Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States
and other countries.
All other trademarks referencedherein are the property of their respective owners.
The GPG fingerprint of the security@redhat.comkey is:
CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E
Table of Contents
Introduction........................................................................................................................ i
1. Audience .............................................................................................................. i
2. Document Conventions........................................................................................ i
3. More to Come .................................................................................................... iv
3.1. Send in Your Feedback ....................................................................... iv
4. Activate Your Subscription ..................................................................................v
4.1. Provide a Red Hat Login.......................................................................v
4.2. Provide Your Subscription Number .................................................... vi
4.3. Connect Your System.......................................................................... vi
5. Recommended References................................................................................. vi
Welcome to the Red Hat GFS Administrator’s Guide. This book provides information
about installing, configuring, and maintaining Red Hat GFS (Red Hat Global File System). Red Hat GFS depends on the cluster infrastructure of Red Hat Cluster Suite. For
information about Red Hat Cluster Suite refer to Red Hat Cluster Suite Configuring andManaging a Cluster.
HTML and PDF versions of all the official Red Hat Enterprise Linux manuals and release
notes are available online at http://www.redhat.com/docs/.
1. Audience
This book is intended primarily for Linux system administrators who are familiar with the
following activities:
• Linux system administration procedures, including kernel configuration
• Installation and configuration of shared storage networks, such as Fibre Channel SANs
2. Document Conventions
In this manual, certain words are represented in different fonts, typefaces, sizes, and
weights. This highlighting is systematic; different words are represented in the same style
to indicate their inclusion in a specific category. The types of words that are represented
this way include the following:
command
Linux commands (and other operating system commands, when used) are represented
this way. This style should indicate to you that you can type the word or phrase on
the command line and press [Enter] to invoke a command. Sometimes a command
contains words that would be displayed in a different style on their own (such as file
names). In these cases, they are considered to be part of the command, so the entire
phrase is displayed as a command. For example:
Use the cat testfile command to view the contents of a file, named testfile,
in the current working directory.
file name
File names, directory names, paths, and RPM package names are represented this
way. This style indicates that a particular file or directory exists with that name on
your system. Examples:
iiIntroduction
The .bashrc file in your home directory contains bash shell definitions and aliases
for your own use.
The /etc/fstab file contains information about different system devices and file
systems.
Install the webalizer RPM if you want to use a Web server log file analysis program.
application
This style indicates that the program is an end-user application (as opposed to system
software). For example:
Use Mozilla to browse the Web.
[key]
A key on the keyboard is shown in this style. For example:
To use [Tab] completion, type in a character and then press the [Tab] key. Your terminal displays the list of files in the directory that start with that letter.
[key]-[combination]
A combination of keystrokes is represented in this way. For example:
The [Ctrl]-[Alt]-[Backspace] key combination exits your graphical session and returns
you to the graphical login screen or the console.
text found on a GUI interface
A title, word, or phrase found on a GUI interface screen or window is shown in this
style. Text shown in this style indicates that a particular GUI screen or an element on
a GUI screen (such as text associated with a checkbox or field). Example:
Select the Require Password checkbox if you would like your screensaver to require
a password before stopping.
top level of a menu on a GUI screen or window
A word in this style indicates that the word is the top level of a pulldown menu. If you
click on the word on the GUI screen, the rest of the menu should appear. For example:
Under File on a GNOME terminal, the New Tab option allows you to open multiple
shell prompts in the same window.
Instructions to type in a sequence of commands from a GUI menu look like the following example:
Go to Applications (the main menu on the panel) => Programming => Emacs Text
Editor to start the Emacs text editor.
Introductioniii
button on a GUI screen or window
This style indicates that the text can be found on a clickable button on a GUI screen.
For example:
Click on the Back button to return to the webpage you last viewed.
computer output
Text in this style indicates text displayed to a shell prompt such as error messages and
responses to commands. For example:
The ls command displays the contents of a directory. For example:
The output returned in response to the command (in this case, the contents of the
directory) is shown in this style.
prompt
A prompt, which is a computer’s way of signifying that it is ready for you to input
something, is shown in this style. Examples:
$
#
[stephen@maturin stephen]$
leopard login:
user input
Text that the user types, either on the command line or into a text box on a GUI screen,
is displayed in this style. In the following example, text is displayed in this style:
To boot your system into the text based installation program, you must type in the
text command at the boot: prompt.
replaceable
Text used in examples that is meant to be replaced with data provided by the user
is displayed in this style. In the following example,
version-numberis dis-
played in this style:
The directory for the kernel source is /usr/src/kernels/
version-numberis the version and type of kernel installed on this
where
version-number/,
system.
Additionally, we use several different strategies to draw your attention to certain pieces of
information. In order of urgency, these items are marked as a note, tip, important, caution,
or warning. For example:
ivIntroduction
Note
Remember that Linux is case sensitive. In other words, a rose is not a ROSE is not a
rOsE.
Tip
The directory /usr/share/doc/ contains additional documentation for packages installed
on your system.
Important
If you modify the DHCP configuration file, the changes do not take effect until you restart
the DHCP daemon.
Caution
Do not perform routine tasks as root — use a regular user account unless you need to
use the root account for system administration tasks.
Warning
Be careful to remove only the necessary partitions. Removing other partitions could result
in data loss or a corrupted system environment.
3. More to Come
The Red Hat GFS Administrator’s Guide is part of Red Hat’s growing commitment to
provide useful and timely support to Red Hat Enterprise Linux users.
Introductionv
3.1. Send in Your Feedback
If you spot a typo in the Red Hat GFS Administrator’s Guide, or if you have thought of a
way to make this manual better, we would love to hear from you! Please submit a report in
Bugzilla (http://www.redhat.com/bugzilla) against the component rh-gfsg.
Be sure to mention the manual’s identifier:
rh-gfsg(EN)-6.1-Print-RHI (2007-01-05T17:28)
If you mention this manual’s identifier, we will know exactly which version of the guide
you have.
If you have a suggestion for improving the documentation, try to be as specific as possible.
If you have found an error, please include the section number and some of the surrounding
text so we can find it easily.
4. Activate Your Subscription
Before you can access service and software maintenance information, and the support documentation included in your subscription, you must activate your subscription by registering with Red Hat. Registration includes these simple steps:
• Provide a Red Hat login
• Provide a subscription number
• Connect your system
The first time you boot your installation of Red Hat Enterprise Linux, you are prompted to
register with Red Hat using the Setup Agent. If you follow the prompts during the SetupAgent, you can complete the registration steps and activate your subscription.
If you can not complete registration during the Setup Agent (which requires network
access), you can alternatively complete the Red Hat registration process online at
http://www.redhat.com/register/.
4.1. Provide a Red Hat Login
If you do not have an existing Red Hat login, you can create one when prompted during
the Setup Agent or online at:
• Software updates, errata and maintenance via Red Hat Network
viIntroduction
• Red Hat technical support resources, documentation, and Knowledgebase
If you have forgotten your Red Hat login, you can search for your Red Hat login online at:
https://rhn.redhat.com/help/forgot_password.pxt
4.2. Provide Your Subscription Number
Your subscription number is located in the package that came with your order. If your
package did not include a subscription number, your subscription was activated for you
and you can skip this step.
You can provide your subscription number when prompted during the Setup Agent or by
visiting http://www.redhat.com/register/.
4.3. Connect Your System
The Red Hat Network Registration Client helps you connect your system so that you can
begin to get updates and perform systems management. There are three ways to connect:
1. During the Setup Agent — Check the Send hardware information and Send sys-tem package list options when prompted.
2. After the Setup Agent has been completed — From Applications (the main menu
on the panel), go to System Tools, then select Red Hat Network.
3. After the Setup Agent has been completed — Enter the following command from
the command line as the root user:
• /usr/bin/up2date --register
5. Recommended References
For additional references about related topics, refer to the following table:
TopicReferenceComment
Shared Data Clustering and
File Systems
Shared Data Clusters by
Dilip M. Ranade. Wiley,
2002.
Provides detailed technical
information on cluster file
system and cluster
volume-manager design.
Introductionvii
TopicReferenceComment
Storage Area Networks
(SANs)
Applications and High
Availability
Table 1. Recommended References Table
Designing Storage Area
Networks: A Practical
Reference for Implementing
Fibre Channel and IP
SANs, Second Edition by
Tom Clark.
Addison-Wesley, 2003.
Building SANs with
Brocade Fabric Switches by
C. Beauchamp, J. Judd, and
B. Keo. Syngress, 2001.
Building Storage Networks,
Second Edition by Marc
Farley.
Osborne/McGraw-Hill,
2001.
Blueprints for High
Availability: Designing
Resilient Distributed
Systems by E. Marcus and
H. Stern. Wiley, 2000.
Provides a concise
summary of Fibre Channel
and IP SAN Technology.
Best practices for building
Fibre Channel SANs based
on the Brocade family of
switches, including
core-edge topology for
large SAN fabrics.
Provides a comprehensive
overview reference on
storage networking
technologies.
Provides a summary of
best practices in high
availability.
viiiIntroduction
Chapter 1.
GFS Overview
Red Hat GFS is a cluster file system that is available with Red Hat Cluster Suite. Red
Hat GFS nodes are configured and managed with Red Hat Cluster Suite configuration and
management tools. Red Hat GFS provides data sharing among GFS nodes in a Red Hat
cluster. GFS provides a single, consistent view of the file-system name space across the
GFS nodes in a Red Hat cluster. GFS allows applications to install and run without much
knowledge of the underlying storage infrastructure. GFS is fully compliant with the IEEE
POSIX interface, allowing applications to perform file operations as if they were running
on a local file system. Also, GFS provides features that are typically required in enterprise
environments, such as quotas, multiple journals, and multipath support.
GFS provides a versatile method of networking your storage according to the performance,
scalability, and economic needs of your storage environment. This chapter provides some
very basic, abbreviated information as background to help you understand GFS. It contains
the following sections:
• Section 1.1 New and Changed Features
• Section 1.2 Performance, Scalability, and Economy
• Section 1.3 GFS Functions
• Section 1.4 GFS Software Subsystems
• Section 1.5 Before Setting Up GFS
1.1. New and Changed Features
This section lists new and changed features included with the initial release of Red Hat
Red Hat GFS 6.1 and Red Hat GFS 6.1 for Red Hat Enterprise Linux 4 Update 2.
