Veritas Access Installation Guide

Last Published:
Product(s): Access (7.3.1)
Platform: Linux
  1. Introducing Veritas Access
    1.  
      About Veritas Access
  2. Licensing in Veritas Access
    1.  
      About Veritas Access product licensing
  3. System requirements
    1.  
      Important release information
    2. System requirements
      1. Linux requirements
        1.  
          Operating system RPM installation requirements and operating system patching
        2.  
          Kernel RPMs that are required to be installed with exact predefined RPM versions
        3.  
          OL kernel RPMs that are required to be installed with exact predefined RPM versions
        4.  
          Required operating system RPMs for OL 6.8
        5.  
          Required operating system RPMs for OL 7.3
        6.  
          Required operating system RPMs for OL 7.4
        7.  
          Required operating system RPMs for RHEL 6.6
        8.  
          Required operating system RPMs for RHEL 6.7
        9.  
          Required operating system RPMs for RHEL 6.8
        10.  
          Required operating system RPMs for RHEL 7.3
        11.  
          Required operating system RPMs for RHEL 7.4
      2.  
        Software requirements for installing Veritas Access in a VMware ESXi environment
      3.  
        Hardware requirements for installing Veritas Access virtual machines
      4.  
        Management Server Web browser support
      5.  
        Supported NetBackup versions
      6.  
        Supported OpenStack versions
      7.  
        Supported Oracle versions and host operating systems
      8.  
        Supported IP version 6 Internet standard protocol
    3. Network and firewall requirements
      1.  
        NetBackup ports
      2.  
        OpenDedup ports and disabling the iptable rules
      3.  
        CIFS protocols and firewall ports
    4.  
      Maximum configuration limits
  4. Preparing to install Veritas Access
    1.  
      Overview of the installation process
    2.  
      Hardware requirements for the nodes
    3. About using LLT over the RDMA network for Veritas Access
      1.  
        RDMA over InfiniBand networks in the Veritas Access clustering environment
      2.  
        How LLT supports RDMA for faster interconnections between applications
      3.  
        Configuring LLT over RDMA for Veritas Access
      4.  
        How the Veritas Access installer configures LLT over RDMA
      5.  
        LLT over RDMA sample /etc/llttab
    4.  
      Connecting the network hardware
    5. About obtaining IP addresses
      1.  
        About calculating IP address requirements
      2.  
        Reducing the number of IP addresses required at installation time
    6.  
      About checking the storage configuration
  5. Deploying virtual machines in VMware ESXi for Veritas Access installation
    1.  
      Setting up networking in VMware ESXi
    2.  
      Creating a datastore for the boot disk and LUNs
    3.  
      Creating a virtual machine for Veritas Access installation
  6. Installing and configuring a cluster
    1.  
      Installation overview
    2.  
      Summary of the installation steps
    3.  
      Before you install
    4. Installing the operating system on each node of the cluster
      1.  
        About the driver node
      2.  
        Installing the operating system on the target Veritas Access cluster
      3.  
        Installing the Oracle Linux operating system on the target Veritas Access cluster
      4.  
        Obtaining the Red Hat Enterprise Linux compatible kernels
    5. Installing Veritas Access on the target cluster nodes
      1.  
        Installing and configuring the Veritas Access software on the cluster
      2.  
        Veritas Access Graphical User Interface
    6. About NIC bonding and NIC exclusion
      1.  
        Excluding a NIC
      2.  
        Including a NIC
      3.  
        Creating a new NIC bond
      4.  
        Removing a NIC bond
      5.  
        Removing a NIC from the bond list
    7. About VLAN Tagging
      1.  
        Adding a VLAN device on a particular NIC
      2.  
        Limitations of VLAN Tagging
    8.  
      Replacing an Ethernet interface card
    9.  
      Configuring I/O fencing
    10.  
      About configuring Veritas NetBackup
    11.  
      About enabling kdump during an Veritas Access configuration
    12.  
      Reconfiguring the Veritas Access cluster name and network
    13.  
      Configuring a KMS server on the Veritas Access cluster
  7. Automating Veritas Access installation and configuration using response files
    1.  
      About response files
    2.  
      Performing a silent Veritas Access installation
    3.  
      Response file variables to install and configure Veritas Access
    4.  
      Sample response file for Veritas Access installation and configuration
  8. Displaying and adding nodes to a cluster
    1.  
      About the Veritas Access installation states and conditions
    2.  
      Displaying the nodes in the cluster
    3.  
      Before adding new nodes in the cluster
    4.  
      Adding a node to the cluster
    5.  
      Deleting a node from the cluster
    6.  
      Shutting down the cluster nodes
  9. Upgrading Veritas Access and operating system
    1.  
      Upgrading the operating system and Veritas Access
  10. Upgrading Veritas Access using a rolling upgrade
    1.  
      About rolling upgrades
    2.  
      Supported rolling upgrade paths for upgrades on RHEL
    3.  
      Performing a rolling upgrade using the installer
  11. Uninstalling Veritas Access
    1.  
      Before you uninstall Veritas Access
    2. Uninstalling Veritas Access using the installer
      1.  
        Removing Veritas Access 7.3.1 RPMs
      2.  
        Running uninstall from the Veritas Access 7.3.1 disc
  12. Appendix A. Installation reference
    1.  
      Installation script options
  13. Appendix B. Troubleshooting the LTR upgrade
    1.  
      Locating the log files for troubleshooting the LTR upgrade
    2.  
      Troubleshooting pre-upgrade issues for LTR
    3.  
      Troubleshooting post-upgrade issues for LTR
  14. Appendix C. Configuring the secure shell for communications
    1.  
      Manually configuring passwordless secure shell (ssh)
    2.  
      Setting up ssh and rsh connections using the pwdutil.pl utility

Installing the operating system on the target Veritas Access cluster

This first task in the installation process is to install the Red Hat Enterprise Linux operating system on each node of the cluster.

To install the operating system

  1. Insert the Red Hat Enterprise Linux operating system installation DVD, and boot the server from the DVD.

    See Linux requirements.

    You can also use an external USB DVD-ROM.

  2. Disable the consistent network device naming feature when installing the Red Hat Enterprise operating system.

    Note:

    By default, the consistent network device naming feature is enabled on Dell systems. To disable the feature, enter the following option on the boot command line: linux biosdevname=0

  3. At the boot prompt, select the Install and upgrade an existing system option. Press Enter.
  4. The installer asks you if you want to perform a media check or if you want to skip this option. Select Skip and continue with the installation.
  5. The installation starts with the Red Hat Enterprise Linux banner, click Next to continue installation.
  6. The installation displays a language selection screen. Veritas Access only supports English. Select English. English is used for the installation and as the system default. Click Next to continue.
  7. Select the correct layout type for the keyboard you would prefer to use for the installation and as the system default. Once you have made your selection, click Next to continue.
  8. You can install Red Hat Enterprise Linux on a large variety of storage devices. This screen lets you select either basic or specialized storage devices. Click Next to continue.
  9. The installer automatically detects any existing installations of Red Hat Enterprise Linux. It asks you to choose whether you want to perform a Fresh Installation or Upgrade an Existing Installation.

    If your system contains a Red Hat Enterprise Linux installation, a dialog appears asking whether you want to upgrade that installation. To perform an upgrade of an existing system, choose the appropriate installation from the drop-down list and select Next.

  10. The installer prompts you to set the host name for the root user. It also asks if you want to configure the network. Set the IP address to a proper public NIC so that you can access the NIC through that IP after a restart. Click Next to proceed.
  11. In the Time Zone Configuration screen, set your time zone by selecting the city closest to your computer's physical location. Click Next to proceed.
  12. The installer prompts you to set a root password for your system. You cannot proceed to the next stage of the installation process without entering a root password. Enter the root password into the Root Password field. Red Hat Enterprise Linux displays the characters as asterisks for security. Type the same password into the Confirm field to ensure that it is set correctly. After you set the root password, select Next to proceed.
  13. The installer asks you to choose the type of installation. Depending on your need, select the layout for installation.
  14. In the Disk Partitioning Setup screen, you can choose to create the default partition layout in one of four different ways. Or you can choose to partition storage devices manually to create a custom layout.
  15. If you selected the Encrypt System option, the installer prompts you for a pass phrase with which to encrypt the partitions on the system.
  16. If you selected more than one storage device on the storage devices selection screen, the installer asks you to select which of these devices should be available for installation of the operating system, and which should only be attached to the file system for data storage. If you selected only one storage device, the installer does not present you with this screen. During installation, the devices that you identify as being for data storage only are mounted as part of the file system, but are not partitioned or formatted. When you have finished identifying devices to be used for installation, click Next to continue.
  17. If no readable partition tables are found on existing hard disks, the installation program asks to initialize the hard disk. Click Re-initialize drive.
  18. The installer prompts you to create a custom layout or modify the default layout. The installer also prompts you to confirm the partitioning options that you selected. Click Write changes to disk to allow the installer to partition your hard drive and install Red Hat Enterprise Linux.
  19. The Package Installation Defaults screen appears and details the default packages for your Red Hat Enterprise Linux installation. This screen varies depending on the version of Red Hat Enterprise Linux you want to install.

    Configure the boot loader (GRUB) and select the installation packages as per the requirements. The installer searches for the required packages from the installation media and installs those packages. Select the Basic Server for RHEL 6.6, RHEL 6.7, and RHEL 6.8 versions and select Minimal Install option for RHEL 7.3 and RHEL 7.4 versions for installation.

  20. Once the package installation gets completed, you have to restart your system for post-installation tasks. Remove the install media and click on Reboot to continue.
  21. Your Red Hat Enterprise Linux installation is now complete. You can follow the same steps that are shown in this section to install the operating system on other nodes of the cluster.

    See the Red Hat Enterprise Linux documentation for the detailed procedure.

  22. Disable SELinux on all nodes in the cluster.