Implementing a RHEL HA Add-On cluster on IBM Power Virtual Server in a Multizone Region Environment
Use the following information and procedures to implement a Red Hat Enterprise Linux (RHEL) High Availability (HA) cluster in a multizone region environment. The cluster uses instances in IBM® Power® Virtual Server as cluster nodes. The virtual server instances run in different zones in a multizone region. The setup uses the powervs-subnet cluster resource agent to manage the service IP address of an application in a multizone region implementation. The resource agent supports only the use of different zones in the same multizone region. Deployment across multiple regions is not supported. See Multizone regions (MZR) and IBM Cloud regions for more information about multizone regions and available locations.
The information describes how to transform the individual virtual server instances into a cluster.
These procedures include installing the high availability packages and agents on each cluster node and configuring the fencing devices.
This information is intended for architects and specialists who are planning a high availability deployment of SAP applications on Power Virtual Server. It is not intended to replace existing SAP or Red Hat documentation.
Before you begin
Review the general requirements, product documentation, support articles, and SAP notes listed in Implementing High Availability for SAP Applications on IBM Power Virtual Server References.
Creating virtual server instances for the cluster
Use the instructions in Creating Instances for a High Availability Cluster on IBM Power Virtual Server to create the virtual server instances that you want to use as cluster nodes.
Create two workspaces in two zones of a multizone region. Create a Transit Gateway and add both workspaces to the connections. Create two virtual server instances, one in each workspace.
Preparing the nodes for RHEL HA Add-On installation
The following section describes basic preparation steps on the cluster nodes. Make sure that you follow the steps on both nodes.
Log in as the root user to each of the cluster nodes.
Adding cluster node entries to the hosts file
On both nodes, add the IP addresses and hostnames of both nodes to the /etc/hosts
file.
For more information, see Setting up /etc/hosts
files on RHEL cluster nodes.
Preparing environment variables
To simplify the setup process, prepare some environment variables for the root user. These environment variables are used with later operating system commands in this information.
On both nodes, create a file with the following environment variables and update to your environment.
# General settings
export CLUSTERNAME="SAP_CLUSTER" # Cluster name
export APIKEY=<APIKEY> # API Key of the IBM Cloud IAM ServiceID for the fencing agent
export CLOUD_REGION=<CLOUD_REGION> # Multizone region name
export PROXY_IP=<IP_ADDRESS> # IP address of proxy server
# Workspace 1
export IBMCLOUD_CRN_1=<IBMCLOUD_CRN_1> # Workspace CRN
export GUID_1=<GUID_1> # Workspace GUID
# Workspace 2
export IBMCLOUD_CRN_2=<IBMCLOUD_CRN_2> # Workspace CRN
export GUID_2=<GUID_2> # Workspace GUID
# Virtual server instance 1
export NODE1=<HOSTNAME_1> # Virtual server instance hostname
export POWERVSI_1=<POWERVSI_1> # Virtual server instance id
# Virtual server instance 2
export NODE2=<HOSTNAME_2> # Virtual server instance
export POWERVSI_2=<POWERVSI_2> # Virtual server instance id
To find the settings for the APIKEY
, IBMCLOUD_CRN_?
, GUID_?
, and POWERVSI_?
variables, follow the steps in Collecting parameters for configuring a RHEL HA Add-On cluster.
Installing and configuring a RHEL HA Add-On cluster
Use the following steps to set up a two-node cluster for an IBM Power Virtual Server.
The instructions are based on the Red Hat product documentation and articles that are listed in Implementing High Availability for SAP Applications on IBM Power Virtual Server References.
You need to complete some steps on both nodes and some steps on either NODE1 or on NODE2.
Installing RHEL HA Add-On software
Install the required software packages. The minimum operating system version required to use the powervs-subnet resource agent is RHEL 9.2.
The @server group must be installed on the operating system. This installation is a standard requirement for SAP applications.
Checking the RHEL HA repository
Check that the appropriate repository is enabled on both nodes by using the following command.
dnf repolist
Use the following commands to enable the HA repository if it is missing.
subscription-manager repos \
--enable="rhel-9-for-ppc64le-highavailability-e4s-rpms"
dnf clean all
dnf repolist
Installing the RHEL HA Add-On software packages
Install the required software packages on both nodes by running the following command.
dnf install -y pcs pacemaker fence-agents-ibm-powervs
Make sure that you install the minimal version of the fence-agents-ibm-powervs package dependent on your Red Hat Enterprise Linux release:
- RHEL 9
- fence-agents-ibm-powervs-4.10.0-43.el9
Configuring a RHEL HA Add-On cluster
Use the following steps to configure a RHEL HA Add-On cluster.
