This page lists publically-released patches for Veritas Enterprise Products.
For Product GA build, see Veritas Entitlement Management System(VEMS) by clicking the Veritas Support 'Licensing' option.
For information on private patches, contact Veritas Technical Support.
Veritas is making it easier to find all software installers and updates for Veritas products with a completely redesigned experience. NetBackup HotFixes and NetBackup Appliance patches are now also available at the new Veritas Download Center.
Patches for your product can have a variety of names. These names are based on product, component, or package names. For more information on patch naming conventions and the relationship between products, components, and packages, see the SORT online help.
vxfen-sles11_x86_64-Patch-7.1.0.100
Sign in if you want to rate this patch.

 Basic information
Release type: Patch
Release date: 2016-06-19
OS update support: None
Technote: None
Documentation: None
Popularity: 222 viewed    35 downloaded
Download size: 3.38 MB
Checksum: 3845195239

 Applies to one or more of the following products:
InfoScale Availability 7.1 On SLES11 x86-64
InfoScale Enterprise 7.1 On SLES11 x86-64
InfoScale Storage 7.1 On SLES11 x86-64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
3879189

 Patch ID:
VRTSvxfen-7.1.0.100-SLES11

 Readme file  [Save As...]
                          * * * READ ME * * *
                  * * * Veritas I/O Fencing 7.1 * * *
                         * * * Patch 100 * * *
                         Patch Date: 2016-06-09


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
Veritas I/O Fencing 7.1 Patch 100


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
SLES11 x86-64


PACKAGES AFFECTED BY THE PATCH
------------------------------
VRTSvxfen


BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * Veritas InfoScale Storage 7.1
   * Veritas InfoScale Availability 7.1
   * Veritas InfoScale Enterprise 7.1


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: 7.1.0.100
* 3879189 (3878333) In SCSI-3 mode, I/O fencing fails to automatically refresh 
registrations on coordination disks.


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following Symantec incidents:

Patch ID: 7.1.0.100

* 3879189 (Tracking ID: 3878333)

SYMPTOM:
With I/O fencing in SCSI-3 mode, if you enable the auto-refresh feature on the 
CoordPoint agent, then I/O fencing fails to automatically refresh registrations 
on the coordination points. This results in vxfen group to remain in faulted 
state.

DESCRIPTION:
Even to refresh registration on coordination disks, the vxfenswap script 
expects inputs about coordination disk groups from the CoordPoint agent. The 
CoordPoint agent does not provide this information to the vxfenswap script.
This causes the vxfenswap script to fail and the vxfen group remains faulted 
until it is manually cleared.

RESOLUTION:
The I/O fencing program is modified such that in SCSI3 mode fencing, the 
vxfenswap script does not explicitly require the coordination disk group 
information for refreshing registration keys on disks.



INSTALLING THE PATCH
--------------------
Run the Installer script to automatically install the patch:
-----------------------------------------------------------
To install the patch perform the following steps on at least one node in the cluster:
1. Copy the patch vxfen-sles11_x86_64-Patch-7.1.0.100.tar.gz to /tmp
2. Untar vxfen-sles11_x86_64-Patch-7.1.0.100.tar.gz to /tmp/hf
    # mkdir /tmp/hf
    # cd /tmp/hf
    # gunzip /tmp/vxfen-sles11_x86_64-Patch-7.1.0.100.tar.gz
    # tar xf /tmp/vxfen-sles11_x86_64-Patch-7.1.0.100.tar
3. Install the hotfix
    # pwd /tmp/hf
    # ./installVRTSvxfen710P100 [<host1> <host2>...]

You can also install this patch together with 7.1 GA release using Install Bundles
1. Download this patch and extract it to a directory
2. Change to the Veritas InfoScale 7.1 directory and invoke the installer script
   with -patch_path option where -patch_path should point to the patch directory.
   # ./installer -patch_path [<patch path>] [<host1> <host2>...]

Install the patch manually:
--------------------------
Perform the following steps on the node on which this patch is being applied:
1. Take backup of your configurations
2. Stop VCS
3. Install the patch
4. Restart VCS on the node

Stopping VCS on the cluster node
--------------------------------

1. Ensure that the "/opt/VRTSvcs/bin" directory is included in your PATH
   environment variable so that you can execute all the VCS commands. Refer 
   to Veritas Cluster Server Installation Guide for more information.

2. Freeze all the service groups persistently.
        # haconf -makerw
        # hagrp -freeze [group] -persistent

3. If the cluster is writable, you may close the configuration before stopping the cluster. 
   Stop the cluster on this node:
        # haconf -dump -makero

   Run the following command:
        # hastop -local
    
   Verify that the cluster is stopped by running the ha command:
        # hasys -state

   Make sure that both had and hashadow processes are stopped. Also, stop the VCS CmdServer:
        # CmdServer -stop

4. Stop the cluster services in order:
    - For AMF:
    # /etc/init.d/amf stop
    - For VxFEN:
    # /etc/init.d/vxfen stop
    
    
Note: Stop any other services depending on vxfen before stopping vxfen.

Installing the Patch
--------------------

1. Un-compress the downloaded patch from Symantec and change the directory to the uncompressed patch location.
   Install the patch using the following command:

    # rpm -Uvh VRTSvxfen-7.1.0.100-SLES11.x86_64.rpm

2. Run the following command to verify if the new patch has been installed:

    # rpm -q VRTSvxfen
        
   If the proper patch is installed, the following output is displayed:

    VRTSvxfen-7.1.0.100-SLES11
                        
Re-starting the cluster services:
--------------------------------

1. To start the cluster services in order run the following command:
    - For VxFEN:
        # /etc/init.d/vxfen start
    - For AMF:
        # /etc/init.d/amf start
    - For VCS:
        # hastart
        # /opt/VRTSvcs/bin/CmdServer

2. Make VCS cluster writable:
         # haconf -makerw

3. Unfreeze all the groups:
         # hagrp -unfreeze [group] -persistent
         # haconf -dump -makero


REMOVING THE PATCH
------------------
Removal of the patch will result in removing the whole package
from the system/node. To go back to a previous installed version
of the package, you may need to re-install the package.
Run the following steps on the node where the patch is being uninstalled:

To remove the patch from a cluster node:
---------------------------------------------
1. Freeze all the service groups persistently.
        # haconf -makerw
        # hagrp -freeze [group] -persistent

2. Stop VCS on the node by running the following command:
    - Follow the stop sequence as mentioned in the PATCH INSTALLATION section.

3. Remove the patch by using the following command:
        # rpm -e VRTSvxfen

4. Verify that the patch has been removed from the system:
        # rpm -qa|grep VRTSvxfen
        
   Ensure that the package is not be displayed. This confirms that the package is removed.

5. Install the relevant package from the VCS base media. 
    Also refer to SORT for any applicable patches.

6. To start the cluster service, Follow the start sequence as mentioned in the PATCH INSTALLATION section.

7. Unfreeze all the groups.
         # hagrp -unfreeze [group] -persistent
         # haconf -dump -makero


SPECIAL INSTRUCTIONS
--------------------
NONE


OTHERS
------
NONE



Read and accept Terms of Service