
3b
From the Class list, select the resource agent class stonith.
3c
From the Type list, select the STONITH plug-in for controlling your
STONITH device. A short description for this plug-in is displayed below.
3d
Below Options, set the Initial state of resource.
3e
Activate Add monitor operation if you want the cluster to monitor the fencing
device. For more information, refer to Section 8.4, “Monitoring Fencing
Devices” (page 88).
4
Click Forward. The next window shows a summary of the parameters that you
have already defined for that resource. All required Instance Attributes for the
selected STONITH plug-in are listed. You need to edit them in order to set them
to appropriate values. You may also need to add more attributes or monitor oper-
ations, depending on your deployment and settings. For details how to do so,
refer to Procedure 4.2, “Adding or Modifying Meta and Instance Attributes”
(page 36) and Section 4.7, “Configuring Resource Monitoring” (page 46).
5
If all parameters are set according to your wishes, click Apply to finish the confi-
guration of that resource. The configuration dialog is closed and the main window
shows the newly added resource.
To complete your fencing configuration add constraints, or use clones or both. For more
details, refer to Chapter 8, Fencing and STONITH (page 81).
4.4 Configuring Resource Constraints
Having all the resources configured is only part of the job. Even if the cluster knows
all needed resources, it might still not be able to handle them correctly. Resource con-
straints let you specify which cluster nodes resources can run on, what order resources
will load, and what other resources a specific resource is dependent on.
There are three different kinds of constraints available:
Resource Location
Locational constraints that define on which nodes a resource may be run, may not
be run or is preferred to be run.
38
High Availability Guide
Содержание LINUX ENTERPRISE 11 - HIGH AVAILABILITY
Страница 10: ......
Страница 11: ...Part I Installation and Setup...
Страница 12: ......
Страница 28: ......
Страница 38: ......
Страница 39: ...Part II Configuration and Administration...
Страница 40: ......
Страница 68: ......
Страница 108: ......
Страница 114: ......
Страница 115: ...Part III Storage and Data Replication...
Страница 116: ......
Страница 126: ......
Страница 140: ......
Страница 141: ...Part IV Troubleshooting and Reference...
Страница 142: ......
Страница 148: ......
Страница 166: ...See Also cibadmin 8 page 142 156 High Availability Guide...
Страница 202: ......
Страница 210: ......
Страница 231: ...OCF_RESKEY_arp_mac ARP MAC MAC address to send the ARP packets to For advanced users only HA OCF Agents 221...
Страница 246: ...OCF_RESKEY_nfs_ip IP address The floating IP address used to access the the nfs service 236 High Availability Guide...
Страница 285: ...Part V Appendix...
Страница 286: ......