기업을 위한 IT 전문 파트너
  • Red Hat High Availibility (RHCS)
  • SNS공유 페이스북 트위터
Red Hat High Availibility (RHCS)
  • Red Hat High Availibility (RHCS)
  • On-demand failover makes applications highly available

  • 제조사 : Red Hat Software Brand Shop
  • 제품번호 : 3721
유사 기능 제품
성능 향상 도구
 
가격정보
P# OS언어제품구분버전소비자가공급가견적주문
01
112
Linux 영문 1-2 Socket 1Year 현 시점 최적가로 견적을 받아보세요   862,400 862,400 견적요청
02
112
Linux 영문 4 Socket 현 시점 최적가로 견적을 받아보세요   1,711,600 1,711,600 견적요청
03
112
Linux 영문 8 Socket 현 시점 최적가로 견적을 받아보세요   3,424,300 3,424,300 견적요청
04
112
Linux 영문 1-2 Socket 3Year 현 시점 최적가로 견적을 받아보세요   2,185,700 2,185,700 견적요청
05
112
Linux 영문 초기 설계 및 구축 지원비용 1Set - 1Day 기준 현 시점 최적가로 견적을 받아보세요   2,200,000 2,200,000 견적요청
    위 가격은 부가세를 포함한 가격 입니다.
  • 견적 및 주문을 진행하시려면 로그인이 필요합니다.
  • ‘주문’이 활성화 되어 있지 않은 제품은 ‘견적요청’을 해주시면 현 시점 최적가로 제공 해드립니다.
요약정보

On-demand failover makes applications highly available

The High Availability Add-On also enables failover for off-the-shelf applications, like Apache, MySQL, and PostgreSQL. Any of which can be coupled with resources like IP-address and single-node file systems to form highly available services. You can also easily extend the Add-On to any user-specified application that's controlled by an init script per UNIX System V (SysV) standards.

동일계열 제품

  • Red Hat High Availibility (RHCS)


상세정보

 

High Availability

On-demand failover makes applications highly available

The Red Hat® Enterprise Linux® High Availability Add-On provides on-demand failover to make applications highly available. It delivers continuous availability of services by eliminating single points of failure.


Failover

  Configure the High Availability Add-On for most applications that use customizable agents and for virtual guests. By offering failover services between nodes within a cluster, this Add-On supports high availability for up to 16 nodes. (Currently this capability is limited to a single LAN or datacenter located within one physical site.)

The High Availability Add-On also enables failover for off-the-shelf applications, like Apache, MySQL, and PostgreSQL. Any of which can be coupled with resources like IP-address and single-node file systems to form highly available services. You can also easily extend the Add-On to any user-specified application that's controlled by an init script per UNIX System V (SysV) standards.


How it works

When using the High Availability Add-On, a highly available service can perform a failover from one node to another with no apparent interruption to cluster clients.

The Add-On also ensures absolute data integrity when one cluster node takes over control of a service from another cluster node. It achieves this by promptly evicting nodes from the cluster that are deemed to be faulty using a method called fencing, which prevents data corruption. The High Availability Add-On supports several types of fencing, including both power-based and storage area network (SAN)-based fencing.

 

[Features]

The High Availability Add-On for Red Hat® Enterprise Linux® provides continuous availability of services by eliminating single points of failure. This article provides the key features and benefits of this Add-On.

Features Benefits
Clustering  Red Hat's High Availability Add-On enables applications to be highly available by reducing downtime and ensuring that there is no single point of failure in a cluster. It also isolates unresponsive applications and nodes so they can't corrupt critical enterprise data
Conga  The Conga application of Red Hat Enterprise Linux provides centralized configuration and management for the High Availability Add-On
Corosync  Corosync is a cluster executive within the High Availability Add-On that implements the Totem Single Ring Ordering and Membership Protocol, delivering an extremely mature, secure, high-performing, and lightweight high-availability solution
Integrated virtualization  Virtualization is pervasive throughout today's enterprise datacenters. Not only is Red Hat Enterprise Linux designed to be a superior guest on any of the major hypervisors, but it can also be a virtualization host. Virtualization is integrated directly into the Red Hat Enterprise Linux kernel using kernel-based virtual machine (KVM) technology. As part of the kernel, your administrators get the complete breadth of Red Hat Enterprise Linux system management and security tools and certifications
Fencing & unfencing  Fencing is removing access to resources from a cluster node that has lost contact with the cluster, thereby protecting resources such as shared storage from uncoordinated modification. Red Hat has made extensive improvements in the SCSI-3 PR reservations-based fencing. By enabling manual specification of keys and devices for registration and reservation, cluster administrators can bypass clvm and improve configuration and system flexibility. After fencing, the unconnected cluster node would ordinarily need to be rebooted to safely rejoin the cluster. However, unfencing allows a node to re-enable access when starting up without administrative intervention.
Improved cluster configuration system  The cluster configuration system now supports load options other than XML, including the Lightweight Directory Access Protocol (LDAP). Configuration reload is validated and easily synchronized across the cluster for better usability and manageability.
Virtualization integration You can now run virtualized KVM guests as managed services
Rich graphical user interface (GUI)-based cluster management and administration
 In Red Hat Enterprise Linux 6, the Web interface to luci has been redesigned and runs on TurboGears2
Unified logging and debugging System administrators can now enable, capture, and read cluster system logs via a single cluster configuration command











 

RedHatHighAvailibilityRHCS, RedHatSoftware,Red Hat Software
견적요청
인터파크 큐브릿지 IT영업부
자세히보기
  • Office 365
  • CCT
TOP