Configuring SFCFSHA for data integrity using the Web-based installer

After you configure SFCFSHA, you must configure the cluster for data integrity. Review the configuration requirements.

See Configuring SFCFSHA using the Web-based installer.

See About planning to configure I/O fencing.

To configure SFCFSHA for data integrity

  1. Start the Web-based installer.

    See Starting the Veritas Web-based installer.

  2. On the Select a task and a product page, select the task and the product as follows:

    Task

    I/O fencing configuration

    Product

    Storage Foundation for Cluster File System/HA

    Click Next.

  3. Verify the cluster information that the installer presents and confirm whether you want to configure I/O fencing on the cluster.
  4. On the Select Cluster page, click Next if the installer completes the cluster verification successfully.

    The installer performs the initial system verification. It checks for the system communication. It also checks for release compatibility, installed product version, platform version, and performs product prechecks.

  5. On the Select Fencing Type page, choose whether to configure disk-based fencing or server-based fencing.

    If you chose to configure disk-based fencing, go to step 7.

    If you chose to configure server-based fencing, go to step 10.

  6. In the Confirmation dialog box that appears, confirm whether your storage environment supports SCSI-3 PR.

    You can configure non-SCSI-3 server-based fencing in a virtual environment that is not SCSI-3 PR compliant.

  7. On the Configure Fencing page, the installer prompts for details based on the fencing type you chose to configure. Specify the coordination points details.

    Click Next.

  8. On the Configure Fencing page, specify the following information:

    Select a Disk Group

    Select the Create a new disk group option or select one of the disk groups from the list.

    • If you selected one of the disk groups that is listed, choose the fencing disk policy for the disk group.

      Go to step 16.

    • If you selected the Create a new disk group option, make sure you have SCSI-3 PR enabled disks, and click Yes in the confirmation dialog box.

      Click Next. Go to step 9.

  9. On the Create New DG page, specify the following information:

    New Disk Group Name

    Enter a name for the new coordinator disk group you want to create.

    Select Disks

    Select at least three disks to create the coordinator disk group.

    If you want to select more than three disks, make sure to select an odd number of disks.

    Fencing Disk Policy

    Choose the fencing disk policy for the disk group.

    Go to step 16.

  10. On the Configure Fencing page, the installer prompts for details based on the fencing type you chose to configure. Specify the coordination points details.

    Click Next.

  11. Provide the following details for each of the CP servers:

    • Enter the virtual IP addresses or host names of the virtual IP address. The installer assumes these values to be identical as viewed from all the application cluster nodes.

    • Enter the port that the CP server must listen on.

    • Click Next.

  12. If your server-based fencing configuration also uses disks as coordination points, perform the following steps:

    • If you have not already checked the disks for SCSI-3 PR compliance, check the disks now, and click OK in the dialog box.

    • If you do not want to use the default coordinator disk group name, enter a name for the new coordinator disk group you want to create.

    • Select the disks to create the coordinator disk group.

    • Choose the fencing disk policy for the disk group.

  13. In the Confirmation dialog box that appears, confirm whether the coordination points information you provided is correct, and click Yes.
  14. Verify and confirm the I/O fencing configuration information.

    The installer stops and restarts the VCS and the fencing processes on each application cluster node, and completes the I/O fencing configuration.

  15. Configure the CP agent on the SFCFSHA (application cluster), and click Next.
  16. Click Next to complete the process of configuring I/O fencing.

    On the Completion page, view the summary file, log file, or response file, if needed, to confirm the configuration.

  17. Select the checkbox to specify whether you want to send your installation information to Symantec.

    Click Finish. The installer prompts you for another task.