vxfen-sles12_x86_64-Patch-7.1.0.100
Obsolete
The latest patch(es) : infoscale-sles12sp2_x86_64-Patch-7.1.0.200 

 Basic information
Release type: Patch
Release date: 2016-06-20
OS update support: None
Technote: None
Documentation: None
Popularity: 491 viewed    downloaded
Download size: 2.57 MB
Checksum: 3277965323

 Applies to one or more of the following products:
InfoScale Availability 7.1 On SLES12 x86-64
InfoScale Enterprise 7.1 On SLES12 x86-64
InfoScale Storage 7.1 On SLES12 x86-64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:

This patch is obsolete. It is superseded by: Release date
infoscale-sles12sp2_x86_64-Patch-7.1.0.200 2017-05-11
infoscale-sles12sp2_x86_64-Patch-7.1.0.100 (obsolete) 2017-03-20

 Fixes the following incidents:
3879189

 Patch ID:
VRTSvxfen-7.1.0.100-SLES12

Readme file
                          * * * READ ME * * *
                  * * * Veritas I/O Fencing 7.1 * * *
                         * * * Patch 100 * * *
                         Patch Date: 2016-06-09


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
Veritas I/O Fencing 7.1 Patch 100


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
SLES12 x86-64


PACKAGES AFFECTED BY THE PATCH
------------------------------
VRTSvxfen


BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * Veritas InfoScale Storage 7.1
   * Veritas InfoScale Availability 7.1
   * Veritas InfoScale Enterprise 7.1


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: 7.1.0.100
* 3879189 (3878333) In SCSI-3 mode, I/O fencing fails to automatically refresh 
registrations on coordination disks.


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following Symantec incidents:

Patch ID: 7.1.0.100

* 3879189 (Tracking ID: 3878333)

SYMPTOM:
With I/O fencing in SCSI-3 mode, if you enable the auto-refresh feature on the 
CoordPoint agent, then I/O fencing fails to automatically refresh registrations 
on the coordination points. This results in vxfen group to remain in faulted 
state.

DESCRIPTION:
Even to refresh registration on coordination disks, the vxfenswap script 
expects inputs about coordination disk groups from the CoordPoint agent. The 
CoordPoint agent does not provide this information to the vxfenswap script.
This causes the vxfenswap script to fail and the vxfen group remains faulted 
until it is manually cleared.

RESOLUTION:
The I/O fencing program is modified such that in SCSI3 mode fencing, the 
vxfenswap script does not explicitly require the coordination disk group 
information for refreshing registration keys on disks.



INSTALLING THE PATCH
--------------------
Run the Installer script to automatically install the patch:
-----------------------------------------------------------
To install the patch perform the following steps on at least one node in the cluster:
1. Copy the patch vxfen-sles12_x86_64-Patch-7.1.0.100.tar.gz to /tmp
2. Untar vxfen-sles12_x86_64-Patch-7.1.0.100.tar.gz to /tmp/hf
    # mkdir /tmp/hf
    # cd /tmp/hf
    # gunzip /tmp/vxfen-sles12_x86_64-Patch-7.1.0.100.tar.gz
    # tar xf /tmp/vxfen-sles12_x86_64-Patch-7.1.0.100.tar
3. Install the hotfix
    # pwd /tmp/hf
    # ./installVRTSvxfen710P100 [<host1> <host2>...]

You can also install this patch together with 7.1 GA release using Install Bundles
1. Download this patch and extract it to a directory
2. Change to the Veritas InfoScale 7.1 directory and invoke the installer script
   with -patch_path option where -patch_path should point to the patch directory.
    # ./installer -patch_path [<patch path>] [<host1> <host2>...]

Install the patch manually:
--------------------------
Perform the following steps on the node on which this patch is being applied:
1. Take backup of your configurations
2. Stop VCS
3. Install the patch
4. Restart VCS on the node

Stopping VCS on the cluster node
--------------------------------

1. Ensure that the "/opt/VRTSvcs/bin" directory is included in your PATH
   environment variable so that you can execute all the VCS commands. Refer 
   to Veritas Cluster Server Installation Guide for more information.

2. Freeze all the service groups persistently.
        # haconf -makerw
        # hagrp -freeze [group] -persistent

3. If the cluster is writable, you may close the configuration before stopping the cluster. 
   Stop the cluster on this node:
        # haconf -dump -makero

   Run the following command:
        # hastop -local
    
   Verify that the cluster is stopped by running the ha command:
        # hasys -state

   Make sure that both had and hashadow processes are stopped. Also, stop the VCS CmdServer:
        # CmdServer -stop

4. Stop the cluster services in order:
    - For AMF:
    # /etc/init.d/amf stop
    - For VxFEN:
    # /etc/init.d/vxfen stop
    
    
Note: Stop any other services depending on vxfen before stopping vxfen.

Installing the Patch
--------------------

1. Un-compress the downloaded patch from Symantec and change the directory to the uncompressed patch location.
   Install the patch using the following command:

    # rpm -Uvh VRTSvxfen-7.1.0.100-SLES12.x86_64.rpm

2. Run the following command to verify if the new patch has been installed:

    # rpm -q VRTSvxfen
        
   If the proper patch is installed, the following output is displayed:

   VRTSvxfen-7.1.0.100-SLES12.x86_64
                        
Re-starting the cluster services:
--------------------------------

1. To start the cluster services in order run the following command:
    - For VxFEN:
        # /etc/init.d/vxfen start
    - For AMF:
        # /etc/init.d/amf start
    - For VCS:
        # hastart
        # /opt/VRTSvcs/bin/CmdServer

2. Make VCS cluster writable:
         # haconf -makerw

3. Unfreeze all the groups:
         # hagrp -unfreeze [group] -persistent
         # haconf -dump -makero


REMOVING THE PATCH
------------------
Removal of the patch will result in removing the whole package
from the system/node. To go back to a previous installed version
of the package, you may need to re-install the package.
Run the following steps on the node where the patch is being uninstalled:

To remove the patch from a cluster node:
---------------------------------------------
1. Freeze all the service groups persistently.
        # haconf -makerw
        # hagrp -freeze [group] -persistent

2. Stop VCS on the node by running the following command:
    - Follow the stop sequence as mentioned in the PATCH INSTALLATION section.

3. Remove the patch by using the following command:
        # rpm -e VRTSvxfen

4. Verify that the patch has been removed from the system:
        # rpm -qa|grep VRTSvxfen
        
   Ensure that the package is not be displayed. This confirms that the package is removed.

5. Install the relevant package from the VCS base media. 
    Also refer to SORT for any applicable patches.

6. To start the cluster service, Follow the start sequence as mentioned in the PATCH INSTALLATION section.

7. Unfreeze all the groups.
         # hagrp -unfreeze [group] -persistent
         # haconf -dump -makero


SPECIAL INSTRUCTIONS
--------------------
NONE


OTHERS
------
NONE