3.3.1.2 Configuring a Serviceguard Cluster as a Log Consolidation Server with

 

clog_wizard................................................................................................................................

49

3.3.1.3 Cluster Configuration Notes for clog..............................................................................

52

3.3.1.4 Serviceguard Automation Features................................................................................

52

3.3.1.5 Minimizing Message Loss During Failover....................................................................

53

3.3.1.6 Configuring a Log Forwarding Client Using clog_wizard.............................................

54

3.3.2 Manually Configuring Log Consolidation..............................................................................

56

3.3.2.1 Manually Configuring a Standalone Log Consolidation Server.....................................

56

3.3.2.2 Manually Configuring a Serviceguard Cluster as a Log Consolidation Server.............

59

3.3.2.2.1 Creating the clog Package.......................................................................................

63

3.3.2.2.2 Testing and Starting the clog Package.....................................................................

65

3.3.2.2.3 Using VxVM Instead of LVM..................................................................................

66

3.3.2.3 Manually Configuring Log Forwarding Clients.............................................................

66

3.3.2.3.1 Manually Configuring a Standalone Log Forwarding Client.................................

66

3.3.2.3.2 Manually Configuring a Serviceguard Cluster as a Log Forwarding Client..........

68

3.3.2.3.3 Forwarding ASCII Log Data...................................................................................

72

3.3.2.4 Consolidating Package Logs on the Log Consolidation Server......................................

74

3.4 Disabling Log Consolidation...........................................................................................................

75

3.4.1 Disabling a Standalone Log Consolidation System................................................................

75

3.4.2 Disabling a Serviceguard Cluster Log Consolidation System................................................

76

3.4.3 Disabling a Standalone Log Forwarding Client......................................................................

76

3.4.4 Disabling a Serviceguard Cluster Log Forwarding Client......................................................

77

3.5 Securing Consolidated Logs............................................................................................................

78

3.5.1 Log File Protections.................................................................................................................

78

3.5.2 ssh Port Forwarding................................................................................................................

78

3.5.2.1 ssh Port Forwarding to a Serviceguard Cluster Log Consolidator.................................

78

3.5.3 clog Network Port Usage........................................................................................................

79

3.5.4 Using Bastille to Harden the System.......................................................................................

79

3.6 Viewing System and Consolidated Logs.........................................................................................

80

3.6.1 Starting System Management Homepage...............................................................................

80

3.6.2 Using the System and Consolidated Log Viewer....................................................................

80

4 Command Fanout.........................................................................................................

83

4.1 Parallel Distributed Shell.................................................................................................................

83

4.2 pdsh Utility Wrappers.....................................................................................................................

84

4.3 Security Configuration....................................................................................................................

85

4.3.1 Remote Shell Security Setup....................................................................................................

85

4.3.2 ssh Security Setup....................................................................................................................

85

4.3.3 Security Notes.........................................................................................................................

85

4.4 Command Fanout Troubleshooting................................................................................................

86

A HP-Supported Open Source pdsh Options...............................................................

87

Index.................................................................................................................................

89

4Table of Contents