EnlightenDSM provides powerful tools for managing systems on your network.
This chapter contains basic information about the following EnlightenDSM network management features:
Locking and unlocking user accounts
Managing disk space by building disk snapshots, viewing usage, searching files, and displaying currently running processes
Managing Network Filesystems (NFS) for clients and servers
Managing cron jobs
Configuring archive devices and performing immediate and scheduled backups.
Configuring and managing Network Information Servers (NIS) on a network.
For information about other management tasks not covered in this chapter, refer to the EnlightenDSM Reference Manual.
This section describes how to lock and unlock a user's access to the system without deleting their account. EnlightenDSM also provides tools to check files, passwords, and other network functions. Refer to the EnlightenDSM User Guide and Chapter 5, “Monitoring Your Network Systems,” for information about those security features.
To lock a specific user access to the system, follow the instructions below. Locking an account will deny that user access to the system without deleting their account:
Choose Configure from the User menu. The User Configuration window appears.
Select the user whose access you want to deny.
Click the Lock button. A pop-up window will prompt you to confirm this action.
![]() | Note: Locking a user account deletes the old password. You must create a new password when unlocking the account. |
To unlock a user account:
From the User Configuration window, highlight the user account to be unlocked.
Click the Unlock button. This will restore that user's access privileges.
Assign a new password for the user when prompted.
Because locking and unlocking user accounts is considered part of system security, a new password is required when EnlightenDSM unlocks a User Account
With EnlightenDSM, network managers can easily search for files and view disk usage summaries for users, groups, and disk filesystems. To decrease the time required to generate these summaries, EnlightenDSM creates a database, or snapshot, of the files in the requested filesystem. This snapshot database is used to perform the required tasks.
This section briefly describes how to view usage by filesystem, username, and groupname. It also describes how to build snapshots, perform file searches, and display processes. For more detailed information about these options, refer to Chapter 7, “Disk,” in the EnlightenDSM Reference Manual.
To view disk usage by filesystem:
Choose Usage by Filesystem from the Disk menu. The Usage by Filesystem window appears.
Highlight the filesystem(s) to be summarized, then choose one of the following options:
Click the User Sum. button for a summary of disk usage by username.
Click the Group Sum. button for a summary of disk usage by user group.
Click the File Search button to search files based on a search criterion.
Click the Processes button to view the processes using a filesystem.
Click the Graph button to graph disk usage.
To view a quick summary of disk usage by user for currently mounted filesystems:
Choose Usage by Username from the Disk menu. The Select Disk Partitions window appears.
Highlight the disk partition to be summarized.
Click the View User Summary button. The Disk Usage Information by Users window appears.
Highlight the Usernames to be summarized, then choose one of the following options:
Click the View Files button to view a list of files owned by the user(s). A File Systems Detail window will appear with additional options for gathering and viewing file information, deleting or backing up the file or changing the access privileges to the file.
Click the Compare Snapshots button to compare the current snapshot to a previously saved one.
Click the Save Snapshots button to save the current snapshot. See Building Snapshot below for more information.
Click the Graph button to graph the disk usage summary of the user(s).
To view a quick summary of disk usage by Usergroup for currently mounted filesystems:
Choose Usage by Groupname from the Disk menu. The Select Disk Partitions window appears.
Highlight the disk partitions you want to view, then click the View Group Summary button. The Disk Usage Information by Groups window appears.
Highlight the Groupname entries to be summarized, then choose one of the following options:
Click the View Files button to view a list of files owned by the group(s). A File Systems Detail window will appear with additional options for gathering and viewing file information, deleting or backing up the file or changing the access privileges to the file.
Click the Compare Snapshots button to compare the current snapshot to a previously saved one.
Click the Save Snapshots button to save the current snapshot. See the next section, “Building Snapshots,” for more information.
Click the Graph button to graph the disk usage of the group(s).
Disk snapshots provide a detailed description of a disk partition at a given moment. These snapshot are used to monitor disk usage and determine if changes have been made to a partition over time. You can save and store these snapshots, or update them with the rebuild function.
Master snapshots are not automatically created during installation. You must first create and save a master snapshot that can be compared with later snapshots. Follow the instructions below to create a master snapshot.
