Managing Serviceguard Seventeenth Edition, First Reprint December 2009

Example 1..........................................................................................................185
Example 2..........................................................................................................185
About External Scripts.................................................................................................186
Using Serviceguard Commands in an External Script..........................................188
Determining Why a Package Has Shut Down.......................................................189
last_halt_failed..................................................................................................189
About Cross-Subnet Failover......................................................................................190
Implications for Application Deployment.............................................................191
Configuring a Package to Fail Over across Subnets: Example..............................191
Configuring node_name...................................................................................192
Configuring monitored_subnet_access............................................................192
Configuring ip_subnet_node............................................................................192
Configuring a Package: Next Steps.............................................................................193
Planning for Changes in Cluster Size...............................................................................193
5 Building an HA Cluster Configuration.......................................................................................195
Preparing Your Systems ...................................................................................................195
Installing and Updating Serviceguard .......................................................................195
Learning Where Serviceguard Files Are Kept.............................................................196
Configuring Root-Level Access...................................................................................196
Allowing Root Access to an Unconfigured Node..................................................197
Ensuring that the Root User on Another Node Is Recognized..............................198
About identd.....................................................................................................198
Configuring Name Resolution....................................................................................199
Safeguarding against Loss of Name Resolution Services......................................200
Ensuring Consistency of Kernel Configuration .........................................................202
Enabling the Network Time Protocol .........................................................................202
Tuning Network and Kernel Parameters....................................................................202
Creating Mirrors of Root Logical Volumes.................................................................204
Choosing Cluster Lock Disks......................................................................................205
Backing Up Cluster Lock Disk Information ..........................................................206
Setting Up a Lock LUN...............................................................................................206
Creating a Disk Partition on an HP Integrity System............................................207
Defining the Lock LUN..........................................................................................208
Excluding Devices from Probing.................................................................................208
Setting Up and Running the Quorum Server..............................................................209
Creating the Storage Infrastructure and Filesystems with LVM, VxVM and CVM....210
Creating a Storage Infrastructure with LVM...............................................................210
Creating Volume Groups for Mirrored Individual Data Disks.............................211
Creating a Storage Infrastructure with VxVM............................................................216
Converting Disks from LVM to VxVM..................................................................216
Initializing Disks for VxVM...................................................................................216
Initializing Disks Previously Used by LVM...........................................................217
8 Table of Contents