* * * READ ME * * * * * * Veritas I/O Fencing 7.1 * * * * * * Patch 100 * * * Patch Date: 2016-06-09 This document provides the following information: * PATCH NAME * OPERATING SYSTEMS SUPPORTED BY THE PATCH * PACKAGES AFFECTED BY THE PATCH * BASE PRODUCT VERSIONS FOR THE PATCH * SUMMARY OF INCIDENTS FIXED BY THE PATCH * DETAILS OF INCIDENTS FIXED BY THE PATCH * INSTALLATION PRE-REQUISITES * INSTALLING THE PATCH * REMOVING THE PATCH PATCH NAME ---------- Veritas I/O Fencing 7.1 Patch 100 OPERATING SYSTEMS SUPPORTED BY THE PATCH ---------------------------------------- Solaris 10 SPARC PACKAGES AFFECTED BY THE PATCH ------------------------------ VRTSvxfen BASE PRODUCT VERSIONS FOR THE PATCH ----------------------------------- * Veritas InfoScale Storage 7.1 * Veritas InfoScale Availability 7.1 * Veritas InfoScale Enterprise 7.1 SUMMARY OF INCIDENTS FIXED BY THE PATCH --------------------------------------- Patch ID: 152147-01 * 3879189 (3878333) In SCSI-3 mode, I/O fencing fails to automatically refresh registrations on coordination disks. DETAILS OF INCIDENTS FIXED BY THE PATCH --------------------------------------- This patch fixes the following Symantec incidents: Patch ID: 152147-01 * 3879189 (Tracking ID: 3878333) SYMPTOM: With I/O fencing in SCSI-3 mode, if you enable the auto-refresh feature on the CoordPoint agent, then I/O fencing fails to automatically refresh registrations on the coordination points. This results in vxfen group to remain in faulted state. DESCRIPTION: Even to refresh registration on coordination disks, the vxfenswap script expects inputs about coordination disk groups from the CoordPoint agent. The CoordPoint agent does not provide this information to the vxfenswap script. This causes the vxfenswap script to fail and the vxfen group remains faulted until it is manually cleared. RESOLUTION: The I/O fencing program is modified such that in SCSI3 mode fencing, the vxfenswap script does not explicitly require the coordination disk group information for refreshing registration keys on disks. INSTALLING THE PATCH -------------------- Run the Installer script to automatically install the patch: ----------------------------------------------------------- To install the patch perform the following steps on at least one node in the cluster: 1. Copy the patch vxfen-sol10_sparc-Patch-7.1.0.100.tar.gz to /tmp 2. Untar vxfen-sol10_sparc-Patch-7.1.0.100.tar.gz to /tmp/hf # mkdir /tmp/hf # cd /tmp/hf # gunzip /tmp/vxfen-sol10_sparc-Patch-7.1.0.100.tar.gz # tar xf /tmp/vxfen-sol10_sparc-Patch-7.1.0.100.tar 3. Install the hotfix # pwd /tmp/hf # ./installVRTSvxfen710P100 [ ...] You can also install this patch together with 7.1 GA release using Install Bundles 1. Download this patch and extract it to a directory 2. Change to the Veritas InfoScale 7.1 directory and invoke the installer script with -patch_path option where -patch_path should point to the patch directory. # ./installer -patch_path [] [ ...] Install the patch manually: -------------------------- Perform the following steps on the node on which this patch is being applied: 1. Take backup of your configurations 2. Stop VCS 3. Install the patch 4. Restart VCS on the node To install the patch: Note: Make sure that all the services depending on vxfen are stopped first. 1.Stop VCS: # hastop -local 2. Stop VxFEN: # svcadm disable vxfen 3. Unload the VxFEN module. # modinfo | grep vxfen # modunload -i 4. Install VXFEN patch. Please go to the directory where the patch is downloaded and run the following command. # patchadd 152147-01 5.After the installation completes, verify that the patch is installed. On each system type: # showrev -p | grep 152147-01 6. After installing the patch successfully, start VXFEN and HAD. # svcadm enable vxfen # hastart REMOVING THE PATCH ------------------ Run the Uninstaller script to automatically remove the patch: ------------------------------------------------------------ To uninstall the patch perform the following step on at least one node in the cluster: # /opt/VRTS/install/uninstallVRTSvxfen710P100 [ ...] Remove the patch manually: ------------------------- Note: Make sure that all the services depending on vxfen are stopped first. 1. Stop VCS: # hastop -local 2. Stop VxFEN: # svcadm disable vxfen 3. Unload the VxFEN module #modinfo | grep vxfen #modunload -i 4. Remove VRTSvxfen patch: # patchrm 152147-01 5. After the removal completes, verify that the patch has been removed from the system: # showrev -p | grep 152147-01 No information is displayed after the patch is removed. 6. Start VxFEN: # svcadm enable vxfen 7. Start VCS: # hastart SPECIAL INSTRUCTIONS -------------------- NONE OTHERS ------ NONE