Jump to contentJump to page navigation: previous page [access key p]/next page [access key n]
SUSE Linux Enterprise High Availability Extension 11 SP4

High Availability Guide

Authors: Tanja Roth and Thomas Schraitle
Publication Date: September 24, 2021
About This Guide
Feedback
Documentation Conventions
About the Making of This Manual
I Installation and Setup
1 Product Overview
1.1 Availability as Add-On/Extension
1.2 Key Features
1.3 Benefits
1.4 Cluster Configurations: Storage
1.5 Architecture
2 System Requirements and Recommendations
2.1 Hardware Requirements
2.2 Software Requirements
2.3 Storage Requirements
2.4 Other Requirements and Recommendations
3 Installation and Basic Setup
3.1 Definition of Terms
3.2 Overview
3.3 Installation as Add-on
3.4 Automatic Cluster Setup (sleha-bootstrap)
3.5 Manual Cluster Setup (YaST)
3.6 Mass Deployment with AutoYaST
II Configuration and Administration
4 Configuration and Administration Basics
4.1 Global Cluster Options
4.2 Cluster Resources
4.3 Resource Monitoring
4.4 Resource Constraints
4.5 Managing Services on Remote Hosts
4.6 Monitoring System Health
4.7 Maintenance Mode
4.8 For More Information
5 Configuring and Managing Cluster Resources (Web Interface)
5.1 Hawk—Overview
5.2 Configuring Global Cluster Options
5.3 Configuring Cluster Resources
5.4 Managing Cluster Resources
5.5 Monitoring Multiple Clusters
5.6 Hawk for Geo Clusters
5.7 Troubleshooting
6 Configuring and Managing Cluster Resources (GUI)
6.1 Pacemaker GUI—Overview
6.2 Configuring Global Cluster Options
6.3 Configuring Cluster Resources
6.4 Managing Cluster Resources
7 Configuring and Managing Cluster Resources (Command Line)
7.1 crmsh—Overview
7.2 Configuring Global Cluster Options
7.3 Configuring Cluster Resources
7.4 Managing Cluster Resources
7.5 Setting Passwords Independent of cib.xml
7.6 Retrieving History Information
7.7 For More Information
8 Adding or Modifying Resource Agents
8.1 STONITH Agents
8.2 Writing OCF Resource Agents
8.3 OCF Return Codes and Failure Recovery
9 Fencing and STONITH
9.1 Classes of Fencing
9.2 Node Level Fencing
9.3 STONITH Resources and Configuration
9.4 Monitoring Fencing Devices
9.5 Special Fencing Devices
9.6 Basic Recommendations
9.7 For More Information
10 Access Control Lists
10.1 Requirements and Prerequisites
10.2 Enabling Use of ACLs In Your Cluster
10.3 The Basics of ACLs
10.4 Configuring ACLs with the Pacemaker GUI
10.5 Configuring ACLs with Hawk
10.6 Configuring ACLs with crmsh
11 Network Device Bonding
11.1 Configuring Bonding Devices with YaST
11.2 Hotplugging of Bonding Slaves
11.3 For More Information
12 Load Balancing with Linux Virtual Server
12.1 Conceptual Overview
12.2 Configuring IP Load Balancing with YaST
12.3 Further Setup
12.4 For More Information
13 Geo Clusters (Multi-Site Clusters)
III Storage and Data Replication
14 OCFS2
14.1 Features and Benefits
14.2 OCFS2 Packages and Management Utilities
14.3 Configuring OCFS2 Services and a STONITH Resource
14.4 Creating OCFS2 Volumes
14.5 Mounting OCFS2 Volumes
14.6 Using Quotas on OCFS2 File Systems
14.7 For More Information
15 DRBD
15.1 Conceptual Overview
15.2 Installing DRBD Services
15.3 Configuring the DRBD Service
15.4 Testing the DRBD Service
15.5 Tuning DRBD
15.6 Troubleshooting DRBD
15.7 For More Information
16 Cluster Logical Volume Manager (cLVM)
16.1 Conceptual Overview
16.2 Configuration of cLVM
16.3 Configuring Eligible LVM2 Devices Explicitly
16.4 For More Information
17 Storage Protection
17.1 Storage-based Fencing
17.2 Ensuring Exclusive Storage Activation
17.3 For More Information
18 Samba Clustering
18.1 Conceptual Overview
18.2 Basic Configuration
18.3 Joining an Active Directory Domain
18.4 Debugging and Testing Clustered Samba
18.5 For More Information
19 Disaster Recovery with Rear
19.1 Conceptual Overview
19.2 Setting Up Rear and Your Backup Solution
19.3 Creating the Recovery Installation System
19.4 Testing the Recovery Process
19.5 Recovering from Disaster
19.6 For More Information
IV Appendix
20 Troubleshooting
20.1 Installation and First Steps
20.2 Logging
20.3 Resources
20.4 STONITH and Fencing
20.5 Miscellaneous
20.6 For More Information
A Naming Conventions
B Example of Setting Up a Simple Testing Resource
B.1 Configuring a Resource with the GUI
B.2 Configuring a Resource Manually
C Example Configuration for OCFS2 and cLVM
D Cluster Management Tools
E Upgrading Your Cluster and Updating Software Packages
E.1 Terminology
E.2 Upgrading your Cluster to the Latest Product Version
E.3 Updating Software Packages on Cluster Nodes
E.4 For More Information
F What's New?
F.1 Version 10 SP3 to Version 11
F.2 Version 11 to Version 11 SP1
F.3 Version 11 SP1 to Version 11 SP2
F.4 Version 11 SP2 to Version 11 SP3
F.5 Version 11 SP3 to Version 11 SP4
Terminology
G GNU Licenses
G.1 GNU Free Documentation License
List of Figures
1.1 Three-Server Cluster
1.2 Three-Server Cluster after One Server Fails
1.3 Typical Fibre Channel Cluster Configuration
1.4 Typical iSCSI Cluster Configuration
1.5 Typical Cluster Configuration Without Shared Storage
1.6 Architecture
3.1 YaST Cluster Module—Overview
3.2 YaST Cluster—Multicast Configuration
3.3 YaST Cluster—Unicast Configuration
3.4 YaST Cluster—Security
3.5 YaST Cluster—Csync2
3.6 YaST Cluster—conntrackd
3.7 YaST Cluster—Services
4.1 Group Resource
5.1 Hawk—Cluster Status (Summary View)
5.2 Hawk—Cluster Diagram
5.3 Hawk—Cluster Configuration
5.4 Hawk—Setup Wizard
5.5 Hawk—Primitive Resource
5.6 Hawk—Resource Template
5.7 Hawk—Location Constraint
5.8 Hawk—Colocation Constraint
5.9 Hawk—Viewing a Node's Capacity Values
5.10 Hawk—Resource Group
5.11 Hawk—Clone Resource
5.12 Viewing a Resource's Details
5.13 Hawk—History Report
5.14 Hawk History Report—Transition Graph
5.15 Hawk—Simulator with Injected Events
5.16 Hawk—Simulator in Final State
5.17 Hawk—Cluster Dashboard
6.1 Connecting to the Cluster
6.2 Pacemaker GUI - Main Window
6.3 Pacemaker GUI - Constraints
6.4 Example Configuration for Node Capacity
6.5 Example Configuration for Resource Capacity
6.6 Viewing a Resource's Failcount
6.7 Pacemaker GUI - Groups
6.8 Pacemaker GUI - Management
10.1 Hawk—Assigning a Role or Rule to a User
12.1 YaST IP Load Balancing—Global Parameters
12.2 YaST IP Load Balancing—Virtual Services
15.1 Position of DRBD within Linux
15.2 Resource Configuration
16.1 Setup of iSCSI with cLVM
18.1 Structure of a CTDB Cluster

Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled GNU Free Documentation License.

For SUSE or Novell trademarks, see the Novell Trademark and Service Mark list http://www.novell.com/company/legal/trademarks/tmlist.html. All other third party trademarks are the property of their respective owners. A trademark symbol (®, ™ etc.) denotes a SUSE or Novell trademark; an asterisk (*) denotes a third party trademark.

All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof.

Print this page