To enable a resource for business continuity, certain values (such as IP addresses) specified in resource load and unload scripts need to be changed in corresponding resources in the peer clusters. You need to add the search-and-replace strings that are used to transform cluster resource load and unload scripts from another cluster to the one where you create the replacement script. Replacement scripts are for inbound changes to scripts for objects being synchronized from other clusters, not outbound.
IMPORTANT:The search-and-replace data is cluster-specific, and it is not synchronized via Identity Manager between the clusters in the business continuity cluster.
For example, consider two clusters where ClusterA uses subnet 10.10.10.x and ClusterB uses subnet 10.10.20.x. For ClusterA, you create a replacement script to replace the IP addresses of inbound resources. IP addresses starting with 10.10.20.
are replaced with IP addresses starting with 10.10.10.
so that they work in ClusterA’s subnet. For ClusterB, you create a replacement script to replace the IP addresses of inbound resources. IP addresses starting with 10.10.10.
are replaced with IP addresses starting with 10.10.20.
so that they work in ClusterB’s subnet.
The scripts are not changed for a cluster until a synchronization event comes from the other cluster. To continue the example, you can force an immediate update of the scripts for ClusterB by opening the script for ClusterA, add a blank line, then click Apply. To force an immediate update of the scripts for ClusterA, open the script for ClusterB, add a blank line, then click Apply.
You can see the IP addresses that are currently assigned to resources on a given node by entering the ip addr show command at the Linux terminal console on that node. It shows only the IP addresses of resources that are online when the command is issued. You must be logged in as root to use this command. Repeat the command on each node in the cluster to gather information about all IP addresses for resources in that cluster.
To add search-and-replace values to the cluster replacement script:
In iManager, click Clusters > My Clusters.
Select the check box next to the cluster, then select Actions > Edit Properties to view the cluster’s properties.
You can also access the cluster properties with the Properties button on the Cluster Options tab when you manage the cluster.
In the Properties dialog box, select the Business Continuity tab.
In the Resource Replacement Script section of the Business Continuity Cluster Properties page, click New.
Add the desired search-and-replace values.
The search-and-replace values you specify here apply to all resources in the cluster that have been enabled for business continuity.
For example, if you specified 10.1.1.1 as the search value and 192.168.1.1 as the replace value, the resource with the 10.1.1.1 IP address in its scripts is searched for in the primary cluster and, if found, the 192.168.1.1 IP address is assigned to the corresponding resource in the secondary cluster.
You can also specify global search-and-replace addresses for multiple resources in one line. This can be done only if the last digits in the IP addresses are the same in both clusters. For example, if you specify 10.1.1.
as the search value and 192.168.1.
as the replace value, the software finds the 10.1.1.1, 10.1.1.2, 10.1.1.3 and 10.1.1.4 IP addresses, and replaces them with the 192.168.1.1, 192.168.1.2, 192.168.1.3, and 192.168.1.4 IP addresses, respectively.
IMPORTANT:Use a trailing dot in the search-and-replace value. If a trailing dot is not used, 10.1.1
could be replaced with an IP value such as 192.168.100
instead of 192.168.1
.
(Optional) Select the Use Regular Expressions check box to use wildcard characters in your search-and-replace values. The following links provide information on regular expressions and wildcard characters:
You can find additional information on regular expressions and wildcard characters by searching the Web.
Click Apply to save your changes.
Clicking OK does not apply the changes to the directory.
Verify that the change has been synchronized with the peer clusters by the Identity Vault.
Continue with Section 8.4, Adding BCC Load and Unload Scripts.