diff --git a/doc/Pacemaker_Explained/en-US/Ch-Advanced-Options.xml b/doc/Pacemaker_Explained/en-US/Ch-Advanced-Options.xml index 68305df089..3aaba17267 100644 --- a/doc/Pacemaker_Explained/en-US/Ch-Advanced-Options.xml +++ b/doc/Pacemaker_Explained/en-US/Ch-Advanced-Options.xml @@ -1,449 +1,449 @@ Advanced Configuration
Connecting to the Cluster Configuration from a Remote Machine Provided Pacemaker is installed on a machine, it is possible to connect to the cluster even if the machine itself is not a part of it. To do this, one simply sets up a number of environment variables and runs the same commands as you would when working on a cluster node. Environment Variables Used to Connect to Remote Instances of the CIB Environment Variable Description CIB_user The user to connect as. Needs to be part of the hacluster group on the target host. Defaults to $USER - CIB_password + CIB_passwd The user's password. Read from the command line if unset CIB_server The host to contact. Defaults to localhost. CIB_port The port on which to contact the server. Required. CIB_encrypted Encrypt network traffic. Defaults to true.
So if c001n01 is an active cluster node and is listening on 1234 for connections, and someguy is a member of the hacluster group. Then the following would prompt for someguy's password and return the cluster's current configuration: export CIB_port=1234; export CIB_server=c001n01; export CIB_user=someguy; cibadmin -Q For security reasons, the cluster does not listen remote connections by default. If you wish to allow remote access, you need to set the remote-tls-port (encrypted) or remote-clear-port (unencrypted) top-level options (ie. those kept in the cib tag , like num_updates and epoch). Extra top-level CIB options for remote access Field Description remote-tls-port Listen for encrypted remote connections on this port. Default: none remote-clear-port Listen for plaintext remote connections on this port. Default: none
Specifying When Recurring Actions are Performed By default, recurring actions are scheduled relative to when the resource started. So if your resource was last started at 14:32 and you have a backup set to be performed every 24 hours, then the backup will always run at in the middle of the business day - hardly desirable. To specify a date/time that the operation should be relative to, set the operation's interval-origin. The cluster uses this point to calculate the correct start-delay such that the operation will occur at origin + (interval * N). So if the operation's interval is 24h, it's interval-origin is set to 02:00 and it is currently 14:32, then the cluster would initiate the operation with a start delay of 11 hours and 28 minutes. If the resource is moved to another node before 2am, then the operation is of course cancelled. The value specified for interval and interval-origin can be any date/time conforming to the ISO8601 standard. By way of example, to specify an operation that would run on the first Monday of 2009 and every Monday after that you would add: Specifying a Base for Recurring Action Intervals <op id="my-weekly-action" name="custom-action" interval="P7D" interval-origin="2009-W01-1"/>
Moving Resources
Manual Intervention There are primarily two occasions when you would want to move a resource from it's current location: when the whole node is under maintenance and when a single resource needs to be moved. In the case where everything needs to move, since everything eventually comes down to a score, you could create constraints for every resource you have preventing it from running on that node. While the configuration can seem convoluted at times, not even we would require this of administrators. Instead one can set a special node attribute which tells the cluster "don't let anything run here". There is even a helpful tool to help query and set it called crm_standby. To check the standby status of the current machine, simply run: crm_standby --get-value A value of true indicates that the node is NOT able to host any resources and a value of false indicates that it CAN. You can also check the status of other nodes in the cluster by specifying the --node-uname option. Eg. crm_standby --get-value --node-uname sles-2 To change the current node's standby status, use --attr-value instead of --get-value. Eg. crm_standby --attr-value Again, you can change another host's value by supplying a host name with --node-uname. When only one resource is required to move, we do this by creating location constraints. However once again we provide a user friendly shortcut as part of the crm_resource command which creates and modifies the extra constraints for you. If Email was running on sles-1 and you wanted it moved to a specific location, the command would look something like: crm_resource -M -r Email -H sles-2 Behind the scenes, the tool will create the following location constraint: <rsc_location rsc="Email" node="sles-2" score="INFINITY"/> It is important to note that subsequent invocations of crm_resource -M are not cumulative. So if you ran: crm_resource -M -r Email -H sles-2 crm_resource -M -r Email -H sles-3 then it is as if you had never performed the first command. To allow the resource to move back again, use: crm_resource -U -r Email Note the use of the word allow. The resource can move back to its original location but, depending on resource stickiness, it may stay where it is. To be absolutely certain that it moves back to sles-1, move it there before issuing the call to crm_resource -U: crm_resource -M -r Email -H sles-1 crm_resource -U -r Email Alternatively, if you only care that the resource should be moved from its current location, try crm_resource -M -r Email Which will instead create a negative constraint. Eg. <rsc_location rsc="Email" node="sles-1" score="-INFINITY"/> This will achieve the desired effect but will also have long-term consequences. As the tool will warn you, the creation of a -INFINITY constraint will prevent the resource from running on that node until crm_resource -U is used. This includes the situation where every other cluster node is no longer available. In some cases, such as when resource stickiness is set to INFINITY, it is possible that you will end up with the problem described in . The tool can detect some of these cases and deals with them by also creating both a positive and negative constraint. Eg. Email prefers sles-1 with a score of -INFINITY Email prefers sles-2 with a score of INFINITY which has the same long-term consequences as discussed earlier.
Moving Resources Due to Failure New in 1.0 is the concept of a migration threshold The naming of this option was unfortunate as it is easily confused with true migration, the process of moving a resource from one node to another without stopping it. Xen virtual guests are the most common example of resources that can be migrated in this manner. . Simply define migration-threshold=N for a resource and it will migrate to a new node after N failures. There is no threshold defined by default. To determine the resource's current failure status and limits, use crm_mon --failcounts By default, once the threshold has been reached, node will no longer be allowed to run the failed resource until the administrator manually resets the resource's failcount using crm_failcount (after hopefully first fixing the failure's cause). However it is possible to expire them by setting the resource's failure-timeout option. So a setting of migration-threshold=2 and failure-timeout=60s would cause the resource to move to a new node after 2 failures and potentially allow it to move back (depending on the stickiness and constraint scores) after one minute. There are two exceptions to the migration threshold concept and occur when a resource either fails to start or fails to stop. Start failures cause the failcount to be set to INFINITY and thus always cause the resource to move immediately. Stop failures are slightly different and crucial. If a resource fails to stop and STONITH is enabled, then the cluster will fence the node in order to be able to start the resource elsewhere. If STONITH is not enabled, then the cluster has no way to continue and will not try to start the resource elsewhere, but will try to stop it again after the failure timeout. Please read before enabling this option.
Moving Resources Due to Connectivity Changes Setting up the cluster to move resources when external connectivity is lost, is a two-step process.
Tell Pacemaker to monitor connectivity To do this, you need to add a ping resource to the cluster. The ping resource uses the system utility of the same name to a test if list of machines (specified by DNS hostname or IPv4/ IPv6 address) are reachable and uses the results to maintain a node attribute normally called pingd. The attribute name is customizable which allows multiple ping groups to be defined Older versions of Heartbeat required users to add ping nodes to ha.cf - this is no longer required. Older versions of Pacemaker used a custom binary called pingd for this functionality, this is now deprecated in favor of ping. If your version of Pacemaker does not contain the ping agent, you can download the latest version from: Normally the resource will run on all cluster nodes, which means that you'll need to create a clone. A template for this can be found below along with a description of the most interesting parameters. Common Options for a 'ping' Resource Field Description dampen The time to wait (dampening) for further changes occur. Use this to prevent a resource from bouncing around the cluster when cluster nodes notice the loss of connectivity at slightly different times. multiplier The number by which to multiply the number of connected ping nodes by. Useful when there are multiple ping nodes configured. host_list The machines to contact in order to determine the current connectivity status. Allowed values include resolvable DNS hostnames, IPv4 and IPv6 addresses.
An example ping cluster resource, checks node connectivity once every minute ]]>
Tell Pacemaker how to interpret the connectivity data NOTE: Before reading the following, please make sure you have read and understood above. There are a number of ways to use the connectivity data provided by Heartbeat. The most common setup is for people to have a single ping node and want to prevent the cluster from running a resource on any unconnected node. Don't run on unconnected nodes ]]> A more complex setup is to have a number of ping nodes configured. You can require the cluster to only run resources on nodes that can connect to all (or a minimum subset) of them Run only on nodes connected to 3 or more ping nodes (assumes <literal>multiplier</literal> is set to 1000) ]]> or instead you can tell the cluster only to prefer nodes with the most connectivity. Just be sure to set the multiplier to a value higher than that of resource-stickiness (and don't set either of them to INFINITY). Prefer the node with the most connected ping nodes ]]> It is perhaps easier to think of this in terms of the simple constraints that the cluster translates it into. For example, if sles-1 is connected to all 5 ping nodes but sles-2 is only connected to 2, then it would be as if you instead had the following constraints in your configuration:
How the cluster translates the pingd constraint ]]>
The advantage being that you don't have to manually update them whenever your network connectivity changes. You can also combine the concepts above into something even more complex. The example below shows how you can prefer the node with the most connected ping nodes provided they have connectivity to at least three (assuming multiplier is set to 1000). A more complex example of choosing a location based on connectivity ]]>
Resource Migration Some resources, such as Xen virtual guests, are able to move to another location without lose of state. We call this resource migration and is different from the normal practice of stopping the resource on the first machine and starting it elsewhere. Not all resources are able to migrate, see the Migration Checklist below, and those that can wont do so in all situations. Conceptually there are two requirements from which the other prerequisites follow: the resource must be active and healthy at the old location everything required for the resource to run must be available on both the old and new locations The cluster is able to accommodate both push and pull migration models by requiring the resource agent to support two new actions: migrate_to (performed on the current location) and migrate_from (performed on the destination). In push migration, the process on the current location transfers the to the new location where is it later activated. In this scenario, most of the work would be done in the migrate_to action and, if anything, the activation would occur during migrate_from. Conversely for pull, the migrate_to action is practically empty and migrate_from does most of the work, extracting the relevant resource state from the old location and activating it. There is no wrong or right way to implement migration for your service, as long as it works.
Migration Checklist The resource may not be a clone. The resource must use an OCF style agent. The resource must not be in a failed or degraded state. The resource must not, directly or indirectly, depend on any primitive or group resources. The resources must support two new actions: migrate_to and migrate_from and advertise them in its metadata. The resource must have the allow-migrate meta-attribute set to true (not the default). If the resource depends on a clone, and at the time the resource needs to be move, the clone has instances that are stopping and instances that are starting, then the resource will be moved in the traditional manner. The Policy Engine is not yet able to model this situation correctly and so takes the safe (yet less optimal) path.
Reusing Rules, Options and Sets of Operations Sometimes a number of constraints need to use the same set of rules and resources need to set the same options an parameters. To simplify this situation, you can refer to an existing object using an id-ref instead of an id. So if for one resource you have ]]> Then instead of duplicating the rule for all your other resources, you can instead specify Referencing rules from other constraints ]]> The cluster will insist that the rule exists somewhere. Attempting to add a reference to a non-existing rule will cause a validation failure, as will attempting to remove a rule that is referenced elsewhere. The same principle applies for meta_attributes and instance_attributes as illustrated in the example below Referencing attributes, options and operations from other resources ]]>