mirror of
https://git.proxmox.com/git/mirror_corosync
synced 2026-01-24 19:30:26 +00:00
git-svn-id: http://svn.fedorahosted.org/svn/corosync/trunk@2095 fd59a12c-fef9-0310-b244-a6a79926bd2f
174 lines
5.9 KiB
Plaintext
174 lines
5.9 KiB
Plaintext
----------------------------------------------
|
|
The Corosync Cluster Engine Installation Guide
|
|
----------------------------------------------
|
|
Please read LICENSE for a description of the licensing of this software.
|
|
|
|
All cryptographic software in this package is subject to the following legal
|
|
notice:
|
|
This package includes publicly available encryption source code which,
|
|
together with object code resulting from the compiling of publicly
|
|
available source code, may be exported from the United States under License
|
|
Exception TSU prsuant to 15 C.F.R Section 740.13(e).
|
|
|
|
----------------------------
|
|
* Building from subversion *
|
|
----------------------------
|
|
When building and installing from subversion, automake 2.61 or later is
|
|
required. Prior versions will result in build failures.
|
|
|
|
Step 1: check out a read only copy of the repository
|
|
svn checkout http://svn.fedoraprojects.org/svn/corosync
|
|
|
|
Find the version you want to build. Usually this will be the "trunk" version
|
|
located in the trunk directory. If you want to build a specific released
|
|
version check in the tags directory.
|
|
|
|
Step 2: Generate the makefiles
|
|
balance:~/corosync/trunk% ./autogen.sh
|
|
|
|
Step 3: Run the configure script
|
|
balance:~/corosync/trunk% ./configure
|
|
|
|
Step 4: Install the binaries
|
|
balance:~/corosync/trunk% su
|
|
balance:~/corosync/trunk# make install
|
|
|
|
-------------------------
|
|
* Building from tarball *
|
|
-------------------------
|
|
The tarball is distributed with pregenerated makefiles. There is no need
|
|
to run the autogen.sh script in this case.
|
|
|
|
Step 1: Run the configure script
|
|
balance:~/corosync/trunk% ./configure
|
|
|
|
Step 2: Install the binaries
|
|
balance:~/corosync/trunk% su
|
|
balance:~/corosync/trunk# make install
|
|
|
|
------------------------
|
|
* Configuring Corosync *
|
|
------------------------
|
|
The corosync executive will automatically determine cluster membership by
|
|
communicating on a specified multicast address and port.
|
|
|
|
The directory conf contains the file corosync.conf.example
|
|
|
|
# Please read the corosync.conf.5 manual page
|
|
totem {
|
|
version: 2
|
|
secauth: off
|
|
threads: 0
|
|
interface {
|
|
ringnumber: 0
|
|
bindnetaddr: 192.168.1.1
|
|
mcastaddr: 226.94.1.1
|
|
mcastport: 5405
|
|
}
|
|
}
|
|
|
|
logging {
|
|
fileline: off
|
|
to_stderr: yes
|
|
to_file: yes
|
|
to_syslog: yes
|
|
logfile: /tmp/corosync.log
|
|
debug: off
|
|
timestamp: on
|
|
}
|
|
|
|
The totem section contains three values. All three values must be set
|
|
or the corosync executive wll exit with an error.
|
|
|
|
bindnetaddr specifies the address which the corosync Executive should bind to.
|
|
This address should always end in zero. If the local interface taffic
|
|
should routed over is 192.168.5.92, set bindnetaddr to 192.168.5.0.
|
|
|
|
mcastaddr is a multicast address. The default should work but you may have
|
|
a different network configuration. Avoid 224.x.x.x because this is a "config"
|
|
multicast address.
|
|
|
|
mcastport specifies the UDP port number. It is possible to use the same
|
|
multicast address on a network with the corosync services configured for
|
|
different UDP ports.
|
|
|
|
The timeout section contains seven values. This section is not normally used,
|
|
but rather used to override the program defaults for the purposes of fine
|
|
tuning for a given networking/processor combination or for debugging purposes.
|
|
Be careful to use the same timeout values on each of the nodes in the cluster
|
|
or unpredictable results may occur.
|
|
|
|
Do not use DOS style termination. This breaks the parser.
|
|
|
|
Configure Host
|
|
--------------
|
|
For security reasons, corosync only allows a process that had the EGID/GID
|
|
of "ais" to connect to it. To make development easier, it is recommended to
|
|
create an "ais" user with the "ais" group.
|
|
|
|
[root@balance root]# adduser ais -g ais
|
|
|
|
Set the ais user's password:
|
|
|
|
[root@balance root]# passwd ais
|
|
Changing password for user ais.
|
|
New password:
|
|
Retype new password:
|
|
passwd: all authentication tokens updated successfully.
|
|
|
|
Generate a private key
|
|
----------------------
|
|
corosync uses cryptographic techniques to ensure authenticity and privacy of
|
|
messages. A private key must be generated and shared by all processors for
|
|
correct operation.
|
|
|
|
First generate the key on one of the nodes:
|
|
|
|
unix# exec/keygen
|
|
Corosync Authentication key generator.
|
|
Gathering 1024 bits for key from /dev/random.
|
|
Writing corosync key to /etc/ais/authkey.
|
|
|
|
After this is complete, a private key will be in the file /etc/ais/authkey.
|
|
This private key must be copied to every processor that will be a member of
|
|
the cluster. If the private key isn't the same for every node, those nodes
|
|
with nonmatching private keys will not be able to join the same configuration.
|
|
|
|
Copy the key to some transportable storage or use ssh to transmit the key
|
|
from node to node. Then install the key with the command:
|
|
|
|
unix# install -D --group=0 --owner=0 --mode=0400 /path_to_authkey/authkey /etc/ais/authkey
|
|
|
|
If the message invalid digest appears, the keys are not the same on each node.
|
|
|
|
Run the corosync executive
|
|
-------------------------
|
|
Get one or more nodes and run the corosync executive on each node. A list of
|
|
node IPs should be logged when the nodes join a configuration. Run the
|
|
corosync daemon after following the previous directions. The daemon must be
|
|
run as UID 0(root).
|
|
|
|
please read SECURITY to understand the threat model assumed by corosync
|
|
and the techniques corosync use to overcome these threats.
|
|
|
|
Before running any of the test programs
|
|
---------------------------------------
|
|
The corosync executive will ensure security by only allowing the ais group (or
|
|
uid root) to connect to the service. Switch to the ais group before
|
|
running any applications linked to the ais apis, or the applications will
|
|
not be authenticated and won't be able to access services.
|
|
|
|
[sdake@balance sdake]$ su ais
|
|
Password:
|
|
[ais@balance sdake]$ id
|
|
uid=501(ais) gid=502(ais) groups=502(ais)
|
|
|
|
Try out the corosync cpg functionality
|
|
--------------------------------------
|
|
After corosync is running
|
|
|
|
su to ais user
|
|
|
|
Run test/testcpg on multiple nodes or on the same node. Messages can be typed
|
|
which will then be sent to other testcpg applications in the cluster.
|