OES 23.4: BCC Administration Guide

  OES 23.4: BCC Administration Guide
    Overview of Business Continuity Clustering
      Disaster Recovery Implications
      Disaster Recovery Implementations
      Business Continuity Clustering
      BCC Deployment Scenarios
      Key Concepts
    What’s New or Changed for BCC
      Branding Update
      BCC Engine
      What’s Next
    Planning a Business Continuity Cluster
      Determining Design Criteria
      Best Practices
      LAN Connectivity Guidelines
      SAN Connectivity Guidelines
      Storage Design Guidelines
      eDirectory Design Guidelines
      Cluster Design Guidelines
    Installation Requirements for BCC
      Getting a Business Continuity Clustering License
      Downloading Business Continuity Clustering Software
      Minimum System Requirements
      Open Enterprise Server 23.4
      SLP
      Small Footprint CIM Broker and CIMOM
      Novell Cluster Services for Linux
      eDirectory 9.2.8
      Identity Manager 4.8.7
      iManager 3.2.6
      Storage-Related Plug-Ins for iManager 3.2.6
      Shared Disk Systems
      Mirroring Shared Disk Systems between Peer Clusters
      LUN Masking for Shared Devices
      Link Speeds
      Ports
      What’s Next
    Installing Business Continuity Clustering
      Overview of the BCC Installation and Configuration
      Installing Identity Manager on One Node in Each Peer Cluster
      Configuring a BCC Administrator User and Group
      Installing and Configuring the Business Continuity Clustering Software
      Installing the BCC Cluster Resource Template
      Configuring the Device Rescan for BCC Migration of Resources
      What’s Next
    Configuring the Identity Manager Drivers for BCC
      Understanding the BCC Drivers
      Prerequisites for Configuring the BCC Drivers for Identity Manager
      Creating SSL Certificates
      Creating the BCC Driver Set
      Creating a BCC Driver for a BCC Driver Set
      Enabling or Disabling the Synchronization of Email Settings
      Synchronizing Identity Manager Drivers
      Changing the Identity Manager Synchronization Drivers
      What’s Next
    Configuring BCC for Peer Clusters
      Enabling Clusters for Business Continuity
      Adding Peer Cluster Credentials
      Adding Search-and-Replace Values to the Resource Replacement Rule
      What’s Next
    Configuring BCC for Cluster Resources
      Requirements for Cluster Resources
      BCC-Enabling Cluster Resources
      Configuring Search-and-Replace Values for an Individual Cluster Resource
      Adding BCC Load and Unload Scripts
      Assigning Resource Preferred Clusters for the Resource
      Assigning Preferred Nodes in Peer Clusters
      Disabling BCC for a Cluster Resource
      Deleting or Unsharing a BCC-Enabled Shared NSS Pool Resource
      Permanently Relocating a Cluster Resource to a Peer Cluster
      Renaming a BCC-Enabled Pool or Volume
      Setting Up Auto-Failover
    Managing a Business Continuity Cluster
      Migrating a Cluster Resource to a Peer Cluster
      Bringing a Downed Cluster Back in Service
      Changing Peer Cluster Credentials
      Viewing the Current Status of a Business Continuity Cluster
      Generating a Cluster Report
      Resolving Business Continuity Cluster Failures
    Troubleshooting Business Continuity Clustering
      Identity Manager
      Peer Clusters
      BCC-Enabled Cluster Resources
      BCC Startup Flags
      Verifying BCC Administrator User Trustee Rights and Credentials
      BCC Error Codes
    Security Considerations
      Security Features
      Security Configuration
      General Security Guidelines
      Security Information for Dependent Products
    Console Commands for BCC
      Using Console Commands
      Setting Up Linux Scan Commands in /opt/novell/ncs/bin/device_scan.sh
    Configuration Worksheet for the BCC Drivers for Identity Manager
      Cluster1 to Cluster2
      Cluster2 to Cluster1
    Configuring Host-Based File System Mirroring for NSS Pools
      Creating and Mirroring NSS Pools on Shared Storage
      Creating NSS Volumes
      Novell Cluster Services Configuration and Setup
      Checking NSS Volume Mirror Status
    Using Dynamic DNS with BCC
      Requirements and Assumptions
      Configuring the DNS Server for Dynamic DNS
      Configuring the Cluster Resources for Dynamic DNS
      Testing the Dynamic DNS Solution
    Using Virtual IP Addresses with BCC
      Understanding Internal Virtual IP Networks
      Virtual IP Address Benefits
      Planning a Virtual IP Network Implementation
      Configuring a Virtual Router with OSPF
      Configuring Virtual IP Addresses
    Upgrading to Identity Manager 4.8.7
      Requirements for Using Identity Manager
      Upgrading to Identity Manager 4.8.7
      Patching IDM 4.8.7 for OES 23.4
    Upgrading to BCC 2.6 on OES 23.4
      System Requirements for the BCC
      Upgrading to BCC 2.6
    Disabling BCC for a Peer Cluster
    Documentation Updates
      September 2023
      October 2022
      May 2021
      May 2020
      January, 2019
      September 21, 2013
    Legal Notices