Documents Product Categories i2UP

i2UP

Nov 13, 2024
Run" and enter regedit to visit the registry menu, (you can also run regedt32 to open the registry in the DOS window);  Locate the item “HKEY_LOCAL_MACHINE->SOFTWARE->Info2Software->SDATA”,under SDATA, modify the parameter runasapp, set value as 1, click OK. Copyright© Information2 software IncInstall and Uninstall 2) Stop the SMON and restart Close and restart the SMON on the desktop (usually no more than 20 seconds). When you start SMON, you can see the following picture. The right-bottom side option ‘run as app’ indicates that the i2 node agent is running as application as expected. At this time, i2 related system services are as follows: Copyright© Information2 software IncInstall and Uninstall It tells that the corresponding services are disabled. This is to ensure that the relevant i2 processes will not be started as a service after restarting the machine, which is to assure to avoid conflicts with i2 node agent running as an application mode. 3) Modify to run i2 Node agent as a service Modify the registry item “HKEY_LOCAL_MACHINE->SOFTWARE->Info2Software->SDATA- >runasapp”, value to be 0. Copyright© Information2 software IncInstall and Uninstall Restart SMON in the same way. Note: (1) After modifying the operation mode, SMON must be shut down and run again. Copyright© Information2 software IncInstall and Uninstall (2) When it’s configured to run as application mode, if user account does NOT login after the machine is restarted, the i2 node agent and related process will NOT be launched automatically. (3) When it’s configured to run as application mode, each time machine restarts, whether i2 node agent and related process will start automatically depends on the option ‘Keepalive’. If it is checked: SMON starts, the i2 node related process will start automatically; If it is not checked: SMON starts, the process will not start automatically; users need to start them manually (This should be noted) (4) When the i2 node agent runs as application and the processes have been started, terminating the SMON interface will NOT kill i2 related processes; once the SMON restarted, the option of "Keepalive" determines whether to start the relevant processes automatically. 2.2.2 Linux Take CentOS 7.5-64 bit as an example: Open the terminal or connect Xshell/putty to the Linux server in the following command line way During installation, you are prompted to choose Enterprise or Cloud Client edition or Enterprise edition. By default, please enter "1". After installation, it prompts to set i2port, which is used to communicate between production server and backup server. (range 1024-65535, default is 26811, users can modify it by themselves. User can verify the success of the i2node installation by querying the relevant processes. Copyright© Information2 software IncInstall and Uninstall Start and stop services: If users want to modify the RPC port later, they can modify the port by i2cfg in terminal as follows: Note: Once the port here is modified to different port number, then registration operation on the i2ControlServer portal should NOT fill in the default number 26821 any more. Copyright© Information2 software IncInstall and Uninstall 2.3 i2ControlServer Installation 2.3.1 On Windows The process of installing the i2ControlServer under Windows is similar to that of installing i2node. The installation process will includes Apache, PHP, Postgresql and i2 portal automatically. Therefore, before installation, users should double check and ensure that there is no existing Postgresql, Apache, PHP service running or installed. Note: It is NOT allowed to install i2ControlServer on either production server or backup server. Users need to have a standalone host or VM to install the i2ControlServer without conflict, otherwise it might cause unexpected conflict if there is Postgresql, Apache, PHP service running or installed. After installation, visit the computer management - > service, to confirm that i2-Apache 24, i2-Ctrl server, i2-iaproxy, i2-nginx and i2-PostgreSQL services have been started. Then, as long as the i2ControlServer is accessible by IP network, users can use browser to access this portal. It compatibles with Edge, Firefox 12+, Chrome 15+. For example, visit http://192.168.100.102:58080/ or https://192.168.100.102:55443/where IP 192.168.100.102 is the exact IP address of the i2ControlServer On the i2ControlServer if there are No applicable browsers available, alternately, users can launch i2CtrlApp application on the desktop to login directly. After version 7.0, nginx is introduced. By default, port 80 can also be accessed http://192.168.100.102 2.3.2 On Linux Open the terminal or Xshell / putty to connect to the server. Take the command-line installation as an example. Before the software is installed, the dependency packages need to be installed first. The dependency packages will be extracted together with the i2ControlServer software package. Take EL7 as an example. Upload the package to the server and decompress it by command tar zxvf i2ctrl_deps_el7.4_x64.tar.gz cd i2ctrl_deps Copyright© Information2 software IncInstall and Uninstall ./install.sh After the installation of dependent packages is completed, execute the installation command of the i2ControlServer #rpm -ivh info2soft-ctrlcenter-7.x.x-xxxxx.el7.x86_64.rpm Note:in O/S RHEL6.X/CentOS6.X/CentOS7.x, the first time installation will prompt to initialize the database PostgreSQL, just follow the instruction to init. Centos7:postgresql-setup initdb # Initialize the database After installation, the following daemon processes are running: If the i2ControlServer reboots or gets other failure to cause the i2CtrlServer daemon not started properly, users can start them manually by following commands: Then, access the portal via browsers. Copyright© Information2 software IncInstall and Uninstall 2.4 Software Uninstall 2.4.1 On Windows Through the start menu - > control panel - > Add / Remove program, find the i2ControlServer, double-click to finish the uninstall. 