Red Hat's High Availability add-on provides on-demand failover to make applications highly available. The High Availability add-on may be configured for most applications that use customizable agents, as well as for virtual guests. The High Availability add-on includes failover support for off-the-shelf applications like Apache, MySQL, and PostgreSQL.
Red Hat's High Availability Add-On enables applications to be highly available by reducing downtime and ensuring that there is no single point of failure in a cluster. It also isolates unresponsive applications and nodes so they can't corrupt critical enterprise data.
The Conga application of Red Hat Enterprise Linux provides centralized configuration and management for the High Availability Add-On.
Corosync is a cluster executive within the High Availability Add-On, delivering an extremely mature, secure, high-performing, and lightweight high-availability solution.
Virtualization is pervasive throughout today's enterprise datacenters. Virtualization is integrated directly into the Red Hat Enterprise Linux kernel using kernel-based virtual machine (KVM) technology. As part of the kernel, your administrators get the complete breadth of Red Hat Enterprise Linux system management and security tools and certifications.
Fencing and unfencing
Fencing is removing access to resources from a cluster node that has lost contact with the cluster, thereby protecting resources such as shared storage from uncoordinated modification. After fencing, the unconnected cluster node would ordinarily need to be rebooted to safely rejoin the cluster. However, unfencing allows a node to re-enable access when starting up without administrative intervention.
Improved cluster configuration system
The cluster configuration system supports load options other than XML, including the Lightweight Directory Access Protocol (LDAP). Configuration reload is validated and easily synchronized across the cluster for better usability and manageability.
Unified logging and debuggingProduct Highlights
System administrators can enable, capture, and read cluster system logs via a single cluster configuration command.
- Rich graphical user interface GUI-based cluster management and administration