Changes between Initial Version and Version 1 of ALL__disable_updates


Ignore:
Timestamp:
11/18/14 15:08:37 (10 years ago)
Author:
lttoth@…
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • ALL__disable_updates

    v1 v1  
     1= How to Disable EDIR/AUTHSERV Updates = 
     2 
     3    Original Author:  Beth Mercer - 20081031 
     4 
     5EDIR, AUTHSERV and their shared update back end are configured to look for a lock  
     6file before presenting a form that supports directory updates.  The lock file name  
     7is configured in the runtime_common.cfg or runtime.cfg files of the three applications: 
     8 
     9        ~iplanet/UPDATE<INST>/config/runtime_common.cfg 
     10        ~ldapgw/AUTH<INST>/config/runtime*.cfg 
     11        ~ldapgw/EDIR<INST>/config/runtime*.cfg 
     12 
     13Though the lock file can be separately configured, in practical terms all three 
     14applications must reference the same file.  That is because scheduled processes that  
     15create and remove the lock file obtain the name from the  
     16UPDATE<INST>/config/runtime_common.cfg file. 
     17 
     18As of September 2008, updates of userPassword, uakSecQuestion and uakSecResponse were 
     19configured to bypass the Oracle registry (to address significant outage related to  
     20weekly cold backups of registry databases).  When that change was implemented, the test  
     21for the lock file had to be moved or alter in underlying code.  Otherwise when the  
     22registry went down for backups, the presence of the lock file would have prohibited  
     23updates to attributes which didn't rely on the registry.  
     24 
     25That issue should be resolved in some graceful manner.  Perhaps through creation of a  
     26secondary lock file applicable to attributes that bypass the registry.  In the meantime,  
     27the only way to insure that no updates are performed (actually, always the only way to  
     28insure no updates are performed) is to disable updates to all directory instances  
     29using the iPlanet console. 
     30 
     31To disable directory updates regardless of source: 
     32 
     33        <<ssh to iplanet account on an "e" box>> 
     34        <<start admin server and console>> 
     35        <<navigate console and open a directory instance>> 
     36        <<click on configuration tab>> 
     37        <<highlight server:port line in left most frame>> 
     38        <<check Server is Read Only box in Settings tab>> 
     39        <<click Save>> 
     40        <<repeat for all "e" boxes>> 
     41 
     42 
     43To disable updates via the EDIR/AUTHSERV web gateways on all "e" boxes from either  
     44iplanet or ldapgw accounts (disables all updates excepting userPassword, uakSecQuestion  
     45and uakSecResponse): 
     46 
     47At this writing (2/16/2010) the iplanet-owned version of disable_updates.ksh will not work 
     48because it looks for the all_servers configuration variable in runtime.cfg; all-servers is  
     49defined in runtime_common.cfg.  The ldapgw-owned version of disable_updates.ksh will not 
     50work because ldapgw cannot ssh to elfin without providing a password, which the script  
     51requires. 
     52 
     53        <<ssh to iplanet account on an "e" box>> 
     54        $HOME/local/ldap/scripts/disable_updates.ksh test 
     55        $HOME/local/ldap/scripts/disable_updates.ksh prep 
     56        $HOME/local/ldap/scripts/disable_updates.ksh prod 
     57 
     58-OR- 
     59 
     60        <<ssh to ldapgw account on an "e" box>> 
     61        $HOME/local/scripts/disable_updates.ksh test 
     62        $HOME/local/scripts/disable_updates.ksh prep 
     63        $HOME/local/scripts/disable_updates.ksh prod 
     64 
     65 
     66To enable updates via the EDIR/AUTHSERV web gateway on all "e" boxes from either iplanet  
     67or ldapgw accounts: 
     68 
     69At this writing (2/16/2010) the enable_update scripts will not work for the same reasons as their  
     70disable_update counterparts. 
     71 
     72        <<ssh to iplanet account on an "e" box>> 
     73        $HOME/local/ldap/scripts/enable_updates.ksh test 
     74        $HOME/local/ldap/scripts/enable_updates.ksh prep 
     75        $HOME/local/ldap/scripts/enable_updates.ksh prod 
     76 
     77-OR- 
     78 
     79        <<ssh to ldapgw account on an "e" box>> 
     80        $HOME/local/scripts/enable_updates.ksh test 
     81        $HOME/local/scripts/enable_updates.ksh prep 
     82        $HOME/local/scripts/enable_updates.ksh prod 
     83 
     84 
     85As of 10/26/2007, the process of shutting down and then starting the registry databases (RPTT, 
     86RPTQ and RPTS) now results in EDIR/AUTHSERV updates being disabled (before database shutdown)  
     87and then re-enabled (after database startup).  The scripts called as part of the shutdown/startup  
     88process are these: 
     89 
     90        <<ssh to iplanet account on an "e" box>> 
     91        $HOME/local/ldap/scripts/oracle_disable_updates.ksh test 
     92        $HOME/local/ldap/scripts/oracle_disable_updates.ksh prep 
     93        $HOME/local/ldap/scripts/oracle_disable_updates.ksh prod 
     94 
     95-OR- 
     96 
     97        <<ssh to iplanet account on an "e" box>> 
     98        $HOME/local/ldap/scripts/oracle_enable_updates.ksh test 
     99        $HOME/local/ldap/scripts/oracle_enable_updates.ksh prep 
     100        $HOME/local/ldap/scripts/oracle_enable_updates.ksh prod 
     101 
     102The oracle_[en|dis]able_updates.ksh script differ from the [en|dis]able_updates.ksh scripts in  
     103that the oracle scripts will **NOT** enable updates if the disable was performed by some process  
     104other than the oracle_[en|dis]able_updates.ksh script.  If someone manually touches the  
     105gateway_updates_disabled file or runs the disable_updates.ksh script, then the disabled  
     106file must removed manually or by running the enable_updates.ksh script. 
     107 
     108####################### 
     109DOCUMENT CHANGE HISTORY 
     110 
     11120081028 elm    Expanded on processes for disabling updates particularly since change that  
     112                allows userPassword, uakSecQuestion and uakSecResponse updates to bypass the  
     113                registry. 
     11420081031 elm    corrected typos