Chapter 4. Managing the Network Systems

EnlightenDSM provides powerful tools for managing systems on your network.

This chapter contains basic information about the following EnlightenDSM network management features:

For information about other management tasks not covered in this chapter, refer to the EnlightenDSM Reference Manual.

Managing a User's System Access

This section describes how to lock and unlock a user's access to the system without deleting their account. EnlightenDSM also provides tools to check files, passwords, and other network functions. Refer to the EnlightenDSM User Guide and Chapter 5, “Monitoring Your Network Systems,” for information about those security features.

To lock a specific user access to the system, follow the instructions below. Locking an account will deny that user access to the system without deleting their account:

  1. Choose Configure from the User menu. The User Configuration window appears.

    Figure 4-1. User Configuration window


  2. Select the user whose access you want to deny.

  3. Click the Lock button. A pop-up window will prompt you to confirm this action.


Note: Locking a user account deletes the old password. You must create a new password when unlocking the account.

To unlock a user account:

  1. From the User Configuration window, highlight the user account to be unlocked.

  2. Click the Unlock button. This will restore that user's access privileges.

  3. Assign a new password for the user when prompted.

Because locking and unlocking user accounts is considered part of system security, a new password is required when EnlightenDSM unlocks a User Account

Managing Disk Partitions

With EnlightenDSM, network managers can easily search for files and view disk usage summaries for users, groups, and disk filesystems. To decrease the time required to generate these summaries, EnlightenDSM creates a database, or snapshot, of the files in the requested filesystem. This snapshot database is used to perform the required tasks.

This section briefly describes how to view usage by filesystem, username, and groupname. It also describes how to build snapshots, perform file searches, and display processes. For more detailed information about these options, refer to Chapter 7, “Disk,” in the EnlightenDSM Reference Manual.

Viewing Usage by Filesystem

To view disk usage by filesystem:

  1. Choose Usage by Filesystem from the Disk menu. The Usage by Filesystem window appears.

    Figure 4-2. Usage by Filesystem window


  2. Highlight the filesystem(s) to be summarized, then choose one of the following options:

    • Click the User Sum. button for a summary of disk usage by username.

    • Click the Group Sum. button for a summary of disk usage by user group.

    • Click the File Search button to search files based on a search criterion.

    • Click the Processes button to view the processes using a filesystem.

    • Click the Graph button to graph disk usage.

Viewing Disk Usage by Username

To view a quick summary of disk usage by user for currently mounted filesystems:

  1. Choose Usage by Username from the Disk menu. The Select Disk Partitions window appears.

    Figure 4-3. Select Disk Partitions window


  2. Highlight the disk partition to be summarized.

  3. Click the View User Summary button. The Disk Usage Information by Users window appears.

    Figure 4-4. Disk Usage Information by Users window


  4. Highlight the Usernames to be summarized, then choose one of the following options:

    • Click the View Files button to view a list of files owned by the user(s). A File Systems Detail window will appear with additional options for gathering and viewing file information, deleting or backing up the file or changing the access privileges to the file.

    • Click the Compare Snapshots button to compare the current snapshot to a previously saved one.

    • Click the Save Snapshots button to save the current snapshot. See Building Snapshot below for more information.

    • Click the Graph button to graph the disk usage summary of the user(s).

Viewing Disk Usage by Groupname

To view a quick summary of disk usage by Usergroup for currently mounted filesystems:

  1. Choose Usage by Groupname from the Disk menu. The Select Disk Partitions window appears.

    Figure 4-5. Select Disk Partitions window


  2. Highlight the disk partitions you want to view, then click the View Group Summary button. The Disk Usage Information by Groups window appears.

    Figure 4-6. Disk Usage Information by Groups window


  3. Highlight the Groupname entries to be summarized, then choose one of the following options:

    • Click the View Files button to view a list of files owned by the group(s). A File Systems Detail window will appear with additional options for gathering and viewing file information, deleting or backing up the file or changing the access privileges to the file.

    • Click the Compare Snapshots button to compare the current snapshot to a previously saved one.

    • Click the Save Snapshots button to save the current snapshot. See the next section, “Building Snapshots,” for more information.

    • Click the Graph button to graph the disk usage of the group(s).

Building Snapshots

Disk snapshots provide a detailed description of a disk partition at a given moment. These snapshot are used to monitor disk usage and determine if changes have been made to a partition over time. You can save and store these snapshots, or update them with the rebuild function.

Creating New Master and Interim Snapshots

Master snapshots are not automatically created during installation. You must first create and save a master snapshot that can be compared with later snapshots. Follow the instructions below to create a master snapshot.

A master snapshot is usually created after installing the EnlightenDSM software but before giving users access to partitions. This way, the master snapshot represents a secure system. A master snapshot can also be created after a system cleanup to track changes made over time.

Interim snapshots are used to compare changes to a partition over time. It's best to assign meaningful names to interim snapshots.

To create and save a new master or interim snapshot:

  1. Choose Save Current Snapshots from the Disk menu. The Select Disk Partitions window appears.

    Figure 4-7. Select Disk Partitions window


  2. Highlight the disk partitions for which you want to make a snapshot.

  3. Click the Save Snapshot button. The Save Selected Disk Snapshots window appears. The names of the selected partitions are imported into the Snapshot from Partition column. You can add other partition names by typing them in.

    Figure 4-8. Save Selected Disk Snapshots window


  4. For each partition, do the following:

    • To save the snapshot as the Master, leave the Yes button enabled in the Save as Master option.

    • To save the snapshot as an interim snapshot, click the No button and enter a unique name in the Save Snapshot As field.

  5. Click the Save Snapshot button.

Comparing Snapshots

To compare a new snapshot against a master or interim snapshot:

  1. Choose one of the Disk Usage commands:

    • Disk—>Usage by Filesystem

    • Disk—>Usage by Username

    • Disk—>Usage by Groupname

  2. Highlight the disk partitions (filesystems) you would like to compare to an earlier snapshot.

    Figure 4-9. Currently Mounted Filesystems


  3. Click the Rebuild radio button in the upper right part of the window, and then click one of the function buttons; for example, the User Sum. button.

    A new snapshot of the current filesystem is created that can be compared to the master or interim snapshots.

  4. Click the Compare Snapshot button in the Disk Usage Information window. The Select Saved Snapshots window appears.

    Figure 4-10. Select Saved Snapshots window


  5. To compare against a master snapshot, click the Yes button under the compare to Master column (the default). To compare against an interim named snapshot click the No button and enter the name of the previously saved snapshot in the Saved Snapshot field. Click on the right arrow button to choose from a pick list of previously saved snapshots.


Note: Partitions of the same name, but from different systems, can be compared. For example, the / partition from the host athens can be compared to the / partition from the host paris. You can use this to help maintain consistency of static partitions (partitions that do not change) across hosts.


  1. Choose one of the following snapshot comparison options:

    • Click the Summary button to get a summary of the changes.

    • Click the File List button to view a detailed list of the changes.

    • Click the Search button to search for specific types of changes.

Updating

Snapshots of selected filesystems can be updated using the Disk Usage by Filesystem and Select Disk Partitions windows. The updated snapshots replace the old disk partition information with current information.

To update the snapshot of a filesystem:

  1. Highlight the filesystem in the list and click the Rebuild button.

  2. Click one of the buttons: User Sum. or Group Sum.

    EnlightenDSM displays a window indicating when the last request was taken.

  3. Click the Save Snapshot button to save the snapshot as an updated master or interim snapshot.


Note: Because disk summaries and searches are performed on this snapshot, you should periodically rebuild snapshots to reflect a more current state of the disk. This can be done automatically with the cli and cron commands.


Managing Network File Systems (NFS)

There are two sides to Network File System (NFS) management: the client side where filesystems are mounted or unmounted on a given host, and the server side where directories are made available for export by a host. You can use EnlightenDSM to handle both sides. The actual options are:

  • Mounted Directories

  • Exported Directories

This section explains how to mount and export directories, or partitions. For more information about NFS options not explained here, refer to Chapter 5, “Network,” in the EnlightenDSM Reference Manual.

Mounting Directories on Hosts

Partitions can be mounted on the host(s) immediately, when the hosts are booted, or both.

To add an NFS partition on one or more hosts:

  1. From the Network menu, choose NFS, then Mounted Directories. The Network Filesystem Configuration window appears. Mounted filesystems on all hosts in the current pool are displayed.

    Figure 4-11. Network Filesystem Configuration window


    Each line in the list box displays the hostname, whether the filesystem is currently mounted and/or automatically mounted at boot time, the NFS Server name, the remote partition (directory) name, and the local mount point.

  2. Click the Add button. The Add an NFS Partition window appears.

    Figure 4-12. Add an NFS Partition window


  3. Enter the server and directory information in the appropriate fields and select the mount options you want (partitions can be mounted on the hosts immediately, when the hosts are booted, or both). For information about all of the options in the window, refer to the next section, “Add and Modify NFS Partition Options”.

  4. Click the Mount button to initiate the mount you defined.

To modify the mount parameters for an existing configuration:

  1. From the Network menu, choose NFS, then Mounted Directories. The Mounted Filesystems on Host window appears, displaying the mounted filesystems on all hosts in the current pool (see Figure 4-11).

  2. Highlight the NFS partition(s) to be modified.

  3. Click the Modify button. The Modify an NFS Partition window appears.

    Figure 4-13. Modify an NFS Partition window


  4. Change the options as needed. For information about all of the options in the window, refer to the next section, “Add and Modify NFS Partition Options”.

  5. Click the Modify button to save the changes.

  6. If more than one partition was selected from the list, click the Next button to modify the next NFS partition. Be sure to click Modify before moving on to the next partition or the new settings will not be saved.

Add and Modify NFS Partition Options

The Add an NFS Partition and Modify an NFS Partition windows are similar. The Modify an NFS Partition window does not allow the modification of the Server Name, Directory to Mount, or Mounted on Host fields. Each field or option in these windows is described in the following sections:

Server Name field

Enter the NFS server from which the partition will be mounted (or click the right arrow button to choose from a pick list of all hosts within the current pool that may have mountable partitions).

Directory to Mount field

Enter the remote directory to mount. Leave a blank space between directory names for multiple entries.

Mount on Hosts field

Enter the hostname(s) where the directory will be mounted. Leave a blank space between hostnames for multiple entries. You can also click the right arrow button to choose from a pick list of all hosts within the current pool that may have mountable partitions.

Local Mount Point field

Enter the directory name where the partition will be mounted.

Create Mount Point option

Choose whether the local mount point directory should automatically be created during a mount if that directory does not already exist. The default setting is Yes.

Access Permissions option

Choose how the remote partition should be mounted: Read-Write (the default) or Read Only.

Mount Type option

Choose whether the mount should be a Hard mount (the default) or a Soft mount. Filesystems that are mounted read-write or that contain executable files should be mounted with the Hard setting. Applications using soft-mounted filesystems may produce unexpected I/O errors. Soft-mounted filesystems return errors on request; hard-mounted filesystems display a warning message and continue to try the request.

Mount Operation Type option

Choose whether the mount should be performed in Foreground (the default) or Background. Filesystems mounted in the Background will retry the mount in the background if the server's mount daemon does not respond.

Allow SUID operations option

Choose whether setuid execution is allowed for this mount. The default setting is Yes. The No setting causes the filesystems to be mounted but silently ignores the request to set the suid bit.

Keyboard Interrupts option

Choose whether keyboard interrupts are allowed to kill a hung process that is waiting for a response on a hard-mounted filesystem. The default setting is Yes.

Mount with Secure option

Choose whether to mount with RPC authentication. The default setting is No.

Other Options field

Use this field to specify other NFS options. This field is not pre-checked for syntax errors.

Mounting and Unmounting NFS Partitions

To manually mount or unmount NFS partitions, highlight the appropriate partition(s) in the Network Filesystem Configuration window (see Figure 4-11) and click the Mount or Unmount button.

Exporting Directories

This section describes how to export a directory, define new export criteria, and modify export parameters for an existing NFS partition.

To export a directory:

  1. From the Network menu, choose NFS, and then Exported Directories. The Export A Directory window appears displaying all currently exportable directories.

    Figure 4-14. Export a Directory window


    Each line in the list displays the hostname, exported partition, number of hosts with root access, root access, and permissions.

  2. Select the directory to be exported.

  3. Click the Export button.

To define new export criteria for a directory:

  1. From the Network menu, choose NFS, and then Exported Directories. The Export a Directory window appears displaying all currently exportable directories.

    Figure 4-15. Export a Directory window


  2. Click the Add button. The NFS: Export a Filesystem window appears.

    Figure 4-16. NFS: Export a Filesystem window


  3. Enter the export parameters. Refer to the next section, “Add and Modify Export Fields,” for information about each parameters.

  4. Click Apply to export the directory.

To modify the export parameters for an existing NFS partition:

  1. From the Network menu, choose NFS, and then Exported Directories. A window appears displaying the exportable directories on all hosts in the current pool.

    Figure 4-17. Export a Directory window


    Each line in the list displays the hostname, exported partition, number of hosts exported to, root access, and permissions.

    The Modify an Exported Filesystem window is similar to the Export a Filesystem window. In the Modify window, the Servername field and Directory to Export field are read-only.

  2. Highlight one or more partitions to be modified, then click the Modify button. The Modify an Exported Filesystem window appears.

    Figure 4-18. Modify an Exported Filesystem window


  3. Change the parameters as desired. Refer to the next section, “Add and Modify Export Fields,” for information about each parameter.

  4. Click the Modify button to save any changes.

  5. If more than one partition is selected in the Network File Configuration window, click the Next button to display and modify the parameters of the next selected partition. Be sure to click Modify before moving on to the next partition or the new settings will not be saved.

Add and Modify Export Fields

Server Name field

Enter the NFS server from which the partition will be exported (or click the right arrow button to choose from a pick list of all hosts within the current pool).

Directory to Export field

Enter the full pathname for the directory to export. For multiple entries, leave a blank space between each directory name.

Export Permissions option

These toggles specify what directory access permissions the client machines will have. The options are:

  • Read/write (RW) for all hosts (the default)

  • Read only (RO) for all hosts

  • RW for specific hosts and RO for rest

  • Read/write for specific hosts

  • Read only for specific hosts

Read Only Hosts field

This field is active only if you selected the Read Only for Specific Hosts option in the Export Permissions field. Use this field to specify the read only hosts. Leave a blank space between hostnames for multiple entries.

Read/Write Hosts field

This field is active only if you selected the RW for Specific Hosts and RO for Rest or Read/Write for Specific Hosts options in the Export Permissions field. Use this field to specify the read/write hosts. Leave a blank space between hostnames for multiple entries.

Hosts with Root Access field

Enter the hosts that will have root equivalency permissions on this partition. Leave a blank space between hostnames for multiple entries.

Unknown User Access option

This toggle determines how unknown user (UID) access should be handled. This setting also determines how any root access (other than those hosts specified in the previous Hosts with Root Access field) should be handled. The options are:

  • Use Default Access (the default). If the default is unknown, it puts UID_NOBODY in the file.

  • Disable Unknown Access. Access is denied.

  • Select own UID. Only the specified UID has access.

UID field

This field is active only if you selected the Select Own UID option in the Unknown User Access field. Enter a UID to which unknown users will be mapped.

Use Secure Option

Choose whether the filesystem should be exported with the Secure option. The default setting is No.


Note: This secure option does not work on all systems. Both the server and the client must be configured to be “secure” for this to work properly.

Other Options field

Use this field to specify other NFS options. This field is not pre-checked for syntax errors.

Managing Cron Jobs

This section describes how to manage crontab entries on multiple heterogeneous hosts. The Cron Management options in the System menu are used to configure cron jobs, perform queries on all cron jobs, or manage user access to crontab.

Configuring Cron Jobs

The Crontab Configuration window (Figure 4-19) displays current cron jobs for all users on all hosts in the current pool. This window also allows you to:

  • Create a new crontab job.

  • Modify an existing crontab entry.

  • Delete selected crontab jobs.

  • Create a cron job using the settings of an existing cron job (copy).

    Figure 4-19. Crontab Configuration window


Adding New Crontab Jobs

This feature is system dependent; you may not be able to use all combinations of time settings on your system. Check your local cron for its precise workings.

To create a new crontab job:

  1. From the System menu, choose Cron Management and then Configure.

  2. Click the Add button in the Crontab Configuration window. The Add Crontab Entry window appears (Figure 4-20).

    Figure 4-20. Add Crontab Entry window


    A crontab entry consists of six fields. Any combination of the five time fields (minutes, hours, days, months, and/or days of the week) define when the command (sixth field) will execute. If all the fields are left blank, the job will run by default every hour.

  3. Enter the Add Crontab Entry parameters. See the section, “Add/Modify Crontab Entry Parameters” for information about the fields in this window.

  4. Click the Add button to create the crontab job.

Modifying a Crontab Entry

To modify a crontab entry:

  1. From the System menu, choose Cron Management and then Configure.

  2. Highlight the entries to be modified in the Crontab Configuration window (Figure 4-19).

  3. Click the Modify button. The Modify Crontab Entry window appears.

    Figure 4-21. Modify Crontab Entry window


  4. Change the entry parameters as desired. See the next section, “Add/Modify Crontab Entry Parameters,” for information about each field.

  5. Click the Modify button.

  6. If more than one cron job was selected for modification, click the Next button to modify the next entry. Be sure to click Modify before moving on to the next cron job or the new settings will not be saved.

Add/Modify Crontab Entry Parameters

The Modify Crontab Entry window is similar to the Add Crontab Entry window except that the Username field is read-only.

Hostname field

To limit this job to specific hostnames within a pool, enter those hostnames in this field. For multiple entries, leave a blank between each hostname. You can also use the right arrow button to choose from a pick list of available hosts in the current pool.

User Name field

Enter the user name for the user who will run this job (or click the right arrow button to choose from a pick list of users).

Description field

Enter a brief description of the job's purpose.

Command field

Enter the cron command (and arguments) to be run at the time specified by the remaining five fields. A maximum of 256 characters are allowed for this field.

Minutes field

Enter the minute of the hour(s) the job will run. Enter a whole number between 0 and 59. You can also specify a range by using a hyphen (-); for example, 0-20. For multiple entries, leave a blank between each entry.

Hours of Day
Days of month
Months of the Year
Days of the Week options

Click the appropriate boxes to further define when this job will run. Multiple values per field are allowed.

Querying Cron Jobs

Specific cron jobs can be located by searching for hostnames, usernames, the command itself, the time settings, and so on. Once the query is successful, the cron job can be modify, deleted, or copied.

To search for a cron job:

  1. From the System menu, choose Cron Management and then Query. The Cron Entry Query window appears.

    Figure 4-22. Cron Entry Query window


    For a successful match, all filled-in entries in the Query fields must exactly match those in the Cron job (logical and). Blank fields always match. Possible matches can be negated within fields using the ! character (logical not): for example, !Monday.

  2. To limit the search to specific hostnames within a pool, enter those hostnames in the Hostnames field. For multiple entries, leave a blank space between each entry.

  3. To limit the search to specific users, enter those user name(s) in the User Names field. For multiple entries, leave a blank between each entry. You can also use the right arrow button to choose from a pick list of users.

  4. To limit the search to a specific cron command (or any of its options), enter the command in the Command field. A maximum of 256 characters are allowed in this field, including the standard wildcards.

  5. To specify times or time ranges, enter the parameters in the Time, Weekdays, Days of Mon., and Months fields. This field limits the search to jobs executing at/between the times entered.

  6. After entering the search criteria, click the Execute Search button. If this button is clicked with all the fields empty, all current cron jobs will be displayed. A window similar to the Crontab Configuration window appears with the results listed.

The cron jobs listed in the Crontab Configuration list can be modified, deleted, or copied.

Managing Cron Users

Execution of cron jobs can be limited to specified users . There are five user access options:

  • Only root is allowed to execute cron jobs.

  • Only selected users are allowed to execute cron jobs.

  • All users are allowed to execute cron jobs.

  • All users except specified users are allowed to execute cron jobs.

  • No users are allowed to execute cron jobs.

To control user access:

  1. From the System menu, choose Cron Management and then Cron Users. The Cron User Access Configuration window appears (Figure 4-23).

    Figure 4-23. Crontab User Access Configuration window


  2. Highlight the users to be modified and click the Modify button. The Modify Crontab window (Figure 4-24) appears.

    Figure 4-24. Modify Crontab window


  3. Use this window to modify the cron user access for multiple hosts.

  4. To limit this modification to specific hostnames within a pool, enter those hostnames in the Hostnames field. For multiple entries, leave a blank space between each hostname. You can also click the right arrow button to choose from a pick list of available hosts in the current pool.

  5. The User Access option specifies what type of cron access users are allowed.

  6. To allow or exclude (deny) specific users, enter the user name(s) in the User Names field (or click the right arrow button choose from a pick list of users). For multiple entries, leave a blank between each user name.

  7. Click the Modify button to save the crontab user access modifications.

Archiving Files

Essential to every network manager is the ability to safeguard files through automatic backups. EnlightenDSM can be used to configure devices, perform tape operations, restore files, and schedule full and incremental backups.

This section provides basic information about configuring devices and performing backups. For information about backing up to tape drives, restoring files, and cataloging backup files, refer to Chapter 8, “Archive,” in the EnlightenDSM Reference Manual.

Adding Backup Devices

A variety of different devices can be used to back up system files, including custom devices, reel-to-reel tapes, 1/4-inch cartridge tapes, or raw device types.

To add a new device:

  1. Choose Configure Devices from the Archive menu. The Archive Device Configuration window appears, listing the available devices.

    Figure 4-25. Archive Device Configuration window


  2. To add a new device, click the Add button. The Archive Device Add window appears (Figure 4-26).

    Figure 4-26. Archive Device Add Window


  3. In the Logical Device Name field, enter the device name that the user specifies when accessing this backup device.

  4. In the Raw Device field, enter a device name using the form: hostname:/dev/rmt0. Click the right arrow button to choose from a list of possible tape device names. The device name must be preceded with its hostname, followed by a colon (:).

    For example, if you have a device /dev/rmt/0h on host athens, the name of the device would be:

    athens:/dev/rmt/0h
    

    Note that this host must have an active administration daemon for a successful backup.

  5. Enter a device description or name in the Description field.

  6. Choose a block size from the Block Size option.

    Each type of device has a blocking factor associated with it. The blocking factor is the size of each data block written to the device. The most common blocking factor is 20 blocks; however, you can back up data using a blocking factor of up to 2000 blocks. Block size is O/S dependent. On Solaris 2.4, the block size is 1024 bytes (1K). On SCO 5 platform, the default block size is 1K.

  7. Choose the device type from the Device Type option. The Device Type specifies the device's capacity. The options are:

    • The Cartridge Tape option displays tape length and density. For length, click the left mouse button and then drag the cursor to the appropriate value: 300, 450, or 600 feet. For density, click QIC 24 (low) or QIC 120 (high).

    • The Reel option displays tape length and density line. For length, click the left mouse button and drag the cursor to the appropriate value: 600, 1200, or 2400 feet. For density, click 1600 (low) or 6250 (high).

    • The Custom option allows you to define your own device. You will be prompted to enter the capacity for the new device in KB.

    • The Raw option allows you to quickly add an entry to the device list. Use this option to add a device with no capacity or a new piece of media. You should eventually redefine this storage device.

    • Click the 8 MM button to define an 8mm cartridge tape device. You are prompted to select the capacity of the tape. The options are 2GB (default) and 5GB. If neither of these options applies, create a custom backup device and manually set the device capacity. You can also create a raw device and then define the device capacity.

  8. Click the Add button to save the parameters.

Modifying Backup Devices

To view and/or modify the configured backup devices:

  1. Highlight the device name to be modified from the Archive Device Configuration window (Figure 4-25).

  2. Click the Modify button. A window will appear similar to the Archive Device Add window. In the Modify window, the Logical Device Name field is read-only.

  3. Change the parameters as desired.

  4. Click the Modify button to save the changes.

  5. If multiple backup schedules were chosen, click the Next button to modify the next schedule. Be sure to click Modify before moving on to the next schedule, or the new settings will not be saved.

Deleting Backup Devices

To remove a backup device from EnlightenDSM, highlight the devices to be deleted from the Archive Device Configuration window (Figure 4-25), then click the Delete button. To ensure the correct backup device is being deleted, EnlightenDSM will prompt you for confirmation before deleting it. After an entry is removed, the only way to add it again is to recreate the entry.

Performing Backups

Either full or incremental backups can be performed on filesystems (disk partitions). Full backups include all files in a partition, while incremental backups include only files that have been modified since the last backup. Incremental backups are generally much faster and therefore more useful as a daily strategy.

The Backup Partitions window shown in Figure 4-27 is used for both full and incremental backups. EnlightenDSM prompts you for the information needed to create backups.

Figure 4-27. Backup Partitions window


Catalogs of backups are used to quickly locate and retrieve backed-up files. By default, EnlightenDSM does not keep a catalog of backed-up files. To turn cataloging on, go to the Configure menu, choose Session Preferences, then click Yes under the field: Maintain Catalog of Backed Up Files.

If the Catalog option is enabled, enter a catalog name in the Catalog Name field. This can be a filename or just an identifying tag. If no name is entered, EnlightenDSM uses the default name of NONAME.

Full Backup

To perform a full backup:

  1. Choose Backup Partitions from the Archive menu. A list of current local mounted partitions is displayed. If session preferences is set to Include NSF Parts in Partition Reports, then NFS mounted parts are also displayed.

  2. Highlight the partitions to be backed up.

  3. Enter the logical device name or click the right arrow button to choose from a pick list of defined backup devices.

  4. Click the Full button. As EnlightenDSM performs the backup, a listing of each file archived will be displayed in the window.

Incremental Backup

To perform an incremental backup:

  1. Choose Backup Partitions from the Archive menu. A list of local mounted partitions is displayed. If the Include NSF Parts in Partition Reports option is turned on in the SessionPreferences window (Configure menu), then NFS mounted parts are displayed also.

  2. Highlight the partitions to be backed up and enter the desired backup device. You can also click the right arrow button to choose from a pick list of defined backup devices.

  3. Click the Incremental button. A window will prompt you for the type of incremental backup to run (Figure 4-28).

    Figure 4-28. Incremental Backup window


  4. Choose one of the following incremental backup options:

    • Since the last full backup (the default setting).

    • Since the last incremental backup.

    • Within a specific time period (the last n days).

  5. Click the Apply button. As EnlightenDSM performs the backup, a listing of each file archived will be displayed in the window.

Scheduling Backups

To automatically schedule full or incremental backups of selected files and partitions.

Choose Scheduled Backup from the Archive menu. The Scheduled Backup window (Figure 4-29) appears displaying a list of all currently defined scheduled backups, their schedule types, and descriptions.

Figure 4-29. Scheduled Backup Configuration window


To add a scheduled backup:

  1. Choose Scheduled Backups from the Archive menu.

  2. Click the Add button. The Add Scheduled Backup window appears.

    Figure 4-30. Add Scheduled Backup window


  3. Enter the parameters for each field. For information about each field, see “Scheduled Backup Fields”.

  4. Click the Add button to save the scheduled backup.

  5. To immediately begin a backup, regardless of its scheduled time, click the Execute Now button.

Modifying Scheduled Backups

To modify a scheduled backup:

  1. Choose Scheduled Backups from the Archive menu.

  2. Highlight the backup to be changed.

  3. Click the Modify button. The Modify Scheduled Backup window appears.

  4. Change the parameters as desired. See the next section, “Scheduled Backup Fields,” for a description of each option in the window.

  5. Click the Modify button to save your changes.

  6. If multiple backups were selected for modification, click the Next button. Be sure to click Modify before moving on to the next backup or the new settings will not be saved.

Scheduled Backup Fields

The Add and Modify Scheduled Backup windows contain the following fields:

Backup Name field

This field specifies the backup's name. This field is read-only in the Modify window.

Description field

Enter a brief description of the backup.

Backup Device field

Enter the logical device name for the backup (or click the right arrow button to choose from a pick list of all defined device names). Logical device names are defined via the Configure Device window.

Catalog Name field

If the Maintain Catalogs of Baked Up Files option is turned On in the Session Preferences window (Configure menu), enter the catalog name that will keep a record of this backup.

Backup Type option

Choose whether to run an Incremental or Full backup. The Incremental setting also activates the Backup Files Changed toggle buttons (see below).

Backup Files Changed options

Choose which files should be backed up during an Incremental backup. The choices are:

  • Since the last full backup (the default setting).

  • Since the last incremental backup.

  • Within a specific time period (the last n days).

Choosing the Within Time Period setting displays the Number of Days field.

Number of Days field

Specify how many days back EnlightenDSM will check to see if a file has changed. Once the number of days has been exceeded, the file will be backed up. The arrow buttons to the right can be used to change the number displayed.

Remain in Partition option

Choose the Yes setting to backup only the immediately defined partition for a particular directory. Choose the No setting to backup all partitions listed under that directory. The default setting is Yes.

File List option

For incremental back-ups, this option determines the directories and files to be archived. Enter the directories and/or files to be checked for changes. Only files and directories that have changed will be backed up.

If this field is left blank, no directories or files are checked for changes and no backup is performed.

Remote files must be listed with the hostname followed by the directory name.

Time of Backup field

Use this field with the Schedule Type toggle buttons to determine when a backup will be executed. See the following description for more details on how this field is used.

To specify a time/date value, see Appendix C, “Time Formats,” in the EnlightenDSM Reference Manual.

Schedule Type

This set of toggle buttons determines how and when the backup will occur. The choices are:

  • Weekly The days of the week will be displayed. Select which day(s) the backup should occur. Enter the time for the backup to occur in the Time of Backup field.

  • Monthly The days of the month will be displayed. Select which day(s) the backups will occur. Enter the time for the backup to occur in the Time of Backup field.

  • Manual The manual setting does not schedule a time to perform the backup. The backup will only run when the Execute Now button in either the current window or the parent Scheduled Backup Configuration window is clicked.

  • One Time Specify a date and time to run the backup in the Time of Backup field.   This backup will only run once.

To specify a time/date value, see Appendix C, “Time Formats,” in the EnlightenDSM Reference Manual.

Status Logs

When backups are run in the background at their scheduled times, a backup log is created. Click the Status Logs button in the Scheduled Backups window to access these status logs (Figure 4-31).

Figure 4-31. Backup Logs window


Click the Print Log button to print a copy of the selected backup logs. The output is sent to the printer defined in the Print field of the Session Preferences window (Configure menu).

Click the View button to view the selected backup logs.

Click the Delete button to remove the selected backup logs.

Configuring NIS and NIS+ Servers

This section describes how to use EnlightenDSM tools to configure master Network Information Servers (NIS and NIS+), slave servers (NIS), and replica servers (NIS+).


Note: You must first disable a host as an NIS servers or clients before reconfiguring that host as an NIS+ server or client.


Adding an NIS Server

To add an NIS server or slave to your network:

  1. Choose NIS and NIS+ from the Network menu. The NIS Servers window appears displaying all configured NIS and NIS+ servers. Each line in the list displays the type, domain, and hostname for each server.

    Figure 4-32. NIS and NIS+ Servers window


  2. Click the Add NIS Server button to configure NIS master servers or NIS slave servers. The Add NIS Server window appears.

    Figure 4-33. Add NIS Server window


  3. Click the Master Server Type or Slave Server Type button to select the server type. The fields in the Add NIS Server window change depending on the Server Type option chosen.

  4. Enter the field parameters for either the master or slave server. The master and slave fields are described in the next two sections.

  5. Click the Apply button to add the new NIS server.

NIS Master Fields

When the Master Server Type option is chosen, the Add NIS Server window has the following fields (see Figure 4-33):

NIS Master Hostname field

Enter the hostname of the NIS master server.

NIS Domain Name field

Enter the domain name for this server.

NIS Slave Server Hostnames field

Enter any NIS slave servers for this domain.

Configure Server as NIS Client

Choose whether this server should also be configured as an NIS client. The default setting is Yes.

Configure Master to use DNS

Choose whether the NIS master server should use DNS as a fall back. The default setting is No.

DNS Domain Name field

This field can only be used if you set the Configure Master to use DNS field to Yes. If so, enter the domain name of the DNS servers the NIS master should reference.

DNS Server Hostnames field

This field can only be used if you set the Configure Master to use DNS field setting to Yes. If so, enter the domain name and hostnames of the DNS servers the NIS master should reference.

NIS Slave Fields

When the Slave Server Type option is chosen, the Add NIS Server window (Figure 4-34) has the following fields:

Figure 4-34. Slave Add NIS Server window


NIS Slave Hostname field

Enter the hostname of the NIS slave server.

NIS Master Hostname field

Enter the hostname of the NIS master server.

NIS Master Domain Name field

Enter the domain name for the NIS master server.

Configure Server as NIS Client option

Choose whether this server should also be configured as an NIS client. The default setting is Yes.

Adding an NIS+ Server

To add an NIS+ server,

  1. Choose NIS and NIS+ from the Network menu. The NIS and NIS+ Servers window appears displaying all configured NIS and NIS+ servers. Each line in the list will show the type, domain, and hostname for each server.

    Figure 4-35. NIS and NIS+ Servers window


  2. Click the Add NIS+ Server button. The Add NIS+ Server window appears.

    Figure 4-36. Add NIS+ Server window


  3. Choose the desired NIS+ server type: a Master (the default) or Replica server. If the Replica server option is chosen, the window will be redrawn to show the fields listed in “Replica Fields”.

  4. Enter the remaining field parameters. See the next two sections for information about NIS+ master and replica configurations.

  5. Click the Apply button.

NIS+ Master Fields

When the Master Server Type is chosen, the following fields are displayed on the Add NIS+ Server window:

NIS+ Master Hostname field

Enter the hostname of the NIS+ master server.

NIS+ Domain Name field

Enter the domain name for the NIS+ master server. The domain name is used to uniquely identify users and hosts that are making NIS+ requests.

NIS Compatibility mode

Choose whether this NIS+ should be made backwards compatible with NIS. The default setting is Yes.

Server Root Password field

Enter the root password for the NIS+ master server.

Admin Members field

Enter the users that are allowed to administer this NIS+ host. Leave a blank space between names for multiple entries.

Import Data From field

Choose whether any existing imported data should come from the servers' /etc files or from an NIS server. The default is /etc.

/etc pathname field

You can use this field only if you set the Import Data From field to /etc files. If so, enter the files' pathname.

NIS Domain field

You can use this field only if you set the Import Data from field to NIS. If so, enter the domain name of the NIS server from which to import the data.

NIS Server field

You can use this field only if you set the Import Data from field to NIS. If so, enter the hostname of the NIS server.

Replica Fields

This window is similar to the Add NIS+ Server window for a master server shown in Figure 4-36. It contains the following fields:

Server Type option

Choose what type of NIS+ server to configure: a Master (the default) or a Replica server. If you set this to be a Master server, the window will be redrawn to show the fields listed in “NIS+ Master Fields”.

NIS+ Master Hostname field

Enter the hostname of the NIS+ master server.

NIS+ Domain Name field

Enter the domain name for the NIS+ master server.

Replica Hostname field

Enter the hostname of the NIS+ replica server.

Replica Server Root Password field

Enter the root password for the NIS+ replica server.

NIS Compatibility mode

Choose whether this NIS+ server can also interact with NIS servers. The default is Yes.

Deleting Server Configurations

To delete an NIS or NIS+ server configuration:

  1. Select the server you want to delete from the NIS and NIS+ Servers window.

  2. Click the Delete button. The Delete NIS/NIS+ Server window appears.

    Figure 4-37. Delete NIS/NIS+ Server window


  3. Click the NIS Type button to specify what type of server to delete, an NIS (the default) or NIS+ server.

  4. Click the Server Type button to specify what type of server to delete, a Master (the default) or Slave/Replica server.

  5. Enter the domain name for the server in the Domain Name field.

  6. Enter the hostname in the Server field. If you set the Server Type field to Slave/Replica, enter the name of the NIS/NIS+ master server in the Master Host field.

  7. If you set the Server Type field to Slave/Replica, select a Remain as Client option. Choose whether this server should remain as an NIS client after deletion. The default is Yes.

  8. Click the Delete button.


Note: EnlightenDSM does not automatically detect whether a server is a master or slave/replica server.