HP Instant Capacity Version 10.x User Guide (762794-001, March 2014)

Rights seizure
Rights seizure from an HP Integrity Superdome 2 GiCAP group member is similar to the seizure
from legacy system explained in “Rights seizure” (page 79) with the following differences:
The hostname of the Onboard Administrator associated with the member must be provided
in the seizure command instead of the partition hostname:
icapmanage -x <oa_hostname>
The seizure process, when executed on the HP Integrity Superdome 2 systems leaves behind
one usage right per member complex. This is unlike seizure on legacy systems, where one
usage right is left behind for each cell.
Both OAs may be specified at the member addition. In that case, if they go down unexpectedly
or cannot communicate with AGM, rights seizure for the member complex succeeds.
The seized rights can be returned to the member by issuing the following command on the Group
Manager:
icapmanage -z <oa_hostname>
Adding a standby Group Manager
To add a standby Group Manager to a group, issue the following command on the Group Manager:
icapmanage -a -S <standby_hostname>
If any of the groups managed by the Group Manager contains HP Integrity Superdome 2, then in
addition to the user root credential for the standby Group Manager, you are also prompted to
enter the password that will be assigned to the user standby_gm. The user standby_gm is created
on the member during this operation.
IMPORTANT:
1. Do not remove the user standby_gm or the certificate associated with the user on the HP
Integrity Superdome 2 systems. This causes communication breakdown between the members
and the standby manager. This affects the functioning of the group when the standby Group
Manager takes over (if and when the active Group Manager goes down).
2. If a member is added to a group that already has an assigned standby Group Manager, the
password assigned to the user standby_gm on the Onboard Administrator is the same as the
one entered for the user active_gm during the addition operation.
For more information on standby Group Managers, see “Standby Group Managers” (page 69).
The following example shows how a standby Group Manager can be added to a group.
# icapmanage -a -S standyhost.yourdomain.com
Enter the password for root on standyhost.yourdomain.com: *****
This operation may take a while to complete. The Group Manager
must contact every member host in each GiCAP group to
update standby manager data and establish secure communications.
Enter the password for user ID standby_gm which will be created on all SD2 machines: ******
Host standyhost.yourdomain.com has been set up as a standby Group Manager.
Group Manager failover considerations
This feature is the same as what is explained in “Group Manager failover considerations (page 78).
Removing a standby Group Manager
To remove the standby Group Manager assigned to the groups, issue the following command on
the active Group Manager:
icapmanage -r -S <standby_hostname>
The following example shows how to remove a standby Group Manager:
# icapmanage -r -S standyhost.yourdomain.com
standyhost.yourdomain.com has been removed from use as a standby Group Manager.
HP Integrity Superdome 2 with dynamic cores 115