Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0 Guida di Installazione

Navigare online o scaricare Guida di Installazione per Server Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0. Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0 Installation guide Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa

Sommario

Pagina 1 - Red Hat Enterprise Linux 6

Red Hat Enterprise Linux 6High Availability Add-On OverviewOverview of the High Availability Add-On for Red Hat Enterprise LinuxEdition 6

Pagina 2

out: mutex_unlock(& kvm->lock); return r;}1.3. Not es and WarningsFinally, we use three visual styles to draw attention to

Pagina 3

Chapter 1. High Availability Add-On OverviewThe High Availability Add-On is a clustered system that provides reliability, scalability, andavailability

Pagina 4 - Abstract

NoteThe cluster types summarized in the preceding text reflect basic configurations; your needsmight require a combination of the clusters described.A

Pagina 5 - Table of Contents

cluster infrastructure, you can use other components to suit your clustering needs (for example,setting up a cluster for sharing files on a GFS2 file

Pagina 6

Chapter 2. Cluster Management with CMANCluster management manages cluster quorum and cluster membership. CMAN (an abbreviation forcluster manager) per

Pagina 7 - Introduction

2.1.1. Quorum DisksA quorum disk or partition is a section of a disk that's set up for use with components of the clusterproject. It has a couple

Pagina 8

Have a two node configuration with the fence devices on a different network path than the pathused for cluster communicationHave a two node configurat

Pagina 9 - 1.2. Pull-quot e Convent ions

Chapter 3. RGManagerRGManager manages and provides failover capabilities for collections of cluster resources calledservices, resource groups, or reso

Pagina 10 - 2. We Need Feedback!

members within the domain. The highest-ranking member of the domain will run the servicewhenever it is online. This means that if member A has a highe

Pagina 11 - 1.1. Clust er Basics

RGManager has three service recovery policies which may be customized by the administrator on aper-service basis.NoteThese policies also apply to virt

Pagina 13

NoteYou must specify both parameters together; the use of either parameter by itself is undefined.3.3. Resource T rees - Basics / Definit ionsThe foll

Pagina 14 - 2.1. Clust er Quorum

the original start fails, the service behaves as though a relocate operation was requested (seebelow). If the operation succeeds, the service is place

Pagina 15 - 2.1.2. T ie-breakers

failed — The service is presumed dead. This state occurs whenever a resource's stop operationfails. Administrator must verify that there are no a

Pagina 16

live (default) — the virtual machine continues to run while most of its memory contents are copiedto the destination host. This minimizes the inaccess

Pagina 17 - Chapter 3. RGManager

Adding or removing a VM from cluster.conf will not start or stop the VM; it will simply causergmanager to start or stop paying attention to the VMFail

Pagina 18 - 3.2. Service Policies

Chapter 4. FencingFencing is the disconnection of a node from the cluster's shared storage. Fencing cuts off I/O fromshared storage, thus ensurin

Pagina 19 - 3.2.1. Start Policy

Fig u re 4 .1. Po wer Fen cin g Examp leRed Hat Ent erprise Linux 6 High Availabilit y Ad d- O n O verview22

Pagina 20 - 3.4 .1. Service Operat ions

Fig u re 4 .2. St o rag e Fen cin g Examp leSpecifying a fencing method consists of editing a cluster configuration file to assign a fencing-method n

Pagina 21 - Important

Fig u re 4 .3. Fen cin g a No d e wit h Du al Po wer Su p p liesRed Hat Ent erprise Linux 6 High Availabilit y Ad d- O n O verview24

Pagina 22 - 3.5.2. Migrat ion

Fig u re 4 .4 . Fen cin g a N o d e wit h Du al Fib re Ch an n el Co n n ect io n sYou can configure a node with one fencing method or multiple fenc

Pagina 23

Red Hat Enterprise Linux 6 High Availability Add-On OverviewOverview of the High Availability Add-On for Red Hat Enterprise LinuxEdition 6

Pagina 24 - 3.6. Resource Act ions

Chapter 5. Lock ManagementLock management is a common cluster-infrastructure service that provides a mechanism for othercluster infrastructure compone

Pagina 25 - Chapter 4. Fencing

listed above. The choice of an open source or closed source environment is up to the user. However,the DLM’s main limitation is the amount of testing

Pagina 26

Chapter 6. Configuration and Administration ToolsThe cluster configuration file, /etc/cl uster/cl uster. co nf specifies the High Availability Add-Onc

Pagina 27 - ⁠Chapt er 4 . Fencing

provides support for the ccs cluster configuration command, which allows an administrator tocreate, modify and view the cluster.conf cluster configura

Pagina 28

Chapter 7. Virtualization and High AvailabilityVarious virtualization platforms are supported in conjunction with Red Hat Enterprise Linux 6 usingthe

Pagina 29

RHEL 5 supports two virtualization platforms. Xen has been supported since RHEL 5.0 release. InRHEL 5.4 KVM was introduced.RHEL 6 only supports KVM as

Pagina 30 - Chapter 5. Lock Management

Host hardware should be provisioned such that they are capable of absorbing relocated guestsfrom multiple other failed hosts without causing a host to

Pagina 31 - 5.2. Lock St at es

Using the Qpid Management Framework (QMF) provided by the libvirt-qpid package. Thisutilizes QMF to track guest migrations without requiring a full ho

Pagina 32

The iSCSI server software shipped with RHEL does not support SCSI 3 persistent reservations,therefore it cannot be used with fence_scsi. It is suitabl

Pagina 33

Revision HistoryRevisio n 1- 13 Wed O ct 8 2014 St even Levin eGA Release for Red Hat Enterprise Linux 6.6Revisio n 1- 12 T h u Au g 7 2014 St

Pagina 34

Legal NoticeCopyright © 20 14 Red Hat, Inc. and o thers.This do cument is licensed by Red Hat under the Creative Co mmo ns Attributio n-ShareAlike 3.

Pagina 35

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 36 - 7.2. Guest Clust ers

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 37

IntroductionThis document provides a high-level overview of the High Availability Add-On for Red Hat EnterpriseLinux 6.Although the information in thi

Pagina 38

1.1. T ypographic Convent ionsFour typographic conventions are used to call attention to specific words and phrases. Theseconventions, and the circums

Pagina 39 - Revision History

Whether mono-spaced bold or proportional bold, the addition of italics indicates replaceable orvariable text. Italics denotes text you do not input li

Commenti su questo manuale

Nessun commento