Red Hat CLUSTER SUITE 4.7 DM MULTIPATH Instalační příručka

Procházejte online nebo si stáhněte Instalační příručka pro Směrovače Red Hat CLUSTER SUITE 4.7 DM MULTIPATH. Red Hat CLUSTER SUITE 4.7 DM MULTIPATH Installation guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 188
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Configuring and Managing a

Red Hat Cluster SuiteConfiguring and Managing aCluster

Strany 2

iv Introductionbutton on a GUI screen or windowThis style indicates that the text can be found on a clickable button on a GUI screen.For example:Click

Strany 3

84 Chapter 6. Introduction to Linux Virtual Serverhardware to implement a fully redundant environment in which services can run uninter-rupted by hard

Strany 4

Chapter 7.Linux Virtual Server OverviewRed Hat Enterprise Linux LVS clustering uses a Linux machine called the active routerto send requests from the

Strany 5

86 Chapter 7. Linux Virtual Server OverviewFigure 7-1. A Basic LVS ConfigurationService requests arriving at the LVS cluster are addressed to a virtual

Strany 6

Chapter 7. Linux Virtual Server Overview 87The active router also dynamically monitors the overall health of the specific services onthe real servers t

Strany 7 - Introduction

88 Chapter 7. Linux Virtual Server Overview7.2. A Three Tiered LVS ConfigurationFigure 7-2 shows a typical three tiered LVS cluster topology. In this e

Strany 8 - 2. Document Conventions

Chapter 7. Linux Virtual Server Overview 89cluster to serve both of these roles simultaneously.The third tier in the above example does not have to us

Strany 9

90 Chapter 7. Linux Virtual Server Overviewthat it is network-connection based and not host-based. LVS round-robin schedulingalso does not suffer the

Strany 10 - <version-number>/

Chapter 7. Linux Virtual Server Overview 91the real server with the least connections from the overall pool of real servers to thesubset of real serve

Strany 11 - 3. More to Come

92 Chapter 7. Linux Virtual Server Overview7.4.1. NAT RoutingFigure 7-3, illustrates an LVS cluster utilizing NAT routing to move requests between the

Strany 12 - 4. Activate Your Subscription

Chapter 7. Linux Virtual Server Overview 93In this example, the LVS router’s public LVS floating IP address and private NAT floatingIP address are alias

Strany 13 - 4.3. Connect Your System

Introduction vNoteRemember that Linux is case sensitive. In other words, a rose is not a ROSE is not arOsE.TipThe directory /usr/share/doc/ contains a

Strany 14

94 Chapter 7. Linux Virtual Server Overview7.5.2. Firewall MarksFirewall marks are an easy and efficient way to a group ports used for a protocol or gr

Strany 15 - Table of Contents

Chapter 7. Linux Virtual Server Overview 95The pulse daemon runs on both the active and passive LVS routers. On the backup router,pulse sends a heartb

Strany 16

96 Chapter 7. Linux Virtual Server Overview7.6.1.3. ipvsadmThis service updates the IPVS routing table in the kernel. The lvs daemon sets up andadmini

Strany 17 - Chapter 1

Chapter 8.Initial LVS ConfigurationAfter installing Red Hat Enterprise Linux, you must take some basic steps to set up boththe LVS routers and the real

Strany 18

98 Chapter 8. Initial LVS ConfigurationIf you are clustering multi-port services or using firewall marks, you must also enable theiptables service.It is

Strany 19

Chapter 8. Initial LVS Configuration 99If the password is changed during an active Piranha Configuration Tool session, theadministrator is prompted to p

Strany 20 - Cluster Suite 4

100 Chapter 8. Initial LVS Configuration8.3.1. Configuring the Piranha Configuration Tool Web ServerPortThe Piranha Configuration Tool runs on port 3636 b

Strany 21

Chapter 8. Initial LVS Configuration 101You can also allow specific hosts or subnets as seen in this example:Order deny,allowDeny from allAllow from 192

