Clusters From Scratch
Clusters From Scratch
Clusters From Scratch
Release 2.1.7
1 Abstract 3
2 Table of Contents 5
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1.1 The Scope of This Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1.2 What Is Pacemaker? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2.1 Install AlmaLinux 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.2.2 Configure the OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.2.3 Repeat for Second Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.2.4 Configure Communication Between Nodes . . . . . . . . . . . . . . . . . . . . . . . . 26
2.3 Set up a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.3.1 Simplify Administration With a Cluster Shell . . . . . . . . . . . . . . . . . . . . . . 28
2.3.2 Install the Cluster Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.3.3 Configure the Cluster Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.3.4 Explore pcs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.4 Start and Verify Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.4.1 Start the Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.4.2 Verify Corosync Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.4.3 Verify Pacemaker Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.4.4 Explore the Existing Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.5 Configure Fencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.5.1 What is Fencing? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.5.2 Choose a Fence Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.5.3 Configure the Cluster for Fencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.5.4 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.6 Create an Active/Passive Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.6.1 Add a Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.6.2 Perform a Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.6.3 Prevent Resources from Moving after Recovery . . . . . . . . . . . . . . . . . . . . . 43
2.7 Add Apache HTTP Server as a Cluster Service . . . . . . . . . . . . . . . . . . . . . . . . . . 44
2.7.1 Install Apache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
2.7.2 Create Website Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
2.7.3 Enable the Apache Status URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.7.4 Configure the Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.7.5 Ensure Resources Run on the Same Host . . . . . . . . . . . . . . . . . . . . . . . . . 46
2.7.6 Ensure Resources Start and Stop in Order . . . . . . . . . . . . . . . . . . . . . . . . 47
2.7.7 Prefer One Node Over Another . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
2.7.8 Move Resources Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
2.8 Replicate Storage Using DRBD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
i
2.8.1 Install the DRBD Packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
2.8.2 Allocate a Disk Volume for DRBD . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
2.8.3 Configure DRBD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
2.8.4 Initialize DRBD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
2.8.5 Populate the DRBD Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
2.8.6 Configure the Cluster for the DRBD device . . . . . . . . . . . . . . . . . . . . . . . 55
2.8.7 Configure the Cluster for the Filesystem . . . . . . . . . . . . . . . . . . . . . . . . . 57
2.8.8 Test Cluster Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
2.9 Convert Storage to Active/Active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
2.9.1 Install Cluster Filesystem Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
2.9.2 Configure the Cluster for the DLM . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
2.9.3 Create and Populate GFS2 Filesystem . . . . . . . . . . . . . . . . . . . . . . . . . . 61
2.9.4 Reconfigure the Cluster for GFS2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
2.9.5 Clone the Filesystem Resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.9.6 Test Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
2.10 Configuration Recap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
2.10.1 Final Cluster Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
2.10.2 Node List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
2.10.3 Cluster Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
2.10.4 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
2.11 Sample Corosync Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
2.12 Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
3 Index 73
Index 75
ii
Clusters from Scratch, Release 2.1.7
CONTENTS 1
Clusters from Scratch, Release 2.1.7
2 CONTENTS
CHAPTER
ONE
ABSTRACT
This document provides a step-by-step guide to building a simple high-availability cluster using Pacemaker.
The example cluster will use:
• AlmaLinux 9 as the host operating system
• Corosync to provide messaging and membership services
• Pacemaker 2 as the cluster resource manager
• DRBD as a cost-effective alternative to shared storage
• GFS2 as the cluster filesystem (in active/active mode)
Given the graphical nature of the install process, a number of screenshots are included. However, the guide
is primarily composed of commands, the reasons for executing them, and their expected outputs.
3
Clusters from Scratch, Release 2.1.7
4 Chapter 1. Abstract
CHAPTER
TWO
TABLE OF CONTENTS
2.1 Introduction
Computer clusters can be used to provide highly available services or resources. The redundancy of multiple
machines is used to guard against failures of many types.
This document will walk through the installation and setup of simple clusters using the AlmaLinux distri-
bution, version 9.
The clusters described here will use Pacemaker and Corosync to provide resource management and messaging.
Required packages and modifications to their configuration files are described along with the use of the pcs
command line tool for generating the XML used for cluster control.
Pacemaker is a central component and provides the resource management required in these systems. This
management includes detecting and recovering from the failure of various nodes, resources, and services
under its control.
When more in-depth information is required, and for real-world usage, please refer to the Pacemaker Ex-
plained manual.
Pacemaker is a high-availability cluster resource manager – software that runs on a set of hosts (a cluster of
nodes) in order to preserve integrity and minimize downtime of desired services (resources).1 It is maintained
by the ClusterLabs community.
Pacemaker’s key features include:
• Detection of and recovery from node- and service-level failures
• Ability to ensure data integrity by fencing faulty nodes
• Support for one or more nodes per cluster
• Support for multiple resource interface standards (anything that can be scripted can be clustered)
• Support (but no requirement) for shared storage
• Support for practically any redundancy configuration (active/passive, N+1, etc.)
• Automatically replicated configuration that can be updated from any node
1 Cluster is sometimes used in other contexts to refer to hosts grouped together for other purposes, such as high-performance
5
Clusters from Scratch, Release 2.1.7
• Ability to specify cluster-wide relationships between services, such as ordering, colocation, and anti-
colocation
• Support for advanced service types, such as clones (services that need to be active on multiple nodes),
promotable clones (clones that can run in one of two roles), and containerized services
• Unified, scriptable cluster management tools
Note: Fencing
Fencing, also known as STONITH (an acronym for Shoot The Other Node In The Head), is the ability to
ensure that it is not possible for a node to be running a service. This is accomplished via fence devices
such as intelligent power switches that cut power to the target, or intelligent network switches that cut the
target’s access to the local network.
Pacemaker represents fence devices as a special class of resource.
A cluster cannot safely recover from certain failure conditions, such as an unresponsive node, without fencing.
Cluster Architecture
At a high level, a cluster can be viewed as having these parts (which together are often referred to as the
cluster stack):
• Resources: These are the reason for the cluster’s being – the services that need to be kept highly
available.
• Resource agents: These are scripts or operating system components that start, stop, and monitor
resources, given a set of resource parameters. These provide a uniform interface between Pacemaker
and the managed services.
• Fence agents: These are scripts that execute node fencing actions, given a target and fence device
parameters.
• Cluster membership layer: This component provides reliable messaging, membership, and quorum
information about the cluster. Currently, Pacemaker supports Corosync as this layer.
• Cluster resource manager: Pacemaker provides the brain that processes and reacts to events that
occur in the cluster. These events may include nodes joining or leaving the cluster; resource events
caused by failures, maintenance, or scheduled activities; and other administrative actions. To achieve
the desired availability, Pacemaker may start and stop resources and fence nodes.
• Cluster tools: These provide an interface for users to interact with the cluster. Various command-line
and graphical (GUI) interfaces are available.
Most managed services are not, themselves, cluster-aware. However, many popular open-source cluster
filesystems make use of a common Distributed Lock Manager (DLM), which makes direct use of Corosync
for its messaging and membership capabilities and Pacemaker for the ability to fence nodes.
Pacemaker Architecture
2.1. Introduction 7
Clusters from Scratch, Release 2.1.7
Pacemaker’s main process (pacemakerd) spawns all the other daemons, and respawns them if they unex-
pectedly exit.
The Cluster Information Base (CIB) is an XML representation of the cluster’s configuration and the state
of all nodes and resources. The CIB manager (pacemaker-based) keeps the CIB synchronized across the
cluster, and handles requests to modify it.
The attribute manager (pacemaker-attrd) maintains a database of attributes for all nodes, keeps it syn-
chronized across the cluster, and handles requests to modify them. These attributes are usually recorded in
the CIB.
Given a snapshot of the CIB as input, the scheduler (pacemaker-schedulerd) determines what actions are
necessary to achieve the desired state of the cluster.
The local executor (pacemaker-execd) handles requests to execute resource agents on the local cluster node,
and returns the result.
The fencer (pacemaker-fenced) handles requests to fence nodes. Given a target node, the fencer decides
which cluster node(s) should execute which fencing device(s), and calls the necessary fencing agents (either
directly, or via requests to the fencer peers on other nodes), and returns the result.
