In the Linux operating system, you can build DB2 pureScale on a virtual machine, so what are the steps to set up? What is the use of DB2 pureScale? Let's take a look at how Linux systems deploy DB2 pureScale on virtual machines.
basic information of DB2 pureScale
DB2 pureScale DB2 is a new optional feature that allows you to & ldquo; Duplex (active-active) & rdquo; configuration database Scale to a set of servers to deliver a high level of availability and scalability. In this configuration, a DB2 copy running on each host (or server) can read and write the same data at the same time.
Each member of the data sharing group can pass a very effective InfiniBand? The network interacts directly with the PowerHA pureScale components, as shown in the following figure. This means that each member establishes a point-to-point (P2P) connection with a centralized lock and cache device.
pureScale reduces the risk and cost of business growth by providing unlimited capacity, continuous availability, and application program transparency. DB2 pureScale delivers unparalleled database scalability and availability levels on UNIX or x86 systems. All test steps in this paper have been verified and tested under CenOS7.0.
DB2 pureScale features are as follows:
1) Nearly unlimited capacity
You can easily add machines to the cluster to scale out your system. The DB2 pureScale Feature scales to include 128 members and has a centralized management tool that supports efficient scale-out. It uses a technique called Remote Direct Memory Access (RDMA) to provide an efficient inter-node communication mechanism to aid its expansion.
2) Application transparency
You can use existing applications as they are. Applications running in a DB2 pureScale environment do not need to know the different members of the cluster or the data partitions. The DB2 pureScale Feature automatically routes applications to the most appropriate members.
The DB2 pureScale Feature provides native support for the large amount of syntax used by other database vendors, allowing these applications to run in a DB2 pureScale environment with minimal or no change. In fact, in many cases, you can realize the benefits of the DB2 pureScale Feature without modifying your application.
3) Continuous Availability
The DB2 pureScale Feature provides an active-active architecture with internal redundancy. If a member fails, you can continue to process the remaining active members. During a failure, only the data modified on the failed member is temporarily unavailable until database recovery is completed for the set of data. This approach is the exact opposite of other competing solutions, where the entire system may freeze during database recovery.
4) Lower Total Cost of Ownership
The DB2 pureScale Feature reduces TCO because the interface handles the deployment and maintenance of integrated components, which reduces the steep learning curve associated with some competing technologies.
First, the prerequisites for deployment
Each physical machine has the following characteristics:
It exists on a public network that supports client connections.
It has a 10 Gigabit Ethernet card for high-speed, low-latency communication between members and CF. 10 Gigabit Ethernet also supports RDMA over Ethernet.
It has a shared connection to a set of universal disks.
Second, purescale installation environment preparation work
1. 1. Ensure that SSH (no password) is set at the root level in all physical machines participating in the DB2 pureScale cluster. You can pass the cluster. Issue the following command between the machines to verify the SSH configuration and make sure it returns a valid hostname without any prompts:
# ssh "target machine" hostname
The installer will set the instance during instance setup Level SSH.
2. At least 10 GB of free space on each machine's /tmp and /var file systems;
3. Ensure that all filesets are installed as part of the OS installation. , gcc, gcc-c++, kernel source, binutils, libstdc++ 32/64-bit files.
4. Identify the disk to be used by the DB2 pureScale Feature
5. Simulate the virtual disk and build the nfs server
#service iptables stop
#setenforce 0
#yum install nfs*
# yum install portmap rpcbind
#Install nfs client configuration to share resources #vi /etc/exports
/cbusdb *(rw,sync)
/cbusdblog *(rw,sync)
Starting nfs server
service rpcbind start
service nfs start
#出口资源
exportfs -rv
#Show all shared volumes on NFS server
showmount -e
Mount the shared directory
[root@cbusdb02 /]# mount 192.168.1.122:/cbusdb /cbusdb[root@cbusdb02 /]# mount 192.168.1.122:/cbusdblog /cbusdblog If you use the command showmount -e 192.168 .1.122 shows the following error:
clnt_create: RPC: Port mapper failure - Unable to receive: errno 113 (No route to host) says The firewall is open, please close the firewall or open the corresponding port
6. Modify the host name #vi /etc/hosts
#vi /etc/sysconfig/network
NETWORKING= Yes
HOSTNAME=Hostname
#hostname Hostname
7.Setting ssh trust
ssh-keygen -t dsa
Copy the contents of the id_dsa.pub file of the three hosts to the authorized_keys file in the .ssh directory, and put the authorized_keys in the .ssh directory of the three hosts. 8. Install db210.5# to check whether the firewall is enabled
#sestatus -vIf you open it, please edit the following file
#vi /etc/selinux/config
#设置selinux=disabled
#install yum install compat- Libstdc++
#Start installing db2purescale
#./db2_install
#Select the server version and select the feature with purescale
3. After the installation is complete
1. Create a file system for data and logs separately:
#"DB2 Install Path"/bin/db2cluster -cfs -create -filesytem data -disk /dev/sde
#"DB2 Install Path"/bin/db2cluster -cfs -create -filesytem log -disk /dev/sdf
DB2 in this deployment The installation path will be /opt/ibm/db2/V9.8. Data and log file systems are created by default under /db2fs and are accessible on all hosts in a DB2 pureScale instance.
