Anvil! Tutorial 3: Difference between revisions

From Alteeve Wiki
Jump to navigation Jump to search
No edit summary
 
(32 intermediate revisions by the same user not shown)
Line 3: Line 3:
{{warning|1=This tutorial is incomplete, flawed and generally sucks at this time. Do not follow this and expect anything to work. In large part, it's a dumping ground for notes and little else. This warning will be removed when the tutorial is completed.}}
{{warning|1=This tutorial is incomplete, flawed and generally sucks at this time. Do not follow this and expect anything to work. In large part, it's a dumping ground for notes and little else. This warning will be removed when the tutorial is completed.}}


{{warning|1=This tutorial is built on [[Red Hat]]'s Enterprise Linux 7 beta. [[Red Hat]] never confirms what a future release will contain until it is actually released, so there is a real chance that what is in the beta will '''not''' be in the final release.}}
This is the third '''Anvil!''' tutorial built on [[Red Hat]]'s Enterprise Linux 7. It marks the third generation of the [[Anvil!]] High-Availability Platform.


This is the third '''Anvil!''' tutorial built on [[Red Hat]]'s Enterprise Linux 7. It improves on the [[Red Hat Cluster Service 2 Tutorial|RHEL 5, RHCS stable 2]] and [[AN!Cluster Tutorial 2]] tutorials.
As with the previous tutorials, the end goal of this tutorial is an ''Anvil!'' platform for high-availability virtual servers. It's design attempts to remove all single points of failure from the system. Power and networking are made fully redundant in this version, along with minimizing the node failures which would lead to service interruption. This tutorial also covers the [[Striker]] dashboard and [[ScanCore]] monitoring and self-healing tools.  
 
As with the previous tutorials, the end goal of this tutorial is an ''Anvil!'' platform for high-availability virtual servers. It's design attempts to remove all single points of failure from the system. Power and networking are made fully redundant in this version, along with minimizing the node failures which would lead to service interruption. This tutorial also covers the [[Striker]] dashboard and monitoring tools.  


As it the previous tutorial, [[KVM]] will be the hypervisor used for facilitating virtual machines. The old <span class="code">[[cman]]</span> and <span class="code">[[rgmanager]]</span> tools are replaced in favour of <span class="code">[[pacemaker]]</span> for resource management.  
As it the previous tutorial, [[KVM]] will be the hypervisor used for facilitating virtual machines. The old <span class="code">[[cman]]</span> and <span class="code">[[rgmanager]]</span> tools are replaced in favour of <span class="code">[[pacemaker]]</span> for resource management.  
Line 21: Line 19:
= OS Setup =
= OS Setup =


{{warning|1=We are using the [[RHEL]] 7 Release Candidate OS.}}
This tutorial assumes a <span class="code">minimal</span> install of either [[RHEL]] or [[CentOS]] version 7.


== Post OS Install ==
== Post OS Install ==
Line 27: Line 25:
{{note|1=With RHEL7, <span class="code">[[biosdevname]]</span> tries to give network devices predictable names. It's very likely that your initial device names will differ from those in this tutorial.}}
{{note|1=With RHEL7, <span class="code">[[biosdevname]]</span> tries to give network devices predictable names. It's very likely that your initial device names will differ from those in this tutorial.}}


=== Enabling the RC Repos ===
=== If you are running RHEL ===


While using the RHEL 7 RC, the public repos are disabled by default. This enables them.
Before you can download any packages, you will need to register your nodes with Red Hat's subscription manager;


<syntaxhighlight lang="bash">
{|class="wikitable"
vi /etc/yum.repos.d/rhel.repo
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
subscription-manager register --username $username --password $password --auto-attach
subscription-manager repos --enable=rhel-ha-for-rhel-7-server-rpms
subscription-manager repos --enable=rhel-7-server-optional-rpms
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
[rhel-rc]
The system has been registered with ID: 9c578d87-bd80-4637-9f41-6076efb9e20e
name=Red Hat Enterprise Linux 7 RC - $basearch
#baseurl=ftp://ftp.redhat.com/pub/redhat/rhel/rc/7/$basearch/os/
mirrorlist=https://mirrors.fedoraproject.org/metalink?repo=rhel-7&arch=$basearch
enabled=1
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
 
[rhel-rc-ha]
name=Red Hat Enterprise Linux 7 RC - High Availability AddOn - $basearch
baseurl=http://ftp.redhat.com/pub/redhat/rhel/rc/7/Server/x86_64/os/addons/HighAvailability/
enabled=1
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
 
[rhel-rc-source]
name=Red Hat Enterprise Linux 7 RC - $basearch - Source
#baseurl=ftp://ftp.redhat.com/pub/redhat/rhel/rc/7/source/
mirrorlist=https://mirrors.fedoraproject.org/metalink?repo=rhel-source-7&arch=$basearch
enabled=0
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release


[rhel-rc-debuginfo]
Installed Product Current Status:
name=Red Hat Enterprise Linux 7 RC - $basearch - Debuginfo
Product Name: Red Hat Enterprise Linux Server
#baseurl=ftp://ftp.redhat.com/pub/redhat/rhel/rc/7/$basearch/debug/
Status:       Subscribed
mirrorlist=https://mirrors.fedoraproject.org/metalink?repo=rhel-debug-7&arch=$basearch
enabled=0
gpgcheck=1
gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
|-
yum clean all
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
subscription-manager register --username $username --password $password --auto-attach
subscription-manager repos --enable=rhel-ha-for-rhel-7-server-rpms
subscription-manager repos --enable=rhel-7-server-optional-rpms
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Loaded plugins: product-id, subscription-manager
The system has been registered with ID: a55c83e5-e4ec-4fcf-b7b7-b9455b3e07cf
This system is not registered to Red Hat Subscription Management. You can use subscription-manager to register.
 
Cleaning repos: rhel-beta rhel-beta-debuginfo rhel-beta-source
Installed Product Current Status:
Cleaning up everything
Product Name: Red Hat Enterprise Linux Server
Status:       Subscribed
</syntaxhighlight>
</syntaxhighlight>
|}


Done.
== Adding LINBIT Repos ==


== Install ==
If you purchased full [https://my.linbit.com LINBIT support], you can add their repos in order to get DRBD 9 and associated tools.


Not all of these are required, but most are used at one point or another in this tutorial.
First, download their registration tool.


{{note|1=The <span class="code">fence-agents-virsh</span> package is not available in RHEL 7 beta. Further, it's only needed if you're building your Anvil! using VMs.}}
{|class="wikitable"
 
!<span class="code">an-a04n01</span>
<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
yum install bridge-utils corosync ntp pacemaker pcs rsync syslinux \
cd /root
            wget fence-agents-all gpm man vim screen mlocate \
wget https://my.linbit.com/linbit-manage-node.py
            syslinux dlm dlm-lib lvm2-cluster gfs2-utils
</syntaxhighlight>
</syntaxhighlight>
During the install, you will be asked to OK the keys:
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Retrieving key from file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
--2016-11-19 10:22:21--  https://my.linbit.com/linbit-manage-node.py
Importing GPG key 0xFD431D51:
Resolving my.linbit.com (my.linbit.com)... 212.69.166.235
  Userid    : "Red Hat, Inc. (release key 2) <security@redhat.com>"
Connecting to my.linbit.com (my.linbit.com)|212.69.166.235|:443... connected.
Fingerprint: 567e 347a d004 4ade 55ba 8a5f 199e 2f91 fd43 1d51
HTTP request sent, awaiting response... 200 OK
Package    : redhat-release-server-7.0-1.el7.x86_64 (@anaconda/7.0)
Length: 26797 (26K) [application/x-python-script]
From      : /etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
Saving to: ‘linbit-manage-node.py’
Is this ok [y/N]: y
Importing GPG key 0x2FA658E0:
Userid    : "Red Hat, Inc. (auxiliary key) <security@redhat.com>"
Fingerprint: 43a6 e49c 4a38 f4be 9abf 2a53 4568 9c88 2fa6 58e0
Package    : redhat-release-server-7.0-1.el7.x86_64 (@anaconda/7.0)
From      : /etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release
Is this ok [y/N]: y
</syntaxhighlight>


If you want to use your mouse at the node's terminal, run the following;
100%[========================================================================================>] 26,797      --.-K/s   in 0.1s   


<syntaxhighlight lang="bash">
2016-11-19 10:22:21 (175 KB/s) - ‘linbit-manage-node.py’ saved [26797/26797]
systemctl enable gpm.service
systemctl start gpm.service
</syntaxhighlight>
</syntaxhighlight>
|-
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
cd /root
wget https://my.linbit.com/linbit-manage-node.py
</syntaxhighlight>
<syntaxhighlight lang="text">
--2016-11-19 10:26:52--  https://my.linbit.com/linbit-manage-node.py
Resolving my.linbit.com (my.linbit.com)... 212.69.166.235
Connecting to my.linbit.com (my.linbit.com)|212.69.166.235|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 26797 (26K) [application/x-python-script]
Saving to: ‘linbit-manage-node.py’
100%[========================================================================================>] 26,797      --.-K/s  in 0.1s   
2016-11-19 10:26:53 (182 KB/s) - ‘linbit-manage-node.py’ saved [26797/26797]
</syntaxhighlight>
|}


Disable dlm and clvmd from starting on boot.
Make it executable.


<syntaxhighlight lang="bash">
{|class="wikitable"
systemctl disable clvmd.service
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
chmod 755 linbit-manage-node.py
ls -lah linbit-manage-node.py
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
clvmd.service is not a native service, redirecting to /sbin/chkconfig.
-rwxr-xr-x. 1 root root 27K Oct 11 05:54 linbit-manage-node.py
Executing /sbin/chkconfig clvmd off
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
|-
systemctl disable dlm.service
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
chmod 755 linbit-manage-node.py
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
rm '/etc/systemd/system/multi-user.target.wants/dlm.service'
-rwxr-xr-x. 1 root root 27K Oct 11 05:54 linbit-manage-node.py
</syntaxhighlight>
</syntaxhighlight>
|}


=== Making ssh faster when the net is down ===
{{note|1=If you get the error: '<span class="code">ERR: Could not detect MAC addresses of your node</span>', then the version of '<span class="code">linbit-manage-node.py</span>' does not yet recognise bridges or slaved interfaces in bonds. For now, you can download a [https://alteeve.ca/files/linbit-manage-node_anvil.py modified version from Alteeve] instead.}}


By default, the nodes will try to resolve the host name of an incoming ssh connection. When the internet connection is down, DNS lookups have to time out, which can make login times quite slow. When something goes wrong, seconds count and waiting for up to a minute for an SSH password prompt can be maddening.
Now run the tool interactively.


For this reason, we will make two changes to <span class="code">/etc/ssh/sshd_config</span> that disable this login delay.
{|class="wikitable"
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
/root/linbit-manage-node.py
</syntaxhighlight>
<syntaxhighlight lang="text">
linbit-manage-node.py (Version: 1.11)
Checking if version is up to date
[OK] Your version is up to date
Username:
</syntaxhighlight>
|-
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
/root/linbit-manage-node.py
</syntaxhighlight>
<syntaxhighlight lang="text">
linbit-manage-node.py (Version: 1.11)
Checking if version is up to date
[OK] Your version is up to date
Username:
</syntaxhighlight>
|}


Please be aware that this can reduce security. If this is a concern, skip this step.
Enter the user name and password given to you by LINBIT when you registered with them.


<syntaxhighlight lang="bash">
{|class="wikitable"
sed -i.anvil 's/#GSSAPIAuthentication no/GSSAPIAuthentication no/' /etc/ssh/sshd_config
!<span class="code">an-a04n01</span>
sed -i 's/GSSAPIAuthentication yes/#GSSAPIAuthentication yes/' /etc/ssh/sshd_config
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
sed -i 's/#UseDNS yes/UseDNS no/' /etc/ssh/sshd_config
Username: xxxxxx
systemctl restart sshd.service
Credential (will not be echoed):  
diff -u /etc/ssh/sshd_config.anvil /etc/ssh/sshd_config
</syntaxhighlight>
<syntaxhighlight lang="diff">
--- /etc/ssh/sshd_config.anvil 2013-11-08 09:17:23.000000000 -0500
+++ /etc/ssh/sshd_config 2014-04-03 00:01:40.980951975 -0400
@@ -89,8 +89,8 @@
#KerberosUseKuserok yes
# GSSAPI options
-#GSSAPIAuthentication no
-GSSAPIAuthentication yes
+GSSAPIAuthentication no
+#GSSAPIAuthentication yes
#GSSAPICleanupCredentials yes
GSSAPICleanupCredentials yes
#GSSAPIStrictAcceptorCheck yes
@@ -127,7 +127,7 @@
#ClientAliveInterval 0
#ClientAliveCountMax 3
#ShowPatchLevel no
-#UseDNS yes
+UseDNS no
#PidFile /var/run/sshd.pid
#MaxStartups 10:30:100
#PermitTunnel no
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
[OK] Login successful
The following contracts are available:
Will this node form a cluster with...


Subsequent logins when the net is down should be quick.
1) Contract: silver 2017-01-07 (ID: xxxx)


=== Configuring the network ===
--> Please enter a number in range and press return:
</syntaxhighlight>
|-
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
Username: xxxxxx
Credential (will not be echoed):
</syntaxhighlight>
<syntaxhighlight lang="text">
[OK] Login successful
The following contracts are available:
Will this node form a cluster with...
 
1) Contract: silver 2017-01-07 (ID: xxxx)


<span class="code"></span>
--> Please enter a number in range and press return:
<syntaxhighlight lang="bash">
</syntaxhighlight>
</syntaxhighlight>
|}


If you have multiple contracts, select the number to the left of the contract identification. Otherwise, select '<span class="code">1</span>'.


Enable the <span class="code">eth0</span> interface on boot.
{|class="wikitable"
 
!<span class="code">an-a04n01</span>
<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
sed -i.bak 's/ONBOOT=.*/ONBOOT="yes"/' /etc/sysconfig/network-scripts/ifcfg-eth0
--> Please enter a number in range and press return: 1
diff -U0 /etc/sysconfig/network-scripts/ifcfg-eth0.bak /etc/sysconfig/network-scripts/ifcfg-eth0
</syntaxhighlight>
<syntaxhighlight lang="text">
Writing registration data:
</syntaxhighlight>
|-
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
--> Please enter a number in range and press return: 1
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="diff">
<syntaxhighlight lang="text">
--- /etc/sysconfig/network-scripts/ifcfg-eth0.bak 2014-01-23 16:15:45.008085032 -0500
Writing registration data:
+++ /etc/sysconfig/network-scripts/ifcfg-eth0 2014-01-23 16:15:25.573009623 -0500
@@ -11 +11 @@
-ONBOOT=no
+ONBOOT="yes"
</syntaxhighlight>
</syntaxhighlight>
|}


If you want to make any other changes, like configuring the interface to have a static IP, do so now. Once you're done editing;
Confirm that you want to write out the license file. Once you accept, you will be presented with a menu of which repositories you want to use from LINBIT. We're only going to enable the '<span class="field">drbd-9.0</span>' repo and leave the pacemaker repos disabled as we'll pull them from Red Hat.


<syntaxhighlight lang="bash">
{|class="wikitable"
nmcli connection reload
!<span class="code">an-a04n01</span>
systemctl restart NetworkManager.service
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
ip addr show
--> Write to file (/var/lib/drbd-support/registration.json)? [y/N]
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
  Here are the repositories you can enable:
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
 
     inet 127.0.0.1/8 scope host lo
     1) pacemaker-1.1.15(Disabled)
      valid_lft forever preferred_lft forever
    2) pacemaker-1.1.12(Disabled)
     inet6 ::1/128 scope host
     3) pacemaker-1.1(Disabled)
      valid_lft forever preferred_lft forever
     4) drbd-9.0(Disabled)
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
     5) drbd-8.4(Disabled)
     link/ether 52:54:00:a7:9d:17 brd ff:ff:ff:ff:ff:ff
 
     inet 192.168.122.201/24 scope global eth0
  Enter the number of the repository you wish to enable/disable. Hit 0 when you are done.
      valid_lft forever preferred_lft forever
</syntaxhighlight>
    inet6 fe80::5054:ff:fea7:9d17/64 scope link
<syntaxhighlight lang="text">
      valid_lft forever preferred_lft forever
  Enable/Disable: 4
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
  Here are the repositories you can enable:
    1) pacemaker-1.1.15(Disabled)
    2) pacemaker-1.1.12(Disabled)
    3) pacemaker-1.1(Disabled)
    4) drbd-9.0(Enabled)
    5) drbd-8.4(Disabled)


The interface should now start on boot properly.
  Enter the number of the repository you wish to enable/disable. Hit 0 when you are done.
</syntaxhighlight>
<syntaxhighlight lang="text">
  Enable/Disable: 0
</syntaxhighlight>
|-
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
--> Write to file (/var/lib/drbd-support/registration.json)? [y/N]
</syntaxhighlight>
<syntaxhighlight lang="text">
  Here are the repositories you can enable:


== Setting the Hostname ==
    1) pacemaker-1.1.15(Disabled)
    2) pacemaker-1.1.12(Disabled)
    3) pacemaker-1.1(Disabled)
    4) drbd-9.0(Disabled)
    5) drbd-8.4(Disabled)


Fedora 19 is '''very''' different from [[EL6]].
  Enter the number of the repository you wish to enable/disable. Hit 0 when you are done.
</syntaxhighlight>
<syntaxhighlight lang="text">
  Enable/Disable: 4
</syntaxhighlight>
<syntaxhighlight lang="text">
  Here are the repositories you can enable:


{{note|1=The '<span class="code">--pretty</span>' line currently doesn't work as there is [https://bugzilla.redhat.com/show_bug.cgi?id=895299 a bug (rhbz#895299)] with single-quotes.}}
    1) pacemaker-1.1.15(Disabled)
{{note|1=The '<span class="code">--static</span>' option is currently needed to prevent the '<span class="code">.</span>' from being removed. See [https://bugzilla.redhat.com/show_bug.cgi?id=896756 this bug (rhbz#896756)].}}
    2) pacemaker-1.1.12(Disabled)
    3) pacemaker-1.1(Disabled)
    4) drbd-9.0(Enabled)
    5) drbd-8.4(Disabled)


Use a format that works for you. For the tutorial, node names are based on the following;
  Enter the number of the repository you wish to enable/disable. Hit 0 when you are done.
* A two-letter prefix identifying the company/user (<span class="code">an</span>, for "Alteeve's Niche!")
</syntaxhighlight>
* A sequential Anvil! ID number in the form of <span class="code">aXX</span> (<span class="code">a01</span> for "Anvil! 01", <span class="code">a02</span> for Anvil! 02, etc)
<syntaxhighlight lang="text">
* A sequential node ID number in the form of <span class="code">nYY</span>
  Enable/Disable: 0
</syntaxhighlight>
|}
 
{{warning|1=The repository will include a node-specific hash string in the '<span class="code">baseurl</span>'. Keep this private!}}


In our case, this is my third Anvil! and we use the company prefix <span class="code">an</span>, so these two nodes will be;
Once you select '<span class="code">0</span>' to exit that menu, a summary of the repo will be displayed and you will be asked if you want to save it or not.
* <span class="code">an-a03n01</span> - node 1
* <span class="code">an-a03n02</span> - node 2


<syntaxhighlight lang="bash">
{|class="wikitable"
hostnamectl set-hostname an-a03n01.alteeve.ca --static
!<span class="code">an-a04n01</span>
hostnamectl set-hostname --pretty "Alteeve's Niche! - Anvil! 03, Node 01"
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
</syntaxhighlight>
Writing repository config:
Content:
[drbd-8.4]
name=LINBIT Packages for drbd-8.4 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/drbd-8.4/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1


If you want the new host name to take effect immediately, you can use the traditional <span class="code">hostname</span> command:
[pacemaker-1.1]
name=LINBIT Packages for pacemaker-1.1 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1


<syntaxhighlight lang="bash">
[pacemaker-1.1.15]
hostname an-a03n01.alteeve.ca
name=LINBIT Packages for pacemaker-1.1.15 - $basearch
</syntaxhighlight>
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1.15/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1


The "pretty" host name is stored in <span class="code">/etc/machine-info</span> as the unquoted value for the <span class="code">PRETTY_HOSTNAME</span> value.
[pacemaker-1.1.12]
name=LINBIT Packages for pacemaker-1.1.12 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1.12/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1


<syntaxhighlight lang="bash">
[drbd-9.0]
vim /etc/machine-info
name=LINBIT Packages for drbd-9.0 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/drbd-9.0/$basearch
enabled=1
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
PRETTY_HOSTNAME=Alteeves Niche! - Anvil! 01, Node 01
--> Write to file (/etc/yum.repos.d/linbit.repo)? [y/N] y
</syntaxhighlight>
</syntaxhighlight>
|-
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
Writing repository config:
Content:
[drbd-8.4]
name=LINBIT Packages for drbd-8.4 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/drbd-8.4/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1


If you can't get the <span class="code">hostname</span> command to work for some reason, you can reboot to have the system read the new values.
[pacemaker-1.1]
name=LINBIT Packages for pacemaker-1.1 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1


== What Security? ==
[pacemaker-1.1.15]
name=LINBIT Packages for pacemaker-1.1.15 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1.15/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1


{{note|1=The final version of this tutorial '''will''' use the firewall and selinux. It's disabled to simplify debugging during the development stage of the tutorial only.}}
[pacemaker-1.1.12]
name=LINBIT Packages for pacemaker-1.1.12 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1.12/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1


This section will be re-added at the end. For now;
[drbd-9.0]
 
name=LINBIT Packages for drbd-9.0 - $basearch
<syntaxhighlight lang="bash">
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/drbd-9.0/$basearch
setenforce 0
enabled=1
sed -i 's/SELINUX=enforcing/SELINUX=permissive/' /etc/selinux/config
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
systemctl disable firewalld.service
gpgcheck=1
systemctl stop firewalld.service
</syntaxhighlight>
<syntaxhighlight lang="text">
--> Write to file (/etc/yum.repos.d/linbit.repo)? [y/N] y
</syntaxhighlight>
</syntaxhighlight>
|}


== Network ==
When you accept, it will download the yum plugins and then ask you if you want to save their PGP key.


We want static, named network devices. Follow this;
{|class="wikitable"
 
!<span class="code">an-a04n01</span>
* [[Changing Ethernet Device Names in EL7 and Fedora 15+]]
|style="white-space: nowrap;"|<syntaxhighlight lang="text">
 
[OK] Repository configuration written
Then, use these configuration files;
Downloading LINBIT yum plugin
 
Downloading LINBIT yum plugin config
Build the bridge;
Final Notes:
 
<syntaxhighlight lang="bash">
vim /etc/sysconfig/network-scripts/ifcfg-ifn-vbr1
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
<syntaxhighlight lang="text">
# Internet-Facing Network - Bridge
--> Add linbit signing key to keyring now? [y/N] y
DEVICE="ifn-vbr1"
TYPE="Bridge"
BOOTPROTO="none"
IPADDR="10.255.10.1"
NETMASK="255.255.0.0"
GATEWAY="10.255.255.254"
DNS1="8.8.8.8"
DNS2="8.8.4.4"
DEFROUTE="yes"
</syntaxhighlight>
</syntaxhighlight>
 
<syntaxhighlight lang="text">
Now build the bonds;
Now update your package information and install
 
LINBIT's kernel module and/or user space utilities
<syntaxhighlight lang="bash">
[OK] Congratulations! Your node was successfully configured.
vim /etc/sysconfig/network-scripts/ifcfg-ifn-bond1
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
|-
# Internet-Facing Network - Bond
!<span class="code">an-a04n02</span>
DEVICE="ifn-bond1"
|style="white-space: nowrap;"|<syntaxhighlight lang="text">
BRIDGE="ifn-vbr1"
[OK] Repository configuration written
BOOTPROTO="none"
Downloading LINBIT yum plugin
NM_CONTROLLED="no"
Downloading LINBIT yum plugin config
ONBOOT="yes"
Final Notes:
BONDING_OPTS="mode=1 miimon=100 use_carrier=1 updelay=120000 downdelay=0 primary=ifn1"
</syntaxhighlight>
</syntaxhighlight>
 
<syntaxhighlight lang="text">
<syntaxhighlight lang="bash">
--> Add linbit signing key to keyring now? [y/N] y
vim /etc/sysconfig/network-scripts/ifcfg-sn-bond1
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
<syntaxhighlight lang="text">
# Storage Network - Bond
Now update your package information and install
DEVICE="sn-bond1"
LINBIT's kernel module and/or user space utilities
BOOTPROTO="none"
[OK] Congratulations! Your node was successfully configured.
NM_CONTROLLED="no"
ONBOOT="yes"
BONDING_OPTS="mode=1 miimon=100 use_carrier=1 updelay=120000 downdelay=0 primary=sn1"
IPADDR="10.10.10.1"
NETMASK="255.255.0.0"
</syntaxhighlight>
</syntaxhighlight>
|}


<syntaxhighlight lang="bash">
Done!
vim /etc/sysconfig/network-scripts/ifcfg-bcn-bond1
 
</syntaxhighlight>
== Install ==
<syntaxhighlight lang="bash">
# Back-Channel Network - Bond
DEVICE="bcn-bond1"
BOOTPROTO="none"
NM_CONTROLLED="no"
ONBOOT="yes"
BONDING_OPTS="mode=1 miimon=100 use_carrier=1 updelay=120000 downdelay=0 primary=bcn1"
IPADDR="10.20.10.1"
NETMASK="255.255.0.0"
</syntaxhighlight>


Now tell the interfaces to be slaves to their bonds;
Not all of these are required, but most are used at one point or another in this tutorial.


Internet-Facing Network;
{{note|1=The <span class="code">fence-agents-virsh</span> package is not available in RHEL 7 beta. Further, it's only needed if you're building your Anvil! using VMs.}}


<syntaxhighlight lang="bash">
{|class="wikitable"
vim /etc/sysconfig/network-scripts/ifcfg-ifn1
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
yum install rsync pacemaker bridge-utils ntp corosync pcs wget gpm man vim screen mlocate syslinux bzip2 \
            openssh-clients fence-agents-all fence-agents-virsh policycoreutils-python drbd drbd-bash-completion \
            drbd-pacemaker drbd-udev drbd-utils drbdmanage
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
|-
# Internet-Facing Network - Link 1
!<span class="code">an-a04n02</span>
DEVICE="ifn1"
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
NM_CONTROLLED="no"
<same>
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="ifn-bond1"
</syntaxhighlight>
</syntaxhighlight>
|}


<syntaxhighlight lang="bash">
vim /etc/sysconfig/network-scripts/ifcfg-ifn2
</syntaxhighlight>
<syntaxhighlight lang="bash">
# Back-Channel Network - Link 2
DEVICE="ifn2"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="ifn-bond1"
</syntaxhighlight>


Storage Network;
== Making ssh faster when the net is down ==
 
By default, the nodes will try to resolve the host name of an incoming ssh connection. When the internet connection is down, DNS lookups have to time out, which can make login times quite slow. When something goes wrong, seconds count and waiting for up to a minute for an SSH password prompt can be maddening.
 
For this reason, we will make two changes to <span class="code">/etc/ssh/sshd_config</span> that disable this login delay.


