Skip Headers
Oracle® Clusterware Installation Guide
11g Release 1 (11.1) for Linux

Part Number B28263-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

1 Oracle Clusterware Preinstallation Tasks

This chapter describes the system configuration tasks that you must complete before you start Oracle Universal Installer (OUI) to install Oracle Clusterware.

This chapter contains the following topics:

1.1 Installing the Linux Operating System

This section provides information about installing a supported Linux distribution. It contains the following topics:

1.1.1 Completing a Default Linux Installation

Oracle recommends that you install your Linux operating system with the default software packages (RPMs). This installation includes most of the required packages and helps you limit manual checks of package dependencies. Oracle recommends that you do not customize the RPMs during installation.

After installation, add all of the Legacy Software Development packages. Review system requirements for your distribution to ensure that you have all required kernel packages installed, and complete all other configuration tasks required for your distribution, and for your system configuration.

1.1.2 About the Oracle Validated Configuration RPM

If your Linux distribution is Oracle Enterprise Linux, or Red Hat Enterprise Linux, and you are an Unbreakable Linux customer, then you can complete most preinstallation configuration tasks by using the Oracle Validated Configurations Setup RPM, available from the Unbreakable Linux Network (ULN).

When it is installed, the Oracle Validated Configuration RPM sets and verifies system parameters based on recommendations from the Oracle Validated Configurations program, and installs any additional packages needed for installing Oracle Clusterware and Oracle Database. It also updates sysctl.conf settings, system startup parameters, user limits, and driver parameters to values extensive testing shows will provide better performance.

To become an Oracle Unbreakable Linux customer, contact your sales representative, or purchase a license from the Unbreakable Linux store:

http://oraclestore.oracle.com/linux

To register your server on the Unbreakable Linux Network, or to find out more information, refer to the following URL:

https://linux.oracle.com

1.1.3 Installing the Oracle Validated Configuration RPM

Use the following procedure to subscribe to Oracle Unbreakable Linux channels, and to add the Oracle Software for Enterprise Linux channel that distributes the Oracle Validated Configurations Setup RPM:

  1. Complete a default Oracle Enterprise Linux workstation installation, or a default Red Hat Enterprise Linux installation.

  2. Register your server with Unbreakable Linux Network (ULN). By default, you are registered for the Enterprise Linux Latest channel for your operating system and hardware.

  3. Log in to ULN at the following URL:

    https://linux.oracle.com

  4. Click the Systems tab, and in the System Profiles list, select a registered server. The System Details window opens, and displays the subscriptions for the server.

  5. From the Available Channels list, select the Oracle Software for Enterprise Linux channel that is appropriate for your installation of Linux (for example: "Oracle Software for Enterprise Linux 4 (x86_64)."

  6. Click Subscribe.

  7. From a terminal session, as root, enter the following command:

    # up2date --nox --show-channels
    

    You should see output indicating that you have subscribed to the Oracle Software for Enterprise Linux channel. For example:

    el4_i386_latest
    el4_i386_oracle
    
  8. Open a terminal session as root, and install the Oracle Validated Configurations Setup RPM with up2date, using the following command:

    # up2date --install oracle-validated
    
  9. Repeat steps 1 through 8 on all other servers in your cluster.

    Note:

    Check the Oracle Validated Configuration RPM log file to review system configuration changes:
    /etc/sysconfig/oracle-validated/results/orakernel.log
    

1.2 Logging In to a Remote System as root Using X Terminal

Before you install the Oracle software, you must complete several tasks as the root user on the system where you install Oracle software. To complete tasks as the root user on a remote server, you need to enable remote display as root.

Note:

If you log in as another user (for example, oracle), then you need to repeat this procedure for that user as well.

To enable remote display, complete one of the following procedures:

1.3 Overview of Groups and Users for Oracle Clusterware Installations

You must create the following group and user to install Oracle Clusterware:

See Also:

Oracle Database Administrator's Reference for UNIX Systems and Oracle Database Administrator's Guide for more information about the OSDBA and OSOPER groups and the SYSDBA, SYSASM and SYSOPER privileges

1.4 Creating Groups and Users for Oracle Clusterware

Log in as root, and use the following instructions to locate or create the Oracle Inventory group and a software owner for Oracle Clusterware:

1.4.1 Understanding the Oracle Inventory Group

You must have a group whose members are given access to write to the Oracle Central Inventory (oraInventory). The Central Inventory contains the following:

  • A registry of the Oracle home directories (Oracle Clusterware, Oracle Database, and Automatic Storage Management) on the system

  • Installation logs and trace files from installations of Oracle software. These files are also copied to the respective Oracle homes for future reference.

Other metadata inventory information regarding Oracle installations are stored in the individual Oracle home inventory directories, and are separate from the Central Inventory.

1.4.2 Understanding the Oracle Inventory Directory

The first time you install Oracle software on a system, Oracle Universal Installer checks to see if you have created an Optimal Flexible Architecture (OFA) compliant path in the format u[01-09]/app, such as /u01/app, and that the user running the installation has permissions to write to that path. If this is true, then Oracle Universal Installer creates the Oracle Inventory directory in the path /u[01-09]/app/oraInventory. For example:

/u01/app/oraInventory

If you have set the environment variable $ORACLE_BASE for the user performing the Oracle Clusterware installation, then OUI creates the Oracle Inventory directory in the path $ORACLE_BASE/../oraInventory. For example, if $ORACLE_BASE is set to /opt/oracle/11, then the Oracle Inventory directory is created in the path /opt/oracle/oraInventory.

If you have created neither an OFA-compliant path nor set $ORACLE_BASE, then the Oracle Inventory directory is placed in the home directory of the user that is performing the installation. For example:

/home/oracle/oraInventory

As this placement can cause permission errors during subsequent installations with multiple Oracle software owners, Oracle recommends that you either create an OFA-compliant installation path, or set an $ORACLE_BASE environment path.

For new installations, Oracle recommends that you allow OUI to create the Central Inventory directory. By default, if you create an Oracle path in compliance with OFA structure, such as /u01/app, that is owned by an Oracle software owner, then the Central Inventory is created in the path u01/app/oraInventory using correct permissions to allow all Oracle installation owners to write to this directory.

1.4.3 Determining If the Oracle Inventory and Oracle Inventory Group Exists

When you install Oracle software on the system for the first time, OUI creates the oraInst.loc file. This file identifies the name of the Oracle Inventory group (typically, oinstall), and the path of the Oracle Central Inventory directory. An oraInst.loc file has contents similar to the following:

inventory_loc=central_inventory_location
inst_group=group

In the preceding example, central_inventory_location is the location of the Oracle Central Inventory, and group is the name of the group that has permissions to write to the central inventory.

If you have an existing Oracle Inventory, then ensure that you use the same Oracle Inventory for all Oracle software installations, and ensure that all Oracle software users you intend to use for installation have permissions to write to this directory.

To determine if you have an Oracle Inventory on your system:

On x86 systems, enter the following command:

# more /etc/oraInst.loc

If the oraInst.loc file exists, then the output from this command is similar to the following:

inventory_loc=/u01/app/oracle/oraInventory
inst_group=oinstall

In the previous output example:

  • The inventory_loc group shows the location of the Oracle Inventory

  • The inst_group parameter shows the name of the Oracle Inventory group (in this example, oinstall).

1.4.4 Creating the Oracle Inventory Group If an Oracle Inventory Does Not Exist

If the oraInst.loc file does not exist, then create the Oracle Inventory group by entering a command similar to the following:

# /usr/sbin/groupadd -g 501 oinstall

The preceding command creates the group oinstall, with the group ID number 501.

1.4.5 Creating the Oracle Clusterware User

You must create a software owner for Oracle Clusterware in the following circumstances:

  • If an Oracle software owner user does not exist; for example, if this is the first installation of Oracle software on the system

  • If an Oracle software owner user exists, but you want to use a different operating system user, such as crs, with different group membership, to give separate clusterware and database administrative privileges to those groups in a new Oracle Clusterware and Oracle Database installation.

    In Oracle documentation, a user created to own only Oracle Clusterware software installations is called the crs user. A user created to own either all Oracle installations, or only Oracle database installations, is called the oracle user.

Note:

If you intend to use multiple Oracle software owners for different Oracle Database homes, then Oracle recommends that you create a separate Oracle software owner for Oracle Clusterware, and install Oracle Clusterware using the Oracle Clusterware software owner.

If you want to create separate Oracle software owners (oracle, crs, asm) to create separate users and separate operating system privileges groups for different Oracle software installations, then note that each of these users must have the oinstall group as their primary group, and each user must share the same Oracle Central Inventory, to prevent corruption of the Central Inventory. Refer to "Creating Custom Configuration Groups and Users for Job Roles".

1.4.5.1 Determining if an Oracle Software Owner User Exists

To determine whether an Oracle software owner user named oracle or crs exists, enter a command similar to the following (in this case, to determine if oracle exists):

# id oracle

If the user exists, then the output from this command is similar to the following:

uid=501(oracle) gid=501(oinstall) groups=502(dba),503(oper)

Determine whether you want to use the existing user, or create another user.

If you want to use the existing user, then ensure that the user's primary group is the Oracle Inventory group (oinstall).

1.4.5.2 Creating or Modifying an Oracle Software Owner User for Oracle Clusterware

If the Oracle software owner (oracle, crs) user does not exist, or if you require a new Oracle software owner user, then create it. The following procedure uses crs as the name of the Oracle software owner.

  1. To create a user, enter a command similar to the following:

    # /usr/sbin/useradd -u 501 -g oinstall crs
    

    In the preceding command:

    • The -u option specifies the user ID. Using this command flag is optional, as you can allow the system to provide you with an automatically generated user ID number. However, you must make note of the user ID number of the user you create for Oracle Clusterware, as you require it later during preinstallation.

    • The -g option specifies the primary group, which must be the Oracle Inventory group. For example: oinstall.

    Use the usermod command to change user id numbers and groups. For example:

    # id oracle
    uid=500(oracle) gid=500(oracle) groups=500(oracle)
    # /usr/sbin/usermod -u 500 -g 501 -G 500,502 oracle
    # id oracle
    uid=500(oracle) gid=501(oinstall) groups=501(oinstall),500(oracle),502(dba)
    
  2. Set the password of the user that will own Oracle Clusterware. For example:

    # passwd crs
    
  3. Repeat this procedure on all of the other nodes in the cluster.

1.4.6 Example of Creating the Oracle Clusterware User and OraInventory Path

The following is an example of how to create the Oracle Clusterware software owner (in this case, crs), and a path compliant with OFA structure with correct permissions for the oraInventory directory. This example also shows how to create separate Oracle Database and Oracle ASM homes with correct ownership and permissions:

# mkdir -p  /u01/app/crs
# chown -R crs:oinstall /u01/app
# mkdir  /u01/app/oracle
# chown oracle:oinstall /u01/app/oracle
# chmod 775 /u01/app/
# mkdir  /u01/app/asm
# chown asm:oinstall /u01/app/asm

At the end of this procedure, you will have the following:

  • /u01 owned by root.

  • /u01/app owned by crs:oinstall with 775 permissions. This ownership and permissions enables OUI to create the oraInventory directory, in the path /u01/app/oraInventory.

  • /u01/app/crs owned by crs:oinstall with 775 permissions. These permissions are required for installation, and are changed during the installation process.

  • /u01/app/oracle owned by oracle:oinstall with 775 permissions.

  • /u01/app/asm owned by asm:oinstall with 775 permissions.

1.5 Checking the Hardware Requirements

Each system must meet the following minimum hardware requirements:

To ensure that each system meets these requirements, follow these steps:

  1. To determine the physical RAM size, enter the following command:

    # grep MemTotal /proc/meminfo
    

    If the size of the physical RAM installed in the system is less than the required size, then you must install more memory before continuing.

  2. To determine the size of the configured swap space, enter the following command:

    # grep SwapTotal /proc/meminfo
    

    If necessary, refer to your operating system documentation for information about how to configure additional swap space.

  3. To determine the amount of disk space available in the /tmp directory, enter the following command:

    • # df -k /tmp
      

    This command displays disk space in 1 kilobyte blocks. On most systems, you can use the df command with the -h flag (df -h) to display output in "human-readable" format, such as "24G" and "10M." If there is less than 400 MB of disk space available in the /tmp directory (less than 4194304 1-k blocks), then complete one of the following steps:

    • Delete unnecessary files from the /tmp directory to make available the disk space required.

    • Extend the file system that contains the /tmp directory. If necessary, contact your system administrator for information about extending file systems.

  4. To determine the amount of free RAM and disk swap space on the system, enter the following command:

    • # free
      

    Note that available RAM and swap space change, depending on user activity on the server.

  5. To determine if the system architecture can run the software, on all platforms, enter the following command:

    # grep "model name" /proc/cpuinfo
    

1.6 Checking the Network Requirements

Review the following sections to check that you have the networking hardware and internet protocol (IP) addresses required for an Oracle Real Application Clusters (Oracle RAC) installation:

Note:

For the most up-to-date information about supported network protocols and hardware for Oracle RAC installations, refer to the Certify pages on the OracleMetaLink Web site at the following URL:
https://metalink.oracle.com

1.6.1 Network Hardware Requirements

The following is a list of requirements for network configuration:

  • Each node must have at least two network adapters or network interface cards (NICs): one for the public network interface, and one for the private network interface (the interconnect).

    If you want to use more than one NIC for the public network or for the private network, then Oracle recommends that you use NIC bonding.

  • The public interface names associated with the network adapters for each network must be the same on all nodes, and the private interface names associated with the network adaptors should be the same on all nodes.

    For example: With a two-node cluster, you cannot configure network adapters on node1 with eth0 as the public interface, but on node2 have eth1 as the public interface. Public interface names must be the same, so you must configure eth0 as public on both nodes. You should configure the private interfaces on the same network adapters as well. If eth1 is the private interface for node1, then eth1 should be the private interface for node2.

  • For the public network, each network adapter must support TCP/IP.

  • For the private network, the interconnect must support the user datagram protocol (UDP) using high-speed network adapters and switches that support TCP/IP (Gigabit Ethernet or better required).

    Note:

    UDP is the default interconnect protocol for Oracle RAC, and TCP is the interconnect protocol for Oracle Clusterware. You must use a switch for the interconnect. Oracle recommends that you use a dedicated switch.

    Oracle does not support token-rings or crossover cables for the interconnect.

  • For the private network, the endpoints of all designated interconnect interfaces must be completely reachable on the network. There should be no node that is not connected to every private network interface. You can test whether an interconnect interface is reachable using a ping command.

1.6.2 IP Address Requirements

Before starting the installation, you must have the following IP addresses available for each node:

  • An IP address with an associated host name (or network name) registered in the DNS for the public interface. If you do not have an available DNS, then record the host name and IP address in the system hosts file, /etc/hosts.

  • One virtual IP (VIP) address with an associated host name registered in a DNS. If you do not have an available DNS, then record the host name and VIP address in the system hosts file, /etc/hosts. Select an address for your VIP that meets the following requirements:

    • The IP address and host name are currently unused (it can be registered in a DNS, but should not be accessible by a ping command)

    • The VIP is on the same subnet as your public interface

  • A private IP address with a host name for each private interface

    Oracle recommends that you use private network IP addresses for these interfaces (for example: 10.*.*.* or 192.168.*.*). You can use DNS servers, or the /etc/hosts file, or both to register the private IP address. Note that if you use DNS servers alone, and the public network becomes unreachable due to NIC or cable failure, then the private IP addresses can fail to resolve.

    For the private interconnects, because of Cache Fusion and other traffic between nodes, Oracle strongly recommends using a physically separate, private network. You should ensure that the private IP addresses are reachable only by the cluster member nodes.

    During installation, you are asked to identify the planned use for each network interface that OUI detects on your cluster node. You must identify each interface as a public or private interface, and you must use the same private interfaces for both Oracle Clusterware and Oracle RAC.

    You can bond separate interfaces to a common interface to provide redundancy, in case of a NIC failure, but Oracle recommends that you do not create separate interfaces for Oracle Clusterware and Oracle RAC. If you use more than one NIC for the private interconnect, then Oracle recommends that you use NIC bonding. Note that multiple private interfaces provide load balancing but not failover, unless bonded.

    For example, if you intend to use the interfaces eth2 and eth3 as interconnects, then before installation, you must configure eth2 and eth3 with the private interconnect addresses. If the private interconnect addresses are 10.10.1.1 for eth2 and 10.10.2.1 for eth3, then bond eth2 and eth3 to an interface, such as bond0, using a separate subnet such as 10.10.222.0. During installation, define the Oracle Clusterware private node names on 10.10.222.0, and then define 10.10.222.0 (and only that one) as a private interconnect. This ensures that Oracle Clusterware and Oracle RAC are using the same network.

    After installation, if you modify interconnects on Oracle RAC with the CLUSTER_INTERCONNECTS initialization parameter, then you must change it to a private IP address, on a subnet that is not used with a public IP address, nor marked as a public subnet by oifcfg. Oracle does not support changing the interconnect to an interface using a subnet that you have designated as a public subnet.

    See Also:

    Oracle Clusterware Administration and Deployment Guide for further information about setting up and using bonded multiple interfaces

    You should not use a firewall on the network with the private network IP addresses, as this can block interconnect traffic.

Before installation, check that the default gateway can be accessed by a ping command. To find the default gateway, use the route command, as described in your operating system's help utility. After installation, configure clients to use either the VIP address, or the host name associated with the VIP. If a node fails, then the node's virtual IP address fails over to another node.

For example, with a two node cluster where each node has one public and one private interface, you might have the configuration shown in the following table for your network interfaces, where the hosts file is /etc/hosts:

Node Host Name Type IP Address Registered In
node1 node1 Public 143.46.43.100 DNS (if available, else the hosts file)
node1 node1-vip Virtual 143.46.43.104 DNS (if available, else the hosts file)
node1 node1-priv Private 10.0.0.1 Hosts file
node2 node2 Public 143.46.43.101 DNS (if available, else the hosts file)
node2 node2-vip Virtual 143.46.43.105 DNS (if available, else the hosts file)
node2 node2-priv Private 10.0.0.2 Hosts file

To enable VIP failover, the configuration shown in the preceding table defines the public and VIP addresses of both nodes on the same subnet, 143.46.43.

Note:

All host names must conform to the RFC 952 standard, which permits alphanumeric characters. Host names using underscores ("_") are not allowed.

1.6.3 Node Time Requirements

Before starting the installation, ensure that each member node of the cluster is set as closely as possible to the same date and time. Oracle strongly recommends using the Network Time Protocol feature of most operating systems for this purpose, with all nodes using the same reference Network Time Protocol server.

1.6.4 Network Configuration Options

The precise configuration you choose for your network depends on the size and use of the cluster you want to configure, and the level of availability you require.

If certified Network-attached Storage (NAS) is used for Oracle RAC and this storage is connected through Ethernet-based networks, then you must have a third network interface for I/O. Failing to provide three separate interfaces in this case can cause performance and stability problems under load.

For high capacity clusters with a small number of multiprocessor servers, to ensure high availability, you may want to configure redundant network interfaces to prevent a NIC failure from reducing significantly the overall cluster capacity. If you are using network storage, and want to provide redundant network interfaces, then Oracle recommends that you provide six network interfaces: two for the public network interface, two for the private network interface, and two for the network storage.

1.6.5 Configuring the Network Requirements

To verify that each node meets the requirements, follow these steps:

  1. If necessary, install the network adapters for the public and private networks and configure them with either public or private IP addresses.

  2. If you are using a domain name server (DNS), then for each node, register the host names and IP addresses for the public network interfaces in the DNS.

  3. Even if you are using a DNS, Oracle recommends that you add lines to the /etc/hosts file on each node, specifying the private IP addresses and associated private host names. Oracle also recommends that you add public and virtual IP addresses. Configure the /etc/host file so that it is similar to as shown in the following example, with private interface eth1, and private hosts nodeint1 and nodeint2:, where xxx represents parts of a valid IP address.

    #eth0 - PUBLIC
    xxx.xxx.100.45   node1.example.com    node1
    xxx.xxx.100.46   node2.example.com    node2
     
    #eth1 - PRIVATE
    10.0.0.1      nodeint1.example.com    nodeint1
    10.0.0.2      nodeint2.example.com    nodeint2
     
    #VIPs
    xxx.xxx.100.47   pmvip1.example.com    nodevip1
    xxx.xxx.100.48   pmvip2.example.com    nodevip2
    
  4. To check network configuration, on each node, enter the following commands:

    # hostname
    # /sbin/ifconfig
    

    Ensure that each server is properly identified, and that the interface name and IP address for all network adapters that you want to specify as public or private network interfaces are properly configured. In addition, use the ping command to ensure that each node can obtain a response for the public and private IP addresses from each other node in the cluster.

    Note:

    When you install Oracle Clusterware and Oracle RAC, you will require the public, private and virtual IP addresses. Make a note of the addresses you configured in the /etc/hosts file or DNS.
  5. To prevent public network failures with Oracle RAC databases using NAS devices or NFS mounts, enter the following command as root to enable the Name Service Cache Daemon (nscd):

    # /sbin/service  nscd start
    

1.7 Identifying Software Requirements

Depending on the products that you intend to install, verify that the following operating system software is installed on the system. To check these requirements refer to the section "Checking the Software Requirements", following this section.

Note:

OUI performs checks your system to verify that it meets the listed operating system package requirements. To ensure that these checks complete successfully, verify the requirements before you start OUI.

Oracle recommends that you install your Linux operating system with the default software packages (RPMs). Oracle recommends that you do not customize RPMs during operating system installation. A default installation includes most required packages, and will help you to limit manual checks of package dependencies.

The following is the list of supported Linux versions and requirements at the time of release:

1.7.1 Software Requirements List for x86 (32-bit) Linux Platforms

For installations only of Oracle Clusterware, ensure that you have the kernel versions and packages listed in Table 1-1 and Table 1-2.

If you intend to install Oracle Database or Oracle RAC in addition to Oracle Clusterware, then ensure that you have the kernel packages listed in Table 1-1 and Table 1-3, and check Table 1-4 to determine if you need to install additional packages for the features you plan to use.

Note:

For Asianux, Oracle Enterprise Linux, and Red Hat Enterprise Linux, system requirements are identical by kernel version. Specifically:

Asianux 2, Oracle Enterprise Linux 4, and Red Hat Enterprise Linux 4 requirements are the same.

Asianux 3, Oracle Enterprise Linux 5, and Red Hat Enterprise Linux 5 requirements are the same.

