Vom Ms Install 6 1
Vom Ms Install 6 1
June 2014
Legal Notice
Copyright 2014 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, the Checkmark Logo, Veritas, Veritas Storage Foundation,
CommandCentral, NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered
trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other
names may be trademarks of their respective owners.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH
DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL
NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE
INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE
WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations, whether delivered by Symantec as on premises
or hosted services. Any use, modification, reproduction release, performance, display or
disclosure of the Licensed Software and Documentation by the U.S. Government shall be
solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical Supports
primary role is to respond to specific queries about product features and functionality.
The Technical Support group also creates content for our online Knowledge Base.
The Technical Support group works collaboratively with the other functional areas
within Symantec to answer your questions in a timely fashion. For example, the
Technical Support group works with Product Engineering and Symantec Security
Response to provide alerting services and virus definition updates.
Symantecs support offerings include the following:
A range of support options that give you the flexibility to select the right amount
of service for any size organization
For information about Symantecs support offerings, you can visit our website at
the following URL:
www.symantec.com/business/support/index.jsp
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Hardware information
Operating system
Network topology
Problem description:
Customer service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
Documentation
Your feedback on product documentation is important to us. Send suggestions for
improvements and reports on errors or omissions. Include the title and document
version (located on the second page), and chapter and section titles of the text on
which you are reporting. Send feedback to:
[email protected]
For information regarding the latest HOWTO articles, documentation updates, or
to ask a question regarding product documentation, visit the Storage and Clustering
Documentation forum on Symantec Connect.
https://www-secure.symantec.com/connect/storage-management/
forums/storage-and-clustering-documentation
Contents
Section 1
Chapter 1
Chapter 2
18
19
19
20
21
23
23
24
24
24
25
27
27
27
28
29
32
35
35
35
37
38
Contents
Chapter 3
41
41
41
45
44
44
45
47
47
49
49
50
51
51
52
52
53
55
57
58
58
59
60
61
61
63
63
64
66
66
67
67
68
Contents
Chapter 4
Chapter 5
70
71
77
79
80
82
82
84
85
86
87
88
90
91
91
92
93
93
Contents
Section 2
Chapter 6
Chapter 7
111
112
113
114
10
Contents
Chapter 8
121
122
122
123
123
124
125
127
128
129
131
132
134
137
138
139
140
142
144
145
145
146
149
150
151
153
155
155
156
157
157
11
Contents
Chapter 9
158
159
160
161
162
167
169
170
171
171
173
173
174
175
175
177
177
178
178
179
179
180
180
180
181
182
183
183
184
12
Contents
Chapter 10
Chapter 11
186
187
188
189
190
192
193
195
196
197
197
197
197
198
198
199
199
200
202
202
203
204
204
205
206
206
207
208
209
210
210
211
212
13
Contents
Chapter 12
217
219
221
222
223
224
225
225
226
227
227
Chapter 14
217
Chapter 13
212
213
214
215
216
229
230
231
232
233
234
235
235
14
Contents
Chapter 15
Appendix A
237
238
238
239
240
240
241
242
243
243
244
244
245
246
247
247
247
248
248
248
248
249
249
249
249
249
249
250
15
Contents
16
Section
Chapter
You can also use Veritas Operations Manager to visualize and report about the
hosts which do not have Symantec Storage Foundation High Availability products
installed on them.
In Veritas Operations Manager, you can establish user credentials such that
authorized users can access the product to perform sensitive management tasks.
Other users can perform only a basic set of operations, or can only view information.
A typical Veritas Operations Manager deployment consists of the following:
Management Server
Managed hosts
Virtualization environment
SAN fabrics
Linux:
19
Windows:
20
Table 1-1
VRTSsfmh_6.1.0.0_AIX.bff.Z
HP-UX
VRTSsfmh_6.1.0.0_HP-UX.tar.gz
Linux
VRTSsfmh_6.1.0.0_Linux.rpm
Solaris
versions
before
version 11
on SPARC
VRTSsfmh_6.1.0.0_SunOS_arch_sparc.pkg
Solaris 11
on SPARC
VRTSsfmh_6.1.0.0_SunOS_arch_sparc_osr_5.11.p5p
Solaris 10
on x86
VRTSsfmh_6.1.0.0_SunOS_arch_i386.pkg
Solaris 11
on x86
VRTSsfmh_6.1.0.0_SunOS_arch_i386_osr_5.11.p5p
Windows
32-bit
VRTSsfmh_6.1.0.0_Windows_arch_x86.msi
Windows
64-bit
VRTSsfmh_6.1.0.0_Windows_arch_x64.msi
Title
Description
21
Table 1-2
Title
Description
Table 1-3
URL
Description
https://sort.symantec.com/documents
Veritas Operations Manager help content is provided in two modes online and
offline.
The online mode is hosted on the web and is accessed when you launch the product
help. The offline mode is packaged as an add-on for Veritas Operations Manager,
for use if web access is not available.
The help content hosted on the web can be updated independently of product
release. For the most up-to-date version of the help content, use the online mode.
22
Before you begin the Veritas Operations Manager installation, ensure that you
have the following information:
You must have at least one valid support contract for Symantec Storage
Foundation High Availability to be entitled to use Veritas Operations Manager.
23
Installing Veritas Operations Manager host management on the hosts that will
be centrally managed
See About installing managed host on page 47.
24
The host should provide data security and space for a growing database as
Management Server discovers new managed hosts and monitors network events.
Ideally, the host should have RAID-protected storage and the capacity to grow
its file systems.
By agentless discovery using SSH (for UNIX/Linux hosts) or WMI (for Windows
hosts)
Note: Agentless discovery is not supported on the hosts that have any of the
Symantec Storage Foundation High Availability products installed on them.
For more information on agent and agentless hosts, see the Veritas Operations
Manager Management Server User Guide.
Before you install a managed host, make sure that it meets or exceeds the
recommended system requirements.
25
For more information on choosing a Management Server host, refer to the Veritas
Operations Manager Hardware and Software Compatibility List (HSCL).
See Operating system requirements on page 27.
See Choosing a Management Server host on page 24.
26
Chapter
System requirements
This chapter includes the following topics:
Supported hardware
System requirements
System resource requirements
32-bit SNIA Common HBA API on all Windows managed hosts running HBA
controllers.
The Common HBA API is typically available as part of your HBA vendors driver
kit, or you can download it from your HBA vendors site.
Follow these steps to determine if the SNIA Common HBA API is already present
on your Windows host.
To verify that the 32-bit SNIA Common HBA API is installed on a Windows host
Open the registry editor on the managed host using the regedit command.
CPU cores
Memory
Disk space
4GB
5GB
16GB
20GB
16
32GB
40GB
Add 4GB of memory and 5GB disk space if Management Server is used for the
deep discovery of enclosures using Storage Insight Add-on.
Add 4GB of memory and 5GB disk space if Management Server is used for the
discovery of virtualization infrastructure.
It is recommended to have a swap space that is at least twice the size of RAM.
It is recommended to upgrade the managed hosts to the latest version for the
best performance of the product.
28
System requirements
System resource requirements
The system resource requirements may vary based on the actual environment
in which the product is deployed.
CPU cores: 1
Memory: 1GB
Add 4GB of memory and 5GB disk space if being used as discovery host for
the deep discovery of enclosures using Storage Insight Add-on.
CPU: Dual processor for agentless discovery of every 1000 managed hosts.
Memory: 4GB for agentless discovery of every 1000 managed hosts. Add 4GB
of memory if Control Host is used for the discovery of virtualization infrastructure.
Disk space: 15GB of disk space for agentless discovery of every 1000 managed
hosts.
29
System requirements
System resource requirements
enclosure), data log for 1 day is stored on the discovery host, where as all the other
logs are stored on Management Server.
Note: If Veritas Operations Manager is configured in high availability environment,
storage array port, adapter, and enclosure logs are saved on a shared disk. VMware
ESX server and virtual machines logs are also saved on a shared disk.
Table 2-2 lists the space estimation for data logs for host, file system, volume, and
disk on Windows platform.
Space estimation for data logs
Table 2-1
Name of
resource
Number
Number
Interval of Duration Size in KB Size in KB
of
of metrics collection of
for a
resources collected
collection
single
object
Host,
1
VMware
1
ESX
server, and
1
Virtual
Machine
5 minutes
1 day
24
24
2 hours
1 month
29
29
1 day
1 year
30
30
Multipathing 1000
paths
1000
5 minutes
1 day
18967
19
2 hours
1 month
23477
24
Initiator
5 minutes
1 day
171
43
18
2 hours
1 month
423
106
18
1 day
1 year
428
107
5 minutes
1 day
76
19
2 hours
1 month
1 day
1 year
190
46
5 minutes
1 day
1423
14
100
1 day
1 year
1784
18
Enclosure
30
System requirements
System resource requirements
Table 2-1
Name of
resource
Number
Number
Interval of Duration Size in KB Size in KB
of
of metrics collection of
for a
resources collected
collection
single
object
Volume
100
1 minute
6 hours
2348
23
100
5 minutes
1 day
1898
19
100
2 hours
1 month
2348
23
100
1 day
1 year
2379
24
100
1 minute
6 hours
2348
23
100
5 minutes
1 day
1898
19
100
2 hours
1 month
2347
23
100
1 day
1 year
2379
23
32
30 minutes 1 day
304
32
2 hours
1 month
751
23
32
1 day
1 year
761
24
30 minutes 1 day
76
2 hours
1 month
188
23
1 day
1 year
190
24
30 minutes 1 day
2 hours
1 month
12
12
1 day
1 year
12
12
Disk
Storage
array Array port
Storage
array Adapter
Storage
array
-Enclosure
31
System requirements
System resource requirements
Table 2-2
Name of
resource
Number
Metrics
of
collected
resources
Host
5 mins
1 day
24
24
2 hours
1 month
29
29
1 day
1 year
30
30
5 minutes
1 day
1898
19
100
2 hours
1 month
2348
23
100
1 day
1 year
2379
24
100
5 minutes
1 day
1898
19
100
2 hours
1 month
2348
23
100
1 day
1 year
2379
24
100
5 minutes
1 day
1898
19
100
2 hours
1 month
2347
23
100
1 day
1 year
2379
23
Volume
Disk
Frequency in
minutes
Discovered information
Host
1440
32
System requirements
System resource requirements
Family
Frequency in
minutes
Discovered information
SF
30
VCS
60
DB
360
LDR
1440
NR
Native
360
PCV_NOTIFY
30
Zones
120
LDoms
120
KVM
120
Hyper-V
120
LPAR
360
33
System requirements
System resource requirements
Family
Frequency in
minutes
Discovered information
VMware
360
360
34
System requirements
Supported hardware
Family
Frequency in
minutes
Discovered information
Enclosures
360
Switches
360
Note: The discovery for the Storage Foundation and Symantec Cluster Server
families is event driven and scheduled. This means that the discovery is triggered
when configuration changes occur on the managed hosts. As a result, this
information is updated in the Veritas Operations Manager database in the following
update. If configuration changes are not detected on the managed hosts, the
communication between the managed host and Management Server is restricted
to the heartbeat communication that occurs every five minutes. You can connect
a managed host to multiple Management Servers. The performance of a managed
host is not affected in this scenario because the discovery happens only once.
Reporting of the state as per the host configuration is done based on the number
of Management Servers to which the managed host reports.
Supported hardware
For information on supported hardware for Veritas Operations Manager 6.1, refer
to the Veritas Operations Manager Hardware and Software Compatibility List (HSCL).
35
System requirements
Network and firewall requirements
You need to ensure that the localhost can be resolved from the host.
If localhost cannot be resolved from the host, update your network settings to enable
it.
For Veritas Operations Manager Management Server in High Availability, you need
to configure firewall settings for both the virtual and the physical IP of all cluster
nodes.
Veritas Operations Manager uses the default ports as shown in Table 2-3 to transfer
information.
Table 2-3
Port
Protocol
Initiator
Purpose
Effect if blocked
5634
TCP
Management
Server
Management
Server
configuration
Management
Server cannot be
configured.
5634
TCP
Management
Server
communications
with the managed
hosts
Managed host
cannot be added
to the
Management
Server domain.
5634
TCP
Managed host to
send heartbeats;
also used to
upload the data
from the managed
host to
Management
Server
Managed host
cannot be added
to the
Management
Server domain.
managed hosts
Note: It is
recommended
that you keep port
5634 open
between managed
hosts for
scalability and
performance
optimization.
14161
TCP
Web browser
Run the
Management
Server console
Users cannot
access the
Management
Server console.
36
System requirements
Network and firewall requirements
Table 2-3
Port
Protocol
Initiator
Purpose
Effect if blocked
162
UDP
Vmware VCenter
server
Receive SNMP
traps
Management
Server cannot
receive Virtual
Machine state
change SNMP
traps from
VMWare VCenter.
Changes to
vmware
infrastructure can
not be discovered
near real time
(NRT).
21
FTP
Management
Server
Management
Server
connectivity with
SORT
Management
Server can not
download patches
from SORT.
80
HTTP
Management
Server
Management
Server
connectivity with
SORT
Management
Server can not
download patches
from SORT.
443
HTTPS
Management
Server
Management
Server
connectivity with
SORT
Management
Server can not
download patches
from SORT.
37
System requirements
Proxy server requirements
Table 2-4
Components IPV6
IPV4
Management
Server
Supported
Supported
Not supported
Supported
Supported
Control Host
Supported
Supported
Supported
There should be connectivity between Management Server and the proxy server.
There should be connectivity between the proxy server and the resources that
Management Server needs to access. For example, SORT Web services.
Table 2-5 lists the default ports that a proxy server uses to communicate with other
resources:
Table 2-5
Protocol
Port
Effect if blocked
HTTP
80
HTTPS
443
FTP
21
SFTP
22
38
System requirements
Proxy server requirements
39
Chapter
Software packages
Package name
Description
VRTSsfmcs
VRTSsfmh
A Linux host
A Windows host
After you install Management Server, you have to configure Veritas Operations
Manager before you can use it.
See Installing Management Server on Linux on page 41.
See Installing Management Server on Windows on page 45.
41
The .bin file installs the VRTSsfmcs and the VRTSsfmh packages on the target host.
Note: By default, the VRTSsfmcs and the VRTSsfmh packages are installed in the
/opt directory. You cannot specify a different location to install the packages.
To install Veritas Operations Manager Management Server on Linux
Make sure that the host where you plan to install Management Server meets
or exceeds system and operating system requirements.
