background image

be started (either manually or by the cluster software).

• Unordered — When a cluster service is assigned to an unordered failover domain, the

member on which the cluster service runs is chosen from the available failover domain

members with no priority ordering.

• Ordered — Allows you to specify a preference order among the members of a failover

domain. The member at the top of the list is the most preferred, followed by the second

member in the list, and so on.

Note

Changing a failover domain configuration has no effect on currently running

services.

Note

Failover domains are not required for operation.

By default, failover domains are unrestricted and unordered.

In a cluster with several members, using a restricted failover domain can minimize the work to

set up the cluster to run a cluster service (such as

httpd

), which requires you to set up the

configuration identically on all members that run the cluster service). Instead of setting up the

entire cluster to run the cluster service, you must set up only the members in the restricted

failover domain that you associate with the cluster service.

Tip

To configure a preferred member, you can create an unrestricted failover domain

comprising only one cluster member. Doing that causes a cluster service to run

on that cluster member primarily (the preferred member), but allows the cluster

service to fail over to any of the other members.

The following sections describe adding a failover domain and modifying a failover domain:

Section 7.1, “Adding a Failover Domain”

Section 7.2, “Modifying a Failover Domain”

Chapter 3. Configuring Red Hat Cluster With Conga

40

Summary of Contents for CLUSTER FOR ENTERPRISE LINUX 5.0

Page 1: ...Configuring and Managing a Red Hat Cluster Red Hat Cluster for Red Hat Enterprise Linux 5 0 5 0 ISBN N A Publication date ...

Page 2: ...ion and management of Red Hat cluster systems for Red Hat Enterprise Linux 5 0 It does not include information about Red Hat Linux Virtual Servers LVS Information about installing and configuring LVS is in a separate document Configuring and Managing a Red Hat Cluster ...

Page 3: ...licit permission of the copyright holder Distribution of the work or derivative of the work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder Red Hat and the Red Hat Shadow Man logo are registered trademarks of Red Hat Inc in the United States and other countries All other trademarks referenced herein are the propert...

Page 4: ...Configuring and Managing a Red Hat Cluster ...

Page 5: ...chkconfig Management 18 3 2 Disabling ACPI Soft Off with the BIOS 19 3 3 Disabling ACPI Completely in the grub conf File 21 4 Configuring max_luns 22 5 Considerations for Using Quorum Disk 22 6 Multicast Addresses 24 7 Considerations for Using Conga 24 8 General Configuration Considerations 24 3 Configuring Red Hat Cluster With Conga 27 1 Configuration Tasks 27 2 Starting luci and ricci 28 3 Creat...

Page 6: ...in 71 6 3 Removing a Member from a Failover Domain 71 7 Adding Cluster Resources 72 8 Adding a Cluster Service to the Cluster 74 9 Propagating The Configuration File New Cluster 77 10 Starting the Cluster Software 78 6 Managing Red Hat Cluster With system config cluster 79 1 Starting and Stopping the Cluster Software 79 2 Managing High Availability Services 80 3 Modifying the Cluster Configuration...

Page 7: ... Cluster With Conga Chapter 5 Configuring Red Hat Cluster With system config cluster Chapter 6 Managing Red Hat Cluster With system config cluster Appendix A Example of Setting Up Apache HTTP Server Appendix B Fence Device Parameters Appendix C Upgrading A Red Hat Cluster from RHEL 4 to RHEL 5 For more information about Red Hat Enterprise Linux 5 refer to the following resources Red Hat Enterprise...

Page 8: ...and other Red Hat documents are available in HTML PDF and RPM versions on the Red Hat Enterprise Linux Documentation CD and online at http www redhat com docs 1 Document Conventions Certain words in this manual are represented in different fonts styles and weights This highlighting indicates that the word is part of a specific category The categories include the following Courier font Courier font...

Page 9: ...tion that you need to understand the behavior of the system Tip A tip is typically an alternative way of performing a task Important Important information is necessary but possibly unexpected such as a configuration change that will not persist after a reboot Caution A caution indicates an act that would violate your support agreement such as recompiling the kernel Warning A warning indicates pote...

Page 10: ...ier Cluster_Administration RHEL 5 0 2008 06 01T14 54 By mentioning this manual s identifier we know exactly which version of the guide you have If you have a suggestion for improving the documentation try to be as specific as possible If you have found an error please include the section number and some of the surrounding text so we can find it easily Introduction x ...

Page 11: ...e 1 1 Setting Up Hardware Setting up hardware consists of connecting cluster nodes to other hardware required to run a Red Hat Cluster The amount and type of hardware varies according to the purpose and availability requirements of the cluster Typically an enterprise level cluster requires the following type of hardware refer to Figure 1 1 Red Hat Cluster Hardware Overview For considerations about...

Page 12: ...alling Red Hat Cluster software To install Red Hat Cluster software you must have entitlements for the software If you are using the Conga configuration GUI you can let it install the cluster software If you are using other tools to configure the cluster secure and install the software as you would with Red Hat Enterprise Linux software 1 3 Configuring Red Hat Cluster Software Configuring Red Hat ...

Page 13: ... NFS exports IP addresses and shared GFS partitions Figure 1 2 Cluster Configuration Structure The following cluster configuration tools are available with Red Hat Cluster Conga This is a comprehensive user interface for installing configuring and managing Red Hat clusters computers and storage attached to clusters and computers system config cluster This is a user interface for configuring and ma...

Page 14: ...and ricci which are separately installable luci is a server that runs on one computer and communicates with multiple clusters and computers via ricci ricci is an agent that runs on each computer either a cluster member or a standalone computer managed by Conga luci is accessible through a Web browser and provides three major functions that are accessible through the following tabs homebase Provide...

Page 15: ...e admin user can create additional user accounts and determine which users are allowed to access clusters and computers registered in the luci database It is possible to import users as a batch operation in a new luci server just as it is possible to import clusters and computers When a computer is added to a luci server to be administered authentication is done once No authentication is necessary...

Page 16: ...Figure 1 4 luci cluster Tab Chapter 1 Red Hat Cluster Configuration and Management Overview 6 ...

Page 17: ...and the high availability service management components system config cluster consists of two major functions the Cluster Configuration Tool and the Cluster Status Tool The Cluster Configuration Tool provides the capability to create edit and propagate the cluster configuration file etc cluster cluster conf The Cluster Status Tool provides the capability to manage high availability services The fo...

Page 18: ...ides more convenience and flexibility than system config cluster 3 1 Cluster Configuration Tool You can access the Cluster Configuration Tool Figure 1 6 Cluster Configuration Tool through the Cluster Configuration tab in the Cluster Administration GUI Figure 1 6 Cluster Configuration Tool Chapter 1 Red Hat Cluster Configuration and Management Overview 8 ...

Page 19: ...g one or more subsets of cluster nodes used to run a high availability service in the event of a node failure Failover domains are represented as subordinate elements under Failover Domains Using configuration buttons at the bottom of the right frame below Properties you can create failover domains when Failover Domains is selected or edit failover domain properties when a failover domain is selec...

Page 20: ...s is selected or edit service properties when a service is selected 3 2 Cluster Status Tool You can access the Cluster Status Tool Figure 1 7 Cluster Status Tool through the Cluster Management tab in Cluster Administration GUI Figure 1 7 Cluster Status Tool Chapter 1 Red Hat Cluster Configuration and Management Overview 10 ...

Page 21: ...tool Cluster Management Tool Cluster Infrastructure cman_tool is a program that manages the CMAN cluster manager It provides the capability to join a cluster leave a cluster kill a node or change the expected quorum votes of a node in a cluster For more information about this tool refer to the cman_tool 8 man page fence_tool Fence Tool Cluster Infrastructure fence_tool is a program used to join or...

Page 22: ...12 ...

Page 23: ... devices storage devices and Fibre Channel switches Refer to the hardware configuration guidelines at http www redhat com cluster_suite hardware for the most current hardware compatibility information 2 Enabling IP Ports Before deploying a Red Hat Cluster you must enable certain IP ports on the cluster nodes and on computers that run luci the Conga user interface server The following sections spec...

Page 24: ...bility service management Example 2 7 Ports 41966 41967 41968 41969 rgmanager 50006 50008 50009 TCP ccsd Cluster Configuration System daemon Example 2 8 Ports 50006 50008 50009 ccsd TCP 50007 UDP ccsd Cluster Configuration System daemon Example 2 9 Port 50007 ccsd UDP Table 2 1 Enabled IP Ports on Red Hat Cluster Nodes 2 2 Enabling IP Ports on Computers That Run luci To allow client computers to c...

Page 25: ...r enabling IP ports on Red Hat Cluster nodes and computers that run luci The examples enable IP ports for a computer having an IP address of 10 10 10 200 using a subnet mask of 10 10 10 0 24 Note Examples are for cluster nodes unless otherwise noted in the example titles iptables A INPUT i 10 10 10 200 m multiport m state state NEW p udp s 10 10 10 0 24 d 10 10 10 0 24 dports 5404 5405 j ACCEPT Ex...

Page 26: ...erd A INPUT i 10 10 10 200 m state state NEW m multiport p tcp s 10 10 10 0 24 d 10 10 10 0 24 dports 21064 j ACCEPT Example 2 6 Port 21064 dlm A INPUT i 10 10 10 200 m state state NEW m multiport p tcp s 10 10 10 0 24 d 10 10 10 0 24 dports 41966 41967 41968 41969 j ACCEPT Example 2 7 Ports 41966 41967 41968 41969 rgmanager A INPUT i 10 10 10 200 m state state NEW m multiport p tcp s 10 10 10 0 2...

