Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CentOS High Availability

You're reading from  CentOS High Availability

Product type Book
Published in Apr 2015
Publisher
ISBN-13 9781785282485
Pages 174 pages
Edition 1st Edition
Languages
Toc

Table of Contents (21) Chapters close

CentOS High Availability
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
1. Getting Started with High Availability 2. Meet the Cluster Stack on CentOS 3. Cluster Stack Software on CentOS 6 4. Resource Manager on CentOS 6 5. Playing with Cluster Nodes on CentOS 6 6. Fencing on CentOS 6 7. Testing Failover on CentOS 6 8. Two-node Cluster Considerations on CentOS 6 9. Cluster Stack Software on CentOS 7 10. Resource Manager on CentOS 7 11. Playing with Cluster Nodes on CentOS 7 12. STONITH on CentOS 7 13. Testing Failover on CentOS 7 14. Two-node Cluster Considerations on CentOS 7 Index

Fencing test


When you configure a task as important as fencing, it is necessary to test it to make sure it works as expected. Luckily, the developers of such cluster software are also aware of this fact, and you can easily manage and test the fencing configuration with the fence_check, fence_tool, and fence_node commands.

  • fence_check: This command is used to check the fencing configuration in the CMAN configuration file. The fence_check command checks whether the configured fence devices and cluster node fencing methods used are valid or not, and provides a verbose output.

  • fence_tool: The fence_tool command can be used to print information about the fence domain and also remove or join the cluster node from or to the fence domain.

  • fence_node: The fence_node command is used to manually test the fencing. You can use this command to manually fence the node you want.

The fenced fencing daemon also provides a log file where you can get all of the information about fencing daemon and fencing actions...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime