]>
Commit | Line | Data |
---|---|---|
d8742b0c | 1 | ifdef::manvolnum[] |
b2f242ab DM |
2 | pvecm(1) |
3 | ======== | |
5f09af76 DM |
4 | :pve-toplevel: |
5 | ||
d8742b0c DM |
6 | NAME |
7 | ---- | |
8 | ||
74026b8f | 9 | pvecm - Proxmox VE Cluster Manager |
d8742b0c | 10 | |
49a5e11c | 11 | SYNOPSIS |
d8742b0c DM |
12 | -------- |
13 | ||
14 | include::pvecm.1-synopsis.adoc[] | |
15 | ||
16 | DESCRIPTION | |
17 | ----------- | |
18 | endif::manvolnum[] | |
19 | ||
20 | ifndef::manvolnum[] | |
21 | Cluster Manager | |
22 | =============== | |
5f09af76 | 23 | :pve-toplevel: |
194d2f29 | 24 | endif::manvolnum[] |
5f09af76 | 25 | |
8c1189b6 FG |
26 | The {PVE} cluster manager `pvecm` is a tool to create a group of |
27 | physical servers. Such a group is called a *cluster*. We use the | |
8a865621 | 28 | http://www.corosync.org[Corosync Cluster Engine] for reliable group |
5eba0743 | 29 | communication, and such clusters can consist of up to 32 physical nodes |
8a865621 DM |
30 | (probably more, dependent on network latency). |
31 | ||
8c1189b6 | 32 | `pvecm` can be used to create a new cluster, join nodes to a cluster, |
8a865621 | 33 | leave the cluster, get status information and do various other cluster |
e300cf7d FG |
34 | related tasks. The **P**rox**m**o**x** **C**luster **F**ile **S**ystem (``pmxcfs'') |
35 | is used to transparently distribute the cluster configuration to all cluster | |
8a865621 DM |
36 | nodes. |
37 | ||
38 | Grouping nodes into a cluster has the following advantages: | |
39 | ||
40 | * Centralized, web based management | |
41 | ||
5eba0743 | 42 | * Multi-master clusters: each node can do all management task |
8a865621 | 43 | |
8c1189b6 FG |
44 | * `pmxcfs`: database-driven file system for storing configuration files, |
45 | replicated in real-time on all nodes using `corosync`. | |
8a865621 | 46 | |
5eba0743 | 47 | * Easy migration of virtual machines and containers between physical |
8a865621 DM |
48 | hosts |
49 | ||
50 | * Fast deployment | |
51 | ||
52 | * Cluster-wide services like firewall and HA | |
53 | ||
54 | ||
55 | Requirements | |
56 | ------------ | |
57 | ||
8c1189b6 | 58 | * All nodes must be in the same network as `corosync` uses IP Multicast |
8a865621 | 59 | to communicate between nodes (also see |
ceabe189 | 60 | http://www.corosync.org[Corosync Cluster Engine]). Corosync uses UDP |
ff72a2ba | 61 | ports 5404 and 5405 for cluster communication. |
ceabe189 DM |
62 | + |
63 | NOTE: Some switches do not support IP multicast by default and must be | |
64 | manually enabled first. | |
8a865621 DM |
65 | |
66 | * Date and time have to be synchronized. | |
67 | ||
ceabe189 | 68 | * SSH tunnel on TCP port 22 between nodes is used. |
8a865621 | 69 | |
ceabe189 DM |
70 | * If you are interested in High Availability, you need to have at |
71 | least three nodes for reliable quorum. All nodes should have the | |
72 | same version. | |
8a865621 DM |
73 | |
74 | * We recommend a dedicated NIC for the cluster traffic, especially if | |
75 | you use shared storage. | |
76 | ||
77 | NOTE: It is not possible to mix Proxmox VE 3.x and earlier with | |
ceabe189 | 78 | Proxmox VE 4.0 cluster nodes. |
8a865621 DM |
79 | |
80 | ||
ceabe189 DM |
81 | Preparing Nodes |
82 | --------------- | |
8a865621 DM |
83 | |
84 | First, install {PVE} on all nodes. Make sure that each node is | |
85 | installed with the final hostname and IP configuration. Changing the | |
86 | hostname and IP is not possible after cluster creation. | |
87 | ||
88 | Currently the cluster creation has to be done on the console, so you | |
8c1189b6 | 89 | need to login via `ssh`. |
8a865621 | 90 | |
8a865621 | 91 | Create the Cluster |
ceabe189 | 92 | ------------------ |
8a865621 | 93 | |
8c1189b6 FG |
94 | Login via `ssh` to the first {pve} node. Use a unique name for your cluster. |
95 | This name cannot be changed later. | |
8a865621 DM |
96 | |
97 | hp1# pvecm create YOUR-CLUSTER-NAME | |
98 | ||
63f956c8 DM |
99 | CAUTION: The cluster name is used to compute the default multicast |
100 | address. Please use unique cluster names if you run more than one | |
101 | cluster inside your network. | |
102 | ||
8a865621 DM |
103 | To check the state of your cluster use: |
104 | ||
105 | hp1# pvecm status | |
106 | ||
107 | ||
108 | Adding Nodes to the Cluster | |
ceabe189 | 109 | --------------------------- |
8a865621 | 110 | |
8c1189b6 | 111 | Login via `ssh` to the node you want to add. |
8a865621 DM |
112 | |
113 | hp2# pvecm add IP-ADDRESS-CLUSTER | |
114 | ||
115 | For `IP-ADDRESS-CLUSTER` use the IP from an existing cluster node. | |
116 | ||
5eba0743 | 117 | CAUTION: A new node cannot hold any VMs, because you would get |
7980581f | 118 | conflicts about identical VM IDs. Also, all existing configuration in |
8c1189b6 FG |
119 | `/etc/pve` is overwritten when you join a new node to the cluster. To |
120 | workaround, use `vzdump` to backup and restore to a different VMID after | |
7980581f | 121 | adding the node to the cluster. |
8a865621 DM |
122 | |
123 | To check the state of cluster: | |
124 | ||
125 | # pvecm status | |
126 | ||
ceabe189 | 127 | .Cluster status after adding 4 nodes |
8a865621 DM |
128 | ---- |
129 | hp2# pvecm status | |
130 | Quorum information | |
131 | ~~~~~~~~~~~~~~~~~~ | |
132 | Date: Mon Apr 20 12:30:13 2015 | |
133 | Quorum provider: corosync_votequorum | |
134 | Nodes: 4 | |
135 | Node ID: 0x00000001 | |
136 | Ring ID: 1928 | |
137 | Quorate: Yes | |
138 | ||
139 | Votequorum information | |
140 | ~~~~~~~~~~~~~~~~~~~~~~ | |
141 | Expected votes: 4 | |
142 | Highest expected: 4 | |
143 | Total votes: 4 | |
144 | Quorum: 2 | |
145 | Flags: Quorate | |
146 | ||
147 | Membership information | |
148 | ~~~~~~~~~~~~~~~~~~~~~~ | |
149 | Nodeid Votes Name | |
150 | 0x00000001 1 192.168.15.91 | |
151 | 0x00000002 1 192.168.15.92 (local) | |
152 | 0x00000003 1 192.168.15.93 | |
153 | 0x00000004 1 192.168.15.94 | |
154 | ---- | |
155 | ||
156 | If you only want the list of all nodes use: | |
157 | ||
158 | # pvecm nodes | |
159 | ||
5eba0743 | 160 | .List nodes in a cluster |
8a865621 DM |
161 | ---- |
162 | hp2# pvecm nodes | |
163 | ||
164 | Membership information | |
165 | ~~~~~~~~~~~~~~~~~~~~~~ | |
166 | Nodeid Votes Name | |
167 | 1 1 hp1 | |
168 | 2 1 hp2 (local) | |
169 | 3 1 hp3 | |
170 | 4 1 hp4 | |
171 | ---- | |
172 | ||
e4ec4154 TL |
173 | Adding Nodes With Separated Cluster Network |
174 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
175 | ||
176 | When adding a node to a cluster with a separated cluster network you need to | |
177 | use the 'ringX_addr' parameters to set the nodes address on those networks: | |
178 | ||
179 | [source,bash] | |
4d19cb00 | 180 | ---- |
e4ec4154 | 181 | pvecm add IP-ADDRESS-CLUSTER -ring0_addr IP-ADDRESS-RING0 |
4d19cb00 | 182 | ---- |
e4ec4154 TL |
183 | |
184 | If you want to use the Redundant Ring Protocol you will also want to pass the | |
185 | 'ring1_addr' parameter. | |
186 | ||
8a865621 DM |
187 | |
188 | Remove a Cluster Node | |
ceabe189 | 189 | --------------------- |
8a865621 DM |
190 | |
191 | CAUTION: Read carefully the procedure before proceeding, as it could | |
192 | not be what you want or need. | |
193 | ||
194 | Move all virtual machines from the node. Make sure you have no local | |
195 | data or backups you want to keep, or save them accordingly. | |
e8503c6c | 196 | In the following example we will remove the node hp4 from the cluster. |
8a865621 | 197 | |
e8503c6c EK |
198 | Log in to a *different* cluster node (not hp4), and issue a `pvecm nodes` |
199 | command to identify the node ID to remove: | |
8a865621 DM |
200 | |
201 | ---- | |
202 | hp1# pvecm nodes | |
203 | ||
204 | Membership information | |
205 | ~~~~~~~~~~~~~~~~~~~~~~ | |
206 | Nodeid Votes Name | |
207 | 1 1 hp1 (local) | |
208 | 2 1 hp2 | |
209 | 3 1 hp3 | |
210 | 4 1 hp4 | |
211 | ---- | |
212 | ||
e8503c6c EK |
213 | |
214 | At this point you must power off hp4 and | |
215 | make sure that it will not power on again (in the network) as it | |
216 | is. | |
217 | ||
218 | IMPORTANT: As said above, it is critical to power off the node | |
219 | *before* removal, and make sure that it will *never* power on again | |
220 | (in the existing cluster network) as it is. | |
221 | If you power on the node as it is, your cluster will be screwed up and | |
222 | it could be difficult to restore a clean cluster state. | |
223 | ||
224 | After powering off the node hp4, we can safely remove it from the cluster. | |
8a865621 DM |
225 | |
226 | hp1# pvecm delnode hp4 | |
227 | ||
228 | If the operation succeeds no output is returned, just check the node | |
8c1189b6 | 229 | list again with `pvecm nodes` or `pvecm status`. You should see |
8a865621 DM |
230 | something like: |
231 | ||
232 | ---- | |
233 | hp1# pvecm status | |
234 | ||
235 | Quorum information | |
236 | ~~~~~~~~~~~~~~~~~~ | |
237 | Date: Mon Apr 20 12:44:28 2015 | |
238 | Quorum provider: corosync_votequorum | |
239 | Nodes: 3 | |
240 | Node ID: 0x00000001 | |
241 | Ring ID: 1992 | |
242 | Quorate: Yes | |
243 | ||
244 | Votequorum information | |
245 | ~~~~~~~~~~~~~~~~~~~~~~ | |
246 | Expected votes: 3 | |
247 | Highest expected: 3 | |
248 | Total votes: 3 | |
249 | Quorum: 3 | |
250 | Flags: Quorate | |
251 | ||
252 | Membership information | |
253 | ~~~~~~~~~~~~~~~~~~~~~~ | |
254 | Nodeid Votes Name | |
255 | 0x00000001 1 192.168.15.90 (local) | |
256 | 0x00000002 1 192.168.15.91 | |
257 | 0x00000003 1 192.168.15.92 | |
258 | ---- | |
259 | ||
8a865621 DM |
260 | If, for whatever reason, you want that this server joins the same |
261 | cluster again, you have to | |
262 | ||
26ca7ff5 | 263 | * reinstall {pve} on it from scratch |
8a865621 DM |
264 | |
265 | * then join it, as explained in the previous section. | |
d8742b0c | 266 | |
38ae8db3 | 267 | [[pvecm_separate_node_without_reinstall]] |
555e966b TL |
268 | Separate A Node Without Reinstalling |
269 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
270 | ||
271 | CAUTION: This is *not* the recommended method, proceed with caution. Use the | |
272 | above mentioned method if you're unsure. | |
273 | ||
274 | You can also separate a node from a cluster without reinstalling it from | |
275 | scratch. But after removing the node from the cluster it will still have | |
276 | access to the shared storages! This must be resolved before you start removing | |
277 | the node from the cluster. A {pve} cluster cannot share the exact same | |
278 | storage with another cluster, as it leads to VMID conflicts. | |
279 | ||
3be22308 TL |
280 | Its suggested that you create a new storage where only the node which you want |
281 | to separate has access. This can be an new export on your NFS or a new Ceph | |
282 | pool, to name a few examples. Its just important that the exact same storage | |
283 | does not gets accessed by multiple clusters. After setting this storage up move | |
284 | all data from the node and its VMs to it. Then you are ready to separate the | |
285 | node from the cluster. | |
555e966b TL |
286 | |
287 | WARNING: Ensure all shared resources are cleanly separated! You will run into | |
288 | conflicts and problems else. | |
289 | ||
290 | First stop the corosync and the pve-cluster services on the node: | |
291 | [source,bash] | |
4d19cb00 | 292 | ---- |
555e966b TL |
293 | systemctl stop pve-cluster |
294 | systemctl stop corosync | |
4d19cb00 | 295 | ---- |
555e966b TL |
296 | |
297 | Start the cluster filesystem again in local mode: | |
298 | [source,bash] | |
4d19cb00 | 299 | ---- |
555e966b | 300 | pmxcfs -l |
4d19cb00 | 301 | ---- |
555e966b TL |
302 | |
303 | Delete the corosync configuration files: | |
304 | [source,bash] | |
4d19cb00 | 305 | ---- |
555e966b TL |
306 | rm /etc/pve/corosync.conf |
307 | rm /etc/corosync/* | |
4d19cb00 | 308 | ---- |
555e966b TL |
309 | |
310 | You can now start the filesystem again as normal service: | |
311 | [source,bash] | |
4d19cb00 | 312 | ---- |
555e966b TL |
313 | killall pmxcfs |
314 | systemctl start pve-cluster | |
4d19cb00 | 315 | ---- |
555e966b TL |
316 | |
317 | The node is now separated from the cluster. You can deleted it from a remaining | |
318 | node of the cluster with: | |
319 | [source,bash] | |
4d19cb00 | 320 | ---- |
555e966b | 321 | pvecm delnode oldnode |
4d19cb00 | 322 | ---- |
555e966b TL |
323 | |
324 | If the command failed, because the remaining node in the cluster lost quorum | |
325 | when the now separate node exited, you may set the expected votes to 1 as a workaround: | |
326 | [source,bash] | |
4d19cb00 | 327 | ---- |
555e966b | 328 | pvecm expected 1 |
4d19cb00 | 329 | ---- |
555e966b TL |
330 | |
331 | And the repeat the 'pvecm delnode' command. | |
332 | ||
333 | Now switch back to the separated node, here delete all remaining files left | |
334 | from the old cluster. This ensures that the node can be added to another | |
335 | cluster again without problems. | |
336 | ||
337 | [source,bash] | |
4d19cb00 | 338 | ---- |
555e966b | 339 | rm /var/lib/corosync/* |
4d19cb00 | 340 | ---- |
555e966b TL |
341 | |
342 | As the configuration files from the other nodes are still in the cluster | |
343 | filesystem you may want to clean those up too. Remove simply the whole | |
344 | directory recursive from '/etc/pve/nodes/NODENAME', but check three times that | |
345 | you used the correct one before deleting it. | |
346 | ||
347 | CAUTION: The nodes SSH keys are still in the 'authorized_key' file, this means | |
348 | the nodes can still connect to each other with public key authentication. This | |
349 | should be fixed by removing the respective keys from the | |
350 | '/etc/pve/priv/authorized_keys' file. | |
d8742b0c | 351 | |
806ef12d DM |
352 | Quorum |
353 | ------ | |
354 | ||
355 | {pve} use a quorum-based technique to provide a consistent state among | |
356 | all cluster nodes. | |
357 | ||
358 | [quote, from Wikipedia, Quorum (distributed computing)] | |
359 | ____ | |
360 | A quorum is the minimum number of votes that a distributed transaction | |
361 | has to obtain in order to be allowed to perform an operation in a | |
362 | distributed system. | |
363 | ____ | |
364 | ||
365 | In case of network partitioning, state changes requires that a | |
366 | majority of nodes are online. The cluster switches to read-only mode | |
5eba0743 | 367 | if it loses quorum. |
806ef12d DM |
368 | |
369 | NOTE: {pve} assigns a single vote to each node by default. | |
370 | ||
e4ec4154 TL |
371 | Cluster Network |
372 | --------------- | |
373 | ||
374 | The cluster network is the core of a cluster. All messages sent over it have to | |
375 | be delivered reliable to all nodes in their respective order. In {pve} this | |
376 | part is done by corosync, an implementation of a high performance low overhead | |
377 | high availability development toolkit. It serves our decentralized | |
378 | configuration file system (`pmxcfs`). | |
379 | ||
380 | [[cluster-network-requirements]] | |
381 | Network Requirements | |
382 | ~~~~~~~~~~~~~~~~~~~~ | |
383 | This needs a reliable network with latencies under 2 milliseconds (LAN | |
384 | performance) to work properly. While corosync can also use unicast for | |
385 | communication between nodes its **highly recommended** to have a multicast | |
386 | capable network. The network should not be used heavily by other members, | |
387 | ideally corosync runs on its own network. | |
388 | *never* share it with network where storage communicates too. | |
389 | ||
390 | Before setting up a cluster it is good practice to check if the network is fit | |
391 | for that purpose. | |
392 | ||
393 | * Ensure that all nodes are in the same subnet. This must only be true for the | |
394 | network interfaces used for cluster communication (corosync). | |
395 | ||
396 | * Ensure all nodes can reach each other over those interfaces, using `ping` is | |
397 | enough for a basic test. | |
398 | ||
399 | * Ensure that multicast works in general and a high package rates. This can be | |
400 | done with the `omping` tool. The final "%loss" number should be < 1%. | |
9e73d831 | 401 | + |
e4ec4154 TL |
402 | [source,bash] |
403 | ---- | |
404 | omping -c 10000 -i 0.001 -F -q NODE1-IP NODE2-IP ... | |
405 | ---- | |
406 | ||
407 | * Ensure that multicast communication works over an extended period of time. | |
408 | This covers up problems where IGMP snooping is activated on the network but | |
409 | no multicast querier is active. This test has a duration of around 10 | |
410 | minutes. | |
9e73d831 | 411 | + |
e4ec4154 | 412 | [source,bash] |
4d19cb00 | 413 | ---- |
e4ec4154 | 414 | omping -c 600 -i 1 -q NODE1-IP NODE2-IP ... |
4d19cb00 | 415 | ---- |
e4ec4154 TL |
416 | |
417 | Your network is not ready for clustering if any of these test fails. Recheck | |
418 | your network configuration. Especially switches are notorious for having | |
419 | multicast disabled by default or IGMP snooping enabled with no IGMP querier | |
420 | active. | |
421 | ||
422 | In smaller cluster its also an option to use unicast if you really cannot get | |
423 | multicast to work. | |
424 | ||
425 | Separate Cluster Network | |
426 | ~~~~~~~~~~~~~~~~~~~~~~~~ | |
427 | ||
428 | When creating a cluster without any parameters the cluster network is generally | |
429 | shared with the Web UI and the VMs and its traffic. Depending on your setup | |
430 | even storage traffic may get sent over the same network. Its recommended to | |
431 | change that, as corosync is a time critical real time application. | |
432 | ||
433 | Setting Up A New Network | |
434 | ^^^^^^^^^^^^^^^^^^^^^^^^ | |
435 | ||
436 | First you have to setup a new network interface. It should be on a physical | |
437 | separate network. Ensure that your network fulfills the | |
438 | <<cluster-network-requirements,cluster network requirements>>. | |
439 | ||
440 | Separate On Cluster Creation | |
441 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | |
442 | ||
443 | This is possible through the 'ring0_addr' and 'bindnet0_addr' parameter of | |
444 | the 'pvecm create' command used for creating a new cluster. | |
445 | ||
446 | If you have setup a additional NIC with a static address on 10.10.10.1/25 | |
447 | and want to send and receive all cluster communication over this interface | |
448 | you would execute: | |
449 | ||
450 | [source,bash] | |
4d19cb00 | 451 | ---- |
e4ec4154 | 452 | pvecm create test --ring0_addr 10.10.10.1 --bindnet0_addr 10.10.10.0 |
4d19cb00 | 453 | ---- |
e4ec4154 TL |
454 | |
455 | To check if everything is working properly execute: | |
456 | [source,bash] | |
4d19cb00 | 457 | ---- |
e4ec4154 | 458 | systemctl status corosync |
4d19cb00 | 459 | ---- |
e4ec4154 TL |
460 | |
461 | [[separate-cluster-net-after-creation]] | |
462 | Separate After Cluster Creation | |
463 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | |
464 | ||
465 | You can do this also if you have already created a cluster and want to switch | |
466 | its communication to another network, without rebuilding the whole cluster. | |
467 | This change may lead to short durations of quorum loss in the cluster, as nodes | |
468 | have to restart corosync and come up one after the other on the new network. | |
469 | ||
470 | Check how to <<edit-corosync-conf,edit the corosync.conf file>> first. | |
471 | The open it and you should see a file similar to: | |
472 | ||
473 | ---- | |
474 | logging { | |
475 | debug: off | |
476 | to_syslog: yes | |
477 | } | |
478 | ||
479 | nodelist { | |
480 | ||
481 | node { | |
482 | name: due | |
483 | nodeid: 2 | |
484 | quorum_votes: 1 | |
485 | ring0_addr: due | |
486 | } | |
487 | ||
488 | node { | |
489 | name: tre | |
490 | nodeid: 3 | |
491 | quorum_votes: 1 | |
492 | ring0_addr: tre | |
493 | } | |
494 | ||
495 | node { | |
496 | name: uno | |
497 | nodeid: 1 | |
498 | quorum_votes: 1 | |
499 | ring0_addr: uno | |
500 | } | |
501 | ||
502 | } | |
503 | ||
504 | quorum { | |
505 | provider: corosync_votequorum | |
506 | } | |
507 | ||
508 | totem { | |
509 | cluster_name: thomas-testcluster | |
510 | config_version: 3 | |
511 | ip_version: ipv4 | |
512 | secauth: on | |
513 | version: 2 | |
514 | interface { | |
515 | bindnetaddr: 192.168.30.50 | |
516 | ringnumber: 0 | |
517 | } | |
518 | ||
519 | } | |
520 | ---- | |
521 | ||
522 | The first you want to do is add the 'name' properties in the node entries if | |
523 | you do not see them already. Those *must* match the node name. | |
524 | ||
525 | Then replace the address from the 'ring0_addr' properties with the new | |
526 | addresses. You may use plain IP addresses or also hostnames here. If you use | |
527 | hostnames ensure that they are resolvable from all nodes. | |
528 | ||
529 | In my example I want to switch my cluster communication to the 10.10.10.1/25 | |
530 | network. So I replace all 'ring0_addr' respectively. I also set the bindetaddr | |
531 | in the totem section of the config to an address of the new network. It can be | |
532 | any address from the subnet configured on the new network interface. | |
533 | ||
534 | After you increased the 'config_version' property the new configuration file | |
535 | should look like: | |
536 | ||
537 | ---- | |
538 | ||
539 | logging { | |
540 | debug: off | |
541 | to_syslog: yes | |
542 | } | |
543 | ||
544 | nodelist { | |
545 | ||
546 | node { | |
547 | name: due | |
548 | nodeid: 2 | |
549 | quorum_votes: 1 | |
550 | ring0_addr: 10.10.10.2 | |
551 | } | |
552 | ||
553 | node { | |
554 | name: tre | |
555 | nodeid: 3 | |
556 | quorum_votes: 1 | |
557 | ring0_addr: 10.10.10.3 | |
558 | } | |
559 | ||
560 | node { | |
561 | name: uno | |
562 | nodeid: 1 | |
563 | quorum_votes: 1 | |
564 | ring0_addr: 10.10.10.1 | |
565 | } | |
566 | ||
567 | } | |
568 | ||
569 | quorum { | |
570 | provider: corosync_votequorum | |
571 | } | |
572 | ||
573 | totem { | |
574 | cluster_name: thomas-testcluster | |
575 | config_version: 4 | |
576 | ip_version: ipv4 | |
577 | secauth: on | |
578 | version: 2 | |
579 | interface { | |
580 | bindnetaddr: 10.10.10.1 | |
581 | ringnumber: 0 | |
582 | } | |
583 | ||
584 | } | |
585 | ---- | |
586 | ||
587 | Now after a final check whether all changed information is correct we save it | |
588 | and see again the <<edit-corosync-conf,edit corosync.conf file>> section to | |
589 | learn how to bring it in effect. | |
590 | ||
591 | As our change cannot be enforced live from corosync we have to do an restart. | |
592 | ||
593 | On a single node execute: | |
594 | [source,bash] | |
4d19cb00 | 595 | ---- |
e4ec4154 | 596 | systemctl restart corosync |
4d19cb00 | 597 | ---- |
e4ec4154 TL |
598 | |
599 | Now check if everything is fine: | |
600 | ||
601 | [source,bash] | |
4d19cb00 | 602 | ---- |
e4ec4154 | 603 | systemctl status corosync |
4d19cb00 | 604 | ---- |
e4ec4154 TL |
605 | |
606 | If corosync runs again correct restart corosync also on all other nodes. | |
607 | They will then join the cluster membership one by one on the new network. | |
608 | ||
609 | Redundant Ring Protocol | |
610 | ~~~~~~~~~~~~~~~~~~~~~~~ | |
611 | To avoid a single point of failure you should implement counter measurements. | |
612 | This can be on the hardware and operating system level through network bonding. | |
613 | ||
614 | Corosync itself offers also a possibility to add redundancy through the so | |
615 | called 'Redundant Ring Protocol'. This protocol allows running a second totem | |
616 | ring on another network, this network should be physically separated from the | |
617 | other rings network to actually increase availability. | |
618 | ||
619 | RRP On Cluster Creation | |
620 | ~~~~~~~~~~~~~~~~~~~~~~~ | |
621 | ||
622 | The 'pvecm create' command provides the additional parameters 'bindnetX_addr', | |
623 | 'ringX_addr' and 'rrp_mode', can be used for RRP configuration. | |
624 | ||
625 | NOTE: See the <<corosync-conf-glossary,glossary>> if you do not know what each parameter means. | |
626 | ||
627 | So if you have two networks, one on the 10.10.10.1/24 and the other on the | |
628 | 10.10.20.1/24 subnet you would execute: | |
629 | ||
630 | [source,bash] | |
4d19cb00 | 631 | ---- |
e4ec4154 TL |
632 | pvecm create CLUSTERNAME -bindnet0_addr 10.10.10.1 -ring0_addr 10.10.10.1 \ |
633 | -bindnet1_addr 10.10.20.1 -ring1_addr 10.10.20.1 | |
4d19cb00 | 634 | ---- |
e4ec4154 TL |
635 | |
636 | RRP On A Created Cluster | |
637 | ~~~~~~~~~~~~~~~~~~~~~~~~ | |
638 | ||
639 | When enabling an already running cluster to use RRP you will take similar steps | |
7d48940b DM |
640 | as describe in |
641 | <<separate-cluster-net-after-creation,separating the cluster network>>. You | |
642 | just do it on another ring. | |
e4ec4154 TL |
643 | |
644 | First add a new `interface` subsection in the `totem` section, set its | |
645 | `ringnumber` property to `1`. Set the interfaces `bindnetaddr` property to an | |
646 | address of the subnet you have configured for your new ring. | |
647 | Further set the `rrp_mode` to `passive`, this is the only stable mode. | |
648 | ||
649 | Then add to each node entry in the `nodelist` section its new `ring1_addr` | |
650 | property with the nodes additional ring address. | |
651 | ||
652 | So if you have two networks, one on the 10.10.10.1/24 and the other on the | |
653 | 10.10.20.1/24 subnet, the final configuration file should look like: | |
654 | ||
655 | ---- | |
656 | totem { | |
657 | cluster_name: tweak | |
658 | config_version: 9 | |
659 | ip_version: ipv4 | |
660 | rrp_mode: passive | |
661 | secauth: on | |
662 | version: 2 | |
663 | interface { | |
664 | bindnetaddr: 10.10.10.1 | |
665 | ringnumber: 0 | |
666 | } | |
667 | interface { | |
668 | bindnetaddr: 10.10.20.1 | |
669 | ringnumber: 1 | |
670 | } | |
671 | } | |
672 | ||
673 | nodelist { | |
674 | node { | |
675 | name: pvecm1 | |
676 | nodeid: 1 | |
677 | quorum_votes: 1 | |
678 | ring0_addr: 10.10.10.1 | |
679 | ring1_addr: 10.10.20.1 | |
680 | } | |
681 | ||
682 | node { | |
683 | name: pvecm2 | |
684 | nodeid: 2 | |
685 | quorum_votes: 1 | |
686 | ring0_addr: 10.10.10.2 | |
687 | ring1_addr: 10.10.20.2 | |
688 | } | |
689 | ||
690 | [...] # other cluster nodes here | |
691 | } | |
692 | ||
693 | [...] # other remaining config sections here | |
694 | ||
695 | ---- | |
696 | ||
7d48940b DM |
697 | Bring it in effect like described in the |
698 | <<edit-corosync-conf,edit the corosync.conf file>> section. | |
e4ec4154 TL |
699 | |
700 | This is a change which cannot take live in effect and needs at least a restart | |
701 | of corosync. Recommended is a restart of the whole cluster. | |
702 | ||
703 | If you cannot reboot the whole cluster ensure no High Availability services are | |
704 | configured and the stop the corosync service on all nodes. After corosync is | |
705 | stopped on all nodes start it one after the other again. | |
706 | ||
707 | Corosync Configuration | |
708 | ---------------------- | |
709 | ||
710 | The `/ect/pve/corosync.conf` file plays a central role in {pve} cluster. It | |
711 | controls the cluster member ship and its network. | |
712 | For reading more about it check the corosync.conf man page: | |
713 | [source,bash] | |
4d19cb00 | 714 | ---- |
e4ec4154 | 715 | man corosync.conf |
4d19cb00 | 716 | ---- |
e4ec4154 TL |
717 | |
718 | For node membership you should always use the `pvecm` tool provided by {pve}. | |
719 | You may have to edit the configuration file manually for other changes. | |
720 | Here are a few best practice tips for doing this. | |
721 | ||
722 | [[edit-corosync-conf]] | |
723 | Edit corosync.conf | |
724 | ~~~~~~~~~~~~~~~~~~ | |
725 | ||
726 | Editing the corosync.conf file can be not always straight forward. There are | |
727 | two on each cluster, one in `/etc/pve/corosync.conf` and the other in | |
728 | `/etc/corosync/corosync.conf`. Editing the one in our cluster file system will | |
729 | propagate the changes to the local one, but not vice versa. | |
730 | ||
731 | The configuration will get updated automatically as soon as the file changes. | |
732 | This means changes which can be integrated in a running corosync will take | |
733 | instantly effect. So you should always make a copy and edit that instead, to | |
734 | avoid triggering some unwanted changes by an in between safe. | |
735 | ||
736 | [source,bash] | |
4d19cb00 | 737 | ---- |
e4ec4154 | 738 | cp /etc/pve/corosync.conf /etc/pve/corosync.conf.new |
4d19cb00 | 739 | ---- |
e4ec4154 TL |
740 | |
741 | Then open the Config file with your favorite editor, `nano` and `vim.tiny` are | |
742 | preinstalled on {pve} for example. | |
743 | ||
744 | NOTE: Always increment the 'config_version' number on configuration changes, | |
745 | omitting this can lead to problems. | |
746 | ||
747 | After making the necessary changes create another copy of the current working | |
748 | configuration file. This serves as a backup if the new configuration fails to | |
749 | apply or makes problems in other ways. | |
750 | ||
751 | [source,bash] | |
4d19cb00 | 752 | ---- |
e4ec4154 | 753 | cp /etc/pve/corosync.conf /etc/pve/corosync.conf.bak |
4d19cb00 | 754 | ---- |
e4ec4154 TL |
755 | |
756 | Then move the new configuration file over the old one: | |
757 | [source,bash] | |
4d19cb00 | 758 | ---- |
e4ec4154 | 759 | mv /etc/pve/corosync.conf.new /etc/pve/corosync.conf |
4d19cb00 | 760 | ---- |
e4ec4154 TL |
761 | |
762 | You may check with the commands | |
763 | [source,bash] | |
4d19cb00 | 764 | ---- |
e4ec4154 TL |
765 | systemctl status corosync |
766 | journalctl -b -u corosync | |
4d19cb00 | 767 | ---- |
e4ec4154 TL |
768 | |
769 | If the change could applied automatically. If not you may have to restart the | |
770 | corosync service via: | |
771 | [source,bash] | |
4d19cb00 | 772 | ---- |
e4ec4154 | 773 | systemctl restart corosync |
4d19cb00 | 774 | ---- |
e4ec4154 TL |
775 | |
776 | On errors check the troubleshooting section below. | |
777 | ||
778 | Troubleshooting | |
779 | ~~~~~~~~~~~~~~~ | |
780 | ||
781 | Issue: 'quorum.expected_votes must be configured' | |
782 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | |
783 | ||
784 | When corosync starts to fail and you get the following message in the system log: | |
785 | ||
786 | ---- | |
787 | [...] | |
788 | corosync[1647]: [QUORUM] Quorum provider: corosync_votequorum failed to initialize. | |
789 | corosync[1647]: [SERV ] Service engine 'corosync_quorum' failed to load for reason | |
790 | 'configuration error: nodelist or quorum.expected_votes must be configured!' | |
791 | [...] | |
792 | ---- | |
793 | ||
794 | It means that the hostname you set for corosync 'ringX_addr' in the | |
795 | configuration could not be resolved. | |
796 | ||
797 | ||
798 | Write Configuration When Not Quorate | |
799 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | |
800 | ||
801 | If you need to change '/etc/pve/corosync.conf' on an node with no quorum, and you | |
802 | know what you do, use: | |
803 | [source,bash] | |
4d19cb00 | 804 | ---- |
e4ec4154 | 805 | pvecm expected 1 |
4d19cb00 | 806 | ---- |
e4ec4154 TL |
807 | |
808 | This sets the expected vote count to 1 and makes the cluster quorate. You can | |
809 | now fix your configuration, or revert it back to the last working backup. | |
810 | ||
811 | This is not enough if corosync cannot start anymore. Here its best to edit the | |
812 | local copy of the corosync configuration in '/etc/corosync/corosync.conf' so | |
813 | that corosync can start again. Ensure that on all nodes this configuration has | |
814 | the same content to avoid split brains. If you are not sure what went wrong | |
815 | it's best to ask the Proxmox Community to help you. | |
816 | ||
817 | ||
818 | [[corosync-conf-glossary]] | |
819 | Corosync Configuration Glossary | |
820 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
821 | ||
822 | ringX_addr:: | |
823 | This names the different ring addresses for the corosync totem rings used for | |
824 | the cluster communication. | |
825 | ||
826 | bindnetaddr:: | |
827 | Defines to which interface the ring should bind to. It may be any address of | |
828 | the subnet configured on the interface we want to use. In general its the | |
829 | recommended to just use an address a node uses on this interface. | |
830 | ||
831 | rrp_mode:: | |
832 | Specifies the mode of the redundant ring protocol and may be passive, active or | |
833 | none. Note that use of active is highly experimental and not official | |
834 | supported. Passive is the preferred mode, it may double the cluster | |
835 | communication throughput and increases availability. | |
836 | ||
806ef12d DM |
837 | |
838 | Cluster Cold Start | |
839 | ------------------ | |
840 | ||
841 | It is obvious that a cluster is not quorate when all nodes are | |
842 | offline. This is a common case after a power failure. | |
843 | ||
844 | NOTE: It is always a good idea to use an uninterruptible power supply | |
8c1189b6 | 845 | (``UPS'', also called ``battery backup'') to avoid this state, especially if |
806ef12d DM |
846 | you want HA. |
847 | ||
8c1189b6 FG |
848 | On node startup, service `pve-manager` is started and waits for |
849 | quorum. Once quorate, it starts all guests which have the `onboot` | |
612417fd DM |
850 | flag set. |
851 | ||
852 | When you turn on nodes, or when power comes back after power failure, | |
853 | it is likely that some nodes boots faster than others. Please keep in | |
854 | mind that guest startup is delayed until you reach quorum. | |
806ef12d | 855 | |
054a7e7d | 856 | |
082ea7d9 TL |
857 | Guest Migration |
858 | --------------- | |
859 | ||
054a7e7d DM |
860 | Migrating virtual guests to other nodes is a useful feature in a |
861 | cluster. There are settings to control the behavior of such | |
862 | migrations. This can be done via the configuration file | |
863 | `datacenter.cfg` or for a specific migration via API or command line | |
864 | parameters. | |
865 | ||
082ea7d9 TL |
866 | |
867 | Migration Type | |
868 | ~~~~~~~~~~~~~~ | |
869 | ||
870 | The migration type defines if the migration data should be sent over a | |
d63be10b | 871 | encrypted (`secure`) channel or an unencrypted (`insecure`) one. |
082ea7d9 | 872 | Setting the migration type to insecure means that the RAM content of a |
b1743473 DM |
873 | virtual guest gets also transfered unencrypted, which can lead to |
874 | information disclosure of critical data from inside the guest (for | |
875 | example passwords or encryption keys). | |
054a7e7d DM |
876 | |
877 | Therefore, we strongly recommend using the secure channel if you do | |
878 | not have full control over the network and can not guarantee that no | |
879 | one is eavesdropping to it. | |
082ea7d9 | 880 | |
054a7e7d DM |
881 | NOTE: Storage migration does not follow this setting. Currently, it |
882 | always sends the storage content over a secure channel. | |
883 | ||
884 | Encryption requires a lot of computing power, so this setting is often | |
885 | changed to "unsafe" to achieve better performance. The impact on | |
886 | modern systems is lower because they implement AES encryption in | |
b1743473 DM |
887 | hardware. The performance impact is particularly evident in fast |
888 | networks where you can transfer 10 Gbps or more. | |
082ea7d9 | 889 | |
082ea7d9 TL |
890 | |
891 | Migration Network | |
892 | ~~~~~~~~~~~~~~~~~ | |
893 | ||
a9baa444 TL |
894 | By default, {pve} uses the network in which cluster communication |
895 | takes place to send the migration traffic. This is not optimal because | |
896 | sensitive cluster traffic can be disrupted and this network may not | |
897 | have the best bandwidth available on the node. | |
898 | ||
899 | Setting the migration network parameter allows the use of a dedicated | |
900 | network for the entire migration traffic. In addition to the memory, | |
901 | this also affects the storage traffic for offline migrations. | |
902 | ||
903 | The migration network is set as a network in the CIDR notation. This | |
904 | has the advantage that you do not have to set individual IP addresses | |
905 | for each node. {pve} can determine the real address on the | |
906 | destination node from the network specified in the CIDR form. To | |
907 | enable this, the network must be specified so that each node has one, | |
908 | but only one IP in the respective network. | |
909 | ||
082ea7d9 TL |
910 | |
911 | Example | |
912 | ^^^^^^^ | |
913 | ||
a9baa444 TL |
914 | We assume that we have a three-node setup with three separate |
915 | networks. One for public communication with the Internet, one for | |
916 | cluster communication and a very fast one, which we want to use as a | |
917 | dedicated network for migration. | |
918 | ||
919 | A network configuration for such a setup might look as follows: | |
082ea7d9 TL |
920 | |
921 | ---- | |
922 | iface eth0 inet manual | |
923 | ||
924 | # public network | |
925 | auto vmbr0 | |
926 | iface vmbr0 inet static | |
927 | address 192.X.Y.57 | |
928 | netmask 255.255.250.0 | |
929 | gateway 192.X.Y.1 | |
930 | bridge_ports eth0 | |
931 | bridge_stp off | |
932 | bridge_fd 0 | |
933 | ||
934 | # cluster network | |
935 | auto eth1 | |
936 | iface eth1 inet static | |
937 | address 10.1.1.1 | |
938 | netmask 255.255.255.0 | |
939 | ||
940 | # fast network | |
941 | auto eth2 | |
942 | iface eth2 inet static | |
943 | address 10.1.2.1 | |
944 | netmask 255.255.255.0 | |
082ea7d9 TL |
945 | ---- |
946 | ||
a9baa444 TL |
947 | Here, we will use the network 10.1.2.0/24 as a migration network. For |
948 | a single migration, you can do this using the `migration_network` | |
949 | parameter of the command line tool: | |
950 | ||
082ea7d9 | 951 | ---- |
b1743473 | 952 | # qm migrate 106 tre --online --migration_network 10.1.2.0/24 |
082ea7d9 TL |
953 | ---- |
954 | ||
a9baa444 TL |
955 | To configure this as the default network for all migrations in the |
956 | cluster, set the `migration` property of the `/etc/pve/datacenter.cfg` | |
957 | file: | |
958 | ||
082ea7d9 | 959 | ---- |
a9baa444 | 960 | # use dedicated migration network |
b1743473 | 961 | migration: secure,network=10.1.2.0/24 |
082ea7d9 TL |
962 | ---- |
963 | ||
a9baa444 TL |
964 | NOTE: The migration type must always be set when the migration network |
965 | gets set in `/etc/pve/datacenter.cfg`. | |
966 | ||
806ef12d | 967 | |
d8742b0c DM |
968 | ifdef::manvolnum[] |
969 | include::pve-copyright.adoc[] | |
970 | endif::manvolnum[] |