Managing Serviceguard Nineteenth Edition, Reprinted June 2011

Simple Method...........................................................................................................136
Example 1.............................................................................................................136
Points to Keep in Mind............................................................................................137
Comprehensive Method...............................................................................................137
Defining Capacities................................................................................................137
Defining Weights...................................................................................................139
Rules and Guidelines...................................................................................................141
For More Information...................................................................................................141
How Package Weights Interact with Package Priorities and Dependencies...........................141
Example 1.............................................................................................................142
Example 2.............................................................................................................142
About External Scripts......................................................................................................142
Using Serviceguard Commands in an External Script.......................................................144
Determining Why a Package Has Shut Down..................................................................145
last_halt_failed.......................................................................................................145
About Cross-Subnet Failover..............................................................................................145
Implications for Application Deployment.........................................................................146
Configuring a Package to Fail Over across Subnets: Example............................................146
Configuring node_name..........................................................................................147
Configuring monitored_subnet_access.......................................................................147
Configuring ip_subnet_node....................................................................................147
Configuring a Package: Next Steps....................................................................................147
Planning for Changes in Cluster Size.......................................................................................148
5 Building an HA Cluster Configuration........................................................149
Preparing Your Systems ........................................................................................................149
Installing and Updating Serviceguard ................................................................................149
Where Serviceguard Files Are Kept....................................................................................149
Creating Cluster-wide Device Special Files (cDSFs)................................................................150
Before You Start..........................................................................................................150
Creating cDSFs for a Group of Nodes...........................................................................150
Adding a Node to a cDSF Group.................................................................................152
Removing a Node from a cDSF Group...........................................................................152
Displaying the cDSF Configuration................................................................................152
Migrating Existing LVM Cluster Storage to cDSFs.............................................................152
Using Easy Deployment....................................................................................................152
Before You Start..........................................................................................................152
Using Easy Deployment Commands to Configure the Cluster.............................................153
Configuring Root-Level Access............................................................................................157
Allowing Root Access to an Unconfigured Node.............................................................157
Ensuring that the Root User on Another Node Is Recognized.............................................158
About identd..........................................................................................................158
Configuring Name Resolution............................................................................................159
Safeguarding against Loss of Name Resolution Services...................................................160
Ensuring Consistency of Kernel Configuration .....................................................................161
Enabling the Network Time Protocol ..................................................................................162
Tuning Network and Kernel Parameters...............................................................................162
Creating Mirrors of Root Logical Volumes............................................................................163
Choosing Cluster Lock Disks..............................................................................................164
Backing Up Cluster Lock Disk Information ......................................................................164
Setting Up a Lock LUN......................................................................................................165
Creating a Disk Partition on an HP Integrity System..........................................................166
Defining the Lock LUN.................................................................................................167
Excluding Devices from Probing.........................................................................................167
Setting Up and Running the Quorum Server........................................................................168
Contents 7