Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0 Przewodnik Instalacji Strona 1

Przeglądaj online lub pobierz Przewodnik Instalacji dla Serwery Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0. Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0 Installation guide Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Cluster Suite Overview

Red Hat Enterprise Linux 5Cluster Suite OverviewRed Hat Cluster Suite for Red Hat Enterprise Linux 5Edition 5

Strona 2

Chapter 1. Red Hat Cluster Suite OverviewClustered systems provide reliability, scalability, and availability to critical production services.Using Re

Strona 3 - Edition 5

you can match the number of nodes according to load requirements. If a node in a load-balancingcluster becomes inoperative, the load-balancing softwar

Strona 4 - Abstract

Global Network Block Device (GNBD) — An ancillary component of GFS/GFS2 that exportsblock-level storage to Ethernet. This is an economical way to make

Strona 5 - Table of Contents

The Red Hat Cluster Suite cluster infrastructure provides the basic functions for a group of computers(called nodes or members) to work together as a

Strona 6 - Introduction

Fig u re 1.2. C MAN/DLM O verview1.3.2. Lock ManagementLock management is a common cluster-infrastructure service that provides a mechanism for otherc

Strona 7 - 1.1. T ypographic Conventions

Power fencing — A fencing method that uses a power controller to power off an inoperable node.Two types of power fencing are available: external and i

Strona 8 - 1.2. Pull-quot e Convent ions

Fig u re 1.4 . Fib re Ch an nel Swit ch Fen cin g ExampleSpecifying a fencing method consists of editing a cluster configuration file to assign a fen

Strona 9 - 2. Feedback

Fig u re 1.5. Fen cin g a No d e wit h D u al Po wer Su p p lies⁠Chapt er 1 . Red Hat Clust er Suit e Overview13

Strona 10 - 1.1. Clust er Basics

Fig u re 1.6 . Fen cin g a N o d e wit h Du al Fib re Ch an nel Co n n ect io nsYou can configure a node with one fencing method or multiple fencing

Strona 11

Fig u re 1.7. C CS O verviewOther cluster components (for example, CMAN) access configuration information from theconfiguration file through CCS (refe

Strona 13 - 1.3.1. Clust er Management

Fig u re 1.8. Accessin g Co n f ig u rat io n In f o rmat io nThe cluster configuration file (/etc/cluster/cluster.conf) is an XML file that describe

Strona 14 - 1.3.3. Fencing

service. A high-availability cluster service can fail over from one cluster node to another with noapparent interruption to cluster clients. Cluster-s

Strona 15

Fig u re 1.9 . Failo ver Do main sFigure 1.10, “ Web Server Cluster Service Example” shows an example of a high-availability clusterservice that is a

Strona 16

Fig u re 1.10. Web Server C lu st er Service ExampleClients access the cluster service through the IP address 10.10.10.201, enabling interaction with

Strona 17

GFS/GFS2 is a native file system that interfaces directly with the Linux kernel file system interface(VFS layer). When implemented as a cluster file s

Strona 18

The Cluster Logical Volume Manager (CLVM) provides a cluster-wide version of LVM2. CLVMprovides the same capabilities as LVM2 on a single node, but ma

Strona 19 - Fig u re 1.7. C CS O verview

Fig u re 1.11. CLVM O verviewYou can configure CLVM using the same commands as LVM2, using the LVM graphical user interface(refer to Figure 1.12, “ LV

Strona 20

Fig u re 1.12. LVM G rap hical User In t erf ace⁠Chapt er 1 . Red Hat Clust er Suit e Overview23

Strona 21

Fig u re 1.13. Co n g a LVM G rap hical User In t erf aceRed Hat Ent erprise Linux 5 Clust er Suit e Overview24

Strona 22

Fig u re 1.14 . Creat in g Lo g ical Volu mes1.7. Global Net work Block DeviceGlobal Network Block Device (GNBD) provides block-device access to Red H

Strona 23

Red Hat Enterprise Linux 5 Cluster Suite OverviewRed Hat Cluster Suite for Red Hat Enterprise Linux 5Edition 5

