i2UP
Nov 13, 2024
Run" and enter regedit to visit the registry menu, (you can also run
regedt32 to open the registry in the DOS window);
Locate the item “HKEY_LOCAL_MACHINE->SOFTWARE->Info2Software->SDATA”,under
SDATA, modify the parameter runasapp, set value as 1, click OK.
Copyright© Information2 software IncInstall and Uninstall
2) Stop the SMON and restart
Close and restart the SMON on the desktop (usually no more than 20 seconds). When
you start SMON, you can see the following picture. The right-bottom side option ‘run as app’
indicates that the i2 node agent is running as application as expected.
At this time, i2 related system services are as follows:
Copyright© Information2 software IncInstall and Uninstall
It tells that the corresponding services are disabled. This is to ensure that the relevant i2
processes will not be started as a service after restarting the machine, which is to assure to avoid
conflicts with i2 node agent running as an application mode.
3) Modify to run i2 Node agent as a service
Modify the registry item “HKEY_LOCAL_MACHINE->SOFTWARE->Info2Software->SDATA-
>runasapp”, value to be 0.
Copyright© Information2 software IncInstall and Uninstall
Restart SMON in the same way.
Note:
(1) After modifying the operation mode, SMON must be shut down and run again.
Copyright© Information2 software IncInstall and Uninstall
(2) When it’s configured to run as application mode, if user account does NOT login after the machine is
restarted, the i2 node agent and related process will NOT be launched automatically.
(3) When it’s configured to run as application mode, each time machine restarts, whether i2 node agent and
related process will start automatically depends on the option ‘Keepalive’.
If it is checked: SMON starts, the i2 node related process will start automatically;
If it is not checked: SMON starts, the process will not start automatically; users need to start them manually
(This should be noted)
(4) When the i2 node agent runs as application and the processes have been started, terminating the SMON
interface will NOT kill i2 related processes; once the SMON restarted, the option of "Keepalive" determines whether
to start the relevant processes automatically.
2.2.2 Linux
Take CentOS 7.5-64 bit as an example: Open the terminal or connect Xshell/putty to the Linux
server in the following command line way
During installation, you are prompted to choose Enterprise or Cloud Client edition or
Enterprise edition. By default, please enter "1". After installation, it prompts to set i2port, which is
used to communicate between production server and backup server. (range 1024-65535, default is
26811, users can modify it by themselves.
User can verify the success of the i2node installation by querying the relevant processes.
Copyright© Information2 software IncInstall and Uninstall
Start and stop services:
If users want to modify the RPC port later, they can modify the port by i2cfg in terminal as
follows:
Note:
Once the port here is modified to different port number, then registration operation on the
i2ControlServer portal should NOT fill in the default number 26821 any more.
Copyright© Information2 software IncInstall and Uninstall
2.3 i2ControlServer Installation
2.3.1 On Windows
The process of installing the i2ControlServer under Windows is similar to that of installing
i2node. The installation process will includes Apache, PHP, Postgresql and i2 portal automatically.
Therefore, before installation, users should double check and ensure that there is no existing
Postgresql, Apache, PHP service running or installed.
Note: It is NOT allowed to install i2ControlServer on either production server or backup server.
Users need to have a standalone host or VM to install the i2ControlServer without conflict,
otherwise it might cause unexpected conflict if there is Postgresql, Apache, PHP service running or
installed.
After installation, visit the computer management - > service, to confirm that i2-Apache 24,
i2-Ctrl server, i2-iaproxy, i2-nginx and i2-PostgreSQL services have been started.
Then, as long as the i2ControlServer is accessible by IP network, users can use browser to
access this portal. It compatibles with Edge, Firefox 12+, Chrome 15+. For example, visit
http://192.168.100.102:58080/ or https://192.168.100.102:55443/where IP 192.168.100.102 is the
exact IP address of the i2ControlServer
On the i2ControlServer if there are No applicable browsers available, alternately, users can
launch i2CtrlApp application on the desktop to login directly. After version 7.0, nginx is introduced.
By default, port 80 can also be accessed http://192.168.100.102
2.3.2 On Linux
Open the terminal or Xshell / putty to connect to the server. Take the command-line
installation as an example. Before the software is installed, the dependency packages need to be
installed first. The dependency packages will be extracted together with the i2ControlServer
software package. Take EL7 as an example.
Upload the package to the server and decompress it by command
tar zxvf i2ctrl_deps_el7.4_x64.tar.gz cd i2ctrl_deps
Copyright© Information2 software IncInstall and Uninstall
./install.sh
After the installation of dependent packages is completed, execute the installation command
of the i2ControlServer
#rpm -ivh info2soft-ctrlcenter-7.x.x-xxxxx.el7.x86_64.rpm
Note:in O/S RHEL6.X/CentOS6.X/CentOS7.x, the first time installation will prompt to initialize
the database PostgreSQL, just follow the instruction to init.