See Choosing a Management Server host on page 24.
On the host where you plan to install Management Server, log on as root.
Change directory to the location where you unzipped the .bin file.
./Veritas_Operations_Manager_MS_6.1_Linux.bin
./Veritas_Operations_Manager_MS_6.1_Linux_Full.bin
If you see the Permission Denied error, change the permissions for the .bin
file. To change the permission, run the appropriate command:
chmod +x Veritas_Operations_Manager_MS_6.1_Linux.bin
chmod +x Veritas_Operations_Manager_MS_6.1_Linux_Full.bin
To accept the End User License Agreement and proceed with installation, type
y.
The installation is complete when you see messages similar to the following:
Installation is complete. You will need to configure Veritas
Operations Manager Management Server.
Please open your browser and type the following URL to configure:
https://myhost.example.com:5634/
Please skip this step if you intend to use this host as a standby
node for Veritas Operations Manager Management Server HA.
42
Verify that the packages are installed and the processes are started.
See Verifying Management Server installation on Linux on page 44.
Note: By default, the VRTSsfmcs and VRTSsfmh packages are installed in the system
drive. You cannot specify a different location to install the package.
To install Veritas Operations Manager Management Server on Windows
Make sure that the host where you plan to install Management Server meets
or exceeds system and operating system requirements.
See Choosing a Management Server host on page 24.
On the host where you plan to install Management Server, log on as a user
with administrator privileges.
Turn off the Windows firewall, or, open ports 5634 and 14161 for TCP/IP
communication.
Ensure that there is no restart pending from Windows Update. If there is, restart
the host before launching the installer.
Make sure that the value for environment variable PATHEXT on the target host
includes the extensions .exe, .bat, and .vbs.
To proceed with the Management Server installation, accept the End User
License Agreement.
43
11 Click Finish.
12 Configure Veritas Operations Manager.
See Configuring Veritas Operations Manager on Linux and Windows
on page 45.
13 Verify that Management Server is installed and the required services are started.
See Verifying Management Server installation on Windows on page 44.
On the host where you installed Management Server, check whether the
VRTSsfmcs package is installed. Run the following command:
rpm -q VRTSsfmcs
Check whether the VRTSsfmh package is installed. Run the following command:
rpm -q VRTSsfmh
Check whether the xprtld process is started. Run the following command:
ps -ef | grep xprtld
44
On the host where you installed host management, on the Windows Control
Panel, click Add or Remove Programs.
Check whether Veritas Operations Manager for Windows appears in the list
of installed programs.
See Verifying the version of Management Server in the console on page 66.
See Installing Management Server on Windows on page 45.
Launch the Web browser. On Windows, if you chose to launch the configuration
after installation, the Web browser is automatically launched.
45
In the Server Setting panel, check and modify the Server Name, if required.
In the Database Setting panel, you can accept the default location or specify
your own location. To modify the default location, clear Use Default and specify
another location. On Windows, if you modify the default, you must have Full
control permission on the drive that you specify.
The default database directory is /var/opt/VRTSsfmcs/db on Linux and
%ALLUSERSPROFILE%\Symantec\VRTSsfmcs\db on Windows.
Click Next.
46
47
Make sure that the host where you plan to install managed host meets or
exceeds system and operating system requirements.
See Operating system requirements on page 27.
Download the managed host installation files bundle, and unzip it.
On the host where you plan to install managed host, log on as root.
Change directory to the location where you unzipped the installation files bundle.
On AIX or HP-UX hosts, decompress the downloaded file.
At the command prompt, enter one of the following commands to install the
package:
Verify that the VRTSsfmh package is installed and the required processes have
started.
See Verifying managed host installation on UNIX on page 51.
48
Make sure that the value for environment variable PATHEXT on the target host
includes the extensions .exe, .bat, and .vbs.
Make sure that the host where you plan to install managed host meets or
exceeds system and operating system requirements.
See Choosing the managed hosts on page 25.
Download the managed host installation files bundle, and unzip it.
From the directory to which you unzipped the installation files bundle, do one
of the following:
On the Ready to Install the Program screen, click Install to start the
installation.
Verify that the managed host program is installed and the required services
have started.
See Verifying managed host installation on Windows on page 52.
49
A script which will install SRTSsfmh pkg needs to be included at the time of
installing operating system using jumpstart.
Use the gendeploy.pl script to create a script that adds the host to the
Management Server domain.
In the finalized stages of the Solaris JumpStart installation, run the script that
is created through gendeploy.pl.
To create the script to be used for adding the hosts in Solaris JumpStart installation
where, scriptfilename is the name of the script file that has to be copied to the
managed host, and then run to add the host to the Management Server domain.
See Adding the managed hosts to Management Server using an agent
configuration on page 137.
See Adding the managed hosts to Management Server using an agentless
configuration on page 139.
See Adding managed hosts to Management Server using the Auto Configure
(gendeploy.pl) script on page 142.
parameters such as host id and MAC address of the host. Veritas Operations
Manager Management Server identifies a managed host using this identifier.
Some virtualization technologies such as VMware create a new BIOS UUID for a
Virtual Machine when it is cloned. The Veritas Operations Manager Agent
(VRTSsfmh package) uses this UUID to know if the host has been cloned.
On other virtualization technologies, you need to reset the host id of the clone is
reset. If host id is not reset, both the clone and the cloned hosts are recognized as
the same, which can cause data corruption in the Veritas Operations Manager
database. After you reset the host id of the clone, Veritas Operations Manager
removes any managed host-related configuration from the clone that gets copied
50
over from the cloned host. The clone is treated as a new host and has to be added
as a managed host to the Management Server domain.
See About installing managed host on page 47.
On the host where you installed managed host package, enter one of the
following at the command prompt to verify that the package is installed:
51
See Verifying the version of a managed host in the console on page 67.
See Installing managed host on UNIX/Linux on page 47.
On the host where you installed the managed host, launch the Windows
Control Panel, and click Programs and Features.
See Verifying the version of a managed host in the console on page 67.
See Installing managed host on Windows on page 49.
52
the Management Server operating system from SUSE Linux Enterprise Server 10
to SUSE Linux Enterprise Server 11.
For information on migrating Management Server, refer to the Veritas Operations
Manager Management Server Migration Add-on 6.0 User Guide.
For information on supported operating systems for Veritas Operations Manager
Management Server 6.1, refer to the Veritas Operations Manager Hardware and
Software Compatibility List (HSCL).
See Downloading Veritas Operations Manager 6.1 on page 19.
See Upgrading Management Server on Linux on page 53.
See Upgrading Management Server on Windows on page 55.
See Backing up Veritas Operations Manager data on Linux before upgrading to
version 6.1 on page 58.
See Backing up Veritas Operations Manager data on Windows before upgrading
to version 6.1 on page 61.
Make sure that the host where you plan to upgrade Management Server meets
or exceeds system and operating system requirements.
See Operating system requirements on page 27.
53
On the host where you plan to upgrade Management Server, log on as root.
Change directory to the location where you unzipped the .bin file.
If you see the Permission Denied error, change the permissions for the .bin
file. Run the appropriate command to change the permission:
To accept the End User License Agreement and proceed with the upgrade,
type y.
If you do not have sufficient disk space in your current database directory to
create the temporary files, you are prompted to provide the path for a temporary
working area having enough disk space. Provide the complete path of a
temporary working area.
You can calculate the disk space requirements for the temporary files as follows:
(2 * DB size) + (10% of DB size) + 150 MB
where DB size is the size of your database. The size of the database is actually
the size of the /var/opt/VRTSsfmcs/db/ database directory.
The upgrade is complete when you see message similar to the following:
Veritas Operations Manager upgrade is complete.
Verify that the version for the VRTSsfmcs package is displayed as 6.1.
See Verifying Management Server installation on Linux on page 44.
54
11 After a successful upgrade to Veritas Operations Manager 6.1, you can log on
to Management Server using the following link:
https://HOST_NAME:14161/vom
where, HOST_NAME is the name of the Management Server.
12 To check whether the Veritas Operations Manager services are running, run
the following command:
/opt/VRTSsfmh/bin/vomadm service --status
Make sure that the host where you plan to upgrade Management Server meets
or exceeds system and operating system requirements.
See Operating system requirements on page 27.
On the host where you plan to upgrade Management Server, log on as a user
with administrator privileges.
Turn off the Windows firewall, or, open ports 5634 and 14161 for TCP/IP
communication.
Ensure that there is no restart pending from Windows Update. If there is, restart
the host before launching the installer.
55
To accept the End User License Agreement and proceed with the upgrade,
select I accept the terms of the License Agreement, and click Next.
10 If the disk space in your current database directory is insufficient for creating
the temporary files, provide the path to a temporary work area that has the
required disk space.
You can calculate the disk space requirements for the temporary files as follows:
(2 * DB size) + (10% of DB size) + 350 MB
where, DB size is the size of your database. The size of the database is actually
the size of the C:\ProgramData\Symantec\VRTSsfmcs\db database directory.
11 The upgrade is complete when you see message similar to the following:
Completed the Veritas Operations Manager 6.1 Setup
15 After a successful upgrade to Veritas Operations Manager 6.1, you can log on
to Management Server using the following link:
https://HOST_NAME:14161/vom
where, HOST_NAME is the name of the Management Server.
16 In the Windows Services panel, check whether the Veritas Storage Foundation
Messaging Service and Veritas Operations Manager Database Service
are running.
See About upgrading Management Server on page 52.
See Upgrading managed host on Windows using the installer package on page 66.
56
Similarly, you need to restore Veritas Operations Manager data in the following
situations:
To restore the Management Server to the last backed up state, when the Veritas
Operations Manager 6.1 application fails.
To restore the Management Server for the previous version, when the
Management Server upgrade to version 6.1 fails.
You must use the script (vom_bkup.pl) of the same version for the backup and
restore tasks for that version. For example, use the version 6.1 script to back
up data, and use the same script when you need to restore the data.
You can restore data to a particular version only if the backup was taken for that
version. For example, if you back up data for version 4.1, you cannot restore
the backup to a version 5.0 Management Server. You can restore a version 4.1
backup only to a version 4.1 Management Server.
On Linux, you can use the script to back up or restore Management Server data
in either the standard configuration, or in the high-availability configuration.
On Windows, you can use the script to back up Management Server data in
either the standard configuration, or in the high-availability configuration.
However, you can restore the backup only for a standard configuration. To
restore the backed-up data for a high-availability configuration, contact Symantec
Technical Support.
57
Note: Veritas Operations Manager data is also backed up as a part of file system
level data backup on the Management Server. In such cases, you need to stop all
the Veritas Operations Manager processes before backing up the data.
On the host where you plan to back up Management Server, log on as a root
user.
where, dir is the location that you specify for creating the backup. You can
specify any location except /var/opt/VRTSsfmh, /opt/VRTSsfmh,
/var/opt/VRTSsfmcs, or /opt/VRTSsfmcs.
See Restoring backed up data on Linux on page 59.
58
On the host where you plan to back up Management Server, log on as a root
user.
where, dir is the location that you specify for creating the backup. You can
specify any location except /var/opt/VRTSsfmh, /opt/VRTSsfmh,
/var/opt/VRTSsfmcs, or /opt/VRTSsfmcs.
See Restoring backed up data on Linux on page 59.
Change the physical host name and the IP address to match the system on
which the backup was taken.
Install all the add-ons that were installed on Management Server at the time of
backing up the data.
Before you restore the data, review information on what is supported, and the
limitations.
See About backing up and restoring Veritas Operations Manager data on page 57.
59
where, dir is the location that you specified for creating the backup.
Run the following command on Management Server to force the batch rescan
of all the managed hosts:
/opt/VRTSsfmh/bin/xdistc --run -- mh_ctl.pl --rescan
On the host where you plan to back up Management Server, log on as a user
with administrator privileges.
where, installdir is the installation directory and dir is the location that you
specify for creating the backup. Make sure that the location that you specify
has adequate disk space to store the backup. You can specify any location
except the following:
%ALLUSERPROFILE%\Veritas\VRTSsfmcs
%ALLUSERPROFILE%\Veritas\VRTSsfmh
%APPDATA%\Symantec\VRTSsfmcs
%APPDATA%\Symantec\VRTSsfmh
60
On the host where you plan to back up Management Server, log on as a user
with administrator privileges.
To take the backup, run the following command at the command prompt:
"installdir\VRTSsfmh\bin\perl.exe"
"installdir\VRTSsfmcs\config\adm\vom_bkup.pl" --backup "dir"
where, installdir is the installation directory and dir is the location that you
specify for creating the backup. Make sure that the location that you specify
has adequate disk space to store the backup. You can specify any location
except the following:
C:\Program Files\Veritas\VRTSsfmcs
C:\Program Files\Veritas\VRTSsfmh
61
Note: To restore data because the upgrade to Veritas Operations Manager 6.1
failed, use the same script that you used to take the backup. For more information
on restoring the data, refer to the Veritas Operations Manager Installation and
Configuration Guide for that release.
You can restore the data to the same host on which the data was backed up, or to
a different host. To restore the data to a different host, you need to do the following
tasks on the new host before you perform the restore operation:
Change the physical host name and the IP address to match that of the system
that you backed up the data on.
Install all the add-ons, that were installed on Management Server at the time of
backing up the data.
Before you restore the data, review information on what is supported, and the
limitations.
See About backing up and restoring Veritas Operations Manager data on page 57.
To restore the Veritas Operations Manager data on Windows
where, installdir is the installation directory and dir is the location that you
specified for creating the backup.
Run the following command on Management Server to force the batch rescan
of all the managed hosts:
"installdir\VRTSsfmh\bin\perl.exe" "installdir\VRTSsfmh\bin\xdistc
--run -- mh_ctl.pl --rescan
62
Note: You must upgrade Management Server to 6.1 before you upgrade the
managed hosts in its domain to 6.1.
You can choose one of the following methods to upgrade a managed host to Veritas
Operations Manager 6.1:
Upgrade the managed host using Settings > Deployment in the Veritas
Operations Manager console.
For more information on deploying packages, see the Veritas Operations
Manager Management Server User Guide.
63
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective. The root user can also perform this task.
To upgrade managed hosts using the Veritas Operations Manager console
In the Install Download wizard panel, select a download option, and click
Next.
See Install - Download hot fix, package, or patch panel options on page 212.
In the Install Select hosts panel, click Hosts option, and select the desired
managed hosts. To upgrade all the managed hosts that use a specific platform,
use the Platforms option. Click Finish.
