Jump to contentJump to page navigation: previous page [access key p]/next page [access key n]
SUSE Linux Enterprise High Availability Extension 15 SP1

Administration Guide

This guide is intended for administrators who need to set up, configure, and maintain clusters with SUSE® Linux Enterprise High Availability Extension. For quick and efficient configuration and administration, the product includes both a graphical user interface and a command line interface (CLI). For performing key tasks, both approaches are covered in this guide. Thus, you can choose the appropriate tool that matches your needs.

Authors: Tanja Roth and Thomas Schraitle
Publication Date: January 21, 2022
About This Guide
Available Documentation
Giving Feedback
Documentation Conventions
Product Life Cycle and Support
I Installation, Setup and Upgrade
1 Product Overview
1.1 Availability as Extension
1.2 Key Features
1.3 Benefits
1.4 Cluster Configurations: Storage
1.5 Architecture
2 System Requirements and Recommendations
2.1 Hardware Requirements
2.2 Software Requirements
2.3 Storage Requirements
2.4 Other Requirements and Recommendations
3 Installing the High Availability Extension
3.1 Manual Installation
3.2 Mass Installation and Deployment with AutoYaST
4 Using the YaST Cluster Module
4.1 Definition of Terms
4.2 YaST Cluster Module
4.3 Defining the Communication Channels
4.4 Defining Authentication Settings
4.5 Transferring the Configuration to All Nodes
4.6 Synchronizing Connection Status Between Cluster Nodes
4.7 Configuring Services
4.8 Bringing the Cluster Online Node by Node
5 Upgrading Your Cluster and Updating Software Packages
5.1 Terminology
5.2 Upgrading your Cluster to the Latest Product Version
5.3 Updating Software Packages on Cluster Nodes
5.4 For More Information
II Configuration and Administration
6 Configuration and Administration Basics
6.1 Use Case Scenarios
6.2 Quorum Determination
6.3 Cluster Resources
6.4 Resource Monitoring
6.5 Resource Constraints
6.6 Managing Services on Remote Hosts
6.7 Monitoring System Health
6.8 For More Information
7 Configuring and Managing Cluster Resources with Hawk2
7.1 Hawk2 Requirements
7.2 Logging In
7.3 Hawk2 Overview: Main Elements
7.4 Configuring Global Cluster Options
7.5 Configuring Cluster Resources
7.6 Configuring Constraints
7.7 Managing Cluster Resources
7.8 Monitoring Clusters
7.9 Using the Batch Mode
7.10 Viewing the Cluster History
7.11 Verifying Cluster Health
8 Configuring and Managing Cluster Resources (Command Line)
8.1 crmsh—Overview
8.2 Managing Corosync Configuration
8.3 Configuring Cluster Resources
8.4 Managing Cluster Resources
8.5 Setting Passwords Independent of cib.xml
8.6 Retrieving History Information
8.7 For More Information
9 Adding or Modifying Resource Agents
9.1 STONITH Agents
9.2 Writing OCF Resource Agents
9.3 OCF Return Codes and Failure Recovery
10 Fencing and STONITH
10.1 Classes of Fencing
10.2 Node Level Fencing
10.3 STONITH Resources and Configuration
10.4 Monitoring Fencing Devices
10.5 Special Fencing Devices
10.6 Basic Recommendations
10.7 For More Information
11 Storage Protection and SBD
11.1 Conceptual Overview
11.2 Overview of Manually Setting Up SBD
11.3 Requirements
11.4 Number of SBD Devices
11.5 Calculation of Timeouts
11.6 Setting Up the Watchdog
11.7 Setting Up SBD with Devices
11.8 Setting Up Diskless SBD
11.9 Testing SBD and Fencing
11.10 Additional Mechanisms for Storage Protection
11.11 For More Information
12 QDevice and QNetd
12.1 Conceptual Overview
12.2 Requirements and Prerequisites
12.3 Setting Up the QNetd Server
12.4 Connecting QDevice Clients to the QNetd Server
12.5 Setting Up a QDevice with Heuristics
12.6 Checking and Showing Quorum Status
12.7 For More Information
13 Access Control Lists
13.1 Requirements and Prerequisites
13.2 Conceptual Overview
13.3 Enabling Use of ACLs in Your Cluster
13.4 Creating a Read-Only Monitor Role
13.5 Removing a User
13.6 Removing an Existing Role
13.7 Setting ACL Rules via XPath Expressions
13.8 Setting ACL Rules via Abbreviations
14 Network Device Bonding
14.1 Configuring Bonding Devices with YaST
14.2 Hotplugging of Bonding Slaves
14.3 For More Information
15 Load Balancing
15.1 Conceptual Overview
15.2 Configuring Load Balancing with Linux Virtual Server
15.3 Configuring Load Balancing with HAProxy
15.4 For More Information
16 Geo Clusters (Multi-Site Clusters)
17 Executing Maintenance Tasks
17.1 Implications of Taking Down a Cluster Node
17.2 Different Options for Maintenance Tasks
17.3 Preparing and Finishing Maintenance Work
17.4 Putting the Cluster in Maintenance Mode
17.5 Putting a Node in Maintenance Mode
17.6 Putting a Node in Standby Mode
17.7 Putting a Resource into Maintenance Mode
17.8 Putting a Resource into Unmanaged Mode
17.9 Rebooting a Cluster Node While in Maintenance Mode
III Storage and Data Replication
18 Distributed Lock Manager (DLM)
18.1 Protocols for DLM Communication
18.2 Configuring DLM Cluster Resources
19 OCFS2
19.1 Features and Benefits
19.2 OCFS2 Packages and Management Utilities
19.3 Configuring OCFS2 Services and a STONITH Resource
19.4 Creating OCFS2 Volumes
19.5 Mounting OCFS2 Volumes
19.6 Configuring OCFS2 Resources With Hawk2
19.7 Using Quotas on OCFS2 File Systems
19.8 For More Information
20 GFS2
20.1 GFS2 Packages and Management Utilities
20.2 Configuring GFS2 Services and a STONITH Resource
20.3 Creating GFS2 Volumes
20.4 Mounting GFS2 Volumes
21.1 Conceptual Overview
21.2 Installing DRBD Services
21.3 Setting Up DRBD Service
21.4 Migrating from DRBD 8 to DRBD 9
21.5 Creating a Stacked DRBD Device
21.6 Using Resource-Level Fencing with STONITH
21.7 Testing the DRBD Service
21.8 Monitoring DRBD Devices
21.9 Tuning DRBD
21.10 Troubleshooting DRBD
21.11 For More Information
22 Cluster Logical Volume Manager (Cluster LVM)
22.1 Conceptual Overview
22.2 Configuration of Cluster LVM
22.3 Configuring Eligible LVM2 Devices Explicitly
22.4 Online Migration from Mirror LV to Cluster MD
22.5 For More Information
23 Cluster Multi-device (Cluster MD)
23.1 Conceptual Overview
23.2 Creating a Clustered MD RAID Device
23.3 Configuring a Resource Agent
23.4 Adding a Device
23.5 Re-adding a Temporarily Failed Device
23.6 Removing a Device
23.7 Assembling Cluster MD as normal RAID at the disaster recovery site
24 Samba Clustering
24.1 Conceptual Overview
24.2 Basic Configuration
24.3 Joining an Active Directory Domain
24.4 Debugging and Testing Clustered Samba
24.5 For More Information
25 Disaster Recovery with Rear (Relax-and-Recover)
25.1 Conceptual Overview
25.2 Setting Up Rear and Your Backup Solution
25.3 Creating the Recovery Installation System
25.4 Testing the Recovery Process
25.5 Recovering from Disaster
25.6 For More Information
IV Appendix
A Troubleshooting
A.1 Installation and First Steps
A.2 Logging
A.3 Resources
A.4 STONITH and Fencing
A.5 History
A.6 Hawk2
A.7 Miscellaneous
A.8 For More Information
B Naming Conventions
C Cluster Management Tools (Command Line)
D Running Cluster Reports Without root Access
D.1 Creating a Local User Account
D.2 Configuring a Passwordless SSH Account
D.3 Configuring sudo
D.4 Generating a Cluster Report
E GNU Licenses
E.1 GNU Free Documentation License

Copyright © 2006–2022 SUSE LLC and contributors. All rights reserved.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled GNU Free Documentation License.

For SUSE trademarks, see http://www.suse.com/company/legal/. All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its affiliates. Asterisks (*) denote third-party trademarks.

All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof.

Print this page