The High Availability Add-On provides continuous availability of services by eliminating single points of failure. By offering failover services between nodes within a cluster, the High Availability Add-On supports high availability for up to 16 nodes.
The High Availability Add-On also enables failover for off-the-shelf applications such as Apache, MySQL, and PostgreSQL, any of which can be coupled with resources like IP address and single-node file systems to form highly available services. The High Availability Add-On can also be easily extended to any user-specified application that is controlled by an init script per UNIX System V (SysV) standards.
When using the High Availability Add-On, a highly available service can fail over from one node to another with no apparent interruption to cluster clients. The High Availability Add-On also ensures absolute data integrity when one cluster node takes over control of a service from another cluster node. It achieves this by promptly evicting nodes from the cluster that are deemed to be faulty using a method called "fencing" that prevents data corruption. The High Availability Add-On supports several types of fencing, including both power - and storage area network (SAN)-based fencing.
Red Hat's High Availability Add-On enables applications to be highly available by reducing downtime and ensuring that there is no single point of failure in a cluster. It also isolates unresponsive applications and nodes so they can't corrupt critical enterprise data.
The Conga application of Red Hat Enterprise Linux provides centralized configuration and management for the High Availability Add-On.
Corosync is a cluster executive within the High Availability Add-On that implements the totem single ring ordering and membership protocol, delivering an extremely mature, secure, high-performing, and lightweight high-availability solution.
Virtualization is pervasive throughout today's enterprise datacenters. Not only is Red Hat Enterprise Linux designed to be a superior guest on any of the major hypervisors, but it can also be a virtualization host. Virtualization is integrated directly into the Red Hat Enterprise Linux kernel using kernel-based virtual machine (KVM) technology.
Fencing and unfencing
Fencing is removing access to resources from a cluster node that has lost contact with the cluster, thereby protecting resources such as shared storage from uncoordinated modification. Red Hat has made extensive improvements in the SCSI-3 PR reservations-based fencing.
Improved cluster configuration system
The cluster configuration system supports load options other than XML, including the Lightweight Directory Access Protocol (LDAP). Configuration reload is validated and easily synchronized across the cluster for better usability and manageability.
Unified logging and debuggingProduct Highlights
System administrators can enable, capture, and read cluster system logs via a single cluster configuration command.
- Virtualization integration
- Rich graphical user interface (GUI)-based cluster management and administration