Table 1-1 Linux x86 (32-bit) Operating System Kernel Requirements

Linux Distribution Requirements

Asianux Distributions

  • Asianux 2, kernel 2.6.9 or later

  • Asianux 3, kernel 2.6.18 or later

Enterprise Linux Distributions

  • Enterprise Linux 4 Update 4 (Oracle distribution), kernel 2.6.9 or later

  • Enterprise Linux 5 (Oracle distribution), kernel 2.6.9 or later

Red Hat Enterprise Linux Distributions

  • Red Hat Enterprise Linux 4 Update 4, kernel 2.6.9 or later

  • Red Hat Enterprise Linux 5, kernel 2.6.9 or later

SUSE Enterprise Linux Distributions

  • SUSE 10, kernel 2.6.16.21 or later


Table 1-2 Linux x86 (32-bit) Oracle Clusterware Patch Requirements

Item Requirements

Asianux 2, Enterprise Linux 4, and Red Hat Enterprise Linux 4

The following packages (or later versions) must be installed:

binutils-2.15.92.0.2-18
elfutils-libelf-0.97-5
elfutils-libelf-devel-0.97.5
glibc-2.3.9.4-2.19
glibc-common-2.3.9.4-2.19
glibc-devel-2.3.9.4-2.19
gcc-3.4.5-2
gcc-c++-3.4.5-2
libaio-devel-0.3.105-2
libaio-0.3.105-2
libgcc-3.4.5
libstdc++-3.4.5-2
libstdc++-devel-3.4.5-2
make-3.80-5

Asianux 3, Enterprise Linux 5, and Red Hat Enterprise Linux 5

The following packages (or later versions) must be installed:

binutils-2.17.50.0.6-2.el5
elfutils-libelf-0.125
elfutils-libelf-devel-0.125
glibc-2.5-12
glibc-common-2.5-12
glibc-devel-2.5-12
gcc-4.1.1-52
gcc-c++-4.1.1-52
libaio-0.3.106
libaio-devel-0.3.106 
libgcc-4.1.1-52
libstdc++-4.1.1 
libstdc++-devel-4.1.1
make-3.81-1.1

SUSE 10

The following packages (or later versions) must be installed:

binutils-2.16.91.0.5
glibc-2.4-31.2
glibc-devel-2.4-31.2
gcc-4.1.0
libaio-0.3.104
libaio-devel-0.3.104
libelf-0.8.5
libgcc-4.1.0
libstdc++-4.1.0
libstdc++-devel-4.1.0
make-3.80

Table 1-3 Linux x86 (32-bit) Oracle Database and Oracle RAC Patch Requirements

Item Requirements

Asianux 2, Enterprise Linux 4, and Red Hat Enterprise Linux 4

The following packages (or later versions) must be installed:

binutils-2.15.92.0.2-18
compat-libstdc++-33.2.3-47.3
elfutils-libelf-0.97-5
elfutils-libelf-devel-0.97.5
glibc-2.3.9.4-2.19
glibc-common-2.3.9.4-2.19
glibc-devel-2.3.9.4-2.19
gcc-3.4.5-2
gcc-c++-3.4.5-2
libaio-devel-0.3.105-2
libaio-0.3.105-2
libgcc-3.4.5
libstdc++-3.4.5-2
libstdc++-devel-3.4.5-2
make-3.80-5
sysstat-5.0.5
unixODBC-2.2.11
unixODBC-devel-2.2.11

Asianux 3, Enterprise Linux 5, and Red Hat Enterprise Linux 5

The following packages (or later versions) must be installed:

binutils-2.17.50.0.6-2.el5
compat-libstdc++-33-3.2.3-61
elfutils-libelf-0.97-5
elfutils-libelf-devel-0.125
glibc-2.5-12
glibc-common-2.5-12
glibc-devel-2.5-12
gcc-4.1.1-52
gcc-c++-4.1.1-52
libaio-0.3.106
libaio-devel-0.3.106 
libgcc-4.1.1-52
libstdc++-4.1.1 
libstdc++-devel-3.4.3-22.1
make-3.81-1.1
sysstat-7.0.0
unixODBC-2.2.11
unixODBC-devel-2.2.11

SUSE 10 Packages

The following packages (or later versions) must be installed:

binutils-2.16.91.0.5
compat-libstdc++-5.0.7
glibc-2.4-31.2
glibc-devel-2.4-31.2
gcc-4.1.0
ksh-93r-12.9
libaio-0.3.104
libaio-devel-0.3.104
libelf-0.8.5
libgcc-4.1.0
libstdc++-4.1.0
libstdc++-devel-4.1.0
make-3.80
sysstat-6.0.2
unixODBC-2.2.11
unixODBC-devel-2.2.11

Table 1-4 Linux x86 Oracle Database Features Packages

Item Requirement

LDAP package

If you did not perform a default Linux installation, you intend to use LDAP, and you want to use the scripts odisrvreg, oidca, or schemasync, then install the Korn shell RPM for your Linux distribution.

Pro*C/C++, Oracle Call Interface, Oracle C++ Call Interface, Oracle XML Developer's Kit (XDK)

Intel C++ Compiler 9.1 or later and the version of GNU C and C++ compilers listed previously for the distribution are supported for use with these products.

Note: Intel C++ Compiler v9.1 can be used only with gcc 3.4.5, gcc 4.0 or gcc 4.1 standard template libraries to build OCCI applications.

Oracle XML Developer's Kit is supported with the same compilers as OCCI.

Oracle ODBC Drivers

If you intend to use ODBC, then you should install the most recent ODBC Driver Manager for Linux.

You can download and install the Driver Manager from the following URL:

http://www.unixodbc.org

Linux RPMs are available on the site.

You do not require ODBC Driver Manager to install Oracle Clusterware, Oracle Database, or Oracle RAC.

Oracle JDBC/OCI Drivers

You can use the following optional JDK version with the Oracle JDBC/OCI drivers; however, it is not required for the installation:

  • Sun JDK 1.5.0-06 (JDK 5.0) with the JNDI extension

  • IBM Java 5.0 32-bit (SR1) or later

  • JDK 1.4.2_08 with the JNDI extension

Note: By default, IBM Java 5.0 (32-bit) is installed with this release.

Oracle Real Application Clusters

For a cluster file system, use one of the following options:

Oracle Cluster File System 2 (OCFS2)

  • Version 1.2.3 or later

For information about Oracle Cluster File System version 2, refer to the following Web site:

http://oss.oracle.com/projects/ocfs2/

For OCFS2 certification status, refer to the Certify page on OracleMetaLink.


1.8 Checking the Software Requirements

To ensure that the system meets these requirements, follow these steps:

  1. To determine which distribution and version of Linux is installed, enter the following command:

    # cat /proc/version
    

    Note:

    Only the distributions and versions listed in the previous table are supported. Do not install the software on other versions of Linux.
  2. To determine whether the required kernel errata is installed, enter the following command:

    # uname -r
    

    The following is sample output displayed by running this command on a Red Hat Enterprise Linux 4.0 system:

    2.6.9-55.0.0.0.2.ELsmp
    

    In this example, the output shows the kernel version (2.6.9) and errata level (55.0.0.0.2.ELsmp) on the system.

    Review the required errata level for your distribution. If the errata level is previous to the required minimum errata update, then obtain and install the latest kernel update from your Linux distributor.

  3. To determine whether the required packages are installed, enter commands similar to the following:

    # rpm -q package_name
    

    If a package is not installed, then install it from your Linux distribution media or download the required package version from your Linux distributor's Web site.

  4. To determine if OCFS is installed, enter the following command:

    # rpm -qa | grep ocfs
    

    To ensure that OCFS is loaded, enter the following command:

    # /etc/init.d/ocfs status
    

    If you want to install the Oracle Database files on an OCFS file system and the packages are not installed, then download them from the following Web site. Follow the instructions listed with the kit to install the packages and configure the file system:

    http://oss.oracle.com/projects/ocfs/
    

1.9 Configuring Kernel Parameters

Note:

The kernel parameter and shell limit values shown in the following section are recommended values only. For production database systems, Oracle recommends that you tune these values to optimize the performance of the system. Refer to your operating system documentation for more information about tuning kernel parameters.

On all cluster nodes, verify that the kernel parameters shown in the following table are set to values greater than or equal to the recommended value shown. The procedure following the table describes how to verify and set the values.

Parameter Value File
semmsl semmns semopm semmni 250 32000 100 128 /proc/sys/kernel/sem
shmmax The minimum of the following

(4 GB - 1 byte), or half the size of physical memory (in bytes), whichever is lower.

/proc/sys/kernel/shmmax
shmmni 4096 /proc/sys/kernel/shmmni
shmall 2097152 /proc/sys/kernel/shmall
file-max 65536 /proc/sys/fs/file-max
ip_local_port_range Minimum: 1024

Maximum: 65000

/proc/sys/net/ipv4/ip_local_port_range
rmem_default 4194304 /proc/sys/net/core/rmem_default
rmem_max 4194304 /proc/sys/net/core/rmem_max
wmem_default 262144 /proc/sys/net/core/wmem_default
wmem_max 262144 /proc/sys/net/core/wmem_max

Note:

If the current value for any parameter is greater than the value listed in this table, then do not change the value of that parameter.

To view the current value specified for these kernel parameters, and to change them if necessary, follow these steps:

  1. Enter the commands shown in the following table to view the current values of the kernel parameters:

    Note:

    Make a note of the current values and identify any values that you must change.
    Parameter Command
    semmsl, semmns, semopm, and semmni # /sbin/sysctl -a | grep sem

    This command displays the value of the semaphore parameters in the order listed. For example:

    250   32000   100   128
    
    shmall, shmmax, and shmmni # /sbin/sysctl -a | grep shm

    For example:

    kernel.shmmni = 4096
    kernel.shmall = 2097152
    kernel.shmmax = 2147483648
    
    file-max # /sbin/sysctl -a | grep file-max

    For example:

    fs.file-max = 65536
    
    ip_local_port_range # /sbin/sysctl -a | grep ip_local_port_range

    This command displays a range of port numbers. For example:

    net.ipv4.ip_local_port_range = 1024     65000
    
    rmem_default, rmem_max, wmem_default, and wmem_max # /sbin/sysctl -a | grep net.core.rmem

    # /sbin/sysctl -a | grep net.core.wmem

    For example:

    net.core.rmem_default = 4194304
    net.core.rmem_max = 4194304
    net.core.wmem_default = 262144
    net.core.wmem-default = 262144
    

  2. If the value of any kernel parameter is different from the recommended value, then complete the following process:

    Using any text editor, create or edit the /etc/sysctl.conf file, and add or edit lines similar to the following:

    Note:

    Include lines only for the kernel parameter values that you want to change. For the semaphore parameters (kernel.sem), you must specify all four values. However, if any of the current system parameter values are greater than the recommended values, then keep using the larger values.
    kernel.shmall = 2097152
    kernel.shmmax = 2147483648
    kernel.shmmni = 4096
    kernel.sem = 250 32000 100 128
    fs.file-max = 65536
    net.ipv4.ip_local_port_range = 1024 65000
    net.core.rmem_default = 4194304
    net.core.rmem_max = 4194304
    net.core.wmem_default = 262144
    net.core.wmem_max = 262144
    

    By specifying the values in the /etc/sysctl.conf file, they persist when you restart the system.

    To have these changes take effect immediately so that you do not have to restart the system, enter the following command:

    # /sbin/sysctl -p
    
  3. Enter the command /sbin/sysctl -a to confirm that the values are set correctly.

  4. Repeat steps 1 through 3 on all other nodes in the cluster.

    On SUSE systems only, enter the following command to cause the system to read the /etc/sysctl.conf file when it restarts:

    # /sbin/chkconfig boot.sysctl on
    
  5. On SUSE systems only, you must put the GID of the oinstall group into the /proc/sys/vm/hugetlb_shm_group file. Doing this grants members of oinstall a group permission to create shared memory segments.

    In addition, if you intend to install Oracle Database, then you should put the GID of users that will start the Oracle instance into the /proc/sys/vm/hugetlb_shm_group file.

    For example, where the oinstall group GID is 501, and the oracle user is 502:

    # echo 501 > /proc/sys/vm/hugetlb_shm_group
    # echo 502 > /proc/sys/vm/hugetlb_shm_group
    

    After running these commands, use vi to add the following text to /etc/sysctl.conf, and enable the boot.sysctl script to run on system restart:

    vm.hugetlb_shm_group=501
    vm.hugetlb_shm_group-502
    

    After updating the values of kernel parameters in the /etc/sysctl.conf file, either restart the computer, or run the command sysctl -p to make the changes in the /etc/sysctl.conf file available in the active kernel memory.

1.9.1 Installing the cvuqdisk Package for Linux

If you are using Red Hat or SUSE Linux, then you must download and install the operating system package cvuqdisk. Without cvuqdisk, CVU is unable to discover shared disks, and you receive the error message "Package cvuqdisk not installed" when you run CVU. Use the cvuqdisk rpm for your hardware (i386).

To install the cvuqdisk RPM, complete the following procedure:

Note:

If you prefer, you can choose to disable CVU shared disk checks by adding the following line to the file CRS_home/cv/admin/cvuconfig:
CV_RAW_CHECK_ENABLED=FALSE 
  1. Locate the cvuqdisk RPM package, which is in the directory rpm on the installation media. If you have already installed Oracle Clusterware, then it is located in the directory CRS_home/rpm.

  2. Copy the cvuqdisk package to each node on the cluster. You should ensure that each node is running the same version of Linux.

  3. Log in as root.

  4. Using the following command, check to see if you have an existing version of the cvuqdisk package:

    # rpm -qi cvuqdisk
    

    If you have an existing version, then enter the following command to de-install the existing version:

    # rpm -e cvuqdisk
    
  5. Set the environment variable CVUQDISK_GRP to point to the group that will own cvuqdisk, typically oinstall. For example:

    # CVUQDISK_GRP=oinstall; export CVUQDISK_GRP
    
  6. In the directory where you have saved the cvuqdisk rpm, use the following command to install the cvuqdisk package:

    # rpm -iv cvuqdisk-1.0.1-1.rpm
    

1.10 Configuring SSH on All Cluster Nodes

Before you install and use Oracle Clusterware, you must configure secure shell (SSH) on all cluster nodes for the user that you plan to use to install Oracle Clusterware. In the examples that follow, the Oracle software owner listed is the crs user.

If you intend to install Oracle RAC or other Oracle software, then you should configure SSH for each of the other users (oracle, asm or other software owner) that you plan to use to install software, and either do not use a passphrase, or ensure that you and other installation users load SSH keys into memory before running the installation. As you perform this procedure, replace the example with the user name for which you are configuring SSH.

OUI uses the ssh and scp commands during installation to run remote commands on and copy files to the other cluster nodes. You must configure SSH so that these commands do not prompt for a password.

The SSH configuration procedure in this section describes how to configure SSH using SSH1. If SSH is not available, then OUI attempts to use rsh and rcp instead. However, these services are disabled by default on most Linux systems.

This section contains the following:

1.10.1 Checking Existing SSH Configuration on the System

To determine if SSH is running, enter the following command:

$ pgrep sshd

If SSH is running, then the response to this command is one or more process ID numbers. In the home directory of the software owner that you want to use for the installation (crs, oracle), use the command ls -al to ensure that the .ssh directory is owned and writable only by the user.

You need either an RSA or a DSA key for the SSH protocol. RSA is used with the SSH 1.5 protocol, while DSA is the default for the SSH 2.0 protocol. With OpenSSH, you can use either RSA or DSA. The instructions that follow are for SSH1. If you have an SSH2 installation, and you cannot use SSH1, then refer to your SSH distribution documentation to configure SSH1 compatibility or to configure SSH2 with DSA.

1.10.2 Configuring SSH on Cluster Member Nodes

To configure SSH, you must first create RSA or DSA keys on each cluster node, and then copy all the keys generated on all cluster node members into an authorized keys file that is identical on each node. Note that the SSH files must be readable only by root and by the software installation user (oracle, crs, asm), as SSH ignores a private key file if it is accessible by others. When this is done, then start the SSH agent to load keys into memory. In the examples that follow, the RSA key is used.

You must configure SSH separately for each Oracle software installation owner that you intend to use for installation.

To configure SSH, complete the following:

1.10.2.1 Create .SSH, and Create RSA Keys On Each Node

Complete the following steps on each node:

  1. Log in as the software owner (in this example, the crs user).

  2. To ensure that you are logged in as the Oracle user, and that the user ID matches the expected user ID you have assigned to the Oracle user, enter the commands id and id oracle. Ensure that Oracle user group and user and the terminal window process group and user IDs are identical. For example:

    $ id 
    uid=502(crs) gid=501(oinstall) groups=501(oinstall),502(crs)
    $ id crs
    uid=502(crs) gid=501(oinstall) groups=501(oinstall),502(crs)
    
  3. If necessary, create the .ssh directory in the crs user's home directory, and set permissions on it to ensure that only the oracle user has read and write permissions:

    $ mkdir ~/.ssh
    $ chmod 700 ~/.ssh
    
  4. Enter the following command:

    $ /usr/bin/ssh-keygen -t rsa
    

    At the prompts:

    • Accept the default location for the key file (press Enter).

    • Enter and confirm a pass phrase unique for this installation user.

    This command writes the RSA public key to the ~/.ssh/id_rsa.pub file and the private key to the ~/.ssh/id_rsa file.

    Never distribute the private key to anyone not authorized to perform Oracle software installations.

  5. Repeat steps 1 through 4 on each node that you intend to make a member of the cluster, using the RSA key.

1.10.2.2 Add All Keys to a Common authorized_keys File

Complete the following steps:

  1. On the local node, change directories to the .ssh directory in the Oracle Clusterware owner's home directory (typically, either crs or oracle).

    Then, add the RSA key to the authorized_keys file using the following commands:

    $ cat id_rsa.pub >> authorized_keys
    $ ls
    

    In the .ssh directory, you should see the id_rsa.pub keys that you have created, and the file authorized_keys.

  2. On the local node, use SCP (Secure Copy) or SFTP (Secure FTP) to copy the authorized_keys file to the oracle user .ssh directory on a remote node. The following example is with SCP, on a node called node2, with the Oracle Clusterware owner crs, where the crs user path is /home/crs:

    [crs@node1 .ssh]$ scp authorized_keys node2:/home/crs/.ssh/
    

    You are prompted to accept an RSA key. Enter Yes, and you see that the node you are copying to is added to the known_hosts file.

    When prompted, provide the password for the oracle user, which should be the same on all nodes in the cluster. The authorized_keys file is copied to the remote node.

    Your output should be similar to the following, where xxx represents parts of a valid IP address:

    [crs@node1 .ssh]$ scp authorized_keys node2:/home/crs/.ssh/
    The authenticity of host 'node2 (xxx.xxx.173.152) can't be established.
    RSA key fingerprint is 7e:60:60:ae:40:40:d1:a6:f7:4e:zz:me:a7:48:ae:f6:7e.
    Are you sure you want to continue connecting (yes/no)? yes
    Warning: Permanently added 'node1,xxx.xxx.173.152' (RSA) to the list
    of known hosts
    crs@node2's password:
    authorized_keys         100%       828             7.5MB/s      00:00
    
  3. Using SSH, log in to the node where you copied the authorized_keys file, using the pass phrase you created. Then change to the .ssh directory, and using the cat command, add the RSA keys for the second node to the authorized_keys file:

    [crs@node1 .ssh]$ ssh node2
    The authenticity of host node2 (xxx.xxx.100.102) can't be established. RSA key fingerprint is z3:z3:33:z3:z3:33:zz:76:z3:z3:z3.
    Are you sure you want to continue connecting? (yes/no)? yes
    Enter passphrase for key '/home/oracle/.ssh/id_rsa':
    [crs@node2 crs]S cd .ssh
    [crs@node2 ssh]$ cat id_rsa.pub  >> authorized_keys
    

    Repeat steps 2 and 3 from each node to each other member node in the cluster.

    When you have added keys from each cluster node member to the authorized_keys file on the last node you want to have as a cluster node member, then use scp to copy the authorized_keys file with the keys from all nodes back to each cluster node member, overwriting the existing version on the other nodes.

    If you want to confirm that you have all nodes in the authorized_keys file, enter the command more authorized_keys, and check to see that there is an RSA key for each member node. The file lists the type of key (ssh-rsa), followed by the key, and then followed by the user and server. For example:

    ssh-rsa AAAABBBB . . . = crs@node1
    

    Note:

    The crs user's /.ssh/authorized_keys file on every node must contain the contents from all of the /.ssh/id_rsa.pub files that you generated on all cluster nodes.

1.10.3 Enabling SSH User Equivalency on Cluster Member Nodes

After you have copied the authorized_keys file that contains all keys to each node in the cluster, complete the following procedure, in the order listed. In this example, the Oracle Clusterware software owner is named crs:

  1. On the system where you want to run OUI, log in as the crs user.

  2. Use the following command syntax, where hostname1, hostname2, and so on, are the public hostnames (alias and fully qualified domain name) of nodes in the cluster to run SSH from the local node to each node, including from the local node to itself, and from each node to each other node:

    [crs@nodename]$ ssh hostname1 date
    [crs@nodename]$ ssh hostname2 date
        .
        .
        .
    

    For example:

    [crs@node1 crs]$ ssh node1 date
    The authenticity of host 'node1 (xxx.xxx.100.101)' can't be established.
    RSA key fingerprint is 7z:60:60:zz:48:48:z1:a0:f7:4e.
    Are you sure you want to continue connecting (yes/no)? yes
    Warning: Permanently added 'node1,xxx.xxx.100.101' (RSA) to the list of
    known hosts.
    Enter passphrase for key '/home/crs/.ssh/id_rsa':
    Mon Dec 4 11:08:13 PST 2006
    [crs@node1 crs]$ ssh node1.example.com date
    The authenticity of host 'node1.example.com (xxx.xxx.100.101)' can't be
    established.
    RSA key fingerprint is 7z:60:60:zz:48:48:z1:a0:f7:4e.
    Are you sure you want to continue connecting (yes/no)? yes
    Warning: Permanently added 'node1.example.com,xxx.xxx.100.101' (RSA) to the
    list of known hosts.
    Enter passphrase for key '/home/crs/.ssh/id_rsa':
    Mon Dec 4 11:08:13 PST 2006
    [crs@node1 crs]$ ssh node2 date
    Enter passphrase for key '/home/crs/.ssh/id_rsa':
    Mon Dec 4 11:08:35 PST 2006
    .
    .
    .
    

    At the end of this process, the public hostname for each member node should be registered in the known_hosts file for all other cluster member nodes.

    If you are using a remote client to connect to the local node, and you see a message similar to "Warning: No xauth data; using fake authentication data for X11 forwarding," then this means that your authorized keys file is configured correctly, but your ssh configuration has X11 forwarding enabled. To correct this, proceed to "Setting Display and X11 Forwarding Configuration".

  3. Repeat step 2 on each cluster node member.

  4. On each node, enter the following commands to start the SSH agent, and to load the SSH keys into memory:

    $ exec /usr/bin/ssh-agent $SHELL
    $ /usr/bin/ssh-add
    

    At the prompt, enter the pass phrase for each key that you generated.