For information about upgrading from GFS 6.0 to GFS 6.1, refer to Appendix A UpgradingGFS.
Note
Multipath GNBD is not available with Red Hat GFS 6.1. That is, device mapper multipath
(dm-multipath) cannot use GNBD. GNBD without multipath is available.
New and Changed Features with the Initial Release of Red Hat GFS 6.1
2Chapter 1. GFS Overview
• Cluster infrastructure provided by Red Hat Cluster Suite — This release of Red Hat
GFS uses the cluster infrastructure of Red Hat Cluster Suite, taking advantage of the
Red Hat Cluster Suite configuration file and cluster graphical user interface (GUI),
system-config-cluster. For information about configuring and managing Red Hat
Cluster Suite, refer to Red Hat Cluster Suite Configuring and Managing a Cluster. Previous versions of Red Hat GFS provided a cluster infrastructure that was exclusive to
GFS (even though used with Red Hat Cluster Suite). Additionally, configuration files in
earlier versions of Red Hat GFS were created and maintained via text editors only (that
is, no GUI was available).
• Red Hat Cluster Suite lock architectures — Via Red Hat Cluster Suite, GFS can use the
following lock architectures:
• DLM (Distributed Lock Manager), new for Red Hat GFS 6.1 — DLM provides lock
management throughout a Red Hat cluster, requiring no nodes to be configured as
lock management nodes (contrasted to GULM, which does require certain nodes to
be configured as lock management nodes).
• GULM (Grand Unified Lock Manager) — A client/server lock architecture that is
compatible with Red Hat GFS 6.0.
• Nolock — For single node operation only.
• New volume manager, LVM2 — The pool volume manager in earlier releases of Red
Hat GFS is replaced with LVM2 for this release. LVM2 is used in conjunction with
CLVM (Cluster Logical Volume Manager). This release provides a tool to convert GFS
6.0 pool volumes to the LVM2 format. For information about converting pool volumes
to the LVM2 format, refer to Appendix A Upgrading GFS.
• Enhanced gfs_fsck performance and changes to the gfs_fsck command — The
gfs_fsck function performs 10 times as fast as gfs_fsck in earlier GFS releases.
(This enhancement has been included in a recent update to Red Hat GFS 6.0, also.) In
addition, the enhanced gfs_fsck function includes changes to certain command options. For more information about changes to the command options, refer to Section
5.12 Repairing a File System.
• Withdraw individual mount points — Allows individual GFS mount points to gracefully
discontinue operations on a node without causing that node to panic. This feature provides the ability to continue operations with unaffected file systems on that node. The
feature can be overridden to allow a node to panic, thereby providing more information for troubleshooting. For more information, refer to the mount command option,
oopses_ok, in Table 5-2
• Increased storage supported — Red Hat GFS supports 8 terabytes of storage per GFS
file system. For more information about Red Hat GFS requirements, refer to Chapter 2
System Requirements
Chapter 1. GFS Overview3
New and Changed Features with Red Hat GFS 6.1 for Red Hat Enterprise Linux 4
Update 2
Red Hat GFS 6.1 for Red Hat Enterprise Linux 4 Update 2 supports iSCSI and multipath
iSCSI. That is, device mapper multipath (dm-multipath) can use iSCSI.
1.2. Performance, Scalability, and Economy
You can deploy GFS in a variety of configurations to suit your needs for performance,
scalability, and economy. For superior performance and scalability, you can deploy GFS in
a cluster that is connected directly to a SAN. For more economical needs, you can deploy
GFS in a cluster that is connected to a LAN with servers that use GNBD (Global Network
Block Device). (For more information about GNBD, refer to Chapter 6 Using GNBD withRed Hat GFS.)
The following sections provide examples of how GFS can be deployed to suit your needs
for performance, scalability, and economy:
• Section 1.2.1 Superior Performance and Scalability
The deployment examples in this chapter reflect basic configurations; your needs might
require a combination of configurations shown in the examples.
1.2.1. Superior Performance and Scalability
You can obtain the highest shared-file performance when applications access storage directly. The GFS SAN configuration in Figure 1-1 provides superior file performance for
shared files and file systems. Linux applications run directly on GFS nodes. Without file
protocols or storage servers to slow data access, performance is similar to individual Linux
servers with directly connected storage; yet, each GFS application node has equal access
to all data files. GFS supports over 300 GFS nodes.
4Chapter 1. GFS Overview
SAN
Fabric
GFS
Applications
Shared Files
Figure 1-1. GFS with a SAN
1.2.2. Performance, Scalability, Moderate Price
Multiple Linux client applications on a LAN can share the same SAN-based data as shown
in Figure 1-2. SAN block storage is presented to network clients as block storage devices
by GNBD servers. From the perspective of a client application, storage is accessed as if
it were directly attached to the server in which the application is running. Stored data is
actually on the SAN. Storage devices and data can be equally shared by network client
applications. File locking and sharing functions are handled by GFS for each network
client.
Note
Clients implementing ext2 and ext3 file systems can be configured to access their own
dedicated slice of SAN storage.
Chapter 1. GFS Overview5
LAN
Clients
GNBD
servers
SAN
Fabric
GFS
Applications
Shared Files
Figure 1-2. GFS and GNBD with a SAN
1.2.3. Economy and Performance
Figure 1-3 shows how Linux client applications can take advantage of an existing Ethernet
topology to gain shared access to all block storage devices. Client data files and file systems
can be shared with GFS on each client. Application failover can be fully automated with
Red Hat Cluster Suite.
6Chapter 1. GFS Overview
LAN
Clients
GNBD
servers
Disk
A
GFS
Applications
Disk
B
Disk
D
Disk
C
Disk
E
Disk
F
Shared Files
Figure 1-3. GFS and GNBD with Directly Connected Storage
1.3. GFS Functions
GFS is a native file system that interfaces directly with the VFS layer of the Linux
kernel file-system interface. GFS is a cluster file system that employs distributed
metadata and multiple journals for optimal operation in a cluster. Cluster management
of GFS nodes is managed through Red Hat Cluster Suite. Volume management
is managed through CLVM (Cluster Logical Volume Manager). For information
about Red Hat Cluster Suite refer to Red Hat Cluster Suite Configuring andManaging a Cluster. For information about using CLVM, refer to the LVM HOWTO
(http://www.tldp.org/HOWTO/LVM-HOWTO/index.html).
Note
CLVM is a cluster-wide implementation of LVM, enabled by the CLVM daemon, clvmd
running in a Red Hat Cluster Suite cluster. The daemon makes it possible to use LVM2
to manage logical volumes across a cluster, allowing all nodes in the cluster to share the
logical volumes.
Chapter 1. GFS Overview7
GFS provides the following main functions:
• Making a File System
• Mounting a File System
• Unmounting a File System
• GFS Quota Management
• Growing a File System
• Adding Journals to a File System
• Direct I/O
• Data Journaling
• Configuring atime Updates
• Suspending Activity on a File System
• Displaying Extended GFS Information and Statistics
• Repairing a File System
• Context-Dependent Path Names (CDPN)
1.4. GFS Software Subsystems
GFS consists of the following subsystems: GFS and GNBD.
Table 1-1 summarizes the GFS Software subsystems and their components.
Software
ComponentsDescription
Subsystem
GFSgfs.koKernel module that implements the
GFS file system and is loaded on GFS
cluster nodes.
gfs_fsckCommand that repairs an unmounted
GFS file system.
gfs_growCommand that grows a mounted GFS
file system.
8Chapter 1. GFS Overview
Software
ComponentsDescription
Subsystem
gfs_jaddCommand that adds journals to a
mounted GFS file system.
gfs_mkfsCommand that creates a GFS file
system on a storage device.
gfs_quotaCommand that manages quotas on a
mounted GFS file system.
gfs_toolCommand that configures or tunes a
GFS file system. This command can
also gather a variety of information
about the file system.
lock_harness.koImplements a pluggable lock module
interface for GFS that allows for a
variety of locking mechanisms to be
used (for example, the DLM lock
module, lock_dlm.ko).
lock_dlm.koA lock module that implements DLM
locking for GFS. It plugs into the lock
harness, lock_harness.ko and
communicates with the DLM lock
manager in Red Hat Cluster Suite.
lock_gulm.koA lock module that implements
GULM locking for GFS. It plugs into
the lock harness, lock_harness.ko
and communicates with the GULM
lock manager in Red Hat Cluster
Suite.
lock_nolock.koA lock module for use when GFS is
used as a local file system only. It
plugs into the lock harness,
lock_harness.ko and provides
local locking.
GNBDgnbd.koKernel module that implements the
GNBD device driver on clients.
gnbd_exportCommand to create, export and
manage GNBDs on a GNBD server.
gnbd_importCommand to import and manage
GNBDs on a GNBD client.
Chapter 1. GFS Overview9
Software
Subsystem
Table 1-1. GFS Software Subsystem Components
ComponentsDescription
gnbd_servA server daemon that allows a node to
export local storage over the network.
1.5. Before Setting Up GFS
Before you install and set up GFS, note the following key characteristics of your GFS file
systems:
Number of file systems
Determine how many GFS file systems to create initially. (More file systems can be
added later.)
File-system name
Determine a unique name for each file system. Each file-system name is required in
the form of a parameter variable. For example, this book uses file-system names gfs1
and gfs2 in some example procedures.
Journals
Determine the number of journals for your GFS file systems. One journal is required
for each node that mounts a GFS file system. Make sure to account for additional
journals needed for future expansion.
GFS nodes
Determine which nodes in the Red Hat Cluster Suite will mount the GFS file systems.
GNBD server nodes
If you are using GNBD, determine how many GNBD server nodes are needed. Note
the hostname and IP address of each GNBD server node for setting up GNBD clients
later.
Storage devices and partitions
Determine the storage devices and partitions to be used for creating logical volumes
(via CLVM) in the file systems.
10Chapter 1. GFS Overview
Chapter 2.
