You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/workloads/high-availability-guide-rhel-pacemaker.md
+22-27Lines changed: 22 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,9 +42,12 @@ Read the following SAP Notes and articles first:
42
42
## Overview
43
43
44
44
> [!IMPORTANT]
45
-
> In Azure, RHEL high availability cluster with storage based fencing (fence_sbd) uses software-emulated watchdog. It is important to review [Software-Emulated Watchdog Known Limitations](https://access.redhat.com/articles/7034141) and [Support Policies for RHEL High Availability Clusters - sbd and fence_sbd](https://access.redhat.com/articles/2800691) when selecting SBD as the fencing mechanism.
45
+
> Pacemaker clusters that span multiple Virtual networks(VNets)/subnets are not covered by standard support policies.
46
46
47
-
There are two options available for configuring the pacemaker cluster for RHEL with an SBD device.
47
+
There are two options available on Azure for configuring the fencing in a pacemaker cluster for RHEL: Azure fence agent, which restarts a failed node via the Azure APIs, or you can use SBD device.
48
+
49
+
> [!IMPORTANT]
50
+
> In Azure, RHEL high availability cluster with storage based fencing (fence_sbd) uses software-emulated watchdog. It is important to review [Software-Emulated Watchdog Known Limitations](https://access.redhat.com/articles/7034141) and [Support Policies for RHEL High Availability Clusters - sbd and fence_sbd](https://access.redhat.com/articles/2800691) when selecting SBD as the fencing mechanism.
48
51
49
52
### Use an SBD device
50
53
@@ -399,9 +402,6 @@ On the cluster nodes, connect and discover iSCSI device that was created in the
399
402
systemctl show sbd | grep -i timeout
400
403
# TimeoutStartUSec=2min 24s
401
404
# TimeoutStopUSec=2min 24s
402
-
# JobTimeoutUSec=infinity
403
-
# JobRunningTimeoutUSec=infinity
404
-
# JobTimeoutAction=none
405
405
```
406
406
407
407
## SBD with an Azure shared disk
@@ -543,9 +543,6 @@ foreach ($vmName in $vmNames) {
543
543
systemctl show sbd | grep -i timeout
544
544
# TimeoutStartUSec=2min 24s
545
545
# TimeoutStopUSec=2min 24s
546
-
# JobTimeoutUSec=infinity
547
-
# JobRunningTimeoutUSec=infinity
548
-
# JobTimeoutAction=none
549
546
```
550
547
551
548
## Azure fence agent configuration
@@ -624,9 +621,6 @@ The fencing device uses either a managed identity for Azure resource or a servic
624
621
625
622
## Cluster installation
626
623
627
-
> [!IMPORTANT]
628
-
> Pacemaker clusters that span multiple Virtual networks(VNets)/subnets are not covered by standard support policies.
629
-
630
624
Differences in the commands or the configuration between RHEL 7 and RHEL 8/RHEL 9 are marked in the document.
631
625
632
626
1. **[A]** Install the RHEL HA add-on.
@@ -791,7 +785,7 @@ Differences in the commands or the configuration between RHEL 7 and RHEL 8/RHEL
791
785
>* The property `priority-fencing-delay` is applicable for Pacemaker version 2.0.4-6.el8 or higher and on a two-node cluster. If you configure the `priority-fencing-delay` cluster property, you don't need to set the `pcmk_delay_max` property. But if the Pacemaker version is less than 2.0.4-6.el8, you need to set the `pcmk_delay_max` property.
792
786
> * For instructions on how to set the `priority-fencing-delay` cluster property, see the respective SAP ASCS/ERS and SAP HANA scale-up HA documents.
793
787
794
-
Based on the selected fencing mechanism, follow relevant instructions: [SBD as fencing device](#sbd-as-fencing-device) or [Azure fence agent as fencing device](#azure-fence-agent-as-fencing-device).
788
+
Based on the selected fencing mechanism, follow only one section for relevant instructions: [SBD as fencing device](#sbd-as-fencing-device) or [Azure fence agent as fencing device](#azure-fence-agent-as-fencing-device).
795
789
796
790
#### SBD as fencing device
797
791
@@ -990,7 +984,7 @@ When the cluster health attribute is set for a node, the location constraint tri
990
984
> [!TIP]
991
985
> This section is only applicable if you want to configure the special fencing device `fence_kdump`.
992
986
993
-
If you need to collect diagnostic information within the VM, it might be useful to configure another fencing device based on the fence agent `fence_kdump`. The `fence_kdump` agent can detect that a node entered kdump crash recovery and can allow the crash recovery service to complete before other fencing methods are invoked. Note that `fence_kdump` isn't a replacement for traditional fence mechanisms, like the Azure fence agent, when you're using Azure VMs.
987
+
If you need to collect diagnostic information within the VM, it might be useful to configure another fencing device based on the fence agent `fence_kdump`. The `fence_kdump` agent can detect that a node entered kdump crash recovery and can allow the crash recovery service to complete before other fencing methods are invoked. Note that `fence_kdump` isn't a replacement for traditional fence mechanisms, like the SBD or Azure fence agent, when you're using Azure VMs.
994
988
995
989
> [!IMPORTANT]
996
990
> Be aware that when `fence_kdump` is configured as a first-level fencing device, it introduces delays in the fencing operations and, respectively, delays in the application resources failover.
@@ -999,7 +993,7 @@ If you need to collect diagnostic information within the VM, it might be useful
999
993
>
1000
994
> The proposed `fence_kdump` timeout might need to be adapted to the specific environment.
1001
995
>
1002
-
> We recommend that you configure `fence_kdump` fencing only when necessary to collect diagnostics within the VM and always in combination with traditional fence methods, such as the Azure fence agent.
996
+
> We recommend that you configure `fence_kdump` fencing only when necessary to collect diagnostics within the VM and always in combination with traditional fence methods, such as SBD or Azure fence agent.
1003
997
1004
998
The following Red Hat KB articles contain important information about configuring `fence_kdump` fencing:
1005
999
@@ -1037,18 +1031,19 @@ Run the following optional steps to add `fence_kdump` as a first-level fencing c
# Replace <stonith-resource-name> to the resource name of the STONITH resource configured in your pacemaker cluster (example based on above configuration - sbd or rsc_st_azure)
1. **[A]** Allow the required ports for `fence_kdump` through the firewall.
@@ -1058,15 +1053,6 @@ Run the following optional steps to add `fence_kdump` as a first-level fencing c
1058
1053
firewall-cmd --add-port=7410/udp --permanent
1059
1054
```
1060
1055
1061
-
1. **[A]** Ensure that the `initramfs` image file contains the `fence_kdump` and `hosts` files. For more information, see [How do I configure fence_kdump in a Red Hat Pacemaker cluster?](https://access.redhat.com/solutions/2876971).
# -rw-r--r-- 1 root root 208 Jun 7 21:42 etc/hosts
1067
-
# -rwxr-xr-x 1 root root 15560 Jun 17 14:59 usr/libexec/fence_kdump_send
1068
-
```
1069
-
1070
1056
1. **[A]** Perform the `fence_kdump_nodes` configuration in `/etc/kdump.conf` to avoid `fence_kdump` from failing with a timeout for some `kexec-tools` versions. For more information, see [fence_kdump times out when fence_kdump_nodes isn't specified with kexec-tools version 2.0.15 or later](https://access.redhat.com/solutions/4498151) and [fence_kdump fails with "timeout after X seconds"in a RHEL 6 or 7 High Availability cluster with kexec-tools versions older than 2.0.14](https://access.redhat.com/solutions/2388711). The example configuration fora two-node cluster is presented here. After you make a changein`/etc/kdump.conf`, the kdump image must be regenerated. To regenerate, restart the `kdump` service.
1071
1057
1072
1058
```bash
@@ -1080,6 +1066,15 @@ Run the following optional steps to add `fence_kdump` as a first-level fencing c
1080
1066
systemctl restart kdump
1081
1067
```
1082
1068
1069
+
1. **[A]** Ensure that the `initramfs` image file contains the `fence_kdump` and `hosts` files. For more information, see [How do I configure fence_kdump in a Red Hat Pacemaker cluster?](https://access.redhat.com/solutions/2876971).
# -rw-r--r-- 1 root root 208 Jun 7 21:42 etc/hosts
1075
+
# -rwxr-xr-x 1 root root 15560 Jun 17 14:59 usr/libexec/fence_kdump_send
1076
+
```
1077
+
1083
1078
1. Test the configuration by crashing a node. For more information, see [How do I configure fence_kdump in a Red Hat Pacemaker cluster?](https://access.redhat.com/solutions/2876971).
0 commit comments