|
---|
Release type: | Patch |
Release date: | 2018-04-12 |
OS update support: | None |
Technote: | None |
Documentation: | None |
Popularity: | 1059 viewed downloaded |
Download size: | 889.52 KB |
Checksum: | 1515493087 |
InfoScale Enterprise 7.3.1 On Windows x64
InfoScale Foundation 7.3.1 On Windows x64 InfoScale Storage 7.3.1 On Windows x64 |
None.
|
3942942
|
None.
|
* * * READ ME * * * * * * InfoScale 7.3.1 * * * * * * Patch 1 * * * Patch Date: 2018-04-11 This document provides the following information: * PATCH NAME * OPERATING SYSTEMS SUPPORTED BY THE PATCH * PACKAGES AFFECTED BY THE PATCH * BASE PRODUCT VERSIONS FOR THE PATCH * SUMMARY OF INCIDENTS FIXED BY THE PATCH * DETAILS OF INCIDENTS FIXED BY THE PATCH * INSTALLATION PRE-REQUISITES * INSTALLING THE PATCH * REMOVING THE PATCH PATCH NAME ---------- InfoScale 7.3.1 Patch 1 OPERATING SYSTEMS SUPPORTED BY THE PATCH ---------------------------------------- Windows 2016 X64 Windows 2012 X64 Windows Server 2012 R2 X64 BASE PRODUCT VERSIONS FOR THE PATCH ----------------------------------- * InfoScale Enterprise 7.3.1 * InfoScale Foundation 7.3.1 * InfoScale Storage 7.3.1 SUMMARY OF INCIDENTS FIXED BY THE PATCH --------------------------------------- Patch ID: Patch_7_3_10001_23_3942942 * 3942942 (3943399) InfoScale Storage does not identify ScaleIO block storage from Dell EMC. DETAILS OF INCIDENTS FIXED BY THE PATCH --------------------------------------- This patch fixes the following incidents: Patch ID: Patch_7_3_10001_23_3942942 * 3942942 (Tracking ID: 3943399) SYMPTOM: InfoScale Storage does not identify ScaleIO block storage from Dell EMC. DESCRIPTION: Dell EMC ScaleIO is a software-defined storage solution that uses local storage of the existing servers to create a virtual SAN. However, storage provisioned by ScaleIO is not discovered by SFW. Hence, SFW is not able to categorise storage from ScaleIO into a seperate enclosure and also cannot utilize the storage feature like thin provisioning. RESOLUTION: As a part of this hotfix, device discovery module is developed in SFW for ScaleIO. It identifies the storage available from ScaleIO and all the attributes like VDID, device type, array media type, serial number for use. FILE / VERSION: emc.dll/7.3.10001.1 vdid_shr.dll/7.3.10001.1 ddlprov.dll/7.3.10001.23 vdsprov.dll/7.3.10001.23 INSTALLING THE PATCH -------------------- This package contains self-extracting files that are specific to the processor architecture and operating system version. Choose the appropriate file for your computer's configuration. Download the appropriate hotfix executable to a temporary location on your system. You can install this hotfix using the GUI or from the command line. Instructions for both options are provided below. Before you begin ----------------: Ensure that the following Microsoft Knowledge Base (KB) Article's are installed before proceeding with the hotfix installation: - 3033929: Availability of SHA-2 code signing support for Windows 7 and Windows Server 2008 R2 - 2921916: The "Untrusted publisher" dialog box appears when you install a driver in Windows 7 or Windows Server 2008 R2 To install the hotfix using the GUI ----------------------------------- 1. Double click the hotfix executable file to extract the contents to a default location on the cluster node. The files are extracted to: "%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates" The Hotfix Installer Wizard is automatically launched after the files are extracted. 2. Click "Next" on the Welcome screen. The 'Hotfix Installation Task' screen lists the tasks that are performed by the installer. 3. Click "Install Hotfix" to begin the hotfix installation. The status of each installation task is updated as it completes. 4. After the tasks are complete, click "Next" and then click "Finish" to complete the installation process. 5. If prompted to restart the server, do so. To install the hotfix using the command line -------------------------------------------- 1. At the command prompt, run one of the following commands to extract the hotfix files to the default location: C:\temp\<Hotfix_BuildVersion_IncidentNumber_OS_Platform>.exe/x or C:\temp\<Hotfix_BuildVersion_IncidentNumber_OS_Platform>.exe/extract 2. From the command prompt, navigate to the default location where the hotfix files are extracted. The files are extracted to: "%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates\<Hotfix_BuildVersion_IncidentNumber>" 3. At the command prompt, run the following command to install the hotfix: VxHF.exe /install:<Hotfix_BuildVersion_IncidentNumber>/silent Here, <Hotfix_BuildVersion_IncidentNumber> is the name of the hotfix file excluding the OS, platform, and .exe extension. 4. Follow the instructions displayed in the command prompt to complete the hotfix installation. 5. If prompted to restart the server, do so at this time. REMOVING THE PATCH ------------------ Additional Notes ------------------------ - To confirm the installation of a hotfix, run the following command: vxhf.exe /list On server systems, vxhf.exe is located at: "%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates\<Hotfix_BuildVersion_IncidentNumber> " The output of this command lists the hotfixes installed on a system. - The hotfix installer (vxhf.exe) creates and stores logs at: "%allusersprofile%\Application Data\Veritas\VxHF" - For general information about the hotfix installer (vxhf.exe), refer to the following technote: http://www.veritas.com/docs/TECH73446 - To view a list of hotfixes already installed on a system, refer to the steps mentioned in the following technote: http://www.veritas.com/docs/TECH73438 - For information on uninstalling a hotfix, refer to the steps mentioned in the following technote: http://www.veritas.com/docs/TECH73443 SPECIAL INSTRUCTIONS -------------------- DISCLAIMER: This fix is provided without warranty of any kind including the warranties of title or implied warranties of merchantability, fitness for a particular purpose and non-infringement. Veritas disclaims all liability relating to or arising out of this fix. It is recommended that the fix be evaluated in a test environment before implementing it in your production environment. When the fix is incorporated into an InfoScale for Windows maintenance release, the resulting Hotfix or Service Pack must be installed as soon as possible. Veritas Technical Services will notify you when the maintenance release (Hotfix or Service Pack) is available if you sign up for notifications from the Veritas support site http://www.veritas.com/support and/or from Services Operations Readiness Tools (SORT) http://sort.veritas.com. OTHERS ------ NONE |
Why Register?
Get notifications about ASLs/APMs, HCLs, patches, and high availability agents
As a registered user, you can create notifications to receive updates about NetBackup Future Platform and Feature Plans, NetBackup hot fixes/EEBs in released versions, Array Support Libraries (ASLs)/Array Policy Modules (APMs), hardware compatibility lists (HCLs), patches and high availability agents. In addition, you can create system-specific notifications customized to your environment.
Compare configurations
The Compare Configurations feature lets you compare different system scans by the data collector. When you sign in, you can choose a target system, compare reports run at different times, and easily see how the system's configuration has changed.
Save configurations
After logging in, you can retrieve past reports, share reports with colleagues, review notifications you received, and retain custom settings. Anonymous users cannot access these features.
Bulk uploader
As a registered user,you can upload multiple reports, using the Bulk Uploader.