Flylib.com
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: 1593270364
EAN: 2147483647
Year: 2003
Pages: 219
Authors:
Karl Kopper
BUY ON AMAZON
Table of Contents
Back Cover
The Linux Enterprise ClusterBuild a Highly Available Cluster with Commodity Hardware and Free Software
Introduction
Architecture of the Linux Enterprise Cluster
The Cluster Node Manager
No Single Point of Failure
In Conclusion
Primer
High Availability Terminology
Linux Enterprise Cluster Terminology
Part I: Cluster Resources
Chapter 1: Starting Services
Starting Services with init
Using the Red Hat init Scripts on Cluster Nodes
In Conclusion
Chapter 2: Handling Packets
Netfilter
A Brief History of Netfilter
Setting the Default Chain Policy
Using iptables and ipchains
Routing Packets with the Linux Kernel
In Conclusion
Chapter 3: Compiling the Kernel
What You Will Need
Step 1: Get the Source Code
Step 2: Set the Options You Want
Step 3: Compile the Code
Step 4: Install the Object Code and Configuration File
Step 5: Configure Your Boot Loader
In Conclusion
Part II: High Availability
Chapter 4: Synchronizing Servers with RYSNC and SSH
Open SSH 2 and rsync
Two-Node SSH Client-Server Recipe
In Conclusion
Chapter 5: Cloning Systems with Systemimager
SystemImager Recipe
Performing Maintenance: Updating Clients
In Conclusion
Chapter 6: Heartbeat Introduction and Theory
The Physical Paths of the Heartbeats
Heartbeat Control Messages
How Client Computers Access Resources
Secondary IP Addresses and IP Aliases
Resource Scripts
Heartbeat Configuration Files
In Conclusion
Chapter 7: A Sample Heartbeat Configuration
Preparations
Step 1: Install Heartbeat
Step 2: Configure etcha.dha.cf
Step 3: Configure etcha.dharesources
Step 4: Configure etcha.dauthkeys
Step 5: Install Heartbeat on the Backup Server
Step 6: Set the System Time
Step 7: Launch Heartbeat
Stopping and Starting Heartbeat
Monitoring Resources
In Conclusion
Chapter 8: Heartbeat Resources and Maintenance
Load Sharing with Heartbeat
Operator Alerts: Audible Alarm
Operator Alerts: Email Alerts
Heartbeat Maintenance
In Conclusion
Chapter 9: Stonith and Ipfail
Stonith
An Unconventional Approach: Using a Single Stonith Device
Network Failures
Watchdog and Softdog
Testing Your Heartbeat Configuration
In Conclusion
Part III: Cluster Theory and Practice
Chapter 10: How to Build a Linux Enterprise Cluster
In Conclusion
Chapter 11: The Linux Virtual Server: Introduction and Theory
LVS IP Address Name Conventions
Types of LVS Clusters
LVS Scheduling Methods
In Conclusion
Chapter 12: The LVS-NAT Cluster
Building an LVS-NAT Web Cluster
LocalNode: Using the Director as a Real Server
In Conclusion
Chapter 13: The LVS-DR Cluster
How Client Computers Access LVS-DR Cluster Services
ARP Broadcasts and the LVS-DR Cluster
Client Computers and ARP Broadcasts
In Conclusion
Chapter 14: The Load Balancer
The Director s Connection Tracking Table
Timeout Values for Connection Tracking Records
Return Packets and the Netfilter Hooks
LVS without Persistence
LVS Persistence
In Conclusion
Chapter 15: The High-Availability Cluster
Redundant LVS Directors
High-Availability Cluster Design Goals
The High-Availability LVS-DR Cluster
Introduction to ldirectord
LVS, Heartbeat, and ldirectord Recipe
In Conclusion
Chapter 16: The Network File System
Lock Arbitration
The Lock Arbitrator
The Network Lock Manager (NLM)
NLM and Kernel Lock Arbitration
NFS and File Lock (dotlock) Arbitration
Finding the Locks Held by the Linux Kernel
Performance Issues with NFSBottlenecks and Perceptions
Managing Lock and GETATTR Operations in a Cluster Environment
Managing Attribute Caching
Managing Interactive User Applications and Batch Jobs in a Cluster Environment
Measuring NFS Latency
Measuring Total IO Operations
Achieving the Best NAS Performance Possible