<syntaxhighlight lang="bash">
Please be aware that this can reduce security. If this is a concern, skip this step.
vim /etc/sysconfig/network-scripts/ifcfg-sn1
</syntaxhighlight>
<syntaxhighlight lang="bash">
# Storage Network - Link 1
DEVICE="sn1"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="sn-bond1"
</syntaxhighlight>


<syntaxhighlight lang="bash">
{|class="wikitable"
vim /etc/sysconfig/network-scripts/ifcfg-sn2
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
sed -i.anvil 's/#GSSAPIAuthentication no/GSSAPIAuthentication no/' /etc/ssh/sshd_config
sed -i 's/GSSAPIAuthentication yes/#GSSAPIAuthentication yes/' /etc/ssh/sshd_config
sed -i 's/#UseDNS yes/UseDNS no/' /etc/ssh/sshd_config
systemctl restart sshd.service
diff -u /etc/ssh/sshd_config.anvil /etc/ssh/sshd_config
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
<syntaxhighlight lang="diff">
# Storage Network - Link 1
--- /etc/ssh/sshd_config.anvil 2014-06-09 21:15:52.000000000 -0400
DEVICE="sn2"
+++ /etc/ssh/sshd_config 2014-07-27 08:41:03.296760761 -0400
NM_CONTROLLED="no"
@@ -89,8 +89,8 @@
BOOTPROTO="none"
#KerberosUseKuserok yes
ONBOOT="yes"
SLAVE="yes"
# GSSAPI options
MASTER="sn-bond1"
-#GSSAPIAuthentication no
-GSSAPIAuthentication yes
+GSSAPIAuthentication no
+#GSSAPIAuthentication yes
#GSSAPICleanupCredentials yes
GSSAPICleanupCredentials yes
#GSSAPIStrictAcceptorCheck yes
@@ -127,7 +127,7 @@
#ClientAliveInterval 0
#ClientAliveCountMax 3
#ShowPatchLevel no
-#UseDNS yes
+UseDNS no
#PidFile /var/run/sshd.pid
#MaxStartups 10:30:100
#PermitTunnel no
</syntaxhighlight>
|-
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
same
</syntaxhighlight>
<syntaxhighlight lang="text">
same
</syntaxhighlight>
</syntaxhighlight>
|}


Back-Channel Network
Subsequent logins when the net is down should be quick.


<syntaxhighlight lang="bash">
=== Configuring the network ===
vim /etc/sysconfig/network-scripts/ifcfg-bcn1
</syntaxhighlight>
<syntaxhighlight lang="bash">
# Back-Channel Network - Link 1
DEVICE="bcn1"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="bcn-bond1"
</syntaxhighlight>


<syntaxhighlight lang="bash">
If you want to make any other changes, like configuring the interface to have a static IP, do so now. Once you're done editing;
vim /etc/sysconfig/network-scripts/ifcfg-bcn2
</syntaxhighlight>
<syntaxhighlight lang="bash">
# Storage Network - Link 1
DEVICE="bcn2"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="bcn-bond1"
</syntaxhighlight>
 
Now restart the network, confirm that the bonds and bridge are up and you are ready to proceed.
 
== Setup The hosts File ==
 
You can use [[DNS]] if you prefer. For now, lets use <span class="code">/etc/hosts</span> for node name resolution.


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
vim /etc/hosts
nmcli connection reload
systemctl restart NetworkManager.service
ip addr show
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
::1         localhost localhost.localdomain localhost6 localhost6.localdomain6
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
      valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
      valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
    link/ether 52:54:00:a7:9d:17 brd ff:ff:ff:ff:ff:ff
    inet 192.168.122.201/24 scope global eth0
      valid_lft forever preferred_lft forever
    inet6 fe80::5054:ff:fea7:9d17/64 scope link
      valid_lft forever preferred_lft forever
</syntaxhighlight>


# Anvil! 03, Node 01
The interface should now start on boot properly.
10.255.30.1    an-a03n01.ifn
10.10.30.1      an-a03n01.sn
10.20.30.1      an-a03n01.bcn an-a03n01 an-a03n01.alteeve.ca
10.20.31.1      an-a03n01.ipmi


# Anvil! 03, Node 02
== Setting the Hostname ==
10.255.30.2    an-a03n02.ifn
10.10.30.2      an-a03n02.sn
10.20.30.2      an-a03n02.bcn an-a03n02 an-a03n02.alteeve.ca
10.20.31.2      an-a03n02.ipmi


# Foundation Pack
Fedora 19 is '''very''' different from [[EL6]].
10.20.2.7      an-p03 an-p03.alteeve.ca
</syntaxhighlight>


== Setup SSH ==
{{note|1=The '<span class="code">--pretty</span>' line currently doesn't work as there is [https://bugzilla.redhat.com/show_bug.cgi?id=895299 a bug (rhbz#895299)] with single-quotes.}}
{{note|1=The '<span class="code">--static</span>' option is currently needed to prevent the '<span class="code">.</span>' from being removed. See [https://bugzilla.redhat.com/show_bug.cgi?id=896756 this bug (rhbz#896756)].}}


Same as [[AN!Cluster_Tutorial_2#Setting_up_SSH|before]].
Use a format that works for you. For the tutorial, node names are based on the following;
* A two-letter prefix identifying the company/user (<span class="code">an</span>, for "Alteeve's Niche!")
* A sequential Anvil! ID number in the form of <span class="code">aXX</span> (<span class="code">a01</span> for "Anvil! 01", <span class="code">a02</span> for Anvil! 02, etc)
* A sequential node ID number in the form of <span class="code">nYY</span>


== Populating And Pushing ~/.ssh/known_hosts ==
In our case, this is my third Anvil! and we use the company prefix <span class="code">an</span>, so these two nodes will be;
* <span class="code">an-a04n01</span> - node 1
* <span class="code">an-a04n02</span> - node 2


<syntaxhighlight lang="bash">
hostnamectl set-hostname an-a04n01.alteeve.ca --static
hostnamectl set-hostname --pretty "Alteeve's Niche! - Anvil! 03, Node 01"
</syntaxhighlight>
If you want the new host name to take effect immediately, you can use the traditional <span class="code">hostname</span> command:
<syntaxhighlight lang="bash">
hostname an-a04n01.alteeve.ca
</syntaxhighlight>
The "pretty" host name is stored in <span class="code">/etc/machine-info</span> as the unquoted value for the <span class="code">PRETTY_HOSTNAME</span> value.


{|class="wikitable"
<syntaxhighlight lang="bash">
!<span class="code">an-a03n01</span>
vim /etc/machine-info
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
ssh-keygen -t rsa -N "" -b 8191 -f ~/.ssh/id_rsa
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Generating public/private rsa key pair.
PRETTY_HOSTNAME=Alteeves Niche! - Anvil! 03, Node 01
</syntaxhighlight>
 
If you can't get the <span class="code">hostname</span> command to work for some reason, you can reboot to have the system read the new values.
 
== Network ==
 
{{note|1=(Note for myself) - Consider using '<span class="code">[https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Deployment_Guide/sec-Specific_Kernel_Module_Capabilities.html#sec-Using_Channel_Bonding primary_reselect=1]</span>.}}


Your identification has been saved in /root/.ssh/id_rsa.
We want static, named network devices. Follow this;
Your public key has been saved in /root/.ssh/id_rsa.pub.
 
The key fingerprint is:
* [[Changing Ethernet Device Names in EL7 and Fedora 15+]]
be:17:cc:23:8e:b1:b4:76:a1:e4:2a:91:cb:cd:d8:3a root@an-a03n01.alteeve.ca
 
The key's randomart image is:
Then, use these configuration files;
+--[ RSA 8191]----+
 
|                |
Build the bridge;
|                |
 
|                |
<syntaxhighlight lang="bash">
|                |
vim /etc/sysconfig/network-scripts/ifcfg-ifn_bridge1
|  .    So      |
|  o  +.o =     |
| . B + B.o o    |
|  E + B o..      |
|  .+.o ...      |
+-----------------+
</syntaxhighlight>
</syntaxhighlight>
|-
<syntaxhighlight lang="bash">
!<span class="code">an-a03n01</span>
# Internet-Facing Network - Bridge
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
DEVICE="ifn_bridge1"
ssh-keygen -t rsa -N "" -b 8191 -f ~/.ssh/id_rsa
TYPE="Bridge"
BOOTPROTO="none"
IPADDR="10.255.40.1"
NETMASK="255.255.0.0"
GATEWAY="10.255.255.254"
DNS1="8.8.8.8"
DNS2="8.8.4.4"
DEFROUTE="yes"
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
 
Generating public/private rsa key pair.
Now build the bonds;
Created directory '/root/.ssh'.
 
Your identification has been saved in /root/.ssh/id_rsa.
<syntaxhighlight lang="bash">
Your public key has been saved in /root/.ssh/id_rsa.pub.
vim /etc/sysconfig/network-scripts/ifcfg-ifn_bond1
The key fingerprint is:
</syntaxhighlight>
71:b1:9d:31:9f:7a:c9:10:74:e0:4c:69:53:8f:e4:70 root@an-a03n02.alteeve.ca
<syntaxhighlight lang="bash">
The key's randomart image is:
# Internet-Facing Network - Bond
+--[ RSA 8191]----+
DEVICE="ifn_bond1"
|          ..O+E  |
BRIDGE="ifn_bridge1"
|          B+% + |
BOOTPROTO="none"
|        . o.*.= .|
NM_CONTROLLED="no"
|        o  + . |
ONBOOT="yes"
|        S  . +  |
BONDING_OPTS="mode=1 primary=ifn_link1 updelay=120000 downdelay=0 fail_over_mac=none miimon=100 primary_reselect=better resend_igmp=5"
|            .  |
|                |
|                |
|                |
+-----------------+
</syntaxhighlight>
</syntaxhighlight>
|}


Setup autorized_keys:
<syntaxhighlight lang="bash">
 
vim /etc/sysconfig/network-scripts/ifcfg-sn_bond1
{|class="wikitable"
!<span class="code">an-a03n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys
ssh root@an-a03n02 "cat /root/.ssh/id_rsa.pub" >> ~/.ssh/authorized_keys
rsync -av ~/.ssh/authorized_keys root@an-a03n02:/root/.ssh/
ssh root@an-a03n01
ssh root@an-a03n01.alteeve.ca
ssh root@an-a03n02
ssh root@an-a03n02.alteeve.ca
rsync -av ~/.ssh/known_hosts root@an-a03n02:/root/.ssh/
rsync -av /etc/hosts root@an-a03n02:/etc/
</syntaxhighlight>
</syntaxhighlight>
|-
<syntaxhighlight lang="bash">
!<span class="code">an-a03n01</span>
# Storage Network - Bond
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
DEVICE="sn_bond1"
ssh root@an-a03n01
BOOTPROTO="none"
NM_CONTROLLED="no"
ONBOOT="yes"
BONDING_OPTS="mode=1 primary=sn_link1 updelay=120000 downdelay=0 fail_over_mac=none miimon=100 primary_reselect=better resend_igmp=5"
IPADDR="10.10.40.1"
NETMASK="255.255.0.0"
</syntaxhighlight>
</syntaxhighlight>
|}
== Keeping Time in Sync ==
It's not as critical as it used to be to keep the clocks on the nodes in sync, but it's still a good idea.


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
ln -sf /usr/share/zoneinfo/America/Toronto /etc/localtime
vim /etc/sysconfig/network-scripts/ifcfg-bcn_bond1
systemctl start ntpd.service
</syntaxhighlight>
systemctl enable ntpd.service
<syntaxhighlight lang="bash">
# Back-Channel Network - Bond
DEVICE="bcn_bond1"
BOOTPROTO="none"
NM_CONTROLLED="no"
ONBOOT="yes"
BONDING_OPTS="mode=1 primary=bcn_link1 updelay=120000 downdelay=0 fail_over_mac=none miimon=100 primary_reselect=better resend_igmp=5"
IPADDR="10.20.40.1"
NETMASK="255.255.0.0"
</syntaxhighlight>
</syntaxhighlight>


== Configuring IPMI ==
Now tell the interfaces to be slaves to their bonds;


F19 specifics based on the [[IPMI]] tutorial.
Internet-Facing Network;


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
yum -y install ipmitools OpenIPMI
vim /etc/sysconfig/network-scripts/ifcfg-ifn_link1
systemctl start ipmi.service
systemctl enable ipmi.service
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="bash">
ln -s '/usr/lib/systemd/system/ipmi.service' '/etc/systemd/system/multi-user.target.wants/ipmi.service'
# Internet-Facing Network - Link 1
DEVICE="ifn_link1"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="ifn_bond1"
</syntaxhighlight>
 
<syntaxhighlight lang="bash">
vim /etc/sysconfig/network-scripts/ifcfg-ifn_link2
</syntaxhighlight>
<syntaxhighlight lang="bash">
# Internet-Facing Network - Link 2
DEVICE="ifn_link2"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="ifn_bond1"
</syntaxhighlight>
</syntaxhighlight>


Our servers use lan channel 2, yours might be 1 or something else. Experiment.
Storage Network;


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
ipmitool lan print 2
vim /etc/sysconfig/network-scripts/ifcfg-sn_link1
</syntaxhighlight>
<syntaxhighlight lang="bash">
# Storage Network - Link 1
DEVICE="sn_link1"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="sn_bond1"
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
 
Set in Progress        : Set Complete
<syntaxhighlight lang="bash">
Auth Type Support      : NONE MD5 PASSWORD
vim /etc/sysconfig/network-scripts/ifcfg-sn_link2
Auth Type Enable        : Callback : NONE MD5 PASSWORD
</syntaxhighlight>
                        : User    : NONE MD5 PASSWORD
<syntaxhighlight lang="bash">
                        : Operator : NONE MD5 PASSWORD
# Storage Network - Link 2
                        : Admin    : NONE MD5 PASSWORD
DEVICE="sn_link2"
                        : OEM      : NONE MD5 PASSWORD
NM_CONTROLLED="no"
IP Address Source      : BIOS Assigned Address
BOOTPROTO="none"
IP Address              : 10.20.51.1
ONBOOT="yes"
Subnet Mask            : 255.255.0.0
SLAVE="yes"
MAC Address            : 00:19:99:9a:d8:e8
MASTER="sn_bond1"
SNMP Community String  : public
IP Header              : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
Default Gateway IP      : 10.20.255.254
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites    : 0,1,2,3,6,7,8,17
Cipher Suite Priv Max  : OOOOOOOOXXXXXXX
                        :    X=Cipher Suite Unused
                        :    c=CALLBACK
                        :    u=USER
                        :    o=OPERATOR
                        :    a=ADMIN
                        :    O=OEM
</syntaxhighlight>
</syntaxhighlight>


I need to set the IPs to <span class="code">10.20.31.1/16</span> and <span class="code">10.20.31.2/16</span> for nodes 1 and 2, respectively. I also want to set the password to <span class="code">secret</span> for the <span class="code">admin</span> user.
Back-Channel Network
 
'''Node 01''' IP;


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
ipmitool lan set 2 ipsrc static
vim /etc/sysconfig/network-scripts/ifcfg-bcn_link1
ipmitool lan set 2 ipaddr 10.20.31.
</syntaxhighlight>
ipmitool lan set 2 netmask 255.255.0.0
<syntaxhighlight lang="bash">
ipmitool lan set 2 defgw ipaddr 10.20.255.254
# Back-Channel Network - Link 1
ipmitool lan print 2
DEVICE="bcn_link1"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="bcn_bond1"
</syntaxhighlight>
 
<syntaxhighlight lang="bash">
vim /etc/sysconfig/network-scripts/ifcfg-bcn_link2
</syntaxhighlight>
<syntaxhighlight lang="bash">
# Back-Channel Network - Link 2
DEVICE="bcn_link2"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="bcn_bond1"
</syntaxhighlight>
 
Now restart the network, confirm that the bonds and bridge are up and you are ready to proceed.
 
== Setup The hosts File ==
 
You can use [[DNS]] if you prefer. For now, lets use <span class="code">/etc/hosts</span> for node name resolution.
 
<syntaxhighlight lang="bash">
vim /etc/hosts
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Set in Progress        : Set Complete
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
Auth Type Support      : NONE MD5 PASSWORD
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
Auth Type Enable        : Callback : NONE MD5 PASSWORD
 
                        : User    : NONE MD5 PASSWORD
# Anvil! 03, Node 01
                        : Operator : NONE MD5 PASSWORD
10.255.40.1 an-a04n01.ifn
                        : Admin    : NONE MD5 PASSWORD
10.10.40.1 an-a04n01.sn
                        : OEM      : NONE MD5 PASSWORD
10.20.40.1 an-a04n01.bcn an-a04n01 an-a04n01.alteeve.ca
IP Address Source      : Static Address
10.20.41.1 an-a04n01.ipmi
IP Address              : 10.20.31.1
Subnet Mask            : 255.255.0.0
MAC Address            : 00:19:99:9a:d8:e8
SNMP Community String  : public
IP Header              : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
Default Gateway IP      : 10.20.255.254
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites    : 0,1,2,3,6,7,8,17
Cipher Suite Priv Max  : OOOOOOOOXXXXXXX
                        :    X=Cipher Suite Unused
                        :    c=CALLBACK
                        :    u=USER
                        :    o=OPERATOR
                        :    a=ADMIN
                        :    O=OEM
</syntaxhighlight>


'''Node 01''' IP;
# Anvil! 03, Node 02
10.255.40.2 an-a04n02.ifn
10.10.40.2 an-a04n02.sn
10.20.40.2 an-a04n02.bcn an-a04n02 an-a04n02.alteeve.ca
10.20.41.2 an-a04n02.ipmi


<syntaxhighlight lang="bash">
# Foundation Pack
ipmitool lan set 2 ipsrc static
### Foundation Pack
ipmitool lan set 2 ipaddr 10.20.31.2
# Network Switches
ipmitool lan set 2 netmask 255.255.0.0
10.20.1.1 an-switch01 an-switch01.alteeve.ca
ipmitool lan set 2 defgw ipaddr 10.20.255.254
10.20.1.2 an-switch02 an-switch02.alteeve.ca # Only accessible when out of the stack
ipmitool lan print 2
</syntaxhighlight>
# Switched PDUs
<syntaxhighlight lang="text">
10.20.2.1 an-pdu01 an-pdu01.alteeve.ca
Set in Progress        : Set Complete
10.20.2.2 an-pdu02 an-pdu02.alteeve.ca
Auth Type Support      : NONE MD5 PASSWORD
Auth Type Enable        : Callback : NONE MD5 PASSWORD
# Network-monitored UPSes
                        : User    : NONE MD5 PASSWORD
10.20.3.1 an-ups01 an-ups01.alteeve.ca
                        : Operator : NONE MD5 PASSWORD
10.20.3.2 an-ups02 an-ups02.alteeve.ca
                        : Admin    : NONE MD5 PASSWORD
                        : OEM      : NONE MD5 PASSWORD
### Monitor Packs
IP Address Source      : Static Address
10.20.4.1 an-striker01 an-striker01.alteeve.ca
IP Address              : 10.20.31.2
10.255.4.1 an-striker01.ifn
Subnet Mask            : 255.255.0.0
10.20.4.2 an-striker02 an-striker02.alteeve.ca
MAC Address            : 00:19:99:9a:b1:78
10.255.4.2 an-striker02.ifn
SNMP Community String  : public
IP Header              : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
Default Gateway IP      : 10.20.255.254
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites    : 0,1,2,3,6,7,8,17
Cipher Suite Priv Max  : OOOOOOOOXXXXXXX
                        :    X=Cipher Suite Unused
                        :    c=CALLBACK
                        :    u=USER
                        :    o=OPERATOR
                        :    a=ADMIN
                        :    O=OEM
</syntaxhighlight>
</syntaxhighlight>


Set the password.
== Setup SSH ==


<syntaxhighlight lang="bash">
Same as [[AN!Cluster_Tutorial_2#Setting_up_SSH|before]].
ipmitool user list 2
</syntaxhighlight>
<syntaxhighlight lang="text">
ID  Name     Callin  Link Auth IPMI Msg  Channel Priv Limit
1                    true    true      true      Unknown (0x00)
2  admin            true    true      true      OEM
Get User Access command failed (channel 2, user 3): Unknown (0x32)
</syntaxhighlight>


(ignore the error, it's harmless... *BOOM*)
== Populating And Pushing ~/.ssh/known_hosts ==


We want to set <span class="code">admin</span>'s password, so we do:


{{note|1=The <span class="code">2</span> below is the ID number, not the LAN channel.}}
{|class="wikitable"
 
!<span class="code">an-a04n01</span>
<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
ipmitool user set password 2 secret
ssh-keygen -t rsa -N "" -b 8191 -f ~/.ssh/id_rsa
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
Generating public/private rsa key pair.


Done!
Your identification has been saved in /root/.ssh/id_rsa.
 
Your public key has been saved in /root/.ssh/id_rsa.pub.
= Configuring the Anvil! =
The key fingerprint is:
 
be:17:cc:23:8e:b1:b4:76:a1:e4:2a:91:cb:cd:d8:3a root@an-a04n01.alteeve.ca
Now we're getting down to business!
The key's randomart image is:
 
+--[ RSA 8191]----+
For this section, we will be working on <span class="code">an-a03n01</span> and using [[ssh]] to perform tasks on <span class="code">an-a03n02</span>.
|                |
 
|                |
{{note|1=TODO: explain what this is and how it works.}}
|                |
 
|                |
== Enable the pcs Daemon ==
|  .    So      |
 
|  o  +.o =     |
{{note|1=Most of this section comes more or less verbatim from the main [http://clusterlabs.org/doc/en-US/Pacemaker/1.1-pcs/html-single/Clusters_from_Scratch/index.html Clusters from Scratch] tutorial.}}
| . B + B.o o    |
 
|  E + B o..      |
We will use [[pcs]], the Pacemaker Configuration System, to configure our Anvil!.
|  .+.o ...      |
 
+-----------------+
<syntaxhighlight lang="bash">
</syntaxhighlight>
systemctl start pcsd.service
|-
systemctl enable pcsd.service
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
ssh-keygen -t rsa -N "" -b 8191 -f ~/.ssh/id_rsa
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
ln -s '/usr/lib/systemd/system/pcsd.service' '/etc/systemd/system/multi-user.target.wants/pcsd.service'
Generating public/private rsa key pair.
</syntaxhighlight>
Created directory '/root/.ssh'.
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
71:b1:9d:31:9f:7a:c9:10:74:e0:4c:69:53:8f:e4:70 root@an-a04n02.alteeve.ca
The key's randomart image is:
+--[ RSA 8191]----+
|          ..O+E  |
|          B+% + |
|        . o.*.= .|
|        o  + . |
|        S  . +  |
|            .   |
|                |
|                |
|                |
+-----------------+
</syntaxhighlight>
|}


Now we need to set a password for the <span class="code">hacluster</span> user. This is the account used by <span class="code">pcs</span> on one node to talk to the <span class="code">pcs</span> [[daemon]] on the other node. For this tutorial, we will use the password <span class="code">secret</span>. You will want to use [https://xkcd.com/936/ a stronger password], of course.
Setup autorized_keys:


<syntaxhighlight lang="bash">
{|class="wikitable"
echo secret | passwd --stdin hacluster
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys
ssh root@an-a04n02 "cat /root/.ssh/id_rsa.pub" >> ~/.ssh/authorized_keys
rsync -av ~/.ssh/authorized_keys root@an-a04n02:/root/.ssh/
ssh-keyscan an-a04n01.alteeve.ca >> ~/.ssh/known_hosts
ssh-keyscan an-a04n01 >> ~/.ssh/known_hosts
ssh-keyscan an-a04n01.bcn >> ~/.ssh/known_hosts
ssh-keyscan an-a04n01.sn >> ~/.ssh/known_hosts
ssh-keyscan an-a04n01.ifn >> ~/.ssh/known_hosts
ssh-keyscan an-a04n02.alteeve.ca >> ~/.ssh/known_hosts
ssh-keyscan an-a04n02 >> ~/.ssh/known_hosts
ssh-keyscan an-a04n02.bcn >> ~/.ssh/known_hosts
ssh-keyscan an-a04n02.sn >> ~/.ssh/known_hosts
ssh-keyscan an-a04n02.ifn >> ~/.ssh/known_hosts
rsync -av ~/.ssh/known_hosts root@an-a04n02:/root/.ssh/
rsync -av /etc/hosts root@an-a04n02:/etc/
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
|-
Changing password for user hacluster.
!<span class="code">an-a04n01</span>
passwd: all authentication tokens updated successfully.
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
</syntaxhighlight>
</syntaxhighlight>
|}


== Initializing the Cluster ==
== Keeping Time in Sync ==


One of the biggest reasons we're using the [[pcs]] tool, over something like [[crm]], is that it has been written to simplify the setup of clusters on [[Red Hat]] style operating systems. It will configure [[corosync]] automatically.
It's not as critical as it used to be to keep the clocks on the nodes in sync, but it's still a good idea.
 
First, we need to know what <span class="code">hostname</span> we will need to use for <span class="code">[[pcs]]</span>.
 
'''Node 01''':


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
hostname
ln -sf /usr/share/zoneinfo/America/Toronto /etc/localtime
</syntaxhighlight>
systemctl start ntpd.service
<syntaxhighlight lang="bash">
systemctl enable ntpd.service
an-a03n01.alteeve.ca
</syntaxhighlight>
</syntaxhighlight>


'''Node 02''':
== Configuring IPMI ==
 
F19 specifics based on the [[IPMI]] tutorial.


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
hostname
yum -y install ipmitools OpenIPMI
systemctl start ipmi.service
systemctl enable ipmi.service
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
<syntaxhighlight lang="text">
an-a03n02.alteeve.ca
ln -s '/usr/lib/systemd/system/ipmi.service' '/etc/systemd/system/multi-user.target.wants/ipmi.service'
</syntaxhighlight>
</syntaxhighlight>


Next, authenticate against the cluster nodes.
Our servers use lan channel 2, yours might be 1 or something else. Experiment.
 
'''Both nodes''':


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs cluster auth an-a03n01.alteeve.ca an-a03n02.alteeve.ca -u hacluster
ipmitool lan print 2
</syntaxhighlight>
</syntaxhighlight>
 
<syntaxhighlight lang="text">
This will ask you for the user name and password. The default user name is <span class="code">hacluster</span> and we set the password to <span class="code">secret</span>.
Set in Progress        : Set Complete
 
Auth Type Support      : NONE MD5 PASSWORD
<syntaxhighlight lang="text">
Auth Type Enable        : Callback : NONE MD5 PASSWORD
Password:  
                        : User    : NONE MD5 PASSWORD
an-a03n01.alteeve.ca: 6e9f7e98-dfb7-4305-b8e0-d84bf4f93ce3
                        : Operator : NONE MD5 PASSWORD
an-a03n01.alteeve.ca: Authorized
                        : Admin    : NONE MD5 PASSWORD
an-a03n02.alteeve.ca: ffee6a85-ddac-4d03-9b97-f136d532b478
                        : OEM      : NONE MD5 PASSWORD
an-a03n02.alteeve.ca: Authorized
IP Address Source      : BIOS Assigned Address
IP Address              : 10.20.41.1
Subnet Mask            : 255.255.0.0
MAC Address            : 00:19:99:9a:d8:e8
SNMP Community String  : public
IP Header              : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
Default Gateway IP      : 10.20.255.254
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites    : 0,1,2,3,6,7,8,17
Cipher Suite Priv Max  : OOOOOOOOXXXXXXX
                        :    X=Cipher Suite Unused
                        :    c=CALLBACK
                        :    u=USER
                        :    o=OPERATOR
                        :    a=ADMIN
                        :     O=OEM
</syntaxhighlight>
</syntaxhighlight>


'''Do this on one node only''':
I need to set the IPs to <span class="code">10.20.41.1/16</span> and <span class="code">10.20.41.2/16</span> for nodes 1 and 2, respectively. I also want to set the password to <span class="code">secret</span> for the <span class="code">admin</span> user.


Now to initialize the cluster's communication and membership layer.
'''Node 01''' IP;


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs cluster setup --name an-cluster-03 an-a03n01.alteeve.ca an-a03n02.alteeve.ca
ipmitool lan set 2 ipsrc static
ipmitool lan set 2 ipaddr 10.20.41.1
ipmitool lan set 2 netmask 255.255.0.0
ipmitool lan set 2 defgw ipaddr 10.20.255.254
ipmitool lan print 2
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
an-a03n01.alteeve.ca: Succeeded
Set in Progress        : Set Complete
an-a03n02.alteeve.ca: Succeeded
Auth Type Support      : NONE MD5 PASSWORD
Auth Type Enable        : Callback : NONE MD5 PASSWORD
                        : User    : NONE MD5 PASSWORD
                        : Operator : NONE MD5 PASSWORD
                        : Admin    : NONE MD5 PASSWORD
                        : OEM      : NONE MD5 PASSWORD
IP Address Source      : Static Address
IP Address              : 10.20.41.1
Subnet Mask            : 255.255.0.0
MAC Address            : 00:19:99:9a:d8:e8
SNMP Community String  : public
IP Header              : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
Default Gateway IP      : 10.20.255.254
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites    : 0,1,2,3,6,7,8,17
Cipher Suite Priv Max  : OOOOOOOOXXXXXXX
                        :    X=Cipher Suite Unused
                        :    c=CALLBACK
                        :    u=USER
                        :    o=OPERATOR
                        :    a=ADMIN
                        :     O=OEM
</syntaxhighlight>
</syntaxhighlight>


This will create the corosync configuration file <span class="code">/etc/corosync/corosync.conf</span>;
'''Node 01''' IP;


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
cat /etc/corosync/corosync.conf
ipmitool lan set 2 ipsrc static
ipmitool lan set 2 ipaddr 10.20.41.2
ipmitool lan set 2 netmask 255.255.0.0
ipmitool lan set 2 defgw ipaddr 10.20.255.254
ipmitool lan print 2
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
totem {
Set in Progress        : Set Complete
version: 2
Auth Type Support      : NONE MD5 PASSWORD
secauth: off
Auth Type Enable        : Callback : NONE MD5 PASSWORD
cluster_name: an-cluster-03
                        : User    : NONE MD5 PASSWORD
transport: udpu
                        : Operator : NONE MD5 PASSWORD
}
                        : Admin    : NONE MD5 PASSWORD
                        : OEM      : NONE MD5 PASSWORD
IP Address Source      : Static Address
IP Address              : 10.20.41.2
Subnet Mask            : 255.255.0.0
MAC Address            : 00:19:99:9a:b1:78
SNMP Community String  : public
IP Header              : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
Default Gateway IP      : 10.20.255.254
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites    : 0,1,2,3,6,7,8,17
Cipher Suite Priv Max  : OOOOOOOOXXXXXXX
                        :    X=Cipher Suite Unused
                        :    c=CALLBACK
                        :    u=USER
                        :     o=OPERATOR
                        :     a=ADMIN
                        :     O=OEM
</syntaxhighlight>


nodelist {
Set the password.
  node {
        ring0_addr: an-a03n01.alteeve.ca
        nodeid: 1
      }
  node {
        ring0_addr: an-a03n02.alteeve.ca
        nodeid: 2
      }
}


quorum {
<syntaxhighlight lang="bash">
provider: corosync_votequorum
ipmitool user list 2
two_node: 1
</syntaxhighlight>
}
<syntaxhighlight lang="text">
 
ID  Name     Callin  Link Auth IPMI Msg  Channel Priv Limit
logging {
1                    true    true      true      Unknown (0x00)
to_syslog: yes
2  admin            true    true      true      OEM
}
Get User Access command failed (channel 2, user 3): Unknown (0x32)
</syntaxhighlight>
</syntaxhighlight>


== Start the Cluster For the First Time ==
(ignore the error, it's harmless... *BOOM*)


This starts the cluster communication and membership layer for the first time.
We want to set <span class="code">admin</span>'s password, so we do:


'''On one node only''';
{{note|1=The <span class="code">2</span> below is the ID number, not the LAN channel.}}


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs cluster start --all
ipmitool user set password 2 secret
</syntaxhighlight>
<syntaxhighlight lang="text">
an-a03n01.alteeve.ca: Starting Cluster...
an-a03n02.alteeve.ca: Starting Cluster...
</syntaxhighlight>
</syntaxhighlight>


After a few moments, you should be able to check the status;
Done!


<syntaxhighlight lang="bash">
= Configuring the Anvil! =
pcs status
</syntaxhighlight>
<syntaxhighlight lang="text">
Cluster name: an-cluster-03
WARNING: no stonith devices and stonith-enabled is not false
Last updated: Mon Jun 24 23:28:29 2013
Last change: Mon Jun 24 23:28:10 2013 via crmd on an-a03n01.alteeve.ca
Current DC: NONE
2 Nodes configured, unknown expected votes
0 Resources configured.


Now we're getting down to business!


Node an-a03n01.alteeve.ca (1): UNCLEAN (offline)
For this section, we will be working on <span class="code">an-a04n01</span> and using [[ssh]] to perform tasks on <span class="code">an-a04n02</span>.
Node an-a03n02.alteeve.ca (2): UNCLEAN (offline)


Full list of resources:
{{note|1=TODO: explain what this is and how it works.}}
</syntaxhighlight>


The other node should show almost the identical output.
== Enable the pcs Daemon ==


== Disabling Quorum ==
{{note|1=Most of this section comes more or less verbatim from the main [http://clusterlabs.org/doc/en-US/Pacemaker/1.1-pcs/html-single/Clusters_from_Scratch/index.html Clusters from Scratch] tutorial.}}


{{note|1=Show the math.}}
We will use [[pcs]], the Pacemaker Configuration System, to configure our Anvil!.


With quorum enabled, a two node cluster will lose quorum once either node fails. So we have to disable quorum.
Note that pcsd uses TCP port 2224.
 
By default, pacemaker uses quorum. You don't see this initially though;


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs property
systemctl start pcsd.service
systemctl enable pcsd.service
</syntaxhighlight>
<syntaxhighlight lang="text">
ln -s '/usr/lib/systemd/system/pcsd.service' '/etc/systemd/system/multi-user.target.wants/pcsd.service'
</syntaxhighlight>
 
Now we need to set a password for the <span class="code">hacluster</span> user. This is the account used by <span class="code">pcs</span> on one node to talk to the <span class="code">pcs</span> [[daemon]] on the other node. For this tutorial, we will use the password <span class="code">secret</span>. You will want to use [https://xkcd.com/936/ a stronger password], of course.
 
<syntaxhighlight lang="bash">
echo "super secret password" | passwd --stdin hacluster
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Cluster Properties:
Changing password for user hacluster.
dc-version: 1.1.9-0.1318.a7966fb.git.fc18-a7966fb
passwd: all authentication tokens updated successfully.
cluster-infrastructure: corosync
</syntaxhighlight>
</syntaxhighlight>


To disable it, we set <span class="code">no-quorum-policy=ignore</span>.
Open up the firewall:


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs property set no-quorum-policy=ignore
firewall-cmd --permanent --add-service=high-availability
pcs property
firewall-cmd --reload
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Cluster Properties:
dc-version: 1.1.9-0.1318.a7966fb.git.fc18-a7966fb
cluster-infrastructure: corosync
no-quorum-policy: ignore
</syntaxhighlight>
</syntaxhighlight>


== Enabling and Configuring Fencing ==
== Initializing the Cluster ==
 
One of the biggest reasons we're using the [[pcs]] tool, over something like [[crm]], is that it has been written to simplify the setup of clusters on [[Red Hat]] style operating systems. It will configure [[corosync]] automatically.


We will use IPMI and PDU based fence devices for redundancy.
First, we need to know what <span class="code">hostname</span> we will need to use for <span class="code">[[pcs]]</span>.


You can see the list of available fence agents here. You will need to find the one for your hardware fence devices.
'''Node 01''':


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs stonith list
hostname
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
an-a04n01.alteeve.ca
</syntaxhighlight>
'''Node 02''':
<syntaxhighlight lang="bash">
hostname
</syntaxhighlight>
<syntaxhighlight lang="bash">
an-a04n02.alteeve.ca
</syntaxhighlight>
Next, authenticate against the cluster nodes.
'''Both nodes''':
<syntaxhighlight lang="bash">
pcs cluster auth an-a04n01.alteeve.ca an-a04n02.alteeve.ca -u hacluster
</syntaxhighlight>
This will ask you for the user name and password. The default user name is <span class="code">hacluster</span> and we set the password to <span class="code">secret</span>.
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
fence_alom - Fence agent for Sun ALOM
Password:
fence_apc - Fence agent for APC over telnet/ssh
an-a04n01.alteeve.ca: 6e9f7e98-dfb7-4305-b8e0-d84bf4f93ce3
fence_apc_snmp - Fence agent for APC over SNMP
an-a04n01.alteeve.ca: Authorized
fence_baytech - I/O Fencing agent for Baytech RPC switches in combination with a Cyclades Terminal
an-a04n02.alteeve.ca: ffee6a85-ddac-4d03-9b97-f136d532b478
                Server
an-a04n02.alteeve.ca: Authorized
fence_bladecenter - Fence agent for IBM BladeCenter
</syntaxhighlight>
fence_brocade - Fence agent for Brocade over telnet
 
fence_bullpap - I/O Fencing agent for Bull FAME architecture controlled by a PAP management console.
'''Do this on one node only''':
fence_cisco_mds - Fence agent for Cisco MDS
 
fence_cisco_ucs - Fence agent for Cisco UCS
Now to initialize the cluster's communication and membership layer.
fence_cpint - I/O Fencing agent for GFS on s390 and zSeries VM clusters
 
fence_drac - fencing agent for Dell Remote Access Card
<syntaxhighlight lang="bash">
fence_drac5 - Fence agent for Dell DRAC CMC/5
pcs cluster setup --name an-anvil-03 an-a04n01.alteeve.ca an-a04n02.alteeve.ca
fence_eaton_snmp - Fence agent for Eaton over SNMP
</syntaxhighlight>
fence_egenera - I/O Fencing agent for the Egenera BladeFrame
<syntaxhighlight lang="text">
fence_eps - Fence agent for ePowerSwitch
an-a04n01.alteeve.ca: Succeeded
fence_hpblade - Fence agent for HP BladeSystem
an-a04n02.alteeve.ca: Succeeded
fence_ibmblade - Fence agent for IBM BladeCenter over SNMP
</syntaxhighlight>
fence_idrac - Fence agent for IPMI over LAN
 
fence_ifmib - Fence agent for IF MIB
This will create the corosync configuration file <span class="code">/etc/corosync/corosync.conf</span>;
fence_ilo - Fence agent for HP iLO
 
fence_ilo2 - Fence agent for HP iLO
<syntaxhighlight lang="bash">
fence_ilo3 - Fence agent for IPMI over LAN
cat /etc/corosync/corosync.conf
fence_ilo_mp - Fence agent for HP iLO MP
</syntaxhighlight>
fence_imm - Fence agent for IPMI over LAN
<syntaxhighlight lang="text">
fence_intelmodular - Fence agent for Intel Modular
totem {
fence_ipdu - Fence agent for iPDU over SNMP
version: 2
fence_ipmilan - Fence agent for IPMI over LAN
secauth: off
fence_kdump - Fence agent for use with kdump
cluster_name: an-anvil-03
fence_ldom - Fence agent for Sun LDOM
transport: udpu
fence_lpar - Fence agent for IBM LPAR
}
fence_mcdata - I/O Fencing agent for McData FC switches
fence_rackswitch - fence_rackswitch - I/O Fencing agent for RackSaver RackSwitch
fence_rhevm - Fence agent for RHEV-M REST API
fence_rsa - Fence agent for IBM RSA
fence_rsb - I/O Fencing agent for Fujitsu-Siemens RSB
fence_sanbox2 - Fence agent for QLogic SANBox2 FC switches
fence_scsi - fence agent for SCSI-3 persistent reservations
fence_virsh - Fence agent for virsh
fence_vixel - I/O Fencing agent for Vixel FC switches
fence_vmware - Fence agent for VMWare
fence_vmware_soap - Fence agent for VMWare over SOAP API
fence_wti - Fence agent for WTI
fence_xcat - I/O Fencing agent for xcat environments
fence_xenapi - XenAPI based fencing for the Citrix XenServer virtual machines.
fence_zvm - I/O Fencing agent for GFS on s390 and zSeries VM clusters
</syntaxhighlight>


We will use <span class="code">fence_ipmilan</span> and <span class="code">fence_apc_snmp</span>.
nodelist {
  node {
        ring0_addr: an-a04n01.alteeve.ca
        nodeid: 1
      }
  node {
        ring0_addr: an-a04n02.alteeve.ca
        nodeid: 2
      }
}
 
quorum {
provider: corosync_votequorum
two_node: 1
}
 
logging {
to_syslog: yes
}
</syntaxhighlight>


=== Configuring IPMI Fencing ===
== Start the Cluster For the First Time ==
 
This starts the cluster communication and membership layer for the first time.


Every fence agent has a possibly unique subset of options that can be used. You can see a brief description of these options with the <span class="code">pcs stonith describe fence_X</span> command. Let's look at the options available for <span class="code">fence_ipmilan</span>.
'''On one node only''';


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs stonith describe fence_ipmilan
pcs cluster start --all
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Stonith options for: fence_ipmilan
an-a04n01.alteeve.ca: Starting Cluster...
  auth: IPMI Lan Auth type (md5, password, or none)
an-a04n02.alteeve.ca: Starting Cluster...
  ipaddr: IPMI Lan IP to talk to
</syntaxhighlight>
  passwd: Password (if required) to control power on IPMI device
 
  passwd_script: Script to retrieve password (if required)
After a few moments, you should be able to check the status;
  lanplus: Use Lanplus
 
  login: Username/Login (if required) to control power on IPMI device
<syntaxhighlight lang="bash">
  action: Operation to perform. Valid operations: on, off, reboot, status, list, diag, monitor or metadata
pcs status
  timeout: Timeout (sec) for IPMI operation
  cipher: Ciphersuite to use (same as ipmitool -C parameter)
  method: Method to fence (onoff or cycle)
  power_wait: Wait X seconds after on/off operation
  delay: Wait X seconds before fencing is started
  privlvl: Privilege level on IPMI device
  verbose: Verbose mode
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
Cluster name: an-anvil-04
WARNING: no stonith devices and stonith-enabled is not false
Last updated: Mon Jun 24 23:28:29 2013
Last change: Mon Jun 24 23:28:10 2013 via crmd on an-a04n01.alteeve.ca
Current DC: NONE
2 Nodes configured, unknown expected votes
0 Resources configured.


One of the nice things about pcs is that it allows us to create a test file to prepare all our changes in. Then, when we're happy with the changes, merge them into the running cluster. So let's make a copy called <span class="code">stonith_cfg</span>


<syntaxhighlight lang="bash">
Node an-a04n01.alteeve.ca (1): UNCLEAN (offline)
pcs cluster cib stonith_cfg
Node an-a04n02.alteeve.ca (2): UNCLEAN (offline)
</syntaxhighlight>


Now add [[IPMI]] fencing.
Full list of resources:
 
<syntaxhighlight lang="bash">
#                  unique name    fence agent  target node                          device addr            options
pcs stonith create fence_n01_ipmi fence_ipmilan pcmk_host_list="an-a03n01.alteeve.ca" ipaddr="an-a03n01.ipmi" action="reboot" login="admin" passwd="secret" delay=15 op monitor interval=60s
pcs stonith create fence_n02_ipmi fence_ipmilan pcmk_host_list="an-a03n02.alteeve.ca" ipaddr="an-a03n02.ipmi" action="reboot" login="admin" passwd="secret" op monitor interval=60s
</syntaxhighlight>
</syntaxhighlight>


Note that <span class="code">fence_n01_ipmi</span> has a <span class="code">delay=15</span> set but <span class="code">fence_n02_ipmi</span> does not. If the network connection breaks between the two nodes, they will both try to fence each other at the same time. If <span class="code">acpid</span> is running, the slower node will not die right away. It will continue to run for up to four more seconds, ample time for it to also initiate a fence against the faster node. The end result is that both nodes get fenced. The ten-second delay protects against this by causing <span class="code">an-a03n02</span> to pause for <span class="code">10</span> seconds before initiating a fence against <span class="code">an-a03n01</span>. If both nodes are alive, <span class="code">an-a03n02</span> will power off before the 10 seconds pass, so it will never fence <span class="code">an-a03n01</span>. However, if <span class="code">an-a03n01</span> really is dead, after the ten seconds have elapsed, fencing will proceed as normal.
The other node should show almost the identical output.


{{note|1=At the time of writing, <span class="code">pcmk_reboot_action</span> is needed to override pacemaker's global fence action and <span class="code">pcmk_reboot_action</span> is not recognized by pcs. Both of these issues will be resolved shortly; Pacemaker will honour <span class="code">action="..."</span> in v1.1.10 and pcs will recognize <span class="code">pcmk_*</span> special attributes "real soon now". Until then, the <span class="code">--force</span> switch is needed.}}
== Disabling Quorum ==


Next, add the [[PDU]] fencing. This requires distinct "off" and "on" actions for each outlet on each PDU. With two nodes, each with two [[PSU]]s, this translates to eight commands. The "off" commands will be monitored to alert us if the PDU fails for some reason. There is no reason to monitor the "on" actions (it would be redundant). Note also that we don't bother using a "delay". The IPMI fence method will go first, before the PDU actions, so the PDU is already delayed.
{{note|1=Show the math.}}


<syntaxhighlight lang="bash">
With quorum enabled, a two node cluster will lose quorum once either node fails. So we have to disable quorum.
# Node 1 - off
pcs stonith create fence_n01_pdu1_off fence_apc_snmp pcmk_host_list="an-a03n01.alteeve.ca" ipaddr="an-p01" action="off" port="1" op monitor interval="60s"
pcs stonith create fence_n01_pdu2_off fence_apc_snmp pcmk_host_list="an-a03n01.alteeve.ca" ipaddr="an-p02" action="off" port="1" power_wait="5" op monitor interval="60s"


# Node 1 - on
By default, pacemaker uses quorum. You don't see this initially though;
pcs stonith create fence_n01_pdu1_on fence_apc_snmp pcmk_host_list="an-a03n01.alteeve.ca" ipaddr="an-p01" action="on" port="1"
pcs stonith create fence_n01_pdu2_on fence_apc_snmp pcmk_host_list="an-a03n01.alteeve.ca" ipaddr="an-p02" action="on" port="1"


# Node 2 - off
<syntaxhighlight lang="bash">
pcs stonith create fence_n02_pdu1_off fence_apc_snmp pcmk_host_list="an-a03n02.alteeve.ca" ipaddr="an-p01" action="off" port="2" op monitor interval="60s"
pcs property
pcs stonith create fence_n02_pdu2_off fence_apc_snmp pcmk_host_list="an-a03n02.alteeve.ca" ipaddr="an-p02" action="off" port="2" power_wait="5" op monitor interval="60s"
</syntaxhighlight>
 
<syntaxhighlight lang="text">
# Node 2 - on
Cluster Properties:
pcs stonith create fence_n02_pdu1_on fence_apc_snmp pcmk_host_list="an-a03n02.alteeve.ca" ipaddr="an-p01" action="on" port="2"
dc-version: 1.1.9-0.1318.a7966fb.git.fc18-a7966fb
pcs stonith create fence_n02_pdu2_on fence_apc_snmp pcmk_host_list="an-a03n02.alteeve.ca" ipaddr="an-p02" action="on" port="2"
cluster-infrastructure: corosync
</syntaxhighlight>
</syntaxhighlight>


We can check the new configuration now;
To disable it, we set <span class="code">no-quorum-policy=ignore</span>.


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs status
pcs property set no-quorum-policy=ignore
pcs property
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Cluster name: an-cluster-03
Cluster Properties:
Last updated: Tue Jul 2 16:41:55 2013
  dc-version: 1.1.9-0.1318.a7966fb.git.fc18-a7966fb
Last change: Tue Jul  2 16:41:44 2013 via cibadmin on an-a03n01.alteeve.ca
cluster-infrastructure: corosync
Stack: corosync
no-quorum-policy: ignore
Current DC: an-a03n01.alteeve.ca (1) - partition with quorum
</syntaxhighlight>
Version: 1.1.9-3.fc19-781a388
2 Nodes configured, unknown expected votes
10 Resources configured.


== Enabling and Configuring Fencing ==


Online: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
We will use IPMI and PDU based fence devices for redundancy.


Full list of resources:
You can see the list of available fence agents here. You will need to find the one for your hardware fence devices.
 
fence_n01_ipmi (stonith:fence_ipmilan): Started an-a03n01.alteeve.ca
fence_n02_ipmi (stonith:fence_ipmilan): Started an-a03n02.alteeve.ca
fence_n01_pdu1_off (stonith:fence_apc_snmp): Started an-a03n01.alteeve.ca
fence_n01_pdu2_off (stonith:fence_apc_snmp): Started an-a03n02.alteeve.ca
fence_n02_pdu1_off (stonith:fence_apc_snmp): Started an-a03n01.alteeve.ca
fence_n02_pdu2_off (stonith:fence_apc_snmp): Started an-a03n02.alteeve.ca
fence_n01_pdu1_on (stonith:fence_apc_snmp): Started an-a03n01.alteeve.ca
fence_n01_pdu2_on (stonith:fence_apc_snmp): Started an-a03n02.alteeve.ca
fence_n02_pdu1_on (stonith:fence_apc_snmp): Started an-a03n01.alteeve.ca
fence_n02_pdu2_on (stonith:fence_apc_snmp): Started an-a03n02.alteeve.ca
</syntaxhighlight>
 
Before we proceed, we need to tell pacemaker to use fencing;


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs property set stonith-enabled=true
pcs stonith list
pcs property
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Cluster Properties:
fence_alom - Fence agent for Sun ALOM
Cluster Properties:
fence_apc - Fence agent for APC over telnet/ssh
cluster-infrastructure: corosync
fence_apc_snmp - Fence agent for APC over SNMP
dc-version: 1.1.9-3.fc19-781a388
fence_baytech - I/O Fencing agent for Baytech RPC switches in combination with a Cyclades Terminal
no-quorum-policy: ignore
                Server
stonith-enabled: true
fence_bladecenter - Fence agent for IBM BladeCenter
</syntaxhighlight>
fence_brocade - Fence agent for Brocade over telnet
 
fence_bullpap - I/O Fencing agent for Bull FAME architecture controlled by a PAP management console.
Excellent!
fence_cisco_mds - Fence agent for Cisco MDS
 
fence_cisco_ucs - Fence agent for Cisco UCS
== Configuring Fence Levels ==
fence_cpint - I/O Fencing agent for GFS on s390 and zSeries VM clusters
 
fence_drac - fencing agent for Dell Remote Access Card
The goal of fence levels is to tell pacemaker that there are "fence methods" to try and to impose an order on those methods. Each method composes one or more fence primitives and, when 2 or more primitives are tied together, that all primitives must succeed for the overall method to succeed.
fence_drac5 - Fence agent for Dell DRAC CMC/5
 
fence_eaton_snmp - Fence agent for Eaton over SNMP
So in our case; the order we want is;
fence_egenera - I/O Fencing agent for the Egenera BladeFrame
 
fence_eps - Fence agent for ePowerSwitch
* IPMI -> PDUs
fence_hpblade - Fence agent for HP BladeSystem
 
fence_ibmblade - Fence agent for IBM BladeCenter over SNMP
The reason is that when IPMI fencing succeeds, we can be very certain the node is truly fenced. When PDU fencing succeeds, it only confirms that the power outlets were cycled. If someone moved a node's power cables to another outlet, we'll get a false positive. On that topic, tie-down the node's PSU cables to the PDU's cable tray when possible, clearly label the power cables and wrap the fingers of anyone who might move them around.
fence_idrac - Fence agent for IPMI over LAN
 
fence_ifmib - Fence agent for IF MIB
The PDU fencing needs to be implemented using four steps;
fence_ilo - Fence agent for HP iLO
 
fence_ilo2 - Fence agent for HP iLO
* PDU 1, outlet X -> off
fence_ilo3 - Fence agent for IPMI over LAN
* PDU 2, outlet X -> off
fence_ilo_mp - Fence agent for HP iLO MP
** The <span class="code">power_wait="5"</span> setting for the <span class="code">fence_n0X_pdu2_off</span> primitives will cause a 5 second delay here, giving ample time to ensure the nodes lose power
fence_imm - Fence agent for IPMI over LAN
* PDU 1, outlet X -> on
fence_intelmodular - Fence agent for Intel Modular
* PDU 2, outlet X -> on
fence_ipdu - Fence agent for iPDU over SNMP
fence_ipmilan - Fence agent for IPMI over LAN
fence_kdump - Fence agent for use with kdump
fence_ldom - Fence agent for Sun LDOM
fence_lpar - Fence agent for IBM LPAR
fence_mcdata - I/O Fencing agent for McData FC switches
fence_rackswitch - fence_rackswitch - I/O Fencing agent for RackSaver RackSwitch
fence_rhevm - Fence agent for RHEV-M REST API
fence_rsa - Fence agent for IBM RSA
fence_rsb - I/O Fencing agent for Fujitsu-Siemens RSB
fence_sanbox2 - Fence agent for QLogic SANBox2 FC switches
fence_scsi - fence agent for SCSI-3 persistent reservations
fence_virsh - Fence agent for virsh
fence_vixel - I/O Fencing agent for Vixel FC switches
fence_vmware - Fence agent for VMWare
fence_vmware_soap - Fence agent for VMWare over SOAP API
fence_wti - Fence agent for WTI
fence_xcat - I/O Fencing agent for xcat environments
fence_xenapi - XenAPI based fencing for the Citrix XenServer virtual machines.
fence_zvm - I/O Fencing agent for GFS on s390 and zSeries VM clusters
</syntaxhighlight>
 
We will use <span class="code">fence_ipmilan</span> and <span class="code">fence_apc_snmp</span>.


This is to ensure that both outlets are off at the same time, ensuring that the node loses power. This works because <span class="code">fencing_topology</span> acts serially.
=== Configuring IPMI Fencing ===


Putting all this together, we issue this command;
Every fence agent has a possibly unique subset of options that can be used. You can see a brief description of these options with the <span class="code">pcs stonith describe fence_X</span> command. Let's look at the options available for <span class="code">fence_ipmilan</span>.


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs stonith level add 1 an-a03n01.alteeve.ca fence_n01_ipmi
pcs stonith describe fence_ipmilan
pcs stonith level add 1 an-a03n02.alteeve.ca fence_n02_ipmi
</syntaxhighlight>
<syntaxhighlight lang="text">
Stonith options for: fence_ipmilan
  auth: IPMI Lan Auth type (md5, password, or none)
  ipaddr: IPMI Lan IP to talk to
  passwd: Password (if required) to control power on IPMI device
  passwd_script: Script to retrieve password (if required)
  lanplus: Use Lanplus
  login: Username/Login (if required) to control power on IPMI device
  action: Operation to perform. Valid operations: on, off, reboot, status, list, diag, monitor or metadata
  timeout: Timeout (sec) for IPMI operation
  cipher: Ciphersuite to use (same as ipmitool -C parameter)
  method: Method to fence (onoff or cycle)
  power_wait: Wait X seconds after on/off operation
  delay: Wait X seconds before fencing is started
  privlvl: Privilege level on IPMI device
  verbose: Verbose mode
</syntaxhighlight>
</syntaxhighlight>


The <span class="code">1</span> tells pacemaker that this is our highest priority fence method. We can see that this was set using pcs;
One of the nice things about pcs is that it allows us to create a test file to prepare all our changes in. Then, when we're happy with the changes, merge them into the running cluster. So let's make a copy called <span class="code">stonith_cfg</span>


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs stonith level
pcs cluster cib stonith_cfg
</syntaxhighlight>
<syntaxhighlight lang="bash">
Node: an-a03n01.alteeve.ca
  Level 1 - fence_n01_ipmi
Node: an-a03n02.alteeve.ca
  Level 1 - fence_n02_ipmi
</syntaxhighlight>
</syntaxhighlight>


Now we'll tell pacemaker to use the PDUs as the second fence method. Here we tie together the two <span class="code">off</span> calls and the two <span class="code">on</span> calls into a single method.
Now add [[IPMI]] fencing.


