This article consists of some of the few basic topics which beginners should know before they start learning bladelogic.
Let's make this a searchable document.
High availability is a system design approach and associated service implementation that ensures a prearranged level of operational performance will be met during a contractual measurement period.
In information technology, high availability refers to a system or component that is continuously operational for a desirably long length of time. Availability can be measured relative to "100% operational" or "never failing." A widely-held but difficult-to-achieve standard of availability for a system or product is known as "five 9s" (99.999 percent) availability.
High Availability (HA) solutions can be categorized into local high availability solutions that provide high availability in single data centre deployment and disaster recovery solutions which are usually geographically distributed disaster recovery solutions.
Since a computer system or a network consists of many parts in which all parts usually need to be present in order for the whole to be operational, much planning for high availability centres around backup and failover processing and data storage and access. For storage, a redundant array of independent disks (RAID) is one approach. A more recent approach is the storage area network (SAN).
Some availability experts emphasize that, for any system to be highly available, the parts of a system should be well-designed and thoroughly tested before they are used. For example, a new application program that has not been thoroughly tested is likely to become a frequent point-of-breakdown in a production system.
DISASTER RECOVERY SOLUTION
Disaster Recovery is a subset of business continuity which ensures protection of critical data, applications, and complete systems in case of a disaster.
Disaster recovery (DR) is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions.
• Ensuring critical data, applications, and complete systems are protected in the case of a disaster
• Providing disaster recovery for production applications in virtual server environments
• Reducing the complexity of managing heterogeneous server and storage platforms
• Reducing the costs of building and managing disaster recovery infrastructure
IT disaster recovery control measures can be classified into the following three types:
1. Preventive measures - Controls aimed at preventing an event from occurring.
2. Detective measures - Controls aimed at detecting or discovering unwanted events.
3. Corrective measures - Controls aimed at correcting or restoring the system after a disaster or an event.
Good disaster recovery plan measures dictate that these three types of controls be documented and tested regularly.
CONTINUITY OF BUSINESS
It assures quick recovery from disasters while improving availability of key business systems.
It is the activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities that must have access to those functions. These activities include many daily chores such as project management, system backups, change control, and help desk. Business continuity is not something implemented at the time of a disaster, Business Continuity refers to those activities performed daily to maintain service, consistency, and recoverability.
Therefore, a business continuity plan is a roadmap for continuing operations under adverse conditions (i.e. interruption from natural or man-made hazards). BCP is an ongoing state or methodology governing how business is conducted. In the US, governmental entities refer to the process as continuity of operations planning (COOP).
FIREWALL: A firewall is a software or hardware appliance that is used as a line of defense between your computer and the external threats from the internet. In a computer network, a firewall solution is usually implemented at the gateway computer to block the threats like intruders, hackers, viruses and unauthorized access.
1. Monitoring inbound and outbound traffic.
2. User’s authentication.
3. Ports blocking
4. Bandwidth management
7. Spam Filtering
8. URL Screening
It is a software which is installed on your computer used for protecting it from hackers, unauthorized access, virus, Trojans, etc on thye basis of some predefined list.
[Software firewalls are predefined list of good programs that are installed. When a request from a program is not in the firewall's white (good) list, it asks whether it should allow the program to communicate with the internet and you usually answer yes (unless you do not know the program that started the request).]
A Hardware firewall is a physical device with physical elements like RAM, flash, processor, Ethernet ports,etc. It is used for one or more systems by connecting it to a network, and it takes care of the whole network computers. Hardware firewall supports VPN(Virtual Private Network) which is most secure way of accessing your local network from remote site. People who are allowed in VPN tunnel only they can access your ftp server …etc.
[A hardware firewall acts as a gateway to all the computers inside the LAN. Configuring & making changes applies to the gateway only.For example say the policy is to block all inbound connections to port 21,simply blocking port 21 at the firewall gateway will block all inbound traffic that is directed to the ftp port 21 inside the LAN. ] Hardware firewall supports VPN which is most secure way of accessing your local network from remote site. People who are allowed in VPN tunnel only they can access your ftp server …etc.
a computer that acts as an intermediary between a client machine and a server, caching information to save access time.
Application server : Server on which various applications like security, management, etc are installed.
Network Shell : A cross-platform shell with scripting capability that gives seamless access to remote servers from central management workstations.
Job Server: A job is a set of instructions for performing a task on one or more servers, while a Job server enables a system to perform a large amount of jobs at the same time.
Configuration Server: It provides connectivity between different servers and enable them to function together.
Key store file: It consists of key store password assigned while installing the application server, it is used to sync one or more application servers together by enabling them to share a same Data Base. This is done by copying the key store file from the primary application server to the same location of the target application server or servers.
Data Base Server: It is a server on which data base is installed and it provides data base services to the servers or clients connected to it.
NTP server : It is a Network Time Protocol used for clock synchronization between various Computer systems.
Configuring Application Servers on different hosts
1. Install and configure an Application Server on one host machine and link it to a database, and note the key store password.
2.Install additional Application Servers on other physical machines, providing the same key store password used by the first Application Server, and pointing to the same database and file server.
3.Copy the bladelogic.keystore file from the directory from the first Application Server host to same location on the new Application Server.
[ The file location is <installationDirectory>/NSH/br/deployments/_template/bladelogic.keystore.]
4.Ensure that the time on all Application Server hosts are synchronized. BMC recommends that you configure the Network Time Protocol (NTP) service to point to the same NTP server.
5.If you have more than one Application Server running on each host in a multiple host environment, ensure that you synchronize the keystore files and the corresponding password for all deployments.
6. Start the Application Servers.
1.Install IIS : Goto Server manager and select roles, check IIS services
3.Install PXE (for BL) : PXE-8_2-111 installation
Download PXE-82-SP1-Win 32
4. Enable Directory Browsing in IIS
5. Configure DHCP and add bl-server and its port in DHCP Scope.
6. Copy RHEL O/s tree in pxestore folder: Create a folder RHES5 in Pxestore and copy all the data of RHEL5 in it.
7. Copy gentoo32 folder in tftproot/X86/pxelinux folder
8. Configure – Provisioning Configuration : Goto Bladelogic Console , goto configuration and select Configure provisioning
9. Create instance in property dictionary.
10. Create system package : Input the 5 corressponding entries, which are location,username, password,Full_path, virtual directory.
11.Add Device : add the MAC address of the bare metal
12. Create provisioning job
13. Execute provisioning job
14.Boot bare metal from pxe.
1. Prerequisites : 1. OS tree must be present
2. IIS services must be installed
3. Provisioning files must be present
4. Enable dictionary browsing
5. WAIK must be installed
2. Install PXE : double click the PXE setup file and install PXE server.
3. Create a folder in pxestore : extract contents of OS Tree in that folder using Power ISO software
4. Provisioning Image Creation : Go to Bladelogic Console > Configuration > provisioning image creation , create a boot image
5. Provisioning Configuration
6. Database Instance Creation : Go to Bladelogic Console > Configuration > Property Dictionary View > built in property classes > data store > PXE datastore >select instance tab and create Instance.
7. Create System Package : Make sure TFTP and PXE services are started
8. Add Device : add the MAC address of the bare metal.
9. Create Provisioning Job
10. Execute Provisioning Job
11. Boot the bare metal.