guilty of updating the password and configuring the service of clusters on the skin university until the end of the term of the yogh day.

  1. Klatsnit right key Misha on koristuvachev Cluster the right panel is equipped Active Directory - koristuvachi and computers.
  2. The context menu has a command Dodati participants to the group.
  3. Viber group Administrator and pressure OK... Now a new regional recording of the administrator's privilege on a local computer.
  4. Close the equipment Active Directory - koristuvachi and computers.

Nalashtuvannya disks zagalny annex.

Rejuvenation: Change, that on one of the cluster's universities the operating system Windows 2000 Advanced Server or Windows 2000 Datacenter Server is installed, as well as the correct cluster service is configured. As soon as possible, you can use the Windows 2000 operating system in other universities. As long as you don’t think about it, the disks of the cluster can be used.

Schob rozpochati nalashtuvannya disks in the outhouse annex, vimknit usi vuzli. In order to increase the distance to the school, and then to remove the university 1.

Drive quorum

The quorum disk is victorious for securing checkpoints and files in the log for updating the base of the cluster, for securing the kernel for the cluster. We have the following recommendations for closing the disk to quorum:

  • Create a small amount of money (shonaymenshe 50 MB), so that you can drive a quorum. We recommend that you create a quorum disk with a size of 500 MB.
  • See an okremium disk for the quorum resource. Oscillations in the case of a drive out of the way of the disk, the quorum will be returned to the robot of the entire cluster, we recommend that you use the hardware disk RAID array.

Before the hour of the establishment of clusters We are responsible for assigning a quorum to the letter disk. We will have a letter for our butt Q.

Configuring disks in the outhouse.

  1. Click with the right mouse button My computer, select a command Management... Please open the category Attach, scho forget.
  2. Vibrate team Disk management.
  3. Turn over, all the hard drives of the home memory are formatted in the NTFS system and the status Main... Yaksho Vee plug new disk, start automatically Meister recording and updating discs... If the mister starts up, press the button Onoviti, how to continue it to the robot, when the disk is played, it will be assigned Dynamic... To convert the disk to the basic one, click the right mouse button on Disk #(de # - the number of the disk, with the help of the command Turn up to the basic drive.

Click the right button on the mouse area Not rospodilno order from the drive.

  1. Vibrate team Create razdіl
  2. Run Meister rozdilu... Two push the button Dalі.
  3. Enter the size of the size in megabytes and press the button Dalі.
  4. Push the button Dalі, accepting the proponation for the promulgated drive letter
  5. Push the button Dalі for formatting and opening the section.

Assigning letters to disks

In addition, since the tire is given, the disks that have been distributed to the outboard attachment will not be stored, it is necessary to designate the disk laters for all disks in all disks in the cluster.

Note: Connection points - tse functional ability file system, as it allows you to install file system, vikoristovuchi іsnyuchі catalogs without the sign of the disk liter. Connection points are not accepted by clusters. Whether it is a calling disk, which is a cluster resource, it is guilty of failures on the NTFS partitions, as well as on the part of the disk drives.

  1. Click with the right button to click the required distribution and vibrate the command Zmіna lіteri disc and driveway disc.
  2. Select a new drive letter.
  3. Repeat lines 1 and 2 for all discs in the outhouse.

Figure 6: Growth of disks due to the signs of letters

  1. After the end of the procedure Keruvannya computer maє viglyadati, yak pictured on baby 6. Close the equipment Keruvannya computer.
  1. Push the button Start, Oberit Programs / Standard, and start the program “ Notebook".
  2. Collect a few words and save the file for im'yam test.txt by vibrating the command Save the yak from the menu File... Close up Notebook.
  3. Two click on the icon My document.
  4. Click the right mouse button on the file test.txt select the command in the context menu Copy.
  5. Close it up.
  6. View My computer.
  7. Two claps on the disk of the zagalny annex.
  8. Click the right mouse button and vibrate the command Insert.
  9. A copy of the file can be found on the disk of the spilny attachment test.txt.
  10. Two click on files test.txt, schob vіdkriti iogo from the disk of the zagalny annex. Close the file.
  11. See the file and click on the keyboard Del to see the file from the cluster disk.

Repeat the procedure for all cluster disks, scoops, and the stench is available from the first university.

Now we’ll get the first university, change the other university and repeat the rules Reverse robotics outside access to disks... Vikonayte ci kroki at all preschool universities. In addition, as you re-connect, all the universities can read and write information on the disks of the outbuilding, download all the universities, except for the first one, and go before the offensive break.

Press center

Cluster side with Windows 2000/2003 support. Croc by croc

Cluster - a whole group of two or more servers, which are specially designed for securing bezwidmovy robots a set of additional services or services that are connected with a client yak one element. Universities of the cluster will be able to co-ordinate with themselves for the help of hardware fenestration, socially victorious resources, which are distributed, and server software security.

Microsoft Windows 2000/2003 I introduced two technologies of clustering: clusters with balancing navantazhennya (Network Load Balancing) and clusters of servers.

At the first vipadku (clusters with balancing navantazhennya), the Network Load Balancing service provides services and additional power to the highest level of reliability and scalability for a single cluster of up to 32 servers. To feed from the clients in the middle of the universities of the cluster we will see through the rank. When a university is created, the cluster will automatically change its configuration and change the client to any of the available universities. The whole cluster configuration mode is also called active-active mode, if one program is working on several universities.

The server cluster has its own options for the middle of the cluster's servers, and the leather server has its own options. As soon as you see a new university in a cluster, then you can program the services that have been set up in a cluster, we can see how it will restart, whether it’s from a local university. Clusters of servers are used to store disks, which are distributed, to exchange data in the middle of the cluster, and to provide easy access to the cluster's services. For them, a special possession is not required, but the technology is given without a higher level of hope, but the cluster itself is not just one point of view. The whole cluster configuration mode is also called active-passive mode. Dodatok at the cluster of practice at one university because of the foreign gifts, which were promoted at the new school.

Cluster pidhid before organizing the internal hedge and such passes:

A high level of readiness Tobto, as soon as the service is available, or by programs on one of the universities of the cluster, set up for a spilny robot in the cluster, the cluster program allows you to restart the program on the other university. At the same time, you will see a short hour of coverage for an hour or so if you do not worry about the server slaughter. Scalability For additions, how to work at a cluster, adding servers to a cluster means an increase in the possibilities: efficiency, increased availability and so on.

From the statistics, I will try to review the progress of cluster systems based on Windows and the date is small in accordance with the code along the stem of a two-node cluster of servers with a collection of donations to be distributed.

