]> git.proxmox.com Git - pve-docs.git/blame_incremental - pvecm.adoc
totp: fix copy/paste mistake
[pve-docs.git] / pvecm.adoc
... / ...
CommitLineData
1[[chapter_pvecm]]
2ifdef::manvolnum[]
3pvecm(1)
4========
5:pve-toplevel:
6
7NAME
8----
9
10pvecm - Proxmox VE Cluster Manager
11
12SYNOPSIS
13--------
14
15include::pvecm.1-synopsis.adoc[]
16
17DESCRIPTION
18-----------
19endif::manvolnum[]
20
21ifndef::manvolnum[]
22Cluster Manager
23===============
24:pve-toplevel:
25endif::manvolnum[]
26
27The {pve} cluster manager `pvecm` is a tool to create a group of
28physical servers. Such a group is called a *cluster*. We use the
29http://www.corosync.org[Corosync Cluster Engine] for reliable group
30communication. There's no explicit limit for the number of nodes in a cluster.
31In practice, the actual possible node count may be limited by the host and
32network performance. Currently (2021), there are reports of clusters (using
33high-end enterprise hardware) with over 50 nodes in production.
34
35`pvecm` can be used to create a new cluster, join nodes to a cluster,
36leave the cluster, get status information, and do various other cluster-related
37tasks. The **P**rox**m**o**x** **C**luster **F**ile **S**ystem (``pmxcfs'')
38is used to transparently distribute the cluster configuration to all cluster
39nodes.
40
41Grouping nodes into a cluster has the following advantages:
42
43* Centralized, web-based management
44
45* Multi-master clusters: each node can do all management tasks
46
47* Use of `pmxcfs`, a database-driven file system, for storing configuration
48 files, replicated in real-time on all nodes using `corosync`
49
50* Easy migration of virtual machines and containers between physical
51 hosts
52
53* Fast deployment
54
55* Cluster-wide services like firewall and HA
56
57
58Requirements
59------------
60
61* All nodes must be able to connect to each other via UDP ports 5404 and 5405
62 for corosync to work.
63
64* Date and time must be synchronized.
65
66* An SSH tunnel on TCP port 22 between nodes is required.
67
68* If you are interested in High Availability, you need to have at
69 least three nodes for reliable quorum. All nodes should have the
70 same version.
71
72* We recommend a dedicated NIC for the cluster traffic, especially if
73 you use shared storage.
74
75* The root password of a cluster node is required for adding nodes.
76
77* Online migration of virtual machines is only supported when nodes have CPUs
78 from the same vendor. It might work otherwise, but this is never guaranteed.
79
80NOTE: It is not possible to mix {pve} 3.x and earlier with {pve} 4.X cluster
81nodes.
82
83NOTE: While it's possible to mix {pve} 4.4 and {pve} 5.0 nodes, doing so is
84not supported as a production configuration and should only be done temporarily,
85during an upgrade of the whole cluster from one major version to another.
86
87NOTE: Running a cluster of {pve} 6.x with earlier versions is not possible. The
88cluster protocol (corosync) between {pve} 6.x and earlier versions changed
89fundamentally. The corosync 3 packages for {pve} 5.4 are only intended for the
90upgrade procedure to {pve} 6.0.
91
92
93Preparing Nodes
94---------------
95
96First, install {pve} on all nodes. Make sure that each node is
97installed with the final hostname and IP configuration. Changing the
98hostname and IP is not possible after cluster creation.
99
100While it's common to reference all node names and their IPs in `/etc/hosts` (or
101make their names resolvable through other means), this is not necessary for a
102cluster to work. It may be useful however, as you can then connect from one node
103to another via SSH, using the easier to remember node name (see also
104xref:pvecm_corosync_addresses[Link Address Types]). Note that we always
105recommend referencing nodes by their IP addresses in the cluster configuration.
106
107
108[[pvecm_create_cluster]]
109Create a Cluster
110----------------
111
112You can either create a cluster on the console (login via `ssh`), or through
113the API using the {pve} web interface (__Datacenter -> Cluster__).
114
115NOTE: Use a unique name for your cluster. This name cannot be changed later.
116The cluster name follows the same rules as node names.
117
118[[pvecm_cluster_create_via_gui]]
119Create via Web GUI
120~~~~~~~~~~~~~~~~~~
121
122[thumbnail="screenshot/gui-cluster-create.png"]
123
124Under __Datacenter -> Cluster__, click on *Create Cluster*. Enter the cluster
125name and select a network connection from the drop-down list to serve as the
126main cluster network (Link 0). It defaults to the IP resolved via the node's
127hostname.
128
129As of {pve} 6.2, up to 8 fallback links can be added to a cluster. To add a
130redundant link, click the 'Add' button and select a link number and IP address
131from the respective fields. Prior to {pve} 6.2, to add a second link as
132fallback, you can select the 'Advanced' checkbox and choose an additional
133network interface (Link 1, see also xref:pvecm_redundancy[Corosync Redundancy]).
134
135NOTE: Ensure that the network selected for cluster communication is not used for
136any high traffic purposes, like network storage or live-migration.
137While the cluster network itself produces small amounts of data, it is very
138sensitive to latency. Check out full
139xref:pvecm_cluster_network_requirements[cluster network requirements].
140
141[[pvecm_cluster_create_via_cli]]
142Create via the Command Line
143~~~~~~~~~~~~~~~~~~~~~~~~~~~
144
145Login via `ssh` to the first {pve} node and run the following command:
146
147----
148 hp1# pvecm create CLUSTERNAME
149----
150
151To check the state of the new cluster use:
152
153----
154 hp1# pvecm status
155----
156
157Multiple Clusters in the Same Network
158~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
159
160It is possible to create multiple clusters in the same physical or logical
161network. In this case, each cluster must have a unique name to avoid possible
162clashes in the cluster communication stack. Furthermore, this helps avoid human
163confusion by making clusters clearly distinguishable.
