Symantec HP-UX manual Change directory to /dvdrom, Enter one or more system names to install Sfcfs

Page 19

Installing and configuring the product

Installing the product

21

To install the product

1Log in as superuser.

2Insert the appropriate media disc into your system’s DVD-ROM drive connected to your system.

3Determine the block device file for the DVD drive:

#ioscan -fnC disk

Make a note of the device file as it applies to your system.

4Create a directory in which to mount the software disc and mount the disc using the appropriate drive name. For example:

#mkdir -p /dvdrom

#/usr/sbin/mount -F cdfs /dev/dsk/c3t2d0 /dvdrom

5Change directory to /dvdrom:

#cd /dvdrom

6Run the installer command to install SFCFS. The installer script uses ssh to communicate with remote nodes as default:

#./installer

If you want to use rsh you must specify on the command line:

#./installer -rsh

7From the Installation menu, choose the I option for Install and select 6 the Veritas Storage Foundation Cluster File System. You are prompted to continue with the installation.

8Enter y to continue with the installation.

Do you wish to continue with the installation? [y,n,q] (y)

9Enter one or more system names to install SFCFS.

Enter the system names separted by spaces on which to install SFCFS: system01 system02

10Enter the license key for system01.

Enter a SFCFS license key for system01?

11Enter y to accept another license key or enter n to proceed.

Do you want to enter another license key for system02?

[y,n,q] (n)

12Enter 1, 2 or 3 to be installed on all systems.

Select the packages to be installed on all systems?

[1-3,q,?] (2)

13Press Return to continue.

Press [Return] to continue:

14Reboot all the nodes on which SFCFS is installed and proceed to “Configuring the Components.”

Image 19
Contents HP-UX Sfcfs Technical support Licensing and registrationPage Contents Adding a node to a cluster Chapter Upgrading the productInstalling and configuring the product Hardware overview Shared storage Fibre channel switchCluster platforms Software components Packages installed with Sfcfs onlyPackage Contents Optional packages for Sfcfs and Sfcfs HA Packages ContentsPHKL32272 Required HP-UX patchesPHKL32430 HP-UX Patch ID DescriptionRelease Notes PreinstallationProduct licensing Secure communication Setting Path and Manpath environment variablesAlternatively, remove the file /sbin/init.d/vmsa-server Veritas Enterprise AdministratorPrerequisites RequirementsInstalling the product Change directory to /dvdrom If you want to use rsh you must specify on the command lineEnter one or more system names to install Sfcfs Enter 1, 2 or 3 to be installed on all systemsConfiguring the Components Do you want to add another user to the cluster? y,n,q y Summary file Using the log filesInstallation log file Response fileEtc/llttab Verifying the configuration filesLow Latency Transport configuration files Etc/llthostsOutput resembles Checking Low Latency Transport operationLog into system02 # lltstat -p Checking Group Membership and Atomic Broadcast operation Group Membership and Atomic Broadcast configuration filesEtc/gabtab See the hastatus1M manual Output for an Sfcfs HA installation resemblesEnter the following command on any systems Checking cluster operationVerifying the configuration files #System Attribute Value Configuring VCS Verifying agent configurationSynchronizing time on Cluster File Systems Main.cf file Typical VCS configuration file for Sfcfs file resemblesSfcfs HA Only VCS application failover servicesVCS application failover services Upgrading the product Complete the following tasks in advance of upgrading Preparing to upgrade the productPlanning the upgrade Upgrade pathsMP1 Phased upgrade Upgrade OverviewFull upgrade Change to the top-level directory on the disc Upgrading from 3.5 to# hastart Replace it with Remove VRTSwebRun through , , , and on rest of the nodes to be upgraded See the Veritas Cluster Server Installation Guide Run the following command on all the nodes to start VCS Upgrading from 4.1 to Install all the prerequisite patches and reboot the machines Etc/VRTSvcs/conf/config/main.cf file Full upgrade Etc/VRTSvcs/conf/config/main.cf file Upgrading the disk layout versions # umount /mnt1 Upgrading the disk layout versions Adding and removing a node Change to the Sfcfs directory Enter y to install Sfcfs on these systemsEnter the system name of the new node to install Sfcfs Adding a node to a clusterStart VxVM on the system that has been added Enter 1 or 2 to be installed on all systemsWrite the new VCS configuration to disk Configuring Sfcfs and CVM agents on the new nodeRun the following command Open the VCS configuration for writingPut the CVM resources back online, in the following order Add shared disk groups to the cluster configurationCreate a /mnt on system03 and run the following commands Removing a node from a cluster# rm /etc/vxfentab # rm /etc/vxfendg # ./uninstallsfcfs Removing a node from a cluster Enter y to uninstall Sfcfs Enter the system names to uninstall SfcfsUninstalling the product Incorrect permissions for root on remote system Installation issuesInaccessible system Storage Foundation Cluster File System problemsResource temporarily unavailable Mount failures Unmount failuresFollowing error message displays Command failuresPerformance issues If this error message displaysNetwork partition/jeopardy High availability issuesLow memory

HP-UX specifications

Symantec HP-UX is a comprehensive security solution engineered to protect the HP-UX operating system, a variant of the UNIX OS developed by Hewlett-Packard (HP). As a robust enterprise environment, HP-UX is widely used in mission-critical applications, particularly in industries such as finance, telecommunications, and manufacturing. Symantec’s integration with HP-UX enhances security, providing essential features that cater to the needs of large organizations.

One of the main features of Symantec HP-UX is its advanced threat protection capabilities. It employs a multi-layered approach to security, utilizing signature-based detection, behavior-based analysis, and heuristics to identify and mitigate known and unknown threats. This real-time protection minimizes the risk of malware, ransomware, and other cyber threats that can compromise sensitive data and disrupt business operations.

In addition to threat protection, Symantec HP-UX includes robust data loss prevention (DLP) capabilities. DLP technology helps organizations ensure that their confidential data remains secure by preventing unauthorized access and exfiltration. This feature is particularly important for compliance with regulatory requirements such as GDPR and HIPAA, as it aids in safeguarding customer information.

Another significant characteristic of Symantec HP-UX is its scalability. Designed to handle the demands of enterprise environments, the solution can be easily integrated with existing IT infrastructure while adapting to growing workloads. This functionality is essential for organizations that require flexible security measures to accommodate expansion or changes in business processes.

Security management and reporting are also key components of Symantec HP-UX. The solution provides centralized management tools that allow administrators to monitor security status, deploy updates, and manage policy across multiple systems from a single interface. These tools enhance visibility into security incidents and enable organizations to respond promptly to potential threats.

Moreover, Symantec HP-UX offers automated updates and patch management. Regular updates are crucial for maintaining a secure environment, and the solution ensures that systems are protected against the latest vulnerabilities without requiring extensive manual intervention.

In summary, Symantec HP-UX is a powerful security solution designed for the HP-UX operating system. Its main features include advanced threat protection, data loss prevention, scalability, centralized management, and automated updates. These characteristics make it a vital tool for organizations aiming to protect their data and maintain a secure operational environment in the face of evolving cyber threats.