SlideShare a Scribd company logo
1 of 49
1
PC or Laptop with internet Connection
Red Hat Certified Engineer (RHCE) certification or equivalent experience or good Linux
knowledge is required
CentOS 7, RHEL7 ISO Image, VMware workstation
2
Introduction – High Availability Clustering
• What is clustering & cluster types?
• Advantages of Clustering Servers
• Concepts and techniques
• Resource and resource groups
• Failover, Fencing, Shared Storage, Quorum
• Cluster Architecture
• Lab Setup using KVM Environment
• Configuring a Basic Cluster
• Configuring a fencing agent using KVM host machine
• Troubleshooting fencing device
3
Managing Cluster Nodes
• Starting & Stopping Cluster Services
• Enabling & Disabling the Cluster Services
• Adding & Removing A Cluster Node
• The Standby & unstandby Nodes
• Quorum Operations
• Lab Session on quorum
• Managing Quorum Calculations
• Cluster Setup Switches
1) wait_for_all
2) auto_tie_breaker
4
Creating and Configuring Resources
• Create and configure high-availability resources.
• Creating a clustered Apache service
• Managing Resources
5
Troubleshooting High-Availability Cluster
• Inspect and configure cluster logging
• Troubleshooting resource failures
• Troubleshooting cluster network issues
6
Troubleshooting High-Availability Cluster
• Inspect and configure cluster logging
• Troubleshooting resource failures
• Troubleshooting cluster network issues
7
Complex Resource Group
• Configuring an Active/Passive NFS Resource Group
• Lab Session
8
Managing Constraints
• Types of constraints:
• Order, Location & Colocation Constraint
• Practice Lab Session
9
Managing iSCSI Initiators
• iSCSI fundamentals
• Configuring an iSCSI Server
• Several types of backing Storage
• block, fileio, pscsi & ramdisk
• Creating iSCSI Target
• Lab Session to create a block backstore from the targetcli shell
10
Managing High Availability Logical Volumes
• Clustered LVM & HA-LVM
• Lab Session to shared a disk (lun) to all cluster nodes
• Practice Lab Session on HA-LVM
11
Managing Clustered Logical Volumes
• Active/Active configuration of logical volumes
• Distributed Lock Manager (DLM) for lock management
• clvmd daemon
• Practice Lab Session
12
Global File System 2 (GFS2)
• GFS2 concepts
• Creating a GFS2 formatted Cluster File Systems
• Managing a GFS2 File System
• Managing a GFS2 Resource in the cluster
• Growing & Repairing a GFS2 File System
13
14
Introduction
 Linux High Availability Clustering provides intensive, hands-on experience with the
Pacemaker component of the Red Hat Enterprise Linux /CentOS High-Availability Add-On,
and cluster storage components from the Resilient Storage Add-On, including Cluster
Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper
Multipath.
 High-Availability cluster aka Failover-cluster (active-passive cluster) is one of the most widely
used cluster types in the production environment. This type of cluster provides you the
continued availability of services even one of the node from the group of computer fails. If
the server running application has failed for some reason (hardware failure), cluster software
(pacemaker) will restart the application on another node.
15
Introduction
 Computer cluster technology puts clusters of systems together to provide better system reliability and
performance. Cluster server systems connect a group of servers together in order to jointly provide
processing service for the clients in the network.
 High-Availability cluster aka Failover-cluster (active-passive cluster) is one of the most widely used
cluster types in the production environment. This type of cluster provides you the continued availability
of services even one of the node from the group of computer fails. If the server running application has
failed for some reason (hardware failure), cluster software (pacemaker) will restart the application on
another node.
 Linux High Availability Clustering provides intensive, hands-on experience with the Pacemaker
component of the Red Hat Enterprise Linux /CentOS High-Availability Add-On, and cluster storage
components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red
Hat Global File System 2 (GFS2), and Device-Mapper Multipath.
16
What is Clustering?
Two different types of clusters:
1) High-availability Clusters: known as an HA Cluster or failover cluster
 High-availability clusters can be grouped into two subsets:
• Active-active high-availability clusters, where a service runs on multiple nodes, thus
leading to shorter failover times.
• Active-passive high-availability clusters, where a service only runs on one node at a time.
17
Advantages of Clustering Servers
 Clustering servers is completely a scalable solution. You can add resources to the cluster
afterwards.
 If a server in the cluster needs any maintenance, you can do it by stopping it while handing the
load over to other servers.
 Among high availability options, clustering takes a special place since it is reliable and easy to
configure. In case of a server is having a problem providing the services furthermore, other
servers in the cluster can take the load.
18
What is Clustering?
Two different types of clusters:
2) Storage Clusters:
 Storage clusters: In a storage cluster, all members provide a single cluster file system that
can
be accessed by different server systems. The provided file system may be used to read and
write
data simultaneously. This is useful for providing high availability of application data, like web
server content, without requiring multiple redundant copies of the same data. An example
of a 19
A high-availability cluster uses various concepts and techniques
Resources and resource groups
Failover
 Fencing
 Shared Storage
 Quorum
20
Architectural Overview
Identify the components of a Linux High-Availability (HA) Cluster
Hardware Components
21
22
Architectural Overview
 Identify the components of a Linux High-Availability (HA) Cluster
 Software Components : In order to provide cluster services with the Linux High Availability Add-
on, multiple software components are required on the cluster nodes.
 Corosync is an open source Cluster Engine. It is actually a Communication System that enables
two or more Linux Cluster nodes to transfer information between them. Corosync is constantly
listening on configured port number where Linux Cluster nodes are sending information.
Corosync Communication System enables all of the nodes to know the exact state of each other
at all time. In case one of the Linux Cluster nodes fails this information will be immediately
transferred to other still exsisting Linux Cluster nodes.
23
Architectural Overview
Identify the components of a Linux High-Availability (HA) Cluster
Pacemaker is an open source high availability Resource Manager. This is the component
responsible for all cluster-related activities such as monitoring cluster membership,
managing the services and resources and fencing cluster members. In case one of the
Linux Cluster nodes fails Pacemaker will detect this and start configured Resources on one
of the other available Linux Cluster nodes.
24
Lab Setup
25
26
 Configure a machine for kvm
• yum install qemu* virt* libvirt* -y
• Create a filesystem for disk image for virtual machines
• Create a directory for storing the iso image of vm’s like CentOS, Red Hat Linux, Windows etc
• Networking for your virtual machines (Bridged Network)
 Create virtual machines as nodea, nodeb & nodec
 SSH Password less Login Using SSH Keygen
• ssh-keygen –t rsa
• ssh nodeb.example.com mkdir –p .ssh
• cat .ssh/id_rsa.pub | ssh root@nodeb 'cat >> .ssh/authorized_keys'
27
Configuring a Basic Cluster
28
Configuring Cluster Node Fencing
29
30
Managing Cluster Nodes
• Starting & Stopping Cluster Services
• Enabling & Disabling the Cluster Services
• Adding & Removing A Cluster Node
• The Standby & unstandby Nodes
31
Quorum Operations
• In order for a cluster to work as expected, the nodes must be in agreement on certain facts, such
as which machines are currently cluster members, where services are running, and which
machines are using which resources.
• The method in which this is implemented in the Red Hat High Availability Add-on is by the use
of a majority voting scheme. Every cluster node casts one vote if it successfully joins the
corosync network communication and is able to communicate with the other nodes that are
already participating in the cluster.
• The cluster is operational if more than half of all possible votes are successfully cast. The
minimum number of votes needed to achieve more than half of the votes is called the quorum. If
quorum is achieved, the cluster is considered quorate. A cluster loses quorum if half of the nodes
nodes or more cannot communicate with each other.
32
Managing Quorum Calculations
• Quorum Calculation Options:
 The votequorum component allows a cluster administrator to build clusters with switches that
alter the way quorum gets calculated.
 When building a new cluster with pcs cluster setup command, we can add few switches to
change the behaviour of quorum handling in the cluster
• --wait_for_all
• --auto_tie_breaker
• --last_man_standing
33
34
Creating and Configuring Resources
• Resources : A resource can be a file system, an IP address or a service like httpd etc.
Clustered service consist of one or more resources.
• Resource Agents: All resources are monitored independently from each other and to
accomplish this, resources are controlled by resource agents. Pacemaker can manage
different kinds of resource agents.
• Commonly used resources : Filesystem, IPaddr2, apache, mysql etc
35
Creating and Configuring Resources
• Resources Groups: A service usually consists of more than one resource. A
convenient way to tie those resources together is to add them to the same resource
group. All services in the same resource group get started in the order in which they
have been added to the resource group and stopped in the reverse order. When a
cluster node fails, the cluster migrates the whole resource group to a different node
and starts the resources on the new node.
• pcs resource list
• pcs resource describe Filesystem
36
Troubleshooting High-Availability Cluster
• Corosync: This is the framework used by Pacemaker for handling communication between the
cluster nodes. Corosync is also Pacemaker’s source of membership and quorum data.
• Pacemaker: This is the component responsible for all cluster-related activities, such as
monitoring cluster membership, managing the services and resources, and fencing cluster
members.
37
Troubleshooting Resource Failures
• Resources can fail for multiple reasons. An administrator might have used incorrect settings when defining the
resource, a configuration file might have an error in it, the system might be trying to start a resource that does
not exist, or some other unforeseen issue might occur.
• Whenever a resource fails, the cluster will increase the failcount for a resource. This count can be viewed with the
command pcs resource failcount show <RESOURCE>.
• Failure to start or stop will immediately set the failcount for a resource to INFINITY, forcing it to move to a
