Managing Serviceguard A.11.20, March 2013
Specifying a Lock Disk......................................................................................................193
Specifying a Lock LUN......................................................................................................194
Specifying a Quorum Server.............................................................................................194
Obtaining Cross-Subnet Information...................................................................................195
Identifying Heartbeat Subnets............................................................................................196
Specifying Maximum Number of Configured Packages ........................................................197
Modifying the MEMBER_TIMEOUT Parameter......................................................................197
Controlling Access to the Cluster........................................................................................197
A Note about Terminology...........................................................................................197
How Access Roles Work..............................................................................................197
Levels of Access..........................................................................................................198
Setting up Access-Control Policies..................................................................................199
Role Conflicts.........................................................................................................201
Package versus Cluster Roles.........................................................................................201
Adding Volume Groups....................................................................................................202
Verifying the Cluster Configuration ....................................................................................202
Distributing the Binary Configuration File ...........................................................................203
Storing Volume Group and Cluster Lock Configuration Data .............................................203
Creating a Storage Infrastructure with Veritas Cluster File System (CFS)....................................204
Modular CFS packages v/s Legacy CFS packages..........................................................204
Preparing the Cluster and the System Multi-node Package.................................................206
Creating the Disk Groups.............................................................................................207
Creating the Disk Group Cluster Packages......................................................................208
Creating Volumes........................................................................................................209
Managing Disk Groups and Mount Points Using Modular Packages...................................209
Creating Modular Disk Group and Mount Point Packages............................................210
Parallel Activation of Disk Groups and Parallel Mounting of Mount Points.......................212
Creating Modular Checkpoint and Snapshot Packages for CFS....................................212
Online reconfiguration of modular CFS package parameters.............................................215
Example of online addition and deletion of a disk group and a mount point from a modular
CFS package.........................................................................................................217
Guidelines for Migrating from Legacy CFS Package to Modular CFS Package.....................218
Managing Disk Groups and Mount Points Using Legacy Packages.....................................221
Creating a File System and Mount Point Package........................................................221
Creating Checkpoint and Snapshot Packages for CFS.................................................222
Creating the Storage Infrastructure with Veritas Cluster Volume Manager (CVM).......................224
Initializing the Veritas Volume Manager ........................................................................225
Preparing the Cluster for Use with CVM ........................................................................225
Identifying the Master Node.........................................................................................225
Initializing Disks for CVM.............................................................................................225
Creating Disk Groups..................................................................................................226
Mirror Detachment Policies with CVM........................................................................226
Creating Volumes .......................................................................................................226
Adding Disk Groups to the Package Configuration .........................................................226
Using DSAU during Configuration......................................................................................227
Managing the Running Cluster...............................................................................................227
Checking Cluster Operation with Serviceguard Manager......................................................227
Checking Cluster Operation with Serviceguard Commands...................................................227
Preventing Automatic Activation of LVM Volume Groups .......................................................228
Setting up Autostart Features ............................................................................................228
Changing the System Message .........................................................................................229
Managing a Single-Node Cluster......................................................................................229
Single-Node Operation...............................................................................................230
Disabling identd..............................................................................................................230
Deleting the Cluster Configuration .....................................................................................230
Contents 9