Veritas Access Installation Guide

Last Published:
Product(s): Access (7.4.2)
Platform: Linux
  1. Licensing in Veritas Access
    1.  
      About Veritas Access product licensing
    2.  
      Per-TB licensing model
    3.  
      TB-Per-Core licensing model
    4.  
      Per-Core licensing model
    5.  
      Add-on license for using Veritas Data Deduplication
    6.  
      Notes and functional enforcements for licensing
  2. System requirements
    1.  
      Important release information
    2. System requirements
      1. Linux requirements
        1.  
          Required operating system RPMs and patches
        2.  
          Required kernel RPMs
        3.  
          Required Oracle Linux kernel RPMs
        4.  
          Required operating system RPMs for OL 7.4
        5.  
          Required operating system RPMs for OL 7.5
        6.  
          Required operating system RPMs for RHEL 7.4
        7.  
          Required operating system RPMs for RHEL 7.5
      2.  
        Software requirements for installing Veritas Access in a VMware ESXi environment
      3.  
        Hardware requirements for installing Veritas Access virtual machines
      4.  
        Management Server Web browser support
      5.  
        Required NetBackup versions
      6.  
        Required OpenStack versions
      7.  
        Required Oracle versions and host operating systems
      8.  
        Required IP version 6 Internet standard protocol
    3. Network and firewall requirements
      1.  
        NetBackup ports
      2.  
        OpenDedup ports and disabling the iptable rules
      3.  
        CIFS protocols and firewall ports
    4.  
      Maximum configuration limits
  3. Preparing to install Veritas Access
    1.  
      Overview of the installation process
    2.  
      Hardware requirements for the nodes
    3. About using LLT over the RDMA network for Veritas Access
      1.  
        RDMA over InfiniBand networks in the Veritas Access clustering environment
      2.  
        How LLT supports RDMA for faster interconnections between applications
      3.  
        Configuring LLT over RDMA for Veritas Access
      4.  
        How the Veritas Access installer configures LLT over RDMA
      5.  
        LLT over RDMA sample /etc/llttab
    4.  
      Connecting the network hardware
    5. About obtaining IP addresses
      1.  
        About calculating IP address requirements
      2.  
        Reducing the number of IP addresses required at installation time
    6.  
      About checking the storage configuration
  4. Deploying virtual machines in VMware ESXi for Veritas Access installation
    1.  
      Setting up networking in VMware ESXi
    2.  
      Creating a datastore for the boot disk and LUNs
    3.  
      Creating a virtual machine for Veritas Access installation
  5. Installing and configuring a cluster
    1.  
      Installation overview
    2.  
      Summary of the installation steps
    3.  
      Before you install
    4. Installing the operating system on each node of the cluster
      1.  
        About the driver node
      2.  
        Installing the RHEL operating system on the target Veritas Access cluster
      3. Installing the Oracle Linux operating system on the target Veritas Access cluster
        1.  
          Setting up the Oracle Linux yum server repository
    5. Installing Veritas Access on the target cluster nodes
      1.  
        Installing and configuring the Veritas Access software on the cluster
      2.  
        Veritas Access Graphical User Interface
    6. About managing the NICs, bonds, and VLAN devices
      1.  
        Selecting the public NICs
      2.  
        Selecting the private NICs
      3.  
        Excluding a NIC
      4.  
        Including a NIC
      5.  
        Creating a NIC bond
      6.  
        Removing a NIC bond
      7.  
        Removing a NIC from the bond list
    7. About VLAN tagging
      1.  
        Creating a VLAN device
      2.  
        Removing a VLAN device
      3.  
        Limitations of VLAN Tagging
    8.  
      Replacing an Ethernet interface card
    9.  
      Configuring I/O fencing
    10.  
      About configuring Veritas NetBackup
    11.  
      About enabling kdump during an Veritas Access configuration
    12.  
      Reconfiguring the Veritas Access cluster name and network
    13.  
      Configuring a KMS server on the Veritas Access cluster
  6. Automating Veritas Access installation and configuration using response files
    1.  
      About response files
    2.  
      Performing a silent Veritas Access installation
    3.  
      Response file variables to install and configure Veritas Access
    4.  
      Sample response file for Veritas Access installation and configuration
  7. Displaying and adding nodes to a cluster
    1.  
      About the Veritas Access installation states and conditions
    2.  
      Displaying the nodes in the cluster
    3.  
      Before adding new nodes in the cluster
    4.  
      Adding a node to the cluster
    5.  
      Adding a node in mixed mode environment
    6.  
      Deleting a node from the cluster
    7.  
      Shutting down the cluster nodes
  8. Upgrading the operating system and Veritas Access
    1.  
      Supported upgrade paths for upgrades on RHEL
    2.  
      Upgrading the operating system and Veritas Access
  9. Performing a rolling upgrade
    1.  
      About rolling upgrade
    2.  
      Performing a rolling upgrade using the installer
  10. Uninstalling Veritas Access
    1.  
      Before you uninstall Veritas Access
    2. Uninstalling Veritas Access using the installer
      1.  
        Removing Veritas Access 7.4.2 RPMs
      2.  
        Running uninstall from the Veritas Access 7.4.2 disc
  11. Appendix A. Installation reference
    1.  
      Installation script options
  12. Appendix B. Configuring the secure shell for communications
    1.  
      Manually configuring passwordless secure shell (ssh)
    2.  
      Setting up ssh and rsh connections using the pwdutil.pl utility
  13. Appendix C. Manual deployment of Veritas Access
    1.  
      Deploying Veritas Access manually on a two-node cluster in a non-SSH environment
    2.  
      Enabling internal sudo user communication in Veritas Access

