These release notes support CommandPointTM Clusters V2.1.1. They contain information on product compatibility, release-specific installation instructions, an overview of the product, how to get started with the product, and known problems.
Read this document before you install or run this release of CommandPoint Clusters. For complete information on ptx®/CLUSTERS and ptx/CTC, consult the ptx/CLUSTERS Administration Guide and the ptx/CTC Administration Guide, as well as the online help for CommandPoint Clusters.
This release of CommandPoint Clusters includes the following additions and modifications.
With this release of CommandPoint Clusters, access to the software is controlled by the group or groups a user belongs to. There are two types of user groups: administrative groups, and non-administrative/read-only groups. Users who are members of administrative groups have full administrative privileges; users who are members of non-administrative and read-only groups have access to all administrative menus and tasks, but no commands will be executed. By restricting administrative users to administrative-only groups, it is no longer necessary to pass the root login across the network as it was in the previous version of CommandPoint Clusters, leading to potential security problems.
CommandPoint Clusters groups are listed and defined in the /opt/commandpoint/cpclusters/cpclustersd.config file. See "Set Up a CommandPoint Clusters Configuration File" for more information about the CommandPoint Clusters configuration file and groups.
Installation and configuration of Netscape FastTrack ServerTM is no longer required by CommandPoint Clusters. The CommandPoint Clusters configuration file and privilege groups are used instead of Netscape FastTrack Server. If you previously configured Netscape FastTrack Server for use with CommandPoint Clusters, you do not need to deinstall it to use this release of CommandPoint Clusters.
With this release of CommandPoint Clusters, non-administrative users have complete access to all menu items and tasks. However, none of the tasks are actually executed on any of the cluster nodes. In the previous version of CommandPoint Clusters, non-administrative users (called non-root users) had access to only certain forms and no tasks. Non-administrative users have the same access as administrative users who are in dry-run mode.
You can select a ptx/CTC-related task, such as enable or disable CTC, by selecting a node and then right-clicking. Once you click OK on the dialog box for the task, a Tasks Window will appear. The window contains an entry for every task that was performed during the current CommandPoint Clusters session. Highlighting an entry in the Tasks Window lets you view details about the task, such as the command that was run to perform the task.
When an administrative user selects dry run mode, he essentially becomes a non-administrative user. He will have access to all menu items and tasks but be unable to execute them. (There is no dry run mode option for the non-administrative user.)
Minor changes have been made to the File and View pull-down menus:
CommandPoint Clusters is a standalone DYNIX/ptx® or Windows NT® application for administering ptx/CLUSTERS and ptx/CTC. It is an optional application that provides the same level of administrative capabilities as the ptx/ADMIN® menus and forms for ptx/CLUSTERS and ptx/CTC. CommandPoint Clusters can be used instead of, or in conjunction with, ptx/ADMIN and the command-line utilities for administering a cluster and managing failover.
A cluster must be installed and running before you can begin to use CommandPoint Clusters; however, you can create new ptx/CTC failover rules for the cluster (or modify existing ptx/CTC rules) using CommandPoint Clusters.
CommandPoint Clusters provides all the functionality of the ptx/CLUSTERS and ptx/CTC command-line utilities and ptx/ADMIN menu forms. It is a Java-based graphical user interface that is easy to use and lets you administer all nodes from one interface. It also provides the following functionality that is not available in the standard ptx/CLUSTERS or ptx/CTC administration utilities:
Real-time monitoring. Every 30 seconds, CommandPoint Clusters checks the cluster and the ptx/CTC databases for any changes, and updates its screens accordingly. You can also force CommandPoint Clusters to check for changes and update its screens before the 30-second interval.
Command broadcasting across cluster nodes. Through CommandPoint Clusters, you can issue DYNIX/ptx commands on all nodes simultaneously; CommandPoint Clusters then displays the command results. You can also choose to issue a DYNIX/ptx command on any subset or combination of nodes.
Viewing of EES events. CommandPoint Clusters lets you view ptx/EES (error event subsystem) output any time during or throughout a CommandPoint Clusters session. All serious and critical events from all nodes are interleaved based on timestamp. ptx/EES must be installed for this feature to be activated.
Viewing of "behind the scenes" commands. CommandPoint Clusters can display the behind-the-scenes commands it uses when you perform an operation.
Issuing commands in "dry-run mode." "Dry-run mode" generates the commands to perform the specified operations, but does not run the commands. Dry-run mode lets you review command syntax, verify the operation you wish to perform is correct, or generate syntax for later use in scripts. A user logged in with administrative privileges who enables dry-run mode essentially becomes a non-administrative user. (A user logged in with non-administrative privileges cannot access the dry-run mode option, because non-administrative access is equivalent to dry run mode.)
