Managing Serviceguard Sixteenth Edition, March 2009
Configuring the Cluster ...................................................................................................216
cmquerycl Options......................................................................................................217
Speeding up the Process........................................................................................217
Specifying the Address Family for the Heartbeat .................................................218
Full Network Probing............................................................................................218
Specifying a Lock Disk................................................................................................218
Specifying a Lock LUN................................................................................................219
Specifying a Quorum Server.......................................................................................220
Obtaining Cross-Subnet Information..........................................................................220
Identifying Heartbeat Subnets....................................................................................223
Specifying Maximum Number of Configured Packages ...........................................223
Modifying the MEMBER_TIMEOUT Parameter.........................................................223
Controlling Access to the Cluster................................................................................224
A Note about Terminology....................................................................................224
How Access Roles Work........................................................................................224
Levels of Access......................................................................................................225
Setting up Access-Control Policies.........................................................................226
Role Conflicts....................................................................................................229
Package versus Cluster Roles.................................................................................230
Adding Volume Groups..............................................................................................230
Verifying the Cluster Configuration ...........................................................................230
Distributing the Binary Configuration File ................................................................231
Storing Volume Group and Cluster Lock Configuration Data .............................232
Creating a Storage Infrastructure with Veritas Cluster File System (CFS).................233
Preparing the Cluster and the System Multi-node Package..................................234
Creating the Disk Groups......................................................................................235
Creating the Disk Group Cluster Packages............................................................235
Creating Volumes...................................................................................................236
Creating a File System and Mount Point Package.................................................237
Creating Checkpoint and Snapshot Packages for CFS...........................................238
Mount Point Packages for Storage Checkpoints...............................................239
Mount Point Packages for Snapshot Images.....................................................240
Creating the Storage Infrastructure with Veritas Cluster Volume Manager (CVM)...241
Initializing the Veritas Volume Manager ..............................................................242
Preparing the Cluster for Use with CVM ..............................................................242
Starting the Cluster and Identifying the Master Node..........................................244
Initializing Disks for CVM.....................................................................................244
Creating Disk Groups............................................................................................244
Creating Volumes ..................................................................................................245
Mirror Detachment Policies with CVM............................................................245
Adding Disk Groups to the Package Configuration .............................................245
Using DSAU during Configuration............................................................................246
Managing the Running Cluster........................................................................................246
Checking Cluster Operation with Serviceguard Manager..........................................246
Table of Contents 9