Managing Serviceguard Sixteenth Edition, March 2009

Implications for Application Deployment.............................................................189
Configuring a Package to Fail Over across Subnets: Example..............................189
Configuring node_name...................................................................................190
Configuring monitored_subnet_access............................................................190
Configuring ip_subnet_node............................................................................190
Configuring a Package: Next Steps.............................................................................191
Planning for Changes in Cluster Size...............................................................................191
5 Building an HA Cluster Configuration.......................................................................................193
Preparing Your Systems ...................................................................................................193
Installing and Updating Serviceguard .......................................................................193
Learning Where Serviceguard Files Are Kept.............................................................194
Configuring Root-Level Access...................................................................................194
Allowing Root Access to an Unconfigured Node..................................................195
Ensuring that the Root User on Another Node Is Recognized..............................196
About identd.....................................................................................................196
Configuring Name Resolution....................................................................................196
Safeguarding against Loss of Name Resolution Services......................................198
Ensuring Consistency of Kernel Configuration .........................................................199
Enabling the Network Time Protocol .........................................................................199
Tuning Network and Kernel Parameters....................................................................200
Creating Mirrors of Root Logical Volumes.................................................................200
Choosing Cluster Lock Disks......................................................................................202
Backing Up Cluster Lock Disk Information ..........................................................202
Setting Up a Lock LUN...............................................................................................202
Creating a Disk Partition on an HP Integrity System............................................203
Defining the Lock LUN..........................................................................................204
Excluding Devices from Probing.................................................................................205
Setting Up and Running the Quorum Server..............................................................206
Creating the Storage Infrastructure and Filesystems with LVM, VxVM and CVM....206
Creating a Storage Infrastructure with LVM...............................................................207
Creating Volume Groups for Mirrored Individual Data Disks.............................207
Creating a Storage Infrastructure with VxVM............................................................212
Initializing the Veritas Cluster Volume Manager 3.5 ............................................213
Converting Disks from LVM to VxVM..................................................................213
Initializing Disks for VxVM...................................................................................213
Initializing Disks Previously Used by LVM...........................................................214
Creating Disk Groups............................................................................................214
Creating Volumes...................................................................................................215
Creating File Systems.............................................................................................215
Deporting Disk Groups..........................................................................................215
Re-Importing Disk Groups....................................................................................216
Clearimport at System Reboot Time......................................................................216
8 Table of Contents