SUSE Linux Enterprise High Availability Extension 12

Administration Guide

Authors: Tanja Roth and Thomas Schraitle
Publication date: Sep 25 2014
About This Guide
Feedback
Documentation Conventions
I Installation and Setup
1 Product Overview
1.1 Availability as Add-On/Extension
1.2 Key Features
1.3 Benefits
1.4 Cluster Configurations: Storage
1.5 Architecture
2 System Requirements and Recommendations
2.1 Hardware Requirements
2.2 Software Requirements
2.3 Storage Requirements
2.4 Other Requirements and Recommendations
3 Installation and Basic Setup
3.1 Definition of Terms
3.2 Overview
3.3 Installation as Add-on
3.4 Automatic Cluster Setup (ha-cluster-bootstrap)
3.5 Manual Cluster Setup (YaST)
3.6 Mass Deployment with AutoYaST
II Configuration and Administration
4 Configuration and Administration Basics
4.1 Global Cluster Options
4.2 Cluster Resources
4.3 Resource Monitoring
4.4 Resource Constraints
4.5 Managing Services on Remote Hosts
4.6 Monitoring System Health
4.7 Maintenance Mode
4.8 For More Information
5 Configuring and Managing Cluster Resources (Web Interface)
5.1 Hawk—Overview
5.2 Configuring Global Cluster Options
5.3 Configuring Cluster Resources
5.4 Managing Cluster Resources
5.5 Monitoring Multiple Clusters
5.6 Hawk for GEO Clusters
5.7 Troubleshooting
6 Configuring and Managing Cluster Resources (Command Line)
6.1 crmsh—Overview
6.2 Managing Corosync Configuration
6.3 Configuring Global Cluster Options
6.4 Configuring Cluster Resources
6.5 Managing Cluster Resources
6.6 Setting Passwords Independent of cib.xml
6.7 Retrieving History Information
6.8 For More Information
7 Adding or Modifying Resource Agents
7.1 STONITH Agents
7.2 Writing OCF Resource Agents
7.3 OCF Return Codes and Failure Recovery
8 Fencing and STONITH
8.1 Classes of Fencing
8.2 Node Level Fencing
8.3 STONITH Configuration
8.4 Monitoring Fencing Devices
8.5 Special Fencing Devices
8.6 Basic Recommendations
8.7 For More Information
9 Access Control Lists
9.1 Requirements and Prerequisites
9.2 Enabling Use of ACLs In Your Cluster
9.3 The Basics of ACLs
9.4 Configuring ACLs with Hawk
9.5 Configuring ACLs with crmsh
9.6 For More Information
10 Network Device Bonding
10.1 Configuring Bonding Devices with YaST
10.2 Hotplugging of Bonding Slaves
10.3 For More Information
11 Load Balancing
11.1 Conceptual Overview
11.2 Configuring Load Balancing with Linux Virtual Server
11.3 Configuring Load Balancing with HAProxy
11.4 For More Information
12 GEO Clusters (Multi-Site Clusters)
III Storage and Data Replication
13 OCFS2
13.1 Features and Benefits
13.2 OCFS2 Packages and Management Utilities
13.3 Configuring OCFS2 Services and a STONITH Resource
13.4 Creating OCFS2 Volumes
13.5 Mounting OCFS2 Volumes
13.6 Configuring OCFS2 Resources With Hawk
13.7 Using Quotas on OCFS2 File Systems
13.8 For More Information
14 GFS2
14.1 GFS2 Packages and Management Utilities
14.2 Configuring GFS2 Services and a STONITH Resource
14.3 Creating GFS2 Volumes
14.4 Mounting GFS2 Volumes
15 DRBD
15.1 Conceptual Overview
15.2 Installing DRBD Services
15.3 Configuring the DRBD Service
15.4 Testing the DRBD Service
15.5 Tuning DRBD
15.6 Troubleshooting DRBD
15.7 For More Information
16 Cluster Logical Volume Manager (cLVM)
16.1 Conceptual Overview
16.2 Configuration of cLVM
16.3 Configuring Eligible LVM2 Devices Explicitly
16.4 For More Information
17 Storage Protection
17.1 Storage-based Fencing
17.2 Ensuring Exclusive Storage Activation
17.3 For More Information
18 Samba Clustering
18.1 Conceptual Overview
18.2 Basic Configuration
18.3 Joining an Active Directory Domain
18.4 Debugging and Testing Clustered Samba
18.5 For More Information
19 Disaster Recovery with Rear (Relax-and-Recover)
19.1 Conceptual Overview
19.2 Preparing for the Worst Scenarios: Disaster Recovery Plans
19.3 Setting Up Rear
19.4 Storing your Backup on a NFS Server
19.5 Using the YaST Rear Module
19.6 For More Information
IV Appendix
A Troubleshooting
A.1 Installation and First Steps
A.2 Logging
A.3 Resources
A.4 STONITH and Fencing
A.5 Miscellaneous
A.6 Fore More Information
B Naming Conventions
C Cluster Management Tools
D Upgrading Your Cluster and Updating Software Packages
D.1 Terminology
D.2 Upgrading your Cluster to the Latest Product Version
D.3 Updating Software Packages on Cluster Nodes
D.4 For More Information
E Documentation Updates
E.1 October, 2014 (Initial Release of SUSE Linux Enterprise High Availability Extension 12)
Terminology
F GNU Licenses
F.1 GNU Free Documentation License

Copyright © 2006–2017 SUSE LLC and contributors. All rights reserved.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled GNU Free Documentation License.

For SUSE or Novell trademarks, see the Novell Trademark and Service Mark list http://www.novell.com/company/legal/trademarks/tmlist.html. All other third party trademarks are the property of their respective owners. A trademark symbol (®, ™ etc.) denotes a SUSE or Novell trademark; an asterisk (*) denotes a third party trademark.

All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof.

Print this page