HP Data Protector V6.0 Installation Guide

HP
Data Protector
software
A.06.00
Index
Introduction......................................................................................................................................... 3
Installation of Veritas Cluster products .................................................................................................... 3
Configuring SSH or remsh before installing products ............................................................................ 3
Enabling SSH............................................................................................................................... 4
Enabling remsh ............................................................................................................................ 5
Installation methods for Veritas Cluster products ...................................................................................... 6
Using Product Installer................................................................................................................... 6
Installation options........................................................................................................................ 8
Invoking product installation scripts from the command line ............................................................... 8
Installation of Data Protector Cell Manager on a cluster............................................................................ 8
Veritas Cluster Integration ................................................................................................................. 9
Licensing and VERITAS Cluster........................................................................................................... 9
Installation of Cell Manager on Veritas Cluster .................................................................................... 9
Prerequisites for Installation............................................................................................................ 9
Steps before installation of Cell Manager........................................................................................ 9
Prerequisites .............................................................................................................................. 10
Setting Kernel Parameters............................................................................................................ 11
Installation Procedure.................................................................................................................. 11
Installing a Cluster-Aware Client................................................................................................... 13
Prerequisites .............................................................................................................................. 13
Installation procedure.................................................................................................................. 14
Importing a Cluster Aware Client.................................................................................................. 14
Configuration of Data Protector Cell Manager on cluster ........................................................................ 14
Prerequisites for Configuration ..................................................................................................... 14
Configuring the Primary and Secondary Cell Managers ......................................................................... 15
Configuring the Primary Cell Manager ................................................................................................. 15
Configuring the secondary Cell Manager ............................................................................................. 15
For More Information ......................................................................................................................... 16
2
Introduction
This document describes how to install and configure Data Protector 06.00 Cell Manager with Veritas Cluster on an HP-UX 11.23 platform.
Veritas Cluster Server by Symantec software is a high-availability solution for cluster configuration. Veritas Cluster Server (VCS) monitors system and application services, and restart services when hardware or software fails, See Figure 1 for more details.
Figure 1: Veritas Cluster Server Configuration
Installation of Veritas Cluster products
The following section describes the installation of Veritas cluster products.
Configuring SSH or remsh before installing products
You can install Veritas products to a remote system by using secure shell (SSH) or remote shell (remsh). SSH is the default and recommended method of installation.
Enabling SSH
The SSH program enables you to log into and execute commands on a remote system. SSH enables encrypted communications and an authentication process between two un-trusted hosts over an insecure network. SSH is the preferred method of remote communication because it provides a greater level of security than the remote shell suite of protocols. The following is an example of an SSH setup procedure:
1. Log in as root on the source system from which you want to install the Veritas product.
2. To generate a DSA key pair on the source system, enter:
# ssh-keygen -t dsa S
The system displays the following output:
Generating public/private dsa key pair.
Enter file in which to save the key (//.ssh/id_dsa):
3. Press Enter to accept the default location of /.ssh/id_dsa.
System output similar to the following is displayed:
Enter pass phrase (empty for no pass phrase):
4. Do not enter a pass phrase.
Press Enter: Enter same pass phrase again:
Press Enter again.
5. Ensure that the /.ssh directory is on all the target installation systems. If that directory is missing,
create it on the target system and set the write permission to root only:
# mkdir /.ssh# chmod go-w /.ssh
6. Ensure that the Secure file transfer program (SFTP) is enabled on all the target installation systems.
To enable SFTP, the /opt/ssh/etc/sshd_config file must contain the following two lines:
PermitRootLogin yes Subsystem
sftp /opt/ssh/libexec/sftp-server If the lines are not there, add them
7. Restart SSH:
# /sbin/init.d/secsh start
8. To copy the public DSA key, /.ssh/id_dsa.pub to each target system, type the following
commands:
# sftp target_sys
If this is the first time this command is run on a system, the following output is displayed:
Connecting to target_sys...
The authenticity of host 'target_sys (10.182.00.00)' can't be established. DSA key fingerprint is fb:6f:9e:61:91:9e:44:6b:87:86:ef:68:a6:fd:87:7d.
Are you sure you want to continue connecting (yes/no)?
9. Enter yes. Output similar to the following is displayed:
Warning: Permanently added 'target_sys,10.182.00.00'(DSA) to the list of known hosts.root@target_sys password:
10.Enter the root password.
11.At the sftp prompt, type the following command:
sftp> put /.ssh/id_dsa.pub
The following output is displayed:
Uploading /.ssh/id_dsa.pub to /id_dsa.pub
12.To quit the SFTP session, enter:
sftp> quit
13.To begin the ssh session on the target system, enter:
# ssh target_sys
14.Enter the root password at the prompt: password:
15.After logging in, enter the following command to append the authorization key to the id_dsa.pub
file:
# cat /.ssh/id_dsa.pub >> /.ssh/authorized_keys
16.To delete the id_dsa.pub public key file after it is copied to the target (host) system and added to
the authorized keys file, enter:
# rm /id_dsa.pub
17.To log out of the ssh session, enter:
# exit
18.When installing from a source system that is also an installation target, add the local system
id_dsa.pub key to the local /.ssh/authorized_key file:
# cat /.ssh/id_dsa.pub >> /.ssh/authorized_keys
The installation can fail if the installation source system is not authenticated
19.Run the following commands on the source installation system. These commands bring the private
key into the shell environment and make the key globally available for the user root:
# exec /usr/bin/ssh-agent $SHELL# ssh-addIdentity added: /.ssh/identity
This is a shell-specific step and is valid only while the shell is active. You must execute the procedure again if you close the shell during the session.
20.To verify that you can connect to the target system, Enter:
# ssh -l root target_sys uname –a
The commands are executed on the remote system without the system requesting a pass phrase or password.
For more information about enabling SSH, see the
pages” and OpenSSH website
.
SSH documentation and online manual
Contact your OS support provider for issues regarding SSH configuration.
Enabling remsh
Remote shell functionality is automatically enabled after the installation of the VERITAS Cluster Products on an HP-UX system.
To enable remote installation modify the .rhosts file in the $HOME directory for each user to remotely access the system using remsh.
Each line in the .rhosts file must contain a fully qualified domain name or IP address for each remote
system that has access to the local system.
For example, if the root user must remotely access system1 from system2, add an entry for system2.companyname.com to the .rhosts file on system1.
# echo "system2.companyname.com" >> $HOME/.rhosts
After completion of the installation procedure, to ensure security, delete the .rhosts file from each user’s $HOME directory.
# rm -f $HOME/.rhosts
Loading...
+ 11 hidden pages