Chapter 17 Configuring System Operations

Registering a Secondary Instance to a Primary Instance

Table 17-6 System Operations: Deployment Operations Page (continued)

Option

Description

Deregistration

Deregister from Primary

Deregisters the secondary from the primary instance. The secondary instance retains the database configuration from when it was deregistered. All nodes are marked as deregistered and inactive, and the secondary instance becomes the primary instance.

When full replication is in progress on an instance, do not attempt to deregister that instance. Wait until the full replication is complete and the secondary instance is restarted before you deregister the secondary instance.

Promotion

Promote to Primary

Request to promote a secondary instance to primary instance. All updates to the current primary instance are stopped so that all replication updates can complete. The secondary instance gets primary control of the configuration when the replication updates complete.

Replication

Force Full Replication

Replicates the primary instance’s database configuration for the secondary instance.

When full replication is in progress on an instance, do not attempt to deregister that instance. Wait until the full replication is complete and the secondary instance is restarted before you deregister the secondary instance.

Step 3 Specify the appropriate values in the Registration Section.

Step 4 Click Register to Primary.

The following warning message is displayed.

This operation will register this ACS Instance as a secondary to the specified Primary Instance. ACS will be restarted. You will be required to login again. Do you wish to continue?

Step 5 Click OK.

The Secondary Instance is restarted automatically.

The credentials and the configurations that you create on the primary instance are applied to the secondary instance.

Step 6 Register another ACS machine as secondary to the same deployment after the first secondary instance is up and running, successfully. Follow the same procedure to register all the secondary machines on the deployment.

Note Memory utilization of 90% is considered normal in the secondary instance if the log collector is running and the server is under heavy load. If Memory utilization increases beyond 90% and keeps increasing, it may be abnormal and needs to be analyzed.

 

 

User Guide for Cisco Secure Access Control System 5.3

 

 

 

 

 

 

OL-24201-01

 

 

17-15

 

 

 

 

 

Page 505
Image 505
Cisco Systems OL-24201-01 manual Click Register to Primary, 17-15