Red Hat CLUSTER SUITE FOR ENTERPRISE LINUX 5.2 Installationsanleitung

Stöbern Sie online oder laden Sie Installationsanleitung nach Netzwerkverwaltungssoftware Red Hat CLUSTER SUITE FOR ENTERPRISE LINUX 5.2 herunter. Red Hat CLUSTER SUITE FOR ENTERPRISE LINUX 5.2 Installation guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - Red Hat Enterprise Linux

Red Hat Cluster Suite OverviewRed Hat Cluster Suite forRed Hat Enterprise Linux5.2Cluster_Suite_OverviewISBN: N/APublication date: May 2008

Seite 3

Red Hat Cluster Suite OverviewClustered systems provide reliability, scalability, and availability to critical production services.Using Red Hat Clust

Seite 4

High-availability clusters provide continuous availability of services by eliminating single pointsof failure and by failing over services from one cl

Seite 5

Infrastructure components, the High-availability and Service Management components, andstorage.• Linux Virtual Server (LVS) — Routing software that pr

Seite 6

Figure 1.1. Red Hat Cluster Suite IntroductionNoteFigure 1.1, “Red Hat Cluster Suite Introduction” includes GFS, CLVM, andGNBD, which are components t

Seite 7 - Introduction

the node votes plus 1. For quorum via quorum disk, quorum consists of user-specifiedconditions.NoteBy default, each node has one quorum vote. Optional

Seite 8 - 1. Document Conventions

distributed across all nodes in the cluster (refer to Figure 1.2, “CMAN/DLM Overview”). GFS andCLVM use locks from the lock manager. GFS uses locks fr

Seite 9 - 2. Feedback

Figure 1.3. Power Fencing ExampleFencing7

Seite 10

Figure 1.4. Fibre Channel Switch Fencing ExampleSpecifying a fencing method consists of editing a cluster configuration file to assign afencing-method

Seite 11 - 1. Cluster Basics

Figure 1.5. Fencing a Node with Dual Power SuppliesFencing9

Seite 12

Red Hat Cluster Suite Overview provides an overview of Red Hat Cluster Suite for Red HatEnterprise Linux 5.2Red Hat Cluster Suite Overview

Seite 13

Figure 1.6. Fencing a Node with Dual Fibre Channel ConnectionsYou can configure a node with one fencing method or multiple fencing methods. When youco

Seite 14 - 3. Cluster Infrastructure

The Cluster Configuration System (CCS) manages the cluster configuration and providesconfiguration information to other cluster components in a Red Ha

Seite 15 - 3.2. Lock Management

Figure 1.8. Accessing Configuration InformationThe cluster configuration file (/etc/cluster/cluster.conf) is an XML file that describes thefollowing c

Seite 16 - 3.3. Fencing

High-availability service management provides the ability to create and manage high-availabilitycluster services in a Red Hat cluster. The key compone

Seite 17

Figure 1.9. Failover DomainsFigure 1.10, “Web Server Cluster Service Example” shows an example of a high-availabilitycluster service that is a web ser

Seite 18

Figure 1.10. Web Server Cluster Service ExampleClients access the cluster service through the IP address 10.10.10.201, enabling interactionwith the we

Seite 19

uses a lock manager to coordinate I/O. When one node changes data on a GFS file system,that change is immediately visible to the other cluster nodes u

Seite 20

• Section 5.1, “Superior Performance and Scalability”• Section 5.2, “Performance, Scalability, Moderate Price”• Section 5.3, “Economy and Performance”

Seite 21 - Figure 1.7. CCS Overview

Figure 1.12, “GFS and GNBD with a SAN”. SAN block storage is presented to network clientsas block storage devices by GNBD servers. From the perspectiv

Seite 22

Figure 1.13. GFS and GNBD with Directly Connected Storage6. Cluster Logical Volume ManagerThe Cluster Logical Volume Manager (CLVM) provides a cluster

Seite 23

Red Hat Cluster Suite Overview: Red Hat Cluster Suite forRed Hat Enterprise LinuxCopyright © 2008 Red Hat, Inc.Copyright © 2008 Red Hat, Inc. This mat

Seite 24 - Figure 1.9. Failover Domains

Using CLVM requires minor changes to /etc/lvm/lvm.conf for cluster-widelocking.Figure 1.14. CLVM OverviewYou can configure CLVM using the same command

Seite 25 - 5. Red Hat GFS

Figure 1.15. LVM Graphical User InterfaceCluster Logical Volume Manager21

Seite 26

Figure 1.16. Conga LVM Graphical User InterfaceChapter 1. Red Hat Cluster Suite Overview22

Seite 27 - Figure 1.11. GFS with a SAN

Figure 1.17. Creating Logical Volumes7. Global Network Block DeviceGlobal Network Block Device (GNBD) provides block-device access to Red Hat GFS over

Seite 28 - 5.3. Economy and Performance

Figure 1.18. GNBD Overview8. Linux Virtual ServerLinux Virtual Server (LVS) is a set of integrated software components for balancing the IP loadacross

Seite 29

Figure 1.19. Components of a Running LVS ClusterThe pulse daemon runs on both the active and passive LVS routers. On the backup LVSrouter, pulse sends

Seite 30 - Figure 1.14. CLVM Overview

To an outside user accessing a hosted service (such as a website or database application),LVS appears as one server. However, the user is actually acc

Seite 31

1A virtual server is a service configured to listen on a specific virtual IP.Figure 1.20. Two-Tier LVS TopologyService requests arriving at an LVS rou

Seite 32

• Round-Robin Scheduling — Distributes each request sequentially around a pool of realservers. Using this algorithm, all the real servers are treated

Seite 33

The backup LVS router performs the role of a standby system. Periodically, the LVS routersexchange heartbeat messages through the primary external pub

Seite 34 - 8. Linux Virtual Server

Red Hat Cluster Suite Overview

Seite 35

Figure 1.21. Three-Tier LVS TopologyThis topology is suited well for busy FTP servers, where accessible data is stored on a central,highly available s

Seite 36 - 8.1. Two-Tier LVS Topology

a Red Hat cluster, you can configure one high-availability cluster to serve both of these rolessimultaneously.8.3. Routing MethodsYou can use Network

Seite 37

interface are taken over by the backup LVS router simultaneously. All the real servers on theprivate network use the floating IP for the NAT router as

Seite 38

Figure 1.23. LVS Implemented with Direct RoutingIn a typical direct-routing LVS configuration, an LVS router receives incoming server requeststhrough

Seite 39 - 8.2. Three-Tier LVS Topology

In typical situations, a client on the Internet sends a request to an IP address. Network routerstypically send requests to their destination by relat

Seite 40

8.4.2. Firewall MarksFirewall marks are an easy and efficient way to a group ports used for a protocol or group ofrelated protocols. For example, if L

Seite 41 - 8.3. Routing Methods

luci is accessible through a Web browser and provides three major functions that areaccessible through the following tabs:• homebase — Provides tools

Seite 42 - 8.3.2. Direct Routing

Figure 1.24. luci homebase TabFigure 1.25. luci cluster TabConga37

Seite 43

Figure 1.26. luci storage Tab9.2. Cluster Administration GUIThis section provides an overview of the system-config-cluster cluster administrationgraph

Seite 44 - 8.4.1. Persistence

9.2.1. Cluster Configuration ToolYou can access the Cluster Configuration Tool (Figure 1.27, “Cluster Configuration Tool”)through the Cluster Configur

Seite 45 - 9.1. Conga

Introduction ... vii1. Document Conventions

Seite 46

• Cluster Nodes — Displays cluster nodes. Nodes are represented by name as subordinateelements under Cluster Nodes. Using configuration buttons at the

Seite 47 - Figure 1.25. luci cluster Tab

Cluster Management tab in Cluster Administration GUI.Figure 1.28. Cluster Status ToolThe nodes and services displayed in the Cluster Status Tool are d

Seite 48 - Figure 1.26. luci storage Tab

Administration GUI and init scripts supplied by Red Hat. Table 1.1, “Command Line Tools”summarizes the command line tools.Command LineToolUsed With Pu

Seite 49

Web browser. You can access it locally with this URL: http://localhost:3636. You canaccess it remotely with either the hostname or the real IP address

Seite 50 - 9.2.2. Cluster Status Tool

Figure 1.30. The CONTROL/MONITORING PanelAuto updateEnables the status display to be updated automatically at a user-configurable interval set inthe U

Seite 51

10.2. GLOBAL SETTINGSThe GLOBAL SETTINGS panel is where the LVS administrator defines the networking detailsfor the primary LVS router's public a

Seite 52 - Table 1.1. Command Line Tools

The next three fields are specifically for the NAT router's virtual network interface connected theprivate network with the real servers.NAT Rout

Seite 53 - 10.1. CONTROL/MONITORING

Figure 1.32. The REDUNDANCY PanelRedundant server public IPThe public real IP address for the backup LVS router.Redundant server private IPThe backup

Seite 54

Figure 1.33. The VIRTUAL SERVERS PanelEach server displayed in the VIRTUAL SERVERS panel can be configured on subsequentscreens or subsections.To add

Seite 55 - 10.2. GLOBAL SETTINGS

any of the subsections related to this virtual server, complete this page and click on theACCEPT button.Figure 1.34. The VIRTUAL SERVERS SubsectionNam

Seite 57 - 10.4. VIRTUAL SERVERS

Virtual IP Network MaskThe netmask for this virtual server, in the drop-down menu.Firewall MarkFor entering a firewall mark integer value when bundlin

Seite 58

drop-down menu.10.4.2. REAL SERVER SubsectionClicking on the REAL SERVER subsection link at the top of the panel displays the EDIT REALSERVER subsecti

Seite 59

Figure 1.36. The REAL SERVER Configuration PanelThis panel consists of three entry fields:NameA descriptive name for the real server.TipThis name is n

Seite 60 - Weighted

WeightAn integer value indicating this host's capacity relative to that of other hosts in the pool. Thevalue can be arbitrary, but treat it as a

Seite 61

dynamically changing data, such as HTTPS or SSL.To use this function, you must write a script that returns a textual response, set it to beexecutable,

Seite 62

Red Hat Cluster Suite ComponentSummaryThis chapter provides a summary of Red Hat Cluster Suite components and consists of thefollowing sections:• Sect

Seite 63

Function Components Descriptioncreated with GFS 6.0 (and earlier) tothe XML format configuration formatused with this release of Red HatCluster Suite.

Seite 64

Function Components Descriptionmembership and services running.clurgmgrd Daemon used to handle user servicerequests including service start,service di

Seite 65 - 1. Cluster Components

Function Components Descriptionenvironments.fence_ack_manual User interface for fence_manualagent.fence_node A program which performs I/O fencingon a

Seite 66

Function Components Descriptiongnbd_serv A server daemon that allows a nodeto export local storage over thenetwork.LVS pulse This is the controlling p

Seite 67

IntroductionThis document provides a high-level overview of Red Hat Cluster Suite for Red Hat EnterpriseLinux 5 and is is organized as follows:• Chapt

Seite 68

Function Components Descriptionnanny The nanny monitoring daemon runson the active LVS router. Through thisdaemon, the active LVS routerdetermines the

Seite 69

• ccs (7) - Cluster Configuration System• cman_tool (8) - Cluster Management Tool• cluster.conf [cluster] (5) - The configuration file for cluster pro

Seite 70 - 2. Man Pages

• fence_xvm (8) - I/O Fencing agent for Xen virtual machines• fence_xvmd (8) - I/O Fencing agent host for Xen virtual machines• fenced (8) - the I/O F

Seite 71

• pulse (8) - heartbeating daemon for monitoring the health of cluster nodes• lvs.cf [lvs] (5) - configuration file for lvs• lvscan (8) - scan (all di

Seite 73 - 3. Compatible Hardware

IndexCclusterdisplaying status, 41cluster administrationdisplaying cluster and service status, 41cluster component compatible hardware, 63cluster comp

Seite 75

PDF, and RPM versions on the Red Hat Enterprise Linux Documentation CD and online athttp://www.redhat.com/docs/.1. Document ConventionsCertain words i

Seite 76

TipA tip is typically an alternative way of performing a task.ImportantImportant information is necessary, but possibly unexpected, such as aconfigura

Kommentare zu diesen Handbüchern

Keine Kommentare