Storage Foundation 7.2 Configuration and Upgrade Guide - Solaris

Last Published:
Product(s): InfoScale & Storage Foundation (7.2)
Platform: Solaris
  1. Section I. Introduction and configuration of Storage Foundation
    1. Introducing Storage Foundation
      1. About Storage Foundation
        1.  
          About Veritas Replicator Option
      2.  
        About Veritas InfoScale Operations Manager
      3.  
        About Veritas Services and Operations Readiness Tools (SORT)
    2. Configuring Storage Foundation
      1.  
        Configuring Storage Foundation using the installer
      2. Configuring SF manually
        1. Configuring Veritas Volume Manager
          1.  
            Starting and enabling the configuration daemon
          2.  
            Starting the volume I/O daemon
          3.  
            Using vxinstall to configure Veritas Volume Manager
        2. Configuring Veritas File System
          1.  
            Loading and unloading the file system module
          2.  
            vxtunefs command permissions and Cached Quick I/O
      3.  
        Configuring SFDB
  2. Section II. Upgrade of Storage Foundation
    1. Planning to upgrade Storage Foundation
      1.  
        About the upgrade
      2.  
        Supported upgrade paths
      3. Preparing to upgrade SF
        1.  
          Getting ready for the upgrade
        2.  
          Creating backups
        3. Pre-upgrade planning for Volume Replicator
          1. Planning an upgrade from the previous VVR version
            1.  
              Planning and upgrading VVR to use IPv6 as connection protocol
          2.  
            Additional settings for using VVR in a localized environment
        4.  
          Verifying that the file systems are clean
        5.  
          Upgrading the array support
      4.  
        Using Install Bundles to simultaneously install or upgrade full releases (base, maintenance, rolling patch), and individual patches
    2. Upgrading Storage Foundation
      1. Upgrading Storage Foundation to 7.2 using the product installer
        1.  
          Upgrading Storage Foundation with the product installer
      2. Upgrading Volume Replicator
        1. Upgrading VVR without disrupting replication
          1.  
            Upgrading VVR on the Secondary
          2.  
            Upgrading VVR on the Primary
      3.  
        Upgrading language packages
      4.  
        Upgrading SFDB
    3. Performing an automated SF upgrade using response files
      1.  
        Upgrading SF using response files
      2.  
        Response file variables to upgrade SF
      3.  
        Sample response file for SF upgrade
    4. Upgrading SF using Boot Environment upgrade
      1.  
        About ZFS Boot Environment (BE) upgrade
      2.  
        Supported upgrade paths for Boot Environment upgrade
      3. Performing Boot Environment upgrade on Solaris 11 systems
        1.  
          Creating a new Solaris 11 BE on the primary boot disk
        2.  
          Upgrading SF using the installer for upgrading BE on Solaris 11
        3.  
          Completing the SF upgrade on BE on Solaris 11
        4.  
          Verifying Solaris 11 BE upgrade
        5. Administering BEs on Solaris 11 systems
          1.  
            Reverting to the primary BE on a Solaris 11 system
      4.  
        About Live Upgrade in a Volume Replicator (VVR) environment
    5. Performing post-upgrade tasks
      1.  
        Optional configuration steps
      2.  
        Recovering VVR if automatic upgrade fails
      3.  
        Resetting DAS disk names to include host name in FSS environments
      4.  
        Upgrading disk layout versions
      5.  
        Upgrading VxVM disk group versions
      6.  
        Updating variables
      7.  
        Setting the default disk group
      8. Upgrading the Array Support Library
        1.  
          Adding JBOD support for storage arrays for which there is not an ASL available
        2. Unsuppressing DMP for EMC PowerPath disks
          1.  
            Converting a foreign disk to auto:simple
          2.  
            Converting a defined disk to auto:simple
          3.  
            Converting a powervxvm disk to auto:simple
      9.  
        Converting from QuickLog to Multi-Volume support
      10.  
        Verifying the Storage Foundation upgrade
  3. Section III. Post configuration tasks
    1. Performing configuration tasks
      1.  
        Changing root user into root role
      2.  
        Installing language packages
      3.  
        Switching on Quotas
      4.  
        Enabling DMP support for native devices
      5. About configuring authentication for SFDB tools
        1.  
          Configuring vxdbd for SFDB tools authentication
  4. Section IV. Configuration and Upgrade reference
    1. Appendix A. Installation scripts
      1.  
        Installation script options
      2.  
        About using the postcheck option
    2. Appendix B. Configuring the secure shell or the remote shell for communications
      1.  
        About configuring secure shell or remote shell communication modes before installing products
      2.  
        Manually configuring passwordless ssh
      3.  
        Setting up ssh and rsh connection using the installer -comsetup command
      4.  
        Setting up ssh and rsh connection using the pwdutil.pl utility
      5.  
        Restarting the ssh session
      6.  
        Enabling and disabling rsh for Solaris

Setting up ssh and rsh connection using the pwdutil.pl utility

The password utility, pwdutil.pl, is bundled under the scripts directory. The users can run the utility in their script to set up the ssh and rsh connection automatically.