System Requirements
This chapter describes the system requirements for Red Hat GFS Release 6.1 and consists
of the following sections:
• Section 2.1 Platform Requirements
• Section 2.2 Red Hat Cluster Suite
• Section 2.3 Fencing
• Section 2.4 Fibre Channel Storage Network
• Section 2.5 Fibre Channel Storage Devices
• Section 2.6 Network Power Switches
• Section 2.7 Console Access
2.1. Platform Requirements
Table 2-1 shows the platform requirements for GFS.
Operating SystemHardware
Red Hat Enterprise Linux AS, ES,
or WS, Version 4 or later
Table 2-1. Platform Requirements
Architecture
ia64, x86-64, x86
SMP supported
RAM
256 MB, minimum
2.2. Red Hat Cluster Suite
Red Hat GFS runs with Red Hat Cluster Suite 4.0 or later. The Red Hat Cluster Suite
software must be installed on the cluster nodes before you can install and run Red Hat
GFS.
Note
Red Hat Cluster Suite 4.0 provides the infrastructure for application failover in the cluster
and network communication among GFS nodes (and other Red Hat Cluster Suite nodes).
12Chapter 2. System Requirements
2.3. Fencing
You must configure each GFS node in your Red Hat cluster for at least one form of fencing.
Fencing is configured and managed in Red Hat Cluster Suite. For more information about
fencing options, refer to Red Hat Cluster Suite Configuring and Managing a Cluster.
2.4. Fibre Channel Storage Network
Table 2-2 shows requirements for GFS nodes that are to be connected to a Fibre Channel
SAN.
RequirementDescription
HBA (Host Bus Adapter)One HBA minimum per GFS node
Connection methodFibre Channel switch
Note: If an FC switch is used for fencing, you may
want to consider using Brocade, McData, or Vixel
FC switches, for which Red Hat Cluster Suite
fencing agents exist. Refer to Red Hat Cluster SuiteConfiguring and Managing a Cluster for more
information about supported fencing agents.
Note: When a small number of nodes is used, it may
be possible to connect the nodes directly to ports on
the storage device.
Note: FC drivers may not work reliably with FC hubs.
Table 2-2. Fibre Channel Network Requirements
2.5. Fibre Channel Storage Devices
Table 2-3 shows requirements for Fibre Channel devices that are to be connected to a GFS
cluster.
Note: Make sure that the devices can operate reliably
when heavily accessed simultaneously from multiple
initiators.
Note: Make sure that your GFS configuration does not
exceed the number of nodes an array or JBOD
supports.
2.6. Network Power Switches
You can fence GFS nodes with power switches and fencing agents available with Red Hat
Cluster Suite. For more information about fencing with network power switches, refer to
Red Hat Cluster Suite Configuring and Managing a Cluster.
2.7. Console Access
Make sure that you have console access to each GFS node. Console access to each node
ensures that you can monitor nodes and troubleshoot problems.
14Chapter 2. System Requirements
Chapter 3.
Installing GFS
Installing GFS consists of installing Red Hat GFS RPMs on nodes in a Red Hat cluster.
Before installing the RPMs, make sure of the following:
• The cluster nodes meet the requirements as described in Chapter 2 System Requirements.
• You have noted the key characteristics of your GFS configuration (refer to Section 1.5
Before Setting Up GFS).
• The correct Red Hat Cluster Suite software is installed in the cluster.
The rest of this chapter provides procedures for installing RPMs for Red Hat Cluster Suite
and Red Hat GFS. The same information can be found in the Red Hat guide, Red HatCluster Suite Configuring and Managing a Cluster, but is provided here for your convenience. If you have already installed the appropriate Red Hat Cluster Suite RPMs, follow
the procedures that pertain to installing the Red Hat GFS RPMs.
3.1. Installing the Red Hat Cluster Suite Packages
Red Hat Cluster Suite consists of the following RPM packages:
• rgmanager — Manages cluster services and resources
• system-config-cluster — Contains the Cluster Configuration Tool, used to
graphically configure the cluster and the display of the current status of the nodes,
resources, fencing agents, and cluster services
• ccsd — Contains the cluster configuration services daemon (ccsd) and associated files
• magma — Contains an interface library for cluster lock management
• magma-plugins — Contains plugins for the magma library
• cman — Contains the Cluster Manager (CMAN), which is used for managing cluster
• fence — The cluster I/O fencing system that allows cluster nodes to connect to a variety
of network power switches, fibre channel switches, and integrated power management
interfaces
16Chapter 3. Installing GFS
• gulm — Contains the GULM lock management userspace tools and libraries (an alter-
native to using CMAN and DLM).
• iddev — Contains libraries used to identify the file system (or volume manager) in
which a device is formatted
Also, you can optionally install Red Hat GFS on your Red Hat Cluster Suite. Red Hat GFS
consists of the following RPMs:
• GFS — The Red Hat GFS module
• GFS-kernel — The Red Hat GFS kernel module
• gnbd — The GFS Network Block Device module
• gnbd-kernel — Kernel module for the GFS Network Block Device
• lvm2-cluster — Cluster extensions for the logical volume manager
• GFS-kernheaders — GFS kernel header files
• gnbd-kernheaders — gnbd kernel header files
Tip
You can access the Red Hat Cluster Suite and Red Hat GFS products by using Red
Hat Network to subscribe to and access the channels containing the Red Hat Cluster
Suite and Red Hat GFS packages. From the Red Hat Network channel, you can manage
entitlements for your cluster nodes and upgrade packages for each node within the Red
Hat Network Web-based interface. For more information on using Red Hat Network, visit
the following URL:
http://rhn.redhat.com
You can install Red Hat Cluster Suite and Red Hat GFS RPMs using either of the following
methods:
• Automatic RPM installation — Using up2date
• Custom RPM installation — Selectively installing RPMs using the rpm utility
For automatic RPM installation, refer to Section 3.1.1 Automatic RPM Installation. For
custom RPM installation, refer to Section 3.1.2 Custom RPM Installation.
Chapter 3. Installing GFS17
3.1.1. Automatic RPM Installation
Automatic RPM installation consists of running the up2date utility at each node for the
Red Hat Cluster Suite and Red Hat GFS products.
Note
If you are installing the GFS RPMs, you must run up2date for Red Hat Cluster Suite
before running it for Red Hat GFS.
To automatically install RPMs, follow these steps at each node:
1. Log on as the root user.
Note
The following steps specify using up2date installall with the --force option.
Using the --force option includes kernels that are required for successful installation of Red Hat Cluster Suite and Red Hat GFS. (Without the --force option,
up2date skips kernels by default.)
2. Run up2date --force --installall=channel-label for Red Hat Cluster
Suite. The following example shows running the command for i386 RPMs:
Custom RPM installation consists of the following steps:
1. Determine which RPMs to install. For information on determining which RPMs to
install, refer to Section 3.1.2.1 Determining RPMs To Install.
2. Install the RPMs using the rpm utility. For information about installing the RPMs
using the rpm utility, refer to Section 3.1.2.2 Installing Packages with the rpm Utility.
18Chapter 3. Installing GFS
Note
If you are installing the GFS RPMs, you must install Red Hat Cluster Suite before Red
Hat GFS.
3.1.2.1. Determining RPMs To Install
Determining which RPMs to install is based on the following criteria:
• The lock manager Red Hat Cluster Suite is using — either DLM or GULM
• The Red Hat Cluster Suite and Red Hat GFS functions you are using (besides the stan-
dard functions)
• Whether to include development libraries
• The type of kernel (or kernels) is installed
Use the following tables for determining which RPMs to install:
• Table 3-1 — For Red Hat Cluster Suite with DLM
• Table 3-2 — For Red Hat Cluster Suite with GULM
• Table 3-3 — For Red Hat GFS
The tables contain the following information to assist you in determining which packages
to install:
• RPMs — The names of the RPMs (excluding revision numbers)
• Inclusion — The tables provide the following information about whether an RPM should
be included in the installation:
• Req: Required RPM — You must install the RPM.
• Opt: Optional RPM — Refer to the "Purpose" for more information about determining
whether to include the RPM.
• Dev: Development RPM — Used for development purposes. Refer to the "Purpose"
for more information about determining whether to include the RPM.
• Purpose — Provides a concise description of the RPM purpose. Assists in determining
which RPMs to include other than the required RPMs.
Chapter 3. Installing GFS19
To determine which RPMs to include in the installation, perform the following steps:
1. Determine whether you are installing Red Hat Cluster Suite with DLM or Red Hat
Cluster Suite with GULM.
a. If you are installing Red Hat Cluster Suite with DLM, refer to Table 3-1 to
identify which RPMs are required, optional, and for development.
b. If you are installing Red Hat Cluster Suite with GULM, refer to Table 3-2 to
identify which RPMs are required, optional, and for development.
2. If you are installing Red Hat GFS, refer to Table 3-3 to identify which RPMs are
required, optional, and for development.
3. With the information gathered in the previous steps, proceed to install the RPMs
using the procedures in Section 3.1.2.2 Installing Packages with the rpm Utility.
You can use the rpm utility to install RPMs from CDs created with RHN ISOs. The procedure consists of copying RPMs to a local computer, removing the RPMs that are not
needed for the installation, copying the RPMs to the cluster nodes, and installing them.
To install the RPMs, follow these instructions:
1. At a local computer (one that is not part of the cluster) make a temporary directory
to contain the RPMs. For example:
$ mkdir /tmp/RPMS/
2. Insert the Red Hat Cluster Suite CD into the CD-ROM drive.
Note
If a Question dialog box is displayed that asks if you want to run autorun, click No.
3. Copy all the RPM files from the CD (located in /media/cdrom/RedHat/RPMS/)
to the temporary directory created earlier. For example:
$ cp /media/cdrom/RedHat/RPMS/*.rpm /tmp/RPMS/
24Chapter 3. Installing GFS
Note
If your local computer is running a version of Red Hat Enterprise Linux that
is earlier than Red Hat Enterprise Linux 4, the path to the RPMs on the CD
may be different. For example, on Red Hat Enterprise Linux 3, the path is
/mnt/cdrom/RedHat/RPMS/.
4. Eject the CD from the CD-ROM drive.
5. (Optional) If you are installing Red Hat GFS, insert a Red Hat GFS CD into the
CD-ROM drive. If you are not installing Red Hat GFS, proceed to step 8.
Note
If a Question dialog box is displayed that asks if you want to run autorun, click No.
6. Copy all the RPM files from the CD (located in /media/cdrom/RedHat/RPMS/)
to the temporary directory created earlier. For example:
$ cp /media/cdrom/RedHat/RPMS/*.rpm /tmp/RPMS/
Note
If your local computer is running a version of Red Hat Enterprise Linux that
is earlier than Red Hat Enterprise Linux 4, the path to the RPMs on the CD
may be different. For example, on Red Hat Enterprise Linux 3, the path is
/mnt/cdrom/RedHat/RPMS/.
7. Eject the CD from the CD-ROM drive.
8. Change to the temporary directory containing the copied RPM files. For example:
$ cd /tmp/RPMS/
9. Remove the "-kernel" RPMs for kernels that are not installed in the cluster node, and
any other RPMs that are not being installed (for example, optional or development
RPMS). The following example removes SMP and hugemem "-kernel" RPM files:
$ rm *-kernel-smp* *-kernel-hugemem*
For information about selecting the RPMs to install, refer to Section 3.1.2.1 Determining RPMs To Install.
10. Log in to each cluster node as the root user and make a directory to contain the
RPMs. For example:
# mkdir /tmp/node-RPMS/
Chapter 3. Installing GFS25
11. Copy the RPMs from the temporary directory in the local computer to directories in
the cluster nodes using the scp command. For example, to copy the RPMs to node
rhcs-node-01, run the following command at the local computer:
12. At each node (logged in as root), change to the temporary directory created earlier
(/tmp/node-RPMS) and install the RPMs by running the rpm utility as follows:
# cd /tmp/node-RPMS/
# rpm -Uvh *
26Chapter 3. Installing GFS
Chapter 4.
Getting Started
This chapter describes procedures for initial setup of GFS and contains the following sections:
• Section 4.1 Prerequisite Tasks
• Section 4.2 Initial Setup Tasks
4.1. Prerequisite Tasks
Before setting up Red Hat GFS, make sure that you have noted the key characteristics of the
GFS nodes (refer to Section 1.5 Before Setting Up GFS) and have loaded the GFS modules
into each GFS node. Also, make sure that the clocks on the GFS nodes are synchronized.
It is recommended that you use the Network Time Protocol (NTP) software provided with
your Red Hat Enterprise Linux distribution.
Note
The system clocks in GFS nodes must be within a few minutes of each other to prevent unnecessary inode time-stamp updating. Unnecessary inode time-stamp updating
severely impacts cluster performance.
4.2. Initial Setup Tasks
Initial GFS setup consists of the following tasks:
1. Setting up logical volumes.
2. Making a GFS files system.
3. Mounting file systems.
Follow these steps to set up GFS initially.
1. Using CLVM (Cluster Logical Volume Manager), create a logical volume for each
Red Hat GFS file system.
28Chapter 4. Getting Started
Note
You can use init.d scripts included with Red Hat Cluster Suite to automate activating and deactivating logical volumes. For more information about init.d scripts,
refer to Red Hat Cluster Suite Configuring and Managing a Cluster .
2. Create GFS file systems on logical volumes created in Step 1. Choose a unique name
for each file system. For more information about creating a GFS file system, refer to
Section 5.1 Making a File System.
3. At each node, mount the GFS file systems. For more information about mounting a
GFS file system, refer to Section 5.2 Mounting a File System.
Command usage:
mount -t gfs BlockDevice MountPoint
mount -t gfs -o acl BlockDevice MountPoint
The -o acl mount option allows manipulating file ACLs. If a file system is mounted
without the -o acl mount option, users are allowed to view ACLs (with getfacl),
but are not allowed to set them (with setfacl).
Note
You can use init.d scripts included with Red Hat Cluster Suite to automate mounting and unmounting GFS file systems. For more information about init.d scripts,
refer to Red Hat Cluster Suite Configuring and Managing a Cluster .
Chapter 5.
Managing GFS
This chapter describes the tasks and commands for managing GFS and consists of the
following sections:
• Section 5.1 Making a File System
• Section 5.2 Mounting a File System
• Section 5.3 Unmounting a File System
• Section 5.4 GFS Quota Management
• Section 5.5 Growing a File System
• Section 5.6 Adding Journals to a File System
• Section 5.7 Direct I/O
• Section 5.8 Data Journaling
• Section 5.9 Configuring atime Updates
• Section 5.10 Suspending Activity on a File System
• Section 5.11 Displaying Extended GFS Information and Statistics
• Section 5.12 Repairing a File System
• Section 5.13 Context-Dependent Path Names
5.1. Making a File System
Once a cluster is set up and running, you can create a GFS file system with the gfs_mkfs
command. A file system is created on an activated CLVM volume. The following information is required to run the gfs_mkfs command:
• Lock protocol/module name (for example, lock_dlm)
• Cluster name
• Number of journals (one journal required for each node that may be mounting the file
system)
30Chapter 5. Managing GFS
5.1.1. Usage
gfs_mkfs -p LockProtoName -t LockTableName -j Number BlockDevice
Warning
Make sure that you are very familiar with using the LockProtoName and
LockTableName parameters. Improper use of the LockProtoName and
LockTableName parameters may cause file system or lock space corruption.
LockProtoName
Specifies the name of the locking protocol (for example, lock_dlm) to use.
LockTableName
This parameter has two parts separated by a colon (no spaces) as follows:
ClusterName:FSName
• ClusterName, the name of the Red Hat cluster for which the GFS file system is
being created.
• FSName, the file-system name, can be 1 to 16 characters long, and the name must
be unique among all file systems in the cluster.
Number
Specifies the number of journals to be created by the gfs_mkfs command. One journal is required for each node that mounts the file system. (More journals than are
needed can be specified at creation time to allow for future expansion.)
BlockDevice
Specifies a volume.
5.1.2. Examples
In this example, lock_dlm is the locking protocol that the file system uses. The cluster
name is alpha, and the file-system name is gfs1. The file system contains eight journals
and is created on /dev/vg01/lvol0.
lock_dlm — The standard locking module.
lock_gulm — The locking module
compatible with earlier versions of GFS.
lock_nolock — May be used when GFS is
acting as a local file system (one node only).
for confirmation before writing the file system.
32Chapter 5. Managing GFS
FlagParameterDescription
-rMegaBytesSpecifies the size of the resource groups in
megabytes. Default resource group size is 256
megabytes.
-sBlocksSpecifies the journal-segment size in file-system
blocks.
-tLockTableNameThis parameter has two parts separated by a
colon (no spaces) as follows:
ClusterName:FSName.
ClusterName is the name of the Red Hat
cluster for which the GFS file system is being
created. The cluster name is set in the
/etc/cluster/cluster.conf file via the
Cluster Configuration Tool and displayed at
the Cluster Status Tool in the Red Hat
Cluster Suite cluster management GUI.
FSName, the file-system name, can be 1 to 16
characters in length, and the name must be
unique among all file systems in the cluster.
-VDisplays command version information.
Table 5-1. Command Options: gfs_mkfs
5.2. Mounting a File System
Before you can mount a GFS file system, the file system must exist (refer to Section 5.1
Making a File System), the volume where the file system exists must be activated, and
the supporting clustering and locking systems must be started (refer to Chapter 4 GettingStarted and Red Hat Cluster Suite Configuring and Managing a Cluster). After those requirements have been met, you can mount the GFS file system as you would any Linux file
system.
To manipulate file ACLs, you must mount the file system with the -o acl mount option.
If a file system is mounted without the -o acl mount option, users are allowed to view
ACLs (with getfacl), but are not allowed to set them (with setfacl).
5.2.1. Usage
Mounting Without ACL Manipulation
mount -t gfs BlockDevice MountPoint
Chapter 5. Managing GFS33
Mounting With ACL Manipulation
mount -t gfs -o acl BlockDevice MountPoint
-o acl
GFS-specific option to allow manipulating file ACLs.
BlockDevice
Specifies the block device where the GFS file system resides.
MountPoint
Specifies the directory where the GFS file system should be mounted.
5.2.2. Example
In this example, the GFS file system on /dev/vg01/lvol0 is mounted on the /gfs1
directory.
mount -t gfs /dev/vg01/lvol0 /gfs1
5.2.3. Complete Usage
mount -t gfs BlockDevice MountPoint -o option
The -o option consists of GFS-specific options (refer to Table 5-2) or acceptable standard Linux mount -o options, or a combination of both. Multiple option parameters
are separated by a comma and no spaces.
Note
The mount command is a Linux system command. In addition to using GFS-specific options described in this section, you can use other, standard, mount command options (for
example, -r). For information about other Linux mount command options, see the Linux
mount man page.
Table 5-2 describes the available GFS-specific -o option values that can be passed to
GFS at mount time.
34Chapter 5. Managing GFS
OptionDescription
aclAllows manipulating file ACLs. If a file system
is mounted without the acl mount option,
users are allowed to view ACLs (with
getfacl), but are not allowed to set them (with
setfacl).
hostdata=HostIDInfoThis field provides host (the computer on which
the file system is being mounted) identity
information to the lock module. The format and
behavior of HostIDInfo depends on the lock
module used. For lock_gulm, it overrides the
uname -n network node name used as the
default value by lock_gulm. This field is
ignored by the lock_dlm and lock_nolock
lock modules.
ignore_local_fs
Caution: This option should not be
used when GFS file systems are
shared.
localcaching
Caution: This option should not be
used when GFS file systems are
shared.
Forces GFS to treat the file system as a
multihost file system. By default, using
lock_nolock automatically turns on the
localcaching and localflocks flags.
Tells GFS that it is running as a local file
system. GFS can then turn on selected
optimization capabilities that are not available
when running in cluster mode. The
localcaching flag is automatically turned on
by lock_nolock.
localflocks
Caution: This option should not be
used when GFS file systems are
shared.
lockproto=LockModuleNameAllows the user to specify which locking
Tells GFS to let the VFS (virtual file system)
layer do all flock and fcntl. The localflocks
flag is automatically turned on by
lock_nolock.
protocol to use with the file system. If
LockModuleName is not specified, the
locking protocol name is read from the
file-system superblock.
locktable=LockTableNameAllows the user to specify which locking table
to use with the file system.
Chapter 5. Managing GFS35
OptionDescription
oopses_okThis option allows a GFS node to not panic
when an oops occurs. (By default, a GFS node
panics when an oops occurs, causing the file
system used by that node to stall for other GFS
nodes.) A GFS node not panicking when an
oops occurs minimizes the failure on other
GFS nodes using the file system that the failed
node is using. There may be circumstances
where you do not want to use this option —
for example, when you need more detailed
troubleshooting information. Use this option
with care.
Note: This option is turned on automatically if
lock_nolock locking is specified; however,
you can override it by using the
ignore_local_fs option.
upgradeUpgrade the on-disk format of the file system so
that it can be used by newer versions of GFS.
Table 5-2. GFS-Specific Mount Options
5.3. Unmounting a File System
The GFS file system can be unmounted the same way as any Linux file system — by using
the umount command.
Note
The umount command is a Linux system command. Information about this command can
be found in the Linux umount command man pages.
5.3.1. Usage
umount MountPoint
MountPoint
Specifies the directory where the GFS file system should be mounted.
36Chapter 5. Managing GFS
5.4. GFS Quota Management
File-system quotas are used to limit the amount of file-system space a user or group can
use. A user or group does not have a quota limit until one is set. GFS keeps track of the
space used by each user and group even when there are no limits in place. GFS updates
quota information in a transactional way so system crashes do not require quota usages to
be reconstructed.
To prevent a performance slowdown, a GFS node synchronizes updates to the quota file
only periodically. The "fuzzy" quota accounting can allow users or groups to slightly exceed the set limit. To minimize this, GFS dynamically reduces the synchronization period
as a "hard" quota limit is approached.
GFS uses its gfs_quota command to manage quotas. Other Linux quota facilities cannot
be used with GFS.
5.4.1. Setting Quotas
Two quota settings are available for each user ID (UID) or group ID (GID): a hard limit
and a warn limit.
A hard limit is the amount of space that can be used. The file system will not let the user
or group use more than that amount of disk space. A hard limit value of zero means that no
limit is enforced.
A warn limit is usually a value less than the hard limit. The file system will notify the user
or group when the warn limit is reached to warn them of the amount of space they are
using. A warn limit value of zero means that no limit is enforced.
Limits are set using the gfs_quota command. The command only needs to be run on a
single node where GFS is mounted.
5.4.1.1. Usage
Setting Quotas, Hard Limit
gfs_quota limit -u User -l Size -f MountPoint
gfs_quota limit -g Group -l Size -f MountPoint
Setting Quotas, Warn Limit
gfs_quota warn -u User -l Size -f MountPoint
gfs_quota warn -g Group -l Size -f MountPoint
Chapter 5. Managing GFS37
User
A user ID to limit or warn. It can be either a user name from the password file or the
UID number.
Group
A group ID to limit or warn. It can be either a group name from the group file or the
GID number.
Size
Specifies the new value to limit or warn. By default, the value is in units of megabytes.
The additional -k, -s and -b flags change the units to kilobytes, sectors, and filesystem blocks, respectively.
MountPoint
Specifies the GFS file system to which the actions apply.
5.4.1.2. Examples
This example sets the hard limit for user Bert to 1024 megabytes (1 gigabyte) on file
system /gfs.
gfs_quota limit -u Bert -l 1024 -f /gfs
This example sets the warn limit for group ID 21 to 50 kilobytes on file system /gfs.
gfs_quota warn -g 21 -l 50 -k -f /gfs
5.4.2. Displaying Quota Limits and Usage
Quota limits and current usage can be displayed for a specific user or group using the
gfs_quota get command. The entire contents of the quota file can also be displayed
using the gfs_quota list command, in which case all IDs with a non-zero hard limit,
warn limit, or value are listed.
5.4.2.1. Usage
Displaying Quota Limits for a User
gfs_quota get -u User -f MountPoint
38Chapter 5. Managing GFS
Displaying Quota Limits for a Group
gfs_quota get -g Group -f MountPoint
Displaying Entire Quota File
gfs_quota list -f MountPoint
User
A user ID to display information about a specific user. It can be either a user name
from the password file or the UID number.
Group
A group ID to display information about a specific group. It can be either a group
name from the group file or the GID number.
MountPoint
Specifies the GFS file system to which the actions apply.
5.4.2.2. Command Output
GFS quota information from the gfs_quota command is displayed as follows:
user User: limit:LimitSize warn:WarnSize value:Value
group Group: limit:LimitSize warn:WarnSize value:Value
The LimitSize, WarnSize, and Value numbers (values) are in units of megabytes by
default. Adding the -k, -s, or -b flags to the command line change the units to kilobytes,
sectors, or file-system blocks, respectively.
User
A user name or ID to which the data is associated.
Group
A group name or ID to which the data is associated.
LimitSize
The hard limit set for the user or group. This value is zero if no limit has been set.
Chapter 5. Managing GFS39
Value
The actual amount of disk space used by the user or group.
5.4.2.3. Comments
When displaying quota information, the gfs_quota command does not resolve UIDs and
GIDs into names if the -n option is added to the command line.
Space allocated to GFS’s hidden files can be left out of displayed values for the root UID
and GID by adding the -d option to the command line. This is useful when trying to match
the numbers from gfs_quota with the results of a du command.
5.4.2.4. Examples
This example displays quota information for all users and groups that have a limit set or
are using any disk space on file system /gfs.
gfs_quota list -f /gfs
This example displays quota information in sectors for group users on file system /gfs.
gfs_quota get -g users -f /gfs -s
5.4.3. Synchronizing Quotas
GFS stores all quota information in its own internal file on disk. A GFS node does not
update this quota file for every file-system write; rather, it updates the quota file once every
60 seconds. This is necessary to avoid contention among nodes writing to the quota file,
which would cause a slowdown in performance.
As a user or group approaches their quota limit, GFS dynamically reduces the time between its quota-file updates to prevent the limit from being exceeded. The normal time
period between quota synchronizations is a tunable parameter, quota_quantum, and can
be changed using the gfs_tool command. By default, the time period is 60 seconds. Also,
the quota_quantum parameter must be set on each node and each time the file system is
mounted. (Changes to the quota_quantum parameter are not persistent across unmounts.)
You can use the gfs_quota sync command to synchronize the quota information from
a node to the on-disk quota file between the automatic updates performed by GFS.
40Chapter 5. Managing GFS
5.4.3.1. Usage
Synchronizing Quota Information
gfs_quota sync -f MountPoint
MountPoint
Specifies the GFS file system to which the actions apply.
Tuning the Time Between Synchronizations
gfs_tool settune MountPoint quota_quantum Seconds
MountPoint
Specifies the GFS file system to which the actions apply.
Seconds
Specifies the new time period between regular quota-file synchronizations by GFS.
Smaller values may increase contention and slow down performance.
5.4.3.2. Examples
This example synchronizes the quota information from the node it is run on to file system
/gfs.
gfs_quota sync -f /gfs
This example changes the default time period between regular quota-file updates to one
hour (3600 seconds) for file system /gfs on a single node.
gfs_tool settune /gfs quota_quantum 3600
5.4.4. Disabling/Enabling Quota Enforcement
Enforcement of quotas can be disabled for a file system without clearing the limits set for
all users and groups. Enforcement can also be enabled. Disabling and enabling of quota enforcement is done by changing a tunable parameter, quota_enforce, with the gfs_tool
command. The quota_enforce parameter must be disabled or enabled on each node
where quota enforcement should be disabled/enabled. Each time the file system is mounted,
enforcement is enabled by default. (Disabling is not persistent across unmounts.)
Chapter 5. Managing GFS41
5.4.4.1. Usage
gfs_tool settune MountPoint quota_enforce {0|1}
MountPoint
Specifies the GFS file system to which the actions apply.
quota_enforce {0|1}
0 = disabled
1 = enabled
5.4.4.2. Comments
A value of 0 disables enforcement. Enforcement can be enabled by running the command
with a value of 1 (instead of 0) as the final command line parameter. Even when GFS is
not enforcing quotas, it still keeps track of the file-system usage for all users and groups so
that quota-usage information does not require rebuilding after re-enabling quotas.
5.4.4.3. Examples
This example disables quota enforcement on file system /gfs.
gfs_tool settune /gfs quota_enforce 0
This example enables quota enforcement on file system /gfs.
gfs_tool settune /gfs quota_enforce 1
5.4.5. Disabling/Enabling Quota Accounting
By default, quota accounting is enabled; therefore, GFS keeps track of disk usage for every
user and group even when no quota limits have been set. Quota accounting incurs unnecessary overhead if quotas are not used. You can disable quota accounting completely by
setting the quota_account tunable parameter to 0. This must be done on each node and
after each mount. (The 0 setting is not persistent across unmounts.) Quota accounting can
be enabled by setting the quota_account tunable parameter to 1.
42Chapter 5. Managing GFS
5.4.5.1. Usage
gfs_tool settune MountPoint quota_account {0|1}
MountPoint
Specifies the GFS file system to which the actions apply.
quota_account {0|1}
0 = disabled
1 = enabled
5.4.5.2. Comments
To enable quota accounting on a file system, the quota_account parameter must be set
back to 1. Afterward, the GFS quota file must be initialized to account for all current disk
usage for users and groups on the file system. The quota file is initialized by running:
gfs_quota init -f MountPoint.
Note
Initializing the quota file requires scanning the entire file system and may take a long time.
