<div class="gmail_quote"><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">It is close to impossible to protect against malicious applications from<br>
other cluster nodes. sfex, LVM exclusive activation, and SCSI2/SCSI3<br>
reservations likewise can be broken - they must be able to be broken, or<br>
else the cluster could never orchestrate a fail-over.</blockquote><div><br>I understand your point but if we have SCSI3 protection other node will have to perform few extra steps before accessing the disk. it will have to remove to the present key, put it's new registration key , then put it's own reservation then only it can go ahead and access the disk. this way SCSI3 provide extra security unlike sfex or LVM.<br>
<br>can we configure present scsi2reservation R.A to use sg_persist command .<br><br>Thanks & Regards,<br>Priyanka.<br>
</div><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;"><div class="Ih2E3d"><br>
<br>
Regards,<br>
Lars<br>
<br>
--<br>
Teamlead Kernel, SuSE Labs, Research and Development<br>
SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nürnberg)<br>
"Experience is the name everyone gives to their mistakes." -- Oscar Wilde<br>
<br>
<br>
_______________________________________________<br>
</div><div><div></div><div class="Wj3C7c">Pacemaker mailing list<br>
<a href="mailto:Pacemaker@oss.clusterlabs.org">Pacemaker@oss.clusterlabs.org</a><br>
<a href="http://oss.clusterlabs.org/mailman/listinfo/pacemaker" target="_blank">http://oss.clusterlabs.org/mailman/listinfo/pacemaker</a><br>
</div></div></blockquote></div><br>