The controller (pacemaker-controld) is Pacemaker’s coordinator, maintaining a consistent view of the
cluster membership and orchestrating all the other components.
Pacemaker centralizes cluster decision-making by electing one of the controller instances as the Designated
Controller (DC). Should the elected DC process (or the node it is on) fail, a new one is quickly established.
The DC responds to cluster events by taking a current snapshot of the CIB, feeding it to the scheduler, then
asking the executors (either directly on the local node, or via requests to controller peers on other nodes)
and the fencer to execute any necessary actions.
Pacemaker supports practically any node redundancy configuration including Active/Active, Active/Passive,
N+1, N+M, N-to-1, and N-to-N.
Active/passive clusters with two (or more) nodes using Pacemaker and DRBD are a cost-effective high-
availability solution for many situations. One of the nodes provides the desired services, and if it fails, the
other node takes over.
2.1. Introduction 9
Clusters from Scratch, Release 2.1.7
Pacemaker also supports multiple nodes in a shared-failover design, reducing hardware costs by allowing
several active/passive clusters to be combined and share a common backup node.
When shared storage is available, every node can potentially be used for failover. Pacemaker can even run
multiple copies of services to spread out the workload. This is sometimes called N-to-N redundancy.
2.1. Introduction 11
Clusters from Scratch, Release 2.1.7
2.2 Installation
Download the latest AlmaLinux 9 DVD ISO by navigating to the AlmaLinux mirrors list, selecting the
latest 9.x version for your machine’s architecture, selecting a download mirror that’s close to you, and finally
selecting the latest .iso file that has “dvd” in its name. Use the image to boot a virtual machine, or burn it
to a DVD or USB drive and boot a physical server from that.
After starting the installation, select your language and keyboard layout at the welcome screen.
Installation Options
At this point, you get a chance to tweak the default installation options.
Click on the SOFTWARE SELECTION section (try saying that 10 times quickly). The default envi-
ronment, Server with GUI, does have add-ons with much of the software we need, but we will change the
environment to a Minimal Install here, so that we can see exactly what software is required later, and
press Done.
2.2. Installation 13
Clusters from Scratch, Release 2.1.7
2.2. Installation 15
Clusters from Scratch, Release 2.1.7
Configure Network
Important: Do not accept the default network settings. Cluster machines should never obtain an IP
address via DHCP, because DHCP’s periodic address renewal will interfere with Corosync.
Configure Disk
By default, the installer’s automatic partitioning will use LVM (which allows us to dynamically change the
amount of space allocated to a given partition). However, it allocates all free space to the / (a.k.a. root)
partition, which cannot be reduced in size later (dynamic increases are fine).
In order to follow the DRBD and GFS2 portions of this guide, we need to reserve space on each machine for
a replicated volume.
Enter the INSTALLATION DESTINATION section and select the disk where you want to install the
OS. Then under Storage Configuration, select Custom and press Done.
On the MANUAL PARTITIONING screen that comes next, click the option to create mountpoints
automatically. Select the / mountpoint and reduce the Desired Capacity down to 4 GiB or so. (The
installer will not allow you to proceed if the / filesystem is too small to install all required packages.)
Then select Modify… next to the volume group name. In the CONFIGURE VOLUME GROUP dialog
box that appears, change the Size policy to As large as possible, to make the reclaimed space available
inside the LVM volume group. We’ll add the additional volume later.
2.2. Installation 17
Clusters from Scratch, Release 2.1.7
2.2. Installation 19
Clusters from Scratch, Release 2.1.7
Press Done. Finally, in the SUMMARY OF CHANGES dialog box, press Accept Changes.
It is highly recommended to enable NTP on your cluster nodes. Doing so ensures all nodes agree on the
current time and makes reading log files significantly easier.
AlmaLinux will enable NTP automatically. If you want to change any time-related settings (such as time
zone or NTP server), you can do this in the TIME & DATE section. In this example, we configure the
time zone as UTC (Coordinated Universal Time).
Root Password
In order to continue to the next step, a Root Password must be set. Be sure to check the box marked
Allow root SSH login with password.
Press Done. (Depending on the password you chose, you may need to do so twice.)
2.2. Installation 21
Clusters from Scratch, Release 2.1.7
Finish Install
Select Begin Installation. Once it completes, Reboot System as instructed. After the node reboots,
you’ll see a login prompt on the console. Login using root and the password you created earlier.
Note: From here on, we’re going to be working exclusively from the terminal.
Verify Networking
Ensure that the machine has the static IP address you configured earlier.
2.2. Installation 23
Clusters from Scratch, Release 2.1.7
Note: If you ever need to change the node’s IP address from the command line, follow these instructions,
replacing ${conn} with the name of your network connection. You can find the list of all network connection
names by running nmcli con show; you can get details for each connection by running nmcli con show
${conn}.
If there is no line beginning with default via, then use nmcli to add a gateway:
Now, check for connectivity to the outside world. Start small by testing whether we can reach the gateway
we configured.
Now try something external; choose a location you know should be available.
Login Remotely
The console isn’t a very friendly place to work from, so we will now switch to accessing the machine remotely
via SSH where we can use copy and paste, etc.
From another host, check whether we can see the new host at all:
Apply Updates
Apply any package updates released since your installation image was created:
During installation, we filled in the machine’s fully qualified domain name (FQDN), which can be rather
long when it appears in cluster logs and status output. See for yourself how the machine identifies itself:
We can use the hostnamectl tool to strip off the domain name:
Repeat the installation steps so far, so that you have two nodes ready to have the cluster software installed.
2.2. Installation 25
Clusters from Scratch, Release 2.1.7
For the purposes of this document, the additional node is called pcmk-2 with address 192.168.122.102.
Confirm that you can communicate between the two new nodes:
Now we need to make sure we can communicate with the machines by their name. Add entries for the
machines to /etc/hosts on both nodes. You can add entries for the machines to your DNS server if you
have one, but this can create a single-point-of-failure (SPOF) if the DNS server goes down1 . If you add
entries to /etc/hosts, they should look something like the following:
Configure SSH
SSH is a convenient and secure way to copy files and perform commands remotely. For the purposes of this
guide, we will create a key without a password (using the -N option) so that we can perform remote actions
without being prompted.
Warning: Unprotected SSH keys (those without a password) are not recommended for servers exposed
to the outside world. We use them here only to simplify the demo.
Create a new key and allow anyone with that key to log in:
1 You can also avoid this SPOF by specifying an addr option for each node when creating the cluster. We will discuss this
in a later section.
/usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to␣
,→install the new keys
root@pcmk-2's password:
Test that you can now run commands remotely, without being prompted:
Finally, repeat this same process on the other node. For convenience, you can also generate an SSH key on
your administrative machine and use ssh-copy-id to copy it to both cluster nodes.
2.2. Installation 27
Clusters from Scratch, Release 2.1.7
In the dark past, configuring Pacemaker required the administrator to read and write XML. In true UNIX
style, there were also a number of different commands that specialized in different aspects of querying and
updating the cluster.
In addition, the various components of the cluster stack (Corosync, Pacemaker, etc.) had to be configured
separately, with different configuration tools and formats.
All of that has been greatly simplified with the creation of higher-level tools, whether command-line or GUIs,
that hide all the mess underneath.
Command-line cluster shells take all the individual aspects required for managing and configuring a cluster,
and pack them into one simple-to-use command-line tool.
They even allow you to queue up several changes at once and commit them all at once.
Two popular command-line shells are pcs and crmsh. Clusters from Scratch is based on pcs because it
comes with AlmaLinux, but both have similar functionality. Choosing a shell or GUI is a matter of personal
preference and what comes with (and perhaps is supported by) your choice of operating system.
Fire up a shell on both nodes and run the following to activate the High Availability repo.
Important: This document will show commands that need to be executed on both nodes with a simple #
prompt. Be sure to run them on each node individually.
Now, we’ll install pacemaker, pcs, and some other command-line tools that will make our lives easier:
Note: This document uses pcs for cluster management. Other alternatives, such as crmsh, are available,
but their syntax will differ from the examples used here.
Note: If you are using iptables directly, or some other firewall solution besides firewalld, simply open
the following ports, which can be used by various clustering components: TCP ports 2224, 3121, and 21064,
and UDP port 5405.
