First Step in this is after a fresh install of the operating System the following.
Step 1)
#>apt-get update -y
Step 2)
#>apt-get upgrade -y
Step 3)
The installation of corosync and crmsh
This is only possible though adding an additional repository to the apt sources list.
Step 4)
#>echo "http://ftp.debian.org/debian jessie-backports main" >> /etc/apt/sources.list
Step 5)
#>apt-get update -y
Step 6)
#>apt-get -t jessie-backports install pacemaker crmsh -y
Step 7)
We stop pacemaker so we can configure it without it running in the background.
#>systemctl stop pacemaker
Step 8)
We start editing the following file to our likes /etc/corosync/corosync.conf
totem {
Version: 2
transport: udpu
clustername: testcluster
token: 3000
token_retransmit_before_loss_const: 10
clear_node_high_bit: yes
crypto_cipher: none
crypto_hash: none
interface {
ringnumber: 0
bindnetaddr: 192.168.33.0
mcastaddr: 239.255.1.1
mcastport: 5405
ttl: 1
}
}
logging {
fileline: off
to_stderr: no
to_logfile: no
to_syslog: yes
syslog_facility: daemon
debug: off
timestamp: on
logger_subsys {
subsys: QUORUM
debug: off
}
}
quorum {
provider: corosync_votequorum
two_node: 1
}
nodelist {
node {
ring0_addr: 192.168.33.11
}
node {
ring0_addr: 192.168.33.10
}
}
Step 9)
Corosync-keygen, if it shows error messages or if it fails creating a key you might need to set locales in debian.
'locale-gen en_US.UTF-8'
#>vi /etc/default/locale
change or uncomment the actual language entry
LANG="nl_NL.UTF-8" to LANG="en_US.UTF-8"
#>locale-gen
Step 10)
Create ssh Key with ssh-keygen for an useraccount as an example 'testuser'.
Step 11)
Edit /etc/ssh/sshd.conf
Step 12)
Test if ssh connection works, with the wanted user.
Step 13)
Copy corosync.conf to the other machine
scp /etc/corosync/corosync.conf root@192.168.33.x:/etc/corosync/corosync.conf
Step 14)
Copy authkey to other machine.
scp /etc/corosync/authkey root@192.168.33.x:/etc/corosync/authkey
Step 15)
Start Cluster
systemctl start corosync
systemctl start pacemaker
Step 16)
Check Cluster Status
crm status
Step 17)
Enter crm Shell , alternatively 'crm configure'
crm
Step 18)
Configure the following in crm:
property stonith-enabled=false
property no-quorum-policy=ignore
property default-resource-stickiness=100
Step 19)
When leaving the crm shell you will be asked if you want to commit the changes done.
Step 20)
Install NFS Kernel drivers
#>apt-get install nfs-kernel-server -y
Step 21)
Edit the idmap.conf
#>vi /etc/idmap.conf
if neccessary add the domain
Step 22)
Create mountpoints if for the shares
#>mkdir /srv/nfsv4
Step 23)
Edit /etc/exports file
#> vi /etc/exports
example entry
/srv/nfsv4 192.168.33.x(rw,sync,no_subtree_check)
Step 24)
Restart the nfs service
#>systemctl restart nfs-kernel-server
Step 25)
Mount the share on the client machine.
mount -v -t nfs4 192.168.33.x:/srv/nfs4 /test
explanation:
command (mount -v -t nfs4)
server share location (192.168.33.x:/srv/nfs4)
client machine mountpoint in fs (/test)
Step 26)
NFS Ports which need to be opened through firewalls if neccessary
2049 NFSv4
111
1039
1047
1048
NFS3 takes various ports as needed