Chapter 5-

CST Administration

This chapter provides an overview of the Configuration and Service Tracker (CST) software for version CST 3.5. It includes the following sections:


User and Group Management

Access control is implemented to enhance security when viewing and annotating data. This security feature allows only authenticated users to view and annotate the CST data by providing a login session when a user accesses the CST console or applet. The user needs to have a Unix login account on the middleware host in order to access CST data. When prompted with "Username" and "Password", login as he, or she, would log into the host through the login Unix command.

 FIGURE 5-1 CST Login Screen

Dialog box requests User Name and Password. Two buttons are available: Log In and Clear.

Each CST 3.5 user is assigned a login and a user access level.

CST Access Control List (ACL)

In addition to the usrname and passwd check, CST includes its own access control. Each user belongs to a group, either cstadm or cstops.

To Create a cstadm or cstops Group

1. Become superuser on the server system.

2. Create the desired group. Type:

# /usr/sbin/groupadd cstadm

or

# /usr/sbin/groupadd cstops

To Become a cstadm or cstops User

1. Open the /etc/group file in a file editor.

2. Add your login name to the cstadmin or cstops group in the /etc/group file.

3. Save the file and exit the editor.

Following is a sample /etc/group file:

root::0:root
other::1:
bin::2:root,bin,daemon
sys::3:root,bin,sys,adm
adm::4:root,adm,daemon
uucp::5:root,uucp
mail::6:root
tty::7:root,tty,adm
lp::8:root,lp,adm
nuucp::9:root,nuucp
daemon::12:root,daemon
sysadmin::14:
nobody::60001:
noaccess::60002:
nogroup::65534:
cstadm::99015:joe
cstops::99016:gwen,tom

Access Control in the Sun Management Center Framework

CST user access levels are an extension of the Sun Management Center access levels. This security measure allows access control to the CST console.



Note - The user access control functionality is available in both the Sun Management Center add-on and stand-alone CST 3.5 versions.



The Sun Management Center security feature authenticates login and access control privileges for users and groups. It enables users to set security permissions at the administrative domain, group, host and module levels. You can restrict access to different groups by setting different permissions. To access Sun Management Center security features, select the Attribute Editor option under the Sun Management Center Tools menu.

Sun Management Center has three levels of access for user accounts:

For more information about Sun Management Center access levels, refer to the Sun Management Center 3.0 Software User's Guide.

A Sun Management Center general user has read-only permissions as a general CST user. Any level of user can open a CST console and view its data. A general user can select buttons and icons to view information, but cannot affect or edit the comments. See TABLE 5-1 for a list of permitted actions.

In addition to this, CST has two levels of its own: cstadm and cstops. Currently, these levels have identical privileges. cstadm and cstops have lower privileges than the Sun Management Center Admin level, and only affect CST data. Only a system administrator with root privileges can add or delete users for the CST-specific levels.

The cstadm and cstops user levels have access to all privileges in the CST console. The primary difference in permissions is that a cstadm can create cstops users and groups and cstadm users and groups. See TABLE 5-1 for a list of permitted actions.

To Set CST Access Levels

TABLE 5-1 Abilities of CST Access Levels

Task Performed in CST

Allowed to General User

Allowed to cstadm/cstops

Select a system to view

X

X

Bring up the CST console

X

X

View the History file

X

X

View all events

X

X

Trigger manual refreshes

X

X

View the Status Panel {System displayed, System status, CST status)

X

X

Click CST logo for software information

X

X

Add/edit event comments

 

X

Create service events

 

X

Create and save entries in the Admin dialog box

 

X

Edit Custom Information

 

X

Edit Event Reason

 

X




Note - If a user is not added to cstadm or cstops, the user cannot log into CST. An error message, "ERROR: not authorized to access CST" displays in the login session.




Site Registration

CST 3.5 has a built-in feature to send all collected CST data to a secure database in Sun. The benefit of sending the data to Sun is to enable generation of detailed availability and configuration reports using the data collected. The reports are enriched by the use of normalized data from multiple customer sites and can provide insight into the overall availability of systems in the enterprise. These reports can be obtained with the help and interaction of your local Sun representative. For more details about the benefits of this registration, contact your local Sun representative.

Before this feature can be enabled, the user must register the site with Sun and enable data flow from the CST server to Sun. The registration process can be completed through the Site Info Dialog window.

There are three tab folders within the Site Info Dialog window: Customer Contact Info, Sun Contact Info, and Registration Info. All three screens need to be filled in to configure your environment. See the CST Features and Functions chapter, Site Information section, for details on entering your site information into these screens.

 FIGURE 5-2 Site Registration, Customer Contact Information Screen

Registration Info screen with Customer Contact Info tab selected.

To Prepare for Registration

You must set up the environment. In particular, ensure that the server has the ability to send email to the outside world.

To Fulfill Registration Prerequisites

1. Ensure all fields in the Customer Contact Info. and Sun Contact Info. of the Site Info Dialog window are completely and accurately filled in.



Note - The alternate contact info. is not mandatory.



2. Since the registration key will be sent to the system administrator's contact email address, this information must be correct. If the contact email address is incorrect, the key will be lost.

 FIGURE 5-3 Site Registration - Sun Contact Information & Registration Information Screens

Two screens display Sun Contacts and Registration Info screens.

3. Ensure the agreement is fully read and understood. Once you have read and agree, check the AGREE TO THE AGREEMENT box.

4. If setting up an account for CST in the middleware server is acceptable, CST will set up an account and use it as sender to transmit the data from that account. It can also receive email coming in and can be used in future to provide automated reporting and other services. If this is acceptable, select the SETUP CST ACCOUNT button. Selecting this flag is optional.

To Submit Registration

1. On a successful submit (if all mandatory data fields are completed) an email is sent to the Sun representative identified in the Sun Contact Info. that includes all the data entered in the Admin Dialog box.

2. The Sun representative will confirm that the installation is adequately set up for sending data to Sun and that all the mandatory fields have appropriate information.

3. Once confirmed, the Sun representative will forward the email to Sun for a registration key and a customer ID.

4. When granted, the registration key and customer ID are forwarded by email to the address given in system administrator contact email address.

5. Access this information and enter them in the Register Key panel in the Admin dialog box (the screen currently active) and click the REGISTER button.

To Complete Registration

1. If the registration is successful, a "CST registered" event is created on each of the agents currently reporting into this middleware server.

2. The CST registered event, configuration files, and the user data files for these agents are sent to Sun.

3. On the Admin dialog box, under Customer Contact Info, Transfer Data to Sun is set to ENABLED.

4. If setting up a CST account is selected, a CST account is created on the server.


Network Protocols

To Set Network Transport Between Agent and Server

CST support for TCP protocol between the CST agent and server is introduced with CST 3.5. The network transport between the CST agent and the CST server can be either TCP or UDP (RPC). If you want to use TCP protocol, you must specify your selection when the CST agent is first attached to the server. See the Utilities chapter, for details.

The default network transport between the CST agent and the CST server is UDP(RPC). This protocol is a full-duplex protocol, i.e. the CST agent will issue RPC to the CST server and vice versa.

If the selected transport protocol is TCP, the CST server and agents listen on TCP port 3742. You must open port 3742 through the firewall for the traffic, if any, to pass in both directions.

If the selected transport protocol is UDP, the RPC program number used by CST is 805306372 (30000004 hex). By default, the system assigns a random port as the UDP port). However, the user can overwrite the random port assignment by setting a range of ports to which the CST process binds. In order to do this, there is a file on both the agent and the server which needs to be edited.

/var/opt/SUNWcst/files/port_cfg

Check the port_cfg file for the following two lines. Add these two lines if they are not currently in the file.:

minport=<a minimum port number>

maxport=<a maximum port number>

Each user needs to restart the CST process for the port range to take effect.

Stop and restart CST by following these steps. At a root prompt, type:

# /etc/init.d/cst stop

# /etc/init.d/cst start

In case of an upgrade from an earlier version of CST to CST 3.5, the transport protocol used will be UDP. To force the CST agent to use TCP as the network transport protocol follow the procedure.

1. Stop the CST agent. Type:

# /opt/SUNWcstu/sbin/cstadm stop

2. Edit the file, /var/opt/SUNWcst/xprt, with this command:

XPRT_MODE<tab>TCP

3. Restart the CST agent. Type:

# /opt/SUNWcstu/sbin/cstadm start

After you successfully execute these steps, the CST agent and server automatically negotiate to use TCP as the transport protocol.

To Set Network Transport Between Server and Client

The network transport between the CST server and the CST client is TCP. By default, a random port is assigned by the system, The user can overwrite it by setting a range of ports for the CST server to bind to. To override the default, edit the file:

/var/opt/SUNWcst/files/port_cfg

Check the port_cfg file for the following two lines. Add these two lines if they are not currently in the file.:

tcpminport=<a minimum port number>

tcpmaxport=<a maximum port number>



Note - You must restart the CST server for the port range to take effect.



