SlideShare a Scribd company logo
CLUSTERING 
ERIC VANDERBURG
CLUSTERING 
• Combining computers to create one 
logical computer 
• Provides increased redundancy
TERMS 
• Node (cluster host) - A computer that is a member of a server cluster. 
• Resource - entity that can be managed by a cluster and moved between 
nodes. 
• Resource Group - A collection of resources that can be started or stopped. 
• Failover - the process of taking resources offline on one node and moving 
them to another. 
• Failback - returning resources back to their original node once it has 
recovered. 
• Quorum - the disk that holds the configuration data and all the changes that 
have been made to the cluster database. 
• HBA (Host Bus Adapter) - interface card that connects a cluster node to a SAN. 
• Split brain - some nodes in the cluster lose contact with the quorum and one 
another so each thinks that they are the only one in the cluster. This 
eventually leads to data corruption.
INSTANCES 
• Single Instance application - One application is 
running on the server at a time 
• Multiple instance application - multiple instances 
of the same code or different pieces of code 
running for the same service are running on a 
cluster. 
• Cloned applications - uses a relatively static dataset. 
• Partitioned application - dataset is frequently updated 
so the dataset is divided among partitions.
STORAGE 
• Clusters use SANs for storage 
• Cluster network should be connected directly to 
the SAN and the network between them should 
be isolated from the rest of the network. 
• Parallel SCSI 
• Fiber Channel 
• If there are more than 2 nodes,m FC-SW 
(Switched Fiber Channel Fabric) must be used.
ACCESS TO THE SAN 
• Zoning - creates views called clouds that control 
access and control traffic flow between the SAN. 
• LUN masking - access control is provided at the 
controller and port level. Policies are defined for 
specific devices. Provides more granular security 
than zoning.
CLUSTER MODELS 
• Local Quorum cluster - used for testing and has only one 
node. 
• Single Quorum device cluster - cluster configuration data is 
stored on a single device connected to all nodes in the 
cluster. At least one node must be functional for the 
cluster as a whole to function. 
• Majority node set cluster - each node contains its own 
copy of the cluster configuration data. A majority of the 
nodes in the cluster must function for the cluster as a 
while to function.
MULTISITE CLUSTER REPLICATION 
• Block level replication - storage devices are 
mirrored over a private network between 
sites. 
• File system level replication 
• Application level replication
SYNCHRONOUS & ASYNCHRONOUS 
• Synchronous replication - an operation is 
not complete until it has been replicated to 
partner sites 
• Asynchronous replication - an operation can 
be considered complete before it has been 
replicated to partners.
SYNCHRONOUS & ASYNCHRONOUS 
• Synchronous replication - an operation is 
not complete until it has been replicated to 
partner sites 
• Asynchronous replication - an operation can 
be considered complete before it has been 
replicated to partners.

More Related Content

PDF
Using galera replication to create geo distributed clusters on the wan
PDF
CloudStack - LinuxFest NorthWest
PPTX
Introduction to mesos
PDF
Mastering OpenStack - Episode 10 - Storage Decisions
PDF
RedHat Cluster!
PPTX
Cluster
PPTX
Cluster computings
PPTX
Peformance Evaluation of Container-based Vi
Using galera replication to create geo distributed clusters on the wan
CloudStack - LinuxFest NorthWest
Introduction to mesos
Mastering OpenStack - Episode 10 - Storage Decisions
RedHat Cluster!
Cluster
Cluster computings
Peformance Evaluation of Container-based Vi

What's hot (20)

PPTX
Containerization with Microsoft Azure
PPT
Building large scale, job processing systems with Scala Akka Actor framework
PPTX
Containerization in microsoft azure
PPTX
Load balancing In cloud - In a semi distributed system
PDF
Linked In Stream Processing Meetup - Apache Pulsar
PPTX
Scalable On-Demand Hadoop Clusters with Docker and Mesos
PPTX
Hadoop on Dockers
PPTX
Docker, Mesos, Spark
PPTX
Cassandra presentation
PDF
Linux Cluster Concepts
PPTX
PEARC17: Improving Uintah's Scalability Through the Use of Portable Kokkos-Ba...
PPTX
Cloud stack overview
PPTX
Getting Started with Apache CloudStack
PPT
Cluster Computing Seminar.
PPTX
Apache CloudStack: API to UI (STLLUG)
PPT
Ceph Performance and Optimization - Ceph Day Frankfurt
PDF
Kafka - Messaging System
PPTX
DC/OS: The definitive platform for modern apps
PPTX
Scope of parallelism
PDF
CloudStack Architecture and Refactor
Containerization with Microsoft Azure
Building large scale, job processing systems with Scala Akka Actor framework
Containerization in microsoft azure
Load balancing In cloud - In a semi distributed system
Linked In Stream Processing Meetup - Apache Pulsar
Scalable On-Demand Hadoop Clusters with Docker and Mesos
Hadoop on Dockers
Docker, Mesos, Spark
Cassandra presentation
Linux Cluster Concepts
PEARC17: Improving Uintah's Scalability Through the Use of Portable Kokkos-Ba...
Cloud stack overview
Getting Started with Apache CloudStack
Cluster Computing Seminar.
Apache CloudStack: API to UI (STLLUG)
Ceph Performance and Optimization - Ceph Day Frankfurt
Kafka - Messaging System
DC/OS: The definitive platform for modern apps
Scope of parallelism
CloudStack Architecture and Refactor
Ad

Viewers also liked (7)

PPT
Cluster computing2
PDF
The Smallest Cluster in the World
PPTX
cluster compuing
PPTX
Cluster cmputing
PPT
Cluster Computing
PPT
Cluster Computing
PPTX
Cluster computing pptl (2)
Cluster computing2
The Smallest Cluster in the World
cluster compuing
Cluster cmputing
Cluster Computing
Cluster Computing
Cluster computing pptl (2)
Ad

Similar to Clustering - Eric Vanderburg (20)

PDF
Cluster Computing
PPTX
Cluster computing
PPTX
Cluster computing
PPT
59137949-Cluster-Computing (1).ppt .....
PPTX
cluster computing
PDF
Cluster computing report
PPTX
Cluster Computing
PPTX
Cluster computing ppt
PPTX
Cluster computing
PPTX
9-clustering-.pptx
PPTX
Cluster Computing
PPTX
Cluster computing
PPSX
Win2k8 cluster kaliyan
PPTX
PPT
Cluster Computers
PPTX
Clusters
PPTX
Clustering
PDF
20230511 - PGConf Nepal - Clustering in PostgreSQL_ Because one database serv...
PPTX
Clustercomputingpptl2 120204125126-phpapp01
PPTX
Cluster computing
Cluster Computing
Cluster computing
Cluster computing
59137949-Cluster-Computing (1).ppt .....
cluster computing
Cluster computing report
Cluster Computing
Cluster computing ppt
Cluster computing
9-clustering-.pptx
Cluster Computing
Cluster computing
Win2k8 cluster kaliyan
Cluster Computers
Clusters
Clustering
20230511 - PGConf Nepal - Clustering in PostgreSQL_ Because one database serv...
Clustercomputingpptl2 120204125126-phpapp01
Cluster computing

More from Eric Vanderburg (20)

PPTX
GDPR, Data Privacy and Cybersecurity - MIT Symposium
PPTX
Modern Security the way Equifax Should Have
PPTX
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PPTX
Mobile Forensics and Cybersecurity
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
PPTX
Ransomware: 2016's Greatest Malware Threat
PPT
Emerging Technologies: Japan’s Position
PPT
Principles of technology management
PPT
Japanese railway technology
PPT
Evaluating japanese technological competitiveness
PPT
Japanese current and future technology management challenges
PPT
Technology management in Japan: Robotics
PPT
Incident response table top exercises
PPTX
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
PPTX
Cloud Storage and Security: Solving Compliance Challenges
PPTX
Hacktivism: Motivations, Tactics and Threats
PPTX
Correct the most common web development security mistakes - Eric Vanderburg
PPTX
Deconstructing website attacks - Eric Vanderburg
PPTX
Countering malware threats - Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Ransomware: 2016's Greatest Malware Threat
Emerging Technologies: Japan’s Position
Principles of technology management
Japanese railway technology
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Incident response table top exercises
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Cloud Storage and Security: Solving Compliance Challenges
Hacktivism: Motivations, Tactics and Threats
Correct the most common web development security mistakes - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Countering malware threats - Eric Vanderburg

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Spectroscopy.pptx food analysis technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation_ Review paper, used for researhc scholars
Programs and apps: productivity, graphics, security and other tools
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Building Integrated photovoltaic BIPV_UPV.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
MIND Revenue Release Quarter 2 2025 Press Release
Understanding_Digital_Forensics_Presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Empathic Computing: Creating Shared Understanding
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf

Clustering - Eric Vanderburg

  • 2. CLUSTERING • Combining computers to create one logical computer • Provides increased redundancy
  • 3. TERMS • Node (cluster host) - A computer that is a member of a server cluster. • Resource - entity that can be managed by a cluster and moved between nodes. • Resource Group - A collection of resources that can be started or stopped. • Failover - the process of taking resources offline on one node and moving them to another. • Failback - returning resources back to their original node once it has recovered. • Quorum - the disk that holds the configuration data and all the changes that have been made to the cluster database. • HBA (Host Bus Adapter) - interface card that connects a cluster node to a SAN. • Split brain - some nodes in the cluster lose contact with the quorum and one another so each thinks that they are the only one in the cluster. This eventually leads to data corruption.
  • 4. INSTANCES • Single Instance application - One application is running on the server at a time • Multiple instance application - multiple instances of the same code or different pieces of code running for the same service are running on a cluster. • Cloned applications - uses a relatively static dataset. • Partitioned application - dataset is frequently updated so the dataset is divided among partitions.
  • 5. STORAGE • Clusters use SANs for storage • Cluster network should be connected directly to the SAN and the network between them should be isolated from the rest of the network. • Parallel SCSI • Fiber Channel • If there are more than 2 nodes,m FC-SW (Switched Fiber Channel Fabric) must be used.
  • 6. ACCESS TO THE SAN • Zoning - creates views called clouds that control access and control traffic flow between the SAN. • LUN masking - access control is provided at the controller and port level. Policies are defined for specific devices. Provides more granular security than zoning.
  • 7. CLUSTER MODELS • Local Quorum cluster - used for testing and has only one node. • Single Quorum device cluster - cluster configuration data is stored on a single device connected to all nodes in the cluster. At least one node must be functional for the cluster as a whole to function. • Majority node set cluster - each node contains its own copy of the cluster configuration data. A majority of the nodes in the cluster must function for the cluster as a while to function.
  • 8. MULTISITE CLUSTER REPLICATION • Block level replication - storage devices are mirrored over a private network between sites. • File system level replication • Application level replication
  • 9. SYNCHRONOUS & ASYNCHRONOUS • Synchronous replication - an operation is not complete until it has been replicated to partner sites • Asynchronous replication - an operation can be considered complete before it has been replicated to partners.
  • 10. SYNCHRONOUS & ASYNCHRONOUS • Synchronous replication - an operation is not complete until it has been replicated to partner sites • Asynchronous replication - an operation can be considered complete before it has been replicated to partners.