cc/td/doc/product/rtrmgmt/cw2000/y2k
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

System Administration

System Administration

As your network inventory and user base grow, you need to perform certain system administration tasks to accommodate that growth. This chapter describes some of the features this product provides to help you with these tasks.

The following sections are presented in this chapter:

For detailed information on system administration, refer to the online help.

Storage Management

Perform storage management tasks to ensure that you have a set of database backups in case your current database becomes corrupted or otherwise unusable.

Use a directory naming scheme that indicates your backup dates in case you need to restore the database. You should create a separate directory for each backup. The backup directory must be writeable by the user bin on Solaris systems. The backup process creates three files:

The px.db file is your database backup. The syslog.db file is a log of database transactions. Without the syslog.db file, you cannot restore your database. The CRM_filebackup.tar file contains a collection of backup files created by Y2K Compliance Assessment Tool applications.

Backing Up Your Database

You can back up your database immediately or you can schedule it for later.

Make several directories to store your backup files. For example, if you want to perform backups weekly, use a naming convention that indicates the dates of the backups, such as:

You should create a separate directory for each backup. Store a single set of backup files in each directory. Each time you perform a backup, the Y2K Compliance Assessment Tool stores the most current db files and other files specified by the Y2K Compliance Assessment Tool components in that directory.


Note It is
recommended that you check the size of the files stored in the backup directory. Some of the files stored in the backup directory might require additional disk space.

To back up the database immediately, perform the following steps:

Step 1 Select Admin > System Admin > Back Up Data Now.

The Back Up Data Now dialog box appears. (See Figure 6-1.)


Figure 6-1: Back Up Data Now Dialog Box


Caution It is recommended that you store backups in a partition other than the one hosting the run-time database.

Step 2 Enter the fully qualified path name of the backup directory, then click Finish.

A confirmation message appears.

To schedule regular backups, perform the following steps:

Step 1 Select Admin > System Admin > Schedule Backup.

The Set Backup Schedule dialog box appears. (See Figure 6-2.)

Caution It is recommended that you store backups in a partition other than the one hosting the run-time database.

Step 2 Enter information in the fields as required, then click Finish.


Figure 6-2: Set Backup Schedule Dialog Box


Restoring a Database

Caution Restoring the database from a backup permanently replaces your database with the backed up version.

You can restore your database only by running a script from the command line.

Caution As part of restoration, the entire product, except the web server, is shut down and restarted. Ensure that you are not running any critical tasks. Otherwise, you might lose data.

Restoring a database requires you to stop all processes and then restart them. To restore the database, perform the following steps:

At the command line, ensure that you have the correct permissions, then perform the following steps:

Step 1 Stop all processes by entering:

net stop crmdmgtd

Step 2 Restore the database by entering:

%NMSROOT%\bin\restorebackup.pl backup directory
where %NMSROOT% is the installation directory.

For example, if the backups were stored in a \var\backup directory with a retention cycle of 3, there might be a \var\backup\1, \var\backup\2, and \var\backup\3. To restore the most recent version, enter the following command:

%NMSROOT%\bin\restorebackup.pl drive:\var\backup\3.

Step 3 Examine the log file in the following location to verify the database was restored:

%NMSROOT%\log\restorebackup.log

Step 4 Restart the system by entering:

net start crmdmgtd

Moving a Database

You can relocate your database by running a script from the command line. Before you begin, ensure the new location has sufficient disk space.

Caution As part of relocation, the entire product, except the web server is shut down and restarted. Ensure that you are not running any critical tasks. Otherwise, you might lose data.

To move the database, perform the following steps:

Step 1 Ensure that you have the correct permissions at the command line prompt.

Step 2 Stop all processes by entering:

net stop crmdmgtd

Step 3 Move the database from the current location to the target location by entering:

%NMSROOT%\bin\dbmove.pl target directory
where %NMSROOT% is the installation directory

Step 4 Examine the log file in the following location to verify that the database was moved:

%NMSROOT%\log\dbmove.log

Step 5 Restart the system by entering:

net start crmdmgtd

Security

Several Y2K Compliance Assessment Tool operations are potentially disruptive to the applications themselves (for example, stopping a process) and must be protected. To prevent such operations from being used accidentally or maliciously, this product uses a multilevel security system that allows access to certain features only to users who can authenticate themselves at the appropriate level.

The security features depend on the platform you are using. Table 6-1 shows available security levels:


Table 6-1: Security Levels
Level Description

0

Help Desk

1

Approver

2

Network Operator

4

Network Administrator

8

System Administrator

System administrators determine the security level of all users when they are given access to the Y2K Compliance Assessment Tool. Each security level has a different set of available tasks. For example, level 0, Help Desk, provides access only to tasks required for help desk activities. Level 4, Network Administrator, provides access to all network administration tasks. Level 8, System Administrator, provides access to all application administrative tasks.

User Account Management

Only systems administrators or superusers (admin login) can add or delete users or change certain user information. All users can change their own passwords.

Adding Users

To add a user, perform the following steps:

Step 1 Select Admin > User Accounts > Add Users.

The Add System Users dialog box appears. (See Figure 6-3.)


Figure 6-3: Add System Users Dialog Box


Step 2 Enter information in all fields, then click Add.

A confirmation message appears.


Note The
Y2K Compliance Assessment Tool software cannot recover forgotten passwords. An administrator-level user must either change the password or delete and then add the user again.

Deleting Users

To delete users, perform the following steps:

Step 1 Select Admin > User Accounts > Modify/Delete Users.

The Modify Users dialog box appears. (See Figure 6-4.)


Figure 6-4: Modify/Delete Users Dialog Box


Step 2 Select the name of the user, then click Delete.

Step 3 Click Delete again. A confirmation message appears.


Note The
username admin is reserved and cannot be deleted.

Changing Passwords

To change a password, perform the following steps:

Step 1 Select Admin > User Accounts > Modify My Profile.

The Modify My Profile dialog box appears. (See Figure 6-5.)


Figure 6-5: Modify My Profile Dialog Box


Step 2 Enter the new password and any other settings you want to change, then click Modify.

A confirmation message appears.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Sep 30 16:04:52 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.