Configuring SFCFSHA using the Web-based installer

Before you begin to configure SFCFSHA using the Web-based installer, review the configuration requirements.

By default, the communication between the systems is selected as SSH. If SSH is used for communication between systems, the SSH commands execute without prompting for passwords or confirmations.

You can click Quit to quit the Web-installer at any time during the configuration process.

To configure SFCFSHA on a cluster

  1. Start the Web-based installer.

    See Starting the Veritas Web-based installer.

  2. On the Select a task and a product page, select the task and the product as follows:

    Task

    Configure a Product

    Product

    Storage Foundation for Cluster File System High Availability

    Click Next.

  3. On the Select Systems page, enter the system names where you want to configure SFCFSHA, and click Next.

    Example: galaxy nebula

    The installer performs the initial system verification. It checks for the system communication. It also checks for release compatibility, installed product version, platform version, and performs product prechecks.

    Click Next after the installer completes the system verification successfully.

  4. In the Confirmation dialog box that appears, choose whether or not to configure I/O fencing.

    To configure I/O fencing, click Yes.

    To configure I/O fencing later, click No. You can configure I/O fencing later using the Web-based installer.

    See Configuring SFCFSHA for data integrity using the Web-based installer.

    You can also configure I/O fencing later using the installsfcfsha -fencing command, the response files, or manually configure.

  5. On the Set Cluster Name/ID page, specify the following information for the cluster.

    Cluster Name

    Enter a unique cluster name.

    Cluster ID

    Enter a unique cluster ID.

    Note that you can have the installer check to see if the cluster ID is unique. Symantec recommends that you use the installer to check for duplicate cluster IDs in multi-cluster environments.

    Check duplicate cluster ID

    Select the check box if you want the installer to verify if the given cluster ID is unique in your private network. The verification is performed after you specify the heartbeat details in the following pages. The verification takes some time to complete.

    LLT Type

    Select an LLT type from the list. You can choose to configure LLT over UDP or over Ethernet.

    If you choose Auto detect over Ethernet, the installer auto-detects the LLT links over Ethernet. Verify the links and click Yes in the Confirmation dialog box. Skip to step 7. If you click No, you must manually enter the details to configure LLT over Ethernet.

    Number of Heartbeats

    Choose the number of heartbeat links you want to configure.

    NICs

    Choose the NICs that you want to configure.

    Additional Low Priority Heartbeat NIC

    Select the check box if you want to configure a low priority link. The installer configures one heartbeat link as low priority link.

    Unique Heartbeat NICs per system

    For LLT over Ethernet, select the check box if you do not want to use the same NIC details to configure private heartbeat links on other systems.

    For LLT over UDP, this check box is selected by default.

    Click Next.

  6. On the Set Cluster Heartbeat page, select the heartbeat link details for the LLT type you chose on the Set Cluster Name/ID page.

    For LLT over Ethernet:

    Do the following:

    • If you are using the same NICs on all the systems, select the NIC for each private heartbeat link.

    • If you had selected Unique Heartbeat NICs per system on the Set Cluster Name/ID page, provide the NIC details for each system.

    For LLT over UDP:

    Select the NIC, Port, and IP address for each private heartbeat link. You must provide these details for each system.

    Click Next.

  7. On the Optional Configuration page, decide the optional VCS features that you want to configure. Click the corresponding tab to specify the details for each option:

    Virtual IP

    • Select the Configure Virtual IP check box.

    • If each system uses a separate NIC, select the Configure NICs for every system separately check box.

    • Select the interface on which you want to configure the virtual IP.

    • Enter a virtual IP address and value for the netmask.

      You can use an IPv4 or an IPv6 address.

    VCS Users

    • Reset the password for the Admin user, if necessary.

    • Select the Configure VCS users option.

    • Click Add to add a new user.

      Specify the user name, password, and user privileges for this user.

    SMTP

    • Select the Configure SMTP check box.

    • If each system uses a separate NIC, select the Configure NICs for every system separately check box.

    • If all the systems use the same NIC, select the NIC for the VCS Notifier to be used on all systems. If not, select the NIC to be used by each system.

    • In the SMTP Server box, enter the domain-based hostname of the SMTP server. Example: smtp.yourcompany.com

    • In the Recipient box, enter the full email address of the SMTP recipient. Example: user@yourcompany.com.

    • In the Event list box, select the minimum security level of messages to be sent to each recipient.

    • Click Add to add more SMTP recipients, if necessary.

    SNMP

    • Select the Configure SNMP check box.

    • If each system uses a separate NIC, select the Configure NICs for every system separately check box.

    • If all the systems use the same NIC, select the NIC for the VCS Notifier to be used on all systems. If not, select the NIC to be used by each system.

    • In the SNMP Port box, enter the SNMP trap daemon port: (162).

    • In the Console System Name box, enter the SNMP console system name.

    • In the Event list box, select the minimum security level of messages to be sent to each console.

    • Click Add to add more SNMP consoles, if necessary.

    GCO

    If you installed a valid HA/DR license, you can now enter the wide-area heartbeat link details for the global cluster that you would set up later.

    See the Veritas Storage Foundation Cluster File System High Availability Installation Guide for instructions to set up SFCFSHA global clusters.

    • Select the Configure GCO check box.

    • If each system uses a separate NIC, select the Configure NICs for every system separately check box.

    • Select a NIC.

    • Enter a virtual IP address and value for the netmask.

      You can use an IPv4 or an IPv6 address.

    Security

    To configure a secure SFCFSHA cluster, select the Configure secure cluster check box.

    If you want to perform this task later, do not select the Configure secure cluster check box. You can use the -security option of the installsfcfsha.

    Click Next.

  8. On the Stop Processes page, click Next after the installer stops all the processes successfully.
  9. On the Start Processes page, click Next after the installer performs the configuration based on the details you provided and starts all the processes successfully.

    If you did not choose to configure I/O fencing in step 4, then skip to step 11. Go to step 10 to configure fencing.

  10. On the Select Fencing Type page, choose the type of fencing configuration:

    Configure Coordination Point client based fencing

    Choose this option to configure server-based I/O fencing.

    Configure disk based fencing

    Choose this option to configure disk-based I/O fencing.

    Based on the fencing type you choose to configure, follow the installer prompts.

    See Configuring SFCFSHA for data integrity using the Web-based installer.

  11. Click Next to complete the process of configuring SFCFSHA.

    On the Completion page, view the summary file, log file, or response file, if needed, to confirm the configuration.

  12. Select the checkbox to specify whether you want to send your installation information to Symantec.

    Click Finish. The installer prompts you for another task.