Command viewing and dry-run mode together provide a learning environment for new or inexperienced system administrators.
The following software products are required, unless specified otherwise, on the IBM NUMA-Q host that will be running the CommandPoint Clusters server or client software:
DYNIX/ptx V4.4.4 or later (required)
ptx/CLUSTERS V2.1.1 or later (required)
ptx/SVM V2.1.1 or later (required)
ptx/LAN V4.5.3 or later (required)
ptx/TCP/IP V4.5.1 or later (required)
ptx/CTC V1.1.2 or later (required)
ptx/WINDOWS V4.4.1 (required only if you will be running CommandPoint Clusters as a DYNIX/ptx application)
ptx/JSE (Server Environment for the JavaTM Platform) V1.1.1 or later (required only if you will be running CommandPoint Clusters as a DYNIX/ptx application)
ptx/NFS® V4.6.2 (optional)
ptx/EES V1.0.1 (required if you want to utilize the Event Viewing capability of CommandPoint Clusters)
If you plan to use Windows NT to administer a cluster from a PC, then the following requirements apply to the PC that you will be using. These requirements are in addition to the DYNIX/ptx requirements listed in the previous section, except for ptx/WINDOWS, ptx/JSE, and ptx/EES, which are needed on DYNIX/ptx platforms only.
CommandPoint Clusters is compatible with the following software products running on a PC:
Windows NT 4.0
eXceed V5.1.3.0 or V6.0.1.15 (This is required if you plan to launch CommandPoint Clusters from CommandPoint Admin or run CommandPoint Clusters on NT as a DYNIX/ptx application; see the section entitled "Launching CommandPoint Clusters or CommandPoint SVM" in the CommandPoint Admin Overview and Release Notes for more information.)
ATTENTION You will need about 1.4 MB free space on your PC to install CommandPoint Clusters, plus an additional 2.6 MB if the Java Runtime Environment (JRE) is not already installed. If CommandPoint SVM or CommandPoint Clusters is already installed on your PC, then the JRE is already installed. You will also need about 7 MB for the CommandPointClusters2.1.1.exe file.
ATTENTION Do not use the VCS console on a NUMA-Q system to run CommandPoint Clusters.
If you plan to use the Windows NT-compatible client to administer your IBM NUMA-Q system, then the following minimum requirements apply to the PC that you will be using. (These requirements are in addition to the DYNIX/ptx requirements listed in the previous section.)
ATTENTION The minimum configuration will allow you to run all three CommandPoint products (CommandPoint Admin, CommandPoint Clusters and Command Point SVM) simultaneously. However, the performance will be better if you use the recommended hardware configuration.
Whichever configuration you choose to use, the performance of the system will be impacted by the number and size of the applications that you run simultaneously.
The minimum hardware requirements are:
The recommended hardware requirements are:
266MHz (Pentium) (or faster) CPU
64 MB Memory
1280x1024 Video
21" Display
CD-ROM drive
Network Interface Card
The CommandPoint Clusters software must be installed on each cluster node, and can also be installed on a PC running Windows NT.
The CommandPoint Clusters software for DYNIX/ptx is located on the Systems Management Software CD-ROM. Other required software for use with CommandPoint Clusters (including DYNIX/ptx, ptx/CLUSTERS, ptx/CTC, ptx/JSE, and ptx/WINDOWS) is located on the DYNIX/ptx Operating System and Layered Products Software CD-ROM. You can install all of these software products through the installation process described in the DYNIX/ptx and Layered Products Software Installation Release Notes. The product to select for installation is: cpclusters.
As shipped, CommandPoint Clusters is pre-configured to allow members of group cpclus and group cpgroup to run CommandPoint Clusters and the other CommandPoint products, respectively.
As root, you need to create the group cpclus (and cpgroup if you are going to run other CommandPoint products and cpgroup does not already exist), and add yourself to the group(s).
If you are using eXceed, refer to the "Instructions for eXceed Users" section in these release notes prior to starting CommandPoint Clusters, so that the correct "Dialog" font is used.
The CommandPoint Clusters software for Windows NT clients is located on the Systems Management Software CD-ROM.
Install the software as follows:
Log in to the PC as any user. You do not have to be logged in as administrator to install CommandPoint Clusters software.
Insert the Systems Management Software CD-ROM into the CD-ROM drive on the PC.
Click on the Start button. From the Settings menu, click on Control Panel.
Double-click on Add/Remove Programs.