Strany 22

102 Chapter 8. Initial LVS Configuration8.6. Configuring Services on the Real ServersIf the real servers in the cluster are Red Hat Enterprise Linux sys

Strany 23

Chapter 9.Setting Up a Red Hat Enterprise Linux LVSClusterA Red Hat Enterprise Linux LVS cluster consists of two basic groups: the LVS routers andthe

Strany 24

vi Introduction3.1. Send in Your FeedbackIf you spot a typo, or if you have thought of a way to make this manualbetter, we would love to hear from you

Strany 25 - Chapter 2

104 Chapter 9. Setting Up a Red Hat Enterprise Linux LVS Clusterration Tool. In particular, FTP services and the use of firewall marks requires extrama

Strany 26 - • A fence device

Chapter 9. Setting Up a Red Hat Enterprise Linux LVS Cluster 105After configuring the primary LVS router node’s network interfaces, configure the backup

Strany 27

106 Chapter 9. Setting Up a Red Hat Enterprise Linux LVS ClusterIt is best to turn off extraneous network interfaces by setting ONBOOT=no in their net

Strany 28

Chapter 9. Setting Up a Red Hat Enterprise Linux LVS Cluster 107ImportantThe adapter devices on the LVS routers must be configured to access the same n

Strany 29

108 Chapter 9. Setting Up a Red Hat Enterprise Linux LVS ClusterChecking the Status of Network InterfacesIf you need to check which network interfaces

Strany 30 - Important

Chapter 9. Setting Up a Red Hat Enterprise Linux LVS Cluster 109If iptables is active, it displays a set of rules. If rules are present, type the foll

Strany 31

110 Chapter 9. Setting Up a Red Hat Enterprise Linux LVS Clusteran FTP client connects to an FTP server it opens a connection to the FTP control port

Strany 32

Chapter 9. Setting Up a Red Hat Enterprise Linux LVS Cluster 1119.4.3. Creating Network Packet Filter RulesBefore assigning any iptables rules for FTP

Strany 33

112 Chapter 9. Setting Up a Red Hat Enterprise Linux LVS Clusterpasv_address=X.X.X.XReplace X.X.X.X with the VIP address of the LVS system.For configur

Strany 34 - 2.3. Setting Up the Nodes

Chapter 9. Setting Up a Red Hat Enterprise Linux LVS Cluster 113This saves the settings in /etc/sysconfig/iptables so they can be recalled at boottime

Strany 35

Introduction vii• Software updates, errata and maintenance via Red Hat Network• Red Hat technical support resources, documentation, and KnowledgebaseI

Strany 36

114 Chapter 9. Setting Up a Red Hat Enterprise Linux LVS Cluster

Strany 37 - times. Refer

Chapter 10.Configuring the LVS Routers with PiranhaConfiguration ToolThe Piranha Configuration Tool provides a structured approach to creating the necess

Strany 38 - /etc/modprobe.conf:

116 Chapter 10. Configuring the LVS Routers with Piranha Configuration Toolor real IP address for the server followed by :3636. Once the browser connect

Strany 39 - /etc/hosts File

Chapter 10. Configuring the LVS Routers with Piranha Configuration Tool 117Figure 10-2. The CONTROL/MONITORING PanelAuto updateThe status display on thi

Strany 40 - /sbin/ip addr list

118 Chapter 10. Configuring the LVS Routers with Piranha Configuration ToolThe Auto update feature does not work with all browsers, such as Mozilla.Upda

Strany 41

Chapter 10. Configuring the LVS Routers with Piranha Configuration Tool 119Figure 10-3. The GLOBAL SETTINGS PanelThe top half of this panel sets up the

Strany 42

120 Chapter 10. Configuring the LVS Routers with Piranha Configuration ToolTipThe primary LVS router’s private IP can be configured on any interface that

Strany 43 - SCSI devices (sd)

Chapter 10. Configuring the LVS Routers with Piranha Configuration Tool 121TipThe first time you visit this screen, it displays an "inactive" B

Strany 44

122 Chapter 10. Configuring the LVS Routers with Piranha Configuration ToolRedundant server private IPEnter the backup node’s private real IP address in

Strany 45

Chapter 10. Configuring the LVS Routers with Piranha Configuration Tool 123Figure 10-5. The VIRTUAL SERVERS PanelEach server displayed in the VIRTUAL SE

Strany 47 - 2.5.3. Configuring UPS Systems

124 Chapter 10. Configuring the LVS Routers with Piranha Configuration Toolare located along the top of the page. But before configuring any of the subse

Strany 48 - 2.5.3.1. Partitioning Disks

Chapter 10. Configuring the LVS Routers with Piranha Configuration Tool 125ProtocolChoose between UDP and TCP in the drop-down menu. Web servers typical

Strany 49

126 Chapter 10. Configuring the LVS Routers with Piranha Configuration ToolQuiesce serverWhen the Quiesce server radio button is selected, anytime a new

Strany 50

Chapter 10. Configuring the LVS Routers with Piranha Configuration Tool 127NoteBefore the advent of firewall marks, persistence limited by subnet was a c

Strany 51 - Chapter 3

128 Chapter 10. Configuring the LVS Routers with Piranha Configuration ToolFigure 10-7. The REAL SERVER SubsectionClick the ADD button to add a new serv

Strany 52

Chapter 10. Configuring the LVS Routers with Piranha Configuration Tool 129Figure 10-8. The REAL SERVER Configuration PanelThis panel consists of three e

Strany 53

130 Chapter 10. Configuring the LVS Routers with Piranha Configuration ToolWeightAn integer value indicating this host’s capacity relative to that of ot

Strany 54

Chapter 10. Configuring the LVS Routers with Piranha Configuration Tool 131Figure 10-9. The EDIT MONITORING SCRIPTS SubsectionSending ProgramFor more ad

Strany 55 - Red Hat GFS products

132 Chapter 10. Configuring the LVS Routers with Piranha Configuration ToolThe following is a sample script to use as a guide when composing an external

Strany 56

Chapter 10. Configuring the LVS Routers with Piranha Configuration Tool 133WarningRemember to click the ACCEPT button after making any changes in this p

Strany 57

I. Using the Red Hat Cluster ManagerClustered systems provide reliability, scalability, and availability to critical production ser-vices. Using the R

Strany 58 - 3.5. Naming The Cluster

134 Chapter 10. Configuring the LVS Routers with Piranha Configuration ToolThe best way to do this is to use the scp command.ImportantTo use scp the ssh

Strany 59 - 3.6. Configuring Fence Devices

Chapter 10. Configuring the LVS Routers with Piranha Configuration Tool 135Next either open an ssh session to the backup router or log into the machine

Strany 60

136 Chapter 10. Configuring the LVS Routers with Piranha Configuration Tool

Strany 61

III. AppendixesThis section is licensed under the GNU Free Documentation License. For details refer tothe Copyright page.Table of ContentsA. Supplemen

Strany 63 - /dev/ttys2)

Appendix A.Supplementary Hardware InformationThe following sections provide additional information about configuring the hardware usedin a cluster syst

Strany 64

140 Appendix A. Supplementary Hardware InformationFigure A-1. Single-controller RAID Array Connected to Single-initiator Fibre Chan-nel InterconnectsT

Strany 65 - file of each cluster node

Appendix A. Supplementary Hardware Information 141Figure A-2. Dual-controller RAID Array Connected to Single-initiator Fibre ChannelInterconnectsA.3.

Strany 66

142 Appendix A. Supplementary Hardware Information• Use the appropriate SCSI cable to connect each host bus adapter to the storage enclosure.Setting h

Strany 67 - Two Nodes

Appendix A. Supplementary Hardware Information 143Figure A-5. Dual-controller RAID Array Connected to Single-initiator SCSI BusesA.3.1. SCSI Configurat

Strany 69

144 Appendix A. Supplementary Hardware InformationA.3.2. SCSI Bus TerminationA SCSI bus is an electrical path between two terminators. A device (host

Strany 70

Appendix A. Supplementary Hardware Information 145A cluster supports LVD (low voltage differential) buses. The maximum length of a single-initiator LV

Strany 71

146 Appendix A. Supplementary Hardware Information

Strany 72

Appendix B.Selectively Installing Red Hat Cluster SuitePackagesB.1. Installing the Red Hat Cluster Suite PackagesRed Hat Cluster Suite consists of the

Strany 73

148 Appendix B. Selectively Installing Red Hat Cluster Suite Packages• gnbd-kernel — Kernel module for the GFS Network Block Device• lvm2-cluster — Cl

Strany 74

Appendix B. Selectively Installing Red Hat Cluster Suite Packages 1492. Run up2date --installall --channel Label for Red Hat Cluster Suite. Thefollowi

Strany 75 - 3.9. Adding Cluster Resources

150 Appendix B. Selectively Installing Red Hat Cluster Suite Packages• Table B-3 — For Red Hat GFSThe tables contain the following information to assi

Strany 76 - to be run on

Appendix B. Selectively Installing Red Hat Cluster Suite Packages 151RPMs Inclusion DependsonKernelType?Purposeccs-ver-rel.arch Req No The ClusterConfi

Strany 77 - /etc/cluster/cluster.conf

152 Appendix B. Selectively Installing Red Hat Cluster Suite PackagesRPMs Inclusion DependsonKernelType?Purposergmanager-ver-rel.arch Opt No Open sour

Strany 78

Appendix B. Selectively Installing Red Hat Cluster Suite Packages 153RPMs Inclusion DependsonKernelType?Purposeccs-ver-rel.arch Req No The ClusterConfi

Strany 79

Chapter 1.Red Hat Cluster Manager OverviewRed Hat Cluster Manager allows administrators to connect separate systems (called mem-bers or nodes) togethe

Strany 80

154 Appendix B. Selectively Installing Red Hat Cluster Suite PackagesRPMs Inclusion DependsonKernelType?Purposemagma-devel-ver-rel.arch Dev No A clust

Strany 81

Appendix B. Selectively Installing Red Hat Cluster Suite Packages 155B.1.2.2. Installing Packages with the rpm UtilityYou can use the rpm utility to i

Strany 82

156 Appendix B. Selectively Installing Red Hat Cluster Suite PackagesNoteIf your local computer is running a version of Red Hat Enterprise Linux thati

Strany 83 - Chapter 4

Appendix C.Multipath-usage.txt File for Red HatEnterprise Linux 4 Update 3This appendix contains the Multipath-usage.txt file. The file is included with

Strany 84

158Appendix C. Multipath-usage.txt File for Red Hat Enterprise Linux 4Update 3DM-MP works with a variety of storage arrays. Itauto-configures the foll

Strany 85

Appendix C. Multipath-usage.txt File for Red Hat Enterprise Linux 4Update 3 159Path States:ready - Path is able to handle I/O requests.shaky - Path is

Strany 86 - # clustat

160Appendix C. Multipath-usage.txt File for Red Hat Enterprise Linux 4Update 3priority path group. Other options for multipathd are to (a) waitfor a u

Strany 87

Appendix C. Multipath-usage.txt File for Red Hat Enterprise Linux 4Update 3 161For some conditions, that may not be sufficient. If DM-MP ismultipathin

Strany 88

162Appendix C. Multipath-usage.txt File for Red Hat Enterprise Linux 4Update 3"devnode_blacklist", and "devices" sections of theco

Strany 89

Appendix C. Multipath-usage.txt File for Red Hat Enterprise Linux 4Update 3 163DM-MP cannot be run on either the root or boot device.Other Sources of

Strany 90

2 Chapter 1. Red Hat Cluster Manager OverviewIn addition, you can cleanly stop the cluster services running on a cluster system and thenrestart them o

Strany 91

164Appendix C. Multipath-usage.txt File for Red Hat Enterprise Linux 4Update 3

Strany 92

IndexSymbols/etc/hostsediting, 23/etc/sysconfig/ha/lvs.cf file, 96Aactivating your subscription, viactive router(see LVS clustering)Apache HTTP Serverht

Strany 93 - Chapter 5

166Beowulf, 83definition of, 83high-availability clustering, 83(see also Red Hat Cluster Manager)definition of, 83load-balance clustering, 83(see also L

Strany 94

167IinstallationRed Hat Enterprise Linux, 22installing basic cluster hardware, 19installing the basic cluster hardware, 19introduction, ihow to use th

Strany 95 - </Directory>

168Nnanny daemon, 96NATenabling, 106routing methods, LVS, 91network address translation(see NAT)network hardware table, 16network hub, 13network switc

Strany 96

169Sscheduling, job (LVS), 89SCSI bus length, 144SCSI bus termination, 144SCSI configuration requirements, 143SCSI identification numbers, 145SCSI stora

Strany 98

ColophonThe manuals are written in DocBook SGML v4.1 format. The HTML and PDF formats areproduced using custom DSSSL stylesheets and custom jade wrapp

Strany 99 - Chapter 6

172Runa Bhattacharjee — Bengali translationsChester Cheng — Traditional Chinese translationsVerena Fuehrer — German translationsKiyoto Hashida — Japan

Strany 100 - 6.2. Basic Configurations

Chapter 1. Red Hat Cluster Manager Overview 3network-accessible database cluster service is usually assigned an IP address, whichis failed over along

Strany 101 - Chapter 7

Red Hat Cluster Suite: Configuring and Managing a ClusterCopyright © 2000-2006 Red Hat, Inc.Mission Critical Linux, Inc.K.M. SorensonRed Hat, Inc.1801

Strany 102

4 Chapter 1. Red Hat Cluster Manager Overviewmaintain application availability and data integrity. For example, if a node completelyfails, a healthy n

Strany 103

Chapter 1. Red Hat Cluster Manager Overview 5SoftwareSubsystemComponents DescriptionClusterConfiguration Toolsystem-config-cluster Command used to mana

Strany 104

6 Chapter 1. Red Hat Cluster Manager OverviewSoftwareSubsystemComponents Descriptionfence_bullpap Fence agent for Bull NovascalePlatform Administratio

Strany 105 - 7.3. LVS Scheduling Overview

Chapter 1. Red Hat Cluster Manager Overview 7SoftwareSubsystemComponents Descriptionfence_wti Fence agent for WTI power switch.fenced The fence daemon

Strany 106

8 Chapter 1. Red Hat Cluster Manager Overview

Strany 107 - 7.4. Routing Methods

Chapter 2.Hardware Installation and OperatingSystem ConfigurationTo set up the hardware configuration and install Red Hat Enterprise Linux, follow these

Strany 108 - 7.4.1. NAT Routing

10 Chapter 2. Hardware Installation and Operating System ConfigurationPerformance requirements of applications and usersChoose a hardware configuration

Strany 109 - 7.5.1. Persistence

Chapter 2. Hardware Installation and Operating System Configuration 11WarningThe minimum cluster configuration is not a supported solution and should no

Strany 110 - 7.5.2. Firewall Marks

12 Chapter 2. Hardware Installation and Operating System ConfigurationTable 2-2. Improving Availability and Data IntegrityFigure 2-1 illustrates a hard

Strany 111 - 7.6.1.2. lvs

Chapter 2. Hardware Installation and Operating System Configuration 13• Network power switches to enable each node to power-cycle the other nodes durin

Strany 112 - 7.6.1.7. send_arp

Table of ContentsIntroduction...

Strany 113 - Chapter 8

14 Chapter 2. Hardware Installation and Operating System Configurationswitch or network hub, which enables the connection of the nodes to a network. A

Strany 114 - /usr/sbin/piranha-passwd

Chapter 2. Hardware Installation and Operating System Configuration 15Hardware Quantity Description RequiredClusternodes16(maximumsupported)Each node m

Strany 115

16 Chapter 2. Hardware Installation and Operating System Configurationtables.Hardware Quantity Description RequiredNetworkinterfaceOne for eachnetworkc

Strany 116

Chapter 2. Hardware Installation and Operating System Configuration 17Hardware Quantity Description RequiredExternaldisk storageenclosureAt least one U

Strany 117

18 Chapter 2. Hardware Installation and Operating System ConfigurationHardware Quantity Description RequiredFibreChannelcableAs requiredby hardwareconfi

Strany 118

Chapter 2. Hardware Installation and Operating System Configuration 19connect the nodes to the optional console switch and network switch or hub. Follo

Strany 119 - Chapter 9

20 Chapter 2. Hardware Installation and Operating System ConfigurationCluster Hardware Component SerialPortsEthernetPortsPCISlotsPoint-to-point Etherne

Strany 120

Chapter 2. Hardware Installation and Operating System Configuration 21cluster nodes (for example, boot and system partitions, and other file systems tha

Strany 121 - GATEWAY= line, the

22 Chapter 2. Hardware Installation and Operating System Configuration2.3.4. Setting Up a Network Switch or HubA network switch or hub, although not re

Strany 122 - ONBOOT=no in their network

Chapter 2. Hardware Installation and Operating System Configuration 233. When using a terminal server, configure Red Hat Enterprise Linux to send consol

Strany 123 - /sbin/ifdown ethN

5.2. Configuring Shared Storage ...775.3. Installing and Configuring the Apache HTTP Server

Strany 124 - /sbin/service iptables status

24 Chapter 2. Hardware Installation and Operating System ConfigurationThe following is an example of an /etc/hosts file on a node of a cluster that does

Strany 125 - 9.4. FTP In an LVS Cluster

Chapter 2. Hardware Installation and Operating System Configuration 252.4.2. Decreasing the Kernel Boot Timeout LimitIt is possible to reduce the boot

Strany 126

26 Chapter 2. Hardware Installation and Operating System ConfigurationMay 22 14:02:11 storage3 kernel: Vendor: SEAGATE Model: ST318203LC Rev: 0001May 2

Strany 127 - /etc/vsftpd.conf

Chapter 2. Hardware Installation and Operating System Configuration 277 vcs10 misc13 input14 sound29 fb89 i2c116 alsa128 ptm136 pts171 ieee1394180 usb2

Strany 128 - 1024:65535

28 Chapter 2. Hardware Installation and Operating System Configuration2.5. Setting Up and Connecting the Cluster HardwareAfter installing Red Hat Enter

Strany 129 - /sbin/service command, see

Chapter 2. Hardware Installation and Operating System Configuration 296. Set up the bonded Ethernet channels, if applicable. Refer toSection 2.5.1 Confi

Strany 130

30 Chapter 2. Hardware Installation and Operating System ConfigurationNETMASK=255.255.255.0GATEWAY=192.168.1.1IPADDR=192.168.1.104. Reboot the system f

Strany 131 - Chapter 10

Chapter 2. Hardware Installation and Operating System Configuration 312.5.3. Configuring UPS SystemsUninterruptible power supplies (UPS) provide a highl

Strany 132 - 10.3. CONTROL/MONITORING

32 Chapter 2. Hardware Installation and Operating System ConfigurationFigure 2-3. Single UPS System ConfigurationMany vendor-supplied UPS systems includ

Strany 133

Chapter 2. Hardware Installation and Operating System Configuration 33beginning of the given range. The following example shows how to create two parti

Strany 135

34 Chapter 2. Hardware Installation and Operating System Configuration6 998.872 2001.952 logical• A partition may be removed using parted’s rm command.

Strany 136 - 10.5. REDUNDANCY

Chapter 3.Installing and Configuring Red Hat ClusterSuite SoftwareThis chapter describes how to install and configure Red Hat Cluster Suite software and

Strany 137 - Redundant server public IP

36 Chapter 3. Installing and Configuring Red Hat Cluster Suite Software5. Creating cluster members. Refer to Section 3.7 Adding and Deleting Members.6.

Strany 138 - 10.6. VIRTUAL SERVERS

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 37Figure 3-1. Cluster Configuration ToolThe Cluster Configuration Tool uses a hierar

Strany 139

38 Chapter 3. Installing and Configuring Red Hat Cluster Suite Software• Managed Resources — Defines failover domains, resources, and services.• Failove

Strany 140

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 39Figure 3-2. Cluster Configuration Structure3.3. Installing the Red Hat Cluster Su

Strany 141

40 Chapter 3. Installing and Configuring Red Hat Cluster Suite SoftwareTo automatically install RPMs, follow these steps at each node:1. Log on as the

Strany 142

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 41Figure 3-3. Starting a New Configuration FileNoteThe Cluster Management tab for t

Strany 143

42 Chapter 3. Installing and Configuring Red Hat Cluster Suite Software2. Starting the Cluster Configuration Tool displays a graphical representationof

Strany 144

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 433. At the Name text box, specify a name for the cluster. The name should be desc

Strany 146

44 Chapter 3. Installing and Configuring Red Hat Cluster Suite SoftwareTo configure fence devices, follow these steps:1. Click Fence Devices. At the bot

Strany 147

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 45Field DescriptionName A name for the Brocade device connected to the cluster.IP

Strany 148 - • \t for tab

46 Chapter 3. Installing and Configuring Red Hat Cluster Suite SoftwareField DescriptionName A name for the GNBD device used to fence the cluster. Note

Strany 149 - 10.7.1. Synchronizing lvs.cf

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 47Field DescriptionIP Address The IP address assigned to the IPMI port.Login The l

Strany 150 - 10.7.2. Synchronizing sysctl

48 Chapter 3. Installing and Configuring Red Hat Cluster Suite SoftwareField DescriptionName A name for the SANBox2 device connected to the cluster.IP

Strany 151 - 10.8. Starting the Cluster

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 493.7.1. Adding a Member to a ClusterTo add a member to a new cluster, follow thes

Strany 152

50 Chapter 3. Installing and Configuring Red Hat Cluster Suite SoftwareNoteThe node on which you are running the Cluster Configuration Tool must be expl

Strany 153 - III. Appendixes

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 518. Choose File => Save to save the changes to the cluster configuration.3.7.2.

Strany 154

52 Chapter 3. Installing and Configuring Red Hat Cluster Suite Software6. Start cluster software on all cluster nodes (including the added one) by runn

Strany 155 - Appendix A

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 535. Start the Red Hat Cluster Suite management GUI. At the Cluster ConfigurationTo

Strany 156

IntroductionThe Red Hat Cluster Suite is a collection of technologies working together to providedata integrity and the ability to maintain applicatio

Strany 157

54 Chapter 3. Installing and Configuring Red Hat Cluster Suite Softwared. At that dialog box, click Yes to confirm deletion.e. Propagate the updated con

Strany 158

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 55• Unrestricted — Allows you to specify that a subset of members are preferred, b

Strany 159

56 Chapter 3. Installing and Configuring Red Hat Cluster Suite Software2. At the bottom of the right frame (labeled Properties), click the Create a Fai

Strany 160 - A.3.3. SCSI Bus Length

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 57Figure 3-11. Failover Domain Configuration: Adjusting Priorityb. For each node th

Strany 161

58 Chapter 3. Installing and Configuring Red Hat Cluster Suite Software3.8.2. Removing a Failover DomainTo remove a failover domain, follow these steps

Strany 162

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 595. At the Cluster Configuration Tool, perform one of the following actions depend

Strany 163 - Appendix B

60 Chapter 3. Installing and Configuring Red Hat Cluster Suite SoftwareFile System Type — Choose the file system for the resource using the drop-down me