NFS Client Configuration Options
Developing NFS
Additional Starting Points for Information on Linux and NFS
In Conclusion
Part IV: Maintenance and Monitoring
Chapter 17: The Simple Network Management Protocol and Mon
Where to Run Mon
Basic Mon Recipe
Mon and SNMP
Mon and SNMP
Email Alerts From Mon
Creating Your Own SNMP Script
Monitoring Your SNMP Script with Mon
Things to Monitor with SNMP Monitoring Scripts
Forcing a Stonith Event with Mon
Forcing a Heartbeat Failover with Mon
In Conclusion
Chapter 18: Ganglia
Introduction to Ganglia
Installing Ganglia s Prerequisite Packages
Installing Ganglia on the Cluster Node Manager
Installing Ganglia on the Cluster Nodes
Configuring gmetad and gmond on the Cluster Node Manager
The Ganglia Web Package
Creating Custom Metrics with gmetric
In Conclusion
Chapter 19: Case Studies in Cluster Administration
Administering Accounts without Active Directory
Building a Reliable Cluster Account Authentication Mechanism
Building a Fault-Tolerant Print Spooler
Rebooting Nodes for Preventative Maintenance
Sending and Receiving Email in a Cluster Environment
Creating a Batch Job-Scheduling System with No Single Point of Failure
In Conclusion
Chapter 20: The Linux Cluster Environment
The Cluster Node Manager
The Clients
The NAS Server
Highly Available Serial Devices
Highly Available Database Server
Putting it all Together
In Conclusion
Appendix A: Downloading Software From the Internet (From a Text Terminal)
Using Lynx
Using Wget
Creating Your Own Tape Archive (tar) File
Appendix B: Troubleshooting with the tcpdump Utility
Appendix C: Adding Network Interface Cards to Your System
Monolithic versus Modular Kernels
View Your Existing Configuration
Install the Card and Reboot
Run linuxconf
Testing the New NIC
Changes Made by linuxconf
Using the New NIC
Testing and Troubleshooting
Appendix D: Strategies for Dependency Failures
rpm Packages and Shared Library Dependencies
Fixing a Dependency Failure Manually
Using Yum to Install rpm Packages
In Conclusion
Appendix E: Other Potential Cluster Filesystems and Lock Arbitration Methods
Appendix F: LVS Clusters and the Apache Configuration File
ServerName
DocumentRoot
BindAddress
Port
Listen
Apache Virtual Host Configuration on Cluster Nodes
Self-Referential (Redirection) URLs
Verify Your Virtual Host Configuration
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Sidebars
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: 1593270364
EAN: 2147483647
Year: 2003
Pages: 219
Authors:
Karl Kopper
BUY ON AMAZON
Lotus Notes and Domino 6 Development (2nd Edition)
Understanding Folders
Creating Shared Actions
Using the Page Designer
The Role of the Domino Directory in Application Security
Applying Field-Level Security
The Java Tutorial: A Short Course on the Basics, 4th Edition
Variables
Overview of I/O Streams
Appendix A. Common Problems and Their Solutions
Appendix C. Collections
Interfaces
Programming Microsoft ASP.NET 3.5
ASP.NET Core Server Controls
Real-World Data Access
ASP.NET Iterative Controls
Web Forms User Controls
Data-Bound and Templated Controls
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 45. Forward Ports over SSH
Hack 67. Upgrade Your Wireless Router
Hack 70. Pebble
Hack 74. Capture Wireless Users with NoCatAuth
Section B.2. Microwave Connector Reference
802.11 Wireless Networks: The Definitive Guide, Second Edition
11 Nomenclature and Design
The Extensible Authentication Protocol
High Rate Direct Sequence PHY
Power over Ethernet (PoE)
11 Network Analysis Checklist
VBScript in a Nutshell, 2nd Edition
What VBScript Is Used For: Gluing Together Objects
Error Handling and Debugging
Section A.16. User Interaction
Section B.7. Message Box Constants
Section C.5. Operator Precedence
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies