HP Tru64 UNIX and TruCluster Server Version 5.1.B-4 Patch Summary and Release Notes (13156)

5. Check to see if the problem has been resolved. If it has been resolved, you are finished.
If you still see the problem, observe the following warning and continue to step 6.
Warning!
Continue with the following steps only if the following conditions are met:
You encountered the described problem while doing a rolling upgrade of a cluster
running Enhanced Security.
You performed all previous steps.
All user authentications (logins) still fail.
6. Disable logins on the cluster by creating the file /etc/nologin:
# touch /etc/nologin
7. Disable the prpasswdd daemon from running on the cluster:
# rcmgr -c set PRPASSWDD_ARGS \
"`rcmgr get PRPASSWDD_ARGS` -disable"
8. Stop the prpasswdd daemon on every node in the cluster:
# /sbin/init.d/prpasswd stop
9. Force a checkpoint of db_checkpoint, using the db_checkpoint command with the -1
(number 1) option :
# /usr/tcb/bin/db_checkpoint -1 -h /var/tcb/files
Continue with the instructions even if this command fails.
10. Delete the files in the dblogs directory:
# rm -f /var/tcb/files/dblogs/*
11. Force a change to the auth database, as follows:
Use the edauth command to add a harmless field to an account, the exact commands
depend on your editor. For example, pick an account that does not have a vacation set
and enter the following:
# edauth
s/:u_lock@:/u_vacation_end#0:u_lock@:/
w
q
Check to see that the u_vacation_end#0 field was added to the account:
# edauth -g
Use the edauth command to remove the u_vacation_end#0 field from the account.
Warning!
If the edauth command fails, do not proceed further. Contact HP support.
12. If the edauth command was successful, perform one of the following actions:
If PRPASSWDD_ARGS did not exist before this upgrade (that is, if rcmgr get
PRPASSWDD_ARGS at this point shows only -disable), then delete PRPASSWDD_ARGS:
4.1 Release Notes 153