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs stonith level add 2 an-a03n01.alteeve.ca fence_n01_pdu1_off,fence_n01_pdu2_off,fence_n01_pdu1_on,fence_n01_pdu2_on
#                  unique name    fence agent  target node                          device addr            options
pcs stonith level add 2 an-a03n02.alteeve.ca fence_n02_pdu1_off,fence_n02_pdu2_off,fence_n02_pdu1_on,fence_n02_pdu2_on
pcs stonith create fence_n01_ipmi fence_ipmilan pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="an-a04n01.ipmi" action="reboot" login="admin" passwd="secret" delay=15 op monitor interval=60s
pcs stonith create fence_n02_ipmi fence_ipmilan pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="an-a04n02.ipmi" action="reboot" login="admin" passwd="secret" op monitor interval=60s
</syntaxhighlight>
</syntaxhighlight>


Check again and we'll see that the new methods were added.
Note that <span class="code">fence_n01_ipmi</span> has a <span class="code">delay=15</span> set but <span class="code">fence_n02_ipmi</span> does not. If the network connection breaks between the two nodes, they will both try to fence each other at the same time. If <span class="code">acpid</span> is running, the slower node will not die right away. It will continue to run for up to four more seconds, ample time for it to also initiate a fence against the faster node. The end result is that both nodes get fenced. The ten-second delay protects against this by causing <span class="code">an-a04n02</span> to pause for <span class="code">10</span> seconds before initiating a fence against <span class="code">an-a04n01</span>. If both nodes are alive, <span class="code">an-a04n02</span> will power off before the 10 seconds pass, so it will never fence <span class="code">an-a04n01</span>. However, if <span class="code">an-a04n01</span> really is dead, after the ten seconds have elapsed, fencing will proceed as normal.
 
{{note|1=At the time of writing, <span class="code">pcmk_reboot_action</span> is needed to override pacemaker's global fence action and <span class="code">pcmk_reboot_action</span> is not recognized by pcs. Both of these issues will be resolved shortly; Pacemaker will honour <span class="code">action="..."</span> in v1.1.10 and pcs will recognize <span class="code">pcmk_*</span> special attributes "real soon now". Until then, the <span class="code">--force</span> switch is needed.}}
 
Next, add the [[PDU]] fencing. This requires distinct "off" and "on" actions for each outlet on each PDU. With two nodes, each with two [[PSU]]s, this translates to eight commands. The "off" commands will be monitored to alert us if the PDU fails for some reason. There is no reason to monitor the "on" actions (it would be redundant). Note also that we don't bother using a "delay". The IPMI fence method will go first, before the PDU actions, so the PDU is already delayed.


<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
pcs stonith level
# Node 1 - off
pcs stonith create fence_n01_pdu1_off fence_apc_snmp pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="an-pdu01" action="off" port="1" op monitor interval="60s"
pcs stonith create fence_n01_pdu2_off fence_apc_snmp pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="an-pdu02" action="off" port="1" power_wait="5" op monitor interval="60s"
 
# Node 1 - on
pcs stonith create fence_n01_pdu1_on fence_apc_snmp pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="an-pdu01" action="on" port="1"
pcs stonith create fence_n01_pdu2_on fence_apc_snmp pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="an-pdu02" action="on" port="1"
 
# Node 2 - off
pcs stonith create fence_n02_pdu1_off fence_apc_snmp pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="an-pdu01" action="off" port="2" op monitor interval="60s"
pcs stonith create fence_n02_pdu2_off fence_apc_snmp pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="an-pdu02" action="off" port="2" power_wait="5" op monitor interval="60s"
 
# Node 2 - on
pcs stonith create fence_n02_pdu1_on fence_apc_snmp pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="an-pdu01" action="on" port="2"
pcs stonith create fence_n02_pdu2_on fence_apc_snmp pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="an-pdu02" action="on" port="2"
</syntaxhighlight>
</syntaxhighlight>
We can check the new configuration now;
<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
Node: an-a03n01.alteeve.ca
pcs status
  Level 1 - fence_n01_ipmi
  Level 2 - fence_n01_pdu1_off,fence_n01_pdu2_off,fence_n01_pdu1_on,fence_n01_pdu2_on
Node: an-a03n02.alteeve.ca
  Level 1 - fence_n02_ipmi
  Level 2 - fence_n02_pdu1_off,fence_n02_pdu2_off,fence_n02_pdu1_on,fence_n02_pdu2_on
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
Cluster name: an-anvil-04
Last updated: Tue Jul  2 16:41:55 2013
Last change: Tue Jul  2 16:41:44 2013 via cibadmin on an-a04n01.alteeve.ca
Stack: corosync
Current DC: an-a04n01.alteeve.ca (1) - partition with quorum
Version: 1.1.9-3.fc19-781a388
2 Nodes configured, unknown expected votes
10 Resources configured.
Online: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]


For those of us who are [[XML]] fans, this is what the [[cib]] looks like now:
Full list of resources:


<syntaxhighlight lang="bash">
fence_n01_ipmi (stonith:fence_ipmilan): Started an-a04n01.alteeve.ca
cat /var/lib/pacemaker/cib/cib.xml
fence_n02_ipmi (stonith:fence_ipmilan): Started an-a04n02.alteeve.ca
fence_n01_pdu1_off (stonith:fence_apc_snmp): Started an-a04n01.alteeve.ca
fence_n01_pdu2_off (stonith:fence_apc_snmp): Started an-a04n02.alteeve.ca
fence_n02_pdu1_off (stonith:fence_apc_snmp): Started an-a04n01.alteeve.ca
fence_n02_pdu2_off (stonith:fence_apc_snmp): Started an-a04n02.alteeve.ca
fence_n01_pdu1_on (stonith:fence_apc_snmp): Started an-a04n01.alteeve.ca
fence_n01_pdu2_on (stonith:fence_apc_snmp): Started an-a04n02.alteeve.ca
fence_n02_pdu1_on (stonith:fence_apc_snmp): Started an-a04n01.alteeve.ca
fence_n02_pdu2_on (stonith:fence_apc_snmp): Started an-a04n02.alteeve.ca
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="xml">
 
<cib epoch="18" num_updates="0" admin_epoch="0" validate-with="pacemaker-1.2" cib-last-written="Thu Jul 18 13:15:53 2013" update-origin="an-a03n01.alteeve.ca" update-client="cibadmin" crm_feature_set="3.0.7" have-quorum="1" dc-uuid="1">
Before we proceed, we need to tell pacemaker to use fencing;
  <configuration>
 
    <crm_config>
<syntaxhighlight lang="bash">
      <cluster_property_set id="cib-bootstrap-options">
pcs property set stonith-enabled=true
        <nvpair id="cib-bootstrap-options-dc-version" name="dc-version" value="1.1.9-dde1c52"/>
pcs property
        <nvpair id="cib-bootstrap-options-cluster-infrastructure" name="cluster-infrastructure" value="corosync"/>
</syntaxhighlight>
        <nvpair id="cib-bootstrap-options-no-quorum-policy" name="no-quorum-policy" value="ignore"/>
<syntaxhighlight lang="text">
      </cluster_property_set>
Cluster Properties:
    </crm_config>
Cluster Properties:
    <nodes>
cluster-infrastructure: corosync
      <node id="1" uname="an-a03n01.alteeve.ca"/>
dc-version: 1.1.9-3.fc19-781a388
      <node id="2" uname="an-a03n02.alteeve.ca"/>
no-quorum-policy: ignore
    </nodes>
stonith-enabled: true
    <resources>
</syntaxhighlight>
      <primitive class="stonith" id="fence_n01_ipmi" type="fence_ipmilan">
 
        <instance_attributes id="fence_n01_ipmi-instance_attributes">
Excellent!
          <nvpair id="fence_n01_ipmi-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a03n01.alteeve.ca"/>
 
          <nvpair id="fence_n01_ipmi-instance_attributes-ipaddr" name="ipaddr" value="an-a03n01.ipmi"/>
== Configuring Fence Levels ==
          <nvpair id="fence_n01_ipmi-instance_attributes-action" name="action" value="reboot"/>
 
          <nvpair id="fence_n01_ipmi-instance_attributes-login" name="login" value="admin"/>
The goal of fence levels is to tell pacemaker that there are "fence methods" to try and to impose an order on those methods. Each method composes one or more fence primitives and, when 2 or more primitives are tied together, that all primitives must succeed for the overall method to succeed.
          <nvpair id="fence_n01_ipmi-instance_attributes-passwd" name="passwd" value="secret"/>
 
          <nvpair id="fence_n01_ipmi-instance_attributes-delay" name="delay" value="15"/>
So in our case; the order we want is;
        </instance_attributes>
 
        <operations>
* IPMI -> PDUs
          <op id="fence_n01_ipmi-monitor-interval-60s" interval="60s" name="monitor"/>
 
        </operations>
The reason is that when IPMI fencing succeeds, we can be very certain the node is truly fenced. When PDU fencing succeeds, it only confirms that the power outlets were cycled. If someone moved a node's power cables to another outlet, we'll get a false positive. On that topic, tie-down the node's PSU cables to the PDU's cable tray when possible, clearly label the power cables and wrap the fingers of anyone who might move them around.
      </primitive>
 
      <primitive class="stonith" id="fence_n02_ipmi" type="fence_ipmilan">
The PDU fencing needs to be implemented using four steps;
        <instance_attributes id="fence_n02_ipmi-instance_attributes">
 
          <nvpair id="fence_n02_ipmi-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a03n02.alteeve.ca"/>
* PDU 1, outlet X -> off
          <nvpair id="fence_n02_ipmi-instance_attributes-ipaddr" name="ipaddr" value="an-a03n02.ipmi"/>
* PDU 2, outlet X -> off
          <nvpair id="fence_n02_ipmi-instance_attributes-action" name="action" value="reboot"/>
** The <span class="code">power_wait="5"</span> setting for the <span class="code">fence_n0X_pdu2_off</span> primitives will cause a 5 second delay here, giving ample time to ensure the nodes lose power
          <nvpair id="fence_n02_ipmi-instance_attributes-login" name="login" value="admin"/>
* PDU 1, outlet X -> on
          <nvpair id="fence_n02_ipmi-instance_attributes-passwd" name="passwd" value="secret"/>
* PDU 2, outlet X -> on
        </instance_attributes>
 
        <operations>
This is to ensure that both outlets are off at the same time, ensuring that the node loses power. This works because <span class="code">fencing_topology</span> acts serially.
          <op id="fence_n02_ipmi-monitor-interval-60s" interval="60s" name="monitor"/>
 
        </operations>
Putting all this together, we issue this command;
      </primitive>
 
      <primitive class="stonith" id="fence_n01_pdu1_off" type="fence_apc_snmp">
<syntaxhighlight lang="bash">
        <instance_attributes id="fence_n01_pdu1_off-instance_attributes">
pcs stonith level add 1 an-a04n01.alteeve.ca fence_n01_ipmi
          <nvpair id="fence_n01_pdu1_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a03n01.alteeve.ca"/>
pcs stonith level add 1 an-a04n02.alteeve.ca fence_n02_ipmi
          <nvpair id="fence_n01_pdu1_off-instance_attributes-ipaddr" name="ipaddr" value="an-p01"/>
</syntaxhighlight>
          <nvpair id="fence_n01_pdu1_off-instance_attributes-action" name="action" value="off"/>
 
          <nvpair id="fence_n01_pdu1_off-instance_attributes-port" name="port" value="1"/>
The <span class="code">1</span> tells pacemaker that this is our highest priority fence method. We can see that this was set using pcs;
        </instance_attributes>
 
        <operations>
<syntaxhighlight lang="bash">
          <op id="fence_n01_pdu1_off-monitor-interval-60s" interval="60s" name="monitor"/>
pcs stonith level
        </operations>
</syntaxhighlight>
      </primitive>
<syntaxhighlight lang="bash">
      <primitive class="stonith" id="fence_n01_pdu2_off" type="fence_apc_snmp">
Node: an-a04n01.alteeve.ca
        <instance_attributes id="fence_n01_pdu2_off-instance_attributes">
  Level 1 - fence_n01_ipmi
          <nvpair id="fence_n01_pdu2_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a03n01.alteeve.ca"/>
Node: an-a04n02.alteeve.ca
          <nvpair id="fence_n01_pdu2_off-instance_attributes-ipaddr" name="ipaddr" value="an-p02"/>
  Level 1 - fence_n02_ipmi
          <nvpair id="fence_n01_pdu2_off-instance_attributes-action" name="action" value="off"/>
</syntaxhighlight>
          <nvpair id="fence_n01_pdu2_off-instance_attributes-port" name="port" value="1"/>
 
          <nvpair id="fence_n01_pdu2_off-instance_attributes-power_wait" name="power_wait" value="5"/>
Now we'll tell pacemaker to use the PDUs as the second fence method. Here we tie together the two <span class="code">off</span> calls and the two <span class="code">on</span> calls into a single method.
        </instance_attributes>
 
        <operations>
<syntaxhighlight lang="bash">
          <op id="fence_n01_pdu2_off-monitor-interval-60s" interval="60s" name="monitor"/>
pcs stonith level add 2 an-a04n01.alteeve.ca fence_n01_pdu1_off,fence_n01_pdu2_off,fence_n01_pdu1_on,fence_n01_pdu2_on
         </operations>
pcs stonith level add 2 an-a04n02.alteeve.ca fence_n02_pdu1_off,fence_n02_pdu2_off,fence_n02_pdu1_on,fence_n02_pdu2_on
      </primitive>
</syntaxhighlight>
      <primitive class="stonith" id="fence_n01_pdu1_on" type="fence_apc_snmp">
 
        <instance_attributes id="fence_n01_pdu1_on-instance_attributes">
Check again and we'll see that the new methods were added.
          <nvpair id="fence_n01_pdu1_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a03n01.alteeve.ca"/>
 
          <nvpair id="fence_n01_pdu1_on-instance_attributes-ipaddr" name="ipaddr" value="an-p01"/>
<syntaxhighlight lang="bash">
          <nvpair id="fence_n01_pdu1_on-instance_attributes-action" name="action" value="on"/>
pcs stonith level
          <nvpair id="fence_n01_pdu1_on-instance_attributes-port" name="port" value="1"/>
</syntaxhighlight>
        </instance_attributes>
<syntaxhighlight lang="bash">
        <operations>
Node: an-a04n01.alteeve.ca
          <op id="fence_n01_pdu1_on-monitor-interval-60s" interval="60s" name="monitor"/>
  Level 1 - fence_n01_ipmi
        </operations>
  Level 2 - fence_n01_pdu1_off,fence_n01_pdu2_off,fence_n01_pdu1_on,fence_n01_pdu2_on
      </primitive>
Node: an-a04n02.alteeve.ca
       <primitive class="stonith" id="fence_n01_pdu2_on" type="fence_apc_snmp">
  Level 1 - fence_n02_ipmi
         <instance_attributes id="fence_n01_pdu2_on-instance_attributes">
  Level 2 - fence_n02_pdu1_off,fence_n02_pdu2_off,fence_n02_pdu1_on,fence_n02_pdu2_on
           <nvpair id="fence_n01_pdu2_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a03n01.alteeve.ca"/>
</syntaxhighlight>
           <nvpair id="fence_n01_pdu2_on-instance_attributes-ipaddr" name="ipaddr" value="an-p02"/>
 
           <nvpair id="fence_n01_pdu2_on-instance_attributes-action" name="action" value="on"/>
For those of us who are [[XML]] fans, this is what the [[cib]] looks like now:
           <nvpair id="fence_n01_pdu2_on-instance_attributes-port" name="port" value="1"/>
 
        </instance_attributes>
<syntaxhighlight lang="bash">
        <operations>
cat /var/lib/pacemaker/cib/cib.xml
          <op id="fence_n01_pdu2_on-monitor-interval-60s" interval="60s" name="monitor"/>
</syntaxhighlight>
        </operations>
<syntaxhighlight lang="xml">
      </primitive>
<cib epoch="18" num_updates="0" admin_epoch="0" validate-with="pacemaker-1.2" cib-last-written="Thu Jul 18 13:15:53 2013" update-origin="an-a04n01.alteeve.ca" update-client="cibadmin" crm_feature_set="3.0.7" have-quorum="1" dc-uuid="1">
      <primitive class="stonith" id="fence_n02_pdu1_off" type="fence_apc_snmp">
  <configuration>
        <instance_attributes id="fence_n02_pdu1_off-instance_attributes">
    <crm_config>
          <nvpair id="fence_n02_pdu1_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a03n02.alteeve.ca"/>
      <cluster_property_set id="cib-bootstrap-options">
           <nvpair id="fence_n02_pdu1_off-instance_attributes-ipaddr" name="ipaddr" value="an-p01"/>
         <nvpair id="cib-bootstrap-options-dc-version" name="dc-version" value="1.1.9-dde1c52"/>
           <nvpair id="fence_n02_pdu1_off-instance_attributes-action" name="action" value="off"/>
        <nvpair id="cib-bootstrap-options-cluster-infrastructure" name="cluster-infrastructure" value="corosync"/>
          <nvpair id="fence_n02_pdu1_off-instance_attributes-port" name="port" value="2"/>
        <nvpair id="cib-bootstrap-options-no-quorum-policy" name="no-quorum-policy" value="ignore"/>
         </instance_attributes>
      </cluster_property_set>
    </crm_config>
    <nodes>
      <node id="1" uname="an-a04n01.alteeve.ca"/>
      <node id="2" uname="an-a04n02.alteeve.ca"/>
    </nodes>
    <resources>
       <primitive class="stonith" id="fence_n01_ipmi" type="fence_ipmilan">
         <instance_attributes id="fence_n01_ipmi-instance_attributes">
           <nvpair id="fence_n01_ipmi-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n01.alteeve.ca"/>
           <nvpair id="fence_n01_ipmi-instance_attributes-ipaddr" name="ipaddr" value="an-a04n01.ipmi"/>
           <nvpair id="fence_n01_ipmi-instance_attributes-action" name="action" value="reboot"/>
           <nvpair id="fence_n01_ipmi-instance_attributes-login" name="login" value="admin"/>
           <nvpair id="fence_n01_ipmi-instance_attributes-passwd" name="passwd" value="secret"/>
           <nvpair id="fence_n01_ipmi-instance_attributes-delay" name="delay" value="15"/>
         </instance_attributes>
         <operations>
         <operations>
           <op id="fence_n02_pdu1_off-monitor-interval-60s" interval="60s" name="monitor"/>
           <op id="fence_n01_ipmi-monitor-interval-60s" interval="60s" name="monitor"/>
         </operations>
         </operations>
       </primitive>
       </primitive>
       <primitive class="stonith" id="fence_n02_pdu2_off" type="fence_apc_snmp">
       <primitive class="stonith" id="fence_n02_ipmi" type="fence_ipmilan">
         <instance_attributes id="fence_n02_pdu2_off-instance_attributes">
         <instance_attributes id="fence_n02_ipmi-instance_attributes">
           <nvpair id="fence_n02_pdu2_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a03n02.alteeve.ca"/>
           <nvpair id="fence_n02_ipmi-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n02.alteeve.ca"/>
           <nvpair id="fence_n02_pdu2_off-instance_attributes-ipaddr" name="ipaddr" value="an-p02"/>
           <nvpair id="fence_n02_ipmi-instance_attributes-ipaddr" name="ipaddr" value="an-a04n02.ipmi"/>
           <nvpair id="fence_n02_pdu2_off-instance_attributes-action" name="action" value="off"/>
           <nvpair id="fence_n02_ipmi-instance_attributes-action" name="action" value="reboot"/>
           <nvpair id="fence_n02_pdu2_off-instance_attributes-port" name="port" value="2"/>
           <nvpair id="fence_n02_ipmi-instance_attributes-login" name="login" value="admin"/>
           <nvpair id="fence_n02_pdu2_off-instance_attributes-power_wait" name="power_wait" value="5"/>
           <nvpair id="fence_n02_ipmi-instance_attributes-passwd" name="passwd" value="secret"/>
         </instance_attributes>
         </instance_attributes>
         <operations>
         <operations>
           <op id="fence_n02_pdu2_off-monitor-interval-60s" interval="60s" name="monitor"/>
           <op id="fence_n02_ipmi-monitor-interval-60s" interval="60s" name="monitor"/>
         </operations>
         </operations>
       </primitive>
       </primitive>
       <primitive class="stonith" id="fence_n02_pdu1_on" type="fence_apc_snmp">
       <primitive class="stonith" id="fence_n01_pdu1_off" type="fence_apc_snmp">
         <instance_attributes id="fence_n02_pdu1_on-instance_attributes">
         <instance_attributes id="fence_n01_pdu1_off-instance_attributes">
           <nvpair id="fence_n02_pdu1_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a03n02.alteeve.ca"/>
           <nvpair id="fence_n01_pdu1_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n01.alteeve.ca"/>
           <nvpair id="fence_n02_pdu1_on-instance_attributes-ipaddr" name="ipaddr" value="an-p01"/>
           <nvpair id="fence_n01_pdu1_off-instance_attributes-ipaddr" name="ipaddr" value="an-pdu01"/>
           <nvpair id="fence_n02_pdu1_on-instance_attributes-action" name="action" value="on"/>
           <nvpair id="fence_n01_pdu1_off-instance_attributes-action" name="action" value="off"/>
           <nvpair id="fence_n02_pdu1_on-instance_attributes-port" name="port" value="2"/>
           <nvpair id="fence_n01_pdu1_off-instance_attributes-port" name="port" value="1"/>
         </instance_attributes>
         </instance_attributes>
         <operations>
         <operations>
           <op id="fence_n02_pdu1_on-monitor-interval-60s" interval="60s" name="monitor"/>
           <op id="fence_n01_pdu1_off-monitor-interval-60s" interval="60s" name="monitor"/>
         </operations>
         </operations>
       </primitive>
       </primitive>
       <primitive class="stonith" id="fence_n02_pdu2_on" type="fence_apc_snmp">
       <primitive class="stonith" id="fence_n01_pdu2_off" type="fence_apc_snmp">
         <instance_attributes id="fence_n02_pdu2_on-instance_attributes">
         <instance_attributes id="fence_n01_pdu2_off-instance_attributes">
           <nvpair id="fence_n02_pdu2_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a03n02.alteeve.ca"/>
           <nvpair id="fence_n01_pdu2_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n01.alteeve.ca"/>
           <nvpair id="fence_n02_pdu2_on-instance_attributes-ipaddr" name="ipaddr" value="an-p02"/>
           <nvpair id="fence_n01_pdu2_off-instance_attributes-ipaddr" name="ipaddr" value="an-pdu02"/>
           <nvpair id="fence_n02_pdu2_on-instance_attributes-action" name="action" value="on"/>
           <nvpair id="fence_n01_pdu2_off-instance_attributes-action" name="action" value="off"/>
           <nvpair id="fence_n02_pdu2_on-instance_attributes-port" name="port" value="2"/>
           <nvpair id="fence_n01_pdu2_off-instance_attributes-port" name="port" value="1"/>
          <nvpair id="fence_n01_pdu2_off-instance_attributes-power_wait" name="power_wait" value="5"/>
         </instance_attributes>
         </instance_attributes>
         <operations>
         <operations>
           <op id="fence_n02_pdu2_on-monitor-interval-60s" interval="60s" name="monitor"/>
           <op id="fence_n01_pdu2_off-monitor-interval-60s" interval="60s" name="monitor"/>
         </operations>
         </operations>
       </primitive>
       </primitive>
    </resources>
      <primitive class="stonith" id="fence_n01_pdu1_on" type="fence_apc_snmp">
    <constraints/>
        <instance_attributes id="fence_n01_pdu1_on-instance_attributes">
    <fencing-topology>
          <nvpair id="fence_n01_pdu1_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n01.alteeve.ca"/>
      <fencing-level devices="fence_n01_ipmi" id="fl-an-a03n01.alteeve.ca-1" index="1" target="an-a03n01.alteeve.ca"/>
          <nvpair id="fence_n01_pdu1_on-instance_attributes-ipaddr" name="ipaddr" value="an-pdu01"/>
      <fencing-level devices="fence_n02_ipmi" id="fl-an-a03n02.alteeve.ca-1" index="1" target="an-a03n02.alteeve.ca"/>
          <nvpair id="fence_n01_pdu1_on-instance_attributes-action" name="action" value="on"/>
       <fencing-level devices="fence_n01_pdu1_off,fence_n01_pdu2_off,fence_n01_pdu1_on,fence_n01_pdu2_on" id="fl-an-a03n01.alteeve.ca-2" index="2" target="an-a03n01.alteeve.ca"/>
          <nvpair id="fence_n01_pdu1_on-instance_attributes-port" name="port" value="1"/>
      <fencing-level devices="fence_n02_pdu1_off,fence_n02_pdu2_off,fence_n02_pdu1_on,fence_n02_pdu2_on" id="fl-an-a03n02.alteeve.ca-2" index="2" target="an-a03n02.alteeve.ca"/>
        </instance_attributes>
    </fencing-topology>
        <operations>
  </configuration>
          <op id="fence_n01_pdu1_on-monitor-interval-60s" interval="60s" name="monitor"/>
</cib>
        </operations>
</syntaxhighlight>
       </primitive>
 
      <primitive class="stonith" id="fence_n01_pdu2_on" type="fence_apc_snmp">
== Fencing using fence_virsh ==
        <instance_attributes id="fence_n01_pdu2_on-instance_attributes">
 
          <nvpair id="fence_n01_pdu2_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n01.alteeve.ca"/>
{{note|1=To write this section, I used two virtual machines called <span class="code">pcmk1</span> and <span class="code">pcmk2</span>.}}
          <nvpair id="fence_n01_pdu2_on-instance_attributes-ipaddr" name="ipaddr" value="an-pdu02"/>
 
          <nvpair id="fence_n01_pdu2_on-instance_attributes-action" name="action" value="on"/>
If you are trying to learn fencing using KVM or Xen virtual machines, you can use the <span class="code">fence_virsh</span>. You can also use <span class="code">[[Fencing KVM Virtual Servers|fence_virtd]]</span>, which is actually recommended by many, but I have found it to be rather unreliable.
          <nvpair id="fence_n01_pdu2_on-instance_attributes-port" name="port" value="1"/>
 
        </instance_attributes>
To use <span class="code">fence_virsh</span>, first install it.
        <operations>
 
          <op id="fence_n01_pdu2_on-monitor-interval-60s" interval="60s" name="monitor"/>
<syntaxhighlight lang="bash">
        </operations>
yum -y install fence-agents-virsh
      </primitive>
</syntaxhighlight>
      <primitive class="stonith" id="fence_n02_pdu1_off" type="fence_apc_snmp">
<syntaxhighlight lang="text">
        <instance_attributes id="fence_n02_pdu1_off-instance_attributes">
<lots of yum output>
          <nvpair id="fence_n02_pdu1_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n02.alteeve.ca"/>
</syntaxhighlight>
          <nvpair id="fence_n02_pdu1_off-instance_attributes-ipaddr" name="ipaddr" value="an-pdu01"/>
 
          <nvpair id="fence_n02_pdu1_off-instance_attributes-action" name="action" value="off"/>
Now test it from the command line. To do this, we need to know a few things;
          <nvpair id="fence_n02_pdu1_off-instance_attributes-port" name="port" value="2"/>
* The VM host is at IP <span class="code">192.168.122.1</span>
        </instance_attributes>
* The username and password (<span class="code">-l</span> and <span class="code">-p</span> respectively) are the credentials used to log into VM host over [[SSH]].
        <operations>
** If you don't want your password to be shown, create a little shell script that simply prints your password and then use <span class="code">-S /path/to/script</span> instead of <span class="code">-p "secret"</span>.
          <op id="fence_n02_pdu1_off-monitor-interval-60s" interval="60s" name="monitor"/>
* The name of the target VM, as shown by <span class="code">virsh list --all</span> on the host, is the node (<span class="code">-n</span>) value. For me, the nodes are called <span class="code">an-a03n01</span> and <span class="code">an-a03n02</span>.
        </operations>
 
      </primitive>
=== Create the Password Script ===
      <primitive class="stonith" id="fence_n02_pdu2_off" type="fence_apc_snmp">
 
        <instance_attributes id="fence_n02_pdu2_off-instance_attributes">
In my case, the host is called '<span class="code">lemass</span>', so I want to create a password script called '<span class="code">/root/lemass.pw</span>'. The name of the script is entirely up to you.
          <nvpair id="fence_n02_pdu2_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n02.alteeve.ca"/>
 
          <nvpair id="fence_n02_pdu2_off-instance_attributes-ipaddr" name="ipaddr" value="an-pdu02"/>
{|class="wikitable"
          <nvpair id="fence_n02_pdu2_off-instance_attributes-action" name="action" value="off"/>
!<span class="code">an-a03n01</span>
          <nvpair id="fence_n02_pdu2_off-instance_attributes-port" name="port" value="2"/>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
          <nvpair id="fence_n02_pdu2_off-instance_attributes-power_wait" name="power_wait" value="5"/>
vim /root/lemass.pw
        </instance_attributes>
</syntaxhighlight>
        <operations>
<syntaxhighlight lang="text">
          <op id="fence_n02_pdu2_off-monitor-interval-60s" interval="60s" name="monitor"/>
echo "my secret password"
        </operations>
      </primitive>
      <primitive class="stonith" id="fence_n02_pdu1_on" type="fence_apc_snmp">
        <instance_attributes id="fence_n02_pdu1_on-instance_attributes">
          <nvpair id="fence_n02_pdu1_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n02.alteeve.ca"/>
          <nvpair id="fence_n02_pdu1_on-instance_attributes-ipaddr" name="ipaddr" value="an-pdu01"/>
          <nvpair id="fence_n02_pdu1_on-instance_attributes-action" name="action" value="on"/>
          <nvpair id="fence_n02_pdu1_on-instance_attributes-port" name="port" value="2"/>
        </instance_attributes>
        <operations>
          <op id="fence_n02_pdu1_on-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
      <primitive class="stonith" id="fence_n02_pdu2_on" type="fence_apc_snmp">
        <instance_attributes id="fence_n02_pdu2_on-instance_attributes">
          <nvpair id="fence_n02_pdu2_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n02.alteeve.ca"/>
          <nvpair id="fence_n02_pdu2_on-instance_attributes-ipaddr" name="ipaddr" value="an-pdu02"/>
          <nvpair id="fence_n02_pdu2_on-instance_attributes-action" name="action" value="on"/>
          <nvpair id="fence_n02_pdu2_on-instance_attributes-port" name="port" value="2"/>
        </instance_attributes>
        <operations>
          <op id="fence_n02_pdu2_on-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
    </resources>
    <constraints/>
    <fencing-topology>
      <fencing-level devices="fence_n01_ipmi" id="fl-an-a04n01.alteeve.ca-1" index="1" target="an-a04n01.alteeve.ca"/>
      <fencing-level devices="fence_n02_ipmi" id="fl-an-a04n02.alteeve.ca-1" index="1" target="an-a04n02.alteeve.ca"/>
      <fencing-level devices="fence_n01_pdu1_off,fence_n01_pdu2_off,fence_n01_pdu1_on,fence_n01_pdu2_on" id="fl-an-a04n01.alteeve.ca-2" index="2" target="an-a04n01.alteeve.ca"/>
      <fencing-level devices="fence_n02_pdu1_off,fence_n02_pdu2_off,fence_n02_pdu1_on,fence_n02_pdu2_on" id="fl-an-a04n02.alteeve.ca-2" index="2" target="an-a04n02.alteeve.ca"/>
    </fencing-topology>
  </configuration>
</cib>
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
 
chmod 755 /root/lemass.pw
== Fencing using fence_virsh ==
/root/lemass.pw
 
{{note|1=To write this section, I used two virtual machines called <span class="code">pcmk1</span> and <span class="code">pcmk2</span>.}}
 
If you are trying to learn fencing using KVM or Xen virtual machines, you can use the <span class="code">fence_virsh</span>. You can also use <span class="code">[[Fencing KVM Virtual Servers|fence_virtd]]</span>, which is actually recommended by many, but I have found it to be rather unreliable.
 
