Storage Foundation 7.4.2 Configuration and Upgrade Guide - Linux

Last Published:
Product(s): InfoScale & Storage Foundation (7.4.2)
Platform: Linux
  1. Section I. Introduction and configuration of Storage Foundation
    1. Introducing Storage Foundation
      1. About Storage Foundation
        1.  
          About Veritas Replicator Option
      2.  
        About Veritas InfoScale Operations Manager
      3.  
        About Veritas Services and Operations Readiness Tools (SORT)
    2. Configuring Storage Foundation
      1.  
        Configuring Storage Foundation using the installer
      2. Configuring SF manually
        1.  
          Configuring Veritas Volume Manager
        2. Configuring Veritas File System
          1.  
            Loading and unloading the file system module
      3.  
        Configuring SFDB
  2. Section II. Upgrade of Storage Foundation
    1. Planning to upgrade Storage Foundation
      1.  
        About the upgrade
      2.  
        Supported upgrade paths
      3. Preparing to upgrade SF
        1.  
          Getting ready for the upgrade
        2.  
          Creating backups
        3.  
          Determining if the root disk is encapsulated
        4. Pre-upgrade planning when VVR is configured
          1.  
            Considerations for upgrading SF to 7.4 or later on systems with an ongoing or a paused replication
          2. Planning an upgrade from the previous VVR version
            1.  
              Planning and upgrading VVR to use IPv6 as connection protocol
        5.  
          Upgrading the array support
      4.  
        Using Install Bundles to simultaneously install or upgrade full releases (base, maintenance, rolling patch), and individual patches
    2. Upgrading Storage Foundation
      1. Upgrading Storage Foundation from previous versions to 7.4.2
        1.  
          Upgrading Storage Foundation using the product installer
      2. Upgrading Volume Replicator
        1. Upgrading VVR without disrupting replication
          1.  
            Upgrading VVR on the Secondary
          2.  
            Upgrading VVR on the Primary
      3.  
        Upgrading SFDB
    3. Performing an automated SF upgrade using response files
      1.  
        Upgrading SF using response files
      2.  
        Response file variables to upgrade SF
      3.  
        Sample response file for SF upgrade
    4. Performing post-upgrade tasks
      1.  
        Optional configuration steps
      2.  
        Re-joining the backup boot disk group into the current disk group
      3.  
        Reverting to the backup boot disk group after an unsuccessful upgrade
      4.  
        Recovering VVR if automatic upgrade fails
      5.  
        Resetting DAS disk names to include host name in FSS environments
      6.  
        Upgrading disk layout versions
      7.  
        Upgrading VxVM disk group versions
      8.  
        Updating variables
      9.  
        Setting the default disk group
      10.  
        Verifying the Storage Foundation upgrade
  3. Section III. Post configuration tasks
    1. Performing configuration tasks
      1.  
        Switching on Quotas
      2.  
        Enabling DMP support for native devices
      3. About configuring authentication for SFDB tools
        1.  
          Configuring vxdbd for SFDB tools authentication
  4. Section IV. Configuration and Upgrade reference
    1. Appendix A. Installation scripts
      1.  
        Installation script options
      2.  
        About using the postcheck option
    2. Appendix B. Configuring the secure shell or the remote shell for communications
      1.  
        About configuring secure shell or remote shell communication modes before installing products
      2.  
        Manually configuring passwordless ssh
      3.  
        Setting up ssh and rsh connection using the installer -comsetup command
      4.  
        Setting up ssh and rsh connection using the pwdutil.pl utility
      5.  
        Restarting the ssh session
      6.  
        Enabling rsh for Linux

Setting up ssh and rsh connection using the pwdutil.pl utility

The password utility, pwdutil.pl, is bundled under the scripts directory. The users can run the utility in their script to set up the ssh and rsh connection automatically.

# ./pwdutil.pl -h
Usage:

Command syntax with simple format:

    pwdutil.pl check|configure|unconfigure ssh|rsh <hostname|IP addr> 
				[<user>] [<password>] [<port>]

Command syntax with advanced format:

    pwdutil.pl [--action|-a 'check|configure|unconfigure']
               [--type|-t 'ssh|rsh']
               [--user|-u  '<user>']
               [--password|-p '<password>']
               [--port|-P '<port>']
               [--hostfile|-f '<hostfile>']
               [--keyfile|-k '<keyfile>']
               [-debug|-d]
               <host_URI>

    pwdutil.pl -h | -?

Table: Options with pwdutil.pl utility

Option

Usage

--action|-a 'check|configure|unconfigure'

Specifies action type, default is 'check'.

--type|-t 'ssh|rsh'

Specifies connection type, default is 'ssh'.

--user|-u '<user>'

Specifies user id, default is the local user id.

--password|-p '<password>'

Specifies user password, default is the user id.

--port|-P '<port>'

Specifies port number for ssh connection, default is 22

--keyfile|-k '<keyfile>'

Specifies the private key file.

--hostfile|-f '<hostfile>'

Specifies the file which list the hosts.

-debug

Prints debug information.

-h|-?

Prints help messages.

<host_URI>

Can be in the following formats:

<hostname>

<user>:<password>@<hostname>

<user>:<password>@<hostname>:

<port>

You can check, configure, and unconfigure ssh or rsh using the pwdutil.plutility. For example:

  • To check ssh connection for only one host:

    pwdutil.pl check ssh hostname
  • To configure ssh for only one host:

    pwdutil.pl configure ssh hostname user password 
  • To unconfigure rsh for only one host:

    pwdutil.pl unconfigure rsh hostname
  • To configure ssh for multiple hosts with same user ID and password:

    pwdutil.pl -a configure -t ssh -u user -p password hostname1 
    hostname2 hostname3
  • To configure ssh or rsh for different hosts with different user ID and password:

    pwdutil.pl -a configure -t ssh user1:password1@hostname1
    user2:password2@hostname2
  • To check or configure ssh or rsh for multiple hosts with one configuration file:

    pwdutil.pl -a configure -t ssh --hostfile /tmp/sshrsh_hostfile
  • To keep the host configuration file secret, you can use the 3rd party utility to encrypt and decrypt the host file with password.

    For example:

    ### run openssl to encrypt the host file in base64 format
    # openssl aes-256-cbc -a -salt -in /hostfile -out /hostfile.enc
    enter aes-256-cbc encryption password: <password>
    Verifying - enter aes-256-cbc encryption password: <password>
    
    ### remove the original plain text file
    # rm /hostfile
    
    ### run openssl to decrypt the encrypted host file
    # pwdutil.pl -a configure -t ssh `openssl aes-256-cbc -d -a 
    -in /hostfile.enc`
    enter aes-256-cbc decryption password: <password>
    
  • To use the ssh authentication keys which are not under the default $HOME/.ssh directory, you can use --keyfile option to specify the ssh keys. For example:

    ### create a directory to host the key pairs:
    # mkdir /keystore
    
    ### generate private and public key pair under the directory:
    # ssh-keygen -t rsa -f /keystore/id_rsa
    
    ### setup ssh connection with the new generated key pair under 
    the directory:
    # pwdutil.pl -a configure -t ssh --keyfile /keystore/id_rsa 
    user:password@hostname
    

You can see the contents of the configuration file by using the following command:

# cat /tmp/sshrsh_hostfile
user1:password1@hostname1
user2:password2@hostname2
user3:password3@hostname3
user4:password4@hostname4

# all default: check ssh connection with local user
hostname5
The following exit values are returned:

0     Successful completion.
1     Command syntax error.
2     Ssh or rsh binaries do not exist.
3     Ssh or rsh service is down on the remote machine.
4     Ssh or rsh command execution is denied due to password is required.
5     Invalid password is provided.
255   Other unknown error.