A. The overall capacity of all components in the cluster doesn't have to be larger than the resources needed in a regular setup.
B. Failover clusters can be used to scale a single service beyond the capacity of a single cluster node.
C. In case of the failure of any component, enough resources must remain to provide all cluster services.
D. The number of nodes in a cluster has no effect on the availability as long as the sum of the available computing resources is equal.
E. In regular cluster operation, not all resources are used.
A. By creating new volumes
B. By adding bricks to existing volumes
C. By creating new trusted storage pools
D. By increasing the number of peers in the cluster
A. To handle concurrent access to shared files in a cluster.
B. To synchronize data replication across multiple nodes.
C. To manage file permissions and access control.
D. To provide high availability and fault tolerance.
A. More than one node is active in a load balanced cluster.
B. A cluster node has successfully been fenced.
C. The communication between the cluster nodes is interrupted.
D. Cluster services are moved between cluster nodes.
E. The load balancer of a load balanced cluster fails.
A. A block-level replication system
B. A network storage protocol
C. A file-based replication system
D. A distributed file system
A. To create a backup copy of a logical volume.
B. To capture the current state of a logical volume for later reference.
C. To increase the size of a logical volume dynamically.
D. To allocate a portion of a physical volume for future use.
A. By restarting the GlusterFS services on each peer.
B. By running a cluster-wide file system check.
C. By synchronizing the trusted storage pools.
D. By rebalancing the data across the storage nodes.
A. A utility for managing DRBD devices
B. A distributed file system integrated with DRBD
C. A configuration file used by DRBD
D. A tool for managing and configuring storage resources in a cluster
A. It monitors the system's CPU usage.
B. It triggers disk checks at regular intervals.
C. It monitors the S.M.A.R.T values of storage devices.
D. It monitors the system's memory usage.
A. It segments the cluster nodes into several logical groups that are always fenced together.
B. It makes logical volumes on shared storage available to all cluster nodes.
C. It balances incoming TCP connections to a logical service to several backend nodes.
D. It allows several nodes to share file system locks in order to access the same files simultaneously.