5.4.5.3. Examples
This example disables quota accounting on file system /gfs on a single node.
gfs_tool settune /gfs quota_account 0
This example enables quota accounting on file system /gfs on a single node and initializes
the quota file.
gfs_tool settune /gfs quota_account 1
gfs_quota init -f /gfs
Chapter 5. Managing GFS43
5.5. Growing a File System
The gfs_grow command is used to expand a GFS file system after the device where the
file system resides has been expanded. Running a gfs_grow command on an existing GFS
file system fills all spare space between the current end of the file system and the end of
the device with a newly initialized GFS file-system extension. When the fill operation is
completed, the resource index for the file system is updated. All nodes in the cluster can
then use the extra storage space that has been added.
The gfs_grow command must be run on a mounted file system, but only needs to be run
on one node in a cluster. All the other nodes sense that the expansion has occurred and
automatically start using the new space.
To verify that the changes were successful, use the gfs_grow command with the -T (test)
and -v (verbose) flags. Running the command with those flags displays the current state of
the mounted GFS file system.
5.5.1. Usage
gfs_grow MountPoint
MountPoint
Specifies the GFS file system to which the actions apply.
5.5.2. Comments
Before running the gfs_grow command:
• Back up important data on the file system.
• Display the volume that is used by the file system to be expanded by running a
gfs_tool df MountPoint command.
• Expand the underlying cluster volume with LVM. (Refer to the LVM HOWTO at
http://www.tldp.org/HOWTO/LVM-HOWTO/index.html for command usage with
CLVM.)
After running the gfs_grow command, run a df command to check that the new space is
now available in the file system.
5.5.3. Examples
In this example, the file system on the /gfs1 directory is expanded.
gfs_grow /gfs1
44Chapter 5. Managing GFS
In this example, the state of the mounted file system is checked.
Specifies the directory where the GFS file system is mounted.
Device
Specifies the device node of the file system.
Table 5-3 describes the GFS-specific options that can be used while expanding a GFS file
system.
OptionDescription
-hHelp. Displays a short usage message.
-qQuiet. Turns down the verbosity level.
-TTest. Do all calculations, but do not write any data to the disk
-VDisplays command version information.
-vTurns up the verbosity of messages.
Table 5-3. GFS-specific Options Available While Expanding A File System
and do not expand the file system.
5.6. Adding Journals to a File System
The gfs_jadd command is used to add journals to a GFS file system after the device
where the file system resides has been expanded. Running a gfs_jadd command on a
GFS file system uses space between the current end of the file system and the end of the
device where the file system resides. When the fill operation is completed, the journal index
is updated.
The gfs_jadd command must be run on mounted file system, but it only needs to be run
on one node in the cluster. All the other nodes sense that the expansion has occurred.
Chapter 5. Managing GFS45
To verify that the changes were successful, use the gfs_jadd command with the -T (test)
and -v (verbose) flags. Running the command with those flags displays the current state of
the mounted GFS file system.
5.6.1. Usage
gfs_jadd -j Number MountPoint
Number
Specifies the number of new journals to be added.
MountPoint
Specifies the directory where the GFS file system is mounted.
5.6.2. Comments
Before running the gfs_jadd command:
• Back up important data on the file system.
• Run a gfs_tool df MountPoint command to display the volume used by the file
system where journals will be added.
• Expand the underlying cluster volume with LVM. (Refer to the LVM HOWTO at
http://www.tldp.org/HOWTO/LVM-HOWTO/index.html for command usage with
CLVM.)
After running the gfs_jadd command, run a gfs_jadd command with the -T and -v
flags enabled to check that the new journals have been added to the file system.
5.6.3. Examples
In this example, one journal is added to the file system on the /gfs1 directory.
gfs_jadd -j1 /gfs1
In this example, two journals are added to the file system on the /gfs1 directory.
gfs_jadd -j2 /gfs1
In this example, the current state of the file system on the /gfs1 directory is checked for
the new journals.
Specifies the directory where the GFS file system is mounted.
Device
Specifies the device node of the file system.
Table 5-4 describes the GFS-specific options that can be used when adding journals to a
GFS file system.
FlagParameterDescription
-hHelp. Displays short usage message.
-JMegaBytesSpecifies the size of the new journals in
-jNumberSpecifies the number of new journals to be added
-TTest. Do all calculations, but do not write any
-qQuiet. Turns down the verbosity level.
-VDisplays command version information.
megabytes. Default journal size is 128
megabytes. The minimum size is 32 megabytes.
To add journals of different sizes to the file
system, the gfs_jadd command must be run for
each size journal. The size specified is rounded
down so that it is a multiple of the
journal-segment size that was specified when the
file system was created.
by the gfs_jadd command. The default value is
1.
data to the disk and do not add journals to the file
system. Enabling this flag helps discover what
the gfs_jadd command would have done if it
were run without this flag. Using the -v flag with
the -T flag turns up the verbosity level to display
more information.
Chapter 5. Managing GFS47
FlagParameterDescription
-vTurns up the verbosity of messages.
Table 5-4. GFS-specific Options Available When Adding Journals
5.7. Direct I/O
Direct I/O is a feature of the file system whereby file reads and writes go directly from the
applications to the storage device, bypassing the operating system read and write caches.
Direct I/O is used only by applications (such as databases) that manage their own caches.
An application invokes direct I/O by opening a file with the O_DIRECT flag. Alternatively,
GFS can attach a direct I/O attribute to a file, in which case direct I/O is used regardless of
how the file is opened.
When a file is opened with O_DIRECT, or when a GFS direct I/O attribute is attached to
a file, all I/O operations must be done in block-size multiples of 512 bytes. The memory
being read from or written to must also be 512-byte aligned.
One of the following methods can be used to enable direct I/O on a file:
• O_DIRECT
• GFS file attribute
• GFS directory attribute
5.7.1. O_DIRECT
If an application uses the O_DIRECT flag on an open() system call, direct I/O is used for
the opened file.
To cause the O_DIRECT flag to be defined with recent glibc libraries, define _GNU_SOURCE
at the beginning of a source file before any includes, or define it on the cc line when
compiling.
5.7.2. GFS File Attribute
The gfs_tool command can be used to assign (set) a direct I/O attribute flag, directio,
to a GFS file. The directio flag can also be cleared.
48Chapter 5. Managing GFS
5.7.2.1. Usage
Setting the directio Flag
gfs_tool setflag directio File
Clearing the directio Flag
gfs_tool clearflag directio File
File
Specifies the file where the directio flag is assigned.
5.7.2.2. Example
In this example, the command sets the directio flag on the file named datafile in
directory /gfs1.
gfs_tool setflag directio /gfs1/datafile
5.7.3. GFS Directory Attribute
The gfs_tool command can be used to assign (set) a direct I/O attribute flag,
inherit_directio, to a GFS directory. Enabling the inherit_directio flag
on a directory causes all newly created regular files in that directory to automatically
inherit the directio flag. Also, the inherit_directio flag is inherited by any new
subdirectories created in the directory. The inherit_directio flag can also be cleared.
5.7.3.1. Usage
Setting the inherit_directio flag
gfs_tool setflag inherit_directio Directory
Clearing the inherit_directio flag
gfs_tool clearflag inherit_directio Directory
Directory
Specifies the directory where the inherit_directio flag is set.
Chapter 5. Managing GFS49
5.7.3.2. Example
In this example, the command sets the inherit_directio flag on the directory named
/gfs1/data/.
gfs_tool setflag inherit_directio /gfs1/data/
5.8. Data Journaling
Ordinarily, GFS writes only metadata to its journal. File contents are subsequently written
to disk by the kernel’s periodic sync that flushes file-system buffers. An fsync() call on a
file causes the file’s data to be written to disk immediately. The call returns when the disk
reports that all data is safely written.
Data journaling can result in a reduced fsync() time, especially for small files, because
the file data is written to the journal in addition to the metadata. An fsync() returns as
soon as the data is written to the journal, which can be substantially faster than the time it
takes to write the file data to the main file system.
Applications that rely on fsync() to sync file data may see improved performance by using data journaling. Data journaling can be enabled automatically for any GFS files created
in a flagged directory (and all its subdirectories). Existing files with zero length can also
have data journaling turned on or off.
Using the gfs_tool command, data journaling is enabled on a directory (and all its subdirectories) or on a zero-length file by setting the inherit_jdata or jdata attribute
flags to the directory or file, respectively. The directory and file attribute flags can also be
cleared.
Specifies the directory where the flag is set or cleared.
50Chapter 5. Managing GFS
File
Specifies the zero-length file where the flag is set or cleared.
5.8.2. Examples
This example shows setting the inherit_jdata flag on a directory. All files created in
the directory or any of its subdirectories will have the jdata flag assigned automatically.
Any data written to the files will be journaled.
gfs_tool setflag inherit_jdata /gfs1/data/
This example shows setting the jdata flag on a file. The file must be zero size. Any data
written to the file will be journaled.
gfs_tool setflag jdata /gfs1/datafile
5.9. Configuring atime Updates
Each file inode and directory inode has three time stamps associated with it:
• ctime — The last time the inode status was changed
• mtime — The last time the file (or directory) data was modified
• atime — The last time the file (or directory) data was accessed
If atime updates are enabled as they are by default on GFS and other Linux file systems
then every time a file is read, its inode needs to be updated.
Because few applications use the information provided by atime, those updates can require a significant amount of unnecessary write traffic and file-locking traffic. That traffic
can degrade performance; therefore, it may be preferable to turn off atime updates.
Two methods of reducing the effects of atime updating are available:
• Mount with noatime
• Tune GFS atime quantum
5.9.1. Mount with noatime
A standard Linux mount option, noatime, can be specified when the file system is
mounted, which disables atime updates on that file system.
Chapter 5. Managing GFS51
5.9.1.1. Usage
mount -t gfs BlockDevice MountPoint -o noatime
BlockDevice
Specifies the block device where the GFS file system resides.
MountPoint
Specifies the directory where the GFS file system should be mounted.
5.9.1.2. Example
In this example, the GFS file system resides on the /dev/vg01/lvol0 and is mounted on
directory /gfs1 with atime updates turned off.
mount -t gfs /dev/vg01/lvol0 /gfs1 -o noatime
5.9.2. Tune GFS atime Quantum
When atime updates are enabled, GFS (by default) only updates them once an hour. The
time quantum is a tunable parameter that can be adjusted using the gfs_tool command.