Click on the Install button to begin.
ATTENTION During the Windows NT installation of CommandPoint Clusters, you will be prompted to respond to a licensing query. In order to install CommandPoint Clusters, you will need to agree to the terms of the electronic license by clicking on the Yes button, which will allow the installation to proceed. (If you answer No, the installation will stop.)
Answering Yes allows you to install and use the Windows NT client component of CommandPoint Clusters on one or more workstations that will be used for the purpose of administering IBM NUMA-Q systems. In this regard, the Windows NT client component is an exception to Paragraph 1.2 of the Software License Agreement for CommandPoint Clusters.
On the Run Installation Program dialog box, the CommandPoint Clusters setup program CommandPointClusters.exe should be located. If not, browse to the location of this file. Make sure there is not a disk in the floppy drive. Once the CommandPointClusters.exe file is located, click Open in the Browse dialog box and then click Finish in the Run Installation Program dialog box to begin the installation.
The Choose Destination Location dialog box is displayed. The default installation directory is c:\Program Files\Sequent\Cpclusters. You can change this location if you want. Once the desired location is entered, click Next to continue.
The Select Program Folder dialog box is displayed. The default program folder is Sequent. This is the folder that will be listed when you select Start->Programs. You can change this name if you want. Once the desired name is entered, click Next to continue.
The Start Copying Files dialog box is displayed. This dialog box lists pertinent details about where the files will be installed. Click Next to continue.
The Setup Complete dialog box is displayed after the files have been copied. Click OK to proceed. If it appears, click OK to close the Add/Remove Programs dialog box.
Remove the CD-ROM from the drive.
To install CommandPoint Clusters software for Windows NT clients via ftp, perform the following steps:
ATTENTION You must set the ftp file transfer type to binary to support binary image transfer. Do not use ascii file transfer type.
ftp the file /opt/commandpoint/cpclusters/CommandPointClusters2.1.1.exe to a temporary directory on your system.
Double click on the CommandPointClusters2.1.1.exe file.
CommandPoint Clusters uses the following authentication mechanisms:
All users must have an account on the DYNIX/ptx machine.
The user name and password are authenticated on the sever prior to allowing access on the client. (If a valid user name is entered with an invalid password, CommandPoint Clusters allows you to keep trying to enter the correct password indefinitely.)
Both the UNIX crypt algorithm and the DES encryption algorithm are used.
During authentication, the clear-text password is not sent over the network.
Direct root login is not allowed in order to preserve traceability.
A user must be explicitly authorized through special privilege groups to run CommandPoint Clusters. A special configuration file, /opt/commandpoint/cpclusters/cpclustersd.config, is installed with CommandPoint Clusters and contains entries for default privilege groups. The administrator must add users to these privilege groups before they can access CommandPoint Clusters.
CommandPoint Clusters provides two levels of authorized access:
Monitoring (or read-only) access is available only to those users who have a valid account on all nodes of the cluster (with the same login name) and who are also members of the cpclusro privilege group.
The /opt/commandpoint/cpclusters/config file is installed on the system when CommandPoint Clusters is installed. It contains the following default entries:
# define access to CommandPoint Clusters cpclusters.adminGroup=cpgroup,cpclus cpclusters.readOnlyGroup=cpclusro
The privilege groups specified in the default config file and their associated access levels are:
Users have no access to CommandPoint Clusters or other CommandPoint applications until they are added to a privilege group that is listed in the config file. Use the ptx/ADMIN menu system or CommandPoint Admin to add users to the privilege groups, as you would add users to other DYNIX/ptx groups.
You can create privilege groups other than those specified in the cpclustersd.config file that is installed with CommandPoint Clusters. Once you create the groups, add them to the /opt/commandpoint/cpclusters/cpclustersd.config file on each cluster node.
Before you can use CommandPoint Clusters to monitor and administer ptx/CLUSTERS, the CommandPoint Clusters server must be running on each node, and then you must start CommandPoint Clusters on one of the cluster nodes running DYNIX/ptx or from Windows NT on a remote PC.
Verify that the CommandPoint Clusters server is running on each node by entering the following command (as root) on each node:
$ /opt/commandpoint/cpclusters/cpcSvr.sh query
If the server is running, you will be returned the message:
CommandPoint Clusters server (cpclustersd) currently running
If the server is not running, you will be returned the message:
CommandPoint Clusters server (cpclustersd) not running
To start the server, issue the following command (as root) on each node:
$ /opt/commandpoint/cpclusters/cpcSvr.sh
ATTENTION Before starting CommandPoint Clusters, you must correctly set your DISPLAY environment variable.
