Red Hat CLUSTER SUITE - CONFIGURING AND MANAGING A CLUSTER 2006 Instalační příručka

Procházejte online nebo si stáhněte Instalační příručka pro Software pro správu sítě Red Hat CLUSTER SUITE - CONFIGURING AND MANAGING A CLUSTER 2006. Red Hat CLUSTER SUITE - CONFIGURING AND MANAGING A CLUSTER 2006 Installation guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - Overview

Red Hat Cluster Suitefor RHEL 4Overview

Strany 2

vi About This Document

Strany 3 - Table of Contents

Chapter 1.Red Hat Cluster Suite OverviewClustered systems provide reliability, scalability, and availability to critical production ser-vices. Using R

Strany 4

2 Chapter 1. Red Hat Cluster Suite OverviewHigh-availability clusters provide continuous availability of services by eliminating singlepoints of failu

Strany 5 - About This Document

Chapter 1. Red Hat Cluster Suite Overview 3• Red Hat GFS (Global File System) — Provides a cluster file system for use with RedHat Cluster Suite. GFS a

Strany 6

4 Chapter 1. Red Hat Cluster Suite Overview1.3. Cluster InfrastructureThe Red Hat Cluster Suite cluster infrastructure provides the basic functions fo

Strany 7 - Mail backupfiles mail reports

Chapter 1. Red Hat Cluster Suite Overview 5NoteIn a CMAN cluster, by default each node has one quorum vote for establishing quorum.Optionally, you can

Strany 8

6 Chapter 1. Red Hat Cluster Suite OverviewFigure 1-3. GULM Overview1.3.2. Lock ManagementLock management is a common cluster-infrastructure service t

Strany 9 - 2. Feedback

Chapter 1. Red Hat Cluster Suite Overview 7• Configured with CMAN/DLM — fenced, the fence daemon, performs fencing.• Configured with GULM servers — GULM

Strany 10

8 Chapter 1. Red Hat Cluster Suite OverviewFigure 1-4. Power Fencing ExampleFigure 1-5. Fibre Channel Switch Fencing Example

Strany 11 - Chapter 1

Chapter 1. Red Hat Cluster Suite Overview 9Specifying a fencing method consists of editing a cluster configuration file to assign afencing-method name,

Strany 12

Red Hat Cluster Suitefor RHEL 4: OverviewCopyright © 2000-2006 Red Hat, Inc.Red Hat, Inc.1801 Varsity DriveRaleigh NC 27606-2072 USAPhone: +1 919 754

Strany 13

10 Chapter 1. Red Hat Cluster Suite OverviewFigure 1-7. Fencing a Node with Dual Fibre Channel ConnectionsYou can configure a node with one fencing met

Strany 14 - 1.3. Cluster Infrastructure

Chapter 1. Red Hat Cluster Suite Overview 11Figure 1-8. CCS OverviewOther cluster components (for example, CMAN) access configuration information fromt

Strany 15

12 Chapter 1. Red Hat Cluster Suite OverviewThe cluster configuration file (/etc/cluster/cluster.conf) is an XML file that de-scribes the following clust

Strany 16 - 1.3.3. Fencing

Chapter 1. Red Hat Cluster Suite Overview 13cluster service can start on any cluster node in the event no member of the failover domainis available.)I

Strany 17

14 Chapter 1. Red Hat Cluster Suite OverviewFigure 1-11 shows an example of a high-availability cluster service that is a web servernamed "conten

Strany 18

Chapter 1. Red Hat Cluster Suite Overview 151.5. Red Hat GFSRed Hat GFS is a cluster file system that allows a cluster of nodes to simultaneously acces

Strany 19

16 Chapter 1. Red Hat Cluster Suite OverviewYou can deploy GFS in a variety of configurations to suit your needs for performance,scalability, and econo

Strany 20

Chapter 1. Red Hat Cluster Suite Overview 17Figure 1-12. GFS with a SAN1.5.2. Performance, Scalability, Moderate PriceMultiple Linux client applicatio

Strany 21 - Figure 1-8. CCS Overview

18 Chapter 1. Red Hat Cluster Suite OverviewFigure 1-13. GFS and GNBD with a SAN1.5.3. Economy and PerformanceFigure 1-14 shows how Linux client appli

Strany 22

Chapter 1. Red Hat Cluster Suite Overview 19Figure 1-14. GFS and GNBD with Directly Connected Storage1.6. Cluster Logical Volume ManagerThe Cluster Lo

Strany 23

Table of ContentsAbout This Document... i1. Docum

Strany 24

20 Chapter 1. Red Hat Cluster Suite OverviewNoteUsing CLVM requires minor changes to /etc/lvm/lvm.conf for cluster-wide locking.Figure 1-15. CLVM Over

Strany 25 - 1.5. Red Hat GFS

Chapter 1. Red Hat Cluster Suite Overview 21Figure 1-16. LVM Graphical User InterfaceFigure 1-17. Creating Logical Volumes

Strany 26

22 Chapter 1. Red Hat Cluster Suite Overview1.7. Global Network Block DeviceGlobal Network Block Device (GNBD) provides block-device access to Red Hat

Strany 27

Chapter 1. Red Hat Cluster Suite Overview 23• To balance the load across the real servers.• To check the integrity of the services on each real server

Strany 28

24 Chapter 1. Red Hat Cluster Suite Overviewrouter via both the public and private network interfaces to shut down the lvs daemonon the active LVS rou

Strany 29

Chapter 1. Red Hat Cluster Suite Overview 25Figure 1-20. Two-Tier LVS TopologyService requests arriving at an LVS router are addressed to a virtual IP

Strany 30

26 Chapter 1. Red Hat Cluster Suite Overview• Weighted Round-Robin Scheduling — Distributes each request sequentially around apool of real servers but

Strany 31

Chapter 1. Red Hat Cluster Suite Overview 27of the active LVS router. During failover, the backup LVS router takes over the VIP ad-dresses serviced by

Strany 32 - 1.8. Linux Virtual Server

28 Chapter 1. Red Hat Cluster Suite OverviewFigure 1-21. Three-Tier LVS TopologyThis topology is suited well for busy FTP servers, where accessible da

Strany 33

Chapter 1. Red Hat Cluster Suite Overview 291.8.3. Routing MethodsYou can use Network Address Translation (NAT) routing or direct routing with LVS. Th

Strany 35

30 Chapter 1. Red Hat Cluster Suite OverviewIP address to its physical device on the LVS router nodes, having more than two NICs isnot a requirement.U

Strany 36

Chapter 1. Red Hat Cluster Suite Overview 31Figure 1-23. LVS Implemented with Direct RoutingIn a typical direct-routing LVS configuration, an LVS route

Strany 37

32 Chapter 1. Red Hat Cluster Suite OverviewThe issue with ARP requests in a direct-routing LVS configuration is that because a clientrequest to an IP

Strany 38

Chapter 1. Red Hat Cluster Suite Overview 331.8.4.2. Firewall MarksFirewall marks are an easy and efficient way to a group ports used for a protocol or

Strany 39 - 1.8.3. Routing Methods

34 Chapter 1. Red Hat Cluster Suite OverviewCommandLine ToolUsed With Purposeccs_tool —ClusterConfigurationSystem ToolClusterInfrastructureccs_tool is

Strany 40 - 1.8.3.2. Direct Routing

Chapter 1. Red Hat Cluster Suite Overview 351.9.1. Cluster Configuration ToolYou can access the Cluster Configuration Tool (Figure 1-24) through the Clu

Strany 41

36 Chapter 1. Red Hat Cluster Suite Overview• Fence Devices — Displays fence devices. Fence devices are represented as subordinateelements under Fence

Strany 42 - 1.8.4.1. Persistence

Chapter 1. Red Hat Cluster Suite Overview 37Figure 1-25. Cluster Configuration Structure

Strany 43 - 1.8.4.2. Firewall Marks

38 Chapter 1. Red Hat Cluster Suite Overview1.9.2. Cluster Status ToolYou can access the Cluster Status Tool (Figure 1-26) through the Cluster Managem

Strany 44

Chapter 1. Red Hat Cluster Suite Overview 39(Relocating a service to its current node — that is, dragging a service to its current nodeand dropping th

Strany 45

About This DocumentThis document provides a high-level overview of Red Hat Cluster Suite for Red Hat Enter-prise Linux 4. Although the information in

Strany 46

40 Chapter 1. Red Hat Cluster Suite Overview1.10. Linux Virtual Server Administration GUIThis section provides an overview of the LVS configuration too

Strany 47

Chapter 1. Red Hat Cluster Suite Overview 41Figure 1-28. The CONTROL/MONITORING PanelAuto updateEnables the status display to be updated automatically

Strany 48 - 1.9.2. Cluster Status Tool

42 Chapter 1. Red Hat Cluster Suite OverviewFigure 1-29. The GLOBAL SETTINGS PanelThe top half of this panel sets up the primary LVS router’s public a

Strany 49

Chapter 1. Red Hat Cluster Suite Overview 43NAT Router netmaskIf the NAT router’s floating IP needs a particular netmask, select it from drop-downlist.

Strany 50 - 1.10.1. CONTROL/MONITORING

44 Chapter 1. Red Hat Cluster Suite OverviewRedundant server private IPThe backup router’s private real IP address.The rest of the panel is for configu

Strany 51 - 1.10.2. GLOBAL SETTINGS

Chapter 1. Red Hat Cluster Suite Overview 45Figure 1-31. The VIRTUAL SERVERS PanelEach server displayed in the VIRTUAL SERVERS panel can be configured

Strany 52

46 Chapter 1. Red Hat Cluster Suite OverviewFigure 1-32. The VIRTUAL SERVERS SubsectionNameA descriptive name to identify the virtual server. This nam

Strany 53 - 1.10.3. REDUNDANCY

Chapter 1. Red Hat Cluster Suite Overview 47Firewall MarkFor entering a firewall mark integer value when bundling multi-port protocols or cre-ating a m

Strany 54 - 1.10.4. VIRTUAL SERVERS

48 Chapter 1. Red Hat Cluster Suite OverviewPersistence Network MaskTo limit persistence to particular subnet, select the appropriate network mask fro

Strany 55

Chapter 1. Red Hat Cluster Suite Overview 49Figure 1-34. The REAL SERVER Configuration PanelThis panel consists of three entry fields:NameA descriptive

Strany 56

ii About This Documentcontains words that would be displayed in a different style on their own (such as filenames). In these cases, they are considered

Strany 57

50 Chapter 1. Red Hat Cluster Suite Overview1.10.4.3. EDIT MONITORING SCRIPTS SubsectionClick on the MONITORING SCRIPTS link at the top of the page. T

Strany 58

Chapter 1. Red Hat Cluster Suite Overview 51SendA string for the nanny daemon to send to each real server in this field. By default thesend field is com

Strany 59

52 Chapter 1. Red Hat Cluster Suite Overview

Strany 60

Chapter 2.Red Hat Cluster Suite ComponentSummaryThis chapter provides a summary of Red Hat Cluster Suite components and consists of thefollowing secti

Strany 61 - • \t for tab

54 Chapter 2. Red Hat Cluster Suite Component SummaryFunction Components DescriptionClusterConfigurationSystem (CCS)ccs_tool ccs_tool is part of the Cl

Strany 62

Chapter 2. Red Hat Cluster Suite Component Summary 55Function Components Descriptionclurgmgrd Daemon used to handle userservice requests including ser

Strany 63 - Chapter 2

56 Chapter 2. Red Hat Cluster Suite Component SummaryFunction Components Descriptionfence_egenera Fence agent used with EgeneraBladeFrame system.fence

Strany 64

Chapter 2. Red Hat Cluster Suite Component Summary 57Function Components Descriptiongfs_tool Command that configures or tunesa GFS file system. This com

Strany 65

58 Chapter 2. Red Hat Cluster Suite Component SummaryFunction Components DescriptionLVS pulse This is the controlling processwhich starts all other da

Strany 66 - Command that repairs an

Chapter 2. Red Hat Cluster Suite Component Summary 59Function Components Descriptionnanny The nanny monitoring daemonruns on the active LVS router.Thr

Strany 67

About This Document iiitop level of a menu on a GUI screen or windowA word in this style indicates that the word is the top level of a pulldown menu.

Strany 68

60 Chapter 2. Red Hat Cluster Suite Component Summary• cluster.conf [cluster] (5) - The configuration file for cluster products• QDisk 1.0 [qdisk] (5) -

Strany 69 - 2.2. Man Pages

Chapter 2. Red Hat Cluster Suite Component Summary 61• gfs_quota (8) - Manipulate GFS disk quotas• gfs_tool (8) - interface to gfs ioctl calls• Cluste

Strany 70 - fline GFS file system checker

62 Chapter 2. Red Hat Cluster Suite Component Summary

Strany 71

IndexAabout this document, iother Red Hat Enterprise Linux documents, iCclusterdisplaying status, 39cluster administrationdisplaying cluster and servi

Strany 72

64Sservices status table, 39Ttablecommand line tools, 33tablescluster components, 53members status, 39services status, 39

Strany 73

iv About This Document<replaceable>Text used in examples that is meant to be replaced with data provided by the useris displayed in this style.

Strany 74

About This Document vWarningBe careful to remove only the necessary partitions. Removing other partitions could resultin data loss or a corrupted syst

Komentáře k této Příručce

Žádné komentáře