Ce contenu n'est pas disponible dans la langue sélectionnée.

7.2. Fence Device Components to Configure


This procedure consists of the following steps:
  1. The procedure configures two APC switches as fence devices that will be used as the main fencing method for each node in cluster backupclust.
  2. The procedure configures the main and backup fencing methods for clusternode1.example.com, using the two APC switches for the main fencing method for the node and using its IPMI management board as the backup fencing method for the node.
  3. The procedure configures the main and backup fencing methods for clusternode2.example.com, using the two APC switches for the main fencing method for the node and using its IPMI management board as the backup fencing method for the node.
  4. The procedure configures the main and backup fencing methods for clusternode3.example.com, using the two APC switches for the main fencing method for the node and using its IPMI management board as the backup fencing method for the node.
Table 7.4, “Fence Device Components to Configure for APC Fence Device” summarizes the components of the APC fence devices that this procedure configures for the nodes in the cluster backupclust.
Expand
Table 7.4. Fence Device Components to Configure for APC Fence Device
Fence Device Component Value Description
Fencing Type APC Power Switch type of fencing device to configure for each APC switch
Name pwr01 name of the first APC fencing device for node1.example.com, node2.example.com, and node3.example.com
IP address 10.15.86.96 IP address of the first APC switch to configure as a fence device for node1.example.com, node2.example.com, and node3.example.com
Name pwr02 name of the second APC fencing device for node1.example.com, node2.example.com, and node3.example.com
IP address 10.15.86.97 IP address of the second APC switch to configure as a fence device for node1.example.com, node2.example.com, and node3.example.com
login apclogin login value for the each of the APC switches that control the power for for clusternode1.example.com, clusternode2.example.com, and clusternode3.example.com
password apcpword password for each of the APC switches that control the power for for clusternode1.example.com, clusternode2.example.com, and clusternode3.example.com
Table 7.5, “Fence Agent Components to Specify for clusternode1.example.com” summarizes the components of the main and backup fence devices that you specify for the node clusternode1.example.com.
Expand
Table 7.5. Fence Agent Components to Specify for clusternode1.example.com
Fence Agent Component Value Description
fence device pwr01 name of the first APC fence device you defined as a shared device
port 1 port number on the first APC switch for node1.example.com
fence device pwr02 name of the second APC fence device you defined as a shared device
port 1 port number on the second APC switch for clusternode1.example.com
Name ipmifence1 name of the IPMI fencing device for clusternode1.example.com
IP address 10.15.86.50 IP address of the IPMI management board for clusternode1.example.com
IPMI login ipmilogin login identity for the IPMI management board for clusternode1.example.com
password ipmipword password for the IPMI management board for clusternode1.example.com
authentication type password authentication type for the IPMI management board for clusternode1.example.com
Table 7.6, “Fence Agent Components to Specify for clusternode2.example.com” summarizes the components of the main and backup fence devices that you specify for the node clusternode2.example.com.
Expand
Table 7.6. Fence Agent Components to Specify for clusternode2.example.com
Fence Agent Component Value Description
fence device pwr01 name of the first APC fence device you defined as a shared device
port 2 port number on the first APC switch for node2.example.com
fence device pwr02 name of the second APC fence device you defined as a shared device
port 2 port number on the second APC switch for clusternode2.example.com
Name ipmifence2 name of the IPMI fencing device for clusternode2.example.com
IP address 10.15.86.51 IP address of the IPMI management board for clusternode2.example.com
IPMI login ipmilogin login identity for the IPMI management board for clusternode2.example.com
password ipmipword password for the IPMI management board for clusternode2.example.com
authentication type password authentication type for the IPMI management board for clusternode2.example.com
Table 7.7, “Fence Agent Components to Specify for clusternode3.example.com” summarizes the components of the main and backup fence devices that you specify for the node clusternode3.example.com.
Expand
Table 7.7. Fence Agent Components to Specify for clusternode3.example.com
Fence Agent Component Value Description
fence device pwr01 name of the first APC fence device you defined as a shared device
port 3 port number on the first APC switch for node3.example.com
fence device pwr02 name of the second APC fence device you defined as a shared device
port 3 port number on the second APC switch for clusternode3.example.com
Name ipmifence3 name of the IPMI fencing device for clusternode3.example.com
IP address 10.15.86.52 IP address of the IPMI management board for clusternode3.example.com
IPMI login ipmilogin login identity for the IPMI management board for clusternode3.example.com
password ipmipword password for the IPMI management board for clusternode3.example.com
authentication type password authentication type for the IPMI management board for clusternode3.example.com
Retour au début
Red Hat logoGithubredditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance. Découvrez nos récentes mises à jour.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez le Blog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

Theme

© 2025 Red Hat