To start CommandPoint Clusters on a node running DYNIX/ptx, enter the following command:
$ cpclusters
ATTENTION It can take a few seconds for the Login dialog box to appear regardless of the platform from which you are running CommandPoint Clusters. Note that if you are running CommandPoint Clusters on a Symmetry platform, it can take even longer, possibly a minute or more.
You will then be presented with the Cluster Login window. See the section below entitled "Getting Started" for information on how to proceed.
To start CommandPoint Clusters on Windows NT to administer a remote DYNIX/ptx cluster, choose Start->Programs->Sequent-> CommandPoint Clusters from the Windows NT task bar or from wherever you installed the application. Alternatively, you can double-click on the CommandPoint Clusters program icon.
ATTENTION It can take a few seconds for the Login dialog box to appear regardless of the platform from which you are running CommandPoint Clusters.
You will then be presented with the Cluster Login window. See the section below entitled "Getting Started" for information on how to proceed.
This section explains how to log in to CommandPoint Clusters, describes the forms and dialog boxes of CommandPoint Clusters, and tells how to navigate through the interface.
Once you have started CommandPoint Clusters from DYNIX/ptx or as a Windows NT application, the following Cluster Login window appears:
Enter the complete name of the cluster node to which you are connected at the Host Name prompt.
Enter your login at the Login prompt and password at the Password prompt.
When you have completed the Cluster Login form, click the OK button. CommandPoint Clusters will then attempt to log you in on all the cluster nodes.
If you successfully logged in to all cluster nodes, the CommandPoint Clusters splash screen will appear, followed by the CommandPoint Clusters main screen.
Error conditions that can occur during the login process are:
Connection Lost. Connection has been lost to all cluster nodes and CommandPoint Clusters is automatically terminated when you click OK. Possible causes of this error are:
Connection Error. Connection to one or more cluster nodes could not be made. The CommandPoint Clusters client will come up but will display the "no connection" icon on the node(s). Possible causes of this error are:
The CommandPoint Clusters server was not started. See "Start CommandPoint Clusters" for information on starting the server.
The node listed in the error message was not at run-level 2.
The network may be having problems.
Authentication Error. The login authentication process failed on one or more nodes. CommandPoint Clusters will be automatically terminated when you click OK. Possible causes of this error are:
The node joined the cluster after the client was started. The user does not have proper credentials (login and password) on this node.
The node was in the cluster and was rebooted (or somehow lost connection to the CommandPoint Clusters client). Upon rejoining the cluster or reconnecting to the CommandPoint Clusters client, the login authentication failed. The user account on the system may have changed.
ATTENTION The user must have the same login and password on all nodes in the cluster in order to run CommandPoint Clusters.
The following is an example of a CommandPoint Clusters main screen.
A list of cluster objects is located on the left of the CommandPoint Clusters main screen. Cluster objects consist of the cluster itself, each cluster node, and ptx/CTC database information configured through ptx/CTC. Each object is designated by an icon. The object that is outlined by a bold rectangle is the current object, and the information to the right of the list of cluster objects pertains to the current object.
By default, when you first log in to CommandPoint Clusters, the selected object is the cluster, and cluster information is displayed. To select a different object, left-click on the object's icon or name. Information about that object will appear to the right of the cluster objects list.
If you have administrative privileges, you can change cluster and node settings, as well as create and modify ptx/CTC entries. To change cluster, node, or ptx/CTC entries, left-click on the desired object, then right-click. A pop-up menu appears. Select the Properties entry from the list by left clicking on it.
The menu bar, which includes pull-downs for File, View, Tasks, and Help, lets you select some CommandPoint Clusters tasks. These tasks vary, depending on which cluster object is selected. Also, all tasks may not be available to you if you are not logged in as an administrative user.
The File pull-down menu provides the Exit. Choose this item to log out of CommandPoint Clusters.
The View pull-down menu presents these four functions when any cluster object is selected:
Task Window. This option brings up the Tasks Window, which lists all tasks and their status for the current CommandPoint Clusters session.
Display Events. This function lets you view ptx/EES (error event subsystem) output any time during a CommandPoint Clusters session. The EES viewer reports all serious and critical events from all nodes. The events from the nodes are interleaved based on timestamp. The events that are displayed are those that occurred since the window was opened; no prior events are displayed. ptx/EES must be installed for this feature to be activated.
Refresh Data. This option forces CommandPoint Clusters to immediately check the cluster and the ptx/CTC databases for changes and to update its screens before the normal 30-second interval for performing these tasks.
Dry Run Mode. This option tells CommandPoint Clusters to generate the commands to perform specified operations, but not run the commands. From an administrative user's point of view, it is the same as running CommandPoint Clusters with non-administrative privileges. Used in conjunction with the Commands option, Dry Run Mode lets you review command syntax, verify that the operation you wish to perform is correct, or generate syntax for later use in scripts.
When dry-run mode is enabled or a user invokes CommandPoint Clusters with non-administrative privileges, each dialog will include "Dry Run mode" in the status bar on the bottom of the Main Window. When commands are run, the Tasks window will show them with the "i" icon instead of the "check" icon, representing information only.
Items that appear in the Tasks pull-down menu vary depending on the cluster object that is selected.
The only cluster task available is Command Broadcast. The task is available when the cluster icon is selected. It lets you issue DYNIX/ptx commands on all nodes simultaneously. CommandPoint Clusters then displays the command results. Command Broadcast also lets you choose to issue a DYNIX/ptx command on one node only. This feature is limited to non-interactive commands only (it will not work with vi for example). It also does not support commands that have more than 30 KB of output.
The following functions are available from the Tasks pull-down menu when a node icon is selected:
Stop All CTC Objects. Stops all ptx/CTC objects on the selected node.
Update All CTC Objects. Checks the status of the selected ptx/CTC object on the selected node and then updates the status information for that object in the ptx/CTC database.
Enable CTC. Enables ptx/CTC on the selected node.
Disable CTC. Disables ptx/CTC on a node so that you can prevent ptx/CTC from automatically taking any actions on that node as a result of an availability transition.
Start CTC. Turns ptx/CTC on. Also starts the ctcd daemon.
Stop CTC. Turns ptx/CTC off.
Load CTC Database. Initializes the database and builds it from the specified file.
Save CTC Database. Saves the ptx/CTC database to a file that can be used for editing the database or as a backup copy.
Command Broadcast. Lets you issue DYNIX/ptx on all nodes simultaneously. CommandPoint Clusters then displays the command results. Also lets you choose to issue a DYNIX/ptx command on one node only. This feature works only with non-interactive commands.
The following functions are available from the Tasks pull-down menu when the CTC Database object is selected:
New CTC Object. Lets you create a new CTC object. See the ptx/CTC Administration Guide for details.
Command Broadcast. Lets you issue DYNIX/ptx on all nodes simultaneously. CommandPoint Clusters then displays the command results. Also lets you choose to issue a DYNIX/ptx command on one node only. This feature works only with non-interactive commands.
The following functions are available from the Help pull-down menu when any CommandPoint Clusters object is selected:
Contents. Provides a listing of the help files for CommandPoint Clusters.
Getting Started. Describes the components of CommandPoint Clusters and how to use the product.
Icon Legend. Lists and defines the icons used in CommandPoint Clusters.
Index. Lists the index entries of the help files for CommandPoint Clusters.
Glossary. Lists and defines the ptx/CLUSTERS and ptx/CTC terms used throughout CommandPoint Clusters.
About CommandPoint Clusters. Provides copyright, trademark, version number, and product release date.
The following icons may appear during a CommandPoint Clusters session:
When you select the cluster object, information about the cluster is displayed in the right-hand portion of your screen. General cluster data, as well as information about the quorum disk, quorum votes, cluster interfaces, and cluster nodes, are displayed.
The following screen shows how the cluster information is displayed.
In the area near the bottom of the screen called "Cluster Nodes," information about one of the nodes is always highlighted. To view the property sheets for the highlighted node, right-click anywhere on the highlighted entry, and left-click on Properties from the drop-down menu that appears. The node property sheets are described in more detail in the section entitled Node Properties.
ATTENTION If you are logged in as an administrative user, you will be able to modify node properties; otherwise, you will only be able to view information about node properties.
To view or modify cluster properties, right-click on the cluster object, and then left click on Properties.
There are two cluster property sheets: General and Lock Manager Domains.
The General Properties dialog box is shown below. It lets you view or modify entries for permanent cluster parameters, active cluster parameters, and the quorum disk.
If you modify entries on the General Properties dialog box, you can click on the OK button to apply the changes and exit the dialog box, or click on the Apply button to apply the changes and not exit the dialog box.
If you are logged in as a non-administrative user, none of the modifications will take effect.
The Lock Manager Domains form is shown below. It lets you view information about existing Lock Manager domains. If you have logged in with administrative privileges, the modifications you have made will take effect when you click on the OK or Apply button.
To add a Lock Manager domain from the Lock Manager Domains screen, follow these steps. The domain will be added to all current member nodes in the cluster.
Left-click on the Add button. The Add New Lock Manager Domain screen appears.
Enter the name of the lock domain you want to add, its owner and its group. The owner must have a valid entry in the /etc/passwd file, and the group must have a valid entry in the /etc/group file.
Choose the permissions for the new domain by left-clicking in the appropriate Read, Write, and Execute check boxes.
Choose to instantiate the new domain or wait until the system reboots. By default, the checkbox to instantiate is already checked; to de-select it, left-click on the checkbox.
Click the OK button to apply the changes and exit the dialog box, or click the Apply button to apply the changes and not exit the dialog box.
To delete a Lock Manager domain from the Lock Manager Domains screen, follow these steps. The domain will be deleted only from the selected node in the Lock Manager Domains property sheet.
Select the domain you wish to delete by left-clicking on it. The domain you select will become highlighted.
Delete the domain by left-clicking the Delete button.
Click the OK button to apply the changes and exit the dialog box, or click on Apply button to apply the changes and not exit the dialog box.
Select the domain you wish to modify by left-clicking on it. The domain you select will become highlighted. The Modify Lock Manager Domain form appears.
Make modifications, such as permissions, owner, or group name, to the domain.
Click the OK button when you are done modifying the form. You will be returned to the Lock Manager Domains screen.
Click on the OK button to apply the changes and exit the dialog box, or click on the Apply button to apply the changes and not exit the dialog box.
To display information about a particular node, left-click on the icon for the node in the Cluster Objects list. Information about the node will be displayed on the right-hand side of your screen.
The following sample screen shows the type of information displayed. This information includes node data, CTC node status, and CTC objects on the node.
With the node icon selected, you can also select a ptx/CTC object from the CTC Objects list on the right-hand portion of the screen to perform one of the following options:
The pop-up menu allows you to perform an action on the selected object on the specified node. For example, you can start or stop ptx/CTC objects on the specified node. For more information about these options, click on the online Help button at the bottom of each option's dialog box.
Once you click on the OK button to perform an action on the selected object, a Tasks window will appear. This window provides information on the action you requested. Each task in the Tasks window is preceded by an icon that represents the status of the task. The icon for each task corresponds to the information in each task's Status column. For more information about the status of a task (such as why a task failed), click anywhere on the row for the task in the Tasks window, and then click on Details.
To view or modify node properties, either right-click on the node object or, if the cluster object is selected, right-click anywhere on a highlighted node entry in the Cluster Nodes area and then left-click on Properties.
There are two node property sheets: General and Network Interfaces.
The General dialog box displays the ID of the node. If you are logged in as the administrative user, you can change the value of the node's ID through the dialog box.
The node ID, or index, must be an integer between 0 and 7, inclusive. Run this form for each node whose ID you wish to change.
Normally, when changing node IDs in a cluster, you need to reboot only the node whose ID you are changing. However, because of a ptx/CLUSTERS software defect, after changing the ID of one, two, or all nodes, you need to reboot all nodes.
The Network Interfaces dialog box displays information about CCIs, including the name and address of each CCI and its state (activated or deactivated).
If you are the administrative user, you can activate or deactivate a CCI. Note, however, that you can only add or remove a CCI interface following the ptx/TCP/IP and ptx/LAN procedures described in the ptx/CLUSTERS Administration Guide.
To display information about the ptx/CTC configuration on cluster nodes, left-click on the resource failover icon or the words CTC Database. General ptx/CTC data, ptx/CTC node status, and information about ptx/CTC objects on all nodes are displayed.
With the CTC Database icon selected, you can also select a ptx/CTC object from the CTC Objects section in the right-hand part of the screen, and then right click to perform one of the following options:
The pop-up menu allows you to perform an action on the selected ptx/CTC object. For example, the Copy option allows you to copy the selected ptx/CTC object. For more information about these options, click on the online Help button at the bottom of each option's dialog box.
The only CTC database property that you can change is the global timeout value. The global timeout value is the amount of time ptx/CTC will wait for an object's start, stop, or verify procedure to complete. The default value for the global timeout period is 3600 seconds (one hour). You can change the global timeout by entering a new value in the global timeout field.
ATTENTION Although you can use CommandPoint Clusters to change the contents of the ptx/CTC database, you cannot use it to set up the ptx/CTC database on each node. You must use the ptx/ADMIN procedure described in the ptx/CTC Administration Guide to set up the database.
Product documentation for CommandPoint Clusters, in addition to these release notes, includes the online help available with the product, ptx/CLUSTERS Administration Guide, and the ptx/CTC Administration Guide.
This section lists the following problem report summaries:
The numbers in parentheses identify the problems in the IBM NUMA-Q problem-tracking system.
The following problems have been fixed in CommandPoint Clusters.
(244281)During a Windows NT installation of CommandPoint Clusters, the software was always installed in the Sequent Folder, even if a different folder was selected to install into and it appeared correct in the final summary of selections.
(244159) The file that appeared when Help=>index was selected was the wrong file when CommandPoint Clusters was run as a DYNIX/ptx application.
(243901) The online help for the "Icon Legend" category was missing the "CTC UP," "CTC DOWN," and "Transition" icons.
(242664) When CommandPoint Clusters was run as a Windows NT application, the JRE crashed after CommandPoint Clusters ran for several hours.
(239330) When CommandPoint Clusters was run as a DYNIX/ptx application, the splash screen did not cover the main window and the login dialog was also displaced.
The following problems have been reported against CommandPoint Clusters.
When CommandPoint Clusters is run as a DYNIX/ptx application, the windowing system's icon is used as the icon when the application is iconified, instead of the CommandPoint Clusters icon.
Workaround: None.
When CommandPoint Clusters is run as a DYNIX/ptx application, a Java exception occurs and is displayed in the window where CommandPoint Clusters is started.
Workaround: None.
The CommandPoint Clusters online help cannot be printed from a client running as a Windows NT application.
Workaround: None.
When CommandPoint Clusters is run as a DYNIX/ptx application, the command broadcast feature does not display tabs in the result text (output of the issued command). When run as a Windows NT application, the command broadcast feature displays the '?' character instead of tabs.
Workaround: None.
The following procedures allow you to configure eXceed colors and fonts so that they work well with CommandPoint Clusters.
ATTENTION You only need to apply these procedures once. You may determine if the procedure has already been done (for example for CommandPoint Admin), by doing the following:
Invoke an MS-DOS® command prompt window.
Change directory to the eXceed user directory, normally located in: C:\Program Files\exceed.nt\user.
C:
cd \Program Files\exceed.nt\user (or wherever the eXceed user directory is located on your system)
List the files in the directory with the *.bak extension:
dir *.bak
If 75dpi.bak or 100dpi.bak appears in the list, the procedure has already been done.
ATTENTION The following procedure to change eXceed colors is required.
To configure eXceed colors, perform the following:
Exit eXceed if you have an active session.
From the Start menu, select Programs=>Exceed=>Xconfig. The Xconfig window will open.
To set colors, double-click on Video.
Locate the Server Visual field. (We recommend that you write down what the current value for this field is, in case you need to later return to that value.) If the current setting is Auto Select or True Color, change it to PseudoColor and click OK. (Do not close the Xconfig window as you need to make more changes in this window later in this procedure.)
Proceed to the Changing Fonts section.
We recommend that you perform the following procedure to configure eXceed fonts so that they work better with CommandPoint Clusters.
ATTENTION CommandPoint Clusters only works in eXceed's single-window mode. To verify the eXceed mode, select Programs=>Exceed=>Xconfig=>Window Mode from the Start menu, and click on Single (if it is not already selected). Click on OK to close the Window Mode window.
ATTENTION Applying this procedure may affect font sizes for other applications run to the eXceed display. Note that if the version of eXceed is upgraded or reinstalled, these changes will be lost.
ATTENTION The following highly recommended procedure configures eXceed fonts so that they work better (meaning proper font sizes) with all CommandPoint products.
While other versions of eXceed probably work properly, we have only tested eXceed versions 5.1.3.0 and 6.0.1.15. If you are running eXceed V6.0.1.0 and want to upgrade to a later version, you may contact Hummingbird® technical support at 1-416-496-2200 (or http://www.hummingbird.com/faq/cntcontact.html).
Please make sure this release note procedure has been applied before reporting CommandPoint Clusters problems to Customer Support.
To configure eXceed fonts, perform the following:
ATTENTION Changes you make to the eXceed settings do not take effect until you start a new eXceed session.
From the Xconfig dialog, verify if your X server is configured to use 75 or 100dpi fonts as follows:
From the Xconfig window, double-click on Font.
Click on Font Database. In the Font DB File column, search for a 75dpi or a 100dpi entry.
Note which dpi setting and the font path location you have. You will use this information in a later step. (If both 75 and 100dpi are listed, note which font is listed first and use that value in later steps.)
Click on Cancel to close the Font Database dialog.
Click on Close to close the Font Settings dialog. (Do not close the Xconfig window as you need to make more changes in this window later in this procedure.)
Make a backup copy of eXceed's current font configuration file by invoking an MS-DOS command prompt window. Change directory to the eXceed user directory as described next, normally located in:C:\Program Files\exceed.nt\user.
C:
cd \Program Files\exceed.nt\user
If you are using 75dpi (you verified your dpi setting in step 1), enter:
copy 75dpi.fdb 75dpi.bak
If you are using 100dpi (you verified your dpi setting in step 1), enter:
copy 100dpi.fdb 100dpi.bak
Exit the MS-DOS command window.
In the Xconfig window, double-click on Font. (If you have accidently closed the Xconfig window, from the Start menu select Programs=>Exceed=>Exceed=>Xconfig.)
Click on Font Database. Click on the dpi setting (75dpi or 100dpi; if both appear, click on the first one in the list).
Click on Font List for Directory.
If you are using 75dpi, scroll until you locate courr12, then click to select it. If you are using 100dpi, scroll until you locate courr10, then click to select it.
ATTENTION The aliases in this procedure are available on the following web page. You can copy and paste the aliases from: http://www.sequent.com/docs/commandpoint_exceed.html
If you are using 75dpi, scroll in the Font List window until you locate helvr10, then click to select it. If you are using 100dpi, scroll until you locate helvr08, then click to select it.
Click on Make Alias.
In the Logical Name field, enter:
-b&h-lucida sans-medium-r-normal-sans-*-100-*-*-p-*-iso8859-1
ATTENTION Enter the alias exactly as it appears; there must be a space between lucida and sans.
Click on OK.
Click on Make Alias.
In the Logical Name field, enter:
-linotype-helvetica-medium-r-normal-sans-*-110-*-*-p-*-iso8859-1
Click on OK.
If you are using 75dpi, scroll in the Font List window until you locate helvr12, then click to select it. If you are using 100dpi, scroll until you locate helvr10, then click to select it.
Click on Make Alias.
In the Logical Name field, enter:
-b&h-lucida sans-medium-r-normal-sans-*-120-*-*-p-*-iso8859-1
ATTENTION Enter the alias exactly as it appears; there must be a space between lucida and sans.
Click on OK.
Click on Make Alias.
In the Logical Name field, enter:
-linotype-helvetica-medium-r-normal-sans-*-120-*-*-p-*-iso8859-1
Click on OK.
If you are using 75dpi, scroll in the Font List window until you locate helvb12, then click to select it. If you are using 100dpi, scroll until you locate helvb10, then click to select it.
Click on Make Alias.
In the Logical Name field, enter:
-b&h-lucida sans-bold-r-normal-sans-*-120-*-*-p-*-iso8859-1
ATTENTION Enter the alias exactly as it appears; there must be a space between lucida and sans.
Click on OK.
Click on Make Alias.
In the Logical Name field, enter:
-linotype-helvetica-bold-r-normal-sans-*-120-*-*-p-*-iso8859-1
Click on OK.
If you are using 75dpi, scroll in the Font List window until you locate helvbo12, then click to select it. If you are using 100dpi, scroll until you locate helvbo10, then click to select it.
If you are using 75dpi, scroll in the Font List window until you locate helvb18, then click to select it. If you are using 100dpi, scroll until you locate helvb14, then click to select it.
If you are using 75dpi, scroll in the Font List window until you locate helvb24, then click to select it. If you are using 100dpi, scroll until you locate helvb18, then click to select it.
Click on OK in the Font List dialog.
Click on OK in the Font Database dialog.
Click on Close in the Font Setting dialog.
Close the Xconfig window.
Start eXceed and proceed to the Start CommandPoint Clusters section of these release notes.
The following procedure describes how to reconfigure eXceed for its default values, in case those values are needed by another application you are running via eXceed. To configure eXceed for its default settings, perform the following:
ATTENTION Changes you make to the eXceed settings do not take effect until you start a new eXceed session.
Exit eXceed if you have an active session.
To restore the backup copy of the font configuration, invoke an MS-DOS command prompt window. Change directory to the eXceed user directory as described next, normally located in C:\Program Files\exceed.nt\user.
C:
cd \Program Files\exceed.nt\user
If you are using 75dpi (you verified your dpi setting in step 1), enter:
copy 75dpi.bak 75dpi.fdb
If you are using 100dpi (you verified your dpi setting in step 1), enter:
copy 100dpi.bak 100dpi.fdb
Exit the MS-DOS command window.
From the Start menu, select Programs=>Exceed=>Xconfig.
Double-click on Video.
In the Server Visual field, select the setting you saved in step 4 in the Changing Colors section of these release notes.
Click OK to close the Video dialog.
Close the Xconfig window.
Restart eXceed.