> sfex actually depends on the contraints from pacemaker to ensure the
> data integrity,
> and LVM doesn't secure data integrity until clustered locking is enabled.
can you explain bit more about the constraints and how can we enable cluster
locking
> can we configure present scsi2reservation R
Thanks for reply Dejan,
This scsi2reservation provide scsi2 resevation not scsi3 . i am interested
in persistent reservation which can be implemented by sg_persist command.
scsi2reservation uses scsi_reserve command. please let me know if there is
any way to use persistent reservation.
Thanks aga
On Tue, Feb 24, 2009 at 09:40, Matthew Turnbull
wrote:
>
>> > 01:
>> > 02:
>> > 03: > type="pingd">
>> > 04: > id="mips-node-vh10-instance_attributes" score="10">
>> > 05:
>> > 06: > attribute="#uname" operation="eq" value="vh10"/>
>> > 07:
>> > 08:
Hi,
On Wed, Feb 18, 2009 at 09:46:59AM +0530, Glory Smith wrote:
> Hi All ,
> It really stange that i have not got any reply .. i am just asking one
> simple question does suse 11 openais-pacemaker cluster support persistent
> reservation as one of a fencing method or not.
> you have to just say y
> > 01:
> > 02:
> > 03: type="pingd">
> > 04: id="mips-node-vh10-instance_attributes" score="10">
> > 05:
> > 06: attribute="#uname" operation="eq" value="vh10"/>
> > 07:
> > 08: name="multiplier" value="3000"/>
> > 09:
> > 10:
>
Actually it should be s/9/TERM/
Applied, thanks!
On Wed, Feb 18, 2009 at 10:58, Dominik Klein wrote:
> While playing with pingd for the updated howto on resources on different
> networks
> (http://www.clusterlabs.org/wiki/Pingd_with_resources_on_different_networks),
> I found that the pingd attri
2009/2/20 Glory Smith :
> Thanks Lar for reply,
>>
>> The SBD mechanism provides a way to fence errant nodes. The cluster
>> manager itself ensures that it does not activate the resource several
>> times.
>
> my concern is suppose SBD resource is running on say node1 even then node2
> who is member
Here's the attachment... Sorry for push the "sending" button too early.
2009/2/24 Xinwei Hu :
> Hi Priyanka,
>
> 2009/2/22 Priyanka Ranjan :
>>> It is close to impossible to protect against malicious applications from
>>> other cluster nodes. sfex, LVM exclusive activation, and SCSI2/SCSI3
>>> res
Hi Priyanka,
2009/2/22 Priyanka Ranjan :
>> It is close to impossible to protect against malicious applications from
>> other cluster nodes. sfex, LVM exclusive activation, and SCSI2/SCSI3
>> reservations likewise can be broken - they must be able to be broken, or
>> else the cluster could never o