Veritas Storage Foundation 5.1 SP1 Cluster File System Installation Guide (5900-1510, April 2011)

Performing a full upgrade from SFCFS 5.x on HP-UX 11iv3 to 5.1 SP1
on the latest HP-UX 11iv3 ...................................................... 208
Chapter 12 Performing a phased upgrade ........................................ 213
Performing a phased upgrade from version 5.x on HP-UX 11i v3 to
Veritas Storage Foundation Cluster File System 5.1 SP1 .............. 213
Performing phased upgrade of SFCFS from versions 4.x or 5.x on
HP-UX 11i v2 to 5.1SP1 ......................................................... 219
Upgrading Storage Foundation Cluster File System and High
Availability software from a release prior to 5.1 SP1 ................... 224
Upgrading Storage Foundation or Storage Foundation High
Availability using the script-based installer ......................... 224
Chapter 13 Upgrading the operating system .................................... 237
Upgrading the HP-UX operating system ......................................... 237
Chapter 14 Upgrading Veritas Volume Replicator ........................... 239
Upgrading Veritas Volume Replicator ............................................ 239
Upgrading VVR without disrupting replication .......................... 239
Chapter 15 Migrating from SFHA to SFCFS or SFCFSHA ................ 241
Migrating from SFHA to SFCFS or SFCFS HA 5.1 SP1 ........................ 241
Chapter 16 Post-upgrade tasks ........................................................... 245
Configuring Powerfail Timeout after upgrade .................................. 245
Section 5 Verification of the installation or the
upgrade ...................................................................... 247
Chapter 17 Verifying the Storage Foundation Cluster File
System installation ...................................................... 249
Verifying that the products were installed ...................................... 250
Installation log files .................................................................... 250
Using the installation log file .................................................. 250
Using the summary file ......................................................... 250
About enabling LDAP authentication for clusters that run in secure
mode .................................................................................. 250
Contents12