Storage Foundation for Sybase ASE CE 7.4.1 Configuration and Upgrade Guide - Linux

Last Published:
Product(s): InfoScale & Storage Foundation (7.4.1)
Platform: Linux
  1. Section I. Configuring SF Sybase ASE CE
    1. Preparing to configure SF Sybase CE
      1.  
        About this document
      2.  
        Supported Sybase ASE CE releases
      3.  
        Supported SF Sybase CE configurations
      4.  
        Coordinator disk requirements for I/O fencing
      5.  
        Supported replication technologies for global clusters
      6. About planning to configure I/O fencing
        1.  
          Typical SF Sybase CE cluster configuration with disk-based I/O fencing
      7.  
        Planning for cluster management
    2. Configuring SF Sybase CE
      1.  
        About configuring SF Sybase CE
      2. Configuring the SF Sybase CE components using the script-based installer
        1. Configuring the SF Sybase CE cluster
          1.  
            Configuring the cluster name
          2.  
            Configuring private heartbeat links
          3.  
            Configuring the virtual IP of the cluster
          4. Configuring SF Sybase CE in secure mode
            1.  
              Setting up trust relationships for your SF Sybase CE cluster
          5. Configuring a secure cluster node by node
            1.  
              Configuring the first node
            2.  
              Configuring the remaining nodes
            3.  
              Completing the secure cluster configuration
          6.  
            Adding VCS users
          7.  
            Configuring SMTP email notification
          8.  
            Configuring SNMP trap notification
          9.  
            Configuring global clusters
    3. Configuring SF Sybase CE clusters for data integrity
      1. Setting up disk-based I/O fencing using installer
        1.  
          Initializing disks as VxVM disks
        2.  
          Identifying disks to use as coordinator disks
        3.  
          Refreshing keys or registrations on the existing coordination points for disk-based fencing using the installer
        4. Checking shared disks for I/O fencing
          1.  
            Verifying Array Support Library (ASL)
          2.  
            Verifying that the nodes have access to the same disk
          3.  
            Testing the disks using vxfentsthdw utility
        5.  
          Configuring disk-based I/O fencing using installer
    4. Performing an automated SF Sybase CE configuration
      1.  
        Configuring SF Sybase CE using response files
      2.  
        Response file variables to configure SF Sybase CE
      3.  
        Sample response files for configuring SF Sybase CE
    5. Performing an automated I/O fencing configuration using response files
      1.  
        Configuring I/O fencing using response files
      2.  
        Response file variables to configure disk-based I/O fencing
      3.  
        Sample response file for configuring disk-based I/O fencing
    6. Configuring a cluster under VCS control using a response file
      1.  
        Configuring a Sybase cluster under VCS control with a response file
      2.  
        Response file variables to configure SF Sybase CE in VCS
  2. Section II. Post-installation and configuration tasks
    1. Verifying the installation
      1.  
        Upgrading the disk group version
      2.  
        Performing a postcheck on a node
      3.  
        Verifying SF Sybase CE installation using VCS configuration file
      4. Verifying LLT, GAB, and cluster operation
        1.  
          Verifying LLT
        2.  
          Verifying GAB
        3.  
          Verifying the cluster
        4.  
          Verifying the cluster nodes
    2. Performing additional post-installation and configuration tasks
      1. About enabling LDAP authentication for clusters that run in secure mode
        1.  
          Enabling LDAP authentication for clusters that run in secure mode
      2.  
        Configuring Volume Replicator
      3.  
        Running SORT Data Collector to collect configuration information
  3. Section III. Upgrade of SF Sybase CE
    1. Planning to upgrade SF Sybase CE
      1.  
        About the upgrade
      2.  
        Supported upgrade paths
      3.  
        Using Install Bundles to simultaneously install or upgrade full releases (base, maintenance, rolling patch), and individual patches
    2. Performing a full upgrade of SF Sybase CE using the product installer
      1.  
        About full upgrades
      2.  
        Preparing to perform a full upgrade to SF Sybase CE 7.4.1
      3. Upgrading to SF Sybase CE 7.4.1
        1.  
          Upgrading SF Sybase CE using the Veritas installation program
    3. Performing an automated full upgrade of SF Sybase CE using response files
      1.  
        Upgrading SF Sybase CE using a response file
      2.  
        Response file variables to upgrade SF Sybase CE
      3.  
        Sample response file for upgrading SF Sybase CE
    4. Performing a phased upgrade of SF Sybase CE
      1.  
        About phased upgrade
      2. Performing a phased upgrade of SF Sybase CE from version 6.2.1 and later release
        1.  
          Step 1: Performing pre-upgrade tasks on the first half of the cluster
        2.  
          Step 2: Upgrading the first half of the cluster
        3.  
          Step 3: Performing pre-upgrade tasks on the second half of the cluster
        4.  
          Step 4: Performing post-upgrade tasks on the first half of the cluster
        5.  
          Step 5: Upgrading the second half of the cluster
        6.  
          Step 6: Performing post-upgrade tasks on the second half of the cluster
    5. Performing a rolling upgrade of SF Sybase CE
      1.  
        About rolling upgrade
      2.  
        Supported rolling upgrade paths
      3.  
        Preparing to perform a rolling upgrade to SF Sybase CE 7.4.1
    6. Performing post-upgrade tasks
      1.  
        Re-joining the backup boot disk group into the current disk group
      2.  
        Reverting to the backup boot disk group after an unsuccessful upgrade
      3.  
        Setting or changing the product license level
      4.  
        Upgrading disk layout versions
      5.  
        Upgrading CVM protocol version and VxVM disk group version
  4. Section IV. Installation and upgrade of Sybase ASE CE
    1. Installing, configuring, and upgrading Sybase ASE CE
      1.  
        Before installing Sybase ASE CE
      2.  
        Preparing for local mount point on VxFS for Sybase ASE CE binary installation
      3.  
        Preparing for shared mount point on CFS for Sybase ASE CE binary installation
      4.  
        Installing Sybase ASE CE software
      5.  
        Preparing to create a Sybase ASE CE cluster
      6.  
        Creating the Sybase ASE CE cluster
      7. Preparing to configure the Sybase instances under VCS control
        1.  
          Language settings for the Sybase agent
        2.  
          Configuring Sybase for detail monitoring
        3.  
          Encrypting passwords for Sybase
        4. About setting up detail monitoring for the agent for Sybase
          1.  
            Enabling detail monitoring for the agent for Sybase
          2.  
            Disabling detail monitoring for the agent for Sybase
      8.  
        Configuring a Sybase ASE CE cluster under VCS control using the SF Sybase CE installer
      9.  
        Upgrading Sybase ASE CE
  5. Section V. Adding and removing nodes
    1. Adding a node to SF Sybase CE clusters
      1.  
        About adding a node to a cluster
      2.  
        Before adding a node to a cluster
      3. Adding the node to a cluster manually
        1.  
          Starting Veritas Volume Manager (VxVM) on the new node
        2.  
          Configuring cluster processes on the new node
        3. Setting up the node to run in secure mode
          1.  
            Configuring the authentication broker on node sys5
        4.  
          Starting fencing on the new node
        5.  
          Configuring Cluster Volume Manager (CVM) and Cluster File System (CFS) on the new node
        6.  
          After adding the new node
        7.  
          Configuring the ClusterService group for the new node
      4.  
        Adding a node to a cluster using the Veritas InfoScale installer
      5. Adding the new instance to the Sybase ASE CE cluster
        1.  
          Creating Sybase user and groups
        2.  
          Preparing the mount point for Sybase resources on the new node
        3.  
          Adding a new Sybase ASE CE instance to the Sybase ASE CE cluster
        4.  
          Bringing the new Sybase ASE CE instance under VCS control
    2. Removing a node from SF Sybase CE clusters
      1.  
        About removing a node from a cluster
      2.  
        Removing a node from a cluster
      3.  
        Modifying the VCS configuration files on existing nodes
      4.  
        Modifying the Cluster Volume Manager (CVM) configuration on the existing nodes to remove references to the deleted node
      5.  
        Removing security credentials from the leaving node
  6. Section VI. Configuration of disaster recovery environments
    1. Configuring disaster recovery environments
      1.  
        Disaster recovery options for SF Sybase CE
      2.  
        About setting up a global cluster environment for SF Sybase CE
      3.  
        About configuring a parallel global cluster using Volume Replicator (VVR) for replication
  7. Section VII. Installation reference
    1. Appendix A. Installation scripts
      1.  
        Installation script options
      2.  
        About using the postcheck option
    2. Appendix B. Sample installation and configuration values
      1.  
        SF Sybase CE installation and configuration information
      2.  
        SF Sybase CE worksheet
    3. Appendix C. Tunable files for installation
      1.  
        About setting tunable parameters using the installer or a response file
      2.  
        Setting tunables for an installation, configuration, or upgrade
      3.  
        Setting tunables with no other installer-related operations
      4.  
        Setting tunables with an un-integrated response file
      5.  
        Preparing the tunables file
      6.  
        Setting parameters for the tunables file
      7.  
        Tunables value parameter definitions
    4. Appendix D. Configuration files
      1.  
        About sample main.cf files
      2. Sample main.cf files for Sybase ASE CE configurations
        1.  
          Sample main.cf for a basic Sybase ASE CE cluster configuration under VCS control with shared mount point on CFS for Sybase binary installation
        2.  
          Sample main.cf for a basic Sybase ASE CE cluster configuration with local mount point on VxFS for Sybase binary installation
        3.  
          Sample main.cf for a primary CVM VVR site
        4.  
          Sample main.cf for a secondary CVM VVR site
    5. Appendix E. Configuring the secure shell or the remote shell for communications
      1. About configuring secure shell or remote shell communication modes before installing products
        1.  
          Manually configuring passwordless ssh
        2.  
          Setting up ssh and rsh connection using the installer -comsetup command
        3.  
          Setting up ssh and rsh connection using the pwdutil.pl utility
        4.  
          Restarting the ssh session
        5.  
          Enabling rsh for Linux
    6. Appendix F. High availability agent information
      1. About agents
        1.  
          VCS agents included within SF Sybase CE
        2.  
          VCS agent for Sybase included within SF Sybase CE
      2. CVMCluster agent
        1.  
          Entry points for CVMCluster agent
        2.  
          Attribute definition for CVMCluster agent
        3.  
          CVMCluster agent type definition
        4.  
          CVMCluster agent sample configuration
      3. CVMVxconfigd agent
        1.  
          Entry points for CVMVxconfigd agent
        2.  
          Attribute definition for CVMVxconfigd agent
        3.  
          CVMVxconfigd agent type definition
        4.  
          CVMVxconfigd agent sample configuration
      4. CVMVolDg agent
        1.  
          Entry points for CVMVolDg agent
        2.  
          Attribute definition for CVMVolDg agent
        3.  
          CVMVolDg agent type definition
        4.  
          CVMVolDg agent sample configuration
      5. CFSMount agent
        1.  
          Entry points for CFSMount agent
        2.  
          Attribute definition for CFSMount agent
        3.  
          CFSMount agent type definition
        4.  
          CFSMount agent sample configuration
      6. Process agent
        1.  
          Agent functions
        2.  
          State definitions
        3.  
          Attributes
        4.  
          Resource type definition
        5.  
          Sample configurations
      7.  
        Monitoring options for the Sybase agent
      8. Sybase resource type
        1.  
          Type definition for the Sybase agent
        2.  
          Attribute definitions for the Sybase agent