To use <span class="code">fence_virsh</span>, first install it.
 
<syntaxhighlight lang="bash">
yum -y install fence-agents-virsh
</syntaxhighlight>
<syntaxhighlight lang="text">
<lots of yum output>
</syntaxhighlight>
 
Now test it from the command line. To do this, we need to know a few things;
* The VM host is at IP <span class="code">192.168.122.1</span>
* The username and password (<span class="code">-l</span> and <span class="code">-p</span> respectively) are the credentials used to log into VM host over [[SSH]].
** If you don't want your password to be shown, create a little shell script that simply prints your password and then use <span class="code">-S /path/to/script</span> instead of <span class="code">-p "secret"</span>.
* The name of the target VM, as shown by <span class="code">virsh list --all</span> on the host, is the node (<span class="code">-n</span>) value. For me, the nodes are called <span class="code">an-a04n01</span> and <span class="code">an-a04n02</span>.
 
=== Create the Password Script ===
 
In my case, the host is called '<span class="code">lemass</span>', so I want to create a password script called '<span class="code">/root/lemass.pw</span>'. The name of the script is entirely up to you.
 
{|class="wikitable"
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
vim /root/lemass.pw
</syntaxhighlight>
<syntaxhighlight lang="text">
echo "my secret password"
</syntaxhighlight>
<syntaxhighlight lang="bash">
chmod 755 /root/lemass.pw
/root/lemass.pw
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Line 1,294: Line 1,604:
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
rsync -av /root/lemass.pw root@an-a03n02:/root/
rsync -av /root/lemass.pw root@an-a04n02:/root/
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
Line 1,304: Line 1,614:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
/root/lemass.pw
/root/lemass.pw
Line 1,318: Line 1,628:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
fence_virsh -a 192.168.122.1 -l root -S /root/lemass.pw -n an-a03n02 -o status
fence_virsh -a 192.168.122.1 -l root -S /root/lemass.pw -n an-a04n02 -o status
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Line 1,326: Line 1,636:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
fence_virsh -a 192.168.122.1 -l root -S /root/lemass.pw -n an-a03n01 -o status
fence_virsh -a 192.168.122.1 -l root -S /root/lemass.pw -n an-a04n01 -o status
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Line 1,338: Line 1,648:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs stonith create fence_n01_virsh fence_virsh pcmk_host_list="an-a03n01.alteeve.ca" ipaddr="192.168.122.1" action="reboot" login="root" passwd_script="/root/lemass.pw" port="an-a03n01" delay=15 op monitor interval=60s
pcs stonith create fence_n01_virsh fence_virsh pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="192.168.122.1" action="reboot" login="root" passwd_script="/root/lemass.pw" port="an-a04n01" delay=15 op monitor interval=60s
pcs stonith create fence_n02_virsh fence_virsh pcmk_host_list="an-a03n02.alteeve.ca" ipaddr="192.168.122.1" action="reboot" login="root" passwd_script="/root/lemass.pw" port="an-a03n02" op monitor interval=60s
pcs stonith create fence_n02_virsh fence_virsh pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="192.168.122.1" action="reboot" login="root" passwd_script="/root/lemass.pw" port="an-a04n02" op monitor interval=60s
pcs cluster status
pcs cluster status
</syntaxhighlight>
</syntaxhighlight>
Line 1,347: Line 1,657:
Cluster Status:
Cluster Status:
  Last updated: Sun Jan 26 15:45:31 2014
  Last updated: Sun Jan 26 15:45:31 2014
  Last change: Sun Jan 26 15:06:14 2014 via crmd on an-a03n01.alteeve.ca
  Last change: Sun Jan 26 15:06:14 2014 via crmd on an-a04n01.alteeve.ca
  Stack: corosync
  Stack: corosync
  Current DC: an-a03n02.alteeve.ca (2) - partition with quorum
  Current DC: an-a04n02.alteeve.ca (2) - partition with quorum
  Version: 1.1.10-19.el7-368c726
  Version: 1.1.10-19.el7-368c726
  2 Nodes configured
  2 Nodes configured
Line 1,355: Line 1,665:


PCSD Status:
PCSD Status:
an-a03n01.alteeve.ca:  
an-a04n01.alteeve.ca:  
   an-a03n01.alteeve.ca: Online
   an-a04n01.alteeve.ca: Online
an-a03n02.alteeve.ca:  
an-a04n02.alteeve.ca:  
   an-a03n02.alteeve.ca: Online
   an-a04n02.alteeve.ca: Online
</syntaxhighlight>
</syntaxhighlight>
|}
|}
Line 1,379: Line 1,689:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
rpm -Uvh https://alteeve.ca/files/AN-Cluster_Tutorial_3/drbd84/drbd-8.4.4-4.el7.x86_64.rpm \
rpm -Uvh https://alteeve.ca/files/AN-Cluster_Tutorial_3/drbd84/drbd-8.4.4-4.el7.x86_64.rpm \
Line 1,392: Line 1,702:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
</syntaxhighlight>
</syntaxhighlight>
Line 1,687: Line 1,997:
# This sets up the resource on node 01. The name used below must be the
# This sets up the resource on node 01. The name used below must be the
# named returned by "uname -n".
# named returned by "uname -n".
on an-a03n01.alteeve.ca {
on an-a04n01.alteeve.ca {
# This is the address and port to use for DRBD traffic on this
# This is the address and port to use for DRBD traffic on this
# node. Multiple resources can use the same IP but the ports
# node. Multiple resources can use the same IP but the ports
Line 1,693: Line 2,003:
# second uses 7789 and so on, incrementing by one for each
# second uses 7789 and so on, incrementing by one for each
# additional resource.  
# additional resource.  
address 10.10.30.1:7788;
address 10.10.40.1:7788;
}
}
on an-a03n02.alteeve.ca {
on an-a04n02.alteeve.ca {
address 10.10.30.2:7788;
address 10.10.40.2:7788;
}
}
}
}
Line 1,767: Line 2,077:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
sed -i.anvil 's^filter = \[ "a/\.\*/" \]^filter = \[ "a|/dev/drbd*|", "r/.*/" \]^' /etc/lvm/lvm.conf
sed -i.anvil 's^filter = \[ "a/\.\*/" \]^filter = \[ "a|/dev/drbd*|", "r/.*/" \]^' /etc/lvm/lvm.conf
Line 1,815: Line 2,125:
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
rsync -av /etc/lvm/lvm.conf* root@an-a03n02:/etc/lvm/
rsync -av /etc/lvm/lvm.conf* root@an-a04n02:/etc/lvm/
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Line 1,826: Line 2,136:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
diff -u /etc/lvm/lvm.conf.anvil /etc/lvm/lvm.conf
diff -u /etc/lvm/lvm.conf.anvil /etc/lvm/lvm.conf
Line 1,875: Line 2,185:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
systemctl disable lvm2-lvmetad.service
systemctl disable lvm2-lvmetad.service
Line 1,885: Line 2,195:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
systemctl disable lvm2-lvmetad.service
systemctl disable lvm2-lvmetad.service
Line 1,901: Line 2,211:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
systemctl start dlm.service
systemctl start dlm.service
Line 1,907: Line 2,217:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
systemctl start dlm.service
systemctl start dlm.service
Line 1,917: Line 2,227:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pvcreate /dev/drbd0  
pvcreate /dev/drbd0  
Line 1,925: Line 2,235:
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
vgcreate an-a03n01_vg0 /dev/drbd0
vgcreate an-a04n01_vg0 /dev/drbd0
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
   /proc/devices: No entry for device-mapper found
   /proc/devices: No entry for device-mapper found
   Clustered volume group "an-a03n01_vg0" successfully created
   Clustered volume group "an-a04n01_vg0" successfully created
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
lvcreate -L 10G -n shared an-a03n01_vg0
lvcreate -L 10G -n shared an-a04n01_vg0
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Line 1,938: Line 2,248:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pvscan
pvscan
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
   PV /dev/drbd0  VG an-a03n01_vg0   lvm2 [20.00 GiB / 20.00 GiB free]
   PV /dev/drbd0  VG an-a04n01_vg0   lvm2 [20.00 GiB / 20.00 GiB free]
   Total: 1 [20.00 GiB] / in use: 1 [20.00 GiB] / in no VG: 0 [0  ]
   Total: 1 [20.00 GiB] / in use: 1 [20.00 GiB] / in no VG: 0 [0  ]
</syntaxhighlight>
</syntaxhighlight>
Line 1,951: Line 2,261:
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
   Reading all physical volumes.  This may take a while...
   Reading all physical volumes.  This may take a while...
   Found volume group "an-a03n01_vg0" using metadata type lvm2
   Found volume group "an-a04n01_vg0" using metadata type lvm2
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
Line 1,957: Line 2,267:
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
   ACTIVE            '/dev/an-a03n01_vg0/shared' [10.00 GiB] inherit
   ACTIVE            '/dev/an-a04n01_vg0/shared' [10.00 GiB] inherit
</syntaxhighlight>
</syntaxhighlight>
|}
|}


Format the <span class="code">/dev/an-a03n01_vg0/shared</span>;
Format the <span class="code">/dev/an-a04n01_vg0/shared</span>;


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
mkfs.gfs2 -j 2 -p lock_dlm -t an-cluster-03:shared /dev/an-a03n01_vg0/shared
mkfs.gfs2 -j 2 -p lock_dlm -t an-anvil-04:shared /dev/an-a04n01_vg0/shared
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
/dev/an-a03n01_vg0/shared is a symbolic link to /dev/dm-0
/dev/an-a04n01_vg0/shared is a symbolic link to /dev/dm-0
This will destroy any data on /dev/dm-0
This will destroy any data on /dev/dm-0
</syntaxhighlight>
</syntaxhighlight>
Line 1,976: Line 2,286:
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Device:                    /dev/an-a03n01_vg0/shared
Device:                    /dev/an-a04n01_vg0/shared
Block size:                4096
Block size:                4096
Device size:              10.00 GB (2621440 blocks)
Device size:              10.00 GB (2621440 blocks)
Line 1,983: Line 2,293:
Resource groups:          40
Resource groups:          40
Locking protocol:          "lock_dlm"
Locking protocol:          "lock_dlm"
Lock table:                "an-cluster-03:shared"
Lock table:                "an-anvil-04:shared"
UUID:                      20bafdb0-1f86-f424-405b-9bf608c0c486
UUID:                      20bafdb0-1f86-f424-405b-9bf608c0c486
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="bash">
<syntaxhighlight lang="bash">
mkdir /shared
mkdir /shared
mount /dev/an-a03n01_vg0/shared /shared
mount /dev/an-a04n01_vg0/shared /shared
df -h
df -h
</syntaxhighlight>
</syntaxhighlight>
Line 2,003: Line 2,313:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
</syntaxhighlight>
</syntaxhighlight>
Line 2,022: Line 2,332:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
umount /shared/
umount /shared/
Line 2,029: Line 2,339:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
umount /shared/
umount /shared/
Line 2,046: Line 2,356:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs cluster cib drbd_cfg
pcs cluster cib drbd_cfg
Line 2,063: Line 2,373:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs status
pcs status
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Cluster name: an-cluster-03
Cluster name: an-anvil-04
Last updated: Sun Jan 26 20:26:33 2014
Last updated: Sun Jan 26 20:26:33 2014
Last change: Sun Jan 26 20:23:23 2014 via cibadmin on an-a03n01.alteeve.ca
Last change: Sun Jan 26 20:23:23 2014 via cibadmin on an-a04n01.alteeve.ca
Stack: corosync
Stack: corosync
Current DC: an-a03n02.alteeve.ca (2) - partition with quorum
Current DC: an-a04n02.alteeve.ca (2) - partition with quorum
Version: 1.1.10-19.el7-368c726
Version: 1.1.10-19.el7-368c726
2 Nodes configured
2 Nodes configured
Line 2,078: Line 2,388:




Online: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
Online: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]


Full list of resources:
Full list of resources:


  fence_n01_virsh (stonith:fence_virsh): Started an-a03n01.alteeve.ca  
  fence_n01_virsh (stonith:fence_virsh): Started an-a04n01.alteeve.ca  
  fence_n02_virsh (stonith:fence_virsh): Started an-a03n02.alteeve.ca  
  fence_n02_virsh (stonith:fence_virsh): Started an-a04n02.alteeve.ca  
  Master/Slave Set: drbd_r0_Clone [drbd_r0]
  Master/Slave Set: drbd_r0_Clone [drbd_r0]
     Masters: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
     Masters: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]


PCSD Status:
PCSD Status:
an-a03n01.alteeve.ca:  
an-a04n01.alteeve.ca:  
   an-a03n01.alteeve.ca: Online
   an-a04n01.alteeve.ca: Online
an-a03n02.alteeve.ca:  
an-a04n02.alteeve.ca:  
   an-a03n02.alteeve.ca: Online
   an-a04n02.alteeve.ca: Online


Daemon Status:
Daemon Status:
Line 2,099: Line 2,409:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs status
pcs status
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Cluster name: an-cluster-03
Cluster name: an-anvil-04
Last updated: Sun Jan 26 20:26:58 2014
Last updated: Sun Jan 26 20:26:58 2014
Last change: Sun Jan 26 20:23:23 2014 via cibadmin on an-a03n01.alteeve.ca
Last change: Sun Jan 26 20:23:23 2014 via cibadmin on an-a04n01.alteeve.ca
Stack: corosync
Stack: corosync
Current DC: an-a03n02.alteeve.ca (2) - partition with quorum
Current DC: an-a04n02.alteeve.ca (2) - partition with quorum
Version: 1.1.10-19.el7-368c726
Version: 1.1.10-19.el7-368c726
2 Nodes configured
2 Nodes configured
Line 2,114: Line 2,424:




Online: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
Online: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]


Full list of resources:
Full list of resources:


  fence_n01_virsh (stonith:fence_virsh): Started an-a03n01.alteeve.ca  
  fence_n01_virsh (stonith:fence_virsh): Started an-a04n01.alteeve.ca  
  fence_n02_virsh (stonith:fence_virsh): Started an-a03n02.alteeve.ca  
  fence_n02_virsh (stonith:fence_virsh): Started an-a04n02.alteeve.ca  
  Master/Slave Set: drbd_r0_Clone [drbd_r0]
  Master/Slave Set: drbd_r0_Clone [drbd_r0]
     Masters: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
     Masters: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]


PCSD Status:
PCSD Status:
an-a03n01.alteeve.ca:  
an-a04n01.alteeve.ca:  
   an-a03n01.alteeve.ca: Online
   an-a04n01.alteeve.ca: Online
an-a03n02.alteeve.ca:  
an-a04n02.alteeve.ca:  
   an-a03n02.alteeve.ca: Online
   an-a04n02.alteeve.ca: Online


Daemon Status:
Daemon Status:
Line 2,139: Line 2,449:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs cluster cib dlm_cfg
pcs cluster cib dlm_cfg
Line 2,150: Line 2,460:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs status
pcs status
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Cluster name: an-cluster-03
Cluster name: an-anvil-04
Last updated: Sun Jan 26 20:34:36 2014
Last updated: Sun Jan 26 20:34:36 2014
Last change: Sun Jan 26 20:33:31 2014 via cibadmin on an-a03n01.alteeve.ca
Last change: Sun Jan 26 20:33:31 2014 via cibadmin on an-a04n01.alteeve.ca
Stack: corosync
Stack: corosync
Current DC: an-a03n02.alteeve.ca (2) - partition with quorum
Current DC: an-a04n02.alteeve.ca (2) - partition with quorum
Version: 1.1.10-19.el7-368c726
Version: 1.1.10-19.el7-368c726
2 Nodes configured
2 Nodes configured
Line 2,165: Line 2,475:




Online: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
Online: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]


Full list of resources:
Full list of resources:


  fence_n01_virsh (stonith:fence_virsh): Started an-a03n01.alteeve.ca  
  fence_n01_virsh (stonith:fence_virsh): Started an-a04n01.alteeve.ca  
  fence_n02_virsh (stonith:fence_virsh): Started an-a03n02.alteeve.ca  
  fence_n02_virsh (stonith:fence_virsh): Started an-a04n02.alteeve.ca  
  Master/Slave Set: drbd_r0_Clone [drbd_r0]
  Master/Slave Set: drbd_r0_Clone [drbd_r0]
     Masters: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
     Masters: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]
  Clone Set: dlm-clone [dlm]
  Clone Set: dlm-clone [dlm]
     Started: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
     Started: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]


PCSD Status:
PCSD Status:
an-a03n01.alteeve.ca:  
an-a04n01.alteeve.ca:  
   an-a03n01.alteeve.ca: Online
   an-a04n01.alteeve.ca: Online
an-a03n02.alteeve.ca:  
an-a04n02.alteeve.ca:  
   an-a03n02.alteeve.ca: Online
   an-a04n02.alteeve.ca: Online


Daemon Status:
Daemon Status:
Line 2,192: Line 2,502:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs cluster cib clvmd_cfg
pcs cluster cib clvmd_cfg
Line 2,204: Line 2,514:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs status
pcs status
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Cluster name: an-cluster-03
Cluster name: an-anvil-04
Last updated: Mon Jan 27 19:00:33 2014
Last updated: Mon Jan 27 19:00:33 2014
Last change: Mon Jan 27 19:00:19 2014 via crm_resource on an-a03n01.alteeve.ca
Last change: Mon Jan 27 19:00:19 2014 via crm_resource on an-a04n01.alteeve.ca
Stack: corosync
Stack: corosync
Current DC: an-a03n01.alteeve.ca (1) - partition with quorum
Current DC: an-a04n01.alteeve.ca (1) - partition with quorum
Version: 1.1.10-19.el7-368c726
Version: 1.1.10-19.el7-368c726
2 Nodes configured
2 Nodes configured
Line 2,219: Line 2,529:




Online: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
Online: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]


Full list of resources:
Full list of resources:


  fence_n01_virsh        (stonith:fence_virsh):  Started an-a03n01.alteeve.ca
  fence_n01_virsh        (stonith:fence_virsh):  Started an-a04n01.alteeve.ca
  fence_n02_virsh        (stonith:fence_virsh):  Started an-a03n02.alteeve.ca
  fence_n02_virsh        (stonith:fence_virsh):  Started an-a04n02.alteeve.ca
  Master/Slave Set: drbd_r0_Clone [drbd_r0]
  Master/Slave Set: drbd_r0_Clone [drbd_r0]
     Masters: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
     Masters: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]
  Clone Set: dlm-clone [dlm]
  Clone Set: dlm-clone [dlm]
     Started: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
     Started: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]
  Clone Set: clvmd-clone [clvmd]
  Clone Set: clvmd-clone [clvmd]
     Started: [ an-a03n01.alteeve.ca an-a03n02.alteeve.ca ]
     Started: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]


PCSD Status:
PCSD Status:
an-a03n01.alteeve.ca:
an-a04n01.alteeve.ca:
   an-a03n01.alteeve.ca: Online
   an-a04n01.alteeve.ca: Online
an-a03n02.alteeve.ca:
an-a04n02.alteeve.ca:
   an-a03n02.alteeve.ca: Online
   an-a04n02.alteeve.ca: Online


Daemon Status:
Daemon Status:
Line 2,248: Line 2,558:


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs cluster cib fs_cfg
pcs cluster cib fs_cfg
pcs -f fs_cfg resource create sharedFS Filesystem device="/dev/an-a03n01_vg0/shared" directory="/shared" fstype="gfs2"
pcs -f fs_cfg resource create sharedFS Filesystem device="/dev/an-a04n01_vg0/shared" directory="/shared" fstype="gfs2"
pcs -f fs_cfg resource clone sharedFS
pcs -f fs_cfg resource clone sharedFS
pcs cluster cib-push fs_cfg
pcs cluster cib-push fs_cfg
Line 2,273: Line 2,583:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
df -h
df -h
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Filesystem                        Size  Used Avail Use% Mounted on
Filesystem                        Size  Used Avail Use% Mounted on
/dev/vda3                          18G  5.6G  12G  32% /
/dev/vda3                          18G  5.6G  12G  32% /
devtmpfs                          932M    0  932M  0% /dev
devtmpfs                          932M    0  932M  0% /dev
tmpfs                              937M  76M  862M  9% /dev/shm
tmpfs                              937M  76M  862M  9% /dev/shm
tmpfs                              937M  2.6M  935M  1% /run
tmpfs                              937M  2.6M  935M  1% /run
tmpfs                              937M    0  937M  0% /sys/fs/cgroup
tmpfs                              937M    0  937M  0% /sys/fs/cgroup
/dev/loop0                        4.4G  4.4G    0 100% /mnt/dvd
/dev/loop0                        4.4G  4.4G    0 100% /mnt/dvd
/dev/vda1                          484M  83M  401M  18% /boot
/dev/vda1                          484M  83M  401M  18% /boot
/dev/mapper/an--a03n01_vg0-shared  10G  259M  9.8G  3% /shared
/dev/mapper/an--a03n01_vg0-shared  10G  259M  9.8G  3% /shared
</syntaxhighlight>
|}
 
== Configuring Constraints ==
 
{|class="wikitable"
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs cluster cib cst_cfg
pcs -f cst_cfg constraint order start dlm then promote drbd_r0_Clone
pcs -f cst_cfg constraint order promote drbd_r0_Clone then start clvmd-clone
pcs -f cst_cfg constraint order promote clvmd-clone then start sharedFS-clone
pcs cluster cib-push cst_cfg
</syntaxhighlight>
<syntaxhighlight lang="text">
CIB updated
</syntaxhighlight>
<syntaxhighlight lang="bash">
pcs constraint show
</syntaxhighlight>
<syntaxhighlight lang="text">
Location Constraints:
Ordering Constraints:
  start dlm then promote drbd_r0_Clone
  promote drbd_r0_Clone then start clvmd-clone
  start clvmd-clone then start sharedFS-clone
Colocation Constraints:
</syntaxhighlight>
|-
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs constraint show
</syntaxhighlight>
<syntaxhighlight lang="text">
Location Constraints:
Ordering Constraints:
  start dlm then promote drbd_r0_Clone
  promote drbd_r0_Clone then start clvmd-clone
  start clvmd-clone then start sharedFS-clone
Colocation Constraints:
</syntaxhighlight>
|}
 
= Odds and Sods =
 
This is a section for random notes. The stuff here will be integrated into the finished tutorial or removed.
 
== Determine multicast Address ==
 
Useful if you need to ensure that your switch has persistent multicast addresses set.
 
<syntaxhighlight lang="bash">
corosync-cmapctl | grep mcastaddr
</syntaxhighlight>
<syntaxhighlight lang="text">
totem.interface.0.mcastaddr (str) = 239.192.122.199
</syntaxhighlight>
 
 
 
 
 
<syntaxhighlight lang="bash">
</syntaxhighlight>
<syntaxhighlight lang="text">
</syntaxhighlight>
<syntaxhighlight lang="diff">
</syntaxhighlight>
</syntaxhighlight>
|}
== Configuring Constraints ==


{|class="wikitable"
{|class="wikitable"
!<span class="code">an-a03n01</span>
!<span class="code">an-a04n01</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs cluster cib cst_cfg
pcs -f cst_cfg constraint order start dlm then promote drbd_r0_Clone
pcs -f cst_cfg constraint order promote drbd_r0_Clone then start clvmd-clone
pcs -f cst_cfg constraint order promote clvmd-clone then start sharedFS-clone
pcs cluster cib-push cst_cfg
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
CIB updated
</syntaxhighlight>
<syntaxhighlight lang="bash">
pcs constraint show
</syntaxhighlight>
<syntaxhighlight lang="text">
Location Constraints:
Ordering Constraints:
  start dlm then promote drbd_r0_Clone
  promote drbd_r0_Clone then start clvmd-clone
  start clvmd-clone then start sharedFS-clone
Colocation Constraints:
</syntaxhighlight>
</syntaxhighlight>
|-
|-
!<span class="code">an-a03n02</span>
!<span class="code">an-a04n02</span>
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
|style="white-space: nowrap;"|<syntaxhighlight lang="bash">
pcs constraint show
</syntaxhighlight>
</syntaxhighlight>
<syntaxhighlight lang="text">
<syntaxhighlight lang="text">
Location Constraints:
Ordering Constraints:
  start dlm then promote drbd_r0_Clone
  promote drbd_r0_Clone then start clvmd-clone
  start clvmd-clone then start sharedFS-clone
Colocation Constraints:
</syntaxhighlight>
</syntaxhighlight>
|}
|}


= Odds and Sods =
<span class="highlight_warning"></span>
 
<span class="field"></span>
This is a section for random notes. The stuff here will be integrated into the finished tutorial or removed.
<span class="button"></span>
 
== Determine multicast Address ==
 
Useful if you need to ensure that your switch has persistent multicast addresses set.
 
<syntaxhighlight lang="bash">
corosync-cmapctl | grep mcastaddr
</syntaxhighlight>
<syntaxhighlight lang="text">
totem.interface.0.mcastaddr (str) = 239.192.122.199
</syntaxhighlight>
 
 
<span class="code"></span>
<span class="code"></span>
<syntaxhighlight lang="bash">
</syntaxhighlight>
<syntaxhighlight lang="text">
</syntaxhighlight>
<syntaxhighlight lang="diff">
</syntaxhighlight>


= Notes =
= Notes =


* [http://blog.clusterlabs.org/blog/2013/pacemaker-logging/ Pacemaker Logging]
* [http://blog.clusterlabs.org/blog/2013/pacemaker-logging/ Pacemaker Logging]
* Editing cib.xml offline is possible with: <span class="code">CIB_file=/path/to/real/cib.xml cibadmin ....</span> and sync to other nodes when done.


= Thanks =
= Thanks =

Latest revision as of 16:48, 19 November 2016

 AN!Wiki :: How To :: Anvil! Tutorial 3

Warning: This tutorial is incomplete, flawed and generally sucks at this time. Do not follow this and expect anything to work. In large part, it's a dumping ground for notes and little else. This warning will be removed when the tutorial is completed.

This is the third Anvil! tutorial built on Red Hat's Enterprise Linux 7. It marks the third generation of the Anvil! High-Availability Platform.

As with the previous tutorials, the end goal of this tutorial is an Anvil! platform for high-availability virtual servers. It's design attempts to remove all single points of failure from the system. Power and networking are made fully redundant in this version, along with minimizing the node failures which would lead to service interruption. This tutorial also covers the Striker dashboard and ScanCore monitoring and self-healing tools.

As it the previous tutorial, KVM will be the hypervisor used for facilitating virtual machines. The old cman and rgmanager tools are replaced in favour of pacemaker for resource management.

Before We Begin

This tutorial does not require prior Anvil! experience (or any clustering experience), but it does expect a certain familiarity with Linux and a low-intermediate understanding of networking. Where possible, steps are explained in detail and rationale is provided for why certain decisions are made.

For those with Anvil! experience;

Please be careful not to skip too much. There are some major and some subtle changes from previous tutorials.

OS Setup

This tutorial assumes a minimal install of either RHEL or CentOS version 7.

Post OS Install

Note: With RHEL7, biosdevname tries to give network devices predictable names. It's very likely that your initial device names will differ from those in this tutorial.

If you are running RHEL

Before you can download any packages, you will need to register your nodes with Red Hat's subscription manager;

an-a04n01
subscription-manager register --username $username --password $password --auto-attach
subscription-manager repos --enable=rhel-ha-for-rhel-7-server-rpms
subscription-manager repos --enable=rhel-7-server-optional-rpms
The system has been registered with ID: 9c578d87-bd80-4637-9f41-6076efb9e20e

Installed Product Current Status:
Product Name: Red Hat Enterprise Linux Server
Status:       Subscribed
an-a04n02
subscription-manager register --username $username --password $password --auto-attach
subscription-manager repos --enable=rhel-ha-for-rhel-7-server-rpms
subscription-manager repos --enable=rhel-7-server-optional-rpms
The system has been registered with ID: a55c83e5-e4ec-4fcf-b7b7-b9455b3e07cf

Installed Product Current Status:
Product Name: Red Hat Enterprise Linux Server
Status:       Subscribed

Adding LINBIT Repos

If you purchased full LINBIT support, you can add their repos in order to get DRBD 9 and associated tools.

First, download their registration tool.

an-a04n01
cd /root
wget https://my.linbit.com/linbit-manage-node.py
--2016-11-19 10:22:21--  https://my.linbit.com/linbit-manage-node.py
Resolving my.linbit.com (my.linbit.com)... 212.69.166.235
Connecting to my.linbit.com (my.linbit.com)|212.69.166.235|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 26797 (26K) [application/x-python-script]
Saving to: ‘linbit-manage-node.py’

100%[========================================================================================>] 26,797      --.-K/s   in 0.1s    

2016-11-19 10:22:21 (175 KB/s) - ‘linbit-manage-node.py’ saved [26797/26797]
an-a04n02
cd /root
wget https://my.linbit.com/linbit-manage-node.py
--2016-11-19 10:26:52--  https://my.linbit.com/linbit-manage-node.py
Resolving my.linbit.com (my.linbit.com)... 212.69.166.235
Connecting to my.linbit.com (my.linbit.com)|212.69.166.235|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 26797 (26K) [application/x-python-script]
Saving to: ‘linbit-manage-node.py’

100%[========================================================================================>] 26,797      --.-K/s   in 0.1s    

2016-11-19 10:26:53 (182 KB/s) - ‘linbit-manage-node.py’ saved [26797/26797]

Make it executable.

an-a04n01
chmod 755 linbit-manage-node.py
ls -lah linbit-manage-node.py
-rwxr-xr-x. 1 root root 27K Oct 11 05:54 linbit-manage-node.py
an-a04n02
chmod 755 linbit-manage-node.py
-rwxr-xr-x. 1 root root 27K Oct 11 05:54 linbit-manage-node.py
Note: If you get the error: 'ERR: Could not detect MAC addresses of your node', then the version of 'linbit-manage-node.py' does not yet recognise bridges or slaved interfaces in bonds. For now, you can download a modified version from Alteeve instead.

Now run the tool interactively.

an-a04n01
/root/linbit-manage-node.py
linbit-manage-node.py (Version: 1.11)
Checking if version is up to date
[OK] Your version is up to date
Username:
an-a04n02
/root/linbit-manage-node.py
linbit-manage-node.py (Version: 1.11)
Checking if version is up to date
[OK] Your version is up to date
Username:

Enter the user name and password given to you by LINBIT when you registered with them.

an-a04n01
Username: xxxxxx
Credential (will not be echoed):
[OK] Login successful
The following contracts are available:
Will this node form a cluster with...

1) Contract: silver 2017-01-07 (ID: xxxx)

--> Please enter a number in range and press return:
an-a04n02
Username: xxxxxx
Credential (will not be echoed):
[OK] Login successful
The following contracts are available:
Will this node form a cluster with...

1) Contract: silver 2017-01-07 (ID: xxxx)

--> Please enter a number in range and press return:

If you have multiple contracts, select the number to the left of the contract identification. Otherwise, select '1'.

an-a04n01
--> Please enter a number in range and press return: 1
Writing registration data:
an-a04n02
--> Please enter a number in range and press return: 1
Writing registration data:

Confirm that you want to write out the license file. Once you accept, you will be presented with a menu of which repositories you want to use from LINBIT. We're only going to enable the 'drbd-9.0' repo and leave the pacemaker repos disabled as we'll pull them from Red Hat.

an-a04n01
--> Write to file (/var/lib/drbd-support/registration.json)? [y/N]
  Here are the repositories you can enable:

    1) pacemaker-1.1.15(Disabled)
    2) pacemaker-1.1.12(Disabled)
    3) pacemaker-1.1(Disabled)
    4) drbd-9.0(Disabled)
    5) drbd-8.4(Disabled)

  Enter the number of the repository you wish to enable/disable. Hit 0 when you are done.
  Enable/Disable: 4
  Here are the repositories you can enable:

    1) pacemaker-1.1.15(Disabled)
    2) pacemaker-1.1.12(Disabled)
    3) pacemaker-1.1(Disabled)
    4) drbd-9.0(Enabled)
    5) drbd-8.4(Disabled)

  Enter the number of the repository you wish to enable/disable. Hit 0 when you are done.
  Enable/Disable: 0
an-a04n02
--> Write to file (/var/lib/drbd-support/registration.json)? [y/N]
  Here are the repositories you can enable:

    1) pacemaker-1.1.15(Disabled)
    2) pacemaker-1.1.12(Disabled)
    3) pacemaker-1.1(Disabled)
    4) drbd-9.0(Disabled)
    5) drbd-8.4(Disabled)

  Enter the number of the repository you wish to enable/disable. Hit 0 when you are done.
  Enable/Disable: 4
  Here are the repositories you can enable:

    1) pacemaker-1.1.15(Disabled)
    2) pacemaker-1.1.12(Disabled)
    3) pacemaker-1.1(Disabled)
    4) drbd-9.0(Enabled)
    5) drbd-8.4(Disabled)

  Enter the number of the repository you wish to enable/disable. Hit 0 when you are done.
  Enable/Disable: 0
Warning: The repository will include a node-specific hash string in the 'baseurl'. Keep this private!

Once you select '0' to exit that menu, a summary of the repo will be displayed and you will be asked if you want to save it or not.

an-a04n01
Writing repository config:
Content:
[drbd-8.4]
name=LINBIT Packages for drbd-8.4 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/drbd-8.4/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1

[pacemaker-1.1]
name=LINBIT Packages for pacemaker-1.1 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1

[pacemaker-1.1.15]
name=LINBIT Packages for pacemaker-1.1.15 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1.15/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1

[pacemaker-1.1.12]
name=LINBIT Packages for pacemaker-1.1.12 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1.12/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1

[drbd-9.0]
name=LINBIT Packages for drbd-9.0 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/drbd-9.0/$basearch
enabled=1
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1
--> Write to file (/etc/yum.repos.d/linbit.repo)? [y/N] y
an-a04n02
Writing repository config:
Content:
[drbd-8.4]
name=LINBIT Packages for drbd-8.4 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/drbd-8.4/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1

[pacemaker-1.1]
name=LINBIT Packages for pacemaker-1.1 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1

[pacemaker-1.1.15]
name=LINBIT Packages for pacemaker-1.1.15 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1.15/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1

[pacemaker-1.1.12]
name=LINBIT Packages for pacemaker-1.1.12 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/pacemaker-1.1.12/$basearch
enabled=0
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1

[drbd-9.0]
name=LINBIT Packages for drbd-9.0 - $basearch
baseurl=http://packages.linbit.com/xxxxxx/yum/rhel7/drbd-9.0/$basearch
enabled=1
gpgkey=https://packages.linbit.com/package-signing-pubkey.asc
gpgcheck=1
--> Write to file (/etc/yum.repos.d/linbit.repo)? [y/N] y

When you accept, it will download the yum plugins and then ask you if you want to save their PGP key.

an-a04n01
[OK] Repository configuration written
Downloading LINBIT yum plugin
Downloading LINBIT yum plugin config
Final Notes:
--> Add linbit signing key to keyring now? [y/N] y
Now update your package information and install
LINBIT's kernel module and/or user space utilities
[OK] Congratulations! Your node was successfully configured.
an-a04n02
[OK] Repository configuration written
Downloading LINBIT yum plugin
Downloading LINBIT yum plugin config
Final Notes:
--> Add linbit signing key to keyring now? [y/N] y
Now update your package information and install
LINBIT's kernel module and/or user space utilities
[OK] Congratulations! Your node was successfully configured.

Done!

Install

Not all of these are required, but most are used at one point or another in this tutorial.

Note: The fence-agents-virsh package is not available in RHEL 7 beta. Further, it's only needed if you're building your Anvil! using VMs.
an-a04n01
yum install rsync pacemaker bridge-utils ntp corosync pcs wget gpm man vim screen mlocate syslinux bzip2 \
            openssh-clients fence-agents-all fence-agents-virsh policycoreutils-python drbd drbd-bash-completion \
            drbd-pacemaker drbd-udev drbd-utils drbdmanage
an-a04n02
<same>


Making ssh faster when the net is down

By default, the nodes will try to resolve the host name of an incoming ssh connection. When the internet connection is down, DNS lookups have to time out, which can make login times quite slow. When something goes wrong, seconds count and waiting for up to a minute for an SSH password prompt can be maddening.

For this reason, we will make two changes to /etc/ssh/sshd_config that disable this login delay.

Please be aware that this can reduce security. If this is a concern, skip this step.

an-a04n01
sed -i.anvil 's/#GSSAPIAuthentication no/GSSAPIAuthentication no/' /etc/ssh/sshd_config
sed -i 's/GSSAPIAuthentication yes/#GSSAPIAuthentication yes/' /etc/ssh/sshd_config
sed -i 's/#UseDNS yes/UseDNS no/' /etc/ssh/sshd_config
systemctl restart sshd.service
diff -u /etc/ssh/sshd_config.anvil /etc/ssh/sshd_config
--- /etc/ssh/sshd_config.anvil	2014-06-09 21:15:52.000000000 -0400
+++ /etc/ssh/sshd_config	2014-07-27 08:41:03.296760761 -0400
@@ -89,8 +89,8 @@
 #KerberosUseKuserok yes
 
 # GSSAPI options
-#GSSAPIAuthentication no
-GSSAPIAuthentication yes
+GSSAPIAuthentication no
+#GSSAPIAuthentication yes
 #GSSAPICleanupCredentials yes
 GSSAPICleanupCredentials yes
 #GSSAPIStrictAcceptorCheck yes
@@ -127,7 +127,7 @@
 #ClientAliveInterval 0
 #ClientAliveCountMax 3
 #ShowPatchLevel no
-#UseDNS yes
+UseDNS no
 #PidFile /var/run/sshd.pid
 #MaxStartups 10:30:100
 #PermitTunnel no
an-a04n02
same
same

Subsequent logins when the net is down should be quick.

Configuring the network

If you want to make any other changes, like configuring the interface to have a static IP, do so now. Once you're done editing;

nmcli connection reload
systemctl restart NetworkManager.service
ip addr show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
    link/ether 52:54:00:a7:9d:17 brd ff:ff:ff:ff:ff:ff
    inet 192.168.122.201/24 scope global eth0
       valid_lft forever preferred_lft forever
    inet6 fe80::5054:ff:fea7:9d17/64 scope link 
       valid_lft forever preferred_lft forever

The interface should now start on boot properly.

Setting the Hostname

Fedora 19 is very different from EL6.

Note: The '--pretty' line currently doesn't work as there is a bug (rhbz#895299) with single-quotes.
Note: The '--static' option is currently needed to prevent the '.' from being removed. See this bug (rhbz#896756).

Use a format that works for you. For the tutorial, node names are based on the following;

  • A two-letter prefix identifying the company/user (an, for "Alteeve's Niche!")
  • A sequential Anvil! ID number in the form of aXX (a01 for "Anvil! 01", a02 for Anvil! 02, etc)
  • A sequential node ID number in the form of nYY

In our case, this is my third Anvil! and we use the company prefix an, so these two nodes will be;

  • an-a04n01 - node 1
  • an-a04n02 - node 2
hostnamectl set-hostname an-a04n01.alteeve.ca --static
hostnamectl set-hostname --pretty "Alteeve's Niche! - Anvil! 03, Node 01"

If you want the new host name to take effect immediately, you can use the traditional hostname command:

hostname an-a04n01.alteeve.ca

The "pretty" host name is stored in /etc/machine-info as the unquoted value for the PRETTY_HOSTNAME value.

vim /etc/machine-info
PRETTY_HOSTNAME=Alteeves Niche! - Anvil! 03, Node 01

If you can't get the hostname command to work for some reason, you can reboot to have the system read the new values.

Network

Note: (Note for myself) - Consider using 'primary_reselect=1.

We want static, named network devices. Follow this;

Then, use these configuration files;

Build the bridge;

vim /etc/sysconfig/network-scripts/ifcfg-ifn_bridge1
# Internet-Facing Network - Bridge
DEVICE="ifn_bridge1"
TYPE="Bridge"
BOOTPROTO="none"
IPADDR="10.255.40.1"
NETMASK="255.255.0.0"
GATEWAY="10.255.255.254"
DNS1="8.8.8.8"
DNS2="8.8.4.4"
DEFROUTE="yes"

Now build the bonds;

vim /etc/sysconfig/network-scripts/ifcfg-ifn_bond1
# Internet-Facing Network - Bond
DEVICE="ifn_bond1"
BRIDGE="ifn_bridge1"
BOOTPROTO="none"
NM_CONTROLLED="no"
ONBOOT="yes"
BONDING_OPTS="mode=1 primary=ifn_link1 updelay=120000 downdelay=0 fail_over_mac=none miimon=100 primary_reselect=better resend_igmp=5"
vim /etc/sysconfig/network-scripts/ifcfg-sn_bond1
# Storage Network - Bond
DEVICE="sn_bond1"
BOOTPROTO="none"
NM_CONTROLLED="no"
ONBOOT="yes"
BONDING_OPTS="mode=1 primary=sn_link1 updelay=120000 downdelay=0 fail_over_mac=none miimon=100 primary_reselect=better resend_igmp=5"
IPADDR="10.10.40.1"
NETMASK="255.255.0.0"
vim /etc/sysconfig/network-scripts/ifcfg-bcn_bond1
# Back-Channel Network - Bond
DEVICE="bcn_bond1"
BOOTPROTO="none"
NM_CONTROLLED="no"
ONBOOT="yes"
BONDING_OPTS="mode=1 primary=bcn_link1 updelay=120000 downdelay=0 fail_over_mac=none miimon=100 primary_reselect=better resend_igmp=5"
IPADDR="10.20.40.1"
NETMASK="255.255.0.0"

Now tell the interfaces to be slaves to their bonds;

Internet-Facing Network;

vim /etc/sysconfig/network-scripts/ifcfg-ifn_link1
# Internet-Facing Network - Link 1
DEVICE="ifn_link1"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="ifn_bond1"
vim /etc/sysconfig/network-scripts/ifcfg-ifn_link2
# Internet-Facing Network - Link 2
DEVICE="ifn_link2"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="ifn_bond1"

Storage Network;

vim /etc/sysconfig/network-scripts/ifcfg-sn_link1
# Storage Network - Link 1
DEVICE="sn_link1"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="sn_bond1"
vim /etc/sysconfig/network-scripts/ifcfg-sn_link2
# Storage Network - Link 2
DEVICE="sn_link2"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="sn_bond1"

Back-Channel Network

vim /etc/sysconfig/network-scripts/ifcfg-bcn_link1
# Back-Channel Network - Link 1
DEVICE="bcn_link1"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="bcn_bond1"
vim /etc/sysconfig/network-scripts/ifcfg-bcn_link2
# Back-Channel Network - Link 2
DEVICE="bcn_link2"
NM_CONTROLLED="no"
BOOTPROTO="none"
ONBOOT="yes"
SLAVE="yes"
MASTER="bcn_bond1"

Now restart the network, confirm that the bonds and bridge are up and you are ready to proceed.

Setup The hosts File

You can use DNS if you prefer. For now, lets use /etc/hosts for node name resolution.

vim /etc/hosts
127.0.0.1	localhost localhost.localdomain localhost4 localhost4.localdomain4
::1		localhost localhost.localdomain localhost6 localhost6.localdomain6

# Anvil! 03, Node 01
10.255.40.1	an-a04n01.ifn
10.10.40.1	an-a04n01.sn
10.20.40.1	an-a04n01.bcn an-a04n01 an-a04n01.alteeve.ca
10.20.41.1	an-a04n01.ipmi

# Anvil! 03, Node 02
10.255.40.2	an-a04n02.ifn
10.10.40.2	an-a04n02.sn
10.20.40.2	an-a04n02.bcn an-a04n02 an-a04n02.alteeve.ca
10.20.41.2	an-a04n02.ipmi

# Foundation Pack
### Foundation Pack
# Network Switches
10.20.1.1	an-switch01 an-switch01.alteeve.ca
10.20.1.2	an-switch02 an-switch02.alteeve.ca	# Only accessible when out of the stack
 
# Switched PDUs
10.20.2.1	an-pdu01 an-pdu01.alteeve.ca
10.20.2.2	an-pdu02 an-pdu02.alteeve.ca
 
# Network-monitored UPSes
10.20.3.1	an-ups01 an-ups01.alteeve.ca
10.20.3.2	an-ups02 an-ups02.alteeve.ca
 
### Monitor Packs
10.20.4.1	an-striker01 an-striker01.alteeve.ca
10.255.4.1	an-striker01.ifn
10.20.4.2	an-striker02 an-striker02.alteeve.ca
10.255.4.2	an-striker02.ifn

Setup SSH

Same as before.

Populating And Pushing ~/.ssh/known_hosts

an-a04n01
ssh-keygen -t rsa -N "" -b 8191 -f ~/.ssh/id_rsa
Generating public/private rsa key pair.

Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
be:17:cc:23:8e:b1:b4:76:a1:e4:2a:91:cb:cd:d8:3a root@an-a04n01.alteeve.ca
The key's randomart image is:
+--[ RSA 8191]----+
|                 |
|                 |
|                 |
|                 |
|   .    So       |
|  o   +.o =      |
| . B + B.o o     |
|  E + B o..      |
|  .+.o ...       |
+-----------------+
an-a04n01
ssh-keygen -t rsa -N "" -b 8191 -f ~/.ssh/id_rsa
Generating public/private rsa key pair.
Created directory '/root/.ssh'.
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
71:b1:9d:31:9f:7a:c9:10:74:e0:4c:69:53:8f:e4:70 root@an-a04n02.alteeve.ca
The key's randomart image is:
+--[ RSA 8191]----+
|          ..O+E  |
|           B+% + |
|        . o.*.= .|
|         o   + . |
|        S   . +  |
|             .   |
|                 |
|                 |
|                 |
+-----------------+

Setup autorized_keys:

an-a04n01
cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys
ssh root@an-a04n02 "cat /root/.ssh/id_rsa.pub" >> ~/.ssh/authorized_keys 
rsync -av ~/.ssh/authorized_keys root@an-a04n02:/root/.ssh/
ssh-keyscan an-a04n01.alteeve.ca >> ~/.ssh/known_hosts
ssh-keyscan an-a04n01 >> ~/.ssh/known_hosts
ssh-keyscan an-a04n01.bcn >> ~/.ssh/known_hosts
ssh-keyscan an-a04n01.sn >> ~/.ssh/known_hosts
ssh-keyscan an-a04n01.ifn >> ~/.ssh/known_hosts
ssh-keyscan an-a04n02.alteeve.ca >> ~/.ssh/known_hosts
ssh-keyscan an-a04n02 >> ~/.ssh/known_hosts
ssh-keyscan an-a04n02.bcn >> ~/.ssh/known_hosts
ssh-keyscan an-a04n02.sn >> ~/.ssh/known_hosts
ssh-keyscan an-a04n02.ifn >> ~/.ssh/known_hosts
rsync -av ~/.ssh/known_hosts root@an-a04n02:/root/.ssh/
rsync -av /etc/hosts root@an-a04n02:/etc/
an-a04n01

Keeping Time in Sync

It's not as critical as it used to be to keep the clocks on the nodes in sync, but it's still a good idea.

ln -sf /usr/share/zoneinfo/America/Toronto /etc/localtime
systemctl start ntpd.service
systemctl enable ntpd.service

Configuring IPMI

F19 specifics based on the IPMI tutorial.

yum -y install ipmitools OpenIPMI
systemctl start ipmi.service
systemctl enable ipmi.service
ln -s '/usr/lib/systemd/system/ipmi.service' '/etc/systemd/system/multi-user.target.wants/ipmi.service'

Our servers use lan channel 2, yours might be 1 or something else. Experiment.

ipmitool lan print 2
Set in Progress         : Set Complete
Auth Type Support       : NONE MD5 PASSWORD 
Auth Type Enable        : Callback : NONE MD5 PASSWORD 
                        : User     : NONE MD5 PASSWORD 
                        : Operator : NONE MD5 PASSWORD 
                        : Admin    : NONE MD5 PASSWORD 
                        : OEM      : NONE MD5 PASSWORD 
IP Address Source       : BIOS Assigned Address
IP Address              : 10.20.41.1
Subnet Mask             : 255.255.0.0
MAC Address             : 00:19:99:9a:d8:e8
SNMP Community String   : public
IP Header               : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
Default Gateway IP      : 10.20.255.254
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites     : 0,1,2,3,6,7,8,17
Cipher Suite Priv Max   : OOOOOOOOXXXXXXX
                        :     X=Cipher Suite Unused
                        :     c=CALLBACK
                        :     u=USER
                        :     o=OPERATOR
                        :     a=ADMIN
                        :     O=OEM

I need to set the IPs to 10.20.41.1/16 and 10.20.41.2/16 for nodes 1 and 2, respectively. I also want to set the password to secret for the admin user.

Node 01 IP;

ipmitool lan set 2 ipsrc static
ipmitool lan set 2 ipaddr 10.20.41.1
ipmitool lan set 2 netmask 255.255.0.0
ipmitool lan set 2 defgw ipaddr 10.20.255.254
ipmitool lan print 2
Set in Progress         : Set Complete
Auth Type Support       : NONE MD5 PASSWORD 
Auth Type Enable        : Callback : NONE MD5 PASSWORD 
                        : User     : NONE MD5 PASSWORD 
                        : Operator : NONE MD5 PASSWORD 
                        : Admin    : NONE MD5 PASSWORD 
                        : OEM      : NONE MD5 PASSWORD 
IP Address Source       : Static Address
IP Address              : 10.20.41.1
Subnet Mask             : 255.255.0.0
MAC Address             : 00:19:99:9a:d8:e8
SNMP Community String   : public
IP Header               : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
Default Gateway IP      : 10.20.255.254
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites     : 0,1,2,3,6,7,8,17
Cipher Suite Priv Max   : OOOOOOOOXXXXXXX
                        :     X=Cipher Suite Unused
                        :     c=CALLBACK
                        :     u=USER
                        :     o=OPERATOR
                        :     a=ADMIN
                        :     O=OEM

Node 01 IP;

ipmitool lan set 2 ipsrc static
ipmitool lan set 2 ipaddr 10.20.41.2
ipmitool lan set 2 netmask 255.255.0.0
ipmitool lan set 2 defgw ipaddr 10.20.255.254
ipmitool lan print 2
Set in Progress         : Set Complete
Auth Type Support       : NONE MD5 PASSWORD 
Auth Type Enable        : Callback : NONE MD5 PASSWORD 
                        : User     : NONE MD5 PASSWORD 
                        : Operator : NONE MD5 PASSWORD 
                        : Admin    : NONE MD5 PASSWORD 
                        : OEM      : NONE MD5 PASSWORD 
IP Address Source       : Static Address
IP Address              : 10.20.41.2
Subnet Mask             : 255.255.0.0
MAC Address             : 00:19:99:9a:b1:78
SNMP Community String   : public
IP Header               : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
Default Gateway IP      : 10.20.255.254
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites     : 0,1,2,3,6,7,8,17
Cipher Suite Priv Max   : OOOOOOOOXXXXXXX
                        :     X=Cipher Suite Unused
                        :     c=CALLBACK
                        :     u=USER
                        :     o=OPERATOR
                        :     a=ADMIN
                        :     O=OEM

Set the password.

ipmitool user list 2
ID  Name	     Callin  Link Auth	IPMI Msg   Channel Priv Limit
1                    true    true       true       Unknown (0x00)
2   admin            true    true       true       OEM
Get User Access command failed (channel 2, user 3): Unknown (0x32)

(ignore the error, it's harmless... *BOOM*)

We want to set admin's password, so we do:

Note: The 2 below is the ID number, not the LAN channel.
ipmitool user set password 2 secret

Done!

Configuring the Anvil!

Now we're getting down to business!

For this section, we will be working on an-a04n01 and using ssh to perform tasks on an-a04n02.

Note: TODO: explain what this is and how it works.

Enable the pcs Daemon

Note: Most of this section comes more or less verbatim from the main Clusters from Scratch tutorial.

We will use pcs, the Pacemaker Configuration System, to configure our Anvil!.

Note that pcsd uses TCP port 2224.

systemctl start pcsd.service
systemctl enable pcsd.service
ln -s '/usr/lib/systemd/system/pcsd.service' '/etc/systemd/system/multi-user.target.wants/pcsd.service'

Now we need to set a password for the hacluster user. This is the account used by pcs on one node to talk to the pcs daemon on the other node. For this tutorial, we will use the password secret. You will want to use a stronger password, of course.

echo "super secret password" | passwd --stdin hacluster
Changing password for user hacluster.
passwd: all authentication tokens updated successfully.

Open up the firewall:

firewall-cmd --permanent --add-service=high-availability
firewall-cmd --reload

Initializing the Cluster

One of the biggest reasons we're using the pcs tool, over something like crm, is that it has been written to simplify the setup of clusters on Red Hat style operating systems. It will configure corosync automatically.

First, we need to know what hostname we will need to use for pcs.

Node 01:

hostname
an-a04n01.alteeve.ca

Node 02:

hostname
an-a04n02.alteeve.ca

Next, authenticate against the cluster nodes.

Both nodes:

pcs cluster auth an-a04n01.alteeve.ca an-a04n02.alteeve.ca -u hacluster

This will ask you for the user name and password. The default user name is hacluster and we set the password to secret.

Password: 
an-a04n01.alteeve.ca: 6e9f7e98-dfb7-4305-b8e0-d84bf4f93ce3
an-a04n01.alteeve.ca: Authorized
an-a04n02.alteeve.ca: ffee6a85-ddac-4d03-9b97-f136d532b478
an-a04n02.alteeve.ca: Authorized

Do this on one node only:

Now to initialize the cluster's communication and membership layer.

pcs cluster setup --name an-anvil-03 an-a04n01.alteeve.ca an-a04n02.alteeve.ca
an-a04n01.alteeve.ca: Succeeded
an-a04n02.alteeve.ca: Succeeded

This will create the corosync configuration file /etc/corosync/corosync.conf;

cat /etc/corosync/corosync.conf
totem {
version: 2
secauth: off
cluster_name: an-anvil-03
transport: udpu
}

nodelist {
  node {
        ring0_addr: an-a04n01.alteeve.ca
        nodeid: 1
       }
  node {
        ring0_addr: an-a04n02.alteeve.ca
        nodeid: 2
       }
}

quorum {
provider: corosync_votequorum
two_node: 1
}

logging {
to_syslog: yes
}

Start the Cluster For the First Time

This starts the cluster communication and membership layer for the first time.

On one node only;

pcs cluster start --all
an-a04n01.alteeve.ca: Starting Cluster...
an-a04n02.alteeve.ca: Starting Cluster...

After a few moments, you should be able to check the status;

pcs status
Cluster name: an-anvil-04
WARNING: no stonith devices and stonith-enabled is not false
Last updated: Mon Jun 24 23:28:29 2013
Last change: Mon Jun 24 23:28:10 2013 via crmd on an-a04n01.alteeve.ca
Current DC: NONE
2 Nodes configured, unknown expected votes
0 Resources configured.


Node an-a04n01.alteeve.ca (1): UNCLEAN (offline)
Node an-a04n02.alteeve.ca (2): UNCLEAN (offline)

Full list of resources:

The other node should show almost the identical output.

Disabling Quorum

Note: Show the math.

With quorum enabled, a two node cluster will lose quorum once either node fails. So we have to disable quorum.

By default, pacemaker uses quorum. You don't see this initially though;

pcs property
Cluster Properties:
 dc-version: 1.1.9-0.1318.a7966fb.git.fc18-a7966fb
 cluster-infrastructure: corosync

To disable it, we set no-quorum-policy=ignore.

pcs property set no-quorum-policy=ignore
pcs property
Cluster Properties:
 dc-version: 1.1.9-0.1318.a7966fb.git.fc18-a7966fb
 cluster-infrastructure: corosync
 no-quorum-policy: ignore

Enabling and Configuring Fencing

We will use IPMI and PDU based fence devices for redundancy.

You can see the list of available fence agents here. You will need to find the one for your hardware fence devices.

pcs stonith list
fence_alom - Fence agent for Sun ALOM
fence_apc - Fence agent for APC over telnet/ssh
fence_apc_snmp - Fence agent for APC over SNMP
fence_baytech - I/O Fencing agent for Baytech RPC switches in combination with a Cyclades Terminal
                Server
fence_bladecenter - Fence agent for IBM BladeCenter
fence_brocade - Fence agent for Brocade over telnet
fence_bullpap - I/O Fencing agent for Bull FAME architecture controlled by a PAP management console.
fence_cisco_mds - Fence agent for Cisco MDS
fence_cisco_ucs - Fence agent for Cisco UCS
fence_cpint - I/O Fencing agent for GFS on s390 and zSeries VM clusters
fence_drac - fencing agent for Dell Remote Access Card
fence_drac5 - Fence agent for Dell DRAC CMC/5
fence_eaton_snmp - Fence agent for Eaton over SNMP
fence_egenera - I/O Fencing agent for the Egenera BladeFrame
fence_eps - Fence agent for ePowerSwitch
fence_hpblade - Fence agent for HP BladeSystem
fence_ibmblade - Fence agent for IBM BladeCenter over SNMP
fence_idrac - Fence agent for IPMI over LAN
fence_ifmib - Fence agent for IF MIB
fence_ilo - Fence agent for HP iLO
fence_ilo2 - Fence agent for HP iLO
fence_ilo3 - Fence agent for IPMI over LAN
fence_ilo_mp - Fence agent for HP iLO MP
fence_imm - Fence agent for IPMI over LAN
fence_intelmodular - Fence agent for Intel Modular
fence_ipdu - Fence agent for iPDU over SNMP
fence_ipmilan - Fence agent for IPMI over LAN
fence_kdump - Fence agent for use with kdump
fence_ldom - Fence agent for Sun LDOM
fence_lpar - Fence agent for IBM LPAR
fence_mcdata - I/O Fencing agent for McData FC switches
fence_rackswitch - fence_rackswitch - I/O Fencing agent for RackSaver RackSwitch
fence_rhevm - Fence agent for RHEV-M REST API
fence_rsa - Fence agent for IBM RSA
fence_rsb - I/O Fencing agent for Fujitsu-Siemens RSB
fence_sanbox2 - Fence agent for QLogic SANBox2 FC switches
fence_scsi - fence agent for SCSI-3 persistent reservations
fence_virsh - Fence agent for virsh
fence_vixel - I/O Fencing agent for Vixel FC switches
fence_vmware - Fence agent for VMWare
fence_vmware_soap - Fence agent for VMWare over SOAP API
fence_wti - Fence agent for WTI
fence_xcat - I/O Fencing agent for xcat environments
fence_xenapi - XenAPI based fencing for the Citrix XenServer virtual machines.
fence_zvm - I/O Fencing agent for GFS on s390 and zSeries VM clusters

We will use fence_ipmilan and fence_apc_snmp.

Configuring IPMI Fencing

Every fence agent has a possibly unique subset of options that can be used. You can see a brief description of these options with the pcs stonith describe fence_X command. Let's look at the options available for fence_ipmilan.

pcs stonith describe fence_ipmilan
Stonith options for: fence_ipmilan
  auth: IPMI Lan Auth type (md5, password, or none)
  ipaddr: IPMI Lan IP to talk to
  passwd: Password (if required) to control power on IPMI device
  passwd_script: Script to retrieve password (if required)
  lanplus: Use Lanplus
  login: Username/Login (if required) to control power on IPMI device
  action: Operation to perform. Valid operations: on, off, reboot, status, list, diag, monitor or metadata
  timeout: Timeout (sec) for IPMI operation
  cipher: Ciphersuite to use (same as ipmitool -C parameter)
  method: Method to fence (onoff or cycle)
  power_wait: Wait X seconds after on/off operation
  delay: Wait X seconds before fencing is started
  privlvl: Privilege level on IPMI device
  verbose: Verbose mode

One of the nice things about pcs is that it allows us to create a test file to prepare all our changes in. Then, when we're happy with the changes, merge them into the running cluster. So let's make a copy called stonith_cfg

pcs cluster cib stonith_cfg

Now add IPMI fencing.

#                  unique name    fence agent   target node                           device addr             options
pcs stonith create fence_n01_ipmi fence_ipmilan pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="an-a04n01.ipmi" action="reboot" login="admin" passwd="secret" delay=15 op monitor interval=60s
pcs stonith create fence_n02_ipmi fence_ipmilan pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="an-a04n02.ipmi" action="reboot" login="admin" passwd="secret" op monitor interval=60s

Note that fence_n01_ipmi has a delay=15 set but fence_n02_ipmi does not. If the network connection breaks between the two nodes, they will both try to fence each other at the same time. If acpid is running, the slower node will not die right away. It will continue to run for up to four more seconds, ample time for it to also initiate a fence against the faster node. The end result is that both nodes get fenced. The ten-second delay protects against this by causing an-a04n02 to pause for 10 seconds before initiating a fence against an-a04n01. If both nodes are alive, an-a04n02 will power off before the 10 seconds pass, so it will never fence an-a04n01. However, if an-a04n01 really is dead, after the ten seconds have elapsed, fencing will proceed as normal.

Note: At the time of writing, pcmk_reboot_action is needed to override pacemaker's global fence action and pcmk_reboot_action is not recognized by pcs. Both of these issues will be resolved shortly; Pacemaker will honour action="..." in v1.1.10 and pcs will recognize pcmk_* special attributes "real soon now". Until then, the --force switch is needed.

Next, add the PDU fencing. This requires distinct "off" and "on" actions for each outlet on each PDU. With two nodes, each with two PSUs, this translates to eight commands. The "off" commands will be monitored to alert us if the PDU fails for some reason. There is no reason to monitor the "on" actions (it would be redundant). Note also that we don't bother using a "delay". The IPMI fence method will go first, before the PDU actions, so the PDU is already delayed.

# Node 1 - off
pcs stonith create fence_n01_pdu1_off fence_apc_snmp pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="an-pdu01" action="off" port="1" op monitor interval="60s"
pcs stonith create fence_n01_pdu2_off fence_apc_snmp pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="an-pdu02" action="off" port="1" power_wait="5" op monitor interval="60s"

# Node 1 - on
pcs stonith create fence_n01_pdu1_on fence_apc_snmp pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="an-pdu01" action="on" port="1"
pcs stonith create fence_n01_pdu2_on fence_apc_snmp pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="an-pdu02" action="on" port="1"

# Node 2 - off
pcs stonith create fence_n02_pdu1_off fence_apc_snmp pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="an-pdu01" action="off" port="2" op monitor interval="60s"
pcs stonith create fence_n02_pdu2_off fence_apc_snmp pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="an-pdu02" action="off" port="2" power_wait="5" op monitor interval="60s"

# Node 2 - on
pcs stonith create fence_n02_pdu1_on fence_apc_snmp pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="an-pdu01" action="on" port="2"
pcs stonith create fence_n02_pdu2_on fence_apc_snmp pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="an-pdu02" action="on" port="2"

We can check the new configuration now;

pcs status
Cluster name: an-anvil-04
Last updated: Tue Jul  2 16:41:55 2013
Last change: Tue Jul  2 16:41:44 2013 via cibadmin on an-a04n01.alteeve.ca
Stack: corosync
Current DC: an-a04n01.alteeve.ca (1) - partition with quorum
Version: 1.1.9-3.fc19-781a388
2 Nodes configured, unknown expected votes
10 Resources configured.


Online: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]

Full list of resources:

 fence_n01_ipmi	(stonith:fence_ipmilan):	Started an-a04n01.alteeve.ca 
 fence_n02_ipmi	(stonith:fence_ipmilan):	Started an-a04n02.alteeve.ca 
 fence_n01_pdu1_off	(stonith:fence_apc_snmp):	Started an-a04n01.alteeve.ca 
 fence_n01_pdu2_off	(stonith:fence_apc_snmp):	Started an-a04n02.alteeve.ca 
 fence_n02_pdu1_off	(stonith:fence_apc_snmp):	Started an-a04n01.alteeve.ca 
 fence_n02_pdu2_off	(stonith:fence_apc_snmp):	Started an-a04n02.alteeve.ca 
 fence_n01_pdu1_on	(stonith:fence_apc_snmp):	Started an-a04n01.alteeve.ca 
 fence_n01_pdu2_on	(stonith:fence_apc_snmp):	Started an-a04n02.alteeve.ca 
 fence_n02_pdu1_on	(stonith:fence_apc_snmp):	Started an-a04n01.alteeve.ca 
 fence_n02_pdu2_on	(stonith:fence_apc_snmp):	Started an-a04n02.alteeve.ca

Before we proceed, we need to tell pacemaker to use fencing;

pcs property set stonith-enabled=true
pcs property
Cluster Properties:
Cluster Properties:
 cluster-infrastructure: corosync
 dc-version: 1.1.9-3.fc19-781a388
 no-quorum-policy: ignore
 stonith-enabled: true

Excellent!

Configuring Fence Levels

The goal of fence levels is to tell pacemaker that there are "fence methods" to try and to impose an order on those methods. Each method composes one or more fence primitives and, when 2 or more primitives are tied together, that all primitives must succeed for the overall method to succeed.

So in our case; the order we want is;

  • IPMI -> PDUs

The reason is that when IPMI fencing succeeds, we can be very certain the node is truly fenced. When PDU fencing succeeds, it only confirms that the power outlets were cycled. If someone moved a node's power cables to another outlet, we'll get a false positive. On that topic, tie-down the node's PSU cables to the PDU's cable tray when possible, clearly label the power cables and wrap the fingers of anyone who might move them around.

The PDU fencing needs to be implemented using four steps;

  • PDU 1, outlet X -> off
  • PDU 2, outlet X -> off
    • The power_wait="5" setting for the fence_n0X_pdu2_off primitives will cause a 5 second delay here, giving ample time to ensure the nodes lose power
  • PDU 1, outlet X -> on
  • PDU 2, outlet X -> on

This is to ensure that both outlets are off at the same time, ensuring that the node loses power. This works because fencing_topology acts serially.

Putting all this together, we issue this command;

pcs stonith level add 1 an-a04n01.alteeve.ca fence_n01_ipmi
pcs stonith level add 1 an-a04n02.alteeve.ca fence_n02_ipmi

The 1 tells pacemaker that this is our highest priority fence method. We can see that this was set using pcs;

pcs stonith level
 Node: an-a04n01.alteeve.ca
  Level 1 - fence_n01_ipmi
 Node: an-a04n02.alteeve.ca
  Level 1 - fence_n02_ipmi

Now we'll tell pacemaker to use the PDUs as the second fence method. Here we tie together the two off calls and the two on calls into a single method.

pcs stonith level add 2 an-a04n01.alteeve.ca fence_n01_pdu1_off,fence_n01_pdu2_off,fence_n01_pdu1_on,fence_n01_pdu2_on
pcs stonith level add 2 an-a04n02.alteeve.ca fence_n02_pdu1_off,fence_n02_pdu2_off,fence_n02_pdu1_on,fence_n02_pdu2_on

Check again and we'll see that the new methods were added.

pcs stonith level
 Node: an-a04n01.alteeve.ca
  Level 1 - fence_n01_ipmi
  Level 2 - fence_n01_pdu1_off,fence_n01_pdu2_off,fence_n01_pdu1_on,fence_n01_pdu2_on
 Node: an-a04n02.alteeve.ca
  Level 1 - fence_n02_ipmi
  Level 2 - fence_n02_pdu1_off,fence_n02_pdu2_off,fence_n02_pdu1_on,fence_n02_pdu2_on

For those of us who are XML fans, this is what the cib looks like now:

cat /var/lib/pacemaker/cib/cib.xml
<cib epoch="18" num_updates="0" admin_epoch="0" validate-with="pacemaker-1.2" cib-last-written="Thu Jul 18 13:15:53 2013" update-origin="an-a04n01.alteeve.ca" update-client="cibadmin" crm_feature_set="3.0.7" have-quorum="1" dc-uuid="1">
  <configuration>
    <crm_config>
      <cluster_property_set id="cib-bootstrap-options">
        <nvpair id="cib-bootstrap-options-dc-version" name="dc-version" value="1.1.9-dde1c52"/>
        <nvpair id="cib-bootstrap-options-cluster-infrastructure" name="cluster-infrastructure" value="corosync"/>
        <nvpair id="cib-bootstrap-options-no-quorum-policy" name="no-quorum-policy" value="ignore"/>
      </cluster_property_set>
    </crm_config>
    <nodes>
      <node id="1" uname="an-a04n01.alteeve.ca"/>
      <node id="2" uname="an-a04n02.alteeve.ca"/>
    </nodes>
    <resources>
      <primitive class="stonith" id="fence_n01_ipmi" type="fence_ipmilan">
        <instance_attributes id="fence_n01_ipmi-instance_attributes">
          <nvpair id="fence_n01_ipmi-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n01.alteeve.ca"/>
          <nvpair id="fence_n01_ipmi-instance_attributes-ipaddr" name="ipaddr" value="an-a04n01.ipmi"/>
          <nvpair id="fence_n01_ipmi-instance_attributes-action" name="action" value="reboot"/>
          <nvpair id="fence_n01_ipmi-instance_attributes-login" name="login" value="admin"/>
          <nvpair id="fence_n01_ipmi-instance_attributes-passwd" name="passwd" value="secret"/>
          <nvpair id="fence_n01_ipmi-instance_attributes-delay" name="delay" value="15"/>
        </instance_attributes>
        <operations>
          <op id="fence_n01_ipmi-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
      <primitive class="stonith" id="fence_n02_ipmi" type="fence_ipmilan">
        <instance_attributes id="fence_n02_ipmi-instance_attributes">
          <nvpair id="fence_n02_ipmi-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n02.alteeve.ca"/>
          <nvpair id="fence_n02_ipmi-instance_attributes-ipaddr" name="ipaddr" value="an-a04n02.ipmi"/>
          <nvpair id="fence_n02_ipmi-instance_attributes-action" name="action" value="reboot"/>
          <nvpair id="fence_n02_ipmi-instance_attributes-login" name="login" value="admin"/>
          <nvpair id="fence_n02_ipmi-instance_attributes-passwd" name="passwd" value="secret"/>
        </instance_attributes>
        <operations>
          <op id="fence_n02_ipmi-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
      <primitive class="stonith" id="fence_n01_pdu1_off" type="fence_apc_snmp">
        <instance_attributes id="fence_n01_pdu1_off-instance_attributes">
          <nvpair id="fence_n01_pdu1_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n01.alteeve.ca"/>
          <nvpair id="fence_n01_pdu1_off-instance_attributes-ipaddr" name="ipaddr" value="an-pdu01"/>
          <nvpair id="fence_n01_pdu1_off-instance_attributes-action" name="action" value="off"/>
          <nvpair id="fence_n01_pdu1_off-instance_attributes-port" name="port" value="1"/>
        </instance_attributes>
        <operations>
          <op id="fence_n01_pdu1_off-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
      <primitive class="stonith" id="fence_n01_pdu2_off" type="fence_apc_snmp">
        <instance_attributes id="fence_n01_pdu2_off-instance_attributes">
          <nvpair id="fence_n01_pdu2_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n01.alteeve.ca"/>
          <nvpair id="fence_n01_pdu2_off-instance_attributes-ipaddr" name="ipaddr" value="an-pdu02"/>
          <nvpair id="fence_n01_pdu2_off-instance_attributes-action" name="action" value="off"/>
          <nvpair id="fence_n01_pdu2_off-instance_attributes-port" name="port" value="1"/>
          <nvpair id="fence_n01_pdu2_off-instance_attributes-power_wait" name="power_wait" value="5"/>
        </instance_attributes>
        <operations>
          <op id="fence_n01_pdu2_off-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
      <primitive class="stonith" id="fence_n01_pdu1_on" type="fence_apc_snmp">
        <instance_attributes id="fence_n01_pdu1_on-instance_attributes">
          <nvpair id="fence_n01_pdu1_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n01.alteeve.ca"/>
          <nvpair id="fence_n01_pdu1_on-instance_attributes-ipaddr" name="ipaddr" value="an-pdu01"/>
          <nvpair id="fence_n01_pdu1_on-instance_attributes-action" name="action" value="on"/>
          <nvpair id="fence_n01_pdu1_on-instance_attributes-port" name="port" value="1"/>
        </instance_attributes>
        <operations>
          <op id="fence_n01_pdu1_on-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
      <primitive class="stonith" id="fence_n01_pdu2_on" type="fence_apc_snmp">
        <instance_attributes id="fence_n01_pdu2_on-instance_attributes">
          <nvpair id="fence_n01_pdu2_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n01.alteeve.ca"/>
          <nvpair id="fence_n01_pdu2_on-instance_attributes-ipaddr" name="ipaddr" value="an-pdu02"/>
          <nvpair id="fence_n01_pdu2_on-instance_attributes-action" name="action" value="on"/>
          <nvpair id="fence_n01_pdu2_on-instance_attributes-port" name="port" value="1"/>
        </instance_attributes>
        <operations>
          <op id="fence_n01_pdu2_on-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
      <primitive class="stonith" id="fence_n02_pdu1_off" type="fence_apc_snmp">
        <instance_attributes id="fence_n02_pdu1_off-instance_attributes">
          <nvpair id="fence_n02_pdu1_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n02.alteeve.ca"/>
          <nvpair id="fence_n02_pdu1_off-instance_attributes-ipaddr" name="ipaddr" value="an-pdu01"/>
          <nvpair id="fence_n02_pdu1_off-instance_attributes-action" name="action" value="off"/>
          <nvpair id="fence_n02_pdu1_off-instance_attributes-port" name="port" value="2"/>
        </instance_attributes>
        <operations>
          <op id="fence_n02_pdu1_off-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
      <primitive class="stonith" id="fence_n02_pdu2_off" type="fence_apc_snmp">
        <instance_attributes id="fence_n02_pdu2_off-instance_attributes">
          <nvpair id="fence_n02_pdu2_off-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n02.alteeve.ca"/>
          <nvpair id="fence_n02_pdu2_off-instance_attributes-ipaddr" name="ipaddr" value="an-pdu02"/>
          <nvpair id="fence_n02_pdu2_off-instance_attributes-action" name="action" value="off"/>
          <nvpair id="fence_n02_pdu2_off-instance_attributes-port" name="port" value="2"/>
          <nvpair id="fence_n02_pdu2_off-instance_attributes-power_wait" name="power_wait" value="5"/>
        </instance_attributes>
        <operations>
          <op id="fence_n02_pdu2_off-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
      <primitive class="stonith" id="fence_n02_pdu1_on" type="fence_apc_snmp">
        <instance_attributes id="fence_n02_pdu1_on-instance_attributes">
          <nvpair id="fence_n02_pdu1_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n02.alteeve.ca"/>
          <nvpair id="fence_n02_pdu1_on-instance_attributes-ipaddr" name="ipaddr" value="an-pdu01"/>
          <nvpair id="fence_n02_pdu1_on-instance_attributes-action" name="action" value="on"/>
          <nvpair id="fence_n02_pdu1_on-instance_attributes-port" name="port" value="2"/>
        </instance_attributes>
        <operations>
          <op id="fence_n02_pdu1_on-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
      <primitive class="stonith" id="fence_n02_pdu2_on" type="fence_apc_snmp">
        <instance_attributes id="fence_n02_pdu2_on-instance_attributes">
          <nvpair id="fence_n02_pdu2_on-instance_attributes-pcmk_host_list" name="pcmk_host_list" value="an-a04n02.alteeve.ca"/>
          <nvpair id="fence_n02_pdu2_on-instance_attributes-ipaddr" name="ipaddr" value="an-pdu02"/>
          <nvpair id="fence_n02_pdu2_on-instance_attributes-action" name="action" value="on"/>
          <nvpair id="fence_n02_pdu2_on-instance_attributes-port" name="port" value="2"/>
        </instance_attributes>
        <operations>
          <op id="fence_n02_pdu2_on-monitor-interval-60s" interval="60s" name="monitor"/>
        </operations>
      </primitive>
    </resources>
    <constraints/>
    <fencing-topology>
      <fencing-level devices="fence_n01_ipmi" id="fl-an-a04n01.alteeve.ca-1" index="1" target="an-a04n01.alteeve.ca"/>
      <fencing-level devices="fence_n02_ipmi" id="fl-an-a04n02.alteeve.ca-1" index="1" target="an-a04n02.alteeve.ca"/>
      <fencing-level devices="fence_n01_pdu1_off,fence_n01_pdu2_off,fence_n01_pdu1_on,fence_n01_pdu2_on" id="fl-an-a04n01.alteeve.ca-2" index="2" target="an-a04n01.alteeve.ca"/>
      <fencing-level devices="fence_n02_pdu1_off,fence_n02_pdu2_off,fence_n02_pdu1_on,fence_n02_pdu2_on" id="fl-an-a04n02.alteeve.ca-2" index="2" target="an-a04n02.alteeve.ca"/>
    </fencing-topology>
  </configuration>
</cib>

Fencing using fence_virsh

Note: To write this section, I used two virtual machines called pcmk1 and pcmk2.

If you are trying to learn fencing using KVM or Xen virtual machines, you can use the fence_virsh. You can also use fence_virtd, which is actually recommended by many, but I have found it to be rather unreliable.

To use fence_virsh, first install it.

yum -y install fence-agents-virsh
<lots of yum output>

Now test it from the command line. To do this, we need to know a few things;

  • The VM host is at IP 192.168.122.1
  • The username and password (-l and -p respectively) are the credentials used to log into VM host over SSH.
    • If you don't want your password to be shown, create a little shell script that simply prints your password and then use -S /path/to/script instead of -p "secret".
  • The name of the target VM, as shown by virsh list --all on the host, is the node (-n) value. For me, the nodes are called an-a04n01 and an-a04n02.

Create the Password Script

In my case, the host is called 'lemass', so I want to create a password script called '/root/lemass.pw'. The name of the script is entirely up to you.

an-a04n01
vim /root/lemass.pw
echo "my secret password"
chmod 755 /root/lemass.pw
/root/lemass.pw
my secret password
rsync -av /root/lemass.pw root@an-a04n02:/root/
sending incremental file list
lemass.pw

sent 102 bytes  received 31 bytes  266.00 bytes/sec
total size is 25  speedup is 0.19
an-a04n02
/root/lemass.pw
my secret password

Done.

Test fence_virsh Status from the Command Line

an-a04n01
fence_virsh -a 192.168.122.1 -l root -S /root/lemass.pw -n an-a04n02 -o status
Status: ON
an-a04n02
fence_virsh -a 192.168.122.1 -l root -S /root/lemass.pw -n an-a04n01 -o status
Status: ON

Excellent! Now to configure it in pacemaker;

an-a04n01
pcs stonith create fence_n01_virsh fence_virsh pcmk_host_list="an-a04n01.alteeve.ca" ipaddr="192.168.122.1" action="reboot" login="root" passwd_script="/root/lemass.pw" port="an-a04n01" delay=15 op monitor interval=60s
pcs stonith create fence_n02_virsh fence_virsh pcmk_host_list="an-a04n02.alteeve.ca" ipaddr="192.168.122.1" action="reboot" login="root" passwd_script="/root/lemass.pw" port="an-a04n02" op monitor interval=60s
pcs cluster status
Cluster Status:
 Last updated: Sun Jan 26 15:45:31 2014
 Last change: Sun Jan 26 15:06:14 2014 via crmd on an-a04n01.alteeve.ca
 Stack: corosync
 Current DC: an-a04n02.alteeve.ca (2) - partition with quorum
 Version: 1.1.10-19.el7-368c726
 2 Nodes configured
 2 Resources configured

PCSD Status:
an-a04n01.alteeve.ca: 
  an-a04n01.alteeve.ca: Online
an-a04n02.alteeve.ca: 
  an-a04n02.alteeve.ca: Online

Test Fencing

ToDo: Kill each node with echo c > /proc/sysrq-trigger and make sure the other node fences it.

Shared Storage

DRBD

We will use DRBD 8.4.

Install DRBD 8.4.4 from AN!

Warning: this doesn't work.

ToDo: Make a proper repo

an-a04n01
rpm -Uvh https://alteeve.ca/files/AN-Cluster_Tutorial_3/drbd84/drbd-8.4.4-4.el7.x86_64.rpm \
         https://alteeve.ca/files/AN-Cluster_Tutorial_3/drbd84/drbd-bash-completion-8.4.4-4.el7.x86_64.rpm \
         https://alteeve.ca/files/AN-Cluster_Tutorial_3/drbd84/drbd-pacemaker-8.4.4-4.el7.x86_64.rpm \
         https://alteeve.ca/files/AN-Cluster_Tutorial_3/drbd84/drbd-udev-8.4.4-4.el7.x86_64.rpm \
         https://alteeve.ca/files/AN-Cluster_Tutorial_3/drbd84/drbd-utils-8.4.4-4.el7.x86_64.rpm \
         https://alteeve.ca/files/AN-Cluster_Tutorial_3/drbd84/drbd-heartbeat-8.4.4-4.el7.x86_64.rpm \
         https://alteeve.ca/files/AN-Cluster_Tutorial_3/drbd84/drbd-xen-8.4.4-4.el7.x86_64.rpm
an-a04n02


Install DRBD 8.4.4 From Source

At this time, no EPEL repo exists for RHEL7, and the Fedora RPMs don't work, so we will install DRBD 8.4.4 from source.

Install dependencies:

yum -y install gcc flex rpm-build wget kernel-devel
wget -c http://oss.linbit.com/drbd/8.4/drbd-8.4.4.tar.gz
tar -xvzf drbd-8.4.4.tar.gz 
cd drbd-8.4.4
./configure \
  --prefix=/usr \
  --localstatedir=/var \
  --sysconfdir=/etc \
  --with-km \
  --with-udev \
  --with-pacemaker \
  --with-bashcompletion \
  --with-utils \
  --without-xen \
  --without-rgmanager \
  --without-heartbeat
make
make install

Don't let DRBD start on boot (pacemaker will handle it for us).

systemctl disable drbd.service
drbd.service is not a native service, redirecting to /sbin/chkconfig.
Executing /sbin/chkconfig drbd off

Done.

Optional; Make RPMs

Warning: I've not been able to get the RPMs genreated here to install yet. I'd recommend skipping this, unless you want to help sort out the problems. :)

After ./configure above, you can make RPMs instead of installing directly.

Dependencies:

yum install rpmdevtools redhat-rpm-config kernel-devel
<install text>

Setup RPM dev tree:

cd ~
rpmdev-setuptree
ls -lah ~/rpmbuild/
wget -c http://oss.linbit.com/drbd/8.4/drbd-8.4.4.tar.gz
tar -xvzf drbd-8.4.4.tar.gz
cd drbd-8.4.4
./configure \
  --prefix=/usr \
  --localstatedir=/var \
  --sysconfdir=/etc \
  --with-km \
  --with-udev \
  --with-pacemaker \
  --with-bashcompletion \
  --with-utils \
  --without-xen \
  --without-heartbeat
total 4.0K
drwxr-xr-x. 7 root root   67 Dec 23 20:06 .
dr-xr-x---. 6 root root 4.0K Dec 23 20:06 ..
drwxr-xr-x. 2 root root    6 Dec 23 20:06 BUILD
drwxr-xr-x. 2 root root    6 Dec 23 20:06 RPMS
drwxr-xr-x. 2 root root    6 Dec 23 20:06 SOURCES
drwxr-xr-x. 2 root root    6 Dec 23 20:06 SPECS
drwxr-xr-x. 2 root root    6 Dec 23 20:06 SRPMS

Userland tools:

make rpm
checking for presence of 8\.4\.4 in various changelog files
<snip>
+ exit 0
You have now:
/root/rpmbuild/RPMS/x86_64/drbd-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-utils-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-xen-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-udev-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-pacemaker-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-heartbeat-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-bash-completion-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-debuginfo-8.4.4-4.el7.x86_64.rpm

Kernel module:

make kmp-rpm
checking for presence of 8\.4\.4 in various changelog files
<snip>
+ exit 0
You have now:
/root/rpmbuild/RPMS/x86_64/drbd-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-utils-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-xen-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-udev-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-pacemaker-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-heartbeat-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-bash-completion-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-debuginfo-8.4.4-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/kmod-drbd-8.4.4_3.10.0_54.0.1-4.el7.x86_64.rpm
/root/rpmbuild/RPMS/x86_64/drbd-kernel-debuginfo-8.4.4-4.el7.x86_64.rpm

Configure DRBD

Configure global-common.conf;

vim /etc/drbd.d/global_common.conf
# These are options to set for the DRBD daemon sets the default values for
# resources.
global {
	# This tells DRBD that you allow it to report this installation to 
	# LINBIT for statistical purposes. If you have privacy concerns, set
	# this to 'no'. The default is 'ask' which will prompt you each time
	# DRBD is updated. Set to 'yes' to allow it without being prompted.
	usage-count no;

	# minor-count dialog-refresh disable-ip-verification
}

common {
	handlers {
		pri-on-incon-degr "/usr/lib/drbd/notify-pri-on-incon-degr.sh; /usr/lib/drbd/notify-emergency-reboot.sh; echo b > /proc/sysrq-trigger ; reboot -f";
		pri-lost-after-sb "/usr/lib/drbd/notify-pri-lost-after-sb.sh; /usr/lib/drbd/notify-emergency-reboot.sh; echo b > /proc/sysrq-trigger ; reboot -f";
		local-io-error "/usr/lib/drbd/notify-io-error.sh; /usr/lib/drbd/notify-emergency-shutdown.sh; echo o > /proc/sysrq-trigger ; halt -f";
		# split-brain "/usr/lib/drbd/notify-split-brain.sh root";
		# out-of-sync "/usr/lib/drbd/notify-out-of-sync.sh root";
		# before-resync-target "/usr/lib/drbd/snapshot-resync-target-lvm.sh -p 15 -- -c 16k";
		# after-resync-target /usr/lib/drbd/unsnapshot-resync-target-lvm.sh;
		
		# Hook into Pacemaker's fencing.
		fence-peer "/usr/lib/drbd/crm-fence-peer.sh";
	}

	startup {
		# wfc-timeout degr-wfc-timeout outdated-wfc-timeout wait-after-sb
	}

	options {
		# cpu-mask on-no-data-accessible
	}

	disk {
		# size max-bio-bvecs on-io-error fencing disk-barrier disk-flushes
		# disk-drain md-flushes resync-rate resync-after al-extents
                # c-plan-ahead c-delay-target c-fill-target c-max-rate
                # c-min-rate disk-timeout
                fencing resource-and-stonith;
	}

	net {
		# protocol timeout max-epoch-size max-buffers unplug-watermark
		# connect-int ping-int sndbuf-size rcvbuf-size ko-count
		# allow-two-primaries cram-hmac-alg shared-secret after-sb-0pri
		# after-sb-1pri after-sb-2pri always-asbp rr-conflict
		# ping-timeout data-integrity-alg tcp-cork on-congestion
		# congestion-fill congestion-extents csums-alg verify-alg
		# use-rle

		# Protocol "C" tells DRBD not to tell the operating system that
		# the write is complete until the data has reach persistent
		# storage on both nodes. This is the slowest option, but it is
		# also the only one that guarantees consistency between the
		# nodes. It is also required for dual-primary, which we will 
		# be using.
		protocol C;

		# Tell DRBD to allow dual-primary. This is needed to enable 
		# live-migration of our servers.
		allow-two-primaries yes;

		# This tells DRBD what to do in the case of a split-brain when
		# neither node was primary, when one node was primary and when
		# both nodes are primary. In our case, we'll be running
		# dual-primary, so we can not safely recover automatically. The
		# only safe option is for the nodes to disconnect from one
		# another and let a human decide which node to invalidate. Of 
		after-sb-0pri discard-zero-changes;
		after-sb-1pri discard-secondary;
		after-sb-2pri disconnect;
	}
}

And now configure the first resource;

vim /etc/drbd.d/r0.res
# This is the first DRBD resource. If will store the shared file systems and
# the servers designed to run on node 01.
resource r0 {
	# These options here are common to both nodes. If for some reason you
	# need to set unique values per node, you can move these to the
	# 'on <name> { ... }' section.
	
	# This sets the device name of this DRBD resouce.
	device /dev/drbd0;

	# This tells DRBD what the backing device is for this resource.
	disk /dev/sda5;

	# This controls the location of the metadata. When "internal" is used,
	# as we use here, a little space at the end of the backing devices is
	# set aside (roughly 32 MB per 1 TB of raw storage). External metadata
	# can be used to put the metadata on another partition when converting
	# existing file systems to be DRBD backed, when there is no extra space
	# available for the metadata.
	meta-disk internal;

	# NOTE: this is not required or even recommended with pacemaker. remove
	# 	this options as soon as pacemaker is setup.
	startup {
		# This tells DRBD to promote both nodes to 'primary' when this
		# resource starts. However, we will let pacemaker control this
		# so we comment it out, which tells DRBD to leave both nodes
		# as secondary when drbd starts.
		#become-primary-on both;
	}

	# NOTE: Later, make it an option in the dashboard to trigger a manual
	# 	verify and/or schedule periodic automatic runs
	net {
		# TODO: Test performance differences between sha1 and md5
		# This tells DRBD how to do a block-by-block verification of
		# the data stored on the backing devices. Any verification
		# failures will result in the effected block being marked
		# out-of-sync.
		verify-alg md5;

		# TODO: Test the performance hit of this being enabled.
		# This tells DRBD to generate a checksum for each transmitted
		# packet. If the data received data doesn't generate the same
		# sum, a retransmit request is generated. This protects against
		# otherwise-undetected errors in transmission, like 
		# bit-flipping. See:
		# http://www.drbd.org/users-guide/s-integrity-check.html
		data-integrity-alg md5;
	}

	# WARNING: Confirm that these are safe when the controller's BBU is
	#          depleted/failed and the controller enters write-through 
	#          mode.
	disk {
		# TODO: Test the real-world performance differences gained with
		#       these options.
		# This tells DRBD not to bypass the write-back caching on the
		# RAID controller. Normally, DRBD forces the data to be flushed
		# to disk, rather than allowing the write-back cachine to 
		# handle it. Normally this is dangerous, but with BBU-backed
		# caching, it is safe. The first option disables disk flushing
		# and the second disabled metadata flushes.
		disk-flushes no;
		md-flushes no;
	}

	# This sets up the resource on node 01. The name used below must be the
	# named returned by "uname -n".
	on an-a04n01.alteeve.ca {
		# This is the address and port to use for DRBD traffic on this
		# node. Multiple resources can use the same IP but the ports
		# must differ. By convention, the first resource uses 7788, the
		# second uses 7789 and so on, incrementing by one for each
		# additional resource. 
		address 10.10.40.1:7788;
	}
	on an-a04n02.alteeve.ca {
		address 10.10.40.2:7788;
	}
}

Disable drbd from starting on boot.

systemctl disable drbd.service
drbd.service is not a native service, redirecting to /sbin/chkconfig.
Executing /sbin/chkconfig drbd off

Load the config;

modprobe drbd

Now check the config;

drbdadm dump
  --==  Thank you for participating in the global usage survey  ==--
The server's response is:

you are the 69th user to install this version
/etc/drbd.d/r0.res:3: in resource r0:
become-primary-on is set to both, but allow-two-primaries is not set.

Ignore that error. It has been reported and does not effect operation.

Create the metadisk;

drbdadm create-md r0
Writing meta data...
initializing activity log
NOT initializing bitmap
New drbd meta data block successfully created.
success

Start the DRBD resource on both nodes;

drbdadm up r0

Once /proc/drbd shows both nodes connected, force one to primary and it will sync over the second.

drbdadm primary --force r0

You should see the resource syncing now. Push both nodes to primary;

drbdadm primary r0

DLM, Clustered LVM and GFS2

an-a04n01
sed -i.anvil 's^filter = \[ "a/\.\*/" \]^filter = \[ "a|/dev/drbd*|", "r/.*/" \]^' /etc/lvm/lvm.conf
sed -i 's/locking_type = 1$/locking_type = 3/' /etc/lvm/lvm.conf
sed -i 's/fallback_to_local_locking = 1$/fallback_to_local_locking = 0/' /etc/lvm/lvm.conf 
sed -i 's/use_lvmetad = 1$/use_lvmetad = 0/' /etc/lvm/lvm.conf
--- /etc/lvm/lvm.conf.anvil	2013-11-27 03:28:08.000000000 -0500
+++ /etc/lvm/lvm.conf	2014-01-26 18:57:41.026928464 -0500
@@ -84,7 +84,7 @@
     # lvmetad is used" comment that is attached to global/use_lvmetad setting.
 
     # By default we accept every block device:
-    filter = [ "a/.*/" ]
+    filter = [ "a|/dev/drbd*|", "r/.*/" ]
 
     # Exclude the cdrom drive
     # filter = [ "r|/dev/cdrom|" ]
@@ -451,7 +451,7 @@
     # supported in clustered environment. If use_lvmetad=1 and locking_type=3
     # is set at the same time, LVM always issues a warning message about this
     # and then it automatically disables lvmetad use.
-    locking_type = 1
+    locking_type = 3
 
     # Set to 0 to fail when a lock request cannot be satisfied immediately.
     wait_for_locks = 1
@@ -467,7 +467,7 @@
     # to 1 an attempt will be made to use local file-based locking (type 1).
     # If this succeeds, only commands against local volume groups will proceed.
     # Volume Groups marked as clustered will be ignored.
-    fallback_to_local_locking = 1
+    fallback_to_local_locking = 0
 
     # Local non-LV directory that holds file-based locks while commands are
     # in progress.  A directory like /tmp that may get wiped on reboot is OK.
@@ -594,7 +594,7 @@
     # supported in clustered environment. If use_lvmetad=1 and locking_type=3
     # is set at the same time, LVM always issues a warning message about this
     # and then it automatically disables lvmetad use.
-    use_lvmetad = 1
+    use_lvmetad = 0
 
     # Full path of the utility called to check that a thin metadata device
     # is in a state that allows it to be used.
rsync -av /etc/lvm/lvm.conf* root@an-a04n02:/etc/lvm/
sending incremental file list
lvm.conf
lvm.conf.anvil

sent 48536 bytes  received 440 bytes  97952.00 bytes/sec
total size is 90673  speedup is 1.85
an-a04n02
diff -u /etc/lvm/lvm.conf.anvil /etc/lvm/lvm.conf
--- /etc/lvm/lvm.conf.anvil	2013-11-27 03:28:08.000000000 -0500
+++ /etc/lvm/lvm.conf	2014-01-26 18:57:41.000000000 -0500
@@ -84,7 +84,7 @@
     # lvmetad is used" comment that is attached to global/use_lvmetad setting.
 
     # By default we accept every block device:
-    filter = [ "a/.*/" ]
+    filter = [ "a|/dev/drbd*|", "r/.*/" ]
 
     # Exclude the cdrom drive
     # filter = [ "r|/dev/cdrom|" ]
@@ -451,7 +451,7 @@
     # supported in clustered environment. If use_lvmetad=1 and locking_type=3
     # is set at the same time, LVM always issues a warning message about this
     # and then it automatically disables lvmetad use.
-    locking_type = 1
+    locking_type = 3
 
     # Set to 0 to fail when a lock request cannot be satisfied immediately.
     wait_for_locks = 1
@@ -467,7 +467,7 @@
     # to 1 an attempt will be made to use local file-based locking (type 1).
     # If this succeeds, only commands against local volume groups will proceed.
     # Volume Groups marked as clustered will be ignored.
-    fallback_to_local_locking = 1
+    fallback_to_local_locking = 0
 
     # Local non-LV directory that holds file-based locks while commands are
     # in progress.  A directory like /tmp that may get wiped on reboot is OK.
@@ -594,7 +594,7 @@
     # supported in clustered environment. If use_lvmetad=1 and locking_type=3
     # is set at the same time, LVM always issues a warning message about this
     # and then it automatically disables lvmetad use.
-    use_lvmetad = 1
+    use_lvmetad = 0
 
     # Full path of the utility called to check that a thin metadata device
     # is in a state that allows it to be used.

Disable lvmetad as it's not cluster-aware.

an-a04n01
systemctl disable lvm2-lvmetad.service
systemctl disable lvm2-lvmetad.socket
systemctl stop lvm2-lvmetad.service
rm '/etc/systemd/system/sockets.target.wants/lvm2-lvmetad.socket'
an-a04n02
systemctl disable lvm2-lvmetad.service
systemctl disable lvm2-lvmetad.socket
systemctl stop lvm2-lvmetad.service
rm '/etc/systemd/system/sockets.target.wants/lvm2-lvmetad.socket'
Note: This will be moved to pacemaker shortly. We're enabling it here just long enough to configure pacemaker.

Start DLM and clvmd;

an-a04n01
systemctl start dlm.service
systemctl start clvmd.service
an-a04n02
systemctl start dlm.service
systemctl start clvmd.service

Create the PV, VG and the /shared LV;

an-a04n01
pvcreate /dev/drbd0
  Physical volume "/dev/drbd0" successfully created
vgcreate an-a04n01_vg0 /dev/drbd0
  /proc/devices: No entry for device-mapper found
  Clustered volume group "an-a04n01_vg0" successfully created
lvcreate -L 10G -n shared an-a04n01_vg0
  Logical volume "shared" created
an-a04n02
pvscan
  PV /dev/drbd0   VG an-a04n01_vg0   lvm2 [20.00 GiB / 20.00 GiB free]
  Total: 1 [20.00 GiB] / in use: 1 [20.00 GiB] / in no VG: 0 [0   ]
vgscan
  Reading all physical volumes.  This may take a while...
  Found volume group "an-a04n01_vg0" using metadata type lvm2
lvscan
  ACTIVE            '/dev/an-a04n01_vg0/shared' [10.00 GiB] inherit

Format the /dev/an-a04n01_vg0/shared;

an-a04n01
mkfs.gfs2 -j 2 -p lock_dlm -t an-anvil-04:shared /dev/an-a04n01_vg0/shared
/dev/an-a04n01_vg0/shared is a symbolic link to /dev/dm-0
This will destroy any data on /dev/dm-0
Are you sure you want to proceed? [y/n]y
Device:                    /dev/an-a04n01_vg0/shared
Block size:                4096
Device size:               10.00 GB (2621440 blocks)
Filesystem size:           10.00 GB (2621438 blocks)
Journals:                  2
Resource groups:           40
Locking protocol:          "lock_dlm"
Lock table:                "an-anvil-04:shared"
UUID:                      20bafdb0-1f86-f424-405b-9bf608c0c486
mkdir /shared
mount /dev/an-a04n01_vg0/shared /shared
df -h
Filesystem                         Size  Used Avail Use% Mounted on
/dev/vda3                           18G  5.6G   12G  32% /
devtmpfs                           932M     0  932M   0% /dev
tmpfs                              937M   61M  877M   7% /dev/shm
tmpfs                              937M  1.9M  935M   1% /run
tmpfs                              937M     0  937M   0% /sys/fs/cgroup
/dev/loop0                         4.4G  4.4G     0 100% /mnt/dvd
/dev/vda1                          484M   83M  401M  18% /boot
/dev/mapper/an--a03n01_vg0-shared   10G  259M  9.8G   3% /shared
an-a04n02
Filesystem                         Size  Used Avail Use% Mounted on
/dev/vda3                           18G  5.6G   12G  32% /
devtmpfs                           932M     0  932M   0% /dev
tmpfs                              937M   76M  862M   9% /dev/shm
tmpfs                              937M  2.0M  935M   1% /run
tmpfs                              937M     0  937M   0% /sys/fs/cgroup
/dev/loop0                         4.4G  4.4G     0 100% /mnt/dvd
/dev/vda1                          484M   83M  401M  18% /boot
/dev/mapper/an--a03n01_vg0-shared   10G  259M  9.8G   3% /shared

Shut down gfs2, clvmd and drbd now.

an-a04n01
umount /shared/
systemctl stop clvmd.service
drbdadm down r0
an-a04n02
umount /shared/
systemctl stop clvmd.service
drbdadm down r0

Done.

Add Storage to Pacemaker

Configure Dual-Primary DRBD

Setup DRBD as a dual-primary resource.

an-a04n01
pcs cluster cib drbd_cfg
pcs -f drbd_cfg resource create drbd_r0 ocf:linbit:drbd drbd_resource=r0 op monitor interval=60s
pcs -f drbd_cfg resource master drbd_r0_Clone drbd_r0 master-max=2 master-node-max=1 clone-max=2 clone-node-max=1 notify=true
pcs cluster cib-push drbd_cfg
CIB updated

Give it a couple minutes to promote both nodes to Master on both nodes. Initially, it will appear as Master on one node only.

Once updated, you should see this:

an-a04n01
pcs status
Cluster name: an-anvil-04
Last updated: Sun Jan 26 20:26:33 2014
Last change: Sun Jan 26 20:23:23 2014 via cibadmin on an-a04n01.alteeve.ca
Stack: corosync
Current DC: an-a04n02.alteeve.ca (2) - partition with quorum
Version: 1.1.10-19.el7-368c726
2 Nodes configured
4 Resources configured


Online: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]

Full list of resources:

 fence_n01_virsh	(stonith:fence_virsh):	Started an-a04n01.alteeve.ca 
 fence_n02_virsh	(stonith:fence_virsh):	Started an-a04n02.alteeve.ca 
 Master/Slave Set: drbd_r0_Clone [drbd_r0]
     Masters: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]

PCSD Status:
an-a04n01.alteeve.ca: 
  an-a04n01.alteeve.ca: Online
an-a04n02.alteeve.ca: 
  an-a04n02.alteeve.ca: Online

Daemon Status:
  corosync: active/disabled
  pacemaker: active/disabled
  pcsd: active/enabled
an-a04n02
pcs status
Cluster name: an-anvil-04
Last updated: Sun Jan 26 20:26:58 2014
Last change: Sun Jan 26 20:23:23 2014 via cibadmin on an-a04n01.alteeve.ca
Stack: corosync
Current DC: an-a04n02.alteeve.ca (2) - partition with quorum
Version: 1.1.10-19.el7-368c726
2 Nodes configured
4 Resources configured


Online: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]

Full list of resources:

 fence_n01_virsh	(stonith:fence_virsh):	Started an-a04n01.alteeve.ca 
 fence_n02_virsh	(stonith:fence_virsh):	Started an-a04n02.alteeve.ca 
 Master/Slave Set: drbd_r0_Clone [drbd_r0]
     Masters: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]

PCSD Status:
an-a04n01.alteeve.ca: 
  an-a04n01.alteeve.ca: Online
an-a04n02.alteeve.ca: 
  an-a04n02.alteeve.ca: Online

Daemon Status:
  corosync: active/disabled
  pacemaker: active/disabled
  pcsd: active/enabled

Configure DLM

an-a04n01
pcs cluster cib dlm_cfg
pcs -f dlm_cfg resource create dlm ocf:pacemaker:controld op monitor interval=60s
pcs -f dlm_cfg resource clone dlm clone-max=2 clone-node-max=1
pcs cluster cib-push dlm_cfg
CIB updated
an-a04n02
pcs status
Cluster name: an-anvil-04
Last updated: Sun Jan 26 20:34:36 2014
Last change: Sun Jan 26 20:33:31 2014 via cibadmin on an-a04n01.alteeve.ca
Stack: corosync
Current DC: an-a04n02.alteeve.ca (2) - partition with quorum
Version: 1.1.10-19.el7-368c726
2 Nodes configured
6 Resources configured


Online: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]

Full list of resources:

 fence_n01_virsh	(stonith:fence_virsh):	Started an-a04n01.alteeve.ca 
 fence_n02_virsh	(stonith:fence_virsh):	Started an-a04n02.alteeve.ca 
 Master/Slave Set: drbd_r0_Clone [drbd_r0]
     Masters: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]
 Clone Set: dlm-clone [dlm]
     Started: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]

PCSD Status:
an-a04n01.alteeve.ca: 
  an-a04n01.alteeve.ca: Online
an-a04n02.alteeve.ca: 
  an-a04n02.alteeve.ca: Online

Daemon Status:
  corosync: active/disabled
  pacemaker: active/disabled
  pcsd: active/enabled

Configure Cluster LVM

an-a04n01
pcs cluster cib clvmd_cfg
pcs -f clvmd_cfg resource create clvmd lsb:clvmd params daemon_timeout=30s op monitor interval=60s
pcs -f clvmd_cfg resource clone clvmd clone-max=2 clone-node-max=1
pcs -f clvmd_cfg constraint colocation add dlm-clone clvmd-clone INFINITY
pcs -f clvmd_cfg constraint order start dlm then start clvmd-clone
pcs cluster cib-push clvmd_cfg
CIB updated
an-a04n02
pcs status
Cluster name: an-anvil-04
Last updated: Mon Jan 27 19:00:33 2014
Last change: Mon Jan 27 19:00:19 2014 via crm_resource on an-a04n01.alteeve.ca
Stack: corosync
Current DC: an-a04n01.alteeve.ca (1) - partition with quorum
Version: 1.1.10-19.el7-368c726
2 Nodes configured
8 Resources configured


Online: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]

Full list of resources:

 fence_n01_virsh        (stonith:fence_virsh):  Started an-a04n01.alteeve.ca
 fence_n02_virsh        (stonith:fence_virsh):  Started an-a04n02.alteeve.ca
 Master/Slave Set: drbd_r0_Clone [drbd_r0]
     Masters: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]
 Clone Set: dlm-clone [dlm]
     Started: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]
 Clone Set: clvmd-clone [clvmd]
     Started: [ an-a04n01.alteeve.ca an-a04n02.alteeve.ca ]

PCSD Status:
an-a04n01.alteeve.ca:
  an-a04n01.alteeve.ca: Online
an-a04n02.alteeve.ca:
  an-a04n02.alteeve.ca: Online

Daemon Status:
  corosync: active/disabled
  pacemaker: active/disabled
  pcsd: active/enabled

Configure the /shared GFS2 Partition

an-a04n01
pcs cluster cib fs_cfg
pcs -f fs_cfg resource create sharedFS Filesystem device="/dev/an-a04n01_vg0/shared" directory="/shared" fstype="gfs2"
pcs -f fs_cfg resource clone sharedFS
pcs cluster cib-push fs_cfg
CIB updated
df -h
Filesystem                         Size  Used Avail Use% Mounted on
/dev/vda3                           18G  5.6G   12G  32% /
devtmpfs                           932M     0  932M   0% /dev
tmpfs                              937M   61M  877M   7% /dev/shm
tmpfs                              937M  2.2M  935M   1% /run
tmpfs                              937M     0  937M   0% /sys/fs/cgroup
/dev/loop0                         4.4G  4.4G     0 100% /mnt/dvd
/dev/vda1                          484M   83M  401M  18% /boot
/dev/mapper/an--a03n01_vg0-shared   10G  259M  9.8G   3% /shared
an-a04n02
df -h
Filesystem                         Size  Used Avail Use% Mounted on
/dev/vda3                           18G  5.6G   12G  32% /
devtmpfs                           932M     0  932M   0% /dev
tmpfs                              937M   76M  862M   9% /dev/shm
tmpfs                              937M  2.6M  935M   1% /run
tmpfs                              937M     0  937M   0% /sys/fs/cgroup
/dev/loop0                         4.4G  4.4G     0 100% /mnt/dvd
/dev/vda1                          484M   83M  401M  18% /boot
/dev/mapper/an--a03n01_vg0-shared   10G  259M  9.8G   3% /shared

Configuring Constraints

an-a04n01
pcs cluster cib cst_cfg
pcs -f cst_cfg constraint order start dlm then promote drbd_r0_Clone
pcs -f cst_cfg constraint order promote drbd_r0_Clone then start clvmd-clone
pcs -f cst_cfg constraint order promote clvmd-clone then start sharedFS-clone
pcs cluster cib-push cst_cfg
CIB updated
pcs constraint show
Location Constraints:
Ordering Constraints:
  start dlm then promote drbd_r0_Clone
  promote drbd_r0_Clone then start clvmd-clone
  start clvmd-clone then start sharedFS-clone
Colocation Constraints:
an-a04n02
pcs constraint show
Location Constraints:
Ordering Constraints:
  start dlm then promote drbd_r0_Clone
  promote drbd_r0_Clone then start clvmd-clone
  start clvmd-clone then start sharedFS-clone
Colocation Constraints:

Odds and Sods

This is a section for random notes. The stuff here will be integrated into the finished tutorial or removed.

Determine multicast Address

Useful if you need to ensure that your switch has persistent multicast addresses set.

corosync-cmapctl | grep mcastaddr
totem.interface.0.mcastaddr (str) = 239.192.122.199



an-a04n01
an-a04n02

Notes

  • Pacemaker Logging
  • Editing cib.xml offline is possible with: CIB_file=/path/to/real/cib.xml cibadmin .... and sync to other nodes when done.

Thanks

This list will certainly grow as this tutorial progresses;

 

Any questions, feedback, advice, complaints or meanderings are welcome.
Alteeve's Niche! Enterprise Support:
Alteeve Support
Community Support
© Alteeve's Niche! Inc. 1997-2024   Anvil! "Intelligent Availability®" Platform
legal stuff: All info is provided "As-Is". Do not use anything here unless you are willing and able to take responsibility for your own actions.