Red Hat CLUSTER SUITE FOR ENTERPRISE LINUX 5.2 Guida di Installazione

Navigare online o scaricare Guida di Installazione per Software per gestione di rete Red Hat CLUSTER SUITE FOR ENTERPRISE LINUX 5.2. Red Hat CLUSTER SUITE FOR ENTERPRISE LINUX 5.2 Installation guide Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa

Sommario

Pagina 1 - Red Hat Enterprise Linux

Red Hat Cluster Suite OverviewRed Hat Cluster Suite forRed Hat Enterprise Linux5.2Cluster_Suite_OverviewISBN: N/APublication date: May 2008

Pagina 3

Red Hat Cluster Suite OverviewClustered systems provide reliability, scalability, and availability to critical production services.Using Red Hat Clust

Pagina 4

High-availability clusters provide continuous availability of services by eliminating single pointsof failure and by failing over services from one cl

Pagina 5

Infrastructure components, the High-availability and Service Management components, andstorage.• Linux Virtual Server (LVS) — Routing software that pr

Pagina 6

Figure 1.1. Red Hat Cluster Suite IntroductionNoteFigure 1.1, “Red Hat Cluster Suite Introduction” includes GFS, CLVM, andGNBD, which are components t

Pagina 7 - Introduction

the node votes plus 1. For quorum via quorum disk, quorum consists of user-specifiedconditions.NoteBy default, each node has one quorum vote. Optional

Pagina 8 - 1. Document Conventions

distributed across all nodes in the cluster (refer to Figure 1.2, “CMAN/DLM Overview”). GFS andCLVM use locks from the lock manager. GFS uses locks fr

Pagina 9 - 2. Feedback

Figure 1.3. Power Fencing ExampleFencing7

Pagina 10

Figure 1.4. Fibre Channel Switch Fencing ExampleSpecifying a fencing method consists of editing a cluster configuration file to assign afencing-method

Pagina 11 - 1. Cluster Basics

Figure 1.5. Fencing a Node with Dual Power SuppliesFencing9

Pagina 12

Red Hat Cluster Suite Overview provides an overview of Red Hat Cluster Suite for Red HatEnterprise Linux 5.2Red Hat Cluster Suite Overview

Pagina 13

Figure 1.6. Fencing a Node with Dual Fibre Channel ConnectionsYou can configure a node with one fencing method or multiple fencing methods. When youco

Pagina 14 - 3. Cluster Infrastructure

The Cluster Configuration System (CCS) manages the cluster configuration and providesconfiguration information to other cluster components in a Red Ha

Pagina 15 - 3.2. Lock Management

Figure 1.8. Accessing Configuration InformationThe cluster configuration file (/etc/cluster/cluster.conf) is an XML file that describes thefollowing c

Pagina 16 - 3.3. Fencing

High-availability service management provides the ability to create and manage high-availabilitycluster services in a Red Hat cluster. The key compone

Pagina 17

Figure 1.9. Failover DomainsFigure 1.10, “Web Server Cluster Service Example” shows an example of a high-availabilitycluster service that is a web ser

Pagina 18

Figure 1.10. Web Server Cluster Service ExampleClients access the cluster service through the IP address 10.10.10.201, enabling interactionwith the we

Pagina 19

uses a lock manager to coordinate I/O. When one node changes data on a GFS file system,that change is immediately visible to the other cluster nodes u

Pagina 20

• Section 5.1, “Superior Performance and Scalability”• Section 5.2, “Performance, Scalability, Moderate Price”• Section 5.3, “Economy and Performance”

Pagina 21 - Figure 1.7. CCS Overview

Figure 1.12, “GFS and GNBD with a SAN”. SAN block storage is presented to network clientsas block storage devices by GNBD servers. From the perspectiv

Pagina 22

Figure 1.13. GFS and GNBD with Directly Connected Storage6. Cluster Logical Volume ManagerThe Cluster Logical Volume Manager (CLVM) provides a cluster

Pagina 23

Red Hat Cluster Suite Overview: Red Hat Cluster Suite forRed Hat Enterprise LinuxCopyright © 2008 Red Hat, Inc.Copyright © 2008 Red Hat, Inc. This mat

Pagina 24 - Figure 1.9. Failover Domains

Using CLVM requires minor changes to /etc/lvm/lvm.conf for cluster-widelocking.Figure 1.14. CLVM OverviewYou can configure CLVM using the same command

Pagina 25 - 5. Red Hat GFS

Figure 1.15. LVM Graphical User InterfaceCluster Logical Volume Manager21

Pagina 26

Figure 1.16. Conga LVM Graphical User InterfaceChapter 1. Red Hat Cluster Suite Overview22

Pagina 27 - Figure 1.11. GFS with a SAN

Figure 1.17. Creating Logical Volumes7. Global Network Block DeviceGlobal Network Block Device (GNBD) provides block-device access to Red Hat GFS over

Pagina 28 - 5.3. Economy and Performance

Figure 1.18. GNBD Overview8. Linux Virtual ServerLinux Virtual Server (LVS) is a set of integrated software components for balancing the IP loadacross

Pagina 29

Figure 1.19. Components of a Running LVS ClusterThe pulse daemon runs on both the active and passive LVS routers. On the backup LVSrouter, pulse sends

Pagina 30 - Figure 1.14. CLVM Overview

To an outside user accessing a hosted service (such as a website or database application),LVS appears as one server. However, the user is actually acc

Pagina 31

1A virtual server is a service configured to listen on a specific virtual IP.Figure 1.20. Two-Tier LVS TopologyService requests arriving at an LVS rou

Pagina 32

• Round-Robin Scheduling — Distributes each request sequentially around a pool of realservers. Using this algorithm, all the real servers are treated

Pagina 33

The backup LVS router performs the role of a standby system. Periodically, the LVS routersexchange heartbeat messages through the primary external pub

Pagina 34 - 8. Linux Virtual Server

Red Hat Cluster Suite Overview

Pagina 35

Figure 1.21. Three-Tier LVS TopologyThis topology is suited well for busy FTP servers, where accessible data is stored on a central,highly available s

Pagina 36 - 8.1. Two-Tier LVS Topology

a Red Hat cluster, you can configure one high-availability cluster to serve both of these rolessimultaneously.8.3. Routing MethodsYou can use Network

Pagina 37

interface are taken over by the backup LVS router simultaneously. All the real servers on theprivate network use the floating IP for the NAT router as

Pagina 38

Figure 1.23. LVS Implemented with Direct RoutingIn a typical direct-routing LVS configuration, an LVS router receives incoming server requeststhrough

Pagina 39 - 8.2. Three-Tier LVS Topology

In typical situations, a client on the Internet sends a request to an IP address. Network routerstypically send requests to their destination by relat

Pagina 40

8.4.2. Firewall MarksFirewall marks are an easy and efficient way to a group ports used for a protocol or group ofrelated protocols. For example, if L

Pagina 41 - 8.3. Routing Methods

luci is accessible through a Web browser and provides three major functions that areaccessible through the following tabs:• homebase — Provides tools

Pagina 42 - 8.3.2. Direct Routing

Figure 1.24. luci homebase TabFigure 1.25. luci cluster TabConga37

Pagina 43

Figure 1.26. luci storage Tab9.2. Cluster Administration GUIThis section provides an overview of the system-config-cluster cluster administrationgraph

Pagina 44 - 8.4.1. Persistence

9.2.1. Cluster Configuration ToolYou can access the Cluster Configuration Tool (Figure 1.27, “Cluster Configuration Tool”)through the Cluster Configur

Pagina 45 - 9.1. Conga

Introduction ... vii1. Document Conventions

Pagina 46

• Cluster Nodes — Displays cluster nodes. Nodes are represented by name as subordinateelements under Cluster Nodes. Using configuration buttons at the

Pagina 47 - Figure 1.25. luci cluster Tab

Cluster Management tab in Cluster Administration GUI.Figure 1.28. Cluster Status ToolThe nodes and services displayed in the Cluster Status Tool are d

Pagina 48 - Figure 1.26. luci storage Tab

Administration GUI and init scripts supplied by Red Hat. Table 1.1, “Command Line Tools”summarizes the command line tools.Command LineToolUsed With Pu

Pagina 49

Web browser. You can access it locally with this URL: http://localhost:3636. You canaccess it remotely with either the hostname or the real IP address