Configuring firewall services
Add the high availability service to the RHEL firewall if firewalld.service is installed and enabled.
On both nodes, run the following commands.
firewall-cmd --permanent --add-service=high-availability
firewall-cmd --reload
Starting the PCS daemon
Start the PCS daemon that is used for controlling and configuring RHEL HA Add-On clusters through PCS.
On both nodes, run the following commands.
systemctl enable --now pcsd.service
Make sure that the PCS service is running.
systemctl status pcsd.service
Setting a password for the hacluster user ID
Set the password for the hacluster user ID.
On both nodes, run the following command.
passwd hacluster
Authenticating the cluster nodes
Use the following command to authenticate the user hacluster to the PCS daemon on the nodes in the cluster. The command prompts you for the password that you set in the previous step.
On NODE1, run the following command.
pcs host auth ${NODE1} ${NODE2} -u hacluster
Configuring and starting the cluster nodes
Configure the cluster configuration file and synchronize the configuration to the specified nodes.
The --start
option also starts the cluster service on the nodes.
On NODE1, run the following command.
pcs cluster setup ${CLUSTERNAME} --start ${NODE1} ${NODE2}
pcs status
Creating the fencing device
STONITH is an acronym for "Shoot The Other Node In The Head" and protects your data from corruption in a split-brain situation.
You must enable STONITH (fencing) for a RHEL HA Add-On production cluster.
Fence agent fence_ibm_powervs is the only supported agent for a STONITH device on Power Virtual Server clusters.
You must configure a fencing device for each of the two workspaces in the multizone region. The fence agent connects to the Power Cloud API by using
the common APIKEY
and CLOUD_REGION
parameters. The parameters IBMCLOUD_CRN_<n>
, GUID_<n>
, and the instance ID POWERVSI_<n>
are specific to the workspace.
You can test the agent invocation by using the parameters that you gathered in the Gathering required parameters for the cluster configuration section.
Identifying the virtual server instances for fencing
Use the list option of fence_ibm_powervs to identify and or verify the instance IDs of the two cluster nodes.
On any node, run the following commands.
fence_ibm_powervs \
--token=${APIKEY} \
--crn=${IBMCLOUD_CRN_1} \
--instance=${GUID_1} \
--region=${CLOUD_REGION} \
--api-type=public \
-o list
fence_ibm_powervs \
--token=${APIKEY} \
--crn=${IBMCLOUD_CRN_2} \
--instance=${GUID_2} \
--region=${CLOUD_REGION} \
--api-type=public \
-o list
If the virtual server instances have access to only a private network, you must use the --api-type=private
option, which also requires an extra --proxy
option.
Example:
fence_ibm_powervs \
--token=${APIKEY} \
--crn=${IBMCLOUD_CRN_1} \
--instance=${GUID_1} \
--region=${CLOUD_REGION} \
--api-type=private \
--proxy=http://${PROXY_IP}:3128 \
-o list
The following examples use the --api-type=private
option.
Checking the status of both virtual server instances
On both nodes, run the following commands.
time fence_ibm_powervs \
--token=${APIKEY} \
--crn=${IBMCLOUD_CRN_1} \
--instance=${GUID_1} \
--region=${CLOUD_REGION} \
--plug=${POWERVSI_1} \
--api-type=private \
--proxy=http://${PROXY_IP}:3128 \
-o status
time fence_ibm_powervs \
--token=${APIKEY} \
--crn=${IBMCLOUD_CRN_2} \
--instance=${GUID_2} \
--region=${CLOUD_REGION} \
--plug=${POWERVSI_2} \
--api-type=private \
--proxy=http://${PROXY_IP}:3128 \
-o status
The status
action of the fence agent against a virtual server instance --plug=<POWERVSI_n>
displays its power status.
On both nodes, the two commands must report Status: ON
.
The output of the time
command might be useful later when you choose timeouts for the STONITH device.
You can add the -v
flag for verbose output, which shows more information about connecting to the Power Cloud API and querying virtual server power status.
Creating the stonith devices
The following command shows the device-specific options for the fence_ibm_powervs fencing agent.
pcs stonith describe fence_ibm_powervs
Create the stonith device for both virtual server instances.
On NODE1, run the following commands.
pcs stonith create fence_node1 fence_ibm_powervs \
token=${APIKEY} \
crn=${IBMCLOUD_CRN_1} \
instance=${GUID_1} \
region=${CLOUD_REGION} \
api_type=private \
proxy=http://${PROXY_IP}:3128 \
pcmk_host_map="${NODE1}:${POWERVSI_1}" \
pcmk_reboot_timeout=600 \
pcmk_monitor_timeout=600 \
pcmk_status_timeout=60
pcs stonith create fence_node2 fence_ibm_powervs \
token=${APIKEY} \
crn=${IBMCLOUD_CRN_2} \
instance=${GUID_2} \
region=${CLOUD_REGION} \
api_type=private \
proxy=http://${PROXY_IP}:3128 \
pcmk_host_map="${NODE2}:${POWERVSI_2}" \
pcmk_reboot_timeout=600 \
pcmk_monitor_timeout=600 \
pcmk_status_timeout=60
Although the fence_ibm_powervs
agent uses api-type
as an option when started from the command line, the stonith resource needs to be created by using api_type
.
Verify the configuration with the following commands.
pcs config
pcs status
pcs stonith config
pcs stonith status
Setting the stonith-action cluster property
For the powervs-subnet resource agent to work, you must set the stonith-action cluster property to off. When the cluster performs a fencing action, it triggers a power-off operation instead of a reboot for the fenced instance.
After this change, you always need to log in to the IBM Cloud Console, and manually start an instance that was fenced by the cluster.
pcs property set stonith-action=off
Verify the change.
pcs config
Testing fencing operations
To test the STONITH configuration, manually fence the nodes.
When fencing is manually triggered by pcs stonith fence
, the stonith-action
cluster attribute is not used and the node restarts.
On NODE1, run the following commands.
pcs stonith fence ${NODE2}
pcs status
As a result, NODE2 restarts.
After NODE2 is running, start the cluster on NODE2 and try to fence NODE1.
On NODE2, run the following commands.
pcs cluster start
pcs status
pcs stonith status
pcs stonith fence ${NODE1}
NODE1 restarts.
After the node is running, start the cluster on NODE1 again.
On NODE1, run the following command.
pcs cluster start
pcs status
pcs stonith status
Disabling the automatic startup of cluster services when the server boots
After a virtual server instance restarts, it takes some time for its STATUS to become ACTIVE and its Health Status to become OK. The powervs-subnet resource agent requires these states to function properly. Therefore, you must disable automatic cluster startup and start the cluster manually after the instance reaches the required states.
On any node, disable the automatic startup of cluster services at boot time.
pcs cluster disable --all
When you restart an instance, check the instance status in the IBM Cloud Console and wait until the Status field shows Active with a green checkmark. Then, use the following command to manually start the cluster.
pcs cluster start
Preparing a multizone RHEL HA Add-On cluster for a virtual IP address resource
Use the following steps to prepare a multizone RHEL HA Add-on cluster for a virtual IP address resource.
Verifying operating system requirements
Verify that the NetworkManager-config-server
package is installed.
On both nodes, run the following command.
dnf list NetworkManager-config-server
Sample output:
# dnf list NetworkManager-config-server
Installed Packages
NetworkManager-config-server.noarch 1:1.42.2-16.el9_2 @rhel-9-for-ppc64le-baseos-e4s-rpms
Make sure that the NetworkManager no-auto-default
configuration variable is set to *
.
NetworkManager --print-config | grep "no-auto-default="
Sample output:
# NetworkManager --print-config | grep "no-auto-default="
no-auto-default=*
If the no-auto-default
shows a value other than *
, edit the /etc/NetworkManager/conf.d/00-server.conf
file and change the variable as needed.
Installing the powervs-subnet resource agent
Currently, the powervs-subnet resource agent is available in the ClusterLabs GitHub resource agent repository.
Download the resource agent from https://github.com/ClusterLabs/resource-agents/blob/main/heartbeat/powervs-subnet.in and place a copy in the
/tmp
directory on both nodes.
On both nodes, install the script in the OCF Resource Agents heartbeat directory and set its permissions.
sed -e 's|#!@PYTHON@|#!/usr/bin/python3|' /tmp/powervs-subnet.in \
> /usr/lib/ocf/resource.d/heartbeat/powervs-subnet
chmod 755 /usr/lib/ocf/resource.d/heartbeat/powervs-subnet
Use the following command to verify the installation and display a brief description of the resource agent.
pcs resource describe powervs-subnet
Creating a service ID for the powervs-subnet
resource agent
Follow the steps in Creating a Custom Role, Service ID, and API key in IBM Cloud to create a Service ID
and an API key
for the powervs-subnet
resource agent.
Conclusion
This completes the basic cluster implementation and the necessary preparations for creating a powervs-subnet
cluster resource. The powervs-subnet
cluster resource itself is created during the configuration of the specific
high availability scenario.
You can now proceed with the specific instructions for your planned high availability scenario.