]> git.proxmox.com Git - pve-ha-manager.git/blame - README
do not allow deletion of ha group if group is used
[pve-ha-manager.git] / README
CommitLineData
7cdfa499 1= Proxmox HA Manager =
95ca6580 2
7cdfa499
DM
3== Motivation ==
4
5The current HA manager has a bunch of drawbacks:
6
7- no more development (redhat moved to pacemaker)
8
b101fa0c 9- highly depend on old version of corosync
7cdfa499
DM
10
11- complicated code (cause by compatibility layer with
12 older cluster stack (cman)
13
14- no self-fencing
15
16In future, we want to make HA easier for our users, and it should
17be possible to move to newest corosync, or even a totally different
18cluster stack. So we want:
19
3b2ed964 20- possibility to run with any distributed key/value store which provides
f02ff212 21 some kind of locking with timeouts (zookeeper, consul, etcd, ..)
7cdfa499 22
b101fa0c 23- self fencing using Linux watchdog device
7cdfa499 24
b101fa0c 25- implemented in Perl, so that we can use PVE framework
95ca6580 26
3b2ed964
DM
27- only work with simply resources like VMs
28
29We dropped the idea to assemble complex, dependend services, because we think
30this is already done with the VM abstraction.
95ca6580 31
7cdfa499
DM
32= Architecture =
33
34== Cluster requirements ==
35
36=== Cluster wide locks with timeouts ===
37
38The cluster stack must provide cluster wide locks with timeouts.
39The Proxmox 'pmxcfs' implements this on top of corosync.
40
f02ff212
DM
41=== Watchdog ===
42
43We need a reliable watchdog mechanism, which is able to provide hard
44timeouts. It must be guaranteed that the node reboot withing specified
45timeout if we do not update the watchdog. For me it looks that neither
46systemd nor the standard watchdog(8) daemon provides such guarantees.
47
48We could use the /dev/watchdog directly, but unfortunately this only
49allows one user. We need to protect at least two daemons, so we write
50our own watchdog daemon. This daemon work on /dev/watchdog, but
51provides that service to several other daemons using a local socket.
52
7cdfa499
DM
53== Self fencing ==
54
b101fa0c
DM
55A node needs to aquire a special 'ha_agent_${node}_lock' (one separate
56lock for each node) before starting HA resources, and the node updates
57the watchdog device once it get that lock. If the node loose quorum,
58or is unable to get the 'ha_agent_${node}_lock', the watchdog is no
59longer updated. The node can release the lock if there are no running
60HA resources.
7cdfa499 61
b101fa0c
DM
62This makes sure that the node holds the 'ha_agent_${node}_lock' as
63long as there are running services on that node.
7cdfa499
DM
64
65The HA manger can assume that the watchdog triggered a reboot when he
b101fa0c
DM
66is able to aquire the 'ha_agent_${node}_lock' for that node.
67
71bf7e6b
DM
68=== Problems with "two_node" Clusters ===
69
70This corosync options depends on a fence race condition, and only
71works using reliable HW fence devices.
72
73Above 'self fencing' algorithm does not work if you use this option!
74
b101fa0c
DM
75== Testing requirements ==
76
77We want to be able to simulate HA cluster, using a GUI. This makes it easier
78to learn how the system behaves. We also need a way to run regression tests.
79
80= Implementation details =
81
82== Cluster Resource Manager (class PVE::HA::CRM) ==
83
84The Cluster Resource Manager (CRM) daemon runs one each node, but
85locking makes sure only one CRM daemon act in 'master' role. That
86'master' daemon reads the service configuration file, and request new
87service states by writing the global 'manager_status'. That data
88structure is read by the Local Resource Manager, which performs the
89real work (start/stop/migrate) services.
90
a821d99e
DM
91=== Service Relocation ===
92
93Some services like Qemu Virtual Machines supports live migration.
94So the LRM can migrate those services without stopping them (CRM
95service state 'migrate'),
96
2d7a0983
DM
97Most other service types requires the service to be stopped, and then
98restarted at the other node. Stopped services are moved by the CRM
99(usually by simply changing the service configuration).
a821d99e 100
618fbeda
DM
101=== Possible CRM Service States ===
102
103stopped: Service is stopped (confirmed by LRM)
104
105request_stop: Service should be stopped. Waiting for
106 confirmation from LRM.
107
108started: Service is active an LRM should start it asap.
109
110fence: Wait for node fencing (service node is not inside
111 quorate cluster partition).
112
3b2ed964
DM
113freeze: Do not touch. We use this state while we reboot a node,
114 or when we restart the LRM daemon.
115
a821d99e 116migrate: Migrate (live) service to other node.
618fbeda
DM
117
118error: Service disabled because of LRM errors.
119
a821d99e 120
b101fa0c
DM
121== Local Resource Manager (class PVE::HA::LRM) ==
122
123The Local Resource Manager (LRM) daemon runs one each node, and
124performs service commands (start/stop/migrate) for services assigned
125to the local node. It should be mentioned that each LRM holds a
126cluster wide 'ha_agent_${node}_lock' lock, and the CRM is not allowed
127to assign the service to another node while the LRM holds that lock.
128
129The LRM reads the requested service state from 'manager_status', and
130tries to bring the local service into that state. The actial service
131status is written back to the 'service_${node}_status', and can be
132read by the CRM.
133
134== Pluggable Interface for cluster environment (class PVE::HA::Env) ==
135
136This class defines an interface to the actual cluster environment:
137
138* get node membership and quorum information
139
140* get/release cluster wide locks
141
142* get system time
143
144* watchdog interface
145
146* read/write cluster wide status files
147
148We have plugins for several different environments:
149
150* PVE::HA::Sim::TestEnv: the regression test environment
151
152* PVE::HA::Sim::RTEnv: the graphical simulator
153
154* PVE::HA::Env::PVE2: the real Proxmox VE cluster
155
156