Professional Documents
Culture Documents
550-06484 EMS 9.3 Installation and Upgrade Guide PDF
550-06484 EMS 9.3 Installation and Upgrade Guide PDF
This document presents information for users of the products of Sonus Networks, Inc. ("Sonus"), its affiliates and its subsidiaries (collectively, the "Sonus Group"). Network Equipment
Technologies, Inc. and Performance Technologies, Incorporated are part of the Sonus Group. The Sonus Group does not assume any liability arising out of the application or use of any
product or circuit described herein. No part of this document may be copied or reproduced in any form or by any means without the prior written permission of Sonus. For the most current user
Copyright
Copyright © 1999 - 2015 Sonus Networks, Inc. All rights reserved. Printed in the U.S.A. This item and the information contained herein are the property of the Sonus Group. This publication
may be used, copied, or distributed only in accordance with the terms of the license agreement. Any other use, reproduction, or distribution may occur only upon Sonus' prior written consent.
Third-Party Copyrights
Open BSD Copyright (c) 1982, 1986, 1990, 1991, 1993. The Regents of the University of California. All rights reserved. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND
CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the above disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the disclaimer in the documentation and/or other materials provided with the
distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
The information in this document may be used by customers solely for the use and understanding of the Sonus Group's products and solutions. This document is not meant to define an
interface between products of the Sonus Group and any third party hardware or software. The Sonus Group reserves the right to change the design and implementation used for any of the
tables, screens, field names, etc. to enhance its products as it sees fit.
Warranties
THIS INFORMATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. REFERENCES TO CORPORATIONS, THEIR SERVICES AND PRODUCTS, ARE
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED. IN NO EVENT SHALL THE SONUS GROUP BE LIABLE FOR ANY SPECIAL,
INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR
NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
INFORMATION.
Descriptions of, or references to, products, services or publications within the Sonus Group's documentation do not imply endorsement of that product, service or publication. Sonus Networks
makes no warranty of any kind with respect to the subject matter included herein, the products listed herein, or the completeness or accuracy of the information. Sonus Networks specifically
disclaims all warranties, express, implied or otherwise, including without limitation, all warranties of merchantability and fitness for a particular purpose.
THIS PUBLICATION COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGES MAY BE PERIODICALLY MADE TO THE INFORMATION HEREIN.
Trademarks
Sonus Networks, the Sonus Networks logo, Open Services Architecture, Insignus, SMARRT, Sonus Networks Insight, IMX, GSX9000, GSX4000, GSX4010, SBC 5100TM, SBC 5200TM, IMX,
SBC9000, the Atreus logo, the Performance Technology, Inc. logo, Insight xAuthority, Monterey 8000, NexusWare, SEGway and SIP Xpress are either registered trademarks or trademarks of
Sonus Networks, Inc. Open Services Partner Alliance and Sonus Networks CARE are service marks of Sonus Networks, Inc. The Sonus Group trademarks may not be used in connection with
any product or service that is not the Sonus Group's in any manner that is likely to cause confusion among customers or in any manner that disparages or discredits the Sonus Group. All other
product names mentioned herein are trademarks, service marks, registered trademarks, or registered service marks of their respective owners.
Third-Party Trademarks
Apache is the http server, and Tomcat is the Servlet/JSP container developed by the Apache Software Foundation. — Rapid Service Introduction (RSI) System is a trademark of BayPackets,
Inc. — Borland is a registered trademark, and AppServer is a trademark of Borland Software Corporation. — Dot Hill and SANnet are trademarks of Dot Hill Systems Corp. — Eclipse is a
trademarks of International Business Machines Corporation in the United States, other countries, or both. — Intel, Xeon, and Pentium are registered trademarks of Intel Corporation in the
United States and/or other countries. — Iomega is a registered trademark of the Iomega Corporation, a wholly owned subsidiary of the EMC Corporation. — Macromedia is a registered
trademark, and JRun is a trademark of Macromedia, Inc. in the U.S. and/or other countries. — DataDirect is a registered trademark of Progress Software Corporation. — Linux is a registered
trademark of Linus Torvalds in the United States and/or other countries. — Microsoft, Microsoft Internet Explorer logo, Windows, Windows NT, Windows XP, and/or other Microsoft products
referenced herein are either registered trademarks or trademarks of Microsoft Corporation in the U.S. and/or other countries. — MySQL is a registered trademark of MySQL AB in the United
States, the European Union and other countries. — Netscape is a registered trademark of Netscape Communications Corporation in the U.S. and other countries. — Nokia is a registered
trademark of Nokia Corporation. — Oracle, JD Edwards, PeopleSoft, and Siebel are registered trademarks of Oracle Corporation and/or its affiliates. — Palm OS and Palm Powered are
registered trademarks, and Palm is a trademark owned by or licensed to Palm, Inc. — Red Hat, RPM, JBoss, and all Red Hat-based trademarks are trademarks or registered trademarks of
Red Hat, Inc. in the United States and/or other countries. — Sage Instruments is a copyright of Sage Instruments, Inc. — Service Availability and the Service Availability logo are trademarks
used with the permission of their owner. — SnowShore, SnowShore Networks, and N20 are trademarks of Cantata Technology Inc. — SSH is an IETF protocol and OpenSSH is a derivative of
the original and free ssh 1.2.12 release by Tatu Ylonen. SSH Secure Shell is a trademark of SSH Communications Security Corp. — Sun, Sun Microsystems, Java, JumpStart, Netra, Solaris,
Solstice DiskSuite, and all trademarks that contain Sun, Solaris, or Java are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the United States and other
countries. — iPlanet is a division of Sun Microsystems, Inc. — All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the
U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. — Telcordia is a registered trademark and LERG is a
trademark of Telcordia Technologies, Inc. in the United States, other countries, or both. — Signalware is a registered trademark of Ulticom, Inc. — UNIX is a registered trademark in the United
States and other countries, exclusively licensed through X/Open Company, Ltd. — VeriSign is a registered trademark, and Thawte Consulting is a wholly owned subsidiary of VeriSign, Inc. —
Veritas is a trademark of Symantec Corporation or its affiliates in the U.S. and other countries. — WebLogic is a registered trademark of BEA Systems, Inc.
All other product names mentioned herein are trademarks, service marks, registered trademarks, or registered service marks of their respective owners.
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause
harmful interference in which case the user will be required to correct the interference at the user's own expense.
Use of the information in this publication is governed by all applicable federal, state, and local laws. All information available in this publication is subject to U.S. export control laws and may
also be subject to the laws of the country where you reside. Sonus Networks makes no representation that the content on this site is appropriate or available for use in other locations, and
All Sonus Networks, Inc. products and publications are commercial in nature. Use, duplication, or disclosure by the United States Government is subject to the restrictions set forth in DFARS
Embedded Software
Oracle Enterprise Edition is an embedded part of the Sonus Group product line. The programs included herein are subject to a restricted use license and can only be used in conjunction with
this application. You are not allowed to navigate or modify the underlying database schema unless explicitly authorized in writing by Sonus.
Export Laws
Sonus Group product documentation includes technical information developed in the United States that may be subject to limitations on export imposed by the U.S. Department of State and
the U.S. Department of Commerce. All use, distribution, and transfer of any technical information shall be in compliance with U.S. export laws and regulations.
Table of Contents
SBC Session Border Controllers SBC 1000, SBC 2000, SBC 5x00, SBC 7x00, SBC SWe
The EMS Software Release V09.03.00 on Solaris platform, only supports SalesForce upgrade to V09.03.00.
The Jumpstart USB installation or upgrade is not supported for EMS Software Release V09.03.00 on
Solaris. To use EMS Software Release V09.03.00, perform an upgrade using SalesForce.
Table of Contents
Overview
In this section:
This section provides a quick overview of the supported hardware platforms for server-based and virtualized
environments and the EMS deployment configurations.
Server-based Environment
The following platforms are supported in server-based environment.
HP DL380p G8 or G8+ Server running Red Hat Enterprise Linux 6.4 or above
SUN Netra T5220 Server running Solaris 10
Virtualized Environment
The following platforms are supported in virtualized environment:
x86_64 Compatible Server running Red Hat Enterprise Linux 6.4 or above (with KVM version 0.10.2 or above
on the host).
x86_64 Compatible Server running VMware ESXi version 5.1.0 or above
The EMS can be deployed in a Standalone or High Availability (HA) configuration for both server-based and
virtualized environments.
The EMS HA-SA deployment for DR configuration is not supported for Linux platform.
Term Explanation
High An EMS High Availability system consisting of two nodes. Also referred to as HA RAC Cluster.
Availability
(HA)
Disaster A Disaster Recovery setup consisting of a Source site and a Target site. Each site will consist of 1 node in case
Recovery of SA, and 2 nodes in case of HA.
(DR)
Source DR site consisting of Primary Database, where EMS server is up and running. This site replicates all database
changes to the target site.
Target DR site passively receiving changes from a remote source site, until a switchover happens, resulting in a DR
role swap - source becomes target and vice-versa.
To detect whether current node is primary for EMS Linux HA , run this command as root user:
To detect whether current node is primary for Solaris Linux HA , run this command as root user:
# cd /export/home/ems/conf/HA/
# ./hamgmt getstate
If you see any output from the above command, then you are logged in to the primary node.
Primary Refers to the database instance on the Source site. This database is in read-write mode and replicating changes
DB to the target (standby) database.
Standby Refers to the database instance on the Target site. This database is not in read-write mode, and receives
DB database changes from the source (primary) database.
DR A DR switchover is a planned role reversal between the Source (Primary DB) and the Target (Standby DB) DR
Switchover sites to avoid downtime during scheduled maintenance on the Source (Primary DB) or to test readiness for
future role transitions.
DR A DR failover is an unplanned operation performed when the source DR site goes offline for some reason and
Failover you need to promote the target DR site into a fully functional EMS.
Table of Contents
In this section:
Hardware Requirements
Hardware Cabling and Network Connectivity Information
Disk Partitioning Requirements for Standalone Configuration
RAID Hardware Requirements
IBM DS3524 Storage Requirements used with HP DL380p G8
IBM Storwize V3700 Storage Requirements used with HP DL380p G8
Disk Partitioning for HA Configuration
Installing HP DL380 G8 Fibre Channel Card
Software Requirements
This section provides information on hardware requirements, cabling and connectivity information for EMS.
Hardware Requirements
You can procure the commercial HP ProLiant DL380p Gen8 Server directly from HP resellers or procure the OEM
long-life HP Proliant DL380p Gen8 Server from Sonus.
For more information on hardware requirements and procurement options, see Server Configurations section in HP
ProLiant DL380p Gen8 Server Quick Start. For PDF version, download HP ProLiant DL380p Gen8 Server Quick
Start PDF (550-06234).
For identifying the HP ProLiant DL380p Gen8 Front and back panel components and information on cabling,
network connections and interfaces configuration, see HP DL380p Gen8 Front and Back Panel Component
Identification and Cabling and Network Connectivity for Insight EMS Standalone and EMS HA Cabling and
Connectivity in the HP ProLiant DL380p Gen8 Cabling and Network Connectivity Reference.
EMS HA does not support double failures, especially cable pullout. If both the cables are unplugged (eth0
and eth4) then it may lead to unpredictable behavior of EMS and EMS may not function properly. Avoid,
unplugging both the cables connected to eth0 and eth4 simultaneously.
The following table provides information about the mount points during the Insight Standalone installation:
Mount Point Partition Type Full Path of Mount Point Size (GB)
/ LVM /dev/mapper/vg00-lv.root 10
This section provides RAID hardware requirements information for an EMS HA.
Scenario Configuration
EMS HA You can use either IBM DS3524 RAID or IBM Storwize V3700 Storage system as a RAID to store the
configuration EMS configuration, the Netcool DB and other reports.
OR
When used with the HP DL380p G8 server in a high availability configuration, the IBM DS3524 Storage System
must meet the following requirements:
RAID RAID-1+0
Two hot-swap DC or AC power supplies,
Dual hot-swap controllers
2 GB battery protected cache per controller
NVSRAM N1746D35R1070V90
For IBM RAID with controller firmware version 7.83, unlike the version 7.77, there is no error code with
“clear” coming from the RAID. Therefore, the issue traps coming from this RAID will remain so without
getting cleared. It has to be cleared manually.
When used with the HP DL380p G8 server in a high availability configuration, the IBM Storwize V3700 Storage
System must meet the following requirements:
IBM
Controller For more detail about latest IBM V3700 firmware supported and how to perform firmware
Firmware upgrade, refer the section IBM Storwize V3700 Firmware Upgrade Quick Start.
/ LVM /dev/mapper/vg00-lv.root 10
For Linux HA solution, Fibers channel cards are required. For more details, about how to install the Fibre channel
cards (FCC) on existing G8 servers, see the section Installing HP DL380 G8 Fibre Channel Card of HP ProLiant
DL380p Gen8 Server Quick Start.
Software Requirements
The following are the Insight EMS software platform version requirements:
If you have upgraded to EMS V09.03.00, you can verify if EMS is upgraded to V09.03.00 by executing the
command rpm -qa SONSems:
SONSems-V09.03.00-R000.x86_64
Component Specification
HP Firmware For more information about HP firmware version and procedure to upgrade the HP firmware, refer the
page https://support.sonus.net/display/ALLDOC/HP+DL380p+G8+Firmware+Upgrade.
iLO Firmware
HP ProLiant
System ROM
HP Array
Controller
Firmware
(1)The Java Server installation happens along with the EMS ISO installation. You can execute the java
-version command and rpm -qa | grep -i jdk to check the Java Server version already installed on
the HP G8 box.
The minimum Java Client Version support for EMS and PSX Manager is 1.7.0_72. The EMS and PSX
application is tested with above version. But the application will work with 1.7.0_72 and above version also. If
you don't have the latest Java Client version, you will get warnings messages in the browser and from the
plugin.
Table of Contents
This section provides information on installing standalone EMS system on Linux platform. This section also provides
information on configuring DR for EMS Standalone.
Table of Contents
Before you install the EMS software, review the following prerequisites:
Before you install EMS, use the Pre-Installation Checklist to write down your settings.
You can check off each task as you complete it and make notes in the Comments column below. Sonus
recommends that you make note of the parameter values that you need to enter during the installation process and
while configuring EMS.
Primary The Primary Network Interface (PNI) of the system. eth0 Yes
network
interface
name
hostname The name which identifies this system on the network. ems1 Yes
IP address The Internet Protocol (IP) address for this network 10.9.9.103 Yes
interface.
Default The node on a TCP/IP Network that serves as an access 10.9.9.1 Yes
Router point to another network.
The following summary outlines the key steps required to install EMS application on a standalone server.
Before proceeding with the EMS Application installation ensure the steps 1 to 5 to deploy HP ProLiant DL380p
Gen8 server are completed.
Refer the Quick Start Summary section in the HP ProLiant DL380p Gen8 Server Quick Start.
For PDF version, download HP ProLiant DL380p Gen8 Server Quick Start PDF (550-06234).
This step identifies the required installation files for download to the HP DL380p Gen8 server and how to prepare
the files for installation.
This step shows you how to install EMS application using the iLO remote console.
This step shows the mandatory post-installation steps you need to perform.
Install EMS License using the License Manager utility in the EMS GUI.
For more information on performing this task, see the Insight EMS User Guide (550-05908).
What To Do Next
For performing some basic EMS housekeeping or configuration tasks on the EMS host, see Common
Administrative Tasks.
ISO Image:
ems-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso
The software bundles are listed with the product names and software versions.
2. In the Secure Customer Login, enter your Username and Password.The Sonus Global Support Portal displays.
3. From the SalesForce customer portal, click SOFTWARE DOWNLOADS tab. The Software Downloads screen
displays.
8. Click SOFTWARE REQUESTS tab. The Software Requests Home screen displays.
10. Click on the download links from the Software Requests section to download the software.
11. Save the software to your local desktop or server or remote desktop.
There are three options for mounting the ISO image. For more information, see Options for
Mounting ISO Image.
PSX Manager GUI File: Download the PSX Manager GUI TAR file SSGUI_V09.03.00R000_RHEL.tar from the Sonus Salesforce
Customer Portal located in WL9.3 Software Bundle to the local system.
SSGUI_V09.03.00R000_RHEL.tar
HP Firmware File: Downloading the HP firmware file from SalesForce to /opt/sonus/platform directory on server and verify if the
HP firmware version is the latest. For more information about HP firmware latest version and procedure to upgrade
Firmware File the HP firmware, refer the page https://support.sonus.net/display/ALLDOC/HP+DL380p+G8+Firmware+Upgrade.
During EMS SA installation, ignore the following errors, unless DB Instance creation fails. The following
errors are seen on trace/alert log files which is present under: $ORACLE_BASE/admin/SIDB/udump/diag
/rdbms/sidb/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
1. To start the EMS installation we need to mount the ISO image using iLO of the HP Gen8 server. There are
two methods:
a. Using a Laptop physically connected to the HP Gen8 server through the iLO port
b. Using a PC or Laptop on the same network as the iLO
2.
3. Type 1 and press ENTER to start the EMS installation using Monitor and Keyboard or Remote Console.
Enter 2 to install Insight Application Server (IAS) and proceed with IAS installation.
After a few minutes, the following screen appears and you can view the various RPM packages being
installed.
4. After successful installation of Red Hat Enterprise Linux, unmount the virtual disk.
5. Unmount the virtual disk as CD ROM by selecting Virtual Drives and clear the Image File check box.
6. Use the Tab key to select Reboot button. After selecting Reboot button, press Space key to reboot the
system.
7. Press F1 to continue booting the system or it continues by itself after some time.
If you do not press any of the Function keys, by default, the system continues to boot normally.
8. When the system reboot is complete, the Sonus Network Configuration screen appears. Select Hostname
and press Space key to configure the hostname for the system.
The EMS hostname is limited in length to 64 characters. The hostname can only contain lowercase
letters [a-z] and digits [0-9]. The hostname cannot start with a digit. Special characters including
hyphen are not allowed in hostname.
a. In the Host Configuration Screen, specify the Hostname, Primary DNS and DNS Search Path details.
Press Tab key to select OK button and press Space key to save the settings.
The Primary DNS, Secondary DNS, and DSN Search Path configuration parameters are
optional.
b. In the Sonus Network Configuration screen, Select IP Configuration using the Tab key to navigate to
the option and press the Space key to select the option.
c. Select IP4 as IP Format and eth0 as Port. Press the Tab key until OK is selected and then press the
Space key.
Use the Tab key to navigate to the option and press the Space key to select the option.
d. Specify the IP Address, subnet mask, and gateway IP Address for eth0 network interface. Press Tab
key to select OK and press Space key to save the IP Address details.
e. Use the Arrow keys to select Time Zone and press Space key to configure the Time Zone. Select the
nearest Time Zone for the system and press Tab key to select OK and press Space to save the Time
Zone settings.
f. After configuring Time Zone, Sonus Network Configuration screen is displayed. Select Time Server
using arrow keys to configure the NTP Time server.
Enter the NTP Time-Server IP Address, to synchronize the time for the host system. Press TAB key
to select OK and press Space to save the configuration.
The EMS application installation starts and after completing EMS Installation, login screen is
displayed. The steps 12 to 19 are optional and performed if you want to change the boot priority. If
you do not want to change the boot priority, skip steps 10 to 17 and refer from step 18 onwards.
10. If you want to change the boot setup priority, reboot the system. The The HP BIOS execution screen is
displayed after reboot.
12. Select the Standard Boot Order (IPL) option and press ENTER. The boot order appears.
13. Select Hard Drive C: (See Boot Controller Order) and press ENTER.
The choices to change the boot order appears.
14. Select the Set the IPL Device Boot Order to 1 option and press ENTER.
17. Press F10 to save the settings and exit from BIOS setup utility.
The system reboots from the hard disk.
18. The login screen is displayed. Specify the username as root and default password as sonus. After
installing the Linux Operating System, during the first time system reboot, the password must be changed.
19. Enter the new password and press ENTER. The password cannot be same as the login name and must meet
a few restrictions. Following are the restrictions while using strong passwords :
Must be minimum eight characters.
Can be combination of alphabets and numbers, words, numbers or special characters.
The word must not be from dictionary.
Serial letters must be avoided.
Characters must not repeat (word, number, special character).
Must not be reverse of any dictionary word.
Must not be reverse of name.
# cat /etc/os_version
06.04.02.00R000
23. Execute the following command to verify the platform Kernel version:
# uname -r
2.6.32-504.3.3.el6.x86_64
$ sqlplus -version
SQL*Plus: Release 11.2.0.3.0 Production
25. Login as oracle user and execute following command to verify the latest Oracle database patch version:
Oracle patch version must be Patch description: "Database Patch Set Update : 11.2.0.3.0 (19271438)"
After completing the EMS installation, perform the post-installation tasks. For post-installation tasks details,
refer the section Post-Installation Tasks.
This section provides the mandatory post-installation tasks that you need to perform.
You can configure the EMS system IP address and passwords using the configureJumpstart.sh script. The
configureJumpstart.sh script changes the server IP address and updates this IP address in the database
tables. Also, this script updates the Netcool license information with the IP address.
By default, after configure jump start we start the insight process. Incase, Firmware upgrade is done and it
involves a reboot of the system, insight process would come up automatically.
The changed password is by default valid for 90 days. If you want to extend the password change duration,
modify the parameter PASS_MAX_DAYS 90 to PASS_MAX_DAYS 99999 in /etc/login.defs file,
using the vi editor.
Perform the following procedure to set the IP address and the system passwords:
1. Log in as root.
2. Enter the following commands:
# cd /opt/sonus/ems/conf
# ./configureJumpstart.sh
You can use the EMS IP address that you have configured while performing the EMS ISO
installation. Else if you want to change the EMS IP address, you can enter a new IP address.
4. If the following message appears, enter Y if you want to continue and overwrite the existing key.
If you want to use strong passwords (recommended for production setup), enter Y and skip to Step 6.
You can enter new passwords.
If you do not want to use strong passwords, enter N and continue to Step 5. The default passwords
can be used.
5. If you entered N in Step 4, a prompt asks you to confirm that you want to use weak passwords. Enter Y.
When a message appears stating that the script is done, continue to 'Post-Installation Steps'.
When entering strong passwords (Steps 6 through 18), the passwords must meet the restrictions me
ntioned in Password Complexity.
6. If you entered Y in Step 4, a prompt asks for the EMS database (dbimpl) password. Enter the password. (The
only special characters allowed are _ and #).
7. When prompted, re-enter the EMS database password.
8. When prompted, enter the EMS database sys password. (The only special characters allowed are _ and #)
9. When prompted, re-enter the EMS database sys password.
10. When prompted, enter the EMS database system password. (The only special characters allowed are _ and
#)
11. When prompted, re-enter the EMS database system password.
12. When prompted, enter the EMS user password. For high availability and disaster recovery systems, you must
use the same EMS user password on each EMS system.
13. When prompted, re-enter the EMS user password.
14. When prompted, enter the Netcool root database user password.
15. When prompted, re-enter the Netcool root database user password.
16. When prompted, enter the Netcool Insight_Admin_User database user password.
17. When prompted, re-enter the Netcool Insight_Admin_User database user password.
18. When a message appears stating that the script is done, continue to 'Post-Installation Steps'.
Perform the following procedure to install the latest PSX Manager GUI:
If the PSX Manager GUI version is not the latest then download the respective release PSX
Manager GUI TAR file (SSGUI_<Version>_RHEL.tar) and execute upgrade steps from Step 3 on
wards.
# su - insight
$ ./sonusEms stop
4. If the /opt/sonus/install/ directory is not available, create the directory using the following command:
# mkdir -p /opt/sonus/install/
5. Download the SSGUI_V09.03.00R000_RHEL.tar file from Sonus SalesForce Customer portal to local
system.
6. Copy the SSGUI_V09.03.00R000_RHEL.tar file from the local system to the /opt/sonus/install/
directory on the EMS server.
7. Change to the /opt/sonus/install/ directory using the following command:
# cd /opt/sonus/install/
# cd /opt/sonus/install/SSGUI
10. Execute the GuiClient.sh script as a super root user. The GuiClient.sh script installs the SONSpsx
package at the default installation folder.
# ./GuiClient.sh
If, a prior version of PSX Manager GUI exists a confirmation message to remove the existing version is
displayed. Enter y to uninstall the prior version and install the latest version of PSX Manager GUI.
The following message is displayed after uninstalling the previous PSX Manager GUI and installing the latest
PSX Manager GUI version.
Removing SONSpsx.
Installing SONSpsx.
Preparing... ########################################### [100%]
1:SONSpsx ########################################### [100%]
11. Verify that the SONSpsx package is installed, by executing the following command:
# su - insight
$ ./sonusEms start
The iLO 4 firmware version running on your EMS system may require an update.
Upgrading iLO Firmware Version only applies to physical host (HP G8) based EMS installations. Upgrading
Firmware is not applicable for EMS SWe installations.
To know the iLO firmware version running on your EMS system and update the iLO firmware to the latest version,
do the following:
4.
Installing EMS V09.03.00 removes the previous device manager (DM) on the system, if it was installed earlier. After
installing EMS 9.3.0, install the respective DM supported for EMS 9.3.0. For more information on Device Manager,
see the SBC Manager section of the Insight User Guide. For more information on installing or upgrading Device
Manager, refer Installing and Upgrading Device Manager (DM).
To verify the status of the Insight server, login as user insight and execute the following command:
$ ./sonusEms status
To start the Insight server, login as user insight and execute the following command:
$ ./sonusEms start
You can add arguments to the sonusEms start command to control memory size allocations. For a list of the
arguments and their syntax, type:
# ./sonusEms -help
The following summary outlines the key steps required to install EMS Standalone application and setup Disaster
Recovery (DR) configuration on the EMS source and target standalone systems.
Before proceeding with the EMS Application installation ensure the steps 1 to 5 to deploy HP ProLiant DL380p
Gen8 server are completed on both the EMS source and target standalone systems.
Refer the Quick Start Summary section in the HP ProLiant DL380p Gen8 Server Quick Start.
For PDF version, download HP ProLiant DL380p Gen8 Server Quick Start PDF (550-06234).
This step identifies the required installation files for download to the HP DL380p Gen8 server and how to prepare
the files for installation.
Install EMS application using iLO remote console on both the EMS source and target standalone systems.
This step shows you how to install EMS application using the iLO remote console.
Perform Post-installation Tasks on on both the EMS source and target standalone systems.
This step shows the mandatory post-installation steps you need to perform.
This step shows you how to configure the two Standalone (SA) EMS system located in different geographical
location into a Disaster Recovery (DR) configuration.
What To Do Next
For performing some basic EMS housekeeping or configuration tasks on the EMS host, see Common
Administrative Tasks.
This section provides the steps to convert the two separate standalone systems into a DR configuration.
The EMS SA installation should be completed on both the Source and Target systems.
The EMS should be running on the Source and Target systems.
The Target EMS system should be accessible from the Source EMS system, and vice
versa.
1. Login as root user into the standalone system which is identified to be the DR Source System and perform
the following step:
# /opt/sonus/ems/conf/DR/manageDR setup
2. A confirmation message to setup DR is displayed. Press y when the following prompt appears:
3. Enter the Target EMS system IP address when the following prompt appears:
"Please specify the IPv4 Address of Node 1 of the remote DR TARGET cluster"
The DR Setup configures the source and target EMS systems for replication, backs up the database in the
source system, restores it on the target system, and initiates the replication process.
1. Login as root user into the DR Source system and execute the following command:
# /opt/sonus/ems/conf/DR/manageDR status
The above command shows the status of DR Setup. For detailed explanation see " Status".
This section provides information on upgrading standalone EMS system and upgrading standalone DR EMS system
on Linux platform.
Rollback EMS SA
For upgrading from an earlier EMS release to EMS 09.03.00R000, you need to perform the upgrade using the EMS
ISO image. The EMS ISO upgrade method enables you to upgrade the operating system and database apart from
upgrading the EMS application software.
Also, for upgrading from EMS 09.03.00R000 to a post-09.03.00 EMS minor or patch release, use the EMS ISO
upgrade method. For example, for upgrading from EMS V09.03.00 to EMS V09.03.01, use the ISO upgrade method.
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under:
$ORACLE_BASE/admin/SIDB/udump/diag/rdbms/sidb/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
For upgrading from an earlier EMS release to EMS 09.03.00R000, you need to perform the upgrade using the EMS
ISO image available in the Sonus Salesforce Customer Portal. The EMS ISO image includes Linux Operating
System, EMS application, and EMS database packages. You can download the EMS ISO image to your laptop, or
The ems_upgrade.conf file has a parameter upgradetype. The parameter upgradetype designates
the type of upgrade as INPLACE or KICKSTART. The default value for upgradetype is INPLACE. If you
opt for KICKSTART based upgrade then you need to change the upgradetype parameter to KICKSTART
in the ems_upgrade.conf configuration file.
INPLACE is the default upgrade type used for upgrading EMS using the EMS ISO Image. The INPLACE upgrade
type enables you to upgrade the EMS software application, operating system, and database to the latest release
versions. The benefit of INPLACE upgrade type is that it upgrades the OS, database and EMS application without
reinstalling them. Sonus recommends the use of INPLACE upgrade type.
The KICKSTART upgrade type re-installs OS, database and EMS application. You need to take the backup of the
configuration in a remote location before kickstarting the system. After reinstalling the application, OS, and
database, restore the backup from the remote location to the EMS System.
Upgrade can take longer time if EMS releases (V08.04.07R000 or versions higher) are directly installed or
upgraded to any other release. The upgrade time can be longer depending on the number of rows in
IPTRUNKGROUPINTERVALSTATS table. It is recommended to reorder the columns in this statistics table
in another maintenance window prior to upgrading EMS. For more information, contact Sonus Customer
Support.
Before upgrading EMS, you can generate an EMS configuration file ( ems_upgrade.conf). The
ems_upgrade.conf configuration file contains the required EMS upgrade and backup parameters, with the default
values. You can edit the default values in the ems_upgrade.conf file and provide the file as input while
performing the upgrade.
Based on your requirements, you can edit the properties defined in the ems_upgrade.conf file using the vi
editor.
The following table provides usage and significance of each property in the ems_upgrade.conf file.
_ems_backup false for INPLACE Indicates whether you want to take the backup of data or not.
For KICKSTART upgrade, the value is true because it
true for KICKSTART reimages the system. For INPLACE upgrade, the default
value is false, however, you can still take the backup, by
changing the value of _ems_backup to true.
_ems_backup_folder /opt/sonus/backup Specifies the directory where the backup must be stored.
This is applicable, if you have specified the value of _ems_b
ackup as true.
_ems_sys_conf_backup false for INPLACE Indicates, if backup of system configuration files like IP
configs/contrabs/host files are required or not. The value is
true for KICKSTART true for KICKSTART and false for INPLACE.
_backup_remote_copy false for INPLACE If set to true, backup will be scp-ed to a remote server. The
value is true for KICKSTART and false for INPLACE.
true for KICKSTART
_backup_remote_user root Indicates the username of the remote server. Change the
username, based on what is the username set.
_backup_remote_dir /opt/sonus/backup/ Specifies the directory path on the remote server, where
backup is saved. Change the path, based on where you want
to take backup on the remote server.
Upgrade operation is not supported with the changed netcool object server name. To perform an upgrade,
you need to first rollback to default netcool object server name “SONUSDB”. For changing the netcool object
server name, refer Changing Netcool DB Object Server Name for EMS SA.
Backup data and copy it to a remote system, before performing an EMS SA Upgrade. System backup is
critical and can be used, if EMS upgrade fails. For more information on how to backup, refer the section
System backup.
To know about the important and late-breaking information on the EMS release, read the latest EMS Release
Notes that supplements the main documentation.
System Backup
Before upgrading EMS SA, backup EMS data and copy it to remote server. Backup of data is needed in case if EMS
upgrade fails.
# cd /opt/sonus/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the EMS machine. Use a directory name that will
clearly identify the EMS server that created the backup files. Make a note of the directory path because you
will need it later if you need to restore the system. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of backupFiles.tar anddmp files in the backup directory. Copy the
backup files to a remote server, which enables restore of data later in case if EMS upgrade fails.
Files to be Downloaded
Downloading the EMS Software Bundle
PSX Manager GUI File
Firmware Upgrade
Files to be Downloaded
The following table provides list of files to be downloaded for ISO upgrade.
ems-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso
upgradeEMS.sh
SSGUI_V09.03.00R000_RHEL.tar
Firmware file
# rm -rf /opt/emsInstall/<Previous-Release-Directory>
For Example:
# rm -rf /opt/emsInstall/9.2
# rm -rf /opt/emsInstall/9.1
The EMS software bundle is available as a software package downloadable from the Salesforce customer portal.
1. Login to Salesforce customer portal using your Sonus provided login, and click SOFTWARE DOWNLOADS.
2. Click software bundle WL9.3 to view its contents, and then click Request Download.
3. Fill in the Software Download Form, accept the license agreement and click Submit.
4. When the "Request Status" on the SOFTWARE REQUESTS page displays "Download Available", click the
links in the WL9.3 software bundle.
# mkdir -p /opt/emsInstall/<NEW_EMS_VERSION>/
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
# chmod +x upgradeEMS.sh
Download the PSX Manager GUI TAR file SSGUI_V09.03.00R000_RHEL.tar from the Sonus Salesforce
Customer Portal located in WL9.3 Software Bundle to the local system.
Firmware Upgrade
If you are upgrading EMS SWe for KVM or VMware ESXi, upgrading iLO is not required. Upgrading iLO
firmware is applicable only for EMS physical server-based upgrade.
Downloading the HP firmware file and verify if the HP firmware version is the latest. For more information
about HP firmware latest version and procedure to upgrade the HP firmware, refer the page https://support.
sonus.net/display/ALLDOC/HP+DL380p+G8+Firmware+Upgrade.
This is the HP G8 DL380 firmware upgrade file. Ensure that the HP DL380 G8 firmware is upgraded after you perform the EMS Download the firmware file from Salesforce
Software upgrade using the ISO file. Customer Portal to:
/opt/sonus/platform directory in the server.
This step identifies the required upgrade files for download to the HP DL380p Gen8 server and how to prepare
the files for upgrade.
This step stops the disk mirroring, ensuring that the secondary disks retain the older EMS data.
This step re-mirrors the disks. Perform this step, if the EMS upgrade is successful.
If the upgrade is not successful, then you can revert back to the previous EMS release. For more
information, see Reverting Back To Previous EMS Release.
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under: $ORACLE_BASE/admin/SIDB/udump/diag/rdbms/sidb/$ORACLE_S
ID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
The total time taken for upgrading and total service downtime of the EMS Standalone server during the ISO
INPLACE upgrade is 35 to 40 minutes approximately.
You can perform an ISO upgrade using either INPLACE or KICKSTART upgrade type. By default, the
upgradetype parameter in ems_upgrade.conf configuration file is set to INPLACE. It is recommended to use
INPLACE upgrade. The INPLACE upgrades preserves all system settings, services or custom configurations of the
operating system.
To upgrade the EMS Standalone system using INPLACE upgrade, perform the following steps:
The <NEW_EMS_VERSION> is the directory, created while downloading the upgrade files. For
example, if you have created a directory /opt/emsInstall/9.3 for upgrading to 9.3, change the
directory to /opt/emsInstall/9.3.x/ (replace <NEW_EMS_VERSION>) with 9.3 in the following
command:
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
4. Change the permission of the upgradeEMS.sh file using the following command:
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
# chmod +x upgradeEMS.sh
5. INPLACE upgrade can be done using the default settings or by configuring the ems_upgrade.conf file.
# ./upgradeEMS.sh -p
/opt/emsInstall/<NEW_EMS_VERSION>/ems-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso
7. To change the default EMS upgrade and backup configuration, perform the following:
# ./upgradeEMS.sh -g /opt/emsInstall/<NEW_EMS_VERSION/ems_upgrade.conf
b. Once the configuration file is generated, you can edit the parameters in the ems_upgrade.conf file
using the vi editor. The ems_upgrade.conf file contains comments that guides you in editing the
upgrade/backup parameter values.
# vi ems_upgrade.conf
# Remote Server Details : The following are to be given only if this server
has a password-less connection to the remote server where you want the
backup to be copied. This configuration will be read, only if
_backup_remote_copy is "true".
# Please enter the remote server's IP.
_backup_remote_IP=
8. The system gets rebooted if there is an OS upgrade involved. The upgrade will continue after the system
starts.
After the system is up, execute the following command to see the upgrade progress:
# tail -f /var/sadm/install/logs/upgradeEMS.log
10. Perform the following steps to verify if EMS, database and kernel have been updated:
a. Execute the following command to verify the platform version:
# cat /etc/os_version
06.04.02.00R000
# uname -r
2.6.32-504.3.3.el6.x86_64
c. Login as oracle user and execute following command to verify Oracle database version:
$ sqlplus -version
SQL*Plus: Release 11.2.0.3.0 Production
d. Login as oracle user and execute following command to verify the latest Oracle database patch
version:
Oracle patch version must be Patch description: "Database Patch Set Update : 11.2.0.3.0
(19271438)"
After completing the EMS upgrade, perform the post-upgrade tasks. For post-upgrade tasks
details, refer the section Post-Upgrade Tasks.
This step identifies the required upgrade files for download to the HP DL380p Gen8 server and how to prepare
the files for upgrade.
This step stops the disk mirroring, ensuring that the secondary disks retain the older EMS data.
This step re-mirrors the disks. Perform this step, if the EMS upgrade is successful.
If the kickstart upgrade is not successful, then you can revert back to the previous EMS release. For more
information, see Reverting Back To Previous EMS Release.
The KICKSTART upgrade type re-installs OS, database and EMS application. You need to take the backup
of the configuration in a remote location before kickstarting the system. After reinstalling the application, OS,
and database, restore the backup from the remote location to the EMS System.
To upgrade the EMS Standalone system using KICKSTART upgrade, perform the following steps:
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under: $ORACLE_BASE/admin/SIDB/udump/diag/rdbms/sidb/$ORACLE_S
ID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
The <NEW_EMS_VERSION> is the directory created while downloading the upgrade files. For
example, if you have created a directory /opt/emsInstall/9.3 for upgrading to 9.3, change the
directory to /opt/emsInstall/9.3/ (replace <NEW_EMS_VERSION>) with 9.3 in the following
command:
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
3. Change the permission of the upgradeEMS.sh file using the following command:
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
# chmod +x upgradeEMS.sh
4. Generate the ems_upgrade.conf file and change the _upgrade_type parameter value to KICKSTART.
For example, if you want to generate the ems_upgrade.conf file in the /opt/emsInstall/
<NEW_EMS_VERSION>/ directory then execute the following command. Executing the following
command, generates the ems_upgrade.conf file at the specified path.
# ./upgradeEMS.sh -g /opt/emsInstall/<NEW_EMS_VERSION>/ems_upgrade.conf
b. Once the configuration file is generated, change the _upgrade_type parameter value to
KICKSTART in the ems_upgrade.conf file. The ems_upgrade.conf file contains comments that
guides you in editing the upgrade/backup parameter values.
# vi ems_upgrade.conf
# Remote Server Details : The following are to be given only if this server
has a password-less connection to the remote server where you want the
backup to be copied. This configuration will be read, only if
_backup_remote_copy is "true".
# Please enter the remote server's IP.
_backup_remote_IP=
5. Take the backup the EMS configuration to a remote machine using the following command:
Please make sure that in the BIOS boot order hard disk has given the highest preference so that if
reboots are involved during the upgrade then it automatically boots to hard disk.
6. When the script prompts you to specify the location to store the EMS configuration backup files, enter the
remote machine details.
7. After the backup is generated and stored on the remote machine, kickstart the system. Kickstarting the
system, performs an installation of OS, database, and EMS Software Application V09.03.00. For more details
on kickstarting the system, see Installing EMS ISO Image.
Check for the availability of these files in the remote system before kick starting the box: <hostnam
e>.emsConfig.tar and <hostname>.backupData.tar
8. After the system is kick-started, verify if the EMS upgrade is successful using the following command:
# cd /opt/sonus/ems/conf
10. Restore the backup from the remote machine to the EMS server using the following command:
# ./upgradeEMS.sh -r
11. The script prompts you to specify the location EMS configuration backup files, enter remote machine details.
To check the upgrade progress, go to the /var/sadm/install/logs/ directory and view the
latest log files to ensure upgrade is successful.
The above procedure completes the upgrade process for EMS Standalone using ISO KICKSTART upgrade.
12. Perform the following steps to verify if EMS, database and kernel have been updated:
a. Execute the following command to verify the platform version:
# cat /etc/os_version
06.04.02.00R000
# uname -r
2.6.32-504.3.3.el6.x86_64
c. Login as oracle user and execute following command to verify Oracle database version:
$ sqlplus -version
SQL*Plus: Release 11.2.0.3.0 Production
d. Login as oracle user and execute following command to verify the latest Oracle database patch
version:
Oracle patch version must be Patch description: "Database Patch Set Update : 11.2.0.3.0
(19271438)"
After completing the EMS upgrade, perform the post-upgrade tasks. For post-upgrade tasks
details, refer the section Post-Upgrade Tasks.
If the kickstart upgrade is not successful, then you can revert back to the previous EMS release. For more
information, see Reverting Back To Previous EMS Release.
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
Download and prepare the upgrade files on the source and target EMS standalone systems.
This step identifies the required upgrade files to be download to the HP DL380p Gen8 servers and how to prepare
the files for upgrade.
Backup the EMS by splitting the disk mirror on the source and target EMS standalone system.
This step stops the disk mirroring, ensuring that the secondary disks retain the older EMS data.
Ensure that the upgrade of the Target EMS site is started within about 15 minutes of starting
the upgrade of the Source EMS site. In other words, if upgradeEMS.sh is called on the
Source EMS site for example around 10:00 AM, then the upgradeEMS.sh on the Target
EMS site should be called no later than about 10:15 AM.
This restriction is required so that the upgrade script can automatically setup the DR
relationship on the upgraded EMS sites at the end of upgrade process.
DR is automatically torn down before upgrade and then automatically setup after upgrade.
Perform the mandatory post-upgrade tasks on the source and target EMS standalone system.
This step shows the mandatory post-installation steps you need to perform.
Re-Mirror the disks on the source and target EMS standalone system.
This step re-mirrors the disks. Perform this step, if the EMS upgrade is successful.
If the upgrade is not successful, then you can revert back to the previous EMS release. For more
information, see Reverting Back To Previous EMS Release.
The EMS Disaster Recovery (DR) is setup automatically after successful upgrade of source and target
systems. For information on other DR operations, see EMS DR Operations. To verify that DR connectivity
has been setup after upgrade, execute the command manageDR status on the source DR site.
Perform the following procedure to install the latest PSX Manager GUI:
If the PSX Manager GUI version is not the latest then download the respective release PSX
Manager GUI TAR file (SSGUI_<Version>_RHEL.tar) and execute upgrade steps from Step 3 on
wards.
# su - insight
$ ./sonusEms stop
4. If the /opt/sonus/install/ directory is not available, create the directory using the following command:
# mkdir -p /opt/sonus/install/
5. Download the SSGUI_V09.03.00R000_RHEL.tar file from Sonus SalesForce Customer portal to local
system.
6. Copy the SSGUI_V09.03.00R000_RHEL.tar file from the local system to the /opt/sonus/install/
directory on the EMS server.
7. Change to the /opt/sonus/install/ directory using the following command:
# cd /opt/sonus/install/
# cd /opt/sonus/install/SSGUI
10. Execute the GuiClient.sh script as a super root user. The GuiClient.sh script installs the SONSpsx
# ./GuiClient.sh
If, a prior version of PSX Manager GUI exists a confirmation message to remove the existing version is
displayed. Enter y to uninstall the prior version and install the latest version of PSX Manager GUI.
SONSems-V09.03.00-R000.x86_64
/opt/sonus/ems/weblogic/insight/deploy/insight.ear/emsGui.war/external
SONSpsx-V09.02.00-R000.x86_64
The following message is displayed after uninstalling the previous PSX Manager GUI and installing the latest
PSX Manager GUI version.
Removing SONSpsx.
Installing SONSpsx.
Preparing... ########################################### [100%]
1:SONSpsx ########################################### [100%]
11. Verify that the SONSpsx package is installed, by executing the following command:
# su - insight
$ ./sonusEms start
The iLO 4 firmware version running on your EMS system may require an update.
If you are upgrading EMS SWe for KVM or VMware ESXi, upgrading iLO is not required. Upgrading iLO
firmware is applicable only for EMS physical server-based upgrade.
Upgrading EMS to V09.03.00 removes the previous device manager (DM) on the system, if it was installed earlier.
After upgrading EMS 9.3.0, install the respective DM supported for EMS 9.3.0. For more information on Device
Manager, see the SBC Manager section of the Insight User Guide. For more information on installing or upgrading
Device Manager, refer Installing and Upgrading Device Manager (DM).
Rollback EMS SA
Rollback Options
Following are the rollback options to revert back to the previous EMS:
Disk Backup the EMS by splitting the disk mirror. Reverting Back To Previous EMS
Mirroring Release
Manual Manually backup data before upgrade and move it to remote server Reverting EMS to Previous Version
Backup For more details, refer System backup by restoring backup
If EMS upgrade is not successful or if EMS is not stable after an upgrade then perform the following steps:
1. Install Insight EMS using the old ISO by performing the following:
For EMA SA deployed for DR setup, perform the following steps on source and target DR sites.
a. Perform Insight Installation using the old ISO. see "Installing EMS ISO Image".
b. Perform "Post-Installation Steps".
c. Enter the following command to start Insight as user insight:
2. Log in as root. Copy the following files from the backup directory on the remote server to the current location
(For example, /export/home/backups):
For EMA SA deployed for DR setup, perform the following steps on source and target DR sites.
The file expdp_stats_data_manual.dmp will be generated only if the PM stats export option is enabled.
exp_data_manual.dmp
exp_strct_manual.dmp
expdp_data_manual.dmp
expdp_strct_manual.dmp
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
# cd /export/home/pkg
# ./EMSmigration -b /export/home/backups
OR Replace the directory /export/home/backups with the directory that you are using for your backup
data. The following output appears:
For EMS SA deployed for DR setup, after rollback of previous data is completed on source and
target DR sites, setup DR by executing the command ./manageDR setup on the EMS system at
the source DR site. For more information, refer Setup.
This section provides information on migrating the EMS standalone system from Solaris to Linux platform.
Ensure that the EMS Solaris standalone system (Sun Netra 220 or 440 or T5220) is up and running.
Download the migrationExport.sh script and EmsSolarisMigration.tar file from the Sonus
Salesforce portal.
Login as root to the EMS Solaris system and copy the migrationExport.sh script and EmsSolarisMigr
ation.tar file to the system.
# chmod +x migrationExport.sh
Overview
If your current EMS application and data is installed on a Solaris OS with Netra 240/440 system and if you are want
to migrate to a Linux OS on a HPG8 system then you need to perform the following task on the Solaris Netra
240/440 system. From EMS Software Release V09.02.00 onwards, following tasks are simplified and automatically
performed by executing the ./migrationExport.sh script.
Netcool Installation
Exporting Netcool Data
Database (DB) backup
In EMS Software Releases prior to V09.02.00, the above tasks were performed separately. From EMS
Software Release V09.02.00 onwards, all the three tasks are done automatically.
The migration files generated when migrating from Solaris to Linux are:
expdp_data_manual.dmp
expdp_strct_manual.dmp
NetcoolBackupFiles.tar
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
NetcoolBackupFiles.tar
Prerequisites
# chmod +x migrationExport.sh
Procedure
Perform the following procedure to perform OMNIBus Installation and export data from the Solaris system:
Ensure that permission for migrationExport.sh has been changed as root user, using the ch
mod +x migrationExport.sh command. The permissions must be changed before the following
step is executed.
2. Ensure that you are in the directory where you want to perform backup. Both the files
./migrationExport.sh script and EmsSolarisMigration.tar are available in this directory. Execute
the following command to install OMNIBus and export data from Solaris to Linux system.
The above procedure completes Netcool installation, exporting netcool data, and database (DB) backup.
Importing Data
Perform the following procedure to import the previously backed up database and Netcool data onto an EMS Linux
SA system.
If migrating to 9.2.1 and above (including 9.3.0) then use the following dmp file names:
# cd /opt/oracle/backup/dump
# chown oracle:dba expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp expdp_strct_manual.dmp
or
# cd /opt/oracle/backup/dump
# chown oracle:dba expdp_data_manual.dmp
expdp_strct_manual.dmp
If Proxy Preferred IP address is configured in old EMS Solaris and if it is different from EMS IP
address, then you will be prompted to enter a new value for the Proxy Preferred IP address while
migrating to EMS Linux
# cd /opt/sonus/ems/conf/jumpstart
# ./emsMigrate.sh -m
Type y to restore the data (User Activity Logs, PM Stats and TrunkGroup Tables) or type n if you do not want
to restore the data and press ENTER.
7. The system displays the following after few minutes (Approximately 20 minute):
$ /opt/sonus/ems/sonusEms start
Reboot the system if the following error appears when you start Insight server after migration:
Failed to connect Error: Failed to get login token
This section provides information on the post-migration procedures that you need to perform the EMS standalone
Linux system.
Perform the following procedure to associate the nodes to the current EMS Linux Standalone system IP address:
4. Click OK.
The operation may take a longer time depending on the number of nodes. If there are any errors displayed on
the final screen at the end of the operation, then the nodes were not successfully discovered. You need to
perform a manual discovery of the nodes after determining the cause of the error. For more details, refer to
the Node discovery section of the Insight User Guide.
Disassociating the Device Nodes from the EMS Standalone Solaris System
1. Navigate to the Insight Administration screen, and click the General tab.
2. Select the Managed Device Association link.
3. Enter the old EMS IP in the IP Address field as shown below.
5. Click OK.
The operation may take a longer time to complete depending on the number of nodes.
If there are any errors displayed on the final screen at the end of the operation, then the nodes were not
successfully disassociated. You need to perform a manual configuration to remove the old IP address as the
trap destination.
After migrating data from one EMS server (A) to another EMS server (B), and after registering
Insight node B, you need to unregister Insight node A (which will show up registered as a result of
the migration)
If SGX4000 device is configured on pre-V09.01.00 Insight system, you have to perform the following procedure
during data migration from any pre-V09.01.00 Insight system to Insight V09.01.00.
1. Login to Insight.
2. Navigate to Network Mgmt > Insight Administration.
3. Select the registered SGX4000 node from the Navigation tree.
4. Modify and Update the following (default) values if required:
a. -SSH Port
b. -Login (CLI)
c. -Password (CLI)
d. Click on Update button and then click on Discover node.
Ensure that the source and target EMS Solaris standalone systems (Sun Netra 220 or 440 or T5220) are up
and running.
Download the migrationExport.sh script and EmsSolarisMigration.tar file from the Sonus
Salesforce portal.
Login as root to the EMS Solaris systems and copy the migrationExport.sh script and EmsSolarisMig
ration.tar file to the systems.
Change the file permission of migrationExport.sh to make the script executable using the following
command on source and target systems:
# chmod +x migrationExport.sh
Import Data to the source and target EMS Standalone DR Linux Systems.
Introduction
The EMS HA deployment consists of two EMS systems, configured to work as a high-availability setup. The benefit
of an EMS HA Deployment is, even when the Primary EMS server goes down, the Secondary EMS Server can
assume the role of Primary and continue providing the services without little or no downtime.
You may require a high availability provisioning infrastructure that is resilient to system failures. Sonus provides
such an infrastructure based on the EMS High Availability (HA) feature. The EMS HA feature is implemented
through the use of a pair of collocated HP DL380p G8 hardware platforms with a common IBM DS3524 RAID disk
array or IBM Storwize V3700 virtualizing RAID Storage system to store the EMS database, the Netcool DB, and
other reports. This architecture of Active system, Standby system, and RAID disk array is conceptually one logical
EMS. If the Active system fails, the Standby system automatically takes over with no manual intervention required.
The two systems which comprise the EMS have redundant LAN links between them that are used for inter-system
Keep-Alive communication and monitoring.
Table of Contents
Migrating Data from StorageTek or IBM DS3524 RAID to IBM 3700 RAID
Migrating Data from Sun Solaris with StorageTek RAID or IBM DS3524 to HP G8 on Linux with
IBM V3700 RAID
Migrating from IBM DS3524 RAID (HP G8 System on Linux) to IBM V3700 RAID
This section provides information on installing EMS HA system on Linux platform. This section also provides
information on configuring DR for EMS HA.
Configuring DR on EMS HA
Before you install the EMS software, review the following prerequisites:
# nslookup Prim1Sec2-scan
Server: 10.34.13.200
Address: 10.34.13.200#53
Name: Prim1Sec2-scan.datacenterlab.com
Address: 10.56.166.5
Name: Prim1Sec2-scan.datacenterlab.com
Address: 10.56.166.6
Name: Prim1Sec2-scan.datacenterlab.com
Address: 10.56.166.7
The host names of the EMS HA nodes should be distinct. Name of one node should not be a part of the
name of the other node. For example, do not name the nodes as 'ems' and 'ems2' (as first node name is a
subset of the name of second node). Instead, provide the hostname with first three letters indicating the
location (Westford), the next three letters indicating the product (EMS) and its identification number. a and b
denotes the system host name and its peer. For example, wfdems01a and wfdems01b.
Before you install EMS, use the Pre-Installation Checklist to write down your settings.
You can check off each task as you complete it and make notes in the Comments column below. Sonus
recommends that you make note of the parameter values that you need to enter during the installation process and
while configuring EMS.
All Public IP addresses except DNS IP and iLO IP should be configured in same subnet.
The configuration parameter examples depicted below are from the Sonus Test Lab environment and do
not portray the examples of a production environment.
Cluster Config
DNS Search The domain name to be used for resolving IP datacenternorth.com Yes
Path address.
SCAN The first IP address used by the Oracle SCAN 10.54.159.200 Yes
Listener IP (single client access name) listener.
Address 1
SCAN The third IP address used by the Oracle SCAN 10.54.159.202 Yes
Listener IP (single client access name) listener.
Address 3
Hostname The name which identifies this system on the wfdems01a Yes
network.
Public IP The IP address on the public network for this 10.54.159.100 Yes
Address node.
Public IPv6 The IPv6 address on the public network for this fd00:10:6b50:4020::56/61 No
Address node.
(Optional)
Hostname The name which identifies the system on the wfdems01b Yes
network.
Public IP The IP address on the public network for this 10.54.159.102 Yes
Address node.
Public IPv6 The IPv6 address on the public network for this fd00:10:6b50:4020::56/62 No
Address node.
(Optional)
Array The Array Controller A IP address for port 1 and 192.168.70.121 Yes
Controller A port 2 of IBM V3700 RAID.
IP
Array The Array Controller B IP address for port 1 and 192.168.70.122 Yes
Controller B port 2 of IBM V3700 RAID.
IP
Array The Array Controller A IP address for port 1 and 192.168.128.101 Yes
Controller A port 2 of IBM DS3524 RAID.
IP
Array The Array Controller B IP address for port 1 and 192.168.128.102 Yes
Controller B port 2 of IBM DS3524 RAID.
IP
The following summary outlines the key steps required to install EMS application for HA configuration.
Before proceeding with the EMS Application installation ensure the steps 1 to 5 to deploy both active and
standby HP DL380p Gen8 servers are completed.
Refer the Quick Start Summary section in the HP ProLiant DL380p Gen8 Server Quick Start.
For PDF version, download HP ProLiant DL380p Gen8 Server Quick Start PDF (550-06234).
Cabling is one of the most important aspects of planning for a HA configuration, this section guides you on cabling
the HP DL380p Gen8 servers with an external RAID.
Download and Prepare the Installation Files on both the HP DL380p Gen8 servers.
This step identifies the required installation files for download to the HP DL380p Gen8 server and how to prepare
the files for installation.
This step shows you how to install EMS application using the iLO remote console.
Synchronize the primary and secondary EMS server time with the NTP server.
This step is used to synchronize the EMS time with NTP server.
This step performs the RAID configuration and network bonding. It is executed on the primary EMS server.
Install Oracle Clusterware and EMS cluster application on the primary server.
This step installs Oracle clusterware and completes the installations of EMS cluster application. It is executed on
the primary EMS server.
Access the EMS GUI and Install EMS License using the License Manager utility in the EMS GUI.
This step is used to access the EMS GUI and install EMS licenses using License Manager.
Download the following files from the Sonus Salesforce Customer Portal to perform the Insight installation using an
ISO image.
Insight HA ISO Image: emsrac-V09.03.00R000-RHEL-06.04.02.00R00 1. Download the emsrac-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso file from the Sonus
0-x86_64.iso Salesforce Customer Portal.
2. Place the file in a location, from where you can mount the iso for Insight installation.
Firmware File: Refer the file name on this page: https://support.sonus.net/displ For more information about HP firmware version and procedure to upgrade the HP firmware, refer the
ay/ALLDOC/HP+DL380p+G8+Firmware+Upgrade page https://support.sonus.net/display/ALLDOC/HP+DL380p+G8+Firmware+Upgrade.
PSX Manager GUI File: SSGUI_V09.03.00R000_RHEL.tar Download the SSGUI_V09.03.00R000_RHEL.tar file from the Sonus Salesforce Customer Portal
to the local system.
Before installing the Insight HA application, you must run ntpdate on each server to provide the correct date. The
date changes while upgrading the iLO.
# ntpdate <NTP_SERVER>
24 Jun 10:27:55 ntpdate[2651]: adjust time server 10.128.254.67 offset
0.387661 sec
After updating the date on the server, download the pre-configured configuration file for the Insight HA
application.
You can install the Insight HA application using any one of the following methods:
Setting up a configuration file with all the required parameters. (This is the recommended method)
or
Running the script in the interactive mode.
On this page:
This section describes the procedure to install the Insight EMS HA Application on an HP DL380p G8 system using
the Insight EMS HA ISO Image provided by Sonus.
The Insight HA ISO image is available in the Sonus Salesforce Customer Portal. Download the ISO image and
mount the image using iLO and install the Insight HA software.
Installing RHEL OS
The ISO image installs the Operating System (Red Hat Enterprise Linux Server 6.4.2).
The rest of the installation can be launched after Insight HA installation is complete.
Perform the following procedure to kickstart the HP G8 servers on both the primary and non-primary servers:
1. To start the EMS installation we need to mount the ISO image using iLO of the HP Gen8 server.There are
two methods:
a. Using a Laptop physically connected to the HP Gen8 server through the iLO port
b. Using a PC or Laptop on the same network as the iLO
3. Type 1 and press ENTER to start the EMSRAC Install using Monitor and Keyboard or Remote Console.
5. After a few minutes, the following screen appears and you can view the various RPM packages getting
installed.
6. Unmount the virtual disk as CD ROM by selecting Virtual Drives and clear the Image File check box.
7. Use the Tab key to select Reboot button. After selecting Reboot button, press Space key to reboot the
system.
8. Press F1 to continue booting the system or it continues by itself after some time.
If you do not press any of the Function keys, by default, the system continues to boot normally.
9. When the system comes-up, you need to perform the network configuration. As part of Network
Configuration, you need to configure the Hostname, IP address for network interfaces, Time Zone, and Time
Server.
Select Hostname and press Space key configure the hostname for the system.
The EMS hostname is limited in length to 64 characters. The hostname can only contain lowercase
letters [a-z] and digits [0-9]. The hostname cannot start with a digit. Special characters including
hyphen are not allowed in hostname.
a. In the Host Configuration Screen, specify the Hostname, Primary DNS and DNS Search Path details.
Press Tab key to select OK button and press Space key to save the settings.
b. Use the Arrow keys to select IP Configuration and press Space key to configure ip address. Select
'eth0' interface for which you need to configure the IP Address. Use the Tab key to select OK button
and press Space key to configure IP address for eth0 network interface.
c. Specify the IP Address, subnet mask, and gateway IP Address for eth0 network interface. Use the Tab
key to move the cursor to other parameter. Press Tab key to select OK and press Space key to save
IP Address details.
d. Use the Arrow keys to select Time Zone and press Space key to configure the Time Zone. Select the
nearest Time Zone for the system and press Tab key to select OK and press Space to save the Time
Zone settings.
e. After configuring Time Zone, Sonus Network Configuration screen is displayed. Select Time Server
using arrow keys to configure the NTP Time server.
f. Enter the NTP Time-Server IP Address, to synchronize the time for the host system and click OK.
The EMS application installation starts and after completing EMS Installation, login screen is
displayed. The steps 11 to 19 are optional and performed if you want to change the boot priority. If
you do not want to change the boot priority, skip steps 11 to 19 and refer from step20 onwards.
12. Select the Standard Boot Order (IPL) option and press ENTER.
The boot order appears.
13. Select Hard Drive C: (See Boot Controller Order) and press ENTER.
The choices to change the boot order appears.
14. Select the Set the IPL Device Boot Order to 1 option and press ENTER.
The updated boot order appears. The highest priority is changed from USB to Hard Drive.
17. Press F10 to save the settings and exit from BIOS setup utility.
The system reboots from the hard disk.
18. After the system reboots, the following Red Hat Enterprise Linux Server 6.4 startup screen appears.
19. After the system reboots, the system will display a screen showing the installation proceeding for the Brocade
drivers for the Fibre Channel card.
Buffer I/O error on device sdc, logical block 0" error message might appear and you can ignore it.
This takes approximately 4 to 5 minutes, and then the system will reboot again.
20. The log in screen appears:
# cat /etc/os_version
06.04.02.00R000
24. Execute the following command to verify the platform Kernel version:
# uname -r
2.6.32-504.3.3.el6.x86_64
For Post-installation or Upgrade Tasks, see Performing Post-Installation or Upgrade Tasks page.
The RACinstall_1 script performs the network bonding and storage array configuration on the primary EMS
server (Node 1). You can run the RACinstall_1 script in an interactive mode or by providing an input configuration
file.
Sonus recommends you to use the input configuration template file instead of the interactive mode. For
details on filling-up the parameter values in the input configuration template, refer the section Pre-Installatio
n Checklist for EMS High Availability Configuration.
Perform any one of the following procedure based on the RAID array you are using:
Network Bonding and IBM V3700 RAID Array Configuration Network Bonding and IBM DS3524 RAID Array
Configuration
To configure network bonding and IBM V3700 RAID Array on the primary EMS server, perform any one of the
following procedure:
Executing RACinstall_1 Script using Input Configuration File for IBM V3700 RAID Array Executing RACinstall_1
Script in Interactive Mode for IBM V3700 RAID Array
Executing RACinstall_1 Script using Input Configuration File for IBM V3700 RAID Array
This section is relevant if you are executing the RACinstall_1 script using the input configuration file. The
RACinstall_1 script uses values set in the template configuration file thereby the script does not prompt you to
enter these values during the run time.
Topics inlcude:
Perform the following procedure to configure the input values in the configuration file:
# ls
4. Create a backup of rac.conf_3700.template file, for future reference. Run the following command, to
create a backup of rac.conf_3700.template.
# cp rac.conf_3700.template /tmp/rac.conf
5. Change the permission of the copied file to write, using the following command:
# chmod +w /tmp/rac.conf
6. Manually edit the rac.conf file and fill in the parameter values matching your network setup using the vi
Editor. To edit the file, execute the following command:
# vi rac.conf
# Populate with the NTP server
_ntpServer=
# Populate with the name of the primary node (where install is being done
from)
_node01=
# Populate with the shared IP address (IPv4) for this EMS cluster
sonusVIP.IPv4=
# Populate with the shared IP address (IPv6) for this EMS cluster
sonusVIP.IPv6=
_array_controllerB_IP=192.168.70.122
_array_management1_IP=192.168.70.120
_array_management2_IP=192.168.70.123
7. After updating the values, press ESC key and enter :wq! to save the configuration.
Prerequisites
Before running the installation scripts (./RACinstall_1), ensure that both the paths connected to the IBM
V3700 RAID are reachable. In case, if one of the paths connected to the IBM V3700 RAID is not reachable then
installation script exits prompting you to first check the fibre channel connections. For example, if a wrong cable
is connected to external RAID, the path might not be reachable and the following error message is displayed:
Error: One or more FC ports are down on node. Please check fibre
channel connections on node.
WORKAROUND: Fix the RAID connectivity issue and re-run the RACinstall_1 script.
# cd /export/home/pkg
# ./RACinstall_1 /tmp/rac.conf
Executing the RACinstall_1 command performs initialization of IBM V3700 RAID and also
creates volumes on the V3700 RAID.
After the script runs, both the primary and secondary server reboots.
Executing RACinstall_1 Script in Interactive Mode for IBM V3700 RAID Array
This section is applicable if you are executing the RACinstall_1 script in the interactive mode.
Prerequisites
Before running the installation scripts (./RACinstall_1), ensure that both the paths connected to IBM V3700
RAID are reachable. In case, if one of the paths connected to external RAID is not reachable then installation
script exits prompting you to first check the fibre channel connections. For example, if a wrong cable is
connected to external RAID, the path might not be reachable and the following error message is displayed:
Error: One or more FC ports are down on node. Please check fibre
channel connections on node.
WORKAROUND: Fix the RAID connectivity issue and re-run the RACinstall_1 script.
cd /export/home/pkg
# ./RACinstall_1
Press Enter to use the default value or enter the required value and press Enter to continue.
8. The following prompt appears:
Press Enter to use the default value or enter the required value and press Enter to continue.
9. The following prompt appears:
Press Enter to use the default value or enter the required value and press Enter to continue.
10. The following prompt appears:
Press Enter to use the default value or enter the required value and press Enter to continue.
11. The following prompt appears:
Enter the NTP server IP. For example, 10.128.1.1 and then press Enter to continue.
12. The following prompt appears:
Enter the node 1 hostname. For example, emshost1 and then press Enter to continue.
13. The following prompt appears:
Enter the node 1 public IP. For example, 10.2.2.2 and then press Enter to continue.
14. The following prompt appears:
Enter the node 1 public VIP. For example, 10.2.2.3 and then press Enter to continue.
15. The following prompt appears:
Enter the node 2 public IP. For example, 10.2.2.4 and then press Enter to continue.
18. The following prompt appears:
Enter the node 2 public VIP. For example, 10.2.2.5 and then press Enter to continue.
19. The following prompt appears:
Press Enter to use the default value or enter the required value and press Enter to continue.
The following message appears:
Executing /export/home/pkg/EMSbuild_config...... .
Enter the Shared Virtual EMS VIP. For example, 10.2.2.6 and then press Enter to continue
21. The following message appears if you want to enable or disable IPv6.
22. If you want to disable IPv6, enter (false) and then press Enter to continue.
Or
23. If you want to enable IPv6, enter (true) and then press Enter to continue.
The following prompt appears:
Enter the node 1 public IPv6 address. For example, fd00:10:6b50:53a0::bf/60 then press Enter to continue.
24. The following prompt appears:
Enter the node 2 public IPv6 address. For example, fd00:10:6b50:53a0::c1/60 and then press Enter to
continue.
25. The following prompt appears:
Enter the Public IPv6 Gateway address. For example, fd00:10:6b50:53a0::1 and then press Enter to
continue.
26. The following prompt appears:
Enter the Shared Virtual EMS IPv6 VIP address. For example, fd00:10:6b50:53a0::ca/60 and then press
Enter to continue.
The output displayed is similar in both the interactive and non-interactive mode.
If the script prompts for the RAID password after the following outputs, please enter the pre-existing
RAID password.
27. After the script runs, both the primary and secondary server reboots.
To configure network bonding and IBM DS3524 RAID Array on the primary EMS server, perform any one of the
following procedure:
Configuring IBM DS3524 Storage Subsystem Controller IP Address Executing RACinstall_1 Script using Input
Configuration File for IBM DS3524 RAID Array Executing RACinstall_1 Script in Interactive Mode for IBM DS3524
RAID Array
If you are not using the default values for private IP addresses, then you need to configure the IBM RAID
controller IP address.
The IBM DS3524 storage subsystem has two controllers that are hot-swappable and redundant. The controllers
contain the storage subsystem control logic, interface ports, and LEDs.
The two SAS 2.0 host ports are not used in the EMS HA solution.
Two SAS 2.0 host ports labeled 1 and 2. Each of them are x4 multilane, 6 Gbps universal
mini-SAS ports.
Two Ethernet management ports labeled 1 and 2 for Out-Of-Band management
The port (2) on the extreme right is a x4 multilane mini-SAS port for connecting to
EXP3524 drive expansion enclosures
Four Fibre Channel ports labeled FC 3 through 6. Each of these ports is capable of
operating at 8 Gbps, 4 Gbps, or 2 Gbps.
Perform the following steps to install the Storage Manager for DS 3524:
# cd /opt/sonus/platform/IBMDS3524_FW07864000_SM1086X543/
# ./INSTSM1086X543
3. Start the X-server (such as Exceed) on the system where the GUI is to be launched.
4. Set the DISPLAY variable's IP address to the IP address of the machine where the GUI should be launched
using the following commands:
DISPLAY=<IP Address>:0.0
export DISPLAY
echo $DISPLAY
Where <IP Address> is the IP of the machine where the GUI need to be launched.
5. Login as root to the HP DL380p G8 server which is connected to the same Hub/Switch and go to the
/opt/IBM_DS/client directory:
# cd /opt/IBM_DS/client
# ./SMclient
The Enterprise Management Window can take up to a minute to refresh after an initial automatic
discovery.
10. In the Subsystem Management window, right-click the discovered storage subsystem to see the context
menu with the tasks.
The IP address of IBM RAID storage system controller can be configured through the following windows
configuration tool. The software is packaged along with the EMS and is available in the directory
/opt/sonus/platform/IBMDS3524_FW07832700_SM1083X523 on the EMS server.
3. After the installation preparation, the IBM System Storage DS Storage Manager screen appears. Select the
language as ‘English’ from the drop-down box and click OK.
The IBM System Storage DS Storage Manager configuration process starts up as shown in the following
figure.
7. Read the License Agreement and select I accept the terms of the License Agreement, then Click Next to
continue.
8. The default path of installation is displayed. Click Choose to select the installation folder as you required, the
click Next to continue.
9. Select the installation type as Typical (Full Installation) and click Next to continue.
10. Select the Automatically Start Monitor (Recommended) option to start monitoring automatically after
installation and click Next to continue.
11. The IBM System Storage DS Storage Manager installation specifications getting configured on the system.
Click Next to continue.
12. Verify that sufficient disk space is present and click Install.
13. The IBM System Storage DS Storage Manager 10 installation process is displayed as shown below.
After the initial automatic discovery is completed, the device tab of Enterprise Management window displays
all hosts and storage subsystems attached to the local subnetwork.
The Enterprise Management window can take up to a minute to refresh after an initial automatic
discovery.
17. In the Subsystem Management window, right-click the discovered storage subsystem to see the context
menu with this tasks.
Select the Manage Storage Subsystem task.
18. When you choose to manage a specific storage subsystem, the IBM System Storage DS (Subsystem
Management) window appears along with the Initial Setup Task on background and a small window prompts
for the password.
Enter the password for subsystem.
19. In the IBM System Storage DS (Subsystem Management) window, click the Configure Ethernet Management
Ports link from the Optional Task list.
The Change Network Configuration screen appears:
The default port IP address for controller A is:
192.168.128.101 - Port1
The default port IP address for controller B is:
192.168.128.102 - Port2
20. In the Change Network Configuration screen, change the default Port IP address to your local IP address.
21. Close the DS Storage Manager 10 Client.
Executing RACinstall_1 Script using Input Configuration File for IBM DS3524 RAID Array
This section is relevant if you are executing the RACinstall_1 script using the input configuration file. The
Perform the following procedure to configure the input values in the configuration file:
# ls
4. Create a backup of rac.conf_3524.template file, for future reference. Run the following command, to
create a backup of rac.conf_3524.template.
# cp rac.conf_3524.template /tmp/rac.conf
5. Change the permission of the copied file to write, using the following command:
# chmod +w /tmp/rac.conf
6. Manually edit the rac.conf file and fill in the parameter values matching your network setup using the vi
Editor. Edit the configuration file by executing the following command:
# vi rac.conf
# Populate with the name of the primary node (where install is being done
from)
_node01=
# Populate with the shared IP address (IPv4) for this EMS cluster
sonusVIP.IPv4=
# Populate with the shared IP address (IPv6) for this EMS cluster
sonusVIP.IPv6=
7. After updating the values, press ESC key and enter :wq! to save the configuration.
Prerequisites
Before running the installation scripts (./RACinstall_1), ensure that both the paths connected to the IBM
DS3524 RAID are reachable. In case, if one of the paths connected to external RAID is not reachable then
installation script exits prompting you to first check the fibre channel connections. For example, if a wrong cable
is connected to external RAID, the path might not be reachable and the following error message is displayed:
Error: One or more FC ports are down on node. Please check fibre
channel connections on node.
WORKAROUND: Fix the RAID connectivity issue and re-run the RACinstall_1 script.
# cd /export/home/pkg
# ./RACinstall_1 /tmp/rac.conf
If the script prompts for the RAID password, please enter the pre-existing RAID password.
After the script runs, both the primary and secondary server reboots.
Executing RACinstall_1 Script in Interactive Mode for IBM DS3524 RAID Array
This section is applicable if you are executing the RACinstall_1 script in the interactive mode.
Prerequisites
Before running the installation scripts (./RACinstall_1), ensure that both the paths connected to IBM DS3524
are reachable. In case, if one of the paths connected to external RAID is not reachable then installation script
exits prompting you to first check the fibre channel connections. For example, if a wrong cable is connected to
external RAID, the path might not be reachable and the following error message is displayed:
Error: One or more FC ports are down on node. Please check fibre
channel connections on node.
WORKAROUND: Fix the RAID connectivity issue and re-run the RACinstall_1 script.
1.
cd /export/home/pkg
# ./RACinstall_1
Press Enter to use the default value or enter the required value and press Enter to continue.
9.
Enter the NTP server IP. For example, 10.128.1.1 and then press Enter to continue.
10. The following prompt appears:
Enter the node 1 hostname. For example, emshost1 and then press Enter to continue.
11. The following prompt appears:
Enter the node 1 public IP. For example, 10.2.2.2 and then press Enter to continue.
12. The following prompt appears:
Press Enter to use the default value or enter the required value and press Enter to continue.
14. The following prompt appears:
Enter the node 2 hostname. For example, emshost2 and then press Enter to continue.
15. The following prompt appears:
Enter the node 2 public IP. For example, 10.2.2.4 and then press Enter to continue.
16. The following prompt appears:
Enter the node 2 public VIP. For example, 10.2.2.5 and then press Enter to continue.
17. The following prompt appears:
Press Enter to use the default value or enter the required value and press Enter to continue.
The following message appears:
Executing /export/home/pkg/EMSbuild_config...... .
Enter the Shared Virtual EMS VIP. For example, 10.2.2.6 and then press Enter to continue
19. The following message appears if you want to enable or disable IPv6
20. If you want to disable IPv6, enter (false) and then press Enter to continue.
Or
21. If you want to enable IPv6, enter (true) and then press Enter to continue.
The following prompt appears:
Enter the node 1 public IPv6 address. For example, fd00:10:6b50:53a0::bf/60 then press Enter to continue.
22. The following prompt appears:
Enter the node 2 public IPv6 address. For example, fd00:10:6b50:53a0::c1/60 and then press Enter to
continue.
23. The following prompt appears:
Enter the Public IPv6 Gateway address. For example, fd00:10:6b50:53a0::1 and then press Enter to
continue.
24. The following prompt appears:
Enter the Shared Virtual EMS IPv6 VIP address. For example, fd00:10:6b50:53a0::ca/60 and then press
Enter to continue.
The output displayed is similar in both the interactive and non-interactive mode.
If the script prompts for the RAID password after the following outputs, please enter the pre-existing
RAID password.
25. After the script completes, both the primary and secondary server reboots.
Perform the following procedure to install Oracle Clusterware and EMS Application on the primary server.
Ignore the following errors, unless DB Instance creation fails. The following errors are seen on trace/alert
log files which is present under:
$ORACLE_BASE/admin/SIDB/udump/diag/rdbms/<ORACLE_SERVICE_NAME>/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
The cluster name must be at least one character long and no more than 15 characters in length, must be
alphanumeric, and may contain hyphens.
To view the progress of the installation, open another session and view latest log files at /var/sadm/inst
all/logs
1.
# nslookup Prim1Sec2-scan
Server: 10.34.13.200
Address: 10.34.13.200#53
Name: Prim1Sec2-scan.datacenterlab.com
Address: 10.56.166.5
Name: Prim1Sec2-scan.datacenterlab.com
Address: 10.56.166.6
Name: Prim1Sec2-scan.datacenterlab.com
Address: 10.56.166.7
# cd /export/home/pkg
# ./EMSRACinstall
The following messages on GRID and RDMS will appear for a long time and it takes an hour to complete.
The following message on calling schema will appear for a long time:
The following message on Installing EMS will appear for a long time:
The following message on remote installation will appear for a long time:
5. All the Insight processes are automatically started as part of the installation.
6. The Insight HA installation is complete.
7. Execute the following command to verify the EMS Application version:
SONSems-V09.03.00-R000.x86_64
8. Login as oracle user and execute following command to verify Oracle database version:
$ sqlplus -version
SQL*Plus: Release 11.2.0.3.0 Production
Oracle patch version must be Patch description: "Database Patch Set Update : 11.2.0.3.0 (19271438)"
Each script in the installation sequence generates its own log. The installation log files are found on the
primary node at /var/sadm/install/logs.If there are errors during the installation, refer to RACinstal
l_1.<id>.log and RACinstall_2.<id>.log and EMSinstall.<id>.log.The DB installation log
files are located at /opt/oracle/orasql/SIDB01 on the primary node.
For more detail about latest IBM V3700 RAID firmware version and how to perform firmware upgrade, refer the
section IBM Storwize V3700 Firmware Upgrade Quick Start.
You need to select an NTP server for your network. The installation process requires only one NTP server.
However, it is recommended that you add a second NTP server after you complete the installation process. The
second server acts as a backup server, in case the primary NTP server goes down.
You must add a second NTP server only after the installation is complete.
Perform the following procedure to install the latest PSX Manager GUI:
If the PSX Manager GUI version is not the latest then download the respective release PSX
Manager GUI TAR file (SSGUI_<Version>_RHEL.tar) and execute upgrade steps from Step 3 on
wards.
# su - insight
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS stopAll
# mkdir -p /opt/sonus/install/
7. Download the SSGUI_V09.03.00R000_RHEL.tar file from Sonus SalesForce Customer portal to local
system.
8. Copy the SSGUI_V09.03.00R000_RHEL.tar file from the local system to the /opt/sonus/install/
directory on the EMS server.
9. Change to the /opt/sonus/install/ directory using the following command:
# cd /opt/sonus/install/
# cd /opt/sonus/install/SSGUI
12. Execute the GuiClient.sh script as a super root user. The GuiClient.sh script installs the SONSpsx
package at the default installation folder.
# ./GuiClient.sh
If, a prior version of PSX Manager GUI exists a confirmation message to remove the existing version is
displayed. Enter y to uninstall the prior version and install the latest version of PSX Manager GUI.
SONSems-V09.03.00-R000.x86_64
/opt/sonus/ems/weblogic/insight/deploy/insight.ear/emsGui.war/external
SONSpsx-V09.02.00-R000.x86_64
The following message is displayed after uninstalling the previous PSX Manager GUI and installing the latest
PSX Manager GUI version.
Removing SONSpsx.
Installing SONSpsx.
Preparing... ########################################### [100%]
1:SONSpsx ########################################### [100%]
13. Verify that the SONSpsx package is installed, by executing the following command:
15.
# su - insight
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS startAll
17. Login to the EMS GUI on the EMS Primary and Secondary systems.
18. Click the Insight Administration icon on the left pane of the EMS GUI.
19. Click the General tab and select PSX Policy Server > PSX Manager Versions on the left bottom pane.
20. Click the Reload button to integrate the new PSX Manager version to Insight EMS server.
21. Access the PSX Manager GUI by clicking on Element Mgmnt > PSX Manager icon on the left pane.
If you are upgrading EMS SWe for KVM or VMware ESXi, upgrading iLO is not required. Upgrading iLO
firmware is applicable only for EMS physical server-based upgrade.
The iLO 4 firmware version running on your EMS system may require an update.
To know the iLO firmware version running on your EMS system and update the iLO firmware to the latest version,
do the following:
If the HP Firmware version is the not the latest then upgrade the HP Firmware to the latest version,
by performing the following steps.
4. Upgrade HP Firmware on non-primary (automatically reboots). For upgrading firmware, refer HP DL380p G8
Firmware Upgrade.
5. Relocate EMS (making non-primary active).
6. As user root, enter the following command on the primary server, which is active:
# cd /opt/sonus/ems/conf/HA/RAC
# ./sonusEMS relocate
7. Upgrade HP Firmware on primary (automatically reboots). For upgrading firmware, refer HP DL380p G8
Firmware Upgrade.
8. Relocate EMS by making primary as active.
9. As user root, enter the following command on the non-primary server, which is active:
# cd /opt/sonus/ems/conf/HA/RAC
# ./sonusEMS relocate
If you are upgrading EMS SWe for KVM or VMware ESXi, upgrading IBM V3700 RAID firmware is not
required. Upgrading IBM V3700 firmware is applicable only for EMS HA physical server-based upgrade.
Verify if the IBM V3700 firmware is the latest version. For IBM V3700 Firmware latest version and procedure to
upgrade the Firmware, refer the page IBM Storwize V3700 Firmware Upgrade Quick Start.
Installing EMS V09.03.00 removes the previous device manager (DM) on the system, if it was installed earlier. After
installing EMS 9.3.0, install the respective DM supported for EMS 9.3.0. For more information on Device Manager,
see the SBC Manager section of the Insight User Guide. For more information on installing or upgrading Device
Manager, refer Installing and Upgrading Device Manager (DM).
Configuring DR on EMS HA
The following summary outlines the key steps required to install EMS application for HA configuration.
Before proceeding with the EMS Application installation ensure the steps 1 to 5 to deploy both active and
standby HP DL380p Gen8 servers are completed.
Refer the Quick Start Summary section in the HP ProLiant DL380p Gen8 Server Quick Start.
For PDF version, download HP ProLiant DL380p Gen8 Server Quick Start PDF (550-06234).
Cabling is one of the most important aspects of planning for a HA configuration, this section guides you on cabling
the HP DL380p Gen8 servers with an external RAID.
If you are using IBM DS3524 storage array, configure the RAID controller IP address.
Download and Prepare the Installation Files on both the HP DL380p Gen8 servers.
This step identifies the required installation files for download to the HP DL380p Gen8 server and how to prepare
the files for installation.
Install EMS application using iLO remote console on both the HP DL380p Gen8 servers.
This step shows you how to install EMS application using the iLO remote console.
This step is used to synchronize the EMS time with NTP server.
This step performs the RAID configuration and network bonding. It is executed on the primary EMS server.
Install Oracle Clusterware and EMS cluster application on the primary server.
This step installs Oracle clusterware and completes the installations of EMS cluster application. It is executed on
the primary EMS server.
Access the EMS GUI and Install EMS License using the License Manager utility in the EMS GUI.
This step is used to access the EMS GUI and install EMS licenses using License Manager.
This step is used to setup the DR connectivity between the source and target DR sites. It is executed on the
source DR site.
This section provides information on setting up DR on EMS source High-Availability (HA) system.
The EMS HA installation should be completed on both the Source and Target systems.
The EMS should be running on the Source and Target systems.
Both the Target EMS systems should be accessible from the Source EMS systems, and
vice versa.
# cd /opt/sonus/ems/conf/DR
# ./manageDR setup
3. A confirmation message to setup DR is displayed. Press y when the following prompt appears:
4. Enter the Target EMS primary system IP address when the following prompt appears:
"Please specify the IPv4 Address of Node 1 of the remote DR TARGET cluster"
The DR Setup configures the source and target EMS systems for replication, backs up the database in the
source system, restores it on the target system, and initiates the replication process.
# cd /opt/sonus/ems/conf/DR
# ./manageDR status
This section provides information on upgrading HA EMS system on Linux platform. Moreover, this section provides
information for upgrading EMS HA for a DR configuration.
Post-Upgrade Steps
Rollback EMS HA
In this section:
For upgrading from an earlier EMS release to EMS 09.03.00R000, you need to perform the upgrade using the EMS
ISO image. The EMS ISO upgrade method enables you to upgrade the operating system and database apart from
upgrading the EMS application software.
Also, for upgrading from EMS 09.03.00R000 to a post-09.03.00 EMS minor or patch release, use the EMS ISO
upgrade method. For example, for upgrading from EMS V09.03.00 to EMS V09.03.01, use the ISO upgrade method.
The ISO upgrade method performs an upgrade of EMS Application, Linux OS (if needed), Oracle database
(if needed) and Oracle security patch updates (if needed) for EMS HA or EMS HA DR configuration.
For upgrading from an earlier EMS release to EMS 09.03.00R000, you need to perform the upgrade using the EMS
ISO image emsrac-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso available in WL9.3 Software
Bundle the Sonus Salesforce Customer Portal. The EMS ISO image includes Linux Operating System, EMS
application, and EMS database packages. For EMS HA upgrade, only INPLACE upgrade type is applicable.
The INPLACE upgrade type enables you to upgrade the EMS software application, operating system, and
database to the latest release versions. The benefit of INPLACE upgrade type is that it upgrades the OS, database
and EMS application without reinstalling them.
You may need to plan a longer upgrade maintenance window, if you are upgrading from earlier EMS
releases such as V08.04.07R000 to V09.03.00. The EMS upgrade takes longer depending on the number
of rows in the IPTRUNKGROUPINTERVALSTATS table. Sonus recommends to reorder the columns in
the IPTRUNKGROUPINTERVALSTATS table in a maintenance window prior to upgrading EMS. For more
information, contact Sonus Customer Support.
The following are prerequisites for upgrading Insight EMS HA deployment or EMS DR site with HA servers from
software release 9.1.x to 9.3.x are as follows:
Upgrade operation is not supported with the changed netcool object server name. To perform an upgrade,
you need to first rollback to default netcool object server name “SONUSDB”. For changing the netcool object
server name, refer Changing Netcool DB Object Server Name for EMS HA.
Backup data and copy it to a remote system, before performing an EMS HA Upgrade. System backup is
critical and can be used, if EMS upgrade fails to restore the data. For more information on how to backup,
refer the section System backup.
Both the primary and the secondary servers must be Up and Running.
You can check the current status of both the primary and secondary servers, using the /opt/sonus
/ems/conf/HA/RAC/sonusEMS status command.
Both the primary and secondary servers are installed with Insight EMS software release 9.1.x.
You have read the latest Sonus Insight release notes for important information.
You should be aware of the Insight account and default passwords.
# rm -rf /opt/emsInstall/<Previous-Release-Directory>
For Example:
# rm -rf /opt/emsInstall/9.2
# rm -rf /opt/emsInstall/9.1
You have terminal access to the servers on which you are upgrading the Insight.
The primary and non-primary servers meet the minimum hardware requirements.
Ensure that Active EMS must be running on the Primary EMS server, prior to the EMS upgrade procedure.
In case primary is not Active, switchover needs to be done using sonusEMS relocate command.
Do not execute the EMS upgrade procedure on a SSH window where it is connected through the Cluster
virtual or logical IP address.
Login through the physical IP address on EMS interface eth0.
The EMS upgrade procedure must be executed as superuser "root".
System Backup
Before upgrading EMS HA, backup EMS data and copy it to remote server. Backup of data is needed in case if EMS
upgrade fails.
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the EMS machine. Use a directory name that will
clearly identify the EMS server that created the backup files. Make a note of the directory path because you
will need it later if you need to restore the system. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of backupFiles.tar anddmp files in the backup directory. Copy the
backup files to a remote server, which enables restore of data later in case if EMS upgrade fails.
Files to be Downloaded
The following table provides list of files to be downloaded for ISO upgrade:
emsrac-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso
upgradeEMS.sh
Firmware File
# rm -rf /opt/emsInstall/<Previous-Release-Directory>
For Example:
# rm -rf /opt/emsInstall/9.2
# rm -rf /opt/emsInstall/9.1
1. Login to Salesforce customer portal using your Sonus provided login, and click SOFTWARE DOWNLOADS.
2. Click software bundle WL9.3 to view its contents, and then click Request Download.
3. Fill in the Software Download Form, accept the license agreement and click Submit.
4. When the "Request Status" on the SOFTWARE REQUESTS page displays "Download Available", click the
links in the WL9.3 software bundle.
The ISO file Perform the following steps to download emsrac-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso and upgr
emsrac-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso adeEMS.sh files:
contains the EMS 9.3.0 application, OS, and database
updates. The ISO file must be stored in the same path
Enter the <NEW_EMS_VERSION> directory name as the EMS release number to which you
where upgradeEMS.sh script is downloaded.
are upgrading. For example, to upgrade to 9.3 release, instead of <NEW_EMS_VERSION> s
The upgradeEMS.sh file is a script which is required to
pecify 9.3 as directory name. The directory <NEW_EMS_VERSION> where you are
perform ISO upgrade. The upgradeEMS.sh file performs all
downloading the file, must be empty and must not contain other files. Ensure that the
the necessary tasks such as system checks, create backup
directory allows any user to read and execute the files and has enough space for
of configuration, upgrade OS, Database and EMS
extracting Insight upgrade files.
Application.
# mkdir -p /opt/emsInstall/<NEW_EMS_VERSION>/
# mkdir -p /opt/emsInstall/9.3/
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
5. Change the execute permission of upgradeEMS.sh file by executing the following command:
# chmod +x upgradeEMS.sh
Firmware Upgrade
Download the HP firmware file and verify if the HP firmware version is the latest. For more information about
HP firmware latest version and procedure to upgrade the HP firmware, refer the page https://support.sonus.
net/display/ALLDOC/HP+DL380p+G8+Firmware+Upgrade.
If you are upgrading EMS SWe for KVM, upgrading iLO is not required. Upgrading iLO firmware is
applicable only for EMS physical server-based upgrade.
This is the HP G8 DL380 firmware upgrade file. Ensure that the HP DL380 G8 firmware is upgraded after Download the firmware file from Salesforce Customer Portal to: /opt/sonus/p
you perform the EMS Software upgrade. latform directory in the server.
This step identifies the required upgrade files for download to the EMS primary server and how to prepare the files
for upgrade.
This step is used to manually backup EMS database and configuration on a regular basis.
This step is used to set the backup related parameter values in the upgrade template configuration file.
This step details the procedure to perform an ISO upgrade on the EMS primary server.
This step shows the post-upgrade mandatory tasks, after EMS upgrade is successful.
The EMS Secondary server is first upgraded followed by EMS Primary server. If the value set for _ems_bac
kup is true then backup is taken prior to upgrade on the EMS Primary server at the path /opt/oracle/
backup/dmp. In case the upgrade on secondary EMS fails, the upgrade process exits. The EMS Primary
server provides continued service without any downtime. Restore the backup files stored at the path /opt/
oracle/backup/dmp on the secondary server and retry the upgrade procedure.
If EMS HA Upgrade fails and both the primary and secondary servers are unstable, you can perform a fresh
EMS installation and restore the backup taken earlier. For more information, on how to kickstart EMS and
restore previous stable configuration refer Rollback EMS HA .
The ems_upgrade.conf file is auto-generated and is used while upgrading EMS. The ems_upgrade.conf file
has a list of properties, which primarily designate backup and upgrade related parameters. Based on your
requirement, you can edit the properties defined in the ems_upgrade.conf file using the vi editor. The following
table provides usage and significance of each property in the ems_upgrade.conf file.
If _ems_backup is set to ‘false’, database backup is not generated. Sonus recommends to retain the _em
s_backup default value to ‘true’ so that Database backup is taken and DB can be restored, if the upgrade
fails. The backup files are generated at the path /opt/oracle/backup/dmp on the EMS primary server.
_ems_backup true Indicates whether you want to take the backup of EMS database and
configuration. The default value is true, however, if you do not want to take
backup, change the value of _ems_backup to false.
_ems_pmstats_table_backup true Indicates, if backup of PM stats tables is required or not. Change it to false, if
backup of PM Stats table is not required.
Upgrade Procedure
Increasing ASM Partition Size (Optional)
Upgrade Procedure
Total time for upgrading both the primary and secondary servers using ISO upgrade is approximately 40 to
45 minutes.
The following steps are executed only on the EMS Primary Server that is Active. To upgrade the EMS HA using an
ISO file, perform the following steps:
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under:
$ORACLE_BASE/admin/SIDB/udump/diag/rdbms/<ORACLE_SERVICE_NAME>/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
1. Log in as a root user to the Insight EMS Primary server that is Active.
2. Change the directory to the path where the
emsrac-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso and upgradeEMS.sh files have been
copied.
3. After downloading the file upgradeEMS.sh, login as ‘root’ user and change the permission of
upgradeEMS.sh using the following command:
# chmod +x upgradeEMS.sh
4. INPLACE upgrade can be done using the default settings or by configuring the ems_upgrade.conf file.
The standby server is first upgraded and rebooted and then the active server is upgraded.
a. After reboot, when the primary server is up, login as root user and verify that EMS has been
upgraded to version 9.3.x, by executing the following command:
b. On the secondary server, verify that the EMS software has been upgraded to 9.3.x, by executing the
following command:
After the upgrade is performed successfully on both the primary and secondary servers, the
original active server would be standby and the original standby server would be active. To
revert to the original state, execute the command /opt/sonus/ems/conf/HA/RAC/sonu
sEMS relocate.
The above procedure completes the default upgrade process for both the active and standby servers
for a EMS HA deployment.
6. To change the default EMS upgrade and backup configuration, perform the following:
# ./upgradeEMS.sh -g /opt/emsInstall/<NEW_EMS_VERSION/ems_upgrade.conf
b. Once the configuration file is generated, you can edit the parameters in the ems_upgrade.conf file
using the vi editor. The ems_upgrade.conf file contains comments that guides you in editing the
upgrade/backup parameter values.
# vi ems_upgrade.conf
If the upgrade is not successful, then you can revert back to the previous EMS release. For more
information, see Rollback EMS HA.
The standby server is first upgraded and rebooted and then the active server is upgraded.
8. After reboot, when the primary server is up, login as root user and verify that EMS has been upgraded to
version 9.3.x, by executing the following command:
9. On the secondary server, verify that the EMS software has been upgraded to 9.3.x, by executing the following
command:
10. Perform the following steps to verify if database and kernel have been updated:
a. Execute the following command to verify the platform version:
# cat /etc/os_version
06.04.02.00R000
# uname -r
2.6.32-504.3.3.el6.x86_64
c. Login as oracle user and execute following command to verify Oracle database version:
$ sqlplus -version
SQL*Plus: Release 11.2.0.3.0 Production
d. Login as oracle user and execute following command to verify the latest Oracle database patch
version:
Oracle patch version must be Patch description: "Database Patch Set Update : 11.2.0.3.0
(19271438)"
After the upgrade is performed successfully on both the primary and secondary servers, the original
active server would be standby and the original standby server would be active. To revert to the
original state, execute the command /opt/sonus/ems/conf/HA/RAC/sonusEMS relocate.
The above procedure completes the upgrade process using the upgrade configuration file for both the active
In case, the database size is not sufficient, you can increase the DB size using the ASM Partition mechanism.
Increasing the ASM partition size is an optional procedure and increasing the DB size is dependent on insufficient
DB space.
Increasing ASM Partition Size is optional and is applicable only for IBM DS3524 RAID. To check the ASM
Partition free space, execute the command:
# fdisk -l /dev/mapper/asm_device
Caution
If you have sufficient DB space available, there is no need to execute the ./ASMPartition script.
If you do not have sufficient DB space, you can increase the DB size, by executing the following
# cd /export/home/pkg
3. Assign the privilege to execute the ./ASMPartition script on both the active and standby server, using the
following command:
# chmod +x ASMPartition
4. Execute the ./ASMPartition command on the active server to increase the DB size. Execute the
command ./ASMPartition from the active server.
# ./ASMPartition
Executing the ./ASMPartition script, takes substantial time to complete. Please wait for the
script to complete execution. Executing the ./ASMPartition command automatically reboots both
the servers.
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
The following summary outlines the key steps required to upgrading EMS application for EMS HA DR configuration.
Download and prepare the upgrade files on the source and target EMS HA systems.
This step identifies the required upgrade files to be download to the HP DL380p Gen8 servers and how to prepare
the files for upgrade.
Manual Backup EMS Data on the source and target EMS HA systems.
a. Perform INPLACE ISO upgrade procedure on the DR source primary EMS system.
b. After completing the DR Source site upgrade, perform INPLACE ISO upgrade procedure on the DR
target primary EMS system.
If EMS HA upgrade fails at the source DR site, you must manually perform a
failover at Target DR site to function as the new source for DR site. Execute the
command 'manageDR failover' on the active system of Target site, to
perform failover and allow Target to function as the new Source of DR site. For
more details about failover, refer the section Failover.
Perform the mandatory post-upgrade tasks on the source and target EMS HA systems.
This step shows the post-upgrade mandatory tasks that need to be performed after EMS upgrade is successful.
If EMS HA Upgrade fails and both the primary and secondary servers are unstable, you can perform a fresh
EMS installation and restore the backup taken earlier. For more information, on how to kickstart EMS and
restore previous stable configuration refer Rollback EMS HA.
Post-Upgrade Steps
This section covers the following topics:
For password related information, refer the section Managing Insight Account Names and Passwords".
The changed password is by default valid for 90 days. If you want to extend the password change duration,
modify the parameter PASS_MAX_DAYS 90 to PASS_MAX_DAYS 99999 in /etc/login.defs file,
using the vi editor.
You need to select an NTP server for your network. The installation process requires only one NTP server.
However, it is recommended that you add a second NTP server after you complete the installation process. The
second server acts as a backup server, in case the primary NTP server goes down.
You must add a second NTP server only after the installation is complete.
Perform the following procedure to install the latest PSX Manager GUI:
If the PSX Manager GUI version is not the latest then download the respective release PSX
Manager GUI TAR file (SSGUI_<Version>_RHEL.tar) and execute upgrade steps from Step 3 on
wards.
# su - insight
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS stopAll
# mkdir -p /opt/sonus/install/
7. Download the SSGUI_V09.03.00R000_RHEL.tar file from Sonus SalesForce Customer portal to local
system.
8. Copy the SSGUI_V09.03.00R000_RHEL.tar file from the local system to the /opt/sonus/install/
directory on the EMS server.
9. Change to the /opt/sonus/install/ directory using the following command:
# cd /opt/sonus/install/
12. Execute the GuiClient.sh script as a super root user. The GuiClient.sh script installs the SONSpsx
package at the default installation folder.
# ./GuiClient.sh
If, a prior version of PSX Manager GUI exists a confirmation message to remove the existing version is
displayed. Enter y to uninstall the prior version and install the latest version of PSX Manager GUI.
SONSems-V09.03.00-R000.x86_64
/opt/sonus/ems/weblogic/insight/deploy/insight.ear/emsGui.war/external
SONSpsx-V09.02.00-R000.x86_64
The following message is displayed after uninstalling the previous PSX Manager GUI and installing the latest
PSX Manager GUI version.
Removing SONSpsx.
Installing SONSpsx.
Preparing... ########################################### [100%]
1:SONSpsx ########################################### [100%]
13. Verify that the SONSpsx package is installed, by executing the following command:
# su - insight
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS startAll
17. Login to the EMS GUI on the EMS Primary and Secondary systems.
18. Click the Insight Administration icon on the left pane of the EMS GUI.
19. Click the General tab and select PSX Policy Server > PSX Manager Versions on the left bottom pane.
20.
The iLO 4 firmware version running on your EMS system may require an update.
To know the iLO firmware version running on your EMS system and update the iLO firmware to the latest version,
do the following:
If the HP Firmware version is the not the latest then upgrade the HP Firmware to the latest version,
by performing the following steps.
4. Upgrade HP Firmware on non-primary (automatically reboots). For upgrading firmware, refer HP DL380p G8
Firmware Upgrade.
5. Relocate EMS (making non-primary active).
6. As user root, enter the following command on the primary server, which is active:
# cd /opt/sonus/ems/conf/HA/RAC
# ./sonusEMS relocate
7. Upgrade HP Firmware on primary (automatically reboots). For upgrading firmware, refer HP DL380p G8
Firmware Upgrade.
8. Relocate EMS by making primary as active.
9. As user root, enter the following command on the non-primary server, which is active:
# cd /opt/sonus/ems/conf/HA/RAC
# ./sonusEMS relocate
If you are upgrading EMS SWe for KVM or VMware ESXi, upgrading IBM V3700 RAID firmware is not
required. Upgrading IBM V3700 firmware is applicable only for EMS HA physical server-based upgrade.
Verify if the IBM V3700 firmware is the latest version. For IBM V3700 Firmware latest version and procedure to
upgrade the Firmware, refer the page IBM Storwize V3700 Firmware Upgrade Quick Start.
Upgrading EMS to V09.03.00 removes the previous device manager (DM) on the system, if it was installed earlier.
After upgrading EMS 9.3.0, install the respective DM supported for EMS 9.3.0. For more information on Device
Manager, see the SBC Manager section of the Insight User Guide. For more information on installing or upgrading
Device Manager, refer Installing and Upgrading Device Manager (DM).
Rollback EMS HA
Reverting the EMS HA to previous version
If EMS upgrade is not successful or if EMS is not stable after an upgrade then perform the following steps:
1. Install Insight using the old ISO on both the EMS HA systems (active and standby) by performing the
following:
For EMA HA deployed for DR setup, perform the following steps on source and target DR sites.
a. Perform Insight Installation using the old ISO. see "Kickstart the HP G8 Servers ".
b. Configure RAID and Install Oracle Clusterware.
c. Perform "Post-Installation Steps".
d. Enter the following command on Primary server to start Insight as user insight:
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS startAll
2. Log in as root. Copy the following files from the backup directory on the remote server to the current location
(For example, /export/home/backups):
For EMA HA deployed for DR setup, perform the following steps on source and target DR sites.
The file expdp_stats_data_manual.dmp will be generated only if the PM stats export option is enabled.
exp_data_manual.dmp
exp_strct_manual.dmp
expdp_data_manual.dmp
expdp_strct_manual.dmp
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
# cd /export/home/pkg
4. Enter the following command on EMS Primary server to migrate the data:
# ./EMSmigration -b /export/home/backups
OR Replace the directory /export/home/backups with the directory that you are using for your backup
data. The following output appears:
This section provides information on migrating EMS HA on Solaris or pre-EMS 9.1 HA on Linux to the new EMS HA
solution.
For details on migrating the existing EMS HA licenses, refer to License Considerations for Hardware
Migration.
This section provides information on exporting the data from the pre-EMS 9.1 HA Linux.
Prerequisites
The prerequisites to export data from an pre-EMS 9.1 HA Linux system, are as follows:
# chmod +x migrationExport.sh
1. Login as root on pre-EMS 9.1 HA Linux primary server from where you want to export the data.
Ensure that permission for migrationExport.sh has been changed as root user, using the ch
mod +x migrationExport.sh command. The permissions must be changed before the following
step is executed.
2. Ensure that you are in the directory where you have copied the migration script. The backup directory must
have the migrationExport.sh script available. Execute the following command on the primary pre-EMS
9.1 server to export the data.
# ./migrationExport.sh
expdp_data_manual.dmp
expdp_strct_manual.dmp
NetcoolBackupFiles.tar
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
NetcoolBackupFiles.tar
This section provides information on importing the data from the pre-EMS 9.1 HA system to the new HA system.
Prerequisites
For prerequisites to import data on Linux, refer the section Installing Insight HA on Linux.
After completing the above mentioned prerequisites, you can proceed with Importing Data on Primary Serve
r
If migrating to 9.2.1 and above (including 9.3.0) then use the following dmp file names:
# cd /export/home/backups
# chown oracle:dba expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp expdp_strct_manual.dmp
or
# cd /export/home/backups
# chown oracle:dba expdp_data_manual.dmp
expdp_strct_manual.dmp
# cd /export/home/pkg
3. Enter the following command on the new primary Linux HA server to migrate the data:
# ./EMSmigration -b /export/home/backups
Post-Migration Tasks
After importing the data, you need to perform the following post-migration tasks:
Update all the existing nodes to point to the EMS HA cluster new shared IP address (VIP). To update all the existing
nodes, perform the following steps:
4. Click OK.
The operation may take a longer time depending on the number of nodes. If there are any errors displayed on
the final screen at the end of the operation, then the nodes were not successfully discovered. You need to
perform a manual discovery of the nodes after determining the cause of the error. For more details, refer to
the Node discovery section of the Insight User Guide.
1. Login to Insight.
2. Navigate to Network Mgmt > Insight Administration.
3. Select the registered SGX4000 node from the Navigation tree.
4. Modify and Update the following (default) values if required:
a. -SSH Port
b. -Login (CLI)
c. -Password (CLI)
d. Click on Update button and then click on Discover node.
Disassociate all of the nodes with the pre-EMS 9.1 HA IP address to avoid traps being sent from the nodes to the
old EMS IP address. Perform the following steps to disassociate all of the nodes:
1. Navigate to the Insight Administration screen, and click the General tab.
2. Select the Managed Device Association link.
3. Enter the pre-EMS 9.1 HA IP in the IP Address field as shown below.
5. Click OK.
The operation may take a longer time to complete depending on the number of nodes.
If there are any errors displayed on the final screen at the end of the operation, then the nodes were not
successfully disassociated. You need to perform a manual configuration to remove the pre-EMS 9.1 HA IP
address as the trap destination.
After migrating data from one EMS server (A) to another EMS server (B), and after registering
Insight node B, you need to unregister Insight node A (which will show up registered as a result of
the migration)
This section provides information on exporting data from EMS HA Solaris system.
Prerequisites
The Solaris Netra 5220 or Netra 240/440 (Primary and non-primary) servers must be up and running.
Download the migrationExport.sh script and EmsSolarisMigration.tar file from Salesforce
available under WL9.3 Software Bundle and copy it to the Primary EMS System.
After downloading the file migrationExport.sh, login as ‘root’ user and change the permission of
migrationExport.sh using the following command:
# chmod +x migrationExport.sh
Netcool Installation
Exporting Netcool Data
Database (DB) backup
Perform the following procedure to perform OMNIBus Installation and export data from the Solaris system:
Ensure that permission for migrationExport.sh has been changed as root user, using the ch
mod +x migrationExport.sh command. The permissions must be changed before the following
step is executed.
Execute the following command on the Solaris primary System to install OMNIBus and export data from
Solaris HA to Linux HA servers.
The above procedure completes Netcool installation, exporting netcool data, and database (DB) backup.
The migration files generated when migrating from Solaris to Linux are:
expdp_data_manual.dmp
expdp_strct_manual.dmp
NetcoolBackupFiles.tar
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
NetcoolBackupFiles.tar
This section provides information on importing the EMS data to the EMS HA Linux system.
Prerequisites
For prerequisites to import data on Linux, refer the section Installing Insight HA on Linux.
If migrating to 9.2.1 and above (including 9.3.0) then use the following dmp file names:
# cd /export/home/backups
# chown oracle:dba expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp expdp_strct_manual.dmp
or
# cd /export/home/backups
# chown oracle:dba expdp_data_manual.dmp
expdp_strct_manual.dmp
# cd /export/home/pkg/
3. Enter the following command on Primary Linux server to migrate the data:
If Proxy Preferred IP address is configured in old EMS Solaris and if it is different from EMS IP
address, then you will be prompted to enter a new value for the Proxy Preferred IP address while
migrating to EMS Linux.
# ./EMSmigration -b /export/home/backups/
After importing the data, you need to perform the following post-migration tasks:
Update all the existing nodes to point to the EMS HA cluster new shared IP address (VIP). To update all the existing
nodes, perform the following steps:
4. Click OK.
The operation may take a longer time depending on the number of nodes. If there are any errors displayed on
the final screen at the end of the operation, then the nodes were not successfully discovered. You need to
perform a manual discovery of the nodes after determining the cause of the error. For more details, refer to
If SGX4000 device is configured, you have to perform the following procedure during data migration.
1. Login to Insight.
2. Navigate to Network Mgmt > Insight Administration.
3. Select the registered SGX4000 node from the Navigation tree.
4. Modify and Update the following (default) values if required:
a. -SSH Port
b. -Login (CLI)
c. -Password (CLI)
d. Click on Update button and then click on Discover node.
Disassociate all of the nodes with the old EMS IP address to avoid traps being sent from the nodes to the old EMS
IP address. Perform the following steps to disassociate all of the nodes:
1. Navigate to the Insight Administration screen, and click the General tab.
2. Select the Managed Device Association link.
3. Enter the old EMS IP in the IP Address field as shown below.
5. Click OK.
The operation may take a longer time to complete depending on the number of nodes.
If there are any errors displayed on the final screen at the end of the operation, then the nodes were not
successfully disassociated. You need to perform a manual configuration to remove the old IP address as the
trap destination.
After migrating data from one EMS server (A) to another EMS server (B), and after registering
Insight node B, you need to unregister Insight node A (which will show up registered as a result of
the migration)
Migrating Data from StorageTek or IBM DS3524 RAID to IBM 3700 RAID
The IBM V3700 RAID is supported on Linux platform with EMS application installed on a HP G8 system. This
section provides details about how to migrate data from StorageTek RAID or IBM DS3524 RAID to IBM V3700
RAID. It contains the following topics:
Migrating Data from Sun Solaris with StorageTek RAID or IBM DS3524 to HP G8 on Linux with IBM V3700
RAID
Migrating from IBM DS3524 RAID (HP G8 System on Linux) to IBM V3700 RAID
Migrating Data from Sun Solaris with StorageTek RAID or IBM DS3524 to HP
G8 on Linux with IBM V3700 RAID
The procedure to migrate data from Sun Solaris with StorageTek RAID or IBM DS3524 to HP G8 on Linux with IBM
V3700 RAID, is same as Migrating data from Solaris to Linux. For more information, refer the procedure Migrating
from Solaris to Linux.
Migrating from IBM DS3524 RAID (HP G8 System on Linux) to IBM V3700
This section provides information on exporting data from EMS HA connected to IBM DS 3524 RAID to EMS HA
connected to IBM V3700 RAID.
Prerequisites for Exporting Data from IBM DS3524 RAID (HP G8 System on Linux)
For prerequisites to export data from IBM DS3524, refer the Prerequisites section.
Procedure for exporting data from EMS HA with IBM DS 3524 RAID
Export data from IBM DS3524 RAID, by performing the steps given in Procedure for Exporting Data from
Pre-EMS 9.1 Primary server section.
After exporting the data, move the backup files generated to a remote system.
When exporting data from an EMS HA with IBM DS 3524 RAID, the following files are generated.
The migration files generated when migrating from Solaris to Linux are:
expdp_data_manual.dmp
expdp_strct_manual.dmp
NetcoolBackupFiles.tar
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
NetcoolBackupFiles.tar
This section provides information on importing the data on EMS HA Server connected to IBM V3700 RAID.
As IBM V3700 RAID is supported only on Linux platform with HP G8 systems, you need to perform the following
steps, before importing the data to IBM V3700 RAID.
1. Replace the IBM DS3524 RAID with IBM V3700 RAID. For more details about V3700 hardware and software
requirements, refer Prerequisites. For setting-up IBM V3700 RAID, refer EMS HA Cluster Cabling and
Network Connectivity.
2. Kickstart both the HP G8 systems (primary and secondary) with ISO. For more details regarding kickstarting
the HP G8 system, refer Kickstart the HP G8 Servers.
3. Copy the backup files mentioned in above Table from remote system to EMS Linux Primary system.
4. After completing the above mentioned prerequisites, you can proceed with Importing Data on IBM V3700
RAID
Import Data on IBM V3700 RAID, connected to HP G8 systems, by performing steps as mentioned in the section
Importing Data on Primary Server.
Post-Migration Tasks
After importing the data, you need to perform the following post-migration tasks if you have configured SGX-4000:
RPM Corruption
This section provides the troubleshooting procedure of the following scenario. When the rpm command is executed,
lot of errors are seen due to which the EMS HA status is not visible.
# rm -rf /var/lib/rpm/__db.00*
Uninstalling IAS
Overview
The Insight Application Server (IAS) is a separate node running any or all of the following (depending upon
licensing):
Heavy use of the of both the SMS and EMS APIs in particular can place significant load on Insight. Off-loading or
distributing API processing with an IAS node can allow Insight to scale and meet the requirements of networks with
substantial API needs.
allows you to offload API provisioning tasks from the Insight EMS server.
allows for uninterrupted API provisioning in cases where the Insight server is offline (for example, during an
upgrade)
Additionally, the user has the option to off-load the GSX and PSX CLI to the IAS. To enable this, the EMSCLI
license is applied to the IAS. For more information about IAS, see Insight User Guide.
This section provides details for installing and upgrading an Insight Application Server (IAS).
You require two servers to install Insight Standalone (SA) and IAS. You need to install Insight on server A
before installing IAS on server B.
Three servers are required to install Insight High-Availability (HA) and IAS. You need to install Insight HA on
servers A and B before installing IAS on server C.
Prerequisites
Know the IP address of the remote system on which you want to install IAS.
Know the password for the root user on the remote system.
Ensure root ssh login is permitted on the remote system.
Have a system that meets the hardware requirements. For more information on the hardware and software
requirements, see Hardware Requirements and Network Connectivity Information and Server Configurations
Sonus recommends you to start Insight on the EMS before you install the IAS.
Ensure the system BIOS date is current date.
Navigation
The mouse cannot be used for navigation. When a list of choices are displayed, use the UP or DOWN arrow key to
highlight your choice and press ENTER to mark your selection.
Perform the following steps to prepare the IAS System for ISO image installation:
You need to configure the RAID hardware before you install using the ISO image. For more details, see Co
nfiguring the RAID Hardware.
1. Open a web browser and type the IP address to access the iLO. The login screen appears.
Enter the iLO login name and password.
2. Mount the virtual disk as CD-ROM by selecting Virtual Drives and check the Image File.
3. Browse to the location where you have stored the ISO image and select the ISO image and then click the
Open button.
4. Connect the monitor and keyboard to the server or launch the Remote Console from iLO.
For launching Remote Console, see Launching the iLO Remote Console.
5. Reboot the server.
The HP BIOS execution window appears.
6. Press F11.
The F11 icon is highlighted on the screen and the Default Boot Override Options appear.
10. After a few minutes, the following screen appears and you can view the various RPM packages getting
installed.
The packages and post-installation scripts are executed automatically. This process may approximately take
11. After successful installation of Red Hat Enterprise Linux, the following screen is displayed. Use the Tab key
to select Reboot button. After selecting Reboot button, press Space key to reboot the system.
If you do not press any of the Function keys, by default, the system continues to boot normally.
13. When the system comes-up, you need to perform the network configuration. As part of Network
Configuration, you need to configure the Hostname, IP address for network interfaces, Time Zone, and Time
Server.
Select Hostname and press Space key configure the hostname for the system.
a. In the Host Configuration Screen, specify the Hostname, Primary DNS and DNS Search Path details.
Press Tab key to select OK button and press Space key to save the settings.
b. Use the Arrow keys to select IP Configuration and press Space key to configure ip address. Select
c. Specify the IP Address, subnet mask, and gateway IP Address for eth0 network interface. Use the Tab
key to move the cursor to other parameter. Press Tab key to select OK and press Space key to save
IP Address details.
d. Use the Arrow keys to select Time Zone and press Space key to configure the Time Zone. Select the
nearest Time Zone for the system and press Tab key to select OK and press Space to save the Time
Zone settings.
e. Enter the NTP Time-Server IP Address, to synchronize the time for the VM host system.
Login screen is displayed, after the IAS Application Software is successfully installed.
17. Select the Standard Boot Order (IPL) option and press ENTER.
The boot order appears.
18. Select Hard Drive C: (See Boot Controller Order) and press ENTER.
The choices to change the boot order appears.
19. Select the Set the IPL Device Boot Order to 1 option and press ENTER.
The updated boot order appears. The highest priority is changed from USB to Hard Drive.
22. Press F10 to save the settings and exit from BIOS setup utility.
The system reboots from the hard disk.
23. The Red Hat Enterprise Linux Server installation screen is displayed.
24. After completing the installation, the following message appears:
This procedure is not applicable to install IAS remotely from Linux to Solaris IAS.
# cd /opt/sonus/ems/conf/IAS
# sh remoteIasInstall.sh <ias_ip_address>
where <ias_ip_address> is the IP address of the remote system on which you want to install IAS.
To start an IAS server, Insight must first be running on the Insight EMS server. You can then start the IAS by logging
into the Insight EMS server as user insight and entering the following:
$ cd /opt/sonus/ems/conf/IAS
$ ./remoteIasMgmt.sh start <ias_ip_address>
where <ias_ip_address> is the IP Address of the IAS, which can either be an IPv4 or an IPv6 address type. The
script prompts you for the insight user password of the IAS system and then proceeds with the command. Once the
IAS is started, it will continue to run even if Insight is stopped.
To stop an IAS server, Log on to the Insight EMS server as either root or insight and enter the following:
# cd /opt/sonus/ems/conf/IAS
# ./remoteIasMgmt.sh stop <ias_ip_address>
where <ias_ip_address> is the IP Address of the IAS. The script prompts you for the root or insight user
password of the IAS system and then proceed with the command.
To start an IAS server, Insight must first be running on the Insight EMS server.
1. You can then start the IAS by logging into the Insight EMS server as user insight and entering the following
command:
$ cd /opt/sonus/ems/conf/IAS
$ ./remoteIasMgmt.sh start <client_ip_address>
where <client_ip_address> is the IP address of the IAS. The script prompts you for the insight user
1. To stop an IAS server, log on to the Insight EMS server as either root or insight and enter the following:
# cd /opt/sonus/ems/conf/IAS
# ./remoteIasMgmt.sh stop <client_ip_address>
where <client_ip_address> is the IP Address of the IAS. The script prompts you for the root or insight
user password of the IAS system and then proceeds with the command.
