Configuring the remaining nodes

On each of the remaining nodes in the cluster, perform the following steps.

To configure security on each remaining node

  1. Ensure that you are logged in as superuser.
  2. Enter the following command:
    # /opt/VRTS/install/installer -securityonenode

    The installer lists information about the cluster, nodes, and service groups. If VCS is not configured or if VCS is not running on all nodes of the cluster, the installer prompts whether you want to continue configuring security. It then prompts you for the node that you want to configure. Enter 2.

    VCS is not running on all systems in this cluster. All VCS systems
    must be in RUNNING state. Do you want to continue? [y,n,q] (n) y
    1) Perform security configuration on first node and export 
    security configuration files.
    2) Perform security configuration on remaining nodes with 
    security configuration files.
    Select the option you would like to perform [1-2,q.?]  2
    Enter the security conf file directory: [b]

    The installer completes the secure configuration on the node. It specifies the location of log files, summary file, and response file.