Strona 24

Fig u re 1.15. G NBD O verview1.8. Linux Virt ual ServerLinux Virtual Server (LVS) is a set of integrated software components for balancing the IP lo

Strona 25

Fig u re 1.16 . Co mpo nen t s o f a R u n nin g LVS Clu st erThe pulse daemon runs on both the active and passive LVS routers. On the backup LVS rout

Strona 26

Synchronize the data across the real servers.Add a third layer to the topology for shared data access.The first option is preferred for servers that d

Strona 27

Fig u re 1.17. T wo- T ier LVS T o p olo gyService requests arriving at an LVS router are addressed to a virtual IP address or VIP. This is apublicly-

Strona 28

Also, the active LVS router dynamically monitors the overall health of the specific services on the realservers through simple send/expect scripts. To

Strona 29

Fig u re 1.18. T hree- Tier LVS T op o lo g yThis topology is suited well for busy FTP servers, where accessible data is stored on a central, highlyav

Strona 30 - 1.8. Linux Virt ual Server

Figure 1.19, “ LVS Implemented with NAT Routing” , illustrates LVS using NAT routing to move requestsbetween the Internet and a private network.Fig u

Strona 31

1.8 .3.2 . Direct Ro ut ingDirect routing provides increased performance benefits compared to NAT routing. Direct routingallows the real servers to p

Strona 32

correct IP/MAC address combination receives the packet. The IP/MAC associations are stored in anARP cache, which is cleared periodically (usually ever

Strona 33

Because of its efficiency and ease-of-use, administrators of LVS should use firewall marks instead ofpersistence whenever possible for grouping connec

Strona 34

Legal NoticeCopyright © 20 14 Red Hat, Inc.This do cument is licensed by Red Hat under the Creative Co mmons Attributio n-ShareAlike 3.0Unpo rted Lic

Strona 35 - 1.8.3. Rout ing Met hods

You can populate the database of one lu ci instance from another lu ciinstance. That capabilityprovides a means of replicating a lu ci server instance

Strona 36 - 1.8 .3.2 . Direct Ro ut ing

Fig u re 1.22. lu ci clu st er T ab⁠Chapt er 1 . Red Hat Clust er Suit e Overview37

Strona 37

Fig u re 1.23. lu ci st o rag e T ab1.9.2. Clust er Administ rat ion GUIThis section provides an overview of the system-config-cluster cluster adminis

Strona 38 - 1.8 .4 .2 . Fire wall Marks

Fig u re 1.24 . Clu st er C o n fig urat io n T oo lThe Clu st er C o n fig urat io n T oo l represents cluster configuration components in theconfi

Strona 39 - 1.9.1. Conga

Fence Devices — Displays fence devices. Fence devices are represented as subordinateelements under Fence Devices. Using configuration buttons at the b

Strona 40

Fig u re 1.25. Clu st er St at u s T o o lThe nodes and services displayed in the Clu st er St at u s T oo l are determined by the clusterconfiguratio

Strona 41

T ab le 1.1. Co mman d Lin e T oo lsCo mman d Lin eT o o lUsed Wit h Pu rp o seccs_tool —ClusterConfigurationSystem ToolClusterInfrastructureccs_too

Strona 42

Fig u re 1.26 . T he Welco me Pan elThe following sections provide a brief description of the Piran h a Co nf ig u rat io n To o lconfiguration pages

Strona 43

Fig u re 1.27. T he CONTROL/MONITORING Pan elAuto updateEnables the status display to be updated automatically at a user-configurable interval setin t

Strona 44

The GLOBAL SETTINGS panel is where the LVS administrator defines the networking details for theprimary LVS router's public and private network in

Strona 45

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 46

NAT Router IPThe private floating IP in this text field. This floating IP should be used as the gateway forthe real servers.NAT Router netmaskIf the N

Strona 47 - 1.10.1. CONTROL/MONITORING

Redundant server public IPThe public real IP address for the backup LVS router.Redundant server private IPThe backup router's private real IP add

Strona 48 - 1.10.2. GLOBAL SETTINGS

Fig u re 1.30. T he VIRTUAL SERVERS Pan elEach server displayed in the VIRTUAL SERVERS panel can be configured on subsequent screens orsubsections.To

Strona 49

Fig u re 1.31. T he VIRTUAL SERVERS Su bsect io nNameA descriptive name to identify the virtual server. This name is not the hostname for themachine,

Strona 50 - 1.10.3. REDUNDANCY

Firewall MarkFor entering a firewall mark integer value when bundling multi-port protocols or creating amulti-port virtual server for separate, but re

Strona 51 - 1.10.4 . VIRTUAL SERVERS

Fig u re 1.32. T he REAL SERVER Su b sect io nClick the ADD button to add a new server. To delete an existing server, select the radio button besideit

Strona 52

Fig u re 1.33. T he REAL SERVER Co nf ig u rat io n Pan elThis panel consists of three entry fields:NameA descriptive name for the real server.NoteTh

Strona 53

The value can be arbitrary, but treat it as a ratio in relation to other real servers.1.1 0.4 .3. EDIT MONITORING SCRIPTS Subse ct io nClick on the MO

Strona 54

NoteIf an external program is entered in the Sending Program field, then the Send fieldis ignored.SendA string for the nanny daemon to send to each re

Strona 55

Chapter 2. Red Hat Cluster Suite Component SummaryThis chapter provides a summary of Red Hat Cluster Suite components and consists of the followingsec

Strona 56

IntroductionThis document provides a high-level overview of Red Hat Cluster Suite for Red Hat Enterprise Linux 5and is is organized as follows:Chapter

Strona 57

cluster.confThis is the cluster configuration file. Thefull path is /etc/cluster/cluster.conf.Cluster Manager(CMAN)cman.koThe kernel module for CMAN.

Strona 58

fence_vixelFence agent for Vixel Fibre Channelswitch. fence_sanbox2Fence agent for SANBox2 FibreChannel switch. fence_iloFence agent for HP ILO inter

Strona 59 - 2.1. Clust er Component s

gnbd_importCommand to import and manageGNBDs on a GNBD client. gnbd_servA server daemon that allows a node toexport local storage over the network.LV

Strona 60

lvs.cfThis is the LVS configuration file. Thefull path for the file is /etc/sysconfig/ha/lvs.cf.Directly or indirectly, all daemons gettheir configur

Strona 61

fence_drac (8) - fencing agent for Dell Remote Access Cardfence_egenera (8) - I/O Fencing agent for the Egenera BladeFramefence_gnbd (8) - I/O Fencing

Strona 62

lvm (8) - LVM2 toolslvm.conf [lvm] (5) - Configuration file for LVM2lvmchange (8) - change attributes of the logical volume managerpvcreate (8) - init

Strona 63 - 2.2. Man Pages

Revision HistoryRevisio n 5.11- 6 Mo n Sep 8 2014 St even Levin eVersion for 5.11 GA releaseRevisio n 5.11- 4 Mo n Ju n 30 2014 St even Levin eBe

Strona 64

co mman d lin e t o ols t ab le, Co mman d Lin e Ad min ist rat io n To olsco mp at ib le h ard ware- cluster components, Compatible HardwareCo ng

Strona 65 - 2.3. Compat ible Hardware

- VIRTUAL SERVER subsection, VIRTUAL SERVERS- Firewall Mark , The VIRTUAL SERVER Subsection- Persistence , The VIRTUAL SERVER Subsection- Scheduling ,

Strona 66 - Revision History

1.1. T ypographic ConventionsFour typographic conventions are used to call attention to specific words and phrases. Theseconventions, and the circumst

Strona 67 - Revision Hist ory

Whether mono-spaced bold or proportional bold, the addition of italics indicates replaceable orvariable text. Italics denotes text you do not input li

Strona 68

1.3. Not es and WarningsFinally, we use three visual styles to draw attention to information that might otherwise be overlooked.NoteNotes are tips, sh

Komentarze do niniejszej Instrukcji

Brak uwag