| | | |
R |
|
| RBAC ( ) |
| | for global zones ( ) |
| | for non-global zones ( ) |
| | rights profiles (description) ( ) |
| | tasks |
| | | adding custom roles ( ) |
| | | adding roles ( ) |
| | | modifying users ( ) |
| | | setting up ( ) |
| | | using ( ) |
|
| RBAC roles, Sun Cluster Manager ( ) |
|
| rebooting |
| | cluster ( ) |
| | node ( ) |
|
| recovery, clusters with storage-based data replication ( ) |
|
| regenerating |
| | Common Agent Container security keys ( ) |
| | security keys ( ) |
|
| registering |
| | disk group configuration changes ( ) |
| | disk groups as device groups ( ) |
|
| release information ( ) ( ) |
|
| remote login ( ) |
|
| remote mirror replication |
| | definition ( ) |
| | performing ( ) |
|
| Remote Mirroring, See storage-based replication |
|
| remote replication, See storage-based replication |
|
| removing |
| | cluster file systems ( ) |
| | device groups ( ) |
| | last quorum device ( ) |
| | nodes ( ) |
| | nodes from all device groups ( ) |
| | nodes from device groups ( ) |
| | quorum devices ( ) ( ) |
| | Solstice DiskSuite device groups ( ) |
| | storage arrays ( ) |
| | transport cables, adapters, and switches ( ) |
| | volumes from a device group ( ) |
|
| removing SNMP hosts ( ) |
|
| removing SNMP users ( ) |
|
| repairing, quorum device ( ) |
|
| repairing full /var/adm/messages file ( ) |
|
| replacing quorum devices ( ) |
|
| replication, See data replication |
|
| replication, storage-based ( ) |
|
| resource groups |
| | data replication |
| | | configuring ( ) |
| | | guidelines for configuring ( ) |
| | | role in failover ( ) |
|
| resources, displaying configured types of ( ) |
|
| restarting node ( ) |
|
| restoring |
| | cluster files ( ) |
| | encapsulated root file systems ( ) |
| | files interactively ( ) |
| | non-encapsulated root file system ( ) |
| | root file systems ( ) |
| | | from metadevice ( ) |
| | | from volume ( ) |
|
| rights profiles, RBAC ( ) |
|
| role |
| | adding custom roles ( ) |
| | adding roles ( ) |
| | setting up ( ) |
|
| Role-Based Access Control, See RBAC |