Top
PRIMECLUSTER Installation and Administration Guide4.6 Cloud Services
FUJITSU Software

A.2.5 Post-Implementation Review

After the deployment is complete, do the following to verify that the deployment is successful.

  1. Check the security group and verify that the Blackhole security group is not misconfigured. If this setting is incorrect, data corruption may occur.

  2. Stop the instance on the cluster node and verify that the switch occurs.

  3. Ensure that the instance created by the switch in Step 2 inherits the following information from the source instance.

    • AMI ID

    • Instance type

    • Key pair name

    • Security group ID

    • Tags

    • IAM Role

    • CloudWatch Alarm

    • RMS logs

    • User shared data