What is I/O fencing and how does it work?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
I/O fencing is used in cluster environments to make sure that two or more nodes do not access a file system simultaneously. I/O fencing is important to prevent corruption on shared storage in a cluster. It is called I/O fencing because we can compare it to putting a fence between the node that wants to access the storage device and the storage device itself. There are two common methods to prevent this access.STONITH (shoot the other node in the head) is a technique that automatically powers down a node that is not working correctly to prevent access to a shared resource. This may seem like a rough method to shut down computers, but it is better to shut down a cluster node than to spend hours recovering a corrupted file system because multiple nodes were trying to access it simultaneously. The other method, called data-based fencing, works by maintaining a list of nodes that should be allowed to access a shared device. If a node is not on the list, it will not be allowed to access the device. I/O fencing is needed in any situation where high availability is offered and where multiple hosts could potentially write to the same file system simultaneously.
Dig Deeper on Virtualized clusters and high-performance computing
Related Q&A from Sander Van Vugt
I want to write a shell script that contains commands for Linux partition creation. Can I automate everything so the user only inputs the partition ...continue reading
Malware on a Linux server? It can happen, but with a few tools you can monitor for, prevent and fix rootkit attacks.continue reading
When running several Linux virtual machines on VMware ESXi, is there a way to move from one to the next with a hotkey?continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.