Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "MAN06 Failover for MySQL grid based services"

From EGIWiki
Jump to navigation Jump to search
Line 70: Line 70:
</center>
</center>


== MASTER setup ==
== Setup the MySQL MASTER for replication ==


* '''Step 1''': Install stunnel. It is available in the SL5 repositories.
* '''Step 1''': Install stunnel. It is available in the SL5 repositories.

Revision as of 17:11, 15 June 2011

Template:VOServicesMainMenu


Introduction

  • Several critical grid services such as the Logical File Catalogue (LFC) or the VO Management Service (VOMS) server represent single points of failure in a grid infrastructure. When unavailable, a user can no longer access to the infrastructure since it is prevented from issuing new proxies, or is no longer able to access to the physical location of his data.
  • However, those services rely on MySQL backends which opens a window to replicate the relevant databases to different / backup services which could be used when the primary instances are unavailable. The MySQL DB replication process is one of the ways to get scability and higher availability.


Arquitecture

In this document we propose to follow a Master-Slave arquitecture for the MySQL replication, consisting in keeping DB copies of a main host (MASTER) in a secondary host (SLAVE). The slave host will only have read access to the Database entries.


Security

  • For better availability, it is preferable to deploy the Master and the Slave services in different geographical locations, which normally means exposing the generated traffic to the internet. In that case, you will have to find a mechanims to encrypt the communication between the two hosts.
  • In this document, we propose to use Stunnel:
  1. Stunnel is a free multi-platform computer program, used to provide universal TLS/SSL tunneling service.
  2. Stunnel can be used to provide secure encrypted connections for clients or servers that do not speak TLS or SSL natively. It runs on a variety of operating systems, including most Unix-like operating systems and Windows.
  3. Stunnel relies on a separate library such as OpenSSL or SSLeay to implement the underlying TLS or SSL protocol.
  4. Stunnel uses Public-key cryptography with X.509 digital certificates to secure the SSL connection. Clients can optionally be authenticated via a certificate too
  5. For more references, please check www.stunnel.org
  • There are other possibilities for encryption, like enabling SSL Support directly in MySQL, but these approach was not tested. Details can be obtained here.


MySQL replication

Assumptions

We are assuming that both grid services instances were previously installed and configured (manually or via YAIM) so that they support the same VOs.


Generic information

Description Value
MASTER hostname server1.domain.one
MASTER username root
MASTER mysql superuser root
MASTER mysql replication user db_rep
SLAVE hostname server2.domain.two
SLAVE username root
SLAVE mysql superuser root
DB to replicate DB_1 DB_2 ...

Setup the MySQL MASTER for replication

  • Step 1: Install stunnel. It is available in the SL5 repositories.
$ yum install stunnel
(...)
$ date; rpm -qa | grep stunnel
Wed Jun 15 16:00:23 WEST 2011
stunnel-4.15-2.el5.1
  • Step 2: Configure stunnel (via /etc/stunnel.conf) to:
  1. Accept incoming SSL connections on port 3307, and transparently forward traffic to port 3306
  2. Use the server X509 certificates to encrypt data
# Authentication stuff
verify = 2
CApath = /etc/grid-security/certificates
cert = /etc/grid-security/hostcert.pem
key = /etc/grid-security/hostkey.pem

# Auth fails in chroot because CApath is not accessible
#chroot = /var/run/stunnel
#debug = 7
output = /var/log/stunnel.log
pid = /var/run/stunnel/master.pid

setuid = nobody
setgid = nobody

# Service-level configuration
[mysql]
accept  = 3307
connect = 127.0.0.1:3306




__Step 2__: Start the service 'stunnel' and add it to rc.local

mkdir /var/run/stunnel
chown nobody:nobody /var/run/stunnel
stunnel /etc/stunnel.conf
echo 'stunnel /etc/stunnel.conf' >> /etc/rc.local

__Step 3__: Setup the firewall to allow connections from SLAVE (ex.:server2.lip.pt) on port 3307 TCP

# MySQL replication
-A INPUT -s 200.143.244.108 -m state --state NEW -m tcp -p tcp --dport 3307 -j ACCEPT

__Step 4__: Edit /etc/my.cnf

Setup de ID of the Master (usually 1), setup the binary log for the DB to be replicated.

[mysqld]
server-id=1
# create replication log
log-bin = /path_to_log_file/log_file.index
# but only for this database
binlog-do-db=DB_2
binlog-do-db=DB_1

OBS. Please ensure that the path declared under log-bin has the mysql:mysql ownerships, and that the binary log exists.

__Step 5__: Restart MySQL

/etc/init.d/mysqld restart

__Step 6__: Add a specific Replication User

GRANT REPLICATION SLAVE ON *.* TO 'db_rep'@'127.0.0.1' IDENTIFIED BY '16_char_password';

__Step 7__: Make a backup of the Databases

mysqldump -u root -p --default-character-set=latin1 --master-data=2 --databases DB_1 DB_2 > dump.sql

The option "--master-data=2" writes a comment on dump.sql that show the log file and the ID to be used on the Slave Setup. This option also lock all the tables while they are beeing copied, avoiding problems.

!!!SLAVE Setup

OBS.It must be set the same timezone on master and slave. This prevent problems with the script that runs to verify consistency between servers.

__Step 1__: Setup stunnel. Create /etc/stunnel.conf with the following contents:

# Authentication stuff
verify = 2
CApath = /etc/grid-security/certificates
cert = /etc/grid-security/hostcert.pem
key = /etc/grid-security/hostkey.pem

# Auth fails in chroot because CApath is not accessible
#chroot = /var/run/stunnel
#debug = 7
output = /var/log/stunnel.log
pid = /var/run/stunnel/master.pid

setuid = nobody
setgid = nobody

# Use it for client mode
client = yes

# Service-level configuration
[mysql]
accept  = 127.0.0.1:3307
connect = server1.lip.pt:3307

__Step 2__: Start stunnel and add to rc.local

mkdir /var/run/stunnel
chown nobody:nobody /var/run/stunnel
stunnel /etc/stunnel.conf
[root@voms root]# echo 'stunnel /etc/stunnel.conf' >> /etc/rc.local

__Step 3__: Edit /etc/my.cnf

Setup the ID of SLAVE (ID 2).

\[mysqld\]
server-id=2
replicate-do-db=DB_1
replicate-do-db=DB_2

__Step 4__: Restart MySQL and insert dump.sql created on Master

/etc/init.d/mysql restart
mysql -u root -p < dump.sql

__Step 5__: Start slave

login in mysql of slave

mysql -u root -p

Run the 2 queries above changing the values xxxxx and yyyyy by the values on top of dump.sql file.

CHANGE MASTER TO MASTER_HOST='127.0.0.1', MASTER_PORT=3307,
                MASTER_USER='db_rep', MASTER_PASSWORD='16_char_password',
                MASTER_LOG_FILE='xxxxx', MASTER_LOG_POS=yyyyy;
SLAVE START;


__Step 6__: Check if everything is OK:

On mysql prompt run "show slave status\G", check the replication status.

Slave_IO_State: Waiting for master to send event

If status are diferent check if you can access to port 3307 of MASTER running

telnet server1.lip.pt 3307

If you can't reach it, you should also verify what is wrong on master, for example the firewall. Also you can see mysql errors on /var/lib/mysql


!!!TROUBLESHOOTING ===

* /var/log/stunnel.log
* SHOW MASTER STATUS;
* SHOW PROCESSLIST;
* SHOW SLAVE STATUS;

The LFC example

The VOMS server example

http://dev.mysql.com/doc/refman/5.1/en/replication-options-slave.html#option_mysqld_read-only http://www.howtoforge.com/how-to-set-up-mysql-database-replication-with-ssl-encryption-on-centos-5.4