Difference between revisions of "IP Address change for Active Passive Appliances"
m (1 revision imported) |
|
(No difference)
|
Latest revision as of 12:52, 11 May 2017
Contents
Overview
This document outlines the procedures for changing the IP address on PINsafe Servers using Active Passive appliances with DRBD replication.
The HA config can only be tested where the IP addresses and network configurations are consistent with the local address settings. This means IP addresses may need changing as part of the installation process. This section describes the changes required on the assumption that a HA pair have been built and now need to be installed with different IP addresses.
Each server has an internal address that is used for communications between the servers an external IP address. Further more there is a virtual cluster IP address that is used by whichever server is on−line. Therefore there is a total of five IP addresses PrimaryExternal, Primary Internal, StandbyExternal, StandbyInternal, Virtual
Prerequisites
Have read and followed the information in IP Address change for PINsafe servers How to Guide
Unless otherwise stated, the listed processes needs completing on both servers.
Stopping Services
The steps are required on both servers.
Start the server but then stop the HA services and TOMCAT
service heartbeat stop
service drbd stop
service tomcat5 stop
TOMCAT should only be running on the primary server.
Change Networking Information
Within Xwindows change the network settings for the for each interface to match the new settings, (or command line where Xwindows is not available). This includes changing the IP addresses, gateway addresses and DNS settings and host settings. If the two servers are going to be connected via a cross−over cable then the settings for the internal IP addresses need not be changed. Once you have changed these settings you need to restart the network services.
Start Network Services
service network restart
At this point test that you can ping each machine from the other via the internal interface eg run on the primary server
ping 172.16.0.2
If you have changed the internal IP addresses or are not using the default host names, you need to edit the /etc/drbd.conf file to change the following entries,
on primary.swivelsecure.local { device /dev/drbd0; disk /dev/sda9; address 172.16.0.1:7788; meta−disk internal; } and on standby.swivelsecure.local { device /dev/drbd0; disk /dev/sda9; address 172.16.0.2:7788; meta−disk internal; }
to reflect the internal IP addresses and host names used.
Start DRBD
Restart the drbd service on both servers
service drbd start
Check DRBD is working
Check the status by running cat /proc/drbd.
If the status is not connected and consistent run:
drbdadm −− −−do−what−I−say primary all
To bring them into a consistent state.
Configure Heartbeat
The heartbeat ip addresses and host name settings also need to be changed. Edit the
/etc/ha.d/ha.cf
file on each server.
You need to change the following settings.
ucast eth0 192.168.0.36 ucast eth1 172.16.0.2
On the primary server the eth0 settings needs to match the external IP address of the standby server and the eth1 setting needs to match the internal IP address of the standby server. On the standby server the eth0 settings needs to match the external IP address of the primary server and the eth1 setting needs to match the internal IP address of the primary server.
The following settings must match the hostnames used for the pair.
node primary.swivelsecure.local node standby.swivelsecure.local
The ping address needs to match the default gateway address. The heartbeat will ping this address to determine if it still has network.
ping 192.168.0.254
The ha resources file, /etc/ha.d/haresources needs to be edited to reflect the virtual cluster IP address and hostnames to be used. The IP address represents the Virtual IP.
primary.swivelsecure.local IPaddr::192.168.0.38/24/eth0 drbddisk::webapps \ Filesystem::/dev/drbd0::/usr/local/apache−tomcat−5.5.15/webapps::ext3 \ tomcat5 MailTo::changethis@swivelsecure.com::PINsafe standby.swivelsecure.local MailTo::changethis@swivelsecure.com::PINsafeStandby
Enter a valid and relevant email address; this is the email address to which emails are sent in the event of a server failure.
Start the Heartbeat
Start the heartbeat by running service heartbeat start
Check /var/log/messages for log messages from heartbeat. The messages should indicate that both links (assuming the external interfaces are connected to a network) on each machine are up. On the primary server confirm that Tomcat is running (ps ax | grep java) and that the virtual IP has been taken over on the external interface (ifconfig).
Configure the Mon service
Edit the /etc/mon/mon.cf file to reflect the virtual IP address being used.
- # group definitions (hostnames or IP addresses) # hostgroup pinsafe 192.168.0.38
Testing
Use the following command to check the servers are synchronised:
cat /proc/drbd
Expected Results:
primary
drbd driver loaded OK; device status: version: 0.7.14 (api:77/proto:74) SVN Revision: 1989 build by buildcentos@build-i386, 2006-03-18 19:03:54 0: cs:Connected st:Primary/Secondary ld:Consistent ns:8492552 nr:22716 dw:8515268 dr:284982 al:106 bm:2286 lo:0 pe:0 ua:0 ap:0
secondary
drbd driver loaded OK; device status: version: 0.7.14 (api:77/proto:74) SVN Revision: 1989 build by buildcentos@build-i386, 2006-03-18 19:03:54 0: cs:Connected st:Secondary/Primary ld:Consistent ns:22716 nr:10565672 dw:10588388 dr:36158 al:20 bm:128 lo:0 pe:0 ua:0 ap:0
Check that the file systems are mounted on the active server:
df –k
Expected results:
/dev/drbd0 9.5G 145M 8.9G 2% /usr/local/apache-tomcat-5.5.15/webapps