Online fencing migration mode using the Web-based installer
After you configure SFHA, you must configure the cluster for data integrity. Review the configuration requirements.
See Configuring SFHA using the Web-based installer.
See About planning to configure I/O fencing.
To configure SFHA for data integrity
- Start the Web-based installer.
See Starting the Veritas Web-based installer.
- On the Select a task and a product page, select the task and the product as follows:
Click Next.
- Verify the cluster information that the installer presents and confirm whether you want to configure I/O fencing on the cluster.
- On the Select Cluster page, click if the installer completes the cluster verification successfully.
The installer performs the initial system verification. It checks for the system communication. It also checks for release compatibility, installed product version, platform version, and performs product prechecks.
- Fencing may be enabled, installer may prompt whether you want to reconfigure it.
Click .
- On the Select Fencing Type page, select the
Online fencing migration
option.
- The installer prompts to select the coordination points you want to remove from the currently configured coordination points.
Click .
- Provide the number of Coordination point server and disk coordination points to be added to the configuration.
Click .
- Provide the number of virtual IP addresses or Fully Qualified Host Name (FQHN) used for each coordination point server.
Click .
- Provide the IP or FQHN and port number for each coordination point server.
Click .
- Installer prompts to confirm the online migration coordination point servers.
Click .
Note: |
If the coordination point servers are configured in secure mode, then the communication between coordination point servers and client servers happen in secure mode. |
- Installer proceeds with migration of the new coordination point servers. VCS is restarted during configuration.
Click .
- You can add a Coordination Point agent to the client cluster and also provide name to the agent.
- Click .
- On the Completion page, view the summary file, log file, or response file, if needed, to confirm the configuration.
- Select the checkbox to specify whether you want to send your installation information to Symantec.
Click . The installer prompts you for another task.