Sponsored Content
The Lounge What is on Your Mind? AIX Smit menu designer. WinSmit Post 302087948 by mimyrtek on Thursday 7th of September 2006 11:41:26 AM
Old 09-07-2006
Smilie
no worries!!
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Probably an easy AIX-SMIT question with mkroute

Hi All, I am on a project and logging into about 100 servers one at a time. One of the steps I am performing is setting up a link with smit mkroute. I am using AIX versions 5.2 and 5.3 Does anyone know a quick command line to set DESTINATION ADDRESS, GATEWAY address, Network MASK, and... (5 Replies)
Discussion started by: jeffpas
5 Replies

2. AIX

Menu base AIX script

Hi, I am trying to create a menu on AIX systen for operators in our office. Please suggest how can I loop back to menu by pressing any key from a online running file. For example I can view the Database alert log file by tail -f command but how should I loop back to menu again. If I press <ctrl... (1 Reply)
Discussion started by: dwiravi
1 Replies

3. Shell Programming and Scripting

Menu Base AIX Script

Hi, I am trying to create a menu on AIX systen for operators in our office. Please suggest how can I loop back to menu by pressing any key from a online running file. For example I can view the Database alert log file by tail -f command but how should I loop back to menu again. If I press <ctrl... (1 Reply)
Discussion started by: dwiravi
1 Replies

4. Solaris

SMIT i AIX Sun Solaris ?

i now when i want use the smit in AIX is possible but a ask if you has in sun same job in sun tel me please awating supports (3 Replies)
Discussion started by: Yalmalki
3 Replies

5. Shell Programming and Scripting

Using expect script with AIX's SMIT in cron

My searches turned up nothing relevant, so I apologize if this has already been looked at. I am trying to run an expect script from a Solaris machine, that ssh's into an AIX machine, and interacts with a SMIT created menu system that runs a few backups for me. The expect script runs fine when... (0 Replies)
Discussion started by: Mariognarly
0 Replies

6. Programming

Trying to install X-Designer from Sun studio suite.

Hi all. I'm trying to install Sun Studio on my Ubuntu 10.4 pc because I wanna use X-Designer (it is a Motif GUI builder), that should be in that suite. I downloaded the tar package build for linux and installed the deps. Sun Studio and the Sun C Compiler work fine, but i cannot find... (0 Replies)
Discussion started by: mghis
0 Replies

7. AIX

How do I killed ideal users from AIX 5.3 smit?

Hi, I'm newbee to AIX and would like to setup a process which kills 1 Hr. ideal users from smit. Please advise for making it work. :) Thanks, Sumit (2 Replies)
Discussion started by: sumit30
2 Replies

8. AIX

AIX 5.3 Using sudo to control smit

Does anyone have any experience using sudo to control smit on AIX 5.3? These are the smit commands that I want certain users to execute: # Cmnd alias specification Cmnd_Alias SMIT = /bin/smit hacmp, \ /bin/smit pxdam, \ /bin/smit cl_lsuser, \ /bin/smit cl_users, \ /bin/smit cl_passwd ... (5 Replies)
Discussion started by: tharrieswk
5 Replies
COROSYNC_OVERVIEW(8)				    Corosync Cluster Engine Programmer's Manual 			      COROSYNC_OVERVIEW(8)

NAME
corosync_overview - Corosync overview OVERVIEW
The corosync project's purpose is to implement and support a production quality Revised BSD licensed implementation of a high performance low overhead high availability development toolkit. Faults occur for various reasons: * Application Faults * Middleware Faults * Operating System Faults * Hardware Faults The major focus of high availability in the past has been to mask hardware faults. Faults in other components of the system have gone unsolved until Corosync. Corosync is designed for applications to replicate their state to up to 16 processors. The processors all con- tain a replica of the application state. The corosync project provides a group message API called CPG. The project developers recommend CPG be used for most applications. The CPG service implements a closed group messaging model presenting extended virtual synchrony guarantees. To manage conditions where the process executing the CPG application exchange fails, we provide the Simple Availability Manager (sam) to provide simple application restart. QUICKSTART
The corosync executive must be configured. In the directory conf in the source distribution are several files that must be copied to the /etc/corosync directory. If corosync is packaged by a distro, this may be complete. The directory contains the file corosync.conf. Please read the corosync.conf(5) man page for details on the configuration options. The corosync project will work out of the box with the default configuration options, although the administrator may desire different options. The corosync executive uses cryptographic techniques to ensure authenticity and privacy of the messages. In order for corosync to be secure and operate, a private key must be generated and shared to all processors. First generate the key on one of the nodes: unix# corosync-keygen Corosync Cluster Engine Authentication key generator. Gathering 1024 bits for key from /dev/random. Press keys on your keyboard to generate entropy. Writing corosync key to /etc/corosync/authkey. After this operation, a private key will be in the file /etc/corosync/authkey. This private key must be copied to every processor in the cluster. If the private key isn't the same for every node, those nodes with nonmatching private keys will not be able to join the same configuration. Copy the key to some security transportable storage or use ssh to transmit the key from node to node. Then install the key with the com- mand: unix#: install -D --group=0 --owner=0 --mode=0400 /path_to_authkey/authkey /etc/corosync/authkey If a message "Invalid digest" appears from the corosync executive, the keys are not consistent between processors. Finally run the corosync executive. If corosync is packaged from a distro, it may be set to start on system start. It may also be turned off by default in which case the init script for corosync must be enabled. USING LIBRARIES
The corosync libraries have header files which must be included in the developer's application. Once the header file is included, the developer can reference the corosync interfaces. The corosync project recommends to distros to place include files in /usr/include/corosync. IPv6 The corosync project supports both IPv4 and IPv6 network addresses. The entire cluster must use either IPv4 or IPv6 for the cluster commu- nication mechanism. In order to use IPv6, IPv6 addresses must be specified in the bindnetaddr and mcastaddr fields in the configuration file. The nodeid field must also be set. An example of this is: nodeid: 2 bindnetaddr: fec0::1:a800:4ff:fe00:20 mcastaddr: ff05::1 To configure a host for IPv6, use the ifconfig program to add interfaces: box20: ifconfig eth0 add fec0::1:a800:4ff:fe00:20/64 box30: ifconfig eth0 add fec0::1:a800:4ff:fe00:30/64 If the /64 is not specified, a route for the IPv6 network will not be configured which will cause significant problems. Make sure a route is available for IPv6 traffic. ARCHITECTURE
The corosync libraries are a thin IPC interface to the corosync executive. The corosync executive implements the functionality of the corosync APIs for distributed coming. The corosync executive uses the Totem extended virtual synchrony protocol. The advantage to the end user is excellent performance charac- teristics and a proven protocol with excellent reliability. This protocol connects the processors in a configuration together so they may communicate. ENVIRONMENT VARIABLES
The corosync executive process uses four environment variables during startup. If these environment variables are not set, defaults will be used. COROSYNC_MAIN_CONFIG_FILE This specifies the fully qualified path to the corosync configuration file. The default is /etc/corosync/corosync.conf. COROSYNC_TOTEM_AUTHKEY_FILE This specifies the fully qualified path to the shared key used to authenticate and encrypt data used within the Totem protocol. The default is /etc/corosync/authkey. SECURITY
The corosync executive optionally encrypts all messages sent over the network using the AES-128 cipher. The corosync executive uses HMAC and SHA1 to authenticate all messages. The corosync executive library uses NSS as a pseudo random number generator. If membership messages can be captured by intruders, it is possible to execute a denial of service attack on the cluster. In this sce- nario, the cluster is likely already compromised and a DOS attack is the least of the administration's worries. The security in corosync does not offer perfect forward secrecy because the keys are reused. It may be possible for an intruder by captur- ing packets in an automated fashion to determine the shared key. No such automated attack has been published as of yet. In this scenario, the cluster is likely already compromised to allow the long-term capture of transmitted data. For security reasons, the corosync executive binary should NEVER be setuid or setgid in the filesystem. BUGS
None that are known. SEE ALSO
corosync.conf(5), corosync-keygen(8), cpg_overview(8), sam_overview(8) corosync Man Page 2012-02-13 COROSYNC_OVERVIEW(8)
All times are GMT -4. The time now is 02:24 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy