Beruflich Dokumente
Kultur Dokumente
Configuring and Managing Fence Devices for the High Availability Add-
On
Red Hat Enterprise Linux 6 Fence Configuration Guide
Configuring and Managing Fence Devices for the High Availability Add-
On
.
Legal Notice
T his document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported
License. If you distribute this document, or a modified version of it, you must provide attribution to Red
Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be
removed.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section
4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo,
and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux ® is the registered trademark of Linus T orvalds in the United States and other countries.
XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States
and/or other countries.
MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other
countries.
Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or
endorsed by the official Joyent Node.js open source or commercial project.
T he OpenStack ® Word Mark and OpenStack Logo are either registered trademarks/service marks or
trademarks/service marks of the OpenStack Foundation, in the United States and other countries and
are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or
sponsored by the OpenStack Foundation, or the OpenStack community.
Table of Contents
.Preface
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . . .
1. Document Conventions 4
1.1. T ypographic Conventions 4
1.2. Pull-quote Conventions 5
1.3. Notes and Warnings 6
2. Getting Help and Giving Feedback 6
2.1. Do You Need Help? 6
2.2. We Need Feedback! 7
.Chapter
. . . . . . . . 1.
. . .Fencing
. . . . . . . . .Pre-Configuration
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8. . . . . . . . . .
1.1. Configuring ACPI For Use with Integrated Fence Devices 8
1.1.1. Disabling ACPI Soft-Off with chkconfig Management 9
1.1.2. Disabling ACPI Soft-Off with the BIOS 9
1.1.3. Disabling ACPI Completely in the grub.conf File 10
.Chapter
. . . . . . . . 2.
. . .Configuring
. . . . . . . . . . . . Fencing
. . . . . . . . . with
. . . . .the
. . . .ccs
. . . .Command
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
............
2.1. Configuring Fence Devices 12
2.2. Listing Fence Devices and Fence Device Options 14
2.3. Configuring Fencing for Cluster Members 16
2.3.1. Configuring a Single Power-Based Fence Device for a Node 16
2.3.2. Configuring a Single Storage-Based Fence Device for a Node 18
2.3.3. Configuring a Backup Fence Device 20
2.3.4. Configuring a Node with Redundant Power 24
2.3.5. Removing Fence Methods and Fence Instances 26
.Chapter
. . . . . . . . 3.
. . .Configuring
. . . . . . . . . . . . Fencing
. . . . . . . . .with
. . . . .Conga
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
............
3.1. Configuring Fence Daemon Properties 28
3.2. Configuring Fence Devices 28
3.2.1. Creating a Fence Device 29
3.2.2. Modifying a Fence Device 30
3.2.3. Deleting a Fence Device 30
3.3. Configuring Fencing for Cluster Members 30
3.3.1. Configuring a Single Fence Device for a Node 30
3.3.2. Configuring a Backup Fence Device 31
3.3.3. Configuring a Node with Redundant Power 32
.Chapter
........4. ...Fence
. . . . . . .Devices
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
............
4.1. APC Power Switch over T elnet and SSH 36
4.2. APC Power Switch over T elnet and SSH 38
4.3. Brocade Fabric Switch 40
4.4. Cisco MDS 42
4.5. Cisco UCS 44
4.6. Dell Drac 5 45
4.7. Eaton Network Power Switch 47
4.8. Egenera BladeFrame 50
4.9. ePowerSwitch 51
4.10. Fence Virt 52
4.11. Fujitsu-Siemens RemoteView Service Board (RSB) 54
4.12. Hewlett-Packard BladeSystem 55
4.13. Hewlett-Packard iLO 56
4.14. Hewlett-Packard iLO MP 58
4.15. IBM BladeCenter 59
4.16. IBM BladeCenter over SNMP 61
1
Red Hat Enterprise Linux 6 Fence Configuration Guide
. . . . . . . . . .History
Revision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
............
.Index
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
............
A 78
B 78
C 78
D 78
E 78
F 78
H 81
I 81
R 81
S 81
T 81
V 81
W 81
2
Table of Contents
3
Red Hat Enterprise Linux 6 Fence Configuration Guide
Preface
1. Document Conventions
T his manual uses several conventions to highlight certain words and phrases and draw attention to
specific pieces of information.
In PDF and paper editions, this manual uses typefaces drawn from the Liberation Fonts set. T he
Liberation Fonts set is also used in HT ML editions if the set is installed on your system. If not, alternative
but equivalent typefaces are displayed. Note: Red Hat Enterprise Linux 5 and later include the Liberation
Fonts set by default.
Mono-spaced Bold
Used to highlight system input, including shell commands, file names and paths. Also used to highlight
keys and key combinations. For example:
T he above includes a file name, a shell command and a key, all presented in mono-spaced bold and all
distinguishable thanks to context.
Key combinations can be distinguished from an individual key by the plus sign that connects each part of
a key combination. For example:
T he first example highlights a particular key to press. T he second example highlights a key combination:
a set of three keys pressed simultaneously.
If source code is discussed, class names, methods, functions, variable names and returned values
mentioned within a paragraph will be presented as above, in m ono-spaced bold. For example:
File-related classes include filesystem for file systems, file for files, and dir for
directories. Each class has its own associated set of permissions.
Proportional Bold
T his denotes words or phrases encountered on a system, including application names; dialog-box text;
labeled buttons; check-box and radio-button labels; menu titles and submenu titles. For example:
Choose System → Preferences → Mouse from the main menu bar to launch Mouse
Preferences. In the Buttons tab, select the Left-handed m ouse check box and click
Close to switch the primary mouse button from the left to the right (making the mouse
suitable for use in the left hand).
4
Preface
Character Map from the main menu bar. Next, choose Search → Find… from the
Character Map menu bar, type the name of the character in the Search field and click
Next. T he character you sought will be highlighted in the Character T able. Double-click
this highlighted character to place it in the T ext to copy field and then click the Copy
button. Now switch back to your document and choose Edit → Paste from the gedit menu
bar.
T he above text includes application names; system-wide menu names and items; application-specific
menu names; and buttons and text found within a GUI interface, all presented in proportional bold and all
distinguishable by context.
Whether mono-spaced bold or proportional bold, the addition of italics indicates replaceable or variable
text. Italics denotes text you do not input literally or displayed text that changes depending on
circumstance. For example:
T o connect to a remote machine using ssh, type ssh username@ domain.name at a shell
prompt. If the remote machine is exam ple.com and your username on that machine is
john, type ssh john@ exam ple.com .
T he m ount -o rem ount file-system command remounts the named file system. For
example, to remount the /hom e file system, the command is m ount -o rem ount /hom e.
T o see the version of a currently installed package, use the rpm -q package command. It
will return a result as follows: package-version-release.
Note the words in bold italics above: username, domain.name, file-system, package, version and release.
Each word is a placeholder, either for text you enter when issuing a command or for text displayed by
the system.
Aside from standard usage for presenting the title of a work, italics denotes the first use of a new and
important term. For example:
Source-code listings are also set in m ono-spaced rom an but add syntax highlighting as follows:
5
Red Hat Enterprise Linux 6 Fence Configuration Guide
mutex_lock(&kvm->lock);
match = kvm_find_assigned_dev(&kvm->arch.assigned_dev_head,
assigned_dev->assigned_dev_id);
if (!match) {
printk(KERN_INFO "%s: device hasn't been assigned before, "
"so cannot be deassigned\n", __func__);
r = -EINVAL;
goto out;
}
kvm_deassign_device(kvm, match);
kvm_free_assigned_device(kvm, match);
out:
mutex_unlock(&kvm->lock);
return r;
}
Note
Notes are tips, shortcuts or alternative approaches to the task at hand. Ignoring a note should
have no negative consequences, but you might miss out on a trick that makes your life easier.
Important
Important boxes detail things that are easily missed: configuration changes that only apply to the
current session, or services that need restarting before an update will apply. Ignoring a box
labeled “Important” will not cause data loss but may cause irritation and frustration.
Warning
Warnings should not be ignored. Ignoring warnings will most likely cause data loss.
6
Preface
search or browse through a knowledgebase of technical support articles about Red Hat products.
submit a support case to Red Hat Global Support Services (GSS).
access other product documentation.
Red Hat also hosts a large number of electronic mailing lists for discussion of Red Hat software and
technology. You can find a list of publicly available mailing lists at https://www.redhat.com/mailman/listinfo.
Click on the name of any mailing list to subscribe to that list or to access the list archives.
When submitting a bug report, be sure to mention the manual's identifier: Fence_Configuration_Guide
If you have a suggestion for improving the documentation, try to be as specific as possible when
describing it. If you have found an error, please include the section number and some of the surrounding
text so we can find it easily.
7
Red Hat Enterprise Linux 6 Fence Configuration Guide
Section 1.1, “Configuring ACPI For Use with Integrated Fence Devices”
Note
For the most current information about integrated fence devices supported by Red Hat High
Availability Add-On, refer to http://www.redhat.com/cluster_suite/hardware/.
If a cluster node is configured to be fenced by an integrated fence device, disable ACPI Soft-Off for that
node. Disabling ACPI Soft-Off allows an integrated fence device to turn off a node immediately and
completely rather than attempting a clean shutdown (for example, shutdown -h now). Otherwise, if
ACPI Soft-Off is enabled, an integrated fence device can take four or more seconds to turn off a node
(refer to note that follows). In addition, if ACPI Soft-Off is enabled and a node panics or freezes during
shutdown, an integrated fence device may not be able to turn off the node. Under those circumstances,
fencing is delayed or unsuccessful. Consequently, when a node is fenced with an integrated fence
device and ACPI Soft-Off is enabled, a cluster recovers slowly or requires administrative intervention to
recover.
Note
T he amount of time required to fence a node depends on the integrated fence device used. Some
integrated fence devices perform the equivalent of pressing and holding the power button;
therefore, the fence device turns off the node in four to five seconds. Other integrated fence
devices perform the equivalent of pressing the power button momentarily, relying on the operating
system to turn off the node; therefore, the fence device turns off the node in a time span much
longer than four to five seconds.
T o disable ACPI Soft-Off, use chkconfig management and verify that the node turns off immediately
when fenced. T he preferred way to disable ACPI Soft-Off is with chkconfig management: however, if
that method is not satisfactory for your cluster, you can disable ACPI Soft-Off with one of the following
alternate methods:
Changing the BIOS setting to "instant-off" or an equivalent setting that turns off the node without
delay
Note
Disabling ACPI Soft-Off with the BIOS may not be possible with some computers.
Appending acpi=off to the kernel boot command line of the /boot/grub/grub.conf file
8
Chapter 1. Fencing Pre-Configuration
Important
T his method completely disables ACPI; some computers do not boot correctly if ACPI is
completely disabled. Use this method only if the other methods are not effective for your
cluster.
T he following sections provide procedures for the preferred method and alternate methods of disabling
ACPI Soft-Off:
Section 1.1.1, “Disabling ACPI Soft-Off with chkconfig Management” — Preferred method
Section 1.1.2, “Disabling ACPI Soft-Off with the BIOS” — First alternate method
Section 1.1.3, “Disabling ACPI Completely in the grub.conf File” — Second alternate method
Note
Disable ACPI Soft-Off with chkconfig management at each cluster node as follows:
Note
You can fence the node with the fence_node command or Conga.
Note
Disabling ACPI Soft-Off with the BIOS may not be possible with some computers.
9
Red Hat Enterprise Linux 6 Fence Configuration Guide
You can disable ACPI Soft-Off by configuring the BIOS of each cluster node as follows:
1. Reboot the node and start the BIOS CMOS Setup Utility program.
2. Navigate to the Power menu (or equivalent power management menu).
3. At the Power menu, set the Soft-Off by PWR-BT T N function (or equivalent) to Instant-Off (or
the equivalent setting that turns off the node via the power button without delay). Example 1.1,
“BIOS CMOS Setup Utility: Soft-Off by PWR-BT T N set to Instant-Off” shows a Power menu
with ACPI Function set to Enabled and Soft-Off by PWR-BT T N set to Instant-Off.
Note
4. Exit the BIOS CMOS Setup Utility program, saving the BIOS configuration.
5. When the cluster is configured and running, verify that the node turns off immediately when
fenced.
Note
You can fence the node with the fence_node command or Conga.
Example 1.1. BIOS CMOS Setup Utility: Soft-Off by PWR-BT T N set to Instant-Off
+------------------------------------------|-----------------+
| ACPI Function [Enabled] | Item Help |
| ACPI Suspend Type [S1(POS)] |-----------------|
| x Run VGABIOS if S3 Resume [Auto] | Menu Level * |
| Suspend Mode [Disabled] | |
| HDD Power Down [Disabled] | |
| Soft-Off by PWR-BTTN [Instant-Off]| |
| CPU THRM-Throttling [50.0%] | |
| Wake-Up by PCI card [Enabled] | |
| Power On by Ring [Enabled] | |
| Wake Up On LAN [Enabled] | |
| x USB KB Wake-Up From S3 [Disabled] | |
| Resume by Alarm [Disabled] | |
| x Date(of Month) Alarm 0 | |
| x Time(hh:mm:ss) Alarm 0 : 0 : | |
| POWER ON Function [BUTTON ONLY]| |
| x KB Power ON Password Enter | |
| x Hot Key Power ON Ctrl-F1 | |
+------------------------------------------|-----------------+
T his example shows ACPI Function set to Enabled, and Soft-Off by PWR-BT T N set to Instant-
Off.