2.4.2 On Linux Open the terminal or connect to the server in SSH mode, and uninstall it by following rpm-e command. Take i2node as an example: # rpm-e info2soft-ctrlcenter-7.x.x-x x x.el7.i386 Note: If i2node agent is removed, configuration files used previously will be retained locally on the production servers or backup servers’ disk. If i2ContrlServer is removed, Apache / Postgresql configuration files and data used previously will be retained locally on control servers’ disk. Users can determine to manually remove them from the installation path. 2.5 Registration Information Configuration In the browser address bar, enter the IP address and port number of the i2ControlServer portal (default is 58080), such as https://xxx.xxx.xxx:58080. Copyright© Information2 software IncInstall and Uninstall Default username admin, password Info1234. Find the left-side menu, Data Management, and click Enter button to continue. Copyright© Information2 software IncInstall and Uninstall After clicking on it, you need to configure the IP address of the controller, which will be written to the cc_ip of the node configuration file when the node registers. After that, Click to modify the global settings to enter the control interface. You can view all the rules and information of the nodes under the control server through the overview information. Copyright© Information2 software IncSystem Setting 3 System Setting 3.1 Users i2UP builds several types of users by default: Admin: account with the same privilege similar to v6.1 i2software. Login name is admin; Operator: It has the operation privilege and needs system administrator to authorize different functional modules to this account. Login name is operator; Auditor: View the operation log of the system, login name is auditor. System Administrator: User Added or Deleted, User Rights Management, Login name is sysadmin The initial password of these built-in user is Info1234. It is highly recommended to modify the default password after login. Note:  Only the account with "enabled" state can be logged on to the portal for related operations.  Tenant admin: tenant-related operations, login name is system, this account will be activated in later version. Here it’s NOT available yet. 3.1.1 User Profile Modification Edit personal profile Copyright© Information2 software IncSystem Setting Change Password 3.1.2 User Management You need to log in with sysadmin to manage users, and visit User Management menu. Copyright© Information2 software IncSystem Setting New users When adding or modifying users accounts, you can choose to assign different roles (except for the three built-in administrators). Roles can be selected in many ways. Delete User Copyright© Information2 software IncSystem Setting Built-in users are not allowed to delete, and other new users are allowed to delete user permission instructions: Role List New Role Update Role Except for the operator role, the permissions of other built-in roles are fixed and no modification is allowed. New roles are allowed to be deleted and other built-in roles are not allowed to be deleted: Copyright© Information2 software IncSystem Setting 3.2 Role Allow administrator to modify permissions, in the list operation bar will appear "more" option, and pickup "Assign permission". According to actual needs, pickup different modules. RBAC model is adopted in i2 system, which is role-based access control (RBAC) mechanism. Privileges are related to roles. Users get the rights from roles by becoming members of appropriate roles. Another word, a user may have several roles, and each role may have several permissions. The authorization model of "user-role-permission" is constructed. In this model, between users and roles, between roles and privileges, the general relationship is many-to-many, in addition to some of the system built-in restricted privileges. Copyright© Information2 software IncSystem Setting 3.3 System 3.3.1 Basic "Control Node Address": This address is not necessarily the address of the i2control server itself. The node accesses the control server through this IP. "Status refresh interval": How often does the configuration interface update its status? In the case of poor network condition, a larger interval can be chosen here. If the network condition is good, the default interval can be used. "Displayed per page": Number of records displayed on each page "Log retention": The storage time of node/replication rules, the old logs will be deleted, to prevent exception that’s caused by too much logs accumulated. Message Language: The language used by the i2ControlServer to send message Copyright© Information2 software IncSystem Setting notifications. 3.3.2 Security "Maximum to login": If the login attempts with incorrect user name and password exceed this preset value, the login page will be locked, prompting to try later determined by the follow parameter ‘Locked duration’. "Locked duration (minutes)": the duration that login locks and rejects the login attempts. ‘Restricted password Complexity”: this option detects the user''s password complexity when selecting Yes, to enforce the enhanced security over the password validation. Password with simple words will NOT be accepted. Password Length: When creating or modifying a user''s password, you must reach the set value to allow creation or modification. Otherwise, you can''t submit it it and give an error prompt. Copyright© Information2 software IncSystem Setting "Password validity period (days)": to define the duration when i2ControlServer forceful reset the password. After expiration, the password needs to be reset when doing login attempt. 3.3.3 Email  Email Notification: Enable mail notification service.  SMTP Server Address: SMTP Server Address.  Using SSL to connect: Whether to connect servers with SSL or not; Attention should be paid to the coordination of SMTP server ports.  SMTP authentication required by default": By default, it needs to be turned on. For some self-built mail servers, SMTP authentication is NOT required.  SMTP Server Port: Usually the ports of non-SSL connections and SSL connections are different.  Email Accounts: The account to send mail.  Password: When sending mail with this account, SMTP server needs to authenticate. This password is used for SMTP server authentication. Send mail test: Send Test Email to the current login user''s mailbox using the SMTP settings on the page. The current login user''s mailbox settings are modified by user management. Copyright© Information2 software IncSystem Setting 3.3.4 SMS Cloud SMS alerts: Enable Short Message Alarm function by the cloud based SMS platform. SMS Platform: At present, it supports Ali Cloud, ESK Platform and Huawei Message Notification service. 1. Ali Cloud AppKey: It is necessary to register account in Ali cloud to enable and obtain APPKey in the application management of management console. SecretKey: In Ali Cloud Platform, SecretKey is acquired in the application management of the management console. Signature Name: Get the signature name in the configuration SMS signature of Ali SMS notification in the configuration management. SMS Template ID: Short Message Template ID defined by Ali cloud. 2. ESK platform "ESK Service Address": Format: "SERVER_IP: SERVER_PORT" (e.g. 192.168.1.100:8080) "User Name": ESK Platform User Name Password: ESK platform login password Copyright© Information2 software IncSystem Setting 3. Huawei News Notification Service Huawei Account Name: Huawei Account Name is not a user name. Visit Huawei Cloud platform, under basic information interface - > management of my credentials - > View "account name". Belong to the region: cn-north-1, cn-south-1 or cn-east-2. https://developer.huaweicloud.com/endpoint URN of the theme: created by Huawei Cloud Console, urn string SMS Template ID: Huawei SMN Message Theme Template Note: Huawei Message Notification Service is not a simple SMS service. You need to create a theme first, and all applications can send messages to it, and the theme will be notified to "subscribers". So, unlike the SMS and notification of the existing console in the enterprise version, you need to create a theme and add subscriptions to the console in Huawei. The following are the main steps in setting up Huawei Message Notification Service: 1) Create a theme first 2) Create a template with type selection SMS; Huawei requires that a template with the same name as Default be created at the same time. 3) Adding subscriptions, where the protocol can choose SMS, e-mail and others 3.3.5 Advanced Ignore Mirror Settings: When turned on, the mirror stage is skipped when rules are created. The replication process will directly run to capture and replicate the incremental data changes. This works for certain scenarios that do NOT require to copy huge amount of historical files or directories to the backup server. Copyright© Information2 software IncSystem Setting Online Upgrade:Allow i2 nodes agent to get upgrade online, including production and backup server. Copyright© Information2 software IncSystem Setting 3.4 License 3.4.1 License List Through the license list page, licenses can be added, updated, deleted, modified binding and other operations: "SN": the unique string generated based the i2ContrlServer. "Authorization type": includes trial version and official version; "Product name": the name of the license, usually it is i2soft; ‘Company”: the vendor name of i2soft; "Expire": for trial edition license, it is trial period; for formal license it works for maintenance and warranty period; for service edition, it is for the for the validity period of the license; "Feature": the respective function activated in the imported license; "Authorized item": The maximum quota and usage allowed under the current license; it is classified into virtual node number, physical node number, migration number, virtual machine protection number, etc. "Operation": The operation on the license includes view, download, delete, and upgrade; "Search": In the search bar in the upper right corner of the page, you can also enter the corresponding serial number to search for the corresponding license if there are multiple license imported. Copyright© Information2 software IncSystem Setting 3.4.2 Add License First, click on the "View Identification Code" button to obtain the identification code of the i2control server and submit it it to the i2 company support personnel to generate the license for the use of the i2ControlServer. Note: For the i2ControlServer that can not access the Internet, before adding full server protection license and full server migration license, the node identification code should be submitted in addition to the identification code of the i2ControlServer. 1. Click on the "Download Node Identification Code" button; 2. Select the production server that needs to be bound to the license; 3. Click on the "Download Identification Code" button; 4. Submit the downloaded content to the i2 company. This will include the identification codes of these i2 nodes agents in the generated license. When the new license is added to the i2ControlServer later, only those i2 node agents already included previously will work and have the feature enabled. After getting the license documents from our company, click the "Add" button on this page of the WEB page, and pop up the Add License window: Copyright© Information2 software IncSystem Setting "Software Registration Code": You can choose to copy all the text in the license file and paste it into the "Software Registration Code" column, and click "OK" to add the license. License File: You can also add licenses by dragging the entire license file into the "License File" column and clicking "Upload"; 3.4.3 License Binding Click the "View" button, pop up the license binding details, check the nodes and virtual platforms that need to be bound, and click "Update Binding" to do so. Copyright© Information2 software IncSystem Setting Name: The name of the registered i2 node agent or the name of virtual platform registered on the i2ControlServer. Resource type: i2 node agent or virtual platform (VP); OS: Windows, Linux; Bind with the current license or not: whether the current license has been bound to this node. Note: Each license has its quota of licenses, such as the number of virtual machines, the number of physical machines, the number of migration hosts, where the bound units can not exceed the quota included in the licenses; For full server protection license and full server migration license, users only need to bind with the production servers which installed the i2 node agents (backup servers are NOT required to bind); 3.4.4 License Upgrade License update is the operation to enable new functions upon the previous license imported, or increase the quota of i2 node agents. There are 2 methods, "online updating" which requires the access to the Internet, and offline upgrade by the button "upgrade" which requires users to get license file separately from and import to i2ControlServer here. 3.4.5 Online Update Click the online updating button at the bottom side, the i2ControlServer will automatically query the latest version of all licenses, and automatically update to the i2ControlServer. After it’s finished, prompt will be displayed. 3.4.6 Offline Upgrade Click "Upgrade" on the right side bar after each group of licenses, and a license update window will pop up. Copyright© Information2 software IncSystem Setting Activation Address: users need to access this Activation Address on other PC that can access to the Internet. "SN", "Secret”, "Identification Code": there three items are used to update license file. Users first access the i2 activation portal (https://lic4.info2soft.com/i2/activation.php). Fill in the content of SN, Secret, Identification Code to the i2 activation portal, and click "Submit" to get the updated license file. "Trial Upgrade Official": If you need to upgrade "Trial Edition" license to "Official Edition" license, you also need to check this option. This operation will add "Official Edition" license as a new license, and automatically transfer the binding relationship on the trial version to the official version. The old trial version license will remain unchanged. "Registration Code": You can choose to copy all the text in the license file and paste it into the "Software Registration Code" column, and click "OK" to update the license. License File: You can also update the license by dragging the license file into the "License File" column and clicking "Upload". Note: i2 activation portal (https://lic4.info2soft.com/i2/activation.php) This portal is maintained by i2 company, and it’s public accessible. Each i2 customer can access this portal to update their license following necessary contract requirement. For the details, please contact to out sales representatives. Copyright© Information2 software IncSystem Setting 3.4.7 License Download If you need to download some licenses on the computer for archiving purposes, you can click the "Download" button on the right operation bar of the license list, and then click the link to download in the pop-up download address window. Copyright© Information2 software IncSystem Setting 3.4.8 License Deletion If you need to delete some licenses, you can click the "Delete" button on the right side of the license list, or check the licenses that need to be deleted, and then click the "Delete" button at the bottom of the page to delete unnecessary licenses. Note: If the license is deleted, all the rules will be stopped and can NOT be used anymore. It’s designed for special cases, such as clean up the unnecessary trial license before adding a total new license with different feature sets enabled. Please be careful before this operation. 3.5 Operation Log The log records of the operation are tracking all of the user''s all web operations, including user''s rules creation, modification and deletion of nodes. To facilitate the administrator to manage daily tasks, logs can NOT be removed, but it’s allowed to view and download. Copyright© Information2 software IncSystem Setting Copyright© Information2 software IncResource 4 Resource 4.1 Group Group management is managed by grouping nodes into groups, in which nodes for the same purpose are divided into the same group. 4.1.1 Group Name: User-defined name for easy management Group Type: Nodes belong to group types, including "node or cluster", "comparison and synchronization", "rules", "restore", "full service protection", "timing", "NAS synchronize", "virtual machine platform", "virtual machine backup", "virtual machine recovery", "virtual machine migration/replication". For the operations available for group management, from left to right are as follows: Copyright© Information2 software IncResource "Modify": Modify the name of the current group and group type "Settings": Add rules, platforms, nodes or clusters to the group that belong to the group Delete: Delete the group 4.2 Node About the process to add Node. Click the "New" button to enter the new page of the following nodes. Enter relevant machine information here: Copyright© Information2 software IncResource "Name": The name of the node named for easy management Management Address: The management address is the IP address used by the node (production server or backup server) to communicate with the i2ControlServer. If the production server has multiple network cards, users can configure different network cards for different purpose, such as NIC1 for management and NIC2 for replication data transmission. "Management Port": The management port is the port used by the node to communicate with the i2ControlServer (default is 26811), which can be inquired by i2port.conf in the etc directory under i2Node installation path. In Windows, path is < installation path >\ etc i2port.conf; in Linux, path is / etc/sdata/i2port.conf; "Data Address": The IP address where the production server communicates with the backup server and transmits replicated data. Username: The login account of the corresponding node operating system. i2 software supports domain user authentication of Windows O/S, and the format of Windows domain user name is: \. Password: The login password of the username. "License": Different licenses determine different features that can be operated on different nodes. The license options available in the drop down list are managed by the License> menu. If no options here are selected or displayed, nodes can Copyright© Information2 software IncResource be added successfully still. Users can visit the menu ‘license binding’ to attach the license onto that specific node later on.  "Business Group": Select the group for the node.  "Node Log Dir": the directory where i2 agent stores the logs generated.  "Backup Dir": the directory used as buffer. Generally, data is directly captured from the production server’s memory and transmitted to the backup server. However, under some abnormal circumstances, such as network interruption, insufficient bandwidth, backup server abnormally gets offline, big size files to replicate, etc., the production side data can not be delivered to the backup server in time. During a period, part of the data has to be cached from production sender memory to its local disk, to ensure that the i2 agent can run normally and keep the data integrity.  "RAM Max": The upper limit of memory allocated to i2 node agent for data caching in memory level.  "Hard Drive Max": The upper limit of disks allocated to i2 node agent for data caching in disk level. Note that if the value is set to 0, it means no disk caching. Once the caching data exceeds the size of the defined memory cache limit, the i2 node replication rule will automatically stop, thus assuring the protection of production server resources. After the i2 node replication rule stops, the administrator needs to verify the system or resources to fix the problem, and then start the replication rule manually to resume the data replication.  Rep. Path/Excluded rep. Path: The path where the target replicated data is located. If the production server is a Linux system, users need to specify the source path here; if the production server is a Windows system, it’s not required. When users create the replication rules later, they can choose the path by themselves, and the replication path is optional. If there are some directories to filter, users need to add this directory to the exclusion path. Copyright© Information2 software IncResource Note: If the i2nodes are Linux O/S, user must ensure that the "copy path" contains the objects involved in the file system operations to be monitored. For example, in the case of rename operations, the source and target of rename should be included. Usually the "copy path" is set to the root directory. When the exclusion path is selected, when the exclusion path is added to the replication rule, in the mirror stage the data under the directory excluded will be synchronized still, but the incremental data in the replication stage will not be replicated. If the i2node module works properly and the communication between the i2ControlServer and the node is normal, the node status will be displayed as "online" status. i2 node agent will refresh the status information regularly. There are four buttons available: modify, delete, view disk space, view log, and system state. Only when the node is not involved by any replication rules can it be modified or deleted. 4.3 Cluster At present, i2 software supports the protection of Windows Cluster. Its topology is as follows: For the protection of MSCS cluster, just install the i2 agent on each cluster node and configure it according to this document, then we can protect the contents of Shared Storage of Cluster and backup the data from the shared disk to the designated backup server in real time manner. i2 software currently supports the protection for Windows 2003 and Windows 2008 Cluster. Copyright© Information2 software IncResource 4.4 Storage Through storage management, we can see how the storage resources of all online machines are used. Copyright© Information2 software IncTemplate 5 Template 5.1 Full Server Backup 5.1.1 New Users can simplify the process of establishing full service backup rules by template. In the full service backup page, you can simplify the operation of establishing rules by enabling templates. The contents of templates can be automatically filled into the configuration page such as below i2ControlServer management interface, through template management - > full server backup template, to create / modify the template, the new / modify template page is as follows: Copyright© Information2 software IncTemplate Name: The name of the template named by the customer is easy to manage. Source Type: value of ‘file’ indicates the usual file based backup. 5.1.2 Mirror Refer to the advanced property under Replication 5.1.3 Compress & Encrypt Refer to the advanced property under Replication 5.1.4 Strategy "Instant": After establishing the full server backup rules, the rule will be executed immediately. "Once": it’s a one time job backup; "Regular": Set up the backup task to execute periodically. Copyright© Information2 software IncTemplate 5.1.5 Bandwidth Refer to the advanced property under Replication 5.2 Full Server Restore 5.2.1 New Template The user through the template can easily establish rules; i2ControlServer management , through template management - > full server restore template, to create / modify the template, the new / modify template page is as follows: Name: The name of the template named by the customer is easy to manage. 5.2.2 Network Copyright© Information2 software IncTemplate "Synchronize the production node network configuration to the backup node": Users can choose to synchronize some or all of the network cards when the host contains multiple network cards. "Network card mapping": user-defined, the corresponding relationship between host and standby network configuration for individual network card. "Keep network settings of the backup node, and do NOT synchronize network configurations": that is to bypass the network configuration and parameters. 