HP Serviceguard A.11.20- Managing Serviceguard Twentieth Edition, August 2011
Configuring Name Resolution............................................................................................168
Safeguarding against Loss of Name Resolution Services...................................................169
Ensuring Consistency of Kernel Configuration .....................................................................170
Enabling the Network Time Protocol ..................................................................................171
Tuning Network and Kernel Parameters...............................................................................171
Creating Mirrors of Root Logical Volumes............................................................................172
Choosing Cluster Lock Disks..............................................................................................173
Backing Up Cluster Lock Disk Information ......................................................................173
Setting Up a Lock LUN......................................................................................................174
Creating a Disk Partition on an HP Integrity System..........................................................175
Defining the Lock LUN.................................................................................................176
Excluding Devices from Probing.........................................................................................176
Setting Up and Running the Quorum Server........................................................................177
Creating the Storage Infrastructure and file systems with LVM, VxVM and CVM........................177
Creating a Storage Infrastructure with LVM..........................................................................177
Using the Generic Resources Disk Monitor......................................................................178
Using the EMS Disk Monitor.........................................................................................178
Using Mirrored Individual Data Disks.............................................................................179
Creating Volume Groups.........................................................................................179
Creating Logical Volumes.............................................................................................180
Setting Logical Volume Timeouts...............................................................................180
Creating File Systems...................................................................................................180
Distributing Volume Groups to Other Nodes...................................................................181
Deactivating the Volume Group................................................................................181
Distributing the Volume Group..................................................................................181
Making Physical Volume Group Files Consistent..............................................................183
Creating Additional Volume Groups..............................................................................183
Creating a Storage Infrastructure with VxVM.......................................................................183
Converting Disks from LVM to VxVM..............................................................................183
Initializing Disks for VxVM...........................................................................................184
Initializing Disks Previously Used by LVM........................................................................184
Creating Disk Groups..................................................................................................184
Creating Logical Volumes.............................................................................................184
Creating File Systems...................................................................................................185
Deporting Disk Groups................................................................................................185
Re-Importing Disk Groups.............................................................................................185
Clearimport at System Reboot Time................................................................................186
Configuring the Cluster .........................................................................................................186
cmquerycl Options...........................................................................................................187
Speeding up the Process..............................................................................................187
Specifying the Address Family for the Cluster Hostnames..................................................187
Specifying the Address Family for the Heartbeat .............................................................187
Specifying the Cluster Lock...........................................................................................188
Generating a Network Template File..............................................................................188
Full Network Probing...................................................................................................188
Specifying a Lock Disk......................................................................................................188
Specifying a Lock LUN......................................................................................................189
Specifying a Quorum Server.............................................................................................190
Obtaining Cross-Subnet Information...................................................................................190
Identifying Heartbeat Subnets............................................................................................192
Specifying Maximum Number of Configured Packages ........................................................192
Modifying the MEMBER_TIMEOUT Parameter......................................................................192
Controlling Access to the Cluster........................................................................................192
A Note about Terminology...........................................................................................193
How Access Roles Work..............................................................................................193
8 Contents