Managing Serviceguard A.11.20, March 2013
Removing a Node from a cDSF Group...........................................................................166
Displaying the cDSF Configuration................................................................................166
Migrating Existing LVM Cluster Storage to cDSFs.............................................................166
Using Easy Deployment....................................................................................................166
Before You Start..........................................................................................................166
Using Easy Deployment Commands to Configure the Cluster.............................................167
Configuring Root-Level Access............................................................................................171
Allowing Root Access to an Unconfigured Node.............................................................171
Ensuring that the Root User on Another Node Is Recognized.............................................172
About identd..........................................................................................................172
Configuring Name Resolution............................................................................................173
Safeguarding against Loss of Name Resolution Services...................................................174
Ensuring Consistency of Kernel Configuration .....................................................................175
Enabling the Network Time Protocol ..................................................................................175
Tuning Network and Kernel Parameters...............................................................................176
Creating Mirrors of Root Logical Volumes............................................................................177
Choosing Cluster Lock Disks..............................................................................................178
Backing Up Cluster Lock Disk Information ......................................................................178
Setting Up a Lock LUN......................................................................................................178
Creating a Disk Partition on an HP Integrity System..........................................................179
Defining the Lock LUN.................................................................................................180
Excluding Devices from Probing.........................................................................................180
Setting Up and Running the Quorum Server........................................................................181
Creating the Storage Infrastructure and file systems with LVM, VxVM and CVM........................181
Creating a Storage Infrastructure with LVM..........................................................................181
Using the Generic Resources Disk Monitor......................................................................182
Using the EMS Disk Monitor.........................................................................................183
Using Mirrored Individual Data Disks.............................................................................183
Creating Volume Groups.........................................................................................183
Creating Logical Volumes.............................................................................................184
Setting Logical Volume Timeouts...............................................................................184
Creating File Systems...................................................................................................185
Distributing Volume Groups to Other Nodes...................................................................185
Deactivating the Volume Group................................................................................185
Distributing the Volume Group..................................................................................186
Making Physical Volume Group Files Consistent..............................................................187
Creating Additional Volume Groups..............................................................................187
Creating a Storage Infrastructure with VxVM.......................................................................188
Converting Disks from LVM to VxVM..............................................................................188
Initializing Disks for VxVM...........................................................................................188
Initializing Disks Previously Used by LVM........................................................................188
Creating Disk Groups..................................................................................................189
Creating Logical Volumes.............................................................................................189
Creating File Systems...................................................................................................189
Deporting Disk Groups................................................................................................190
Re-Importing Disk Groups.............................................................................................190
Clearimport at System Reboot Time................................................................................190
Configuring the Cluster .........................................................................................................190
cmquerycl Options...........................................................................................................191
Speeding up the Process..............................................................................................191
Specifying the Address Family for the Cluster Hostnames..................................................191
Specifying the Address Family for the Heartbeat .............................................................192
Specifying the Cluster Lock...........................................................................................192
Generating a Network Template File..............................................................................192
Full Network Probing...................................................................................................193
8 Contents