7.3. Backup Fencing Configuration Procedure


This section provides the procedure for adding two APC fence devices to each node of cluster backupclust, configured as a single main fence method to ensure that the fencing is successful. This procedure also configures an IPMI management board as a backup fence device for each node of cluster backupclust.
This example uses the same APC switches for each cluster node. The APC switches will first be configured as shared fence devices. After configuring the APC switches as shared fence devices, the APC devices and the IPMI devices will be added as fence devices for each node in the cluster.

7.3.1. Configuring the APC switches as shared fence devices

To configure the first APC switch as a shared fence device named pwr01 using Conga, perform the following procedure:
  1. As an administrator of luci Select the cluster tab. This displays the Choose a cluster to administer screen.
  2. From the Choose a cluster to administer screen, you should see the previously configured cluster backupclust displayed, along with the nodes that make up the cluster. Click on backupclust to select the cluster.
  3. At the detailed menu for the cluster backupclust (below the clusters menu on the left side of the screen), click Shared Fence Devices. Clicking Shared Fence Devices causes the display of any shared fence devices previously configured for a cluster and causes the display of menu items for fence device configuration: Add a Fence Device and Configure a Fence Device.
  4. Click Add a Fence Device. Clicking Add a Fence Device causes the Add a Sharable Fence Device page to be displayed.
  5. At the Add a Sharable Fence Device page, click the drop-down box under Fencing Type and select APC Power Switch. This causes Conga to display the components of an APC Power Switch fencing type, as shown in Figure 3.2, “Adding a Sharable Fence Device”.
    Adding a Sharable Fence Device

    Figure 7.2. Adding a Sharable Fence Device

  6. For Name, enter pwr01.
  7. For IP Address, enter 10.15.86.96.
  8. For Login, enter apclogin.
  9. For Password, enter apcpword.
  10. For Password Script, leave blank.
  11. Click Add this shared fence device.
    Clicking Add this shared fence device temporarily displays a a progress page. After the fence device has been added, the detailed cluster properties menu is updated with the fence device under Configure a Fence Device.
To configure the second APC switch as a shared fence device named pwr02, perform the following procedure:
  1. After configuring the first APC switch as shared fence device pwr01, click Add a Fence Device from the detailed menu for the cluster backupclust (below the clusters menu on the left side of the screen). This displays the Add a Sharable Fence Device page.
  2. At the Add a Sharable Fence Device page, click the drop-down box under Fencing Type and select APC Power Switch. This causes Conga to display the components of an APC Power Switch fencing type.
  3. For Name, enter pwr02.
  4. For IP Address, enter 10.15.86.97.
  5. For Login, enter apclogin.
  6. For Password, enter apcpword.
  7. For Password Script, leave blank.
  8. Click Add this shared fence device.
    Clicking Add this shared fence device causes a progress page to be displayed temporarily. After the fence device has been added, the detailed cluster properties menu is updated with the fence device under Configure a Fence Device.

7.3.2. Configuring Fencing on the First Cluster Node

After configuring the APC switches as shared fence devices, use the following procedure to configure the first APC switch, pwr01, as the first fence device for node clusternode1.example.com.
  1. At the detailed menu for the cluster backupclust (below the clusters menu), click Nodes. Clicking Nodes causes the display of the status of each node in backupclust.
  2. At the bottom of the display for node clusternode1.example.com, click Manage Fencing for this Node. This displays the configuration screen for node clusternode1.example.com.
  3. At the Main Fencing Method display, click Add a fence device to this level. This causes a dropdown menu to display.
  4. From the dropdown menu, the pwr01 and pwr02 fence devices you have already created should display as one of the menu options under Use an Existing Fence Device. Select pwr01 (APC Power Device). This causes a fence device configuration menu to display with the Name, IP Address, Login,Password, and Password Script values already configured, as defined when you configured pwr01 as a shared fence device. (The Password value does not display, but you may not alter it.) This is shown in Figure 7.3, “Adding Fence Device pwr01 to a Node”.
    Adding Fence Device pwr01 to a Node

    Figure 7.3. Adding Fence Device pwr01 to a Node

  5. For Port, enter 1. Do not enter any value for Switch.
Before updating the main fence properties for this node, use the following procedure to add pwr02 as the second fence device of the main fencing method for node clusternode1.example.com.
  1. Beneath the configuration information for pwr01 that you have entered, click Add a fence device to this level. This displays the dropdown menu again.
  2. From the dropdown menu, select pwr02 (APC Power Device). This causes a fence device configuration menu to display with the Name, IP Address, Login,Password, and Password Script values already configured, as defined when you configured pwr02 as a shared fence device. This is shown in Figure 7.4, “Adding Fence Device pwr02 to a Node”.
    Adding Fence Device pwr02 to a Node

