Installation guide

Section 3.4:Using the cluadmin Utility 67
After configuring the cluster software, optionally edit the /etc/syslog.conf file to enable the
cluster to log events to a file that is different from the default log file, /var/log/messages. The
cluster utilities and daemons log their messages using a syslog tag called local4. Using a cluster-
specific log file facilitates cluster monitoring and problem solving. To log cluster events to both the
/var/log/cluster and /var/log/messages files, add lines similar to the following to the
/etc/syslog.conf file:
#
# Cluster messages coming in on local4 go to /var/log/cluster
#
local4.* /var/log/cluster
To prevent the duplication of messages and log cluster events only to the /var/log/cluster file,
add lines similar to the following to the /etc/syslog.conf file:
# Log anything (except mail) of level info or higher.
# Don’t log private authentication messages!
*.info;mail.none;news.none;authpriv.none;local4.none /var/log/messages
To apply the previous changes, you can invoke the killall -HUP syslogd command, or restart
syslog with a command similar to /etc/rc.d/init.d/syslog restart.
In addition, it is possible to modify the severity level of the events that are logged by the individual
cluster daemons. See Section 8.6, Modifying Cluster Event Logging for more information.
3.4 Using the cluadmin Utility
The cluadmin utility provides a command-line user interface that enables an administrator to moni-
tor and manage the cluster systems and services. Use the cluadmin utility to perform the following
tasks:
Add, modify, and delete services
Disable and enable services
Display cluster and service status
Modify cluster daemon event logging
Backup and restore the cluster database
The cluster uses an advisory lock to prevent the cluster database from being simultaneously modified
by multiple users on either cluster system. Users can only modify the database if they hold the advisory
lock.
When the cluadmin utility is invoked, the cluster software checks if the lock is already assigned to
a user. If the lock is not already assigned, the cluster software assigns the requesting user the lock.
When the user exits from the cluadmin utility, the lock is relinquished.