Storage Foundation for Sybase ASE CE 7.4.1 Configuration and Upgrade Guide - Linux

Last Published:
Product(s): InfoScale & Storage Foundation (7.4.1)
Platform: Linux
  1. Section I. Configuring SF Sybase ASE CE
    1. Preparing to configure SF Sybase CE
      1.  
        About this document
      2.  
        Supported Sybase ASE CE releases
      3.  
        Supported SF Sybase CE configurations
      4.  
        Coordinator disk requirements for I/O fencing
      5.  
        Supported replication technologies for global clusters
      6. About planning to configure I/O fencing
        1.  
          Typical SF Sybase CE cluster configuration with disk-based I/O fencing
      7.  
        Planning for cluster management
    2. Configuring SF Sybase CE
      1.  
        About configuring SF Sybase CE
      2. Configuring the SF Sybase CE components using the script-based installer
        1. Configuring the SF Sybase CE cluster
          1.  
            Configuring the cluster name
          2.  
            Configuring private heartbeat links
          3.  
            Configuring the virtual IP of the cluster
          4. Configuring SF Sybase CE in secure mode
            1.  
              Setting up trust relationships for your SF Sybase CE cluster
          5. Configuring a secure cluster node by node
            1.  
              Configuring the first node
            2.  
              Configuring the remaining nodes
            3.  
              Completing the secure cluster configuration
          6.  
            Adding VCS users
          7.  
            Configuring SMTP email notification
          8.  
            Configuring SNMP trap notification
          9.  
            Configuring global clusters
    3. Configuring SF Sybase CE clusters for data integrity
      1. Setting up disk-based I/O fencing using installer
        1.  
          Initializing disks as VxVM disks
        2.  
          Identifying disks to use as coordinator disks
        3.  
          Refreshing keys or registrations on the existing coordination points for disk-based fencing using the installer
        4. Checking shared disks for I/O fencing
          1.  
            Verifying Array Support Library (ASL)
          2.  
            Verifying that the nodes have access to the same disk
          3.  
            Testing the disks using vxfentsthdw utility
        5.  
          Configuring disk-based I/O fencing using installer
    4. Performing an automated SF Sybase CE configuration
      1.  
        Configuring SF Sybase CE using response files
      2.  
        Response file variables to configure SF Sybase CE
      3.  
        Sample response files for configuring SF Sybase CE
    5. Performing an automated I/O fencing configuration using response files
      1.  
        Configuring I/O fencing using response files
      2.  
        Response file variables to configure disk-based I/O fencing
      3.  
        Sample response file for configuring disk-based I/O fencing
    6. Configuring a cluster under VCS control using a response file
      1.  
        Configuring a Sybase cluster under VCS control with a response file
      2.  
        Response file variables to configure SF Sybase CE in VCS
  2. Section II. Post-installation and configuration tasks
    1. Verifying the installation
      1.  
        Upgrading the disk group version
      2.  
        Performing a postcheck on a node
      3.  
        Verifying SF Sybase CE installation using VCS configuration file
      4. Verifying LLT, GAB, and cluster operation
        1.  
          Verifying LLT
        2.  
          Verifying GAB
        3.  
          Verifying the cluster
        4.  
          Verifying the cluster nodes
    2. Performing additional post-installation and configuration tasks
      1. About enabling LDAP authentication for clusters that run in secure mode
        1.  
          Enabling LDAP authentication for clusters that run in secure mode
      2.  
        Configuring Volume Replicator
      3.  
        Running SORT Data Collector to collect configuration information
  3. Section III. Upgrade of SF Sybase CE
    1. Planning to upgrade SF Sybase CE
      1.  
        About the upgrade
      2.  
        Supported upgrade paths
      3.  
        Using Install Bundles to simultaneously install or upgrade full releases (base, maintenance, rolling patch), and individual patches
    2. Performing a full upgrade of SF Sybase CE using the product installer
      1.  
        About full upgrades
      2.  
        Preparing to perform a full upgrade to SF Sybase CE 7.4.1
      3. Upgrading to SF Sybase CE 7.4.1
        1.  
          Upgrading SF Sybase CE using the Veritas installation program
    3. Performing an automated full upgrade of SF Sybase CE using response files
      1.  
        Upgrading SF Sybase CE using a response file
      2.  
        Response file variables to upgrade SF Sybase CE
      3.  
        Sample response file for upgrading SF Sybase CE
    4. Performing a phased upgrade of SF Sybase CE
      1.  
        About phased upgrade
      2. Performing a phased upgrade of SF Sybase CE from version 6.2.1 and later release
        1.  
          Step 1: Performing pre-upgrade tasks on the first half of the cluster
        2.  
          Step 2: Upgrading the first half of the cluster
        3.  
          Step 3: Performing pre-upgrade tasks on the second half of the cluster
        4.  
          Step 4: Performing post-upgrade tasks on the first half of the cluster
        5.  
          Step 5: Upgrading the second half of the cluster
        6.  
          Step 6: Performing post-upgrade tasks on the second half of the cluster
    5. Performing a rolling upgrade of SF Sybase CE
      1.  
        About rolling upgrade
      2.  
        Supported rolling upgrade paths
      3.  
        Preparing to perform a rolling upgrade to SF Sybase CE 7.4.1
    6. Performing post-upgrade tasks
      1.  
        Re-joining the backup boot disk group into the current disk group
      2.  
        Reverting to the backup boot disk group after an unsuccessful upgrade
      3.  
        Setting or changing the product license level
      4.  
        Upgrading disk layout versions
      5.  
        Upgrading CVM protocol version and VxVM disk group version
  4. Section IV. Installation and upgrade of Sybase ASE CE
    1. Installing, configuring, and upgrading Sybase ASE CE
      1.  
        Before installing Sybase ASE CE
      2.  
        Preparing for local mount point on VxFS for Sybase ASE CE binary installation
      3.  
        Preparing for shared mount point on CFS for Sybase ASE CE binary installation
      4.  
        Installing Sybase ASE CE software
      5.  
        Preparing to create a Sybase ASE CE cluster
      6.  
        Creating the Sybase ASE CE cluster
      7. Preparing to configure the Sybase instances under VCS control
        1.  
          Language settings for the Sybase agent
        2.  
          Configuring Sybase for detail monitoring
        3.  
          Encrypting passwords for Sybase
        4. About setting up detail monitoring for the agent for Sybase
          1.  
            Enabling detail monitoring for the agent for Sybase
          2.  
            Disabling detail monitoring for the agent for Sybase
      8.  
        Configuring a Sybase ASE CE cluster under VCS control using the SF Sybase CE installer
      9.  
        Upgrading Sybase ASE CE
  5. Section V. Adding and removing nodes
    1. Adding a node to SF Sybase CE clusters
      1.  
        About adding a node to a cluster
      2.  
        Before adding a node to a cluster
      3. Adding the node to a cluster manually
        1.  
          Starting Veritas Volume Manager (VxVM) on the new node
        2.  
          Configuring cluster processes on the new node
        3. Setting up the node to run in secure mode
          1.  
            Configuring the authentication broker on node sys5
        4.  
          Starting fencing on the new node
        5.  
          Configuring Cluster Volume Manager (CVM) and Cluster File System (CFS) on the new node
        6.  
          After adding the new node
        7.  
          Configuring the ClusterService group for the new node
      4.  
        Adding a node to a cluster using the Veritas InfoScale installer
      5. Adding the new instance to the Sybase ASE CE cluster
        1.  
          Creating Sybase user and groups
        2.  
          Preparing the mount point for Sybase resources on the new node
        3.  
          Adding a new Sybase ASE CE instance to the Sybase ASE CE cluster
        4.  
          Bringing the new Sybase ASE CE instance under VCS control
    2. Removing a node from SF Sybase CE clusters
      1.  
        About removing a node from a cluster
