Installation guide
Heu rist ics
Pat h t o Pro g ram — The program used to determine if this heuristic is
alive. This can be anything that can be executed by
/bin/sh -c
. A
return value of 0 indicates success; anything else indicates failure. This
field is required.
In t erval — The frequency (in seconds) at which the heuristic is polled.
The default interval for every heuristic is 2 seconds.
Sco re — The weight of this heuristic. Be careful when determining scores
for heuristics. The default score for each heuristic is 1.
Ap p ly Propagates the changes to the cluster configuration file
(
/etc/cluster/cluster.conf
) in each cluster node.
Paramet er Descrip t io n
3.5. Configuring Fence Devices
Configuring fence devices consists of creating, modifying, and deleting fence devices. Creating a
fence device consists of selecting a fence device type and entering parameters for that fence device
(for example, name, IP address, login, and password). Modifying a fence device consists of selecting
an existing fence device and changing parameters for that fence device. Deleting a fence device
consists of selecting an existing fence device and deleting it.
Note
If you are creating a new cluster, you can create fence devices when you configure cluster
nodes. Refer to Section 3.6, “ Configuring Cluster Members”.
With Co n g a you can create shared and non-shared fence devices. For information on supported
fence devices and their parameters, refer to Appendix B, Fence Device Parameters.
This section provides procedures for the following tasks:
Creating shared fence devices — Refer to Section 3.5.1, “Creating a Shared Fence Device” . The
procedures apply only to creating shared fence devices. You can create non-shared (and shared)
fence devices while configuring nodes (refer to Section 3.6, “ Configuring Cluster Members” ).
Modifying or deleting fence devices — Refer to Section 3.5.2, “ Modifying or Deleting a Fence
Device” . The procedures apply to both shared and non-shared fence devices.
The starting point of each procedure is at the cluster-specific page that you navigate to from Choose
a cluster to administer displayed on the clu st er tab.
3.5.1. Creat ing a Shared Fence Device
To create a shared fence device, follow these steps:
Chapt er 3. Configuring Red Hat Clust er Wit h Conga
39