Please enter search query.
Search <book_title>...
Veritas Access Installation Guide
Last Published:
2021-08-04
Product(s):
Access (7.4.2.400)
Platform: Linux
- Licensing in Veritas Access
- System requirements
- System requirements
- Linux requirements
- Network and firewall requirements
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About managing the NICs, bonds, and VLAN devices
- About VLAN tagging
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading the operating system and Veritas Access
- Migrating from scale-out and erasure-coded file systems
- Migrating LLT over Ethernet to LLT over UDP
- Performing a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Configuring the secure shell for communications
- Appendix C. Manual deployment of Veritas Access
Symbols
- /etc/llttab
- sample, LLT over RDMA sample /etc/llttab
A
- about
- managing NICs, bonds, and VLAN devices, About managing the NICs, bonds, and VLAN devices
- VLAN tagging, About VLAN tagging
- adding node
- mixed mode, Adding a node in mixed mode environment
B
- bond
- creating, Creating a NIC bond
- bond interface
- creating, Creating a NIC bond
C
- calculating
- IP addresses, About calculating IP address requirements
- checking
- storage configuration, About checking the storage configuration
- cluster
- adding a new node, Adding a node to the cluster
- deleting a node from, Deleting a node from the cluster
- displaying a list of nodes, Displaying the nodes in the cluster
- including new nodes, Before adding new nodes in the cluster
- shutting down a node or all nodes in a cluster, Shutting down the cluster nodes
- cluster installation
- overview, Installation overview
- Configuration
- configuration limits, Maximum configuration limits
- configure
- I/O fencing, Configuring I/O fencing
- KMS server, Configuring a KMS server on the Veritas Access cluster
- configuring
- NetBackup (NBU), About configuring Veritas NetBackup
- Veritas Access software on the cluster, Installing and configuring the Veritas Access software on the cluster
- configuring passwordless ssh, Manually configuring passwordless secure shell (ssh)
- connecting
- network hardware, Connecting the network hardware
- creating
- VLAN device, Creating a VLAN device
D
- deleting
- a node from the cluster, Deleting a node from the cluster
- Deploying Veritas Access manually
- non-SSH environment, Deploying Veritas Access manually on a two-node cluster in a non-SSH environment
- displaying
- list of nodes in a cluster, Displaying the nodes in the cluster
- driver node, About the driver node
E
- Enabling internal sudo user communication
- non-SSH environment, Enabling internal sudo user communication in Veritas Access
- enabling kdump
- Veritas Access configuration, About enabling kdump during an Veritas Access configuration
- excluding
- NIC, Excluding a NIC
G
- GUI
- Veritas Access, Veritas Access Graphical User Interface
H
- Hardware requirements
- Veritas Access, Hardware requirements for the nodes
I
- including
- new nodes in the cluster, Before adding new nodes in the cluster
- NIC, Including a NIC
- install
- installation
- response files, About response files
- response files variables, Response file variables to install and configure Veritas Access
- installation script options, Installation script options
- installation states and conditions
- installation time
- reducing the number of IP addresses, Reducing the number of IP addresses required at installation time
- Installer
- installer
- performing rolling upgrade, Performing a rolling upgrade using the installer
- installing
- cluster, Installation overview
- operating system on each node of the cluster, Installing the operating system on each node of the cluster
- operating system on Veritas Access cluster, Installing the RHEL operating system on the target Veritas Access cluster
- prerequisites, Before you install
- steps, Summary of the installation steps
- target cluster nodes, Installing Veritas Access on the target cluster nodes
- Veritas Access software on the cluster, Installing and configuring the Veritas Access software on the cluster
- IP addresses
- calculate, Creating a NIC bond
- calculating, About calculating IP address requirements
- obtain, About obtaining IP addresses
- IPv6 protocol, Required IP version 6 Internet standard protocol
L
- limitations of
- VLAN Tagging, Limitations of VLAN Tagging
- Linux requirements
- Veritas Access, Linux requirements
- list of nodes
- displaying in a cluster, Displaying the nodes in the cluster
- LLT
M
- Management Server requirements
- Veritas Access, Management Server Web browser support
- managing NICs, bonds, and VLAN devices
- mixed mode
- adding a node, Adding a node in mixed mode environment
N
- NetBackup (NBU)
- configuring, About configuring Veritas NetBackup
- network and firewall requirements
- Veritas Access, Network and firewall requirements
- network hardware
- connecting, Connecting the network hardware
- network interface card (NIC) bonding, Creating a NIC bond
- NIC
- excluding, Excluding a NIC
- including, Including a NIC
- NIC bond
- removing, Removing a NIC bond
- node
- adding to the cluster, Before adding new nodes in the cluster, Adding a node to the cluster
O
- obtain
- IP addresses, About obtaining IP addresses
- operating system
- installing, Installing the RHEL operating system on the target Veritas Access cluster
- installing on each node of the cluster, Installing the operating system on each node of the cluster
- overview
- Veritas Access installation, Overview of the installation process
P
- private
- public NICs, Selecting the private NICs
- public NICs
- private, Selecting the private NICs
- selecting, Selecting the public NICs
R
- RDMA
- reducing
- number of IP addresses required at installation time, Reducing the number of IP addresses required at installation time
- release information, Important release information
- removing
- NIC bond, Removing a NIC bond
- NIC from bond list, Removing a NIC from the bond list
- RPMs, Removing Veritas Access 7.4.2.400 RPMs
- VLAN device, Removing a VLAN device
- replacing
- Ethernet interface card, Replacing an Ethernet interface card
- rolling upgrade
- using the installer, Performing a rolling upgrade using the installer
S
- sample response file, Sample response file for Veritas Access installation and configuration
- selecting
- public NICs, Selecting the public NICs
- shutting down
- node or all nodes in a cluster, Shutting down the cluster nodes
- silent installation and configuration, Performing a silent Veritas Access installation
- storage configuration
- checking, About checking the storage configuration
- supported IPv6 protocol, Required IP version 6 Internet standard protocol
- supported upgrade paths
- upgrades on RHEL, Supported upgrade paths for upgrades on RHEL
- system requirements
- Veritas Access, System requirements
U
- uninstall
- using the installer, Uninstalling Veritas Access using the installer
- Veritas Access disc, Running uninstall from the Veritas Access 7.4.2.400 disc
- uninstalling Veritas Access
- upgrades on RHEL
- supported upgrade paths, Supported upgrade paths for upgrades on RHEL
- upgrading
- operating system, Upgrading the operating system and Veritas Access
V
- Veritas Access
- graphical user interface, Veritas Access Graphical User Interface
- Linux requirements, Linux requirements
- network and firewall requirements, Network and firewall requirements
- system requirements, System requirements
- uninstall, Uninstalling Veritas Access using the installer
- web browser requirements, Management Server Web browser support
- Veritas Access installation
- overview, Overview of the installation process
- VLAN device
- creating, Creating a VLAN device
- removing, Removing a VLAN device
- VLAN tagging
- about, About VLAN tagging
- VLAN Tagging
- limitations of, Limitations of VLAN Tagging