Skip to content

Commit c1ef9bc

Browse files
Update Blog “highly-available-nfs-workload-on-hpe-greenlake-for-private-cloud-enterprise-using-serviceguard-for-linux”
1 parent fa0123d commit c1ef9bc

File tree

1 file changed

+28
-7
lines changed

1 file changed

+28
-7
lines changed

content/blog/highly-available-nfs-workload-on-hpe-greenlake-for-private-cloud-enterprise-using-serviceguard-for-linux.md

Lines changed: 28 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -401,14 +401,21 @@ cd serviceguard/ansible-sglx
401401
```
402402

403403
Checkout the stable branch. For ex: to checkout branch 1.0,
404+
405+
404406
`git checkout Stable-v1.0 `
405407

408+
``
409+
406410
To upgrade to the latest version of the playbooks:
411+
412+
407413
`git pull https://github.com/HewlettPackard/serviceguard.git`
408-
Master playbook` site.yml `contains the roles which will be executed for the inventory defined in hosts.
414+
415+
416+
Master playbook ` site.yml` contains the roles which will be executed for the inventory defined in hosts.
409417
When the master playbook is run, version specified in the parameters file will be installed. The parameters for the master playbook, roles are configured in group_vars/all.yml. We will now look into some of the fields in this file which needs to be configured.
410-
We should configure the version of Serviceguard to be installed, in this case SGLX 15.10.00 will be installed.
411-
`sglx_version : 15.10.00`
418+
We should configure the version of Serviceguard to be installed, in this case SGLX 15.10.00 will be installed. `sglx_version : 15.10.00`
412419
Now provide the Serviceguard for Linux ISO location on the controller node
413420
`sglx_inst_upg_mode: iso
414421
sglx_inst_upg_additional_params:
@@ -419,18 +426,32 @@ Next, install Serviceguard NFS add-on.
419426
`sglx_add_on_inst_upg_params:
420427
sglx_addon: nfs
421428
`Serviceguard installation mandates a replicated user configuration. As part of the installation, a replicated user for Serviceguard Manager (sgmgr) is created on the hosts and the password for the same can be configured under the below parameter.
422-
`sglx_sgmgr_password: "{{ vault_sglx_sgmgr_password }}"
423-
Ansible vault will be used to encrypt this password, run the command as below
424-
ansible-vault encrypt_string 'your_password' --name 'vault_sglx_sgmgr_password'
425-
The generated output must be substituted in
429+
`sglx_sgmgr_password: "{{ vault_sglx_sgmgr_password }}"`
430+
431+
`
432+
`Ansible vault will be used to encrypt this password, run the command as below
433+
434+
`
435+
ansible-vault encrypt_string 'your_password' --name 'vault_sglx_sgmgr_password'`
436+
437+
`
438+
`The generated output must be substituted in
439+
440+
`
426441
vault_sglx_sgmgr_password: !vault |
427442
$ANSIBLE_VAULT;1.1;AES256
428443
34363834323266326237363636613833396665333061653138623431626261343064373363656165
429444
6639383863383633643035656336336639373161323663380a303331306337396435366535313663
430445
31336636333862303462346234336138393135393363323739633661653534306162323565646561
431446
6662396366333534350a663033303862646331613765306433353632316435306630343761623237
432447
3863`
448+
449+
``
450+
451+
433452
Once these parameters are populated, one can modify the hosts file to add the 2 VMs that were provisioned earlier where the cluster will be formed, and the quorum server that was provisioned earlier. In this case, it’s as shown below
453+
454+
434455
`[sglx-storage-flex-add-on-hosts]
435456
drbd-0-808
436457
drbd-1-808`\

0 commit comments

Comments
 (0)