SlideShare a Scribd company logo
Windows Server 2008 R2 Failover
 Clustering and Network Load
           Balancing




                    October 25th 2009
Agenda
     Introduction to Clustering
        What is cluster
        Why use cluster
        Cluster common terminology
        What is High Availability
        Hardware / Software Requirements
        Cluster Validations / Cluster Creations.
     Introduction to WNLB
         Overview of Network Load Balancing Clusters
         Configuring a Network Load Balancing Cluster
         Maintaining a Network Load Balancing Cluster
3
What Are Clusters?

    A cluster is a group of computers and storage devices that work
    together and that you can access as a single system

    The individual computers in a cluster act together to provide:

      • Distribution of processing load
      • Automatic recovery from failure of one or more components
        in the cluster




4
Discussion: Why Use Clusters?
     Can you realize a return on investment when you
     deploy an expensive cluster?
     What issues might you encounter when network
     services are not available?
     Which services would you make highly available?




5
Clustering Terminology
Term             Description
Node             A server that participates in a cluster
Resource         A device or service hosted on a cluster and
                 accessed directly or indirectly by the application
                 or end user
Failover         An highly available clustering type with
clustering       resources owned by a single server at a time
Load balancing   A clustering type that distributes processing
                 across a number of nodes
Fault tolerant   A key component of clusters that withstands
                 problems in hardware or software while
                 continuing to operate
Planned          The amount of time an application is unavailable
downtime         due to an update or other maintenance
Unplanned        The critical amount of time an application is
downtime         unavailable due to a component failure
What is High Availability?
    The world is now a 24/7 global marketplace
    Systems must be online or customers are lost
    Goal of high availability (HA) is to keep
    systems, applications, services, email, databases, f
    iles & printers readily available
    Every business now has high availability needs
      Uptime Percentage   Maximum downtime per year
           99.999                 5 minutes
           99.99                 52 minutes
            99.9                  8.7 hours
             99                   3.7 days


7
Why is HA Important?
     Server downtime is unavoidable
     Keep your business running and competitive
     Servers may go offline due to
       Maintenance
       Upgrade
         Software or Hardware
       Update
         Hot Fix, Security Patch
       Accident
       Power Outage
       Disasters
     Start planning now!
8
Introduction to Failover Clustering
     Introduction to Clustering
        What is cluster
        Why use cluster
        Cluster common terminology
        What is High Availability
        Hardware / Software Requirements
        Cluster Validations / Cluster Creations.
     Introduction to WNLB
         Overview of Network Load Balancing Clusters
         Configuring a Network Load Balancing Cluster
         Maintaining a Network Load Balancing Cluster
9
Failover Clustering
       2+ machines (nodes)
       Redundancy everywhere
        Storage, NICs, HBAs, MPIO, etc.
       “Shared” storage accessible by all nodes
       1 node will host a HA application
       Application writes data to storage




10
Failover Clustering
       Nodes monitor health of other nodes
       If that node fails, health monitoring will
       cause a “failover” of the resource
       Another node starts the application and
       reads the last saved information from the
       storage
       Clients experience a slight interruption in
       service


11
What is a Failover Cluster?
                     Public

                      HA Roles




                     Shared
                     Storage




12
Terminology Changes
      Beta   1997   2000   2003   2008   R2




13
Software Requirements
       Clustering comes as an in-box feature on:
         Windows Server 2008 & R2 Datacenter
         Windows Server 2008 & R2 Enterprise
         Windows Server 2008 & R2 for IA-64
         Microsoft Hyper-V Server 2008 R2
         Windows Unified Data Storage Server Enterprise
       Architecture:
         x64: up to 16 nodes
         x86: up to 8 nodes
         IA64: up to 8 nodes


14
Building Your Cluster
      2 or more computers (nodes)
      2 NICs + dedicated storage adapter
        3rd NIC for iSCSI
        HBA
      3 Networks
        Public
        Private (heartbeat)
                                   HA Roles
        Storage / iSCSI
      Shared Storage
      OS, Service or Application
15
Mix And Match Hardware
      You can use any hardware configuration if
        It passes Validate
        Each component has a “Certified for Windows Server 2008”
        logo
           Servers, Storage, HBAs, MPIO, DSMs, etc…
      It’s that simple!
        Connect your Windows Server 2008 logo’d hardware
        Pass every test in Validate
           It is now supported!
        If you make a change, just re-run Validate

