|
-
Using the instructions in the installation guide, upgrade only one cluster node in your tree at a time.
IMPORTANT: When upgrading the OES server, if NSS AD pattern is selected, then any misconfiguration in joining the domain can result in upgrade failure. Hence, it is recommended not to install NSS AD Support as part of the upgrade process.
For more information about upgrading OES Clusters, see Upgrading OES Clusters in the OES 2018 SP2: OES Cluster Services for Linux Administration Guide.
For more information about upgrading OES 2 SP3 clusters, see Upgrading Clusters from OES 2 SP3 to OES 2018 in the OES 2018 SP2: OES Cluster Services for Linux Administration Guide. |
|
-
On the cluster node (OES server), run YaST and when you reach the screen, select the pattern.
-
Specify the following details:
-
-
-
-
-
If you have already created a computer object in Active Directory for the OES server, select .
-
If you want NIT to generate UIDs for AD users, select , then specify the UID range. If you want NIT to retrieve UIDs from Active Directory, do not select the option.
For more information about this option, see Table 6-2.
-
When you click Next, the server/node is joined to the AD domain.
For more information about joining cluster nodes to the AD domain, see Joining the Cluster Node to an Active Directory Domain in the OES 2018 SP2: OES Cluster Services for Linux Administration Guide.
|
|
Verify the AD domain and Kerberos is configured and working in all the cluster nodes.
-
Ensure that the OES computer object is created in the AD domain you specified.
-
Verify that the default keytab entries for the OES server are created by entering the following command at the server’s terminal prompt:
klist -k
For example: tstsrv:~/Desktop #klist -k
Keytab name: FILE:/etc/krb5.keytab
KVNO Principal
---- ----------------------------------
2 tstsrv$@ACME.COM
2 tstsrv$@ACME.COM
2 tstsrv$@ACME.COM
2 cifs/tstsrv.acme.com@ACME.COM
2 cifs/tstsrv.acme.com@ACME.COM
2 cifs/tstsrv.acme.com@ACME.COM
2 cifs/tstsrv@ACME.COM
2 cifs/tstsrv@ACME.COM
2 cifs/tstsrv@ACME.COM
2 host/tstsrv.acme.com@ACME.COM
2 host/tstsrv.acme.com@ACME.COM
2 host/tstsrv.acme.com@ACME.COM
tstsrv:~/Desktop #
The 12 keytab entries represents the Service Principals of the OES server.
-
You can also execute kinit -k <name of the OES server>$ to ensure that the OES server is joined to the AD domain successfully.
For example, kinit -k tstsrv$
On successful execution of the above command, it does not display any output message and returns to terminal.
|
|
|
|
-
Media-upgrade your NSS32 cluster pools that your AD users need access to.
The following is a simple, GUI-driven method.
-
At a terminal prompt, enter nssmu.
-
Select
-
Select a pool.
-
Type g, then type Y(es) > O(kay).
-
Select another pool and continue until all of the NSS32 cluster pools that AD users need access to are media-upgraded
For more information on the NSS Media upgrade options and processes, see NSS Media Upgrade Commands and Upgrading the NSS Media Format in the OES 2018 SP2: NSS File System Administration Guide for Linux. |
|
-
AD-enable the NSS volumes that your AD users need access to.
The following is a simple, GUI-driven method.
-
At a terminal prompt, enter nssmu.
-
Select
-
Select a volume.
-
Type G, then type Y(es) > O(kay).
-
Select another volume and continue until all of the volumes that AD users need access to are AD-enabled.
For more information on the NSS Media upgrade options and processes, see NSS Media Upgrade Commands in the OES 2018 SP2: NSS File System Administration Guide for Linux.
See also, AD-enable the Volume and Volume AD-enabling in the OES 2018 SP2: NSS File System Administration Guide for Linux. |
|
-
Review the information in Section 4.0, Assigning NSS Trustee Rights for AD Users and Groups to ensure that you understand the trustee-assignment processes and the associated caveats, then continue with Step 2.
-
Assess whether the OES User Rights Map utility (NURM) applies to your organization by considering the following questions:
-
Do any of your AD users and groups have matching eDirectory accounts?
If so, you can use the OES User Rights Map utility (NURM) to map the rights between eDirectory and Active Directory users and groups and then apply NSS trustee assignments based on the mapping.
If not, skip to process 8.
-
Do you use NetIQ Identify Manager 4.5 or later to coordinate identities and passwords between Active Directory and eDirectory, and do you have a user map that was created using IDM Designer?
If so, NURM can leverage that map.
If not, you can create a map using NURM.
-
Do you want to consolidate your overlapping eDirectory and Active Directory accounts to only Active Directory?
If so, you can have NURM delete the eDirectory trustee assignments.
-
If applicable, run NURM to assign NSS trustee rights to your AD users.
For more information, see Section 6.4, NURM (OES User Rights Map). |
|
|
|
To access the AD enabled NSS cluster volumes, do the following:
-
Ensure to create a forward lookup DNS entry for netbios name of the cluster resource.
-
Map the NSS cluster volumes with the complete DNS name created for the cluster resource or with the short name of the netbios name of cluster resource (not with the IP address).
|