|
As your network inventory and user base grow, you need to perform certain system administration tasks to accommodate that growth. This chapter describes some of the features this product provides to help you with these tasks.
The following sections are presented in this chapter:
For detailed information on System Administration, refer to the online help.
Use a directory naming scheme that indicates your backup dates in case you need to restore the database. You should create a separate directory for each backup. The backup directory must be writeable by the user bin on Solaris systems. The backup process creates three files:
The px.db file is your database backup. The syslog.db file is a log of database transactions. Without the syslog.db file, you cannot restore your database. The CRM_filebackup.tar file contains a collection of backup files created by Y2K Compliance Assessment Tool applications.
You can back up your database immediately or you can schedule it for later.
You should create a separate directory for each backup. Store a single set of backup files in each directory. Each time you perform a backup, the Y2K Compliance Assessment Tool stores the most current db files and other files specified by the components in that directory.
To back up the database immediately, perform the following steps:
Step 1 Select Admin > System Admin > Back Up Data Now.
The Back Up Data Now dialog box appears. (See Figure 5-1.)
Caution It is recommended that you store backups in a partition other than the one hosting the run-time database. |
Step 2 Enter the fully qualified path name of the backup directory, then click Finish.
A confirmation message appears.
To schedule regular backups, perform the following steps:
Step 1 Select Admin > System Admin > Schedule Backup.
The Set Backup Schedule dialog box appears. (See Figure 5-2.)
Caution It is recommended that you store backups in a partition other than the one hosting the run-time database. |
Step 2 Enter information in the fields as required, then click Finish.
Caution Restoring the database from a backup permanently replaces your database with the backed up version. |
You can restore your database only by running a script from the command line.
Caution As part of restoration, the entire product is shut down and restarted. Ensure that you are not running any critical tasks. Otherwise, you might lose data. |
Restoring a database requires you to stop all processes and then restart them. To restore the database, perform the following steps:
Step 1 Log in as the superuser at the command line and enter the root password.
Step 2 Stop all processes by entering: /etc/init.d/dmgtd stop
Step 3 Restore the database by entering:
$NMSROOT/bin/perl $NMSROOT/bin/restorebackup.pl < backup directory >
where $NMSROOT is the installation directory.
For example, if the backups are stored in the /var/backup directory with a retention cycle of 3, there might be a /var/backup/1, /var/backup/2, and /var/backup/3. To restore the most recent version, enter the following command:
$NMSROOT/bin/perl $NMSROOT/bin/restorebackup.pl /var/backup/3.
Step 4 Examine the log file in the following location to verify that the database was restored:
/var/adm/CSCOpx/log/restorebackup.log
Step 5 Restart the system by entering: /etc/init.d/dmgtd start
The Process Status table displays the new status of all processes.
You can relocate your database by running a script from the command line. Before you begin, ensure the new location has sufficient disk space.
Caution As part of relocation, the entire product, is shut down and restarted. Ensure that you are not running any critical tasks. Otherwise, you might lose data. |
To move the database, perform the following steps:
Step 1 Log in as the superuser at the command line, and enter the root password.
Step 2 Stop all processes by entering: /etc/init.d/dmgtd stop
Step 3 Move the database from the current location to the target location by entering:
$NMSROOT/bin/perl $NMSROOT/bin/dbmove.pl < target directory >
where $NMSROOT is the installation directory and CSCOpx is the default directory.
Step 4 Verify the move by examining the contents of the log file in the following location:
$NMSROOT/bin/dbmove.log file
Step 5 Restart the system by entering: /etc/init.d/dmgtd start
Several operations are potentially disruptive to the applications themselves (for example, stopping a process) and must be protected. To prevent such operations from being used accidentally or maliciously, this product uses a multilevel security system that allows access to certain features only to users who can authenticate themselves at the appropriate level.
The security features depend on the platform you are using. Table 5-1 shows available security levels:
Level | Description |
---|---|
0 | |
1 | |
2 | |
4 | |
8 |
Only systems administrators or superusers (admin login) can add or delete users or change certain user information. All users can change their own passwords.
To add a user, perform the following steps:
Step 1 Select Admin > User Accounts > Add Users.
The Add System Users dialog box appears. (See Figure 5-3.)
Step 2 Enter information in all fields, then click Add.
A confirmation message appears.
To delete users, perform the following steps:
Step 1 Select Admin > User Accounts > Modify/Delete Users.
The Modify Users dialog box appears. (See Figure 5-4.)
Step 2 Select the name of the user, then click Delete.
Step 3 Click Delete again.
A confirmation message appears.
To change a password, perform the following steps:
Step 1 Select Admin > User Accounts > Modify My Profile.
The Modify My Profile dialog box appears. (See Figure 5-5.)
Step 2 Enter the new password and any other settings you want to change, then click Modify. A confirmation message appears.
Posted: Thu Sep 30 16:06:27 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.