User manual NOVELL BUSINESS CONTINUITY CLUSTERING 1.1 SP1 9-21-2010 ADMINISTRATION GUIDE FOR NOVELL OPEN ENTERPRISE SERVER 1 SP2 LINUX
DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual NOVELL BUSINESS CONTINUITY CLUSTERING 1.1 SP1. We hope that this NOVELL BUSINESS CONTINUITY CLUSTERING 1.1 SP1 user guide will be useful to you.
You may also download the following manuals related to this product:
NOVELL BUSINESS CONTINUITY CLUSTERING 1.1 SP1 README 9-21-2010 (53 ko)
Manual abstract: user guide NOVELL BUSINESS CONTINUITY CLUSTERING 1.1 SP19-21-2010 ADMINISTRATION GUIDE FOR NOVELL OPEN ENTERPRISE SERVER 1 SP2 LINUX
Detailed instructions for use are in the User's Guide.
[. . . ] AUTHORIZED DOCUMENTATION
Administration Guide for Novell Open Enterprise Server 1 SP2 Linux
Novell®
Business Continuity Clustering
1. 1 SP1
September 21, 2010
www. novell. com
Legal Notices
Novell, Inc. , makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. , reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. , makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. , reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. [. . . ] A custom Perl script can be created for disk mapping on Fibre Channel SANs. The purpose of this script is to make the LUNs in the SAN available to the destination cluster. A reverse script is also created for testing purposes so pool resources can be migrated back to the source cluster. The cluster scan for new devices command is executed on the destination cluster so that the cluster is aware of LUNs that are now available. Resources are brought online and load on the their most preferred node in the cluster. Resources appear as running and primary on the cluster where you have migrated them. WARNING: Do not migrate resources for a test failover if the peer (LAN) connection between the source and destination cluster is down. This warning does not apply if resources are migrated during an actual cluster site failure.
Installation and Setup
49
2. 5. 2 Changing Cluster Peer Credentials
Changing cluster peer credentials consists of changing the username and password for the administrative user that the selected cluster will use to connect to a selected peer cluster. You might need to do this if the administrator username or password changes for any clusters in the business continuity cluster. Replace server_ip_address with the IP address or DNS name of the Linux server that has iManager and the Identity Manager preconfigured templates for iManager installed. IMPORTANT: In order to add or change cluster peer credentials, you must access iManager on a server that is in the same eDirectory tree as the cluster you are adding or changing peer credentials for. 2 Specify your username and password, specify the tree where you want to log in, then click Login. 3 In the left column, click Cluster Administration, then click the Management link. 6 Edit the administrator username and password that the selected cluster will use to connect to the selected peer cluster, then click OK. When specifying a username, you don't need to include the Novell eDirectory context for the user name. NOTE: If the business continuity cluster has clusters in multiple eDirectory trees, and you specify a common username and password, each eDirectory tree in the business continuity cluster must have the same username and password.
2. 5. 3 Viewing the Current Status of a Business Continuity Cluster
You can view the current status of your business continuity cluster by using either iManager or the server console of a cluster in the business continuity cluster.
"Using iManager" on page 50 "Using the Server Console" on page 51
Using iManager 1 Start your Internet browser and enter the URL for iManager. Replace server_ip_address with the IP address or DNS name of the server that has iManager and the Identity Manager preconfigured templates for iManager installed. 2 Specify your username and password, specify the tree where you want to log in, then click Login.
50
Novell Business Continuity Clustering 1. 1 Administration Guide for Linux
3 In the left column, click Clusters, then click the BCC Manager link. Using this page, you can see if all cluster peer connections are up or if one or more peer connections are down. You can also see the status of the BCC resources in the business continuity cluster. Using the Server Console At the server console of a server in the business continuity cluster, enter any of the following commands to get different kinds of status information:
cluster view cluster status cluster connections
2. 5. 4 Generating a Cluster Report
You can generate a report for each cluster in the business continuity cluster to list information on a specific cluster, such as current cluster configuration, cluster nodes, and cluster resources. Replace server_ip_address with the IP address or DNS name of the server that has iManager and the Identity Manager preconfigured templates for iManager installed. [. . . ] The changes do not take effect until either a reboot of each cluster node, or by a restart of the Business Continuity Clustering software on each cluster node. Table C-4 provides an example of possible combinations of scheme and port specifier for the
<address> tag for values of the NCS:BCC Peers attribute:
Table C-4 Example of Scheme and Port Specifier Values for the NCS:BCC Peers Attribute
Value
Protocol Used
Port Used
10. 1. 1. 10 10. 1. 1. 10:1234 http://10. 1. 1. 10 http://10. 1. 1. 10:1234 https://10. 1. 1. 10 https://10. 1. 1. 10:1234
HTTPS HTTPS HTTP HTTP HTTPS HTTPS
5989 1234 5988 1234 5989 1234
C. 2. 2 Security Information for Other Products
Table C-5 provides links to security-related information for other products that impact the security of BCC:
Security Considerations
93
Table C-5 Security Information for Other Products
Product Name
Links to Security Information
NSS
"Securing Access to NSS Volumes, Directories, and Files" (http://www. novell. com/documentation/oes/nss_enu/data/ bv8n39l. html#bv8n39l). and "Security Considerations" (http://www. novell. com/ documentation/oes/nss_enu/data/bx8gp06. html).
eDirectory
Security for eDirectory is provided by NICI. See the NICI 2. 7x Administration Guide (http://www. novell. com/documentation/ nici27x/nici_admin_guide/data/a20gkue. html) "Security: Best Practices" (http://www. novell. com/ documentation/idm/admin/data/b1bsw73. html) in the Identity Manager Administration Guide. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE NOVELL BUSINESS CONTINUITY CLUSTERING 1.1 SP1
Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual NOVELL BUSINESS CONTINUITY CLUSTERING 1.1 SP1 will begin.