See Install - Select hosts panel options on page 213.
Make sure that the host where you plan to upgrade host management meets
or exceeds system and operating system requirements.
See Operating system requirements on page 27.
Download the managed host installation files bundle, and unzip it.
See Downloading Veritas Operations Manager 6.1 on page 19.
On the host where you plan to upgrade host management, log on as root.
Change directory to the location where you unzipped the installation files bundle.
If the host is an AIX or an HP-UX host, decompress the downloaded file.
64
If you are upgrading a Solaris 11 host, run the following commands to stop the
services:
/opt/VRTSsfmh/adm/xprtldctrl stop
/opt/VRTSsfmh/adm/vxvmdiscovery-ctrl.sh stop
At the command prompt, enter one of the following commands to upgrade the
package:
For Solaris on SPARC versions before version 11, enter the following:
pkgadd -d VRTSsfmh_6.1.0_SunOS_arch_sparc.pkg -a
/opt/VRTSsfmh/etc/VRTSsfmhadmin VRTSsfmh
For Solaris on x86 versions before version 11, enter the following:
pkgadd -d VRTSsfmh_6.1.0_SunOS_arch_i386.pkg -a
/opt/VRTSsfmh/etc/VRTSsfmhadmin VRTSsfmh
To verify that the package has been upgraded and the version has changed
to 6.1, enter one of the following at the command prompt:
65
pkginfo -l VRTSsfmh
See Verifying the version of a managed host in the console on page 67.
Download the managed host installation files bundle, and unzip it.
See Downloading Veritas Operations Manager 6.1 on page 19.
From the directory to which you unzipped the installation files bundle, do one
of the following:
On the Ready to Install the Program screen, click Install to start the upgrade.
To verify the upgrade, go to the Windows Control Panel and open the
Programs and Features panel.
In the list of currently installed programs, verify that the version for the Veritas
Operations Manager for Windows (Host Component) program has changed
to 6.1.
See Verifying the version of a managed host in the console on page 67.
In the Home page of the Management Server console, click Help > About.
The Management Server version is displayed.
66
In the hosts list that is displayed, verify the managed host version under MH
Version.
67
From the list of installed programs, select Veritas Operations Manager for
Windows.
Click Uninstall/Change.
On the message window that indicates that the uninstall was successful, click
OK.
On the managed host where you plan to uninstall managed host, log on as
root.
At the command prompt, enter one of the following commands to uninstall the
package:
68
From the list of installed programs, select Veritas Operations Manager (Host
Component).
69
Chapter
Configuring Veritas
Operations Manager in a
high availability and
disaster recovery
environment
This chapter includes the following topics:
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability environment
Server. Also, this configuration improves the availability of the applications and the
services that Veritas Operations Manager provides.
Following is an overview of the process of configuring Veritas Operations Manager
in high availability environment:
Symantec Cluster Server (VCS) uses two components, Low Latency Transport
(LLT) and Group Atomic Broadcast (GAB), to share data between the two nodes.
In case of a failover, Node1 fails over to Node2 that is configured for HA.
To perform this task, you must have a root user account or your user group must
be assigned the Admin role on the Management Server perspective.
You can configure the high availability (HA) feature on a new Management server
that is being configured as well as on an existing Management Server.
See Configuring a new Veritas Operations Manager installation in high availability
environment on page 71.
See Configuring an existing Veritas Operations Manager installation in high
availability environment on page 77.
71
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability environment
Table 4-1
Step Action
Description
A virtual IP and a virtual host name are available for installing and using Veritas
Operations Manager in high availability environment. This IP is used and
configured in VCS and should not be shared with other applications.
A Storage Foundation disk group, volume and a file system for the data is
created. Use VxVM and VxFS to create the disk group, volume and a file system.
The disk group, volume and a file system are used to configure the Veritas
Operations Manager database in high availability environment.
For more information on creating disk groups and volume, see Veritas Storage
Foundation Administrator's Guide.
72
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability environment
In the Server Name field, enter the virtual host name of Node1.
In the next panel, view the status of the tasks that are performed. Click Launch
Web Console to log on to Management Server on Node1.
Use the Veritas Operations Manager Web console to add Node2 as a managed
host to the Management Server that is configured on Node1.
73
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability environment
Resource
SFM_SStore
SFM_SStore_DG
SFM_Services
SFM_Services_IP
SFM_Services_NIC
SFM_Services_Mount
Note: For HA configuration, you need to use the service group names and resource
names as suggested. Failure to do so will result in configuration failure.
For the resources that you can create on the SFM_SStore service group for
Windows cluster, refer to the following table:
Resource name
Resource Attributes
type
SFM_SStore_DG
VMDg
74
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability environment
For the resources that you can create on the SFM_SStore service group for
Linux cluster, refer to the following table:
Resource name
Resource Attributes
type
SFM_SStore_DG
Disk group Diskgroup: Disk group that is specified for the failover.
For the resources that you can create on the SFM_Services service group for
a Windows cluster, refer to the following table:
Resource name
Resource Attributes
type
SFM_Services_IP
IP
SFM_Services_NIC NIC
SFM_Services_Mount Mountv
For the resources that you can create on the SFM_Services service group for
a Linux cluster, refer to the following table:
Resource name
Resource Attributes
type
SFM_Services_IP
IP
75
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability environment
Resource name
Resource Attributes
type
SFM_Services_NIC NIC
SFM_Services_Mount Mount
For more information on configuring resources, refer to the Veritas Cluster Server
Bundled Agents Reference Guide.
After creating the base service groups and resources, you need to link those base
service groups and resources as following:
SFM_Services
Parent Group
SFM_SStore
Child Group
Relationship
Online Local
Dependency Type
Hard
76
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability environment
In the next panel, which displays the steps that you must do to configure
Management Server as a cluster node, click Start.
In the panel, that displays the steps that you must do to configure Management
Server in high availability environment, click Next.
In the panel, that displays the details of the service group for the HA
configuration for your review, click Next.
View the status of the tasks that are performed as part of Veritas Operations
Manager HA configuration and do one of the following:
Click the link that is displayed on the panel to log on to Veritas Operations
Manager that is configured in high availability environment.
If you have used a virtual host name and a virtual IP address for configuring the
Management Server, follow the process of configuring a new Veritas Operations
77
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability environment
If you have not used a virtual host name and a virtual IP address for initially
configuring the Management Server, see Table 4-3
Table 4-3
Step Action
Description
Step
1
Step
2
Step
3
Step
4
78
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in disaster recovery environment
A Storage Foundation disk group, volume and a file system for the data is created
with identical names on all the nodes. Use VxVM and VxFS to create the disk
group, volume and a file system. The disk group, volume and a file system are
used to configure the Veritas Operations Manager database in high availability
environment.
For more information on creating disk groups and volume, see Veritas Storage
Foundation Administrator's Guide.
Install Management Server on the local cluster (Node1) and the remote cluster
(Node2).
79
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in disaster recovery environment
In case of a failover, the primary node fails over to the secondary node.
To perform this task, you must have a root user account or your user group must
be assigned the Admin role on the Management Server perspective.
Configuring a Veritas Operations Manager installation in disaster recovery
environment involves the following steps:
Table 4-4
Step Action
Description
A Storage Foundation disk group, volume and a file system for the data is
created. Use VxVM and VxFS to create the disk group, volume and a file system.
80
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in disaster recovery environment
The disk group, volume and a file system are used to configure the Veritas
Operations Manager database in high availability environment.
A virtual IP and a virtual host name are available for installing and using Veritas
Operations Manager in disaster recovery environment. This IP is later used for
configuring SFM_Services_IP resource and it should not be shared with other
applications.
Storage Foundation HA 5.x, or later, and VCS cluster are installed on the hosts
that you want to designate as Node1 in local site (Site A) and Node2 in remote
site (Site B).
Global Cluster Option (GCO) is enabled in VCS in Site A and Site B. For more
information on enabling GCO, see Symantec Cluster Server Administrators
Guide.
Both the nodes on which you want to configure Veritas Operations Manager in
the disaster recovery environment must report synchronized Universal Time
Clock (UTC/UC) time.
You must specify the database location. You can either use the default database
location /var/opt/VRTSsfmcs/db or specify another location. If you specify the
location other than the default database location, you must make sure that it is
not part of the shared file system that is used for failover. Later, the Veritas
Operations Manager DR script moves the database to the shared file system.
If you do not use DNS Agent, you must add the host names to the /etc/hosts
file.
The SFM_Services and the SFM_SStore base service groups that are created
on Site A and Site B should have similar attributes and values.
Use different virtual IP addresses for GCO IP, SFM_Services_IP, and for the
VVR rlinks.
SFM_SStore service is online on any of the nodes before you execute the
disaster recovery script.
For more information on creating disk groups and volume, see Veritas Storage
Foundation Administrator's Guide.
81
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in disaster recovery environment
Use VCS DNS resource to update the host name and IP mapping. If you do
not use DNS Agent, you must add the host names to the /etc/hosts file.
Resource
SFM_SStore
SFM_SStore_DG
SFM_SStore_RVG
SFM_Services_IP
SFM_Services_NIC
SFM_Services_Mount
SFM_Services_RVGPrimary
SFM_Services
82
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in disaster recovery environment
Note: For DR configuration, you need to use the service group names and resource
names as suggested. Failure to do so may result in configuration failure.
It is recommended to set up the VVR rlinks under Symantec Cluster Server control.
No naming convention is required for the VVR rlink resources. For more information,
refer to the Veritas Cluster Server Bundled Agents Reference Guide and Veritas
Cluster Server Agents for Veritas Volume Replicator Configuration Guide depending
on the version of the Symantec Cluster Server.
For the resources that you need to create on the SFM_SStore service group,
refer to the following table:
Resource name
Resource Attributes
type
SFM_SStore_DG
Disk
group
RVG
For HA-DR configuration, you need to create the resources that are created for
HA configuration as well as some additional resources.
See Creating the base service groups for HA configuration on page 74.
For the resources that you need to create apart from the resources already
created, refer to the following table:
Resource name
Resource Attributes
type
SFM_Services_RVGPrimary RVG
Primary
For more information on configuring resources, refer to the Veritas Cluster Server
Bundled Agents Reference Guide.
After creating the required service groups and resources, you need to link the base
service groups. For selecting the options while linking the service groups, refer to
the following table:
83
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in disaster recovery environment
Selection
Option
SFM_Services
Parent Group
SFM_SStore
Child Group
Relationship
Online Local
Dependency Type
Hard
You need to link the resources. For selecting parent and child dependencies, refer
to the following table:
Parent Dependency
Child Dependency
SFM_SStore_RVG
SFM_SStore_DG
SFM_Services_IP
SFM_Services_NIC
SFM_Services_Mount
SFM_Services_RVGPrimary
SFM_Services_RVGPrimary
SFM_Services_IP
After creating the SFM_Services and SFM_SStore service groups on Site A and
linking them, repeat the same procedure for site B. On Site B, ensure that the
SFM_Services_NIC, SFM_SStore_RVG, and SFM_SStore_DG are online and rest
of the resources are offline. Also, you must configure SFM_Services service group
as Global on site A and add Site B in the cluster.
See Configuring Veritas Operations Manager in disaster recovery environment
on page 79.
Enabling DR configuration
To enable Veritas Operations Manager DR configuration
Run the following script on Site A to configure Site B as part of the Veritas
Operations Manager DR configuration:
/opt/VRTSsfmh/bin/xprtlc
-u vxss://virtual_hostname:14545/sfm_admin/sfm_domain/vx
-d debug=1
-d setup=1
-d mh=Node_2
-l https://virtual_hostname:5634/admin/cgi-bin/cs_hadr_config.pl
where, virtual_hostname is the virtual host name of Site A and Node_2 is the
name of Node at Site B.
84
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability and disaster recovery environment
In case of a failover, at first, Node1 of primary site attempts to fail over locally
to Node2. If this attempt to failover locally fails, then Node1 fails over to Node3
that is located at the secondary site. In case the attempt to fail over to Node3
also fails, node1 attempts to fail over to Node4.
To perform this task, you must have a root user account or your user group must
be assigned the Admin role on the Management Server perspective.
Configuring an existing Veritas Operations Manager installation in high availability
and disaster recovery environment involves the following steps:
Table 4-5
Step Action
1
85
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability and disaster recovery environment
Table 4-5
Step Action
Description
A virtual IP and a virtual host name are available for installing and using Veritas
Operations Manager in high availability and disaster recovery environment. This
IP is used and configured in VCS for SFM_Services_IP and should not be shared
with other applications.
Storage Foundation HA 5.x, or later, and VCS cluster are installed on the hosts
that you want to designate as Node1 and Node2 in local site (Site A) and Node3
and Node4 in remote site (Site B). Also, Node1 in Site A and Node3 in Site B
are considered as primary nodes.
Global Cluster Option (GCO) is enabled in VCS in Site A and Site B. For more
information on enabling GCO, see Symantec Cluster Server Administrators
Guide.
86
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability and disaster recovery environment
All the nodes on which you want to configure Veritas Operations Manager in
the high availability environment must report synchronized Universal Time Clock
(UTC/UC) time.
You must specify the database location. You can either use the default database
location /var/opt/VTRSsfmcs/db or specify another location. If you specify the
location other than the default database location, you must make sure that it is
not part of the shared file system that is used for failover. Later, the Veritas
Operations Manager DR script moves the database to the shared file system.
If you do not use DNS Agent, you must add the host names to the /etc/hosts
file.
The SFM_Services and the SFM_SStore base service groups that are created
on Site A and Site B should have similar attributes and values, except for
SFM_SStore_IP.
The virtual host name that is used on all domains in Site A and Site B are the
same.
SFM_SStore service is online on any of the nodes before you execute the
disaster recovery script.
You need to create a Storage Foundation disk group, file system, and a volume
for the data with identical names on all the nodes. Use VxVM and VxFS to create
the file system and volume. The disk group, file system, and volume are used
to configure the Veritas Operations Manager database in high availability
environment.
For more information on creating disk groups and volume, see Veritas Storage
Foundation Administrator's Guide.
87
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability and disaster recovery environment
Install Management Server on Node1 and Node2 in Site A and Node3 and
Node4 in Site B.
Add Node3 and Node4 as managed hosts to the Management Server that is
configured on Node1.
Use VCS DNS resource to update the host name and IP mapping. If you do
not use DNS Agent, you must add the host names to the /etc/hosts file.
Resource
SFM_SStore
SFM_SStore_DG
SFM_SStore_RVG
SFM_Services_IP
SFM_Services_NIC
SFM_Services_Mount
SFM_Services_RVGPrimary
SFM_Services
Note: For HA-DR configuration, you need to use the service group names and
resource names as suggested above. Failure to do so may result in configuration
failure.
It is recommended to set up the VVR rlinks under Symantec Cluster Server control.
No naming convention is required for the VVR rlink resources. For more information,
refer to the Veritas Cluster Server Bundled Agents Reference Guide and Veritas
88
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability and disaster recovery environment
Cluster Server Agents for Veritas Volume Replicator Configuration Guide depending
on the version of the Symantec Cluster Server.
For the resources that you need to create on the SFM_SStore service group,
refer to the following table:
Resource name
Resource Attributes
type
SFM_SStore_DG
Disk
group
RVG
For HA-DR configuration, you need to create the resources that are created for
HA configuration as well as some additional resources.
See Creating the base service groups for HA configuration on page 74.
For the resources that you need to create apart from the resources already
created, refer to the following table:
Resource name
Resource Attributes
type
SFM_Services_RVGPrimary RVG
Primary
For more information on configuring resources, refer to the Veritas Cluster Server
Bundled Agents Reference Guide.
After creating the required service groups and resources, you need to link the base
service groups. For selecting the options while linking the service groups, refer to
the following table:
Selection
Option
SFM_Services
Parent Group
SFM_SStore
Child Group
Relationship
Online Local
Dependency Type
Hard
89
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Configuring Veritas Operations Manager in high availability and disaster recovery environment
You need to link the resources. For selecting parent and child dependencies, refer
to the following table:
Parent Dependency
Child Dependency
SFM_Services_IP
SFM_Services_NIC
SFM_SStore_RVG
SFM_SStore_DG
SFM_Services_Mount
SFM_Services_RVGPRI
SFM_Services_RVGPRI
SFM_Services_IP
After creating the above-mentioned service groups on Site A and linking them,
repeat the same procedure for site B that contains Node3 and Node4. On Site B,
ensure that the SFM_Services_NIC, SFM_SStore_DG, SFM_SStore_RVG are
online and rest of the resources are offline. Also, you must configure SFM_Services
service group as Global on site A and add Site B in the cluster.
See Configuring Veritas Operations Manager in disaster recovery environment
on page 79.
See Configuring Veritas Operations Manager in high availability and disaster
recovery environment on page 85.
Run the following script on Node1 at Site A to configure Site B as part of the
Veritas Operations Manager HA-DR configuration:
/opt/VRTSsfmh/bin/xprtlc
-u vxss://virtual_hostname:14545/sfm_admin/sfm_domain/vx
-d debug=1
-d setup=1
-d mh=Node_3,Node_4
-l https://virtual_hostname:5634/admin/cgi-bin/cs_hadr_config.pl
90
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
About upgrading the high availability configurations
The SFM_Services, the SFM_SStore, and the SFM_Xprtld service groups should
be online on one of the nodes of Veritas Operations Manager in the high
availability environment, which is the active node.
Symantec recommends that you take a backup of the Management Server data.
See Backing up Veritas Operations Manager data on Linux before upgrading
to version 6.1 on page 58.
See Backing up Veritas Operations Manager data on Windows before upgrading
to version 6.1 on page 61.
Note: You must upgrade the active node before you upgrade the slave nodes.
91
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
About upgrading the high availability and disaster recovery configurations
Follow the steps to upgrade Management Server on the active node, and then,
on the slave nodes.
After the upgrade on the active node, the SFM_Services service group, and
the SFM_SStore service group, are in a frozen state.
You must upgrade all the slave nodes before you unfreeze the service groups
on the active node to prevent issues during failover.
To unfreeze the service groups on the active node, run the following command:
On a UNIX host:
/opt/VRTSsfmcs/config/vcs/sfmha start
On a Windows host:
"installdir\VRTSsfmh\bin\perl.exe"
"installdir\VRTSsfmcs\config\vcs\sfmha" start
In the console, verify that the SFM_Services, the SFM_SStore, and the
SFM_Xprtld service groups are online on the active node.
92
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Removing the high availability configuration
The SFM_Services, the SFM_SStore, and the SFM_Xprtld service groups should
be online on one of the nodes of Veritas Operations Manager in the high
availability environment, which is the active node.
Note: You must upgrade the active node before you upgrade the slave nodes.
To upgrade Management Server in high availability environment to 6.1
Follow the steps to upgrade Management Server on the active node, and then,
on the slave nodes.
After the upgrade on the active node, the SFM_Services service group, and
the SFM_SStore service group, are in a frozen state.
You must upgrade all the slave nodes before you unfreeze the service groups
on the active node to prevent issues during failover.
To unfreeze the service groups on the active node, run the following command:
/opt/VRTSsfmcs/config/vcs/sfmha start
You must upgrade all the slave nodes before you unfreeze the service groups
on the active node to prevent issues during failover.
In the console, verify that the SFM_Services, the SFM_SStore, and the
SFM_Xprtld service groups are online on the active node.
See About upgrading the high availability and disaster recovery configurations
on page 92.
See Upgrading Management Server in high availability environment on page 91.
93
Configuring Veritas Operations Manager in a high availability and disaster recovery environment
Removing the high availability configuration
Note: In Veritas Operations Manager 6.1, you cannot remove the Veritas Operations
Manager HA-DR environment that is configured in the remote site.
The procedure uses the following host names:
Name of the Management Server host that is configured in My_virtual-host_1
a high availability environment
In the panel that lists the tasks that are to be performed to remove the Veritas
Operations Manager HA configuration, click Rollover.
You must perform the rollover task on Node1 when you remove the high
availability configuration from Veritas Operations Manager.
After the rollover task, you remove the high availability configuration from
Veritas Operations Manager and move back to standalone mode. After you
perform the rollover task, you do the following:
On Node1and Node2, remove the sfm_ha directory from the mount location
of the file system.
On both the nodes, check for the VRTSsfmcs.pre_clus file on the location
var/opt/.VRTSsfmcs.pre_clus/. If the VRTSsfmcs.pre_clus file exist on any
of the nodes, remove the file.
In the next panel, view the status of the tasks that are performed as part of
removing the Veritas Operations Manager HA configuration and do the following:
Click the link that is displayed on the panel to log on to Management Server
from which the HA configuration is removed.
94
Chapter
Use the Management Server console to download and install the add-on.
Note: If you have installed the Management Server package with the add-ons, then
you can view the add-ons in the Repository view and directly install them.
The Help add-on is not a part of the package. You need to separately download
and install it.
For more information on the Veritas Operations Manager add-ons and their
supported versions, refer to the Veritas Operations Manager Hardware and Software
Compatibility List (HSCL).
Add-on are of the following types:
Note: When you install the add-on in high availability and high availability-disaster
recovery (HA-DR) environment, you need to install the add-ons manually on all the
nodes of high availability and high availability-disaster recovery cluster before using
them for the configuration. Avoiding this step might result into configuration loss
when the Management Server failovers to other nodes in the high availability and
high availability-disaster recovery cluster.
If you have upgraded to Veritas Operations Manager Management Server 6.1 from
a previous version of Veritas Operations Manager, you may need to upgrade the
add-ons. The previous version of the add-on may not be supported with Veritas
Operations Manager 6.1.
96
When you upgrade an add-on which is installed on Management Server, the new
version overwrites the old version. When you upgrade an add-on which is installed
on the managed host, the old version is retained.
See About deploying Veritas Operations Manager hot fixes on page 208.
See About deploying maintenance release packages and patches on page 209.
See Downloading a Veritas Operations Manager add-on on page 97.
See Uploading a Veritas Operations Manager add-on to the repository on page 97.
Download the compress file which contains all the Veritas Operations Manager
add-ons from SORT website.
The Veritas_Operations_Manager_Addons_Bundle_5.0.0.zip contains all
the add-ons applicable for version 5.0, whereas the
Veritas_Operations_Manager_Addons_Bundle_6.0.0.zip contains all the
add-ons applicable for version 6.0.
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective.
To download a Veritas Operations Manager add-on
Click Deployment.
See Uploading a Veritas Operations Manager add-on to the repository on page 97.
See Installing a Veritas Operations Manager add-on on page 99.
97
add-ons from SORT website. You can also download individual add-ons using the
Management Server console.
After you download the add-ons, you can upload them to the Management Server
individually or as a zip file.
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective.
To upload a Veritas Operations Manager add-on to the repository
Click Close.
98
Click Deployment.
In the Install -Download Add-on wizard panel, select a download option, and
click Next.
See Install - Download Add-on panel options on page 100.
In the Install - Selects hosts wizard panel, select the hosts, and click Finish.
See Install - Select hosts panel options for add-ons on page 100.
Those add-ons which require web server restart, click Restart Web server.
99
Field
Description
Select the hosts explicitly and install the add-on on the selected hosts.
If you select a specific platform, the add-on is installed on all the managed hosts
using that platform. Also the add-on will be installed on all the new managed hosts
that are added to the domain in the future.
For example, if you select Windows the add-on is installed on all the hosts that use
Windows platform. Also when a new Windows host is added to the domain, the
add-on is installed on the host.
100
Table 5-2
Field
Description
Hosts
Platform
Click Deployment.
101
In the Add-ons tab, right-click the add-on that you want to uninstall, select
Uninstall.
Those add-ons which require web server restart, click Restart Web server.
Click Deployment.
102
In Add-ons tab, right-click the add-on that you want to remove, select Remove.
103
Click Deployment.
Expand Add-ons to locate the add-on whose deployment request you want
to cancel.
Click Deployment.
104
In the Applicable Hosts tab, right-click the host, and select Install.
In the Install wizard panel, review the information, and click OK.
See Install panel options on page 105.
In the Install - Result panel, click OK. If the add-on requires web server restart,
click the Restart Web Server button on the toolbar.
Field
Description
Name
Status
105
Click Deployment.
In the Applicable Hosts tab, right-click the host, and select Uninstall.
In the Uninstall wizard panel, review the information, and click OK.
See Uninstall panel options on page 106.
Those add-ons which require web server restart, click Restart Web server.
Field
Description
Name
Status
106
Click Deployment.
In the Applicable Hosts tab, right-click the host, and select Enable.
In the Enable wizard panel, review the information, and click OK.
Those add-ons which require web server restart, click Restart Web server.
107
Click Deployment.
In the Applicable Hosts tab, right-click the host, and select Disable.
In the Disable wizard panel, review the information, and click OK.
Those add-ons which require web server restart, click Restart Web server.
Click Deployment.
108
109
Section
Chapter
About the communication between the managed hosts and Management Server
The VRTSsfmh package contains the XPRTL component that facilitates the
communication between the managed hosts and Management Server. The
VRTSsfmh package is installed on the managed host and Management Server.
The XPRTL component consists of the following:
The XPRTLD component, which is a light weight and full-featured Web server.
The XPRTLD and the XPRTLC components are integrated with Veritas
Authentication Services for secure SSL communication over HTTP.
The communication between the managed host and Management Server occurs
through the HTTPS protocol. The XPRTLD Web server running on both the managed
host and Management Server supports the Common Gateway Interface (CGI)
standards. The managed hosts use XPRTLC and invoke CGI through the XPRTLD
on Management Server to perform several actions such as the Veritas Operations
Manager database update. Management Server uses XPRTLC and invokes CGI
through the XPRTLD on the managed hosts to perform various actions that include
Storage Foundation and high availability operations.
See Connecting to Veritas Operations Manager Management Server on page 112.
112
On a client system that has a network connection to the host, open a Web
browser.
Your browser must be configured to accept cookies. If you are using pop-up
blockers, either disable them or configure them to accept pop-ups from the
host.
In the browsers address field, type the following URL and press Enter:
https://hostname:14161/
where hostname is the host name, fully-qualified host name, or IP address of
Management Server.
Example: https://myhost.example.com:14161/
For Internet Explorer 7.0 on Windows Server 2008, or Firefox 3.0, if the Web
page does not get displayed, you have to set up the browser.
In the username and password fields, type credentials for a valid operating
system network domain account.
The Authentication Service automatically recognizes users in the domainfor
example, unixpwd or NTon which the Authentication Broker host is a member.
Click Login.
You can view the Veritas Operations Manager dashboard.
113
114
Chapter
Discovery of the non-Storage Foundation Agent-based discovery is also used for the
hosts using an agent, for the hosts that
non-Storage Foundation hosts that have Veritas
have Veritas Operations Manager installed Operations Manager installed on them.
on them
Discovery of the non-Storage Foundation Veritas Operations Manager can discover a
hosts using agentless discovery scripts, for host by remotely accessing the host and then
the hosts that do not have Veritas
running the scripts that collect data.
Operations Manager installed on them
The agentless discovery scripts access the host
using SSH (for UNIX hosts) or WMI (for
Windows hosts).
Veritas Operations Manager identifies this type
of the host as an agentless host.
Note: Agentless discovery is not supported on the hosts that have Symantec Storage
Foundation or Veritas Operations Manager installed.
Through each of these host discovery options, Management Server is the central
point to which all of the discovered data flows. Figure 7-1 depicts the flow of data
with each of the host discovery options. Figure 7-2 depicts how Veritas Operations
Manager discovers virtualization servers and virtual machines.
116
Figure 7-1
Web browser
MS
MH+FI
MH
MH(DH)
SAN switch
MH+CH
Hyper-V, KVM,
LDOMs, Zones
AH
ESX servers and
LPAR servers
Agentless
host
Physical
hosts
117
Figure 7-2
118
Web browser
MH+CH
MH+CH
MS
VM
MH
MH
VM
AH
VM
VM
MH
VM
AH
VM
LPAR server
ESX server
HMC
vCenter
VM
MH
MH
VM
MH
VM
VM
MH
Agent on Global
Zone only
Managed host (MH(DH)) is the discovery host for SAN and NAS arrays. Managed
host (MH+FI) discovers SAN switches if Fabric Insight Add-on is installed. Control
Host (MH+CH) discovers agentless hosts (AH), VMware and LPAR servers and
virtual machines. Management Server (MS) discovers managed hosts (physical
hosts), Hyper-V virtualization servers, KVM, LDOMs, and Solaris Zones.
For more information on Fabric Insight Add-on, refer to the Veritas Operations
Manager Management Server Add-ons User Guide.
See About Control Hosts in Veritas Operations Manager on page 188.
See Requirements for discovering vCenter and ESX servers using Veritas
Operations Manager on page 189.
See Requirements for discovering the Solaris zones on page 196.
See Requirements for discovering Solaris Logical domains on page 197.
Storage
utilization
Agentless host
Agent Host
X*
X
X*
Cluster
analysis
119
Table 7-1
Category
Use case
Agentless host
Storage
reclamation
Agent Host
X
120
Note: For configuring Linux VMware guests using agentless discovery, the version
of the /usr/sbin/dmidecode utility must be 2.7 or higher.
The following tables identify the objects that Veritas Operations Manager can
discover and report on with each host discovery option.
Table 7-2 compares the storage resources that Veritas Operations Manager can
discover with each host discovery option.
Table 7-2
Discovery area
Agentless host
Agent Host
Host
HBA
X*
X*
X*
Clusters
121
See How agentless discovery of a UNIX or Linux host works on page 123.
See How agentless discovery of a Windows host works on page 124.
See Prerequisites for agentless configuration on page 123.
See Requirements for agentless discovery of UNIX hosts on page 125.
See Requirements for agentless discovery of Windows hosts on page 127.
See Requirements for deep array discovery for agentless hosts on page 128.
See Commands that require the root access for agentless discovery of UNIX hosts
on page 129.
See Using the privilege control software with agentless discovery of UNIX hosts
on page 131.
See SSH configuration requirements for agentless discovery on page 132.
See About installing OpenSSH on a UNIX host on page 134.
122
You must install the Control Host Add-on on one or more managed hosts and/or
Management Server.
Veritas Operations Manager lets you discover a host through the Control Host.
The Control Host helps you manage discovery data from agentless hosts and
can discover HBAs, OSHandles on the host, multipathing, Linux LVM, and file
systems (including native options like ZFS). Agentless discovery does not support
the discovery of databases and applications.
You must install Storage Insight Add-on and configure arrays for deep discovery.
Storage Insight Add-on must be deployed to enable correlation of OSHandles
on the agentless hosts to array LUNs.
If you make any configuration changes, for example creating new LUNs and
making them visible to the host, on storage arrays, then the agentless discovery
that occurs after a subsequent SI deep array discovery will reflect the changes
on the agentless hosts. After making changes to the array, one SI deep discovery
needs to occur and only then a subsequent agentless discovery will pick up the
changes on the host.
See About agentless discovery using the Control Host on page 122.
Uses Secure Shell (SSH) to send the discovery script to the remote host.
Saves the output of the script to a data file on the remote host in the /var/tmp
directory.
123
Deletes the files from the remote host that it used for discovery.
Figure 7-3
Management
Server
Control
Host
(Optional)
SSH
UNIX hosts
SSH
UNIX hosts
124
First, WMI contacts a service that runs on the remote host and invokes the
service to perform the actions that collect data about the host. As it collects data,
WMI sends the data back to the Control Host.
Second, WMI invokes command line tools such as nslookup and fcinfo. The
output from the command line tools saves to a data file on the remote host in
the %systemroot%\temp directory. Veritas Operations Manager copies the file
from the hosts mapped admin$ filestore, sends it to Veritas Operations Manager
Control Host, and deletes the file from the remote host.
Windows
Control
Host
WMI
Windows hosts
125
Table 7-3
Requirement
Description
A user account
Persistent binding for Solaris Enable persistent binding if you want Veritas Operations
9 hosts
Manager to discover the storage that is allocated to a Solaris
9 host.
A shell on the remote host
126
Table 7-3
Requirement
Description
SSH is installed.
The SSH package is typically installed by default;
however, it may not be present if a minimal operating
system installation was performed. If the SSH package
is not present, use the operating system installer to install
SSH, or download and install OpenSSH.
See About installing OpenSSH on a UNIX host
on page 134.
SSH is set up properly.
See SSH configuration requirements for agentless
discovery on page 132.
SunSSH is version 1.1 (Sun_SSH_1.1) or higher on
Solaris 9 hosts. If a Solaris 9 host runs version 1.0
(Sun_SSH_1_0), network communication between Veritas
Operations Manager and the Solaris 9 host may terminate
during agentless configuration and discovery.
OpenSSH is not version 0.9.8e or 0.9.7e on AIX, Linux,
and Solaris hosts. These versions have known AES
encryption issues, which can cause a warning.
See How agentless discovery of a UNIX or Linux host works on page 123.
Requirement
Description
A user account
127
Table 7-4
Requirement
Description
Windows Management
Instrumentation (WMI)
Open TCP port 135 on the remote host that you want to
discover and the host that performs discovery (Control Host).
WMI uses port 135 to communicate between the hosts.
A Windows Management
Server or Control Host
User Account Control (UAC) Disable User Account Control on Veritas Operations Manager
turned off on a Windows 2008 Control Host that initiates agentless discovery, if the host
host
runs Windows 2008.
For information about how to turn off UAC, see the section
titled "Turning off UAC" at the following URL:
http://technet.microsoft.com/en-us/library/cc709691(WS.10).aspx
Microsofts Fibre Channel
Information Tool installed on
Windows 2003 hosts
128
You must have the Storage Insight Add-on deployed to correlate OSHandles
on the agentless host with array LUNs.
After making masking changes to make new LUNs visible to a host, you must
wait for the next scheduled Storage Insight deep array discovery and then either
perform a manual refresh or wait for the next scheduled discovery of the
agentless host.
For VMware environments, when you make new LUNs visible to the ESX server,
you must wait for the next scheduled Storage Insight deep array discovery,
either perform a manual refresh or wait for the next scheduled discovery of the
agentless host, and then either perform a manual refresh or wait for the next
scheduled discovery of vCenter.
Resource
Operating
system
Command
Purpose
VMware
BIOS UUID
Linux
(VMWare
Guest OS)
Mandatory (for
VMware guests
only)
Disks
HP-UX
/usr/sbin/diskinfo
Mandatory
Requirement
129
Table 7-5
Resource
Operating
system
Command
EMC
PowerPath
Purpose
Requirement
Mandatory
Mandatory
Optional
HP-UX:
/sbin/powermt
check_registration
Linux: /sbin/powermt
check_registration
Solaris: /etc/powermt
check_registration
Linux:
/usr/sbin/powermt
display dev=all
HP-UX:
/sbin/powermt
display dev=all
Linux: /sbin/powermt
display dev=all
Linux: /etc/powermt
display dev=all
HBAs or
target ports
Linux LVM
Linux DM
Multipath
Solaris
fcinfo
HP-UX
/opt/fcms/bin/
fcmsutil
Mandatory
Linux
Mandatory
Mandatory
/sbin/multipath
Mandatory (for
Linux hosts having
DM multipath
configuration)
Linux
Mandatory indicates that the specified part of feature discovery fails if you do not
provide root access for the command. Optional indicates that most of the feature
130
discovery works even if you do not provide root access for the command. The
mandatory commands for a given OS platform need not be enabled in the privilege
control software if the host does not have the utilities installed on it
See How agentless discovery of a UNIX or Linux host works on page 123.
See Requirements for agentless discovery of UNIX hosts on page 125.
A non-root user account and use privilege control software to grant that user
the ability to run specific commands.
Veritas Operations Manager supports the following privilege control software with
agentless discovery:
PowerBroker
Sudo
Table 7-6 identifies how you can use privilege control software with agentless
discovery.
Table 7-6
Step
Action
131
Table 7-6
Step
Action
Add the user name that you want to use for agentless
discovery.
Add the commands that you want to allow the user to
run.
Ensure that the software does not require a TTY session
for commands to succeed.
Ensure that the software does not require a password
when running a command.
Ensure that the user has the privilege to kill the
commands that are initiated with the privilege control
software. Symantec recommends this privilege because
it gives the non-root user the ability to kill any commands
that hang when run through the privilege control
software.
132
Table 7-7
Requirement
Parameter(s)
Comments
Port
SSH allows
password-based
authentication
PasswordAuthentication
To allow password-based
authentication, set the parameter
to yes.
AllowUsers
133
For AIX 5.2 or earlier, download OpenSSL from the AIX Toolbox page on the
IBM Web site:
https://www14.software.ibm.com/webapp/iwm/web/preLogin.do
?source=aixtbx&S_PKG=dlaixww&S_TACT=&S_CMP=
For AIX 5.3 or later, download the OpenSSL install package from the AIX Web
Download Pack Programs page on the IBM Web site:
https://www14.software.ibm.com/webapp/iwm/web/reg/pick.do?source=aixbp
Install OpenSSL.
Install OpenSSH.
openssl-0.9.8b-8.3.e15.i386.rpm
openssh-4.3p2-16.e15.i386.rpm
openssh-server-4.3p2-16.e15.i386.rpm
134
For Red Hat, download the OpenSSH packages from the following location:
http://www.redhat.com
For other Linux distributions, download the OpenSSH packages from the
following location:
http://rpm.pbone.net
GNU Compiler
Zlib
OpenSSL
OpenSSH
GNU Compiler
ftp://ftp.sunfreeware.com/pub/freeware/sparc/9/libgcc-3.4.6-sol9-sparc-local.gz
Zlib
ftp://ftp.sunfreeware.com/pub/freeware/sparc/9/zlib-1.2.3-sol9-sparc-local.gz
OpenSSL
ftp://ftp.sunfreeware.com/pub/freeware/sparc/9/openssl-0.9.8l-sol9-sparc-local.gz
OpenSSH
135
ftp://ftp.sunfreeware.com/pub/freeware/sparc/9/openssh-5.3p1-sol9-sparc-local.gz
Unzip the packages and install the files using the following commands:
For the GNU Compiler:
# gunzip libgcc-3.4.6-sol9-sparc-local.gz
# pkgadd -d libgcc-3.4.6-sol9-sparc-local
For Zlib:
# gunzip zlib-1.2.3-sol9-sparc-local.gz
# pkgadd -d zlib-1.2.3-sol9-sparc-local
For OpenSSL:
# gunzip openssl-0.9.81-sol9-sparc-local.gz
# pkgadd -d openssl-0.9.81-sol9-sparc-local
For OpenSSH:
# gunzip openssh-5.3p1-sol9-sparc-local.gz
# pkgadd -d openssh-5.3p1-sol9-sparc-local
with:
Subsytem sftp /user/local/libexec/sftp-server
PermitRootLogin yes
136
In the Settings tab click Host. Click Add Hosts > Agent.
In the Add agent hosts wizard panel, enter the host details, and click Finish.
See Add agent hosts panel options on page 138.
In the Result panel, verify that the host has been added successfully. Click
OK.
137
To add multiple managed hosts to Management Server using the CSV file
In the Settings tab click Host. Click Add Hosts > Agent.
In the Add agent hosts wizard panel, under Advance, click Browse to select
the CSV file.
In the Result panel, verify that the host has been added successfully. Click
OK.
Field
Description
Add entry
Host Name
User Name
Password
Under Advanced you can add multiple hosts by importing the information from a
comma-separated (.csv) file from a specified location. The CSV file must include
138
the .csv extension. You can use the manual host specification and the CSV file
simultaneously to add hosts.
The following is an example of a CSV file that includes user names and passwords
for each host:
Host,User,Password
host1.abc.com,username1,password1
host2.abc.com,username2,password2
The first line in the CSV file must appear as above. You can replace the subsequent
lines with your hosts, user names, and passwords.
See Adding the managed hosts to Management Server using an agent
configuration on page 137.
In the Settings tab click Host. Click Add Hosts > Agentless.
In the Add agentless hosts wizard panel, enter the host details, and click
Finish.
See Add agentless hosts panel options on page 140.
In the Result panel, verify that the host has been added successfully. Click
OK.
139
To add multiple managed agentless hosts to Management Server using the CSV file
In the Settings tab click Host. Click Add Hosts > Agentless.
In the Add agentless host wizard panel, under Advance, click Browse to
select the .csv file.
In the Result panel, verify that the host has been added successfully. Click
OK.
Field
Description
Discovery Mode
140
Table 7-9
Field
Description
Control Host
Add entry
Host Name
User Name
Password
Advanced
Under Advanced you can add multiple hosts by importing the information from a
comma-separated (.csv) file from a specified location. The CSV file must include
the .csv extension. You can use the manual host specification and the CSV file
simultaneously to add hosts.
The following is an example of a CSV file that includes user names and passwords
for each host:
Host,User,Password
host1.abc.com,username1,password1
host2.abc.com,username2,password2
The first line in the CSV file must appear as above. You can replace the subsequent
lines with your hosts, user names, and passwords.
For agentless configuration, the CSV file cannot contain both UNIX and Windows
hosts.
Note: The discovery mode (SSH or WMI) must be consistent with the types of hosts
you specify in the CSV file. You must specify SSH for UNIX hosts and WMI for
Windows hosts.
141
Create the script to add an agent host using either the command prompt, or
the console. Do one of the following:
In the Home page on the Management Server console, click Settings. Click
Auto Configure. In the Auto Configure wizard, click Download. In the
File Download dialog, click Save to save the script to the required location.
142
where, filename is the name of the script that you specify. The
domainname is the Management Server host name.
For example,
/opt/VRTSsfmh/bin/gendeploy.pl --out test.pl --domain
sfm://Managementserver.domain.com:5634
To create the script to add an agent host, run the following command:
perl.exe gendeploy.pl --out <filename> [--domain
<sfm:domainname:port>]
where, filename is the name of the script that you specify. The domain
name is the Management Server host name.
For example, perl.exe gendeploy.pl --out test.pl[--domain
sfm://Managementserver.domain.com:5634]
On the agent host, change the directory to the location where you copied the
script.
143
For the above script, the optional hostname parameter is the host as seen
by the Management Server. The host is discovered by this name or IP
address in Veritas Operations Manager.
In the console, verify that the agent host has been added to the Management
Server domain.
Click Host.
144
In the Edit agentless configuration wizard panel, edit the host details, and
click Finish.
See Edit agentless host panel options on page 145.
In the Result panel, verify that the host has been modified successfully. Click
OK.
See Using the privilege control software with agentless discovery of UNIX hosts
on page 131.
See Adding the managed hosts to Management Server using an agentless
configuration on page 139.
Field
Options
Host
User name
Password
Advanced
145
The refresh operation for agentless hosts is asynchronous. The wizard displays
that the operation has triggered the refresh, but the discovery operation for the
agentless host is actually in progress in the background. You must wait for the
actual discovery to complete. When it is complete, you can view the status reflected
in the State column if you are in the Server perspective. If you are in the
Management Server perspective, click Host and view the status in the Discovery
State column.
