Before you begin to configure SFCFSHA using the Web-based installer, review the configuration requirements.
By default, the communication between the systems is selected as SSH. If SSH is used for communication between systems, the SSH commands execute without prompting for passwords or confirmations.
You can click
to quit the Web-installer at any time during the configuration process.To configure SFCFSHA on a cluster
Click Next.
Example: sys1 sys2
The installer performs the initial system verification. It checks for the system communication. It also checks for release compatibility, installed product version, platform version, and performs product prechecks.
Click Next after the installer completes the system verification successfully.
In the Confirmation dialog box that appears, choose whether or not to configure I/O fencing.
To configure I/O fencing, click Yes.
To configure I/O fencing later, click No. You can configure I/O fencing later using the Web-based installer.
See Configuring SFCFSHA for data integrity using the Web-based installer.
You can also configure I/O fencing later using the installsfcfsha<version> -fencing command, the response files, or manually configure.
Where <version>
is the specific release version.
Click Next.
Click Next.
Click Next.
If you did not choose to configure I/O fencing in step 4, then skip to step 11. Go to step 10 to configure fencing.
On the Select Fencing Type page, choose the type of fencing configuration:
Configure Coordination Point client based fencing |
Choose this option to configure server-based I/O fencing. |
Configure disk based fencing |
Choose this option to configure disk-based I/O fencing. |
Based on the fencing type you choose to configure, follow the installer prompts.
See Configuring SFCFSHA for data integrity using the Web-based installer.
On the Completion page, view the summary file, log file, or response file, if needed, to confirm the configuration.
Click Finish. The installer prompts you for another task.