OES 2018 SP3: OES Cluster Services for Linux Administration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Open Enterprise Server 2018 SP3 OES Cluster Services for Linux Administration Guide July 2021 Legal Notices © Copyright 2017 - 2021 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are as may be set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. 2 Contents About This Guide 13 1 Overview of OES Cluster Services 15 1.1 Why Should I Use Clusters?. .15 1.2 Benefits of OES Cluster Services. .16 1.3 Product Features . .16 1.4 Clustering for High Availability . .17 1.5 Shared Disk Scenarios . .19 1.5.1 Using Fibre Channel Storage Systems . .19 1.5.2 Using iSCSI Storage Systems . .20 1.5.3 Using Shared SCSI Storage Systems. 21 1.6 Terminology . .21 1.6.1 The Cluster . .21 1.6.2 Cluster Resources . .22 1.6.3 Failover Planning. .24 2 What’s New or Changed for OES Cluster Services 27 2.1 What’s New or Changed in OES Cluster Services (OES 2018 SP3) . .27 2.2 What’s New or Changed in OES Cluster Services (OES 2018 SP2) . .28 2.3 What’s New or Changed in Novell Cluster Services (OES 2018 SP1) . .28 2.4 What’s New or Changed in Novell Cluster Services (OES 2018) . .29 3 Planning for a Cluster 31 3.1 Determining Your Design Criteria. .31 3.2 Using Cluster Best Practices . .31 3.3 Planning the LAN Connectivity . .32 3.3.1 VLAN . .32 3.3.2 Channel Bonding. .33 3.3.3 Spanning Tree Protocol . .33 3.3.4 IP Addresses . .33 3.3.5 Name Resolution . .33 3.4 Planning the Shared Storage Connectivity. .34 3.5 Planning the Shared Storage Solution . .34 3.6 Planning the eDirectory Deployment . .34 3.6.1 Object Location. .34 3.6.2 Cluster OU Context. .35 3.6.3 Cluster OU Partitioning and Replication . .35 3.7 Planning for Shared Storage as Cluster Resources . .35 3.8 Planning for OES Services as Cluster Resources . .35 4 Planning for OES Cluster Services 37 4.1 Cluster Administration Requirements . .37 Contents 3 4.1.1 Cluster Installation Administrator . .37 4.1.2 NCS Proxy User . .38 4.1.3 Cluster Administrator or Administrator-Equivalent User . .40 4.2 IP Address Requirements . .40 4.3 Volume ID Requirements . .40 4.4 Hardware Requirements . .41 4.5 Virtualization Environments . .41 4.6 Software Requirements for Cluster Services . .41 4.6.1 Open Enterprise Server 2018 SP3 . 42 4.6.2 OES Cluster Services . .42 4.6.3 NetIQ eDirectory 9.1 . .42 4.6.4 SLP . .45 4.6.5 iManager 3.2.1 . .46 4.6.6 Clusters Plug-in for iManager . .46 4.6.7 Storage-Related Plug-Ins for iManager . .47 4.6.8 SFCB and CIMOM . .48 4.6.9 OES Credential Store . .49 4.6.10 Web Browser. .49 4.7 Software Requirements for Cluster Resources . .49 4.7.1 NCP Server for Linux. .50 4.7.2 Storage Services File System for Linux . 50 4.7.3 LVM Volume Groups and Linux POSIX File Systems . .51 4.7.4 NCP Volumes on Linux POSIX File Systems. .51 4.7.5 Dynamic Storage Technology Shadow Volume Pairs . .51 4.7.6 NCP File Access . .51 4.7.7 OES AFP . .52 4.7.8 OES CIFS. .52 4.7.9 OES Domain Services for Windows . ..
Recommended publications
  • Mac OS X Server Administrator's Guide

    Mac OS X Server Administrator's Guide

    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
  • OS X Support Essentials 10.9 Apple Pro Training Series

    OS X Support Essentials 10.9 Apple Pro Training Series

    Apple Pro Training Series: OS X Support Essentials 10.9 Apple Pro Training Series Training Apple Pro Network Configuration Locations: One selected by user Automatic Work Home Test Ethernet Wi-Fi Ethernet 2 FireWire VPN Services: Multiple services activate and prioritized based on service order Understand OS X Mavericks underlying technologies, Configurestand-alone and networked Mac Troubleshoot software and hardware issues software components, and industry-standard protocols. computers with step-by-step instructions. using Apple-recommended procedures and tools. OS X Mavericks Supporting and Troubleshooting OS X Support Essentials 10.9 The Apple-Certified Way to Learn This is the official curriculum of the Apple Mavericks 101: OS X The Apple Pro Training Series is both a self-paced Support Essentials 10.9 course and preparation for Apple learning tool and the official curriculum of the Apple Training and Certified Support Professional (ACSP) 10.9 certification— Certification program. Upon completing the course material in this as well as a top-notch primer for anyone who needs to support, book, you can become an Apple Certified Support Professional by troubleshoot, or optimize OS X Mavericks. This guide provides passing the OS X Support Essentials 10.9 Exam. Work through this comprehensive coverage of Mavericks and is part of the Apple book as self-study material or attend a class at an Apple Authorized Pro Training series—the only Apple-certified books on the Training Center. To learn more, please visit training.apple.com. market. Designed for support technicians, help desk specialists, and ardent Mac users, this guide takes you deep inside the Also in the Apple Pro Training Series: Mavericks operating system.
  • Computer Service Technician- CST Competency Requirements

    Computer Service Technician- CST Competency Requirements

    Computer Service Technician- CST Competency Requirements This Competency listing serves to identify the major knowledge, skills, and training areas which the Computer Service Technician needs in order to perform the job of servicing the hardware and the systems software for personal computers (PCs). The present CST COMPETENCIES only address operating systems for Windows current version, plus three older. Included also are general common Linux and Apple competency information, as proprietary service contracts still keep most details specific to in-house service. The Competency is written so that it can be used as a course syllabus, or the study directed towards the education of individuals, who are expected to have basic computer hardware electronics knowledge and skills. Computer Service Technicians must be knowledgeable in the following technical areas: 1.0 SAFETY PROCEDURES / HANDLING / ENVIRONMENTAL AWARENESS 1.1 Explain the need for physical safety: 1.1.1 Lifting hardware 1.1.2 Electrical shock hazard 1.1.3 Fire hazard 1.1.4 Chemical hazard 1.2 Explain the purpose for Material Safety Data Sheets (MSDS) 1.3 Summarize work area safety and efficiency 1.4 Define first aid procedures 1.5 Describe potential hazards in both in-shop and in-home environments 1.6 Describe proper recycling and disposal procedures 2.0 COMPUTER ASSEMBLY AND DISASSEMBLY 2.1 List the tools required for removal and installation of all computer system components 2.2 Describe the proper removal and installation of a CPU 2.2.1 Describe proper use of Electrostatic Discharge
  • Novell CIFS for Linux Administration Guide 9.4.2 Creating Shared Pools and Accessing Sharepoints

    Novell CIFS for Linux Administration Guide 9.4.2 Creating Shared Pools and Accessing Sharepoints

    Open Enterprise Server 11 SP3 Novell CIFS Administration Guide July 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. Copyright © 2014 - 2016 Novell, Inc. All Rights Reserved. Contents About This Guide 7 1 Overview of CIFS 9 1.1 Understanding CIFS. 9 1.2 CIFS and Universal Password . 10 1.3 CIFS Features and Capabilities . 10 1.4 Limitations . 12 1.5 What's Next . 12 2 What’s New or Changed in Novell CIFS 13 2.1 What’s New (OES11 SP3) . 13 2.2 What’s New (OES11 SP2 May 2016 Patches). 13 2.3 What’s New (OES11 SP2 May 2014 Patches). 13 2.4 What’s New (OES 11 SP1 January 2014 Patches) . 13 2.5 What’s New (OES 11 SP2). 14 2.6 What’s New or Changed in Novell CIFS (OES 11 SP1). 15 2.7 What’s New or Changed in Novell CIFS (OES 11). 15 3 CIFS Monitoring and Management 17 3.1 Overview of CIFS Monitoring and Management . 17 3.2 Using CIFS Monitoring and Management . .17 3.3 Monitoring Connections . 17 3.3.1 Access Modes . 18 3.4 Monitoring Files . 18 4 Planning and Implementing CIFS 21 4.1 Planning for CIFS. 21 4.2 Preparing for CIFS Installation . 21 4.2.1 Prerequisites . 21 4.2.2 Required eDirectory Rights and Permissions . 22 4.3 CIFS System Prerequisites . 24 4.3.1 Server Operating System Requirements .
  • A Brief Technical Introduction