      2.  
        Removing a node from a cluster
      3.  
        Modifying the VCS configuration files on existing nodes
      4.  
        Modifying the Cluster Volume Manager (CVM) configuration on the existing nodes to remove references to the deleted node
      5.  
        Removing security credentials from the leaving node
  6. Section VI. Configuration of disaster recovery environments
    1. Configuring disaster recovery environments
      1.  
        Disaster recovery options for SF Sybase CE
      2.  
        About setting up a global cluster environment for SF Sybase CE
      3.  
        About configuring a parallel global cluster using Volume Replicator (VVR) for replication
  7. Section VII. Installation reference
    1. Appendix A. Installation scripts
      1.  
        Installation script options
      2.  
        About using the postcheck option
    2. Appendix B. Sample installation and configuration values
      1.  
        SF Sybase CE installation and configuration information
      2.  
        SF Sybase CE worksheet
    3. Appendix C. Tunable files for installation
      1.  
        About setting tunable parameters using the installer or a response file
      2.  
        Setting tunables for an installation, configuration, or upgrade
      3.  
        Setting tunables with no other installer-related operations
      4.  
        Setting tunables with an un-integrated response file
      5.  
        Preparing the tunables file
      6.  
        Setting parameters for the tunables file
      7.  
        Tunables value parameter definitions
    4. Appendix D. Configuration files
      1.  
        About sample main.cf files
      2. Sample main.cf files for Sybase ASE CE configurations
        1.  
          Sample main.cf for a basic Sybase ASE CE cluster configuration under VCS control with shared mount point on CFS for Sybase binary installation
        2.  
          Sample main.cf for a basic Sybase ASE CE cluster configuration with local mount point on VxFS for Sybase binary installation
        3.  
          Sample main.cf for a primary CVM VVR site
        4.  
          Sample main.cf for a secondary CVM VVR site
    5. Appendix E. Configuring the secure shell or the remote shell for communications
      1. About configuring secure shell or remote shell communication modes before installing products
        1.  
          Manually configuring passwordless ssh
        2.  
          Setting up ssh and rsh connection using the installer -comsetup command
        3.  
          Setting up ssh and rsh connection using the pwdutil.pl utility
        4.  
          Restarting the ssh session
        5.  
          Enabling rsh for Linux
    6. Appendix F. High availability agent information
      1. About agents
        1.  
          VCS agents included within SF Sybase CE
        2.  
          VCS agent for Sybase included within SF Sybase CE
      2. CVMCluster agent
        1.  
          Entry points for CVMCluster agent
        2.  
          Attribute definition for CVMCluster agent
        3.  
          CVMCluster agent type definition
        4.  
          CVMCluster agent sample configuration
      3. CVMVxconfigd agent
        1.  
          Entry points for CVMVxconfigd agent
        2.  
          Attribute definition for CVMVxconfigd agent
        3.  
          CVMVxconfigd agent type definition
        4.  
          CVMVxconfigd agent sample configuration
      4. CVMVolDg agent
        1.  
          Entry points for CVMVolDg agent
        2.  
          Attribute definition for CVMVolDg agent
        3.  
          CVMVolDg agent type definition
        4.  
          CVMVolDg agent sample configuration
      5. CFSMount agent
        1.  
          Entry points for CFSMount agent
        2.  
          Attribute definition for CFSMount agent
        3.  
          CFSMount agent type definition
        4.  
          CFSMount agent sample configuration
      6. Process agent
        1.  
          Agent functions
        2.  
          State definitions
        3.  
          Attributes
        4.  
          Resource type definition
        5.  
          Sample configurations
      7.  
        Monitoring options for the Sybase agent
      8. Sybase resource type
        1.  
          Type definition for the Sybase agent
        2.  
          Attribute definitions for the Sybase agent