Pagina 50 - 9.2.2. Cluster Status Tool

Figure 1.30. The CONTROL/MONITORING PanelAuto updateEnables the status display to be updated automatically at a user-configurable interval set inthe U

Pagina 51

10.2. GLOBAL SETTINGSThe GLOBAL SETTINGS panel is where the LVS administrator defines the networking detailsfor the primary LVS router's public a

Pagina 52 - Table 1.1. Command Line Tools

The next three fields are specifically for the NAT router's virtual network interface connected theprivate network with the real servers.NAT Rout

Pagina 53 - 10.1. CONTROL/MONITORING

Figure 1.32. The REDUNDANCY PanelRedundant server public IPThe public real IP address for the backup LVS router.Redundant server private IPThe backup

Pagina 54

Figure 1.33. The VIRTUAL SERVERS PanelEach server displayed in the VIRTUAL SERVERS panel can be configured on subsequentscreens or subsections.To add

Pagina 55 - 10.2. GLOBAL SETTINGS

any of the subsections related to this virtual server, complete this page and click on theACCEPT button.Figure 1.34. The VIRTUAL SERVERS SubsectionNam

Pagina 57 - 10.4. VIRTUAL SERVERS

Virtual IP Network MaskThe netmask for this virtual server, in the drop-down menu.Firewall MarkFor entering a firewall mark integer value when bundlin

Pagina 58

drop-down menu.10.4.2. REAL SERVER SubsectionClicking on the REAL SERVER subsection link at the top of the panel displays the EDIT REALSERVER subsecti

Pagina 59

Figure 1.36. The REAL SERVER Configuration PanelThis panel consists of three entry fields:NameA descriptive name for the real server.TipThis name is n

Pagina 60 - Weighted

WeightAn integer value indicating this host's capacity relative to that of other hosts in the pool. Thevalue can be arbitrary, but treat it as a

Pagina 61

dynamically changing data, such as HTTPS or SSL.To use this function, you must write a script that returns a textual response, set it to beexecutable,

Pagina 62

Red Hat Cluster Suite ComponentSummaryThis chapter provides a summary of Red Hat Cluster Suite components and consists of thefollowing sections:• Sect

Pagina 63

Function Components Descriptioncreated with GFS 6.0 (and earlier) tothe XML format configuration formatused with this release of Red HatCluster Suite.

Pagina 64

Function Components Descriptionmembership and services running.clurgmgrd Daemon used to handle user servicerequests including service start,service di

Pagina 65 - 1. Cluster Components

Function Components Descriptionenvironments.fence_ack_manual User interface for fence_manualagent.fence_node A program which performs I/O fencingon a

Pagina 66

Function Components Descriptiongnbd_serv A server daemon that allows a nodeto export local storage over thenetwork.LVS pulse This is the controlling p

Pagina 67

IntroductionThis document provides a high-level overview of Red Hat Cluster Suite for Red Hat EnterpriseLinux 5 and is is organized as follows:• Chapt

Pagina 68

Function Components Descriptionnanny The nanny monitoring daemon runson the active LVS router. Through thisdaemon, the active LVS routerdetermines the

Pagina 69

• ccs (7) - Cluster Configuration System• cman_tool (8) - Cluster Management Tool• cluster.conf [cluster] (5) - The configuration file for cluster pro

Pagina 70 - 2. Man Pages

• fence_xvm (8) - I/O Fencing agent for Xen virtual machines• fence_xvmd (8) - I/O Fencing agent host for Xen virtual machines• fenced (8) - the I/O F

Pagina 71

• pulse (8) - heartbeating daemon for monitoring the health of cluster nodes• lvs.cf [lvs] (5) - configuration file for lvs• lvscan (8) - scan (all di

Pagina 73 - 3. Compatible Hardware

IndexCclusterdisplaying status, 41cluster administrationdisplaying cluster and service status, 41cluster component compatible hardware, 63cluster comp

Pagina 75

PDF, and RPM versions on the Red Hat Enterprise Linux Documentation CD and online athttp://www.redhat.com/docs/.1. Document ConventionsCertain words i

Pagina 76

TipA tip is typically an alternative way of performing a task.ImportantImportant information is necessary, but possibly unexpected, such as aconfigura

Commenti su questo manuale

Nessun commento