Thursday, September 8, 2011

Thursday, September 1, 2011

Avamar Troubleshooting.... (Authentication issues with GUI)

When you have authentication issues for end users or logging to AV GUI console.

root_grid:#dpnctl status
dpnctl: INFO: gsan status: ready
dpnctl: INFO: MCS status: down.
dpnctl: INFO: EMS status: up.
dpnctl: INFO: Backup scheduler status: down.
dpnctl: INFO: dtlt status: up.
dpnctl: INFO: Maintenance windows scheduler status: enabled.
dpnctl: INFO: Maintenance cron jobs status: enabled.
dpnctl: INFO: Unattended startup status: disabled.

root_grid:# dpnctl start mcs
root_grid:# dpnctl start sched

you should be all set...

Networker recover - using cli

Networker recover - using cli

#recover -c source.client1 -s server -iR -R Dest.client2
#cd /path_of file or DIR
#changetime mm/dd/yyyy
#add file/folder
#recover

Hummingbird Connectivity v9.0 - How to & Usage

****************How to Setup Hummingbird Connectivity v9.0 ***********************

Using Exceed X Server with SSH X11 Tunneling

Step 1:  Install and configure Exceed on your PC

Step 2:  Configure Exceed for Passive Mode and Multiple Windows

Exceed’s passive mode allows you to start the X Server on your PC without it making any initial attempt to connect to a specific remote host.
   
Set Exceed to use Passive Mode and Multiple Windows Mode.  Both of these settings are Exceed defaults, but check the settings if Exceed has been used before.

1.    Start -> Programs -> Hummingbird Connectivity 9.0 -> Exceed -> Xconfig
2.    Set Passive Communications:
a.    Click the Network and Communication link.  This will open the Communications dialog box.
b.    Select Passive from the mode field’s drop-down list.
c.    Validate and apply changes (green checkmark on toolbar).
3.    Set Multiple Windows Screen Definition:
a.    Click the Display and Video link.  This will open the Screen 0 dialog box.
b.    Click the radio button beside Multiple in the Window Mode box in the upper left.
c.    Validate and apply changes (green checkmark on toolbar).

Step 3:  Configure Localhost Security

When using SSH X11 tunneling, the only host that Exceed will ever talk to is your own PC – the localhost.  Thus, regardless of which or how many machines or accounts you’re going to use Exceed with, you only have to tell Exceed to answer to one machine – your local host.

1.    Click the Security, Access Control and System Administration link.  This will open the Security dialog box.
2.    In the Host Access Control List section of the Security dialog box, click the radio button that is to the immediate left of the word File.
3.    Click the Edit box to the right of the name xhost.txt.  A NotePad editing session will be initiated, editing the xhost.txt file.
4.    Type localhost on a new line in the file.
a.    If your xhost.txt file already has other specific hosts listed, delete those lines.
5.    Save your changes to xhost.txt by clicking File in the menu bar, then selecting Save.
6.    Leave NotePad by clicking File in the menu bar, then selecting Exit.
7.    Validate and apply changes (green checkmark on toolbar).

Step 4:  Unconfigure your Unix Account
   
If you have set your account to talk to your X Server, you have to remove these settings before you can use it with SSH X11 tunneling.

For Korn/Bourne shell users, check your .profile file, and remove any lines that look like this:
    export DISPLAY=xxx.xxx.xxx.xxx:0

After that, and X-Windows window will automatically open whenever you start an X-Windows program on any remote Unix host. 

A good X-Windows program to test with when you first setup Exceed is xclock.  On your Unix host using your Unix account, enter:  /usr/X/bin/xclock &
and a small X-Windows window containing a clock will open on your PC’s screen.

Using Exceed X Server with SSH

When using telnet, passwords will be sent across the network in plain text and can be viewed with other network traffic using a sniffer or other methods.  This is an example of the password being intercepted using the Solaris snoop utility:

158  12.50892   xxx.xx.xx.xxx -> myhost      TELNET C port=665 X&d2k7GG\r

Where “X&d2k7GG\r” is your password with a return at the end.  Using the Secure Shell start method will eliminate sending your password in plain text across the network.

1.    Start -> Programs -> Hummingbird Connectivity 9.0 -> Exceed -> Xstart
2.    In the Start Method box in the upper left, select Secure Shell (Set Display).
3.    Enter the host in the box to the right of the word Host.
4.    Enter the host type in the box to the right of the words Host Type by selecting Sun in the drop-down box.  Then select the command to use by clicking on the ellipsis button and selecting XTerm.  This will populate the command line with a predefined xterm command line.
5.    To the right of the Information prompt, select the radio button labeled None.
6.    In the Secure Shell Profile: field in the upper section of the xstart session, click on the ellipsis button.  This will launch the Open Tunnel application. 
7.    In the lower left corner, click on the Add New Tunnel button.  In the Tunnel name: box enter the name for your new tunnel. 
8.    Using the drop-down list in the Host name: field, select the host for your new tunnel.
9.    Enter your Unix account login in the User name: field.
10.    In the TCP port: field leave the default of 22.
11.    After entering the information for the new tunnel, click OK.
12.    This will add the new tunnel to the list.  With your new tunnel highlighted, click Open in the lower right.  The Secure Shell Profile: will now use this tunnel when opening a connection to your Unix host.

When you start Unix client connection using the Xstart Client Startup Application, you will be prompted for a Password Authentication.  Enter your Unix account password and you will receive a secure connection to your Unix host.

Friday, July 8, 2011

Looking for Any Technical Help on EMC Storage Technologies.

Place all your queries about EMC Storage technologies.
I will dedicate this blog to beginners and learners of storage domain specific to EMC Technologies.
I am here to answer all your technical questions on EMC Storage technologies.
I have good experience in designing storage layouts, architecture and troubleshooting Storage issues.
I will post few intresting topics on this blog very soon. Please reply with your comments and concerns to get faster updates.