Chapter 10.
Using the Fencing System
Fencing
(or
I/O fencing
) is the mechanism that disables an errant GFS node’s access to a file system,
preventing the node from causing data corruption. This chapter explains the necessity of fencing,
summarizes how the fencing system works, and describes each form of fencing that can be used in a
GFS cluster. The chapter consists of the following sections:
•
Section 10.1
How the Fencing System Works
•
Section 10.2
Fencing Methods
10.1. How the Fencing System Works
Fencing consists of two main steps:
•
Removal — Cutting an errant node off from contact with the storage
•
Recovery — Returning the node safely back into the cluster.
A cluster manager monitors the heartbeat between GFS nodes to determine which nodes are running
properly and which nodes are errant in a GFS cluster. (A cluster manager is part of the LOCK_GULM
server). If a node fails, the cluster manager fences the node, then communicates to the lock manager
and GFS to perform recovery of the failed node.
If a node falls out of contact (losing heartbeat) with the rest of the cluster, the locks it holds and the
corresponding parts of the file system are unavailable to the rest of the nodes in the cluster. Eventually,
that condition may bring the entire cluster to a halt as other nodes require access to those parts of the
file system.
If a node fails, it cannot be permitted to rejoin the cluster while claiming the locks it held when the
node failed. Otherwise, that node could write to a file system where another node — that legitimately
has been issued locks to write to the file system — is writing, therefore corrupting the data. Fencing
prevents a failed node from rejoining a cluster with invalid locks by disabling the path between the
node and the file system storage.
When the cluster manager fences a node, it directs the fencing system to fence the node by name. The
fencing system must read from CCS the appropriate method of fencing the node. Refer to Chapter 7
Using the Cluster Configuration System
for details on how to specify each fencing method in the CCS
configuration files.
Each device or method that can be used to fence nodes is listed in
fence.ccs
under
fence_devices
. Each device specification includes the name of a fencing agent. The fencing agent
is a command that interacts with a specific type of device to disable a specific node. In order to use a
device for fencing, an associated fence agent must exist.
10.2. Fencing Methods
Table 10-1 lists the fencing methods and associated fencing agents that you can use with GFS.
Содержание GFS 5.2.1 -
Страница 1: ...Red Hat GFS 5 2 1 Administrator s Guide...
Страница 8: ......
Страница 14: ...vi Introduction...
Страница 24: ...10 Chapter 1 GFS Overview...
Страница 36: ...22 Chapter 4 Initial Configuration...
Страница 84: ...70 Chapter 6 Creating the Cluster Configuration System Files...
Страница 96: ...82 Chapter 8 Using Clustering and Locking Systems...
Страница 126: ...112 Chapter 10 Using the Fencing System...
Страница 132: ...118 Chapter 11 Using GNBD...
Страница 144: ...130 Appendix A Upgrading GFS...
Страница 184: ...170 Appendix B Basic GFS Examples...
Страница 190: ......
Страница 192: ...178...