Veritas InfoScale™ 8.0 Release Notes - Solaris
- Introduction and product requirements
- Changes introduced in InfoScale 8.0
- Fixed issues
- Limitations
- Storage Foundation software limitations
- Dynamic Multi-Pathing software limitations
- Veritas Volume Manager software limitations
- Veritas File System software limitations
- SmartIO software limitations
- Replication software limitations
- Cluster Server software limitations
- Limitations related to bundled agents
- Limitations related to VCS engine
- Veritas cluster configuration wizard limitations
- Limitations related to the VCS database agents
- Cluster Manager (Java console) limitations
- Limitations related to LLT
- Limitations related to I/O fencing
- Limitations related to bundled agents
- Storage Foundation Cluster File System High Availability software limitations
- Storage Foundation for Oracle RAC software limitations
- Storage Foundation for Databases (SFDB) tools software limitations
- Storage Foundation software limitations
- Known issues
- Issues related to installation, licensing, upgrade, and uninstallation
- Storage Foundation known issues
- Dynamic Multi-Pathing known issues
- Veritas Volume Manager known issues
- Veritas File System known issues
- Dynamic Multi-Pathing known issues
- Replication known issues
- Cluster Server known issues
- Operational issues for VCS
- Issues related to the VCS engine
- Issues related to the bundled agents
- Issues related to the VCS database agents
- Issues related to the agent framework
- Issues related to Intelligent Monitoring Framework (IMF)
- Issues related to global clusters
- Issues related to the Cluster Manager (Java Console)
- VCS Cluster Configuration wizard issues
- LLT known issues
- I/O fencing known issues
- GAB known issues
- Operational issues for VCS
- Storage Foundation and High Availability known issues
- Storage Foundation Cluster File System High Availability known issues
- Storage Foundation for Oracle RAC known issues
- Oracle RAC known issues
- Storage Foundation Oracle RAC issues
- Storage Foundation for Databases (SFDB) tools known issues
- Issues related to installation, licensing, upgrade, and uninstallation
Improved VCS password encryption
The vcsencrypt -gensecinfo command is updated to generate only an encryption key and store it in the SecInfo256 attribute in the main.cf
file. The initialization vector (IV) is now generated during encryption, and then the IV and the corresponding encrypted password are stored in the new IV256List attribute as a key-value pair.
Note:
You must run vcsencrypt -gensecinfo before encrypting any passwords.
IV256List gets added to or updated in main.cf
when a user encrypts the VCS password or an agent password by using the vcsencrypt -vcs or the vcsencrypt -agent command respectively. The attribute also gets added or updated when a cluster user is added by using the hauser -add command, in case of non-secure clusters.
Note:
You no longer need to run haconf -dump to update the configuration after any of these three commands are run. The vcsencrypt
utility itself handles the update.
You can not modify the IV256List attribute by using haconf -modify. However, you can delete stale entries from IV256List by using vcsencrypt -delkey encryptedPasswordValue.
Note:
Passwords that were encrypted using the earlier mechanism get automatically decrypted in the same manner.
For details, refer to the Cluster Server Administrator's Guide.