vxfen-sol10_sparc-Patch-7.1.0.100

 Basic information
Release type: Patch
Release date: 2016-06-19
OS update support: None
Technote: None
Documentation: None
Popularity: 1073 viewed    downloaded
Download size: 2.15 MB
Checksum: 2846619081

 Applies to one or more of the following products:
InfoScale Availability 7.1 On Solaris 10 SPARC
InfoScale Enterprise 7.1 On Solaris 10 SPARC
InfoScale Storage 7.1 On Solaris 10 SPARC

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
3879189

 Patch ID:
152147-01

Readme file
                          * * * READ ME * * *
                  * * * Veritas I/O Fencing 7.1 * * *
                         * * * Patch 100 * * *
                         Patch Date: 2016-06-09


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
Veritas I/O Fencing 7.1 Patch 100


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
Solaris 10 SPARC


PACKAGES AFFECTED BY THE PATCH
------------------------------
VRTSvxfen


BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * Veritas InfoScale Storage 7.1
   * Veritas InfoScale Availability 7.1
   * Veritas InfoScale Enterprise 7.1


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: 152147-01
* 3879189 (3878333) In SCSI-3 mode, I/O fencing fails to automatically refresh 
registrations on coordination disks.


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following Symantec incidents:

Patch ID: 152147-01

* 3879189 (Tracking ID: 3878333)

SYMPTOM:
With I/O fencing in SCSI-3 mode, if you enable the auto-refresh feature on the 
CoordPoint agent, then I/O fencing fails to automatically refresh registrations 
on the coordination points. This results in vxfen group to remain in faulted 
state.

DESCRIPTION:
Even to refresh registration on coordination disks, the vxfenswap script 
expects inputs about coordination disk groups from the CoordPoint agent. The 
CoordPoint agent does not provide this information to the vxfenswap script.
This causes the vxfenswap script to fail and the vxfen group remains faulted 
until it is manually cleared.

RESOLUTION:
The I/O fencing program is modified such that in SCSI3 mode fencing, the 
vxfenswap script does not explicitly require the coordination disk group 
information for refreshing registration keys on disks.



INSTALLING THE PATCH
--------------------
Run the Installer script to automatically install the patch:
-----------------------------------------------------------
To install the patch perform the following steps on at least one node in the cluster:
1. Copy the patch vxfen-sol10_sparc-Patch-7.1.0.100.tar.gz to /tmp
2. Untar vxfen-sol10_sparc-Patch-7.1.0.100.tar.gz to /tmp/hf
    # mkdir /tmp/hf
    # cd /tmp/hf
    # gunzip /tmp/vxfen-sol10_sparc-Patch-7.1.0.100.tar.gz
    # tar xf /tmp/vxfen-sol10_sparc-Patch-7.1.0.100.tar
3. Install the hotfix
    # pwd /tmp/hf
    # ./installVRTSvxfen710P100 [<host1> <host2>...]

You can also install this patch together with 7.1 GA release using Install Bundles
1. Download this patch and extract it to a directory
2. Change to the Veritas InfoScale 7.1 directory and invoke the installer script
   with -patch_path option where -patch_path should point to the patch directory.
    # ./installer -patch_path [<patch path>] [<host1> <host2>...]

Install the patch manually:
--------------------------
Perform the following steps on the node on which this patch is being applied:
1. Take backup of your configurations
2. Stop VCS
3. Install the patch
4. Restart VCS on the node

To install the patch:
Note: Make sure that all the services depending on vxfen are stopped first.

1.Stop VCS:
# hastop -local

2. Stop VxFEN:
# svcadm disable vxfen

3. Unload the VxFEN module.
# modinfo | grep vxfen
# modunload -i <vxfen_module_id>    

4. Install VXFEN patch. Please go to the directory where the patch is downloaded and run the following command.
# patchadd  152147-01

5.After the installation completes, verify that the patch is installed.
   On each system type:
   # showrev -p | grep 152147-01


6. After installing the patch successfully, start VXFEN and HAD.

# svcadm enable vxfen
# hastart


REMOVING THE PATCH
------------------
Run the Uninstaller script to automatically remove the patch:
------------------------------------------------------------
To uninstall the patch perform the following step on at least one node in the cluster:
    # /opt/VRTS/install/uninstallVRTSvxfen710P100 [<host1> <host2>...]

Remove the patch manually:
-------------------------
Note: Make sure that all the services depending on vxfen are stopped first.

1. Stop VCS:
# hastop -local

2. Stop VxFEN:
# svcadm disable vxfen

3. Unload the VxFEN module
#modinfo | grep vxfen
#modunload -i  <vxfen_module_id>    

4. Remove VRTSvxfen patch:
# patchrm 152147-01


5. After the removal completes, verify that the patch has been removed from the system:
   # showrev -p | grep 152147-01

   No information is displayed after the patch is removed.

6. Start VxFEN:
# svcadm enable vxfen

7. Start VCS:
# hastart


SPECIAL INSTRUCTIONS
--------------------
NONE


OTHERS
------
NONE