Migrating an Integrity HP-UX 11iv3 Instance to New Hardware

12
Step4: Clone scenario: Give the target read access to source
recovery archive
In the move scenario, the source and target systems have the same hostname, so the target system
already has network access to the recovery archive.
If the Ignite-UX server is running 11i v3 or later, edit the /etc/dfs/dfstab file to allow access to
both the source and target clients as follows:
1. Open the dfstab file:
#vi /etc/dfs/dfstab
2. Once open, append the following to the -argument of the line for the source system
ro=<target hostname>
For example, if the source hostname is srcsys, and the target hostname tgtsys, change the line
share -F nfs -o anon=2,rw=srcsys \
/var/opt/ignite/recovery/archives/srcsys
to
share -F nfs -o anon=2,rw=srcsys,ro=tgtsys \
/var/opt/ignite/recovery/archives/srcsys
3. #shareall -F nfs
See the manpages dfstab(4) and share_nfs(1M) for more information.
If the Ignite-UX server is running a release prior to 11i v3, edit the /etc/exports file to allow
access to both the source and target clients:
1. Open the exports file:
#vi /etc/exports
2. Once open, append the following to the argument of the source client's line.:
:<target hostname>
For example, if the source hostname is srcsys, and the target hostname tgtsys, change the line
/var/opt/ignite/recovery/archives/srcsys -anon=2,access=srcsys
to
/var/opt/ignite/recovery/archives/srcsys -anon=2,access=srcsys:tgtsys
3. #exportfs –av
See exports(4) for more information
Step 5: Remove or modify the network information for the target
In the clone scenario, the hostname, IP addresses, subnet masks, and other network information for
the target system will differ from that of the source system. Even in the move scenario, when the
hostname is retained, the IP address(es), subnet mask(s), and other information will probably need to
be modified.
A simple approach to setting up the networking on the target system is to remove or comment out the
network configuration information stored with the recovery archive, and supply the network identity