Please enter search query.
Search <book_title>...
InfoScale™ 9.0 Storage Foundation Cluster File System High Availability Configuration and Upgrade Guide - Solaris
Last Published:
2025-04-18
Product(s):
InfoScale & Storage Foundation (9.0)
Platform: Solaris
- Section I. Introduction to SFCFSHA
- Introducing Storage Foundation Cluster File System High Availability
- Section II. Configuration of SFCFSHA
- Preparing to configure
- Preparing to configure SFCFSHA clusters for data integrity
- About planning to configure I/O fencing
- Setting up the CP server
- Configuring the CP server manually
- Configuring SFCFSHA
- Configuring a secure cluster node by node
- Verifying and updating licenses on the system
- Configuring SFCFSHA clusters for data integrity
- Setting up disk-based I/O fencing using installer
- Setting up server-based I/O fencing using installer
- Performing an automated SFCFSHA configuration using response files
- Performing an automated I/O fencing configuration using response files
- Configuring CP server using response files
- Manually configuring SFCFSHA clusters for data integrity
- Setting up disk-based I/O fencing manually
- Setting up server-based I/O fencing manually
- Configuring server-based fencing on the SFCFSHA cluster manually
- Setting up non-SCSI-3 fencing in virtual environments manually
- Setting up majority-based I/O fencing manually
- Section III. Upgrade of SFCFSHA
- Planning to upgrade SFCFSHA
- Preparing to upgrade SFCFSHA
- Performing a full upgrade of SFCFSHA using the installer
- Performing a rolling upgrade of SFCFSHA
- Performing a phased upgrade of SFCFSHA
- About phased upgrade
- Performing a phased upgrade using the product installer
- Performing an automated SFCFSHA upgrade using response files
- Upgrading Volume Replicator
- Upgrading VirtualStore
- Upgrading SFCFSHA using Boot Environment upgrade
- Performing post-upgrade tasks
- Planning to upgrade SFCFSHA
- Section IV. Post-configuration tasks
- Section V. Configuration of disaster recovery environments
- Section VI. Adding and removing nodes
- Adding a node to SFCFSHA clusters
- Adding the node to a cluster manually
- Setting up the node to run in secure mode
- Adding a node using response files
- Configuring server-based fencing on the new node
- Removing a node from SFCFSHA clusters
- Adding a node to SFCFSHA clusters
- Section VII. Configuration and Upgrade reference
- Appendix A. Installation scripts
- Appendix B. Configuration files
- Appendix C. Configuring the secure shell or the remote shell for communications
- Appendix D. High availability agent information
- Appendix E. Sample SFCFSHA cluster setup diagrams for CP server-based I/O fencing
- Appendix F. Reconciling major/minor numbers for NFS shared disks
- Appendix G. Configuring LLT over UDP
- Using the UDP layer for LLT
- Manually configuring LLT over UDP using IPv4
- Using the UDP layer of IPv6 for LLT
- Manually configuring LLT over UDP using IPv6
Enabling LDAP authentication for clusters that run in secure mode
The following procedure shows how to enable the plug-in module for LDAP authentication. This section provides examples for OpenLDAP and Windows Active Directory LDAP distributions.
Before you enable the LDAP authentication, complete the following steps:
Make sure that the cluster runs in secure mode.
# haclus -value SecureClus
The output must return the value as 1.
Make sure that the AT version is 6.1.6.0 or later.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssat showversion vssat version: 6.1.14.26
To enable OpenLDAP authentication for clusters that run in secure mode
- Run the LDAP configuration tool atldapconf using the -d option. The -d option discovers and retrieves an LDAP properties file which is a prioritized attribute list.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/atldapconf \ -d -s domain_controller_name_or_ipaddress -u domain_user
Attribute list file name not provided, using AttributeList.txt
Attribute file created.
You can use the catatldapconf command to view the entries in the attributes file.
- Run the LDAP configuration tool using the -c option. The -c option creates a CLI file to add the LDAP domain.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/atldapconf \ -c -d LDAP_domain_name
Attribute list file not provided, using default AttributeList.txt
CLI file name not provided, using default CLI.txt
CLI for addldapdomain generated.
- Run the LDAP configuration tool atldapconf using the -x option. The -x option reads the CLI file and executes the commands to add a domain to the AT.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/atldapconf -x
Using default broker port 14149
CLI file not provided, using default CLI.txt
Looking for AT installation...
AT found installed at ./vssat
Successfully added LDAP domain.
- Check the AT version and list the LDAP domains to verify that the Windows Active Directory server integration is complete.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssat showversion
vssat version: 6.1.14.26
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssat listldapdomains
Domain Name : mydomain.com
Server URL : ldap://192.168.20.32:389
SSL Enabled : No
User Base DN : CN=people,DC=mydomain,DC=com
User Object Class : account
User Attribute : cn
User GID Attribute : gidNumber
Group Base DN : CN=group,DC=domain,DC=com
Group Object Class : group
Group Attribute : cn
Group GID Attribute : cn
Auth Type : FLAT
Admin User :
Admin User Password :
Search Scope : SUB
- Check the other domains in the cluster.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssat showdomains -p vx
The command output lists the number of domains that are found, with the domain names and domain types.
- Generate credentials for the user.
# unset EAT_LOG
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssat authenticate \ -d ldap:LDAP_domain_name -p user_name -s user_password -b \ localhost:14149
- Add non-root users as applicable.
# useradd user1
# passwd pw1
Changing password for "user1"
user1's New password:
Re-enter user1's new password:
# su user1
# bash
# id
uid=204(user1) gid=1(staff)
# pwd
# mkdir /home/user1
# chown user1 /home/ user1
- Add the non-root user to the VCS configuration.
# haconf -makerw # hauser -add user1 # haconf -dump -makero
- Log in as non-root user and run VCS commands as LDAP user.
# cd /home/user1
# ls
# cat .vcspwd
101 localhost mpise LDAP_SERVER ldap
# unset VCS_DOMAINTYPE
# unset VCS_DOMAIN
# /opt/VRTSvcs/bin/hasys -state
#System Attribute Value
cluster1:sysA SysState FAULTED
cluster1:sysB SysState FAULTED
cluster2:sysC SysState RUNNING
cluster2:sysD SysState RUNNING