Veritas InfoScale™ 8.0.2 Solutions in Cloud Environments
- Overview and preparation
- Overview of InfoScale solutions in cloud environments
- InfoScale agents for monitoring resources in cloud environments
- InfoScale FSS feature for storage sharing in cloud environments
- InfoScale non-FSS feature for storage sharing in cloud environments
- About SmartIO in AWS environments
- Preparing for InfoScale installations in cloud environments
- Installing the AWS CLI package
- VPC security groups example
- Configurations for Amazon Web Services - Linux
- Configurations for Amazon Web Services - Windows
- Replication configurations in AWS - Windows
- HA and DR configurations in AWS - Windows
- EBS Multi-Attach feature support with InfoScale Enterprise in AWS cloud
- InfoScale service group configuration wizards support for EBS Multi-Attach
- Failover within a subnet of an AWS AZ using virtual private IP - Windows
- Failover across AWS subnets using overlay IP - Windows
- Public access to InfoScale cluster nodes in AWS using Elastic IP - Windows
- DR from on-premises to AWS and across AWS regions or VPCs - Windows
- DR from on-premises to AWS - Windows
- Configurations for Microsoft Azure - Linux
- Configurations for Microsoft Azure - Windows
- Replication configurations in Azure - Windows
- HA and DR configurations in Azure - Windows
- Shared disk support in Azure cloud and InfoScale service group configuration using wizards
- Failover within an Azure subnet using private IP - Windows
- Failover across Azure subnets using overlay IP - Windows
- Public access to cluster nodes in Azure using public IP - Windows
- DR from on-premises to Azure and across Azure regions or VNets - Windows
- Configurations for Google Cloud Platform- Linux
- Configurations for Google Cloud Platform - Windows
- Replication to and across cloud environments
- Migrating files to the cloud using Cloud Connectors
- About cloud connectors
- About InfoScale support for cloud connectors
- How InfoScale migrates data using cloud connectors
- Limitations for file-level tiering
- About operations with Amazon Glacier
- Migrating data from on-premise to cloud storage
- Reclaiming object storage space
- Removing a cloud volume
- Examining in-cloud storage usage
- Sample policy file
- Replication support with cloud tiering
- Configuration for Load Balancer for AWS and Azure - Linux
- Troubleshooting issues in cloud deployments
Failover across GCP subnets using overlay IP - Windows
InfoScale clusters let you fail over IPs - and thereby, the application configured for HA - between different subnets in the same zone or in different zones.
The following information is required:
The overlay IP address to be used for failover
(The overlay IP address must be defined outside the CIDR block to which the cluster nodes belong.)
The device to which the IP should be plumbed
The
google-api-python-clientGCP Python module. For details, see the Bundled Agents Reference Guide - Windows.
The private IP of one subnet cannot be failed over to a different subnet. InfoScale Enterprise provides an overlay IP, which can be used across subnets.
The following graphic depicts a sample failover configuration across subnets within the same zone using an overlay IP:
The sample configuration includes the following elements:
A VPC network is configured in Region A of the Google cloud.
An application is configured for HA using an InfoScale cluster that comprises two nodes, Node 1 and Node 2, which are VM instances.
Node 1 exists in Subnet 1 and Node 2 exists in Subnet 2.
An overlay IP is configured to allow the redirection of IP address traffic to another cluster node that belongs to a different subnet during failover or failback. The overlay IP is configured outside the CIDR block of the VPC network to which the nodes belong.
The following snippet is a service group configuration from a sample VCS configuration file (main.cf):
group app_network_sg (
SystemList = { cloudvm1 = 0, cloudvm2 = 1 }
AutoStartList = { cloudvm1, cloudvm2 }
)
GoogleIP appsg_GoogleIP (
OverlayIP = "192.168.9.3"
MACAddress @cloudvm1 = "42:01:0A:D0:08:06"
MACAddress @cloudvm2 = "42:01:0A:D0:08:05"
)
IP appsg_ip (
Address = "192.168.9.3"
SubNetMask = "255.255.252.0"
MACAddress @cloudvm1 = "42:01:0A:D0:08:06"
MACAddress @cloudvm2 = "42:01:0A:D0:08:05"
)
NIC appsg_nic (
MACAddress @cloudvm1 = "42:01:0A:D0:08:06"
MACAddress @cloudvm2 = "42:01:0A:D0:08:05"
)
appsg_GoogleIP requires appsg_ip
appsg_ip requires appsg_nicThe following graphic depicts a sample failover configuration across subnets in different zones using an overlay IP:
The following snippet is a service group configuration from a sample VCS configuration file (main.cf):
group app_network_sg (
SystemList = { cloudvm1 = 0, cloudvm2 = 1 }
AutoStartList = { cloudvm1, cloudvm2 }
)
GoogleIP appsg_GoogleIP (
OverlayIP = "192.168.9.3"
MACAddress @cloudvm1 = "42:01:0A:D0:08:06"
MACAddress @cloudvm2 = "42:01:0A:D0:08:05"
)
IP appsg_ip (
Address = "192.168.9.3"
SubNetMask = "255.255.252.0"
MACAddress @cloudvm1 = "42:01:0A:D0:08:06"
MACAddress @cloudvm2 = "42:01:0A:D0:08:05"
)
NIC appsg_nic (
MACAddress @cloudvm1 = "42:01:0A:D0:08:06"
MACAddress @cloudvm2 = "42:01:0A:D0:08:05"
)
appsg_GoogleIP requires appsg_ip
appsg_ip requires appsg_nic