    A Brief Technical Introduction

    Mac OS X A Brief Technical Introduction Leon Towns-von Stauber, Occam's Razor LISA Hit the Ground Running, December 2005 http://www.occam.com/osx/ X Contents Opening Remarks..............................3 What is Mac OS X?.............................5 A New Kind of UNIX.........................12 A Diferent Kind of UNIX..................15 Resources........................................39 X Opening Remarks 3 This is a technical introduction to Mac OS X, mainly targeted to experienced UNIX users for whom OS X is at least relatively new This presentation covers primarily Mac OS X 10.4.3 (Darwin 8.3), aka Tiger X Legal Notices 4 This presentation Copyright © 2003-2005 Leon Towns-von Stauber. All rights reserved. Trademark notices Apple®, Mac®, Macintosh®, Mac OS®, Finder™, Quartz™, Cocoa®, Carbon®, AppleScript®, Bonjour™, Panther™, Tiger™, and other terms are trademarks of Apple Computer. See <http://www.apple.com/legal/ appletmlist.html>. NeXT®, NeXTstep®, OpenStep®, and NetInfo® are trademarks of NeXT Software. See <http://www.apple.com/legal/nexttmlist.html>. Other trademarks are the property of their respective owners. X What Is It? 5 Answers Ancestry Operating System Products The Structure of Mac OS X X What Is It? Answers 6 It's an elephant I mean, it's like the elephant in the Chinese/Indian parable of the blind men, perceived as diferent things depending on the approach X What Is It? Answers 7 Inheritor of the Mac OS legacy Evolved GUI, Carbon (from Mac Toolbox), AppleScript, QuickTime, etc. The latest version of NeXTstep Mach, Quartz (from Display PostScript), Cocoa (from OpenStep), NetInfo, apps (Mail, Terminal, TextEdit, Preview, Interface Builder, Project Builder, etc.), bundles, faxing from Print panel, NetBoot, etc.
  • Mac OS X Intro for UNIX Users

    Mac OS X Intro for UNIX Users

    Mac OS X An Introduction for UNIX Users Leon Towns-von Stauber, Occam's Razor Seattle BSD Users Group, October 2004 http://www.occam.com/osx/ X Contents Opening Remarks.............................3 Where Did Mac OS X Come From?.....5 What is Mac OS X?..........................13 A New Kind of UNIX........................25 A Different Kind of UNIX.................28 Why Use Mac OS X?.........................60 Resources.......................................63 Closing Remarks.............................67 X Opening Remarks 3 This is a technical introduction to Mac OS X, mainly targeted to experienced UNIX users for whom OS X is at least relatively new Some emphasis on comparisons with FreeBSD I'm assuming basic familiarity with operating system design Where I'm coming from: UNIX user and some-time admin since 1990 Full-time UNIX admin since 1995 NeXTstep user and admin since 1991 This presentation covers primarily Mac OS X 10.3.5 (Darwin 7.5) X Legal Notices 4 This presentation Copyright © 2003-2004 Leon Towns-von Stauber. All rights reserved. Trademark notices Apple®, Mac®, Macintosh®, Mac OS®, Aqua®, Finder™, Quartz™, Cocoa®, Carbon®, AppleScript®, Rendezvous™, Panther™, and other terms are trademarks of Apple Computer. See <http:// www.apple.com/legal/appletmlist.html>. NeXT®, NeXTstep®, OpenStep®, and NetInfo® are trademarks of NeXT Software. See <http://www.apple.com/legal/nexttmlist.html>. PowerPC™ is a trademark of International Business Machines. Java™ is a trademark of Sun Microsystems. Other trademarks are the property of their
  • OES 2015 SP1: Novell CIFS for Linux Administration Guide

