iManager NetEco V600R010C10 Administrator Guide Issue Draft B Date 2020-11-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2020. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website: https://e.huawei.com Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. i iManager NetEco Administrator Guide Contents Contents 1 NetEco Administrator Guide................................................................................................. 1 1.1 Getting Started......................................................................................................................................................................... 2 1.1.1 Logging In to the NetEco.................................................................................................................................................. 2 1.1.2 Logging In to the PowerEcho.......................................................................................................................................... 3 1.2 Power On and Power Off the NetEco System...............................................................................................................4 1.2.1 Powering On the System................................................................................................................................................... 4 1.2.2 Powering Off the System.................................................................................................................................................. 5 1.3 System Monitoring and Task Management................................................................................................................... 5 1.3.1 Monitoring Products........................................................................................................................................................... 5 1.3.2 Monitoring Nodes................................................................................................................................................................ 6 1.3.3 Monitoring Services.............................................................................................................................................................9 1.3.4 Monitoring Databases..................................................................................................................................................... 10 1.3.5 Monitoring Processes....................................................................................................................................................... 12 1.3.6 Modifying Monitoring Thresholds............................................................................................................................... 13 1.4 Starting the PowerEcho and the NetEco...................................................................................................................... 15 1.4.1 Starting Product Services and Databases..................................................................................................................15 1.4.2 Starting Product Databases........................................................................................................................................... 15 1.4.3 Starting Product Services................................................................................................................................................ 16 1.4.4 Starting Product Processes............................................................................................................................................. 17 1.4.5 Starting the PowerEcho Service and Databases..................................................................................................... 17 1.4.6 Starting the PowerEcho Databases............................................................................................................................. 20 1.4.7 Starting the PowerEcho Service....................................................................................................................................20 1.5 Stopping the PowerEcho and the NetEco.................................................................................................................... 23 1.5.1 Stopping Product Services and Databases................................................................................................................23 1.5.2 Stopping Product Services.............................................................................................................................................. 23 1.5.3 Stopping Product Databases......................................................................................................................................... 24 1.5.4 Stopping Product Processes........................................................................................................................................... 25 1.5.5 Stopping the PowerEcho Service and Databases................................................................................................... 25 1.5.6 Stopping the PowerEcho Service.................................................................................................................................. 27 1.5.7 Stopping the PowerEcho Databases........................................................................................................................... 29 1.6 Configuring Network Information.................................................................................................................................. 30 1.6.1 Modifying Hostnames......................................................................................................................................................30 1.6.2 Configuring Network Interfaces................................................................................................................................... 31 Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. ii iManager NetEco Administrator Guide Contents 1.6.3 Configuring IP Addresses................................................................................................................................................ 33 1.6.4 Configuring Routes........................................................................................................................................................... 35 1.6.5 Configuring Floating IP Addresses............................................................................................................................... 37 1.6.6 Configure Southbound IP address............................................................................................................................... 38 1.7 Configuring Time.................................................................................................................................................................. 43 1.7.1 Changing the Time Zone and Time............................................................................................................................ 43 1.7.2 Configuring NTP Servers................................................................................................................................................. 45 1.8 Collecting Equipment Serial Numbers...........................................................................................................................49 1.9 Alarm Dump........................................................................................................................................................................... 50 1.10 Software Management..................................................................................................................................................... 52 1.10.1 Managing Software Packages.................................................................................................................................... 52 1.10.2 Upgrading Product Software.......................................................................................................................................57 1.10.3 Expanding Product Software Capacity.....................................................................................................................58 1.10.4 Uninstalling NetEco Product Software.................................................................................................................... 59 1.10.5 Modifying Configuration Parameters of Product Software.............................................................................. 60 1.10.6 Adding Product Features.............................................................................................................................................. 61 1.10.7 Deleting Product Features............................................................................................................................................61 1.11 Backup and Restore........................................................................................................................................................... 62 1.11.1 Overview............................................................................................................................................................................ 62 1.11.2 Backup and Restoration Scenarios and Policies................................................................................................... 65 1.11.2.1 Backup Scenarios and Policies................................................................................................................................ 65 1.11.2.2 Restoration Scenarios and Policies........................................................................................................................ 70 1.11.3 Backup Server Requirements...................................................................................................................................... 72 1.11.4 Configuring Backup Parameters................................................................................................................................ 74 1.11.5 Backing Up Products...................................................................................................................................................... 75 1.11.5.1 Backing Up Product on a Scheduled Basis..........................................................................................................75 1.11.5.2 Backing Up Product Data......................................................................................................................................... 77 1.11.5.3 Backing Up Product Applications........................................................................................................................... 78 1.11.5.4 Backing Up Database Applications....................................................................................................................... 79 1.11.6 Backing Up the PowerEcho......................................................................................................................................... 80 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho.......................................................... 80 1.11.6.2 Backing Up the PowerEcho Applications and Data on a Scheduled Basis.............................................. 80 1.11.7 Restoring Products.......................................................................................................................................................... 82 1.11.7.1 Restoring Database Applications........................................................................................................................... 82 1.11.7.2 Restoring Product Applications............................................................................................................................... 83 1.11.7.3 Restoring Product Data............................................................................................................................................. 84 1.11.8 Restoring the PowerEcho............................................................................................................................................. 85 1.12 Remote Cold Backup......................................................................................................................................................... 88 1.12.1 Remote Cold Backup System Overview.................................................................................................................. 88 1.12.2 Managing the Remote Cold Backup System......................................................................................................... 90 1.12.2.1 Configuring a Remote Cold Backup System.......................................................................................................90 1.12.2.2 Switching Services to the Secondary Site When the Primary Site Is Faulty............................................ 92 Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. iii iManager NetEco Administrator Guide Contents 1.12.2.3 Switching Services to the Secondary Site When the Primary Site Is Normal......................................... 93 1.12.2.4 Switching Services Back to the Primary Site...................................................................................................... 94 1.12.2.5 Forcibly Synchronizing Product Data.................................................................................................................... 95 1.12.2.6 Modifying the Remote Cold Backup System......................................................................................................96 1.12.2.7 Deleting the Remote Cold Backup System......................................................................................................... 97 1.13 Task Management.............................................................................................................................................................. 97 1.14 Display Format Settings on the PowerEcho.............................................................................................................. 98 1.14.1 Date and Time Zone Display Format....................................................................................................................... 99 1.14.2 Time Display Format......................................................................................................................................................99 1.14.3 Number Display Format............................................................................................................................................. 100 1.15 Password Management................................................................................................................................................. 100 1.15.1 OS Users.......................................................................................................................................................................... 100 1.15.1.1 Default OS Users....................................................................................................................................................... 100 1.15.1.2 Changing Passwords for OS Users (Non-root Users)................................................................................... 103 1.15.1.3 Changing the Password of User root................................................................................................................. 105 1.15.2 Database Users.............................................................................................................................................................. 106 1.15.2.1 Default Database Users.......................................................................................................................................... 106 1.15.2.2 Changing Passwords for Database Users..........................................................................................................118 1.15.3 NetEco Web System Users and Passwords.......................................................................................................... 120 1.15.3.1 Default NetEco Web System User Information.............................................................................................. 120 1.15.3.2 Changing the Password for the admin User (NetEco)................................................................................. 121 1.15.3.3 Changing the Password for the admin User (the PowerEcho)................................................................. 122 1.15.3.4 Changing the User Name and Password of the Swift Deploy Deployment Tool................................122 1.15.4 Setting and Changing the Password of the Server BIOS................................................................................ 123 1.15.4.1 Entering the Remote Management Window of the Server........................................................................123 1.15.4.2 Setting and Changing the Password of the Server BIOS (TaiShan Server)...........................................124 1.15.4.3 Setting and Changing the Password of the Server BIOS (X86 Server)................................................... 129 1.15.5 Setting Encrypted Password for GRUB2................................................................................................................134 1.15.6 Configuring the Hacker Language Dictionary.................................................................................................... 136 1.16 Managing Certificates.................................................................................................................................................... 138 1.16.1 Certificate Overview.................................................................................................................................................... 138 1.16.2 Certificate List................................................................................................................................................................ 139 1.16.3 Uploading and Updating ER Certificates.............................................................................................................. 140 1.16.4 Uploading and Updating CA Certificates............................................................................................................. 145 1.16.5 Updating IR Certificates............................................................................................................................................. 148 1.16.6 Uploading and Updating the Trust Certificate of the Syslog Server (the PowerEcho)........................ 150 1.16.7 Updating the Certificate of User Management................................................................................................. 154 1.16.8 Updating Certificate Revocation Lists....................................................................................................................156 1.16.9 Updating the Certificate of LDAP........................................................................................................................... 156 1.16.10 Updating the CAS SSO Client Trust Certificate................................................................................................ 158 1.16.11 Updating Mail Server Certificate for Notifications......................................................................................... 159 1.16.12 Managing CAS SSO Certificates............................................................................................................................ 165 Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. iv iManager NetEco Administrator Guide Contents 1.16.12.1 Obtaining the CAS SSO Trust Certificate........................................................................................................ 165 1.16.12.2 Importing the CAS SSO Trust Certificate........................................................................................................ 166 1.16.12.3 Updating the CAS SSO Trust Certificate......................................................................................................... 168 1.16.13 Managing the Trust Certificate of the Syslog Server..................................................................................... 170 1.16.13.1 Importing the Trust Certificate of the Syslog Server.................................................................................. 170 1.16.13.2 Updating the Trust Certificate of the Syslog Server................................................................................... 176 1.17 Managing Keys................................................................................................................................................................. 182 1.17.1 Updating the Root Key and Working Keys.......................................................................................................... 182 1.17.2 Updating the Root Key and Working Keys of the Secondary Site...............................................................184 1.18 Managing Log................................................................................................................................................................... 188 1.18.1 Configuring Log Forwarding (the PowerEcho)...................................................................................................188 1.18.2 Configuring Log Forwarding Rules (the PowerEcho).......................................................................................191 1.18.3 Setting Log Dump (the NetEco)..............................................................................................................................191 1.18.4 Log Reference (the NetEco)...................................................................................................................................... 194 1.18.4.1 Security-related Log List......................................................................................................................................... 194 1.18.4.2 Security-related Log Description..........................................................................................................................194 1.18.4.2.1 Operation Logs....................................................................................................................................................... 194 1.18.4.2.2 System Logs............................................................................................................................................................. 195 1.18.4.2.3 Security Logs........................................................................................................................................................... 196 1.18.4.3 Server Logs.................................................................................................................................................................. 197 1.18.4.3.1 Command Audit Logs........................................................................................................................................... 197 1.18.4.3.2 Database Audit Logs.............................................................................................................................................198 1.19 Security Management.................................................................................................................................................... 201 1.19.1 Setting the System Login Mode.............................................................................................................................. 201 1.19.2 Creating Users................................................................................................................................................................201 1.19.3 Adjusting Permission After Changing Role of a User...................................................................................... 202 1.19.4 Monitoring Users.......................................................................................................................................................... 203 1.19.5 User Maintenance........................................................................................................................................................ 204 1.19.5.1 Common Operations for User Information Maintenance........................................................................... 205 1.19.5.2 Creating a Role and Granting Permissions.......................................................................................................207 1.19.5.3 Common Operations for Role Information Maintenance........................................................................... 209 1.19.5.4 Creating a User-defined Operation Set............................................................................................................. 210 1.19.5.5 Common Operations for Operation Set Information Maintenance........................................................ 211 1.19.5.6 Modifying User Information in Batches............................................................................................................ 213 1.19.5.7 Changing Personal Passwords.............................................................................................................................. 215 1.19.5.8 Resetting a User Password..................................................................................................................................... 215 1.19.6 Security Policies............................................................................................................................................................. 216 1.19.6.1 Setting the Account Policy..................................................................................................................................... 216 1.19.6.2 Setting the Password Policy...................................................................................................................................217 1.19.6.3 Configuring Service Parameters for User Management.............................................................................. 219 1.19.6.4 Setting a Client IP Address Policy........................................................................................................................ 221 1.19.6.5 Setting Login Time Policies.................................................................................................................................... 222 Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. v iManager NetEco Administrator Guide Contents 1.19.7 Remote Authentication Configuration.................................................................................................................. 222 1.19.7.1 Understanding Remote Authentication.............................................................................................................223 1.19.7.2 Configuring LDAP Authentication....................................................................................................................... 225 1.19.7.3 Configuring RADIUS Authentication...................................................................................................................227 1.19.7.4 LDAP Authentication Parameters........................................................................................................................ 229 1.19.7.5 RADIUS Authentication Parameter Description..............................................................................................237 1.19.8 SSO Configuration........................................................................................................................................................ 242 1.19.8.1 CAS SSO Configuration........................................................................................................................................... 243 1.19.8.1.1 About CAS SSO....................................................................................................................................................... 243 1.19.8.1.2 Configuring CAS SSO............................................................................................................................................ 244 1.20 NetEco Maintenance....................................................................................................................................................... 245 1.20.1 Network Diagnostics................................................................................................................................................... 246 1.20.2 Run Logs Collection..................................................................................................................................................... 246 1.20.3 Routine Inspection........................................................................................................................................................246 1.20.4 History Report................................................................................................................................................................ 247 1.20.5 HA Management.......................................................................................................................................................... 247 1.20.6 Viewing Server Information...................................................................................................................................... 249 1.21 File System of The NetEco............................................................................................................................................ 249 1.22 Routine Maintenance..................................................................................................................................................... 250 1.22.1 Daily Maintenance....................................................................................................................................................... 250 1.22.1.1 Checking Logs (the PowerEcho).......................................................................................................................... 250 1.22.1.2 Checking Logs (the NetEco).................................................................................................................................. 253 1.22.1.3 Checking Whether Online Users Are Authorized (the NetEco)................................................................ 255 1.22.2 Weekly Maintenance................................................................................................................................................... 256 1.22.2.1 Checking Backup Data............................................................................................................................................ 256 1.22.2.2 Checking User Configuration (the NetEco)..................................................................................................... 258 1.22.3 Monthly Maintenance................................................................................................................................................. 259 1.22.3.1 Checking the Certificate Validity Period (the PowerEcho)......................................................................... 259 1.22.3.2 Cleaning Up Disk Space.......................................................................................................................................... 260 1.22.3.3 Checking the Time Zone and Time..................................................................................................................... 262 1.22.4 Quarterly Maintenance.............................................................................................................................................. 263 1.22.4.1 Changing Passwords................................................................................................................................................ 263 1.23 FAQ....................................................................................................................................................................................... 263 1.23.1 Notifications................................................................................................................................................................... 263 1.23.1.1 How Do I Obtain a Mail Server Certificate on Google Chrome?..............................................................263 1.23.1.2 How Do I Obtain a Mail Server Certificate on Firefox?............................................................................... 264 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides?...................................................264 1.23.3 How Do I Query the IP Address of the Node Where a Database Instance Resides?............................ 265 1.23.4 How Do I Query the IP Address of a Node?....................................................................................................... 266 1.23.5 How Do I Query the Floating IP Address of a Node?...................................................................................... 266 1.23.6 How Do I Log In to the OS of a Node?................................................................................................................ 267 1.23.7 How Do I Check the Disk Usage?........................................................................................................................... 267 Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. vi iManager NetEco Administrator Guide Contents 1.23.8 How Do I Determine the Deployment Mode of the PowerEcho?............................................................... 268 1.23.9 How Do I Determine the Deployment Mode of Nodes?................................................................................ 268 1.23.10 How Do I Determine the Deployment Mode of a Database Instance?.................................................. 269 1.23.11 How Do I Check Whether Management Nodes and Product Nodes Use the Same Database Software?...................................................................................................................................................................................... 270 1.23.12 Performing Security Hardening or Dehardening for Internal Ports..........................................................270 1.23.13 How Do I Solve the Problem of Slow Response When Multiple Tab Pages of a Browser Are Opened?........................................................................................................................................................................................ 272 1.23.14 How Do I Query the Node Name Corresponding to the IP Address of the Management Node?.272 1.23.15 How Do I Create a Backup Path for a Backup Server?................................................................................. 273 1.23.16 How Do I Check the Deployment Status of a Product?................................................................................273 1.23.17 How Do I View Command Audit Logs?.............................................................................................................. 274 1.23.18 How Do I View Database Audit Logs?................................................................................................................ 275 1.23.19 How Do I Prevent PuTTY from Being Disconnected upon Timeout?....................................................... 276 1.23.20 How Do I Check the Active/Standy Status of a Node?................................................................................. 277 1.24 Common Operations.......................................................................................................................................................278 1.24.1 Logging In to a Server Using PuTTY...................................................................................................................... 278 1.24.2 Transferring Files Using FileZilla..............................................................................................................................279 1.24.3 Uninstalling the NetEco............................................................................................................................................. 280 1.24.4 Encrypting the Private Key of the Signature Certificate (the PowerEcho)............................................... 281 1.24.5 How Do I Change the Database Instance Password?...................................................................................... 283 1.24.6 Querying the Version Number of the PowerEcho............................................................................................. 285 1.24.7 Checking the Status of the PowerEcho Service.................................................................................................. 285 1.24.8 Abnormal NTP Server Status.................................................................................................................................... 286 1.24.9 Managing Passwords in the Weak Password Dictionary................................................................................ 288 1.24.10 Restoring the CA Certificates That Failed to Be Updated............................................................................ 289 1.24.11 Updating IR Certificates on the Product Nodes Failed When CA Certificates Are Being Updated ......................................................................................................................................................................................................... 293 1.24.12 Faults of Multiple Management Nodes............................................................................................................. 295 1.24.13 Querying a Product Name...................................................................................................................................... 300 1.24.14 Product Node Faults.................................................................................................................................................. 301 1.25 Appendix............................................................................................................................................................................. 303 1.25.1 Description of the unopened menus of the PowerEcho................................................................................. 304 1.25.2 Description of the unopened menus of the NetEco......................................................................................... 305 Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. vii iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1 NetEco Administrator Guide Overview This describes how to maintenance NetEco system. Product Version The following table lists the product versions related to this document. Product Name Product Version NetEco V600R010C10 Intended Audience This document is intended for the following engineers: ● Technical support engineers ● Maintenance engineers Change History Changes between document issues are cumulative. The latest document issue contains all the changes made in previous issues. Draft B (2020-11-30) This issue is the second release of the iManager NetEco V600R010C10 beta version. Draft A (2020-09-30) This issue is the first release of the iManager NetEco V600R010C10 beta version. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 1 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.1 Getting Started After NetEco is installed, you can maintain it through the PowerEcho and implement service functions through the NetEco. 1.1.1 Logging In to the NetEco This section describes how to use a browser to log in to the NetEco. Prerequisites ● The current PC can communicate properly with the client IP address of the NetEco and the services of the NetEco are running properly. ● You have obtained the username and password for login. ● The OS and browser of your PC must meet the following requirements. Context Table 1-1 Configuration requirements Issue Draft B (2020-11-30) Software Type Requirements OS Windows 10 Professional 64bit is recommended Browser Latest Chrome (Stable Channel) and Firefox (ESR Release) are recommended Resolution Optimal resolution: 1920 x 1080 (px) ● The NetEco provides the default user admin as the system administrator that has permissions on all resources. The initial password for the user is Changeme_123. For security purposes of the NetEco, change the password periodically and keep the new password secure. If the admin user enters incorrect passwords for five consecutive times within 10 minutes, the login IP address will be locked for 10 minutes. ● If three accounts using an IP address are locked within 10 minutes, this IP address will be locked for 30 minutes. ● If the login of an IP address meets the IP address lockout conditions specified on the Account Policy page, this IP address will be locked. ● If the login of a local account meets the account lockout conditions specified on the Account Policy page, this account will be locked for 30 minutes by default. ● All users can log in to the system again after their accounts are automatically unlocked. Local users can also contact security administrators to unlock their accounts for login again. Copyright © Huawei Technologies Co., Ltd. 2 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 Access the NetEco at https://client IP address of the NetEco:31943. Step 2 On the login page, enter the username and password, and click Log In. NOTE ● If you have changed your password after login, keep the new password secure. If you forget the password for the admin user, you can reset the password only by reinstalling the NetEco. ● For security purposes, do not set the browser to remember the password. Step 3 Optional: If Two-factor authentication is enabled, you also need to obtain a verification code. Enter the obtained verification code and click Log In. NOTE Click Switch Account to return to the login page and use another account to log in. ----End 1.1.2 Logging In to the PowerEcho This section describes how to use a browser to log in to the PowerEcho. Prerequisites ● The network connection between your PC and the client IP address of the PowerEcho is normal. ● You have obtained the password for the current login user. ● The operating system (OS) and browser of your PC must meet the requirements listed in Table 1-2. Context Table 1-2 Configuration requirements Issue Draft B (2020-11-30) Software Type Requirements OS Windows 10 Professional 64bit is recommended Browser Latest Chrome (Stable Channel) and Firefox (ESR Release) are recommended Resolution Optimal resolution: 1920 x 1080 (px) ● The PowerEcho provides the default user admin. The initial password for the admin user is Changeme_123. For security purposes, change the password periodically and keep the new password secure. ● If you enter the password for the admin user incorrectly for five consecutive times within 10 minutes, your IP address will be locked for 10 minutes. ● The management node in the document is the node where the PowerEcho is installed, and the product node is the node where the NetEco is installed. Copyright © Huawei Technologies Co., Ltd. 3 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 Access the PowerEcho at https://client IP address of the PowerEcho:31945. NOTE If the PowerEcho is deployed in cluster mode, use the floating IP address of the management node to log in. Step 2 On the login page, enter the username and password, and click Log In. NOTE ● When you log in to the system in local mode, enter the username admin and its password. The initial password for the admin user is Changeme_123. For security purposes, change the password periodically and keep the new password secure. ● When you log in to the PowerEcho for the first time, you are prompted to change the initial password for the admin user. Perform operations as prompted. If the password for the admin user is lost, you can restore the password only by reinstalling the system. ● For security purposes, do not save your password in the browser. ● By default, if you do not perform any operation within 30 minutes after a successful login, you will be automatically logged out. ----End 1.2 Power On and Power Off the NetEco System This section describes the procedures for powering on and off the NetEco system. 