English | 简体中文 | 繁體中文 | Русский язык | Français | Español | Português | Deutsch | 日本語 | 한국어 | Italiano | بالعربية
In the previous blog posts, we introduced how to simulate shared disk through software (https://www.oldtoolbag.com/network/592807.html), and also introduces the construction of Windows 2008methods of clustering (https://www.oldtoolbag.com/os/windows/win2008/592817.html), and then we will install SQL Server based on this. 2012Cluster.
1. Environment Preparation
1Prepare3Computers
DC1: IP address192.168.1.1, subnet mask255.255.255.0, default gateway192.168.1.254, DNS is192.168.1.1
SQL1: IP address192.168.1.21, subnet mask255.255.255.0, default gateway192.168.1.254, DNS is192.168.1.1
SQL2: IP address192.168.1.22, subnet mask255.255.255.0, default gateway192.168.1.254, DNS is192.168.1.1
2Related software
DC1For the domain controller of contoso.com domain, and install the StarWind software to simulate iSCSI shared disk
SQL1SQL2Join the contoso.com domain, connect to the iSCSI disk, and create a cluster with arbitration configured as 'Majority Node and Disk'.
3Update patches
Install SQL Server 2012It is necessary to install the corresponding Service Pack, KB, etc. in advance, see another blog post <SQL Server 2012Quick Installation Guide>
2. Install MSDTC
1Prepare the shared disk
To install the MSDTC application, a shared disk is required
2Install the application
Go to any node, open 'Failover Cluster Management', and configure the service or application.
After completion, you can see an additional 'WinCluster' under 'Services and Applications' in the left navigation box.1DTC' application, the result is as follows:
Check 'Storage' again, you can see that this application occupies a shared disk.
3. Install the first SQL node
1Start the installation wizard
Go to the master node (current master server), and start the installation
2Prepare installation
Next, it will connect to the Internet, scan for product updates, and you can click 'Skip Scan'.
3Basic configuration
In the 'Feature Selection' dialog box, it is recommended to install only 'Database Engine Service' and 'Management Tools' on the cluster.
4Cluster configuration
5Other configurations
Since it is installed on the cluster, the data files of the database will be stored on shared disks (i.e., the disks selected during the previous configuration of 'Cluster Disk Selection'), as shown in the figure below:
6Complete installation
7Check
4. Install the second SQL node
The previous operation steps have installed the SQL Server engine on the first node of the cluster, but at this time, failover cannot be achieved. Because only this first node has installed the SQL Server application, and an error will occur when trying to switch to another node:
Next, go to the second node and add the SQL Server cluster according to the following steps on the second node.
1Prepare installation
2Configure installation process
3Complete installation
5. Verification and Testing
1Domain virtual network name
Go to domain controller DC1Open 'Active Directory Users and Computers', in the 'Computers' container, you can see3VNN (Virtual Network Name).
You can also try to ping this in the command line3VNN.
2Try to switch nodes
Go to any node, open 'Failover Cluster Management', 'Move the service or application to another node'.
3Check the SQL Server instance
Description: Install SQL Server 2008Clustering, you can refer to the above steps, only slightly changed in the configuration steps such as 'Cluster Resource Group', 'Cluster Network Configuration', etc.
Dashi Zhi Company can provide a one-stop solution for LAN network behavior management, computer information prevention leakage control, and information security protection. | |
Jusheng Network Management Network Management System (Download | It is a special office computer monitoring software and LAN network control software that can prohibit online games, prohibit stock trading during working hours, prohibit P2Software download prohibition, online video viewing prohibition, LAN speed restriction on others, and binding LAN IP and MAC addresses to prevent ARP attacks, etc. |
Dashi Zhi File Sharing Management Software (Download | It is a special shared folder access log recording software and server shared file access permission setting software that can only allow reading shared files and prohibit copying shared files, only allow opening shared files and prohibit saving as local and prohibit dragging shared files, and only allow modifying shared files and prohibit deleting shared files, to protect the security of server shared files and prevent unauthorized access to shared files. |
Dashi Zhi Enterprise Data Leakage Protection System (Download | It is a software that specializes in protecting computer file security, preventing U disk file copying, disabling USB ports, and can also block email attachments, prohibit logging into cloud disk to upload files, prohibit FTP software to send files, prohibit WeChat to send files, prohibit QQ to send files, etc., to prevent leakage through various channels. |
Dashi Zhi LAN Access Authentication System (Download | It is a professional local area network (LAN) network access control system that effectively prevents external computers from accessing the LAN, prohibits external computers from going online, prohibits non-unit computers from accessing LAN shared files, isolates LAN computers, binds IP and MAC addresses, and prohibits modifying IP addresses, etc., to protect the security of the LAN. |
Declaration: The content of this article is from the Internet, and the copyright belongs to the original author. The content is contributed and uploaded by Internet users spontaneously. This website does not own the copyright, has not been manually edited, and does not assume any relevant legal liability. If you find any content suspected of copyright infringement, please send an email to notice#w.3Please send an email to codebox.com (replace # with @ when sending an email) to report any violations, and provide relevant evidence. Once verified, this site will immediately delete the infringing content.