Solved

Installing Gluster and/or CEPHS

Posted on 2016-09-12
3
86 Views
Last Modified: 2016-09-13
I'm an intermediate Linux user. Filesytems are not my strong suit. Now take that to the next level and I'm being tasked with taking 2 Cisco UCS 3260's (2 servers each so 4 servers total) each UCS with 180TB each. So I assume that I will divide the 180 TB in 2 per server. Therefore I will have 4 servers with 90TB each. I will install the OS (Red Hat 6 or 7) on SSD's separate from the 90TB for each server.

I have no idea of order of operation. So I'm looking for a step-by-step (lol) guide to install these servers and tie them all into a GlusterFS.  I do have licensing for Red Hat Gluster, but to say I'm intimidated is an understatement. My last assumption is once I complete the install I have to present a part of this filesystem via NFS ???  I will need this for both Block and File storage.
0
Comment
Question by:jumper14k
  • 2
3 Comments
 
LVL 38

Accepted Solution

by:
Gerwin Jansen, EE MVE earned 500 total points
ID: 41794579
I maybe missing something but if you have the license, you must have surely got a reference to yhr the installation guide from Red Hat :

https://access.redhat.com/documentation/en-US/Red_Hat_Storage/3.1/html/Installation_Guide/chap-Installing_Red_Hat_Storage-Installing_using_ISO.html#idp728528

On the side - Gluster FS is not that widely used so finding a step-by-step guide maybe a challenge.
0
 

Author Comment

by:jumper14k
ID: 41794771
So are you proficient with this technology? Is this better than say CEPHS.  My application is for the use of redundancy , high availability. this large of storage is probably not going to be backed up so the idea the data is sync'd across 4 servers has been suggested as a viable solution.  What say you.
0
 
LVL 38

Expert Comment

by:Gerwin Jansen, EE MVE
ID: 41795106
I'm not familiar with Gluster FS nor CEPHS - let's wait for other experts to reply.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Little introduction about CP: CP is a command on linux that use to copy files and folder from one location to another location. Example usage of CP as follow: cp /myfoder /pathto/destination/folder/ cp abc.tar.gz /pathto/destination/folder/ab…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question