Do the following to stop and restart CST:

# /etc/init.d/cst stop

# /etc/init.d/cst start


Tuning CST Trigger Intervals

CST automatically decides if a resource is present and, when detected, assigns the default tracking interval and invokes the tracking thread for that detected resource. The tracking thread includes, for example, detection of dynamic reconfiguration of hardware change and cluster configuration changes. The defaults are preset to keep the load on the system light and still be frequent enough to detect most, if not all, events.

The tracking intervals are tunable to better suit specific system needs. The tuning is achieved by:

1. Manually editing the cst.conf file in the /var/opt/SUNWcst directory of each system.

2. Restarting CST by issuing a CST STOP followed by a CST START.



Note - See the syntax to edit the file and restarting in section To Tune CST Event Detectors.



The following table indicates the various entries that control the tracking intervals and their limits. The value must be within the stated limits. Values outside of these limits are automatically reset to the minimum or maximum value.

TABLE 5-2 Tracking Intervals

Tracking Entity

Parameter

Value

Min

Max

Dynamic Reconfiguration (DR) Thread

DR_INTERVAL

3600

86400

Field Replaceable Unit (FRU) Changes

FRUINFO_ENABLE

0

1

Volume Manager (VM) Changes

VXVM_INTERVAL

900

86400

Sun Fire 15K FRU Changes

SF15K_FRU_INTERVAL

900

86400

Sun Fire 15K Events

SF15K_EVENT_INTERVAL

1800

86400

*Fru probe on SunFire 3800, 4800, 4810, 6800

SUNFIRE_FRU_PROBE_DISABLE

0

1

*COD probe on SunFire 3800, 4800, 4810, 6800

SUNFIRE_COD_PROBE_DISABLE

0

1

Cluster Thread

CLUSTER_INTERVAL

50

86400


*These two entries apply to only the listed server platforms.

To Tune CST Event Detectors

Some of the event detectors use polling to check for changes. The monitoring frequency of those event detectors can be tuned through the cst.conf file in /var/opt/SUNWcst directory. The format adopted in this file is:

<event detector_interval><tab><value>



Note - The field separator is <tab>.



For all parameters ending with _INTERVAL, the value indicates the monitoring interval in seconds. Each monitoring entity has a pre-specified maximum, minimum, and a default period. The CST process resets any setting above the maximum or below the minimum to the maximum or minimum periods respectively. The default setting is the one set when CST is installed. A preset value of 0 indicates that the monitoring of that entity has been stopped.

FRUINFO_ENABLE is a binary parameter.

A sample cst.conf file is shown below:

# CST Configuration File.
# REVISION: 3.5
# Format:
#       <Key Name><tab><value>
#
#
DR_INTERVAL     3600
VXVM_INTERVAL   900
FRUINFO_ENABLE  1
CLUSTER_INTERVAL        300
SF15K_FRU_INTERVAL      1800
SF15K_EVENT_INTERVAL    3600

To change a monitoring interval for a specific entity, the value parameter for that entity must be manually edited in the cst.conf file.



Note - The change does not take effect until the cst daemon is restarted.



To stop and restart the CST daemon use the following commands:

The CST Stop command:

# /etc/init.d/cst stop

The CST Start command:

# /etc/init.d/cst start


CST Detach



caution icon

Caution - While an agent is detached from its CST server, the agent stores the data which is normally transferred to the CST server and stored in the repository. If a crash occurs before the agent is reattached and the data is transferred to the server, the data is lost.



Follow these steps to detach CST from a middleware:

1. Create an app_event in the agent with event name "CST detached." Type:

$ /opt/SUNWcstu/bin/app_event "CST detach" "CST detached from <middleware_name>"

2. Stop CST. Type:

$ /etc/init.d/cst stop

3. Edit the /var/opt/SUNWcst/cst.pref file and remove the value for MIDDLEWARE field.

4. If CST is to run in a stand-alone mode (without reporting to any middleware), restart CST. Type:

$ /etc/init.d/cst start


CST Tracking During OS Upgrades

Ensure that a copy of CST is running on the systems at all times.

After an OS upgrade on the agent, if the CST data on the agent is lost, the agent must be restored from the copy on the middleware.

1. To restore, copy all the agent files under the agent hierarchy in the middleware repository to the directory, /var/opt/SUNWcst, on the agent host.

2. Then run the command, pkgadd, for the agent package on the agent system.

For the System Service Processors (SSP) and System Controllers (SC) on multi-domain systems, the restore also involves restoring the platform data in addition to the agent data. The platform data under the platform hierarchy must be copied to:

SSP:

/var/opt/SUNWcst/ssp for an E10K SSP

SC

/var/opt/SUNWcst/ssc for a Sun Fire 15K SC


Consult the guidelines in the section, To Attach a Multi-domain Agent to CST Server, of Chapter to determine the location of the platform data.



Note - CST is not automatically installed as part of an OS upgrade. It must be installed after the OS upgrade.



While installing CST, remember that the CST software is only `fresh installed' the first time. A fresh installation of CST software means that no CST files or data have ever existed on the agent system nor on its middleware repository.



caution icon

Caution - After an operating system (OS) upgrade, the local data on the agent system might be erased, but a copy is still maintained on the middleware system, to which the agent was previously "attached." After an OS upgrade, you must restore the CST agent data manually from the middleware repository, and, only after that data restoration, then you can install the agent package. Performing these steps in any other sequence can cause data inconsistencies between the local agent data and the agent data on the middleware system.




Managing Hierarchy

CST provides you with the functionality to group your monitored systems for ease of viewing a specific system as well as a group of systems. By configuring the hierarchy of your monitored nodes in groups, you can browse through the top level group names and drill down as required. Using the Hierarchy functionality can also help with UI loading performance.

You may want to change the CST hierarchy configuration due to regroup your monitored systems. Upgrading your CST version does not alter the hierarchy. When you want to change the hierarchy of your CST monitored systems, perform the steps in the following section.



caution icon

Caution - The procedure of moving hierarchy using the utility, cstattach, is now obsolete because of the possible impact to causecode data at the Sun database and, in some cases, on site causecode data.



To Move Agent Data to a Different Hierarchy

CST events are collected on the agent and forwarded to the CST server, middleware, and stored in the server repository. Each monitored agent machine includes a file, cst.pref, where the hierarchy settings are read when events are to be sent to the repository. A copy of that file resides on the middleware under the repository. The location where the agent events are stored in the repository on the middleware must be created so, when the location is read in the cst.pref file, the data can be sent correctly.

These steps include backing up the event data for the agent system being moved and establishing all of the correct links within this structure. Follow these steps to alter the hierarchy for an agent and move the agent data:

1. Back up the agent data that resides under the server repository. This is located on the CST server, middleware.

2. Before you proceed, check that there is no /var/opt/SUNWcst/bkup_events file on the agent system. If you see the file, it means the agent is still trying to send the backlogged events to the server. Make sure that the middleware server is up and running and wait until bkup_events is no longer present.

3. Log onto the agent system as superuser.



Note - All of these commands are to be run as superuser.



4. Stop the CST daemon on the agent system. At the root prompt on the agent machine, type:

/opt/SUNWcstu/sbin/cstadm stop

5. Log onto the middleware server system as superuser and perform hierarchy moving. Run these commands at the root prompt:

cat /var/opt/SUNWcst/cst.pref | grep ROOT_PATH

cd <ROOT_PATH value in cst.pref>

These commands find the location of the repository and the cst.pref file on the CST server.

6. Locate the agent hierarchy and create a directory in the new location to hold agent data.

7. After you create the new location, move the hierarchy to the new place inside the ROOT_PATH using the 'mv' command.

In this step you create the new location on the middleware under the repository where the agent data will be stored, and you move the existing data for the agent into the new location.

Execute the commands on the middleware at a root prompt as superuser.

Example:
Moving a/b/Agent1.Sun.COM to b/c/Agent1.Sun.COM

# mkdir -p b/c

# mv a/b/Agent1.Sun.COM b/c

8. On the middleware server, manually edit the cst.pref file to update the HIERARCHY value. The new value must reflect the directory created in the above step. (e.g., b/c/Agent1.Sun.COM/cst.pref)

9. On the agent system, manually edit the cst.pref file to update the HIERARCHY value. The location of this file is: /var/opt/SUNWcst/cst.pref

10. Make sure that the HIERARCHY values in both copies of the cst.pref files, as modified in in steps 8 and 9, are identical.



Note - The HIERARCHY in cst.pref is a relative path to ROOT_PATH where agent data is stored. This value should also include the proper agent directory name (case sensitive), which is the agent hostname at the end. Preserve <tab> key which is the separator between HIERARCHY and hierarchy value. For example HIERARCHY<tab>a/b/agent1.company.com



11. If you use CST in a SunMC environment, remove the IPLINK of the agent IP address and create a new link to the new hierarchy. The IPLINK directory is located under the repository directory (ROOT_PATH).

12. Start the CST agent daemon. At the root prompt on the agent machine, type:

/opt/SUNWcstu/sbin/cstadm start


Service and Cause Code Updates