CommandPoint Clusters V2.1.1 Release Notes


Introduction

These release notes support CommandPointTM Clusters V2.1.1. They contain information on product compatibility, release-specific installation instructions, an overview of the product, how to get started with the product, and known problems.

Read this document before you install or run this release of CommandPoint Clusters. For complete information on ptx®/CLUSTERS and ptx/CTC, consult the ptx/CLUSTERS Administration Guide and the ptx/CTC Administration Guide, as well as the online help for CommandPoint Clusters.


What Is New in this Release

This release of CommandPoint Clusters includes the following additions and modifications.


Access to CommandPoint Clusters is Through Group Membership

With this release of CommandPoint Clusters, access to the software is controlled by the group or groups a user belongs to. There are two types of user groups: administrative groups, and non-administrative/read-only groups. Users who are members of administrative groups have full administrative privileges; users who are members of non-administrative and read-only groups have access to all administrative menus and tasks, but no commands will be executed. By restricting administrative users to administrative-only groups, it is no longer necessary to pass the root login across the network as it was in the previous version of CommandPoint Clusters, leading to potential security problems.

CommandPoint Clusters groups are listed and defined in the /opt/commandpoint/cpclusters/cpclustersd.config file. See "Set Up a CommandPoint Clusters Configuration File" for more information about the CommandPoint Clusters configuration file and groups.


Netscape FastTrack Server No Longer Required

Installation and configuration of Netscape FastTrack ServerTM is no longer required by CommandPoint Clusters. The CommandPoint Clusters configuration file and privilege groups are used instead of Netscape FastTrack Server. If you previously configured Netscape FastTrack Server for use with CommandPoint Clusters, you do not need to deinstall it to use this release of CommandPoint Clusters.


Non-Root Users Have Access to All Menus and Tasks

With this release of CommandPoint Clusters, non-administrative users have complete access to all menu items and tasks. However, none of the tasks are actually executed on any of the cluster nodes. In the previous version of CommandPoint Clusters, non-administrative users (called non-root users) had access to only certain forms and no tasks. Non-administrative users have the same access as administrative users who are in dry-run mode.


New Tasks Window for Viewing ptx/CTC-Related Tasks

You can select a ptx/CTC-related task, such as enable or disable CTC, by selecting a node and then right-clicking. Once you click OK on the dialog box for the task, a Tasks Window will appear. The window contains an entry for every task that was performed during the current CommandPoint Clusters session. Highlighting an entry in the Tasks Window lets you view details about the task, such as the command that was run to perform the task.


Changes to Dry Run Mode

When an administrative user selects dry run mode, he essentially becomes a non-administrative user. He will have access to all menu items and tasks but be unable to execute them. (There is no dry run mode option for the non-administrative user.)


Changes to File and View Menus

Minor changes have been made to the File and View pull-down menus:


About CommandPoint Clusters

CommandPoint Clusters is a standalone DYNIX/ptx® or Windows NT® application for administering ptx/CLUSTERS and ptx/CTC. It is an optional application that provides the same level of administrative capabilities as the ptx/ADMIN® menus and forms for ptx/CLUSTERS and ptx/CTC. CommandPoint Clusters can be used instead of, or in conjunction with, ptx/ADMIN and the command-line utilities for administering a cluster and managing failover.

A cluster must be installed and running before you can begin to use CommandPoint Clusters; however, you can create new ptx/CTC failover rules for the cluster (or modify existing ptx/CTC rules) using CommandPoint Clusters.


Why Use CommandPoint Clusters?

CommandPoint Clusters provides all the functionality of the ptx/CLUSTERS and ptx/CTC command-line utilities and ptx/ADMIN menu forms. It is a Java-based graphical user interface that is easy to use and lets you administer all nodes from one interface. It also provides the following functionality that is not available in the standard ptx/CLUSTERS or ptx/CTC administration utilities:

Command viewing and dry-run mode together provide a learning environment for new or inexperienced system administrators.


Software and Hardware Compatibility Information


DYNIX/ptx Server and Client Requirements

The following software products are required, unless specified otherwise, on the IBM NUMA-Q host that will be running the CommandPoint Clusters server or client software:


Windows NT Client Requirements

If you plan to use Windows NT to administer a cluster from a PC, then the following requirements apply to the PC that you will be using. These requirements are in addition to the DYNIX/ptx requirements listed in the previous section, except for ptx/WINDOWS, ptx/JSE, and ptx/EES, which are needed on DYNIX/ptx platforms only.


