Red Hat Enterprise Linux 6High Availability Add-On OverviewOverview of the High Availability Add-On for Red Hat Enterprise LinuxEdition 6
out: mutex_unlock(& kvm->lock); return r;}1.3. Not es and WarningsFinally, we use three visual styles to draw attention to
Chapter 1. High Availability Add-On OverviewThe High Availability Add-On is a clustered system that provides reliability, scalability, andavailability
NoteThe cluster types summarized in the preceding text reflect basic configurations; your needsmight require a combination of the clusters described.A
cluster infrastructure, you can use other components to suit your clustering needs (for example,setting up a cluster for sharing files on a GFS2 file
Chapter 2. Cluster Management with CMANCluster management manages cluster quorum and cluster membership. CMAN (an abbreviation forcluster manager) per
2.1.1. Quorum DisksA quorum disk or partition is a section of a disk that's set up for use with components of the clusterproject. It has a couple
Have a two node configuration with the fence devices on a different network path than the pathused for cluster communicationHave a two node configurat
Chapter 3. RGManagerRGManager manages and provides failover capabilities for collections of cluster resources calledservices, resource groups, or reso
members within the domain. The highest-ranking member of the domain will run the servicewhenever it is online. This means that if member A has a highe
RGManager has three service recovery policies which may be customized by the administrator on aper-service basis.NoteThese policies also apply to virt
NoteYou must specify both parameters together; the use of either parameter by itself is undefined.3.3. Resource T rees - Basics / Definit ionsThe foll
the original start fails, the service behaves as though a relocate operation was requested (seebelow). If the operation succeeds, the service is place
failed — The service is presumed dead. This state occurs whenever a resource's stop operationfails. Administrator must verify that there are no a
live (default) — the virtual machine continues to run while most of its memory contents are copiedto the destination host. This minimizes the inaccess
Adding or removing a VM from cluster.conf will not start or stop the VM; it will simply causergmanager to start or stop paying attention to the VMFail
Chapter 4. FencingFencing is the disconnection of a node from the cluster's shared storage. Fencing cuts off I/O fromshared storage, thus ensurin
Fig u re 4 .1. Po wer Fen cin g Examp leRed Hat Ent erprise Linux 6 High Availabilit y Ad d- O n O verview22
Fig u re 4 .2. St o rag e Fen cin g Examp leSpecifying a fencing method consists of editing a cluster configuration file to assign a fencing-method n
Fig u re 4 .3. Fen cin g a No d e wit h Du al Po wer Su p p liesRed Hat Ent erprise Linux 6 High Availabilit y Ad d- O n O verview24
Fig u re 4 .4 . Fen cin g a N o d e wit h Du al Fib re Ch an n el Co n n ect io n sYou can configure a node with one fencing method or multiple fenc
Red Hat Enterprise Linux 6 High Availability Add-On OverviewOverview of the High Availability Add-On for Red Hat Enterprise LinuxEdition 6
Chapter 5. Lock ManagementLock management is a common cluster-infrastructure service that provides a mechanism for othercluster infrastructure compone
listed above. The choice of an open source or closed source environment is up to the user. However,the DLM’s main limitation is the amount of testing
Chapter 6. Configuration and Administration ToolsThe cluster configuration file, /etc/cl uster/cl uster. co nf specifies the High Availability Add-Onc
provides support for the ccs cluster configuration command, which allows an administrator tocreate, modify and view the cluster.conf cluster configura
Chapter 7. Virtualization and High AvailabilityVarious virtualization platforms are supported in conjunction with Red Hat Enterprise Linux 6 usingthe
RHEL 5 supports two virtualization platforms. Xen has been supported since RHEL 5.0 release. InRHEL 5.4 KVM was introduced.RHEL 6 only supports KVM as
Host hardware should be provisioned such that they are capable of absorbing relocated guestsfrom multiple other failed hosts without causing a host to
Using the Qpid Management Framework (QMF) provided by the libvirt-qpid package. Thisutilizes QMF to track guest migrations without requiring a full ho
The iSCSI server software shipped with RHEL does not support SCSI 3 persistent reservations,therefore it cannot be used with fence_scsi. It is suitabl
Revision HistoryRevisio n 1- 13 Wed O ct 8 2014 St even Levin eGA Release for Red Hat Enterprise Linux 6.6Revisio n 1- 12 T h u Au g 7 2014 St
Legal NoticeCopyright © 20 14 Red Hat, Inc. and o thers.This do cument is licensed by Red Hat under the Creative Co mmo ns Attributio n-ShareAlike 3.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
IntroductionThis document provides a high-level overview of the High Availability Add-On for Red Hat EnterpriseLinux 6.Although the information in thi
1.1. T ypographic Convent ionsFour typographic conventions are used to call attention to specific words and phrases. Theseconventions, and the circums
Whether mono-spaced bold or proportional bold, the addition of italics indicates replaceable orvariable text. Italics denotes text you do not input li
Commenti su questo manuale