In the face of the current DDoS and hacker data, the cluster system will greatly improve the security of the server. In the process of invading the virtual host, we often have some incredible things happen, as clearly written to the server, but in the web is not found. Our high-performance virtual host is actually not a server, but a cluster. The interconnection of the host in the cluster is not as simple as the LAN, and they achieve data synchronization, memory synchronization, etc. through the cluster technology Cluster and the cluster software. 1. Basic concept of clusters CLUSTER cluster technology can be defined as follows: a set of independent servers appear as a single system in the network and managed in a single system mode. This single system provides a high reliability service for the customer workstation. In most modes, all computers in the cluster have a common name, and services running on any system in the cluster can be used by all network customers. Cluster must be able to coordinate errors and failures of each separated component and can be transparent to add components to the Cluster. A Cluster contains multiple (at least two) servers with shared data storage space. When any server runs an app, the application data is stored in the shared data space. The operating system and application files for each server are stored on their respective local storage spaces. Interior Node Server communicates with each other in an internal local area network. When a node server fails, the running application on this server will be automatically taken over another node server. When an application service fails, the application service will be restarted or take over another server. When any of the above failures occurs, the customer will be able to connect to the new application service very quickly. 2, two common modes of the cluster: Mirror Server Duplexer System is the simplest and lowest price of hardware configuration, usually the hardware configuration of the mirror service requires two servers, at each The server has a stand-alone operating system hard disk and data storage hard drive, each server has a network card connected to the client, and a two-pair of mirror cards or NIC completed the mirror function. The mirror server has a simple configuration, convenient use, and low price, but because the mirror server needs to use the network mode image data, the data synchronization is realized by the mirroring software, so it is necessary to occupy the CPU and memory resources of the network server, the performance of the mirror server is longer than single The server has a low performance. Some mirror server cluster systems use memory mirroring technology, the advantage of this technology is that all applications and network operating systems are synchronized on both servers. When the host fails, the backup machine can take over in the case of almost no feeling. All applications. Because the memory of the two servers is exactly the same, when the system application has defects, the two servers will be simultaneously downtime. This is also a memory mirror card or network card implementation data synchronization. Two servers in the big data amount read and write will generate data asynchronous in some states, so the mirror server is suitable for those who have less budget and is not high for cluster systems. . Hardware configuration example: • Network server two • Server operating system hard disk two pieces • Server data storage hard drive users need to determine • Server mirror cards (some software can use standard network card) two pieces • Network service network card two second types Compared with the disk array cabinet with the mirror server dual-machine system, the interconnection of the two-machine and disk array cabinet has more disabled array cabinets produced by third parties. At present, many companies such as Hairi, Exceptions have produced disk arrays. The cabinet is installed in the disk array cabinet, and the array cabinet can directly configure the hard disk in the cabinet to be logical. Disk array cabinets are connected to the server with a normal SCSI card on the server via the SCSI cable, and the system administrator needs to configure disk arrays directly on disk cabinets.
Double-machine and disk array cabinet interconnection structure does not adopt a memory mirror technology, there is a need to have a certain switching time (usually 60-180 seconds), which can have all downtimes for the system due to the application itself, Since all data is stored in the middle disk array cabinet, when the workmaker fails, the backup machine is replaced, and the data is read from the disk array, so it does not generate the problem of data disagreement, because of this The solution does not require a network image synchronization, so the performance of this cluster program server is much higher than the mirror server structure. The disadvantage of the interconnection of the dual-machine and disk array cabinet is that there is a single-point fault defect in the system, and the so-called single-point fault is that all systems are all downtime when a component or an application fails in the system. In this system, the disk array cabinet will result in single point fault. When the disk array cabinet is logical or physical failure, all stored data will be all lost, so when you choose this, you need to choose a quality and after-sales. Good service products. Hardware configuration example: • Network server two • Server operating system hard drive two • Third-party disk array cabinets • Disk cabinets for special SCSI wires • Disk array cabinets Data storage hard disk user demand determination • Network service network card In addition, some manufacturers have better technology solutions, such as HP dual-control dual-control fault tolerant system, HP Fiber Channel dual-control cluster system. 3, the cluster software configuration Based on the NT platform cluster software Microsoft's MSCs, there are also many third-party professional software companies developed cluster software, such as Haishi DataWare, Vinca's Standby Server, NSI Double-Take. MS WolfPack is the other name of MS Cluster Server, which is a dual-machine software developed by Microsoft to develop developments in Cluster technology. It is integrated on NT Server, supports two-machine system consisting of two machines, providing a highly available and manageable application environment. Key Features: • Auto Detection and Repairing Errors for Server or Applications • Switching for applications in servers • Connect various clients through TCP / IP, such as MS-DOS, Windows 3.x / 9x / NT, Apple Macintosh, UNIX, etc. • Production hosts can automatically recover data and take over tasks without manual interference • Easy management: • Automatic audit server and application work status • High availability applications, file sharing, print request, etc. • Flexible settings of the application and data recovery policy • Simple operations can be offline, restroom, re-line, and the migration between servers. Currently, Windows 2000 Advanced Server and Windows 2000 DataCenter Server are integrated with more advanced cluster technology. There are also many cluster software on other network operating system platforms, such as the cluster software based on the Novell platform, Novell HA Server, Novell SFT III based on the SCO UNIX platform's cluster software with SENTINEL cluster software based on Linux platform, cluster software, TurboCluster 4, cluster Technical Development Trend Cluster Technology With the development of server hardware systems and network operating systems, it will gradually increase in availability, high reliability, system redundancy. Future clusters can rely on cluster file systems to implement global access to all files, devices, and network resources in the system, and generate a complete system image. In this way, the cluster file system allows any user (remote or local) to access this software on any user (remote or local) on which server is in the cluster. Any application can access any files in this cluster. Even if the application is transferred from a node to another, the application can access the file on the system.