    For example:

    [crs@node1 .ssh]$ exec /usr/bin/ssh-agent $SHELL
    [crs@node1 .ssh]$ ssh-add
    Enter passphrase for /home/crs/.ssh/id_rsa
    Identity added: /home/crs/.ssh/id_rsa (/home/crs/.ssh/id_rsa)
    

    These commands start the ssh-agent on the node, and load the RSA keys into memory so that you are not prompted to use pass phrases when issuing SSH commands

If you have configured SSH correctly, then you can now use the ssh or scp commands without being prompted for a password or a pass phrase. For example:

[crs@node1 ~]$ ssh node2 date
Mon Feb 26 23:34:42 UTC 2007
[crs@node1 ~]$ ssh node1 date
Mon Feb 26 23:34:48 UTC 2007
[crs@node1 ~]$ ssh node2

If any node prompts for a password or pass phrase, then verify that the ~/.ssh/authorized_keys file on that node contains the correct public keys, and that you have created an Oracle software owner with identical group membership and IDs.

Note:

You must run OUI from this session, or make a note of your SSH pass phrase, and remember to repeat step 4 before you start OUI from a different terminal session.

1.10.4 Setting Display and X11 Forwarding Configuration

  • If you are on a remote terminal, and the local node has only one visual (which is typical), then use the following syntax to set the DISPLAY environment variable:

    Bourne, Korn, and Bash shells

    $ export DISPLAY=hostname:0
    

    C shell:

    $ setenv DISPLAY=hostname:0
    

    For example, if you are using the Bash shell, and if your hostname is node1, then enter the following command:

    $ export DISPLAY=node1:0
    
  • To ensure that X11 forwarding will not cause the installation to fail, create a user-level SSH client configuration file for the Oracle software owner user, as follows:

    1. Using any text editor, edit or create the software installation owner's ~/.ssh/config file.

    2. Make sure that the ForwardX11 attribute is set to no. For example:

      Host *
            ForwardX11 no
      

1.10.5 Preventing Oracle Clusterware Installation Errors Caused by stty Commands

During an Oracle Clusterware installation, OUI uses SSH to run commands and copy files to the other nodes. During the installation, hidden files on the system (for example, .bashrc or .cshrc) will cause makefile and other installation errors if they contain stty commands.

To avoid this problem, you must modify these files in each Oracle installation owner user home directory to suppress all output on STDERR, as in the following examples:

  • Bourne, Bash, or Korn shell:

    if [ -t 0 ]; then
       stty intr ^C
    fi
    
  • C shell:

    test -t 0
    if ($status == 0) then
       stty intr ^C
    endif
    

    Note:

    When SSH is not available, the Installer uses the rsh and rcp commands instead of ssh and scp.

    If there are hidden files that contain stty commands that are loaded by the remote shell, then OUI indicates an error and stops the installation.

1.11 Configuring Software Owner User Environments

You run OUI from the user account that you want to own the Oracle Clusterware installation (oracle or crs). However, before you start OUI you must configure the environment of the user performing the Oracle Clusterware installation. In addition, create other required Oracle software owners, if needed.

This section contains the following topics:

1.11.1 Environment Requirements for Oracle Clusterware Software Owner

You must make the following changes to configure the Oracle Clusterware software owner environment:

  • Set the installation software owner user (crs, oracle, asm) default file mode creation mask (umask) to 022 in the shell startup file. Setting the mask to 022 ensures that the user performing the software installation creates files with 644 permissions.

  • Set ulimit settings for file descriptors and processes for the installation software owner (crs, oracle)

  • Set the software owner's environment variable DISPLAY environment variables in preparation for the Oracle Clusterware installation

1.11.2 Procedure for Configuring Oracle Software Owner Environments

To set the Oracle software owners' environments, follow these steps, for each software owner (crs, oracle, asm):

  1. Start a new terminal session; for example, start an X terminal (xterm).

  2. Enter the following command to ensure that X Window applications can display on this system:

    $ xhost + hostname
    

    The hostname is the name of the local host.

  3. If you are not already logged in to the system where you want to install the software, then log in to that system as the software owner user.

  4. If you are not logged in as the user, then switch to the software owner user you are configuring. For example, with the crs user:

    $ su - crs
    
  5. To determine the default shell for the user, enter the following command:

    $ echo $SHELL
    
  6. Open the user's shell startup file in any text editor:

    Note:

    On Red Hat Linux, .bash_profile is the user startup file for the Bash shell.
    • Bourne shell (sh), Bash shell (bash) or Korn shell (ksh):

      $ vi .bash_profile
      
    • C shell (csh or tcsh):

      % vi .login
      
  7. Enter or edit the following line, specifying a value of 022 for the default file mode creation mask:

    umask 022
    
  8. If the ORACLE_SID, ORACLE_HOME, or ORACLE_BASE environment variable is set in the file, then remove the appropriate lines from the file.

  9. Save the file, and exit from the text editor.

  10. To run the shell startup script, enter one of the following commands:

    • Bash shell on Red Hat Enterprise Linux:

      $ . ./.bash_profile
      
    • Bourne, Bash, or Korn shell:

      $ . ./.profile
      
    • C shell:

      % source ./.login
      
  11. If you are not installing the software on the local system, then enter a command similar to the following to direct X applications to display on the local system:

    • Bourne, Bash, or Korn shell:

      $ DISPLAY=local_host:0.0 ; export DISPLAY
      
    • C shell:

      % setenv DISPLAY local_host:0.0
      

    In this example, local_host is the host name or IP address of the system that you want to use to display OUI (your workstation or PC).

  12. If you determined that the /tmp directory has less than 400 MB of free disk space, then identify a file system with at least 400 MB of free space and set the TEMP and TMPDIR environment variables to specify a temporary directory on this file system:

    Note:

    You cannot use a shared file system as the location of the temporary file directory (typically /tmp) for Oracle RAC installation. If you place /tmp on a shared file system, then the installation fails.
    1. Use the df -h command to identify a suitable file system with sufficient free space.

    2. If necessary, enter commands similar to the following to create a temporary directory on the file system that you identified, and set the appropriate permissions on the directory:

      $ su - root
      # mkdir /mount_point/tmp
      # chmod 775 /mount_point/tmp
      # exit
      
    3. Enter commands similar to the following to set the TEMP and TMPDIR environment variables:

      • Bourne, Bash, or Korn shell:

        $ TEMP=/mount_point/tmp
        $ TMPDIR=/mount_point/tmp
        $ export TEMP TMPDIR
        
      • C shell:

        % setenv TEMP /mount_point/tmp
        % setenv TMPDIR /mount_point/tmp
        

1.11.3 Setting Shell Limits for the Oracle Software Installation Users

To improve the performance of the software on Linux systems, you must increase the following shell limits for the Oracle software owner users (crs, oracle, asm):

Shell Limit Item in limits.conf Hard Limit
Maximum number of open file descriptors nofile 65536
Maximum number of processes available to a single user nproc 16384

To increase the shell limits:

  1. Add the following lines to the /etc/security/limits.conf file (the following example shows the oracle user as the software owner):

    oracle               soft    nproc   2047
    oracle               hard    nproc   16384
    oracle               soft    nofile  1024
    oracle               hard    nofile  65536
    
  2. Add or edit the following line in the /etc/pam.d/login file, if it does not already exist:

    session    required     pam_limits.so
    
  3. Depending on your shell environment, make the following changes to the default shell startup file (note that these examples show the user oracle):

    • For the Bourne, Bash, or Korn shell, add the following lines to the /etc/profile file (or the file on SUSE systems)/etc/profile.local

      if [ $USER = "oracle" ]; then
              if [ $SHELL = "/bin/ksh" ]; then
                    ulimit -u 16384
                    ulimit -n 65536
              else
                    ulimit -u 16384 -n 65536
              fi
              umask 022
      fi
      
    • For the C shell (csh or tcsh), add the following lines to the /etc/csh.login file (or the file on SUSE systems)/etc/csh.login.local:

      if ( $USER == "oracle" ) then
              limit maxproc 16384
              limit descriptors 65536
      endif
      
  4. Repeat this procedure on all other nodes in the cluster, and for all Oracle software owners that you intend to use to install Oracle software (crs, asm, oracle).

