One Way Failover
Failover is the ability to ensure uninterrupted data flow and operability even when the data becomes unavailable.
You can configure eTrust IAM Toolkit to support two types of failover scenarios:
Note: In this scenario, we assume the host names are Server1 and Server2. Updates made from Server1 will be propagating to Server2 whereas vice-versa will not be allowed.
Data Store Failover
The eTrust IAM Toolkit Server uses eTrust Directory as its data store. The directory provides built-in support for failover and recovery.
How You Configure eTrust Directory Server
To configure eTrust Directory to support multi-write, with Server1 as the preferred master:
Configure the Knowledge Files
The knowledge files provide reference to servers for data store failover configuration. You must configure the following knowledge files:
To configure knowledge files
dsa-name = <cn iTechPozRouter><cn PozDsa>To read:
dsa-name = <cn iTechPozRouter><cn PozDsaServer1>
dsa-name = <cn iTechPozRouter><cn PozDsa>To read:
dsa-name = <cn iTechPozRouter><cn PozDsaServer2>
tcp localhost port 509dsa-name = <cn iTechPoz><cn PozDsa>To read:
tcp "Server1" port 509, tcp localhost port 509dsa-name = <cn iTechPoz><cn PozDsaServer1>Add the following entry after the auth-levels line and before the link-flags line.
dsa-flags = multi-write
# iTechPoz - iTechnology rePOZitory # Source the knowledge files of the iTechPozRouter and iTechPoz DSAs. source "iTechPoz-Server1-Router.dxc";source "iTechPoz-Server2-Router.dxc";source "iTechPoz-Server1.dxc";source "iTechPoz-Server2.dxc";
Enable One Way Failover
You must enable failover to successfully configure the data store failover.
To enable failover
iTechPoz-Server1-Router.dxc iTechPoz-Server2-Rotuer.dxc iTechPoz-Server1.dxc iTechPoz-Server2.dxc iTechPoz.dxg
dsa-flags = multi-writeTo read:
dsa-flags = multi-write, read-onlyNote: This makes sure that changes from the Server2 don?t get propagated to Server1
ON SERVER1 |
iTechPoz-SERVER1.dxc |
# iTechPoz - iTechnology rePOZitory # set dsa "iTechPoz-SERVER1" = { prefix = <cn iTechPoz> dsa-name = <cn iTechPoz><cn PozDsaSERVER1> dsa-password = "4season5" address = tcp "SERVER1" port 509, tcp localhost port 509 snmp-port = 509 console-port = 10510 ssld-port = 21847 auth-levels = anonymous dsa-flags = multi-write link-flags = ssl-encryption }; |
iTechPoz-SERVER2.dxc |
# # iTechPoz - iTechnology rePOZitory # set dsa "iTechPoz-SERVER2" = { prefix = <cn iTechPoz> dsa-name = <cn iTechPoz><cn PozDsa SERVER2> dsa-password = "4season5" address = tcp " SERVER2" port 509, tcp localhost port 509 snmp-port = 509 console-port = 10510 ssld-port = 21847 auth-levels = anonymous dsa-flags = multi-write, shadow link-flags = ssl-encryption }; |
ON SERVER1 |
iTechPoz-SERVER1.Router.dxc |
# # iTechPozRouter - iTechnology rePOZitory # set dsa "iTechPoz- SERVER1-Router" = { prefix = <cn iTechPozRouter> dsa-name = <cn iTechPozRouter><cn PozDsa SERVER1> dsa-password = "4season5" address = tcp localhost port 1684 snmp-port = 1684 console-port = 11684 ssld-port = 21847 auth-levels = anonymous link-flags = ssl-encryption }; |
iTechPoz-SERVER2.Router.dxc |
# # iTechPozRouter - iTechnology rePOZitory # set dsa "iTechPoz- SERVER2-Router" = { prefix = <cn iTechPozRouter> dsa-name = <cn iTechPozRouter><cn PozDsa SERVER2> dsa-password = "4season5" address = tcp localhost port 1684 snmp-port = 1684 console-port = 11684 ssld-port = 21847 auth-levels = anonymous link-flags = ssl-encryption }; |
iTechPoz.dxg |
# # iTechPoz - iTechnology rePOZitory # # # Source the knowledge file of the iTechPozRouter and iTechPoz DSAs. # source "iTechPoz- SERVER1.dxc"; source "iTechPoz- SERVER1-Router.dxc"; source "iTechPoz- SERVER2.dxc"; source "iTechPoz- SERVER2-Router.dxc"; |
ON SERVER2 |
iTechPoz.SERVER1.dxc |
# # iTechPoz - iTechnology rePOZitory # set dsa "iTechPoz- SERVER1" = { prefix = <cn iTechPoz> dsa-name = <cn iTechPoz><cn PozDsa SERVER1> dsa-password = "4season5" address = tcp " SERVER1" port 509, tcp localhost port 509 snmp-port = 509 console-port = 10510 ssld-port = 21847 auth-levels = anonymous dsa-flags = multi-write, read-only link-flags = ssl-encryption }; |
iTechPoz.SERVER2.dxc |
# # iTechPoz - iTechnology rePOZitory # set dsa "iTechPoz- SERVER2" = { prefix = <cn iTechPoz> dsa-name = <cn iTechPoz><cn PozDsa SERVER2> dsa-password = "4season5" address = tcp " SERVER2" port 509, tcp localhost port 509 snmp-port = 509 console-port = 10510 ssld-port = 21847 auth-levels = anonymous dsa-flags = multi-write, shadow link-flags = ssl-encryption }; |
ON SERVER2 |
iTechPoz-SERVER1-Router.dxc |
# # iTechPozRouter - iTechnology rePOZitory # set dsa "iTechPoz- SERVER1-Router" = { prefix = <cn iTechPozRouter> dsa-name = <cn iTechPozRouter><cn PozDsa SERVER1> dsa-password = "4season5" address = tcp localhost port 1684 snmp-port = 1684 console-port = 11684 ssld-port = 21847 auth-levels = anonymous link-flags = ssl-encryption }; |
iTechPoz-SERVER2-Router.dxc |
# # iTechPozRouter - iTechnology rePOZitory # set dsa "iTechPoz- SERVER2-Router" = { prefix = <cn iTechPozRouter> dsa-name = <cn iTechPozRouter><cn PozDsa SERVER2> dsa-password = "4season5" address = tcp localhost port 1684 snmp-port = 1684 console-port = 11684 ssld-port = 21847 auth-levels = anonymous link-flags = ssl-encryption }; |
iTechPoz.dxg |
# # iTechPoz - iTechnology rePOZitory # # # Source the knowledge file of the iTechPozRouter and iTechPoz DSAs. # source "iTechPoz- SERVER2.dxc"; source "iTechPoz- SERVER2-Router.dxc"; source "iTechPoz- SERVER1.dxc"; source "iTechPoz- SERVER1-Router.dxc"; |
dxserver stop all ssld stop dxserver start all ssld startdxserver statusssld statusLinux and UNIX
su - dsa -c "dxserver stop all" su - dsa -c "ssld stop" su - dsa -c "dxserver start all" su - dsa -c "ssld start"
dxdumpdb -p "cn=iTechPoz" -S iTechPoz-<hostname> databasename > dumpfilename
ldifsort dumpfilename <sorted filename>Which creates the a file name <sorted filename>
Location: https://ftp.broadcom.com/user/downloads/pub/iTech/eiam8.1/buildJan1119/ eIAMServerMDB_8.1_070111_win32.exe
dxloaddb -p "cn=iTechPoz" -S iTechPoz-<hostname> <sorted filename> <database name><hostname> is the name of the host onto which you are loading the ldif file. <database name> check step 4.
Note: The PEM certificate file (rootcert.pem) is located in the iTechnology directory of Server2.
An entry is added in iAuthority.conf and Server1 starts trusting certificates from Server2.
You must also configure Server2 to trust the sessions and certificates of Server1.
To configure server2 for failover
Configure eTrust IAM Toolkit Files
You must configure eTrust IAM Toolkit Server1 to receive the list of available servers to fall back on, which are replicated versions.
To configure eTrust IAM Toolkit Server1
<BackboneMember>Server2</BackboneMember>
net stop igateway net start igatewayLinux and UNIX
/opt/CA/SharedComponents/iTechnology/S99igateway stop /opt/CA/SharedComponents/iTechnology/S99igateway start
You must also configure eTrust IAM Toolkit Server2 to receive the list of available servers to fall back on, which are replicated versions.
To configure eTrust IAM Toolkit Server2
<BackboneMember>Server1</BackboneMember>
net stop igateway net start igatewayLinux and UNIX
/opt/CA/SharedComponents/iTechnology/S99igateway stop /opt/CA/SharedComponents/iTechnology/S99igateway start