164
165While the bandwidth requirement of a corosync cluster is relatively low, the
166latency of packages and the package per second (PPS) rate is the limiting
167factor. Different clusters in the same network can compete with each other for
168these resources, so it may still make sense to use separate physical network
169infrastructure for bigger clusters.
170
171[[pvecm_join_node_to_cluster]]
172Adding Nodes to the Cluster
173---------------------------
174
175CAUTION: A node that is about to be added to the cluster cannot hold any guests.
176All existing configuration in `/etc/pve` is overwritten when joining a cluster,
177since guest IDs could otherwise conflict. As a workaround, you can create a
178backup of the guest (`vzdump`) and restore it under a different ID, after the
179node has been added to the cluster.
180
181Join Node to Cluster via GUI
182~~~~~~~~~~~~~~~~~~~~~~~~~~~~
183
184[thumbnail="screenshot/gui-cluster-join-information.png"]
185
186Log in to the web interface on an existing cluster node. Under __Datacenter ->
187Cluster__, click the *Join Information* button at the top. Then, click on the
188button *Copy Information*. Alternatively, copy the string from the 'Information'
189field manually.
190
191[thumbnail="screenshot/gui-cluster-join.png"]
192
193Next, log in to the web interface on the node you want to add.
194Under __Datacenter -> Cluster__, click on *Join Cluster*. Fill in the
195'Information' field with the 'Join Information' text you copied earlier.
196Most settings required for joining the cluster will be filled out
197automatically. For security reasons, the cluster password has to be entered
198manually.
199
200NOTE: To enter all required data manually, you can disable the 'Assisted Join'
201checkbox.
202
203After clicking the *Join* button, the cluster join process will start
204immediately. After the node has joined the cluster, its current node certificate
205will be replaced by one signed from the cluster certificate authority (CA).
206This means that the current session will stop working after a few seconds. You
207then might need to force-reload the web interface and log in again with the
208cluster credentials.
209
210Now your node should be visible under __Datacenter -> Cluster__.
211
212Join Node to Cluster via Command Line
213~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
214
215Log in to the node you want to join into an existing cluster via `ssh`.
216
217----
218 # pvecm add IP-ADDRESS-CLUSTER
219----
220
221For `IP-ADDRESS-CLUSTER`, use the IP or hostname of an existing cluster node.
222An IP address is recommended (see xref:pvecm_corosync_addresses[Link Address Types]).
223
224
225To check the state of the cluster use:
226
227----
228 # pvecm status
229----
230
231.Cluster status after adding 4 nodes
232----
233 # pvecm status
234Cluster information
235~~~~~~~~~~~~~~~~~~~
236Name: prod-central
237Config Version: 3
238Transport: knet
239Secure auth: on
240
241Quorum information
242~~~~~~~~~~~~~~~~~~
243Date: Tue Sep 14 11:06:47 2021
244Quorum provider: corosync_votequorum
245Nodes: 4
246Node ID: 0x00000001
247Ring ID: 1.1a8
248Quorate: Yes
249
250Votequorum information
251~~~~~~~~~~~~~~~~~~~~~~
252Expected votes: 4
253Highest expected: 4
254Total votes: 4
255Quorum: 3
256Flags: Quorate
257
258Membership information
259~~~~~~~~~~~~~~~~~~~~~~
260 Nodeid Votes Name
2610x00000001 1 192.168.15.91
2620x00000002 1 192.168.15.92 (local)
2630x00000003 1 192.168.15.93
2640x00000004 1 192.168.15.94
265----
266
267If you only want a list of all nodes, use:
268
269----
270 # pvecm nodes
271----
272
273.List nodes in a cluster
274----
275 # pvecm nodes
276
277Membership information
278~~~~~~~~~~~~~~~~~~~~~~
279 Nodeid Votes Name
280 1 1 hp1
281 2 1 hp2 (local)
282 3 1 hp3
283 4 1 hp4
284----
285
286[[pvecm_adding_nodes_with_separated_cluster_network]]
287Adding Nodes with Separated Cluster Network
288~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
289
290When adding a node to a cluster with a separated cluster network, you need to
291use the 'link0' parameter to set the nodes address on that network:
292
293[source,bash]
294----
295pvecm add IP-ADDRESS-CLUSTER -link0 LOCAL-IP-ADDRESS-LINK0
296----
297
298If you want to use the built-in xref:pvecm_redundancy[redundancy] of the
299Kronosnet transport layer, also use the 'link1' parameter.
300
301Using the GUI, you can select the correct interface from the corresponding
302'Link X' fields in the *Cluster Join* dialog.
303
304Remove a Cluster Node
305---------------------
306
307CAUTION: Read the procedure carefully before proceeding, as it may
308not be what you want or need.
309
310Move all virtual machines from the node. Ensure that you have made copies of any
311local data or backups that you want to keep. In addition, make sure to remove
312any scheduled replication jobs to the node to be removed.
313
314CAUTION: Failure to remove replication jobs to a node before removing said node
315will result in the replication job becoming irremovable. Especially note that
316replication automatically switches direction if a replicated VM is migrated, so
317by migrating a replicated VM from a node to be deleted, replication jobs will be
318set up to that node automatically.
319
320In the following example, we will remove the node hp4 from the cluster.
321
322Log in to a *different* cluster node (not hp4), and issue a `pvecm nodes`
323command to identify the node ID to remove:
324
325----
326 hp1# pvecm nodes
327
328Membership information
329~~~~~~~~~~~~~~~~~~~~~~
330 Nodeid Votes Name
331 1 1 hp1 (local)
332 2 1 hp2
333 3 1 hp3
334 4 1 hp4
335----
336
337
338At this point, you must power off hp4 and ensure that it will not power on
339again (in the network) with its current configuration.
340
341IMPORTANT: As mentioned above, it is critical to power off the node
342*before* removal, and make sure that it will *not* power on again
343(in the existing cluster network) with its current configuration.
344If you power on the node as it is, the cluster could end up broken,
345and it could be difficult to restore it to a functioning state.
346
347After powering off the node hp4, we can safely remove it from the cluster.
348
349----
350 hp1# pvecm delnode hp4
351 Killing node 4
352----
353
354NOTE: At this point, it is possible that you will receive an error message
355stating `Could not kill node (error = CS_ERR_NOT_EXIST)`. This does not
356signify an actual failure in the deletion of the node, but rather a failure in
357corosync trying to kill an offline node. Thus, it can be safely ignored.
358
359Use `pvecm nodes` or `pvecm status` to check the node list again. It should
360look something like:
361
362----
363hp1# pvecm status
364
365...
366
367Votequorum information
368~~~~~~~~~~~~~~~~~~~~~~
369Expected votes: 3
370Highest expected: 3
371Total votes: 3
372Quorum: 2
373Flags: Quorate
374
375Membership information
376~~~~~~~~~~~~~~~~~~~~~~
377 Nodeid Votes Name
3780x00000001 1 192.168.15.90 (local)
3790x00000002 1 192.168.15.91
3800x00000003 1 192.168.15.92
381----
382
383If, for whatever reason, you want this server to join the same cluster again,
384you have to:
385
386* do a fresh install of {pve} on it,
387
388* then join it, as explained in the previous section.
389
390NOTE: After removal of the node, its SSH fingerprint will still reside in the
391'known_hosts' of the other nodes. If you receive an SSH error after rejoining
392a node with the same IP or hostname, run `pvecm updatecerts` once on the
393re-added node to update its fingerprint cluster wide.
394
395[[pvecm_separate_node_without_reinstall]]
396Separate a Node Without Reinstalling
397~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
398
399CAUTION: This is *not* the recommended method, proceed with caution. Use the
400previous method if you're unsure.
401
402You can also separate a node from a cluster without reinstalling it from
403scratch. But after removing the node from the cluster, it will still have
404access to any shared storage. This must be resolved before you start removing
405the node from the cluster. A {pve} cluster cannot share the exact same
406storage with another cluster, as storage locking doesn't work over the cluster
407boundary. Furthermore, it may also lead to VMID conflicts.
408
409It's suggested that you create a new storage, where only the node which you want
410to separate has access. This can be a new export on your NFS or a new Ceph
411pool, to name a few examples. It's just important that the exact same storage
412does not get accessed by multiple clusters. After setting up this storage, move
413all data and VMs from the node to it. Then you are ready to separate the
414node from the cluster.
415
416WARNING: Ensure that all shared resources are cleanly separated! Otherwise you
417will run into conflicts and problems.
418
419First, stop the corosync and pve-cluster services on the node:
420[source,bash]
421----
422systemctl stop pve-cluster
423systemctl stop corosync
424----
425
426Start the cluster file system again in local mode:
427[source,bash]
428----
429pmxcfs -l
430----
431
432Delete the corosync configuration files:
433[source,bash]
434----
435rm /etc/pve/corosync.conf
436rm -r /etc/corosync/*
437----
438
439You can now start the file system again as a normal service:
440[source,bash]
441----
442killall pmxcfs
443systemctl start pve-cluster
444----
445
446The node is now separated from the cluster. You can deleted it from any
447remaining node of the cluster with:
448[source,bash]
449----
450pvecm delnode oldnode
451----
452
453If the command fails due to a loss of quorum in the remaining node, you can set
454the expected votes to 1 as a workaround:
455[source,bash]
456----
457pvecm expected 1
458----
459
460And then repeat the 'pvecm delnode' command.
461
462Now switch back to the separated node and delete all the remaining cluster
463files on it. This ensures that the node can be added to another cluster again
464without problems.
465
466[source,bash]
467----
468rm /var/lib/corosync/*
469----
470
471As the configuration files from the other nodes are still in the cluster
472file system, you may want to clean those up too. After making absolutely sure
473that you have the correct node name, you can simply remove the entire
474directory recursively from '/etc/pve/nodes/NODENAME'.
475
476CAUTION: The node's SSH keys will remain in the 'authorized_key' file. This
477means that the nodes can still connect to each other with public key
478authentication. You should fix this by removing the respective keys from the
479'/etc/pve/priv/authorized_keys' file.
480
481
482Quorum
483------
484
485{pve} use a quorum-based technique to provide a consistent state among
486all cluster nodes.
487
488[quote, from Wikipedia, Quorum (distributed computing)]
489____
490A quorum is the minimum number of votes that a distributed transaction
491has to obtain in order to be allowed to perform an operation in a
492distributed system.
493____
494
495In case of network partitioning, state changes requires that a
496majority of nodes are online. The cluster switches to read-only mode
497if it loses quorum.
498
499NOTE: {pve} assigns a single vote to each node by default.
500
501
502Cluster Network
503---------------
504
505The cluster network is the core of a cluster. All messages sent over it have to
506be delivered reliably to all nodes in their respective order. In {pve} this
507part is done by corosync, an implementation of a high performance, low overhead,
508high availability development toolkit. It serves our decentralized configuration
509file system (`pmxcfs`).
510
511[[pvecm_cluster_network_requirements]]
512Network Requirements
513~~~~~~~~~~~~~~~~~~~~
514
515The {pve} cluster stack requires a reliable network with latencies under 5
516milliseconds (LAN performance) between all nodes to operate stably. While on
517setups with a small node count a network with higher latencies _may_ work, this
518is not guaranteed and gets rather unlikely with more than three nodes and
519latencies above around 10 ms.
520
521The network should not be used heavily by other members, as while corosync does
522not uses much bandwidth it is sensitive to latency jitters; ideally corosync
523runs on its own physically separated network. Especially do not use a shared
524network for corosync and storage (except as a potential low-priority fallback
525in a xref:pvecm_redundancy[redundant] configuration).
526
527Before setting up a cluster, it is good practice to check if the network is fit
528for that purpose. To ensure that the nodes can connect to each other on the
529cluster network, you can test the connectivity between them with the `ping`
530tool.
531
532If the {pve} firewall is enabled, ACCEPT rules for corosync will automatically
533be generated - no manual action is required.
534
535NOTE: Corosync used Multicast before version 3.0 (introduced in {pve} 6.0).
536Modern versions rely on https://kronosnet.org/[Kronosnet] for cluster
537communication, which, for now, only supports regular UDP unicast.
538
539CAUTION: You can still enable Multicast or legacy unicast by setting your
540transport to `udp` or `udpu` in your xref:pvecm_edit_corosync_conf[corosync.conf],
541but keep in mind that this will disable all cryptography and redundancy support.
542This is therefore not recommended.
543
544Separate Cluster Network
545~~~~~~~~~~~~~~~~~~~~~~~~
546
547When creating a cluster without any parameters, the corosync cluster network is
548generally shared with the web interface and the VMs' network. Depending on
549your setup, even storage traffic may get sent over the same network. It's
550recommended to change that, as corosync is a time-critical, real-time
551application.
552
553Setting Up a New Network
554^^^^^^^^^^^^^^^^^^^^^^^^
555
556First, you have to set up a new network interface. It should be on a physically
557separate network. Ensure that your network fulfills the
558xref:pvecm_cluster_network_requirements[cluster network requirements].
559
560Separate On Cluster Creation
561^^^^^^^^^^^^^^^^^^^^^^^^^^^^
562
563This is possible via the 'linkX' parameters of the 'pvecm create'
564command, used for creating a new cluster.
565
566If you have set up an additional NIC with a static address on 10.10.10.1/25,
567and want to send and receive all cluster communication over this interface,
568you would execute:
569
570[source,bash]
571----
572pvecm create test --link0 10.10.10.1
573----
574
575To check if everything is working properly, execute:
576[source,bash]
577----
578systemctl status corosync
579----
580
581Afterwards, proceed as described above to
582xref:pvecm_adding_nodes_with_separated_cluster_network[add nodes with a separated cluster network].
583
584[[pvecm_separate_cluster_net_after_creation]]
585Separate After Cluster Creation
586^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
587
588You can do this if you have already created a cluster and want to switch
589its communication to another network, without rebuilding the whole cluster.
590This change may lead to short periods of quorum loss in the cluster, as nodes
591have to restart corosync and come up one after the other on the new network.
592
593Check how to xref:pvecm_edit_corosync_conf[edit the corosync.conf file] first.
594Then, open it and you should see a file similar to:
595
596----
597logging {
598 debug: off
599 to_syslog: yes
600}
601
602nodelist {
603
604 node {
605 name: due
606 nodeid: 2
607 quorum_votes: 1
608 ring0_addr: due
609 }
610
611 node {
612 name: tre
613 nodeid: 3
614 quorum_votes: 1
615 ring0_addr: tre
616 }
617
618 node {
619 name: uno
620 nodeid: 1
621 quorum_votes: 1
622 ring0_addr: uno
623 }
624
625}
626
627quorum {
628 provider: corosync_votequorum
629}
630
631totem {
632 cluster_name: testcluster
633 config_version: 3
634 ip_version: ipv4-6
635 secauth: on
636 version: 2
637 interface {
638 linknumber: 0
639 }
640
641}
642----
643
644NOTE: `ringX_addr` actually specifies a corosync *link address*. The name "ring"
645is a remnant of older corosync versions that is kept for backwards
646compatibility.
647
648The first thing you want to do is add the 'name' properties in the node entries,
649if you do not see them already. Those *must* match the node name.
650
651Then replace all addresses from the 'ring0_addr' properties of all nodes with
652the new addresses. You may use plain IP addresses or hostnames here. If you use
653hostnames, ensure that they are resolvable from all nodes (see also
654xref:pvecm_corosync_addresses[Link Address Types]).
655
656In this example, we want to switch cluster communication to the
65710.10.10.1/25 network, so we change the 'ring0_addr' of each node respectively.
658
659NOTE: The exact same procedure can be used to change other 'ringX_addr' values
660as well. However, we recommend only changing one link address at a time, so
661that it's easier to recover if something goes wrong.
662
663After we increase the 'config_version' property, the new configuration file
664should look like:
665
666----
667logging {
668 debug: off
669 to_syslog: yes
670}
671
672nodelist {
673
674 node {
675 name: due
676 nodeid: 2
677 quorum_votes: 1
678 ring0_addr: 10.10.10.2
679 }
680
681 node {
682 name: tre
683 nodeid: 3
684 quorum_votes: 1
685 ring0_addr: 10.10.10.3
686 }
687
688 node {
689 name: uno
690 nodeid: 1
691 quorum_votes: 1
692 ring0_addr: 10.10.10.1
693 }
694
695}
696
697quorum {
698 provider: corosync_votequorum
699}
700
701totem {
702 cluster_name: testcluster
703 config_version: 4
704 ip_version: ipv4-6
705 secauth: on
706 version: 2
707 interface {
708 linknumber: 0
709 }
710
711}
712----
713
714Then, after a final check to see that all changed information is correct, we
715save it and once again follow the
716xref:pvecm_edit_corosync_conf[edit corosync.conf file] section to bring it into
717effect.
718
719The changes will be applied live, so restarting corosync is not strictly
720necessary. If you changed other settings as well, or notice corosync
721complaining, you can optionally trigger a restart.
722
723On a single node execute:
724
725[source,bash]
726----
727systemctl restart corosync
728----
729
730Now check if everything is okay:
731
732[source,bash]
733----
734systemctl status corosync
735----
736
737If corosync begins to work again, restart it on all other nodes too.
738They will then join the cluster membership one by one on the new network.
739
740[[pvecm_corosync_addresses]]
741Corosync Addresses
742~~~~~~~~~~~~~~~~~~
743
744A corosync link address (for backwards compatibility denoted by 'ringX_addr' in
745`corosync.conf`) can be specified in two ways:
746
747* **IPv4/v6 addresses** can be used directly. They are recommended, since they
748are static and usually not changed carelessly.
749
750* **Hostnames** will be resolved using `getaddrinfo`, which means that by
751default, IPv6 addresses will be used first, if available (see also
752`man gai.conf`). Keep this in mind, especially when upgrading an existing
753cluster to IPv6.
754
755CAUTION: Hostnames should be used with care, since the addresses they
756resolve to can be changed without touching corosync or the node it runs on -
757which may lead to a situation where an address is changed without thinking
758about implications for corosync.
759
760A separate, static hostname specifically for corosync is recommended, if
761hostnames are preferred. Also, make sure that every node in the cluster can
762resolve all hostnames correctly.
763
764Since {pve} 5.1, while supported, hostnames will be resolved at the time of
765entry. Only the resolved IP is saved to the configuration.
766
767Nodes that joined the cluster on earlier versions likely still use their
768unresolved hostname in `corosync.conf`. It might be a good idea to replace
769them with IPs or a separate hostname, as mentioned above.
770
771
772[[pvecm_redundancy]]
773Corosync Redundancy
774-------------------
775
776Corosync supports redundant networking via its integrated Kronosnet layer by
777default (it is not supported on the legacy udp/udpu transports). It can be
778enabled by specifying more than one link address, either via the '--linkX'
779parameters of `pvecm`, in the GUI as **Link 1** (while creating a cluster or
780adding a new node) or by specifying more than one 'ringX_addr' in
781`corosync.conf`.
782
783NOTE: To provide useful failover, every link should be on its own
784physical network connection.
785
786Links are used according to a priority setting. You can configure this priority
787by setting 'knet_link_priority' in the corresponding interface section in
788`corosync.conf`, or, preferably, using the 'priority' parameter when creating
789your cluster with `pvecm`:
790
791----
792 # pvecm create CLUSTERNAME --link0 10.10.10.1,priority=15 --link1 10.20.20.1,priority=20
793----
794
795This would cause 'link1' to be used first, since it has the higher priority.
796
797If no priorities are configured manually (or two links have the same priority),
798links will be used in order of their number, with the lower number having higher
799priority.
800
801Even if all links are working, only the one with the highest priority will see
802corosync traffic. Link priorities cannot be mixed, meaning that links with
803different priorities will not be able to communicate with each other.
804
805Since lower priority links will not see traffic unless all higher priorities
806have failed, it becomes a useful strategy to specify networks used for
807other tasks (VMs, storage, etc.) as low-priority links. If worst comes to
808worst, a higher latency or more congested connection might be better than no
809connection at all.
810
811Adding Redundant Links To An Existing Cluster
812~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
813
814To add a new link to a running configuration, first check how to
815xref:pvecm_edit_corosync_conf[edit the corosync.conf file].
816
817Then, add a new 'ringX_addr' to every node in the `nodelist` section. Make
818sure that your 'X' is the same for every node you add it to, and that it is
819unique for each node.
820
821Lastly, add a new 'interface', as shown below, to your `totem`
822section, replacing 'X' with the link number chosen above.
823
824Assuming you added a link with number 1, the new configuration file could look
825like this:
826
827----
828logging {
829 debug: off
830 to_syslog: yes
831}
832
833nodelist {
834
835 node {
836 name: due
837 nodeid: 2
838 quorum_votes: 1
839 ring0_addr: 10.10.10.2
840 ring1_addr: 10.20.20.2
841 }
842
843 node {
844 name: tre
845 nodeid: 3
846 quorum_votes: 1
847 ring0_addr: 10.10.10.3
848 ring1_addr: 10.20.20.3
849 }
850
851 node {
852 name: uno
853 nodeid: 1
854 quorum_votes: 1
855 ring0_addr: 10.10.10.1
856 ring1_addr: 10.20.20.1
857 }
858
859}
860
861quorum {
862 provider: corosync_votequorum
863}
864
865totem {
866 cluster_name: testcluster
867 config_version: 4
868 ip_version: ipv4-6
869 secauth: on
870 version: 2
871 interface {
872 linknumber: 0
873 }
874 interface {
875 linknumber: 1
876 }
877}
878----
879
880The new link will be enabled as soon as you follow the last steps to
881xref:pvecm_edit_corosync_conf[edit the corosync.conf file]. A restart should not
882be necessary. You can check that corosync loaded the new link using:
883
884----
885journalctl -b -u corosync
886----
887
888It might be a good idea to test the new link by temporarily disconnecting the
889old link on one node and making sure that its status remains online while
890disconnected:
891
892----
893pvecm status
894----
895
896If you see a healthy cluster state, it means that your new link is being used.
897
898
899Role of SSH in {pve} Clusters
900-----------------------------
901
902{pve} utilizes SSH tunnels for various features.
903
904* Proxying console/shell sessions (node and guests)
905+
906When using the shell for node B while being connected to node A, connects to a
907terminal proxy on node A, which is in turn connected to the login shell on node
908B via a non-interactive SSH tunnel.
909
910* VM and CT memory and local-storage migration in 'secure' mode.
911+
912During the migration, one or more SSH tunnel(s) are established between the
913source and target nodes, in order to exchange migration information and
914transfer memory and disk contents.
915
916* Storage replication
917
918.Pitfalls due to automatic execution of `.bashrc` and siblings
919[IMPORTANT]
920====
921In case you have a custom `.bashrc`, or similar files that get executed on
922login by the configured shell, `ssh` will automatically run it once the session
923is established successfully. This can cause some unexpected behavior, as those
924commands may be executed with root permissions on any of the operations
925described above. This can cause possible problematic side-effects!
926
927In order to avoid such complications, it's recommended to add a check in
928`/root/.bashrc` to make sure the session is interactive, and only then run
929`.bashrc` commands.
930
931You can add this snippet at the beginning of your `.bashrc` file:
932
933----
934# Early exit if not running interactively to avoid side-effects!
935case $- in
936 *i*) ;;
937 *) return;;
938esac
939----
940====
941
942
943Corosync External Vote Support
944------------------------------
945
946This section describes a way to deploy an external voter in a {pve} cluster.
947When configured, the cluster can sustain more node failures without
948violating safety properties of the cluster communication.
949
950For this to work, there are two services involved:
951
952* A QDevice daemon which runs on each {pve} node
953
954* An external vote daemon which runs on an independent server
955
956As a result, you can achieve higher availability, even in smaller setups (for
957example 2+1 nodes).
958
959QDevice Technical Overview
960~~~~~~~~~~~~~~~~~~~~~~~~~~
961
962The Corosync Quorum Device (QDevice) is a daemon which runs on each cluster
963node. It provides a configured number of votes to the cluster's quorum
964subsystem, based on an externally running third-party arbitrator's decision.
965Its primary use is to allow a cluster to sustain more node failures than
966standard quorum rules allow. This can be done safely as the external device
967can see all nodes and thus choose only one set of nodes to give its vote.
968This will only be done if said set of nodes can have quorum (again) after
969receiving the third-party vote.
970
971Currently, only 'QDevice Net' is supported as a third-party arbitrator. This is
972a daemon which provides a vote to a cluster partition, if it can reach the
973partition members over the network. It will only give votes to one partition
974of a cluster at any time.
975It's designed to support multiple clusters and is almost configuration and
976state free. New clusters are handled dynamically and no configuration file
977is needed on the host running a QDevice.
978
979The only requirements for the external host are that it needs network access to
980the cluster and to have a corosync-qnetd package available. We provide a package
981for Debian based hosts, and other Linux distributions should also have a package
982available through their respective package manager.
983
984NOTE: Unlike corosync itself, a QDevice connects to the cluster over TCP/IP.
985The daemon can also run outside the LAN of the cluster and isn't limited to the
986low latencies requirements of corosync.
987
988Supported Setups
989~~~~~~~~~~~~~~~~
990
991We support QDevices for clusters with an even number of nodes and recommend
992it for 2 node clusters, if they should provide higher availability.
993For clusters with an odd node count, we currently discourage the use of
994QDevices. The reason for this is the difference in the votes which the QDevice
995provides for each cluster type. Even numbered clusters get a single additional
996vote, which only increases availability, because if the QDevice
997itself fails, you are in the same position as with no QDevice at all.
998
999On the other hand, with an odd numbered cluster size, the QDevice provides
1000'(N-1)' votes -- where 'N' corresponds to the cluster node count. This
1001alternative behavior makes sense; if it had only one additional vote, the
1002cluster could get into a split-brain situation. This algorithm allows for all
1003nodes but one (and naturally the QDevice itself) to fail. However, there are two
1004drawbacks to this:
1005
1006* If the QNet daemon itself fails, no other node may fail or the cluster
1007 immediately loses quorum. For example, in a cluster with 15 nodes, 7
1008 could fail before the cluster becomes inquorate. But, if a QDevice is
1009 configured here and it itself fails, **no single node** of the 15 may fail.
1010 The QDevice acts almost as a single point of failure in this case.
1011
1012* The fact that all but one node plus QDevice may fail sounds promising at
1013 first, but this may result in a mass recovery of HA services, which could
1014 overload the single remaining node. Furthermore, a Ceph server will stop
1015 providing services if only '((N-1)/2)' nodes or less remain online.
1016
1017If you understand the drawbacks and implications, you can decide yourself if
1018you want to use this technology in an odd numbered cluster setup.
1019
1020QDevice-Net Setup
1021~~~~~~~~~~~~~~~~~
1022
1023We recommend running any daemon which provides votes to corosync-qdevice as an
1024unprivileged user. {pve} and Debian provide a package which is already
1025configured to do so.
1026The traffic between the daemon and the cluster must be encrypted to ensure a
1027safe and secure integration of the QDevice in {pve}.
1028
1029First, install the 'corosync-qnetd' package on your external server
1030
1031----
1032external# apt install corosync-qnetd
1033----
1034
1035and the 'corosync-qdevice' package on all cluster nodes
1036
1037----
1038pve# apt install corosync-qdevice
1039----
1040
1041After doing this, ensure that all the nodes in the cluster are online.
1042
1043You can now set up your QDevice by running the following command on one
1044of the {pve} nodes:
1045
1046----
1047pve# pvecm qdevice setup <QDEVICE-IP>
1048----
1049
1050The SSH key from the cluster will be automatically copied to the QDevice.
1051
1052NOTE: Make sure that the SSH configuration on your external server allows root
1053login via password, if you are asked for a password during this step.
1054If you receive an error such as 'Host key verification failed.' at this
1055stage, running `pvecm updatecerts` could fix the issue.
1056
1057After you enter the password and all the steps have successfully completed, you
1058will see "Done". You can verify that the QDevice has been set up with:
1059
1060----
1061pve# pvecm status
1062
1063...
1064
1065Votequorum information
1066~~~~~~~~~~~~~~~~~~~~~
1067Expected votes: 3
1068Highest expected: 3
1069Total votes: 3
1070Quorum: 2
1071Flags: Quorate Qdevice
1072
1073Membership information
1074~~~~~~~~~~~~~~~~~~~~~~
1075 Nodeid Votes Qdevice Name
1076 0x00000001 1 A,V,NMW 192.168.22.180 (local)
1077 0x00000002 1 A,V,NMW 192.168.22.181
1078 0x00000000 1 Qdevice
1079
1080----
1081
1082
1083Frequently Asked Questions
1084~~~~~~~~~~~~~~~~~~~~~~~~~~
1085
1086Tie Breaking
1087^^^^^^^^^^^^
1088
1089In case of a tie, where two same-sized cluster partitions cannot see each other
1090but can see the QDevice, the QDevice chooses one of those partitions randomly
1091and provides a vote to it.
1092
1093Possible Negative Implications
1094^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1095
1096For clusters with an even node count, there are no negative implications when
1097using a QDevice. If it fails to work, it is the same as not having a QDevice
1098at all.
1099
1100Adding/Deleting Nodes After QDevice Setup
1101^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1102
1103If you want to add a new node or remove an existing one from a cluster with a
1104QDevice setup, you need to remove the QDevice first. After that, you can add or
1105remove nodes normally. Once you have a cluster with an even node count again,
1106you can set up the QDevice again as described previously.
1107
1108Removing the QDevice
1109^^^^^^^^^^^^^^^^^^^^
1110
1111If you used the official `pvecm` tool to add the QDevice, you can remove it
1112by running:
1113
1114----
1115pve# pvecm qdevice remove
1116----
1117
1118//Still TODO
1119//^^^^^^^^^^
1120//There is still stuff to add here
1121
1122
1123Corosync Configuration
1124----------------------
1125
1126The `/etc/pve/corosync.conf` file plays a central role in a {pve} cluster. It
1127controls the cluster membership and its network.
1128For further information about it, check the corosync.conf man page:
1129[source,bash]
1130----
1131man corosync.conf
1132----
1133
1134For node membership, you should always use the `pvecm` tool provided by {pve}.
1135You may have to edit the configuration file manually for other changes.
1136Here are a few best practice tips for doing this.
1137
1138[[pvecm_edit_corosync_conf]]
1139Edit corosync.conf
1140~~~~~~~~~~~~~~~~~~
1141
1142Editing the corosync.conf file is not always very straightforward. There are
1143two on each cluster node, one in `/etc/pve/corosync.conf` and the other in
1144`/etc/corosync/corosync.conf`. Editing the one in our cluster file system will
1145propagate the changes to the local one, but not vice versa.
1146
1147The configuration will get updated automatically, as soon as the file changes.
1148This means that changes which can be integrated in a running corosync will take
1149effect immediately. Thus, you should always make a copy and edit that instead,
1150to avoid triggering unintended changes when saving the file while editing.
1151
1152[source,bash]
1153----
1154cp /etc/pve/corosync.conf /etc/pve/corosync.conf.new
1155----
1156
1157Then, open the config file with your favorite editor, such as `nano` or
1158`vim.tiny`, which come pre-installed on every {pve} node.
1159
1160NOTE: Always increment the 'config_version' number after configuration changes;
1161omitting this can lead to problems.
1162
1163After making the necessary changes, create another copy of the current working
1164configuration file. This serves as a backup if the new configuration fails to
1165apply or causes other issues.
1166
1167[source,bash]
1168----
1169cp /etc/pve/corosync.conf /etc/pve/corosync.conf.bak
1170----
1171
1172Then replace the old configuration file with the new one:
1173[source,bash]
1174----
1175mv /etc/pve/corosync.conf.new /etc/pve/corosync.conf
1176----
1177
1178You can check if the changes could be applied automatically, using the following
1179commands:
1180[source,bash]
1181----
1182systemctl status corosync
1183journalctl -b -u corosync
1184----
1185
1186If the changes could not be applied automatically, you may have to restart the
1187corosync service via:
1188[source,bash]
1189----
1190systemctl restart corosync
1191----
1192
1193On errors, check the troubleshooting section below.
1194
1195Troubleshooting
1196~~~~~~~~~~~~~~~
1197
1198Issue: 'quorum.expected_votes must be configured'
1199^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1200
1201When corosync starts to fail and you get the following message in the system log:
1202
1203----
1204[...]
1205corosync[1647]: [QUORUM] Quorum provider: corosync_votequorum failed to initialize.
1206corosync[1647]: [SERV ] Service engine 'corosync_quorum' failed to load for reason
1207 'configuration error: nodelist or quorum.expected_votes must be configured!'
1208[...]
1209----
1210
1211It means that the hostname you set for a corosync 'ringX_addr' in the
1212configuration could not be resolved.
1213
1214Write Configuration When Not Quorate
1215^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
1216
1217If you need to change '/etc/pve/corosync.conf' on a node with no quorum, and you
1218understand what you are doing, use:
1219[source,bash]
1220----
1221pvecm expected 1
1222----
1223
1224This sets the expected vote count to 1 and makes the cluster quorate. You can
1225then fix your configuration, or revert it back to the last working backup.
1226
1227This is not enough if corosync cannot start anymore. In that case, it is best to
1228edit the local copy of the corosync configuration in
1229'/etc/corosync/corosync.conf', so that corosync can start again. Ensure that on
1230all nodes, this configuration has the same content to avoid split-brain
1231situations.
1232
1233
1234[[pvecm_corosync_conf_glossary]]
1235Corosync Configuration Glossary
1236~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1237
1238ringX_addr::
1239This names the different link addresses for the Kronosnet connections between
1240nodes.
1241
1242
1243Cluster Cold Start
1244------------------
1245
1246It is obvious that a cluster is not quorate when all nodes are
1247offline. This is a common case after a power failure.
1248
1249NOTE: It is always a good idea to use an uninterruptible power supply
1250(``UPS'', also called ``battery backup'') to avoid this state, especially if
1251you want HA.
1252
1253On node startup, the `pve-guests` service is started and waits for
1254quorum. Once quorate, it starts all guests which have the `onboot`
1255flag set.
1256
1257When you turn on nodes, or when power comes back after power failure,
1258it is likely that some nodes will boot faster than others. Please keep in
1259mind that guest startup is delayed until you reach quorum.
1260
1261
1262[[pvecm_next_id_range]]
1263Guest VMID Auto-Selection
1264------------------------
1265
1266When creating new guests the web interface will ask the backend for a free VMID
1267automatically. The default range for searching is `100` to `1000000` (lower
1268than the maximal allowed VMID enforced by the schema).
1269
1270Sometimes admins either want to allocate new VMIDs in a separate range, for
1271example to easily separate temporary VMs with ones that choose a VMID manually.
1272Other times its just desired to provided a stable length VMID, for which
1273setting the lower boundary to, for example, `100000` gives much more room for.
1274
1275To accommodate this use case one can set either lower, upper or both boundaries
1276via the `datacenter.cfg` configuration file, which can be edited in the web
1277interface under 'Datacenter' -> 'Options'.
1278
1279NOTE: The range is only used for the next-id API call, so it isn't a hard
1280limit.
1281
1282Guest Migration
1283---------------
1284
1285Migrating virtual guests to other nodes is a useful feature in a
1286cluster. There are settings to control the behavior of such
1287migrations. This can be done via the configuration file
1288`datacenter.cfg` or for a specific migration via API or command line
1289parameters.
1290
1291It makes a difference if a guest is online or offline, or if it has
1292local resources (like a local disk).
1293
1294For details about virtual machine migration, see the
1295xref:qm_migration[QEMU/KVM Migration Chapter].
1296
1297For details about container migration, see the
1298xref:pct_migration[Container Migration Chapter].
1299
1300Migration Type
1301~~~~~~~~~~~~~~
1302
1303The migration type defines if the migration data should be sent over an
1304encrypted (`secure`) channel or an unencrypted (`insecure`) one.
1305Setting the migration type to `insecure` means that the RAM content of a
1306virtual guest is also transferred unencrypted, which can lead to
1307information disclosure of critical data from inside the guest (for
1308example, passwords or encryption keys).
1309
1310Therefore, we strongly recommend using the secure channel if you do
1311not have full control over the network and can not guarantee that no
1312one is eavesdropping on it.
1313
1314NOTE: Storage migration does not follow this setting. Currently, it
1315always sends the storage content over a secure channel.
1316
1317Encryption requires a lot of computing power, so this setting is often
1318changed to `insecure` to achieve better performance. The impact on
1319modern systems is lower because they implement AES encryption in
1320hardware. The performance impact is particularly evident in fast
1321networks, where you can transfer 10 Gbps or more.
1322
1323Migration Network
1324~~~~~~~~~~~~~~~~~
1325
1326By default, {pve} uses the network in which cluster communication
1327takes place to send the migration traffic. This is not optimal both because
1328sensitive cluster traffic can be disrupted and this network may not
1329have the best bandwidth available on the node.
1330
1331Setting the migration network parameter allows the use of a dedicated
1332network for all migration traffic. In addition to the memory,
1333this also affects the storage traffic for offline migrations.
1334
1335The migration network is set as a network using CIDR notation. This
1336has the advantage that you don't have to set individual IP addresses
1337for each node. {pve} can determine the real address on the
1338destination node from the network specified in the CIDR form. To
1339enable this, the network must be specified so that each node has exactly one
1340IP in the respective network.
1341
1342Example
1343^^^^^^^
1344
1345We assume that we have a three-node setup, with three separate
1346networks. One for public communication with the Internet, one for
1347cluster communication, and a very fast one, which we want to use as a
1348dedicated network for migration.
1349
1350A network configuration for such a setup might look as follows:
1351
1352----
1353iface eno1 inet manual
1354
1355# public network
1356auto vmbr0
1357iface vmbr0 inet static
1358 address 192.X.Y.57/24
1359 gateway 192.X.Y.1
1360 bridge-ports eno1
1361 bridge-stp off
1362 bridge-fd 0
1363
1364# cluster network
1365auto eno2
1366iface eno2 inet static
1367 address 10.1.1.1/24
1368
1369# fast network
1370auto eno3
1371iface eno3 inet static
1372 address 10.1.2.1/24
1373----
1374
1375Here, we will use the network 10.1.2.0/24 as a migration network. For
1376a single migration, you can do this using the `migration_network`
1377parameter of the command line tool:
1378
1379----
1380# qm migrate 106 tre --online --migration_network 10.1.2.0/24
1381----
1382
1383To configure this as the default network for all migrations in the
1384cluster, set the `migration` property of the `/etc/pve/datacenter.cfg`
1385file:
1386
1387----
1388# use dedicated migration network
1389migration: secure,network=10.1.2.0/24
1390----
1391
1392NOTE: The migration type must always be set when the migration network
1393is set in `/etc/pve/datacenter.cfg`.
1394
1395
1396ifdef::manvolnum[]
1397include::pve-copyright.adoc[]
1398endif::manvolnum[]