Contents 9

 

Adding VCS users

71

 

Configuring SMTP email notification

71

 

Configuring SNMP trap notification

73

 

Configuring global clusters

74

 

Installing VCS RPMs

75

 

Creating VCS configuration files

76

 

Starting VCS

77

 

Completing the installation

77

 

About enabling LDAP authentication for clusters that run in

 

 

secure mode

78

 

Installing the Java Console

80

 

Installing VCS Simulator

82

 

Verifying the cluster after installation

84

 

Verifying and updating licenses on the system

84

 

Checking licensing information on the system

84

 

Updating product licenses using vxlicinst

85

 

Accessing the VCS documentation

86

Chapter 5

Configuring VCS clusters for data integrity

87

 

About configuring VCS clusters for data integrity

87

 

About I/O fencing components

88

 

About data disks

88

 

About coordination points

88

 

About setting up disk-based I/O fencing

89

 

Preparing to configure disk-based I/O fencing

92

 

Initializing disks as VxVM disks

93

 

Identifying disks to use as coordinator disks

95

 

Checking shared disks for I/O fencing

95

 

Setting up disk-based I/O fencing manually

99

 

Setting up coordinator disk groups

99

 

Creating I/O fencing configuration files

100

 

Modifying VCS configuration to use I/O fencing

101

 

Verifying I/O fencing configuration

102

 

Removing permissions for communication

103

Chapter 6

Verifying the VCS installation

105

 

About verifying the VCS installation

105

 

About the LLT and GAB configuration files

105

 

About the VCS configuration file main.cf

107

 

Sample main.cf file for VCS clusters

108

 

Sample main.cf file for global clusters

110

 

Verifying the LLT, GAB, and VCS configuration files

113

Page 9
Image 9
Symantec 5 manual Chapter Configuring VCS clusters for data integrity