Jump to contentJump to page navigation: previous page [access key p]/next page [access key n]
SUSE Linux Enterprise High Availability Extension 15

Administration Guide

This guide is intended for administrators who need to set up, configure, and maintain clusters with SUSE® Linux Enterprise High Availability Extension. For quick and efficient configuration and administration, the product includes both a graphical user interface and a command line interface (CLI). For performing key tasks, both approaches are covered in this guide. Thus, you can choose the appropriate tool that matches your needs.

Authors: Tanja Roth and Thomas Schraitle
Publication Date: July 04, 2021
About This Guide
Available Documentation
Feedback
Documentation Conventions
About the Making of This Documentation
I Installation, Setup and Upgrade
1 Product Overview
1.1 Availability as Extension
1.2 Key Features
1.3 Benefits
1.4 Cluster Configurations: Storage
1.5 Architecture
2 System Requirements and Recommendations
2.1 Hardware Requirements
2.2 Software Requirements
2.3 Storage Requirements
2.4 Other Requirements and Recommendations
3 Installing the High Availability Extension
3.1 Manual Installation
3.2 Mass Installation and Deployment with AutoYaST
4 Using the YaST Cluster Module
4.1 Definition of Terms
4.2 YaST Cluster Module
4.3 Defining the Communication Channels
4.4 Defining Authentication Settings
4.5 Transferring the Configuration to All Nodes
4.6 Synchronizing Connection Status Between Cluster Nodes
4.7 Configuring Services
4.8 Bringing the Cluster Online
5 Upgrading Your Cluster and Updating Software Packages
5.1 Terminology
5.2 Upgrading your Cluster to the Latest Product Version
5.3 Updating Software Packages on Cluster Nodes
5.4 For More Information
II Configuration and Administration
6 Configuration and Administration Basics
6.1 Use Case Scenarios
6.2 Quorum Determination
6.3 Cluster Resources
6.4 Resource Monitoring
6.5 Resource Constraints
6.6 Managing Services on Remote Hosts
6.7 Monitoring System Health
6.8 For More Information
7 Configuring and Managing Cluster Resources with Hawk2
7.1 Hawk2 Requirements
7.2 Logging In
7.3 Hawk2 Overview: Main Elements
7.4 Configuring Global Cluster Options
7.5 Configuring Cluster Resources
7.6 Configuring Constraints
7.7 Managing Cluster Resources
7.8 Monitoring Clusters
7.9 Using the Batch Mode
7.10 Viewing the Cluster History
7.11 Verifying Cluster Health
8 Configuring and Managing Cluster Resources (Command Line)
8.1 crmsh—Overview
8.2 Managing Corosync Configuration
8.3 Configuring Cluster Resources
8.4 Managing Cluster Resources
8.5 Setting Passwords Independent of cib.xml
8.6 Retrieving History Information
8.7 For More Information
9 Adding or Modifying Resource Agents
9.1 STONITH Agents
9.2 Writing OCF Resource Agents
9.3 OCF Return Codes and Failure Recovery
10 Fencing and STONITH
10.1 Classes of Fencing
10.2 Node Level Fencing
10.3 STONITH Resources and Configuration
10.4 Monitoring Fencing Devices
10.5 Special Fencing Devices
10.6 Basic Recommendations
10.7 For More Information
11 Storage Protection and SBD
11.1 Conceptual Overview
11.2 Overview of Manually Setting Up SBD
11.3 Requirements
11.4 Number of SBD Devices
11.5 Calculation of Timeouts
11.6 Setting Up the Watchdog
11.7 Setting Up SBD with Devices
11.8 Setting Up Diskless SBD
11.9 Testing SBD and Fencing
11.10 Additional Mechanisms for Storage Protection
11.11 For More Information
12 Access Control Lists
12.1 Requirements and Prerequisites
12.2 Enabling Use of ACLs in Your Cluster
12.3 The Basics of ACLs
12.4 Configuring ACLs with Hawk2
12.5 Configuring ACLs with crmsh
13 Network Device Bonding
13.1 Configuring Bonding Devices with YaST
13.2 Hotplugging of Bonding Slaves
13.3 For More Information
14 Load Balancing
14.1 Conceptual Overview
14.2 Configuring Load Balancing with Linux Virtual Server
14.3 Configuring Load Balancing with HAProxy
14.4 For More Information
15 Geo Clusters (Multi-Site Clusters)
III Storage and Data Replication
16 OCFS2
16.1 Features and Benefits
16.2 OCFS2 Packages and Management Utilities
16.3 Configuring OCFS2 Services and a STONITH Resource
16.4 Creating OCFS2 Volumes
16.5 Mounting OCFS2 Volumes
16.6 Configuring OCFS2 Resources With Hawk2
16.7 Using Quotas on OCFS2 File Systems
16.8 For More Information
17 GFS2
17.1 GFS2 Packages and Management Utilities
17.2 Configuring GFS2 Services and a STONITH Resource
17.3 Creating GFS2 Volumes
17.4 Mounting GFS2 Volumes
18 DRBD
18.1 Conceptual Overview
18.2 Installing DRBD Services
18.3 Setting Up DRBD Service
18.4 Migrating from DRBD 8 to DRBD 9
18.5 Creating a Stacked DRBD Device
18.6 Testing the DRBD Service
18.7 Monitoring DRBD Devices
18.8 Tuning DRBD
18.9 Troubleshooting DRBD
18.10 For More Information
19 Cluster Logical Volume Manager (Cluster LVM)
19.1 Conceptual Overview
19.2 Configuration of Cluster LVM
19.3 Configuring Eligible LVM2 Devices Explicitly
19.4 Migrating a Mirror LV to Cluster MD
19.5 For More Information
20 Cluster Multi-device (Cluster MD)
20.1 Conceptual Overview
20.2 Creating a Clustered MD RAID Device
20.3 Configuring a Resource Agent
20.4 Adding a Device
20.5 Re-adding a Temporarily Failed Device
20.6 Removing a Device
21 Samba Clustering
21.1 Conceptual Overview
21.2 Basic Configuration
21.3 Joining an Active Directory Domain
21.4 Debugging and Testing Clustered Samba
21.5 For More Information
22 Disaster Recovery with Rear (Relax-and-Recover)
22.1 Conceptual Overview
22.2 Setting Up Rear and Your Backup Solution
22.3 Creating the Recovery Installation System
22.4 Testing the Recovery Process
22.5 Recovering from Disaster
22.6 For More Information
IV Appendix
A Troubleshooting
A.1 Installation and First Steps
A.2 Logging
A.3 Resources
A.4 STONITH and Fencing
A.5 History
A.6 Hawk2
A.7 Miscellaneous
A.8 For More Information
B Naming Conventions
C Cluster Management Tools (Command Line)
D Running Cluster Reports Without root Access
D.1 Creating a Local User Account
D.2 Configuring a Passwordless SSH Account
D.3 Configuring sudo
D.4 Generating a Cluster Report
Glossary
E GNU Licenses
E.1 GNU Free Documentation License

Copyright © 2006–2021 SUSE LLC and contributors. All rights reserved.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled GNU Free Documentation License.

For SUSE trademarks, see http://www.suse.com/company/legal/. All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its affiliates. Asterisks (*) denote third-party trademarks.

All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof.

Print this page