5.2.3 Restore "After synchronization, continue to monitor and synchronize until user’s manual switch": since the replication rule is still associated with the production node and backup node in real-time manner. During the restoration process, user may determine the exact time to fail over. "Automatically switch to backup server after system and data synchronization": This function is not provided for the time being. 5.2.4 Bandwidth Refer to the advanced property under Replication Copyright© Information2 software IncTemplate 5.2.5 Template List For the operations available to the template, from left to right are as follows: Modification: Options other than template names can be modified "Delete": Delete the template 5.3 Replication Template - >Replication: The new template reference page is as follows, the process is basically similar: Refer to the advanced property under Replication Copyright© Information2 software IncFailover 6 Failover i2 high availability function provides application level high availability. Application High Availability mainly aims at providing high availability services for various applications. Monitoring can provide protection of multiple high availability rules. Monitoring objects can be master node, slave node or simultaneous monitoring. Arbitration mechanism is introduced to avoid wrong handover of master and slave nodes due to network and other reasons. Meanwhile, data synchronization is added to high availability to achieve high data synchronization association. For example, both master and slave nodes have installed SQL Server 2005, and high availability of SQL Server 2005 can be achieved by using i2 application high availability function. When the service or process monitored by the master node fails, the master node will become the slave node. The Association replication rule from the original master node to the original slave node stops, the master node upgrades to the master node, and the association replication rule from the new master node to the new slave node opens. Now it’s clear how i2Availability protects data integrity at the data level. Furthermore, since all the replicated data at the backup server is with the original data format, it reduces the RTO to minimum if recovery is required. Administrator can either copy back the data from backup server to production server, or directly load the data at the backup server. This is very competitive against traditional backup solution that requires reverse operation to restore the backup data first which extends the RTO a lot. i2Availability not only covers the data level replication, but also offers a disaster recovery or centralized backup solution for any application, such as transaction-based database, without the need for expensive application-specific agents. The next question is how to provide immediate availability of the application from the backup server for high availability. Copyright© Information2 software IncFailover i2Availability provides a very straight forward method for failover in situations where the application is NOT "cluster-able", where a client has chosen to not implement MSCS or the hardware may not support clustering. In addition, because deploying a cluster usually cannot be done "on top" of an existing running server, many customers prefer the less obtrusive approach to simply building a second server which is Active/Standby mode. The backup server is to fail over for the production server during an outage. The only thing administrator needs to prepare first, is to setup and configure the same application systems on the backup server, which is usually the same O/S and same applications as the production server. Remember, before the HA setup works, initially the backup server only runs i2Availability agent background in O/S, and MUST shutdown the application service because it’s Active/Standby mode HA where the standby one does NOT run application service at all. Note: In the absence of arbitration, if the network between the master node and the slave node fails and other networks are normal, two master nodes may be seen on the interface of the i2ControlServer, resulting in IP conflicts and other phenomena, which are normal phenomena. The way to avoid this trouble is to set arbitration for rules. 6.1New Failover Rule In the management interface, high-availability rules are added/edited by applying Failover> Availability. Applying high-availability rules to add/edit pages is as follows: Copyright© Information2 software IncFailover Basic Settings Copyright© Information2 software IncFailover "Name": identification string of the rule, easy to manage; "Node": Nodes can not be the same machine, multiple nodes can be added into the HA group. When the priority is the same, the initial master node is meaningful, otherwise the high priority will become the initial master node. "Automatic Switch": When this option is enabled, when the HA rule reaches the handover criteria, it will automatically switch from the master node to the slave node; when it’s not checked, when the HA rule reaches the handover criteria, it will prompt warning information in the interface rule state but NOT act. "Arbitration": There are 3 options, ‘None’, ‘Node’ and ‘Disk’. When checking disk arbitration, we need to set up an arbitration disk. When checking the node arbitration, we need to set up an arbitration IP address. The host of the arbitration IP needs to install i2 node software, and the i2Availability process runs normally. When all heartbeats fail, we need to use the arbitration Copyright© Information2 software IncFailover mechanism to judge who can take over the resources. "Heartbeat": The communication between HA nodes is responsible for information communication and heartbeat detection between HA nodes. There are several UDP, TCP and Ping heartbeat lines between HA nodes, ports used by heartbeat, IP address of network card can be customized. Note: The current version uses TCP as the communication type. Copyright© Information2 software IncFailover "Data": Setting the data synchronization option of HA rules association, you