Before you begin to configure SFCFSHA using the Web-based installer, review the configuration requirements.
By default, the communication between the systems is selected as SSH. If SSH is used for communication between systems, the SSH commands execute without prompting for passwords or confirmations.
You can click
to quit the Web-installer at any time during the configuration process.To configure SFCFSHA on a cluster
Click Next.
Example: galaxy nebula
The installer performs the initial system verification. It checks for the system communication. It also checks for release compatibility, installed product version, platform version, and performs product prechecks.
Click Next after the installer completes the system verification successfully.
In the Confirmation dialog box that appears, choose whether or not to configure I/O fencing.
To configure I/O fencing, click Yes.
To configure I/O fencing later, click No. You can configure I/O fencing later using the Web-based installer.
See Configuring SFCFSHA for data integrity using the Web-based installer.
You can also configure I/O fencing later using the installsfcfsha -fencing command, the response files, or manually configure.
Cluster Name |
Enter a unique cluster name. |
Cluster ID |
Enter a unique cluster ID. Note that you can have the installer check to see if the cluster ID is unique. Symantec recommends that you use the installer to check for duplicate cluster IDs in multi-cluster environments. |
Check duplicate cluster ID |
Select the check box if you want the installer to verify if the given cluster ID is unique in your private network. The verification is performed after you specify the heartbeat details in the following pages. The verification takes some time to complete. |
LLT Type |
Select an LLT type from the list. You can choose to configure LLT over UDP or over Ethernet. If you choose Auto detect over Ethernet, the installer auto-detects the LLT links over Ethernet. Verify the links and click Yes in the Confirmation dialog box. Skip to step 7. If you click No, you must manually enter the details to configure LLT over Ethernet. |
Number of Heartbeats |
Choose the number of heartbeat links you want to configure. |
NICs |
Choose the NICs that you want to configure. |
Additional Low Priority Heartbeat NIC |
Select the check box if you want to configure a low priority link. The installer configures one heartbeat link as low priority link. |
Unique Heartbeat NICs per system |
For LLT over Ethernet, select the check box if you do not want to use the same NIC details to configure private heartbeat links on other systems. For LLT over UDP, this check box is selected by default. |
Click Next.
Click Next.
Click Next.
If you did not choose to configure I/O fencing in step 4, then skip to step 11. Go to step 10 to configure fencing.
On the Select Fencing Type page, choose the type of fencing configuration:
Configure Coordination Point client based fencing |
Choose this option to configure server-based I/O fencing. |
Configure disk based fencing |
Choose this option to configure disk-based I/O fencing. |
Based on the fencing type you choose to configure, follow the installer prompts.
See Configuring SFCFSHA for data integrity using the Web-based installer.
On the Completion page, view the summary file, log file, or response file, if needed, to confirm the configuration.
Click Finish. The installer prompts you for another task.