Configuring clusters

Configure clusters by securing confirming the hardware, operating-system, and database requirements. You also set up a security protocol and the secure connection.

To configure your system as a high-availability cluster, you must take the following actions:
  • Meet hardware and operating-system requirements.
  • Meet database and data requirements.
  • Meet database server configuration requirements.
  • Configure connectivity.

Each of these topics are explained in this section.

You can configure your system to use the Secure Sockets Layer (SSL) protocol, a communication protocol that ensures the privacy and integrity of data transmitted over the network, for HDR communications. You can use the SSL protocol for connections between primary and secondary servers and for connections with remote standalone (RS) and shared disk (SD) secondary servers in a high-availability configuration. For information about using the SSL protocol, see Configuring server-to-server SSL connections.

The Connection Manager also supports Distributed Relational Database Architecture (DRDA) connections. For more information, see Distributed Relational Database Architecture (DRDA) communications.