can see the replication rules in replication management, you can also modify the stopped replication rules in replication management. Only the replication rules from master node to slave node can be activated, and the rule state of HA will lead to the change of the corresponding association rules. "Start the rule right after creation": When submitting HA rules, the replication rules from master node to slave node will be automatically started; "Do not fail over unless the rule is in replication state": The HA handover is allowed only when the associated replication rules are in the replication state; "Failback Rules": When checking the this option, HA rules create two associated replication rules from backup node to production node. "Start Replication Rules automatically": When checked, when HA switches, the associated replication rules will be automatically started; Copyright© Information2 software IncFailover Note: Make sure that both source and target are directories in the rules Application Resource monitoring consists of master node resource monitoring and slave node resource monitoring. When monitoring slave node, it can only conduct warning processing without switching. Monitoring object can choose service, process, memory, CPU, custom script, disk monitoring mode. When selecting process monitoring, you can choose to fill in the process name or process number. When only warning is given after checking fails, if an exception Copyright© Information2 software IncFailover occurs to the monitored object, a warning message will be generated in the log, which will not lead to handover. Multiple monitoring objects can be created, each monitoring object is independent, any one of which meets the switching requirements will cause switching. "Write exceptions into logs without other actions": when it’s enabled, the regular action is warning, not checking is switching; Copyright© Information2 software IncFailover Attention: 1. When customizing script monitoring, the added script file will be executed regularly once. Note that the execution time of the script must not be greater than the "interval time"* "maximum number of failures", and the script must return. 2. Custom script monitoring, the monitoring output will be file. If the file is written in false, it will cause switching or warning. Note that false must be the first five characters of the text, and the rules written in the file are true or other times will not change. 3. The script must be stored in the path specified by the master and slave nodes: On Windows, the root directory of the script is: scripts Linux, and the root directory of the script is: / etc/sdata/scripts. You can create sub-directories in the script root directory. Windows scripts must be batch files suffixed with. bat or. cmd. Linux scripts must be executable files (they must have executable properties). Copyright© Information2 software IncFailover If disk monitoring is Windows, add ":" When monitoring C disk, add C when character selection: If Linux, add the directory to the volume group or partition where the directory is located. Switch Copyright© Information2 software IncFailover "Resource switching": Resource switching is divided into script switching resources and virtual IP. In resource switching script, when the master node resource monitoring result is abnormal, the master node and the slave node need to switch in negotiation. When the master node switches to the slave node, the resource needed to release will execute the "Execute scripts to release resources", thus switching itself to the slave node and the slave node to the master node. When acquiring resources, it executes "Execute scripts to activate resources", so that we can upgrade ourselves to the primary node. Note: The script must exist on both primary and slave nodes and be placed in a specified directory on Windows. The root directory of the script is i2Soft installation Path scripts On Linux, the root directory of the script is: / etc / sdata/ scripts You can create sub-directories in the script root directory. Windows scripts must be batch files suffixed with. bat or. cmd. Linux scripts must be executable files (they must have executable properties). The virtual IP configuration is as follows: Copyright© Information2 software IncFailover Copyright© Information2 software IncFailover 6.2 Failover Rule List By applying the list of highly available rules, users can monitor the status of the application of highly available rules, as follows: Applying high availability rules includes the following states: Running: High Availability Rules Running normally; Ready: Ready to Start Mirroring Mirroring: a mirror process after setting up data synchronization is ongoing. Handover: The handover condition is reached and is being switched to slave node Ready: Rules are in place Stop: Rule is stopped. Warning: When automatic handover is not checked, the slave node will display the warning status when the handover standard is reached. "DATA_UNSYNC": When there are association rules and the association rules are in a stop state, or other abnormal state, the data is not synchronized Unknown: The corresponding node downtime occurs in an unknown state for the operations available for the application of high availability rules, from left to right as follows Start: start rule; Stop: Stop Rule; Modify: Modify the high availability settings; Delete: Delete rules; Log: View Rule Days Copyright© Information2 software IncFailover Switch: user can forcefully switch from slave node to primary node Copyright© Information2 software IncFailover "Replication Rule": When the replication rule corresponding to the master node stops, the "Replication Rule" button will appear. Click on the pop-up box to start and modify the replication rule. The operation after the node only operates on the corresponding node, only the corresponding node can be operated and the log of the corresponding node can be viewed. Attention: Properly set up firewall policy to ensure that the firewall does not affect the communication between the control IP and the management IP of each node. Keep the HA controller in operation to ensure that the node machine is in the correct state after restart. Copyright© Information2 software IncToolBox 7 ToolBox 7.1Diagnosis When the software runs in abnormal state, in order to locate the problem more quickly, a practical diagnostic tool has emerged, which can be divided into network state detection and rule detection. Network diagnosis is mainly aimed at the connectivity of production server node, disaster standby node and control node, including the connection test of IP and port, and feedback to the interface of production server and disaster standby memory space. Rule diagnosis can not only check the connectivity of the corresponding rule production server backup server, but also collect the log information of nodes, system log information and dump file if the software process runs abnormally. Network diagnosis is as follows: Rule diagnosis is as follows: Copyright© Information2 software IncToolBox Following successful establishment: Detailed diagnosis can be continued, and the time required for diagnosis varies from environment to environment. The downloaded information can be sent to technical support or other relevant personnel to facilitate later problem handling. Task diagnosis is the same as rule diagnosis. Copyright© Information2 software IncToolBox 7.2 Compare Sometimes, users will have be concerned about the consistency between data on the production server and data on the backup server. The comparison function can compare data on the production server and data on the backup server and give a report. Through this comparative report, users can judge whether the data of production server and backup server are consistent. It should be noted that for changing files, the report may show inconsistencies between production server and disaster preparedness, but this does not mean that i2 real-time synchronization problems. Therefore, when comparing data, we recommend that it be done only when there is no data change on the production server, so that the report is more accurate. 7.2.1 New Click on "New Task": Copyright© Information2 software IncToolBox "Type": Compare only the data of production server and backup server, and record it in the report if the data is inconsistent. Automatically synchronize the file from production server to backup server refers to record the file and synchronize the file from production server to backup server when the comparative task finds that the file on production server is inconsistent with the corresponding file on backup server. "Method": file size & Update time, according to the file size and modification time to determine whether the data on the production server and backup server is consistent; this comparison method is more efficient, but less accurate than strict verification. ‘MD5 checksum” is an inefficient but reliable way to judge the consistency of data by calculating the MD5 value of files. "Strategy" Instant, submit tasks to start comparing immediately; Once, make an appointment time to run the comparison task at a specified time in the future, run only once; Regular, to perform comparative tasks on a regular basis. 7.2.2 Task List Copyright© Information2 software IncToolBox After the task is submitted, the task list shows the progress of each task. Note: In order to reduce the consumption of production server resources, a replication rule can only start a comparison task at any time. 7.2.3 Compare Results The results are as follows by clicking on "Compare Results": Copyright© Information2 software IncMessage 8 Message 8.1All Users can get alarm notifications under the corresponding module through all messages, unread messages and read messages under the message center. All messages show the notifications and alarms of all modules. Click on the message notifications of different modules to switch to corresponding functions as follows: The unread message module only displays the message that the user has not read and the read message only shows the message that the user has read as follows: The abnormal messages of each module are displayed under each tab page, and enter the message details by clicking on the title content: In the message details, you can see the status and details of the corresponding node Copyright© Information2 software IncMessage exception, VP exception, rule exception, cluster exception, patrol notification, etc. 8.2 Settings Users can choose whether the corresponding module receives the information in the station, e-mail information or short message from the mobile phone through "Message Notification Management", and save the configuration through the "Save Configuration" button. Click on the "Settings" button on the right side of the "Inspection Notice" to set the strategy and date of the inspection notice: "Reminder": Send Patrol Reminder Notification Monthly or Quarterly Click the "Settings" button on the right side of the "Overall State" button to set the strategy and interval of the notification of the overall status. Copyright© Information2 software IncMessage Overall State Setting: sending global status notifications by hour or by day With "More Settings", you can set: Maximum Notification Times: Number of messages a user receives Reset Notifications Times: Number of messages received by reset users (if the number of notifications is limited to 5 and has been sent three times, then the number of reset notifications, the number of times cleared 0, the message will be re-sent five times) Modifying Contacts: Including Current Users, Ordinary Contacts, Patrol Notification Contacts, Contact Phones of Overall Status Contacts and Mailboxes Copyright© Information2 software Inc">
To view the full page, please visit: i2UP Product Userguide

i2UP

i2UP is able to manage domain-wide data and applies to many business scenarios, including big data and multi-cloud platforms.The software supports multi-tenant mode, saves server resources, and features a visual operation interface.
Buy now