Centos7:postgresql-setup initdb # Initialize the database
After installation, the following daemon processes are running:
If the i2ControlServer reboots or gets other failure to cause the i2CtrlServer daemon not
started properly, users can start them manually by following commands:
Then, access the portal via browsers.
Copyright© Information2 software IncInstall and Uninstall
2.4 Software Uninstall
2.4.1 On Windows
Through the start menu - > control panel - > Add / Remove program, find the
i2ControlServer, double-click to finish the uninstall.
2.4.2 On Linux
Open the terminal or connect to the server in SSH mode, and uninstall it by following rpm-e
command. Take i2node as an example:
# rpm-e info2soft-ctrlcenter-7.x.x-x x x.el7.i386
Note:
If i2node agent is removed, configuration files used previously will be retained locally on the production
servers or backup servers’ disk.
If i2ContrlServer is removed, Apache / Postgresql configuration files and data used previously will be retained
locally on control servers’ disk.
Users can determine to manually remove them from the installation path.
2.5 Registration Information Configuration
In the browser address bar, enter the IP address and port number of the i2ControlServer portal
(default is 58080), such as https://xxx.xxx.xxx:58080.
Copyright© Information2 software IncInstall and Uninstall
Default username admin, password Info1234.
Find the left-side menu, Data Management, and click Enter button to continue.
Copyright© Information2 software IncInstall and Uninstall
After clicking on it, you need to configure the IP address of the controller, which will be written
to the cc_ip of the node configuration file when the node registers.
After that, Click to modify the global settings to enter the control interface. You can view all
the rules and information of the nodes under the control server through the overview information.
Copyright© Information2 software IncSystem Setting
3 System Setting
3.1 Users
i2UP builds several types of users by default:
Admin: account with the same privilege similar to v6.1 i2software. Login name is admin;
Operator: It has the operation privilege and needs system administrator to authorize different
functional modules to this account. Login name is operator;
Auditor: View the operation log of the system, login name is auditor.
System Administrator: User Added or Deleted, User Rights Management, Login name is
sysadmin
The initial password of these built-in user is Info1234.
It is highly recommended to modify the default password after login.
Note:
Only the account with "enabled" state can be logged on to the portal for related operations.
Tenant admin: tenant-related operations, login name is system, this account will be activated in later
version. Here it’s NOT available yet.
3.1.1 User Profile Modification
Edit personal profile
Copyright© Information2 software IncSystem Setting
Change Password
3.1.2 User Management
You need to log in with sysadmin to manage users, and visit User Management menu.
Copyright© Information2 software IncSystem Setting
New users
When adding or modifying users accounts, you can choose to assign different roles (except
for the three built-in administrators). Roles can be selected in many ways.
Delete User
Copyright© Information2 software IncSystem Setting
Built-in users are not allowed to delete, and other new users are allowed to delete user
permission instructions:
Role List
New Role
Update Role
Except for the operator role, the permissions of other built-in roles are fixed and no
modification is allowed. New roles are allowed to be deleted and other built-in roles are not
allowed to be deleted:
Copyright© Information2 software IncSystem Setting
3.2 Role
Allow administrator to modify permissions, in the list operation bar will appear "more" option,
and pickup "Assign permission".
According to actual needs, pickup different modules.
RBAC model is adopted in i2 system, which is role-based access control (RBAC) mechanism.
Privileges are related to roles. Users get the rights from roles by becoming members of
appropriate roles.
Another word, a user may have several roles, and each role may have several permissions.
The authorization model of "user-role-permission" is constructed. In this model, between
users and roles, between roles and privileges, the general relationship is many-to-many, in
addition to some of the system built-in restricted privileges.
Copyright© Information2 software IncSystem Setting
3.3 System
3.3.1 Basic
"Control Node Address": This address is not necessarily the address of the i2control server
itself. The node accesses the control server through this IP.
"Status refresh interval": How often does the configuration interface update its status? In the
case of poor network condition, a larger interval can be chosen here. If the network condition is
good, the default interval can be used.
"Displayed per page": Number of records displayed on each page
"Log retention": The storage time of node/replication rules, the old logs will be deleted, to
prevent exception that’s caused by too much logs accumulated.
Message Language: The language used by the i2ControlServer to send message
Copyright© Information2 software IncSystem Setting
notifications.
3.3.2 Security
"Maximum to login": If the login attempts with incorrect user name and password exceed this
preset value, the login page will be locked, prompting to try later determined by the follow
parameter ‘Locked duration’.
"Locked duration (minutes)": the duration that login locks and rejects the login attempts.
‘Restricted password Complexity”: this option detects the user''s password complexity when
selecting Yes, to enforce the enhanced security over the password validation. Password with
simple words will NOT be accepted.
Password Length: When creating or modifying a user''s password, you must reach the set
value to allow creation or modification. Otherwise, you can''t submit it it and give an error
prompt.
Copyright© Information2 software IncSystem Setting
"Password validity period (days)": to define the duration when i2ControlServer forceful reset
the password. After expiration, the password needs to be reset when doing login attempt.
3.3.3 Email
Email Notification: Enable mail notification service.
SMTP Server Address: SMTP Server Address.
Using SSL to connect: Whether to connect servers with SSL or not; Attention should be
paid to the coordination of SMTP server ports.
SMTP authentication required by default": By default, it needs to be turned on. For some
self-built mail servers, SMTP authentication is NOT required.
SMTP Server Port: Usually the ports of non-SSL connections and SSL connections are
different.
Email Accounts: The account to send mail.
Password: When sending mail with this account, SMTP server needs to authenticate. This
password is used for SMTP server authentication.
Send mail test: Send Test Email to the current login user''s mailbox using the SMTP settings on the
page. The current login user''s mailbox settings are modified by user management.
Copyright© Information2 software IncSystem Setting
3.3.4 SMS
Cloud SMS alerts: Enable Short Message Alarm function by the cloud based SMS platform.
SMS Platform: At present, it supports Ali Cloud, ESK Platform and Huawei Message Notification
service.
1. Ali Cloud
AppKey: It is necessary to register account in Ali cloud to enable and obtain APPKey in the
application management of management console.
SecretKey: In Ali Cloud Platform, SecretKey is acquired in the application management of the
management console.
Signature Name: Get the signature name in the configuration SMS signature of Ali SMS
notification in the configuration management.
SMS Template ID: Short Message Template ID defined by Ali cloud.
2. ESK platform
"ESK Service Address": Format: "SERVER_IP: SERVER_PORT" (e.g. 192.168.1.100:8080)
"User Name": ESK Platform User Name
Password: ESK platform login password
Copyright© Information2 software IncSystem Setting
3. Huawei News Notification Service
Huawei Account Name: Huawei Account Name is not a user name. Visit Huawei Cloud
platform, under basic information interface - > management of my credentials - > View "account
name".
Belong to the region: cn-north-1, cn-south-1 or cn-east-2.
https://developer.huaweicloud.com/endpoint
URN of the theme: created by Huawei Cloud Console, urn string
SMS Template ID: Huawei SMN Message Theme Template
Note:
Huawei Message Notification Service is not a simple SMS service. You need to create a theme first, and all
applications can send messages to it, and the theme will be notified to "subscribers". So, unlike the SMS and
notification of the existing console in the enterprise version, you need to create a theme and add subscriptions to
the console in Huawei.
The following are the main steps in setting up Huawei Message Notification Service:
1) Create a theme first
2) Create a template with type selection SMS; Huawei requires that a template with the same name as Default
be created at the same time.
3) Adding subscriptions, where the protocol can choose SMS, e-mail and others
3.3.5 Advanced
Ignore Mirror Settings: When turned on, the mirror stage is skipped when rules are created.
The replication process will directly run to capture and replicate the incremental data changes. This
works for certain scenarios that do NOT require to copy huge amount of historical files or
directories to the backup server.
Copyright© Information2 software IncSystem Setting
Online Upgrade:Allow i2 nodes agent to get upgrade online, including production and backup
server.
Copyright© Information2 software IncSystem Setting
3.4 License
3.4.1 License List
Through the license list page, licenses can be added, updated, deleted, modified binding and
other operations:
"SN": the unique string generated based the i2ContrlServer.
"Authorization type": includes trial version and official version;
"Product name": the name of the license, usually it is i2soft;
‘Company”: the vendor name of i2soft;
"Expire": for trial edition license, it is trial period; for formal license it works for maintenance
and warranty period; for service edition, it is for the for the validity period of the license;
"Feature": the respective function activated in the imported license;
"Authorized item": The maximum quota and usage allowed under the current license; it is
classified into virtual node number, physical node number, migration number, virtual machine
protection number, etc.
"Operation": The operation on the license includes view, download, delete, and upgrade;
"Search": In the search bar in the upper right corner of the page, you can also enter the
corresponding serial number to search for the corresponding license if there are multiple license
imported.
Copyright© Information2 software IncSystem Setting
3.4.2 Add License
First, click on the "View Identification Code" button to obtain the identification code of the
i2control server and submit it it to the i2 company support personnel to generate the license for
the use of the i2ControlServer.
Note:
For the i2ControlServer that can not access the Internet, before adding full server protection license and full
server migration license, the node identification code should be submitted in addition to the identification code of
the i2ControlServer.
1. Click on the "Download Node Identification Code" button;
2. Select the production server that needs to be bound to the license;
3. Click on the "Download Identification Code" button;
4. Submit the downloaded content to the i2 company.
This will include the identification codes of these i2 nodes agents in the generated license.
When the new license is added to the i2ControlServer later, only those i2 node agents already
included previously will work and have the feature enabled.
After getting the license documents from our company, click the "Add" button on this page of
the WEB page, and pop up the Add License window:
Copyright© Information2 software IncSystem Setting
"Software Registration Code": You can choose to copy all the text in the license file and paste
it into the "Software Registration Code" column, and click "OK" to add the license.
License File: You can also add licenses by dragging the entire license file into the "License
File" column and clicking "Upload";
3.4.3 License Binding
Click the "View" button, pop up the license binding details, check the nodes and virtual
platforms that need to be bound, and click "Update Binding" to do so.
Copyright© Information2 software IncSystem Setting
Name: The name of the registered i2 node agent or the name of virtual platform registered
on the i2ControlServer.
Resource type: i2 node agent or virtual platform (VP);
OS: Windows, Linux;
Bind with the current license or not: whether the current license has been bound to this node.
Note:
Each license has its quota of licenses, such as the number of virtual machines, the number of physical machines,
the number of migration hosts, where the bound units can not exceed the quota included in the licenses;
For full server protection license and full server migration license, users only need to bind with the production
servers which installed the i2 node agents (backup servers are NOT required to bind);
3.4.4 License Upgrade
License update is the operation to enable new functions upon the previous license imported,
or increase the quota of i2 node agents. There are 2 methods, "online updating" which requires the
access to the Internet, and offline upgrade by the button "upgrade" which requires users to get
license file separately from and import to i2ControlServer here.
3.4.5 Online Update
Click the online updating button at the bottom side, the i2ControlServer will automatically
query the latest version of all licenses, and automatically update to the i2ControlServer. After it’s
finished, prompt will be displayed.
3.4.6 Offline Upgrade
Click "Upgrade" on the right side bar after each group of licenses, and a license update
window will pop up.
Copyright© Information2 software IncSystem Setting
Activation Address: users need to access this Activation Address on other PC that can access
to the Internet.
"SN", "Secret”, "Identification Code": there three items are used to update license file. Users first
access the i2 activation portal (https://lic4.info2soft.com/i2/activation.php). Fill in the content
of SN, Secret, Identification Code to the i2 activation portal, and click "Submit" to get the
updated license file.
"Trial Upgrade Official": If you need to upgrade "Trial Edition" license to "Official Edition" license,
you also need to check this option. This operation will add "Official Edition" license as a new
license, and automatically transfer the binding relationship on the trial version to the official
version. The old trial version license will remain unchanged.
"Registration Code": You can choose to copy all the text in the license file and paste it into the
"Software Registration Code" column, and click "OK" to update the license.
License File: You can also update the license by dragging the license file into the "License File"
column and clicking "Upload".
Note:
i2 activation portal (https://lic4.info2soft.com/i2/activation.php)
This portal is maintained by i2 company, and it’s public accessible. Each i2 customer can access this portal to
update their license following necessary contract requirement. For the details, please contact to out sales
representatives.
Copyright© Information2 software IncSystem Setting
3.4.7 License Download
If you need to download some licenses on the computer for archiving purposes, you can click
the "Download" button on the right operation bar of the license list, and then click the link to
download in the pop-up download address window.
Copyright© Information2 software IncSystem Setting
3.4.8 License Deletion
If you need to delete some licenses, you can click the "Delete" button on the right side of the
license list, or check the licenses that need to be deleted, and then click the "Delete" button at the
bottom of the page to delete unnecessary licenses.
Note:
If the license is deleted, all the rules will be stopped and can NOT be used anymore. It’s designed for special
cases, such as clean up the unnecessary trial license before adding a total new license with different feature sets
enabled.
Please be careful before this operation.
3.5 Operation Log
The log records of the operation are tracking all of the user''s all web operations, including
user''s rules creation, modification and deletion of nodes. To facilitate the administrator to manage
daily tasks, logs can NOT be removed, but it’s allowed to view and download.
Copyright© Information2 software IncSystem Setting
Copyright© Information2 software IncResource
4 Resource
4.1 Group
Group management is managed by grouping nodes into groups, in which nodes for the same
purpose are divided into the same group.
4.1.1 Group
Name: User-defined name for easy management
Group Type: Nodes belong to group types, including "node or cluster", "comparison and
synchronization", "rules", "restore", "full service protection", "timing", "NAS synchronize",
"virtual machine platform", "virtual machine backup", "virtual machine recovery", "virtual
machine migration/replication".
For the operations available for group management, from left to right are as follows:
Copyright© Information2 software IncResource
"Modify": Modify the name of the current group and group type "Settings": Add rules,
platforms, nodes or clusters to the group that belong to the group
Delete: Delete the group
4.2 Node
About the process to add Node.
Click the "New" button to enter the new page of the following nodes. Enter relevant
machine information here:
Copyright© Information2 software IncResource
"Name": The name of the node named for easy management
Management Address: The management address is the IP address used by the node
(production server or backup server) to communicate with the i2ControlServer. If the
production server has multiple network cards, users can configure different network cards
for different purpose, such as NIC1 for management and NIC2 for replication data
transmission.
"Management Port": The management port is the port used by the node to
communicate with the i2ControlServer (default is 26811), which can be inquired by
i2port.conf in the etc directory under i2Node installation path. In Windows, path is <
installation path >\ etc i2port.conf; in Linux, path is / etc/sdata/i2port.conf;
"Data Address": The IP address where the production server communicates with the
backup server and transmits replicated data.
Username: The login account of the corresponding node operating system. i2 software
supports domain user authentication of Windows O/S, and the format of Windows domain
user name is: \.
Password: The login password of the username.
"License": Different licenses determine different features that can be operated on
different nodes. The license options available in the drop down list are managed by the
License> menu. If no options here are selected or displayed, nodes can
Copyright© Information2 software IncResource
be added successfully still. Users can visit the menu ‘license binding’ to attach the license
onto that specific node later on.
"Business Group": Select the group for the node.
"Node Log Dir": the directory where i2 agent stores the logs generated.
"Backup Dir": the directory used as buffer. Generally, data is directly captured from the
production server’s memory and transmitted to the backup server. However, under
some abnormal circumstances, such as network interruption, insufficient bandwidth,
backup server abnormally gets offline, big size files to replicate, etc., the production
side data can not be delivered to the backup server in time. During a period, part of the
data has to be cached from production sender memory to its local disk, to ensure that
the i2 agent can run normally and keep the data integrity.
"RAM Max": The upper limit of memory allocated to i2 node agent for data caching in
memory level.
"Hard Drive Max": The upper limit of disks allocated to i2 node agent for data caching in
disk level. Note that if the value is set to 0, it means no disk caching. Once the caching
data exceeds the size of the defined memory cache limit, the i2 node replication rule
will automatically stop, thus assuring the protection of production server resources.
After the i2 node replication rule stops, the administrator needs to verify the system or
resources to fix the problem, and then start the replication rule manually to resume the
data replication.
Rep. Path/Excluded rep. Path: The path where the target replicated data is located. If the
production server is a Linux system, users need to specify the source path here; if the
production server is a Windows system, it’s not required. When users create the
replication rules later, they can choose the path by themselves, and the replication path
is optional. If there are some directories to filter, users need to add this directory to the
exclusion path.
Copyright© Information2 software IncResource
Note:
If the i2nodes are Linux O/S, user must ensure that the "copy path" contains the objects involved in the file
system operations to be monitored. For example, in the case of rename operations, the source and target of
rename should be included. Usually the "copy path" is set to the root directory. When the exclusion path is selected,
when the exclusion path is added to the replication rule, in the mirror stage the data under the directory excluded
will be synchronized still, but the incremental data in the replication stage will not be replicated.
If the i2node module works properly and the communication between the i2ControlServer and the node is
normal, the node status will be displayed as "online" status. i2 node agent will refresh the status information
regularly. There are four buttons available: modify, delete, view disk space, view log, and system state. Only
when the node is not involved by any replication rules can it be modified or deleted.
4.3 Cluster
At present, i2 software supports the protection of Windows Cluster. Its topology is as follows:
For the protection of MSCS cluster, just install the i2 agent on each cluster node and configure
it according to this document, then we can protect the contents of Shared Storage of Cluster and
backup the data from the shared disk to the designated backup server in real time manner.
i2 software currently supports the protection for Windows 2003 and Windows 2008 Cluster.
Copyright© Information2 software IncResource
4.4 Storage
Through storage management, we can see how the storage resources of all online machines
are used.
Copyright© Information2 software IncTemplate
5 Template
5.1 Full Server Backup
5.1.1 New
Users can simplify the process of establishing full service backup rules by template.
In the full service backup page, you can simplify the operation of establishing rules by enabling
templates. The contents of templates can be automatically filled into the configuration page such
as below
i2ControlServer management interface, through template management - > full server
backup template, to create / modify the template, the new / modify template page is as
follows:
Copyright© Information2 software IncTemplate
Name: The name of the template named by the customer is easy to manage.
Source Type: value of ‘file’ indicates the usual file based backup.
5.1.2 Mirror
Refer to the advanced property under Replication
5.1.3 Compress & Encrypt
Refer to the advanced property under Replication
5.1.4 Strategy
"Instant": After establishing the full server backup rules, the rule will be executed immediately.
"Once": it’s a one time job backup;
"Regular": Set up the backup task to execute periodically.
Copyright© Information2 software IncTemplate
5.1.5 Bandwidth
Refer to the advanced property under Replication
5.2 Full Server Restore
5.2.1 New Template
The user through the template can easily establish rules;
i2ControlServer management , through template management - > full server restore template,
to create / modify the template, the new / modify template page is as follows:
Name: The name of the template named by the customer is easy to manage.
5.2.2 Network
Copyright© Information2 software IncTemplate
"Synchronize the production node network configuration to the backup node": Users can
choose to synchronize some or all of the network cards when the host contains multiple network
cards.
"Network card mapping": user-defined, the corresponding relationship between host and
standby network configuration for individual network card.
"Keep network settings of the backup node, and do NOT synchronize network configurations":
that is to bypass the network configuration and parameters.
5.2.3 Restore
"After synchronization, continue to monitor and synchronize until user’s manual switch":
since the replication rule is still associated with the production node and backup node in
real-time manner. During the restoration process, user may determine the exact time to fail
over.
"Automatically switch to backup server after system and data synchronization": This function
is not provided for the time being.
5.2.4 Bandwidth
Refer to the advanced property under Replication
Copyright© Information2 software IncTemplate
5.2.5 Template List
For the operations available to the template, from left to right are as follows:
Modification: Options other than template names can be modified
"Delete": Delete the template
5.3 Replication
Template - >Replication:
The new template reference page is as follows, the process is basically similar:
Refer to the advanced property under Replication
Copyright© Information2 software IncFailover
6 Failover
i2 high availability function provides application level high availability. Application High
Availability mainly aims at providing high availability services for various applications. Monitoring
can provide protection of multiple high availability rules. Monitoring objects can be master node,
slave node or simultaneous monitoring. Arbitration mechanism is introduced to avoid wrong
handover of master and slave nodes due to network and other reasons. Meanwhile, data
synchronization is added to high availability to achieve high data synchronization association. For
example, both master and slave nodes have installed SQL Server 2005, and high availability of SQL
Server 2005 can be achieved by using i2 application high availability function. When the service or
process monitored by the master node fails, the master node will become the slave node. The
Association replication rule from the original master node to the original slave node stops, the
master node upgrades to the master node, and the association replication rule from the new
master node to the new slave node opens.
Now it’s clear how i2Availability protects data integrity at the data level. Furthermore, since all
the replicated data at the backup server is with the original data format, it reduces the RTO to
minimum if recovery is required. Administrator can either copy back the data from backup server
to production server, or directly load the data at the backup server. This is very competitive against
traditional backup solution that requires reverse operation to restore the backup data first which
extends the RTO a lot.
i2Availability not only covers the data level replication, but also offers a disaster recovery or
centralized backup solution for any application, such as transaction-based database, without the
need for expensive application-specific agents.
The next question is how to provide immediate availability of the application from the backup
server for high availability.
Copyright© Information2 software IncFailover
i2Availability provides a very straight forward method for failover in situations where the
application is NOT "cluster-able", where a client has chosen to not implement MSCS or the
hardware may not support clustering. In addition, because deploying a cluster usually cannot be
done "on top" of an existing running server, many customers prefer the less obtrusive approach to
simply building a second server which is Active/Standby mode. The backup server is to fail over for
the production server during an outage.
The only thing administrator needs to prepare first, is to setup and configure the same
application systems on the backup server, which is usually the same O/S and same applications as
the production server. Remember, before the HA setup works, initially the backup server only runs
i2Availability agent background in O/S, and MUST shutdown the application service because it’s
Active/Standby mode HA where the standby one does NOT run application service at all.
Note:
In the absence of arbitration, if the network between the master node and the slave node fails
and other networks are normal, two master nodes may be seen on the interface of the
i2ControlServer, resulting in IP conflicts and other phenomena, which are normal phenomena. The
way to avoid this trouble is to set arbitration for rules.
6.1New Failover Rule
In the management interface, high-availability rules are added/edited by applying Failover>
Availability. Applying high-availability rules to add/edit pages is as follows:
Copyright© Information2 software IncFailover
Basic Settings
Copyright© Information2 software IncFailover
"Name": identification string of the rule, easy to manage;
"Node": Nodes can not be the same machine, multiple nodes can be added into the
HA group. When the priority is the same, the initial master node is meaningful,
otherwise the high priority will become the initial master node.
"Automatic Switch": When this option is enabled, when the HA rule reaches the
handover criteria, it will automatically switch from the master node to the slave node;
when it’s not checked, when the HA rule reaches the handover criteria, it will prompt
warning information in the interface rule state but NOT act.
"Arbitration": There are 3 options, ‘None’, ‘Node’ and ‘Disk’.
When checking disk arbitration, we need to set up an arbitration disk.