If you run into any problems during testing, you might want to disable the firewall and SELinux entirely
until you have everything working. This may create significant security issues and should not be performed
on machines that will be exposed to the outside world, but may be appropriate during development and
testing on a protected host.
To disable security measures:
Before the cluster can be configured, the pcs daemon must be started and enabled to start at boot time on
each node. This daemon works with the pcs command-line interface to manage synchronizing the Corosync
configuration across all nodes in the cluster, among other functions.
Start and enable the daemon by issuing the following commands on each node:
The installed packages will create an hacluster user with a disabled password. While this is fine for running
pcs commands locally, the account needs a login password in order to perform such tasks as syncing the
Corosync configuration, or starting and stopping the cluster on other nodes.
This tutorial will make use of such commands, so now we will set a password for the hacluster user, using
the same password on both nodes:
# passwd hacluster
Changing password for user hacluster.
New password:
Retype new password:
passwd: all authentication tokens updated successfully.
Note: Alternatively, to script this process or set the password on a different machine from the one you’re
logged into, you can use the --stdin option for passwd:
Configure Corosync
On either node, use pcs host auth to authenticate as the hacluster user:
Next, use pcs cluster setup on the same node to generate and synchronize the Corosync configuration:
[root@pcmk-1 ~]# pcs cluster setup mycluster pcmk-1 pcmk-2
No addresses specified for host 'pcmk-1', using 'pcmk-1'
No addresses specified for host 'pcmk-2', using 'pcmk-2'
Destroying cluster on hosts: 'pcmk-1', 'pcmk-2'...
pcmk-2: Successfully destroyed cluster
pcmk-1: Successfully destroyed cluster
Requesting remove 'pcsd settings' from 'pcmk-1', 'pcmk-2'
pcmk-1: successful removal of the file 'pcsd settings'
pcmk-2: successful removal of the file 'pcsd settings'
Sending 'corosync authkey', 'pacemaker authkey' to 'pcmk-1', 'pcmk-2'
pcmk-1: successful distribution of the file 'corosync authkey'
pcmk-1: successful distribution of the file 'pacemaker authkey'
pcmk-2: successful distribution of the file 'corosync authkey'
pcmk-2: successful distribution of the file 'pacemaker authkey'
Sending 'corosync.conf' to 'pcmk-1', 'pcmk-2'
pcmk-1: successful distribution of the file 'corosync.conf'
pcmk-2: successful distribution of the file 'corosync.conf'
Cluster has been successfully set up.
Note: If you’d like, you can specify an addr option for each node in the pcs cluster setup command.
This will create an explicit name-to-address mapping for each node in /etc/corosync/corosync.conf,
eliminating the need for hostname resolution via DNS, /etc/hosts, and the like.
[root@pcmk-1 ~]# pcs cluster setup mycluster \
pcmk-1 addr=192.168.122.101 pcmk-2 addr=192.168.122.102
If you received an authorization error for either of those commands, make sure you configured the hacluster
user account on each node with the same password.
The final corosync.conf configuration on each node should look something like the sample in Sample
Corosync Configuration.
Start by taking some time to familiarize yourself with what pcs can do.
[root@pcmk-1 ~]# pcs
Options:
-h, --help Display usage and exit.
-f file Perform actions on file instead of active CIB.
Commands supporting the option use the initial state of
the specified file as their input and then overwrite the
(continues on next page)
Commands:
cluster Configure cluster options and nodes.
resource Manage cluster resources.
stonith Manage fence devices.
constraint Manage resource constraints.
property Manage pacemaker properties.
acl Manage pacemaker access control lists.
qdevice Manage quorum device provider on the local host.
quorum Manage cluster quorum settings.
booth Manage booth (cluster ticket manager).
status View cluster status.
config View and manage cluster configuration.
pcsd Manage pcs daemon.
host Manage hosts known to pcs/pcsd.
node Manage cluster nodes.
alert Manage pacemaker alerts.
client Manage pcsd client configuration.
dr Manage disaster recovery configuration.
tag Manage pacemaker tags.
As you can see, the different aspects of cluster management are separated into categories. To discover the
functionality available in each of these categories, one can issue the command pcs <CATEGORY> help. Below
is an example of all the options available under the status category.
cluster
View current cluster status.
quorum
View current quorum status.
booth
Print current status of booth on the local node.
pcsd [<node>]...
Show current status of pcsd on nodes specified, or on all nodes
configured in the local cluster if no nodes are specified.
xml
View xml version of status (output from crm_mon -r -1 -X).
Additionally, if you are interested in the version and supported cluster stack(s) available with your Pacemaker
installation, run:
Now that Corosync is configured, it is time to start the cluster. The command below will start the corosync
and pacemaker services on both nodes in the cluster.
Note: An alternative to using the pcs cluster start --all command is to issue either of the below
command sequences on each node in the cluster separately:
or
Important: In this example, we are not enabling the corosync and pacemaker services to start at boot.
If a cluster node fails or is rebooted, you will need to run pcs cluster start [<NODENAME> | --all] to
start the cluster on it. While you can enable the services to start at boot (for example, using pcs cluster
enable [<NODENAME> | --all]), requiring a manual start of cluster services gives you the opportunity to
do a post-mortem investigation of a node failure before returning it to the cluster.
We can see here that everything appears normal with our fixed IP address (not a 127.0.0.x loopback
address) listed as the addr, and localhost and connected for the statuses of nodeid 1 and nodeid 2,
respectively.
If you see something different, you might want to start by checking the node’s network, firewall, and SELinux
configurations.
Next, check the membership and quorum APIs:
Membership information
----------------------
Nodeid Votes Name
1 1 pcmk-1 (local)
2 1 pcmk-2
Now that we have confirmed that Corosync is functional, we can check the rest of the stack. Pacemaker has
already been started, so verify the necessary processes are running:
WARNINGS:
No stonith devices and stonith-enabled is not false
Cluster Summary:
* Stack: corosync
* Current DC: pcmk-2 (version 2.1.2-4.el9-ada5c3b36e2) - partition with quorum
* Last updated: Wed Jul 27 00:09:55 2022
* Last change: Wed Jul 27 00:07:08 2022 by hacluster via crmd on pcmk-2
* 2 nodes configured
* 0 resource instances configured
Node List:
* Online: [ pcmk-1 pcmk-2 ]
Daemon Status:
corosync: active/disabled
pacemaker: active/disabled
pcsd: active/enabled
Finally, ensure there are no start-up errors from corosync or pacemaker (aside from messages relating to
not having STONITH configured, which are OK at this point):
Note: Other operating systems may report startup errors in other locations (for example, /var/log/
messages).
Repeat these checks on the other node. The results should be the same.
For those who are not of afraid of XML, you can see the raw cluster configuration and status by using the
pcs cluster cib command.
<configuration>
<crm_config>
<cluster_property_set id="cib-bootstrap-options">
<nvpair id="cib-bootstrap-options-have-watchdog" name="have-watchdog" value="false"/>
<nvpair id="cib-bootstrap-options-dc-version" name="dc-version" value="2.1.2-4.el9-
,→ada5c3b36e2"/>
<lrm id="2">
<lrm_resources/>
</lrm>
</node_state>
<node_state id="1" uname="pcmk-1" in_ccm="true" crmd="online" crm-debug-origin="do_state_
,→transition" join="member" expected="member">
<lrm id="1">
<lrm_resources/>
</lrm>
</node_state>
</status>
</cib>
Before we make any changes, it’s a good idea to check the validity of the configuration.
[root@pcmk-1 ~]# pcs cluster verify --full
Error: invalid cib:
(unpack_resources) error: Resource start-up disabled since no STONITH resources have been defined
(continues on next page)
As you can see, the tool has found some errors. The cluster will not start any resources until we configure
STONITH.
Fencing protects your data from being corrupted, and your application from becoming unavailable, due to
unintended concurrent access by rogue nodes.
Just because a node is unresponsive doesn’t mean it has stopped accessing your data. The only way to be
100% sure that your data is safe, is to use fencing to ensure that the node is truly offline before allowing the
data to be accessed from another node.
Fencing also has a role to play in the event that a clustered service cannot be stopped. In this case, the
cluster uses fencing to force the whole node offline, thereby making it safe to start the service elsewhere.
Fencing is also known as STONITH, an acronym for “Shoot The Other Node In The Head”, since the most
popular form of fencing is cutting a host’s power.
In order to guarantee the safety of your data1 , fencing is enabled by default.
Note: It is possible to tell the cluster not to use fencing, by setting the stonith-enabled cluster property
to false:
[root@pcmk-1 ~]# pcs property set stonith-enabled=false
[root@pcmk-1 ~]# pcs cluster verify --full
However, this is completely inappropriate for a production cluster. It tells the cluster to simply pretend that
failed nodes are safely powered off. Some vendors will refuse to support clusters that have fencing disabled.
Even disabling it for a test cluster means you won’t be able to test real failure scenarios.
The two broad categories of fence device are power fencing, which cuts off power to the target, and fabric
fencing, which cuts off the target’s access to some critical resource, such as a shared disk or access to the
local network.
Power fencing devices include:
• Intelligent power switches
• IPMI
• Hardware watchdog device (alone, or in combination with shared storage used as a “poison pill”
mechanism)
1 If the data is corrupt, there is little point in continuing to make it available.
1. Install the fence agent(s). To see what packages are available, run dnf search fence-. Be sure to
install the package(s) on all cluster nodes.
2. Configure the fence device itself to be able to fence your nodes and accept fencing requests. This
includes any necessary configuration on the device and on the nodes, and any firewall or SELinux
changes needed. Test the communication between the device and your nodes.
3. Find the name of the correct fence agent: pcs stonith list
4. Find the parameters associated with the device: pcs stonith describe <AGENT_NAME>
5. Create a local copy of the CIB: pcs cluster cib stonith_cfg
6. Create the fencing resource: pcs -f stonith_cfg stonith create <STONITH_ID>
<STONITH_DEVICE_TYPE> [STONITH_DEVICE_OPTIONS]
Any flags that do not take arguments, such as --ssl, should be passed as ssl=1.
7. Ensure fencing is enabled in the cluster: pcs -f stonith_cfg property set
stonith-enabled=true
8. If the device does not know how to fence nodes based on their cluster node name, you may also need
to set the special pcmk_host_map parameter. See man pacemaker-fenced for details.
9. If the device does not support the list command, you may also need to set the special pcmk_host_list
and/or pcmk_host_check parameters. See man pacemaker-fenced for details.
10. If the device does not expect the target to be specified with the port parameter, you may also need
to set the special pcmk_host_argument parameter. See man pacemaker-fenced for details.
11. Commit the new configuration: pcs cluster cib-push stonith_cfg
12. Once the fence device resource is running, test it (you might want to stop the cluster on that machine
first): pcs stonith fence <NODENAME>
2.5.4 Example
For this example, assume we have a chassis containing four nodes and a separately powered IPMI device
active on 10.0.0.1. Following the steps above would go something like this:
Step 1: Install the fence-agents-ipmilan package on both nodes.
Step 2: Configure the IP address, authentication credentials, etc. in the IPMI device itself.
Step 3: Choose the fence_ipmilan STONITH agent.
Step 4: Obtain the agent’s possible parameters:
[root@pcmk-1 ~]# pcs stonith describe fence_ipmilan
fence_ipmilan - Fence agent for IPMI
fence_ipmilan is an I/O Fencing agentwhich can be used with machines controlled by IPMI.This agent␣
,→calls support software ipmitool (http://ipmitool.sf.net/). WARNING! This fence agent might␣
,→report success before the node is powered off. You should use -m/method onoff if your fence␣
Stonith options:
auth: IPMI Lan Auth type.
cipher: Ciphersuite to use (same as ipmitool -C parameter)
hexadecimal_kg: Hexadecimal-encoded Kg key for IPMIv2 authentication
ip: IP address or hostname of fencing device
ipport: TCP/UDP port to use for connection with device
lanplus: Use Lanplus to improve security of connection
method: Method to fence
password: Login password or passphrase
password_script: Script to run to retrieve password
plug: IP address or hostname of fencing device (together with --port-as-ip)
privlvl: Privilege level on IPMI device
target: Bridge IPMI requests to the remote target address
username: Login name
quiet: Disable logging to stderr. Does not affect --verbose or --debug-file or logging to syslog.
verbose: Verbose mode. Multiple -v flags can be stacked on the command line (e.g., -vvv) to␣
,→increase verbosity.
verbose_level: Level of debugging detail in output. Defaults to the number of --verbose flags␣
,→specified on the command line, or to 1 if verbose=1 in a stonith device configuration (i.e., on␣
,→stdin).
,→for node2
pcmk_host_check: How to determine which machines are controlled by the device. Allowed values:␣
,→dynamic-list (query the device via the 'list' command), static-list (check the pcmk_host_list␣
,→attribute), status
(query the device via the 'status' command), none (assume every device can␣
,→fence every machine)
pcmk_delay_max: Enable a delay of no more than the time specified before executing fencing␣
,→actions. Pacemaker derives the overall delay by taking the value of pcmk_delay_base andonadding
(continues a␣
next page)
,→random delay value
derived from this random delay value adding a static delay so that the sum is␣
,→kept below the maximum delay.
pcmk_delay_base: Enable a base delay for fencing actions and specify base delay value. This␣
,→enables a static delay for fencing actions, which can help avoid "death matches" where two nodes␣
other at the same time. If pcmk_delay_max is also used, a random delay will be␣
,→added such that the total delay is kept below that value. This can be set to a single time value␣
,→target.
pcmk_action_limit: The maximum number of actions can be performed in parallel on this device␣
,→Cluster property concurrent-fencing=true needs to be configured first. Then use this to specify␣
Default operations:
monitor: interval=60s
After a successful test, login to any rebooted nodes, and start the cluster (with pcs cluster start).
Our first resource will be a floating IP address that the cluster can bring up on either node. Regardless
of where any cluster service(s) are running, end users need to be able to communicate with them at a
consistent address. Here, we will use 192.168.122.120 as the floating IP address, give it the imaginative
name ClusterIP, and tell the cluster to check whether it is still running every 30 seconds.
Warning: The chosen address must not already be in use on the network, on a cluster node or elsewhere.
Do not reuse an IP address one of the nodes already has configured.
Another important piece of information here is ocf:heartbeat:IPaddr2. This tells Pacemaker three things
about the resource you want to add:
• The first field (ocf in this case) is the standard to which the resource agent conforms and where to
find it.
• The second field (heartbeat in this case) is known as the provider. Currently, this field is supported
only for OCF resources. It tells Pacemaker which OCF namespace the resource script is in.
• The third field (IPaddr2 in this case) is the name of the resource agent, the executable file responsible
for starting, stopping, monitoring, and possibly promoting and demoting the resource.
To obtain a list of the available resource standards (the ocf part of ocf:heartbeat:IPaddr2), run:
To obtain a list of the available OCF resource providers (the heartbeat part of ocf:heartbeat:IPaddr2),
run:
Finally, if you want to see all the resource agents available for a specific OCF provider (the IPaddr2 part of
ocf:heartbeat:IPaddr2), run:
If you want to list all resource agents available on the system, run pcs resource list. We’ll skip that here.
Now, verify that the IP resource has been added, and display the cluster’s status to see that it is now active.
Note: There should be a stonith device by now, but it’s okay if it doesn’t look like the one below.
Node List:
* Online: [ pcmk-1 pcmk-2 ]
Daemon Status:
corosync: active/disabled
pacemaker: active/disabled
pcsd: active/enabled
On the node where the ClusterIP resource is running, verify that the address has been added.
Since our ultimate goal is high availability, we should test failover of our new resource before moving on.
First, from the pcs status output in the previous step, find the node on which the IP address is running.
You can see that the status of the ClusterIP resource is Started on a particular node (in this example,
pcmk-2). Shut down pacemaker and corosync on that machine to trigger a failover.
Note: A cluster command such as pcs cluster stop <NODENAME> can be run from any node in the
cluster, not just the node where the cluster services will be stopped. Running pcs cluster stop without a
<NODENAME> stops the cluster services on the local host. The same is true for pcs cluster start and many
other such commands.
Node List:
* Online: [ pcmk-1 ]
* OFFLINE: [ pcmk-2 ]
Daemon Status:
corosync: active/disabled
pacemaker: active/disabled
pcsd: active/enabled
Notice that pcmk-2 is OFFLINE for cluster purposes (its pcsd is still active, allowing it to receive pcs com-
mands, but it is not participating in the cluster).
