Overview | Prepare CommCell | Firewall Using Proxy | Firewall Without Proxy | Create Installation Package | Web Access |
The Installation Package will be used to install the backup client on a laptop. It will enable the automatic backup of the data residing on the laptop.
The following section describes the steps to create a custom install package.
1. | Logon to the client computer as root. | |||
2. | Run the following command from the Software
Installation Package: ./cvpkgadd |
|||
3. | The product banner and other information is displayed. Press Enter. |
|||
4. | Read the license agreement. Type y and press Enter. | |||
5. | Type 2 to select Advanced options. | Please select a setup
task you want to perform from the list below: Advanced options provide extra setup features such as creating custom package, recording/replaying user selections and installing External Data Connector software. 1) Install data protection agents on this computer 2) Advanced options 3) Exit this menu Your choice: [1] |
||
6. | Press Enter. | Please select a setup
task you want to perform from the list below:
[ Custom Package Creator ] 1) Create a custom install package [ De-coupled Installer ] 2) Pre-install software Components (De-coupled Mode) [ Integrated File Archiver ] 3) File System iDataAgent with Archiving Enabler [ Customized Cluster Agents ] 4) Veritas Cluster Agents [ Third Party Connector ] 5) Symantec NetBackup Agent 6) NetApp Snap Manager for Oracle 7) NetApp Snap Manager for SAP/Oracle 8) IBM Tivoli Storage Manager [ Done ] 9) Exit this menu Your choice: [1] |
||
7. | Press Enter. | Besides general package,
you may choose to create one additional native package from the list below. 1) General package only 2) Please also create RPM 3) Please also create solaris native package 4) Please also create hpux native package 5) Please also create Mac package using PackageMaker 6) Please also create APT 7) Exit Package Type Number [1] |
||
8. | Type the number to choose a platform.
To select multiple component, enter the number by adding a space. |
Please choose one or
more platforms to package from the list below.
[ ] 1) Linux X86 [a=all n=none r=reverse q=quit d=done
>=next <=previous ?=help] |
||
9. | A confirmation screen will mark your choice with an "X". Type "d" for Done, and press Enter. |
Please choose one or
more platforms to package from the list below.
[X] 1) Linux X86 [a=all n=none r=reverse q=quit d=done
>=next <=previous ?=help] |
||
10. | Type 1 to select Unix File System iDataAgent and press Enter. | Please choose one or
more subsystems to package from the list below.
[ ] 1) UNIX File System iDataAgent
[1101] [CVGxIDA] [a=all n=none r=reverse q=quit d=done
>=next <=previous ?=help] |
||
11. | A confirmation screen will mark your choice with an "X". Type "d" for Done, and press Enter. |
Please choose one or
more subsystems to package from the list below.
[X] 1) UNIX File System iDataAgent
[1101] [CVGxIDA] [a=all n=none r=reverse q=quit d=done
>=next <=previous ?=help] |
||
12. | Press Enter. The custom package will be created in the following location: /opt/UnixCustomPackage/. |
Save custom package to: [/opt] | ||
13. | Type Yes and press Enter. | Optionally, you may choose
to record install to an xml parameter file now so that you can play it later. The recorded xml will be encapsulated into the custom package and can be used as an answer file in two ways:
(1) from the custom package run "silent_install
-p default"; You can still perform the above two
tasks without custom recording if you Do you want to record the install now? [no] yes |
||
14. | Type 1 to select Unix File System iDataAgent and press Enter. | Please choose one or
more subsystems to package from the list below.
[ ] 1) UNIX File System iDataAgent
[1101] [CVGxIDA] [a=all n=none r=reverse q=quit d=done
>=next <=previous ?=help] |
||
15. | A confirmation screen will mark your choice with an "X". Type "d" for Done, and press Enter. |
Please choose one or
more subsystems to package from the list below.
[X] 1) UNIX File System iDataAgent
[1101] [CVGxIDA] [a=all n=none r=reverse q=quit d=done
>=next <=previous ?=help] |
||
16. | Type Yes and press Enter to enable laptop
backup features.
|
Do you want to configure the iDataAgent for laptop or desktop backups? [no] yes | ||
17. | Press Enter. | Do you want to use the agents for restore only without consuming licenses? [no] | ||
18. | Type the path for installation directory and press Enter. | Please specify where
you want us to install Calypso binaries.
It must be a local directory and there should be at least 176MB of free space available. All files will be installed in a "calypso" subdirectory, so if you enter "/opt", the files will actually be placed into "/opt/calypso". Installation Directory: |
||
19. | Type the path for log directory and press Enter. | Please specify where
you want to keep Calypso log files.
It must be a local directory and there should be at least 100MB of free space available. All log files will be created in a "calypso/Log_Files" subdirectory, so if you enter "/var/log", the logs will actually be placed into "/var/log/calypso/Log_Files". Log Directory: |
||
20. | Type Yes and then press Enter. | Most of Calypso
processes run with root privileges, but some are launched by databases and
inherit database access rights. To make sure that registry and log files
can be written to by both kinds of processes we can either make such files
world-writeable or we can grant write access only to processes belonging
to a particular group, e.g. a "calypso" or a "dba"
group.
We highly recommend now that you create a new user group and enter its name in the next setup screen. If you choose not to assign a dedicated group to Calypso processes, all temporary and configuration files will be created with -rw-rw-rw permissions. If you're planning to backup Oracle DB you should use "dba" group. Would you like to assign a specific group to Calypso? |
||
21. | Press Enter to assign user group.
|
Most of Calypso
processes run with root privileges, but some are launched by databases and
inherit database access rights. To make sure that registry and log files
can be written to by both kinds of processes we can either make such files
world-writeable or we can grant write access only to processes belonging
to a particular group, e.g. a "Calypso" or a "dba" group. We highly recommend now that you create a new user group and enter its name in the next setup screen. If you choose not to assign a dedicated group to Calypso processes, you will need to specify the access permissions later. If you're planning to backup Oracle DB you should use "dba" group. Would you like to assign a specific group to Calypso? [yes] |
||
22. | If you indicated Yes in above step, type the Group name and then press Enter. | Please enter the name
of the group which will be assigned to all Software files and on behalf
of which all Software processes will run.
In most of the cases it's a good idea to create a dedicated "calypso" group. However, if you're planning to use Oracle iDataAgent or SAP Agent, you should enter Oracle's "dba" group here. Group name: galaxy REMINDER If you are planning to install Calypso Informix, DB2, PostgreSQL, Sybase or Lotus Notes iDataAgent, please make sure to include Informix, DB2, etc. users into group "dba". |
||
23. | If you enter no in step 21, you will be prompted
to assign permissions for other users.
|
Access Permissions for
Other Users Installer will assign full access rights to root user and its belonging group for all installed Software files and its processes. For any other users, you can specify the access permissions now. However, since you chose not to assign a dedicated group in previous step, make sure you specify sufficient access rights for other users if you are also planning to install Software agents involving third party software protection. [X] 1) Allow read permission to other
users |
||
24. | Type a network TCP port number for the Communications Service
(CVD) and press Enter. Type a network TCP port number for the Client Event Manager Service (EvMgrC) and press Enter. |
Every instance of Calypso
should use a unique set of network ports to avoid interfering with other
instances running on the same machine. The port numbers selected must be from the reserved port number range and have not been registered by another application on this machine. Please enter the port numbers. Port Number for CVD: Port Number for EvMgrC: |
||
25. | Type Yes and then press Enter. | Is there a firewall between this client and the CommServe? | ||
|
||||
Configure Firewall with Proxy |
||||
26. | Type 3 to select CommServe is reachable only
through a proxy. Press Enter. |
Please specify now how
your firewall is limiting network traffic. Whether it's possible to open
connection from here to a CommServe's tunnel port, whether all connections
toward CommServe are blocked, and we should instead expect CommServe to
connect back to us, or whether there is a proxy in between. 1) This machine can open connection to CommServe on a tunnel port 2) CommServe can open connections toward us 3) Commserve is reachable only through a proxy Your choice: [1] |
||
27. | Type CommServe Client Name and press Enter. | Please specify client
name of the CommServe below. CommServe Client Name: |
||
28. | Enter the following information:
|
Proxy Connection Setup Please specify the name of IP address of the proxy that should be used to reach the CommServe along with the port number, on which the proxy is expecting connections. Proxy hostname or IP address: Proxy short name: Proxy HTTP/HTTPS tunnel port number: |
||
|
||||
Configure Firewall Without Proxy |
||||
29. | Type 1 to select This machine can open connection to CommServe on tunnel port and press Enter. |
Please specify now how your firewall is
limiting network traffic. Whether it's possible to open connection from here to
a CommServe's tunnel port, whether all connections toward CommServe are blocked,
and we should instead expect CommServe to connect back to us, or whether there
is a proxy in between. 1) This machine can open connection to CommServe on a tunnel port 2) CommServe can open connections toward us 3) CommServe is reachable only through a proxy Your choice: [1] |
||
30. | Enter the name of the CommServe computer in place of
CommServe Client Name. Press Enter. |
Please specify client
name of the CommServe below. CommServe Client Name: |
||
31. | Enter the fully qualified name or the IP address of the
CommServe in the CommServe Host Name. This should be TCP/IP network
name. e.g., computer.company.com. Press Enter.
|
Please specify hostname of the CommServe below. Make sure the hostname is fully qualified, resolvable by the name services configured on this machine. If there is a port-forwarding Gateway in front of the CommServe, enter hostname or IP address of the Gateway here. | ||
32. | Type the incoming port number through which the CommServe
computer receives tunnel connection. Press Enter.
|
Please specify the port number, on which
we should open tunnel connections toward the CommServe. This is same as "Tunnel
HTTP/HTTPS port" configurable in the "Incoming Ports" tab of the CommServe
Firewall Properties adjusted for a possible port-mapping Gateway in front of it. CommServe HTTP/HTTPS tunnel port number: 8500 |
||
33. |
|
If there is an HTTP proxy
between this client and the CommServe (e.g. Squid or Apache), please provide
HTTP Proxy configuration below. Is there an HTTP proxy between this client and the CommServe? [no] |
||
34. | If the CommCell is in the Lockdown mode, enter Yes
and provide the path to the folder in the which the CommCell HTTPS certificate
are available.
Press Enter. |
If you have checked "Lockdown
CommCell" in firewall properties of the CommServe or Proxy, you need to
provide path to the directory with CommCell HTTPS certificate below. This certificate can be obtained by right-clicking CommServe name in the Java GUI, and selecting All Tasks -> Export Firewall Certificate popup menu item. Have you enabled "Lockdown CommCell"? [no] |
||
Configuration of Other Installation Options |
||||
35. | Type the Laptop Backup as a client group and then
press Enter.
|
Please enter one Client
Computer Group name for this client to join. Client Computer Group Name: |
||
36. | Type Yes and press Enter. | Do you want to configure subclient policy? [no] yes | ||
37. | Type the subclient policy created in step 21 during Create Subclient Policy. | Please enter a subclient
policy name for this IDA. Subclient Policy Name: |
||
38. | Press Enter. | Please select which instance
you want to install/replay for this recording:
1) Always install to Instance001 |
||
39. | Enter Yes to create the tar file of Custom Package. | Archiving the custom
package in a tar file (Optional)
Optionally, you may choose to tar the package now. Do you want to create the tar file now? [no] yes |
||
40. | You are advised that the UnixCustomPackage.tar file is created. | Creating /opt/UnixCustomPackage.tar ...Done. | ||
41. | The UnixCustomPackage.tar is created in the path
which you provided in step 18.You can now provide this package to Laptop Users. |
Done [ Custom Package Summary ] - General package created at /opt/UnixCustomPackage/pkg - Tar package created at /opt/UnixCustomPackage/tar: custom_pkg.tar Thank you for choosing Bull. |