If you lose power to the server (ie the victim node
does not have power) then it is effectively fenced and cannot cause I/O data
corruption. More than one fencing method will increase the effectiveness of
cluster fencing but only in so far as the errant machine can be prevented from
performing I/O to the data. Sadly, whoever designed your cluster is clearly not
experienced enough to be designing HA / Cluster solutions. You really do need to
convince the sponsors of your project that attempting to fence a server via ssh
/ iptables is not the way to go and a more robust solution is called
for.
|
-- Linux-cluster mailing list Linux-cluster@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/linux-cluster