Please enter search query.
Search <book_title>...
Storage Foundation for Sybase ASE CE 7.4.1 Configuration and Upgrade Guide - Linux
Last Published:
2019-06-18
Product(s):
InfoScale & Storage Foundation (7.4.1)
Platform: Linux
- Section I. Configuring SF Sybase ASE CE
- Preparing to configure SF Sybase CE
- Configuring SF Sybase CE
- Configuring the SF Sybase CE components using the script-based installer
- Configuring the SF Sybase CE cluster
- Configuring SF Sybase CE in secure mode
- Configuring a secure cluster node by node
- Configuring the SF Sybase CE cluster
- Configuring SF Sybase CE clusters for data integrity
- Setting up disk-based I/O fencing using installer
- Performing an automated SF Sybase CE configuration
- Performing an automated I/O fencing configuration using response files
- Configuring a cluster under VCS control using a response file
- Section II. Post-installation and configuration tasks
- Section III. Upgrade of SF Sybase CE
- Planning to upgrade SF Sybase CE
- Performing a full upgrade of SF Sybase CE using the product installer
- Performing an automated full upgrade of SF Sybase CE using response files
- Performing a phased upgrade of SF Sybase CE
- Performing a phased upgrade of SF Sybase CE from version 6.2.1 and later release
- Performing a rolling upgrade of SF Sybase CE
- Performing post-upgrade tasks
- Section IV. Installation and upgrade of Sybase ASE CE
- Installing, configuring, and upgrading Sybase ASE CE
- Preparing to configure the Sybase instances under VCS control
- Installing, configuring, and upgrading Sybase ASE CE
- Section V. Adding and removing nodes
- Adding a node to SF Sybase CE clusters
- Adding the node to a cluster manually
- Setting up the node to run in secure mode
- Adding the new instance to the Sybase ASE CE cluster
- Removing a node from SF Sybase CE clusters
- Adding a node to SF Sybase CE clusters
- Section VI. Configuration of disaster recovery environments
- Section VII. Installation reference
- Appendix A. Installation scripts
- Appendix B. Sample installation and configuration values
- Appendix C. Tunable files for installation
- Appendix D. Configuration files
- Sample main.cf files for Sybase ASE CE configurations
- Appendix E. Configuring the secure shell or the remote shell for communications
- Appendix F. High availability agent information
Enabling LDAP authentication for clusters that run in secure mode
The following procedure shows how to enable the plug-in module for LDAP authentication. This section provides examples for OpenLDAP and Windows Active Directory LDAP distributions.
Before you enable the LDAP authentication, complete the following steps:
Make sure that the cluster runs in secure mode.
# haclus -value SecureClus
The output must return the value as 1.
Make sure that the AT version is 6.1.6.0 or later.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssat showversion vssat version: 6.1.12.8
To enable OpenLDAP authentication for clusters that run in secure mode
- Run the LDAP configuration tool atldapconf using the -d option. The -d option discovers and retrieves an LDAP properties file which is a prioritized attribute list.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/atldapconf \ -d -s domain_controller_name_or_ipaddress -u domain_user
Attribute list file name not provided, using AttributeList.txt
Attribute file created.
You can use the catatldapconf command to view the entries in the attributes file.
- Run the LDAP configuration tool using the -c option. The -c option creates a CLI file to add the LDAP domain.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/atldapconf \ -c -d LDAP_domain_name
Attribute list file not provided, using default AttributeList.txt
CLI file name not provided, using default CLI.txt
CLI for addldapdomain generated.
- Run the LDAP configuration tool atldapconf using the -x option. The -x option reads the CLI file and executes the commands to add a domain to the AT.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/atldapconf -x
Using default broker port 14149
CLI file not provided, using default CLI.txt
Looking for AT installation...
AT found installed at ./vssat
Successfully added LDAP domain.
- Check the AT version and list the LDAP domains to verify that the Windows Active Directory server integration is complete.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssat showversion
vssat version: 6.1.12.8
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssat listldapdomains
Domain Name : mydomain.com
Server URL : ldap://192.168.20.32:389
SSL Enabled : No
User Base DN : CN=people,DC=mydomain,DC=com
User Object Class : account
User Attribute : cn
User GID Attribute : gidNumber
Group Base DN : CN=group,DC=domain,DC=com
Group Object Class : group
Group Attribute : cn
Group GID Attribute : cn
Auth Type : FLAT
Admin User :
Admin User Password :
Search Scope : SUB
- Check the other domains in the cluster.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssat showdomains -p vx
The command output lists the number of domains that are found, with the domain names and domain types.
- Generate credentials for the user.
# unset EAT_LOG
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssat authenticate \ -d ldap:LDAP_domain_name -p user_name -s user_password -b \ localhost:14149
- Add non-root users as applicable.
# useradd user1
# passwd pw1
Changing password for "user1"
user1's New password:
Re-enter user1's new password:
# su user1
# bash
# id
uid=204(user1) gid=1(staff)
# pwd
# mkdir /home/user1
# chown user1 /home/ user1
- Add the non-root user to the VCS configuration.
# haconf -makerw # hauser -add user1 # haconf -dump -makero
- Log in as non-root user and run VCS commands as LDAP user.
# cd /home/user1
# ls
# cat .vcspwd
101 localhost mpise LDAP_SERVER ldap
# unset VCS_DOMAINTYPE
# unset VCS_DOMAIN
# /opt/VRTSvcs/bin/hasys -state
#System Attribute Value
cluster1:sysA SysState FAULTED
cluster1:sysB SysState FAULTED
cluster2:sysC SysState RUNNING
cluster2:sysD SysState RUNNING