iii
Introduction v
1. Document Conventions ................................................................................................... vi
1.1. Typographic Conventions ..................................................................................... vi
1.2. Pull-quote Conventions ....................................................................................... viii
1.3. Notes and Warnings ........................................................................................... viii
2. Feedback ....................................................................................................................... ix
1. Red Hat Cluster Configuration and Management Overview 1
1.1. Configuration Basics ..................................................................................................... 1
1.1.1. Setting Up Hardware ......................................................................................... 1
1.1.2. Installing Red Hat Cluster software ..................................................................... 2
1.1.3. Configuring Red Hat Cluster Software ................................................................ 2
1.2. Conga ......................................................................................................................... 4
1.3. system-config-cluster Cluster Administration GUI ........................................................... 6
1.3.1. Cluster Configuration Tool .................................................................................. 7
1.3.2. Cluster Status Tool ............................................................................................ 8
1.4. Command Line Administration Tools ............................................................................. 9
2. Before Configuring a Red Hat Cluster 11
2.1. Compatible Hardware ................................................................................................. 11
2.2. Enabling IP Ports ....................................................................................................... 11
2.2.1. Enabling IP Ports on Cluster Nodes .................................................................. 11
2.2.2. Enabling IP Ports on Computers That Run luci .................................................. 12
2.2.3. Examples of iptables Rules .............................................................................. 13
2.3. Configuring ACPI For Use with Integrated Fence Devices ............................................. 14
2.3.1. Disabling ACPI Soft-Off with chkconfig Management .......................................... 15
2.3.2. Disabling ACPI Soft-Off with the BIOS .............................................................. 16
2.3.3. Disabling ACPI Completely in the grub.conf File ................................................ 18
2.4. Configuring max_luns ................................................................................................. 19
2.5. Considerations for Using Quorum Disk ........................................................................ 20
2.6. Red Hat Cluster Suite and SELinux ............................................................................. 21
2.7. Considerations for Using Conga .................................................................................. 21
2.8. General Configuration Considerations .......................................................................... 22
3. Configuring Red Hat Cluster With Conga 23
3.1. Configuration Tasks .................................................................................................... 23
3.2. Starting luci and ricci .................................................................................................. 23
3.3. Creating A Cluster ...................................................................................................... 25
3.4. Global Cluster Properties ............................................................................................ 26
3.5. Configuring Fence Devices ......................................................................................... 28
3.5.1. Creating a Shared Fence Device ...................................................................... 29
3.5.2. Modifying or Deleting a Fence Device ............................................................... 31
3.6. Configuring Cluster Members ...................................................................................... 31
3.6.1. Initially Configuring Members ............................................................................ 31
3.6.2. Adding a Member to a Running Cluster ............................................................ 32
3.6.3. Deleting a Member from a Cluster .................................................................... 33
3.7. Configuring a Failover Domain .................................................................................... 34
3.7.1. Adding a Failover Domain ................................................................................ 35
3.7.2. Modifying a Failover Domain ............................................................................ 36
3.8. Adding Cluster Resources .......................................................................................... 37
3.9. Adding a Cluster Service to the Cluster ....................................................................... 39
3.10. Configuring Cluster Storage ...................................................................................... 40