Skip to content

Commit f908ef0

Browse files
committed
changes based on review
1 parent 17e5f34 commit f908ef0

File tree

1 file changed

+22
-27
lines changed

1 file changed

+22
-27
lines changed

articles/sap/workloads/high-availability-guide-rhel-pacemaker.md

Lines changed: 22 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,12 @@ Read the following SAP Notes and articles first:
4242
## Overview
4343

4444
> [!IMPORTANT]
45-
> In Azure, RHEL high availability cluster with storage based fencing (fence_sbd) uses software-emulated watchdog. It is important to review [Software-Emulated Watchdog Known Limitations](https://access.redhat.com/articles/7034141) and [Support Policies for RHEL High Availability Clusters - sbd and fence_sbd](https://access.redhat.com/articles/2800691) when selecting SBD as the fencing mechanism.
45+
> Pacemaker clusters that span multiple Virtual networks(VNets)/subnets are not covered by standard support policies.
4646
47-
There are two options available for configuring the pacemaker cluster for RHEL with an SBD device.
47+
There are two options available on Azure for configuring the fencing in a pacemaker cluster for RHEL: Azure fence agent, which restarts a failed node via the Azure APIs, or you can use SBD device.
48+
49+
> [!IMPORTANT]
50+
> In Azure, RHEL high availability cluster with storage based fencing (fence_sbd) uses software-emulated watchdog. It is important to review [Software-Emulated Watchdog Known Limitations](https://access.redhat.com/articles/7034141) and [Support Policies for RHEL High Availability Clusters - sbd and fence_sbd](https://access.redhat.com/articles/2800691) when selecting SBD as the fencing mechanism.
4851
4952
### Use an SBD device
5053

@@ -399,9 +402,6 @@ On the cluster nodes, connect and discover iSCSI device that was created in the
399402
systemctl show sbd | grep -i timeout
400403
# TimeoutStartUSec=2min 24s
401404
# TimeoutStopUSec=2min 24s
402-
# JobTimeoutUSec=infinity
403-
# JobRunningTimeoutUSec=infinity
404-
# JobTimeoutAction=none
405405
```
406406
407407
## SBD with an Azure shared disk
@@ -543,9 +543,6 @@ foreach ($vmName in $vmNames) {
543543
systemctl show sbd | grep -i timeout
544544
# TimeoutStartUSec=2min 24s
545545
# TimeoutStopUSec=2min 24s
546-
# JobTimeoutUSec=infinity
547-
# JobRunningTimeoutUSec=infinity
548-
# JobTimeoutAction=none
549546
```
550547
551548
## Azure fence agent configuration
@@ -624,9 +621,6 @@ The fencing device uses either a managed identity for Azure resource or a servic
624621
625622
## Cluster installation
626623
627-
> [!IMPORTANT]
628-
> Pacemaker clusters that span multiple Virtual networks(VNets)/subnets are not covered by standard support policies.
629-
630624
Differences in the commands or the configuration between RHEL 7 and RHEL 8/RHEL 9 are marked in the document.
631625
632626
1. **[A]** Install the RHEL HA add-on.
@@ -791,7 +785,7 @@ Differences in the commands or the configuration between RHEL 7 and RHEL 8/RHEL
791785
> * The property `priority-fencing-delay` is applicable for Pacemaker version 2.0.4-6.el8 or higher and on a two-node cluster. If you configure the `priority-fencing-delay` cluster property, you don't need to set the `pcmk_delay_max` property. But if the Pacemaker version is less than 2.0.4-6.el8, you need to set the `pcmk_delay_max` property.
792786
> * For instructions on how to set the `priority-fencing-delay` cluster property, see the respective SAP ASCS/ERS and SAP HANA scale-up HA documents.
793787
794-
Based on the selected fencing mechanism, follow relevant instructions: [SBD as fencing device](#sbd-as-fencing-device) or [Azure fence agent as fencing device](#azure-fence-agent-as-fencing-device).
788+
Based on the selected fencing mechanism, follow only one section for relevant instructions: [SBD as fencing device](#sbd-as-fencing-device) or [Azure fence agent as fencing device](#azure-fence-agent-as-fencing-device).
795789
796790
#### SBD as fencing device
797791
@@ -990,7 +984,7 @@ When the cluster health attribute is set for a node, the location constraint tri
990984
> [!TIP]
991985
> This section is only applicable if you want to configure the special fencing device `fence_kdump`.
992986

993-
If you need to collect diagnostic information within the VM, it might be useful to configure another fencing device based on the fence agent `fence_kdump`. The `fence_kdump` agent can detect that a node entered kdump crash recovery and can allow the crash recovery service to complete before other fencing methods are invoked. Note that `fence_kdump` isn't a replacement for traditional fence mechanisms, like the Azure fence agent, when you're using Azure VMs.
987+
If you need to collect diagnostic information within the VM, it might be useful to configure another fencing device based on the fence agent `fence_kdump`. The `fence_kdump` agent can detect that a node entered kdump crash recovery and can allow the crash recovery service to complete before other fencing methods are invoked. Note that `fence_kdump` isn't a replacement for traditional fence mechanisms, like the SBD or Azure fence agent, when you're using Azure VMs.
994988

995989
> [!IMPORTANT]
996990
> Be aware that when `fence_kdump` is configured as a first-level fencing device, it introduces delays in the fencing operations and, respectively, delays in the application resources failover.
@@ -999,7 +993,7 @@ If you need to collect diagnostic information within the VM, it might be useful
999993
>
1000994
> The proposed `fence_kdump` timeout might need to be adapted to the specific environment.
1001995
>
1002-
> We recommend that you configure `fence_kdump` fencing only when necessary to collect diagnostics within the VM and always in combination with traditional fence methods, such as the Azure fence agent.
996+
> We recommend that you configure `fence_kdump` fencing only when necessary to collect diagnostics within the VM and always in combination with traditional fence methods, such as SBD or Azure fence agent.
1003997
1004998
The following Red Hat KB articles contain important information about configuring `fence_kdump` fencing:
1005999
@@ -1037,18 +1031,19 @@ Run the following optional steps to add `fence_kdump` as a first-level fencing c
10371031
pcs stonith create rsc_st_kdump fence_kdump pcmk_reboot_action="off" pcmk_host_list="prod-cl1-0 prod-cl1-1"
10381032
pcs stonith level add 1 prod-cl1-0 rsc_st_kdump
10391033
pcs stonith level add 1 prod-cl1-1 rsc_st_kdump
1040-
pcs stonith level add 2 prod-cl1-0 rsc_st_azure
1041-
pcs stonith level add 2 prod-cl1-1 rsc_st_azure
1034+
# Replace <stonith-resource-name> to the resource name of the STONITH resource configured in your pacemaker cluster (example based on above configuration - sbd or rsc_st_azure)
1035+
pcs stonith level add 2 prod-cl1-0 <stonith-resource-name>
1036+
pcs stonith level add 2 prod-cl1-1 <stonith-resource-name>
10421037
10431038
# Check the fencing level configuration
10441039
pcs stonith level
10451040
# Example output
10461041
# Target: prod-cl1-0
10471042
# Level 1 - rsc_st_kdump
1048-
# Level 2 - rsc_st_azure
1043+
# Level 2 - <stonith-resource-name>
10491044
# Target: prod-cl1-1
10501045
# Level 1 - rsc_st_kdump
1051-
# Level 2 - rsc_st_azure
1046+
# Level 2 - <stonith-resource-name>
10521047
```
10531048
10541049
1. **[A]** Allow the required ports for `fence_kdump` through the firewall.
@@ -1058,15 +1053,6 @@ Run the following optional steps to add `fence_kdump` as a first-level fencing c
10581053
firewall-cmd --add-port=7410/udp --permanent
10591054
```
10601055
1061-
1. **[A]** Ensure that the `initramfs` image file contains the `fence_kdump` and `hosts` files. For more information, see [How do I configure fence_kdump in a Red Hat Pacemaker cluster?](https://access.redhat.com/solutions/2876971).
1062-
1063-
```bash
1064-
lsinitrd /boot/initramfs-$(uname -r)kdump.img | egrep "fence|hosts"
1065-
# Example output
1066-
# -rw-r--r-- 1 root root 208 Jun 7 21:42 etc/hosts
1067-
# -rwxr-xr-x 1 root root 15560 Jun 17 14:59 usr/libexec/fence_kdump_send
1068-
```
1069-
10701056
1. **[A]** Perform the `fence_kdump_nodes` configuration in `/etc/kdump.conf` to avoid `fence_kdump` from failing with a timeout for some `kexec-tools` versions. For more information, see [fence_kdump times out when fence_kdump_nodes isn't specified with kexec-tools version 2.0.15 or later](https://access.redhat.com/solutions/4498151) and [fence_kdump fails with "timeout after X seconds" in a RHEL 6 or 7 High Availability cluster with kexec-tools versions older than 2.0.14](https://access.redhat.com/solutions/2388711). The example configuration for a two-node cluster is presented here. After you make a change in `/etc/kdump.conf`, the kdump image must be regenerated. To regenerate, restart the `kdump` service.
10711057

10721058
```bash
@@ -1080,6 +1066,15 @@ Run the following optional steps to add `fence_kdump` as a first-level fencing c
10801066
systemctl restart kdump
10811067
```
10821068

1069+
1. **[A]** Ensure that the `initramfs` image file contains the `fence_kdump` and `hosts` files. For more information, see [How do I configure fence_kdump in a Red Hat Pacemaker cluster?](https://access.redhat.com/solutions/2876971).
1070+
1071+
```bash
1072+
lsinitrd /boot/initramfs-$(uname -r)kdump.img | egrep "fence|hosts"
1073+
# Example output
1074+
# -rw-r--r-- 1 root root 208 Jun 7 21:42 etc/hosts
1075+
# -rwxr-xr-x 1 root root 15560 Jun 17 14:59 usr/libexec/fence_kdump_send
1076+
```
1077+
10831078
1. Test the configuration by crashing a node. For more information, see [How do I configure fence_kdump in a Red Hat Pacemaker cluster?](https://access.redhat.com/solutions/2876971).
10841079

10851080
> [!IMPORTANT]

0 commit comments

Comments
 (0)