To obtain the status of an IAS server, log on to the Insight EMS server as either root or insight and do the following:
# cd /opt/sonus/ems/conf/IAS
# ./remoteIasMgmt.sh status <client_ip_address>
where <client_ip_address> is the IP address of the IAS. The script prompts you for the root or insight user
password of the IAS system and then proceeds with the command. The output of the status command looks similar
to the following:
When the changeIpAddress.sh script is used to change the IP address of the Insight server, all IASs that are
registered to the Insight server should be automatically updated to the new IP address of the Insight server.
If you need to manually update the Insight IP address that is on an IAS, use either of the following methods:
# cd /opt/sonus/ems/conf/IAS
# ./remoteIasMgmt.sh resetInsightIP <client_ip_address>
where <client_ip_address> is the IPv4/IPv6 address of the IAS on which you want to update the Insight
IPv4/IPv6 address.
The Insight IPv4/IPv6 address on the IAS is updated to the IPv4/IPv6 address of the Insight server.
The IAS system can prompt to enter root password.
# cd /opt/sonus/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IPv4/IPv6 address on all IASs that are registered to the Insight server are updated to the
IPv4/IPv6 address of the Insight server.
The system prompts you to enter root password on each of the registered IASs.
If you have the system administrator change the name or the IPv4/IPv6 address of the IAS, you do not have to
change any additional files. You do need to Update the IAS node in the Insight Node Registration Page, and
rediscover the IAS node. See “Updating a Node” in the Insight Administration chapter of the Insight EMS User
Guide.
If you install the Insight API, Insight SMS API, Insight SGX API, or Lawful Intercept Target Provisioning API on an
IAS, you must purchase a license for each instance of an API module you want to use. You cannot share a license
between an API module on the Insight server and an API module on an IAS. For example, you cannot share a single
license between an Insight SMS API module on the Insight server and an Insight SMS API module that is installed
on a remote system with IAS.
# cd <IAS_BASE>/bin
# ./enableHTTP.sh
The IAS server will be stopped now. Do you want to proceed? (default: yes)
[y,n] y
Stopping IAS...
# cd <IAS_BASE>/bin
# ./disableHTTP.sh
The IAS server will be stopped now. Do you want to proceed? (default: yes)
[y,n] y
Stopping IAS...
# cd /opt/sonus/ems/conf/IAS
# sh remoteIasInstall.sh <client_ip_address>
where <client_ip_address> is the IP address of the remote system on which you want to upgrade IAS.
2. When prompted, enter the password of the root user for the remote system.
3. Messages appear that state that remote information is being retrieved, and upgrade files are being copied to
the remote system.
4. When the IAS is ready for upgrade, a message appears that this may take several minutes.
A message then appears stating that the IAS installation completed successfully, and that the IAS has
started.
The remoteIasInstall.sh script takes care of both IAS install and upgrade.
To start an IAS server, Insight must first be running on the Insight EMS server. You can then start the IAS by logging
into the Insight EMS server as user insight and entering the following:
$ cd /opt/sonus/ems/conf/IAS
$ ./remoteIasMgmt.sh start <client_ip_address>
where <client_ip_address> is the IP Address of the IAS, which can either be an IPv4 or an IPv6 address type.
The script prompts you for the insight user password of the IAS system and then proceeds with the command. Once
the IAS is started, it will continue to run even if Insight is stopped.
To stop an IAS server, Log on to the Insight EMS server as either root or insight and enter the following:
# cd /opt/sonus/ems/conf/IAS
# ./remoteIasMgmt.sh stop <client_ip_address>
where <client_ip_address> is the IP Address of the IAS. The script prompts you for the root or insight user
password of the IAS system and then proceed with the command.
Firmware File
Firmware file
Firmware Upgrade
Downloading the HP firmware file and verify if the HP firmware version is the latest. For more information
about HP firmware latest version and procedure to upgrade the HP firmware, refer the page https://support.
sonus.net/display/ALLDOC/HP+DL380p+G8+Firmware+Upgrade.
This is the HP G8 DL380 firmware upgrade file. Ensure that the HP DL380 G8 firmware is upgraded after you perform the EMS Download the firmware file from Salesforce
Software upgrade using the ISO file. Customer Portal to:
/opt/sonus/platform directory in the server.
Uninstalling IAS
1. If you are uninstalling IAS on HP DL380p G8, the procedure may approximately take 30 minutes.
2. On the Insight server, begin the IAS installation script:
# cd /opt/sonus/ems/conf/IAS
# sh remoteIasUnInstall.sh <client_ip_address>
where <client_ip_address> is the IP address of the remote system on which you want to install IAS.
3. When prompted, enter the password of the root user for the remote system.
4. Enter y to confirm uninstallation.
Are you sure you want to uninstall the IAS server on 10.54.2.83? [y,n,q]
(default: n):
The process on IAS and Sonus Agent are stopped. A message then appears stating that the IAS is
uninstalled completely.
Configuring IPv6
This section contains mandatory and optional post-installation/upgrade tasks. The mandatory tasks must be
performed to complete the Insight installation.
Clearing Client Java Cache After a Perform this task on each client after an Insight Optional
Software Upgrade installation.
Enabling SSH Perform this task after ISO installation if you are Mandatory
using SSH for communication between the Insight
server and the PSX, SGX, and DSI.
Licenses for Enabling Insight API, Contact your Sonus representative to obtain software Mandatory
Insight CLI, SMS API, SGX API, licenses.
Lawful Intercept Provisioning API,
and Traffic Manager This task
is
mandatory
only when
you are
using
licensable
features
User Account Lock Settings Perform this task to unlock an account and configure Optional
the settings for user account and password.
Synchronizing with the NTP Server Perform this task after ISO installation. Optional
Online Library Installation Perform this task to install the documentation. Optional
SSL Certificate Installation Perform this task after an Insight installation if you Optional
Procedures need to support HTTPS in a production environment.
Enabling Users to Create Cron Jobs Perform this task after ISO installation if you need to Optional
allow users to create cron jobs.
Enabling Users to Create at Jobs Perform this task after ISO installation if you need to Optional
allow users to create at jobs.
Managing IP Bonding for a non-HA Perform this task for non-HA systems after an Optional
System installation if the Insight server uses bonding. This is
recommended by Sonus to protect the EMS from a
single-switch failure.
Clearing the Core Files Perform the task to clean up the unwanted cores Optional
periodically.
Limiting Maximum Login Sessions Perform this task to limit the login sessions for a user. Optional
Unlocking the Locked User Account Perform this task to unlock an account. Optional
Modifying user session time-out Perform the task to modify the time-out interval. Optional
interval
Setting Permissions Perform the task to add setuid permission on Linux Optional
commands.
Changing the GRUB Password Perform the task to change grub password. Optional
Deploying LNP Adaptor Perform the task to deploy LNP Adaptor. Optional
Enabling or Disabling HTTP access Perform the task to enable and disable HTTP access Optional
on the EMS Standalone Server to EMS server.
Changing Timezone and Network Perform the task to change time zone or network Optional
Configuration configurations.
After you perform an upgrade to a new version of Insight software, have each user who is running an Insight client
clear their Java cache to prevent cached pages from the previous version from being temporarily displayed.
SSH is installed during the installation of Redhat Linux 6.4.2, but it must be enabled in order to use it. If you want to
use SSH for communication between the Insight server and the PSX, SGX, and DSI servers, you must enable SSH
on the Insight server and on the PSX, SGX, and DSI servers. This version of SSH includes the following
components: SSH Server, SSH client, Secure FTP (SFTP), and Secure File Copy.
1. As a user with root privileges, change to the SSH server configuration directory:
# cd /etc/ssh
# cp sshd_config sshd_config.backup
AllowTcpForwarding no
to
AllowTcpForwarding yes
Change:
PermitRootLogin no
to
PermitRootLogin yes
# cd /etc/ssh
# cp sshd_config sshd_config.backup
#Port 22
to:
Port 2024
After completing this procedure, you can login using target user account on a target machine from a host machine
Perform the following procedure to enable key based authentication for SSH:
1. Log onto the host user account on the host machine using SSH.
2. Change the directory to host user ssh directory:
$ cd .ssh
$ ls
$ ssh-keygen -t rsa
$ cp id_rsa.pub <hostname>.pub
$ cp id_rsa.pub jupiter.pub
7. Copy the public key file <hostname>.pub to the target user .ssh directory on the target machine:
For example, if the hostname is jupiter, targetuser is admin, and targetmachine is nmhost, then enter the
following:
$ ssh <targetuser>@<targetmachine>
For example, if targetuser is admin and targetmachine is nmhost, then enter the following:
$ ssh admin@nmhost
$ cd .ssh
10. Append the contents of host user public key file to file authorized_keys:
12. Exit the target machine and login to target machine again from host machine:
$ ssh <targetuser>@<targetmachine>
For example, if targetuser is admin and targetmachine is nmhost, then enter the following:
$ ssh admin@nmhost
Access to the following modules of Insight EMS require the purchase of separate software licenses. Consult your
Sonus sales representative for additional information.
For more details about License Management, refer the page 'Managing Licenses'.
Insight CLI
Insight API
Insight SMS API
Insight SGX API
Lawful Intercept Provisioning API
Insight Traffic Manager
Once you purchase the product, you will be provided a license file with instructions for enabling the
product/functionality along with all applicable documentation. See the Insight EMS User Guide for a list of the
individual licenses that are available and a description of the functionality each enables, and instructions for
installing licenses.
If you install the Insight API, Insight SMS API, Lawful Intercept Provisioning API, and Insight SGX API on a system
other than the Insight server, see Enabling API Licenses on IAS, you must purchase a license for each instance of
an API module you want to use. You cannot share a license between an API module on the Insight server and an
API module on a remote system.
Enabling Mailx
# vi /etc/hosts
# cd /etc/mail/
# vi sendmail.cf
O PrivacyOptions=goaway
If incorrect password is entered for more than the configured limit (default: 5), user account gets locked for the
configured time (default: 10 minutes). During this period, user cannot login even with the correct password.
You can configure the User Account Lock Settings by following the below procedure:
1. To change the settings of lock time and failed attempts, perform the following:
Edit /etc/pam.d/password-auth file and search for the following line:
Your Unix/Linux Administrator must synchronize the Insight server and all network elements in the deployed network
to the same NTP server. Synchronizing ensures that the timestamps in the Insight logs are consistent with the
timestamps on the other network elements. Failure to do so could also introduce error into certain statistics, most
notably the Trunk Group performance statistics.
If you elect to synchronize with more than one NTP Server, you must ensure that the NTP Servers are also
synchronized. Conflicting time information from multiple NTP Servers may cause Insight system errors.
Procedure
Perform the following procedure to configure NTP server in Linux. All nodes must be set in NTP server.By default,
GSX has NTP server set.
3. Using the vi editor, edit /etc/ntp.conf file and replace the IP in the entry shown below with the NTP
server IP.
For example:
# server 127.127.1.0
The Online Library is available on the Sonus Salesforce Customer Portal. Perform the following procedure to
download and install the Online Library.
# ./docsInstall.sh
The script installs the new online documentation files. You can access the Online Library through Insight GUI
, Network Mgmnt roll-up, Online Library icon.
1. Ensure that the user does not exist in the /etc/cron.deny file.
2. Add the user to the /etc/cron.allow file.
1. Ensure that the user does not exist in the /etc/at.deny file.
2. Add the user to the /etc/at.allow file.
The core dump files are written to the /home/core directory. The core files must be cleaned up periodically.
Perform the following procedure to limit the maximum login sessions for each user:
# cat /etc/security/limits.conf
Where, #<domain> <type> <item> <value> is used for informational purpose and will
not appear in the actual output.
You can modify the login limit for a particular user or group. See the following:
If a particular user has specific login limits, the following entry can be used where the <username> must be
replaced with actual user name and value can be modified as per requirement:
If a particular group has specific login limits, then the following entry can be used where <groupname> must be
replaced with actual group name and value can be modified as per requirement:
Performing the following procedure to unlock an account due to failed login attempts:
Inactive Account
Perform the following procedure if the account is locked due to user inactivity:
# passwd -u <username>
# passwd -u user01
Perform the following procedure to modify the user session time-out interval.
# vi /etc/ssh/sshd_config
The ClientAliveInterval is calculated in seconds. By default, the user session time-out interval is 750 seconds.
For example, if session time-out interval is one hour, then enter 3600 seconds.
ClientAliveInterval 3600
You can change the password, modify its aging, and perform several other tasks. See the following topics for
information:
Login as root user and modify maximum password aging days field:
# chage -M 90 user01
Perform the following procedure to create first password and force the user to change password on first login:
1. Login as root user and after creating the user, assign a default password:
# passwd <username>
# passwd user01
2. Compel the user to change the password during first time login:
# chage -d 0 <username>
# chage -d 0 user01
Perform the following procedure if root user needs to change the other user password:
1. To change the other user password as a root user, enter the following command:
# passwd <username>
# passwd user01
# passwd
Setting Permissions
Perform the following procedure to set permissions for a normal user to execute privilege commands:
# chmod +s <absolute_path_to_command_binary_file>
For example, to add the setuid permission on passwd command, enter the following
# chmod +s /usr/bin/passwd
# chmod -s <absolute_path_to_command_binary_file>
For example, to remove the setuid permission on passwd command, enter the following command:
# chmod -s /usr/bin/passwd
Grub password protects the boot loader. By default, the grub password for the boot loader is sonus.
1. Login as root user and execute the following command to generate the encrypted password:
# grub-crypt --md5
hiddenmenu
password --encrypted $1$1TGeX0$9TpQF8P1GDxPhTqFGR7Mg1
title Red Hat Enterprise Linux Server (2.6.32-220.7.1.el6.x86_64)
The Local Number Portability (LNP) Adaptor is not deployed by default on the Insight server.
/opt/sonus/ems/conf/deployLNPApplication.sh
1. Login as insight user and enter the following command to stop EMS:
$ /opt/sonus/ems/sonusEms stop
If you are using a EMS HA systems, you can enter the following command to stop EMS.
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS stopAll
$ cd /opt/sonus/ems/conf
3. Execute the following command to deploy LNP Application on the EMS server:
$ ./deployLNPApplication.sh
$ /opt/sonus/ems/sonusEms start
If you are using a EMS HA systems, you can enter the following command to start EMS.
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS startAll
5. For an HA or DR setup, ensure LNP Adaptor is deployed on all the Insight servers. To deploy LNP Adaptor
on other Insight systems, repeat Steps "1" to "4" on that server.
The existing timezone and network configurations of EMS server can be changed using the Sonus Network
Configuration Tool. Changing the network configuration is optional. Sonus Network Configuration Tool facilitates
changing the Hostname conifguration, IP address and Interface configuration, Time server, and Time Zone
configuration. The Sonus Network Configuration Tool is invoked by executing the script sonus_netconfig
available in the path /sbin/sonus_netconfig.
After changing the timezone and network configuration, you must relogin and then run /opt/sonus/ems/
conf/configureJumpstart.sh.
/sbin/sonus_netconfig
2. The following Sonus Network Configuration screen is displayed. It allows you to change the Hostname, IP
address for network interfaces, Time Zone, and Time Server.
Press Space key on the respective configuration, which you want to change. After changing the
configurations, use TAB key to select SAVE AND QUIT and press Space to write the changes to
the files. If you EXIT, all changes are discarded.
The EMS hostname is limited in length to 64 characters. The hostname can only contain
lowercase letters [a-z] and digits [0-9]. The hostname cannot start with a digit. Special
characters including hyphen are not allowed in hostname.
In the Host Configuration Screen, specify the Hostname, Primary DNS and DNS Search Path details.
Press Tab key to select OK button and press Space key to save the settings.
b. Use the Arrow keys to select IP Configuration and press Space key to configure ip address. Select
'eth0' interface for which you need to configure the IP Address. Use the Tab key to select OK button
and press Space key to configure IP address for eth0 network interface.
Specify the IP Address, subnet mask, and gateway IP Address for eth0 network interface. Use the Tab
key to move the cursor to other parameter. Press Tab key to select OK and press Space key to save
IP Address details.
c. Use the Arrow keys to select Time Zone and press Space key to configure the Time Zone. The default
Time Zone currently being used by system, is highlighted in Time zone settings. Select the nearest
Time Zone for the system and press Tab key to select OK and press Space to save the Time Zone
settings.
d. Use the Arrow keys to select Time Server and press Space key to change the IP address of TIme
server and press Tab key to select OK and press Space to save the Time Server settings.
Once the settings are saved, you are redirected to the screen shown in Step - 2. Press Tab key to
select 'Save and Quit' and press Space key to save the changes made and manipulate the respective
files and close the configuration tool.
The Lawful Intercept servers (Verint and Utimaco) do not support https. If http access is disabled on EMS,
the Lawful Intercept servers cannot communicate with EMS.
The following section describes the procedure to enable HTTP access to the EMS standalone server:
$ /opt/sonus/ems/sonusEms stop
2. To enable the access to HTTP, enter the following command as root user:
# /opt/sonus/ems/conf/security/enableHTTP.sh
$ /opt/sonus/ems/sonusEms start
Perform the following procedure to disable HTTP access to the EMS Standalone server:
$ /opt/sonus/ems/sonusEms stop
2. To disable the access to HTTP, enter the following command as root user:
# /opt/sonus/ems/conf/security/disableHTTP.sh
$ /opt/sonus/ems/sonusEms start
Sonus recommends using IP Bonding to provide non-HA systems with uninterrupted access to a network when a
network interface on the system fails or to protect the system from a single-switch failure. This is achieved by
creating a multipath group on the system, which consists of a primary and standby interface (Sonus recommends
that the primary interface and the standby interface be on different cards if possible). If a failure occurs in the
primary interface or its network adapter, the system automatically switches all the network access from the failed
interface and/or adapter to the standby interface.
The configureNicTeam script will create, revert, or delete IP bonding group, based on the
values specified while running the script.
The configureNicTeam script will prompt you for the following values. You can use Table to record the values that
you will enter when you run the script.
Table 27: Information needed to create IP Bonding using configureNICTeam create script
Data IP addresses
Netmask
Gateway
Use the following procedure to create an IP Bonding group. See Values You Provide for a description of the values
you will be entering.
# cd /opt/sonus/ems/conf/
# ./configureNicTeam create
Either accept the default value for the multipath group name by pressing ENTER, or type a name and press
At this point you will enter the IP data address that you wish to be used by
the NIC Teaming Group.
Press enter to continue
The program will now show you the exact changes that will be made. Press enter
once you understand the changes that will be made. After you have reviewed all
of the changes, you will be asked if those changes should be written to the
associated files. You must either accept all changes or none at all. You may
edit the changes in the various files as needed after the program completes.
Press enter to continue
12. Messages appear listing the files that are being created and stating that the changes are complete.
13.
Reverting IP Bonding
After creating an IP Bonding, you can also revert back the IP Bonding to its original state. Reverting the IP Bonding
removes the customized IP Bonding and restores the bonded interface configuration from the backup file.
To revert the IP Bonding that was created to its original state, execute the following steps:
1. On the Insight server, begin the NiCTeam script configureNicTeam with revert parameter:
# cd /opt/sonus/ems/conf/
# ./configureNicTeam revert
This script will delete all the bonds having backup
2. Messages appears if you are ready to commit the changes. When prompted, press y to revert back to the
original IP Bonding.
3. The script removes the customized bonding and reverts back to the original state. After removing the
customized bonding, restarts the network services.
The specified Network Bond is reverted and network services are restarted along with bringing up the NIC
interfaces involved in Network bonding.
Removing IP Bonding
This procedure is used to remove the IP Bonding. It asks for new values for network interfaces that were earlier part
of the IP Bonding.
1. On the Insight server, begin the NiCTeam script configureNicTeam with remove parameter:
# cd /opt/sonus/ems/conf/
# ./configureNicTeam remove
2. Messages appears with Network Bond Names along with interface names which are part of the repsective
Network Bond.
3. Specify the Network bond name, which needs to be removed. Additionally, you also need to specify the new
IP address to be assigned to NIC interfaces that were part of the IP Bonding that is being removed.
4. A confirmation message, with Network Bonding which you want to remove and specified IP addresses for
Network interfaces is displayed.
5. Ensure and verify the Network Bonding you want to remove. Press y to continue and remove the specified
Network Bonding and configure the new IP address values for NIC interfaces.
The specified Network Bond is removed and network services are restarted along with bringing up the NIC
interfaces involved in Network bonding.
When a server has multiple network interfaces, Sonus Insight requires the proper configuration of the /etc/hosts file.
The configuration information in this file allows the user to select the network interface to which a node connects.
During the Node Registration process, the user can select the desired IP Address from the Mgmt Client IP Address
list on the Node Registration screen.
The following is an example of an entry in a /etc/hosts file illustrates a server, samplehost, having two network
interfaces with IP Addresses of 38.45.67.123 and 38.33.54.26.
#
# Internet host table
#
127.0.0.1 localhost
38.45.67.123 samplehost samplehost.yourcom.com
38.33.54.26 samplehost
38.45.68.03 otherhost
The Lawful Intercept servers (Verint and Utimaco) do not support https. If http access is disabled on EMS,
the Lawful Intercept servers cannot communicate with EMS.
High-level steps
or
To enable the HTTP access for HA Linux server, perform the following steps:
# cd /opt/sonus/ems/conf/HA/RAC
# ./sonusEMS stopAll
# ./hamgmt deleteAll
5. To enable HTTP access, change the directory to /opt/sonus/ems/conf/security on the primary server
by executing the following command:
# cd /opt/sonus/ems/conf/security
# ./enableHTTP.sh
# cd /opt/sonus/ems/conf/security
# ./enableHTTP.sh
# cd /opt/sonus/ems/conf/HA/RAC
10. Register the resources using the command hamgmt createAll on the primary server.
# ./hamgmt createAll
11. Start EMS on the HA server, by executing the command sonusEMS startAll on the primary server.
# ./sonusEMS startAll
To disable the HTTP access for HA Linux server, perform the following steps:
# cd /opt/sonus/ems/conf/HA/RAC
# ./sonusEMS stopAll
# ./hamgmt deleteAll
5. To disable HTTP access, first change the directory to /opt/sonus/ems/conf/security on the primary
server by executing the following command:
# cd /opt/sonus/ems/conf/security
# ./disableHTTP.sh
# cd /opt/sonus/ems/conf/security
# ./disableHTTP.sh
# cd /opt/sonus/ems/conf/HA/RAC
10. Register the resources using the command hamgmt createAll on the primary server.
# ./hamgmt createAll
11. Start EMS on the HA server, by executing the command sonusEMS startAll on the primary server.
# ./sonusEMS startAll
This page provides links for managing account name and password information associated with the Insight.
Default Account Names and Passwords
Procedures for Changing Passwords
The choice between strong or weak passwords will be given during installations.
The strong passwords have more restrictions and require that a new password be entered during the installation.
The strong passwords do not have a default value, while the weak passwords do have a default value.
admin admin
root sonus
insight insight
oracle oracle
dbimpl dbimpl
sys change_on_install
system manager
admin admin
Insight_Admin_User sonus
root sonusfm
For complete Sonus products account and password details, refer to Sonus Products Password and Security
Management Reference.
For all Linux accounts other than insight, change the password using the Unix/Linux “ passwd” command.
The following user password restrictions exist by default. Sonus recommends that you do not change these
restrictions.
This section describes how to change the insight user password with the changeInsightPassword.sh script.
Overview
Change the insight user password after a Kickstart if you did not use the strong password option when running the
configureJumpstart.sh or emsMigrate.sh script. This changes the insight user password from the previous value.
Sonus recommends that you also periodically change the insight user password.
This procedure uses a script to change the password and to make the corresponding changes to the Netcool
Process control user. You do not need to re-perform Netcool configuration.
This procedure also allows you to set the password expiration behavior to non-expiring or to expiring, and to set the
expiration values.
CAUTION
You must use the following procedure to change the password for the insight user. Do not use the passwd
command, which would result in a misconfiguration of Netcool.
Password Restrictions
The insight user password has the following restrictions (unless you use the -v option described in the procedure):
Procedure
To change the password and/or the password expiration behavior for the insight user, perform the following
procedure.
1. Log in as root.
2. Run the setup script to configure the insight user password/password expiration as follows:
# cd /opt/sonus/ems/conf
# ./changeInsightPassword.sh -a "-n <min_days> -w <warn_days> -x <max_days>"
Where:
<min_days> represents the minimum number of days that must pass before the user can change the
password.
<warn_days> represents the number of days before the password expiration when the user is warned.
<max_days> represents the maximum number of days that a password is valid. If you enter -1, password
expiration is turned off, and you do not need to enter the -n or -w arguments.
The -a and the quotation marks are needed if you are entering the -n, -w, or -x arguments.
Insight is currently running. You must shut down Insight (including all of the
FM processes) before running this script. Do you want to continue [y|Y,n|N]?
(Default:Y)
Enter Y.
4. The following prompt appears:
Enter the new password if you are changing it, or enter the old password if you are only changing the
expiration behavior. Unless you used the -v option in Step "1", the password must meet the restrictions listed
in "Password Restrictions".
6. If the system is part of a DR or HA system, a prompt appears that asks if you want to change the insight user
password on the other systems.
Enter Y.
7. When prompted, enter and re-enter the root password for each of the other Insight servers.
If you have entered a wrong password, for the remote servers, the following message appears:
The default Agent connection account/password combination is admin/admin. To change the password, perform
# /opt/sonus/sonusComm/bin/jash
2. At the % prompt, enter the following (this assumes the current password is admin):
success
where
admin is the account name
<existing password> is the current password, such as admin
<new password> is the new password
% exit
5. Change the Agent Password field in the Register Insight Node screen. See the “Insight Administration”
chapter of the Insight EMS User Guide.
Changing the Insight Database Password for the IAS from the Insight System
Overview
This section describes how to set the Insight database password for an IAS by running a script from the Insight
server. This procedure is only required if the password on the IAS was not changed when performing Changing the
Database Password for EMS Standalone System.
Procedure
To change the Insight database password for an IAS system by running a script on the Insight server, perform the
following:
# cd /opt/sonus/ems/conf/IAS
# ./remoteIasMgmt.sh resetDbPassword <client_ip_address>
where <client_ip_address> is the IP address of the IAS on which you want to update the Insight
database password.
This section describes how to change the system database user password with the
changeSystemDbPassword.sh script. This section includes the following:
Password Restrictions
The system database user password has the following restrictions (unless you use the -v option described in the
procedure):
Procedure
# cd /opt/sonus/ems/conf
# ./changeSystemDbPassword.sh
Enter the password. Unless you used the -v option in Step "1", the password must meet the restrictions listed
in Password Restrictions.
This section describes how to change the Netcool database user password for the Insight_Admin_User with the
changeNetcoolDbInsightPassword.sh script.
Password Restrictions
The user password has the following restrictions (unless you use the -v option described in the procedure):
Procedure
To change the Netcool Database User Password for the Insight_Admin_User user, perform the following steps:
# cd /opt/sonus/ems/conf
# ./changeNetcoolDbInsightPassword.sh
Enter Y.
Enter the password. Unless, you used the -v option in Step 1. The password must meet the restrictions listed
in Password Restrictions.
Changing the Netcool Database User Password for the Root User
This section describes how to change the Netcool database user password for the root user with the
changeNetcoolDbRootPassword.sh script. This section includes the following:
Password Restrictions
Procedure
To change the Netcool Database User Password for the root user, perform the following steps:
# cd /opt/sonus/ems/conf
# ./changeNetcoolDbRootPassword.sh
Enter Y.
Enter the password. The password must meet the restrictions listed in Password Restrictions.
This section describes how to change the EMS keystore password with the changeKeystorePassword.sh script.
This procedure can be used after you obtain your own SSL certificate and import it, see SSL Certificate Installation
Procedures. This procedure cannot be used with the demo site certificate that comes with Insight.
Password Restrictions
Procedure
Password Restrictions
Procedure
# cd /opt/sonus/ems/conf
# ./changeKeystorePassword.sh
If genCertRequest script is used to generate the private key, then the private key alias is insight.
For more information, see SSL Certificate Installation Procedures.
Enter the new EMS keystore password. The password must meet the restrictions listed in Password
Restrictions.
Changing the Password or Password Behavior of the insight User for the IAS System
To change the insight user password of the IAS system or to change the password expiration behavior (the IAS has
an expiring insight user password by default), use the passwd command.
Changing the Insight Agent Connection Account Password for the IAS System
The default Agent connection account/password combination is admin/admin. To change the password, perform
the following procedure, which uses the jash shell utility:
# /opt/sonus/sonusComm/bin/jash
2. At the % prompt, enter the following (this assumes the current password is admin):
where
admin is the account name
<existing password> is the current password, such as admin
<new password> is the new password
% exit
5. Change the Agent Password field in the Register Insight Node screen. See the “Insight Administration” of the
Insight EMS User Guide.
This section describes how to change the Insight database user password with the changeDbPassword.sh script.
This section includes the following:
Password Restrictions
The Insight database password has the following restrictions (unless you use the -v option described in the
procedure):
When using the changeDbPassword.sh script to change the Insight database password on the Insight system, the
script will also change the database password on any IASs that are registered to the Insight system and that are
currently up. You will be prompted for the password of the root user on each IAS.
If an IAS is not up when you run the changeDbPassword.sh script, you will need to change the password
when the IAS is up by performing Changing the Insight Database Password for the IAS from the Insight
System. If the Insight database password on the IAS does not match the Insight database password on the
Insight server to which it is registered, the database user (dbimpl) will be locked out of the database, and
Insight will not function correctly. To unlock the database, run the following script: /opt/sonus/ems/conf
/unlockDbimplUser.sh
Procedure
# cd /opt/sonus/ems/conf
# ./changeDbPassword.sh
The following options may be used when entering the ./changeDbPassword.sh command:
-c: The new password will be requested once, and you will not be prompted to re-enter it.
-v: The password will not be checked to see if it meets the password restrictions.
Insight is currently running.You must shut down Insight (including all of the
FM processes) before running this script. Do you want to continue [y|Y,n|N]?
(Default:Y)
Enter Y.
Enter the password. Unless you used the -v option in Step "1", the password must meet the restrictions listed
in Password Restrictions.
This section describes how to change the EMS database user password with the changeDbPassword.sh script.
Password Restrictions
The Insight database password has the following restrictions (unless you use the -v option described in the
procedure):
When using the changeDbPassword.sh script to change the Insight database password on the Insight system, the
script will also change the database password on any IASs that are registered to the Insight system and that are
currently up. You will be prompted for the password of the root user on each IAS.
CAUTION
If an IAS is not up when you run the changeDbPassword.sh script, you will need to change the password
when the IAS is up by performing Changing the Insight Database Password for the IAS from the Insight
System. If the Insight database password on the IAS does not match the Insight database password on the
Insight server to which it is registered, the database user (dbimpl) will be locked out of the database, and
Insight will not function correctly. To unlock the database, run the following script: /opt/sonus/ems/conf
/unlockDbimplUser.sh
High-level steps
# cd /opt/sonus/ems/conf/HA/RAC
# ./sonusEMS stopAll
# ./hamgmt deleteAll
5. Change the EMS Database Password by executing the following command as root user.
a. Change the directory to /opt/sonus/ems/conf, by executing the following command:
# cd /opt/sonus/ems/conf
b. Execute the script changeDbPassword.sh to change the EMS Database Password with desired
options (-c or -v):
# ./changeDbPassword.sh
The following options may be used when entering the changeDbPassword.sh command:
-c: The new password will be requested once, and you will not be prompted to re-enter it.
-v: The password will not be checked to see if it meets the password restrictions.
c. If Insight is up and running, the following prompt appears:
Enter Y.
d. The following prompt appears:
Enter the password. Unless you used the -v option in Step "5a", the password must meet the
restrictions listed in Password Restrictions.
# cd /opt/sonus/ems/conf/HA/RAC
7. Register the resources using the command hamgmt createAll on the primary server.
# ./hamgmt createAll
8. Start EMS on the HA server, by executing the command sonusEMS startAll on the primary server.
# ./sonusEMS startAll
Configuring IPv6
Prerequisites
Before migrating Sonus network elements from IPv4 to IPv6, see the Sonus Network Solution IPv4 to IPv6 Migration
Guide to understand the implementation of complete network migration of multiple Sonus products.
Perform the following procedure to enable IPv6 on the EMS standalone server.
1. Log in as root.
2. Append "NETWORKING_IPV6=yes" in /etc/sysconfig/network file.
3. Edit the following file:
# /etc/sysconfig/network-scripts/ifcfg-<interface name>
where the <interface name> is the name of the interface on which the IPv6 needs to be enabled.
You can obtain the interface name by executing the following command:
# ifconfig
# ifconfig
eth0 Link encap:Ethernet HWaddr 2C:76:8A:50:00:E0
inet addr:10.54.159.28 Bcast:10.54.159.255 Mask:255.255.255.0
inet6 addr: fe80::2e76:8aff:fe50:e0/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:26616624 errors:0 dropped:0 overruns:0 frame:0
TX packets:15355760 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:32241613772 (30.0 GiB) TX bytes:9634299086 (8.9 GiB)
Interrupt:32
In this example, eth0 is the name of the interface on which IPv6 needs to be enabled.
Edit the following file:
4. Add the following entry to the /etc/sysconfig/network-scripts/ifcfg-eth0 file, save, and exit:
IPV6ADDR=<ipv6address>/<prefix>
IPV6_DEFAULTGW=<ipv6gatewayip>
For example,
IPV6ADDR=fd00:10:6b50:4020::56/60
IPV6_DEFAULTGW=fd00:10:6b50:4020::1
# ifconfig
10. Login as user insight and restart the EMS services using the following commands:
$ /opt/sonus/ems/sonusEms stop
$ /opt/sonus/ems/sonusEms start
Perform the following procedure to enable IPv6 on the EMS standalone server.
1. Log in as root.
2. Append "NETWORKING_IPV6=yes" in /etc/sysconfig/network file.
3. Edit the following file:
# /etc/sysconfig/network-scripts/ifcfg-<interface name>
where the <interface name> is the name of the interface on which the IPv6 needs to be enabled.
You can obtain the interface name by executing the following command:
# ifconfig
# ifconfig
eth0 Link encap:Ethernet HWaddr 2C:76:8A:50:00:E0
inet addr:10.54.159.28 Bcast:10.54.159.255 Mask:255.255.255.0
inet6 addr: fe80::2e76:8aff:fe50:e0/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:26616624 errors:0 dropped:0 overruns:0 frame:0
TX packets:15355760 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:32241613772 (30.0 GiB) TX bytes:9634299086 (8.9 GiB)
Interrupt:32
In this example, eth0 is the name of the interface on which IPv6 needs to be enabled.
Edit the following file:
/etc/sysconfig/network-scripts/ifcfg-eth0
4. Add the following entry to the /etc/sysconfig/network-scripts/ifcfg-eth0 file, save, and exit:
IPV6ADDR=<ipv6address>/<prefix>
IPV6_DEFAULTGW=<ipv6gatewayip>
For example,
IPV6ADDR=fd00:10:6b50:4020::56/60
IPV6_DEFAULTGW=fd00:10:6b50:4020::1
# ifconfig
10. Login as user insight and restart the EMS services using the following commands:
$ /opt/sonus/ems/sonusEms stop
$ /opt/sonus/ems/sonusEms start
After enabling IPv6 on the EMS server, you need to upgrade the target devices to IPv6 and enable IPv6
management IPv6 address on the device. For more information, refer to the respective device’s Installation
Guide.
Update the Device with the IPv6 Management Address from the EMS Node
The following is the procedure to re-register the device with the IPv6 management address:
1. In the EMS Node Registration window, verify if both IPv4 and IPv6 addresses are displayed in the Mgmt
Client IP Address field.
2. Update the management client and device IP with IPv6 address and click the Update button.
3. Click Register.
Local Installation scenario with PC or Laptop on the same Network as the iLO
Local Installation using a Laptop Directly Connected to the Server Through iLO Port
Procedure to Connect Windows XP Laptop Directly to Server iLO
Remote Installation
Local Installation scenario with PC or Laptop on the same Network as the iLO
For detailed information, about installation using a PC or laptop connected on the same network as the iLO, refer the
page: Options for Mounting ISO Image.
Local Installation using a Laptop Directly Connected to the Server Through
iLO Port
For detailed information, about local installation using a laptop directly connected to server through iLO, refer the
page: Options for Mounting ISO Image.
Procedure to Connect Windows XP Laptop Directly to Server iLO
For information, about connecting Windows XP Laptop directly to Server iLO, refer the page: Options for Mounting
ISO Image.
Remote Installation
For information, about performing remote installation from a remote desktop by Sonus Customer support to the PC
or laptop on the same network as the iLO, refer the page: Options for Mounting ISO Image.
For details, regarding iLO open ports in a HP DL 380p G8 server, refer this page: Security Settings for HP ProLiant
DL380p Gen8 Server.
For details, regarding Encryption security settings, refer this page: Security Settings for HP ProLiant DL380p Gen8
Server.
For SSL Certificate Security Settings information, refer the page: Security Settings for HP ProLiant DL380p Gen8
Server.
IPMI Security
For IPMI Security details, refer the page: Security Settings for HP ProLiant DL380p Gen8 Server.
The Insight EMS has certain ports which are opened publicly. Most of them are RPC related processes, which are
no longer used in remote agent. For security reasons, these ports are closed from Release 9.2 onwards. Using the
configureRPC.sh script you can enable, disable, or see the status of RPC processes. From release 9.2 onwards,
the RPC processes will be disabled in case of fresh installation of EMS and IAS and when EMS is upgraded from a
previous versions to 9.2 or above. However, if you are upgrading from Release 9.2 to a release higher than 9.2 then
the previous state of RPC processes will be retained.
The configureRPC.sh script when run, interacts with the RPCenabled property in SystemConfig.txt file.
Only EMS uses the SystemConfig.txt file. The IAS does not use SystemConfig.txt file.
Some of the GSX Devices are using local agent functionality. RPC processes
cannot be stopped. If you want to stop RPC processes, enable remote agent for
all the GSX and rerun this script.
This implies that there are one or more GSX’s registered to the EMS which are still using the RPC process
and hence cannot be disabled. In the node registration page ensure “Use Remote Agent” checkbox is
selected for all the GSX. After “Use Remote Agent” field is updated execute the script again.
# /opt/sonus/ems/conf/security/configureRPC.sh start
starting the RPC
Starting rpcbind:
# /opt/sonus/ems/conf/security/configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
To check for the status of RPC processes, execute the following steps:
# /opt/sonus/ems/conf/security/configureRPC.sh status
rpcbind (pid 11990) is running...
To enable RPC process on EMS HA server perform the following commands on primary and secondary servers,
execute the following steps:
1. Enable the RPC processes by perform the following steps on active and standby systems
a.
# /opt/sonus/ems/conf/security/configureRPC.sh start
starting the RPC
Starting rpcbind:
# /opt/sonus/ems/conf/security/configureRPC.sh start
starting the RPC
Starting rpcbind:
# /opt/sonus/ems/conf/security/configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
# /opt/sonus/ems/conf/security/configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
To check for the status of RPC processes, execute the following steps:
# /opt/sonus/ems/conf/security/configureRPC.sh status
rpcbind (pid 11990) is running...
# /opt/sonus/ias/bin/configureRPC.sh start
starting the RPC
Starting rpcbind:
# /opt/sonus/ias/bin/configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
To check for the status of RPC processes, execute the following steps:
# /opt/sonus/ias/bin/configureRPC.sh status
rpcbind (pid 11990) is running...
Table of Contents
EMS DR Operations
Disk Mirroring
Disk Mirroring
This page contains procedures for checking and testing disk mirroring on Insight servers.
If you see the following output, you can use hpacucli for all disk mirroring procedures.
hpacucli-9.40-12.0.x86_64
If you see the following output, you can use hpssacli for all disk mirroring procedures.
hpssacli-2.0-23.0.x86_64
Prerequisites
Determine the hpacucli or hpssacli packages. Refer Disk Mirroring. Depending on the result, use the
appropriate command listed in the following procedure.
Procedure
Perform the following procedure to check the RAID configuration and status of the drives:
OR
OR
OR
OR
OR
Prerequisites
Hardware RAID must be configured and Red Hat Enterprise Linux 6.4.2 OS must be installed.
Disks must be in sync and status must be ok.
Determine the hpacucli or hpssacli packages. Refer Disk Mirroring. Depending on the result, use the
appropriate command listed in the following procedure.
Procedure
OR
Prerequisites
Determine the hpacucli or hpssacli packages. Refer Disk Mirroring. Depending on the result, use the
Procedure
1. Remove one of the disk from raid array A. For example, slot 2.:
2. Enter the following command to check the status after the disk is removed from slot 2::
OR
4. Insert the new disk of the same size in slot 2 and check the status and enter the following command:
OR
5. Recovery takes time depending on the amount of data on the disk. Enter the following command to continue
to monitor the disk status:
OR
This section provides information for performing administrative tasks specifically done on EMS Standalone (SA)
server.
To verify the version of Insight installed, enter the following command as user root:
Expected output:
SONSems-V09.03.00-R000.x86_64
$ cd /opt/sonus/ems
$ ./sonusEms status
Occasionally, it may become necessary to start the Insight server. To do so, use the following commands:
You can add arguments to the sonusEms start command to control memory size allocations. For a list of the
arguments and their syntax, type:
# ./sonusEms -help
Occasionally, it may become necessary to stop the Insight server. To do so, use the following commands:
$ cd /opt/sonus/ems
$ ./sonusEms stop
In the event you need to change the IP address of your Insight server, perform the following procedure. If desired,
you can change the hostname as well as the IP address.
If you want to change the hostname of the Insight machine without changing the IP address, do not perform
this procedure. Instead, use Changing the Hostname for Insight without Changing the IP Address.
1. Associate all managed nodes with the intended new IP address (see “Managed Device Association” in the
Administration chapter of the Insight User Guide). Setting the association now allows the server to begin
receiving and processing trap information immediately upon restart.
2. Shut down the Insight management processes.
3. Have your UNIX/Linux System Administrator change the address of the system. If you also want to change
the hostname of your system, have your UNIX/Linux System Administrator change it at this time.
4. As root user, change the IP address of the server, change the IP address in the database tables, and
update the Netcool license information as follows:
a. Enter the following commands:
# cd /opt/sonus/ems/conf/
# ./changeIpAddress.sh -i <ip_address> -d -a
After IP address is changed, ensure that the IP address entry exists or is same as in the /et
c/hosts
$ /opt/sonus/ems/sonusEms start
6. Start Insight.
7. Disassociate all registered nodes with the old IP address (see “Managed Device Association” in the Insight
Administration chapter of the Insight EMS User Guide).
In the event you need to change the hostname of your Insight server but you are not changing the IP address,
perform the following procedure.
The EMS hostname is limited in length to 64 characters. The hostname can only contain lowercase letters
[a-z] and digits [0-9]. The hostname cannot start with a digit. Special characters including hyphen are not
allowed in hostname.
Perform the following procedure to change the Hostname without changing the Insight IP address:
If you are changing both the IP address and the hostname of the Insight machine, do not perform this
procedure. Instead, use Changing the Insight IP Address.
# cd /opt/sonus/ems/conf/
# ./changeIpAddress.sh -i <ip_address>
The new hostname is automatically put into the appropriate files. The IP address of the system is not
changed.
After hostname is changed, ensure that the hostname entry exists or is same as in the /etc
/hosts
$ /opt/sonus/ems/sonusEms start
The file expdp_stats_data_manual.dmp will be generated only if the PM stats export option is enabled.
exp_data_manual.dmp
exp_strct_manual.dmp
expdp_data_manual.dmp
expdp_strct_manual.dmp
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
System Backup
# cd /opt/sonus/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine. Use a directory name that
will clearly identify the EMS server that created the backup files. Make a note of the directory path because
you will need it later if you need to restore the system.
The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, dmp files) in the backup directory.
If you need to restore your Insight system, perform the following tasks:
$ /opt/sonus/ems/sonusEms start
2. Log in as root.
3. From the backup directory you used for this EMS server in "System Backup", copy the dmp files to the
<ORACLE_BASE>/backup/dump directory. Also, copy the backupFiles.tar file to the /tmp directory.
If the dmp files are copied to <ORACLE_BASE>/backup/dump using an unconventional method, change
the owner and group of the files to Oracle and DBA.
To change the owner and group of files to Oracle and DBA, enter the following commands:
# cd /opt/oracle/backup/dump
# chown oracle:dba expdp_data_manual.dmp
expdp_strct_manual.dmp
# cd /opt/sonus/ems/conf/jumpstart
# ./emsMigrate.sh
Enter maximum disk space allowed for fm logs or return to leave unchanged
format: number[M|G]
example: 100M -- sets the value to 100mb
current value: 100M:
Press ENTER for default value or enter a valid digit followed by M to overwrite.
For example, 8M.
Do you wish to import User Activity Logs, PM Stats and TrunkGroup Tables
[y|Y,n|N] ?
Type y to restore the data (User Activity Logs, PM Stats and TrunkGroup Tables) or type n if you do not want
to restore the data and press ENTER.
$ /opt/sonus/ems/sonusEms start
The Insight Database should automatically start and stop at system startup and shutdown time respectively.
If you wish to manually start the Insight database use the following instructions:
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If you wish to manually stop the Insight database use the following instructions:
1. Log in as user insight and shut down the Sonus Insight server on EMS Standalone (SA) using the
following command:
$ /opt/sonus/ems/sonusEms stop
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> shutdown immediate
SQL> exit
If the Insight database is running, a list of active oracle processes are displayed.
If the Insight database is not running, no processes are displayed.
The client listener should automatically startup and shutdown with the Insight database. If you need to manually start
or stop the listener, use the following instructions:
1. To manually start the listener, login as oracle and use the following command:
$ lsnrctl start
1. To manually stop the listener, login as oracle and use the following command:
$ lsnrctl stop
$ lsnrctl status
Configuring Netcool
On this page:
Netcool Configuration
# cd /opt/sonus/ems/conf/
# ./netcoolsetup.ksh
3. The script prompts you for how much disk space to allocate for FM log files. Enter a value or accept the
default.
4. Start the Netcool processes. See Starting, Stopping, or Verifying the Netcool Process.
Under normal circumstances the Netcool processes start and stop when you start or stop the Insight server. If you
want to start, stop, or check the status of the Netcool processes separately from the Insight server, use the following
commands.
To start the Netcool process, as user insight execute the following commands:
$ cd /opt/sonus/ems
$ ./sonusEms start fm
$ ./sonusEms status fm
Several Netcool components have a delayed startup due to their dependence on the Netcool
database. These processes show “PENDING” status. If processes remain in a “PENDING” state
longer than two minutes after startup, there is a configuration problem.
$ cd /opt/sonus/ems
$ ./sonusEms stop fm
$ /opt/sonus/ems/sonusEms stop
$ /opt/sonus/ems/sonusEms stop fm
Ensure that all services are stopped, before executing the following command.
$ /opt/sonus/ems/conf/netcool_rename_db.ksh
Enter the old DB name which is found in step 1 and press ENTER.
5. System displays the following:
6.
$ /opt/sonus/ems/sonusEms start
Limitation
Following are the limitations when changing Netcool Object Server Name:
Avoid using NCO_PA, NCO_GATE and NCO_PROXY as the new Netcool Object Server Name. These are used
only for Internal purpose.
Upgrade operation is not supported with the changed netcool object server name. In order to do so, you need
to first rollback to default netcool object server name “SONUSDB”.
To verify the version of Insight installed, enter the following command as user root:
Expected output:
$ cd /opt/sonus/ems/conf/HA/RAC
$ ./sonusEMS status
sonus.owl
1 ONLINE ONLINE harare
2 ONLINE ONLINE belgrade
sonus.rmtexec
1 ONLINE ONLINE harare
2 ONLINE ONLINE belgrade
sonus.route
1 ONLINE ONLINE harare
sonus.trapProbe
1 ONLINE ONLINE harare
2 ONLINE ONLINE belgrade
sonus.vip
1 ONLINE ONLINE harare
sonus.vipv6
1 ONLINE OFFLINE
sonus.warmDeploy
1 ONLINE ONLINE harare
2 ONLINE OFFLINE
In the above output, ems1 is the active system and ems2 is the standby system. ems1 has the various processes
running that are only running on a single server. ems1 also has the sonus.vip and sonus.vipv6 resource. The
following are the list of process names in the status map along with the servers on which they are running:
Occasionally, it may become necessary to start the EMS and Insight services. To do so, use the following
commands:
$ cd /opt/sonus/ems/conf/HA/RAC
$ ./sonusEMS startAll
Occasionally, it may become necessary to stop the EMS and Insight services. To do so, use the following
commands:
$ cd /opt/sonus/ems/conf/HA/RAC
$ ./sonusEMS stopAll
If EMS cannot be stopped or if it is taking a long time to stop EMS then use the sonusEMS stopAll -f command,
to stop EMS forcefully. The sonusEMS stopAll -f command is used, whenever an EMS process indicates a '
FAILED' state while starting.
This section describes how to perform a complete system backup, and how to perform a system restore using the
backup files.
System Backup
Restoring the System
System Backup
# cd /opt/sonus/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the EMS machine. Use a directory name that will
clearly identify the EMS server that created the backup files. Make a note of the directory path because you
will need it later if you need to restore the system. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of backupFiles.tar and dmp files in the backup directory.
If EMS upgrade is not successful or if EMS is not stable after an upgrade then perform the following steps:
If EMS is successfully upgraded then data prior to upgrade is retained and there is no need to restore the
backup. Restore data is essentially used when upgrade fails.
1. Install Insight on both the EMS HA systems (active and standby) by performing the following:
a. Perform Insight Installation. see "Kickstart the HP G8 Servers ".
b. Configure RAID and Install Oracle Clusterware.
c.
$ /opt/sonus/ems/conf/HA/RAC/sonusEms startAll
2. Log in as root. From the backup directory you used for this EMS server, copy the following files from the
backup directory on the remote server to the current location (For example, /export/home/backups):
The file expdp_stats_data_manual.dmp will be generated only if the PM stats export option is enabled.
exp_data_manual.dmp
exp_strct_manual.dmp
expdp_data_manual.dmp
expdp_strct_manual.dmp
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
# cd /export/home/pkg
# ./EMSmigration -b /export/home/backups
OR Replace the directory /export/home/backups with the directory that you are using for your backup
data. The following output appears:
HA Manual Switchover
It may become necessary in a HA system, to initiate a manual switchover from the active to the standby system.
When connectivity is lost to the IBM DS3524, the node which loses connectivity will reboot. This will trigger
a failover if the connectivity is lost on the active node.
# cd /opt/sonus/ems/conf/HA/RAC
# ./sonusEMS relocate
Troubleshooting
HA Logs
haRac.log: Contains information on the start, stop, and status commands being run continuously to monitor
the health of the system. The haRac.log is located at /opt/sonus/ems/logs.
haMonitor.log: Contains output of the Sonus Monitor script, which monitors Clusterware and looks for
irregularities in the system. The haMonitor.log is located at /opt/sonus/ems/
Additional Clusterware log files are stored at /opt/11.2.0/grid/logs/<hostname>.
alert<hostname>.log: Contains high-level alerts from Clusterware - good place to start when debugging
Clusterware errors.
crsd/crsd.log: Contains detailed output from the Cluster Ready Services daemon (crsd): Primarily related to
Rebooting an HA server
If both the servers are rebooted simultaneously, then it will take a few minutes for the cluster services to be restored.
If the HA systems get into a state where one of the servers is not properly becoming the active or standby, it is
recommended to reboot only the server that is causing issues and not any other servers. The server can be
rebooted by using the Linux reboot command as the root user.
If the RAID is locked, contact Sonus support to manually unlock the RAID. Because of the risk of dual
mounting the RAID, removing the RAID lock must be done by Sonus support ONLY.
Resetting HA Configuration
If any of the processes show up in the UNKNOWN state after running a sonusEMS stopAll, then you need to reset
the HA configuration. This can be performed by running the following command as the root user:
# /opt/sonus/ems/conf/HA/RAC/hamgmt reset
This will shut down the EMS processes on both servers, delete and re-create the Clusterware configuration, and
then restart the EMS processes.
If there is a hardware failure or any other failure which causes one of the systems in the HA setup to become
unstable or inoperable, then you can take the system out of service.Run the following command as the root user on
the system that is to be taken out of clusterware.
# /opt/sonus/ems/conf/HA/RAC/hamgmt shutdownNode
When the node is out of service, there is only one node available, and automatic or manual failover is not
possible.
Run the following command, if you want to bring the node back into service:
# /opt/sonus/ems/conf/HA/RAC/hamgmt startupNode
This will bring the system back into service as the standby.
For adding a new IBM RAID 3524 Trap destination for a HA setup, perform the following steps:
# chkconfig SMagent on
# chkconfig SMmonitor on
3. Execute the following command, to send IBM RAID traps to the specified new destination:
Example:
#SMcli -n EMSIBMRAID -a trap:public,10.54.58.101
By default the IBM RAID traps are sent to the loopback IP address: 127.0.0.1. To send IBM RAID
Traps to loopback IP address, execute the following command:
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS stopAll
Ensure that all services are stopped, before executing the following command.
$ /opt/sonus/ems/conf/HA/RAC/AS/netcool_rename_db.ksh
Enter the old DB name which is found in step 1 and press ENTER.
5. System displays the following:
Ensure that all services are stopped, before executing the following command.
# cd <BASE_DIR>/conf/HA/RAC/AS
# ./netcool_rename_db_RAC.sh
Enter the old DB name which is found in step 1 and press ENTER.
8. System displays the following:
# /opt/sonus/ems/conf/HA/RAC/sonusEMS startAll
Limitation
Avoid using NCO_PA, NCO_GATE and NCO_PROXY as the new Netcool Object Server Name. These are used
only for Internal purpose.
Upgrade operation is not supported with the changed netcool object server name. In order to do so, you need
to first rollback to default netcool object server name “SONUSDB”.
The Insight Database should automatically start and stop at system startup and shutdown time respectively.
If you wish to manually start the Insight database use the following instructions:
1. Log in as the user oracle on active server and issue the following commands:
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
2. Log in as the user oracle on standby server and issue the following commands to start EMS:
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
3. Start EMS on active and standby servers as user insight, by executing the following command on active
server:
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS startAll
If you wish to manually stop the Insight database use the following instructions:
1. Stop EMS on active and standby servers as user insight, by executing the following command on active
server:
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS stopAll
2. Log in as the user oracle on standby server and issue the following commands:
3. Log in as the user oracle on active server and issue the following commands:
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> shutdown immediate
SQL> exit
1. Log in as oracle user and enter the following command on active and standby servers to check if oracle
processes are running:
If the Insight database is running, a list of active oracle processes are displayed.
If the Insight database is not running, no processes are displayed.
EMS DR Operations
Table of Contents
Setup
Switchover
Failover
Resume
Teardown
Status
Trap Notification
EMS Logs
The EMS application as a whole is not running on the target system. However, the target system does receive the
same traps that are received by the source system. The target system cannot be used as a functioning EMS until
you switchover from the source and target or failover from the source to the target.
The Sonus EMS DR solution uses Data Guard, employing a Physical standby database with Maximum performance
protection mode.
The physical standby (Target) database is an identical copy of the primary (Source) database. The physical standby
database has on-disk database structures that are identical to the primary database on a block-for-block basis. The
database schema, including indexes, are the same. A physical standby database is kept synchronized with the
primary database by recovering the redo data received from the primary database.
The Maximum performance protection mode provides the highest level of data protection that is possible without
affecting the performance of the primary database. This is accomplished by allowing a transaction to commit as
soon as the redo data needed to recover that transaction is written to the local online redo log. The primary
database’s redo data stream is also written to the standby database, but that redo stream is written asynchronously
with respect to the commitment of the transactions that create the redo data.
For the DR setup, if the ems.keystore password is changed on one EMS (either source / target), then it
needs to be manually changed on the other EMS (either source / target). If it is not changed, the other
EMS will not be able to open the ems.keystore at all and all SSL connections will fail. In other words, the
ems.keystore passwords must be kept the same on both EMS (source and target) at all times.
Setup
The Setup operation configures the Source (Primary DB) and Target (Standby DB) sites for replication, backs up the
Primary database, restores it on the Standby site, and initiates the replication process. This operation is performed
to initially setup a replicated environment, or after a previous DR setup has been torn down. During this step, some
EMS configuration (password files, managed node info) files are also synced from the source to target. Before
performing this procedure, both the source and target sites must have EMS installed.
Setting up DR is a service-impacting operation. The source EMS is brought down for the initial part of the
setup process. The target EMS database is overwritten with source database, as part of DR setup.
Prerequisites
EMS should be up and running on the intended Source and Target sites.
Both sites should have the same EMS version running.
Verify the network connectivity between the 4 nodes (of 2 sites) with: Source and Target sites. Ensure that
the ping times between sites should be 225 millis or lower.
Ensure that the insight system user passwords are same on both the Source and Target EMS sites.
Setting up DR
Perform the following procedure to setup DR. Run the manageDR command on the intended source node (if EMS
HA, run on node 1 of source site).
Press y when the command output asks "Do you want to continue with setting up DR? [y|n]:"
This step will setup DR with the current host emshp5 as the DR source.
'insight' Linux system user password should be same on all systems.
You will be prompted for DR target node IPv4 address.
[ WARNING ] Database on DR target node will be overwritten and brought in sync
with this local database
Do you want to continue with setting up DR? [y|n]: y
.............................................
........<Command output cut for brevity>.....
.............................................
Switchover
Switchover is a planned role reversal between the Source (Primary DB) and the Target (Standby DB) to avoid
downtime during scheduled maintenance on the Source (Primary DB) or to test readiness for future role transitions.
A switchover guarantees no data loss. During switchover, the Source system transitions to a Target and the Target
system transitions to a Source.
Prerequisites
Login to Source EMS Fault Manager (FM) GUI and ensure that there are no recent recurring DR related
traps, before you perform a switchover.
Run 'manageDR status' on the Source node. For details, see Status. Verify that the status output displays
that replication is working correctly.
Check the EMS server status on both Source & Target sites. For details, see Checking the Insight Server
Status. Verify that all required EMS processes are online. Only a subset of EMS processes run on DR target
site as there is no read/write access to the local standby database.
Run the 'manageDR switchover' command on the source node (if EMS HA, run on node 1 of source site).
Press 'y' when the command output prompts you a confirmation message "Do you want to continue with
DR switchover? [y|n]:"
This step will switchover DR from this node emshp5 [10.155.75.13] to remote
node emshp4 [10.155.75.17]
Do you want to continue with DR switchover? [y|n]: y
.............................................
........<Command output cut for brevity>.....
.............................................
After successfully completing the switchover, it is a recommended to check the DR replication status
(manageDR status). For details, refer Status on the new Source node, after about 10 mins, to ensure that the
data is replicating successfully.
Failover
A failover is an unplanned operation performed when the source site goes offline for some reason and you need to
promote the target site into a fully functional EMS. Run the 'manageDR failover' command on the target node (if
EMS HA, run on node 1 of target site), when the source goes offline. A manual failover is performed when the
Source (Primary DB) fails and the Target (Standby DB) and target system is transitioned to take over the new
Source, allowing business operations to continue. The user must run the failover procedure in order for a failover to
take place.
Performing a failover operation may involve some data loss because of the inability to extract the most
recent database changes from the down Source (Primary DB) site.
After the old Source site comes back online at a later time, you should perform a resume operation "manageDR
resume". For details, see Resume. This will convert the old Source into a new Target role.
Press y when the command output asks "Do you want to continue with DR failover? [y|n]:".
This step will failover DR from remote node emshp4 [10.155.75.17] to this
local node emshp5 [10.155.75.13]
Do you want to continue with DR failover? [y|n]: y
.............................................
........<Command output cut for brevity>.....
.............................................
After the old source (now target) site comes back, perform the resume operation, to sync up that site's
database with the current source site.
Resume
Run the resume operation to perform the following tasks:
To re-sync the previous Source EMS site after a failover has been invoked. Perform the resume operation on
the same host as the manageDR failover was run from earlier.
Resume operation should only be performed after the EMS server on the previous source (new target) is up
and running.
To re-sync a Target EMS site that has become out-of-sync with the Source because of an extended outage.
The resume procedure does not involve any downtime and the source EMS server remains up and running
while the resume procedure is performed.
Press 'y' when the command output prompts a confirmation message "Do you want to continue with
resume of DR replication? [y|n]:"
This step will resume DR with the current host emshp5 as the DR source.
Performing resume (sync) operation after a previous failover.
Following tasks will be attempted:
- Synchronize the target node emshp4 with the current node.
Do you want to continue with resume of DR replication? [y|n]: y
1. [20:51:16] emshp5# Running pre-resume checks
2. [20:51:16] emshp5# Checking connection to DR peer node
10.155.75.17
3. [20:51:16] emshp5# Pinging peer IP 10.155.75.17
4. [20:51:16] emshp5# Checking insight@10.155.75.17 user equivalence
5. [20:51:16] emshp5# Completed user equivalence setup to DR peer
emshp4
.............................................
........<Command output cut for brevity>.....
.............................................
2. After successfully completing the resume operation, it may take 5-10 minutes for redo logs to start getting
transferred and applied.
Verify the replication status ("Status") and ensure that replication is resumed.
3. If you have just performed 'resume' operation and that was a result of a previous failover, and you are using
IAS, then this additional step is required:
After it is verified on the new source node that replication is working successfully, run the IAS procedure.
Teardown
This procedure will uninstall DR and convert the DR setup into 2 separate non-replicated systems, with no
replication relation (source/target) between them.
Press 'y', when the command output prompts you a confirmation message "Do you want to
continue with DR teardown? [y|n]:"
This step will teardown DR from this node emshp5 [10.155.75.13] to remote node
emshp4 [10.155.75.17]
Do you want to continue with DR teardown? [y|n]: y
.............................................
........<Command output cut for brevity>.....
.............................................
Status
Current status of DR replication can be checked by running the 'manageDR status' command. Each set of
changes is displayed in a single line, and has a sequence number and an associated timestamp when copy or apply
was done. Threads 1 and 2 represent the node 1 and node 2 respectively. Replication activity over the last 1 hour is
shown in the output of 'status' command.
Run the 'manageDR status' command on the source node (if EMS HA, run on node 1 of source site).
1. Run the following command on the source site node 1 as root user.
a. Before performing a switchover, ensure that DR setup has completed. You can identify, DR setup
completion by executing the command manageDR status. The last column 'Applied' of the
command output must display 'YES' for all the rows, except the last row, which displays 'NO'.
The following command output indicates that DR replication is still under-progress, as the multiple
rows show 'NO' as status in 'Applied' column.
If DR Setup has not completed, you must not perform the switch-over. Wait for DR setup to
complete and only perform a switchover after you see the status as 'YES' for all rows, except
the last row in the 'Applied' column.
b. The following example indicates successful DR setup, as it can be seen that ' APPLIED' status is 'YES'
for all rows, except the last row:
Trap Notification
EMS DR setup supports following trap notifications:
sonusEmsDbDrRepOutOfSyncNotification: Sent when redo logs are not being synced correctly
between source and target.
sonusEmsDbDrErrorNotification: Sent when either source or target database instance is down.
sonusEmsDbDrRepConnectFailNotification: Sent when there is a connectivity issue between source
and target.
Additional details about these trap notifications are available in the Alarm Troubleshooting guide. (see “Disaster
Recovery” section in Insight Alarm Troubleshooting page)
EMS Logs
Logging
Log output from manageDR script goes to /opt/sonus/ems/logs/manageDR.log. This log file gets written on
both source and target sites. Subsequent execution of the manageDR script append to this log file. In addition,
manageDR script calls other internal lower level replication scripts (for example, rep_status). Output from these
scripts, as well as their log files, can be viewed on the console output of manageDR run. These scripts write log
output to files under the /opt/oracle/orarepl/SIDB/logs directory.
Certain EMS configuration files (password, node information etc.) are kept in sync between the source and target via
a syncFiles.sh cron job which uses rsync to keep the text files in sync between the sites. This syncFiles.sh
script writes log output to /opt/sonus/ems/logs/syncFiles.log file. For EMS SA, the log output is written to
/opt/oracle/orarepl/SIDB/logs directory. For EMS HA, this log directory is
/opt/oracle/orarepl/SIDB0[1|2]/logs.
Table of Contents
DR Configuration
For complete installation instructions, refer the following table which provides information related to the tasks and
respective EMS documents to be referred for additional information.
Abbreviations Definitions
SA - Standalone A Standalone (SA) EMS system, consisting of a single EMS application server.
HA – High Availability A High Availability (HA) EMS system, consisting of two EMS application servers (Active and
Standby), with a single shared RAID system, co-located at the same geographical site.
DR - Disaster Recovery A Disaster Recovery (DR) EMS system, consisting of two geographically separated EMS
Systems (Source and Target), either both Standalone or both High Availability.
RAC – Real Application Oracle Real Application Cluster (RAC) provides software for clustering and high-availability in
Cluster an Oracle database environment.
RAID – Redundant Array RAID is a storage technology that provides the ability to combine multiple disks into logical units
of Independent Disks for data redundancy and performance enhancement.
Active and Standby Active and Standby terms designate two servers in a HA deployment. The Active server is the
one which currently processing the services, while Standby server acts as a standby.
In case, if the Active server fails, the Standby takes over and provides computing services to
clients. Also, the role of Standby is changed to an Active server after a failover.
1. Login to Salesforce customer portal using your Sonus provided login, and click SOFTWARE DOWNLOADS.
2.
Prerequisites
Files to Download
Installing EMS Standalone (SA) using iLO
Verifying the EMS Installation
Post-Installation Checks
Prerequisites
All servers and hardware must be installed and powered up, all network connections must be established,
and iLO advance license must be installed, before performing installation.
Before performing the EMS SA installation, collect the information pertaining to the IP, Subnet mask, and
Gateway. The networking details you need to collect are available in the section Information Required Prior to
Installing Insight SA.
Files to Download
The following table provides list of files to be downloaded for ISO installation.
ems-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso
SSGUI_V09.03.00R000_RHEL.tar
Firmware file
4.
$ ./sonusEms start
The EMS ISO Installation takes approximately 1 hour 20 to 1 hour 30 minutes to complete.
To verify the EMS installation, execute the following command after the Linux SA EMS installation is complete.
# /opt/sonus/ems/sonusEms status
$ ./sonusEms status
Post-Installation Checks
After completing the EMS installation, ensure that the PSX manager GUI, iLO firmware version, and Device
Manager are upgraded to the latest. For more information, refer Performing Post-installation Tasks on EMS SA.
Prerequisites
Installing EMS High Availability (HA) using iLO
Installing RAC
Installing the Oracle Clusterware and EMS Application
Verifying the EMS Installation
Post Installation Checks
Upgrading HP iLO Firmware Version
Upgrading IBM Storwize V3700 Firmware Version
Prerequisites
All servers and hardware must be installed and powered up, all network connections must be established,
and iLO advance license must be installed, before performing installation.
Identify and finalize the IBM RAID type (IBM DS3524 or IBM V3700) and setup the hardware, cable, and
network connection. For more details, refer Hardware Installation and Setup.
Before performing the EMS HA installation, collect the information pertaining to the IP, Subnet mask,
Gateway. The networking details you need to collect are available in the section Information Required Prior to
Installing Insight HA .
Configure RAID on local disks.
Note: Steps 3 to 7 must be performed on both the servers (Active and Standby).
Installing RAC
The following steps are executed only on the Active EMS server, but also performs operations on the Standby
server, as well.
To install RAC, perform the following steps:
# cd /export/home/pkg/
# cp rac.conf_3524.template <anyName>3524.rac.conf
OR
b.
# cp rac.conf_3700.template <anyName>3700.rac.conf
3. Based on IBM RAID you are planning to use (IBM DS3524 or IBM V3700), update the respective
configuration template file (rac.conf_3524.template or rac.conf_3700.template) with parameters
matching your network setup using vi editor. The information pertaining to network details you need to collect
are available in Information Required Prior to Installing Insight HA.
4. Configure RAID and network bonding for respective IBM RAID being used as follows:
a. If you are using IBM DS3524 RAID, execute the following command:
# ./RACinstall_1 <anyName>3524.rac.conf
OR
b. If you are using IBM V3700 RAID, execute the following command:
# ./RACinstall_1 <anyName>3700.rac.conf
The following steps are executed only on the Active EMS Server. To install the Oracle Cluster and EMS Application,
perform the following steps:
# cd /export/home/pkg/
# ./EMSRACinstall
# /opt/sonus/ems/conf/HA/RAC/sonusEMS status
You should see a message with all the EMS services running on Active and Standby servers.
The following firmware-related checks must be performed after completing the EMS Application installation.
The iLO 4 firmware version running on your EMS system may require an update.
To know the iLO firmware version running on your EMS system and update the iLO firmware to the latest version,
do the following:
Installing EMS V09.03.00 overrides the device manager (DM) on the existing EMS and provides support for
SBC 4.0 and prior releases. For more information on Device Manager, see the SBC Manager section of the
Insight User Guide.
Ensure that the IBM V3700 RAID firmware version is upgraded to the latest. In case, you do not have the latest IBM
V3700 firmware version, upgrade it to the latest version. For more information about latest IBM V3700 firmware
version and upgrading the IBM V3700 firmware version, refer the IBM Storwize V3700 Firmware Upgrade Quick
Start section.
DR Configuration
Prerequisites
1. EMS SA or HA installation should be completed on both the Source and Target DR sites.
2. The EMS should be running on the Source and Target systems.
3. The Target should be accessible from the Source EMS systems, and vice versa.
For configuring DR for Standalone (SA) EMS system, the following steps are executed only on the DR Source SA
EMS System. If you are configuring DR for High Availability (HA) EMS systems, the following steps are executed
only on the DR Source Active EMS system.
# cd /opt/sonus/ems/conf/DR
# ./manageDR setup
3. A confirmation message to setup DR, is displayed. Press y when asked "Do you want to continue
with setting up DR? [y|n]:"
4. For SA DR setup, enter the Target IP and for HA DR setup, enter the Target Active IP when asked "Please
specify the IPv4 Address of Node 1 of the remote DR TARGET cluster".
"Please specify the IPv4 Address of Node 1 of the remote DR TARGET cluster"
The DR Setup configures the Source and Target clusters for replication, backs up the Active database,
restores it on the Standby cluster, and initiates the replication process.
If you want to verify DR setup, with EMS HA systems, the following steps are executed only on the DR Source EMS
Active System. For verifying DR setup, with EMS SA system, the following steps are executed only on DR source
SA system.
1. Ensure that the directory path is /opt/sonus/ems/conf/DR. If not, change the path, using following
command:
# ./manageDR status
EMS DR Upgrade
Related Documentation
For complete upgrade instructions, refer the following table which provides information related to the tasks and
respective EMS documents to be referred for additional information.
EMS DR Operations
Abbreviations Definitions
SA - Standalone A Standalone (SA) EMS system, consisting of a single EMS application server.
HA – High Availability A High Availability (HA) EMS system, consisting of two EMS application servers (Active and
Standby), with a single shared RAID system, co-located at the same geographical site.
DR - Disaster Recovery A Disaster Recovery (DR) EMS system, consisting of two geographically separated EMS
Systems (Source and Target), either both Standalone or both High Availability.
RAC – Real Application Oracle Real Application Cluster (RAC) provides software for clustering and high-availability in an
Cluster Oracle database environment.
RAID – Redundant RAID is a storage technology that provides the ability to combine multiple disks into logical units
Array of Independent for data redundancy and performance enhancement.
Disks
Active and Standby Active and Standby terms designate two servers in a HA deployment. The Active server is the
one which is currently processing the services, while Standby server acts as a standby.
In case, if the Active server fails, the Standby takes over and provides computing services to
clients. Also, the role of Standby is changed to an Active server after a failover.
For upgrading from a previous EMS software release to V09.03.00, you must upgrade using the ISO based upgrade
method. The ISO based upgrade method enables you to upgrade the Operating System, database, apart from
upgrading the EMS Software Application.
Also, for upgrading from EMS 09.03.00R000 to a post-09.03.00 EMS minor or patch release, use the EMS ISO
upgrade method. For example, for upgrading from EMS V09.03.00 to EMS V09.03.01, use the ISO upgrade method.
The Standalone upgrade procedure has been simplified to a great extent. Execute the script upgradeEMS.sh and
point to the path of the ISO. It also provides an option to generate the ems_upgrade.conf configuration file,
which has upgrade and backup parameters list, that can be changed.
Prerequisites
The EMS upgrade procedure must be executed as superuser " root ".
Do not ‘su’ to root from a different user-id.
Files to be Downloaded
The following table provides list of files to be downloaded for ISO upgrade.
ems-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso
upgradeEMS.sh
SSGUI_V09.03.00R000_RHEL.tar
Firmware file
# rm -rf /opt/emsInstall/<Previous-Release-Directory>
For Example:
# rm -rf /opt/emsInstall/9.2
# rm -rf /opt/emsInstall/9.1
The EMS software bundle is available as a software package downloadable from the Salesforce customer portal.
1. Login to Salesforce customer portal using your Sonus provided login, and click SOFTWARE DOWNLOADS .
2. Click software bundle WL9.3 to view its contents, and then click Request Download.
3. Fill in the Software Download Form, accept the license agreement and click Submit.
4. When the "Request Status" on the SOFTWARE REQUESTS page displays "Download Available", click the
links in the WL9.3 software bundle to download the files.
For the list of files you need to download, refer the following section.
Download the following files from the Sonus Salesforce Customer Portal to perform the Insight Upgrade using an
ISO Image.
# mkdir -p
/opt/emsInstall/<NEW_EMS_VERSION>/
# mkdir -p /opt/emsInstall/9.3/
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
# chmod +x upgradeEMS.sh
Before upgrading using Sonus Salesforce Customer Portal, you need to take a backup of /etc/ntp.conf and /
etc/issue files. You can restore this after completing the upgrade.
While performing a Standalone upgrade, a configuration file ems_upgrade.conf is generated, which has
parameters related to backup. The ems_upgrade.conf configuration file also displays the comments marked for
each of the parameters inside the ems_upgrade.conf configuration file. A sample configuration file with
parameter details is given for here for reference.
# Directory, where the EMS backup should be kept. Please modify, if required.
_ems_backup_folder=/opt/sonus/backup
# If the value is set to "true", then the data backup will be scp-ed to a
remote server.
# By default, the value is set to "true" for KICKSTART-upgrade and
"false" for INPLACE-upgrade.Change it to true/false to override the
default value.
_backup_remote_copy=
# Please note that, this directory should exist in the remote server.
_backup_remote_dir=/opt/sonus/backup
Firmware Upgrade
Downloading the HP firmware file and verify if the HP firmware version is the latest. For more information
about HP firmware latest version and procedure to upgrade the HP firmware, refer the page https://support.
sonus.net/display/ALLDOC/HP+DL380p+G8+Firmware+Upgrade.
This is the HP G8 DL380 firmware upgrade file. Ensure that the HP DL380 G8 firmware is upgraded after you perform the EMS Download the firmware file from Salesforce
Software upgrade using the ISO file. Customer Portal to:
/opt/sonus/platform directory in the server.
ISO Upgrade
ISO Upgrade
You can perform an ISO upgrade using either INPLACE or KICKSTART upgrade type. Be default, the
upgradetype parameter in ems_upgrade.conf configuration file is set to INPLACE. It is recommended to use
INPLACE upgrade. The INPLACE upgrades preserves all system settings, services or custom configurations of the
operating system. In case, you want to perform a KICKSTART upgrade then you need to change the value of
upgradetype parameter to KICKSTART in ems_upgrade.conf configuration file.
Also, for upgrading from EMS 09.03.00R000 to a post-09.03.00 EMS minor or patch release, use the EMS
ISO upgrade method. For example, for upgrading from EMS V09.03.00 to EMS V09.03.01, use the ISO
upgrade method.
To summarize, in KICKSTART upgrade the high-level steps you need to perform are:
It is recommended to use INPLACE upgrade. Before upgrading using Sonus Salesforce Customer Portal,
you need to take a backup of /etc/ntp.conf and /etc/issue files. You can restore this after completing the
upgrade.
INPLACE Upgrade
KICKSTART Upgrade
INPLACE Upgrade
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
The total time taken for upgrading and total service downtime of the EMS Standalone server during the ISO
INPLACE upgrade is 35 to 40 minutes approximately.
You can perform an ISO upgrade using either INPLACE or KICKSTART upgrade type. By default, the
upgradetype parameter in ems_upgrade.conf configuration file is set to INPLACE. It is recommended to use
INPLACE upgrade. The INPLACE upgrades preserves all system settings, services or custom configurations of the
operating system.
Before performing the upgrade, you need to take a backup of /etc/ntp.conf and /etc/issue files.
You can restore these files after the EMS upgrade is complete.
To upgrade the EMS Standalone system using INPLACE upgrade, perform the following steps:
The <NEW_EMS_VERSION> is the directory, created while downloading the upgrade files. For
example, if you have created a directory /opt/emsInstall/9.3 for upgrading to 9.3, change the
directory to /opt/emsInstall/9.3.x/ (replace <NEW_EMS_VERSION>) with 9.3 in the following
command:
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
4. Change the permission of the upgradeEMS.sh file using the following command:
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
# chmod +x upgradeEMS.sh
5. INPLACE upgrade can be done using the default settings or by configuring the ems_upgrade.conf file.
# ./upgradeEMS.sh -p
/opt/emsInstall/<NEW_EMS_VERSION>/ems-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso
7. To change the default EMS upgrade and backup configuration, perform the following:
# ./upgradeEMS.sh -g /opt/emsInstall/<NEW_EMS_VERSION/ems_upgrade.conf
b. Once the configuration file is generated, you can edit the parameters in the ems_upgrade.conf file
using the vi editor. The ems_upgrade.conf file contains comments that guides you in editing the
upgrade/backup parameter values.
# vi ems_upgrade.conf
# If the value is set to "true", then the data backup will be scp-ed to a
remote server.
# By default, the value is set to "true" for KICKSTART-upgrade and "false"
for INPLACE-upgrade.Change it to true/false to override the default value.
_backup_remote_copy=
# Remote Server Details : The following are to be given only if this server
has a password-less connection to the remote server where you want the
backup to be copied. This configuration will be read, only if
_backup_remote_copy is "true".
# Please enter the remote server's IP.
_backup_remote_IP=
8. The system gets rebooted if there is an OS upgrade involved. The upgrade will continue after the system
starts.
After the system is up, execute the following command to see the upgrade progress:
# tail -f /var/sadm/install/logs/upgradeEMS.log
10. Perform the following steps to verify if EMS, database and kernel have been updated:
a. Execute the following command to verify the platform version:
# cat /etc/os_version
06.04.02.00R000
# uname -r
2.6.32-504.3.3.el6.x86_64
c. Login as oracle user and execute following command to verify Oracle database version:
$ sqlplus -version
SQL*Plus: Release 11.2.0.3.0 Production
d. Login as oracle user and execute following command to verify the latest Oracle database patch
version:
Oracle patch version must be Patch description: "Database Patch Set Update : 11.2.0.3.0
(19271438)"
After completing the EMS upgrade, perform the post-upgrade tasks. For post-upgrade tasks
details, refer the section Post-Upgrade Tasks.
KICKSTART Upgrade
To upgrade the EMS Standalone using a KICKSTART upgrade, perform the following steps:
The <NEW_EMS_VERSION> is the directory, created while downloading the upgrade files. For
example, if you have created a directory /opt/emsInstall/9.3 for upgrading to 9.3, change the
directory to /opt/emsInstall/9.3/ (replace <NEW_EMS_VERSION>) with 9.3 in the following
command:
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
4. After downloading the file upgradeEMS.sh, login as ‘root’ user and change the permission of
upgradeEMS.sh using the following command:
# chmod +x upgradeEMS.sh
5. Generate the ems_upgrade.conf configuration file and change the _upgrade_type to KICKSTART, by
For example, if you want to generate the ems_upgrade.conf file at the path
/opt/emsInstall/<NEW_EMS_VERSION>/ then execute the following command. Executing the
following command, generates the ems_upgrade.conf file at the specified path.
# ./upgradeEMS.sh -g /opt/emsInstall/<NEW_EMS_VERSION>/ems_upgrade.conf
b. After the configuration file is generated, change the value of parameter _upgrade_type to
KICKSTART inside the ems_upgrade.conf configuration file The ems_upgrade.conf configuration
file also displays the comments marked for each of the parameters inside the ems_upgrade.conf
configuration file.
Save the ems_upgrade.conf configuration file, after performing the necessary changes.
Please make sure that in the BIOS boot order harddisk has given the highest preference so that if
reboots are involved during the upgrade then it automatically boots to hard disk.
7. Enter the remote machine details when the script prompts you to specify the location where the backup of
configuration files has to be stored.
8. After the backup is generated and stored on the remote machine, kickstart the system. Kickstarting the
system, performs an installation of OS, database, and EMS Software Application V09.03.00. For more details
about kickstarting system, refer Installing EMS ISO Image.
9. After the system is kickstarted, verify that EMS has been upgraded to version V09.03.00, by executing the
following command:
11. Restore the backup from remote machine to the system, by executing the command ./upgradeEMS.sh -r:
# ./upgradeEMS.sh -r
Enter the remote machine details when the script prompts for it to download the backup files from the remote
machine.
The above procedure completes the upgrade process for EMS Standalone using ISO KICKSTART upgrade.
12. Perform the following steps to verify if EMS, database and kernel have been updated:
a. Execute the following command to verify the platform version:
# cat /etc/os_version
06.04.02.00R000
# uname -r
2.6.32-504.3.3.el6.x86_64
c. Login as oracle user and execute following command to verify Oracle database version:
$ sqlplus -version
SQL*Plus: Release 11.2.0.3.0 Production
d. Login as oracle user and execute following command to verify the latest Oracle database patch
version:
Oracle patch version must be Patch description: "Database Patch Set Update : 11.2.0.3.0
(19271438)"
Overview
The EMS HA Upgrade feature enables you to upgrade from EMS Software Release 9.1.x to 9.3.x.
Also, for upgrading from EMS 09.03.00R000 to a post-09.03.00 EMS minor or patch release, use the EMS
ISO upgrade method. For example, for upgrading from EMS V09.03.00 to EMS V09.03.01, use the ISO
upgrade method.
To perform an upgrade, you need to execute the script upgradeEMS.sh on the Primary Server and point to the
path of the ISO.
The configuration file has a parameter upgradetype. The parameter upgradetype designates the type of
upgrade - INPLACE or KICKSTART. The EMS HA Upgrade only supports INPLACE upgrade,
Prerequisites
The following are prerequisites for upgrading Insight EMS HA deployment or EMS DR site with HA servers from
software release 9.1.x to 9.3.x are as follows:
Both the primary and the secondary servers must be Up and Running.
You can check the current status of both the primary and secondary servers, using the /opt/sonus
/ems/conf/HA/RAC/sonusEMS status command.
Both the primary and secondary servers are installed with Insight EMS software release 9.1.x.
You have read the latest Sonus Insight release notes for important information.
The primary and non-primary servers meet the minimum hardware requirements.
Ensure that Active EMS must be running on the Primary EMS server, prior to the EMS upgrade procedure.
In case primary is not Active, switchover needs to be done using sonusEMS relocate command.
Do not execute the EMS upgrade procedure on a SSH window where it is connected through the Cluster
virtual or logical IP address.
Login through the physical IP address on EMS interface eth0.
The EMS upgrade procedure must be executed as superuser "root".
The EMS software bundle is available as a software package downloadable from the Salesforce customer portal.
1. Login to Salesforce customer portal using your Sonus provided login, and click SOFTWARE DOWNLOADS.
2. Click software bundle WL9.3 to view its contents, and then click Request Download.
3. Fill in the Software Download Form, accept the license agreement and click Submit.
4. When the "Request Status" on the SOFTWARE REQUESTS page displays "Download Available", click the
links in the WL9.3 software bundle and download the files mentioned in Downloading Upgrade Files section.
# mkdir -p /opt/emsInstall/<NEW_EMS_VERSION>/
# mkdir -p /opt/emsInstall/9.3/
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
5. Change the execute permission of upgradeEMS.sh file by executing the following command:
# chmod +x upgradeEMS.sh
This is the HP G8 DL380 firmware upgrade file. Ensure that the HP DL380 G8 firmware is upgraded after Download the firmware file from Salesforce Customer Portal to: /opt/sonus/p
you perform the EMS Software upgrade. latform directory in the server.
While performing an HA upgrade, a configuration file ems_upgrade.conf is generated, which has parameters
related to backup. The ems_upgrade.conf configuration file also displays the comments marked for each of the
parameters inside the ems_upgrade.conf configuration file. A sample configuration file with parameter details is
given for here for reference.
The following steps are executed only on the EMS Primary Server that is Active. To upgrade the EMS HA using an
ISO file, perform the following steps:
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under:
$ORACLE_BASE/admin/SIDB/udump/diag/rdbms/<ORACLE_SERVICE_NAME>/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
1. Log in as a root user to the Insight EMS Primary server that is Active.
2. Change the directory to the path where the
emsrac-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso and upgradeEMS.sh files have been
copied.
3. After downloading the file upgradeEMS.sh, login as ‘root’ user and change the permission of
upgradeEMS.sh using the following command:
# chmod +x upgradeEMS.sh
4. INPLACE upgrade can be done using the default settings or by configuring the ems_upgrade.conf file.
The standby server is first upgraded and rebooted and then the active server is upgraded.
a. After reboot, when the primary server is up, login as root user and verify that EMS has been
upgraded to version 9.3.x, by executing the following command:
b. On the secondary server, verify that the EMS software has been upgraded to 9.3.x, by executing the
following command:
After the upgrade is performed successfully on both the primary and secondary servers, the
original active server would be standby and the original standby server would be active. To
revert to the original state, execute the command /opt/sonus/ems/conf/HA/RAC/sonu
sEMS relocate.
The above procedure completes the default upgrade process for both the active and standby servers
for a EMS HA deployment.
6. To change the default EMS upgrade and backup configuration, perform the following:
# ./upgradeEMS.sh -g /opt/emsInstall/<NEW_EMS_VERSION/ems_upgrade.conf
b. Once the configuration file is generated, you can edit the parameters in the ems_upgrade.conf file
using the vi editor. The ems_upgrade.conf file contains comments that guides you in editing the
upgrade/backup parameter values.
# vi ems_upgrade.conf
If the upgrade is not successful, then you can revert back to the previous EMS release. For more
information, see Rollback EMS HA.
The standby server is first upgraded and rebooted and then the active server is upgraded.
8. After reboot, when the primary server is up, login as root user and verify that EMS has been upgraded to
version 9.3.x, by executing the following command:
9. On the secondary server, verify that the EMS software has been upgraded to 9.3.x, by executing the following
command:
10. Perform the following steps to verify if database and kernel have been updated:
a. Execute the following command to verify the platform version:
# cat /etc/os_version
06.04.02.00R000
# uname -r
2.6.32-504.3.3.el6.x86_64
c. Login as oracle user and execute following command to verify Oracle database version:
$ sqlplus -version
SQL*Plus: Release 11.2.0.3.0 Production
d. Login as oracle user and execute following command to verify the latest Oracle database patch
version:
Oracle patch version must be Patch description: "Database Patch Set Update : 11.2.0.3.0
(19271438)"
After the upgrade is performed successfully on both the primary and secondary servers, the original
active server would be standby and the original standby server would be active. To revert to the
original state, execute the command /opt/sonus/ems/conf/HA/RAC/sonusEMS relocate.
The above procedure completes the upgrade process using the upgrade configuration file for both the active
Increasing ASM Partition Size is optional and is applicable only for IBM DS3524 RAID.
Caution
If you have sufficient DB space available, there is no need to execute the ./ASMPartition script.
If you do not have sufficient DB space, you can increase the DB size, by executing the following
# cd /export/home/pkg
3. Assign the privilege to execute the ./ASMPartition script on both the active and standby server, using the
following command:
# chmod +x ASMPartition
4. Execute the ./ASMPartition command on the active server to increase the DB size. Execute the
command ./ASMPartition from the active server.
# ./ASMPartition
Executing the ./ASMPartition script, takes substantial time to complete. Please wait for the
script to complete execution. Executing the ./ASMPartition command automatically reboots both
the servers.
After the ./ASMPartition script completes the execution, the original active server would be
standby and the original standby server would be active. To revert to the original state, execute the
command /opt/sonus/ems/conf/HA/RAC/sonusEMS relocate
EMS DR Upgrade
Overview
For upgrading a DR pair (source and target), first you need to upgrade the Source DR site and then upgrade the
Target DR site. The upgrade procedure is same as upgrading the Standalone and HA Upgrade.
The following are the high-level steps of upgrading DR with standalone systems. First execute the upgradeEMS.sh
script on Source SA server. After upgrading the SA EMS server, execute the upgradeEMS.sh script on Target SA
server within 15 minutes.
The following summary outlines the key steps required to upgrading EMS application for EMS standalone DR
configuration.
Download and prepare the upgrade files on the source and target EMS standalone systems.
This step identifies the required upgrade files to be download to the HP DL380p Gen8 servers and how to prepare
the files for upgrade.
Backup the EMS by splitting the disk mirror on the source and target EMS standalone system.
This step stops the disk mirroring, ensuring that the secondary disks retain the older EMS data.
Ensure that the upgrade of the Target EMS site is started within about 15 minutes of starting
the upgrade of the Source EMS site. In other words, if upgradeEMS.sh is called on the
Source EMS site for example around 10:00 AM, then the upgradeEMS.sh on the Target
EMS site should be called no later than about 10:15 AM.
This restriction is required so that the upgrade script can automatically setup the DR
relationship on the upgraded EMS sites at the end of upgrade process.
DR is automatically torn down before upgrade and then automatically setup after upgrade.
This step shows the mandatory post-installation steps you need to perform.
Re-Mirror the disks on the source and target EMS standalone system.
This step re-mirrors the disks. Perform this step, if the EMS upgrade is successful.
If the upgrade is not successful, then you can revert back to the previous EMS release. For more
information, see Reverting Back To Previous EMS Release.
The EMS Disaster Recovery (DR) is setup automatically after successful upgrade of source and target
systems. For information on other DR operations, see EMS DR Operations. To verify that DR connectivity
has been setup after upgrade, execute the command manageDR status on the source DR site.
The following are the high-level steps of upgrading DR with HA systems. First execute the upgradeEMS.sh script
on Primary server that is Active at the Source DR Site. Based on whether you are upgrading to EMS Software
Release V09.03.00 (ISO Method) or upgrading to a sustaining release post-V09.03.00, select the appropriate
upgrade method.
Execute the upgradeEMS.sh script on Primary server that is Active at the Source DR site. After upgrading the
source DR Site, execute the upgradeEMS.sh script on Primary server that is Active at the Target DR Site.
After downloading the file upgradeEMS.sh, login as ‘root’ user and change the permission of upgradeEM
S.sh using the following command:
# chmod +x upgradeEMS.sh
The following summary outlines the key steps required to upgrading EMS application for EMS HA DR configuration.
Download and prepare the upgrade files on the source and target EMS HA systems.
This step identifies the required upgrade files to be download to the HP DL380p Gen8 servers and how to prepare
the files for upgrade.
Manual Backup EMS Data on the source and target EMS HA systems.
a. Perform INPLACE ISO upgrade procedure on the DR source primary EMS system.
b. After completing the DR Source site upgrade, perform INPLACE ISO upgrade procedure
on the DR target primary EMS system.
This step shows the post-upgrade mandatory tasks that need to be performed after EMS upgrade is successful.
The EMS Secondary server is first upgraded followed by EMS Primary server. If the value set for _ems_bac
kup is true then backup is taken prior to upgrade on the EMS Primary server at the path /opt/oracle/
backup/dmp. In case the upgrade on secondary EMS fails, the upgrade process exits. The EMS Primary
server provides continued service without any downtime. Restore the backup files stored at the path /opt/
oracle/backup/dmp on the secondary server and retry the upgrade procedure.
If EMS HA Upgrade fails and both the primary and secondary servers are unstable, you can perform a fresh
EMS installation and restore the backup taken earlier. For more information, on how to kickstart EMS and
restore previous stable configuration refer Rollback EMS HA.
In case, the database size is not sufficient, you can increase the DB size using the ASM Partition
mechanism. Increasing the ASM partition size is an optional procedure and increasing the DB size is
dependent on insufficient DB space. For a DR setup, if there is insufficient DB space, the ./ASMPartitio
n script needs to be executed on both the DR source and DR target sites. For more details, refer the section
Increasing ASM Partition size .
Table of Contents
Sonus has further extended virtualization support in release 9.3.0, by providing deployment of EMS Software Edition
(SWe) virtually on VMware ESXi server. The EMS SWe can be installed virtually on VMware ESXi for Standalone
(SA), High Availability (HA), and Disaster Recovery (DR) deployments for small and large configurations.
The complete EMS Software Edition solution consists of the following components:
Customer Provided:
Hardware—System (compatible to run EMS Software Edition), memory, CPU, network cards, and disk drives.
KVM Hypervisor—KVM (Kernel Virtual Machine version 0.10.2) hypervisor running on RHEL 6.4 host
operating system. The hypervisor gives each VM a dedicated view of the hardware.
VMware ESXi operating system hosted on Hypervisor—VMware ESXi 5.1 or above running on hypervisor.
The hypervisor gives each VM a dedicated view of the hardware. EMS SWe software 9.3.0 runs virtually on
virtual machine created on VMware server.
VMware Client installed on your system—VMware Client 5.1 or above installed on your system through which
you access the VMware ESXi server.
If you are deploying EMS HA on KVM or VMware ESX, ensure that you have two physically
separate systems (primary and secondary) on which you are installing EMS. To avoid single point of
failure, you must have two physically separate systems; on each system you install RHEL 6.4 OS
with KVM or VMware ESX.
The EMS Software Edition appears to users as an independent Sonus EMS with its own network identity, user
authorization and authentication capabilities, as well as configuration and data.
The EMS Software Edition application can be deployed in the following environment:
On a dedicated server: The EMS application exists on a Commercial Off-the-Shelf (COTS) hardware rather
than a proprietary platform.
Small Configuration
Large Configuration
In these sections, 1 GB refers to 1 x 1024 x 1024 x 1024 = 1073741824 bytes. For example, a 300 GB size
is 3221225472 bytes.
Small Configuration
Depending on the requirements, you can either deploy EMS Software Edition in SA or HA on a VM for a 'small' or
'large' configuration. If you want to manage less network devices, you can opt for 'small' configuration.
Large Configuration
If the number of devices to be managed are more and you want better performance, you can opt for 'large'
configuration.
Hardware Requirements
The hardware requirements for 'small' and 'large' configuration are different. For more details, regarding EMS
Standalone and High Availability hardware requirements, refer the following links:
Overview
Insight EMS Software Edition(SWe) is a virtual Sonus EMS appliance that is hosted on any compatible hardware
that supports virtualization. The benefit of software virtualization is that it can be installed on any hardware over a
virtual machine. In a step closer towards virtualization and removing dependencies on hardware, Sonus has made
significant progress by virtualization of the Insight EMS on KVM.
The complete EMS Software Edition solution consists of the following components:
Customer Provided:
Hardware—System (compatible to run EMS Software Edition), memory, CPU, network cards, and disk drives.
KVM Hypervisor—KVM (Kernel Virtual Machine version 0.10.2) hypervisor running on RHEL 6.4 host
operating system. The hypervisor gives each VM a dedicated view of the hardware.
VMware ESXi operating system hosted on Hypervisor—VMware ESXi 5.1 or above running on hypervisor.
The hypervisor gives each VM a dedicated view of the hardware. EMS SWe software 9.3.0 runs virtually on
virtual machine created on VMware server.
VMware Client installed on your system—VMware Client 5.1 or above installed on your system through which
you access the VMware ESXi server.
If you are deploying EMS HA on KVM or VMware ESX, ensure that you have 2 physically separate
systems (primary and secondary) on which you are installing EMS. To avoid single point of failure,
you must have two physically separate systems; on each system you install RHEL 6.4 OS with KVM
or VMware ESX.
The EMS Software Edition appears to users as an independent Sonus EMS with its own network identity, user
authorization and authentication capabilities, as well as configuration and data.
On a dedicated server: The EMS application exists on a Commercial Off-the-Shelf (COTS) hardware rather
than a proprietary platform.
A single EMS VM is used for managing the network elements. The following figure shows the block diagram of
components involved in running EMS SA in a KVM based environment.
The following figure shows the block diagram of components involved in running EMS HA in a KVM based
environment.
To install and configure the EMS software edition, ensure that the Virtual Machine (VM) host meets the
recommended hardware, server platform, and software requirements.
The hardware and software settings are intended to ensure optimum EMS SWe stability and performance
for small and large configuration. If these settings are not used, EMS SWe system may not perform as
expected.
Depending on the SA or HA Deployment type of installation, refer the following installation requirement
section:
This section provides information for small and large standalone and HA deployment configurations:
Minimum CPU rating that is supported is 2.0 GHz. Sonus will not support users with CPUs below 2.0 GHz.
Standalone Configuration
Small 4 8 300 1
Large 12 32 900 1
This section provides details about the software and hardware requirements for performing SA installation on KVM:
Hardware that the host system is running, must have at least enough system and network resources (CPU,
disk, memory, and network) as the VMs that are planned to be created on the host.
To use the EMS Software Edition in a virtualized environment, Storage Area Network (SAN) must be used to store
the configuration data, the Operating System (OS) and EMS packages, EMS files, Oracle Automatic Storage
Management (ASM) files. The disk space and partitioning requirements, are different for 'small' and 'large'
configuration.
The EMS Software Edition installed on a virtualized environment, supports both local storage or remote
SAN storage (iSCSI LUN) to store the data. If a direct-attached RAID is to be used, ensure that the RAID
disks (LUNs) of required size are exposed on the host.
The high-level SAN setup requirements to use Storage Logical Unit Numbers (LUNs) in a virtualized environment
are:
This section provides hardware and software requirement details for installing EMS SWe for HA deployment on
KVM.
Hardware that the host system is running, must have at least enough system and network resources (CPU,
disk, memory, and network) as the VMs that are planned to be created on the host.
To use the EMS Software Edition in a virtualized environment, Storage Area Network (SAN) must be used to store
the configuration data, the Operating System (OS) and EMS packages, EMS files, Oracle Automatic Storage
Management (ASM) files. The disk space and partitioning requirements are different for 'small' and 'large'
configuration.
The EMS Software Edition installed on a virtualized environment supports both local storage or remote SAN
storage (iSCSI LUN) to store the data.
Network Requirements
Network connections (public and private) between the two VM hosts need to be established just as in the case of a
physical (HP G8) based HA setup. Configure the private and public network connections between hosts as shown in
Cabling and Network Connectivity for Insight EMS High Availability Cluster . Instead of direct-attached RAID, SAN
network connections need to be established between the two VM hosts to the SAN switch.
EMS HA Solution
Relevant network connections (separate from public/private HA network) and bonding must be setup for the storage
network to enable SAN storage.
The high-level SAN setup requirements to use Storage Logical Unit Numbers (LUNs) in a virtualized environment
are:
SAN administrator must be knowledgeable about SAN concepts, managing and creating LUNs, and
setting-up the connectivity.
The Storage LUNs of the right size must be available on the host and exposed to the VMs being created as
SCSI disks.
In case of an HA setup, where the LUNs are meant to be shared, ensure that both the HA nodes are pointing
to the same LUN on the SAN.
Shared disks must be displayed as SCSI disks within the VM.
For an HA setup, execute the scsi_id command on both nodes and ensure that it displays the same value
for shared disk on both nodes.
For better understanding the usage of each disks for EMS HA (small or large configuration), refer the following table:
Disk 250 GB (VM 1), 250 GB (VM 1), Used to store the OS and EMS packages. This disk can be either a local or
1 250 GB (VM 2) 250 GB (VM 2) a remote disk (iSCSI LUN).
Disk 300 GB (EMS) 60 GB (EMS) It is a shared disk used to store EMS files. The remote disk can be used
2 using iSCSI or direct attached (example IBM DS3524/IBM V3700) FC
connections.
Disk 600 GB (ASM) 90 GB (ASM) It is a shared disk used to store Oracle ASM files. The remote disk can be
3 used using iSCSI or direct attached (example IBM DS3524/IBM V3700) FC
connections.
Software Requirements
This section provides host hypervisor software requirements for EMS SA and HA deployments.
KVM Requirements
Ensure that only the following or later versions of RHEL and KVM module are used. Earlier versions are not
supported.
Red Hat Enterprise Linux 6.4 or above Install RHEL 6.4 OS in 'Virtualization Host' mode.
# libvirtd --version
libvirtd (libvirt) 0.10.2
Also, when installing the RHEL 6.4 OS, you need to configure one network interface (example, eth0) for public
network connection. To enable the VM running on the host to share this public network interface, you need to create
a network bridge (example br0). This bridge allows the VM's virtual network interface (example eth0) access to the
public network, using the vnet0 network interface.
Configuration Version
Before proceeding, ensure that the hardware and software requirements to install EMS SA or IAS are met.
The following summary outlines the key steps required to install EMS Standalone or IAS software-only application
on KVM.
This step lists the prerequisites for Host OS installation, recommendation for using local or remote storage
and installation checklist.
This step shows you what and how to download the EMS Standalone or IAS ISO package from SalesForce.
Creating EMS or IAS Virtual Machine Instance and Performing ISO Installation
This step creates the Virtual Machine (VM) instance for installing EMS SA or IAS on KVM and performs ISO
installation.
This step shows you how to perform the mandatory post-installation tasks.
If you are doing an IAS installation, this step is not applicable. Post-installation tasks are only
performed for EMS installation.
This section provides installation prerequisites, recommendations for storage and installation checklist.
The following are the prerequisites that are required prior to installation:
Read the latest Sonus Insight release notes for important information.
Download the latest version of EMS Software Suite 9.3.0 documents from the Sonus Salesforce Customer
Portal.
Must be aware of system BIOS settings to make the system boot from required media.
Must be aware of basic understanding of initial BIOS sequence or procedure.
Warning Notices (WBAs)—Sonus recommends that you view the warning notices pertaining to this release to
see if your software or hardware platforms are affected. If you have an account on Sonus Salesforce
Customer Portal, you can find the warning notices at
https://c.na8.visual.force.com/apex/SolutionList?sfdc.tabName=01r80000000Q04H. If you do not have a
Sonus Salesforce Customer Portal login account, you can contact the Sonus Technical Assistance Center
(TAC).
This section gives an overview of what needs to be done to prepare the host system before creating a Virtual
Machine (VM).
1. If you are planning to use SAN-based storage for shared disks, instead of direct-attached RAID storage, then
perform the following tasks:
a. Create LUN volumes on the SAN as per disk size requirements. For more information about disk
space requirements, see the section Disk Space Requirements.
b. Login to the SAN through iSCSI and make sure the disks are visible on the host.
c. The Storage Administrator must setup the SAN hardware and associated connections to the host,
using iSCSI for example.
i. Storage connections between host and the SAN box should be fast—1G at least (10G better).
ii. Set up adequate level of redundancy—network bonding of storage interfaces, and/or IO
multipathing.
iii. Isolate the storage network traffic—do NOT use the storage network for any non-storage related
traffic.
2. Ensure you have console access to the host systems for RHEL OS installation.
The primary storage disk for VM can be either local or remote (iSCSI SAN). If you are using local storage, a raw disk
of appropriate size functions as the VM disk.
To avoid a single point-of-failure, sufficient redundancy must be configured and available at various points of
storage path. Some of the examples of redundancy are, network bonding on the host (example using bond2),
redundant storage switch, IO multipathing on storage device, and so on.
If you are using LUN disks, it is recommended to set up IO multipathing on the host to create persistent
device paths that are available across host reboots.
After the LUN is exposed as disk on the host, it can either be used directly in the VM or it can be formatted
and partitioned and a disk image can be created there, which in turn is used as the VM disk.
Installation Checklist
Prior to installing EMS software, you need to collect the information listed below.
Host name The name which identifies the system on the network. ems1
IP address The Internet Protocol (IP) address for the network interface. 10.9.9.103
Default The node on a TCP/IP network that serves as an access point to another network. 10.9.9.1
router
Netmask The mask used to determine to which subnet an IP address belongs. 255.255.255.0
of subnet
NTP The Network Time Protocol server to which the system containing VM synchronizes the time. 10.9.9.5
This section provides information on how to download the EMS release 9.3.0
ems-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso package from the SalesForce Customer Portal.
The software bundles are listed with the product names and software versions.
# mkdir /home/images
ii. Ensure that the ISO file is copied at the path /home/images on the host system.
Creating EMS or IAS Virtual Machine Instance and Performing ISO Installation
For host hypervisor software requirements, refer the section Software requirements.
Perform the following steps to manually create a Virtual Machine (VM) instance for a standalone setup:
1. Login to host console as root user, and launch KVM Virtual Machine Manager GUI by executing the
following command:
# virt-manager&
2. Click Create a new virtual machine. Specify an appropriate name for the VM as shown in the following
figure.
3. Choose the path of EMS .iso file, and select the OS type as Linux and version.
4. Specify the CPU and Memory resources for the VM. Refer Hardware and Software Requirements for Insight
EMS SWe on KVM for CPU and memory specifications.
5. Clear the Enable storage for this virtual machine check box. Storage is added later at the end of VM
creation. Refer Figure 4.
6. Select the Customize configuration before install check box and click Finish. Refer Figure 5.
7. Click Add Hardware (refer Figure 6) and add a local disk (300 GB or 900 GB based on small or large config)
with the settings shown in Figure 7 and click Finish.
8. Under Boot Options, select the Autostart check box and click Apply to save the changes. Refer Figure 8.
11. Once installation is completed, you should see the reboot screen shown in Figure 10. ISO installation may
take about 10 minutes.
12. From the Shutdown the virtual machine option, choose Force Off.
13. Browse to Show virtual hardware details screen. Select IDE CDROM 1 option and click Disconnect to
un-mount the iso. Refer Figure 11.
14. Go back to the Show the graphical console screen and click Power on the virtual machine to continue
with the rest of the installation.
15. Network configuration screen is displayed as shown in Figure 12.
16. Select Hostname and press the Space key to configure the hostname for the system.
The EMS hostname is limited in length to 64 characters. The hostname can only contain lowercase
letters [a-z] and digits [0-9]. The hostname cannot start with a digit. Special characters including
hyphen are not allowed in hostname.
17. Specify a relevant Hostname using which you can easily identify the VM host.
18. Enter the IP Address, Subnet Mask, and Gateway details for the virtual interface.
19. Select the TimeZone where the VM host system is located from the list of time zones.
20. Enter the NTP Time-Server IP Address, to synchronize the time for the VM host system.
Login screen is displayed, after the EMS Application Software Suite is successfully installed on the VM host.
21. Login as root user to the EMS Software on the VM host system.
Change the password of the root user the first time you login to the EMS application.
During EMS installation, ignore the following errors, unless DB Instance creation fails. The following
errors are seen on trace/alert log files which is present under: $ORACLE_BASE/admin/SIDB/udump/diag
/rdbms/sidb/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
Before proceeding, ensure that the hardware and software requirements to install EMS HA are met.
The following summary outlines the key steps required to install EMS HA software-only application on KVM.
This step lists the prerequisites for installation, recommendation for using SAN storage and installation checklist.
This step shows you what and how to download the EMS HA ISO package from SalesForce.
This step creates the Virtual Machine (VM) instance for installing EMS HA on KVM.
This step shows you how to install the EMS HA application and configure High-Availability for both the systems.
This step shows you how to perform the mandatory post-installation tasks.
The following are the prerequisites that are required prior to installation:
EMS HA nodes on VM should be setup on two separate hardware nodes. This is done for redundancy.
Read the latest Sonus Insight release notes for important information.
Download the latest version of EMS Software Suite 9.3.0 documents from the Sonus Salesforce Customer
Portal.
Must be aware of system BIOS settings to make the system boot from required media.
Must be aware of basic understanding of initial BIOS sequence or procedure.
Warning Notices (WBAs)—Sonus recommends that you view the warning notices pertaining to this release to
see if your software or hardware platforms are affected. If you have an account on Sonus Salesforce
Customer Portal, you can find the warning notices at
https://c.na8.visual.force.com/apex/SolutionList?sfdc.tabName=01r80000000Q04H. If you do not have a
Sonus Salesforce Customer Portal login account, you can contact the Sonus Technical Assistance Center
(TAC).
This section gives an overview of what needs to be done to prepare the host system before creating a Virtual
Machine (VM).
1. If you are planning to use SAN-based storage for shared disks then perform the steps below:
a. Create LUN volumes on the SAN as per EMS High Availability disk size requirements. For more
information, about disk space requirements see the section Disk Space Requirements.
b. Login to the SAN through iSCSI and make sure the disks are visible on the host.
c. The Storage Administrator must setup the SAN hardware and associated connections to the host,
using iSCSI for example.
i. Storage connections between host and the SAN box should be fast—1G at least (10G better).
ii. Set up adequate level of redundancy—network bonding of storage interfaces, and/or IO
multipathing.
d.
i. Isolate the storage network traffic—do NOT use the storage network for any non-storage related
traffic.
2. Ensure you have console access to the host systems for RHEL OS installation.
VM Storage
The primary storage disk for VM can be either local or remote (iSCSI SAN). If you are using local storage, a raw disk
of appropriate size functions as the VM disk. Storage for the two shared disks used by EMS HA have to be shared
on a remote storage device (iSCSI based SAN). EMS HA needs direct LUN access to the shared storage volumes
for HA functionality to work.
The recommended actions to be performed, when using a remote SAN connection are:
To avoid a single point-of-failure, sufficient redundancy must be configured and available at various points of
storage path. Some of the examples of redundancy are, network bonding on the host (example using bond2),
redundant storage switch, IO multipathing on storage device, and so on.
If you are using LUN disks, it is recommended to set up IO multipathing on the host to create persistent
device paths that are available across host reboots.
After the LUN is exposed as disk on the host, it can either be used directly in the VM or it can be formatted
and partitioned and a disk image can be created there, which in turn is used as the VM disk.
Prior to installing Insight HA system, collect and record the values for the system parameters shown in the table,
System Information required for Insight HA Installation.
All public IP addresses except DNS IP and iLO IP should be configured in same subnet.
The configuration information given below is tested in the lab condition and do not accurately portray a
properly configured system.
Cluster Configuration
The name of the cluster can only contain lowercase letters [a-z], digits [0-9], and
hyphen [-].
The cluster name cannot start with a digit or hyphen, and cannot end with a
hyphen.
Cluster A virtual IP address used to uniquely connect to the EMS (owned by whichever 10.54.159.2
VIP server is active).
IPv6 A virtual IPv6 address used to uniquely connect to the EMS (owned by whichever fd00:10:6b50:4020::56/62
Cluster server is active).
VIP
(optional)
Netmask The mask used to determine to which subnet an IP address belongs. 255.255.255.0
of subnet
SCAN The second IP address used by the Oracle SCAN (single client access name) 10.54.159.201
Listener IP listener.
Address 2
SCAN The third IP address used by the Oracle SCAN (single client access name) 10.54.159.202
Listener IP listener.
Address 3
Hostname The name which identifies the system on the network. wfdems01a
Public IP The IP address on the public network for the node. 10.54.159.100
Address
Public The IPv6 address on the public network for the node. fd00:10:6b50:4020::56/61
IPv6
Address
(Optional)
Oracle VIP Virtual IP address that is assigned to Oracle Clusterware or RAC. 10.54.159.101
Private IP An IP address assigned to a device on a private TCP/IP Local Area Network that 192.168.128.1 is the
Address is accessible only within the Local Area Network. default value, change if
required.
Hostname The name which identifies the system on the network. wfdems01b
Public IP The IP address on the public network for the node. 10.54.159.102
Address
Oracle VIP Virtual IP address that is assigned to Oracle Clusterware or RAC. 10.54.159.103
Private IP An IP address assigned to a device on a private TCP/IP Local Area Network that 192.168.128.2 is the
Address is accessible only within the Local Area Network. default value, change if
required.
This section provides information on how to download the EMS release 9.3.0
emsrac-V09.03.00R000-RHEL-06.04.02.00R000-x86_64.iso from the SalesForce Customer Portal.
The software bundles are listed with the product names and software versions.
# mkdir /home/images
b. Ensure that the ISO file is copied at the path /home/images on the primary host.
For host hypervisor software requirements, refer the section Software requirements.
Pre-requisites:
Procedure
Create the VM on the primary host first, followed by VM on the secondary host. Perform the following steps to
manually create the VM on the primary and secondary host:
The screenshots shown here are for VM being created on the primary host. After VM is successfully created
on primary host, these steps must be performed on the secondary host. Choose a different VM name (for
example: 'emsvmsec') for secondary VM host.
1. Login to host console as root user, and launch KVM Virtual Machine Manager GUI by executing the
following command:
# virt-manager&
2. Click Create a new virtual machine. Specify an appropriate name for the VM. Refer Figure 1.
3.
4. Specify the CPU and Memory resources for the VM. Refer Hardware and Software Requirements for Insight
EMS SWe on KVM for CPU and memory specifications.
5. Clear Enable storage for this virtual machine checkbox. Storage will instead be added later at the end of
VM creation. Refer Figure 4.
6. Select the Customize configuration before install check box and click Finish.
7. Click Add Hardware (refer Figure 6) and add 250 GB local disk with the settings shown in the following
screen and click Finish.
8. Click Add Hardware and add the shared disk for ASM by selecting the previously configured storage pool
volume. See Pre-requisites. Configure the rest of the settings as shown in Figure 8 and click Finish.
9. Click Add Hardware and add the shared EMS disk volume. Configure the rest of the settings as shown in
Figure 9 and click Finish.
10. Click Add Hardware and add the private network by choosing Network and the previously configured device
bond1 (br1) as shown in Figure 10. Click Finish.
11. Under Boot Options, select the Autostart check box and click Apply to save changes.
12. Select ASM shared disk SCSI Disk 2 and select the Shareable check box. Click Apply.
17. Login as root to the host and edit the configuration of newly created VM to confgure the two shared disks as
SCSI LUNs instead of SCSI disks. Execute the following command to view the state:
20. Press ESC and execute the following command to save and exit:
:wq!
21. View and confirm the hardware details in the virt-manager GUI. The information should be similar as
displayed in Figure 15.
22. Click the Power on the virtual machine (right arrow icon) to start the .iso installation.
23. Click the Show the graphical console icon to view the console.
24. Type 1 and press Enter to start .iso installation. Refer Figure 16.
25. Once installation completes, you should see the reboot screen shown in Figure 17. ISO installation may take
about 10 minutes.
26. From the Shutdown the virtual machine option, choose Force Off.
27. Browse to Show virtual hardware details and click IDE CDROM 1 option and click Disconnect to un-mount
the iso. Refer Figure 18.
28. Go back to the Show the graphical console screen and click Power on the virtual machine to continue
with the rest of the installation.
29. Network configuration screen is displayed as shown in Figure 19.
30. Continue the procedure from step 1 of Performing EMS HA ISO Installation.
31. Once the VM on primary host is created successfully, repeat this procedure to create VM on secondary host.
Change the VM name appropriately, for example: emsvmsec.
1. Select Hostname and press the Space key to configure the hostname for the system.
a. In the Host Configuration Screen, specify the Hostname, Primary DNS and DNS Search Path details.
Press the Tab key to select the OK button and press the Space key to save the settings.
The EMS hostname is limited in length to 64 characters. The hostname can only contain
lowercase letters [a-z] and digits [0-9]. The hostname cannot start with a digit. Special
characters including hyphen are not allowed in hostname.
b. Use the Arrow keys to select IP Configuration and press the Space key to configure IP address.
Select the eth0 interface for which you need to configure the IP Address. Use the Tab key to select
the OK button and press the Space key to configure IP address for eth0 network interface.
c. Specify the IP Address, subnet mask, and gateway IP Address for eth0 network interface. Use the Tab
key to move the cursor to other parameter. Press the Tab key to select OK and press the Space key
to save IP Address details.
d. Use the Arrow keys to select Time Zone and press the Space key to configure the time zone. Select
the nearest time zone for the system and press the Tab key to select OK and press Space to save the
time zone settings.
If the CD is not unmounted and for some reason the ISO boot menu options screen is displayed,
then click the Disconnect button and reboot the VM by clicking on CTRL+ALT+DEL from the Send
Key menu options.
4. Press F10 to save the settings and exit from BIOS setup utility.
The system reboots from the hard disk.
The login screen appears:
This section provides information for installing HA application and setting-up High-Availability deployment. This is
done by setting the values in the configuration file (vm.rac.conf) and executing the RACinstall_1 script.
EMS HA VM installation procedure is similar to EMS HA physical (HP G8) based installation. Only
difference is in some configuration parameters used for installation (for example, _public_interface is
eth0 for VM, instead of bond0)
EMS installation script (RACinstall_1) requires a configuration file. Create the configuration file by copying it from
a template file available under /export/home/pkg and then manually setting values for relevant fields. Use this
Perform the following procedure to configure the values for the template configuration files:
# cp rac.conf_VM.template /tmp/vm.rac.conf
# chmod +w /tmp/vm.rac.conf
For private IP, do not use the same private IP of the hypervisor.
# vi /tmp/vm.rac.conf
# Populate with the name of the primary node (where install is being done
from)
_node01=
# Populate with the shared IP address (IPv4) for this EMS cluster
sonusVIP.IPv4=
# Populate with the shared IP address (IPv6) for this EMS cluster
sonusVIP.IPv6=
# Leave blank. RAID array Controller IPs are not used in case of VM deployment
_array_controllerA_IP=
# Leave blank. RAID array Controller IPs are not used in case of VM deployment
_array_controllerB_IP=
After updating the values, press the ESC key and enter :wq! to save the configuration.
The following section provides details about running the EMS installation scripts:
RACinstall_1 script
This script performs initial RAID and network related configuration across both nodes.
[root@emshp5vm1]# cd /export/home/pkg
3. After the script is successfully executed, you can proceed to the next step, which is EMSRACinstall script.
EMSRACinstall script
Perform the following procedure to create EMS partitions, install Oracle Clusterware and Oracle RAC on the primary
server.
During EMS installation, ignore the following errors, unless DB Instance creation fails. The following
errors are seen on trace/alert log files which is present under: $ORACLE_BASE/admin/SIDB/udump/diag
/rdbms/<ORACLE_SERVICE_NAME>/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
To view the progress of the installation, open another session and view latest log files at /var/sadm/inst
all/logs.
# cd /export/home/pkg
# ./EMSRACinstall
4. All the Insight processes are automatically started as part of the installation.
The Insight EMS HA installation for KVM is complete.
Each script in the installation sequence generates its own log. The installation log files are found on the
primary node at /var/sadm/install/logs. If there are errors during the installation, refer to RACinsta
ll_1.<id>.log, RACinstall_2.<id>.log and EMSinstall.<id>.log.The DB installation log files
are located at /opt/oracle/orasql/SIDB01 on the primary node.
After completing the EMS Installation, perform the mandatory post-installation tasks. For more details about
post-installation tasks, refer the section Performing Post-Installation Tasks.
Disaster Recovery setup consists of a source site and target site, both deployed at a geographical different
locations. In case, if the source (primary database) Insight system is disabled, the target system (standby database)
can be switched to the production role, thus minimizing the downtime and data loss associated with the outage. The
EMS Software Version V09.03.00 installed virtually on KVM, supports Disaster Recovery (DR) setup for both
Standalone and High Availability (HA) systems.
The EMS Software-only V09.03.00 KVM deployed for a DR setup, must have same deployment type
(Standalone or High Availability) on source site and target DR site.
The EMS V09.03.00 on KVM does not support different source and target DR site
combination. For example, source site having an HA setup and target DR site deployed
with Standalone (SA) system.
Both the source and target DR sites must be installed on KVM. The DR setup does not
support software-only installation (VMware or KVM) on one site and physical server-based
installation on other DR site.
Performing EMS Software-only installation virtually for a DR setup is same as installation of EMS Software KVM for
Standalone and HA. There is one additional step to be performed for DR deployment. After installing EMS Software
on both the source and target DR site, execute the /opt/sonus/ems/conf/DR/manageDR setup command on
source DR site to (if EMS HA, run on primary node of source site) configure and synchronize the source (primary
DB) and target (standby DB) sites for replication.
The following table lists the high-level steps with corresponding links for installing EMS Software-only V09.03.00 on
KVM for a DR setup.
The high-level steps for installing EMS SA virtually on KVM for DR setup are listed in the following table.
2 Perform Host Source and Target DR Sites Host Operating System Host Operating System
Operating System Installation for SA System Installation for HA System
Installation
3 Download Files Source and Target DR Sites Downloading ISO from Downloading Files from
from Salesforce SalesForce Salesforce
4 Create Virtual Source and Target DR Sites Creating EMS Virtual Creating Virtual Machine
Machine (VM) Machine Instance Instance for HA Systems
Instance
5 Perform EMS Source and Target DR Sites Performing EMS SA or IAS Performing EMS HA iso
Installation ISO Installation Installation
For more details about EMS Licensing details, refer the section Managing Licenses in User Guide.
This section provides information for upgrading EMS SWe Standalone (SA) on KVM using an INPLACE upgrade or
Kickstart upgrade.
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
The following summary outlines the key steps required to upgrade EMS standalone server using ISO INPLACE
upgrade.
This step identifies the required upgrade files to be downloaded and how to prepare the files for upgrade.
If the upgrade is not successful, then you can revert back to the previous EMS release by restoring the
backup manually. For more information, see Rollback EMS SA.
The following summary outlines the key steps required to upgrade EMS standalone server using Kickstart upgrade.
This step identifies the required upgrade files to be downloaded and how to prepare the files for upgrade.
Execute the following steps to perform a kickstart upgrade for EMS SA:
To upgrade the EMS Standalone system using KICKSTART upgrade, perform the following steps:
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under: $ORACLE_BASE/admin/SIDB/udump/diag/rdbms/sidb/$ORACLE_S
ID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
The <NEW_EMS_VERSION> is the directory created while downloading the upgrade files. For
example, if you have created a directory /opt/emsInstall/9.3 for upgrading to 9.3, change the
directory to /opt/emsInstall/9.3/ (replace <NEW_EMS_VERSION>) with 9.3 in the following
command:
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
3. Change the permission of the upgradeEMS.sh file using the following command:
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
# chmod +x upgradeEMS.sh
4. Generate the ems_upgrade.conf file and change the _upgrade_type parameter value to KICKSTART.
# ./upgradeEMS.sh -g /opt/emsInstall/<NEW_EMS_VERSION>/ems_upgrade.conf
b. Once the configuration file is generated, change the _upgrade_type parameter value to
KICKSTART in the ems_upgrade.conf file. The ems_upgrade.conf file contains comments that
guides you in editing the upgrade/backup parameter values.
# vi ems_upgrade.conf
# If the value is set to "true", then the data backup will be scp-ed to a
remote server.
# By default, the value is set to "true" for KICKSTART-upgrade and "false"
for INPLACE-upgrade.Change it to true/false to override the default value.
_backup_remote_copy=
5. Take the backup the EMS configuration to a remote machine using the following command:
Please make sure that in the BIOS boot order hard disk has given the highest preference so that if
reboots are involved during the upgrade then it automatically boots to hard disk.
6. When the script prompts you to specify the location to store the EMS configuration backup files, enter the
remote machine details.
7. After the backup is generated and stored on the remote machine, kickstart the system. Kickstarting the
system, performs an installation of OS, database, and EMS Software Application V09.03.00. For more details
on kickstarting the system, see EMS SWe Kickstart.
Check for the availability of these files in the remote system before kick starting the box: <hostnam
e>.emsConfig.tar and <hostname>.backupData.tar
8. After the system is kick-started, verify if the EMS upgrade is successful using the following command:
# cd /opt/sonus/ems/conf
10. Restore the backup from the remote machine to the EMS server using the following command:
# ./upgradeEMS.sh -r
11. The script prompts you to specify the location EMS configuration backup files, enter remote machine details.
To check the upgrade progress, go to the /var/sadm/install/logs/ directory and view the
latest log files to ensure upgrade is successful.
The above procedure completes the upgrade process for EMS Standalone using ISO KICKSTART upgrade.
# virt-manager&
2. Right-click the Virtual Machine, you want to open, and click Open from the pull-down list.
3. After the Virtual Machine opens, click Details in Toolbar and select IDE CDROM1 from the left pane and click
Connect.
A dialog box opens to select the ISO file.
4. Choose the default selection of ISO Image Location and click Browse to select the ISO file location.
A screen opens to browse the EMS system for selecting the ISO file.
5. Click Browse Local to select the path of ISO from the EMS system.
6. Locate and select the path from the respective directory in EMS system where the ISO file has been copied
and click Open.
7. The selected ISO file is displayed in the dialog box. Click OK to enable EMS selecting the ISO when it is
rebooted.
8. Select Boot Options from the left pane and from the pull-down menu next to Shut Down, select Reboot as
displayed in the following figure.
9. After reboot, the following screen is displayed. Type 1 and press Enter.
10. Once installation is completed, you should see the reboot screen shown in Figure 10. ISO installation may
take about 10 minutes.
11. From the Shutdown the virtual machine option, choose Force Off.
12. Browse to Show virtual hardware details screen. Select IDE CDROM 1 option and click Disconnect to
un-mount the iso. Refer Figure 11.
13. Go back to the Show the graphical console screen and click Power on the virtual machine to continue
with the rest of the installation.
14. Network configuration screen is displayed as shown in Figure 12.
15. Select Hostname and press the Space key to configure the hostname for the system.
16. Specify a relevant Hostname using which you can easily identify the VM host.
18. Select the TimeZone where the VM host system is located from the list of time zones.
19. Enter the NTP Time-Server IP Address, to synchronize the time for the VM host system.
Login screen is displayed, after the EMS Application Software Suite is successfully installed on the VM host.
20. Login as root user to the EMS Software on the VM host system.
Change the password of the root user the first time you login to the EMS application.
If EMS upgrade is not successful or if EMS is not stable after an upgrade then perform the following steps:
For EMA SA deployed for DR setup, perform the following steps on source and target DR sites.
a. Perform Insight Installation using old ISO. For more information, see " EMS SWe Kickstart".
b. Perform " Performing EMS Post-Installation Tasks".
c. Enter the following command to start Insight as user insight:
$ ./sonusEms start
2. Log in as root. Copy the following files from the backup directory on the remote server to the current location
(For example, /export/home/backups):
For EMA SA deployed for DR setup, perform the following steps on source and target DR sites.
The file expdp_stats_data_manual.dmp will be generated only if the PM stats export option is enabled.
expdp_data_manual.dmp
expdp_strct_manual.dmp
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
# cd /export/home/pkg
# ./EMSmigration -b /export/home/backups
OR Replace the directory /export/home/backups with the directory that you are using for your backup
data. The following output appears:
For EMS SA deployed for DR setup, after rollback of previous data is completed on source and
target DR sites, setup DR by executing the command ./manageDR setup on the EMS system at
the source DR site. For more information, refer Setup.
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under:
$ORACLE_BASE/admin/SIDB/udump/diag/rdbms/<ORACLE_SERVICE_NAME>/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
This step identifies the required upgrade files for download to the EMS primary server and how to prepare the files
for upgrade.
This step is used to manually backup EMS database and configuration on a regular basis.
This step is used to set the backup related parameter values in the upgrade template configuration file.
This step details the procedure to perform an ISO upgrade on the EMS primary server.
This step shows the post-upgrade mandatory tasks, after EMS upgrade is successful.
The EMS Secondary server is first upgraded followed by EMS Primary server. If the value set for _ems_bac
kup is true then backup is taken prior to upgrade on the EMS Primary server at the path /opt/oracle/
backup/dmp. In case the upgrade on secondary EMS fails, the upgrade process exits. The EMS Primary
server provides continued service without any downtime. Restore the backup files stored at the path /opt/
oracle/backup/dmp on the secondary server and retry the upgrade procedure.
If EMS HA Upgrade fails and both the primary and secondary servers are unstable, you can perform a fresh
EMS installation and restore the backup taken earlier. For more information, on how to kickstart EMS and
restore previous stable configuration refer Rollback EMS HA .
If EMS upgrade is not successful or if EMS is not stable after an upgrade then perform the following steps:
1. Install Insight on both the EMS HA systems (active and standby) by performing the following:
For EMA HA deployed for DR setup, perform the following steps on source and target DR sites.
a. Perform EMS Installation using the old ISO. For more information, see " Kickstart the HP G8 Servers ".
b. Installing EMS HA Application and Configuring HA .
c. Perform "Post-Installation Steps".
d. Enter the following command on Primary server to start Insight as user insight:
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS startAll
2. Log in as root. Copy the following files from the backup directory on the remote server to the current location
(For example, /export/home/backups):
For EMA HA deployed for DR setup, perform the following steps on source and target DR sites.
The file expdp_stats_data_manual.dmp will be generated only if the PM stats export option is enabled.
exp_data_manual.dmp
exp_strct_manual.dmp
expdp_data_manual.dmp
expdp_strct_manual.dmp
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
# cd /export/home/pkg
4. Enter the following command on EMS Primary server to migrate the data:
OR Replace the directory /export/home/backups with the directory that you are using for your backup
data. The following output appears:
For EMS HA deployed for DR setup, after rollback of previous data is completed on source and
target DR sites, setup DR by executing the command ./manageDR setup on the active system at
the source DR site. For more information, refer Setup.
Upgrading EMS SWe SA for DR Configuraton on KVM Upgrading EMS SWe HA for DR Configuraton on
KVM
The following summary outlines the key steps required to upgrading EMS application for EMS standalone DR
configuration.
Download and prepare the upgrade files on the source and target EMS standalone systems.
This step identifies the required upgrade files to be download to the HP DL380p Gen8 servers and how to prepare
the files for upgrade.
Ensure that the upgrade of the Target EMS site is started within about 15 minutes of starting
the upgrade of the Source EMS site. In other words, if upgradeEMS.sh is called on the
Source EMS site for example around 10:00 AM, then the upgradeEMS.sh on the Target
EMS site should be called no later than about 10:15 AM.
This restriction is required so that the upgrade script can automatically setup the DR
relationship on the upgraded EMS sites at the end of upgrade process.
DR is automatically torn down before upgrade and then automatically setup after upgrade.
Perform the mandatory post-upgrade tasks on the source and target EMS standalone system.
This step shows the mandatory post-installation steps you need to perform.
The EMS Disaster Recovery (DR) is setup automatically after successful upgrade of source and target
systems. For information on other DR operations, see EMS DR Operations. To verify that DR connectivity
has been setup after upgrade, execute the command manageDR status on the source DR site.
If the upgrade is not successful, then you can revert back to the previous EMS release by restoring the
backup manually. For more information, see Rollback EMS SA.
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
The following summary outlines the key steps required to upgrading EMS application for EMS HA DR configuration.
Download and prepare the upgrade files on the source and target EMS HA systems.
This step identifies the required upgrade files to be download to the HP DL380p Gen8 servers and how to prepare
the files for upgrade.
Manual Backup EMS Data on the source and target EMS HA systems.
If EMS HA upgrade fails at the source DR site, you must manually perform a
failover at Target DR site to function as the new source for DR site. Execute the
command 'manageDR failover' on the active system of Target site, to
perform failover and allow Target to function as the new Source of DR site. For
more details about failover, refer the section Failover.
Perform the mandatory post-upgrade tasks on the source and target EMS HA systems.
This step shows the post-upgrade mandatory tasks that need to be performed after EMS upgrade is successful.
The EMS Secondary server is first upgraded followed by EMS Primary server. If the value set for _ems_bac
kup is true then backup is taken prior to upgrade on the EMS Primary server at the path /opt/oracle/
backup/dmp. In case the upgrade on secondary EMS fails, the upgrade process exits. The EMS Primary
server provides continued service without any downtime. Restore the backup files stored at the path /opt/
oracle/backup/dmp on the secondary server and retry the upgrade procedure.
If EMS HA Upgrade fails and both the primary and secondary servers are unstable, you can perform a fresh
EMS installation and restore the backup taken earlier. For more information, on how to kickstart EMS and
restore previous stable configuration refer Rollback EMS HA.
For EMS SA administrative tasks, refer the section Insight Server Administration.
For EMS HA administrative tasks, refer the section EMS Server Administration for HA Linux.
For EMS SA database tasks, refer the section Insight Server Database Administration.
For EMS HA database tasks, refer the section Insight Server Database Administration for EMS HA.
Moving Virtual Machine (VM) License ID from one Physical Host to another
For more details about EMS Licensing details, refer the section Managing Licenses in User Guide.
This section provides details about moving VM to another physical hardware while keeping the same License ID
(UUID). The following are key criteria to which you need to adhere, before and after you move the VM to another
EMS system.
#shutdown now -P
2. Login to the physical host, where the old VM is located, as root user, and get the value of UUID:
A command output similar to the following is displayed. The UUID value to use in the new VM is specified in
the command output.
<uuid>ef6b9dd1-202d-b0ec-57e9-8e80b1809768</uuid>
3. Login to the physical host where the new VM is located, as root user, and edit the VM configuration:
6. After VM is fully started, login as root to the VM EMS and run the sonusLicenseKey command.
# /opt/sonus/ems/conf/sonusLicenseKey
Old EMS VM should no longer be started, after the UUID has been migrated to new VM.
If old EMS VM is still running, then login to the EMS as root and run the following command:
# shutdown now -P
After completing the EMS Installation, perform the mandatory post-installation tasks. For more details about
post-installation tasks, refer the section Performing Post-Installation Tasks.
Deleting EMS SA VM
This procedure describes the steps of deleting the SA VM. This section is only applicable, when you do not want to
use the VM anymore. You would not normally need to perform this procedure.
# /tmp/vm/setup-ems-kvm.sh -t sa -a delete
Deleting EMS HA VM
This procedure describes the steps of deleting the HA VMs. This section is only applicable, when you do not want
to use the VM anymore. You would not normally need to perform this procedure.
# /tmp/vm/setup-ems-kvm.sh -t ha -a delete
Insight EMS V09.03.00 is the first release of EMS SWe on VMware ESXi. The EMS SWe VMware upgrade
procedure is to support the upgrade of EMS on VMware with 9.3.0 to EMS Releases above 9.3.0 release.
To install and configure the EMS software edition, ensure that the Virtual Machine (VM) host meets the
recommended hardware, server platform, and software requirements.
The hardware and software settings are intended to ensure optimum EMS SWe stability and performance
for small and large configuration. If these settings are not used, EMS SWe system may not perform as
expected.
Depending on the SA or HA deployment type of installation, refer the following installation requirement
section:
This section provides information for small and large standalone and HA deployment configurations:
Minimum CPU rating that is supported is 2.0 GHz. Sonus will not support users with CPUs below 2.0 GHz.
Standalone Configuration
This section provides details about the software and hardware requirements for performing SA installation on
VMware:
Hardware that the host system is running, must have at least enough system and network resources (CPU,
disk, memory, and network) as the VMs that are planned to be created on the host.
To use the EMS Software Edition in a virtualized environment, Storage Area Network (SAN) must be used to store
the configuration data, the Operating System (OS) and EMS packages, EMS files, Oracle Automatic Storage
Management (ASM) files. The disk space and partitioning requirements, are different for 'small' and 'large'
configuration.
The EMS Software Edition installed on a virtualized environment, supports both local storage or remote
SAN storage (iSCSI LUN) to store the data. If a direct-attached RAID is to be used, ensure that the RAID
disks (LUNs) of required sizes are exposed on the host.
The high-level SAN setup requirements to use Storage Logical Unit Numbers (LUNs) in a virtualized environment
are:
SAN administrator must be knowledgeable about SAN concepts, managing and creating LUNs, and
setting-up the connectivity.
The Storage LUNs of the right size must be available on the host and exposed to the VMs being created as
SCSI disks.
Shared disks must be displayed as SCSI disks within the VM.
This section provides hardware and software requirement details for installing EMS SWe for HA deployment on
VMware.
Hardware that the host system is running, must have at least enough system and network resources (CPU,
disk, memory, and network) as the VMs that are planned to be created on the host.
To use the EMS Software Edition in a virtualized environment, Storage Area Network (SAN) must be used to store
the configuration data, the Operating System (OS) and EMS packages, EMS files, Oracle Automatic Storage
Management (ASM) files. The disk space and partitioning requirements are different for 'small' and 'large'
configuration.
The EMS Software Edition installed on a virtualized environment supports both local storage or remote SAN
storage (iSCSI LUN) to store the data.
Network connections (public and private) between the two VM hosts need to be established just as in the case of a
physical (HP G8) based HA setup. Configure the private and public network connections between hosts as shown in
Cabling and Network Connectivity for Insight EMS High Availability Cluster . Instead of direct-attached RAID, SAN
network connections need to be established between the two VM hosts to the SAN switch.
EMS HA Solution
Relevant network connections (separate from public/private HA network) and bonding must be setup for the storage
network to enable SAN storage.
The high-level SAN setup requirements to use Storage Logical Unit Numbers (LUNs) in a virtualized environment
are:
SAN administrator must be knowledgeable about SAN concepts, managing and creating LUNs, and
setting-up the connectivity.
The Storage LUNs of the right size must be available on the host and exposed to the VMs being created as
SCSI disks.
Ensure that both the HA nodes are pointing to the same shared LUN on the SAN.
Shared disks must be displayed as SCSI disks within the VM. For an HA setup, execute the scsi_id
command on both nodes and ensure that it displays the same value for shared disk on both nodes.
For better understanding the usage of each disks for EMS HA (small or large configuration), refer the following table:
Disk 250 GB (VM 1), 250 GB (VM 1), Used to store the OS and EMS packages. This disk can be either a local or
1 250 GB (VM 2) 250 GB (VM 2) a remote disk (iSCSI LUN).
Disk 300 GB (EMS) 60 GB (EMS) It is a shared disk used to store EMS files. The remote disk can be used
2 using iSCSI or direct attached (example IBM DS3524/IBM V3700) FC
connections.
Disk 600 GB (ASM) 90 GB (ASM) It is a shared disk used to store Oracle ASM files. The remote disk can be
3 used using iSCSI or direct attached (example IBM DS3524/IBM V3700) FC
connections.
Software Requirements
Software Version
Configuration Version
This section provides information about installing EMS SWe on VMware ESXi.
EMS SWe Standalone or IAS Installation Procedure for VMware ESXi Platform
EMS SWe HA Installation Procedure for VMware ESXi Platform
EMS SWe DR Configuration for EMS VMware
EMS SWe Standalone or IAS Installation Procedure for VMware ESXi Platform
This page provides Standalone EMS or IAS Software only installation procedure for Linux on VMware ESXi
platform. If you are installing EMS Software or IAS virtually for a standalone deployment on VMware ESXi, refer to
the following sections:
Perform the following steps for installing IAS. After completing IAS installation, ensure that you run
remoteIasInstall.sh script on EMS server and provide the IAS ip address. For more information, refer the
section Installing Insight Application Server.
Error Codes:
ORA-00942
ORA-942
Before proceeding, ensure that the hardware and software requirements to install EMS SA or IAS are met.
The following summary outlines the key steps required to install EMS Standalone or IAS sofware-only application on
a VMware ESXi Platform.
This step creates the Virtual Machine (VM) instance for installing EMS SA on VMware ESXi platform.
This step shows you what and how to download the EMS Standalone package from SalesForce.
This step shows you how to upload the EMS SA software image to datastore.
This step shows you how to mount the ISO image on VMware.
This step shows you how to install the EMS SA application or IAS on VMware.
This step shows you how to perform the mandatory post-installation tasks.
If you are doing an IAS installation, this step is not applicable. Post-installation tasks are only
performed for EMS installation.
Before creating a Virtual Machine and installing EMS SWe images, install VMware ESXi on the host or hosts
allocated for SWe. Please refer to VMware documentation for installing and configuring VMware ESXi.
References:
Installation Checklist
Prior to installing EMS software, you need to collect the information listed below.
Host name The name which identifies the system on the network. ems1
IP address The Internet Protocol (IP) address for the network interface. 10.9.9.103
Default The node on a TCP/IP network that serves as an access point to another network. 10.9.9.1
router
Netmask The mask used to determine to which subnet an IP address belongs. 255.255.255.0
of subnet
NTP The Network Time Protocol server to which the system containing VM synchronizes the time. 10.9.9.5
To install EMS SWe or IAS on a virtual machine (VM), you need to first create a VM and allocate its resources (for
example CPU, memory, and NICs), as well as configure a datastore to contain the operating system and EMS SWe
application software.
1. Login as root on the VMware host using the VMware vSphere client.
a. Enter VMware host machine IP Address.
b. Enter the root password.
4. Provide a Name for EMS VM. For example, ems_SA_smallconfig or ems_SA_LargeConfig through
which you can identify the VM configuration easily. The name can be up to 80 characters. Click Next.
5. From the Storage screen, select the appropriate SAN datastore that you have previously created and click
Next. This SAN is required to store all log-related data files.
7. From the Guest Operating System screen, make the following selections, and then click Next.
a. Click Linux as the Guest Operating System.
b. Select Red Hat Enterprise Linux 6 (64-Bit) from the Version drop-down menu.
8. From the CPUs screen, make the following selections, and click Next. The CPU, memory configuration, and
disk space size for small and large standalone configuration is different.
a. For creating VM with small configuration, select:
i. Number of virtual sockets: 1.
ii. Number of cores per virtual socket: 4.
iii. Click Next.
Or
b. For creating VM with large configuration, select:
i. Number of virtual sockets: 1
ii. Number of cores per virtual socket: 12
iii. Click Next.
9. From the Memory screen, assign memory for the virtual machine, and click Next. The minimum memory
required for small and large configuration is different.
a. For small configuration, select:
i. Memory Size: 8 GB
ii. Click Next.
Or
b. For large configuration, select:
i. Memory Size: 32 GB
ii. Click Next.
10. Define virtual machine network interface connections (NICs) using the following options from the drop-down
menus. Then click Next to continue.
11. From the SCSI Controller screen, click VMware Paravirtual as the SCSI Controller option, then click Next to
continue.
12. From the Select a Disk screen, click the Create a new virtual disk option, then click Next to continue.
13. From the Create a Disk screen, make the following selections:
a. For standalone small configuration, specify Disk Size as 300 GB, and perform the following steps to
create a disk:
i. In the Capacity section, assign a minimum of 300 GB of disk space.
ii. In the Disk Provisioning section, click the Thick Provision Eager Zeroed option.
iii. In the Location section, click Store with the virtual machine.
iv. Click Next.
Or
b. For standalone large configuration, specify Disk Size as 900 GB, and perform the following steps to
create a disk:
i. In the Capacity section, assign a minimum of 900 GB of disk space.
ii. In the Disk Provisioning section, click the Thick Provision Eager Zeroed option.
iii. In the Location section, click Store with the virtual machine.
iv. Click Next.
14. From the Advanced Options screen, keep the default value SCSI (0:0) as is and click Next. The default
virtual device node is SCSI (0:0).
15. From the summary screen, review your VM settings and click Finish. If needed, click Back to return to the
screen in question and make necessary adjustments.
16. When you are satisfied with your settings, click Finish to complete the VM creation.
The virtual machine is created under host IP address with the specified configuration.
17. After VM is created, you must manually enable autostart and autostop of the Virtual Machine. Enabling the
autostop/autostart of Virtual Machine is useful, in scenarios where power is lost and later regained. This
setting of VM helps autostart of VMs when the host machine is powered ON.
To autostart the VM, perform the following steps:
a. Select the host IP address from left-pane and click Configuration Tab. From the right-pane, click
Virtual Machine Startup/Shutdown displayed in Configuration Tab.
The following screen displayed.
c. Select the VM, which you want to automatically start and click Move Up.
The selected VM is displayed underneath Automatic Startup.
d. Click OK.
This completes the autostartup and autoshutdown settings for the Virtual Machine.
The EMS SWe application is available as a software package downloadable from the SalesForce customer portal.
1. Login to Salesforce customer portal using your Sonus provided login, and click SOFTWARE DOWNLOADS.
2. Click software bundle WL93 to view its contents, and then click Request Download.
3. Fill in the Software Download Form, accept the license agreement and click Submit.
4. When the Request Status on the SOFTWARE REQUESTS page displays Download Available, click the
links in the WL93 software bundle to download the files.
5. Download the EMS ISO image ems-V09.03.00R000-RHEL-06.04.02.00R000-x86_64 to your local
desktop from the Sonus Salesforce Customer Portal.
This section describes the steps to upload the EMS ISO image from your system to the SAN datastore. After
downloading the EMS ISO package from SalesForce, you need to upload the ISO file to the SAN datastore. After
the ISO image is available on SAN, it can be used to install EMS on VMs.
Ensure you have downloaded the EMS ISO file from SalesForce to your system, before executing the
following steps. For details, on how to download ISO from SalesForce, refer to the section Downloading
EMS SA SWe Software Package from Salesforce.
To upload the EMS Software ISO image to SAN datastore, perform the following steps:
1. Login as root user on the VMware host using the VMware vSphere client.
2. In the main vSphere client window, select the VM from the left pane.
3. Choose the Summary tab on the right pane, and right-click on the SAN datastore name, select Browse
Datastore... from the drop-down menu.
6. Select the ISO from your system where it was downloaded from SalesForce. Click Open to upload it to the
SAN Datastore.
A warning is displayed, indicating if the same file-name exists on the target, it will be replaced.
The Uploading... window pops up and shows the status of upload. Wait for the ISO to get uploaded on SAN
datastore.
2. Select the CD/DVD drive 1 option and select the Connect at power on check box. Click the Datastore ISO
file option and click the Browse button.
To perform the installation of EMS Software Suite on VMware for a Standalone setup or IAS, perform the following
steps:
1. Ensure that the Virtual Machine is started on the VMware ESXi server, before performing installation. If the
VM is not started, you need to start the VM.
a. To start the VM, click Power on the virtual machine highlighted in the following figure:
2. After the VM is started, the EMS Installation Option screen is displayed. Enter 1, to proceed with EMS
Installation.
To perform Insight Application Server (IAS) installation, enter 2 and proceed with IAS installation.
The RHEL Operating System installation is performed on the VM as shown in the following figure.
After the RHEL OS is installed, post-installation checks are performed as displayed in the following figure.
After RHEL is installed successfully and post-installation checks are successfully performed, the Reboot
screen is displayed.
Release the locks on the mounted ISO, before rebooting. To disconnect the mounted ISO,
disconnect the ISO from CD/DVD by performing step 3.
3. To release the VM locks on the mounted ISO, perform the following steps:
a. Right-click on the machine-name and select Edit Settings from the menu.
b. Select CD/DVD drive 1 (edited) and clear the Connect at power on check box.
c. A confirmation message is displayed as shown in the following figure. Click Yes and click OK, to
disconnect the ISO.
The EMS hostname is limited in length to 64 characters. The hostname can only contain lowercase
letters [a-z] and digits [0-9]. The hostname cannot start with a digit. Special characters including
hyphen are not allowed in hostname.
5. Specify a relevant Hostname using which you can easily identify the VM host and click OK.
6. After configuring host name, Sonus Network Configuration screen is displayed. Select IP Configuration
using the arrow keys and press Space.
a. Select the IP format (IPv4/IPv6) by which you want to configure IP address for eth0. Click OK.
b. Enter the IP Address, Subnet Mask, and Gateway details for the virtual interface.
7.
8. After configuring Time Zone, Sonus Network Configuration screen is displayed. Select Time Server using
arrow keys to configure the NTP Time server.
a. Enter the NTP Time-Server IP Address, to synchronize the time for the VM host system and click OK.
9. Login screen is displayed, after the EMS Application Software Suite and Oracle database are successfully
installed on the VM Host. Login as root user and default password 'sonus' to the EMS Software on the VM
host system.
10. The first time you login as root user, after EMS installation, you are enforced to change the default
password 'sonus'. Specify the current password and the New password that you want to set.
Ensure that new password is not a dictionary word or too similar to the current password.
After completing the EMS Installation, perform the mandatory post-installation tasks. For more
details about post-installation tasks, refer the section Performing Post-Installation Tasks.
Based on your requirements, obtain the required license from Sonus and install the licenses using
License Manager. For more information about how to install Licenses, refer the License Manger
section in EMS User Guide.
This page provides EMS HA Software only installation procedure for Linux on VMware ESXi platform. EMS Software
only (SWe) for HA deployment can be installed on VMware for both small and large configurations. If you are
installing EMS HA Software virtually on VMware ESX, refer to the subsequent sections.
Ignore the following errors, unless DB Instance creation fails. The following errors are seen on trace/alert
log files which is present under:
$ORACLE_BASE/admin/SIDB/udump/diag/rdbms/<ORACLE_SERVICE_NAME>/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
Before proceeding, ensure that the hardware and software requirements to install EMS HA are met.
The following summary outlines the key steps required to install EMS HA sofware-only application on a VMware
ESXi Platform.
This step creates the Virtual Machine (VM) instance for installing EMS HA on VMware ESXi platform.
This step shows you what and how to download the EMS HA package from SalesForce.
This step shows you how to upload the EMS HA software image to datastore.
This step shows you how to mount the ISO image on VMware.
This step shows you how to install the EMS HA application on VMware.
This step shows you how to perform the mandatory post-installation tasks.
Before creating a Virtual Machine and installing EMS SWe images, install VMware ESXi on the host or hosts
allocated for SWe. Please refer to VMware documentation for installing and configuring VMware ESXi.
References:
Refer to VMware Compatibility Guide for a list of VMware supported Intel processors.
Refer to ESXi hardware requirements to ensure the VMware supported Intel processors meet ESXi hardware
requirements.
Refer to vSphere Client and vSphere Web Client Software Requirements to ensure that your operating
Prior to installing Insight HA system, collect and record the values for the system parameters shown in the table,
System Information required for Insight HA Installation.
All public IP addresses except DNS IP and iLO IP should be configured in same subnet.
The configuration information given below is tested in the lab condition and do not accurately portray a
properly configured system.
Cluster Configuration
The name of the cluster can only contain lowercase letters [a-z], digits [0-9], and
hyphen [-].
The cluster name cannot start with a digit or hyphen, and cannot end with a
hyphen.
Cluster A virtual IP address used to uniquely connect to the EMS (owned by whichever 10.54.159.2
VIP server is active).
IPv6 A virtual IPv6 address used to uniquely connect to the EMS (owned by whichever fd00:10:6b50:4020::56/62
Cluster server is active).
VIP
(optional)
Netmask The mask used to determine to which subnet an IP address belongs. 255.255.255.0
of subnet
SCAN The second IP address used by the Oracle SCAN (single client access name) 10.54.159.201
Listener IP listener.
Address 2
SCAN The third IP address used by the Oracle SCAN (single client access name) 10.54.159.202
Listener IP listener.
Address 3
Hostname The name which identifies the system on the network. wfdems01a
Public IP The IP address on the public network for the node. 10.54.159.100
Address
Public The IPv6 address on the public network for the node. fd00:10:6b50:4020::56/61
IPv6
Address
(Optional)
Oracle VIP Virtual IP address that is assigned to Oracle Clusterware or RAC. 10.54.159.101
Private IP An IP address assigned to a device on a private TCP/IP Local Area Network that 192.168.128.1 is the
Address is accessible only within the Local Area Network. default value, change if
required.
Hostname The name which identifies the system on the network. wfdems01b
Public IP The IP address on the public network for the node. 10.54.159.102
Address
Oracle VIP Virtual IP address that is assigned to Oracle Clusterware or RAC. 10.54.159.103
Private IP An IP address assigned to a device on a private TCP/IP Local Area Network that 192.168.128.2 is the
Address is accessible only within the Local Area Network. default value, change if
required.
To install EMS SWe for HA setup, you need to create new virtual machine, each on two (2) separate physical
systems. The VMs must be created on two separate physical hosts to avoid single point of failure, in case one of the
system goes down. The following sub-sections describe how to create new Virtual Machine (VM) on VMware ESX
for primary and secondary systems.
Perform the following steps to create new virtual machine on VMware ESX server, using the VMware Client GUI.
The new VM created is configured to act as a primary host for HA setup. For non-primary host, a new VM is created
on separate physical system, which performs the role of non-primary EMS.
VMs that will act as EMS HA nodes, must be installed on two separate physical hosts for redundancy. First,
you must create a new VM for the primary host for HA setup.
1. Using VMware vSphere client, login to the host machine where VMware is installed.
2. You will see the machine IP address on the left pane.
3. Right-click on the IP address and choose New Virtual Machine.
4. Click the Custom option and click Next.
5. Name the new VM, for example, ems_ha_small_primary, and click Next.
6. Choose the SAN Datastore as the destination for VM files. You should have previously created this
datastore; click Next.
8. Click Linux as the Guest OS. RHEL 6 (64-bit) is selected by default. Click Next.
9. Mention the number of cores per virtual socket, based on small or large configuration.
a. For small configuration, choose 1 virtual socket and 4 cores per virtual socket.
b. For large configuration, choose 1 virtual socket and 12 cores per virtual socket.
c. Click Next.
11. Choose 2 NICs. Specify NIC 1 as Public Network and NIC 2 as Private Network, in that order. Leave
Adapter as VMXNET3 (default). Click Next.
14. Specify the following options for creating a disk and click Next:
Disk Size: Choose 250 GB.
Disk Provisioning: Click Thick Provision Eager Zeroed.
Location: Click Store with the virtual machine.
15. Perform the following advanced options selection for Virtual Disk:
a. Leave the Virtual Device Node at the default SCSI (0:0).
b. Leave Mode at the default (The Independent check box is cleared by default).
c. Click Next.
16. In the Ready to Complete screen, select Edit the virtual machine before completion. Click Continue.
17. For adding the first shared disk of size 600 GB, click the Add... button in the Virtual Machine Properties
screen.
20. Specify the shared disk size based on small or large configuration:
a. Disk Size: Based on large or small configuration, specify disk size as per the following specification:
For large configuration: Choose 600 GB.
or
For small configuration: Choose 90 GB.
b. Disk Provisioning: Click Thick Provision Eager Zeroed.
c. Location: Click Specify a datastore or datastore cluster.
d. Click Browse.
24. Click Finish to complete the creation of the first shared disk.
25. Perform the following SCSI controller settings, to allow virtual disk to be used simultaneously across both the
VMs located on each physical machine.
a. Select New SCSI Controller from the Virtual Machine Properties page.
b. Click Physical for SCSI Bus Sharing option.
c. Click Finish.
26. Wait for the Create virtual machine task at the bottom of the client window, to be of status Completed. It may
take a little while.
27. Now the second shared disk is added. For small configuration, specify the disk size as 60 GB and for large
configuration specify the disk size as 300 GB.
28. Right-click the new VM just created and click the Edit settings option from the pop-up menu.
37. Click Finish to complete the creation of the second shared disk of size 300 GB.
39. Wait for the Reconfigure virtual machine task at the bottom of the client window, to be of status Completed. It
may take a little while.
Follow instructions to upload the EMS ISO image to the SAN datastore. For more information about
how to upload, refer to Uploading EMS SWe HA Software Image to Datastore. Then mount the iso
as per the steps specified and start the VM to initiate the EMS installation. For more information
about mounting an ISO, refer to Mounting HA ISO Image on VMware.
40. The following settings need to be performed on both primary and secondary hosts, and will cause the VMs to
be automatically started up after a host reboot.
Enabling the autostop/autostart of Virtual Machine is useful, in scenarios where power is lost and later
regained. This setting of VM helps autostart of VMs when the host machine is powered ON.
To autostart the VM, perform the following steps:
a. Select the host IP address from left-pane and click Configuration Tab. From the right-pane, click
Virtual Machine Startup/Shutdown displayed in Configuration Tab.
The following screen displayed.
c. Select the VM, which you want to automatically start and click Move Up.
The selected VM is displayed underneath Automatic Startup.
d. Click OK.
This completes the autostartup and autoshutdown settings for the Virtual Machine.
After creating the new VM for primary host, create a new VM for secondary host. For secondary host, a new VM is
created on separate physical system, which performs the role of secondary EMS.
VMs that act as EMS HA nodes, must be installed on two separate physical hosts for redundancy. Ensure
that VM for primary system is already created, before you create a VM for secondary system.
1. Using VMware vSphere client, login to the host machine where VMware is installed.
2. You will see the machine IP address on the left pane.
3. Right-click on the IP address and choose New Virtual Machine.
4. Click the Custom option and click Next.
5. Name the new VM, for example, ems_ha_small_secondary, and click Next.
6. Choose the SAN Datastore as the destination for VM files. You should have previously created this
datastore; click Next.
8. Click Linux as the Guest OS. RHEL 6 (64-bit) is selected by default. Click Next.
9. Mention the number of cores per virtual socket, based on small or large configuration.
a. For small configuration, choose 1 virtual socket, and 4 cores per virtual socket.
b. For large configuration, choose 1 virtual socket, and 12 cores per virtual socket.
c. Click Next.
11. Choose 2 NICs. Specify NIC 1 as Public Network and NIC 2 as Private Network, in that order. Leave
Adapter as VMXNET3 (default). Click Next.
15. Perform the following advanced options selection for virtual disk:
a. Leave the Virtual Device Node at the default SCSI (0:0).
b. Leave Mode at the default (The Independentcheck box is cleared by default).
c. Click Next.
16. In the Ready to Complete screen, select the Edit the virtual machine before completion. Click Continue.
17. For adding the first shared disk of size 600 GB, click the Add... button in the Virtual Machine Properties
screen.
20. Click the Browse ... button to choose the disk file path.
21. In the browse window, select SAN datastore path. Click Open.
22.
23. Shared virtual disks configured, while creating VM for primary are displayed. Select the appropriate VM disk
name based on the disk size, for example, ems_ha_smallconfig_primary_1. Click OK.
24. The Disk File Path is displayed as shown in the following figure. Click Next.
25. Choose SCSI (1:0) for the Virtual Device Node option.
26. For Mode, select Independent and click Persistent. Click Next.
28. In the Virtual Machine Properties screen, select the New SCSI Controller option (second option from bottom)
and click Physical for the SCSI Bus Sharing option. Click Finish.
29. Wait for the Create virtual machine task at the bottom of the client window, to be of status Completed. It may
take a little while.
30. Add the second shared disk, by executing following steps:
a. Right-click on the newly created VM and click the Edit virtual machine settings option.
b. Click the Add... button in the Virtual Machine Properties window.
31. Choose Hard Disk for the device type. Click Next.
32. Click the Use an existing virtual disk option. Click Next.
33. Click the Browse... button to choose the disk file path.
35.
36. Choose the file name depicting disk size for the second share disk. For example, in this directory, file name is
ems_ha_smallconfig_primary_2.vmdk. Click OK after selecting the file.
38. Choose SCSI (1:1) for the Virtual Device Node option.
39. For Mode, select Independent and click Persistent. Click Next.
Follow instructions to upload the EMS ISO image to the SAN datastore. Then mount the iso as per
the steps specified and start the VM to initiate the EMS installation.
The EMS HA SWe application is available as a software package downloadable from the SalesForce Customer
Portal.
1. Log on to Salesforce customer portal using your Sonus provided login, and click SOFTWARE DOWNLOADS
.
2. Click software bundle WL93 to view its contents, and then click Request Download.
3. Fill in the Software Download Form, accept the license agreement, and click Submit.
4. When the Request Status on the SOFTWARE REQUESTS page displays Download Available, click the
links in the WL93 software bundle to download the files.
5. Download EMS ISO image emsrac-V09.03.00R000-RHEL-06.04.02.00R000-x86_64 to your local
desktop from the Sonus Salesforce Customer Portal.
This section describes the steps to upload the EMS ISO image from your system to the SAN datastore. After
downloading the EMS ISO package from SalesForce, you need to upload the ISO file to the SAN datastore. After
Ensure you have downloaded the EMS ISO file from SalesForce, to your system, before executing the
following steps. For details on how to download ISO from SalesForce, refer the section Downloading EMS
HA SWe Software Package from Salesforce.
To upload the EMS Software ISO image to SAN datastore, perform the following steps:
1. In the main vSphere client window, select the VM from the left pane.
2. Click the Summary tab on the right pane, and right-click on the SAN datastore name; select Browse
Datastore... from the drop-down menu.
5. Select the ISO from your system where it was downloaded from SalesForce. Click Open to upload it to the
SAN Datastore.
6. The Uploading... window pops up and shows the status of upload. Wait for the ISO to get uploaded on to the
SAN datastore.
The following steps describe how to mount the EMS iso image on a VM you have created:
2. Select the CD/DVD drive 1 option and select the Connect at power on check box. Click the Datastore ISO
File option and click the Browse... button.
To perform an EMS SWe installation on VMware for HA, first perform the EMS HA iso installation on both the HA
nodes separately. The EMS HA iso installation, performs lLinux installation and EMS installation. After that you need
to perform the EMS HA application installation and set-up the HA configuration for active and secondary system to
work as a HA pair.
To perform the installation of EMS Software Application on VMware for a HA setup, perform the following steps first
on the primary EMS VM followed by secondary EMS VM.
1. Ensure that both the Virtual Machines on primary and secondary systems are started, before performing
installation.
If the VM is not started, you need to start the VM.
a. To start the VM, right click on the newly created VM and click the Open option:
The following screen appears after some time, indicating the percentage of the Linux packages installed.
The packages and post-installation scripts are executed automatically. This process may approximately take
up to 30 minutes.
The following screen appears.
3. After successful installation of Red Hat Enterprise Linux, the reboot screen is displayed. Use the Tab key to
select the Reboot button. After selecting the Reboot button, press the Space key to reboot the system.
Release the locks on the mounted ISO, before rebooting. To disconnect the mounted ISO,
disconnect the ISO from CD/DVD by performing step 4.
4. To release the VM locks on the mounted ISO, perform the following steps:
a. Right-click on the machine-name and select Edit Settings from the menu.
b. Select CD/DVD drive 1 (edited) and clear the Connect at power on check box.
c. A confirmation message is displayed as shown in the following figure. Click Yes and click OK, to
disconnect the ISO.
The EMS hostname is limited in length to 64 characters. The hostname can only contain lowercase
letters [a-z] and digits [0-9]. The hostname cannot start with a digit. Special characters including
hyphen are not allowed in hostname.
a. In the Host Configuration Screen, specify the Hostname, Primary DNS, and DNS Search Path details.
Press the Tab key to select the OK button and press the Space key to save the settings.
Primary DNS Server IP Address, Secondary DNS Server IP Address and DNS Search Path
are optional.
b. Use the arrow keys to select IP Configuration and press the Space key to configure IP address.
Select eth0 interface for which you need to configure the IP Address. Use the Tab key to select the
OK button and press the Space key to configure IP address for eth0 network interface.
c. Specify the IP Address, subnet mask, and gateway IP Address for eth0 network interface. Use the Tab
key to move the cursor to other parameter. Press the Tab key to select OK and press the Space key
to save IP Address details.
d. Use the arrow keys to select Time Zone and press the Space key to configure the time zone. Select
the nearest time zone for the system and press the Tab key to select OK and press Space to save the
time zone settings.
7. Enter NTP Time Server IP Address, to synchronize the time for the VM host system and click OK.
8.
The above procedure completes the RHEL 6.4 OS and ISO installation on primary EMS HA system. Similarly,
you need to perform the RHEL 6.4 OS and ISO installation on secondary EMS HA system.
EMS HA VM installation procedure is similar to EMS HA physical (HP G8) based installation. Only difference is in
some configuration parameters used for installation (for example _public_interface is eth0 for VM, instead of
bond0).
EMS installation script (RACinstall_1) requires a configuration file. Create the configuration file by copying it from
a template file available under /export/home/pkg and then manually setting values for relevant fields. Use this
configuration file as input to installation script.
Perform the following procedure to configure the values for the template configuration files:
# cp rac.conf_VM.template /tmp/vm.rac.conf
# chmod +w /tmp/vm.rac.conf
For private IP, do not use the same private IP of the hypervisor.
# vi /tmp/vm.rac.conf
# Populate with the name of the primary node (where install is being done
from)
_node01=
# Populate with the shared IP address (IPv4) for this EMS cluster
sonusVIP.IPv4=
# Populate with the shared IP address (IPv6) for this EMS cluster
sonusVIP.IPv6=
# Leave blank. RAID array Controller IPs are not used in case of VM deployment
_array_controllerA_IP=
# Leave blank. RAID array Controller IPs are not used in case of VM deployment
_array_controllerB_IP=
After updating the values, press the ESC key and enter :wq! to save the configuration.
The following section provides details about running the EMS Installation scripts:
RACinstall_1 script
EMSRACinstall script
RACinstall_1 script
This script performs initial RAID and network related configuration across both nodes.
[root@emshp5vm1]# cd /export/home/pkg
3. After the script is successfully executed, you can proceed to the next step, which is EMSRACinstall script.
EMSRACinstall script
Perform the following procedure to create EMS partitions, install Oracle Clusterware and Oracle RAC on the primary
server.
To view the progress of the installation, open another session and view latest log files at /var/sadm/inst
all/logs.
# cd /export/home/pkg
# ./EMSRACinstall
4. All the Insight processes are automatically started as part of the installation.
The Insight EMS HA installation for VMware is complete.
Each script in the installation sequence generates its own log. The installation log files are found on the
primary node at /var/sadm/install/logs. If there are errors during the installation, refer to RACinsta
ll_1.<id>.log and RACinstall_2.<id>.log and EMSinstall.<id>.log .The DB installation log
files are located at /opt/oracle/orasql/SIDB01 on the primary node.
Based on your requirements, obtain the required license from Sonus and install the licenses using License
Manager. For more information about how to install Licenses, refer the License Manger section in EMS
User Guide.
After completing the EMS Installation, perform the mandatory post-installation tasks. For more details about
post-installation tasks, refer the section Performing Post-Installation Tasks.
Disaster Recovery setup consists of a source site and target site, both deployed at a geographical different
locations. In case, if the source (primary database) Insight system is disabled, the target system (standby database)
can be switched to the production role, thus minimizing the downtime and data loss associated with the outage. The
EMS Software Version V09.03.00 installed virtually on VMware, supports Disaster Recovery (DR) setup for both
Standalone and High Availability (HA) systems.
The EMS Software-only V09.03.00 on VMware deployed for a DR setup, must have same deployment type
(Standalone or High Availability) on source site and target DR site.
The EMS V09.03.00 on VMware does not support different source and target DR site
combination. For example, source site having an HA setup and target DR site deployed
with Standalone (SA) system.
Both the source and target DR sites must be installed on VMware. The DR setup does not
support software-only installation (VMware) on one site and physical server-based
installation on other DR site.
Performing EMS Software-only installation virtually for a DR setup is same as installation of EMS Software on
VMware for Standalone and HA. There is one additional step to be performed for DR deployment. After installing
EMS Software on both the source and target DR site, execute the /opt/sonus/ems/conf/DR/manageDR setup
command on source DR site to (if EMS HA, run on primary node of source site) configure and synchronize the
source (primary DB) and target (standby DB) sites for replication.
The following table lists the high-level steps with corresponding links for installing EMS Software-only V09.03.00 on
VMware for a DR setup.
The high-level steps for installing EMS SA virtually on VMware for DR setup are listed in the following table.
2 Download Files from Source and Target DR Downloading Files Downloading Files from
Salesforce Sites from SF SF
3 Creating VMware Virtual Source and Target DR Creating VMware Creating VMware Virtual
Machines Sites Virtual Machines Machines
4 Uploading EMS SWe SA Source and Target DR Uploading Image to Uploading Image to
Software Image to Sites Datastore Datastore
Datastore
5 Mounting ISO Image Source and Target DR Mounting ISO Image Mounting ISO Image
Sites
5 Perform EMS Installation Source and Target DR Performing EMS SA Performing EMS HA iso
Sites ISO Installation Installation
This section provides information on upgrading Insight EMS SWe on VMware ESXi.
Insight EMS V09.03.00 is the first release of EMS SWe on VMware ESXi. The EMS SWe VMware upgrade
procedure is to support the upgrade of EMS on VMware from 9.3.0 to EMS Releases above 9.3.0 release.
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under: $ORACLE_BASE/admin/SIDB/udump/diag/rdbms/sidb/$ORACLE_S
ID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
The following summary outlines the key steps required to upgrade EMS standalone server using ISO INPLACE
upgrade.
This step identifies the required upgrade files to be downloaded and how to prepare the files for upgrade.
If the upgrade is not successful, then you can revert back to the previous EMS release by restoring the
backup manually. For more information, see Rollback EMS SA.
The following summary outlines the key steps required to upgrade EMS standalone server using Kickstart upgrade.
This step identifies the required upgrade files to be downloaded and how to prepare the files for upgrade.
Execute the following steps to perform a kickstart upgrade for EMS SA:
To upgrade the EMS Standalone system using KICKSTART upgrade, perform the following steps:
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under: $ORACLE_BASE/admin/SIDB/udump/diag/rdbms/sidb/$ORACLE_S
ID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
The <NEW_EMS_VERSION> is the directory created while downloading the upgrade files. For
example, if you have created a directory /opt/emsInstall/9.3 for upgrading to 9.3, change the
directory to /opt/emsInstall/9.3/ (replace <NEW_EMS_VERSION>) with 9.3 in the following
command:
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
3. Change the permission of the upgradeEMS.sh file using the following command:
# cd /opt/emsInstall/<NEW_EMS_VERSION>/
# chmod +x upgradeEMS.sh
4. Generate the ems_upgrade.conf file and change the _upgrade_type parameter value to KICKSTART.
# ./upgradeEMS.sh -g /opt/emsInstall/<NEW_EMS_VERSION>/ems_upgrade.conf
b. Once the configuration file is generated, change the _upgrade_type parameter value to
KICKSTART in the ems_upgrade.conf file. The ems_upgrade.conf file contains comments that
guides you in editing the upgrade/backup parameter values.
# vi ems_upgrade.conf
# If the value is set to "true", then the data backup will be scp-ed to a
remote server.
# By default, the value is set to "true" for KICKSTART-upgrade and "false"
for INPLACE-upgrade.Change it to true/false to override the default value.
_backup_remote_copy=
5. Take the backup the EMS configuration to a remote machine using the following command:
Please make sure that in the BIOS boot order hard disk has given the highest preference so that if
reboots are involved during the upgrade then it automatically boots to hard disk.
6. When the script prompts you to specify the location to store the EMS configuration backup files, enter the
remote machine details.
7. After the backup is generated and stored on the remote machine, kickstart the system. Kickstarting the
system, performs an installation of OS, database, and EMS Software Application V09.03.00. For more details
on kickstarting the system, see EMS SWe Kickstart.
Check for the availability of these files in the remote system before kick starting the box: <hostnam
e>.emsConfig.tar and <hostname>.backupData.tar
8. After the system is kick-started, verify if the EMS upgrade is successful using the following command:
# cd /opt/sonus/ems/conf
10. Restore the backup from the remote machine to the EMS server using the following command:
# ./upgradeEMS.sh -r
11. The script prompts you to specify the location EMS configuration backup files, enter remote machine details.
To check the upgrade progress, go to the /var/sadm/install/logs/ directory and view the
latest log files to ensure upgrade is successful.
The above procedure completes the upgrade process for EMS Standalone using ISO KICKSTART upgrade.
This procedure is used when kickstart upgrade fails, and you want to perform kickstart installation on VMware. The
VMware virtual machine would already have been created earlier because this is a re-installation.
The EMS SWe application is available as a software package downloadable from the SalesForce customer portal.
1. Login to Salesforce customer portal using your Sonus provided login, and click SOFTWARE DOWNLOADS.
2. Click software bundle WL93 to view its contents, and then click Request Download.
3. Fill in the Software Download Form, accept the license agreement and click Submit.
4. When the Request Status on the SOFTWARE REQUESTS page displays Download Available, click the
links in the WL93 software bundle to download the files.
5. Download the EMS ISO image ems-V09.03.00R000-RHEL-06.04.02.00R000-x86_64 to your local
desktop from the Sonus Salesforce Customer Portal.
Perform the following steps to kickstart EMS SWe on an already created Virtual Machine:
1. Login as root on the VMware host using the VMware vSphere client.
a. Enter VMware host machine IP Address.
b. Enter the root password.
e. Select the ISO from your system where it was downloaded from SalesForce. Click Open to upload it to
the SAN Datastore.
A warning is displayed, indicating if the same file-name exists on the target, it will be replaced.
The Uploading... window pops up and shows the status of upload. Wait for the ISO to get uploaded on
SAN datastore.
b. Select the CD/DVD drive 1 option and select the Connect at power on check box. Click the
Datastore ISO file option and click the Browse button.
4. After the ISO Image is uploaded and mounted on VMware, install EMS SA on VMware, by performing the
following steps:
a. To start the VM, click Power on the virtual machine highlighted in the following figure:
c. After the VM is started, the EMS Installation Option screen is displayed. Enter 1, to proceed with EMS
Installation.
To perform Insight Application Server (IAS) installation, enter 2 and proceed with IAS
installation.
The RHEL Operating System installation is performed on the VM as shown in the following figure.
After the RHEL OS is installed, post-installation checks are performed as displayed in the following
figure.
After RHEL is installed successfully and post-installation checks are successfully performed, the
Reboot screen is displayed.
Release the locks on the mounted ISO, before rebooting. To disconnect the mounted ISO,
disconnect the ISO from CD/DVD by performing step 3.
d. To release the VM locks on the mounted ISO, perform the following steps:
i. Right-click on the machine-name and select Edit Settings from the menu.
ii. Select CD/DVD drive 1 (edited) and clear the Connect at power on check box.
iii. A confirmation message is displayed as shown in the following figure. Click Yes and click OK,
to disconnect the ISO.
iv. Go back to the Reboot screen and press the Enter key.
After reboot, the Sonus Network Configuration screen is displayed.
e. Press Enter to configure Hostname.
f. Specify a relevant Hostname using which you can easily identify the VM host and click OK.
Primary DNS Server IP Address, Secondary DNS Server IP Address and DNS Search Path
are optional.
g. After configuring host name, Sonus Network Configuration screen is displayed. Select IP
Configuration using the arrow keys and press Space.
h. Select the IP format (IPv4/IPv6) by which you want to configure IP address for eth0. Click OK.
i.
j. From the Sonus Network Configuration screen, select the Time Zone using the arrow-keys and
press the Space key to configure time zone.
i. Select the Time Zone where the VM host system is located from the list of time zones.
k. After configuring Time Zone, Sonus Network Configuration screen is displayed. Select Time Server
using arrow keys to configure the NTP Time server.
l. Enter the NTP Time-Server IP Address, to synchronize the time for the VM host system and click OK.
m.
n. The first time you login as root user, after EMS installation, you are enforced to change the default
password 'sonus'. Specify the current password and the New password that you want to set.
Ensure that new password is not a dictionary word or too similar to the current password.
After completing the EMS Installation, perform the mandatory post-installation tasks. For
more details about post-installation tasks, refer the section Performing Post-Installation
Tasks.
Based on your requirements, obtain the required license from Sonus and install the licenses
using License Manager. For more information about how to install Licenses, refer the Licens
e Manger section in EMS User Guide.
If EMS upgrade is not successful or if EMS is not stable after an upgrade then perform the following steps:
For EMA SA deployed for DR setup, perform the following steps on source and target DR sites.
a. Perform Insight Installation using old ISO. For more information, see " EMS SWe Kickstart".
b. Perform " Performing EMS Post-Installation Tasks".
c. Enter the following command to start Insight as user insight:
$ ./sonusEms start
2.
For EMA SA deployed for DR setup, perform the following steps on source and target DR sites.
The file expdp_stats_data_manual.dmp will be generated only if the PM stats export option is enabled.
expdp_data_manual.dmp
expdp_strct_manual.dmp
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
# cd /export/home/pkg
# ./EMSmigration -b /export/home/backups
OR Replace the directory /export/home/backups with the directory that you are using for your backup
data. The following output appears:
The following summary outlines the key steps required to upgrade EMS HA server using ISO upgrade. Perform
these steps on the EMS primary server only.
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under:
$ORACLE_BASE/admin/SIDB/udump/diag/rdbms/<ORACLE_SERVICE_NAME>/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
This step identifies the required upgrade files for download to the EMS primary server and how to prepare the files
for upgrade.
This step is used to manually backup EMS database and configuration on a regular basis.
This step is used to set the backup related parameter values in the upgrade template configuration file.
This step details the procedure to perform an ISO upgrade on the EMS primary server.
This step shows the post-upgrade mandatory tasks, after EMS upgrade is successful.
If EMS HA Upgrade fails and both the primary and secondary servers are unstable, you can perform a fresh
EMS installation and restore the backup taken earlier. For more information, on how to kickstart EMS and
restore previous stable configuration refer Rollback EMS HA .
If EMS upgrade is not successful or if EMS is not stable after an upgrade then perform the following steps:
1. Install Insight on both the EMS HA systems (active and standby) by performing the following:
For EMA HA deployed for DR setup, perform the following steps on source and target DR sites.
a. Perform EMS Installation using the old ISO. For more information, see " Kickstart the HP G8 Servers".
b. Installing EMS HA Application and Configuring HA .
c. Perform "Post-Installation Steps".
d. Enter the following command on Primary server to start Insight as user insight:
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS startAll
2. Log in as root. Copy the following files from the backup directory on the remote server to the current location
(For example, /export/home/backups):
For EMA HA deployed for DR setup, perform the following steps on source and target DR sites.
The file expdp_stats_data_manual.dmp will be generated only if the PM stats export option is enabled.
exp_data_manual.dmp
exp_strct_manual.dmp
expdp_data_manual.dmp
expdp_strct_manual.dmp
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
# cd /export/home/pkg
4. Enter the following command on EMS Primary server to migrate the data:
# ./EMSmigration -b /export/home/backups
OR Replace the directory /export/home/backups with the directory that you are using for your backup
data. The following output appears:
Upgrading EMS SWe SA for DR Configuraton on VMware ESXi Upgrading EMS SWe HA for DR
Configuraton on VMware ESXi
Insight EMS V09.03.00 is the first release of EMS SWe on VMware ESXi. The EMS SWe VMware upgrade
procedure is to support the upgrade of EMS on VMware from 9.3.0 to EMS Releases above 9.3.0 release.
The following summary outlines the key steps required to upgrading EMS application for EMS standalone DR
configuration.
Download and prepare the upgrade files on the source and target EMS standalone systems.
This step identifies the required upgrade files to be download to the HP DL380p Gen8 servers and how to prepare
the files for upgrade.
Ensure that the upgrade of the Target EMS site is started within about 15 minutes of starting
the upgrade of the Source EMS site. In other words, if upgradeEMS.sh is called on the
Source EMS site for example around 10:00 AM, then the upgradeEMS.sh on the Target
EMS site should be called no later than about 10:15 AM.
This restriction is required so that the upgrade script can automatically setup the DR
relationship on the upgraded EMS sites at the end of upgrade process.
DR is automatically torn down before upgrade and then automatically setup after upgrade.
Perform the mandatory post-upgrade tasks on the source and target EMS standalone system.
This step shows the mandatory post-installation steps you need to perform.
If the upgrade is not successful, then you can revert back to the previous EMS release by restoring the
backup manually. For more information, see Rollback EMS SA.
Insight EMS V09.03.00 is the first release of EMS SWe on VMware ESXi. The EMS SWe VMware upgrade
procedure is to support the upgrade of EMS on VMware from 9.3.0 to EMS Releases above 9.3.0 release.
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under:
$ORACLE_BASE/admin/SIDB/udump/diag/rdbms/<ORACLE_SERVICE_NAME>/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
The following summary outlines the key steps required to upgrading EMS application for EMS HA DR configuration.
Download and prepare the upgrade files on the source and target EMS HA systems.
This step identifies the required upgrade files to be download to the HP DL380p Gen8 servers and how to prepare
the files for upgrade.
Manual Backup EMS Data on the source and target EMS HA systems.
a. Perform INPLACE ISO upgrade procedure on the DR source primary EMS system.
b. After completing the DR Source site upgrade, perform INPLACE ISO upgrade procedure on the DR
target primary EMS system.
If EMS HA upgrade fails at the source DR site, you must manually perform a
failover at Target DR site to function as the new source for DR site. Execute the
command 'manageDR failover' on the active system of Target site, to
perform failover and allow Target to function as the new Source of DR site. For
more details about failover, refer the section Failover.
Perform the mandatory post-upgrade tasks on the source and target EMS HA systems.
This step shows the post-upgrade mandatory tasks that need to be performed after EMS upgrade is successful.
If EMS HA Upgrade fails and both the primary and secondary servers are unstable, you can perform a fresh
EMS installation and restore the backup taken earlier. For more information, on how to kickstart EMS and
restore previous stable configuration refer Rollback EMS HA.
For EMS SA administrative tasks, refer the section Insight Server Administration.
For EMS HA administrative tasks, refer the section EMS Server Administration for HA Linux.
For EMS database tasks, refer the section Insight Server Database Administration.
This procedure describes the steps for deleting the SA VMs. This section is only applicable, when you do not want
to use the VMs anymore. You would not normally need to perform this procedure.
This procedure describes the steps of deleting the HA VMs. This section is only applicable, when you do not want
to use the VMs anymore. You would not normally need to perform this procedure.
Deleting the HA VMs, results in data loss on disks of both the VMs.
1. Shutdown both (on primary and secondary hosts) the VMs if running.
2. First delete the VM on secondary host by following the steps below.
a. Select the VM from the vSphere client window left pane and right-click and select the Delete from
Disk option.
b. Choose Yes for the delete confirmation popup message.
3.
The following summary outlines the key steps required to install IAS SWe application on KVM or VMware.
Ensure that prerequisites for hardware and software requirements are met.
This step lists the hardware and software prerequisites for KVM or VMware.
This step creates the Virtual Machine (VM) instance for installing IAS, kickstarting the VM with IAS iso image.
Enter option 2 to install IAS base image.
Run the remoteIasMgmt.sh script from Insight EMS VM to install the IAS software load on the newly created
IAS VM.
This procedure is not applicable to install IAS remotely from Linux to Solaris IAS.
# cd /opt/sonus/ems/conf/IAS
# sh remoteIasInstall.sh <ias_ip_address>
where <ias_ip_address> is the IP address of the remote system on which you want to install IAS.
2. When prompted, enter the password of the root user for the remote system.
Messages appear that state that remote information is being retrieved and installation files are being copied
to the remote system. When the IAS is ready to be installed, a message appears that this may take several
minutes.
A message then appears stating that the IAS installation completed successfully, and that the IAS has
To start an IAS server, Insight must first be running on the Insight EMS server. You can then start the IAS by logging
into the Insight EMS server as user insight and entering the following:
$ cd /opt/sonus/ems/conf/IAS
$ ./remoteIasMgmt.sh start <ias_ip_address>
where <ias_ip_address> is the IP Address of the IAS, which can either be an IPv4 or an IPv6 address type. The
script prompts you for the insight user password of the IAS system and then proceeds with the command. Once the
IAS is started, it will continue to run even if Insight is stopped.
To stop an IAS server, Log on to the Insight EMS server as either root or insight and enter the following:
# cd /opt/sonus/ems/conf/IAS
# ./remoteIasMgmt.sh stop <ias_ip_address>
where <ias_ip_address> is the IP Address of the IAS. The script prompts you for the root or insight user
password of the IAS system and then proceed with the command.
For password related information, refer the section Managing Insight Account Names and Passwords".
The changed password is by default valid for 90 days. If you want to extend the password change duration,
modify the parameter PASS_MAX_DAYS 90 to PASS_MAX_DAYS 99999 in /etc/login.defs file,
using the vi editor.
In addition, the following post-installation tasks (mandatory/optional) must be performed depending on your
requirement.
For more information about post-installation tasks, refer the page Performing Post-Installation or Upgrade Tasks.
You can configure the EMS system IP address and passwords using the configureJumpstart.sh script. The
configureJumpstart.sh script changes the server IP address and updates this IP address in the database
tables. Also, this script updates the Netcool license information with the IP address.
The changed password is by default valid for 90 days. If you want to extend the password change duration,
modify the parameter PASS_MAX_DAYS 90 to PASS_MAX_DAYS 99999 in /etc/login.defs file,
using the vi editor.
Perform the following procedure to set the IP address and the system passwords:
1. Log in as root.
2. Enter the following commands:
# cd /opt/sonus/ems/conf
# ./configureJumpstart.sh
You can use the EMS IP address that you have configured while performing the EMS ISO
installation. Else if you want to change the EMS IP address, you can enter a new IP address.
4. If the following message appears, enter Y if you want to continue and overwrite the existing key.
If you want to use strong passwords (recommended for production setup), enter Y and skip to Step 6.
You can enter new passwords.
If you do not want to use strong passwords, enter N and continue to Step 5. The default passwords
When entering strong passwords (Steps 6 through 18), the passwords must meet the restrictions me
ntioned in Password Complexity.
6. If you entered Y in Step 4, a prompt asks for the EMS database (dbimpl) password. Enter the password. (The
only special characters allowed are _, $, and #.).
7. When prompted, re-enter the EMS database password.
8. When prompted, enter the EMS database sys password. (The only special characters allowed are _, $, and
#.)
9. When prompted, re-enter the EMS database sys password.
10. When prompted, enter the EMS database system password. (The only special characters allowed are _, $,
and #.)
11. When prompted, re-enter the EMS database system password.
12. When prompted, enter the EMS user password. For high availability and disaster recovery systems, you must
use the same EMS user password on each EMS system.
13. When prompted, re-enter the EMS user password.
14. When prompted, enter the Netcool root database user password.
15. When prompted, re-enter the Netcool root database user password.
16. When prompted, enter the Netcool Insight_Admin_User database user password.
17. When prompted, re-enter the Netcool Insight_Admin_User database user password.
18. When a message appears stating that the script is done, continue to 'Post-Installation Steps'.
The installation of PSX Manager GUI on EMS Server is only necessary if the PSX Manager Version is later
than the PSX Released version shipped with the EMS release. The following procedure is optional and
need not be performed, if you are already using the PSX Manager GUI which has the same version as the
PSX release shipped with EMS release.
Perform the following procedure to install the latest PSX Manager GUI:
If the PSX Manager GUI version is not the latest then download the respective release PSX
Manager GUI TAR file (SSGUI_<Version>_RHEL.tar) and execute upgrade steps from Step 3 on
wards.
# su - insight
$ ./sonusEms stop
4. If the /opt/sonus/install/ directory is not available, create the directory using the following command:
# mkdir -p /opt/sonus/install/
5. Download the SSGUI_V09.03.00R000_RHEL.tar file from Sonus SalesForce Customer portal to local
system.
6. Copy the SSGUI_V09.03.00R000_RHEL.tar file from the local system to the /opt/sonus/install/
directory on the EMS server.
7. Change to the /opt/sonus/install/ directory using the following command:
# cd /opt/sonus/install/
# cd /opt/sonus/install/SSGUI
10. Execute the GuiClient.sh script as a super root user. The GuiClient.sh script installs the SONSpsx
package at the default installation folder.
# ./GuiClient.sh
If, a prior version of PSX Manager GUI exists a confirmation message to remove the existing version is
displayed. Enter y to uninstall the prior version and install the latest version of PSX Manager GUI.
The following message is displayed after uninstalling the previous PSX Manager GUI and installing the latest
PSX Manager GUI version.
Removing SONSpsx.
Installing SONSpsx.
Preparing... ########################################### [100%]
1:SONSpsx ########################################### [100%]
11. Verify that the SONSpsx package is installed, by executing the following command:
# su - insight
$ ./sonusEms start
Perform the following procedure to install the latest PSX Manager GUI:
If the PSX Manager GUI version is not the latest then download the respective release PSX
Manager GUI TAR file (SSGUI_<Version>_RHEL.tar) and execute upgrade steps from Step 3 on
wards.
# su - insight
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS stopAll
# mkdir -p /opt/sonus/install/
7. Download the SSGUI_V09.03.00R000_RHEL.tar file from Sonus SalesForce Customer portal to local
system.
8. Copy the SSGUI_V09.03.00R000_RHEL.tar file from the local system to the /opt/sonus/install/
directory on the EMS server.
9. Change to the /opt/sonus/install/ directory using the following command:
# cd /opt/sonus/install/
# cd /opt/sonus/install/SSGUI
12. Execute the GuiClient.sh script as a super root user. The GuiClient.sh script installs the SONSpsx
package at the default installation folder.
# ./GuiClient.sh
If, a prior version of PSX Manager GUI exists a confirmation message to remove the existing version is
displayed. Enter y to uninstall the prior version and install the latest version of PSX Manager GUI.
The following message is displayed after uninstalling the previous PSX Manager GUI and installing the latest
PSX Manager GUI version.
Removing SONSpsx.
Installing SONSpsx.
Preparing... ########################################### [100%]
1:SONSpsx ########################################### [100%]
13. Verify that the SONSpsx package is installed, by executing the following command:
# su - insight
$ /opt/sonus/ems/conf/HA/RAC/sonusEMS startAll
17. Login to the EMS GUI on the EMS Primary and Secondary systems.
18. Click the Insight Administration icon on the left pane of the EMS GUI.
19. Click the General tab and select PSX Policy Server > PSX Manager Versions on the left bottom pane.
20. Click the Reload button to integrate the new PSX Manager version to Insight EMS server.
21. Access the PSX Manager GUI by clicking on Element Mgmnt > PSX Manager icon on the left pane.
This section provides information for changing IP address of EMS SWe on KVM or VMware.
This procedure is optional and should be performed, only if you want to change the IP Address of hosts on
which KVM and VMware based EMS SWe VMs are hosted.
Perform following steps to change the IP address of host on which KVM or VMware based EMS SWe is hosted:
1. Associate all managed nodes with the intended new IP address (see “Managed Device Association” in the
Administration chapter of the Insight User Guide). Setting the association now allows the server to begin
receiving and processing trap information immediately upon restart.
2.
# cd /opt/sonus/ems/conf/
# ./changeIpAddress.sh -i <ip_address> -d -a
After IP address is changed, ensure that the IP address entry exists or is same as in the /et
c/hosts
$ /opt/sonus/ems/sonusEms start
6. Start Insight.
7. Disassociate all registered nodes with the old IP address (see “Managed Device Association” in the Insight
Administration chapter of the Insight EMS User Guide).
The EMS Software Release V09.03.00 on Solaris platform, only supports SalesForce upgrade to V09.03.00.
The Jumpstart USB installation or upgrade is not supported for EMS Software Release V09.03.00 on
Solaris. To use EMS Software Release V09.03.00, perform an upgrade using SalesForce.
Table of Contents
The EMS Software Release V09.03.00 on Solaris platform, only supports SalesForce upgrade to V09.03.00.
The Jumpstart USB installation or upgrade is not supported for EMS Software Release V09.03.00 on
Solaris. To use EMS Software Release V09.03.00, perform an upgrade using SalesForce.
Table of Contents
This section provides an overview of Insight Element Management System (EMS) and provides information about
hardware requirements.
Overview on EMS
Sonus EMS, is a Web-based Element Management System ( EMS) that provides a graphical user interface (GUI)
for managing Session Border Controllers (SBC), Gateway Server (GSX), BGCF Routing Server (BRX), Riverstone,
Diameter Signalling Controller (DSC), PSX Policy Server (PSX), Data Stream Integrator (DSI), Access Server
(ASX), Access Directory Server (ADS), and Signalling Gateway (SGX).
SBC Session Border Controllers SBC 1000, SBC 2000, SBC 5x00, SBC 7x00, SBC SWe
The following section details the hardware and software configuration for Insight EMS Standalone.
Many factors, from network topology to the nature of user operations, affect the performance of the system. The
Insight application is memory- and I/O-intensive, particularly when performing large data collections and exporting. If
you do not collect performance data extensively or frequently, then the platform's ability to support managed devices
and users increases. Under heavier loads the performance of the system will degrade gracefully.
Hardware Configuration
The following tables lists the hardware configurations required for Insight EMS Standalone system.
Table 57: Current Netra T5220 Hardware Configurations Available from Sonus.
Netra T5220 (four-drive) 4 x 1.2 GHz CPU, 16 GB memory, 4 x 146 GB hard drives, 4 x 10/100/1000 Ethernet Ports.
/export/home/oracle/oradata 50GB
(reserved) 0.15GB
/export/home/ems/weblogic/sonusEms/data 60GB
(reserved) 0.15GB
Disk Mirroring
Software disk mirroring for Insight is supported on Netra T5220 four-disk systems. The following mirrors are set up:
In addition to protecting against disk failure, enabling disk mirroring will also make it easier for you to perform a
fallback to Insight V09.03.00 from future Insight upgrades, particularly HA upgrades.
The main Java Insight memory settings and database software memory settings are automatically recalculated on
upgrades or system reboots. If changes to the automatically calculated settings are needed, contact the Sonus TAC.
UPS Recommendations
Sonus recommends that the Insight platform be protected by an uninterrupted power supply (UPS) to prevent the
ungraceful shutdown of Netcool. An ungraceful shutdown of Netcool can cause database file corruption that
Software Requirements
Sun Netra SNMP Management Agent Sun Netra SNMP Management Agent 1.6.2
Lsof 4.8
The minimum Java Client Version support for EMS and PSX Manager is 1.7.0_72. The EMS and PSX
application is tested with above version. But the application will work with 1.7.0_72 and above version also. If
you don't have the latest Java Client version, you will get warnings messages in the browser and from the
plugin.
The Insight Application Server (IAS) lets you run the Insight API, the Insight SMS API, the SGX API, and the Lawful
Intercept Target Provisioning API on a system other than the Insight server. For an overview of the IAS, see Insight
Application Server.
You require two servers to install Insight and IAS. You need to install Insight on server A before installing IAS on
server B.
Know the IP address of the remote system on which you want to upgrade IAS
Know the password for the root user on the remote system
Have a system that meets the specifications in Hardware and Software Configuration for EMS Standalone.
Sonus recommends that you start Insight on the EMS before you upgrade the IAS
Table of Contents
Upgrading an IAS
Upgrading an IAS
To upgrade an IAS perform the following tasks:
To determine whether the Solaris patch has already been installed on your system, perform the following steps:
uname -v
2. Read the output. If the following line appears, the Solaris patch has already been installed:
Generic_150400-20
If the output does not match the previous message, install the Solaris OS patch. For more details, see Step 1
Upgrading Solaris Operating System.
# cd /export/home/ems/conf/IAS
# sh remoteIasInstall.sh <client_ip_address>
where <client_ip_address> is the IP address of the remote system on which you want to upgrade IAS.
2. When prompted, enter the password of the root user for the remote system.
3. Messages appear that state that remote information is being retrieved, and upgrade files are being copied to
the remote system.
4. When the IAS is ready for upgrade, a message appears that this may take several minutes.
A message then appears stating that the IAS installation completed successfully, and that the IAS has
started.
The remoteIasInstall.sh script takes care of both IAS install and upgrade.
To start an IAS server, Insight must first be running on the Insight EMS server. You can then start the IAS by logging
into the Insight EMS server as user insight and entering the following:
$ cd /export/home/ems/conf/IAS
$ ./remoteIasMgmt.sh start <client_ip_address>
where <client_ip_address> is the IP Address of the IAS, which can either be an IPv4 or an IPv6 address type. The
script prompts you for the insight user password of the IAS system and then proceeds with the command. Once the
IAS is started, it will continue to run even if Insight is stopped.
To stop an IAS server, Log on to the Insight EMS server as either root or insight and enter the following:
# cd /export/home/ems/conf/IAS
# ./remoteIasMgmt.sh stop <client_ip_address>
where <client_ip_address> is the IP Address of the IAS. The script prompts you for the root or insight user password
of the IAS system and then proceed with the command.
To obtain the status of an IAS server, Log on to the Insight EMS server as either root or insight and do the following:
# cd /export/home/ems/conf/IAS
# ./remoteIasMgmt.sh status <client_ip_address>
where <client_ip_address> is the IP Address of the IAS. The script prompts you for the root or insight user password
of the IAS system and then proceeds with the command. The output of the status command looks similar to the
following:
When the changeIpAddress.sh script is used to change the IP address of the Insight server, all IASs that are
registered to the Insight server should be automatically updated to the new IP address of the Insight server.
To update the Insight IPv4/IPv6 address on a specific IAS, perform the following:
where <client_ip_address> is the IPv4/IPv6 address of the IAS on which you want to update the Insight
IPv4/IPv6 address.
The Insight IPv4/IPv6 address on the IAS is updated to the IPv4/IPv6 address of the Insight server.
To update the Insight IPv4/IPv6 address on all the IASs that are registered to the Insight server, perform the
following:
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IPv4/IPv6 address on all IASs that are registered to the Insight server are updated to the IPv4/IPv6
address of the Insight server.
If you have the system administrator change the name or the IPv4/IPv6 address of the IAS, you do not have to
change any additional files. You do need to:
Update the IAS node in the Insight Node Registration Page, and rediscover the IAS node. See “Updating a
Node” in the Insight Administration chapter of the Insight EMS User Guide.
Licenses for Enabling Insight API, SMS API, SGX API, and Lawful Intercept Target
Provisioning API on the IAS
If you install the Insight API, Insight SMS API, Insight SGX API, or Lawful Intercept Target Provisioning API on an
IAS, you must purchase a license for each instance of an API module you want to use. You cannot share a license
between an API module on the Insight server and an API module on an IAS. For example, you cannot share a single
license between an Insight SMS API module on the Insight server and an Insight SMS API module that is installed
on a remote system with IAS.
The IAS server will be stopped now. Do you want to proceed? (default: yes)
[y,n] y
Stopping IAS...
# cd <IAS_BASE>/bin
# ./disableHTTP.shDisabling HTTP access to IAS server
The script will now proceed with disabling HTTP for client access.
The IAS server will be stopped now. Do you want to proceed? (default: yes) [y,n] y
Stopping IAS...
*** Stopping IAS! - Thu Apr 25 12:34:55 IST 2013 ***
IAS Server stopped.
Table of Contents
This section provides an introduction to the upgrade framework, upgrade paths, and upgrade scenarios before
describing the Insight Software upgrade procedures.
You can upgrade Insight using the emsBootstrap-V09.03.00R000.tar file that you obtain from the Sonus
Salesforce Customer Portal. This tar file contains necessary files and scripts of the Insight upgrade framework. The
upgrade framework has divided the complete upgrade procedure into three major phases such as pre, main, and
post.
Pre Upgrade phase validates the current state of the Insight system.
The preInstall.pl script displays relevant messages and guides the user through the upgrade procedure.
During this phase, all the configuration details are collected and the required database, fault management, and
configuration backups are taken before proceeding to the next phase of Insight upgrade.
The preInstall.pl script generates the Third party software, Operating System, and Firmware version details of
the current system and also the versions that are required to upgrade Insight to the targeted system.
Main Upgrade phase automates the upgrade process. It displays the current upgrade activities on the screen.
Post Upgrade phase cleans up or removes the unnecessary data or files from the system.
The following table lists the different Insight software upgrade scenarios:
Upgrade scenarios
Scenario Description
Single Insight Server Upgrade You can upgrade an Insight standalone Insight software by using the Insight installation
from Sonus Salesforce Customer script and the Sonus Operating System patch from the Sonus Salesforce Customer
Portal Portal.
The following files need to be downloaded from Sonus Salesforce Portal before you start the upgrade:
Sonus_OS_delta_9.3_Upgrade.tar.gz Mandatory
EMS_SonusDBPackage_solaris-V09.03.00R000.tar Mandatory
Solaris_Utilities_<current_release_name>.tar Mandatory
emsBootstrap-V09.03.00R000.tar Mandatory
EMS.V09.03.00R000.tar.Z Mandatory
SSGUI_V09.03.00R000.tar Optional
When an existing network is to be upgraded, use the following upgrade sequence for the network elements that will
be upgraded:
1. Obtain the required software licenses for additional software modules you will be adding. For more
information on Insight licenses, see Licenses for Enabling Insight API, Insight CLI, SMS API, SGX API,
Lawful Intercept Provisioning API, and Traffic Manager. You will apply the licenses in Step 9.
2. Upgrade the Insight Element Management System server software.
When upgrading a system that is running HPC, avoid loss of HPC service by installing and
activating the HPC license (NW-HPC) after you upgrade Insight and before you upgrade PSX. See
the Insight EMS User Guide for details.
After you upgrade (or downgrade) software on a Sonus node (PSX, SGX, GSX, etc.), a user with
administrative privileges must rediscover the node in the Insight Administration page: in the Node
tab, select a node from the Sonus Managed Nodes list, and click the Discover button. Failure to
perform this rediscovery will result in the loss of Traffic Manager reporting and may result in
excessive error generation in the error logs (particularly in the case of a downgrade).
9. Apply the required licenses. For more information on Insight licenses, see Licenses for Enabling Insight API,
Insight CLI, SMS API, SGX API, Lawful Intercept Provisioning API, and Traffic Manager-SA Solaris .
This section addresses installation and/or upgrade of Insight only. For instructions on installing/upgrading
other network elements, consult the appropriate element guides.
While an Insight server is being upgraded, EMS and SMS API requests from clients can be handled by IASs:
1. If you are not running HA, then you need to have at least two IASs to avoid a single point of failure. This is
because an IAS server cannot restart while Insight is down.
2. Before upgrading the Insight server, configure API clients or HTTP load balancers to direct API requests only
to IASs, not to the Insight server.
3. Upgrade the Insight server. While Insight is down, the IASs will continue to process EMS and SMS API
requests from clients.
4. After Insight is upgraded, Sonus recommends that each IAS be upgraded as soon as possible to ensure
consistent operation with the EMS. Older versions of IASs cannot run new versions of the API or handle new
features. While an IAS is being updated, any API clients or HTTP load balancer should be configured to direct
requests to Insight or other IASs.
Table of Contents
This section contains the instruction for upgrading Insight Standalone to Release V09.03.00 using the files from the
Sonus Salesforce Customer Portal.
Upgrade can take longer time if EMS releases (V07.03.07, V08.04.00R000 or versions higher) are directly
installed or upgraded to any other release. The upgrade time can be longer depending on the number of
rows in IPTRUNKGROUPINTERVALSTATS table. It is recommended to reorder the columns in this statistics
table in another maintenance window prior to upgrading EMS. For more information, contact Sonus
Customer Support.
General Prerequisites
General Prerequisites
Upgrade operation is not supported with the changed netcool object server name. To perform an upgrade,
you need to first rollback to default netcool object server name “SONUSDB”. For changing the netcool object
server name, refer Changing Netcool DB Object Server Name for EMS SA.
You have read Insight Upgrade Considerations.
You have read the latest Sonus Insight release notes for important information.
Download the latest version of EMS documents from the Sonus Salesforce Customer Portal.
You have super user (root) access on the Solaris system.
You should be aware of the Insight account and default passwords. For more details, see Insight Account
Names and Passwords .
You have terminal access to the server on which you are upgrading Insight.
Your system meets the minimum hardware requirements (Hardware Configuration).
Warning Notices (WBAs)—Sonus recommends that you view the warning notices pertaining to this release to
see if your software or hardware platforms are affected. If you have an account on Sonus Salesforce
Customer Portal, you can find the warning notices at
https://c.na8.visual.force.com/apex/SolutionList?sfdc.tabName=01r80000000Q04H. If you do not have a
Sonus Salesforce Customer Portal login account, you can contact the Sonus Technical Assistance Center
(TAC).
For Rollback using disk mirroring, you need to do the following setup:
1. If you experience any issues in your production network following an upgrade, you can return to the previous
version of Insight using disk mirroring.
Rollback using disk mirroring is supported only on Netra T5220 devices with 4 disks
a. The following mirrors are available where disks 0, 1 are master disks and 2,3 are slave disks.
Before upgrading, following mirrors are set up:
Disk 0 -> Disk 2
Disk 1 -> Disk 3
Refer section Enabling Disk Mirroring for enabling disk mirroring.
b. If you intend to use Disk mirroring as a rollback option, then make sure that mirroring is enabled, and
that the mirrors are in sync, using 'metastat -c' command.
This should be done before performing any upgrade related tasks.
Please note that using Disk mirroring as rollback option will require physical access to the
system, in case of upgrade failure, to swap the disks.
c.
Download the following files from Sonus Salesforce Customer Portal to perform the Insight Upgrade.
Perform the following steps to download the EMS Bootstrap file: emsBootstrap-V09.03.00R000.tar
from Sonus Salesforce Customer Portal and place the file in the EMS server:
# mkdir -p /export/home/install/ems/
3. Download the emsBootstrap-V09.03.00R000.tar file from the Sonus Salesforce Customer Portal to
/export/home/install/ems/
4. Untar the emsBootstrap-V09.03.00R000.tar file by entering the following command:
# tar xf emsBootstrap-V09.03.00R000.tar
5. Ensure that all the extracted files have owner and root privileges by entering:
# ls -l
# chown -R root:root *
The manual tar extraction should be done only in case of Solaris standalone EMS.
Here are the steps to download the Solaris Operating System file Sonus_OS_delta_9.3_Upgrade.tar.gz
from Sonus Salesforce Customer Portal and place the file in the EMS server:
For upgrading the Insight to V09.03.00, the Solaris Operating System patch version must be
Generic_150400-20.
# uname -v
Read the output, if the following line appears, the Solaris OS patch has been already installed, and you can
skip the remaining steps.
Generic_150400-20
If the output does not match the message above, you need to install the Solaris OS patch.
2. Download the Sonus_OS_delta_9.3_Upgrade.tar.gz file from the Sonus Salesforce Customer Portal to
the /export/home on the target server.
# cd /export/home/packages
# unzip 147309-09.zip
1. Determine the SNMP Management agent Version by entering the following command:
If the packages are not at least version 1.6.2, then proceed the remaining steps, otherwise no need upgrade
the SNMP software and skip the remaining steps.
# mkdir -p /export/home/tmp
# cd /export/home/tmp
# cd UTILITIES_<current_release_name>
Perform the following steps to verify the Oracle Database version and security patch. If the Database version or
security patch installed is not the latest, download the Oracle Database file
EMS_SonusDBPackage_solaris-V09.03.00R000.tar from Sonus Salesforce Customer Portal to the EMS
server:
For upgrading the Insight to V09.03.00, the Oracle Database version should be 11.2.0.3.0 with the latest
security patch 19271438. Even if the existing database version is 11.2.0.3.0, verify and ensure that you
upgrade to the latest security patch 19271438.
su - oracle
sqlplus -version
If the following line appears, the Oracle Database 11.2.0.3.0 is installed. Even if DB version is
11.2.0.3.0, verify if the latest security patch has been installed.
If the output does not match the message above, you need to upgrade the Oracle Database.
2. Execute the following command to verify if the latest Security Patch Update (SPU) has been applied or not:
a. Login as user oracle by entering the following command:
su - oracle
b. Enter the following command to verify the latest Security Patch Update (SPU) version is applied on the
system:
If the command output does not match the latest Security Patch Update (SPU) version 19271438 then
you need to upgrade the Oracle Database.
# uncompress EMS.V09.03.00R000.tar.Z
# tar xvf EMS.V09.03.00R000.tar
The manual tar extraction should be done only in case of Solaris standalone EMS.
During the execution of the preinstall.pl script, several files and DB entries are backed-up in the
following directories:
/export/home/ems/weblogic/sonusEms/data/cli/scripts
/export/home/ems/weblogic/sonusEms/data/pm_archive : Performance CSV files
This can increase the upgrade duration. If need to reduce the upgrade time, contact Sonus TAC.
The Insight upgrade may fail if there is insufficient space in the following directories:
/export/home/ems
/var
/tmp
Contact Sonus TAC for troubleshooting this issue.
1. To produce a log of the upgrade, use the /usr/bin/script command to create a record of the terminal
session. This command creates a sub-shell where you run the installation. When it completes, type exit to
terminate the script command. As super user, enter the following command:
/usr/bin/script -a <Log_file_name>
perl preInstall.pl
The preInstall script collects the current configuration details of the machine. The following message
appears:
************************************************************
EMS preInstall.pl for target release version V09.03.00R000
** Run this script BEFORE upgrading current EMS system
** (Press ENTER to select default values shown in braces)
*******************************************************
Starting preInstall.pl execution on : Tuesday, August 2, 2011 10:05:06 AM EDT
Upgrade from current version of EMS "XXXXXXX" to EMS release version "XXXXXX"
is not supported.
Please contact Sonus Customer Support for additional information on supported
Insight Upgrade Paths.
Do you want to proceed with the upgrade procedure (y/n/Y/N)? (default:N):
Enter N, if you want to stop the upgrade procedure. Or Enter Y, if you want to continue the upgrade
procedure.
Press Ctrl + c, if you want to exit from the script. Or Press Enter to continue.
7. The following prompt appears:
Enter Y, if you want to take a backup of the EMS configuration and database. Or Enter N, if you do not want
to take a backup of the EMS configuration and database.
The following prompt appears:
Sonus recommends you to take a backup of the system if you need to rollback to the current
version.
8. If you have selected Y in the above prompt, the following prompt appears:
Do you wish to import User Activity Logs, PM Stats and TrunkGroup Tables
(please note that this may take some time) (y/n/Y/N)? (default:Y):
Enter Y, if you want to import the Activity Logs, PM Stats and TrunkGroup Tables.
Or
Enter N, if you do not want to import the Activity Logs, PM Stats and TrunkGroup Tables.
9.
Do you want to take the backup of Performance CSV files (y/n/Y/N)? (default:N)
If you want to take a backup of the Performance CSV files from a different location, enter the location details.
Or
Enter N, if you do not want to take a backup of the Performance CSV files.
The following message appears:
Running backupData.pl...
Creating backupFiles.tar.
.
.........................................
Moving the files to /export/home/backup.
Backup procedure completed successfully.
Backup of Performance CSV files complete.
backupData.pl is complete.
Execution of backupData.pl is completed.
Enter Y, if you want to push the backup files to the remote host.
You will be prompted to enter the following details:
Remote sftp host name or IP
Username for sftp
Login Password
Directory on remote host
Or
Enter N, if you do not want to push the backup files to the remote location.
12. The following prompt appears:
If the script indicates that you should upgrade the Operating System and Oracle, upgrade the same using "
Upgrading the Third Party Software".
If you have not installed or upgraded the latest Third Party Software versions on your system, then perform the
following:
The ILOM firmware upgrade procedure must be done before you perform Oracle upgrade and EMS
application upgrade.
If you are upgrading to Insight V09.03.00, the Solaris Operating System patch version should be
Generic_150400-20. Installing the Solaris Patch may approximately take 90 minutes. Before upgrading the
Solaris Patch, you need to determine the Solaris Patch Level.
# uname -v
If the output does not match the previous message, install the Solaris OS patch.
You can copy the solaris OS patch from the Sonus SalesForce Customer Portal and then perform an upgrade.Copy
the Solaris OS patch Sonus_OS_delta_9.3_Upgrade.tar.gz from the Sonus Salesforce Customer Portal to a
location on the target server (example, /export/home).
$ /export/home/ems/sonusEms stop
$ sqlplus /nolog
SQL> conn / as sysdba
SQL> shutdown immediate
SQL> exit
$ exit
Installation of patches should be performed using single user mode and should be performed
using terminal server port connection.
2. When the system prompt appears, issue the following command to reboot the system:
# reboot -- -s
3. Enter the root user password when the following prompt appears
Root password for system maintenance (control-d to bypass):
4. As root user, enter the following:
# mount /export/home
5. Perform the following steps to create the OS directory and extract the
Sonus_OS_delta_9.3_Upgrade.tar.gzfile.
a. Extract the downloaded Sonus_OS_delta_9.3_Upgrade.tar.gz file by using the following
commands:
# cd /export/home
# gunzip Sonus_OS_delta_9.3_Upgrade.tar.gz
# tar xf Sonus_OS_delta_9.3_Upgrade.tar
6. After the Sonus_OS_delta_9.3_Upgrade.tar.gz file is extracted, remove the tar file to free-up disk
space.
# rm -f Sonus_OS_delta_9.3_Upgrade.tar
# cd /export/home/Sonus_OS_delta_9.3_Upgrade
# ./upgrade.sh
# reboot -- -r
The output is displayed as follows before the system logs out to reboot:
Then log on to the server after few minutes to verify the latest patch cluster.
10. To verify that the latest Solaris OS patch, enter:
# uname -v
Generic_150400-20
11. Remove the OS package directory to reclaim space, by executing the following command:
# rm -rf /export/home/Sonus_OS_delta_9.3_Upgrade
If you are upgrading Insight using the Sonus Salesforce Customer Portal, you need to upgrade the SNMP
Management Agent to version 1.6.2.
1. Login as root.
2. Change to the directory containing the extracted cluster by entering:
# cd export/home/tmp/UTILITIES_<current_release_name>/SNMP_1.6.2
# /etc/init.d/masfd stop
4. Run the SNMP agent upgrade script. The script removes the old packages and installs the new packages.
# ./install.sh
5. Verify that the packages have been updated by entering the appropriate command. If the packages were
properly installed, the versions should be 1.6.2.
# /etc/init.d/masfd start
The changes on the SNMP daemon will take two minutes to start.
7. Confirm that the SNMP agent is running by entering:
If you are upgrading Insight using the Sonus Salesforce Customer Portal, you need to upgrade the ILOM firmware.
To determine the current version of the system firmware, perform the following steps:
2. If system firmware version is not at 7.4.7, then perform Upgrading System Firmware.
Do not downgrade the version of the system firmware. Doing so would result in ILOM no longer working,
requiring you to replace hardware.
If any error occurs during the firmware upgrade, you can reset the Service Controller through ILOM CLI
using the resetsc command:
sc> resetsc
If this command also fails, contact your next level of Sonus Support.
Perform the following procedure to upgrade the system firmware using the CLI:
# cd /export/home/packages
# unzip 147309-09.zip
# cd /export/home/packages/147309-09
# ./sysfwdownload Sun_System_Firmware-7_4_7-Netra_T5220.pkg
# shutdown -i0
5.
{0} ok #
.
You can see one of the following three prompts depending on from where you got into OS console.
a. login:
b. {0} ok
Serial console stopped.
–>
c. {0} ok
Serial console stopped
sc>
6. After performing step 5, If you are landed in option a.login:(login) prompt:
a. Login using the user name/password as root/changeme.
The following message is displayed:
b. Check whether the admin user is created by executing the following command:
-> cd /SP/users/
-> ls
-> cd /SP/users/
-> ls
ALOM.
create /SP/users/admin
The following message is displayed:
Creating user...
Enter new password: ********
Enter new password again: ********
Created /SP/users/admin
-> set /SP/users/admin role=Administrator
Set 'role' to 'Administrator'
-> set /SP/users/admin cli_mode=alom
Set 'cli_mode' to 'alom'
sc> poweroff
Are you sure you want to power off the system [y/n]? y
12. Ensure that your virtual keyswitch setting is not in the LOCKED position.
You can check the setting from the Service Processor CLI with the following command:
sc> showkeyswitch
If the virtual key switch is in LOCKED position you can change that with the
following command:
sc> setkeyswitch -y normal
ORACLESP-1116FM901F login:.
14. Log into the ALOM CLI shell (indicated by the -> prompt) from the ALOM login prompt. Login as admin user.
sc> poweron
sc> Chassis | major: Host has been powered on
16. To go to console, type console on the sc prompt. Login to console as root user.
sc> console
Enter #. to return to ALOM.
Done
0:0:0>Network Interface Unit Port 0 Tests ..Done
0:0:0>Network Interface Unit Port 1 Tests ..Done
0:0:0>Extended Memory Tests....Done
ChassisSerialNumber 0833FM9007
A series of events appear till the console login comes.
.................................
activity, system personnel may provide the |
| evidence of such monitoring to law enforcement officials. |
|-----------------------------------------------------------------|
console login: root
password:
17. Verify whether the software firmware is upgraded by entering the following command:
If you receive a warning message "showmount:RPC: Rpcbind failure - RPC: Unable to receive",
while performing upgrade, you can ignore the warning message.
You can also upgrading using the Web Interface. If the system firmware version is less than V7.4.7, perform the
following procedure to update the system firmware with the Web interface.
Perform the following procedure to update the system firmware with the Web interface:
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under: $ORACLE_BASE/admin/SIDB/udump/diag/rdbms/sidb/$ORACLE_S
ID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
$ cd /export/home/ems
$ ./sonusEms stop
If the preInstall.pl displays an earlier oracle version earlier than 11.2.0.3.0 or if you have not
applied the latest Security Patch Update, then follow the below procedure to upgrade the database to 11.2
.0.3 and apply the latest Security Patch Update (SPU).
# cd /export/home/install/ems/oracle
# ./UpgradeOracle.sh
The UpgradeOracle.sh script upgrades the Oracle and starts the Oracle. This script takes
approximately one hour to complete.
# cd /export/home/oracle
# rm -f EMS_SonusDBPackage_solaris-V09.03.00R000.tar
1.
2. In order to produce a log of the upgrade, use the /usr/bin/script command to create a record of the
terminal session. This command creates a sub-shell where you run the installation.
When it completes, type exit to terminate the script command.
As super user, enter the following command:
/usr/bin/script -a <Log_file_name>
perl mainInstall.pl
*******************************************************
** EMS mainInstall.pl for target release version V09.03.00R000
**
** Run this script AFTER executing preInstall.pl and following instructions
from preInstall.pl
********************************************************************************Starting
mainInstall.pl execution on : Friday, April 04, 2014 5:15:15 AM EDT.
Enter Y if you want to download the file from the remote host. You will be prompted to enter the following
details:
- Remote sftp host name or IP
- Username for sftp
- Login Password
- Directory on remote host
Or
Enter Y if you want to download the file from the remote host. You will be prompted to enter the following
details:
- Remote sftp host name or IP
- Username for sftp
- Login Password
- Directory on remote host
Or
Enter N, if you do not want to download the file from the remote host using the script.
You have to download the <host_name>.backupData.tar file manually and place it at
/export/home/backup.
If you have not upgraded the Solaris and Oracle to the recommended versions before running the
mainInstall.pl script, the script will indicate the same and terminate. You must upgrade the Solaris
and Oracle to the required version and re-run the script.
For information on installing the Solaris Patch and Oracle Database and any other Third party software, refer
to Upgrading the Third Party Software.
The following message appears, if Solaris OS and Oracle are not upgraded:
The script will continue importing data and then restart EMS. The procedure may take around 60 minutes for
an 80 MB DB data.
If you need to deploy it, please run the following script as 'root' user:
/export/home/ems/conf/deployLNPApplication.sh
********************
Uninstalling SONSems
********************
The uninstall may take several minutes to complete if there are many PM
archive files.
10. After the mainInstall.pl execution is complete, it indicates the same and instructs you to run the
postInstall.pl.
perl postInstall.pl
*******************************************************
** EMS postInstall.pl for target release version V09.03.00R000
If SGX4000 device is configured on pre-V09.03.00 Insight system, you have to perform the following
procedure during data migration from any pre-V09.03.00 Insight system to Insight V09.03.00.
1. a. Login to Insight.
b. Navigate to Network Mgmt > Insight Administration.
c. Select the registered SGX4000 node from the Navigation tree.
d. Modify and Update the following (default) values if required.
i. SSH Port
ii. Login (CLI)
iii. Password (CLI)
e. Click on Update and then click on Discover node.
The PSX Manager GUI installer is a part of EMS.V09.03.00R000.tar.Z file. If the PSX Manager GUI version is not
V09.03.00R000, then it can be installed separately.
1.
# mkdir -p /export/home/install/
3. Download the SSGUI_V09.03.00R000.tar file from the Sonus Salesforce Customer Portal to
/export/home/install/ directory on the Insight EMS server.
4. Change the directory to /export/home/install/ by executing the following command:
# cd /export/home/install/
6. Execute the GuiClient.sh script as a super root user. The GuiClient.sh script installs the SONSpsx
package.
# ./GuiClient.sh
7. Verify that the SONSpsx package is installed, by executing the following command:
# pkginfo -l SONSpsx
For more information on Post-Install/Upgrade tasks, see Performing Post-Upgrade Tasks on SA Solaris.
If you experience any issues in your production network following an upgrade, you can return to the previous version
of Insight by using the following procedure:
1. Pre-requisites for Rollback using Disk Mirroring are completed successfully prior to start of upgrade.
2.
# conf="/opt/SONSdmems/config/platform_T5220-4.conf"
# echo "`grep \"svm.slave.disk\" $conf|head -1|awk -F= '{print $2}'|tr -d
' '`s0"
c. Edit /mnt/etc/vfstab
In order to preserve previous release config, the previous (before mirroring was first setup) vfstab file
need to be restored.
# cd /mnt/etc
# cp -p vfstab.orig vfstab
# chown root:sys vfstab
Find the disk labels for disks at slots 0 and 1 using following command:
# echo | format
d. Edit /mnt/etc/system as root user and delete the following lines if present:
# cd
# umount /mnt
# init 5
Disks initially at slots 0 and 1 should be inserted back to slots 2 and 3. Otherwise, it
will result in system booting in maintenance mode.
h. Dump device need to be set to the original device (e.g. /dev/dsk/c1t0d0s1 for the example above)
using the following command:
# dumpadm -d /dev/dsk/c1t0d0s1
i. If you need to restart disk mirroring, clear the metadb and enable the disk mirroring using dmctl. The
mirrors can be cleared using command metaclear
# metaclear d41
# metaclear d40
# metaclear d36
# metaclear d35
# metaclear d34
# metaclear d33
# metaclear d30
# metaclear d31
# metaclear -r d201
# metaclear -r d200
# metaclear -r d106
# metaclear -r d105
# metaclear -r d104
# metaclear -r d103
# metaclear -r d100
# metaclear -r d101
# metadb
k. Clear all the metadb state database replicas using the following command:
m. Execute following command to verify that all mirroring configurations are cleared. These commands
should not display any database replicas.
# metastat -c
# metadb -i
There will be downtime during the procedure since server will be rebooted as part of re-enabling disk
mirroring.
Perform the following procedure to install the latest version of PSX Manager GUI:
# mkdir -p /export/home/install/
3. Download the SSGUI_V09.03.00R000.tar file from Sonus SalesForce Customer portal to local system.
4. Copy the SSGUI_V09.03.00R000.tar file from the local system to the /export/home/install/
directory on the Insight EMS server.
5. Change the directory to /export/home/install/ by executing the following command:
# cd /export/home/install/
# cd /export/home/install/SSGUI
8. Execute the GuiClient.sh script as a super root user. The GuiClient.sh script installs the SONSpsx
package.
# ./GuiClient.sh
This section provides a summary of the account name and password information associated with the Insight. In
particular, the following items are included:
Table of Contents
# /export/home/ems/sonusEms stop fm
# cd /export/home/ems/conf
# ./netcool_rename_db.ksh
5. After the script executed successfully, start the netcool FM process in the system.
# /export/home/ems/sonusEms start fm
6. For an HA configuration, ensure you perform Steps "1" to "5" on each node one by one.
Rollback Mechanism
To change the netcool object server name to default or old name, use the same script and provide the required
choice for old and new server name as input.
The new object server name must meet the following criteria:
Limitation
Upgrade operation is not supported with the changed netcool object server name. In order to support, you
need to first rollback to default netcool object server name “SONUSDB”.
Making a node standalone from high availability configuration is not supported with the changed netcool
object server name. In order to support, you need to first rollback to default netcool object server name
“SONUSDB”.
For the Insight-specific accounts, Release V07.03.00 introduced the option to set “strong” passwords or to keep
existing “weak” passwords. The choice between strong or weak passwords will be given during installations and
upgrades.
The strong passwords have more restrictions than the pre-V07.03.00 passwords and require that a new password
be entered during the installation or upgrade. The strong passwords do not have a default value, while the weak
passwords do have a default value.
root sonus
insight insight
oracle oracle
dbimpl dbimpl
sys change_on_install
system manager
admin admin
Insight_Admin_User sonus
root sonusfm
For complete Sonus products account and password details, refer to Sonus Products Password and Security
Management Reference.
For all Solaris accounts other than insight, change the password using the Unix “ passwd” command.
The following user password restrictions exist by default. Sonus recommends that you do not change these
restrictions.
The following section provides information regarding various accounts, password restrictions, and procedure to
change the password.
This section describes how to change the insight user password with the changeInsightPassword.sh script.
Change the insight user password after an upgrade if you did not use the strong password option when running the
configureJumpstart.sh or emsMigrate.sh script. This changes the insight user password from the
previous value.
Sonus recommends that you also periodically change the insight user password.
This procedure uses a script to change the password and to make the corresponding changes to the Netcool
Process control user. You do not need to re-perform Netcool configuration.
This procedure also allows you to set the password expiration behavior to non-expiring or to expiring, and to set the
expiration values.
You must use the following procedure to change the password for the insight user. Do not use the pass
wd command, which would result in a misconfiguration of Netcool.
Password Restrictions
The insight user password has the following restrictions (unless you use the -v option described in the
procedure):
Procedure
To change the password and/or the password expiration behavior for the insight user, perform the following
procedure.
1. Log in as root.
2. Run the setup script to configure the insight user password/password expiration as follows:
# cd /export/home/ems/conf
# ./changeInsightPassword.sh -a "-n <min_days> -w <warn_days> -x <max_days>"
Where:
<min_days> represents the minimum number of days that must pass before the user can change the
password.
<warn_days> represents the number of days before the password expiration when the user is warned.
<max_days> represents the maximum number of days that a password is valid. If you enter -1, password
expiration is turned off, and you do not need to enter the -n or -w arguments.
The -a and the quotation marks are needed if you are entering the -n, -w, or -x arguments.
Insight is currently running. You must shut down Insight (including all of the
FM processes) before running this script. Do you want to continue [y|Y,n|N]?
(Default:Y)
Enter Y.
4. The following prompt appears:
Enter the new password if you are changing it, or enter the old password if you are only changing the
expiration behavior. Unless you used the -v option in Step "1", the password must meet the restrictions listed
in "Password Restrictions".
6. If the system is part of a DR or HA system, a prompt appears that asks if you want to change the insight user
password on the other systems.
Enter Y.
7. When prompted, enter and re-enter the root password for each of the other Insight servers.
If you have entered a wrong password, for the remote servers, the following message appears:
This section describes how to change the Insight database user password with the changeDbPassword.sh script.
This section includes the following:
Password Restrictions
The Insight database password has the following restrictions (unless you use the -v option described in the
When using the changeDbPassword.sh script to change the Insight database password on the Insight system, the
script will also change the database password on any IASs that are registered to the Insight system and that are
currently up. You will be prompted for the password of the root user on each IAS.
CAUTION
If an IAS is not up when you run the changeDbPassword.sh script, you will need to change the password
when the IAS is up by performing "Changing the Insight Agent Connection Account Password". If the Insight
database password on the IAS does not match the Insight database password on the Insight server to
which it is registered, the database user (dbimpl) will be locked out of the database, and Insight will not
function correctly. To unlock the database, run the following script: /export/home/ems/conf/unlockDb
implUser.sh
Procedure
# cd /export/home/ems/conf
# ./changeDbPassword.sh
The following options may be used when entering the ./changeDbPassword.sh command:
-c: The new password will be requested once, and you will not be prompted to re-enter it.
-v: The password will not be checked to see if it meets the password restrictions.
Insight is currently running.You must shut down Insight (including all of the
FM processes) before running this script. Do you want to continue [y|Y,n|N]?
(Default:Y)
Enter Y.
The default Agent connection account/password combination is admin/admin. To change the password, perform
the following procedure, which uses the jash shell utility:
# /export/home/sonusComm/bin/jash
2. At the % prompt, enter the following (this assumes the current password is admin):
success
where
admin is the account name
<existing password> is the current password, such as admin
<new password> is the new password
% exit
Changing the Insight Database Password for the IAS from the Insight System
This section describes how to set the Insight database password for an IAS by running a script from the Insight
server. This procedure is only required if the password on the IAS was not changed when performing Changing the
Database Password for EMS Standalone System.
To change the Insight database password for an IAS system by running a script on the Insight server, perform the
following:
# cd /export/home/ems/conf/IAS
# ./remoteIasMgmt.sh resetDbPassword <client_ip_address>
where <client_ip_address> is the IP address of the IAS on which you want to update the Insight
database password.
This section describes how to change the sys database user password with the changeSysDbPassword.sh
script.
Password Restrictions
Procedure
# cd /export/home/ems/conf
# ./changeSysDbPassword.sh
Enter the password. Unless you used the -v option in Step "1", the password must meet the restrictions listed
in "Password Restrictions"
This section describes how to change the system database user password with the
changeSystemDbPassword.sh script.
Password Restrictions
The system database password has the following restrictions (unless you use the -v option described in the
procedure):
# cd /export/home/ems/conf
# ./changeSystemDbPassword.sh
Enter the password. Unless you used the -v option in Step "1", the password must meet the restrictions listed
in "Password Restrictions"
This section describes how to change the Netcool database user password for the Insight_Admin_User
with the changeNetcoolDbInsightPassword.sh script.
Password Restrictions
The user password has the following restrictions (unless you use the -v option described in the procedure):
Procedure
To change Netcool Database User Password for the Insight_Admin_User, perform the following:
Enter Y.
3. The following prompt appears:
Enter the password. Unless you used the -v option in Step "1", the password must meet the restrictions listed
in "Password Restrictions"
Changing the Netcool Database User Password for the Root User
This section describes how to change the Netcool database user password for the root user with the
changeNetcoolDbRootPassword.sh script.
Password Restrictions
Procedure
To change Netcool Database User Password for the root user, perform the following:
1.
# cd /export/home/ems/conf
# ./changeNetcoolDbRootPassword.sh
Enter Y.
3. The following prompt appears:
Enter the password. The password must meet the restrictions listed in "Password Restrictions"
4. When prompted, re-enter the password.
The script runs to completion.
This section describes how to change the EMS keystore password with the changeKeystorePassword.sh script.
This procedure can be used after you obtain your own SSL certificate and import it, see SSL Certificate Installation
Procedures. This procedure cannot be used with the demo site certificate that comes with Insight.
Password Restrictions
Procedure
# cd /export/home/ems/conf
# ./changeKeystorePassword.sh
Enter the new EMS keystore password. The password must meet the restrictions listed in Password
Restrictions.
Changing the Password or Password Behavior of the "insight" User for the IAS System
To change the insight user password of the IAS system or to change the password expiration behavior (the IAS has
an expiring insight user password by default), use the passwd command.
The default Agent connection account/password combination is admin/admin. To change the password, perform
the following procedure, which uses the jash shell utility:
# ./jash
2. At the % prompt, enter the following (this assumes the current password is admin):
success
% exit
5. Change the Agent Password field in the Register Insight Node screen. See the “Insight Administration” of the
Insight EMS User Guide.
When upgrading to Release V09.02.00 and using the “weak” password option (see "“Strong” and “Weak”
Passwords"), use of the documented upgrade procedures will ensure that all default Solaris accounts and
passwords, customer-created Solaris accounts and passwords, and Sonus database accounts and passwords are
preserved across the upgrade.
Upgrading to Release V09.02.00 using the “strong” password option requires the user to create new account
passwords.
Prerequisites
Before migrating Sonus network elements from IPv4 to IPv6, see the Sonus Network Solution IPv4 to IPv6 Migration
The following procedure describes the procedure to enable IPv6 on the EMS Standalone server.
1. Log in as root.
2. Create the following file:
/etc/hostname6.<interface name>
where the <interface name> is the name of the interface on which the IPv6 needs to be enabled.
You can obtain the interface name by executing the following command:
# ifconfig -a
# ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232
index 1
inet 127.0.0.1 netmask ff000000
e1000g0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 10.54.7.179 netmask ffffffc0 broadcast 10.54.7.191
In this example, e1000g0is the name of the interface on which IPv6 needs to be enabled.
3. Add the following entry to the /etc/hostname6.e1000g0 file, save, and exit:
addif <ipv6address>/<prefix> up
For example,
addif FD00:10:6B50:4160::33/60 up
# ifconfig -a
# reboot -- -r
10. Verify that all EMS services are up after restart using the following command as user insight.
$ /export/home/ems/sonusEms status
After server restart, it will take around 10 minutes for all EMS services to be up and running.
After enabling IPv6 on the EMS server, you need to upgrade the target devices to IPv6 and enable IPv6
management IPv6 address on the device. For more information, refer to the respective device’s Installation
Guide.
Re-register the Device with the IPv6 management address from the EMS
Node Registration Window
After enabling IPv6, you need to re-register (which includes un-registration of IPv4 device, then register device with
IPv6 address where mgmt client is Ipv6) from the EMS node registration window.
The following is the procedure to re-register the device with the IPv6 management address:
1.
2. Click Unregister.
3. Click the same device under Unregistered Nodes. Update the management client and device IP with IPv6
address and click the Update button.
4. Click Register.
For instructions on how to reset the root password, see All Solaris Accounts Except for User "insight".
The default length of time before a password expires is 90 days. The default password restrictions are given in the
next section.
To change the password restrictions or the length of time before passwords expire, as a user with root privileges,
edit the /etc/default/passwd file. You can either comment out lines that restrict values, or change the restricted
values.
For a description of the /etc/default/passwd file contents, see the Sun Microsystems Solaris 10 Reference
Manual Collection (http://docs.sun.com/app/docs/doc/
816-5165/6mbb0m9nr?a=view#FILES).
Password Restrictions
The following user password restrictions exist by default. Sonus recommends that you do not change these
restrictions.
The minimum number of characters in the password is 10.
The minimum number of alphabetic characters in the password is 4.
The minimum number of special characters in the password is 2.
The maximum number of repeated characters in the password is 2.
The four most recent passwords value may not be used.
By default, an account will be disabled if the user has not logged in within 90 days.
To change the default, edit the /usr/sadm/defadduser file to change the value of
definact=90
to the new value (in days) you desire. If you remove 90 and do not replace it with a new value, then the account
lockout feature will be disabled.
By default, a session that has been idle for 30 minutes will be closed.
To change the default, edit the /etc/profile file to change the value of
TMOUT=1800
to the new value (in seconds) you desire.
# /export/home/ems/sonusEms stop
Ensure that all services are stopped, before executing the following command.
# cd <BASE_DIR>/conf/
# ./netcool_rename_db.ksh
Enter the old DB name which is found in step 1 and press ENTER.
5. System displays the following:
# /export/home/ems/sonusEms start
Limitation
Following are the limitations when changing Netcool Object Server Name:
Avoid using NCO_PA, NCO_GATE and NCO_PROXY as the new Netcool Object Server Name. These are used
only for Internal purpose.
Enabling disk mirroring will also make it easier for you to perform a fallback to previous version from future HA
upgrades. If you experience any issues in your production network following an upgrade, you can return to the
previous version of Insight by using the Rollback using Disk Mirroring procedure.
Sonus servers support only software mirroring. This section describes software mirroring only. Insight disk
mirroring is supported only on Netra T5220 four-disk systems.
Insight supports disk mirroring on Netra T5220 servers that have four internal disks. The following mirrors are set up:
Disk 1 Disk 3
Disk 2 Disk 4
This scheme allows the applications that use the second internal disk to continue using it for its intended purpose.
Each of the two disk mirrors requires the following SVM components:
After enabling disk mirroring, the disks, mirrors, and submirrors are configured as shown in the following figure
Two-way Disk Mirroring Using SVM.
Table 61: Mirrors and Submirrors on Netra T5220-4 with Mirrored Disks 1 and 3
Master Disk Submirror Name Slave Disk Submirror Name Mirror Name
Perform the following procedure on every Insight server on which internal disks mirroring is to be enabled. Disk
mirroring for Insight is supported on Netra T5220 four-disk systems. Before performing an upgrade, ensure that disk
mirroring is enabled.
Be sure to wait until synchronization completes before performing any other tasks, such as disabling,
suspending, resuming mirroring, configuring, or booting from the alternate boot device.
1. Issue the following command to verify that the Sonus disk mirroring toolkit package is installed:
# pkginfo SONSdmems
application SONSdmems Sonus disk mirroring management tools
Sonus recommends that you first run the dmctl commands in dry-run mode (use the --dryrun option)
to detect problems that would prevent successful mirroring. If the program does not report any fatal
errors, execute the program without the --dryrun option.
Ensure that the drive definitions are of format c1t*d*. If not, edit the /opt/SONSdmems/config/p
latform_T5220-4.conf file and modify the drive definitions accordingly before configuring disk
mirroring.
For example, if the drive definitions are of format c0t*d*, edit the values of svm.master.disk an
d svm.slave.disk to c*t*d* format in the platform_T5220-4.conf file.
Enter yes.
5. The following message appears:
Enter yes.
6. The following message appears:
Enter yes.
The server is rebooted.
Server will automatically reboot after a few minutes and you will loose connectivity. Please wait for
the reboot to complete. Login to the server back again after the reboot completes, and continue with
the next step.
Enter yes.
9. Use the metastat command to check the status of mirrors.
# metastat -c
Verify that the submirrors show a resync percentage. For example, the following appears:
10. Execute the following command to enable mirroring of disk 2 and disk 4:
Enter yes.
12. The following message appears:
Enter yes.
13. The following message appears:
Enter yes.
The server is rebooted.
14. After the server comes up, execute the following command:
Enter yes.
16. Use the metastat command to check the status of mirrors.
# metastat -c
Verify that the submirrors d200 and d201 show a resync percentage. For example, the following appears:
17. Enable disk mirror error reporting (through email). See Customizing Health Monitoring-SA Solaris.
18. Enable periodic disk mirror error monitoring and reporting (using a cron job). See Monitoring Disk Mirror
metastat -c
Use the following command to examine the status of the state database replicas:
metadb -i
The following procedures describes how to disable disk mirroring in a four-disk system.
Caution
Disabling disk mirroring stops data synchronization across disk mirrors. For upgrading EMS, disk mirroring
must not be disabled.
# metastat -c
Either the slave or master disk can have its reading/writing of data temporarily suspended (taken offline) at any time,
but both master and slave cannot be suspended at the same time.
To temporarily suspend the reading/writing of data on a master disk, enter the following:
To temporarily suspend the reading/writing of data on a slave disk, enter the following:
This procedure should be done on the EMS standalone server that is being upgraded.
1. Confirm that no mirrors are currently syncing (no sync percentages should be displayed in the output below)
by using the following command:
$ metastat -c
d200 m 219GB d20 d40
d20 s 219GB c1t1d0s0
d40 s 219GB c1t3d0s0
d106 m 2.0GB d16 d36
d16 s 2.0GB c1t0d0s6
d36 s 2.0GB c1t2d0s6
d105 m 50GB d15 d35
d15 s 50GB c1t0d0s5
d35 s 50GB c1t2d0s5
d104 m 202GB d14 d34
d14 s 202GB c1t0d0s4
d34 s 202GB c1t2d0s4
d201 m 60GB d21 d41
d21 s 60GB c1t1d0s1
d41 s 60GB c1t3d0s1
d103 m 4.0GB d13 d33
d13 s 4.0GB c1t0d0s3
d33 s 4.0GB c1t2d0s3
d100 m 5.0GB d10 d30
d10 s 5.0GB c1t0d0s0
d30 s 5.0GB c1t2d0s0
d101 m 15GB d11 d31
d11 s 15GB c1t0d0s1
d31 s 15GB c1t2d0s1
EMS application is running on disk slots 0 and 1, and is mirrored to disks in slots 2 and 3 respectively.
Disks in slots 2 and 3 still maintain the previous (pre-upgrade) EMS setup, and can be used during rollback to
restore the pre-upgrade state.
2. Detach the mirrors so that disk mirroring no longer takes place, using the 'metadetach' command.
Execute the following command:
3. After detaching the mirrors, run the 'metastat' command to see the mirror status. Output should now look like
this:
# metastat -c
d201 m 60GB d21
d21 s 60GB c1t1d0s1
d200 m 219GB d20
d20 s 219GB c1t1d0s0
d106 m 2.0GB d16
d16 s 2.0GB c1t0d0s6
d105 m 50GB d15
d15 s 50GB c1t0d0s5
d104 m 202GB d14
d14 s 202GB c1t0d0s4
d103 m 4.0GB d13
d13 s 4.0GB c1t0d0s3
d100 m 5.0GB d10
d10 s 5.0GB c1t0d0s0
d101 m 15GB d11
d11 s 15GB c1t0d0s1
d41 s 60GB c1t3d0s1
d40 s 219GB c1t3d0s0
d36 s 2.0GB c1t2d0s6
d35 s 50GB c1t2d0s5
d34 s 202GB c1t2d0s4
d33 s 4.0GB c1t2d0s3
d31 s 15GB c1t2d0s1
d30 s 5.0GB c1t2d0s0
Disks are now detached and mirroring no longer takes place between them.
Do not remove the slave disks (disks at slot 2 and 3) after detaching them from disk mirrors. Doing
so will cause the system to boot in single user/maintenance mode upon executing reboot command.
This procedure is performed to resume mirroring of a previously detached disk mirror setup. Perform this once the
Running this reattach procedure will start syncing back again without needing a system reboot.
The EMS server continues to function normally during the reattach slave disk process.
This will start sync process. Run the 'metattach' command to view the progress of the sync.
It will take several (6 - 8) hours for all sub mirrors to sync up to 100%. A percentage will be
displayed for each if the sub mirrors with the current status until they are fully synced.
When a disk fails and is replaced with a new disk, use the following procedure to resume disk mirroring on the new
disk:
1. Locate and verify the disk failure by logging on as root and entering the following command:
# metadb
# metadb -d c1t1d0s7
# cfgadm -al
In the following example the entry in the first column (Ap_Id) of the highlighted row is the attachment point for
the failed disk.
Ap_Id Type Receptacle Occupant Condition
c0 scsi-bus connected configured unknown
c1::dsk/c1t0d0 disk connected configured unknown
c1::dsk/c1t1d0 disk connected configured unknown
c2 fc connected unconfigured unknown
c3 fc connected unconfigured unknown
usb0/1 unknown empty unconfigured ok
usb0/2 unknown empty unconfigured ok
usb0/3 unknown empty unconfigured ok
usb1/1 unknown empty unconfigured ok
usb1/2 unknown empty unconfigured ok
usb2/1 unknown empty unconfigured ok
usb2/2 usb-storage connected configured ok
usb2/3 unknown empty unconfigured ok
usb2/4 unknown empty unconfigured ok
usb2/5 unknown empty unconfigured ok
6. Execute the cfgadm -al command again to check the success of the previous operation. The output should
show the state “unconfigured” under the “Occupant” column of the row corresponding to the failed disk.
7. Pull the failed disk out and insert a new disk of the same capacity and physical attributes.
8. Configure the new disk:
9. Execute the cfgadm -al command again to check the success of the previous operation. The output
should show the state “configured” under the “Occupant” column of the row corresponding to the new disk.
10. Repartition the new disk with the partitioning information of the good drive.
11. Add the same number of state database replicas that were deleted in Step "3".
# metadb -a -c 2 c1t1d0s7
12. Identify and record the mirrors and slice information that need to be replaced.
# metastat -c
The first three lines of the metastat output show that mirror d106 and submirror d26 (slice c1t1d0s6) are in
'maint' state. Note the mirror name (d106) and the slice (c1t1d0s6).
13. Run the metareplace command for each of the mirrors and slice:
To configure a cron job to periodically check the health of software mirrors and report the status in an email:
# /opt/SONSdmems/bin/dmchk enable
2. Enter a reachable remote/local SMTP host and the recipient’s email address to be configured in the
dmchk.conf file (see "Customizing Health Monitoring").
The default cron job is invoked every 30 minutes and the email sent only when errors are encountered. This
behavior can be changed by configuring appropriate parameters in the dmchk.conf file.
The following table, shows the parameters that can be configured in the dmchk.conf file.
smtp.host Required None The SMTP mail server that is used to email disk
mirror status.
cron.job Optional 15,45 * * * * /opt/SONSdmems/bin/dmchk Cron entry to monitor/report disk mirror status
monitor 2>/dev/null 1>&2 every 30 minutes.
The following shows an example display for a dmchk.conf file. (To change the setting in a line, you must
# cat /opt/SONSdmems/config/dmchk.conf
# SMTP mail server that is used to email disk mirror status (Required)
#
# The host must be reachable.
#
# Remove the leading # and configure appropriate hostname or IP address
#
#smtp.host = plato
After enabling mirroring of the boot disk, Sonus recommends that the mirror of the boot disk be configured as an
alternate boot device in the NVRAM. Use the following procedure:
# /opt/SONSdmems/bin/dmctl altbootdev
# init 0
ok printenv boot-device
boot-device = disk net
ok printenv nvramrc
ok nvstore
ok boot
ok boot disk2
The default disk mirroring settings can be changed by editing the platform-specific configuration file, which is located
in the directory /opt/SONSdmems/config.
The platform-specific configuration file name is automatically derived by the program, if not supplied by the user.
The naming convention for the file name is as follows:
platform_ptype-ndisks.conf
The –ndisks portion of the filename is used only when platform_ptype.conf file is not found.
For example, for a four-disk T5220, if the user has not supplied the configuration file, the program first searches for
platform_T5220.conf. If the file is not found, the program then searches for platform_T5220-4.conf.
The platform specific configuration file can have multiple mirror configurations. The following table, lists the
parameters that can be configured for each mirror configuration.
svm.master.replica.slice Optional 7 The slice on which master disk state database replicas are created
svm.slave.replica.slice Optional 7 The slice on which slave disk state database replicas are created
# cat /opt/SONSdmems/config/platform_T5220-4.conf
# Each mirror configuration must start with the mirror id
# Anything that follows the mirror id belongs to that mirror.
# ---------------------------------------------------------------------
# DISK 1 <-> DISK 3 MIRROR CONFIGURATION
# ---------------------------------------------------------------------
# The mirror ID (Required)
svm.mirror.id = 1
# The master disk (Required)
svm.master.disk = c1t0d0
# The slave disk or master disk mirror (Required)
svm.slave.disk = c1t2d0
# ---------------------------------------------------------------------
# DISK 2 <-> DISK 4 MIRROR CONFIGURATION
# ---------------------------------------------------------------------
# The mirror ID (Required)
svm.mirror.id = 2
# The master disk (Required)
svm.master.disk = c1t1d0
# The slave disk (Required)
svm.slave.disk = c1t3d0
To verify the version of Insight installed, enter the following command as user root:
$ pkginfo -l SONSems
Expected output:
$ cd /export/home/ems
$ ./sonusEms status
Occasionally, it may become necessary to start the Insight server. To do so, use the following commands:
$ cd /export/home/ems
$ ./sonusEms start
The first time that the Insight server is started, a maximum of 30 minutes will be allowed before the startup process
is timed out. On subsequent startups, the maximum time allowed will be equal to 120 percent of the initial startup
time. For example, if the initial startup took 300 seconds, then the maximum time allowed for subsequent startups
would be 360 seconds.
When FM Trap Receiver or EMS is restarted, FM Trap Receiver drops traps received from FM until Netcool
Probe registers to FM. The loss of alarms can be for a period of 10 seconds when FM Trap Receiver (or
EMS) is restarted. Information about the dropped traps can be obtained from log file in the location
/export/home/ems/emsFM/logs/fm_receiver_trace.
You can add arguments to the sonusEms start command to control memory size allocations. For a list of the
arguments and their syntax, type:
# ./sonusEms -help
Occasionally, it may become necessary to stop the Insight server. To do so, use the following commands:
$ cd /export/home/ems
$ ./sonusEms stop
When FM Trap Receiver or EMS is restarted, FM Trap Receiver drops traps received from FM until Netcool
Probe registers to FM. The loss of alarms can be for a period of 10 seconds when FM Trap Receiver (or
EMS) is restarted. Information about the dropped traps can be obtained from log file in the location /expor
t/home/ems/emsFM/logs/fm_receiver_trace.
In the event you need to change the IP address of your Insight server, perform the following procedure. If desired,
you can change the host name as well as the IP address.
If you want to change the host name of the Insight machine without changing the IP address, do not perform this
procedure. Instead, follow the procedure Changing the host name for Insight without Changing the IP Address.
1. Associate all managed nodes with the intended new IP address (see “Managed Device Association” in the
Administration chapter of the Insight User Guide). Setting the association now allows the server to begin
receiving and processing trap information immediately upon restart.
2. Shut down the Insight management processes.
3. Have your UNIX System Administrator change the address of the system. If you also want to change the host
name of your system, have your UNIX System Administrator change it at this time.
4. As root, change the IP address of the server, change the IP address in the database tables, and update the
Netcool license information as follows:
a. Enter the following commands:
# cd /export/home/ems/conf/
# ./changeIpAddress.sh -i <ip_address> -d -a
b. Respond y.
Several messages appear, ending with:
After IP address is changed, ensure that the IP address entry exists or is same as in the /et
c/hosts
$ /export/home/ems/sonusEms start
6. For any IAS that is registered to the Insight server, you will be prompted for the root password of the IAS
server. Enter the root password of the IAS server.
The Insight IP address on the IAS is then automatically updated to the new IP address of the Insight server.
7. Start Insight.
8. Disassociate all registered nodes with the old IP address (see “Managed Device Association” in the Insight
Administration chapter of the Insight EMS User Guide).
Changing the host name for Insight without Changing the IP Address
In the event you need to change the host name of your Insight server but you are not changing the IP address,
perform the following procedure.
If you are changing both the IP address and the host name of the Insight machine, do not perform this
procedure. Instead, follow the procedure Changing the IP Address of Insight.
The EMS hostname is limited in length to 64 characters. The hostname can only contain lowercase
letters [a-z], digits [0-9], and hyphen[-]. The hostname cannot start with a digit or hyphen, and
cannot end with a hyphen.
3. As root, perform the following, making sure that you enter the current IP address of the server:
Enter the following commands:
# cd /export/home/ems/conf/
# ./changeIpAddress.sh -i <ip_address>
Respond y.
Several messages appear, ending with:
After hostname is changed, ensure that the hostname entry exists or is same as in the /etc/hosts
$ /export/home/ems/sonusEms start
Depending on the EMS Software Release (pre-9.2 EMS Solaris, EMS Solaris 9.2.0, or EMS Solaris 9.2.1 and
above) from which backup is taken, the dmp file names would differ.
The file expdp_stats_data_manual.dmp will be generated only if the PM stats export option is enabled.
When Backup is Taken from Backup Files generated are Restoring the backup files
EMS Solaris
9.2.1 Release and above backupFiles.tar Restore the backup files to 9.3.0 or 9.2.x
(including 9.3.0 Release) sustaining Release.
expdp_cfg_data_manual.dmp
High-level Steps:
expdp_stats_data_manual.dmp
1. Perform a backup of EMS 9.3.0 or 9.2.x
expdp_strct_manual.dmp sustaining release.
2. Restore the backup files to 9.3.0 or 9.2.x
sustaining release.
System Backup
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine. Use a directory name that will
clearly identify the EMS server that created the backup files. Make a note of the directory path because you will
need it later if you need to restore the system.
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, dmp files) in the backup directory.
If you need to restore your Insight system, perform the following tasks:
1. (Optional) Kickstart the EMS Solaris system with respective EMS Release from which backup was taken, if
the EMS Solaris system is not stable. For more details, about EMS Release from which you want to kickstart,
refer the above Table.
# cd /export/home/ems/conf/
# ./changeIpAddress.sh -i <ip_address>
Respond y.
Several messages appear, ending with:
Completed changing IP address to '<ip_address>'.
Please refer /export/home/ems/logs/changeIpAddress.log for details.
Please start Sonus Insight server as user 'insight'.
c. Enter the following command to start Insight as user insight:
$ /export/home/ems/sonusEms start
2. Log in as root.
3. From the backup directory you used for this EMS server in System Backup, copy the dmp files to the
/export/home/oracle/backup/dump directory. Also, copy the backupFiles.tar file to the /tmp
directory.
If the dmp files are copied to /export/home/oracle/backup/dump using an unconventional method,
such as FTP, change the owner and group of the files to Oracle and DBA.
To change the owner and group of files to Oracle and DBA, enter the following commands.
If backup is taken from pre-9.2.0 then use the following dmp file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba exp_data_manual.dmp exp_strct_manual.dmp
or
If backup is taken from 9.2.0 then use the following dmp file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba expdp_data_manual.dmp
expdp_strct_manual.dmp
or
If backup is taken from 9.2.1 or above Release (including 9.3.0 Release) then use the following dmp
file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp expdp_strct_manual.dmp
CAUTION
You must copy files from the backup directory that you used for this EMS server. If you use a
backup directory that contains files from another EMS server, Insight will not behave properly.
5. The script informs you that you must have the three files mentioned in Step 3 and asks if you want to
continue. Answer y and press Enter.
6. The script asks for the full path to the backup tar file. Answer /tmp and press Enter.
7. The following message appears:
Do you want to upgrade the system passwords to use strong passwords (production setup) (y|Y) or continue
to use the old weak hardcoded passwords (lab setup) (n|N) (default:Y)?
a. If you want to use strong passwords (recommended for production setup), enter Y and skip to Step 12.
You will enter new passwords.
b. If you do not want to use strong passwords, enter N and continue to Step 8. The old passwords will be
used.
8. If you entered N in Step 7, a prompt asks you to confirm that you want to use weak passwords. Enter Y.
9. When prompted, enter the insight user password.
10. When prompted, re-enter the password you entered in Step 9.
11. When a prompt asks whether you have changed the database sys/system default passwords, perform one of
the following:
If you have not changed the default passwords, enter N and continue to Step 24.
If you have changed the default passwords, enter Y. When prompted, enter the current passwords,
and then continue to Step 24.
When entering strong passwords (Steps 12 through 23), the passwords must meet the
restrictions listed in Changing Passwords.
12. If you entered Y in Step 7, a prompt asks for the Insight database (dbimpl) password. Enter the password.
(The only special characters allowed are _, $, and #.)
13. When prompted, re-enter the Insight database password.
14. When prompted, enter the Insight database sys password. (The only special characters allowed are _, $, and
#.)
15. When prompted, re-enter the Insight database sys password.
16. When prompted, enter the Insight database system password. (The only special characters allowed are _, $,
and #.)
17. When prompted, re-enter the Insight database system password.
18. When prompted, enter the insight user password.
19. When prompted, re-enter the insight user password.
20. When prompted, enter the Netcool root database user password.
21. When prompted, re-enter the Netcool root database user password.
22. When prompted, enter the Netcool Insight_Admin_User database user password.
23. When prompted, re-enter the Netcool Insight_Admin_User database user password.
24. The scripts asks if you want to import the User Activity Logs, PM Stats, and TrunkGroup tables. Answer y if
you want to import these tables; answer n if you do not want to save those tables.
25. The following message appears:
26. For upgrades from Insight 07.03.06 and above, this message does not apply.
Enter N.
27. The following message appears:
Passwords
The emsMigrate.sh script used in the system restore procedure gives you the opportunity to use strong
passwords, which must then be entered and must meet the following restrictions:
The Insight Database should automatically start and stop at system startup and shutdown time respectively.
If you wish to manually start the Insight database use the following instructions:
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If you wish to manually stop the Insight database use the following instructions:
1. Log in as the user insight and shut down the Sonus Insight server using the following command:
$ /export/home/ems/sonusEms stop
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> shutdown immediate
SQL> exit
If the Insight database is running, a list of active oracle processes will be displayed.
If the Insight database is not running, no processes will be displayed.
The client listener should automatically startup and shutdown with the Insight database. If you need to manually start
or stop the listener, use the following instructions.
To manually start the listener, login as oracle and use the following command:
$ lsnrctl start
To manually stop the listener, login as oracle and use the following command:
$ lsnrctl status
If the database listener is running, the status of the listener and the status of database instances will be
displayed.
If the database listener is not running, “no listener” messages will be displayed.
Distributed and installed with your Insight database instance, Sonus supplies a series of value added scripts used to
manually backup and restore the Sonus Insight database instance. The scripts make use of database’s export and
import utilities enabling you to manually backup and restore your Insight database. Sonus provides these scripts as
a means to enable the novice user to backup and restore their database. A more sophisticated user may want to
develop a more formal backup and restore strategy.
This section describes the backup and restore of the database only. For a complete system backup and a complete
system restore, see Insight Server Backup and Restore.
Sonus recommends you to backup the Insight database nightly as part of your database backup and restore
strategy.
The required backup scripts and directory hierarchy are installed during an Insight database instance installation or
upgrade. The directories bin, dump and log are created under the Oracle user’s home directory. The location of the
backup and restore scripts is the bin directory. The dump directory holds exported database images and the log
directory stores generated log files.
In the event the required scripts and directory hierarchy do not install, you may manually install the scripts by first
performing a cd to Oracle’s home directory and then untarring the insightBackupFiles.tar file.
You may perform the backup procedure with Sonus Insight running and the database instance in use.
1. Login as user oracle to the system that contains the database instance you wish to backup.
2. Change to the backup and restore bin directory which is located under the oracle user’s home directory
where /export/home/oracle is Oracle’s home directory in this example.
$ cd /export/home/oracle/backup/bin
3. Execute the following script. The export script creates Oracle export files in the data directory and overwrites
any existing export files found at that location.
$ export_manual.sh
Either enter the password of the database, or press enter to accept dbimpl if that is the password of the
database.
5. You will see status information printed to the screen followed by a statement similar to the following:
If you did not receive the previous message, refer to the log files found in the log directory to check for any
errors.
CAUTION
You must stop Sonus Insight and not use the database for the first part of the restore procedure. The
restore procedure performs a destructive restore. The process wipes clean the database instance before
restoring the backed up data to the database instance.
1. Shut down any running applications using the database instance you wish to restore. For information on how
to shut down Sonus Insight see the procedure, Stopping the Insight Server.
2. Login as user oracle to the system that contains the database instance you wish to restore.
3. Change to the backup and restore bin directory which is located under Oracle’s home directory where
/export/home/oracle is Oracle’s home directory in this example.
$ cd /export/home/oracle/backup/bin
4. Execute the following script. The import script will drop all of your database instance’s tables and import
configuration tables from the archive files in the data directory.
$ cfg_import_manual.sh
Either enter the password of the database, or press enter to accept dbimpl if that is the password of the
database.
6. You will see a series of status information printed to the screen followed by a statement similar to the
following:
This is a destructive import where all existing data in the database instance is first dropped before the import
from the export files is performed. The import script drops all sequences and tables and imports the data for
the smaller configuration tables. The process should take less then 20 minutes for a typical size database.
7. The second part of the import is to import the larger Trunk Group and Performance Management tables. As
the time to import these tables may take hours, depending on the size of the data that is to be imported, it
may be desirable for you to re-start Sonus Insight prior to starting this phase of the import. Sonus Insight may
be running and using the database during this phase of the import but information that has not yet been
restored to the database will not be available for use in Sonus Insight until it has been imported. See Starting
the Insight Server for information on starting Sonus Insight.
8. To start the second phase of the import execute the following script.
$ stats_import_manual.sh
9. You will see a series of status information printed to the screen followed by a statement similar to the
following:
Refer to the log files found in the log directory to check for any errors.
Netcool Configuration
The annotation /export/home/ems appears throughout the instructions that follow and refers to the
current Sonus Insight installation base directory. The default is /export/home/ems. This is the only
directory that is supported.
# cd /export/home/ems/conf/
# ./netcoolsetup.ksh
This script modifies configuration files, changes process control user settings, and modifies FM logging
parameters.
3. The script prompts you for how much disk space to allocate for FM log files. Enter a value or accept the
default.
4. Start the Netcool processes. See Starting, Stopping, or Verifying the Netcool Process.
Under normal circumstances the Netcool processes start and stop when you start or stop the Insight server, see
Insight Server Administration-SA Solaris. If you want to start, stop, or check the status of the Netcool processes
separately from the Insight server, use the following commands.
To start the Netcool process, as user insight execute the following commands:
$ cd /export/home/ems
$ ./sonusEms start fm
$ ./sonusEms status fm
Several Netcool components have a delayed startup due to their dependence on the Netcool
database. These processes show “PENDING” status. If processes remain in a “PENDING” state
longer than two minutes after startup, there is a configuration problem.
$ cd /export/home/ems
$ ./sonusEms stop fm
# cp /export/home/ems/conf/emsUnInstall.sh /tmp
# cd /tmp
# ./emsUnInstall.sh
This section contains post-installation/upgrade tasks that you may need to perform.
For enabling licensing for devices in EMS, please refer to the “License Manager” chapter in the Insight User
Guide.
Task Purpose
Enabling Disk Mirroring Perform this task to create new disk mirror so that data is in synch
between slave and master disks. The SalesForce upgrade overwrites the
data on disks 0 and 1. Hence, a new disk mirror must be created.
SNMP Management Agent Configuration Perform this task if you are installing SNMP and need to configure the
SNMP Management Agent.
Checking Database Software Shared Memory Perform this task if you upgraded your Sonus application by using the
Settings Sonus Salesforce Customer Portal.
Setting the Location of Core Dump File Perform this task to set the core dump file location.
Clearing Client Browser Cache After a Perform this task on each client after an Insight installation.
Software Upgrade-SA Solaris
Synchronizing with the NTP Server-SA Solaris Perform this task to synchronize with the NTP server.
Online Library Installation or Updates Perform this task to install the documentation.
Clearing Client Browser Cache After a Perform this task on the client after an EMS upgrade.
Software Upgrade-SA Solaris
Netra T5220-Specific NVRAM Settings Perform this task to set the NVRAM variables to the correct values.
Enabling SSH-SA Solaris Perform this task if you are using SSH for communication between the
EMS server and the PSX, SGX, and DSI.
Enabling Hardware Traps-SA Solaris Perform this task to enable the hardware traps.
SSL Certificate Installation Procedure Perform this task after an Insight installation if you need to support
HTTPS in a production environment.
Enabling Users to Create cron Jobs-SA Solaris Perform this task after ISO installation if you need to allow users to create
cron jobs.
Enabling Users to Create at Jobs-SA Solaris Perform this task after ISO installation if you need to allow users to create
at jobs.
Performance Data Retention Settings for Perform this task if you are upgrading Insight from a release other than
Upgrades-SA Solaris V07.01.01, V07.01.02, V07.02.01, V07.02.02, V07.02.03 and you want to
change any of the settings from the default of 4 weeks.
Licenses for Enabling Insight API, Insight CLI, Contact your Sonus representative to obtain software licenses.
SMS API, SGX API, Lawful Intercept
Provisioning API, and Traffic Manager-SA
Solaris
Configuring Multiple Network Interfaces-SA Perform this task after an installation if the Insight server uses multiple
Solaris network interfaces.
Configuring IP Network Multipathing for SA Perform this task for non-HA systems after an installation if the Insight
Solaris System server will be using IP network multipathing. This is recommended by
Sonus to protect the EMS from a single-switch failure.
Deploying LNP Adaptor-SA Solaris Perform the task to deploy LNP Adaptor.
Disabling unused EMS API versions-SA Perform this task to save memory and avoid application failure.
Solaris
Enabling and Disabling HTTP access on the Perform the task to enable and disable HTTP access to EMS server.
EMS Standalone server-SA Solaris
user.oracle:100::oracle::project.max-sem-ids=(priv,256,
deny);project.max-shm-memory=(priv,4294967295,deny)
3. If the line listed in Step "2" appears in the /etc/project file, this procedure is complete.
If the line listed in Step "2" does not appear in the /etc/project file, continue to Step "4".
4. Add the entry from Step "2" to the /etc/project file (do not include a line break).
5. Reboot the system:
# init 6
Sonus recommends using IP Network Multipathing (IPMP) to provide non-HA systems with uninterrupted access to
a network when a network interface on the system fails or to protect the system from a single-switch failure. This is
achieved by creating a multipath group on the system, which consists of a primary and standby interface (Sonus
recommends that the primary interface and the standby interface be on different cards if possible). If a failure occurs
in the primary interface or its network adapter, the system automatically switches all the network access from the
failed interface and/or adapter to the standby interface.
The configureIPMP script will create an IP multipath group for you, based on the values you enter while running
the script.
The configureIPMP script will prompt you for the following values. You can use the Table Information needed for
configureIPMP Script to record the values that you will enter when you run the script.
Primary interface — The physical interface that will handle the network access for the multipath group if the
interface is working.
Data IP addresses
Target IP addresses
Network number
Netmask
Use the following procedure to create an IP multipath group. See "Values You Provide" for a description of the
values you will be entering.
2. Messages appear that give an overview of the script. When prompted, press Enter to continue.
3. Messages appear that explain the conventions used in the script. When prompted, press Enter to continue.
4. The prompt Primary interface appears, followed by a list of interfaces.
Enter the name of the primary interface, and press Enter.
5. The prompt Standby interface appears, followed by a list of interfaces.
Type the name of the standby interface, and press Enter.
6. The following prompt appears.
Either accept the default value for the multipath group name by pressing Enter, or type a name and press
Enter.
7. The following prompt appears.
Type the test IP address for the primary interface, and press Enter.
8. The following prompt appears.
Type the test IP address for the secondary interface, and press Enter.
9. A message appears that states you will enter a set of data addresses. When prompted, press Enter to
continue.
10. The following prompt appears.
Data IP Address 1
Type the first data IP address that will be supported by the multipath group and press Enter.
11. The following prompt appears.
Data IP Address 2
If desired, type the second data IP address that will be supported by the multipath group and press Enter. If
Target IP Address 1
Type the first target IP address that will be used by the multipath group and press Enter.
14. The following prompt appears.
Target IP Address 2
If desired, type the second target IP address that will be used by the multipath group and press Enter. If you
do not want to enter a second address, press Enter.
If you typed a second target IP address, you will be prompted for another IP address. You will continue to be
prompted for target IP addresses until you press Enter without typing an address.
15. The following prompt appears.
Please provide a network number that applies to all of the addresses you have
provided thus far: (10.6.20.0)
The default value that is displayed will depend on the addresses you have entered so far. Either accept the
default network number for the addresses by pressing Enter, or type the network number and press Enter.
16. The following prompt appears.
Please provide a netmask that applies to all of the addresses you have
provided thus far: (255.255.255.0)
Either accept the default value for the netmask of the addresses by pressing Enter, or type the netmask and
press Enter.
17. All the values that you have entered appear, followed by the prompt:
If the values are what you want, type y and press Enter. Continue to Step "18".
If the values are not what you want, type n and press Enter. Return to Step "4".
18. A message appears, stating that the exact changes that will be made will be displayed.
When prompted, press Enter to continue.
19. A message appears stating either that the network number and netmask combination has been added to
/etc/inet/netmasks, or that the information was already in the file.
When prompted, press Enter to continue.
20. A message appears showing either the changes that will be made to the hostname.<primaryinterface>
To make all the necessary file changes to create the multipath group, type y and press Enter. Continue to
Step "23".
If you do not want to create the multipath group, type n and press Enter. The script will exit. To run the script
again, return to Step "1".
23. Messages appear listing the files that are being created and stating that the changes are complete. This is
followed by the prompt:
Lastly, please reboot the system for the changes to take effect.
If you want to change the IP addresses after you configure a multipath group, perform the following procedure.
1. On the Insight server, begin the IP multipath script with the -r option:
# cd /export/home/ems/conf
# ./configureIPMP -r
The original configuration that existed before you created the multipath group is restored (by restoring the
/etc/*.orig.sonus files).
2. Perform "Creating an IP Multipath Group". Enter the IP addresses that you want to use.
To configure TCP Wrappers-aware services, create the appropriate rules in the following files:
/etc/hosts.allow
/etc/hosts.deny
In /etc/hosts.allow, change:
sshd: LOCAL
to
sshd: ALL
In /etc/hosts.deny, change:
ALL: ALL
to
#ALL: ALL
Refer to the man page host_access for a description of the rules. To access the man page, enter the
following command:
Example:
# TZ=US/Pacific
For the complete list of available Time Zones and the specific values, refer /usr/share/lib/zon
einfo.
Caution
It is not recommended to change value of any of the locale values mentioned below to something
other than the default ‘en’ value.
LC_COLLATE=en_US.ISO8859-1
LC_CTYPE=en_US.ISO8859-1
LC_MESSAGES=C
LC_MONETARY=en_US.ISO8859-1
LC_NUMERIC=en_US.ISO8859-1
LC_TIME=en_US.ISO8859-1
# reboot
/export/home/ems/conf/deployLNPApplication.sh
1. Login as insight user and enter the following command to stop Insight:
# /export/home/ems/sonusEms stop
# cd /export/home/ems/conf
3. Execute the following command to deploy LNP Application on the Insight server:
# ./deployLNPApplication.sh
# /export/home/ems/sonusEms start
5. For an HA or DR setup, ensure LNP Adaptor is deployed on both the Insight servers. To deploy LNP Adaptor
on other Insight systems, repeat Steps "1" to " 4" on that server.
Disable all unused EMS API versions because each version consumes Insight process memory. Too many
versions loaded into memory could result in application failure.
The following section describes the procedure to enable HTTP access to the EMS standalone server:
# /export/home/ems/sonusEms stop
# cd <BASE_DIR>/conf/security
# ./enableHTTP.sh
# /export/home/ems/sonusEms start
Perform the following procedure to disable HTTP access to the EMS Standalone server:
# /export/home/ems/sonusEms stop
# cd <BASE_DIR>/conf/security
# ./disableHTTP.sh
# /export/home/ems/sonusEms start
# cd /export/home/sonusComm/sbin
# ./HwTrapGen.sh
Prerequisite
Ensure sendmail packages are downloaded, and installed before you enable it.
To check whether sendmail packages are installed, issue the following command:
2. Navigate to /export/home/install/ems:
cd /export/home/install/ems
tar xf Solaris10_Sendmail.tar
3. Navigate to Solaris10_Sendmail:
cd Solaris10_Sendmail
pkgadd -d . all
Enabling Mailx
# vi /etc/hosts
Append host name with domain name to the entry with host name and IP
Add Mail server IP, Mail server name, Mail server name with domain name
#
# Internet host table
#
:: 1localhost
127.0.0.1 localhost
10.54.58.101 emssvt2 loghost <hostname>.<domain-name>
<mail server ip> <mail server name> <mail server name>.<domain-name>
Save and close the hosts file.
cd /etc/mail/
# vi sendmail.cf
This version of SSH includes the following components: SSH Server, SSH client, Secure FTP (SFTP), and Secure
File Copy.
1. As a user with root privileges, change to the SSH server configuration directory:
# cd /etc/ssh
# cp sshd_config sshd_config.backup
AllowTcpForwarding no
to
AllowTcpForwarding yes
Change:
PermitRootLogin no
to
PermitRootLogin yes
4.
1. Ensure that the user does not exist in the /etc/cron.d/at.deny file.
2. Add the user to the /etc/cron.d/at.allow file.
1. Ensure that the user does not exist in the /etc/cron.d/cron.deny file.
2. Add the user to the /etc/cron.d/cron.allow file.
The scripts S99bge_fdx, and S99force100fullduplex in the /etc/rc2.d directory are not part of default
Jumpstart disks, but may be created after the installation by persons who install the boxes.
Example
You may have the following contents in the script to force the network interface speed to 100Mbits, duplex to
full-duplex and turn off auto negotiation:
Licenses for Enabling Insight API, Insight CLI, SMS API, SGX API, Lawful
Intercept Provisioning API, and Traffic Manager-SA Solaris
Access to the following modules of Insight EMS require the purchase of separate software licenses. Consult your
Sonus sales representative for additional information.
Insight CLI
Insight API
Insight SMS API
Insight SGX API
Lawful Intercept Provisioning API
Insight Traffic Manager
Once you purchase the product, you will be provided a license file with instructions for enabling the
product/functionality along with all applicable documentation. See the Insight EMS User Guide for a list of the
individual licenses that are available and a description of the functionality each enables, and instructions for
installing licenses.
If you are upgrading Insight, you do not need to purchase licenses that you have already purchased.
If you install the Insight API, Insight SMS API, Lawful Intercept Provisioning API, and Insight SGX API on a system
other than the Insight server, you must purchase a license for each instance of an API module you want to use. You
cannot share a license between an API module on the Insight server and an API module on a remote system.
eeprom ansi-terminal?=true
eeprom auto-boot?=true
eeprom auto-boot-on-error?=true
eeprom boot-command=boot
eeprom boot-device=disk net
eeprom boot-device-index=0
eeprom diag-switch?=false
eeprom error-reset-recovery=boot
eeprom fcode-debug?=false
eeprom keyboard-layout=US-English
eeprom load-base=16384
eeprom local-mac-address?=true
eeprom multipath-boot?=false
eeprom oem-banner?=false
eeprom oem-logo?=false
eeprom pci-mem64?=true
eeprom input-device=virtual-console
eeprom output-device=virtual-console
eeprom screen-#columns=80
eeprom screen-#rows=34
1. Insert the Sonus Insight Documentation CD into the Insight server CD-ROM drive.
2. Copy the SONSdoc_xxxxxx.tar.Z file to any directory.
3. Decompress the file then untar it using the following command:
# ./docsInstall.sh
The script installs the new online documentation files, which you can then access through the Sonus tab in
the Online Library section of Insight.
If you are upgrading from any other version , the Data Retention Time for all statistics tables are set to the maximum
value of 4 weeks. To change the Data Retention Time for a statistics table, see the “Data Retention” section in the
Insight EMS User Guide.
This section describes how to check the name of the current dump directory, and how to change the setting to
/export/home/<hostname>/ if necessary.
To determine the name of the current dump directory, perform the following steps:
dumpadm
To change the name of the current dump directory, perform the following steps:
1. As a user with root privileges, enter the following command to create the directory:
mkdir /export/home/<hostname>
dumpadm -s /export/home/<hostname>
Verify that the <hostname> value matches the actual host name of your system.
Configuring the SNMP Agent Software-After upgrading the SNMP Management Agent, you must configure it.
Manually starting and stopping the SNMP Agent Software-After configuring the SNMP Management Agent,
you must either restart the system or restart the SNMP agent.
You can set specific directives in the SNMP agent’s configuration file. The procedure below provides information
concerning the necessary changes.
# cd /etc/opt/SUNWmasf/conf
The snmpd.conf file contains directives for the agent. The steps that follow detail all necessary
additions/modifications to this file for the proper communication of traps to the Insight EMS system.
For information concerning other directives contained in this file, refer to the SNMP Agent installation
documentation.
2. The default trap community string (used when sending traps) is public. If you use a different community
string, enter a trapcommunity directive in the Trap Destination section of the file. You must place this directive
before any trapsink directives. The correct syntax is:
trapcommunity <your_community_string>
3. In the Trap Destination section of the file enter a trap2sink directive as follows:
The Netra SNMP Agent is configured to send traps to the SONUS agent. The SONUS agent will forward the
Netra Agent traps to registered EMS or third-party management systems along with product application traps.
4. The generation of an authentication failure standard trap is disabled by default. If you wish to generate an
authentication failure standard trap as a security measure, you must add the following directive to the
configuration file:
authtrapenable 1
5. The installation script sets the listening port to UDP 161. Do not change this value unless there is a known
conflict with another application. If you change the value, Sonus suggests that you change it to 9000. To
change the setting, enter an agentaddress directive. The syntax is:
agentaddress <port>
6. The default agent read community string is public. If you do not wish to allow a default read community string,
comment out the rocommunity directive by adding a # symbol at the beginning of the line. The commented
line would appear:
# rocommunity public
After upgrading and configuring the agent, you must either restart the system or manually start the agent.
To start the agent manually, use the following command (as root):
# /etc/init.d/masfd start
# /etc/init.d/masfd stop
# ps -ef|fgrep snmpd
The output from the above command showing the snmpd executable.
If you do not see the snmpd process running, check for any error messages in /var/adm/messages.
Synchronizing ensures that the timestamps in the Insight logs are consistent with the timestamps on the other
network elements. Failure to do so could also introduce error into certain statistics, most notably the Trunk Group
performance statistics.
If you elect to synchronize with more than one NTP Server, you must ensure that the NTP Servers are also
synchronized. Conflicting time information from multiple NTP Servers may cause Insight system errors. All
nodes must be set in NTP server. (GSX node, by default, has NTP server set).
cp /etc/inet/ntp.client /etc/inet/ntp.conf
3. Using vi editor, edit the /etc/inet/ntp.conf. and replace multicast 224.0.1.1 with your NTP
Server IP address:
multicast 224.0.1.1
with
server <NTP_Server_IP>
Overview
If you are installing the Sonus application on your own Netra T5220 system, you may need to set the Integrated
Lights Out Management (ILOM) boot parameters and upgrade the ILOM firmware.
If you have installed the Sonus application on your own system, read the following:
Overview
Setting the ILOM Boot Configuration
Description of Boot Parameter Values
Setting the ILOM Boot Configuration with the CLI
Setting the ILOM Boot Configuration with the Web Interface
Prerequisite
ILOM Boot Configuration Procedure with the Web Interface
ILOM Web Interface Requirements
Verifying if IP Address is Assigned to the SP Interface
Assigning a Static IP Address to the SP Interface
Setting the ILOM Boot Configuration with the CLI. This procedure does not require an IP address for the
service processor (SP) interface.
Setting the ILOM Boot Configuration with the Web Interface. This procedure does require an IP address for
the SP interface.
The boot parameter settings are described in Description of Boot Parameter Values.
New JumpStart systems delivered from Sonus have the required ILOM boot parameter settings.
To fetch parameter and value settings, cd to parameter folder location and perform ls.
/HOST/diag trigger power-on-reset Runs diagnostics when the system is powered on and
and error-reset when the system resets itself after a fatal error.
/HOST/diag level min Runs the minimum level of diagnostics to verify the
system.
/HOST autorunonerror false The SP powers off the host after the host diagnostics
have discovered a non-fatal POST error.
/HOST autorestart reset Attempts to restart the system when the host leaves the
RUNNING state.
/HOST boottimeout 600 (seconds) Sets the timeout value between the request to boot and
the actual boot to 600 seconds.
/HOST bootrestart reset Resets the boot timeout timer when the timer expires.
/HOST maxibootfail 3 If the host does not reboot after three attempts, it
performs the boot failure recovery setting.
/HOST bootfailrecovery power cycle The host performs a power cycle if the maximum number
of boot failures was reached.
/SYS keyswitch_state normal The system can power itself on and start the boot
process.
/SP/policy HOST_AUTO_POWER_ON disabled When the service processor is booted, the power state of
the host server is set as specified by the host power to
last power state on boot parameter.
/SP/policy HOST_POWER_ON_DELAY enabled The server waits a random amount of time (between one
to five seconds) before powering on automatically. This
helps to minimize current surges on the main power
source when multiple servers in racks power on after a
power outage.
/SP/policy BACKUP_USER_DATA enabled Backs up the local user database on ILOM (user name,
role, password, and CLI mode information) to the SCC
PROM card.
Perform the following procedure to set the ILOM boot parameters with the CLI:
1. Connect a terminal server to the SER MGT and the NET MGT port on the Netra T5220.
2. Login to –> (ILOM prompt) from serial console.
There are four situations from which you can go to ILOM prompt.
a.
sc> logout
c. If you are presented with a login prompt use root as user name and changeme as password.
The -> prompt appears.
After you get -> prompt you can proceed with Step 4.
If you want switch to ALOM prompt, then proceed with Step 3.
3. Use the following commands to change the prompt from ILOM to ALOM:
Ok> #.
-> set /SP/users/root cli_mode=alom
logout and log back in see the prompt changes from "->" to
"sc>"
sc> poweroff
sc> flashupdate -s 127.0.0.1
sc> poweron
sc> console
prtdiag -v | grep "Sun System Firmware"
Sun System Firmware 7.4.5 2011/08/10 15:20
sc> userclimode root default
logout and log back in see the prompt changes from "sc>" to "-
>"
The command in Step 4 will remove the SP IP address if you have assigned one. You can reassign
the IP address by performing Assigning a Static IP Address to the SP Interface.
6. Enter y.
7. Press Enter.
8. At the prompt, log in as root and enter the password (the default password is changeme).
The -> prompt appears.
9. After logging in as root, enter the following command to create the admin user:
Creating user...
Enter new password: ********
Enter new password again: ********
Created /SP/users/admin
11. Enter the following command to connect back to the solaris console.
Confirm Y to continue.
The following message is displayed:
12. Ensure that the boot configuration values are set according to the table ILOM Boot Configuration Values.
Prerequisite
Perform the following procedure to set the ILOM boot configuration with the Web interface:
To use the ILOM web interface, an IP address must be assigned to the SP interface.
1. Connect a terminal server to the SER MGT or the NET MGT port on the Netra T5220.
2. Press Enter.
3. At the prompt, log on as root and enter the password (the default password is changeme).
The -> prompt appears.
4. Enter the following:
-> ls /SP/network
If the ipaddress line does not contain a valid IP address, perform Assigning a Static IP Address to
the SP Interface.
If the ipaddress line does contain a valid IP address, you can use the ILOM web interface.
1. Connect a terminal server to the SER MGT or the NET MGT port on the Netra T5220.
2. Press Enter.
3. At the prompt, log on as root and enter the password (the default password is changeme).
The -> prompt appears.
4. Enter the following:
-> cd /SP/network
10. To verify that the information was entered correctly, enter the following:
-> ls
The IP address information that you entered appears. Verify that this is the correct information.
This section describes how to migrate an existing Standalone Insight EMS from a Netra 240 or 440 system to a
Netra T5220 system.
For details related to existing licenses post migration, please refer to the “License Manager” chapter in the
Insight User Guide.
If you are using Netra 240/440 systems and want to migrate to Netra T5220 then you must migrate using
EMS V09.02.00 release. Migration from 240/440 to 5220 is not supported for any releases after EMS
V09.02.00. Hence, kickstart the Solaris box with 9.2.0 and migrate data to V09.02.00 Release with T5220.
After data is migrated to 9.2.0, you can upgrade from V09.02.00 to V09.03.00 or V09.02.01 and higher
sustaining releases.
1. Kickstart Netra T5220 with EMS V09.02.00 Release. For more details about installing 9.2.0, refer the EMS
V09.02.00 Software Installation and Upgrade Guide.
2. Exporting Data from the Netra 240/440 Insight System (perform on the Netra 240/440 server)
3. Importing Data into the Netra T5220 System with EMS V09.02.00 Release (perform on the Netra T5220
server)
4. Upgrade T5220 System with EMS Software Release V09.02.00 to V09.02.01 or V09.03.00 Release
Export the data from your existing Insight Netra 240/440 system by performing the following procedure, which
generates three files. Later in this chapter you will need to import these files into the new Netra T5220 system.
# cd /export/home/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you
wish to store your backup files. Use a directory that is external to the Insight machine. Use a directory name
that will clearly identify the EMS server that created the backup files. Make a note of the directory path
because you will need it later when migrating data back to the upgraded Insight system.
a. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files in the backup directory.
Table 67: Migration Files when Exporting from EMS Solaris 240 or 440
When Migrating from EMS Solaris 240 or 440 Backup Files generated are
exp_data_manual.dmp
exp_strct_manual.dmp
Prerequisite
Before you import data into the Netra T5220, you must have installed Insight EMS V09.02.00. Restore of backup
must be performed on EMS Software Release V09.02.00.
Passwords
The emsMigrate.sh script used in the following procedure gives you the opportunity to use strong passwords,
which must then be entered and must meet a set of restrictions, or to use weak passwords, which are the current
passwords.
Procedure
Perform the following procedure to import the data that you earlier saved and exported from your Netra 240/440
system (see "Exporting Data from the Netra 240/440 Insight System"). The Netcool database is also imported.
1. Log on to the Netra T5220 system with EMS Release V09.02.00 as root.
From the backup directory you used for the existing Netra 240/440 EMS server in "Exporting Data from the
Netra 240/440 Insight System", copy the .dmp files to the /export/home/oracle/backup/dump
directory. Also, copy the backupFiles.tar file to the /tmp directory.
If the .dmp files are copied to /export/home/oracle/backup/dump using an unconventional method,
such as FTP, change the owner and group of the files to Oracle and DBA.
To change the owner and group of files to Oracle and DBA, enter the following commands.
# cd /export/home/oracle/backup/dump
# chown oracle:dba exp_data_manual.dmp exp_strct_manual.dmp
CAUTION
You must copy files from the backup directory that you used for this EMS server. If you use a
backup directory that contains files from another EMS server, Insight will not behave properly.
###############################################################################
You are going to migrate a previous EMS onto this system. Please make sure you
understand what you are doing. Before you proceed, you should also have
already
run manualBackup.sh on the system you want to migrate from, which generated
backupFiles.tar, exp_data_manual.dmp, and exp_strct_manual.dmp. If you are
migrating
from Solaris to Linux then you should have NetcoolBackupFiles.tar.
All existing Insight-controlled passwords on this box will be wiped out and
replaced
with the passwords from the restored data.
###############################################################################
Do you wish to continue [y|Y,n|N] ?
4. Enter y to continue.
The following message appears
5. The script asks for the full path to the backup tar file. Answer /tmp and press Enter.
The following message appears:
*****************************************************************************
You have chosen to import User Activity Logs, PM Stats and TrunkGroup Tables.
Please note that this may possibly take a while...
*****************************************************************************
#############################################################################################
Starting importing and upgrading Insight Oracle Database Instance SIDB as user
oracle.
#############################################################################################
stty: : Invalid argument
: : Invalid argument
stty: : Invalid argument
..............................................................................................
Disconnected from Oracle Database 11g Enterprise Edition Release 11.2.0.3.0 -
64bit Production
With the Partitioning, OLAP, Data Mining and Real Application Testing options
Modifying /export/home/jboss/server/insight/deploy/jbossweb.sar/server.xml
Done
Completed changing protocol to http. Please restart Sonus Insight.
If you have any IAS registered with the system, then execute the same
procedure on each IAS also by following the procedures provided in the
Insight User Guide.
If SGX4000 device is configured on pre-V09.02.00 Insight system, you have to perform the following
procedure during data migration from any pre-V09.02.00 Insight system to Insight V09.02.00.
1. Login to Insight
2. Navigate to Network Mgmt > Insight Administration
3. Select the registered SGX4000 node from the Navigation tree.
4. Modify and Update the following (default) values if required:
a. SSH Port
b. Login (CLI)
c. Password (CLI)
5. Click on Update button and then click on Discover node.
e.
e. Click OK.
The operation may take a longer time depending on the number of nodes.
If there are any errors displayed on the final screen at the end of the operation, then the nodes were
not successfully discovered. You need to perform a manual discovery of the nodes after determining
the cause of the error.
For more details, refer to the Node discovery section of the Insight User Guide.
After you have migrated data to EMS Release V09.02.00 with T5220 system, upgrade EMS from V09.02.00 to
V09.03.00 Release. For more information about upgrading, refer the section Upgrading Insight Standalone Using
Sonus Salesforce (Solaris).
The Insight EMS has certain ports which are opened publicly. Most of them are RPC related processes, which are
no longer used in remote agent. For security reasons, these ports are closed from Release V09.02.00 onwards.
Using the configureRPC.sh script you can enable, disable, or see the status of RPC processes. From
release V09.02.00 onwards, the RPC processes will be disabled in case of fresh installation of EMS and IAS and
when EMS is upgraded from a previous versions to V09.02.00 or above. However, if you are upgrading from
Release V09.02.00 to a release higher than V09.02.00 then the previous state of RPC processes will be retained.
The configureRPC.sh script when run, interacts with the RPCenabled property in SystemConfig.txt file.
To enable, disable or for checking the current state of RPC processes on EMS Standalone Server, refer the
following sections:
# /export/home/ems/conf/security/configureRPC.sh start
starting the RPC
Starting rpcbind:
# /export/home/ems/conf/security/configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
To check for the status of RPC processes, execute the following steps:
# /export/home/ems/conf/security/configureRPC.sh status
rpcbind (pid 11990) is running...
To enable, disable or for checking the current state of RPC processes on EMS HA Server, refer the following
sections:
1. Enable the RPC processes by perform the following steps on active and standby systems
a. Enable RPC process on active system, by executing the following command:
# /export/home/ems/conf/security/configureRPC.sh start
starting the RPC
Starting rpcbind:
# /export/home/ems/conf/security/configureRPC.sh start
starting the RPC
Starting rpcbind:
# /export/home/ems/conf/security/configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
# /export/home/ems/conf/security/configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
To check for the status of RPC processes, execute the following steps:
# /export/home/ems/conf/security/configureRPC.sh status
rpcbind (pid 11990) is running...
#cd <BASEDIR>/bin
#./configureRPC.sh start
starting the RPC
Starting rpcbind:
#cd <BASEDIR>/bin
#./configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
To check for the status of RPC processes, execute the following steps:
#cd <BASEDIR>/bin
2. Check the status of RPC processes, by executing the configureRPC.sh status command:
#./configureRPC.sh status
rpcbind (pid 11990) is running...
The EMS Software Release V09.03.00 on Solaris platform, only supports SalesForce upgrade to V09.03.00.
The Jumpstart USB installation or upgrade is not supported for EMS Software Release V09.03.00 on
Solaris. To use EMS Software Release V09.03.00, perform an upgrade using SalesForce.
Table of Contents
Introduction to EMS HA
Insight HA Configurations
Upgrading HA-Introduction
Introduction to EMS HA
This section provides an overview of Insight Element Management System and provides information about hardware
requirements.
Overview on EMS
Sonus EMS, is a Web-based Element Management System ( EMS) that provides a graphical user interface (GUI)
for managing Session Border Controllers (SBC), Gateway Server (GSX), BGCF Routing Server (BRX), Riverstone,
SBC Session Border Controllers SBC 1000, SBC 2000, SBC 5x00, SBC 7x00, SBC SWe
The Insight High Availability (HA) feature provides for the automatic switchover from an active Insight system to a
standby system in the event the active system fails, thereby minimizing any downtime in your management
capabilities.
You may require an HA provisioning infrastructure that is resilient to system failures. Sonus provides such an
The EMS HA feature is implemented through the use of a pair of collocated Netra T5220 hardware platforms with a
common IBM DS3524 RAID disk array to store the EMS database. This architecture of Active system, Standby
system, and RAID disk array is conceptually one logical EMS. If the Active system fails, the Standby system
automatically takes over with no manual intervention required. The two systems which comprise the EMS have
redundant LAN links between them that are used for inter-system Keep-Alive communication and monitoring.
The HA configuration consists of a pair of collocated Netra T5220 hardware platforms with a common IBM DS3524
RAID disk array to store the EMS database. Many factors, from network topology to the nature of user operations,
affect the performance of the system. The Insight application is memory- and I/O-intensive, particularly when
performing large data collections and exporting. If you do not collect performance data extensively or frequently,
then the platform’s ability to support managed devices and users increases. Under heavier loads the performance of
the system will degrade gracefully.
The following table, provides the hardware configuration supported platforms required for (HA) EMS:
Platform Configuration
Netra T5220 HA (fourdrive) 4 x 1.2 GHz CPU, 16 GB memory, 4 x 300 GB hard drives,
RAID RAID-1+0
07.77.20.00
NVSRAM N1746D35R1070V90
Many factors, from network topology to the nature of user operations, affect the performance of the system. The
Insight application is memory- and I/O-intensive, particularly when performing large data collections and exporting. If
you do not collect performance data extensively or frequently, then the platform’s ability to support managed devices
and users increases. Under heavier loads the performance of the system will degrade gracefully.
For IBM RAID with controller firmware version 7.83, unlike the version 7.77, there is no error code with
“clear” coming from the RAID. Therefore, the issue traps coming from this RAID will remain so without
getting cleared. It has to be cleared manually.
StorageTek 2540 Array RAID System Requirements (used with Netra T5220)
When used with the Netra T5220 in a high availability configuration, the optional StorageTek 2540 Array should
meet the requirements shown in StorageTek 2540 RAID Hardware Requirements:
RAID RAID-5; Single Bus; two hot-swap AC or DC power supplies; dual hot-swap RAID controllers; battery
backup module
Firmware 07.35.55.11
The following table details the Sonus recommended disk partitioning scheme for the Netra T5220.
/export/home/oracle/oradata 50GB
(reserved) 0.15GB
/export/home/ems/weblogic/sonusEms/data 60GB
(reserved) 0.15GB
Disk Mirroring
Software disk mirroring for Insight is supported on Netra T5220 four-disk systems. The following mirrors are set up:
The main Java Insight memory settings and database software memory settings are automatically recalculated on
upgrades or system reboots. If changes to the automatically calculated settings are needed, contact the Sonus TAC.
UPS Recommendations
Sonus recommends that the Insight platform be protected by an uninterrupted power supply (UPS) to prevent the
ungraceful shutdown of Netcool. An ungraceful shutdown of Netcool can cause database file corruption that
prevents the nco_objserv process from coming up.
Software Requirements
Sun Netra SNMP Management Agent Sun Netra SNMP Management Agent 1.6.2
Lsof 4.8
The minimum Java Client Version support for EMS and PSX Manager is 1.7.0_72. The EMS and PSX
application is tested with above version. But the application will work with 1.7.0_72 and above version also. If
you don't have the latest Java Client version, you will get warnings messages in the browser and from the
plugin.
Insight HA Configurations
This section describes, how to configure an Insight HA system on two Netra T5220 servers.
Hardware
Restrictions
1. Setup and Configure Netra T5220 platforms with RAID Disk Arrays (perform on both the active and standby
EMS systems)
2. Setting Up and Configuring Netra T5220 Systems with StorageTek 2540 Disk Array
3. StorageTek Common Array Manager Software Installation (perform on both the active and standby EMS
systems)
4. Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array (perform on both the active and
standby EMS systems).
5. Private Network Setup.
6. Public Network Setup.
7. The configureHA Script (run configureHA on both the active and standby EMS systems).
8. Checking Interface Configuration and Routing Table for Netra T5220 (verify on both the active and standby
EMS systems).
Setup and Configure Netra T5220 platforms with RAID Disk Arrays
This section describes the setup and hardware configuration for Netra T5220 platforms and RAID disk arrays. The
procedures in this section apply only to Netra 5220s.
Setting Up and Configuring Netra T5220 Systems with IBM DS3524 Storage System
This section describes the setup and hardware configuration for Netra T5220 platforms and IBM DS3524 Storage
system.
The following are the high level/broader steps to setup and configure Netra T5220 Systems with IBM DS3524
Storage System:
1. Connect one fiber cable to a fiber cable port on Controller A of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
2. Connect a second fiber cable to the other fiber cable port on Controller A of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
3. Connect a third fiber cable to a fiber cable port on Controller B of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
4. Connect a fourth fiber cable to the other fiber cable port on Controller B of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
Storage Manager is used to configure, manage, and troubleshoot storage subsystems. It is used primarily to
configure RAID arrays and logical drives, assign logical drives to hosts, replace and rebuild failed disk drives,
expand the size of the arrays and logical drives, and convert from one RAID level to another. Storage Manager
enables troubleshooting and management tasks, such as checking the status of the storage subsystem
components, updating the firmware of the RAID controllers, and managing the storage subsystem.The latest IBM
DS3524 Storage Manager software version is 10.83.x5.23.
The following procedure installs the IBM DS Storage Manager software on a Netra T5220 server. This procedure
should be performed on each of the two Insight servers.
# cd /export/home/packages
# gunzip SM10.83_Solaris_SMIA-10.83.x5.23.tgz
# cd Solaris10p83/Solaris
# ls SMIA-SOL-10.83.x5.23.bin
sh SMIA-SOL-10.83.x5.23.bin -i silent
/opt/IBM_DS/IBM_System_Storage_DS_Storage_Manager_10_InstallLog.log
/opt/IBM_DS/IBM\ System\ Storage\ DS\ Storage\ Manager\ 10_InstallErrorLog.log
The IBM DS3524 storage subsystem has two controllers, that are hot-swappable and redundant. The controllers
contain the storage subsystem control logic, interface ports, and LEDs.
Two SAS host ports labeled 1 and 2. Each of them is capable of operating at 8Gbps, 4Gbps, and 2Gbps
Four fiber channel host ports labeled FC3,FC4,FC5,FC6. Each of them is capable of operating at 8Gbps,
4Gbps, and 2Gbps
Two Ethernet management ports labeled 1 and 2 for Out-Of-Band management
The port on the extreme right is a x4 multilane mini-SAS port for connecting to EXP3524 drive expansion
enclosures
The following procedure assigns an IP address to a DS3524 storage subsystem controller. This procedure should
be performed twice, once for Controller A and once for Controller B.
1. Connect the T5220 server to a simple Hub/Switch after installing DS Storage Manager on both the T5220
servers.
2. Connect Ethernet port 2 on each controller to the same Hub/Switch which is connected to your T5220
3. Start the X-server (such as Exceed) on the system where the GUI is to be launched.
4. Set the DISPLAY variable's IP address to the IP address of the machine where the GUI should be launched
using the following commands:
DISPLAY=<IP Address>:0.0
export DISPLAY
echo $DISPLAY
Where <IP Address> is the Ip of the machine where the GUI need to be launched.
5. Login as root to the T5220 server which is connected to the same Hub/Switch and go to the
/opt/IBM_DS/client directory:
# cd /opt/IBM_DS/client
# ./SMclient
Since Storage Manager is GUI-based application, set your DISPLAY to display graphics.
7. Click on the Add Storage Subsystem link from the Setup tab in the DS Storage Manager Enterprise
Management window.
The Select Addition Method-Manual screen opens.
8. In the Select Addition Method-Manual screen, select the Automatic discovery button and click OK.
9. Click OK to begin an initial automatic discovery of hosts on storage subsystems.
After the initial automatic discovery is complete, the Devices tab of the Enterprise Management Window
displays all hosts and storage subsystems attached to the local subnetwork.
The Enterprise Management Window can take up to a minute to refresh after an initial automatic
discovery.
10. In the Subsystem Management window, right-click the discovered storage subsystem to see the context
menu with the tasks.
Select the Manage Storage Subsystem task.
11. When you choose to manage a specific storage subsystem, the IBM System Storage DS (Subsystem
Management) window opens, along with the Initial Setup Task on background and a small window prompting
for the password.
Enter the password for Subsystem.
12. In the IBM System Storage DS (Subsystem Management) window, click the Configure Ethernet Management
Ports link in the Optional Task list.
The Change Network Configuration screen opens.
The following are the default port IP addresses in each controller:
192.168.128.101 Port 1
192.168.129.101 Port 2
13. In the Change Network Configuration screen, change the default Port IP addresses to your local IP
addresses.
14. Close the Storage Manager client.
The following procedure configures an IBM DS3524 RAID disk array. This procedure should be performed on one of
the Insight servers and it takes approximately 30 minutes.
# cd /export/home/ems/conf/RAID
3. If an array or disk have been used in another application, the install may require reset to remove any previous
configuration.
To discover the array, enter the following command:
For example,
IP of Controller A is 10.54.58.109.
IP of Controller B is 10.54.58.110.
The system displays the following:
a. Enter SMcli -i -d if you are discovering the Storage Subsystem for the first time.
For example, the system displays the following:
# SMcli -i -d
For example, for RAID: EMSIBMRAID
# SMcli -i -d
EMSIBMRAID 10.54.58.109 10.54.58.110
SMcli completed successfully.
# ./SONSraidInstall.sh
6. The script detects the RAID the EMS is connected to and prompts for the number of physical disks.
The recommended option is 2. (300 GB). Press Enter after providing the choice.
9. Enter the RAID password that you had entered on step 11 of the IBM DS3524 Storage Subsystem Controller
IP Address Configuration section when the following is prompted and press Enter.
10.
Enter the Device Name that is to be used to identify the array (default:
SONSemsarray )
For example, EMSIBMRAID.
The output is displayed as:
EMSIBMRAID
Array Name is EMSIBMRAID
- Getting registered array list
Unregistering array EMSIBMRAID
SMcli completed successfully
....
< text deleted for brevity >
...
...
Logical drive initialization is under progress. Please re run the script after
some time
#
# reboot -- -r
Setting Up and Configuring Netra T5220 Systems with StorageTek 2540 Disk Array
This section describes the setup and hardware configuration for Netra T5220 platforms and StorageTek 2540 Disk
Array.
It contains the following topics:
The following procedure assigns an IP address to a RAID disk array controller. This procedure should be performed
twice — once for Controller A and once for Controller B.
Enter 2.
7. The following prompt appears:
Enter Y.
8. The following prompt appears:
Enter N.
9. A message similar to the following appears:
Press '.' to clear the field; Press '-' to return to the previous field;
Press <ENTER> and then ^D to quit (Keep Changes)
Current Configuration New Configuration
IP Address 10.6.9.24
Enter the appropriate IP address value in the New Configuration column. This value is for the controller to
which you are attached. The IP address should be on the same subnet as the “well-known” address that will
be assigned to the multipath group for the active and standby Netra T5220 EMSs.
10. A message similar to the following appears:
Enter the appropriate subnet mask value in the New Configuration column. This value is for the controller to
which you are attached.
11. A message similar to the following appears:
Enter the appropriate gateway IP address value in the New Configuration column. This value is for the
controller to which you are attached.
12. A message similar to the following appears, which displays the values you entered in Steps 9, 10 and 11 .
This section describes the procedure for making the physical connections between the RAID disk array and the
Netra T5220 systems.
1. Connect one fiber cable to a fiber cable port on Controller A of the RAID disk array. Connect the other end of
the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
2. Connect a second fiber cable to the other fiber cable port on Controller A of the RAID disk array. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Standby system.
3. Connect a third fiber cable to a fiber cable port on Controller B of the RAID disk array. Connect the other end
of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
4. Connect a fourth fiber cable to the other fiber cable port on Controller B of the RAID disk array. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Standby system.
5. Connect an Ethernet crossover cable directly between the Ethernet port on Controller A of the RAID disk
array and a network interface on one of the Netra T5220 systems. Sonus recommends using interface nxge2
or nxge3.
6. Connect an Ethernet crossover cable directly between the Ethernet port on Controller B of the RAID disk
array and a network interface on the other Netra T5220 system (the one you did not connect in Step 5).
The following procedure installs the StorageTek Common Array Manager (CAM) software on a Netra T5220 server.
Before you start the procedure, ensure that you copy the StorageTek2500_CAM.tar.gz file from Salesforce to the
EMS system. This procedure should be performed on each of the two Insight servers.
The CAM software is a command-line interface (CLI) for configuring and managing the RAID disk arrays.
# cd /export/home/packages
# cd storageTek2500_CAM
# ./SONScamInstall.sh
After about 15 minutes, a message appears that states a log file is being written.
7. Repeat Steps 1 to 6 for the other Insight server.
The following procedure configures a StorageTek RAID disk array. This procedure should be run for each of the
RAID disk array controllers (A and B). This procedure should be run on one Insight server for one of the RAID disk
array controllers and run on the other Insight server for the other RAID disk array controller.
# cd /export/home/ems/conf/RAID
3. If an array or disk have been used in another application, the install may require reset to remove any previous
configuration. To reset the array, use the following command:
# ./SONSraidInstall.sh
Enter a value from 1 and 2 which correspond to 146 GB and 300 GB.
7. The script prompts for the volume size of the disk.
Enter a value from 1 and 2 which correspond to 136 GB and 270 GB.
The following prompt appears:
8. Enter the IP address for the controller that you connected to this Insight server.
The following prompt appears:
Enter the Device Name that is to be used to identify the array, such as
SONSemsarray.
9. Enter the device name for the RAID disk array. (If this is the second time you are performing this procedure,
enter the same name that you entered the first time.)
When the configuration is complete, a message similar to the following appears:
10. Repeat Steps 1 through 9 for the other Insight server and RAID disk array controller.
Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array
This section describes the steps for configuring the RAID disk on each Netra T5220 system. Execute the procedures
on each Netra system (the active and standby).
In the example in the steps, c2t2d0s6 will be used for the disk and disk slice on one of the systems. The other
system will use c2t4d0s6.
Active System
This section describes the steps for configuring the RAID disk on the active Netra T5220 system.
1. Log on as root.
2.
# format
Example: The following is an example of command output with StorageTek RAID. In following example, 0 to 3
are drives, 4 and 6 are RAID drives, and 5 and 6 are the controllers.
Example: The following is an example of command output with IBM DS 3524 RAID. In the following example,
0 to 3 are drives, 4 and 5 are controllers, and 6 is RAID drive with multipathing enabled.
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0/fp@0,0/
ssd@w203c0080e52dfcde,1f
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0,1/fp@0,0/
ssd@w203d0080e52dfcde,1f
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
Enter the number that corresponds to the RAID disk number and not the controller. For StorageTek
RAID, as given in the above example, enter the disk number corresponding to the disk label
SUN-LCSM100_F-0735 and for IBM RAID, enter the disk number corresponding to the disk label
IBM-1814 as given in the above example.
4. If you are using StorageTek RAID, a message similar to the following appears:
selecting c2t2d0
[disk formatted]
Disk not labeled. Label it now?
# newfs /dev/rdsk/<partition>
Identify the largest partition that is not labeled backup. In this example, partition6 is the largest partition not
labeled backup. Record the partition number displayed on your system. The disk slice is s6. For the example
shown in Step 4, you would enter:
# newfs /dev/rdsk/c2t2d0s6
# mkdir /export/raid
Where <partition> is the designator for your disk and disk slice. The disk was displayed in Step 4. The
disk slice is s6. For the example shown in Step 4, you would enter:
c. Record the mount point and device name in System Information Worksheet; you will need it when
running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t2d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
# df -h|grep raid
# umount /export/raid
# df -h|grep raid
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
Standby System
This section describes the steps for configuring the RAID disk on the standby Netra system. Because the active
system has already been configured, the steps for labeling and creating a UFS are not required for the standby
system.
Example: The following is an example of command output with IBM DS 3524 RAID. In following example, 0 to
3 are drives, 4 and 5 are controllers, and 6 is RAID drive with multipathing enabled.
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
Enter the number that corresponds to the RAID disk number and not the controller. For StorageTek
RAID, as given in the above example, enter the disk number corresponding to the disk label
SUN-LCSM100_F-0735 and for IBM RAID, enter the disk number corresponding to the disk label
IBM-1814 as given in the above example.
4. At the format> utility prompt, enter verify to ensure that the drive has been labeled and also to display the
disk slices (partition table).
5. At the format> utility prompt, enter quit to exit the format utility prompt.
6. Mount the disk for testing and verification:
a. Create a mount point (directory) using the following command. The recommended name is:
/export/raid:
Identify the largest partition that is not labeled backup. In this example, partition6 is the largest partition
not labeled backup. Record the partition number displayed on your system. The disk slice is s6. If the
value shown in Step 3 was c2t4d0, you would enter:
c. Record the mount point and device name in Table System Information Worksheet; you will need it
when running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t4d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
total 16
drwx------ 2 root root 8192 Nov 21 11:59 lost+found
# df -h|grep raid
# umount /export/raid
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
The primary use for the private network links is the exchange of heartbeat messages between the active and
standby systems. The heartbeat messages allow each system to detect the availability of the other system. The
minimum number of private network connections is 2; however, the more connections that you provide, the more
protection you have against port and card failures. You can have up to 4 private network connections.
For HA to run properly, you must have this private network configured and running properly. If the heartbeat
messages are sent over the public network rather than the private network, under certain conditions the standby
system may attempt a takeover before the active system detects the failure (or while trying to recover from the
failure).
Sonus Recommendations
Sonus recommends at least two private network links between the Active and Standby Netra T5220 systems (you
can establish up to four private network links). At least one of these should be a dedicated hardwired (Ethernet
crossover cable) connection between the Active and Standby systems. You can use any combination of dedicated
hardwired links or non-dedicated links through a hub/switch for the redundant network link(s).
If the redundant network is accomplished using a hub/router (rather than a crossover cable), make sure that the
hub/router's address can be pinged and its interfaces have transmission mode configured to auto-negotiate. These
settings are required to ensure that Keep Alive communications can succeed between the Active and Standby
systems.
For a more robust deployment, the interfaces for each private network link should be on different cards than the
interfaces for the other private network links.
Each private network link should be on a different subnet than the other private network links.
Procedure
The steps below describe the procedure for establishing a private network between the Active and Standby
systems.
1. Connect an Ethernet crossover cable directly between a network interface on the Active and Standby Netra
5220 systems. The Table Private Network Interfaces and IP Addresses shows the recommended interfaces
to use. See the figure Netra T5220 Cross-over Cable Connections. Note that the first and second private
networks are on different cards, as recommended.
2. On the Active and on the Standby Netra systems, use the following steps to assign permanent (persistent
across reboots) IP addresses to the private network interfaces you connected in Step 1. The Table Private
Network Interfaces and IP Addresses shows a sample IP address to use for each interface. Note that the first
private network link is on a different subnet than the second private network link, as required.
a. Create an /etc/hostname.<interface> file for each of the private network interfaces, and in each
file, enter the IP address for the interface.
Example: If one of the private network interfaces is e1000g2 and the IP address is 192.168.5.1, create
the file /etc/hostname.e1000g2 and enter the value 192.168.5.1.
b. Record the value of each IP address in the table System Information Worksheet; you will need these
values when running the configureHA script.
c. In the /etc/netmasks file, enter the network number and netmask for each of the private network
interfaces on the system. Depending on the private network interface IP address, specify the Network
number and subnet mask of the respective private network interface.
Example: If the private network interface number is 192.168.5.2 then enter the network number and
subnet mask in /etc/netmasks file as:
192.168.5.0 255.255.255.0
d. Plumb the IP address by executing the following commands:
(This example considers e1000g2 as the private interface and 255.255.255.0 as the netmask)
Verify that the peer IP addresses are on a private subnet to ensure that packets destined for
the management network are not transmitted through these interfaces.
3. Repeat Steps 1 and 2 to set up the secondary and any other redundant links between the Active and Standby
Netra systems. You can use any combination of dedicated hardwired links or non-dedicated links through a
hub/switch for the redundant network link(s).
It is necessary to perform some configuration on each Netra system and collect hardware configuration information
to be used later when you run the configureHA script. The configureHA script will configure the public network and
the multipath group.
The concept of IP Network Multipathing is used for the public network. This concept provides the system with
single-point of failure recovery. A “well-known address” is assigned to a multipath group, which consists of a primary
and secondary interface. If a failure occurs in the primary interface or its network adapter, the system automatically
switches all the network access from the failed interface and/or adapter to the secondary interface. This process
ensures uninterrupted access to the network.
If not already done, you must set up a management/reachability interface on both the active and standby systems,
and assign each an IP address (refer to the Sun documentation for proper setup procedures). This interface will be
used when a system is in the standby mode to send traps concerning its own operation. The Table Reachability
Interface and IP Address shows the recommended reachability interface and sample IP addresses to use, and
Figure Public Network Connections for Netra T5220 shows the connections. The reachability address must be on
the same subnet as the “well-known” address that will be chosen in "Getting Ready to Configure the Public
Network". Record the value of the reachability IP addresses, you will need these values when running the
configureHA script.
Requirements
The primary and secondary interfaces for the multipath group on a system must be on different cards.
The reachability address and the well-known address must be on the same subnet.
The well-known address must be on a different network than the private network links.
The test addresses must be on the same subnet as the well-known address.
The dummy address must be on the same subnet as the well-known address.
ICMP echo/reply to and from the default router (or hosts identified through static hosts routes) must be
allowed.
Procedure
The procedure below describes the prerequisite steps to be completed concerning the public network before running
the configureHA script.
1. You must choose the names of the two interfaces used to create the multipath group on each Netra system.
The Table Public Network Interfaces and IP Addresses shows the recommended interfaces to use; note that
the primary and secondary interfaces are on different cards, as required. Record the values, you will need
these values when running the configureHA script.
2. Log on as root.
3. In order to activate these two interfaces on each Netra system, you need to plumb each interface. This
process sets up the streams needed for IP to use the interface. Use the ifconfig command to perform this
task. For example, to plumb interface e1000g1and nxge0, use the following commands:
4. Establish one well-known address on the LAN for assignment to the multipath group for use by the clients.
You only need one well-known address for both Netras on the HA system. The Table Public Network
Interfaces and IP Addresses shows a sample well-known address to use; note that the well-known address is
on a different network than the private network, as required. Also note that the well-known address is on the
same subnet as the reachability address given in Table Reachability Interface and IP Address, as required.
Record the value in the table System Information Worksheet, you will need it when running the
configureHA script.
5. Assign a host-name (such as “EMSHA”) to this well-known address and make an entry in the appropriate
Solaris database on both Netras, for example in the /etc/hosts file or NIS or DNS. Record the value; you will
need it when running the configureHA script.
6. Sonus recommends that you establish two unique test addresses on each Netra system, one for the primary
LAN interface and one for the secondary. These test addresses must be on the same subnet as the
well-known address. These addresses are not for general use. The Table Public Network Interfaces and IP
Addresses, shows sample test addresses to use. Record the values; you will need these values when
running the configureHA script.
Because the active and standby test addresses are not plumbed simultaneously, you can, if you
wish, use the same test address on both systems.
7. Establish one “dummy” address as the back-up/secondary address used for the internal working for the
multipath group. This dummy address must be on the same subnet as the well-known address. This address
is not for general use. You only need one dummy address for both Netras on the HA system. The Table
Public Network Interfaces and IP Addresses, shows a sample well-known address to use. Record the value,
you will need it when running the configureHA script.
During configuration, if a prompt asks for the IP Address, enter the well-known address. If a prompt
asks for the host-name, enter the hostname corresponding to the well-known address. You should
not use the IP address or hostname of an individual Sun system in an HA set-up.
8. Install the cabling from the two interfaces to the appropriate hub/router. The Figure Public Network
Connections for Netra T5220, shows the connections.
Caution
Be sure that the steps in the procedure above are complete for each Netra system.
Test address example for primary interface for multipath group 10.6.9.80
Test address example for secondary interface for multipath group 10.6.9.81
Test address example for primary interface for multipath group 10.6.9.82
Test address example for secondary interface for multipath group 10.6.9.83
You only need to follow the procedures in this section when installing Insight (HA) architecture.
Prerequisites
When running the configureHA script on the active and standby Insight systems, the script prompts you for
Performed the first five items in High Level Task Sequence for Configuring HA
Reset the insight user password. See Changing the “insight” User Password and/or Password Expiration
Behavior. The active and standby systems must use the same insight user password.
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
You must run the configureHA script on both the active and standby Insight systems.
The following procedure describes how to run configureHA on the active system.
The approximate timeline required to run the configureHA script on the active system is 30 minutes.
a. If the Insight database is running, a list of active oracle processes will be displayed and go to Step 3.
b. If the Insight database is not running, no oracle processes will be displayed. Start the Insight database
by entering the following command and go to Step 3.
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If necessary replace the c2t2d0s6 in the command line with the designator for your disk. This was established
in the section Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array .
4. Enter the following command to start the configureHA script.
# cd /export/home/ems/conf/HA
# ./configureHA
Insight will be stopped now. Do you want to proceed? (default: yes) [y,n]
Press Enter to accept the default. The system then displays the following message:
The steps 8 to 11 are optional and must be executed only if you have an OAM IP address to be
configured. If you do not want to configure an OAM IP address skip steps 8 to 11 and execute the
steps from step 12 onwards.
The OAM IP address is used by PSX to communicate with PSX GUI and EMS acts as a proxy for
PSX.
The section will collect information for creating the "Public" IP Multipathing
interface.
Which interface will be the primary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
Type the name of the primary interface for the multipath group, and press Enter.
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
Which interface will be the secondary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
a. Type the name of the secondary interface for the multipath group and press Enter.
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
The system would not display the primary interface that have configured in previous step as
an option.
16.
Type y and press Enter to configure IPv4 and IPv6 network interfaces.
or
Type n and press Enter to configure only IPv4 network interfaces.
What is the test IPV4 address for the primary LAN interface (default:
10.54.5.32) : 10.54.5.32
What is the test IPV4 address for the primary LAN interface : 10.54.5.32
Type the IP test address for the primary interface for the multipath group, and press Enter.
You would have established the primary interface for the multipath group in Public Network Setup.
What is the test IPV4 address for the secondary LAN interface : 10.54.5.33
Type the IP test address for the secondary interface for the multipath group, and press Enter.
You would have established the secondary interface for the multipath group in Public Network
Setup.
You would have established the well known address on the LAN in Public Network Setup.
What is the "dummy" IPV4 address for the secondary interface : 10.54.5.38
Type the dummy address, which you established in Public Network Setup and press Enter.
22. The system displays the following:
Type the reachability address for this system, which you established in Public Network Setup and press
Enter.
23. The system displays the values you entered. The following is an example based on the values given for the
active Netra T5220 system in Public Network Setup.
Please provide the IP Address of the Peer system for Keep Alives.
You can provide up to 4 such addresses.
Peer Keep Alive IP Address 1 (RETURN to stop):
Peer Keep Alive IP Address 2 (RETURN to stop):
Sonus recommends providing at least two peer private IP addresses for redundancy purposes. Enter the peer
private IP addresses, which you established in Private Network Setup, and press Enter.
26. The system displays the following:
Please provide the IPv4 reachability Address of the Peer system for Keep
Alives.
What is the peer's IPv4 reachability address?
Type the reachability address for the other Insight system, which you established in Public Network Setup
and press Enter.
28. The system displays the following:
You entered:
Peer Keep Alive IP Address 1: 172.16.5.2
Peer Keep Alive IP Address 2: 172.16.6.2
Peer Keep Alive IP Address 3:
Peer Keep Alive IP Address 4:
Peer's Reachability IP Address: 10.54.5.35
You entered...
User Name: "oracle"
Group Name: "dba"
Are the values correct (default:N) [y|Y,n|N] ?
Enter the RAID’s mount point, which you established in Netra T5220 Disk Labeling and File System Creation
for the RAID Disk Array and press Enter.
33. The system displays the following:
Enter the RAID’s device name, which you established in the section Netra T5220 Disk Labeling and File
System Creation for the RAID Disk Array and press Enter.
34. The system displays the following:
The “raw” device name is the same as the device name with the addition of “r” to “dsk” (e.g.
/dev/rdsk/c2t2d0s6).
Enter the well-known IP address, which you established in Public Network Setup, and press Enter.
36. The system displays the following:
You must decide whether to move the active system database or standby system database to the RAID disk
Enter the base directory for Oracle and press Enter. For example:
/export/home/oracle
The system then displays a number of status messages that the configureHA script uses to make the
database. The script will backup the database, create a new database and import the backup data into the
new database. The script also turns on archive log and schedules cron jobs for daily backups and cleanup.
mkdir /export/raid/orasql
chown oracle:dba /export/raid/orasql
chmod 775 /export/raid/orasql
39. The system displays the High Availability Configuration Main Menu:
Type 6 and press Enter.
40. The system displays the following:
Testing scp
Please enter the root password of the peer:
42. Enter the root password of the peer and press enter.
Check the interfaces on the peer server if the following message appears:
43. The system displays the High Availability Configuration Main Menu.
Type 9 and press Enter to change the IP address of system A.
44. The system displays the following:
This step will change the IP Address on your system. Do you want to proceed
with this step? (default: yes) [y,n]
Do you want to notify all registered IAS systems of this new IP address?
(default: no) [y,n]
If there are IASs that were registered to this system and that should be registered to the HA system, type y
and press Enter. Otherwise type n and press Enter.
47. The system displays the following:
The e-mail notification is received only if you configure mailx on both the Active and Standby
servers. For information on configuring mailx, see Enabling Mailx-HA Solaris.
50. Perform the steps in Running the haMigrationFiles.sh for running the haMigrationFiles.sh file. For
more information, see Running haMigrateFiles.sh.
51. After you run the configureHA script, you must release resources so that they are available for the
configuration of other Netra systems. Type the following command:
# /export/home/ems/conf/HA/haResources release
a. If the Insight database is running, a list of active oracle processes will be displayed and go to Step 3.
b. If the Insight database is not running, no oracle processes will be displayed. Start the Insight database
by entering the following command and go to Step 3.
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If necessary replace the c2t4d0s6 in the command line with the designator for your disk. This was established
# cd /export/home/ems/conf/HA
# ./configureHA
Insight will be stopped now. Do you want to proceed? (default: yes) [y,n]
More details about OAM IP address configuration and PSX Proxy mode are available here.
The section will collect information for creating the "Public" IP Multipathing
interface.
Which interface will be the primary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
Type the name of the primary interface for the multipath group, and press Enter.
NOTE: You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
a. Type the name of the secondary interface for the multipath group and press Enter.
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
The system would not display the primary interface that have configured in previous step as
an option.
Type y and press Enter to configure IPv4 and IPv6 network interfaces.
or
Type n and press Enter to configure only IPv4 network interfaces.
18. The system displays the following:
What is the test IPV4 address for the primary LAN interface (default:
10.54.5.32) : 10.54.5.32
What is the test IPV4 address for the primary LAN interface : 10.54.5.32
Type the IP test address for the primary interface for the multipath group, and press Enter.
You would have established the primary interface for the multipath group in Public Network Setup.
What is the test IPV4 address for the secondary LAN interface : 10.54.5.33
Type the IP test address for the secondary interface for the multipath group, and press Enter.
You would have established the well known address on the LAN in Public Network Setup.
What is the "dummy" IPV4 address for the secondary interface : 10.54.5.38
Type the dummy address, which you established in Public Network Setup and press Enter.
22. The system displays the following:
Type the reachability address for this system, which you established in Public Network Setup and press
Enter.
23. The system displays the values you entered. The following is an example based on the values given for the
active Netra T5220 system in Public Network Setup.
Sonus recommends providing at least two peer private IP addresses for redundancy purposes. Enter the peer
private IP addresses, which you established in Private Network Setup, and press Enter.
26. The system displays the following:
Type y and press Enter to configure IPv4 and IPv6 network interfaces.
or
Type n and press Enter to configure only IPv4 network interfaces.
27. The system displays the following:
Please provide the IPv4 reachability Address of the Peer system for Keep
Alives.
What is the peer's IPv4 reachability address?
Type the reachability address for the other Insight system, which you established in Public Network Setup
and press Enter.
28. The system displays the following:
You entered:
Peer Keep Alive IP Address 1: 172.16.5.2
Peer Keep Alive IP Address 2: 172.16.6.2
Peer Keep Alive IP Address 3:
Peer Keep Alive IP Address 4:
Peer's Reachability IP Address: 10.54.5.35
You entered...
User Name: "oracle"
Group Name: "dba"
Are the values correct (default:N) [y|Y,n|N] ?
Enter the RAID’s mount point, which you established in Netra T5220 Disk Labeling and File System Creation
for the RAID Disk Array and press Enter.
33. The system displays the following:
Enter the RAID’s device name, which you established in the section Netra T5220 Disk Labeling and File
System Creation for the RAID Disk Array and press Enter.
34. The system displays the following:
The “raw” device name is the same as the device name with the addition of “r” to “dsk” (e.g.
/dev/rdsk/c2t4d0s6).
Enter the well-known IP address, which you established in Public Network Setup, and press Enter.
36. The system displays the following:
You must decide whether to move the active system database or standby system database to the RAID disk
array.
You must choose a different operation than you chose for the active system. If you chose item 1 for the active
system, you must choose item 2 for the standby system.
Press Enter after making your selection. The system then displays several status messages. If necessary,
you can enter q to return to the main menu.
Press Enter after making your selection.
38. If you chose 1 above, the system displays the following prompt:
Enter the base directory for Oracle and press Enter. For example:
/export/home/oracle
The system then displays a number of status messages that the configureHA script uses to make the
database. The script will backup the database, create a new database and import the backup data into the
new database. The script also turns on archive log and schedules cron jobs for daily backups and cleanup.
39. The system displays the High Availability Configuration Main Menu:
Type 6 and press Enter.
40. The system displays the following:
41. The system displays the High Availability Configuration Main Menu:
Type 7 and press Enter to configure/test the SSH connection between the systems and to synchronize the
managed node information.
The system displays the following:
Testing scp
Please enter the root password of the peer:
42. Enter the root password of the peer and press enter.
Check the interfaces on the peer server if the following message appears:
43. The system displays the High Availability Configuration Main Menu.
Type 9 and press Enter to change the IP address of system A.
44. The system displays the following:
This step will change the IP Address on your system. Do you want to proceed
with this step? (default: yes) [y,n]
Do you want to notify all registered IAS systems of this new IP address?
(default: no) [y,n]
If there are IASs that were registered to this system and that should be registered to the HA system, type y
and press Enter. Otherwise type n and press Enter.
47.
# cd /export/home/ems/conf/HA
# vi haConfiguration
The e-mail notification is received only if you configure mailx on both the Active and Standby
servers. For information on configuring mailx, see Enabling Mailx-HA Solaris.
50. Perform the steps in Running the haMigrationFiles.sh for running the haMigrationFiles.sh file. For
more information, see Running haMigrateFiles.sh.
51. After you run the configureHA script, you must release resources so that they are available for the
configuration of other Netra systems. Type the following command:
# /export/home/ems/conf/HA/haResources release
52. After you run the configureHA script on the active and standby systems, go to Post-HAconfigure Tasks.
1. The configureHA script provides the user to configure the HA in IPv4 or IPv4 and IPv6 (dual stack).
The system displays the following:
Type y and press Enter to configure IPv4 and IPv6 network interfaces.
or
Type n and press Enter to configure only IPv4 network interfaces.
What is the test IPV4 address for the primary LAN interface (default:
10.54.5.32) : 10.54.5.32
What is the test IPV4 address for the primary LAN interface : 10.54.5.32
Type the IP test address for the primary interface for the multipath group, and press Enter.
You would have established the primary interface for the multipath group in Public Network Setup.
What is the test IPV4 address for the secondary LAN interface : 10.54.5.33
Type the IP test address for the secondary interface for the multipath group, and press Enter.
NOTE: You would have established the secondary interface for the multipath group in Public Network Setup.
4. The system displays the following:
What is the "dummy" IPV4 address for the secondary interface : 10.54.5.38
Type the dummy address, which you established in Public Network Setup and press Enter.
6. The system displays the following:
Type the reachability address for this system, which you established in Public Network Setup and press
Enter.
7. The system displays the values you entered. The following is an example based on the values given for the
active Netra T5220 system in Public Network Setup.
Please provide the IP Address of the Peer system for Keep Alives.
You can provide up to 4 such addresses.
Peer Keep Alive IP Address 1 (RETURN to stop):
Peer Keep Alive IP Address 2 (RETURN to stop):
Sonus recommends providing at least two peer private IP addresses for redundancy purposes. Enter the peer
private IP addresses, which you established in Private Network Setup, and press Enter.
10. The system displays the following:
Type y and press Enter to configure IPv4 and IPv6 network interfaces.
or
Type n and press Enter to configure only IPv4 network interfaces.
11. The system displays the following:
Please provide the IPv4 reachability Address of the Peer system for Keep
Alives.
What is the peer's IPv4 reachability address?
12. Type the reachability address for the other Insight system, which you established in Public Network Setup
and press Enter.
Running haMigrateFiles.sh
1. Log in as user root and enter the following command to start the haMigrateFiles script.
# cd /export/home/ems/conf/HA
# ./haMigrateFiles.sh
7. Select 1 from the options. This step moves the existing PM CSV files to the RAID and updates the
configuration to point to /export/home/ems/weblogic/sonusEms/dataRaid.
Creating /export/home/ems/weblogic/sonusEms/dataRaid/pm_archive.
cp -R /export/home/ems/weblogic/sonusEms/data/pm_archive/scp-tmp-dir
/export/home/ems/weblogic/sonusEms/dataRaid/pm_archive.
Enter dbimpl.
The following prompt appears:
Enter dbimpl.
10. The following options are listed:
1) Migrate Inventory, Network Health, Network Fault, Topology and Trunk Group Reports
2) Migrate PM csv files
3) Migrate User Audit Log files
4) Migrate MNP BDD Files
5) Migrate All back to Standalone
q) quit
11. Select 3 from the main menu. The following options are listed:
1) Move the User Audit Log files to the RAID.
2) Point this system to use the User Audit Log files already on the RAID.
q) quit
12. Select 1 from the list of options. This step moves the existing UserAuditLog files to the RAID and updates the
configuration to point to /export/home/ems/weblogic/sonusEms/logsRaid.
Enter dbimpl.
The following prompt appears:
Enter dbimpl.
14. The following options are listed:
1) Migrate Inventory, Network Health, Network Fault, Topology and Trunk Group Reports
2) Migrate PM csv files
3) Migrate User Audit Log files
4) Migrate MNP BDD Files
5) Migrate All back to Standalone
q) quit
15. Select 4 from the main menu. The following options are listed:
1) Move the MNP BDD files to the RAID.
2) Point this system to use the MNP BDD files already on the RAID.
q) quit
16. Select 1 from the list of options. This step moves the existing MNP BDD files for Syniverse to the RAID and
updates the configuration point to
/opt/sonus/ems/weblogic/sonusEms/dataRaid/lnp/final/syniverse. For Telcordia, this step
moves the existing MNP BDD files and updates the configuration point to
/opt/sonus/ems/weblogic/sonusEms/dataRaid/lnp/final/telcordia.
17. Select q from the main menu to generate the High Availability Migration Main Menu.
The following options are listed:
1) Migrate Inventory, Network Health, Network Fault, Topology and Trunk Group Reports
2) Migrate PM csv files
3) Migrate User Audit Log files
4) Migrate MNP BDD Files
5) Migrate All back to Standalone
q) quit
18. Select q to quit.
1. Verify that the interfaces and routing table are configured correctly. See Checking Interface Configuration and
Routing Table for Netra T5220.
2. Enable Multipath for IBM RAIDS. For more details, see MPXIO from T5220 to IBM DS3524 Disk Arrays.
3. First start Insight on the active system and then on the standby system.
4. Register or update the registration of each Insight device (see Chapter 4 of the Insight EMS User Guide).
Example Details
In the example output given in the following procedure, the following assumptions are made:
Procedure
Use the following steps to verify the interface configuration and routing table on each server that is part of an HA setup.
ifconfig -a
netstat -rn
The Insight Application Server (IAS) lets you run the Insight API, the Insight SMS API, the SGX API, and the Lawful
Intercept Target Provisioning API on a system other than the Insight server. For an overview of the IAS, see Insight
Application Server.
You require two servers to install Insight and IAS. You need to install Insight on server A before installing IAS on
server B.
After Insight is upgraded, Sonus recommends that each IAS be upgraded as soon as possible to ensure
consistent operation with the EMS. Older versions of IASs cannot run new versions of the API or handle
new features. While an IAS is being updated, any API clients or HTTP load balancer should be configured
to direct requests to Insight or other IASs.
Know the IP address of the remote system on which you want to upgrade IAS
Know the password for the root user on the remote system
Have a system that meets the specifications in Hardware and Software Configuration for EMS HA.
Sonus recommends that you start Insight on the EMS before you upgrade the IAS
To determine whether the Solaris patch has already been installed on your system, perform the following steps:
uname -v
2. Read the output. If the following line appears, the Solaris patch has already been installed:
Generic_150400-20
If the output does not match the previous message, install the Solaris OS patch. For more details, see Step 1
Upgrading Solaris Operating System.
# cd /export/home/ems/conf/IAS
# sh remoteIasInstall.sh <client_ip_address>
where <client_ip_address> is the IP address of the remote system on which you want to upgrade IAS.
2. When prompted, enter the password of the root user for the remote system.
3. Messages appear that state that remote information is being retrieved, and upgrade files are being copied to
the remote system.
4. When the IAS is ready for upgrade, a message appears that this may take several minutes.
A message then appears stating that the IAS installation completed successfully, and that the IAS has
started.
The remoteIasInstall.sh script takes care of both IAS install and upgrade.
To start an IAS server, Insight must first be running on the Insight EMS server. You can then start the IAS by logging
into the Insight EMS server as user insight and entering the following:
where <client_ip_address> is the IP Address of the IAS, which can either be an IPv4 or an IPv6 address type. The
script prompts you for the insight user password of the IAS system and then proceeds with the command. Once the
IAS is started, it will continue to run even if Insight is stopped.
To stop an IAS server, Log on to the Insight EMS server as either root or insight and enter the following:
# cd /export/home/ems/conf/IAS
# ./remoteIasMgmt.sh stop <client_ip_address>
where <client_ip_address> is the IP Address of the IAS. The script prompts you for the root or insight user password
of the IAS system and then proceed with the command.
To obtain the status of an IAS server, Log on to the Insight EMS server as either root or insight and do the following:
# cd /export/home/ems/conf/IAS
# ./remoteIasMgmt.sh status <client_ip_address>
where <client_ip_address> is the IP Address of the IAS. The script prompts you for the root or insight user password
of the IAS system and then proceeds with the command. The output of the status command looks similar to the
following:
When the changeIpAddress.sh script is used to change the IP address of the Insight server, all IASs that are
registered to the Insight server should be automatically updated to the new IP address of the Insight server.
To update the Insight IPv4/IPv6 address on a specific IAS, perform the following:
# cd /export/home/ems/conf/IAS
# ./remoteIasMgmt.sh resetInsightIP <client_ip_address>
where <client_ip_address> is the IPv4/IPv6 address of the IAS on which you want to update the Insight
IPv4/IPv6 address.
The Insight IPv4/IPv6 address on the IAS is updated to the IPv4/IPv6 address of the Insight server.
To update the Insight IPv4/IPv6 address on all the IASs that are registered to the Insight server, perform the
following:
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IPv4/IPv6 address on all IASs that are registered to the Insight server are updated to the IPv4/IPv6
address of the Insight server.
If you have the system administrator change the name or the IPv4/IPv6 address of the IAS, you do not have to
Update the IAS node in the Insight Node Registration Page, and rediscover the IAS node. See “Updating a
Node” in the Insight Administration chapter of the Insight EMS User Guide.
Licenses for Enabling Insight API, SMS API, SGX API, and Lawful Intercept Target
Provisioning API on the IAS
If you install the Insight API, Insight SMS API, Insight SGX API, or Lawful Intercept Target Provisioning API on an
IAS, you must purchase a license for each instance of an API module you want to use. You cannot share a license
between an API module on the Insight server and an API module on an IAS. For example, you cannot share a single
license between an Insight SMS API module on the Insight server and an Insight SMS API module that is installed
on a remote system with IAS.
# cd <IAS_BASE>/bin
# ./enableHTTP.sh
The IAS server will be stopped now. Do you want to proceed? (default: yes)
[y,n] y
Stopping IAS...
The IAS server will be stopped now. Do you want to proceed? (default: yes) [y,n] y
Stopping IAS...
*** Stopping IAS! - Thu Apr 25 12:34:55 IST 2013 ***
IAS Server stopped.
Upgrading HA-Introduction
This section describes the factors that you must consider before performing an Insight High Availability (HA)
upgrade.
Prerequisites
Insight HA Upgrade Methods
Insight Upgrade Considerations
Creating a Minimal Insight Server
Verifying Netcool Object Server Name
Network Upgrade Sequence
Prerequisites
Tasks Description
# /export/home/ems/conf/HA/hamgmt getState
Actual State: ACTIVE
Configured State: ACTIVE
System has well known IP.
Raid device is mounted.
Oracle database processes are running.
Oracle Listener is running
$ ssh insight@<PEER_REACHABLE_IP>
Connection to the peer should be successful by entering the same passwords on both the systems.
Extraction of the tar Do not manually untar the tar file using the “tar” command.
file
Extract the tar file simultaneously using the following methods on both the systems of HA.
Recording the Ensure that you record the screen output using the script command. This helps you to troubleshoot
Screen output any queries in while performing an upgrade.
NOTE: Run the script command before you start the tar file extraction.
# script -a /export/home/`hostname`.script.log
# bash
# cd /export/home/install/ems
You can upgrade Insight HA only using the Sonus SalesForce Customer Portal. For more details, see Upgrading
Insight High Availability.
Prerequisites
Insight HA Upgrade Methods
Insight Upgrade Considerations
Creating a Minimal Insight Server
Verifying Netcool Object Server Name
Network Upgrade Sequence
If you do not have a redundant Insight server, in order to maintain management capabilities while upgrading your
system, Sonus recommends that you create a temporary, minimal Insight management platform. The minimal server
has the capability to manage registered nodes, role/user information, and receive traps. The minimal server will run
the same version of Insight that is running on your Insight server (pre-V09.03.00 Insight).
1. Install the same version of Insight running on your primary server (pre-V09.03.00) to a backup system.
2. Login as root user on the primary Insight server and do the following:
# cd /export/home/ems/weblogic/sonusEms/data/sys
# /bin/tar cf /tmp/nodesUsers.tar Managed*.txt
# cd /export/home/ems/weblogic/sonusEms/data/sys
# /bin/tar xf /tmp/nodesUsers.tar
4. Replace all occurrences of the Primary Server IP address with the Secondary Server IP address by entering
the following script.
Note that there is not a line break after upgradeUser’.
5. After running the previous commands, start the system. All users and nodes that existed on the Primary
system now exist on the Backup system.
6. Log on to the system (you must have Administrator privileges) and access the Insight Administrator.
7. Select the General tab and the Managed Device Association category.
8. Enter the IP Address of the newly created Minimal Insight Sever and click the Associate button. This
enables the Minimal Insight Server to receive trap information from the registered nodes.
Before starting EMS upgrade, the Netcool object server name must be SONUSDB by default. The old DB name can
be found at these locations:
Standalone: /export/home/netcool/omnibus/db/{DB_NAME}
HA: /export/raid/Omnibus/db/{DB_Name}
Perform the following the procedure to update the object server name to SONUSDB:
$ cd /export/home/ems
$ ./sonusEms stop fm
$ /export/home/ems/conf/netcool_rename_db.ksh
3.
$ cd /export/home/ems
$ ./sonusEms start fm
When an existing network is to be upgraded, use the following upgrade sequence for the network elements that will
be upgraded:
1. Obtain the required software licenses for additional software modules you will be adding. For more
information on Insight licenses, see Licenses for Enabling Insight API, Insight CLI, SMS API, SGX API,
Lawful Intercept Provisioning API, and Traffic Manager. You will apply the licenses in Step 9.
2. Upgrade the Insight Element Management System server software.
Caution
When upgrading a system that is running HPC, avoid loss of HPC service by installing and activating the
HPC license (NW-HPC) after you upgrade Insight and before you upgrade PSX. See the Insight EMS
User Guide for details.
After you upgrade (or downgrade) software on a Sonus node (PSX, SGX, GSX, etc.), a user with
administrative privileges must rediscover the node in the Insight Administration page: in the Node
tab, select a node from the Sonus Managed Nodes list, and click the Discover button. Failure to
perform this rediscovery will result in the loss of Traffic Manager reporting and may result in
excessive error generation in the error logs (particularly in the case of a downgrade).
9. Apply the required licenses. For more information on Insight licenses, see Licenses for Enabling Insight API,
Insight CLI, SMS API, SGX API, Lawful Intercept Provisioning API, and Traffic Manager.
10. This guide addresses installation and/or upgrade of Insight only. For instructions on installing/upgrading other
network elements, consult the appropriate guides.
This section describes how to upgrade an Insight High Availability (HA) system by using Sonus Salesforce
Customer Portal.
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under:
$ORACLE_BASE/admin/SIDB/udump/diag/rdbms/<ORACLE_SERVICE_NAME>/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
Tasks Description
Upgrade operation is not supported with the changed netcool object server name. To perform an upgrade, you need to first rollback to
default netcool object server name “SONUSDB”. For changing the netcool object server name, refer Changing Netcool DB Object Server
Name for EMS HA.
Private network A minimum of 2 private network connections should be configured. A maximum of 4 private network connections are allowed.
connections
# /export/home/ems/conf/HA/hamgmt getState
Actual State: ACTIVE
Configured State: ACTIVE
System has well known IP.
Raid device is mounted.
Oracle database processes are running.
Oracle Listener is running
File Transfer The Solaris OS and Oracle DB related files are transferred to each of the host’s reachable IP only through scp command.
Do not use verbose option of tar command (use tar xf instead of tar xvf).
Delete or remove any .tar or tar.gz files that are available after the extraction. This is performed to increase the space in the folder.
emsbootstrap Download the Insight EMS installer file from the Sonus SalesForce Customer Portal and place it at /export/home
Download
For example:
# uncompress EMS.V09.03.00R000.tar.Z
Insight Passwords Ensure that the passwords for “insight” system user is same on both the systems.
$ ssh insight@<PEER_REACHABLE_IP>
Connection to the peer should be successful by entering the same passwords on both the systems.
Recording the Ensure that you record the screen output using the script command. This enables you to troubleshoot any issues while performing an upgrade.
Screen output
Ensure that you run the script command before extracting the tar file.
# script -a /export/home/`hostname`.script.log
Hardware Ensure that your system meets the minimum hardware requirements.
Requirements
For more details, see Hardware Requirements for EMS HA configuration.
CSV files The upgrade script will restore all csv from /export/home/ems/weblogic/sonusEms/data/pm_archive on the configured Active system, if the user enters ' y' to PM
retention in Step 1 - Verifying system configuration - Standby system of the HA Upgrade.
Any csv in the /export/home/ems/weblogic/sonusEms/data/pm_archive on the configured Standby will not be retained. You have to manually tar up and then
back the tar file to a different location, before the upgrade and restore it after upgrade if required.
Any csv written to a non-standard directory other than (/export/home/ems/weblogic/sonusEms/data/pm_archive) will not be retained, even if it is on the Active or
Standby system.
It is recommended to export the PM collection on the RAID directory (/export/home/ems/weblogic/sonusEms/dataRaid/pm_archive), so that the csv files are
always preserved during upgrade.
Sonus_OS_delta_9.3_Upgrade.tar.gz Mandatory
EMS_SonusDBPackage_solaris-V09.03.00R000.tar Mandatory
Solaris_Utilities_<current_release_name>.tar Mandatory
emsBootstrap-V09.03.00R000.tar NA
EMS.V09.03.00R000.tar.Z Mandatory
SSGUI_V09.03.00R000.tar Optional
Rollback using disk mirroring is supported only on Netra T5220 devices with 4 disks
1. The following mirrors are available where disks 0, 1 are master disks and 2,3 are slave disks.
Before upgrading, following mirrors are set up:
a. Disk 0 -> Disk 2
b. Disk 1 -> Disk 3
See Enabling Disk Mirroring-HA Solaris for enabling disk mirroring.
2. If you intend to use Disk mirroring as a rollback option, then make sure that mirroring is enabled, and that the mirrors are in sync, using 'metastat -c' command.
This should be done before performing any upgrade related tasks.
Please note that using Disk mirroring as rollback option will require physical access to the system, in case of upgrade failure, to swap the disks
3. After verifying that mirrors are in sync, detach the mirrors, so that mirroring no longer takes place. See Detaching Slave Disk from the Mirror-HA Solaris.
Detaching disk mirroring enables you to recover original EMS installation in case of upgrade failure.
4. Backup the files on RAID
As user root, login to the Active server and make a backup copy of the RAID directories. This will be used in case of rollback:
# ls -ltr /export/raid
drwx------ 2 root root 8192 May 24 11:20 lost+found
drwxrwxr-x 3 oracle dba 512 May 24 14:27 orasql
drwxrwxr-x 3 oracle dba 512 May 24 14:27 oradata
drwxr-xr-x 3 insight insight 512 May 24 14:37 Omnibus
drwxr-xr-x 4 root root 512 May 24 15:44 sonusEms
# cd /export/raid
# cp -pR orasql orasql_old
# cp -pR oradata oradata_old
# cp -pR Omnibus Omnibus_old
# cp -pR sonusEms sonusEms_old
2. Read the output, if the following line appears, the Solaris OS patch has been already installed, and you can skip the
remaining steps.
Generic_150400-20
If the output does not match the message above, you need to install the Solaris OS patch.
3. Download the Sonus_OS_delta_9.3_Upgrade.tar.gz file from the Sonus Salesforce Customer Portal to the
/export/home on the target server.
4. Specify the location as /export/home.
5. Unarchive the Solaris OS patch file by executing the following command:
# gzip -dc /export/home/Sonus_OS_delta_9.3_Upgrade.tar.gz | tar xf -
For upgrading the Insight to V09.03.00, the Oracle Database version should be 11.2.0.3.0 with
the latest security patch 19271438. Even if the existing database version is 11.2.0.3.0, verify and
ensure that you upgrade to the latest security patch 19271438.
su - oracle
sqlplus -version
If the following line appears, the Oracle Database 11.2.0.3.0 is installed. Even if DB version is 11.2.0.3.0, verify
if the latest security patch has been installed.
If the output does not match the message above, you need to upgrade the Oracle Database.
2. Execute the following command to verify if the latest Security Patch Update (SPU) has been applied or not:
a. Login as user oracle by entering the following command:
su - oracle
b. Enter the following command to verify the latest Security Patch Update (SPU) version is applied on the system:
If the following line appears, the required Oracle Security Patch has been already installed, and you can skip
the remaining steps.
If the command output does not match the latest Security Patch Update (SPU) version 19271438 then you
need to upgrade the Oracle Database.
3. Download the Solaris_Utilities_<current_release_name>.tar from the Sonus Salesforce Customer Portal to /export/ho
me/tmp.
4. Change to the temporary directory by entering:
# cd /export/home/tmp
# cd UTILITIES_<current_release_name>
The following are the two tar files used while upgrading Insight.
Installer.tar — The installer file EMS.V09.03.00R000.tar.Z is used while upgrading Insight using the Sonus
Salesforce Customer Portal. The installer file includes the bootstrap file emsBootstrap-V09.03.00R000.tar
Hence, you need not download the bootstrap file separately. The size of the Installer file is over 3GB.
The following section describes the procedure for obtaining the Installer file to upgrade Insight using the Sonus
Salesforce Customer Portal.
# script -a /export/home/`hostname`.script.log
4. Enter y, if you want to extract the tar file to the staging directory.
The following message appears:
Sequence System which owns Well known IP Active Standby Time Duration
No (A-Active, S-Standby) (approximate)
1. A checkSystem 5 minutes
2. A checkSystem 5 minutes
3. A makeStandalone 15 minutes
6 hours - Upgrade
using Sonus
SalesForce
5. A pushFiles 15 minutes
6. A restoreDatabase 2 hours
7. * makeStandalone 15 minutes
8. * makeStandby 30 minutes
10. S pushFiles
'*' denotes the steps during which the HA EMS server is down.
'A' denotes the steps where the well-known IP is owned by the Active EMS.
'S' denotes the steps where the well-known IP is owned by the Standby EMS.
After performing all the steps listed, you need to perform the Setting up peer root connection on both
the Active and Standby systems.
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under:
$ORACLE_BASE/admin/SIDB/udump/diag/rdbms/<ORACLE_SERVICE_NAME>/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
To verity the system configuration, you need to run./emsUpgrade.sh checkSystem on the Standby system.
This script checks, collects and displays the system configuration settings. Additionally it also prompts you to enter
the details such as the type of upgrade or status of the PM data and so on.
However, the configuration changes are not performed during this step.
# cd /export/home/install/ems
# ./emsUpgrade.sh checkSystem
This step will check, collect and display some system configuration settings.
No configuration changes will be made to the system during this step.
----------------------------------------------------------------------------------------------
EMS can be upgraded via either of the options
below:
1. FTP -In-place upgrade from SalesForce Portal (custom non-EMS
settings are retained)
2. JUMPSTART -USB/HDD upgrade (custom non-EMS settings may be lost)
This option selection can NOT be changed once the upgrade process starts.
Which option do you plan to use? [1|2]:1
4.
EMS V09.03.00 Software Release does not support Jumpstart installation and upgrade using USB.
If you want to use EMS V09.03.00 Software for Solaris platform, you must upgrade using Sonus
Salesforce to EMS Software Release V09.03.00. EMS Software Release V09.03.00 only supports
FTP Inplace upgrade from Salesforce portal for Solaris platform.
----------------------------------------------------------------------------------------------
Insight EMS upgrade, it is recommended that Performance Management (PM)
statistics
data NOT be retained and carried forward.
Retaining PM statistics data could significantly increase the upgrade
downtime.
This option selection can NOT be changed once the upgrade process starts.
Do you want to retain PM stats related data? (default: n) [y|n]: .......y
During the execution of the preinstall.pl script, several files and DB entries are backed-up in the
following directories:
/export/home/ems/weblogic/sonusEms/data/cli/scripts
This can increase the upgrade duration. If need to reduce the upgrade time, contact Sonus TAC.
The Insight upgrade may fail if there is insufficient space in the following directories:
/export/home/ems
/var
/tmp
----------------------------------------------------------------------------------------------
END: Running preInstall.pl script [GET_CONFIG], at Wednesday, August 14, 2013
3:58:10 PM IST ***
Successfully completed run of preInstall.pl script to collect config
Completed running preInstall (Phase: GET_CONFIG) script, verified backup tar
files.
..............................................................................................
copied install settings file to peer .......
Setting right perms for backup dir
Completed getting system configuration before upgrade.
Caution
Carefully inspect the output of preInstall.pl script run in the previous step. If you see any errors
on the console, do not proceed with the next steps of HA upgrade.
To verify the system configuration on the Active system, follow the same procedure as listed in Step 1 Verifying
system configuration - Standby system.
However, in the Active System, you are not prompted for additional information such as the type of upgrade.
# cd /export/home/install/ems
# ./emsUpgrade.sh checkSystem
Caution
Carefully inspect the output of preInstall.pl script run in the previous step. If you see any errors
on the console, do not proceed with the next steps of HA upgrade.
The steps for running the checksystem script on Active is similar to Standby.
To convert the HA Standby System into a Standalone, run./emsUpgrade.sh with argument makeStandalone.
This step points to the database on the Standby system from the RAID drive to the local disk. This is performed to
prepare the upgrade of the Standby system.
1. Enter the following command to make the HA Standby system into a Standalone.
# ./emsUpgrade.sh makeStandalone
Checking HA states...
Getting peer host IP address from config
.........................................
..........................................
Extracted peer host name from config file as 'ems2'
Getting some system info...
Making HA Standby system 'ems3' into Standalone
For upgrading using the Sonus Salesforce Customer Portal, upgrade the third party software and continue to Step
4b Performing the Database backup on the Active System. For details, see Upgrading the Third Party Software.
If you have not installed or upgraded the latest Third Party Software versions on your system, then perform the
following:
The ILOM firmware upgrade procedure must be done before you perform Oracle upgrade and EMS
application upgrade.
If you are upgrading to Insight V09.03.00, the Solaris Operating System patch version should be 150400-20.
Installing the Solaris Patch may approximately take 90 minutes. Before upgrading the Solaris Patch, you need to
determine the Solaris Patch Level.
# uname -v
If the output does not match the previous message, install the Solaris OS patch.
You can copy the Solaris OS patch from the Sonus Salesforce Customer Portal and then perform an upgrade.Copy
the Solaris OS patch Sonus_OS_delta_9.3_Upgrade.tar.gz from the Sonus Salesforce Customer Portal to a
location on the target server (example, /export/home).
$ /export/home/ems/sonusEms stop
$ sqlplus /nolog
SQL> conn / as sysdba
SQL> shutdown immediate
SQL> exit
$ exit
Do not use the /bin/csh or /bin/tcsh shells to install the Solaris patch cluster (the cluster will
not install correctly with those shells). Use one of the following shells: /bin/sh, /bin/bash, or
/bin/ksh.
Installation of patches should be performed using single user mode and should be performed
using terminal server port connection.
2. When the system prompt appears, issue the following command to reboot the system:
# reboot -- -s
3. Enter the root user password when the following prompt appears:
# mount /export/home
5. Perform the following steps to create the OS directory and extact the
Sonus_OS_delta_9.3_Upgrade.tar.gzfile.
a. Extract the downloaded Sonus_OS_delta_9.3_Upgrade.tar.gz file by using the following
commands:
# cd /export/home
# gunzip Sonus_OS_delta_9.3_Upgrade.tar.gz
# tar xf Sonus_OS_delta_9.3_Upgrade.tar
6. After the Sonus_OS_delta_9.3_Upgrade.tar.gz file is extracted, remove the tar file to free-up disk
space.
# rm -f Sonus_OS_delta_9.3_Upgrade.tar
# cd /export/home/Sonus_OS_delta_9.3_Upgrade
# ./upgrade.sh
If you encounter Return Codes 0, 1, 2, 4, or 8 during the patch installation process, you may ignore
them.
9. When the system prompt appears, issue the following command to reboot the system:
# reboot -- -r
The output is displayed as follows before the system logs out to reboot:
Then log on to the server after few minutes to verify the latest patch cluster.
10. To verify that the latest Solaris OS patch, enter:
# uname -v
Generic_150400-20
11. Remove the OS package directory to reclaim space, by executing the following command:
# rm -rf /export/home/Sonus_OS_delta_9.3_Upgrade
To determine the current version of the SNMP Management Agent, perform the following procedure:
1. Login as root .
2. Change to the directory containing the extracted cluster by entering:
# cd export/home/tmp/UTILITIES_<current_release_name>/SNMP_1.6.2
# /etc/init.d/masfd stop
4. Run the SNMP agent upgrade script. The script removes the old packages and installs the new packages.
# ./install.sh
5. Verify that the packages have been updated by entering the appropriate command. If the packages were
properly installed, the versions should be 1.6.2.
Netra T5220:
# /etc/init.d/masfd start
The changes on the SNMP daemon will take two minutes to start.
To determine the current version of the system firmware, perform the following steps:
2. If system firmware version is not at 7.4.7 , then perform Upgrading System Firmware
Do not downgrade the version of the system firmware. Doing so would result in ILOM no longer working,
requiring you to replace hardware.
If any error occurs during the firmware upgrade, you can reset the Service Controller through ILOM CLI
using the resetsc command:
sc> resetsc
If this command also fails, contact your next level of Sonus Support.
Perform the following procedure to upgrade the system firmware using the CLI:
# cd /export/home/packages
# unzip 147309-09.zip
The 147309-09.zip file is also available from the Sonus Salesforce Customer Portal at: WL9.3
# cd /export/home/packages/147309-09
# ./sysfwdownload Sun_System_Firmware-7_4_7-Netra_T5220.pkg
# shutdown -i0
5. Establish a connection to the Service Processor via ssh or using the Serial Console port.
Ok prompt appears. At the ok prompt, access the System Controller CLI by using the console escape
characters.
The character sequence " #. " is usually used.
{0} ok #.
You can see one of the following three prompts depending on from where you got into OS console.
a. login:
b. {0} ok
Serial console stopped.
->
c. {0} ok
Serial console stopped
sc>
6. After performing step 5, If you are landed in option a.login: (login) prompt:
a. Login using the user name/password as root/changeme .
The following message is displayed:
b.
-> cd /SP/users/
-> ls
-> cd /SP/users/
-> ls
create /SP/users/admin
The following message is displayed:
Creating user...
Enter new password: ********
Enter new password again: ********
Created /SP/users/admin
sc> poweroff
Are you sure you want to power off the system [y/n]? y
Chassis | critical: Host has been powered off
12. Ensure that your virtual keyswitch setting is not in the LOCKED position.
You can check the setting from the Service Processor CLI with the following command:
ORACLESP-1116FM901F login:.
14. Log into the ALOM CLI shell (indicated by the -> prompt) from the ALOM login prompt. Login as admin user.
The following message is displayed:
sc> poweron
sc> Chassis | major: Host has been powered on
16. To go to console, type console on the sc prompt. Login to console as root user.
17. Verify whether the software firmware is upgraded by entering the following command:
You can also upgrading using the Web Interface. If the system firmware version is less than V7.4.7, perform the
following procedure to update the system firmware with the Web interface.
Perform the following procedure to update the system firmware with the Web interface:
The 147309.zip file is also available from the Sonus Salesforce Customer Portal.
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under:
$ORACLE_BASE/admin/SIDB/udump/diag/rdbms/<ORACLE_SERVICE_NAME>/$ORACLE_SID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
Before performing a database software upgrade, login as user 'insight' and stop EMS and all its processes
by performing the following steps:
$ cd /export/home/ems
$ ./sonusEms stop
Perform the following procedure to upgrade the current database 11.2.0.1.0 or 10.2.0.4.0 to Oracle 11.2.0.3 or to
apply latest Security patch, after downloading the Oracle 11.2.0.3 package from the Sonus Salesforce Customer
Portal.
You need not perform a manual database backup if you are upgrading using the preInstall.pl script.
# cd /export/home/install/ems/oracle
# ./UpgradeOracle.sh
The UpgradeOracle.sh script upgrades and brings up the Oracle. The script approximately takes
one hour to complete.
# cd /export/home/oracle
# rm -f EMS_SonusDBPackage_solaris-V09.03.00R000.tar
You can perform a database backup on Active system using this step. This step backs up the EMS database,
configuration files, and the current state of the Fault Manager. You are recommended not to perform any
configuration changes to EMS from this step till the end of Step 8, because any configuration changes performed
are not retained.
You can perform both Step 4a Upgrading the Standby (Standalone) System and Performing the Database backup
on the Active System (Step 4b) simultaneously.
# cd /export/home/install/ems
# ./emsUpgrade.sh backupDatabase
In this step, certain files are moved or pushed from the Active to Standby system. These files are required later by
the Standby system.
# cd /export/home/install/ems
# ./emsUpgrade.sh pushFiles
Checking HA states...
Peer host's reachable IP address is 10.54.58.105
Checking if peer host 10.54.58.105 can be pinged...
Setting up connection to HA peer. You may be prompted for remote 'insight'
user's password.
Copying key files to peer...
Updating files on peer...
Testing peer connection, getting remote hostname
Detected peer's hostname ems3
Getting some system info...
This step will push certain required tar files to the HA Standby peer system
ems3...
Please make sure that peer system (OS/DB) has been successfully upgraded via
USB/FTP option.
You should run this step after peer system upgrade is complete.
Peer's EMS software will be upgraded automatically in later (restoreDatabase)
step.
Do you want to proceed? (default: n) [y|n]: y
4. Enter y, if you want to proceed with moving the files from Active to Standby.
The following message appears:
During this step, Insight is upgraded to the latest software version in the Standby system.
It also imports the configuration and the database that was backed up in Step 4b Performing the Database backup
on the Active System.
The local Insight server (Public reachable IP) is started at the end of this step. You can log on to the latest upgraded
system to view and verify the settings. However, this Insight server automatically shuts down at the beginning of the
Step 7 Converting the HA Active System into a Standalone.
# cd /export/home/install/ems
# ./emsUpgrade.sh restoreDatabase
Checking HA states...
Getting peer host IP address from config
Peer host's reachable IP address is 10.54.58.101
Extracted peer host name from config file as 'ems2'
.............................
This HA (Standby) host ......: ems3
Peer HA (Active) host ......: ems2
PM Statistics Retention .....: YES (Longer upgrade downtime)
Database Software Upgrade ...: No
Do you want to proceed with the database restore and Insight EMS upgrade
procedure? (default: n) [y|n]: y
For IPv6 configured systems, reboot (reboot -- -r) the system as root user after completing the
database restore.
This step stops the Insight server running on the well-known IP and converts the HA Active system into a
Standalone.
This step is similar to Step 3 Converting the HA Standby System into a Standalone.
As the HA resources are owned by this system, the resources are freed towards the end of this step.
# cd /export/home/install/ems
# ./emsUpgrade.sh makeStandalone
Checking HA states...
Getting peer host IP address from config
.........................................
..........................................
Extracted peer host name from config file as 'ems2'
Getting some system info...
Making HA Standby system 'ems2' into Standalone
Do you want to proceed with making this a standalone EMS system? (default: n)
[y|n]: y
4. Enter y, if you want to proceed making the Standby into a Standalone system.
This step configures the system as HA Standby, mount the RAID and then moves the database and certain files to
RAID. At the end of this step, the Insight server is started on the well-known IP.
# cd /export/home/install/ems
# ./emsUpgrade.sh makeStandby
In this step, you need to upgrade the Third Party Software such as the Operating System, Oracle Database, SNMP
and ILOM.
You can perform the similar steps followed in Step 4a Upgrading the Standby (Standalone) System.
In this step, you need to move or push certain files from the Standby to the Active system.
# cd /export/home/install/ems
# ./emsUpgrade.sh pushFiles
During this step, Insight is upgraded to the latest software version in the Active system. It also imports the
configuration and the database that was backed up earlier.
# cd /export/home/install/ems
# ./emsUpgrade.sh restoreDatabase
Checking HA states...
Getting peer host IP address from config
Peer host's reachable IP address is 10.54.58.101
....................................................
Extracted peer host name from config file as 'ems2'
Getting some system info...
Starting database restore of Standalone system ems3.
This step will also upgrade the Insight EMS software to the latest version.
Following settings are being used for this upgrade:
................................
This HA (Standby) host ......: ems2
Peer HA (Active) host ......: ems3
PM Statistics Retention .....: YES (Longer upgrade downtime)
Database Software Upgrade ...: No
Do you want to proceed with the database restore and Insight EMS upgrade
procedure? (default: n) [y|n]: y
4. Enter y, if you want to proceed with restoring the database and upgrading Insight.
The following message appears:
For IPv6 configured systems, reboot (reboot -- -r) the system as root user after completing
the database restore.
This step configures the system as HA Active, mounts the RAID, and then moves the database and relevant files to
the RAID.
# cd /export/home/install/ems
# ./emsUpgrade.sh makeActive
During this step, the Standby system currently has the HA resources and EMS running on the well-known IP. This
final step performs a manual failover and brings the HA system to the same state before the upgrade.
# cd /export/home/install/ems
# ./emsUpgrade.sh failOver
If SGX4000 device is configured on pre-V09.03.00 Insight system, you have to perform the following
procedure during data migration from any pre-V09.03.00 Insight system to Insight V09.03.00.
a. Login to Insight.
b. Navigate to Network Mgmt > Insight Administration.
c. Select the registered SGX4000 node from the Navigation tree.
d. Modify and Update the following (default) values if required.
i. SSH Port
ii. Login (CLI)
iii. Password (CLI)
e. Click on Update button and then click on Discover node.
Perform the following procedure to install the latest version of PSX Manager GUI:
This procedure need to be performed on both the active and standby server.
# mkdir -p /export/home/install/
3. Download the SSGUI_V09.03.00R000.tar file from Sonus SalesForce Customer portal to local system.
4. Copy the SSGUI_V09.03.00R000.tar file from the local system to the /export/home/install/
directory on the Insight EMS server.
5. Change the directory to /export/home/install/ by executing the following command:
# cd /export/home/install/
# cd /export/home/install/SSGUI
8. Execute the GuiClient.sh script as a super root user. The GuiClient.sh script installs the SONSpsx
package.
# ./GuiClient.sh
# pkginfo -l SONSpsx
11. You can perform the steps from 12 to 16 on any one of the servers. The configuration will reflect on both the
active and standby servers.
12. Login to the Insight EMS graphical user interface (GUI).
13. Click the Insight Administration icon on the left pane.
14. Click the General tab and select PSX Policy Server > PSX Manager Versions on the left bottom pane.
15. Click the Reload button to integrate the new PSX Manager version to Insight EMS server.
16.
1. Pre-requisites for Rollback using Disk Mirroring are completed successfully prior to start of upgrade.
2. If upgrade to V09.03.00R000 failed to complete successfully, perform the following to roll back to old EMS
version.
a. Stop Insight EMS by executing the following command:
b. Restore RAID paths on HA Active server. (This step need not be performed on HA Standby server).
i. Shut down Oracle Database server. See Starting and Stopping the Insight Database-HA Solaris
section in Common Administrative Tasks-HA Solaris.
ii. Copy the previously saved RAID sub-directories back:
# cd /export/raid
# rm -R orasql
# rm -R oradata
# rm -R Omnibus
# rm -R sonusEms
# rm -R orasql_old
# rm -R oradata_old
# rm -R Omnibus_old
# rm -R sonusEms_old
# conf="/opt/SONSdmems/config/platform_T5220-4.conf"
# echo "`grep \"svm.slave.disk\" $conf|head -1|awk -F= '{print $2}'|tr -d
' '`s0"
d. Edit /mnt/etc/vfstab
In order to preserve previous release config, the previous (before mirroring was first setup) vfstab file
need to be restored.
# cd /mnt/etc
# cp -p vfstab.orig vfstab
# chown root:sys vfstab
Find the disk labels for disks at slots 0 and 1 using following command:
# echo | format
e. Edit /mnt/etc/system as root user and delete the following lines if present:
# cd
# umount /mnt
# init 5
Disks initially at slots 0 and 1 should be inserted back to slots 2 and 3. Otherwise, it will
result in system booting in maintenance mode.
# metastat -c
i. Dump device need to be set to the original device (e.g. /dev/dsk/c1t0d0s1 for the example above)
using the following command:
# dumpadm -d /dev/dsk/c1t0d0s1
j. If you need to restart disk mirroring, clear the metadb and enable the disk mirroring using dmctl. The
# metaclear d41
# metaclear d40
# metaclear d36
# metaclear d35
# metaclear d34
# metaclear d33
# metaclear d30
# metaclear d31
# metaclear -r d201
# metaclear -r d200
# metaclear -r d106
# metaclear -r d105
# metaclear -r d104
# metaclear -r d103
# metaclear -r d100
# metaclear -r d101
Execute the following command to list all the existing metadb state database replicas.
# metadb
Clear all the metadb state database replicas using the following command:
k. Execute following command to verify that all mirroring configurations are cleared. These commands
should not display any database replicas.
# metastat -c
# metadb -i
There will be downtime during the procedure since server will be rebooted as part of
re-enabling disk mirroring.
Post-Upgrade Tasks
After you have upgraded Insight HA to V09.02.00 perform the following:
Password-less connection for root user needs to be established to the peer HA node after the upgrade
completes.This step can be done while HA EMS server is up and running.
You need to perform this step on both the Active and Standby systems.
# cd /export/home/ems/conf/HA
# ./configureHA -c setupPeerRootSsh
This section provides a summary of the account name and password information associated with the Insight. In
particular, the following items are included:
For the Insight-specific accounts, Release V07.03.00 introduced the option to set “strong” passwords or to keep
existing “weak” passwords. The choice between strong or weak passwords will be given during installations and
upgrades.
The strong passwords have more restrictions than the pre-V07.03.00 passwords and require that a new password
be entered during the installation or upgrade. The strong passwords do not have a default value, while the weak
passwords do have a default value.
root sonus
insight insight
oracle oracle
dbimpl dbimpl
sys change_on_install
system manager
admin admin
Insight_Admin_User sonus
root sonusfm
For complete Sonus products account and password details, refer to Sonus Products Password and Security
Management Reference.
# /export/home/ems/sonusEms stop fm
# cd /export/home/ems/conf
# ./netcool_rename_db.ksh
5. After the script executed successfully, start the netcool FM process in the system.
# /export/home/ems/sonusEms start fm
6. For an HA configuration, ensure you perform Steps "1" to "5" on each node one by one.
To change the netcool object server name to default or old name, use the same script and provide the required
choice for old and new server name as input.
The new object server name must meet the following criteria:
Limitation
Upgrade operation is not supported with the changed netcool object server name. In order to support, you
need to first rollback to default netcool object server name “SONUSDB”.
Making a node standalone from high availability configuration is not supported with the changed netcool
object server name. In order to support, you need to first rollback to default netcool object server name
“SONUSDB”.
For all Solaris accounts other than insight, change the password using the Unix “ passwd” command.
The following user password restrictions exist by default. Sonus recommends that you do not change these
restrictions.
The following section provides information regarding various accounts, password restrictions, and procedure to
change the password.
This section describes how to change the insight user password with the changeInsightPassword.sh script. if
you did not use the strong password option when running the configureJumpstart.sh or emsMigrate.sh
script. This changes the insight user password from the previous value.
Sonus recommends that you also periodically change the insight user password.
This procedure uses a script to change the password and to make the corresponding changes to the Netcool
Process control user. You do not need to re-perform Netcool configuration.
This procedure also allows you to set the password expiration behavior to non-expiring or to expiring, and to set the
expiration values.
CAUTION
You must use the following procedure to change the password for the insight user. Do not use the pass
wd command, which would result in a misconfiguration of Netcool.
Password Restrictions
The insight user password has the following restrictions (unless you use the -v option described in the
procedure):
You must use the same insight user password on all Insight systems that are part of the HA (HA) server. When you
run the changeInsightPassword.sh script on the active HA server, the script will give you the option of
changing the password on all the Insight servers in the system (you will be prompted for the password of the root
user for each server).
Procedure
To change the password and/or the password expiration behavior for the insight user, perform the following
procedure.
1. Log in as root.
2. Run the setup script to configure the insight user password/password expiration as follows:
# cd /export/home/ems/conf
# ./changeInsightPassword.sh -a "-n <min_days> -w <warn_days> -x <max_days>"
Where:
<min_days> represents the minimum number of days that must pass before the user can change the
password.
<warn_days> represents the number of days before the password expiration when the user is warned.
<max_days> represents the maximum number of days that a password is valid. If you enter -1, password
expiration is turned off, and you do not need to enter the -n or -w arguments.
The -a and the quotation marks are needed if you are entering the -n, -w, or -x arguments.
Insight is currently running. You must shut down Insight (including all of the
FM processes) before running this script. Do you want to continue [y|Y,n|N]?
(Default:Y)
Enter the new password if you are changing it, or enter the old password if you are only changing the
expiration behavior. Unless you used the -v option in Step 1, the password must meet the restrictions listed in
Password Restrictions.
6. If the system is part of a DR or HA system, a prompt appears that asks if you want to change the insight user
password on the other systems.
Enter Y.
7. When prompted, enter and re-enter the root password for each of the other Insight servers.
If you have entered a wrong password, for the remote servers, the following message appears:
This section describes how to change the Insight database user password with the changeDbPassword.sh script.
This section includes the following:
Password Restrictions
The Insight database password has the following restrictions (unless you use the -v option described in the
procedure):
When using the changeDbPassword.sh script to change the Insight database password on the active (HA)
system, the database password will also be changed on the standby HA system through the HA monitoring code.
Procedure
# cd /export/home/ems/conf
# ./changeDbPassword.sh
The following options may be used when entering the ./changeDbPassword.sh command:
-c: The new password will be requested once, and you will not be prompted to re-enter it.
-v: The password will not be checked to see if it meets the password restrictions.
Insight is currently running.You must shut down Insight (including all of the
FM processes) before running this script. Do you want to continue [y|Y,n|N]?
(Default:Y)
Enter Y.
Enter the password. Unless you used the -v option in Step 1, the password must meet the restrictions listed in
Password Restrictions.
The default Agent connection account/password combination is admin/admin. To change the password, perform
the following procedure, which uses the jash shell utility:
# /export/home/sonusComm/bin/jash
2. At the % prompt, enter the following (this assumes the current password is admin):
success
where
admin is the account name
<existing password> is the current password, such as admin
<new password> is the new password
% exit
Password Restrictions
The sys database password has the following restrictions (unless you use the -v option described in the procedure):
When using the changeSysDbPassword.sh script to change the sys database user password on the active
(HA) system, the database password will also be changed on the standby HA system through the HA monitoring
code.
Procedure
# cd /export/home/ems/conf
# ./changeSysDbPassword.sh
Enter the password. Unless you used the -v option in Step 1, the password must meet the restrictions listed
in Password Restrictions.
This section describes how to change the system database user password with the
changeSystemDbPassword.sh script.
The system database password has the following restrictions (unless you use the -v option described in the
procedure):
When using the changeSystemDbPassword.sh script to change the system database user password on the
active (HA) system, the database password will also be changed on the standby HA system HA monitoring code.
Procedure
# cd /export/home/ems/conf
# ./changeSystemDbPassword.sh
Enter the password. Unless you used the -v option in Step 1, the password must meet the restrictions listed
in Password Restrictions.
This section describes how to change the Netcool database user password for the Insight_Admin_User
with the changeNetcoolDbInsightPassword.sh script.
Password Restrictions
When using the changeNetcoolDbInsightPassword.sh script to change the password on the active (HA)
system, the password will also be changed on the standby HA system through the HA monitoring code.
Procedure
To change Netcool Database User Password for the Insight_Admin_User, perform the following:
# cd /export/home/ems/conf
# ./changeNetcoolDbInsightPassword.sh
Enter Y.
3. The following prompt appears:
Enter the password. Unless you used the -v option in Step 1, the password must meet the restrictions listed
in Password Restrictions.
This section describes how to change the Netcool database user password for the root user with the
changeNetcoolDbRootPassword.sh script.
Password Restrictions
When using the changeNetcoolDbRootPassword.sh script to change the password on the active (HA) system,
the password will also be changed on the standby HA system through the HA monitoring code.
Procedure
To change Netcool Database User Password for the root user, perform the following:
# cd /export/home/ems/conf
# ./changeNetcoolDbRootPassword.sh
Enter Y.
3. The following prompt appears:
Enter the password. The password must meet the restrictions listed in Password Restrictions.
4. When prompted, re-enter the password.
The script runs to completion.
This section describes how to change the EMS keystore password with the changeKeystorePassword.sh script.
This procedure can be used after you obtain your own SSL certificate and import it. See SSL Certificate Installation
Password Restrictions
When using the changeKeystorePassword.sh script to change the password on the active (HA) system, the
password will also be changed on standby HA system through the HA monitoring code.
Procedure
# cd /export/home/ems/conf
# ./changeKeystorePassword.sh
Enter the new EMS keystore password. The password must meet the restrictions listed in Password
Restrictions.
Changing the Password or Password Behavior of the "insight" User for the IAS System
To change the insight user password of the IAS system or to change the password expiration behavior (the IAS has
an expiring insight user password by default), use the passwd command.
The default Agent connection account/password combination is admin/admin. To change the password, perform
the following procedure, which uses the jash shell utility:
# ./jash
2. At the % prompt, enter the following (this assumes the current password is admin):
success
5. Change the Agent Password field in the Register Insight Node screen. See the “Insight Administration” of the
Insight EMS User Guide.
When upgrading to Release V09.02.00 and using the “weak” password option (see "“Strong” and “Weak”
Passwords"), use of the documented upgrade procedures will ensure that all default Solaris accounts and
passwords, customer-created Solaris accounts and passwords, and Sonus database accounts and passwords are
preserved across the upgrade.
Upgrading to Release V09.02.00 using the “strong” password option requires the user to create new account
passwords.
Prerequisites
Before migrating Sonus network elements from IPv4 to IPv6, see the Sonus Network Solution IPv4 to IPv6 Migration
Guide to understand the implementation of complete network migration of multiple Sonus products.
The following procedure describes the procedure to enable IPv6 on the EMS HA server.
addif <ipv6address>/<prefix> up
For example,
addif FD00:10:6B50:4160::33/60 up
b. Login as user insight and stop insight in Standby (first) and then, on Active by executing the
following commands:
# su - insight
$ /export/home/ems/sonusEms stop
$ exit
c. Login as user root and release the resources in Active (first) and then on Standby by executing the
following command:
# /export/home/ems/conf/HA/haResources release
5. Plumb the primary and secondary interfaces using the following command:
For more information, see table Public Network Interfaces and IP Addresses.
For example, in T5220 to plumb e1000g1, use the following command:
# cd /export/home/ems/conf/HA
# ./configureHA
Which interface will be the primary? [e1000g0 e1000g1 e1000g2 nxge0 nxge2] :
What is the test IPv4 address for the primary LAN interface?:
10.54.8.72
What is the test IPv6 address for the primary LAN interface?:
fd00:10:6b50:4190::8
What is the test IPv6 address prefix length for the primary
LAN interface? (Default:128):60
18.
19. The system displays the values you entered. The following is an example based on the values given for the
active Netra T5220 system in Public Network Setup for HA Deployment:
22. Start EMS on both the Active and Standby systems by performing the following procedure:
a. Identify the configured Active and Standby states of the servers by executing the following commands
as user root. If the output displays as ACTIVE, then that server is identified as Active server, else
Standby:
$ /export/home/ems/sonusEms start
$ /export/home/ems/sonusEms status
Expected output: Lists all processes as ‘running’ and current HA state is shown as ACTIVE.
d. On Standby, start Insight as user ‘insight’:
$ /export/home/ems/sonusEms start
$ /export/home/ems/sonusEms status
Expected output: Lists all processes as ‘running’ and current HA state is shown as STANDBY.
$ exit
23. Open EMS GUI on active system and re-register devices with the IPv6 management client IP Address. See
Re-register the Device with the IPv6 management address from the EMS Node Registration Window .
Re-register the Device with the IPv6 management address from the EMS
Node Registration Window-HA Solaris
After enabling IPv6, you need to re-register (which includes un-registration of IPv4 device, then register device with
IPv6 address where mgmt client is Ipv6) from the EMS node registration window.
The following is the procedure to re-register the device with the IPv6 management address:
1. In the EMS Node Registration window, verify if both IPv4 and IPv6 addresses are displayed.
2. Click Unregister.
3. Click the same device under Unregistered Nodes. Update the management client and device IP with IPv6
address and click the Update button.
4. Click Register.
Once the hosts connected to RAID are migrated to IPv6, you can migrate the RAID to IPv6. Follow the procedure
below to migrate the StoregTek RAID to IPv6.
2.
Press within 5 seconds: <S> for Service Interface <BREAK> for baud rate
5. When prompted, enter the password. If you do not know the default password, contact the Sonus TAC.
6. The following prompt appears:
Enter 2.
7. Once you select option 2, skip the IPv4 part as it is already configured:
Enter Y.
9. Enter N for Stateless Address Autoconfiguration:
11. Enter the IPv6 address of the server as the IPv6 Routable Address:
12. Enter the IPv6 address of the router (gateway) as the IPv6 Routable Address:
14. Enter 'y' after verifying the IPs. Following confirmation message will be displayed:
16. Register the storageTek array using IPv6 address from the host connected to RAID using the following
command:
17. Repeat Steps 1 through 15 for the other RAID disk array controller.
Enabling disk mirroring will also make it easier for you to perform a fallback to previous version from future HA
upgrades. If you experience any issues in your production network following an upgrade, you can return to the
previous version of Insight by using the Rollback using Disk Mirroring procedure.
Sonus servers support only software mirroring. This section describes software mirroring only. Insight disk
mirroring is supported only on Netra T5220 four-disk systems.
Insight supports disk mirroring on Netra T5220 servers that have four internal disks. The following mirrors are set up:
Disk 1 Disk 3
Disk 2 Disk 4
This scheme allows the applications that use the second internal disk to continue using it for its intended purpose.
Each of the two disk mirrors requires the following SVM components:
Table 81: Mirrors and Submirrors on Netra T5220-4 with Mirrored Disks 1 and 3
Master Disk Submirror Name Slave Disk Submirror Name Mirror Name
Perform the following procedure on every Insight server on which internal disks mirroring is to be enabled. Disk
mirroring for Insight is supported on Netra T5220 four-disk systems. Before performing an upgrade, ensure that disk
mirroring is enabled.
Caution
Be sure to wait until synchronization completes before performing any other tasks, such as disabling,
suspending, resuming mirroring, configuring, or booting from the alternate boot device.
1. Issue the following command to verify that the Sonus disk mirroring toolkit package is installed:
# pkginfo SONSdmems
application SONSdmems Sonus disk mirroring management tools
Sonus recommends that you first run the dmctl commands in dry-run mode (use the --dryrun option)
to detect problems that would prevent successful mirroring. If the program does not report any fatal
errors, execute the program without the --dryrun option.
Ensure that the drive definitions are of format c1t*d*. If not, edit the /opt/SONSdmems/config/p
latform_T5220-4.conf file and modify the drive definitions accordingly before configuring disk
mirroring.
For example, if the drive definitions are of format c0t*d*, edit the values of svm.master.disk an
d svm.slave.disk to c*t*d* format in the platform_T5220-4.conf file.
Enter yes.
5. The following message appears:
Enter yes.
6. The following message appears:
Enter yes.
The server is rebooted.
Server will automatically reboot after a few minutes and you will loose connectivity. Please wait for
the reboot to complete. Login to the server back again after the reboot completes, and continue with
the next step.
Enter yes.
9. Use the metastat command to check the status of mirrors.
# metastat -c
Verify that the submirrors show a resync percentage. For example, the following appears:
10. Execute the following command to enable mirroring of disk 2 and disk 4:
Enter yes.
12. The following message appears:
Enter yes.
13. The following message appears:
Enter yes.
The server is rebooted.
14. After the server comes up, execute the following command:
Enter yes.
16. Use the metastat command to check the status of mirrors.
# metastat -c
Verify that the submirrors d200 and d201 show a resync percentage. For example, the following appears:
17. Enable disk mirror error reporting (through email). See Customizing Health Monitoring-SA Solaris.
18. Enable periodic disk mirror error monitoring and reporting (using a cron job). See Monitoring Disk Mirror
Use the following command to examine the status of mirrors and submirrors:
metastat -c
Use the following command to examine the status of the state database replicas:
metadb -i
The following procedures describes how to disable disk mirroring in a four-disk system.
Caution
Disabling disk mirroring stops data synchronization across disk mirrors. For upgrading EMS, disk mirroring
must not be disabled.
# metastat -c
Either the slave or master disk can have its reading/writing of data temporarily suspended (taken offline) at any time,
but both master and slave cannot be suspended at the same time.
To temporarily suspend the reading/writing of data on a master disk, enter the following:
To temporarily suspend the reading/writing of data on a slave disk, enter the following:
Detaching disk mirroring is done to break up disk mirroring before starting an upgrade. This procedure has the
advantage that it does not involve a system reboot. Disk mirroring should have been previously setup before this
detach step can be performed.
This procedure should be done on both servers of the EMS HA pair that are getting upgraded.
1. Confirm that no mirrors are currently syncing (no sync percentages should be displayed in the output below)
by using the following command:
$ metastat -c
d200 m 219GB d20 d40
d20 s 219GB c1t1d0s0
d40 s 219GB c1t3d0s0
d106 m 2.0GB d16 d36
d16 s 2.0GB c1t0d0s6
d36 s 2.0GB c1t2d0s6
d105 m 50GB d15 d35
d15 s 50GB c1t0d0s5
d35 s 50GB c1t2d0s5
d104 m 202GB d14 d34
d14 s 202GB c1t0d0s4
d34 s 202GB c1t2d0s4
d201 m 60GB d21 d41
d21 s 60GB c1t1d0s1
d41 s 60GB c1t3d0s1
d103 m 4.0GB d13 d33
d13 s 4.0GB c1t0d0s3
d33 s 4.0GB c1t2d0s3
d100 m 5.0GB d10 d30
d10 s 5.0GB c1t0d0s0
d30 s 5.0GB c1t2d0s0
d101 m 15GB d11 d31
d11 s 15GB c1t0d0s1
d31 s 15GB c1t2d0s1
EMS application is running on disk slots 0 and 1, and is mirrored to disks in slots 2 and 3 respectively.
Disks in slots 2 and 3 still maintain the previous (pre-upgrade) EMS setup, and can be used during rollback to
restore the pre-upgrade state.
2. Detach the mirrors so that disk mirroring no longer takes place, using the 'metadetach' command.
3. After detaching the mirrors, run the 'metastat' command to see the mirror status. Output should now look like
this:
# metastat -c
d201 m 60GB d21
d21 s 60GB c1t1d0s1
d200 m 219GB d20
d20 s 219GB c1t1d0s0
d106 m 2.0GB d16
d16 s 2.0GB c1t0d0s6
d105 m 50GB d15
d15 s 50GB c1t0d0s5
d104 m 202GB d14
d14 s 202GB c1t0d0s4
d103 m 4.0GB d13
d13 s 4.0GB c1t0d0s3
d100 m 5.0GB d10
d10 s 5.0GB c1t0d0s0
d101 m 15GB d11
d11 s 15GB c1t0d0s1
d41 s 60GB c1t3d0s1
d40 s 219GB c1t3d0s0
d36 s 2.0GB c1t2d0s6
d35 s 50GB c1t2d0s5
d34 s 202GB c1t2d0s4
d33 s 4.0GB c1t2d0s3
d31 s 15GB c1t2d0s1
d30 s 5.0GB c1t2d0s0
Disks are now detached and mirroring no longer takes place between them.
Do not remove the slave disks (disks at slot 2 and 3) after detaching them from disk mirrors. Doing
so will cause the system to boot in single user/maintenance mode upon executing reboot command.
This procedure is performed to resume mirroring of a previously detached disk mirror setup. Perform this once the
upgrade has been successfully completed and new functionality is verified to be working.
Running this reattach procedure will start syncing back again without needing a system reboot.
The EMS server continues to function normally during the reattach slave disk process.
This will start sync process. Run the 'metattach' command to view the progress of the sync.
When a disk fails and is replaced with a new disk, use the following procedure to resume disk mirroring on the new
disk:
1. Locate and verify the disk failure by logging on as root and entering the following command:
# metadb
# metadb -d c1t1d0s7
# cfgadm -al
In the following example the entry in the first column (Ap_Id) of the highlighted row is the attachment point for
the failed disk.
Ap_Id Type Receptacle Occupant Condition
c0 scsi-bus connected configured unknown
c1::dsk/c1t0d0 disk connected configured unknown
c1::dsk/c1t1d0 disk connected configured unknown
c2 fc connected unconfigured unknown
c3 fc connected unconfigured unknown
usb0/1 unknown empty unconfigured ok
usb0/2 unknown empty unconfigured ok
usb0/3 unknown empty unconfigured ok
usb1/1 unknown empty unconfigured ok
usb1/2 unknown empty unconfigured ok
usb2/1 unknown empty unconfigured ok
usb2/2 usb-storage connected configured ok
usb2/3 unknown empty unconfigured ok
usb2/4 unknown empty unconfigured ok
usb2/5 unknown empty unconfigured ok
6. Execute the cfgadm -al command again to check the success of the previous operation. The output should
show the state “unconfigured” under the “Occupant” column of the row corresponding to the failed disk.
7. Pull the failed disk out and insert a new disk of the same capacity and physical attributes.
8. Configure the new disk:
9. Execute the cfgadm -al command again to check the success of the previous operation. The output
should show the state “configured” under the “Occupant” column of the row corresponding to the new disk.
10. Repartition the new disk with the partitioning information of the good drive.
11. Add the same number of state database replicas that were deleted in Step "3".
# metadb -a -c 2 c1t1d0s7
12. Identify and record the mirrors and slice information that need to be replaced.
# metastat -c
The first three lines of the metastat output show that mirror d106 and submirror d26 (slice c1t1d0s6) are in
'maint' state. Note the mirror name (d106) and the slice (c1t1d0s6).
13. Run the metareplace command for each of the mirrors and slice:
To configure a cron job to periodically check the health of software mirrors and report the status in an email:
# /opt/SONSdmems/bin/dmchk enable
2. Enter a reachable remote/local SMTP host and the recipient’s email address to be configured in the
dmchk.conf file (see "Customizing Health Monitoring").
The default cron job is invoked every 30 minutes and the email sent only when errors are encountered. This
behavior can be changed by configuring appropriate parameters in the dmchk.conf file.
Edit the /opt/SONSdmems/config/dmchk.conf file to supply the reachable remote/local SMTP host and the
recipient’s email address for the cron job that periodically checks the health of software mirrors and reports the
status in an email. You can also change optional parameters in the file.
The following table, shows the parameters that can be configured in the dmchk.conf file.
smtp.host Required None The SMTP mail server that is used to email disk
mirror status.
cron.job Optional 15,45 * * * * /opt/SONSdmems/bin/dmchk Cron entry to monitor/report disk mirror status
monitor 2>/dev/null 1>&2 every 30 minutes.
The following shows an example display for a dmchk.conf file. (To change the setting in a line, you must
uncomment the line (remove the #)).
# SMTP mail server that is used to email disk mirror status (Required)
#
# The host must be reachable.
#
# Remove the leading # and configure appropriate hostname or IP address
#
#smtp.host = plato
After enabling mirroring of the boot disk, Sonus recommends that the mirror of the boot disk be configured as an
alternate boot device in the NVRAM. Use the following procedure:
# /opt/SONSdmems/bin/dmctl altbootdev
# init 0
ok printenv boot-device
boot-device = disk net
ok printenv nvramrc
ok nvstore
ok boot
ok boot disk2
The default disk mirroring settings can be changed by editing the platform-specific configuration file, which is located
in the directory /opt/SONSdmems/config.
The platform-specific configuration file name is automatically derived by the program, if not supplied by the user.
The naming convention for the file name is as follows:
platform_ptype-ndisks.conf
The –ndisks portion of the filename is used only when platform_ptype.conf file is not found.
For example, for a four-disk T5220, if the user has not supplied the configuration file, the program first searches for
platform_T5220.conf. If the file is not found, the program then searches for platform_T5220-4.conf.
The platform specific configuration file can have multiple mirror configurations. The following table, lists the
parameters that can be configured for each mirror configuration.
svm.master.replica.slice Optional 7 The slice on which master disk state database replicas are created
svm.slave.replica.slice Optional 7 The slice on which slave disk state database replicas are created
svm.submirror.slice Optional 0,1,3,4,5,6 The slices on which submirrors are created or the slices that are mirrored
# cat /opt/SONSdmems/config/platform_T5220-4.conf
# Each mirror configuration must start with the mirror id
# Anything that follows the mirror id belongs to that mirror.
# ---------------------------------------------------------------------
# DISK 1 <-> DISK 3 MIRROR CONFIGURATION
# ---------------------------------------------------------------------
# The mirror ID (Required)
svm.mirror.id = 1
# The master disk (Required)
svm.master.disk = c1t0d0
# The slave disk or master disk mirror (Required)
svm.slave.disk = c1t2d0
# ---------------------------------------------------------------------
# DISK 2 <-> DISK 4 MIRROR CONFIGURATION
# ---------------------------------------------------------------------
# The mirror ID (Required)
svm.mirror.id = 2
# The master disk (Required)
svm.master.disk = c1t1d0
# The slave disk (Required)
svm.slave.disk = c1t3d0
To verify the version of Insight installed, enter the following command as user root:
$ pkginfo -l SONSems
Expected output:
$ cd /export/home/ems
$ ./sonusEms status
When you run ./sonusEms status on an HA system, the information displayed in Checking the HA Status is also
displayed.
Occasionally, it may become necessary to start the Insight server. To do so, use the following commands:
$ cd /export/home/ems
$ ./sonusEms start
The first time that the Insight server is started, a maximum of 30 minutes will be allowed before the startup process
is timed out. On subsequent startups, the maximum time allowed will be equal to 120 percent of the initial startup
time. For example, if the initial startup took 300 seconds, then the maximum time allowed for subsequent startups
would be 360 seconds.
You can add arguments to the sonusEms start command to control memory size allocations. For a list of the
arguments and their syntax, type:
# ./sonusEms -help
Occasionally, it may become necessary to stop the Insight server. To do so, use the following commands:
$ cd /export/home/ems
$ ./sonusEms stop
HA related messages that appear during the sonusEms stop are shown in " HA Messages During sonusEms stop"
When FM Trap Receiver or EMS is restarted, FM Trap Receiver drops traps received from FM until Netcool
Probe registers to FM. The loss of alarms can be for a period of 10 seconds when FM Trap Receiver (or
EMS) is restarted. Information about the dropped traps can be obtained from log file in the location /expor
t/home/ems/emsFM/logs/fm_receiver_trace.
In the event you need to change the IP address of your Insight server, perform the following procedure. If desired,
you can change the host name as well as the IP address.
If you want to change the host name of the Insight machine without changing the IP address, do not perform this
procedure. Instead, use "Changing the host name for Insight without Changing the IP Address".
1. Associate all managed nodes with the intended new IP address (see “Managed Device Association” in the
Administration chapter of the Insight User Guide). Setting the association now allows the server to begin
receiving and processing trap information immediately upon restart.
2. Shut down the Insight management processes.
3. Have your UNIX System Administrator change the address of the system. If you also want to change the host
name of your system, have your UNIX System Administrator change it at this time.
4. As root, change the IP address of the server, change the IP address in the database tables, and update the
Netcool license information as follows:
a. Enter the following commands:
b. Respond y.
Several messages appear, ending with:
After IP address is changed, ensure that the IP address entry exists or is same as in the /et
c/hosts
$ /export/home/ems/sonusEms start
6. For any IAS that is registered to the Insight server, you will be prompted for the root password of the IAS
server. Enter the root password of the IAS server.
The Insight IP address on the IAS is then automatically updated to the new IP address of the Insight server.
7. Start Insight.
8. Disassociate all registered nodes with the old IP address (see “Managed Device Association” in the
Insight Administration chapter of the Insight EMS User Guide).
Changing the host name for Insight without Changing the IP Address
In the event you need to change the host name of your Insight server but you are not changing the IP address,
perform the following procedure.
If you are changing both the IP address and the host name of the Insight machine, do not perform this
procedure. Instead, use "Changing the IP Address of Insight".
The EMS hostname is limited in length to 64 characters. The hostname can only contain lowercase
letters [a-z], digits [0-9], and hyphen[-]. The hostname cannot start with a digit or hyphen, and
cannot end with a hyphen.
3. As root, perform the following, making sure that you enter the current IP address of the server:
Enter the following commands:
# cd /export/home/ems/conf/
# ./changeIpAddress.sh -i <ip_address>
Respond y.
Several messages appear, ending with:
After hostname is changed, ensure that the hostname entry exists or is same as in the /etc/hosts
$ /export/home/ems/sonusEms start
Depending on the EMS Software Release (pre-9.2 EMS Solaris, EMS Solaris 9.2.0, or EMS Solaris 9.2.1 and
above) from which backup is taken, the dmp file names would differ.
The file expdp_stats_data_manual.dmp will be generated only if the PM stats export option is enabled.
When Backup is Taken from Backup Files generated are Restoring the backup files
EMS Solaris
9.2.1 Release and above backupFiles.tar Restore the backup files to 9.3.0 or 9.2.x
(including 9.3.0 Release) sustaining Release.
expdp_cfg_data_manual.dmp
High-level Steps:
expdp_stats_data_manual.dmp
1. Perform a backup of EMS 9.3.0 or 9.2.x
expdp_strct_manual.dmp sustaining release.
2. Restore the backup files to 9.3.0 or 9.2.x
sustaining release.
System Backup
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine. Use a directory name that will
clearly identify the EMS server that created the backup files. Make a note of the directory path because you will
need it later if you need to restore the system.
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, dmp files) in the backup directory.
If you need to restore your Insight system, perform the following tasks:
1. (Optional) Kickstart the EMS Solaris system with respective EMS Release from which backup was taken, if
the EMS Solaris system is not stable. For more details, about EMS Release from which you want to kickstart,
refer the above Table.
# cd /export/home/ems/conf/
# ./changeIpAddress.sh -i <ip_address>
Respond y.
Several messages appear, ending with:
Completed changing IP address to '<ip_address>'.
Please refer /export/home/ems/logs/changeIpAddress.log for details.
Please start Sonus Insight server as user 'insight'.
c. Enter the following command to start Insight as user insight:
$ /export/home/ems/sonusEms start
2. Log in as root.
3. From the backup directory you used for this EMS server in System Backup, copy the dmp files to the
/export/home/oracle/backup/dump directory. Also, copy the backupFiles.tar file to the /tmp
directory.
If the dmp files are copied to /export/home/oracle/backup/dump using an unconventional method,
such as FTP, change the owner and group of the files to Oracle and DBA.
To change the owner and group of files to Oracle and DBA, enter the following commands.
If backup is taken from pre-9.2.0 then use the following dmp file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba exp_data_manual.dmp exp_strct_manual.dmp
or
If backup is taken from 9.2.0 then use the following dmp file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba expdp_data_manual.dmp
expdp_strct_manual.dmp
or
If backup is taken from 9.2.1 or above Release (including 9.3.0 Release) then use the following dmp
file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp expdp_strct_manual.dmp
CAUTION
You must copy files from the backup directory that you used for this EMS server. If you use a
backup directory that contains files from another EMS server, Insight will not behave properly.
5. The script informs you that you must have the three files mentioned in Step 3 and asks if you want to
continue. Answer y and press Enter.
6. The script asks for the full path to the backup tar file. Answer /tmp and press Enter.
7. The following message appears:
Do you want to upgrade the system passwords to use strong passwords (production setup) (y|Y) or continue
to use the old weak hardcoded passwords (lab setup) (n|N) (default:Y)?
a. If you want to use strong passwords (recommended for production setup), enter Y and skip to Step 12.
You will enter new passwords.
b. If you do not want to use strong passwords, enter N and continue to Step 8. The old passwords will be
used.
8. If you entered N in Step 7, a prompt asks you to confirm that you want to use weak passwords. Enter Y.
9. When prompted, enter the insight user password.
10. When prompted, re-enter the password you entered in Step 9.
11. When a prompt asks whether you have changed the database sys/system default passwords, perform one of
the following:
If you have not changed the default passwords, enter N and continue to Step 24.
If you have changed the default passwords, enter Y. When prompted, enter the current passwords,
and then continue to Step 24.
When entering strong passwords (Steps 12 through 23), the passwords must meet the
restrictions listed in Changing Passwords.
12. If you entered Y in Step 7, a prompt asks for the Insight database (dbimpl) password. Enter the password.
(The only special characters allowed are _, $, and #.)
13. When prompted, re-enter the Insight database password.
14. When prompted, enter the Insight database sys password. (The only special characters allowed are _, $, and
#.)
15. When prompted, re-enter the Insight database sys password.
16. When prompted, enter the Insight database system password. (The only special characters allowed are _, $,
and #.)
17. When prompted, re-enter the Insight database system password.
18. When prompted, enter the insight user password.
19. When prompted, re-enter the insight user password.
20. When prompted, enter the Netcool root database user password.
21. When prompted, re-enter the Netcool root database user password.
22. When prompted, enter the Netcool Insight_Admin_User database user password.
23. When prompted, re-enter the Netcool Insight_Admin_User database user password.
24. The scripts asks if you want to import the User Activity Logs, PM Stats, and TrunkGroup tables. Answer y if
you want to import these tables; answer n if you do not want to save those tables.
25. The following message appears:
26. For upgrades from Insight 07.03.06 and above, this message does not apply.
Enter N.
27. The following message appears:
Passwords
The emsMigrate.sh script used in the system restore procedure gives you the opportunity to use strong
passwords, which must then be entered and must meet the following restrictions:
The Insight Database should automatically start and stop at system startup and shutdown time respectively.
If you wish to manually start the Insight database use the following instructions:
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If you wish to manually stop the Insight database use the following instructions:
1. Log in as the user insight and shut down the Sonus Insight server using the following command:
$ /export/home/ems/sonusEms stop
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> shutdown immediate
SQL> exit
If the Insight database is running, a list of active oracle processes will be displayed.
If the Insight database is not running, no processes will be displayed.
The client listener should automatically startup and shutdown with the Insight database. If you need to manually start
or stop the listener, use the following instructions.
To manually start the listener, login as oracle and use the following command:
To manually stop the listener, login as oracle and use the following command:
$ lsnrctl stop
$ lsnrctl status
If the database listener is running, the status of the listener and the status of database instances will be
displayed.
If the database listener is not running, “no listener” messages will be displayed.
Distributed and installed with your Insight database instance, Sonus supplies a series of value added scripts used to
manually backup and restore the Sonus Insight database instance. The scripts make use of database’s export and
import utilities enabling you to manually backup and restore your Insight database. Sonus provides these scripts as
a means to enable the novice user to backup and restore their database. A more sophisticated user may want to
develop a more formal backup and restore strategy.
This section describes the backup and restore of the database only. For a complete system backup and a complete
system restore, see Insight Server System Backup and Restore.
Sonus recommends you to backup the Insight database nightly as part of your database backup and restore
strategy.
The required backup scripts and directory hierarchy are installed during an Insight database instance installation or
upgrade. The directories bin, dump and log are created under the Oracle user’s home directory. The location of the
backup and restore scripts is the bin directory. The dump directory holds exported database images and the log
directory stores generated log files.
In the event the required scripts and directory hierarchy do not install, you may manually install the scripts by first
performing a cd to Oracle’s home directory and then untarring the insightBackupFiles.tar file.
You may perform the backup procedure with Sonus Insight running and the database instance in use.
1. Login as user oracle to the system that contains the database instance you wish to backup.
2. Change to the backup and restore bin directory which is located under the oracle user’s home directory
where /export/home/oracle is Oracle’s home directory in this example.
$ cd /export/home/oracle/backup/bin
3.
CAUTION
You must stop Sonus Insight and not use the database for the first part of the restore procedure. The
restore procedure performs a destructive restore. The process wipes clean the database instance before
restoring the backed up data to the database instance.
1. Shut down any running applications using the database instance you wish to restore. For information on how
to shut down Sonus Insight refer to the procedure, Stopping the Insight Server.
2. Login as user oracle to the system that contains the database instance you wish to restore.
3. Change to the backup and restore bin directory which is located under Oracle’s home directory where
/export/home/oracle is Oracle’s home directory in this example.
$ cd /export/home/oracle/backup/bin
4. Execute the following script. The import script will drop all of your database instance’s tables and import
configuration tables from the archive files in the data directory.
$ cfg_import_manual.sh
Either enter the password of the database, or press enter to accept dbimpl if that is the password of the
database.
6. You will see a series of status information printed to the screen followed by a statement similar to the
following:
$ stats_import_manual.sh
9. You will see a series of status information printed to the screen followed by a statement similar to the
following:
Refer to the log files found in the log directory to check for any errors.
The Insight Database should automatically start and stop at system startup and shutdown time respectively.
If you wish to manually start the Insight database use the following instructions:
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If you wish to manually stop the Insight database use the following instructions:
1. Log in as the user insight and shut down the Sonus Insight server using the following command:
$ /export/home/ems/sonusEms stop
Netcool Configuration
The annotation /export/home/ems appears throughout the instructions that follow and refers to the
current Sonus Insight installation base directory. The default is /export/home/ems. This is the only
directory that is supported.
# cd /export/home/ems/conf/
# ./netcoolsetup.ksh
This script modifies configuration files, changes process control user settings, and modifies FM logging
parameters.
3. The script prompts you for how much disk space to allocate for FM log files. Enter a value or accept the
default.
4. Start the Netcool processes. See Starting, Stopping, or Verifying the Netcool Process.
Under normal circumstances the Netcool processes start and stop when you start or stop the Insight server, see
Insight Server Administration. If you want to start, stop, or check the status of the Netcool processes separately from
the Insight server, use the following commands.
$ cd /export/home/ems
$ ./sonusEms start fm
$ ./sonusEms status fm
Several Netcool components have a delayed startup due to their dependence on the Netcool
database. These processes show “PENDING” status. If processes remain in a “PENDING” state
longer than two minutes after startup, there is a configuration problem.
$ cd /export/home/ems
$ ./sonusEms stop fm
HA Manual Failover
Checking the HA Status
HA Messages During sonusEms start
Active System Success
Standby System Success
Active or Standby System Issues
HA Messages During sonusEms stop
HA Logs
Location of Logs
HA Audit Log
Agent Trace Log
RAID Lock Mechanism
Rebooting an HA Server
Shutting down an HA Server
Removing a Node from Cluster
Converting an HA System to Standalone
Overview
Prerequisite
Creating Database Dump File
Creating Netcool Dump Files
Running configure HA to convert an HA system to Standalone
It may become necessary in a HA system, either as a planned event or due to an incomplete automatic failover, to
initiate a manual failover from the active to the standby system. Perform the following to initiate a failover:
$ cd /export/home/ems
$ ./sonusEms failOver
The success or failure of the failover is displayed. The possible messages are:
When you run sonusEms status, you will also see the information described in Step 3.
# cd /export/home/ems/conf/HA
# ./hamgmt getState
The actual state and the configured state of the server are displayed. The possible states are:
UNKNOWN
ACTIVE
During a successful sonusEms start on the active system, the following messages are displayed:
Trying to connect to HA
This system is configured for High Availability support.
Commencing HA startup now.
Fail over control has been initialized.
This system is the Active HA system. The Insight processes will now be started.
During a successful sonusEms start on the standby system, the following messages are displayed:
Trying to connect to HA
This system is configured for High Availability support.
Commencing HA startup now.
Fail over control has been initialized.
This system is the Standby HA system. Only some of the Insight processes will be
started.
During an unsuccessful sonusEms start on the active or standby system, the following HA issues can be displayed:
During a sonusEms stop on the active or standby system, the following messages are displayed:
HA Logs
Location of Logs
The ha_audit_log and the agent_trace_log files are located under the directory <agent_home>/logs.
The <agent_home> directory is the location in which the Sonus agent is installed. You can find this name by
typing:
HA Audit Log
The ha_audit_log contains logging statements for the time of HA transitions, the previous HA state of the
system, and the current HA state of the system.
The agent_trace_log contains logging statements for FailOverControl, heartbeat, system check, and
auto-starting related issues.
To prevent an Oracle data corruption, a new functionality RAID Lock Mechanism is added. Any server that is active,
locks the RAID with its signature and unlocks it during switchover. The server cannot mount the RAID, if it is locked
by the peer.
If the RAID is locked, contact Sonus support to manually unlock the RAID. Because of the risk of dual
mounting the RAID, removing the RAID lock must be done by Sonus support ONLY.
Rebooting an HA Server
# reboot
The failover successfully happens after the rebooted active server comes up. The RAID lock is released after the
server comes up.
If the active server is shutdown, it will not trigger a switchover, because the active server still retains the
lock. To shutdown the active server, first the switchover has to be triggered and then the Node has to be
shutdown.
/opt/sonus/ems/conf/HA/RAC/hamgmt shutdownNode
Overview
This section describes how to convert either the active or standby system to a standalone system by running
configureHA and selecting option 8.
This process points the database instance to the local database files and sets the IP address of the system to the
previously configured reachability address for the system.
Prerequisite
Before performing the procedure Running configure HA to convert an HA system to Standalone, place database
dump files on the system by performing the following procedure:
1. As user oracle on system A (the active system), export the existing database by entering the following
commands on system A:
$ cd <ORACLE_BASE>/backup/bin
$ ./export.sh
The script generates two exported files, exp_data.dmp and exp_strct.dmp and puts them in
<ORACLE_BASE>/backup/dump. Sonus recommends that you copy these files to an external location as an
additional safety precaution.
2. If you are converting the standby system (system B) to standalone, then as user oracle, move the two
exported files generated in Step 1 to system B. Place them in:<ORACLE_BASE>/backup/dump
mkdir -p /export/home/netcool/omnibus/db.bak
/export/home/ems/conf/netcool/netcooladmin/backupDB.sh -d
/export/home/netcool/omnibus/db.bak
The path does not contain a line break and there should be one space after -d
1. Run haMigrateFiles.sh script on Active system to move the reports and PM files from RAID.
$ cd /export/home/ems
./sonusEms stop
b. Login as root in the Active system and enter the following commands to start the
haMigrateFiles.sh script.
# cd /export/home/ems/conf/HA
# ./haMigrateFiles.sh
$ cd /export/home/ems
./sonusEms stop
b. Release resources on Active system, login as root in Active system and release resources.
# cd /export/home/ems/conf/HA
# ./haResources release
# cd /export/home/ems/conf/HA
# ./haResources takeover
d. Login as root in the Standby system and enter the following commands to start the haMigrateFiles.sh
script.
# cd /export/home/ems/conf/HA
# ./haMigrateFiles.sh
e. Release resources on Standby system, login as root in Standby system and release resources.
# cd /export/home/ems/conf/HA
# ./haResources release
3. Takeover resources on Active system, login as root in Active system and takeover resources:
# cd /export/home/ems/conf/HA
# ./haResources takeover
4. As root on the system that you are converting to standalone, enter the following command to start the
configureHA script:
# cd /export/home/ems/conf/HA
# ./configureHA
This option will convert your system to standalone mode. Do you want to
proceed? (default: n) [y,n]
Importing the database does not import historical performance management data
and user activity logs because this may take several hours to complete.
Enter yes if you wish to do the stats import, or no to skip importing the
stats.? (default: no) [y,n]
If you want to restore historical performance management data and user activity logs (this can take several
hours), type Y and press enter. Otherwise, type n and press Enter.
9. The system displays one of the following, depending on your response in Step 8:
Do you want to notify all registered IAS systems of this new IP address?
(default: no) [y,n]
To notify all the IASs that were registered to the HA system of the new standalone system’s IP address, type
y and press Enter. Otherwise, type n and press Enter.
11. The system displays one of the following, depending on your response in Step 10:
You selected to notify the registered IAS systems. Is that correct? (default:
no) [y,n]
You selected to not notify the registered IAS systems. Is that correct?
(default: no) [y,n]
14. Migrate fault data from the active system to the standby system as follows:
a. Open a second window on the standby system and as user insight, remove the symbolic link and
create the local directory:
/bin/rm /export/home/netcool/omnibus/db
mkdir -p /export/home/netcool/omnibus/db/SONUSDB
b. Copy the files created on, see Creating Netcool Dump Files, to Standby.
For example:
scp /export/home/netcool/omnibus/db.bak/*.tab
insight@<systemB>:/export/home/netcool/omnibus/db/SONUSDB
where <systemB> is the local reachability IP address for the standby system.
(the above example does not contain a line break, and there should be only one
space after *.tab)
15. If you entered import in Step 12, the system displays the following:
To import a saved Netcool database to the local system, you need to have
table_store.tab and master_store.tab files.
Do you have access to table_store.tab and master_store.tab files? (default:
no) [y,n] y
Type q and press Enter to quit and complete the running of the configureHA script.
$ /export/home/ems/sonusEms start
Ignore the following step if the procedure is performed as part of Disaster Recovery Upgrade.
For instructions on how to reset the root password, see All Solaris Accounts Except for User "insight".
The default length of time before a password expires is 90 days. The default password restrictions are given in the
next section.
To change the password restrictions or the length of time before passwords expire, as a user with root privileges,
edit the /etc/default/passwd file. You can either comment out lines that restrict values, or change the restricted
values.
For a description of the /etc/default/passwd file contents, see the Sun Microsystems Solaris 10 Reference
Manual Collection (http://docs.sun.com/app/docs/doc/
816-5165/6mbb0m9nr?a=view#FILES).
By default, an account will be disabled if the user has not logged in within 90 days.
To change the default, edit the /usr/sadm/defadduser file to change the value of
definact=90
to the new value (in days) you desire. If you remove 90 and do not replace it with a new value, then the account
lockout feature will be disabled.
By default, a session that has been idle for 30 minutes will be closed.
To change the default, edit the /etc/profile file to change the value of
TMOUT=1800
to the new value (in seconds) you desire.
To disable the idle session timeout feature, remove the following lines from the /etc/profile file:
TMOUT=1800
export TMOUT
# cp /export/home/ems/conf/emsUnInstall.sh /tmp
# cd /tmp
# ./emsUnInstall.sh
1.
# /export/home/ems/sonusEms stop
3. Stop EMS as user insight on active server by running the following command:
# /export/home/ems/sonusEms stop
Ensure that all services are stopped, before executing the following command.
# cd /export/home/ems/conf/
# ./netcool_rename_db.ksh
Enter the old DB name which is found in step 1 and press ENTER.
6. System displays the following:
Ensure that all services are stopped, before executing the following command.
# cd /export/home/ems/conf/
# ./netcool_rename_db.ksh
Enter the old DB name which is found in step 1 and press ENTER.
9. System displays the following:
# /export/home/ems/sonusEms start
11. Start EMS as user insight on Secondary Server by running the following command:
# /export/home/ems/sonusEms start
Limitation
Following are the limitations when changing Netcool Object Server Name:
Avoid using NCO_PA, NCO_GATE and NCO_PROXY as the new Netcool Object Server Name. These are used
only for Internal purpose.
Upgrade operation is not supported with the changed netcool object server name. In order to do so, you need
to first rollback to default netcool object server name “SONUSDB”.
This section describes the procedure for upgrading StorageTek 2540 Array firmware upgrade using CAM Host
Management Software GUI. Insight V09.02.00 Release supports CAM Software version 6.7.0.12 and it suggests the
baseline firmware version for StorageTek 2540 Array is 07.35.55.11.
Insight V09.02.00 upgrade procedure is required to upgrade StorageTek Array firmware to the baseline firmware
version.
In order to perform the upgrade effortlessly it is recommended to use the following supported browsers for
StorageTek Firmware upgrade with CAM 6.7 host management software.
Firefox 3.0
Microsoft Internet Explorer 6.0
Solaris OS 10 generally restricts port 6789 to listen to localhost only. This setting should be changed to enable
remote access to the Oracle Java Web Console and the Sun Storage Common Array Manager.
Perform the following steps in the Host Machine (controlling/using StorageTek Array) to enable console server to
1. Become superuser or assume an equivalent role on the system where the console is running.
2. Set a property to allow the console server to respond to network requests, refresh the service, and restart the
console server.
3. Execute the following commands:
Perform the following steps to acquire the StorageTek Array and Host Machine information.
1. The IP address of data Host machine (where the CAM software is installed and which can access the array
over the network/Ethernet). Also, note the IP address of StorageTek array controllers.
2. Login to the data host machine with root privilege and ensure that CAM CLI version is 6.7.0.12. Execute
below command.
# /opt/SUNWstkcam/bin/sscs --version
3. Log in to the /export/home/packages directory as a root user using the following command:
cd /export/home/packages
unzip 145965-03.zip
The 145965-03.zip file is also available from the Sonus Salesforce Customer Portal.
cd 145965-03
5. Click the button to start the registration for the array. The following screen is displayed.
8. Click the button. The following screen shows the progress of discovery process.
9. When progress is complete, click the button. The following screen is displayed.
13. Click the Storage System from the navigation panel on the left hand side of the screen.
14. Select the array using the checkbox and click the button. The following screen
is displayed.
18. Enter the valid password if the screen prompts and then click the button.
19. When the upgrade is complete, review the results and click the button to return to the main menu.
20. The Main Menu should contain the firmware version 07.35.55.11 for StorageTek Array.
This section describes how to migrate an existing Insight HA system from Netra 240 or Netra 440 systems to Netra
T5220 systems.
For details related to existing licenses post migration, please refer to the “License Manager” chapter in the
Insight User Guide.
Restrictions
Hardware Setup
Task Sequence for Migrating HA to Netra T5220s
Exporting Data from the HA System
Setup and Configure Netra T5220 platforms with RAID Disk Arrays-HA Setup
Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array-HA Setup
Private Network Setup for HA Deployment
Public Network Setup for HA Deployment
Importing Data into the Netra T5220s
The configureHA Script-HA Setup
Checking Interface Configuration and Routing Table for Netra T5220-HA Setup
Upgrading from V09.02.00 to V09.03.00 Software Release
Restrictions
The following restrictions apply when configuring Insight HA:
Migration from 240/440 to 5220 is not supported for any releases after EMS V09.02.00
The active and standby systems must be on the same type of server (both servers must be a Netra T5220).
Do not configure interfaces that are outside the scope of those defined in the HA procedures. An Insight
system must have the ability to control the source addresses of packets sent to management clients.
Systems such as the GSX inspect the source address of incoming packets to determine the legitimacy of a
request.
The active and standby systems must use the same insight user password.
Hardware Setup
Setting up an HA configuration on two Netra T5220s involves the following hardware:
Quad GigENET PCI-E card installed on each Netra T5220.
2-Port Fiber Channel PCI-E card installed on each Netra T5220
IBM DS3524 Storage System with four fiber-optic cables.
If you are using Netra 240/440 systems and want to migrate to Netra T5220 then you must migrate using
EMS V09.02.00 release. Migration from 240/440 to 5220 is not supported for any releases after EMS
V09.02.00. Hence, after you have migrated data to V09.02.00 Release with T5220 you can upgrade from
V09.02.00 to V09.03.00 or V09.02.01 and higher sustaining releases.
1. Export the data from HA server (perform on the Netra 240/440 servers). For details, see Exporting Data from
the HA System.
2. Kickstart EMS HA on Solaris Netra T5220 system with EMS Release V09.02.00.
Perform the step 3 to step 9 on EMS HA Netra 5220 to install V09.02.00, configure HA, restore
data using EMS V09.02.00 Software Release. After data is restored on EMS V09.02.00, you can
upgrade from V09.02.00 to V09.03.00 Release.
Table 84: Migration Files when Exporting from EMS Solaris 240 or 440
When Migrating from EMS Solaris 240 or 440 Backup Files generated are
exp_data_manual.dmp
exp_strct_manual.dmp
1. Log on to the Netra 240/440 active system (system A) as a user with root privileges.
2. Run the manualBackup.sh script on system A:
# cd /export/home/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine and that is accessible from
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, exp_data_manual.dmp, and
exp_strct_manual.dmp) in the backup directory you identified in Step 2.
4. Perform a failover from the Netra 240/440 active system (system A) to the Netra 240/440 standby system
(system B) as follows:
a. Log on to system A as a user with root privileges.
b. Enter the following on system A:
# cd /export/home/ems/conf/HA
# ./hamgmt failOver
# cd /export/home/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine and that is accessible from
the Netra T5220 that will be the new standby HA system. Make a note of the directory path because you will
need it later when migrating data to the Netra T5220 standby HA system.
6. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, exp_data_manual.dmp, and
exp_strct_manual.dmp) in the backup directory you identified in Step 5.
Setting Up and Configuring Netra T5220 Systems with IBM DS3524 Storage System-HA
Setup
This section describes the setup and hardware configuration for Netra T5220 platforms and IBM DS3524 Storage
system.
The following are the high level/broader steps to setup and configure Netra T5220 Systems with IBM DS3524
Storage System:
This section describes the procedure for making the physical connections between the IBM DS3524 and the Netra
T5220 systems.
1. Connect one fiber cable to a fiber cable port on Controller A of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
2. Connect a second fiber cable to the other fiber cable port on Controller A of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
3. Connect a third fiber cable to a fiber cable port on Controller B of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
4. Connect a fourth fiber cable to the other fiber cable port on Controller B of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
Storage Manager is used to configure, manage, and troubleshoot storage subsystems. It is used primarily to
configure RAID arrays and logical drives, assign logical drives to hosts, replace and rebuild failed disk drives,
expand the size of the arrays and logical drives, and convert from one RAID level to another. Storage Manager
enables troubleshooting and management tasks, such as checking the status of the storage subsystem
components, updating the firmware of the RAID controllers, and managing the storage subsystem.The latest IBM
DS3524 Storage Manager software version is 10.83.x5.23.
The following procedure installs the IBM DS Storage Manager software on a Netra T5220 server. This procedure
should be performed on each of the two Insight servers.
# cd /export/home/packages
# gunzip SM10.83_Solaris_SMIA-10.83.x5.23.tgz
# cd Solaris10p83/Solaris
# ls SMIA-SOL-10.83.x5.23.bin
sh SMIA-SOL-10.83.x5.23.bin -i silent
Preparing to install...
SMIA-SOL-10.83.05.23.bin: !: not found
Extracting the JRE from the installer archive...
Unpacking the JRE...
Extracting the installation resources from the installer
archive...
Configuring the installer for this system's environment...
Launching installer...
Preparing SILENT Mode Installation...
..
.....
......
< text deleted for brevity >
....
.....
Installation Complete.
/opt/IBM_DS/IBM_System_Storage_DS_Storage_Manager_10_InstallLog.log
/opt/IBM_DS/IBM\ System\ Storage\ DS\ Storage\ Manager\ 10_InstallErrorLog.log
The IBM DS3524 storage subsystem has two controllers, that are hot-swappable and redundant. The controllers
Two SAS host ports labeled 1 and 2. Each of them is capable of operating at 8Gbps, 4Gbps, and 2Gbps
Four fiber channel host ports labeled FC3,FC4,FC5,FC6. Each of them is capable of operating at 8Gbps,
4Gbps, and 2Gbps
Two Ethernet management ports labeled 1 and 2 for Out-Of-Band management
The port on the extreme right is a x4 multilane mini-SAS port for connecting to EXP3524 drive expansion
enclosures
The following procedure assigns an IP address to a DS3524 storage subsystem controller. This procedure should
be performed twice, once for Controller A and once for Controller B.
1. Connect the T5220 server to a simple Hub/Switch after installing DS Storage Manager on both the T5220
servers.
2. Connect Ethernet port 2 on each controller to the same Hub/Switch which is connected to your T5220
servers.
3. Start the X-server (such as Exceed) on the system where the GUI is to be launched.
4. Set the DISPLAY variable's IP address to the IP address of the machine where the GUI should be launched
using the following commands:
DISPLAY=<IP Address>:0.0
export DISPLAY
echo $DISPLAY
Where <IP Address> is the Ip of the machine where the GUI need to be launched.
5. Login as root to the T5220 server which is connected to the same Hub/Switch and go to the
/opt/IBM_DS/client directory:
# cd /opt/IBM_DS/client
# ./SMclient
7. Click on the Add Storage Subsystem link from the Setup tab in the DS Storage Manager Enterprise
Management window.
The Select Addition Method-Manual screen opens.
8. In the Select Addition Method-Manual screen, select the Automatic discovery button and click OK.
9. Click OK to begin an initial automatic discovery of hosts on storage subsystems.
After the initial automatic discovery is complete, the Devices tab of the Enterprise Management Window
displays all hosts and storage subsystems attached to the local subnetwork.
The Enterprise Management Window can take up to a minute to refresh after an initial automatic
discovery.
10. In the Subsystem Management window, right-click the discovered storage subsystem to see the context
menu with the tasks.
Select the Manage Storage Subsystem task.
11. When you choose to manage a specific storage subsystem, the IBM System Storage DS (Subsystem
Management) window opens, along with the Initial Setup Task on background and a small window prompting
for the password.
Enter the password for Subsystem.
12. In the IBM System Storage DS (Subsystem Management) window, click the Configure Ethernet Management
Ports link in the Optional Task list.
The Change Network Configuration screen opens.
The following are the default port IP addresses in each controller:
192.168.128.101 Port 1
192.168.129.101 Port 2
13. In the Change Network Configuration screen, change the default Port IP addresses to your local IP
addresses.
14. Close the Storage Manager client.
IBM DS3524 RAID Disk Array Configuration on Insight EMS Servers-HA Setup
The following procedure configures an IBM DS3524 RAID disk array. This procedure should be performed on one of
the Insight servers and it takes approximately 30 minutes.
1. Log on to one of the Insight servers as root.
2. Enter the following:
# cd /export/home/ems/conf/RAID
3. If an array or disk have been used in another application, the install may require reset to remove any previous
configuration.
To discover the array, enter the following command:
For example,
a. Enter SMcli -i -d if you are discovering the Storage Subsystem for the first time.
For example, the system displays the following:
4. Enter the following command to ensure the RAID name and IP addresses of the controllers are discovered:
# SMcli -i -d
For example, for RAID: EMSIBMRAID
# SMcli -i -d
EMSIBMRAID 10.54.58.109 10.54.58.110
SMcli completed successfully.
# ./SONSraidInstall.sh
6. The script detects the RAID the EMS is connected to and prompts for the number of physical disks.
The recommended option is 2. (300 GB). Press Enter after providing the choice.
9. Enter the RAID password that you had entered on step 11 of the IBM DS3524 Storage Subsystem Controller
IP Address Configuration section when the following is prompted and press Enter.
10. Enter the IP address to configure the array when prompted and press Enter:
Enter the Device Name that is to be used to identify the array (default:
SONSemsarray )
For example, EMSIBMRAID.
The output is displayed as:
EMSIBMRAID
Array Name is EMSIBMRAID
- Getting registered array list
Unregistering array EMSIBMRAID
SMcli completed successfully
....
< text deleted for brevity >
...
...
Logical drive initialization is under progress. Please re run the script after
some time
#
# reboot -- -r
Setting Up and Configuring Netra T5220 Systems with StorageTek 2540 Disk Array-HA
Setup
This section describes the setup and hardware configuration for Netra T5220 platforms and StorageTek 2540 Disk
Array.
It contains the following topics:
The following procedure assigns an IP address to a RAID disk array controller. This procedure should be performed
twice — once for Controller A and once for Controller B.
1. Power-up the RAID disk array.
2. Use the mini-DIN cable to connect a terminal server to the serial port on one of the RAID disk array
controllers.
3. Send a BREAK signal by pressing Alt-B.
4. When prompted, press S.
5. When prompted, enter the password. If you do not know the default password, contact the Sonus TAC.
6. The following prompt appears:
Enter 2.
7. The following prompt appears:
Enter Y.
8. The following prompt appears:
Enter N.
9. A message similar to the following appears:
Press '.' to clear the field; Press '-' to return to the previous field;
Press <ENTER> and then ^D to quit (Keep Changes)
Current Configuration New Configuration
IP Address 10.6.9.24
Enter the appropriate IP address value in the New Configuration column. This value is for the controller to
which you are attached. The IP address should be on the same subnet as the “well-known” address that will
be assigned to the multipath group for the active and standby Netra T5220 EMSs.
10. A message similar to the following appears:
Enter the appropriate subnet mask value in the New Configuration column. This value is for the controller to
which you are attached.
11. A message similar to the following appears:
Enter the appropriate gateway IP address value in the New Configuration column. This value is for the
controller to which you are attached.
12. A message similar to the following appears, which displays the values you entered in Steps 9, 10 and 11 .
This section describes the procedure for making the physical connections between the RAID disk array and the
The following procedure installs the StorageTek Common Array Manager (CAM) software on a Netra T5220 server.
Before you start the procedure, ensure that you copy the StorageTek2500_CAM.tar.gz file from Salesforce to the
EMS system. This procedure should be performed on each of the two Insight servers.
The CAM software is a command-line interface (CLI) for configuring and managing the RAID disk arrays.
1.
# cd /export/home/packages
# cd storageTek2500_CAM
# ./SONScamInstall.sh
After about 15 minutes, a message appears that states a log file is being written.
7. Repeat Steps 1 to 6 for the other Insight server.
For more details on Solaris Patch, see Upgrading Insight High Availability.
StorageTek 2540 RAID Disk Array Configuration on Insight EMS Servers-HA Setup
The following procedure configures a StorageTek RAID disk array. This procedure should be run for each of the
RAID disk array controllers (A and B). This procedure should be run on one Insight server for one of the RAID disk
array controllers and run on the other Insight server for the other RAID disk array controller.
# cd /export/home/ems/conf/RAID
3. If an array or disk have been used in another application, the install may require reset to remove any previous
configuration. To reset the array, use the following command:
# ./SONSraidInstall.sh
Enter a value from 1 and 2 which correspond to 146 GB and 300 GB.
7. The script prompts for the volume size of the disk.
Enter a value from 1 and 2 which correspond to 136 GB and 270 GB.
The following prompt appears:
8. Enter the IP address for the controller that you connected to this Insight server.
The following prompt appears:
Enter the Device Name that is to be used to identify the array, such as
SONSemsarray.
9. Enter the device name for the RAID disk array. (If this is the second time you are performing this procedure,
enter the same name that you entered the first time.)
When the configuration is complete, a message similar to the following appears:
10. Repeat Steps 1 through 9 for the other Insight server and RAID disk array controller.
Netra T5220 Disk Labeling and File System Creation for the RAID Disk
Array-HA Setup
This section describes the steps for configuring the RAID disk on each Netra T5220 system. Execute the procedures
on each Netra system (the active and standby).
In the example in the steps, c2t2d0s6 will be used for the disk and disk slice on one of the systems. The other
system will use c2t4d0s6.
Active System
This section describes the steps for configuring the RAID disk on the active Netra T5220 system.
1. Log on as root.
2. Display all the drives seen by the operating system by entering:
# format
Example: The following is an example of command output with StorageTek RAID. In following example, 0 to 3
are drives, 4 and 6 are RAID drives, and 5 and 6 are the controllers.
Example: The following is an example of command output with IBM DS 3524 RAID. In the following example,
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0/fp@0,0/
ssd@w203c0080e52dfcde,1f
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0,1/fp@0,0/
ssd@w203d0080e52dfcde,1f
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
Enter the number that corresponds to the RAID disk number and not the controller. For StorageTek
RAID, as given in the above example, enter the disk number corresponding to the disk label
SUN-LCSM100_F-0735 and for IBM RAID, enter the disk number corresponding to the disk label
IBM-1814 as given in the above example.
4. If you are using StorageTek RAID, a message similar to the following appears:
Enter yes.
5. At the <format> utility prompt, enter verify to ensure that the drive has been labeled and also to display the
disk slices (partition table).
6. At the <format> utility prompt, enter quit to exit the format utility prompt.
7. Create a new UNIX File System (UFS) as follows:
# newfs /dev/rdsk/<partition>
Identify the largest partition that is not labeled backup. In this example, partition6 is the largest partition not
labeled backup. Record the partition number displayed on your system. The disk slice is s6. For the example
shown in Step 4, you would enter:
# newfs /dev/rdsk/c2t2d0s6
# mkdir /export/raid
Where <partition> is the designator for your disk and disk slice. The disk was displayed in Step 4. The
disk slice is s6. For the example shown in Step 4, you would enter:
c. Record the mount point and device name in System Information Worksheet; you will need it when
running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t2d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
total 16
drwx------ 2 root root 8192 Nov 21 11:59
lost+found
# df -h|grep raid
# umount /export/raid
# df -h|grep raid
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
Standby System
This section describes the steps for configuring the RAID disk on the standby Netra system. Because the active
system has already been configured, the steps for labeling and creating a UFS are not required for the standby
system.
Example: The following is an example of command output with IBM DS 3524 RAID. In following example, 0 to
3 are drives, 4 and 5 are controllers, and 6 is RAID drive with multipathing enabled.
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
Enter the number that corresponds to the RAID disk number and not the controller. For StorageTek
RAID, as given in the above example, enter the disk number corresponding to the disk label
SUN-LCSM100_F-0735 and for IBM RAID, enter the disk number corresponding to the disk label
IBM-1814 as given in the above example.
4. At the format> utility prompt, enter verify to ensure that the drive has been labeled and also to display the
disk slices (partition table).
5. At the format> utility prompt, enter quit to exit the format utility prompt.
6. Mount the disk for testing and verification:
a. Create a mount point (directory) using the following command. The recommended name is:
/export/raid:
Identify the largest partition that is not labeled backup. In this example, partition6 is the largest partition
not labeled backup. Record the partition number displayed on your system. The disk slice is s6. If the
value shown in Step 3 was c2t4d0, you would enter:
c. Record the mount point and device name in Table System Information Worksheet; you will need it
when running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t4d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
total 16
drwx------ 2 root root 8192 Nov 21 11:59 lost+found
# df -h|grep raid
# umount /export/raid
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
The primary use for the private network links is the exchange of heartbeat messages between the active and
standby systems. The heartbeat messages allow each system to detect the availability of the other system. The
minimum number of private network connections is one; however, the more connections that you provide, the more
protection you have against port and card failures.
For HA to run properly, you must have this private network configured and running properly. If the heartbeat
messages are sent over the public network rather than the private network, under certain conditions the standby
system may attempt a takeover before the active system detects the failure (or while trying to recover from the
failure).
Sonus Recommendations
Sonus recommends at least two private network links between the Active and Standby Netra T5220 systems (you
can establish up to four private network links). At least one of these should be a dedicated hardwired (Ethernet
crossover cable) connection between the Active and Standby systems. You can use any combination of dedicated
hardwired links or non-dedicated links through a hub/switch for the redundant network link(s).
If the redundant network is accomplished using a hub/router (rather than a crossover cable), make sure that the
hub/router's address can be pinged and its interfaces have transmission mode configured to auto-negotiate. These
settings are required to ensure that Keep Alive communications can succeed between the Active and Standby
systems.
For a more robust deployment, the interfaces for each private network link should be on different cards than the
interfaces for the other private network links.
Each private network link should be on a different subnet than the other private network links.
Procedure
The steps below describe the procedure for establishing a private network between the Active and Standby
systems.
1. Connect an Ethernet crossover cable directly between a network interface on the Active and Standby Netra
5220 systems. The Table "Private Network Interfaces and IP Addresses" shows the recommended interfaces
to use. See the figure Netra T5220 Cross-over Cable Connections. Note that the first and second private
networks are on different cards, as recommended.
2. On the Active and on the Standby Netra systems, use the following steps to assign permanent (persistent
across reboots) IP addresses to the private network interfaces you connected in Step 1. The Table Table "
Private Network Interfaces and IP Addresses" shows a sample IP address to use for each interface. Note that
the first private network link is on a different subnet than the second private network link, as required.
a. Create an /etc/hostname.<interface> file for each of the private network interfaces, and in each
file, enter the IP address for the interface.
Example: If one of the private network interfaces is e1000g2 and the IP address is 192.168.5.1, create
the file /etc/hostname.e1000g2 and enter the value 192.168.5.1.
b. Record the value of each IP address in Table 14 – 4; you will need these values when running the
configureHA script.
c. In the /etc/netmasks file, enter the network number and netmask for each of the private network
interfaces on the system.
Depending on the private network interface IP address, specify the Network number and subnet mask
of the respective private network interface.
Example:
If the private network interface number is 192.168.5.2 then enter the network number and subnet mask
in /etc/netmasks file as 192.168.5.0 255.255.255.0.
d. Plumb the IP address by executing the following commands:
This example considers e1000g2 as the private interface and 255.255.255.0 as the netmask.
Verify that the peer IP addresses are on a private subnet to ensure that packets destined for
the management network are not transmitted through these interfaces.
3. Repeat Steps 1 and 2 to set up the secondary and any other redundant links between the Active and Standby
Netra systems. You can use any combination of dedicated hardwired links or non-dedicated links through a
hub/switch for the redundant network link(s).
It is necessary to perform some configuration on each Netra system and collect hardware configuration information
to be used later when you run the configureHA script. The configureHA script will configure the public network and
the multipath group.
The concept of IP Network Multipathing is used for the public network. This concept provides the system with
single-point of failure recovery. A “well-known address” is assigned to a multipath group, which consists of a primary
Prerequisite
If not already done, you must set up a management/reachability interface on both the active and standby systems,
and assign each an IP address (refer to the Sun documentation for proper setup procedures). This interface will be
used when a system is in the standby mode to send traps concerning its own operation. The Table Reachability
Interface and IP Address shows the recommended reachability interface and sample IP addresses to use, and
Figure Public Network Connections for Netra T5220 shows the connections. The reachability address must be on
the same subnet as the “well-known” address that will be chosen in "Getting Ready to Configure the Public
Network". Record the value of the reachability IP addresses, you will need these values when running the
configureHA script.
Requirements
The primary and secondary interfaces for the multipath group on a system must be on different cards.
The reachability address and the well-known address must be on the same subnet.
The well-known address must be on a different network than the private network links.
The test addresses must be on the same subnet as the well-known address.
The dummy address must be on the same subnet as the well-known address.
ICMP echo/reply to and from the default router (or hosts identified through static hosts routes) must be
allowed.
Procedure
The procedure below describes the prerequisite steps to be completed concerning the public network before running
the configureHA script.
1. You must choose the names of the two interfaces used to create the multipath group on each Netra system.
The Table Public Network Interfaces and IP Addresses shows the recommended interfaces to use; note that
the primary and secondary interfaces are on different cards, as required. Record the values, you will need
these values when running the configureHA script.
2. Log on as root.
3. In order to activate these two interfaces on each Netra system, you need to plumb each interface. This
process sets up the streams needed for IP to use the interface. Use the ifconfig command to perform this
task. For example, to plumb interface e1000g1and nxge0, use the following commands:
4. Establish one well-known address on the LAN for assignment to the multipath group for use by the clients.
You only need one well-known address for both Netras on the HA system. The Table Public Network
Interfaces and IP Addresses shows a sample well-known address to use; note that the well-known address is
on a different network than the private network, as required. Also note that the well-known address is on the
same subnet as the reachability address given in Table Reachability Interface and IP Address, as required.
Record the value Table 3 – 4, you will need it when running the configureHA script.
5. Assign a host-name (such as “EMSHA”) to this well-known address and make an entry in the appropriate
Solaris database on both Netras, for example in the /etc/hosts file or NIS or DNS. Record the value; you will
need it when running the configureHA script.
6. Sonus recommends that you establish two unique test addresses on each Netra system, one for the primary
LAN interface and one for the secondary. These test addresses must be on the same subnet as the
well-known address. These addresses are not for general use. The Table Public Network Interfaces and IP
Addresses, shows sample test addresses to use. Record the values; you will need these values when
running the configureHA script.
Because the active and standby test addresses are not plumbed simultaneously, you can, if you
wish, use the same test address on both systems.
7. Establish one “dummy” address as the back-up/secondary address used for the internal working for the
multipath group. This dummy address must be on the same subnet as the well-known address. This address
is not for general use. You only need one dummy address for both Netras on the HA system. The Table
Public Network Interfaces and IP Addresses, shows a sample well-known address to use. Record the value,
you will need it when running the configureHA script.
During configuration, if a prompt asks for the IP Address, enter the well-known address. If a prompt
asks for the host-name, enter the hostname corresponding to the well-known address. You should
not use the IP address or hostname of an individual Sun system in an HA set-up.
8. Install the cabling from the two interfaces to the appropriate hub/router. The Figure Public Network
Connections for Netra T5220, shows the connections.
Caution
Be sure that the steps in the procedure above are complete for each Netra system.
Test address example for primary interface for multipath group 10.6.9.80
Test address example for secondary interface for multipath group 10.6.9.81
Test address example for primary interface for multipath group 10.6.9.82
Test address example for secondary interface for multipath group 10.6.9.83
Perform the procedure on both the active and standby Netra T5220 servers.
Passwords
The emsMigrate.sh script used in the following procedure gives you the opportunity to use strong passwords,
which must then be entered and must meet a set of restrictions, or to use weak passwords, which are the current
passwords.
Procedure
Perform the following procedure on both the active and standby Netra T5220 servers to import the data you earlier
exported from the Netra 240/440s:
This task need to be done on both the active and standby servers.
The files need to copied from respective backups, that is, active or standby.
For example, If this Netra T5220 is the active system, then from the active system backup directory you used
in Step "2" of "Exporting Data from the HA System", copy the exp_data_manual.dmp and
exp_strct_manual.dmp files to the /export/home/oracle/backup/dump directory on the Netra
T5220. Also copy the backupFiles.tar file to the /tmp directory on the Netra T5220.
If the exp_data_manual.dmp and exp_strct_manual.dmp files are copied to
/export/home/oracle/backup/dump using an unconventional method, such as FTP, change the owner
and group of the files to Oracle and DBA.
To change the owner and group of files to Oracle and DBA, enter the following commands:
# cd /export/home/oracle/backup/dump
# chown oracle:dba exp_data_manual.dmp exp_strct_manual.dmp
CAUTION
You must copy files from the backup directory that you used for this EMS server. If you use a
backup directory that contains files from another EMS server, Insight will not behave properly.
# cd /export/home/ems/conf/jumpstart
# ./emsMigrate.sh
All existing Insight-controlled passwords on this box will be wiped out and
replaced
with the passwords from the restored data.
###########################################################################################Do
you wish to continue [y|Y,n|N] ?
5. Enter y to continue.
The following message appears
6. The script asks for the full path to the backup tar file. Answer /tmp and press Enter.
The following message appears:
7. Enter y to import.
The following message appears:
#############################################################################################
Starting importing and upgrading Insight Oracle Database Instance SIDB as user
oracle.
#############################################################################################
stty: : Invalid argument
: : Invalid argument
stty: : Invalid argument
..............................................................................................
Disconnected from Oracle Database 11g Enterprise Edition Release 11.2.0.3.0 -
64bit Production
With the Partitioning, OLAP, Data Mining and Real Application Testing options
Modifying /export/home/jboss/server/insight/deploy/jbossweb.sar/server.xml
Done
Completed changing protocol to http. Please restart Sonus Insight.
If you have any IAS registered with the system, then execute the same
procedure on each IAS also by following the procedures provided in the
Insight User Guide.
You only need to follow the procedures in this section when installing Insight (HA) architecture.
Prerequisites
When running the configureHA script on the active and standby Insight systems, the script prompts you for
system information. The Table System Information Worksheet lists the information you will need, and the
procedures in which these values were assigned. You can enter your values into the table and use it as a reference
when you run configureHA.
Performed the first five items in Task Sequence for Migrating HA to Netra T5220s
Reset the insight user password. See "Changing the "insight" User Password and/or Password Expiration
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
The configureHA script configures HA in each Netra system for the first time. The script provides a HA
configuration main menu from which you can choose to configure an active or standby Insight system and perform
other HA configuration operations. The configureHA script collects user information and writes it to the
haConfiguration file in the /export/home/ems/conf/HA directory.
You must run the configureHA script on both the active and standby Insight systems.
The following procedure describes how to run configureHA on the active system.
The approximate timeline required to run the configureHA script on the active system is 30 minutes.
a. If the Insight database is running, a list of active oracle processes will be displayed and go to Step 3.
b. If the Insight database is not running, no oracle processes will be displayed. Start the Insight database
by entering the following command and go to Step 3.
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If necessary replace the c2t2d0s6 in the command line with the designator for your disk. This was established
in the section Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array .
4. Enter the following command to start the configureHA script.
Insight will be stopped now. Do you want to proceed? (default: yes) [y,n]
Press Enter to accept the default. The system then displays the following message:
The steps 8 to 11 are optional and must be executed only if you have an OAM IP address to be
configured. If you do not want to configure an OAM IP address skip steps 8 to 11 and execute the
steps from step 12 onwards.
OAM stands for Operations And Management. OAM IP address is used by the users to access all
EMS northbound interfaces like GUI, CLI, and API. A user can have two different networks for OAM
and signaling. In this scenario, EMS can act as a proxy for PSX to enable the PSX manager GUI to
talk to PSX. In a standalone EMS deployment with two different networks for OAM and signalling,
the PSX manager GUI connects to the EMS through the EMS OAM IP address, if PSX proxy mode
is enabled. In case of an EMS HA deployment with PSX proxy mode enabled and the user has two
different networks for OAM and signaling, the active EMS and standby EMS have their own
respective OAM IP addresses. In that case, the PSX manager GUI will use the appropriate OAM IP
of the current active server.
The OAM IP address is used by PSX to communicate with PSX GUI and EMS acts as a proxy for
PSX.
The section will collect information for creating the "Public" IP Multipathing
interface.
Which interface will be the primary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
Type the name of the primary interface for the multipath group, and press Enter.
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
Which interface will be the secondary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
The system would not display the primary interface that have configured in previous step as
an option.
Type y and press Enter to configure IPv4 and IPv6 network interfaces.
or
Type n and press Enter to configure only IPv4 network interfaces.
What is the test IPV4 address for the primary LAN interface (default:
10.54.5.32) : 10.54.5.32
What is the test IPV4 address for the primary LAN interface : 10.54.5.32
Type the IP test address for the primary interface for the multipath group, and press Enter.
You would have established the primary interface for the multipath group in Public Network Setup.
What is the test IPV4 address for the secondary LAN interface : 10.54.5.33
Type the IP test address for the secondary interface for the multipath group, and press Enter.
You would have established the well known address on the LAN in Public Network Setup.
What is the "dummy" IPV4 address for the secondary interface : 10.54.5.38
Type the dummy address, which you established in Public Network Setup and press Enter.
22. The system displays the following:
Type the reachability address for this system, which you established in Public Network Setup and press
Enter.
23. The system displays the values you entered. The following is an example based on the values given for the
active Netra T5220 system in Public Network Setup.
Sonus recommends providing at least two peer private IP addresses for redundancy purposes. Enter the peer
private IP addresses, which you established in Private Network Setup, and press Enter.
26. The system displays the following:
Type y and press Enter to configure IPv4 and IPv6 network interfaces.
or
Type n and press Enter to configure only IPv4 network interfaces.
27. The system displays the following:
Please provide the IPv4 reachability Address of the Peer system for Keep
Alives.
What is the peer's IPv4 reachability address?
Type the reachability address for the other Insight system, which you established in Public Network Setup
and press Enter.
28. The system displays the following:
You entered:
Peer Keep Alive IP Address 1: 172.16.5.2
Peer Keep Alive IP Address 2: 172.16.6.2
Peer Keep Alive IP Address 3:
Peer Keep Alive IP Address 4:
Peer's Reachability IP Address: 10.54.5.35
You entered...
User Name: "oracle"
Group Name: "dba"
Are the values correct (default:N) [y|Y,n|N] ?
Enter the RAID’s mount point, which you established in Netra T5220 Disk Labeling and File System Creation
for the RAID Disk Array and press Enter.
33. The system displays the following:
Enter the RAID’s device name, which you established in the section Netra T5220 Disk Labeling and File
System Creation for the RAID Disk Array and press Enter.
34. The system displays the following:
The “raw” device name is the same as the device name with the addition of “r” to “dsk” (e.g.
/dev/rdsk/c2t2d0s6).
Enter the well-known IP address, which you established in Public Network Setup, and press Enter.
36. The system displays the following:
You must decide whether to move the active system database or standby system database to the RAID disk
array. If you choose item 1 for the active system, you must choose item 2 when running the configureHA
procedure on the standby system. You cannot choose the same operation for both systems.
If necessary, you can enter q to return to the main menu.
Press Enter after making your selection.
38. If you chose 1 above, the system displays the following prompt:
Enter the base directory for Oracle and press Enter. For example:
/export/home/oracle
The system then displays a number of status messages that the configureHA script uses to make the
database. The script will backup the database, create a new database and import the backup data into the
new database. The script also turns on archive log and schedules cron jobs for daily backups and cleanup.
mkdir /export/raid/orasql
chown oracle:dba /export/raid/orasql
chmod 775 /export/raid/orasql
39. The system displays the High Availability Configuration Main Menu:
Type 6 and press Enter.
40. The system displays the following:
Testing scp
Please enter the root password of the peer:
42. Enter the root password of the peer and press enter.
Check the interfaces on the peer server if the following message appears:
43. The system displays the High Availability Configuration Main Menu.
Type 9 and press Enter to change the IP address of system A.
44. The system displays the following:
This step will change the IP Address on your system. Do you want to proceed
with this step? (default: yes) [y,n]
Do you want to notify all registered IAS systems of this new IP address?
(default: no) [y,n]
If there are IASs that were registered to this system and that should be registered to the HA system, type y
and press Enter. Otherwise type n and press Enter.
47.
# cd /export/home/ems/conf/HA
# vi haConfiguration
The e-mail notification is received only if you configure mailx on both the Active and Standby
servers. For information on configuring mailx, see Enabling Mailx-HA Solaris.
50. Perform the steps in Running the haMigrationFiles.sh for running the haMigrationFiles.sh file. For
more information, see Running haMigrateFiles.sh.
51. After you run the configureHA script, you must release resources so that they are available for the
configuration of other Netra systems. Type the following command:
# /export/home/ems/conf/HA/haResources release
The procedure for running the configureHA script on a standby system is similar to the procedure for an active
system, but both the Insight process and database instance should be stopped. Use the procedure detailed in "
Configuring HA on Active System-HA Setup" with the following differences:
You must choose a different operation than you chose for the active system. If you chose item 1 for the
active system, you must choose item 2 for the standby system. Press Enter after making your selection.
The system then displays several status messages.
After you run the configureHA script on both systems, perform the following tasks:
1. Verify that the interfaces and routing table are configured correctly.
See Checking Interface Configuration and Routing Table for Netra T5220-HA Setup.
2. Enable Multipath for IBM RAIDS. For more details, see MPXIO from T5220 to IBM DS3524 Disk Arrays.
3. First start Insight on the active system and then on the standby system
After migrating data from one EMS server (A) to another EMS server (B), and after registering Insight node B,
you need to unregister Insight node A (which will show up registered as a result of the migration).
Associate the new Insight IP with the nodes. For information, see Associating the Nodes-HA Setup.
Disassociate the old Insight IP from the nodes. For information, see Disassociating the Nodes-HA Setup.
1. Login to Insight
2. Navigate to Network Mgmt > Insight Administration
3. Select the registered SGX4000 node from the Navigation tree.
4. Modify and Update the following (default) values if required:
a. SSH Port
b. Login (CLI)
c. Password (CLI)
5. Click on Update button and then click on Discover node
e. Click OK.
The operation may take a longer time depending on the number of nodes.
If there are any errors displayed on the final screen at the end of the operation, then the nodes were
not successfully discovered. You need to perform a manual discovery of the nodes after determining
the cause of the error.
For more details, refer to the Node discovery section of the Insight User Guide.
e. Click OK.
The operation may take a longer time depending on the number of nodes.
If there are any errors displayed on the final screen at the end of the operation, then the nodes were
not successfully discovered. You need to perform a manual discovery of the nodes after determining
the cause of the error.
For more details, refer to the Node discovery section of the Insight User Guide.
Example Details
In the example output given in the following procedure, the following assumptions are made:
Procedure
Use the following steps to verify the interface configuration and routing table on each server that is part of an HA
setup.
ifconfig -a
netstat -rn
This section describes how to migrate from Storage Tek RAID to IBM RAID on Netra T5220.
If you are using a pre-9.0.0 EMS Solaris with StorageTEK RAID and want to migrate to IBM DS3524 RAID
then you must migrate using EMS V09.02.00 release. Direct migration from EMS pre-9.0.0 Release with
StorageTEK RAID to V09.03.00 Release with IBM DS3524 RAID is not supported. Jumpstart EMS Solaris
HA with IBM DS3524 RAID running on V09.02.00 and then perform migration. After you have migrated data
to V09.02.00 Release with IBM DS3524 RAID you can upgrade from V09.02.00 to V09.03.00 or V09.02.01
and higher sustaining releases.
When Migrating from EMS Migration Files generated are High-level migration Steps
Solaris StorageTEK RAID
High-level Tasks for Migrating From Storage Tek RAID to IBM RAID on T5220
This section describes the procedure for migrating the Storage TEK RAID to IBM RAID on Netra T5220.
Table 91: Migrating from Storage TEK RAID to IBM RAID on T5220 for pre-9.0.0 or 9.2.0 Release
Step Task
Number
2. Kickstart EMS HA on Solaris Netra T5220 system with EMS Release V09.02.00.
Perform the step 3 to step 9 on EMS HA Netra 5220 to install V09.02.00, configure HA,
restore data using EMS V09.02.00 Software Release. After data is restored on EMS V09.02.00,
you can upgrade from V09.02.00 to V09.03.00 Release.
3. Setup and configure RAID Disk Array with Netra 5220. For detailed procedure, see Setup and Configure Netra
T5220 platforms with RAID Disk Arrays.
4. Perform disk labeling and file creation for RAID Disk Array. See Netra T5220 Disk Labeling and File System
Creation for the RAID Disk Array-HA Setup.
7. Import the data back to the HA servers. For detailed procedure, see Importing Data into the Netra T5220s .
8. Configure HA using same old T5220s with new IBM RAID. For detailed procedure, see The configureHA
Script-HA Setup.
9. Verify interface and routing table. See Checking Interface Configuration and Routing Table for Netra T5220.
10. Upgrade from EMS Software Release V09.02.00 to V09.03.00. For more information on upgrade, refer Upgradin
g from Insight EMS V09.02.00 to V09.03.00 Software Release.
If you are migrating from 9.2.1 StorageTEK RAID to 9.3.0 release with IBM 3524 RAID, following will be the
high-level steps:
Step Task
Number
2. Kickstart EMS HA on Solaris Netra T5220 system connected to IBM DS 3524 RAID with EMS Release
V09.02.00.
Perform the step 3 to step 9 on EMS HA Netra 5220 connected to IBM DS 3524 RAID to
install V09.02.00 and upgrade to EMS V09.03.00 Software Release. After upgrading to EMS
V09.03.00, you can import the migration files to V09.03.00 Release.
3. Setup and configure RAID Disk Array with Netra 5220. For detailed procedure, see Setup and Configure Netra
T5220 platforms with RAID Disk Arrays.
4. Perform disk labeling and file creation for RAID Disk Array. See Netra T5220 Disk Labeling and File System
Creation for the RAID Disk Array-HA Setup.
7. Configure HA using same old T5220s with new IBM RAID. For detailed procedure, see The configureHA
Script-HA Setup.
8. Verify interface and routing table. See Checking Interface Configuration and Routing Table for Netra T5220.
9. Upgrade from EMS Software Release V09.02.00 to V09.03.00. For more information on upgrade, refer Upgradin
g from Insight EMS V09.02.00 to V09.03.00 Software Release.
10. Import the migration files on EMS V09.03.00 Release. For more details about how to import the migration file,
refer
Importing Data into the Netra T5220s for Migration
Depending on the EMS Software Release from which you are exporting the data, the dmp file names would differ.
When Migrating from EMS Solaris StorageTEK RAID Migration Files generated are
exp_data_manual.dmp
exp_strct_manual.dmp
expdp_data_manual.dmp
expdp_strct_manual.dmp
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
1. Log on to the Netra 5220 active system (system A) connected to StorageTEK RAID as a user with root
privileges.
2. Run the manualBackup.sh script on system A:
# cd /export/home/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine and that is accessible from
the Netra T5220 that will be the new active HA system. Use a directory name that will clearly identify the EMS
server that created the backup files. Make a note of the directory path because you will need it later when
migrating data to the Netra T5220 active HA system.
3. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, dmp files) in the backup directory
you identified in Step 2.
4. Perform a failover from the Netra 5220 active system (system A) to the Netra 5220 standby system (system
B) as follows:
a. Log on to system A as a user with root privileges.
b. Enter the following on system A:
# cd /export/home/ems/conf/HA
# ./hamgmt failOver
# cd /export/home/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine and that is accessible from
the Netra T5220 that will be the new standby HA system. Make a note of the directory path because you will
need it later when migrating data to the Netra T5220 standby HA system.
6. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, dmp files) in the backup directory
you identified in Step 5.
Setup and Configure Netra T5220 platforms with RAID Disk Arrays for
Migration
This section describes the setup and hardware configuration for Netra T5220 platforms and RAID disk arrays. The
procedures in this section apply only to Netra 5220s.
Setting Up and Configuring Netra T5220 Systems with IBM DS3524 Storage System for
Migration
This section describes the setup and hardware configuration for Netra T5220 platforms and IBM DS3524 Storage
system.
Netra T5220 and IBM DS3524 Storage System Connections for Migration
This section describes the procedure for making the physical connections between the IBM DS3524 and the Netra
T5220 systems.
1. Connect one fiber cable to a fiber cable port on Controller A of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
2. Connect a second fiber cable to the other fiber cable port on Controller A of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
3. Connect a third fiber cable to a fiber cable port on Controller B of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
4. Connect a fourth fiber cable to the other fiber cable port on Controller B of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
Storage Manager is used to configure, manage, and troubleshoot storage subsystems. It is used primarily to
configure RAID arrays and logical drives, assign logical drives to hosts, replace and rebuild failed disk drives,
expand the size of the arrays and logical drives, and convert from one RAID level to another. Storage Manager
enables troubleshooting and management tasks, such as checking the status of the storage subsystem
components, updating the firmware of the RAID controllers, and managing the storage subsystem.The latest IBM
DS3524 Storage Manager software version is 10.83.x5.23.
The following procedure installs the IBM DS Storage Manager software on a Netra T5220 server. This procedure
should be performed on each of the two Insight servers.
# cd /export/home/packages
# gunzip SM10.83_Solaris_SMIA-10.83.x5.23.tgz
# cd Solaris10p83/Solaris
# ls SMIA-SOL-10.83.x5.23.bin
sh SMIA-SOL-10.83.x5.23.bin -i silent
/opt/IBM_DS/IBM_System_Storage_DS_Storage_Manager_10_InstallLog.log
/opt/IBM_DS/IBM\ System\ Storage\ DS\ Storage\ Manager\ 10_InstallErrorLog.log
The IBM DS3524 storage subsystem has two controllers, that are hot-swappable and redundant. The controllers
contain the storage subsystem control logic, interface ports, and LEDs.
Two SAS host ports labeled 1 and 2. Each of them is capable of operating at 8Gbps, 4Gbps, and 2Gbps
Four fiber channel host ports labeled FC3,FC4,FC5,FC6. Each of them is capable of operating at 8Gbps,
4Gbps, and 2Gbps
Two Ethernet management ports labeled 1 and 2 for Out-Of-Band management
The port on the extreme right is a x4 multilane mini-SAS port for connecting to EXP3524 drive expansion
enclosures
The following procedure assigns an IP address to a DS3524 storage subsystem controller. This procedure should
be performed twice, once for Controller A and once for Controller B.
1. Connect the T5220 server to a simple Hub/Switch after installing DS Storage Manager on both the T5220
servers.
2.
3. Start the X-server (such as Exceed) on the system where the GUI is to be launched.
4. Set the DISPLAY variable's IP address to the IP address of the machine where the GUI should be launched
using the following commands:
DISPLAY=<IP Address>:0.0
export DISPLAY
echo $DISPLAY
Where <IP Address> is the Ip of the machine where the GUI need to be launched.
5. Login as root to the T5220 server which is connected to the same Hub/Switch and go to the
/opt/IBM_DS/client directory:
# cd /opt/IBM_DS/client
# ./SMclient
Since Storage Manager is GUI-based application, set your DISPLAY to display graphics.
7. Click on the Add Storage Subsystem link from the Setup tab in the DS Storage Manager Enterprise
Management window.
The Select Addition Method-Manual screen opens.
8. In the Select Addition Method-Manual screen, select the Automatic discovery button and click OK.
9. Click OK to begin an initial automatic discovery of hosts on storage subsystems.
After the initial automatic discovery is complete, the Devices tab of the Enterprise Management Window
displays all hosts and storage subsystems attached to the local subnetwork.
The Enterprise Management Window can take up to a minute to refresh after an initial automatic
discovery.
10. In the Subsystem Management window, right-click the discovered storage subsystem to see the context
menu with the tasks.
Select the Manage Storage Subsystem task.
11. When you choose to manage a specific storage subsystem, the IBM System Storage DS (Subsystem
Management) window opens, along with the Initial Setup Task on background and a small window prompting
for the password.
Enter the password for Subsystem.
12. In the IBM System Storage DS (Subsystem Management) window, click the Configure Ethernet Management
Ports link in the Optional Task list.
The Change Network Configuration screen opens.
IBM DS3524 RAID Disk Array Configuration on Insight EMS Servers for Migration
The following procedure configures an IBM DS3524 RAID disk array. This procedure should be performed on one of
the Insight servers and it takes approximately 30 minutes.
1. Log on to one of the Insight servers as root.
2. Enter the following:
# cd /export/home/ems/conf/RAID
3. If an array or disk have been used in another application, the install may require reset to remove any previous
configuration.
To discover the array, enter the following command:
For example,
IP of Controller A is 10.54.58.109.
IP of Controller B is 10.54.58.110.
The system displays the following:
a. Enter SMcli -i -d if you are discovering the Storage Subsystem for the first time.
For example, the system displays the following:
4. Enter the following command to ensure the RAID name and IP addresses of the controllers are discovered:
# SMcli -i -d
For example, for RAID: EMSIBMRAID
# SMcli -i -d
EMSIBMRAID 10.54.58.109 10.54.58.110
SMcli completed successfully.
# ./SONSraidInstall.sh
6. The script detects the RAID the EMS is connected to and prompts for the number of physical disks.
The recommended option is 2. (300 GB). Press Enter after providing the choice.
9. Enter the RAID password that you had entered on step 11 of the IBM DS3524 Storage Subsystem Controller
IP Address Configuration section when the following is prompted and press Enter.
10. Enter the IP address to configure the array when prompted and press Enter:
Enter the Device Name that is to be used to identify the array (default:
SONSemsarray )
For example, EMSIBMRAID.
The output is displayed as:
EMSIBMRAID
Array Name is EMSIBMRAID
- Getting registered array list
Unregistering array EMSIBMRAID
SMcli completed successfully
....
< text deleted for brevity >
...
...
Logical drive initialization is under progress. Please re run the script after
some time
#
# reboot -- -r
Performing Netra T5220 Disk Labeling and File System Creation for the RAID
Disk Array
This section describes the steps for configuring the RAID disk on each Netra T5220 system. Execute the procedures
on each Netra system (the active and standby).
In the example in the steps, c2t2d0s6 will be used for the disk and disk slice on one of the systems. The other
system will use c2t4d0s6.
This section describes the steps for configuring the RAID disk on the active Netra T5220 system.
1. Log on as root.
2. Display all the drives seen by the operating system by entering:
# format
Example: The following is an example of command output with StorageTek RAID. In following example, 0 to 3
are drives, 4 and 6 are RAID drives, and 5 and 6 are the controllers.
Example: The following is an example of command output with IBM DS 3524 RAID. In the following example,
0 to 3 are drives, 4 and 5 are controllers, and 6 is RAID drive with multipathing enabled.
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0/fp@0,0/
ssd@w203c0080e52dfcde,1f
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0,1/fp@0,0/
ssd@w203d0080e52dfcde,1f
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
Enter the number that corresponds to the RAID disk number and not the controller. For StorageTek
RAID, as given in the above example, enter the disk number corresponding to the disk label
SUN-LCSM100_F-0735 and for IBM RAID, enter the disk number corresponding to the disk label
IBM-1814 as given in the above example.
4. If you are using StorageTek RAID, a message similar to the following appears:
selecting c2t2d0
[disk formatted]
Disk not labeled. Label it now?
# newfs /dev/rdsk/<partition>
Identify the largest partition that is not labeled backup. In this example, partition6 is the largest partition not
labeled backup. Record the partition number displayed on your system. The disk slice is s6. For the example
shown in Step 4, you would enter:
# newfs /dev/rdsk/c2t2d0s6
# mkdir /export/raid
Where <partition> is the designator for your disk and disk slice. The disk was displayed in Step 4. The
disk slice is s6. For the example shown in Step 4, you would enter:
c. Record the mount point and device name in System Information Worksheet; you will need it when
running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t2d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
# df -h|grep raid
# umount /export/raid
# df -h|grep raid
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
Standby System
This section describes the steps for configuring the RAID disk on the standby Netra system. Because the active
system has already been configured, the steps for labeling and creating a UFS are not required for the standby
system.
Example: The following is an example of command output with IBM DS 3524 RAID. In following example, 0 to
3 are drives, 4 and 5 are controllers, and 6 is RAID drive with multipathing enabled.
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
Enter the number that corresponds to the RAID disk number and not the controller. For StorageTek
RAID, as given in the above example, enter the disk number corresponding to the disk label
SUN-LCSM100_F-0735 and for IBM RAID, enter the disk number corresponding to the disk label
IBM-1814 as given in the above example.
4. At the format> utility prompt, enter verify to ensure that the drive has been labeled and also to display the
disk slices (partition table).
5. At the format> utility prompt, enter quit to exit the format utility prompt.
6. Mount the disk for testing and verification:
a. Create a mount point (directory) using the following command. The recommended name is:
/export/raid:
Identify the largest partition that is not labeled backup. In this example, partition6 is the largest partition
not labeled backup. Record the partition number displayed on your system. The disk slice is s6. If the
value shown in Step 3 was c2t4d0, you would enter:
c. Record the mount point and device name in Table System Information Worksheet; you will need it
when running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t4d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
total 16
drwx------ 2 root root 8192 Nov 21 11:59 lost+found
# df -h|grep raid
# umount /export/raid
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
The primary use for the private network links is the exchange of heartbeat messages between the active and
standby systems. The heartbeat messages allow each system to detect the availability of the other system. The
minimum number of private network connections is one; however, the more connections that you provide, the more
protection you have against port and card failures.
For HA to run properly, you must have this private network configured and running properly. If the heartbeat
messages are sent over the public network rather than the private network, under certain conditions the standby
system may attempt a takeover before the active system detects the failure (or while trying to recover from the
failure).
Sonus Recommendations
Sonus recommends at least two private network links between the Active and Standby Netra T5220 systems (you
can establish up to four private network links). At least one of these should be a dedicated hardwired (Ethernet
crossover cable) connection between the Active and Standby systems. You can use any combination of dedicated
hardwired links or non-dedicated links through a hub/switch for the redundant network link(s).
If the redundant network is accomplished using a hub/router (rather than a crossover cable), make sure that the
hub/router's address can be pinged and its interfaces have transmission mode configured to auto-negotiate. These
settings are required to ensure that Keep Alive communications can succeed between the Active and Standby
systems.
For a more robust deployment, the interfaces for each private network link should be on different cards than the
interfaces for the other private network links.
Each private network link should be on a different subnet than the other private network links.
Procedure
The steps below describe the procedure for establishing a private network between the Active and Standby
systems.
1. Connect an Ethernet crossover cable directly between a network interface on the Active and Standby Netra
5220 systems. The Table "Private Network Interfaces and IP Addresses" shows the recommended interfaces
to use. See the figure Netra T5220 Cross-over Cable Connections. Note that the first and second private
networks are on different cards, as recommended.
2. On the Active and on the Standby Netra systems, use the following steps to assign permanent (persistent
across reboots) IP addresses to the private network interfaces you connected in Step 1. The Table Table "
Private Network Interfaces and IP Addresses" shows a sample IP address to use for each interface. Note that
the first private network link is on a different subnet than the second private network link, as required.
a. Create an /etc/hostname.<interface> file for each of the private network interfaces, and in each
file, enter the IP address for the interface.
Example: If one of the private network interfaces is e1000g2 and the IP address is 192.168.5.1, create
the file /etc/hostname.e1000g2 and enter the value 192.168.5.1.
b. Record the value of each IP address in Table 14 – 4; you will need these values when running the
configureHA script.
c. In the /etc/netmasks file, enter the network number and netmask for each of the private network
interfaces on the system.
Depending on the private network interface IP address, specify the Network number and subnet mask
of the respective private network interface.
Example:
If the private network interface number is 192.168.5.2 then enter the network number and subnet mask
in /etc/netmasks file as 192.168.5.0 255.255.255.0.
d. Plumb the IP address by executing the following commands:
This example considers e1000g2 as the private interface and 255.255.255.0 as the netmask.
Verify that the peer IP addresses are on a private subnet to ensure that packets destined for
the management network are not transmitted through these interfaces.
3. Repeat Steps 1 and 2 to set up the secondary and any other redundant links between the Active and Standby
Netra systems. You can use any combination of dedicated hardwired links or non-dedicated links through a
hub/switch for the redundant network link(s).
It is necessary to perform some configuration on each Netra system and collect hardware configuration information
to be used later when you run the configureHA script. The configureHA script will configure the public network and
the multipath group.
The concept of IP Network Multipathing is used for the public network. This concept provides the system with
single-point of failure recovery. A “well-known address” is assigned to a multipath group, which consists of a primary
Prerequisite
If not already done, you must set up a management/reachability interface on both the active and standby systems,
and assign each an IP address (refer to the Sun documentation for proper setup procedures). This interface will be
used when a system is in the standby mode to send traps concerning its own operation. The Table Reachability
Interface and IP Address shows the recommended reachability interface and sample IP addresses to use, and
Figure Public Network Connections for Netra T5220 shows the connections. The reachability address must be on
the same subnet as the “well-known” address that will be chosen in "Getting Ready to Configure the Public
Network". Record the value of the reachability IP addresses, you will need these values when running the
configureHA script.
Requirements
The primary and secondary interfaces for the multipath group on a system must be on different cards.
The reachability address and the well-known address must be on the same subnet.
The well-known address must be on a different network than the private network links.
The test addresses must be on the same subnet as the well-known address.
The dummy address must be on the same subnet as the well-known address.
ICMP echo/reply to and from the default router (or hosts identified through static hosts routes) must be
allowed.
Procedure
The procedure below describes the prerequisite steps to be completed concerning the public network before running
the configureHA script.
1. You must choose the names of the two interfaces used to create the multipath group on each Netra system.
The Table Public Network Interfaces and IP Addresses shows the recommended interfaces to use; note that
the primary and secondary interfaces are on different cards, as required. Record the values, you will need
these values when running the configureHA script.
2. Log on as root.
3. In order to activate these two interfaces on each Netra system, you need to plumb each interface. This
process sets up the streams needed for IP to use the interface. Use the ifconfig command to perform this
task. For example, to plumb interface e1000g1and nxge0, use the following commands:
4. Establish one well-known address on the LAN for assignment to the multipath group for use by the clients.
You only need one well-known address for both Netras on the HA system. The Table Public Network
Interfaces and IP Addresses shows a sample well-known address to use; note that the well-known address is
on a different network than the private network, as required. Also note that the well-known address is on the
same subnet as the reachability address given in Table Reachability Interface and IP Address, as required.
Record the value Table 3 – 4, you will need it when running the configureHA script.
5. Assign a host-name (such as “EMSHA”) to this well-known address and make an entry in the appropriate
Solaris database on both Netras, for example in the /etc/hosts file or NIS or DNS. Record the value; you will
need it when running the configureHA script.
6. Sonus recommends that you establish two unique test addresses on each Netra system, one for the primary
LAN interface and one for the secondary. These test addresses must be on the same subnet as the
well-known address. These addresses are not for general use. The Table Public Network Interfaces and IP
Addresses, shows sample test addresses to use. Record the values; you will need these values when
running the configureHA script.
Because the active and standby test addresses are not plumbed simultaneously, you can, if you
wish, use the same test address on both systems.
7. Establish one “dummy” address as the back-up/secondary address used for the internal working for the
multipath group. This dummy address must be on the same subnet as the well-known address. This address
is not for general use. You only need one dummy address for both Netras on the HA system. The Table
Public Network Interfaces and IP Addresses, shows a sample well-known address to use. Record the value,
you will need it when running the configureHA script.
During configuration, if a prompt asks for the IP Address, enter the well-known address. If a prompt
asks for the host-name, enter the hostname corresponding to the well-known address. You should
not use the IP address or hostname of an individual Sun system in an HA set-up.
8. Install the cabling from the two interfaces to the appropriate hub/router. The Figure Public Network
Connections for Netra T5220, shows the connections.
Caution
Be sure that the steps in the procedure above are complete for each Netra system.
Test address example for primary interface for multipath group 10.6.9.80
Test address example for secondary interface for multipath group 10.6.9.81
Test address example for primary interface for multipath group 10.6.9.82
Test address example for secondary interface for multipath group 10.6.9.83
Perform the procedure on both the active and standby Netra T5220 servers.
Passwords
The emsMigrate.sh script used in the following procedure gives you the opportunity to use strong passwords,
which must then be entered and must meet a set of restrictions, or to use weak passwords, which are the current
passwords.
Procedure
Perform the following procedure on both the active and standby Netra T5220 servers connected to IBM DS 3524
RAID to import the data you earlier exported from the Netra 5220 connected with StorageTEK RAID:
This task need to be done on both the active and standby servers.
The files need to copied from respective backups, that is, active or standby.
For example, If this Netra T5220 is the active system, then from the active system backup directory you used
in Step "2" of "Exporting Data ", copy the dmp files to the /export/home/oracle/backup/dump
directory on the Netra T5220. Also copy the backupFiles.tar file to the /tmp directory on the Netra
T5220.
If the dmp files are copied to /export/home/oracle/backup/dump using an unconventional method,
such as FTP, change the owner and group of the files to Oracle and DBA.
To change the owner and group of files to Oracle and DBA, enter the following commands:
If migrating from pre-9.2.0 then use the following dmp file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba exp_data_manual.dmp exp_strct_manual.dmp
or
If migrating from 9.2.0 then use the following dmp file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba expdp_data_manual.dmp
expdp_strct_manual.dmp
CAUTION
You must copy files from the backup directory that you used for this EMS server. If you use a
backup directory that contains files from another EMS server, Insight will not behave properly.
3.
# cd /export/home/ems/conf/jumpstart
# ./emsMigrate.sh
##############################################################################################
You are going to migrate a previous EMS onto this system. Please make sure you
understand what
you are doing. Before you proceed, you should also have already run
manualBackup.sh on the system
you want to migrate from, which generated backupFiles.tar,
exp_data_manual.dmp, and exp_strct_manual.dmp.
If you are migrating from Solaris to Linux then you should have
NetcoolBackupFiles.tar.
All existing Insight-controlled passwords on this box will be wiped out and
replaced with the passwords
from the restored data.
##############################################################################################
Do you wish to continue [y|Y,n|N] ?
5. Enter y to continue.
The following message appears
6. The script asks for the full path to the backup tar file. Answer /tmp and press Enter.
The following message appears:
7. Enter y to import.
The following message appears:
*****************************************************************************
You have chosen to import User Activity Logs, PM Stats and TrunkGroup
Tables.
Please note that this may possibly take a while...
*****************************************************************************
#######################################################################################
Starting importing and upgrading Insight Oracle Database Instance SIDB as user
oracle.
#######################################################################################
stty: : Invalid argument
: : Invalid argument
stty: : Invalid argument
..............................................................................................
Disconnected from Oracle Database 11g Enterprise Edition Release 11.2.0.3.0 -
64bit Production
With the Partitioning, OLAP, Data Mining and Real Application Testing options
Modifying /export/home/jboss/server/insight/deploy/jbossweb.sar/server.xml
Done
Completed changing protocol to http. Please restart Sonus Insight.
If
you have any IAS registered with the system, then execute the same
procedure on each IAS also by following the procedures provided in the
Insight User Guide.
Prerequisites
When running the configureHA script on the active and standby Insight systems, the script prompts you for
system information. The table System Information Worksheet lists the information you will need, and the procedures
in which these values were assigned. You can enter your values into the table and use it as a reference when you
run configureHA.
Performed the first five items in High-level Tasks for Migrating From Storage Tek RAID to IBM RAID on
T5220
Reset the insight user password. See Changing the "insight" User Password and/or Password Expiration
Behavior. The active and standby systems must use the same insight user password.
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
The configureHA script configures HA in each Netra system for the first time. The script provides a HA
configuration main menu from which you can choose to configure an active or standby Insight system and perform
other HA configuration operations. The configureHA script collects user information and writes it to the
haConfiguration file in the /export/home/ems/conf/HA directory.
You must run the configureHA script on both the active and standby Insight systems.
The following procedure describes how to run configureHA on the active system.
The approximate timeline required to run the configureHA script on the active system is 30 minutes.
a. If the Insight database is running, a list of active oracle processes will be displayed and go to Step 3.
b. If the Insight database is not running, no oracle processes will be displayed. Start the Insight database
by entering the following command and go to Step 3.
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If necessary replace the c2t2d0s6 in the command line with the designator for your disk. This was established
in the section Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array .
4. Enter the following command to start the configureHA script.
# cd /export/home/ems/conf/HA
# ./configureHA
Insight will be stopped now. Do you want to proceed? (default: yes) [y,n]
Press Enter to accept the default. The system then displays the following message:
The steps 8 to 11 are optional and must be executed only if you have an OAM IP address to be
configured. If you do not want to configure an OAM IP address skip steps 8 to 11 and execute the
steps from step 12 onwards.
OAM stands for Operations And Management. OAM IP address is used by the users to access all
EMS northbound interfaces like GUI, CLI, and API. A user can have two different networks for OAM
and signaling. In this scenario, EMS can act as a proxy for PSX to enable the PSX manager GUI to
talk to PSX. In a standalone EMS deployment with two different networks for OAM and signalling,
the PSX manager GUI connects to the EMS through the EMS OAM IP address, if PSX proxy mode
is enabled. In case of an EMS HA deployment with PSX proxy mode enabled and the user has two
different networks for OAM and signaling, the active EMS and standby EMS have their own
respective OAM IP addresses. In that case, the PSX manager GUI will use the appropriate OAM IP
of the current active server.
The OAM IP address is used by PSX to communicate with PSX GUI and EMS acts as a proxy for
PSX.
The section will collect information for creating the "Public" IP Multipathing
interface.
Which interface will be the primary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
Type the name of the primary interface for the multipath group, and press Enter.
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
Which interface will be the secondary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
The system would not display the primary interface that have configured in previous step as
an option.
Type y and press Enter to configure IPv4 and IPv6 network interfaces.
or
Type n and press Enter to configure only IPv4 network interfaces.
What is the test IPV4 address for the primary LAN interface (default:
10.54.5.32) : 10.54.5.32
What is the test IPV4 address for the primary LAN interface : 10.54.5.32
Type the IP test address for the primary interface for the multipath group, and press Enter.
You would have established the primary interface for the multipath group in Public Network Setup.
What is the test IPV4 address for the secondary LAN interface : 10.54.5.33
Type the IP test address for the secondary interface for the multipath group, and press Enter.
You would have established the well known address on the LAN in Public Network Setup.
What is the "dummy" IPV4 address for the secondary interface : 10.54.5.38
Type the dummy address, which you established in Public Network Setup and press Enter.
22. The system displays the following:
Type the reachability address for this system, which you established in Public Network Setup and press
Enter.
23. The system displays the values you entered. The following is an example based on the values given for the
active Netra T5220 system in Public Network Setup.
Sonus recommends providing at least two peer private IP addresses for redundancy purposes. Enter the peer
private IP addresses, which you established in Private Network Setup, and press Enter.
26. The system displays the following:
Type y and press Enter to configure IPv4 and IPv6 network interfaces.
or
Type n and press Enter to configure only IPv4 network interfaces.
27. The system displays the following:
Please provide the IPv4 reachability Address of the Peer system for Keep
Alives.
What is the peer's IPv4 reachability address?
Type the reachability address for the other Insight system, which you established in Public Network Setup
and press Enter.
28. The system displays the following:
You entered:
Peer Keep Alive IP Address 1: 172.16.5.2
Peer Keep Alive IP Address 2: 172.16.6.2
Peer Keep Alive IP Address 3:
Peer Keep Alive IP Address 4:
Peer's Reachability IP Address: 10.54.5.35
You entered...
User Name: "oracle"
Group Name: "dba"
Are the values correct (default:N) [y|Y,n|N] ?
Enter the RAID’s mount point, which you established in Netra T5220 Disk Labeling and File System Creation
for the RAID Disk Array and press Enter.
33. The system displays the following:
Enter the RAID’s device name, which you established in the section Netra T5220 Disk Labeling and File
System Creation for the RAID Disk Array and press Enter.
34. The system displays the following:
The “raw” device name is the same as the device name with the addition of “r” to “dsk” (e.g.
/dev/rdsk/c2t2d0s6).
Enter the well-known IP address, which you established in Public Network Setup, and press Enter.
36. The system displays the following:
You must decide whether to move the active system database or standby system database to the RAID disk
array. If you choose item 1 for the active system, you must choose item 2 when running the configureHA
procedure on the standby system. You cannot choose the same operation for both systems.
If necessary, you can enter q to return to the main menu.
Press Enter after making your selection.
38. If you chose 1 above, the system displays the following prompt:
Enter the base directory for Oracle and press Enter. For example:
/export/home/oracle
The system then displays a number of status messages that the configureHA script uses to make the
database. The script will backup the database, create a new database and import the backup data into the
new database. The script also turns on archive log and schedules cron jobs for daily backups and cleanup.
mkdir /export/raid/orasql
chown oracle:dba /export/raid/orasql
chmod 775 /export/raid/orasql
39. The system displays the High Availability Configuration Main Menu:
Type 6 and press Enter.
40. The system displays the following:
Testing scp
Please enter the root password of the peer:
42. Enter the root password of the peer and press enter.
Check the interfaces on the peer server if the following message appears:
43. The system displays the High Availability Configuration Main Menu.
Type 9 and press Enter to change the IP address of system A.
44. The system displays the following:
This step will change the IP Address on your system. Do you want to proceed
with this step? (default: yes) [y,n]
Do you want to notify all registered IAS systems of this new IP address?
(default: no) [y,n]
If there are IASs that were registered to this system and that should be registered to the HA system, type y
and press Enter. Otherwise type n and press Enter.
47.
# cd /export/home/ems/conf/HA
# vi haConfiguration
The e-mail notification is received only if you configure mailx on both the Active and Standby
servers. For information on configuring mailx, see Enabling Mailx-HA Solaris.
50. Perform the steps in Running the haMigrationFiles.sh for running the haMigrationFiles.sh file. For
more information, see Running haMigrateFiles.sh.
51. After you run the configureHA script, you must release resources so that they are available for the
configuration of other Netra systems. Type the following command:
# /export/home/ems/conf/HA/haResources release
The procedure for running the configureHA script on a standby system is similar to the procedure for an active
system, but both the Insight process and database instance should be stopped. Use the procedure detailed in "
Configuring HA on Active System for Migration" with the following differences:
You must choose a different operation than you chose for the active system. If you chose item 1 for the
active system, you must choose item 2 for the standby system. Press Enter after making your selection.
The system then displays several status messages.
Post-configure HA Tasks
After you run the configureHA script on both systems, perform the following tasks:
1. Verify that the interfaces and routing table are configured correctly.
See Checking Interface Configuration and Routing Table for Netra T5220-HA Setup.
2. Enable Multipath for IBM RAIDS. For more details, see MPXIO from T5220 to IBM DS3524 Disk Arrays.
3. First start Insight on the active system and then on the standby system
After migrating data from one EMS server (A) to another EMS server (B), and after registering Insight node B,
you need to unregister Insight node A (which will show up registered as a result of the migration).
Associate the new Insight IP with the nodes. For information, see Associating the Nodes-HA Setup.
Disassociate the old Insight IP from the nodes. For information, see Disassociating the Nodes-HA Setup.
1. Login to Insight
2. Navigate to Network Mgmt > Insight Administration
3. Select the registered SGX4000 node from the Navigation tree.
4. Modify and Update the following (default) values if required:
a. SSH Port
b. Login (CLI)
c. Password (CLI)
5. Click on Update button and then click on Discover node
If you are migrating from pre-9.0.0 Release or from 9.2.0 release to 9.3.0 then you must first import the
migration files to 9.2.0 and then upgrade from 9.2.0 to 9.3.0.
If you are migrating from 9.2.1 release to 9.3.0 then you must first upgrade to 9.3.0 and then import the
migration files to 9.3.0 release.
This section describes how to check the interface configuration and the routing table after you have configured HA.
Example Details
In the example output given in the following procedure, the following assumptions are made:
Procedure
Use the following steps to verify the interface configuration and routing table on each server that is part of an HA
setup.
ifconfig -a
netstat -rn
Overview
If you are installing the Sonus application on your own Netra T5220 system, you may need to set the Integrated
Lights Out Management (ILOM) boot parameters and upgrade the ILOM firmware.
If you have installed the Sonus application on your own system, read the following:
Overview
Setting the ILOM Boot Configuration
Description of Boot Parameter Values
Setting the ILOM Boot Configuration with the CLI
Setting the ILOM Boot Configuration with the Web Interface
Prerequisite
ILOM Boot Configuration Procedure with the Web Interface
ILOM Web Interface Requirements
Verifying if IP Address is Assigned to the SP Interface
Assigning a Static IP Address to the SP Interface
Ensure that the ILOM boot parameters are properly set by performing either of the following:
Setting the ILOM Boot Configuration with the CLI. This procedure does not require an IP address for the
service processor (SP) interface.
Setting the ILOM Boot Configuration with the Web Interface. This procedure does require an IP address for
the SP interface.
The boot parameter settings are described in Description of Boot Parameter Values.
New JumpStart systems delivered from Sonus have the required ILOM boot parameter settings.
To fetch parameter and value settings, cd to parameter folder location and perform ls.
/HOST/diag trigger power-on-reset Runs diagnostics when the system is powered on and
and error-reset when the system resets itself after a fatal error.
/HOST/diag level min Runs the minimum level of diagnostics to verify the
system.
/HOST autorunonerror false The SP powers off the host after the host diagnostics
have discovered a non-fatal POST error.
/HOST autorestart reset Attempts to restart the system when the host leaves the
RUNNING state.
/HOST boottimeout 600 (seconds) Sets the timeout value between the request to boot and
the actual boot to 600 seconds.
/HOST bootrestart reset Resets the boot timeout timer when the timer expires.
/HOST maxibootfail 3 If the host does not reboot after three attempts, it
performs the boot failure recovery setting.
/HOST bootfailrecovery power cycle The host performs a power cycle if the maximum number
of boot failures was reached.
/SYS keyswitch_state normal The system can power itself on and start the boot
process.
/SP/policy HOST_AUTO_POWER_ON disabled When the service processor is booted, the power state of
the host server is set as specified by the host power to
last power state on boot parameter.
/SP/policy HOST_POWER_ON_DELAY enabled The server waits a random amount of time (between one
to five seconds) before powering on automatically. This
helps to minimize current surges on the main power
source when multiple servers in racks power on after a
power outage.
/SP/policy BACKUP_USER_DATA enabled Backs up the local user database on ILOM (user name,
role, password, and CLI mode information) to the SCC
PROM card.
1. Connect a terminal server to the SER MGT and the NET MGT port on the Netra T5220.
2. Login to –> (ILOM prompt) from serial console.
There are four situations from which you can go to ILOM prompt.
a. If you are in an OS console press #. to get in to ALOM/ILOM prompt.
b. If you are presented with a sc> (ALOM prompt) type logout as follows:
sc> logout
c. If you are presented with a login prompt use root as user name and changeme as password.
The -> prompt appears.
After you get -> prompt you can proceed with Step 4.
If you want switch to ALOM prompt, then proceed with Step 3.
3. Use the following commands to change the prompt from ILOM to ALOM:
Ok> #.
-> set /SP/users/root cli_mode=alom
logout and log back in see the prompt changes from "->" to
"sc>"
sc> poweroff
sc> flashupdate -s 127.0.0.1
sc> poweron
sc> console
prtdiag -v | grep "Sun System Firmware"
Sun System Firmware 7.4.5 2011/08/10 15:20
sc> userclimode root default
logout and log back in see the prompt changes from "sc>" to "-
>"
The command in Step 4 will remove the SP IP address if you have assigned one. You can reassign
the IP address by performing Assigning a Static IP Address to the SP Interface.
6.
7. Press Enter.
8. At the prompt, log in as root and enter the password (the default password is changeme).
The -> prompt appears.
9. After logging in as root, enter the following command to create the admin user:
Creating user...
Enter new password: ********
Enter new password again: ********
Created /SP/users/admin
11. Enter the following command to connect back to the solaris console.
Confirm Y to continue.
The following message is displayed:
12. Ensure that the boot configuration values are set according to the table ILOM Boot Configuration Values.
Prerequisite
Perform the following procedure to set the ILOM boot configuration with the Web interface:
To use the ILOM web interface, an IP address must be assigned to the SP interface.
1. Connect a terminal server to the SER MGT or the NET MGT port on the Netra T5220.
2. Press Enter.
3. At the prompt, log on as root and enter the password (the default password is changeme).
The -> prompt appears.
4. Enter the following:
-> ls /SP/network
If the ipaddress line does not contain a valid IP address, perform Assigning a Static IP Address to
the SP Interface.
If the ipaddress line does contain a valid IP address, you can use the ILOM web interface.
1. Connect a terminal server to the SER MGT or the NET MGT port on the Netra T5220.
2. Press Enter.
3. At the prompt, log on as root and enter the password (the default password is changeme).
The -> prompt appears.
4. Enter the following:
-> cd /SP/network
10. To verify that the information was entered correctly, enter the following:
-> ls
The IP address information that you entered appears. Verify that this is the correct information.
This section contains post-installation/post-upgrade tasks that you may need to perform.
For enabling licensing for devices in EMS, please refer to the “License Manager” section in the Insight User
Guide.
Task Purpose
Reattaching Slave Disk to the Mirror-HA Solaris If you have previously detached disk mirrors before upgrade, then
Reattach Disk Mirrors to re-establish the disk mirroring.
Or
Or
Enabling Disk Mirroring-HA Solaris
If you have never setup disk mirroring then enable disk mirroring.
Setting IBM RAID Trap destination Perform this task to set IBM RAID Trap destination.
SNMP Management Agent Configuration for HA Perform this task if you are installing SNMP and need to configure the
Setup SNMP Management Agent.
MPXIO from T5220 to IBM DS3524 Disk Arrays Activates multipathing from T5220 to IBM DS3524 Disk Arrays.
Setting the Location of Core Dump File for HA Perform this task to set the core dump file location.
Setup
Synchronizing with the NTP Server-HA Solaris Perform this task to synchronize the NTP server.
Online Library Installation or Updates-HA Setup Perform this task to install the documentation.
Clearing Client Browser Cache After a Software Perform this task on the client after an Insight upgrade.
Upgrade-HA Solaris
Netra T5220-Specific NVRAM Settings-HA Perform this task after any upgrade. This sets the NVRAM variables to
Setup the correct values.
Enabling SSH-HA Solaris Perform this task if you are using SSH for communication between the
Insight server and the PSX, SGX, and DSI.
Configuring TCP Wrappers-Aware Services-HA Perform this task if you need to allow access to TCP Wrappers-aware
Solaris services such as SSH and NFS.
Enabling Hardware Traps-HA Solaris Perform this task to enable the hardware traps.
SSL Certificate Installation Procedure Perform this task if you need to support HTTPS in a production
environment.
Enabling Users to Create cron Jobs-HA Solaris Perform this task if you need to allow users to create cron jobs.
Enabling Users to Create at Jobs-HA Solaris Perform this task if you need to allow users to create at jobs.
Performance Data Retention Settings for Perform this task if you are upgrading Insight from a release other than
Upgrades-HA Solaris V07.01.01, V07.01.02, V07.02.01, V07.02.02, V07.02.03 and you want
to change any of the settings from the default of 4 weeks.
Licenses for Enabling Insight API, Insight CLI, Contact your Sonus representative to obtain software licenses.
SMS API, SGX API, Lawful Intercept
Provisioning API, and Traffic Manager-HA
Solaris
Configuring Multiple Network Interfaces-HA Perform this task after an installation if the Insight server uses multiple
Solaris network interfaces.
Deploying LNP Adaptor-HA Solaris Perform the task to deploy LNP Adaptor.
Disabling unused EMS API versions-HA Solaris Perform this task to save memory and avoid application failure.
Enabling or Disabling HTTP access on the EMS Perform the task to enable and disable HTTP access to EMS server.
HA server
Configuring the Timezone on HA Solaris Perform this task to configure the Timezone.
user.oracle:100::oracle::project.max-sem-ids=(priv,256,
deny);project.max-shm-memory=(priv,4294967295,deny)
3. If the line listed in Step "2" appears in the /etc/project file, this procedure is complete.
If the line listed in Step "2" does not appear in the /etc/project file, continue to Step "4".
4. Add the entry from Step "2" to the /etc/project file (do not include a line break).
5. Reboot the system:
# init 6
#
# Internet host table
#
127.0.0.1 localhost
38.45.67.123 samplehost samplehost.yourcom.com loghost
38.33.54.26 samplehost
38.45.68.03 otherhost
/etc/hosts.allow
/etc/hosts.deny
In /etc/hosts.allow, change:
sshd: LOCAL
to
sshd: ALL
In /etc/hosts.deny, change:
ALL: ALL
to
#ALL: ALL
Refer to the man page host_access for a description of the rules. To access the man page, enter the
following command:
Example:
# TZ=US/Pacific
For the complete list of available Time Zones and the specific values, refer /usr/share/lib/zon
einfo.
Caution
It is not recommended to change value of any of the locale values mentioned below to something
other than the default ‘en’ value.
LC_COLLATE=en_US.ISO8859-1
LC_CTYPE=en_US.ISO8859-1
LC_MESSAGES=C
LC_MONETARY=en_US.ISO8859-1
LC_NUMERIC=en_US.ISO8859-1
LC_TIME=en_US.ISO8859-1
# reboot
/export/home/ems/conf/deployLNPApplication.sh
1. Login as insight user and enter the following command to stop Insight:
# /export/home/ems/sonusEms stop
3. Execute the following command to deploy LNP Application on the Insight server:
# ./deployLNPApplication.sh
# /export/home/ems/sonusEms start
5. For an HA or DR setup, ensure LNP Adaptor is deployed on both the Insight servers. To deploy LNP Adaptor
on other Insight systems, repeat Steps "1" to " 4" on that server.
Disable all unused EMS API versions because each version consumes Insight process memory. Too many
versions loaded into memory could result in application failure.
# cd /export/home/sonusComm/sbin
# ./HwTrapGen.sh
Prerequisite
Ensure sendmail packages are downloaded, and installed before you enable it.
To check whether sendmail packages are installed, issue the following command:
2. Navigate to /export/home/install/ems:
cd /export/home/install/ems
3. Navigate to Solaris10_Sendmail:
cd Solaris10_Sendmail
pkgadd -d . all
Enabling Mailx
# vi /etc/hosts
Append host name with domain name to the entry with host name and IP
Add Mail server IP, Mail server name, Mail server name with domain name
#
# Internet host table
#
:: 1localhost
127.0.0.1 localhost
10.54.58.101 emssvt2 loghost <hostname>.<domain-name>
<mail server ip> <mail server name> <mail server name>.<domain-name>
Save and close the hosts file.
cd /etc/mail/
The following section describes the procedure to enable HTTP access to the EMS HA server:
# cd <BASE_DIR>/conf/security
# ./enableHTTP.sh
4. Enable the HTTP access on HA server - standby. Execute the following command:
# cd <BASE_DIR>/conf/security
# ./enableHTTP.sh
5.
Perform the following procedure to disable HTTP access to the EMS HA server:
# cd <BASE_DIR>/conf/security
# ./disableHTTP.sh
4. Disable the HTTP access on HA server - standby. Execute the following command:
# cd <BASE_DIR>/conf/security
# ./disableHTTP.sh
This version of SSH includes the following components: SSH Server, SSH client, Secure FTP (SFTP), and Secure
File Copy.
1. As a user with root privileges, change to the SSH server configuration directory:
# cd /etc/ssh
# cp sshd_config sshd_config.backup
AllowTcpForwarding no
to
AllowTcpForwarding yes
Change:
PermitRootLogin no
to
PermitRootLogin yes
The scripts S99bge_fdx, and S99force100fullduplex in the /etc/rc2.d directory are not part of default
Jumpstart disks, but may be created after the installation by persons who install the boxes.
Example
The above block repeats for each NIC presented in the system (where the ' instance' value increases for each
subsequent NIC.
For the same example, the contents of the script may also read as follows:
The above block repeats for each NIC presented in the system (where the ' /dev/bge0' value increases for each
subsequent NIC).
Licenses for Enabling Insight API, Insight CLI, SMS API, SGX API, Lawful
Intercept Provisioning API, and Traffic Manager-HA Solaris
Access to the following modules of Insight EMS require the purchase of separate software licenses. Consult your
Sonus sales representative for additional information.
Insight CLI
Insight API
Insight SMS API
Insight SGX API
Lawful Intercept Provisioning API
Insight Traffic Manager
Once you purchase the product, you will be provided a license file with instructions for enabling the
product/functionality along with all applicable documentation. See the Insight EMS User Guide for a list of the
individual licenses that are available and a description of the functionality each enables, and instructions for
installing licenses.
If you are upgrading Insight, you do not need to purchase licenses that you have already purchased.
Prerequisites
Ensure that:
# df -h|grep raid
For an HA pair with the active system in service, the following steps has to be performed first on the standby node.
Perform the following procedure to activate multipathing from T5220 to IBM DS3524 Disk Arrays:
This procedure has to be followed only during maintenance period as it affects the systems service.
1. Check if MPXIO is enabled on the standby server by executing the following command:
# stmsboot -L
stmsboot: MPxIO is not enabled
2. Run the following command to enable multi-pathing to fiber channel devices with Solaris. This command also
updates /etc/vfstab for environments where IBM Array devices are mounted at boot time.
System reboots at this point, use console to reset or power cycle if the system hangs for more than 5
minutes.
Also, reboot when prompted. If the system stops in maintenance mode, login and run the following command
to force a second reboot.
3. Run the following command to validate if multi-pathing is enabled. All the multi-pathed devices gets listed.
# stmsboot -L
non-STMS device name STMS device name
------------------------------------------------------------------
/dev/rdsk/c3t2d0 /dev/rdsk/c4t60080E50001C2FCE0000250F4FFFBE03d0
/dev/rdsk/c2t8d0 /dev/rdsk/c4t60080E50001C2FCE0000250F4FFFBE03d0
The “STMS” device name is used exclusively for affected devices once multi-pathing is enabled.
5. Perform a manual Failover to convert the Active to Standby and perform steps 1-4 for new standby server.
For information on HA manual Failover, see "HA Manual Failover".
# ./docsInstall.sh
The script installs the new online documentation files, which you can then access through the Sonus tab in
the Online Library section of Insight.
If you are upgrading from any other version , the Data Retention Time for all statistics tables are set to the maximum
value of 4 weeks. To change the Data Retention Time for a statistics table, see the “Data Retention” section in the
Insight EMS User Guide.
For example:
This section describes how to check the name of the current dump directory, and how to change the setting to
/export/home/<hostname>/ if necessary.
To determine the name of the current dump directory, perform the following steps:
dumpadm
To change the name of the current dump directory, perform the following steps:
1. As a user with root privileges, enter the following command to create the directory:
mkdir /export/home/<hostname>
dumpadm -s /export/home/<hostname>
Verify that the <hostname> value matches the actual host name of your system.
If you are installing SNMP and want to configure the SNMP Agent Software perform the following procedure:
Configuring the SNMP Agent Software-After upgrading the SNMP Management Agent, you must configure it.
Manually starting and stopping the SNMP Agent Software-After configuring the SNMP Management Agent,
you must either restart the system or restart the SNMP agent.
You can set specific directives in the SNMP agent’s configuration file. The procedure below provides information
concerning the necessary changes.
# cd /etc/opt/SUNWmasf/conf
The snmpd.conf file contains directives for the agent. The steps that follow detail all necessary
additions/modifications to this file for the proper communication of traps to the Insight EMS system.
For information concerning other directives contained in this file, refer to the SNMP Agent installation
documentation.
2. The default trap community string (used when sending traps) is public. If you use a different community
string, enter a trapcommunity directive in the Trap Destination section of the file. You must place this directive
before any trapsink directives. The correct syntax is:
trapcommunity <your_community_string>
3. In the Trap Destination section of the file enter a trap2sink directive as follows:
The Netra SNMP Agent is configured to send traps to the SONUS agent. The SONUS agent will forward the
Netra Agent traps to registered EMS or third-party management systems along with product application traps.
4. The generation of an authentication failure standard trap is disabled by default. If you wish to generate an
authentication failure standard trap as a security measure, you must add the following directive to the
configuration file:
authtrapenable 1
5. The installation script sets the listening port to UDP 161. Do not change this value unless there is a known
conflict with another application. If you change the value, Sonus suggests that you change it to 9000. To
change the setting, enter an agentaddress directive. The syntax is:
agentaddress <port>
6. The default agent read community string is public. If you do not wish to allow a default read community string,
comment out the rocommunity directive by adding a # symbol at the beginning of the line. The commented
line would appear:
# rocommunity public
After upgrading and configuring the agent, you must either restart the system or manually start the agent.
To start the agent manually, use the following command (as root):
# /etc/init.d/masfd start
# /etc/init.d/masfd stop
The output from the above command showing the snmpd executable.
If you do not see the snmpd process running, check for any error messages in /var/adm/messages.
Your UNIX Administrator should synchronize the Insight server and all network elements in the deployed network to
the same NTP server.
Synchronizing ensures that the timestamps in the Insight logs are consistent with the timestamps on the other
network elements. Failure to do so could also introduce error into certain statistics, most notably the Trunk Group
performance statistics.
If you elect to synchronize with more than one NTP Server, you must ensure that the NTP Servers are also
synchronized. Conflicting time information from multiple NTP Servers may cause Insight system errors. All
nodes must be set in NTP server. (GSX node, by default, has NTP server set).
Perform the following procedure to configure NTP server in Solaris. All nodes must be configured with NTP server.
By default, GSX has NTP server already configured.
cp /etc/inet/ntp.client /etc/inet/ntp.conf
3. Using vi editor, edit the /etc/inet/ntp.conf. and replace multicast 224.0.1.1 with your NTP
Server IP address:
multicast 224.0.1.1
with
server <NTP_Server_IP>
The Insight EMS has certain ports which are opened publicly. Most of them are RPC related processes, which are
no longer used in remote agent. For security reasons, these ports are closed from Release V09.02.00 onwards.
Using the configureRPC.sh script you can enable, disable, or see the status of RPC processes. From
release V09.02.00 onwards, the RPC processes will be disabled in case of fresh installation of EMS and IAS and
when EMS is upgraded from a previous versions to V09.02.00 or above. However, if you are upgrading from
Release V09.02.00 to a release higher than V09.02.00 then the previous state of RPC processes will be retained.
The configureRPC.sh script when run, interacts with the RPCenabled property in SystemConfig.txt file.
Only EMS uses the SystemConfig.txt file. The IAS does not use SystemConfig.txt file.
To enable, disable or for checking the current state of RPC processes on EMS High Availability (HA) Active and
Standby System, refer the following sections:
To enable RPC process on EMS server, execute the following steps on both active and standby systems:
#cd <BASEDIR>/conf/security
2. Enable the RPC processes, by executing the ./configureRPC.sh start command on both active and
standby systems:
#./configureRPC.sh start
starting the RPC
Starting rpcbind:
#cd <BASEDIR>/conf/security
2. Disable the RPC processes, by executing the ./configureRPC.sh stop command on active and
standby systems:
#./configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
To check for the status of RPC processes, execute the following steps on both active and standby systems:
#cd <BASEDIR>/conf/security
2. Check the status of RPC processes, by executing the ./configureRPC.sh status command on active
and standby systems:
#./configureRPC.sh status
rpcbind (pid 11990) is running...
#cd <BASEDIR>/bin
#cd <BASEDIR>/bin
#./configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
To check for the status of RPC processes, execute the following steps:
#cd <BASEDIR>/bin
2. Check the status of RPC processes, by executing the ./configureRPC.sh status command:
#./configureRPC.sh status
rpcbind (pid 11990) is running...
Table of Contents
This section gives an overview of Insight Element Management System and provides information about hardware
requirements.
Overview on EMS
Sonus EMS, is a Web-based Element Management System ( EMS) that provides a graphical user interface (GUI)
for managing Session Border Controllers (SBC), Gateway Server (GSX), BGCF Routing Server (BRX), Riverstone,
Diameter Signalling Controller (DSC), PSX Policy Server (PSX), Data Stream Integrator (DSI), Access Server
(ASX), Access Directory Server (ADS), and Signalling Gateway (SGX).
SBC Session Border Controllers SBC 1000, SBC 2000, SBC 5x00, SBC 7x00, SBC SWe
Terminology
The DR solution for Insight EMS provides a method of deploying an additional Insight EMS system in a location
The Insight EMS application as a whole is not running on the target system. However, the target system does
receive the same traps that are received by the source system. The target system cannot be used as a functioning
EMS until you switchover from source to target or failover from the source to the target.
For the DR setup, if the ems.keystore password is changed on one EMS (either source / target), then it
needs to be manually changed on the other EMS (either source / target). If it is not changed, the other EMS
will not be able to open the ems.keystore at all and all SSL connections will fail. In other words, the
ems.keystore passwords must be kept the same on both EMS (source and target) at all times.
The Insight DR solution is supported for one-disk or two-disk database configurations, but the source and the target
systems must have the same database configuration when they are both non-HA. (Netra T5220s always have the
two-disk database configuration).
If an HA system is used as the source or target, the database disk configuration of the primary does not need to
match that of the target.
The Sonus EMS DR solution uses Data Guard, employing a Physical standby database with Maximum performance
protection mode.
The Physical standby database (on the target system) is an identical copy of the primary database (source system
database). The Physical standby database has on-disk database structures that are identical to the primary
database on a block-for-block basis. The database schema, including indexes, are the same. A physical standby
database is kept synchronized with the primary database by recovering the redo data received from the primary
database.
The Maximum performance protection mode provides the highest level of data protection that is possible without
affecting the performance of the primary database. This is accomplished by allowing a transaction to commit as
soon as the redo data needed to recover that transaction is written to the local online redo log. The primary
database’s redo data stream is also written to the standby database, but that redo stream is written asynchronously
with respect to the commitment of the transactions that create the redo data.
Switchover
A switchover is a planned role reversal between the production database and the standby database to avoid
downtime during scheduled maintenance on the production system or to test readiness for future role transitions. A
switchover guarantees no data loss. During a switchover, the production database and source system transition to a
standby role, and the standby database and target system transition to the production role. See the procedures in
Common Administrative Tasks-DR Solaris.
Failover
A manual failover is performed when the production database fails and the standby database and target system are
transitioned to take over the production role, allowing business operations to continue. The user must run the
failover procedure in order for a failover to take place.
You can convert a DR system to two non-DR systems. Replication will no longer take place, and each Insight
system will act as a standalone system. The two standalone systems should not be used to concurrently manage
the same devices. See the procedures in Common Administrative Tasks-DR Solaris.
RMAN Backup
The Sonus EMS DR solution uses the RMAN DUPLICATE command to create a physical standby database.
There are several advantages to using RMAN to create a standby database:
RMAN creates standby databases using backups of the primary database, restoring data files to the standby
site from backups. Thus, the primary database is not affected during the creation of standby database.
RMAN automates renaming of files or directory structures.
RMAN restores archived redo log files from backups and performs recovery to catch up the standby database
to the primary database.
The following rman scripts create the Physical standby database; the scripts are run on the source database
(primary database).
rman_standby_backup.ksh
rman_restore_standby.ksh
Ignore the following error messages while running the rman_restore_standby.ksh script:
After the rman_standby_backup.ksh is run, all the backup files and archive log files from the source database
need to be copied to the same file location on the target database.
Replication Traps
Traps are generated to indicate problems that exist with the DR processes. See the release notes for details.
DR-related traps will not be automatically cleared; they must be manually cleared. (This is because the traps could
be used to trace any DR problems if they exist.)
During DR setup when the target is being setup, the source will send out traps indicating that the target is not
available. These traps can be ignored.
Several backup archive files will appear in the following directory on the source and target systems after DR is
configured:
<ORACLE_BASE>/orarepl/<ORACLE_SID>/logs/monitor
Users need to register the DR source and DR target as separate Insight nodes in the Node Administration screen.
This ensures that after a DR switchover, the Application Management settings for the original DR source are
available under the new DR source (original target).
If the database on the source goes down and is restarted, run the start_standby_database.ksh script on the
target. This script stops and restarts the database on the target, which prevents the target database from being out
of sync. This script is located in <ORACLE_BASE>/orarepl/<ORACLE_SID>/scripts/conf.
There are several scripts with which you should be familiar when deploying an Insight DR solution. The scripts and
their uses are:
configureDR — typically used during initial configuration of the DR systems to assign operational mode
(source or target) and setup database replication. This script is located in
/export/home/ems/conf/DR.
convert — used to convert the operational mode of an existing DR system to either source, target, or
standalone. This script is located in /export/home/ems/conf/DR.
sonusEms start — if run on the source system, this script starts Insight (including FM) and process
monitoring. If run on the target system, this script starts the FM process and process monitoring.
sonusEms stop — if run on the source system, this script stops Insight and process monitoring. If run on
the target system, this scripts stops process monitoring.
configureDR.log — the log file for configureDR, located in /export/home/ems/logs
convert.log — the log file for convert, located in /export/home/ems/logs
start_standby_database.ksh — used on the target system after the database on the source goes down
and is restarted. This script stops and restarts the database on the target, which prevents the target database
from being out of sync. This script is located in
<ORACLE_BASE>/orarepl/<ORACLE_SID>/scripts/conf.
The following table, provides the minimum supported platforms required for EMS Disaster Recovery (DR):
Platform Configuration
RAID RAID-1+0
07.77.20.00
NVSRAM N1746D35R1070V90
For IBM RAID with controller firmware version 7.83, unlike the version 7.77, there is no error code with
“clear” coming from the RAID. Therefore, the issue traps coming from this RAID will remain so without
getting cleared. It has to be cleared manually.
Many factors, from network topology to the nature of user operations, affect the performance of the system. The
Insight application is memory- and I/O-intensive, particularly when performing large data collections and exporting. If
you do not collect performance data extensively or frequently, then the platform’s ability to support managed devices
and users increases. Under heavier loads the performance of the system will degrade gracefully.
The following table details the Sonus recommended disk partitioning scheme for the Netra T5220.
/export/home/oracle/oradata 50GB
(reserved) 0.15GB
/export/home/ems/weblogic/sonusEms/data 60GB
(reserved) 0.15GB
Disk Mirroring
Software disk mirroring for Insight is supported on Netra T5220 four-disk systems. The following mirrors are set up:
In addition to protecting against disk failure, enabling disk mirroring will also make it easier for you to perform a
fallback to Insight V09.03.00 from future Insight upgrades, particularly HA upgrades.
The main Java Insight memory settings and database software memory settings are automatically recalculated on
upgrades or system reboots. If changes to the automatically calculated settings are needed, contact the Sonus TAC.
UPS Recommendations
Sonus recommends that the Insight platform be protected by an uninterrupted power supply (UPS) to prevent the
ungraceful shutdown of Netcool. An ungraceful shutdown of Netcool can cause database file corruption that
prevents the nco_objserv process from coming up.
Sun Netra SNMP Management Agent Sun Netra SNMP Management Agent 1.6.2
Lsof 4.8
The minimum Java Client Version support for EMS and PSX Manager is 1.7.0_72. The EMS and PSX
application is tested with above version. But the application will work with 1.7.0_72 and above version also. If
you don't have the latest Java Client version, you will get warnings messages in the browser and from the
plugin.
This section describes, how to configure an Insight HA system on two Netra T5220 servers.
Topics include:
Setup and Configure Netra T5220 platforms with RAID Disk Arrays for EMS HA DR
Checking Interface Configuration and Routing Table for Netra T5220 for EMS HA DR
Restrictions
Do not configure interfaces that are outside the scope of those defined in the HA procedures. An Insight
system must have the ability to control the source addresses of packets sent to management clients.
Systems such as the GSX inspect the source address of incoming packets to determine the legitimacy of a
request.
The active and standby systems must use the same insight user password.
1. Setup and Configure Netra T5220 platforms with RAID Disk Arrays for EMS HA DR (perform on both the
active and standby EMS systems)
a. Setting Up and Configuring Netra T5220 Systems with IBM DS3524 Storage System for EMS HA DR
b. Setting Up and Configuring Netra T5220 Systems with StorageTek 2540 Disk Array for EMS HA DR
2. Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array for EMS HA DR
3. Private Network Setup for EMS HA DR
4. Public Network Setup for EMS HA DR
5.
Setup and Configure Netra T5220 platforms with RAID Disk Arrays for EMS
HA DR
This section provides information on configuring Netra 5220 systems with RAID disk arrays for EMS HA DR.
Setting Up and Configuring Netra T5220 Systems with IBM DS3524 Storage System for EMS HA DR Setting Up
and Configuring Netra T5220 Systems with StorageTek 2540 Disk Array for EMS HA DR
Setting Up and Configuring Netra T5220 Systems with IBM DS3524 Storage System for
EMS HA DR
This section provides information on setting up and configuring Netra 5220 systems wit IBM DS3524 array.
Topics include:
This section describes the procedure for making the physical connections between the IBM DS3524 and the Netra
T5220 systems.
1. Connect one fiber cable to a fiber cable port on Controller A of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
2. Connect a second fiber cable to the other fiber cable port on Controller A of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
3. Connect a third fiber cable to a fiber cable port on Controller B of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
4. Connect a fourth fiber cable to the other fiber cable port on Controller B of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
Storage Manager is used to configure, manage, and troubleshoot storage subsystems. It is used primarily to
configure RAID arrays and logical drives, assign logical drives to hosts, replace and rebuild failed disk drives,
expand the size of the arrays and logical drives, and convert from one RAID level to another. Storage Manager
enables troubleshooting and management tasks, such as checking the status of the storage subsystem
components, updating the firmware of the RAID controllers, and managing the storage subsystem.The latest IBM
DS3524 Storage Manager software version is 10.83.x5.23.
The following procedure installs the IBM DS Storage Manager software on a Netra T5220 server. This procedure
should be performed on each of the two Insight servers.
# cd /export/home/packages
# gunzip SM10.83_Solaris_SMIA-10.83.x5.23.tgz
# cd Solaris10p83/Solaris
# ls SMIA-SOL-10.83.x5.23.bin
sh SMIA-SOL-10.83.x5.23.bin -i silent
Preparing to install...
SMIA-SOL-10.83.05.23.bin: !: not found
Extracting the JRE from the installer archive...
Unpacking the JRE...
Extracting the installation resources from the installer
archive...
Configuring the installer for this system's environment...
Launching installer...
Preparing SILENT Mode Installation...
..
.....
......
< text deleted for brevity >
....
.....
Installation Complete.
/opt/IBM_DS/IBM_System_Storage_DS_Storage_Manager_10_InstallLog.log
/opt/IBM_DS/IBM\ System\ Storage\ DS\ Storage\ Manager\ 10_InstallErrorLog.log
The IBM DS3524 storage subsystem has two controllers, that are hot-swappable and redundant. The controllers
contain the storage subsystem control logic, interface ports, and LEDs.
Two SAS host ports labeled 1 and 2. Each of them is capable of operating at 8Gbps, 4Gbps, and 2Gbps
Four fiber channel host ports labeled FC3,FC4,FC5,FC6. Each of them is capable of operating at 8Gbps,
4Gbps, and 2Gbps
Two Ethernet management ports labeled 1 and 2 for Out-Of-Band management
The port on the extreme right is a x4 multilane mini-SAS port for connecting to EXP3524 drive expansion
enclosures
The following procedure assigns an IP address to a DS3524 storage subsystem controller. This procedure should
be performed twice, once for Controller A and once for Controller B.
1. Connect the T5220 server to a simple Hub/Switch after installing DS Storage Manager on both the T5220
servers.
2. Connect Ethernet port 2 on each controller to the same Hub/Switch which is connected to your T5220
servers.
3. Start the X-server (such as Exceed) on the system where the GUI is to be launched.
4. Set the DISPLAY variable's IP address to the IP address of the machine where the GUI should be launched
using the following commands:
DISPLAY=<IP Address>:0.0
export DISPLAY
echo $DISPLAY
Where <IP Address> is the Ip of the machine where the GUI need to be launched.
5. Login as root to the T5220 server which is connected to the same Hub/Switch and go to the
/opt/IBM_DS/client directory:
# cd /opt/IBM_DS/client
# ./SMclient
Since Storage Manager is GUI-based application, set your DISPLAY to display graphics.
The Enterprise Management Window can take up to a minute to refresh after an initial automatic
discovery.
10. In the Subsystem Management window, right-click the discovered storage subsystem to see the context
menu with the tasks.
Select the Manage Storage Subsystem task.
11. When you choose to manage a specific storage subsystem, the IBM System Storage DS (Subsystem
Management) window opens, along with the Initial Setup Task on background and a small window prompting
for the password.
Enter the password for Subsystem.
12. In the IBM System Storage DS (Subsystem Management) window, click the Configure Ethernet Management
Ports link in the Optional Task list.
The Change Network Configuration screen opens.
The following are the default port IP addresses in each controller:
192.168.128.101 Port 1
192.168.129.101 Port 2
13. In the Change Network Configuration screen, change the default Port IP addresses to your local IP
addresses.
14. Close the Storage Manager client.
The following procedure configures an IBM DS3524 RAID disk array. This procedure should be performed on one of
the Insight servers and it takes approximately 30 minutes.
# cd /export/home/ems/conf/RAID
3. If an array or disk have been used in another application, the install may require reset to remove any previous
configuration.
To discover the array, enter the following command:
For example,
IP of Controller A is 10.54.58.109.
IP of Controller B is 10.54.58.110.
The system displays the following:
a. Enter SMcli -i -d if you are discovering the Storage Subsystem for the first time.
For example, the system displays the following:
4. Enter the following command to ensure the RAID name and IP addresses of the controllers are discovered:
# SMcli -i -d
For example, for RAID: EMSIBMRAID
# SMcli -i -d
EMSIBMRAID 10.54.58.109 10.54.58.110
SMcli completed successfully.
# ./SONSraidInstall.sh
6. The script detects the RAID the EMS is connected to and prompts for the number of physical disks.
The recommended option is 2. (300 GB). Press Enter after providing the choice.
9. Enter the RAID password that you had entered on step 9 of the Configuring IBM DS3524 Storage Subsystem
Controller IP Address section when the following is prompted and press Enter.
10. Enter the IP address to configure the array when prompted and press Enter:
Enter the Device Name that is to be used to identify the array (default:
SONSemsarray )
For example, EMSIBMRAID.
The output is displayed as:
EMSIBMRAID
Array Name is EMSIBMRAID
- Getting registered array list
Unregistering array EMSIBMRAID
SMcli completed successfully
....
< text deleted for brevity >
...
...
Logical drive initialization is under progress. Please re run the script after
some time
#
# reboot -- -r
Setting Up and Configuring Netra T5220 Systems with StorageTek 2540 Disk Array for
EMS HA DR
This section provides information on setting up and configuring Netra 5220 systems with StorageTek 2540 array.
Topics include:
This section describes the procedure for making the physical connections between the RAID disk array and the
Netra T5220 systems.
1. Connect one fiber cable to a fiber cable port on Controller A of the RAID disk array. Connect the other end of
the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
2. Connect a second fiber cable to the other fiber cable port on Controller A of the RAID disk array. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Standby system.
3. Connect a third fiber cable to a fiber cable port on Controller B of the RAID disk array. Connect the other end
of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
4. Connect a fourth fiber cable to the other fiber cable port on Controller B of the RAID disk array. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Standby system.
5. Connect an Ethernet crossover cable directly between the Ethernet port on Controller A of the RAID disk
array and a network interface on one of the Netra T5220 systems. Sonus recommends using interface nxge2
or nxge3.
6. Connect an Ethernet crossover cable directly between the Ethernet port on Controller B of the RAID disk
array and a network interface on the other Netra T5220 system (the one you did not connect in Step 5).
The following procedure installs the StorageTek Common Array Manager (CAM) software on a Netra T5220 server.
Before you start the procedure, ensure that you copy the StorageTek2500_CAM.tar.gz file from Salesforce to the
EMS system. This procedure should be performed on each of the two Insight servers.
The CAM software is a command-line interface (CLI) for configuring and managing the RAID disk arrays.
# cd /export/home/packages
5.
# cd storageTek2500_CAM
# ./SONScamInstall.sh
After about 15 minutes, a message appears that states a log file is being written.
7. Repeat Steps 1 to 6 for the other Insight server.
The following procedure assigns an IP address to a RAID disk array controller. This procedure should be performed
twice — once for Controller A and once for Controller B.
1. Power-up the RAID disk array.
2. Use the mini-DIN cable to connect a terminal server to the serial port on one of the RAID disk array
controllers.
3. Send a BREAK signal by pressing Alt-B.
4. When prompted, press S.
5. When prompted, enter the password. If you do not know the default password, contact the Sonus TAC.
6. The following prompt appears:
Enter 2.
7. The following prompt appears:
Enter Y.
8. The following prompt appears:
Enter N.
9. A message similar to the following appears:
Press '.' to clear the field; Press '-' to return to the previous field;
Press <ENTER> and then ^D to quit (Keep Changes)
Current Configuration New Configuration
IP Address 10.6.9.24
Enter the appropriate IP address value in the New Configuration column. This value is for the controller to
which you are attached. The IP address should be on the same subnet as the “well-known” address that will
be assigned to the multipath group for the active and standby Netra T5220 EMSs.
10. A message similar to the following appears:
Enter the appropriate subnet mask value in the New Configuration column. This value is for the controller to
which you are attached.
11. A message similar to the following appears:
Enter the appropriate gateway IP address value in the New Configuration column. This value is for the
controller to which you are attached.
12. A message similar to the following appears, which displays the values you entered in Steps 9, 10 and 11 .
The following procedure configures a StorageTek RAID disk array. This procedure should be run for each of the
RAID disk array controllers (A and B). This procedure should be run on one Insight server for one of the RAID disk
array controllers and run on the other Insight server for the other RAID disk array controller.
# cd /export/home/ems/conf/RAID
3. If an array or disk have been used in another application, the install may require reset to remove any previous
configuration. To reset the array, use the following command:
# ./SONSraidInstall.sh
Enter a value from 1 and 2 which correspond to 146 GB and 300 GB.
7. The script prompts for the volume size of the disk.
Enter a value from 1 and 2 which correspond to 136 GB and 270 GB.
The following prompt appears:
8. Enter the IP address for the controller that you connected to this Insight server.
The following prompt appears:
Enter the Device Name that is to be used to identify the array, such as
SONSemsarray.
10. Repeat Steps 1 through 9 for the other Insight server and RAID disk array controller.
Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array
for EMS HA DR
This section describes the steps for configuring the RAID disk on each Netra T5220 system. Execute the procedures
on each Netra system (the active and standby).
In the example in the steps, c2t2d0s6 will be used for the disk and disk slice on one of the systems. The other
system will use c2t4d0s6.
Active System
This section describes the steps for configuring the RAID disk on the active Netra T5220 system.
1. Log on as root.
2. Display all the drives seen by the operating system by entering:
# format
Example: The following is an example of command output with StorageTek RAID. In following example, 0 to 3
are drives, 4 and 6 are RAID drives, and 5 and 6 are the controllers.
Example: The following is an example of command output with IBM DS 3524 RAID. In the following example,
0 to 3 are drives, 4 and 5 are controllers, and 6 is RAID drive with multipathing enabled.
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0/fp@0,0/
ssd@w203c0080e52dfcde,1f
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0,1/fp@0,0/
ssd@w203d0080e52dfcde,1f
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
For selecting the disk, make sure that the drive controllers for the primary and the standby servers
are the same.
selecting c2t2d0
[disk formatted]
Disk not labeled. Label it now?
5.
# newfs /dev/rdsk/<partition>
Where <partition> is the designator for your disk and disk slice. The disk was displayed in Step 4. The disk
slice is s6. For the example shown in Step 4, you would enter:
# newfs /dev/rdsk/c2t2d0s6
# mkdir /export/raid
Where <partition> is the designator for your disk and disk slice. The disk was displayed in Step 4. The
disk slice is s6. For the example shown in Step 4, you would enter:
c. Record the mount point and device name in System Information Worksheet; you will need it when
running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t2d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
# df -h|grep raid
# umount /export/raid
# df -h|grep raid
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
Standby System
This section describes the steps for configuring the RAID disk on the standby Netra system. Because the active
system has already been configured, the steps for labeling and creating a UFS are not required for the standby
system.
Example: The following is an example of command output with IBM DS 3524 RAID. In following example, 0 to
3 are drives, 4 and 5 are controllers, and 6 is RAID drive with multipathing enabled.
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
If you are using IBM DS3524 RAID, enter the disk name of the Standby System.
For selecting the disk, make sure that the drive controllers for the primary and the standby servers
are the same.
When the format command is run, it does not prompt for labeling because the disk has already been
labeled when you configured the RAID disk on the active Netra.
4. At the format> utility prompt, enter verify to ensure that the drive has been labeled and also to display the
disk slices (partition table).
5. At the format> utility prompt, enter quit to exit the format utility prompt.
6. Mount the disk for testing and verification:
a. Create a mount point (directory) using the following command. The recommended name is:
/export/raid:
# mkdir /export/raid
Where <partition> is the designator for your disk and disk slice. The disk was displayed in Step 3. The
disk slice is s6. If the value shown in Step 3 was c2t4d0, you would enter:
c. Record the mount point and device name in Table System Information Worksheet; you will need it
when running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t4d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
total 16
drwx------ 2 root root 8192 Nov 21 11:59 lost+found
# df -h|grep raid
# umount /export/raid
g.
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
The primary use for the private network links is the exchange of heartbeat messages between the active and
standby systems. The heartbeat messages allow each system to detect the availability of the other system. The
minimum number of private network connections is one; however, the more connections that you provide, the more
protection you have against port and card failures.
For HA to run properly, you must have this private network configured and running properly. If the heartbeat
messages are sent over the public network rather than the private network, under certain conditions the standby
system may attempt a takeover before the active system detects the failure (or while trying to recover from the
failure).
Sonus Recommendations
Sonus recommends at least two private network links between the Active and Standby Netra T5220 systems (you
can establish up to four private network links). At least one of these should be a dedicated hardwired (Ethernet
crossover cable) connection between the Active and Standby systems. You can use any combination of dedicated
hardwired links or non-dedicated links through a hub/switch for the redundant network link(s).
If the redundant network is accomplished using a hub/router (rather than a crossover cable), make sure that the
hub/router's address can be pinged and its interfaces have transmission mode configured to auto-negotiate. These
settings are required to ensure that Keep Alive communications can succeed between the Active and Standby
systems.
For a more robust deployment, the interfaces for each private network link should be on different cards than the
interfaces for the other private network links.
Each private network link should be on a different subnet than the other private network links.
Procedure
The steps below describe the procedure for establishing a private network between the Active and Standby
systems.
1. Connect an Ethernet crossover cable directly between a network interface on the Active and Standby Netra
5220 systems. The Table "Private Network Interfaces and IP Addresses" shows the recommended interfaces
to use. See the figure Netra T5220 Cross-over Cable Connections. Note that the first and second private
networks are on different cards, as recommended.
2. On the Active and on the Standby Netra systems, use the following steps to assign permanent (persistent
across reboots) IP addresses to the private network interfaces you connected in Step 1. The Table Table "
Private Network Interfaces and IP Addresses" shows a sample IP address to use for each interface. Note that
the first private network link is on a different subnet than the second private network link, as required.
a. Create an /etc/hostname.<interface> file for each of the private network interfaces, and in each
Verify that the peer IP addresses are on a private subnet to ensure that packets destined for
the management network are not transmitted through these interfaces.
3. Repeat Steps 1 and 2 to set up the secondary and any other redundant links between the Active and Standby
Netra systems. You can use any combination of dedicated hardwired links or non-dedicated links through a
hub/switch for the redundant network link(s).
It is necessary to perform some configuration on each Netra system and collect hardware configuration information
to be used later when you run the configureHA script. The configureHA script will configure the public network and
the multipath group.
The concept of IP Network Multipathing is used for the public network. This concept provides the system with
single-point of failure recovery. A “well-known address” is assigned to a multipath group, which consists of a primary
Prerequisite
If not already done, you must set up a management/reachability interface on both the active and standby systems,
and assign each an IP address (refer to the Sun documentation for proper setup procedures). This interface will be
used when a system is in the standby mode to send traps concerning its own operation. The Table Reachability
Interface and IP Address shows the recommended reachability interface and sample IP addresses to use, and
Figure Public Network Connections for Netra T5220 shows the connections. The reachability address must be on
the same subnet as the “well-known” address that will be chosen in "Getting Ready to Configure the Public
Network". Record the value of the reachability IP addresses, you will need these values when running the
configureHA script.
Requirements
The primary and secondary interfaces for the multipath group on a system must be on different cards.
The reachability address and the well-known address must be on the same subnet.
The well-known address must be on a different network than the private network links.
The test addresses must be on the same subnet as the well-known address.
The dummy address must be on the same subnet as the well-known address.
ICMP echo/reply to and from the default router (or hosts identified through static hosts routes) must be
allowed.
Procedure
The procedure below describes the prerequisite steps to be completed concerning the public network before running
the configureHA script.
1. You must choose the names of the two interfaces used to create the multipath group on each Netra system.
The Table Public Network Interfaces and IP Addresses shows the recommended interfaces to use; note that
the primary and secondary interfaces are on different cards, as required. Record the values, you will need
these values when running the configureHA script.
2. Log on as root.
3. In order to activate these two interfaces on each Netra system, you need to plumb each interface. This
process sets up the streams needed for IP to use the interface. Use the ifconfig command to perform this
task. For example, to plumb interface e1000g1and nxge0, use the following commands:
4. Establish one well-known address on the LAN for assignment to the multipath group for use by the clients.
You only need one well-known address for both Netras on the HA system. The Table Public Network
Interfaces and IP Addresses shows a sample well-known address to use; note that the well-known address is
on a different network than the private network, as required. Also note that the well-known address is on the
same subnet as the reachability address given in Table Reachability Interface and IP Address, as required.
Record the value Table 3 – 4, you will need it when running the configureHA script.
5. Assign a host-name (such as “EMSHA”) to this well-known address and make an entry in the appropriate
Solaris database on both Netras, for example in the /etc/hosts file or NIS or DNS. Record the value; you will
need it when running the configureHA script.
6. Sonus recommends that you establish two unique test addresses on each Netra system, one for the primary
LAN interface and one for the secondary. These test addresses must be on the same subnet as the
well-known address. These addresses are not for general use. The Table Public Network Interfaces and IP
Addresses, shows sample test addresses to use. Record the values; you will need these values when
running the configureHA script.
Because the active and standby test addresses are not plumbed simultaneously, you can, if you
wish, use the same test address on both systems.
7. Establish one “dummy” address as the back-up/secondary address used for the internal working for the
multipath group. This dummy address must be on the same subnet as the well-known address. This address
is not for general use. You only need one dummy address for both Netras on the HA system. The Table
Public Network Interfaces and IP Addresses, shows a sample well-known address to use. Record the value,
you will need it when running the configureHA script.
During configuration, if a prompt asks for the IP Address, enter the well-known address. If a prompt
asks for the host-name, enter the hostname corresponding to the well-known address. You should
not use the IP address or hostname of an individual Sun system in an HA set-up.
8. Install the cabling from the two interfaces to the appropriate hub/router. The Figure Public Network
Connections for Netra T5220, shows the connections.
Caution
Be sure that the steps in the procedure above are complete for each Netra system.
Test address example for primary interface for multipath group 10.6.9.80
Test address example for secondary interface for multipath group 10.6.9.81
Test address example for primary interface for multipath group 10.6.9.82
Test address example for secondary interface for multipath group 10.6.9.83
You only need to follow the procedures in this section when installing Insight (HA) architecture.
Topics include:
Prerequisites
Running the configureHA Script
Configuring HA on Active System
Prerequisites
When running the configureHA script on the active and standby Insight systems, the script prompts you for
system information. Table System Information Work Sheet lists the information you will need, and the procedures in
which these values were assigned. You can enter your values into the table and use it as a reference when you run
configureHA.
Performed the first five items in High Level Task Sequence for Configuring HA
Reset the insight user password. See Changing the “insight” User Password and/or Password Expiration
Behavior. The active and standby systems must use the same insight user password.
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
The configureHA script configures HA in each Netra system for the first time. The script provides a HA
configuration main menu from which you can choose to configure an active or standby Insight system and perform
other HA configuration operations. The configureHA script collects user information and writes it to the
haConfiguration file in the /export/home/ems/conf/HA directory.
You must run the configureHA script on both the active and standby Insight systems.
The configureHA script configures HA in each Netra system for the first time. The script provides a HA
configuration main menu from which you can choose to configure an active or standby Insight system and perform
other HA configuration operations. The configureHA script collects user information and writes it to the
haConfiguration file in the /export/home/ems/conf/HAdirectory.
You must run the configureHA script on both the active and standby Insight systems.
The following procedure describes how to run configureHA on the active system.
The approximate timeline required to run the configureHA script on the active system is 30 minutes.
a. If the Insight database is running, a list of active oracle processes will be displayed and go to Step 3.
b. If the Insight database is not running, no oracle processes will be displayed. Start the Insight database
by entering the following command and go to Step 3.
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If necessary replace the c2t2d0s6 in the command line with the designator for your disk. This was established
in the section Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array for EMS HA DR .
4. Enter the following command to start the configureHA script.
# cd /export/home/ems/conf/HA
# ./configureHA
Insight will be stopped now. Do you want to proceed? (default: yes) [y,n]
Press Enter to accept the default. The system then displays the following message:
The steps 8 to 11 are optional and must be executed only if you have an OAM IP address to be
configured. If you do not want to configure an OAM IP address skip steps 8 to 11 and execute the
steps from step 12 onwards.
Type 2 and press Enter to enter the OAM IP addresses. In OAM IP configuration, the OAM IP address uses
PSX proxy mode.
More details about OAM IP address configuration and PSX Proxy mode are available here.
The OAM IP address is used by PSX to communicate with PSX GUI and EMS acts as a proxy for
PSX.
The section will collect information for creating the "Public" IP Multipathing
interface.
Which interface will be the primary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
Type the name of the primary interface for the multipath group, and press Enter.
NOTE: You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
Which interface will be the secondary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
a. Type the name of the secondary interface for the multipath group and press Enter.
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
The system would not display the primary interface that have configured in previous step as
an option.
16.
What is the test IPV4 address for the primary LAN interface (default:
10.54.5.32) : 10.54.5.32
What is the test IPV6 address for the primary LAN interface :
NOTE: The configureHA script provides the user to configure the HA in IPv4 or IPv6.
If you want to configure an IPv6 HA Setup, please leave all the IPv4 addresses blank.
If you want to configure an IPv4 HA setup, please follow the following steps:
What is the test IPV4 address for the primary LAN interface : 10.54.5.32
What is the test IPV6 address for the primary LAN interface :
INVALID IPv6 address format.
Do you want to stop entering this IP address? (default: no) [y,n] y
a. Type the IP test address for the primary interface for the multipath group, and press Enter.
You would have established the primary interface for the multipath group in Public Network
Setup.
What is the test IPV4 address for the secondary LAN interface : 10.54.5.33
What is the test IPV6 address for the secondary LAN interface :
Type the IP test address for the secondary interface for the multipath group, and press Enter.
NOTE: You would have established the secondary interface for the multipath group in Public Network Setup.
20. The system displays the following:
What is the "dummy" IPV4 address for the secondary interface : 10.54.5.38
What is the "dummy" IPV6 address for the secondary interface :
Type the dummy address, which you established in Public Network Setup and press Enter.
22. The system displays the following:
Type the reachability address for this system, which you established in Public Network Setup and press
Enter.
23. The system displays the values you entered. The following is an example based on the values given for the
active Netra T5220 system in Public Network Setup.
Please provide the IP Address of the Peer system for Keep Alives.
You can provide up to 4 such addresses.
Peer Keep Alive IP Address 1 (RETURN to stop):
Peer Keep Alive IP Address 2 (RETURN to stop):
Sonus recommends providing at least two peer private IP addresses for redundancy purposes. Enter the peer
private IP addresses, which you established in Private Network Setup, and press Enter.
26.
Please provide the IPv4 reachability Address of the Peer system for Keep
Alives.
Please provide the IPv6 reachability Address of the Peer system for Keep
Alives
What is the peer's IPv4 reachability address?
Type the reachability address for the other Insight system, which you established in Public Network Setup
and press Enter.
28. The system displays the following:
You entered:
Peer Keep Alive IP Address 1: 172.16.5.2
Peer Keep Alive IP Address 2: 172.16.6.2
Peer Keep Alive IP Address 3:
Peer Keep Alive IP Address 4:
Peer's Reachability IP Address: 10.54.5.35
You entered...
User Name: "oracle"
Group Name: "dba"
Are the values correct (default:N) [y|Y,n|N] ?
Enter the RAID’s mount point, which you established in Netra T5220 Disk Labeling and File System Creation
for the RAID Disk Array for EMS HA DR and press Enter.
33. The system displays the following:
Enter the RAID’s device name, which you established in the section Netra T5220 Disk Labeling and File
System Creation for the RAID Disk Array for EMS HA DR and press Enter.
34. The system displays the following:
The “raw” device name is the same as the device name with the addition of “r” to “dsk” (e.g.
/dev/rdsk/c2t2d0s6).
Enter the well-known IP address, which you established in Public Network Setup, and press Enter.
36. The system displays the following:
You must decide whether to move the active system database or standby system database to the RAID disk
array. If you choose item 1 for the active system, you must choose item 2 when running the configureHA
procedure on the standby system. You cannot choose the same operation for both systems.
If necessary, you can enter q to return to the main menu.
Press Enter after making your selection.
38. If you chose 1 above, the system displays the following prompt:
Enter the base directory for Oracle and press Enter. For example:
/export/home/oracle
The system then displays a number of status messages that the configureHA script uses to make the
database. The script will backup the database, create a new database and import the backup data into the
new database. The script also turns on archive log and schedules cron jobs for daily backups and cleanup.
mkdir /export/raid/orasql
chown oracle:dba /export/raid/orasql
chmod 775 /export/raid/orasql
39. The system displays the High Availability Configuration Main Menu:
Type 6 and press Enter.
40. The system displays the following:
42. Enter the root password of the peer and press enter.
Check the interfaces on the peer server if the following message appears:
43. The system displays the High Availability Configuration Main Menu.
Type 9 and press Enter to change the IP address of system A.
44. The system displays the following:
This step will change the IP Address on your system. Do you want to proceed
with this step? (default: yes) [y,n]
Do you want to notify all registered IAS systems of this new IP address?
(default: no) [y,n]
If there are IASs that were registered to this system and that should be registered to the HA system, type y
and press Enter. Otherwise type n and press Enter.
47. The system displays the following:
48.
# cd /export/home/ems/conf/HA
# vi haConfiguration
The e-mail notification is received only if you configure mailx on both the Active and Standby
servers. For information on configuring mailx, see Enabling Mailx-DR Solaris.
50. Perform the steps in Running the haMigrationFiles.sh for running the haMigrationFiles.sh file. For
more information, see Running haMigrateFiles.sh.
51. After you run the configureHA script, you must release resources so that they are available for the
configuration of other Netra systems. Type the following command:
# /export/home/ems/conf/HA/haResources release
a. If the Insight database is running, a list of active oracle processes will be displayed and go to Step 3.
b. If the Insight database is not running, no oracle processes will be displayed. Start the Insight database
by entering the following command and go to Step 3.
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If necessary replace the c2t4d0s6 in the command line with the designator for your disk. This was established
in the section Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array for EMS HA DR .
4. Enter the following command to start the configureHA script.
# cd /export/home/ems/conf/HA
# ./configureHA
Insight will be stopped now. Do you want to proceed? (default: yes) [y,n]
OAM stands for Operations And Management. OAM IP address is used by the users to access all
EMS northbound interfaces like GUI, CLI, and API. A user can have two different networks for OAM
and signaling. In this scenario, EMS can act as a proxy for PSX to enable the PSX manager GUI to
talk to PSX. In a standalone EMS deployment with two different networks for OAM and signalling,
the PSX manager GUI connects to the EMS through the EMS OAM IP address, if PSX proxy mode
is enabled. In case of an EMS HA deployment with PSX proxy mode enabled and the user has two
different networks for OAM and signaling, the active EMS and standby EMS have their own
respective OAM IP addresses. In that case, the PSX manager GUI will use the appropriate OAM IP
of the current active server.
More details about OAM IP address configuration and PSX Proxy mode are available here.
Type the name of the primary interface for the multipath group, and press Enter.
NOTE: You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
Which interface will be the secondary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
a. Type the name of the secondary interface for the multipath group and press Enter.
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
The system would not display the primary interface that have configured in previous step as
an option.
What is the test IPV4 address for the primary LAN interface (default:
10.54.5.32) : 10.54.5.32
What is the test IPV6 address for the primary LAN interface :
NOTE: The configureHA script provides the user to configure the HA in IPv4 or IPv6.
If you want to configure an IPv6 HA Setup, please leave all the IPv4 addresses blank.
If you want to configure an IPv4 HA setup, please follow the following steps:
Type the IP test address for the primary interface for the multipath group, and press Enter.
a. NOTE: You would have established the primary interface for the multipath group in Public Network
Setup.
19. The system displays the following:
What is the test IPV4 address for the secondary LAN interface : 10.54.5.33
What is the test IPV6 address for the secondary LAN interface :
Type the IP test address for the secondary interface for the multipath group, and press Enter.
NOTE: You would have established the secondary interface for the multipath group in Public Network Setup.
20. The system displays the following:
What is the "dummy" IPV4 address for the secondary interface : 10.54.5.38
What is the "dummy" IPV6 address for the secondary interface :
Type the dummy address, which you established in Public Network Setup and press Enter.
22. The system displays the following:
Type the reachability address for this system, which you established in Public Network Setup and press
Enter.
23. The system displays the values you entered. The following is an example based on the values given for the
active Netra T5220 system in Public Network Setup.
Please provide the IP Address of the Peer system for Keep Alives.
You can provide up to 4 such addresses.
Peer Keep Alive IP Address 1 (RETURN to stop):
Peer Keep Alive IP Address 2 (RETURN to stop):
Sonus recommends providing at least two peer private IP addresses for redundancy purposes. Enter the peer
private IP addresses, which you established in Private Network Setup, and press Enter.
26. The system displays the following:
Please provide the IPv4 reachability Address of the Peer system for Keep
Alives.
Please provide the IPv6 reachability Address of the Peer system for Keep
Alives
What is the peer's IPv4 reachability address?
Type the reachability address for the other Insight system, which you established in Public Network Setup
and press Enter.
28. The system displays the following:
You entered...
User Name: "oracle"
Group Name: "dba"
Are the values correct (default:N) [y|Y,n|N] ?
Enter the RAID’s mount point, which you established in Netra T5220 Disk Labeling and File System Creation
for the RAID Disk Array for EMS HA DR and press Enter.
33. The system displays the following:
Enter the RAID’s device name, which you established in the section Netra T5220 Disk Labeling and File
System Creation for the RAID Disk Array for EMS HA DR and press Enter.
34. The system displays the following:
a.
The “raw” device name is the same as the device name with the addition of “r” to “dsk” (e.g.
/dev/rdsk/c2t2d0s6).
Enter the well-known IP address, which you established in Public Network Setup, and press Enter.
36. The system displays the following:
You must decide whether to move the active system database or standby system database to the RAID disk
array.
You must choose a different operation than you chose for the active system. If you chose item 1 for the active
system, you must choose item 2 for the standby system.
Press Enter after making your selection. The system then displays several status messages. If necessary,
you can enter q to return to the main menu.
Press Enter after making your selection.
38. If you chose 1 above, the system displays the following prompt:
/export/home/oracle
The system then displays a number of status messages that the configureHA script uses to make the
database. The script will backup the database, create a new database and import the backup data into the
new database. The script also turns on archive log and schedules cron jobs for daily backups and cleanup.
39. The system displays the High Availability Configuration Main Menu:
Type 6 and press Enter.
40. The system displays the following:
# /export/home/ems/conf/HA/haResources release
Only after the resources are released, launch the EMS in active mode and subsequently in standby mode.
41. The system displays the High Availability Configuration Main Menu:
Type 7 and press Enter to configure/test the SSH connection between the systems and to synchronize the
managed node information.
The system displays the following:
Testing scp
Please enter the root password of the peer:
42. Enter the root password of the peer and press enter.
Check the interfaces on the peer server if the following message appears:
43. The system displays the High Availability Configuration Main Menu.
Type 9 and press Enter to change the IP address of system A.
44. The system displays the following:
This step will change the IP Address on your system. Do you want to proceed
with this step? (default: yes) [y,n]
Do you want to notify all registered IAS systems of this new IP address?
(default: no) [y,n]
If there are IASs that were registered to this system and that should be registered to the HA system, type y
and press Enter. Otherwise type n and press Enter.
47. The system displays the following:
The e-mail notification is received only if you configure mailx on both the Active and Standby
servers. For information on configuring mailx, see Enabling Mailx.
50. Perform the steps in Running the haMigrationFiles.sh for running the haMigrationFiles.sh file. For
more information, see Running haMigrateFiles.sh.
51. After you run the configureHA script, you must release resources so that they are available for the
configuration of other Netra systems. Type the following command:
# /export/home/ems/conf/HA/haResources release
52. After you run the configureHA script on the active and standby systems, go to Post-HAconfigure Tasks.
1. Log in as user root and enter the following command to start the haMigrateFiles script.
# cd /export/home/ems/conf/HA
# ./haMigrateFiles.sh
5.
7. Select 1 from the options. This step moves the existing PM CSV files to the RAID and updates the
configuration to point to /export/home/ems/weblogic/sonusEms/dataRaid.
Creating /export/home/ems/weblogic/sonusEms/dataRaid/pm_archive.
cp -R /export/home/ems/weblogic/sonusEms/data/pm_archive/scp-tmp-dir
/export/home/ems/weblogic/sonusEms/dataRaid/pm_archive.
Enter dbimpl.
The following prompt appears:
Enter dbimpl.
10. The following options are listed:
1) Migrate Inventory, Network Health, Network Fault, Topology and Trunk Group Reports
2) Migrate PM csv files
3) Migrate User Audit Log files
4) Migrate All back to Standalone
q) quit
11. Select 3 from the main menu. The following options are listed:
1) Move the User Audit Log files to the RAID.
2) Point this system to use the User Audit Log files already on the RAID.
q) quit
12. Select 1 from the list of options. This step moves the existing UserAuditLog files to the RAID and updates the
configuration to point to /export/home/ems/weblogic/sonusEms/logsRaid.
13.
Enter dbimpl.
Enter dbimpl.
14. Select q from the main menu to generate the High Availability Migration Main Menu.
The following options are listed:
1) Migrate Inventory, Network Health, Network Fault, Topology and Trunk Group Reports
2) Migrate PM csv files
3) Migrate User Audit Log files
4) Migrate All back to Standalone
q) quit
15. Select q to quit.
OAM stands for Operations And Management. OAM IP address is used by the users to access all EMS northbound
interfaces like GUI, CLI, and API. A user can have two different networks for OAM and signaling. In this scenario,
EMS can act as a proxy for PSX to enable the PSX manager GUI to talk to PSX. In a standalone EMS deployment
with two different networks for OAM and signalling, the PSX manager GUI connects to the EMS through the EMS
OAM IP address, if PSX proxy mode is enabled. In case of an EMS HA deployment with PSX proxy mode enabled
and the user has two different networks for OAM and signaling, the active EMS and standby EMS have their own
respective OAM IP addresses. In that case, the PSX manager GUI will use the appropriate OAM IP of the current
active server.
1. Verify that the interfaces and routing table are configured correctly. See Checking Interface Configuration and
Routing Table for Netra T5220 for EMS HA DR.
2. Enable Multipath for IBM RAIDS. For more details, see MPXIO from T5220 to IBM DS3524 Disk Arrays for
DR Setup.
3. First start Insight on the active system and then on the standby system.
4. Register or update the registration of each Insight device (see Chapter 4 of the Insight EMS User Guide).
Checking Interface Configuration and Routing Table for Netra T5220 for EMS
HA DR
This section describes how to check the interface configuration and the routing table after you have configured HA.
Example Details
Procedure
Use the following steps to verify the interface configuration and routing table on each server that is part of an HA
setup.
ifconfig -a
netstat -rn
You require two servers to install Insight and IAS. You need to install Insight on server A before installing IAS on
server B.
After Insight is upgraded, Sonus recommends that each IAS be upgraded as soon as possible to ensure
consistent operation with the EMS. Older versions of IASs cannot run new versions of the API or handle
new features. While an IAS is being updated, any API clients or HTTP load balancer should be configured
to direct requests to Insight or other IASs.
Know the IP address of the remote system on which you want to upgrade IAS
Know the password for the root user on the remote system
Have a system that meets the specifications in Hardware and Software Requirements for Insight EMS DR
Deployment.
Sonus recommends that you start Insight on the EMS before you upgrade the IAS
To determine whether the Solaris patch has already been installed on your system, perform the following steps:
uname -v
2. Read the output. If the following line appears, the Solaris patch has already been installed:
Generic_150400-20
If the output does not match the previous message, install the Solaris OS patch. For more details, see Step 1
Upgrading Solaris Operating System.
# cd /export/home/ems/conf/IAS
# sh remoteIasInstall.sh <client_ip_address>
where <client_ip_address> is the IP address of the remote system on which you want to upgrade IAS.
2. When prompted, enter the password of the root user for the remote system.
3. Messages appear that state that remote information is being retrieved, and upgrade files are being copied to
the remote system.
4. When the IAS is ready for upgrade, a message appears that this may take several minutes.
A message then appears stating that the IAS installation completed successfully, and that the IAS has
started.
The remoteIasInstall.sh script takes care of both IAS install and upgrade.
To start an IAS server, Insight must first be running on the Insight EMS server. You can then start the IAS by logging
into the Insight EMS server as user insight and entering the following:
where <client_ip_address> is the IP Address of the IAS, which can either be an IPv4 or an IPv6 address type. The
script prompts you for the insight user password of the IAS system and then proceeds with the command. Once the
IAS is started, it will continue to run even if Insight is stopped.
To stop an IAS server, Log on to the Insight EMS server as either root or insight and enter the following:
# cd /export/home/ems/conf/IAS
# ./remoteIasMgmt.sh stop <client_ip_address>
where <client_ip_address> is the IP Address of the IAS. The script prompts you for the root or insight user password
of the IAS system and then proceed with the command.
To obtain the status of an IAS server, Log on to the Insight EMS server as either root or insight and do the following:
# cd /export/home/ems/conf/IAS
# ./remoteIasMgmt.sh status <client_ip_address>
where <client_ip_address> is the IP Address of the IAS. The script prompts you for the root or insight user password
of the IAS system and then proceeds with the command. The output of the status command looks similar to the
following:
When the changeIpAddress.sh script is used to change the IP address of the Insight server, all IASs that are
registered to the Insight server should be automatically updated to the new IP address of the Insight server.
To update the Insight IPv4/IPv6 address on a specific IAS, perform the following:
# cd /export/home/ems/conf/IAS
# ./remoteIasMgmt.sh resetInsightIP <client_ip_address>
where <client_ip_address> is the IPv4/IPv6 address of the IAS on which you want to update the Insight
IPv4/IPv6 address.
The Insight IPv4/IPv6 address on the IAS is updated to the IPv4/IPv6 address of the Insight server.
To update the Insight IPv4/IPv6 address on all the IASs that are registered to the Insight server, perform the
following:
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IPv4/IPv6 address on all IASs that are registered to the Insight server are updated to the IPv4/IPv6
address of the Insight server.
If you have the system administrator change the name or the IPv4/IPv6 address of the IAS, you do not have to
Update the IAS node in the Insight Node Registration Page, and rediscover the IAS node. See “Updating a
Node” in the Insight Administration chapter of the Insight EMS User Guide.
Licenses for Enabling Insight API, SMS API, SGX API, and Lawful Intercept Target
Provisioning API on the IAS
If you install the Insight API, Insight SMS API, Insight SGX API, or Lawful Intercept Target Provisioning API on an
IAS, you must purchase a license for each instance of an API module you want to use. You cannot share a license
between an API module on the Insight server and an API module on an IAS. For example, you cannot share a single
license between an Insight SMS API module on the Insight server and an Insight SMS API module that is installed
on a remote system with IAS.
# cd <IAS_BASE>/bin
# ./enableHTTP.sh
The IAS server will be stopped now. Do you want to proceed? (default: yes)
[y,n] y
Stopping IAS...
The IAS server will be stopped now. Do you want to proceed? (default: yes) [y,n] y
Stopping IAS...
*** Stopping IAS! - Thu Apr 25 12:34:55 IST 2013 ***
IAS Server stopped.
This section describes how to setup DR, and configure an Insight DR system with No HA standalone systems.
The Insight DR solution is supported for one-disk or two-disk database configurations, but the primary and
the target systems must have the same database configuration when they are both non-HA. (Netra T5220s
always have the two-disk database configuration.)
Prerequisite
Overview of setting up DR With No HA (Standalone) systems
Setting up DR With No HA (Standalone) systems
Prerequisite
Before setting up DR with no HA (Standalone) systems, upgrade EMS to V09.03.00 on the systems that will be part
of the DR setup.
The following table gives an overview for setting up DR with No HA (Standalone) systems.
Prerequisite: Upgrade EMS to V09.03.00 and start Insight. Prerequisite: Upgrade EMS to V09.03.00 and start Insight.
1. Establish and verify communication between the source and target system using the method of your choice.
Stop Insight.
3. Unschedule DR monitoring.
$ORACLE_BASE> /orarepl/$ORACLE_SID/scripts/conf
Stop Insight.
6. Unschedule DR monitoring.
7. Run configureDR
9. Create a directory with the same path name and size as created in
Step 8.
11. Enter a directory pathname for the location in which you will store the backup files. This is the directory that
you created in Step 8.
16. Copy the files from the $ORACLE_BASE/oradata/$ORACLE_SID/arch directory to the same directory on
the target system.
Note: See RMAN Backup for ignoring specific error messages that appear while running
rman_restore_standby.ksh script.
Before performing the below procedure, both the source and target systems must have EMS started at least once on each system.
1. Target Establish and verify communication between the source and target system using the method of your choice.
and
source
2. Target Stop Insight on the target system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms stop
3. Target If this is not the first time you have attempted to configure DR, unschedule DR monitoring on the target system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
4. Target On the target system, change to user oracle, and enter the following commands to delete the data files:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./delete_data_files.sh
5. Source Stop Insight on the source system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms stop
6. Source If this is not the first time you have attempted to configure DR, unschedule DR monitoring on the source system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
Source a. As root on the source system, navigate to the DR directory and run the configureDR script as follows:
# cd /export/home/ems/conf/DR
# ./configureDR
Answer N.
Answer N.
a) source
b) target
Answer a.
Source e. A message appears that identifies the ORACLE_SID setting in the user oracle’s .profile file, and then the following prompt appears:
Is this the correct ORACLE_SID value for this system and for your Insight database? (default:y) [y|Y,n|N]
Answer Y.
Source f. A message appears that gives the ORACLE_SID value that will need to be set on the target system. Make a note of this value.
When prompted to confirm that you will update the setting, answer Y. (You will update the setting on the target system in Step 13.)
Source g. A message appears that identifies the IP address of the source system. Make a note of the value.
When prompted to confirm that you will use this value as the source IP address when running configureDR on the target system, answer Y. (You will enter the
source IP address in Step 14g.)
Source i. When prompted to confirm the values you have entered, ensure that the listed values are correct and then answer Y.
There should be a zero length file on <IP address of target system> called /tmp/sshtestfile.nnnnn
Please verify that this file does exist on the remote system.
Ensure that the file sshtestfile.nnnnn (where nnnnn represents a number) exists on the target system.
Answer Y.
(3). Ensure that the /etc/hosts.allow file has the entry sshd: ALL
If the file still does not exist, contact the Sonus TAC.
8. Source On the source system, change to user oracle and create a directory that has enough space to hold a backup of the Insight database.
Make a note of this directory pathname. You will need to use this same pathname in Steps 11 and 15.
9. Target As user oracle on the target system, create a directory that has the same pathname and size as the directory you created in Step 8.
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./rman_standby_backup.ksh
Enter the Backup Path for the location to which to store the backup of this systems Insight database.
Enter a directory pathname for the location in which you will store the backup files. This is the directory that you created in Step 8. Do not use a softlink.
$ cd /export/home/ems
$ ./sonusEms start
13. Target As user oracle on the target system, edit the $ORACLE_BASE/.profile file so that it contains the ORACLE_SID value that was displayed in Step 7f.
After modifying the file, save it. Then execute it by using one of the following methods:
The environment variables $ORACLE_BASE, $ORACLE_HOME, and $ORACLE_SID must be set by logging in as su - oracle and
executing the script .profile. On the source system the $ORACLE_SID value is SIDB, while at the target system the $ORACLE_SID
value is SIDR.
Re-login as oracle
As k-shell, enter:
. .profile
As bash, enter:
source .profile (as bash)
Target a. As root on the target system, navigate to the DR directory and run the configureDR script as follows:
# cd /export/home/ems/conf/DR
# ./configureDR
Answer N.
Answer N.
a) source
b) target
Answer b.
Target e. A message appears that identifies the ORACLE_SID setting in the user oracle’s .profile file, and then the following prompt appears:
Is this the correct ORACLE_SID value the correct setting as specified when you ran ./configureDR on the DR Source
system? (default:y) [y|Y,n|N]
Verify that the ORACLE_SID value displayed is the same value that was displayed in Step 7f, then answer Y.
Enter the IP address of the source system, which was displayed in Step 7g.
Target h. When prompted to confirm the values you have entered, ensure that the listed values are correct and then answer Y.
There should be a zero length file on <IP address of source system> called /tmp/sshtestfile.nnnnn
Please verify that this file does exist on the remote system.
Ensure that the file sshtestfile.nnnnn (where nnnnn represents a number) exists on the source system.
Answer Y.
(3). Ensure that the /etc/hosts.allow file has the entry sshd: ALL
If the file still does not exist, contact the Sonus TAC.
15. Source On the source system, change to user oracle, and copy the contents from the source system directory created in Step 8 and put them in the target system directory
created in Step 9. The pathname for the directory on the source and the directory on the target must be the same.
16. Source As user oracle on the source system, copy the files from the $ORACLE_BASE/oradata/$ORACLE_SID/arch directory to the same directory on the target system.
17. Source As user oracle on the source system, enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./rman_restore_standby.ksh
b. Copy the password file from Source system to the target system. The file is: $ORACLE_HOME/dbs/orapw$ORACLE_SID
The $ORACLE_SID value at the Source system is SIDB and the $ORACLE_SID value at the Target system is SIDR.
For example:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./start_standby_database.ksh
20. Source As user oracle on the source system, enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./enable_primary_database.ksh
21. Source As user oracle on the source system, enter the following:
$ ./create_archivelog.ksh
ORACLE_BASE=/export/home/oracle
ORACLE_HOME=/export/home/oracle/product/10.2.0.3
ORACLE_SID=SIDB
System altered.
22. Source As user oracle on the source system, enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/monitor
$ ./sequence_num_status.ksh
SOURCE_SEQUENCE
---------------
172
TARGET_ARCHIVED_SEQ TARGET_APPLIED_SEQ
------------------- ------------------
172 171
23. Source As user oracle on the source system, perform the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./create_archivelog.ksh
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/monitor
$ ./sequence_num_status.ksh
c. Check to see if the SOURCE_SEQUENCE, TARGET_ARCHIVED_SEQ, and TARGET_APPLIED_SEQ values have all incremented from those displayed in Step 22.
If all of the values have incremented from those displayed in Step 22, go to Step 24.
If any of the values have not incremented from those displayed in Step 22, repeat Step 23, substeps a, b, and c every few minutes until all the values have
incremented. It is not unusual for this to take 15 minutes.
If you repeat substeps a, b, and c for 15 minutes and any of the values have not incremented, contact the Sonus TAC.
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
26. Target Start Insight on the target system by logging in as insight and executing the following commands:
$ cd /export/home/ems
$ ./sonusEms start
This section describes how to setup an Insight DR system when the source is an HA system and the target is an HA
system.
Prerequisite
Overview of setting up DR with HA Source and HA Target
Setting Up DR with HA Source and HA Target
Prerequisite
Before setting up DR on a system with an HA source and HA target, all the systems need to have EMS V09.03.00.
The following table gives an overview for setting up DR when the source is an HA system and the target is also an
HA system.
Step HA Source Active System HA Source Standby System HA Target Active System HA Target Standby System
Prerequisite: Upgrade EMS to V09.03.00 HA system and start Insight Prerequisite: Upgrade EMS to V09.03.00 HA system and start Insight
Stop Insight.
3 Unschedule DR monitoring.
Stop Insight.
5 Unschedule DR monitoring.
available under
$ORACLE_BASE>
/orarepl/$ORACLE_SID/scripts/conf
available under
$ORACLE_BASE>
/orarepl/$ORACLE_SID/scripts/conf
Stop Insight.
9 Unschedule DR monitoring.
10 Run configureDR.
Stop Insight.
12 Unschedule DR monitoring.
13 Run configureDR.
18 Run rman_standby_backup.ksh.
20 Start Insight.
21 Start Insight.
22 Update $ORACLE_BASE/.profile f
ile with
23 Run configureDR.
24 Update $ORACLE_BASE/.profile
displayed in Step 7.
28 Run rman_restore_standby.ksh
rman_restore_standby.ksh.
30 Run start_standby_database.ks
h.
31 Run enable_primary_database.ksh.
32 Run ./create_archivelog.ksh.
33 Run ./sequence_num_status.ksh
34 Run ./create_archivelog.ksh
Run ./sequence_num_status.ksh
35 Run configureDrMonitoring
36 Run configureDrMonitoring.
37 Run configureDrMonitoring
38 Run configureDrMonitoring.
39 Start Insight.
40 Start Insight.
1 Target Establish and verify communication between the source and target system using the method of your choice.
active and
source
$ ./sonusEms stop
3 Target If this is not the first time you have attempted to configure DR, unschedule DR monitoring on the target standby system. As root, enter the following:
standby
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
4 Target Stop Insight on the target active system by executing the following command as user insight:
active
$ cd /export/home/ems
$ ./sonusEms stop
5 Target If this is not the first time you have attempted to configure DR, unschedule DR active on the target standby system. As root, enter the following:
active
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
6 Target As user oracle on the target active system, enter the following commands to delete the data files:
active
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./delete_data_files.sh
7 Target As user oracle on the target standby system, enter the following commands to delete the data files:
standby
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./delete_data_files.sh
8 Source Stop Insight on the source standby system by executing the following commands as user insight:
standby
$ cd /export/home/ems
$ ./sonusEms -d stop
9 Source If this is not the first time you have attempted to configure DR, unschedule DR monitoring on the source standby system. As root, enter the following:
standby
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
e. A message appears that identifies the ORACLE_SID setting in the user oracle’s .profile file, and then the following prompt appears:
Is this the correct ORACLE_SID value for this system and for your Insight database? (default:y) [y|Y,n|N]
Answer Y.
f. A message appears that gives the ORACLE_SID value that will need to be set on the target system. Make a note of this value.
When prompted to confirm that you will update the setting on the target system, answer Y. (You will update the setting in Steps 22 and 24.)
g. A message appears that identifies the IP address of the source HA system. Make a note of the value.
When prompted to confirm that you will use this value as the source IP address when running configureDR on the target system, answer Y. (You will enter
the source IP address in Steps 23g and 25g.)
j. When prompted to confirm the values you have entered, ensure that the listed values are correct and then answer Y.
11 Source Stop Insight on the source active system by executing the following command as user insight:
active
$ cd /export/home/ems
$ ./sonusEms -d stop
12 Source If this is not the first time you have attempted to configure DR, unschedule DR monitoring on the source active system. As root, enter the following:
active
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
e. A message appears that identifies the ORACLE_SID setting in the user oracle’s .profile file, and then the following prompt appears:
Is this the correct ORACLE_SID value for this system and for your Insight database? (default:y) [y|Y,n|N]
Answer Y.
f. A message appears that gives the ORACLE_SID value that will need to be set on the target system. Make a note of this value.
When prompted to confirm that you will update the setting, answer Y. (You will update the setting on the target system in Steps 22 and 24.)
g. A message appears that identifies the IP address of the source HA system. Make a note of the value.
When prompted to confirm that you will use this value as the source IP address when running configureDR on the target system, answer Y. (You will enter
the source IP address in Steps 23g and 25g.)
j. When prompted to confirm the values you have entered, ensure that the listed values are correct and then answer Y.
14 Source On the source active system, change to user oracle, and create a directory that has enough space to hold a backup of the Insight database.
active
Make a note of this directory pathname. You will need to use this same pathname in Steps 15, 16, 17, and 26.
15 Source As user oracle on the source standby system, create a directory that has the same pathname and size as the directory you created in Step 14.
standby
16 Target As user oracle on the target active system, create a directory that has the same pathname and size as the directory you created in Step 14.
active
17 Target As user oracle on the target standby system, create a directory that has the same pathname and size as the directory you created in Step 14.
standby
18 Source As user oracle on the source active system, enter the following:
active
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./rman_standby_backup.ksh
Enter a directory pathname for the location in which you will store the backup files. This is the directory that you created in Step 14. Do not use a softlink.
$ ./sonusEms start
$ ./sonusEms start
22 Target As user oracle on the target active system, edit the $ORACLE_BASE/.profile file so that it contains the ORACLE_SID value that was displayed in Step 10f.
active
The environment variables $ORACLE_BASE, $ORACLE_HOME, and $ORACLE_SID must be set by logging in as su - oracle and
executing the script .profile. On the source system the $ORACLE_SID value is SIDB, while at the target system the $ORACLE_SID
value is SIDR.
After modifying the file, save it. Then execute it by using one of the following methods:
Re-login as oracle
As k-shell, enter:
. .profile
As bash, enter:
e. A message appears that identifies the ORACLE_SID setting in the user oracle’s .profile file, and then the following prompt appears:
Is this the correct ORACLE_SID value the correct setting as specified when you ran ./configureDR on the DR Source system? (default:y) [y|Y,n|N]
Verify that the ORACLE_SID value displayed is the same value that was displayed in Step 10f, then answer Y.
f. A message appears that identifies the IP address of the target system. When prompted to confirm that you used this value for the target system when
running configureDR on the source system in Step 10h, answer Y.
i. When prompted to confirm the values you have entered, ensure that the listed values are correct and then answer Y.
24 Target As user oracle on the target standby system, edit the $ORACLE_BASE/.profile file so that it contains the ORACLE_SID value that was displayed in Step 10f.
standby
After modifying the file, save it. Then execute it by using one of the following methods:
The environment variables $ORACLE_BASE, $ORACLE_HOME, and $ORACLE_SID must be set by logging in as su - oracle and
executing the script .profile. On the source system the $ORACLE_SID value is SIDB, while at the target system the $ORACLE_SID
value is SIDR.
Re-login as oracle
As k-shell, enter:
. .profile
As bash, enter:
e. A message appears that identifies the ORACLE_SID setting in the user oracle’s .profile file, and then the following prompt appears:
Is this the correct ORACLE_SID value the correct setting as specified when you ran ./configureDR on the DR Source system? (default:y) [y|Y,n|N]
Verify that the ORACLE_SID value displayed is the same value that was displayed in Step 10f, then answer Y.
f. A message appears that identifies the IP address of the target system. When prompted to confirm that you used this value for the target system when
running configureDR on the source system in Step 10h, answer Y.
i. When prompted to confirm the values you have entered, ensure that the listed values are correct and then answer Y.
26 Source On the source active system, change to user oracle, and copy the contents from the source active system directory created in Step 14 and put them in the target
active active system directory created in Step 16. The pathname for the directory on the source active and the directory on the target active must be the same.
27 Source As user oracle on the source active system, copy the files from the $ORACLE_BASE/oradata/$ORACLE_SID/arch directory to the same directory on the target active
active system.
28 Source On the source active system, change to user oracle, and enter the following:
active
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./rman_restore_standby.ksh
RMAN-00569 ...
..........
Ignore following error messages as long as subsequent steps result in incrementing sequence numbers on the target database
For more information, refer to "Default Account Names and Passwords" in the “Insight Account Names and Passwords.
The $ORACLE_SID value at the Source system is SIDB and the $ORACLE_SID value at the target system is SIDR.
For example:
30 Target On the target active system, change to user oracle, and enter the following:
active
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./start_standby_database.ksh
31 Source As user oracle on the source active system, enter the following:
active
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./enable_primary_database.ksh
32 Source As user oracle on the source active system, enter the following:
active
$ ./create_archivelog.ksh
ORACLE_BASE=/export/home/oracle
ORACLE_HOME=/export/home/oracle/product/10.2.0
ORACLE_SID=SIDB
System altered.
33. Source As user oracle on the source active system, enter the following:
active
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/monitor
$ ./sequence_num_status.ksh
SOURCE_SEQUENCE
---------------
172
TARGET_ARCHIVED_SEQ TARGET_APPLIED_SEQ
------------------- ------------------
172 171
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./create_archivelog.ksh
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/monitor
$ ./sequence_num_status.ksh
1. c. Check to see if the SOURCE_SEQUENCE, TARGET_ARCHIVED_SEQ, and TARGET_APPLIED_SEQ values have all incremented from those displayed
in Step 33.
If all of the values have incremented from those displayed in Step 33, go to Step 35.
If any of the values have not incremented from those displayed in Step 33, repeat Step 34, substeps a, b, and c every few minutes until all the values have
incremented. It is not unusual for this to take 15 minutes.
If you repeat substeps a, b, and c for 15 minutes and any of the values have not incremented, contact the Sonus TAC.
# ./configureDrMonitoring
# ./configureDrMonitoring
# ./configureDrMonitoring
# ./configureDrMonitoring
39 Target Start Insight on the target active system by logging in as insight and executing the following commands:
active
$ cd /export/home/ems
$ ./sonusEms start
$ ./sonusEms start
Trying to connect to HA
This system is the Standby HA system. Only some of the Insight processes will be started.
Starting Insight!
................................................................................................
..................
Failure: Could not start the Sonus Insight server within 1231 seconds.
Killed
Failure: Could not start the Sonus Insight server within 1231 seconds.
This section describes how to setup or upgrade an Insight DR system when the source is an HA system and the
target is a non-HA system.
Prerequisite
Before setting up DR on a system with an HA source and non-HA target, all the systems need to have Insight
V09.03.00 and you need to perform the following:
The following table gives an overview for setting up DR when the source is an HA system and the target is a non-HA
system. The detailed steps for configuring DR on non-HA systems are in Setting Up DR with an HA Source and
non-HA Target.
Prerequisite: Upgrade EMS to V09.03.00 HA system and start Insight. Prerequisite: Upgrade EMS to V09.03.00 HA system and start
Insight.
1. Establish and verify communication between the source and target system.
Stop Insight.
3. Unschedule DR monitoring.
Stop Insight.
6. Unschedule DR monitoring.
7. Run configureDR.
Stop Insight.
9. Unschedule DR monitoring.
13. Create a directory that has the same pathname and size
as the directory you created in Step 11.
$ ./create_archivelog.ksh
$ ./sequence_num_status.ksh
Enter the command ./sonusEms -d stop (for Insight) to stop Insight. The -d flag indicates that both the core FM and Sonus FM processes are active even after
Insight is stopped. Since the process is active, there will not be any trap loss.
1. Target Establish and verify communication between the source and target system using the method of your choice.
and
source
$ cd /export/home/ems
$ ./sonusEms stop
3. Target If this is not the first time you have attempted to configure DR, unschedule DR monitoring on the target system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
4. Target On the target system, change to user oracle, and enter the following commands to delete the data files:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./delete_data_files.sh
5. Source Stop Insight on the source standby system by executing the following commands as user insight:
standby
$ cd /export/home/ems
$ ./sonusEms -d stop
6. Source If this is not the first time you have attempted to configure DR, unschedule DR monitoring on the source standby system. As root, enter the following:
standby
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
Source a. As root on the source standby system, navigate to the DR directory and run the configureDR script as follows:
standby
# cd /export/home/ems/conf/DR
# ./configureDR
Answer Y.
Answer N.
a) source
b) target
Answer a.
Source e. A message appears that identifies the ORACLE_SID setting in the user oracle’s .profile file, and then the following prompt appears:
standby
Is this the correct ORACLE_SID value for this system and for your Insight database? (default:y) [y|Y,n|N]
Answer Y.
Source f. A message appears that gives the ORACLE_SID value that will need to be set on the target system. Make a note of this value.
standby
When prompted to confirm that you will update the setting on the target system, answer Y. (You will update the setting in Step 18.)
Source i. When prompted to confirm the values you have entered, ensure that the listed values are correct and then answer Y.
standby
Please verify that this file does exist on the remote system.
Ensure that the file sshtestfile.nnnnn (where nnnnn represents a number) exists on the target system.
Answer Y.
(3). Ensure that the /etc/hosts.allow file has the entry sshd: ALL
If the file still does not exist, contact the Sonus TAC.
8. Source Stop Insight on the source active system by executing the following command as user insight:
active
$ cd /export/home/ems
$ ./sonusEms -d stop
9. Source If this is not the first time you have attempted to configure DR, unschedule DR monitoring on the source active system. As root, enter the following:
active
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
Source a. As root on the source active system, navigate to the DR directory and run the configureDR script as follows:
active
# cd /export/home/ems/conf/DR
# ./configureDR
Answer Y.
Answer N.
a) source
b) target
Answer a.
Source e. A message appears that identifies the ORACLE_SID setting in the user oracle’s .profile file, and then the following prompt appears:
active
Is this the correct ORACLE_SID value for this system and for your Insight database? (default:y) [y|Y,n|N]
Answer Y.
Source f. A message appears that gives the ORACLE_SID value that will need to be set on the target system. Make a note of this value.
active
When prompted to confirm that you will update the setting, answer Y. (You will update the setting on the target system in Step 19.)
Source g. A message appears that identifies the IP address of the source HA system. Make a note of the value.
active
When prompted to confirm that you will use this value as the source IP address when running configureDR on the target system, answer Y. (You will enter the source IP
address in Step 19g.)
Source i. When prompted to confirm the values you have entered, ensure that the listed values are correct and then answer Y.
active
Please verify that this file does exist on the remote system.
Ensure that the file sshtestfile.nnnnn (where nnnnn represents a number) exists on the target system.
Answer Y.
(3). Ensure that the /etc/hosts.allow file has the entry sshd: ALL
If the file still does not exist, contact the Sonus TAC.
11. Source On the source active system, change to user oracle, and create a directory that has enough space to hold a backup of the Insight database.
active
Make a note of this directory pathname. You will need to use this same pathname in Steps 12, 13, 15, and 20.
12. Source As user oracle on the source standby system, create a directory that has the same pathname and size as the directory you created in Step 11.
standby
13. Target As user oracle on the target system, create a directory that has the same pathname and size as the directory you created in Step 11.
$ ./rman_standby_backup.ksh
Enter a directory pathname for the location in which you will store the backup files. This is the directory that you created in Step 11. Do not use a softlink.
16. Source As user insight, start Insight on the source active system:
active
$ cd /export/home/ems
$ ./sonusEms start
17. Source As user insight, start Insight on the source standby system:
standby
$ cd /export/home/ems
$ ./sonusEms start
18. Target As user oracle on the target system, edit the $ORACLE_BASE/.profile file so that it contains the ORACLE_SID value that was displayed in Step 7f.
After modifying the file, save it. Then execute it by using one of the following methods:
The environment variables $ORACLE_BASE, $ORACLE_HOME, and $ORACLE_SID must be set by logging in as su - oracle and
executing the script .profile. On the source system the $ORACLE_SID value is SIDB, while at the target system the $ORACLE_SID
value is SIDR.
Re-login as oracle
As k-shell, enter:
. .profile
As bash, enter:
Target a. As root on the target system, navigate to the DR directory and run the configureDR script as follows:
# cd /export/home/ems/conf/DR
# ./configureDR
Answer N.
Answer Y.
a) source
b) target
Answer b.
Is this the correct ORACLE_SID value the correct setting as specified when you ran ./configureDR on the DR Source system? (default:y) [y|Y,n|N]
Verify that the ORACLE_SID value displayed is the same value that was displayed in Step 8f, then answer Y.
Target f. A message appears that identifies the IP address of the target system. When prompted to confirm that you used this value for the target system when running
configureDR on the source system in Step 8h, answer Y.
Enter the IP address of the source system, which was displayed in Step 7g.
What is the fully qualified path of the RAID device mount point on the other DR HA system? (i.e. /export/raid)
Enter the RAID device mount point that is on the source system.
Target i. When prompted to confirm the values you have entered, ensure that the listed values are correct and then answer Y.
There should be a zero length file on <IP address of source system> called /tmp/sshtestfile.nnnnn
Please verify that this file does exist on the remote system.
Ensure that the file sshtestfile.nnnnn (where nnnnn represents a number) exists on the source system.
Answer Y.
(3). Ensure that the /etc/hosts.allow file has the entry sshd: ALL
If the file still does not exist, contact the Sonus TAC.
20. Source On the source active system, change to user oracle, and copy the contents from the source system directory created in Step 11 and put them in the target system
active directory created in Step 13. The pathname for the directory on the source and the directory on the target must be the same.
21. Source As user oracle on the source active system, copy the files from the $ORACLE_BASE/oradata/$ORACLE_SID/arch directory to the same directory on the target system.
active
$ ./rman_restore_standby.ksh
Ignore the following error messages as long as subsequent steps result in incrementing the sequence numbers on the target database.
ORA-01547: warning: RECOVER succeeded but OPEN RESETLOGS would get error below
For more information, refer to the “Insight Account Names and Passwords”, Appendix C.
b. Copy the following password file from the Source Active system and paste it to the Source Standby system and the Target system.
For example:
24. Target On the target system, change to user oracle, and enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./start_standby_database.ksh
25. Source As user oracle on the source active system, enter the following:
active
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./enable_primary_database.ksh
26. Source As user oracle on the source active system, enter the following:
active
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./create_archivelog.ksh
ORACLE_BASE=/export/home/oracle
ORACLE_HOME=/export/home/oracle/product/10.2.0
ORACLE_SID=SIDB
System altered.
$ ./sequence_num_status.ksh
SOURCE_SEQUENCE
---------------
172
TARGET_ARCHIVED_SEQ TARGET_APPLIED_SEQ
------------------- ------------------
172 171
28. Source As user oracle on the source active system, perform the following:
active
a. Enter the following again:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./create_archivelog.ksh
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/monitor
$ ./sequence_num_status.ksh
c. Check to see if the SOURCE_SEQUENCE, TARGET_ARCHIVED_SEQ, and TARGET_APPLIED_SEQ values have all incremented from those displayed in Step
27.
If all of the values have incremented from those displayed in Step 27, go to Step 29.
If any of the values have not incremented from those displayed in Step 27, repeat Step 28, substeps a, b, and c every few minutes until all the values have incremented.
It is not unusual for this to take 15 minutes.
If you repeat substeps a, b, and c for 15 minutes and any of the values have not incremented, contact the Sonus TAC.
29. Source As root on the source active system, enter the following:
active
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
30. Source As root on the source standby system, enter the following:
standby
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
32. Target Start Insight on the target system by logging in as insight and executing the following commands:
$ cd /export/home/ems
$ ./sonusEms start
The section provides an introduction to the new upgrade framework, various upgrade paths, and upgrade scenarios
Topics include:
Scenario Description
Single Insight Server You can upgrade a Standalone Insight software by using the Insight installation script and
Upgrade from Sonus the Sonus Operating System patch from the Sonus Salesforce Customer Portal.
Salesforce Customer
Portal
High Availability System You can upgrade a High Availability Insight software using the Sonus Salesforce Customer
Upgrade using SalesForce Portal.
Customer Portal The Insight High Availability (HA) feature provides for the automatic switchover from an
active Insight system to a standby system in the event the active system fails, thereby
minimizing any downtime in your management capabilities.
When an existing network is to be upgraded, use the following upgrade sequence for the network elements that will
be upgraded:
1. Obtain the required software licenses for additional software modules you will be adding. For more
information on Insight licenses, see Licenses for Enabling Insight API, Insight CLI, SMS API, SGX API,
Lawful Intercept Provisioning API, and Traffic Manager. You will apply the licenses in Step 9.
2. Upgrade the Insight Element Management System server software.
When upgrading a system that is running HPC, avoid loss of HPC service by installing and
activating the HPC license (NW-HPC) after you upgrade Insight and before you upgrade PSX. See
the Insight EMS User Guide for details.
After you upgrade (or downgrade) software on a Sonus node (PSX, SGX, GSX, etc.), a user with
administrative privileges must rediscover the node in the Insight Administration page: in the Node
tab, select a node from the Sonus Managed Nodes list, and click the Discover button. Failure to
perform this rediscovery will result in the loss of Traffic Manager reporting and may result in
excessive error generation in the error logs (particularly in the case of a downgrade).
9. Apply the required licenses. For more information on Insight licenses, see Licenses for Enabling Insight API,
Insight CLI, SMS API, SGX API, Lawful Intercept Provisioning API, and Traffic Manager.
This section addresses installation and/or upgrade of Insight only. For instructions on installing/upgrading
other network elements, consult the appropriate element guides.
General Prerequisites
Prerequisite for Rollback Using Disk Mirroring
Downloading EMS Bootstrap file for EMS DR Upgrade
General Prerequisites
Verify/perform the following items prior to upgrading the Insight system to V09.03.00:
You have read "Insight Upgrade Considerations".
You have read the latest Sonus Insight release notes for important information.
Download the latest version of EMS documents from the Sonus Salesforce Customer Portal.
You have super user (root) access on the Solaris system.
You should be aware of the Insight account and default passwords. For more details, see Default Account
Names and Passwords.
Sonus_OS_delta_9.3_Upgrade.tar.gz Mandatory
EMS_SonusDBPackage_solaris-V09.03.00R000.tar Mandatory
Solaris_Utilities_<current_release_name>.tar Mandatory
emsBootstrap-V09.03.00R000.tar Mandatory
EMS.V09.03.00R000.tar.Z Mandatory
SSGUI_V09.03.00R000.tar Optional
For Rollback using disk mirroring, you need to do the following setup:
1. If you experience any issues in your production network following an upgrade, you can return to the previous
version of Insight using disk mirroring.
Rollback using disk mirroring is supported only on Netra T5220 devices with 4 disks
a. The following mirrors are available where disks 0, 1 are master disks and 2,3 are slave disks.
Before upgrading, following mirrors are set up:
Disk 0 -> Disk 2
Disk 1 -> Disk 3
Refer section Enabling Disk Mirroring for enabling disk mirroring.
b. If you intend to use Disk mirroring as a rollback option, then make sure that mirroring is enabled, and
that the mirrors are in sync, using 'metastat -c' command.
This should be done before performing any upgrade related tasks.
Please note that using Disk mirroring as rollback option will require physical access to the
system, in case of upgrade failure, to swap the disks.
c. After verifying that mirrors are in sync, detach the mirrors, so that mirroring no longer takes place.
Refer to Detaching Slave Disks from the Mirror.
Detaching disk mirroring enables you to recover original EMS installation in case of upgrade failure.
Here are the steps to download the EMS Bootstrap file: emsBootstrap-V09.03.00R000.tar from Sonus
Salesforce Customer Portal and place the file in the EMS server:
# mkdir -p /export/home/install/ems/
3. Download the emsBootstrap-V09.03.00R000.tar file from the Sonus Salesforce Customer Portal to
/export/home/install/ems/
4. Untar the emsBootstrap-V09.03.00R000.tar file by entering the following command:
# tar xf emsBootstrap-V09.03.00R000.tar
5. Ensure that all the extracted files have owner and root privileges by entering:
# ls -l
# chown -R root:root *
The manual tar extraction should be done only in case of Solaris standalone EMS.
This section describes the procedure to perform an Insight Standalone upgrade using the bootstrap
emsBootstrap-V09.03.00R000.tar file that you obtain from the Sonus Salesforce Customer Portal.You should
perform the following procedure to upgrade Insight Standalone on a Netra T5220 systems.
Before upgrading using Sonus Salesforce Customer Portal, you need to take a backup of /etc/inet/nt
p.conf and /etc/issue files. You can restore this after completing the upgrade.
Topics include:
Download the following files from Sonus Salesforce Customer Portal to perform the Insight Upgrade.
Here are the steps to download the Solaris Operating System file Sonus_OS_delta_9.3_Upgrade.tar.gz
For upgrading the Insight to V09.03.00, the Solaris Operating System patch version must be
Generic_150400-20.
# uname -v
Read the output, if the following line appears, the Solaris OS patch has been already installed, and you can
skip the remaining steps.
Generic_150400-20
If the output does not match the message above, you need to install the Solaris OS patch.
2. Download the Sonus_OS_delta_9.3_Upgrade.tar.gz file from the Sonus Salesforce Customer Portal to
the /export/home on the target server.
# cd /export/home/packages
# unzip 147309-09.zip
If the packages are not at least version 1.6.2, then proceed the remaining steps, otherwise no need upgrade
the SNMP software and skip the remaining steps.
# mkdir -p /export/home/tmp
# cd /export/home/tmp
# cd UTILITIES_<current_release_name>
For upgrading the Insight to V09.03.00, the Oracle Database version should be 11.2.0.3.0 with the latest
security patch 19271438. Even if the existing database version is 11.2.0.3.0, verify and ensure that you
upgrade to the latest security patch 19271438.
su - oracle
sqlplus -version
If the following line appears, the Oracle Database 11.2.0.3.0 is installed. Even if DB version is
11.2.0.3.0, verify if the latest security patch has been installed.
If the output does not match the message above, you need to upgrade the Oracle Database.
2. Execute the following command to verify if the latest Security Patch Update (SPU) has been applied or not:
a. Login as user oracle by entering the following command:
su - oracle
b. Enter the following command to verify the latest Security Patch Update (SPU) version is applied on the
system:
If the following line appears, the required Oracle Security Patch has been already installed, and you
can skip the remaining steps.
If the command output does not match the latest Security Patch Update (SPU) version 19271438 then
you need to upgrade the Oracle Database.
# uncompress EMS.V09.03.00R000.tar.Z
# tar xvf EMS.V09.03.00R000.tar
The manual tar extraction should be done only in case of Solaris standalone EMS.
Before upgrading Insight, you need to take a backup of /etc/inet/ntp.conf and /etc/issue files.
You can restore this after completing the upgrade.
During the execution of the preinstall.pl script, several files and DB entries are backed-up in the
following directories:
/export/home/ems/weblogic/sonusEms/data/cli/scripts
/export/home/ems/weblogic/sonusEms/data/pm_archive : Performance CSV files
This can increase the upgrade duration. If need to reduce the upgrade time, contact Sonus TAC.
The Insight upgrade may fail if there is insufficient space in the following directories:
/export/home/ems
/var
/tmp
Contact Sonus TAC for troubleshooting this issue.
/usr/bin/script -a <Log_file_name>
perl preInstall.pl
The preInstall script collects the current configuration details of the machine. The following message
appears:
************************************************************
EMS preInstall.pl for target release version V09.03.00R000
** Run this script BEFORE upgrading current EMS system
** (Press ENTER to select default values shown in braces)
*******************************************************
Starting preInstall.pl execution on : Tuesday, August 2, 2011 10:05:06 AM EDT
Upgrade from current version of EMS "XXXXXXX" to EMS release version "XXXXXX"
is not supported.
Please contact Sonus Customer Support for additional information on supported
Insight Upgrade Paths.
Do you want to proceed with the upgrade procedure (y/n/Y/N)? (default:N):
Enter N, if you want to stop the upgrade procedure. Or Enter Y, if you want to continue the upgrade
procedure.
Running checkInstallation.pl...
Starting checkInstallation.pl execution on : Friday, October 14, 2011 6:22:49
AM EDT
Checking server boot mode...
Verified server boot mode.
Checking "SONSems" package installation...
Package "SONSems" is installed.
Checking user account "oracle"
.
.
.
.......................................................
The following anomalous settings/conditions were detected.
These do not necessarily mean that there is a problem but they might warrant
further investigation:
...................................................
.................................................
......................................................................................Complete
checkInstallation.pl execution on : Tuesday, July 12, 2011 9:38:20 AM
checkInstallation.pl has identified some potential issues.
Press Ctrl + c, if you want to exit from the script. Or Press Enter to continue.
7. The following prompt appears:
Sonus recommends you to take a backup of the system if you need to rollback to the current
version.
8. If you have selected Y in the above prompt, the following prompt appears:
Do you wish to import User Activity Logs, PM Stats and TrunkGroup Tables
(please note that this may take some time) (y/n/Y/N)? (default:Y):
Enter Y, if you want to import the Activity Logs, PM Stats and TrunkGroup Tables.
Or
Enter N, if you do not want to import the Activity Logs, PM Stats and TrunkGroup Tables.
9. The following prompt appears:
Do you want to take the backup of Performance CSV files (y/n/Y/N)? (default:N)
If you want to take a backup of the Performance CSV files from a different location, enter the location details.
Or
Enter N, if you do not want to take a backup of the Performance CSV files.
The following message appears:
Enter Y, if you want to push the backup files to the remote host.
You will be prompted to enter the following details:
Remote sftp host name or IP
Username for sftp
Login Password
Directory on remote host
Or
Enter N, if you do not want to push the backup files to the remote location.
12. The following prompt appears:
preInstall is complete. Download the required tar file from Sonus SalesForce
Customer Portal and untar under current directory and run mainInstall.pl to
continue.
Completed preInstall.pl execution on : Tuesday, October 18, 2011 2:53:30 AM
EDT.
If the script indicates that you should upgrade the Operating System and Oracle, upgrade the same using "
Upgrading the Third Party Software".
If you have not installed or upgraded the latest Third Party Software versions on your system, then perform the
following:
The ILOM firmware upgrade procedure must be done before you perform Oracle upgrade and EMS
application upgrade.
If you are upgrading to Insight V09.03.00, the Solaris Operating System patch version should be
Generic_150400-20. Installing the Solaris Patch may approximately take 90 minutes. Before upgrading the
Solaris Patch, you need to determine the Solaris Patch Level.
# uname -v
Generic_150400-20
If the output does not match the previous message, install the Solaris OS patch.
You can copy the solaris OS patch from the Sonus SalesForce Customer Portal and then perform an upgrade.Copy
the Solaris OS patch Sonus_OS_delta_9.3_Upgrade.tar.gz from the Sonus Salesforce Customer Portal to a
location on the target server (example, /export/home).
$ /export/home/ems/sonusEms stop
$ sqlplus /nolog
SQL> conn / as sysdba
SQL> shutdown immediate
SQL> exit
$ exit
Do not use the /bin/csh or /bin/tcsh shells to install the Solaris patch cluster (the cluster will
not install correctly with those shells). Use one of the following shells: /bin/sh, /bin/bash, or
/bin/ksh.
Installation of patches should be performed using single user mode and should be performed
using terminal server port connection.
2. When the system prompt appears, issue the following command to reboot the system:
# reboot -- -s
3. Enter the root user password when the following prompt appears
Root password for system maintenance (control-d to bypass):
4. As root user, enter the following:
# mount /export/home
5. Perform the following steps to create the OS directory and extract the
Sonus_OS_delta_9.3_Upgrade.tar.gzfile.
a. Extract the downloaded Sonus_OS_delta_9.3_Upgrade.tar.gz file by using the following
commands:
6. After the Sonus_OS_delta_9.3_Upgrade.tar.gz file is extracted, remove the tar file to free-up disk
space.
# rm -f Sonus_OS_delta_9.3_Upgrade.tar
# cd /export/home/Sonus_OS_delta_9.3_Upgrade
# ./upgrade.sh
# reboot -- -r
The output is displayed as follows before the system logs out to reboot:
Creating boot_archive for /var/run/.patch_root_loopbackmnt
updating /var/run/.patch_root_loopbackmnt/platform/sun4v/boot_archive
15+0 records in
15+0 records out
Then log on to the server after few minutes to verify the latest patch cluster.
10. To verify that the latest Solaris OS patch, enter:
# uname -v
11. Remove the OS package directory to reclaim space, by executing the following command:
# rm -rf /export/home/Sonus_OS_delta_9.3_Upgrade
If you are upgrading Insight using the Sonus Salesforce Customer Portal, you need to upgrade the SNMP
Management Agent to version 1.6.2.
To determine the current version of the SNMP Management Agent, perform the following procedure:
1. Login as root.
2. Change to the directory containing the extracted cluster by entering:
# cd export/home/tmp/UTILITIES_<current_release_name>/SNMP_1.6.2
# /etc/init.d/masfd stop
4. Run the SNMP agent upgrade script. The script removes the old packages and installs the new packages.
# ./install.sh
5. Verify that the packages have been updated by entering the appropriate command. If the packages were
properly installed, the versions should be 1.6.2.
# /etc/init.d/masfd start
The changes on the SNMP daemon will take two minutes to start.
7. Confirm that the SNMP agent is running by entering:
If you are upgrading Insight using the Sonus Salesforce Customer Portal, you need to upgrade the ILOM firmware.
To determine the current version of the system firmware, perform the following steps:
2. If system firmware version is not at 7.4.7, then perform Upgrading System Firmware.
Do not downgrade the version of the system firmware. Doing so would result in ILOM no longer working,
requiring you to replace hardware.
If any error occurs during the firmware upgrade, you can reset the Service Controller through ILOM CLI
using the resetsc command:
sc> resetsc
If this command also fails, contact your next level of Sonus Support.
Perform the following procedure to upgrade the system firmware using the CLI:
# cd /export/home/packages
# unzip 147309-09.zip
# cd /export/home/packages/147309-09
# ./sysfwdownload Sun_System_Firmware-7_4_7-Netra_T5220.pkg
# shutdown -i0
5. Establish a connection to the Service Processor via ssh or using the Serial Console port.
Ok prompt appears. At the ok prompt, access the System Controller CLI by using the console escape
characters.
The character sequence "#." is usually used.
{0} ok #
.
You can see one of the following three prompts depending on from where you got into OS console.
a. login:
b. {0} ok
Serial console stopped.
–>
c. {0} ok
Serial console stopped
sc>
6. After performing step 5, If you are landed in option a.login:(login) prompt:
a. Login using the user name/password as root/changeme.
The following message is displayed:
b. Check whether the admin user is created by executing the following command:
-> cd /SP/users/
-> ls
-> cd /SP/users/
-> ls
create /SP/users/admin
The following message is displayed:
Creating user...
Enter new password: ********
Enter new password again: ********
Created /SP/users/admin
-> set /SP/users/admin role=Administrator
Set 'role' to 'Administrator'
-> set /SP/users/admin cli_mode=alom
Set 'cli_mode' to 'alom'
Are you sure you want to power off the system [y/n]? y
12. Ensure that your virtual keyswitch setting is not in the LOCKED position.
You can check the setting from the Service Processor CLI with the following command:
sc> showkeyswitch
If the virtual key switch is in LOCKED position you can change that with the
following command:
sc> setkeyswitch -y normal
ORACLESP-1116FM901F login:.
14. Log into the ALOM CLI shell (indicated by the -> prompt) from the ALOM login prompt. Login as admin user.
sc> poweron
sc> Chassis | major: Host has been powered on
16. To go to console, type console on the sc prompt. Login to console as root user.
sc> console
Enter #. to return to ALOM.
Done
0:0:0>Network Interface Unit Port 0 Tests ..Done
0:0:0>Network Interface Unit Port 1 Tests ..Done
0:0:0>Extended Memory Tests....Done
ChassisSerialNumber 0833FM9007
A series of events appear till the console login comes.
.................................
activity, system personnel may provide the |
| evidence of such monitoring to law enforcement officials. |
|-----------------------------------------------------------------|
console login: root
password:
17. Verify whether the software firmware is upgraded by entering the following command:
If you receive a warning message "showmount:RPC: Rpcbind failure - RPC: Unable to receive",
while performing upgrade, you can ignore the warning message.
You can also upgrading using the Web Interface. If the system firmware version is less than V7.4.7, perform the
following procedure to update the system firmware with the Web interface.
Perform the following procedure to update the system firmware with the Web interface:
Ignore the following errors, unless ORACLE UPGRADE fails. The following errors are seen on trace/alert
log files which is present under: $ORACLE_BASE/admin/SIDB/udump/diag/rdbms/sidb/$ORACLE_S
ID/trace
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
Before performing a database software upgrade, login as user 'insight' and stop EMS and all its processes
by performing the following steps:
$ cd /export/home/ems
$ ./sonusEms stop
If the preInstall.pl displays an earlier oracle version earlier than 11.2.0.3.0 or if you have not
applied the latest Security Patch Update then follow the below procedure to upgrade the database to 11.2.
0.3 and apply the latest Security Patch Update (SPU).
# cd /export/home/install/ems/oracle
# ./UpgradeOracle.sh
The UpgradeOracle.sh script upgrades the Oracle and starts the Oracle. This script takes
approximately one hour to complete.
# cd /export/home/oracle
# rm -f EMS_SonusDBPackage_solaris-V09.03.00R000.tar
2. In order to produce a log of the upgrade, use the /usr/bin/script command to create a record of the
terminal session. This command creates a sub-shell where you run the installation.
When it completes, type exit to terminate the script command.
As super user, enter the following command:
/usr/bin/script -a <Log_file_name>
perl mainInstall.pl
*******************************************************
** EMS mainInstall.pl for target release version V09.03.00R000
**
** Run this script AFTER executing preInstall.pl and following instructions
from preInstall.pl
********************************************************************************Starting
mainInstall.pl execution on : Friday, April 04, 2014 5:15:15 AM EDT.
Enter Y if you want to download the file from the remote host. You will be prompted to enter the following
details:
- Remote sftp host name or IP
- Username for sftp
- Login Password
- Directory on remote host
Or
Enter N, if you do not want to download the file from the remote host using the script.
You have to download the <host_name>.emsConfig.tar file manually and place it at
/export/home/backup.
Enter Y if you want to download the file from the remote host. You will be prompted to enter the following
details:
- Remote sftp host name or IP
- Username for sftp
- Login Password
Or
Enter N, if you do not want to download the file from the remote host using the script.
You have to download the <host_name>.backupData.tar file manually and place it at
/export/home/backup.
If you have not upgraded the Solaris and Oracle to the recommended versions before running the
mainInstall.pl script, the script will indicate the same and terminate. You must upgrade the Solaris
and Oracle to the required version and re-run the script.
For information on installing the Solaris Patch and Oracle Database and any other Third party software, refer
to Upgrading the Third Party Software.
The following message appears, if Solaris OS and Oracle are not upgraded:
The script will continue importing data and then restart EMS. The procedure may take around 60 minutes for
an 80 MB DB data.
If you need to deploy it, please run the following script as 'root' user:
/export/home/ems/conf/deployLNPApplication.sh
8.
********************
Uninstalling SONSems
********************
The uninstall may take several minutes to complete if there are many PM
archive files.
10. After the mainInstall.pl execution is complete, it indicates the same and instructs you to run the
postInstall.pl.
perl postInstall.pl
*******************************************************
** EMS postInstall.pl for target release version V09.03.00R000
If SGX4000 device is configured on pre-V09.03.00 Insight system, you have to perform the following
procedure during data migration from any pre-V09.03.00 Insight system to Insight V09.03.00.
1. a. Login to Insight.
b. Navigate to Network Mgmt > Insight Administration.
c. Select the registered SGX4000 node from the Navigation tree.
d. Modify and Update the following (default) values if required.
i. SSH Port
ii. Login (CLI)
iii. Password (CLI)
e. Click on Update and then click on Discover node.
If you experience any issues in your production network following an upgrade, you can return to the previous version
of Insight by using the following procedure:
1. Pre-requisites for Rollback using Disk Mirroring are completed successfully prior to start of upgrade.
2. If upgrade fails to complete successfully, perform the following to roll back to old EMS version.
a. Stop Insight EMS by executing the following command:
# conf="/opt/SONSdmems/config/platform_T5220-4.conf"
# echo "`grep \"svm.slave.disk\" $conf|head -1|awk -F= '{print $2}'|tr -d
' '`s0"
c. Edit /mnt/etc/vfstab
In order to preserve previous release config, the previous (before mirroring was first setup) vfstab file
need to be restored.
# cd /mnt/etc
# cp -p vfstab.orig vfstab
# chown root:sys vfstab
Find the disk labels for disks at slots 0 and 1 using following command:
# echo | format
d. Edit /mnt/etc/system as root user and delete the following lines if present:
# cd
# umount /mnt
# init 5
Disks initially at slots 0 and 1 should be inserted back to slots 2 and 3. Otherwise, it
will result in system booting in maintenance mode.
# metastat -c
d201 m 60GB d21
d21 s 60GB c1t1d0s1
d200 m 219GB d20
d20 s 219GB c1t1d0s0
d106 m 2.0GB d16
d16 s 2.0GB c1t0d0s6
d105 m 50GB d15
d15 s 50GB c1t0d0s5
d104 m 202GB d14
d14 s 202GB c1t0d0s4
d103 m 4.0GB d13
d13 s 4.0GB c1t0d0s3
d100 m 5.0GB d10
d10 s 5.0GB c1t0d0s0
d101 m 15GB d11
d11 s 15GB c1t0d0s1
d41 s 60GB c1t3d0s1
d40 s 219GB c1t3d0s0
d36 s 2.0GB c1t2d0s6
d35 s 50GB c1t2d0s5
d34 s 202GB c1t2d0s4
d33 s 4.0GB c1t2d0s3
d31 s 15GB c1t2d0s1
d30 s 5.0GB c1t2d0s0
h. Dump device need to be set to the original device (e.g. /dev/dsk/c1t0d0s1 for the example above)
# dumpadm -d /dev/dsk/c1t0d0s1
i. If you need to restart disk mirroring, clear the metadb and enable the disk mirroring using dmctl. The
mirrors can be cleared using command metaclear
# metaclear d41
# metaclear d40
# metaclear d36
# metaclear d35
# metaclear d34
# metaclear d33
# metaclear d30
# metaclear d31
# metaclear -r d201
# metaclear -r d200
# metaclear -r d106
# metaclear -r d105
# metaclear -r d104
# metaclear -r d103
# metaclear -r d100
# metaclear -r d101
j. Execute the following command to list all the existing metadb state database replicas.
# metadb
k. Clear all the metadb state database replicas using the following command:
l.
m. Execute following command to verify that all mirroring configurations are cleared. These commands
should not display any database replicas.
# metastat -c
# metadb -i
There will be downtime during the procedure since server will be rebooted as part of re-enabling disk
mirroring.
Perform the following procedure to install the latest version of PSX Manager GUI:
# mkdir -p /export/home/install/
3. Download the SSGUI_V09.03.00R000.tar file from Sonus SalesForce Customer portal to local system.
4. Copy the SSGUI_V09.03.00R000.tar file from the local system to the /export/home/install/
directory on the Insight EMS server.
5. Change the directory to /export/home/install/ by executing the following command:
# cd /export/home/install/
# cd /export/home/install/SSGUI
8. Execute the GuiClient.sh script as a super root user. The GuiClient.sh script installs the SONSpsx
package.
# ./GuiClient.sh
# pkginfo -l SONSpsx
HA State Verify that the HA is configured correctly and EMS is up and running.
File Transfer The Solaris OS and Oracle DB related files are transferred to each of the host’s reachable IP only through
scp command.
emsbootstrap Download the Insight EMS installer file from the Sonus SalesForce Customer Portal and place it at
Download /export/home
For example:
Insight Ensure that the passwords for “insight” system user is same on both the systems.
Passwords
To verify the passwords, enter the following command:
$ ssh insight@<PEER_REACHABLE_IP>
Connection to the peer should be successful by entering the same passwords on both the systems.
Hardware Ensure that your system meets the minimum hardware requirements.
Requirements
For more details, see Hardware Requirements and Other Restrictions for HA DR.
CSV files The upgrade script will restore all csv from
/export/home/ems/weblogic/sonusEms/data/pm_archive on the configured Active
system, if the user enters 'y' to PM retention in Step 1 - Verifying system configuration - Standby
system of the HA Upgrade.
Any csv in the /export/home/ems/weblogic/sonusEms/data/pm_archive on the
configured Standby will not be retained. You have to manually tar up and then back the tar file
to a different location, before the upgrade and restore it after upgrade if required.
Any csv written to a non-standard directory other than (
/export/home/ems/weblogic/sonusEms/data/pm_archive) will not be retained, even if
it is on the Active or Standby system.
It is recommended to export the PM collection on the RAID directory (
/export/home/ems/weblogic/sonusEms/dataRaid/pm_archive), so that the csv files
are always preserved during upgrade.
Insight For information on the latest supported upgrade paths, refer to the 550-05917_Insight_9.3_Release_Notes for
Upgrade Solaris.
Paths
Download the latest version of EMS documents from the Sonus Salesforce Customer Portal.
Sonus_OS_delta_9.3_Upgrade.tar.gz Mandatory
EMS_SonusDBPackage_solaris-V09.03.00R000.tar Mandatory
Solaris_Utilities_<current_release_name>.tar Mandatory
EMS.V09.03.00R000.tar.Z Mandatory
SSGUI_V09.03.00R000.tar Optional
If you experience any issues in your production network following an upgrade, you can return to the previous version
of Insight using disk mirroring.
For Rollback using disk mirroring, you need to do the following setup:
Rollback using disk mirroring is supported only on Netra T5220 devices with 4 disks
1. The following mirrors are available where disks 0, 1 are master disks and 2,3 are slave disks.
Before upgrading, following mirrors are set up:
a. Disk 0 -> Disk 2
b. Disk 1 -> Disk 3
See Enabling Disk Mirroring-DR Solaris for enabling disk mirroring.
2. If you intend to use Disk mirroring as a rollback option, then make sure that mirroring is enabled, and that the
mirrors are in sync, using 'metastat -c' command.
This should be done before performing any upgrade related tasks.
Please note that using Disk mirroring as rollback option will require physical access to the system, in
case of upgrade failure, to swap the disks
3. After verifying that mirrors are in sync, detach the mirrors, so that mirroring no longer takes place. See
Detaching Slave Disk from the Mirror-DR Solaris.
Detaching disk mirroring enables you to recover original EMS installation in case of upgrade failure.
4. Backup the files on RAID
As user root, login to the Active server and make a backup copy of the RAID directories. This will be used in
case of rollback:
# ls -ltr /export/raid
drwx------ 2 root root 8192 May 24 11:20 lost+found
drwxrwxr-x 3 oracle dba 512 May 24 14:27 orasql
drwxrwxr-x 3 oracle dba 512 May 24 14:27 oradata
drwxr-xr-x 3 insight insight 512 May 24 14:37 Omnibus
drwxr-xr-x 4 root root 512 May 24 15:44 sonusEms
# cd /export/raid
# cp -pR orasql orasql_old
# cp -pR oradata oradata_old
# cp -pR Omnibus Omnibus_old
# cp -pR sonusEms sonusEms_old
Download the following files from the Sonus Salesforce Customer Portal to perform the Insight Upgrade.
2. Read the output, if the following line appears, the Solaris OS patch has been already installed, and you can skip the
remaining steps.
Generic_150400-20
If the output does not match the message above, you need to install the Solaris OS patch.
3. Download the Sonus_OS_delta_9.3_Upgrade.tar.gz file from the Sonus Salesforce Customer Portal to the
/export/home on the target server.
4. Specify the location as /export/home.
5. Unarchive the Solaris OS patch file by executing the following command:
# gzip -dc /export/home/Sonus_OS_delta_9.3_Upgrade.tar.gz | tar xf -
For upgrading the Insight to V09.03.00, the Oracle Database version should be 11.2.0.3.0 with
the latest security patch 19271438. Even if the existing database version is 11.2.0.3.0, verify and
ensure that you upgrade to the latest security patch 19271438.
su - oracle
sqlplus -version
If the following line appears, the Oracle Database 11.2.0.3.0 is installed. Even if DB version is 11.2.0.3.0, verify
if the latest security patch has been installed.
If the output does not match the message above, you need to upgrade the Oracle Database.
2. Execute the following command to verify if the latest Security Patch Update (SPU) has been applied or not:
a. Login as user oracle by entering the following command:
su - oracle
b. Enter the following command to verify the latest Security Patch Update (SPU) version is applied on the system:
If the following line appears, the required Oracle Security Patch has been already installed, and you can skip
the remaining steps.
If the command output does not match the latest Security Patch Update (SPU) version 19271438 then you
need to upgrade the Oracle Database.
3. Download the Solaris_Utilities_<current_release_name>.tar from the Sonus Salesforce Customer Portal to /export/ho
me/tmp.
4. Change to the temporary directory by entering:
# cd /export/home/tmp
# cd UTILITIES_<current_release_name>
This section describes the procedure for upgrading, using the tar files that is obtained from the Sonus Salesforce
Customer portal.
Installer.tar — The installer file EMS.V09.03.00R000.tar.Z is used while upgrading Insight using the Sonus
Salesforce Customer Portal. The installer file includes the bootstrap file emsBootstrap-V09.03.00R000.tar
Hence, you need not download the bootstrap file separately. The size of the Installer file is over 3GB.
If you are upgrading Insight using the Sonus Salesforce Customer Portal, see "Obtaining Installer file to
upgrade Insight using SalesForce Customer Portal"
The following section describes the procedure for obtaining the Installer file to upgrade Insight using the Sonus
Salesforce Customer Portal.
# script -a /export/home/`hostname`.script.log
# cd /tmp/
# tar xvf /export/home/EMS.V09.03.00R000.tar commonFunctions.sh
# bash commonFunctions.sh extractTar /export/home
4. Enter y, if you want to extract the tar file to the staging directory.
The following message appears:
The List of upgrade steps and approximate time duration table lists an overview of the sequential steps and the
approximate time duration required for performing each step.
Sequence System which owns Well known IP Active Standby Time Duration
No (A-Active, S-Standby) (approximate)
1. A checkSystem 5 minutes
2. A checkSystem 5 minutes
3. A makeStandalone 15 minutes
6 hours - Upgrade
using Sonus
SalesForce
5. A pushFiles 15 minutes
6. A restoreDatabase 2 hours
7. * makeStandalone 15 minutes
8. * makeStandby 30 minutes
10. S pushFiles
'*' denotes the steps during which the HA EMS server is down.
'A' denotes the steps where the well-known IP is owned by the Active EMS.
'S' denotes the steps where the well-known IP is owned by the Standby EMS.
After performing all the steps listed, you need to perform the Setting up peer root connection on both
the Active and Standby systems.
This section describes how to upgrade Insight HA using the following steps.
Ensure that all commands are run from /export/home/install/ems and run as root.
Topics include:
To verity the system configuration, you need to run./emsUpgrade.sh checkSystem on the Standby system.
This script checks, collects and displays the system configuration settings. Additionally it also prompts you to enter
the details such as the type of upgrade or status of the PM data and so on.
However, the configuration changes are not performed during this step.
# cd /export/home/install/ems
# ./emsUpgrade.sh checkSystem
This step will check, collect and display some system configuration settings.
No configuration changes will be made to the system during this step.
----------------------------------------------------------------------------------------------
EMS can be upgraded via either of the options
below:
1. FTP -In-place upgrade from SalesForce Portal (custom non-EMS
settings are retained)
2. JUMPSTART -USB/HDD upgrade (custom non-EMS settings may be lost)
This option selection can NOT be changed once the upgrade process starts.
Which option do you plan to use? [1|2]:1
EMS V09.03.00 Software Release does not support Jumpstart installation and upgrade using USB.
If you want to use EMS V09.03.00 Software for Solaris platform, you must upgrade using Sonus
Salesforce to EMS Software Release V09.03.00. EMS Software Release V09.03.00 only supports
FTP Inplace upgrade from Salesforce portal for Solaris platform.
Checking HA states...
Getting peer host IP address from config
Peer host's reachable IP address is 10.54.58.101
Checking if peer host 10.54.58.101 can be pinged...
Setting up connection to HA peer. You may be prompted for remote 'insight'
user's password.
.......................................................
......................................................
Testing peer connection, getting remote hostname
Getting some system info...
Following settings are being used for this upgrade:
................................................
This HA (Standby) host ......: ems3
Peer HA (Active) host ......: ems2
PM Statistics Retention .....: YES (Longer upgrade downtime)
Database Software Upgrade ...: No
Do you want to proceed with getting configuration info? (default: n) [y|n]:
y
/export/home/ems/weblogic/sonusEms/data/cli/scripts
This can increase the upgrade duration. If need to reduce the upgrade time, contact Sonus TAC.
The Insight upgrade may fail if there is insufficient space in the following directories:
/export/home/ems
/var
/tmp
----------------------------------------------------------------------------------------------
END: Running preInstall.pl script [GET_CONFIG], at Wednesday, August 14, 2013
3:58:10 PM IST ***
Successfully completed run of preInstall.pl script to collect config
Completed running preInstall (Phase: GET_CONFIG) script, verified backup tar
files.
..............................................................................................
copied install settings file to peer .......
Setting right perms for backup dir
Completed getting system configuration before upgrade.
Carefully inspect the output of preInstall.pl script run in the previous step. If you see any errors
on the console, do not proceed with the next steps of HA upgrade.
To verify the system configuration on the Active system, follow the same procedure as listed in Step 1 Verifying
system configuration - Standby system.
However, in the Active System, you are not prompted for additional information such as the type of upgrade.
# cd /export/home/install/ems
# ./emsUpgrade.sh checkSystem
The steps for running the checksystem script on Active is similar to Standby.
To convert the HA Standby System into a Standalone, run./emsUpgrade.sh with argument makeStandalone.
This step points to the database on the Standby system from the RAID drive to the local disk. This is performed to
prepare the upgrade of the Standby system.
1. Enter the following command to make the HA Standby system into a Standalone.
# ./emsUpgrade.sh makeStandalone
Upgrade using the Sonus Salesforce Customer Portal and upgrade the third party software and continue to the next
step (Step 4b). For details, see "Upgrading the Third Party Software".
You can perform both Upgrading the Standby (Step 4a) and Performing the DB backup on the active system (Step
4b) simultaneously.
If you have not installed or upgraded the latest Third Party Software versions on your system, then perform the
following:
The ILOM firmware upgrade procedure must be done before you perform Oracle upgrade and EMS
application upgrade.
# uname -v
Generic_150400-20
If the output does not match the previous message, install the Solaris OS patch.
You can copy the Solaris OS patch from the Sonus Salesforce Customer Portal and then perform an upgrade.Copy
the Solaris OS patch Sonus_OS_delta_9.3_Upgrade.tar.gz from the Sonus Salesforce Customer Portal to a
location on the target server (example, /export/home).
$ /export/home/ems/sonusEms stop
$ sqlplus /nolog
SQL> conn / as sysdba
SQL> shutdown immediate
SQL> exit
$ exit
Caution
Do not use the /bin/csh or /bin/tcsh shells to install the Solaris patch cluster (the cluster will
not install correctly with those shells). Use one of the following shells: /bin/sh, /bin/bash, or
/bin/ksh.
Installation of patches should be performed using single user mode and should be performed
using terminal server port connection.
2. When the system prompt appears, issue the following command to reboot the system:
# reboot -- -s
3. Enter the root user password when the following prompt appears:
# mount /export/home
# cd /export/home/Sonus_OS_delta_9.3_Upgrade
# ./upgrade.sh
If you encounter Return Codes 0, 1, 2, 4, or 8 during the patch installation process, you may ignore
them.
7. When the system prompt appears, issue the following command to reboot the system:
# reboot -- -r
The output is displayed as follows before the system logs out to reboot:
Then log on to the server after few minutes to verify the latest patch cluster.
8. To verify that the latest Solaris OS patch, enter:
# uname -v
Generic_150400-20
If you are upgrading Insight using the Sonus Salesforce Customer Portal, you need to upgrade the SNMP
To determine the current version of the SNMP Management Agent, perform the following procedure:
1. Login as root.
2. Change to the directory containing the extracted cluster by entering:
# cd /export/home/tmp/UTILITIES_<current_release_name>/SNMP_1.6.2
# /etc/init.d/masfd stop
4. Run the SNMP agent upgrade script. The script removes the old packages and installs the new packages.
# ./install.sh
5. Verify that the packages have been updated by entering the appropriate command. If the packages were
properly installed, the versions should be 1.6.2.
Netra T5220:
# /etc/init.d/masfd start
The changes on the SNMP daemon will take two minutes to start.
1.
To determine the current version of the system firmware, perform the following steps:
2. If system firmware version is not at 7.4.7, then perform Upgrading System Firmware
Do not downgrade the version of the system firmware. Doing so would result in ILOM no longer working,
requiring you to replace hardware.
If any error occurs during the firmware upgrade, you can reset the Service Controller through ILOM CLI
using the resetsc command:
sc> resetsc
If this command also fails, contact your next level of Sonus Support.
Perform the following procedure to upgrade the system firmware using the CLI:
# cd /export/home/packages
# unzip 147309-09.zip
The 147309-09.zip file is also available from the Sonus Salesforce Customer Portal at: WL9.3
# cd /export/home/packages/147309-09
# ./sysfwdownload Sun_System_Firmware-7_4_7-Netra_T5220.pkg
# shutdown -i0
5. Establish a connection to the Service Processor via ssh or using the Serial Console port.
Ok prompt appears. At the ok prompt, access the System Controller CLI by using the console escape
characters.
a. login:
b. {0} ok
Serial console stopped.
->
c. {0} ok
Serial console stopped
sc>
6. After performing step 5, If you are landed in option a.login: (login) prompt:
a. Login using the user name/password as root/changeme.
The following message is displayed:
b. Check whether the admin user is created by executing the following command:
-> cd /SP/users/
-> ls
-> cd /SP/users/
-> ls
sc> poweroff
Are you sure you want to power off the system [y/n]? y
Chassis | critical: Host has been powered off
12. Ensure that your virtual keyswitch setting is not in the LOCKED position.
You can check the setting from the Service Processor CLI with the following command:
sc> showkeyswitch
If the virtual key switch is in LOCKED position you can change that with the
following command:
sc> setkeyswitch -y normal
14. Log into the ALOM CLI shell (indicated by the -> prompt) from the ALOM login prompt. Login as admin user.
The following message is displayed:
sc> poweron
sc> Chassis | major: Host has been powered on
16. To go to console, type console on the sc prompt. Login to console as root user.
sc> console
Enter #. to return to ALOM.
Done
0:0:0>Network Interface Unit Port 0 Tests ..Done
0:0:0>Network Interface Unit Port 1 Tests ..Done
0:0:0>Extended Memory Tests....Done
ChassisSerialNumber 0833FM9007
17. Verify whether the software firmware is upgraded by entering the following command:
Perform the following procedure to update the system firmware with the Web interface:
The 147309.zip file is also available from the Sonus Salesforce Customer Portal.
Error Codes:
ORA-00942
ORA-942
ORA-00704
ORA-39700
Before performing a database software upgrade, login as user 'insight' and stop EMS and all its processes
by performing the following steps:
$ cd /export/home/ems
$ ./sonusEms stop
Perform the following procedure to upgrade the current database 11.2.0.1.0 or 10.2.0.4.0 to Oracle 11.2.0.3 or to
apply latest Security patch, after downloading the Oracle 11.2.0.3 package from the Sonus Salesforce Customer
Portal..
You need not perform a manual database backup if you are upgrading using the preInstall.pl script.
# cd /export/home/install/ems/oracle
# ./UpgradeOracle.sh
The UpgradeOracle.sh script upgrades and brings up the Oracle. The script approximately takes
one hour to complete.
You can perform a database backup on Active system using this step. This step backs up the EMS database,
configuration files, and the current state of the Fault Manager. You are recommended not to perform any
configuration changes to EMS from this step till the end of Step 8, because any configuration changes performed
are not retained.
You can perform both Step 4a Upgrading the Standby (Standalone) System and Performing the Database backup
on the Active System (Step 4b) simultaneously.
# cd /export/home/install/ems
# ./emsUpgrade.sh backupDatabase
Checking HA states...
Getting peer host IP address from config
Getting some system info...
Starting backup of HA Active system 'ems2' database...
Following settings are being used for this upgrade:
.................................
This HA (Active) host......: ems2
Peer HA (Standby) host.....: ems3
PM Statistics Retention.....: YES (Longer upgrade downtime)
Database Software Upgrade...: No
.........................................................
..........................................................
Do you want to proceed with backing up the database? (default: n) [y|n]: y
In this step, certain files are moved or pushed from the Active to Standby system. These files are required later by
the Standby system.
1. Navigate to the following location
# cd /export/home/install/ems
# ./emsUpgrade.sh pushFiles
Checking HA states...
Peer host's reachable IP address is 10.54.58.105
Checking if peer host 10.54.58.105 can be pinged...
Setting up connection to HA peer. You may be prompted for remote 'insight'
user's password.
Copying key files to peer...
Updating files on peer...
Testing peer connection, getting remote hostname
Detected peer's hostname ems3
Getting some system info...
This step will push certain required tar files to the HA Standby peer system
ems3...
Please make sure that peer system (OS/DB) has been successfully upgraded via
USB/FTP option.
You should run this step after peer system upgrade is complete.
Peer's EMS software will be upgraded automatically in later (restoreDatabase)
step.
Do you want to proceed? (default: n) [y|n]: y
4. Enter y, if you want to proceed with moving the files from Active to Standby.
The following message appears:
# cd /export/home/install/ems
# ./emsUpgrade.sh restoreDatabase
.............................
This HA (Standby) host ......: ems3
Peer HA (Active) host ......: ems2
PM Statistics Retention .....: YES (Longer upgrade downtime)
Database Software Upgrade ...: No
Do you want to proceed with the database restore and Insight EMS upgrade
procedure? (default: n) [y|n]: y
For IPv6 configured systems, reboot (reboot -- -r) the system as root user after completing the
database restore.
# cd /export/home/install/ems
# ./emsUpgrade.sh makeStandalone
Checking HA states...
Getting peer host IP address from config
.........................................
..........................................
Extracted peer host name from config file as 'ems2'
Getting some system info...
Making HA Standby system 'ems2' into Standalone
Do you want to proceed with making this a standalone EMS system? (default: n)
[y|n]: y
4. Enter y, if you want to proceed making the Standby into a Standalone system.
This step configures the system as HA Standby, mount the RAID and then moves the database and certain files to
RAID. At the end of this step, the Insight server is started on the well-known IP.
1. Navigate to the following location
# cd /export/home/install/ems
# ./emsUpgrade.sh makeStandby
Checking HA states...
Getting peer host IP address from config
Peer host's reachable IP address is 10.54.58.101
Checking if peer host 10.54.58.101 can be pinged...
Setting up connection to HA peer. You may be prompted for remote 'insight'
user's password.
Copying key files to peer...
Updating files on peer...
Testing peer connection, getting remote hostname
Detected peer's hostname ems2
Getting some system info...
Converting this Standalone system ems3 to HA STANDBY
Insight EMS server http://ems3 will be shut down if running.
In this step, you need to upgrade the Third Party Software such as the Operating System, Oracle Database, SNMP
and ILOM.
You can perform the similar steps followed in Step 4a Upgrading the Standby (Standalone) System.
In this step, you need to move or push certain files from the Standby to the Active system.
1. Navigate to the following location:
# cd /export/home/install/ems
# ./emsUpgrade.sh pushFiles
# cd /export/home/install/ems
# ./emsUpgrade.sh restoreDatabase
................................
This HA (Standby) host ......: ems2
Peer HA (Active) host ......: ems3
PM Statistics Retention .....: YES (Longer upgrade downtime)
Database Software Upgrade ...: No
Do you want to proceed with the database restore and Insight EMS upgrade
procedure? (default: n) [y|n]: y
4. Enter y, if you want to proceed with restoring the database and upgrading Insight.
The following message appears:
For IPv6 configured systems, reboot (reboot -- -r) the system as root user after completing
the database restore.
This step configures the system as HA Active, mounts the RAID, and then moves the database and relevant files to
the RAID.
1. Navigate to the following location:
# cd /export/home/install/ems
# ./emsUpgrade.sh makeActive
During this step, the Standby system currently has the HA resources and EMS running on the well-known IP. This
final step performs a manual failover and brings the HA system to the same state before the upgrade.
1. Navigate to the following location:
# cd /export/home/install/ems
# ./emsUpgrade.sh failOver
If SGX4000 device is configured on pre-V09.03.00 Insight system, you have to perform the following
procedure during data migration from any pre-V09.03.00 Insight system to Insight V09.03.00.
a. Login to Insight.
b. Navigate to Network Mgmt > Insight Administration.
c. Select the registered SGX4000 node from the Navigation tree.
d. Modify and Update the following (default) values if required.
i. SSH Port
ii. Login (CLI)
iii. Password (CLI)
e. Click on Update button and then click on Discover node.
Perform the following procedure to install the latest version of PSX Manager GUI:
This procedure need to be performed on both the active and standby server.
# mkdir -p /export/home/install/
3. Download the SSGUI_V09.03.00R000.tar file from Sonus SalesForce Customer portal to local system.
4. Copy the SSGUI_V09.03.00R000.tar file from the local system to the /export/home/install/
directory on the Insight EMS server.
5. Change the directory to /export/home/install/ by executing the following command:
# cd /export/home/install/
# cd /export/home/install/SSGUI
8. Execute the GuiClient.sh script as a super root user. The GuiClient.sh script installs the SONSpsx
package.
# ./GuiClient.sh
# pkginfo -l SONSpsx
11. You can perform the steps from 12 to 16 on any one of the servers. The configuration will reflect on both the
active and standby servers.
12. Login to the Insight EMS graphical user interface (GUI).
13. Click the Insight Administration icon on the left pane.
14. Click the General tab and select PSX Policy Server > PSX Manager Versions on the left bottom pane.
15.
If you experience any issues in your production network following an upgrade, you can return to the previous version
of Insight by using the following procedure:
1. Pre-requisites for Rollback using Disk Mirroring are completed successfully prior to start of upgrade.
2. If upgrade to V09.02.00R000 is successful, perform the following procedure:
a. If you have previously detached disk mirrors before upgrade, then Reattach Disk Mirrors to
re-establish the disk mirroring. See Reattaching Slave Disk to the Mirror-DR Solaris.
b. If you have never setup disk mirroring and would like to setup disk mirroring now (check hardware
requirements), then enable disk mirroring. See Enabling Disk Mirroring-DR Solaris.
3. If upgrade to V09.02.00R000 failed to complete successfully, perform the following to roll back to old EMS
version.
a. Stop Insight EMS by executing the following command:
b. Restore RAID paths on HA Active server. (This step need not be performed on HA Standby server).
i. Shut down Oracle Database server. See Starting and Stopping the Insight Database-DR Solaris
section in Common Administrative Tasks-DR Solaris.
ii. Copy the previously saved RAID sub-directories back:
# cd /export/raid
# rm -R orasql
# rm -R oradata
# rm -R Omnibus
# rm -R sonusEms
# rm -R orasql_old
# rm -R oradata_old
# rm -R Omnibus_old
# rm -R sonusEms_old
d. Edit /mnt/etc/vfstab
In order to preserve previous release config, the previous (before mirroring was first setup) vfstab file
need to be restored.
# cd /mnt/etc
# cp -p vfstab.orig vfstab
# chown root:sys vfstab
Find the disk labels for disks at slots 0 and 1 using following command:
# echo | format
e. Edit /mnt/etc/system as root user and delete the following lines if present:
# cd
# umount /mnt
# init 5
Disks initially at slots 0 and 1 should be inserted back to slots 2 and 3. Otherwise, it will
result in system booting in maintenance mode.
# metastat -c
i. Dump device need to be set to the original device (e.g. /dev/dsk/c1t0d0s1 for the example above)
using the following command:
# dumpadm -d /dev/dsk/c1t0d0s1
j. If you need to restart disk mirroring, clear the metadb and enable the disk mirroring using dmctl. The
mirrors can be cleared using command metaclear
# metaclear d41
# metaclear d40
# metaclear d36
# metaclear d35
# metaclear d34
# metaclear d33
# metaclear d30
# metaclear d31
# metaclear -r d201
# metaclear -r d200
# metaclear -r d106
# metaclear -r d105
# metaclear -r d104
# metaclear -r d103
# metaclear -r d100
# metaclear -r d101
Execute the following command to list all the existing metadb state database replicas.
# metadb
Clear all the metadb state database replicas using the following command:
k. Execute following command to verify that all mirroring configurations are cleared. These commands
should not display any database replicas.
# metastat -c
# metadb -i
There will be downtime during the procedure since server will be rebooted as part of
re-enabling disk mirroring.
Password-less connection for root user needs to be established to the peer HA node after the upgrade
completes.This step can be done while HA EMS server is up and running.
You need to perform this step on both the Active and Standby systems.
# cd /export/home/ems/conf/HA
# ./configureHA -c setupPeerRootSsh
The Insight DR solution is supported for one-disk or two-disk database configurations, but the primary and
the target systems must have the same database configuration when they are both non-HA. (Netra T5220s
always have the two-disk database configuration.)
Topics include:
The following table provides the overview steps for upgrading DR with No HA:
For upgrading Insight, see "Upgrading Insight For upgrading Insight, see "Upgrading Insight Standalone
Standalone system" in DR Configuration"
Before setting up DR with no HA systems, perform the following to upgrade EMS on the systems that will be part of
the DR setup.
1. If you are upgrading to V09.03.00, you must convert all target and source systems to standalone systems
before upgrading to V09.03.00DR.
For details, see Failover: Converting DR System non-HA Source and Target to Separate non-DR Insight
Servers.
You must use the same database instance name on both the source and target systems when installing or
upgrading Insight for systems that have never been part of a Data Guard DR setup. (The database instance
names on the target will later be changed as part of the DR configuration.) If you are setting up DR again on
systems that had been part of a Data Guard DR setup before being converted to standalone systems in
Step 1, the database instance names on the source and target do not need to be the same.
Topics include:
Prerequisites
Overview of DR upgrade with an HA Source and non-HA Target
DR upgrade with an HA Source and non-HA Target
Prerequisites
Before performing DR upgrade, perform the following steps:
Make sure that the DR Target database is currently in sync with the DR Source database.
For more details, refer to steps 28, 29 and 30 in Setting Up DR with an HA Source and non-HA Target to
check replication status
If DR setup is currently not in sync, then investigate the root cause, and do not proceed with upgrade. For
problems or questions, contact the Sonus TAC.
It is recommended to perform manual backup (using manualBackup.sh script) of EMS setup and transfer
the generated backup files to an external server for safekeeping.
This backup can be used to restore EMS configuration at a later time if needed.
Backup should be done after Step 1 (Failover) so that the DR target database is accessible before running
backup there.
For more details, refer to Insight Server Backup and Restore-DR Solaris.
Manual backup can be done while EMS is up and running, though for an HA system a manual failover may
be needed to make sure that backup can be successfully done on HA standby node.
No EMS database provisioning should be performed during the upgrade downtime window, as data
The following table provides an overview of upgrading DR with an HA source and non-HA target.
2 Upgrade HA EMS
4 Configure DR
Perform the following to upgrade Insight on existing systems that are part of a Data Guard DR setup with an HA
source and non-HA target.
Once the DR failover is completed, it is recommended to turn off Performance Management (PM)
data collection on the target EMS. This is to avoid undue load on network devices because of the
source EMS also polling the devices at the same time.
While the source EMS is getting upgraded, there may be a window of time when source EMS does
not receive any traps. During this upgrade window when the source EMS Fault Mgmt is down, the
target EMS can be used to monitor traps.
It is recommended that the DR target to be started only if the DR source upgrade is successful. If
there are issues during DR source system upgrade, do not proceed with the DR target upgrade, and
contact Sonus Support.
4. Configure Disaster Recovery on all the systems. For more details refer to Setting up DR with an HA source
and non-HA Target.
Topics include:
Prerequisites
Overview of DR Upgrade with an HA source and HA Target
DR Upgrade with an HA source and HA Target
Before Setting Up DR
Insight Installations or Upgrades for Existing Systems That Don’t Use Data Guard with an HA Source
Insight Upgrades from DR Systems That Use Data Guard and an HA Source
Prerequisites
Make sure that the DR Target database is currently in sync with the DR Source database.
For more details, refer to steps 34, 35 and 36 in Setting Up DR with HA Source and HA Target to check
replication status
If DR setup is currently not in sync, then investigate the root cause, and do not proceed with upgrade. For
problems or questions, contact the Sonus TAC.
It is recommended to perform manual backup (using manualBackup.sh script) of EMS setup and transfer
the generated backup files to an external server for safekeeping.
This backup can be used to restore EMS configuration at a later time if needed.
Backup should be done after Step 1 (Failover) so that the DR target database is accessible before running
backup there.
For more details, refer to Insight Server Backup and Restore-DR Solaris.
Manual backup can be done while EMS is up and running, though for an HA system a manual failover may
be needed to make sure that backup can be successfully done on HA standby node.
No EMS database provisioning should be performed during the upgrade downtime window, as data
configured during upgrade may not get backed up
2. Upgrade HA EMS
4. Configure DR
You need to perform the following procedure to upgrade Insight using a HA Source and HA Target.
To perform a failover, refer to Failover: Converting DR System HA Source and HA Target to Separate
non-DR Insight Servers.
To perform an upgrade, refer to the following sections based on your upgrade method:
Upgrading Insight HA on DR Configuration.
Or
Upgrading DR with an HA source and non-HA Target.
While the source EMS is getting upgraded, there may be a window of time when source EMS does
not receive any traps. During this upgrade window when the source EMS Fault Mgmt is down, the
target EMS can be used to monitor traps.
It is recommended that the DR target to be started only if the DR source upgrade is successful.
If there are issues during DR source system upgrade, do not proceed with the DR target upgrade,
and contact Sonus Support.
4. Configure Disaster Recovery on all the systems. For more details refer to Setting up DR with HA Source and
HA Target.
Before Setting Up DR
Before setting up DR on a system with an HA source and HA target, all the systems need to have Insight V09.02.00.
Follow the appropriate directions for installing/upgrading Insight:
To install Insight V09.02.00 on the systems that will be part of the DR setup or to upgrade existing systems
that are not already part of a Data Guard DR setup with an HA source, see Insight Installations or Upgrades
for Existing Systems That Don’t Use Data Guard with an HA Source.
To upgrade to Insight V09.02.00 on existing systems that are part of a Data Guard DR setup with an HA
source, see Insight Upgrades from DR Systems That Use Data Guard and an HA Source . (DR setups that
use Data Guard were used on Insight V07.01.xx, V07.02.xx, and V07.03.xx, where xx is 01 or greater.)
Perform the following to install Insight on the systems that will be part of the DR setup, or to upgrade existing
systems that will be part of the setup and that were not already part of a Data Guard DR setup with an HA source. (If
the systems were already part of a Data Guard DR setup with an HA source, go to Insight Upgrades from DR
Systems That Use Data Guard and an HA Source.
1. If you are upgrading, dismantle the HA-HA DR setup by performing. See Failover: Converting DR System HA
Source and HA Target to Separate non-DR Insight Servers.
2. On the source system, set up HA or upgrade the HA setup:
- If HA has not been set up on the source system, install or upgrade Insight and configure HA by performing
the tasks in Insight HA configuration.
- If HA has been set up on the source system, upgrade the HA setup by performing Upgrading Insight High
Availability system.
3. On the target system, set up HA or upgrade the HA setup:
- If HA has not been set up on the target system, install or upgrade Insight and configure HA by performing
the tasks in Insight HA configuration.
- If HA has been set up on the target system, upgrade the software version by performing Insight HA
configuration.
You must use the same database instance name on both the source and target systems when
installing or upgrading Insight for systems that have never been part of a Data Guard DR setup.
(The database instance names on the target will later be changed as part of the DR configuration.)
Insight Upgrades from DR Systems That Use Data Guard and an HA Source
Perform the following to upgrade Insight on existing systems that are part of a Data Guard DR setup with an HA
source, and that you will be configuring as a DR setup with an HA source and HA target:
1. Stop Insight on the target system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms stop
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
3. As root on the target system, run the convert script to change the system to standalone mode:
a. As root on the target system, run the convert script as follows:
# ./convert
Answer c.
c. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
4. On the target system, change to user oracle, and enter the following:
$ cd <ORACLE_BASE>/orarepl/<ORACLE_SID>/scripts/conf
$ ./database_failover.ksh
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IP address on all IASs that were registered to the source system are updated to the IP address of
the target system.
7. Stop Insight on the source HA standby system (system B) by executing the following command as user
insight:
$ cd /export/home/ems
$ ./sonusEms stop
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
9. As root on system B, run the convert script to change the system to standalone mode:
a. As root on system B, run the convert script as follows:
# ./convert
Answer c.
c. The following prompt appears:
Answer Y.
d. The following prompt appears:
Answer Y.
$ cd <ORACLE_BASE>/backup/bin
$ export.sh
The script generates two exported files, exp_data.dmp and exp_strct.dmp and puts them in
<ORACLE_BASE>/backup/dump. Sonus recommends that you copy these files to an external location as an
additional safety precaution.
12. On system A, the following message appears:
<ORACLE_BASE>/backup/dump
$ cd $ORACLE_HOME/dbs
$ rm init$ORACLE_SID.ora
$ rm spfile$ORACLE_SID.ora
16. On system B, point the database instance back to the local Oracle files:
$ cp init$ORACLE_SID.ora.<date-hour-minute-second> init$ORACLE_SID.ora
where <date-hour-minute-second> is a decimal representation of the most recent file available. For example:
17. As user oracle on system B, issue the following commands to start the database:
$ sqlplus /nolog
SQL> conn / as sysdba
SQL> startup
SQL> exit
$ lsnrctl start
18. On system B, import the database by running the cfg_import.sh using the following commands:
$ cd <ORACLE_BASE>/backup/bin
$ cfg_import.sh
$ stats_import.sh
b. Change the hostname from the hostname of the well-known address (for example, EMSHA) to the
hostname of the machine and change the IP address from the well-known IP address to the IP
address of the machine.
c. Migrate fault data from system A to system B as user insight:
i. On system B, remove the symbolic link and create the local directory:
/bin/rm /export/home/netcool/omnibus/db
mkdir -p /export/home/netcool/omnibus/db/SONUSDB
mkdir -p /export/home/netcool/omnibus/db.bak
Enter the following to create a backup of the fault database and put it in
/export/home/netcool/omnibus/db.bak (the following does not contain a line break, and there
should be one space after -d):
/export/home/ems/conf/netcool/netcooladmin/backupDB.sh -d
/export/home/netcool/omnibus/db.bak
Enter the following to copy the backup to system B (the following does not contain a line break,
and there should be one space after *.tab):
scp
/export/home/netcool/omnibus/db.bak/*.tab insight@<systemB>:/export/home/netcoo
If the Insight database is running, a list of active oracle processes will be displayed. Continue to
substep c.
If the Insight database is not running, no processes will be displayed. Start the Insight database by
entering the following, and then continue to substep c:
$ lsnrctl status
If the database listener is running, the status of the listener and the status of database instances will
be displayed. Continue to substep d.
If the database listener is not running, “no listener” messages will be displayed. Start the database
listener by entering the following, and then continue to substep d:
$ lsnrctl start
cd /export/home/ems/sonusEms start
Sonus recommends that System B as a standalone should be used only for receiving traps. Any configuration
on system B at this time will not be saved after the upgrade of both HA systems.
24. Stop Insight on the source HA active system (system A) by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms stop
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
26. As rooton system A, run the convert script to change the system to standalone mode:
a. As root on system A, run the convert script as follows:
Answer c.
c. The following prompt appears:
Answer Y.
d. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
#/export/home/ems/conf/HA/haResources release
$ sqlplus /nolog
SQL> conn / as sysdba
SQL> shutdown immediate
SQL> exit
$ lsnrctl stop
If necessary replace the c2t0d0 in the command line with the designator for your disk.
33. Change system B back to the standby system in an HA configuration:
a. As root, enter the following command on system B to start the configureHA script.
# cd /export/home/ems/conf/HA
# ./configureHA
Type s to configure a standby Insight system. The system then displays the following message:
You entered...
User Name: "oracle"
Group Name: "dba"
Are the values correct (default:N) [y|Y,n|N] ?
A default value that matches the previously configured RAID’s mount point is displayed, which you can
accept by pressing Enter.
You can also type the RAID’s mount point and press Enter (see Insight HA configuration for
establishing the RAID’s mount point).
h. The system displays the following:
A default value that matches the previously configured RAID’s device name is displayed, which you
can accept by pressing Enter.
You can also type the RAID’s device name and press Enter (see Insight HA configuration for
establishing the RAID’s device name).
i. The system displays the following:
A default value that matches the previously configured RAID’s raw device name is displayed, which
A default value that matches the previously configured well-known IP address is displayed, which you
can accept by pressing Enter.
You can also type the well-known IP address and press Enter (see Public Network Address for
establishing the well-known IP address).
k. The system displays the following:
Testing scp
Created a zero length file on the other HA system called
/tmp/sshtestfile.14992
This step will change the IP Address on your system. Do you want to
proceed with this step? (default: yes) [y,n]
Do you want to notify all registered IAS systems of this new IP address?
(default: no) [y,n]
# cd /export/home/ems/conf/HA
# ./haResources release
$ /export/home/ems/sonusEms start
$/export/home/ems/sonusEms start
36. Sonus recommends that you disassociate the reachability address of system B (the backup system) with all
the registered devices. For an explanation of disassociating an IP address with registered devices, see
Managed Device Association.
37. Update the registration for each Insight device (see the Updating a Node section).
This section provides a summary of the account name and password information associated with the Insight. In
particular, the following items are included:
For the Insight-specific accounts, Release V07.03.00 introduced the option to set “strong” passwords or to keep
existing “weak” passwords. The choice between strong or weak passwords will be given during installations and
upgrades.
The strong passwords have more restrictions than the pre-V07.03.00 passwords and require that a new password
be entered during the installation or upgrade. The strong passwords do not have a default value, while the weak
passwords do have a default value.
root sonus
insight insight
oracle oracle
dbimpl dbimpl
sys change_on_install
system manager
admin admin
Insight_Admin_User sonus
root sonusfm
For complete Sonus products account and password details, refer to Sonus Products Password and Security
Management Reference.
# /export/home/ems/sonusEms stop fm
# cd /export/home/ems/conf
# ./netcool_rename_db.ksh
5. After the script executed successfully, start the netcool FM process in the system.
# /export/home/ems/sonusEms start fm
6. For an HA configuration, ensure you perform Steps "1" to "5" on each node one by one.
Rollback Mechanism
To change the netcool object server name to default or old name, use the same script and provide the required
choice for old and new server name as input.
Limitation
Upgrade operation is not supported with the changed netcool object server name. In order to support, you
need to first rollback to default netcool object server name “SONUSDB”.
Making a node standalone from high availability configuration is not supported with the changed netcool
object server name. In order to support, you need to first rollback to default netcool object server name
“SONUSDB”.
For all Solaris accounts other than insight, change the password using the Unix “ passwd” command.
The following user password restrictions exist by default. Sonus recommends that you do not change these
restrictions.
The following section provides information regarding various accounts, password restrictions, and procedure to
change the password.
This section describes how to change the insight user password with the changeInsightPassword.sh script.
Change the insight user password, if you did not use the strong password option when running the
configureJumpstart.sh or emsMigrate.sh script. This changes the insight user password from the
previous value.
Sonus recommends that you also periodically change the insight user password.
This procedure uses a script to change the password and to make the corresponding changes to the Netcool
Process control user. You do not need to re-perform Netcool configuration.
This procedure also allows you to set the password expiration behavior to non-expiring or to expiring, and to set the
expiration values.
CAUTION
You must use the following procedure to change the password for the insight user. Do not use the pass
wd command, which would result in a misconfiguration of Netcool.
Password Restrictions
The insight user password has the following restrictions (unless you use the -v option described in the
procedure):
The “insight” User Password on Disaster Recovery and High Availability Systems
You must use the same insight user password on all Insight systems that are part of a disaster recovery (DR)
system or high availability (HA) server. When you run the changeInsightPassword.sh script on the source DR
server (active source if the source is also HA) or on the active HA server, the script will give you the option of
changing the password on all the Insight servers in the system (you will be prompted for the password of the root
user for each server).
Procedure
To change the password and/or the password expiration behavior for the insight user, perform the following
procedure.
1. Log in as root.
2. Run the setup script to configure the insight user password/password expiration as follows:
# cd /export/home/ems/conf
# ./changeInsightPassword.sh -a "-n <min_days> -w <warn_days> -x <max_days>"
Where:
<min_days> represents the minimum number of days that must pass before the user can change the
password.
<warn_days> represents the number of days before the password expiration when the user is warned.
<max_days> represents the maximum number of days that a password is valid. If you enter -1, password
expiration is turned off, and you do not need to enter the -n or -w arguments.
The -a and the quotation marks are needed if you are entering the -n, -w, or -x arguments.
Insight is currently running. You must shut down Insight (including all of the
FM processes) before running this script. Do you want to continue [y|Y,n|N]?
(Default:Y)
Enter Y.
4. The following prompt appears:
6. If the system is part of a DR or HA system, a prompt appears that asks if you want to change the insight user
password on the other systems.
Enter Y.
7. When prompted, enter and re-enter the root password for each of the other Insight servers.
If you have entered a wrong password, for the remote servers, the following message appears:
This section describes how to change the Insight database user password with the changeDbPassword.sh script.
This section includes the following:
Password Restrictions
The Insight database password has the following restrictions (unless you use the -v option described in the
procedure):
When using the changeDbPassword.sh script to change the Insight database password on the source disaster
recovery (DR) system or the active high availability (HA) system, the database password will also be changed on the
When using the changeDbPassword.sh script to change the Insight database password on the Insight system, the
script will also change the database password on any IASs that are registered to the Insight system and that are
currently up. You will be prompted for the password of the root user on each IAS.
CAUTION
If an IAS is not up when you run the changeDbPassword.sh script, you will need to change the password
when the IAS is up by performing "Changing the Insight Agent Connection Account Password". If the Insight
database password on the IAS does not match the Insight database password on the Insight server to
which it is registered, the database user (dbimpl) will be locked out of the database, and Insight will not
function correctly. To unlock the database, run the following script: /export/home/ems/conf/unlockDb
implUser.sh
Procedure
# cd /export/home/ems/conf
# ./changeDbPassword.sh
The following options may be used when entering the ./changeDbPassword.sh command:
-c: The new password will be requested once, and you will not be prompted to re-enter it.
-v: The password will not be checked to see if it meets the password restrictions.
Insight is currently running.You must shut down Insight (including all of the
FM processes) before running this script. Do you want to continue [y|Y,n|N]?
(Default:Y)
Enter Y.
Enter the password. Unless you used the -v option in Step 1, the password must meet the restrictions listed in
Password Restrictions.
The default Agent connection account/password combination is admin/admin. To change the password, perform
the following procedure, which uses the jash shell utility:
# /export/home/sonusComm/bin/jash
2. At the % prompt, enter the following (this assumes the current password is admin):
success
where
admin is the account name
<existing password> is the current password, such as admin
<new password> is the new password
% exit
Changing the Insight Database Password for the IAS from the Insight System
This section describes how to set the Insight database password for an IAS by running a script from the Insight
server. This procedure is only required if the password on the IAS was not changed when performing Changing the
Insight Database Password.
To change the Insight database password for an IAS system by running a script on the Insight server, perform the
following:
# cd /export/home/ems/conf/IAS
# ./remoteIasMgmt.sh resetDbPassword <client_ip_address>
where <client_ip_address> is the IP address of the IAS on which you want to update the Insight
database password.
This section describes how to change the sys database user password with the changeSysDbPassword.sh
script.
Password Restrictions
The sys database password has the following restrictions (unless you use the -v option described in the procedure):
Procedure
# cd /export/home/ems/conf
# ./changeSysDbPassword.sh
Enter the password. Unless you used the -v option in Step "1", the password must meet the restrictions listed
in Password Restrictions.
This section describes how to change the system database user password with the
changeSystemDbPassword.sh script.
Password Restrictions
The system database password has the following restrictions (unless you use the -v option described in the
procedure):
When using the changeSystemDbPassword.sh script to change the system database user password on the
source disaster recovery (DR) system or the active high availability (HA) system, the database password will also be
Procedure
# cd /export/home/ems/conf
# ./changeSystemDbPassword.sh
Enter the password. Unless you used the -v option in Step "1", the password must meet the restrictions listed
in Password Restrictions.
This section describes how to change the Netcool database user password for the Insight_Admin_User
with the changeNetcoolDbInsightPassword.sh script.
Password Restrictions
The user password has the following restrictions (unless you use the -v option described in the procedure):
Netcool Database User Password for the Insight_Admin_User on High Availability Systems
When using the changeNetcoolDbInsightPassword.sh script to change the password on the active high
availability (HA) system, the password will also be changed on the standby HA system through the HA monitoring
code.
Procedure
# cd /export/home/ems/conf
# ./changeNetcoolDbInsightPassword.sh
Enter Y.
3. The following prompt appears:
Enter the password. Unless you used the -v option in Step "1", the password must meet the restrictions listed
in Password Restrictions.
Changing the Netcool Database User Password for the Root User
This section describes how to change the Netcool database user password for the root user with the
changeNetcoolDbRootPassword.sh script.
Password Restrictions
When using the changeNetcoolDbRootPassword.sh script to change the password on the active high
availability (HA) system, the password will also be changed on the standby HA system through the HA monitoring
code.
Procedure
To change Netcool Database User Password for the root user, perform the following:
# cd /export/home/ems/conf
# ./changeNetcoolDbRootPassword.sh
Enter Y.
3. The following prompt appears:
Enter the password. The password must meet the restrictions listed in Password Restrictions.
4. When prompted, re-enter the password.
The script runs to completion.
This section describes how to change the EMS keystore password with the changeKeystorePassword.sh script.
This procedure can be used after you obtain your own SSL certificate and import it. For SSL certificate installation
information, refer Certificate Management. This procedure cannot be used with the demo site certificate that comes
with Insight.
Password Restrictions
Procedure
# cd /export/home/ems/conf
# ./changeKeystorePassword.sh
Enter the new EMS keystore password. The password must meet the restrictions listed in Password
Restrictions.
Changing the Password or Password Behavior of the "insight" User for the IAS System
To change the insight user password of the IAS system or to change the password expiration behavior (the IAS has
an expiring insight user password by default), use the passwd command.
The default Agent connection account/password combination is admin/admin. To change the password, perform
the following procedure, which uses the jash shell utility:
# ./jash
2. At the % prompt, enter the following (this assumes the current password is admin):
success
% exit
5. Change the Agent Password field in the Register Insight Node screen. See the “Insight Administration” of the
Insight EMS User Guide.
When upgrading to Release V09.02.00 and using the “weak” password option (see "“Strong” and “Weak”
Passwords"), use of the documented upgrade procedures will ensure that all default Solaris accounts and
passwords, customer-created Solaris accounts and passwords, and Sonus database accounts and passwords are
preserved across the upgrade.
Upgrading to Release V09.02.00 using the “strong” password option requires the user to create new account
passwords.
Prerequisites
Before migrating Sonus network elements from IPv4 to IPv6, see the Sonus Network Solution IPv4 to IPv6 Migration
Guide to understand the implementation of complete network migration of multiple Sonus products.
The following procedure describes the procedure to enable IPv6 on the EMS Standalone server.
1. Log in as root.
2. Create the following file:
/etc/hostname6.<interface name>
where the <interface name> is the name of the interface on which the IPv6 needs to be enabled.
You can obtain the interface name by executing the following command:
# ifconfig -a
# ifconfig -a
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232
index 1
inet 127.0.0.1 netmask ff000000
e1000g0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 10.54.7.179 netmask ffffffc0 broadcast 10.54.7.191
In this example, e1000g0is the name of the interface on which IPv6 needs to be enabled.
3. Add the following entry to the /etc/hostname6.e1000g0 file, save, and exit:
addif <ipv6address>/<prefix> up
For example,
addif FD00:10:6B50:4160::33/60 up
# ifconfig -a
# reboot -- -r
10. Verify that all EMS services are up after restart using the following command as user insight.
$ /export/home/ems/sonusEms status
After server restart, it will take around 10 minutes for all EMS services to be up and running.
After enabling IPv6 on the EMS server, you need to upgrade the target devices to IPv6 and enable IPv6
management IPv6 address on the device. For more information, refer to the respective device’s Installation
Guide.
The following procedure describes the procedure to enable IPv6 on the EMS HA server.
addif <ipv6address>/<prefix> up
For example,
addif FD00:10:6B50:4160::33/60 up
b. Login as user insight and stop insight in Standby (first) and then, on Active by executing the
following commands:
# su - insight
$ /export/home/ems/sonusEms stop
$ exit
c. Login as user root and release the resources in Active (first) and then on Standby by executing the
following command:
# /export/home/ems/conf/HA/haResources release
5. Plumb the primary and secondary interfaces using the following command:
For more information, see table Public Network Interfaces and IP Addresses.
For example, in T5220 to plumb e1000g1, use the following command:
# cd /export/home/ems/conf/HA
# ./configureHA
Which interface will be the primary? [e1000g0 e1000g1 e1000g2 nxge0 nxge2] :
What is the test IPv4 address for the primary LAN interface?:
10.54.8.72
What is the test IPv6 address for the primary LAN interface?:
fd00:10:6b50:4190::8
What is the test IPv6 address prefix length for the primary
LAN interface? (Default:128):60
19. The system displays the values you entered. The following is an example based on the values given for the
active Netra T5220 system in Public Network Setup for EMS HA DR:
22. Start EMS on both the Active and Standby systems by performing the following procedure:
a. Identify the configured Active and Standby states of the servers by executing the following commands
as user root. If the output displays as ACTIVE, then that server is identified as Active server, else
Standby:
$ /export/home/ems/sonusEms start
$ /export/home/ems/sonusEms status
Expected output: Lists all processes as ‘running’ and current HA state is shown as ACTIVE.
d. On Standby, start Insight as user ‘insight’:
$ /export/home/ems/sonusEms start
e.
$ /export/home/ems/sonusEms status
Expected output: Lists all processes as ‘running’ and current HA state is shown as STANDBY.
$ exit
23. Open EMS GUI on active system and re-register devices with the IPv6 management client IP Address. See
Re-register the Device with the IPv6 management address from the EMS Node Registration Window-DR
Setup.
Re-register the Device with the IPv6 management address from the EMS
Node Registration Window-DR Setup
After enabling IPv6, you need to re-register (which includes un-registration of IPv4 device, then register device with
IPv6 address where mgmt client is Ipv6) from the EMS node registration window.
The following is the procedure to re-register the device with the IPv6 management address:
1. In the EMS Node Registration window, verify if both IPv4 and IPv6 addresses are displayed.
2. Click Unregister.
3. Click the same device under Unregistered Nodes. Update the management client and device IP with IPv6
address and click the Update button.
4. Click Register.
Once the hosts connected to RAID are migrated to IPv6, you can migrate the RAID to IPv6. Follow the procedure
below to migrate the StoregTek RAID to IPv6.
2.
Press within 5 seconds: <S> for Service Interface <BREAK> for baud rate
5. When prompted, enter the password. If you do not know the default password, contact the Sonus TAC.
6. The following prompt appears:
Enter 2.
7. Once you select option 2, skip the IPv4 part as it is already configured:
Enter Y.
9. Enter N for Stateless Address Autoconfiguration:
11. Enter the IPv6 address of the server as the IPv6 Routable Address:
12. Enter the IPv6 address of the router (gateway) as the IPv6 Routable Address:
14. Enter 'y' after verifying the IPs. Following confirmation message will be displayed:
16. Register the storageTek array using IPv6 address from the host connected to RAID using the following
command:
17. Repeat Steps 1 through 15 for the other RAID disk array controller.
To verify the version of Insight installed, enter the following command as user root:
$ pkginfo -l SONSems
Expected output:
$ cd /export/home/ems
$ ./sonusEms status
When you run ./sonusEms status on an HA system, the information displayed in Checking the HA Status is also
displayed.
Occasionally, it may become necessary to start the Insight server. To do so, use the following commands:
$ cd /export/home/ems
$ ./sonusEms start
The first time that the Insight server is started, a maximum of 30 minutes will be allowed before the startup process
is timed out. On subsequent startups, the maximum time allowed will be equal to 120 percent of the initial startup
time. For example, if the initial startup took 300 seconds, then the maximum time allowed for subsequent startups
would be 360 seconds.
You can add arguments to the sonusEms start command to control memory size allocations. For a list of the
arguments and their syntax, type:
# ./sonusEms -help
Occasionally, it may become necessary to stop the Insight server. To do so, use the following commands:
$ cd /export/home/ems
$ ./sonusEms stop
HA related messages that appear during the sonusEms stop are shown in " HA Messages During sonusEms stop"
When FM Trap Receiver or EMS is restarted, FM Trap Receiver drops traps received from FM until Netcool
Probe registers to FM. The loss of alarms can be for a period of 10 seconds when FM Trap Receiver (or
EMS) is restarted. Information about the dropped traps can be obtained from log file in the location /expor
t/home/ems/emsFM/logs/fm_receiver_trace.
In the event you need to change the IP address of your Insight server, perform the following procedure. If desired,
you can change the host name as well as the IP address.
If you want to change the host name of the Insight machine without changing the IP address, do not perform this
procedure. Instead, use "Changing the host name for Insight without Changing the IP Address".
1. Associate all managed nodes with the intended new IP address (see “Managed Device Association” in the
Administration chapter of the Insight User Guide). Setting the association now allows the server to begin
receiving and processing trap information immediately upon restart.
2. Shut down the Insight management processes.
3. Have your UNIX System Administrator change the address of the system. If you also want to change the host
name of your system, have your UNIX System Administrator change it at this time.
4. As root, change the IP address of the server, change the IP address in the database tables, and update the
Netcool license information as follows:
a. Enter the following commands:
b. Respond y.
Several messages appear, ending with:
After IP address is changed, ensure that the IP address entry exists or is same as in the /et
c/hosts
$ /export/home/ems/sonusEms start
6. For any IAS that is registered to the Insight server, you will be prompted for the root password of the IAS
server. Enter the root password of the IAS server.
The Insight IP address on the IAS is then automatically updated to the new IP address of the Insight server.
7. Start Insight.
8. Disassociate all registered nodes with the old IP address (see “Managed Device Association” in the
Insight Administration chapter of the Insight EMS User Guide).
Changing the host name for Insight without Changing the IP Address
In the event you need to change the host name of your Insight server but you are not changing the IP address,
perform the following procedure.
If you are changing both the IP address and the host name of the Insight machine, do not perform this
procedure. Instead, use "Changing the IP Address of Insight".
3. As root, perform the following, making sure that you enter the current IP address of the server:
Enter the following commands:
# cd /export/home/ems/conf/
# ./changeIpAddress.sh -i <ip_address>
Respond y.
Several messages appear, ending with:
After hostname is changed, ensure that the hostname entry exists or is same as in the /etc/hosts
$ /export/home/ems/sonusEms start
Depending on the EMS Software Release (pre-9.2 EMS Solaris, EMS Solaris 9.2.0, or EMS Solaris 9.2.1 and
above) from which backup is taken, the dmp file names would differ.
The file expdp_stats_data_manual.dmp will be generated only if the PM stats export option is enabled.
When Backup is Taken from Backup Files generated are Restoring the backup files
EMS Solaris
9.2.1 Release and above backupFiles.tar Restore the backup files to 9.3.0 or 9.2.x
(including 9.3.0 Release) sustaining Release.
expdp_cfg_data_manual.dmp
High-level Steps:
expdp_stats_data_manual.dmp
1. Perform a backup of EMS 9.3.0 or 9.2.x
expdp_strct_manual.dmp sustaining release.
2. Restore the backup files to 9.3.0 or 9.2.x
sustaining release.
System Backup
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine. Use a directory name that will
clearly identify the EMS server that created the backup files. Make a note of the directory path because you will
need it later if you need to restore the system.
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, dmp files) in the backup directory.
If you need to restore your Insight system, perform the following tasks:
1. (Optional) Kickstart the EMS Standalone (SA) or HA Solaris system with respective EMS Release from which
backup was taken, if the EMS Solaris system is not stable. For more details, about EMS Release from which
you want to kickstart, refer the above Table.
2. Log in as root.
3. From the backup directory you used for this EMS server in System Backup, copy the dmp files to the
/export/home/oracle/backup/dump directory. Also, copy the backupFiles.tar file to the /tmp
directory.
If the dmp files are copied to /export/home/oracle/backup/dump using an unconventional method,
such as FTP, change the owner and group of the files to Oracle and DBA.
If backup is taken from pre-9.2.0 then use the following dmp file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba exp_data_manual.dmp exp_strct_manual.dmp
or
If backup is taken from 9.2.0 then use the following dmp file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba expdp_data_manual.dmp
expdp_strct_manual.dmp
or
If backup is taken from 9.2.1 or above Release (including 9.3.0 Release) then use the following dmp
file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp expdp_strct_manual.dmp
CAUTION
You must copy files from the backup directory that you used for this EMS server. If you use a
backup directory that contains files from another EMS server, Insight will not behave properly.
# cd /export/home/ems/conf/jumpstart
# ./emsMigrate.sh
5. The script informs you that you must have the three files mentioned in Step 3 and asks if you want to
continue. Answer y and press Enter.
6. The script asks for the full path to the backup tar file. Answer /tmp and press Enter.
7. The following message appears:
Do you want to upgrade the system passwords to use strong passwords (production setup) (y|Y) or continue
to use the old weak hardcoded passwords (lab setup) (n|N) (default:Y)?
a. If you want to use strong passwords (recommended for production setup), enter Y and skip to Step 12.
You will enter new passwords.
b. If you do not want to use strong passwords, enter N and continue to Step 8. The old passwords will be
used.
8. If you entered N in Step 7, a prompt asks you to confirm that you want to use weak passwords. Enter Y.
9. When prompted, enter the insight user password.
10.
When entering strong passwords (Steps 12 through 23), the passwords must meet the
restrictions listed in Changing Passwords.
12. If you entered Y in Step 7, a prompt asks for the Insight database (dbimpl) password. Enter the password.
(The only special characters allowed are _, $, and #.)
13. When prompted, re-enter the Insight database password.
14. When prompted, enter the Insight database sys password. (The only special characters allowed are _, $, and
#.)
15. When prompted, re-enter the Insight database sys password.
16. When prompted, enter the Insight database system password. (The only special characters allowed are _, $,
and #.)
17. When prompted, re-enter the Insight database system password.
18. When prompted, enter the insight user password.
19. When prompted, re-enter the insight user password.
20. When prompted, enter the Netcool root database user password.
21. When prompted, re-enter the Netcool root database user password.
22. When prompted, enter the Netcool Insight_Admin_User database user password.
23. When prompted, re-enter the Netcool Insight_Admin_User database user password.
24. The scripts asks if you want to import the User Activity Logs, PM Stats, and TrunkGroup tables. Answer y if
you want to import these tables; answer n if you do not want to save those tables.
25. The following message appears:
26. For upgrades from Insight 07.03.06 and above, this message does not apply.
Enter N.
27. The following message appears:
Passwords
The emsMigrate.sh script used in the system restore procedure gives you the opportunity to use strong
The Insight Database should automatically start and stop at system startup and shutdown time respectively.
If you wish to manually start the Insight database use the following instructions:
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If you wish to manually stop the Insight database use the following instructions:
1. Log in as the user insight and shut down the Sonus Insight server using the following command:
$ /export/home/ems/sonusEms stop
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> shutdown immediate
SQL> exit
If the Insight database is running, a list of active oracle processes will be displayed.
If the Insight database is not running, no processes will be displayed.
The client listener should automatically startup and shutdown with the Insight database. If you need to manually start
or stop the listener, use the following instructions.
To manually start the listener, login as oracle and use the following command:
$ lsnrctl start
To manually stop the listener, login as oracle and use the following command:
$ lsnrctl stop
$ lsnrctl status
If the database listener is running, the status of the listener and the status of database instances will be
displayed.
If the database listener is not running, “no listener” messages will be displayed.
This section describes the backup and restore of the database only. For a complete system backup and a complete
system restore, see Insight Server Backup and Restore-DR Solaris.
Sonus recommends you to backup the Insight database nightly as part of your database backup and restore
strategy.
The required backup scripts and directory hierarchy are installed during an Insight database instance installation or
upgrade. The directories bin, dump and log are created under the Oracle user’s home directory. The location of the
backup and restore scripts is the bin directory. The dump directory holds exported database images and the log
directory stores generated log files.
In the event the required scripts and directory hierarchy do not install, you may manually install the scripts by first
performing a cd to Oracle’s home directory and then untarring the insightBackupFiles.tar file.
You may perform the backup procedure with Sonus Insight running and the database instance in use.
1. Login as user oracle to the system that contains the database instance you wish to backup.
2. Change to the backup and restore bin directory which is located under the oracle user’s home directory
where /export/home/oracle is Oracle’s home directory in this example.
$ cd /export/home/oracle/backup/bin
3. Execute the following script. The export script creates Oracle export files in the data directory and overwrites
any existing export files found at that location.
$ export_manual.sh
4. The following message appears:
What is the password of the database user 'dbimpl'? (default: dbimpl)
Either enter the password of the database, or press enter to accept dbimpl if that is the password of the
database.
5. You will see status information printed to the screen followed by a statement similar to the following:
Export terminated successfully without warnings.
If you did not receive the previous message, refer to the log files found in the log directory to check for any
errors.
CAUTION
You must stop Sonus Insight and not use the database for the first part of the restore procedure. The
restore procedure performs a destructive restore. The process wipes clean the database instance before
restoring the backed up data to the database instance.
1. Shut down any running applications using the database instance you wish to restore. For information on how
to shut down Sonus Insight refer to the procedure, Stopping the Insight Server.
2. Login as user oracle to the system that contains the database instance you wish to restore.
3. Change to the backup and restore bin directory which is located under Oracle’s home directory where
/export/home/oracle is Oracle’s home directory in this example.
$ cd /export/home/oracle/backup/bin
4. Execute the following script. The import script will drop all of your database instance’s tables and import
configuration tables from the archive files in the data directory.
$ cfg_import_manual.sh
Either enter the password of the database, or press enter to accept dbimpl if that is the password of the
database.
6. You will see a series of status information printed to the screen followed by a statement similar to the
following:
This is a destructive import where all existing data in the database instance is first dropped before the import
from the export files is performed. The import script drops all sequences and tables and imports the data for
the smaller configuration tables. The process should take less then 20 minutes for a typical size database.
7. The second part of the import is to import the larger Trunk Group and Performance Management tables. As
the time to import these tables may take hours, depending on the size of the data that is to be imported, it
may be desirable for you to re-start Sonus Insight prior to starting this phase of the import. Sonus Insight may
be running and using the database during this phase of the import but information that has not yet been
restored to the database will not be available for use in Sonus Insight until it has been imported. See Starting
the Insight Server for information on starting Sonus Insight.
8. To start the second phase of the import execute the following script.
$ stats_import_manual.sh
9. You will see a series of status information printed to the screen followed by a statement similar to the
following:
Refer to the log files found in the log directory to check for any errors.
Netcool Configuration
The annotation /export/home/ems appears throughout the instructions that follow and refers to the
current Sonus Insight installation base directory. The default is /export/home/ems. This is the only
directory that is supported.
# cd /export/home/ems/conf/
# ./netcoolsetup.ksh
This script modifies configuration files, changes process control user settings, and modifies FM logging
parameters.
3. The script prompts you for how much disk space to allocate for FM log files. Enter a value or accept the
default.
4. Start the Netcool processes. See Starting, Stopping, or Verifying the Netcool Process.
Under normal circumstances the Netcool processes start and stop when you start or stop the Insight server, see
Insight Server Administration-DR Solaris. If you want to start, stop, or check the status of the Netcool processes
separately from the Insight server, use the following commands.
To start the Netcool process, as user insight execute the following commands:
$ cd /export/home/ems
$ ./sonusEms start fm
$ ./sonusEms status fm
Several Netcool components have a delayed startup due to their dependence on the Netcool
database. These processes show “PENDING” status. If processes remain in a “PENDING” state
longer than two minutes after startup, there is a configuration problem.
$ cd /export/home/ems
$ ./sonusEms stop fm
HA Manual Failover
Checking the HA Status
HA Messages During sonusEms start
Active System Success
Standby System Success
Active or Standby System Issues
HA Messages During sonusEms stop
HA Logs
Location of Logs
HA Audit Log
Agent Trace Log
RAID Lock Mechanism
Rebooting an HA Server
Shutting down an HA Server
Removing a Node from Cluster
Converting an HA System to Standalone
Overview
Prerequisite
Creating Database Dump File
Creating Netcool Dump Files
Running configure HA to convert an HA system to Standalone
HA Manual Failover
It may become necessary in a HA system, either as a planned event or due to an incomplete automatic failover, to
initiate a manual failover from the active to the standby system. Perform the following to initiate a failover:
The success or failure of the failover is displayed. The possible messages are:
When you run sonusEms status, you will also see the information described in Step 3.
# cd /export/home/ems/conf/HA
# ./hamgmt getState
The actual state and the configured state of the server are displayed. The possible states are:
UNKNOWN
ACTIVE
STANDBY
ACTIVE_INTENT (attempted to become active but failed because the required resources were not
available)
STANDBY_INTENT (attempted to become standby but failed because the presently owned resources
could not be relinquished)
The following information about resources held by the system will also be displayed:
During a successful sonusEms start on the active system, the following messages are displayed:
Trying to connect to HA
This system is configured for High Availability support.
Commencing HA startup now.
Fail over control has been initialized.
This system is the Active HA system. The Insight processes will now be started.
During a successful sonusEms start on the standby system, the following messages are displayed:
Trying to connect to HA
This system is configured for High Availability support.
Commencing HA startup now.
Fail over control has been initialized.
This system is the Standby HA system. Only some of the Insight processes will be
started.
During an unsuccessful sonusEms start on the active or standby system, the following HA issues can be displayed:
During a sonusEms stop on the active or standby system, the following messages are displayed:
HA Logs
The ha_audit_log and the agent_trace_log files are located under the directory <agent_home>/logs.
The <agent_home> directory is the location in which the Sonus agent is installed. You can find this name by
typing:
HA Audit Log
The ha_audit_log contains logging statements for the time of HA transitions, the previous HA state of the
system, and the current HA state of the system.
The agent_trace_log contains logging statements for FailOverControl, heartbeat, system check, and
auto-starting related issues.
To prevent an Oracle data corruption, a new functionality RAID Lock Mechanism is added. Any server that is active,
locks the RAID with its signature and unlocks it during switchover. The server cannot mount the RAID, if it is locked
by the peer.
If the RAID is locked, contact Sonus support to manually unlock the RAID. Because of the risk of dual
mounting the RAID, removing the RAID lock must be done by Sonus support ONLY.
Rebooting an HA Server
# reboot
The failover successfully happens after the rebooted active server comes up. The RAID lock is released after the
server comes up.
# shutdown
/opt/sonus/ems/conf/HA/RAC/hamgmt shutdownNode
Overview
This section describes how to convert either the active or standby system to a standalone system by running
configureHA and selecting option 8.
This process points the database instance to the local database files and sets the IP address of the system to the
previously configured reachability address for the system.
Prerequisite
Before performing the procedure Running configure HA to convert an HA system to Standalone, place database
dump files on the system by performing the following procedure:
1. As user oracle on system A (the active system), export the existing database by entering the following
commands on system A:
$ cd <ORACLE_BASE>/backup/bin
$ ./export.sh
The script generates two exported files, exp_data.dmp and exp_strct.dmp and puts them in
<ORACLE_BASE>/backup/dump. Sonus recommends that you copy these files to an external location as an
additional safety precaution.
2. If you are converting the standby system (system B) to standalone, then as user oracle, move the two
exported files generated in Step 1 to system B. Place them in:<ORACLE_BASE>/backup/dump
mkdir -p /export/home/netcool/omnibus/db.bak
/export/home/ems/conf/netcool/netcooladmin/backupDB.sh -d
/export/home/netcool/omnibus/db.bak
The path does not contain a line break and there should be one space after -d
1. Run haMigrateFiles.sh script on Active system to move the reports and PM files from RAID.
$ cd /export/home/ems
./sonusEms stop
b. Login as root in the Active system and enter the following commands to start the
haMigrateFiles.sh script.
# cd /export/home/ems/conf/HA
# ./haMigrateFiles.sh
$ cd /export/home/ems
./sonusEms stop
b. Release resources on Active system, login as root in Active system and release resources.
# cd /export/home/ems/conf/HA
# ./haResources release
c.
# cd /export/home/ems/conf/HA
# ./haResources takeover
d. Login as root in the Standby system and enter the following commands to start the haMigrateFiles.sh
script.
# cd /export/home/ems/conf/HA
# ./haMigrateFiles.sh
e. Release resources on Standby system, login as root in Standby system and release resources.
# cd /export/home/ems/conf/HA
# ./haResources release
3. Takeover resources on Active system, login as root in Active system and takeover resources:
# cd /export/home/ems/conf/HA
# ./haResources takeover
4. As root on the system that you are converting to standalone, enter the following command to start the
configureHA script:
# cd /export/home/ems/conf/HA
# ./configureHA
This option will convert your system to standalone mode. Do you want to
proceed? (default: n) [y,n]
Importing the database does not import historical performance management data
and user activity logs because this may take several hours to complete.
Enter yes if you wish to do the stats import, or no to skip importing the
stats.? (default: no) [y,n]
If you want to restore historical performance management data and user activity logs (this can take several
hours), type Y and press enter. Otherwise, type n and press Enter.
9. The system displays one of the following, depending on your response in Step 8:
Do you want to notify all registered IAS systems of this new IP address?
(default: no) [y,n]
To notify all the IASs that were registered to the HA system of the new standalone system’s IP address, type
y and press Enter. Otherwise, type n and press Enter.
11. The system displays one of the following, depending on your response in Step 10:
You selected to notify the registered IAS systems. Is that correct? (default:
no) [y,n]
You selected to not notify the registered IAS systems. Is that correct?
(default: no) [y,n]
14. Migrate fault data from the active system to the standby system as follows:
a. Open a second window on the standby system and as user insight, remove the symbolic link and
create the local directory:
/bin/rm /export/home/netcool/omnibus/db
mkdir -p /export/home/netcool/omnibus/db/SONUSDB
b. Copy the files created on, see Creating Netcool Dump Files, to Standby.
For example,
scp /export/home/netcool/omnibus/db.bak/*.tab
insight@<systemB>:/export/home/netcool/omnibus/db/SONUSDB
where <systemB> is the local reachability IP address for the standby system.
(the above example does not contain a line break, and there should be only one
space after *.tab)
15. If you entered import in Step 12, the system displays the following:
To import a saved Netcool database to the local system, you need to have
table_store.tab and master_store.tab files.
Do you have access to table_store.tab and master_store.tab files? (default:
no) [y,n] y
Type q and press Enter to quit and complete the running of the configureHA script.
$ /export/home/ems/sonusEms start
Ignore the following step if the procedure is performed as part of Disaster Recovery Upgrade.
Switchover
A switchover is a planned role reversal between the production database and the standby database to avoid
downtime during scheduled maintenance on the production system or to test readiness for future role transitions. A
switchover guarantees no data loss. During a switchover, the production database and source system transition to a
standby role, and the standby database and target system transition to the production role.
Failover
A manual failover is performed when the production database fails and the standby database and target system are
transitioned to take over the production role, allowing business operations to continue. The user must run the
failover procedure in order for a failover to take place.
This section details the following switchover and failover scenarios in a disaster recovery (DR) Insight server
administrative tasks:
Overview
This section describes how to change the current source system into a target and change the current target system
into a source within a DR system (switchover). This scenario assumes that the current source is an HA system, the
current target is non-HA, and that DR is set up and running on the source and target systems.
The table 'Swithover of HA Source and non-HA Target' gives an overview for switching the HA source system and
the non-HA target system. The detailed steps are in "Procedure".
Step Original HA Source Active System Original HA Source Standby System Original Target System
Stop Insight.
2 Unschedule DR monitoring.
3 Run the convert script to change the target system to source mode.
Stop Insight.
5 Unschedule DR monitoring.
Stop Insight.
8 Unschedule DR monitoring.
10 Run source_switchover_step1.ksh.
11 Run target_switchover_step1.ksh.
12 Run source_switchover_step2.ksh.
13 Run target_switchover_step2.ksh.
15 Run configureDrMonitoring.
16 Run configureDrMonitoring.
17 Run configureDrMonitoring.
18 Start Insight.
20 Start Insight.
Procedure
Use the following procedure to switch the HA source and non-HA target systems (switchover).
1 Original target Stop Insight on the original (current) target system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms stop
2 Original target Unschedule DR monitoring on the original target system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
3 Original target As root on the original target system, run the convert script to change the system to source mode:
a. As root on the original target system, run the convert script as follows:
# ./convert
4 Original source standby Stop Insight on the original source standby system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms -d stop
For Insight V09.00.00 release and earlier, enter the following command:
$ ./sonusEms stop
5 Original source standby Stop FM Trap Receiver process by executing the following command as user insight.
$ cd /export/home/ems
$ ./sonusEms stop fmReceiver
You can check the status by executing the following command as user insight.
$ cd /export/home/ems
$./sonusEms status fmReceiver
6 Original source standby Unschedule DR monitoring on the original source standby system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
8 Original source active Stop Insight on the original source active system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms -d stop
For Insight V09.00.00 release and earlier, enter the following command:
$ ./sonusEms stop
9 Original source active Stop FM Trap Receiver process by executing the following command as user insight:
$ cd /export/home/ems
$./sonusEms stop fmReceiver
$ cd /export/home/ems
$./sonusEms status fmReceiver
10 Original source active Unschedule DR monitoring on the original source active system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
11 Original source active a. As root on the original source active system, run the convert script as follows:
# ./convert
12 Original source active On the original Source Active, change the user as insight, and enter the following:
$ cd /export/home/sonusComm/bin/
$ ./sonusAgent stop
13 Original source active On the original source active system, change to user oracle, and enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./source_switchover_step1.ksh
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./target_switchover_step1.ksh
15 Original source active On the original source active system as user oracle, enter the following:
$ ./source_switchover_step2.ksh
16 Original target On the original target system as user oracle, enter the following:
$ ./target_switchover_step2.ksh
The source and target systems have been switched. Steps "17", "18", and "19" verify that replication is functioning.
17 New source (original target) On the new source (original target) system as user oracle, enter the following:
$ ./create_archivelog.ksh
18 New source (original target) On the new source (original target) system as user oracle, enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/monitor
$ ./sequence_num_status.ksh
SOURCE_SEQUENCE
---------------
172
TARGET_ARCHIVED_SEQ TARGET_APPLIED_SEQ
------------------- ------------------
172 171
19 New source (original target) On the new source (original target) system as user oracle, perform the following:
c. Check to see if the SOURCE_SEQUENCE, TARGET_ARCHIVED_SEQ, and TARGET_APPLIED_SEQ values have all incremented from
those displayed in Step "18".
If all of the values have incremented from those displayed in Step "18", go to Step "20".
If any of the values have not incremented from those displayed in Step "18", repeat Step "19", substeps "a", "b", and "c" every few minutes
until all the values have incremented. It is not unusual for this to take 15 minutes.
If you repeat substeps "a", "b", and "c" for 15 minutes and any of the values have not incremented, contact the Sonus TAC.
20 New target active (original Schedule DR monitoring on the new target active (original source active) system. As root, enter the following:
source active)
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
21 New target standby Schedule DR monitoring on the new target standby (original source standby) system. As root, enter the following:
(original source standby)
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
23 New target active (original On the new Target Active (original Source Active), change user to insight, and enter the following:
source active)
$ cd /export/home/sonusComm/bin/
$ ./sonusAgent start
24 New source (original target) Start Insight on the new source (original target) system by logging in as insight and executing the following commands (this system then becomes
the new source):
$ cd /export/home/ems
$ ./sonusEms start
25 New target active (original Start Insight on the new target active (original source active) system by logging in as insight and executing the following commands (this system then
source active) becomes the new target active):
$ cd /export/home/ems
$ ./sonusEms start
26 New target standby Start Insight on the new target standby (original source standby) system by logging in as insight and executing the following commands (this system
(original source standby) then becomes the new target standby):
$ cd /export/home/ems
$ ./sonusEms start
27 If you have IASs registered to the original source system, continue to Step "28".
If you do not have any IASs registered to the original source system, this procedure is complete.
28 New source (original target) On the new source (original target) system, enter the following commands to update the Insight IP address on the IASs that were registered to the
original source system:
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IP address on all IASs that were registered to the original source system are updated to the IP address of the new source system.
Step Original HA Source Original HA Source Original HA Target Active Original HA Target
Active System Standby System System Standby System
1 (Start of
maintenance
window.)
Stop Insight.
2 Unschedule DR
monitoring.
7 (Start of maintenance
window).
Stop Insight.
8 Unschedule DR
Monitoring
10 (Start of maintenance
window).
Stop Insight.
11 Unschedule DR Monitoring
13 Run
target_switchover_step2.ksh.
Run
target_switchover_step2.ksh.
15 Run
source_switchover_step2.ksh.
16 Run
target_switchover_step2.ksh.
18 Run configureDrMonitoring.
19 Run
configureDrMonitoring.
20 Run configureDrMonitoring.
21 Run
configureDrMonitoring.
23 Start Insight.
(End of maintenance
window.)
24 Start Insight.
(End of maintenance
window.)
25 Start Insight.
(End of maintenance
window.)
Overview
This section describes how to change the current source system into a target and change the current target system
into a source within a DR system (switchover). This scenario assumes that the current source is an HA system, the
current target is an HA system, and that DR is set up and running on the source and target systems.
The 'Switchover of HA Source and HA Target' table gives an overview for switching the HA source system and the
HA target system.
Procedure
Use the following procedure to switch the HA source and HA target systems (switchover).
1 Original target standby Stop Insight on the original (current) target standby system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms stop
$ cd /export/home/ems
$./sonusEms stop fmReceiver
$ cd /export/home/ems
$./sonusEms status fmReceiver
3 Original target standby Unschedule DR monitoring on the original target system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
4 Original target standby As root on the original target standby system, run the convert script to change the system to source mode:
a. As root on the original target standby system, run the convert script as follows:
# ./convert
5 Original target active Stop Insight on the original source standby system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms stop
6 Original target active Stop FM Trap Receiver process by executing the following command as user insight.
$ cd /export/home/ems
$ ./sonusEms stop fmReceiver
You can check the status by executing the following command as user insight.
$ cd /export/home/ems
$./sonusEms status fmReceiver
7 Original target active Unschedule DR monitoring on the original target active system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
9 Original source standby Stop Insight on the original source standby system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms -d stop
For Insight V09.00.00 release and earlier, enter the following command:
$ ./sonusEms stop
10 Original source standby Stop FM Trap Receiver process by executing the following command as user insight:
$ cd /export/home/ems
$./sonusEms stop fmReceiver
$ cd /export/home/ems
$./sonusEms status fmReceiver
11 Original source standby Unschedule DR monitoring on the original source standby system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
12 Original source standby As root on the original source standby system, run the convert script to change the system to target mode:
a. As root on the original source active system, run the convert script as follows:
# ./convert
13 Original source active On the original Source Active, change the user as insight, and enter the following:
$ cd /export/home/sonusComm/bin/
$ ./sonusAgent stop
$ cd /export/home/ems
$ ./sonusEms -d stop
15 Original source active Stop FM Trap Receiver process by executing the following command as user insight::
$ cd /export/home/ems
$./sonusEms stop fmReceiver
$ cd /export/home/ems
$./sonusEms status fmReceiver
16 Original source active Unschedule DR monitoring on the original source active system.
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
17 Original source active As root on the original source active system, run the convert script to change the system to target mode:
a. As root on the original source active system, run the convert script as follows:
# ./convert
18 Original source active On the original source active system, change to the user oracle, and enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./source_switchover_step1.ksh
19 Original target active On the original target active system, change to user oracle, and enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./target_switchover_step1.ksh
20 Original source active On the original source active system as user oracle, enter the following:
$ ./source_switchover_step2.ksh
21 Original target active On the original target active system as user oracle, enter the following:
$ ./target_switchover_step2.ksh
The source and target systems have been switched. Steps "22", "23", and "24" verify that replication is functioning.
23 New source active (original On the new source active (original target active) system as user oracle, enter the following:
target active)
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/monitor
$ ./sequence_num_status.ksh
SOURCE_SEQUENCE
---------------
172
TARGET_ARCHIVED_SEQ TARGET_APPLIED_SEQ
------------------- ------------------
172 171
24 New source active (original On the new source active (original target active) system as user oracle, perform the following:
target active)
a. Enter the following again:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./create_archivelog.ksh
c. Check to see if the SOURCE_SEQUENCE, TARGET_ARCHIVED_SEQ, and TARGET_APPLIED_SEQ values have all incremented from
those displayed in Step "23".
If all of the values have incremented from those displayed in Step "23", go to Step "25".
If any of the values have not incremented from those displayed in Step "23", repeat Step "24", substeps "a", "b", and "c" every few minutes
until all the values have incremented. It is not unusual for this to take 15 minutes.
If you repeat substeps "a", "b", and "c" for 15 minutes and any of the values have not incremented, contact the Sonus TAC.
25 New target active (original On the new Target Active (original Source Active), change user to insight, and enter the following:
source active)
$ cd /export/home/sonusComm/bin/
$ ./sonusAgent start
26 New target active (original Schedule DR monitoring on the new target active (original source active) system. As root, enter the following:
source active)
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
27 New target standby Schedule DR monitoring on the new target standby (original source standby) system. As root, enter the following:
(original source standby)
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
28 New source active (original Schedule DR monitoring on the new source active (original target active) system. As root, enter the following:
target active)
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
29 New source standby Schedule DR monitoring on the new source standby (original target standby) system. As root, enter the following:
(original target standby)
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
30 New source active (original Start Insight on the new source active (original target active) system by logging in as insight and executing the following commands (this system then
target active) becomes the new source active):
$ cd /export/home/ems
$ ./sonusEms start
$ cd /export/home/ems
$ ./sonusEms start
32 New target active (original Start Insight on the new target active (original source active) system by logging in as insight and executing the following commands (this system then
source active) becomes the new target active):
$ cd /export/home/ems
$ ./sonusEms start
33 New target standby Start Insight on the new target standby (original source standby) system by logging in as insight and executing the following commands (this system
(original source standby) then becomes the new target standby):
$ cd /export/home/ems
$ ./sonusEms start
34 If you have IASs registered to the original source system, continue to Step "35".
If you do not have any IASs registered to the original source system, this procedure is complete.
35 New source active (original On the new source active (original target active) system, enter the following commands to update the Insight IP address on the IASs that were
target active) registered to the original source system:
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IP address on all IASs that were registered to the original source system are updated to the IP address of the new source system.
Overview
This section describes how to change the current source system into a target and change the current target system
into a source within a DR system (switchover). This scenario assumes that the current source is a non-HA system,
the current target is HA, and that DR is set up and running on the source and target systems.
The following table gives an overview for switching the non-HA source system and the HA target system. The
detailed steps are in "Switchover of the non-HA Source and HA Target".
Step Original Source System Original HA Target Active System Original HA Target Standby System
Stop Insight.
2 Unschedule DR monitoring.
Stop Insight.
5 Unschedule DR monitoring.
6 Run the convert script to change the target active system to source mode.
Stop Insight.
8 Unschedule DR monitoring.
10 Run source_switchover_step1.ksh.
11 Run target_switchover_step1.ksh.
12 Run source_switchover_step2.ksh.
13 Run target_switchover_step2.ksh.
15 Run configureDrMonitoring.
16 Run configureDrMonitoring.
17 Run configureDrMonitoring.
18 Start Insight.
19 Start Insight.
20 Start Insight.
Procedure
Use the following procedure to switch the source and target systems (switchover) when the target is an HA system.
1 Original target standby Stop Insight on the original (current) target standby system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms stop
2 Original target standby Stop FM Trap Receiver process by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms stop fmReceiver
$ cd /export/home/ems
$ ./sonusEms stop fmReceiver
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
4 Original target standby As root on the original target system, run the convert script to change the system to source mode:
a. As root on the original target system, run the convert script as follows:
# ./convert
5 Original target active Stop Insight on the original source standby system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms stop
6 Original target active Stop FM Trap Receiver process by executing the following command as user insight.
$ cd /export/home/ems
$ ./sonusEms stop fmReceiver
You can check the status by executing the following command as user insight.
$ cd /export/home/ems
$./sonusEms status fmReceiver
7 Original target active Unschedule DR monitoring on the original source standby system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
8 Original target active As root on the original target active system, run the convert script to change the system to source mode:
a. As root on the original target active system, run the convert script as follows:
# ./convert
9 Original source Stop Insight on the original source system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms -d stop
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
11 Original source As root on the original source system, run the convert script to change the system to target mode:
a. As root on the original source system, run the convert script as follows:
# ./convert
12 Original source On the original source active system, change to user oracle, and enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./source_switchover_step1.ksh
13 Original Target active On the original target active system, change to user oracle, and enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./target_switchover_step1.ksh
14 Original source On the original source system as user oracle, enter the following:
$ ./source_switchover_step2.ksh
15 Original target active On the original target active system as user oracle, enter the following:
$ ./target_switchover_step2.ksh
The source and target systems have been switched. Steps "17", "18", and "19" verify that replication is functioning.
16 New source active (original On the new source active (original target active) system as user oracle, enter the following:
target active)
$ ./create_archivelog.ksh
17 New source active (original On the new source active (original target active) system as user oracle, enter the following:
target active)
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/monitor
$ ./sequence_num_status.ksh
SOURCE_SEQUENCE
---------------
172
TARGET_ARCHIVED_SEQ TARGET_APPLIED_SEQ
------------------- ------------------
172 171
c. Check to see if the SOURCE_SEQUENCE, TARGET_ARCHIVED_SEQ, and TARGET_APPLIED_SEQ values have all incremented from
those displayed in Step "17".
If all of the values have incremented from those displayed in Step "17", go to Step "19".
If any of the values have not incremented from those displayed in Step "17", repeat Step "18", substeps "a", "b", and "c" every few minutes
until all the values have incremented. It is not unusual for this to take 15 minutes.
If you repeat substeps "a", "b", and "c" for 15 minutes and any of the values have not incremented, contact the Sonus TAC.
19 New target (original source) Schedule DR monitoring on the new target (original source) system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
20 New source active (original Schedule DR monitoring on the new source standby (original target standby) system. As root, enter the following:
target standby)
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
21 New source standby Schedule DR monitoring on the new source standby (original target standby) system. As root, enter the following:
(original target standby)
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
22 New source active (original Start Insight on the new source active (original target active) system by logging in as insight and executing the following commands (this system then
target active) becomes the new source active):
$ cd /export/home/ems
$ ./sonusEms start
23 New source standby Start Insight on the new source standby (original target standby) system by logging in as insight and executing the following commands (this system
(original target standby) then becomes the new source standby):
$ cd /export/home/ems
$ ./sonusEms start
24 New target (original source Start Insight on the new target (original source) system by logging in as insight and executing the following commands (this system then becomes
) the new target):
# cd /export/home/ems
# ./sonusEms start
25 If you have IASs registered to the original source system, continue to Step "28".
If you do not have any IASs registered to the original source system, this procedure is complete.
26 New source active (original On the new source active (original target active) system, enter the following commands to update the Insight IP address on the IASs that were
target active) registered to the original source system:
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IP address on all IASs that were registered to the original source system are updated to the IP address of the new source system.
Overview
This section describes how to change the current source system into a target and change the current target system
into a source within a DR system (switchover). This scenario assumes that the current source and target are non-HA
systems and that DR is set up and running on the source and target systems.
The following table gives an overview for switching the non-HA source system and the target system. The detailed
steps are in Table 2: Switchover of non-HA Source and non-HA Target.
Stop Insight.
2 Unschedule DR monitoring.
3 Run the convert script to change the target system to source mode.
Stop Insight.
5 Unschedule DR monitoring.
7 Run source_switchover_step1.ksh.
8 Run target_switchover_step1.ksh.
9 Run source_switchover_step2.ksh.
10 Run target_switchover_step2.ksh.
11 Run create_archivelog.ksh and sequence_num_status.ksh and make a note of the SOURCE_SEQUENCE, TARGET_ARCHIVED
_SEQ, and TARGET_APPLIED_SEQ values.
12 Run create_archivelog.ksh and sequence_num_status.ksh to verify that the sequence numbers are incrementing.
13 Run configureDrMonitoring.
14 Run configureDrMonitoring.
15 Start Insight.
16 Start Insight.
17 Update the EMS IP address on the IASs that were registered to the original source system.
Procedure
Use the following procedure to switch the source and target systems (switchover) when both the source and the
target are non-HA systems.
$ cd /export/home/ems
$ ./sonusEms stop
2 Original target Unschedule DR monitoring on the original target system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
3 Original target As root on the original target system, run the convert script to change the system to source mode:
a. As root on the original target system, run the convert script as follows:
# ./convert
4 Original source Stop Insight on the original source system by executing the following command as user insight:
$ cd /export/home/ems
$ ./sonusEms -d stop
5 Original source Unschedule DR monitoring on the original source system. As root, enter the following:
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
6 Original source As root on the original source system, run the convert script to change the system to source mode:
a. As root on the original source system, run the convert script as follows:
# ./convert
7 Original source On the original source system, change to user oracle, and enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./source_switchover_step1.ksh
8 Original target On the original target system, change to user oracle, and enter the following:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./target_switchover_step1.ksh
9 Original source On the original source system as user oracle, enter the following:
$ ./source_switchover_step2.ksh
$ ./target_switchover_step2.ksh
The source and target systems have been switched. Steps "11", "12", and "13" verify that replication is functioning.
11 New source On the new source (original target ) system as user oracle, enter the following:
(original target )
$ ./create_archivelog.ksh
New source On the new source (original target) system as user oracle, enter the following:
(original target)
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/monitor
$ ./sequence_num_status.ksh
12 New source On the new source (original target) system as user oracle, perform the following:
(original target)
a. Enter the following again:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./create_archivelog.ksh
c. Check to see if the SOURCE_SEQUENCE, TARGET_ARCHIVED_SEQ, and TARGET_APPLIED_SEQ values have all incremented from those
displayed in Step "11".
If all of the values have incremented from those displayed in Step "11", go to Step "13".
If any of the values have not incremented from those displayed in Step "11", repeat Step "12", substeps "a", "b", and "c" every few minutes until all
the values have incremented. It is not unusual for this to take 15 minutes.
If you repeat substeps "a", "b", and "c" for 15 minutes and any of the values have not incremented, contact the Sonus TAC.
13 New target Schedule DR monitoring on the new target (original source) system. As root, enter the following:
(original source)
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
14 New source Schedule DR monitoring on the new source(original target) system. As root, enter the following:
(original target)
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring
15 New source Start Insight on the new source (original target) system by logging in as insight and executing the following commands (this system then becomes the new
(original target) source):
$ cd /export/home/ems
$ ./sonusEms start
16 New target Start Insight on the new target (original source) system by logging in as insight and executing the following commands (this system then becomes the new
(original source) target):
$ cd /export/home/ems
$ ./sonusEms start
If you have IASs registered to the original source system, continue to Step "19".
If you do not have any IASs registered to the original source system, this procedure is complete.
17 New source On the new source (original target) system, enter the following commands to update the Insight IP address on the IASs that were registered to the original
(original target) source system:
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IP address on all IASs that were registered to the original source system are updated to the IP address of the new source system.
Overview
This section also describes how to put the original source system into operation as an additional non-DR system if
the system is still serviceable. This additional non-DR system should not be used to concurrently manage the same
devices that the original target manages.
The table Failover-Converting HA Source and non-HA Target to non-DR Systems gives an overview for converting
the DR system into two non-DR systems. The detailed steps are in "Procedure". If you are not placing the original
source system into operation, then only steps "1" through "6" in following Table need to be performed.
Step Original HA Source Active Original HA Source Standby Original Target System
Number System System
Stop Insight.
2 Unschedule DR monitoring.
6 Start Insight.
(End of maintenance window.)
This is now a
standalone system that
replaces the DR
system.
Stop Insight.
8 Unschedule DR monitoring.
Stop Insight.
11 Unschedule DR monitoring.
13 Start Insight.
(End of maintenance window.)
14 Start Insight.
Procedure
Use the following procedure to make the target system take over as a non-DR Insight server that replaces the
In addition, perform Steps "10" through "" if you want to put the original HA source system into operation as an
additional non-DR system.
1 Original Stop Insight on the original target system by executing the following command as user insight:
target
$ cd /export/home/ems
$ ./sonusEms stop
2 Original Unschedule DR monitoring on the original target system. As root, enter the following:
target
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
# ./convert
Answer c
c. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
4 Original On the original target system, change to user oracle, and enter the following:
target
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./database_failover.ksh
# cd /export/home/ems/conf
# ./restoreDatabasePasswords.sh
$ cd /export/home/ems
$ ./sonusEms start
7 If you have IASs registered to the original source system, continue to Step "8".
If you do not have any IASs registered to the original source system, skip to Step "9".
8 Original On the original target system, enter the following commands to update the Insight IP address on the
target IASs that were registered to the original source system:
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IP address on all IASs that were registered to the original source system are updated to the
IP address of the original target system.
9 If you are not putting the original source system back into service, this procedure is complete.
If the original source system is still serviceable and you want to put it into operation as an additional
non-DR system, continue to Step "10".
If you convert the original source system into an additional non-DR system and put it
into service, it should not be used to concurrently manage the same devices that the
original target manages.
10 Original Stop Insight on the original source standby system by executing the following command as user
source insight:
standby
$ cd /export/home/ems
$ ./sonusEms -d stop
For Insight V09.00.00 release and earlier, enter the following command:
$ ./sonusEms stop
12 Original As root on the original source standby system, run the convert script to change the system to
source standalone mode:
standby a. As root on the original source standby system, run the convert script as follows:
# ./convert
Answer c.
c. The following prompt appears:
Answer Y.
d. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
$ cd /export/home/ems
$ ./sonusEms -d stop
For Insight V09.00.00 release and earlier, enter the following command:
$ ./sonusEms stop
14 Original Unschedule DR monitoring on the original source active system. As root, enter the following:
source
active
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
# ./convert
Answer c.
c. The following prompt appears:
Answer Y.
d. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
scp -r oracle@<SOURCE_ACTIVE_IP>:$ORACLE_BASE/orarepl
$ORACLE_BASE
$ cd /export/home/ems
$ ./sonusEms start
19 Original On the original source standby system as user insight, enter the following::
source
standby
$ cd /export/home/ems
$ ./sonusEms start
Overview
This section describes how to make the target system take over as a non-DR Insight server that replaces the current
DR system (failover). This scenario assumes that the current source is a non-HA system, the current target is an HA
system, and DR is set up and running on the source and target systems.
This section also describes how to put the original source system into operation as an additional non-DR system if
the system is still serviceable. This additional non-DR system should not be used to concurrently manage the same
devices that the original target manages.
The table Failover-Converting non-HA Source and HA Target to non-DR Systems gives an overview for converting
the DR system into two non-DR systems. If you are not placing the original source system into operation, then only
steps "1" through "10" in Failover-Converting non-HA Source and HA Target to non-DR Systems need to be
performed.
Step Original Source System Original HA Target Active System Original HA Target Standby System
Number
Stop Insight.
2 Unschedule DR monitoring.
Stop Insight.
5 Unschedule DR monitoring.
8 Run the
restoreDatabasePasswords.sh
script.
9 Start Insight.
10 Start Insight.
11 (Start of maintenance
window.)
Stop Insight.
12 Unschedule DR monitoring.
14 Start Insight.
(End of maintenance
window.)
Procedure
Use the following procedure to make the HA target system take over as a non-DR HA system that replaces the
In addition, perform Steps "13" through "17" if you want to put the original source system into operation as an
additional non-DR system.
1 Original Stop Insight on the original target standby system by executing the following command as user insight:
target
standby
$ cd /export/home/ems
$ ./sonusEms stop
2 Original Unschedule DR monitoring on the original target standby system. As root, enter the following:
target
standby
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
# ./convert
Answer c
c. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
4 Original Stop Insight on the original target active system by executing the following command as user insight:
target
active
$ cd /export/home/ems
$ ./sonusEms stop
5 Original Unschedule DR monitoring on the original target active system. As root, enter the following:
target
active
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
# ./convert
Answer c.
c. The following prompt appears:
Answer Y.
d. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
7 Original On the original target active system, change to user oracle, and enter the following:
target
active
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./database_failover.ksh
9 Original Start Insight on the original target active system by logging in as insight and executing the following
target commands (this system starts up as an HA active EMS that replaces the DR system):
active
$ cd /export/home/ems
$ ./sonusEms start
19 Original Start Insight on the original target standby system by logging in as insight and executing the following
source commands (this system starts up as the standby in the HA system that replaces the DR system).
standby
$ cd /export/home/ems
$ ./sonusEms start
11 f you have IASs registered to the original source system, continue to Step "12".
If you do not have any IASs registered to the original source system, skip to Step "13".
12 Original On the original target active system, enter the following commands to update the Insight IP address on
target the IASs that were registered to the original source system (use the well-known IP address for the HA
active system):
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IP address on all IASs that were registered to the original source system are updated to the
well-known IP address of the original HA target system.
13
If you are not putting the original source system back into service, this procedure is complete.
If the original source system is still serviceable and you want to put it into operation as an additional
non-DR system, continue to Step "14".
If you convert the original source system into an additional non-DR system and put it
into service, it should not be used to concurrently manage the same devices that the
original target manages.
$ cd /export/home/ems
$ ./sonusEms -d stop
For Insight V09.00.00 release and earlier, enter the following command:
$ ./sonusEms stop
15 Original Unschedule DR monitoring on the original source system. As root, enter the following:
source
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
# ./convert
Answer c
c. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
17 Original Start Insight on the original source system by logging in as insight and executing the following
source commands (this system starts up as a standalone EMS):
$ cd /export/home/ems
$ ./sonusEms start
Overview
This section also describes how to put the original source system into operation as an additional non-DR system if
the system is still serviceable. This additional non-DR system should not be used to concurrently manage the same
devices that the original target manages.
The table Failover-Converting DR System HA Source and HA Target to Separate non-DR Insight Servers gives an
overview for converting the DR system into two non-DR systems. The detailed steps are in "Procedure". If you are
not placing the original source system into operation, then only steps "1" through "10" in Failover-Converting DR
System HA Source and HA Target to Separate non-DR Insight Servers need to be performed.
Table 116: Failover-Converting DR System HA Source and HA Target to Separate non-DR Insight Servers
Step Original HA Source Original HA Source Original HA Target Active Original HA Target
Number Active System Standby System System Standby System
Prerequisites: Install/upgrade Insight V09.03.00 HA system and Prerequisites: Install/upgrade Insight V09.03.00 HA
start Insight system and start Insight
1 (Start of
maintenance
window.)
Stop Insight.
2 Unschedule DR
monitoring.
4 (Start of maintenance
window).
Stop Insight.
5 Unschedule DR Monitoring
8 Run the
restoreDatabasePasswords.sh
script.
This is now
the active in
the HA
system that
replaces the
DR system.
10 Start Insight.
(End of maintenance
window.)
11 (Start of maintenance
window).
Stop Insight.
12 Unschedule DR
Monitoring
14 (Start of maintenance
window).
Stop Insight.
15 Unschedule DR
Monitoring
17 Start Insight.
(End of maintenance
window.)
18
Start Insight.
(End of maintenance
window.)
Use the following procedure to make the HA target system take over as a non-DR Insight server that replaces the
current DR system (failover).
In addition, perform Steps "14" through "" if you want to put the original HA source system into operation as an
additional non-DR system.
1 Original Stop Insight on the original target standby system by executing the following command as user insight:
target
standby
$ cd /export/home/ems
$ ./sonusEms stop
2 Original Unschedule DR monitoring on the original target standby system. As root, enter the following:
target
standby
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
# ./convert
Answer c
c. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
4 Original Stop Insight on the original target active system by executing the following command as user insight:
target
active
$ cd /export/home/ems
$ ./sonusEms stop
6 Original As root on the original target active system, run the convert script to change the system to standalone
target mode:
active a. As root on the original target active system, run the convert script as follows:
# ./convert
Answer c.
c. The following prompt appears:
Answer Y.
d. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
8 Original As root on the original target active system, enter the following:
target
active
# cd /export/home/ems/conf
# ./restoreDatabasePasswords.sh
9 Original Start Insight on the original target active system by logging in as insight and executing the following
target commands (this system starts up as the active in the HA system that replaces the DR system):
active
$ cd /export/home/ems
$ ./sonusEms start
10 Original Start Insight on the original target standby system by logging in as insight and executing the following
target commands (this system starts up as the standby in the HA system that replaces the DR system):
standby
$ cd /export/home/ems
$ ./sonusEms start
11 If you have IASs registered to the original source system, continue to Step "12".
If you do not have any IASs registered to the original source system, skip to Step "13".
12 Original On the original target active system, enter the following commands to update the Insight IP address on
target the IASs that were registered to the original source system:
active
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IP address on all IASs that were registered to the original source system are updated to
the IP address of the original target system.
If the original source system is still serviceable and you want to put it into operation as an additional
non-DR system, continue to Step "14".
If you convert the original source system into an additional non-DR system and put it
into service, it should not be used to concurrently manage the same devices that the
original target manages.
14 Original Stop Insight on the original source standby system by executing the following command as user
source insight:
standby
$ cd /export/home/ems
$ ./sonusEms -d stop
For Insight V09.00.00 release and earlier, enter the following command:
$ ./sonusEms stop
15 Original Unschedule DR monitoring on the original source standby system. As root, enter the following:
source
standby
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
# ./convert
Answer c.
c. The following prompt appears:
Answer Y.
d. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
$ ./sonusEms -d stop
$ ./sonusEms stop
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
# ./convert
Answer c.
c. The following prompt appears:
Answer Y.
d. The following prompt appears:
Answer Y.
When the convert script has finished, the following appears:
scp -r $ORACLE_HOME/orarepl
oracle@<SOURCE_STANDBY_IP>:$ORACLE_HOME
22 Original Start Insight on the original source active system by logging in as insight and executing the following
source commands:
active
$ cd /export/home/ems
$ ./sonusEms start
23 Original Start Insight on the original source standby system by logging in as insight and executing the following
source commands:
standby
$ cd /export/home/ems
$ ./sonusEms start
Overview
This section describes how to make the target system take over as a non-DR Insight server that replaces the current
DR system (failover). This scenario assumes that the current source and target are non-HA systems and that DR is
set up and running on the source and target systems.
This section also describes how to put the original source system into operation as an additional non-DR system if
the system is still serviceable. This additional non-DR system should not be used to concurrently manage the same
devices that the original target manages
The table "Failover-Converting DR System non-HA Source and Target to Separate non-DR Insight Servers " gives
an overview for converting the DR system into two non-DR systems. If you are not placing the original source
system into operation, then only steps "1" through "6" in "Failover-Converting DR System non-HA Source and
Target to Separate non-DR Insight Servers" need to be performed.
Stop Insight.
2 Unschedule DR monitoring.
6 Start Insight.
Stop Insight.
8 Unschedule DR monitoring.
10 Start Insight.
Procedure
Use the following procedure to make the target system take over as a non-DR Insight server that replaces the
current DR system (failover).
In addition, perform Steps "10" through "13" if you want to put the original source system into operation as an
additional non-DR system.
$ cd /export/home/ems
$ ./sonusEms stop
2 Original Unschedule DR monitoring on the original target system. As root, enter the following:
target
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
3 Original As root on the original target system, run the convert script to change the system to source mode:
target
a. As root on the original target system, run the convert script as follows:
# ./convert
Answer c
Answer Y.
When the convert script has finished, the following appears:
$ cd $ORACLE_BASE/orarepl/$ORACLE_SID/scripts/conf
$ ./database_failover.ksh
5 Original On the original target system, change to user root, and enter the following:
target
# cd /export/home/ems/conf
# ./restoreDatabasePasswords.sh
6 Original Start Insight on the original target system by logging in as insight and executing the following commands
target (this system starts up as a standalone EMS that replaces the DR system):
$ cd /export/home/ems
$ ./sonusEms start
7 If you have IASs registered to the original source system, continue to Step "8".
If you do not have any IASs registered to the original source system, skip to Step "9".
8 Original On the original target system, enter the following commands to update the Insight IP address on the IASs
target that were registered to the original source system:
# cd /export/home/ems/conf/IAS
# ./resetInsightIPForAll.sh
The Insight IP address on all IASs that were registered to the original source system are updated to the
IP address of the original target system.
9 If you are not putting the original source system back into service, this procedure is complete.
If the original source system is still serviceable and you want to put it into operation as an additional
non-DR system, continue to Step "10".
If you convert the original source system into an additional non-DR system and put it into
service, it should not be used to concurrently manage the same devices that the original
target manages.
$ cd /export/home/ems
$ ./sonusEms -d stop
For Insight V09.00.00 release and earlier, enter the following command:
$ ./sonusEms stop
11 Original Unschedule DR monitoring on the original source system. As root, enter the following:
source
# cd /export/home/ems/conf/DR
# ./configureDrMonitoring remove
# ./convert
Answer c
Answer Y.
When the convert script has finished, the following appears:
13 Original Start Insight on the original source system by logging in as insight and executing the following commands
source (this system starts up as a standalone EMS):
$ cd /export/home/ems
$ ./sonusEms start
If the DR system target node is down for maintenance for an extended period of time, the source system will store
replication data on its own disk. This can result in the source’s disk becoming full. In addition, traps that state the
target is down will repeatedly be sent by the source. To avoid these issues, convert the source to standalone mode
if the target will be down for an extended period of time.
For instructions on how to reset the root password, see All Solaris Accounts Except for User "insight".
The default length of time before a password expires is 90 days. The default password restrictions are given in the
next section.
To change the password restrictions or the length of time before passwords expire, as a user with root privileges,
edit the /etc/default/passwd file. You can either comment out lines that restrict values, or change the restricted
values.
For a description of the /etc/default/passwd file contents, see the Sun Microsystems Solaris 10 Reference
Manual Collection (http://docs.sun.com/app/docs/doc/
816-5165/6mbb0m9nr?a=view#FILES).
Password Restrictions
The following user password restrictions exist by default. Sonus recommends that you do not change these
restrictions.
The minimum number of characters in the password is 10.
The minimum number of alphabetic characters in the password is 4.
The minimum number of special characters in the password is 2.
The maximum number of repeated characters in the password is 2.
The four most recent passwords value may not be used.
By default, an account will be disabled if the user has not logged in within 90 days.
To change the default, edit the /usr/sadm/defadduser file to change the value of
definact=90
to the new value (in days) you desire. If you remove 90 and do not replace it with a new value, then the account
lockout feature will be disabled.
By default, a session that has been idle for 30 minutes will be closed.
To change the default, edit the /etc/profile file to change the value of
TMOUT=1800
to the new value (in seconds) you desire.
# cp /export/home/ems/conf/emsUnInstall.sh /tmp
# cd /tmp
# ./emsUnInstall.sh
Enabling disk mirroring will also make it easier for you to perform a fallback to previous version from future HA
upgrades. If you experience any issues in your production network following an upgrade, you can return to the
previous version of Insight by using the Rollback using Disk Mirroring procedure.
Sonus servers support only software mirroring. This section describes software mirroring only. Insight disk
mirroring is supported only on Netra T5220 four-disk systems.
Insight supports disk mirroring on Netra T5220 servers that have four internal disks. The following mirrors are set up:
Disk 1 Disk 3
Disk 2 Disk 4
This scheme allows the applications that use the second internal disk to continue using it for its intended purpose.
Each of the two disk mirrors requires the following SVM components:
Table 120: Mirrors and Submirrors on Netra T5220-4 with Mirrored Disks 1 and 3
Master Disk Submirror Name Slave Disk Submirror Name Mirror Name
Perform the following procedure on every Insight server on which internal disks mirroring is to be enabled. Disk
mirroring for Insight is supported on Netra T5220 four-disk systems.
Caution
Be sure to wait until synchronization completes before performing any other tasks, such as disabling,
suspending, resuming mirroring, configuring, or booting from the alternate boot device.
1. Issue the following command to verify that the Sonus disk mirroring toolkit package is installed:
# pkginfo SONSdmems
application SONSdmems Sonus disk mirroring management tools
Sonus recommends that you first run the dmctl commands in dry-run mode (use the --dryrun option)
to detect problems that would prevent successful mirroring. If the program does not report any fatal
errors, execute the program without the --dryrun option.
Ensure that the drive definitions are of format c1t*d*. If not, edit the /opt/SONSdmpsx/config/p
latform_T5220-4.conf file and modify the drive definitions accordingly before configuring disk
mirroring.
For example, if the drive definitions are of format c0t*d*, edit the values of svm.master.disk an
d svm.slave.disk to c*t*d* format in the platform_T5220-4.conf file.
Enter yes.
5. The following message appears:
Enter yes.
The server is rebooted.
Server will automatically reboot after a few minutes and you will loose connectivity. Please wait for
the reboot to complete. Login to the server back again after the reboot completes, and continue with
the next step.
Enter yes.
9. Use the metastat command to check the status of mirrors.
# metastat -c
Verify that the submirrors show a resync percentage. For example, the following appears:
10. Execute the following command to enable mirroring of disk 2 and disk 4:
Enter yes.
12. The following message appears:
Enter yes.
13. The following message appears:
Enter yes.
The server is rebooted.
14. After the server comes up, execute the following command:
Enter yes.
16. Use the metastat command to check the status of mirrors.
# metastat -c
Verify that the submirrors d200 and d201 show a resync percentage. For example, the following appears:
17. Enable disk mirror error reporting (through email). See Customizing Health Monitoring-DR Solaris.
18. Enable periodic disk mirror error monitoring and reporting (using a cron job). See Monitoring Disk Mirror
# metastat -c
Use the following command to examine the status of mirrors and submirrors:
metastat -c
Use the following command to examine the status of the state database replicas:
metadb -i
The following procedures describes how to disable disk mirroring in a four-disk system.
Caution
Disabling disk mirroring stops data synchronization across disk mirrors. For upgrading EMS, disk mirroring
must not be disabled.
# metastat -c
Either the slave or master disk can have its reading/writing of data temporarily suspended (taken offline) at any time,
but both master and slave cannot be suspended at the same time.
To temporarily suspend the reading/writing of data on a master disk, enter the following:
To temporarily suspend the reading/writing of data on a slave disk, enter the following:
Detaching disk mirroring is done to break up disk mirroring before starting an upgrade. This procedure has the
advantage that it does not involve a system reboot. Disk mirroring should have been previously setup before this
detach step can be performed.
This procedure should be done on the EMS standalone server that is being upgraded.
In case of EMS HA setup, this procedure should be done on both servers of the EMS HA pair that are
getting upgraded.
1. Confirm that no mirrors are currently syncing (no sync percentages should be displayed in the output below)
by using the following command:
$ metastat -c
d200 m 219GB d20 d40
d20 s 219GB c1t1d0s0
d40 s 219GB c1t3d0s0
d106 m 2.0GB d16 d36
d16 s 2.0GB c1t0d0s6
d36 s 2.0GB c1t2d0s6
d105 m 50GB d15 d35
d15 s 50GB c1t0d0s5
d35 s 50GB c1t2d0s5
d104 m 202GB d14 d34
d14 s 202GB c1t0d0s4
d34 s 202GB c1t2d0s4
d201 m 60GB d21 d41
d21 s 60GB c1t1d0s1
d41 s 60GB c1t3d0s1
d103 m 4.0GB d13 d33
d13 s 4.0GB c1t0d0s3
d33 s 4.0GB c1t2d0s3
d100 m 5.0GB d10 d30
d10 s 5.0GB c1t0d0s0
d30 s 5.0GB c1t2d0s0
d101 m 15GB d11 d31
d11 s 15GB c1t0d0s1
d31 s 15GB c1t2d0s1
EMS application is running on disk slots 0 and 1, and is mirrored to disks in slots 2 and 3 respectively.
3. After detaching the mirrors, run the 'metastat' command to see the mirror status. Output should now look like
this:
# metastat -c
d201 m 60GB d21
d21 s 60GB c1t1d0s1
d200 m 219GB d20
d20 s 219GB c1t1d0s0
d106 m 2.0GB d16
d16 s 2.0GB c1t0d0s6
d105 m 50GB d15
d15 s 50GB c1t0d0s5
d104 m 202GB d14
d14 s 202GB c1t0d0s4
d103 m 4.0GB d13
d13 s 4.0GB c1t0d0s3
d100 m 5.0GB d10
d10 s 5.0GB c1t0d0s0
d101 m 15GB d11
d11 s 15GB c1t0d0s1
d41 s 60GB c1t3d0s1
d40 s 219GB c1t3d0s0
d36 s 2.0GB c1t2d0s6
d35 s 50GB c1t2d0s5
d34 s 202GB c1t2d0s4
d33 s 4.0GB c1t2d0s3
d31 s 15GB c1t2d0s1
d30 s 5.0GB c1t2d0s0
Disks are now detached and mirroring no longer takes place between them.
Do not remove the slave disks (disks at slot 2 and 3) after detaching them from disk mirrors. Doing
so will cause the system to boot in single user/maintenance mode upon executing reboot command.
This procedure is performed to resume mirroring of a previously detached disk mirror setup. Perform this once the
upgrade has been successfully completed and new functionality is verified to be working.
Running this reattach procedure will start syncing back again without needing a system reboot.
The EMS server continues to function normally during the reattach slave disk process.
This will start sync process. Run the 'metattach' command to view the progress of the sync.
When a disk fails and is replaced with a new disk, use the following procedure to resume disk mirroring on the new
disk:
1. Locate and verify the disk failure by logging on as root and entering the following command:
# metadb
# metadb -d c1t1d0s7
# cfgadm -al
In the following example the entry in the first column (Ap_Id) of the highlighted row is the attachment point for
the failed disk.
Ap_Id Type Receptacle Occupant Condition
c0 scsi-bus connected configured unknown
c1::dsk/c1t0d0 disk connected configured unknown
c1::dsk/c1t1d0 disk connected configured unknown
c2 fc connected unconfigured unknown
c3 fc connected unconfigured unknown
usb0/1 unknown empty unconfigured ok
usb0/2 unknown empty unconfigured ok
usb0/3 unknown empty unconfigured ok
usb1/1 unknown empty unconfigured ok
usb1/2 unknown empty unconfigured ok
usb2/1 unknown empty unconfigured ok
usb2/2 usb-storage connected configured ok
usb2/3 unknown empty unconfigured ok
usb2/4 unknown empty unconfigured ok
usb2/5 unknown empty unconfigured ok
6. Execute the cfgadm -al command again to check the success of the previous operation. The output should
show the state “unconfigured” under the “Occupant” column of the row corresponding to the failed disk.
7. Pull the failed disk out and insert a new disk of the same capacity and physical attributes.
8. Configure the new disk:
9. Execute the cfgadm -al command again to check the success of the previous operation. The output
should show the state “configured” under the “Occupant” column of the row corresponding to the new disk.
10. Repartition the new disk with the partitioning information of the good drive.
11. Add the same number of state database replicas that were deleted in Step "3".
# metadb -a -c 2 c1t1d0s7
12. Identify and record the mirrors and slice information that need to be replaced.
# metastat -c
The first three lines of the metastat output show that mirror d106 and submirror d26 (slice c1t1d0s6) are in
'maint' state. Note the mirror name (d106) and the slice (c1t1d0s6).
13. Run the metareplace command for each of the mirrors and slice:
# /opt/SONSdmems/bin/dmchk enable
2. Enter a reachable remote/local SMTP host and the recipient’s email address to be configured in the
dmchk.conf file (see "Customizing Health Monitoring-DR Solaris").
The default cron job is invoked every 30 minutes and the email sent only when errors are encountered. This
behavior can be changed by configuring appropriate parameters in the dmchk.conf file.
Edit the /opt/SONSdmems/config/dmchk.conf file to supply the reachable remote/local SMTP host and the
recipient’s email address for the cron job that periodically checks the health of software mirrors and reports the
status in an email. You can also change optional parameters in the file.
The following table, shows the parameters that can be configured in the dmchk.conf file.
smtp.host Required None The SMTP mail server that is used to email disk
mirror status.
cron.job Optional 15,45 * * * * /opt/SONSdmems/bin/dmchk Cron entry to monitor/report disk mirror status
monitor 2>/dev/null 1>&2 every 30 minutes.
The following shows an example display for a dmchk.conf file. (To change the setting in a line, you must
uncomment the line (remove the #)).
# SMTP mail server that is used to email disk mirror status (Required)
#
# The host must be reachable.
#
# Remove the leading # and configure appropriate hostname or IP address
#
#smtp.host = plato
After enabling mirroring of the boot disk, Sonus recommends that the mirror of the boot disk be configured as an
alternate boot device in the NVRAM. Use the following procedure:
1. Enter the following to find the alternate boot device:
# /opt/SONSdmems/bin/dmctl altbootdev
# init 0
ok printenv boot-device
boot-device = disk net
ok printenv nvramrc
ok nvstore
ok boot
ok boot disk2
The default disk mirroring settings can be changed by editing the platform-specific configuration file, which is located
in the directory /opt/SONSdmems/config.
The platform-specific configuration file name is automatically derived by the program, if not supplied by the user.
The naming convention for the file name is as follows:
platform_ptype-ndisks.conf
The –ndisks portion of the filename is used only when platform_ptype.conf file is not found.
For example, for a four-disk T5220, if the user has not supplied the configuration file, the program first searches for
platform_T5220.conf. If the file is not found, the program then searches for platform_T5220-4.conf.
The platform specific configuration file can have multiple mirror configurations. The following table, lists the
parameters that can be configured for each mirror configuration.
svm.master.replica.slice Optional 7 The slice on which master disk state database replicas are created
svm.slave.replica.slice Optional 7 The slice on which slave disk state database replicas are created
svm.submirror.slice Optional 0,1,3,4,5,6 The slices on which submirrors are created or the slices that are mirrored
# cat /opt/SONSdmems/config/platform_T5220-4.conf
# Each mirror configuration must start with the mirror id
# Anything that follows the mirror id belongs to that mirror.
# ---------------------------------------------------------------------
# DISK 1 <-> DISK 3 MIRROR CONFIGURATION
# ---------------------------------------------------------------------
# The mirror ID (Required)
svm.mirror.id = 1
# The master disk (Required)
svm.master.disk = c1t0d0
# The slave disk or master disk mirror (Required)
svm.slave.disk = c1t2d0
# ---------------------------------------------------------------------
# DISK 2 <-> DISK 4 MIRROR CONFIGURATION
# ---------------------------------------------------------------------
# The mirror ID (Required)
svm.mirror.id = 2
# The master disk (Required)
svm.master.disk = c1t1d0
# The slave disk (Required)
svm.slave.disk = c1t3d0
This section describes the procedure for upgrading StorageTek 2540 Array firmware upgrade using CAM Host
Management Software GUI. Insight V09.02.00 Release supports CAM Software version 6.7.0.12 and it suggests the
baseline firmware version for StorageTek 2540 Array is 07.35.55.11.
Insight V09.02.00 upgrade procedure is required to upgrade StorageTek Array firmware to the baseline firmware
version.
In order to perform the upgrade effortlessly it is recommended to use the following supported browsers for
StorageTek Firmware upgrade with CAM 6.7 host management software.
Firefox 3.0
Microsoft Internet Explorer 6.0
Solaris OS 10 generally restricts port 6789 to listen to localhost only. This setting should be changed to enable
remote access to the Oracle Java Web Console and the Sun Storage Common Array Manager.
1. Become superuser or assume an equivalent role on the system where the console is running.
2. Set a property to allow the console server to respond to network requests, refresh the service, and restart the
console server.
3. Execute the following commands:
Perform the following steps to acquire the StorageTek Array and Host Machine information.
1. The IP address of data Host machine (where the CAM software is installed and which can access the array
over the network/Ethernet). Also, note the IP address of StorageTek array controllers.
2. Login to the data host machine with root privilege and ensure that CAM CLI version is 6.7.0.12. Execute
below command.
# /opt/SUNWstkcam/bin/sscs --version
3. Log in to the /export/home/packages directory as a root user using the following command:
cd /export/home/packages
unzip 145965-03.zip
The 145965-03.zip file is also available from the Sonus Salesforce Customer Portal.
cd 145965-03
6.
5. Click the button to start the registration for the array. The following screen is displayed.
8. Click the button. The following screen shows the progress of discovery process.
9. When progress is complete, click the button. The following screen is displayed.
13. Click the Storage System from the navigation panel on the left hand side of the screen.
14. Select the array using the checkbox and click the button. The following screen
is displayed.
18. Enter the valid password if the screen prompts and then click the button.
19. When the upgrade is complete, review the results and click the button to return to the main menu.
20. The Main Menu should contain the firmware version 07.35.55.11 for StorageTek Array.
Overview
If you are installing the Sonus application on your own Netra T5220 system, you may need to set the Integrated
Lights Out Management (ILOM) boot parameters and upgrade the ILOM firmware.
Overview
Setting the ILOM Boot Configuration
Description of Boot Parameter Values
Setting the ILOM Boot Configuration with the CLI
Setting the ILOM Boot Configuration with the Web Interface
Prerequisite
ILOM Boot Configuration Procedure with the Web Interface
ILOM Web Interface Requirements
Verifying if IP Address is Assigned to the SP Interface
Assigning a Static IP Address to the SP Interface
Ensure that the ILOM boot parameters are properly set by performing either of the following:
Setting the ILOM Boot Configuration with the CLI. This procedure does not require an IP address for the
service processor (SP) interface.
Setting the ILOM Boot Configuration with the Web Interface. This procedure does require an IP address for
the SP interface.
The boot parameter settings are described in Description of Boot Parameter Values.
New JumpStart systems delivered from Sonus have the required ILOM boot parameter settings.
To fetch parameter and value settings, cd to parameter folder location and perform ls.
/HOST/diag trigger power-on-reset Runs diagnostics when the system is powered on and
and error-reset when the system resets itself after a fatal error.
/HOST/diag level min Runs the minimum level of diagnostics to verify the
system.
/HOST autorunonerror false The SP powers off the host after the host diagnostics
have discovered a non-fatal POST error.
/HOST autorestart reset Attempts to restart the system when the host leaves the
RUNNING state.
/HOST boottimeout 600 (seconds) Sets the timeout value between the request to boot and
the actual boot to 600 seconds.
/HOST bootrestart reset Resets the boot timeout timer when the timer expires.
/HOST maxibootfail 3 If the host does not reboot after three attempts, it
performs the boot failure recovery setting.
/HOST bootfailrecovery power cycle The host performs a power cycle if the maximum number
of boot failures was reached.
/SYS keyswitch_state normal The system can power itself on and start the boot
process.
/SP/policy HOST_AUTO_POWER_ON disabled When the service processor is booted, the power state of
the host server is set as specified by the host power to
last power state on boot parameter.
/SP/policy HOST_POWER_ON_DELAY enabled The server waits a random amount of time (between one
to five seconds) before powering on automatically. This
helps to minimize current surges on the main power
source when multiple servers in racks power on after a
power outage.
/SP/policy BACKUP_USER_DATA enabled Backs up the local user database on ILOM (user name,
role, password, and CLI mode information) to the SCC
PROM card.
Perform the following procedure to set the ILOM boot parameters with the CLI:
1. Connect a terminal server to the SER MGT and the NET MGT port on the Netra T5220.
2. Login to –> (ILOM prompt) from serial console.
There are four situations from which you can go to ILOM prompt.
a.
sc> logout
c. If you are presented with a login prompt use root as user name and changeme as password.
The -> prompt appears.
After you get -> prompt you can proceed with Step 4.
If you want switch to ALOM prompt, then proceed with Step 3.
3. Use the following commands to change the prompt from ILOM to ALOM:
Ok> #.
-> set /SP/users/root cli_mode=alom
logout and log back in see the prompt changes from "->" to
"sc>"
sc> poweroff
sc> flashupdate -s 127.0.0.1
sc> poweron
sc> console
prtdiag -v | grep "Sun System Firmware"
Sun System Firmware 7.4.5 2011/08/10 15:20
sc> userclimode root default
logout and log back in see the prompt changes from "sc>" to "-
>"
The command in Step 4 will remove the SP IP address if you have assigned one. You can reassign
the IP address by performing Assigning a Static IP Address to the SP Interface.
6. Enter y.
7. Press Enter.
8. At the prompt, log in as root and enter the password (the default password is changeme).
The -> prompt appears.
9. After logging in as root, enter the following command to create the admin user:
Creating user...
Enter new password: ********
Enter new password again: ********
Created /SP/users/admin
11. Enter the following command to connect back to the solaris console.
Confirm Y to continue.
The following message is displayed:
12. Ensure that the boot configuration values are set according to the table ILOM Boot Configuration Values.
Prerequisite
Perform the following procedure to set the ILOM boot configuration with the Web interface:
To use the ILOM web interface, an IP address must be assigned to the SP interface.
1. Connect a terminal server to the SER MGT or the NET MGT port on the Netra T5220.
2. Press Enter.
3. At the prompt, log on as root and enter the password (the default password is changeme).
The -> prompt appears.
4. Enter the following:
-> ls /SP/network
If the ipaddress line does not contain a valid IP address, perform Assigning a Static IP Address to
the SP Interface.
If the ipaddress line does contain a valid IP address, you can use the ILOM web interface.
1. Connect a terminal server to the SER MGT or the NET MGT port on the Netra T5220.
2. Press Enter.
3. At the prompt, log on as root and enter the password (the default password is changeme).
The -> prompt appears.
4. Enter the following:
-> cd /SP/network
10. To verify that the information was entered correctly, enter the following:
-> ls
The IP address information that you entered appears. Verify that this is the correct information.
This section contains post-installation/post-upgrade tasks that you may need to perform.
For enabling licensing for devices in EMS, please refer to the “License Manager” section in the Insight User
Guide.
Task Purpose
If you have never setup disk mirroring then enable disk mirroring.
Perform this task to create new disk mirror so that data is in synch between
slave and master disks. The SalesForce upgrade overwrites the data on
disks 0 and 1. Hence, a new disk mirror must be created.
Setting IBM RAID Trap Destination Perform this task to set IBM RAID Trap destination.
MPXIO from T5220 to IBM DS3524 Disk Activates multipathing from T5220 to IBM DS3524 Disk Arrays.
Arrays
Checking Database Software Shared Perform this task if you upgraded your Sonus application by using the Sonus
Memory Settings Salesforce Customer Portal.
Setting the Location of Core Dump Files Perform this task to set the core dump file location.
Synchronizing with the NTP Server Perform this task to synchronize with the NTP server.
Clearing Client Browser Cache After a Perform this task on the client after an Insight upgrade.
Software Upgrade
Netra T5220-Specific NVRAM Settings Perform this task to set the NVRAM variables to the correct values.
Enabling SSH Perform this task if you are using SSH for communication between the
Insight server and the PSX, SGX, and DSI.
Configuring TCP Wrappers-Aware Services Perform this task if you need to allow access to TCP Wrappers-aware
services such as SSH and NFS.
Enabling Hardware Traps Perform this task to enable the hardware traps.
SSL Certificate Installation Procedure Perform this task after an Insight installation if you need to support HTTPS
in a production environment.
Enabling Users to Create cron Jobs Perform this task if you need to allow users to create cron jobs.
Enabling Users to Create at Jobs Perform this task if you need to allow users to create at jobs.
Performance Data Retention Settings for Perform this task if you are upgrading Insight from a release other than
Upgrades V07.01.01, V07.01.02, V07.02.01, V07.02.02, V07.02.03 and you want to
change any of the settings from the default of 4 weeks.
Licenses for Enabling Insight API, Insight Contact your Sonus representative to obtain software licenses.
CLI, SMS API, SGX API, Lawful Intercept
Provisioning API, and Traffic Manager
Configuring Multiple Network Interfaces Perform this task after an installation if the Insight server uses multiple
network interfaces.
Configure IP Network Multipathing for Perform this task for non-HA systems after an installation if the Insight
Standalone System server will be using IP network multipathing. This is recommended by Sonus
to protect the EMS from a single-switch failure.
Disabling unused EMS API versions Perform this task to save memory and avoid application failure.
Enabling/Disabling HTTP access on the Perform the task to enable and disable HTTP access on the EMS DR
EMS DR server server.
Forcing Network Interface Configuration Perform this task if you want to force network interface configuration using
Using Scripts-DR Setup scripts.
Configuring the Timezone on DR Solaris Perform this task to configure the Timezone.
For example:
Prerequisites
Ensure that:
# df -h|grep raid
For an HA pair with the active system in service, the following steps has to be performed first on the standby node.
Perform the following procedure to activate multipathing from T5220 to IBM DS3524 Disk Arrays:
This procedure has to be followed only during maintenance period as it affects the systems service.
1. Check if MPXIO is enabled on the standby server by executing the following command:
# stmsboot -L
stmsboot: MPxIO is not enabled
2. Run the following command to enable multi-pathing to fiber channel devices with Solaris. This command also
updates /etc/vfstab for environments where IBM Array devices are mounted at boot time.
System reboots at this point, use console to reset or power cycle if the system hangs for more than 5
minutes.
Also, reboot when prompted. If the system stops in maintenance mode, login and run the following command
to force a second reboot.
init 6
3. Run the following command to validate if multi-pathing is enabled. All the multi-pathed devices gets listed.
# stmsboot -L
non-STMS device name STMS device name
------------------------------------------------------------------
/dev/rdsk/c3t2d0 /dev/rdsk/c4t60080E50001C2FCE0000250F4FFFBE03d0
/dev/rdsk/c2t8d0 /dev/rdsk/c4t60080E50001C2FCE0000250F4FFFBE03d0
The “STMS” device name is used exclusively for affected devices once multi-pathing is enabled.
5. Perform a manual Failover to convert the Active to Standby and perform steps 1-4 for new standby server.
For information on HA manual Failover, see "HA Manual Failover".
If you are installing SNMP and want to configure the SNMP Agent Software perform the following procedure:
Configuring the SNMP Agent Software-After upgrading the SNMP Management Agent, you must configure it.
Manually starting and stopping the SNMP Agent Software-After configuring the SNMP Management Agent,
you must either restart the system or restart the SNMP agent.
You can set specific directives in the SNMP agent’s configuration file. The procedure below provides information
concerning the necessary changes.
# cd /etc/opt/SUNWmasf/conf
The snmpd.conf file contains directives for the agent. The steps that follow detail all necessary
additions/modifications to this file for the proper communication of traps to the Insight EMS system.
For information concerning other directives contained in this file, refer to the SNMP Agent installation
documentation.
2. The default trap community string (used when sending traps) is public. If you use a different community
string, enter a trapcommunity directive in the Trap Destination section of the file. You must place this directive
before any trapsink directives. The correct syntax is:
trapcommunity <your_community_string>
3. In the Trap Destination section of the file enter a trap2sink directive as follows:
The Netra SNMP Agent is configured to send traps to the SONUS agent. The SONUS agent will forward the
Netra Agent traps to registered EMS or third-party management systems along with product application traps.
4. The generation of an authentication failure standard trap is disabled by default. If you wish to generate an
authentication failure standard trap as a security measure, you must add the following directive to the
configuration file:
authtrapenable 1
5. The installation script sets the listening port to UDP 161. Do not change this value unless there is a known
conflict with another application. If you change the value, Sonus suggests that you change it to 9000. To
change the setting, enter an agentaddress directive. The syntax is:
agentaddress <port>
6. The default agent read community string is public. If you do not wish to allow a default read community string,
comment out the rocommunity directive by adding a # symbol at the beginning of the line. The commented
# rocommunity public
After upgrading and configuring the agent, you must either restart the system or manually start the agent.
To start the agent manually, use the following command (as root):
# /etc/init.d/masfd start
# /etc/init.d/masfd stop
# ps -ef|fgrep snmpd
The output from the above command showing the snmpd executable.
If you do not see the snmpd process running, check for any error messages in /var/adm/messages.
user.oracle:100::oracle::project.max-sem-ids=(priv,256,
deny);project.max-shm-memory=(priv,4294967295,deny)
3. If the line listed in Step "2" appears in the /etc/project file, this procedure is complete.
If the line listed in Step "2" does not appear in the /etc/project file, continue to Step "4".
4. Add the entry from Step "2" to the /etc/project file (do not include a line break).
5. Reboot the system:
This section describes how to check the name of the current dump directory, and how to change the setting to
/export/home/<hostname>/ if necessary.
To determine the name of the current dump directory, perform the following steps:
dumpadm
To change the name of the current dump directory, perform the following steps:
1. As a user with root privileges, enter the following command to create the directory:
mkdir /export/home/<hostname>
dumpadm -s /export/home/<hostname>
Verify that the <hostname> value matches the actual host name of your system.
Your UNIX Administrator should synchronize the Insight server and all network elements in the deployed network to
the same NTP server.
Synchronizing ensures that the timestamps in the Insight logs are consistent with the timestamps on the other
network elements. Failure to do so could also introduce error into certain statistics, most notably the Trunk Group
performance statistics.
If you elect to synchronize with more than one NTP Server, you must ensure that the NTP Servers are also
synchronized. Conflicting time information from multiple NTP Servers may cause Insight system errors. All
nodes must be set in NTP server. (GSX node, by default, has NTP server set).
Perform the following procedure to configure NTP server in Solaris. All nodes must be configured with NTP server.
By default, GSX has NTP server already configured.
cp /etc/inet/ntp.client /etc/inet/ntp.conf
3. Using vi editor, edit the /etc/inet/ntp.conf. and replace multicast 224.0.1.1 with your NTP
Server IP address:
multicast 224.0.1.1
with
server <NTP_Server_IP>
# ./docsInstall.sh
The script installs the new online documentation files, which you can then access through the Sonus tab in
the Online Library section of Insight.
This version of SSH includes the following components: SSH Server, SSH client, Secure FTP (SFTP), and Secure
File Copy.
1. As a user with root privileges, change to the SSH server configuration directory:
# cd /etc/ssh
# cp sshd_config sshd_config.backup
AllowTcpForwarding no
to
AllowTcpForwarding yes
Change:
PermitRootLogin no
to
PermitRootLogin yes
/etc/hosts.allow
/etc/hosts.deny
In /etc/hosts.allow, change:
In /etc/hosts.deny, change:
ALL: ALL
to
#ALL: ALL
Refer to the man page host_access for a description of the rules. To access the man page, enter the
following command:
# cd /export/home/sonusComm/sbin
# ./HwTrapGen.sh
If you are upgrading from any other version , the Data Retention Time for all statistics tables are set to the maximum
value of 4 weeks. To change the Data Retention Time for a statistics table, see the “Data Retention” section in the
Insight EMS User Guide.
Licenses for Enabling Insight API, Insight CLI, SMS API, SGX API, Lawful
Intercept Provisioning API, and Traffic Manager-DR Solaris
Access to the following modules of Insight EMS require the purchase of separate software licenses. Consult your
Sonus sales representative for additional information.
Insight CLI
Insight API
Insight SMS API
Insight SGX API
Lawful Intercept Provisioning API
Insight Traffic Manager
Once you purchase the product, you will be provided a license file with instructions for enabling the
product/functionality along with all applicable documentation. See the Insight EMS User Guide for a list of the
individual licenses that are available and a description of the functionality each enables, and instructions for
installing licenses.
If you are upgrading Insight, you do not need to purchase licenses that you have already purchased.
If you install the Insight API, Insight SMS API, Lawful Intercept Provisioning API, and Insight SGX API on a system
other than the Insight server, you must purchase a license for each instance of an API module you want to use. You
cannot share a license between an API module on the Insight server and an API module on a remote system.
#
# Internet host table
#
127.0.0.1 localhost
38.45.67.123 samplehost samplehost.yourcom.com loghost
38.33.54.26 samplehost
38.45.68.03 otherhost
Sonus recommends using IP Network Multipathing (IPMP) to provide non-HA systems with uninterrupted access to
a network when a network interface on the system fails or to protect the system from a single-switch failure. This is
achieved by creating a multipath group on the system, which consists of a primary and standby interface (Sonus
recommends that the primary interface and the standby interface be on different cards if possible). If a failure occurs
in the primary interface or its network adapter, the system automatically switches all the network access from the
failed interface and/or adapter to the standby interface.
The configureIPMP script will create an IP multipath group for you, based on the values you enter while running
the script.
Restrictions
You cannot run the configureIPMP script on High Availability (HA) systems. Multipath groups are set up on HA
systems when the configureHA script is run during HA configuration. For more information, refer Insight HA
Configuration.
The configureIPMP script will prompt you for the following values. You can use the Table Information needed for
configureIPMP Script to record the values that you will enter when you run the script.
Primary interface — The physical interface that will handle the network access for the multipath group if the
interface is working.
Standby interface — The physical interface that will handle the network access for the multipath group if the
primary interface fails. Sonus recommends that the primary interface and the standby interface be on different
cards if possible.
IPMP group name — The name of the IP multipath group.
Test IP Address for Primary interface — A fully routable address that will be used exclusively for IPMP
testing. Do not use an address that is used for anything else. The test addresses, data addresses, and target
addresses must all be in the same subnet.
Test IP Address for Standby interface — A fully routable address that will be used exclusively for IPMP
testing. Do not use an address that is used for anything else. The test addresses, data addresses, and target
addresses must all be in the same subnet.
Data IP Addresses — The data IP addresses that will be supported by the multipath group. The data
addresses, test addresses, and target addresses must all be in the same subnet.
Target IP Addresses — The IP addresses that will be the recipients of and responders to ICMP-echo
requests that are generated by the IPMP daemon. The target addresses are used to determine the state of a
physical interface in the multipath group, and must already exist on the same subnet as the data IP
addresses. You must enter a minimum of two and a maximum of five addresses. IPMP will ping the default
router if you enter less than five target addresses. If you do not want the default router to be pinged, enter five
target addresses.
Network number — The network number that applies to the test IP addresses, the data IP addresses, and
the target IP addresses.
Netmask — The netmask for the IP addresses.
Data IP addresses
Target IP addresses
Network number
Netmask
Use the following procedure to create an IP multipath group. See "Values You Provide" for a description of the
values you will be entering.
# cd /export/home/ems/conf
# ./configureIPMP
2. Messages appear that give an overview of the script. When prompted, press Enter to continue.
3. Messages appear that explain the conventions used in the script. When prompted, press Enter to continue.
4. The prompt Primary interface appears, followed by a list of interfaces.
Enter the name of the primary interface, and press Enter.
5. The prompt Standby interface appears, followed by a list of interfaces.
Type the name of the standby interface, and press Enter.
6. The following prompt appears.
Either accept the default value for the multipath group name by pressing Enter, or type a name and press
Enter.
7. The following prompt appears.
Type the test IP address for the primary interface, and press Enter.
8. The following prompt appears.
Type the test IP address for the secondary interface, and press Enter.
9. A message appears that states you will enter a set of data addresses. When prompted, press Enter to
continue.
10. The following prompt appears.
Data IP Address 1
Type the first data IP address that will be supported by the multipath group and press Enter.
11. The following prompt appears.
Data IP Address 2
If desired, type the second data IP address that will be supported by the multipath group and press Enter. If
you do not want to enter a second address, press Enter.
If you entered a second data IP address, you will be prompted for a third IP address. You will continue to be
prompted for data IP addresses until you press Enter without typing an address.
12. A message appears that states you will enter a set of target IP addresses. When prompted, press Enter to
continue.
13. The following prompt appears.
Target IP Address 1
Type the first target IP address that will be used by the multipath group and press Enter.
14. The following prompt appears.
Target IP Address 2
If desired, type the second target IP address that will be used by the multipath group and press Enter. If you
do not want to enter a second address, press Enter.
If you typed a second target IP address, you will be prompted for another IP address. You will continue to be
prompted for target IP addresses until you press Enter without typing an address.
15. The following prompt appears.
Please provide a network number that applies to all of the addresses you have
provided thus far: (10.6.20.0)
The default value that is displayed will depend on the addresses you have entered so far. Either accept the
default network number for the addresses by pressing Enter, or type the network number and press Enter.
16. The following prompt appears.
Please provide a netmask that applies to all of the addresses you have
provided thus far: (255.255.255.0)
Either accept the default value for the netmask of the addresses by pressing Enter, or type the netmask and
press Enter.
17. All the values that you have entered appear, followed by the prompt:
If the values are what you want, type y and press Enter. Continue to Step "18".
If the values are not what you want, type n and press Enter. Return to Step "4".
18. A message appears, stating that the exact changes that will be made will be displayed.
When prompted, press Enter to continue.
19. A message appears stating either that the network number and netmask combination has been added to
/etc/inet/netmasks, or that the information was already in the file.
When prompted, press Enter to continue.
20. A message appears showing either the changes that will be made to the hostname.<primaryinterface>
file or the contents of the new file.
When prompted, press Enter to continue.
21. A message appears showing either the changes that will be made to the hostname.<standbyinterface>
file or the contents of the new file.
When prompted, press Enter to continue.
22. Messages appear stating that the file /etc/init.d/ipmp.targets.sonus will be created, and that either unique
MAC addresses are already enabled on the system or they will be enabled.
This is followed by the prompt:
To make all the necessary file changes to create the multipath group, type y and press Enter. Continue to
Step "23".
If you do not want to create the multipath group, type n and press Enter. The script will exit. To run the script
again, return to Step "1".
23. Messages appear listing the files that are being created and stating that the changes are complete. This is
followed by the prompt:
If you want to change the IP addresses after you configure a multipath group, perform the following procedure.
1. On the Insight server, begin the IP multipath script with the -r option:
# cd /export/home/ems/conf
# ./configureIPMP -r
The original configuration that existed before you created the multipath group is restored (by restoring the
/etc/*.orig.sonus files).
2. Perform "Creating an IP Multipath Group". Enter the IP addresses that you want to use.
/export/home/ems/conf/deployLNPApplication.sh
1. Login as insight user and enter the following command to stop Insight:
# /export/home/ems/sonusEms stop
# cd /export/home/ems/conf
3. Execute the following command to deploy LNP Application on the Insight server:
# ./deployLNPApplication.sh
# /export/home/ems/sonusEms start
5. For an HA or DR setup, ensure LNP Adaptor is deployed on both the Insight servers. To deploy LNP Adaptor
on other Insight systems, repeat Steps "1" to " 4" on that server.
Prerequisite
Ensure sendmail packages are downloaded, and installed before you enable it.
To check whether sendmail packages are installed, issue the following command:
2. Navigate to /export/home/install/ems:
cd /export/home/install/ems
tar xf Solaris10_Sendmail.tar
3. Navigate to Solaris10_Sendmail:
cd Solaris10_Sendmail
pkgadd -d . all
Enabling Mailx
# vi /etc/hosts
Append host name with domain name to the entry with host name and IP
Add Mail server IP, Mail server name, Mail server name with domain name
#
# Internet host table
#
:: 1localhost
127.0.0.1 localhost
10.54.58.101 emssvt2 loghost <hostname>.<domain-name>
<mail server ip> <mail server name> <mail server name>.<domain-name>
Save and close the hosts file.
cd /etc/mail/
# vi sendmail.cf
Disable all unused EMS API versions because each version consumes Insight process memory. Too many
versions loaded into memory could result in application failure.
# /export/home/ems/sonusEms stop
# cd <BASE_DIR>/conf/security
# ./enableHTTP.sh
# /export/home/ems/sonusEms start
Perform the following procedure to disable HTTP access to the EMS Standalone server:
# /export/home/ems/sonusEms stop
# cd <BASE_DIR>/conf/security
# ./disableHTTP.sh
# /export/home/ems/sonusEms start
The following section describes the procedure to enable HTTP access to the EMS HA server:
# cd <BASE_DIR>/conf/security
# ./enableHTTP.sh
4.
# cd <BASE_DIR>/conf/security
# ./enableHTTP.sh
Perform the following procedure to disable HTTP access to the EMS HA server:
# cd <BASE_DIR>/conf/security
# ./disableHTTP.sh
4. Disable the HTTP access on HA server - standby. Execute the following command:
# cd <BASE_DIR>/conf/security
# ./disableHTTP.sh
Perform the following procedure to enable and disable HTTP access on the EMS DR server.
The scripts S99bge_fdx, and S99force100fullduplex in the /etc/rc2.d directory are not part of default
Jumpstart disks, but may be created after the installation by persons who install the boxes.
Example
You may have the following contents in the script to force the network interface speed to 100Mbits, duplex to
full-duplex and turn off auto negotiation:
The above block repeats for each NIC presented in the system (where the ' instance' value increases for each
subsequent NIC.
Example:
# TZ=US/Pacific
For the complete list of available Time Zones and the specific values, refer /usr/share/lib/zon
einfo.
It is not recommended to change value of any of the locale values mentioned below to something
other than the default ‘en’ value.
LC_COLLATE=en_US.ISO8859-1
LC_CTYPE=en_US.ISO8859-1
LC_MESSAGES=C
LC_MONETARY=en_US.ISO8859-1
LC_NUMERIC=en_US.ISO8859-1
LC_TIME=en_US.ISO8859-1
# reboot
This section describes how to migrate an existing Standalone Insight EMS from a Netra 240 or 440 system to a
Netra T5220 system.
For details related to existing licenses post migration, please refer to the “License Manager” chapter in the
Insight User Guide.
Task Sequence for Migrating Standalone EMS to a Netra T5220 for DR Setup
Exporting Data from the Netra 240/440 Insight System
Importing Data into the Netra T5220
Prerequisite
Passwords
Procedure
Associating the Nodes
Disassociating the Nodes
Upgrading from V09.02.00 to V09.03.00 Software Release
Task Sequence for Migrating Standalone EMS to a Netra T5220 for DR Setup
To migrate an existing Standalone Insight EMS from a Netra 240/440 server to a Netra T5220 server for DR setup,
perform the following tasks in the sequence given:
If you are using Netra 240/440 systems and want to migrate to Netra T5220 then you must migrate using
EMS V09.02.00 release. Migration from 240/440 to 5220 is not supported for any releases after EMS
V09.02.00. Hence, kickstart the EMS Solaris system with 9.2.0 and migrate data to V09.02.00 Release with
T5220. After you have migrated the data, you can upgrade from V09.02.00 to V09.03.00 or V09.02.01 and
higher sustaining releases.
Export the data from your existing Insight Netra 240/440 system by performing the following procedure, which
generates three files. Later in this chapter you will need to import these files into the new Netra T5220 system.
# cd /export/home/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you
wish to store your backup files. Use a directory that is external to the Insight machine. Use a directory name
that will clearly identify the EMS server that created the backup files. Make a note of the directory path
because you will need it later when migrating data back to the upgraded Insight system.
a. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files in the backup directory.
Table 125: Migration Files when Exporting from EMS Solaris 240 or 440
When Migrating from EMS Solaris 240 or 440 Backup Files generated are
exp_data_manual.dmp
exp_strct_manual.dmp
Prerequisite
Before you import data into the Netra T5220, you must have installed Insight EMS V09.02.00. Restore of backup
must be performed on EMS Software Release V09.02.00.
The emsMigrate.sh script used in the following procedure gives you the opportunity to use strong passwords,
which must then be entered and must meet a set of restrictions, or to use weak passwords, which are the current
passwords.
Procedure
Perform the following procedure to import the data that you earlier saved and exported from your Netra 240/440
system (see "Exporting Data from the Netra 240/440 Insight System"). The Netcool database is also imported.
1. Log on to the Netra T5220 system with EMS Release V09.02.00 as root.
From the backup directory you used for the existing Netra 240/440 EMS server in "Exporting Data from the
Netra 240/440 Insight System", copy the .dmp files to the /export/home/oracle/backup/dump
directory. Also, copy the backupFiles.tar file to the /tmp directory.
If the .dmp files are copied to /export/home/oracle/backup/dump using an unconventional method,
such as FTP, change the owner and group of the files to Oracle and DBA.
To change the owner and group of files to Oracle and DBA, enter the following commands.
# cd /export/home/oracle/backup/dump
# chown oracle:dba exp_data_manual.dmp exp_strct_manual.dmp
CAUTION
You must copy files from the backup directory that you used for this EMS server. If you use a
backup directory that contains files from another EMS server, Insight will not behave properly.
# cd /export/home/ems/conf/jumpstart
# ./emsMigrate.sh
All existing Insight-controlled passwords on this box will be wiped out and
replaced
with the passwords from the restored data.
###############################################################################
Do you wish to continue [y|Y,n|N] ?
4. Enter y to continue.
The following message appears
5. The script asks for the full path to the backup tar file. Answer /tmp and press Enter.
The following message appears:
6. Enter y to import.
The following message appears:
#############################################################################################
Starting importing and upgrading Insight Oracle Database Instance SIDB as user
oracle.
#############################################################################################
stty: : Invalid argument
: : Invalid argument
stty: : Invalid argument
..............................................................................................
Disconnected from Oracle Database 11g Enterprise Edition Release 11.2.0.3.0 -
64bit Production
With the Partitioning, OLAP, Data Mining and Real Application Testing options
Modifying /export/home/jboss/server/insight/deploy/jbossweb.sar/server.xml
Done
Completed changing protocol to http. Please restart Sonus Insight.
If you have any IAS registered with the system, then execute the same
procedure on each IAS also by following the procedures provided in the
Insight User Guide.
If SGX4000 device is configured on pre-V09.02.00 Insight system, you have to perform the following
procedure during data migration from any pre-V09.02.00 Insight system to Insight V09.02.00.
1. Login to Insight
2. Navigate to Network Mgmt > Insight Administration
3. Select the registered SGX4000 node from the Navigation tree.
4. Modify and Update the following (default) values if required:
a. SSH Port
b. Login (CLI)
c. Password (CLI)
5. Click on Update button and then click on Discover node.
e. Click OK.
The operation may take a longer time depending on the number of nodes.
If there are any errors displayed on the final screen at the end of the operation, then the nodes were
not successfully discovered. You need to perform a manual discovery of the nodes after determining
the cause of the error.
e. Click OK.
The operation may take a longer time depending on the number of nodes.
If there are any errors displayed on the final screen at the end of the operation, then the nodes were
not successfully discovered. You need to perform a manual discovery of the nodes after determining
the cause of the error.
For more details, refer to the Node discovery section of the Insight User Guide.
After you have migrated data to EMS Release V09.02.00 with T5220 system, upgrade EMS from V09.02.00 to
V09.03.00 Release. For more information about upgrading, refer the section Upgrading Insight Standalone Using
Sonus Salesforce (Solaris).
This section describes how to migrate an existing Insight High Availability system from Netra 240 or Netra 440
systems to Netra T5220 systems.
For details related to existing licenses post migration, please refer to the “License Manager” chapter in the
Insight User Guide.
If you are using Netra 240/440 systems and want to migrate to Netra T5220 then you must migrate using
EMS V09.02.00 release. Migration from 240/440 to 5220 is not supported for any releases after EMS
V09.02.00. Hence, kickstart the Solaris box with 9.2.0 and migrate data to V09.02.00 Release with T5220.
After data is migrated to 9.2.0, you can upgrade from V09.02.00 to V09.03.00 or V09.02.01 and higher
sustaining releases.
To migrate an existing Insight HA system from Netra 240/440 servers to Netra T5220 servers, perform the following
tasks in the sequence given:
1. Export the data from HA server (perform on the Netra 240/440 servers). For details, see Exporting Data from
the HA System for DR.
2. Kickstart EMS HA on Solaris Netra T5220 system with EMS Release V09.02.00. For more details, refer the
Insight EMS V09.02.00 Software Installation and Upgrade Guide.
Perform the step 3 to step 9 on EMS HA Netra 5220 to install V09.02.00, configure HA, restore
data using EMS V09.02.00 Software Release. After data is restored on EMS V09.02.00, you can
upgrade from V09.02.00 to V09.03.00 Release.
Table 126: Migration Files when Exporting from EMS Solaris 240 or 440
When Migrating from EMS Solaris 240 or 440 Backup Files generated are
exp_data_manual.dmp
exp_strct_manual.dmp
1. Log on to the Netra 240/440 active system (system A) as a user with root privileges.
2. Run the manualBackup.sh script on system A:
# cd /export/home/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine and that is accessible from
the Netra T5220 that will be the new active HA system. Use a directory name that will clearly identify the EMS
server that created the backup files. Make a note of the directory path because you will need it later when
migrating data to the Netra T5220 active HA system.
3. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, exp_data_manual.dmp, and
exp_strct_manual.dmp) in the backup directory you identified in Step 2.
4. Perform a failover from the Netra 240/440 active system (system A) to the Netra 240/440 standby system
(system B) as follows:
a. Log on to system A as a user with root privileges.
b. Enter the following on system A:
# ./hamgmt failOver
# cd /export/home/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine and that is accessible from
the Netra T5220 that will be the new standby HA system. Make a note of the directory path because you will
need it later when migrating data to the Netra T5220 standby HA system.
6. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, exp_data_manual.dmp, and
exp_strct_manual.dmp) in the backup directory you identified in Step 5.
Setup and Configure Netra T5220 platforms with RAID Disk Arrays-DR Setup
This section describes the setup and hardware configuration for Netra T5220 platforms and RAID disk arrays. The
procedures in this section apply only to Netra 5220s.
Setting Up and Configuring Netra T5220 Systems with IBM DS3524 Storage System-DR
Setup
This section describes the setup and hardware configuration for Netra T5220 platforms and IBM DS3524 Storage
system.
This section describes the procedure for making the physical connections between the IBM DS3524 and the Netra
T5220 systems.
1. Connect one fiber cable to a fiber cable port on Controller A of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
2. Connect a second fiber cable to the other fiber cable port on Controller A of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
3. Connect a third fiber cable to a fiber cable port on Controller B of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
4. Connect a fourth fiber cable to the other fiber cable port on Controller B of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
Storage Manager is used to configure, manage, and troubleshoot storage subsystems. It is used primarily to
configure RAID arrays and logical drives, assign logical drives to hosts, replace and rebuild failed disk drives,
expand the size of the arrays and logical drives, and convert from one RAID level to another. Storage Manager
enables troubleshooting and management tasks, such as checking the status of the storage subsystem
components, updating the firmware of the RAID controllers, and managing the storage subsystem.The latest IBM
DS3524 Storage Manager software version is 10.83.x5.23.
The following procedure installs the IBM DS Storage Manager software on a Netra T5220 server. This procedure
should be performed on each of the two Insight servers.
# cd /export/home/packages
# gunzip SM10.83_Solaris_SMIA-10.83.x5.23.tgz
# cd Solaris10p83/Solaris
# ls SMIA-SOL-10.83.x5.23.bin
sh SMIA-SOL-10.83.x5.23.bin -i silent
/opt/IBM_DS/IBM_System_Storage_DS_Storage_Manager_10_InstallLog.log
/opt/IBM_DS/IBM\ System\ Storage\ DS\ Storage\ Manager\ 10_InstallErrorLog.log
The IBM DS3524 storage subsystem has two controllers, that are hot-swappable and redundant. The controllers
contain the storage subsystem control logic, interface ports, and LEDs.
Two SAS host ports labeled 1 and 2. Each of them is capable of operating at 8Gbps, 4Gbps, and 2Gbps
Four fiber channel host ports labeled FC3,FC4,FC5,FC6. Each of them is capable of operating at 8Gbps,
4Gbps, and 2Gbps
Two Ethernet management ports labeled 1 and 2 for Out-Of-Band management
The port on the extreme right is a x4 multilane mini-SAS port for connecting to EXP3524 drive expansion
enclosures
The following procedure assigns an IP address to a DS3524 storage subsystem controller. This procedure should
be performed twice, once for Controller A and once for Controller B.
1. Connect the T5220 server to a simple Hub/Switch after installing DS Storage Manager on both the T5220
servers.
2.
3. Start the X-server (such as Exceed) on the system where the GUI is to be launched.
4. Set the DISPLAY variable's IP address to the IP address of the machine where the GUI should be launched
using the following commands:
DISPLAY=<IP Address>:0.0
export DISPLAY
echo $DISPLAY
Where <IP Address> is the Ip of the machine where the GUI need to be launched.
5. Login as root to the T5220 server which is connected to the same Hub/Switch and go to the
/opt/IBM_DS/client directory:
# cd /opt/IBM_DS/client
# ./SMclient
Since Storage Manager is GUI-based application, set your DISPLAY to display graphics.
7. Click on the Add Storage Subsystem link from the Setup tab in the DS Storage Manager Enterprise
Management window.
The Select Addition Method-Manual screen opens.
8. In the Select Addition Method-Manual screen, select the Automatic discovery button and click OK.
9. Click OK to begin an initial automatic discovery of hosts on storage subsystems.
After the initial automatic discovery is complete, the Devices tab of the Enterprise Management Window
displays all hosts and storage subsystems attached to the local subnetwork.
The Enterprise Management Window can take up to a minute to refresh after an initial automatic
discovery.
10. In the Subsystem Management window, right-click the discovered storage subsystem to see the context
menu with the tasks.
Select the Manage Storage Subsystem task.
11. When you choose to manage a specific storage subsystem, the IBM System Storage DS (Subsystem
Management) window opens, along with the Initial Setup Task on background and a small window prompting
for the password.
Enter the password for Subsystem.
12. In the IBM System Storage DS (Subsystem Management) window, click the Configure Ethernet Management
Ports link in the Optional Task list.
The Change Network Configuration screen opens.
IBM DS3524 RAID Disk Array Configuration on Insight EMS Servers-DR Setup
The following procedure configures an IBM DS3524 RAID disk array. This procedure should be performed on one of
the Insight servers and it takes approximately 30 minutes.
# cd /export/home/ems/conf/RAID
3. If an array or disk have been used in another application, the install may require reset to remove any previous
configuration.
To discover the array, enter the following command:
For example,
IP of Controller A is 10.54.58.109.
IP of Controller B is 10.54.58.110.
The system displays the following:
a. Enter SMcli -i -d if you are discovering the Storage Subsystem for the first time.
For example, the system displays the following:
4. Enter the following command to ensure the RAID name and IP addresses of the controllers are discovered:
# SMcli -i -d
For example, for RAID: EMSIBMRAID
# SMcli -i -d
EMSIBMRAID 10.54.58.109 10.54.58.110
SMcli completed successfully.
# ./SONSraidInstall.sh
6. The script detects the RAID the EMS is connected to and prompts for the number of physical disks.
The recommended option is 2. (300 GB). Press Enter after providing the choice.
9. Enter the RAID password that you had entered on step 11 of the IBM DS3524 Storage Subsystem Controller
IP Address Configuration-DR Setup section when the following is prompted and press Enter.
10. Enter the IP address to configure the array when prompted and press Enter:
Enter the Device Name that is to be used to identify the array (default:
SONSemsarray )
For example, EMSIBMRAID.
The output is displayed as:
EMSIBMRAID
Array Name is EMSIBMRAID
- Getting registered array list
Unregistering array EMSIBMRAID
SMcli completed successfully
....
< text deleted for brevity >
...
...
Logical drive initialization is under progress. Please re run the script after
some time
#
# reboot -- -r
Setting Up and Configuring Netra T5220 Systems with StorageTek 2540 Disk Array-DR
Setup
This section describes the setup and hardware configuration for Netra T5220 platforms and StorageTek 2540 Disk
Array.
This section describes the procedure for making the physical connections between the RAID disk array and the
Netra T5220 systems.
1. Connect one fiber cable to a fiber cable port on Controller A of the RAID disk array. Connect the other end of
the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
2. Connect a second fiber cable to the other fiber cable port on Controller A of the RAID disk array. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Standby system.
3. Connect a third fiber cable to a fiber cable port on Controller B of the RAID disk array. Connect the other end
of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
4. Connect a fourth fiber cable to the other fiber cable port on Controller B of the RAID disk array. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Standby system.
5. Connect an Ethernet crossover cable directly between the Ethernet port on Controller A of the RAID disk
array and a network interface on one of the Netra T5220 systems. Sonus recommends using interface nxge2
or nxge3.
6. Connect an Ethernet crossover cable directly between the Ethernet port on Controller B of the RAID disk
array and a network interface on the other Netra T5220 system (the one you did not connect in Step 5).
The following procedure assigns an IP address to a RAID disk array controller. This procedure should be performed
twice — once for Controller A and once for Controller B.
1. Power-up the RAID disk array.
2. Use the mini-DIN cable to connect a terminal server to the serial port on one of the RAID disk array
controllers.
3. Send a BREAK signal by pressing Alt-B.
4. When prompted, press S.
5. When prompted, enter the password. If you do not know the default password, contact the Sonus TAC.
6. The following prompt appears:
Enter 2.
7. The following prompt appears:
Enter Y.
8. The following prompt appears:
Enter N.
9. A message similar to the following appears:
Press '.' to clear the field; Press '-' to return to the previous field;
Press <ENTER> and then ^D to quit (Keep Changes)
Current Configuration New Configuration
IP Address 10.6.9.24
Enter the appropriate IP address value in the New Configuration column. This value is for the controller to
which you are attached. The IP address should be on the same subnet as the “well-known” address that will
be assigned to the multipath group for the active and standby Netra T5220 EMSs.
10. A message similar to the following appears:
Enter the appropriate subnet mask value in the New Configuration column. This value is for the controller to
which you are attached.
11. A message similar to the following appears:
Enter the appropriate gateway IP address value in the New Configuration column. This value is for the
controller to which you are attached.
12. A message similar to the following appears, which displays the values you entered in Steps 9, 10 and 11 .
StorageTek 2540 RAID Disk Array Configuration on Insight EMS Servers-DR Setup
The following procedure configures a StorageTek RAID disk array. This procedure should be run for each of the
RAID disk array controllers (A and B). This procedure should be run on one Insight server for one of the RAID disk
array controllers and run on the other Insight server for the other RAID disk array controller.
# cd /export/home/ems/conf/RAID
3. If an array or disk have been used in another application, the install may require reset to remove any previous
configuration. To reset the array, use the following command:
# ./SONSraidInstall.sh
Enter a value from 1 and 2 which correspond to 146 GB and 300 GB.
7. The script prompts for the volume size of the disk.
Enter a value from 1 and 2 which correspond to 136 GB and 270 GB.
The following prompt appears:
8. Enter the IP address for the controller that you connected to this Insight server.
The following prompt appears:
Enter the Device Name that is to be used to identify the array, such as
SONSemsarray.
9. Enter the device name for the RAID disk array. (If this is the second time you are performing this procedure,
enter the same name that you entered the first time.)
When the configuration is complete, a message similar to the following appears:
10. Repeat Steps 1 through 9 for the other Insight server and RAID disk array controller.
The following procedure installs the StorageTek Common Array Manager (CAM) software on a Netra T5220 server.
Before you start the procedure, ensure that you copy the StorageTek2500_CAM.tar.gz file from Salesforce to the
EMS system. This procedure should be performed on each of the two Insight servers.
The CAM software is a command-line interface (CLI) for configuring and managing the RAID disk arrays.
# cd /export/home/packages
# cd storageTek2500_CAM
# ./SONScamInstall.sh
After about 15 minutes, a message appears that states a log file is being written.
7. Repeat Steps 1 to 6 for the other Insight server.
Netra T5220 Disk Labeling and File System Creation for the RAID Disk
Array-DR Setup
This section describes the steps for configuring the RAID disk on each Netra T5220 system. Execute the procedures
on each Netra system (the active and standby).
In the example in the steps, c2t2d0s6 will be used for the disk and disk slice on one of the systems. The other
system will use c2t4d0s6.
Active System
This section describes the steps for configuring the RAID disk on the active Netra T5220 system.
1. Log on as root.
2. Display all the drives seen by the operating system by entering:
# format
Example: The following is an example of command output with StorageTek RAID. In following example, 0 to 3
are drives, 4 and 6 are RAID drives, and 5 and 6 are the controllers.
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0/fp@0,0/
ssd@w203c0080e52dfcde,1f
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0,1/fp@0,0/
ssd@w203d0080e52dfcde,1f
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
For selecting the disk, make sure that the drive controllers for the primary and the standby servers
are the same.
Enter yes.
5. At the <format> utility prompt, enter verify to ensure that the drive has been labeled and also to display the
disk slices (partition table).
6. At the <format> utility prompt, enter quit to exit the format utility prompt.
7. Create a new UNIX File System (UFS) as follows:
# newfs /dev/rdsk/<partition>
Identify the largest partition that is not labeled backup. In this example, partition6 is the largest partition not
labeled backup. Record the partition number displayed on your system. The disk slice is s6. For the example
shown in Step 4, you would enter:
# newfs /dev/rdsk/c2t2d0s6
# mkdir /export/raid
Where <partition> is the designator for your disk and disk slice. The disk was displayed in Step 4. The
disk slice is s6. For the example shown in Step 4, you would enter:
c. Record the mount point and device name in System Information Worksheet; you will need it when
running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t2d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
total 16
drwx------ 2 root root 8192 Nov 21 11:59
lost+found
# df -h|grep raid
# umount /export/raid
# df -h|grep raid
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
Standby System
This section describes the steps for configuring the RAID disk on the standby Netra system. Because the active
system has already been configured, the steps for labeling and creating a UFS are not required for the standby
system.
Example: The following is an example of command output with IBM DS 3524 RAID. In following example, 0 to
3 are drives, 4 and 5 are controllers, and 6 is RAID drive with multipathing enabled.
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
Enter the number that corresponds to the RAID disk number and not the controller. For StorageTek
RAID, as given in the above example, enter the disk number corresponding to the disk label
SUN-LCSM100_F-0735 and for IBM RAID, enter the disk number corresponding to the disk label
IBM-1814 as given in the above example.
4. At the format> utility prompt, enter verify to ensure that the drive has been labeled and also to display the
disk slices (partition table).
5. At the format> utility prompt, enter quit to exit the format utility prompt.
6. Mount the disk for testing and verification:
a. Create a mount point (directory) using the following command. The recommended name is:
/export/raid:
Identify the largest partition that is not labeled backup. In this example, partition6 is the largest partition
not labeled backup. Record the partition number displayed on your system. The disk slice is s6. If the
value shown in Step 3 was c2t4d0, you would enter:
c. Record the mount point and device name in Table System Information Worksheet; you will need it
when running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t4d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
total 16
drwx------ 2 root root 8192 Nov 21 11:59 lost+found
# df -h|grep raid
# umount /export/raid
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
The primary use for the private network links is the exchange of heartbeat messages between the active and
standby systems. The heartbeat messages allow each system to detect the availability of the other system. The
minimum number of private network connections is one; however, the more connections that you provide, the more
protection you have against port and card failures.
For HA to run properly, you must have this private network configured and running properly. If the heartbeat
messages are sent over the public network rather than the private network, under certain conditions the standby
system may attempt a takeover before the active system detects the failure (or while trying to recover from the
failure).
Sonus Recommendations
Sonus recommends at least two private network links between the Active and Standby Netra T5220 systems (you
can establish up to four private network links). At least one of these should be a dedicated hardwired (Ethernet
crossover cable) connection between the Active and Standby systems. You can use any combination of dedicated
hardwired links or non-dedicated links through a hub/switch for the redundant network link(s).
If the redundant network is accomplished using a hub/router (rather than a crossover cable), make sure that the
hub/router's address can be pinged and its interfaces have transmission mode configured to auto-negotiate. These
settings are required to ensure that Keep Alive communications can succeed between the Active and Standby
systems.
For a more robust deployment, the interfaces for each private network link should be on different cards than the
interfaces for the other private network links.
Each private network link should be on a different subnet than the other private network links.
Procedure
The steps below describe the procedure for establishing a private network between the Active and Standby
systems.
1. Connect an Ethernet crossover cable directly between a network interface on the Active and Standby Netra
5220 systems. The Table Private Network Interfaces and IP Addresses shows the recommended interfaces
to use. See the figure Netra T5220 Cross-over Cable Connections. Note that the first and second private
networks are on different cards, as recommended.
2. On the Active and on the Standby Netra systems, use the following steps to assign permanent (persistent
across reboots) IP addresses to the private network interfaces you connected in Step 1. The Table Private
Network Interfaces and IP Addresses shows a sample IP address to use for each interface. Note that the first
private network link is on a different subnet than the second private network link, as required.
a. Create an /etc/hostname.<interface> file for each of the private network interfaces, and in each
file, enter the IP address for the interface.
Example: If one of the private network interfaces is e1000g2 and the IP address is 192.168.5.1, create
the file /etc/hostname.e1000g2 and enter the value 192.168.5.1.
b. Record the value of each IP address in System Information Worksheet; you will need these values
when running the configureHA script.
c. In the /etc/netmasks file, enter the network number and netmask for each of the private network
interfaces on the system.
Depending on the private network interface IP address, specify the Network number and subnet mask
of the respective private network interface.
Example: If the private network interface number is 192.168.5.2 then enter the network number and
subnet mask in /etc/netmasks file as 192.168.5.0 255.255.255.0.
d. Plumb the IP address by executing the following commands:
This example considers e1000g2 as the private interface and 255.255.255.0 as the netmask.
Verify that the peer IP addresses are on a private subnet to ensure that packets destined for
the management network are not transmitted through these interfaces.
3. Repeat Steps 1 and 2 to set up the secondary and any other redundant links between the Active and Standby
Netra systems. You can use any combination of dedicated hardwired links or non-dedicated links through a
hub/switch for the redundant network link(s).
It is necessary to perform some configuration on each Netra system and collect hardware configuration information
to be used later when you run the configureHA script. The configureHA script will configure the public network and
the multipath group.
The concept of IP Network Multipathing is used for the public network. This concept provides the system with
single-point of failure recovery. A “well-known address” is assigned to a multipath group, which consists of a primary
Prerequisite
If not already done, you must set up a management/reachability interface on both the active and standby systems,
and assign each an IP address (refer to the Sun documentation for proper setup procedures). This interface will be
used when a system is in the standby mode to send traps concerning its own operation. The Table Reachability
Interface and IP Address shows the recommended reachability interface and sample IP addresses to use, and
Figure Public Network Connections for Netra T5220 shows the connections. The reachability address must be on
the same subnet as the “well-known” address that will be chosen in "Getting Ready to Configure the Public
Network". Record the value of the reachability IP addresses, you will need these values when running the
configureHA script.
Requirements
The primary and secondary interfaces for the multipath group on a system must be on different cards.
The reachability address and the well-known address must be on the same subnet.
The well-known address must be on a different network than the private network links.
The test addresses must be on the same subnet as the well-known address.
The dummy address must be on the same subnet as the well-known address.
ICMP echo/reply to and from the default router (or hosts identified through static hosts routes) must be
allowed.
Procedure
The procedure below describes the prerequisite steps to be completed concerning the public network before running
the configureHA script.
1. You must choose the names of the two interfaces used to create the multipath group on each Netra system.
The Table Public Network Interfaces and IP Addresses shows the recommended interfaces to use; note that
the primary and secondary interfaces are on different cards, as required. Record the values in System
Information Worksheet, you will need these values when running the configureHA script.
2. Log on as root.
3. In order to activate these two interfaces on each Netra system, you need to plumb each interface. This
process sets up the streams needed for IP to use the interface. Use the ifconfig command to perform this
task. For example, to plumb interface e1000g1and nxge0, use the following commands:
4. Establish one well-known address on the LAN for assignment to the multipath group for use by the clients.
You only need one well-known address for both Netras on the HA system. The Table Public Network
Interfaces and IP Addresses shows a sample well-known address to use; note that the well-known address is
on a different network than the private network, as required. Also note that the well-known address is on the
same subnet as the reachability address given in Table Reachability Interface and IP Address, as required.
Record the value System Information Worksheet, you will need it when running the configureHA script.
5. Assign a host-name (such as “EMSHA”) to this well-known address and make an entry in the appropriate
Solaris database on both Netras, for example in the /etc/hosts file or NIS or DNS. Record the value; you will
need it when running the configureHA script.
6. Sonus recommends that you establish two unique test addresses on each Netra system, one for the primary
LAN interface and one for the secondary. These test addresses must be on the same subnet as the
well-known address. These addresses are not for general use. The Table Public Network Interfaces and IP
Addresses, shows sample test addresses to use. Record the values; you will need these values when
running the configureHA script.
Because the active and standby test addresses are not plumbed simultaneously, you can, if you
wish, use the same test address on both systems.
7. Establish one “dummy” address as the back-up/secondary address used for the internal working for the
multipath group. This dummy address must be on the same subnet as the well-known address. This address
is not for general use. You only need one dummy address for both Netras on the HA system. The Table
Public Network Interfaces and IP Addresses, shows a sample well-known address to use. Record the value,
you will need it when running the configureHA script.
During configuration, if a prompt asks for the IP Address, enter the well-known address. If a prompt
asks for the host-name, enter the hostname corresponding to the well-known address. You should
not use the IP address or hostname of an individual Sun system in an HA set-up.
8. Install the cabling from the two interfaces to the appropriate hub/router. The Figure Public Network
Connections for Netra T5220, shows the connections.
Caution
Be sure that the steps in the procedure above are complete for each Netra system.
Test address example for primary interface for multipath group 10.6.9.80
Test address example for secondary interface for multipath group 10.6.9.81
Test address example for primary interface for multipath group 10.6.9.82
Test address example for secondary interface for multipath group 10.6.9.83
Perform the procedure on both the active and standby Netra T5220 servers.
Passwords
The emsMigrate.sh script used in the following procedure gives you the opportunity to use strong passwords,
which must then be entered and must meet a set of restrictions, or to use weak passwords, which are the current
passwords.
Procedure
Perform the following procedure on both the active and standby Netra T5220 servers to import the data you earlier
exported from the Netra 240/440s:
This task need to be done on both the active and standby servers.
The files need to copied from respective backups, that is, active or standby.
For example, If this Netra T5220 is the active system, then from the active system backup directory you used
in Step 2 of Exporting Data from the HA System for DR, copy the exp_data_manual.dmp and
exp_strct_manual.dmp files to the /export/home/oracle/backup/dump directory on the Netra
T5220. Also copy the backupFiles.tar file to the /tmp directory on the Netra T5220.
If the exp_data_manual.dmp and exp_strct_manual.dmp files are copied to
/export/home/oracle/backup/dump using an unconventional method, such as FTP, change the owner
and group of the files to Oracle and DBA.
To change the owner and group of files to Oracle and DBA, enter the following commands:
# cd /export/home/oracle/backup/dump
# chown oracle:dba exp_data_manual.dmp exp_strct_manual.dmp
CAUTION
You must copy files from the backup directory that you used for this EMS server. If you use a
backup directory that contains files from another EMS server, Insight will not behave properly.
# cd /export/home/ems/conf/jumpstart
# ./emsMigrate.sh
5. Enter y to continue.
The following message appears
6. The script asks for the full path to the backup tar file. Answer /tmp and press Enter.
The following message appears:
7. Enter y to import.
The following message appears:
########################################################################################
Starting importing and upgrading Insight Oracle Database Instance SIDB as user
oracle.
########################################################################################
stty: : Invalid argument
: : Invalid argument
stty: : Invalid argument
..............................................................................................
Disconnected from Oracle Database 11g Enterprise Edition Release 11.2.0.3.0 -
64bit Production
With the Partitioning, OLAP, Data Mining and Real Application Testing options
Modifying /export/home/jboss/server/insight/deploy/jbossweb.sar/server.xml
Done
Completed changing protocol to http. Please restart Sonus Insight.
If you have any IAS registered with the system, then execute the same
procedure on each IAS also by following the procedures provided in the
Insight User Guide.
The Sonus Insight migration is complete.
You only need to follow the procedures in this section when installing Insight (HA) architecture.
Prerequisites
When running the configureHA script on the active and standby Insight systems, the script prompts you for
system information. Reachability Interface and IP Address table lists the information you will need, and the
procedures in which these values were assigned. You can enter your values into the table and use it as a reference
when you run configureHA.
Performed the first seven items in Task Sequence for Migrating HA to Netra T5220s-DR Setup
Reset the insight user password. See Changing the “insight” User Password and/or Password Expiration
Behavior.
The active and standby systems must use the same insight user password.
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
Standby First peer private IPv4/IPv6 address Private Network Setup for DR
Deployment
Second peer private IPv4/IPv6 address
Primary interface for multipath group Public Network Setup for DR Deployment
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
e. Click OK.
The operation may take a longer time depending on the number of nodes.
If there are any errors displayed on the final screen at the end of the operation, then the nodes were
not successfully discovered. You need to perform a manual discovery of the nodes after determining
the cause of the error.
For more details, refer to the Node discovery section of the Insight User Guide.
The configureHA script configures HA in each Netra system for the first time. The script provides a HA
configuration main menu from which you can choose to configure an active or standby Insight system and perform
other HA configuration operations. The configureHA script collects user information and writes it to the
haConfiguration file in the /export/home/ems/conf/HA directory.
You must run the configureHA script on both the active and standby Insight systems.
The following procedure describes how to run configureHA on the active system.
Note
The approximate timeline required to run the configureHA script on the active system is 30 minutes.
a. If the Insight database is running, a list of active oracle processes will be displayed and go to Step 3.
b. If the Insight database is not running, no oracle processes will be displayed. Start the Insight database
by entering the following command and go to Step 3.
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If necessary replace the c2t2d0s6 in the command line with the designator for your disk. This was established
in the section Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array-DR Setup .
4. Enter the following command to start the configureHA script.
# cd /export/home/ems/conf/HA
# ./configureHA
Insight will be stopped now. Do you want to proceed? (default: yes) [y,n]
Press Enter to accept the default. The system then displays the following message:
Note
OAM stands for Operations And Management. OAM IP address is used by the users to access all EMS
northbound interfaces like GUI, CLI, and API. A user can have two different networks for OAM and
signaling. In this scenario, EMS can act as a proxy for PSX to enable the PSX manager GUI to talk to
PSX. In a standalone EMS deployment with two different networks for OAM and signalling, the PSX
manager GUI connects to the EMS through the EMS OAM IP address, if PSX proxy mode is enabled. In
case of an EMS HA deployment with PSX proxy mode enabled and the user has two different networks
for OAM and signaling, the active EMS and standby EMS have their own respective OAM IP addresses.
In that case, the PSX manager GUI will use the appropriate OAM IP of the current active server.
Note
The OAM IP address is used by PSX to communicate with PSX GUI and EMS acts as a proxy for PSX.
Type 3 and press Enter to Input the IP Multipath and Insight Reachability information.
12. The system displays the following:
The section will collect information for creating the "Public" IP Multipathing
interface.
Which interface will be the primary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
Type the name of the primary interface for the multipath group, and press Enter.
Which interface will be the secondary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
a. Type the name of the secondary interface for the multipath group and press Enter.
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
The system would not display the primary interface that have configured in previous step as
an option.
What is the test IPV4 address for the primary LAN interface (default:
10.54.5.32) : 10.54.5.32
What is the test IPV6 address for the primary LAN interface :
NOTE: The configureHA script provides the user to configure the HA in IPv4 or IPv6.
If you want to configure an IPv6 HA Setup, please leave all the IPv4 addresses blank.
If you want to configure an IPv4 HA setup, please follow the following steps:
What is the test IPV4 address for the primary LAN interface : 10.54.5.32
What is the test IPV6 address for the primary LAN interface :
INVALID IPv6 address format.
Do you want to stop entering this IP address? (default: no) [y,n] y
Type the IP test address for the primary interface for the multipath group, and press Enter.
What is the test IPV4 address for the secondary LAN interface : 10.54.5.33
What is the test IPV6 address for the secondary LAN interface :
Type the IP test address for the secondary interface for the multipath group, and press Enter.
NOTE: You would have established the secondary interface for the multipath group in Public Network Setup.
19. The system displays the following:
What is the "dummy" IPV4 address for the secondary interface : 10.54.5.38
What is the "dummy" IPV6 address for the secondary interface :
Type the dummy address, which you established in Public Network Setup and press Enter.
21. The system displays the following:
Type the reachability address for this system, which you established in Public Network Setup and press
Enter.
22. The system displays the values you entered. The following is an example based on the values given for the
active Netra T5220 system in Public Network Setup.
Please provide the IP Address of the Peer system for Keep Alives.
You can provide up to 4 such addresses.
Peer Keep Alive IP Address 1 (RETURN to stop):
Peer Keep Alive IP Address 2 (RETURN to stop):
Sonus recommends providing at least two peer private IP addresses for redundancy purposes. Enter the peer
private IP addresses, which you established in Private Network Setup, and press Enter.
25. The system displays the following:
Please provide the IPv4 reachability Address of the Peer system for Keep
Alives.
Please provide the IPv6 reachability Address of the Peer system for Keep
Alives
What is the peer's IPv4 reachability address?
Type the reachability address for the other Insight system, which you established in Public Network Setup
and press Enter.
27. The system displays the following:
You entered:
Peer Keep Alive IP Address 1: 172.16.5.2
Peer Keep Alive IP Address 2: 172.16.6.2
Peer Keep Alive IP Address 3:
Peer Keep Alive IP Address 4:
Peer's Reachability IP Address: 10.54.5.35
You entered...
User Name: "oracle"
Group Name: "dba"
Are the values correct (default:N) [y|Y,n|N] ?
Enter the RAID’s mount point, which you established in Netra T5220 Disk Labeling and File System Creation
for the RAID Disk Array-DR Setup and press Enter.
32. The system displays the following:
Enter the RAID’s device name, which you established in the section Netra T5220 Disk Labeling and File
System Creation for the RAID Disk Array-DR Setup and press Enter.
33. The system displays the following:
The “raw” device name is the same as the device name with the addition of “r” to “dsk” (e.g.
/dev/rdsk/c2t2d0s6).
Enter the well-known IP address, which you established in Public Network Setup, and press Enter.
35. The system displays the following:
You must decide whether to move the active system database or standby system database to the RAID disk
array. If you choose item 1 for the active system, you must choose item 2 when running the configureHA
procedure on the standby system. You cannot choose the same operation for both systems.
If necessary, you can enter q to return to the main menu.
Press Enter after making your selection.
37. If you chose 1 above, the system displays the following prompt:
Enter the base directory for Oracle and press Enter. For example:
/export/home/oracle
The system then displays a number of status messages that the configureHA script uses to make the
database. The script will backup the database, create a new database and import the backup data into the
new database. The script also turns on archive log and schedules cron jobs for daily backups and cleanup.
mkdir /export/raid/orasql
chown oracle:dba /export/raid/orasql
chmod 775 /export/raid/orasql
38. The system displays the High Availability Configuration Main Menu:
Type 6 and press Enter.
39. The system displays the following:
Testing scp
Please enter the root password of the peer:
41. The system displays the High Availability Configuration Main Menu.
Type 9 and press Enter to change the IP address of system A.
42. The system displays the following:
This step will change the IP Address on your system. Do you want to proceed
with this step? (default: yes) [y,n]
Do you want to notify all registered IAS systems of this new IP address?
(default: no) [y,n]
If there are IASs that were registered to this system and that should be registered to the HA system, type y
and press Enter. Otherwise type n and press Enter.
45. The system displays the following:
# /export/home/ems/conf/HA/haResources release
49. After you run the configureHA script on the active and standby systems, go to Performing Post-HA
Configuration Tasks-DR Setup.
The procedure for running the configureHA script on a standby system is similar to the procedure for an active
system, but both the Insight process and database instance should be stopped. Use the procedure detailed in
Configuring HA on Active System-HA Setup with the following differences:
respond with an s instead of accepting the default value. The system then displays the following message:
You must choose a different operation than you chose for the active system. If you chose item 1 for the
active system, you must choose item 2 for the standby system. Press Enter after making your selection.
The system then displays several status messages.
After you run the configureHA script on both systems, perform the following tasks:
Step Tasks
Number
1. Verify that the interfaces and routing table are configured correctly.
See Checking Interface Configuration and Routing Table for Netra T5220-DR Setup.
2. Enable Multipath for IBM RAIDS. For more details, see MPXIO from T5220 to IBM DS3524 Disk Arrays for
DR Setup.
3. First start Insight on the active system and then on the standby system
After migrating data from one EMS server (A) to another EMS server (B), and after registering Insight node B,
you need to unregister Insight node A (which will show up registered as a result of the migration).
Associate the new Insight IP with the nodes. For information, see Associating the Nodes-DR Setup.
Disassociate the old Insight IP from the nodes. For information, see Disassociating the Nodes-DR Setup.
1. Login to Insight
2. Navigate to Network Mgmt > Insight Administration
3. Select the registered SGX4000 node from the Navigation tree.
4. Modify and Update the following (default) values if required:
a. SSH Port
b. Login (CLI)
c. Password (CLI)
5. Click on Update button and then click on Discover node
e. Click OK.
The operation may take a longer time depending on the number of nodes.
If there are any errors displayed on the final screen at the end of the operation, then the nodes were
not successfully discovered. You need to perform a manual discovery of the nodes after determining
the cause of the error.
For more details, refer to the Node discovery section of the Insight User Guide.
Example Details
In the example output given in the following procedure, the following assumptions are made:
Procedure
Use the following steps to verify the interface configuration and routing table on each server that is part of an HA
setup.
ifconfig -a
netstat -rn
This section describes how to migrate from Storage Tek RAID to IBM RAID on Netra T5220.
If you are using a pre-9.0.0 EMS Solaris with StorageTEK RAID and want to migrate to IBM DS3524 RAID
then you must migrate using EMS V09.02.00 release. Direct migration from EMS pre-9.0.0 Release with
StorageTEK RAID to V09.03.00 Release with IBM DS3524 RAID is not supported. Jumpstart EMS Solaris
HA with IBM DS3524 RAID running on V09.02.00 and then perform migration. After you have migrated data
to V09.02.00 Release with IBM DS3524 RAID you can upgrade from V09.02.00 to V09.03.00 or V09.02.01
and higher sustaining releases.
When Migrating from EMS Migration Files generated are High-level migration Steps
Solaris StorageTEK RAID
High-level Tasks for Migrating From Storage Tek RAID to IBM RAID on
T5220-DR Setup
This section describes the procedure for migrating the Storage Tek RAID to IBM RAID on Netra T5220.
Step Task
Number
2. Kickstart EMS HA on Solaris Netra T5220 system with EMS Release V09.02.00.
Perform the step 3 to step 9 on EMS HA Netra 5220 to install V09.02.00, configure HA, restore
data using EMS V09.02.00 Software Release. After data is restored on EMS V09.02.00, you
can upgrade from V09.02.00 to V09.03.00 Release.
3. Setup and configure RAID Disk Array with Netra 5220. For detailed procedure, see Setup and Configure Netra
T5220 platforms with RAID Disk Arrays for Migration-DR Setup.
4. Perform disk labeling and file creation for RAID Disk Array. See Performing Netra T5220 Disk Labeling and File
System Creation for the RAID Disk Array for Migration-DR Setup.
5. Setup private network. See Private Network Deployment for Migration-DR Setup.
6. Setup public network. See Public Network Deployment for Migration-DR Setup.
7. Import the data back to the HA servers. For detailed procedure, see Importing Data into the Netra T5220s for
Migration-DR Setup.
8. Configure HA using same old T5220s with new IBM RAID. For detailed procedure, see Configuring High
Availability on each Netra System for Migration-DR Setup.
9. Verify interface and routing table. See Checking Interface Configuration and Routing Table after Configuring
HA-DR Setup.
10. Upgrade from EMS Software Release V09.02.00 to V09.03.00. For more information on upgrade, refer Upgradin
g from Insight EMS V09.02.00 to V09.03.00 Software Release-DR Setup.
If you are migrating from 9.2.1 StorageTEK RAID to 9.3.0 release with IBM 3524 RAID, following will be the
high-level steps:
Step Task
Number
2. Kickstart EMS HA on Solaris Netra T5220 system with EMS Release V09.02.00.
Perform the step 3 to step 9 on EMS HA Netra 5220 to install V09.02.00, configure HA, restore
data using EMS V09.02.00 Software Release. After data is restored on EMS V09.02.00, you
can upgrade from V09.02.00 to V09.03.00 Release.
3. Setup and configure RAID Disk Array with Netra 5220. For detailed procedure, see Setup and Configure Netra
T5220 platforms with RAID Disk Arrays for Migration-DR Setup.
4. Perform disk labeling and file creation for RAID Disk Array. See Performing Netra T5220 Disk Labeling and File
System Creation for the RAID Disk Array for Migration-DR Setup.
5. Setup private network. See Private Network Deployment for Migration-DR Setup.
6. Setup public network. See Public Network Deployment for Migration-DR Setup.
7. Configure HA using same old T5220s with new IBM RAID. For detailed procedure, see Configuring High
Availability on each Netra System for Migration-DR Setup.
8. Verify interface and routing table. See Checking Interface Configuration and Routing Table after Configuring
HA-DR Setup.
9. Upgrade from EMS Software Release V09.02.00 to V09.03.00. For more information on upgrade, refer Upgradin
g from Insight EMS V09.02.00 to V09.03.00 Software Release-DR Setup .
10. Import the data back to the HA servers. For detailed procedure, see Importing Data into the Netra T5220s for
Migration-DR Setup.
Depending on the EMS Software Release from which you are exporting the data, the dmp file names would differ.
When Migrating from EMS Solaris StorageTEK RAID Migration Files generated are
exp_data_manual.dmp
exp_strct_manual.dmp
expdp_data_manual.dmp
expdp_strct_manual.dmp
expdp_cfg_data_manual.dmp
expdp_stats_data_manual.dmp
expdp_strct_manual.dmp
1. Log on to the Netra 5220 active system (system A) connected to StorageTEK RAID as a user with root
privileges.
2. Run the manualBackup.sh script on system A:
# cd /export/home/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine and that is accessible from
the Netra T5220 that will be the new active HA system. Use a directory name that will clearly identify the EMS
server that created the backup files. Make a note of the directory path because you will need it later when
migrating data to the Netra T5220 active HA system.
3. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, dmp files) in the backup directory
you identified in Step 2.
4. Perform a failover from the Netra 5220 active system (system A) to the Netra 5220 standby system (system
B) as follows:
a. Log on to system A as a user with root privileges.
b. Enter the following on system A:
# cd /export/home/ems/conf/HA
# ./hamgmt failOver
# cd /export/home/ems/conf
# ./manualBackup.sh <yourbackupdirectory>
where <yourbackupdirectory> should be replaced with the actual path for the directory in which you wish
to store your backup files. Use a directory that is external to the Insight machine and that is accessible from
the Netra T5220 that will be the new standby HA system. Make a note of the directory path because you will
need it later when migrating data to the Netra T5220 standby HA system.
6. The script returns the following text:
Creating backupFiles.tar.
Running Oracle export script from Oracle account.
Moving the files to <yourbackupdirectory>.
Backup procedure completed successfully.
The backup results in the creation of three files (backupFiles.tar, dmp files) in the backup directory
you identified in Step 5.
Setup and Configure Netra T5220 platforms with RAID Disk Arrays for
Migration-DR Setup
This section describes the setup and hardware configuration for Netra T5220 platforms and RAID disk arrays. The
procedures in this section apply only to Netra 5220s.
Setting Up and Configuring Netra T5220 Systems with IBM DS3524 Storage System for
Migration-DR Setup
This section describes the setup and hardware configuration for Netra T5220 platforms and IBM DS3524 Storage
system.
Netra T5220 and IBM DS3524 Storage System Connections for Migration-DR Setup
IBM DS Storage Manager Software Installation for Migration-DR Setup
IBM DS3524 Storage Subsystem Controller IP Address Configuration for Migration-DR Setup
IBM DS3524 RAID Disk Array Configuration on Insight EMS Servers for Migration-DR Setup
Netra T5220 and IBM DS3524 Storage System Connections for Migration-DR Setup
This section describes the procedure for making the physical connections between the IBM DS3524 and the Netra
T5220 systems.
1. Connect one fiber cable to a fiber cable port on Controller A of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
2. Connect a second fiber cable to the other fiber cable port on Controller A of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
3. Connect a third fiber cable to a fiber cable port on Controller B of the DS3524 Storage system. Connect the
other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the Active system.
See Netra T5220 to DS3524 Storage System Connections figure.
4. Connect a fourth fiber cable to the other fiber cable port on Controller B of the DS3524 Storage system.
Connect the other end of the fiber cable to a fiber cable port on the Netra T5220 system that will be the
Standby system. See Netra T5220 to DS3524 Storage System Connections figure.
Storage Manager is used to configure, manage, and troubleshoot storage subsystems. It is used primarily to
configure RAID arrays and logical drives, assign logical drives to hosts, replace and rebuild failed disk drives,
expand the size of the arrays and logical drives, and convert from one RAID level to another. Storage Manager
enables troubleshooting and management tasks, such as checking the status of the storage subsystem
components, updating the firmware of the RAID controllers, and managing the storage subsystem.The latest IBM
DS3524 Storage Manager software version is 10.83.x5.23.
The following procedure installs the IBM DS Storage Manager software on a Netra T5220 server. This procedure
should be performed on each of the two Insight servers.
# cd /export/home/packages
# gunzip SM10.83_Solaris_SMIA-10.83.x5.23.tgz
# cd Solaris10p83/Solaris
# ls SMIA-SOL-10.83.x5.23.bin
sh SMIA-SOL-10.83.x5.23.bin -i silent
Preparing to install...
SMIA-SOL-10.83.05.23.bin: !: not found
Extracting the JRE from the installer archive...
Unpacking the JRE...
Extracting the installation resources from the installer
archive...
Configuring the installer for this system's environment...
Launching installer...
Preparing SILENT Mode Installation...
..
.....
......
< text deleted for brevity >
....
.....
Installation Complete.
/opt/IBM_DS/IBM_System_Storage_DS_Storage_Manager_10_InstallLog.log
/opt/IBM_DS/IBM\ System\ Storage\ DS\ Storage\ Manager\ 10_InstallErrorLog.log
Two SAS host ports labeled 1 and 2. Each of them is capable of operating at 8Gbps, 4Gbps, and 2Gbps
Four fiber channel host ports labeled FC3,FC4,FC5,FC6. Each of them is capable of operating at 8Gbps,
4Gbps, and 2Gbps
Two Ethernet management ports labeled 1 and 2 for Out-Of-Band management
The port on the extreme right is a x4 multilane mini-SAS port for connecting to EXP3524 drive expansion
enclosures
The following procedure assigns an IP address to a DS3524 storage subsystem controller. This procedure should
be performed twice, once for Controller A and once for Controller B.
1. Connect the T5220 server to a simple Hub/Switch after installing DS Storage Manager on both the T5220
servers.
2. Connect Ethernet port 2 on each controller to the same Hub/Switch which is connected to your T5220
servers.
3. Start the X-server (such as Exceed) on the system where the GUI is to be launched.
4. Set the DISPLAY variable's IP address to the IP address of the machine where the GUI should be launched
using the following commands:
DISPLAY=<IP Address>:0.0
export DISPLAY
echo $DISPLAY
Where <IP Address> is the Ip of the machine where the GUI need to be launched.
5. Login as root to the T5220 server which is connected to the same Hub/Switch and go to the
/opt/IBM_DS/client directory:
# cd /opt/IBM_DS/client
# ./SMclient
Since Storage Manager is GUI-based application, set your DISPLAY to display graphics.
7. Click on the Add Storage Subsystem link from the Setup tab in the DS Storage Manager Enterprise
Management window.
The Select Addition Method-Manual screen opens.
8. In the Select Addition Method-Manual screen, select the Automatic discovery button and click OK.
9. Click OK to begin an initial automatic discovery of hosts on storage subsystems.
After the initial automatic discovery is complete, the Devices tab of the Enterprise Management Window
displays all hosts and storage subsystems attached to the local subnetwork.
The Enterprise Management Window can take up to a minute to refresh after an initial automatic
discovery.
10. In the Subsystem Management window, right-click the discovered storage subsystem to see the context
menu with the tasks.
Select the Manage Storage Subsystem task.
11. When you choose to manage a specific storage subsystem, the IBM System Storage DS (Subsystem
Management) window opens, along with the Initial Setup Task on background and a small window prompting
for the password.
Enter the password for Subsystem.
12. In the IBM System Storage DS (Subsystem Management) window, click the Configure Ethernet Management
Ports link in the Optional Task list.
The Change Network Configuration screen opens.
The following are the default port IP addresses in each controller:
192.168.128.101 Port 1
192.168.129.101 Port 2
13. In the Change Network Configuration screen, change the default Port IP addresses to your local IP
addresses.
14. Close the Storage Manager client.
IBM DS3524 RAID Disk Array Configuration on Insight EMS Servers for Migration-DR
Setup
The following procedure configures an IBM DS3524 RAID disk array. This procedure should be performed on one of
the Insight servers and it takes approximately 30 minutes.
# cd /export/home/ems/conf/RAID
3. If an array or disk have been used in another application, the install may require reset to remove any previous
configuration.
To discover the array, enter the following command:
a. Enter SMcli -i -d if you are discovering the Storage Subsystem for the first time.
For example, the system displays the following:
4. Enter the following command to ensure the RAID name and IP addresses of the controllers are discovered:
# SMcli -i -d
For example, for RAID: EMSIBMRAID
# SMcli -i -d
EMSIBMRAID 10.54.58.109 10.54.58.110
SMcli completed successfully.
# ./SONSraidInstall.sh
6. The script detects the RAID the EMS is connected to and prompts for the number of physical disks.
The recommended option is 2. (300 GB). Press Enter after providing the choice.
9. Enter the RAID password that you had entered on step 11 of the IBM DS3524 Storage Subsystem Controller
IP Address Configuration for Migration-DR Setup section when the following is prompted and press Enter.
10. Enter the IP address to configure the array when prompted and press Enter:
# reboot -- -r
Performing Netra T5220 Disk Labeling and File System Creation for the RAID
Disk Array for Migration-DR Setup
This section describes the steps for configuring the RAID disk on each Netra T5220 system. Execute the procedures
on each Netra system (the active and standby).
In the example in the steps, c2t2d0s6 will be used for the disk and disk slice on one of the systems. The other
system will use c2t4d0s6.
Active System
This section describes the steps for configuring the RAID disk on the active Netra T5220 system.
1. Log on as root.
2. Display all the drives seen by the operating system by entering:
# format
Example: The following is an example of command output with StorageTek RAID. In following example, 0 to 3
are drives, 4 and 6 are RAID drives, and 5 and 6 are the controllers.
Example: The following is an example of command output with IBM DS 3524 RAID. In the following example,
0 to 3 are drives, 4 and 5 are controllers, and 6 is RAID drive with multipathing enabled.
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0/fp@0,0/
ssd@w203c0080e52dfcde,1f
/pci@0/pci@0/pci@8/pci@0/pci@9/SUNW,qlc@0,1/fp@0,0/
ssd@w203d0080e52dfcde,1f
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
Enter the number that corresponds to the RAID disk number and not the controller. For StorageTek
RAID, as given in the above example, enter the disk number corresponding to the disk label
SUN-LCSM100_F-0735 and for IBM RAID, enter the disk number corresponding to the disk label
IBM-1814 as given in the above example.
4. If you are using StorageTek RAID, a message similar to the following appears:
selecting c2t2d0
[disk formatted]
Disk not labeled. Label it now?
# newfs /dev/rdsk/<partition>
Identify the largest partition that is not labeled backup. In this example, partition6 is the largest partition not
labeled backup. Record the partition number displayed on your system. The disk slice is s6. For the example
shown in Step 4, you would enter:
# newfs /dev/rdsk/c2t2d0s6
# mkdir /export/raid
Where <partition> is the designator for your disk and disk slice. The disk was displayed in Step 4. The
disk slice is s6. For the example shown in Step 4, you would enter:
c. Record the mount point and device name in System Information Worksheet; you will need it when
running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t2d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
# df -h|grep raid
# umount /export/raid
# df -h|grep raid
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
Standby System
This section describes the steps for configuring the RAID disk on the standby Netra system. Because the active
system has already been configured, the steps for labeling and creating a UFS are not required for the standby
system.
Example: The following is an example of command output with IBM DS 3524 RAID. In following example, 0 to
3 are drives, 4 and 5 are controllers, and 6 is RAID drive with multipathing enabled.
/pci@0/pci@0/pci@2/scsi@0/sd@1,0
/pci@0/pci@0/pci@2/scsi@0/sd@2,0
/pci@0/pci@0/pci@2/scsi@0/sd@3,0
/scsi_vhci/ssd@g60080e50002dfcde0000158e536939f2
3. The available disk selections are displayed, and the following prompt appears:
Enter the number that corresponds to the RAID disk number and not the controller. For StorageTek
RAID, as given in the above example, enter the disk number corresponding to the disk label
SUN-LCSM100_F-0735 and for IBM RAID, enter the disk number corresponding to the disk label
IBM-1814 as given in the above example.
4. At the format> utility prompt, enter verify to ensure that the drive has been labeled and also to display the
disk slices (partition table).
5. At the format> utility prompt, enter quit to exit the format utility prompt.
6. Mount the disk for testing and verification:
a. Create a mount point (directory) using the following command. The recommended name is:
/export/raid:
Identify the largest partition that is not labeled backup. In this example, partition6 is the largest partition
not labeled backup. Record the partition number displayed on your system. The disk slice is s6. If the
value shown in Step 3 was c2t4d0, you would enter:
c. Record the mount point and device name in Table System Information Worksheet; you will need it
when running the configureHA script. In our example, we have:
Mount Point: /export/raid
Device Name (also referred to as “Block Device Name”): /dev/dsk/c2t4d0s6
d. Verify that the mounting has succeeded by listing the files in the /export/raid directory:
# ls -ltr /export/raid
total 16
drwx------ 2 root root 8192 Nov 21 11:59 lost+found
# df -h|grep raid
# umount /export/raid
Do not mount the disk and leave it mounted. This occurs automatically when the system
becomes active.
The primary use for the private network links is the exchange of heartbeat messages between the active and
standby systems. The heartbeat messages allow each system to detect the availability of the other system. The
minimum number of private network connections is one; however, the more connections that you provide, the more
protection you have against port and card failures.
For HA to run properly, you must have this private network configured and running properly. If the heartbeat
messages are sent over the public network rather than the private network, under certain conditions the standby
system may attempt a takeover before the active system detects the failure (or while trying to recover from the
failure).
Sonus Recommendations
Sonus recommends at least two private network links between the Active and Standby Netra T5220 systems (you
can establish up to four private network links). At least one of these should be a dedicated hardwired (Ethernet
crossover cable) connection between the Active and Standby systems. You can use any combination of dedicated
hardwired links or non-dedicated links through a hub/switch for the redundant network link(s).
If the redundant network is accomplished using a hub/router (rather than a crossover cable), make sure that the
hub/router's address can be pinged and its interfaces have transmission mode configured to auto-negotiate. These
settings are required to ensure that Keep Alive communications can succeed between the Active and Standby
systems.
For a more robust deployment, the interfaces for each private network link should be on different cards than the
interfaces for the other private network links.
Each private network link should be on a different subnet than the other private network links.
Procedure
The steps below describe the procedure for establishing a private network between the Active and Standby
systems.
1. Connect an Ethernet crossover cable directly between a network interface on the Active and Standby Netra
5220 systems. The Table "Private Network Interfaces and IP Addresses" shows the recommended interfaces
to use. See the figure Netra T5220 Cross-over Cable Connections. Note that the first and second private
networks are on different cards, as recommended.
2. On the Active and on the Standby Netra systems, use the following steps to assign permanent (persistent
across reboots) IP addresses to the private network interfaces you connected in Step 1. The Table Table "
Private Network Interfaces and IP Addresses" shows a sample IP address to use for each interface. Note that
the first private network link is on a different subnet than the second private network link, as required.
a. Create an /etc/hostname.<interface> file for each of the private network interfaces, and in each
file, enter the IP address for the interface.
Example: If one of the private network interfaces is e1000g2 and the IP address is 192.168.5.1, create
the file /etc/hostname.e1000g2 and enter the value 192.168.5.1.
b. Record the value of each IP address in Table 14 – 4; you will need these values when running the
configureHA script.
c. In the /etc/netmasksfile, enter the network number and netmask for each of the private network
interfaces on the system.
Depending on the private network interface IP address, specify the Network number and subnet mask
of the respective private network interface.
Example:
If the private network interface number is 192.168.5.2 then enter the network number and subnet mask
in /etc/netmasks file as 192.168.5.0 255.255.255.0.
d. Plumb the IP address by executing the following commands:
This example considers e1000g2 as the private interface and 255.255.255.0 as the netmask.
Verify that the peer IP addresses are on a private subnet to ensure that packets destined for
the management network are not transmitted through these interfaces.
3. Repeat Steps 1 and 2 to set up the secondary and any other redundant links between the Active and Standby
Netra systems. You can use any combination of dedicated hardwired links or non-dedicated links through a
hub/switch for the redundant network link(s).
It is necessary to perform some configuration on each Netra system and collect hardware configuration information
to be used later when you run the configureHA script. The configureHA script will configure the public network and
the multipath group.
The concept of IP Network Multipathing is used for the public network. This concept provides the system with
single-point of failure recovery. A “well-known address” is assigned to a multipath group, which consists of a primary
Prerequisite
If not already done, you must set up a management/reachability interface on both the active and standby systems,
and assign each an IP address (refer to the Sun documentation for proper setup procedures). This interface will be
used when a system is in the standby mode to send traps concerning its own operation. The Table Reachability
Interface and IP Address shows the recommended reachability interface and sample IP addresses to use, and
Figure Public Network Connections for Netra T5220 shows the connections. The reachability address must be on
the same subnet as the “well-known” address that will be chosen in "Getting Ready to Configure the Public
Network". Record the value of the reachability IP addresses, you will need these values when running the
configureHA script.
Requirements
The primary and secondary interfaces for the multipath group on a system must be on different cards.
The reachability address and the well-known address must be on the same subnet.
The well-known address must be on a different network than the private network links.
The test addresses must be on the same subnet as the well-known address.
The dummy address must be on the same subnet as the well-known address.
ICMP echo/reply to and from the default router (or hosts identified through static hosts routes) must be
allowed.
Procedure
The procedure below describes the prerequisite steps to be completed concerning the public network before running
the configureHA script.
1. You must choose the names of the two interfaces used to create the multipath group on each Netra system.
The Table Public Network Interfaces and IP Addresses shows the recommended interfaces to use; note that
the primary and secondary interfaces are on different cards, as required. Record the values, you will need
these values when running the configureHA script.
2. Log on as root.
3. In order to activate these two interfaces on each Netra system, you need to plumb each interface. This
process sets up the streams needed for IP to use the interface. Use the ifconfig command to perform this
task. For example, to plumb interface e1000g1and nxge0, use the following commands:
4. Establish one well-known address on the LAN for assignment to the multipath group for use by the clients.
You only need one well-known address for both Netras on the HA system. The Table Public Network
Interfaces and IP Addresses shows a sample well-known address to use; note that the well-known address is
on a different network than the private network, as required. Also note that the well-known address is on the
same subnet as the reachability address given in Table Reachability Interface and IP Address, as required.
Record the value Table 3 – 4, you will need it when running the configureHA script.
5. Assign a host-name (such as “EMSHA”) to this well-known address and make an entry in the appropriate
Solaris database on both Netras, for example in the /etc/hosts file or NIS or DNS. Record the value; you will
need it when running the configureHA script.
6. Sonus recommends that you establish two unique test addresses on each Netra system, one for the primary
LAN interface and one for the secondary. These test addresses must be on the same subnet as the
well-known address. These addresses are not for general use. The Table Public Network Interfaces and IP
Addresses, shows sample test addresses to use. Record the values; you will need these values when
running the configureHA script.
Because the active and standby test addresses are not plumbed simultaneously, you can, if you
wish, use the same test address on both systems.
7. Establish one “dummy” address as the back-up/secondary address used for the internal working for the
multipath group. This dummy address must be on the same subnet as the well-known address. This address
is not for general use. You only need one dummy address for both Netras on the HA system. The Table
Public Network Interfaces and IP Addresses, shows a sample well-known address to use. Record the value,
you will need it when running the configureHA script.
During configuration, if a prompt asks for the IP Address, enter the well-known address. If a prompt
asks for the host-name, enter the hostname corresponding to the well-known address. You should
not use the IP address or hostname of an individual Sun system in an HA set-up.
8. Install the cabling from the two interfaces to the appropriate hub/router. The Figure Public Network
Connections for Netra T5220, shows the connections.
Caution
Be sure that the steps in the procedure above are complete for each Netra system.
Test address example for primary interface for multipath group 10.6.9.80
Test address example for secondary interface for multipath group 10.6.9.81
Test address example for primary interface for multipath group 10.6.9.82
Test address example for secondary interface for multipath group 10.6.9.83
Perform the procedure on both the active and standby Netra T5220 servers.
Passwords
The emsMigrate.sh script used in the following procedure gives you the opportunity to use strong passwords,
which must then be entered and must meet a set of restrictions, or to use weak passwords, which are the current
passwords.
Procedure
Perform the following procedure on both the active and standby Netra T5220 servers connected to IBM DS 3524
RAID to import the data you earlier exported from the Netra 5220 connected with StorageTEK RAID:
This task need to be done on both the active and standby servers.
The files need to copied from respective backups, that is, active or standby.
For example, If this Netra T5220 is the active system, then from the active system backup directory you used
in Step "2" of "Exporting Data-DR Setup", copy the dmp files to the /export/home/oracle/backup/dump
directory on the Netra T5220. Also copy the backupFiles.tar file to the /tmp directory on the Netra
T5220.
If the dmp files are copied to /export/home/oracle/backup/dump using an unconventional method,
such as FTP, change the owner and group of the files to Oracle and DBA.
To change the owner and group of files to Oracle and DBA, enter the following commands.
If migrating from pre-9.2.0 then use the following dmp file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba exp_data_manual.dmp exp_strct_manual.dmp
or
If migrating from 9.2.0 then use the following dmp file names:
# cd /export/home/oracle/backup/dump
# chown oracle:dba expdp_data_manual.dmp
expdp_strct_manual.dmp
CAUTION
You must copy files from the backup directory that you used for this EMS server. If you use a
backup directory that contains files from another EMS server, Insight will not behave properly.
# cd /export/home/ems/conf/jumpstart
# ./emsMigrate.sh
#######################################################################
You are going to migrate a previous EMS onto this system. Please
make sure you understand what you are doing. Before you proceed,
you should also have already run manualBackup.sh on the system you
want to migrate from, which generated backupFiles.tar, exp_data_manual.dmp,
and exp_strct_manual.dmp.
If you are migrating from Solaris to Linux then you should have
NetcoolBackupFiles.tar.
5. Enter y to continue.
The following message appears
6. The script asks for the full path to the backup tar file. Answer /tmp and press Enter.
The following message appears:
7. Enter y to import.
The following message appears:
########################################################################################
Starting importing and upgrading Insight Oracle Database Instance SIDB as user
oracle.
########################################################################################
stty: : Invalid argument
: : Invalid argument
stty: : Invalid argument
..............................................................................................
Disconnected from Oracle Database 11g Enterprise Edition Release 11.2.0.3.0 -
64bit Production
With the Partitioning, OLAP, Data Mining and Real Application Testing options
Modifying /export/home/jboss/server/insight/deploy/jbossweb.sar/server.xml
Done
Completed changing protocol to http. Please restart Sonus Insight.
If you have any IAS registered with the system, then execute the same
procedure on each IAS also by following the procedures provided in the
Insight User Guide.
The Sonus Insight migration is complete.
You only need to follow the procedures in this section when installing Insight (HA) architecture.
Prerequisites
When running the configureHA script on the active and standby Insight systems, the script prompts you for
system information. The table System Information Worksheet lists the information you will need, and the procedures
in which these values were assigned. You can enter your values into the table and use it as a reference when you
run configureHA.
Performed the first five items in High-level Tasks for Migrating From Storage Tek RAID to IBM RAID on
T5220-DR Setup.
Reset the insight user password. See Changing the "insight" User Password and/or Password Expiration
Behavior . The active and standby systems must use the same insight user password.
Active First peer private IPv4/IPv6 address Private Network Deployment for
Migration-DR Setup
Second peer private IPv4/IPv6 address
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
The fully-qualified path where the orasql directory was To determine the path, login as user ora
created. This is the base directory for oracle, and is most cle and enter the env command. The O
likely: /export/home/oracle RACLE_BASE value displays the path.
The configureHA script configures HA in each Netra system for the first time. The script provides a HA
configuration main menu from which you can choose to configure an active or standby Insight system and perform
other HA configuration operations. The configureHA script collects user information and writes it to the
haConfiguration file in the /export/home/ems/conf/HA directory.
You must run the configureHA script on both the active and standby Insight systems.
The following procedure describes how to run configureHA on the active system.
The approximate timeline required to run the configureHA script on the active system is 30 minutes.
a. If the Insight database is running, a list of active oracle processes will be displayed and go to Step 3.
b. If the Insight database is not running, no oracle processes will be displayed. Start the Insight database
by entering the following command and go to Step 3.
$ sqlplus /nolog
SQL> conn /as sysdba
SQL> startup
SQL> exit
If necessary replace the c2t2d0s6 in the command line with the designator for your disk. This was established
in the section Performing Netra T5220 Disk Labeling and File System Creation for the RAID Disk Array for
Migration-DR Setup.
4.
# cd /export/home/ems/conf/HA
# ./configureHA
Insight will be stopped now. Do you want to proceed? (default: yes) [y,n]
Press Enter to accept the default. The system then displays the following message:
The steps 8 to 11 are optional and must be executed only if you have an OAM IP address to be
configured. If you do not want to configure an OAM IP address skip steps 8 to 11 and execute the
steps from step 12 onwards.
Type 2 and press Enter to enter the OAM IP addresses. In OAM IP configuration, the OAM IP address uses
PSX proxy mode.
OAM stands for Operations And Management. OAM IP address is used by the users to access all
EMS northbound interfaces like GUI, CLI, and API. A user can have two different networks for OAM
and signaling. In this scenario, EMS can act as a proxy for PSX to enable the PSX manager GUI to
talk to PSX. In a standalone EMS deployment with two different networks for OAM and signalling,
the PSX manager GUI connects to the EMS through the EMS OAM IP address, if PSX proxy mode
is enabled. In case of an EMS HA deployment with PSX proxy mode enabled and the user has two
different networks for OAM and signaling, the active EMS and standby EMS have their own
respective OAM IP addresses. In that case, the PSX manager GUI will use the appropriate OAM IP
of the current active server.
The OAM IP address is used by PSX to communicate with PSX GUI and EMS acts as a proxy for
PSX.
The section will collect information for creating the "Public" IP Multipathing
interface.
Which interface will be the primary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
Type the name of the primary interface for the multipath group, and press Enter.
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
Which interface will be the secondary? [e1000g0 e1000g1 e1000g2 nxge0 nxeg1]
a. Type the name of the secondary interface for the multipath group and press Enter.
You would have configured the name of the primary interface for the multipath group while
configuring Public Network Setup.
The system would not display the primary interface that have configured in previous step as
an option.
What is the test IPV4 address for the primary LAN interface (default:
10.54.5.32) : 10.54.5.32
What is the test IPV6 address for the primary LAN interface :
The configureHA script provides the user to configure the HA in IPv4 or IPv6.
If you want to configure an IPv6 HA Setup, please leave all the IPv4 addresses blank.
If you want to configure an IPv4 HA setup, please follow the following steps:
What is the test IPV4 address for the primary LAN interface : 10.54.5.32
What is the test IPV6 address for the primary LAN interface :
INVALID IPv6 address format.
Do you want to stop entering this IP address? (default: no) [y,n] y
Type the IP test address for the primary interface for the multipath group, and press Enter.
You would have established the primary interface for the multipath group in Public Network Setup.
What is the test IPV4 address for the secondary LAN interface : 10.54.5.33
What is the test IPV6 address for the secondary LAN interface :
Type the IP test address for the secondary interface for the multipath group, and press Enter.
You would have established the secondary interface for the multipath group in Public Network
Setup.
What is the "dummy" IPV4 address for the secondary interface : 10.54.5.38
What is the "dummy" IPV6 address for the secondary interface :
Type the dummy address, which you established in Public Network Setup and press Enter.
22. The system displays the following:
Type the reachability address for this system, which you established in Public Network Setup and press
Enter.
23. The system displays the values you entered. The following is an example based on the values given for the
active Netra T5220 system in Public Network Setup.
Please provide the IP Address of the Peer system for Keep Alives.
You can provide up to 4 such addresses.
Peer Keep Alive IP Address 1 (RETURN to stop):
Peer Keep Alive IP Address 2 (RETURN to stop):
Sonus recommends providing at least two peer private IP addresses for redundancy purposes. Enter the peer
private IP addresses, which you established in Private Network Setup, and press Enter.
26. The system displays the following:
Please provide the IPv4 reachability Address of the Peer system for Keep
Alives.
Please provide the IPv6 reachability Address of the Peer system for Keep
Alives
What is the peer's IPv4 reachability address?
Type the reachability address for the other Insight system, which you established in Public Network Setup
and press Enter.
28. The system displays the following:
You entered:
Peer Keep Alive IP Address 1: 172.16.5.2
Peer Keep Alive IP Address 2: 172.16.6.2
Peer Keep Alive IP Address 3:
Peer Keep Alive IP Address 4:
Peer's Reachability IP Address: 10.54.5.35
You entered...
User Name: "oracle"
Group Name: "dba"
Are the values correct (default:N) [y|Y,n|N] ?
Enter the RAID’s mount point, which you established in Performing Netra T5220 Disk Labeling and File
System Creation for the RAID Disk Array for Migration-DR Setup and press Enter.
33. The system displays the following:
Enter the RAID’s device name, which you established in the section Performing Netra T5220 Disk Labeling
and File System Creation for the RAID Disk Array for Migration-DR Setup and press Enter.
34. The system displays the following:
The “raw” device name is the same as the device name with the addition of “r” to “dsk” (e.g.
/dev/rdsk/c2t2d0s6).
Enter the well-known IP address, which you established in Public Network Setup, and press Enter.
36. The system displays the following:
You must decide whether to move the active system database or standby system database to the RAID disk
array. If you choose item 1 for the active system, you must choose item 2 when running the configureHA
procedure on the standby system. You cannot choose the same operation for both systems.
If necessary, you can enter q to return to the main menu.
Press Enter after making your selection.
38. If you chose 1 above, the system displays the following prompt:
Enter the base directory for Oracle and press Enter. For example:
/export/home/oracle
The system then displays a number of status messages that the configureHA script uses to make the
database. The script will backup the database, create a new database and import the backup data into the
new database. The script also turns on archive log and schedules cron jobs for daily backups and cleanup.
mkdir /export/raid/orasql
chown oracle:dba /export/raid/orasql
chmod 775 /export/raid/orasql
39. The system displays the High Availability Configuration Main Menu:
Type 6 and press Enter.
40. The system displays the following:
Testing scp
Please enter the root password of the peer:
42. Enter the root password of the peer and press enter.
Check the interfaces on the peer server if the following message appears:
43. The system displays the High Availability Configuration Main Menu.
Type 9 and press Enter to change the IP address of system A.
44. The system displays the following:
This step will change the IP Address on your system. Do you want to proceed
with this step? (default: yes) [y,n]
Do you want to notify all registered IAS systems of this new IP address?
(default: no) [y,n]
If there are IASs that were registered to this system and that should be registered to the HA system, type y
and press Enter. Otherwise type n and press Enter.
47.
# cd /export/home/ems/conf/HA
# vi haConfiguration
The e-mail notification is received only if you configure mailx on both the Active and Standby
servers. For information on configuring mailx, see Enabling Mailx-HA Solaris.
50. Perform the steps in Running the haMigrationFiles.sh for running the haMigrationFiles.sh file.
51. After you run the configureHA script, you must release resources so that they are available for the
configuration of other Netra systems. Type the following command:
# /export/home/ems/conf/HA/haResources release
52. After you run the configureHA script on active and standby systems, go to Starting and Stopping the Insight
Database.
The procedure for running the configureHA script on a standby system is similar to the procedure for an active
system, but both the Insight process and database instance should be stopped. Use the procedure detailed in "
Configuring HA on Active System for Migration" with the following differences:
respond with an s instead of accepting the default value. The system then displays the following message:
You must choose a different operation than you chose for the active system. If you chose item 1 for the
active system, you must choose item 2 for the standby system. Press Enter after making your selection.
The system then displays several status messages.
After you run the configureHA scripts on both systems, perform the following tasks:
1. Verify that the interfaces and routing table are configured correctly. For more information, refer Checking
Interface Configuration and Routing Table for Netra 5220.
2. Enable Multipath for IBM RAIDs. For more details, refer MPXIO from T5220 to IBM DS3524 Disk Arrays for
DR Setup.
3. First start Insight on the active system and then on the standby system. For more information, see Starting
and Stopping the Insight Database.
4. Register or update the registration of each Insight device. For more information, refer the User Guide.
Example Details
In the example output given in the following procedure, the following assumptions are made:
Procedure
Use the following steps to verify the interface configuration and routing table on each server that is part of an HA
setup.
ifconfig -a
netstat -rn
If you are migrating from pre-9.0.0 Release or from 9.2.0 release to 9.3.0 then you must first import the
migration files to 9.2.0 and then upgrade from 9.2.0 to 9.3.0.
If you are migrating from 9.2.1 release to 9.3.0 then you must first upgrade to 9.3.0 and then import the
migration files to 9.3.0 release.
The Insight EMS has certain ports which are opened publicly. Most of them are RPC related processes, which are
no longer used in remote agent. For security reasons, these ports are closed from Release V09.02.00 onwards.
Using the configureRPC.sh script you can enable, disable, or see the status of RPC processes. From
release V09.02.00 onwards, the RPC processes will be disabled in case of fresh installation of EMS and IAS and
when EMS is upgraded from a previous versions to V09.02.00 or above. However, if you are upgrading from
Release V09.02.00 to a release higher than V09.02.00 then the previous state of RPC processes will be retained.
Only EMS uses the SystemConfig.txt file. The IAS does not use SystemConfig.txt file.
To enable, disable or for checking the current state of RPC processes on EMS Standalone Server, refer the
following sections:
#cd <BASEDIR>/conf/security
#./configureRPC.sh start
starting the RPC
Starting rpcbind:
#cd <BASEDIR>/conf/security
#./configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
To check for the status of RPC processes, execute the following steps:
#cd <BASEDIR>/conf/security
2. Check the status of RPC processes, by executing the ./configureRPC.sh status command:
#./configureRPC.sh status
rpcbind (pid 11990) is running...
To enable, disable or for checking the current state of RPC processes on EMS High Availability (HA) Active and
Standby System, refer the following sections:
To enable RPC process on EMS server, execute the following steps on both active and standby systems:
#cd <BASEDIR>/conf/security
2. Enable the RPC processes, by executing the ./configureRPC.sh start command on both active and
standby systems:
#./configureRPC.sh start
starting the RPC
Starting rpcbind:
To disable RPC process on EMS server, execute the following steps on both active and standby systems:
#cd <BASEDIR>/conf/security
2. Disable the RPC processes, by executing the ./configureRPC.sh stop command on active and
standby systems:
#./configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
To check for the status of RPC processes, execute the following steps on both active and standby systems:
#cd <BASEDIR>/conf/security
2. Check the status of RPC processes, by executing the ./configureRPC.sh status command on active
and standby systems:
#./configureRPC.sh status
rpcbind (pid 11990) is running...
#cd <BASEDIR>/bin
#./configureRPC.sh start
starting the RPC
Starting rpcbind:
#./configureRPC.sh stop
Stopping the RPC
Stopping rpcbind:
To check for the status of RPC processes, execute the following steps:
#cd <BASEDIR>/bin
2. Check the status of RPC processes, by executing the ./configureRPC.sh status command:
#./configureRPC.sh status
rpcbind (pid 11990) is running...
The upgradeDM.sh script helps with automatic installation of DM package across all involved EMS hosts (four
hosts if HA-DR, two hosts if HA or DR, one host if SA EMS). Use this script for either a first time installation of a DM
package on the EMS server, or for the upgrade of an already installed DM package to a newer version.
If an HA-DR setup, then you will be prompted twice for root password of DR target hosts, one prompt for each host.
Enter root password when prompted by the script.
This procedure involves EMS downtime, EMS server will not be available for the duration of the procedure.
Prerequisites
The prerequisites for performing a Device Manager (DM) upgrade are as follows. Ensure that all the prerequisites
are completed, before performing a DM Upgrade.
1. SSH login should be enabled for root user to all involved EMS hosts.
2. EMS server on all hosts should be up and running.
3. If Solaris HA EMS, then HA actual/configured states should be either ACTIVE/ACTIVE or ACTIVE/STANDBY
or STANDBY/ACTIVE.
4. If a Solaris DR setup with HA-SA configuration with SA EMS being source, you would need to switchover first
to the HA site before running the DM upgrade script.
5. You can optionally manually download and place the DM package beforehand on all the involved EMS hosts.
This will speed up DM upgrade script execution somewhat as it does not need to transfer the tar.gz file (~
1GB for PSX) to all the involved hosts. See step 2 below for the directory where the tar.gz file needs to be
placed.
6. It is recommended that EMS server manual backup be performed before the start of this procedure.
Procedure
To upgrade a Device Manager (DM), execute the following steps:
# /export/home/ems/conf/upgradeDM.sh -f
/export/home/<dm-tar.gz-filename>
For reference, refer the command output of executing the DM upgrade script for a Solaris HA
DR Setup.
Sample output:
===============
[emsnetra49 16:53:24] Detecting local EMS setup type... [Solaris HA DR]
This will install DM package EMS9.1.0-PSX9.1.2-DM1.0.0-solaris.pkg.tar.gz
on all involved Sonus Insight EMS hosts.
Do you want to continue? [y|n]: y
[emsnetra49 16:53:26] Performing DM upgrade on Solaris HA EMS DR setup
[emsnetra49 16:53:26] Preparing remote site 10.6.20.81
[emsnetra49 16:53:26] SSH should already be setup to HA peer 10.6.20.81