Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0 Przewodnik Instalacji

Przeglądaj online lub pobierz Przewodnik Instalacji dla Serwery Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0. Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0 Installation guide Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Red Hat Enterprise Linux 6

Red Hat Enterprise Linux 6High Availability Add-On OverviewOverview of the High Availability Add-On for Red Hat Enterprise LinuxEdition 6

Strona 2

out: mutex_unlock(& kvm->lock); return r;}1.3. Not es and WarningsFinally, we use three visual styles to draw attention to

Strona 3

Chapter 1. High Availability Add-On OverviewThe High Availability Add-On is a clustered system that provides reliability, scalability, andavailability

Strona 4 - Abstract

NoteThe cluster types summarized in the preceding text reflect basic configurations; your needsmight require a combination of the clusters described.A

Strona 5 - Table of Contents

cluster infrastructure, you can use other components to suit your clustering needs (for example,setting up a cluster for sharing files on a GFS2 file

Strona 6

Chapter 2. Cluster Management with CMANCluster management manages cluster quorum and cluster membership. CMAN (an abbreviation forcluster manager) per

Strona 7 - Introduction

2.1.1. Quorum DisksA quorum disk or partition is a section of a disk that's set up for use with components of the clusterproject. It has a couple

Strona 8

Have a two node configuration with the fence devices on a different network path than the pathused for cluster communicationHave a two node configurat

Strona 9 - 1.2. Pull-quot e Convent ions

Chapter 3. RGManagerRGManager manages and provides failover capabilities for collections of cluster resources calledservices, resource groups, or reso

Strona 10 - 2. We Need Feedback!

members within the domain. The highest-ranking member of the domain will run the servicewhenever it is online. This means that if member A has a highe

Strona 11 - 1.1. Clust er Basics

RGManager has three service recovery policies which may be customized by the administrator on aper-service basis.NoteThese policies also apply to virt

Strona 13

NoteYou must specify both parameters together; the use of either parameter by itself is undefined.3.3. Resource T rees - Basics / Definit ionsThe foll

Strona 14 - 2.1. Clust er Quorum

the original start fails, the service behaves as though a relocate operation was requested (seebelow). If the operation succeeds, the service is place

Strona 15 - 2.1.2. T ie-breakers

failed — The service is presumed dead. This state occurs whenever a resource's stop operationfails. Administrator must verify that there are no a

Strona 16

live (default) — the virtual machine continues to run while most of its memory contents are copiedto the destination host. This minimizes the inaccess

Strona 17 - Chapter 3. RGManager

Adding or removing a VM from cluster.conf will not start or stop the VM; it will simply causergmanager to start or stop paying attention to the VMFail

Strona 18 - 3.2. Service Policies

Chapter 4. FencingFencing is the disconnection of a node from the cluster's shared storage. Fencing cuts off I/O fromshared storage, thus ensurin

Strona 19 - 3.2.1. Start Policy

Fig u re 4 .1. Po wer Fen cin g Examp leRed Hat Ent erprise Linux 6 High Availabilit y Ad d- O n O verview22

Strona 20 - 3.4 .1. Service Operat ions

Fig u re 4 .2. St o rag e Fen cin g Examp leSpecifying a fencing method consists of editing a cluster configuration file to assign a fencing-method n

Strona 21 - Important

Fig u re 4 .3. Fen cin g a No d e wit h Du al Po wer Su p p liesRed Hat Ent erprise Linux 6 High Availabilit y Ad d- O n O verview24

Strona 22 - 3.5.2. Migrat ion

Fig u re 4 .4 . Fen cin g a N o d e wit h Du al Fib re Ch an n el Co n n ect io n sYou can configure a node with one fencing method or multiple fenc

Strona 23

Red Hat Enterprise Linux 6 High Availability Add-On OverviewOverview of the High Availability Add-On for Red Hat Enterprise LinuxEdition 6

Strona 24 - 3.6. Resource Act ions

Chapter 5. Lock ManagementLock management is a common cluster-infrastructure service that provides a mechanism for othercluster infrastructure compone

Strona 25 - Chapter 4. Fencing

listed above. The choice of an open source or closed source environment is up to the user. However,the DLM’s main limitation is the amount of testing

Strona 26

Chapter 6. Configuration and Administration ToolsThe cluster configuration file, /etc/cl uster/cl uster. co nf specifies the High Availability Add-Onc

Strona 27 - ⁠Chapt er 4 . Fencing

provides support for the ccs cluster configuration command, which allows an administrator tocreate, modify and view the cluster.conf cluster configura

Strona 28

Chapter 7. Virtualization and High AvailabilityVarious virtualization platforms are supported in conjunction with Red Hat Enterprise Linux 6 usingthe

Strona 29

RHEL 5 supports two virtualization platforms. Xen has been supported since RHEL 5.0 release. InRHEL 5.4 KVM was introduced.RHEL 6 only supports KVM as

Strona 30 - Chapter 5. Lock Management

Host hardware should be provisioned such that they are capable of absorbing relocated guestsfrom multiple other failed hosts without causing a host to

Strona 31 - 5.2. Lock St at es

Using the Qpid Management Framework (QMF) provided by the libvirt-qpid package. Thisutilizes QMF to track guest migrations without requiring a full ho

Strona 32

The iSCSI server software shipped with RHEL does not support SCSI 3 persistent reservations,therefore it cannot be used with fence_scsi. It is suitabl

Strona 33

Revision HistoryRevisio n 1- 13 Wed O ct 8 2014 St even Levin eGA Release for Red Hat Enterprise Linux 6.6Revisio n 1- 12 T h u Au g 7 2014 St

Strona 34

Legal NoticeCopyright © 20 14 Red Hat, Inc. and o thers.This do cument is licensed by Red Hat under the Creative Co mmo ns Attributio n-ShareAlike 3.

Strona 35

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 36 - 7.2. Guest Clust ers

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strona 37

IntroductionThis document provides a high-level overview of the High Availability Add-On for Red Hat EnterpriseLinux 6.Although the information in thi

Strona 38

1.1. T ypographic Convent ionsFour typographic conventions are used to call attention to specific words and phrases. Theseconventions, and the circums

Strona 39 - Revision History

Whether mono-spaced bold or proportional bold, the addition of italics indicates replaceable orvariable text. Italics denotes text you do not input li

Komentarze do niniejszej Instrukcji

Brak uwag