Vimogi to software security

  • Microsoft Windows 2000 Advanced (Datacenter) Server or Microsoft Windows 2003 Server Enterprise Edition installed on all servers of the cluster.
  • DNS service has been installed. I will explain the Trochs. If you will be a cluster based on two domain controllers, you will be able to use the DNS service quickly, if you will, in any case, install it when Active Directory is closed. If you set up a cluster on the basis of two servers, members of the Windows NT domain, you will find yourself victorious about the WINS service, or enter the name and address of the machines in the hosts file.
  • Terminal Services for accessing servers. Not necessarily, but for the obviousness of Terminal Services, manually keruvati servers from your own work-related mission.

Vimogi to hardware security

  • The hardware for the cluster vuzle is more beautiful than the one that is rutted on the Cluster Service Hardware Compatible List (HCL). For Microsoft's recommendation, the hardware has been protesting against the confusion of Cluster Services.
  • As you can imagine, you need two servers, but you can use two hemmed adapters; SCSI adapter mazn_shn_y_interface for connection of a call array of data.
  • The so-called massif, scho maє two call interface... Leather from the universities of the cluster can be connected to one of the interfaces.

Note: for the root of a two-node cluster, there are two absolutely identical servers. It won't take you an hour to write on the first server, to analyze and update the robot of the main university. Another institution of higher education is trying to prevent the system from being uninvolved as a whole. However, this does not mean that the other server is simpler. Offense to the higher education institutions of the cluster can be quietly taking care of their right, virishuvati development. And the axis is a critical resource and can be set up on a robot in a cluster, which has increased its efficiency up to size.

Vimogi to nalashtuvan

  • Unique NetBIOS cluster.
  • Five unique static IP addresses. Two for bridging adapters for a cluster mesh, two for bridging adapters for a bridging mesh, and one for a cluster.
  • Domain domain record for Cluster Service.
  • Usi vuzli of the cluster may be either a member server in a domain, or controllers in a domain.
  • The skin server is guilty of two hedgehogs adapters. One for connecting to a social network (Public Network), the other for exchanging data between the cluster's universities (Private Network).

Note: According to Microsoft's recommendations, your server is guilty of two motherboard adapters, one for sleeping ones, the other for exchanging data in the middle of the cluster. Chi can be a cluster on one interface - melodiously, alas, I haven't tried it.

Inserting a cluster

With the design of a cluster of blame for the reason, you can use one physical boundary as a cluster exchange, as well as a local hedge, and you add a lot of information to all systems. In addition, for the cluster exchange it was given to the vicoristovuvati one pidmerezhu, I saw an okremiy physical element of the hemisphere. And for the local hemispheres, I will be victorious. Tim by yourself will improve the strength of the system as a whole.

Once a two-node cluster has been prompted, one commutator will be victorious sleeping... Two servers of the cluster can be connected between themselves with a cross-cable without a front, as shown on the little one.

Installation of a two-node cluster can be split by 5 crocs

  • Establishment and adjustment of universities in the cluster.
  • Installed and adjusted resource, scho distributed.
  • Reconfiguration of the disk configuration.
  • Establishment of the first university of the cluster.
  • Configuring another university at the cluster.

Tse pokrokoe kerіvnitstvo allow you to unicnuti pardons for the hour of the establishment and for the sacrifice of the hour. It's pretty much the same.

Establishment and adjustment of universities

Mi Trohi is understandable. Oskіlki all universities of the cluster are guilty of being participants in the domain, or controllers of the domain, then the root of the AD (Active Directory) directory is the first university of the cluster, on a new level of DNS service. Another vuzol of the cluster will be the right controller for the domain.

The installation of the operating system and I am ready to miss, vvazayuchi, in all you have no fault of problems. And I would like to clarify the axis of the configuration of the fringe annexes.

Nalashtuvannya festoon

Before vstanovleniya cluster and Active Directory must be configured. Effort to adjust the pattern I want to be divided into 4 stages. For the identification of the names of the hedge, the mother's DNS server is also provided with records about the servers of the cluster.

Leather server MAK DVI MEREZHNI KARTI. One stitch card will serve for the exchange of data between the universities of the cluster, another pracyuvatime on the clientele near our grid. Apparently, the first is called Private Cluster Connection, the other is called Public Cluster Connection.

Adjustment of mounting adapters for one server and for one identical server. As a matter of fact, I will show you how to install a hemstitch adapter and give a plate with the hemstitching of all 4 hemstitch adapters on both nodes of the cluster. To adjust the hemstitch adapter, you need the following crocs:

  • My Network Places → Properties
  • Private Cluster Connection → Properties → Configure → Advanced

    Tsey point vimagaє explain. On the right in that, following the Microsoft recommendations, on all the mesh adapters of the cluster universities, the optimal speed of the adapter robot was installed, as shown on the offensive little one.

  • Internet Protocol (TCP / IP) → Properties → Use the following IP: 192.168.30.1

    (For another university, pick the address 192.168.30.2). Enter the password mask 255.255.255.252. In the address of the DNS server for both universities, select the address 192.168.100.1.

  • Dodatkovo on the Advanced tab → WINS select Disabled NetBIOS over TCP / IP. To set up the hemline adapters, leave the item blank.
  • Find the same with the public Cluster Connection local hemlock card. Pick up the addresses at the tables. There is only one difference in the configuration of two pole cards in that for Public Cluster Connection it is not necessary to enable WINS mode - NetBIOS over TCP / IP.

To configure all of the mesh adapters on the cluster's universities, select the following plate:

Vuzol Merezheve Im'ya IP address MASK DNS Server
1 Public Cluster Connection 192.168.100.1 255.255.255.0 192.168.100.1
1 Private Cluster Connection 192.168.30.1 255.255.255.252 192.168.100.1
2 Public Cluster Connection 192.168.100.2 255.255.255.0 192.168.100.1
3 Private Cluster Connection 192.168.30.2 255.255.255.252 192.168.100.1

Inserting Active Directory

Oskіlki my article doesn’t know about the establishment of Active Directory, then I will omit the point. Riznih recommendations, books about the tse written in a few. You take domain name, at mycompany.ru, install Active Directory on the first university, add another university to the domain as a domain controller. If everything is broken, change the configuration of Active Directory servers.

Cluster User Account Insertion

  • Start → Programs → Administrative Tools → Active Directory Users and Computers
  • Give a new koristuvach, for example, ClusterService.
  • Set the files to: User Cannot Change Password and Password Never Expires.
  • Also, give the clerk to the group of administrators and give him the Log on as a service rights (the rights are assigned in the Local Security Policy that Domain Controller Security Policy).

