Red Hat CLUSTER SUITE FOR ENTERPRISE LINUX 5.2 Instalační příručka Strana 1

Procházejte online nebo si stáhněte Instalační příručka pro Software pro správu sítě Red Hat CLUSTER SUITE FOR ENTERPRISE LINUX 5.2. Red Hat CLUSTER SUITE FOR ENTERPRISE LINUX 5.2 Installation guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - Red Hat Enterprise Linux

Red Hat Cluster Suite OverviewRed Hat Cluster Suite forRed Hat Enterprise Linux5.2Cluster_Suite_OverviewISBN: N/APublication date: May 2008

Strany 3

Red Hat Cluster Suite OverviewClustered systems provide reliability, scalability, and availability to critical production services.Using Red Hat Clust

Strany 4

High-availability clusters provide continuous availability of services by eliminating single pointsof failure and by failing over services from one cl

Strany 5

Infrastructure components, the High-availability and Service Management components, andstorage.• Linux Virtual Server (LVS) — Routing software that pr

Strany 6

Figure 1.1. Red Hat Cluster Suite IntroductionNoteFigure 1.1, “Red Hat Cluster Suite Introduction” includes GFS, CLVM, andGNBD, which are components t

Strany 7 - Introduction

the node votes plus 1. For quorum via quorum disk, quorum consists of user-specifiedconditions.NoteBy default, each node has one quorum vote. Optional

Strany 8 - 1. Document Conventions

distributed across all nodes in the cluster (refer to Figure 1.2, “CMAN/DLM Overview”). GFS andCLVM use locks from the lock manager. GFS uses locks fr

Strany 9 - 2. Feedback

Figure 1.3. Power Fencing ExampleFencing7

Strany 10

Figure 1.4. Fibre Channel Switch Fencing ExampleSpecifying a fencing method consists of editing a cluster configuration file to assign afencing-method

Strany 11 - 1. Cluster Basics

Figure 1.5. Fencing a Node with Dual Power SuppliesFencing9

Strany 12

Red Hat Cluster Suite Overview provides an overview of Red Hat Cluster Suite for Red HatEnterprise Linux 5.2Red Hat Cluster Suite Overview

Strany 13

Figure 1.6. Fencing a Node with Dual Fibre Channel ConnectionsYou can configure a node with one fencing method or multiple fencing methods. When youco

Strany 14 - 3. Cluster Infrastructure

The Cluster Configuration System (CCS) manages the cluster configuration and providesconfiguration information to other cluster components in a Red Ha

Strany 15 - 3.2. Lock Management

Figure 1.8. Accessing Configuration InformationThe cluster configuration file (/etc/cluster/cluster.conf) is an XML file that describes thefollowing c

Strany 16 - 3.3. Fencing

High-availability service management provides the ability to create and manage high-availabilitycluster services in a Red Hat cluster. The key compone

Strany 17

Figure 1.9. Failover DomainsFigure 1.10, “Web Server Cluster Service Example” shows an example of a high-availabilitycluster service that is a web ser

Strany 18

Figure 1.10. Web Server Cluster Service ExampleClients access the cluster service through the IP address 10.10.10.201, enabling interactionwith the we

Strany 19

uses a lock manager to coordinate I/O. When one node changes data on a GFS file system,that change is immediately visible to the other cluster nodes u

Strany 20

• Section 5.1, “Superior Performance and Scalability”• Section 5.2, “Performance, Scalability, Moderate Price”• Section 5.3, “Economy and Performance”

Strany 21 - Figure 1.7. CCS Overview

Figure 1.12, “GFS and GNBD with a SAN”. SAN block storage is presented to network clientsas block storage devices by GNBD servers. From the perspectiv

Strany 22

Figure 1.13. GFS and GNBD with Directly Connected Storage6. Cluster Logical Volume ManagerThe Cluster Logical Volume Manager (CLVM) provides a cluster

Strany 23

Red Hat Cluster Suite Overview: Red Hat Cluster Suite forRed Hat Enterprise LinuxCopyright © 2008 Red Hat, Inc.Copyright © 2008 Red Hat, Inc. This mat

Strany 24 - Figure 1.9. Failover Domains

Using CLVM requires minor changes to /etc/lvm/lvm.conf for cluster-widelocking.Figure 1.14. CLVM OverviewYou can configure CLVM using the same command

Strany 25 - 5. Red Hat GFS

Figure 1.15. LVM Graphical User InterfaceCluster Logical Volume Manager21

Strany 26

Figure 1.16. Conga LVM Graphical User InterfaceChapter 1. Red Hat Cluster Suite Overview22

Strany 27 - Figure 1.11. GFS with a SAN

Figure 1.17. Creating Logical Volumes7. Global Network Block DeviceGlobal Network Block Device (GNBD) provides block-device access to Red Hat GFS over

Strany 28 - 5.3. Economy and Performance

Figure 1.18. GNBD Overview8. Linux Virtual ServerLinux Virtual Server (LVS) is a set of integrated software components for balancing the IP loadacross

Strany 29

Figure 1.19. Components of a Running LVS ClusterThe pulse daemon runs on both the active and passive LVS routers. On the backup LVSrouter, pulse sends

Strany 30 - Figure 1.14. CLVM Overview

To an outside user accessing a hosted service (such as a website or database application),LVS appears as one server. However, the user is actually acc

Strany 31

1A virtual server is a service configured to listen on a specific virtual IP.Figure 1.20. Two-Tier LVS TopologyService requests arriving at an LVS rou

Strany 32

• Round-Robin Scheduling — Distributes each request sequentially around a pool of realservers. Using this algorithm, all the real servers are treated

Strany 33

The backup LVS router performs the role of a standby system. Periodically, the LVS routersexchange heartbeat messages through the primary external pub

Strany 34 - 8. Linux Virtual Server

Red Hat Cluster Suite Overview

Strany 35

Figure 1.21. Three-Tier LVS TopologyThis topology is suited well for busy FTP servers, where accessible data is stored on a central,highly available s

Strany 36 - 8.1. Two-Tier LVS Topology

a Red Hat cluster, you can configure one high-availability cluster to serve both of these rolessimultaneously.8.3. Routing MethodsYou can use Network

Strany 37

interface are taken over by the backup LVS router simultaneously. All the real servers on theprivate network use the floating IP for the NAT router as

Strany 38

Figure 1.23. LVS Implemented with Direct RoutingIn a typical direct-routing LVS configuration, an LVS router receives incoming server requeststhrough

Strany 39 - 8.2. Three-Tier LVS Topology

In typical situations, a client on the Internet sends a request to an IP address. Network routerstypically send requests to their destination by relat

Strany 40

8.4.2. Firewall MarksFirewall marks are an easy and efficient way to a group ports used for a protocol or group ofrelated protocols. For example, if L

Strany 41 - 8.3. Routing Methods

luci is accessible through a Web browser and provides three major functions that areaccessible through the following tabs:• homebase — Provides tools

Strany 42 - 8.3.2. Direct Routing

Figure 1.24. luci homebase TabFigure 1.25. luci cluster TabConga37

Strany 43

Figure 1.26. luci storage Tab9.2. Cluster Administration GUIThis section provides an overview of the system-config-cluster cluster administrationgraph

Strany 44 - 8.4.1. Persistence

9.2.1. Cluster Configuration ToolYou can access the Cluster Configuration Tool (Figure 1.27, “Cluster Configuration Tool”)through the Cluster Configur

Strany 45 - 9.1. Conga

Introduction ... vii1. Document Conventions

Strany 46

• Cluster Nodes — Displays cluster nodes. Nodes are represented by name as subordinateelements under Cluster Nodes. Using configuration buttons at the

Strany 47 - Figure 1.25. luci cluster Tab

Cluster Management tab in Cluster Administration GUI.Figure 1.28. Cluster Status ToolThe nodes and services displayed in the Cluster Status Tool are d

Strany 48 - Figure 1.26. luci storage Tab

Administration GUI and init scripts supplied by Red Hat. Table 1.1, “Command Line Tools”summarizes the command line tools.Command LineToolUsed With Pu

Strany 49

Web browser. You can access it locally with this URL: http://localhost:3636. You canaccess it remotely with either the hostname or the real IP address

Strany 50 - 9.2.2. Cluster Status Tool

Figure 1.30. The CONTROL/MONITORING PanelAuto updateEnables the status display to be updated automatically at a user-configurable interval set inthe U

Strany 51

10.2. GLOBAL SETTINGSThe GLOBAL SETTINGS panel is where the LVS administrator defines the networking detailsfor the primary LVS router's public a

Strany 52 - Table 1.1. Command Line Tools

The next three fields are specifically for the NAT router's virtual network interface connected theprivate network with the real servers.NAT Rout

Strany 53 - 10.1. CONTROL/MONITORING

Figure 1.32. The REDUNDANCY PanelRedundant server public IPThe public real IP address for the backup LVS router.Redundant server private IPThe backup

Strany 54

Figure 1.33. The VIRTUAL SERVERS PanelEach server displayed in the VIRTUAL SERVERS panel can be configured on subsequentscreens or subsections.To add

Strany 55 - 10.2. GLOBAL SETTINGS

any of the subsections related to this virtual server, complete this page and click on theACCEPT button.Figure 1.34. The VIRTUAL SERVERS SubsectionNam

Strany 57 - 10.4. VIRTUAL SERVERS

Virtual IP Network MaskThe netmask for this virtual server, in the drop-down menu.Firewall MarkFor entering a firewall mark integer value when bundlin

Strany 58

drop-down menu.10.4.2. REAL SERVER SubsectionClicking on the REAL SERVER subsection link at the top of the panel displays the EDIT REALSERVER subsecti

Strany 59

Figure 1.36. The REAL SERVER Configuration PanelThis panel consists of three entry fields:NameA descriptive name for the real server.TipThis name is n

Strany 60 - Weighted

WeightAn integer value indicating this host's capacity relative to that of other hosts in the pool. Thevalue can be arbitrary, but treat it as a

Strany 61

dynamically changing data, such as HTTPS or SSL.To use this function, you must write a script that returns a textual response, set it to beexecutable,

Strany 62

Red Hat Cluster Suite ComponentSummaryThis chapter provides a summary of Red Hat Cluster Suite components and consists of thefollowing sections:• Sect

Strany 63

Function Components Descriptioncreated with GFS 6.0 (and earlier) tothe XML format configuration formatused with this release of Red HatCluster Suite.

Strany 64

Function Components Descriptionmembership and services running.clurgmgrd Daemon used to handle user servicerequests including service start,service di

Strany 65 - 1. Cluster Components

Function Components Descriptionenvironments.fence_ack_manual User interface for fence_manualagent.fence_node A program which performs I/O fencingon a

Strany 66

Function Components Descriptiongnbd_serv A server daemon that allows a nodeto export local storage over thenetwork.LVS pulse This is the controlling p

Strany 67

IntroductionThis document provides a high-level overview of Red Hat Cluster Suite for Red Hat EnterpriseLinux 5 and is is organized as follows:• Chapt

Strany 68

Function Components Descriptionnanny The nanny monitoring daemon runson the active LVS router. Through thisdaemon, the active LVS routerdetermines the

Strany 69

• ccs (7) - Cluster Configuration System• cman_tool (8) - Cluster Management Tool• cluster.conf [cluster] (5) - The configuration file for cluster pro

Strany 70 - 2. Man Pages

• fence_xvm (8) - I/O Fencing agent for Xen virtual machines• fence_xvmd (8) - I/O Fencing agent host for Xen virtual machines• fenced (8) - the I/O F

Strany 71

• pulse (8) - heartbeating daemon for monitoring the health of cluster nodes• lvs.cf [lvs] (5) - configuration file for lvs• lvscan (8) - scan (all di

Strany 73 - 3. Compatible Hardware

IndexCclusterdisplaying status, 41cluster administrationdisplaying cluster and service status, 41cluster component compatible hardware, 63cluster comp

Strany 75

PDF, and RPM versions on the Red Hat Enterprise Linux Documentation CD and online athttp://www.redhat.com/docs/.1. Document ConventionsCertain words i

Strany 76

TipA tip is typically an alternative way of performing a task.ImportantImportant information is necessary, but possibly unexpected, such as aconfigura

Komentáře k této Příručce

Žádné komentáře