different node. If fencing is enabled, a node that failed to stop a resource will also be fenced.
• Resources can be configured to relocate to a different node after N amount of failures as well, by setting the
option meta migration-threshold=N when creating or modifying the resource. By default, resources will not
migrate unless their failcount reaches INFINITY.
38
39
Managing Constraints
• Constraints are rules that place restrictions on the order in which resources or resource groups
may be started, or the nodes on which they may run. Constraints are important for managing
complex resource groups or sets of resource groups, which depend upon one another or which
may interfere with each other.
• There are three main types of constraints:
Order constraints, which control the order in which resources or resource groups are started and
stopped.
Location constraints, which control the nodes on which resources or resource groups may run.
Colocation constraints, which control whether two resources or resource groups may run on the
same node.
40
Managing Constraints
• CONFIGURING COLOCATION CONSTRAINTS
Colocation constraints specify that two resources must (or must not) run on the same
node. To set a colocation constraint to keep two resources or resource groups together:
• [root@nodeA ~]# pcs constraint colocation add B with A
A colocation constraint with a score of -INFINITY can also be set to force the two
resources or resource groups to never run on the same node:
• [root@nodeY ~]# pcs constraint colocation add B with A -INFINITY
41
• MANAGING HIGH AVAILABILITY LOGICAL VOLUMES
There are two ways to use LVM on shared storage in a cluster, Clustered LVM and HA-LVM.
LVM.
With Clustered LVM, all volume groups and logical volumes on shared storage are
available to all cluster nodes all of the time. With HA-LVM, a volume group and its logical
volumes can only be accessed by one node at a time.
Clustered LVM is a good choice when working with a shared file system, like GFS2. On the
other hand, HA-LVM is a good choice when working with a more traditional file system
like ext4 or XFS, and restricted access to just one node at a time is desired to prevent file
system and/or data corruption. 42
43
• MANAGING CLUSTERED LOGICAL VOLUMES
Clustered LVM
• With Clustered LVM, all volume groups and logical volumes on shared storage are
available to all cluster nodes all of the time. With HA-LVM, a volume group and its logical
volumes can only be accessed by one node at a time.
• Clustered LVM allows the use of regular LVM volume groups and logical volumes on
shared storage. In a cluster configured with clustered LVM, a volume group and its logical
volumes are accessible to all cluster nodes at the same time. With clustered LVM,
administrators can use the management benefits of LVM in conjunction with a shared file
system like GFS2, for scenarios such as making virtual machine images inside logical
volumes available to all cluster nodes. 44
• MANAGING CLUSTERED LOGICAL VOLUMES
Clustered LVM
• The active/active configuration of logical volumes in a cluster using clustered LVM is
accomplished by using a daemon called clvmd to propagate metadata changes to all
cluster nodes. The clvmd daemon manages clustered volume groups and communicates
their metadata changes made on one cluster node to all the remaining nodes in the
cluster.
• Without the clvmd daemon, LVM metadata changes made on one cluster node would be
unknown to other cluster nodes. Since these metadata define which storage addresses are
available for data and file system information, metadata changes not propagated to all
cluster nodes can lead to corruption of LVM metadata as well as data residing on LVM 45
• MANAGING CLUSTERED LOGICAL VOLUMES
Clustered LVM
• In order to prevent multiple nodes from changing LVM metadata simultaneously, clustered
LVM uses Distributed Lock Manager (DLM) for lock management. The clvmd daemon and
the DLM lock manager must be installed prior to configuring clustered LVM.
46
GLOBAL FILE SYSTEM 2 (GFS2)
• Global File System 2 (GFS2) is a cluster file system interfacing directly with the kernel VFS layer.
This means that the same file system can be mounted and used by multiple cluster nodes
simultaneously, while still providing a full regular file system.
• To accomplish this, every node accessing a GFS2 file system uses the cluster infrastructure
provided by Corosync and Pacemaker to provide services such as fencing and locking. Each
cluster node mounting a GFS2 file system will use a separate journal. If a node fails, one of the
other nodes in the cluster will replay the journal for the failed node after the failed node has
been fenced.
• To prevent race conditions between two nodes when accessing the file system, GFS2 uses the
Distributed Lock Manager (DLM) to coordinate locks on files and directories.
47
SELinux and GFS2
• GFS2 supports extended attributes (xattrs) and can store file labels used by Security
Enhanced Linux (SELinux) just like XFS and ext4. However, using SELinux with GFS2 is
complicated by the fact that updates to SELinux file labels on a GFS2 file system are
currently not cluster coherent.
• This means that if one node changes the SELinux context of a file on a GFS2 file system,
other cluster nodes that have that file system mounted may continue using the old
context on that file indefinitely. This is somewhat tricky to resolve, and the issue is
currently being tracked at bugzilla.redhat.com as bug #437984.
• SELinux: Avoid SELinux on GFS2", seems to state that SELinux must be turned off on GFS2
file systems. 48
GROWING A GFS2 FILE SYSTEM
49

More Related Content

Similar to 2.1 Red_Hat_Cluster1.ppt

Rha cluster suite wppdf
Rha cluster suite wppdfRha cluster suite wppdf
Rha cluster suite wppdfprojectmgmt456
 
Open stack ha design & deployment kilo
Open stack ha design & deployment   kiloOpen stack ha design & deployment   kilo
Open stack ha design & deployment kiloSteven Li
 
CloudStack Architecture and Refactor
CloudStack Architecture and RefactorCloudStack Architecture and Refactor
CloudStack Architecture and Refactorgavin_lee
 
Rhel cluster basics 2
Rhel cluster basics   2Rhel cluster basics   2
Rhel cluster basics 2Manoj Singh
 
Build cloud native solution using open source
Build cloud native solution using open source Build cloud native solution using open source
Build cloud native solution using open source Nitesh Jadhav
 
Apache CloudStack: API to UI (STLLUG)
Apache CloudStack: API to UI (STLLUG)Apache CloudStack: API to UI (STLLUG)
Apache CloudStack: API to UI (STLLUG)Joe Brockmeier
 
Cloud stack overview
Cloud stack overviewCloud stack overview
Cloud stack overviewhowie YU
 
D108636GC10_les01.pptx
D108636GC10_les01.pptxD108636GC10_les01.pptx
D108636GC10_les01.pptxSuresh569521
 
Introduction to linux containers
Introduction to linux containersIntroduction to linux containers
Introduction to linux containersGoogle
 
Ha cluster with openSUSE Leap
Ha cluster with openSUSE LeapHa cluster with openSUSE Leap
Ha cluster with openSUSE Leapmedwinz
 
Dataservices based on mesos and kafka kostiantyn bokhan dataconf 21 04 18
Dataservices based on mesos and kafka kostiantyn bokhan dataconf 21 04 18Dataservices based on mesos and kafka kostiantyn bokhan dataconf 21 04 18
Dataservices based on mesos and kafka kostiantyn bokhan dataconf 21 04 18Olga Zinkevych
 
Linux High Availability Overview - openSUSE.Asia Summit 2015
Linux High Availability Overview - openSUSE.Asia Summit 2015 Linux High Availability Overview - openSUSE.Asia Summit 2015
Linux High Availability Overview - openSUSE.Asia Summit 2015 Roger Zhou 周志强
 
Using CloudStack With Clustered LVM
Using CloudStack With Clustered LVMUsing CloudStack With Clustered LVM
Using CloudStack With Clustered LVMMarcus L Sorensen
 
HPC and cloud distributed computing, as a journey
HPC and cloud distributed computing, as a journeyHPC and cloud distributed computing, as a journey
HPC and cloud distributed computing, as a journeyPeter Clapham
 
CloudStack Overview
CloudStack OverviewCloudStack Overview
CloudStack Overviewsedukull
 
9-clustering-.pptx
9-clustering-.pptx9-clustering-.pptx
9-clustering-.pptxAnsarHasas1
 
Container & kubernetes
Container & kubernetesContainer & kubernetes
Container & kubernetesTed Jung
 
Security on a Container Platform
Security on a Container PlatformSecurity on a Container Platform
Security on a Container PlatformAll Things Open
 
Linux Cluster Concepts
Linux Cluster ConceptsLinux Cluster Concepts
Linux Cluster Conceptsnixsavy
 

Similar to 2.1 Red_Hat_Cluster1.ppt (20)

Rha cluster suite wppdf
Rha cluster suite wppdfRha cluster suite wppdf
Rha cluster suite wppdf
 
Open stack ha design & deployment kilo
Open stack ha design & deployment   kiloOpen stack ha design & deployment   kilo
Open stack ha design & deployment kilo
 
CloudStack Architecture and Refactor
CloudStack Architecture and RefactorCloudStack Architecture and Refactor
CloudStack Architecture and Refactor
 
Apache CloudStack from API to UI
Apache CloudStack from API to UIApache CloudStack from API to UI
Apache CloudStack from API to UI
 
Rhel cluster basics 2
Rhel cluster basics   2Rhel cluster basics   2
Rhel cluster basics 2
 
Build cloud native solution using open source
Build cloud native solution using open source Build cloud native solution using open source
Build cloud native solution using open source
 
Apache CloudStack: API to UI (STLLUG)
Apache CloudStack: API to UI (STLLUG)Apache CloudStack: API to UI (STLLUG)
Apache CloudStack: API to UI (STLLUG)
 
Cloud stack overview
Cloud stack overviewCloud stack overview
Cloud stack overview
 
D108636GC10_les01.pptx
D108636GC10_les01.pptxD108636GC10_les01.pptx
D108636GC10_les01.pptx
 
Introduction to linux containers
Introduction to linux containersIntroduction to linux containers
Introduction to linux containers
 
Ha cluster with openSUSE Leap
Ha cluster with openSUSE LeapHa cluster with openSUSE Leap
Ha cluster with openSUSE Leap
 
Dataservices based on mesos and kafka kostiantyn bokhan dataconf 21 04 18
Dataservices based on mesos and kafka kostiantyn bokhan dataconf 21 04 18Dataservices based on mesos and kafka kostiantyn bokhan dataconf 21 04 18
Dataservices based on mesos and kafka kostiantyn bokhan dataconf 21 04 18
 
Linux High Availability Overview - openSUSE.Asia Summit 2015
Linux High Availability Overview - openSUSE.Asia Summit 2015 Linux High Availability Overview - openSUSE.Asia Summit 2015
Linux High Availability Overview - openSUSE.Asia Summit 2015
 
Using CloudStack With Clustered LVM
Using CloudStack With Clustered LVMUsing CloudStack With Clustered LVM
Using CloudStack With Clustered LVM
 
HPC and cloud distributed computing, as a journey
HPC and cloud distributed computing, as a journeyHPC and cloud distributed computing, as a journey
HPC and cloud distributed computing, as a journey
 
CloudStack Overview
CloudStack OverviewCloudStack Overview
CloudStack Overview
 
9-clustering-.pptx
9-clustering-.pptx9-clustering-.pptx
9-clustering-.pptx
 
Container & kubernetes
Container & kubernetesContainer & kubernetes
Container & kubernetes
 
Security on a Container Platform
Security on a Container PlatformSecurity on a Container Platform
Security on a Container Platform
 
Linux Cluster Concepts
Linux Cluster ConceptsLinux Cluster Concepts
Linux Cluster Concepts
 

Recently uploaded

꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home ServiceSapana Sha
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAbdelrhman abooda
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...ThinkInnovation
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 

Recently uploaded (20)

꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service9654467111 Call Girls In Munirka Hotel And Home Service
9654467111 Call Girls In Munirka Hotel And Home Service
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 

