After you configure SFHA with the installer, you must configure I/O fencing in the cluster for data integrity. Application clusters on release version 6.2 (HTTPS-based communication) only support CP servers on release version 6.1 and later.
You can configure disk-based I/O fencing, server-based I/O fencing, or majority-based I/O fencing. If your enterprise setup has multiple clusters that use VCS for clustering, Symantec recommends you to configure server-based I/O fencing.
The coordination points in server-based fencing can include only CP servers or a mix of CP servers and coordinator disks.
Symantec also supports server-based fencing with a single coordination point which is a single highly available CP server that is hosted on an SFHA cluster.
You use majority fencing mechanism if you do not want to use coordination points to protect your cluster. Symantec recommends that you configure I/O fencing in majority mode if you have a smaller cluster environment and you do not want to invest additional disks or servers for the purposes of configuring fencing.
If you have installed SFHA in a virtual environment that is not SCSI-3 PR compliant, you can configure non-SCSI-3 fencing.
See Figure: Workflow to configure non-SCSI-3 I/O fencing.
Figure: Workflow to configure I/O fencing illustrates a high-level flowchart to configure I/O fencing for the SFHA cluster.
Figure: Workflow to configure non-SCSI-3 I/O fencing illustrates a high-level flowchart to configure non-SCSI-3 I/O fencing for the SFHA cluster in virtual environments that do not support SCSI-3 PR.
After you perform the preparatory tasks, you can use any of the following methods to configure I/O fencing:
Using the installsfha |
See Setting up disk-based I/O fencing using installsfha. See Setting up server-based I/O fencing using installsfha. See Setting up non-SCSI-3 I/O fencing in virtual environments using installsfha. See Setting up majority-based I/O fencing using installsfha. |
Using the web-based installer |
See Configuring SFHA for data integrity using the web-based installer. |
Using response files |
See Response file variables to configure disk-based I/O fencing. See Response file variables to configure server-based I/O fencing. See Response file variables to configure non-SCSI-3 I/O fencing. See Response file variables to configure majority-based I/O fencing. |
Manually editing configuration files |
See Setting up disk-based I/O fencing manually. See Setting up server-based I/O fencing manually. See Setting up non-SCSI-3 fencing in virtual environments manually. |
You can also migrate from one I/O fencing configuration to another.
See the Symantec Storage foundation High Availability Administrator's Guide for more details.