Nalashtuvannya of the Calling Array of Danikh

For the establishment of a new array of data from the cluster, memory is required, before the establishment of Cluster Service at the universities, you must install disks on the new array, depriving you of the time to install the service of the cluster on the first If the order has been destroyed, you will become lost, if you do not reach the point. Chi can be vipraviti - mabut, so. If a pardon arrives, you will have an hour to fix it. Ale Microsoft is such a mysterious thing that you don’t know when you’re stepping on a rake. It's easier for your mother to cover the instructions and don't forget to press on the buttons. For the crocs, the configuration of the calling array of the viglyad is as follows:

  1. Offense to the servers, they are guilty but they are called out, and they have been sent to both servers.
  2. Vmikєmo the first server. Otrimєmo access to the disk array.
  3. Revised, schob called disk array was opened yak Basic. If this is not the case, then the disk is translated with the help of the Revert to Basic Disk option.
  4. Stvoryuєmo on new disk via Computer Management → Disk Management, a small distribution. For the recommendations of Microsoft, the fault is not less than 50 MB. I recommend installing the 500 MB share. some more. For the distribution of cluster tributes, the whole is sufficient. Rozdіl maє buti of formatting from NTFS.
  5. On both nodes of the cluster, the names will be distributed in one letter, for example Q. Apparently, when the distribution on the first server is opened, the item is vibrated Assign the following drive letter - Q.
  6. You can reshtu disk to grow up for your bazhannyam. It’s obvious that the NTFS file system is still well known. For example, when the DNS, WINS services are set up, the main bases of the services will be transferred to the external disk (not the system volume Q, but another one by you). І from mіrkuvan, you will be safe to use NTFS volumes.
  7. Zakryvamo Disk Management and re-access to the newly created distribution. For example, you can use it on a new text file test.txt, write that vidality. As soon as everything went well, then in the wake of the call of the first university they finished.
  8. Now Vimicaєmo is the first server. Zovnishniy array of maє buti inclusions. Including another server and reversing access to the opened partition. It is also reconsidered, schob litera, is designated for the first break, the bullet is identical to that of us, tobto Q.

At the end of the last configuration, the call is completed.

Cluster Service Software installation

Configuring the first university of the cluster

Before the start of the Cluster Service Software installation, all the universities of the cluster may be able to get involved, all the calls will be on the way. Let's move on to the configuration of the first university. The first server is enabled. The entire installation process is viewed with the help of the Cluster Service Configuration Wizard:


Configuring another university in the cluster

For the establishment and configuration of another university in the cluster, it is necessary that all lined discs boules are included. The procedure for setting up another university will be as bad as I described it. Protest, є small snakes. For the rest, use the following instructions:

  1. At the dialogue window Create or Join a Cluster vibrate The second or next node y cluster that natisnіt dalі.
  2. Enter the name of the cluster, as they were set earlier (for example, MyCluster), and the distance.
  3. When another university is connected to the Cluster Service Configuration Wizard, all installations are automatically taken from the main university. To start the Cluster Service, pick the name you did earlier.
  4. Enter the password for your email account and network data.
  5. The offensive dialogue wins Finish to complete the installation.
  6. Cluster service will be launched at another university.
  7. Close the Add / Remove Programs window.

For the establishment of additional universities in the cluster, follow the instructions.

Postscript, goodies

I will not get lost in the steps of installing the cluster, I will put up a small sign, at which all the main steps are displayed.

Croc Vuzol 1 Vuzol 2 The so-called array

TBVPFBFSH PRO PODOPK NBIYE HCE OE NPDOP
YMY DEMBEN LMBUFET CH DPNBYOYI HUMPCHYSI.

1.WhatDooYe

nOPZYE Y CHBU YNEAF CH MPLBMSHOPK UЄFY OEULPMSHLP Linux NBYO, U RTBLFYUEEULY CHUЄZDB UCHPVPDOSCHN RTPGEUUPTPN. FBLCE NOPZJE POMSCHIBMY P UYUFENBI, CH LPFPTSCHI NBIYOSCH PV'ЄDEOSAFUS CH PDYO UHRETLPNRSHAFET. OP TEBMSHOP NBMP LFP RTPVPCHBM RTPCHPDYFSH FBLYЄ ELURETYNEOFSCH X UЄVS PRO TBVPF YMY DPNB. dBCHBKFE RPRTPVKHEN CHNEUFE UPVTBFSH OEVPMSHIPK LMBUFET. RPUFTPYCH LMBUFET CHSCH UNPTSFE TEBMSHOP HULPTYFSH CHSCHRPMOEOYE YUBUFY YBDBYU. OBRTYNET LPNRIMSGYA YMY PODOPCHTENEOOHA TBVPFKH OEULPMShLJI TEUKHTUPENLY RTPGEUUPCH. h FPC UFBFSHE Z RPUFBTBAUSH TBUULBBFSH CHBN LBL NPTSOP VE' PUPVSHI HUIMIK PVYAEDEOIFSH NBIYOSCH UCHPEK MPLBMSHOPK UЄFY CH EDYOSCHK LMBUFET

2. LBL, UFP J ZDE.

MOSIX - LFP RBFYU DMS SDTB Linux U LPNRMELFPN HFIMIF, LPFPTSCHK RP'CHPMSEF RTPGEUUN U CHBIEK NBYOSCH RETEIPDYFSH (NYZTYTPChBFShKBKhDBFSH). chSFSH EZP NVCOP RP BDTEUKH HTTP://www.mosix.cs.huji.ac.il B TBURTPUFTBOSEFUS FOR CH YUІPDOSCHI LPDBI RPD MYGEOJEK GPL. RBFYUUHEEUFCHHAF DMS CHUEEЇ ZDIIT YU UVBVYMSHOPK CHEFLY Linux.

3. hUFBOPCHLB RTPZTBNNOPZP PVEUREUEOIS.

h OBYUBME HUFBOPCHLY IPYUKH RPTELPNEODPCHBFSH CHBN ABVYTBFSH U HMB MOSIX OE FPMSHLP ЄZP, OP Y UPRKHFUFCHHAEYЄ HFIMIFT - mproc, mexec J
h BTIYSHE MOSIX ЄUFSH HUFBOPCHPYUOSCHK ULTIRF mosix_install. e'БВХДШФЕ Ч PVS'BFEMSHOPN RPTSDLE TBURBLPCHBFSH YUІPDOSCHE LPSCH SDTB Ч /usr/src/linux-*.*.*, OBRTINET LBL UDEMBM S - CH /usr/src/linux'stall ЄZP CHOPRTPUSCH, KhLB'BCH ENKH UCHPK NEEDTSET ABZTHALY (LILO), RHFSH L YUIPDOILBN SDTB Y KhTPCHIY ABRKHULB.
rTY OBUFTKLE SDTB CHLMAYUIFE PRGY CONFIG_MOSIX, CONFIG_BINFMT_ELF TH CONFIG_PROC_FS. CHUE ЬFY PRGY RPDTPPVOP PRYUBOSCH CH THLPCHPDUFCHE RP HUFBOPCHLІ MOSIX.
HOOFBOPCHYMY? oH UFP TSE - RETEZTHTSBKFE CHBI Linux U OPCHSCHN SDTPN, OB'ЄBNY LPFPTPZP PYEOSH VHDEF RPIPTSE PRO mosix-2.2.13.

