Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0 Installationsanleitung

Stöbern Sie online oder laden Sie Installationsanleitung nach Server Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0 herunter. Red Hat CLUSTER FOR ENTERPRISE LINUX 5.0 Installation guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - Red Hat Enterprise Linux 6

Red Hat Enterprise Linux 6High Availability Add-On OverviewOverview of the High Availability Add-On for Red Hat Enterprise LinuxEdition 6

Seite 2

out: mutex_unlock(& kvm->lock); return r;}1.3. Not es and WarningsFinally, we use three visual styles to draw attention to

Seite 3

Chapter 1. High Availability Add-On OverviewThe High Availability Add-On is a clustered system that provides reliability, scalability, andavailability

Seite 4 - Abstract

NoteThe cluster types summarized in the preceding text reflect basic configurations; your needsmight require a combination of the clusters described.A

Seite 5 - Table of Contents

cluster infrastructure, you can use other components to suit your clustering needs (for example,setting up a cluster for sharing files on a GFS2 file

Seite 6

Chapter 2. Cluster Management with CMANCluster management manages cluster quorum and cluster membership. CMAN (an abbreviation forcluster manager) per

Seite 7 - Introduction

2.1.1. Quorum DisksA quorum disk or partition is a section of a disk that's set up for use with components of the clusterproject. It has a couple

Seite 8

Have a two node configuration with the fence devices on a different network path than the pathused for cluster communicationHave a two node configurat

Seite 9 - 1.2. Pull-quot e Convent ions

Chapter 3. RGManagerRGManager manages and provides failover capabilities for collections of cluster resources calledservices, resource groups, or reso

Seite 10 - 2. We Need Feedback!

members within the domain. The highest-ranking member of the domain will run the servicewhenever it is online. This means that if member A has a highe

Seite 11 - 1.1. Clust er Basics

RGManager has three service recovery policies which may be customized by the administrator on aper-service basis.NoteThese policies also apply to virt

Seite 13

NoteYou must specify both parameters together; the use of either parameter by itself is undefined.3.3. Resource T rees - Basics / Definit ionsThe foll

Seite 14 - 2.1. Clust er Quorum

the original start fails, the service behaves as though a relocate operation was requested (seebelow). If the operation succeeds, the service is place

Seite 15 - 2.1.2. T ie-breakers

failed — The service is presumed dead. This state occurs whenever a resource's stop operationfails. Administrator must verify that there are no a

Seite 16

live (default) — the virtual machine continues to run while most of its memory contents are copiedto the destination host. This minimizes the inaccess

Seite 17 - Chapter 3. RGManager

Adding or removing a VM from cluster.conf will not start or stop the VM; it will simply causergmanager to start or stop paying attention to the VMFail

Seite 18 - 3.2. Service Policies

Chapter 4. FencingFencing is the disconnection of a node from the cluster's shared storage. Fencing cuts off I/O fromshared storage, thus ensurin

Seite 19 - 3.2.1. Start Policy

Fig u re 4 .1. Po wer Fen cin g Examp leRed Hat Ent erprise Linux 6 High Availabilit y Ad d- O n O verview22

Seite 20 - 3.4 .1. Service Operat ions

Fig u re 4 .2. St o rag e Fen cin g Examp leSpecifying a fencing method consists of editing a cluster configuration file to assign a fencing-method n

Seite 21 - Important

Fig u re 4 .3. Fen cin g a No d e wit h Du al Po wer Su p p liesRed Hat Ent erprise Linux 6 High Availabilit y Ad d- O n O verview24

Seite 22 - 3.5.2. Migrat ion

Fig u re 4 .4 . Fen cin g a N o d e wit h Du al Fib re Ch an n el Co n n ect io n sYou can configure a node with one fencing method or multiple fenc

Seite 23

Red Hat Enterprise Linux 6 High Availability Add-On OverviewOverview of the High Availability Add-On for Red Hat Enterprise LinuxEdition 6

Seite 24 - 3.6. Resource Act ions

Chapter 5. Lock ManagementLock management is a common cluster-infrastructure service that provides a mechanism for othercluster infrastructure compone

Seite 25 - Chapter 4. Fencing

listed above. The choice of an open source or closed source environment is up to the user. However,the DLM’s main limitation is the amount of testing

Seite 26

Chapter 6. Configuration and Administration ToolsThe cluster configuration file, /etc/cl uster/cl uster. co nf specifies the High Availability Add-Onc

Seite 27 - ⁠Chapt er 4 . Fencing

provides support for the ccs cluster configuration command, which allows an administrator tocreate, modify and view the cluster.conf cluster configura

Seite 28

Chapter 7. Virtualization and High AvailabilityVarious virtualization platforms are supported in conjunction with Red Hat Enterprise Linux 6 usingthe

Seite 29

RHEL 5 supports two virtualization platforms. Xen has been supported since RHEL 5.0 release. InRHEL 5.4 KVM was introduced.RHEL 6 only supports KVM as

Seite 30 - Chapter 5. Lock Management

Host hardware should be provisioned such that they are capable of absorbing relocated guestsfrom multiple other failed hosts without causing a host to

Seite 31 - 5.2. Lock St at es

Using the Qpid Management Framework (QMF) provided by the libvirt-qpid package. Thisutilizes QMF to track guest migrations without requiring a full ho

Seite 32

The iSCSI server software shipped with RHEL does not support SCSI 3 persistent reservations,therefore it cannot be used with fence_scsi. It is suitabl

Seite 33

Revision HistoryRevisio n 1- 13 Wed O ct 8 2014 St even Levin eGA Release for Red Hat Enterprise Linux 6.6Revisio n 1- 12 T h u Au g 7 2014 St

Seite 34

Legal NoticeCopyright © 20 14 Red Hat, Inc. and o thers.This do cument is licensed by Red Hat under the Creative Co mmo ns Attributio n-ShareAlike 3.

Seite 35

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 36 - 7.2. Guest Clust ers

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 37

IntroductionThis document provides a high-level overview of the High Availability Add-On for Red Hat EnterpriseLinux 6.Although the information in thi

Seite 38

1.1. T ypographic Convent ionsFour typographic conventions are used to call attention to specific words and phrases. Theseconventions, and the circums

Seite 39 - Revision History

Whether mono-spaced bold or proportional bold, the addition of italics indicates replaceable orvariable text. Italics denotes text you do not input li

Kommentare zu diesen Handbüchern

Keine Kommentare