mirror of
git://git.proxmox.com/git/pve-docs.git
synced 2025-01-10 01:17:51 +03:00
38ae8db3a1
The "Remove Cluster configuration" section is outdated and has also missing steps (e.g. stopping corosync before removing its config) We have the information in the pvecm.adoc (Cluster Manager) so delete the howto and reference the one from pvecm instead. Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
184 lines
5.8 KiB
Plaintext
184 lines
5.8 KiB
Plaintext
ifdef::manvolnum[]
|
|
pmxcfs(8)
|
|
=========
|
|
include::attributes.txt[]
|
|
:pve-toplevel:
|
|
|
|
NAME
|
|
----
|
|
|
|
pmxcfs - Proxmox Cluster File System
|
|
|
|
SYNOPSIS
|
|
--------
|
|
|
|
include::pmxcfs.8-synopsis.adoc[]
|
|
|
|
DESCRIPTION
|
|
-----------
|
|
endif::manvolnum[]
|
|
|
|
ifndef::manvolnum[]
|
|
Proxmox Cluster File System (pmxcfs)
|
|
====================================
|
|
include::attributes.txt[]
|
|
:pve-toplevel:
|
|
endif::manvolnum[]
|
|
|
|
The Proxmox Cluster file system (``pmxcfs'') is a database-driven file
|
|
system for storing configuration files, replicated in real time to all
|
|
cluster nodes using `corosync`. We use this to store all PVE related
|
|
configuration files.
|
|
|
|
Although the file system stores all data inside a persistent database
|
|
on disk, a copy of the data resides in RAM. That imposes restriction
|
|
on the maximum size, which is currently 30MB. This is still enough to
|
|
store the configuration of several thousand virtual machines.
|
|
|
|
This system provides the following advantages:
|
|
|
|
* seamless replication of all configuration to all nodes in real time
|
|
* provides strong consistency checks to avoid duplicate VM IDs
|
|
* read-only when a node loses quorum
|
|
* automatic updates of the corosync cluster configuration to all nodes
|
|
* includes a distributed locking mechanism
|
|
|
|
|
|
POSIX Compatibility
|
|
-------------------
|
|
|
|
The file system is based on FUSE, so the behavior is POSIX like. But
|
|
some feature are simply not implemented, because we do not need them:
|
|
|
|
* you can just generate normal files and directories, but no symbolic
|
|
links, ...
|
|
|
|
* you can't rename non-empty directories (because this makes it easier
|
|
to guarantee that VMIDs are unique).
|
|
|
|
* you can't change file permissions (permissions are based on path)
|
|
|
|
* `O_EXCL` creates were not atomic (like old NFS)
|
|
|
|
* `O_TRUNC` creates are not atomic (FUSE restriction)
|
|
|
|
|
|
File Access Rights
|
|
------------------
|
|
|
|
All files and directories are owned by user `root` and have group
|
|
`www-data`. Only root has write permissions, but group `www-data` can
|
|
read most files. Files below the following paths:
|
|
|
|
/etc/pve/priv/
|
|
/etc/pve/nodes/${NAME}/priv/
|
|
|
|
are only accessible by root.
|
|
|
|
|
|
Technology
|
|
----------
|
|
|
|
We use the http://www.corosync.org[Corosync Cluster Engine] for
|
|
cluster communication, and http://www.sqlite.org[SQlite] for the
|
|
database file. The file system is implemented in user space using
|
|
http://fuse.sourceforge.net[FUSE].
|
|
|
|
File System Layout
|
|
------------------
|
|
|
|
The file system is mounted at:
|
|
|
|
/etc/pve
|
|
|
|
Files
|
|
~~~~~
|
|
|
|
[width="100%",cols="m,d"]
|
|
|=======
|
|
|`corosync.conf` | Corosync cluster configuration file (previous to {pve} 4.x this file was called cluster.conf)
|
|
|`storage.cfg` | {pve} storage configuration
|
|
|`datacenter.cfg` | {pve} datacenter wide configuration (keyboard layout, proxy, ...)
|
|
|`user.cfg` | {pve} access control configuration (users/groups/...)
|
|
|`domains.cfg` | {pve} authentication domains
|
|
|`authkey.pub` | Public key used by ticket system
|
|
|`pve-root-ca.pem` | Public certificate of cluster CA
|
|
|`priv/shadow.cfg` | Shadow password file
|
|
|`priv/authkey.key` | Private key used by ticket system
|
|
|`priv/pve-root-ca.key` | Private key of cluster CA
|
|
|`nodes/<NAME>/pve-ssl.pem` | Public SSL certificate for web server (signed by cluster CA)
|
|
|`nodes/<NAME>/pve-ssl.key` | Private SSL key for `pve-ssl.pem`
|
|
|`nodes/<NAME>/pveproxy-ssl.pem` | Public SSL certificate (chain) for web server (optional override for `pve-ssl.pem`)
|
|
|`nodes/<NAME>/pveproxy-ssl.key` | Private SSL key for `pveproxy-ssl.pem` (optional)
|
|
|`nodes/<NAME>/qemu-server/<VMID>.conf` | VM configuration data for KVM VMs
|
|
|`nodes/<NAME>/lxc/<VMID>.conf` | VM configuration data for LXC containers
|
|
|`firewall/cluster.fw` | Firewall configuration applied to all nodes
|
|
|`firewall/<NAME>.fw` | Firewall configuration for individual nodes
|
|
|`firewall/<VMID>.fw` | Firewall configuration for VMs and Containers
|
|
|=======
|
|
|
|
|
|
Symbolic links
|
|
~~~~~~~~~~~~~~
|
|
|
|
[width="100%",cols="m,m"]
|
|
|=======
|
|
|`local` | `nodes/<LOCAL_HOST_NAME>`
|
|
|`qemu-server` | `nodes/<LOCAL_HOST_NAME>/qemu-server/`
|
|
|`lxc` | `nodes/<LOCAL_HOST_NAME>/lxc/`
|
|
|=======
|
|
|
|
|
|
Special status files for debugging (JSON)
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
[width="100%",cols="m,d"]
|
|
|=======
|
|
|`.version` |File versions (to detect file modifications)
|
|
|`.members` |Info about cluster members
|
|
|`.vmlist` |List of all VMs
|
|
|`.clusterlog` |Cluster log (last 50 entries)
|
|
|`.rrd` |RRD data (most recent entries)
|
|
|=======
|
|
|
|
|
|
Enable/Disable debugging
|
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
You can enable verbose syslog messages with:
|
|
|
|
echo "1" >/etc/pve/.debug
|
|
|
|
And disable verbose syslog messages with:
|
|
|
|
echo "0" >/etc/pve/.debug
|
|
|
|
|
|
Recovery
|
|
--------
|
|
|
|
If you have major problems with your Proxmox VE host, e.g. hardware
|
|
issues, it could be helpful to just copy the pmxcfs database file
|
|
`/var/lib/pve-cluster/config.db` and move it to a new Proxmox VE
|
|
host. On the new host (with nothing running), you need to stop the
|
|
`pve-cluster` service and replace the `config.db` file (needed permissions
|
|
`0600`). Second, adapt `/etc/hostname` and `/etc/hosts` according to the
|
|
lost Proxmox VE host, then reboot and check. (And don't forget your
|
|
VM/CT data)
|
|
|
|
|
|
Remove Cluster configuration
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
The recommended way is to reinstall the node after you removed it from
|
|
your cluster. This makes sure that all secret cluster/ssh keys and any
|
|
shared configuration data is destroyed.
|
|
|
|
In some cases, you might prefer to put a node back to local mode without
|
|
reinstall, which is described in
|
|
<<pvecm_separate_node_without_reinstall,Separate A Node Without Reinstalling>>
|
|
|
|
ifdef::manvolnum[]
|
|
include::pve-copyright.adoc[]
|
|
endif::manvolnum[]
|