    Figure 7.4. Adding Fence Device pwr02 to a Node

  3. For Port, enter 1. Do not enter any value for Switch.
After entering the configuration information for both power sources to use as fence devices, you can update the main fence properties using the following procedure.
  1. Click Update main fence properties. This causes a confirmation screen to be displayed.
  2. On the confirmation screen, Click OK. A progress page is displayed after which the display returns to the status page for clusternode2.example.com in cluster backupclust.
After configuring the main fence method for clusternode1.example.com and updating the main fence properties, use the following procedure to configure the IPMI management board for node clusternode1.example.com as the backup fencing method for that node:
  1. At the Backup Fencing Method display, click Add a fence device to this level. This causes a dropdown manu to display.
  2. From the dropdown menu, under Create a new Fence Device, select IPMI Lan. This displays a fence device configuration menu, as shown in Figure 7.5, “Configuring a Backup Fencing Method”.
    Configuring a Backup Fencing Method

    Figure 7.5. Configuring a Backup Fencing Method

  3. For Name, enter ipmifence1.
  4. For IP Address, enter 10.15.86.50.
  5. For Login, enter ipmilogin.
  6. For Password, enter ipmipword.
  7. For Password Script, leave the field blank.
  8. For Authentication type, enterpassword. This field specifies the IPMI authentication type. Possible values for this field are none, password, md2, or md5.
  9. Leave the Use Lanplus field blank. You would check this field if your fence device is a Lanplus-capable interface such as iLO2.
After entering the configuration information for the backup fencing method for clusternode1.example.com, you can update the backup fence properties using the following procedure.
  1. Click Update backup fence properties at the bottom of the right side of the screen. This causes a confirmation screen to be displayed.
  2. On the confirmation screen, click OK. After the fence device has been added, a progress page is displayed after which the display returns to the configuration page for clusternode1.example.com in cluster backupclust.

7.3.3. Configuring Fencing on the Remaining Cluster Nodes

After configuring the main fencing method and the backup fencing method for clusternode1.example.com, use the same procedure to configure the fencing methods for clusternode2.example.com and clusternode3.example.com.
  1. At the detailed menu for the cluster backupclust (below the clusters menu on the left side of the screen) click on clusternode2.example.com, which should be displayed below Nodes -> Configure. This displays the configuration screen for node clusternode2.example.com.
  2. At the Main Fencing Method display, click Add a fence device to this level. This causes a dropdown menu to display.
  3. From the dropdown menu, the pwr01 and pwr02 fence devices you have already created should display as one of the menu options under Use an Existing Fence Device. Select pwr01 (APC Power Device). This causes a fence device configuration menu to display with the Name, IP Address, Login,Password, and Password Script values already configured, as defined when you configured pwr01 as a shared fence device. (The Password value does not display, but you may not alter it.)
  4. For Port, enter 2. Do not enter any value for Switch.
Before updating the main fence properties for this node, use the following procedure to add pwr02 as the second fence device of the main fencing method for node clusternode1.example.com.
  1. Beneath the configuration information for pwr01 that you have entered, click Add a fence device to this level. This displays the dropdown menu again.
  2. From the dropdown menu, select pwr02 (APC Power Device). This causes a fence device configuration menu to display with the Name, IP Address, Login,Password, and Password Script values already configured, as defined when you configured pwr02 as a shared fence device.
  3. For Port, enter 2. Do not enter any value for Switch.
After entering the configuration information for both power sources to use as fence devices, you can update the main fence properties using the following procedure.
  1. Click Update main fence properties. This causes a confirmation screen to be displayed.
  2. On the confirmation screen, Click OK. A progress page is displayed after which the display returns to the status page for clusternode1.example.com in cluster backupclust.
After configuring the main fence method for clusternode2.example.com and updating the main fence properties, use the following procedure to configure the IPMI management board for node clusternode2.example.com as the backup fencing method for that node:
  1. At the Backup Fencing Method display, click Add a fence device to this level. This causes a dropdown manu to display.
  2. From the dropdown menu, under Create a new Fence Device, select IPMI Lan. This displays a fence device configuration menu.
  3. For Name, enter ipmifence1.
  4. For IP Address, enter 10.15.86.51.
  5. For Login, enter ipmilogin.
  6. For Password, enter ipmipword.
  7. For Password Script, leave the field blank.
  8. For Authentication type, enterpassword. This field specifies the IPMI authentication type. Possible values for this field are none, password, md2, or md5.
  9. Leave the Use Lanplus field blank.
After entering the configuration information for the backup fencing method for clusternode2.example.com, you can update the backup fence properties using the following procedure.
  1. Click Update backup fence properties at the bottom of the right side of the screen. After the fence device has been added, a progress page is displayed after which the display returns to the configuration page for clusternode2.example.com in cluster backupclust.
To configure the fencing methods for clusternode3.example.com, use the same procedure as you did for configuring the fencing methods for clusternode2.example.com. In this case, however, use 3 as the port number for both of the APC switches that you are using for the main fencing method. For the backup fencing method, use ipmifence3 as the name of the fence type and use an IP address of 10.15.86.52. The other components should be the same, as summarized in Table 7.7, “Fence Agent Components to Specify for clusternode3.example.com”.
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.