A master snapshot is usually created after installing the EnlightenDSM software but before giving users access to partitions. This way, the master snapshot represents a secure system. A master snapshot can also be created after a system cleanup to track changes made over time.
Interim snapshots are used to compare changes to a partition over time. It's best to assign meaningful names to interim snapshots.
To create and save a new master or interim snapshot:
Choose Save Current Snapshots from the Disk menu. The Select Disk Partitions window appears.
Highlight the disk partitions for which you want to make a snapshot.
Click the Save Snapshot button. The Save Selected Disk Snapshots window appears. The names of the selected partitions are imported into the Snapshot from Partition column. You can add other partition names by typing them in.
For each partition, do the following:
To save the snapshot as the Master, leave the Yes button enabled in the Save as Master option.
To save the snapshot as an interim snapshot, click the No button and enter a unique name in the Save Snapshot As field.
Click the Save Snapshot button.
To compare a new snapshot against a master or interim snapshot:
Choose one of the Disk Usage commands:
Disk—>Usage by Filesystem
Disk—>Usage by Username
Disk—>Usage by Groupname
Highlight the disk partitions (filesystems) you would like to compare to an earlier snapshot.
Click the Rebuild radio button in the upper right part of the window, and then click one of the function buttons; for example, the User Sum. button.
A new snapshot of the current filesystem is created that can be compared to the master or interim snapshots.
Click the Compare Snapshot button in the Disk Usage Information window. The Select Saved Snapshots window appears.
To compare against a master snapshot, click the Yes button under the compare to Master column (the default). To compare against an interim named snapshot click the No button and enter the name of the previously saved snapshot in the Saved Snapshot field. Click on the right arrow button to choose from a pick list of previously saved snapshots.
![]() | Note: Partitions of the same name, but from different systems, can be compared. For example, the / partition from the host athens can be compared to the / partition from the host paris. You can use this to help maintain consistency of static partitions (partitions that do not change) across hosts. |
Choose one of the following snapshot comparison options:
Click the Summary button to get a summary of the changes.
Click the File List button to view a detailed list of the changes.
Click the Search button to search for specific types of changes.
Snapshots of selected filesystems can be updated using the Disk Usage by Filesystem and Select Disk Partitions windows. The updated snapshots replace the old disk partition information with current information.
To update the snapshot of a filesystem:
Highlight the filesystem in the list and click the Rebuild button.
Click one of the buttons: User Sum. or Group Sum.
EnlightenDSM displays a window indicating when the last request was taken.
Click the Save Snapshot button to save the snapshot as an updated master or interim snapshot.
![]() | Note: Because disk summaries and searches are performed on this snapshot, you should periodically rebuild snapshots to reflect a more current state of the disk. This can be done automatically with the cli and cron commands. |
There are two sides to Network File System (NFS) management: the client side where filesystems are mounted or unmounted on a given host, and the server side where directories are made available for export by a host. You can use EnlightenDSM to handle both sides. The actual options are:
Mounted Directories
Exported Directories
This section explains how to mount and export directories, or partitions. For more information about NFS options not explained here, refer to Chapter 5, “Network,” in the EnlightenDSM Reference Manual.
Partitions can be mounted on the host(s) immediately, when the hosts are booted, or both.
To add an NFS partition on one or more hosts:
From the Network menu, choose NFS, then Mounted Directories. The Network Filesystem Configuration window appears. Mounted filesystems on all hosts in the current pool are displayed.
Each line in the list box displays the hostname, whether the filesystem is currently mounted and/or automatically mounted at boot time, the NFS Server name, the remote partition (directory) name, and the local mount point.
Click the Add button. The Add an NFS Partition window appears.
Enter the server and directory information in the appropriate fields and select the mount options you want (partitions can be mounted on the hosts immediately, when the hosts are booted, or both). For information about all of the options in the window, refer to the next section, “Add and Modify NFS Partition Options”.
Click the Mount button to initiate the mount you defined.
To modify the mount parameters for an existing configuration:
From the Network menu, choose NFS, then Mounted Directories. The Mounted Filesystems on Host window appears, displaying the mounted filesystems on all hosts in the current pool (see Figure 4-11).
Highlight the NFS partition(s) to be modified.
Click the Modify button. The Modify an NFS Partition window appears.
Change the options as needed. For information about all of the options in the window, refer to the next section, “Add and Modify NFS Partition Options”.
Click the Modify button to save the changes.
If more than one partition was selected from the list, click the Next button to modify the next NFS partition. Be sure to click Modify before moving on to the next partition or the new settings will not be saved.
The Add an NFS Partition and Modify an NFS Partition windows are similar. The Modify an NFS Partition window does not allow the modification of the Server Name, Directory to Mount, or Mounted on Host fields. Each field or option in these windows is described in the following sections:
Server Name field
Enter the NFS server from which the partition will be mounted (or click the right arrow button to choose from a pick list of all hosts within the current pool that may have mountable partitions).
Directory to Mount field
Enter the remote directory to mount. Leave a blank space between directory names for multiple entries.
Mount on Hosts field
Enter the hostname(s) where the directory will be mounted. Leave a blank space between hostnames for multiple entries. You can also click the right arrow button to choose from a pick list of all hosts within the current pool that may have mountable partitions.
Local Mount Point field
Enter the directory name where the partition will be mounted.
Create Mount Point option
Choose whether the local mount point directory should automatically be created during a mount if that directory does not already exist. The default setting is Yes.
Access Permissions option
Choose how the remote partition should be mounted: Read-Write (the default) or Read Only.
Mount Type option
Choose whether the mount should be a Hard mount (the default) or a Soft mount. Filesystems that are mounted read-write or that contain executable files should be mounted with the Hard setting. Applications using soft-mounted filesystems may produce unexpected I/O errors. Soft-mounted filesystems return errors on request; hard-mounted filesystems display a warning message and continue to try the request.
Mount Operation Type option
Choose whether the mount should be performed in Foreground (the default) or Background. Filesystems mounted in the Background will retry the mount in the background if the server's mount daemon does not respond.
Allow SUID operations option
Choose whether setuid execution is allowed for this mount. The default setting is Yes. The No setting causes the filesystems to be mounted but silently ignores the request to set the suid bit.
Keyboard Interrupts option
Choose whether keyboard interrupts are allowed to kill a hung process that is waiting for a response on a hard-mounted filesystem. The default setting is Yes.
Mount with Secure option
Choose whether to mount with RPC authentication. The default setting is No.
Other Options field
Use this field to specify other NFS options. This field is not pre-checked for syntax errors.
To manually mount or unmount NFS partitions, highlight the appropriate partition(s) in the Network Filesystem Configuration window (see Figure 4-11) and click the Mount or Unmount button.
This section describes how to export a directory, define new export criteria, and modify export parameters for an existing NFS partition.
To export a directory:
From the Network menu, choose NFS, and then Exported Directories. The Export A Directory window appears displaying all currently exportable directories.
Each line in the list displays the hostname, exported partition, number of hosts with root access, root access, and permissions.
Select the directory to be exported.
Click the Export button.
To define new export criteria for a directory:
From the Network menu, choose NFS, and then Exported Directories. The Export a Directory window appears displaying all currently exportable directories.
Click the Add button. The NFS: Export a Filesystem window appears.
Enter the export parameters. Refer to the next section, “Add and Modify Export Fields,” for information about each parameters.
Click Apply to export the directory.
To modify the export parameters for an existing NFS partition:
From the Network menu, choose NFS, and then Exported Directories. A window appears displaying the exportable directories on all hosts in the current pool.
Each line in the list displays the hostname, exported partition, number of hosts exported to, root access, and permissions.
The Modify an Exported Filesystem window is similar to the Export a Filesystem window. In the Modify window, the Servername field and Directory to Export field are read-only.
Highlight one or more partitions to be modified, then click the Modify button. The Modify an Exported Filesystem window appears.
Change the parameters as desired. Refer to the next section, “Add and Modify Export Fields,” for information about each parameter.
Click the Modify button to save any changes.
If more than one partition is selected in the Network File Configuration window, click the Next button to display and modify the parameters of the next selected partition. Be sure to click Modify before moving on to the next partition or the new settings will not be saved.
Server Name field
Enter the NFS server from which the partition will be exported (or click the right arrow button to choose from a pick list of all hosts within the current pool).
Directory to Export field
Enter the full pathname for the directory to export. For multiple entries, leave a blank space between each directory name.
Export Permissions option
These toggles specify what directory access permissions the client machines will have. The options are:
Read/write (RW) for all hosts (the default)
Read only (RO) for all hosts
RW for specific hosts and RO for rest
Read/write for specific hosts
Read only for specific hosts
Read Only Hosts field
This field is active only if you selected the Read Only for Specific Hosts option in the Export Permissions field. Use this field to specify the read only hosts. Leave a blank space between hostnames for multiple entries.
Read/Write Hosts field
This field is active only if you selected the RW for Specific Hosts and RO for Rest or Read/Write for Specific Hosts options in the Export Permissions field. Use this field to specify the read/write hosts. Leave a blank space between hostnames for multiple entries.
Hosts with Root Access field
Enter the hosts that will have root equivalency permissions on this partition. Leave a blank space between hostnames for multiple entries.
Unknown User Access option
This toggle determines how unknown user (UID) access should be handled. This setting also determines how any root access (other than those hosts specified in the previous Hosts with Root Access field) should be handled. The options are:
Use Default Access (the default). If the default is unknown, it puts UID_NOBODY in the file.
Disable Unknown Access. Access is denied.
Select own UID. Only the specified UID has access.
UID field
This field is active only if you selected the Select Own UID option in the Unknown User Access field. Enter a UID to which unknown users will be mapped.
Use Secure Option
Choose whether the filesystem should be exported with the Secure option. The default setting is No.
![]() | Note: This secure option does not work on all systems. Both the server and the client must be configured to be “secure” for this to work properly. |
Other Options field
Use this field to specify other NFS options. This field is not pre-checked for syntax errors.
This section describes how to manage crontab entries on multiple heterogeneous hosts. The Cron Management options in the System menu are used to configure cron jobs, perform queries on all cron jobs, or manage user access to crontab.
The Crontab Configuration window (Figure 4-19) displays current cron jobs for all users on all hosts in the current pool. This window also allows you to:
Create a new crontab job.
Modify an existing crontab entry.
Delete selected crontab jobs.
Create a cron job using the settings of an existing cron job (copy).
This feature is system dependent; you may not be able to use all combinations of time settings on your system. Check your local cron for its precise workings.
To create a new crontab job:
From the System menu, choose Cron Management and then Configure.
Click the Add button in the Crontab Configuration window. The Add Crontab Entry window appears (Figure 4-20).
A crontab entry consists of six fields. Any combination of the five time fields (minutes, hours, days, months, and/or days of the week) define when the command (sixth field) will execute. If all the fields are left blank, the job will run by default every hour.
Enter the Add Crontab Entry parameters. See the section, “Add/Modify Crontab Entry Parameters” for information about the fields in this window.
Click the Add button to create the crontab job.
To modify a crontab entry:
From the System menu, choose Cron Management and then Configure.
Highlight the entries to be modified in the Crontab Configuration window (Figure 4-19).
Click the Modify button. The Modify Crontab Entry window appears.
Change the entry parameters as desired. See the next section, “Add/Modify Crontab Entry Parameters,” for information about each field.
Click the Modify button.
If more than one cron job was selected for modification, click the Next button to modify the next entry. Be sure to click Modify before moving on to the next cron job or the new settings will not be saved.
The Modify Crontab Entry window is similar to the Add Crontab Entry window except that the Username field is read-only.
Hostname field
To limit this job to specific hostnames within a pool, enter those hostnames in this field. For multiple entries, leave a blank between each hostname. You can also use the right arrow button to choose from a pick list of available hosts in the current pool.
User Name field
Enter the user name for the user who will run this job (or click the right arrow button to choose from a pick list of users).
Description field
Enter a brief description of the job's purpose.
Command field
Enter the cron command (and arguments) to be run at the time specified by the remaining five fields. A maximum of 256 characters are allowed for this field.
Minutes field
Enter the minute of the hour(s) the job will run. Enter a whole number between 0 and 59. You can also specify a range by using a hyphen (-); for example, 0-20. For multiple entries, leave a blank between each entry.
Hours of Day
Days of month
Months of the Year
Days of the Week options
Click the appropriate boxes to further define when this job will run. Multiple values per field are allowed.
Specific cron jobs can be located by searching for hostnames, usernames, the command itself, the time settings, and so on. Once the query is successful, the cron job can be modify, deleted, or copied.
To search for a cron job:
From the System menu, choose Cron Management and then Query. The Cron Entry Query window appears.
For a successful match, all filled-in entries in the Query fields must exactly match those in the Cron job (logical and). Blank fields always match. Possible matches can be negated within fields using the ! character (logical not): for example, !Monday.
To limit the search to specific hostnames within a pool, enter those hostnames in the Hostnames field. For multiple entries, leave a blank space between each entry.
To limit the search to specific users, enter those user name(s) in the User Names field. For multiple entries, leave a blank between each entry. You can also use the right arrow button to choose from a pick list of users.
To limit the search to a specific cron command (or any of its options), enter the command in the Command field. A maximum of 256 characters are allowed in this field, including the standard wildcards.
To specify times or time ranges, enter the parameters in the Time, Weekdays, Days of Mon., and Months fields. This field limits the search to jobs executing at/between the times entered.
After entering the search criteria, click the Execute Search button. If this button is clicked with all the fields empty, all current cron jobs will be displayed. A window similar to the Crontab Configuration window appears with the results listed.
The cron jobs listed in the Crontab Configuration list can be modified, deleted, or copied.
Execution of cron jobs can be limited to specified users . There are five user access options:
Only root is allowed to execute cron jobs.
Only selected users are allowed to execute cron jobs.
All users are allowed to execute cron jobs.
All users except specified users are allowed to execute cron jobs.
No users are allowed to execute cron jobs.
To control user access:
From the System menu, choose Cron Management and then Cron Users. The Cron User Access Configuration window appears (Figure 4-23).
Highlight the users to be modified and click the Modify button. The Modify Crontab window (Figure 4-24) appears.
Use this window to modify the cron user access for multiple hosts.
To limit this modification to specific hostnames within a pool, enter those hostnames in the Hostnames field. For multiple entries, leave a blank space between each hostname. You can also click the right arrow button to choose from a pick list of available hosts in the current pool.
The User Access option specifies what type of cron access users are allowed.
To allow or exclude (deny) specific users, enter the user name(s) in the User Names field (or click the right arrow button choose from a pick list of users). For multiple entries, leave a blank between each user name.
Click the Modify button to save the crontab user access modifications.
Essential to every network manager is the ability to safeguard files through automatic backups. EnlightenDSM can be used to configure devices, perform tape operations, restore files, and schedule full and incremental backups.
This section provides basic information about configuring devices and performing backups. For information about backing up to tape drives, restoring files, and cataloging backup files, refer to Chapter 8, “Archive,” in the EnlightenDSM Reference Manual.
A variety of different devices can be used to back up system files, including custom devices, reel-to-reel tapes, 1/4-inch cartridge tapes, or raw device types.
To add a new device:
Choose Configure Devices from the Archive menu. The Archive Device Configuration window appears, listing the available devices.
To add a new device, click the Add button. The Archive Device Add window appears (Figure 4-26).
In the Logical Device Name field, enter the device name that the user specifies when accessing this backup device.
In the Raw Device field, enter a device name using the form: hostname:/dev/rmt0. Click the right arrow button to choose from a list of possible tape device names. The device name must be preceded with its hostname, followed by a colon (:).
For example, if you have a device /dev/rmt/0h on host athens, the name of the device would be:
athens:/dev/rmt/0h |
Note that this host must have an active administration daemon for a successful backup.
Enter a device description or name in the Description field.
Choose a block size from the Block Size option.
Each type of device has a blocking factor associated with it. The blocking factor is the size of each data block written to the device. The most common blocking factor is 20 blocks; however, you can back up data using a blocking factor of up to 2000 blocks. Block size is O/S dependent. On Solaris 2.4, the block size is 1024 bytes (1K). On SCO 5 platform, the default block size is 1K.