Strany 164

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 61NFS ClientName — Enter a name for the NFS client resource.Target — Enter a targe

Strany 165 - Hat GFS

62 Chapter 3. Installing and Configuring Red Hat Cluster Suite Software3.10. Adding a Cluster Service to the ClusterTo add a cluster service to the clu

Strany 166 - • Table B-3 — For Red Hat GFS

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 636. Run Exclusive checkbox — This sets a policy wherein the service only runs onn

Strany 167

ii Introduction• Chapter 2 Hardware Installation and Operating System Configuration• Chapter 3 Installing and Configuring Red Hat Cluster Suite Software

Strany 168

64 Chapter 3. Installing and Configuring Red Hat Cluster Suite SoftwareNoteTo verify the existence of the IP service resource used in a cluster service

Strany 169

Chapter 3. Installing and Configuring Red Hat Cluster Suite Software 651. service ccsd start2. service lock_gulmd start or service cman start according

Strany 170

66 Chapter 3. Installing and Configuring Red Hat Cluster Suite Software

Strany 171 - /mnt/cdrom/RedHat/RPMS/

Chapter 4.Cluster AdministrationThis chapter describes the various administrative tasks for maintaining a cluster after it hasbeen installed and config

Strany 172

68 Chapter 4. Cluster AdministrationFigure 4-1. Cluster Status Tool4.2. Displaying Cluster and Service StatusMonitoring cluster and application servic

Strany 173 - Appendix C

Chapter 4. Cluster Administration 69Cluster and service status includes the following information:• Cluster member system status• Service status and w

Strany 174 - Update 3

70 Chapter 4. Cluster AdministrationService Status DescriptionStarted The service resources are configured and available on the clustersystem that owns

Strany 175 - Update 3 159

Chapter 4. Cluster Administration 71To monitor the cluster and display status at specific time intervals from a shell prompt,invoke clustat with the -i

Strany 176

72 Chapter 4. Cluster AdministrationWarningDo not manually edit the contents of the /etc/cluster/cluster.conf file without guid-ance from an authorized

Strany 177 - Update 3 161

Chapter 4. Cluster Administration 734.5. Backing Up and Restoring the Cluster DatabaseThe Cluster Configuration Tool automatically retains backup copie

Strany 178

Introduction iiiThe .bashrc file in your home directory contains bash shell definitions and aliasesfor your own use.The /etc/fstab file contains informat

Strany 179 - Update 3 163

74 Chapter 4. Cluster AdministrationNoteThe Cluster Configuration Tool does not display the Send to Clusterbutton if the cluster is new and has not bee

Strany 180

Chapter 4. Cluster Administration 75chkconfig --level 2345 fenced offchkconfig --level 2345 lock_gulmd offchkconfig --level 2345 cman offchkconfig --l

Strany 181

76 Chapter 4. Cluster Administration

Strany 182

Chapter 5.Setting Up Apache HTTP ServerThis chapter contains instructions for configuring Red Hat Enterprise Linux to make theApache HTTP Server highly

Strany 183

78 Chapter 5. Setting Up Apache HTTP Server5.2. Configuring Shared StorageTo set up the shared file system resource, perform the following tasks as root

Strany 184

Chapter 5. Setting Up Apache HTTP Server 79• Specify a unique IP address to which the service will listen for requests. For ex-ample:Listen 192.168.1.

Strany 185

80 Chapter 5. Setting Up Apache HTTP Server2. Add a device for the Apache HTTP Server content files and/or custom scripts.• Click Create a Resource.• I

Strany 186

II. Configuring a Linux Virtual Server ClusterBuilding a Linux Virtual Server (LVS) system offers highly-available and scalable solutionfor production

Strany 188

Chapter 6.Introduction to Linux Virtual ServerUsing Red Hat Enterprise Linux, it is possible to create highly available server clusteringsolutions abl

Komentáře k této Příručce

Žádné komentáře