Fence method in cluster system and apparatus thereof
A cluster system and cluster technology, applied in the cluster field, can solve problems such as data inconsistency and system crashes, achieve the effects of improving performance and stability, ensuring security and consistency, and reducing operation and maintenance costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] In order to make the objectives, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be described in detail below with reference to the accompanying drawings and embodiments.
[0018] see figure 1 , figure 1 It is a flowchart of an isolation method in a cluster system according to an embodiment of the present invention, including the following steps:
[0019] Step 101: Receive a fence operation command sent by the cluster master management node; the fence operation command carries target physical host node information and target application program information;
[0020] Here, the cluster master management node is voted and elected by all physical host nodes in the cluster, and is called a DC (Designated Coordinator), which is the management center node of the cluster. The target physical host node information may be the name of the target physical host, and the target application information may be...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 