Software Requirements

CommandPoint Clusters is compatible with the following software products running on a PC:


ATTENTION

You will need about 1.4 MB free space on your PC to install CommandPoint Clusters, plus an additional 2.6 MB if the Java Runtime Environment (JRE) is not already installed. If CommandPoint SVM or CommandPoint Clusters is already installed on your PC, then the JRE is already installed. You will also need about 7 MB for the CommandPointClusters2.1.1.exe file.



Hardware Requirements


ATTENTION

Do not use the VCS console on a NUMA-Q system to run CommandPoint Clusters.


If you plan to use the Windows NT-compatible client to administer your IBM NUMA-Q system, then the following minimum requirements apply to the PC that you will be using. (These requirements are in addition to the DYNIX/ptx requirements listed in the previous section.)


ATTENTION

The minimum configuration will allow you to run all three CommandPoint products (CommandPoint Admin, CommandPoint Clusters and Command Point SVM) simultaneously. However, the performance will be better if you use the recommended hardware configuration.

Whichever configuration you choose to use, the performance of the system will be impacted by the number and size of the applications that you run simultaneously.



Minimum Hardware Configuration

The minimum hardware requirements are:


Recommended Hardware Configuration

The recommended hardware requirements are:


Software Installation

The CommandPoint Clusters software must be installed on each cluster node, and can also be installed on a PC running Windows NT.


DYNIX/ptx Installation

The CommandPoint Clusters software for DYNIX/ptx is located on the Systems Management Software CD-ROM. Other required software for use with CommandPoint Clusters (including DYNIX/ptx, ptx/CLUSTERS, ptx/CTC, ptx/JSE, and ptx/WINDOWS) is located on the DYNIX/ptx Operating System and Layered Products Software CD-ROM. You can install all of these software products through the installation process described in the DYNIX/ptx and Layered Products Software Installation Release Notes. The product to select for installation is: cpclusters.

As shipped, CommandPoint Clusters is pre-configured to allow members of group cpclus and group cpgroup to run CommandPoint Clusters and the other CommandPoint products, respectively.

As root, you need to create the group cpclus (and cpgroup if you are going to run other CommandPoint products and cpgroup does not already exist), and add yourself to the group(s).

If you are using eXceed, refer to the "Instructions for eXceed Users" section in these release notes prior to starting CommandPoint Clusters, so that the correct "Dialog" font is used.


Windows NT Installation from CD-ROM (optional)

The CommandPoint Clusters software for Windows NT clients is located on the Systems Management Software CD-ROM.

Install the software as follows:

  1. Log in to the PC as any user. You do not have to be logged in as administrator to install CommandPoint Clusters software.

  2. Insert the Systems Management Software CD-ROM into the CD-ROM drive on the PC.

  3. Click on the Start button. From the Settings menu, click on Control Panel.

  4. Double-click on Add/Remove Programs.

  5. Click on the Install button to begin.


    ATTENTION

    During the Windows NT installation of CommandPoint Clusters, you will be prompted to respond to a licensing query. In order to install CommandPoint Clusters, you will need to agree to the terms of the electronic license by clicking on the Yes button, which will allow the installation to proceed. (If you answer No, the installation will stop.)

    Answering Yes allows you to install and use the Windows NT client component of CommandPoint Clusters on one or more workstations that will be used for the purpose of administering IBM NUMA-Q systems. In this regard, the Windows NT client component is an exception to Paragraph 1.2 of the Software License Agreement for CommandPoint Clusters.


  6. On the Run Installation Program dialog box, the CommandPoint Clusters setup program CommandPointClusters.exe should be located. If not, browse to the location of this file. Make sure there is not a disk in the floppy drive. Once the CommandPointClusters.exe file is located, click Open in the Browse dialog box and then click Finish in the Run Installation Program dialog box to begin the installation.

  7. The Choose Destination Location dialog box is displayed. The default installation directory is c:\Program Files\Sequent\Cpclusters. You can change this location if you want. Once the desired location is entered, click Next to continue.

  8. The Select Program Folder dialog box is displayed. The default program folder is Sequent. This is the folder that will be listed when you select Start->Programs. You can change this name if you want. Once the desired name is entered, click Next to continue.

  9. The Start Copying Files dialog box is displayed. This dialog box lists pertinent details about where the files will be installed. Click Next to continue.

  10. The Setup Complete dialog box is displayed after the files have been copied. Click OK to proceed. If it appears, click OK to close the Add/Remove Programs dialog box.

  11. Remove the CD-ROM from the drive.


Windows NT Installation via ftp

To install CommandPoint Clusters software for Windows NT clients via ftp, perform the following steps:


ATTENTION

You must set the ftp file transfer type to binary to support binary image transfer. Do not use ascii file transfer type.


  1. ftp the file /opt/commandpoint/cpclusters/CommandPointClusters2.1.1.exe to a temporary directory on your system.

  2. Double click on the CommandPointClusters2.1.1.exe file.


Security

CommandPoint Clusters uses the following authentication mechanisms:


Set Up a CommandPoint Clusters Configuration File

A user must be explicitly authorized through special privilege groups to run CommandPoint Clusters. A special configuration file, /opt/commandpoint/cpclusters/cpclustersd.config, is installed with CommandPoint Clusters and contains entries for default privilege groups. The administrator must add users to these privilege groups before they can access CommandPoint Clusters.


Levels of Authorized Access

CommandPoint Clusters provides two levels of authorized access:

Administrative Access
This access level provides complete access to administer a cluster with CommandPoint Clusters. To attain this level of administrative access, a user must have a valid login account (with the same user name) on all nodes in the cluster, and must also be a member of either the cpclus or cpgroup privilege groups.
Monitoring (or Read-Only) Access
This access level provides information about the cluster, such as which nodes are up and the status of shared devices. It does not allow the user to take actions or execute commands on any cluster nodes. Users with read-only access cannot execute tasks or commands to perform an action on the cluster. They can, however, view commands run in dry-run mode.

Monitoring (or read-only) access is available only to those users who have a valid account on all nodes of the cluster (with the same login name) and who are also members of the cpclusro privilege group.


Privilege Groups

The /opt/commandpoint/cpclusters/config file is installed on the system when CommandPoint Clusters is installed. It contains the following default entries:

# define access to CommandPoint Clusters
cpclusters.adminGroup=cpgroup,cpclus
cpclusters.readOnlyGroup=cpclusro

The privilege groups specified in the default config file and their associated access levels are:

cpgroup
Members of this group are allowed complete administration and monitoring access to a DYNIX/ptx system or cluster using CommandPoint Clusters, CommandPoint SVM, or CommandPoint Admin.
cpclus
Members of this group are allowed complete administration and monitoring access to a cluster using only the CommandPoint Clusters application. These members do not have access to CommandPoint SVM or CommandPoint Admin.
cpclusro
Members of this group are allowed only monitoring access to a cluster using CommandPoint Clusters. These members do not have access to CommandPoint SVM or CommandPoint Admin.

Users have no access to CommandPoint Clusters or other CommandPoint applications until they are added to a privilege group that is listed in the config file. Use the ptx/ADMIN menu system or CommandPoint Admin to add users to the privilege groups, as you would add users to other DYNIX/ptx groups.

You can create privilege groups other than those specified in the cpclustersd.config file that is installed with CommandPoint Clusters. Once you create the groups, add them to the /opt/commandpoint/cpclusters/cpclustersd.config file on each cluster node.


Start CommandPoint Clusters

Before you can use CommandPoint Clusters to monitor and administer ptx/CLUSTERS, the CommandPoint Clusters server must be running on each node, and then you must start CommandPoint Clusters on one of the cluster nodes running DYNIX/ptx or from Windows NT on a remote PC.


Verify the CommandPoint Clusters Server Is Running on Each Node

Verify that the CommandPoint Clusters server is running on each node by entering the following command (as root) on each node:

$ /opt/commandpoint/cpclusters/cpcSvr.sh query

If the server is running, you will be returned the message:

CommandPoint Clusters server (cpclustersd) currently running

If the server is not running, you will be returned the message:

CommandPoint Clusters server (cpclustersd) not running

To start the server, issue the following command (as root) on each node:

$ /opt/commandpoint/cpclusters/cpcSvr.sh


Start CommandPoint Clusters on DYNIX/ptx


ATTENTION

Before starting CommandPoint Clusters, you must correctly set your DISPLAY environment variable.


To start CommandPoint Clusters on a node running DYNIX/ptx, enter the following command:

$ cpclusters


ATTENTION

It can take a few seconds for the Login dialog box to appear regardless of the platform from which you are running CommandPoint Clusters. Note that if you are running CommandPoint Clusters on a Symmetry platform, it can take even longer, possibly a minute or more.


You will then be presented with the Cluster Login window. See the section below entitled "Getting Started" for information on how to proceed.


Start CommandPoint Clusters on Windows NT

To start CommandPoint Clusters on Windows NT to administer a remote DYNIX/ptx cluster, choose Start->Programs->Sequent-> CommandPoint Clusters from the Windows NT task bar or from wherever you installed the application. Alternatively, you can double-click on the CommandPoint Clusters program icon.


ATTENTION

It can take a few seconds for the Login dialog box to appear regardless of the platform from which you are running CommandPoint Clusters.


You will then be presented with the Cluster Login window. See the section below entitled "Getting Started" for information on how to proceed.


Getting Started

This section explains how to log in to CommandPoint Clusters, describes the forms and dialog boxes of CommandPoint Clusters, and tells how to navigate through the interface.


Log In to CommandPoint Clusters

Once you have started CommandPoint Clusters from DYNIX/ptx or as a Windows NT application, the following Cluster Login window appears:

Enter the complete name of the cluster node to which you are connected at the Host Name prompt.

Enter your login at the Login prompt and password at the Password prompt.

When you have completed the Cluster Login form, click the OK button. CommandPoint Clusters will then attempt to log you in on all the cluster nodes.

If you successfully logged in to all cluster nodes, the CommandPoint Clusters splash screen will appear, followed by the CommandPoint Clusters main screen.

Error conditions that can occur during the login process are:


CommandPoint Clusters Objects

The following is an example of a CommandPoint Clusters main screen.

A list of cluster objects is located on the left of the CommandPoint Clusters main screen. Cluster objects consist of the cluster itself, each cluster node, and ptx/CTC database information configured through ptx/CTC. Each object is designated by an icon. The object that is outlined by a bold rectangle is the current object, and the information to the right of the list of cluster objects pertains to the current object.

By default, when you first log in to CommandPoint Clusters, the selected object is the cluster, and cluster information is displayed. To select a different object, left-click on the object's icon or name. Information about that object will appear to the right of the cluster objects list.

If you have administrative privileges, you can change cluster and node settings, as well as create and modify ptx/CTC entries. To change cluster, node, or ptx/CTC entries, left-click on the desired object, then right-click. A pop-up menu appears. Select the Properties entry from the list by left clicking on it.


The Menu Bar

The menu bar, which includes pull-downs for File, View, Tasks, and Help, lets you select some CommandPoint Clusters tasks. These tasks vary, depending on which cluster object is selected. Also, all tasks may not be available to you if you are not logged in as an administrative user.


File

The File pull-down menu provides the Exit. Choose this item to log out of CommandPoint Clusters.


View

The View pull-down menu presents these four functions when any cluster object is selected:


Tasks

Items that appear in the Tasks pull-down menu vary depending on the cluster object that is selected.


Cluster Tasks

The only cluster task available is Command Broadcast. The task is available when the cluster icon is selected. It lets you issue DYNIX/ptx commands on all nodes simultaneously. CommandPoint Clusters then displays the command results. Command Broadcast also lets you choose to issue a DYNIX/ptx command on one node only. This feature is limited to non-interactive commands only (it will not work with vi for example). It also does not support commands that have more than 30 KB of output.


Node Tasks

The following functions are available from the Tasks pull-down menu when a node icon is selected:


CTC Database Tasks

The following functions are available from the Tasks pull-down menu when the CTC Database object is selected:


Help

The following functions are available from the Help pull-down menu when any CommandPoint Clusters object is selected:


CommandPoint Clusters Icons

The following icons may appear during a CommandPoint Clusters session:

Table 1. CommandPoint Clusters Icons
Icon Description
The cluster is up; the nodes have quorum.
The cluster is down; the nodes do not have quorum.
The node is a healthy cluster member and is at run-level 2 (multiuser mode).
The node is a healthy cluster member and is at run-level 1 (single-user mode); however, CommandPoint Clusters and ptx/CTC are not running.
The node is no longer a member of the cluster.
ptx/CTC is enabled and started on all cluster members.
ptx/CTC is disabled. It may be started or enabled on one node but not on all nodes of the cluster.
Confirm that the command to be issued is correct.
Warning about messages returned from the system after a command has been issued.
An error has occurred or a command has failed.
Information that is returned from a command. This icon also appears when a command is run in dry run mode.
A transition has occurred.
Connection to the node has been lost or never established. This could be due to a failed login, a node entering the cluster after CommandPoint Clusters has already started, or failure to connect to the CPserver on the node.
The specified task completed successfully.
The specified task is executing.
The specified task has failed.
The specified task did not complete.


Cluster Information

When you select the cluster object, information about the cluster is displayed in the right-hand portion of your screen. General cluster data, as well as information about the quorum disk, quorum votes, cluster interfaces, and cluster nodes, are displayed.

The following screen shows how the cluster information is displayed.

In the area near the bottom of the screen called "Cluster Nodes," information about one of the nodes is always highlighted. To view the property sheets for the highlighted node, right-click anywhere on the highlighted entry, and left-click on Properties from the drop-down menu that appears. The node property sheets are described in more detail in the section entitled Node Properties.


ATTENTION

If you are logged in as an administrative user, you will be able to modify node properties; otherwise, you will only be able to view information about node properties.



Cluster Properties

To view or modify cluster properties, right-click on the cluster object, and then left click on Properties.

There are two cluster property sheets: General and Lock Manager Domains.


General Properties

The General Properties dialog box is shown below. It lets you view or modify entries for permanent cluster parameters, active cluster parameters, and the quorum disk.

If you modify entries on the General Properties dialog box, you can click on the OK button to apply the changes and exit the dialog box, or click on the Apply button to apply the changes and not exit the dialog box.

If you are logged in as a non-administrative user, none of the modifications will take effect.


Lock Manager Properties

The Lock Manager Domains form is shown below. It lets you view information about existing Lock Manager domains. If you have logged in with administrative privileges, the modifications you have made will take effect when you click on the OK or Apply button.


Add a Lock Manager Domain

To add a Lock Manager domain from the Lock Manager Domains screen, follow these steps. The domain will be added to all current member nodes in the cluster.

  1. Left-click on the Add button. The Add New Lock Manager Domain screen appears.

  2. Enter the name of the lock domain you want to add, its owner and its group. The owner must have a valid entry in the /etc/passwd file, and the group must have a valid entry in the /etc/group file.

  3. Choose the permissions for the new domain by left-clicking in the appropriate Read, Write, and Execute check boxes.

  4. Choose to instantiate the new domain or wait until the system reboots. By default, the checkbox to instantiate is already checked; to de-select it, left-click on the checkbox.

  5. Click the OK button to apply the changes and exit the dialog box, or click the Apply button to apply the changes and not exit the dialog box.


Delete a Lock Manager Domain

To delete a Lock Manager domain from the Lock Manager Domains screen, follow these steps. The domain will be deleted only from the selected node in the Lock Manager Domains property sheet.

  1. Select the domain you wish to delete by left-clicking on it. The domain you select will become highlighted.

  2. Delete the domain by left-clicking the Delete button.

  3. Click the OK button to apply the changes and exit the dialog box, or click on Apply button to apply the changes and not exit the dialog box.


Modify a Lock Manager Domain

  1. Select the domain you wish to modify by left-clicking on it. The domain you select will become highlighted. The Modify Lock Manager Domain form appears.

  2. Make modifications, such as permissions, owner, or group name, to the domain.

  3. Click the OK button when you are done modifying the form. You will be returned to the Lock Manager Domains screen.

  4. Click on the OK button to apply the changes and exit the dialog box, or click on the Apply button to apply the changes and not exit the dialog box.


Node Information

To display information about a particular node, left-click on the icon for the node in the Cluster Objects list. Information about the node will be displayed on the right-hand side of your screen.

The following sample screen shows the type of information displayed. This information includes node data, CTC node status, and CTC objects on the node.

With the node icon selected, you can also select a ptx/CTC object from the CTC Objects list on the right-hand portion of the screen to perform one of the following options:

The pop-up menu allows you to perform an action on the selected object on the specified node. For example, you can start or stop ptx/CTC objects on the specified node. For more information about these options, click on the online Help button at the bottom of each option's dialog box.

Once you click on the OK button to perform an action on the selected object, a Tasks window will appear. This window provides information on the action you requested. Each task in the Tasks window is preceded by an icon that represents the status of the task. The icon for each task corresponds to the information in each task's Status column. For more information about the status of a task (such as why a task failed), click anywhere on the row for the task in the Tasks window, and then click on Details.


Node Properties

To view or modify node properties, either right-click on the node object or, if the cluster object is selected, right-click anywhere on a highlighted node entry in the Cluster Nodes area and then left-click on Properties.

There are two node property sheets: General and Network Interfaces.


General Properties

The General dialog box displays the ID of the node. If you are logged in as the administrative user, you can change the value of the node's ID through the dialog box.

The node ID, or index, must be an integer between 0 and 7, inclusive. Run this form for each node whose ID you wish to change.

Normally, when changing node IDs in a cluster, you need to reboot only the node whose ID you are changing. However, because of a ptx/CLUSTERS software defect, after changing the ID of one, two, or all nodes, you need to reboot all nodes.


Network Interfaces Properties

The Network Interfaces dialog box displays information about CCIs, including the name and address of each CCI and its state (activated or deactivated).

If you are the administrative user, you can activate or deactivate a CCI. Note, however, that you can only add or remove a CCI interface following the ptx/TCP/IP and ptx/LAN procedures described in the ptx/CLUSTERS Administration Guide.


ptx/CTC (Failover) Information

To display information about the ptx/CTC configuration on cluster nodes, left-click on the resource failover icon or the words CTC Database. General ptx/CTC data, ptx/CTC node status, and information about ptx/CTC objects on all nodes are displayed.

With the CTC Database icon selected, you can also select a ptx/CTC object from the CTC Objects section in the right-hand part of the screen, and then right click to perform one of the following options:

The pop-up menu allows you to perform an action on the selected ptx/CTC object. For example, the Copy option allows you to copy the selected ptx/CTC object. For more information about these options, click on the online Help button at the bottom of each option's dialog box.


CTC Database Properties

The only CTC database property that you can change is the global timeout value. The global timeout value is the amount of time ptx/CTC will wait for an object's start, stop, or verify procedure to complete. The default value for the global timeout period is 3600 seconds (one hour). You can change the global timeout by entering a new value in the global timeout field.


ATTENTION

Although you can use CommandPoint Clusters to change the contents of the ptx/CTC database, you cannot use it to set up the ptx/CTC database on each node. You must use the ptx/ADMIN procedure described in the ptx/CTC Administration Guide to set up the database.



Product Documentation

Product documentation for CommandPoint Clusters, in addition to these release notes, includes the online help available with the product, ptx/CLUSTERS Administration Guide, and the ptx/CTC Administration Guide.


Problem Reports

This section lists the following problem report summaries:

The numbers in parentheses identify the problems in the IBM NUMA-Q problem-tracking system.


Fixed Problems in CommandPoint Clusters V2.1.1

The following problems have been fixed in CommandPoint Clusters.


Open Problems in CommandPoint Clusters V2.1.1

The following problems have been reported against CommandPoint Clusters.

CommandPoint Clusters Icon Not Used in Window of Iconified DYNIX/ptx Application (242348)

When CommandPoint Clusters is run as a DYNIX/ptx application, the windowing system's icon is used as the icon when the application is iconified, instead of the CommandPoint Clusters icon.

Workaround: None.

Java Exception Occurs During Property Sheet Initialization on DYNIX/ptx (241372, 243983)

When CommandPoint Clusters is run as a DYNIX/ptx application, a Java exception occurs and is displayed in the window where CommandPoint Clusters is started.

Workaround: None.

CommandPoint Clusters Online Help Cannot Be Printed From Windows NT Client (239649)

The CommandPoint Clusters online help cannot be printed from a client running as a Windows NT application.

Workaround: None.

Command Broadcast Feature Does Not Properly Display Tabs (239099)

When CommandPoint Clusters is run as a DYNIX/ptx application, the command broadcast feature does not display tabs in the result text (output of the issued command). When run as a Windows NT application, the command broadcast feature displays the '?' character instead of tabs.

Workaround: None.


Instructions for eXceed Users


Configuring eXceed for CommandPoint Clusters

The following procedures allow you to configure eXceed colors and fonts so that they work well with CommandPoint Clusters.


ATTENTION

You only need to apply these procedures once. You may determine if the procedure has already been done (for example for CommandPoint Admin), by doing the following:

  1. Invoke an MS-DOS® command prompt window.

  2. Change directory to the eXceed user directory, normally located in: C:\Program Files\exceed.nt\user.

    C:

    cd \Program Files\exceed.nt\user (or wherever the eXceed user directory is located on your system)

  3. List the files in the directory with the *.bak extension:

    dir *.bak

If 75dpi.bak or 100dpi.bak appears in the list, the procedure has already been done.



Changing Colors


ATTENTION

The following procedure to change eXceed colors is required.


To configure eXceed colors, perform the following:

  1. Exit eXceed if you have an active session.

  2. From the Start menu, select Programs=>Exceed=>Xconfig. The Xconfig window will open.

  3. To set colors, double-click on Video.

  4. Locate the Server Visual field. (We recommend that you write down what the current value for this field is, in case you need to later return to that value.) If the current setting is Auto Select or True Color, change it to PseudoColor and click OK. (Do not close the Xconfig window as you need to make more changes in this window later in this procedure.)

  5. Proceed to the Changing Fonts section.


Changing Fonts

We recommend that you perform the following procedure to configure eXceed fonts so that they work better with CommandPoint Clusters.


ATTENTION

CommandPoint Clusters only works in eXceed's single-window mode. To verify the eXceed mode, select Programs=>Exceed=>Xconfig=>Window Mode from the Start menu, and click on Single (if it is not already selected). Click on OK to close the Window Mode window.



ATTENTION

Applying this procedure may affect font sizes for other applications run to the eXceed display. Note that if the version of eXceed is upgraded or reinstalled, these changes will be lost.



ATTENTION

The following highly recommended procedure configures eXceed fonts so that they work better (meaning proper font sizes) with all CommandPoint products.

While other versions of eXceed probably work properly, we have only tested eXceed versions 5.1.3.0 and 6.0.1.15. If you are running eXceed V6.0.1.0 and want to upgrade to a later version, you may contact Hummingbird® technical support at 1-416-496-2200 (or http://www.hummingbird.com/faq/cntcontact.html).

Please make sure this release note procedure has been applied before reporting CommandPoint Clusters problems to Customer Support.


To configure eXceed fonts, perform the following:


ATTENTION

Changes you make to the eXceed settings do not take effect until you start a new eXceed session.


  1. From the Xconfig dialog, verify if your X server is configured to use 75 or 100dpi fonts as follows:

    1. From the Xconfig window, double-click on Font.

    2. Click on Font Database. In the Font DB File column, search for a 75dpi or a 100dpi entry.

    3. Note which dpi setting and the font path location you have. You will use this information in a later step. (If both 75 and 100dpi are listed, note which font is listed first and use that value in later steps.)

    4. Click on Cancel to close the Font Database dialog.

    5. Click on Close to close the Font Settings dialog. (Do not close the Xconfig window as you need to make more changes in this window later in this procedure.)

  2. Make a backup copy of eXceed's current font configuration file by invoking an MS-DOS command prompt window. Change directory to the eXceed user directory as described next, normally located in:C:\Program Files\exceed.nt\user.

    C:

    cd \Program Files\exceed.nt\user

    If you are using 75dpi (you verified your dpi setting in step 1), enter:

    copy 75dpi.fdb 75dpi.bak

    If you are using 100dpi (you verified your dpi setting in step 1), enter:

    copy 100dpi.fdb 100dpi.bak

  3. Exit the MS-DOS command window.

  4. In the Xconfig window, double-click on Font. (If you have accidently closed the Xconfig window, from the Start menu select Programs=>Exceed=>Exceed=>Xconfig.)

  5. Click on Font Database. Click on the dpi setting (75dpi or 100dpi; if both appear, click on the first one in the list).

  6. Click on Font List for Directory.

  7. If you are using 75dpi, scroll until you locate courr12, then click to select it. If you are using 100dpi, scroll until you locate courr10, then click to select it.


    ATTENTION

    The aliases in this procedure are available on the following web page. You can copy and paste the aliases from: http://www.sequent.com/docs/commandpoint_exceed.html


    1. Click on Make Alias.

    2. In the Logical Name field, enter:

      --courier-medium-r-normal--*-120-*-*-m-*-iso8859-1
      


      ATTENTION

      The double dashes in the font definition may look like a long single dash on your screen.


    3. Click on OK.

  8. If you are using 75dpi, scroll in the Font List window until you locate helvr10, then click to select it. If you are using 100dpi, scroll until you locate helvr08, then click to select it.

    1. Click on Make Alias.

    2. In the Logical Name field, enter:

      -b&h-lucida sans-medium-r-normal-sans-*-100-*-*-p-*-iso8859-1
      


      ATTENTION

      Enter the alias exactly as it appears; there must be a space between lucida and sans.


    3. Click on OK.

    4. Click on Make Alias.

    5. In the Logical Name field, enter:

      -linotype-helvetica-medium-r-normal-sans-*-110-*-*-p-*-iso8859-1
      

    6. Click on OK.

  9. If you are using 75dpi, scroll in the Font List window until you locate helvr12, then click to select it. If you are using 100dpi, scroll until you locate helvr10, then click to select it.

    1. Click on Make Alias.

    2. In the Logical Name field, enter:

      -b&h-lucida sans-medium-r-normal-sans-*-120-*-*-p-*-iso8859-1
      


      ATTENTION

      Enter the alias exactly as it appears; there must be a space between lucida and sans.


    3. Click on OK.

    4. Click on Make Alias.

    5. In the Logical Name field, enter:

      -linotype-helvetica-medium-r-normal-sans-*-120-*-*-p-*-iso8859-1
      

    6. Click on OK.

  10. If you are using 75dpi, scroll in the Font List window until you locate helvb12, then click to select it. If you are using 100dpi, scroll until you locate helvb10, then click to select it.

    1. Click on Make Alias.

    2. In the Logical Name field, enter:

      -b&h-lucida sans-bold-r-normal-sans-*-120-*-*-p-*-iso8859-1
      


      ATTENTION

      Enter the alias exactly as it appears; there must be a space between lucida and sans.


    3. Click on OK.

    4. Click on Make Alias.

    5. In the Logical Name field, enter:

      -linotype-helvetica-bold-r-normal-sans-*-120-*-*-p-*-iso8859-1
      

    6. Click on OK.

  11. If you are using 75dpi, scroll in the Font List window until you locate helvbo12, then click to select it. If you are using 100dpi, scroll until you locate helvbo10, then click to select it.

    1. Click on Make Alias.

    2. In the Logical Name field, enter:

      -linotype-helvetica-bold-o-normal-sans-*-120-*-*-p-*-iso8859-1
      

    3. Click on OK.

  12. If you are using 75dpi, scroll in the Font List window until you locate helvb18, then click to select it. If you are using 100dpi, scroll until you locate helvb14, then click to select it.

    1. Click on Make Alias.

    2. In the Logical Name field, enter:

      -b&h-lucida sans-bold-r-normal-sans-*-160-*-*-p-*-iso8859-1
      


      ATTENTION

      Enter the alias exactly as it appears; there must be a space between lucida and sans.


    3. Click on OK.

  13. If you are using 75dpi, scroll in the Font List window until you locate helvb24, then click to select it. If you are using 100dpi, scroll until you locate helvb18, then click to select it.

    1. Click on Make Alias.

    2. In the Logical Name field, enter:

      -b&h-lucida sans-bold-r-normal-sans-*-250-*-*-p-*-iso8859-1
      


      ATTENTION

      Enter the alias exactly as it appears; there must be a space between lucida and sans.


    3. Click on OK.

  14. Click on OK in the Font List dialog.

  15. Click on OK in the Font Database dialog.

  16. Click on Close in the Font Setting dialog.

  17. Close the Xconfig window.

  18. Start eXceed and proceed to the Start CommandPoint Clusters section of these release notes.


Returning to the Default eXceed Configuration

The following procedure describes how to reconfigure eXceed for its default values, in case those values are needed by another application you are running via eXceed. To configure eXceed for its default settings, perform the following:


ATTENTION

Changes you make to the eXceed settings do not take effect until you start a new eXceed session.


  1. Exit eXceed if you have an active session.

  2. To restore the backup copy of the font configuration, invoke an MS-DOS command prompt window. Change directory to the eXceed user directory as described next, normally located in C:\Program Files\exceed.nt\user.

    C:

    cd \Program Files\exceed.nt\user

    If you are using 75dpi (you verified your dpi setting in step 1), enter:

    copy 75dpi.bak 75dpi.fdb

    If you are using 100dpi (you verified your dpi setting in step 1), enter:

    copy 100dpi.bak 100dpi.fdb

  3. Exit the MS-DOS command window.

  4. From the Start menu, select Programs=>Exceed=>Xconfig.

  5. Double-click on Video.

  6. In the Server Visual field, select the setting you saved in step 4 in the Changing Colors section of these release notes.

  7. Click OK to close the Video dialog.

  8. Close the Xconfig window.

  9. Restart eXceed.