HC 19517
HC 19517
MK-91HC195-17
© 2014, 2016 Hitachi, Ltd. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including copying and recording, or stored in a database or retrieval system for
commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Data Systems
Corporation (collectively “Hitachi”). Licensee may make copies of the Materials provided that any such
copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no
other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the
Materials. “Materials” mean text, data, photographs, graphics, audio, video and documents.
Hitachi reserves the right to make changes to this Material at any time without notice and assumes
no responsibility for its use. The Materials contain the most current information available at the time
of publication.
Some of the features described in the Materials might not be currently available. Refer to the most
recent product announcement for information about feature and product availability, or contact
Hitachi Data Systems Corporation at https://support.hds.com/en_us/contact-us.html.
Notice: Hitachi products and services can be ordered only under the terms and conditions of the
applicable Hitachi agreements. The use of Hitachi products is governed by the terms of your
agreements with Hitachi Data Systems Corporation.
By using this software, you agree that you are responsible for:
1. Acquiring the relevant consents as may be required under local privacy laws or otherwise from
authorized employees and other individuals to access relevant data; and
2. Verifying that data continues to be held, retrieved, deleted, or otherwise processed in
accordance with relevant laws.
Notice on Export Controls. The technical data and technology inherent in this Document may be
subject to U.S. export control laws, including the U.S. Export Administration Act and its associated
regulations, and may be subject to export or import regulations in other countries. Reader agrees to
comply strictly with all such regulations and acknowledges that Reader has the responsibility to obtain
licenses to export, re-export, or import the Document and any Compliant Products.
Hitachi is a registered trademark of Hitachi, Ltd., in the United States and other countries.
AIX, AS/400e, DB2, Domino, DS6000, DS8000, Enterprise Storage Server, eServer, FICON,
FlashCopy, IBM, Lotus, MVS, OS/390, PowerPC, RS/6000, S/390, System z9, System z10, Tivoli,
z/OS, z9, z10, z13, z/VM, and z/VSE are registered trademarks or trademarks of International
Business Machines Corporation.
Active Directory, ActiveX, Bing, Excel, Hyper-V, Internet Explorer, the Internet Explorer logo,
Microsoft, the Microsoft Corporate Logo, MS-DOS, Outlook, PowerPoint, SharePoint, Silverlight,
SmartScreen, SQL Server, Visual Basic, Visual C++, Visual Studio, Windows, the Windows logo,
Windows Azure, Windows PowerShell, Windows Server, the Windows start button, and Windows Vista
are registered trademarks or trademarks of Microsoft Corporation. Microsoft product screen shots are
reprinted with permission from Microsoft Corporation.
The Deployment Manager Plug-in includes software developed by NEC Corporation.
All other trademarks, service marks, and company names in this document or website are properties
of their respective owners.
2
Hitachi Compute Systems Manager Installation and Configuration Guide
Contents
Preface............................................................................................... 13
Intended audience................................................................................................. 14
Product version...................................................................................................... 14
Release notes........................................................................................................ 14
Referenced documents........................................................................................... 14
Document conventions........................................................................................... 14
Conventions for storage capacity values...................................................................15
Accessing product documentation........................................................................... 16
Getting help...........................................................................................................16
Comments............................................................................................................. 17
3
Hitachi Compute Systems Manager Installation and Configuration Guide
Workflow for setting up secure communication with an LDAP directory server
..................................................................................................................32
Workflow for setting up an LDAP directory server................................................33
Workflow for setting up a Kerberos authentication server.....................................34
Deployment Manager configuration workflow......................................................34
Management and maintenance workflows................................................................35
Management server migration workflow............................................................. 35
Database management workflow....................................................................... 36
Workflow for updating the network configuration................................................ 37
Troubleshooting workflow..................................................................................38
4
Hitachi Compute Systems Manager Installation and Configuration Guide
Removing the software by using the all-in-one uninstaller (Windows)................... 67
Removing the software (Linux).......................................................................... 68
5
Hitachi Compute Systems Manager Installation and Configuration Guide
Configuring a firewall for Windows Server 2003 hosts..........................................96
Configuring a firewall for Windows Server 2008 or Windows Server 2012 hosts.....97
Enabling DCOM for Windows hosts.....................................................................98
Enabling WinRM on Windows hosts....................................................................98
Setting up a remote connection with UAC on Windows Server 2008 or 2012......... 99
Installing the fcinfo tool on Windows Server 2003 (optional).............................. 100
Configuring a Windows host to send SNMP inband traps (optional).....................100
Setting up a Linux or Solaris management target....................................................102
Prerequisites for managing Linux or Solaris hosts.............................................. 102
Verifying the Linux or Solaris files and directories.............................................. 103
Setting up an account on a Linux or Solaris host for Hitachi Compute Systems
Manager.........................................................................................................103
Setting up an IP connection with a Linux or Solaris host.................................... 104
About permissions for logging into a Linux or Solaris managed host................... 105
Setting up root user access for a Linux or Solaris host....................................... 106
Setting up permission for normal users to use the Linux or Solaris su command.. 107
Setting up permission for normal users to use the Linux sudo command............. 108
Setting up permission for normal users to use the Solaris pfexec command.........109
Configuring a Linux host to send SNMP inband traps (optional).......................... 111
Configuring a Solaris host to send SNMP inband traps (optional)........................ 112
Updating information after replacing or modifying a managed host.......................... 114
Changing the IP address of a chassis management module..................................... 114
6
Hitachi Compute Systems Manager Installation and Configuration Guide
About using an external authorization server.....................................................142
LDAP directory server connection workflow.......................................................143
Kerberos server connection workflow............................................................... 145
LDAP directory server data structure models.......................................................... 147
LDAP server flat data structure model.............................................................. 147
LDAP server hierarchical data structure model...................................................149
LDAP data structure Base DN...........................................................................150
Prerequisites for configuring an LDAP directory server connection............................150
Prerequisites for determining LDAP server connection properties........................ 150
Prerequisites for using a DNS server to connect to an LDAP server..................... 151
Connecting to an LDAP directory server................................................................. 151
Configuring an LDAP server connection............................................................ 151
Configuring SSL for a secure LDAP server connection........................................ 154
Connecting to a Kerberos server............................................................................ 156
Encryption types for Kerberos authentication.................................................... 156
Configuring a Kerberos server connection......................................................... 157
Settings for connecting to an LDAP server..............................................................159
Settings for connecting directly to an LDAP server.............................................159
Settings for using DNS to connect to an LDAP server.........................................160
Settings for connecting directly to an LDAP server and an authorization server.... 161
Settings for using DNS to connect to an LDAP server and an authorization server
..................................................................................................................... 162
Settings for connecting to a Kerberos server...........................................................163
Settings for connecting directly to a Kerberos server..........................................163
Settings for using DNS to connect to a Kerberos server......................................164
Settings for connecting directly to a Kerberos server and an authorization server.165
Settings for using DNS to connect to a Kerberos server and an authorization server
..................................................................................................................... 166
Commands for connecting to an external authentication server................................167
About using commands to connect to an external authentication server..............167
Command format for verifying an external server connection............................. 168
Using an LDAP search user account when connecting to an LDAP server.................. 170
Prerequisites for registering a search user.........................................................170
Command format for registering a search user..................................................171
Checking the registration status of an LDAP search user.................................... 172
Deleting an LDAP search user.......................................................................... 173
LDAP certificates for secure communications.......................................................... 173
Prerequisites for configuring a secure LDAP server connection........................... 173
Rules for importing LDAP directory server certificates........................................ 174
Command format for importing LDAP server certificates.................................... 174
7
Hitachi Compute Systems Manager Installation and Configuration Guide
8 Administering the management server.................................................185
Starting and Stopping Hitachi Compute Systems Manager....................................... 186
About starting and stopping Hitachi Compute Systems Manager......................... 186
Starting Hitachi Compute Systems Manager...................................................... 186
Stopping Hitachi Compute Systems Manager.....................................................187
Hitachi Compute Systems Manager services and processes................................ 188
Checking the status of Hitachi Compute Systems Manager services.................... 190
Managing the database.........................................................................................191
About database management.......................................................................... 191
Prerequisites for database backup.................................................................... 192
Backing up the database................................................................................. 193
Prerequisites for restoring the database............................................................194
Restoring the database....................................................................................194
Prerequisites for database migration.................................................................195
Exporting the database................................................................................... 196
Importing the database................................................................................... 197
8
Hitachi Compute Systems Manager Installation and Configuration Guide
Settings requirements for virus scanning programs in a cluster environment....... 243
Synchronizing settings in a cluster environment................................................ 243
Setting up Deployment Manager in a cluster environment.................................. 244
Starting and stopping services in a cluster environment.......................................... 245
Temporarily stopping Hitachi Compute Systems Manager in a cluster environment
(Windows)......................................................................................................245
Temporarily stopping Hitachi Compute Systems Manager in a cluster environment
(Linux)........................................................................................................... 246
Starting Hitachi Compute Systems Manager in a cluster environment (Windows). 246
Starting Hitachi Compute Systems Manager in a cluster environment (Linux)...... 247
Managing the database in a cluster environment.................................................... 247
Backing up the database in a cluster environment (Windows)............................ 248
Backing up the database in a cluster environment (Linux)..................................249
Restoring the database in a cluster environment (Windows)...............................250
Restoring the database in a cluster environment (Linux).................................... 252
Exporting the database in a cluster environment (Windows).............................. 253
Exporting the database in a cluster environment (Linux)....................................254
Importing the database in a cluster environment (Windows).............................. 255
Importing the database in a cluster environment (Linux)................................... 258
Command format for migrating to a Linux cluster environment...........................260
Removing software from a cluster environment...................................................... 261
Removing Deployment Manager from a cluster environment.............................. 261
Removing the software in a cluster environment (Windows)...............................262
Removing the software in a cluster environment (Linux).................................... 264
10 Troubleshooting................................................................................. 267
Troubleshooting overview......................................................................................268
Troubleshooting examples.....................................................................................268
Troubleshooting example: no login window displayed........................................ 268
Troubleshooting example: management server does not start............................ 269
Troubleshooting example: database corruption..................................................269
Troubleshooting example: database corruption in a Windows cluster environment
..................................................................................................................... 270
Troubleshooting example: database corruption in a Linux cluster environment.... 271
Collecting maintenance information....................................................................... 273
About collecting maintenance information.........................................................273
Collecting management server maintenance information....................................274
Collecting Java VM thread information on Windows........................................... 276
Collecting Java VM thread information on Linux.................................................277
Collecting maintenance information for a managed host on Windows................. 279
Collecting maintenance information for a managed host on Linux or Solaris........ 280
Reviewing audit log information.............................................................................281
About audit logs............................................................................................. 281
Setting up audit logs....................................................................................... 281
Viewing the audit logs..................................................................................... 282
Audit log categories and event descriptions.......................................................283
Audit log message format and information........................................................292
Audit event messages for tasks........................................................................294
Audit event messages for processing requests.................................................. 295
Audit log detailed messages for system requests...............................................295
Log file settings....................................................................................................297
9
Hitachi Compute Systems Manager Installation and Configuration Guide
About log file settings......................................................................................297
Changing Compute Systems Manager log file settings........................................298
A Ports................................................................................................. 301
Hitachi Compute Systems Manager server ports......................................................302
Hitachi Command Suite Common Component ports................................................ 302
Deployment Manager ports................................................................................... 304
B Properties..........................................................................................305
Properties for Hitachi Compute Systems Manager server......................................... 306
About the Hitachi Compute Systems Manager server properties..........................306
Hitachi Compute Systems Manager server properties files.................................. 306
Properties related to Hitachi Compute Systems Manager server ports and functions
(user.properties)............................................................................................. 307
Properties related to Hitachi Compute Systems Manager server log files
(logger.properties).......................................................................................... 309
Properties for Hitachi Command Suite Common Component.................................... 310
About the Hitachi Command Suite Common Component properties.................... 310
Properties files for Hitachi Command Suite Common Component........................ 310
Properties related to web server communication including SSL settings
(user_httpsd.conf).......................................................................................... 314
Properties related to the web server for Hitachi Compute Systems Manager
(usrconf.properties).........................................................................................317
Properties related to the web server (workers.properties).................................. 318
Properties related to the HSSO-dedicated web server (user_hsso_httpsd.conf)....319
Properties related to the database (HiRDB.ini)...................................................319
Properties related to the database (pdsys)........................................................320
Properties related to the database (def_pdsys)................................................. 320
Properties related to the database (pdutsys).....................................................321
Properties related to the database (def_pdutsys).............................................. 321
Properties related to System account locking (user.conf)....................................322
Properties related to LDAP directory server connections (exauth.properties)........322
Example properties file for external LDAP directory server connections
(exauth.properties)......................................................................................... 327
Properties related to Kerberos server connections (exauth.properties)................ 329
Example properties file for Kerberos server connections (exauth.properties)........334
Properties related to audit logs (auditlog.conf)..................................................336
Properties related to clustering (cluster.conf).................................................... 337
Properties related to Deployment Manager ports (port.ini).......................................338
Glossary............................................................................................ 351
10
Hitachi Compute Systems Manager Installation and Configuration Guide
Index................................................................................................ 361
11
Hitachi Compute Systems Manager Installation and Configuration Guide
12
Hitachi Compute Systems Manager Installation and Configuration Guide
Preface
This manual describes how to install and configure Hitachi Compute Systems
Manager (HCSM).
□ Intended audience
□ Product version
□ Release notes
□ Referenced documents
□ Document conventions
□ Getting help
□ Comments
Preface 13
Hitachi Compute Systems Manager Installation and Configuration Guide
Intended audience
This document provides instructions for server administrators.
Product version
This document revision applies to Hitachi Compute Systems Manager (HCSM)
v8.4.
Release notes
Read the release notes before installing and using this product. They may
contain requirements or restrictions that are not fully described in this
document or updates or corrections to this document.
Referenced documents
Hitachi Compute Systems Manager documents:
• Hitachi Command Suite Compute Systems Manager User Guide,
MK-91HC194
• Hitachi Command Suite Compute Systems Manager CLI Reference Guide,
MK-91HC196
• Hitachi Command Suite Compute Systems Manager Messages,
MK-91HC197
• Hitachi Compute Systems Manager Release Notes, RN-91HC198
Document conventions
This document uses the following typographic conventions:
Convention Description
Bold • Indicates text in a window, including window titles, menus, menu options,
buttons, fields, and labels. Example:
Click OK.
• Indicates emphasized words in list items.
Italic • Indicates a document title or emphasized words in text.
• Indicates a variable, which is a placeholder for actual text provided by the
user or for output by the system. Example:
pairdisplay -g group
14 Preface
Hitachi Compute Systems Manager Installation and Configuration Guide
Convention Description
(For exceptions to this convention for variables, see the entry for angle
brackets.)
Monospace Indicates text that is displayed on screen or entered by the user. Example:
pairdisplay -g oradb
Preface 15
Hitachi Compute Systems Manager Installation and Configuration Guide
Physical capacity unit Value
Logical storage capacity values (for example, logical device capacity) are
calculated based on the following values:
Open-systems:
• OPEN-V: 960 KB
• Others: 720 KB
1 KB 1,024 (210) bytes
1 MB 1,024 KB or 1,0242 bytes
1 GB 1,024 MB or 1,0243 bytes
1 TB 1,024 GB or 1,0244 bytes
1 PB 1,024 TB or 1,0245 bytes
1 EB 1,024 PB or 1,0246 bytes
Getting help
Hitachi Data Systems Support Connect is the destination for technical support
of products and solutions sold by Hitachi Data Systems. To contact technical
support, log on to Hitachi Data Systems Support Connect for contact
information: https://support.hds.com/en_us/contact-us.html.
16 Preface
Hitachi Compute Systems Manager Installation and Configuration Guide
Comments
Please send us your comments on this document to [email protected].
Include the document title and number, including the revision level (for
example, -07), and refer to specific sections and paragraphs whenever
possible. All comments become the property of Hitachi Data Systems
Corporation.
Thank you!
Preface 17
Hitachi Compute Systems Manager Installation and Configuration Guide
18 Preface
Hitachi Compute Systems Manager Installation and Configuration Guide
1
Hitachi Compute Systems Manager
overview
This module provides an overview of Hitachi Compute Systems Manager
(HCSM).
Related concepts
• About Hitachi Compute Systems Manager components on page 21
• About Hitachi Compute Systems Manager managed resources on
page 20
• About basic system configuration on page 22
• About Hitachi Compute Systems Manager LAN configuration on page 23
Remote resources are referred to as management targets until you add them
to the Compute Systems Manager management system. After you add a
target to the system, it becomes a managed host (server-specific) or
managed resource (generic). Compute Systems Manager manages the
following resources:
Related concepts
• About Hitachi Compute Systems Manager on page 20
• About basic system configuration on page 22
Related concepts
• About Hitachi Compute Systems Manager LAN configuration on page 23
Related concepts
• About Hitachi Compute Systems Manager on page 20
• About basic system configuration on page 22
Note: Do not use more than one instance of Compute Systems Manager to
complete actions on the same managed resource.
Tip: IPv6 can be used for communication between the management server
and chassis.
Related concepts
• About Hitachi Compute Systems Manager LAN configuration on page 23
If you install Compute Systems Manager on the same server as other Hitachi
Command Suite products, you can use common settings to manage users
and security. In addition, if Compute Systems Manager is installed on a
server running Hitachi Device Manager, the host information managed by the
two products is automatically synchronized, which improves host
management work efficiency.
Related concepts
• About Hitachi Compute Systems Manager on page 20
Related concepts
• Installation workflow on page 25
• Post-installation workflow on page 26
• SNMP trap setup workflow on page 27
Installation workflow
The following figure illustrates the workflow for installing Hitachi Compute
Systems Manager.
Related concepts
• Post-installation workflow on page 26
• Managed host setup workflow on page 28
• About installing Hitachi Compute Systems Manager on page 50
• About verifying system prerequisites on page 42
Related concepts
• About Hitachi Compute Systems Manager post-installation tasks on
page 56
• Managed host setup workflow on page 28
Related tasks
• Verifying access to the management server on page 57
• Registering a license on page 58
• Changing the System account password on page 59
To send inband driver events that occurred on a managed host, you also
need to configure the SNMP settings for inband driver events on the managed
host.
The following figure show the workflow for configuring SNMP traps:
Related concepts
• About SNMP trap settings on page 70
• About monitoring inband SNMP traps on page 71
The following figure illustrates the management target setup workflow for a
Windows host and a Windows management server:
The following figure illustrates the management target setup workflow for a
Windows host and a Linux management server:
Related tasks
• Enabling Wake-on-LAN on page 94
• Enabling DCOM for Windows hosts on page 98
• Enabling WinRM on Windows hosts on page 98
• Setting up a remote connection with UAC on Windows Server 2008 or
2012 on page 99
The following figure illustrates the basic workflow for setting up secure
communications between the management server and management clients.
Related tasks
• Setting up SSL on the server for secure client communication on page 119
• Setting up SSL on web-based management clients on page 128
• Setting up SSL on management clients running the CLI on page 128
The following figure illustrates the basic workflow for setting up secure
communications between the management server and the SMTP server.
Related tasks
• Setting up SSL for communicating with the SMTP server on page 130
Related concepts
• About secure communications for management clients on page 119
Related concepts
• About secure communications for the Device Manager server on page 136
Related tasks
• Setting up SSL for communicating with the Device Manager server on
page 136
The following figure illustrates the basic workflow for setting up secure
communications between the management server and the LDAP directory
server.
Related tasks
• Configuring SSL for a secure LDAP server connection on page 154
The following figure illustrates the basic workflow for setting up an LDAP
directory server for Compute Systems Manager authentication.
Related concepts
• About using an external authentication server on page 142
• LDAP directory server connection workflow on page 143
• Kerberos server connection workflow on page 145
The following figure illustrates the basic workflow for setting up a Kerberos
server for Compute Systems Manager authentication.
Related concepts
• About using an external authentication server on page 142
Related tasks
• Configuring a Kerberos server connection on page 157
Related tasks
• Installing Deployment Manager on page 181
• Configuring managed resources for use with Deployment Manager on
page 182
• Changing the Deployment Manager port number on page 183
Related references
• Prerequisites for installing Deployment Manager on page 178
The following figure illustrates the basic workflow for migrating from an
existing management server to a new server.
The following figure illustrates the basic workflow for managing the Compute
Systems Manager database.
Related tasks
• Backing up the database on page 193
• Exporting the database on page 196
• Restoring the database on page 194
• Importing the database on page 197
The following figure illustrates the basic workflow for updating the
management server after you implement network configuration changes.
Troubleshooting workflow
When using Hitachi Compute Systems Manager, if the system does not
function properly, you might have to troubleshoot the system.
□ Post-installation tasks
Related concepts
• About verifying the installation environment on page 45
Related tasks
• Verifying the system prerequisites on page 42
• Avoiding port conflicts on page 42
• Verifying the server time setting on page 44
• Adding the management server host name to the hosts file (Linux) on
page 43
• Configuring kernel parameters and shell restrictions (Linux) on page 43
• Verifying requirements when using IPv6 on page 44
• Registering firewall exceptions (Linux) on page 44
Related concepts
• About verifying system prerequisites on page 42
Note: Compute Systems Manager uses the 162 UDP port to receive SNMP
traps. If a product other than Compute Systems Manager is currently using
this port, a message is displayed during installation that recommends
changing the port. Before continuing with the installation, you must change
the port for the other product using port 162 UDP or change the port used by
Compute Systems Manager by following the instructions provided in the
message. When you finish making the port change, you can proceed with the
installation.
When you use the all-in-one installer, the port is automatically changed to
22601.
Related concepts
• About verifying system prerequisites on page 42
Related references
• Hitachi Compute Systems Manager server ports on page 302
• Hitachi Command Suite Common Component ports on page 302
Adding the management server host name to the hosts file (Linux)
Before you install Hitachi Compute Systems Manager on a server running
Linux, you must add localhost and the host name of the management server
in the /etc/hosts file.
If localhost and the management server hostname are not in the /etc/hosts
file, an error might occur during installation.
Related concepts
• About verifying system prerequisites on page 42
Related concepts
• About verifying system prerequisites on page 42
Related tasks
• Registering management server firewall exceptions (Linux) on page 90
Before using IPv6, confirm that the management server supports both IPv6
and IPv4. IPv4 is required for communications with other managed resources
including internal communications.
If you plan to use a service such as NTP that automatically adjusts the server
time, you must configure the service as follows:
• Configure the settings so that the time is adjusted gradually when the
service discovers a time discrepancy.
• The service adjusts the time setting gradually only as long as the time
difference remains within a certain range. Based on the maximum range
value, set the frequency so that the time difference never exceeds the
fixed range.
An example of a service that can adjust the time gradually as long as the
time difference does not exceed a fixed range is the Windows Time
service.
Related concepts
• About verifying system prerequisites on page 42
Related tasks
• Resetting the management server time setting manually on page 86
Related references
• Conditions that require resetting the management server time setting on
page 86
Related concepts
• About verifying the installation environment on page 45
Related tasks
• Preparing the installation directories on page 48
• Specifying management server information during installation on
page 49
Related references
• Rules for specifying path names on page 47
The installation directories that you can specify and the default values are:
• Compute Systems Manager software (new installation)
In Windows:
Program-Files-folder\HiCommand
(where Program-Files-folder is a system environment variable set in
Windows)
In Windows:
HCSM-installation-folder\Base64
In Linux:
HCSM-installation-directory/Base64
Related tasks
• Specifying management server information during installation on
page 49
• Preparing the installation directories on page 48
Related concepts
• About verifying the installation environment on page 45
Procedure
Related concepts
• About verifying the installation environment on page 45
Related references
• Rules for specifying path names on page 47
Also ensure that the host name or IP address is included in the URL that
management clients use to access the management server.
Related concepts
• About verifying the installation environment on page 45
Related concepts
• About installing Hitachi Compute Systems Manager on page 50
Note:
• When you use the all-in-one installer, you must install Hitachi Device
Manager, Hitachi Tiered Storage Manager, and Hitachi Replication
Manager.
• When you use the all-in-one installer, there are limitations on the
characters that you can use for the host name. If you are not able to use
the current host name with the all-in-one installer, use the Compute
Systems Manager installer instead and specify an IP address.
The procedure for installing Compute Systems Manager is the same for all
installation types except for an upgrade from version 7.x.
Note:
• If you install Compute Systems Manager in an environment in which a
virus scanning program is running, you must change the virus scanning
program settings after installation.
• If you plan to install Compute Systems Manager in a cluster environment,
you must specify environment settings in advance. For details about the
environment settings and the installation procedure, see the descriptions
about environment settings and operations for using clusters.
Related concepts
• About upgrading from Hitachi Compute Systems Manager v7.x on
page 342
Related tasks
• Installing the software (Windows) on page 52
• Installing the software (Linux) on page 55
• Installing from the integrated media by using the all-in-one installer
(Windows) on page 54
Related references
• Setting requirements for virus scanning program settings on page 56
Note:
• If other Hitachi Command Suite products are running on the installation
destination management server, ensure that all product versions are 8.0.1
or later. If a Hitachi Command Suite product with an earlier version is
installed, upgrade the product version to 8.0.1 or later.
• If Hitachi Device Manager is installed on the installation destination
management server and an instance of Hitachi Tuning Manager that is
installed on a separate machine is remotely connected to Hitachi Device
Manager, you must stop the Hitachi Tuning Manager service.
• You cannot install Compute Systems Manager by using a network drive.
Shared local devices using Windows Remote Desktop are considered
network drives, you cannot use this method either.
Related concepts
• About verifying the installation environment on page 45
• About verifying system prerequisites on page 42
• About installing Hitachi Compute Systems Manager on page 50
Related tasks
• Installing the software (Windows) on page 52
• Installing from the integrated media by using the all-in-one installer
(Windows) on page 54
• Installing the software (Linux) on page 55
Procedure
Note:
• If Compute Systems Manager is installed in an environment
where SSL communication is enabled or in which the port
number for Hitachi Command Suite Common Component has
been changed, the graphical user interface might not start, even
if the After the installation finishes, start Hitachi
Command Suite GUI check box is selected in the Install
Complete window.
If this problem occurs, check the changed management server
information, and then enter the URL for Compute Systems
Manager in the address bar of the web browser to start the
interface.
• If Internet Explorer 11 is the default browser, a blank or
transitional window might display after logging on to Compute
Systems Manager. If this problem occurs, restart the web
browser and enter the URL for Compute Systems Manager in
the address bar.
• If you are upgrading from a version earlier than 8.2.1 and are
using Oracle JDK 7 on the management server, the installation
replaces the existing software with JDK version that is bundled
with the upgraded software. If SSL communication is enabled,
you must re-import the server certificates to the management
server after the installation finishes. If, after the upgrade, you
want to use the Oracle JDK, change it by using the
hcmds64chgjdk command, and then re-import the server
certificates.
Result
Compute Systems Manager is now installed and DCOM is enabled.
Related tasks
• Installing Deployment Manager on page 181
• Changing the Oracle JDK on page 85
Procedure
Note: If you choose Restart the system later, you must restart
the system before you use any of the Hitachi Command Suite
products.
7. Click Finish.
Note: If you are upgrading from a version earlier than 8.2.1 and
are using Oracle JDK 7 on the management server, the installation
replaces the existing software with JDK version that is bundled
with the upgraded software. If SSL communication is enabled, you
must re-import the server certificates to the management server
after the installation finishes. If, after the upgrade, you want to
use the Oracle JDK, change it by using the hcmds64chgjdk
command, and then re-import the server certificates.
Related tasks
• Changing the Oracle JDK on page 85
Caution: If localhost and the host name of the management server are not
in the /etc/hosts file, an error might occur during installation.
Procedure
Note: If you are upgrading from a version earlier than 8.2.1 and
are using Oracle JDK 7 on the management server, the installation
replaces the existing software with the JDK version that is bundled
with the upgraded software. If SSL communication is enabled, you
must re-import the server certificates to the management server
after the installation finishes. If, after the upgrade, you want to
use the Oracle JDK, change it by using the hcmds64chgjdk
command, and then re-import the server certificates.
Related tasks
• Verifying access to the management server on page 57
• Changing the Oracle JDK on page 85
In Windows:
• Exclude the Hitachi Command Suite Common Component folder:
HCS-Common-Component-installation-folder\HDB
• Exclude the database folder:
HCSM-installation-folder\database
In Linux:
• Exclude the Hitachi Command Suite Common Component directory:
HCS-Common-Component-installation-directory/HDB
• Exclude the database directory:
HCSM-installation-directory/database
Related concepts
• About installing Hitachi Compute Systems Manager on page 50
Post-installation tasks
This module provides information about required Hitachi Compute Systems
Manager post-installation tasks, including accessing the management server,
setting up user accounts and passwords, and setting up e-mail notification for
alerts.
All post-installation tasks require that you log in using the System account.
Related tasks
• Verifying access to the management server on page 57
• Registering a license on page 58
• Changing the System account password on page 59
• Setting an e-mail address for the System account on page 59
• Setting up e-mail notifications on page 60
• Setting up the alert level for e-mail notifications on page 60
• Adding resources to Hitachi Compute Systems Manager on page 61
• Creating a server administrator account on page 62
• Creating resource groups on page 63
• Creating user groups and setting up access control on page 63
• Completing the initial setup on page 64
Procedure
1. Verify that you have the IP address or host name of the management
server.
2. Open a web browser that is supported by Compute Systems Manager.
3. Check the browser settings and modify them as required. For details
about browser settings, see the Hitachi Command Suite Compute
Systems Manager User Guide.
4. In the address bar, specify the Compute Systems Manager URL by using
the following format:
Protocol://Management-server-IP-address-or-hostname:port-
number/ComputeSystemsManager/
Where
• Protocol
Result
The management client login window opens and verifies that you can access
the management server.
Related concepts
• About Hitachi Compute Systems Manager post-installation tasks on
page 56
Registering a license
You must register plug-in licenses to use specific functions of Hitachi
Compute Systems Manager.
Procedure
Result
The registered Compute Systems Manager license key displays in the
License window.
To register or update a license after the initial login, see the Hitachi
Command Suite Compute Systems Manager User Guide.
The System account is a default account that has user management and
execute permission for all Hitachi Command Suite products.
Procedure
Result
The default password is changed.
For details about changing user account passwords, see the Hitachi
Command Suite Compute Systems Manager User Guide.
Related concepts
• About Hitachi Compute Systems Manager post-installation tasks on
page 56
Procedure
1. From the User Profile window, go to the next step. Otherwise, from the
To Do list, select Edit Profile and set e-mail address.
2. In the User Profile window, click Edit Profile, type the full name and
the e-mail address, and then click OK.
Related concepts
• About Hitachi Compute Systems Manager post-installation tasks on
page 56
Procedure
Result
E-mail notification is set up.
You can also set up e-mail notification by using the Compute Systems
Manager Administration tab System Settings option. For details about setting
up e-mail notification, see the Hitachi Command Suite Compute Systems
Manager User Guide.
Related concepts
• About Hitachi Compute Systems Manager post-installation tasks on
page 56
Procedure
Result
The e-mail notification alert level is set up.
Related concepts
• About Hitachi Compute Systems Manager post-installation tasks on
page 56
Related tasks
• Setting up e-mail notifications on page 60
Procedure
1. Ensure that you configured the required prerequisite settings for the
management targets.
2. From the To Do list, complete the tasks listed in the Discovery section.
The Discovery section includes discovering and adding management
targets, that consists of the following:
• Specifying an IP address range
• Discovering resources
Result
After you verify the managed resources list, you are ready to finish the initial
setup process as described in the following topic.
Related concepts
• About Hitachi Compute Systems Manager post-installation tasks on
page 56
Related references
• Prerequisites for managing Windows hosts on page 95
• Prerequisites for managing Linux or Solaris hosts on page 102
Procedure
Result
The system administrator account is set up.
For details about adding users and required permissions, see the Hitachi
Command Suite Compute Systems Manager User Guide.
Procedure
Result
The system adds the new resource group.
You can also create resource groups by using the Compute Systems Manager
Administration tab Resource Groups option. For details about creating
resource groups, see the Hitachi Command Suite Compute Systems Manager
User Guide.
Related tasks
• Creating a server administrator account on page 62
• Adding resources to Hitachi Compute Systems Manager on page 61
Procedure
1. From the To Do list, select Create User Group and Assign Resource
Groups.
2. Specify the name of the User Group and optionally add a description.
3. Select the users to add to the group.
4. Select the Resource Groups to assign, edit the role as needed, and click
OK.
Related tasks
• Changing the System account password on page 59
• Creating a server administrator account on page 62
To set up the dashboard and complete the initial setup, go to the last step in
the To Do list and click Launch Dashboard.
The Dashboard tab displays four panes that include information about
managed resources. After you complete the initial setup, the wizard no longer
appears in the To Do list.
The initial setup is now complete and you can begin using Compute Systems
Manager to manage resources.
Related concepts
• About Hitachi Compute Systems Manager post-installation tasks on
page 56
In Windows, you can remove Compute Systems Manager only or you can use
the all-in-one uninstaller. The all-in-one uninstaller also removes the
following products installed on the management server:
• Hitachi Device Manager
• Hitachi Tiered Storage Manager
• Hitachi Replication Manager
• Hitachi Tuning Manager
• Hitachi Automation Director
• Hitachi Storage Navigator Modular 2
If you use the all-in-one uninstaller, all Hitachi Command Suite product files
are removed.
If you remove Compute Systems Manager only, the properties files, database
files, log files, and other Compute Systems Manager-related files are deleted.
The files and directories that are not deleted when Compute Systems
Manager is removed are as follows:
• Files for products that require Hitachi Command Suite Common
Component as a prerequisite such as property files, database files, log
files, and so on.
• When Deployment Manager is installed, C:\DeployBackup. You can
remove this file if you no longer need it.
Related tasks
• Removing the software (Windows) on page 66
• Removing the software (Linux) on page 68
• Removing the software by using the all-in-one uninstaller (Windows) on
page 67
Related references
• Prerequisites for removing the software on page 65
• Prerequisites for database migration on page 195
Before removing the Compute Systems Manager software, you must verify
the following:
• If you plan to reinstall or migrate to another server after removing the
software, export the existing database.
• If you want to reuse directories and files added by Compute Systems
Manager users, back up the user directories and files.
In Windows, these files are located in the folder:
HCSM-installation-folder\ComputeSystemsManager
In Linux, these files are located in the directory:
HCSM-installation-directory/ComputeSystemsManager
Note: If you remove all the Hitachi Command Suite products that are v8.0 or
later from a management server on which products are installed that use the
32-bit version of Hitachi Command Suite Common Component (Hitachi File
Services Manager and Hitachi Storage Navigator Modular 2), you will no
longer be able to use the 32-bit products. To continue using these products
after the installation, use the following procedure to reinstall the products:
1. Remove products that use the 32-bit Hitachi Command Suite Common
Component.
2. Remove the Hitachi Command Suite products that are v8.0 or later.
3. Reinstall the products that use the 32-bit Hitachi Command Suite
Common Component.
Related concepts
• About removing Hitachi Compute Systems Manager on page 64
Related tasks
• Removing the software (Windows) on page 66
Related references
• Prerequisites for database migration on page 195
Procedure
Result
The Compute Systems Manager software is removed from the server.
Related concepts
• About removing Hitachi Compute Systems Manager on page 64
Related tasks
• Removing the software by using the all-in-one uninstaller (Windows) on
page 67
Related references
• Prerequisites for removing the software on page 65
Note: If you remove Hitachi Command Suite software, the properties files,
database files, log files, and other product-related files are deleted.
Procedure
Result
The Hitachi Command Suite software is removed from the server.
Related concepts
• About removing Hitachi Compute Systems Manager on page 64
Related references
• Prerequisites for removing the software on page 65
Procedure
Result
The Compute Systems Manager software is removed from the management
server.
Related concepts
• About removing Hitachi Compute Systems Manager on page 64
Related references
• Prerequisites for removing the software on page 65
□ Configuring SNMP
For details about management client settings, see the Hitachi Command Suite
Compute Systems Manager User Guide.
Related tasks
• Registering an SNMP MIB file on page 70
Before you register an SNMP MIB file, complete the following tasks:
• Verify that the management server SNMP receiver port is available for use
(port 162/UDP by default).
• Prepare a MIB file.
You can use any name for the file.
• If the management server is running Red Hat Linux, install the 64-bit
version net-snmp-libs package.
Procedure
Result
The SNMP trap definition that is specified in the MIB file is registered in
Compute Systems Manager.
Related concepts
• About SNMP trap settings on page 70
Related tasks
• Changing Hitachi Compute Systems Manager ports on page 78
• Starting Hitachi Compute Systems Manager on page 186
• Stopping Hitachi Compute Systems Manager on page 187
Related tasks
• Configuring the management server to receive inband SNMP traps on
page 72
• Configuring a Windows host to send SNMP inband traps (optional) on
page 100
• Configuring a Linux host to send SNMP inband traps (optional) on
page 111
You need to register MIB files when the managed host runs Windows or
Linux.
Procedure
1. If the managed host runs Windows or Linux, register the MIB files to use
for monitoring inband driver events that occur on the managed host.
Copy the following files from the installation media, and use them to
register MIB files:
• For Windows management servers:
\HCSM_SERVER\HCSM\snmp\mibs\hfcwdd-win.mib (for managed hosts
running Windows)
\HCSM_SERVER\HCSM\snmp\mibs\hfcldd-lin.mib (for managed hosts
running Linux)
• For Linux management servers:
/HCSM_SERVER/HCSM/snmp/mibs/hfcwdd-win.mib (for managed hosts
running Windows)
/HCSM_SERVER/HCSM/snmp/mibs/hfcldd-lin.mib (for managed hosts
running Linux)
2. Specify settings to receive SNMP traps.
For more information, see the Hitachi Command Suite Compute Systems
Manager User Guide.
3. Configure the managed hosts to send inband driver events using SNMP.
Related concepts
• About monitoring inband SNMP traps on page 71
Related tasks
• Registering an SNMP MIB file on page 70
• Configuring a Windows host to send SNMP inband traps (optional) on
page 100
• Configuring a Linux host to send SNMP inband traps (optional) on
page 111
• Configuring a Solaris host to send SNMP inband traps (optional) on
page 112
Note: If your system runs other Hitachi Command Suite products along with
Compute Systems Manager, the settings you specify for Compute Systems
Manager apply to all Hitachi Command Suite user accounts.
Related tasks
• Enabling System account locking on page 73
• Unlocking user accounts on page 74
Procedure
Result
You can now automatically or manually lock the System account.
Related concepts
• About optional user account settings on page 73
Related references
• Properties related to System account locking (user.conf) on page 322
To unlock a user account other than your own, follow the instructions in the
Hitachi Command Suite Compute Systems Manager User Guide.
Procedure
For user-ID, specify the user ID of the account that you want to unlock.
For password, specify the user account password.
If you omit the user ID or password, the system prompts you to enter
them. If the user account does not have a password, you cannot unlock
the account by using this command.
Related tasks
• Checking the status of Hitachi Compute Systems Manager services on
page 190
• Starting Hitachi Compute Systems Manager on page 186
Hitachi Command Suite properties requiring updates for port number changes
After modifying the Hitachi Compute Systems Manager port numbers, you
must update the Hitachi Command Suite Common Component properties
listed in the following table.
Note: If a product that uses the 32-bit version of Hitachi Command Suite
Common Component is installed (Hitachi File Services Manager or Hitachi
Storage Navigator Modular 2), make sure that you set port numbers that do
not conflict with the port number used by these products.
/uCPSB/httpsd/conf/user_httpsd.conf
\uCPSB\CC\web\redirector
\workers.properties
In Linux:
/uCPSB/CC/web/redirector/
workers.properties
In Windows: webserver.connector.ajp13.p
ort
\uCPSB\CC\web\containers
\ComputeSystemsManagerWebService\usrconf
\usrconf.properties
In Linux:
/uCPSB/CC/web/containers/
ComputeSystemsManagerWebService/usrconf/
usrconf.properties
\uCPSB\CC\web\containers
\ComputeSystemsManagerWebService\usrconf
\usrconf.properties
In Linux:
/uCPSB/CC/web/containers/
ComputeSystemsManagerWebService/usrconf/
usrconf.properties
\uCPSB\httpsd\conf\user_hsso_httpsd.conf
In Linux:
/uCPSB/httpsd/conf/user_hsso_httpsd.conf
\HDB\CONF\emb\HiRDB.ini
In Linux:
/HDB/CONF/emb/HiRDB.ini
In Windows: pd_name_port
\HDB\CONF\pdsys
In Linux:
/HDB/CONF/pdsys
In Windows: pd_name_port
\database\work\def_pdsys
In Linux:
/database/work/def_pdsys
In Linux:
/uCPSB/CC/web/redirector/
workers.properties
In Windows: webserver.connector.ajp13.p
ort
\uCPSB\CC\web\containers
\HBase64StgMgmtSSOService\usrconf
\usrconf.properties
In Linux:
/uCPSB/CC/web/containers/
HBase64StgMgmtSSOService/usrconf/
usrconf.properties
\uCPSB\CC\web\containers
\HBase64StgMgmtSSOService\usrconf
\usrconf.properties
In Linux:
/uCPSB/CC/web/containers/
HBase64StgMgmtSSOService/usrconf/
usrconf.properties
Related tasks
• Changing Hitachi Compute Systems Manager ports on page 78
Hitachi Compute Systems Manager properties requiring updates for port number
changes
After modifying the Hitachi Compute Systems Manager port numbers, you
must update the Compute Systems Manager properties listed in the following
table:
22601/UDP ComputeSystemsManager\conf
\user.properties
In Linux:
ComputeSystemsManager/conf/
user.properties
ComputeSystemsManager\conf
\user.properties
In Linux:
ComputeSystemsManager/conf/
user.properties
ComputeSystemsManager\conf
\user.properties
In Linux:
ComputeSystemsManager/conf/
user.properties
Related tasks
• Changing Hitachi Compute Systems Manager ports on page 78
• Changing the management server URL on page 83
Related references
• Hitachi Compute Systems Manager server ports on page 302
• Hitachi Compute Systems Manager server properties files on page 306
Procedure
Related tasks
• Changing Hitachi Compute Systems Manager ports on page 78
• Starting Hitachi Compute Systems Manager on page 186
Related references
• Hitachi Command Suite properties requiring updates for port number
changes on page 75
• Hitachi Compute Systems Manager properties requiring updates for port
number changes on page 77
• Hitachi Compute Systems Manager server ports on page 302
• Hitachi Compute Systems Manager server properties files on page 306
• Hitachi Command Suite Common Component ports on page 302
• Properties files for Hitachi Command Suite Common Component on
page 310
Ensure that you have a record of the new management server host name (if
the host name was changed) and IP address.
If you already changed the host name of the management server, use the
hostname command to display the host name.
If you need to verify the host name on a Windows machine, use the
ipconfig /ALL command to display the host name.
The management server host name must meet the following requirements:
• The host name uses the following valid characters only:
A to Z, a to z, 0 to 9, hyphen (-), period (.)
A hyphen (-) cannot be used at the beginning or end of the host name.
• The length of the host name does not exceed 128 bytes.
Also ensure that the new host name or IP address is included in the URL that
management clients use to access the management server.
Procedure
1. If you are changing the IP address, you must first unmanage all the
chassis. If you are only changing the management server name, go to
the next step.
2. Stop Compute Systems Manager.
Change the host name of the management server to the new host name.
Enter the new host name in the line above the localhost line.
5. If you are also using other Hitachi Command Suite products, revise the
settings for these products as needed.
6. Change the IP address or the host name of the management server.
Make sure to specify the case-sensitive host name exactly.
7. After restarting the computer, verify that all Compute Systems Manager
services are running.
8. If you use the old host name or IP address to access the management
server from a browser, update the Compute Systems Manager URL.
9. Verify that you can access Compute Systems Manager using the new
URL.
10. If you changed the IP address, you must access the chassis resource list
and change the status from unmanaged back to managed.
11. Back up the database.
This step is required because you cannot restore your system using any
backup that you created before the IP address or host name change.
Result
The management server host name or IP address is changed.
Related tasks
• Changing the management server URL on page 83
• Starting Hitachi Compute Systems Manager on page 186
• Stopping Hitachi Compute Systems Manager on page 187
Related references
• Hitachi Command Suite properties requiring changes for management
server host name changes on page 80
• Hitachi Command Suite properties requiring changes for management
server IP address changes on page 82
• Properties files for Hitachi Command Suite Common Component on
page 310
• Hitachi Compute Systems Manager server properties files on page 306
In Linux:
/HDB/CONF/pdsys
/database/work/def_pdsys
In Windows: pd_hostname
\HDB\CONF\pdutsys
\database\work\def_pdutsys
In Linux:
/HDB/CONF/pdutsys
/database/work/def_pdutsys
In Windows: PDHOST
\HDB\CONF\emb\HiRDB.ini
In Linux:
/HDB/CONF/emb/HiRDB.ini
Related tasks
• Changing the management server host name or IP address on page 79
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
In Linux:
/uCPSB/httpsd/conf/
user_httpsd.conf
In Linux:
/HDB/CONF/pdsys/
database/work/def_pdsys
In Windows: pd_hostname
\HDB\CONF\pdutsys
\database\work\def_pdutsys
In Linux:
/HDB/CONF/pdutsys
/database/work/def_pdutsys
In Windows: PDHOST
\HDB\CONF\emb\HiRDB.ini
In Linux:
/HDB/CONF/emb/HiRDB.ini
Related tasks
• Changing the management server host name or IP address on page 79
Note: You must use a complete URL that contains a protocol and a port
number, for example, http://HostA:22015.
Procedure
In Windows:
HCS-Common-Component-installation-folder\bin\hcmds64chgurl /
list
In Linux:
HCS-Common-Component-installation-directory/bin/hcmds64chgurl
-list
In Windows:
In Linux:
HCS-Common-Component-installation-directory/bin/hcmds64chgurl
-change new-URL -type HCSM
3. Change all Hitachi Command Suite and Compute Systems Manager URLs
running on this management server by using the following command:
In Windows:
HCS-Common-Component-installation-folder\bin\hcmds64chgurl /
change old-URL new-URL
In Linux:
HCS-Common-Component-installation-directory/bin/hcmds64chgurl
-change old-URL new-URL
4. In Windows, change the URL for the shortcut file:
• For Windows Server 2008 R2:
Select Start > All Programs > Hitachi Command Suite >
Compute Systems Manager and then right-click Login - HCSM.
Select Properties, and then on the Web Document tab, change the
URL.
• For Windows Server 2012:
Select Start > All apps > Hitachi Command Suite > Compute
Systems Manager and then right-click Login - HCSM. Select
Properties, and then on the Web Document tab, change the URL.
Where:
• Protocol
Specify http for non-SSL communication, and https for SSL
communication.
• Management-server-IP-address-or-host-name
Specify the IP address or host name of the management server on
which Compute Systems Manager was installed.
• port-number
Specify the port number that is set for Listen line in the
user_httpsd.conf file.
For non-SSL communication, specify the port number for non-SSL
communication (default: 22015).
For SSL communication, specify the port number for SSL
communication (default: 22016).
The user_httpsd.conf file is stored in the following locations:
In Windows:
Related references
• Configuration changes that require updating the management server URL
on page 85
Related tasks
• Changing the management server URL on page 83
Procedure
Result
If you install a new JDK using an overwrite or upgrade installation, you must
use the hcmds64chgjdk command again to set the JDK version.
To return to the original JDK after installing and configuring a new version,
run the hcmds64chgjdk command and reselect the JDK bundled with the
product.
Related tasks
• Starting Hitachi Compute Systems Manager on page 186
• Stopping Hitachi Compute Systems Manager on page 187
• Setting up SSL on the server for secure client communication on page 119
• Setting up SSL on web-based management clients on page 128
• Setting up SSL on management clients running the CLI on page 128
• Configuring SSL for a secure LDAP server connection on page 154
Related tasks
• Resetting the management server time setting manually on page 86
Procedure
Result
Verify that the Compute Systems Manager Management server reflects the
correct time.
Next steps
Related references
• Conditions that require resetting the management server time setting on
page 86
Procedure
Procedure
Result
The temperature measurement unit is updated.
Related references
• Properties related to Hitachi Compute Systems Manager server ports and
functions (user.properties) on page 307
Procedure
Result
Compute Systems Manager can now access the required resources through
Windows firewall.
Related tasks
• Configuring a firewall for Windows Server 2003 hosts on page 96
• Configuring a firewall for Windows Server 2008 or Windows Server 2012
hosts on page 97
The ports that you must register to the firewall exception list are listed in the
following table.
Related tasks
• Registering management server firewall exceptions (Linux) on page 90
Note: The following procedure is an example based on Red Hat Linux v6.2.
For details about setting up the firewall for a different version, see the
documentation for the applicable operating system.
Procedure
Procedure
Related tasks
• Enabling WinRM on Windows hosts on page 98
• Starting Hitachi Compute Systems Manager on page 186
• Stopping Hitachi Compute Systems Manager on page 187
Related references
• Properties related to Hitachi Compute Systems Manager server ports and
functions (user.properties) on page 307
Enabling Wake-on-LAN
Wake-on-LAN (WoL) is an optional feature that enables a network message to
turn on or “wake up” a server. If lights-out-management (LOM) information is
not available for a particular host, Hitachi Compute Systems Manager can
power on the host using WoL. If you want Compute Systems Manager to
maintain the ability to power on a host if LOM information is not available,
you must ensure that WoL is enabled on the host network adapter.
To enable WoL on the host network adapter, follow the instructions provided
with the host server hardware.
Related references
• Prerequisites for managing Windows hosts on page 95
• Prerequisites for managing Linux or Solaris hosts on page 102
Related references
• Prerequisites for managing a Hitachi blade server on page 95
• Prerequisites for managing a Hitachi rack-mounted server on page 95
After you verify the prerequisites, you must also complete the following setup
tasks on the Windows host:
• Configure the Windows firewall (Windows management server).
• Enable WinRM (Linux management server).
• Enable Distributed Component Object Model (DCOM) (Windows
management server).
• Set up a remote connection that uses User Access Control (UAC)
(optional).
• If managing SAN resources, install the Fibre Channel Information Tool
(fcinfo tool) (optional).
• Enable Wake-on-Lan (optional).
Related tasks
• Configuring a firewall for Windows Server 2003 hosts on page 96
• Configuring a firewall for Windows Server 2008 or Windows Server 2012
hosts on page 97
• Enabling DCOM for Windows hosts on page 98
• Enabling WinRM on Windows hosts on page 98
• Setting up a remote connection with UAC on Windows Server 2008 or
2012 on page 99
• Installing the fcinfo tool on Windows Server 2003 (optional) on page 100
• Enabling Wake-on-LAN on page 94
• Configuring a Windows host to send SNMP inband traps (optional) on
page 100
Result
WMI communication is now allowed through the firewall so that Compute
Systems Manager can communicate with the host.
Related references
• Prerequisites for managing Windows hosts on page 95
Procedure
Procedure
Result
DCOM is enabled on the host so that Compute Systems Manager can obtain
server management information.
Related references
• Prerequisites for managing Windows hosts on page 95
The default port number used by WinRM is 80 or 5985. The default value
differs according to the WinRM version.
Related tasks
• Applying WinRM settings (Linux) on page 91
Related references
• Prerequisites for managing Windows hosts on page 95
Note: If the host server uses the built-in administrator account or a domain
user account, you do not need to allow remote connections as described in
the following task.
Remote connections are now possible between the management server and
the Windows Server 2008 or Windows Server 2012 host using UAC.
Tip: If you need to remove the changes that you made to the registry, use
the following command and then restart the server: reg delete HKLM
\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v
LocalAccountTokenFilterPolicy /f
Related references
• Prerequisites for managing Windows hosts on page 95
Procedure
Result
Compute Systems Manager is now able to obtain HBA information for
managed SAN resources.
Related references
• Prerequisites for managing Windows hosts on page 95
Procedure
Related references
• Prerequisites for managing Windows hosts on page 95
After you verify the prerequisites, you must also complete the following setup
tasks on the Linux or Solaris host:
• Set up the account used with Compute Systems Manager.
• Permit access for the Compute Systems Manager IP connection.
• Verify the required Linux or Solaris files and directories.
• Enable Wake-on-Lan (optional).
Related concepts
• About permissions for logging into a Linux or Solaris managed host on
page 105
Related tasks
• Setting up an account on a Linux or Solaris host for Hitachi Compute
Systems Manager on page 103
• Verifying the Linux or Solaris files and directories on page 103
• Setting up an IP connection with a Linux or Solaris host on page 104
• Setting up root user access for a Linux or Solaris host on page 106
• Setting up permission for normal users to use the Linux or Solaris su
command on page 107
Procedure
1. Ensure that the following standard OS command paths have not been
changed:
/sbin, /bin, /usr/sbin, /usr/bin
2. Confirm that the following directories exist:
For Linux hosts: /proc, /sys
Related references
• Prerequisites for managing Linux or Solaris hosts on page 102
Procedure
Result
Remote connections are now possible between the management server and
the Linux or Solaris host.
Related concepts
• About permissions for logging into a Linux or Solaris managed host on
page 105
Related references
• Prerequisites for managing Linux or Solaris hosts on page 102
Procedure
Example entry:
sshd:168.1.2.3
2. Ensure that no other users can connect using the SSH protocol by
verifying the settings in the /etc/ssh/sshd_config file:
a. Open the /etc/ssh/sshd_config file.
b. Edit the file so that the settings match the following:
PermitRootLogin: yes (see below for exceptions)
PasswordAuthentication: yes
For Red Hat Linux 7 and Oracle Linux 7: systemctl restart sshd
Result
The management server can now connect to the Linux or Solaris host by
using an SSH IP connection.
Related references
• Prerequisites for managing Linux or Solaris hosts on page 102
When using Compute Systems Manager, users access Linux or Solaris hosts
using one of the following methods. You determine with method to use based
on the operations the user must complete and your network environment.
• Access as a root user
By providing root user access, you ensure that users have the rights to do
all tasks. Although this may seem like a simple solution, it is the biggest
security risk. To ensure that the root password is kept secure and that the
settings of managed resources remain safe, only use root user access if
your environment uses precautions that prevent unauthorized access.
• Access as a normal user with root user privileges using the su command
Accessing a host as a normal user with root user privileges using with the
su command is more secure than accessing hosts as a root user, as long
as unauthorized personnel do not obtain the user ID or password. The root
user password is required to grant a normal user root user privileges.
• Access as a normal user with root user privileges using the sudo command
(for Linux) or the pfexec command (for Solaris).
Accessing a host as a normal user with root user privileges using the sudo
or pfexec command is the safest of the three methods, but requires that
you set up the sudo or pfexec command on each managed host. To
execute commands with root user privileges, the sudo command (for
Related tasks
• Setting up an account on a Linux or Solaris host for Hitachi Compute
Systems Manager on page 103
• Setting up an IP connection with a Linux or Solaris host on page 104
• Setting up root user access for a Linux or Solaris host on page 106
• Setting up permission for normal users to use the Linux or Solaris su
command on page 107
• Setting up permission for normal users to use the Linux sudo command on
page 108
• Setting up permission for normal users to use the Solaris pfexec command
on page 109
Note: You do not need to set up root access if you are going to log in to the
managed host as a normal user using the Linux su, sudo or the Solaris
pfexec command.
Procedure
Result
Compute Systems Manager can now communicate with the Linux or Solaris
host using root user login access.
Related references
• Prerequisites for managing Linux or Solaris hosts on page 102
Note: You do not need to complete this setup task if you are going to log in
to the managed host as a root user or a normal user using the Linux sudo
command or the Solaris pfexec command.
Procedure
For details about how to set up managed hosts using the Compute
Systems Manager interface, see the Hitachi Command Suite Compute
Systems Manager User Guide.
2. Optionally, you can ensure that root access to the host is not permitted
by editing the /etc/ssh/sshd_config file on the Linux or Solaris
machine and setting the PermitRootLogin parameter to no.
Related tasks
• Setting up root user access for a Linux or Solaris host on page 106
• Setting up permission for normal users to use the Linux sudo command on
page 108
Related references
• Prerequisites for managing Linux or Solaris hosts on page 102
Note: You do not need to complete this setup task if you are going to log in
to the managed host as a root user or a normal user using the su command.
Procedure
For Red Hat Linux 6 or later, Oracle Linux 6 or later, SUSE Linux 11 SP1
or later, and SUSE Linux 12 only, also add:
normal-user-name managed-host-name =NOPASSWD: /usr/sbin/
exportfs
For details about how to set up managed hosts using the Compute
Systems Manager user interface, see the Hitachi Command Suite
Compute Systems Manager User Guide.
Result
Normal users can now log in to the Linux host and use the sudo command.
Related concepts
• About permissions for logging into a Linux or Solaris managed host on
page 105
Related tasks
• Setting up root user access for a Linux or Solaris host on page 106
• Setting up permission for normal users to use the Linux or Solaris su
command on page 107
Related references
• Prerequisites for managing Linux or Solaris hosts on page 102
Note: You do not need to complete this setup task if you plan to log in to the
managed host as a root user or a normal user using the su command.
Procedure
For details about how to set up managed hosts using the Compute
Systems Manager user interface, see the Hitachi Command Suite
Compute Systems Manager User Guide.
Related concepts
• About permissions for logging into a Linux or Solaris managed host on
page 105
Related tasks
• Setting up an account on a Linux or Solaris host for Hitachi Compute
Systems Manager on page 103
• Setting up an IP connection with a Linux or Solaris host on page 104
Related references
• Prerequisites for managing Linux or Solaris hosts on page 102
Procedure
1. Log in to the Linux target machine as a super user, and then back up the
following file:
/etc/snmp/snmp.conf
If there is not such line, add a new line starting with trapsink.
4. Access the hfcldd-snmpd-conf.txt file located on the Compute Systems
Manager installation disk in the following directory:
/HCSM_SERVER/HCSM/snmp/linux
5. Append the contents of hfcldd-snmpd-conf.txt file to the end of the
following file:
/etc/snmp/snmpd.conf
6. Restart snmpd by entering the following command:
/etc/init.d/snmpd restart
7. Repeat this entire procedure for each Linux management target on which
you want to monitor inband events using SNMP.
Related concepts
• About monitoring inband SNMP traps on page 71
Related tasks
• Configuring the management server to receive inband SNMP traps on
page 72
• Changing Hitachi Compute Systems Manager ports on page 78
If you want to use inband SNMP traps to send inband driver event traps from
a managed host, you must install SNMP-related packages on the host, and
then configure snmpd. You must do this on each Solaris host from which you
want to send inband driver event traps.
Before you configure Solaris managed hosts targets to send inband driver
events, install the following packages on each Solaris management target:
Procedure
where:
• HCSM-server-address is the host name or IP address of the Compute
Systems Manager server
• community-name is a proper SNMP community name.
• port-number is the port number of the Compute Systems Manager
server trap listening port (optional). If the port number of the
Compute Systems Manager server's SNMP trap listening port is not
162 (the default number), you also need to change the SNMP trap
destination port number.
Related concepts
• About monitoring inband SNMP traps on page 71
Related tasks
• Configuring the management server to receive inband SNMP traps on
page 72
• Changing Hitachi Compute Systems Manager ports on page 78
For details about using host discovery to update host information, see the
Hitachi Command Suite Compute Systems Manager User Guide.
Related tasks
• Adding resources to Hitachi Compute Systems Manager on page 61
For details about using chassis discovery to update chassis information, see
the Hitachi Command Suite Compute Systems Manager User Guide.
Compute Systems Manager can use SSL or TLS for the following types of
communication:
• Communication between the management server and management clients
• Communication between the management server and the SMTP server
• Communication between the management server and management targets
• Communication between the management server and the Hitachi Device
Manager server
• Communication between the management server and an external
authentication server (LDAP directory server)
In addition, you can restrict access so that only specific management clients
can access the management server.
Note: When you use Compute Systems Manager with security enabled, make
sure that the server certificate is not expired. If the server certificate is
expired, you need to register a valid certificate to Compute Systems Manager
because users might not be able to connect to it.
Related concepts
• About secure communications for management clients on page 119
• About secure communications for the SMTP server on page 130
• About secure communications for the Device Manager server on page 136
Related tasks
• Setting up SSL on the server for secure client communication on page 119
• Setting up SSL on web-based management clients on page 128
• Setting up SSL on management clients running the CLI on page 128
• Setting up SSL on web-based management clients on page 128
• Setting up SSL for communicating with the Device Manager server on
page 136
• Checking the server certificate expiration date on page 139
• Configuring SSL for a secure LDAP server connection on page 154
Related tasks
• Setting up SSL on the server for secure client communication on page 119
• Setting up SSL on web-based management clients on page 128
• Setting up SSL on management clients running the CLI on page 128
Verify the following information for the certificate authority that you are
using:
• The certificate signing request you created by using the hcmds64ssltool
command is in PEM format, and the key size of the private key is 2048 bits
for RSA server certificates or 256 (or 384) bits for ECC server certificates.
• The server certificate issued by the certificate authority uses X.509 PEM
format and supports the signature algorithm.
• The server certificate application process is understood.
If a file with the same name as the file you are creating currently exists in
the output destination path, the file is not overwritten when you use the
hcmds64ssltool command. This means that If you want to recreate a file
with the same name, you must back up or delete the existing file in advance.
Procedure
where
• key specifies the absolute path of the private key file that is created. If
you omit this option, the file is output to the default output destination
path# with the file name httpsdkey.pem (for RSA) or ecc-
httpsdkey.pem (for ECC).
• csr specifies the absolute path of the certificate signing request file
that is created. If you omit this option, the file is output to the default
output destination path# with the file name httpsd.csr (for RSA) or
ecc-httpsd.csr (for ECC).
• cert specifies the absolute path of the self-signed certificate file that
is created. If you omit this option, the file is output to the default
output destination path# with the file name httpsd.pem (for RSA) or
ecc-httpsd.pem (for ECC).
This command outputs the RSA and ECC files to the specified output
destination path. RSA files for are output with the specified file name,
and ECC files for output with a prefix of "ecc-".
#The default output destination when you omit the key, csr, cert, or
certtext options is as follows:
In Windows:
HCS-Common-Component-installation-folder\uCPSB\httpsd\conf
\ssl\server
In Linux:
HCS-Common-Component-installation-directory/uCPSB/httpsd/
conf/ssl/server
3. When prompted, enter the following information after the colon(:).
• Server Name (management server host name) - for example,
HCSM_SC1.
• Organizational Unit (section) - for example, Compute Systems
Manager.
• Organization Name (company) - for example, Hitachi.
• City or Locality Name - for example, Santa Clara.
• State or Province Name (full name) - for example, California.
• Country Name (2 letter code) - for example, US.
When you use this command without specifying the key, csr, or cert
options in Step 2, the files are output to these directories.
7. Open user_httpsd.conf file from the following location:
• In Windows:
HCS-Common-Component-installation-folder\uCPSB\httpsd\conf
\user_httpsd.conf
• In Linux:
HCS-Common-Component-installation-directory/uCPSB/httpsd/
conf/user_httpsd.conf
8. Within the user_httpsd.conf file, do the following:
a. Uncomment the following lines by removing the hash [#] signs:
#Listen 22016
#<VirtualHost *:22016>
through
#HWSLogSSLVerbose On
ServerName host-name
Listen 22015
Listen [::]:22015
#Listen 127.0.0.1:22015
SSLDisable
Listen 22016
SSLCertificateKeyFile
SSLCertificateFile
SSLECCCertificateKeyFile
SSLECCCertificateFile
#SSLCACertificateFile
Note:
• To block non-SSL communication from external servers to the
management server, comment out the lines Listen 22015
and Listen [::]:22015 by adding a hash mark (#) to the
beginning of each line. After you comment out these lines,
ServerName host-name
Listen 22015
Listen [::]:22015
#Listen 127.0.0.1:22015
SSLDisable
Listen 22016
#Listen [::]:22016
<VirtualHost *:22016>
ServerName host-name
SSLEnable
SSLProtocol TLSv1 TLSv11 TLSv12
SSLRequiredCiphers ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-
AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-
AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-ECDSA-AES128-
SHA:AES256-SHA256:AES256-SHA:AES128-SHA256:AES128-SHA:DES-
CBC3-SHA
SSLRequireSSL
SSLCertificateKeyFile
"HCS-Common-Component-installation-directory/uCPSB/httpsd/
conf/ssl/server/private-key-file-for-RSA"
SSLCertificateFile
"HCS-Common-Component-installation-directory/uCPSB/httpsd/
conf/ssl/server/server-certificate-or-self-signed-
certificate-file-for-RSA"
SSLECCCertificateKeyFile
"HCS-Common-Component-installation-directory/uCPSB/httpsd/
conf/ssl/server/private-key-file-for-ECC"
SSLECCCertificateFile
"HCS-Common-Component-installation-directory/uCPSB/httpsd/
conf/ssl/server/server-certificate-or-self-signed-
certificate-file-for-ECC"
# SSLCACertificateFile
"HCS-Common-Component-installation-directory/uCPSB/httpsd/
conf/ssl/cacert/certificate-file-from-certificate-authority"
</VirtualHost>
HWSLogSSLVerbose On
9. Start Compute Systems Manager.
10. Update the Compute Systems Manager URL using the hcmds64chgurl
command as follows:
• Change the protocol from http: to https:
• Change the port number used for secure communication.
Result
SSL is now implemented on the Compute Systems Manager server.
Related tasks
• Setting up SSL on web-based management clients on page 128
• Setting up SSL on management clients running the CLI on page 128
• Closing the non-SSL communication port on page 126
• Checking the server certificate expiration date on page 139
Related references
• Properties related to web server communication including SSL settings
(user_httpsd.conf) on page 314
Procedure
1. Open user_httpsd.conf:
• In Windows:
HCS-Common-Component-installation-folder\uCPSB\httpsd\conf
\user_httpsd.conf
• In Linux:
:
#Listen 22015
#Listen [::]:22015
#Listen 127.0.0.1:22015
#SSLDisable
:
#<VirtualHost *:22016>
# ServerName host-name
:
#</VirtualHost>
3. Run the following command to import the server certificate into the
truststore (jssecacerts):
• In Windows:
HCS-Common-Component-installation-folder\bin\hcmds64keytool
-import -alias unique-name-in-the-truststore -file HCS-
Common-Component-installation-folder\uCPSB\httpsd\conf\ssl
\server\server-certificate-file -keystore HCS-Common-
Component-installation-folder\uCPSB\jdk\jre\lib\security
\jssecacerts -storepass password-to-access-the-truststore
• In Linux:
HCS-Common-Component-installation-directory/uCPSB/jdk/bin/
keytool -import -alias unique-name-in-the-truststore -file
HCS-Common-Component-installation-directory/uCPSB/httpsd/
conf/ssl/server/server-certificate-file -keystore HCS-
Common-Component-installation-directory/uCPSB/jdk/jre/lib/
security/jssecacerts -storepass password-to-access-the-
truststore
4. Verify the contents of the imported truststore.
• In Windows:
HCS-Common-Component-installation-folder\bin\hcmds64ssltool
-list -v -keystore HCS-Common-Component-installation-folder
\uCPSB\jdk\jre\lib\security\jssecacerts -storepass
truststore-password
• In Linux:
HCS-Common-Component-installation-directory/bin/
hcmds64ssltool -list -v -keystore HCS-Common-Component-
installation-directory/uCPSB/jdk/jre/lib/security/
jssecacerts -storepass truststore-password
5. Restart Compute Systems Manager.
6. Verify that you can log in to the Compute Systems Manager user
interface.
If the signature algorithm used is SHA256 with RSA, the Web browser in use
must support a server certificate that has an SHA256 with RSA signature.
Procedure
1. From the management web client, access the management server using
an SSL connection by typing the following URL:
https://HCSM-management-server-name:port-number-for-SSL-
communication/ComputeSystemsManager/
2. Install the SSL certificate.
Result
The SSL certificate is registered on the management client so it can
communicate with the management server using SSL.
Related concepts
• About secure communications for management clients on page 119
Related tasks
• Setting up SSL on the server for secure client communication on page 119
• Setting up SSL on management clients running the CLI on page 128
where:
• server-certificate-file is the server certificate that you saved in step 1.
• changeit is the default keystore password for the truststore
(cacerts). If you receive an invalid password error, confirm the
password with an administrator.
3. To set the Compute Systems Manager server location, use the following
command:
• In Windows:
CLI-installation-folder\csm configure
• In Linux:
CLI-installation-directory/csm configure
4. When prompted, enter the following information:
HCSM server host name: HCSM-server-name
Use SSL: y
Result
The SSL server certificate is registered on the management client so it can
communicate with the management server using SSL.
Related tasks
• Setting up SSL on the server for secure client communication on page 119
• Setting up SSL on web-based management clients on page 128
Related concepts
• About secure communications for the SMTP server on page 130
• About secure communications for management clients on page 119
Related tasks
• Checking the server certificate expiration date on page 139
Related concepts
• About Hitachi Compute Systems Manager security settings on page 118
• About Hitachi Compute Systems Manager security settings on page 118
Related tasks
• Setting up SSL for communicating with the SMTP server on page 130
Procedure
Result
The SSL certificate is registered on the management server so that it can
communicate with the SMTP server using SSL.
Related concepts
• About secure communications for the SMTP server on page 130
• About secure communications for management clients on page 119
Related tasks
• Checking the server certificate expiration date on page 139
Before updating the SSL configuration on the server, verify the following
prerequisites:
• If you plan to install a certificate for a Hitachi server, you must first obtain
the certificate from the Hitachi server. For details on how to obtain the
certificate, see the Hitachi server documentation.
Verify the following information for the certificate authority that you are
using:
• The certificate signing request you created by using the hcmds64keytool
or keytool command is in PEM format, and the key size of the private key
is 2048 bits.
• The server certificate issued by the certificate authority uses X.509 PEM
format and supports the signature algorithm.
• The server certificate application process is understood.
Procedure
In Windows:
HCS-Common-Component-installation-folder\bin
\hcmds64keytool -exportcert -file certificate-file-to-
export -keystore HCSM-installation-folder
\ComputeSystemsManager\conf\ssl\keystore-file-name -
storepass keystore-password -alias unique-name-in-
keystore
In Linux:
HCS-Common-Component-installation-directory/
uCPSB/jdk/bin/keytool -exportcert -file certificate-
file-to-export -keystore HCSM-installation-directory/
ComputeSystemsManager/conf/ssl/keystore-file-name -
storepass keystore-password -alias unique-name-in-
keystore
When specifying the variable for the alias option, specify the
same unique name you specified in step 2.
Result
The management server now uses the new self-signed certificate to increase
security for alert transmissions sent by a server.
Related concepts
• About setting up secure communication for an external authentication
server on page 137
Related tasks
• Checking the server certificate expiration date on page 139
Related concepts
• About Hitachi Compute Systems Manager security settings on page 118
Related tasks
• Setting up SSL for communicating with the Device Manager server on
page 136
Procedure
Result
The SSL certificate is registered on the management server so that it can
communicate with the Device Manager server using SSL.
Related concepts
• About secure communications for the Device Manager server on page 136
• About secure communications for management clients on page 119
Related tasks
• Starting Hitachi Compute Systems Manager on page 186
• Stopping Hitachi Compute Systems Manager on page 187
• Checking the server certificate expiration date on page 139
Related tasks
• Strengthening security for managed server alert communication on
page 132
Related concepts
• About restricting management client access to Hitachi Compute Systems
Manager on page 138
Related tasks
• Restricting management server access from a management client on
page 138
Note: If you log in to a Hitachi Command Suite product other than Compute
Systems Manager on a management client that is not registered in the
user_httpsd.conf file, you cannot start the Compute Systems Manager GUI
from the management client GUI.
Procedure
Related concepts
• About restricting management client access to Hitachi Compute Systems
Manager on page 138
Related references
• Properties related to web server communication including SSL settings
(user_httpsd.conf) on page 314
Note: You do not need to check the expiration date of the certificate if you
are using the default SSL settings for communication between the
management server and managed servers.
Tip: In addition to these commands, you can also use operating system
functions to check information about the server certificate.
Related concepts
• About Hitachi Compute Systems Manager security settings on page 118
Related tasks
• Setting up SSL for communicating with the SMTP server on page 130
• Setting up SSL on the server for secure client communication on page 119
• Setting up SSL for communicating with the Device Manager server on
page 136
• Strengthening security for managed server alert communication on
page 132
• Configuring SSL for a secure LDAP server connection on page 154
If you register the user IDs stored on the external authentication server with
Hitachi Compute Systems Manager, you can use the same user IDs to log in
to Compute Systems Manager. This means that you do not have to manage
login passwords and control accounts in Compute Systems Manager.
Compute Systems Manager supports connections with both LDAP directory
servers and Kerberos servers.
You can connect directly to an LDAP directory server or use a DNS server to
obtain information about the LDAP server. If you use a DNS server, be aware
that user logins might take more time. In addition, if you use a DNS server,
you cannot set up secure communication with the LDAP server.
Related concepts
• LDAP directory server connection workflow on page 143
• About using an external authorization server on page 142
• Workflow for setting up an LDAP directory server on page 33
Related tasks
• Configuring an LDAP server connection on page 151
• Configuring a Kerberos server connection on page 157
Related tasks
• Configuring an LDAP server connection on page 151
• Configuring a Kerberos server connection on page 157
The following figure illustrates the workflow for using an LDAP directory
server to authenticate users.
Related concepts
• About using an external authorization server on page 142
• About using an external authentication server on page 142
Related tasks
• Creating resource groups on page 63
• Creating user groups and setting up access control on page 63
• Configuring an LDAP server connection on page 151
Related references
• Command format for verifying an external server connection on page 168
The following figure illustrates the workflow for using an Kerberos server to
authenticate users.
Related concepts
• About using an external authorization server on page 142
• About using an external authentication server on page 142
Related tasks
• Creating resource groups on page 63
• Creating user groups and setting up access control on page 63
• Configuring a Kerberos server connection on page 157
Related references
• Command format for verifying an external server connection on page 168
If the LDAP server uses the flat model, the entries below the Base DN
structure are searched for an entry that matches the DN that consists of a
combination of the login ID and Base DN. If the user value is found, the user
is authenticated.
If, however, either of the following conditions exists, you must specify the
settings as if a hierarchical structure model exists, regardless of whether the
server uses a flat model:
• A user attribute value other than the RDN attribute value is used as the
user ID of a Compute Systems Manager user (for example, the Windows
logon ID).
• The RDN attribute value of a user ID entry includes a character that is
invalid in a Compute Systems Manager user ID. When using the
authentication method for the flat model, the RDN attribute value of a user
entry functions as the user ID for Compute Systems Manager. Therefore, if
the RDN attribute value of a user entry includes an invalid Compute
Systems Manager character, you cannot use the authentication method for
the flat model. The following is an example of a valid RDN:
The following is an example of a valid RDN:
uid=John123S
cn=John_Smith
The following is an example of an invalid RDN:
uid=John:123S (colon required)
cn=John Smith (a space between John and Smith required)
Related concepts
• LDAP server hierarchical data structure model on page 149
• LDAP data structure Base DN on page 150
If the LDAP server uses the hierarchical structure model, the entries below
the Base DN in the hierarchy are searched for an entry that matches the
login ID and user attribute value specified in the authentication request. If
the user is found, the user is authenticated.
