Managing Serviceguard Eighteenth Edition, September 2010
Using Easy Deployment Commands to Configure the Cluster.............................211
Configuring Root-Level Access...................................................................................216
Allowing Root Access to an Unconfigured Node..................................................216
Ensuring that the Root User on Another Node Is Recognized..............................217
About identd.....................................................................................................218
Configuring Name Resolution....................................................................................218
Safeguarding against Loss of Name Resolution Services......................................220
Ensuring Consistency of Kernel Configuration .........................................................222
Enabling the Network Time Protocol .........................................................................222
Tuning Network and Kernel Parameters....................................................................223
Creating Mirrors of Root Logical Volumes.................................................................224
Choosing Cluster Lock Disks......................................................................................225
Backing Up Cluster Lock Disk Information ..........................................................226
Setting Up a Lock LUN...............................................................................................226
Creating a Disk Partition on an HP Integrity System............................................227
Defining the Lock LUN..........................................................................................228
Excluding Devices from Probing.................................................................................229
Setting Up and Running the Quorum Server..............................................................230
Creating the Storage Infrastructure and Filesystems with LVM, VxVM and CVM....230
Creating a Storage Infrastructure with LVM...............................................................231
Using the EMS Disk Monitor.................................................................................232
Using Mirrored Individual Data Disks..................................................................232
Creating Volume Groups..................................................................................232
Creating Logical Volumes......................................................................................234
Setting Logical Volume Timeouts.....................................................................234
Creating File Systems.............................................................................................235
Distributing Volume Groups to Other Nodes........................................................235
Deactivating the Volume Group.......................................................................236
Distributing the Volume Group........................................................................236
Making Physical Volume Group Files Consistent.................................................238
Creating Additional Volume Groups.....................................................................238
Creating a Storage Infrastructure with VxVM............................................................239
Converting Disks from LVM to VxVM..................................................................239
Initializing Disks for VxVM...................................................................................239
Initializing Disks Previously Used by LVM...........................................................239
Creating Disk Groups............................................................................................240
Creating Volumes...................................................................................................241
Creating File Systems.............................................................................................241
Deporting Disk Groups..........................................................................................241
Re-Importing Disk Groups....................................................................................242
Clearimport at System Reboot Time......................................................................242
Configuring the Cluster ...................................................................................................242
cmquerycl Options......................................................................................................243
Speeding up the Process........................................................................................243
Table of Contents 9