Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

Red Hat Enterprise Linux 9 Essentials Book now available.

Purchase a copy of Red Hat Enterprise Linux 9 (RHEL 9) Essentials

Red Hat Enterprise Linux 9 Essentials Print and eBook (PDF) editions contain 34 chapters and 298 pages

Preview Book

Red Hat Enterprise Linux 6

Cluster Administration

Configuring and Managing the High Availability Add-On

Edition 0

Logo


Legal Notice

Copyright © 2010 Red Hat Inc..
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at https://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
All other trademarks are the property of their respective owners.


1801 Varsity Drive
 RaleighNC 27606-2072 USA
 Phone: +1 919 754 3700
 Phone: 888 733 4281
 Fax: +1 919 754 3701

Abstract
Configuring and Managing the High Availability Add-On describes the configuration and management of the High Availability Add-On for Red Hat Enterprise Linux 6.

Introduction
1. Document Conventions
1.1. Typographic Conventions
1.2. Pull-quote Conventions
1.3. Notes and Warnings
2. Feedback
1. Red Hat High Availability Add-On Configuration and Management Overview
1.1. Configuration Basics
1.2. Setting Up Hardware
1.3. Installing Red Hat High Availability Add-On software
1.4. Configuring Red Hat High Availability Add-On Software
2. Before Configuring the Red Hat High Availability Add-On
2.1. General Configuration Considerations
2.2. Compatible Hardware
2.3. Enabling IP Ports
2.3.1. Enabling IP Ports on Cluster Nodes
2.3.2. Enabling IP Ports on Computers That Run luci
2.4. Configuring ACPI For Use with Integrated Fence Devices
2.4.1. Disabling ACPI Soft-Off with chkconfig Management
2.4.2. Disabling ACPI Soft-Off with the BIOS
2.4.3. Disabling ACPI Completely in the grub.conf File
2.5. Considerations for Configuring HA Services
2.6. Configuration Validation
2.7. Considerations for NetworkManager
2.8. Considerations for Using Quorum Disk
2.9. Red Hat High Availability Add-On and SELinux
2.10. Multicast Addresses
2.11. Considerations for ricci
2.12. Considerations for Using Conga
3. Configuring Red Hat High Availability Add-On With Conga
3.1. Configuration Tasks
3.2. Starting luci and ricci
3.3. Creating A Cluster
3.4. Global Cluster Properties
3.5. Configuring Fence Devices
3.5.1. Creating a Fence Device
3.5.2. Modifying a Fence Device
3.5.3. Deleting a Fence Device
3.6. Configuring Fencing for Cluster Members
3.6.1. Configuring a Single Fence Device for a Node
3.6.2. Configuring a Backup Fence Device
3.6.3. Configuring A Node with Redundant Power
3.7. Configuring a Failover Domain
3.7.1. Adding a Failover Domain
3.7.2. Modifying a Failover Domain
3.7.3. Deleting a Failover Domain
3.8. Configuring Global Cluster Resources
3.9. Adding a Cluster Service to the Cluster
4. Managing Red Hat High Availability Add-On With Conga
4.1. Adding an Existing Cluster to the luci Interface
4.2. Managing Cluster Nodes
4.2.1. Rebooting a Cluster Node
4.2.2. Causing a Node to Leave or Join a Cluster
4.2.3. Adding a Member to a Running Cluster
4.2.4. Deleting a Member from a Cluster
4.3. Starting, Stopping, Restarting, and Deleting Clusters
4.4. Managing High-Availability Services
4.5. Diagnosing and Correcting Problems in a Cluster
5. Configuring Red Hat High Availability Add-On With Command Line Tools
5.1. Configuration Tasks
5.2. Creating a Basic Cluster Configuration File
5.3. Configuring Fencing
5.4. Configuring Failover Domains
5.5. Configuring HA Services
5.5.1. Adding Cluster Resources
5.5.2. Adding a Cluster Service to the Cluster
5.6. Verifying a Configuration
6. Managing Red Hat High Availability Add-On With Command Line Tools
6.1. Starting and Stopping the Cluster Software
6.1.1. Starting Cluster Software
6.1.2. Stopping Cluster Software
6.2. Deleting or Adding a Node
6.2.1. Deleting a Node from a Cluster
6.2.2. Adding a Node to a Cluster
6.2.3. Examples of Three-Node and Two-Node Configurations
6.3. Managing High-Availability Services
6.3.1. Displaying HA Service Status with clustat
6.3.2. Managing HA Services with clusvcadm
6.4. Updating a Configuration
6.4.1. Updating a Configuration Using cman_tool version -r
6.4.2. Updating a Configuration Using scp
6.5. Diagnosing and Correcting Problems in a Cluster
A. Fence Device Parameters
B. HA Resource Parameters
C. HA Resource Behavior
C.1. Parent, Child, and Sibling Relationships Among Resources
C.2. Sibling Start Ordering and Resource Child Ordering
C.2.1. Typed Child Resource Start and Stop Ordering
C.2.2. Non-typed Child Resource Start and Stop Ordering
C.3. Inheritance, the <resources> Block, and Reusing Resources
C.4. Failure Recovery and Independent Subtrees
C.5. Debugging and Testing Services and Resource Ordering
D. Command Line Tools Summary
E. Revision History
Index

 
 
  Published under the terms of the Creative Commons License Design by Interspire