Service and support . . ...... . . ...... . ...... . . ...... . . ...... . ..... . . . ...... . . ...... . ....... 27
Product overview
This chapter includes the following topics:
■ About Veritas Storage Foundation and High Availability products
■ Component software
■ Veritas Storage Foundation
■ Veritas Storage Foundation for Oracle
■ Storage Foundation Cluster File System
■ Storage Foundation for Oracle RAC
Chapter
1
About Veritas Storage Foundation and High
Availability products
The following sections describe the products and component software available
in this Veritas Storage Foundation and High Availability Solutions release.
Component software
The following component software are available in this Veritas Storage Foundation
and High Availability Solutions release.
Symantec Product Authentication Service
The Symantec Product Authentication Service is a common Symantec feature.
This feature validates the identities that are based on existing network operating
system domains (such as NIS and NT) or private domains. The authentication
Product overview
10
Veritas Storage Foundation
service protects communication channels among Symantec application clients
and services through message integrity and confidentiality services.
Before you install the authentication service, read the Storage Foundation and
High Availability Solutions appendix in the Symantec Product AuthenticationService Installation Guide.
This document is located at the following directory in the release media.
authentication_service/docs/vxat_install.pdf
Before you select this method of setting up the authentication service, also read
the product installation guide and release notes.
Storage Foundation Management Server
Storage Foundation Management Server (SF Management Server) provides a
centralized management console for Veritas Storage Foundation products. You
can use SF Management Server to monitor, visualize, and manage storage resources
and generate reports about those resources. SF Management Server is not available
on the Storage Foundation and High Availability Solutions release and must be
obtained separately. For information on ordering SF Management Server, visit
the following URL:
www.symantec.com/enterprise/sfms
Veritas Storage Foundation
Before you install this product, complete the following tasks:
■ Read the product release notes.
■ Review the preliminary information.
■ Follow the instructions in the Storage Foundation Installation Guide.
These documents are located at the following directories in the release media.
storage_foundation/docs/sf_notes.pdf
storage_foundation/docs/sf_install.pdf
About this product
Veritas Storage Foundation by Symantec includes Veritas File System by Symantec
(VxFS) and Veritas Volume Manager by Symantec (VxVM) with various feature
levels.
Veritas Storage Foundation for Oracle
Veritas File System is a high performance journaling file system that provides
easy management and quick-recovery for applications. Veritas File System delivers
scalable performance, continuous availability, increased I/O throughput, and
structural integrity.
Veritas Volume Manager removes the physical limitations of disk storage. You
can configure, share, manage, and optimize storage I/O performance online
without interrupting data availability. Veritas Volume Manager also provides
easy-to-use, online storage management tools to reduce downtime.
VxFS and VxVM are included in all Veritas Storage Foundation products. If you
have purchased a Veritas Storage Foundation product, VxFS and VxVM are
installed and updated as part of that product. Do not install or update them as
individual components.
Veritas Storage Foundation has the following products:
■ Storage Foundation Standard
■ Storage Foundation Enterprise
The Veritas products table lists the optionally licensed features available with
each Storage Foundation version.
11Product overview
Veritas Storage Foundation for Oracle
Before you install this product, complete the following tasks:
■ Read the product release notes.
■ Review the preliminary information.
■ Follow the instructions in the Storage Foundation Installation Guide.
These documents are located at the following directories in the release media.
storage_foundation/docs/sf_notes.pdf
storage_foundation/docs/sf_install.pdf
About Veritas Storage Foundation for Oracle®
Veritas Storage Foundation for Oracle® by Symantec is an integrated set of system
software enhancements and configuration guidelines. The enhancements and
guidelines help Oracle database administrators configure a database system with
high performance, availability, manageability, and reliability.
Product overview
12
Storage Foundation Cluster File System
Storage Foundation Cluster File System
Before you install this product, complete the following tasks:
■ Read the product release notes.
■ Review the preliminary information.
■ Follow the instructions in the Storage Foundation Installation Guide.
These documents are located at the following directories in the release media.
About Veritas Storage Foundation Cluster File System
Veritas Storage Foundation Cluster File System by Symantec extends Veritas File
System and Veritas Volume Manager to support shared data in a storage area
network (SAN) environment. Using Storage Foundation Cluster File System,
multiple servers can concurrently access shared storage and files transparently
to applications.
Storage Foundation Cluster File System HA adds the failover functionality. This
functionality can protect everything from a single critical database instance to
very large multiple-application clusters in networked environments. Veritas
Storage Foundation Cluster File System also provides increased automation and
intelligent management of availability and performance.
Storage Foundation for Oracle RAC
Before you install this product, review the preliminary information.
Before you start the installation, read the component product release notes and
installation guide.
These documents are located at the following directories in the release media.
Veritas Storage Foundation for Oracle® RAC is an integrated suite of Veritas
storage management and high-availability software. The software is engineered
to improve performance, availability, and manageability of Real Application
Storage Foundation for Oracle RAC
Cluster (RAC) environments. Certified by Oracle Corporation, Veritas Storage
Foundation for Oracle RAC delivers a flexible solution that makes it easy to deploy
and manage RAC.
13Product overview
Product overview
14
Storage Foundation for Oracle RAC
Chapter
How the discs are organized
This chapter includes the following topics:
■ Contents of the software discs in the media kit
■ Disc directory structure
Contents of the software discs in the media kit
The Veritas Storage Foundation and High Availability Solutions media kit includes
multiple software media. The contents of each software media is shown on the
media label.
Find the location of the Getting Started Guide and Release Notes for each product
in the corresponding product sections. Read the Getting Started Guide and ReleaseNotes for your product before you begin the installation procedure.
You can install only those Symantec software products for which you have
purchased a license. Other products are included on the enclosed software media,
but are not available.
2
Contents of the product disc
The following products are on the product disc:
■ Veritas File System
■ Veritas Volume Manager
■ Veritas Storage Foundation
■ Symantec Product Authentication Service
How the discs are organized
16
Disc directory structure
Disc directory structure
Table 2-1 lists the directory and contents of the Veritas Storage Foundation and
High Availability Solutions disc.
Table 2-1
authentication_service
getting_started.pdf
storage_foundation
storage_foundation
_cluster_file_system
Storage Foundation and High Availability Solutions disc directories
ContentsDirectory name or file name
The third-party legal notices documentation3rdpartyattributions.pdf
Symantec Authentication Services scripts and
documentation
Veritas product packagesdepot
Veritas File System scriptsfile_system
The Veritas Storage Foundation and High Availability
Solutions Getting Started Guide
Perl language binaries and library functionsperl
The readme end user license agreement documentationREADME_EULA
The Veritas Storage Foundation readme first filereadme_first.txt
Veritas Storage Foundation, Veritas File System, and
Veritas Volume Manager packages, scripts, and
documentation
Veritas Storage Foundation, Veritas File System, and
Veritas Volume Manager packages, scripts, and
documentation
storage_foundation_
for_oracle
storage_foundation
_for_oracle_rac
Veritas Storage Foundation for Oracle packages, scripts,
and documentation
Veritas Storage Foundation for Oracle RAC tools, scripts,
and documentation.
Veritas Volume Manager packages and scriptsvolume_manager
Chapter
Installation overview
This chapter includes the following topics:
■ Documentation references, before you install
■ Performing preinstallation checks and configuration
■ Configuring secure shell (ssh) or remote shell before installing products
■ Mounting a software disc
■ Downloading the Storage Foundation and High Availability software
■ Copying and unzipping the downloaded release
3
Documentation references, before you install
Before you install this product, become familiar with the following documentation:
■ Review the product release notes and getting started guide
■ Review the preliminary information
■ Read the instructions in the Storage Foundation Installation Guide
Performing preinstallation checks and configuration
This installation guide is designed for system administrators who already have a
knowledge of basic UNIX system and network administration. Basic knowledge
includes commands such as tar, mkdir, and simple shell scripting. Also required
is basic familiarity with the specific platform and the operating system where
Storage Foundation is installed.
If you already have an earlier version of any of the Veritas products installed,
refer to the upgrade procedures.
Installation overview
18
Configuring secure shell (ssh) or remote shell before installing products
Only users with superuser (root) privileges can install, upgrade, and initialize
Veritas Storage Foundation.
Review the preinstallation requirements and system requirements. Install the
operating system before installing the Veritas software.
The product documentation is available at the following location:
If patches to the HP-UX operating system are required, the patches must be applied
prior to installing the Veritas products. Patches may be required to resolve HP-UX
kernel, product performance, or other issues. Patches may be required for Veritas,
HP-UX, or Oracle software.
The system must be in a quiescent state before adding patches.
See the product Release Notes for last minute information on recommended
patches.
You must obtain new licenses to use all of the features in the Veritas Storage
Foundation software. Any Veritas licenses for the previous releases that are
currently installed allow you to use only a limited subset of these features.
For remote installation, or installation on multiple systems, set up remsh or ssh.
See “Configuring secure shell (ssh) or remote shell before installing products ”
on page 18.
Mount the Veritas software disc, or download and uncompress the Storage
Foundation software.
See “Mounting a software disc ” on page 24.
See “Downloading the Storage Foundation and High Availability software ”
on page 24.
Configuring secure shell (ssh) or remote shell before
installing products
You must establish communication between the nodes to install the Veritas
software from a remote system, or install and configure a cluster. The node from
which the installation utility is run must have permissions to run remsh (remote
Source System: system1
Target System: system2
Private
Key
Public
Key
authorized_keys
file
Configuring secure shell (ssh) or remote shell before installing products
shell) or ssh (secure shell) utilities. These utilities must run as root on all cluster
nodes or remote systems.
You can install products to remote systems using either secure shell (ssh) or
remote shell (remsh).Using ssh is the default, and is recommended, to configure
a secure shell environment before you install any Veritas product.
This section contains an example on how to set up the ssh password free
communication. The example sets up ssh between a source system (system1)
that contains the installation directories, and a target system (system2). This
procedure also applies to multiple target systems.
Configuring and enabling ssh
The ssh program enables you to log in and execute commands on a remote system.
ssh enables encrypted communication and an authentication process between
two untrusted hosts over an insecure network.
In this procedure, you must first create a DSA key pair. From the key pair, you
must append the public key from the source system to the authorized_keys file
on the target system or systems.
Figure 3-1 illustrates this procedure.
19Installation overview
Figure 3-1
Creating the DSA key pair and appending it to target systems
Read the ssh documentation and online manual pages before enabling ssh. For
information related to issues regarding ssh configuration contact your operating
system support provider.
Visit the OpenSSH website that is located at: http://openssh.org to access online
manuals and other resources.
Installation overview
20
Configuring secure shell (ssh) or remote shell before installing products
To create the DSA key pair
On the source system (system1), log in as root, and navigate to the root
1
directory.
system1 # cd /
To generate a DSA key pair on the source system, type the following command:
2
system1 # ssh-keygen -t dsa
System output similar to the following is displayed:
Generating public/private dsa key pair.
Enter file in which to save the key (//.ssh/id_dsa):
Press Enter to accept the default location: /.ssh/id_dsa.
3
When the program asks you to enter the passphrase, press the Enter key
4
twice.
Enter passphrase (empty for no passphrase):
Do not enter a passphrase. Press Enter.
Enter same passphrase again:
Press Enter again.
Make sure the /.ssh directory is on all the target installation systems (system2
5
in this example). If that directory is not present, create it on all the target
systems and set the write permission to root only:
system2 # mkdir /.ssh
Change the permissions of this directory, to secure it.
system2 # chmod go-w /.ssh
Configuring secure shell (ssh) or remote shell before installing products
To append the public key from the source system to the authorized_keys file on
the target system, using secure file transfer
Make sure the Secure File Transfer Program (SFTP) is enabled on all the target
1
installation systems (system2 in this example).
To enable SFTP, the /opt/ssh/etc/sshd_config file must contain the
following two lines:
PermitRootLoginyes
Subsystemsftp/opt/ssh/libexec/sftp-server
If the lines are not there, add them and restart ssh:
2
system1 # /sbin/init.d/secsh start
From the source system (system1), move the public key to a temporary file
3
on the target system (system2).
Use the secure file transfer program.
In this example, the file name id_dsa.pub in the root directory is the name
of the temporary file for the public key.
Use the following command for secure file transfer:
21Installation overview
system1 # sftp system2
If the secure file transfer is set up for the first time on this system, output
similar to the following lines is displayed:
Connecting to system2 ...
The authenticity of host 'system2 (10.182.00.00)'
can't be established. DSA key fingerprint is
fb:6f:9f:61:91:9d:44:6b:87:86:ef:68:a6:fd:88:7d.
Are you sure you want to continue connecting (yes/no)?
Enter yes.
4
Output similar to the following is displayed:
Warning: Permanently added 'system2,10.182.00.00'
(DSA) to the list of known hosts.
root@system2 password:
Enter the root password of system2.
5
Installation overview
22
Configuring secure shell (ssh) or remote shell before installing products
At the sftp prompt, enter the following command:
6
sftp> put /.ssh/id_dsa.pub
The following output is displayed:
Uploading /.ssh/id_dsa.pub to /id_dsa.pub
To quit the SFTP session, enter the following command:
7
sftp> quit
To begin the ssh session on the target system (system2 in this example), enter
8
the following command on system1:
system1 # ssh system2
Enter the root password of system2 at the prompt:
password:
After you log in to system2, enter the following command to append the
Run the following commands on the source installation system. If your ssh
13
session has expired or terminated, you can also run these commands to renew
the session. These commands bring the private key into the shell environment
and make the key globally available to the root user:
system1 # exec /usr/bin/ssh-agent $SHELL
system1 # ssh-add
Identity added: //.ssh/id_dsa
This shell-specific step is valid only while the shell is active. You must execute
the procedure again if you close the shell during the session.
To verify that you can connect to a target system
23Installation overview
Enabling remsh
On the source system (system1), enter the following command:
1
system1 # ssh -l root system2 uname -a
where system2 is the name of the target system.
The command should execute from the source system (system1) to the target
2
system (system2) without the system requesting a passphrase or password.
Repeat this procedure for each target system.
3
Remote shell functionality is enabled automatically after installing HP-UX.
Typically, the only requirement to enable remote installations is to modify the
.rhosts file. A separate .rhosts file is in the $HOME directory of each user. You
must modify this file for each user who remotely accesses the system using remsh.
Each line of the .rhosts file must contain a fully qualified domain name or IP
address for each remote system that has access to the local system. For example,
if the root user must remotely access system1 from system2, add an entry for
system2.companyname.com to the /.rhosts file on system1.
# echo "system2.companyname.com" >> $HOME/.rhosts
Installation overview
24
Mounting a software disc
After you complete an installation procedure, delete the .rhosts file from each
user’s $HOME directory to ensure security:
# rm -f $HOME/.rhosts
For more information on configuring the remote shell, see the operating system
documentation and the remsh(1M) manual page .
Mounting a software disc
Veritas software is provided on a disc.
To mount the software disc
Place the Veritas software disc into a DVD drive connected to your system
1
and log in as superuser.
Determine the block device file for the DVD drive:
2
# ioscan -fnC disk
Make a note of the device file as it applies to your system.
Create a directory in which to mount the software disc and mount the disc