Create Installation Package - Laptop Backup

Overview Prepare CommCell Firewall Using Proxy Firewall Without Proxy Create Installation Package Web Access

The Installation Package will be used to install the backup client on a laptop. It will enable the automatic backup of the data residing on the laptop.

The following section describes the steps to create a custom install package.

1. Logon to the client computer as root.  
2. Run the following command from the Software Installation Package:

./cvpkgadd

 
3. The product banner and other information is displayed.

Press Enter.

 
4. Read the license agreement. Type y and press Enter.  
5. Type 2 to select Advanced options. Please select a setup task you want to perform from the list below:

Advanced options provide extra setup features such as creating custom package, recording/replaying user selections and installing External Data Connector software.

1) Install data protection agents on this computer

2) Advanced options

3) Exit this menu

Your choice: [1]

6. Press Enter. Please select a setup task you want to perform from the list below:

[ Custom Package Creator ]

1) Create a custom install package

[ De-coupled Installer ]

2) Pre-install software Components (De-coupled Mode)

[ Integrated File Archiver ]

3) File System iDataAgent with Archiving Enabler

[ Customized Cluster Agents ]

4) Veritas Cluster Agents

[ Third Party Connector ]

5) Symantec NetBackup Agent

6) NetApp Snap Manager for Oracle

7) NetApp Snap Manager for SAP/Oracle

8) IBM Tivoli Storage Manager

[ Done ]

9) Exit this menu

Your choice: [1]

7. Press Enter. Besides general package, you may choose to create one additional native package from the list below.

1) General package only

2) Please also create RPM

3) Please also create solaris native package

4) Please also create hpux native package

5) Please also create Mac package using PackageMaker

6) Please also create APT

7) Exit

Package Type Number [1]

8. Type the number to choose a platform.
  • 1 for 32-bit
  • 2 for 64-bit

To select multiple component, enter the number by adding a space.

Please choose one or more platforms to package from the list below.

[ ] 1) Linux X86
[ ] 2) Linux X86_64
[ ] 3) Linux IA64
[ ] 4) Linux PPC64
[ ] 5) Linux S390
[ ] 6) Solaris8/9 SPARC
[ ] 7) Solaris10 SPARC
[ ] 8) Solaris10 X86_64
[ ] 9) Aix PPC
[ ] 10) HP-UX PA-RISC
[ ] 11) HP-UX IA64
[ ] 12) Darwin X86
[ ] 13) FreeBSD4 X86
>) >>>>>>>>>>>> NEXT PAGE >>>>>>>>>>>>

[a=all n=none r=reverse q=quit d=done >=next <=previous ?=help]
Enter number(s)/one of "a,n,r,q,d,>,<,?" here: 1 2

9. A confirmation screen will mark your choice with an "X".

Type "d" for Done, and press Enter.

Please choose one or more platforms to package from the list below.

[X] 1) Linux X86
[X] 2) Linux X86_64
[ ] 3) Linux IA64
[ ] 4) Linux PPC64
[ ] 5) Linux S390
[ ] 6) Solaris8/9 SPARC
[ ] 7) Solaris10 SPARC
[ ] 8) Solaris10 X86_64
[ ] 9) Aix PPC
[ ] 10) HP-UX PA-RISC
[ ] 11) HP-UX IA64
[ ] 12) Darwin X86
[ ] 13) FreeBSD4 X86
>) >>>>>>>>>>>> NEXT PAGE >>>>>>>>>>>>

[a=all n=none r=reverse q=quit d=done >=next <=previous ?=help]
Enter number(s)/one of "a,n,r,q,d,>,<,?" here: d

10. Type 1 to select Unix File System iDataAgent and press Enter. Please choose one or more subsystems to package from the list below.

[ ] 1) UNIX File System iDataAgent [1101] [CVGxIDA]
[ ] 2) MediaAgent [1301] [CVGxMA]
[ ] 3) SCSI Driver [1105] [CVGxWA]
[ ] 4) ProxyHost iDataAgent [1102] [CVGxProxyIDA]
[ ] 5) Documentum iDataAgent [1126] [CVGxDctmIDA]
[ ] 6) Oracle iDataAgent [1204] [CVGxOrIDA]
[ ] 7) SAP for Oracle [1205] [CVGxOrSAP]
[ ] 8) SAP for MaxDB [1206] [CVGxSAPMAXDB]
[ ] 9) Informix iDataAgent [1201] [CVGxIfIDA]
[ ] 10) Sybase iDataAgent [1202] [CVGxSybIDA]
[ ] 11) DB2 iDataAgent [1207] [CVGxDB2]
[ ] 12) MySQL iDataAgent [1208] [CVGxMySQL]
[ ] 13) PostGres iDataAgent [1209] [CVGxPostGres]
>) >>>>>>>>>>>> NEXT PAGE >>>>>>>>>>>>

[a=all n=none r=reverse q=quit d=done >=next <=previous ?=help]
Enter number(s)/one of "a,n,r,q,d,>,<,?" here: 1

11. A confirmation screen will mark your choice with an "X".

Type "d" for Done, and press Enter.

Please choose one or more subsystems to package from the list below.

[X] 1) UNIX File System iDataAgent [1101] [CVGxIDA]
[ ] 2) MediaAgent [1301] [CVGxMA]
[ ] 3) SCSI Driver [1105] [CVGxWA]
[ ] 4) ProxyHost iDataAgent [1102] [CVGxProxyIDA]
[ ] 5) Documentum iDataAgent [1126] [CVGxDctmIDA]
[ ] 6) Oracle iDataAgent [1204] [CVGxOrIDA]
[ ] 7) SAP for Oracle [1205] [CVGxOrSAP]
[ ] 8) SAP for MaxDB [1206] [CVGxSAPMAXDB]
[ ] 9) Informix iDataAgent [1201] [CVGxIfIDA]
[ ] 10) Sybase iDataAgent [1202] [CVGxSybIDA]
[ ] 11) DB2 iDataAgent [1207] [CVGxDB2]
[ ] 12) MySQL iDataAgent [1208] [CVGxMySQL]
[ ] 13) PostGres iDataAgent [1209] [CVGxPostGres]
>) >>>>>>>>>>>> NEXT PAGE >>>>>>>>>>>>

[a=all n=none r=reverse q=quit d=done >=next <=previous ?=help]
Enter number(s)/one of "a,n,r,q,d,>,<,?" here: 1

12. Press Enter.

The custom package will be created in the following location:

/opt/UnixCustomPackage/.

Save custom package to: [/opt]
13. Type Yes and press Enter. Optionally, you may choose to record install to an xml parameter file now so
that you can play it later. The recorded xml will be encapsulated into the
custom package and can be used as an answer file in two ways:

(1) from the custom package run "silent_install -p default";
(2) from the native package run native installer(rpm/pkgadd/swinstall...)

You can still perform the above two tasks without custom recording if you
choose to use all default parameters.

Do you want to record the install now? [no] yes

14. Type 1 to select Unix File System iDataAgent and press Enter. Please choose one or more subsystems to package from the list below.

[ ] 1) UNIX File System iDataAgent [1101] [CVGxIDA]
[ ] 2) MediaAgent [1301] [CVGxMA]
[ ] 3) SCSI Driver [1105] [CVGxWA]
[ ] 4) ProxyHost iDataAgent [1102] [CVGxProxyIDA]
[ ] 5) Documentum iDataAgent [1126] [CVGxDctmIDA]
[ ] 6) Oracle iDataAgent [1204] [CVGxOrIDA]
[ ] 7) SAP for Oracle [1205] [CVGxOrSAP]
[ ] 8) SAP for MaxDB [1206] [CVGxSAPMAXDB]
[ ] 9) Informix iDataAgent [1201] [CVGxIfIDA]
[ ] 10) Sybase iDataAgent [1202] [CVGxSybIDA]
[ ] 11) DB2 iDataAgent [1207] [CVGxDB2]
[ ] 12) MySQL iDataAgent [1208] [CVGxMySQL]
[ ] 13) PostGres iDataAgent [1209] [CVGxPostGres]
>) >>>>>>>>>>>> NEXT PAGE >>>>>>>>>>>>

[a=all n=none r=reverse q=quit d=done >=next <=previous ?=help]
Enter number(s)/one of "a,n,r,q,d,>,<,?" here: 1

15. A confirmation screen will mark your choice with an "X".

Type "d" for Done, and press Enter.

Please choose one or more subsystems to package from the list below.

[X] 1) UNIX File System iDataAgent [1101] [CVGxIDA]
[ ] 2) MediaAgent [1301] [CVGxMA]
[ ] 3) SCSI Driver [1105] [CVGxWA]
[ ] 4) ProxyHost iDataAgent [1102] [CVGxProxyIDA]
[ ] 5) Documentum iDataAgent [1126] [CVGxDctmIDA]
[ ] 6) Oracle iDataAgent [1204] [CVGxOrIDA]
[ ] 7) SAP for Oracle [1205] [CVGxOrSAP]
[ ] 8) SAP for MaxDB [1206] [CVGxSAPMAXDB]
[ ] 9) Informix iDataAgent [1201] [CVGxIfIDA]
[ ] 10) Sybase iDataAgent [1202] [CVGxSybIDA]
[ ] 11) DB2 iDataAgent [1207] [CVGxDB2]
[ ] 12) MySQL iDataAgent [1208] [CVGxMySQL]
[ ] 13) PostGres iDataAgent [1209] [CVGxPostGres]
>) >>>>>>>>>>>> NEXT PAGE >>>>>>>>>>>>

[a=all n=none r=reverse q=quit d=done >=next <=previous ?=help]
Enter number(s)/one of "a,n,r,q,d,>,<,?" here: 1

16. Type Yes and press Enter to enable laptop backup features.
  The following Laptop Backup features are enabled:
  • Automatic Ownership
  • Automatic Scheduling
  • Backup Monitor Tool

For more information, refer to FAQs.

Do you want to configure the iDataAgent for laptop or desktop backups? [no] yes
17. Press Enter. Do you want to use the agents for restore only without consuming licenses? [no]
18. Type the path for installation directory and press Enter. Please specify where you want us to install Calypso binaries.

It must be a local directory and there should be at least 176MB of free space available. All files will be installed in a "calypso" subdirectory, so if you enter "/opt", the files will actually be placed into "/opt/calypso".

Installation Directory:

19. Type the path for log directory and press Enter. Please specify where you want to keep Calypso log files.

It must be a local directory and there should be at least 100MB of free space available. All log files will be created in a "calypso/Log_Files" subdirectory, so if you enter "/var/log", the logs will actually be placed into "/var/log/calypso/Log_Files".

Log Directory:

20. Type Yes and then press Enter. Most of Calypso processes run with root privileges, but some are launched by databases and inherit database access rights. To make sure that registry and log files can be written to by both kinds of processes we can either make such files world-writeable or we can grant write access only to processes belonging to a particular group, e.g. a "calypso" or a "dba" group.

We highly recommend now that you create a new user group and enter its name in the next setup screen. If you choose not to assign a dedicated group to Calypso processes, all temporary and configuration files will be created with -rw-rw-rw permissions.

If you're planning to backup Oracle DB you should use "dba" group.

Would you like to assign a specific group to Calypso?

21. Press Enter to assign user group.
 
  • It is recommended that you create a new user group before creating package, to specify access permissions to Calypso processes.
  • If you do not have user group created, type no and skip to next step.
Most of Calypso processes run with root privileges, but some are launched by databases and inherit database access rights. To make sure that registry and log files can be written to by both kinds of processes we can either make such files world-writeable or we can grant write access only to processes belonging to a particular group, e.g. a "Calypso" or a "dba" group.

We highly recommend now that you create a new user group and enter its name in the next setup screen. If you choose not to assign a dedicated group to Calypso processes, you will need to specify the access permissions later.

If you're planning to backup Oracle DB you should use "dba" group.

Would you like to assign a specific group to Calypso? [yes]

22. If you indicated Yes in above step, type the Group name and then press Enter. Please enter the name of the group which will be assigned to all Software files and on behalf of which all Software processes will run.

In most of the cases it's a good idea to create a dedicated "calypso" group. However, if you're planning to use Oracle iDataAgent or SAP Agent, you should enter Oracle's "dba" group here.

Group name: galaxy

REMINDER

If you are planning to install Calypso Informix, DB2, PostgreSQL, Sybase or Lotus Notes iDataAgent, please make sure to include Informix, DB2, etc. users into group "dba".

23. If you enter no in step 21, you will be prompted to assign permissions for other users.
  • Type the appropriate number and press Enter.
  • A confirmation screen will mark your choice with an "X".

    Type "d" for Done, and press Enter.

Access Permissions for Other Users

Installer will assign full access rights to root user and its belonging group for all installed Software files and its processes.

For any other users, you can specify the access permissions now.

However, since you chose not to assign a dedicated group in previous step, make sure you specify sufficient access rights for other users if you are also planning to install Software agents involving third party software protection.

[X] 1) Allow read permission to other users
[X] 2) Allow write permission to other users
[X] 3) Allow execute permission to other users
[a=all n=none r=reverse q=quit d=done >=next <=previous ?=help]
Enter number(s)/one of "a,n,r,q,d,>,<,?" here:

24. Type a network TCP port number for the Communications Service (CVD) and press Enter.

Type a network TCP port number for the Client Event Manager Service (EvMgrC) and press Enter.

Every instance of Calypso should use a unique set of network ports to avoid interfering with other instances running on the same machine.

The port numbers selected must be from the reserved port number range and have not been registered by another application on this machine.

Please enter the port numbers.

Port Number for CVD:

Port Number for EvMgrC:

25. Type Yes and then press Enter. Is there a firewall between this client and the CommServe?
 

Configure Firewall with Proxy

26. Type 3 to select CommServe is reachable only through a proxy.

Press Enter.

Please specify now how your firewall is limiting network traffic. Whether it's possible to open connection from here to a CommServe's tunnel port, whether all connections toward CommServe are blocked, and we should instead expect CommServe to connect back to us, or whether there is a proxy in between.

1) This machine can open connection to CommServe on a tunnel port

2) CommServe can open connections toward us

3) Commserve is reachable only through a proxy

Your choice: [1]

27. Type CommServe Client Name and press Enter. Please specify client name of the CommServe below.

CommServe Client Name:

28. Enter the following information:
  • Type GatewayProxy hostname in hostname or IP Address and press Enter.
  • Type GatewayProxy client name in Proxy short name and press Enter.
  • Type the port number of the HTTP Proxy through which the CommServe and be reached and press Enter.
Proxy Connection Setup

Please specify the name of IP address of the proxy that should be used to reach the CommServe along with the port number, on which the proxy is expecting connections.

Proxy hostname or IP address:

Proxy short name:

Proxy HTTP/HTTPS tunnel port number:

 

Configure Firewall Without Proxy

29. Type 1 to select This machine can open connection to CommServe on tunnel port and press Enter. Please specify now how your firewall is limiting network traffic. Whether it's possible to open connection from here to a CommServe's tunnel port, whether all connections toward CommServe are blocked, and we should instead expect CommServe to connect back to us, or whether there is a proxy in between.

1) This machine can open connection to CommServe on a tunnel port

2) CommServe can open connections toward us

3) CommServe is reachable only through a proxy

Your choice: [1]

30. Enter the name of the CommServe computer in place of CommServe Client Name.

Press Enter.

Please specify client name of the CommServe below.

CommServe Client Name:

31. Enter the fully qualified name or the IP address of the CommServe in the CommServe Host Name. This should be TCP/IP network name. e.g., computer.company.com.

Press Enter.

 
  • Ensure that the CommServe is accessible before typing the name; otherwise the installation will fail.
  • If you enter a short name which resolves to the same IP address as the fully qualified CommServe name, you will be asked if you would prefer to use the fully qualified name.
Please specify hostname of the CommServe below. Make sure the hostname is fully qualified, resolvable by the name services configured on this machine. If there is a port-forwarding Gateway in front of the CommServe, enter hostname or IP address of the Gateway here.
32. Type the incoming port number through which the CommServe computer receives tunnel connection.

Press Enter.

  This is the port number, provided in the step 5 during Setting up Connection to the CommServe.
Please specify the port number, on which we should open tunnel connections toward the CommServe. This is same as "Tunnel HTTP/HTTPS port" configurable in the "Incoming Ports" tab of the CommServe Firewall Properties adjusted for a possible port-mapping Gateway in front of it.

CommServe HTTP/HTTPS tunnel port number: 8500

33.
  • If this computer is separated from the CommServe by a HTTP Proxy, type Yes and enter the following information:

    HTTP Proxy hostname or IP address: Type the hostname or IP address of the HTTP Proxy through which the CommServe can be reached.

    HTTP Proxy port number: Type the port number of the HTTP Proxy through which the CommServe can be reached.

    Press Enter.

  • If this computer is not separated from the CommServe by a HTTP Proxy, type No and press Enter.
If there is an HTTP proxy between this client and the CommServe (e.g. Squid or Apache), please provide HTTP Proxy configuration below.

Is there an HTTP proxy between this client and the CommServe? [no]

34. If the CommCell is in the Lockdown mode, enter Yes and provide the path to the folder in the which the CommCell HTTPS certificate are available.
  See Enforcing CommCell Specific Certificates for Authentication for more information on the Lockdown feature and steps to export the CommCell Certification.

Press Enter.

If you have checked "Lockdown CommCell" in firewall properties of the CommServe or Proxy, you need to provide path to the directory with CommCell HTTPS certificate below.

This certificate can be obtained by right-clicking CommServe name in the Java GUI, and selecting All Tasks -> Export Firewall Certificate popup menu item.

Have you enabled "Lockdown CommCell"? [no]

Configuration of Other Installation Options

35. Type the Laptop Backup as a client group and then press Enter.
  If you want to configure any additional settings for the clients before performing the backup, select the Waiting Room as the client group.

See Configure Additional Settings Before Laptops Execute The First Backup for more information on Waiting Room client group configuration.

Please enter one Client Computer Group name for this client to join.

Client Computer Group Name:

36. Type Yes and press Enter. Do you want to configure subclient policy? [no] yes
37. Type the subclient policy created in step 21 during Create Subclient Policy. Please enter a subclient policy name for this IDA.

Subclient Policy Name:

38. Press Enter. Please select which instance you want to install/replay for this recording:

1) Always install to Instance001
2) Always install to Instance002
3) Always install to Instance003
4) Always install to Instance004
5) Always install to Instance005
6) Always install to Instance006
7) Always install to Instance007
8) Always install to Instance008
9) Always install to Instance009
10) Always install to Instance010
11) Always install to a new instance
12) I want to specify another instance
Your choice: [11]

39. Enter Yes to create the tar file of Custom Package. Archiving the custom package in a tar file (Optional)

Optionally, you may choose to tar the package now.

Do you want to create the tar file now? [no] yes

40. You are advised that the UnixCustomPackage.tar file is created. Creating /opt/UnixCustomPackage.tar ...Done.
41. The UnixCustomPackage.tar is created in the path which you provided in step 18.

You can now provide this package to Laptop Users.

Done

[ Custom Package Summary ]

- General package created at /opt/UnixCustomPackage/pkg

- Tar package created at /opt/UnixCustomPackage/tar: custom_pkg.tar

Thank you for choosing Bull.