Configuring Fence Devices - Red Hat ENTERPRISE LINUX 5 - ADMINISTRATION Manual

Cluster administration
Hide thumbs Also See for ENTERPRISE LINUX 5 - ADMINISTRATION:
Table of Contents

Advertisement

Chapter 5. Configuring Red Hat Cluster With system-config-cluster
Note
For more information about Post-Join Delay and Post-Fail Delay, refer to the
fenced(8) man page.
6. Save cluster configuration changes by selecting File => Save.

5.4. Configuring Fence Devices

Configuring fence devices for the cluster consists of selecting one or more fence devices and
specifying fence-device-dependent parameters (for example, name, IP address, login, and password).
To configure fence devices, follow these steps:
1. Click Fence Devices. At the bottom of the right frame (labeled Properties), click the Add a Fence
Device button. Clicking Add a Fence Device causes the Fence Device Configuration dialog
box to be displayed (refer to
Figure 5.4. Fence Device Configuration
2. At the Fence Device Configuration dialog box, click the drop-down box under Add a New Fence
Device and select the type of fence device to configure.
3. Specify the information in the Fence Device Configuration dialog box according to the type of
fence device. Refer to
device parameters.
4. Click OK.
5. Choose File => Save to save the changes to the cluster configuration.
54
Figure 5.4, "Fence Device
Appendix B, Fence Device Parameters
Configuration").
for more information about fence

Advertisement

Table of Contents
loading

Table of Contents