Veritas Access Installation Guide
- Introducing Veritas Access
- Licensing in Veritas Access
- System requirements
- Important release information
- System requirements
- Linux requirements
- Operating system RPM installation requirements and operating system patching
- Kernel RPMs that are required to be installed with exact predefined RPM versions
- OL kernel RPMs that are required to be installed with exact predefined RPM versions
- Required operating system RPMs for OL 7.4
- Required operating system RPMs for RHEL 7.3
- Required operating system RPMs for RHEL 7.4
- Software requirements for installing Veritas Access in a VMware ESXi environment
- Hardware requirements for installing Veritas Access virtual machines
- Management Server Web browser support
- Supported NetBackup versions
- Supported OpenStack versions
- Supported Oracle versions and host operating systems
- Supported IP version 6 Internet standard protocol
- Linux requirements
- Network and firewall requirements
- Maximum configuration limits
- Preparing to install Veritas Access
- Deploying virtual machines in VMware ESXi for Veritas Access installation
- Installing and configuring a cluster
- Installation overview
- Summary of the installation steps
- Before you install
- Installing the operating system on each node of the cluster
- Installing Veritas Access on the target cluster nodes
- About managing the NICs, bonds, and VLAN devices
- About VLAN tagging
- Replacing an Ethernet interface card
- Configuring I/O fencing
- About configuring Veritas NetBackup
- About enabling kdump during an Veritas Access configuration
- Reconfiguring the Veritas Access cluster name and network
- Configuring a KMS server on the Veritas Access cluster
- Automating Veritas Access installation and configuration using response files
- Displaying and adding nodes to a cluster
- Upgrading Veritas Access and operating system
- Upgrading Veritas Access using a rolling upgrade
- Uninstalling Veritas Access
- Appendix A. Installation reference
- Appendix B. Configuring the secure shell for communications
- Appendix C. Manual deployment of Veritas Access
Installation script options
Table: Available command-line options lists the available command-line options for the Veritas Access installation script. For an initial install or upgrade, options are not usually required.
Table: Available command-line options
Command Line Option | Function |
|---|---|
-configure | Configures an unconfigured product after it is installed. |
-install | Installs the product on systems. |
-precheck | Performs checks to confirm that systems have met the products installation requirements before installing the product. |
-license | Registers or updates product licenses on the specified systems. |
-licensefile | Specifies the location of the Veritas perpetual or subscription license key file. |
-requirements | Displays the required operating system version, required patches, file system space, and other system requirements to install the product. |
-responsefile response_file | Performs automated installations or uninstallations using information stored in a file rather than prompting for the information. response_file is the full path of the file that contains the configuration definitions. |
-rolling_upgrade | Performs a rolling upgrade. Using this option, the installer detects the rolling upgrade status on cluster systems automatically without the need to specify rolling upgrade phase 1 or phase 2 explicitly. |
-prestop_script prestop_script | Executes the customized script provided by user on each host before stop processes during the upgrade procedure. |
-poststart_script poststart_script | Executes the customized script provided by user on each host after start processes during the upgrade procedure. |
-uninstall | Uninstalls the product from systems. |
-updateparameter | Updates the network parameter for a running cluster. |