Veritas Access Installation Guide
- Introducing Veritas Access
- Licensing in Veritas Access
- System requirements
- System requirements
- Linux requirements
- Linux requirements
- Network and firewall requirements
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About NIC bonding and NIC exclusion
- About VLAN Tagging
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading Veritas Access and operating system
- Upgrading Veritas Access using a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Troubleshooting the LTR upgrade
- Appendix C. Configuring the secure shell for communications
Removing Veritas Access 7.3.1 RPMs
The uninstall program stops the Veritas Access processes that are currently running during the uninstallation process.
To uninstall Veritas Access 7.3.1 RPMs
- Log in as the support user from the node where you want to uninstall Veritas Access.
- Start the uninstall program.
# cd /opt/VRTS/install
# ./uninstallaccess
The program specifies the directory where the logs are created. The program displays a copyright notice and a description of the cluster.
- Enter the IP addresses of the nodes from which you want to uninstall Veritas Access.
The program performs node verification checks and asks to stop all running Veritas Access processes.
- Enter y to stop all the Veritas Access processes.
The program stops the Veritas Access processes and uninstalls the software.
The uninstall program does the following tasks:
Verifies the communication between nodes.
Checks the installations on each node to determine the RPMs to be uninstalled.
Unloads kernel modules and removes the RPMs.
Review the output as the uninstaller stops processes.
You can make a note of the location of the summary, response, and log files that the uninstaller creates after removing all the RPMs.