Please enter search query.
Search <book_title>...
Veritas Access Installation Guide
Last Published:
2018-12-07
Product(s):
Access (7.4.1)
Platform: Linux
- Introducing Veritas Access
- Licensing in Veritas Access
- System requirements
- Important release information
- System requirements
- Linux requirements
- Operating system RPM installation requirements and operating system patching
- Kernel RPMs that are required to be installed with exact predefined RPM versions
- OL kernel RPMs that are required to be installed with exact predefined RPM versions
- Required operating system RPMs for OL 7.4
- Required operating system RPMs for RHEL 7.3
- Required operating system RPMs for RHEL 7.4
- Software requirements for installing Veritas Access in a VMware ESXi environment
- Hardware requirements for installing Veritas Access virtual machines
- Management Server Web browser support
- Supported NetBackup versions
- Supported OpenStack versions
- Supported Oracle versions and host operating systems
- Supported IP version 6 Internet standard protocol
- Linux requirements
- Network and firewall requirements
- Maximum configuration limits
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installation overview
- Summary of the installation steps
- Before you install
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About managing the NICs, bonds, and VLAN devices
- About VLAN tagging
- Replacing an Ethernet interface card
- Configuring I/O fencing
- About configuring Veritas NetBackup
- About enabling kdump during an Veritas Access configuration
- Reconfiguring the Veritas Access cluster name and network
- Configuring a KMS server on the Veritas Access cluster
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading Veritas Access and operating system
- Upgrading Veritas Access using a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Configuring the secure shell for communications
- Appendix C. Manual deployment of Veritas Access
Enabling internal sudo user communication in Veritas Access
By default, Veritas Access uses SSH communication between the nodes for the root user. If you want to use sudo user-based communication, you can set the internal communication to use the sudo user communication after you have installed Veritas Access successfully.
You can follow the following steps to set up the sudo user communication.
Phase 1: Create a Veritas Access user on each of the nodes of the Veritas Access cluster
- Create the access_user and set the password.
For example:
[root@access1_01 ~]# useradd access_user [root@access1_01 ~]# passwd access_user Changing password for user access_user. New password: Retype new password: passwd: all authentication tokens updated successfully.
- Add the access_user to the
sudoersfile.For example:
[root@access1_01 ~]# echo "access_user ALL=(ALL) NOPASSWD: ALL" >> /etc/sudoers
Complete Phase 1 on all the nodes of the cluster.
Phase 2: Set up a passwordless communication between the root and a Veritas Access user on each node
- Generate a
rsakey for the root user if it is not present.For example:
[root@access1_01 ~]# ssh-keygen Generating public/private rsa key pair. Enter file in which to save the key (/root/.ssh/id_rsa): Created directory '/root/.ssh'. Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /root/.ssh/id_rsa. Your public key has been saved in /root/.ssh/id_rsa.pub. The key fingerprint is: SHA256:hRIBljcpsmGMCtfUUjyVGOfe957OXyiXcRyiYBprmZk root@access1_01 The key's randomart image is: +---[RSA 2048]----+ | o o+*=*o. | |o *.= O+.. | |oo + +.+oo. . . | |. . oXo. . ...| | ES ... . o| | . . . = | | . = .| | = ..| | .=..| +----[SHA256]-----+
- Copy the
rsakey.pubof the root user to the access_user for each of the nodes in the cluster.For example:
[root@access1_01 ~]# ssh-copy-id access_user@access1_01 /usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub" /usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s),to filter out any that are already installed /usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys access_user@access1_01's password: Number of key(s) added: 1
Phase 3: Select the communication type as SUDO_SSH
- Create the
/opt/VRTSnas/conf/communication.conffile.[root@access1_01 ~]# cat /opt/VRTSnas/conf/communication.conf { "WorkingVersion": "1", "Version": "1", "CommunicationType": "SUDO_SSH" }