Cari di RHE Linux 
    Red Hat Enterprise Linux Manual
Daftar Isi
(Sebelumnya) 11 : Chapter 7. File Systems - ...12 : Chapter 2. Before Configu ... (Berikutnya)

Cluster Administration

Configuring and Managing the High Availability Add-On

Edition 0

Legal Notice

Copyright © 2013 Red Hat, Inc. and others.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution-Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
All other trademarks are the property of their respective owners.


1801 Varsity Drive
RaleighNC 27606-2072 USA
Phone: +1 919 754 3700
Phone: 888 733 4281
Fax: +1 919 754 3701

Daftar Isi

Abstract

Configuring and Managing the High Availability Add-On describes the configuration and management of the High Availability Add-On for Red Hat Enterprise Linux 6.
Introduction
1. Document Conventions
1.1. Typographic Conventions
1.2. Pull-quote Conventions
1.3. Notes and Warnings
2. Feedback
1. Red Hat High Availability Add-On Configuration and Management Overview
1.1. New and Changed Features
1.1.1. New and Changed Features for Red Hat Enterprise Linux 6.1
1.1.2. New and Changed Features for Red Hat Enterprise Linux 6.2
1.1.3. New and Changed Features for Red Hat Enterprise Linux 6.3
1.1.4. New and Changed Features for Red Hat Enterprise Linux 6.4
1.2. Configuration Basics
1.3. Setting Up Hardware
1.4. Installing Red Hat High Availability Add-On software
1.5. Configuring Red Hat High Availability Add-On Software
2. Before Configuring the Red Hat High Availability Add-On
2.1. General Configuration Considerations
2.2. Compatible Hardware
2.3. Enabling IP Ports
2.3.1. Enabling IP Ports on Cluster Nodes
2.3.2. Enabling the IP Port for luci
2.3.3. Configuring the iptables Firewall to Allow Cluster Components
2.4. Configuring luci with /etc/sysconfig/luci
2.5. Configuring ACPI For Use with Integrated Fence Devices
2.5.1. Disabling ACPI Soft-Off with chkconfig Management
2.5.2. Disabling ACPI Soft-Off with the BIOS
2.5.3. Disabling ACPI Completely in the grub.conf File
2.6. Considerations for Configuring HA Services
2.7. Configuration Validation
2.8. Considerations for NetworkManager
2.9. Considerations for Using Quorum Disk
2.10. Red Hat High Availability Add-On and SELinux
2.11. Multicast Addresses
2.12. UDP Unicast Traffic
2.13. Considerations for ricci
2.14. Configuring Virtual Machines in a Clustered Environment
3. Configuring Red Hat High Availability Add-On With Conga
3.1. Configuration Tasks
3.2. Starting luci
3.3. Controlling Access to luci
3.4. Creating a Cluster
3.5. Global Cluster Properties
3.5.1. Configuring General Properties
3.5.2. Configuring Fence Daemon Properties
3.5.3. Network Configuration
3.5.4. Configuring Redundant Ring Protocol
3.5.5. Quorum Disk Configuration
3.5.6. Logging Configuration
3.6. Configuring Fence Devices
3.6.1. Creating a Fence Device
3.6.2. Modifying a Fence Device
3.6.3. Deleting a Fence Device
3.7. Configuring Fencing for Cluster Members
3.7.1. Configuring a Single Fence Device for a Node
3.7.2. Configuring a Backup Fence Device
3.7.3. Configuring a Node with Redundant Power
3.8. Configuring a Failover Domain
3.8.1. Adding a Failover Domain
3.8.2. Modifying a Failover Domain
3.8.3. Deleting a Failover Domain
3.9. Configuring Global Cluster Resources
3.10. Adding a Cluster Service to the Cluster
4. Managing Red Hat High Availability Add-On With Conga
4.1. Adding an Existing Cluster to the luci Interface
4.2. Removing a Cluster from the luci Interface
4.3. Managing Cluster Nodes
4.3.1. Rebooting a Cluster Node
4.3.2. Causing a Node to Leave or Join a Cluster
4.3.3. Adding a Member to a Running Cluster
4.3.4. Deleting a Member from a Cluster
4.4. Starting, Stopping, Restarting, and Deleting Clusters
4.5. Managing High-Availability Services
4.6. Backing Up and Restoring the luci Configuration
5. Configuring Red Hat High Availability Add-On With the ccs Command
5.1. Operational Overview
5.1.1. Creating the Cluster Configuration File on a Local System
5.1.2. Viewing the Current Cluster Configuration
5.1.3. Specifying ricci Passwords with the ccs Command
5.1.4. Modifying Cluster Configuration Components
5.1.5. Commands that Overwrite Previous Settings
5.1.6. Configuration Validation
5.2. Configuration Tasks
5.3. Starting ricci
5.4. Creating A Cluster
5.5. Configuring Fence Devices
5.6. Listing Fence Devices and Fence Device Options
5.7. Configuring Fencing for Cluster Members
5.7.1. Configuring a Single Power-Based Fence Device for a Node
5.7.2. Configuring a Single Storage-Based Fence Device for a Node
5.7.3. Configuring a Backup Fence Device
5.7.4. Configuring a Node with Redundant Power
5.7.5. Removing Fence Methods and Fence Instances
5.8. Configuring a Failover Domain
5.9. Configuring Global Cluster Resources
5.10. Adding a Cluster Service to the Cluster
5.11. Listing Available Cluster Services
5.12. Virtual Machine Resources
5.13. Configuring a Quorum Disk
5.14. Miscellaneous Cluster Configuration
5.14.1. Cluster Configuration Version
5.14.2. Multicast Configuration
5.14.3. Configuring a Two-Node Cluster
5.14.4. Logging
5.14.5. Configuring Redundant Ring Protocol
5.15. Propagating the Configuration File to the Cluster Nodes
6. Managing Red Hat High Availability Add-On With ccs
6.1. Managing Cluster Nodes
6.1.1. Causing a Node to Leave or Join a Cluster
6.1.2. Adding a Member to a Running Cluster
6.2. Starting and Stopping a Cluster
6.3. Diagnosing and Correcting Problems in a Cluster
7. Configuring Red Hat High Availability Add-On With Command Line Tools
7.1. Configuration Tasks
7.2. Creating a Basic Cluster Configuration File
7.3. Configuring Fencing
7.4. Configuring Failover Domains
7.5. Configuring HA Services
7.5.1. Adding Cluster Resources
7.5.2. Adding a Cluster Service to the Cluster
7.6. Configuring Redundant Ring Protocol
7.7. Configuring Debug Options
7.8. Verifying a Configuration
8. Managing Red Hat High Availability Add-On With Command Line Tools
8.1. Starting and Stopping the Cluster Software
8.1.1. Starting Cluster Software
8.1.2. Stopping Cluster Software
8.2. Deleting or Adding a Node
8.2.1. Deleting a Node from a Cluster
8.2.2. Adding a Node to a Cluster
8.2.3. Examples of Three-Node and Two-Node Configurations
8.3. Managing High-Availability Services
8.3.1. Displaying HA Service Status with clustat
8.3.2. Managing HA Services with clusvcadm
8.4. Updating a Configuration
8.4.1. Updating a Configuration Using cman_tool version -r
8.4.2. Updating a Configuration Using scp
9. Diagnosing and Correcting Problems in a Cluster
9.1. Configuration Changes Do Not Take Effect
9.2. Cluster Does Not Form
9.3. Nodes Unable to Rejoin Cluster after Fence or Reboot
9.4. Cluster Daemon crashes
9.4.1. Capturing the rgmanager Core at Runtime
9.4.2. Capturing the Core When the Daemon Crashes
9.4.3. Recording a gdb Backtrace Session
9.5. Cluster Services Hang
9.6. Cluster Service Will Not Start
9.7. Cluster-Controlled Services Fails to Migrate
9.8. Each Node in a Two-Node Cluster Reports Second Node Down
9.9. Nodes are Fenced on LUN Path Failure
9.10. Quorum Disk Does Not Appear as Cluster Member
9.11. Unusual Failover Behavior
9.12. Fencing Occurs at Random
9.13. Debug Logging for Distributed Lock Manager (DLM) Needs to be Enabled
10. SNMP Configuration with the Red Hat High Availability Add-On
10.1. SNMP and the Red Hat High Availability Add-On
10.2. Configuring SNMP with the Red Hat High Availability Add-On
10.3. Forwarding SNMP traps
10.4. SNMP Traps Produced by Red Hat High Availability Add-On
11. Clustered Samba Configuration
11.1. CTDB Overview
11.2. Required Packages
11.3. GFS2 Configuration
11.4. CTDB Configuration
11.5. Samba Configuration
11.6. Starting CTDB and Samba Services
11.7. Using the Clustered Samba Server
A. Fence Device Parameters
B. HA Resource Parameters
C. HA Resource Behavior
C.1. Parent, Child, and Sibling Relationships Among Resources
C.2. Sibling Start Ordering and Resource Child Ordering
C.2.1. Typed Child Resource Start and Stop Ordering
C.2.2. Non-typed Child Resource Start and Stop Ordering
C.3. Inheritance, the <resources> Block, and Reusing Resources
C.4. Failure Recovery and Independent Subtrees
C.5. Debugging and Testing Services and Resource Ordering
D. Cluster Service Resource Check and Failover Timeout
D.1. Modifying the Resource Status Check Interval
D.2. Enforcing Resource Timeouts
E. Command Line Tools Summary
F. High Availability LVM (HA-LVM)
F.1. Configuring HA-LVM Failover with CLVM (preferred)
F.2. Configuring HA-LVM Failover with Tagging
G. Revision History
Index