2.Create an instance:
#/opt/ibm/db2/V10.1/instance/db2icrt -d -cf cbusdb21 -cfnet cbusdb21 -ib0 -m cbusdb22 -mnet cbusdb22 -ib0 -instance_shared_dev /dev/dm-3 -tbdev /dev/dm-4 -u db2sdfe1 db2sdin1
3. Add members and CF:
#opt/ibm/db2/V10.5/Instance/db2iupdt -d -add -cf cbusdb22 -cfnet cbusdb22-ib0 db2sdin1
#addmember
#/opt/ibm/db2/V10.5/instance/db2iupdt -d -add -m cbusdb22 -mnet cbusdb22-ib0 db2sdin1
#/opt/ibm/db2/V10.5/instance/db2iupdt -d -add -m cbusdb23 -mnet cbusdb23-ib0 db2sdin1
4 Modify the file system owner to the DB2 instance owner so that it has full access to the file system:
In this example, db2sdin1 is the name of the instance owner and db2iadm1 is the instance owner's group name.
#chown db2sdin1:db2iadm1 /db2fs/data
#chown db2sdin1:db2iadm1 /db2fs/log
5.Start the DB2 instance by issuing the db2start command
You can see the status of a DB2 pureScale instance at any point using the db2instance command.
#db2start
10/03/2014 11:02:08 0 0 SQL1063N DB2STARTprocessing was successful.
10/03/2014 11:02:08 1 0 SQL1063N DB2STARTprocessing was successful.
SQL1063N DB2START processing was successful.
6. You can use the db2instance -list command to view the status of a DB2 pureScale cluster
7.Create a database and log Moving to the log file system must run the following command from the member host (not the CF host):
#db2 create db testdb on /db2fs/data
The above is the virtual machine in the Linux system. The method of building DB2 pureScale is introduced. It is necessary to know whether your system meets the deployment prerequisites during deployment to prevent deployment errors.
What should I do if the Linux server is attacked? In fact, dont worry, the method of rejecting forei
As a beginner of Linux terminal, there is a lot of knowledge to learn. In addition
If the Linux server has a bash shell vulnerability, it may cause the remote attacker operating syste
When doing Linux system operation, sometimes the compressed file is too large, it is inconvenient to
The role of the Linux system pwd command
How to deal with the database disappeared after modifying the root password of mysql under Linux?
Linux Ubuntu tab key auto-completion command method
Suggestions for Linux system desktops
How to verify SHA1 and MD5 in Linux system?
Red Flag Linux System FTP Configuration Tips
What should I do if the Fedora 18 DNSenum shows IP garbled?
Steps to install KVM virtual machine in CentOS5.5
Usage summary of chkconfig command under Linux
How to use AWK regular expressions under Linux system
Linux system how to switch the foreground process and background process
Windows 7 Tips: Speed up system boot and shutdown speed
Win8 otaku house female digital online shopping life
Swf to avi format converter quick start tutorial
Win8 always has four solutions for black screen after booting up
How does Win7 use the cmd command to turn off network sharing?
Win10 Preview 14251 Update Rollup
Notes installed WIN7 system (2)
Win XP system recovery needs to pay attention to the thirteen major aspects
Win8 Optimization Master 1.0 official version download: One-click activation backup came to