2.1 Red_Hat_Cluster1.ppt

  • 1. 1
  • 2. PC or Laptop with internet Connection Red Hat Certified Engineer (RHCE) certification or equivalent experience or good Linux knowledge is required CentOS 7, RHEL7 ISO Image, VMware workstation 2
  • 3. Introduction – High Availability Clustering • What is clustering & cluster types? • Advantages of Clustering Servers • Concepts and techniques • Resource and resource groups • Failover, Fencing, Shared Storage, Quorum • Cluster Architecture • Lab Setup using KVM Environment • Configuring a Basic Cluster • Configuring a fencing agent using KVM host machine • Troubleshooting fencing device 3
  • 4. Managing Cluster Nodes • Starting & Stopping Cluster Services • Enabling & Disabling the Cluster Services • Adding & Removing A Cluster Node • The Standby & unstandby Nodes • Quorum Operations • Lab Session on quorum • Managing Quorum Calculations • Cluster Setup Switches 1) wait_for_all 2) auto_tie_breaker 4
  • 5. Creating and Configuring Resources • Create and configure high-availability resources. • Creating a clustered Apache service • Managing Resources 5
  • 6. Troubleshooting High-Availability Cluster • Inspect and configure cluster logging • Troubleshooting resource failures • Troubleshooting cluster network issues 6
  • 7. Troubleshooting High-Availability Cluster • Inspect and configure cluster logging • Troubleshooting resource failures • Troubleshooting cluster network issues 7
  • 8. Complex Resource Group • Configuring an Active/Passive NFS Resource Group • Lab Session 8
  • 9. Managing Constraints • Types of constraints: • Order, Location & Colocation Constraint • Practice Lab Session 9
  • 10. Managing iSCSI Initiators • iSCSI fundamentals • Configuring an iSCSI Server • Several types of backing Storage • block, fileio, pscsi & ramdisk • Creating iSCSI Target • Lab Session to create a block backstore from the targetcli shell 10
  • 11. Managing High Availability Logical Volumes • Clustered LVM & HA-LVM • Lab Session to shared a disk (lun) to all cluster nodes • Practice Lab Session on HA-LVM 11
  • 12. Managing Clustered Logical Volumes • Active/Active configuration of logical volumes • Distributed Lock Manager (DLM) for lock management • clvmd daemon • Practice Lab Session 12
  • 13. Global File System 2 (GFS2) • GFS2 concepts • Creating a GFS2 formatted Cluster File Systems • Managing a GFS2 File System • Managing a GFS2 Resource in the cluster • Growing & Repairing a GFS2 File System 13
  • 14. 14
  • 15. Introduction  Linux High Availability Clustering provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux /CentOS High-Availability Add-On, and cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath.  High-Availability cluster aka Failover-cluster (active-passive cluster) is one of the most widely used cluster types in the production environment. This type of cluster provides you the continued availability of services even one of the node from the group of computer fails. If the server running application has failed for some reason (hardware failure), cluster software (pacemaker) will restart the application on another node. 15
  • 16. Introduction  Computer cluster technology puts clusters of systems together to provide better system reliability and performance. Cluster server systems connect a group of servers together in order to jointly provide processing service for the clients in the network.  High-Availability cluster aka Failover-cluster (active-passive cluster) is one of the most widely used cluster types in the production environment. This type of cluster provides you the continued availability of services even one of the node from the group of computer fails. If the server running application has failed for some reason (hardware failure), cluster software (pacemaker) will restart the application on another node.  Linux High Availability Clustering provides intensive, hands-on experience with the Pacemaker component of the Red Hat Enterprise Linux /CentOS High-Availability Add-On, and cluster storage components from the Resilient Storage Add-On, including Cluster Logical Volume Manager (CLVM), Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath. 16
  • 17. What is Clustering? Two different types of clusters: 1) High-availability Clusters: known as an HA Cluster or failover cluster  High-availability clusters can be grouped into two subsets: • Active-active high-availability clusters, where a service runs on multiple nodes, thus leading to shorter failover times. • Active-passive high-availability clusters, where a service only runs on one node at a time. 17
  • 18. Advantages of Clustering Servers  Clustering servers is completely a scalable solution. You can add resources to the cluster afterwards.  If a server in the cluster needs any maintenance, you can do it by stopping it while handing the load over to other servers.  Among high availability options, clustering takes a special place since it is reliable and easy to configure. In case of a server is having a problem providing the services furthermore, other servers in the cluster can take the load. 18
  • 19. What is Clustering? Two different types of clusters: 2) Storage Clusters:  Storage clusters: In a storage cluster, all members provide a single cluster file system that can be accessed by different server systems. The provided file system may be used to read and write data simultaneously. This is useful for providing high availability of application data, like web server content, without requiring multiple redundant copies of the same data. An example of a 19
  • 20. A high-availability cluster uses various concepts and techniques Resources and resource groups Failover  Fencing  Shared Storage  Quorum 20
  • 21. Architectural Overview Identify the components of a Linux High-Availability (HA) Cluster Hardware Components 21
  • 22. 22
  • 23. Architectural Overview  Identify the components of a Linux High-Availability (HA) Cluster  Software Components : In order to provide cluster services with the Linux High Availability Add- on, multiple software components are required on the cluster nodes.  Corosync is an open source Cluster Engine. It is actually a Communication System that enables two or more Linux Cluster nodes to transfer information between them. Corosync is constantly listening on configured port number where Linux Cluster nodes are sending information. Corosync Communication System enables all of the nodes to know the exact state of each other at all time. In case one of the Linux Cluster nodes fails this information will be immediately transferred to other still exsisting Linux Cluster nodes. 23
  • 24. Architectural Overview Identify the components of a Linux High-Availability (HA) Cluster Pacemaker is an open source high availability Resource Manager. This is the component responsible for all cluster-related activities such as monitoring cluster membership, managing the services and resources and fencing cluster members. In case one of the Linux Cluster nodes fails Pacemaker will detect this and start configured Resources on one of the other available Linux Cluster nodes. 24
  • 26. 26
  • 27.  Configure a machine for kvm • yum install qemu* virt* libvirt* -y • Create a filesystem for disk image for virtual machines • Create a directory for storing the iso image of vm’s like CentOS, Red Hat Linux, Windows etc • Networking for your virtual machines (Bridged Network)  Create virtual machines as nodea, nodeb & nodec  SSH Password less Login Using SSH Keygen • ssh-keygen –t rsa • ssh nodeb.example.com mkdir –p .ssh • cat .ssh/id_rsa.pub | ssh root@nodeb 'cat >> .ssh/authorized_keys' 27
  • 30. 30
  • 31. Managing Cluster Nodes • Starting & Stopping Cluster Services • Enabling & Disabling the Cluster Services • Adding & Removing A Cluster Node • The Standby & unstandby Nodes 31
  • 32. Quorum Operations • In order for a cluster to work as expected, the nodes must be in agreement on certain facts, such as which machines are currently cluster members, where services are running, and which machines are using which resources. • The method in which this is implemented in the Red Hat High Availability Add-on is by the use of a majority voting scheme. Every cluster node casts one vote if it successfully joins the corosync network communication and is able to communicate with the other nodes that are already participating in the cluster. • The cluster is operational if more than half of all possible votes are successfully cast. The minimum number of votes needed to achieve more than half of the votes is called the quorum. If quorum is achieved, the cluster is considered quorate. A cluster loses quorum if half of the nodes nodes or more cannot communicate with each other. 32
  • 33. Managing Quorum Calculations • Quorum Calculation Options:  The votequorum component allows a cluster administrator to build clusters with switches that alter the way quorum gets calculated.  When building a new cluster with pcs cluster setup command, we can add few switches to change the behaviour of quorum handling in the cluster • --wait_for_all • --auto_tie_breaker • --last_man_standing 33
  • 34. 34
  • 35. Creating and Configuring Resources • Resources : A resource can be a file system, an IP address or a service like httpd etc. Clustered service consist of one or more resources. • Resource Agents: All resources are monitored independently from each other and to accomplish this, resources are controlled by resource agents. Pacemaker can manage different kinds of resource agents. • Commonly used resources : Filesystem, IPaddr2, apache, mysql etc 35
  • 36. Creating and Configuring Resources • Resources Groups: A service usually consists of more than one resource. A convenient way to tie those resources together is to add them to the same resource group. All services in the same resource group get started in the order in which they have been added to the resource group and stopped in the reverse order. When a cluster node fails, the cluster migrates the whole resource group to a different node and starts the resources on the new node. • pcs resource list • pcs resource describe Filesystem 36
  • 37. Troubleshooting High-Availability Cluster • Corosync: This is the framework used by Pacemaker for handling communication between the cluster nodes. Corosync is also Pacemaker’s source of membership and quorum data. • Pacemaker: This is the component responsible for all cluster-related activities, such as monitoring cluster membership, managing the services and resources, and fencing cluster members. 37
  • 38. Troubleshooting Resource Failures • Resources can fail for multiple reasons. An administrator might have used incorrect settings when defining the resource, a configuration file might have an error in it, the system might be trying to start a resource that does not exist, or some other unforeseen issue might occur. • Whenever a resource fails, the cluster will increase the failcount for a resource. This count can be viewed with the command pcs resource failcount show <RESOURCE>. • Failure to start or stop will immediately set the failcount for a resource to INFINITY, forcing it to move to a different node. If fencing is enabled, a node that failed to stop a resource will also be fenced. • Resources can be configured to relocate to a different node after N amount of failures as well, by setting the option meta migration-threshold=N when creating or modifying the resource. By default, resources will not migrate unless their failcount reaches INFINITY. 38