Also notice that ClusterIP is now running on pcmk-1 – failover happened automatically, and no errors are
reported.
Quorum
If a cluster splits into two (or more) groups of nodes that can no longer communicate with each other
(a.k.a. partitions), quorum is used to prevent resources from starting on more nodes than desired, which
would risk data corruption.
A cluster has quorum when more than half of all known nodes are online in the same partition, or for the
mathematically inclined, whenever the following inequality is true:
total_nodes < 2 * active_nodes
For example, if a 5-node cluster split into 3- and 2-node paritions, the 3-node partition would have quorum
and could continue serving resources. If a 6-node cluster split into two 3-node partitions, neither partition
would have quorum; Pacemaker’s default behavior in such cases is to stop all resources, in order to prevent
data corruption.
Two-node clusters are a special case. By the above definition, a two-node cluster would only have quorum
when both nodes are running. This would make the creation of a two-node cluster pointless. However,
Corosync has the ability to require only one node for quorum in a two-node cluster.
The pcs cluster setup command will automatically configure two_node: 1 in corosync.conf, so a
two-node cluster will “just work”.
Note: You might wonder, “What if the nodes in a two-node cluster can’t communicate with each
other? Wouldn’t this two_node: 1 setting create a split-brain scenario, in which each node has quorum
separately and they both try to manage the same cluster resources?”
As long as fencing is configured, there is no danger of this. If the nodes lose contact with each other, each
node will try to fence the other node. Resource management is disabled until fencing succeeds; neither
node is allowed to start, stop, promote, or demote resources.
After fencing succeeds, the surviving node can safely recover any resources that were running on the fenced
node.
If the fenced node boots up and rejoins the cluster, it does not have quorum until it can communicate with
the surviving node at least once. This prevents “fence loops,” in which a node gets fenced, reboots, rejoins
the cluster, and fences the other node. This protective behavior is controlled by the wait_for_all: 1
option, which is enabled automatically when two_node: 1 is configured.
If you are using a different cluster shell, you may have to configure corosync.conf appropriately yourself.
Now, simulate node recovery by restarting the cluster stack on pcmk-2, and check the cluster’s status. (It
may take a little while before the cluster gets going on the node, but it eventually will look like the below.)
[root@pcmk-1 ~]# pcs status
Cluster name: mycluster
Cluster Summary:
* Stack: corosync
* Current DC: pcmk-1 (version 2.1.2-4.el9-ada5c3b36e2) - partition with quorum
* Last updated: Wed Jul 27 00:45:17 2022
* Last change: Wed Jul 27 00:45:01 2022 by root via cibadmin on pcmk-1
* 2 nodes configured
* 2 resource instances configured
Node List:
* Online: [ pcmk-1 pcmk-2 ]
Daemon Status:
corosync: active/disabled
pacemaker: active/disabled
pcsd: active/enabled
In most circumstances, it is highly desirable to prevent healthy resources from being moved around the
cluster. Moving resources almost always requires a period of downtime. For complex services such as
databases, this period can be quite long.
To address this, Pacemaker has the concept of resource stickiness, which controls how strongly a service
prefers to stay running where it is. You may like to think of it as the “cost” of any downtime. By default,1
1 Zero resource stickiness is Pacemaker’s default if you remove the default value that was created at cluster setup time, or if
Pacemaker assumes there is zero cost associated with moving resources and will do so to achieve “optimal”2
resource placement. We can specify a different stickiness for every resource, but it is often sufficient to change
the default.
In AlmaLinux 9, the cluster setup process automatically configures a default resource stickiness score of
1. This is sufficient to prevent healthy resources from moving around the cluster when there are no user-
configured constraints that influence where Pacemaker prefers to run those resources.
For this example, we will increase the default resource stickiness to 100. Later in this guide, we will configure
a location constraint with a score lower than the default resource stickiness.
Now that we have a basic but functional active/passive two-node cluster, we’re ready to add some real
services. We’re going to start with Apache HTTP Server because it is a feature of many clusters and is
relatively simple to configure.
Before continuing, we need to make sure Apache is installed on both hosts. We will also allow the cluster to
use the wget tool (this is the default, but curl is also supported) to check the status of the Apache server.
We’ll install httpd (Apache) and wget now.
Important: Do not enable the httpd service. Services that are intended to be managed via the cluster
software should never be managed by the OS. It is often useful, however, to manually start the service,
verify that it works, then stop it again, before adding it to the cluster. This allows you to resolve any
non-cluster-related problems before continuing. Since this is a simple example, we’ll skip that step here.
We need to create a page for Apache to serve. On AlmaLinux 9, the default Apache document root is
/var/www/html, so we’ll create an index file there. For the moment, we will simplify things by serving a
static site and manually synchronizing the data between the two nodes, so run this command on both nodes:
you’re using an older version of Pacemaker that doesn’t create this value at setup time.
2 Pacemaker’s default definition of “optimal” may not always agree with yours. The order in which Pacemaker processes
lists of resources and nodes creates implicit preferences in situations where the administrator has not explicitly specified them.
Pacemaker uses the apache resource agent to monitor the health of your Apache instance via the
server-status URL, and to recover the instance if it fails. On both nodes, configure this URL as fol-
lows:
Note: If you are using a different operating system, server-status may already be enabled or may be
configurable in a different location. If you are using a version of Apache HTTP Server less than 2.4, the
syntax will be different.
At this point, Apache is ready to go, and all that needs to be done is to add it to the cluster. Let’s call the
resource WebSite. We need to use an OCF resource agent called apache in the heartbeat namespace1 . The
script’s only required parameter is the path to the main Apache configuration file, and we’ll tell the cluster
to check once a minute that Apache is still running.
By default, the operation timeout for all resources’ start, stop, monitor, and other operations is 20 seconds.
In many cases, this timeout period is less than a particular resource’s advised timeout period. For the
purposes of this tutorial, we will adjust the global operation timeout default to 240 seconds.
Note: In a production cluster, it is usually better to adjust each resource’s start, stop, and monitor timeouts
to values that are appropriate for the behavior observed in your environment, rather than adjusting the global
1 Compare the key used here, ocf:heartbeat:apache with the one we used earlier for the IP address, ocf:heartbeat:IPaddr2.
default.
Note: If you use a tool like pcs to create a resource, its operations may be automatically configured with
explicit timeout values that override the Pacemaker built-in default value of 20 seconds. If the resource
agent’s metadata contains suggested values for the operation timeouts in a particular format, pcs reads
those values and adds them to the configuration at resource creation time.
Node List:
* Online: [ pcmk-1 pcmk-2 ]
Daemon Status:
corosync: active/disabled
pacemaker: active/disabled
pcsd: active/enabled
Wait a moment, the WebSite resource isn’t running on the same host as our IP address!
Note: If, in the pcs status output, you see the WebSite resource has failed to start, then you’ve likely
not enabled the status URL correctly. You can check whether this is the problem by running:
wget -O - http://localhost/server-status
If you see Not Found or Forbidden in the output, then this is likely the problem. Ensure that the <Location
/server-status> block is correct.
To reduce the load on any one machine, Pacemaker will generally try to spread the configured resources
across the cluster nodes. However, we can tell the cluster that two resources are related and need to run on
the same host (or else one of them should not run at all, if they cannot run on the same node). Here, we
instruct the cluster that WebSite can only run on the host where ClusterIP is active.
To achieve this, we use a colocation constraint that indicates it is mandatory for WebSite to run on the
same node as ClusterIP. The “mandatory” part of the colocation constraint is indicated by using a score
of INFINITY. The INFINITY score also means that if ClusterIP is not active anywhere, WebSite will not be
permitted to run.
Note: If ClusterIP is not active anywhere, WebSite will not be permitted to run anywhere.
Note: INFINITY is the default score for a colocation constraint. If you don’t specify a score, INFINITY will
be used automatically.
