Adding and removing a node

Adding a node to a cluster

55

11Enter y or n for another license key. You are prompted to press Return to continue.

Do you want to enter another license key for system03?

[y,n,q,?] (n)

12Enter 1 or 2 to be installed on all systems.

Select the packages to be installed on all systems?

[1-2,q,?] (2)

13Press Return to continue.

Press [Return] to continue:

Note: Do not reboot the machine now.

14Create the /etc/llttab file the same as it looks on another node in the cluster.

aChange the set-node line to the name of the new node and specify that the LAN ports for the public and private networks are configured the same as on the other cluster nodes:

set-node system03 set-cluster 100

link lan2 /dev/lan:2 - ether - - link lan0 /dev/lan:0 - ether - -

bCopy /etc/llthosts from one other node of the cluster and add a new line to it with the name of this node.

cCopy the same llthosts file to all nodes of the cluster. See “/etc/llttab” on page 25.

15Create /etc/gabtab file the same as it is on another node in the cluster. See “/etc/gabtab” on page 28.

For example,

/sbin/gabconfig -c -n 3

There is no need to reboot the other nodes, just update the /etc/gabtab file on the other nodes in the cluster.

16Reboot the system that has been added.

#/usr/sbin/shutdown -R -y 0

17Start VxVM on the system that has been added.

#vxinstall

18After starting VxVM, proceed to “Configuring SFCFS and CVM agents on the new node.”

Page 53
Image 53
Symantec HP-UX manual Enter 1 or 2 to be installed on all systems, Start VxVM on the system that has been added

HP-UX specifications

Symantec HP-UX is a comprehensive security solution engineered to protect the HP-UX operating system, a variant of the UNIX OS developed by Hewlett-Packard (HP). As a robust enterprise environment, HP-UX is widely used in mission-critical applications, particularly in industries such as finance, telecommunications, and manufacturing. Symantec’s integration with HP-UX enhances security, providing essential features that cater to the needs of large organizations.

One of the main features of Symantec HP-UX is its advanced threat protection capabilities. It employs a multi-layered approach to security, utilizing signature-based detection, behavior-based analysis, and heuristics to identify and mitigate known and unknown threats. This real-time protection minimizes the risk of malware, ransomware, and other cyber threats that can compromise sensitive data and disrupt business operations.

In addition to threat protection, Symantec HP-UX includes robust data loss prevention (DLP) capabilities. DLP technology helps organizations ensure that their confidential data remains secure by preventing unauthorized access and exfiltration. This feature is particularly important for compliance with regulatory requirements such as GDPR and HIPAA, as it aids in safeguarding customer information.

Another significant characteristic of Symantec HP-UX is its scalability. Designed to handle the demands of enterprise environments, the solution can be easily integrated with existing IT infrastructure while adapting to growing workloads. This functionality is essential for organizations that require flexible security measures to accommodate expansion or changes in business processes.

Security management and reporting are also key components of Symantec HP-UX. The solution provides centralized management tools that allow administrators to monitor security status, deploy updates, and manage policy across multiple systems from a single interface. These tools enhance visibility into security incidents and enable organizations to respond promptly to potential threats.

Moreover, Symantec HP-UX offers automated updates and patch management. Regular updates are crucial for maintaining a secure environment, and the solution ensures that systems are protected against the latest vulnerabilities without requiring extensive manual intervention.

In summary, Symantec HP-UX is a powerful security solution designed for the HP-UX operating system. Its main features include advanced threat protection, data loss prevention, scalability, centralized management, and automated updates. These characteristics make it a vital tool for organizations aiming to protect their data and maintain a secure operational environment in the face of evolving cyber threats.