To perform this task in the Server perspective, your user group must be assigned
the Admin role on the host or the Server perspective. The permission on the host
may be explicitly assigned or inherited from a parent Organization.
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective.
To refresh the details of a managed host
In the Home page on the Management Server console, do one of the following:
Go to the Server perspective and select Manage in the left pane. Expand
the Organization or Uncategorized Hosts to locate the host.
In the Refresh Hosts wizard panel review the managed host and click Yes.
146
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective. The root user can also perform this task.
To remove managed hosts from the Management Server domain
Click Host.
In the Remove Hosts wizard panel review the managed host and click Yes.
147
Chapter
Restricting users or user groups from accessing the Veritas Operations Manager
console
Unixpwd
LDAP
AD
149
Click Security. In the Brokers & Domains tab, click Add LDAP/AD.
In the Add LDAP/AD wizard panel, enter the details, and click Next.
See Add LDAP/AD panel options on page 151.
In the Add LDAP/AD wizard panel, enter a domain name, specify the search
base, and click Finish.
See Add LDAP/AD panel options to specify the domain name on page 153.
In the Add LDAP/AD panel that confirms that you have added the LDAP or
AD-based authentication, click OK.
150
Field
Description
Server Information
Server Name (Mandatory)
Port (Mandatory)
Verify Server
This server requires me to log on (Optional) Select this check box if the anonymous
operations are disabled on the LDAP server
and a bind user ID is required to proceed with
configuring the LDAP-based authentication
151
Table 8-1
Field
Description
domainname\username
Certificate location
Query Information
152
Table 8-1
Field
Description
Field
Description
Server Name
153
Table 8-2
Field
Description
Domain Name
Search Base
Use Default
Custom
154
Click Security.
In the Brokers & Domains tab, right-click the authentication domain that you
have configured as LDAP or AD, and select Unconfigure.
Click Security.
155
In the Brokers & Domains tab, right-click the domain and select Enable.
In the Enable Domains wizard panel, review the domain name and type, and
click OK.
Click Security.
In the Brokers & Domains tab, right-click the domain and select Disable.
In the Disable Domains wizard panel, review the domain name and type, and
click OK.
156
157
Table 8-3 lists the objects in each perspective which can be grouped to form an
Organization.
Table 8-3
Perspective
Object
Server
Hosts
Availability
Clusters
Storage
Enclosures
Virtualization
Virtualization servers
Perspective
Object
Server
Hosts
Availability
Storage
Enclosures
Virtualization
Virtualization servers
158
For the Availability perspective, the root user can also assign the Operator role.
The user groups having the Operator role can perform operations such as talking
a service group online or offline, freezing or unfreezing a service group, or running
the high availability and disaster recovery fire drill.
To assign permissions to user groups for a perspective, your user group must have
the Admin role assigned on the Management Server perspective. The root user
can also perform this task.
To assign permissions to user groups for a perspective
In the Home page on the Management Server console, do one of the following:.
In the Select user group panel, select the domain, and enter the name of the
user group.
The user group name is case-sensitive.
Under Add Permission, select a role from the drop-down list. Click Add.
See About predefined roles in Veritas Operations Manager on page 157.
See Modifying permissions assigned to user groups for a perspective on page 159.
See Deleting permissions assigned to user groups on a perspective on page 160.
159
In the Home page on the Management Server console, do one of the following:
Click on a perspective and expand Manage in the left pane. Right-click Data
Center and select Properties. Skip to 3.
In the Modify Role panel, select a role from the drop-down list, and click OK.
In the Home page on the Management Server console, do one of the following:
160
User and user group names are case-sensitive only for unixpwd domains, for LDAP,
AD, and NT domains they are case insensitive.
Web server restart is not required when the file is created or modified. If the user
or the user group is already logged in to the Management Server console, the
restrictions will be applicable in the subsequent login session.
Following is an example of a .esmwebdeny file that includes the names of users
and user groups who are restricted from accessing the Management Server console.
[email protected]:user
[email protected]:user
[email protected]:group
[email protected]:group
161
This example explains how you can restrict user groups from performing certain
tasks on objects.
You can do any one of the following to restrict access:
alpha.symantecdomain.com
User group 1
UserGroup_A
User group 2
UserGroup_B
User group 3
Operations_team
Organization 1
Windows_cluster
Organization 2
Linux_cluster
Service group
Beta_SG
162
Click Security.
Under Add Permission, select Operator role from the list, and click Add.
163
Click Finish.
The rule is applied and all the cluster nodes having Windows platform are moved
from Uncategorized Clusters into the Organization named Windows_cluster. When
a new Windows cluster node is added to the Management Server domain, it is
automatically moved into Windows_cluster Organization.
Similarly you can create another Organization called Linux_cluster for all cluster
nodes on Linux platform.
You can now restrict access to these Organizations. You can provide Admin role
to UserGroup_A on the Windows_cluster Organization, and UserGroup_B on
Linux_cluster.
164
Under Add Permission, select Admin role from the list, and click Add.
The UserGroup_A is now assigned the Admin role on Windows_cluster. This team
can now perform all the tasks on the cluster.
Similarly you can assign Admin role to UserGroup_B on Linux_cluster. If required,
you can also assign Guest role to UserGroup_A on Linux_cluster, and Guest role
to UserGroup_B on Windows_cluster.
UserGroup_A now has Admin role on Beta_SG, and Guest role on the remaining
service groups in the Linux_cluster Organization.
See Adding Lightweight Directory Access Protocol or Active Directory-based
authentication on Management Server on page 150.
See About predefined roles in Veritas Operations Manager on page 157.
165
166
Chapter
Critical
Warning
Information
You can create alert rules to receive warnings about events and conditions, such
as stopped replication or storage capacity, enabled or disabled I/O paths, faulted
clusters and so on.
Using the Management Server console, you can specify to initiate one of the
following actions when an alert condition is met:
Send an email message. For some alert conditions, operators may want to send
emails notifying key personnel about the condition. You can specify one or more
email addresses to which the alert notification is sent.
Note: You must provide the details for the SMTP settings before setting the
email notification for an alert.
Send an SNMP trap notification. Some objects are not polled. When events take
place, these objects send traps or unsolicited asynchronous SNMP messages
to the Server. Some of the rules that Veritas Operations Manager uses to monitor
objects in the environment rely on SNMP trap-based messages.
Note: You must configure SNMP trap settings for receiving alert notifications.
Run a custom script. You can upload a custom script that runs when the alert
conditions that are specified by the rule occur.
168
Select This rule will be triggered for all faults of type:, click Next and
skip to 6.
Select Enter the fault topics that will trigger the actions for this rule:,
enter the fault definitions separated by a comma (,) or a semicolon (;), and
click Next. Skip to 6.
Select Choose from a list of fault topics, click Next, and skip to 5.
See Create Rule - Select the type of fault conditions to trigger this rule panel
options on page 170.
In the Create Rule - Select one or more fault topics which will trigger this
rule wizard panel, select the fault topics, and click Next.
See Create Rule - Select one or more fault topics which will trigger this rule
panel options on page 171.
In the Create Rule - Setup notifications wizard panel, enter the required
information and click Next.
See Create Rule - Setup notifications panel options on page 171.
169
In the Create Rule - Enter name and description wizard panel, enter the
required information and click Finish.
See Create Rule - Enter name and description panel options on page 173.
In the Create Rule - Result panel, verify that the rule has been successfully
created, and click OK.
Create Rule - Select the type of fault conditions to trigger this rule
panel options
Use this panel to select a type of fault condition to trigger an alert.
Table 9-1 list the options that you can select to create a rule.
Table 9-1
Create Rule - Select the type of fault conditions to trigger this rule
options
Field
Description
This rule will be triggered for all faults of Select this option to trigger a rule for any
type:
faults of the selected type.
You can select the following types of faults:
Fault
Risk
170
Table 9-1
Create Rule - Select the type of fault conditions to trigger this rule
options (continued)
Field
Description
Create Rule - Select one or more fault topics which will trigger this
rule panel options
Use this panel to select the fault topics that will trigger the rule.
The fault topics listed are those which are relevant to the perspective in which you
are creating the rule. If you are creating a rule in the Management Server perspective
(Settings), the list includes all host fault topics and array and switch fault topics.
See Creating rules in the Management Server perspective on page 169.
Field
Description
171
Table 9-2
Field
Description
SNMP Trap
Custom script
You must set up at least one type of notification for the rule that you create else
the rule will not be enabled.
Table 9-3
Notification options
Field
Description
Email: To
Custom script
Perl (.pl)
Shell (.sh)
Batch (.bat)
172
Field
Description
Rule Name
Description
Enable
In the Edit Rule - Select the type of fault conditions to trigger this rule
wizard panel, do one of the following:
Select This rule will be trigger for all faults of type:, click Next and skip
to 7.
173
Select Enter the fault topics that will trigger the actions for this rule
separated by (,) or (;):, enter the fault definitions separated by a comma
(,) or a semicolon (;), and click Next. Skip to 7.
Select Choose from a list of fault topics, click Next, and skip to 6.
See Edit Rule - Select the type of fault condition to trigger this rule panel
options on page 174.
In the Edit Rule - Select one or more fault topics which will trigger this
rule wizard panel, select the fault topics, and click Next.
See Edit Rule - Select one or more fault topics which will trigger this rule panel
options on page 175.
In the Edit Rule - Setup notifications wizard panel, enter the required
information and click Next.
See Edit Rule - Setup notifications panel options on page 175.
In the Edit Rule - Enter name and description wizard panel, enter the required
information and click Finish.
See Edit Rule - Enter name and description panel options on page 177.
In the Edit Rule - Result panel, verify that the rule has been successfully
created, and click OK.
Edit Rule - Select the type of fault condition to trigger this rule panel
options
Use this panel to select the type of fault conditions to trigger an alert.
Table 9-5 list the options that you can select to create a rule.
174
Table 9-5
Edit Rule - Select the type of fault condition to trigger this rule
Field
Description
This rule will be triggered for all faults of Select this option to trigger a rule for any
type:
faults of the selected type.
You can select the following types of faults:
Fault
Risk
Enter the fault topics that will trigger the Select this option to trigger a rule when the
actions for this rule separated by (,) or (;): specified fault occurs. You can enter the
name of the fault. Use a colon (,) or semicolon
(;) to separate multiple entries.
Enter event.alert.vom to view the list of fault
topics. You can choose a fault topic from the
list.
You can use wild character (*) to select
multiple faults. For example, you can enter
event.alert.vom.vm.* to select all the faults
on VxVM volumes.
Choose from a list of fault topics
Edit Rule - Select one or more fault topics which will trigger this rule
panel options
Use this panel to select the fault topics that will trigger the rule.
See Editing rules in the Management Server perspective on page 173.
175
Table 9-6
Field
Description
SNMP Trap
Custom script
You must set up at least one type of notification for the rule that you create.
Table 9-7
Notification options
Field
Description
Email: To
176
Table 9-7
Field
Description
Custom script
Perl (.pl)
Shell (.sh)
Batch (.bat)
Field
Description
Rule Name
Description
Enable
177
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective.
To delete a rule in the Management Server perspective
In the Delete Rule wizard panel, review the information, and click OK.
See Delete Rule panel options on page 178.
178
In the Enable Rule wizard panel, review the information, and click OK.
See Enable Rule panel options on page 179.
In the Disable Rule wizard panel, review the information, and click OK.
See Disable Rule panel options on page 180.
179
180
For all the options, you can either specify the date and time to keep the faults in
the suppressed state, or you can suppress the faults forever.
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective.
To suppress a fault
In the Suppress Faults wizard panel, enter the required information, and click
OK.
See Suppress Faults panel options on page 181.
Field
Description
181
Table 9-9
Field
Description
182
In the Suppress Faults wizard panel, enter the required information, and click
OK.
See Suppress the fault definition panel options on page 183.
183
Table 9-10
Field
Description
184
185
Chapter
10
Setting up virtualization
environment discovery
This chapter includes the following topics:
Requirements for discovering vCenter and ESX servers using Veritas Operations
Manager
Configuring parallel discovery for VMware vCenter Server and ESX servers
VMware ESX
Solaris Zones
Oracle VM Server for SPARC (previously called Sun Logical Domains - LDoms)
Microsoft Hyper-V
Kernel-based Virtual Machine (KVM): Red Hat Enterprise Linux as the KVM
Server
For VMware ESX discovery, a designated Control Host discovers the VMware
vCenter Server in the data center. This discovery displays those ESX servers that
VMware vCenter Server manages and the virtual machines that are configured on
the ESX servers.
For Solaris Zones discovery, the zone agentlet that is present in the VRTSsfmh
package, which is installed on a Solaris managed host, discovers the Global zones
that are configured on the host. This discovery displays the non-Global zones that
are configured on the Global Zone.
For Sun LDoms discovery, the LDom agentlet that is present in the VRTSsfmh
package, which is installed on a Solaris managed host, discovers the LDom Server
that is configured on the host. This discovery displays the LDom clients that are
configured on the LDom Server.
For logical partition (LPAR) discovery, Veritas Operations Manager can use
Hardware Management Console (HMC), a VRTSsfmh package that is installed on
the LPAR client, or a VRTSsfmh package installed as a part of DMP on the VIO
server. Control Host is required for the HMC discovery.
For Microsoft Hyper-V discovery, Veritas Operations Manager discovers Hyper-V
server (with VRTSsfmh package on it), and its correlation with the Hyper-V virtual
machines. It also discovers the storage that is provisioned to the guests and its
correlation with the virtual machine and the Hyper-V server. The Hyper-V guest,
when added (using agent or agentless option) to Veritas Operations Manager
Management Server domain, provides storage mapping discovery.
For Kernel-based Virtual Machine (KVM) discovery, Veritas Operations Manager
discovers KVM virtual machines on the Linux host if the KVM modules are installed,
and configured on the virtualization server (KVM Server). Veritas Operations
187
Manager discovers basic information about KVM virtual machines. For example,
virtual machine name, CPU, and so on.
See Requirements for discovering the Solaris zones on page 196.
See Requirements for discovering logical partitions on page 198.
See Requirements for Microsoft Hyper-V virtualization discovery on page 198.
See Requirements for Kernel-based Virtual Machine (KVM) virtualization discovery
on page 199.
Agentless hosts.
To configure the Control Host on a managed host, install the Control Host Add-on
on the Veritas Operations Manager Management Server or a managed host that
reports to Management Server.
Information on VMware Virtualization Infrastructure (vSphere)
In Veritas Operations Manager, you can configure Veritas Operations Manager
Management Server or a managed host that reports to Management Server as
Control Host to discover the information on the VMware virtualization infrastructure.
For this configuration, you must install the Control Host Add-on on the physical or
virtual hosts that you want to designate as Control Host. In Veritas Operations
Manager, you must download the Control Host Add-on from the Symantec Web
site, upload to the Deployment Management Repository, and install it on the
relevant physical or virtual hosts.
In your data center, Control Hosts help Management Server in discovering the
following information on VMware virtualization infrastructure:
VMware Virtual Machines that are configured on the VMware ESX servers.
VMware HA Clusters.
188
Ensure that the Control Hosts can communicate with the vCenter servers from
which they can discover the information on VMware Infrastructure.
You can designate a managed host that reports to Management Server as Control
Host to address the following situations:
To discover the vCenter server that is behind a firewall and you do not want to
install Management Server inside the firewall.
Install the VRTSsfmh package on the virtual or physical hosts on which you want
to install the Control Host Add-on.
Ensure that the Control Hosts can ping the vCenter servers or the ESX servers
from which they can discover the information on VMware Infrastructure.
189
Ensure that you have appropriate privileges to log on to the vCenter server or
the ESX server.
Ensure that you have the Browse Datastore privileges on the vCenter or the
ESX server that you want Veritas Operations Manager to discover.
Partial discovery of ESX servers: It enables the partial discovery of ESX servers
managed under a vCenter Server. For example, if an SNMP trap is received for
a virtual machine (VM1) hosted on ESX1, Veritas Operations Manager runs the
discovery cycle only for ESX1. Other ESX servers under that vCenter Server
are not re-discovered. This discovery is triggered by the event notification from
the VMware vCenter Server to the Management Server using SNMP traps.
For near real-time discovery, ensure to configure the VMware vCenter Server and
the Management Server in the same domain. This discovery is supported for the
following events occurring at a VMware vCenter Server-level:
Table 10-1
Discovered state
VM powered on
6.0, or later
190
Table 10-1
Discovered state
VM powered off
6.0, or later
DRS VM powered on
6.0, or later
VM suspended
6.0, or later
VM created
6.1, or later
VM migrated
6.1, or later
VM relocating
6.1, or later
VM renamed
6.1, or later
6.1, or later
Note: The near real-time update of virtual machines is supported on VMware vCenter
Server 4.x and 5.x.
See Setting up near real-time discovery of VMware events on page 192.
See Configuring the VMware vCenter Server to generate SNMP traps on page 193.
191
When a virtual machine's state changes - powered on, powered off, and
suspended.
When any other virtual infrastructure-related changes are detected. For example,
when a virtual machine is created, migrated, or renamed.
The vCenter Server sends the SNMP trap to the Management Server. The SNMP
trap contains the information of the virtual machine state, and it is used to update
the Management Server database.
Note: SNMP version 1 (SNMPv1) and version 2 (SNMPv2) are supported.
The Veritas Operations Manager component of near real-time discovery is xtrapd.
It runs as a daemon on Linux and as a service on Windows operating system.
xtrapd detects the SNMP trap that is sent from the VMware vCenter Server, updates
the virtual machine records in the Veritas Operations Manager database, and
subsequently the Management Server console is updated with the latest state of
the virtual machine.
To set up the near real-time discovery of VMware events, complete the following
steps:
Table 10-2
Step
Description
Provide Management
Server details in the
VMware vCenter Server
console.
192
Table 10-2
Step
Action
Description
Step 2
Using the vCenter Server console, configure the Management Server as the
SNMP trap receiver.
In the Home page of vSphere Client, select vCenter Server Settings and then
select SNMP configuration. Enable one of the SNMP receivers and enter the
details as follows:
193
Field
Description
Receiver URL
Configure alarm for generating SNMP traps when a virtual machine state changes
or any virtual infrastructure-related change occurs.
It includes adding alarm to monitor the changes related to virtual machine state
and vCenter Server infrastructure, and then adding the appropriate action (for
example, send a notification trap).
In the Home page of the VMware vSphere Client, select Hosts and Clusters
and right-click on the VMware vCenter Server, data-center or an individual
virtual machine to set the alarm. You can set the alarm at an individual virtual
machine level, at the data center level, or at the entire VMware vCenter
Server level. It is recommended to set it at the VMware vCenter Server level.
In the General tab, provide alarm details with alarm type set for monitoring
the virtual machines. Enter the details as listed in the following table:
Field
Description
Alarm Name
Description
Alarm Type
In the Triggers tab, add the required triggers to monitor the states of the
virtual machine. For example, VM created, VM migrated, VM powered on,
VM powered off, VM suspended, DRS VM powered on (for clustered
194
environment with DRS enabled) and so on. The values of the fields are as
follows:
For the following value of an event... Select the following status...
VM powered on
Unset
VM powered off
Unset
DRS VM powered on
Unset
VM suspended
Unset
VM created
Unset
VM migrated
Unset
VM relocating
Unset
VM renamed
Unset
DRS VM migrated
Unset
vc_max_processes
esx_max_threads
195
Where:
vc_max_processes: It is the number of processes created for the discovery of the
vCenter Servers. One process per vCenter Server is created for the discovery.
esx_max_threads: It is the number of threads created for the discovery of the ESX
server. One thread per ESX server is created for the discovery.
The virtualization.conf file is located at:
Note: By default, for a VMware vCenter Server, the value is one and for ESX servers
it is 25.
See About near real-time discovery of VMware events on page 190.
See Setting up near real-time discovery of VMware events on page 192.
See Configuring the VMware vCenter Server to generate SNMP traps on page 193.
Install the VRTSsfmh package on one or more traditional hosts that contains
Global Zones. This helps Veritas Operations Manager discover non-global-zones
that are configured on the Global Zones.
Ensure that the managed hosts with the Solaris 10 or 11 operating system
contain non-Global Zones.
Ensure that the managed hosts with the Solaris 10 or 11 operating system do
not contain any LDoms.
Ensure that using the zlogin command, you can log on to the non-Global Zones.
Ensure that the non-Global Zones can access the devices that are exported
from the Global Zone.
Ensure that the file systems that are exported from the Global Zone to the
non-Global Zones are mounted in the non-Global Zones.
196
Install the VRTSsfmh package on one or more traditional hosts with the Solaris
operating system on which you want Veritas Operations Manager to discover
Solaris LDoms.
197
Ensure that the managed hosts with the Solaris operating system contain LDoms.
Configure the required storage arrays (providing storage to the LPAR servers)
using the Storage Insight Add-on. This is required to discover the correlation of
storage inside the VIO server with the storage arrays.
For VIO servers with Veritas dynamic multi-pathing installed: Install the VRTSsfmh
package on the VIO servers and configure them in Veritas Operations Manager
as agents.
You must have at least hmcoperator role in HMC to perform these tasks.
Note: The Veritas Operations Manager supports only legitimate filename
characters in an LPAR profile name. The special characters reserved for
Operating System usage (for example space, \, $, !, &) are not supported.
It is recommended to use upper and lower case alphabets, numeric values (0-9),
_ and - for the LPAR profile name.
You configure LPAR guests with VRTSsfmh package. It provides the discovery
of correlation of storage inside LPAR guests with that exported from the VIO
servers.
198
The Hyper-V server must be running Microsoft Windows 2008 R2, or later
operating system.
To verify if the KVM modules are installed and configured, run the following
command:
file /dev/kvm
Information on the virtual machines that are configured on the ESX servers
199
Information on the virtual machines that are configured on the LPAR servers
After you add a virtualization server, to view all ESX servers that the VirtualCenter
server manages, click vCenter under Data Center. Similarly to view all the LPAR
servers that the HMC server manages click HMC under Data Center.
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective. The root user can also perform this task.
To add a virtualization server in Veritas Operations Manager
In the Add Virtualization Server wizard panel, enter the details, and click
Next.
See Add Virtualization Server panel options on page 200.
In the Select option wizard panel, select the method for virtualization discovery
of the servers, and click Finish.
See Add Virtualization Server panel options on page 202.
In the Result panel, view the progress of the configuration. After the
configuration is complete, click OK.
Field
Description
Configuration Type
200
Table 10-3
Field
Description
Configuration Name
Control host
Select the name of the control host from the drop-down list:
HMC Server
User Name
Enter the user name that you can use to log on to the
virtualization servers that you want the control host to
discover.
You can use a read-only user account if it has the Browse
Datastore permissions on the virtualization servers.
Enter the password that you can use with the user name to
log on to the virtualization servers that you want the control
host to discover.
201
Field
Description
Name
Discovery Enabled
Configuration Name
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective. The root user can also perform this task.
To edit a virtualization discovery configuration in Veritas Operations Manager
Click Virtualization.
202
In the Edit Configuration wizard panel, modify the required information, click
Next.
See Edit Configuration panel options on page 203.
In the Edit Configuration wizard panel, edit the method for virtualization
discovery of the servers, click Finish.
See Edit Configuration panel options for method selection on page 204.
In the Result panel, view the progress of the configuration, click OK.
Field
Description
Configuration Type
Configuration Name
Control host
HMC Server
User Name
Displays the user name that you can use to log on to the virtual
servers that you have specified. You can modify the user name
in this field.
203
Table 10-5
Field
Description
Password
Displays the password that you can use with the user name
to log on to the virtual servers that you have specified. You
can modify the password in this field.
Field
Description
Discovery Enabled
Name
Configuration Name
204
Click Virtualization.
Click Virtualization.
Under the Virtualization Configurations tab, you can view the details of
virtualization configuration. For example, the name of the virtualization server
(vCenter Server) used in the configuration, its type, associated control host
and other parameters. Select the desired virtualization configuration.
The Configured Virtualization Servers tab lists the ESX servers managed
under the vCenter Server that is part of the selected virtualization configuration.
Right-click the required ESX server and click Refresh. Press Ctrl or Shift for
the selection of multiple ESX servers.
205
Click Virtualization.
Click Virtualization.
206
See Disable performance metering for a VMware vCenter server on page 207.
Click Virtualization.
See Configuring performance metering for a VMware vCenter server on page 206.
207
Chapter
11
Uninstalling a Veritas Operations Manager hot fix from a specific managed host
Use the Management Server console to download and install the hot fix.
In case of hot fixes that can be installed on Management Server and managed host,
you need to first install the hot fix on Management Server, and then on the managed
host.
Note: For deploying Symantec Storage Foundation High Availability hot fixes, you
need to install the Patch Installer add-on. For more information on deploying
Symantec Storage Foundation High Availability hot fixes using the Patch Installer
add-on, refer to Veritas Operations Manager Management Server Add-ons User
Guide.
See About deploying Veritas Operations Manager add-ons on page 96.
See About deploying maintenance release packages and patches on page 209.
See Downloading a Veritas Operations Manager add-on on page 97.
See Uploading a Veritas Operations Manager hot fix or package to the repository
on page 211.
See Installing a Veritas Operations Manager hot fix, package, or patch on page 212.
Use the Management Server console to download and install the package or
patch.
Packages or patches for Veritas Operations Manager are available in tape archive
(tar.gz) format, Storage Foundation archive (.sfa) format, or compress (.zip) format.
209
Use the Management Server console to download and install the package.
Click Deployment.
210
Locate the hot fix, package, or patch which you want to download.
Right-click the hot fix, package, or patch, and select Download to download
on your local computer.
See Uploading a Veritas Operations Manager hot fix or package to the repository
on page 211.
See Installing a Veritas Operations Manager hot fix, package, or patch on page 212.
Click Close.
See Installing a Veritas Operations Manager hot fix, package, or patch on page 212.
See Removing a Veritas Operations Manager add-on from the repository
on page 102.
See Uninstalling a Veritas Operations Manager add-on on page 101.
211
Click Deployment.
Expand Hot Fixes, Maintenance Release, or Base Release to select the hot
fix, package, or patch.
In the Install -Download Add-on wizard panel, select a download option and
click Next.
See Install - Download hot fix, package, or patch panel options on page 212.
In the Install Select hosts wizard panel, select the managed hosts on which
you want to install the hot fix, package, or patch, and click Finish.
See Install - Select hosts panel options on page 213.
212
Table 11-1
Field
Description
Available Packages
See Installing a Veritas Operations Manager hot fix, package, or patch on page 212.
See Upgrading managed host using the console on page 63.
213
Table 11-2
Field
Description
Hosts
Platform
See Installing a Veritas Operations Manager hot fix, package, or patch on page 212.
See Upgrading managed host using the console on page 63.
214
Click Deployment.
In the Hot Fixes tab, right-click the hot fix that you want to uninstall, select
Uninstall.
Click Deployment.
Right-click the add-on, hot fix, package, or patch that you want to remove,
select Remove.
215
Click Deployment.
Expand Hot Fixes to locate the hot fix, package, or patch whose deployment
request you want to cancel.
216
Click Deployment.
In the Applicable Hosts tab, right-click the host, and select Install.
Click Deployment.
In the Applicable Hosts tab, right-click the host, and select Uninstall.
217
218
Chapter
12
Configuring Management
Server settings
This chapter includes the following topics:
Setting the period for retaining the alert and the task logs in the database
Table 12-1
Task
Description
220
Table 12-1
Task
Description
221
Sender account
SMTP port
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective.
To configure the SMTP settings for email notifications
Enter the test email message that you want to send to the recipient in Test
Message.
222
When an event takes place, some objects that are not polled, send traps or
unsolicited asynchronous SNMP messages to the server. Some of the rules that
Veritas Operations Manager uses to monitor objects in the environment rely on
SNMP trap-based messages.
Enter the following details to configure the SNMP trap settings:
SNMP server
SNMP port
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective.
To configure the SNMP trap settings for alert notifications
In the Server settings tab, under SNMP Trap settings, do the following:
223
Enter the port number of the proxy server in Proxy server port.
Enter the user name that you use to access the proxy server in Proxy user.
Enter the password that you use to access the proxy server in Proxy
password.
In the Server settings tab, under Analytics gathering settings, select Enable
Analytics Gathering, and click Save Settings.
224
Setting the period for retaining the alert and the task
logs in the database
In the Management Server, Server setting view, you can set the period for retaining
the alert and the task logs. After this period, the alert and the task logs are removed
from the Veritas Operations Manager database.
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective.
To set the period for retaining the alert and the task logs in the database
In the Server settings tab, under Database Retention Policy Settings, select
the number of days from the drop-down list in the following:
Debug.
Info
Warning
225
You can manage the user session timeout period for the web server. By default,
the user session timeout period is 30 minutes. If you want to disable the user session
timeout period for the web server, you must enter -1 in the Timeout field.
Although the default timeout period is set at 30 minutes, technically the session
timeout happens after 60 minutes. In the first 30 minutes of inactivity or no mouse
clicks, the browser session continues to poll the Management Server intermittently.
After exactly 30 minutes a pop-up window appears. Click Continue in the pop-up
window to continue the web server session without having to enter the user
credentials. If the pop-up window is not acknowledged, then the 30-minutes timeout
period of the Tomcat web server starts. After 30 minutes of inactivity, the session
is terminated. If you now click OK in the pop-up window, you are asked to enter
your user credentials.
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective.
To configure the web server settings
In the Server settings tab, under Web Server Settings, select the log level,
and set the timeout period.
226
In the Server settings tab, under Report subscription settings, select the
time of the day.
In the Server settings tab, under Advanced authorization, select Ask reason
for all operations.
227
Note: Registered signatures can also be enabled or disabled from the perspectives
where they are registered: for hosts on the Server perspective or for clusters on
the Availability perspective. The most recent enable or disable operation takes
precedence.
See the Veritas Operations Manager Management Server User Guide.
To enable or disable policy signatures for the data center
Right-click and choose the appropriate menu option for the operation you want
to perform.
Enable Signatures
Disable Signatures
Confirm to perform the operation on all hosts registered for that signature.
228
Chapter
13
Setting up extended
attributes
This chapter includes the following topics:
Table 13-1
Objects
Perspective
Server
Availability
Storage
Virtualization
You can set the value for the extended attribute on the objects in one of the following
ways:
Note: For more information on setting the extended attribute value and Web services
API, refer to the Veritas Operations Manager Management Server User Guide.
See Viewing the list of extended attributes on page 244.
See Adding an extended attribute on page 230.
230
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective.
To add an extended attribute
In the Add panel, enter a name for the extended attribute, and select one or
more object types. Click Finish.
In the Updated Name field, enter a new name for the extended attribute, and
click OK.
231
In the Extended Attribute view, right-click the extended attribute, and select
Delete.
232
Chapter
14
Set up a proxy server to update the latest price tier information automatically
when Management Server is not connected to the Internet.
The price tiers assigned to the managed hosts do not change automatically when
you upload a new price tier file to Management Server. You need to manually assign
the price tier to the host using the Veritas Operations Manager console.
The automatic update of the price tier information on a Management Server occurs
according to the schedule set by you. By default, the price tier information is updated
on Management Server on the first day of every month.
Note: Veritas Operations Manager downloads the price tier information from the
SORT website only if a newer version is available on the website.
See About assigning price tiers to hosts on page 233.
See Updating the price tier information automatically on Management Server
on page 235.
234
Click SORT.
In the Price Tier Download Settings tab, under Price Tier Automatic
Download do the following:
Select the day of the month from the drop-down list in Day of month.
Select the time of the day from the drop-down list in Time of day.
Click Save.
See About updating the price tier information on Management Server on page 234.
See Updating the price tier information manually on Management Server
on page 235.
See Configuring the proxy server settings on page 223.
235
text file to the system where Management Server is running and manually upload
this text file.
Note: You must use a Windows system to perform this operation.
To perform this task, your user group must be assigned the Admin role on the
Management Server perspective.
To update the price tier information manually on Management Server
Click SORT.
In the Price Tier Download Settings tab, under Price Tier Manual Download
do the following:
Run the following command to extract the pricetier.txt file that contains
the information on the price tiers:
cscript/NoLogo pricetier.vbs
Alternatively, you can double-click the script file to extract the text file. The
pricetier.txt file is generated in the folder where you have downloaded
the pricetier.vbs script file.
Click Upload.
Click Close.
See About updating the price tier information on Management Server on page 234.
See Updating the price tier information automatically on Management Server
on page 235.
236
Chapter
15
Viewing the details of an add-on, hot fix, package, or patch on SORT website
Viewing the details of the authentication broker and the domains associated
with the broker
Click Deployment.
Expand Repository to locate the add-on, hot fix, package, or patch whose
details you want to view.
Right-click the add-on, hot fix, package, or patch, and select Details to view
the details on the SORT website.
Click Host.
238
Configure LDAP/AD.
You can view this information, if your user group has Admin role assigned on the
Management Server perspective. The root user can also view this information.
To view the details of the authentication broker and the domains associated with
the broker
239
Create a rule that determines the action that Management Server performs
when it receives the alert that is related to a faulty entity.
You can view this information, if your user group has Admin role assigned on the
Management Server perspective.
To view faults in the Management Server perspective
Entity Type: Displays the source object on which the fault occurs.
Affected Types: Displays all the object types that are affected by the fault on
the source object. For example, if a service group is faulted, it is listed under
the Entity Type column. Since a service group is associated with managed
hosts, clusters, and other objects, Veritas Operations Manager generates derived
faults for these objects. All such associated objects are listed in this column.
240
Suppress a fault.
Restore a fault.
You can disable a fault definition by suppressing the fault. After the fault definition
is disabled, all associated faults are automatically suppressed. You can suppress
the fault definition until a specific date, or disable it forever.
Though the option to forever disable a fault definition is provided, you can again
activate the fault definition using the Restore Faults option.
You can view this information, if your user group has Admin role assigned on the
Management Server perspective.
To view the faults definitions
Message: Displays the message which is a part of the alert. You can view the
name of the host on which the alert condition occurred.
Classification: Displays the classification of the alert, for example, volume alert,
subdisk alert, and path enabled.
Source Host: Displays the host on which the alert condition occurred.
Time: Displays the date and time when the alert was generated.
241
You can view this information, if your user group has Admin role assigned on the
Management Server perspective.
To view details of alert logs
Create a rule.
Edit a rule.
Enable a rule.
Disable a rule.
Delete a rule.
You can view this information, if your user group has Admin role assigned on the
Management Server perspective.
To view the details of alert rules
242
User name with which the active user has logged in to Management Server.
Date and time at which the user has logged in to Management Server.
Host name or IP address of the host from which the user logs in.
You can view this information, if your user group has Admin role assigned on the
Management Server perspective.
To view the details of active users logged in to Management Server
You can view this information, if your user group has Admin role assigned on the
Management Server perspective.
243
Click Management Server and click the Server Settings tab to view the
settings.
You can view this information, if your user group has Admin role assigned on the
Management Server perspective.
To view the list of extended attributes
244
The user.
You can view this information, if your user group has Admin role assigned on the
Management Server perspective.
You can also export the information to a file.
To view audit information for Management Server
In the Home page on the Management Server console, click Settings and
select Audit & Tasks.
Task name
The object
The user
245
You can view this information, if your user group has Admin role assigned on the
Management Server perspective.
To view task information for the data center
In the Home page on the Management Server console, click Settings and
select Audit & Tasks.
See Setting the period for retaining the alert and the task logs in the database
on page 225.
If you want to export the signatures to a file, click the Save icon in the upper
right of the window.
246
Appendix
Troubleshooting
This appendix includes the following topics:
/opt/VRTSsfmcs/pgsql/bin/postgres
/opt/VRTSsfmh/bin/xprtld
/opt/VRTSsfmcs/webgui/jre/bin/java
/opt/VRTSsfmcs/sec/bin/sfmsecd
/opt/VRTSsfmh/bin/xtrapd
Troubleshooting
Management Server (MS)
General: /var/opt/VRTSsfmcs/logs
General: C:\ProgramData\Symantec\VRTSsfmcs\logs
General: C:\ProgramData\Symantec\VRTSsfmh\logs
248
Troubleshooting
Managed host (MH)
/opt/VRTSsfmh/bin/xprtld
/opt/VRTSsfmh/bin/sfmh-discovery.pl
/opt/VRTSsfmh/bin/vxdclid
UNIX/Linux: /var/opt/VRTSsfmh/logs
Windows: C:\ProgramData\Symantec\VRTSsfmh\logs
UNIX/Linux : /var/opt/VRTSsfmh/hostname/log
Windows: C:\ProgramData\Symantec\VRTSsfmh\AGENTLESS\hostname\log
249
Troubleshooting
Managed host (MH)
On Unix/Linux:
/opt/VRTSsfmh/adm/vomgather.pl --dir mydir
On Windows:
"C:\Program Files\Veritas\VRTSsfmh\bin\perl.exe" "C:\Program
Files\Veritas\VRTSsfmh\adm\vomgather.pl" --dir mydir
250
Index
A
about
communication between managed host and
Management Server 111
Active Directory removing 155
ActiveX 35
add-on
canceling deployment request 103
disabling 107
downloading 97
enabling 107
installing 99
removing 102
uninstalling 101
adding
virtualization server 199
advance authorization settings 227
agentless discovery
about 115
Commands that require the root access 129
control hosts 122
Linux 123
prerequisites 123
privilege control software for UNIX hosts 131
remote hosts 122
requirements for deep array discovery 128
requirements for UNIX hosts 125
requirements for Windows hosts 127
SSH configuration requirements 132
supported features 119
UNIX 123
Windows 124
alert log retention period 225
alerts and rules 167
array management capabilities 122
assigning price tier
processor price tier 233
server price tier 233
audit information 244
authentication broker
managing 149
B
backing up Veritas Operations Manager
on Linux 58
on Windows 6061
browsers 35
C
configuring
Control Host 188
existing Management Server installation in HA
environment 77
Management Server 45
Management Server in DR environment 79
Management Server in HA environment 70
Management Server in HADR environment 85
new Management Server installation in HA
environment 71
Configuring Management Server settings
advance authorization 227
report scheduling 226
Control Host 122
discover VMware Virtualization Infrastructure 188
D
deep array discovery 128
deploying
add-ons 96
hot fixes 208
package 210
packages or patches 209
Veritas Operations Manager 23
disable performance metering
VMware vCenter server 207
Index
E
enabling analytics gathering 224
enabling authentication domains 155
extended attribute
adding 230
deleting 232
modifying 231
using 229
F
fault definition
restoring 184
suppressing 183
faults
restoring 182
suppressing 180
viewing 240
faults and risks 180
fibre channel switch capabilities 122
firewalls ports
ports 35
G
gendeploy.pl 49
H
HA configuration 70
completing the configuration 77
creating base service groups 74
modify default IP address and host name 79
performing initial configuration 73
prerequisites for existing MS 78
prerequisites for new MS 72
HA-DR configuration
creating base service groups 88
enabling configuration 90
I
installation resources
Veritas Operations Manager 23
installing
host management through Solaris JumpStart 49
managed host 47
managed host on UNIX 47
managed host on Windows 49
Management Server 41
Management Server on Linux 41
Management Server on Windows 43
Intranet zone security level 35
IPV 37
J
JavaScript 35
JScript 35
L
LDAP
adding authentication 150
removing 155
LDom discovery
prerequisites 197
requirements 197
M
managed host
add using gendeploy.pl 142
installation files for UNIX 47
252
Index
N
network requirements 35
O
OpenSSH
about 134
installing on AIX 134
installing on Linux 134
installing on Solaris 135
operating system requirements 27
organization 157
P
package
base release 210
cancel deployment request 216
deploying 210
installing 212
removing 215
uploading 211
packages or patches
deploying 209
maintenance release 209
patch
cancel deployment request 216
installing 212
removing 215
uploading 211
performance metering
disable for VMware vCenter server 207
permissions
assigning for perspective 158
253
Index
permissions (continued)
deleting on perspective 160
modifying for perspective 159
perspective
assigning permissions 158
deleting permissions 160
modifying permissions 159
policy checks
enabling or disabling signatures for data
center 227
exporting signatures 246
pop-up blockers 35
price tier information
update automatically 235
update manually 235
Proxy server requirements 38
proxy server settings 223
R
removing
Active Directory 155
LDAP 155
report scheduling 226
resolv.conf 35
restoring Veritas Operations Manager
on Linux 59
on Windows 61
roles 157
rules
about 167
creating 169
deleting 177
disabling 179
editing 173
enabling 178
S
security level 35
signatures
exporting 246
signatures for data center
enabling or disabling 227
SNMP trap settings 222
Solaris JumpStart installation 49
solaris zones discovery
prerequisites 196
requirements 196
space estimation data logs 29
SSL 35
system resource requirements 28
T
task information for the data center 245
task log retention period 225
TCP 35
toolbars 35
U
UC 23
UDP 35
uninstalling
add-on 101
managed host on UNIX 68
managed host on Windows 69
Management Server on Linux 67
Management Server on Windows 68
upgrading
disaster recovery 92
HA 91
HA-DR 92
managed host 63
managed host on UNIX 64
managed host on Windows 66
managed host using installer package 66
managed host using operating system
commands 64
managed hosts using console 63
Management Server 52
Management Server in HA DR environment 93
Management Server in HA environment 91
Management Server on Linux 53
Management Server on Windows 55
upload
add-on 97
user
restricting 161
user group permissions
assigning for perspective 158
deleting on perspective 160
modifying for perspective 159
restricting 161
UTC 23
V
verifying
managed host installation on UNIX 51
254
Index
verifying (continued)
managed host installation on Windows 52
managed host version using the console 67
Management Server installation on Linux 44
Management Server installation on Windows 44
Management Server version using the console 66
Veritas Operations Manager
about 18
backing up on Linux 58
backing up on Windows 6061
choosing managed hosts 25
choosing Management Server hosts 24
choosing Web console hosts 35
configuring for disaster recovery 79
configuring for high availability 70
configuring HADR 85
configuring Management Server 45
deployment configuration 23
downloading 19
downloading managed host files 20
downloading Management Server files 19
installation resources 23
installing managed host on UNIX 47
installing managed host on Windows 49
installing Management Server on Linux 41
installing Management Server on Windows 43
IPV requirements 37
network requirements 35
operating systems 27
organization 157
packages 41
proxy server requirements 38
restoring on Linux 59
restoring on Windows 61
system resource requirements 28
uninstalling UNIX managed host 68
upgrading managed host on UNIX 64
upgrading managed host on Windows 66
upgrading Management Server in HA DR
environment 93
upgrading Management Server in HA
environment 91
upgrading Management Server on Linux 53
upgrading Management Server on Windows 55
URL 19
Veritas Operations Manager deployment
centralized management 24
Veritas Operations Manager HA
configuring a new installation 71
W
Web browsers requirements 35
Web console 35
Web server
settings 225
web server
CLI command 109
restart 109
Web UI framework
starting and stopping 113
255