10
Chapter 1. Fencing Pre-Configuration
“Disabling ACPI Soft-Off with chkconfig Management”). If the preferred method is not effective for your
cluster, you can disable ACPI Soft-Off with the BIOS power management (Section 1.1.2, “Disabling ACPI
Soft-Off with the BIOS”). If neither of those methods is effective for your cluster, you can disable ACPI
completely by appending acpi=off to the kernel boot command line in the grub.conf file.
Important
T his method completely disables ACPI; some computers do not boot correctly if ACPI is
completely disabled. Use this method only if the other methods are not effective for your cluster.
You can disable ACPI completely by editing the grub.conf file of each cluster node as follows:
Note
You can fence the node with the fence_node command or Conga.
In this example, acpi=off has been appended to the kernel boot command line — the line starting
with "kernel /vmlinuz-2.6.32-193.el6.x86_64.img".
11
Red Hat Enterprise Linux 6 Fence Configuration Guide
T his chapter describes how to configure the Red Hat High Availability Add-On cluster configuration file
using the ccs command.
Important
Make sure that your deployment of High Availability Add-On meets your needs and can be
supported. Consult with an authorized Red Hat representative to verify your configuration prior to
deployment. In addition, allow time for a configuration burn-in period to test failure modes.
Important
T his chapter references commonly used cluster.conf elements and attributes. For a
comprehensive list and description of cluster.conf elements and attributes, refer to the
cluster schema at /usr/share/cluster/cluster.rng, and the annotated schema at
/usr/share/doc/cm an-X.Y.ZZ/cluster_conf.htm l (for example
/usr/share/doc/cm an-3.0.12/cluster_conf.htm l).
Before configuring your fence devices, you may want to modify some of the fence daemon properties for
your system from the default values. T he values you configure for the fence daemon are general values
for the cluster. T he general fencing properties for the cluster you may want to modify are summarized as
follows:
T he post_fail_delay attribute is the number of seconds the fence daemon (fenced) waits
before fencing a node (a member of the fence domain) after the node has failed. T he
post_fail_delay default value is 0. Its value may be varied to suit cluster and network
performance.
T he post-join_delay attribute is the number of seconds the fence daemon (fenced) waits
before fencing a node after the node joins the fence domain. T he post_join_delay default value
is 6. A typical setting for post_join_delay is between 20 and 30 seconds, but can vary according
to cluster and network performance.
12
Chapter 2. Configuring Fencing with the ccs Command
You reset the values of the post_fail_delay and post_join_delay attributes with the --
setfencedaem on option of the ccs command. Note, however, that executing the ccs --
setfencedaem on command overwrites all existing fence daemon properties.
For example, to configure a value for the post_fail_delay attribute, execute the following command.
T his command will overwrite the values of all other exisiting fence daemon properties that you can set
with this command.
T o configure a value for the post_join_delay attribute, execute the following command. T his
command will overwrite the values of all other exisiting fence daemon properties that you can set with
this command.
T o configure a value for both the the post_join_delay attribute and the post_fail_delay
attribute, execute the following command:
Note
For more information about the post_join_delay and post_fail_delay attributes as well
as the additional fence daemon properties you can modify, refer to the fenced(8) man page and
refer to the cluster schema at /usr/share/cluster/cluster.rng, and the annotated
schema at /usr/share/doc/cm an-X.Y.ZZ/cluster_conf.htm l.
For example, to configure an APC fence device in the configuration file on the cluster node node1
named m yfence with an IP address of apc_ip_exam ple, a login of login_exam ple, and a
password of password_exam ple, execute the following command:
T he following example shows the fencedevices section of the cluster.conf configuration file after
you have added this APC fence device:
<fencedevices>
<fencedevice agent="fence_apc" ipaddr="apc_ip_example"
login="login_example" name="myfence" passwd="password_example"/>
</fencedevices>
13
Red Hat Enterprise Linux 6 Fence Configuration Guide
When configuring fence devices for a cluster, you may find it useful to see a listing of available devices
for your cluster and the options available for each device. You may also find it useful to see a listing of
fence devices currently configured for your cluster. For information on using the ccs command to print a
list of available fence devices and options or to print a list of fence devices currently configured for your
cluster, refer to Section 2.2, “Listing Fence Devices and Fence Device Options”.
T o remove a fence device from your cluster configuration, execute the following command:
For example, to remove a fence device that you have named m yfence from the cluster configuration file
on cluster node node1, execute the following command:
If you need to modify the attributes of a fence device you have already configured, you must first remove
that fence device then add it again with the modified attributes.
Note that when you have finished configuring all of the components of your cluster, you will need to sync
the cluster configuration file to all of the nodes.
T o print a list of fence devices currently available for your cluster, execute the following command:
For example, the following command lists the fence devices available on the cluster node node1,
showing sample output.
14
Chapter 2. Configuring Fencing with the ccs Command
T o print a list of the options you can specify for a particular fence type, execute the following command:
For example, the following command lists the fence options for the fence_wti fence agent.
15
Red Hat Enterprise Linux 6 Fence Configuration Guide
T o print a list of fence devices currently configured for your cluster, execute the following command:
1. Add a fence method for the node, providing a name for the fence method.
16
Chapter 2. Configuring Fencing with the ccs Command
For example, to configure a fence method named APC for the node node-01.exam ple.com in
the configuration file on the cluster node node-01.exam ple.com , execute the following
command:
2. Add a fence instance for the method. You must specify the fence device to use for the node, the
node this instance applies to, the name of the method, and any options for this method that are
specific to this node:
For example, to configure a fence instance in the configuration file on the cluster node node-
01.exam ple.com that uses the APC switch power port 1 on the fence device named apc to
fence cluster node node-01.exam ple.com using the method named APC, execute the following
command:
You will need to add a fence method for each node in the cluster. T he following commands configure a
fence method for each node with the method name APC. T he device for the fence method specifies apc
as the device name, which is a device previously configured with the --addfencedev option, as
described in Section 2.1, “Configuring Fence Devices”. Each node is configured with a unique APC
switch power port number: T he port number for node-01.exam ple.com is 1, the port number for
node-02.exam ple.com is 2, and the port number for node-03.exam ple.com is 3.
