Veritas InfoScale™ 8.0 Release Notes - Windows
- Release notes for Veritas InfoScale
- Changes introduced in 8.0
- Limitations
- Deployment limitations
- Cluster management limitations
- Storage management limitations
- Multi-pathing limitations
- Replication limitations
- Solution configuration limitations
- Internationalization and localization limitations
- Interoperability limitations
- Known issues
- Deployment issues
- Cluster management issues
- Cluster Server (VCS) issues
- Cluster Manager (Java Console) issues
- Global service group issues
- VMware virtual environment-related issues
- Cluster Server (VCS) issues
- Storage management issues
- Storage Foundation issues
- VEA console issues
- Snapshot and restore issues
- Snapshot scheduling issues
- Storage Foundation issues
- Multi-pathing issues
- Replication issues
- Solution configuration issues
- Disaster recovery (DR) configuration issues
- Fire drill (FD) configuration issues
- Quick recovery (QR) configuration issues
- Internationalization and localization issues
- Interoperability issues
- Miscellaneous issues
- Fibre Channel adapter issues
- Deployment issues
Improved VCS password encryption
The vcsencrypt -gensecinfo command is updated to generate only an encryption key and store it in the SecInfo256 attribute in the main.cf
file. The initialization vector (IV) is now generated during encryption, and then the IV and the corresponding encrypted password are stored in the new IV256List attribute as a key-value pair.
Note:
You must run vcsencrypt -gensecinfo before encrypting any passwords.
IV256List gets added to or updated in main.cf
when a user encrypts the VCS password or an agent password by using the vcsencrypt -vcs or the vcsencrypt -agent command respectively. The attribute also gets added or updated when a cluster user is added by using the hauser -add command, in case of non-secure clusters.
Note:
You no longer need to run haconf -dump to update the configuration after any of these three commands are run. The vcsencrypt
utility itself handles the update.
You can not modify the IV256List attribute by using haconf -modify. However, you can delete stale entries from IV256List by using vcsencrypt -delkey encryptedPasswordValue.
Note:
Passwords that were encrypted using the earlier mechanism get automatically decrypted in the same manner.
For details, refer to the Cluster Server Administrator's Guide.