Please enter search query.
Search <book_title>...
Storage Foundation for Oracle® RAC 7.4.1 Configuration and Upgrade Guide - Solaris
Last Published:
2019-06-18
Product(s):
InfoScale & Storage Foundation (7.4.1)
Platform: Solaris
- Section I. Configuring SF Oracle RAC
- Preparing to configure SF Oracle RAC
- Configuring SF Oracle RAC using the script-based installer
- Configuring the SF Oracle RAC components using the script-based installer
- Configuring the SF Oracle RAC cluster
- Configuring SF Oracle RAC in secure mode
- Configuring a secure cluster node by node
- Configuring the SF Oracle RAC cluster
- Setting up disk-based I/O fencing using installer
- Setting up server-based I/O fencing using installer
- Configuring the SF Oracle RAC components using the script-based installer
- Performing an automated SF Oracle RAC configuration
- Section II. Post-installation and configuration tasks
- Verifying the installation
- Performing additional post-installation and configuration tasks
- Section III. Upgrade of SF Oracle RAC
- Planning to upgrade SF Oracle RAC
- Performing a full upgrade of SF Oracle RAC using the product installer
- Performing an automated full upgrade of SF Oracle RAC using response files
- Performing a phased upgrade of SF Oracle RAC
- Performing a phased upgrade of SF Oracle RAC from version 6.2.1 and later release
- Performing a rolling upgrade of SF Oracle RAC
- Upgrading SF Oracle RAC using Live Upgrade or Boot Environment upgrade
- Performing post-upgrade tasks
- Section IV. Installation and upgrade of Oracle RAC
- Before installing Oracle RAC
- Preparing to install Oracle RAC using the SF Oracle RAC installer or manually
- Creating users and groups for Oracle RAC
- Creating storage for OCR and voting disk
- Configuring private IP addresses for Oracle RAC 11.2.0.1
- Configuring private IP addresses for Oracle RAC 11.2.0.2 and later versions
- Installing Oracle RAC
- Performing an automated Oracle RAC installation
- Performing Oracle RAC post-installation tasks
- Configuring the CSSD resource
- Relinking the SF Oracle RAC libraries with Oracle RAC
- Configuring VCS service groups for Oracle RAC
- Upgrading Oracle RAC
- Before installing Oracle RAC
- Section V. Adding and removing nodes
- Adding a node to SF Oracle RAC clusters
- Adding a node to a cluster using the Veritas InfoScale installer
- Adding the node to a cluster manually
- Setting up the node to run in secure mode
- Configuring server-based fencing on the new node
- Preparing the new node manually for installing Oracle RAC
- Adding a node to the cluster using the SF Oracle RAC response file
- Configuring private IP addresses for Oracle RAC 11.2.0.2 and later versions on the new node
- Removing a node from SF Oracle RAC clusters
- Adding a node to SF Oracle RAC clusters
- Section VI. Configuration of disaster recovery environments
- Configuring disaster recovery environments
- Configuring disaster recovery environments
- Section VII. Installation reference
- Appendix A. Installation scripts
- Appendix B. Tunable files for installation
- Appendix C. Sample installation and configuration values
- SF Oracle RAC worksheet
- Appendix D. Configuration files
- Sample configuration files
- Sample configuration files for CP server
- Appendix E. Configuring the secure shell or the remote shell for communications
- Appendix F. Automatic Storage Management
- Appendix G. Creating a test database
- Appendix H. High availability agent information
- About agents
- CVMCluster agent
- CVMVxconfigd agent
- CVMVolDg agent
- CFSMount agent
- CFSfsckd agent
- PrivNIC agent
- MultiPrivNIC agent
- CSSD agent
- VCS agents for Oracle
- Oracle agent functions
- Resource type definition for the Oracle agent
- Resource type definition for the Netlsnr agent
- Resource type definition for the ASMDG agent
- Oracle agent functions
- CRSResource agent
- Appendix I. SF Oracle RAC deployment scenarios
- Configuration diagrams for setting up server-based I/O fencing
Configuring the authentication broker on node sys5
To configure the authentication broker on node sys5
- Extract the embedded authentication files and copy them to temporary directory:
# mkdir -p /var/VRTSvcs/vcsauth/bkup
# cd /tmp; gunzip -c /opt/VRTSvcs/bin/VxAT.tar.gz | tar xvf -
- Edit the setup file manually:
# cat /etc/vx/.uuids/clusuuid 2>&1
The output is a string denoting the UUID. This UUID (without { and }) is used as the ClusterName for the setup file.
{UUID}
# cat /tmp/eat_setup 2>&1
The file content must resemble the following example:
AcceptorMode=IP_ONLY
BrokerExeName=vcsauthserver
ClusterName=UUID
DataDir=/var/VRTSvcs/vcsauth/data/VCSAUTHSERVER
DestDir=/opt/VRTSvcs/bin/vcsauth/vcsauthserver
FipsMode=0
IPPort=14149
RootBrokerName=vcsroot_uuid
SetToRBPlusABorNot=0
SetupPDRs=1
SourceDir=/tmp/VxAT/version
- Set up the embedded authentication file:
# cd /tmp/VxAT/version/bin/edition_number; \ ./broker_setup.sh/tmp/eat_setup
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssregctl -s -f /var/VRTSvcs/vcsauth/data/VCSAUTHSERVER/root/.VRTSat/profile \ /VRTSatlocal.conf -b 'Security\Authentication \ \Authentication Broker' -k UpdatedDebugLogFileName \ -v /var/VRTSvcs/log/vcsauthserver.log -t string
- Copy the broker credentials from one node in the cluster to sys5 by copying the entire
bkup
directory.The
bkup
directory content resembles the following example:# cd /var/VRTSvcs/vcsauth/bkup/
# ls
CMDSERVER HAD VCS_SERVICES WAC
- Import the VCS_SERVICES domain.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/atutil import -z \ /var/VRTSvcs/vcsauth/data/VCSAUTHSERVER -f /var/VRTSvcs/vcsauth/bkup \ /VCS_SERVICES -p password
- Import the credentials for HAD, CMDSERVER, and WAC.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/atutil import -z \ /var/VRTSvcs/vcsauth/data/VCS_SERVICES -f /var/VRTSvcs/vcsauth/bkup \ /HAD -p password
- Start the vcsauthserver process on sys5.
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vcsauthserver.sh
- Perform the following tasks:
# mkdir /var/VRTSvcs/vcsauth/data/CLIENT
# mkdir /var/VRTSvcs/vcsauth/data/TRUST
# export EAT_DATA_DIR='/var/VRTSvcs/vcsauth/data/TRUST'
# /opt/VRTSvcs/bin/vcsauth/vcsauthserver/bin/vssat setuptrust -b \ localhost:14149 -s high
- Create the
/etc/VRTSvcs/conf/config/.secure
file:# touch /etc/VRTSvcs/conf/config/.secure