Please enter search query.
Search <book_title>...
Veritas Access Installation Guide
Last Published:
2021-08-04
Product(s):
Access (7.4.2.400)
Platform: Linux
- Licensing in Veritas Access
- System requirements
- System requirements
- Linux requirements
- Network and firewall requirements
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About managing the NICs, bonds, and VLAN devices
- About VLAN tagging
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading the operating system and Veritas Access
- Migrating from scale-out and erasure-coded file systems
- Migrating LLT over Ethernet to LLT over UDP
- Performing a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Configuring the secure shell for communications
- Appendix C. Manual deployment of Veritas Access
Configuring I/O fencing
Veritas Access supports two fencing modes:
Disk-based fencing
Majority-based fencing
If the cluster includes shared storage, during installation you are prompted to configure either disk-based or majority-based I/O fencing. You must choose a minimum of three available VxVM disks or initialize three disks as VxVM disks to form the fencing disk group. Ensure that you choose an odd number of disks for configuring fencing.
If the cluster does not have shared storage, majority-based fencing is configured automatically during the installation and you are not prompted to specify any option.