    OES 2015 SP1: Novell CIFS for Linux Administration Guide

    Open Enterprise Server 2015 SP1 Novell CIFS Administration Guide June 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. Copyright © 2016 Novell, Inc., a Micro Focus company. All Rights Reserved. Contents About This Guide 9 1 Overview of CIFS 11 1.1 Understanding CIFS. 11 1.2 CIFS and Universal Password . 12 1.3 CIFS Features and Capabilities . 12 1.4 Limitations . 14 1.5 What's Next . 14 2 What’s New or Changed in CIFS 15 2.1 What’s New or Changed in CIFS (Update 33 - OES 2015 SP1) . 15 2.2 What’s New or Changed in CIFS (OES 2015 SP1 September 2017 Patch) . 15 2.3 What’s New or Changed in CIFS (OES 2015 SP1 July 2017 Patch) . 16 2.4 What’s New or Changed in CIFS (OES 2015 SP1 March 2017 Patch) . 16 2.5 What’s New or Changed in CIFS (OES 2015 and OES 2015 SP1 March 2017 Patch). 16 2.6 What’s New or Changed in CIFS (OES 2015 SP1 September 2016 Patch) . 16 2.7 What’s New or Changed in CIFS (OES 2015 SP1) . 17 2.8 What’s New or Changed in CIFS (OES 2015) . 17 3 Planning and Implementing CIFS 21 3.1 Planning for CIFS. 21 3.2 Preparing for CIFS Installation . 21 3.2.1 Prerequisites . 21 3.2.2 Required eDirectory Rights and Permissions . 22 3.3 CIFS System Prerequisites .
  • OS X Mavericks

    OS X Mavericks

    OS X Mavericks Core Technologies Overview October 2013 Core Technologies Overview 2 OS X Mavericks Contents Page 4 Introduction Page 5 System Startup BootROM EFI Kernel Drivers Initialization Address Space Layout Randomization (ASLR) Compressed Memory Power Efficiency App Nap Timer Coalescing Page 10 Disk Layout Partition Scheme Core Storage File Systems Page 12 Process Control Launchd Loginwindow Grand Central Dispatch Sandboxing GateKeeper XPC Page 19 Network Access Ethernet Wi-Fi Multihoming IPv6 IP over Thunderbolt Network File Systems Access Control Lists Directory Services Remote Access Bonjour Page 25 Document Lifecycle Auto Save Automatic Versions Document Management Version Management iCloud Storage Core Technologies Overview 3 OS X Mavericks Page 28 Data Management Spotlight Time Machine Page 30 Developer Tools Xcode LLVM Instruments Accelerate Automation WebKit Page 36 For More Information Core Technologies Overview 4 OS X Mavericks Introduction With more than 72 million users—consumers, scientists, animators, developers, and system administrators—OS X is the most widely used UNIX® desktop operating system. In addition, OS X is the only UNIX environment that natively runs Microsoft Office, Adobe Photoshop, and thousands of other consumer applications—all side by side with traditional command-line UNIX applications. Tight integration with hardware— from the sleek MacBook Air to the powerful Mac Pro—makes OS X the platform of choice for an emerging generation of power users. This document explores the powerful industry standards and breakthrough innovations in the core technologies that power Apple’s industry-leading user experiences. We walk you through the entire software stack, from firmware and kernel to iCloud and devel- oper tools, to help you understand the many things OS X does for you every time you use your Mac.
  • Client-Side Name Collision Vulnerability in the New Gtld Era: a Systematic Study

