No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

OceanStor BCManager 6.5.0 eReplication User Guide 02

Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Adding Hosts

Adding Hosts

If you want to protect applications (such as databases) on a host, you need to add the host for DR protection. This operation instructs the administrators to add hosts to the DR management system on eReplication. The hosts provide necessary resources for DR.

Prerequisites

The scenarios of adding hosts are described in the following table.

Protected Object

Description

  • Oracle
  • IBM DB2
  • Microsoft SQL Server

Add the hosts where databases reside.

InterSystems Caché

Add the hosts where InterSystems Caché databases reside.

Context

If you uninstall and reinstall the eReplication Agent on a host, you need to add the host again after the eReplication Agent is reinstalled.

Procedure

  1. On the menu bar, select Resources.
  2. On the navigation bar, select the site where the hosts are to be added.
  3. Add hosts.

    Hosts that need to be managed must be added.

    1. Select Add Host.

      • Method 1: In the Resource Statistics, click Add Host.

      • Method 2: In the navigation tree, select Host. Then click Add Host.

    2. Optional: Select Apply the port, username, and password of the first row to the newly added row. The system will use the port, username, and password of the host in the first row to avoid repeated inputs.
    3. Set parameters for hosts to be added as described in Table 5-162.



      • If only one host needs to be added, enter the authentication information of the host in the default row.
      • If multiple hosts need to be added, you can click Add to add authentication information of multiple hosts.
      Table 5-162  Parameters for adding hosts

      Parameter

      Description

      Value

      IP Address

      IP address of the host.

      [Value range]

      • The value of the leftmost field ranges from 1 to 223 (excluding 127).
      • The value of the last field ranges from 1 to 255.
      • The values of the other fields range from 0 to 255.

      [Example]

      192.168.10.11

      Port

      Communication port of the eReplication Server and Agent.

      [Value range]

      The value ranges from 1 to 65535. The default value is 59526. The default value is provided in the default row only. You can copy the information in the default row.

      Username

      Username configured during the eReplication Agent installation.

      It can be obtained from the host administrator.

      Password

      Password configured during the eReplication Agent installation.

      It can be obtained from the host administrator.

      NOTE:

      If an added host does not need to be discovered, click Delete to delete it. The default information row cannot be deleted.

    4. Optional: If the alarms of a host need to be monitored by eReplication, click in the button area in the row where the host resides, and set the reporting parameters as described in Table 5-163.

      Table 5-163  Alarm reporting parameters

      Parameter

      Description

      Value

      Type

      Type of the SNMP protocol.

      SNMP v3 is used by default and cannot be changed.

      The system uses SNMP v3 for communication by default.

      Retry Count

      Times for resending the SNMP operations. If this number of times is exceeded, the SNMP operation will be abandoned.

      [Value range]

      The value ranges from 0 to 5. The default value is 3.

      Timeout Duration

      Time that needs to be waited after the protocol message is sent.

      [Value range]

      The value ranges from 0 to 5. The default value is 5.

      Port

      SNMP v3 alarm reporting port of the host.

      [Value range]

      The value ranges from 1 to 65535. The default value is 161.

      Username

      Username used to report alarms based on SNMP v3 when adding a host on the eReplication Server.

      The default username is the same as that configured during the eReplication Agent installation. After the eReplication Agent is installed, the default alarm reporting username is rdadmin.

      [Value range]

      The username contains 1 to 64 characters.

      Environment Name

      This parameter does not need to be manually configured.

      -

      Environment Engine ID

      This parameter does not need to be manually configured.

      -

      Authentication Protocol

      Protocol used for verifying messages. The parameter value can be HMACMD5, HMAC_SHA1, HMAC_SHA2(SHA256) or no protocol.

      [Example]

      HMAC_SHA2

      NOTE:

      The default value is HMAC_SHA2(SHA256). HMACMD5 or HMAC_SHA1 is an insecure protocol which may cause security risks. Therefore, HMAC_SHA2(SHA256) is recommended.

      Authentication Password

      If the authentication protocol is used to verify messages, you need to set the authentication password.

      The default password is the same as that configured during the eReplication Agent installation. After the eReplication Agent is installed, the default authentication password is BCM@DataProtect6. You are advised to change the default password in time to prevent security risks.

      -

      Data Encryption Protocol

      Encryption protocol used for encapsulating data. The value can be DES or AES, or no encryption.

      • DES: an international universal encryption algorithm. The key length is 56 bytes.
      • AES: an advanced encryption standard. There are three types of key length: 128 bytes, 192 bytes, and 256 bytes. Different lengths provide different-level security protection.

      [Example]

      AES

      NOTE:

      The default value is AES. DES is an insecure protocol which may cause security risks. Therefore, AES is recommended.

      Data Encryption Password

      If the encryption algorithm is used for encapsulating data, you need to set the data encryption password.

      The default password is the same as that of the eReplication Agent. After the eReplication Agent is installed, the default data encryption password is BCM@DataProtect8. You are advised to change the default password in time to prevent security risks.

      -

    5. Click OK.
  4. Optional: If the application environment is a cluster, you need to create a host group and add all the hosts in the cluster to the host group.
    1. Click Create Host Group. Table 5-164 describes related parameters.

      Table 5-164  Parameters for creating host groups

      Parameter

      Description

      Value

      Name

      Name of the host group.

      [Value range]

      • Contains 4 to 32 characters.
      • Contains letters, digits, underscores (_), and hyphens (-), and cannot start with a hyphen (-).

      [Example]

      hostgroup

      Operating System

      iSoft

      Host groups support Windows, RedHat, HP-UX, SUSE, AIX, Solaris, Oracle Linux, and iSoft.

      [Example]

      Windows

      Cluster Type

      You need to select a cluster type from the drop-down list. Host groups running different operating systems support different cluster types.
      • If the operating system of a host group is Windows, the cluster type can only be Oracle RAC or WSFC.
      • If the operating system of a host group is Red Hat, the cluster type can only be Oracle RAC, VCS, or RHCS.
      • If the operating system of a host group is HP-UX, the cluster type can only be Oracle RAC or ServiceGuard.
      • If the operating system of a host group is SUSE, the cluster type can only be Oracle RAC.
      • If the operating system of a host group is AIX, the cluster type can only be Oracle RAC or PowerHA.
      • If the operating system of a host group is Solaris, the cluster type can only be Oracle RAC or Sun Cluster.
      • If the operating system of a host group is Oracle Linux, the cluster type can only be Oracle RAC.
      If the operating system of a host group is iSoft, the cluster type can only be Oracle RAC.

      [Example]

      Oracle RAC

    2. In the Host area, select one or more hosts.
    3. Click OK.

Related Operations

After hosts are added, you can refresh, modify, and delete host information. For details about subsequent operations, see Table 5-165.
Table 5-165  Related operations

Operation Name

Related Operation

Prerequisite and Result

Modify information about a host or host group

Select the host or host group that you want to modify and click More > Modify on the Operation list. Modify the host or host group name and the authentication information or alarm reporting information of the host. Then click OK.

If you change the authentication or alarm reporting information of a host, synchronize the latest information toeReplication in time to ensure successful running of subsequent DR protection services.

Add a host to a host group

If you want to add a host to the host group, click More > Add to Host Group on the Operation list. And then click OK.

If the application environment is a cluster, you need to add all the hosts in the cluster to the host group.

Remove a host from a host group

If you want to remove a host from the host group, click More > Remove from Host Group on the Operation list. And then click OK. The host is removed from the host group, but still exists at the site.

If a host in the cluster is adjusted or does not belong to the cluster again, you need to remove the host from the original host group.

Delete a host that is no longer used

If you want to delete a host that has not been added to a host group, click More > Delete on the Operation list. The host is deleted from the site.

Perform this operation when a host is no longer needed.

Delete unnecessary host groups

If you want to delete a host group, select the host group, click More > Delete on the Operation list. And click OK.

Perform this operation when a host group is no longer needed.

Export logs

In the row of the host whose eReplication Agent logs need to be exported, click More > Collect Log on the Operation list. And then click OK. View the background task to check whether the logs are collected successfully. In the row of the host whose logs have been collected, click More > Export Log on the Operation list. Export logs to a local path.

If anomalies occur on a protected object (such as a database) during DR protection or recovery, you can export the logs of the eReplication Agent on the host where the protected object resides to a local path. You can analyze the logs to locate and handle the anomalies.

Refresh hosts

  • Refreshing a single host: In the row of the host whose information is modified, click Refresh on the Operation list.
  • Refreshing all the hosts of a host group: In the row of the host group, click Refresh on the Operation list.

eReplication automatically queries information about added hosts every 12 hours to ensure the host information in eReplication is consistent with the actual host information.

If the host information is changed, you need to refresh the information in eReplication immediately. If the application environment is a cluster and information about hosts in the host group is changed, you can refresh the host group to refresh information about all the hosts in the host group.

Translation
Download
Updated: 2019-05-21

Document ID: EDOC1100075861

Views: 10700

Downloads: 55

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next