BCC Administration Guide for OES 2018 SP2
- BCC Administration Guide for OES 2018 SP2
- Overview of Business Continuity Clustering
- Disaster Recovery Implications
- Disaster Recovery Implementations
- Business Continuity Clustering
- BCC Deployment Scenarios
- Key Concepts
- What’s New or Changed for BCC
- BCC Engine
- What’s Next
- Planning a Business Continuity Cluster
- Determining Design Criteria
- Best Practices
- LAN Connectivity Guidelines
- SAN Connectivity Guidelines
- Storage Design Guidelines
- eDirectory Design Guidelines
- Cluster Design Guidelines
- Installation Requirements for BCC
- Getting a Business Continuity Clustering License
- Downloading Business Continuity Clustering Software
- Minimum System Requirements
- Open Enterprise Server 2018 SP2
- SLP
- Small Footprint CIM Broker and CIMOM
- Novell Cluster Services for Linux
- eDirectory 9.2.1
- Identity Manager 4.8
- iManager 3.2.1
- Storage-Related Plug-Ins for iManager 3.2.1
- Shared Disk Systems
- Mirroring Shared Disk Systems between Peer Clusters
- LUN Masking for Shared Devices
- Link Speeds
- Ports
- Web Browser
- What’s Next
- Installing Business Continuity Clustering
- Overview of the BCC Installation and Configuration
- Installing iManager and Identity Manager on One Node in Each Peer Cluster
- Configuring a BCC Administrator User and Group
- Installing and Configuring the Business Continuity Clustering Software
- Installing the BCC Cluster Resource Template
- Configuring the Device Rescan for BCC Migration of Resources
- Using a YaST Auto-Configuration File to Install and Configure Business Continuity Clustering Software
- What’s Next
- Configuring the Identity Manager Drivers for BCC
- Understanding the BCC Drivers
- Prerequisites for Configuring the BCC Drivers for Identity Manager
- Creating the BCC Driver Set
- Creating a BCC Driver for a BCC Driver Set
- Enabling or Disabling the Synchronization of Email Settings
- Synchronizing Identity Manager Drivers
- Changing the Identity Manager Synchronization Drivers
- What’s Next
- Configuring BCC for Peer Clusters
- Enabling Clusters for Business Continuity
- Adding Peer Cluster Credentials
- Adding Search-and-Replace Values to the Resource Replacement Script
- Enabling Linux POSIX File Systems to Run on Secondary Clusters
- Verifying BCC Administrator User Trustee Rights and Credentials
- Disabling BCC for a Peer Cluster
- What’s Next
- Configuring BCC for Cluster Resources
- Requirements for Cluster Resources
- BCC-Enabling Cluster Resources
- Configuring Search-and-Replace Values for an Individual Cluster Resource
- Adding BCC Load and Unload Scripts
- Assigning Preferred Peer Clusters for the Resource
- Assigning Preferred Nodes in Peer Clusters
- Disabling BCC for a Cluster Resource
- Deleting or Unsharing a BCC-Enabled Shared NSS Pool Resource
- Permanently Relocating a Cluster Resource to a Peer Cluster
- Renaming a BCC-Enabled Pool or Volume
- Managing a Business Continuity Cluster
- Migrating a Cluster Resource to a Peer Cluster
- Bringing a Downed Cluster Back in Service
- Changing Peer Cluster Credentials
- Viewing the Current Status of a Business Continuity Cluster
- Generating a Cluster Report
- Resolving Business Continuity Cluster Failures
- Troubleshooting Business Continuity Clustering
- Identity Manager
- Peer Clusters
- BCC-Enabled Cluster Resources
- BCC Startup Flags
- BCC Error Codes
- Security Considerations
- Security Features
- Security Configuration
- General Security Guidelines
- Security Information for Dependent Products
- Console Commands for BCC
- Using Console Commands
- Setting Up Linux Scan Commands in /opt/novell/ncs/bin/device_scan.sh
- Configuration Worksheet for the BCC Drivers for Identity Manager
- Cluster1 to Cluster2
- Cluster2 to Cluster1
- Setting Up Auto-Failover
- Enabling Auto-Failover
- Creating an Auto-Failover Policy
- Refining the Auto-Failover Policy
- Adding or Editing Monitor Configurations
- Configuring Host-Based File System Mirroring for NSS Pools
- Creating and Mirroring NSS Pools on Shared Storage
- Creating NSS Volumes
- Novell Cluster Services Configuration and Setup
- Checking NSS Volume Mirror Status
- Using Dynamic DNS with BCC
- Requirements and Assumptions
- Configuring the DNS Server for Dynamic DNS
- Configuring the Cluster Resources for Dynamic DNS
- Testing the Dynamic DNS Solution
- Using Virtual IP Addresses with BCC
- Understanding Internal Virtual IP Networks
- Virtual IP Address Benefits
- Planning a Virtual IP Network Implementation
- Configuring a Virtual Router with OSPF
- Configuring Virtual IP Addresses
- Upgrading to Identity Manager 4.8
- Requirements for Using Identity Manager
- Upgrading to Identity Manager 4.8
- Patching IDM 4.8 for OES 2018 SP2
- Upgrading to BCC 2.6 on OES 2018 SP2
- System Requirements for the BCC
- Upgrading to BCC 2.6
- Documentation Updates
- May 2020
- January, 2019
- September 21, 2013
- Legal Notices