1.12 Requirements for Creating an Oracle Clusterware Home Directory

During installation, you are prompted to provide a path to a home directory to store Oracle Clusterware binaries. Ensure that the directory path you provide meets the following requirements:

For installations with Oracle Clusterware only, Oracle recommends that you create a path compliant with Oracle Optimal Flexible Architecture (OFA) guidelines, so that Oracle Universal Installer (OUI) can select that directory during installation. For OUI to recognize the path as an Oracle software path, it must be in the form u0[1-9]/app.

When OUI finds an OFA-compliant path, it creates the Oracle Clusterware and Oracle Central Inventory (oraInventory) directories for you.

Create an Oracle Clusterware path. For example:

# mkdir -p  /u01/app
# chown -R crs:oinstall /u01

Alternatively, if you later intend to install Oracle Database software, then create an Oracle base path. OUI automatically creates an OFA-compliant path for Oracle Clusterware derived from the Oracle base path. The Optimal Flexible Architecture path for the Oracle Base is /u01/app/user, where user is the name of the user account that you want to own the Oracle Database software. For example:

# mkdir -p  /u01/app/oracle
# chown -R oracle:oinstall /u01/app/oracle
# chmod -R 775 /u01/app/oracle

Note:

If you choose to create an Oracle Clusterware home manually, then do not create the Oracle Clusterware home under Oracle base. Creating an Oracle Clusterware installation in an Oracle base directory will cause succeeding Oracle installations to fail.

See Also:

"Creating Standard Configuration Operating System Groups and Users", and "Creating Custom Configuration Groups and Users for Job Roles" for information about creating groups, users, and software homes for additional Oracle software installations

1.13 Understanding and Using Cluster Verification Utility

Cluster Verification Utility (CVU) is a tool that performs system checks. This guide provides CVU commands to assist you with confirming that your system is properly configured for Oracle Clusterware and Oracle RAC installation.

This section describes the following topics:

1.13.1 Entering Cluster Verification Utility Commands

CVU is provided with two scripts: runcluvfy.sh, which is designed to be used before installation, and cluvfy, which is in the path CRS_home/bin. The script runcluvfy.sh contains temporary variable definitions which enable it to be run before installing Oracle Clusterware or Oracle Database. After you install Oracle Clusterware, use the command cluvfy to check prerequisites and perform other system readiness checks.

Before Oracle software is installed, to enter a CVU command, change directories and start runcluvfy.sh using the following syntax:

cd /mountpoint
./runcluvfy.sh options

In the preceding example, the variable mountpoint represents the mountpoint path for the installation media and the variable options represents the CVU command options that you select. For example:

$ cd /mnt/dvdrom
$ ./runcluvfy.sh comp nodereach -n node1,node2 -verbose

By default, when you enter a CVU command, CVU provides a summary of the test. During preinstallation, Oracle recommends that you obtain detailed output by using the -verbose argument with the CVU command. The -verbose argument produces detailed output of individual checks. Where applicable, it shows results for each node in a tabular layout.

1.13.2 Using CVU to Determine if Installation Prerequisites are Complete

You can use CVU to determine which system prerequisites for installation are already completed. Use this option if you are installing Oracle 11g release 1 (11.1) on a system with a pre-existing Oracle software installation. In using this option, note the following:

  • You must complete the prerequisites for using CVU, notably configuring SSH between all nodes in the cluster, before you can complete a clusterwide status check.

  • CVU can assist you by finding preinstallation steps that need to be completed, but it cannot perform preinstallation tasks

Use the following syntax to determine what preinstallation steps are completed, and what preinstallation steps must be performed

$ ./runcluvfy.sh stage -pre crsinst -n node_list 

In the preceding syntax example, replace the variable node_list with the names of the nodes in your cluster, separated by commas.

For example, for a cluster with mountpoint /mnt/dvdrom/, and with nodes node1, node2, and node3, enter the following command:

$ cd /mnt/dvdrom/
$ ./runcluvfy.sh stage -pre crsinst -n node1,node2,node3

Review the CVU report, and proceed to the sections of the preinstallation chapter to complete additional steps as needed.

1.13.3 Using the Cluster Verification Utility Help

The cluvfy commands have context-sensitive help that shows correct syntax usage based on the command line arguments that you enter.

If you enter an invalid CVU command, then CVU shows the correct usage for that command. For example, if you type runcluvfy.sh stage -pre dbinst, then CVU shows the correct syntax for the database preinstallation checks that CVU performs with the dbinst stage option. The following is a list of context help commands.

  • cluvfy -help —CVU displays detailed CVU command information.

  • cluvfy comp -list—CVU displays a list of components that can be checked, and brief descriptions of how each component is checked.

  • cluvfy comp -help—CVU displays detailed syntax for each of the valid component checks.

  • cluvfy stage -list—CVU displays a list of valid stages.

  • cluvfy stage -help—CVU displays detailed syntax for each of the valid stage checks.

1.13.4 Using Cluster Verification Utility with Oracle Database 10g Release 1 or 2

You can use CVU on the Oracle Database 11g release 1 (11.1) media to check system requirements for Oracle Database 10g release 1 (10.1) and later installations. To use CVU to check 10. 2 installations, append the command flag -r 10gR2 to the standard CVU system check commands.

For example, to perform a verification check for a Cluster Ready Services 10. 2 installation, on a system where the media mountpoint is /mnt/dvdrom, and the cluster nodes are node1, node2, and node3, enter the following command:

$ cd /mnt/dvdrom
$ ./runcluvfy.sh stage -pre crsinst -n node1,node2,node3 -r 10gR2

Note:

If you do not specify a release version to check, then CVU checks for 11g release 1 (11.1) requirements.

1.13.5 Verbose Mode and "Unknown" Output

If you run CVU using the -verbose argument, and a CVU command responds with UNKNOWN for a particular node, then this is because the CVU cannot determine whether a check passed or failed. The following is a list of possible causes for an "Unknown" response:

  • The node is down

  • Executables required by CVU are missing in the /bin directory in the Oracle Clusterware home or Oracle home directory

  • The user account starting CVU does not have privileges to run common operating system executables on the node

  • The node is missing an operating system patch, or a required package

  • The node has exceeded the maximum number of processes or maximum number of open files, or there is a problem with IPC segments, such as shared memory or semaphores

1.14 Checking Oracle Clusterware Installation Readiness with CVU

Use the Cluster Verification Utility (CVU) to check your servers for their readiness to install Oracle Clusterware:

As the installation owner user (oracle or crs), ensure that you have ssh keys loaded into memory, and enter a command using the following syntax to verify that your cluster is properly configured for Oracle Clusterware installation:

/mountpoint/runcluvfy.sh stage -pre crsinst -n node_list [-verbose]

In the preceding syntax example, the variable node_list is a comma-separated list of nodes in your cluster. This command checks node reachability, user and group equivalence on each node, node connectivity, and basic system requirements, including kernel versions and packages.

Select the option -verbose to receive progress updates as the CVU performs its system checks, and detailed reporting of the test results.

For example, to verify system readiness on a two-node cluster with nodes node1 and node2, with the mountpoint /mnt/dvdrom, and with updates and a summary of the verification checks the CVU performs, enter the following command:

$ /mnt/dvdrom/runcluvfy.sh stage -pre crsinst -n node1,node2 -verbose