Managing Serviceguard Seventeenth Edition, First Reprint December 2009

Creating Disk Groups............................................................................................217
Creating Volumes...................................................................................................218
Creating File Systems.............................................................................................218
Deporting Disk Groups..........................................................................................218
Re-Importing Disk Groups....................................................................................219
Clearimport at System Reboot Time......................................................................219
Configuring the Cluster ...................................................................................................219
cmquerycl Options......................................................................................................220
Speeding up the Process........................................................................................220
Specifying the Address Family for the Cluster Hostnames...................................221
Specifying the Address Family for the Heartbeat .................................................221
Full Network Probing............................................................................................222
Specifying a Lock Disk................................................................................................222
Specifying a Lock LUN................................................................................................223
Specifying a Quorum Server.......................................................................................224
Obtaining Cross-Subnet Information..........................................................................224
Identifying Heartbeat Subnets....................................................................................227
Specifying Maximum Number of Configured Packages ...........................................227
Modifying the MEMBER_TIMEOUT Parameter.........................................................227
Controlling Access to the Cluster................................................................................227
A Note about Terminology....................................................................................228
How Access Roles Work........................................................................................228
Levels of Access......................................................................................................229
Setting up Access-Control Policies.........................................................................230
Role Conflicts....................................................................................................233
Package versus Cluster Roles.................................................................................234
Adding Volume Groups..............................................................................................234
Verifying the Cluster Configuration ...........................................................................234
Distributing the Binary Configuration File ................................................................235
Storing Volume Group and Cluster Lock Configuration Data .............................236
Creating a Storage Infrastructure with Veritas Cluster File System (CFS).................237
Preparing the Cluster and the System Multi-node Package..................................238
Creating the Disk Groups......................................................................................239
Creating the Disk Group Cluster Packages............................................................239
Creating Volumes...................................................................................................240
Creating a File System and Mount Point Package.................................................240
Creating Checkpoint and Snapshot Packages for CFS...........................................242
Mount Point Packages for Storage Checkpoints...............................................242
Mount Point Packages for Snapshot Images.....................................................243
Creating the Storage Infrastructure with Veritas Cluster Volume Manager (CVM)...244
Initializing the Veritas Volume Manager ..............................................................245
Preparing the Cluster for Use with CVM ..............................................................245
Identifying the Master Node..................................................................................246
Initializing Disks for CVM.....................................................................................246
Table of Contents 9