SUSE Linux Enterprise High Availability Extension High Availability Guide PDF

Title SUSE Linux Enterprise High Availability Extension High Availability Guide
Author Jairo Argueta
Pages 410
File Size 3.3 MB
File Type PDF
Total Downloads 773
Total Views 854

Summary

SUSE Linux Enterprise High Availability Extension 11 SP4 www.suse.com November 20, 2018 High Availability Guide High Availability Guide List of Authors: Tanja Roth, Thomas Schraitle Copyright © 2006–2018 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or...


Description

SUSE Linux Enterprise High Availability Extension 11 SP4 November 20, 2018

www.suse.com High Availability Guide

High Availability Guide List of Authors: Tanja Roth, Thomas Schraitle Copyright © 2006–2018 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE or Novell trademarks, see the Novell Trademark and Service Mark list http://www .novell.com/company/legal/trademarks/tmlist.html. All other third party trademarks are the property of their respective owners. A trademark symbol (®, ™ etc.) denotes a SUSE or Novell trademark; an asterisk (*) denotes a third party trademark. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof.

Contents About This Guide

xi

1 Feedback ............................................................................................. xii 2 Documentation Conventions ................................................................. xiii 3 About the Making of This Manual ......................................................... xiii

I Installation and Setup

1

1 Product Overview

3

1.1 Availability as Add-On/Extension .......................................................... 3 1.2 Key Features ....................................................................................... 4 1.3 Benefits .............................................................................................. 7 1.4 Cluster Configurations: Storage ........................................................... 11 1.5 Architecture ...................................................................................... 14

2 System Requirements and Recommendations

19

2.1 Hardware Requirements ...................................................................... 19 2.2 Software Requirements ....................................................................... 20 2.3 Storage Requirements ......................................................................... 20 2.4 Other Requirements and Recommendations ........................................... 21

3 Installation and Basic Setup

25

3.1 Definition of Terms ............................................................................ 25 3.2 Overview .......................................................................................... 28

3.3 Installation as Add-on ......................................................................... 29 3.4 Automatic Cluster Setup (sleha-bootstrap) ............................................. 30 3.5 Manual Cluster Setup (YaST) .............................................................. 35 3.6 Mass Deployment with AutoYaST ........................................................ 50

II Configuration and Administration

53

4 Configuration and Administration Basics

55

4.1 Global Cluster Options ....................................................................... 55 4.2 Cluster Resources ............................................................................... 58 4.3 Resource Monitoring .......................................................................... 74 4.4 Resource Constraints .......................................................................... 76 4.5 Managing Services on Remote Hosts .................................................... 86 4.6 Monitoring System Health ................................................................... 90 4.7 Maintenance Mode ............................................................................. 91 4.8 For More Information ......................................................................... 93

5 Configuring and Managing Cluster Resources (Web Interface)

95

5.1 Hawk—Overview .............................................................................. 95 5.2 Configuring Global Cluster Options .................................................... 102 5.3 Configuring Cluster Resources ........................................................... 103 5.4 Managing Cluster Resources .............................................................. 124 5.5 Monitoring Multiple Clusters ............................................................. 138 5.6 Hawk for Geo Clusters ...................................................................... 141 5.7 Troubleshooting ............................................................................... 141

6 Configuring and Managing Cluster Resources (GUI)

143

6.1 Pacemaker GUI—Overview .............................................................. 144 6.2 Configuring Global Cluster Options .................................................... 147

6.3 Configuring Cluster Resources ........................................................... 148 6.4 Managing Cluster Resources .............................................................. 170

7 Configuring and Managing Cluster Resources (Command Line) 177 7.1 crmsh—Overview ............................................................................ 178 7.2 Configuring Global Cluster Options .................................................... 186 7.3 Configuring Cluster Resources ........................................................... 187 7.4 Managing Cluster Resources .............................................................. 199 7.5 Setting Passwords Independent of cib.xml ....................................... 204 7.6 Retrieving History Information .......................................................... 204 7.7 For More Information ....................................................................... 206

8 Adding or Modifying Resource Agents

207

8.1 STONITH Agents ............................................................................ 207 8.2 Writing OCF Resource Agents ........................................................... 208 8.3 OCF Return Codes and Failure Recovery ............................................ 209

9 Fencing and STONITH

213

9.1 Classes of Fencing ............................................................................ 213 9.2 Node Level Fencing .......................................................................... 214 9.3 STONITH Resources and Configuration .............................................. 216 9.4 Monitoring Fencing Devices .............................................................. 220 9.5 Special Fencing Devices .................................................................... 220 9.6 Basic Recommendations .................................................................... 222 9.7 For More Information ....................................................................... 223

10 Access Control Lists

225

10.1 Requirements and Prerequisites ........................................................ 226 10.2 Enabling Use of ACLs In Your Cluster .............................................. 226

10.3 The Basics of ACLs ........................................................................ 227 10.4 Configuring ACLs with the Pacemaker GUI ....................................... 230 10.5 Configuring ACLs with Hawk .......................................................... 232 10.6 Configuring ACLs with crmsh .......................................................... 234

11 Network Device Bonding

237

11.1 Configuring Bonding Devices with YaST ........................................... 237 11.2 Hotplugging of Bonding Slaves ........................................................ 240 11.3 For More Information ...................................................................... 242

12 Load Balancing with Linux Virtual Server

243

12.1 Conceptual Overview ...................................................................... 243 12.2 Configuring IP Load Balancing with YaST ........................................ 246 12.3 Further Setup ................................................................................. 251 12.4 For More Information ...................................................................... 252

13 Geo Clusters (Multi-Site Clusters)

III Storage and Data Replication 14 OCFS2

253

255 257

14.1 Features and Benefits ...................................................................... 257 14.2 OCFS2 Packages and Management Utilities ....................................... 258 14.3 Configuring OCFS2 Services and a STONITH Resource ..................... 259 14.4 Creating OCFS2 Volumes ................................................................ 261 14.5 Mounting OCFS2 Volumes .............................................................. 264 14.6 Using Quotas on OCFS2 File Systems ............................................... 266 14.7 For More Information ...................................................................... 266

15 DRBD

267

15.1 Conceptual Overview ...................................................................... 267 15.2 Installing DRBD Services ................................................................ 269 15.3 Configuring the DRBD Service ........................................................ 270 15.4 Testing the DRBD Service ............................................................... 276 15.5 Tuning DRBD ................................................................................ 278 15.6 Troubleshooting DRBD ................................................................... 279 15.7 For More Information ...................................................................... 281

16 Cluster Logical Volume Manager (cLVM)

283

16.1 Conceptual Overview ...................................................................... 283 16.2 Configuration of cLVM ................................................................... 284 16.3 Configuring Eligible LVM2 Devices Explicitly ................................... 295 16.4 For More Information ...................................................................... 296

17 Storage Protection

297

17.1 Storage-based Fencing .................................................................... 298 17.2 Ensuring Exclusive Storage Activation .............................................. 306 17.3 For More Information ...................................................................... 308

18 Samba Clustering

309

18.1 Conceptual Overview ...................................................................... 309 18.2 Basic Configuration ........................................................................ 311 18.3 Joining an Active Directory Domain ................................................. 313 18.4 Debugging and Testing Clustered Samba ........................................... 315 18.5 For More Information ...................................................................... 317

19 Disaster Recovery with Rear

319

19.1 Conceptual Overview ...................................................................... 319 19.2 Setting Up Rear and Your Backup Solution ........................................ 323

19.3 Creating the Recovery Installation System ......................................... 325 19.4 Testing the Recovery Process ........................................................... 326 19.5 Recovering from Disaster ................................................................ 327 19.6 For More Information ...................................................................... 327

IV Appendix 20 Troubleshooting

329 331

20.1 Installation and First Steps ............................................................... 331 20.2 Logging ......................................................................................... 332 20.3 Resources ...................................................................................... 336 20.4 STONITH and Fencing ................................................................... 337 20.5 Miscellaneous ................................................................................ 338 20.6 For More Information ...................................................................... 341

A Naming Conventions

343

B Example of Setting Up a Simple Testing Resource

345

B.1 Configuring a Resource with the GUI ................................................. 345 B.2 Configuring a Resource Manually ...................................................... 347

C Example Configuration for OCFS2 and cLVM

349

D Cluster Management Tools

351

E Upgrading Your Cluster and Updating Software Packages 355 E.1 Terminology .................................................................................... 355 E.2 Upgrading your Cluster to the Latest Product Version ........................... 356 E.3 Updating Software Packages on Cluster Nodes .................................... 364 E.4 For More Information ....................................................................... 365

F What's New?

367

F.1 Version 10 SP3 to Version 11 ............................................................. 367 F.2 Version 11 to Version 11 SP1 ............................................................. 371 F.3 Version 11 SP1 to Version 11 SP2 ....................................................... 373 F.4 Version 11 SP2 to Version 11 SP3 ....................................................... 376 F.5 Version 11 SP3 to Version 11 SP4 ....................................................... 378

Terminology

................................................................ 383

G GNU Licenses

391

G.1 GNU Free Documentation License ..................................................... 391

About This Guide SUSE® Linux Enterprise High Availability Extension is an integrated suite of open source clustering technologies that enables you to implement highly available physical and virtual Linux clusters. For quick and efficient configuration and administration, the High Availability Extension includes both a graphical user interface (GUI) and a command line interface (CLI). Additionally, it comes with the HA Web Konsole (Hawk), allowing you to administer your Linux cluster also via a Web interface. This guide is intended for administrators who need to set up, configure, and maintain High Availability (HA) clusters. Both approaches (GUI and CLI) are covered in detail to help the administrators choose the appropriate tool that matches their needs for performing the key tasks. This guide is divided into the following parts: Installation and Setup Before starting to install and configure your cluster, make yourself familiar with cluster fundamentals and architecture, get an overview of the key features and benefits. Learn which hardware and software requirements must be met and what preparations to take before executing the next steps. Perform the installation and basic setup of your HA cluster using YaST. Configuration and Administration Add, configure and manage cluster resources, using either the graphical user interface (Pacemaker GUI), the Web interface (HA Web Konsole), or the command line interface (crm shell). To avoid unauthorized access to the cluster configuration, define roles and assign them to certain users for fine-grained control. Learn how to make use of load balancing and fencing. In case you consider writing your own resource agents or modifying existing ones, get some background information on how to create different types of resource agents. Storage and Data Replication SUSE Linux Enterprise High Availability Extension ships with a cluster-aware file system and volume manager: OCFS2 and the clustered Logical Volume Manager (cLVM). For replication of your data, use DRBD* to mirror the data of a High Availability service from the active node of a cluster to its standby node. Further-

more, a clustered Samba server also provides a High Availability solution for heterogeneous environments. Appendix Lists the new features and behavior changes of the High Availability Extension since the last release. Learn how to migrate your cluster to the most recent release version and find an example of setting up a simple testing resource. Many chapters in this manual contain links to additional documentation resources. These include additional documentation that is available on the system as well as documentation available on the Internet. For an overview of the documentation available for your product and the latest documentation updates, refer to http://www.suse.com/doc/.

1 Feedback Several feedback channels are available: Bugs and Enhancement Requests For services and support options available for your product, refer to http://www .suse.com/support/. To report bugs for a product component, log into the Novell Customer Center from http://www.suse.com/support/ and select My Support > Service Request. User Comments We want to hear your comments about and suggestions for this manual and the other documentation included with this product. Use the User Comments feature at the bottom of each page in the online documentation or go to http://www .suse.com/doc/feedback.html and enter your comments there. Mail For feedback on the documentation of this product, you can also send a mail to [email protected]. Make sure to include the document title, the product ver-

xii

High Availability Guide

sion, and the publication date of the documentation. To report errors or suggest enhancements, provide a concise description of the problem and refer to the respective section number and page (or URL).

2 Documentation Conventions The following typographical conventions are used in this manual: • /etc/passwd: directory names and filenames • placeholder: replace placeholder with the actual value • PATH: the environment variable PATH • ls, --help: commands, options, and parameters • user: users or groups • Alt, Alt + F1: a key to press or a key combination; keys are shown in uppercase as on a keyboard • File, File > Save As: menu items, buttons • ►amd64 em64t: This paragraph is only relevant for the architectures amd64, em64t, and ipf. The arrows mark the beginning and the end of the text block. ◄ • Dancing Penguins (Chapter Penguins, ↑Another Manual): This is a reference to a chapter in another manual.

3 About the Making of This Manual This book is written in Novdoc, a subset of DocBook (see http://www.docbook .org). The XML source files were validated by xmllint, processed by xsltproc, and converted into XSL-FO using a customized version of Norman Walsh's stylesheets. The final PDF is formatted through XEP from RenderX.

About This Guide

xiii

Part I. Installation and Setup

Product Overview SUSE® Linux Enterprise High Availability Extension is an integrated suite of open source clustering technologies that enables you to implement highly available physical and virtual Linux clusters, and to eliminate single points of failure. It ensures the high availability and managea...


Similar Free PDFs