Managing HP Serviceguard for Linux, Tenth Edition, September 2012

Setting Up and Running the Quorum Server........................................................169
Creating the Logical Volume Infrastructure ..........................................................169
Using the Generic Resources Disk Monitor......................................................170
Displaying Disk Information..........................................................................170
Creating Partitions.......................................................................................171
Enabling Volume Group Activation Protection.................................................173
Building Volume Groups: Example for Smart Array Cluster Storage (MSA 2000
Series).......................................................................................................174
Building Volume Groups and Logical Volumes.................................................175
Distributing the Shared Configuration to all Nodes..........................................176
Testing the Shared Configuration...................................................................177
Storing Volume Group Configuration Data .....................................................178
Preventing Boot-Time vgscan and Ensuring Serviceguard Volume Groups Are
Deactivated...........................................................................................178
Setting up Disk Monitoring...........................................................................179
Configuring the Cluster..........................................................................................179
cmquerycl Options...........................................................................................180
Speeding up the Process..............................................................................180
Specifying the Address Family for the Cluster Hostnames..................................180
Specifying the Address Family for the Heartbeat ............................................181
Full Network Probing...................................................................................182
Specifying a Lock LUN......................................................................................182
Specifying a Quorum Server.............................................................................182
Obtaining Cross-Subnet Information...................................................................183
Identifying Heartbeat Subnets............................................................................185
Specifying Maximum Number of Configured Packages ........................................185
Modifying the MEMBER_TIMEOUT Parameter......................................................185
Controlling Access to the Cluster........................................................................186
A Note about Terminology...........................................................................186
How Access Roles Work..............................................................................186
Levels of Access..........................................................................................187
Setting up Access-Control Policies..................................................................188
Role Conflicts.........................................................................................191
Package versus Cluster Roles.........................................................................192
Verifying the Cluster Configuration ....................................................................192
Cluster Lock Configuration Messages..................................................................193
Distributing the Binary Configuration File ...........................................................193
Managing the Running Cluster...............................................................................194
Checking Cluster Operation with Serviceguard Commands...................................194
Setting up Autostart Features ............................................................................195
Changing the System Message .........................................................................196
Managing a Single-Node Cluster......................................................................196
Single-Node Operation...............................................................................196
Disabling identd..............................................................................................197
8 Contents