      Details: http://go.microsoft.com/fwlink/?LinkID=119949

16
Clustering Storage
           Windows Server 2008/R2 Supported
                    Shared Bus Types:

       Fibre Channel     iSCSI          SAS


      • SCSI-3 SPC-3 compliant SCSI Commands
      • Persistent Reservations (PRs)
      • Parallel-SCSI deprecated in 2008
      • Multipath IO (MPIO) recommended
      • Basic GPT and MBR disks supported
17
Networking
      Key clustering component
        Public network – clients
        Private network – cluster communication
        Storage network – nodes access “shared” storage
      Multiple networks for added redundancy
      Integrated with new TCP/IP Stack
      Full IPv6 Support
      DHCP Support for IPv4 and IPv6 Resources
      Nodes can reside in different subnets

18
Introduction to Failover Clustering
      Introduction to Clustering
         What is cluster
         Why use cluster
         Cluster common terminology
         What is High Availability
         Hardware / Software Requirements
         Cluster Validations / Cluster Creations.
      Introduction to WNLB
          Overview of Network Load Balancing Clusters
          Configuring a Network Load Balancing Cluster
          Maintaining a Network Load Balancing Cluster
19
Validating a Cluster
      For Microsoft support, cluster must pass the built-in
      Validate a Cluster Configuration (Validate) test
      Run during configuration and/or after deployment
        Best practices analyzed if run on configured cluster

      Series of end-to-end tests on all cluster components
         Configuration info for support and documentation
         Networking issues
         Troubleshoot in-production clusters

      More information
      http://go.microsoft.com/fwlink/?LinkID=119949
20
Validate Inventories
        OS Binary     • Same OS version which supports clustering
                      • Same Hotfix and Service Pack level
       Consistency

                      • CPU architecture
       Architecture   • Memory information



                      • Domain membership and role
      Configuration   • Analysis of unsigned drivers



                      • PnP device inventory
        Devices       • HBAs and NICs


21
Validate Verifies
                       • Inter-node communication
      Infrastructure   • SCSI compatibility with Persistent Reservations


                       • Multiple NIC’s per server
        Hardware       • Shared disks accessible from all machines and
                         uniquely identifiable


                       • Each NIC has different IP address on a dissimilar
        Software         subnet



                       • Network and Disk I/O latencies
      Functionality    • Failover simulation


22
WS03 – Cluster Creation




24
WS08 & R2 – Cluster Creation




25
Windows Network Load Balancing
     (WNLB)
      Overview of Network Load Balancing Clusters
      Configuring a Network Load Balancing Cluster
      Maintaining a Network Load Balancing Cluster




27
What Is Network Load Balancing (NLB)?

     NLB:
      • Enables high availability and scalability for Internet
       server-based applications
      • Enables clients to access two or more servers using a single
        IP address
      • Requires all servers in the NLB cluster to be running the
        same server applications with the same configuration




28
How NLB Works
     When using NLB:
      • All servers in an NLB cluster are accessible by using a single
        (virtual) IP address
      • Client requests are distributed across available servers in
        the NLB cluster based on a common algorithm
      • All servers monitor each other through heartbeat messages
      • If a server fails to send heartbeat messages for 5 seconds,
       the other servers automatically converge and redistribute
       the client connections across the available servers




29
How Network Load Balancing
     Clusters Work    NLB Web server cluster




                           NLB host +
                           IIS server




                                               LAN (Ethernet)
                           NLB host +
                           IIS server
       Clients




                           NLB host +
                           IIS server




30
Using Failover Clusters with
     Network Load Balancing



       Clients
                                Failover cluster
                                database server
                     NLB
                  Web servers


31
Microsoft® Windows Server® 2008
     NLB Features
     • Network connectivity with support for:
            - IPv6
            - Network Driver Interface Specification (NDIS) 6.0
            - Multiple dedicated IP addresses per node
     • Support for up to 32 computers per cluster
     • Denial of service attack and timer starvation protection
     • Support for rolling upgrades from Windows Server 2003
     • Network Load Balancing Manager




32
NLB Deployment Requirements
      To deploy network load balancing:
       Configure one or more network cards on all servers in
        the cluster
       Configure DNS to resolve the shared IP address
       Install and configure the same applications on all
        hosts in the cluster
       Deploy servers with similar hardware or plan for
        variations in load balancing
       Install the Network Load Balancing feature



33
Considerations for Configuring NLB
     Clusters and Hosts
     When configuring an NLB cluster, you should consider
     whether:
     • Each server will host the same number of client connections
     • The client will connect to the same server for all connections

     • The cluster will operate the same way for all applications
     • Your network switches support unicast or multicast operations




35
Comparing Unicast and Multicast
NLB Cluster Operation Modes
The cluster operation mode is used to ensure that all cluster hosts receive all
incoming client requests sent to the virtual IP address assigned to the cluster

   Method                                      Description
                • All cluster hosts share an identical unicast media access control
                  (MAC) address

    Unicast     • The outgoing MAC address is modified, based on the cluster host’s
                  priority setting, to prevent switches from discovering that all cluster
                  hosts have the same MAC address

                • Each cluster host retains the original adapter MAC address
   Multicast    • The adapter is assigned a multicast MAC address, which is shared by
                  all cluster hosts
Options for Configuring Host
Parameters
 Parameter            Description

 Priority             • Specifies a unique ID for each host

                      • Used to assign one server to handle all network
                       traffic not covered by a port rule

 IP address           • Must be unique in the cluster

 Subnet mask          • Must be the same for all hosts

 Initial host state   • Specifies whether NLB will start and whether the
                       host will immediately join the cluster
What Are Port Rules?
     Port rules are policies that define how to direct client requests to cluster hosts
     A default port rule applies to all protocols


     Port rules define:
       • The cluster IP address where the port rule is applied

       • Port range and protocol (TCP, UDP, or both)

       • Filtering for multiple hosts with affinity or single host

       • Load weight

       • The option to disable a port range



38
What Is Affinity?
     Affinity is a configuration option that you use to distribute
     incoming client connections

     Affinity options include:
      • None: Allows multiple connections from the same client IP
        address to be handled by different cluster hosts
      • Single: Specifies that NLB direct multiple requests from
        the same client IP address to the same cluster host
      • Network: Specifies that NLB directs multiple requests from
        the same IPv4 Class C or IPv6 network address range to
        the same cluster host



39
Resources
      Cluster Team Blog: http://blogs.msdn.com/clustering/
      Cluster Information Portal:
      http://www.microsoft.com/windowsserver2008/en/us/clustering-home.aspx
      Clustering Technical Resources:
      http://www.microsoft.com/windowsserver2008/en/us/clustering-resources.aspx
      Clustering Forum (2008): http://forums.technet.microsoft.com/en-
      US/winserverClustering/threads/
      Clustering Forum (2008 R2): http://social.technet.microsoft.com/Forums/en-
      US/windowsserver2008r2highavailability/threads/
      Clustering Newsgroup:
      https://www.microsoft.com/technet/community/newsgroups/dgbrowser/en-
      us/default.mspx?dg=microsoft.public.windows.server.clustering
      Failover Clustering Deployment Guide: http://technet.microsoft.com/en-
      us/library/dd197477.aspx
      TechNet: Configure a Service or Application for High Availability:
      http://technet.microsoft.com/en-us/library/cc732478.aspx
      TechNet: Installing a Failover Cluster: http://technet.microsoft.com/en-
      us/library/cc772178.aspx
      TechNet: Creating a Failover Cluster: http://technet.microsoft.com/en-
      us/library/cc755009.aspx
      Webcast: TechNet Webcast: Build High-Availability Infrastructures with Windows Server
      2008 Failover Clustering
40
41
42
http://tinyurl.com/STEP140

More Related Content

What's hot

VMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep DiveVMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep Dive
VMworld
 
VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014
David Davis
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3
Vepsun Technologies
 
Integrating OpenStack to Existing infrastructure
Integrating OpenStack to Existing infrastructureIntegrating OpenStack to Existing infrastructure
Integrating OpenStack to Existing infrastructure
laurabeckcahoon
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep Dive
VMworld
 
2015 03-26 cloud platform master class for cloudplatform 4 5 - public
2015 03-26 cloud platform master class for cloudplatform 4 5 - public2015 03-26 cloud platform master class for cloudplatform 4 5 - public
2015 03-26 cloud platform master class for cloudplatform 4 5 - public
Citrix
 
VMworld 2016 - INF8036 - enforcing a vSphere cluster design with powercli aut...
VMworld 2016 - INF8036 - enforcing a vSphere cluster design with powercli aut...VMworld 2016 - INF8036 - enforcing a vSphere cluster design with powercli aut...
VMworld 2016 - INF8036 - enforcing a vSphere cluster design with powercli aut...
Duncan Epping
 
Xen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationXen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentation
Nuno Alves
 
Xen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationXen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentation
solarisyougood
 
