Managing HP Serviceguard A.11.20.00 for Linux, June 2012
Restarting Networking.................................................................................................127
Viewing the Configuration............................................................................................127
Implementing Channel Bonding (SUSE)...............................................................................128
Restarting Networking.................................................................................................129
Setting up a Lock LUN......................................................................................................129
Setting Up and Running the Quorum Server........................................................................130
Creating the Logical Volume Infrastructure ..........................................................................130
Displaying Disk Information..........................................................................................131
Creating Partitions.......................................................................................................132
Enabling Volume Group Activation Protection..................................................................133
Building Volume Groups: Example for Smart Array Cluster Storage (MSA 2000 Series)........134
Building Volume Groups and Logical Volumes.................................................................135
Distributing the Shared Configuration to all Nodes..........................................................135
Testing the Shared Configuration...................................................................................136
Storing Volume Group Configuration Data .....................................................................137
Preventing Boot-Time vgscan and Ensuring Serviceguard Volume Groups Are
Deactivated...........................................................................................................137
Setting up Disk Monitoring...........................................................................................138
Configuring the Cluster..........................................................................................................138
cmquerycl Options...........................................................................................................139
Speeding up the Process..............................................................................................139
Specifying the Address Family for the Cluster Hostnames..................................................139
Specifying the Address Family for the Heartbeat .............................................................139
Specifying the Cluster Lock...........................................................................................140
Full Network Probing...................................................................................................140
Specifying a Lock LUN......................................................................................................140
Specifying a Quorum Server.............................................................................................140
Obtaining Cross-Subnet Information...................................................................................141
Identifying Heartbeat Subnets............................................................................................142
Specifying Maximum Number of Configured Packages ........................................................142
Modifying the MEMBER_TIMEOUT Parameter......................................................................143
Controlling Access to the Cluster........................................................................................143
A Note about Terminology...........................................................................................143
How Access Roles Work..............................................................................................143
Levels of Access..........................................................................................................144
Setting up Access-Control Policies..................................................................................145
Role Conflicts.........................................................................................................147
Package versus Cluster Roles.........................................................................................147
Verifying the Cluster Configuration ....................................................................................148
Cluster Lock Configuration Messages..................................................................................148
Distributing the Binary Configuration File ...........................................................................149
Managing the Running Cluster...............................................................................................149
Checking Cluster Operation with Serviceguard Commands...................................................149
Setting up Autostart Features ............................................................................................150
Changing the System Message .........................................................................................151
Managing a Single-Node Cluster......................................................................................151
Single-Node Operation...............................................................................................151
Disabling identd..............................................................................................................151
Deleting the Cluster Configuration .....................................................................................152
6 Configuring Packages and Their Services ..................................................153
Choosing Package Modules...................................................................................................153
Types of Package: Failover, Multi-Node, System Multi-Node...................................................154
Differences between Failover and Multi-Node Packages........................................................154
Package Modules and Parameters......................................................................................155
Contents 7