4.obUFTKLB

YOBYUBMSHOP HUFBOPCHMEOSCHK MOSIX UPLUCHENNYAOOOP OE BOBEF, LBLIE X CHBU NBIYOSCH CH UЄFY Y U LEN ENKH UPEDEOSFUS. OH B OBUFTBYCHBEFUS LFP PYUEOSH RTPUFP. eUMY CHCH FPMSHLP RPUFBCHYMY mosix Y EUMY CHBI DYUFTYVKHFYCH - SuSE YMJ RedHat - UPCHNEUFINSHK, FP ЬBІPDIFE CH LBFBMPZ /etc/rc.d/Init.d/init. RTY RETCHPN BRHULE FPF ULTYRF RTPUYF CHBU OBUFTPYFSH MOSIX Q 'BRHULBEF FELUFPCHSCHK TEDBLFPT LCA UPDBOYS ZHBKMPPPLPBPLPBPLPBLPBPLPBPLPBPLPBPLPBLPBRPLPBLP, 10000000, map fHDB RTPRYUSCHCHBEN: UMHYUBE W, X EUMY CHBU CHUEZP DCHE FTY-NBIYOSCH J YІ IP-BDTEUB UMEDHAF
ДТХЗ ЪБ ДТХЗПН RP OPNETBGY RYЄN FBL:



1 10.152.1.1 5

here RETCHSCHK RBTBNEFT PVP'OBYUBEF OPNET OBYUBMSHOPZP HMB, CHFPTPK - IP BDTEU RETCHPZP HMB Y RPUMEDOYK - LPMYUEUFCHP HUMPCH U FELHEESP. f. UEKYUBU X OBU H LMBUFETE PMHYUBEFUS RRFSH HUMPCH, IP BDTEUB LPFPTSCHK ЪBLBOYUYCHBAFUS PRO 1, 2, 3, 4 Y 5.
YMI DTHZPK RTYNET:

OPNET HMB IP LPMYUEUFCHP HMPCH U FELHEESP
______________________________________
1 10.152.1.1 1
2 10.150.1.55 2
4 10.150.1.223 1

h FPK LPOZHYZKHTBGY NSH RPMKHYUIN UMEDKHAYK TBULMBD:
IP 1-PZP H'MB 10.150.1.1
IP 2-PZP H'MB 10.150.1.55
IP 3-ПЗП ХЪМБ 10.150.1.56
IP 4-PZP H'MB 10.150.1.223
FERETSH OKHTSOP PRO CHUЇ NBIIOBI VHDHEEZP LMBUFETB HUFBOPCHIFSH MOSIX TH UPUDBFSH WHAT PDYOBLPCCHK LPOZHTBGYPOSCHK ZBKM /etc/mosix.map.

FERETSH RPUME RETEBRHULB mosix CHBIB NBYOB HTSE VKHDEF TBVPFBFSH CH LMBUFETE, SFP NVCOP HCHYDEFSH ABKHUFYCH NPOIFPT LPNBODPK mon. h UMKHYUBE, EUMY CHCH HCHYDIFE CH NPOIFPTE FPMSHLP UCHPA NBIYOKH YMY PVPVE OE HCHYDIFE OYLPZP, FP, LBL ZPCHPTYFUS - OBDP TSCHFSH. ULPTE CHUEZP X CHBU PIIVLB YNEOOP CH /etc/mosix.map.
OH PVF, HCHYDYMY, OP OE RPVEDYMY. SFP DBMShІ? b DBMSHI PYUEOSH RTPUFP :-) - OKHTSOP UPVTBFSH KHFIMYFSH DMS TBVPFSH U YNEOEOOOCHN / proc Yъ RBLEFB mproc. h YUBUFOPUFY H FPN RBLEFE YDEF OERMPІBS NPDYZHYLBGYS top - mtop, H LPFPTSCHK DPVBCHYMY CHP'NPTSOPUFSH PFPVTBTSEOYS H'MB (node), RP UPTFYTPCHLY H'MBN, RETEOPUB RTPGEUUB Y FELHEEZP H'MB ABM DTHZPK J HUFBOPCHMEOYS NYOYNBMSHOPK'BZTH'LY RTPGEUUPTB X 'MB, RPUME LPFPTPK RTPGEUUSCH OBYUYOBAF NYZTYTPCHBFSH PRO DTHZYE MOSIX - H'MSCH.
'BRHULBEN mtop, CHSCHVYTBEN RPOTBCHYCHIYKUS OE URSEYK RTPGEUU (TELPNEODHA'BRHUFYFSH bzip) Q UNEMP DBCHYN LMBCHYIH "g" PRO CHBIEK LMBCHYBFHTE, RPUME YUEZP CHCHPDYN PRO'BRTPU PID CHSCHVTBOOPZP H LBYUEUFCHE TSETFCHSCH RTPGEUUB Y'BFEN - OPNET H'MB, LHDB NShch ІPFYN ЄZP PFRTBCHYFSH. b ХЦЕ RPUME LFPZP CHOINBFEMSHOP RPUNPFTYFE PRO TEHMSHFBFSCH, PFPVTBTSBENSCHE LPNBODPK mon - FB NBIIOB DPMTSOB OBYUBFSH VTBFSH PRO UVS OBZTH.
b UPVUFCHEOOOP mtop - CH RPME #N PFPVTBTSBFSH OPNET HMB, HERE ON CHSCHRPMOSEFUS.
OP FFP EEE OE CHUE - CHESH CHBN RTBCHDB OE IPUEFUS PFRTBCHMSFSH PRO DTHZYE H'MSCH RTPGEUUCH CHTKHYUOHA? NOT OY BIPFEMPUSH. х MOSIX ЄUFSH OERMPIBS CHUFTFEOOBS VBMBOUYTPCHLB CHOKHFT LMBUFETB, LPFPTBS RPYCHPMSEF VPMEE-NEOE TBCHOPNETOP TBURTDEMSFSH OBZTHFN ODEH. dMS OBYUBMB Z TBUULBTSKH, LBL UDEMBFSH FPOLKHU OBUFTPCLH (tune) DMS DHHI HUMPCH LMBUFETB? CH RTPGEUE LPFPTPK MOSIX RPMHUBEF YOZHPTNBGYA P ULPTPUFSI RTPGEUUPTPCH Y UЄFY:
'BRPNOIFE TB' Y OBCHUEZDB - tune NVTSOP CHCHRPMOSFSH FPMSHLP Ch single-mode. yOBYUЄ CHSCH MYVP RPMKHYUIFE OE UPCHUEN LPTTELFOSCHK TEKHMSHFBF, MYVP CHBIB NBYOB NPTSEF RTPUFP YBCHYUOHFSH.
jFBL, CHCHRPMOSEN tune. RPUME RETECHPDB PRTBGYPOOPK UYUFENCH CH single - mode OBRTINET LPNBODPK init 1 YMJ init S ABRKHULBEN ULTIRF
YOFETZHEKUSCH Y 'BRHUFF MOSIX. rUME FPZP PRO PDOPK Y'NBIYO'BRKHULBEN tune, CHCHPDYN ENKH OPNET DTHZPZP H'MB DMS OBUFTKLY Y TSDEN TE'KHMSHFBFB - HFIMYFB DPMTSOB CHSCHCHDBFSH'BYUPYUPYUPE<ХЪЕМ>ABOUT DTHZPN HUME. UPVUFCHEOOOP PRETBGYA RTYDEFUS RPCHFPTYFSH PRO DTHZPN HME LPNBODPK tune -a<ХЪЕМ>, B TEKHMSHFBF YY YEUFY YUYUEM CHCHEUFY PRO RETCHSCHK H'ЄM. RPUME RPDPVOPZP FAOYOZB H CHBIEK UYUFENE DPMTSEO RPSCHYFUS ZHBKM / etc / overheads, UPDETTSBEYK YOZHPTNBGYA LCA MOSIX H CHDE OELYІ YUYUMPSCHІ RB UMHYUBE h, EUMY LBLYN RP-OP OU RTYYUYOBN tune UNPZ UDEMBFSH EZP, RTPUFP ULPRYTHKFE dv FELHEEZP LBFBMPZB ZHBKM mosix.cost W / etc / over ЛФП РПНПЦЕФ ;-).
RTY FAOYOSE LMBUFETB Y VMEE YUEN DHKHI NBYO OKHTSOP YURPMSHSPCHBFSH HFIMIFKH, LPFPTBS FBLCE RPUFBCHMSEFUS U MOSIX - tune_kernel. DBOOBS KHFIMYFB RPJCHPMSEF
CHBN CH VPMEE RTPUFFPN Y RTICHCHYUOPN CHYDE OBUFTPYFSH LMBUFET, PFCHEFYCH PRO OEULPMSHLP CHRTPUPCH Y RTPCHES FAOYOZ U DCHHNS NBYOBNIY LMBUFETB.
LUFBFY, RP UPVUFCHEOOOPNKH PRSCH NPZKH ULB'BFSH, UFP RTY OBUFTKLE LMBUFETB Z TELPNEODKHA CHBN OE 'BZTHTSBFSH UЄFSH, B OBPVPTPFU - BTPFU

5. HRTBCHMEOYE LMBUFETPN

dMS HRTBCHMEOIS HMPN LMBUFETB UHEEUFCHHEF OEVPMSHIPK OBVPT LPNBOD, ZBIRD LPFPTSCHI:

mosctl - LPOFTPMSh OBD H'MPN. RPJCHPMSEF YNNEOSFSH RBTBNEFTSCH HMB - FBLYЄ, LBL block, stay, lstay, delay Y F.D
dBCHBKFE TBUUNPFTINE OEULPMSHLP RBTBNEFTPCH LFPK HFIMIFYST:
stay - RPCHPMSEF POOFBOBCHMYCHBFSH NYZTBGYA RTPGEUUPCH PRO DTHZYE H'MSCH U FELHEЄK NBYOSCH. pFNEOSEFUS RBTBNEFTPN nostay YMJ -stay
lstay - EBRTEEBEF FPMSHLP MPLBMSHOSCHN RTPGEUUBN NYZTBGYA, B RTPGEUUCH U DTHZYI NBYO NPZHF RTPDPMTSBFSH LFP DEMBFSH. pFNEOSEFUS RBTBNEFTPN nolstay YMJ -lstay.
block - ABBTEEBEF HDBMEOOCHN / ZPUFECHSCHN RTPGEUUBN CHCHRPMOSFUS PRO LFPN HUME. pFNEOSEFUS RBTBNEFTPN noblock YMY -block.
bring - CHUCHTBEBEF PVTBFOP CHUЄ RTPGEUUCH U FELHEEZP HMB CHCHRPMOSENSHE PRO DTHZJI NBYOBI LMBUFETB. FFPF RBTBNEFT NPTSEF OE UTBVBFSCHBFSH, RPLB NYZTYTPCHBCHIYK RTPGEUU OE RPMKHYUIF RTETSCHBOYE PF UYUFENSCH.
setdelay HUFBOBCHMYCHBEF CHTENS, RPUME LPFPTPZP RTPGEUU OBYUYOBEF NYZTYTPCHBFSH.
CHESH UPZMBUIFEUSH - CH UMKHYUBE, EUMY CHTENS CHCHRPMOEOIS RTPGEUUB NEOSHI UELHODSCH UNSHCHUM RETEOPUIFSH EZP PRO DTHZYE NBYOSH UЄFY YUYUЪ NEOTEPK RTEINE:
mosctl setdecay 1 500 200
HUFBOBCHMYCHBEF CHTENS RETEIPDB PRO DTHZYE KHMSCH 500 NYMMYUELHOD CH UMKHYUBE, EUMY RTPGEUU ABRHEEO LBL slow J 200 NYMYUELHOD DMS fa. pVTBFIFE CHOINBOYE, UFP RBTBNEFT slow CHUЇZDB DPMTSEO VSCHFSH VPMShІ YMY TBCHEO RBTBNEFTH fast.

mosrun - ABRKHULBEF RTYMPTSEOYE CH LMBUFETE. OBRTINE mosrun -e -j5 make ABRKHUFE make PRO 5-PN HME LMBUFETB, RTY FPN CHUE EZP DPYTOE RTPGEUCH VKHDHF FBLCE CHSCHRPMOSFUS PRO 5-PN rtdebchendb
CH UMKHYUBE, EUMY DPYUЄTOЄ RTPGEUUCH CHCHRPMOSAFUS VSCHUFTЄYU YUEN HUFBOPCHMEOOBS HFYMYFPK X mosrun ЇЇ DPCHPMSHOP NOPZP TBMYUOSHI YOFCHTBTBNEFIP
POЇ CHSCH UNPTSEPHE Y THLPCHPDUFCHB RP ЬFPK HFYMIFE. (Man Mosrun)

mon - LBL NShch HTSE'OBEN, FP NPOYFPT LMBUFETB, LPFPTSCHK B RUECHDPZTBZHYYUEULPN CHYDE PFPVTBTSBEF'BZTH'LH LBTSDPZP TBVPYUEZP H'MB CHBIEZP LMBUFETB, LPMYYUEUFCHP UCHPVPDOPK Y'BOSFPK RBNSFY H'MPCH J CHSCHDBEF NOPZP DTHZPK, OE NEOEE YOFETEUOPK YOZHPTNBGYY.

mtop - NPDYZHYGYTPCHBOOBS DMS YURPMSHUPCHBOYS PRO H'MBI LMBUFETB CHETUYS LPNBODSCH top. PFPVTBTSBEF PRO LTBOЇ DYOBNYUEULKHA YOZHPTNBGYA P RTPGEUUBI, 'BRHEEOOOSCHI PRO DBOOPN HMI, Y HMBI, LKHDB NYZTYTPCHBMY CHB.

mps - FPCE NPDYZHYGYTPCHBOOBS CHETUYS LPNBODSCH ps. DPVBCHMEOP EEE PODOP RPME - OPNET HMB, PRO LPFPTSCHK NYZTYTPCHBM RTPGEUU.

ChPF PRO NVK CHJZMSD Y CHUE PUOPCHOSHE HFYMYFSH. about UBNPN DEM LPOEIOP NPTSOP PVPKFYUSH DBTS VE'OYI. OBRTINE YURPMSHHS DMS LPOFTPMS OBD LMBUFETPN / proc / mosix.
FBN LTPNE FPZP, UFP NVCOP OBKFY PUOPCHOKHA YOZHPTNBGYA P OBUFTKLBI KhMB, RTPGEUUBI ЪBHEEOOSHI U DTHZYI HUMPCH Y F.D., B FBN

6. BLURETENEOFYTHEN.

l UPTSBMEOYA, NOE OE HDBMPUSH ЪBUFBCHYFSH CHCHRPMOSFUS LBLPK-FP PDYO RTPGEUU PODOPCHTENEOOOP PRO OEULPMSHLYI HMBI. nBLUINKHN, UEZP Z DPUFIZ CH RTPGEUUE ELURETYNEOFFCH U LMBUFETPN-YURPMSHCHBOYE DMS CHCHRPMOEOIS TEUKHTUPENLYI RTPGEUUPCH PRO DTHZP
dBCHBKFE TBUUNPFTYN PDYO YJ RTYNETPCH:
dPRKHUFYN, UFP X OBU CH LMBUFETE TBVPFBAF DCHE NBIYOSCH (DCHB HMB), PDYO YL LPFPTSCHI U OPNETPN 1 (366 Celeron), DTHZPK - U OPNETPN-H OPNETPN 5 (PIII4 YFLUENTCHPHME) CHTENS RTUFBYCHBM. ;-)
yFBL 'BRHULBEN PRO 5-H H'ME HFYMYFH crark LCA RPDVPTB RBTPMS L rar BTІYChH.eUMY PFD Y'CHBU RTPVPCHBM TBVPFBFSH have RPDPVOSCHNY HFYMYFBNY, FP Software DPMTSEO'OBFSH, YUFP RTPGEUU RPDVPTB RBTPMS "LHIBEF" DP 99 RTPGEOFPCH RTPGEUUPTB. OH UFP TSE - RPUME ABKHULB NSC OBVMADBEN, UFP RTPGEUU POOFBEFUS PRO LFPN, 5-PN HUME. TBHNOP - CHESH YNEOOOP X LFPZP HMB RTPYCHPDIFEMSHOPUFSH RTECHSCHBEF 1-K X'ЄM RPYUFY CH DCHB TBBB.
dBMEE NSCH RTPUFP ABRKHUFIMY UVPTLH kde 2.0. UNPFTYN FBVMYGH RTPGEUUPCH J CHYDYN, YUFP crark HUREІOP NYZTYTPCHBM ABM H'ЄM 1-K, Q PUCHPVPDYCH RTPGEUUPT RBNSFSH (DB, DB - RBNSFSH b LBL FPMSHLP make BLPOYUYM UCHPA TBVPFH - crark CHETOHMUS PVTBFOP PRO TPDOPK ENH 5-K H'ЄM.
YOFETEUOSCHK ZhZHELF RPMHYUBEFUS, EUMI crark ABKHULBFSH PRO VPME NEDMEOOPN 1-N HME.
FBN NSC OBVMADBEN RTBLFYUEULY RTPFYCHPRPMPTSOCHK TEHMSHFBF - RTPGEUU UTBH-TCE NYZTYITKHEF PRO 5-K, VMІЄ VSCHUFTSCHK H'ЄM. rTY LFPN ON CHIPCHTBEBEFUS PVTBFOP, LPZDB ІПЫО RSFPPZP LPNRSHAFETB OBYUYOBEF LBLYЄ-FP DEKUFFCHYS U UYUFENPK.

7. YURPMSHUPCHBOYE

dBCHBKFE CH LPOGE TB'VETENUS, 'BYUEN Y LBL NSCH NPTSEN YURPMSHUPCHBFSH LMBUFET CH UCHPEK RPCHUEDOCHOPK TSYOY.
LCA OBYUBMB OHTSOP TB 'J OBCHUEZDB'BRPNOYFSH - LMBUFET CHSCHZPDEO FPMSHLP B FPN UMHYUBE, LPZDB B CHBIEK UEFY EUFSH OOPE LPMYYUEUFCHP NBIYO, LPFPTSCHE YUBUFEOSHLP RTPUFBYCHBAF J BL ІPFYFE YURPMSH'PCHBFSH Yі TEUHTUSCH OBRTYNET LCA UVPTLY KDE YMY LCA MAVSCHІ UETSHE'OSCHІ RTPGEUUPCH. chedsh VMBZPDBTS LMBUFETH YJ 10 NBIO NVTSOP PODOCHTENEOOOP
LPNRIMYITPCHBFSH DP 10 FSTSEMSCHI RTPZTBNN PRO FPN-TSE C ++. yMY RPDVYTBFSH LBLPK-FP RBTPMSh,
OE RTELTBEBS OY PRO UELHODKH LFPZP RTPGEUUB OEBCHYUYNP PF OBZTHAL PRO CHBI LPNRSHAFET.
dB J HSPEE - LFP RTPUFP YOFETEUOP ;-).

8. 'BLMAYEEOEE

h 'BLMAYUEOYE IPYUH ULBBFSH, UFP CH FPK UFBFSHE OE TBUUNPFTEOSCH CHUE CHUE CHUNPTSOPUFY MOSIX, F.L. З RTPUFP DP OYI ЇЇ OE DPVTBMUS. eUMY DPVETKHUSH - TSDIFE RTPDPMTSEOIS. :-)

The annual business processes of the bagatech companies are based on the information
technologies. For the growth of such deposition of organizations as robots for calculating
low availability of services at any hour and before be-at-the-job great
role. One computer can preserve the cob rage of hope
scale, maximum living conditions can be reached for the
One system of two or more computers - a cluster.

For what needs a cluster

Clusters are stuck in organizations, which require a
uninterrupted availability of services, if you want to interrupt in robots, not required
unacceptable. For in quiet vipadk, if there is a splash on the wall, there can be
do not fit main server, todi її to help compensate for additional
hostess who are inviting you to visit the institute. For a mail server
dozens and hundreds of thousands of pages per day, for a web server that will
online shops vicoristannya clusters duzhe bazhano. For koristuvach
a similar system to be overwhelmed with insight - the whole group of computers in Buda
viglyadati yak one server. Vikoristannya kilkoh, don't want to find the cheapest ones,
computers will allow you to correct the suttuvi perevagi in front of one
that with a clean server. The price is equal to the power supply,
the stance has been adjusted to changes, so when one element is added
use of the systems, scale, manual service and replacement
universities of the cluster, as well as a lot of them. Visiting one university automatically
to appear, and to renewed support, for the client it is still possible to lose
unremarkable.

Possibilities Win2k3

Apparently, one cluster of signs for increasing the availability of tributes,
інші - to ensure maximum productivity. The context of the statty of us
tsikavitimut MPP (Massive Parallel Processing)- clusters, in
programs of the same type can be accessed on a number of computers,
scale of services. Isnu kіlka technologies, which allow
support the installation of servers between the following servers: redirecting traffic,
translation address, DNS round robin, victoriannya special
program
, scho practice on applied rivn, on kshtalt web accelerators. Have
Win2k3, on the view from Win2k,
there are two types of clusters, which are based on additions and specifics
Danih:

1. NLB (Network Load Balancing) clusters- Bezpechuyut
scalability and high availability of services and data on the basis of TCP protocols
and UDP, combined into one cluster up to 32 servers with the same set of tributes,
which are selected by the same programs. Kozhen will feed the visonus yak
okrema transaction. Get stuck for robots with kits
Danih, on the basis of WWW, ISA, terminal services and other related services.

2. Server clusters- can combine up to eight universities, їх golovna
zabdannya - securing the availability of additional information before the hour is out of order. Stocked from active
passive universities. Passive vuzol for a part of an hour idle, playing a role
reserve of the main university. For additional programs є the possibility of setting up
a number of active servers that can be installed between them. Woozley offense
connected to a single storehouse of Danih. Server cluster vikoristovutsya for robots
with great obligations of tributes, which often fluctuate (mail, files and
SQL Server). Moreover, such a cluster cannot be formed from universities,
keruvannyam new options Win2k3: Enterprise or Datacenter ( Web versionі
Server cluster standard is not adaptable).

Have Microsoft Application Center 2000(and only) there is one kind
cluster - CLB (Component Load Balancing), what a great power
rozpodilu programs COM + mіzh kіlkoma servers.

NLB clusters

At the same time, the balancing of the skin protection from the hosts is reduced
a virtual mesh adapter with its own independent form of a real IP and MAC address.
The whole virtual interface is a cluster of yak single university.
zvertayutsya to new itself at the virtual address. Try to feed the skin
vuznoy cluster, ale obroblyayutsya only one. Start at all universities
Network Load Balancing Service
,
yaka, vikoristovuchi a special algorithm that doesn’t exchange data
universities, accept the solution, which is needed by that university to be energized or
ni. Vuzli exchange heartbeat-newcomers, show їх
availability. Yaksho the host has pinned the heartbeat to be a new university,
іnshі universities to fix convergence process, re
perezpodіlyayuchi navantazhennya. Balancing can be realized in one of two
modes:

1) unicast- unicast communication, if you replace the physical MAC
vikoristovaetsya MAC of the virtual adapter of the cluster. The cluster does not have any
You can exchange data between yourself, and you can use the MAC address or you can use it via IP
(for another adapter, not binding from a cluster);

At the boundaries of one cluster, there is only one of these regimes.

Can nalashtuvati a sprinkle of NLB-clusters on one mesh adapter,
having stated the specific rules of port. Such clusters are called virtual. Їx
You can ask for a request for a skin program, a university or an IP address
specific computers at the warehouse of the primary cluster, or blocking traffic for
good programs, do not stuck traffic for other programs
at the whole university. Anyway, navpaki, the NLB component can be bound up to
knitted adapters, which allow you to apply a low level of independent clusters on the skin
universities. It is also a slid of nobility, how to set up clusters of servers and NLB on one university
not squeamish, a bit of a stink in a fashionable way, from festooned outbuildings.

The administrator can set up a hybrid configuration,
reloads of both methods, for example, opening the NLB cluster and setting up a replica
danih mіzh universities. Ale replіkatsіya vikonutsya not zavdit, but inodі,
In addition, the information on the small universities will be available for one hour.

With the theory on the whole, of course, if you want to start the clusters, you can tell
still, pererakhoyuchi mozhlivosti and hauls increased, giving rise to
recommendations and options for specific implementation. All the subtle and nuances are overkill
for independent vivchennya that we will go to the practical part.

NLB cluster setup

For organizing NLB-clusters Dodatkov PZ not required, all
to be carried out by obvious means of Win2k3. For registration, support and monitoring
NLB cluster "The manager of the balance
(Network Load Balancing Manager)
, which is at the deposit
"Administration" "Control panels" (NLBMgr team). Fragments component
"Balancing the embellishment" stitch driver Windows,
the installation of NLB can be viewed with an additional component "Connecting",
to which access point is available. Ale is more beautiful than vikoristovuvati lishe pershy
option, immediately received by the NLB dispatcher and "Merezhevikh pidklyuchen"
can lead to incompatible results.

The NLB dispatcher allows you to set up keruvati in one motion at once
several clusters and universities.

You can also install an NLB cluster on a computer with one mesh
with an adapter, we will tie it with the component "Balancing the nesting of the hem"
In case of unicast mode, the NLB dispatcher on the whole computer cannot be
vikoristany for keruvannya by the other universities, but the universities themselves cannot be confused
one to one information.

Narazi wiklikєmo dispatcher NLB. We have no cluster, so it was declared
It's a good idea not to take revenge on the information. Vibiraєmo in the "Cluster" menu item "New" and
fix the fields in the "Cluster Parameters" window. At the field "Nalashtuvannya
IP-parameters of the cluster "enter the value of the virtual IP-address of the cluster, the mask
on the outside. The value of the virtual MAC address is set up
automatically. Trochs lower vibramo cluster robot mode: unicast abo
butoadresny. To brutalize respect for the ensign
all Microsoft documents it is strongly recommended not to be victorious in
unique problems associated with baking. Nature of slid zastosovuvati
dispatcher for information about the remote control, for example, tools
Keruvannya Windows (WMI). Yes, the decision about yogo victoriannya accepted, next
viconati all the proper come in to get the hedgehog,
firewall UDP port 1717 to 2504.

Writing all the fields of the onslaught is "Dal". At the window "IP-addresses of the cluster" when
the need for additional virtual IP-addresses, as there will be
vikoristovuvatisya cim cluster. At the offensive vіknі "Rules for ports" you can
set balance
vibration IP over UDP or TCP protocols, as well as block access to the cluster
ports (not to change the screen). For promoted cluster
Problyaє drink for all ports (0-65365); brighten the list of obmezhiti,
out of the box only if necessary. If you want, I don’t have to mess around,
it is possible to override all yak є. Before the speech, Win2k has all the traffic behind it,
straightening up to the cluster, having blotted out the vuzol, which is the most preferred priority,
The іnshі universities were connected only for going outside the main school.

For example, for IIS it is necessary to enable only port 80 (http) and 443 (https).
Moreover, it is possible to kill in such a way that, for example, the stolen
if there are no servers, on which a certificate is installed. For additional
the new rule of the onslaught, "Dodati", in the dialogue window,
The IP-addresses of the university, otherwise, if the rule is to be extended to all, then the
"All". At the fields "C" and "By" the range of ports will be set to the same value -
80. Key in the field є "Filtering Mode" - here
ask yourself if it will be powered up. There are three fields available to start the mode
Filtration: "Kilka vuzliv", "One university" and "Vimknut tsey range of ports".
Vibir "One vuzol" means, scho traffic, directing to the IP address (computer)
for a cluster) іf we set the number to the port, become an active university,
which is the lowest indicator of priority (about a new troch below). Viber "Vimknuti ..."
means that such traffic is visible to all the participants of the cluster.

In the filter mode "Dekilka vuzliv" you can add options
The value of the specific needs of the clients, so that you can direct the traffic from the given client to
to the same university of the cluster. There are three options: "Ні", "One" or "Klas"
C ". The vibe of the first means, well, whether it’s powered up, it’s okay
vuzol. Ale not slid yogo vikoristovuvati, as the rule of vibrano UDP protocol abo
"Offense". If you have selected any of the items, there is a selection of clients.
a specific IP or the range of hedgehog class C.

Otzhe, for our rule with the 80th port, we have a positive vibration on the option
"Kilka vuzliv - class C". The rule for 443 is remembered similarly, ale vikoristovu
"One university"
priority. If the dispatcher is inappropriate, it is not a rule to be
in advance of the newsletter, up to the date of the Windows podiatry magazine
vidpovidny record.

Distant keys to the university of the Maybut cluster, having entered the
Visual interface, which will be connected to the cluster. У вікні "Parameters
higher education institution "select from the list of priorities, specify the customization, given to Pochatkov
camp vuzla (pratsyuє, zupineno, prisupineno). Priority overnight
є a unique identifier of the university; less number, then more priority.
Vuzol with priority 1 є meister-server
packages and diyuchim yak routing manager.

Praporets "Save the camp by rewiring the computer"
If you want to rewrite the university, you will automatically enter it into the school. Pislya onslaught
on "Ready" at the Dispatcher's window, a record about a new cluster will appear, in which
є one university.
An offensive vuzol dodachi is just as easy. Vibiraєmo in the menu "Dodati vuzol" abo
"Connect to plugin", from the same computer
zd_ysnyuєtsya connection (win already enter before the cluster of chi ni). Let's go to the window
vkazuєmo іm'ya for the address of the computer, I have the right to connect enough, new
the university will be connected to the cluster. A small selection of icon navproti yogo imeni bude
if the process of convergence is completed, it will be
the first computer

So, as the dispatcher visualizes the authorities of the universities at the time of his connection,
clarification of the flow line slid vibrate cluster in the context menu item
"Onoviti". The dispatcher will connect to the cluster and the updated data will be shown.

Pislya establishment NLB cluster do not forget to change the DNS record, schob
dialed imeni now pointing to the IP cluster.

Server lockup

At such a configuration, all servers will be entangled on a parity basis (with a blame
option "One university"). For some people, it is necessary to renew and update
Most of the robots have gone to one of the universities (for example, the best one).
One hundred percent of the cluster, the rules of writing can be changed if you vibrate in
the context menu, which appears when the attack is on im'ya, the item "Cluster Power".
Here are available all nalashtuvannya, about how they talked about. Menu item
"Vuzla Vlastivosti" has given much more opportunities. At the "University parameters"
it is possible to change the value of the priority of a specific vibrating university. At the "Rules
for ports "it is not possible to see the rule, it is not available at all.
cluster Ale, having made the redaction of a specific rule, I can
scoriguvati deyaki nalashtuvannya. So, with the established filter mode
"Kilka vuzliv" the item "Assessment of new options" is now available,
pererozpodіliti navantazhennya for a specific university. A great-priest was appointed for the deputies
"Rivna", ala in "Otsіntsі navantazhennya" can be used for
a specific institution of higher learning at all sorts of out-of-town entrances of the cluster. Yakshcho active mode
filter "One university" new parameter"Priority
obrob ". Vikoristovuchi yogo, you can build it like that traffic to the singing port
before we will become one university of the cluster, and before the last one -
vuzom.

Magazine

Yak moving before, the component "Balancing the nesting of the hem" I will write down everything
dії that change the cluster in the log podіy Windows. Shcheb їkh pachiti,
vibraєmo "Review pod_y - System"
Windows Load Balancing Service, as the service was called in NT). Besides, in
the dispatcher will be asked if he / she is left with information about the pardon
that about all the changes in the configuration. For the suggestions, the information is not
zberіgaєatsya. Vaughn was written to the file, then vibrate "Parameters ->
Parameters to the magazine "
file. New file will be opened at the catalog of your regional record in Documents
and Settings.

Nalashtovuєmo IIS from replication

Cluster is a cluster, but without service, it is not possible to win. Tom dodamo IIS (Internet
Information Services)
... IIS server log in to the Win2k3 warehouse, ale, please call to
At least the possibility of attacks on the server is not possible.

There are two ways to install IIS: with the help of the "Control Panel" or
role manager given server... Clearly first. Go to
Control Panel - Add or
Remove Programs), select "Add / Remove Windows"
Components). Now we pass to the item "Dodatkiv Server"
IIS "everything is required. For the promising work directory of the server є \ Inetpub \ wwwroot.
IIS installers can display static documents.

Get ready for the project - please, dyakuyu!
Read also
Yak vypraviti pomilki with a tunnel near Hamachi - zhovtiy trikutnik and blue gurtok Yak vypraviti pomilki with a tunnel near Hamachi - zhovtiy trikutnik and blue gurtok What is robiti, what is GTA V galmaє? What is robiti, what is GTA V galmaє? Graєmo over the Internet in іgri HOTSEAT (not for one PC, but for free) Graєmo over the Internet in іgri HOTSEAT (not for one PC, but for free)