Atjaunināt sīkdatņu piekrišanu

E-grāmata: Pro Linux High Availability Clustering

3.91/5 (20 ratings by Goodreads)
  • Formāts: PDF+DRM
  • Izdošanas datums: 25-Jul-2014
  • Izdevniecība: APress
  • Valoda: eng
  • ISBN-13: 9781484200797
  • Formāts - PDF+DRM
  • Cena: 88,63 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 25-Jul-2014
  • Izdevniecība: APress
  • Valoda: eng
  • ISBN-13: 9781484200797

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Pro Linux High Availability Clustering teaches you how to implement this fundamental Linux add-on into your business. Linux High Availability Clustering is needed to ensure the availability of mission critical resources. The technique is applied more and more in corporate datacenters around the world. While lots of documentation about the subject is available on the internet, it isn't always easy to build a real solution based on that scattered information, which is often oriented towards specific tasks only. Pro Linux High Availability Clustering explains essential high-availability clustering components on all Linux platforms, giving you the insight to build solutions for any specific case needed.

In this book four common cases will be explained:

  • Configuring Apache for high availability
  • Creating an Open Source SAN based on DRBD, iSCSI and HA clustering
  • Setting up a load-balanced web server cluster with a back-end, highly-available database
  • Setting up a KVM virtualization platform with high-availability protection for a virtual machine.

With the knowledge you'll gain from these real-world applications, you'll be able to efficiently apply Linux HA to your work situation with confidence.

Author Sander Van Vugt teaches Linux high-availability clustering on training courses, uses it in his everyday work, and now brings this knowledge to you in one place, with clear examples and cases. Make the best start with HA clustering with Pro Linux High Availability Clustering at your side.

About the Author xiii
About the Technical Reviewers xv
Acknowledgments xvii
Introduction xix
Chapter 1 High Availability Clustering and Its Architecture
1(8)
Different Kinds of Clustering
1(2)
High Performance Clusters
1(1)
Load Balancing Clusters
2(1)
High Availability Clusters
3(1)
What to Expect from High Availability Clusters
3(1)
History of High Availability Clustering in Linux
4(1)
Heartbeat 2.0 and Red Hat Cluster Suite
4(1)
Cluster Membership and Resource Management
4(1)
The Components That Build a High Availability Cluster
4(3)
Shared Storage
5(1)
Different Networks
5(1)
Bonded Network Devices
6(1)
Multipathing
6(1)
Fencing/STONITH Devices and Quorum
6(1)
Summary
7(2)
Chapter 2 Configuring Storage
9(18)
Why Most Clusters Need Shared Storage
9(1)
NAS or SAN?
10(1)
NAS
10(1)
SAN
10(1)
iSCSI or Fibre Channel?
11(1)
Understanding iSCSI
12(1)
Configuring the LIO iSCSI Target
12(4)
Connecting to an iSCSI SAN
16(4)
Step 1 discovery Mode
17(1)
Step 2 node Mode
18(1)
Step 3 Managing the iSCSI Connection
19(1)
Disconnecting an iSCSI Session
20(1)
Setting Up Multipathing
20(6)
/etc/multipath.conf
22(2)
Specific Use Cases for Multipath
24(2)
Summary
26(1)
Chapter 3 Configuring the Membership Layer
27(10)
Configuring the Network
27(2)
Network Bonding Modes
28(1)
Configuring the Bond Interface
28(1)
Dealing with Multicast
29(1)
corosync or cman?
30(1)
Configuring corosync
30(5)
Understanding corosync.conf Settings
33(1)
Networks Without Multicast Support
33(2)
Configuring cman
35(1)
Summary
36(1)
Chapter 4 Understanding Pacemaker Architecture and Management
37(14)
Pacemaker Related to Other Parts of the Cluster
37(1)
Resource Agents
38(1)
corosync/cman
38(1)
The Storage Layer
38(1)
Pacemaker Internal Components
38(4)
Cluster Information Base
39(2)
crmd
41(1)
pengine
41(1)
Irmd
41(1)
stonithd/fenced
41(1)
Cluster Management Tools
42(7)
crm shell
42(3)
Hawk
45(3)
Other Tools
48(1)
Conga: Luci and Ricci
49(1)
Summary
49(2)
Chapter 5 Configuring Essential Cluster Settings
51(20)
Specifying Default Cluster Settings
51(2)
no-quorum-policy
51(1)
default-resource-stickiness
52(1)
stonith-action
53(1)
Setting Up STONITH
53(15)
Different Solutions
54(1)
Setting Up libvirt Hypervisor-Based STONITH
55(3)
Setting Up Hardware-Based STONITH: The APC Master Power Switch
58(5)
Configuring STONITH for Dell DRAC and Other Server Management Cards, Such As HP ILO
63(3)
IPMI and Other Management Boards
66(1)
Setting Up Shared Disk-Based STONITH
67(1)
Using Fencing on Red Hat Clusters
68(1)
Summary
69(2)
Chapter 6 Clustering Resources
71(16)
What Makes Clustered Resources Different
71(1)
Clustering an Apache File Server
71(1)
Creating Resources
72(4)
Grouping Resources
76(1)
Working with Constraints
77(4)
Constraint Types
77(1)
Understanding Scores
78(3)
Testing the Configuration
81(1)
Understanding Resource Agent Scripts
81(4)
Summary
85(2)
Chapter 7 Clustering Storage
87(10)
Using a Cluster File System
87(1)
Configuring an OCFS2 File System
88(7)
Understanding Clone Resources
88(2)
LVM2 in Cluster Environments
90(4)
OCFS2 on Top of CLVM2
94(1)
Using GFS2 with Pacemaker
95(1)
Summary
95(2)
Chapter 8 Performing Daily Cluster Management Tasks
97(12)
Starting and Stopping Resources
97(1)
Monitoring Resource State
98(4)
Resource Migration
102(1)
Using Resource Cleanup
103(1)
Managing Nodes
104(1)
Using Unmanaged Mode and Maintenance Mode for Maintenance
104(1)
Understanding Log Files
105(2)
Backup and Restore of the Cluster Configuration
107(1)
Wipe Everything and Start All Over
108(1)
Summary
108(1)
Chapter 9 Creating an Open Source SAN
109(12)
Creating an Open Source SAN with Pacemaker
109(1)
Configuring RAID 1 over the Network with DRBD
109(5)
Precautionary Measures
110(1)
Creating the Configuration
110(3)
Working with the DRBD
113(1)
Troubleshooting the Disconnect State
113(1)
Working with Dual Primary Mode
114(1)
Integrating DRBD in Pacemaker Clusters
114(1)
Testing
115(1)
Adding an iSCSI Target to the Open Source SAN
115(5)
Creating an Open Source SAN with LVM
117(1)
Setting Up the iSCSI Target in the Cluster
117(3)
Summary
120(1)
Chapter 10 Use Case: Creating a Solution for Xen/KVM High Availability
121(12)
Introduction: An Overview of Open Source Virtualization Solutions
121(1)
Xen
121(1)
KVM
122(1)
Requirements for Setting Up an HA Solution for Virtual Machines
122(1)
Example of a Virtual Machine HA Cluster
122(6)
Creating a KVM HA Cluster
128(4)
Creating the Base Cluster
129(1)
Configure the SAN for Shared Storage
129(1)
Installing a KVM Virtual Machine
130(1)
Setting Up Cluster Resources for the KVM Virtual Machine
131(1)
Summary
132(1)
Chapter 11 Use Case: Configuring a Load-Balanced Mail Front End with a Database Back End
133(8)
Customer Situation
133(1)
Database Back End
134(2)
Mail Front End
136(2)
One Big Cluster or Many Little Clusters?
138(1)
Summary
139(2)
Index 141
Sander van Vugt is an independent trainer and consultant, living in the Netherlands and working throughout the European Union. He specializes in Linux and Novell systems, and has worked with both for more than 10 years. Besides being a trainer, he is also an author, having written more than 20 books and hundreds of technical articles. He is a Master Certified Novell Instructor (MCNI) and holds LPIC-1 and -2 certificates, as well as all important Novell certificates.