  • 39. 39
  • 40. Managing Constraints • Constraints are rules that place restrictions on the order in which resources or resource groups may be started, or the nodes on which they may run. Constraints are important for managing complex resource groups or sets of resource groups, which depend upon one another or which may interfere with each other. • There are three main types of constraints: Order constraints, which control the order in which resources or resource groups are started and stopped. Location constraints, which control the nodes on which resources or resource groups may run. Colocation constraints, which control whether two resources or resource groups may run on the same node. 40
  • 41. Managing Constraints • CONFIGURING COLOCATION CONSTRAINTS Colocation constraints specify that two resources must (or must not) run on the same node. To set a colocation constraint to keep two resources or resource groups together: • [root@nodeA ~]# pcs constraint colocation add B with A A colocation constraint with a score of -INFINITY can also be set to force the two resources or resource groups to never run on the same node: • [root@nodeY ~]# pcs constraint colocation add B with A -INFINITY 41
  • 42. • MANAGING HIGH AVAILABILITY LOGICAL VOLUMES There are two ways to use LVM on shared storage in a cluster, Clustered LVM and HA-LVM. LVM. With Clustered LVM, all volume groups and logical volumes on shared storage are available to all cluster nodes all of the time. With HA-LVM, a volume group and its logical volumes can only be accessed by one node at a time. Clustered LVM is a good choice when working with a shared file system, like GFS2. On the other hand, HA-LVM is a good choice when working with a more traditional file system like ext4 or XFS, and restricted access to just one node at a time is desired to prevent file system and/or data corruption. 42
  • 43. 43
  • 44. • MANAGING CLUSTERED LOGICAL VOLUMES Clustered LVM • With Clustered LVM, all volume groups and logical volumes on shared storage are available to all cluster nodes all of the time. With HA-LVM, a volume group and its logical volumes can only be accessed by one node at a time. • Clustered LVM allows the use of regular LVM volume groups and logical volumes on shared storage. In a cluster configured with clustered LVM, a volume group and its logical volumes are accessible to all cluster nodes at the same time. With clustered LVM, administrators can use the management benefits of LVM in conjunction with a shared file system like GFS2, for scenarios such as making virtual machine images inside logical volumes available to all cluster nodes. 44
  • 45. • MANAGING CLUSTERED LOGICAL VOLUMES Clustered LVM • The active/active configuration of logical volumes in a cluster using clustered LVM is accomplished by using a daemon called clvmd to propagate metadata changes to all cluster nodes. The clvmd daemon manages clustered volume groups and communicates their metadata changes made on one cluster node to all the remaining nodes in the cluster. • Without the clvmd daemon, LVM metadata changes made on one cluster node would be unknown to other cluster nodes. Since these metadata define which storage addresses are available for data and file system information, metadata changes not propagated to all cluster nodes can lead to corruption of LVM metadata as well as data residing on LVM 45
  • 46. • MANAGING CLUSTERED LOGICAL VOLUMES Clustered LVM • In order to prevent multiple nodes from changing LVM metadata simultaneously, clustered LVM uses Distributed Lock Manager (DLM) for lock management. The clvmd daemon and the DLM lock manager must be installed prior to configuring clustered LVM. 46
  • 47. GLOBAL FILE SYSTEM 2 (GFS2) • Global File System 2 (GFS2) is a cluster file system interfacing directly with the kernel VFS layer. This means that the same file system can be mounted and used by multiple cluster nodes simultaneously, while still providing a full regular file system. • To accomplish this, every node accessing a GFS2 file system uses the cluster infrastructure provided by Corosync and Pacemaker to provide services such as fencing and locking. Each cluster node mounting a GFS2 file system will use a separate journal. If a node fails, one of the other nodes in the cluster will replay the journal for the failed node after the failed node has been fenced. • To prevent race conditions between two nodes when accessing the file system, GFS2 uses the Distributed Lock Manager (DLM) to coordinate locks on files and directories. 47
  • 48. SELinux and GFS2 • GFS2 supports extended attributes (xattrs) and can store file labels used by Security Enhanced Linux (SELinux) just like XFS and ext4. However, using SELinux with GFS2 is complicated by the fact that updates to SELinux file labels on a GFS2 file system are currently not cluster coherent. • This means that if one node changes the SELinux context of a file on a GFS2 file system, other cluster nodes that have that file system mounted may continue using the old context on that file indefinitely. This is somewhat tricky to resolve, and the issue is currently being tracked at bugzilla.redhat.com as bug #437984. • SELinux: Avoid SELinux on GFS2", seems to state that SELinux must be turned off on GFS2 file systems. 48
  • 49. GROWING A GFS2 FILE SYSTEM 49