When checking the node arbitration, we need to set up an arbitration IP address. The
host of the arbitration IP needs to install i2 node software, and the i2Availability
process runs normally. When all heartbeats fail, we need to use the arbitration
Copyright© Information2 software IncFailover
mechanism to judge who can take over the resources.
"Heartbeat": The communication between HA nodes is responsible for information
communication and heartbeat detection between HA nodes. There are several UDP, TCP
and Ping heartbeat lines between HA nodes, ports used by heartbeat, IP address of network
card can be customized.
Note: The current version uses TCP as the communication type.
Copyright© Information2 software IncFailover
"Data": Setting the data synchronization option of HA rules association, you can see the
replication rules in replication management, you can also modify the stopped replication rules
in replication management. Only the replication rules from master node to slave node can be
activated, and the rule state of HA will lead to the change of the corresponding association
rules.
"Start the rule right after creation": When submitting HA rules, the replication rules from
master node to slave node will be automatically started;
"Do not fail over unless the rule is in replication state": The HA handover is allowed only when
the associated replication rules are in the replication state;
"Failback Rules": When checking the this option, HA rules create two associated replication
rules from backup node to production node.
"Start Replication Rules automatically": When checked, when HA switches, the associated
replication rules will be automatically started;
Copyright© Information2 software IncFailover
Note: Make sure that both source and target are directories in the rules
Application
Resource monitoring consists of master node resource monitoring and slave node resource
monitoring. When monitoring slave node, it can only conduct warning processing without
switching. Monitoring object can choose service, process, memory, CPU, custom script, disk
monitoring mode. When selecting process monitoring, you can choose to fill in the process
name or process number. When only warning is given after checking fails, if an exception
Copyright© Information2 software IncFailover
occurs to the monitored object, a warning message will be generated in the log, which will
not lead to handover. Multiple monitoring objects can be created, each monitoring object is
independent, any one of which meets the switching requirements will cause switching.
"Write exceptions into logs without other actions": when it’s enabled, the regular action is
warning, not checking is switching;
Copyright© Information2 software IncFailover
Attention:
1. When customizing script monitoring, the added script file will be executed regularly once.
Note that the execution time of the script must not be greater than the "interval time"* "maximum
number of failures", and the script must return.
2. Custom script monitoring, the monitoring output will be file. If the file is written in false, it will
cause switching or warning. Note that false must be the first five characters of the text, and the
rules written in the file are true or other times will not change.
3. The script must be stored in the path specified by the master and slave nodes:
On Windows, the root directory of the script is: scripts Linux, and the
root directory of the script is: / etc/sdata/scripts.
You can create sub-directories in the script root directory. Windows scripts must be batch files
suffixed with. bat or. cmd.
Linux scripts must be executable files (they must have executable properties).
Copyright© Information2 software IncFailover
If disk monitoring is Windows, add ":" When monitoring C disk, add C when character
selection: If Linux, add the directory to the volume group or partition where the directory is
located.
Switch
Copyright© Information2 software IncFailover
"Resource switching": Resource switching is divided into script switching resources and virtual
IP. In resource switching script, when the master node resource monitoring result is abnormal, the
master node and the slave node need to switch in negotiation. When the master node switches to
the slave node, the resource needed to release will execute the "Execute scripts to release
resources", thus switching itself to the slave node and the slave node to the master node. When
acquiring resources, it executes "Execute scripts to activate resources", so that we can upgrade
ourselves to the primary node.
Note: The script must exist on both primary and slave nodes and be placed in a specified
directory on Windows. The root directory of the script is i2Soft installation Path scripts
On Linux, the root directory of the script is: / etc / sdata/ scripts
You can create sub-directories in the script root directory. Windows scripts must be batch files
suffixed with. bat or. cmd.
Linux scripts must be executable files (they must have executable properties). The virtual IP
configuration is as follows:
Copyright© Information2 software IncFailover
Copyright© Information2 software IncFailover
6.2 Failover Rule List
By applying the list of highly available rules, users can monitor the status of the application of
highly available rules, as follows:
Applying high availability rules includes the following states:
Running: High Availability Rules Running normally;
Ready: Ready to Start Mirroring
Mirroring: a mirror process after setting up data synchronization is ongoing.
Handover: The handover condition is reached and is being switched to slave node
Ready: Rules are in place
Stop: Rule is stopped.
Warning: When automatic handover is not checked, the slave node will display the warning
status when the handover standard is reached.
"DATA_UNSYNC": When there are association rules and the association rules are in a stop
state, or other abnormal state, the data is not synchronized
Unknown: The corresponding node downtime occurs in an unknown state for the operations
available for the application of high availability rules, from left to right as follows
Start: start rule;
Stop: Stop Rule;
Modify: Modify the high availability settings;
Delete: Delete rules;
Log: View Rule Days
Copyright© Information2 software IncFailover
Switch: user can forcefully switch from slave node to primary node
Copyright© Information2 software IncFailover
"Replication Rule": When the replication rule corresponding to the master node stops, the
"Replication Rule" button will appear. Click on the pop-up box to start and modify the replication
rule.
The operation after the node only operates on the corresponding node, only the
corresponding node can be operated and the log of the corresponding node can be viewed.
Attention:
Properly set up firewall policy to ensure that the firewall does not affect the communication
between the control IP and the management IP of each node.
Keep the HA controller in operation to ensure that the node machine is in the correct state
after restart.
Copyright© Information2 software IncToolBox
7 ToolBox
7.1Diagnosis
When the software runs in abnormal state, in order to locate the problem more quickly, a
practical diagnostic tool has emerged, which can be divided into network state detection and rule
detection.
Network diagnosis is mainly aimed at the connectivity of production server node, disaster
standby node and control node, including the connection test of IP and port, and feedback to the
interface of production server and disaster standby memory space.
Rule diagnosis can not only check the connectivity of the corresponding rule production
server backup server, but also collect the log information of nodes, system log information and
dump file if the software process runs abnormally.
Network diagnosis is as follows:
Rule diagnosis is as follows:
Copyright© Information2 software IncToolBox
Following successful establishment:
Detailed diagnosis can be continued, and the time required for diagnosis varies from
environment to environment. The downloaded information can be sent to technical support or
other relevant personnel to facilitate later problem handling. Task diagnosis is the same as rule
diagnosis.
Copyright© Information2 software IncToolBox
7.2 Compare
Sometimes, users will have be concerned about the consistency between data on the
production server and data on the backup server. The comparison function can compare data on
the production server and data on the backup server and give a report. Through this comparative
report, users can judge whether the data of production server and backup server are consistent. It
should be noted that for changing files, the report may show inconsistencies between production
server and disaster preparedness, but this does not mean that i2 real-time synchronization
problems. Therefore, when comparing data, we recommend that it be done only when there is no
data change on the production server, so that the report is more accurate.
7.2.1 New
Click on "New Task":
Copyright© Information2 software IncToolBox
"Type":
Compare only the data of production server and backup server, and record it in the report if
the data is inconsistent.
Automatically synchronize the file from production server to backup server refers to record
the file and synchronize the file from production server to backup server when the comparative
task finds that the file on production server is inconsistent with the corresponding file on backup
server.
"Method": file size & Update time, according to the file size and modification time to
determine whether the data on the production server and backup server is consistent; this
comparison method is more efficient, but less accurate than strict verification. ‘MD5 checksum” is
an inefficient but reliable way to judge the consistency of data by calculating the MD5 value of files.
"Strategy"
Instant, submit tasks to start comparing immediately;
Once, make an appointment time to run the comparison task at a specified time in the future,
run only once;
Regular, to perform comparative tasks on a regular basis.
7.2.2 Task List
Copyright© Information2 software IncToolBox
After the task is submitted, the task list shows the progress of each task.
Note: In order to reduce the consumption of production server resources, a replication rule
can only start a comparison task at any time.
7.2.3 Compare Results
The results are as follows by clicking on "Compare Results":
Copyright© Information2 software IncMessage
8 Message
8.1All
Users can get alarm notifications under the corresponding module through all messages,
unread messages and read messages under the message center. All messages show the
notifications and alarms of all modules. Click on the message notifications of different modules
to switch to corresponding functions as follows:
The unread message module only displays the message that the user has not read and
the read message only shows the message that the user has read as follows:
The abnormal messages of each module are displayed under each tab page, and enter the
message details by clicking on the title content:
In the message details, you can see the status and details of the corresponding node
Copyright© Information2 software IncMessage
exception, VP exception, rule exception, cluster exception, patrol notification, etc.
8.2 Settings
Users can choose whether the corresponding module receives the information in the station,
e-mail information or short message from the mobile phone through "Message Notification
Management", and save the configuration through the "Save Configuration" button.
Click on the "Settings" button on the right side of the "Inspection Notice" to set the strategy
and date of the inspection notice:
"Reminder": Send Patrol Reminder Notification Monthly or Quarterly
Click the "Settings" button on the right side of the "Overall State" button to set the strategy
and interval of the notification of the overall status.
Copyright© Information2 software IncMessage
Overall State Setting: sending global status notifications by hour or by day
With "More Settings", you can set:
Maximum Notification Times: Number of messages a user receives
Reset Notifications Times: Number of messages received by reset users (if the number
of notifications is limited to 5 and has been sent three times, then the number of reset
notifications, the number of times cleared 0, the message will be re-sent five times)
Modifying Contacts: Including Current Users, Ordinary Contacts, Patrol Notification
Contacts, Contact Phones of Overall Status Contacts and Mailboxes
Copyright© Information2 software Inc">