Symantec HP-UX manual Using the log files, Installation log file, Response file, Summary file

Page 22

24Installing and configuring the product

Using the log files

16Enter y or n if the VxVM default disk group information is correct. You are prompted to enable centralized management.

Enable Centralized Management? [y,n,q] (y) n

17Enter y or n to enable centralized management. You are prompted to verify the fully qualified domain name for system01.

Is the fully qualified host name system01.domain_name?

[y,n,q]

(y)

18Enter y or n to verify the fully qualified domain name for system01. You are prompted to start SFCFS process now.

Do you want to start Veritas Storage Foundation for Cluster

File System process now? [y,n,q] (y)

Using the log files

After product installation, the installation scripts create three text files in the /opt/VRTS/install/logs directory. Do not remove the log files until the Veritas products are working properly on your system. Technical Support will need these log files for debugging purposes.

Installation log file

The installation log file contains commands executed during the procedure, the output, and any errors generated by the commands. This file is for debugging installation problems and can be used by Veritas Technical Services.

Response file

The response file contains the configuration information entered during the procedure. The response file can be used for future installations by invoking an installation script with the responsefile option. The response file passes arguments to the script to automate the installation. This file can be edited to automate installation of additional systems.

Summary file

The summary file contains output of the Veritas product installation scripts. This file shows which products were installed, where the log and response files are for a particular installation, and the messages displayed at the end of installation.

Image 22
Contents HP-UX Sfcfs Licensing and registration Technical supportPage Contents Chapter Upgrading the product Adding a node to a clusterInstalling and configuring the product Hardware overview Shared storage Fibre channel switchCluster platforms Packages installed with Sfcfs only Software componentsPackage Contents Packages Contents Optional packages for Sfcfs and Sfcfs HARequired HP-UX patches PHKL32272HP-UX Patch ID Description PHKL32430Release Notes PreinstallationProduct licensing Setting Path and Manpath environment variables Secure communicationRequirements Veritas Enterprise AdministratorPrerequisites Alternatively, remove the file /sbin/init.d/vmsa-serverInstalling the product Enter 1, 2 or 3 to be installed on all systems If you want to use rsh you must specify on the command lineEnter one or more system names to install Sfcfs Change directory to /dvdromConfiguring the Components Do you want to add another user to the cluster? y,n,q y Response file Using the log filesInstallation log file Summary fileEtc/llthosts Verifying the configuration filesLow Latency Transport configuration files Etc/llttabOutput resembles Checking Low Latency Transport operationLog into system02 # lltstat -p Checking Group Membership and Atomic Broadcast operation Group Membership and Atomic Broadcast configuration filesEtc/gabtab Checking cluster operation Output for an Sfcfs HA installation resemblesEnter the following command on any systems See the hastatus1M manualVerifying the configuration files #System Attribute Value Configuring VCS Verifying agent configurationSynchronizing time on Cluster File Systems Typical VCS configuration file for Sfcfs file resembles Main.cf fileVCS application failover services Sfcfs HA OnlyVCS application failover services Upgrading the product Upgrade paths Preparing to upgrade the productPlanning the upgrade Complete the following tasks in advance of upgradingMP1 Phased upgrade Upgrade OverviewFull upgrade Upgrading from 3.5 to Change to the top-level directory on the disc# hastart Remove VRTSweb Replace it withRun through , , , and on rest of the nodes to be upgraded See the Veritas Cluster Server Installation Guide Run the following command on all the nodes to start VCS Upgrading from 4.1 to Install all the prerequisite patches and reboot the machines Etc/VRTSvcs/conf/config/main.cf file Full upgrade Etc/VRTSvcs/conf/config/main.cf file Upgrading the disk layout versions # umount /mnt1 Upgrading the disk layout versions Adding and removing a node Adding a node to a cluster Enter y to install Sfcfs on these systemsEnter the system name of the new node to install Sfcfs Change to the Sfcfs directoryEnter 1 or 2 to be installed on all systems Start VxVM on the system that has been addedOpen the VCS configuration for writing Configuring Sfcfs and CVM agents on the new nodeRun the following command Write the new VCS configuration to diskRemoving a node from a cluster Add shared disk groups to the cluster configurationCreate a /mnt on system03 and run the following commands Put the CVM resources back online, in the following order# rm /etc/vxfentab # rm /etc/vxfendg # ./uninstallsfcfs Removing a node from a cluster Enter the system names to uninstall Sfcfs Enter y to uninstall SfcfsUninstalling the product Installation issues Incorrect permissions for root on remote systemInaccessible system Storage Foundation Cluster File System problemsResource temporarily unavailable Unmount failures Mount failuresIf this error message displays Command failuresPerformance issues Following error message displaysHigh availability issues Network partition/jeopardyLow memory

HP-UX specifications

Symantec HP-UX is a comprehensive security solution engineered to protect the HP-UX operating system, a variant of the UNIX OS developed by Hewlett-Packard (HP). As a robust enterprise environment, HP-UX is widely used in mission-critical applications, particularly in industries such as finance, telecommunications, and manufacturing. Symantec’s integration with HP-UX enhances security, providing essential features that cater to the needs of large organizations.

One of the main features of Symantec HP-UX is its advanced threat protection capabilities. It employs a multi-layered approach to security, utilizing signature-based detection, behavior-based analysis, and heuristics to identify and mitigate known and unknown threats. This real-time protection minimizes the risk of malware, ransomware, and other cyber threats that can compromise sensitive data and disrupt business operations.

In addition to threat protection, Symantec HP-UX includes robust data loss prevention (DLP) capabilities. DLP technology helps organizations ensure that their confidential data remains secure by preventing unauthorized access and exfiltration. This feature is particularly important for compliance with regulatory requirements such as GDPR and HIPAA, as it aids in safeguarding customer information.

Another significant characteristic of Symantec HP-UX is its scalability. Designed to handle the demands of enterprise environments, the solution can be easily integrated with existing IT infrastructure while adapting to growing workloads. This functionality is essential for organizations that require flexible security measures to accommodate expansion or changes in business processes.

Security management and reporting are also key components of Symantec HP-UX. The solution provides centralized management tools that allow administrators to monitor security status, deploy updates, and manage policy across multiple systems from a single interface. These tools enhance visibility into security incidents and enable organizations to respond promptly to potential threats.

Moreover, Symantec HP-UX offers automated updates and patch management. Regular updates are crucial for maintaining a secure environment, and the solution ensures that systems are protected against the latest vulnerabilities without requiring extensive manual intervention.

In summary, Symantec HP-UX is a powerful security solution designed for the HP-UX operating system. Its main features include advanced threat protection, data loss prevention, scalability, centralized management, and automated updates. These characteristics make it a vital tool for organizations aiming to protect their data and maintain a secure operational environment in the face of evolving cyber threats.