# ./pwdutil.pl -h
Usage:

Command syntax with simple format:

    pwdutil.pl check|configure|unconfigure ssh|rsh <hostname|IP addr> 
				[<user>] [<password>] [<port>]

Command syntax with advanced format:

    pwdutil.pl [--action|-a 'check|configure|unconfigure']
               [--type|-t 'ssh|rsh']
               [--user|-u  '<user>']
               [--password|-p '<password>']
               [--port|-P '<port>']
               [--hostfile|-f '<hostfile>']
               [--keyfile|-k '<keyfile>']
               [-debug|-d]
               <host_URI>

    pwdutil.pl -h | -?

Table: Options with pwdutil.pl utility

Option

Usage

--action|-a 'check|configure|unconfigure'

Specifies action type, default is 'check'.

--type|-t 'ssh|rsh'

Specifies connection type, default is 'ssh'.

--user|-u '<user>'

Specifies user id, default is the local user id.

--password|-p '<password>'

Specifies user password, default is the user id.

--port|-P '<port>'

Specifies port number for ssh connection, default is 22

--keyfile|-k '<keyfile>'

Specifies the private key file.

--hostfile|-f '<hostfile>'

Specifies the file which list the hosts.

-debug

Prints debug information.

-h|-?

Prints help messages.

<host_URI>

Can be in the following formats:

<hostname>

<user>:<password>@<hostname>

<user>:<password>@<hostname>:

<port>

You can check, configure, and unconfigure ssh or rsh using the pwdutil.plutility. For example:

  • To check ssh connection for only one host:

    pwdutil.pl check ssh hostname
  • To configure ssh for only one host:

    pwdutil.pl configure ssh hostname user password 
  • To unconfigure rsh for only one host:

    pwdutil.pl unconfigure rsh hostname
  • To configure ssh for multiple hosts with same user ID and password:

    pwdutil.pl -a configure -t ssh -u user -p password hostname1 
    hostname2 hostname3
  • To configure ssh or rsh for different hosts with different user ID and password:

    pwdutil.pl -a configure -t ssh user1:password1@hostname1
    user2:password2@hostname2
  • To check or configure ssh or rsh for multiple hosts with one configuration file:

    pwdutil.pl -a configure -t ssh --hostfile /tmp/sshrsh_hostfile
  • To keep the host configuration file secret, you can use the 3rd party utility to encrypt and decrypt the host file with password.

    For example:

    ### run openssl to encrypt the host file in base64 format
    # openssl aes-256-cbc -a -salt -in /hostfile -out /hostfile.enc
    enter aes-256-cbc encryption password: <password>
    Verifying - enter aes-256-cbc encryption password: <password>
    
    ### remove the original plain text file
    # rm /hostfile
    
    ### run openssl to decrypt the encrypted host file
    # pwdutil.pl -a configure -t ssh 'openssl aes-256-cbc -d -a 
    -in /hostfile.enc'
    enter aes-256-cbc decryption password: <password>
    
  • To use the ssh authentication keys which are not under the default $HOME/.ssh directory, you can use --keyfile option to specify the ssh keys. For example:

    ### create a directory to host the key pairs:
    # mkdir /keystore
    
    ### generate private and public key pair under the directory:
    # ssh-keygen -t rsa -f /keystore/id_rsa
    
    ### setup ssh connection with the new generated key pair under 
    the directory:
    # pwdutil.pl -a configure -t ssh --keyfile /keystore/id_rsa 
    user:password@hostname
    

You can see the contents of the configuration file by using the following command:

# cat /tmp/sshrsh_hostfile
user1:password1@hostname1
user2:password2@hostname2
user3:password3@hostname3
user4:password4@hostname4

# all default: check ssh connection with local user
hostname5
The following exit values are returned:

0     Successful completion.
1     Command syntax error.
2     Ssh or rsh binaries do not exist.
3     Ssh or rsh service is down on the remote machine.
4     Ssh or rsh command execution is denied due to password is required.
5     Invalid password is provided.
255   Other unknown error.