Page 27: ...freezes during shutdown an integrated fence device may not be able to turn off the node Under those circumstances fencing is delayed or unsuccessful Consequently when a node is fenced with an integrated fence device and ACPI Soft Off is enabled a cluster recovers slowly or requires administrative intervention to recover Note The amount of time required to fence a node depends on the integrated fen...

Page 28: ... disabling ACPI Soft Off Section 3 1 Disabling ACPI Soft Off with chkconfig Management Preferred method Section 3 2 Disabling ACPI Soft Off with the BIOS First alternate method Section 3 3 Disabling ACPI Completely in the grub conf File Second alternate method 3 1 Disabling ACPI Soft Off with chkconfig Management You can use chkconfig management to disable ACPI Soft Off either by removing the ACPI...

Page 29: ...on Note Disabling ACPI Soft Off with the BIOS may not be possible with some computers You can disable ACPI Soft Off by configuring the BIOS of each cluster node as follows 1 Reboot the node and start the BIOS CMOS Setup Utility program 2 Navigate to the Power menu or equivalent power management menu 3 At the Power menu set the Soft Off by PWR BTTN function or equivalent to Instant Off or the equiv...

Page 30: ...e S1 POS x Run VGABIOS if S3 Resume Auto Menu Level Suspend Mode Disabled HDD Power Down Disabled Soft Off by PWR BTTN Instant Off CPU THRM Throttling 50 0 Wake Up by PCI card Enabled Power On by Ring Enabled Wake Up On LAN Enabled x USB KB Wake Up From S3 Disabled Resume by Alarm Disabled x Date of Month Alarm 0 x Time hh mm ss Alarm 0 0 0 POWER ON Function BUTTON ONLY x KB Power ON Password Ente...

Page 31: ...ster You can disable ACPI completely by editing the grub conf file of each cluster node as follows 1 Open boot grub grub conf with a text editor 2 Append acpi off to the kernel boot command line in boot grub grub conf refer to Example 2 11 Kernel Boot Command Line with acpi off Appended to It 3 Reboot the node 4 When the cluster is configured and running verify that the node turns off immediately ...

Page 32: ...ltiple LUNs 5 Considerations for Using Quorum Disk Quorum Disk is a disk based quorum daemon qdiskd that provides supplemental heuristics to determine node fitness With heuristics you can determine factors that are important to the operation of the node in the event of a network partition For example in a four node cluster with a 3 1 split ordinarily the three nodes automatically win because of th...

Page 33: ...ween the membership timeout values of CMAN and qdiskd For assistance with adjusting the CMAN membership timeout value contact an authorized Red Hat support representative Fencing To ensure reliable fencing when using qdiskd use power fencing While other types of fencing such as watchdog timers and software based solutions to reboot a node internally can be reliable for clusters not configured with...

Page 34: ...nd associated networking equipment vary according each product Refer to the appropriate vendor documentation or other information about configuring network switches and associated networking equipment to enable multicast addresses and IGMP 7 Considerations for Using Conga When using Conga to configure and manage your Red Hat Cluster make sure that each computer running luci the Conga user interfac...

Page 35: ... at a time The use of power switches in the cluster hardware configuration enables a node to power cycle another node before restarting that node s cluster services during a failover process This prevents two nodes from simultaneously accessing the same data and corrupting it It is strongly recommended that fence devices hardware or software solutions that remotely power shutdown and reboot cluste...

Page 36: ...26 ...

Page 37: ...ware with Conga consists of the following steps 1 Configuring and running the Conga configuration user interface the luci server Refer to Section 2 Starting luci and ricci 2 Creating a cluster Refer to Section 3 Creating A Cluster 3 Configuring global cluster properties Refer to Section 4 Global Cluster Properties 4 Configuring fence devices Refer to Section 5 Configuring Fence Devices 5 Configuri...

Page 38: ...pically a computer in a server cage or a data center hosts luci however a cluster computer can host luci 4 At the computer running luci initialize the luci server using the luci_admin init command For example luci_admin init Initializing the Luci server Creating the admin user Enter password Type password and press ENTER Confirm password Re type password and press ENTER Please wait The admin passw...

Page 39: ...starts the cluster Create a cluster as follows 1 As administrator of luci select the cluster tab 2 Click Create a New Cluster 3 At the Cluster Name text box enter a cluster name The cluster name cannot exceed 15 characters Add the node name and password for each cluster node Enter the node name for each node in the Node Hostname column enter the root password for each node in the in the Root Passw...

Page 40: ...t to another value you can specify it at the Configuration Version text box You can enter advanced cluster properties by clicking Show advanced cluster properties Clicking Show advanced cluster properties reveals a list of advanced properties You can click any advanced property for online help about the property Enter the values required and click Apply for changes to take effect 2 Fence tab This ...

Page 41: ...er quorum disk parameters click Apply and restart the cluster for the changes to take effect Important Quorum disk parameters and heuristics depend on the site environment and the special requirements needed To understand the use of quorum disk parameters and heuristics refer to the qdisk 5 man page If you require assistance understanding and using quorum disk contact an authorized Red Hat support...

Page 42: ...hing else indicates failure This field is required Interval The frequency in seconds at which the heuristic is polled The default interval for every heuristic is 2 seconds Score The weight of this heuristic Be careful when determining scores for heuristics The default score for each heuristic is 1 Apply Propagates the changes to the cluster configuration file etc cluster cluster conf in each clust...

Page 43: ... LAN RPS10 Serial Switch This section provides procedures for the following tasks Creating shared fence devices Refer to Section 5 1 Creating a Shared Fence Device The procedures apply only to creating shared fence devices You can create non shared and shared fence devices while configuring nodes refer to Section 6 Configuring Cluster Members Modifying or deleting fence devices Refer to Section 5 ...

Page 44: ... Clicking Shared Fence Devices causes the display of the fence devices for a cluster and causes the display of menu items for fence device configuration Add a Fence Device and Configure a Fence Device Note If this is an initial cluster configuration no fence devices have been created and therefore none are displayed 2 Click Add a Fence Device Clicking Add a Fence Device causes the Add a Sharable F...

Page 45: ...rding to the type of fence device Refer to Appendix B Fence Device Parameters for more information about fence device parameters 5 Click Add this shared fence device 6 Clicking Add this shared fence device causes a progress page to be displayed temporarily After the fence device has been added the detailed cluster properties menu is updated with the fence device under Configure a Fence Device Modi...

Page 46: ...s displayed Refer to Appendix B Fence Device Parameters for more information about fence device parameters Click Update this fence device and wait for the configuration to be updated To delete the fence device click Delete this fence device and wait for the configuration to be updated Note You can create shared fence devices on the node configuration page also However you can only modify or delete...

Page 47: ...ice and provide parameters for the fence device for example port number Note You can choose from an existing fence device or create a new fence device 5 Click Update main fence properties and wait for the change to take effect 6 2 Adding a Member to a Running Cluster To add a member to a running cluster follow the steps in this section The starting point of the procedure is at the cluster specific...

Page 48: ... a list of the nodes configured in the cluster at the detailed menu for the cluster below the clusters menu 7 Click the link for an added node at either the list in the center of the page or in the list in the detailed menu under the clusters menu Clicking the link for the added node causes a page to be displayed for that link showing how that node is configured 8 At the bottom of the page under M...

Page 49: ...o administer page to be displayed d At the Choose a cluster to administer page click the link of the node to be deleted Clicking the link of the node to be deleted causes a page to be displayed for that link showing how that node is configured 3 On that page at the Choose a taskdrop down box choose Delete this node and click Go When the node is deleted a page is displayed that lists the nodes in t...

Page 50: ...restricted failover domain can minimize the work to set up the cluster to run a cluster service such as httpd which requires you to set up the configuration identically on all members that run the cluster service Instead of setting up the entire cluster to run the cluster service you must set up only the members in the restricted failover domain that you associate with the cluster service Tip To c...

Page 51: ...ach node selected as members of the failover domain 5 To restrict failover to members in this failover domain click the checkbox next to Restrict failover to this domain s members With Restrict failover to this domain s members checked services assigned to this failover domain fail over only to nodes in this failover domain 6 Configure members for this failover domain Under Failover domain members...

Page 52: ... domain click the Prioritized checkbox With Prioritized checked you can set the priority value Priority for each node selected as members of the failover domain With Prioritizednot checked setting priority levels is disabled for this failover domain 6 Restricted failover To enable or disable restricted failover for members in this failover domain click the checkbox next to Restrict failover to thi...

Page 53: ...e system resource Mount Point Choose the path to which the file system resource is mounted Device Specify the device file associated with the file system resource Options Mount options File System ID When creating a new file system resource you can leave this field blank Leaving the field blank causes a file system ID to be assigned automatically after you click Submit at the File System Resource ...

Page 54: ... mounting it The default setting is unchecked IP Address IP Address Type the IP address for the resource Monitor Link checkbox Check the box to enable or disable link status monitoring of the IP address resource NFS Mount Name Create a symbolic name for the NFS mount Mount Point Choose the path to which the file system resource is mounted Host Specify the NFS server name Export Path NFS export on ...

