Cluster Server Installation Guide for Solaris x64 5.0 - Storage ...
Cluster Server Installation Guide for Solaris x64 5.0 - Storage ... Cluster Server Installation Guide for Solaris x64 5.0 - Storage ...
28 Preparing to install and configure VCSPreparing to install VCS 5.06 Review the output as the installvcs program checks for the installedpackages on the system.The installvcs program lists the packages that will be installed on thesystem. Press Enter to continue.7 Review the output as the installer installs the root broker on the system.8 Enter y when the installer prompts you to configure the Symantec ProductAuthentication Service.9 Enter a password for the root broker. Make sure the password contains aminimum of five characters.10 Enter a password for the authentication broker. Make sure the passwordcontains a minimum of five characters.11 Press Enter to start the Authentication Server processes.Do you want to start Symantec Product Authentication Service processes now? [y,n,q] y12 Review the output as the installer starts the Authentication Service.13 If you plan to configure the Authentication Service during VCS installation,choose to configure the cluster in secure mode when the installer promptsyou.See “Installing and configuring VCS 5.0” on page 48.Creating encrypted files forSymantec Product Authentication ServiceCreate encrypted files only if you plan on choosing the semiautomatic mode thatuses an encrypted file to configure the Authentication Service. The encryptedfiles must be created by the administrator on the root broker node. Theadministrator must create encrypted files for each node that would be a part ofthe cluster before you configure the Authentication Service for VCS. See VeritasCluster Server User’s Guide for more information. You can configure theAuthentication Service during or after VCS installation.See “Symantec Product Authentication Service” on page 20.To create encrypted files1 Determine the root broker domain name. Enter the following command onthe root broker system:east> # vssat showalltrustedcredsFor example, the domain name would resemble“Domain Name: root@east.symantecexample.com” in the output.
Preparing to install and configure VCSPreparing to install VCS 5.0292 For each node in the cluster, make sure that you have created an account onroot broker system.For example, to verify on node north:east> # vssat showprpl --pdrtype root \--domain root@east.symantecexample.com --prplname north■■If the output displays the principal account on root broker for theauthentication broker on the node, then delete the existing principalaccounts. For example:east> # vssat deleteprpl --pdrtype root \--domain root@east.symantecexample.com \--prplname north --silentIf the output displays an error similar to “Failed To Get Attributes ForPrincipal,” then the account for given authentication broker is notcreated on this root broker. Proceed to step 3.3 Create a principal account for each authentication broker in the cluster. Forexample:east> # vssat addprpl --pdrtype root --domain \root@east.symantecexample.com --prplname north \--password password --prpltype serviceYou must use this password that you create in the input file for theencrypted file.4 Make a note of the following information that is required for the input filefor the encrypted file.■■■■■hash - The root hash string that consists of 40 characters, as shown bythe command:east> # vssat showbrokerhashidentity - Authentication broker identityThe value that you provide for --prplname in step 3 (for example,north).password - Authentication broker passwordThe value that you provide for --password in step 3.root_domain - Domain name of the root broker systemThe value that you determined in step 1.broker_admin_password - Authentication broker password forAdministrator account on the nodeProvide a password of at least five characters long.5 For each node in the cluster, create the input file for the encrypted file.The installer presents the format of the input file for the encrypted filewhen you proceed to configure the Authentication Service using encryptedfile. For example, the input file for authentication broker on north wouldresemble:
- Page 1 and 2: Veritas Cluster ServerInstallation
- Page 3: Technical supportMake sure you have
- Page 6 and 7: 6 ContentsSetting up shared storage
- Page 8 and 9: 8 ContentsChapter 5Setting up I/O f
- Page 10 and 11: 10 ContentsChapter 8Chapter 9Adding
- Page 12 and 13: 12 Contents
- Page 14 and 15: 14 Introducing VCSVCS basicsFigure
- Page 16 and 17: 16 Introducing VCSVCS basicsNetwork
- Page 18 and 19: 18 Introducing VCSVCS basics
- Page 20 and 21: 20 Preparing to install and configu
- Page 22 and 23: 22 Preparing to install and configu
- Page 24 and 25: 24 Preparing to install and configu
- Page 26 and 27: 26 Preparing to install and configu
- Page 30 and 31: 30 Preparing to install and configu
- Page 32 and 33: 32 Preparing to install and configu
- Page 34 and 35: 34 Preparing to install and configu
- Page 36 and 37: 36 Preparing to install and configu
- Page 38 and 39: 38 Preparing to install and configu
- Page 40 and 41: 40 Preparing to install and configu
- Page 42 and 43: 42 Preparing to install and configu
- Page 44 and 45: 44 Preparing to install and configu
- Page 46 and 47: 46 Installing and configuring VCSAb
- Page 48 and 49: 48 Installing and configuring VCSIn
- Page 50 and 51: 50 Installing and configuring VCSIn
- Page 52 and 53: 52 Installing and configuring VCSIn
- Page 54 and 55: 54 Installing and configuring VCSIn
- Page 56 and 57: 56 Installing and configuring VCSIn
- Page 58 and 59: 58 Installing and configuring VCSIn
- Page 60 and 61: 60 Installing and configuring VCSIn
- Page 62 and 63: 62 Installing and configuring VCSIn
- Page 64 and 65: 64 Installing and configuring VCSIn
- Page 66 and 67: 66 Installing and configuring VCSIn
- Page 68 and 69: 68 Installing and configuring VCSPe
- Page 70 and 71: 70 Installing and configuring VCSPe
- Page 72 and 73: 72 Installing and configuring VCSPe
- Page 74 and 75: 74 Installing and configuring VCSPe
- Page 76 and 77: 76 Installing and configuring VCSCh
28 Preparing to install and configure VCSPreparing to install VCS <strong>5.0</strong>6 Review the output as the installvcs program checks <strong>for</strong> the installedpackages on the system.The installvcs program lists the packages that will be installed on thesystem. Press Enter to continue.7 Review the output as the installer installs the root broker on the system.8 Enter y when the installer prompts you to configure the Symantec ProductAuthentication Service.9 Enter a password <strong>for</strong> the root broker. Make sure the password contains aminimum of five characters.10 Enter a password <strong>for</strong> the authentication broker. Make sure the passwordcontains a minimum of five characters.11 Press Enter to start the Authentication <strong>Server</strong> processes.Do you want to start Symantec Product Authentication Service processes now? [y,n,q] y12 Review the output as the installer starts the Authentication Service.13 If you plan to configure the Authentication Service during VCS installation,choose to configure the cluster in secure mode when the installer promptsyou.See “Installing and configuring VCS <strong>5.0</strong>” on page 48.Creating encrypted files <strong>for</strong>Symantec Product Authentication ServiceCreate encrypted files only if you plan on choosing the semiautomatic mode thatuses an encrypted file to configure the Authentication Service. The encryptedfiles must be created by the administrator on the root broker node. Theadministrator must create encrypted files <strong>for</strong> each node that would be a part ofthe cluster be<strong>for</strong>e you configure the Authentication Service <strong>for</strong> VCS. See Veritas<strong>Cluster</strong> <strong>Server</strong> User’s <strong>Guide</strong> <strong>for</strong> more in<strong>for</strong>mation. You can configure theAuthentication Service during or after VCS installation.See “Symantec Product Authentication Service” on page 20.To create encrypted files1 Determine the root broker domain name. Enter the following command onthe root broker system:east> # vssat showalltrustedcredsFor example, the domain name would resemble“Domain Name: root@east.symantecexample.com” in the output.