Cybersecurity
DevOps Cloud
IT Operations Cloud
The good result at this point should look similar to the following:
With it we specify the volume group created above and also, quite important, the option "–exclusive=true". Then, it is also important to specify with a order constraint the order the two groups must be started. In fact, the "clone-base-group" has to started before and stopped after the "sentinel-group".
#SERVER_IP=$(/sbin/ifconfig | grep bond -A 2 | grep 'inet' | grep -v 'inet6' | grep -v '127.0.0' | head -1 | cut -d: -f2 | awk '{print $1}')
SERVER_IP=192.168.43.103