Installation guide

Note
For more information about Po st - Jo in Delay and Po st - Fail Delay, refer to the
fenced(8) man page.
6. Save cluster configuration changes by selecting File => Save.
5.4 . Configuring Fence Devices
Configuring fence devices for the cluster consists of selecting one or more fence devices and
specifying fence-device-dependent parameters (for example, name, IP address, login, and
password).
To configure fence devices, follow these steps:
1. Click Fen ce Devices. At the bottom of the right frame (labeled Pro p ert ies), click the Add a
Fence Device button. Clicking Add a Fence Device causes the Fence Device
Configuration dialog box to be displayed (refer to Figure 5.4, “ Fence Device
Configuration ).
Fig u re 5.4 . Fen ce Device Co n f ig u rat io n
2. At the Fence Device Configuration dialog box, click the drop-down box under Ad d a
New Fen ce Device and select the type of fence device to configure.
3. Specify the information in the Fence Device Configuration dialog box according to the
type of fence device. Refer to Appendix B, Fence Device Parameters for more information about
fence device parameters.
4. Click OK.
5. Choose File => Save to save the changes to the cluster configuration.
Chapt er 5. Configuring Red Hat Clust er Wit h syst em- config- clust er
63