WebSphere Application Server Network Deployment, Version 6.0.x     Operating Systems: AIX, HP-UX, Linux, Solaris, Windows

Disabling file locking

If you use network file system version 3 (NFSv3) for storing transaction recovery logs, and you want to use automated peer recovery, you must first disable file locking.

Before you begin

If you choose to perform this task you must configure your system to prevent system overloading and network partitioning, (described in How to choose between automated and manual transaction peer recovery) as these situations could lead to a peer recovery process being initiated for an active server.
Attention: If you do not take this precautionary step, data corruption can occur.
The following list contains some actions you can take to prevent system overloading and network partitioning:
  • Modify the core group heartbeat settings to change the amount of time after which WebSphere Application Server considers a server to have failed. For more information, see High availability manager.
  • Ensure that your network is safe from network partitioning by, for example, installing backup network adapters.
  • Modify the workload management throttling so that the server cannot be overloaded.

Why and when to perform this task

WebSphere Application Server obtains an exclusive lock on the physical recovery log files whenever it is instructed to perform recovery processing, and releases this lock when it is instructed to pass ownership of the logs to another server. Access to a recovery log is only performed when the exclusive lock is held.

NFSv3 supports exclusive file locks, but holds them on behalf of a failed host until that host can restart. In this context, the host is the physical machine running the application server that requested the lock and it is the restart of the host, not the application server, that eventually triggers the locks to release. See How to choose between automated and manual transaction peer recovery for more information.

To provide a more appropriate failover behavior, you can either use manual failover and configure the system as described in Configuring manual peer recovery for the transaction service, or you can disable the use of exclusive file locking.

Steps for this task

  1. Click Servers > Application servers-> server_name -> Transaction service. Under Additional Properties, click Custom Properties.
  2. 2. Click New to define a new custom property. Type DISABLE_FILE_LOCKING as the name, and TRUE as the value. Click OK to add the new property.
  3. Save your change to the master configuration.
  4. Repeat the above steps for every server in the cluster.
  5. Restart the servers in the cluster for the changes to take effect.

What to do next

Having taken steps to mitigate the risk to recovery log integrity when locking is disabled, you can tune the heartbeating parameters of the WebSphere Application Server HA framework to change the conditions under which a server is considered failed. By considering the characteristics of applications, network, and peak workloads, determine an acceptable period of time after which the likelihood of an incorrectly diagnosed server failure is acceptably small.

There is a trade-off between reducing the risk of an incorrect diagnosis of server failure and increasing the time it takes for automated failover and peer recovery to occur. By default, a server is considered to have failed after 20 heartbeats, with a 10-second frequency, are missed. These defaults are custom properties of the core group that can be modified.




Related concepts
Transactional high availability
High availability manager

Related tasks
Configuring manual peer recovery for the transaction service
Configuring automated peer recovery for the transaction service

Related information
How to choose between automated and manual transaction peer recovery

Task topic    

Terms of Use | Feedback

Last updated: Dec 11, 2005 4:07:15 PM CST
http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tjta_disable_lock.html

© Copyright IBM Corporation 2002, 2005. All Rights Reserved.
This information center is powered by Eclipse technology. (http://www.eclipse.org)