Creating a virtual machine for Veritas Access installation

To create a virtual machine for Veritas Access installation

  1. After the networking configuration is complete and the datastore is defined, create the virtual machines.
    • Select the ESXi host IP/hostname in the top of the tree structure in the upper left frame.

    • From the File menu, select New Virtual Machine.

      The dialog box for creating the virtual machine is displayed.

    • Select the configuration as Custom and click Next to decide on the exact configuration of the virtual machine.

    • Enter the virtual machine name of your choice and click Next.

    • Select the datastore that stores the virtual machine vmdk file and click Next.

    • Select the virtual machine version that you want to use and click Next. Veritas recommends version 8.

    • Select the guest operating system as Linux and version as Red Hat Enterprise Linux 6 or 7 (64-bit) and click Next.

    Select the number of CPUs. Veritas recommends eight cores that can be:

    • Two virtual sockets and four cores per virtual socket.

    • One virtual socket and eight cores per virtual socket.

    • Any higher number of cores as per your workload.

      Select the memory configuration. Veritas recommends 32 GB of size for the memory configuration.

    • In the network configuration, Veritas recommends to select the number of NICs as four.

      For NIC 1 and NIC 2, select the public network virtual switch and validate that the adapter is correct.

      For NIC 3, select the private network virtual switch 1 and validate that the adapter is correct.

      For NIC 4, select the private network virtual switch 2 and validate that the adapter is correct.

    • Select the SCSI controller as VMware Paravirtual.

    • On the Disk Configuration page, select Create a new virtual disk and click Next.

    • Select the boot disk size. Veritas recommends 100 GB of size for the boot disk.

    • Select the disk provisioning type as Thick Provision Eager Zeroed.

    • Select the datastore as Specify a data store or data store cluster and click Next.

      After selecting the datastore, click Next.

    • Select the Virtual device node as default (SCSI (0:0) for the boot disk) and click Next.

    • Review the virtual machine configuration and click Finish to create the virtual machine.

      The virtual machine creation task is complete.

  2. Select the virtual machine and click Edit virtual machine settings to validate the following:

    • There should be four network adapters, that is, two for the public network and two for the private network.

    • Verify that the memory and CPU configuration is correct.

  3. Repeat the step 1 and 2 to create the second virtual machine, which is used to form the two-node Veritas Access cluster.
  4. Add LUNs/DAS disks to the virtual machines.

    To add local DAS disks:

    • Select the virtual machine and click Edit virtual machine settings.

    • Click Add.

    • Select Hard Disk as device type and click Next.

    • In the type of disk list, click Create a new virtual disk and click Next.

    • Select a size for the DAS disk. Veritas recommends 100 GB of size for the DAS disk.

    • Select Thick Provision Eager Zeroed as disk provisioning type.

    • Select the datastore as Specify a data store or data store cluster and click Next.

    • Select the Virtual device node as SCSI (1:0) for the first SAS disk and click Next.

      After all the required DAS disk are created, complete the following:

      • Select the SCSI controller 1 that is used for DAS disks.

      • Set the SCSI Bus sharing mode as Virtual.

        This mode is required so that DAS disks are claimed in VxVM enclosure-based naming (EBN) mode and host name is only prefixed by VxVM when disks are in EBN mode, which distinguishes it from the shared LUNs present in the arrays.

    • Click OK to create the DAS disk.

      Repeat step 4 for creating the DAS disk for other Veritas Access nodes.

  5. Map the shared disks to the LUNs.

    Mapping of LUNs from an array is only supported by using Raw Device Mapping (RDM) mode.

    To map the shared LUNs to the first virtual machine:

    • Select the first virtual machine and click Edit virtual machine settings.

    • Click Add.

    • Select Hard Disk as device type and click Next.

    • Select the LUN that you want to map and click Next.

    • Select the datastore that stores the LUN mapping or select Store with virtual machine.

    • Select Physical as compatibility mode to access the array LUN hardware directly.

    • Select the Virtual device node as SCSI (2:0) for the shared disk and click Next.

    • Review the mapping of the disk and click Finish to map the array LUN disk to the virtual machine.

      Repeat step 5 for the number of LUNs that you want to map and update the Virtual device node to the next free SCSI controller port.

    After all the required LUNs are mapped, do the following:

    • Select the SCSI controller 2 that is used for shared LUNs.

    • Set the SCSI Bus sharing mode as Virtual.

      This mode is required so that the shared LUNs are claimed in VxVM EBN mode. This distinguishes it from the shared LUNs present in the arrays.

    • Click OK to complete the mapping of LUNs in RDM mode.

    Mapping shared LUNs to the second virtual machine:

    • Select the first virtual machine and click Edit virtual machine settings.

    • Click Add.

    • Select Hard Disk as device type and click Next.

    • Select Use an existing Virtual Disk in the type of disk and click Next.

    • Navigate to the corresponding disk path in the datastore where the shared disk was stored when they were mapped to the first virtual machine.

    • Select the Virtual device node as SCSI (2:0) for the shared disk and click Next. Ensure that the sequence of disk mapping is the same as that of the first virtual machine and mapping has been done to the same SCSI controller to achieve a shared disk configuration.

    • Review the mapping of the disk and click Finish to map the array LUN disk to the virtual machine.

      Repeat this Step for the number of shared LUNs that you have mapped to other virtual machines and update the Virtual device node to the next free SCSI controller port.

    After all the required LUNs are mapped, complete the following:

    • Select the SCSI controller 2, which is used for the shared LUNs.

    • Set the SCSI Bus sharing mode as Virtual.

      This mode is required so that the shared LUNs are claimed in VxVM EBN mode. This distinguishes it from the shared LUNs present in the arrays.

    • Click OK to complete the mapping of LUNs in RDM mode.

      The networking and storage configuration is complete for the virtual machines.

  6. Install the RHEL 7 Update 3 or 4 (64-bit) operating system that is supported by the Veritas Access installer.

    See Installing the RHEL operating system on the target Veritas Access cluster.

Note:

The virtual machine can have DAS disks, shared LUNs, or both of them. For the erasure coded file system, the disks should be DAS only.