Chapter 10. Configuring fencing in a Red Hat High Availability cluster