Buscar

Este contenido no está disponible en el idioma seleccionado.

5.3. HP iLO Fence Device Configuration Procedure

download PDF
This section provides the procedure for adding an HP iLO fence device to each node of cluster hpiloclust. Each node of hpiloclust is managed by its own HP iLO management board.
Use the following procedure to configure the HP iLO management board as the fence device for node clusternode1.example.com using Conga:
  1. As an administrator of luci Select the cluster tab. This displays the Choose a cluster to administer screen.
  2. From the Choose a cluster to administer screen, you should see the previously configured cluster hpiloclust displayed, along with the nodes that make up the cluster. Click on clusternode1.example.com. This displays the configuration screen for node clusternode1.example.com.
  3. At the Main Fencing Method display, click Add a fence device to this level. This causes a dropdown manu to display.
  4. From the dropdown menu, under Create a new Fence Device, select HP iLO. This displays a fence device configuration menu, as shown in Figure 5.2, “Creating an HP iLO Fence Device”.
    Creating an HP iLO Fence Device

    Figure 5.2. Creating an HP iLO Fence Device

  5. For Name, enter hpilofence1.
  6. For Hostname, enter hpilohost1.
  7. For Login, enter hpilologin.
  8. For Password, enter hpilopword.
  9. For Password Script, leave the field blank.
  10. For Use SSH, leave the field blank. You would check this box of your system uses SSH to access the HP iLO management board.
  11. Click Update main fence properties. This causes a confirmation screen to be displayed.
  12. On the confirmation screen, click OK. After the fence device has been added, a progress page is displayed after which the display returns to the configuration page for clusternode1.example.com in cluster hpiloclust.
After configuring an HP iLO fence device for clusternode1.example.com, use the following procedure to configure an HP iLO fence device for clusternode2.example.com.
  1. From the configuration page for clusternode1.example.com, a menu appears on the left of the screen for cluster hpiloclust. Select the node clusternode2.example.com. The configuration page for clusternode2.example.com appears, with no fence device configured.
  2. At the Main Fencing Method display, click Add a fence device to this level. This causes a dropdown manu to display.
  3. From the dropdown menu, under Create a new Fence Device, select HP iLO. This displays a fence device configuration menu.
  4. For Name, enter hpilofence2.
  5. For Hostname, enter hpilohost2.
  6. For Login, enter hpilologin.
  7. For Password, enter hpilopword.
  8. For Password Script, leave the field blank.
  9. For Use SSH, leave the field blank.
  10. Click Update main fence properties. This causes a confirmation screen to be displayed.
  11. On the confirmation screen, click OK. After the fence device has been added, a progress page is displayed after which the display returns to the configuration page for clusternode1.example.com in cluster hpiloclust.
After configuring hpilofence2 as the fencing device for clusternode2.example.com, select node clusternode3.example.com from the menu on the left side of the page and configure an HP iLO fence device for that node using the same procedure as you did to configure the fence devices for clusternode2.example.com and clusternode3.example.com. For clusternode3.example.com , use hpilofence3 as the name of the fencing method and hpilohost3 as the host name. Otherwise, use the same values for the fence device parameters.
Red Hat logoGithubRedditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

© 2024 Red Hat, Inc.