Managing HP Serviceguard for Linux Ninth Edition, April 2009

Heartbeat network minimum requirement. See HEARTBEAT_IP under “Cluster
Configuration Parameters ” (page 100).
At least one NODE_NAME is specified.
Each node is connected to each heartbeat network.
All heartbeat networks are of the same type of LAN.
The network interface device files specified are valid LAN device files.
Other configuration parameters for the cluster and packages are valid.
If the cluster is online the cmcheckconf command also verifies that all the conditions
for the specific change in configuration have been met.
NOTE: Using the -k option means that cmcheckconf only checks disk connectivity
to the LVM disks that are identified in the cluster configuration file. Omitting the -k
option (the default behavior) means that cmcheckconf tests the connectivity of all
LVM disks on all nodes. Using -k can result in significantly faster operation of the
command.
Cluster Lock Configuration Messages
The cmquerycl, cmcheckconf and cmapplyconf commands will return errors if
the cluster lock is not correctly configured. If there is no cluster lock in a cluster with
two nodes, the following message is displayed in the cluster configuration file:
# Warning: Neither a quorum server nor a lock lun was specificed.
# A Quorum Server or a lock lun is required for clusters of only two nodes.
If you attempt to configure both a quorum server and a lock LUN, the following message
appears on standard output when issuing the cmcheckconf or cmapplyconf command:
Duplicate cluster lock, line 55. Quorum Server already specified.
Distributing the Binary Configuration File
After specifying all cluster parameters, use the cmapplyconf command to apply the
configuration. This action distributes the binary configuration file to all the nodes in
the cluster. HP recommends doing this separately before you configure packages
(described in the next chapter). In this way, you can verify the quorum server, heartbeat
networks, and other cluster-level operations by using the cmviewcl command on the
running cluster. Before distributing the configuration, ensure that your security files
permit copying among the cluster nodes. See “Configuring Root-Level Access”
(page 149).
The following command distributes the binary configuration file:
cmapplyconf -k -v -C $SGCONF/clust1.conf
Configuring the Cluster 183