HP Instant Capacity Version 10.x User Guide (762794-001, March 2014)

rights are available to other group members for purposes of disaster recovery. If none of the member
partitions are reachable by the expiration date for a particular member, the usage rights are
automatically restored (reassigned) to the member partition (or complex, in the case of unassigned
seized rights) from which they were seized. However, note that if the seized usage rights have
been redeployed to other members and are not released at the expiration time, the group may go
out of compliance or temporary capacity may be used to maintain compliance.
If any partition of the inaccessible member from which rights seizures were deferred reconnects to
the group before the expiration date, the seized core usage rights (for all partitions) are finalized
as a loan from the member to the group, the expiration date is no longer relevant, and the usage
rights can thereafter be manipulated with normal icapmodify operations.
The icapmanage -x operation can be performed for each hard partition on the member.
Scavenging seized rights to member
When seizing usage rights from a member, the following cron job is set to active Group Manager:
0 0,12 * * * /opt/wbem/bin/wbemexec
/etc/opt/iCAP/GiCAP.checkScavengedMember.xml
This job performs a check to reconnect to the member whose rights has been seized, after 12
hours. If active Group Manager successfully reconnects to the member, the seized rights are returned
to the member. This is similar to icapmanage -z.
The root user on the active Group Manager receives the cron job results with emails. When the
attempt to return the usage rights is carried out, a message shown in the following example is sent
to the root user.
Example 20 Scavenging attempt on active Group Manager
From: root@agm.corp.hp.com
Subject: cron
<?xml version="1.0" encoding="utf-8"?>
<CIM CIMVERSION="2.0" DTDVERSION="2.0">
<MESSAGE ID="" PROTOCOLVERSION="1.0">
<SIMPLERSP>
<METHODRESPONSE NAME="checkScavengedMember">
<RETURNVALUE PARAMTYPE="sint8">
<VALUE>
0
</VALUE>
</RETURNVALUE>
</METHODRESPONSE>
</SIMPLERSP>
</MESSAGE>
</CIM>
*************************************************
Cron: The previous message is the standard output and standard error of one of your crontab commands:
/opt/wbem/bin/wbemexec /etc/opt/iCAP/GiCAP.checkScavengedMember.xml
NOTE: The above example does not mean that the seized rights have been returned or active
Group Manager was able to reconnect to the member. It only means that no exception was caught.
If the job is executed on standby Group Manager, the root user receives the mail shown in the
following example.
Rights seizure 81