* * * READ ME * * * * * * Veritas I/O Fencing 7.1 * * * * * * Patch 100 * * * Patch Date: 2016-06-09 This document provides the following information: * PATCH NAME * OPERATING SYSTEMS SUPPORTED BY THE PATCH * PACKAGES AFFECTED BY THE PATCH * BASE PRODUCT VERSIONS FOR THE PATCH * SUMMARY OF INCIDENTS FIXED BY THE PATCH * DETAILS OF INCIDENTS FIXED BY THE PATCH * INSTALLATION PRE-REQUISITES * INSTALLING THE PATCH * REMOVING THE PATCH PATCH NAME ---------- Veritas I/O Fencing 7.1 Patch 100 OPERATING SYSTEMS SUPPORTED BY THE PATCH ---------------------------------------- SLES11 x86-64 PACKAGES AFFECTED BY THE PATCH ------------------------------ VRTSvxfen BASE PRODUCT VERSIONS FOR THE PATCH ----------------------------------- * Veritas InfoScale Storage 7.1 * Veritas InfoScale Availability 7.1 * Veritas InfoScale Enterprise 7.1 SUMMARY OF INCIDENTS FIXED BY THE PATCH --------------------------------------- Patch ID: 7.1.0.100 * 3879189 (3878333) In SCSI-3 mode, I/O fencing fails to automatically refresh registrations on coordination disks. DETAILS OF INCIDENTS FIXED BY THE PATCH --------------------------------------- This patch fixes the following Symantec incidents: Patch ID: 7.1.0.100 * 3879189 (Tracking ID: 3878333) SYMPTOM: With I/O fencing in SCSI-3 mode, if you enable the auto-refresh feature on the CoordPoint agent, then I/O fencing fails to automatically refresh registrations on the coordination points. This results in vxfen group to remain in faulted state. DESCRIPTION: Even to refresh registration on coordination disks, the vxfenswap script expects inputs about coordination disk groups from the CoordPoint agent. The CoordPoint agent does not provide this information to the vxfenswap script. This causes the vxfenswap script to fail and the vxfen group remains faulted until it is manually cleared. RESOLUTION: The I/O fencing program is modified such that in SCSI3 mode fencing, the vxfenswap script does not explicitly require the coordination disk group information for refreshing registration keys on disks. INSTALLING THE PATCH -------------------- Run the Installer script to automatically install the patch: ----------------------------------------------------------- To install the patch perform the following steps on at least one node in the cluster: 1. Copy the patch vxfen-sles11_x86_64-Patch-7.1.0.100.tar.gz to /tmp 2. Untar vxfen-sles11_x86_64-Patch-7.1.0.100.tar.gz to /tmp/hf # mkdir /tmp/hf # cd /tmp/hf # gunzip /tmp/vxfen-sles11_x86_64-Patch-7.1.0.100.tar.gz # tar xf /tmp/vxfen-sles11_x86_64-Patch-7.1.0.100.tar 3. Install the hotfix # pwd /tmp/hf # ./installVRTSvxfen710P100 [ ...] You can also install this patch together with 7.1 GA release using Install Bundles 1. Download this patch and extract it to a directory 2. Change to the Veritas InfoScale 7.1 directory and invoke the installer script with -patch_path option where -patch_path should point to the patch directory. # ./installer -patch_path [] [ ...] Install the patch manually: -------------------------- Perform the following steps on the node on which this patch is being applied: 1. Take backup of your configurations 2. Stop VCS 3. Install the patch 4. Restart VCS on the node Stopping VCS on the cluster node -------------------------------- 1. Ensure that the "/opt/VRTSvcs/bin" directory is included in your PATH environment variable so that you can execute all the VCS commands. Refer to Veritas Cluster Server Installation Guide for more information. 2. Freeze all the service groups persistently. # haconf -makerw # hagrp -freeze [group] -persistent 3. If the cluster is writable, you may close the configuration before stopping the cluster. Stop the cluster on this node: # haconf -dump -makero Run the following command: # hastop -local Verify that the cluster is stopped by running the ha command: # hasys -state Make sure that both had and hashadow processes are stopped. Also, stop the VCS CmdServer: # CmdServer -stop 4. Stop the cluster services in order: - For AMF: # /etc/init.d/amf stop - For VxFEN: # /etc/init.d/vxfen stop Note: Stop any other services depending on vxfen before stopping vxfen. Installing the Patch -------------------- 1. Un-compress the downloaded patch from Symantec and change the directory to the uncompressed patch location. Install the patch using the following command: # rpm -Uvh VRTSvxfen-7.1.0.100-SLES11.x86_64.rpm 2. Run the following command to verify if the new patch has been installed: # rpm -q VRTSvxfen If the proper patch is installed, the following output is displayed: VRTSvxfen-7.1.0.100-SLES11 Re-starting the cluster services: -------------------------------- 1. To start the cluster services in order run the following command: - For VxFEN: # /etc/init.d/vxfen start - For AMF: # /etc/init.d/amf start - For VCS: # hastart # /opt/VRTSvcs/bin/CmdServer 2. Make VCS cluster writable: # haconf -makerw 3. Unfreeze all the groups: # hagrp -unfreeze [group] -persistent # haconf -dump -makero REMOVING THE PATCH ------------------ Removal of the patch will result in removing the whole package from the system/node. To go back to a previous installed version of the package, you may need to re-install the package. Run the following steps on the node where the patch is being uninstalled: To remove the patch from a cluster node: --------------------------------------------- 1. Freeze all the service groups persistently. # haconf -makerw # hagrp -freeze [group] -persistent 2. Stop VCS on the node by running the following command: - Follow the stop sequence as mentioned in the PATCH INSTALLATION section. 3. Remove the patch by using the following command: # rpm -e VRTSvxfen 4. Verify that the patch has been removed from the system: # rpm -qa|grep VRTSvxfen Ensure that the package is not be displayed. This confirms that the package is removed. 5. Install the relevant package from the VCS base media. Also refer to SORT for any applicable patches. 6. To start the cluster service, Follow the start sequence as mentioned in the PATCH INSTALLATION section. 7. Unfreeze all the groups. # hagrp -unfreeze [group] -persistent # haconf -dump -makero SPECIAL INSTRUCTIONS -------------------- NONE OTHERS ------ NONE