Managing Serviceguard Eighteenth Edition, September 2010

Specifying the Address Family for the Cluster Hostnames...................................244
Specifying the Address Family for the Heartbeat .................................................244
Specifying the Cluster Lock...................................................................................245
Generating a Network Template File.....................................................................245
Full Network Probing............................................................................................246
Specifying a Lock Disk................................................................................................246
Specifying a Lock LUN................................................................................................247
Specifying a Quorum Server.......................................................................................248
Obtaining Cross-Subnet Information..........................................................................248
Identifying Heartbeat Subnets....................................................................................251
Specifying Maximum Number of Configured Packages ...........................................251
Modifying the MEMBER_TIMEOUT Parameter.........................................................251
Controlling Access to the Cluster................................................................................251
A Note about Terminology....................................................................................252
How Access Roles Work........................................................................................252
Levels of Access......................................................................................................253
Setting up Access-Control Policies.........................................................................254
Role Conflicts....................................................................................................257
Package versus Cluster Roles.................................................................................258
Adding Volume Groups..............................................................................................258
Verifying the Cluster Configuration ...........................................................................258
Distributing the Binary Configuration File ................................................................259
Storing Volume Group and Cluster Lock Configuration Data .............................260
Creating a Storage Infrastructure with Veritas Cluster File System (CFS).................261
Preparing the Cluster and the System Multi-node Package..................................261
Creating the Disk Groups......................................................................................263
Creating the Disk Group Cluster Packages............................................................263
Creating Volumes...................................................................................................264
Creating a File System and Mount Point Package.................................................264
Creating Checkpoint and Snapshot Packages for CFS...........................................265
Mount Point Packages for Storage Checkpoints...............................................265
Mount Point Packages for Snapshot Images.....................................................267
Creating the Storage Infrastructure with Veritas Cluster Volume Manager (CVM)...268
Initializing the Veritas Volume Manager ..............................................................269
Preparing the Cluster for Use with CVM ..............................................................269
Identifying the Master Node..................................................................................270
Initializing Disks for CVM.....................................................................................270
Creating Disk Groups............................................................................................271
Mirror Detachment Policies with CVM............................................................271
Creating Volumes ..................................................................................................271
Adding Disk Groups to the Package Configuration .............................................272
Using DSAU during Configuration............................................................................272
Managing the Running Cluster........................................................................................272
Checking Cluster Operation with Serviceguard Manager..........................................272
10 Table of Contents