Veritas InfoScale™ 8.0.2 Installation Guide - Linux
- Section I. Planning and preparation
- Introducing Veritas InfoScale
- Licensing Veritas InfoScale
- System requirements
- Preparing to install
- Setting up the private network
- Setting up shared storage
- Planning the installation setup for SF Oracle RAC systems
- Preparing for deployment in a Secure Boot environment
- Section II. Installation of Veritas InfoScale
- Installing Veritas InfoScale using the installer
- Installing Veritas InfoScale using response files
- Installing Veritas Infoscale using operating system-specific methods
- Completing the post installation tasks
- Section III. Uninstallation of Veritas InfoScale
- Section IV. Installation reference
- Appendix A. Installation scripts
- Appendix B. Tunable files for installation
- Appendix C. Troubleshooting installation issues
- Appendix D. Managing InfoScale digital signatures (Secure Boot environment)
Get the InfoScale cryptographic public keys (for Secure Boot-enabled systems)
This requirement is applicable only if you plan to deploy Veritas InfoScale on the systems where the Secure Boot feature is enabled.
InfoScale kernel modules are digitally signed using public-private key pairs. You must obtain the InfoScale cryptographic public keys and then enroll the keys on each system where you intend to install InfoScale. The operating system kernel validates the digital signatures and authenticates the integrity of the kernel modules. You must download and enroll the keys on each system before you install and configure InfoScale.
You can obtain the InfoScale public keys using any of the methods described here.
You can download the InfoScale public key directly from SORT.
To get the public key from SORT
- Download the public key from the following URL:
- Validate the integrity of the file using the SHA256sum algorithm method.
Run the following command:
# sha256sum pubkey.der
The command displays an output in the following format:
hashvalue pubkey.der
Here, hashvalue is an alpha numeric sequence that represents the SHA256 checksum and is unique to the public key file.
For example,
bd00eeb8b4c0e63f1062aa0d pubkey.der
The hash value displayed here in the example is just for reference; the actual hash value for the file will vary.
- Compare the hash value with the SHA256sum hash value displayed on the following URL:
https://sort.veritas.com/infoscale_key
If the file hash values match, it confirms that the file is authentic and has not been tampered with.
You can now import the file on the InfoScale nodes.
See Preparing for deployment in a Secure Boot environment.
You can retrieve the InfoScale public key from the VRTSveki
rpm package that is included with the InfoScale software.
To extract the public key from VRTSveki
- Download the InfoScale software image.
- Locate and copy the
VRTSveki
rpm file to a temporary directory.The name of the
VRTSveki
rpm may vary depending on the InfoScale release version. For example, for version 8.0.2, the rpm file name is "VRTSveki-8.0.2.0000-RHEL8.x86_64.rpm
". - Extract the public key from the rpm file.
Run the following command from the location where you copied the rpm file:
# rpm2cpio VRTSveki-8.0.2.0000-RHEL8.x86_64.rpm | cpio -dimv ./etc/vx/kernel/infoscale-pubkey.der
The output displays the following:
./etc/vx/kernel/infoscale-pubkey.der 12705 blocks
Here, "
infoscale-pubkey.der
" is the InfoScale cryptographic public key and it is saved in the directory/etc/vx/kernel
. - If required, copy the key to a different location and then rename the file as
pubkey.der
.Type the following command:
# mv infoscale-pubkey.der pubkey.der
You can now import the file on the InfoScale nodes.