No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

eSight V300R010C00 Maintenance Guide 07

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Storage Management

Storage Management

Reversible Password Encryption Tool of Agile Reporter

This command is used to encrypt the Secure Sockets Layer (SSL) key password and Derby database password used by agile reporter for Hypertext Transfer Protocol Secure (HTTPS) communication.

Syntax

Go to directory eSight installation directory/AppBase/UniBI_Server/tools/.

In Linux, run the following command to grant the execution permission for encryptreversible.sh:

#chmod 700 encryptreversible.sh

Generate the key file:

Linux: ./encryptreversible.sh -k

Windows: encryptreversible.bat -k

Encrypt the password:

Linux: ./encryptreversible.sh -i

Windows: encryptreversible.bat -i

If a parameter contains spaces, enclose the parameter with a pair of double quotation marks, for example, "Thinking Web UniBi".

Path

eSight installation directory/AppBase/UniBI_Server/tools/encryptreversible.sh

eSight installation directory/AppBase/UniBI_Server/tools/encryptreversible.bat

Parameter Description

Parameter

Description

Encryption password

The password cannot be blank.

The password contains 8 to 30 characters, including only letters, digits, spaces, and special characters.

The password must contain at least the following characters:

  • Uppercase letters
  • Lowercase letters
  • Digits
  • Special characters: !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~

The password cannot be contain more than three same consecutive characters.

All special characters in the password must be escaped.

for example,

In Linux:

  • If the password contains special characters, enclose all the characters in a pair of single quotation marks, for example, '#Password@123'.
  • If the password contains special character ', enclose all the characters in a pair of double quotation marks, for example, "Pa'ssword123".
  • If the password contains special characters " or ' and all the characters have been enclosed in a pair of double quotation marks, use \ to escape the " or ', for example, "past'yh\"gf\` jkh".

In Windows:

  • If the password contains special characters, enclose all the characters in a pair of double quotation marks, for example, "#Password@123".
  • If the password contains special characters " and all the characters have been enclosed in a pair of double quotation marks, use "" to escape the password, for example, "Password""hjk1 2".
Example

In Linux:

Go to directory eSightinstallation directory/AppBase/UniBI_Server/tools/.

Run the following command to grant the execution permission for encryptreversible.sh: #chmod 700 encryptreversible.sh

Generate the key file:

./encryptreversible.sh -k "Thinking Web UniBi" -f eSight installation directory/AppBase/UniBI_Server/unibi-solutions/security/conf

Encrypt the password:

./encryptreversible.sh -i "#Pawwsord@123" -f eSight installation directory/AppBase/UniBI_Server/unibi-solutions/security/conf

Encrypted value is: d1224794b583725096c12bd79d656a5a461c08c4fce9de9e71170ee956cdcceb

Irreversible Password Encryption Tool of Agile Reporter

This command is used to encrypt the server verification password for the agile reporter interface. That is, the command is used to encrypt parameter APIKey in eSight installation directory\AppBase\UniBI_Server\unibi-solutions\system\conf\backendFilter.properties.

Syntax

Go to directory eSight installation directory/AppBase/UniBI_Server/tools/.

In Linux, run the following command to grant the execution permission for encryptirreversible.sh:

#chmod 700 encryptirreversible.sh

  • Linux: ./encryptirreversible.sh -i password user name
  • Windows: encryptirreversible.bat -i password user name
Path

eSight installation directory/AppBase/UniBI_Server/tools/encryptirreversible.sh

eSight installation directory/AppBase/UniBI_Server/tools/encryptirreversible.bat

Parameter Description

Parameter

Description

Encryption password

The password cannot be blank.

The password contains 8 to 30 characters, including only letters, digits, spaces, and special characters.

The user name cannot be blank. The password cannot contain the user name and must be different from the reverse user name.

The password must contain the following characters:

  • Uppercase letters
  • Lowercase letters
  • Digits
  • Special characters: !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~

The password cannot be contain more than three same consecutive characters.

All special characters in the password must be escaped.

for example,

In Linux:

  • If the password contains special characters, enclose all the characters in a pair of single quotation marks, for example, '#Password@123'.
  • If the password contains special character ', enclose all the characters in a pair of double quotation marks, for example, "Pa'ssword123".
  • If the password contains special characters " or ' and all the characters have been enclosed in a pair of double quotation marks, use \ to escape the " or ', for example, "past'yh\"gf\` jkh".

In Windows:

  • If the password contains special characters, enclose all the characters in a pair of double quotation marks, for example, "#Password@123".
  • If the password contains special characters " and all the characters have been enclosed in a pair of double quotation marks, use "" to escape the password, for example, "Password""hjk1 2".
Example

./encryptirreversible.sh -i Mypassword@123 user1

encryptirreversible.bat -i Mypassword@123 user1

Error Information Collection Tool

This command is provided by agile reporter and can be used to collect log files, Java Virtual Machine (JVM) breakdown reports, configuration files for analyzing program exceptions, program execution failures, and system errors.

Syntax

Run the script.

Path

eSight installation directory/AppBase/UniBI_Server/mt_datacollection_config/FailureDataCollection.sh

eSight installation directory/AppBase/UniBI_Server/mt_datacollection_config/FailureDataCollection.bat

Parameter Description
Table 9-2 Information collected by the error information collection tool

Information

Description

Log file

  • UniBIService.log: records logs about agile reporter server start.
  • UniBIServer.log: records logs about UniBI server operations.
  • UniBISystem.log: records logs related to third-party modules.
  • UniBIAudit.log: records logs about UniBI operations and server operations.
  • UniBIAlarm.log: checks generated alarm logs.
  • Mondrian.log: records logs about the Mondrian engine, including details about Mondrian queries.
  • Molap.log: records MOLAP logs, including MOLAP operation logs.
    • Tomcat logs: eSight installation directory/AppBase/UniBI_Server/tomcat/logs
    • MolapAutoAggregation.log: includes logs about MOLAP automatic aggregation.
  • CubeRestructureLog.log: includes logs about MOLAP cube reconstruction.
NOTE:

Ensure that logs shared to users are obtained using the tool and schema information in databases has been deleted.

Wrapper configuration file

The wrapper.conf file is under the eSight installation directory/AppBase/UniBI_Server/bin directory.

The .pid file is under the bin directory.

JVM breakdown report

Used to collect .pid files under the eSight installation directory/AppBase/UniBI_Server/bin directory.

Configuration file

  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/conf/database.properties
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/conf/system.properties
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/conf/overload.properties
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/conf/log4j.properties
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/conf/platform.properties
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/conf/usersandroles.xml
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/hibernate/derby.hibernate.cfg.xml
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/applicationContext-spring-security-hibernate.properties
  • eSight installation directory/AppBase/UniBI_Server/tomcat/webapps/unibi/WEB-INF/classes/classic-engine.properties
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/chartbeans/chartbeans_config.xml
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/mondrian/mondrian.properties
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/molap/molap.properties
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/olap/datasources.xml
  • eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/analyzer/analyzer.properties

Database

The database file is under the eSight installation directory/AppBase/UniBI_Server / unibi-solutions/system/data directory.

Directory structure

List of files in the installation directory.

Non-configuration file

Used to collect all files under eSight installation directory/AppBase/UniBI_Server/unibi-solutions/system/conf/alarmpersist.db.

Prerequisites

Before providing logs to users, ensure that the logs have been scanned and sensitive data, such as schema information in databases has been deleted from the logs.

Configuring the jdk Parameter Tool

This command line tool can dynamically decrypt MD5. On Linux, this operation is performed by the ossuser user.

Syntax
  • Linux: it_common_MD5config.sh
  • Windows: it_common_MD5config.bat
Path

Linux: eSight installation directory/AppBase/tools/MD5Config/it_common_MD5config.sh

Windows: eSight installation directory/AppBase/tools/MD5Config/it_common_MD5config.bat

After the configuration, restart the eSight process for the settings to take effect.

Prerequisites

None.

Example

Linux

  1. Use " ossuser " to log in to, Run the following command to switch to the command path:

    cd eSight installation directory/AppBase/tools/MD5Config/

  2. Run ./it_common_MD5config.sh.
    NOTE:

    In the two-node cluster scenario, this command only needs to be executed on the main server.

  3. Restart the eSight.

Windows

  1. Run the it_common_MD5config.bat by the administrator user.
  2. Restart the eSight.

Configuring the Unified Authentication Tool for OceanStor DJ and eSight

This section is used to configure the unified authentication tool for OceanStor DJ and eSight to implement single sign-on (SSO). The tool applies only to the Linux operating system.

Syntax

Run the script.

Path

eSight installation directory/AppBase/tools/md5config/it_common_MD5config.sh

Prerequisites

The initial password of user openApiUser of eSight has been changed.

Use Example
  1. Log in to the server as user ossuser.
  2. Create the eSight installation directory/certificate directory and copy the haproxy_manage_ca-cert.pem file to the created directory from the /etc/DJSecurity/server-ha-ca directory of the environment where DJ is installed.
  3. Run the following command to switch to the target directory:

    cd eSight installation directory/AppBase/tools/dj_sso

  4. Run the following command:

    sh sso.sh

    Enter the IP address of OceanStor DJ and key store password(The default password is Changeme_123) to be interconnected as prompted. After the command is successfully executed, the following output is displayed: .

  5. Restart eSight.

Canceling the Unified Authentication Between the OceanStor DJ and eSight

This command is used to cancel the unified authentication between OceanStor DJ and eSight. This command applies only to the Linux operating system.

Format

The script can be directly executed.

Path

eSight installation directory/AppBase/tools/dj_sso/rollBackSSO.sh

Prerequisites

Unified authentication has been implemented between eSight and the OceanStor DJ.

Example
  1. Log in to the server as the ossuser user.
  2. Run the following command to switch the directory:

    cd eSight installation directory/AppBase/tools/dj_sso

  3. Run either of the following commands:

    sh rollBackSSO.sh

    Enter the KeyStore password as prompted. (The default password is Changeme_123.) The command output is as follows:

  4. Restart eSight.
Translation
Download
Updated: 2019-06-30

Document ID: EDOC1100044373

Views: 25050

Downloads: 74

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next