Pacemaker Explained¶
Configuring Pacemaker Clusters
Abstract¶
This document definitively explains Pacemaker’s features and capabilities, particularly the XML syntax used in Pacemaker’s Cluster Information Base (CIB).
Table of Contents¶
- 1. Introduction
- 2. Cluster-Wide Configuration
- 3. Cluster Nodes
- 4. Cluster Resources
- 5. Resource Constraints
- 6. Fencing
- 6.1. What Is Fencing?
- 6.2. Why Is Fencing Necessary?
- 6.3. Fence Devices
- 6.4. Fence Agents
- 6.5. When a Fence Device Can Be Used
- 6.6. Limitations of Fencing Resources
- 6.7. Special Meta-Attributes for Fencing Resources
- 6.8. Special Instance Attributes for Fencing Resources
- 6.9. Default Check Type
- 6.10. Unfencing
- 6.11. Fencing and Quorum
- 6.12. Fencing Timeouts
- 6.13. Fence Devices Dependent on Other Resources
- 6.14. Configuring Fencing
- 6.15. Fencing Topologies
- 6.16. Remapping Reboots
- 7. Alerts
- 8. Rules
- 9. Advanced Configuration
- 10. Advanced Resource Types
- 10.1. Groups - A Syntactic Shortcut
- 10.2. Clones - Resources That Can Have Multiple Active Instances
- 10.2.1. Anonymous versus Unique Clones
- 10.2.2. Promotable clones
- 10.2.3. Clone Properties
- 10.2.4. Clone Options
- 10.2.5. Clone Contents
- 10.2.6. Clone Instance Attribute
- 10.2.7. Clone Constraints
- 10.2.8. Clone Stickiness
- 10.2.9. Clone Resource Agent Requirements
- 10.2.10. Monitoring Promotable Clone Resources
- 10.2.11. Determining Which Instance is Promoted
- 10.3. Bundles - Containerized Resources
- 11. Reusing Parts of the Configuration
- 12. Utilization and Placement Strategy
- 13. Access Control Lists (ACLs)
- 14. Status – Here be dragons
- 15. Multi-Site Clusters and Tickets
- 16. Sample Configurations