Show Table of Contents
5.2. General Properties of Fencing Devices
Any cluster node can fence any other cluster node with any fence device, regardless of whether the fence resource is started or stopped. Whether the resource is started controls only the recurring monitor for the device, not whether it can be used, with the following exceptions:
- You can disable a fencing device by running the
pcs stonith disable stonith_idcommand. This will prevent any node from using that device
- To prevent a specific node from using a fencing device, you can configure location constraints for the fencing resource with the
pcs constraint location ... avoidscommand.
stonith-enabled=falsewill disable fencing altogether. Note, however, that Red Hat does not support clusters when fencing is disabled, as it is not suitable for a production environment.
Table 5.1, “General Properties of Fencing Devices” describes the general properties you can set for fencing devices. Refer to Section 5.3, “Displaying Device-Specific Fencing Options” for information on fencing properties you can set for specific fencing devices.
For information on more advanced fencing configuration properties, see Section 5.8, “Additional Fencing Configuration Options”
Table 5.1. General Properties of Fencing Devices
|string|| A mapping of host names to port numbers for devices that do not support host names. For example: |
|string|| A list of machines controlled by this device (Optional unless |
|string||dynamic-list|| How to determine which machines are controlled by the device. Allowed values: |