Cluster synchronization with Csync 2
|
|
|
- Melvin Brown
- 10 years ago
- Views:
Transcription
1 Cluster synchronization with Csync 2 Original Author: Clifford Wolf for LINBIT Developed and maintained by LINBIT, May 2, Introduction Csync 2 [1] is a tool for asynchronous file synchronization in clusters. Asynchronous file synchronization is good for files which are seldom modified - such as configuration files or application images - but it is not adequate for some other types of data. For instance a database with continuous write accesses should be synced synchronously in order to ensure the data integrity. But that does not automatically mean that synchronous synchronization is better; it simply is different and there are many cases where asynchronous synchronization is favored over synchronous synchronization. Some pros of asynchronous synchronization are: 1. Most asynchronous synchronization tools (including Csync 2 ) are implemented as single-shot commands which need to be executed each time in order to run one synchronization cycle. Therefore it is possible to test changes on one host before deploying them on the others (and also return to the old state if the changes turn out to be bogus). 2. The synchronization algorithms are much simpler and thus less error-prone. 3. Asynchronous synchronization tools can be (and usually are) implemented as normal user mode programs. Synchronous synchronization tools need to be implemented as operating system extensions. Therefore asynchronous tools are easier to deploy and more portable. 4. It is much easier to build systems which allow setups with many hosts and complex replication rules. But most asynchronous synchronization tools are pretty primitive and do not even cover a small portion of the issues found in real world environments. I have developed Csync 2 because I found none of the existing tools for asynchronous synchronization satisfying. The development of Csync 2 has been sponsored by LINBIT Information Technologies [2], the company which also sponsors the synchronous block device synchronization toolchain DRBD [3]. Note: I will simply use the term synchronization instead of the semi-oxymoron asynchronous synchronization in the rest of this paper. 1.1 Csync 2 features Most synchronization tools are very simple wrappers for remote-copy tools such as rsync or scp. These solutions work well in most cases but still leave a big gap for more sophisticated tools such as Csync 2. The most important features of Csync 2 are described in the following sections Conflict detection Most of the trivial synchronization tools just copy the newer file over the older one. This can be a very dangerous behavior if the same file has been changed on more than one host. Csync 2 detects such a situation as a conflict and will not synchronize the file. Those conflicts then need to be resolved manually by the cluster administrator. It is not considered as a conflict by Csync 2 when the same change has been performed on two hosts (e.g. because it has already been synchronized with another tool). It is also possible to let Csync 2 resolve conflicts automatically for some or all files using one of the pre-defined auto-resolve methods. The available methods are: none (the default behavior), first (the host on which Csync 2 is executed first wins), younger and older (the younger or older file wins), bigger and smaller (the bigger or smaller file
2 wins), left and right (the host on the left side or the right side in the host list wins). The younger, older, bigger and smaller methods let the remote side win the conflict if the file has been removed on the local side Replicating file removals Many synchronization tools can not synchronize file removals because they can not distinguish between the file being removed on one host and being created on the other one. So instead of removing the file on the second host they recreate it on the first one. Csync 2 detects file removals as such and can synchronize them correctly Complex setups Many synchronization tools are strictly designed for two-host-setups. This is an inadequate restriction and so Csync 2 can handle any number of hosts. Csync 2 can even handle complex setups where e.g. all hosts in a cluster share the /etc/hosts file, but one /etc/passwd file is only shared among the members of a small sub-group of hosts and another /etc/passwd file is shared among the other hosts in the cluster Reacting to updates In many cases it is not enough to simply synchronize a file between cluster nodes. It also is important to tell the applications using the synchronized file that the underlying file has been changed, e.g. by restarting the application. Csync 2 can be configured to execute arbitrary commands when files matching an arbitrary set of shell patterns are synchronized. 2 The Csync 2 algorithm Many other synchronization tools compare the hosts, try to figure out which host is the most upto-date one and then synchronize the state from this host to all other hosts. This algorithm can not detect conflicts, can not distinguish between file removals and file creations and therfore it is not used in Csync 2. Csync 2 creates a little database with filesystem metadata on each host. This database (/var/lib/csync2/hostname.db) contains a list of the local files under the control of Csync 2. The database also contains information such as the file modification timestamps and file sizes. This database is used by Csync 2 to detect changes by comparison with the local filesystem. The synchronization itself is then performed using the Csync 2 protocol (TCP port 30865). Note that this approach implies that Csync 2 can only push changes from the machine on which the changes has been performed to the other machines in the cluster. Running Csync 2 on any other machine in the cluster can not detect and so can not synchronize the changes. Librsync [4] is used for bandwidth-saving file synchronization and SSL is used for encrypting the network traffic. The sqlite library [5] (version 2) is used for managing the Csync 2 database files. Authentication is performed using auto-generated pre-shared-keys in combination with the peer IP address and the peer SSL certificate. 3 Setting up Csync Building Csync 2 from source Simply download the latest Csync 2 source tar.gz from extract it and run the usual./configure - make - make install trio. Csync 2 has a few prerequisites in addition to a C compiler, the standard system libraries and headers and the usual gnu toolchain (make, etc): 1. You need librsync, libsqlite (version 2) and gnutls installed (including development headers). 2. Bison and flex are needed to build the configuration file parser. 3.2 Csync 2 in Linux distributions As of November 2011, all major linux distributions have some Csync package available, but to upgrade to an up-to-date Csync 2 version, you probably need to wait a bit or build the package from source. The Csync 2 source package contains an RPM.spec file as well as a debian/ directory. So it
3 is possible to use rpmbuild or debuild to build Csync Post installation Next you need to create an SSL certificate for the local Csync 2 server. Simply running make cert in the Csync 2 source directory will create and install a self-signed SSL certificate for you. Alternatively, if you have no source around, run the following commands: openssl genrsa \ -out /etc/csync2_ssl_key.pem 1024 openssl req -new \ -key /etc/csync2_ssl_key.pem \ -out /etc/csync2_ssl_cert.csr openssl x509 -req -days 600 \ -in /etc/csync2_ssl_cert.csr \ -signkey /etc/csync2_ssl_key.pem \ -out /etc/csync2_ssl_cert.pem You have to do that on each host you re running csync2 on. When servers are talking with each other for the first time, they add each other to the database. The Csync 2 TCP port needs to be added to the /etc/services file and inetd needs to be told about Csync 2 by adding csync2 stream tcp nowait root \ /usr/local/sbin/csync2 csync2 -i to /etc/inetd.conf. 3.4 Configuration File Figure 1 shows a simple Csync 2 configuration file. The configuration filename is /etc/csync2.cfg when no -C configname option has been passed and /etc/csync2 configname.cfg with a -C configname option Synchronization Groups In the example configuration file you will find the declaration of a synchronization group called mygroup. A Csync 2 setup can have any number of synchronization groups. Each group has its own list of member hosts and include/exclude rules. Csync 2 automatically ignores all groups which do not contain the local hostname in the host list. This way you can use one big Csync 2 configuration file for the entire cluster Host Lists Host lists are specified using the host keyword. You can eighter specify the hosts in a whitespace seperated list or use an extra host statement for each host. The hostnames used here must be the local hostnames of the cluster nodes. That means you must use exactly the same string as printed out by the hostname command. Otherwise csync2 would be unable to associate the hostnames in the configuration file with the cluster nodes. The -N hostname command line option can be used to set the local hostname used by Csync 2 to a different value than the one provided by the hostname command. This may be e.g. useful for environments where the local hostnames are automatically set by a DHCP server and because of that change often. Sometimes it is desired that a host is receiving Csync 2 connections on an IP address which is not the IP address its DNS entry resolves to, e.g. when a crossover cable is used to directly connect the hosts or an extra synchronization network should be used. In this cases the syntax hostname@interfacename has to be used for the host records (see host4 in the example config file). Sometimes a host shall only receive updates from other hosts in the synchronization group but shall not be allowed to send updates to the other hosts. Such hosts (so-called slave hosts) must be specified in brackets, such as host3 in the example config file Pre-Shared-Keys Authentication is performed using the IP addresses and pre-shared-keys in Csync 2. Each synchronization group in the config file must have exactly one key record specifying the file containing the preshared-key for this group. It is recommended to use a separate key for each synchronization group and only place a key file on those hosts which actually are members in the corresponding synchronization group.
4 The key files can be generated with csync2 -k filename Include/Exclude Patterns The include and exclude patterns are used to specify which files should be synced in the synchronization group. There are two kinds of patterns: pathname patterns which start with a slash character (or a prefix such as the %homedir% in the example; prefixes are explained in a later section) and basename patterns which do not. The last matching pattern for each of both categories is chosen. If both categories match, the file will be synchronized. The pathname patterns are matched against the beginning of the filename. So they must either match the full absolute filename or must match a directory in the path to the file. The file will not be synchronized if no matching include or exclude pathname pattern is found (i.e. the default pathname pattern is an exclude pattern). The basename patterns are matched against the base filename without the path. So they can e.g. be used to include or exclude files by their filename extensions. The default basename pattern is an include pattern. In our example config file that means that all files from /etc/apache and %homedir%/bob are synced, except the dot files, files with a tilde character at the end of the filename, and files from %homedir%/bob/temp Actions Each synchronization group may have any number of action sections. These action sections are used to specify shell commands which should be executed after a file is synchronized that matches any of the specified patterns. The exec statement is used to specify the command which should be executed. Note that if multiple files matching the pattern are synced in one run, this command will only be executed once. The special token %% in the command string is substituted with the list of files which triggered the command execution. The output of the command is appended to the specified logfile, or to /dev/null if the logfile statement is omitted. Usually the action is only triggered on the targed hosts, not on the host on which the file modification has been detected in the first place. The do-local statement can be used to change this behavior and let Csync 2 also execute the command on the host from which the modification originated. You can use do-local-only to execute the action only on this machine Conflict Auto-resolving The auto statement is used to specify the conflict auto-resolving mechanism for this synchronization group. The default value is auto none. See section for a list of possible values for this setting Prefix Declarations Prefixes (such as the %homedir% prefix in the example configuration file) can be used to synchronize directories which are named differently on the cluster nodes. In the example configuration file the directory for the user home directories is /export/users on the hosts host1 and host2 and /home on the other hosts. The prefix value must be an absolute path name and must not contain any wildcard characters The nossl statement Usually all Csync 2 network communication is encrypted using SSL. This can be changed with the nossl statement. This statement may only occur in the root context (not in a group or prefix section) and has two parameters. The first one is a shell pattern matching the source DNS name for the TCP connection and the second one is a shell pattern matching the destination DNS name. So if e.g. a secure synchronization network is used between some hosts and all the interface DNS names end with -sync, a simple nossl *-sync *-sync; will disable the encryption overhead on the synchronization network. All other traffic will stay SSL encrypted.
5 3.4.9 The config statement The config statement is nothing more then an include statement and can be used to include other config files. This can be used to modularize the configuration file The ignore statement The ignore statement can be used to tell Csync 2 to not check and not sync the file user-id, the file group-id and/or the file permissions. The statement is only valid in the root context and accepts the parameters uid, gid and mod to turn off handling of user-ids, group-ids and file permissions The tempdir statement Preferably don t use this setting. The tempdir statement specifies the directory to be used for temporary files while receiving data through librsync. Csync 2 will try to create temporary files in tempdir if specified, in the same directory as the currently processed file, in the directory given by the TMPDIR environment variable, the system default P tmpdir, or /tmp, in that order. This implies that if you specify a tempdir which is not on the same file system as the processed files, it will be impossible to rename the patched files in place, and Csync 2 will fall back to truncate and copy. Which can in various failure scenarios result in corrupted (partially transfered, truncated) files on the destination The lock-timeout statement The lock-timeout statement specifies the seconds to wait wor a database lock before giving up. Default is 12 seconds. The amount will be slightly randomized with a jitter of up to 6 seconds based on the respective process id Backing up Csync 2 can back up the files it modifies. This may be useful for scenarios where one is afraid of accidentally syncing files in the wrong direction. The backup-directory statement is used to tell Csync 2 in which directory it should create the backup files and the backup-generations statement is used to tell Csync 2 how many old versions of the files should be kept in the backup directory. The files in the backup directory are named like the file they back up, with all slashes substituted by underscores and a generation counter appended. Note that only the file content, not the metadata such as ownership and permissions are backed up. Per default Csync 2 does not back up the files it modifies. The default value for backup-generations is Activating the Logout Check The Csync 2 sources contain a little script called csync2 locheck.sh (Figure 2). If you copy that script into your ~/.bash logout script (or include it using the source shell command), the shell will not let you log out if there are any unsynced changes. 4 Database Schema Figure 3 shows the Csync 2 database schema. The database can be accessed using the sqlite command line shell. All string values are URL encoded in the database. The file table contains a list of all local files under Csync 2 control, the checktxt attribute contains a special string with information about file type, size, modification time and more. like this: v1:mtime= :mode=33152: uid=1001:gid=111:type=reg:size=301 It looks This checktxt attribute is used to check if a file has been changed on the local host. If a local change has been detected, the entry in the file table is updated and entries in the dirty table are created for all peer hosts which should be updated. This way the information that a host should be updated does not get lost, even if the host in question is unreachable right now. The force attribute is set to 0 by default and to 1 when the cluster administrator marks one side as the right one in a synchronization conflict. The hint table is usually not used. In large setups this table can be filled by a daemon listening on the inotify API. It is possible to tell Csync 2 to
6 not check all files it is responsible for but only those which have entries in the hint table. However, the Linux syscall API is so fast that this only makes sense for really huge setups. The action table is used for scheduling actions. Usually this table is empty after Csync 2 has been terminated. However, it is possible that Csync 2 gets interrupted in the middle of the synchronization process. In this case the records in the action table are processed when Csync 2 is executed the next time. The x509 cert table is used to cache the SSL cetrificates used by the other hosts in the csync2 cluster (like the SSH known hosts file). 5 Running Csync 2 Simply calling csync2 without any additional arguments prints out a help message (Figure 4). A more detailed description of the most important usage scenarios is given in the next sections. 5.1 Just synchronizing the files The command csync2 -x (or csync2 -xv) checks for local changes and tries to synchronize them to the other hosts. The option -d (dry-run) can be used to do everything but the actual synchronization. When you start Csync 2 the first time it compares its empty database with the filesystem and sees that all files just have been created. It then will try to synchronize the files. If the file is not present on the remote hosts it will simply be copied to the other host. There also is no problem if the file is already present on the remote host and has the same content. But if the file already exists on the remote host and has a different content, you have your first conflict. 5.2 Resolving a conflict When two or more hosts in a Csync 2 synchronization group have detected changes for the same file we run into a conflict: Csync 2 can not know which version is the right one (unless an auto-resolving method has been specified in the configuration file). The cluster administrator needs to tell Csync 2 which version is the correct one. This can be done using Csync 2 -f, e.g.: # csync2 -x While syncing file /etc/hosts: ERROR from peer apollo: File is also marked dirty here! Finished with 1 errors. # csync2 -f /etc/hosts # csync2 -xv Connecting to host apollo (PLAIN)... Updating /etc/hosts on apollo... Finished with 0 errors. 5.3 Checking without syncing It is also possible to just check the local filesystem without doing any connections to remote hosts: csync2 -cr / (the -r modifier tells Csync 2 to do a recursive check). csync2 -c without any additional parameters checks all files listed in the hints table. The command csync2 -M can be used to print the list of files marked dirty and therfore scheduled for synchronization. 5.4 Comparing the hosts The csync2 -T command can be used to compare the local database with the database of the remote hosts. Note that this command compares the databases and not the filesystems - so make sure that the databases are up-to-date on all hosts before running csync2 -T and run csync2 -cr / if you are unsure. The output of csync2 -T is a table with 4 columns: 1. The type of the found difference: X means that the file exists on both hosts but is different, L that the file is only present on the local host and R that the file is only present on the remote host. 2. The local interface DNS name (usually just the local hostname). 3. The remote interface DNS name (usually just the remote hostname). 4. The filename. The csync2 -TT filename command can be used for displaying unified diffs between a local file and the remote hosts.
7 5.5 Bootstrapping large setups The -I option is a nice tool for bootstrapping larger Csync 2 installations on slower networks. In such scenarios one usually wants to initially replicate the data using a more efficient way and then use Csync 2 to synchronize the changes on a regular basis. The problem here is that when you start Csync 2 the first time it detects a lot of newly created files and wants to synchronize them, just to find out that they are already in sync with the peers. The -I option modifies the behavior of -c so it only updates the file table but does not create entries in the dirty table. So you can simply use csync2 -cir / to initially create the Csync 2 database on the cluster nodes when you know for sure that the hosts are already in sync. The -I option may also be used with -T to add the detected differences to the dirty table and so induce Csync 2 to synchronize the local status of the files in question to the remote host. Usually -TI does only schedule local files which do exist to the dirty database. That means that it does not induce Csync 2 to remove a file on a remote host if it does not exist on the local host. That behavior can be changed using the -X option. The files scheduled to be synced by -TI are usually scheduled to be synced to all peers, not just the one peer which has been used in the -TI run. This behavior can be changed using the -U option. 5.6 Cleaning up the database It can happen that old data is left over in the Csync 2 database after a configuration change (e.g. files and hosts which are not referred anymore by the configuration file). Running csync2 -R cleans up such old entries in the Csync 2 database. 5.7 Multiple Configurations Sometimes a higher abstracion level than simply having different synchronization groups is needed. For such cases it is possible to use multiple configuration files (and databases) side by side. The additional configurations must have a unique name. The configuration file is then named /etc/csync2 myname.cfg and the database is named /var/lib/csync2/hostname myname.db. Accordingly Csync 2 must be called with the -C myname option. But there is no need for multiple Csync 2 daemons. The Csync 2 protocol allows the client to tell the server which configuration should be used for the current TCP connection. 6 Performance In most cases Csync 2 is used for syncing just some (up to a few hundred) system configuration files. In these cases all Csync 2 calls are processed in less than one second, even on slow hardware. So a performance analysis is not interesting for these cases but only for setups where a huge amount of files is synced, e.g. when syncing entire application images with Csync 2. A well-founded performance analysis which would allow meaningful comparisons with other synchronization tools would be beyond the scope of this paper. So here are just some quick and dirty numbers from a production 2-node cluster (2.40GHz dual-xeon, 7200 RPM ATA HD, 1 GB Ram). The machines had an average load of 0.3 (web and mail) during my tests.. I have about files (1.7 GB) of Linux kernel sources and object files on an ext3 filesystem under Csync 2 control on the machines. Checking for changes (csync2 -cr /) took 13.7 seconds wall clock time, 9.1 seconds in user mode and 4.1 seconds in kernel mode. The remaining 0.5 seconds were spent in other processes. Recreating the local database without adding the files to dirty table (csync2 -cir after removing the database file) took 28.5 seconds (18.6 sec user mode and 2.6 sec kernel mode). Comparing the Csync 2 databases of both hosts (csync2 -T) took 3 seconds wall clock time. Running csync2 -u after adding all files took 10 minutes wall clock time. That means that Csync 2 tried to sync all files and then recognized that the remote side had already the most up-to-date version of the file after comparing the checksums. All numbers are the average values of 10 iterations.
8 7 Security Notes As statet earlier, authentication is performed using the peer IP address and a pre-shared-key. The traffic is SSL encrypted and the SSL certificate of the peer is checked when there has been already an SSL connection to that peer in the past (i.e. the peer certificate is already cached in the database). All DNS names used in the Csync 2 configuration file (the host records) should be resolvable via the /etc/hosts file to guard against DNS spoofing attacks. Depending on the list of files being managed by Csync 2, an intruder on one of the cluster nodes can also modify the files under Csync 2 control on the other cluster nodes and so might also gain access on them. However, an intruder can not modify any other files on the other hosts because Csync 2 checks on the receiving side if all updates are OK according to the configuration file. For sure, an intruder would be able to work around this security checks when Csync 2 is also used to sync the Csync 2 configuration files. Csync 2 only syncs the standard UNIX permissions (uid, gid and file mode). ACLs, Linux ext2fs/ext3fs attributes and other extended filesystem permissions are neither synced nor flushed (e.g. if they are set automatically when the file is created). On cygwin, due to unresolved permission inheritance problems, no rename() is attempted, but existing files are always truncated and then copied into from the temporary files. Suggestions for how to resolve that are most welcome. 8 Alternatives Csync 2 is not the only file synchronization tool. Some of the other free software file synchronization tools are: 8.1 Rsync Rsync [6] is a tool for fast incremental file transfers, but is not a synchronization tool in the context of this paper. Actually Csync 2 is using the rsync algorithm for file transfers. A variety of synchronization tools have been written on top of rsync. Most of them are tiny shell scripts. 8.2 Unison Unison [7] is using an algorithm similar to the one used by Csync 2, but is limited to two-host setups. Its focus is on interactive syncs (there even are graphical user interfaces) and it is targeting on syncing home directories between a laptop and a workstation. Unison is pretty intuitive to use, among other things because of its limitations. 8.3 Version Control Systems Version control systems such as Subversion [8] can also be used to synchronize configuration files or application images. The advantage of version control systems is that they can do three way merges and preserve the entire history of a repository. The disadvantage is that they are much slower and require more disk space than plain synchronization tools. 9 References [1] Csync git://git.linbit.com/csync2/ [2] LINBIT Information Technologies [3] DRBD [4] Librsync [5] SQLite [6] Rsync [7] Unison bcpierce/unison/ [8] Subversion
9 group mygroup # A synchronization group (see 3.4.1) { host host1 host2 (host3); # host list (see 3.4.2) host host4@host4-eth2; key /etc/csync2.key_mygroup; # pre-shared-key (see 3.4.3) include /etc/apache; # include/exclude patterns (see 3.4.4) include %homedir%/bob; exclude %homedir%/bob/temp; exclude *~.*; action # an action section (see 3.4.5) { pattern /etc/apache/httpd.conf; pattern /etc/apache/sites-available/*; exec "/usr/sbin/apache2ctl graceful"; logfile "/var/log/csync2_action.log"; do-local; # do-local-only; } backup-directory /var/backups/csync2; backup-generations 3; # backup old files (see ) } auto none; # auto resolving mode (see 3.4.6) prefix homedir # a prefix declaration (see 3.4.7) { on host[12]: /export/users; on *: /home; } Figure 1: Example Csync 2 configuration file
10 csync2 -cr / if csync2 -M; then echo "!!" echo "!! There are unsynced changes! Type yes if you still want to" echo "!! exit (or press crtl-c) and anything else if you want to start" echo "!! a new login shell instead." echo "!!" if read -p "Do you really want to logout? " in && [ ".$in"!= ".yes" ]; then exec bash --login fi fi Figure 2: The csync2 locheck.sh script CREATE TABLE file ( filename, checktxt, UNIQUE ( filename ) ON CONFLICT REPLACE ); CREATE TABLE dirty ( filename, force, myname, peername, UNIQUE ( filename, peername ) ON CONFLICT IGNORE ); CREATE TABLE hint ( filename, recursive, UNIQUE ( filename, recursive ) ON CONFLICT IGNORE ); CREATE TABLE action ( filename, command, logfile, UNIQUE ( filename, command ) ON CONFLICT IGNORE ); CREATE TABLE x509_cert ( peername, certdata, UNIQUE ( peername ) ON CONFLICT IGNORE ); Figure 3: The Csync 2 database schema
11 csync cluster synchronization tool, 2nd generation Copyright (C) LINBIT Information Technologies GmbH See also: Version: 2.0 This program is free software under the terms of the GNU GPL. Usage:./csync2 [-v..] [-C config-name] \ [-D database-dir] [-N hostname] [-p port].. With file parameters: -h [-r] file.. Add (recursive) hints for check to db -c [-r] file.. Check files and maybe add to dirty db -u [-d] [-r] file.. Updates files if listed in dirty db -o [-r] file.. Create list of files in compare-mode -f [-r] file.. Force files to win next conflict resolution -m file.. Mark files in database as dirty Simple mode: -x [-d] [[-r] file..] Run checks for all given files and update remote hosts. Without file parameters: -c Check all hints in db and eventually mark files as dirty -u [-d] Update (transfer dirty files to peers and mark as clear) -H List all pending hints from status db -L List all file-entries from status db -M List all dirty files from status db -S myname peername List file-entries from status db for this synchronization pair. -T Test if everything is in sync with all peers. -T filename Test if this file is in sync with all peers. -T myname peername Test if this synchronization pair is in sync. -T myname peer file Test only this file in this sync pair. -TT As -T, but print the unified diffs. -i Run in inetd server mode. -ii Run in stand-alone server mode. -iii Run in stand-alone server mode (one connect only). -R Remove files from database which do not match config entries. Exit codes: The modes -H, -L, -M and -S return 2 if the requested db is empty. The mode -T returns 2 if both hosts are in sync. Otherwise, only exit codes 0 (no errors) and 1 (some unspecified errrors) are expected. Modifiers: -r Recursive operation over subdirectories -d Dry-run on all remote update operations -B Do not block everything into big SQL transactions. This slows down csync2 but allows multiple csync2 processes to access the database at the same time. Use e.g. when slow lines are used or huge files are transferred. -A Open database in asynchronous mode. This will cause data corruption if the operating system crashes or the computer loses power. -I Init-run. Use with care and read the documentation first! You usually do not need this option unless you are initializing groups with really large file lists. -X Also add removals to dirty db when doing a -TI run. -U Don t mark all other peers as dirty when doing a -TI run. -G Group1,Group2,Group3,... Only use these groups from config-file. -P peer1,peer1,... Only update these peers (still mark all as dirty). Only show files for these peers in -o (compare) mode. -F Add new entries to dirty database with force flag set. -t Print timestamps to debug output (e.g. for profiling). -s filename Print timestamps also to this file. -W fd Write a list of directories in which relevant files can be found to the specified file descriptor (when doing a -c run). The directory names in this output are zero-terminated. Database switches: -D database-dir or url default: /var/lib/csync2 Absolute path: use sqlite database in that directory URLs: sqlite:///some/path[/database.db3] sqlite3:///some/path[/database.db3] sqlite2:///some/path[/database.db] mysql://[<user>:<password>@]<hostname>/[database] pgsql://[<user>:<password>@]<hostname>/[database] If database is not given, it defaults to csync2_<qualified hostname>. Note that for non-sqlite backends, the database name is "cleaned", characters outside of [0-9][a-z][A-Z] will be replaced with _. Creating key file: csync2 -k filename Environment variables: CSYNC2_SYSTEM_DIR Directory containing csync2.cfg and other csync2 system files. Defaults to /etc. Csync2 will refuse to do anything if this file is found: $CSYNC2_SYSTEM_DIR/csync2.lock Figure 4: The Csync 2 help message
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Installing, Uninstalling, and Upgrading Service Monitor
CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page
Rsync Internet Backup Whitepaper
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Important notice about terminology... 3 Rsync: An overview... 3 Performance... 4 Summary...
WebSphere Business Monitor V7.0: Clustering Single cluster deployment environment pattern
Copyright IBM Corporation 2010 All rights reserved WebSphere Business Monitor V7.0: Clustering Single cluster deployment environment pattern What this exercise is about... 2 Exercise requirements... 2
FTP Service Reference
IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service
insync Installation Guide
insync Installation Guide 5.2 Private Cloud Druva Software June 21, 13 Copyright 2007-2013 Druva Inc. All Rights Reserved. Table of Contents Deploying insync Private Cloud... 4 Installing insync Private
UNICORE UFTPD server UNICORE UFTPD SERVER. UNICORE Team
UNICORE UFTPD server UNICORE UFTPD SERVER UNICORE Team Document Version: 1.0.0 Component Version: 2.3.2 Date: 14 09 2015 UNICORE UFTPD server Contents 1 UNICORE UFTP 1 1.1 UFTP features...................................
LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013
LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...
Moving to Plesk Automation 11.5
Moving to Plesk Automation 11.5 Last updated: 2 June 2015 Contents About This Document 4 Introduction 5 Preparing for the Move 7 1. Install the PA Moving Tool... 8 2. Install Mail Sync Software (Windows
FTP Service Reference
IceWarp Unified Communications Reference Version 11.3 Published on 1/6/2015 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
DNS must be up and running. Both the Collax server and the clients to be backed up must be able to resolve the FQDN of the Collax server correctly.
This howto describes the setup of backup, bare metal recovery, and restore functionality. Collax Backup Howto Requirements Collax Business Server Collax Platform Server Collax Security Gateway Collax V-Cube
Server & Workstation Installation of Client Profiles for Windows
C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing
EMC Data Protection Search
EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011
LOCKSS on LINUX Installation Manual and the OpenBSD Transition 02/17/2011 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 7 BIOS Settings... 10 Installation... 11 Firewall
1 Introduction FrontBase is a high performance, scalable, SQL 92 compliant relational database server created in the for universal deployment.
FrontBase 7 for ios and Mac OS X 1 Introduction FrontBase is a high performance, scalable, SQL 92 compliant relational database server created in the for universal deployment. On Mac OS X FrontBase can
Postgres Plus xdb Replication Server with Multi-Master User s Guide
Postgres Plus xdb Replication Server with Multi-Master User s Guide Postgres Plus xdb Replication Server with Multi-Master build 57 August 22, 2012 , Version 5.0 by EnterpriseDB Corporation Copyright 2012
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware Contact Information Go to the RSA corporate website for regional Customer Support telephone
Pre-Installation Instructions
Agile Product Lifecycle Management PLM Mobile Release Notes Release 2.0 E49504-02 October 2014 These Release Notes provide technical information about Oracle Product Lifecycle Management (PLM) Mobile 2.0.
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
IPPBX FAQ. For Firmware Version: V2.0/V3.0 2013-12-11
For Firmware Version: V2.0/V3.0 2013-12-11 Contents 1. IPPBX Access... 3 1.1 How to access IPPBX via SSH?... 3 1.2 How to access IPPBX if I forget the IP of WAN?... 4 1.3 How to retrieve WEB password via
CLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
using version control in system administration
LUKE KANIES using version control in system administration Luke Kanies runs Reductive Labs (http://reductivelabs.com), a startup producing OSS software for centralized, automated server administration.
McAfee SMC Installation Guide 5.7. Security Management Center
McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
Snare Agent Management Console User Guide to the Snare Agent Management Console in Snare Server v6
User Guide to the Snare Agent Management Console in Snare Server v6 InterSect Alliance International Pty Ltd Page 1 of 14 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect
RSA ACE/Agent 5.2 for UNIX Installation and Configuration Guide
RSA ACE/Agent 5.2 for UNIX Installation and Configuration Guide Contact Information See our web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security Ireland Limited
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
mguard Device Manager Release Notes Version 1.6.1
mguard Device Manager Release Notes Version 1.6.1 Innominate Security Technologies AG Rudower Chaussee 13 12489 Berlin Germany Phone: +49 30 921028 0 Fax: +49 30 921028 020 [email protected] http://www.innominate.com/
User Guide to the Snare Agent Management Console in Snare Server v7.0
User Guide to the Snare Agent Management Console in Snare Server v7.0 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors
Rational Rational ClearQuest
Rational Rational ClearQuest Version 7.0 Windows Using Project Tracker GI11-6377-00 Rational Rational ClearQuest Version 7.0 Windows Using Project Tracker GI11-6377-00 Before using this information, be
Intuit QuickBooks Enterprise Solutions. Linux Database Server Manager Installation and Configuration Guide
Intuit QuickBooks Enterprise Solutions Linux Database Server Manager Installation and Configuration Guide Copyright Copyright 2013 Intuit Inc. All rights reserved. STATEMENTS IN THIS DOCUMENT REGARDING
Incremental Backup Script. Jason Healy, Director of Networks and Systems
Incremental Backup Script Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Incremental Backup Script 5 1.1 Introduction.............................. 5 1.2 Design Issues.............................
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
ODBC Driver User s Guide. Objectivity/SQL++ ODBC Driver User s Guide. Release 10.2
ODBC Driver User s Guide Objectivity/SQL++ ODBC Driver User s Guide Release 10.2 Objectivity/SQL++ ODBC Driver User s Guide Part Number: 10.2-ODBC-0 Release 10.2, October 13, 2011 The information in this
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Third edition (May 2012). Copyright International Business Machines Corporation 2012. US Government Users Restricted
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
EVault Software. Course 361 Protecting Linux and UNIX with EVault
EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Mod ule_i D Error _Cod e Error Description 1 1 PROCESSOR_NULLREF_ERROR 1 100 ERROR_PARSE_PAIR Failed
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab
Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab Yocto Project Developer Day San Francisco, 2013 Jessica Zhang Introduction Welcome to the Yocto Project Eclipse plug-in
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
Healthstone Monitoring System
Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................
Achieving High Availability with Websphere Application Server SIP Container and F5 BIG-IP Local Traffic Manager
Achieving High Availability with Websphere Application Server SIP Container and F5 BIG-IP Local Traffic Manager Ollie J. Hales, [email protected] Tamera L. Davis, [email protected] Tibor Beres, [email protected]
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1
DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or
Database Replication Error in Cisco Unified Communication Manager
Database Replication Error in Cisco Unified Communication Manager Document ID: 100781 Contents Introduction Prerequisites Requirements Components Used Conventions Use Unifed Reports to Debug Replication
HDFS Users Guide. Table of contents
Table of contents 1 Purpose...2 2 Overview...2 3 Prerequisites...3 4 Web Interface...3 5 Shell Commands... 3 5.1 DFSAdmin Command...4 6 Secondary NameNode...4 7 Checkpoint Node...5 8 Backup Node...6 9
Laptop Backup - Administrator Guide (Windows)
Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL
Managed File Transfer
, page 1 External Database, page 3 External File Server, page 5 Cisco XCP File Transfer Manager RTMT Alarms and Counters, page 9 Workflow, page 11 Troubleshooting, page 22 Cisco Jabber Client Interoperability,
QuickBooks Enterprise Solutions. Linux Database Server Manager Installation and Configuration Guide
QuickBooks Enterprise Solutions Linux Database Server Manager Installation and Configuration Guide Copyright Copyright 2007 Intuit Inc. All rights reserved. STATEMENTS IN THIS DOCUMENT REGARDING THIRD-PARTY
Install guide for Websphere 7.0
DOCUMENTATION Install guide for Websphere 7.0 Jahia EE v6.6.1.0 Jahia s next-generation, open source CMS stems from a widely acknowledged vision of enterprise application convergence web, document, search,
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
DocuShare Installation Guide
DocuShare Installation Guide Publication date: February 2011 This document supports DocuShare Release 6.6.1 Prepared by: Xerox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
Syslog Windows Tool Set (WTS) Configuration File Directives And Help
orrelog Syslog Windows Tool Set (WTS) Configuration File Directives And Help The CO-sysmsg.cnf file contains all the parameters and specifications related to the program s operation. This file is found
Avira Management Console User Manual
Avira Management Console User Manual Table of Contents Table of Contents 1. About this manual... 5 1.1 Introduction...5 1.2 Structure of the manual...5 1.3 Emphasis in text...6 1.4 Abbreviations...7 2.
Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1
Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server
PageR Enterprise Monitored Objects - AS/400-5
PageR Enterprise Monitored Objects - AS/400-5 The AS/400 server is widely used by organizations around the world. It is well known for its stability and around the clock availability. PageR can help users
Auditing manual. Archive Manager. Publication Date: November, 2015
Archive Manager Publication Date: November, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,
Maintaining the Content Server
CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down
AVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
PVFS High Availability Clustering using Heartbeat 2.0
PVFS High Availability Clustering using Heartbeat 2.0 2008 Contents 1 Introduction 2 2 Requirements 2 2.1 Hardware................................................. 2 2.1.1 Nodes...............................................
Acronis SharePoint Explorer. User Guide
Acronis SharePoint Explorer User Guide Table of contents 1 Introducing Acronis SharePoint Explorer... 3 1.1 Supported Microsoft SharePoint versions... 3 1.2 Supported backup locations... 3 1.3 Licensing...
VPS Hosting User Guide
TM VPS Hosting User Guide VPS Hosting Control Panel Managing VPS... 1 Opening Power Panel...... 1 Starting/Stopping VPS... 2 Changing VPS Hostname... 2 Enabling/Disabling Automatic Updates... 5 Installing
Avira Update Manager User Manual
Avira Update Manager User Manual Table of contents Table of contents 1. Product information........................................... 4 1.1 Functionality................................................................
Basic Installation of the Cisco Collection Manager
CHAPTER 3 Basic Installation of the Cisco Collection Manager Introduction This chapter gives the information required for a basic installation of the Cisco Collection Manager and the bundled Sybase database.
Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3
Contents Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3 Introduction... 3 How to Register a UNIX Host in a One-Way Trust Domain Environment... 4 Creating a Windows Agentless
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD
DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD Configuring the BIG-IP LTM system for use with FirePass controllers Welcome to the Configuring
Identikey Server Performance and Deployment Guide 3.1
Identikey Server Performance and Deployment Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is'
Architecting the Future of Big Data
Hive ODBC Driver User Guide Revised: July 22, 2014 2012-2014 Hortonworks Inc. All Rights Reserved. Parts of this Program and Documentation include proprietary software and content that is copyrighted and
WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central
WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central and remote sites. Contents Table of Contents Using WhatsUp
EMC Avamar. Backup Clients User Guide. Version 7.2 302-001-792 REV 02
EMC Avamar Version 7.2 Backup Clients User Guide 302-001-792 REV 02 Copyright 2001-2015 EMC Corporation. All rights reserved. Published in USA. Published August, 2015 EMC believes the information in this
vsphere Upgrade vsphere 6.0 EN-001721-03
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
XenClient Enterprise Synchronizer Migration
XenClient Enterprise Synchronizer Migration Applicability This document is applicable to XenClient Synchronizer version 5.1. The information in this document also applies to earlier versions of XenClient,
7.x Upgrade Instructions. 2015 Software Pursuits, Inc.
7.x Upgrade Instructions 2015 Table of Contents INTRODUCTION...2 SYSTEM REQUIREMENTS FOR SURESYNC 7...2 CONSIDERATIONS BEFORE UPGRADING...3 TERMINOLOGY CHANGES... 4 Relation Renamed to Job... 4 SPIAgent
File Protection using rsync. Setup guide
File Protection using rsync Setup guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync technology... 3 Terminology... 3 Implementation... 3 3. Rsync data hosts...
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
Oracle Fusion Middleware 11gR2: Forms, and Reports (11.1.2.0.0) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64
Oracle Fusion Middleware 11gR2: Forms, and Reports (11.1.2.0.0) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64 http://www.suse.com 1 Table of Contents Introduction...3 Hardware and
SYMANTEC BACKUPEXEC2010 WITH StorTrends
SYMANTEC BACKUPEXEC2010 WITH StorTrends 1 Index 1. Introduction 3 2. Test Environment 3 3. System Requirement 4 4. Storage Requirement 4 5. Installation of Symantec Backup EXEC 2010 4 6. Installing Backup
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Security Provider Integration LDAP Server
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
estos ECSTA for OpenScape Business 4.0.7.3683
estos ECSTA for OpenScape Business 4.0.7.3683 1 Introduction... 4 2 Driver Management... 6 3 Supported Telephone Systems... 7 4 UC Booster Platforms... 8 4.1 Configuration and Connection of the UC Booster
NRPE Documentation CONTENTS. 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks...
Copyright (c) 1999-2007 Ethan Galstad Last Updated: May 1, 2007 CONTENTS Section 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks... 3. Installation...
BlueJ Teamwork Tutorial
BlueJ Teamwork Tutorial Version 2.0 for BlueJ Version 2.5.0 (and 2.2.x) Bruce Quig, Davin McCall School of Engineering & IT, Deakin University Contents 1 OVERVIEW... 3 2 SETTING UP A REPOSITORY... 3 3
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