Page 55: ...uster Service to the Cluster To add a cluster service to the cluster follow the steps in this section The starting point of the procedure is at the cluster specific page that you navigate to from Choose a cluster to administer displayed on the cluster tab 1 At the detailed menu for the cluster below the clusters menu click Services Clicking Services causes the display of services in the center of ...

Page 56: ...ptions presented The options are the same as described in Section 8 Adding Cluster Resources Note If you are adding a Samba service resource connect a Samba service resource directly to the service not to a resource within a service 6 If you want to add resources to that resource click Add a child Clicking Add a child causes the display of additional options to local and global resources You can c...

Page 57: ... Interface page shows a list of systems available to the you in a navigation table to the left A small form allows you to choose a storage unit size to suit your preference That choice is persisted and can be changed at any time by returning to this page In addition you can change the unit type on specific configuration forms throughout the storage user interface This general choice allows you to ...

Page 58: ...nd GFS refer to Red Hat documentation for those products Note Shared storage for use in Red Hat Cluster Suite requires that you be running the cluster logical volume manager daemon clvmd or the High Availability Logical Volume Management agents HA LVM If you are not able to use either the clvmd daemon or HA LVM for operational reasons or because you do not have the correct entitlements you must no...

Page 59: ...s at the cluster tab at the Choose a cluster to administer page 1 At the right of the Cluster Name for each cluster listed on the Choose a cluster to administer page is a drop down box By default the drop down box is set to Restart this cluster Clicking the drop down box box reveals all the selections available Restart this cluster Stop this cluster Start this cluster and Delete this cluster The a...

Page 60: ...ter Fence a node Reboot a node Delete a node To perform one the functions in the preceding list follow the steps in this section The starting point of the procedure is at the cluster specific page that you navigate to from Choose a cluster to administer displayed on the cluster tab 1 At the detailed menu for the cluster below the clusters menu click Nodes Clicking Nodes causes the display of nodes...

Page 61: ...licking Go causes a progress page to be displayed When the action is complete a page is displayed showing the list of nodes for the cluster 3 Managing High Availability Services You can perform the following management functions for high availability services through the luci server component of Conga Configure a service Stop or start a service Restart a service Delete a service To perform one the...

Page 62: ...ration changes save the changes by clicking Save Clicking Save causes a progress page to be displayed When the change is complete another page is displayed showing a list of services for the cluster If you have selected one of the functions in the drop down box on the configuration page click Go Clicking Go causes a progress page to be displayed When the change is complete another page is displaye...

Page 63: ...luster Section 10 Starting the Cluster Software Tip While system config cluster provides several convenient tools for configuring and managing a Red Hat Cluster the newer more comprehensive tool Conga provides more convenience and flexibility than system config cluster You may want to consider using Conga instead refer to Chapter 3 Configuring Red Hat Cluster With Conga and Chapter 4 Managing Red ...

Page 64: ...ng the Cluster Software 2 Starting the Cluster Configuration Tool You can start the Cluster Configuration Tool by logging in to a cluster node as root with the ssh Y command and issuing the system config cluster command For example to start the Cluster Configuration Tool on cluster node nano 01 do the following 1 Log in to a cluster node and run system config cluster For example ssh Y root nano 01...

Page 65: ... A New Configuration The New Configuration dialog box provides a text box for cluster name and the following checkboxes Custom Configure Multicast and Use a Quorum Disk In most circumstances you only need to configure the cluster name Tip Choose the cluster name carefully The only way to change the name of a Red Hat cluster is to create a new cluster configuration with the new name Red Hat Cluster...

Page 66: ...ging quorum disk parameters after the initial configuration The Cluster Configuration Tool system config cluster provides only the display of quorum disk parameters after initial configuration If you need to configure quorum disk consider using Conga instead Conga allows modification of quorum disk parameters Overall While system config cluster provides several convenient tools for configuring and...

Page 67: ...the cluster name and other parameters in the New Configuration dialog box click OK Clicking OK starts the Cluster Configuration Tool displaying a graphical representation of the configuration Figure 5 3 The Cluster Configuration Tool Starting the Cluster Configuration Tool 57 ...

Page 68: ...to be declared dead Votes The number of votes the quorum daemon advertises to CMAN when it has a high enough score Minimum Score The minimum score for a node to be considered alive If omitted or set to 0 the default function floor n 1 2 is used where n is the sum of the heuristics scores The Minimum Score value must never exceed the sum of the heuristic scores otherwise the quorum disk cannot be a...

Page 69: ...ng section Section 2 Starting the Cluster Configuration Tool you can configure the following cluster properties Cluster Alias optional a Config Version optional and Fence Daemon Properties To configure cluster properties follow these steps 1 At the left frame click Cluster 2 At the bottom of the right frame labeled Properties click the Edit Cluster Properties button Clicking that button causes a C...