Introduction

This document provides information about installing, configuring and managing Red Hat High Availability Add-On components. Red Hat High Availability Add-On components allow you to connect a group of computers (called nodes or members) to work together as a cluster. In this document, the use of the word cluster or clusters is used to refer to a group of computers running the Red Hat High Availability Add-On.
The audience of this document should have advanced working knowledge of Red Hat Enterprise Linux and understand the concepts of clusters, storage, and server computing.
This document is organized as follows:
For more information about Red Hat Enterprise Linux 6, refer to the following resources:
  • Red Hat Enterprise Linux Installation Guide - Provides information regarding installation of Red Hat Enterprise Linux 6.
  • Red Hat Enterprise Linux Deployment Guide - Provides information regarding the deployment, configuration and administration of Red Hat Enterprise Linux 6.
For more information about the High Availability Add-On and related products for Red Hat Enterprise Linux 6, refer to the following resources:
  • High Availability Add-On Overview - Provides a high-level overview of the Red Hat High Availability Add-On.
  • Logical Volume Manager Administration - Provides a description of the Logical Volume Manager (LVM), including information on running LVM in a clustered environment.
  • Global File System 2: Configuration and Administration - Provides information about installing, configuring, and maintaining Red Hat GFS2 (Red Hat Global File System 2), which is included in the Resilient Storage Add-On.
  • DM Multipath - Provides information about using the Device-Mapper Multipath feature of Red Hat Enterprise Linux 6.
  • Load Balancer Administration - Provides information on configuring high-performance systems and services with the Load Balancer Add-On, a set of integrated software components that provide Linux Virtual Servers (LVS) for balancing IP load across a set of real servers.
  • Release Notes - Provides information about the current release of Red Hat products.
High Availability Add-On documentation and other Red Hat documents are available in HTML, PDF, and RPM versions on the Red Hat Enterprise Linux Documentation CD and online at http://docs.redhat.com/docs/en-US/index.html.

1. Document Conventions

This manual uses several conventions to highlight certain words and phrases and draw attention to specific pieces of information.
In PDF and paper editions, this manual uses typefaces drawn from the Liberation Fonts set. The Liberation Fonts set is also used in HTML editions if the set is installed on your system. If not, alternative but equivalent typefaces are displayed. Note: Red Hat Enterprise Linux 5 and later includes the Liberation Fonts set by default.