    Client-Side Name Collision Vulnerability in the New Gtld Era: a Systematic Study

    Session D5: Network Security CCS’17, October 30-November 3, 2017, Dallas, TX, USA Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study Qi Alfred Chen, Matthew Thomas†, Eric Osterweil†, Yulong Cao, Jie You, Z. Morley Mao University of Michigan, †Verisign Labs [email protected],{mthomas,eosterweil}@verisign.com,{yulongc,jieyou,zmao}@umich.edu ABSTRACT was recently annouced (US-CERT alert TA16-144A), which specif- The recent unprecedented delegation of new generic top-level do- ically targets the leaked WPAD (Web Proxy Auto-Discovery) ser- mains (gTLDs) has exacerbated an existing, but fallow, problem vice discovery queries [79, 87]. In this attack, the attacker simply called name collisions. One concrete exploit of such problem was needs to register a domain that already receives vulnerable internal discovered recently, which targets internal namespaces and en- WPAD query leaks. Since WPAD queries are designed for discover- ables Man in the Middle (MitM) attacks against end-user devices ing and automatically conguring web proxy services, exploiting from anywhere on the Internet. Analysis of the underlying prob- these leaks allows the attacker to set up Man in the Middle (MitM) lem shows that it is not specic to any single service protocol, but proxies on end-user devices from anywhere on the Internet. little attention has been paid to understand the vulnerability status The cornerstone of this attack exploits the leaked service dis- and the defense solution space at the service level. In this paper, covery queries from the internal network services using DNS- we perform the rst systematic study of the robustness of internal based service discovery.
  • Sharing Mac® Files on Windows® Servers a Technical Best Practices Whitepaper

    Sharing Mac® Files on Windows® Servers a Technical Best Practices Whitepaper

    WHITE PAPER The Best of Both Worlds: Sharing Mac® Files on Windows® Servers A Technical Best Practices Whitepaper About This Document Apple’s® Mac® OS X computer platform has seen its market share grow rapidly in Enterprise environments recently. This has been driven by the popularity of innovative products like the iPhone® and the MacBook Air, as well as Mac OS X’s security and its ability to run virtualized instances of Windows® applications. As a result, Macs are entering the Enterprise through senior level executives or formal corporate pilot projects. Laura DiDio from industry consultancy Information Technology Intelligence Corporation released a survey in late 2008 that showed 68% of some 700 companies polled planned to allow their end-users to deploy Macs as their work systems in the next 12 months. Separately, a recent survey by the Enterprise Desktop Alliance showed that 91% of IT administrators indicated that integration and management parity between Macs and PCs were major issues of importance to their organization. This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing GroupLogic’s ExtremeZ-IP® solution for the first time. Overview While Apple’s Xserve provides a pure Mac file server solution, most organizations use Windows file servers. Additionally, the official Xserve end-of-life was declared by Apple in January 2011 and Apple no longer offers a server-grade, rack- mountable hardware solution. Existing investments in Windows technology and training, heavy usage, a high volume of users, virtualization and cluster environments often mean that changing a company’s IT strategy is neither economically nor politically feasible.
  • OES 11 SP1: Novell Cluster Services 2.1 for Linux Administration Guide 1 1Overview of Novell Cluster Services

    OES 11 SP1: Novell Cluster Services 2.1 for Linux Administration Guide 1 1Overview of Novell Cluster Services

    www.novell.com/documentation Novell Cluster ServicesTM 2.1 for Linux Administration Guide Open Enterprise Server 11 SP1 October 3, 2012 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information on exporting Novell software.
  • Mac OS X Server File Services Administration for Version 10.4 Or Later

    Mac OS X Server File Services Administration for Version 10.4 Or Later

    Mac OS X Server File Services Administration For Version 10.4 or Later K Apple Computer, Inc. © 2005 Apple Computer, Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication for the purpose of learning to use such software. No part of this publication may be reproduced or transmitted for commercial purposes, such as selling copies of this publication or for providing paid-for support services. Every effort has been made to ensure that the information in this manual is accurate. Apple Computer, Inc., is not responsible for printing or clerical errors. Apple 1 Infinite Loop Cupertino CA 95014-2084 www.apple.com The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleShare, AppleTalk, Mac, Macintosh, QuickTime, Xgrid, and Xserve are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. Finder is a trademark of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. Other company and product names mentioned herein are trademarks of their respective companies. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation.