Managing HP Serviceguard A.11.20.10 for Linux, December 2012

5 Building an HA Cluster Configuration........................................................129
5.1 Preparing Your Systems ...................................................................................................129
5.1.1 Installing and Updating Serviceguard .........................................................................129
5.1.2 Understanding the Location of Serviceguard Files.........................................................129
5.1.3 Enabling Serviceguard Command Access....................................................................130
5.1.4 Configuring Root-Level Access....................................................................................130
5.1.4.1 Allowing Root Access to an Unconfigured Node...................................................130
5.1.4.2 Ensuring that the Root User on Another Node Is Recognized..................................131
5.1.4.2.1 About identd.............................................................................................131
5.1.5 Configuring Name Resolution....................................................................................131
5.1.5.1 Safeguarding against Loss of Name Resolution Services.........................................133
5.1.6 Ensuring Consistency of Kernel Configuration ..............................................................134
5.1.7 Enabling the Network Time Protocol ..........................................................................134
5.1.8 Implementing Channel Bonding (Red Hat)...................................................................134
5.1.8.1 Sample Configuration........................................................................................134
5.1.8.2 Restarting Networking.......................................................................................135
5.1.8.3 Viewing the Configuration.................................................................................136
5.1.9 Implementing Channel Bonding (SUSE).......................................................................136
5.1.9.1 Restarting Networking.......................................................................................137
5.1.10 Setting up a Lock LUN.............................................................................................137
5.1.11 Setting Up and Running the Quorum Server................................................................139
5.1.12 Creating the Logical Volume Infrastructure ..................................................................139
5.1.12.1 Displaying Disk Information...............................................................................140
5.1.12.2 Creating Partitions...........................................................................................140
5.1.12.3 Enabling Volume Group Activation Protection......................................................142
5.1.12.4 Building Volume Groups: Example for Smart Array Cluster Storage (MSA 2000
Series).......................................................................................................................143
5.1.12.5 Building Volume Groups and Logical Volumes.....................................................144
5.1.12.6 Distributing the Shared Configuration to all Nodes...............................................144
5.1.12.7 Testing the Shared Configuration.......................................................................145
5.1.12.8 Storing Volume Group Configuration Data .........................................................146
5.1.12.8.1 Preventing Boot-Time vgscan and Ensuring Serviceguard Volume Groups Are
Deactivated...........................................................................................................146
5.1.12.9 Setting up Disk Monitoring................................................................................147
5.2 Configuring the Cluster....................................................................................................147
5.2.1 cmquerycl Options...................................................................................................148
5.2.1.1 Speeding up the Process....................................................................................148
5.2.1.2 Specifying the Address Family for the Cluster Hostnames.......................................148
5.2.1.3 Specifying the Address Family for the Heartbeat ..................................................148
5.2.1.4 Specifying the Cluster Lock.................................................................................149
5.2.1.5 Full Network Probing.........................................................................................149
5.2.2 Specifying a Lock LUN.............................................................................................149
5.2.3 Specifying a Quorum Server.....................................................................................149
5.2.4 Obtaining Cross-Subnet Information...........................................................................150
5.2.5 Identifying Heartbeat Subnets...................................................................................151
5.2.6 Specifying Maximum Number of Configured Packages ...............................................152
5.2.7 Modifying the MEMBER_TIMEOUT Parameter.............................................................152
5.2.8 Controlling Access to the Cluster...............................................................................152
5.2.8.1 A Note about Terminology................................................................................152
5.2.8.2 How Access Roles Work...................................................................................152
5.2.8.3 Levels of Access...............................................................................................153
5.2.8.4 Setting up Access-Control Policies......................................................................154
5.2.8.4.1 Role Conflicts...........................................................................................156
5.2.8.5 Package versus Cluster Roles.............................................................................157
Contents 7