Choose the device type from the Device Type option. The Device Type specifies the device's capacity. The options are:
The Cartridge Tape option displays tape length and density. For length, click the left mouse button and then drag the cursor to the appropriate value: 300, 450, or 600 feet. For density, click QIC 24 (low) or QIC 120 (high).
The Reel option displays tape length and density line. For length, click the left mouse button and drag the cursor to the appropriate value: 600, 1200, or 2400 feet. For density, click 1600 (low) or 6250 (high).
The Custom option allows you to define your own device. You will be prompted to enter the capacity for the new device in KB.
The Raw option allows you to quickly add an entry to the device list. Use this option to add a device with no capacity or a new piece of media. You should eventually redefine this storage device.
Click the 8 MM button to define an 8mm cartridge tape device. You are prompted to select the capacity of the tape. The options are 2GB (default) and 5GB. If neither of these options applies, create a custom backup device and manually set the device capacity. You can also create a raw device and then define the device capacity.
Click the Add button to save the parameters.
To view and/or modify the configured backup devices:
Highlight the device name to be modified from the Archive Device Configuration window (Figure 4-25).
Click the Modify button. A window will appear similar to the Archive Device Add window. In the Modify window, the Logical Device Name field is read-only.
Change the parameters as desired.
Click the Modify button to save the changes.
If multiple backup schedules were chosen, click the Next button to modify the next schedule. Be sure to click Modify before moving on to the next schedule, or the new settings will not be saved.
To remove a backup device from EnlightenDSM, highlight the devices to be deleted from the Archive Device Configuration window (Figure 4-25), then click the Delete button. To ensure the correct backup device is being deleted, EnlightenDSM will prompt you for confirmation before deleting it. After an entry is removed, the only way to add it again is to recreate the entry.
Either full or incremental backups can be performed on filesystems (disk partitions). Full backups include all files in a partition, while incremental backups include only files that have been modified since the last backup. Incremental backups are generally much faster and therefore more useful as a daily strategy.
The Backup Partitions window shown in Figure 4-27 is used for both full and incremental backups. EnlightenDSM prompts you for the information needed to create backups.
Catalogs of backups are used to quickly locate and retrieve backed-up files. By default, EnlightenDSM does not keep a catalog of backed-up files. To turn cataloging on, go to the Configure menu, choose Session Preferences, then click Yes under the field: Maintain Catalog of Backed Up Files.
If the Catalog option is enabled, enter a catalog name in the Catalog Name field. This can be a filename or just an identifying tag. If no name is entered, EnlightenDSM uses the default name of NONAME.
Choose Backup Partitions from the Archive menu. A list of current local mounted partitions is displayed. If session preferences is set to Include NSF Parts in Partition Reports, then NFS mounted parts are also displayed.
Highlight the partitions to be backed up.
Enter the logical device name or click the right arrow button to choose from a pick list of defined backup devices.
Click the Full button. As EnlightenDSM performs the backup, a listing of each file archived will be displayed in the window.
To perform an incremental backup:
Choose Backup Partitions from the Archive menu. A list of local mounted partitions is displayed. If the Include NSF Parts in Partition Reports option is turned on in the SessionPreferences window (Configure menu), then NFS mounted parts are displayed also.
Highlight the partitions to be backed up and enter the desired backup device. You can also click the right arrow button to choose from a pick list of defined backup devices.
Click the Incremental button. A window will prompt you for the type of incremental backup to run (Figure 4-28).
Choose one of the following incremental backup options:
Since the last full backup (the default setting).
Since the last incremental backup.
Within a specific time period (the last n days).
Click the Apply button. As EnlightenDSM performs the backup, a listing of each file archived will be displayed in the window.
To automatically schedule full or incremental backups of selected files and partitions.
Choose Scheduled Backup from the Archive menu. The Scheduled Backup window (Figure 4-29) appears displaying a list of all currently defined scheduled backups, their schedule types, and descriptions.
Click the Add button. The Add Scheduled Backup window appears.
Enter the parameters for each field. For information about each field, see “Scheduled Backup Fields”.
Click the Add button to save the scheduled backup.
To immediately begin a backup, regardless of its scheduled time, click the Execute Now button.
To modify a scheduled backup:
Highlight the backup to be changed.
Click the Modify button. The Modify Scheduled Backup window appears.
Change the parameters as desired. See the next section, “Scheduled Backup Fields,” for a description of each option in the window.
Click the Modify button to save your changes.
If multiple backups were selected for modification, click the Next button. Be sure to click Modify before moving on to the next backup or the new settings will not be saved.
The Add and Modify Scheduled Backup windows contain the following fields:
Backup Name field
This field specifies the backup's name. This field is read-only in the Modify window.
Description field
Enter a brief description of the backup.
Backup Device field
Enter the logical device name for the backup (or click the right arrow button to choose from a pick list of all defined device names). Logical device names are defined via the Configure Device window.
Catalog Name field
If the Maintain Catalogs of Baked Up Files option is turned On in the Session Preferences window (Configure menu), enter the catalog name that will keep a record of this backup.
Backup Type option
Choose whether to run an Incremental or Full backup. The Incremental setting also activates the Backup Files Changed toggle buttons (see below).
Choose which files should be backed up during an Incremental backup. The choices are:
Since the last full backup (the default setting).
Since the last incremental backup.
Within a specific time period (the last n days).
Choosing the Within Time Period setting displays the Number of Days field.
Number of Days field
Specify how many days back EnlightenDSM will check to see if a file has changed. Once the number of days has been exceeded, the file will be backed up. The arrow buttons to the right can be used to change the number displayed.
Remain in Partition option
Choose the Yes setting to backup only the immediately defined partition for a particular directory. Choose the No setting to backup all partitions listed under that directory. The default setting is Yes.
File List option
For incremental back-ups, this option determines the directories and files to be archived. Enter the directories and/or files to be checked for changes. Only files and directories that have changed will be backed up.
If this field is left blank, no directories or files are checked for changes and no backup is performed.
Remote files must be listed with the hostname followed by the directory name.
Time of Backup field
Use this field with the Schedule Type toggle buttons to determine when a backup will be executed. See the following description for more details on how this field is used.
To specify a time/date value, see Appendix C, “Time Formats,” in the EnlightenDSM Reference Manual.
This set of toggle buttons determines how and when the backup will occur. The choices are:
Weekly The days of the week will be displayed. Select which day(s) the backup should occur. Enter the time for the backup to occur in the Time of Backup field.
Monthly The days of the month will be displayed. Select which day(s) the backups will occur. Enter the time for the backup to occur in the Time of Backup field.
Manual The manual setting does not schedule a time to perform the backup. The backup will only run when the Execute Now button in either the current window or the parent Scheduled Backup Configuration window is clicked.
One Time Specify a date and time to run the backup in the Time of Backup field. This backup will only run once.
To specify a time/date value, see Appendix C, “Time Formats,” in the EnlightenDSM Reference Manual.
When backups are run in the background at their scheduled times, a backup log is created. Click the Status Logs button in the Scheduled Backups window to access these status logs (Figure 4-31).
Click the Print Log button to print a copy of the selected backup logs. The output is sent to the printer defined in the Print field of the Session Preferences window (Configure menu).
Click the View button to view the selected backup logs.
Click the Delete button to remove the selected backup logs.
This section describes how to use EnlightenDSM tools to configure master Network Information Servers (NIS and NIS+), slave servers (NIS), and replica servers (NIS+).
![]() | Note: You must first disable a host as an NIS servers or clients before reconfiguring that host as an NIS+ server or client. |
To add an NIS server or slave to your network:
Choose NIS and NIS+ from the Network menu. The NIS Servers window appears displaying all configured NIS and NIS+ servers. Each line in the list displays the type, domain, and hostname for each server.
Click the Add NIS Server button to configure NIS master servers or NIS slave servers. The Add NIS Server window appears.
Click the Master Server Type or Slave Server Type button to select the server type. The fields in the Add NIS Server window change depending on the Server Type option chosen.
Enter the field parameters for either the master or slave server. The master and slave fields are described in the next two sections.
Click the Apply button to add the new NIS server.
When the Master Server Type option is chosen, the Add NIS Server window has the following fields (see Figure 4-33):
NIS Master Hostname field
Enter the hostname of the NIS master server.
NIS Domain Name field
Enter the domain name for this server.
NIS Slave Server Hostnames field
Enter any NIS slave servers for this domain.
Configure Server as NIS Client
Choose whether this server should also be configured as an NIS client. The default setting is Yes.
Configure Master to use DNS
Choose whether the NIS master server should use DNS as a fall back. The default setting is No.
DNS Domain Name field
This field can only be used if you set the Configure Master to use DNS field to Yes. If so, enter the domain name of the DNS servers the NIS master should reference.
DNS Server Hostnames field
This field can only be used if you set the Configure Master to use DNS field setting to Yes. If so, enter the domain name and hostnames of the DNS servers the NIS master should reference.
When the Slave Server Type option is chosen, the Add NIS Server window (Figure 4-34) has the following fields:
NIS Slave Hostname field
Enter the hostname of the NIS slave server.
NIS Master Hostname field
Enter the hostname of the NIS master server.
NIS Master Domain Name field
Enter the domain name for the NIS master server.
Configure Server as NIS Client option
Choose whether this server should also be configured as an NIS client. The default setting is Yes.
To add an NIS+ server,
Choose NIS and NIS+ from the Network menu. The NIS and NIS+ Servers window appears displaying all configured NIS and NIS+ servers. Each line in the list will show the type, domain, and hostname for each server.
Click the Add NIS+ Server button. The Add NIS+ Server window appears.
Choose the desired NIS+ server type: a Master (the default) or Replica server. If the Replica server option is chosen, the window will be redrawn to show the fields listed in “Replica Fields”.
Enter the remaining field parameters. See the next two sections for information about NIS+ master and replica configurations.
Click the Apply button.
When the Master Server Type is chosen, the following fields are displayed on the Add NIS+ Server window:
NIS+ Master Hostname field
Enter the hostname of the NIS+ master server.
NIS+ Domain Name field
Enter the domain name for the NIS+ master server. The domain name is used to uniquely identify users and hosts that are making NIS+ requests.
NIS Compatibility mode
Choose whether this NIS+ should be made backwards compatible with NIS. The default setting is Yes.
Server Root Password field
Enter the root password for the NIS+ master server.
Admin Members field
Enter the users that are allowed to administer this NIS+ host. Leave a blank space between names for multiple entries.
Import Data From field
Choose whether any existing imported data should come from the servers' /etc files or from an NIS server. The default is /etc.
/etc pathname field
You can use this field only if you set the Import Data From field to /etc files. If so, enter the files' pathname.
NIS Domain field
You can use this field only if you set the Import Data from field to NIS. If so, enter the domain name of the NIS server from which to import the data.
NIS Server field
You can use this field only if you set the Import Data from field to NIS. If so, enter the hostname of the NIS server.
This window is similar to the Add NIS+ Server window for a master server shown in Figure 4-36. It contains the following fields:
Server Type option
Choose what type of NIS+ server to configure: a Master (the default) or a Replica server. If you set this to be a Master server, the window will be redrawn to show the fields listed in “NIS+ Master Fields”.
NIS+ Master Hostname field
Enter the hostname of the NIS+ master server.
NIS+ Domain Name field
Enter the domain name for the NIS+ master server.
Replica Hostname field
Enter the hostname of the NIS+ replica server.
Replica Server Root Password field
Enter the root password for the NIS+ replica server.
NIS Compatibility mode
Choose whether this NIS+ server can also interact with NIS servers. The default is Yes.
To delete an NIS or NIS+ server configuration:
Select the server you want to delete from the NIS and NIS+ Servers window.
Click the Delete button. The Delete NIS/NIS+ Server window appears.
Click the NIS Type button to specify what type of server to delete, an NIS (the default) or NIS+ server.
Click the Server Type button to specify what type of server to delete, a Master (the default) or Slave/Replica server.
Enter the domain name for the server in the Domain Name field.
Enter the hostname in the Server field. If you set the Server Type field to Slave/Replica, enter the name of the NIS/NIS+ master server in the Master Host field.
If you set the Server Type field to Slave/Replica, select a Remain as Client option. Choose whether this server should remain as an NIS client after deletion. The default is Yes.
Click the Delete button.
![]() | Note: EnlightenDSM does not automatically detect whether a server is a master or slave/replica server. |