Jump to contentJump to page navigation: previous page [access key p]/next page [access key n]
SUSE Linux Enterprise High Availability Extension 12 SP5

Administration Guide

This guide is intended for administrators who need to set up, configure, and maintain clusters with SUSE® Linux Enterprise High Availability Extension. For quick and efficient configuration and administration, the High Availability Extension includes both a graphical user interface (GUI) and a command line interface (CLI). For performing key tasks, both approaches (GUI and CLI) are covered in detail in this guide. Thus, administrators can choose the appropriate tool that matches their needs.

Authors: Tanja Roth and Thomas Schraitle
Publication Date: September 10, 2021
About This Guide
Available Documentation
Giving Feedback
Documentation Conventions
Product Life Cycle and Support
I Installation, Setup and Upgrade
1 Product Overview
1.1 Availability as Extension
1.2 Key Features
1.3 Benefits
1.4 Cluster Configurations: Storage
1.5 Architecture
2 System Requirements and Recommendations
2.1 Hardware Requirements
2.2 Software Requirements
2.3 Storage Requirements
2.4 Other Requirements and Recommendations
3 Installing the High Availability Extension
3.1 Manual Installation
3.2 Mass Installation and Deployment with AutoYaST
4 Using the YaST Cluster Module
4.1 Definition of Terms
4.2 YaST Cluster Module
4.3 Defining the Communication Channels
4.4 Defining Authentication Settings
4.5 Transferring the Configuration to All Nodes
4.6 Synchronizing Connection Status Between Cluster Nodes
4.7 Configuring Services
4.8 Bringing the Cluster Online
5 Upgrading Your Cluster and Updating Software Packages
5.1 Terminology
5.2 Upgrading your Cluster to the Latest Product Version
5.3 Updating Software Packages on Cluster Nodes
5.4 For More Information
II Configuration and Administration
6 Configuration and Administration Basics
6.1 Use Case Scenarios
6.2 Quorum Determination
6.3 Cluster Resources
6.4 Resource Monitoring
6.5 Resource Constraints
6.6 Managing Services on Remote Hosts
6.7 Monitoring System Health
6.8 For More Information
7 Configuring and Managing Cluster Resources with Hawk2
7.1 Hawk2 Requirements
7.2 Logging In
7.3 Hawk2 Overview: Main Elements
7.4 Configuring Global Cluster Options
7.5 Configuring Cluster Resources
7.6 Configuring Constraints
7.7 Managing Cluster Resources
7.8 Monitoring Clusters
7.9 Using the Batch Mode
7.10 Viewing the Cluster History
7.11 Verifying Cluster Health
8 Configuring and Managing Cluster Resources (Command Line)
8.1 crmsh—Overview
8.2 Managing Corosync Configuration
8.3 Configuring Global Cluster Options
8.4 Configuring Cluster Resources
8.5 Managing Cluster Resources
8.6 Setting Passwords Independent of cib.xml
8.7 Retrieving History Information
8.8 For More Information
9 Adding or Modifying Resource Agents
9.1 STONITH Agents
9.2 Writing OCF Resource Agents
9.3 OCF Return Codes and Failure Recovery
10 Fencing and STONITH
10.1 Classes of Fencing
10.2 Node Level Fencing
10.3 STONITH Resources and Configuration
10.4 Monitoring Fencing Devices
10.5 Special Fencing Devices
10.6 Basic Recommendations
10.7 For More Information
11 Storage Protection and SBD
11.1 Conceptual Overview
11.2 Overview of Manually Setting Up SBD
11.3 Requirements
11.4 Number of SBD Devices
11.5 Calculation of Timeouts
11.6 Setting Up the Watchdog
11.7 Setting Up SBD with Devices
11.8 Setting Up Diskless SBD
11.9 Testing SBD and Fencing
11.10 Additional Mechanisms for Storage Protection
11.11 For More Information
12 Access Control Lists
12.1 Requirements and Prerequisites
12.2 Enabling Use of ACLs in Your Cluster
12.3 The Basics of ACLs
12.4 Configuring ACLs with Hawk2
12.5 Configuring ACLs with crmsh
13 Network Device Bonding
13.1 Configuring Bonding Devices with YaST
13.2 Hotplugging of Bonding Slaves
13.3 For More Information
14 Load Balancing
14.1 Conceptual Overview
14.2 Configuring Load Balancing with Linux Virtual Server
14.3 Configuring Load Balancing with HAProxy
14.4 For More Information
15 Geo Clusters (Multi-Site Clusters)
16 Executing Maintenance Tasks
16.1 Implications of Taking Down a Cluster Node
16.2 Different Options for Maintenance Tasks
16.3 Preparing and Finishing Maintenance Work
16.4 Putting the Cluster into Maintenance Mode
16.5 Putting a Node into Maintenance Mode
16.6 Putting a Node into Standby Mode
16.7 Putting a Resource into Maintenance Mode
16.8 Putting a Resource into Unmanaged Mode
16.9 Rebooting a Cluster Node While In Maintenance Mode
III Storage and Data Replication
17 Distributed Lock Manager (DLM)
17.1 Protocols for DLM Communication
17.2 Configuring DLM Cluster Resources
18 OCFS2
18.1 Features and Benefits
18.2 OCFS2 Packages and Management Utilities
18.3 Configuring OCFS2 Services and a STONITH Resource
18.4 Creating OCFS2 Volumes
18.5 Mounting OCFS2 Volumes
18.6 Configuring OCFS2 Resources With Hawk2
18.7 Using Quotas on OCFS2 File Systems
18.8 For More Information
19 GFS2
19.1 GFS2 Packages and Management Utilities
19.2 Configuring GFS2 Services and a STONITH Resource
19.3 Creating GFS2 Volumes
19.4 Mounting GFS2 Volumes
20 DRBD
20.1 Conceptual Overview
20.2 Installing DRBD Services
20.3 Setting Up DRBD Service
20.4 Migrating from DRBD 8 to DRBD 9
20.5 Creating a Stacked DRBD Device
20.6 Using Resource-Level Fencing
20.7 Testing the DRBD Service
20.8 Tuning DRBD
20.9 Troubleshooting DRBD
20.10 For More Information
21 Cluster Logical Volume Manager (cLVM)
21.1 Conceptual Overview
21.2 Configuration of cLVM
21.3 Configuring Eligible LVM2 Devices Explicitly
21.4 For More Information
22 Cluster Multi-device (Cluster MD)
22.1 Conceptual Overview
22.2 Creating a Clustered MD RAID Device
22.3 Configuring a Resource Agent
22.4 Adding a Device
22.5 Re-adding a Temporarily Failed Device
22.6 Removing a Device
22.7 Assembling Cluster MD as normal RAID at the disaster recovery site
23 Samba Clustering
23.1 Conceptual Overview
23.2 Basic Configuration
23.3 Joining an Active Directory Domain
23.4 Debugging and Testing Clustered Samba
23.5 For More Information
24 Disaster Recovery with Relax-and-Recover (Rear)
24.1 Conceptual Overview
24.2 Setting Up Rear and Your Backup Solution
24.3 Creating the Recovery Installation System
24.4 Testing the Recovery Process
24.5 Recovering from Disaster
24.6 For More Information
IV Appendix
A Troubleshooting
A.1 Installation and First Steps
A.2 Logging
A.3 Resources
A.4 STONITH and Fencing
A.5 History
A.6 Hawk2
A.7 Miscellaneous
A.8 For More Information
B Naming Conventions
C Cluster Management Tools (Command Line)
D Running Cluster Reports Without root Access
D.1 Creating a Local User Account
D.2 Configuring a Passwordless SSH Account
D.3 Configuring sudo
D.4 Generating a Cluster Report
Glossary
E GNU Licenses
E.1 GNU Free Documentation License

Copyright © 2006–2021 SUSE LLC and contributors. All rights reserved.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled GNU Free Documentation License.

For SUSE trademarks, see http://www.suse.com/company/legal/. All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its affiliates. Asterisks (*) denote third-party trademarks.

All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof.

Print this page