Storage Foundation for Sybase ASE CE 7.4.1 Configuration and Upgrade Guide - Linux
- Section I. Configuring SF Sybase ASE CE
- Preparing to configure SF Sybase CE
- Configuring SF Sybase CE
- Configuring the SF Sybase CE components using the script-based installer
- Configuring the SF Sybase CE cluster
- Configuring SF Sybase CE in secure mode
- Configuring a secure cluster node by node
- Configuring the SF Sybase CE cluster
- Configuring SF Sybase CE clusters for data integrity
- Setting up disk-based I/O fencing using installer
- Performing an automated SF Sybase CE configuration
- Performing an automated I/O fencing configuration using response files
- Configuring a cluster under VCS control using a response file
- Section II. Post-installation and configuration tasks
- Section III. Upgrade of SF Sybase CE
- Planning to upgrade SF Sybase CE
- Performing a full upgrade of SF Sybase CE using the product installer
- Performing an automated full upgrade of SF Sybase CE using response files
- Performing a phased upgrade of SF Sybase CE
- Performing a phased upgrade of SF Sybase CE from version 6.2.1 and later release
- Performing a rolling upgrade of SF Sybase CE
- Performing post-upgrade tasks
- Section IV. Installation and upgrade of Sybase ASE CE
- Installing, configuring, and upgrading Sybase ASE CE
- Preparing to configure the Sybase instances under VCS control
- Installing, configuring, and upgrading Sybase ASE CE
- Section V. Adding and removing nodes
- Adding a node to SF Sybase CE clusters
- Adding the node to a cluster manually
- Setting up the node to run in secure mode
- Adding the new instance to the Sybase ASE CE cluster
- Removing a node from SF Sybase CE clusters
- Adding a node to SF Sybase CE clusters
- Section VI. Configuration of disaster recovery environments
- Section VII. Installation reference
- Appendix A. Installation scripts
- Appendix B. Sample installation and configuration values
- Appendix C. Tunable files for installation
- Appendix D. Configuration files
- Sample main.cf files for Sybase ASE CE configurations
- Appendix E. Configuring the secure shell or the remote shell for communications
- Appendix F. High availability agent information
Configuring the virtual IP of the cluster
You can configure the virtual IP of the cluster to use to connect from the Cluster Manager (Java Console), Veritas InfoScale Operations Manager, or to specify in the RemoteGroup resource.
See the Cluster Server Administrator's Guide for information on the Cluster Manager.
See the Cluster Server Bundled Agents Reference Guide for information on the RemoteGroup agent.
To configure the virtual IP of the cluster
- Review the required information to configure the virtual IP of the cluster.
- When the system prompts whether you want to configure the virtual IP, enter y.
- Confirm whether you want to use the discovered public NIC on the first system.
Do one of the following:
If the discovered NIC is the one to use, press Enter.
If you want to use a different NIC, type the name of a NIC to use and press Enter.
Active NIC devices discovered on sys1: eth0 Enter the NIC for Virtual IP of the Cluster to use on sys1: [b,q,?](eth0)
- Confirm whether you want to use the same public NIC on all nodes.
Do one of the following:
If all nodes use the same public NIC, enter y.
If unique NICs are used, enter n and enter a NIC for each node.
Is eth0 to be the public NIC used by all systems [y,n,q,b,?] (y)
If you want to set up trust relationships for your secure cluster, refer to the following topics:
See Setting up trust relationships for your SF Sybase CE cluster.