Each GFS node updates the access time based on the difference between its system time
and the time recorded in the inode. It is required that system clocks of all GFS nodes in a
cluster be synchronized. If a node’s system time is out of synchronization by a significant
fraction of the tunable parameter, atime_quantum, then atime updates are written more
frequently. Increasing the frequency of atime updates may cause performance degradation
in clusters with heavy work loads.
By using the gettune flag of the gfs_tool command, all current tunable parameters
including atime_quantum (default is 3600 seconds) are displayed.
The gfs_tool settune command is used to change the atime_quantum parameter
value. It must be set on each node and each time the file system is mounted. (The setting is not persistent across unmounts.)
5.9.2.1. Usage
Displaying Tunable Parameters
gfs_tool gettune MountPoint
52Chapter 5. Managing GFS
MountPoint
Specifies the directory where the GFS file system is mounted.
Changing the atime_quantum Parameter Value
gfs_tool settune MountPoint atime_quantum Seconds
MountPoint
Specifies the directory where the GFS file system is mounted.
Seconds
Specifies the update period in seconds.
5.9.2.2. Examples
In this example, all GFS tunable parameters for the file system on the mount point /gfs1
are displayed.
gfs_tool gettune /gfs1
In this example, the atime update period is set to once a day (86,400 seconds) for the GFS
file system on mount point /gfs1.
gfs_tool settune /gfs1 atime_quantum 86400
5.10. Suspending Activity on a File System
You can suspend write activity to a file system by using the gfs_tool freeze command.
Suspending write activity allows hardware-based device snapshots to be used to capture the
file system in a consistent state. The gfs_tool unfreeze command ends the suspension.
5.10.1. Usage
Start Suspension
gfs_tool freeze MountPoint
End Suspension
gfs_tool unfreeze MountPoint
Chapter 5. Managing GFS53
MountPoint
Specifies the file system.
5.10.2. Examples
This example suspends writes to file system /gfs.
gfs_tool freeze /gfs
This example ends suspension of writes to file system /gfs.
gfs_tool unfreeze /gfs
5.11. Displaying Extended GFS Information and Statistics
You can use the gfs_tool command to gather a variety of details about GFS. This section
describes typical use of the gfs_tool command for displaying statistics, space usage, and
extended status.
5.11.1. Usage
Displaying Statistics
gfs_tool counters MountPoint
The counters flag displays statistics about a file system. If -c is used, the gfs_tool
command continues to run, displaying statistics once per second.
Displaying Space Usage
gfs_tool df MountPoint
The df flag displays a space-usage summary of a given file system. The information is
more detailed than a standard df.
Displaying Extended Status
gfs_tool stat File
The stat flag displays extended status information about a file.
MountPoint
Specifies the file system to which the action applies.
54Chapter 5. Managing GFS
File
Specifies the file from which to get information.
The gfs_tool command provides additional action flags (options) not listed in this section. For more information about other gfs_tool flags, refer to the gfs_tool man page.
5.11.2. Examples
This example reports extended file-system usage about file system /gfs.
gfs_tool df /gfs
This example reports extended file status about file /gfs/datafile.
gfs_tool stat /gfs/datafile
5.12. Repairing a File System
When nodes fail with the file system mounted, file-system journaling allows fast recovery.
However, if a storage device loses power or is physically disconnected, file-system corruption may occur. (Journaling cannot be used to recover from storage subsystem failures.)
When that type of corruption occurs, you can recover the GFS file system by using the
gfs_fsck command.
The gfs_fsck command must only be run on a file system that is unmounted from all
nodes.
Note
The gfs_fsck command has changed from previous releases of Red Hat GFS in the
following ways:
• You can no longer set the interactive mode with [Ctrl]-[C]. Pressing [Ctrl]-[C] now can-
cels the gfs_fsck command. Do not press [Ctrl]-[C] unless you want to cancel the
command.
• You can increase the level of verbosity by using the -v flag. Adding a second -v flag
increases the level again.
• You can decrease the level of verbosity by using the -q flag. Adding a second -q flag
decreases the level again.
• The -n option opens a file system as read-only and answers no to any queries au-
tomatically. The option provides a way of tr ying the command to reveal errors without
actually allowing the gfs_fsck command to take effect.
Chapter 5. Managing GFS55
Refer to the gfs_fsck man page, gfs_fsck(8), for additional information about other
command options.
5.12.1. Usage
gfs_fsck -y BlockDevice
-y
The -y flag causes all questions to be answered with yes. With the -y flag specified,
the gfs_fsck command does not prompt you for an answer before making changes.
BlockDevice
Specifies the block device where the GFS file system resides.
5.12.2. Example
In this example, the GFS file system residing on block device /dev/vg01/lvol0 is repaired. All queries to repair are automatically answered with yes.
gfs_fsck -y /dev/vg01/lvol0
5.13. Context-Dependent Path Names
Context-Dependent Path Names (CDPNs) allow symbolic links to be created that point to
variable destination files or directories. The variables are resolved to real files or directories
each time an application follows the link. The resolved value of the link depends on the
node or user following the link.
CDPN variables can be used in any path name, not just with symbolic links. However, the
CDPN variable name cannot be combined with other characters to form an actual directory
or file name. The CDPN variable must be used alone as one segment of a complete path.
5.13.1. Usage
For a Normal Symbolic Link
ln -s Target LinkName
56Chapter 5. Managing GFS
Target
Specifies an existing file or directory on a file system.
LinkName
Specifies a name to represent the real file or directory on the other end of the link.
For a Variable Symbolic Link
ln -s Variable LinkName
Variable
Specifies a special reserved name from a list of values (refer to Table 5-5) to represent
one of multiple existing files or directories. This string is not the name of an actual
file or directory itself. (The real files or directories must be created in a separate step
using names that correlate with the type of variable used.)
LinkName
Specifies a name that will be seen and used by applications and will be followed to
get to one of the multiple real files or directories. When LinkName is followed, the
destination depends on the type of variable and the node or user doing the following.
VariableDescription
@hostnameThis variable resolves to a real file or directory named with
the hostname string produced by the output of the following
command: echo ‘uname -n‘
@machThis variable resolves to a real file or directory name with the
machine-type string produced by the output of the following
command: echo ‘uname -m‘
@osThis variable resolves to a real file or directory named with
the operating-system name string produced by the output of
the following command: echo ‘uname -s‘
@sysThis variable resolves to a real file or directory named with
the combined machine type and OS release strings produced
by the output of the following command: echo ‘uname
-m‘_‘uname -s‘
@uidThis variable resolves to a real file or directory named with
the user ID string produced by the output of the following
command: echo ‘id -u‘
Chapter 5. Managing GFS57
VariableDescription
@gidThis variable resolves to a real file or directory named with
the group ID string produced by the output of the following
command: echo ‘id -g‘
Table 5-5. CDPN Variable Values
5.13.2. Example
In this example, there are three nodes with hostnames n01, n02 and n03. Applications
on each node uses directory /gfs/log/, but the administrator wants these directories
to be separate for each node. To do this, no actual log directory is created; instead, an
@hostname CDPN link is created with the name log. Individual directories /gfs/n01/,
/gfs/n02/, and /gfs/n03/ are created that will be the actual directories used when each
n01# ls /gfs/log/
fileA
n02# ls /gfs/log/
fileB
n03# ls /gfs/log/
fileC
58Chapter 5. Managing GFS
Chapter 6.
Using GNBD with Red Hat GFS
GNBD (Global Network Block Device) provides block-level storage access over an Ethernet LAN. GNBD components run as a client in a GFS node and as a server in a GNBD
server node. A GNBD server node exports block-level storage from its local storage (either
directly attached storage or SAN storage) to a GFS node.
This chapter describes how to use GNBD with Red Hat GFS and consists of the following
sections:
• Section 6.1 GNBD Driver and Command Usage
• Section 6.2 Running GFS on a GNBD Server Node
Note
Multipath GNBD is not available with Red Hat GFS 6.1. That is, device mapper multipath
(dm-multipath) cannot use GNBD. GNBD without multipath is available.
6.1. GNBD Driver and Command Usage
The Global Network Block Device (GNBD) driver allows a node to export its local storage
as a GNBD over a network so that other nodes on the network can share the storage. Client
nodes importing the GNBD use it like any other block device. Importing a GNBD on
multiple clients forms a shared storage configuration through which GFS can be used.
The GNBD driver is implemented through the following components.
• gnbd_serv — Implements the GNBD server. It is a user-space daemon that allows a
node to export local storage over a network.
• gnbd.ko — Implements the GNBD device driver on GNBD clients (nodes using GNBD
devices).
Two user commands are available to configure GNBD:
• gnbd_export (for servers) — User program for creating, exporting, and managing
GNBDs on a GNBD server.
60Chapter 6. Using GNBD with Red Hat GFS
• gnbd_import (for clients) — User program for importing and managing GNBDs on a
GNBD client.
6.1.1. Exporting a GNBD from a Server
The gnbd_serv daemon must be running on a node before it can export storage as a
GNBD. You can start the gnbd_serv daemon running gnbd_serv as follows:
#gnbd_serv
gnbd_serv: startup succeeded
Once local storage has been identified to be exported, the gnbd_export command is used
to export it.
Note
A server should not import the GNBDs to use them as a client would. If a server exports
the devices uncached, they may also be used by ccsd and gfs.
6.1.1.1. Usage
gnbd_export -d pathname -e gnbdname [-c]
pathname
Specifies a storage device to export.
gnbdname
Specifies an arbitrary name selected for the GNBD. It is used as the device name on
GNBD clients. This name must be unique among all GNBDs exported in a network.
-o
Export the device as read-only.
-c
Enable caching. Reads from the exported GNBD and takes advantage of the Linux
page cache.
By default, the gnbd_export command does not enable caching.
Chapter 6. Using GNBD with Red Hat GFS61
Note
If you have been using GFS 5.2 or earlier and do not want to change your GNBD
setup you should specify the -c option. Before GFS Release 5.2.1, Linux caching
was enabled by default for gnbd_export. If the -c option is not specified, GNBD
runs with a noticeable performance decrease. Also, if the -c option is not specified,
the exported GNBD runs in timeout mode, using the default timeout value (the -t
option). For more information about the gnbd_export command and its options, refer
to the gnbd_export man page.
6.1.1.2. Examples
This example exports device /dev/sdb2 as GNBD delta with cache enabled.
gnbd_export -d /dev/sdb2 -e delta -c
6.1.2. Importing a GNBD on a Client
The gnbd.ko kernel module must be loaded on a node before it can import GNBDs. When
GNBDs are imported, device nodes are created for them in /dev/gnbd/ with the name
assigned when they were exported.
6.1.2.1. Usage
gnbd_import -i Server
Server
Specifies a GNBD server by hostname or IP address from which to import GNBDs.
All GNBDs exported from the server are imported on the client running this command.
6.1.2.2. Example
This example imports all GNBDs from the server named nodeA.
gnbd_import -i nodeA
62Chapter 6. Using GNBD with Red Hat GFS
6.2. Running GFS on a GNBD Server Node
You can run GFS on a GNBD server node, with some restrictions. In addition, running
GFS on a GNBD server node reduces performance. The following restrictions apply when
running GFS on a GNBD server node.
Important
When running GFS on a GNBD server node you must follow the restrictions listed; otherwise, the GNBD server node will fail.
1. A GNBD server node must have local access to all storage devices needed to mount a
GFS file system. The GNBD server node must not import (gnbd_import command)
other GNBD devices to run the file system.
2. The GNBD server must export all the GNBDs in uncached mode, and it must export
the raw devices, not logical volume devices.
3. GFS must be run on top of a logical volume device, not raw devices.
Note
You may need to increase the timeout period on the exported GNBDs to accommodate
reduced performance. The need to increase the timeout period depends on the quality of
the hardware.
Appendix A.
Upgrading GFS
To upgrade a node to Red Hat GFS 6.1 from earlier versions of Red Hat GFS, you must
convert the GFS cluster configuration archive (CCA) to a Red Hat Cluster Suite cluster configuration system (CCS) configuration file (/etc/cluster/cluster.conf) and convert
GFS pool volumes to LVM2 volumes.
This appendix contains instructions for upgrading from GFS 6.0 (or GFS 5.2.1) to Red Hat
GFS 6.1, using GULM as the lock manager.
Note
You must retain GULM lock management for the upgrade to Red Hat GFS 6.1; that is,
you cannot change from GULM lock management to DLM lock management during the
upgrade to Red Hat GFS 6.1. However, after the upgrade to GFS 6.1, you can change
lock managers. Refer to Red Hat Cluster Suite Configuring and Managing a Cluster for
information about changing lock managers.
The following procedure demonstrates upgrading to Red Hat GFS 6.1 from a GFS 6.0 (or
GFS 5.2.1) configuration with an example pool configuration for a pool volume named
argus (refer to Example A-1).
Example A-1. Example pool Configuration Information for Pool Volume Named ar-
gus
1. Halt the GFS nodes and the lock server nodes as follows:
a. Unmount GFS file systems from all nodes.
b. Stop the lock servers; at each lock server node, stop the lock server as follows:
# service lock_gulmd stop
c. Stop ccsd at all nodes; at each node, stop ccsd as follows:
# service ccsd stop
64Appendix A. Upgrading GFS
d. Deactivate pools; at each node, deactivate GFS pool volumes as follows:
# service pool stop
e. Uninstall Red Hat GFS RPMs.
2. Install new software:
a. Install Red Hat Enterprise Linux version 4 software (or verify that it is in-
stalled).
b. Install Red Hat Cluster Suite and Red Hat GFS RPMs.
3. At all GFS 6.1 nodes, create a cluster configuration file directory (/etc/cluster)
and upgrade the CCA (in this example, located in /dev/pool/cca) to the new Red
Hat Cluster Suite CCS configuration file format by running the ccs_tool upgrade
command as shown in the following example:
4. At all GFS 6.1 nodes, start ccsd, run the lock_gulmd -c command, and start
clvmd as shown in the following example:
# ccsd
# lock_gulmd -c
Warning! You didn’t specify a cluster name before --use_ccs
Letting ccsd choose which cluster we belong to.
# clvmd
Note
Ignore the warning message following the lock_gulmd -c command. Because the
cluster name is already included in the converted configuration file, there is no need
to specify a cluster name when issuing the lock_gulmd -c command.
5. At all GFS 6.1 nodes, run vgscan as shown in the following example:
# vgscan
Reading all physical volumes. This may take a while...
Found volume group "argus" using metadata type pool
6. At one GFS 6.1 node, convert the pool volume to an LVM2 volume by running the
vgconvert command as shown in the following example:
# vgconvert -M2 argus
Volume group argus successfully converted
7. At all GFS 6.1 nodes, run vgchange -ay as shown in the following example:
# vgchange -ay
1 logical volume(s) in volume group "argus" now active
Appendix A. Upgrading GFS65
8. At the first node to mount a GFS file system, run the mount command with the
upgrade option as shown in the following example:
# mount -t gfs -o upgrade /dev/pool/argus /mnt/gfs1
Note
This step only needs to be done once — on the first mount of the GFS file system.
Note
If static minor numbers were used on pool volumes and the GFS 6.1 nodes are
using LVM2 for other purposes (root file system) there may be problems activating
the pool volumes under GFS 6.1. That is because of static minor conflicts. Refer
to the following Bugzilla report for more information:
activating your subscription, v
adding journals to a file system, 44
atime, configuring updates, 50
mounting with noatime, 50
tuning atime quantum, 51
audience, i
C
CDPN variable values table, 56
cluster software
installation and configuration
automatic installation of RPMs, 17
custom installation of RPMs, 17
custom installation using the rpm utility,
23
determining RPMs to install, 18
steps for installing and initializing, 15
steps for installing and initializing, 15
configuration, before, 9
configuration, initial, 27
prerequisite tasks, 27
console access
system requirements, 13
conventions
document, i
D
data journaling, 49
direct I/O, 47
directory attribute, 48
file attribute, 47
O_DIRECT, 47
displaying extended GFS information and
statistics, 53
recommended references table, vi
Red Hat Cluster Suite, 15
custom installation of software
with the rpm utility, 23
installation, 15
determining RPMs to install, 18
RPM installation
automatic, 17
custom, 17
system requirements, 11
references, recommended, vi
registering your subscription, v
repairing a file system, 54
RPMs, Red Hat Cluster Suite DLM
selection criteria of, 19
RPMs, Red Hat Cluster Suite, GULM
selection criteria of, 21
RPMs, Red Hat GFS
selection criteria of, 22
S
setup, initial
initial tasks, 27
software, installing, 25
subscription registration, v
suspending activity on a file system, 52
system requirements, 11
console access, 13
fencing, 12
fibre channel storage devices, 12
fibre channel storage network, 12
network power switches, 13
platform, 11
Red Hat Cluster Suite, 11
GFS-specific options for adding journals, 46
GFS-specific options for expanding file systems, 44
gfs_mkfs command options, 31
mount options, 34
platform requirements, 11
recommended references, vi
Red Hat Cluster Suite DLM RPM selection
criteria, 19
Red Hat Cluster Suite GULMRPM selection
criteria, 21
Red Hat GFS RPM selection criteria, 22
U
unmounting a file system, 35
upgrading GFS, 63
upgrade procedure, 63
T
tables
CDPN variable values, 56
fibre channel network requirements, 12
fibre channel storage device requirements, 12
GFS software subsystem components, 7
Colophon
The manuals are written in DocBook SGML v4.1 format. The HTML and PDF formats are
produced using custom DSSSL stylesheets and custom jade wrapper scripts. The DocBook
SGML files are written using Emacs with the help of PSGML mode.
Garrett LeSage created the admonition graphics (note, tip, important, caution, and warning). They may be freely redistributed with the Red Hat documentation.
The Red Hat Product Documentation Team consists of the following people:
Sandra A. Moore — Primary Writer/Maintainer of the Red Hat Enterprise Linux Instal-
lation Guide for x86, Itanium™, AMD64, and Intel® Extended Memory 64 Technology
(Intel® EM64T); Primary Writer/Maintainer of the Red Hat Enterprise Linux Installation
Guide for the IBM® POWER Architecture; Primary Writer/Maintainer of the Red Hat Enterprise Linux Installation Guide for the IBM® S/390® and IBM® eServer™ zSeries®
Architectures
John Ha — Primary Writer/Maintainer of the Red Hat Cluster Suite Configuring and Managing a Cluster; Co-writer/Co-maintainer of the Red Hat Enterprise Linux Security Guide;
Maintainer of custom DocBook stylesheets and scripts
Edward C. Bailey — Primary Writer/Maintainer of the Red Hat Enterprise Linux Introduc-tion to System Administration; Primary Writer/Maintainer of the Release Notes; Contributing Writer to the Red Hat Enterprise Linux Installation Guide for x86, Itanium™, AMD64,
and Intel® Extended Memory 64 Technology (Intel® EM64T)
Karsten Wade — Primary Writer/Maintainer of the Red Hat SELinux Guide; Contributing
Writer to the Red Hat Enterprise Linux System Administration Guide
Andrius T. Benokraitis — Primary Writer/Maintainer of the Red Hat Enterprise Linux Ref-erence Guide; Co-writer/Co-maintainer of the Red Hat Enterprise Linux Security Guide;
Contributing Writer to the Red Hat Enterprise Linux System Administration Guide
Paul Kennedy — Primary Writer/Maintainer of the Red Hat GFS Administrator’s Guide;
Contributing Writer to the Red Hat Cluster Suite Configuring and Managing a Cluster
Mark Johnson — Primary Writer/Maintainer of the Red Hat Desktop Deployment Guide;
Contributing Writer of Red Hat Network documentation
Melissa Goldin — Primary Writer/Maintainer of the Red Hat Enterprise Linux Step ByStep Guide; Contributing Writer of Red Hat Network Documentation
Lucy Ringland — Red Hat GFS Documentation Editor.
The Red Hat Localization Team consists of the following people:
Amanpreet Singh Alam — Punjabi translations
Jean-Paul Aubry — French translations
David Barzilay — Brazilian Portuguese translations