Important: Colocation constraints are “directional”, in that they imply certain things about the order
in which the two resources will have a location chosen. In this case, we’re saying that WebSite needs to
be placed on the same machine as ClusterIP, which implies that the cluster must know the location of
ClusterIP before choosing a location for WebSite
[root@pcmk-1 ~]# pcs constraint colocation add WebSite with ClusterIP INFINITY
[root@pcmk-1 ~]# pcs constraint
Location Constraints:
Ordering Constraints:
Colocation Constraints:
WebSite with ClusterIP (score:INFINITY)
Ticket Constraints:
[root@pcmk-1 ~]# pcs status
Cluster name: mycluster
Cluster Summary:
* Stack: corosync
* Current DC: pcmk-1 (version 2.1.2-4.el9-ada5c3b36e2) - partition with quorum
* Last updated: Wed Jul 27 00:49:33 2022
* Last change: Wed Jul 27 00:49:16 2022 by root via cibadmin on pcmk-1
* 2 nodes configured
* 3 resource instances configured
Node List:
* Online: [ pcmk-1 pcmk-2 ]
Daemon Status:
corosync: active/disabled
pacemaker: active/disabled
pcsd: active/enabled
Like many services, Apache can be configured to bind to specific IP addresses on a host or to the wildcard IP
address. If Apache binds to the wildcard, it doesn’t matter whether an IP address is added before or after
Apache starts; Apache will respond on that IP just the same. However, if Apache binds only to certain IP
address(es), the order matters: If the address is added after Apache starts, Apache won’t respond on that
address.
To be sure our WebSite responds regardless of Apache’s address configuration, we need to make sure
ClusterIP not only runs on the same node, but also starts before WebSite. A colocation constraint en-
sures only that the resources run together; it doesn’t affect order in which the resources are started or
stopped.
We do this by adding an ordering constraint. By default, all order constraints are mandatory. This means,
for example, that if ClusterIP needs to stop, then WebSite must stop first (or already be stopped); and if
WebSite needs to start, then ClusterIP must start first (or already be started). This also implies that the
recovery of ClusterIP will trigger the recovery of WebSite, causing it to be restarted.
Note: The default action in an order constraint is start If you don’t specify an action, as in the example
above, pcs automatically uses the start action.
Note: We could have placed the ClusterIP and WebSite resources into a resource group instead of
configuring constraints. A resource group is a compact and intuitive way to organize a set of resources into
a chain of colocation and ordering constraints. We will omit that in this guide; see the Pacemaker Explained
document for more details.
Pacemaker does not rely on any sort of hardware symmetry between nodes, so it may well be that one
machine is more powerful than the other.
In such cases, you may want to host the resources on the more powerful node when it is available, to have
the best performance – or you may want to host the resources on the less powerful node when it’s available,
so you don’t have to worry about whether you can handle the load after a failover.
To do this, we create a location constraint.
In the location constraint below, we are saying the WebSite resource prefers the node pcmk-2 with a score
of 50. Here, the score indicates how strongly we’d like the resource to run at this location.
Node List:
* Online: [ pcmk-1 pcmk-2 ]
Daemon Status:
corosync: active/disabled
pacemaker: active/disabled
pcsd: active/enabled
There are always times when an administrator needs to override the cluster and force resources to move to
a specific location. In this example, we will force the WebSite to move to pcmk-2.
We will use the pcs resource move command to create a temporary constraint with a score of INFINITY.
While we could update our existing constraint, using move allows pcs to get rid of the temporary constraint
automatically after the resource has moved to its destination. Note in the below that the pcs constraint
output after the move command is the same as before.
Node List:
* Online: [ pcmk-1 pcmk-2 ]
Daemon Status:
corosync: active/disabled
pacemaker: active/disabled
pcsd: active/enabled
To remove the constraint with the score of 50, we would first get the constraint’s ID using pcs constraint
--full, then remove it with pcs constraint remove and the ID. We won’t show those steps here, but feel
free to try it on your own, with the help of the pcs man page if necessary.
Even if you’re serving up static websites, having to manually synchronize the contents of that website to all
the machines in the cluster is not ideal. For dynamic websites, such as a wiki, it’s not even an option. Not
everyone can afford network-attached storage, but somehow the data needs to be kept in sync.
Enter DRBD, which can be thought of as network-based RAID-11 .
DRBD itself is included in the upstream kernel2 , but we do need some utilities to use it effectively.
1 See http://www.drbd.org for details.
2 Since version 2.6.33
AlmaLinux does not ship these utilities, so we need to enable a third-party repository to get them. Supported
packages for many OSes are available from DRBD’s maker LINBIT, but here we’ll use the free ELRepo
repository.
On both nodes, import the ELRepo package signing key, and enable the repository:
[root@pcmk-1 ~]# rpm --import https://www.elrepo.org/RPM-GPG-KEY-elrepo.org
[root@pcmk-1 ~]# dnf install -y https://www.elrepo.org/elrepo-release-9.el9.elrepo.noarch.rpm
DRBD will not be able to run under the default SELinux security policies. If you are familiar with SELinux,
you can modify the policies in a more fine-grained manner, but here we will simply exempt DRBD processes
from SELinux control:
# dnf install -y policycoreutils-python-utils
# semanage permissive -a drbd_t
We will configure DRBD to use port 7789, so allow that port from each host to the other:
[root@pcmk-1 ~]# firewall-cmd --permanent --add-rich-rule='rule family="ipv4" \
source address="192.168.122.102" port port="7789" protocol="tcp" accept'
success
[root@pcmk-1 ~]# firewall-cmd --reload
success
Note: In this example, we have only two nodes, and all network traffic is on the same LAN. In production,
it is recommended to use a dedicated, isolated network for cluster-related traffic, so the firewall configuration
would likely be different; one approach would be to add the dedicated network interfaces to the trusted zone.
Note: If the firewall-cmd --add-rich-rule command fails with Error: INVALID_RULE: unknown
element ensure that there is no space at the beginning of the second line of the command.
DRBD will need its own block device on each node. This can be a physical disk partition or logical volume,
of whatever size you need for your data. For this document, we will use a 512MiB logical volume, which is
more than sufficient for a single HTML file and (later) GFS2 metadata.
[root@pcmk-1 ~]# vgs
VG #PV #LV #SN Attr VSize VFree
almalinux_pcmk-1 1 2 0 wz--n- <19.00g <13.00g
Repeat for the second node, making sure to use the same size:
[root@pcmk-1 ~]# ssh pcmk-2 -- lvcreate --name drbd-demo --size 512M cs_pcmk-2
Logical volume "drbd-demo" created.
There is no series of commands for building a DRBD configuration, so simply run this on both nodes to use
this sample configuration:
net {
protocol C;
allow-two-primaries yes;
fencing resource-and-stonith;
verify-alg sha1;
}
handlers {
fence-peer "/usr/lib/drbd/crm-fence-peer.9.sh";
unfence-peer "/usr/lib/drbd/crm-unfence-peer.9.sh";
}
on "pcmk-1" {
disk "/dev/almalinux_pcmk-1/drbd-demo";
node-id 0;
}
on "pcmk-2" {
disk "/dev/almalinux_pcmk-2/drbd-demo";
node-id 1;
}
connection {
host "pcmk-1" address 192.168.122.101:7789;
host "pcmk-2" address 192.168.122.102:7789;
}
}
END
Important: Edit the file to use the hostnames, IP addresses, and logical volume paths of your nodes if
they differ from the ones used in this guide.
Note: Detailed information on the directives used in this configuration (and other alternatives) is available
in the DRBD User’s Guide. The guide contains a wealth of information on such topics as core DRBD
concepts, replication settings, network connection options, quorum, split- brain handling, administrative
tasks, troubleshooting, and responding to disk or node failures, among others.
The allow-two-primaries: yes option would not normally be used in an active/passive cluster. We are
adding it here for the convenience of changing to an active/active cluster later.
--== Thank you for participating in the global usage survey ==--
The server's response is:
Because we have not yet initialized the data, this node’s data is marked as Inconsistent Because we have
not yet initialized the second node, the pcmk-2 connection is Connecting (waiting for connection).
Now, repeat the above commands on the second node, starting with creating wwwdata.res. After giving it
time to connect, when we check the status of the first node, it shows:
You can see that pcmk-2 connection:Connecting longer appears in the output, meaning the two DRBD
nodes are communicating properly, and both nodes are in Secondary role with Inconsistent data.
