Red Hat GFS 6.0

Administrator's Guide

ISBN: N/A
Table of Contents
Introduction
1. Audience
2. Document Conventions
3. More to Come
3.1. Send in Your Feedback
4. Activate Your Subscription
4.1. Provide a Red Hat Login
4.2. Provide Your Subscription Number
4.3. Connect Your System
5. Recommended References
1. Red Hat GFS Overview
1.1. New and Changed Features
1.2. Performance, Scalability, and Economy
1.2.1. Superior Performance and Scalability
1.2.2. Performance, Scalability, Moderate Price
1.2.3. Economy and Performance
1.3. GFS Functions
1.3.1. Cluster Volume Management
1.3.2. Lock Management
1.3.3. Cluster Management, Fencing, and Recovery
1.3.4. Cluster Configuration Management
1.4. GFS Software Subsystems
1.5. Before Configuring GFS
2. System Requirements
2.1. Platform Requirements
2.2. TCP/IP Network
2.3. Fibre Channel Storage Network
2.4. Fibre Channel Storage Devices
2.5. Network Power Switches
2.6. Console Access
2.7. I/O Fencing
3. Installing GFS
3.1. Prerequisite Tasks
3.1.1. Prerequisite Software
3.1.2. Specifying a Persistent Major Number
3.2. Installation Tasks
3.2.1. Installing GFS RPMs
3.2.2. Loading the GFS Kernel Modules
4. Initial Configuration
4.1. Prerequisite Tasks
4.2. Initial Configuration Tasks
4.2.1. Setting Up Logical Devices
4.2.2. Setting Up and Starting the Cluster Configuration System
4.2.3. Starting Clustering and Locking Systems
4.2.4. Setting Up and Mounting File Systems
5. Using the Pool Volume Manager
5.1. Overview of GFS Pool Volume Manager
5.2. Synopsis of Pool Management Commands
5.2.1. pool_tool
5.2.2. pool_assemble
5.2.3. pool_info
5.2.4. pool_mp
5.3. Scanning Block Devices
5.3.1. Usage
5.3.2. Example
5.4. Creating a Configuration File for a New Volume
5.4.1. Examples
5.5. Creating a Pool Volume
5.5.1. Usage
5.5.2. Example
5.5.3. Comments
5.6. Activating/Deactivating a Pool Volume
5.6.1. Usage
5.6.2. Examples
5.6.3. Comments
5.7. Displaying Pool Configuration Information
5.7.1. Usage
5.7.2. Example
5.8. Growing a Pool Volume
5.8.1. Usage
5.8.2. Example procedure
5.9. Erasing a Pool Volume
5.9.1. Usage
5.9.2. Example
5.9.3. Comments
5.10. Renaming a Pool Volume
5.10.1. Usage
5.10.2. Example
5.11. Changing a Pool Volume Minor Number
5.11.1. Usage
5.11.2. Example
5.11.3. Comments
5.12. Displaying Pool Volume Information
5.12.1. Usage
5.12.2. Examples
5.13. Using Pool Volume Statistics
5.13.1. Usage
5.13.2. Examples
5.14. Adjusting Pool Volume Multipathing
5.14.1. Usage
5.14.2. Examples
6. Creating the Cluster Configuration System Files
6.1. Prerequisite Tasks
6.2. CCS File Creation Tasks
6.3. Dual Power and Multipath FC Fencing Considerations
6.4. GNBD Multipath Considerations for CCS Files
6.5. Creating the cluster.ccs File
6.6. Creating the fence.ccs File
6.7. Creating the nodes.ccs File
7. Using the Cluster Configuration System
7.1. Creating a CCS Archive
7.1.1. Usage
7.1.2. Example
7.1.3. Comments
7.2. Starting CCS in the Cluster
7.2.1. Usage
7.2.2. Example
7.2.3. Comments
7.3. Using Other CCS Administrative Options
7.3.1. Extracting Files from a CCS Archive
7.3.2. Listing Files in a CCS Archive
7.3.3. Comparing CCS Configuration Files to a CCS Archive
7.4. Changing CCS Configuration Files
7.4.1. Example Procedure
7.5. Alternative Methods to Using a CCA Device
7.5.1. CCA File and Server
7.5.2. Local CCA Files
7.6. Combining CCS Methods
8. Using Clustering and Locking Systems
8.1. Locking System Overview
8.2. LOCK_GULM
8.2.1. Selection of LOCK_GULM Servers
8.2.2. Number of LOCK_GULM Servers
8.2.3. Starting LOCK_GULM Servers
8.2.4. Fencing and LOCK_GULM
8.2.5. Shutting Down a LOCK_GULM Server
8.3. LOCK_NOLOCK
9. Managing GFS
9.1. Making a File System
9.1.1. Usage
9.1.2. Examples
9.1.3. Complete Options
9.2. Mounting a File System
9.2.1. Usage
9.2.2. Example
9.2.3. Complete Usage
9.3. Unmounting a File System
9.3.1. Usage
9.4. GFS Quota Management
9.4.1. Setting Quotas
9.4.2. Displaying Quota Limits and Usage
9.4.3. Synchronizing Quotas
9.4.4. Disabling/Enabling Quota Enforcement
9.4.5. Disabling/Enabling Quota Accounting
9.5. Growing a File System
9.5.1. Usage
9.5.2. Comments
9.5.3. Examples
9.5.4. Complete Usage
9.6. Adding Journals to a File System
9.6.1. Usage
9.6.2. Comments
9.6.3. Examples
9.6.4. Complete Usage
9.7. Direct I/O
9.7.1. O_DIRECT
9.7.2. GFS File Attribute
9.7.3. GFS Directory Attribute
9.8. Data Journaling
9.8.1. Usage
9.8.2. Examples
9.9. Configuring atime Updates
9.9.1. Mount with noatime
9.9.2. Tune GFS atime Quantum
9.10. Suspending Activity on a File System
9.10.1. Usage
9.10.2. Examples
9.11. Displaying Extended GFS Information and Statistics
9.11.1. Usage
9.11.2. Examples
9.12. Repairing a File System
9.12.1. Usage
9.12.2. Example
9.13. Context-Dependent Path Names
9.13.1. Usage
9.13.2. Example
9.14. Shutting Down a GFS Cluster
9.15. Starting a GFS Cluster
10. Using the Fencing System
10.1. How the Fencing System Works
10.2. Fencing Methods
10.2.1. APC MasterSwitch
10.2.2. WTI Network Power Switch
10.2.3. Brocade FC Switch
10.2.4. Vixel FC Switch
10.2.5. HP RILOE Card
10.2.6. GNBD
10.2.7. Manual
11. Using GNBD
11.1. GNBD Driver and Command Usage
11.1.1. Exporting a GNBD from a Server
11.1.2. Importing a GNBD on a Client
11.2. Considerations for Using GNBD Multipath
11.2.1. Linux Page Caching
11.2.2. Lock Server Startup
11.2.3. CCS File Location
11.2.4. Fencing GNBD Server Nodes
11.3. Running GFS on a GNBD Server Node
12. Using GFS init.d Scripts
12.1. GFS init.d Scripts Overview
12.2. GFS init.d Scripts Use
A. Using Red Hat GFS with Red Hat Cluster Suite
A.1. Terminology
A.2. Changes to Red Hat Cluster
A.3. Installation Scenarios
A.3.1. New Installations of Red Hat GFS and Red Hat Cluster Manager
A.3.2. Adding Red Hat GFS to an Existing Red Hat Cluster Manager Deployment
A.3.3. Upgrading Red Hat GFS 5.2.1 to Red Hat GFS 6.0
B. Upgrading GFS
C. Basic GFS Examples
C.1. LOCK_GULM, RLM Embedded
C.1.1. Key Characteristics
C.1.2. Kernel Modules Loaded
C.1.3. Setup Process
C.2. LOCK_GULM, RLM External
C.2.1. Key Characteristics
C.2.2. Kernel Modules Loaded
C.2.3. Setup Process
C.3. LOCK_GULM, SLM Embedded
C.3.1. Key Characteristics
C.3.2. Kernel Modules Loaded
C.3.3. Setup Process
C.4. LOCK_GULM, SLM External
C.4.1. Key Characteristics
C.4.2. Kernel Modules Loaded
C.4.3. Setup Process
C.5. LOCK_GULM, SLM External, and GNBD
C.5.1. Key Characteristics
C.5.2. Kernel Modules Loaded
C.5.3. Setup Process
C.6. LOCK_NOLOCK
C.6.1. Key Characteristics
C.6.2. Kernel Modules Loaded
C.6.3. Setup Process
Index
Colophon