On Nov 7, 2007, at 9:16 AM, matilda matilda wrote:

Alan Robertson <[EMAIL PROTECTED]> 07.11.2007 05:51 >>>

Actually there a plenty of people using it today.
I'd much prefer they had a real device, but they are aware of the risks
and seem happy enough.

Like lots of cases, people are happy enough until they get burned. Just like the people with shared storage and no STONITH who are happy enough until they get bit. And, there are plenty of those folks too - probably
quite a few more.

Hi Andrew, hi Alan,

I'm not playing in your "knowledge league", but at this point I have to agree
with Alan. And this only by my own experiences with HAv2:

a) Someone getting a little more elaborate configuration to run is very very happy that it works, meaning the services come up and some managable resource failovers are tested. A correct stonith configuration can only hardly be tested. And I'm pretty sure that the necessity to also test stonith behaviour is
not seen appropriatly. (only my assumption).

My experience in the whole HAv2 cluster is that it behaves sometimes very different under havy load. And under havy load I'm pretty sure that a ssh stonith
device would NOT work reliably.

I'm not arguing that ssh will work in 100% of cases - but what it will do make the cluster wait until it does.

What I am also trying to point out, is that if the node is in such a state that ssh wont work reliably, then what are the chances that the node will be able to commit suicide a) at all, b) before the cluster has started the services for the second time.

I'd argue that it is exactly these situations where ssh is _better_ than suicide.

b) You have to follow this list for months to get the feeling how important a reliably working external stonith device is. This has to be ephasized more
than it is done in the documentation currently. (IMHO).
I had a long discussion explaining why we have to implement a stonith device correctly. (By the way, some will remember that there was a thread initiated
by me about external stonith plugins).

Hence a suggestion:
- Emphasize the necessity of an external properly configured stonith device.

wiki.linux-ha.org :-)


Explain the reasons and scenarios which bring up this requirement. If the administrators/implementers understand the potential risks they will think
differently about that.

- RA-scripts should be taged so that a failover of a resource managed by this
RA will NEVER happen if stonith is not configured.

I'm pretty sure you get this by setting on_fail=block
And actually if a stop fails and stonith is not enabled you end up blocking anyway.

But thats a different scenario to fencing in response to a node-level failure


Probably better explained: If (real) stonith is not configured the risk of damaging resources by starting them twice is given. This risk applies to certain resources (RA). In a case where heartbeat does not know for sure if the resource is (properly) stopped on a node it should NEVER failover such a resource. Just keep the fingers away from that. In such a case you have to provide a kind of notification mechanism (probably something different than writing one line of
thousands to a log file) to get an administrator checking by hand.
So, certain RA have a flag (probably another attribute) saying not to failover this resource if stonith is not configured for a cluster using this RA.

What do you think? Is this idea totally braindead?

A comment to what Kevin Tomlinson said:
I would also be happy if a problem of the HA subsystem would have no impact on the availability of a services controlled by HA. Or better if HA would heal
the appropriate subprocess on its own.

Mostly it does - with the exception of the "heartbeat" processes
And in most cases it even does so fast enough that the DC doesn't need to take any action (zero resource downtime).

Implementing suicide guarantees that there will be downtime.


But: Like said here in this thread. Heartbeat takes the role similar to "init". I assume "init" to be bullet proof. HA must be bullet proof. Everything must be done, which makes HA work correctly. Don't spend development resources to a self healing mechanism for cases which shouldn't happen. If HAv2 goes crazy
then everything is lost... rub it out!  ;-))

If someone thinks that the possibility or penalty of a service outage caused by HA is higher than the possible service outage introduced by a hand- controlled-cluster should NOT use HA for high availability. And, by the way: There are/ were guys on the list who came to exactly this conclusion: Don't use complicated (early stage) HAv2 and do resource failover by hand notified by network/system management tools.

Of course, only my opinion.

Best regards
Andreas Mock




_______________________________________________
Linux-HA mailing list
[email protected]
http://lists.linux-ha.org/mailman/listinfo/linux-ha
See also: http://linux-ha.org/ReportingProblems

_______________________________________________
Linux-HA mailing list
[email protected]
http://lists.linux-ha.org/mailman/listinfo/linux-ha
See also: http://linux-ha.org/ReportingProblems

Reply via email to