Example 2.1, “cluster.conf After Adding Power-Based Fence Methods ” shows a cluster.conf
configuration file after you have added these fencing methods and instances to each node in the cluster.
17
Red Hat Enterprise Linux 6 Fence Configuration Guide
Note that when you have finished configuring all of the components of your cluster, you will need to sync
the cluster configuration file to all of the nodes.
For more information about unfencing a node, refer to the fence_node(8) man page.
Use the following procedure to configure a node with a single storage-based fence device that uses a
fence device named sanswitch1, which uses the fence_sanbox2 fencing agent.
1. Add a fence method for the node, providing a name for the fence method.
18
Chapter 2. Configuring Fencing with the ccs Command
For example, to configure a fence method named SAN for the node node-01.exam ple.com in
the configuration file on the cluster node node-01.exam ple.com , execute the following
command:
2. Add a fence instance for the method. You must specify the fence device to use for the node, the
node this instance applies to, the name of the method, and any options for this method that are
specific to this node:
For example, to configure a fence instance in the configuration file on the cluster node node-
01.exam ple.com that uses the SAN switch power port 11 on the fence device named
sanswitch1 to fence cluster node node-01.exam ple.com using the method named SAN,
execute the following command:
3. T o configure unfencing for the storage based fence device on this node, execute the following
command:
You will need to add a fence method for each node in the cluster. T he following commands configure a
fence method for each node with the method name SAN. T he device for the fence method specifies
sanswitch as the device name, which is a device previously configured with the --addfencedev option,
as described in Section 2.1, “Configuring Fence Devices”. Each node is configured with a unique SAN
physical port number: T he port number for node-01.exam ple.com is 11, the port number for node-
02.exam ple.com is 12, and the port number for node-03.exam ple.com is 13.
Example 2.2, “cluster.conf After Adding Storage-Based Fence Methods ” shows a cluster.conf
configuration file after you have added fencing methods, fencing instances, and unfencing to each node
in the cluster.
19
Red Hat Enterprise Linux 6 Fence Configuration Guide
Note that when you have finished configuring all of the components of your cluster, you will need to sync
the cluster configuration file to all of the nodes.
20
Chapter 2. Configuring Fencing with the ccs Command
Note
T he order in which the system will use the fencing methods you have configured follows their
order in the cluster configuration file. T he first method you configure with the ccs command is the
primary fencing method, and the second method you configure is the backup fencing method. T o
change the order, you can remove the primary fencing method from the configuration file, then add
that method back.
Note that at any time you can print a list of fence methods and instances currently configured for a node
by executing the following command. If you do not specify a node, this command will list the fence
methods and instances currently configured for all nodes.
Use the following procedure to configure a node with a primary fencing method that uses a fence device
named apc, which uses the fence_apc fencing agent, and a backup fencing device that uses a fence
device named sanswitch1, which uses the fence_sanbox2 fencing agent. Since the sanswitch1
device is a storage-based fencing agent, you will need to configure unfencing for that device as well.
1. Add a primary fence method for the node, providing a name for the fence method.
For example, to configure a fence method named APC as the primary method for the node node-
01.exam ple.com in the configuration file on the cluster node node-01.exam ple.com ,
execute the following command:
2. Add a fence instance for the primary method. You must specify the fence device to use for the
node, the node this instance applies to, the name of the method, and any options for this method
that are specific to this node:
For example, to configure a fence instance in the configuration file on the cluster node node-
01.exam ple.com that uses the APC switch power port 1 on the fence device named apc to
fence cluster node node-01.exam ple.com using the method named APC, execute the following
command:
3. Add a backup fence method for the node, providing a name for the fence method.
For example, to configure a backup fence method named SAN for the node node-
01.exam ple.com in the configuration file on the cluster node node-01.exam ple.com ,
execute the following command:
21
Red Hat Enterprise Linux 6 Fence Configuration Guide
4. Add a fence instance for the backup method. You must specify the fence device to use for the
node, the node this instance applies to, the name of the method, and any options for this method
that are specific to this node:
For example, to configure a fence instance in the configuration file on the cluster node node-
01.exam ple.com that uses the SAN switch power port 11 on the fence device named
sanswitch1 to fence cluster node node-01.exam ple.com using the method named SAN,
execute the following command:
5. Since the sanswitch1 device is a storage-based device, you must configure unfencing for this
device.
T his procedure configures a fence device and a backup fence device for one node in the cluster. You
will need to configure fencing for the other nodes in the cluster as well.
Example 2.3, “cluster.conf After Adding Backup Fence Methods ” shows a cluster.conf
configuration file after you have added a power-based primary fencing method and a storage-based
backup fencing method to each node in the cluster.
22
Chapter 2. Configuring Fencing with the ccs Command
Note that when you have finished configuring all of the components of your cluster, you will need to sync
23
Red Hat Enterprise Linux 6 Fence Configuration Guide
Note
T he order in which the system will use the fencing methods you have configured follows their
order in the cluster configuration file. T he first method you configure is the primary fencing
method, and the second method you configure is the backup fencing method. T o change the
order, you can remove the primary fencing method from the configuration file, then add that
method back.
T o configure fencing for a node with dual power supplies, follow the steps in this section.
1. Before you can configure fencing for a node with redundant power, you must configure each of the
power switches as a fence device for the cluster. For information on configuring fence devices,
see Section 2.1, “Configuring Fence Devices”.
T o print a list of fence devices currently configured for your cluster, execute the following
command:
2. Add a fence method for the node, providing a name for the fence method.
For example, to configure a fence method named APC-dual for the node node-
01.exam ple.com in the configuration file on the cluster node node-01.exam ple.com ,
execute the following command:
3. Add a fence instance for the first power supply to the fence method. You must specify the fence
device to use for the node, the node this instance applies to, the name of the method, and any
options for this method that are specific to this node. At this point you configure the action
attribute as off.
For example, to configure a fence instance in the configuration file on the cluster node node-
01.exam ple.com that uses the APC switch power port 1 on the fence device named apc1 to
fence cluster node node-01.exam ple.com using the method named APC-dual, and setting
24
Chapter 2. Configuring Fencing with the ccs Command
4. Add a fence instance for the second power supply to the fence method. You must specify the
fence device to use for the node, the node this instance applies to, the name of the method, and
any options for this method that are specific to this node. At this point you configure the action
attribute as off for this instance as well:
For example, to configure a second fence instance in the configuration file on the cluster node
node-01.exam ple.com that uses the APC switch power port 1 on the fence device named
apc2 to fence cluster node node-01.exam ple.com using the same method as you specified
for the first instance named APC-dual, and setting the action attribute to off, execute the
following command:
5. At this point, add another fence instance for the first power supply to the fence method,
configuring the action attribute as on. You must specify the fence device to use for the node,
the node this instance applies to, the name of the method, and any options for this method that
are specific to this node, and specifying the action attribute as on:
For example, to configure a fence instance in the configuration file on the cluster node node-
01.exam ple.com that uses the APC switch power port 1 on the fence device named apc1 to
fence cluster node node-01.exam ple.com using the method named APC-dual, and setting
the action attribute to on, execute the following command:
6. Add another fence instance for second power supply to the fence method, specifying the action
attribute as on for this instance. You must specify the fence device to use for the node, the node
this instance applies to, the name of the method, and any options for this method that are specific
to this node as well as the action attribute of on.
For example, to configure a second fence instance in the configuration file on the cluster node
node-01.exam ple.com that uses the APC switch power port 1 on the fence device named
apc2 to fence cluster node node-01.exam ple.com using the same method as you specified
for the first instance named APC-dual and setting the action attribute to on, execute the
following command:
25
Red Hat Enterprise Linux 6 Fence Configuration Guide
configuration file after you have added fencing for two power supplies for each node in a cluster.
Note that when you have finished configuring all of the components of your cluster, you will need to sync
the cluster configuration file to all of the nodes.
26
Chapter 2. Configuring Fencing with the ccs Command
For example, to remove a fence method that you have named APC that you have configured for
node01.exam ple.com from the cluster configuration file on cluster node node01.exam ple.com ,
execute the following command:
T o remove all fence instances of a fence device from a fence method, execute the following command:
For example, to remove all instances of the fence device named apc1 from the method named APC-
dual configured for node01.exam ple.com from the cluster configuration file on cluster node
node01.exam ple.com , execute the following command:
27
Red Hat Enterprise Linux 6 Fence Configuration Guide
Note
Conga is a graphical user interface that you can use to administer the Red Hat High Availability
Add-On. Note, however, that in order to use this interface effectively you need to have a good and
clear understanding of the underlying concepts. Learning about cluster configuration by exploring
the available features in the user interface is not recommended, as it may result in a system that
is not robust enough to keep all services running when components fail.
T he Post Fail Delay parameter is the number of seconds the fence daemon (fenced) waits before
fencing a node (a member of the fence domain) after the node has failed. T he Post Fail Delay
default value is 0. Its value may be varied to suit cluster and network performance.
T he Post Join Delay parameter is the number of seconds the fence daemon (fenced) waits
before fencing a node after the node joins the fence domain. T he Post Join Delay default value is
6. A typical setting for Post Join Delay is between 20 and 30 seconds, but can vary according to
cluster and network performance.
Enter the values required and click Apply for changes to take effect.
Note
For more information about Post Join Delay and Post Fail Delay, refer to the fenced(8) man
page.
Creating a fence device consists of selecting a fence device type and entering parameters for that fence
device (for example, name, IP address, login, and password). Updating a fence device consists of
selecting an existing fence device and changing parameters for that fence device. Deleting a fence
device consists of selecting an existing fence device and deleting it.
28
Chapter 3. Configuring Fencing with Conga
Creating fence devices — Refer to Section 3.2.1, “Creating a Fence Device”. Once you have created
and named a fence device, you can configure the fence devices for each node in the cluster, as
described in Section 3.3, “Configuring Fencing for Cluster Members”.
Updating fence devices — Refer to Section 3.2.2, “Modifying a Fence Device”.
Deleting fence devices — Refer to Section 3.2.3, “Deleting a Fence Device”.
From the cluster-specific page, you can configure fence devices for that cluster by clicking on Fence
Devices along the top of the cluster display. T his displays the fence devices for the cluster and
displays the menu items for fence device configuration: Add and Delete. T his is the starting point of
each procedure described in the following sections.
Note
If this is an initial cluster configuration, no fence devices have been created, and therefore none
are displayed.
Figure 3.1, “luci fence devices configuration page” shows the fence devices configuration screen before
any fence devices have been created.
1. From the Fence Devices configuration page, click Add. Clicking Add displays the Add Fence
Device (Instance) dialog box. From this dialog box, select the type of fence device to
configure.
2. Specify the information in the Add Fence Device (Instance) dialog box according to the
type of fence device. In some cases you will need to specify additional node-specific parameters
for the fence device when you configure fencing for the individual nodes.
29
Red Hat Enterprise Linux 6 Fence Configuration Guide
After the fence device has been added, it appears on the Fence Devices configuration page.
1. From the Fence Devices configuration page, click on the name of the fence device to modify.
T his displays the dialog box for that fence device, with the values that have been configured for
the device.
2. T o modify the fence device, enter changes to the parameters displayed.
3. Click Apply and wait for the configuration to be updated.
Fence devices that are in use cannot be deleted. T o delete a fence device that a node is currently
using, first update the node fence configuration for any node using the device and then delete the
device.
1. From the Fence Devices configuration page, check the box to the left of the fence device or
devices to select the devices to delete.
2. Click Delete and wait for the configuration to be updated. A message appears indicating which
devices are being deleted.
When the configuration has been updated, the deleted fence device no longer appears in the display.
T he following sections provide procedures for configuring a single fence device for a node, configuring a
node with a backup fence device, and configuring a node with redundant power supplies:
1. From the cluster-specific page, you can configure fencing for the nodes in the cluster by clicking
on Nodes along the top of the cluster display. T his displays the nodes that constitute the cluster.
T his is also the default page that appears when you click on the cluster name beneath Manage
Clusters from the menu on the left side of the luci Homebase page.
30
Chapter 3. Configuring Fencing with Conga
2. Click on a node name. Clicking a link for a node causes a page to be displayed for that link
showing how that node is configured.
T he node-specific page displays any services that are currently running on the node, as well as
any failover domains of which this node is a member. You can modify an existing failover domain
by clicking on its name.
3. On the node-specific page, under Fence Devices, click Add Fence Method. T his displays the
Add Fence Method to Node dialog box.
4. Enter a Method Name for the fencing method that you are configuring for this node. T his is an
arbitrary name that will be used by Red Hat High Availability Add-On; it is not the same as the DNS
name for the device.
5. Click Subm it. T his displays the node-specific screen that now displays the method you have just
added under Fence Devices.
6. Configure a fence instance for this method by clicking the Add Fence Instance button that
appears beneath the fence method. T his displays the Add Fence Device (Instance) drop-down
menu from which you can select a fence device you have previously configured, as described in
Section 3.2.1, “Creating a Fence Device”.
7. Select a fence device for this method. If this fence device requires that you configure node-specific
parameters, the display shows the parameters to configure.
Note
For non-power fence methods (that is, SAN/storage fencing), Unfencing is selected by
default on the node-specific parameters display. T his ensures that a fenced node's access
to storage is not re-enabled until the node has been rebooted. For information on unfencing
a node, refer to the fence_node(8) man page.
8. Click Subm it. T his returns you to the node-specific screen with the fence method and fence
instance displayed.
Use the following procedure to configure a backup fence device for a node.
1. Use the procedure provided in Section 3.3.1, “Configuring a Single Fence Device for a Node” to
configure the primary fencing method for a node.
2. Beneath the display of the primary method you defined, click Add Fence Method.
3. Enter a name for the backup fencing method that you are configuring for this node and click
Subm it. T his displays the node-specific screen that now displays the method you have just
added, below the primary fence method.
4. Configure a fence instance for this method by clicking Add Fence Instance. T his displays a
drop-down menu from which you can select a fence device you have previously configured, as
described in Section 3.2.1, “Creating a Fence Device”.
5. Select a fence device for this method. If this fence device requires that you configure node-specific
parameters, the display shows the parameters to configure.
6. Click Subm it. T his returns you to the node-specific screen with the fence method and fence
instance displayed.
31
Red Hat Enterprise Linux 6 Fence Configuration Guide
You can continue to add fencing methods as needed. You can rearrange the order of fencing methods
that will be used for this node by clicking on Move Up and Move Down.
T o configure fencing for a node with dual power supplies, follow the steps in this section.
1. Before you can configure fencing for a node with redundant power, you must configure each of the
power switches as a fence device for the cluster. For information on configuring fence devices,
see Section 3.2, “Configuring Fence Devices”.
2. From the cluster-specific page, click on Nodes along the top of the cluster display. T his displays
the nodes that constitute the cluster. T his is also the default page that appears when you click on
the cluster name beneath Manage Clusters from the menu on the left side of the luci
Homebase page.
3. Click on a node name. Clicking a link for a node causes a page to be displayed for that link
showing how that node is configured.
4. On the node-specific page, click Add Fence Method.
5. Enter a name for the fencing method that you are configuring for this node.
6. Click Subm it. T his displays the node-specific screen that now displays the method you have just
added under Fence Devices.
7. Configure the first power supply as a fence instance for this method by clicking Add Fence
Instance. T his displays a drop-down menu from which you can select one of the power fencing
devices you have previously configured, as described in Section 3.2.1, “Creating a Fence Device”.
8. Select one of the power fence devices for this method and enter the appropriate parameters for
this device.
9. Click Subm it. T his returns you to the node-specific screen with the fence method and fence
instance displayed.
10. Under the same fence method for which you have configured the first power fencing device, click
Add Fence Instance. T his displays a drop-down menu from which you can select the second
power fencing devices you have previously configured, as described in Section 3.2.1, “Creating a
Fence Device”.
11. Select the second of the power fence devices for this method and enter the appropriate
parameters for this device.
12. Click Subm it. T his returns you to the node-specific screen with the fence methods and fence
instances displayed, showing that each device will power the system off in sequence and power
the system on in sequence. T his is shown in Figure 3.2, “Dual-Power Fencing Configuration”.
32
Chapter 3. Configuring Fencing with Conga
33
Red Hat Enterprise Linux 6 Fence Configuration Guide
T able 4.1, “Fence Device Summary” lists the fence devices, the fence device agents associated with the
fence devices, and provides a reference to the table documenting the parameters for the fence devices.
34
Chapter 4. Fence D evices
35
Red Hat Enterprise Linux 6 Fence Configuration Guide
Reservations”
VMware fence_vmware_soap Section 4.23, “VMWare over
Fencing (SOAP SOAP API”
Interface)
WT I Power fence_wti Section 4.24, “WT I Power
Switch Switch”
36
Chapter 4. Fence D evices
Figure 4.1, “APC Power Switch over SNMP” shows the configuration screen for adding an APC Power
Switch fence device.
37
Red Hat Enterprise Linux 6 Fence Configuration Guide
<fencedevice>
<fencedevice agent="fence_apc_snmp" community="private" ipaddr="192.168.0.1"
login="root" \
name="apcpwsnmptst1" passwd="password123" power_wait="60"
snmp_priv_passwd="password123"/>
</fencedevices>
38
Chapter 4. Fence D evices
Figure 4.2, “APC Power Switch” shows the configuration screen for adding an APC Power Switch fence
device.
39
Red Hat Enterprise Linux 6 Fence Configuration Guide
<fencedevices>
<fencedevice agent="fence_apc" name="apc" ipaddr="apc-telnet.example.com"
login="root" passwd="password123"/>
</fencedevices>
40
Chapter 4. Fence D evices
Figure 4.3, “Brocade Fabric Switch” shows the configuration screen for adding an Brocade Fabric Switch
fence device.
41
Red Hat Enterprise Linux 6 Fence Configuration Guide
<fencedevices>
<fencedevice agent="fence_brocade" ipaddr="brocadetest.example.com"
login="brocadetest" \
name="brocadetest" passwd="brocadetest"/>
</fencedevices>
42
Chapter 4. Fence D evices
Figure 4.4, “Cisco MDS” shows the configuration screen for adding an Cisco MDS fence device.
T he following command creates a fence device instance for a Cisco MDS device:
43
Red Hat Enterprise Linux 6 Fence Configuration Guide
<fencedevices>
<fencedevice agent="fence_cisco_mds" community="private" ipaddr="192.168.0.1"
login="root" \
name="ciscomdstest1" passwd="password123" power_wait="60"
snmp_priv_passwd="password123" \
udpport="161"/>
</fencedevices>
Figure 4.5, “Cisco UCS” shows the configuration screen for adding a Cisco UCS fence device.
44
Chapter 4. Fence D evices
T he following command creates a fence device instance for a Cisco UCS device:
T he following is an example cluster.conf entry for the fence_cisco_ucs device as created using
either Conga or ccs:
<fencedevices>
<fencedevice agent="fence_cisco_ucs" ipaddr="192.168.0.1" login="root"
name="ciscoucstest1" \
passwd="password123" power_wait="60" ssl="on" suborg="/org-RHEL/org-Fence/"/>
</fencedevices>
45
Red Hat Enterprise Linux 6 Fence Configuration Guide
Figure 4.6, “Dell Drac 5” shows the configuration screen for adding a Dell Drac 5 device
46
Chapter 4. Fence D evices
T he following command creates a fence device instance for a Dell Drac 5 device:
<fencedevices>
<fencedevice agent="fence_drac5" cmd_prompt="\$" ipaddr="192.168.0.1"
login="root" module_name="drac1" \
name="delldrac5test1" passwd="password123" power_wait="60"/>
</fencedevices>
47
Red Hat Enterprise Linux 6 Fence Configuration Guide
T able 4 .8. Eaton Network Power Controller (SNMP Interface) (Red Hat Enterprise Linux 6.4
and later)
Figure 4.7, “Eaton Network Power Switch” shows the configuration screen for adding an Eaton Network
Power Switch fence device.
48
Chapter 4. Fence D evices
T he following command creates a fence device instance for an Eaton Network Power Switch device:
49
Red Hat Enterprise Linux 6 Fence Configuration Guide
<fencedevices>
<fencedevice agent="fence_eaton_snmp" community="private" ipaddr="eatonhost"
login="eatonlogin" \
name="eatontest" passwd="password123" passwd_script="eatonpwscr"
power_wait="3333" \
snmp_priv_passwd="eatonprivprotpass"
snmp_priv_passwd_script="eatonprivprotpwscr" udpport="161"/>
</fencedevices>
Figure 4.8, “Egenera BladeFrame” shows the configuration screen for adding an Egenera BladeFrame
fence device.
50
Chapter 4. Fence D evices
T he following command creates a fence device instance for an Egenera BladeFrame device:
<fencedevices>
<fencedevice agent="fence_egenera" cserver="cservertest" name="egeneratest"
user="root"/>
</fencedevices>
4.9. ePowerSwitch
T able 4.10, “ePowerSwitch” lists the fence device parameters used by fence_eps, the fence agent for
ePowerSwitch.
Figure 4.9, “ePowerSwitch” shows the configuration screen for adding an ePowerSwitch fence device.
51
Red Hat Enterprise Linux 6 Fence Configuration Guide
<fencedevices>
<fencedevice agent="fence_eps" hidden_page="hidden.htm" ipaddr="192.168.0.1"
login="root" name="epstest1" \
passwd="password123"/>
</fencedevices>
52
Chapter 4. Fence D evices
Figure 4.10, “Fence Virt” shows the configuration screen for adding a Fence Virt device.
T he following command creates a fence device instance for the Fence Virt device:
<fencedevices>
<fencedevice agent="fence_virt" name="fencevirt1" serial_device="/dev/ttyS1"
serial_params="19200, 8N1"/>
</fencedevices>
53
Red Hat Enterprise Linux 6 Fence Configuration Guide
Figure 4.11, “Fujitsu-Siemens RSB” shows the configuration screen for adding an Fujitsu-Siemens RSB
fence device.
T he following command creates a fence device instance for a Fujiitsu-Siemens RSB device:
54
Chapter 4. Fence D evices
<fencedevices>
<fencedevice agent="fence_rsb" ipaddr="192.168.0.1" login="root"
name="fsrsbtest1" passwd="password123" telnet_port="3172"/>
</fencedevices>
T able 4 .13. HP BladeSystem (Red Hat Enterprise Linux 6.4 and later)
Figure 4.12, “HP BladeSystem” shows the configuration screen for adding an HP BladeSystem fence
device.
55
Red Hat Enterprise Linux 6 Fence Configuration Guide
<fencedevices>
<fencedevice agent="fence_hpblade" cmd_prompt="c7000oa>" ipaddr="hpbladeaddr"
ipport="13456" \
login="root" missing_as_off="on" name="hpbladetest1" passwd="password123"
passwd_script="hpbladepwscr" \
power_wait="60"/>
</fencedevices>
56
Chapter 4. Fence D evices
Figure 4.13, “HP iLO” shows the configuration screen for adding an HP iLO fence device.
57
Red Hat Enterprise Linux 6 Fence Configuration Guide
<fencedevices>
<fencedevice agent="fence_ilo" ipaddr="192.168.0.1" login="root"
name="hpilotest1" passwd="password123" \
power_wait="60"/>
</fencedevices>
Figure 4.14, “HP iLO MP” shows the configuration screen for adding an HP iLO MPfence device.
58
Chapter 4. Fence D evices
<fencedevices>
<fencedevice agent="fence_ilo_mp" cmd_prompt="hpiLO->" ipaddr="192.168.0.1"
login="root" name="hpilomptest1" passwd="password123" power_wait="60"/>
</fencedevices>
59
Red Hat Enterprise Linux 6 Fence Configuration Guide
Figure 4.15, “IBM BladeCenter” shows the configuration screen for adding an IBM BladeCenter fence
device.
T he following command creates a fence device instance for an IBM BladeCenter device:
60
Chapter 4. Fence D evices
<fencedevices>
<fencedevice agent="fence_bladecenter" ipaddr="192.168.0.1" login="root"
name="bladecentertest1" passwd="password123" \
power_wait="60"/>
</fencedevices>
61
Red Hat Enterprise Linux 6 Fence Configuration Guide
Figure 4.16, “IBM BladeCenter SNMP” shows the configuration screen for adding an IBM BladeCenter
SNMP fence device.
62
Chapter 4. Fence D evices
T he following command creates a fence device instance for an IBM BladeCenter SNMP device:
<fencedevices>
<fencedevice agent="fence_ibmblade" community="private" ipaddr="192.168.0.1"
login="root" name="bladesnmp1" \
passwd="password123" power_wait="60" snmp_priv_passwd="snmpasswd123"
udpport="161"/>
</fencedevices>
63
Red Hat Enterprise Linux 6 Fence Configuration Guide
T able 4 .18. IBM iPDU (Red Hat Enterprise Linux 6.4 and later)
Figure 4.17, “IBM iPDU” shows the configuration screen for adding an IBM iPDU fence device.
64
Chapter 4. Fence D evices
T he following command creates a fence device instance for an IBM iPDU device:
<fencedevices>
<fencedevice agent="fence_ipdu" community="ipdusnmpcom" ipaddr="ipduhost"
login="root" name="ipdutest1" \
passwd="password123" power_wait="60" snmp_priv_passwd="ipduprivprotpasswd"
snmp_priv_prot="AES" \
udpport="111"/>
</fencedevices>
65
Red Hat Enterprise Linux 6 Fence Configuration Guide
4.18. IF-MIB
T able 4.19, “IF MIB” lists the fence device parameters used by fence_ifm ib, the fence agent for IF-
MIB devices.
Figure 4.18, “IF-MIB” shows the configuration screen for adding an IF-MIB fence device.
66
Chapter 4. Fence D evices
<fencedevices>
<fencedevice agent="fence_ifmib" community="private" ipaddr="192.168.0.1"
login="root" name="ifmib1" \
passwd="password123" power_wait="60" snmp_priv_passwd="snmpasswd123"
udpport="161"/>
</fencedevices>
67
Red Hat Enterprise Linux 6 Fence Configuration Guide
Figure 4.19, “Intel Modular” shows the configuration screen for adding an Intel Modular fence device.
68
Chapter 4. Fence D evices
T he following command creates a fence device instance for an Intel Modular device:
<fencedevices>
<fencedevice agent="fence_intelmodular" community="private"
ipaddr="192.168.0.1" login="root" name="intelmodular1" \
passwd="password123" power_wait="60" snmp_priv_passwd="snmpasswd123"
udpport="161"/>
</fencedevices>
69
Red Hat Enterprise Linux 6 Fence Configuration Guide
T able 4 .21. IPMI (Intelligent Platform Management Interface) LAN, Dell iDrac, IBM Integrated
Management Module, HP iLO3, HP iLO4
Figure 4.20, “IPMI over LAN” shows the configuration screen for adding an IPMI over LAN device
70
Chapter 4. Fence D evices
T he following command creates a fence device instance for an IPMI over LAN device:
<fencedevices>
<fencedevice agent="fence_ipmilan" auth="password" cipher="3"
ipaddr="192.168.0.1" lanplus="on" login="root" \
name="ipmitest1" passwd="password123"/>
</fencedevices>
71
Red Hat Enterprise Linux 6 Fence Configuration Guide
T able 4 .22. RHEV-M REST API (RHEL 6.2 and later against RHEV 3.0 and later)
Figure 4.21, “RHEV-M REST API” shows the configuration screen for adding an RHEV-M REST API
device
T he following command creates a fence device instance for an RHEV-M REST API device:
72
Chapter 4. Fence D evices
<fencedevices>
<fencedevice agent="fence_rhevm" ipaddr="192.168.0.1" login="root"
name="rhevmtest1" passwd="password123" \
power_wait="60" ssl="on"/>
</fencedevices>
Note
Use of SCSI persistent reservations as a fence method is supported with the following limitations:
When using SCSI fencing, all nodes in the cluster must register with the same devices so that
each node can remove another node's registration key from all the devices it is registered
with.
Devices used for the cluster volumes should be a complete LUN, not partitions. SCSI
persistent reservations work on an entire LUN, meaning that access is controlled to each LUN,
not individual partitions.
Figure 4.22, “SCSI Fencing” shows the configuration screen for adding an SCSI fence device
73
Red Hat Enterprise Linux 6 Fence Configuration Guide
T he following command creates a fence device instance for a SCSI Fence device:
<fencedevices>
<<fencedevice agent="fence_scsi" name="scsifencetest1"/>
</fencedevices>
74
Chapter 4. Fence D evices
T able 4 .24 . VMware Fencing (SOAP Interface) (Red Hat Enterprise Linux 6.2 and later)
Figure 4.23, “VMWare over SOAP Fencing” shows the configuration screen for adding a VMWare over
SOAP fence device
75
Red Hat Enterprise Linux 6 Fence Configuration Guide
T he following command creates a fence device instance for a VMWare over SOAP fence device:
<fencedevices>
<fencedevice agent="fence_vmware_soap" ipaddr="192.168.0.1" login="root"
name="vmwaresoaptest1" passwd="password123" \
power_wait="60" separator="."/>
</fencedevices>
Figure 4.24, “WT I Fencing” shows the configuration screen for adding a WT I fence device
76
Chapter 4. Fence D evices
<fencedevices>
<fencedevice agent="fence_wti" cmd_prompt="VMR>" ipaddr="192.168.0.1"
login="root" name="wtipwrsw1" \
passwd="password123" power_wait="60"/>
</fencedevices>
77
Red Hat Enterprise Linux 6 Fence Configuration Guide
Revision History
Revision 1-9.4 04 Mon Nov 25 2013 Rüdiger Landmann
Rebuild with Publican 4.0.0
Index
A
ACPI
- configuring, Configuring ACPI For Use with Integrated Fence Devices
APC power switch over SNMP fence device , APC Power Switch over T elnet and SSH
APC power switch over telnet/SSH fence device , APC Power Switch over T elnet and
SSH
B
Brocade fabric switch fence device , Brocade Fabric Switch
C
CISCO MDS fence device , Cisco MDS
Cisco UCS fence device , Cisco UCS
cluster administration
- configuring ACPI, Configuring ACPI For Use with Integrated Fence Devices
D
Dell DRAC 5 fence device , Dell Drac 5
E
Eaton network power switch, Eaton Network Power Switch
Egenera SAN controller fence device , Egenera BladeFrame
ePowerSwitch fence device , ePowerSwitch
F
feedback
78
Revision History
fence
- configuration, Fencing Pre-Configuration
- devices, Fence Devices
fence agent
- fence_apc, APC Power Switch over T elnet and SSH
- fence_apc_snmp, APC Power Switch over T elnet and SSH
- fence_bladecenter, IBM BladeCenter
- fence_brocade, Brocade Fabric Switch
- fence_cisco_mds, Cisco MDS
- fence_cisco_ucs, Cisco UCS
- fence_drac5, Dell Drac 5
- fence_eaton_snmp, Eaton Network Power Switch
- fence_egenera, Egenera BladeFrame
- fence_eps, ePowerSwitch
- fence_hpblade, Hewlett-Packard BladeSystem
- fence_ibmblade, IBM BladeCenter over SNMP
- fence_ifmib, IF-MIB
- fence_ilo, Hewlett-Packard iLO
- fence_ilo_mp, Hewlett-Packard iLO MP
- fence_intelmodular, Intel Modular
- fence_ipdu, IBM iPDU
- fence_ipmilan, IPMI over LAN
- fence_rhevm, RHEV-M REST API
- fence_rsb, Fujitsu-Siemens RemoteView Service Board (RSB)
- fence_scsi, SCSI Persistent Reservations
- fence_virt, Fence Virt
- fence_vmware_soap, VMWare over SOAP API
- fence_wti, WT I Power Switch
79
Red Hat Enterprise Linux 6 Fence Configuration Guide
80
Revision History
H
help
- getting help, Do You Need Help?
I
IBM BladeCenter fence device , IBM BladeCenter
IBM BladeCenter SNMP fence device , IBM BladeCenter over SNMP
IBM iPDU fence device , IBM iPDU
IF MIB fence device , IF-MIB
integrated fence devices
- configuring ACPI, Configuring ACPI For Use with Integrated Fence Devices
R
RHEV-M REST API fence device , RHEV-M REST API
S
SCSI fencing, SCSI Persistent Reservations
T
tables
- fence devices, parameters, Fence Devices
V
VMware (SOAP interface) fence device , VMWare over SOAP API
W
WT I power switch fence device , WT I Power Switch
81