Managing HP Serviceguard A.12.00.00 for Linux, June 2014
4.9.10.8.6 Using Load Sensitive Package Placement....................................................126
4.9.10.8.7 Starting Load Sensitive Package Placement.................................................127
4.9.10.9 Examples......................................................................................................127
4.9.11 About External Scripts.............................................................................................135
4.9.11.1 Using Serviceguard Commands in an External Script............................................138
4.9.11.2 Determining Why a Package Has Shut Down......................................................138
4.9.11.2.1 last_halt_failed Flag..................................................................................138
4.9.12 About Cross-Subnet Failover....................................................................................139
4.9.12.1 Implications for Application Deployment.............................................................139
4.9.12.2 Configuring a Package to Fail Over across Subnets: Example...............................139
4.9.12.2.1 Configuring node_name...........................................................................140
4.9.12.2.2 Configuring monitored_subnet_access........................................................140
4.9.12.2.3 Configuring ip_subnet_node.....................................................................140
4.9.13 Configuring a Package: Next Steps..........................................................................140
4.10 Planning for Changes in Cluster Size................................................................................141
5 Building an HA Cluster Configuration........................................................143
5.1 Preparing Your Systems ...................................................................................................143
5.1.1 Installing and Updating Serviceguard .........................................................................143
5.1.2 Understanding the Location of Serviceguard Files.........................................................143
5.1.3 Enabling Serviceguard Command Access....................................................................144
5.1.4 Configuring Root-Level Access....................................................................................144
5.1.4.1 Allowing Root Access to an Unconfigured Node...................................................144
5.1.4.2 Ensuring that the Root User on Another Node Is Recognized..................................145
5.1.4.2.1 About identd.............................................................................................145
5.1.5 Configuring Name Resolution....................................................................................145
5.1.5.1 Safeguarding against Loss of Name Resolution Services.........................................147
5.1.6 Ensuring Consistency of Kernel Configuration ..............................................................148
5.1.7 Enabling the Network Time Protocol ..........................................................................148
5.1.8 Implementing Channel Bonding (Red Hat)...................................................................148
5.1.8.1 Sample Configuration........................................................................................148
5.1.8.2 Restarting Networking.......................................................................................149
5.1.8.3 Viewing the Configuration.................................................................................150
5.1.9 Implementing Channel Bonding (SUSE).......................................................................150
5.1.9.1 Restarting Networking.......................................................................................151
5.1.10 Setting up a Lock LUN.............................................................................................151
5.1.11 Setting Up and Running the Quorum Server................................................................153
5.1.12 Creating the Logical Volume Infrastructure ..................................................................153
5.1.12.1 Displaying Disk Information...............................................................................154
5.1.12.2 Creating Partitions...........................................................................................155
5.1.12.3 Enabling Volume Group Activation Protection......................................................156
5.1.12.4 Building Volume Groups: Example for Smart Array Cluster Storage (MSA 2000
Series).......................................................................................................................157
5.1.12.5 Building Volume Groups and Logical Volumes.....................................................158
5.1.12.6 Testing the Shared Configuration.......................................................................159
5.1.12.7 Storing Volume Group Configuration Data .........................................................160
5.1.12.7.1 Preventing Boot-Time vgscan and Ensuring Serviceguard Volume Groups Are
Deactivated...........................................................................................................160
5.1.12.8 Setting up Disk Monitoring................................................................................161
5.1.13 Creating a Storage Infrastructure with VxVM...............................................................161
5.1.13.1 Converting Disks from LVM to VxVM...................................................................161
5.1.13.2 Initializing Disks for VxVM................................................................................162
5.1.13.3 Initializing Disks Previously Used by LVM............................................................162
5.1.13.4 Creating Disk Groups.......................................................................................162
Contents 7