Page 70: ...Its value may be varied to suit cluster and network performance Note For more information about Post Join Delay and Post Fail Delay refer to the fenced 8 man page 6 Save cluster configuration changes by selecting File Save 4 Configuring Fence Devices Configuring fence devices for the cluster consists of selecting one or more fence devices and specifying fence device dependent parameters for exampl...

Page 71: ...hanges to the cluster configuration 5 Adding and Deleting Members The procedure to add a member to a cluster varies depending on whether the cluster is a newly configured cluster or a cluster that is already configured and running To add a member to a new cluster refer to Section 5 1 Adding a Member to a Cluster To add a member to an existing cluster refer to Section 5 2 Adding a Member to a Runni...

Page 72: ... etc hosts file of each cluster node Note The node on which you are running the Cluster Configuration Tool must be explicitly added as a cluster member the node is not automatically added to the cluster configuration as a result of running the Cluster Configuration Tool 4 Optionally at the Quorum Votes text box you can specify a value however in most configurations you can leave it blank Leaving t...

Page 73: ...create additional fence devices at this fence level return to step 6d Otherwise proceed to the next step i To create additional fence levels return to step 6c Otherwise proceed to the next step j If you have configured all the fence levels and fence devices for this node click Close 7 Choose File Save to save the changes to the cluster configuration 5 2 Adding a Member to a Running Cluster The pro...

Page 74: ...clustered volumes d service cman stop 6 Start cluster software on all cluster nodes including the added one by running the following commands in this order a service cman start b service clvmd start if CLVM has been used to create clustered volumes c service gfs start if you are using Red Hat GFS d service rgmanager start 7 Start the Red Hat Cluster Suite management GUI At the Cluster Configuratio...

Page 75: ... operation follow these steps 1 At one of the running nodes not to be removed run the Red Hat Cluster Suite management GUI At the Cluster Status Tool tab under Services disable or relocate each service that is running on the node to be deleted 2 Stop the cluster software on the node to be deleted by running the following commands at that node in this order a service rgmanager stop b service gfs st...

Page 76: ...e on all remaining cluster nodes by running the following commands in this order a service cman start b service clvmd start if CLVM has been used to create clustered volumes c service gfs start if you are using Red Hat GFS d service rgmanager start 6 Start the Red Hat Cluster Suite management GUI At the Cluster Configuration Tool tab verify that the configuration is correct At the Cluster Status T...

Page 77: ...n has no effect on currently running services Note Failover domains are not required for operation By default failover domains are unrestricted and unordered In a cluster with several members using a restricted failover domain can minimize the work to set up the cluster to run a cluster service such as httpd which requires you to set up the configuration identically on all members that run the clu...

Page 78: ...utton Clicking the Create a Failover Domain button causes the Add Failover Domain dialog box to be displayed 3 At the Add Failover Domain dialog box specify a failover domain name at the Name for new Failover Domain text box and click OK Clicking OK causes the Failover Domain Configuration dialog box to be displayed Figure 5 7 Failover Domain Configuration Configuring a Failover Domain Note The na...

Page 79: ...estrict Failover To This Domains Members checked services assigned to this failover domain fail over only to nodes in this failover domain 6 To prioritize the order in which the members in the failover domain assume control of a failed cluster service follow these steps a Click check the Prioritized List checkbox Figure 5 8 Failover Domain Configuration Adjusting Priority Clicking Prioritized List...

Page 80: ...e to create the domain 8 At the Cluster Configuration Tool perform one of the following actions depending on whether the configuration is for a new cluster or for one that is operational and running New cluster If this is a new cluster choose File Save to save the changes to the cluster configuration Running cluster If this cluster is operational and running and you want to propagate the change im...

Page 81: ...Send to Cluster automatically saves the configuration change If you do not want to propagate the change immediately choose File Save to save the changes to the cluster configuration 6 3 Removing a Member from a Failover Domain To remove a member from a failover domain follow these steps 1 At the left frame of the Cluster Configuration Tool click the failover domain that you want to change listed u...

Page 82: ... file system resource Mount Point Choose the path to which the file system resource is mounted Device Specify the device file associated with the file system resource Options Mount options File System ID When creating a new file system resource you can leave this field blank Leaving the field blank causes a file system ID to be assigned automatically after you click OK at the Resource Configuratio...

Page 83: ...o be run on the file system before mounting it The default setting is unchecked IP Address IP Address Type the IP address for the resource Monitor Link checkbox Check the box to enable or disable link status monitoring of the IP address resource NFS Mount Name Create a symbolic name for the NFS mount Mount Point Choose the path to which the file system resource is mounted Host Specify the NFS serv...

Page 84: ...ervice Name Enter a name for the Samba server Workgroup Enter the Windows workgroup name or Windows NT domain of the Samba service Note When creating or editing a cluster service connect a Samba service resource directly to the service not to a resource within a service That is at the Service Management dialog box use either Create a new resource for this service or Add a Shared Resource to this s...

Page 85: ...cking OK causes the Service Management dialog box to be displayed refer to Figure 5 9 Adding a Cluster Service Tip Use a descriptive name that clearly distinguishes the service from other services in the cluster Figure 5 9 Adding a Cluster Service 4 If you want to restrict the members on which this cluster service is able to run choose a failover domain from the Failover Domain drop down box Refer...

Page 86: ...ive can render a service offline if the node it is running on fails and no other nodes are empty 7 Select a recovery policy to specify how the resource manager should recover from a service failure At the upper right of the Service Management dialog box there are three Recovery Policy options available Restart Restart the service in the node the service is currently located The default setting is ...

Page 87: ...following output shows the sbin ip addr list command executed on a node running a cluster service 1 lo LOOPBACK UP mtu 16436 qdisc noqueue link loopback 00 00 00 00 00 00 brd 00 00 00 00 00 00 inet 127 0 0 1 8 scope host lo inet6 1 128 scope host valid_lft forever preferred_lft forever 2 eth0 BROADCAST MULTICAST UP mtu 1356 qdisc pfifo_fast qlen 1000 link ether 00 05 5d 9a d8 91 brd ff ff ff ff ff...

Page 88: ...CLVM has been used to create clustered volumes Note Shared storage for use in Red Hat Cluster Suite requires that you be running the cluster logical volume manager daemon clvmd or the High Availability Logical Volume Management agents HA LVM If you are not able to use either the clvmd daemon or HA LVM for operational reasons or because you do not have the correct entitlements you must not use sing...

Page 89: ...Cluster the newer more comprehensive tool Conga provides more convenience and flexibility than system config cluster You may want to consider using Conga instead refer to Chapter 3 Configuring Red Hat Cluster With Conga and Chapter 4 Managing Red Hat Cluster With Conga 1 Starting and Stopping the Cluster Software To start the cluster software on a member type the following commands in this order 1...

Page 90: ...es its services to fail over to an active member 2 Managing High Availability Services You can manage cluster services with the Cluster Status Tool Figure 6 1 Cluster Status Tool through the Cluster Management tab in Cluster Administration GUI Figure 6 1 Cluster Status Tool Chapter 6 Managing Red Hat Cluster With system config cluster 80 ...

Page 91: ...part of the cluster Note A node can be a member of a cluster however the node may be inactive and incapable of running services For example if rgmanager is not running on the node but all other cluster software components are running in the node the node appears as a Member in the Cluster Status Tool Dead The node is unable to participate as a cluster member The most basic cluster software is not ...

Page 92: ...ing Red Hat Cluster With system config cluster To edit the cluster configuration file click the Cluster Configuration tab in the cluster configuration GUI Clicking the Cluster Configuration tab displays a graphical representation of the cluster configuration Change the configuration file according the the following steps 1 Make changes to cluster elements for example create a service 2 Propagate t...

Page 93: ...cluster conf bak 1 is the newest backup etc cluster cluster conf bak 2 is the second newest backup and etc cluster cluster conf bak 3 is the third newest backup If a cluster member becomes inoperable because of misconfiguration restore the configuration file according to the following steps 1 At the Cluster Configuration Tool tab of the Red Hat Cluster Suite management GUI click File Open 2 Clicki...

Page 94: ...gement tab and verify that the changes have been propagated to the cluster members 5 Disabling the Cluster Software It may become necessary to temporarily disable the cluster software on a cluster member For example if a cluster member experiences a hardware failure you may want to reboot that member but prevent it from rejoining the cluster to perform maintenance on the system Use the sbin chkcon...

Page 95: ...as been used to create clustered volumes 3 service gfs start if you are using Red Hat GFS 4 service rgmanager start 6 Diagnosing and Correcting Problems in a Cluster For information about diagnosing and correcting problems in a cluster contact an authorized Red Hat support representative Database 85 ...

Page 96: ...86 ...

Page 97: ...and configuring a shared GFS shared resource for the Web content When installing the Apache HTTP Server on the cluster systems run the following command to ensure that the cluster nodes do not automatically start the service when the system boots chkconfig del httpd Rather than having the system init scripts spawn the httpd daemon the cluster infrastructure initializes the service on the active cl...

Page 98: ...the cluster software can mount and unmount file systems used in a service 4 Copy all the required files to the document root directory 5 If you have CGI files or other files that must be in different directories or in separate partitions repeat these steps as needed 3 Installing and Configuring the Apache HTTP Server The Apache HTTP Server must be installed and configured on all nodes in the assig...

Page 99: ... the path that was used in the previous step and set the access permissions to default to that directory For example Directory mnt httpdservice cgi bin AllowOverride None Options None Order allow deny Allow from all Directory Additional changes may need to be made to tune the Apache HTTP Server or add module functionality For information on setting up other options refer to the Red Hat Enterprise ...

Page 100: ...tent files and or custom scripts Click Create a Resource In the Resource Configuration dialog select File System from the drop down menu Enter the Name for the resource for example httpd content Choose ext3 from the File System Type drop down menu Enter the mount point in the Mount Point field for example var www html Enter the device special file name in the Device field for example dev sda3 3 Ad...

Page 101: ...a Shared Resource to this service button From the available list choose each resource that you created in the previous steps Repeat this step until all resources have been added Click OK 6 Choose File Save to save your changes Server 91 ...

Page 102: ...92 ...

Page 103: ...luster IP Address The IP address assigned to the device Login The login name used to access the device Password The password used to authenticate the connection to the device Password Script optional The script that supplies a password for access to the fence device Using this supersedes the Password parameter Table B 1 APC Power Switch Field Description Name A name for the Brocade device connecte...

Page 104: ...the connection to the DRAC Password Script optional The script that supplies a password for access to the fence device Using this supersedes the Password parameter Table B 4 Dell DRAC Field Description Name A name for the BladeFrame device connected to the cluster CServer The hostname and optionally the username in the form of username hostname assigned to the device Refer to the fence_egenera 8 m...

Page 105: ...Login The login name used to access the device Password The password used to authenticate the connection to the device Password Script optional The script that supplies a password for access to the fence device Using this supersedes the Password parameter Table B 8 IBM Blade Center Field Description Name A name for the RSA device connected to the cluster IP Address The IP address assigned to the d...

Page 106: ... fence_manual 8 for more information Table B 11 Manual Fencing Warning Manual fencing is not supported for production environments Field Description Name A name for the McData device connected to the cluster IP Address The IP address assigned to the device Login The login name used to access the device Password The password used to authenticate the connection to the device Password Script optional...

Page 107: ... this supersedes the Password parameter Table B 14 QLogic SANBox2 Switch Field Description Name Name of the node to be fenced Refer to fence_scsi 8 for more information Table B 15 SCSI Fencing Field Description Name Name of the guest to be fenced Table B 16 Virtual Machine Fencing Field Description Name A name for the Vixel switch connected to the cluster IP Address The IP address assigned to the ...

Page 108: ...ress assigned to the device Password The password used to authenticate the connection to the device Password Script optional The script that supplies a password for access to the fence device Using this supersedes the Password parameter Table B 18 WTI Power Switch Appendix B Fence Device Parameters 98 ...

Page 109: ...ger lock manager adding node IDs and updating RHEL and cluster software To upgrade a Red Hat Cluster from RHEL 4 to RHEL 5 follow these steps 1 Stop client access to cluster high availability services 2 At each cluster node stop the cluster software as follows a Stop all high availability services b Run service rgmanager stop c Run service gfs stop if you are using Red Hat GFS d Run service clvmd ...

Page 110: ...e in the configuration file insert nodeid number after name name Use a number value unique to that node Inserting it there follows the format convention of the clusternode element in a RHEL 5 cluster configuration file Note The nodeid parameter is required in Red Hat Cluster Suite for RHEL 5 The parameter is optional in Red Hat Cluster Suite for RHEL 4 If your configuration file already contains n...

Page 111: ...uite for RHEL 5 7 Run lvmconf enable cluster 8 Enable cluster software to start upon reboot At each node run sbin chkconfig as follows chkconfig level 2345 rgmanager on chkconfig level 2345 gfs on chkconfig level 2345 clvmd on chkconfig level 2345 cman on 9 Reboot the nodes The RHEL 5 cluster software should start while the nodes reboot Upon verification that the Red Hat cluster is running the upg...

Page 112: ...102 ...

Page 113: ...configuration 82 network switches and multicast addresses 24 restoring the cluster database 83 starting and stopping the cluster software 79 starting stopping restarting and deleting a cluster 49 cluster configuration 27 modifying 82 Cluster Configuration Tool accessing 10 cluster database backing up 83 restoring 83 cluster service displaying status 11 81 cluster service managers configuration 45 ...

Page 114: ... network switches and multicast addresses 24 P parameters fence device 93 power controller connection configuring 93 power switch 93 see also power controller Q qdisk considerations for using 22 quorum disk considerations for using 22 S starting the cluster software 78 System V init 79 T table command line tools 11 tables power controller connection configuring 93 troubleshooting diagnosing and co...

Reviews: