On 25/07/2025 13:39, Friedrich Weber wrote: > [...] > +Corosync Over Bonds > +~~~~~~~~~~~~~~~~~~~ > + > +Using a xref:sysadmin_network_bond[bond] as the only Corosync link can be > +problematic in certain failure scenarios. If one of the bonded interfaces > fails > +and stops transmitting packets, but its link state stays up, some bond modes > +may cause a state of asymmetric connectivity where cluster nodes can only > +communicate with different subsets of other nodes. In case of asymmetric > +connectivity, Corosync may not be able to form a stable quorum in the > cluster. > +If this state persists and HA is enabled, nodes may fence themselves, even if > +their respective bond is still fully functioning. In the worst case, the > whole > +cluster may fence itself. > + > +For this reason, our recommendations are as follows. > + > +* We recommend a dedicated physical NIC for the primary Corosync link. Bonds > + can be used as additional links for increased redundancy.
These recommendations are still not 100% clear: Are we fine with a setup with - link 0: dedicated corosync link - link 1: corosync link over a bond with a problematic mode (such as balance-rr or LACP with bond-lacp-rate slow) ? In my tests, as long as the dedicated link 0 is completely online, it doesn't matter if a bond runs into the failure scenario above (one of the bonded NICs stops transmitting packets), corosync will just continue using link 0. But as soon as link 0 goes down and the failure scenario happens, the whole-cluster fence may happen. So should our recommendation be the relatively strict "if you put corosync on a bond (even if it is only a redundant link), use only active-backup or LACP+bond-lacp-rate fast"? > + > +* We *advise against* using bond modes *balance-rr*, *balance-xor*, > + *balance-tlb*, or *balance-alb* for Corosync traffic. As explained above, > + they can cause asymmetric connectivity in certain failure scenarios. > + > +* *IEEE 802.3ad (LACP)*: This bond mode can cause asymmetric connectivity in > + certain failure scenarios as explained above, but it can recover from this > + state, as each side can stop using a bonded interface if it has not > received > + three LACPDUs in a row. However, with default settings, LACPDUs are only > sent > + every 30 seconds, yielding a failover time of 90 seconds. This is too long, > + as nodes with HA resources will fence themselves already after roughly one > + minute without a stable quorum. If LACP bonds are used for corosync > traffic, > + we recommend setting `bond-lacp-rate fast` *on the Proxmox VE node and the > + switch*! Setting this option on one side requests the other side to send an > + LACPDU every second. Setting this option on both sides can reduce the > + failover time in the scenario above to 3 seconds and thus prevent fencing. > + > +* Bond mode *active-backup* will not cause asymmetric connectivity in the > + failure scenario described above, but the affected node may lose connection > + to the cluster and, if HA is enabled, fence itself. > + > Separate Cluster Network > ~~~~~~~~~~~~~~~~~~~~~~~~ > _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel