English | 简体中文 | 繁體中文 | Русский язык | Français | Español | Português | Deutsch | 日本語 | 한국어 | Italiano | بالعربية

How to Install SQL Server 2012Cluster

In the previous blog posts, we introduced how to simulate shared disk through software (https://www.oldtoolbag.com/network/592807.html), and also introduces the construction of Windows 2008methods of clustering (https://www.oldtoolbag.com/os/windows/win2008/592817.html), and then we will install SQL Server based on this. 2012Cluster.

1. Environment Preparation

1Prepare3Computers

  DC1: IP address192.168.1.1, subnet mask255.255.255.0, default gateway192.168.1.254, DNS is192.168.1.1

  SQL1: IP address192.168.1.21, subnet mask255.255.255.0, default gateway192.168.1.254, DNS is192.168.1.1

  SQL2: IP address192.168.1.22, subnet mask255.255.255.0, default gateway192.168.1.254, DNS is192.168.1.1

2Related software

  DC1For the domain controller of contoso.com domain, and install the StarWind software to simulate iSCSI shared disk

  SQL1SQL2Join the contoso.com domain, connect to the iSCSI disk, and create a cluster with arbitration configured as 'Majority Node and Disk'.

3Update patches

  Install SQL Server 2012It is necessary to install the corresponding Service Pack, KB, etc. in advance, see another blog post <SQL Server 2012Quick Installation Guide>

2. Install MSDTC

1Prepare the shared disk

  To install the MSDTC application, a shared disk is required

2Install the application

  Go to any node, open 'Failover Cluster Management', and configure the service or application.

After completion, you can see an additional 'WinCluster' under 'Services and Applications' in the left navigation box.1DTC' application, the result is as follows:

Check 'Storage' again, you can see that this application occupies a shared disk.

3. Install the first SQL node

1Start the installation wizard

Go to the master node (current master server), and start the installation

2Prepare installation

Next, it will connect to the Internet, scan for product updates, and you can click 'Skip Scan'.

3Basic configuration

In the 'Feature Selection' dialog box, it is recommended to install only 'Database Engine Service' and 'Management Tools' on the cluster.

4Cluster configuration

5Other configurations

Since it is installed on the cluster, the data files of the database will be stored on shared disks (i.e., the disks selected during the previous configuration of 'Cluster Disk Selection'), as shown in the figure below:

6Complete installation

7Check

4. Install the second SQL node

The previous operation steps have installed the SQL Server engine on the first node of the cluster, but at this time, failover cannot be achieved. Because only this first node has installed the SQL Server application, and an error will occur when trying to switch to another node:

Next, go to the second node and add the SQL Server cluster according to the following steps on the second node.

1Prepare installation

2Configure installation process

3Complete installation

5. Verification and Testing

1Domain virtual network name

Go to domain controller DC1Open 'Active Directory Users and Computers', in the 'Computers' container, you can see3VNN (Virtual Network Name).

You can also try to ping this in the command line3VNN.

2Try to switch nodes

Go to any node, open 'Failover Cluster Management', 'Move the service or application to another node'.

3Check the SQL Server instance

Description: Install SQL Server 2008Clustering, you can refer to the above steps, only slightly changed in the configuration steps such as 'Cluster Resource Group', 'Cluster Network Configuration', etc.

Dashi Zhi Company can provide a one-stop solution for LAN network behavior management, computer information prevention leakage control, and information security protection.
Jusheng Network Management Network Management System (Download It is a special office computer monitoring software and LAN network control software that can prohibit online games, prohibit stock trading during working hours, prohibit P2Software download prohibition, online video viewing prohibition, LAN speed restriction on others, and binding LAN IP and MAC addresses to prevent ARP attacks, etc.
Dashi Zhi File Sharing Management Software (Download It is a special shared folder access log recording software and server shared file access permission setting software that can only allow reading shared files and prohibit copying shared files, only allow opening shared files and prohibit saving as local and prohibit dragging shared files, and only allow modifying shared files and prohibit deleting shared files, to protect the security of server shared files and prevent unauthorized access to shared files.
Dashi Zhi Enterprise Data Leakage Protection System (Download It is a software that specializes in protecting computer file security, preventing U disk file copying, disabling USB ports, and can also block email attachments, prohibit logging into cloud disk to upload files, prohibit FTP software to send files, prohibit WeChat to send files, prohibit QQ to send files, etc., to prevent leakage through various channels.
Dashi Zhi LAN Access Authentication System (Download It is a professional local area network (LAN) network access control system that effectively prevents external computers from accessing the LAN, prohibits external computers from going online, prohibits non-unit computers from accessing LAN shared files, isolates LAN computers, binds IP and MAC addresses, and prohibits modifying IP addresses, etc., to protect the security of the LAN.

Declaration: The content of this article is from the Internet, and the copyright belongs to the original author. The content is contributed and uploaded by Internet users spontaneously. This website does not own the copyright, has not been manually edited, and does not assume any relevant legal liability. If you find any content suspected of copyright infringement, please send an email to notice#w.3Please send an email to codebox.com (replace # with @ when sending an email) to report any violations, and provide relevant evidence. Once verified, this site will immediately delete the infringing content.

You May Also Like