To make the data consistent, we need to tell DRBD which node should be considered to have the correct
data. In this case, since we are creating a new resource, both have garbage, so we’ll just pick pcmk-1 and
run this command on it:
Note: If you are using a different version of DRBD, the required syntax may be different. See the
documentation for your version for how to perform these commands.
We can see that the first node has the Primary role, its partner node has the Secondary role, the first node’s
data is now considered UpToDate, and the partner node’s data is still Inconsistent.
After a while, the sync should finish, and you’ll see something like:
Both sets of data are now UpToDate, and we can proceed to creating and populating a filesystem for our
WebSite resource’s documents.
On the node with the primary role (pcmk-1 in this example), create a filesystem on the DRBD device:
Note: In this example, we create an xfs filesystem with no special options. In a production environment,
you should choose a filesystem type and options that are suitable for your application.
Mount the newly created filesystem, populate it with our web document, give it the same SELinux policy as
the web document root, then unmount it (the cluster will handle mounting and unmounting it later):
One handy feature pcs has is the ability to queue up several changes into a file and commit those changes
all at once. To do this, start by populating the file with the current raw XML config from the CIB.
Using pcs’s -f option, make changes to the configuration saved in the drbd_cfg file. These changes will not
be seen by the cluster until the drbd_cfg file is pushed into the live cluster’s CIB later.
Here, we create a cluster resource for the DRBD device, and an additional clone resource to allow the resource
to run on both nodes at the same time.
After you are satisfied with all the changes, you can commit them all at once by pushing the drbd_cfg file
into the live CIB.
Note: All the updates above can be done in one shot as follows:
Let’s see what the cluster did with the new configuration:
We can see that WebData-clone (our DRBD device) is running as Promoted (DRBD’s primary role) on
pcmk-1 and Unpromoted (DRBD’s secondary role) on pcmk-2.
Important: The resource agent should load the DRBD module when needed if it’s not already loaded. If
that does not happen, configure your operating system to load the module at boot time. For AlmaLinux 9,
you would run this on both nodes:
Now that we have a working DRBD device, we need to mount its filesystem.
In addition to defining the filesystem, we also need to tell the cluster where it can be located (only on the
DRBD Primary) and when it is allowed to start (after the Primary was promoted).
We are going to take a shortcut when creating the resource this time. Instead of explicitly saying we want
the ocf:heartbeat:Filesystem script, we are only going to ask for Filesystem. We can do this because
we know there is only one resource script named Filesystem available to Pacemaker, and that pcs is smart
enough to fill in the ocf:heartbeat: portion for us correctly in the configuration. If there were multiple
Filesystem scripts from different OCF providers, we would need to specify the exact one we wanted.
Once again, we will queue our changes to a file and then push the new configuration to the cluster as the
final step.
We also need to tell the cluster that Apache needs to run on the same machine as the filesystem and that it
must be active before Apache can start.
[root@pcmk-1 ~]# pcs -f fs_cfg constraint colocation add WebSite with WebFS
[root@pcmk-1 ~]# pcs -f fs_cfg constraint order WebFS then WebSite
Adding WebFS WebSite (kind: Mandatory) (Options: first-action=start then-action=start)
After reviewing the new configuration, upload it and watch the cluster put it into effect.
[root@pcmk-1 ~]# pcs cluster cib-push fs_cfg --config
CIB updated
[root@pcmk-1 ~]# pcs resource status
* ClusterIP (ocf:heartbeat:IPaddr2): Started pcmk-2
* WebSite (ocf:heartbeat:apache): Started pcmk-2
* Clone Set: WebData-clone [WebData] (promotable):
* Promoted: [ pcmk-2 ]
* Unpromoted: [ pcmk-1 ]
* WebFS (ocf:heartbeat:Filesystem): Started pcmk-2
[root@pcmk-1 ~]# pcs resource config
Resource: ClusterIP (class=ocf provider=heartbeat type=IPaddr2)
Attributes: cidr_netmask=24 ip=192.168.122.120
Operations: monitor interval=30s (ClusterIP-monitor-interval-30s)
start interval=0s timeout=20s (ClusterIP-start-interval-0s)
stop interval=0s timeout=20s (ClusterIP-stop-interval-0s)
Resource: WebSite (class=ocf provider=heartbeat type=apache)
Attributes: configfile=/etc/httpd/conf/httpd.conf statusurl=http://localhost/server-status
Operations: monitor interval=1min (WebSite-monitor-interval-1min)
start interval=0s timeout=40s (WebSite-start-interval-0s)
stop interval=0s timeout=60s (WebSite-stop-interval-0s)
Clone: WebData-clone
Meta Attrs: clone-max=2 clone-node-max=1 notify=true promotable=true promoted-max=1 promoted-
,→node-max=1
Previously, we used pcs cluster stop pcmk-2 to stop all cluster services on pcmk-2, failing over the cluster
resources, but there is another way to safely simulate node failure.
We can put the node into standby mode. Nodes in this state continue to run corosync and pacemaker but
are not allowed to run resources. Any resources found active there will be moved elsewhere. This feature
can be particularly useful when performing system administration tasks such as updating packages used by
cluster resources.
Put the active node into standby mode, and observe the cluster move all the resources to the other node.
The node’s status will change to indicate that it can no longer host resources, and eventually all the resources
will move.
[root@pcmk-1 ~]# pcs node standby pcmk-2
[root@pcmk-1 ~]# pcs status
Cluster name: mycluster
Cluster Summary:
* Stack: corosync
* Current DC: pcmk-1 (version 2.1.2-4.el9-ada5c3b36e2) - partition with quorum
* Last updated: Wed Jul 27 05:28:01 2022
* Last change: Wed Jul 27 05:27:57 2022 by root via cibadmin on pcmk-1
* 2 nodes configured
* 6 resource instances configured
Node List:
* Node pcmk-2: standby
* Online: [ pcmk-1 ]
Daemon Status:
corosync: active/disabled
pacemaker: active/disabled
pcsd: active/enabled
Once we’ve done everything we needed to on pcmk-2 (in this case nothing, we just wanted to see the resources
move), we can unstandby the node, making it eligible to host resources again.
[root@pcmk-1 ~]# pcs node unstandby pcmk-2
[root@pcmk-1 ~]# pcs status
Cluster name: mycluster
Cluster Summary:
* Stack: corosync
* Current DC: pcmk-1 (version 2.1.2-4.el9-ada5c3b36e2) - partition with quorum
* Last updated: Wed Jul 27 05:28:50 2022
* Last change: Wed Jul 27 05:28:47 2022 by root via cibadmin on pcmk-1
* 2 nodes configured
* 6 resource instances configured
Node List:
* Online: [ pcmk-1 pcmk-2 ]
Daemon Status:
corosync: active/disabled
pacemaker: active/disabled
pcsd: active/enabled
Notice that pcmk-2 is back to the Online state, and that the cluster resources stay where they are due to
our resource stickiness settings configured earlier.
The primary requirement for an active/active cluster is that the data required for your services is available,
simultaneously, on both machines. Pacemaker makes no requirement on how this is achieved; you could use
a Storage Area Network (SAN) if you had one available, but since DRBD supports multiple Primaries, we
can continue to use it here.
The only hitch is that we need to use a cluster-aware filesystem. The one we used earlier with DRBD, xfs,
is not one of those. Both OCFS2 and GFS2 are supported; here, we will use GFS2.
On both nodes, install Distributed Lock Manager (DLM) and the GFS2 command- line utilities required by
cluster filesystems:
The DLM control daemon needs to run on both nodes, so we’ll start by creating a resource for it (using the
ocf:pacemaker:controld resource agent), and clone it:
Activate our new configuration, and see how the cluster responds:
Before we do anything to the existing partition, we need to make sure it is unmounted. We do this by telling
the cluster to stop the WebFS resource. This will ensure that other resources (in our case, WebSite) using
WebFS are not only stopped, but stopped in the correct order.
You can see that both WebSite and WebFS have been stopped, and that pcmk-1 is currently running the
promoted instance for the DRBD device.
Now we can create a new GFS2 filesystem on the DRBD device.
Warning: This will erase all previous content stored on the DRBD device. Ensure you have a copy of
any important data.
Important: Run the next command on whichever node has the DRBD Primary role. Otherwise, you will
receive the message:
/dev/drbd1: Read-only file system
Now we can (re-)populate the new filesystem with data (web pages). We’ll create yet another variation on
our home page.
GFS2 requires that DLM be running, so we also need to set up new colocation and ordering constraints for
it:
We also need to update the no-quorum-policy property to freeze. By default, the value of
no-quorum-policy is set to stop indicating that once quorum is lost, all the resources on the remain-
ing partition will immediately be stopped. Typically this default is the safest and most optimal option,
but unlike most resources, GFS2 requires quorum to function. When quorum is lost both the applications
using the GFS2 mounts and the GFS2 mount itself cannot be correctly stopped. Any attempts to stop these
resources without quorum will fail, which will ultimately result in the entire cluster being fenced every time
quorum is lost.
To address this situation, set no-quorum-policy to freeze when GFS2 is in use. This means that when
quorum is lost, the remaining partition will do nothing until quorum is regained.
Now that we have a cluster filesystem ready to go, we can configure the cluster so both nodes mount the
filesystem.
Clone the Filesystem resource in a new configuration. Notice how pcs automatically updates the relevant
constraints again.
Tell the cluster that it is now allowed to promote both instances to be DRBD Primary.
Finally, load our configuration to the cluster, and re-enable the WebFS resource (which we disabled earlier).
After all the processes are started, the status should look similar to this.
Node List:
* Online: [ pcmk-1 pcmk-2 ]
Daemon Status:
corosync: active/disabled
pacemaker: active/disabled
pcsd: active/enabled
Resources:
Resource: ClusterIP (class=ocf provider=heartbeat type=IPaddr2)
Attributes: cidr_netmask=24 ip=192.168.122.120
Operations: monitor interval=30s (ClusterIP-monitor-interval-30s)
start interval=0s timeout=20s (ClusterIP-start-interval-0s)
stop interval=0s timeout=20s (ClusterIP-stop-interval-0s)
Resource: WebSite (class=ocf provider=heartbeat type=apache)
Attributes: configfile=/etc/httpd/conf/httpd.conf statusurl=http://localhost/server-status
Operations: monitor interval=1min (WebSite-monitor-interval-1min)
start interval=0s timeout=40s (WebSite-start-interval-0s)
stop interval=0s timeout=60s (WebSite-stop-interval-0s)
Clone: WebData-clone
Meta Attrs: clone-max=2 clone-node-max=1 notify=true promotable=true promoted-max=2 promoted-
,→node-max=1 (continues on next page)
Stonith Devices:
Resource: fence_dev (class=stonith type=some_fence_agent)
Attributes: pcmk_delay_base=pcmk-1:5s;pcmk-2:0s pcmk_host_map=pcmk-1:almalinux9-1;pcmk-
,→2:almalinux9-2
Location Constraints:
Resource: WebSite
Enabled on:
Node: pcmk-2 (score:50) (id:location-WebSite-pcmk-2-50)
Ordering Constraints:
start ClusterIP then start WebSite (kind:Mandatory) (id:order-ClusterIP-WebSite-mandatory)
promote WebData-clone then start WebFS-clone (kind:Mandatory) (id:order-WebData-clone-WebFS-
,→mandatory)
Alerts:
No alerts defined
Resources Defaults:
Meta Attrs: build-resource-defaults
resource-stickiness=100
Operations Defaults:
Meta Attrs: op_defaults-meta_attributes
Cluster Properties:
cluster-infrastructure: corosync
cluster-name: mycluster
dc-version: 2.1.2-4.el9-ada5c3b36e2
have-watchdog: false
last-lrm-refresh: 1658896047
no-quorum-policy: freeze
stonith-enabled: true
Tags:
No tags defined
Quorum:
Options:
The output shows cluster-wide configuration options, as well as some baseline- level state information. The
output includes:
• cluster-infrastructure - the cluster communications layer in use
• cluster-name - the cluster name chosen by the administrator when the cluster was created
• dc-version - the version (including upstream source-code hash) of pacemaker used on the Designated
Controller, which is the node elected to determine what actions are needed when events occur
• have-watchdog - whether watchdog integration is enabled; set automatically when SBD is enabled
• stonith-enabled - whether nodes may be fenced as part of recovery
2.10.4 Resources
Default Options
This shows cluster option defaults that apply to every resource that does not explicitly set the option itself.
Above:
• resource-stickiness - Specify how strongly a resource prefers to remain on its current node. Alter-
natively, you can view this as the level of aversion to moving healthy resources to other machines.
Fencing
Service Address
Users of the services provided by the cluster require an unchanging address with which to access it.
Here, we define the DRBD service and specify which DRBD resource (from /etc/drbd.d/\*.res) it should
manage. We make it a promotable clone resource and, in order to have an active/active setup, allow both
instances to be promoted at the same time. We also set the notify option so that the cluster will tell the
drbd agent when its peer changes state.
Cluster Filesystem
The cluster filesystem ensures that files are read and written correctly. We need to specify the block device
(provided by DRBD), where we want it mounted and that we are using GFS2. Again, it is a clone because
it is intended to be active on both nodes. The additional constraints ensure that it can only be started on
nodes with active DLM and DRBD instances.
[root@pcmk-1 ~]# pcs resource config WebFS-clone
Clone: WebFS-clone
Resource: WebFS (class=ocf provider=heartbeat type=Filesystem)
Attributes: device=/dev/drbd1 directory=/var/www/html fstype=gfs2
Operations: monitor interval=20s timeout=40s (WebFS-monitor-interval-20s)
start interval=0s timeout=60s (WebFS-start-interval-0s)
stop interval=0s timeout=60s (WebFS-stop-interval-0s)
[root@pcmk-1 ~]# pcs constraint ref WebFS-clone
Resource: WebFS-clone
colocation-WebFS-WebData-clone-INFINITY
colocation-WebSite-WebFS-INFINITY
colocation-WebFS-dlm-clone-INFINITY
order-WebData-clone-WebFS-mandatory
order-WebFS-WebSite-mandatory
order-dlm-clone-WebFS-mandatory
Apache
Lastly, we have the actual service, Apache. We need only tell the cluster where to find its main configuration
file and restrict it to running on a node that has the required filesystem mounted and the IP address active.
[root@pcmk-1 ~]# pcs resource config WebSite
Resource: WebSite (class=ocf provider=heartbeat type=apache)
Attributes: configfile=/etc/httpd/conf/httpd.conf statusurl=http://localhost/server-status
Operations: monitor interval=1min (WebSite-monitor-interval-1min)
start interval=0s timeout=40s (WebSite-start-interval-0s)
stop interval=0s timeout=60s (WebSite-stop-interval-0s)
[root@pcmk-1 ~]# pcs constraint ref WebSite
(continues on next page)
totem {
version: 2
cluster_name: mycluster
transport: knet
crypto_cipher: aes256
crypto_hash: sha256
cluster_uuid: e592f61f916943978bdf7c046a195980
}
nodelist {
node {
ring0_addr: pcmk-1
name: pcmk-1
nodeid: 1
}
node {
ring0_addr: pcmk-2
name: pcmk-2
nodeid: 2
}
}
quorum {
provider: corosync_votequorum
two_node: 1
}
logging {
to_logfile: yes
logfile: /var/log/cluster/corosync.log
to_syslog: yes
timestamp: on
}
• SuSE has a comprehensive guide to cluster commands (though using the crmsh command-line shell
rather than pcs) at: https://www.suse.com/documentation/sle_ha/book_sleha/data/book_sleha.
html
• Corosync http://www.corosync.org/
THREE
INDEX
• genindex
• search
73
Clusters from Scratch, Release 2.1.7
74 Chapter 3. Index
INDEX
A O
Apache HTTP Server, 44 ordering constraint, 47
resource, 45
status URL, 45 R
resource
C Apache HTTP Server, 45
clone IP address, 40
filesystem, 64 moving manually, 49
colocation constraint, 46
constraint S
colocation, 46 SSH, 26
location, 48 key, 26
ordering, 47 stickiness, 43
storage
D active/active, 60
DLM, 60 DRBD, 50
DRBD
storage, 50
F
fencing, 36
device, 36
filesystem
clone, 64
GFS2, 60
firewall, 28
G
GFS2, 60
I
IP address
resource, 40
L
location constraint, 48
N
node
short name, 25
75