Related concepts
• LDAP server flat data structure model on page 147
• LDAP data structure Base DN on page 150
Related concepts
• LDAP server hierarchical data structure model on page 149
• LDAP server flat data structure model on page 147
Related tasks
• Prerequisites for determining LDAP server connection properties on
page 150
Related concepts
• LDAP server hierarchical data structure model on page 149
Related tasks
• Configuring an LDAP server connection on page 151
Note: If you use a DNS server to look up the LDAP directory server, user
logins might take longer.
Related tasks
• Configuring an LDAP server connection on page 151
Related references
• Settings for using DNS to connect to an LDAP server on page 160
• Settings for connecting directly to an LDAP server and an authorization
server on page 161
Procedure
For details and step-by-step procedures for all of these options, see the
Hitachi Command Suite Compute Systems Manager User Guide.
8. To link also with an external authorization server, log in to Compute
Systems Manager by using a user account registered on the LDAP
directory server.
Result
The Compute Systems Manager management server is now connected to an
external LDAP directory server for authentication.
Related concepts
• About using an external authentication server on page 142
• About using an external authorization server on page 142
Related tasks
• Prerequisites for determining LDAP server connection properties on
page 150
• Configuring SSL for a secure LDAP server connection on page 154
• Deleting an LDAP search user on page 173
Related references
• Prerequisites for using a DNS server to connect to an LDAP server on
page 151
• Prerequisites for registering a search user on page 170
Procedure
1. Verify that you have completed the steps required to set up a connection
to the LDAP directory server.
2. On the Compute Systems Manager management server, edit the
exauth.properties file to specify secure communication in the following
parameter fields:
• auth.ocsp.enable (optional)
• auth.ocsp.responderURL (optional)
• auth.ldap.ServerName.protocol (required)
3. If you changed the property value for either auth.ocsp.enable or
auth.ocsp.responderURL, you must restart the Compute Systems
Manager services. Other changes do not require restarting the services.
4. To determine whether the LDAP directory server certificate has already
been set up for Hitachi Command Suite Common Component, use the
following command:
• In Windows:
HCS-Common-Component-installation-folder\bin\hcmds64keytool
-list -v keystore HCS-Common-Component-installation-folder
\uCPSB\jdk\jre\lib\security\cacerts -storepass password-for
accessing-truststore
• In Linux:
HCS-Common-Component-installation-directory/uCPSB/jdk/bin/
keytool -list -v keystore HCS-Common-Component-
installation-directory/uCPSB/jdk/jre/lib/security/cacerts -
storepass password-for accessing-truststore
Result
The Compute Systems Manager management server now connects to an
external LDAP directory server using a secure connection.
Related tasks
• Configuring an LDAP server connection on page 151
• Checking the server certificate expiration date on page 139
Related references
• Prerequisites for configuring a secure LDAP server connection on
page 173
• Settings for connecting directly to an LDAP server on page 159
• Settings for connecting directly to an LDAP server and an authorization
server on page 161
auth.kerberos.default_tkt_enctypes=rc4-hmac
Related references
• Settings for connecting directly to a Kerberos server on page 163
• Settings for using DNS to connect to a Kerberos server and an
authorization server on page 166
Procedure
For details and step-by-step procedures for all of these options, see the
Hitachi Command Suite Compute Systems Manager User Guide.
7. To link also with an external authorization server, log in to Compute
Systems Manager by using a user account registered on the Kerberos
server.
Result
The Compute Systems Manager management server is now connected to an
external Kerberos server for authentication.
Related concepts
• About using an external authentication server on page 142
• About using an external authorization server on page 142
Related tasks
• Deleting an LDAP search user on page 173
• Configuring SSL for a secure LDAP server connection on page 154
• Configuring a Kerberos server connection on page 157
Related references
• Command format for verifying an external server connection on page 168
• Prerequisites for registering a search user on page 170
• Command format for registering a search user on page 171
• Properties related to Kerberos server connections (exauth.properties) on
page 329
• Settings for connecting directly to a Kerberos server on page 163
• Settings for using DNS to connect to a Kerberos server and an
authorization server on page 166
auth.server.type ldap
Related tasks
• Configuring an LDAP server connection on page 151
Related references
• Properties related to LDAP directory server connections
(exauth.properties) on page 322
• Example properties file for external LDAP directory server connections
(exauth.properties) on page 327
auth.server.type ldap
auth.server.name Server identification name of the LDAP server
auth.group.mapping false
auth.ldap.ServerName.protocol ldap
auth.ldap.ServerName.timeout Amount of time to wait before an LDAP
directory server connection time-out
auth.ldap.ServerName.attr Name of the attribute that defines the user
ID value included in the certificate
auth.ldap.ServerName.basedn DN (Base DN)
auth.ldap.ServerName.retry.interval Retry interval when LDAP server
communication fails
auth.ldap.ServerName.retry.times Number of times to retry a connection when
LDAP server communication fails
auth.ldap.ServerName.domain.name Name of the domain managed by the LDAP
server
auth.ldap.ServerName.dns_lookup true
Related tasks
• Configuring an LDAP server connection on page 151
Related references
• Prerequisites for using a DNS server to connect to an LDAP server on
page 151
• Properties related to LDAP directory server connections
(exauth.properties) on page 322
• Example properties file for external LDAP directory server connections
(exauth.properties) on page 327
auth.server.type ldap
Related tasks
• Configuring an LDAP server connection on page 151
Related references
• Properties related to LDAP directory server connections
(exauth.properties) on page 322
• Example properties file for external LDAP directory server connections
(exauth.properties) on page 327
auth.server.type ldap
auth.server.name Server identification name of the LDAP server
auth.group.mapping true
auth.ldap.ServerName.p ldap
rotocol
auth.ldap.ServerName.t Amount of time to wait before an LDAP directory server connection
imeout time-out.
auth.ldap.ServerName.a Name of the attribute that defines the user ID value included in the
ttr certificate.
auth.ldap.ServerName.b DN (Base DN)
asedn
auth.ldap.ServerName.r Retry interval when LDAP server communication fails
etry.interval
auth.ldap.ServerName.r Number of times to retry a connection when LDAP server
etry.times communication fails
auth.ldap.ServerName.d Name of the domain managed by the LDAP server
omain.name
auth.ldap.ServerName.d true
ns_lookup
Related tasks
• Configuring an LDAP server connection on page 151
Related references
• Prerequisites for using a DNS server to connect to an LDAP server on
page 151
• Properties related to LDAP directory server connections
(exauth.properties) on page 322
• Example properties file for external LDAP directory server connections
(exauth.properties) on page 327
auth.server.type kerberos
auth.group.mapping false
auth.ocsp.enable false
Related tasks
• Configuring a Kerberos server connection on page 157
Related references
• Encryption types for Kerberos authentication on page 156
• Properties related to Kerberos server connections (exauth.properties) on
page 329
auth.server.type kerberos
auth.group.mapping false
auth.kerberos.default_re Realm name
alm
auth.kerberos.dns_lookup true
_kdc
auth.kerberos.default_tk Encryption type used for Kerberos authentication
t_enctypes
auth.kerberos.clockskew Acceptable time difference range between the management server
and the Kerberos server
auth.kerberos.timeout Amount of time to wait before a Kerberos server connection time-out
Related tasks
• Configuring a Kerberos server connection on page 157
Related references
• Encryption types for Kerberos authentication on page 156
• Properties related to Kerberos server connections (exauth.properties) on
page 329
auth.server.type kerberos
auth.group.mapping true
auth.kerberos.default.realm Realm name
auth.kerberos.dns_lookup_kdc false
auth.kerberos.clockskew Acceptable range for the time difference
between the management server and the
Kerberos server.
auth.kerberos.timeout Amount of time to wait before the
Kerberos server connection times out.
auth.ocsp.enable false
Related tasks
• Configuring a Kerberos server connection on page 157
Related references
• Properties related to Kerberos server connections (exauth.properties) on
page 329
auth.server.type kerberos
auth.group.mapping true
Related tasks
• Configuring a Kerberos server connection on page 157
Related references
• Properties related to Kerberos server connections (exauth.properties) on
page 329
In Windows:
• If you include the following characters in an argument, enclose the
argument in double quotation marks (") or use a caret (^) to escape each
character:
Spaces & | ^ < > ( )
• Backslashes (\) included in the arguments are treated specially in the
command line.
○ A backslash might be treated as an escape character depending on the
character that follows it.
In Linux:
• If you include the following characters in an argument, enclose the
argument in double quotation marks (") or use a backslash (\) to escape
each character:
Spaces # & ' ( ) ~ \ ` < > ; |
Note that a backslash in an argument is treated as an escape character
even if the argument is enclosed in double quotation marks. If a backslash
is included in an argument, escape it by using another backslash.
Related tasks
• Configuring an LDAP server connection on page 151
• Configuring a Kerberos server connection on page 157
Related references
• Command format for verifying an external server connection on page 168
When typing the user ID or password, ensure that you adhere to the
following rules:
• You cannot specify a user account with a user-ID or password that begins
with a forward slash (/) when using Windows or begins with a hyphen (-)
when using Linux.
• Both must match the ID and password of the user account that you
registered for checking connections with the external authentication and
external authorization servers.
When using LDAP authentication, specify the same user-ID that is listed in
the auth.ldap.auth.server.name-property-value.attr in the
exauth.properties file.
Important: If you are using Kerberos authentication and the realm name is
specified multiple times in the exauth.properties file, check the user
account for each realm. In addition, specify the user ID using the following
format:
• When specifying a user who does not belong to the realm specified for
auth.kerberos.default_realm in the exauth.properties file, specify
the realm name in addition to the user ID.
• When specifying a user who belongs to the realm specified as the
auth.kerberos.default_realm in the exauth.properties file, specify
the user ID only (you can omit the realm name).
If you run the command with the summary option specified, the confirmation
message is displayed in summary format.
The results from the hcmds64checkauth command are divided into the
following four phases:
• Phase 1: The command verifies that common properties are correctly
specified in the exauth.properties file.
• Phase 2: The command verifies that the properties for the external
authentication server and the external authorization server are correctly
specified in the exauth.properties file.
• Phase 3: The command verifies that the management server can connect
to the external authentication server.
• Phase 4: If the management server is also linked to an external
authorization server, the command verifies that the management server
can connect to the external authorization server and can search
authorization groups.
Related references
• About using commands to connect to an external authentication server on
page 167
• Settings for connecting directly to an LDAP server on page 159
• Settings for connecting directly to a Kerberos server on page 163
• Settings for connecting directly to an LDAP server and an authorization
server on page 161
• Settings for connecting directly to a Kerberos server and an authorization
server on page 165
Note: If you are using Active Directory, you can use the dsquery command
provided by Active Directory to check the DN of a user with administrative
rights:
dsquery user -name administrator
Related tasks
• Checking the registration status of an LDAP search user on page 172
• Configuring an LDAP server connection on page 151
• Configuring a Kerberos server connection on page 157
• Password—specifies the password for the user account that must exactly
match the password registered on the authentication server, including
case. If the password is omitted, the user is prompted for a password.
Type the password as instructed by the prompt message.
• Server identification name—the name differs depending on the
authentication method.
For LDAP authentication use the server identifier for the LDAP directory
server:
○ Specify the server identifier that has been specified for the
auth.server.name property in the exauth.properties file.
Related tasks
• Configuring an LDAP server connection on page 151
• Configuring a Kerberos server connection on page 157
• Deleting an LDAP search user on page 173
Related references
• Prerequisites for registering a search user on page 170
Related tasks
• Configuring an LDAP server connection on page 151
• Configuring a Kerberos server connection on page 157
• Deleting an LDAP search user on page 173
Related references
• Prerequisites for registering a search user on page 170
• Command format for registering a search user on page 171
Related tasks
• Configuring SSL for a secure LDAP server connection on page 154
Related references
• Command format for registering a search user on page 171
auth.kerberos.auth.kerberos.realm_name-property-values.kdc in the
exauth.properties file.
Related tasks
• Configuring an LDAP server connection on page 151
Related tasks
• Configuring SSL for a secure LDAP server connection on page 154
Related references
• Prerequisites for configuring a secure LDAP server connection on page 173
• Command format for importing LDAP server certificates on page 174
Hitachi Data Systems recommends that you import the LDAP directory server
certificate to ldapcacerts. If the certificate is shared by other programs, you
can import the certificate to jssecacerts.
Related tasks
• Configuring SSL for a secure LDAP server connection on page 154
Related references
• Prerequisites for configuring a secure LDAP server connection on page 173
• Rules for importing LDAP directory server certificates on page 174
Related tasks
• Installing Deployment Manager on page 181
• Configuring managed resources for use with Deployment Manager on
page 182
• Changing the Deployment Manager port number on page 183
• Verifying the system prerequisites on page 42
Related references
• Prerequisites for installing Deployment Manager on page 178
Related tasks
• Installing Internet Information Server on page 179
• Installing .NET Framework for Deployment Manager on page 180
Note: If the management server is already running IIS, you do not need to
install it again.
Procedure
1. Install IIS by using the standard steps provided with the operating
system documentation and then depending on the IIS version, specify
and install the following role services:
For IIS 7.x, set the following:
• Static Content
• ASP.NET
• Metabase Compatibility
• IIS Management Console
Related references
• Prerequisites for installing Deployment Manager on page 178
Before installing .NET Framework, verify that the prerequisite version of IIS is
installed on the server.
Procedure
Procedure
When you finish the Deployment Manager installation, you are returned
to the main Hitachi Compute Systems Manager installation program.
Note: You can change the port number the system uses for
internal communication between Deployment Manager and IIS
after installation by accessing the Administration tab.
Related tasks
• Changing the Deployment Manager port number on page 183
Related tasks
• Installing Deployment Manager on page 181
To set up a PXE boot (network boot) on a managed resource that you want to
use with Deployment Manager, you must change the BIOS start sequence for
the managed resource as follows:
• Place the network boot entry above (before) the hard disk drive (HDD)
entry.
• If there are multiple LAN boards, place the LAN board managed by
Deployment Manager above (before) the HDD, and then disable the PXE
boot settings for all other LAN boards. If you cannot disable these settings,
place the LAN board below (after) the HDD.
Related concepts
• About Deployment Manager environment settings on page 178
The procedure for changing the port number depends on which port number
you want to change.
• To change the port number used for internal communication with IIS
(default 80/tcp):
1. In the IIS settings, change the port number for the default website.
2. Log in to Compute Systems Manager, access the Administration tab,
and select Deployment > Settings.
3. Change the port number to the same value as you set in the first step.
• To change all other port numbers:
1. Stop Compute Systems Manager.
2. In the properties file, change the Deployment Manager port number.
3. Start Compute Systems Manager.
Related concepts
• About Deployment Manager environment settings on page 178
Related references
• Editing Deployment Manager properties and settings files when changing
ports on page 183
HCSM-installation-folder\ComputeSystemsManager\DeploymentManager
\PXE\Images
The Deployment Manager port.ini file includes the port and function-related
parameters listed in the following table:
HCSM-installation-folder\ComputeSystemsManager\DeploymentManager
\WebServer\App_Data\Config\
26500/tcp <Port>port-number-to-change</Port>
Related tasks
• Changing the Deployment Manager port number on page 183
Related references
• Properties related to Deployment Manager ports (port.ini) on page 338
To change the Compute Systems Manager settings, you must manually stop
and start Compute Systems Manager. You can choose whether to stop and
start Hitachi Command Suite only, or stop and start Compute Systems
Manager in addition to all other Hitachi Command Suite products.
Related tasks
• Starting Hitachi Compute Systems Manager on page 186
• Stopping Hitachi Compute Systems Manager on page 187
• Checking the status of Hitachi Compute Systems Manager services on
page 190
Related references
• Hitachi Compute Systems Manager services and processes on page 188
To start Compute Systems Manager from the Linux command line, enter the
following command:
HCS-Common-Component-installation-directory/bin/hcmds64srv -start
The Compute Systems Manager services start. Other Hitachi Command Suite
products installed on the same machine, including Hitachi Command Suite
common component, also start.
Related tasks
• Stopping Hitachi Compute Systems Manager on page 187
• Checking the status of Hitachi Compute Systems Manager services on
page 190
Related references
• Hitachi Compute Systems Manager services and processes on page 188
Note: You must stop all Hitachi Command Suite services before making
configuration changes. Therefore, do not stop only the Compute Systems
Manager service unless there is a specific reason to do so (for example, when
troubleshooting an issue).
In Windows:
In Linux:
To stop Compute Systems Manager from the command line, use the following
command:
HCS-Common-Component-installation-directory/bin/hcmds64srv -stop
To stop only Compute Systems Manager but not other Hitachi Command
Suite products, use the following command:
HCS-Common-Component-installation-directory/bin/hcmds64srv -stop
-server ComputeSystemsManagerWebService
Related tasks
• Starting Hitachi Compute Systems Manager on page 186
• Checking the status of Hitachi Compute Systems Manager services on
page 190
Related references
• Hitachi Compute Systems Manager services and processes on page 188
cjstartweb.exe HCS Compute Systems Manager Web Hitachi Compute Systems Manager
Service servlet service.
hcmdssvctl.exe
When other products in the Hitachi
Command Suite are installed on the
same machine, processes for those
products might start with the name
cjstartweb.exe or hcmdssvctl.exe
cjstartweb.exe HBase 64 Storage Mgmt SSO Service Hitachi Command Suite servlet service
for single sign-on.
hcmdssvctl.exe
When other products in the Hitachi
Command Suite are installed on the
same machine, processes for those
products might start with the name
cjstartweb.exe or hcmdssvctl.exe
httpsd.exe HBase 64 Storage Mgmt Web Service Hitachi Command Suite common web
service.
rotatelogs.exe
Multiple instances of this process
might be running.
httpsd.exe HBase 64 Storage Mgmt Web SSO Hitachi Command Suite common web
Service service for single sign-on.
rotatelogs.exe
Multiple instances of this process
might be running.
hntr2mon.exe Hitachi Network Objectplaza Trace Hitachi Command Suite common trace
Monitor 2 information collection.
hcs_hsso
httpsd Hitachi Command Suite common web service.
Related concepts
• About starting and stopping Hitachi Compute Systems Manager on
page 186
Related tasks
• Checking the status of Hitachi Compute Systems Manager services on
page 190
In Windows:
In Linux:
To check Compute Systems Manager from the command line, use the
following command:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
statusall
Related concepts
• About starting and stopping Hitachi Compute Systems Manager on
page 186
Related references
• Hitachi Compute Systems Manager services and processes on page 188
Tip: To protect against failure, make sure that you regularly back up the
database using the hcmds64backups command and also export the database
using the hcmds64dbtrans command.
Note: To use backup software to back up a disk area that includes the
Compute Systems Manager installation directory or the database directory,
stop all services of Hitachi Command Suite products in advance.
If you back up the disk area without stopping services, a failure might occur
because of delayed I/O operations, file exclusion, or other causes.
Related tasks
• Backing up the database on page 193
• Restoring the database on page 194
• Exporting the database on page 196
• Importing the database on page 197
• Stopping Hitachi Compute Systems Manager on page 187
Related references
• Prerequisites for database backup on page 192
• Prerequisites for restoring the database on page 194
• Prerequisites for database migration on page 195
• Troubleshooting example: database corruption on page 269
where the size of the Compute Systems Manager and Hitachi Command Suite
Common Component databases is determined by the size of the directory
containing the database files. For details on the database sizes of other
Hitachi Command Suite products, see the documentation for those products.
Related tasks
• Backing up the database on page 193
Procedure
1. Verify the path name of the database backup directory that you created,
and then verify that the directory is empty (does not contain any
subdirectories or files).
2. Back up the database by using the following command:
• In Windows:
HCS-Common-Component-installation-folder\bin
\hcmds64backups /dir local-disk-folder-for-data-storage-
backup /auto
• In Linux:
HCS-Common-Component-installation-directory/bin/
hcmds64backups -dir local-disk-directory-for-data-storage-
backup -auto
The system creates the database backup files and saves the database
backup to the storage directory in a file named backup.hdb.
Result
You now have a backup copy of the latest Compute Systems Manager
database.
Note: The system backs up the Hitachi Command Suite setting files in a
different location than the database backup directory. If an error occurs in
the management server and you must reinstall the Hitachi Command Suite
products, use the backup setting files to obtain the previous settings.
Related concepts
• About database management on page 191
Related tasks
• Restoring the database on page 194
Related references
• Prerequisites for database backup on page 192
Caution: The hcmds64db command, that you use to restore the database,
creates temporary files while restoring the database. Ensure that you have
write permission for the database directory and that the directory has enough
free space.
Related concepts
• About database management on page 191
Related tasks
• Backing up the database on page 193
• Restoring the database on page 194
Result
The Compute Systems Manager database is now restored.
If other Hitachi Command Suite products run on the same host, those
products are also restored. If the command restores other Hitachi Command
Suite products, you might need to complete additional tasks for those
products. For details, see the Hitachi Command Suite product documentation.
Related concepts
• About database management on page 191
Related tasks
• Backing up the database on page 193
Related references
• Prerequisites for restoring the database on page 194
Before you start the migration process, complete the following prerequisite
tasks:
Related concepts
• About database management on page 191
Related tasks
• Exporting the database on page 196
• Importing the database on page 197
Procedure
1. Verify that the working directory that you plan to use for exports is
empty (does not contain any subdirectories or files).
2. To export the databases, run the following command:
• In Windows:
HCS-Common-Component-installation-folder\bin
\hcmds64dbtrans /export /workpath working-folder /file
archive-file /auto
• In Linux:
HCS-Common-Component-installation-directory/bin/
hcmds64dbtrans -export -workpath working-directory -file
archive-file -auto
Result
The database is exported. For migration, the exported database is ready for
you to import to the target Compute Systems Manager server.
Related concepts
• About database management on page 191
Related tasks
• Importing the database on page 197
Related references
• Prerequisites for database migration on page 195
Procedure
1. If you specified a value other than the default for a property on the
migration source management server, check and review the property
value set on the migration destination server. These values must match
for the property file migration to succeed. The property files are not
migrated during a database migration.
2. To import the database without an archive file (database files transferred
manually), go to step 3. To import the database using an archive file, use
the following command.
• In Windows:
Result
The Compute Systems Manager database is now running on the new server.
Related concepts
• About database management on page 191
Related tasks
• Exporting the database on page 196
Related references
• Prerequisites for database migration on page 195
Note: If an active node encounters a failure and fails over to the standby
node, any tasks that are running fail. This means that you must run the tasks
again on the standby node.
Related concepts
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
Related tasks
• Installing or upgrading Hitachi Compute Systems Manager in a Windows
cluster on page 214
Related references
• Determining which method to use when implementing in a cluster
environment on page 204
• Verifying management server free disk space in a cluster environment on
page 210
• Checking the cluster configuration using the cluster management software
on page 211
Related tasks
• Registering services to a cluster environment (Windows) on page 237
• Registering services to a cluster environment (Linux) on page 239
• Deleting services from the cluster management software (Windows) on
page 240
• Deleting services from the cluster management software (Linux) on
page 242
• Temporarily stopping Hitachi Compute Systems Manager in a cluster
environment (Windows) on page 245
• Temporarily stopping Hitachi Compute Systems Manager in a cluster
environment (Linux) on page 246
• Starting Hitachi Compute Systems Manager in a cluster environment
(Windows) on page 246
• Starting Hitachi Compute Systems Manager in a cluster environment
(Linux) on page 247
Related references
• Hitachi Compute Systems Manager services and processes on page 188
Note:
• When installing Compute Systems Manager to a cluster environment for
the first time or when migrating from a non-cluster environment to a
cluster environment, make sure that every node in the cluster has the
same disk configuration, and all Hitachi Command Suite products are
installed in the same location (including drive letter, path, etc.) on each
node.
• In Windows, the user must log in as a domain user with Administrator
permission to perform an installation in a cluster environment.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related references
• Verifying management server free disk space in a cluster environment on
page 210
• Checking the cluster configuration using the cluster management software
on page 211
Related tasks
• Installing or upgrading Hitachi Compute Systems Manager in a Windows
cluster on page 214
• Installing a new Hitachi Compute Systems Manager instance on a Linux
active node on page 218
• Upgrading or overwriting Hitachi Compute Systems Manager on a Linux
active node on page 225
• Migrating Hitachi Compute Systems Manager to a cluster environment
(Windows) on page 229
• Migrating Hitachi Compute Systems Manager to a cluster environment
(Linux) on page 233
• Upgrading the software from v7.x in a cluster environment on page 346
Related references
• Determining which method to use when implementing in a cluster
environment on page 204
• Checking the cluster configuration using the cluster management software
on page 211
• Prerequisites for database backup on page 192
Log in as a domain user with Administrative permissions and then use the
cluster management software to check the following items before setting up
Compute Systems Manager in a cluster environment:
• Verify that the group in which you plan to register services includes the
shared disk and client access point that can be inherited between the
active and standby nodes. The client access point is the cluster
management IP address and the logical host name.
• Verify that you can allocate, delete, and monitor resources by using the
cluster management software without any issues.
Services that are used in a cluster environment can be failed over together
by registering them as a group in the cluster management software. These
groups might be referred to by different names, such as "resource groups" or
"roles", depending on the versions of the cluster management software and
the OS.
Related tasks
• Installing or upgrading Hitachi Compute Systems Manager in a Windows
cluster on page 214
• Installing a new Hitachi Compute Systems Manager instance on a Linux
active node on page 218
• Upgrading or overwriting Hitachi Compute Systems Manager on a Linux
active node on page 225
• Migrating Hitachi Compute Systems Manager to a cluster environment
(Windows) on page 229
• Migrating Hitachi Compute Systems Manager to a cluster environment
(Linux) on page 233
• Upgrading the software from v7.x in a cluster environment on page 346
Related references
• Determining which method to use when implementing in a cluster
environment on page 204
• Verifying management server free disk space in a cluster environment on
page 210
Note:
• If other Hitachi Command Suite products are running on the installation
destination management server, ensure that all product versions are 8.0.1
or later. If a Hitachi Command Suite product with an earlier version is
installed, upgrade the product version to 8.0.1 or later.
• If Hitachi Device Manager is installed on the installation destination
management server and an instance of Hitachi Tuning Manager that is
installed on a separate machine is remotely connected to Hitachi Device
Manager, you must stop the Hitachi Tuning Manager service.
• You cannot install Compute Systems Manager by using a network drive.
Shared local devices using Windows Remote Desktop are considered
network drives, you cannot use this method either.
Related concepts
• About verifying the installation environment on page 45
• About verifying system prerequisites on page 42
Related tasks
• Installing the software (Windows) on page 52
• Installing from the integrated media by using the all-in-one installer
(Windows) on page 54
• Installing the software (Linux) on page 55
Procedure
3. After completing the installation or upgrade on the active node, use the
cluster management software to move the owner of the group in which
Hitachi Command Suite services are registered to the standby node.
4. Install or upgrade Compute Systems Manager on the standby node by
running the installation wizard.
During the installation or upgrade, ensure you follow these requirements:
• Install Compute Systems Manager in the same location as on the
active node.
• If you installed Deployment Manager on the active node, install it on
the standby node.
5. If you changed the database port number to a port number other than
the default, specify the port number that you recorded earlier.
Tip:
• If the svp.bind.address property is not specified, the IP
address of the active and standby nodes is registered on the
Hitachi server.
• The management server IP address, with which the Hitachi
server is communicating, is registered on the Hitachi server. If
you specify the svp.bind.address property, the IP address
specified for the property is also registered. You can check the
management server IP addresses registered on the Hitachi
servers by using the Web console. If you find management
server IP addresses that are no longer in use, delete them.
Related tasks
• Installing the software (Windows) on page 52
• Installing from the integrated media by using the all-in-one installer
(Windows) on page 54
• Installing Deployment Manager on page 181
• Setting up Deployment Manager in a cluster environment on page 244
• Upgrading the software from v7.x in a cluster environment on page 346
• Backing up the database in a cluster environment (Windows) on page 248
• Starting Hitachi Compute Systems Manager in a cluster environment
(Windows) on page 246
• Changing Hitachi Compute Systems Manager ports on page 78
Related references
• Hitachi Compute Systems Manager properties requiring updates for port
number changes on page 77
• Prerequisites for installing Deployment Manager on page 178
• Determining which method to use when implementing in a cluster
environment on page 204
• Verifying management server free disk space in a cluster environment on
page 210
• Checking the cluster configuration using the cluster management software
on page 211
• Settings requirements for virus scanning programs in a cluster
environment on page 243
• Synchronizing settings in a cluster environment on page 243
• Properties related to Hitachi Compute Systems Manager server ports and
functions (user.properties) on page 307
• Prerequisites for installing or upgrading the software on page 51
• Hitachi Command Suite properties requiring updates for port number
changes on page 75
Procedure
1. In the cluster management software, select the active node and start the
group.
Confirm that the group is moved to the active node and only the shared
disk and cluster management IP address are enabled.
2. Complete a new installation of Compute Systems Manager on the active
node.
If another Hitachi Command Suite product already exists in the cluster
environment, verify the following before installing Compute Systems
Manager:
• Access the shared disk and specify a path as the storage location for
the database.
• Use the IP address of the management server when specifying the
logical host name (the virtual host name allocated to the cluster
management IP address).
If the URL does not point to the logical host name, change the URL by
using the following command. As the host name, specify the host
name you entered during the installation process.
HCS-Common-Component-installation-directory/bin/
hcmds64chgurl -change http://IP-address-or-host-name-of-
active-node:port-number http://logical-host-name:port-
number
4. If you already have a Hitachi Command Suite product configured within
the cluster, skip to the next step. If Compute Systems Manager is the
first Hitachi Command Suite product in the cluster, create a cluster
configuration file as follows:
a. Add the following information to a blank text file:
mode=online
virtualhost=logical-host-name
onlinehost=active-node-host-name
standbyhost=standby-node-host-name
5. Use the following command to ensure that the Hitachi Command Suite
product services are stopped:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
status
6. Use the following command to ensure that the Hitachi Command Suite
services do not start automatically when the machine starts:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
starttype manual -all
7. To ensure that the Compute Systems Manager services do not start
automatically when the machine starts do one of the following:
• Move the files below to another directory.
• Change the file names. If you change the file names, do not use the
character K or S as the first letter of the new file names.
HCSM-installation-directory/ComputeSystemsManager/conf/
user.properties
9. To manage a Hitachi server, change the settings as needed so that the
management server IP address registered on the Hitachi server can be
used as the cluster management IP address.
Tip:
• If the svp.bind.address property is not specified, the IP
address of the active and standby nodes is registered on the
Hitachi server.
• The management server IP address, with which the Hitachi
server is communicating, is registered on the Hitachi server. If
you specify the svp.bind.address property, the IP address
specified for the property is also registered. You can check the
management server IP addresses registered on the Hitachi
servers by using the Web console. If you find management
server IP addresses that are no longer in use, delete them.
10. In the cluster management software, move the group in which you
registered the Compute Systems Manager services to the standby node.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
Related tasks
• Installing the software (Linux) on page 55
• Backing up the database in a cluster environment (Linux) on page 249
Before you install on the standby node, you must complete the installation on
the active node.
Procedure
4. If you changed the database port number on the active node, specify the
same port number on the standby node.
5. Use the following command to ensure that the Hitachi Command Suite
product services are stopped:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
status
6. Use the following command to ensure that the Hitachi Command Suite
product services do not start automatically when the machine starts:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
starttype manual -all
7. To ensure that the Compute Systems Manager services do not start
automatically when the machine starts do one of the following:
• Move the files below to another directory.
• Change the file names. If you change the file names, do not use the
character K or S as the first letter of the new file names.
- /etc/rc3.d/S99hicommand64-hcs_csm
HCSM-installation-directory/ComputeSystemsManager/conf/
user.properties
If not, modify the value to match the value specified on the active node.
9. If, on the active node, you specified the cluster management IP address
for the svp.bind.address property in the following file, specify the IP
address for the standby node as well.
HCSM-installation-directory/ComputeSystemsManager/conf/
user.properties
10. Register the Compute Systems Manager services in the cluster
management software group.
If you removed any other Hitachi Command Suite product services
before installing Compute Systems Manager, also register the services
for those products.
11. In the cluster management software, select the active node to start
operation in the cluster environment.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
Related tasks
• Installing the software (Linux) on page 55
• Starting Hitachi Compute Systems Manager in a cluster environment
(Linux) on page 247
• Changing Hitachi Compute Systems Manager ports on page 78
Related references
• Prerequisites for installing or upgrading the software on page 51
• Determining which method to use when implementing in a cluster
environment on page 204
• Verifying management server free disk space in a cluster environment on
page 210
• Synchronizing settings in a cluster environment on page 243
• Command format for migrating to a Linux cluster environment on
page 260
Procedure
Tip:
• If the svp.bind.address property is not specified, the IP
address of the active and standby nodes is registered on the
Hitachi server.
• The management server IP address, with which the Hitachi
server is communicating, is registered on the Hitachi server. If
you specify the svp.bind.address property, the IP address
specified for the property is also registered. You can check the
management server IP addresses registered on the Hitachi
servers by using the Web console. If you find management
server IP addresses that are no longer in use, delete them.
Related tasks
• Installing the software (Linux) on page 55
• Backing up the database in a cluster environment (Linux) on page 249
• Deleting services from the cluster management software (Linux) on
page 242
Related references
• Prerequisites for installing or upgrading the software on page 51
• Determining which method to use when implementing in a cluster
environment on page 204
• Verifying management server free disk space in a cluster environment on
page 210
• Checking the cluster configuration using the cluster management software
on page 211
Before you overwrite or upgrade on the standby node, you must complete
the installation on the active node.
Before you start the overwrite or upgrade installation, complete the following
tasks:
• Complete the pre-installation checklist.
• Make a note of the file path of the script you used to register the services
in the cluster when you installed the first time. You must have this
information to register the services after you complete this installation.
Procedure
1. Stop all Hitachi Command Suite product services the following command:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
stop
2. Complete an overwrite or upgrade installation of Compute Systems
Manager on the standby node.
If not, change the property to reflect the correct work directory path.
7. If you specified the cluster management IP address for the
svp.bind.address property on the active node, do the same on the
standby node within the following file:
HCSM-installation-directory/ComputeSystemsManager/conf/
user.properties
8. Re-register the services that you deleted from the cluster management
software group.
9. In the cluster management software, select the active node to start
operations in the cluster environment.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related tasks
• Installing the software (Linux) on page 55
• Starting Hitachi Compute Systems Manager in a cluster environment
(Linux) on page 247
• Registering services to a cluster environment (Linux) on page 239
Procedure
You must also remove any other Hitachi Command Suite products that
are installed.
3. Using the cluster management software, do the following:
a. Move the owner of the group in which Hitachi Command Suite services
are registered to the active node.
b. Bring the cluster management IP address and shared disks online.
4. Install a new instance of Compute Systems Manager on the active node
by running the installation wizard, selecting the cluster configuration
option, and specifying the required information.
If another Hitachi Command Suite product already exists in the cluster
environment, you do not need to specify any settings because the
installation program automatically uses the existing configuration
settings.
Tip:
• If the svp.bind.address property is not specified, the IP
address of the active and standby nodes is registered on the
Hitachi server.
• The management server IP address, with which the Hitachi
server is communicating, is registered on the Hitachi server. If
you specify the svp.bind.address property, the IP address
specified for the property is also registered. You can check the
management server IP addresses registered on the Hitachi
servers by using the Web console. If you find management
server IP addresses that are no longer in use, delete them.
Related concepts
• About verifying system prerequisites on page 42
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
• About verifying the installation environment on page 45
Related tasks
• Installing the software (Windows) on page 52
• Installing from the integrated media by using the all-in-one installer
(Windows) on page 54
• Registering services to a cluster environment (Windows) on page 237
• Starting Hitachi Compute Systems Manager in a cluster environment
(Windows) on page 246
• Changing Hitachi Compute Systems Manager ports on page 78
• Importing the database on page 197
• Exporting the database on page 196
Related references
• Determining which method to use when implementing in a cluster
environment on page 204
• Verifying management server free disk space in a cluster environment on
page 210
• Checking the cluster configuration using the cluster management software
on page 211
Procedure
For active nodes, specify the following in the cluster configuration file:
mode=online
virtualhost=logical-host-name
onlinehost=active-node-host-name
standbyhost=standby-node-host-name
For standby nodes, specify the following in the cluster configuration file:
mode=standby
virtualhost=logical-host-name
onlinehost=active-node-host-name
standbyhost=standby-node-host-name
For the databasepath option, specify the same directory as the one used
by the active node to re-create the database.
If you created databases on the shared disk for products using the
32-bit Hitachi Command Suite Common Component (Hitachi File
Services Manager and Hitachi Storage Navigator Modular 2), you
must specify a different directory for the databasepath option.
8. If you changed the default database port number, specify the port
number you are using on both the active and standby nodes.
9. On the active and standby nodes, use the following command to ensure
that the Hitachi Command Suite product services are stopped:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
status
10. On the active and standby nodes, use the following command to ensure
that the Hitachi Command Suite product services do not start
automatically when the machine starts:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
starttype manual -all
11. On the active and standby nodes, ensure that the Compute Systems
Manager services do not start automatically when the machine starts by
doing one of the following:
• Move the files below to another directory.
• Change the file names. If you change the file names, do not use the
character K or S as the first letter of the new file names.
- /etc/rc3.d/S99hicommand64-hcs_csm
- /etc/rc5.d/S99hicommand64-hcs_csm
If any other Hitachi Command Suite product is installed, also prevent
that product from automatically starting. To obtain the files to use,
refer to the manual for that specific product.
On both the active and standby nodes, specify the cluster management
IP address for the svp.bind.address property of the following file:
HCSM-installation-directory/ComputeSystemsManager/conf/
user.properties
Tip:
• If the svp.bind.address property is not specified, the IP
address of the active and standby nodes is registered on the
Hitachi server.
• The management server IP address, with which the Hitachi
server is communicating, is registered on the Hitachi server. If
you specify the svp.bind.address property, the IP address
specified for the property is also registered. You can check the
management server IP addresses registered on the Hitachi
servers by using the Web console. If you find management
server IP addresses that are no longer in use, delete them.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
• About verifying the installation environment on page 45
Related tasks
• Installing the software (Linux) on page 55
Related references
• Determining which method to use when implementing in a cluster
environment on page 204
• Verifying management server free disk space in a cluster environment on
page 210
• Checking the cluster configuration using the cluster management software
on page 211
• Settings requirements for virus scanning programs in a cluster
environment on page 243
• Synchronizing settings in a cluster environment on page 243
• Command format for migrating to a Linux cluster environment on
page 260
• Hitachi Command Suite properties requiring updates for port number
changes on page 75
• Properties related to Hitachi Compute Systems Manager server ports and
functions (user.properties) on page 307
• Properties related to clustering (cluster.conf) on page 337
Note: In most cases, you do not need to use this command because all
Hitachi Command Suite services register automatically when you install the
product.
Therefore, you should only use this comment if you need to re-register
services (for example, if you removed services inadvertently).
Before you register services, ensure you are logged in as a domain user with
Administrative permissions. Also ensure that a resource group exists in the
where
r - specifies the name of the group in which the Hitachi Command Suite
product services including Compute Systems Manager will be registered. If
the group name contains spaces, commas (,), semicolons (;), or equal signs
(=), you must enclose the group name in quotation marks ("); for example, if
the group name is HCS cluster, you would specify "HCS cluster".
sd - specifies the drive letter of the shared disk that is registered to the
cluster management software. You cannot specify multiple drive letters for
this option. If the database of Hitachi Command Suite products is divided into
multiple shared disks, run the hcmds64clustersrvupdate command for each
shared disk.
ap - specifies the name of the resource for the client access point that is
registered to the cluster management software.
Tip:
• If you installed the deployment manager, the Deployment Manager
services are automatically registered.
• If another Hitachi Command Suite product is installed on the management
server, also register the services for that product. For details about other
Hitachi Command Suite services, see the documentation for those
products.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
Related references
• Checking the cluster configuration using the cluster management software
on page 211
Create scripts for registering Linux services by using the sample scripts
provided with the software.
Procedure
For details about how to register a service, see the manual for that
product.
9. Click Submit.
The services are registered in the cluster group.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
Related tasks
• Temporarily stopping Hitachi Compute Systems Manager in a cluster
environment (Linux) on page 246
Related references
• Checking the cluster configuration using the cluster management software
on page 211
Therefore, you should only use this comment if you must delete services (for
example, if you inadvertently changed the service settings).
Before you delete services, ensure you are logged in as a domain user with
Administrative permissions.
where
sdel - deletes the Hitachi Command Suite product services that include
Compute Systems Manager from the cluster management software group.
r - specifies the name of the group in which the Hitachi Command Suite
product services are registered. If the group name contains spaces, commas
(,), semicolons (;), or equal signs (=), you must enclose the group name in
quotation marks ("); for example, if the group name is HCS cluster, you
would specify "HCS cluster".
Note:
• All the Compute Systems Manager and Hitachi Command Suite product
services registered in the group specified by the r option are deleted.
However, the Hitachi File Services Manager services are not deleted.
For details about the services of other Hitachi Command Suite products,
see the documentation for those products.
• If the resource name of a service has changed, all of the resource names
are initialized when you delete the service and then re-register it. Record
the resource names for the services that you are deleting so that you can
change the names after re-registering those services.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Procedure
For details about how to delete a service, see the manual of the product.
3. Click Submit.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
Related tasks
• Temporarily stopping Hitachi Compute Systems Manager in a cluster
environment (Linux) on page 246
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related tasks
• Installing or upgrading Hitachi Compute Systems Manager in a Windows
cluster on page 214
• Migrating Hitachi Compute Systems Manager to a cluster environment
(Linux) on page 233
• Migrating Hitachi Compute Systems Manager to a cluster environment
(Windows) on page 229
• Installing a new Hitachi Compute Systems Manager instance on a Linux
standby node on page 222
• Upgrading the software from v7.x in a cluster environment on page 346
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Ensure that you installed Deployment Manager when you installed Hitachi
Compute Systems Manager in the cluster environment.
Procedure
Related concepts
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related tasks
• Migrating Hitachi Compute Systems Manager to a cluster environment
(Windows) on page 229
• Temporarily stopping Hitachi Compute Systems Manager in a cluster
environment (Windows) on page 245
• Starting Hitachi Compute Systems Manager in a cluster environment
(Windows) on page 246
• Installing or upgrading Hitachi Compute Systems Manager in a Windows
cluster on page 214
• Upgrading the software from v7.x in a cluster environment on page 346
where
soff - takes the Hitachi Command Suite product services that include
Compute Systems Manager that are registered to the cluster management
software group offline and disables failover.
r - specifies the name of the group in which the Hitachi Command Suite
product services are registered. If the group name contains spaces, commas
(,), semicolons (;), or equal signs (=), you must enclose the group name in
quotation marks ("); for example, if the group name is HCS cluster, you
would specify "HCS cluster".
Related tasks
• Starting Hitachi Compute Systems Manager in a cluster environment
(Windows) on page 246
Procedure
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
Related tasks
• Starting Hitachi Compute Systems Manager in a cluster environment
(Linux) on page 247
son - brings online and enables failover for the Hitachi Command Suite
product services that include Compute Systems Manager and are registered
to the cluster management software group.
r - specifies the name of the group in which the Hitachi Command Suite
product services including Compute Systems Manager are registered. If the
group name contains spaces, commas (,), semicolons (;), or equal signs (=),
you must enclose the group name in quotation marks ("); for example, if the
group name is HCS cluster, you would specify "HCS cluster".
The groups are registered are brought online and failover is enabled.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
Procedure
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
Procedure
To specify the folder for the dir option, use the absolute path on the
shared disk where the database backup files are stored. Do not specify a
subfolder or a specific file.
3. Stop the Hitachi Command Suite product services by using the following
command:
HCS-Common-Component-installation-folder\bin\hcmds64srv /stop
4. Confirm that the Hitachi Command Suite product services are stopped or
that the return value is 0 by using the following command:
HCS-Common-Component-installation-folder\bin\hcmds64srv /
statusall
5. Start the Compute Systems Manager cluster operations by using the
following command:
HCS-Common-Component-installation-folder\ClusterSetup
\hcmds64clustersrvstate /son /r HCS-cluster-group-name
Result
You now have a backup copy of the latest Compute Systems Manager
database.
Related tasks
• Restoring the database in a cluster environment (Windows) on page 250
• Temporarily stopping Hitachi Compute Systems Manager in a cluster
environment (Windows) on page 245
• Starting Hitachi Compute Systems Manager in a cluster environment
(Windows) on page 246
• Stopping Hitachi Compute Systems Manager on page 187
• Backing up the database on page 193
Related references
• Prerequisites for database backup on page 192
Procedure
1. Verify that the cluster management software group was moved to the
active node. If the group was moved to the standby node, move it to the
active node.
2. Confirm that the Hitachi Command Suite product services are stopped or
that the return value is 0 by using the following command:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
statusall
3. Back up the database by using the following command:
HCS-Common-Component-installation-directory/bin/
hcmds64backups -dir local-disk-directory-for-backup-storage -
auto
Result
You now have a backup copy of the latest Compute Systems Manager
database.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related tasks
• Registering services to a cluster environment (Linux) on page 239
• Deleting services from the cluster management software (Linux) on
page 242
• Starting Hitachi Compute Systems Manager in a cluster environment
(Linux) on page 247
• Stopping Hitachi Compute Systems Manager on page 187
• Backing up the database on page 193
Related references
• Prerequisites for database backup on page 192
Caution:
• When Hitachi Device Manager is installed on the same management server
as Hitachi Compute Systems Manager, and is remotely connected to
Hitachi Tuning Manager, you must temporarily stop it on the computer
Procedure
where
Related tasks
• Backing up the database in a cluster environment (Windows) on page 248
• Temporarily stopping Hitachi Compute Systems Manager in a cluster
environment (Windows) on page 245
• Starting Hitachi Compute Systems Manager in a cluster environment
(Windows) on page 246
• Restoring the database on page 194
Related references
• Prerequisites for restoring the database on page 194
Procedure
1. Verify that the cluster management software group was moved to the
active node. If the group was moved to the standby node, move it to the
active node.
2. Restore the database by using the following command:
HCS-Common-Component-installation-directory/bin/hcmds64db -
restore backup-file -type ALL
To specify the directory for the dir option, use the absolute path on the
shared disk where the database backup files are stored. Do not specify a
subdirectory or a specific file.
3. Stop Hitachi Command Suite products within the cluster by using the
following command:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
stop
4. Re-register the services that were deleted from the cluster management
software group.
5. In the cluster management software, select the active node to start
operation in a cluster environment.
6. Use the Compute Systems Manager user interface to check the status of
the Compute Systems Manager tasks. If a task is incomplete or failed,
recreate the task or reschedule it.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related references
• Prerequisites for restoring the database on page 194
Procedure
When specifying the folder for the workpath option, use an absolute path
on the local disk where you want to temporarily store the database data.
Ensure that the folder you specify is empty and does not contain any
subfolders or files.
When specifying the file name for the file option, specify the absolute
path of the archive file that you want the export command to generate.
If the system cannot create an archive file, verify that there is enough
capacity on the migration destination server and try exporting again.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related tasks
• Temporarily stopping Hitachi Compute Systems Manager in a cluster
environment (Windows) on page 245
• Starting Hitachi Compute Systems Manager in a cluster environment
(Windows) on page 246
• Stopping Hitachi Compute Systems Manager on page 187
• Exporting the database on page 196
Related references
• Prerequisites for database migration on page 195
Procedure
1. Verify that the cluster management software group was moved to the
active node. If the group was moved to the standby node, move it to the
active node.
When specifying the directory for the workpath option, use an absolute
path on the local disk where you want to temporarily store the database
data. Ensure that the directory you specify is empty and does not contain
any subdirectories or files.
When specifying the file name for the file option, specify the absolute
path of the archive file that you want the export command to generate.
If the system cannot create an archive file, verify that there is enough
capacity on the migration destination server and try exporting again.
3. For migrations, transfer the exported files to the migration target server.
4. Stop the Hitachi Command Suite product services by using the following
command:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
stop
5. Re-register the services that were deleted from the cluster management
software group.
6. In the cluster management software, select the active node to start
operation in a cluster environment.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related tasks
• Registering services to a cluster environment (Linux) on page 239
• Deleting services from the cluster management software (Linux) on
page 242
• Starting Hitachi Compute Systems Manager in a cluster environment
(Linux) on page 247
• Stopping Hitachi Compute Systems Manager on page 187
• Exporting the database on page 196
Related references
• Prerequisites for database migration on page 195
If you are using a value other than the default for a property on the
migration source management server, review the relevant settings in the
properties files on the active and standby nodes of the migration destination.
The properties file is not migrated to the migration destination server even if
you import the database. This means you must update the property values in
the destination servers if you need to maintain the settings.
Procedure
To specify the folder for the dir option, use the absolute path on the
shared disk where the database backup files are stored. Do not specify a
subfolder or a specific file.
6. If Hitachi Device Manager is remotely connected to Tuning Manager, the
settings are reset when you restore the database. You must set up your
Tuning Manager connection again.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related tasks
• Temporarily stopping Hitachi Compute Systems Manager in a cluster
environment (Windows) on page 245
• Starting Hitachi Compute Systems Manager in a cluster environment
(Windows) on page 246
• Backing up the database in a cluster environment (Windows) on page 248
• Starting Hitachi Compute Systems Manager on page 186
• Importing the database on page 197
Procedure
1. Verify that the cluster management software group was moved to the
active node. If the group was moved to the standby node, move it to the
active node.
2. Import the database by using the following command:
HCS-Common-Component-installation-directory/bin/
hcmds64dbtrans -import -workpath working-directory -file
archive-file -type {ALL|Hitachi-Command-Suite-product-names}
-auto
To specify the directory for the dir option, use the absolute path on the
shared disk where the database backup files are stored. Do not specify a
subdirectory or a specific file.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related tasks
• Registering services to a cluster environment (Linux) on page 239
• Deleting services from the cluster management software (Linux) on
page 242
• Starting Hitachi Compute Systems Manager in a cluster environment
(Linux) on page 247
• Backing up the database in a cluster environment (Linux) on page 249
Related references
• Prerequisites for database migration on page 195
Note: You do not need this command in Windows clusters because the
database is automatically migrated during the installation process.
where
• createcluster migrates a Hitachi Command Suite product from a non-
cluster configuration to a cluster configuration
• databasepath specifies the directory in which to recreate the database for
use in a cluster environment. Specify an absolute path that is 63
characters or less for a directory on the shared disk. You can use the
following characters A~Z a~z 0~9 and the forward slash (/).
• exportpath specifies the directory in which to store the pre-migration
database that you are backing up. Specify an absolute path that is 63
characters or less for a directory on the local disk. The valid path
characters are the same as for the databasepath option.
• auto is an optional parameter that specifies whether to automatically
change the status of Hitachi Command Suite products and the database
services to the status required for backing up the database. After the
command runs, the Hitachi Command Suite products and the database
services are changed to the stop status.
• The port number used for the database is initialized to the default value,
22032/tcp.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related tasks
• Installing a new Hitachi Compute Systems Manager instance on a Linux
active node on page 218
• Installing a new Hitachi Compute Systems Manager instance on a Linux
standby node on page 222
• Migrating Hitachi Compute Systems Manager to a cluster environment
(Linux) on page 233
Procedure
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related tasks
• Removing the software (Windows) on page 66
If you plan to continue using other Hitachi Command Suite products, note the
following:
When you remove the software from an active node, all registered services
are removed and then re-registered by default when you complete the
removal on the standby node. If you changed the service resource names,
record the resource names in advance, and then manually change the names
after the removal is finished.
This step does not apply to Hitachi File Services Manager resources because
they are not removed.
Procedure
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
Related tasks
• Starting Hitachi Compute Systems Manager in a cluster environment
(Windows) on page 246
• Backing up the database in a cluster environment (Windows) on page 248
• Removing the software (Windows) on page 66
Related references
• Prerequisites for removing the software on page 65
Before you remove the software, delete the Hitachi Command Suite product
services that are registered in the cluster management software group,
including the Hitachi Compute Systems Manager services.
Procedure
For details about how to register services, see the documentation for that
product.
13. To being using another Hitachi Command Suite product In the cluster,
use the cluster management software to select the active node to start
operation in a cluster environment.
Related concepts
• About implementing Hitachi Compute Systems Manager in a cluster
environment on page 202
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
Related tasks
• Deleting services from the cluster management software (Linux) on
page 242
• Starting Hitachi Compute Systems Manager in a cluster environment
(Linux) on page 247
• Backing up the database in a cluster environment (Linux) on page 249
• Removing the software (Linux) on page 68
• Installing from the integrated media by using the all-in-one installer
(Windows) on page 54
• Stopping Hitachi Compute Systems Manager on page 187
Related references
• Prerequisites for removing the software on page 65
□ Troubleshooting overview
□ Troubleshooting examples
Troubleshooting 267
Hitachi Compute Systems Manager Installation and Configuration Guide
Troubleshooting overview
If problems occur when you are running Hitachi Compute Systems Manager,
follow the instructions that appear in the error messages generated by
Compute Systems Manager.
Related references
• Troubleshooting example: no login window displayed on page 268
• Troubleshooting example: management server does not start on page 269
• Troubleshooting example: database corruption on page 269
• Troubleshooting example: database corruption in a Windows cluster
environment on page 270
• Troubleshooting example: database corruption in a Linux cluster
environment on page 271
Troubleshooting examples
This module provides troubleshooting examples to help you better
understand the troubleshooting process.
Possible cause
Compute Systems Manager is not running or is in the process of starting on
the management server.
Countermeasure
Check the Compute Systems Manager operating status to see if the service is
starting. If yes, wait until the service starts. If the service is not starting,
start it.
Related concepts
• Troubleshooting overview on page 268
268 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Troubleshooting example: management server does not start
If Hitachi Compute Systems Manager does not start as expected, Compute
Systems Manager generates an error message. The following is an example
of the troubleshooting information Compute Systems Manager might
generate when the Compute Systems Manager service or the Hitachi
Command Suite Common Component does not start.
Possible cause
The desktop heap might be insufficient.
Countermeasure
Verify that the desktop heap is set to the required size. For details, see the
Microsoft support website.
Related concepts
• Troubleshooting overview on page 268
Possible cause
The database might be corrupted.
Countermeasure
1. Verify that the available capacity in the following directory is greater than
the size of the database:
In Windows:
HCS-Common-Component-installation-folder\tmp
In Linux:
HCS-Common-Component-installation-directory/tmp
When restoring the database, the archived database files are extracted
to this directory.
2. Stop Compute Systems Manager.
3. To restore the database, use the following command:
In Windows:
HCS-Common-Component-installation-folder\bin
\hcmds64dbrepair /trans exported-database-archive-files-
folder
In Linux:
Troubleshooting 269
Hitachi Compute Systems Manager Installation and Configuration Guide
HCS-Common-Component-installation-directory/bin/
hcmds64dbrepair -trans exported-database-archive-files-
directory
You must use the absolute path to the location of the database archive
files.
4. Start Compute Systems Manager.
5. Change the Compute Systems Manager System account password.
This step is required because the hcmds64dbrepair command resets the
System account back to the default password.
Related concepts
• Troubleshooting overview on page 268
Related tasks
• Starting Hitachi Compute Systems Manager on page 186
• Stopping Hitachi Compute Systems Manager on page 187
• Changing the System account password on page 59
Related references
• Prerequisites for restoring the database on page 194
Possible cause
The database in a Windows cluster environment might be corrupted.
Countermeasure
1. Verify that the available capacity in the following directory is greater than
the size of the database:
HCS-Common-Component-installation-folder\tmp
When restoring the database, the archived database files are extracted
to this directory.
2. Temporarily stop Compute Systems Manager within the cluster by using
the following command:
HCS-Common-Component-installation-folder\ClusterSetup
\hcmds64clustersrvstate /soff /r HCS-Cluster-group-name
270 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
3. To restore the database, use the following command on the Compute
Systems Manager active node:
HCS-Common-Component-installation-folder\bin
\hcmds64dbrepair /trans exported-database-archive-file
You must use the absolute path to the location of the database archive
files.
4. Restart Compute Systems Manager within the cluster by using the
following command:
HCS-Common-Component-installation-folder\ClusterSetup
\hcmds64clustersrvstate /son /r HCS-Cluster-group-name
5. Using the Compute Systems Manager interface, check the status of the
Compute Systems Manager tasks. If a task is incomplete or has failed,
recreate the task or update the task schedule as needed.
6. If Hitachi Device Manager is accessing Hitachi Tuning Manager using a
remote connection, the settings are reset when you restore the
database. This means you must set up the connection again.
7. Change the Compute Systems Manager System account password.
This step is required because the hcmds64dbrepair command resets the
System account back to the default password.
Related concepts
• Troubleshooting overview on page 268
Related tasks
• Temporarily stopping Hitachi Compute Systems Manager in a cluster
environment (Windows) on page 245
Related references
• Prerequisites for restoring the database on page 194
Possible cause
The database in a Linux cluster environment might be corrupted.
Countermeasure
1. Verify that the available capacity in the following directory is greater than
the size of the database:
Troubleshooting 271
Hitachi Compute Systems Manager Installation and Configuration Guide
HCS-Common-Component-installation-directory/tmp
When restoring the database, the archived database files are extracted
to this directory.
2. Delete the Hitachi Command Suite product services registered in the
cluster management software group, including the Compute Systems
Manager services.
3. Verify that the cluster management software group was moved to the
active node. If the group was moved to the standby node, move it to the
active node.
4. To restore the database, use the following command:
HCS-Common-Component-installation-directory/bin/
hcmds64dbrepair -trans exported-database-archive-file
5. Stop the Hitachi Command Suite products by using the following
command:
HCS-Common-Component-installation-directory/bin/hcmds64srv -
stop
6. Re-register the services that were deleted from the cluster management
software group.
7. In the cluster management software, select the active note to start the
services in the cluster environment.
8. Using the Compute Systems Manager interface, check the status of the
Compute Systems Manager tasks. If a task is incomplete or has failed,
recreate the task or update the task schedule as needed.
9. If Hitachi Device Manager is accessing Hitachi Tuning Manager using a
remote connection, the settings are reset when you restore the
database. This means you must set up the connection again.
10. Change the Compute Systems Manager System account password.
This step is required because the hcmds64dbrepair command resets the
System account back to the default password.
Related concepts
• Troubleshooting overview on page 268
Related tasks
• Registering services to a cluster environment (Linux) on page 239
• Deleting services from the cluster management software (Linux) on
page 242
• Starting Hitachi Compute Systems Manager in a cluster environment
(Linux) on page 247
• Starting Hitachi Compute Systems Manager on page 186
Related references
• Prerequisites for restoring the database on page 194
272 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Collecting maintenance information
This module provides information about collecting maintenance information
for troubleshooting Hitachi Compute Systems Manager issues.
You must access the specific managed resource to obtain the following
maintenance information:
○ Managed hosts
– System information
– From Windows hosts: Event log information (application logs and
system logs)
– From Linux or Solaris hosts: System log information
○ Managed hypervisors
– From Hyper-V: the execution results of the net start command
– From VMware ESXi: System log information
Troubleshooting 273
Hitachi Compute Systems Manager Installation and Configuration Guide
– Lamp information
– Error and configuration information for a chassis (when a managed
blade server is mounted)
– Error and configuration information for LPAR Manager (when a
managed LPAR exists)
Related concepts
• Troubleshooting overview on page 268
Related tasks
• Collecting management server maintenance information on page 274
• Collecting maintenance information for a managed host on Windows on
page 279
• Collecting maintenance information for a managed host on Linux or Solaris
on page 280
• Collecting Java VM thread information on Windows on page 276
In Windows:
HCS-Common-Component-installation-folder\bin\hcmds64getlogs /dir
directory-name [/types Hitachi-Command-Suite-product-name
[Hitachi-Command-Suite-product-name...]] [/arc archive-file-name]
[/logtypes log-file-type [log-file-type...]]
In Linux:
HCS-Common-Component-installation-directory/bin/hcmds64getlogs -
dirdirectory-name [-types Hitachi-Command-Suite-product-name
[Hitachi-Command-Suite-product-name...]] [-arc archive-file-name]
[-logtypes log-file-type [log-file-type...]]
In Windows:
HCS-Common-Component-installation-folder\bin\hcmds64getlogs /dir
c:\logs
In Linux:
HCS-Common-Component-installation-directory/bin/hcmds64getlogs -
dir /var/tmp/logs
274 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Using one of these commands, you would obtain maintenance information for
all Hitachi Command Suite products.
In Windows:
HCS-Common-Component-installation-folder\bin\hcmds64getlogs /dir
c:\logs /types HCSM
In Linux:
HCS-Common-Component-installation-directory/bin/hcmds64getlogs -
dir /var/tmp/logs -types HCSM
Parameter Description
dir Specifies the name of the directory on a local disk that stores maintenance
information. If the directory already exists, empty it.
• The maximum path name length is 41 characters. For details about the
maximum path name length for applications other than Compute Systems
Manager, see the manual for the applicable product.
• All printable ASCII character are allowed, except the following special
characters:\ / : , ; * ? " < > | $ % & '
• You can use backslashes (\), colons (:), and slashes (/) as path delimiters, but
do not specify a path delimiter at the end of a path name.
• In Windows, to specify a space character in a path name, enclose the path
name in double quotation marks ("). In Linux, you cannot use spaces in a path
name.
types Specify the type of maintenance information that you want to obtain.
• To obtain maintenance information for specific Hitachi Command Suite
products only (for a reason such as a failure), specify the name of the
products from which you want to obtain maintenance information. For details
about the other Hitachi Command Suite product names, see the
documentation for each product. To specify multiple product names, separate
them by a space.
• To obtain maintenance information for Compute Systems Manager, specify
HCSM.
• To specify multiple product names, separate them by a space.
• If using the types option and the logtypes option together, you must specify
“log” in the logtypes parameter.
• If you omit the types option, maintenance information for all Hitachi Command
Suite products installed on the management server is obtained.
If a product that uses the 32-bit version of Hitachi Command Suite Common
Component (Hitachi File Services Manager or Hitachi Storage Navigator
Modular 2) is installed on the management server, the maintenance
information of that product is also obtained.
arc Specify the name of the archive files to create.
• If you do not specify this parameter, the default file name is
HiCommand_log_64.
• The archive files are output under the directory specified in the dir option.
• If the archive files are generated, each file has an extension corresponding to
the type of each archive file (.jar, .hdb.jar, .db.jar, or .csv.jar).
Troubleshooting 275
Hitachi Compute Systems Manager Installation and Configuration Guide
Parameter Description
• For the file name, you can specify any printable ASCII character except the
following special characters:\ / : , ; * ? " < > | $ % & ' `
In Linux, you cannot use spaces in a file name.
logtypes Specify the type of log to create if you want to obtain only specific log files for a
reason such as a failure.
• Select one of the following log types:log—obtains .jar files and .hdb.jar files
only.db—obtains .db.jar files only.csv—obtains .csv.jar files only.
• To specify multiple types, separate them with a space.
• If you omit this option, all log files are obtained.
Related concepts
• About collecting maintenance information on page 273
You can collect Java VM thread information for the following services:
• HBase 64 Storage Mgmt SSO Service
• HCS Compute Systems Manager Web Service
Procedure
276 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
• HCS-Common-Component-installation-folder\uCPSB\CC\web
\containers\ComputeSystemsManagerWebService
2. Access the Windows Services dialog box.
3. Stop and restart the following services:
• HBase 64 Storage Mgmt SSO Service
• HCS Compute Systems Manager Web Service
When using the default JDK provided with Compute Systems Manager:
• HCS-Common-Component-installation-folder\uCPSB\CC\web
\containers\HBase64StgMgmtSSOService\javacorexxx.xxxx.txt
• HCS-Common-Component-installation-folder\uCPSB\CC\web
\containers\ComputeSystemsManagerWebService
\javacorexxx.xxxx.txt
Note: If you use the Oracle JDK, the Java VM thread dump is
overwritten each time the dump is generated. Therefore, after the
system generates the Java VM thread dump, save it using a
different name.
Result
After completing this procedure, you have Java VM maintenance information.
Related concepts
• About collecting maintenance information on page 273
Related tasks
• Collecting Java VM thread information on Linux on page 277
Troubleshooting 277
Hitachi Compute Systems Manager Installation and Configuration Guide
You can collect Java VM thread information for the following services:
• HBase 64 Storage Mgmt SSO Service
• HCS Compute Systems Manager Web Service
Procedure
1. Run the following command to stop the HBase 64 Storage Mgmt SSO
Service.
kill -3 PID
where PID indicates the process ID listed at the bottom of the following
file:
HCS-Common-Component-installation-directory/uCPSB/CC/web/
containers/HBase64StgMgmtSSOService/logs/cjstdout.log
2. Run the following command to stop the HCS Compute Systems Manager
Web Service.
kill -3 PID
where PID indicates the process ID listed at the bottom of the following
file:
HCS-Common-Component-installation-directory/uCPSB/CC/web/
containers/ComputeSystemsManagerWebService/logs/cjstdout.log
3. Restart Compute Systems Manager.
When using the default JDK provided with Compute Systems Manager:
• HCS-Common-Component-installation-directory/uCPSB/CC/web/
containers/HBase64StgMgmtSSOService/javacorexxx.xxxx.txt
• HCS-Common-Component-installation-directory/uCPSB/CC/web/
containers/ComputeSystemsManagerWebService/
javacorexxx.xxxx.txt
278 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Note: If you use the Oracle JDK, the Java VM thread dump is
overwritten each time the dump is generated. Therefore, after the
system generates the Java VM thread dump, save it using a
different name.
Result
After completing this procedure, you have Java VM maintenance information.
Related concepts
• About collecting maintenance information on page 273
Related tasks
• Collecting Java VM thread information on Windows on page 276
Procedure
Troubleshooting 279
Hitachi Compute Systems Manager Installation and Configuration Guide
a. Run the msinfo32 command.
b. In the left pane, select System Summary.
c. From the File menu, select Export, and then save the system
information as a text file.
Result
After completing this procedure, you have all the maintenance information for
the Windows managed host.
Related concepts
• About collecting maintenance information on page 273
Procedure
280 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Result
After completing this procedure, you have all the maintenance information for
the Linux or Solaris managed host.
Related concepts
• About collecting maintenance information on page 273
Related tasks
• Setting up audit logs on page 281
• Viewing the audit logs on page 282
Related references
• Audit log categories and event descriptions on page 283
• Audit log message format and information on page 292
• Audit event messages for tasks on page 294
• Audit event messages for processing requests on page 295
• Audit log detailed messages for system requests on page 295
Procedure
Troubleshooting 281
Hitachi Compute Systems Manager Installation and Configuration Guide
HCS-Common-Component-installation-directory/conf/sec/
auditlog.conf
Result
Compute Systems Manager now generates user operation data and stores it
in the audit logs.
Related concepts
• About audit logs on page 281
Related tasks
• Viewing the audit logs on page 282
Related references
• Properties related to audit logs (auditlog.conf) on page 336
Related concepts
• About audit logs on page 281
282 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Related tasks
• Setting up audit logs on page 281
Related references
• Audit log categories and event descriptions on page 283
• Audit log message format and information on page 292
• Properties related to audit logs (auditlog.conf) on page 336
Within each audit log category, there are associated audit events. Each audit
event includes a severity level and a message ID. The following table includes
detailed information for the audit log categories and the associated audit
events.
Troubleshooting 283
Hitachi Compute Systems Manager Installation and Configuration Guide
Audit log category and Type Audit event Severity Message ID
description description
284 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Audit log category and Type Audit event Severity Message ID
description description
Troubleshooting 285
Hitachi Compute Systems Manager Installation and Configuration Guide
Audit log category and Type Audit event Severity Message ID
description description
Successful 6 KAPM10137-I
acquisition of the
SRV record from
the DNS server
Failed acquisition 3 KAPM10138-E
of the SRV record
from the DNS
server
ConfigurationAccess User Successful user 6 KAPM07230-I
registration registration
Events indicating that the (using a
administrator succeeded Failed user 3 KAPM07240-E
management
or failed in performing an registration
client
operation such as the
following: User deletion Successful single 6 KAPM07231-I
• Reference or update of (using a user deletion
configuration management
Failed single user 3 KAPM07240-E
information client
deletion
• Update of account
Successful 6 KAPM07231-I
settings including
multiple user
addition or deletion of
deletion
accounts
• Security configuration Failed multiple 3 KAPM07240-E
• Reference or update of user deletion
audit log settings Password Successful 6 KAPM07232-I
change (using password change
the Users and by the
Permissions administrator
window)
Failed password 3 KAPM07240-E
change by the
administrator
Password Failed 3 KAPM07239-E
change (using authentication
the User Profile processing for
window) verifying old
password
Successful change 6 KAPM07232-I
of login user's
own password
Failed change of 3 KAPM07240-E
login user's own
password
Profile change Successful profile 6 KAPM07233-I
change
Failed profile 3 KAPM07240-E
change
Permission Successful 6 KAPM02280-I
change permission
change
Failed permission 3 KAPM07240-E
change
286 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Audit log category and Type Audit event Severity Message ID
description description
Troubleshooting 287
Hitachi Compute Systems Manager Installation and Configuration Guide
Audit log category and Type Audit event Severity Message ID
description description
multiple
authorization
groups
Failed deletion of 3 KAPM07248-E
multiple
authorization
groups
Authorization Successful change 6 KAPM07250-I
group of an
permission authorization
change (using a group's
management permission
client)
Failed change of 3 KAPM07248-E
an authorization
group's
permission
User Successful 6 KAPM07241-I
registration registration of
(processed on user
the
Failed registration 3 KAPM07242-E
management
of user
server)
User Successful update 6 KAPM07243-I
information of user
update information
(processed on
Failed update of 3 KAPM07244-E
the
user information
management
server)
User deletion Successful 6 KAPM07245-I
(processed on deletion of user
the
Failed deletion of 3 KAPM07246-E
management
user
server)
Authorization Successful 6 KAPM07251-I
group registration of an
registration authorization
(processed on group
the
Failed registration 3 KAPM07252-E
management
of an
server)
authorization
group
Authorization Successful 6 KAPM07253-I
group deletion deletion of an
(processed on authorization
the group
management
Failed deletion of 3 KAPM07254-E
server)
an authorization
group
Authorization Successful change 6 KAPM07255-I
group of an
permission authorization
288 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Audit log category and Type Audit event Severity Message ID
description description
change group's
(processed on permission
the
Failed change of 3 KAPM07256-E
management
an authorization
server)
group's
permission
Database Successful backup 6 KAPM05561-I
backup or using the
restore hcmds64backups
or hcmds64db
command
Failed backup 3 KAPM05562-E
using the
hcmds64backups
or hcmds64db
command
Successful full 6 KAPM05563-I
restore using the
hcmds64db
command
Failed full restore 3 KAPM05564-E
using the
hcmds64db
command
Successful partial 6 KAPM05565-I
restore using the
hcmds64db
command
Failed partial 3 KAPM05566-E
restore using the
hcmds64db
command
Database Successful 6 KAPM06543-I
export or import database export
Failed database 3 KAPM06544-E
export
Successful 6 KAPM06545-I
database import
Failed database 3 KAPM06546-E
import
Database area Successful 6 KAPM06348-I
creation or database area
deletion creation
Failed database 3 KAPM06349-E
area creation
Successful 6 KAPM06350-I
database area
deletion
Troubleshooting 289
Hitachi Compute Systems Manager Installation and Configuration Guide
Audit log category and Type Audit event Severity Message ID
description description
290 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Audit log category and Type Audit event Severity Message ID
description description
Troubleshooting 291
Hitachi Compute Systems Manager Installation and Configuration Guide
Audit log category and Type Audit event Severity Message ID
description description
Related concepts
• About audit logs on page 281
Related tasks
• Viewing the audit logs on page 282
Related references
• Audit log message format and information on page 292
• Audit log detailed messages for system requests on page 295
292 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
The format for the log entries is as follows:
program-name [process-ID]: message portion
Note: Not all items are output for each audit event.
The following table includes a description for each audit log message
parameter.
Troubleshooting 293
Hitachi Compute Systems Manager Installation and Configuration Guide
Message output Description
Related tasks
• Viewing the audit logs on page 282
Related references
• Audit event messages for processing requests on page 295
• Audit log categories and event descriptions on page 283
• Audit log detailed messages for system requests on page 295
uk=
task-name The name of the task that completed the operation.
294 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Message text variables Description
taskname=
Related tasks
• Viewing the audit logs on page 282
Related references
• Audit log message format and information on page 292
• Audit log categories and event descriptions on page 283
• Audit log detailed messages for system requests on page 295
Related tasks
• Viewing the audit logs on page 282
Related references
• Audit log message format and information on page 292
• Audit log categories and event descriptions on page 283
• Audit log detailed messages for system requests on page 295
Troubleshooting 295
Hitachi Compute Systems Manager Installation and Configuration Guide
• command—A character string (three characters) that indicates the operation
(for example, addition, deletion, modification, or reference) to perform on
the resource. The following table provides detailed command output
information.
Output character
Full name Operation
string
Output character
Full name Operation
string
296 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Output character
Full name and content Sequence of attribute values output
string
Related tasks
• Viewing the audit logs on page 282
Related references
• Audit log message format and information on page 292
• Audit log categories and event descriptions on page 283
• Audit event messages for processing requests on page 295
• Audit event messages for tasks on page 294
You can change the following settings for the Compute Systems Manager
Message log files:
• Maximum size of the log file
• Maximum number of log files
• Logging level
Tip: The message log files are stored in the following locations:
In Windows:
Troubleshooting 297
Hitachi Compute Systems Manager Installation and Configuration Guide
HCSM-installation-folder\logs\WebServiceMessageN.log
In Linux:
/var/HCSM-installation-directory/logs/WebServiceMessageN.log
Related tasks
• Changing Compute Systems Manager log file settings on page 298
Procedure
Result
The new log file settings take effect when Compute Systems Manager starts.
Related concepts
• About log file settings on page 297
Related tasks
• Starting Hitachi Compute Systems Manager on page 186
• Stopping Hitachi Compute Systems Manager on page 187
298 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
Related references
• Properties related to Hitachi Compute Systems Manager server log files
(logger.properties) on page 309
Troubleshooting 299
Hitachi Compute Systems Manager Installation and Configuration Guide
300 Troubleshooting
Hitachi Compute Systems Manager Installation and Configuration Guide
A
Ports
This appendix includes the port numbers associated with Hitachi Compute
Systems Manager (HCSM) and Hitachi Command Suite (HCS) Common
Component.
Ports 301
Hitachi Compute Systems Manager Installation and Configuration Guide
Hitachi Compute Systems Manager server ports
The Hitachi Compute Systems Manager server uses the ports listed in the
following table:
Related tasks
• Changing Hitachi Compute Systems Manager ports on page 78
Related references
• Hitachi Compute Systems Manager properties requiring updates for port
number changes on page 77
22015/TCP This port is used for access to the Hitachi Command Suite
Common Component service (HBase 64 Storage Mgmt Web
Service) during non-SSL communication with management
clients (web client and CLI).
22016/TCP This port is used for access to the Hitachi Command Suite
Common Component service (HBase 64 Storage Mgmt Web
Service) when SSL is used for communication with management
clients (web client and CLI).
302 Ports
Hitachi Compute Systems Manager Installation and Configuration Guide
Port number (default) Description
Related tasks
• Changing Hitachi Compute Systems Manager ports on page 78
Related references
• Hitachi Compute Systems Manager server ports on page 302
• Hitachi Command Suite properties requiring updates for port number
changes on page 75
Ports 303
Hitachi Compute Systems Manager Installation and Configuration Guide
Deployment Manager ports
Deployment Manager uses the ports listed in the following table:
67/UDP Used for PXE booting of managed resources. This port number
cannot be changed.
