Managing HP Serviceguard for Linux Ninth Edition, April 2009

Configuring node_name...................................................................................143
Configuring monitored_subnet_access............................................................143
Configuring ip_subnet_node............................................................................144
Configuring a Package: Next Steps.............................................................................144
Planning for Changes in Cluster Size...............................................................................144
5 Building an HA Cluster Configuration.......................................................................................147
Preparing Your Systems ...................................................................................................147
Installing and Updating Serviceguard .......................................................................147
Understanding the Location of Serviceguard Files.....................................................147
Enabling Serviceguard Command Access..................................................................148
Configuring Root-Level Access...................................................................................149
Allowing Root Access to an Unconfigured Node..................................................149
Ensuring that the Root User on Another Node Is Recognized..............................150
About identd.....................................................................................................150
Configuring Name Resolution....................................................................................150
Safeguarding against Loss of Name Resolution Services......................................151
Ensuring Consistency of Kernel Configuration .........................................................153
Enabling the Network Time Protocol .........................................................................153
Implementing Channel Bonding (Red Hat)................................................................153
Sample Configuration............................................................................................154
Restarting Networking...........................................................................................155
Viewing the Configuration....................................................................................155
Implementing Channel Bonding (SUSE).....................................................................156
Restarting Networking...........................................................................................157
Setting up a Lock LUN................................................................................................157
Setting Up and Running the Quorum Server..............................................................159
Creating the Logical Volume Infrastructure ...............................................................159
Displaying Disk Information.................................................................................160
Creating Partitions.................................................................................................161
Enabling Volume Group Activation Protection.....................................................163
Building Volume Groups: Example for Smart Array Cluster Storage (MSA 2000
Series).....................................................................................................................164
Building Volume Groups and Logical Volumes....................................................165
Distributing the Shared Configuration to all Nodes..............................................166
Testing the Shared Configuration..........................................................................167
Storing Volume Group Configuration Data ..........................................................169
Preventing Boot-Time vgscan and Ensuring Serviceguard Volume Groups
Are Deactivated................................................................................................170
Setting up Disk Monitoring...................................................................................170
Configuring the Cluster....................................................................................................171
cmquerycl Options......................................................................................................171
Speeding up the Process........................................................................................171
Table of Contents 7