第 32 章 Configuring disaster recovery clusters


One method of providing disaster recovery for a high availability cluster is to configure two clusters. You can then configure one cluster as your primary site cluster, and the second cluster as your disaster recovery cluster.

In normal circumstances, the primary cluster is running resources in production mode. The disaster recovery cluster has all the resources configured as well and is either running them in demoted mode or not at all. For example, there may be a database running in the primary cluster in promoted mode and running in the disaster recovery cluster in demoted mode. The database in this setup would be configured so that data is synchronized from the primary to disaster recovery site. This is done through the database configuration itself rather than through the pcs command interface.

When the primary cluster goes down, users can use the pcs command interface to manually fail the resources over to the disaster recovery site. They can then log in to the disaster site and promote and start the resources there. Once the primary cluster has recovered, users can use the pcs command interface to manually move resources back to the primary site.

You can use the pcs command to display the status of both the primary and the disaster recovery site cluster from a single node on either site.

32.1. Considerations for disaster recovery clusters

When planning and configuring a disaster recovery site that you will manage and monitor with the pcs command interface, note the following considerations.

  • The disaster recovery site must be a cluster. This makes it possible to configure it with same tools and similar procedures as the primary site.
  • The primary and disaster recovery clusters are created by independent pcs cluster setup commands.
  • The clusters and their resources must be configured so that that the data is synchronized and failover is possible.
  • The cluster nodes in the recovery site cannot have the same names as the nodes in the primary site.
  • The pcs user hacluster must be authenticated for each node in both clusters on the node from which you will be running pcs commands.
Red Hat logoGithubredditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。 了解我们当前的更新.

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

Theme

© 2026 Red Hat
返回顶部