Manually configuring passwordless ssh

The ssh program enables you to log into and execute commands on a remote system. ssh enables encrypted communications and an authentication process between two untrusted hosts over an insecure network.

In this procedure, you first create a DSA key pair. From the key pair, you append the public key from the source system to the authorized_keys file on the target systems.

Figure: Creating the DSA key pair and appending it to target systems illustrates this procedure.

Figure: Creating the DSA key pair and appending it to target systems

Creating the DSA key pair and appending it to target systems

Read the ssh documentation and online manual pages before enabling ssh. Contact your operating system support provider for issues regarding ssh configuration.

Visit the Openssh website that is located at: http://www.openssh.com/ to access online manuals and other resources.

To create the DSA key pair

  1. On the source system (sys1), log in as root, and navigate to the root directory.
    sys1 # cd /root
  2. To generate a DSA key pair on the source system, type the following command:
    sys1 # ssh-keygen -t dsa

    System output similar to the following is displayed:

    Generating public/private dsa key pair.
    Enter file in which to save the key (/root/.ssh/id_dsa):
  3. Press Enter to accept the default location of /root/.ssh/id_dsa.
  4. When the program asks you to enter the passphrase, press the Enter key twice.
    Enter passphrase (empty for no passphrase):

    Do not enter a passphrase. Press Enter.

    Enter same passphrase again:

    Press Enter again.

  5. Output similar to the following lines appears.
    Your identification has been saved in /root/.ssh/id_dsa.
    Your public key has been saved in /root/.ssh/id_dsa.pub.
    The key fingerprint is:
    1f:00:e0:c2:9b:4e:29:b4:0b:6e:08:f8:50:de:48:d2 root@sys1

To append the public key from the source system to the authorized_keys file on the target system, using secure file transfer

  1. From the source system (sys1), move the public key to a temporary file on the target system (sys2).

    Use the secure file transfer program.

    In this example, the file name id_dsa.pub in the root directory is the name for the temporary file for the public key.

    Use the following command for secure file transfer:

    sys1 # sftp sys2

    If the secure file transfer is set up for the first time on this system, output similar to the following lines is displayed:

    Connecting to sys2 ...
    The authenticity of host 'sys2 (10.182.00.00)' 
    can't be established. DSA key fingerprint is
    fb:6f:9f:61:91:9d:44:6b:87:86:ef:68:a6:fd:88:7d.
    Are you sure you want to continue connecting (yes/no)?
  2. Enter yes.

    Output similar to the following is displayed:

    Warning: Permanently added 'sys2,10.182.00.00' 
    (DSA) to the list of known hosts.
    root@sys2 password:
  3. Enter the root password of sys2.
  4. At the sftp prompt, type the following command:
    sftp> put /root/.ssh/id_dsa.pub

    The following output is displayed:

    Uploading /root/.ssh/id_dsa.pub to /root/id_dsa.pub
  5. To quit the SFTP session, type the following command:
    sftp> quit
  6. Add the id_dsa.pub keys to the authorized_keys file on the target system. To begin the ssh session on the target system (sys2 in this example), type the following command on sys1:
    sys1 # ssh sys2

    Enter the root password of sys2 at the prompt:

    password:

    Type the following commands on sys2:

    sys2 # cat /root/id_dsa.pub >> /root/.ssh/authorized_keys
    sys2 # rm  /root/id_dsa.pub 
  7. Run the following commands on the source installation system. If your ssh session has expired or terminated, you can also run these commands to renew the session. These commands bring the private key into the shell environment and make the key globally available to the user root:
    sys1 # exec /usr/bin/ssh-agent $SHELL
    sys1 # ssh-add
      Identity added: /root/.ssh/id_dsa

    This shell-specific step is valid only while the shell is active. You must execute the procedure again if you close the shell during the session.

To verify that you can connect to a target system

  1. On the source system (sys1), enter the following command:
    sys1 # ssh -l root sys2 uname -a

    where sys2 is the name of the target system.

  2. The command should execute from the source system (sys1) to the target system (sys2) without the system requesting a passphrase or password.
  3. Repeat this procedure for each target system.