1.1. Typographic Conventions

Four typographic conventions are used to call attention to specific words and phrases. These conventions, and the circumstances they apply to, are as follows.
Mono-spaced Bold
Used to highlight system input, including shell commands, file names and paths. Also used to highlight keys and key combinations. For example:
To see the contents of the file my_next_bestselling_novel in your current working directory, enter the cat my_next_bestselling_novel command at the shell prompt and press Enter to execute the command.
The above includes a file name, a shell command and a key, all presented in mono-spaced bold and all distinguishable thanks to context.
Key combinations can be distinguished from an individual key by the plus sign that connects each part of a key combination. For example:
Press Enter to execute the command.
Press Ctrl+Alt+F2 to switch to a virtual terminal.
The first example highlights a particular key to press. The second example highlights a key combination: a set of three keys pressed simultaneously.
If source code is discussed, class names, methods, functions, variable names and returned values mentioned within a paragraph will be presented as above, in mono-spaced bold. For example:
File-related classes include filesystem for file systems, file for files, and dir for directories. Each class has its own associated set of permissions.
Proportional Bold
This denotes words or phrases encountered on a system, including application names; dialog box text; labeled buttons; check-box and radio button labels; menu titles and sub-menu titles. For example:
Choose SystemPreferencesMouse from the main menu bar to launch Mouse Preferences. In the Buttons tab, click the Left-handed mouse check box and click Close to switch the primary mouse button from the left to the right (making the mouse suitable for use in the left hand).
To insert a special character into a gedit file, choose ApplicationsAccessoriesCharacter Map from the main menu bar. Next, choose SearchFind . . . . . . from the Character Map menu bar, type the name of the character in the Search field and click Next. The character you sought will be highlighted in the Character Table. Double-click this highlighted character to place it in the Text to copy field and then click the Copy button. Now switch back to your document and choose EditPaste from the gedit menu bar.
The above text includes application names; system-wide menu names and items; application-specific menu names; and buttons and text found within a GUI interface, all presented in proportional bold and all distinguishable by context.
Mono-spaced Bold Italic or Proportional Bold Italic
Whether mono-spaced bold or proportional bold, the addition of italics indicates replaceable or variable text. Italics denotes text you do not input literally or displayed text that changes depending on circumstance. For example:
To connect to a remote machine using ssh, type ssh username@domain.name at a shell prompt. If the remote machine is example.com and your username on that machine is john, type ssh [email protected].
The mount -o remount file-system command remounts the named file system. For example, to remount the /home file system, the command is mount -o remount /home.
To see the version of a currently installed package, use the rpm -q package command. It will return a result as follows: package-version-release.
Note the words in bold italics above - username, domain.name, file-system, package, version and release. Each word is a placeholder, either for text you enter when issuing a command or for text displayed by the system.
Aside from standard usage for presenting the title of a work, italics denotes the first use of a new and important term. For example:
Publican is a DocBook publishing system.

1.2. Pull-quote Conventions

Terminal output and source code listings are set off visually from the surrounding text.
Output sent to a terminal is set in mono-spaced roman and presented thus:
books Desktop   documentation  drafts  mss photos   stuff  svnbooks_tests  Desktop1  downloads  images  notes  scripts  svgs
Source-code listings are also set in mono-spaced roman but add syntax highlighting as follows:
package org.jboss.book.jca.ex1;import javax.naming.InitialContext;public class ExClient{   public static void main(String args[]) throws Exception   {  InitialContext iniCtx = new InitialContext();  Object ref = iniCtx.lookup("EchoBean");  EchoHome   home   = (EchoHome) ref;  Echo   echo   = home.create();  System.out.println("Created Echo");  System.out.println("Echo.echo('Hello') = " + echo.echo("Hello"));   }}

1.3. Notes and Warnings

Finally, we use three visual styles to draw attention to information that might otherwise be overlooked.

Note

Notes are tips, shortcuts or alternative approaches to the task at hand. Ignoring a note should have no negative consequences, but you might miss out on a trick that makes your life easier.

Important

Important boxes detail things that are easily missed: configuration changes that only apply to the current session, or services that need restarting before an update will apply. Ignoring a box labeled 'Important' will not cause data loss but may cause irritation and frustration.

Warning

Warnings should not be ignored. Ignoring warnings will most likely cause data loss.

2. Feedback

If you spot a typo, or if you have thought of a way to make this manual better, we would love to hear from you. Please submit a report in Bugzilla (http://bugzilla.redhat.com/bugzilla/) against the component doc-Cluster_Administration.
Be sure to mention the manual identifier:
Cluster_Administration(EN)-6 (2013-2-15T16:26)
By mentioning this manual's identifier, we know exactly which version of the guide you have.
If you have a suggestion for improving the documentation, try to be as specific as possible. If you have found an error, please include the section number and some of the surrounding text so we can find it easily.

Chapter 1. Red Hat High Availability Add-On Configuration and Management Overview

Red Hat High Availability Add-On allows you to connect a group of computers (called nodes or members) to work together as a cluster. You can use Red Hat High Availability Add-On to suit your clustering needs (for example, setting up a cluster for sharing files on a GFS2 file system or setting up service failover).

Note

For information on best practices for deploying and upgrading Red Hat Enterprise Linux clusters using the High Availability Add-On and Red Hat Global File System 2 (GFS2) refer to the article "Red Hat Enterprise Linux Cluster, High Availability, and GFS Deployment Best Practices" on Red Hat Customer Portal at . https://access.redhat.com/kb/docs/DOC-40821.
This chapter provides a summary of documentation features and updates that have been added to the Red Hat High Availability Add-On since the initial release of Red Hat Enterprise Linux 6, followed by an overview of configuring and managing the Red Hat High Availability Add-On.

1.1. New and Changed Features

This section lists new and changed features of the Red Hat High Availability Add-On documentation that have been added since the initial release of Red Hat Enterprise Linux 6.

1.1.1. New and Changed Features for Red Hat Enterprise Linux 6.1

Red Hat Enterprise Linux 6.1 includes the following documentation and feature updates and changes.
In addition, small corrections and clarifications have been made throughout the document.

1.1.2. New and Changed Features for Red Hat Enterprise Linux 6.2

Red Hat Enterprise Linux 6.2 includes the following documentation and feature updates and changes.
  • Red Hat Enterprise Linux now provides support for running Clustered Samba in an active/active configuration. For information on clustered Samba configuration, refer to Chapter 11, Clustered Samba Configuration.
  • Although any user able to authenticate on the system that is hosting luci can log in to luci, as of Red Hat Enterprise Linux 6.2 only the root user on the system that is running luci can access any of the luci components until an administrator (the root user or a user with administrator permission) sets permissions for that user. For information on setting luci permissions for users, refer to Section 3.3, "Controlling Access to luci".
  • The nodes in a cluster can communicate with each other using the UDP unicast transport mechanism. For information on configuring UDP unicast, refer to Section 2.12, "UDP Unicast Traffic".
  • You can now configure some aspects of luci's behavior by means of the /etc/sysconfig/luci file. For example, you can specifically configure the only IP address luci is being served at. For information on configuring the only IP address luci is being served at, refer to Table 2.2, "Enabled IP Port on a Computer That Runs luci". For information on the /etc/sysconfig/luci file in general, refer to Section 2.4, "Configuring luci with /etc/sysconfig/luci".
  • The ccs command now includes the --lsfenceopts option, which prints a list of available fence devices, and the --lsfenceopts fence_type option, which prints each available fence type. For information on these options, refer to Section 5.6, "Listing Fence Devices and Fence Device Options".
  • The ccs command now includes the --lsserviceopts option, which prints a list of cluster services currently available for your cluster, and the --lsserviceopts service_type option, which prints a list of the options you can specify for a particular service type. For information on these options, refer to Section 5.11, "Listing Available Cluster Services".
  • The Red Hat Enterprise Linux 6.2 release provides support for the VMware (SOAP Interface) fence agent. For information on fence device parameters, refer to Appendix A, Fence Device Parameters.
  • The Red Hat Enterprise Linux 6.2 release provides support for the RHEV-M REST API fence agent, against RHEV 3.0 and later. For information on fence device parameters, refer to Appendix A, Fence Device Parameters.
  • As of the Red Hat Enterprise Linux 6.2 release, when you configure a virtual machine in a cluster with the ccs command you can use the --addvm option (rather than the addservice option). This ensures that the vm resource is defined directly under the rm configuration node in the cluster configuration file. For information on configuring virtual machine resources with the ccs command, refer to Section 5.12, "Virtual Machine Resources".
  • This document includes a new appendix, Appendix D, Cluster Service Resource Check and Failover Timeout. This appendix describes how rgmanager monitors the status of cluster resources, and how to modify the status check interval. The appendix also describes the __enforce_timeouts service parameter, which indicates that a timeout for an operation should cause a service to fail.
  • This document includes a new section, Section 2.3.3, "Configuring the iptables Firewall to Allow Cluster Components". This section shows the filtering you can use to allow multicast traffic through the iptables firewall for the various cluster components.
In addition, small corrections and clarifications have been made throughout the document.

1.1.3. New and Changed Features for Red Hat Enterprise Linux 6.3

Red Hat Enterprise Linux 6.3 includes the following documentation and feature updates and changes.
In addition, small corrections and clarifications have been made throughout the document.

1.1.4. New and Changed Features for Red Hat Enterprise Linux 6.4

Red Hat Enterprise Linux 6.4 includes the following documentation and feature updates and changes.
In addition, small corrections and clarifications have been made throughout the document.

1.2. Configuration Basics

To set up a cluster, you must connect the nodes to certain cluster hardware and configure the nodes into the cluster environment. Configuring and managing the Red Hat High Availability Add-On consists of the following basic steps:
  1. Setting up hardware. Refer to Section 1.3, "Setting Up Hardware".
  2. Installing Red Hat High Availability Add-On software. Refer to Section 1.4, "Installing Red Hat High Availability Add-On software".
  3. Configuring Red Hat High Availability Add-On Software. Refer to Section 1.5, "Configuring Red Hat High Availability Add-On Software".

1.3. Setting Up Hardware

Setting up hardware consists of connecting cluster nodes to other hardware required to run the Red Hat High Availability Add-On. The amount and type of hardware varies according to the purpose and availability requirements of the cluster. Typically, an enterprise-level cluster requires the following type of hardware (refer to Figure 1.1, "Red Hat High Availability Add-On Hardware Overview"). For considerations about hardware and other cluster configuration concerns, refer to Chapter 2, Before Configuring the Red Hat High Availability Add-On or check with an authorized Red Hat representative.
  • Cluster nodes - Computers that are capable of running Red Hat Enterprise Linux 6 software, with at least 1GB of RAM.
  • Ethernet switch or hub for public network - This is required for client access to the cluster.
  • Ethernet switch or hub for private network - This is required for communication among the cluster nodes and other cluster hardware such as network power switches and Fibre Channel switches.
  • Network power switch - A network power switch is recommended to perform fencing in an enterprise-level cluster.
  • Fibre Channel switch - A Fibre Channel switch provides access to Fibre Channel storage. Other options are available for storage according to the type of storage interface; for example, iSCSI. A Fibre Channel switch can be configured to perform fencing.
  • Storage - Some type of storage is required for a cluster. The type required depends on the purpose of the cluster.
Red Hat High Availability Add-On Hardware Overview
cluster hardware

Figure 1.1. Red Hat High Availability Add-On Hardware Overview


1.4. Installing Red Hat High Availability Add-On software

To install Red Hat High Availability Add-On software, you must have entitlements for the software. If you are using the luci configuration GUI, you can let it install the cluster software. If you are using other tools to configure the cluster, secure and install the software as you would with Red Hat Enterprise Linux software.
You can use the following yum install command to install the Red Hat High Availability Add-On software packages:
# yum install rgmanager lvm2-cluster gfs2-utils
Note that installing only the rgmanager will pull in all necessary dependencies to create an HA cluster from the HighAvailability channel. The lvm2-cluster and gfs2-utils packages are part of ResilientStorage channel and may not be needed by your site.

Upgrading Red Hat High Availability Add-On Software

It is possible to upgrade the cluster software on a given major release of Red Hat Enterprise Linux without taking the cluster out of production. Doing so requires disabling the cluster software on one host at a time, upgrading the software, and restarting the cluster software on that host.
  1. Shut down all cluster services on a single cluster node. For instructions on stopping cluster software on a node, refer to Section 8.1.2, "Stopping Cluster Software". It may be desirable to manually relocate cluster-managed services and virtual machines off of the host prior to stopping rgmanager.
  2. Execute the yum update command to update installed packages.
  3. Reboot the cluster node or restart the cluster services manually. For instructions on starting cluster software on a node, refer to Section 8.1.1, "Starting Cluster Software".

1.5. Configuring Red Hat High Availability Add-On Software

Configuring Red Hat High Availability Add-On software consists of using configuration tools to specify the relationship among the cluster components. The following cluster configuration tools are available with Red Hat High Availability Add-On:

Note

system-config-cluster is not available in Red Hat Enterprise Linux 6.
(Sebelumnya) 11 : Chapter 7. File Systems - ...12 : Chapter 2. Before Configu ... (Berikutnya)