69/UDP Used for PXE booting of managed resources. This port number
cannot be changed.
80/TCP* Used for internal communication with the IIS service process.
This port number can be changed.
4011/UDP Used for PXE booting of managed resources. This port number
cannot be changed.
26500/TCP* Used for internal communication between the IIS service
process and Deployment Manager. This port number can be
changed.
26501/TCP or 56020/TCP* Used for restoration and backup of managed resource disks.
The default is 26501/TCP. This port number can be changed. If
an attempt to change this port number fails, the system uses
the default (56020/TCP).
26502/TCP or 56022/TCP* Used for PXE booting of managed resources. The default is
26502/TCP. This port number can be changed. If an attempt to
change this port number fails, the system uses the default
(56020/TCP).
26503/TCP or 56030/TCP* Used for PXE booting of managed resources. The default is
26503/TCP. This port number can be changed. If an attempt to
change this port number fails, the system uses the default
(56030/TCP).
26504/TCP to 26507/TCP These ports are reserved.
26508/TCP or 56023/TCP* Used for performing deployment operations on managed
resources. The default is 26508/TCP. This port number can be
changed. If an attempt to change this port number fails, the
system uses the default (56023/TCP).
56011/TCP These ports are reserved.
56024/TCP
56028/TCP
56060/TCP
* If a product other than Deployment Manager is using this port number, you
must change the Deployment Manager port number.
Related tasks
• Changing the Deployment Manager port number on page 183
Related references
• Properties related to Deployment Manager ports (port.ini) on page 338
304 Ports
Hitachi Compute Systems Manager Installation and Configuration Guide
B
Properties
This appendix includes the Hitachi Compute Systems Manager (HCSM) and
Hitachi Command Suite (HCS) Common Component properties.
Properties 305
Hitachi Compute Systems Manager Installation and Configuration Guide
Properties for Hitachi Compute Systems Manager server
This module provides information about the Hitachi Compute Systems
Manager server properties files.
Related concepts
• About the Hitachi Command Suite Common Component properties on
page 310
Related references
• Hitachi Compute Systems Manager server properties files on page 306
• Properties related to Hitachi Compute Systems Manager server ports and
functions (user.properties) on page 307
• Properties related to Hitachi Compute Systems Manager server log files
(logger.properties) on page 309
In Linux:
HCSM-installation-
directory/
ComputeSystemsManager/conf/
user.properties
In Linux:
HCSM-installation-
directory/
306 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
File name Location Description
ComputeSystemsManager/conf/
logger.properties
Related concepts
• About the Hitachi Compute Systems Manager server properties on
page 306
Related references
• Properties related to Hitachi Compute Systems Manager server ports and
functions (user.properties) on page 307
• Properties related to Hitachi Compute Systems Manager server log files
(logger.properties) on page 309
Property Description
Properties 307
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description
Value: character_string
Value: character_string
If the specified directory does not exist, the default path is used.
In Windows:
HCSM-installation-folder\shared
In Linux:
HCSM-installation-directory/shared
winrm.maxEnvelopeSize Specifies the maximum envelope size (MaxEnvelopeSizekb)
value if you specify a value other than the recommended value
of 512 for MaxEnvelopeSizekb on managed servers and then
enable WinRM. If you set different values on multiple managed
hosts, specify the maximum value among these values.
308 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description
If you specify Enable, you must register the certificate for the
Hitachi server to the keystore of the management server.
hvm.lpar.migration.allow.pl Specifies whether to enable unencrypted communication
aintext between the management server and an LPAR manager when
you migrate LPARs.
Related concepts
• About the Hitachi Compute Systems Manager server properties on
page 306
Related references
• Hitachi Compute Systems Manager server properties files on page 306
Property Description
The default is 1.
message.maxBackupIndex Specifies the maximum number of log files.
Properties 309
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description
Related concepts
• About the Hitachi Compute Systems Manager server properties on
page 306
Related references
• Hitachi Compute Systems Manager server properties files on page 306
Related concepts
• About the Hitachi Compute Systems Manager server properties on
page 306
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
310 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
File name Location Description
In Linux:
HCS-Common-Component-installation-
directory/uCPSB/httpsd/conf/
user_httpsd.conf
usrconf.properties In Windows:
(SSO)
HCS-Common-Component-installation-
directory\uCPSB\CC\web\containers
\HBase64StgMgmtSSOService\usrconf
\usrconf.properties
In Linux:
HCS-Common-Component-installation-
directory/uCPSB/CC/web/containers/
HBase64StgMgmtSSOService/usrconf/
usrconf.properties
usrconf.properties In Windows:
(HCSM)
HCS-Common-Component-installation-
directory\uCPSB\CC\web\containers
\ComputeSystemsManagerWebService
\usrconf\usrconf.properties
In Linux:
HCS-Common-Component-installation-
directory/uCPSB/CC/web/containers/
ComputeSystemsManagerWebService/
usrconf/usrconf.properties
workers.properties In Windows:
HCS-Common-Component-installation-
directory\uCPSB\CC\web\redirector
\workers.properties
In Linux:
HCS-Common-Component-installation-
directory/uCPSB/CC/web/redirector/
workers.properties
user_hsso_httpsd.conf In Windows:
HCS-Common-Component-installation-
directory\uCPSB\conf
\user_hsso_httpsd.conf
In Linux:
HCS-Common-Component-installation-
directory/uCPSB/conf/
user_hsso_httpsd.conf
Properties 311
Hitachi Compute Systems Manager Installation and Configuration Guide
File name Location Description
In Linux:
HCS-Common-Component-installation-
directory/HDB/CONF/emb/HiRDB.ini
pdsys In Windows:
HCS-Common-Component-installation-
directory\HDB\CONF\pdsys
In Linux:
HCS-Common-Component-installation-
directory/HDB/CONF/pdsys
def_pdsys In Windows:
HCS-Common-Component-installation-
directory\database\work\def_pdsys
In Linux:
HCS-Common-Component-installation-
directory/database/work/def_pdsys
pdutsys In Windows:
HCS-Common-Component-installation-
directory\HDB\CONF\pdutsys
In Linux:
HCS-Common-Component-installation-
directory/HDB/CONF/pdutsys
def_pdutsys In Windows:
HCS-Common-Component-installation-
directory\database\work\def_pdutsys
In Linux:
HCS-Common-Component-installation-
directory/database/work/def_pdutsys
user.conf In Windows: Contains properties
related to user
HCS-Common-Component-installation- accounts.
directory\conf\user.conf
In Linux:
HCS-Common-Component-installation-
directory/conf/user.conf
exauth.properties In Windows: Contains properties
related to
HCS-Common-Component-installation- communication with
directory\conf\exauth.properties an external
authentication server.
312 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
File name Location Description
In Linux:
HCS-Common-Component-installation-
directory/conf/exauth.properties
In Linux:
HCS-Common-Component-installation-
directory/conf/sec/auditlog.conf
cluster.conf In Windows: Contains properties
related to clustering.
HCS-Common-Component-installation-
directory\conf\cluster.conf
In Linux:
HCS-Common-Component-installation-
directory/conf/cluster.conf
Related references
• Properties related to web server communication including SSL settings
(user_httpsd.conf) on page 314
• Properties related to the web server for Hitachi Compute Systems Manager
(usrconf.properties) on page 317
• Properties related to the web server (workers.properties) on page 318
• Properties related to the HSSO-dedicated web server
(user_hsso_httpsd.conf) on page 319
• Properties related to the database (HiRDB.ini) on page 319
• Properties related to the database (pdsys) on page 320
• Properties related to the database (def_pdsys) on page 320
• Properties related to the database (pdutsys) on page 321
• Properties related to the database (def_pdutsys) on page 321
• Properties related to System account locking (user.conf) on page 322
• Properties related to LDAP directory server connections
(exauth.properties) on page 322
• Example properties file for external LDAP directory server connections
(exauth.properties) on page 327
• Example properties file for Kerberos server connections
(exauth.properties) on page 334
Properties 313
Hitachi Compute Systems Manager Installation and Configuration Guide
• Properties related to audit logs (auditlog.conf) on page 336
• Properties related to clustering (cluster.conf) on page 337
Property Description
ServerName host-name Specifies the host name or IP address of the Compute Systems
Manager management server.
314 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description
For port number, specify the port number for accessing HBase
64 Storage Mgmt Web Service using SSL.
Specify the same host name as the one you specified when
creating the certificate signing request. The host name is case
sensitive.
# SSLEnable Parameter for SSL communication. To use SSL, delete the
preceding hash mark (#).
# SSLProtocol Parameter for SSL communication. To use SSL, delete the
preceding hash mark (#).
# SSLRequiredCiphers Parameter for SSL communication. To use SSL, delete the
preceding hash mark (#).
# SSLRequireSSL Parameter for SSL communication. To use SSL, delete the
preceding hash mark (#).
# SSLCertificateKeyFile Parameter for SSL communication. To use SSL, delete the
preceding hash mark (#).
Properties 315
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description
If you are using the chained server certificate issued from the
certificate authority on your system, you must delete the
preceding hash mark (#), and then specify the chained
certificate file of the certificate authority using an absolute
path. By using a text editor to link multiple certificates (in PEM
format), multiple certificates can co-exist in a single file.
However, you cannot specify a symbolic link and junction for
the path.
# </VirtualHost> Parameter for SSL communication. To use SSL, delete the
preceding hash mark (#).
#HWSLogSSLVerbose On Parameter for SSL communication. To use SSL, delete the
preceding hash mark (#).
<Location / Parameter for restricting management client access. To restrict
ComputeSystemsManager> access, add this property to the last line of the
user_httpsd.conf file using the following format:
<Location /ComputeSystemsManager>
order allow,deny
</Location>
316 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
For example, the following entry allows management client access from all
computers in the hitachi.com domain and restricts access to any clients
outside of the domain:
<Location /ComputeSystemsManager>
order allow,deny
</Location>
Related tasks
• Restricting management server access from a management client on
page 138
• Setting up SSL on the server for secure client communication on page 119
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
Properties 317
Hitachi Compute Systems Manager Installation and Configuration Guide
Note: The usrconf.properties file exists for each Web container service.
Property Description
webserver.connector.ajp13.p Specifies the port number for accessing the Web server.
ort
The default value is 22027.
If you change this value, you must update the port number so
that the worker.ComputeSystemsManagerWebService.port
property in the workers.properties file is the same.
webserver.shutdown.port Specifies the port used for receiving termination messages from
the Web server.
Property Description
webserver.connector.ajp13.p Specifies the port number for accessing the Web server.
ort
The default value is 22033.
If you change this value, you must update the port number so
that the worker.HBase64StgMgmtSSOService.port property in
the workers.properties file is the same.
webserver.shutdown.port Specifies the port used for receiving termination messages from
the Web server.
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
• Properties related to the web server (workers.properties) on page 318
Property Description
worker.ComputeSystemsManage Specifies the port number for accessing the Web server.
rWebService.port
The default value is 22027.
318 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
• Properties related to the web server for Hitachi Compute Systems Manager
(usrconf.properties) on page 317
Property Description
Listen Specifies the port number for accessing the HBase 64 Storage
Mgmt Web SSO Service.
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
Property Description
Properties 319
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description
If you change this value, you must update the port number in
the pd_name_port property in the pdsys file and the
pd_name_port property in the def_pdsys file.
PDHOST Specifies the IP address. You usually do not change this value.
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
• Properties related to the database (pdsys) on page 320
• Properties related to the database (def_pdsys) on page 320
Property Description
If you change this value, you must update the port number in
the PDNAMEPORT property in the HiRDB.ini file and the
pd_name_port property in the def_pdsys file.
pdunit -x Specifies the IP address. You usually do not change this value.
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
• Properties related to the database (HiRDB.ini) on page 319
• Properties related to the database (def_pdsys) on page 320
320 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
Table 1 def_pdsys properties file parameters
Property Description
If you change this value, you must update the port number in
the PDNAMEPORT property in the HiRDB.ini file and the
pd_name_port property in the pdsys file.
pdunit -x Specifies the IP address. You usually do not change this value.
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
• Properties related to the database (HiRDB.ini) on page 319
• Properties related to the database (pdsys) on page 320
Property Description
pd_hostname Specifies the IP address. You usually do not change this value.
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
• Properties related to the database (HiRDB.ini) on page 319
• Properties related to the database (def_pdutsys) on page 321
Properties 321
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description
pd_hostname Specifies the IP address. You usually do not change this value.
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
• Properties related to the database (HiRDB.ini) on page 319
• Properties related to the database (pdutsys) on page 321
Property Description
Related tasks
• Enabling System account locking on page 73
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
322 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
In Windows:
HCS-Common-Component-installation-folder\sample\conf
\exauth.properties
You can use the sample file as a starting point by copying the file to the
following directory:
HCS-Common-Component-installation-folder\conf\exauth.properties
In Linux:
HCS-Common-Component-installation-directory/sample/conf/
exauth.properties
You can use the sample file as a starting point by copying the file to the
following directory:
HCS-Common-Component-installation-directory/conf/
exauth.properties
Note: When specifying property values, do not type a space character at the
beginning or end of the values. In addition, do not enclose property values in
double quotation marks ("). If you do, Hitachi Compute Systems Manager
ignores the value and uses the default.
Properties 323
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description Possible Values
324 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description Possible Values
Properties 325
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description Possible Values
Related concepts
• About setting up secure communication for an external authentication
server on page 137
Related tasks
• Configuring an LDAP server connection on page 151
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
• Example properties file for external LDAP directory server connections
(exauth.properties) on page 327
326 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
Example properties file for external LDAP directory server
connections (exauth.properties)
When using Hitachi Compute Systems Manager, you can use an external
authentication server. To set up a connection with an external LDAP directory
server for authentication, you edit the properties in the exauth.properties
file on the Compute Systems Manager management server. The following
examples include the parameter settings that you use to set up your LDAP
directory server connection. Depending on the type of connection, some
parameters might not apply to your environment.
The following example shows the parameters that you specify when directly
entering information for the LDAP directory server when connecting to an
external authentication server only:
auth.server.type=ldap
auth.server.name=ServerName
auth.group.mapping=false
auth.ocsp.enable=false
auth.ocsp.responderURL=
auth.ldap.ServerName.protocol=ldap
auth.ldap.ServerName.host=ldap.example.com
auth.ldap.ServerName.port=389
auth.ldap.ServerName.timeout=15
auth.ldap.ServerName.attr=sAMAccountName
auth.ldap.ServerName.basedn=dc=Example,dc=com
auth.ldap.ServerName.retry.interval=1
auth.ldap.ServerName.retry.times=20
auth.ldap.ServerName.dns_lookup=false
The following example shows the parameters that you specify when using a
DNS server information to obtain information about the LDAP directory server
when linking with an external authentication server only:
auth.server.type=ldap
auth.server.name=ServerName
auth.group.mapping=false
auth.ldap.ServerName.protocol=ldap
Properties 327
Hitachi Compute Systems Manager Installation and Configuration Guide
auth.ldap.ServerName.timeout=15
auth.ldap.ServerName.attr=sAMAccountName
auth.ldap.ServerName.basedn=dc=Example,dc=com
auth.ldap.ServerName.retry.interval=1
auth.ldap.ServerName.retry.times=20
auth.ldap.ServerName.domain.name=EXAMPLE.COM
auth.ldap.ServerName.dns_lookup=true
auth.server.name=ServerName
auth.group.mapping=true
auth.ocsp.enable=false
auth.ocsp.responderURL=
auth.ldap.ServerName.protocol=ldap
auth.ldap.ServerName.host=ldap.example.com
auth.ldap.ServerName.port=389
auth.ldap.ServerName.timeout=15
auth.ldap.ServerName.attr=sAMAccountName
auth.ldap.ServerName.basedn=dc=Example,dc=com
auth.ldap.ServerName.retry.interval=1
auth.ldap.ServerName.retry.times=20
auth.ldap.ServerName.domain.name=EXAMPLE.COM
auth.ldap.ServerName.dns_lookup=false
The following example shows the parameters that you specify when using a
DNS server information to obtain information about the LDAP directory server
when also linking with an external authorization server:
auth.server.type=ldap
auth.server.name=ServerName
auth.group.mapping=true
328 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
auth.ldap.ServerName.protocol=ldap
auth.ldap.ServerName.timeout=15
auth.ldap.ServerName.attr=sAMAccountName
auth.ldap.ServerName.basedn=dc=Example,dc=com
auth.ldap.ServerName.retry.interval=1
auth.ldap.ServerName.retry.times=20
auth.ldap.ServerName.domain.name=EXAMPLE.COM
auth.ldap.ServerName.dns_lookup=true
Related concepts
• About Hitachi Compute Systems Manager security settings on page 118
• About setting up secure communication for an external authentication
server on page 137
Related tasks
• Configuring an LDAP server connection on page 151
Related references
• Properties related to LDAP directory server connections
(exauth.properties) on page 322
In Windows:
HCS-Common-Component-installation-folder\sample\conf
\exauth.properties
You can use the sample file as a starting point by copying the file to the
following directory:
HCS-Common-Component-installation-folder\conf\exauth.properties
In Linux:
Properties 329
Hitachi Compute Systems Manager Installation and Configuration Guide
HCS-Common-Component-installation-directory/sample/conf/
exauth.properties
You can use the sample file as a starting point by copying the file to the
following directory:
HCS-Common-Component-installation-directory/conf/
exauth.properties
Note: When specifying property values, do not type a space character at the
beginning or end of the values. In addition, do not enclose property values in
double quotation marks ("). If you do, Hitachi Compute Systems Manager
ignores the value and uses the default.
330 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description Possible Values
Properties 331
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description Possible Values
auth.kerberos.realm_na host-name-or-IP-address[:port-number]
me.kdc
host-name-or-IP-address
port-number
host-name-or-IP-address[:port-
number],host-name-or-IP-address[:port-
number],...
332 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description Possible Values
#+;,<=>\
Properties 333
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description Possible Values
Related references
• Example properties file for Kerberos server connections
(exauth.properties) on page 334
The following example shows the parameters that you specify when directly
entering information for the Kerberos server (when not connecting to an
external authorization server):
auth.server.type=kerberos
auth.group.mapping=false
auth.ocsp.enable=false
auth.ocsp.responderURL=
auth.kerberos.default_realm=EXAMPLE.COM
auth.kerberos.dns_lookup_kdc=false
auth.kerberos.clockskew=300
auth.kerberos.timeout=3
auth.kerberos.realm_name=RealmName
auth.kerberos.RealmName.realm=EXAMPLE.COM
auth.kerberos.RealmName.kdc=kerberos.example.com:88
The following example shows the parameters that you specify when using a
DNS server information to obtain information about the Kerberos server
(when not linking with an external authorization server):
auth.server.type=kerberos
auth.group.mapping=false
334 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
auth.kerberos.default_realm=EXAMPLE.COM
auth.kerberos.dns_lookup_kdc=true
auth.kerberos.clockskew=300
auth.kerberos.timeout=3
auth.group.mapping=true
auth.ocsp.enable=false
auth.ocsp.responderURL=
auth.kerberos.default_realm=EXAMPLE.COM
auth.kerberos.dns_lookup_kdc=false
auth.kerberos.clockskew=300
auth.kerberos.timeout=3
auth.kerberos.realm_name=RealmName
auth.kerberos.RealmName.realm=EXAMPLE.COM
auth.kerberos.RealmName.kdc=kerberos.example.com:88
auth.group.EXAMPLE.COM.protocol=ldap
auth.group.EXAMPLE.COM.port=389
auth.group.EXAMPLE.COM.basedn=dc=Example,dc=com
auth.group.EXAMPLE.COM.timeout=15
auth.group.EXAMPLE.COM.retry.interval=1
auth.group.EXAMPLE.COM.retry.times=20
The following example shows the parameters that you specify when using a
DNS server information to obtain information about the Kerberos server when
also linking with an external authorization server:
auth.server.type=kerberos
auth.group.mapping=true
auth.kerberos.default_realm=EXAMPLE.COM
auth.kerberos.dns_lookup_kdc=true
Properties 335
Hitachi Compute Systems Manager Installation and Configuration Guide
auth.kerberos.clockskew=300
auth.kerberos.timeout=3
Related references
• Properties related to Kerberos server connections (exauth.properties) on
page 329
Property Description
Events with the specified severity level or lower are output to the
event log file.
Default value: 6
The following table shows the correspondence between the audit event
severity levels and event log data types.
0 Error
4 Warning
336 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
Audit event severity Type of event log data
5 Information
Log.Facility 1
# Authentication, ContentAccess,
Log.Event.Category Authentication,ConfigurationAccess
Log.Level 6
Related concepts
• About audit logs on page 281
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
Property Description
Properties 337
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description
Related references
• Properties files for Hitachi Command Suite Common Component on
page 310
HCSM-installation-folder\ComputeSystemsManager\DeploymentManager
\PXE\Images
The Deployment Manager port.ini file includes the port and function-related
parameters listed in the following table:
Property Description
338 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
Property Description
Properties 339
Hitachi Compute Systems Manager Installation and Configuration Guide
340 Properties
Hitachi Compute Systems Manager Installation and Configuration Guide
C
Upgrading the software from v7.x
The module explains how to upgrade Hitachi Compute Systems Manager from
v7.x on the management server.
Related tasks
• Upgrading the software from v7.x in a non-cluster environment on
page 344
• Upgrading the software from v7.x in a cluster environment on page 346
Related references
• Prerequisites for upgrading the software from v7.x on page 342
Related concepts
• About upgrading from Hitachi Compute Systems Manager v7.x on
page 342
Related tasks
• Upgrading the software from v7.x in a non-cluster environment on
page 344
• Upgrading the software from v7.x in a cluster environment on page 346
Note:
• If other Hitachi Command Suite products are running on the installation
destination management server, ensure that all product versions are 8.0.1
or later. If a Hitachi Command Suite product with an earlier version is
installed, upgrade the product version to 8.0.1 or later.
• If Hitachi Device Manager is installed on the installation destination
management server and an instance of Hitachi Tuning Manager that is
installed on a separate machine is remotely connected to Hitachi Device
Manager, you must stop the Hitachi Tuning Manager service.
• You cannot install Compute Systems Manager by using a network drive.
Shared local devices using Windows Remote Desktop are considered
network drives, you cannot use this method either.
Related concepts
• About verifying the installation environment on page 45
• About verifying system prerequisites on page 42
• About installing Hitachi Compute Systems Manager on page 50
Related tasks
• Installing the software (Windows) on page 52
• Installing from the integrated media by using the all-in-one installer
(Windows) on page 54
• Installing the software (Linux) on page 55
Files and settings that are not included in the previous list are initialized
after the upgrade. If you have made changes to any settings not in this
list, you must make a note of these settings so that you can modify them
after the installation finishes.
• If Deployment Manager is being used, remove it.
Removing Deployment Manager requires using the v7.x installation media.
When you run the Compute Systems Manager installation wizard, select
Deployment Manager to remove it.
Procedure
Note:
Result
You can now start using the new version of Compute Systems Manager.
Related concepts
• About upgrading from Hitachi Compute Systems Manager v7.x on
page 342
Related tasks
• Verifying access to the management server on page 57
• Installing Deployment Manager on page 181
• Starting Hitachi Compute Systems Manager on page 186
• Stopping Hitachi Compute Systems Manager on page 187
Related references
• Prerequisites for upgrading the software from v7.x on page 342
• Prerequisites for installing or upgrading the software on page 51
Files and settings that are not included in the previous list are initialized
after the upgrade. If you have made changes to any settings not in this
list, you must make a note of these settings so that you can modify them
after the installation finishes.
• Verify that there is adequate free disk space on the management server
running in the cluster environment.
• Check the port number used for the database.
If you upgrade Compute Systems Manager, the database port number is
set to the default (22032/tcp).
If you have changed the port number from the default, record the port
number that you are using.
• If Deployment Manager is being used, remove it.
Deployment Manager must be removed from the active and standby nodes
before the upgrade.
Removal requires the use of the installation media for v7.x. In the
installation wizard for Compute Systems Manager, select Deployment
Manager and remove it.
• If other Hitachi Command Suite product services are already registered to
the cluster management application group used by the installation wizard,
note the following:
When you run an installation on an active node, all registered services are
removed and then re-registered by default when you complete the
installation on the standby node. If you changed the service resource
names, record the resource names in advance, and then manually change
the names after the installation is finished.
Note: This step does not apply to Hitachi File Services Manager
resources because they are not removed during the installation.
Procedure
3. After completing the upgrade on the active node, use the cluster
management software to move the owner of the group in which Hitachi
Command Suite services are registered to the standby node.
4. Upgrade Compute Systems Manager on the standby node by running the
installation wizard.
During the installation or upgrade, ensure you follow these requirements:
• Install Compute Systems Manager in the same location as on the
active node.
• If you installed Deployment Manager on the active node, install it on
the standby node.
5. If you changed the database port number to a port number other than
the default, specify the port number that you recorded earlier.
Tip:
• If the svp.bind.address property is not specified, the IP
address of the active and standby nodes is registered on the
Hitachi server.
• The management server IP address, with which the Hitachi
server is communicating, is registered on the Hitachi server. If
you specify the svp.bind.address property, the IP address
specified for the property is also registered. You can check the
management server IP addresses registered on the Hitachi
servers by using the Web console. If you find management
server IP addresses that are no longer in use, delete them.
10. Using the cluster management software, move the owner of the group in
which you registered the Compute Systems Manager services to the
active node.
11. If you registered a plug-in license on the standby node, enter the same
license key on the active node.
12. If you installed Deployment Manager, set up the cluster environment so
that you can enable and use Deployment Manager.
Related concepts
• Hitachi Compute Systems Manager services used in a cluster environment
on page 203
Related tasks
• Installing Deployment Manager on page 181
• Temporarily stopping Hitachi Compute Systems Manager in a cluster
environment (Windows) on page 245
Related references
• Command format for migrating to a Linux cluster environment on
page 260
• Synchronizing settings in a cluster environment on page 243
• Prerequisites for installing or upgrading the software on page 51
• Hitachi Command Suite properties requiring updates for port number
changes on page 75
• Prerequisites for installing Deployment Manager on page 178
• Prerequisites for upgrading the software from v7.x on page 342
• Properties related to Hitachi Compute Systems Manager server ports and
functions (user.properties) on page 307
• Properties related to clustering (cluster.conf) on page 337
alert
A notification that a certain event has occurred. Alerts are triggered when
errors or failures occur on a component of a managed resource, or when
thresholds are exceeded.
B
base DN
The starting point in the active directory hierarchy at which your searches
begin.
C
certificate
Refers to a digital certificate used with SSL. The browser examines the
certificate and determines whether it is authentic before allowing
communication.
Glossary 351
Hitachi Compute Systems Manager Installation and Configuration Guide
chassis
A housing in which blades and other various shared electronic
components are mounted.
CLI
command line interface
CSV
comma-separated values
D
daemon
A Linux program that runs in the background.
discovery
A process that finds and identifies network objects. For example,
discovery may find and identify all hosts within a specified IP address
range.
E
external authorized user
A user who belongs to an authorization group that is registered in
Compute Systems Manager when the management server is connected to
an external authorization server. User authorization groups can be used
as user groups when Compute Systems Manager is connected to an
external authorization server.
352 Glossary
Hitachi Compute Systems Manager Installation and Configuration Guide
F
FC
Fibre Channel
G
GUI
graphical user interface
H
HBA
See host bus adapter.
hypervisor
Software that enables multiple guest operating systems (virtual
machines) to run concurrently on a single physical host computer. Each
operating system runs independently, but the hypervisor controls the host
processor and resources.
I
inventory
Information about managed resources, such as operating system version,
hardware status, and IP address.
IPMI
Intelligent Platform Management Interface
Glossary 353
Hitachi Compute Systems Manager Installation and Configuration Guide
J
Java heap dump
A record of all live Java objects and classes that is used for
troubleshooting diagnostics.
Java thread
A Java program's path of execution.
JDK
Java Development Kit
K
key password
Unlocks the private keys stored in the keystore.
keystore
A keystore contains private keys and certificates with corresponding
public keys that are used for secure SSL communications.
L
lights-out management (LOM)
Provides remote management of discovered hosts by connecting to a
host's management interface from the Hitachi Compute Systems Manager
management client.
logical group
A user-defined collection of managed resources, grouped together by
installation location, organization, or use.
354 Glossary
Hitachi Compute Systems Manager Installation and Configuration Guide
LPAR
See logical partition.
LPAR Manager
A management component that lets you manage logical partitions.
M
managed resource
Any system, such as a host, chassis, or server, managed by Hitachi
Compute Systems Manager.
management client
A computer used to operate a graphical user interface client or a
command-line interface client.
management module
A component installed in a chassis that controls the blades and other
various shared electronic components.
management target
Any system, such as hosts, servers, or chassis, within an IP address
range that is targeted to be managed by a software application.
N
N+M cold standby
A failover mechanism for servers that increases availability. With N+M
cold standby, "N" servers are active and running your applications, and
"M" servers are on standby, powered off, and not consuming data center
resources. If a failure occurs on a running blade server, the software
detects the failure and automatically replaces the failed blade with a
standby blade.
Glossary 355
Hitachi Compute Systems Manager Installation and Configuration Guide
O
object identifier (OID)
OIDs uniquely identify managed objects. SNMP traps can be distinguished
from each other because they have unique OIDs.
P
performance profile
A user-defined set of performance metrics and data collection interval
settings used to collect and analyze managed host performance data.
power profile
A user-defined set of performance metrics and data collection interval
settings used to collect and analyze chassis power consumption data.
private key
An encryption/decryption key known only to the party or parties that
exchange secure communication.
properties file
A file that defines aspects of the operating environment. The operating
environment can be modified by changing the appropriate properties file.
R
remote method invocation (RMI) request
A request to invoke a program on a remote computer.
resource group
A collection of resources that are grouped by one or more system
resource types.
role
Permissions that are assigned to users in a user group to control access to
resources in a resource group. Resource groups can be assigned to
different user groups with different roles.
root
A Linux user account that has access to all commands and files.
356 Glossary
Hitachi Compute Systems Manager Installation and Configuration Guide
S
SAN
See storage area network.
Two SSL-enabled peers use their private and public keys to establish a
secure communication session, with each peer encrypting transmitted
data with a randomly generated and agreed-upon symmetric key.
self-signed certificate
A digital identity certificate signed by the person who created it, rather
than a trusted certificate authority.
SNMP
Simple Network Management Protocol
SNMP trap
An event generated by an SNMP agent from the managed resource that
communicates an event, such as an error or failure.
Glossary 357
Hitachi Compute Systems Manager Installation and Configuration Guide
su command
The su command changes user credentials on a Linux system to those of
the root user or to the user specified by the Name parameter, and then
initiates a new session.
sudo command
The sudo (superuser do) command allows a system administrator to
change user credentials on a Linux system to those of the root user or to
the user specified by the Name parameter, and then initiates a new
session. The session is usually limited and all actions are recorded in a
log.
T
threshold
A user-defined limit that triggers an alert when reached or exceeded.
truststore
A truststore contains public keys in the form of trusted third-party
certificates, such as those from a certificate authority (CA) or from
another party with which you must set up secure SSL communication.
truststore file
A key database file that contains public keys for a trusted entity.
U
User Access Control (UAC)
Management of user accounts in Windows Server 2008.
user group
A collection of users who have access to the same resources and have the
same permissions for those resources. Permissions for users are
determined by the user groups to which they belong. Users and resource
groups can be assigned to multiple user groups.
358 Glossary
Hitachi Compute Systems Manager Installation and Configuration Guide
V
virtual machine
One instance of an operating system along with one or more applications
running in an isolated partition within the computer. A VM enables
different operating systems to run in the same computer at the same time
as well as prevents applications from interfering with each other. All
virtual machines run simultaneously.
W
wake-on-LAN (WOL)
An ethernet computer networking standard that allows a computer or
server to be turned on or awakened from a remote location by a network
message.
Glossary 359
Hitachi Compute Systems Manager Installation and Configuration Guide
360 Glossary
Hitachi Compute Systems Manager Installation and Configuration Guide
Index
Symbols B
.NET Framework, installing for Deployment backing up the database
Manager 180 prerequisites 192
procedure 193, 248, 249
backup workflow 36
Base DN for LDAP directory servers 150
A
basic system configuration, overview 22
account on the Linux host, host prerequisite 103,
blade server chassis
105
secure communication setup workflow 31
account on the Solaris host, host prerequisite
boot settings, changing 182
103, 105
administrator account, creating 62
alert level, for e-mail notifications 60
assigning C
resource group to user group 63 certificate, LDAP directory server 174
role to user group 63 changing
audit events 283, 294, 295 boot settings for managed resources 182
audit logs Deployment Manager port 183
audit events for processing and launching chassis secure communication 132
requests 294, 295 checking status, Compute Systems Manager 190
auditlog.conf properties file 336 cluster
categories and audit events 283 installation prerequisites 204
detailed messages for Compute Systems cluster environment
Manager requests 295 backing up the database 248, 249
log message format and information 292 exporting database 253, 254
overview 281 importing the database 255, 258
setting up 281 restoring the database 250, 252
viewing 282 verifying free disk space in management
auditlog.conf file 336 server 210
authentication cluster environment configuration, checking 211
Base DN 150 cluster.conf properties file 337
external server overview 142 collecting maintenance information
Kerberos server workflow 34 managed host 279
LDAP server 147, 149 commands
LDAP server data structure models 147 changing the timeout period 87
LDAP server workflow 33 components, Compute Systems Manager 21
authentication method, LDAP directory server Compute Systems Manager
150 configuring Windows firewall if enabled after
autolock installing Compute Systems Manager 88
system account 73 using SNMP 70
unlocking user accounts 74 audit logs 281
changing the temperature measurement unit
88
checking status 190
Index 361
Hitachi Compute Systems Manager Installation and Configuration Guide
collecting maintenance information, Linux basic system 22
managed host 280 Deployment Manager 178
collecting maintenance information, Solaris e-mail notifications 60
managed host 280 JDK version 85
collecting maintenance information:Java VM LAN 23
threads on Linux 277 management server URL 83
collecting maintenance information:Java VM optional user account settings 73
threads on Windows 276 ports 78
collecting maintenance information. server host name 79
management server 274 server IP address 79
components 21 SNMP 70
configuring a Kerberos server connection 157 connecting to a Kerberos server 157
configuring an LDAP server connection 151 connecting to an LDAP directory server 151
database connection settings
backing up 193 for a Kerberos server 163
database backup prerequisites 192 for a Kerberos server using DNS and an
database, exporting 196 authorization server 166
database, importing 197 for a Kerberos server with an authorization
database, restoring 194 server 165
database:management 191 for an LDAP directory server 159
database:migration prerequisites 195 for an LDAP directory server using DNS and an
database:restore prerequisites 194 authorization server 162
detailed messages for management server for an LDAP directory server with an
requests 295 authorization server 161
external authentication server 142 for using DNS to find a Kerberos server 164
installation workflow 25 for using DNS to find an LDAP directory server
installing 52 160
Kerberos server:connection settings 163 creating 63
Kerberos server:DNS connection settings 164 resource groups 63
Kerberos server:DNS connection settings with creating user groups 63
an authorization server 166
LAN configuration 23
LDAP directory server:connection settings 159
D
LDAP directory server:connection settings with
data structure, LDAP directory server 150
an authorization server 161
database
LDAP directory server:DNS connection settings
importing in a cluster environment 255, 258
160
restoring in a cluster environment 250, 252
LDAP directory server:DNS connection settings
backing up in a cluster environment 248, 249
with an authorization server 162
exporting in a cluster environment 253, 254
LDAP directory server:setup workflow 33
database corruption in a cluster, troubleshooting
log file settings 297
270, 271
maintenance information overview 273
database corruption, troubleshooting 269
managed host setup workflow 28
database directory, creating a new directory 48
managed resources 20
database management
overview 20
backup 193, 248, 249
overview of Compute Systems Manager server
backup prerequisites 192
properties 306
database backup workflow 36
planning for installation 42
export 253, 254
post-installation workflow 26
exporting the database 196
properties files list 306
import 255, 258
related products 23
importing the database 197
security settings 118
migration prerequisites 195
service names 188
overview 191
starting 186, 187
restore 250, 252
starting and stopping services 186
restore prerequisites 194
troubleshooting 268
restoring 194
verifying prerequisites 42
database migration, prerequisites 195
workflows 24, 143, 145
DCOM, Windows host prerequisite 98
configuring
def_pdsys properties file 320
audit logs 281
362 Index
Hitachi Compute Systems Manager Installation and Configuration Guide
def_pdutsys properties file 321 importing the LDAP directory server certificate
deleting 174
LDAP search user 173 Kerberos authentication workflow 34
services from cluster environment, Linux 242 LDAP authentication method 147, 149
services from cluster environment, Windows LDAP authentication workflow 33
240 LDAP data structure 147, 149
Deployment manager overview 142
port properties file 183, 338 prerequisites for a secure connection 173
Deployment Manager prerequisites for registering an LDAP search
configuration workflow 34 user 170
environment settings 178 secure communication setup workflow 32
installation prerequisites 182 setting up a connection 322, 329
installing 181 using DNS 151
port, changing 183
prerequisites 178
removing from a cluster environment 261
F
Windows Server Failover Clustering 244
fcinfo tool, Windows host prerequisite 100
Device Manager server
fibre channel SAN resource information, fcinfo
secure communication setup workflow 31
tool 100
secure communications 136
firewall configuration, Windows host prerequisite
DNS, for locating an LDAP directory server 151
96, 97
firewall exceptions, ports 89
E
e-mail address, setting for the system account
H
59
HCS Common Component
e-mail notifications
properties files list 310
setting the alert level 60
properties files overview 310
setting up 60
HiRDB.ini properties file 319
enabling
Hitachi Command Suite products 23
WinRM for Windows hosts 98
host name
enabling inband events on a Windows target 100
changing 79
encryption type, Kerberos server 156
properties requiring updated when the host
environment settings
name changes 80, 82
Deployment Manager 178
exauth.properties
file description 322, 329
file example 327, 334 I
exporting the database IIS, installing 179
procedure 253, 254 importing the database
exporting, database 196 procedure 255, 258
external authentication server importing, database 197
Base DN 150 installing 51, 213, 343
configuring a connection to a Kerberos server .NET Framework for Deployment Manager 180
157 avoiding port conflicts 42
configuring a connection to an LDAP server Compute Systems Manager 52
151 Compute Systems Manager on Linux 55
configuring SSL for a secure connection 154 creating a new database directory 48
direct connection settings 159, 163 Deployment Manager 181
direct connection settings with an Deployment Manager, prerequisites 182
authorization server 161, 165 from integrated media with the all-in-one
DNS connection settings 160, 164 installer 54
DNS connection settings with an authorization IIS 179
server 162, 166 installation media 50
exauth.properties file 322, 329 installation workflow 25
exauth.properties file example 327, 334 IPv6 requirements 44
identifying Kerberos encryption type 156 management server information 49
identifying LDAP server data structure and path name rules 47
authentication method 150 planning 42
Index 363
Hitachi Compute Systems Manager Installation and Configuration Guide
post-installation tasks 56 direct connection settings with an
prerequisite information 45 authorization server 161
server time setting 44 DNS connection settings 160
system prerequisites 42 DNS connection settings with an authorization
using integrated media 52 server 162
integrated media installation 52 DNS prerequisites 151
IP address identifying directory server data structure and
changing 79 authentication method 150
chassis management module 114 prerequisites for a secure connection 173
properties requiring updated when the IP prerequisites for registering and LDAP search
address changes 80, 82 user 170
IP connection, Linux host 104 secure communication setup workflow 32
setup workflow 33
LDAP directory server (DNS) and authorization
server settings 162
J
LDAP directory server and authorization server
Java VM threads on Linux, maintenance
settings 161
information 277
LDAP server connection
Java VM threads on Windows, maintenance
workflows 143
information 276
license, registering 58
JDK, changing versions 85
Linux
files and directories 103
host 102
K host account 103
Kerberos installing Compute Systems Manager 55
connecting 156 overview of account on the Linux host 105
exauth.properties file 334 permissions 108
Kerberos server registering firewall exceptions in 44
authentication workflow 34 registering management server firewall
configuring a connection 157 exceptions 90
direct connection settings 163 root access 106
direct connection settings with an setting up an IP connection 104
authorization server 165 log files
DNS connection settings 164 changing settings 298
DNS connection settings with an authorization logger.properties file 309
server 166 settings 297
identifying encryption type 156 log message format and information 292
setup workflow 34 logger.properties file 309
Kerberos server (DNS) and authorization server login window, troubleshooting 268
settings 166 LOM, power management on hosts 94
Kerberos server and authorization server settings
165
Kerberos server connection
M
workflows 145
maintenance information
kernel parameters, configuring 43
Java VM threads on Linux 277
Java VM threads on Windows 276
Linux managed host 280
L managed host 279
LAN configuration 23 management server 274
LDAP overview 273
deleting search user 173 Solaris managed host 280
LDAP directory server managed resource
authentication method 147, 149, 150 changing boot settings 182
authentication workflow 33, 37 managed resource prerequisites
configuring a connection 151 enable WoL 94
configuring SSL for a secure connection 154 Linux files and directories 103
data structure 147, 149 Linux, setting up permission for normal users
data structure Base DN 150 (su command) 107
direct connection settings 159 Linux, setting up root access 106
364 Index
Hitachi Compute Systems Manager Installation and Configuration Guide
Linux, verifying the files and directories 103 resetting the time setting manually 86
Linux:setting up an IP connection 104 restricting management client access 138
Linux:setting up permission for normal users setting up SSL for Device Manager server
(sudo command) 108 secure communications 136
setting up an account on the Linux host 103 setting up SSL for SMTP server secure
setting up an account on the Solaris host 103 communications 130
snmp for inband events 100 troubleshooting 269
SNMP for inband events 111, 112 verifying access 57
Solaris files and directories 103 media for installing 50
Solaris, setting up permission for normal users MIB files, registering 70
(pfexec command) 109 migrating
Solaris, setting up permission for normal users to a cluster environment, Linux 233
(su command) 107 to a cluster environment, Windows 229
Solaris, setting up root access 106 migration workflow 35
Solaris, verifying the files and directories 103
Windows Server 2003:configuring the firewall
96
O
Windows Server 2003:installing the fcinfo tool
overview
100
audit logs 281
Windows Server 2008:configuring the firewall
basic system configuration 22
97
Compute Systems Manager 20
Windows Server 2008:setting up a remote
installation workflow 25
connection for UAC 99
LAN configuration 23
Windows:enabling DCOM 98
managed resources 20
managed resources
related products 23
adding a host 61
workflows 24
blade server prerequisites 95
overwriting Compute Systems Manager
Linux host prerequisites 102
on a standby node in a cluster environment,
maintenance information for Linux hosts 280
Linux 227
maintenance information for managed hosts
on an active node in a cluster environment,
279
Linux 225
maintenance information for Solaris hosts 280
overview 20
rack-mounted server prerequisites 95
setup workflow 28 P
Solaris host prerequisites 102 password, changing for system account 59
updating information after replacing or path names, rules for specifying 47
modifying a host 114 pdsys properties file 320
Windows host prerequisites 95 pdutsys properties file 321
managed secure communication 131 pfexec command for normal users, Solaris host
management client prerequisite 109
restricting access to the management server planning
138 avoiding port conflicts 42
secure communication setup workflow 30 creating a new database directory 48
setting up SSL on clients running the CLI 128 installation 42
setting up SSL on web-based clients 128 installation information 45
setting up the server for secure client IPv6 requirements 44
communication 119 management server information 49
management server path name rules 47
changing log file settings 298 server time setting 44
changing the timeout period for commands 87, system prerequisites 42
88 port
importing the LDAP directory server certificate Deployment Manager property 183, 338
174 ports
information required for installation 49 avoiding conflicts 42
maintenance information 274 changing ports 78
migration workflow 35 Compute Systems Manager server 302
properties files 310 Deployment Manager 304
properties files list 306 HCS Common Component 302
resetting the time setting 86
Index 365
Hitachi Compute Systems Manager Installation and Configuration Guide
overview of Compute Systems Manager server R
ports 302 registering
overview of Deployment Manager 304 services to cluster environment, Linux 239
overview of HCS Common Component ports services to cluster environment, Windows 237
302 registering firewall exceptions, Linux 44
properties requiring updated when ports removing the software
change 75, 77 prerequisites 65, 243
user.properties file 307 removal procedure 262, 264
workers.properties file 318 removing the software, Linux
post-installation removal procedure 68
adding a host 61 removing the software, Windows
changing the system account password 59 removal procedure 66
completing the initial setup 64 resetting the server time setting 86
creating a server administrator account 62 resetting the server time setting manually 86
overview 56 resource group
registering a license 58 assigning to user group 63
setting an e-mail address for the system creating 63
account 59 restarting Compute Systems Manager in a cluster
setting up alert level for e-mail notifications 60 environment 246, 247
setting up e-mail notifications 60 restoring the database
verifying access to the management server 57 procedure 250, 252
workflow 26 restoring, database 194
prerequisites restricting communication to SSL 126
blade servers 95 root access, Linux host prerequisite 106
Deployment Manager 178 root access, Solaris host prerequisite 106
implementing Compute Systems Manager in a
cluster environment 204
installation information 45
Linux installation 43
S
Linux managed hosts 102 search user, LDAP directory server 170
rack-mounted servers 95 secure communication
removing the software 65, 243 Device Manager server 136
Solaris managed hosts 102 secure communications 118
system 42 workflow for Device Manager server setup 31
upgrade installation 342 workflow for SMTP server setup 30
Windows managed hosts 95 workflow for increasing blade server chassis
properties communication 31
auditlog.conf properties file 336 workflow for management clients 30
cluster.conf properties file 337 security settings
Compute Systems Manager properties files list configuring SSL for a secure LDAP server
306 connection 154
Compute Systems Manager server properties increasing security for chassis alert
file overview 306 communication 132
def_pdsys properties file 320 overview 118
def_pdutsys properties file 321 prerequisites for a secure LDAP server 173
exauth.properties file 322, 329 restricting management client access to the
exauth.properties file example 327, 334 management server 138
HCS Common Component 310 secure communications between the
HCS Common component properties files list management server and the SMTP server 130
310 secure communications for management
HiRDB.ini properties file 319 clients 119
logger.properties file 309 setting up SSL
pdsys properties file 320 managed server communication 131
pdutsys properties file 321 setting up SSL for Device Manager server
user_hsso_httpsd.conf file 319 secure communication 136
user_httpsd.conf file 314 setting up:server for secure client
user.conf properties file 322 communication 119
user.properties file 307 setting up:SSL for SMTP server secure
usrconf.properties file 317 communication 130
workers.properties file 318
366 Index
Hitachi Compute Systems Manager Installation and Configuration Guide
setting up:SSL on management clients running T
the CLI 128 target host 61
setting up:SSL on web-based management temperature measurement unit, changing 88
clients 128 time setting for the management server 86
user_httpsd.conf file 314 time setting on server 44
user.conf properties file 322 timeout period for commands 87
server administrator, creating an account 62 To Do list
server certificate, expiration date 139 completing 64
server time setting requirements 86 using for initial setup 56
service names, Compute Systems Manager 188 troubleshooting
Setting up example of database corruption 269
blade server target 95 example of database in a cluster 270, 271
settings example of when login windows does not
for virus scanning programs 56 display 268
settings for IPv6 44 example of when management server does not
Simple Network Management Protocol 70 start 269
SMTP server overview 268
secure communication setup workflow 30 workflow 38
secure communications 130
SNMP 100
enabling inband events on a Linux target 111
enabling inband events on a Solaris target 112
U
registering MIB files 70 updating information after replacing or modifying
traps 70 a managed host 114
workflow for configuring traps 27 upgrade
software, prerequisites 51, 213, 343 non-cluster environment 344
software, removing with all-in-one uninstaller 67 upgrade installation, prerequisites 342
Solaris upgrading
files and directories 103 software on active node 346
host 102 upgrading Compute Systems Manager
host account 103 on a standby node in a cluster environment,
overview of account on the Solaris host 105 Linux 227
permissions 107, 109 on an active node in a cluster environment,
root access 106 Linux 225
SSL upgrading the software 342
setting up an additional certificate for upgrading the software on the management
managed servers 131 server 341
setting up on management clients running the URL
CLI 128 changes that require updating the URL 85
setting up on the server for secure client changing the management server URL 83
communication 119 user account
setting up on web-based management clients optional settings 73
128 unlocking accounts 74
setting up:additional certificate for chassis user groups 63
communication 132 user_hsso_httpsd.conf properties file 319
using for secure client communication 119 user_httpsd.conf properties file 314
starting Compute Systems Manager 186 user.conf properties file 322
stopping Compute Systems Manager 186, 187 user.properties file 307
su command for normal users, Linux host usrconf.properties file 317
prerequisite 107
su command for normal users, Solaris host
prerequisite 107 V
sudo command for normal users, Linux host viewing, audit logs 282
prerequisite 108 virus scanning
system account cluster environment 243
changing the password 59 virus scanning setting requirements settings
enabling auto account locking 73 56
setting an e-mail address 59
user.conf properties file 322
system components, overview 21
Index 367
Hitachi Compute Systems Manager Installation and Configuration Guide
W
Windows firewall, enabling after installing
Compute Systems Manager 88
Windows hosts 95
Windows Server 2008, setting up a remote
connection with UAC 99
WinRM settings, applying 91
WinRM, enabling for Windows hosts 98
WoL, enabling on a host 94
workers.properties file 318
workflows
blade server chassis secure communication
setup 31
client secure communication setup 30
Deployment Manager 34
Device Manager server secure communication
setup 31
installation 25
Kerberos server connection 145
Kerberos server setup 34
LDAP directory server setup 33
LDAP server connection 143
LDAP server secure communications setup 32
managed host setup 28
management server migration 35
overview 24
post-installation 26
server database backup 36
server network configuration network workflow
37
SMTP server secure communication setup 30
troubleshooting 38
368 Index
Hitachi Compute Systems Manager Installation and Configuration Guide
Hitachi Compute Systems Manager Installation and Configuration Guide
Hitachi Data Systems
Corporate Headquarters
2845 Lafayette Street
Santa Clara, California 95050-2639
U.S.A.
www.hds.com
Americas
+1 408 970 1000
[email protected]
Asia Pacific
+852 3189 7900
[email protected]
MK-91HC195-17