SF Sybase CE worksheet

Table: SF Sybase CE worksheet contains the sample values that may be used when you install and configure SF Sybase CE. Enter the SF Sybase CE values for your systems in the following table:

Table: SF Sybase CE worksheet

Installation information

Sample value

Assigned value

Number of nodes in the cluster

2

Host names for Primary cluster

sys1 and sys2

Host names for added or removed node

sys5

SF Sybase CE License key

License keys are in the format:

XXXX-XXXX-XXXX-XXXX-XXXX-XXXX-XXX

Required SF Sybase CE RPMs vs. all SF Sybase CE

Install only the required RPMs if you do not want to configure any optional components or features.

Default option is to install all RPMs.

Primary cluster name

clus1

Primary cluster ID number

101

Private network links

You can choose a network interface card that is not part of any aggregated interface, or you can choose an aggregated interface.

The interface names that are associated with each NIC for each network link must be the same on all nodes.

Do not use the network interface card that is used for the public network, which is typically eth0.

eth1,eth2

Cluster Manager NIC (Primary NIC)

eth0

Cluster Manager IP

10.10.12.1, 10.10.12.2

Netmask for the virtual IP address

255.255.240.0

Mode for Authentication Service:

  • Automatic mode

  • Semiautomatic mode using encrypted files

  • Semiautomatic mode without using encrypted files

Default option is automatic mode.

Automatic mode

User name

Adding users is required if when using secure cluster mode. Otherwise it is optional.

smith

 

User password

password

 

User privilege

VCS privilege levels include:

  • Administrators - Can perform all operations, including configuration options on the cluster, service groups, systems, resources, and users.

  • Operators - Can perform specific operations on a cluster or a service group.

  • Guests - Can view specified objects.

admin

Domain-based address of the SMTP server

The SMTP server sends notification email about the events within the cluster.

smtp.veritasexample.com

Email address of each SMTP recipient to be notified

john@veritasexample.com

Minimum severity of events for SMTP email notification

The severity levels are defined as follows:

  • Information - Important events that exhibit normal behavior

  • Warning - Deviation from normal behavior

  • Error - A fault

  • Severe Error -Critical error that can lead to data loss or corruption

E

Email address of SMTP notification recipients

admin@veritasexample.com

SNMP trap daemon port number the console

162

System name for the SNMP console

system2

Minimum severity level of events for SMTP notification

The severity levels are defined as follows:

  • Information - Important events that exhibit normal behavior

  • Warning - Deviation from normal behavior

  • Error - A fault

  • Severe Error -Critical error that can lead to data loss or corruption

i

CVM enclosure-based naming

Requires Dynamic Multi-pathing (DMP).

yes

Default disk group

You can select the name of a default disk group of a system for running Veritas Volume Manager commands which require a disk group to be specified.

vxfencoordg

The name of three disks that form the coordinator disk group.

  • sdd

  • sde

  • sdf

Vxfen disk group

vxfencoordg