Symantec™ Applicationha 6.1 Installation and Upgrade Guide - Linux On Vmware
Symantec™ Applicationha 6.1 Installation and Upgrade Guide - Linux On Vmware
January 2014
Legal Notice
Copyright 2014 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, the Checkmark Logo, Veritas, Veritas Storage Foundation,
CommandCentral, NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other
names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH
DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL
NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE
INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE
WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations, whether delivered by Symantec as on premises
or hosted services. Any use, modification, reproduction release, performance, display or
disclosure of the Licensed Software and Documentation by the U.S. Government shall be
solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical Supports
primary role is to respond to specific queries about product features and functionality.
The Technical Support group also creates content for our online Knowledge Base.
The Technical Support group works collaboratively with the other functional areas
within Symantec to answer your questions in a timely fashion. For example, the
Technical Support group works with Product Engineering and Symantec Security
Response to provide alerting services and virus definition updates.
Symantecs support offerings include the following:
A range of support options that give you the flexibility to select the right amount
of service for any size organization
For information about Symantecs support offerings, you can visit our website at
the following URL:
www.symantec.com/business/support/index.jsp
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Hardware information
Operating system
Network topology
Problem description:
Customer service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
Documentation
Product guides are available on the media in PDF format. Make sure that you are
using the current version of the documentation. The document version appears on
page 2 of each guide. The latest product documentation is available on the Symantec
website.
https://sort.symantec.com/documents
Your feedback on product documentation is important to us. Send suggestions for
improvements and reports on errors or omissions. Include the title and document
version (located on the second page), and chapter and section titles of the text on
which you are reporting. Send feedback to:
[email protected]
For information regarding the latest HOWTO articles, documentation updates, or
to ask a question regarding product documentation, visit the Storage and Clustering
Documentation forum on Symantec Connect.
https://www-secure.symantec.com/connect/storage-management/
forums/storage-and-clustering-documentation
Contents
Chapter 2
16
18
Chapter 3
10
11
11
13
13
14
14
20
22
22
22
40
25
26
26
27
28
29
29
30
30
31
Contents
Chapter 4
32
32
36
37
42
43
44
47
Chapter 5
Chapter 6
52
56
60
61
63
Chapter 7
51
52
65
66
67
67
68
69
Contents
Appendix A
Appendix B
Appendix C
76
77
77
78
78
79
79
80
80
Index
.................................................................................................................... 83
Chapter
Introducing Symantec
ApplicationHA
This chapter includes the following topics:
and Atomic Broadcast (GAB), Low Latency Transport (LLT), Intelligent Monitoring
Framework (IMF), and Veritas Fencing (VxFEN). Symantec ApplicationHA has a
lightweight server footprint that allows faster installation and configuration.
Key benefits include the following:
Full visibility and control over applications with the ability to start, stop, and
monitor applications running inside virtual machines.
Integration with VMware SRM Server that provides the capability to resume
application monitoring after the virtual machines are started on the recovery
site.
As part of the Console installation, the installer registers the Symantec High
Availability plugin for VMware vCenter Server. The plugin enables Symantec
ApplicationHA integration with VMware vSphere Client and adds the Symantec
11
High Availability tab, the Symantec High Availability dashboard, and the
Symantec High Availability home page to the VMware vSphere Client.
This plugin is required to view the Symantec High Availability tab, the Symantec
High Availability dashboard, and the Symantec High Availability home page, in
the vSphere Client.
The plugin enables you to install ApplicationHA guest components from the
vSphere Client GUI. It also enables you to ensure disaster recovery of the
monitored applications by using VMware Site Recovery Manager.
You can use the Symantec High Availability tab to configure application
monitoring, control application start and stop, and monitor the application status
on a virtual machine.
You can use the Symantec High Availability dashboard to administer application
monitoring on a VMware cluster or datacenter.
The Symantec High Availability home page is added as an vSphere Client
extension under the VMware Solutions and Applications pane. You can use the
Symantec High Availability home page to perform any of the following tasks:
The Console adds the Symantec ApplicationHA privileges to the vSphere Client
environment. You can use the privileges to configure access control for vCenter
Server users and groups.
12
Note: If you do not require the vSphere Client-integrated features described above,
you need not install theSymantec High Availability Console. You can alternately
configure and administer ApplicationHA from the Symantec High Availability view
of the Veritas Operations Manager Management Server Console. For details, see
VOM dcumentation
13
Infrastructure agents
Agents such as NIC, IP, and Mount are classified as infrastructure agents.
Infrastructure agents are automatically installed as part of the ApplicationHA
installation on virtual machines.
For more details about the infrastructure agents, refer to the Symantec Cluster
Server Bundled Agents Reference Guide (Linux).
Application agents
The ApplicationHA agent pack is released on a quarterly basis. The agent pack
includes support for new applications as well as fixes and enhancements to
existing agents. You can install the agent pack on an existing ApplicationHA
guest components installation.
Refer to the Symantec Operations Readiness Tools (SORT) Web site for
information on the latest agent pack availability.
https://sort.symantec.com/agents
Refer to the agent-specific configuration guide for more details about the
application agents.
14
Install a license key for the product and features that you want to install.
When you purchase a Symantec product, you receive a License Key certificate.
The certificate specifies the product keys and the number of product licenses
purchased.
If you upgrade to this release from a prior release of Symantec ApplicationHA, and
the existing license key has expired, the installer asks whether you want to upgrade
the key to the new version.
If you upgrade with the product installer, or if you install or upgrade with a method
other than the product installer, you must do one of the following to license the
products:
Run the vxkeyless command to set the product level for the products you have
purchased.
See Managing ApplicationHA licenses from the command line on page 72.
This option also requires that you manage the server or cluster with a
management server.
Use the vxlicinst command to install a valid product license key for the
products you have purchased.
See Managing ApplicationHA licenses from the command line on page 72.
15
You can add or view the license keys from a virtual machine that has ApplicationHA
guest components installed. You can add a license key through the command line
or the Symantec High Availability tab. For more information:
See About managing ApplicationHA licenses on page 70.
Install ApplicationHA
Configure ApplicationHA
The following figure represents the detailed workflow for getting started with
ApplicationHA and the corresponding document you must refer for details.
16
17
Monitor Application
Symantec ApplicationHA Users Guide
Using vSphere Client
- Symantec High Availability Tab (VM level)
- Symantec High Availability Dashboard (VMware Cluster/Datacenter level)
Using a browser (VM level)
(https://<VMNameorIP>:5634/vcs/admin/application_health.html?priv=ADMIN)
Using Veritas Operations Manager (VOM)
VOM documentation
Install ApplicationHA
Monitor applications
The following figure describes each step and the corresponding document that you
must refer for details.
18
19
Chapter
Planning to install
Symantec ApplicationHA
This chapter includes the following topics:
Additional requirements
Table 2-1
Task
Description
Installing
Symantec High
Availability
Console
Note: You must install the Console, before you install the guest
components.
21
Table 2-1
Task
Description
Editing VMware
VM monitoring
settings to enable
application
monitoring
VMware ESX Server version 4.1 Update 3, 5.0 Update 2, and 5.1
VMware ESXi Server version 5.0 Update 2, 5.1 Update 1 and 5.5
VMware vSphere Client version 4.1 Update 2, 5.0, 5.1, and 5.5
22
Table 2-2
Operating systems
Levels
Kernel version
Oracle Linux 5
Update 5, 6, 7, 2.6.18-194.el5
8. 9
2.6.18-238.el5
2.6.18-274.el5
2.6.18-308.el5
2.6.18-348.el5
Oracle Linux 6
Update 3 , 4
2.6.32-279.el6
2.6.32-358.el6
Update 5, 6, 7, 2.6.18-194.el5
8, 9
2.6.18-238.el5
2.6.18-274.el5
2.6.18-308.el5
2.6.18-348.el5
Update 3, 4
2.6.32-279.el6
2.6.32-358.el6
SP 2
3.0.13-0.27.1
SP 3
3.0.76-0.11.1
23
updates made to the following RPMs, provided the RPMs maintain the ABI
compatibility.
Table 2-3 lists the RPMs that ApplicationHA requires for a given Linux operating
system.
Table 2-3
Required RPMs
Operating system
Required RPMs
OEL 5
compat-libstdc++-33-3.2.3-61.x86_64.rpm
glibc-2.5-58.i686.rpm
glibc-common-2.5-58.x86_64.rpm
ksh-20100202-1.el5_5.1.x86_64.rpm
libgcc-4.1.2-50.el5.i386.rpm
libgcc-4.1.2-50.el5.x86_64.rpm
libstdc++-4.1.2-50.el5.i386.rpm
pam-0.99.6.2-6.el5_5.2.x86_64.rpm
RHEL 5
compat-libstdc++-33-3.2.3-61.x86_64.rpm
glibc-2.5-58.i686.rpm
glibc-2.5-58.x86_64.rpm
ksh-20100202-1.el5_5.1.x86_64.rpm
libgcc-4.1.2-50.el5.i386.rpm
libgcc-4.1.2-50.el5.x86_64.rpm
libstdc++-4.1.2-50.el5.i386.rpm
pam-0.99.6.2-6.el5_5.2.x86_64.rpm
RHEL 6
compat-libstdc++-33-3.2.3-69.el6.x86_64.rpm
glibc-2.12-1.7.el6.x86_64.rpm
glibc-2.12-1.7.el6.i686.rpm
ksh-20100621-2.el6.x86_64.rpm
libgcc-4.4.4-13.el6.i686.rpm
libgcc-4.4.4-13.el6.x86_64.rpm
libstdc++-4.4.4-13.el6.i686.rpm
libstdc++-4.4.4-13.el6.x86_64.rpm
pam-1.1.1-4.el6.x86_64.rpm
24
Table 2-3
Operating system
Required RPMs
SLES 11
glibc-2.11.1-0.17.4.x86_64.rpm
glibc-32bit-2.11.1-0.17.4.x86_64.rpm
ksh-93t-9.9.8.x86_64.rpm
libgcc43-32bit-4.3.4_20091019-0.7.35.x86_64.rpm
libgcc43-4.3.4_20091019-0.7.35.x86_64.rpm
libstdc++33-3.3.3-11.9.x86_64.rpm
libstdc++43-32bit-4.3.4_20091019-0.7.35.x86_64.rpm
Supported applications
Table 2-4 lists the applications that ApplicationHA Agent Pack currently supports
on virtual machines.
ApplicationHA Agent Pack supported applications
Table 2-4
Application
Version
Document
SAP Netweaver
7.0
7.1, 7.3
Oracle Database
WebLogic Server
WebSphere MQ
7.x, 8.x
25
Table 2-4
Application
Version
Document
5.1.x
MySQL
5.x
Note: Alternatively, you can use the Custom Application wizard to configure and
monitor applications that are not listed in the above support matrix. For more
information on configuring the custom application, refer to the Symantec
ApplicationHA Generic Agent Configuration Guide.
Permissions requirements
The following permissions are required for installing the ApplicationHA guest
components on the virtual machines:
You must have root privileges on the virtual machine where you install the guest
components.
In case of remote installation, you must also have root privileges on all the virtual
machines where you install the ApplicationHA guest components.
When you use the vSphere Client menu to install the guest components, the
installer prompts for the vCenter Server user name and password during the
installation.
This user account must have the privileges to enumerate the virtual machines
visible in the vSphere Client.
The installer uses this account to discover the virtual machine names in the
vCenter Server inventory.
26
Table 2-5
Component Name
Port
Settings
Description
Veritas Storage
Foundation
Messaging Service
(xprtld)
5634
Symantec
ApplicationHA
Service
Symantec
ApplicationHA
Authentication
Service
14153
Symantec
ApplicationHA
Database Service
14154
Additional requirements
The following additional software requirements apply:
Internet Explorer or Firefox Web browser is required on the system where the
vSphere client is running.
Microsoft Internet Explorer 6.x, 7.x, 8.x, and 9.x are supported.
Mozilla Firefox 3.x, 4.x, 5.x, and 6.x are supported.
27
Chapter
Installing Symantec
ApplicationHA Guest
Components
This chapter includes the following topics:
See Ports and firewall settings for application high availability on page 26.
Preinstallation tasks
Task
Reference
29
Click the Get Help link at the site for contact information and for useful links.
The VRTSvlic package enables product licensing. After the VRTSvlic is installed,
the following commands and their manual pages are available on the system:
vxlicinst
vxlicrep
vxlictest
Retrieves the features and their descriptions that are encoded in a license
key
For the Bourne Shell (bash or sh) or Korn Shell (ksh), type:
$ PATH=/opt/VRTS/bin:$PATH; export PATH
Log in as super user on the system from where you want to install
ApplicationHA.
The system must run the supported operating system version. You can either
install ApplicationHA on the node where you run the install program, or you
can install ApplicationHA on a remote node.
Insert the product disc with the ApplicationHA software into a drive that is
connected to the system.
The disc is automatically mounted.
30
Navigate to the location of the install program for the required operating system:
Operating system
Location
cdrom_root/rhel5_x86_64/applicationha
cdrom_root/rhel6_x86_64/applicationha
cdrom_root/sles11_x86_64/applicationha
Review the output as the program displays the results of the check and saves
the results of the check in a log file.
31
Method
Description
Interactive installation using the vCenter You can install ApplicationHA using the vCenter
menu
menu.
The installer uses the logged-on user account context for installation. Verify that
the logged-on user has local administrator privileges on the system where you
want to install.
Symantec recommends that you first install the Symantec High Availability
Console before installing the guest components. The ApplicationHA plugin is
registered during the Symantec High Availability Console installation.
32
During the guest components installation, the installer verifies the ApplicationHA
plugin registration on the vCenter Server. If the plugin is not registered, the
installer displays a prompt.
You can choose to proceed with the guest components installation; however
the ApplicationHA plugin registration is required for configuring application
monitoring from the vSphere Client.
The installer allows remote installation. You can launch the installer from any
virtual machine, cluster or a datacenter in your network.
In case of remote installations, ensure that the logged-on user has local
administrator privileges on all the remote systems where you wish to install the
guest components.
Note: ApplicationHA binaries for SLES and RHEL operating systems are stored on
separate DVDs. If you want to install ApplicationHA on both RHEL and SLES guests
using the vSphere Client GUI, then you must copy the RPMs for one of the Linux
flavors onto the Console host. For example, if you install the Console using the
Veritas Product Installer or VPI (which is a command-line based product installer
for Symantec Storage and High Availability products ) from the RHEL DVD, then
the RHEL binaries are automatically copied to the Console host. You must later
copy the SLES binaries by running the following command: CopyInstaller.batSource.
Where Source is the directory path where the SLES disc is mounted or copied.
For details, See Copying the guest components installation package on page 36.
Perform the following steps to install the ApplicationHA guest components on the
virtual machines, through the vSphere Client menu
Note: Execute only those steps that are applicable to the guest operating system.
33
Using the vSphere Client, connect to the vCenter Server and navigate to Home
> Solutions and Applications > Symantec High Availability.
On the Getting Started tab, click Install Guest Components
Alternatively,
Using the vSphere Client, connect to the vCenter Server and navigate to Home
> Hosts and Clusters.
From the vCenter inventory tree view, right-click on the datacenter, cluster or
any of the virtual machine and select Symantec High Availability > Install
Guest Components.
This launches the Symantec ApplicationHA Guest Components Installer.
On the vCenter Server Details panel, specify the vCenter Server user
credentials and then click Next.
The wizard discovers only those virtual machines where the user has the
permissions.
The specified user must have the following privileges:
vCenter privileges for "create tasks", "update tasks" and "acquire guest
control ticket" on the virtual machines.
On the Product Selection panel, select the product (ApplicationHA) that you
want to install.
The Packages included table lists the installation packages that are included
in the selected product.
Review the license agreement that is available against the corresponding
package, select I accept the terms of license agreement and then click Next.
A package is installed based on the operating system that runs on selected
systems.
Note: If a required package is not displayed, you must copy that package to
the Console host and then run this wizard again.
See Copying the guest components installation package on page 36.
34
Select the virtual machines on which you want to install the guest
components.
To select the virtual machines
If required, edit the user credentials and the license key details.
If the user credentials and license key is different for an individual virtual
machine, you can edit the details inline.
If the details to be edited are same for multiple virtual machines, select the
desired machines and click Edit. On the Edit Virtual Machine Details
panel, enter the details that apply to the selected virtual machines and click
OK.
35
The installer does not proceed with the installation unless all the selected
virtual machines have passed the validation checks.
On the Installation panel, review the progress of the tasks queued. After all the
tasks are queued and the status is marked as complete, click Finish.
This indicates that the selected virtual machines are queued for installation.
You can now view the installation progress under the Recent Tasks on vSphere
Client.
After the installation is complete single sign-on is configured for the virtual
machines with the Symantec High Availability Console host. You can now
proceed to configure application monitoring, using the Symantec High
Availability tab.
For details, refer to the individual application configuration guide.
Note: If the SSO configuration has failed for a virtual machine and you select
that virtual machine from vSphere Client to configure application monitoring
for an application, then the Symantec High Availability tab first displays a panel
to specify the virtual machine user credentials. This configures the single
sign-on for the virtual machine with the Symantec High Availability Console
host. After you configure the single sign-on you can configure application
monitoring for an application running on the virtual machine.
Insert the product software disc for Windows operating system into your system
drive.
36
Where,
Source: The directory path where the installer disc is mounted or copied.
For example,
CopyInstaller <D:>dvd2-linux\rhel5_x86_64
CopyInstaller <F:>dvd2-linux\sles11_x86_64
CopyInstaller <F:>dvd2-linux\win2k8_x86_64
Note: The system from where you install ApplicationHA must run the same Linux
distribution as the target virtual machines.
Perform the following steps to install ApplicationHA:
37
To install ApplicationHA
Confirm that you are logged in as the super user and you mounted the product
disc.
See Mounting the product disc on page 30.
Navigate to the directory that contains the installation program for the required
operating system:
Operating system
Directory
rhel5_x86_64
rhel6_x86_64
rhel5_x86_64
rhel6_x86_64
sles11_x86_64
38
If you want to install ApplicationHA with single sign-on enabled, execute the
following steps:
a. Create a file, say <SSO input file>, in the tmp folder with the following
contents:
$Obj::pool{Cfg}{sso_console_ip} = '1.2.3.4';
$Obj::pool{Cfg}{sso_local_username} = 'root';
$Obj::pool{Cfg}{sso_local_password} = 'encryptedpassword';
Note: You must enter only encrypted passwords in the SSO input files. See
Encrypting a password on page 42.
b. Start the installation program:
# ./installapplicationha61 require <SSO input file>
The install program starts with a copyright message and specifies the directory
where the logs are created.
Enter the name of the system where you want to install ApplicationHA.
The install program does the following:
Checks that the local system that runs the install program can communicate
with the remote system.
If the install program finds ssh binaries, it confirms that ssh can operate
without requests for passwords or passphrases.
If the default communication method ssh fails, the install program attempts
to use rsh.
Makes sure the system uses one of the supported operating systems.
See Supported guest operating systems on page 22.
39
Makes sure that either ssh or rsh communication is enabled between the
systems. Else, the install program prompts you for the root password and
allows you to enable communication using either ssh or rsh.
Makes sure that the system has the required operating system patches.
If the install program reports that any of the patches are not available, install
the patches on the system before proceeding with the ApplicationHA
installation.
See Required Linux RPMs for Symantec ApplicationHA on page 40.
Checks for the required file system space and makes sure that any
processes that are running do not conflict with the installation.
If requirements for installation are not met, the install program stops and
indicates the actions that you must perform to proceed with the process.
Review the list of RPMs that the install program would install on the virtual
machine.
The install program installs the ApplicationHA RPMs on the system that you
specified in step 5. For example, system1.
40
41
Based on what license type you want to use, enter one of the following:
1
The install program registers the license and completes the installation process.
42
The install program provides an option to collect data about the installation
process each time you complete an installation of the product. The install
program transfers the contents of the install log files to an internal Symantec
site. The information is used only to gather metrics about how you use the
install program. No personal customer data is collected, and no information
will be shared with any other parties. Information gathered may include the
product and the version installed or upgraded, the number of systems installed,
and the time spent in any section of the install process.
After the installation, note the location of the installation log files, the summary
file, and the response file for future reference.
These files provide useful information that can assist you with future
installations.
summary file
log file
response file
Encrypting a password
You must encrypt passwords before adding them to the SSO input files or the
response files. Symantec ApplicationHA provides the vcsencrypt utility to encrypt
passwords. You can find this utility in the Symantec ApplicationHA product disc.
For example, to install ApplicationHA on a machine running the RHEL 5 operating
system, you can find the utility in the following location:
cdrom_root/rhel5_x86_64/scripts/vcsencrypt
To encrypt a password:
Navigate to the directory that contains the encryption utility for the required
operating system:
Operating system
Directory
rhel5_x86_64
rhel6_x86_64
rhel5_x86_64
rhel6_x86_64
sles11_x86_64
43
Make sure the system where you want to install ApplicationHA meet the
installation requirements.
See Requirements for installing ApplicationHA on virtual machines on page 22.
Create a response file on the system where you want to run the installer.
See Response file variables to install Symantec ApplicationHA on page 44.
See Sample response file for installing Symantec ApplicationHA on page 47.
Caution: Make sure that the response file is readable only to the root user
because it may contain local user passwords.
Mount the product disc and navigate to the folder that contains the installation
program.
Start the installation from the system to which you copied the response file.
For example:
# cd /opt/VRTS/install/
# ./installapplicationha61 -responsefile response_file
Variable
List or Scalar
Description
CFG{accepteula}
Scalar
CFG{opt}{install}
Scalar
44
Table 3-3
Variable
List or Scalar
Description
CFG{systems}
List
CFG{prod}
Scalar
CFG{sso_console_ip}
Scalar
CFG{sso_local_username}
Scalar
CFG{sso_local_password}
Scalar
Scalar
45
Table 3-3
Variable
List or Scalar
Description
CFG{opt}{vxkeyless}
Scalar
CFG{uploadlogs}
Scalar
CFG{opt}{rsh}
Scalar
CFG{opt}{keyfile}
Scalar
CFG{opt}{pkgpath}
Scalar
CFG{opt}{tmppath}
Scalar
46
Table 3-3
Variable
List or Scalar
Description
CFG{opt}{logpath}
Scalar
47
$CFG{opt}{configure}=1;
$CFG{opt}{install}=1;
$CFG{opt}{installallpkgs}=1;
$CFG{prod}="APPLICATIONHA61";
$CFG{systems}=[ qw(system1) ];
$CFG{uploadlogs}=1;
48
Chapter
Performing
post-installation tasks
This chapter includes the following topics:
Navigate to the directory that contains the PDF version of the documents for
the required operating system:
Operating system
Directory
Oracle Linux 5
rhel5_x86_64/docs/applicationha/vmware
Oracle Linux 5
rhel6_x86_64/docs/applicationha/vmware
rhel5_x86_64/docs/applicationha/vmware
rhel6_x86_64/docs/applicationha/vmware
sles11_x86_64/docs/applicationha/vmware
For example, to access the documents for the RHEL 5 operating system,
# cd cdrom_root/rhel5_x86_64/
To copy the PDF to the /opt/VRTS/docs directory, run the following command:
# cp -rp docs /opt/VRTS/docs
You can also download the latest version of the product documentation from the
Symantec Operations Readiness Tools (SORT) Web site.
https://sort.symantec.com
50
Chapter
Upgrading Symantec
ApplicationHA
This chapter includes the following topics:
Upgrade matrix
Upgrading the ApplicationHA guest components using the vSphere Client menu
Table 5-1
Component
Upgrade details
Guest
Upgrade matrix
Table 5-2 provides the supported scenarios for upgrading ApplicationHA Guest
Components.
Table 5-2
Upgrade from
Upgrade to
Operating system
ApplicationHA 6 .1 Guest
Components
RHEL 5
52
Note: ApplicationHA binaries for SLES and RHEL operating systems are stored
on separate DVDs. If you want to install ApplicationHA on both RHEL and SLES
guests using the vSphere Client GUI, then you must copy the RPMs for one of the
Linux flavors onto the Console host. For example, if you install the Console using
the Veritas Product Installer or VPI (which is a command-line based product installer
for Symantec Storage and High Availability products ) from the RHEL DVD, then
the RHEL binaries are automatically copied to the Console host. You must later
copy the SLES binaries by running the following command: CopyInstaller.batSource.
Where Source is the directory path where the SLES disc is mounted or copied.
To upgrade the ApplicationHA guest components
Using the vSphere Client, connect to the vCenter Server and navigate to Home
> Solutions and Applications > Symantec High Availability.
On the Getting Started tab, click Install Guest Components
Alternatively,
Using the vSphere Client, connect to the vCenter Server and navigate to Home
> Hosts and Clusters.
From the vCenter inventory tree view, right-click on the datacenter, cluster or
any of the virtual machine and select Symantec High Availability > Install
Guest Components.
This launches the Symantec ApplicationHA Guest Components Installer.
On the Welcome panel, review the prerequisites and the Symantec Software
License Agreement and then click Next.
On the vCenter Server Details panel, specify the vCenter Server user
credentials. Click Next.
The wizard discovers only those virtual machines where the user has the
permissions.
The specified user must have the following privileges:
53
On the vCenter Server Details panel, specify the vCenter Server user
credentials and then click Next.
The wizard discovers only those virtual machines where the user has the
permissions.
The specified user must have the following privileges:
vCenter privileges for "create tasks", "update tasks" and "acquire guest
control ticket" on the virtual machines.
On the Product Selection panel, select the product (ApplicationHA) that you
want to upgrade.
The Packages included table lists the installation packages that are included
in the selected product.
Review the license agreement that is available against the corresponding
package, select I accept the terms of license agreement and then click Next.
A package is installed based on the operating system that runs on selected
systems.
Note: If a required package is not displayed, you must copy that package to
the Console host and then run this wizard again.
See Copying the guest components installation package on page 36.
Select the virtual machines on which you want to upgrade the guest
components.
To select the virtual machines
54
If required, edit the user credentials and the license key details.
If the user credentials and license key is different for an individual virtual
machine, you can edit the details inline.
If the details to be edited are same for multiple virtual machines, select the
desired machines and click Edit. On the Edit Virtual Machine Details
panel, enter the details that apply to the selected virtual machines and click
OK.
55
The installer does not proceed with the installation unless all the selected
virtual machines have passed the validation checks.
On the Installation panel, review the progress of the tasks queued. After all the
tasks are queued and the status is marked as complete, click Finish.
This indicates that the selected virtual machines are queued for upgrade.
You can now view the installation progress under the Recent Tasks on vSphere
Client.
After the installation is complete single sign-on is configured for the virtual
machines with the Symantec High Availability Console host. You can now
proceed to configure application monitoring, using the Symantec High
Availability tab.
For details, refer to the individual application configuration guide.
Note: If the SSO configuration has failed for a virtual machine and you select
that virtual machine from vSphere Client to configure application monitoring
for an application, then the Symantec High Availability tab first displays a panel
to specify the virtual machine user credentials. This configures the single
sign-on for the virtual machine with the Symantec High Availability Console
host. After you configure the single sign-on you can configure application
monitoring for an application running on the virtual machine.
56
To upgrade ApplicationHA
Confirm that you are logged in as the super user and you mounted the product
disc.
See Mounting the product disc on page 30.
Navigate to the directory that contains the product installation program for the
required operating system:
Operating system
Directory
Oracle Linux 5
rhel5_x86_64
Oracle Linux 6
rhel6_x86_64
rhel5_x86_64
rhel6_x86_64
sles11_x86_64
57
If you want to upgrade ApplicationHA with single sign-on enabled, execute the
following steps:
a. Create a file, say <SSO input file>, in the tmp folder with the following
contents:
$Obj::pool{Cfg}{sso_console_ip} = '1.2.3.4';
$Obj::pool{Cfg}{sso_local_username} = 'root';
$Obj::pool{Cfg}{sso_local_password} = 'encryptedpassword';
Note: You must enter only encrypted passwords in the SSO input files. See
Encrypting a password on page 42.
b. Start the installation program:
# ./installapplicationha61 require <SSO input file>
The install program starts with a copyright message and specifies the directory
where the logs are created.
Enter the name of the system where you want to install ApplicationHA.
The install program does the following:
Checks that the local system that runs the install program can communicate
with the remote system.
If the install program finds ssh binaries, it confirms that ssh can operate
without requests for passwords or passphrases.
If the default communication method ssh fails, the install program attempts
to use rsh.
Makes sure the system uses one of the supported operating systems.
See Supported guest operating systems on page 22.
58
Makes sure that either ssh or rsh communication is enabled between the
systems. Else, the install program prompts you for the root password and
allows you to enable communication using either ssh or rsh.
Makes sure that the system has the required operating system patches.
If the install program reports that any of the patches are not available, install
the patches on the system before proceeding with the ApplicationHA
installation.
See Required Linux RPMs for Symantec ApplicationHA on page 40.
Checks for the required file system space and makes sure that any
processes that are running do not conflict with the installation.
If requirements for installation are not met, the install program stops and
indicates the actions that you must perform to proceed with the process.
Review the list of RPMs that the install program would upgrade on each virtual
machine.
The install program upgrades the ApplicationHA RPMs on the system/s that
you specified in step 5. For example, system1.
The install program registers the license, and completes the upgrade process.
Note: To specify keyless licensing, follow the workaround provided in the
Symantec ApplicationHA Release Notes for incidents 3335745 and 3336308.
59
60
The install program provides an option to collect data about the installation
process each time you complete an installation of the product. The install
program transfers the contents of the install log files to an internal Symantec
site. The information is used only to gather metrics about how you use the
install program. No personal customer data is collected, and no information
will be shared with any other parties. Information gathered may include the
product and the version installed or upgraded, the number of systems installed,
and the time spent in any section of the install process.
After the upgrade, note the location of the installation log files, the summary
file, and the response file for future reference.
The files provide the useful information that can assist you with future
installations.
summary file
log file
response file
Make sure the system where you want to upgrade ApplicationHA meet the
installation requirements.
See Requirements for installing ApplicationHA on virtual machines on page 22.
Create a response file on the system where you want to run the installer.
See Response file variables to Upgrade Symantec ApplicationHA on page 61.
See Sample response file for Upgrading Symantec ApplicationHA on page 63.
Caution: Make sure that the response file is readable only to the root user
because it may contain local user passwords.
Mount the product disc and navigate to the folder that contains the installation
program.
For example, with the RHEL6 disc, use the following command:
# cd /cdrom_root/rhel6_x86_64/applicationha
Start the upgrade from the system to which you copied the response file. For
example:
# ./installapplicationha61 -responsefile /root/response_file
Variable
List or Scalar
Description
CFG{accepteula}
Scalar
61
Table 5-3
Variable
List or Scalar
Description
CFG{opt}{upgrade}
Scalar
CFG{systems}
List
CFG{prod}
Scalar
CFG{opt}{updatekeys}
Scalar
CFG{opt}{vxkeyless}
Scalar
CFG{uploadlogs}
Scalar
CFG{opt}{rsh}
Scalar
CFG{opt}{keyfile}
Scalar
CFG{opt}{tmppath}
Scalar
62
Table 5-3
Variable
List or Scalar
Description
CFG{opt}{logpath}
Scalar
63
$CFG{opt}{installall pkgs}=1;
$CFG{prod}="APPLICATIONHA61";
$CFG{systems}=[ qw(system1) ];
$CFG{sso_console_ip}="<IP address>";
$CFG{sso_local_username}="<user name>";
$CFG{sso_local_password}="<password>";
$CFG{uploadlogs}=1;
$CFG{opt}{vxkeyless}=1;
64
Chapter
Uninstalling Symantec
ApplicationHA Guest
Components
This chapter includes the following topics:
You must meet the following conditions to remotely uninstall ApplicationHA from a
virtual machine, using the uninstallapplicationha program:
Make sure that the communication with virtual machine exists. By default, the
uninstall program uses ssh.
Make sure you can execute ssh or rsh commands as super user on the virtual
machine.
If you cannot meet the prerequisites, you will not be able to remotely uninstall
ApplicationHA. You must run the uninstallapplicationha program on the virtual
machine from which you want to uninstall ApplicationHA.
The uninstallapplicationha program removes all ApplicationHA RPMs.
The following section describes how to uninstall ApplicationHA using the
uninstallapplicationha program. The example procedure uninstalls ApplicationHA
from the selected or provided virtual machine.
Log in as super user in the system where you want to uninstall ApplicationHA.
The program specifies the directory where the logs are created. The program
displays a copyright notice and a description of the virtual machine.
Enter the name of the system from which you want to uninstall ApplicationHA.
The program performs the following:
Review the output as the uninstall program stops processes and removes the
RPMs.
Note that the location of the summary and log files created by uninstall program
will be printed after removing all the RPMs.
66
If you have mounted the ApplicationHA media at /mnt/cdrom then, you can find
the uninstallapplicationha program in the following location:
/mnt/cdrom/directory/applicationha/
Where directory is the folder containing the uninstallapplicationha program for the
respective operating system.
Operating system
Directory
Oracle Linux 5
rhel5_x86_64
Oracle Linux 6
rhel6_x86_64
rhel5_x86_64
rhel6_x86_64
sles11_x86_64
67
Copy the response file to the system where you want to uninstall ApplicationHA.
See Sample response file for uninstalling Symantec ApplicationHA on page 69.
Start the uninstallation from the system to which you copied the response file.
For example:
# cd /opt/VRTS/install/
# ./uninstallapplicationha61 -responsefile response_file
Variable
List or Scalar
Description
CFG{opt}{uninstall}
Scalar
CFG{systems}
List
CFG{prod}
Scalar
CFG{uploadlogs}
Scalar
68
Table 6-1
Variable
List or Scalar
Description
CFG{opt}{rsh}
Scalar
CFG{opt}{tmppath}
Scalar
CFG{opt}{logpath}
Scalar
69
Chapter
Managing Symantec
ApplicationHA licenses
This chapter includes the following topics:
When you run the CPI installer to install or upgrade ApplicationHA, you can
specify a new license key.
You can also install a valid license key or a enable the keyless licensing feature
from the command line.
See Managing ApplicationHA licenses from the command line on page 72.
If you have not installed ApplicationHA, you can navigate to the Symantec High
Availability tab in the vSphere client, and click Install ApplicationHA Guest
Components, under Basic Tasks. This launches a wizard, where you can specify
a license.
Connect to the vCenter Server and navigate to Home > Solutions and
Application > Symantec ApplicationHA. Use this path to manage the licenses
for local and remote virtual machines.
See Managing ApplicationHA licenses through vSphere Client menu
on page 71.
Connect to the vCenter Server and select the virtual machine for which you want
to update the licenses. Select the Symantec High Availability tab and click
Licenses. Use this path to manage licenses for the local virtual machine.
See Managing ApplicationHA licenses through Symantec High Availability tab
on page 72.
You can also access the Symantec High Availability tab from an Internet browser
by using the following URL:
https://<IP_or_Hostname>:5634/vcs/admin/application_health.html?priv=ADMIN
Where IP_or_Hostname refers to the IP address or host name of the virtual
name where you want to manage an ApplicationHA license.
Connect to the vCenter Server and navigate to Home > Solutions and
Applications > Symantec ApplicationHA
71
Enter the license key in the Add License Key text box and click Validate Key.
The installer validates the license key. For successful validation the status
reflects New license applied. In case of validation failure, the status is reflects
Validation Failed. Enter a valid license key. Click Ok.
Click Apply.
Connect to the vCenter Server and from the Host and Clusters select the virtual
machine for which you want to update the licenses.
Click the Symantec High Availability tab and then click Licenses.
On the License Management panel, enter the permanent license key in the
Enter license key text box and then click Add.
Click Close.
72
View the current setting for all the product levels enabled for keyless licensing.
# ./vxkeyless -v display
View the possible settings for the product level for keyless licensing.
# ./vxkeyless displayall
73
Appendix
ApplicationHA installation
packages
This appendix includes the following topics:
RPM
Contents
VRTSvlic
VRTSperl
VRTSspt
VRTSsfmh
VRTSvcs
VRTSvcsag
Table A-1
RPM
Contents
VRTSvcsvmw
VRTSsapnw04
Contains the binaries for Symantec High Availability Agent for SAP
NetWeaver.
VRTSsapwebas71 Contains the binaries for Symantec High Availability Agent for SAP Web
Application Server.
VRTSjboss
Contains the binaries for Symantec High Availability Agent for JBoss
Application Server
VRTSmysql
Contains the binaries for Symantec High Availability agent for MySQL
VRTSacclib
VRTSvcsea
VRTSwls
VRTSwls contains the binaries for Veritas high availability agent for
WebLogic Server by Symantec.
VRTSvcswas
VRTSvcswas contains the binaries for Veritas high availability agent for
WebSphere Application Server by Symantec.
VRTSmq6
VRTSmq6 contains the binaries for Veritas high availability agent for
WebSphere MQ by Symantec.
VRTSvbs
VRTSsfcpi61
Installation
Configuration
Upgrade
Uninstallation
Adds nodes
Removes nodes
You can use this script to simplify the native operating system
installations.
75
Appendix
Troubleshooting Symantec
ApplicationHA installation
This appendix includes the following topics:
Restarting the vCenter Server or its service during the ApplicationHA guest
components installation displays "Error" in vSphere Client tasks
Reverting the virtual machine snapshot requires you to cancel the ApplicationHA
guest components installation
Non-supported operating system icon displayed for the selected virtual machine
Here, <installdirectory> is the directory where you install the Console, typically,
C:\Program Files\Veritas.
Perform the following steps to collect the Symantec High Availability Console logs:
Run the hagetcf utility from the directory. Type the following command:
hagetcf -appserver
Note: When installing ApplicationHA guest components using the response file
option, the log files are stored in the location specified inside the response file.
77
Mnemonic: the string ID that represents the product (for example, VCS).
78
Alternatively,
https://ApplicationHAConsole_IP:14152/ac/CancelGuestInstallation?
VmName=VirtualMachine_Name&VmUser=UserName&VmPassword=Password
Where,
79
The virtual machine user name and password must be the one specified during the
guest installation.
Note: You can also use this utility if you plan to cancel the queued installation task
or to cancel the installation tasks that held-up in the same state for a long time.
The wizard shows the non-supported operating system icon for the virtual machine
due to the delay in retrieving the virtual machine operating system details.
Workaround:
Allow certain time lapse after you power on or revert the snapshot of a virtual
machine and then proceed to install the guest components.
80
Appendix
ApplicationHA tunable
parameters
This appendix includes the following topics:
Parameter
Description
VIIMaxInstallerThreadCount
Table C-1
Parameter
Description
VIIPollingInterval
VIIQueueTimeout
VIICopyTimeout
VIIGuestInstallTimeout
82
Index
about
upgrade 51
ApplicationHA
about 10
C
client license 14
F
firewall settings
for application high availability 26
I
install
guest components; vSphere Client menu 32
installation
methods 32
of Symantec ApplicationHA
using install program 37
using response files 43
packages 74
preparing 28
installing Symantec ApplicationHA using install
program 37
installing Symantec ApplicationHA using repsonse
files 43, 60
L
license key 14
License management
local machine; Symantec High Availability tab 72
licensing 14
Logs
agents 78
installer 77
Symantec High Availability Console 77
P
port settings
for application high availability 26
pre-installation
checking the systems 31
obtaining license keys 29
setting PATH variable 30
pre-installation checks 31
product licensing 14
R
response files
generate a response file 43, 60
installing Symantec ApplicationHA
sample response file 47
variables 44, 61
uninstalling Symantec ApplicationHA
sample response file 69
variables 68
upgrading Symantec ApplicationHA
sample response file 63
S
setting PATH variable 30
Symantec ApplicationHA
installation using install program 37
installation using reponse file 43
license 14
uninstallation using reponse file 67
upgrade using install program 56
upgrading using reponse file 60
T
tunable parameters 81
Index
U
uninstallation
using response files 67
uninstalling Symantec ApplicationHA
removing packages 66
update
ApplicationHA license keys; vSphere Client
menu 71
upgrade
guest components; vSphere Client menu 52
matrix 52
Symantec ApplicationHA
using install program 56
upgrade scenarios
ApplicationHA Guest Components. 52
upgrade Symantec ApplicationHA using install
program 56
upgrading
Symantec ApplicationHA
using response files 60
84