CSM guide for the PSSP System Administrator

Detalles Bibliográficos
Autor Corporativo: International Business Machines Corporation. International Technical Support Organization (-)
Otros Autores: Quintero, Dino (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: [S.l.] : IBM, International Technical Support Organization 2003.
Edición:1st ed
Colección:IBM redbooks.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009644288806719
Tabla de Contenidos:
  • Front cover
  • Contents
  • Notices
  • Trademarks
  • Preface
  • The team that wrote this redbook
  • Become a published author
  • Comments welcome
  • Chapter 1. Introduction
  • 1.1 History and roots of CSM for AIX
  • 1.2 CSM 1.3 for AIX 5L
  • 1.3 Our test environment
  • 1.4 Topics not covered
  • 1.5 Additional references
  • Chapter 2. Planning
  • 2.1 Differences between PSSP and CSM
  • 2.1.1 PSSP transition
  • 2.1.2 Hardware requirements
  • 2.1.3 Software requirements
  • 2.1.4 License
  • 2.2 Control workstation and boot-install server
  • 2.2.1 Management server
  • 2.2.2 NIM resource server
  • 2.2.3 HACWS
  • 2.3 SP frames and nodes
  • 2.3.1 The SP model of frames and nodes
  • 2.3.2 Frame
  • 2.3.3 Node numbering and naming
  • 2.3.4 Managed nodes
  • 2.3.5 Remote power
  • 2.3.6 Remote console
  • 2.3.7 Node definition
  • 2.4 Networking
  • 2.4.1 Administrative VLAN
  • 2.4.2 Management VLAN
  • 2.4.3 Public VLAN
  • 2.5 CSM license and components
  • 2.5.1 Try and Buy license
  • 2.5.2 CSM LPP filesets
  • 2.5.3 Other AIX software
  • 2.5.4 Open source software
  • 2.6 Configuration options that fit your needs
  • 2.6.1 Installation choices
  • 2.6.2 Security
  • 2.6.3 Time service choices - Network Time Protocol (NTP)
  • 2.6.4 User directory mounting choices - automounter
  • 2.6.5 System file management choices - file collections
  • 2.6.6 User account management choices
  • 2.6.7 Accounting choices
  • 2.7 Cluster-related licensed programs
  • 2.7.1 GPFS
  • 2.7.2 HACMP
  • 2.7.3 LoadLeveler
  • 2.7.4 PE
  • 2.7.5 Parallel ESSL
  • 2.7.6 VSD
  • Chapter 3. Installation
  • 3.1 Preparing the management server
  • 3.1.1 Configure RS-232 control lines
  • 3.1.2 Tune network settings
  • 3.1.3 Load filesets
  • 3.1.4 Create file systems
  • 3.2 Installing the management server
  • 3.2.1 Install prerequisite software
  • 3.2.2 Copy software images
  • 3.2.3 Install management software.
  • 3.2.4 Set up the authentication environment
  • 3.2.5 Configure the management server
  • 3.2.6 NTP configuration
  • 3.3 Defining nodes to be managed
  • 3.3.1 Defining hardware control points
  • 3.3.2 Listing candidate nodes
  • 3.3.3 Acquire the hardware Ethernet address
  • 3.4 Customization of managed nodes
  • 3.5 Installing and configuring managed nodes
  • 3.5.1 CSM and PSSP relationship to NIM
  • 3.5.2 Preparing for installation in CSM
  • 3.5.3 Preparing for installation in NIM
  • 3.6 Post-install customization
  • 3.7 The setup_server command
  • 3.8 CSM software maintenance
  • 3.9 nodecond vs. netboot
  • Chapter 4. PSSP SDR vs. RSCT SR
  • 4.1 SDR architecture summary
  • 4.2 Data in the SDR
  • 4.3 RSCT system registry overview
  • 4.3.1 The distributed RMC infrastructure
  • 4.3.2 Where system registry data is stored
  • 4.3.3 Querying a machine's RMC "personality"
  • 4.4 CSM data in the system registry
  • 4.4.1 Persistent data on the CSM clients
  • 4.4.2 Persistent data on the CSM management server
  • 4.4.3 Dynamic CSM data
  • 4.5 Listing configuration data: splstdata equivalents
  • 4.5.1 splstdata options that have no equivalent in CSM
  • 4.5.2 Configuration data not stored in the database
  • 4.5.3 splstdata options that do have a CSM equivalent
  • 4.5.4 Node groups
  • Chapter 5. Administration
  • 5.1 Node groupings
  • 5.2 CFM versus file collections
  • 5.3 User management
  • 5.3.1 User management with CFM
  • 5.3.2 User management with NIS
  • 5.3.3 User management with LDAP
  • 5.3.4 Home directory access
  • 5.4 Cluster startup and shutdown
  • 5.5 Software maintenance
  • 5.5.1 Maintaining software with NIM
  • 5.5.2 Maintaining software with CFM
  • 5.5.3 Using dsh
  • 5.6 Backups
  • 5.6.1 mksysb backups
  • 5.6.2 CSM data backups
  • 5.6.3 Recovery tips
  • 5.7 Accounting
  • 5.8 Remote command execution
  • 5.8.1 dsh
  • 5.8.2 DCEM
  • 5.9 Hardware control.
  • 5.9.1 Hardware control in PSSP
  • 5.9.2 CSM hardware control architecture
  • 5.9.3 Remote console access in CSM (rconsole)
  • 5.9.4 Remote power control in CSM (rpower)
  • 5.9.5 Additional CSP hardware control commands
  • 5.9.6 Network booting and the netboot command
  • 5.9.7 Getting whole-cluster summaries similar to spmon
  • 5.10 Microcode updates
  • 5.11 Additional administration tools (snap commands)
  • Chapter 6. Monitoring
  • 6.1 Architecture difference
  • 6.2 RMC resource classes and manager
  • 6.3 Defining a monitor with predefined resource class
  • 6.3.1 mkcondition
  • 6.3.2 mkresponse
  • 6.3.3 mkcondresp and startcondresp
  • 6.3.4 Event and response on the same server
  • 6.3.5 Event on managed nodes, response on management server
  • 6.3.6 Event on all managed nodes and the management server
  • 6.3.7 Event on some managed nodes
  • 6.3.8 Event and response on the management server
  • 6.3.9 Event and response on different managed nodes
  • 6.3.10 Monitoring errlog
  • 6.3.11 Generating AIX error log or BSD syslog entries
  • 6.3.12 Sending SNMP traps
  • 6.4 Defining custom monitors
  • 6.4.1 CFMRootModTime
  • 6.5 ACL, logs, and relevant commands
  • 6.6 Visual cluster monitoring
  • Chapter 7. Security and access control
  • 7.1 Overview of PSSP's and CSM's security models
  • 7.2 Available remote commands options
  • 7.2.1 The rsh and ssh commands
  • 7.2.2 Kerberizing rsh/rcp in CSM
  • 7.3 Security for CSM internal cluster components
  • 7.3.1 Host Based Authentication (HBA) in RSCT
  • 7.3.2 RMC access control files and identity mapping service
  • 7.4 Least privilege administration
  • 7.5 Hardware control and serial connections access
  • 7.6 Securing Web-based System Manager
  • 7.7 Access control relating to NIM
  • Appendix A. Command cross-references
  • Appendix B. Cluster startup and shutdown
  • B.1 Monitoring node status for startup and shutdown.
  • B.2 Detecting node startup completion
  • B.3 Responding to status changes
  • B.3.1 Defining the monitored conditions
  • B.3.2 Defining the response to the conditions
  • B.3.3 Making the status updates available to scripts
  • B.3.4 Activating the ERRM responses
  • B.4 Cluster startup and shutdown processing
  • B.4.1 Controlling the startup and shutdown sequencing
  • Appendix C. NIM examples
  • C.1 NIM integration
  • C.2 NIM resources
  • C.2.1 NIM resource groups
  • C.2.2 Resources allocated for an install
  • C.3 Installing additional filesets
  • C.4 Using NIM to install and configure LDAP clients
  • C.4.1 The installation logic
  • C.5 A working example of openssh installation
  • C.5.1 The installation logic
  • Appendix D. Installation process details
  • D.1 A closer look at CSM's updatenode script
  • D.1.1 Remote shell setup
  • D.1.2 Prepare RSCT
  • D.1.3 Prepare managed node configuration data
  • D.1.4 Perform customization on the node
  • D.1.5 A close look at the updatenode.client script
  • D.1.6 Record update completion
  • D.1.7 Distribute configuration files
  • D.2 CSM installation details using a NIM install
  • D.2.1 Populating the NIM database from CSM
  • D.2.2 The mechanics of integrated AIX and CSM installation via NIM
  • D.2.3 A closer look at csmsetupnim
  • D.2.4 NIM installation processing
  • D.2.5 A closer look at csmprereboot
  • D.2.6 Additional NIM processing
  • D.2.7 A closer look at the csmfirstboot script
  • D.3 Comparison with PSSP
  • D.4 Using alternate NIM servers
  • D.4.1 Defining NIM machine resources
  • Abbreviations and acronyms
  • Appendix E. Additional material
  • E.1 Locating the sample code
  • Related publications
  • IBM Redbooks
  • Other publications
  • Online resources
  • How to get IBM Redbooks
  • Index
  • Back cover.