Chapter 8. Configuring Red Hat High Availability Manually
/etc/cluster/cluster.conf) and using command-line tools. The chapter provides procedures about building a configuration file one section at a time, starting with a sample file provided in the chapter. As an alternative to starting with a sample file provided here, you could copy a skeleton configuration file from the
cluster.confman page. However, doing so would not necessarily align with information provided in subsequent procedures in this chapter. There are other ways to create and configure a cluster configuration file; this chapter provides procedures about building a configuration file one section at a time. Also, keep in mind that this is just a starting point for developing a configuration file to suit your clustering needs.
cluster.confelements and attributes. For a comprehensive list and description of
cluster.confelements and attributes, see the cluster schema at
/usr/share/cluster/cluster.rng, and the annotated schema at
cman_tool version -rcommand to propagate a cluster configuration throughout a cluster. Using that command requires that
ricciis running. Using ricci requires a password the first time you interact with ricci from any specific machine. For information on the
ricciservice, refer to Section 3.13, “Considerations for
8.1. Configuration Tasks
- Creating a cluster. Refer to Section 8.2, “Creating a Basic Cluster Configuration File”.
- Configuring fencing. Refer to Section 8.3, “Configuring Fencing”.
- Configuring failover domains. Refer to Section 8.4, “Configuring Failover Domains”.
- Configuring HA services. Refer to Section 8.5, “Configuring HA Services”.
- Verifying a configuration. Refer to Section 8.9, “Verifying a Configuration”.