Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0 Guia de Instalação

Consulte online ou descarregue Guia de Instalação para Servidores Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0. Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0 Installation guide Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir

Resumo do Conteúdo

Página 1 - Red Hat Enterprise Linux 6

Red Hat Enterprise Linux 6High Availability Add-On OverviewOverview of the High Availability Add-On for Red Hat Enterprise LinuxEdition 6

Página 2

out: mutex_unlock(& kvm->lock); return r;}1.3. Not es and WarningsFinally, we use three visual styles to draw attention to

Página 3

Chapter 1. High Availability Add-On OverviewThe High Availability Add-On is a clustered system that provides reliability, scalability, andavailability

Página 4 - Abstract

NoteThe cluster types summarized in the preceding text reflect basic configurations; your needsmight require a combination of the clusters described.A

Página 5 - Table of Contents

cluster infrastructure, you can use other components to suit your clustering needs (for example,setting up a cluster for sharing files on a GFS2 file

Página 6

Chapter 2. Cluster Management with CMANCluster management manages cluster quorum and cluster membership. CMAN (an abbreviation forcluster manager) per

Página 7 - Introduction

2.1.1. Quorum DisksA quorum disk or partition is a section of a disk that's set up for use with components of the clusterproject. It has a couple

Página 8

Have a two node configuration with the fence devices on a different network path than the pathused for cluster communicationHave a two node configurat

Página 9 - 1.2. Pull-quot e Convent ions

Chapter 3. RGManagerRGManager manages and provides failover capabilities for collections of cluster resources calledservices, resource groups, or reso

Página 10 - 2. We Need Feedback!

members within the domain. The highest-ranking member of the domain will run the servicewhenever it is online. This means that if member A has a highe

Página 11 - 1.1. Clust er Basics

RGManager has three service recovery policies which may be customized by the administrator on aper-service basis.NoteThese policies also apply to virt

Página 13

NoteYou must specify both parameters together; the use of either parameter by itself is undefined.3.3. Resource T rees - Basics / Definit ionsThe foll

Página 14 - 2.1. Clust er Quorum

the original start fails, the service behaves as though a relocate operation was requested (seebelow). If the operation succeeds, the service is place

Página 15 - 2.1.2. T ie-breakers

failed — The service is presumed dead. This state occurs whenever a resource's stop operationfails. Administrator must verify that there are no a

Página 16

live (default) — the virtual machine continues to run while most of its memory contents are copiedto the destination host. This minimizes the inaccess

Página 17 - Chapter 3. RGManager

Adding or removing a VM from cluster.conf will not start or stop the VM; it will simply causergmanager to start or stop paying attention to the VMFail

Página 18 - 3.2. Service Policies

Chapter 4. FencingFencing is the disconnection of a node from the cluster's shared storage. Fencing cuts off I/O fromshared storage, thus ensurin

Página 19 - 3.2.1. Start Policy

Fig u re 4 .1. Po wer Fen cin g Examp leRed Hat Ent erprise Linux 6 High Availabilit y Ad d- O n O verview22

Página 20 - 3.4 .1. Service Operat ions

Fig u re 4 .2. St o rag e Fen cin g Examp leSpecifying a fencing method consists of editing a cluster configuration file to assign a fencing-method n

Página 21 - Important

Fig u re 4 .3. Fen cin g a No d e wit h Du al Po wer Su p p liesRed Hat Ent erprise Linux 6 High Availabilit y Ad d- O n O verview24

Página 22 - 3.5.2. Migrat ion

Fig u re 4 .4 . Fen cin g a N o d e wit h Du al Fib re Ch an n el Co n n ect io n sYou can configure a node with one fencing method or multiple fenc

Página 23

Red Hat Enterprise Linux 6 High Availability Add-On OverviewOverview of the High Availability Add-On for Red Hat Enterprise LinuxEdition 6

Página 24 - 3.6. Resource Act ions

Chapter 5. Lock ManagementLock management is a common cluster-infrastructure service that provides a mechanism for othercluster infrastructure compone

Página 25 - Chapter 4. Fencing

listed above. The choice of an open source or closed source environment is up to the user. However,the DLM’s main limitation is the amount of testing

Página 26

Chapter 6. Configuration and Administration ToolsThe cluster configuration file, /etc/cl uster/cl uster. co nf specifies the High Availability Add-Onc

Página 27 - ⁠Chapt er 4 . Fencing

provides support for the ccs cluster configuration command, which allows an administrator tocreate, modify and view the cluster.conf cluster configura

Página 28

Chapter 7. Virtualization and High AvailabilityVarious virtualization platforms are supported in conjunction with Red Hat Enterprise Linux 6 usingthe

Página 29

RHEL 5 supports two virtualization platforms. Xen has been supported since RHEL 5.0 release. InRHEL 5.4 KVM was introduced.RHEL 6 only supports KVM as

Página 30 - Chapter 5. Lock Management

Host hardware should be provisioned such that they are capable of absorbing relocated guestsfrom multiple other failed hosts without causing a host to

Página 31 - 5.2. Lock St at es

Using the Qpid Management Framework (QMF) provided by the libvirt-qpid package. Thisutilizes QMF to track guest migrations without requiring a full ho

Página 32

The iSCSI server software shipped with RHEL does not support SCSI 3 persistent reservations,therefore it cannot be used with fence_scsi. It is suitabl

Página 33

Revision HistoryRevisio n 1- 13 Wed O ct 8 2014 St even Levin eGA Release for Red Hat Enterprise Linux 6.6Revisio n 1- 12 T h u Au g 7 2014 St

Página 34

Legal NoticeCopyright © 20 14 Red Hat, Inc. and o thers.This do cument is licensed by Red Hat under the Creative Co mmo ns Attributio n-ShareAlike 3.

Página 35

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 36 - 7.2. Guest Clust ers

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 37

IntroductionThis document provides a high-level overview of the High Availability Add-On for Red Hat EnterpriseLinux 6.Although the information in thi

Página 38

1.1. T ypographic Convent ionsFour typographic conventions are used to call attention to specific words and phrases. Theseconventions, and the circums

Página 39 - Revision History

Whether mono-spaced bold or proportional bold, the addition of italics indicates replaceable orvariable text. Italics denotes text you do not input li

Comentários a estes Manuais

Sem comentários