IBM HPSS Network Card User Manual


 
5.1.4.Installation Target Directory Preparation........................................................................................136
5.2.Install Prerequisite Software........................................................................................137
5.2.1.Install Java........................................................................................................................................137
5.2.2.Install MIT Kerberos (If Using Kerberos Authentication)..............................................................137
5.2.3.Install LDAP (If Using LDAP Authorization).................................................................................137
5.2.4.Install Prerequisite Software for XFS HDM....................................................................................138
5.3.Install HPSS/DB2 and Configure HPSS Infrastructure...............................................139
5.3.1.Install and Configure HPSS - Root Subsystem Machine.................................................................139
5.3.1.1.Pre-Installation Configuration...............................................................................................139
5.3.1.2.Install HPSS Documentation and DB2 Software....................................................................141
5.3.1.3.Set Up DB2 Permanent License..............................................................................................142
5.3.1.4.Configure HPSS Security Services .........................................................................................143
5.3.1.4.1.Configure UNIX Authentication and UNIX Authorization..................................................................................143
5.3.1.4.2.Configure Kerberos Authentication and UNIX Authorization.............................................................................146
5.3.1.4.3.Configure Kerberos Authentication and LDAP Authorization............................................................................149
5.3.1.5.Configure DB2 Services..........................................................................................................152
5.3.1.5.1.Remote DB2 Client Access & Fileset Creation/Deletion.....................................................................................157
5.3.1.6.Configure Other Services........................................................................................................158
5.3.1.7.Create Configuration Bundle..................................................................................................159
5.3.2.Install and Configure HPSS – Secondary Subsystem Machine.....................................................160
5.3.2.1.Pre-Installation Configuration...............................................................................................160
5.3.2.2.Install HPSS Documentation and DB2 Software on a subsystem..........................................161
5.3.2.3.Set Up DB2 Permanent License..............................................................................................162
5.3.2.4.Install Configuration Bundle..................................................................................................163
5.3.2.5.Configure HPSS Security Services .........................................................................................164
5.3.2.6.Configure DB2 Services..........................................................................................................165
5.3.2.7.Configure Other Services........................................................................................................167
5.3.3.Install and Configure HPSS – Mover/Client Machine....................................................................168
5.3.3.1.Install Mover/Client source code............................................................................................168
5.3.3.2.Install Configuration Bundle..................................................................................................169
5.3.3.3.Create /var/hpss subdirectories..............................................................................................169
5.3.3.4.Modify Kerberos Configuration File, If Necessary................................................................169
5.3.3.5.Check Time and IP Address....................................................................................................169
5.4.Post Installation Procedures.........................................................................................169
5.5.HPSS Documentation & Manual Page Setup..............................................................170
5.5.1.Documentation and SSM Help Package..........................................................................................170
5.5.2.Manual Page Setup...........................................................................................................................171
5.6.Define HPSS Environment Variables..........................................................................171
5.7.Tune DB2....................................................................................................................171
5.8.Install and Build HPSS Source Code...........................................................................172
5.8.1.Construct and Build the HPSS Base Source Tree ...........................................................................172
5.8.1.1.Construct the HPSS Source Tree............................................................................................172
5.8.1.2.Build the HPSS Base Source Tree..........................................................................................172
5.8.1.3.Generate and Bind the DB2 Helper Program........................................................................173
5.8.2.Construct and Build the HPSS Mover/Client Source Tree..............................................................174
5.8.2.1.Construct the HPSS Mover/Client Source Tree.....................................................................174
5.8.2.2.Build the HPSS Mover/Client Source Tree.............................................................................174
5.8.3.Construct and Build the HPSS HDM Source Tree..........................................................................175
5.8.3.1.Construct the HPSS HDM Source Tree..................................................................................175
5.8.3.2.Build the HPSS HDM Source Tree.........................................................................................175
5.9.Supporting Both Unix and Kerberos Authentication for SSM....................................175
HPSS Installation Guide July 2008
Release 6.2 (Revision 2.0) 8