74
BCC 1.1 SP2: Administration Guide for NetWare 6.5 SP8
no
vd
ocx
(e
n)
13
Ma
y 20
09
6.2.2 Adding Cluster Peer Credentials
In order for one cluster to connect to a second cluster, the first cluster must be able to authenticate to
the second cluster. To make this possible, you must add the username and password of the user that
the selected cluster will use to connect to the selected peer cluster.
IMPORTANT:
In order to add or change cluster peer credentials, you must access iManager on a
server that is in the same eDirectory tree as the cluster you are adding or changing peer credentials
for.
1
In the
Connections
section of the Business Continuity Cluster Properties page, select the peer
cluster, then click
Edit
.
In order for a cluster to appear in the list of possible peer clusters, the cluster must have the
following:
Business Continuity Clustering software installed.
Identity Manager installed and running.
The BCC-specific Identity Manager drivers configured and running.
Be enabled for business continuity.
2
Add the administrator username and password that the selected cluster will use to connect to
the selected peer cluster.
When adding the administrator username, do not include the context for the user. For example,
use
bccadmin
instead of
bccadmin.prv.novell
.
Rather than using the Admin user to administer your BCC, you should consider creating
another user with sufficient rights to the appropriate contexts in your eDirectory tree to manage
your BCC. For information, see
Section 4.3, “Configuring a BCC Administrator User,” on
page 47
.
3
Repeat
Step 1
and
Step 2
for the other cluster that this cluster will migrate resources to.
4
Continue with
Adding Search-and-Replace Values to the Resource Replacement Script
.
6.2.3 Adding Search-and-Replace Values to the Resource
Replacement Script
To enable a resource for business continuity, certain values (such as IP addresses) specified in
resource load and unload scripts need to be changed in corresponding resources in the other clusters.
You need to add the search-and-replace strings that are used to transform cluster resource load and
unload scripts from this cluster to another cluster. Replacement scripts are for inbound changes to
scripts for objects being synchronized from other clusters, not outbound.
TIP:
You can see the IP addresses that are currently assigned to resources by entering the
display
secondary ipaddress
command at the NetWare server console of cluster servers.
The search-and-replace data is cluster-specific, and it is not synchronized via Identity Manager
between the clusters in the business continuity cluster.
Содержание BUSINESS CONTINUITY CLUSTERING 1.1 SP2 - ADMINISTRATION
Страница 4: ...4 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Страница 10: ...10 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Страница 26: ...26 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Страница 36: ...36 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Страница 54: ...54 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Страница 82: ...82 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Страница 92: ...92 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Страница 122: ...122 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...
Страница 126: ...126 BCC 1 1 SP2 Administration Guide for NetWare 6 5 SP8 novdocx en 13 May 2009...