ix
12.3. Configuring SASL Identity Mapping from the Console ............................................... 367
12.4. Configuring SASL Identity Mapping from the Command-Line ..................................... 369
12.5. Configuring Kerberos .............................................................................................. 369
12.5.1. Realms ........................................................................................................ 369
12.5.2. Configuring the KDC Server ......................................................................... 370
12.5.3. Example: Configuring an Example KDC Server .............................................. 371
12.5.4. Configuring SASL Authentication at Directory Server Startup ........................... 371
13. Monitoring Server and Database Activity 373
13.1. Viewing and Configuring Log Files ........................................................................... 373
13.1.1. Defining a Log File Rotation Policy ............................................................... 373
13.1.2. Defining a Log File Deletion Policy ................................................................ 374
13.1.3. Access Log .................................................................................................. 375
13.1.4. Error Log ..................................................................................................... 376
13.1.5. Audit Log ..................................................................................................... 378
13.2. Manual Log File Rotation ........................................................................................ 379
13.3. Monitoring Server Activity ........................................................................................ 379
13.3.1. Monitoring the Server from the Directory Server Console ................................ 379
13.3.2. Monitoring the Directory Server from the Command Line ................................ 383
13.4. Monitoring Database Activity ................................................................................... 385
13.4.1. Monitoring Database Activity from the Directory Server Console ...................... 385
13.4.2. Monitoring Databases from the Command Line .............................................. 388
13.5. Monitoring Database Link Activity ............................................................................ 390
14. Monitoring Directory Server Using SNMP 393
14.1. About SNMP .......................................................................................................... 393
14.2. Configuring the Master Agent .................................................................................. 394
14.3. Configuring the Subagent ........................................................................................ 394
14.3.1. Subagent Configuration File .......................................................................... 394
14.3.2. Starting the Subagent .................................................................................. 395
14.3.3. Testing the Subagent ................................................................................... 395
14.4. Configuring SNMP Traps ......................................................................................... 396
14.5. Configuring the Directory Server for SNMP .............................................................. 396
14.6. Using the Management Information Base ................................................................. 397
14.6.1. Operations Table .......................................................................................... 397
14.6.2. Entries Table ................................................................................................ 399
14.6.3. Entity Table .................................................................................................. 399
14.6.4. Interaction Table .......................................................................................... 400
15. Tuning Directory Server Performance 403
15.1. Tuning Server Performance ..................................................................................... 403
15.2. Tuning Database Performance ................................................................................ 404
15.2.1. Optimizing Search Performance .................................................................... 404
15.2.2. Tuning Transaction Logging .......................................................................... 405
15.2.3. Changing the Location of the Database Transaction Log ................................. 406
15.2.4. Changing the Database Checkpoint Interval .................................................. 406
15.2.5. Disabling Durable Transactions ..................................................................... 407
15.2.6. Specifying Transaction Batching .................................................................... 407
15.3. Miscellaneous Tuning Tips ...................................................................................... 408
15.3.1. Avoid Creating Entries Under the cn=config Entry in the dse.ldif File ................ 408
16. Administering Directory Server Plug-ins 409
16.1. Server Plug-in Functionality Reference ..................................................................... 409
Содержание DIRECTORY SERVER 8.0
Страница 18: ...xviii ...
Страница 29: ...Configuring the Directory Manager 11 6 Enter the new password and confirm it 7 Click Save ...
Страница 30: ...12 ...
Страница 112: ...94 ...
Страница 128: ...110 ...
Страница 190: ...Chapter 6 Managing Access Control 172 4 Click New to open the Access Control Editor ...
Страница 224: ...206 ...
Страница 324: ...306 ...
Страница 334: ...316 ...
Страница 358: ...340 ...
Страница 410: ...392 ...
Страница 420: ...402 ...
Страница 444: ...426 ...
Страница 454: ...436 ...
Страница 464: ...446 ...
Страница 484: ...466 ...
Страница 512: ...494 ...
Страница 522: ...504 ...