Flylib.com
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: 1593270364
EAN: 2147483647
Year: 2003
Pages: 219
Authors:
Karl Kopper
BUY ON AMAZON
Table of Contents
Back Cover
The Linux Enterprise ClusterBuild a Highly Available Cluster with Commodity Hardware and Free Software
Introduction
Architecture of the Linux Enterprise Cluster
The Cluster Node Manager
No Single Point of Failure
In Conclusion
Primer
High Availability Terminology
Linux Enterprise Cluster Terminology
Part I: Cluster Resources
Chapter 1: Starting Services
Starting Services with init
Using the Red Hat init Scripts on Cluster Nodes
In Conclusion
Chapter 2: Handling Packets
Netfilter
A Brief History of Netfilter
Setting the Default Chain Policy
Using iptables and ipchains
Routing Packets with the Linux Kernel
In Conclusion
Chapter 3: Compiling the Kernel
What You Will Need
Step 1: Get the Source Code
Step 2: Set the Options You Want
Step 3: Compile the Code
Step 4: Install the Object Code and Configuration File
Step 5: Configure Your Boot Loader
In Conclusion
Part II: High Availability
Chapter 4: Synchronizing Servers with RYSNC and SSH
Open SSH 2 and rsync
Two-Node SSH Client-Server Recipe
In Conclusion
Chapter 5: Cloning Systems with Systemimager
SystemImager Recipe
Performing Maintenance: Updating Clients
In Conclusion
Chapter 6: Heartbeat Introduction and Theory
The Physical Paths of the Heartbeats
Heartbeat Control Messages
How Client Computers Access Resources
Secondary IP Addresses and IP Aliases
Resource Scripts
Heartbeat Configuration Files
In Conclusion
Chapter 7: A Sample Heartbeat Configuration
Preparations
Step 1: Install Heartbeat
Step 2: Configure etcha.dha.cf
Step 3: Configure etcha.dharesources
Step 4: Configure etcha.dauthkeys
Step 5: Install Heartbeat on the Backup Server
Step 6: Set the System Time
Step 7: Launch Heartbeat
Stopping and Starting Heartbeat
Monitoring Resources
In Conclusion
Chapter 8: Heartbeat Resources and Maintenance
Load Sharing with Heartbeat
Operator Alerts: Audible Alarm
Operator Alerts: Email Alerts
Heartbeat Maintenance
In Conclusion
Chapter 9: Stonith and Ipfail
Stonith
An Unconventional Approach: Using a Single Stonith Device
Network Failures
Watchdog and Softdog
Testing Your Heartbeat Configuration
In Conclusion
Part III: Cluster Theory and Practice
Chapter 10: How to Build a Linux Enterprise Cluster
In Conclusion
Chapter 11: The Linux Virtual Server: Introduction and Theory
LVS IP Address Name Conventions
Types of LVS Clusters
LVS Scheduling Methods
In Conclusion
Chapter 12: The LVS-NAT Cluster
Building an LVS-NAT Web Cluster
LocalNode: Using the Director as a Real Server
In Conclusion
Chapter 13: The LVS-DR Cluster
How Client Computers Access LVS-DR Cluster Services
ARP Broadcasts and the LVS-DR Cluster
Client Computers and ARP Broadcasts
In Conclusion
Chapter 14: The Load Balancer
The Director s Connection Tracking Table
Timeout Values for Connection Tracking Records
Return Packets and the Netfilter Hooks
LVS without Persistence
LVS Persistence
In Conclusion
Chapter 15: The High-Availability Cluster
Redundant LVS Directors
High-Availability Cluster Design Goals
The High-Availability LVS-DR Cluster
Introduction to ldirectord
LVS, Heartbeat, and ldirectord Recipe
In Conclusion
Chapter 16: The Network File System
Lock Arbitration
The Lock Arbitrator
The Network Lock Manager (NLM)
NLM and Kernel Lock Arbitration
NFS and File Lock (dotlock) Arbitration
Finding the Locks Held by the Linux Kernel
Performance Issues with NFSBottlenecks and Perceptions
Managing Lock and GETATTR Operations in a Cluster Environment
Managing Attribute Caching
Managing Interactive User Applications and Batch Jobs in a Cluster Environment
Measuring NFS Latency
Measuring Total IO Operations
Achieving the Best NAS Performance Possible
NFS Client Configuration Options
Developing NFS
Additional Starting Points for Information on Linux and NFS
In Conclusion
Part IV: Maintenance and Monitoring
Chapter 17: The Simple Network Management Protocol and Mon
Where to Run Mon
Basic Mon Recipe
Mon and SNMP
Mon and SNMP
Email Alerts From Mon
Creating Your Own SNMP Script
Monitoring Your SNMP Script with Mon
Things to Monitor with SNMP Monitoring Scripts
Forcing a Stonith Event with Mon
Forcing a Heartbeat Failover with Mon
In Conclusion
Chapter 18: Ganglia
Introduction to Ganglia
Installing Ganglia s Prerequisite Packages
Installing Ganglia on the Cluster Node Manager
Installing Ganglia on the Cluster Nodes
Configuring gmetad and gmond on the Cluster Node Manager
The Ganglia Web Package
Creating Custom Metrics with gmetric
In Conclusion
Chapter 19: Case Studies in Cluster Administration
Administering Accounts without Active Directory
Building a Reliable Cluster Account Authentication Mechanism
Building a Fault-Tolerant Print Spooler
Rebooting Nodes for Preventative Maintenance
Sending and Receiving Email in a Cluster Environment
Creating a Batch Job-Scheduling System with No Single Point of Failure
In Conclusion
Chapter 20: The Linux Cluster Environment
The Cluster Node Manager
The Clients
The NAS Server
Highly Available Serial Devices
Highly Available Database Server
Putting it all Together
In Conclusion
Appendix A: Downloading Software From the Internet (From a Text Terminal)
Using Lynx
Using Wget
Creating Your Own Tape Archive (tar) File
Appendix B: Troubleshooting with the tcpdump Utility
Appendix C: Adding Network Interface Cards to Your System
Monolithic versus Modular Kernels
View Your Existing Configuration
Install the Card and Reboot
Run linuxconf
Testing the New NIC
Changes Made by linuxconf
Using the New NIC
Testing and Troubleshooting
Appendix D: Strategies for Dependency Failures
rpm Packages and Shared Library Dependencies
Fixing a Dependency Failure Manually
Using Yum to Install rpm Packages
In Conclusion
Appendix E: Other Potential Cluster Filesystems and Lock Arbitration Methods
Appendix F: LVS Clusters and the Apache Configuration File
ServerName
DocumentRoot
BindAddress
Port
Listen
Apache Virtual Host Configuration on Cluster Nodes
Self-Referential (Redirection) URLs
Verify Your Virtual Host Configuration
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Sidebars
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: 1593270364
EAN: 2147483647
Year: 2003
Pages: 219
Authors:
Karl Kopper
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.2 Passphrase Considerations
Step 4.6 How to use PuTTY Passphrase Agents
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
VBScript Programmers Reference
The Scripting Runtime Objects
Client-Side Web Scripting
Server-Side Web Scripting
Appendix G The Windows Script Host Object Model
Appendix H Regular Expressions
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
DELETE
Object IDs (OID)
Defining the Data Type in PostgreSQL
Prerequisites
pgcurlWeb-enabling Your PostgreSQL Server
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Working with the Microsoft Visual Basic .NET Language
Working with the .NET Framework
Visual Studio .NET
Securing Applications
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Credibility and Computers
The Ethics of Persuasive Technology
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Uses for Job Schedulers in NonEnterprise
Packaging the Quartz Application
Cron Triggers and More
Using Persistent JobStores
Registering Your Plug-Ins
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies