ABOUT ME

-

Today
-
Yesterday
-
Total
-
  • IBM AIX GPFS 구성하는 방법(1)
    System of Infra/Unix System 2021. 7. 11. 17:28
    반응형

    AIX로고이미지

    IBM AIX GPFS 구성하는 방법(1)

    [test_svr01:root]/>ssh-keygen -t rsa
    Generating public/private rsa key pair.
    Enter file in which to save the key (//.ssh/id_rsa):
    Enter passphrase (empty for no passphrase):
    Enter same passphrase again:
    Your identification has been saved in //.ssh/id_rsa.
    Your public key has been saved in //.ssh/id_rsa.pub.
    The key fingerprint is:
    SHA256:F/3I4qOKTZG8zfnPUgefdfyMh8iSIe1VHH8q2e8OP/0 root@test_svr01
    The key's randomart image is:
    +----[RSA 3072]-----+
    | ...               |
    | . o.              |
    | .. .. .o          |
    | . .. ooo= .=      |
    | + Soo==++*o       |
    | = ++.+.*.+        |
    | o + oo ...o       |
    | + o.o =.          |
    | . o.. .oo .E      |
    +-----[SHA256]------+
    
    [test_svr02:root]/>ssh-keygen -t rsa
    Generating public/private rsa key pair.
    Enter file in which to save the key (//.ssh/id_rsa):
    Created directory '//.ssh'.
    Enter passphrase (empty for no passphrase):
    Enter same passphrase again:
    Your identification has been saved in //.ssh/id_rsa.
    Your public key has been saved in //.ssh/id_rsa.pub.
    The key fingerprint is:
    SHA256:lMG0y1dCzhsKjcvGsggDY6+RzGz0o+ByBv8E6vzZ424 root@test_svr02
    The key's randomart image is:
    +---[RSA 3072]----+
    | oo .            |
    | o.B             |
    |oo o = = .       |
    |B.+ o = o =      |
    |=B.+. = S o      |
    |+*+o.+ .         | 
    |o+= o            |
    |+o ooE           |
    | o.o=+.          |
    +----[SHA256]-----+

    -> GPFS는 공유 파일 시스템으로 사용하는 것이 목적이기 때문에 노드 간의 ssh 공개키 교환을 통해서 패스워드 여부를 물어보지 않고 서로 간에 통신이 되어야 합니다. 사전에 노드 간에 공개키 교환을 하기 위해 생성해주도록 합니다.

    [test_svr01:root]/.ssh>ls -ltr
    -rw-r--r-- 1 root system 172 Jun 09 20:59 known_hosts
    -rw-r--r-- 1 root system 566 Jul 10 20:19 id_rsa.pub
    -rw------- 1 root system 2602 Jul 10 20:19 id_rsa
    [test_svr01:root]/.ssh>cat id_rsa.pub >> authorized_keys
    [test_svr01:root]/.ssh>ls -ltr
    -rw-r--r-- 1 root system 172 Jun 09 20:59 known_hosts
    -rw-r--r-- 1 root system 566 Jul 10 20:19 id_rsa.pub
    -rw------- 1 root system 2602 Jul 10 20:19 id_rsa
    -rw-r--r-- 1 root system 566 Jul 10 20:29 authorized_keys
    
    [test_svr01:root]/.ssh>cat id_rsa.pub
    ssh-rsa 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 root@test_svr01
    [test_svr01:root]/.ssh>cat authorized_keys
    ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDnPhXHxrsNoRu1ogWNEKyjPfA3LLUpTJYN5c268u2FTnF0xNRRvNSRVluBQV4PVR2q0zYSYZ44MsaXxOwaectF9vhAOp0LSDVJP/wwJOhXDhBD/cY3NY/jETPaLAagM33S4Brdj81ggx6hWABjFaH1ziKxhnEAYcufuUN08Cnv/bF7jSHRF65i78V4FcZ9Qkfv9yHpKTvHRbT/XV8EdGRyg19p75STr4sUKCLUXRtRfRhrw5rmVdYrmBlUV3PFUa8E10r1OhQ48kn4eNt2JATgV2/i59QDm0PNqgQdhlwBtEG+KU3RPor6ovPi8sdhlSgSte0meiGLjvPqPfVjZHpBFaKB5WxczAHq87y3NLfSvsOT0qsLPhd2SAc6ooskTbkaaDUiKoUpMfWqdXhSh4c3yeN60868FNB9KnzoxB8GFqr/vIfilV80W1mnFB2ZfBiO8oeaP45IkyhsjJpjPVCnZizAY5ORNyjWUHbTcgHvc1kZMPeRT1C0ZQvih2vMvPs= root@test_svr01
    
    [test_svr02:root]/.ssh>ls -ltr
    -rw-r--r-- 1 root system 566 Jul 10 20:22 id_rsa.pub
    -rw------- 1 root system 2602 Jul 10 20:22 id_rsa
    [test_svr02:root]/.ssh>cat id_rsa.pub >> authorized_keys
    [test_svr02:root]/.ssh>ls -ltr
    -rw-r--r-- 1 root system 566 Jul 10 20:22 id_rsa.pub
    -rw------- 1 root system 2602 Jul 10 20:22 id_rsa
    -rw-r--r-- 1 root system 566 Jul 10 20:32 authorized_keys
    
    [test_svr02:root]/.ssh>cat id_rsa.pub
    ssh-rsa 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 root@test_svr02
    [test_svr02:root]/.ssh>cat authorized_keys
    ssh-rsa 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 root@test_svr02

    -> 서버#1,2호기에서 각각의 rsa 공개키를 생성한뒤 해당 키 내용을 authorized_keys 이름으로 복사본을 생성해주도록 합니다.

    [test_svr01:root]/.ssh>cat authorized_keys
    ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDnPhXHxrsNoRu1ogWNEKyjPfA3LLUpTJYN5c268u2FTnF0xNRRvNSRVluBQV4PVR2q0zYSYZ44MsaXxOwaectF9vhAOp0LSDVJP/wwJOhXDhBD/cY3NY/jETPaLAagM33S4Brdj81ggx6hWABjFaH1ziKxhnEAYcufuUN08Cnv/bF7jSHRF65i78V4FcZ9Qkfv9yHpKTvHRbT/XV8EdGRyg19p75STr4sUKCLUXRtRfRhrw5rmVdYrmBlUV3PFUa8E10r1OhQ48kn4eNt2JATgV2/i59QDm0PNqgQdhlwBtEGKU3RPor6ovPi8sdhlSgSte0meiGLjvPqPfVjZHpBFaKB5WxczAHq87y3NLfSvsOT0qsLPhd2SAc6ooskTbkaaDUiKoUpMfWqdXhSh4c3yeN60868FNB9KnzoxB8GFqr/vIfilV80W1mnFB2ZfBiO8oeaP45IkyhsjJpjPVCnZizAY5ORNyjWUHbTcgHvc1kZMPeRT1C0ZQvih2vMvPs= root@test_svr01
    ssh-rsa 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 root@test_svr02
    
    [test_svr02:root]/.ssh>cat authorized_keys
    ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDknOMWu0uNxsjkE8qqC12ZAXw5PihvKc8/TbZ1tvmsBL28RLwxExYcNGJzX1Po88eRSyQnjQh4Fda4/gd0rbkM1/FDtfnqXOf/pCqnyXqB3MKJFTeKBZxYeP57HxxiZmZvuilO6f9LMRr6p4IRH7nDaAOJmPzsiWKAUwdf8/OxJALa8zC0J4ecI7qVFigGhXz2Q6WthJxQckzdk15NF1RbwTS0RC6c2mBOolucc8DT1/EYxxlF7Z1RM3PAnM59mvvPEtTi/U5GwKo69FKrAhxEwvTciWChScnQpc78hCT79xFDJzofF5/BH7H4SC4vCc/Qzpj/4V15AJbd5MLiwF0eCYQghdxKLwGHd1pJGyOu6SD1OAzS9V7gBF24xuF2nlf1TTCotHFdL0Ob5L0IRmjEjNEk4lPZCyGbS8bxmoHtdqHl60xJGMpMhSEBXulbYivs5h5HjDglddtfd4ZUMjAd5obwJZ0nS75eDFlGVvuIYxPKrDuyw3y6TM= root@test_svr02
    ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDnPhXHxrsNoRu1ogWNEKyjPfA3LLUpTJYN5c268u2FTnF0xNRRvNSRVluBQV4PVR2q0zYSYZ44MsaXxOwaectF9vhAOp0LSDVJP/wwJOhXDhBD/cY3NY/jETPaLAagM33S4Brdj81ggx6hWABjFaH1ziKxhnEAYcufuUN08Cnv/bF7jSHRF65i78V4FcZ9Qkfv9yHpKTvHRbT/XV8EdGRyg19p75STr4sUKCLUXRtRfRhrw5rmVdYrmBlUV3PFUa8E10r1OhQ48kn4eNt2JATgV2/i59QDm0PNqgQdhlwBtEGKU3RPor6ovPi8sdhlSgSte0meiGLjvPqPfVjZHpBFaKB5WxczAHq87y3NLfSvsOT0qsLPhd2SAc6ooskTbkaaDUiKoUpMfWqdXhSh4c3yeN60868FNB9KnzoxB8GFqr/vIfilV80W1mnFB2ZfBiO8oeaP45IkyhsjJpjPVCnZizAY5ORNyjWUHbTcgHvc1kZMPeRT1C0ZQvih2vMvPs= root@test_svr01

    -> 서버#1,2호기의  .ssh/authorized_keys에서 서로의 공개키를 등록해주도록 합니다.

    [test_svr01:root]/.ssh>ssh 10.50.1.71
    The authenticity of host '10.50.1.71 (10.50.1.71)' can't be established.
    ECDSA key fingerprint is SHA256:wgA3O3i/6EsaBebZj+UtASoY8Q5R4pQyNlFB03FwT0A.
    Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
    Warning: Permanently added '10.50.1.71' (ECDSA) to the list of known hosts.
    Last login: Sat Jul 10 19:54:24 KORST 2021 on /dev/pts/1 from 100.100.0.1

    -> 공개키 교환 후 최초의 패스워드 여부를 물어보기 때문에 패스워드 입력 후 접속을 합니다. 이후에는 패스워드 여부를 물어보지 않고 접속이 허용됩니다.

    [test_svr01:root]/>vi /etc/hosts
    10.50.1.71 test_svr01 #GPFS01cluster
    10.50.1.72 test_svr02 #GPFS02cluster
    
    [test_svr02:root]/>vi /etc/hosts
    10.50.1.72 test_svr02 # GPFS01cluster
    10.50.1.71 test_svr01 #GPFS02cluster

    -> GPFS 구성을 하기 위한 서버#1,2호기의 /etc/hosts에 GPFS IP를 등록해줍니다. 10.50.1.71 과 10.50.1.72을 각각 등록합니다.

    [test_svr01:root]/>lspv | grep -i hdisk7
    hdisk7 00c5c1d7450f71dc None
    [test_svr01:root]/>lsattr -El hdisk7 | grep -i reserve_policy
    reserve_policy no_reserve Reserve Policy True+
    [test_svr01:root]/>lspv | grep -i hdisk8
    hdisk8 00c5c1d7450f7144 None
    [test_svr01:root]/>lsattr -El hdisk8 | grep -i reserve_policy
    reserve_policy no_reserve Reserve Policy True+
    
    [test_svr02:root]/>lspv | grep -i hdisk7
    hdisk7 00c5c1d7450f71dc None
    [test_svr02:root]/>lsattr -El hdisk7 | grep -i reserve_policy
    reserve_policy no_reserve Reserve Policy True+
    [test_svr02:root]/>lspv | grep -i hdisk8
    hdisk8 00c5c1d7450f7144 None
    [test_svr02:root]/>lsattr -El hdisk8 | grep -i reserve_policy
    reserve_policy no_reserve Reserve Policy True+

    -> GPFS NSD를 생성하기 위해서 생성할 디스크의 번호가 공유볼륨으로 정책이 설정되어 있는지 확인 후 PVID 값이 같은지 확인을 합니다. 공유디스크는 스토리지에서 할당된 LUN을 사용하였습니다.(hdisk7은 파일 시스템으로 사용, hdisk8은 tiebreak용으로 사용)

    [test_svr01:root]/tmp/gpfsnew>cat node_list
    test_svr01:quorum-manager
    test_svr02:quorum-manager
    
    [test_svr02:root]/tmp/gpfsnew>cat node_list
    test_svr01:quorum-manager
    test_svr02:quorum-manager

    -> 노드에 대한 LIST를 만들어 줍니다. 원하는 디렉토리 경로에 자신이 설정한 이름으로 생성을 하면 됩니다. 

    [test_svr01:root]/>cat .profile
    PATH=/usr/bin:/etc:/usr/sbin:/usr/ucb:$HOME/bin:/usr/bin/X11:/sbin:.:/usr/es/sbin/cluster/utilities:/usr/lpp/mmfs/bin
    
    [test_svr02:root]/>cat .profile
    PATH=/usr/bin:/etc:/usr/sbin:/usr/ucb:$HOME/bin:/usr/bin/X11:/sbin:.:/usr/es/sbin/cluster/utilities:/usr/lpp/mmfs/bin

    -> 서버#1,2호기의 해당 .profile에 gpfs 명령어 수행 PATH /usr/lpp/mmfs/bin울 등록합니다. 

     

    2021.07.08 - [System and Cloud/Unix] - IBM AIX GPFS 설치하는 방법

     

    IBM AIX GPFS 설치하는 방법

    IBM AIX GPFS 설치하는 방법 [test_svr01:root]/tmp/download>ls -al | grep -i Spectrum_Scale_Standard-5.0.1.0-ppc64-AIX-install.tgz -rw-r--r-- 1 root system 63816400 Jul 07 21:37 Spectrum_Scale_St..

    pinetreeday.tistory.com

    2021.07.11 - [System and Cloud/Unix] - IBM AIX GPFS 구성하는 방법(2)

     

    IBM AIX GPFS 구성하는 방법(2)

    IBM AIX GPFS 구성하는 방법(2) [test_svr01:root]/usr/lpp/mmfs/bin>mmcrcluster -n /tmp/gpfsnew/node_list -p test_svr01 -s test_svr02 -C GPFScluster -r /bin/ssh -R /bin/scp -A mmcrcluster: Perform..

    pinetreeday.tistory.com

     

    2021.07.11 - [System and Cloud/Unix] - IBM AIX GPFS 구성하는 방법(3)

     

    IBM AIX GPFS 구성하는 방법(3)

    IBM AIX GPFS 구성하는 방법(3) [test_svr01:root]/tmp/gpfsnew>cp nsd_list fs_list -> nsd에 파일 시스템을 생성하기 위해서 기존 nsd의 리스트를 fs_list 파일로 복사를 합니다. [test_svr01:r..

    pinetreeday.tistory.com

    PS. 포스팅의 내용은 제 기준으로 작성한 것이기 때문에 참고해서 보시면 감사하겠습니다.

    포스팅 과정의 오류 및 오타 그리고 궁금한 점에 대해서는 댓글 남겨주세요.

    반응형

    댓글

Designed by Tistory.