Christian ferver xen server_6.1_overview
Christian ferver xen server_6.1_overviewChristian ferver xen server_6.1_overview
Christian ferver xen server_6.1_overview
Digicomp Academy AG
 
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualVMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
Sanjeev Kumar
 
12 christian ferber xen_server_advanced
12 christian ferber xen_server_advanced12 christian ferber xen_server_advanced
12 christian ferber xen_server_advanced
Digicomp Academy AG
 
VMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG - NSX Architettura e Design
VMUG - NSX Architettura e Design
VMUG IT
 
VMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSANVMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSAN
Duncan Epping
 
2015 02-10 xen server master class
2015 02-10 xen server master class2015 02-10 xen server master class
2015 02-10 xen server master class
Citrix
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld
 
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld
 
VMworld 2017 Core Storage
VMworld 2017 Core StorageVMworld 2017 Core Storage
VMworld 2017 Core Storage
Cormac Hogan
 

What's hot (18)

VMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep DiveVMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep Dive
 
VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3
 
Integrating OpenStack to Existing infrastructure
Integrating OpenStack to Existing infrastructureIntegrating OpenStack to Existing infrastructure
Integrating OpenStack to Existing infrastructure
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep Dive
 
2015 03-26 cloud platform master class for cloudplatform 4 5 - public
2015 03-26 cloud platform master class for cloudplatform 4 5 - public2015 03-26 cloud platform master class for cloudplatform 4 5 - public
2015 03-26 cloud platform master class for cloudplatform 4 5 - public
 
VMworld 2016 - INF8036 - enforcing a vSphere cluster design with powercli aut...
VMworld 2016 - INF8036 - enforcing a vSphere cluster design with powercli aut...VMworld 2016 - INF8036 - enforcing a vSphere cluster design with powercli aut...
VMworld 2016 - INF8036 - enforcing a vSphere cluster design with powercli aut...
 
Xen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationXen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentation
 
Xen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationXen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentation
 
Christian ferver xen server_6.1_overview
Christian ferver xen server_6.1_overviewChristian ferver xen server_6.1_overview
Christian ferver xen server_6.1_overview
 
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualVMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
 
12 christian ferber xen_server_advanced
12 christian ferber xen_server_advanced12 christian ferber xen_server_advanced
12 christian ferber xen_server_advanced
 
VMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG - NSX Architettura e Design
VMUG - NSX Architettura e Design
 
VMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSANVMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSAN
 
2015 02-10 xen server master class
2015 02-10 xen server master class2015 02-10 xen server master class
2015 02-10 xen server master class
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
 
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
 
VMworld 2017 Core Storage
VMworld 2017 Core StorageVMworld 2017 Core Storage
VMworld 2017 Core Storage
 

Viewers also liked

Day1 track4 session1_mdt2010_kaliyan
Day1 track4 session1_mdt2010_kaliyanDay1 track4 session1_mdt2010_kaliyan
Day1 track4 session1_mdt2010_kaliyan
Kaliyan S
 
Cardiochirurgia Coronarie
Cardiochirurgia   CoronarieCardiochirurgia   Coronarie
Cardiochirurgia CoronarieAndrea Scotti
 
Exchange 2010 ha ctd
Exchange 2010 ha ctdExchange 2010 ha ctd
Exchange 2010 ha ctd
Kaliyan S
 
Cardiochirurgia Aorta Arco
Cardiochirurgia   Aorta   ArcoCardiochirurgia   Aorta   Arco
Cardiochirurgia Aorta Arco
Andrea Scotti
 
Acute Gastrointestinal Emergencies
Acute Gastrointestinal EmergenciesAcute Gastrointestinal Emergencies
Acute Gastrointestinal Emergencies
Andrea Scotti
 
Tm meeting roles abbas
Tm meeting roles abbasTm meeting roles abbas
Tm meeting roles abbas
Abbas Kudrati
 
Attracting Millennials to Your Company
Attracting Millennials to Your CompanyAttracting Millennials to Your Company
Attracting Millennials to Your Company
Preston D. Cameron
 
Bowel Obstruction
Bowel ObstructionBowel Obstruction
Bowel Obstruction
Andrea Scotti
 

Viewers also liked (8)

Day1 track4 session1_mdt2010_kaliyan
Day1 track4 session1_mdt2010_kaliyanDay1 track4 session1_mdt2010_kaliyan
Day1 track4 session1_mdt2010_kaliyan
 
Cardiochirurgia Coronarie
Cardiochirurgia   CoronarieCardiochirurgia   Coronarie
Cardiochirurgia Coronarie
 
Exchange 2010 ha ctd
Exchange 2010 ha ctdExchange 2010 ha ctd
Exchange 2010 ha ctd
 
Cardiochirurgia Aorta Arco
Cardiochirurgia   Aorta   ArcoCardiochirurgia   Aorta   Arco
Cardiochirurgia Aorta Arco
 
Acute Gastrointestinal Emergencies
Acute Gastrointestinal EmergenciesAcute Gastrointestinal Emergencies
Acute Gastrointestinal Emergencies
 
Tm meeting roles abbas
Tm meeting roles abbasTm meeting roles abbas
Tm meeting roles abbas
 
Attracting Millennials to Your Company
Attracting Millennials to Your CompanyAttracting Millennials to Your Company
Attracting Millennials to Your Company
 
Bowel Obstruction
Bowel ObstructionBowel Obstruction
Bowel Obstruction
 

Similar to Win2k8 cluster kaliyan

VMworld 2014: The Software-Defined Datacenter, VMs, and Containers
VMworld 2014: The Software-Defined Datacenter, VMs, and ContainersVMworld 2014: The Software-Defined Datacenter, VMs, and Containers
VMworld 2014: The Software-Defined Datacenter, VMs, and Containers
VMworld
 
Linux12 clustering onlinux
Linux12 clustering onlinuxLinux12 clustering onlinux
Linux12 clustering onlinux
Jainul Musani
 
What's New in RHEL 6 for Linux on System z?
What's New in RHEL 6 for Linux on System z?What's New in RHEL 6 for Linux on System z?
What's New in RHEL 6 for Linux on System z?
IBM India Smarter Computing
 
Iaas on xcp
Iaas on xcpIaas on xcp
Creating Microservices Application with IBM Cloud Private (ICP) - ICP Archite...
Creating Microservices Application with IBM Cloud Private (ICP) - ICP Archite...Creating Microservices Application with IBM Cloud Private (ICP) - ICP Archite...
Creating Microservices Application with IBM Cloud Private (ICP) - ICP Archite...
PT Datacomm Diangraha
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master class
Citrix
 
Introduction to failover clustering with sql server
Introduction to failover clustering with sql serverIntroduction to failover clustering with sql server
Introduction to failover clustering with sql server
Eduardo Castro
 
FAILOVER
FAILOVERFAILOVER
FAILOVER
Piyush Kumar
 
Dimension data cloud for the enterprise architect
Dimension data cloud for the enterprise architectDimension data cloud for the enterprise architect
Dimension data cloud for the enterprise architect
David Sawatzke
 
TechWiseTV Workshop: HyperFlex 3.0
TechWiseTV Workshop: HyperFlex 3.0TechWiseTV Workshop: HyperFlex 3.0
TechWiseTV Workshop: HyperFlex 3.0
Robb Boyd
 
Cisco HyperFlex 3.0
Cisco HyperFlex 3.0Cisco HyperFlex 3.0
Cisco HyperFlex 3.0
Chase Rothe
 
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...
VMworld
 
CloudStack Overview
CloudStack OverviewCloudStack Overview
CloudStack Overview
sedukull
 
SQL Server Cluster Presentation
SQL Server Cluster PresentationSQL Server Cluster Presentation
SQL Server Cluster Presentation
webhostingguy
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
Information Technology
 
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...
Hendrik van Run
 
LinuxONE cavemen mmit 20160505 v1.0
LinuxONE cavemen mmit 20160505 v1.0LinuxONE cavemen mmit 20160505 v1.0
LinuxONE cavemen mmit 20160505 v1.0
Marcel Mitran
 
Txlf2012
Txlf2012Txlf2012
Txlf2012
Joe Brockmeier
 
CloudStack Architecture
CloudStack ArchitectureCloudStack Architecture
Ha
HaHa

Similar to Win2k8 cluster kaliyan (20)

VMworld 2014: The Software-Defined Datacenter, VMs, and Containers
VMworld 2014: The Software-Defined Datacenter, VMs, and ContainersVMworld 2014: The Software-Defined Datacenter, VMs, and Containers
VMworld 2014: The Software-Defined Datacenter, VMs, and Containers
 
Linux12 clustering onlinux
Linux12 clustering onlinuxLinux12 clustering onlinux
Linux12 clustering onlinux
 
What's New in RHEL 6 for Linux on System z?
What's New in RHEL 6 for Linux on System z?What's New in RHEL 6 for Linux on System z?
What's New in RHEL 6 for Linux on System z?
 
Iaas on xcp
Iaas on xcpIaas on xcp
Iaas on xcp
 
Creating Microservices Application with IBM Cloud Private (ICP) - ICP Archite...
Creating Microservices Application with IBM Cloud Private (ICP) - ICP Archite...Creating Microservices Application with IBM Cloud Private (ICP) - ICP Archite...
Creating Microservices Application with IBM Cloud Private (ICP) - ICP Archite...
 
2014-09-15 cloud platform master class
2014-09-15 cloud platform master class2014-09-15 cloud platform master class
2014-09-15 cloud platform master class
 
Introduction to failover clustering with sql server
Introduction to failover clustering with sql serverIntroduction to failover clustering with sql server
Introduction to failover clustering with sql server
 
FAILOVER
FAILOVERFAILOVER
FAILOVER
 
Dimension data cloud for the enterprise architect
Dimension data cloud for the enterprise architectDimension data cloud for the enterprise architect
Dimension data cloud for the enterprise architect
 
TechWiseTV Workshop: HyperFlex 3.0
TechWiseTV Workshop: HyperFlex 3.0TechWiseTV Workshop: HyperFlex 3.0
TechWiseTV Workshop: HyperFlex 3.0
 
Cisco HyperFlex 3.0
Cisco HyperFlex 3.0Cisco HyperFlex 3.0
Cisco HyperFlex 3.0
 
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...
VMworld 2015: The Future of Software- Defined Storage- What Does it Look Like...
 
CloudStack Overview
CloudStack OverviewCloudStack Overview
CloudStack Overview
 
SQL Server Cluster Presentation
SQL Server Cluster PresentationSQL Server Cluster Presentation
SQL Server Cluster Presentation
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
 
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...
2689 - Exploring IBM PureApplication System and IBM Workload Deployer Best Pr...
 
LinuxONE cavemen mmit 20160505 v1.0
LinuxONE cavemen mmit 20160505 v1.0LinuxONE cavemen mmit 20160505 v1.0
LinuxONE cavemen mmit 20160505 v1.0
 
Txlf2012
Txlf2012Txlf2012
Txlf2012
 
CloudStack Architecture
CloudStack ArchitectureCloudStack Architecture
CloudStack Architecture
 
Ha
HaHa
Ha
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

Win2k8 cluster kaliyan

  • 1.
  • 2. Windows Server 2008 R2 Failover Clustering and Network Load Balancing October 25th 2009
  • 3. Agenda Introduction to Clustering What is cluster Why use cluster Cluster common terminology What is High Availability Hardware / Software Requirements Cluster Validations / Cluster Creations. Introduction to WNLB Overview of Network Load Balancing Clusters Configuring a Network Load Balancing Cluster Maintaining a Network Load Balancing Cluster 3
  • 4. What Are Clusters? A cluster is a group of computers and storage devices that work together and that you can access as a single system The individual computers in a cluster act together to provide: • Distribution of processing load • Automatic recovery from failure of one or more components in the cluster 4
  • 5. Discussion: Why Use Clusters? Can you realize a return on investment when you deploy an expensive cluster? What issues might you encounter when network services are not available? Which services would you make highly available? 5
  • 6. Clustering Terminology Term Description Node A server that participates in a cluster Resource A device or service hosted on a cluster and accessed directly or indirectly by the application or end user Failover An highly available clustering type with clustering resources owned by a single server at a time Load balancing A clustering type that distributes processing across a number of nodes Fault tolerant A key component of clusters that withstands problems in hardware or software while continuing to operate Planned The amount of time an application is unavailable downtime due to an update or other maintenance Unplanned The critical amount of time an application is downtime unavailable due to a component failure
  • 7. What is High Availability? The world is now a 24/7 global marketplace Systems must be online or customers are lost Goal of high availability (HA) is to keep systems, applications, services, email, databases, f iles & printers readily available Every business now has high availability needs Uptime Percentage Maximum downtime per year 99.999 5 minutes 99.99 52 minutes 99.9 8.7 hours 99 3.7 days 7
  • 8. Why is HA Important? Server downtime is unavoidable Keep your business running and competitive Servers may go offline due to Maintenance Upgrade Software or Hardware Update Hot Fix, Security Patch Accident Power Outage Disasters Start planning now! 8
  • 9. Introduction to Failover Clustering Introduction to Clustering What is cluster Why use cluster Cluster common terminology What is High Availability Hardware / Software Requirements Cluster Validations / Cluster Creations. Introduction to WNLB Overview of Network Load Balancing Clusters Configuring a Network Load Balancing Cluster Maintaining a Network Load Balancing Cluster 9
  • 10. Failover Clustering 2+ machines (nodes) Redundancy everywhere Storage, NICs, HBAs, MPIO, etc. “Shared” storage accessible by all nodes 1 node will host a HA application Application writes data to storage 10
  • 11. Failover Clustering Nodes monitor health of other nodes If that node fails, health monitoring will cause a “failover” of the resource Another node starts the application and reads the last saved information from the storage Clients experience a slight interruption in service 11
  • 12. What is a Failover Cluster? Public HA Roles Shared Storage 12
  • 13. Terminology Changes Beta 1997 2000 2003 2008 R2 13
  • 14. Software Requirements Clustering comes as an in-box feature on: Windows Server 2008 & R2 Datacenter Windows Server 2008 & R2 Enterprise Windows Server 2008 & R2 for IA-64 Microsoft Hyper-V Server 2008 R2 Windows Unified Data Storage Server Enterprise Architecture: x64: up to 16 nodes x86: up to 8 nodes IA64: up to 8 nodes 14
  • 15. Building Your Cluster 2 or more computers (nodes) 2 NICs + dedicated storage adapter 3rd NIC for iSCSI HBA 3 Networks Public Private (heartbeat) HA Roles Storage / iSCSI Shared Storage OS, Service or Application 15
  • 16. Mix And Match Hardware You can use any hardware configuration if It passes Validate Each component has a “Certified for Windows Server 2008” logo Servers, Storage, HBAs, MPIO, DSMs, etc… It’s that simple! Connect your Windows Server 2008 logo’d hardware Pass every test in Validate It is now supported! If you make a change, just re-run Validate Details: http://go.microsoft.com/fwlink/?LinkID=119949 16
  • 17. Clustering Storage Windows Server 2008/R2 Supported Shared Bus Types: Fibre Channel iSCSI SAS • SCSI-3 SPC-3 compliant SCSI Commands • Persistent Reservations (PRs) • Parallel-SCSI deprecated in 2008 • Multipath IO (MPIO) recommended • Basic GPT and MBR disks supported 17
  • 18. Networking Key clustering component Public network – clients Private network – cluster communication Storage network – nodes access “shared” storage Multiple networks for added redundancy Integrated with new TCP/IP Stack Full IPv6 Support DHCP Support for IPv4 and IPv6 Resources Nodes can reside in different subnets 18
  • 19. Introduction to Failover Clustering Introduction to Clustering What is cluster Why use cluster Cluster common terminology What is High Availability Hardware / Software Requirements Cluster Validations / Cluster Creations. Introduction to WNLB Overview of Network Load Balancing Clusters Configuring a Network Load Balancing Cluster Maintaining a Network Load Balancing Cluster 19
  • 20. Validating a Cluster For Microsoft support, cluster must pass the built-in Validate a Cluster Configuration (Validate) test Run during configuration and/or after deployment Best practices analyzed if run on configured cluster Series of end-to-end tests on all cluster components Configuration info for support and documentation Networking issues Troubleshoot in-production clusters More information http://go.microsoft.com/fwlink/?LinkID=119949 20
  • 21. Validate Inventories OS Binary • Same OS version which supports clustering • Same Hotfix and Service Pack level Consistency • CPU architecture Architecture • Memory information • Domain membership and role Configuration • Analysis of unsigned drivers • PnP device inventory Devices • HBAs and NICs 21
  • 22. Validate Verifies • Inter-node communication Infrastructure • SCSI compatibility with Persistent Reservations • Multiple NIC’s per server Hardware • Shared disks accessible from all machines and uniquely identifiable • Each NIC has different IP address on a dissimilar Software subnet • Network and Disk I/O latencies Functionality • Failover simulation 22
  • 23.
  • 24. WS03 – Cluster Creation 24
  • 25. WS08 & R2 – Cluster Creation 25
  • 26.
  • 27. Windows Network Load Balancing (WNLB) Overview of Network Load Balancing Clusters Configuring a Network Load Balancing Cluster Maintaining a Network Load Balancing Cluster 27
  • 28. What Is Network Load Balancing (NLB)? NLB: • Enables high availability and scalability for Internet server-based applications • Enables clients to access two or more servers using a single IP address • Requires all servers in the NLB cluster to be running the same server applications with the same configuration 28
  • 29. How NLB Works When using NLB: • All servers in an NLB cluster are accessible by using a single (virtual) IP address • Client requests are distributed across available servers in the NLB cluster based on a common algorithm • All servers monitor each other through heartbeat messages • If a server fails to send heartbeat messages for 5 seconds, the other servers automatically converge and redistribute the client connections across the available servers 29
  • 30. How Network Load Balancing Clusters Work NLB Web server cluster NLB host + IIS server LAN (Ethernet) NLB host + IIS server Clients NLB host + IIS server 30
  • 31. Using Failover Clusters with Network Load Balancing Clients Failover cluster database server NLB Web servers 31
  • 32. Microsoft® Windows Server® 2008 NLB Features • Network connectivity with support for: - IPv6 - Network Driver Interface Specification (NDIS) 6.0 - Multiple dedicated IP addresses per node • Support for up to 32 computers per cluster • Denial of service attack and timer starvation protection • Support for rolling upgrades from Windows Server 2003 • Network Load Balancing Manager 32
  • 33. NLB Deployment Requirements To deploy network load balancing:  Configure one or more network cards on all servers in the cluster  Configure DNS to resolve the shared IP address  Install and configure the same applications on all hosts in the cluster  Deploy servers with similar hardware or plan for variations in load balancing  Install the Network Load Balancing feature 33
  • 34.
  • 35. Considerations for Configuring NLB Clusters and Hosts When configuring an NLB cluster, you should consider whether: • Each server will host the same number of client connections • The client will connect to the same server for all connections • The cluster will operate the same way for all applications • Your network switches support unicast or multicast operations 35
  • 36. Comparing Unicast and Multicast NLB Cluster Operation Modes The cluster operation mode is used to ensure that all cluster hosts receive all incoming client requests sent to the virtual IP address assigned to the cluster Method Description • All cluster hosts share an identical unicast media access control (MAC) address Unicast • The outgoing MAC address is modified, based on the cluster host’s priority setting, to prevent switches from discovering that all cluster hosts have the same MAC address • Each cluster host retains the original adapter MAC address Multicast • The adapter is assigned a multicast MAC address, which is shared by all cluster hosts
  • 37. Options for Configuring Host Parameters Parameter Description Priority • Specifies a unique ID for each host • Used to assign one server to handle all network traffic not covered by a port rule IP address • Must be unique in the cluster Subnet mask • Must be the same for all hosts Initial host state • Specifies whether NLB will start and whether the host will immediately join the cluster
  • 38. What Are Port Rules? Port rules are policies that define how to direct client requests to cluster hosts A default port rule applies to all protocols Port rules define: • The cluster IP address where the port rule is applied • Port range and protocol (TCP, UDP, or both) • Filtering for multiple hosts with affinity or single host • Load weight • The option to disable a port range 38
  • 39. What Is Affinity? Affinity is a configuration option that you use to distribute incoming client connections Affinity options include: • None: Allows multiple connections from the same client IP address to be handled by different cluster hosts • Single: Specifies that NLB direct multiple requests from the same client IP address to the same cluster host • Network: Specifies that NLB directs multiple requests from the same IPv4 Class C or IPv6 network address range to the same cluster host 39
  • 40. Resources Cluster Team Blog: http://blogs.msdn.com/clustering/ Cluster Information Portal: http://www.microsoft.com/windowsserver2008/en/us/clustering-home.aspx Clustering Technical Resources: http://www.microsoft.com/windowsserver2008/en/us/clustering-resources.aspx Clustering Forum (2008): http://forums.technet.microsoft.com/en- US/winserverClustering/threads/ Clustering Forum (2008 R2): http://social.technet.microsoft.com/Forums/en- US/windowsserver2008r2highavailability/threads/ Clustering Newsgroup: https://www.microsoft.com/technet/community/newsgroups/dgbrowser/en- us/default.mspx?dg=microsoft.public.windows.server.clustering Failover Clustering Deployment Guide: http://technet.microsoft.com/en- us/library/dd197477.aspx TechNet: Configure a Service or Application for High Availability: http://technet.microsoft.com/en-us/library/cc732478.aspx TechNet: Installing a Failover Cluster: http://technet.microsoft.com/en- us/library/cc772178.aspx TechNet: Creating a Failover Cluster: http://technet.microsoft.com/en- us/library/cc755009.aspx Webcast: TechNet Webcast: Build High-Availability Infrastructures with Windows Server 2008 Failover Clustering 40
  • 41. 41
  • 42. 42