1.2.1 Powering On the System This section describes how to power on the hardware components when installing the NetEco system. The NetEco system consists of multiple hardware components. You need to power on them in sequence. Procedure Step 1 Prepare for powering on the server. 1. Ensure that the power switches of all the devices in the cabinet are set to OFF. If a power switch is ON, set it to OFF. 2. Ensure that the hardware devices are correctly placed and cable connections (especially the power cable connections) are correct and meet ESD specifications. Step 2 Turn on the power switch of the server to power on it. NOTE After the server is started properly, the button/indicator of its power switch is displayed green. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 4 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.2.2 Powering Off the System This section describes how to power off the NetEco system safely. If the local HA cluster system is used, perform the operations in this section on each of the three servers. Prerequisites Stopping the PowerEcho and the NetEco. For details, see 1.5.2 Stopping Product Services and 1.5.6 Stopping the PowerEcho Service. Procedure Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 2 Run the following command to switch to the root user: $ su - root Password: root password NOTE The default password of user root is Changeme_123. Step 3 Run the following command to shut down the NetEco: # sync;sync;sync;sync;sync;sync # shutdown -h now ----End 1.3 System Monitoring and Task Management After a product is installed on the PowerEcho, you can use this function to monitor resources such as nodes, services, databases, and processes on the PowerEcho and the NetEco. This helps you detect and resolve exceptions in a timely manner, ensuring efficient server running and normal product running. 1.3.1 Monitoring Products You can monitor the indicators of each node, service, and database in a centralized manner. By predicting and analyzing the indicators of each resource, you can identify and rectify faults in a timely manner. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 5 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Context The PowerEcho refreshes the status of nodes, services, and databases displayed on the page every 30 seconds. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product or PowerEcho. Step 3 In the upper right corner of the page, check whether any resource in Nodes, Services, Relational Databases, and Redis Databases is abnormal. NOTE The number in red indicates the number of abnormal resources. ● If the number of abnormal resources is 0, all resources of the product are normal. ● If the number of abnormal resources is not 0, there are abnormal resources in the product. Click a number of abnormal resources to view details on the tab page for the resource type. ----End 1.3.2 Monitoring Nodes You can monitor all nodes of the PowerEcho and the NetEco to identify and rectify faults in a timely manner, which ensures that the node servers are running efficiently. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Context The PowerEcho periodically monitors resources of the system. Table 1-3 lists the monitoring intervals. The status of monitored objects on the page is refreshed every 30 seconds. Table 1-3 Node monitoring intervals Issue Draft B (2020-11-30) Monitoring Object Interval (Second) Node status 180 Node resource (for example, CPU usage) 15 Service status 30 Copyright © Huawei Technologies Co., Ltd. 6 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Monitoring Object Interval (Second) Database status 60 Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product or PowerEcho. Step 3 On the Nodes tab page, view the usage of the CPU, virtual memory, physical memory, and disk partition. Refer to Table 1-4 to check the resource statuses. Alternatively, on the Nodes tab page, click a node name. On the page for node details, view the disk partition usage and the resource statuses of processes on the node. Table 1-4 Node resource status Object State Description Measures Conne ction Status Norm al The connection between the node and the PowerEcho is normal. N/A Discon nected The connection between the node and the PowerEcho is abnormal. ● Click the abnormal node and view the space usage and process status of each disk in the node on the details page. ● An alarm is reported if the node status is abnormal. Rectify the fault based on the alarm information. Databa se Status Issue Draft B (2020-11-30) -- The node does not have a database. N/A Partial ly Runni ng Some database instances on the node are not running. An alarm is reported if the database status is abnormal. Rectify the fault based on the alarm information. Not Runni ng All database instances on the node are stopped. Some maintenance operations require that the database is not running. Determine whether the database is abnormal based on site requirements. Runni ng The database instances on the node are running properly. N/A Copyright © Huawei Technologies Co., Ltd. 7 iManager NetEco Administrator Guide Object Service Status 1 NetEco Administrator Guide State Description Measures Unkno wn The system cannot detect the database instance status on the node. Collect related information and contact Huawei technical support. Startin g All database instances on the node are being started. If the service is in this state for a long time, contact Huawei technical support. Stoppi ng All database instances on the node are being stopped. Uninst alled The node service is not installed. Collect related information and contact Huawei technical support. -- The node does not provide services. N/A Partial ly Runni ng Some processes on the node are not running. On the Nodes tab page, click the node name. On the node details page, view the processes that are not running and determine whether the processes are abnormal based on site requirements. Not Runni ng All services on the node are stopped. Some maintenance operations require that the service is not running. Determine whether the service is abnormal based on site requirements. Runni ng All services on the node are running. N/A Unkno wn The system cannot detect the service status on the node. An alarm is reported if the service status is abnormal. Rectify the fault based on the alarm information. Faulty Some services on the node are faulty. Startin g All services on the node are being started. Stoppi ng All services on the node are being stopped. The startup or stopping duration of a service does not exceed 1 minute. If the service is in this state for a long time, contact Huawei technical support. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 8 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.3.3 Monitoring Services You can monitor all services of the PowerEcho and the NetEco to identify and rectify faults in a timely manner, which ensures that the services are running properly. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Context The PowerEcho monitors services of the system every 30 seconds. The status displayed on the page is refreshed every 30 seconds. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product or PowerEcho. Step 3 Click the Services tab page and refer to Table 1-5 to check the service status. Alternatively, click the desired service instance name. On the page for service details, view the status of processes and other resources of the service. Table 1-5 Service status Issue Draft B (2020-11-30) State Description Measures Partiall y Runnin g Some processes of the service are not running. Click the name of the corresponding service instance. On the service details page, view the processes that are not running, and determine whether the processes are abnormal based on site requirements. Not Runnin g All processes of the service are stopped. Some maintenance operations require that the service is not running. Therefore, you need to determine whether the service is abnormal based on site requirements. Runnin g All processes of the service are running. N/A Unkno wn The system cannot detect the status of processes of the service. An alarm is reported if the service status is abnormal. Rectify the fault based on the alarm information. Faulty Some processes of the service are faulty. Copyright © Huawei Technologies Co., Ltd. 9 iManager NetEco Administrator Guide 1 NetEco Administrator Guide State Description Measures Startin g All processes of the service are being started. Stoppin g All processes of the service are being stopped. The startup or stopping duration of a service does not exceed 1 minute. If the service is in this state for a long time, contact Huawei technical support. ----End 1.3.4 Monitoring Databases You can monitor the relational databases and Redis databases of the PowerEcho and the NetEco to identify and rectify faults in a timely manner, which ensures that the databases are running properly. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Context ● The PowerEcho monitors databases of the system every 60 seconds. The status displayed on the page is refreshed every 30 seconds. ● A relational database is created on the basis of a relational model for storing persistent data, such as the GaussDB T database. The PowerEcho monitors the usage of the relational databases. This helps you to identify and rectify the insufficiency of the database space in a timely manner. ● A Redis database is a high-performance key-value database that stores cached status-related data. The PowerEcho monitors the memory usage of the Redis databases so that you can identify and rectify insufficient memory space in a timely manner. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product or PowerEcho. Step 3 Click the Relational Databases or Redis Databases tab page. Refer to Table 1-6 and Table 1-7 to check the database status. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 10 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-6 Database status table State Description Measures Not Runnin g The database is not running. An alarm is reported if the database status is abnormal. Rectify the fault based on the alarm information. Unkno wn The system cannot detect the database status. Runnin g The database on the node is running properly. N/A Table 1-7 Database instance replication status Issue Draft B (2020-11-30) State Description Measures Norma l The replication between the master and slave database instances is normal. N/A Abnor mal The replication between the master and slave database instances is abnormal. An alarm is reported if the database instance replication status is abnormal. Rectify the fault based on the alarm information. Full Synchr onizing The slave database instance is rebuilt, and all data of the master database instance is being forcibly synchronized to the slave database instance. N/A Copyright © Huawei Technologies Co., Ltd. 11 iManager NetEco Administrator Guide 1 NetEco Administrator Guide State Description Measures -- The database instance is a single instance and does not have a master/ slave relationship. N/A ----End 1.3.5 Monitoring Processes You can monitor the processes of the PowerEcho and the NetEco to identify and rectify faults in a timely manner, which ensures that the processes are running properly. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Context The PowerEcho monitors processes of the system every 30 seconds. The status displayed on the page is refreshed every 30 seconds. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product or PowerEcho. Step 3 On the Processes tab page, check the process status based on Table 1-8. Table 1-8 Process status Issue Draft B (2020-11-30) State Description Measures Not Runnin g The process is not running. Some maintenance operations require that the processes are not running. Determine whether the process is abnormal based on site requirements. Copyright © Huawei Technologies Co., Ltd. 12 iManager NetEco Administrator Guide 1 NetEco Administrator Guide State Description Measures Stoppe d (standb y) The process is deployed in active/ standby mode, and runs only on the active node instead of the standby node, which is normal. N/A Runnin g The process is running. N/A Unkno wn The system cannot detect the process status. Collect related information and contact Huawei technical support. Faulty The process is faulty. Fault (isolate d) The process is faulty and does not provide services externally. An alarm is reported if the process is faulty. Rectify the fault based on the alarm information. Startin g The process is being started. Stoppin g The process is being stopped. If the service is in this state for a long time, contact Huawei technical support. ----End 1.3.6 Modifying Monitoring Thresholds The PowerEcho can report alarms if a resource is abnormal. The system has default monitoring thresholds for nodes, relational databases, and Redis databases. When the usage of a monitored object reaches the thresholds, the PowerEcho reports corresponding alarms, and the alarm notifications are received on the NetEco. If the default monitoring thresholds do not match the actual resource usage and alarms are frequently reported, you can modify the monitoring thresholds based on site requirements. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Context Table 1-9 lists the default thresholds and resource objects that can be configured. NOTE X indicates the value of Alarm Generation Threshold, Y indicates the value of Alarm Clearance Threshold, and N indicates the value of Threshold-crossing Times. Y must be less than X. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 13 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-9 Configuring monitoring thresholds Item Object Conditions for Reporting Alarms Condition for Clearing Alarms Node CPU The CPU usage sampled every 15 seconds in N consecutive times is greater than or equal to X%. Any sampled CPU usage is less than X%. Default value: X = 85 Default value: N = 40, X = 85 Physical memory In a detection period (15 seconds), the physical memory usage is greater than or equal to X%. Default value: X = 85 Virtual memory In a detection period (15 seconds), the virtual memory usage is greater than or equal to X%. Default value: X = 85 Disk partition In a detection period (15 seconds), the disk partition usage is greater than or equal to X%. Default value: X = 80 Relatio nal databa se Redis databa se Database tablespace usage Memory The physical memory usage is less than or equal to Y%. Default value: Y = 80 The virtual memory usage is less than or equal to Y%. Default value: Y = 80 The disk partition usage is less than or equal to Y%. Default value: Y = 75 In a detection period (180 seconds), the database tablespace usage is greater than or equal to X%. The database tablespace usage is less than or equal to Y %. Default value: X = 95 Default value: Y = 85 In a detection period (180 seconds), the memory usage is greater than or equal to X%. The memory usage is less than or equal to Y %. Default value: X = 80 Default value: Y = 70 Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product or PowerEcho. Step 3 Click the tab where the resource object resides. Step 4 Click on the right of the page and set parameters. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 14 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.4 Starting the PowerEcho and the NetEco 1.4.1 Starting Product Services and Databases This section describes how to start product services and databases. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product. Perform required operations based on Table 1-10. Table 1-10 Starting product services and databases Task Operation Start all services and databases of the product. In the upper left corner of the page, click Start, choose Start All from the drop-down menu, and perform operations as prompted. Start services and databases on nodes. On the Nodes tab page, select the nodes with services and databases to be started, click Start on the right of the page, and perform operations as prompted. Step 3 After the task is successfully executed, check that Service Status and DB Status of the nodes are both Running on the Nodes tab page. ----End 1.4.2 Starting Product Databases This section describes how to start product databases. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product. Perform required operations based on Table 1-11. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 15 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-11 Starting databases Task Operation Start all databases of the product. In the upper left corner of the page, click Start, choose Start DB from the drop-down menu, and perform operations as prompted. Start databases on a node. On the Nodes tab page, click in the Operation column of the row that contains the node and perform operations as prompted. Step 3 After the task is successfully executed, check that DB Status of the node is Running on the Nodes tab page. ----End 1.4.3 Starting Product Services This section describes how to start product services. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The databases of the product are running. For details, see 1.4.2 Starting Product Databases. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product. Perform required operations based on Table 1-12. Table 1-12 Starting services Task Operation Start all services of the product. In the upper left corner of the page, click Start, choose Start Service from the drop-down menu, and perform operations as prompted. Start services on a node. Start one or more services. Issue Draft B (2020-11-30) On the Nodes tab page, click in the Operation column of the row that contains the node and perform operations as prompted. On the Services tab page, select the services to be started, click Start on the right of the page, and perform operations as prompted. Copyright © Huawei Technologies Co., Ltd. 16 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 3 After the task is successfully executed, check the node or service status. ● If you have started services on all nodes or a single node of the product, check that Service Status of the nodes is Running on the Nodes tab page. ● If you have started a single service or multiple services, check that Service Status of the node is Partially Running on the Nodes tab page, and Status of the services is Running on the Services tab page. NOTE If you have started all services on the Services tab page, check that Service Status of the nodes is Running on the Nodes tab page. The snmpagentservice service is controlled by a license. If no license is imported, the service is not running. After the license containing the SNMP NBI is imported, the service runs properly. If you import a license that does not contain the SNMP NBI again, the license is displayed as Not Running. ----End 1.4.4 Starting Product Processes This section describes how to start product processes. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product. Step 3 On the Processes tab page, select processes to be started, click Start above the process list, and perform operations as prompted. Step 4 After the task is successfully executed, check that the processes are in the Running state on the Processes tab page. ----End 1.4.5 Starting the PowerEcho Service and Databases This section describes how to start the service and databases of the PowerEcho by running commands. Prerequisites You have obtained the passwords for the sopuser and ossadm users of the management node. If the PowerEcho is deployed in cluster mode, that is, there are multiple management nodes, you have obtained the IP addresses of active and standby management nodes where OMMHA resides. For details, see 1.23.20 How Do I Check the Active/Standy Status of a Node? Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 17 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure If the PowerEcho is deployed in single-server mode: Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to start the service and databases of the PowerEcho: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd startmgr If information similar to the following is displayed, the service and databases of the PowerEcho on the node are started successfully. Otherwise, contact Huawei technical support. ... ============================ Starting management dc is complete ... ============================ Starting management processes is complete. ----End If the PowerEcho is deployed in cluster mode: Step 1 Use PuTTY to log in to the active management node where OMMHA resides, as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to start OMMHA: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd startapp -tenant manager -app OMMHAService If information similar to the following is displayed and success is displayed for the process, OMMHA is started successfully. Otherwise, contact Huawei technical support. Starting process ommha-0-0 ... success Step 4 Run the following commands to start the service and databases of the PowerEcho: > ipmc_adm -cmd startmgr If information similar to the following is displayed, the service and databases of the PowerEcho on the node are started successfully. Otherwise, contact Huawei technical support. ... ============================ Starting management dc is complete Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 18 iManager NetEco Administrator Guide 1 NetEco Administrator Guide ... ============================ Starting management processes is complete. Step 5 Use PuTTY to log in to the standby management node where OMMHA resides, as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 6 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 7 Run the following commands to start OMMHA: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd startapp -tenant manager -app OMMHAService If information similar to the following is displayed and success is displayed for the process, OMMHA is started successfully. Otherwise, contact Huawei technical support. Starting process ommha-0-0 ... success Step 8 Run the following commands to start the service and databases of the PowerEcho: > ipmc_adm -cmd startmgr If information similar to the following is displayed, the service and databases of the PowerEcho on the node are started successfully. Otherwise, contact Huawei technical support. ... ============================ Starting management dc is complete ... ============================ Starting management processes is complete. Step 9 Use PuTTY to log in to other management nodes as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 10 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 11 Run the following commands to start the service and databases of the PowerEcho: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd startmgr If information similar to the following is displayed, the service and databases of the PowerEcho on the node are started successfully. Otherwise, contact Huawei technical support. ... ============================ Starting management dc is complete ... ============================ Starting management processes is complete. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 19 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.4.6 Starting the PowerEcho Databases This section describes how to start the databases of the PowerEcho by running commands. Prerequisites You have obtained the passwords for the sopuser and ossadm users of the management node. Procedure Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. NOTE If the PowerEcho is deployed in cluster mode, open a new PuTTY window to start the databases on Management1 within three minutes after you run the startup command on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? After you have started databases on two nodes, check the startup result of the nodes. If the startup fails on a node, contact Huawei technical support. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to start the PowerEcho databases: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd startdc -tenant manager If information similar to the following is displayed and success is displayed for all processes, the databases of the PowerEcho are started successfully. Otherwise, contact Huawei technical support. ============================ Starting data container processes... Starting redis process woadapterrdb-1-14 ... success ... Starting redis process serviceinspectionrdb-1-3 ... success Starting redis process privilegerdb-1-28 ... success ============================ Starting data container processes is complete. ----End 1.4.7 Starting the PowerEcho Service This section describes how to start the PowerEcho service by running commands. Prerequisites Issue Draft B (2020-11-30) ● The database instances of the PowerEcho are running. For details, see 1.4.6 Starting the PowerEcho Databases. ● You have obtained the passwords for the sopuser and ossadm users of the management node. Copyright © Huawei Technologies Co., Ltd. 20 iManager NetEco Administrator Guide ● 1 NetEco Administrator Guide If the PowerEcho is deployed in cluster mode, that is, there are multiple management nodes, you have obtained the IP addresses of active and standby management nodes where OMMHA resides. For details, see 1.23.20 How Do I Check the Active/Standy Status of a Node? Procedure If the PowerEcho is deployed in single-server mode: Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to start all services: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd startapp -tenant manager If information similar to the following is displayed and success is displayed for all processes, all services on the node are started successfully. Otherwise, contact Huawei technical support. ... Starting process user-0-0 ... success Starting process cron-0-0 ... success ... ----End If the PowerEcho is deployed in cluster mode: Step 1 Use PuTTY to log in to the active management node where OMMHA resides, as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to start OMMHA: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd startapp -tenant manager -app OMMHAService If information similar to the following is displayed and success is displayed for all processes, OMMHA is started successfully. Otherwise, contact Huawei technical support. Starting process ommha-0-0 ... success Step 4 Run the following command to start all services on the node: > ipmc_adm -cmd startapp -tenant manager Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 21 iManager NetEco Administrator Guide 1 NetEco Administrator Guide If information similar to the following is displayed and success is displayed for all processes, all services on the node are started successfully. Otherwise, contact Huawei technical support. ... Starting process user-0-0 ... success Starting process cron-0-0 ... success ... Step 5 Use PuTTY to log in to the standby management node where OMMHA resides, as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 6 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 7 Run the following commands to start OMMHA: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd startapp -tenant manager -app OMMHAService If information similar to the following is displayed and success is displayed for all processes, OMMHA is started successfully. Otherwise, contact Huawei technical support. Starting process ommha-0-0 ... success Step 8 Run the following command to start all services on the node: > ipmc_adm -cmd startapp -tenant manager If information similar to the following is displayed and success is displayed for all processes, all services on the node are started successfully. Otherwise, contact Huawei technical support. ... Starting process user-0-0 ... success Starting process cron-0-0 ... success ... Step 9 Use PuTTY to log in to other management nodes as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 10 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 11 Run the following commands to start all services: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd startapp -tenant manager If information similar to the following is displayed and success is displayed for all processes, all services on the node are started successfully. Otherwise, contact Huawei technical support. ... Starting process user-0-0 ... success Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 22 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Starting process cron-0-0 ... success ... ----End 1.5 Stopping the PowerEcho and the NetEco 1.5.1 Stopping Product Services and Databases Stop product services and databases as required during system maintenance. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product. Perform required operations based on Table 1-13. Table 1-13 Stopping product services and databases Task Operation Stop all services and databases of the product. In the upper left corner of the page, click Stop, choose Stop All from the drop-down menu, and perform operations as prompted. Stopping services and databases on a node. On the Nodes tab page, select the nodes to be stopped, click Stop on the right of the page, and perform operations as prompted. Step 3 After the task is successfully executed, check that Service Status and DB Status of the nodes are both Not Running on the Nodes tab page. ----End 1.5.2 Stopping Product Services Stop product services as required during system maintenance. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 23 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product. Perform required operations based on Table 1-14. Table 1-14 Stopping services Task Operation Stop all services of the product. In the upper left corner of the page, click Stop, choose Stop Service from the drop-down menu, and perform operations as prompted. Stop services on a node. Stop one or more services. On the Nodes tab page, click in the Operation column of the row that contains the node and perform operations as prompted. On the Services tab page, select the services to be stopped, click Stop on the right of the page, and perform operations as prompted. Step 3 After the task is successfully executed, check the node or service status. ● If you have stopped services on all nodes or a single node of the product, check that Service Status of the nodes is Not Running on the Nodes tab page. ● If you have stopped a single service or multiple services, check that Service Status of the nodes is Partially Running on the Nodes tab page, and Status of the services is Not Running on the Services tab page. NOTE If you have stopped all services on the Services tab page, check that Service Status of the nodes is Not Running on the Nodes tab page. ----End 1.5.3 Stopping Product Databases Stop product databases as required during system maintenance. Prerequisites Issue Draft B (2020-11-30) ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● To ensure that services are running properly, you are advised to stop the services of the corresponding product or node before stopping the database. For details, see 1.5.2 Stopping Product Services. Copyright © Huawei Technologies Co., Ltd. 24 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product. Perform required operations based on Table 1-15. Table 1-15 Stopping databases Task Operation Stop all databases of the product. In the upper left corner of the page, click Stop, choose Stop DB from the drop-down menu, and perform operations as prompted. Stop databases on a node. On the Nodes tab page, click in the Operation column of the row that contains the node and perform operations as prompted. Step 3 After the task is successfully executed, check that DB Status of the node is Not Running on the Nodes tab page. ----End 1.5.4 Stopping Product Processes Stop product processes as required during system maintenance. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select the product. Step 3 On the Processes tab page, select processes to be stopped, click Stop above the process list, and perform operations as prompted. Step 4 After the task is successfully executed, check that the processes are in the Not Running state on the Processes tab page. ----End 1.5.5 Stopping the PowerEcho Service and Databases This section describes how to stop the service and databases of the PowerEcho by running commands. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 25 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Prerequisites You have obtained the passwords for the sopuser and ossadm users of the management node. Procedure If the PowerEcho is deployed in single-server mode: Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to stop the service and databases of the PowerEcho: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd stopmgr If information similar to the following is displayed, the service and databases of the PowerEcho on the node are stopped successfully. Otherwise, contact Huawei technical support. ... ============================ Stopping management processes is complete. ... ============================ Stopping management dc is complete ----End If the PowerEcho is deployed in cluster mode: Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. NOTE Perform the following operations on all the management nodes. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to stop the service and databases of the PowerEcho: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd stopnode If success is displayed for all services, all services and databases on the node is stopped successfully. Otherwise, contact Huawei technical support. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 26 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.5.6 Stopping the PowerEcho Service This section describes how to stop the PowerEcho service by running commands. Prerequisites You have obtained the passwords for the sopuser and ossadm users of the management node. If the PowerEcho is deployed in cluster mode, that is, there are multiple management nodes, you have obtained the IP addresses of active and standby management nodes where OMMHA resides. For details, see 1.23.20 How Do I Check the Active/Standy Status of a Node? Procedure If the PowerEcho is deployed in single-server mode: Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to stop all services: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd stopapp -tenant manager If information similar to the following is displayed and success is displayed for all processes, all services on the node are stopped successfully. Otherwise, contact Huawei technical support. ... Stopping process user-0-0 ... success Stopping process cron-0-0 ... success ... ----End If the PowerEcho is deployed in cluster mode: Step 1 Use PuTTY to log in to the standby management node where OMMHA resides, as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to stop OMMHA: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd stopapp -tenant manager -app OMMHAService Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 27 iManager NetEco Administrator Guide 1 NetEco Administrator Guide If information similar to the following is displayed and success is displayed for the process, OMMHA is stopped successfully. Otherwise, contact Huawei technical support. Stopping process ommha-0-0 ... success Step 4 Run the following command to stop all services on the node: > ipmc_adm -cmd stopapp -tenant manager If information similar to the following is displayed and success is displayed for all processes, all services on the node are stopped successfully. Otherwise, contact Huawei technical support. ... Stopping process user-0-0 ... success Stopping process cron-0-0 ... success ... Step 5 Use PuTTY to log in to the active management node where OMMHA resides, as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 6 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 7 Run the following commands to stop OMMHA: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd stopapp -tenant manager -app OMMHAService If information similar to the following is displayed and success is displayed for the process, OMMHA is stopped successfully. Otherwise, contact Huawei technical support. Stopping process ommha-0-0 ... success Step 8 Run the following command to stop all services on the node: > ipmc_adm -cmd stopapp -tenant manager If information similar to the following is displayed and success is displayed for all processes, all services on the node are stopped successfully. Otherwise, contact Huawei technical support. ... Stopping process user-0-0 ... success Stopping process cron-0-0 ... success ... Step 9 Use PuTTY to log in to other management nodes as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 10 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 11 Run the following commands to stop all services: Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 28 iManager NetEco Administrator Guide 1 NetEco Administrator Guide > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd stopapp -tenant manager If information similar to the following is displayed and success is displayed for all processes, all services on the node are stopped successfully. Otherwise, contact Huawei technical support. ... Stopping process user-0-0 ... success Stopping process cron-0-0 ... success ... ----End 1.5.7 Stopping the PowerEcho Databases This section describes how to stop the databases of the PowerEcho by running commands. Prerequisites ● The PowerEcho service is in the Not Running state. For details, see 1.5.6 Stopping the PowerEcho Service. ● You have obtained the passwords for the sopuser and ossadm users of the management node. Procedure Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. NOTE If the PowerEcho is deployed in cluster mode, log in to Management0 and Management1, and perform the following operations. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to stop the databases of the PowerEcho: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd stopdc -tenant manager If information similar to the following is displayed and success is displayed for all processes, the databases of the PowerEcho are stopped successfully. Otherwise, contact Huawei technical support. ============================ Stopping data container processes... Stopping redis process woadapterrdb-1-14 ... success ... Stopping redis process privilegerdb-1-28 ... success Stopping redis process rnrdb-1-21 ... success ============================ Stopping data container processes is complete. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 29 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.6 Configuring Network Information On the PowerEcho, you can configure network information for each node. Ensure that nodes can communicate with each other properly. 1.6.1 Modifying Hostnames To identify the meaning and function of a node on the network, set a unique hostname for each node. Prerequisites ● The hostname has been planned and meets the hostname naming rules. ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Precautions If any management node is faulty, restore the node first. Otherwise, hostnames cannot be configured. For details, see Table 1-16. Table 1-16 Troubleshooting the management node faults No. Check Item Check Method Troubleshooting Method 1 Network connection Contact the administrator to check whether the network connection is normal. Contact the network administrator to restore the network. 2 Running status of VMs or physical machines Contact the administrator to check whether VMs or physical machines are abnormal, for example, powered-off or deleted. Contact the administrator to restore the VMs or physical machines. 3 The PowerEcho running status Log in to the PowerEcho. ● If the login page is displayed, the fault is rectified. ● If the login page is not displayed or no response is returned, restore the PowerEcho. For details, see 1.11.8 Restoring the PowerEcho. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 30 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Context The hostname must meet the following requirements: ● The hostname must be unique on the network. ● The hostname contains 2 to 63 characters, and can only contain letters, digits, and hyphens (-). ● The hostname cannot contain double hyphens (--). ● The hostname cannot contain spaces. ● The hostname must start with a letter, and cannot end with a hyphen (-). ● The hostname is case-sensitive. ● The hostname cannot be localhost or localhost.localdomain, regardless of the letter case. Procedure Step 1 On the PowerEcho, choose Maintenance > Network Configuration > Modify Hostname from the main menu. Step 2 On the Modify Hostname page, perform the operations by referring to Table 1-17. Table 1-17 Modifying hostnames Task Operation Importing the configuration Modify the exported hostname file and then import the modified hostname file to the system to modify the hostnames of nodes in batches. Click Import Configuration and perform operations as prompted. NOTE ● The file to be imported must be in .xlsx or .csv format. The size of the file cannot exceed 2 MB. ● The requirements for the file name are as follows: 1. The file name can contain only letters, digits, hyphens (-), and underscores (_). 2. The file name can contain a maximum of 60 characters. Configuring hostnames on the web client Directly change the hostnames of nodes in sequence on the Direct Configuration page. Click Direct Configuration and perform operations as prompted. ----End 1.6.2 Configuring Network Interfaces If the network interface configuration changes (for example, an equipment room is relocated or a subnet is changed), update the network interface configuration. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 31 iManager NetEco Administrator Guide 1 NetEco Administrator Guide After a network interface is added to the PowerEcho, you can manage and maintain the network interface on the PowerEcho. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The network interface to be added to the PowerEcho. ● In a remote cold backup scenario, the remote cold backup system has been deleted. For details, see 1.12.2.7 Deleting the Remote Cold Backup System. ● When a network interface is deleted, its IP address is deleted, and the network interface is removed from the PowerEcho. However, the network interface will not be removed. ● If you configure the network interface of the management node, the system automatically restarts OMMHAService on all nodes. If you configure the network interface of a product node, the system automatically restarts OMMHAService on the product node. During the restart of OMMHAService, the services monitored by OMMHAService are also restarted and become unavailable temporarily. After the restart, the services become available again. If OMMHAService is not deployed on the management node or the product node, restart is not involved. ● If the product services are not in the Running state, after a network interface is added or deleted, the product services will be automatically started. In the Warning dialog box, if you deselect Automatically start the product services after the configuration, the product services will not be automatically started, and you need to manually start them. For details, see 1.4.3 Starting Product Services. Precautions NOTE If a network interface without IP address is added or deleted, the system does not need to start product services and this Warning dialog box will not be displayed. ● In a remote cold backup scenario, configure network interfaces at the primary site and then perform the same configurations at the secondary site to ensure that the network interface configurations at the primary and secondary sites are consistent. ● If the PowerEcho is deployed in cluster mode and some of Management0, Management1, and Management2 are faulty, restore the faulty nodes first. Otherwise, the network interface fails to be configured. Procedure Step 1 On the PowerEcho, choose Maintenance > Network Configuration > Configure NIC from the main menu. Step 2 On the Configure NIC page, perform operations as prompted. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 32 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE ● If you want to perform other configuration operations that need to restart product services after configuring the network interfaces, do not select Automatically start the product services after the configuration in the Warning dialog box. In this case, after the configuration, the product services will not be automatically started, preventing the product services from being restarted for several times. ● If a network interface without IP address is added or deleted, the system does not need to start product services and this Warning dialog box will not be displayed. ● In a remote cold backup scenario, if you are configuring the network interfaces at the secondary site, do not select Automatically start the product services after the configuration in the Warning dialog box, preventing the product services of the secondary site from being restarted and causing the product to become dual-active. Step 3 In a remote cold backup scenario, rebuild a remote cold backup system. For details, see 1.12.2.1 Configuring a Remote Cold Backup System. ----End Follow-up Procedure After a network interface is configured, all historical backup files have become invalid. Manually back up the application and data of the PowerEcho, the database applications, product applications, and product data. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho and 1.11.5 Backing Up Products. 1.6.3 Configuring IP Addresses If IP address conflict occurs on the network or the overall network plan changes (for example, an equipment room is relocated or a subnet mask is changed), change the IP address, subnet mask, and usage accordingly. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The databases of the product to be modified are running properly. For details, see 1.3.4 Monitoring Databases. ● If the IP address to be changed is the client IP address of the PowerEcho, add the route corresponding to the new IP address to the PowerEcho to ensure that the PowerEcho can be accessed after the IP address is changed. For details, see 1.6.4 Configuring Routes. ● In the cluster scenario, if you want to change the IP addresses in different network segments, change the IP addresses on all nodes. ● In a remote cold backup scenario, the remote cold backup system has been deleted. For details, see 1.12.2.7 Deleting the Remote Cold Backup System. ● After you change IP address of a product node, the product services will be automatically restarted by default. In the Warning dialog box, if you deselect Automatically start the product services after configuring the IP addresses, the product services will not be automatically started, and you Precautions Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 33 iManager NetEco Administrator Guide 1 NetEco Administrator Guide need to manually start them after the configuration. For details, see 1.4.3 Starting Product Services. ● After you change IP address of a database node, the databases and the product services will be automatically restarted by default. In the Warning dialog box, if you deselect Automatically start the product services after configuring the IP addresses, the product services will not be automatically started, and you need to manually start them after the configuration. For details, see 1.4.3 Starting Product Services. ● After you change the IP address of the management node, the databases and the the PowerEcho service will be automatically restarted. ● If the PowerEcho is deployed in cluster mode and some of Management0, Management1, and Management2 are faulty, restore the faulty nodes first. Otherwise, the IP address fails to be configured. For details, see 1.11.8 Restoring the PowerEcho. Procedure Step 1 On the PowerEcho, choose Maintenance > Network Configuration > Configure IP Address from the main menu. Step 2 On the Configure IP Address page, refer to Table 1-18 to perform the operations. Table 1-18 Configuring IP addresses Task Operation Importing the configuration Configure the IP address information in the exported network interface information file, and then import the modified network interface information file to the system to change the IP addresses of the network interfaces in batches. Click Configuration Import and perform operations as prompted. NOTE ● The file to be imported must be in .xlsx or .csv format. The size of the file cannot exceed 2 MB. ● The requirements for the file name are as follows: Modifying IP addresses – The file name can contain only letters, digits, hyphens (-), and underscores (_). – The file name can contain a maximum of 60 characters. Modify the IP addresses of network interfaces in sequence on the GUI. Click Modify IP Address and perform operations as prompted. NOTE If the PowerEcho is deployed in cluster mode, select the node to be configured, and then modify the IP address. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 34 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Task Operation Adding IP addresses Add the IP addresses of network interfaces in sequence on the GUI. Click Add IP Address and perform operations as prompted. ----End Follow-up Procedure ● If the new and old IP addresses belong to different network segments, delete the routes corresponding to the old IP addresses from the PowerEcho. For details, see 1.6.4 Configuring Routes. ● After an IP address is configured, all historical backup files have become invalid. Manually back up the application and data of the PowerEcho, the database applications, product applications, and product data. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho and 1.11.5 Backing Up Products. ● Changing the IP address of the backup server will cause failure to save files to the backup server. Update the backup parameters accordingly. For details, see 1.11.4 Configuring Backup Parameters. 1.6.4 Configuring Routes If the network configuration changes (for example, an equipment room is relocated or a subnet is changed), update the route configuration to ensure proper system running. If no route is configured between the system and the destination IP address, the system communicates with the destination IP address using the default route. Prerequisites ● You have obtained the destination network, subnet mask, and gateway of the route. ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● If the gateway address of the route and the IP address of corresponding network interface are in different network segments, change the corresponding IP address to make the route take effect. For details, see 1.6.3 Configuring IP Addresses. ● Do not delete the route used for connecting to the management when deleting a route of the management node. Otherwise, you cannot log in to the PowerEcho. ● If there are two routes with the same destination address, you need to manually delete the unnecessary route on the Configure Route page. Otherwise, the network connection to the destination address is abnormal. Precautions Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 35 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 On the PowerEcho, choose Maintenance> Network Configuration > Configure Route from the main menu. Step 2 In the Select node and query route area, select the nodes with routes to be configured. Step 3 Click Query. Step 4 In the Configure route area, modify, add, or delete routes for the selected nodes. For details, see Table 1-19. Table 1-19 Configuring routes Task Operation Modifying routes If NIC Name is -, the node has the default route. If the default route exists, you can modify it but cannot add other default routes for the node. IP addresses of the same protocol (IPv4 or IPv6) have only one default route. 1. Select and modify a route. – To modify the default route, select the corresponding records whose NIC Name is -, and configure Gateway/ Next Hop. – To modify a non-default route, select the desired network interface from the NIC Name drop-down list based on the planning information, and configure Destination Network, Subnet Mask/Prefix Length, and Gateway/ Next Hop. 2. Click Apply. NOTE Clicking Reset will clear all unsaved configurations on the page and will restore the configurations to the state before you select nodes and query routes. 3. In the Confirm dialog box, click Yes. The related task is created successfully. Click Task List to view the task execution status. If the task execution fails, rectify the fault based on the task details. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 36 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Task Operation Adding routes If no default route is available or new routes need to be added, perform the following operations: 1. Click Add Route. 2. Select nodes with routes to be added. – To add a default route, select Default Route and configure Gateway/Next Hop. – To add a non-default route, select the desired network interface from the NIC Name drop-down list, and configure Destination Network, Subnet Mask/Prefix Length, and Gateway/Next Hop. 3. Click OK. 4. In the Confirm dialog box, click Yes. The related task is created successfully. Click Task List to view the task execution status. If the task execution fails, rectify the fault based on the task details. Deleting routes If routes are no longer necessary, delete them to save resources. 1. Select the desired routes and delete them. – To delete default routes, select the desired routes, and click Delete Route. – To delete non-default routes, select one or more desired routes and click Delete Route. 2. In the Warning dialog box, click OK. The related task is created successfully. Click Task List to view the task execution status. If the task execution fails, rectify the fault based on the task details. NOTE Do not delete the route used for connecting to the PowerEcho when deleting a route of the management node. Otherwise, you cannot log in to the PowerEcho. ----End 1.6.5 Configuring Floating IP Addresses If the PowerEcho is deployed in cluster mode, you can configure a floating IP address for multiple nodes to prevent the system from failing to provide services due to faults of a node. The PowerEcho allows you to configure a floating IP address for specified nodes of a product. In addition, you can modify or delete the configured floating IP address. Prerequisites Issue Draft B (2020-11-30) ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The databases of the product to be modified are running properly. For details, see 1.3.4 Monitoring Databases. Copyright © Huawei Technologies Co., Ltd. 37 iManager NetEco Administrator Guide 1 NetEco Administrator Guide ● A floating IP address can be configured only for nodes of the same type. For details about how to check the node type, see 1.3.4 Monitoring Databases. ● After you change the floating IP address, the product services will be automatically restarted by default. In the Warning dialog box, if you deselect Automatically start the product services after configuring the floating IP address, the product services will not be automatically started, and you need to manually start them. For details, see 1.4.3 Starting Product Services. ● If the PowerEcho is deployed in cluster mode and some of Management0, Management1, and Management2 are faulty, restore the faulty nodes first. Otherwise, the floating IP address cannot be configured. For details, see 1.11.6 Backing Up the PowerEcho. Precautions Procedure Step 1 On the PowerEcho, choose Maintenance > Network Configuration > Configure Floating IP Address from the main menu. Step 2 On the Configure Floating IP Address page, perform operations as prompted. ----End Follow-up Procedure Manually back up the application and data of the management node, database applications, product applications, and product data. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho and 1.11.5 Backing Up Products. 1.6.6 Configure Southbound IP address This section describes how to configure southbound IP. This section is only applicable to the southbound and northbound network isolation scenario. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● In a remote cold backup scenario, the remote cold backup system has been deleted. For details, see 1.12.2.7 Deleting the Remote Cold Backup System. 1. Please configure the southbound IP address according to the following scenarios. Procedure Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 38 iManager NetEco Administrator Guide 1 NetEco Administrator Guide If then Adding the Southbound IP Address ● Single-Node System Scenario 1. Delete the southbound usage bound to the management IP address. a. On the PowerEcho, choose Maintenance > Network Configuration > Configure IP Address from the main menu. b. Click Modify IP Address, select the IP address to be configured, click Edit, deselect Southbound in NIC Usage, and click Apply. 2. Adding the Southbound Network Port. a. On the PowerEcho, choose Maintenance > Network Configuration > Configure NIC from the main menu. b. Select the node to be configured, click Query Non-Added NIC, select the NIC to be configured, set NIC Usage to Southbound, and click Add. 3. Adding the southbound IP address. a. On the PowerEcho, choose Maintenance > Network Configuration > Configure IP Address from the main menu. b. Click Modify IP Address, select the NIC added in 1.ii, click Edit, set IP Address and Subnet Mask, set NIC Usage to Southbound, click Apply and click OK. 4. Adding the southbound IP Route. NOTE If the destination IP address and route are in the same network segment, you do not need to add a southbound IP route. a. On the PowerEcho, choose Maintenance > Network Configuration > Configure Route from the main menu. b. Select the node to be configured and click Query to query the route information. c. Click Add Route. On the Add Route page, select the node to be added. d. In the Add Route area, set NIC Name to bond1, Destination Network to the network number of the target NE, Subnet Mask/Prefix Length to the planned subnet mask, and Gateway/Next Hop to the planned southbound IP gateway address, and click OK. ● Cluster scenario 1. Delete the southbound usage bound to the floating IP address. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 39 iManager NetEco Administrator Guide 1 NetEco Administrator Guide If then a. On the PowerEcho, choose Maintenance > Network Configuration > Configure Floating IP Address from the main menu. b. Select the IP address to be configured, deselect Southbound in NIC Usage, and click Apply. 2. Adding the Southbound Network Port. a. On the PowerEcho, choose Maintenance > Network Configuration > Configure NIC from the main menu. b. Select the NetEco-node01 and NetEco-node02 nodes, click Query Non-Added NIC, select the network port bond1 (select the same network port on the two nodes), set NIC Usage to SouthboundBaseIP, click Add. In the displayed dialog box, click OK. 3. Adding the fixed southbound IP address. a. On the PowerEcho, choose Maintenance > Network Configuration > Configure IP Address from the main menu. b. Click Modify IP Address, select the network port added in 1.ii, click Edit, set the IP address and Subnet Mask, click Apply. In the displayed dialog box, click OK. 4. Adding the floating southbound IP address. a. On the PowerEcho, choose Maintenance > Network Configuration > Configure Floating IP Address from the main menu. b. Click Add, set the Floating IP Address and Subnet Mask, select the Product Alias, select Southbound from the NIC Usage drop-down list, select NetEco-node01 and NetEco-node02 from the Node Name drop-down list, select the physical network port name bond1, enter 1 (for example, bond1:1) next to the logical network port name, click Apply. In the displayed dialog box, click OK. NOTE The two new southbound fixed IP addresses and one new southbound floating IP address must be on the same network segment, and they must not be on the same network segment as the northbound IP address. 5. Adding the southbound IP Route. NOTE If the destination IP address and route are in the same network segment, you do not need to add a southbound IP route. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 40 iManager NetEco Administrator Guide 1 NetEco Administrator Guide If then a. On the PowerEcho, choose Maintenance > Network Configuration > Configure Route from the main menu. b. Select NetEco-node01 and NetEco-node02 and click Query to query the route information. c. Click Add Route. On the Add Route page, select NetEco-node01 and NetEco-node02. d. In the Add Route area, set NIC Name to bond1, Destination Network to the network number of the target NE, Subnet Mask/Prefix Length to the planned subnet mask, and Gateway/Next Hop to the planned southbound IP gateway address, and click OK. Changing the Southbound IP Address ● Single-Node System Scenario 1. On the PowerEcho, choose Maintenance > Network Configuration > Configure IP Address from the main menu. 2. Click Modify IP Address, select Southbound IP, click Edit, and set the new IP address and other configuration items. ● Cluster scenario 1. On the PowerEcho, choose Maintenance > Network Configuration > Configure Floating IP Address from the main menu. 2. Select the southbound floating southbound IP address, set a new IP address, and set other configuration items. 3. On the PowerEcho, choose Maintenance > Network Configuration > Configure IP Address from the main menu. 4. Click Modify IP Address, select the fixed Southbound IP address, click Edit, and set the new IP address and other configuration items. NOTE The two new southbound fixed IP addresses and one new southbound floating IP address must be on the same network segment, and they must not be on the same network segment as the northbound IP address. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 41 iManager NetEco Administrator Guide 1 NetEco Administrator Guide If then Deleting the Southbound IP Address ● Single-Node System Scenario 1. On the PowerEcho, choose Maintenance > Network Configuration > Configure NIC from the main menu. 2. Select a node, click Query Added NIC, select the southbound IP address, and click Delete. 3. On the PowerEcho, choose Maintenance > Network Configuration > Configure IP Address from the main menu. 4. Click Modify IP Address, select the IP address to be configured, click Edit, select Southbound in NIC Usage, and click Apply. 5. On the PowerEcho, choose Maintenance > Network Configuration > Configure Route from the main menu. 6. Select the node and click Query to query the route information. 7. Select the route whose NIC Usage is Southbound and click Delete Route. ● Cluster scenario 1. On the PowerEcho, choose Maintenance > Network Configuration > Configure Floating IP Address from the main menu. 2. Locate the row that contains the southbound floating IP address and click Delete button. 3. Select the northbound floating IP address , select Southbound in NIC Usage, and click Apply. 4. On the PowerEcho, choose Maintenance > Network Configuration > Configure NIC from the main menu. 5. Select the NetEco-node01 and NetEco-node02 nodes, click Query Added NIC, select the southbound IP address, and click Delete. 6. On the PowerEcho, choose Maintenance > Network Configuration > Configure Route from the main menu. 7. Select NetEco-node01 and NetEco-node02 and click Query to query the route information. 8. Select the route whose NIC Usage is Southbound and click Delete Route. 2. Issue Draft B (2020-11-30) In a remote cold backup scenario, rebuild a remote cold backup system. For details, see 1.12.2.1 Configuring a Remote Cold Backup System. Copyright © Huawei Technologies Co., Ltd. 42 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.7 Configuring Time If the time and time zone are different among nodes, you can configure the time zone and time of each node on the PowerEcho. 1.7.1 Changing the Time Zone and Time If the current time and time zone of a node are inconsistent with the local time and time zone, an error may occur during data processing or service processing accuracy may be reduced when you perform operations such as backup and restoration and operation log recording. Therefore, you need to change the time and time zone. Prerequisites ● You have obtained the local time zone and time of the node. ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● In a remote cold backup scenario, the remote cold backup system has been deleted. For details, see 1.12.2.7 Deleting the Remote Cold Backup System. ● DST is short for daylight saving time, and is one hour ahead compared with the standard time. ● The DST is associated with the time zone. When you set the time zone correctly, the DST is also correct. ● If DST is displayed in the Date and Time column, the DST has started in the configured time zone. ● For security purposes, you are not allowed to set the time of the management node to a time point out of the validity period of SSL certificates on the web client. Do not change the time of the management node in CLI mode. If the time is changed to a time point out of the validity period of the SSL certificates, unknown errors may occur. ● Before the time zone and time are changed, the PowerEcho automatically stops the product services and product databases. ● After the time zone and time is changed, a task for restarting the PowerEcho will be automatically created. ● If an NTP server has been configured, the node time will be synchronized with the NTP server and cannot be changed on the GUI. You are advised to keep the time zone of nodes consistent with that of the NTP server. ● If no NTP server is configured, you can change the node time on the GUI. ● If the time is adjusted sharply (by more than an hour), periodic tasks and the data synchronization between nodes in a cluster scenario of products may be affected. The tasks and data synchronization can be executed properly after a period of time. Context Precautions Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 43 iManager NetEco Administrator Guide 1 NetEco Administrator Guide ● If any management node is faulty, restore the node first. Otherwise, the time zone or time cannot be configured. ● In a remote cold backup scenario, configure the time at the primary site and then perform the same configurations at the secondary site to ensure that the UTC (Coordinated Universal Time) time is consistent between the two sites. Procedure Step 1 On the PowerEcho, choose Maintenance > Time Management > Configure Time Zone and Time from the main menu. Step 2 On the Configure Time Zone and Time page, perform the operations by referring to Table 1-20. Table 1-20 Changing or forcibly synchronizing time zone and time Task Operation Change the time zone and time. When the time and time zone on the product node and the management node are inconsistent with the local time and time zone, you need to change them accordingly. Click Modify and perform operations as prompted. NOTE ● After the NTP server is configured, the date and time of product nodes and the management node will be automatically synchronized and cannot be modified. ● After you change the time zone or time, in the Warning dialog box, if you have deselected Automatically start the product databases and product services after the modification, the product databases and product services are not automatically started after the change, and you need to manually start them. For details, see 1.4.2 Starting Product Databases and 1.4.3 Starting Product Services. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 44 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Task Operation Forcibly synchronize the time zone and time. Forcibly synchronize the time zone and time if one of the following occurs: ● The time of the product node is inconsistent with that of the management node. ● The time of the management node is inconsistent with the NTP server time. ● New product information is added. ● An NTP server is added. Click Forcibly Synchronize and perform operations as prompted. NOTE After you forcibly synchronize the time zone and time, in the Warning dialog box, if you have deselected Automatically start the product databases and product services after the forcible synchronization, the product databases and product services are not automatically started, and you need to manually start them. For details, see 1.4.2 Starting Product Databases and 1.4.3 Starting Product Services. Step 3 In a remote cold backup scenario, rebuild a remote cold backup system. For details, see 1.12.2.1 Configuring a Remote Cold Backup System. ----End 1.7.2 Configuring NTP Servers To ensure time consistency and accuracy among system nodes, configure an external clock source that uses the standard NTP protocol as the NTP server. If the IP address of the NTP server changes, modify the corresponding configurations. Prerequisites ● The NTP server to be added and the management node can communicate properly. NOTE If the PowerEcho is deployed in cluster mode, the preceding management node indicates Management0 and Management1. Issue Draft B (2020-11-30) ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The time and time zone of the node are consistent with those of the clock source. For details, see 1.7.1 Changing the Time Zone and Time. ● In a remote cold backup scenario, the remote cold backup system has been deleted. For details, see 1.12.2.7 Deleting the Remote Cold Backup System. Copyright © Huawei Technologies Co., Ltd. 45 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Context NTP-based time synchronization operations include identifier authentication and information integrity authentication. This ensures time information integrity and protects servers from being attacked during time synchronization. ● A maximum of 10 NTP servers can be added on the PowerEcho. Only one active NTP server can be configured and the active NTP server is mandatory. ● After the active NTP server is configured, the management node will first synchronize time from the NTP server, time on all product nodes will be synchronized from the management node. ● If the active NTP server fails, the PowerEcho will select an available NTP server from the standby NTP servers within 15 minutes. The management node then synchronizes time with the selected NTP server. If multiple NTP servers configured on the PowerEcho become invalid, the management node cannot synchronize time from the NTP servers, and the product nodes will no longer synchronize time from the management node. ● If you do not configure an NTP server, the management node functions as the clock source by default. NOTE If the PowerEcho is deployed in cluster mode, the preceding management node indicates Management0 and Management1. Precautions ● Do not set a Windows-based server as the NTP server. Otherwise, the time may fail to be synchronized. ● The IP address of the management node or the IP address of any product node cannot be set to the IP address of an NTP server. Otherwise, the time of product nodes may be incorrect. ● If multiple NTP servers are configured, ensure that the time is consistent between the NTP servers. Otherwise, NTP services are abnormal. ● Do not set a VM as the NTP server. This prevents frequent time changes caused by the interaction between the VM time and host time. ● Do not set the clock source in a circular manner. For example, do not set A as the clock source of B, B as the clock source of C, and C as the clock source of A. ● If any management node is faulty, restore the node first. Otherwise, the NTP server cannot be configured. ● In a remote cold backup scenario, configure the NTP server at the primary site and then perform the same configurations at the secondary site to ensure that the NTP server configurations at the primary and secondary sites are consistent. Procedure Step 1 On the PowerEcho, choose Maintenance > Time Management > Configure NTP from the main menu. Step 2 On the Configure NTP page, perform operations based on Table 1-21. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 46 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-21 Adding or reconfiguring NTP servers Task Operation Adding NTP servers Click Add, and perform the operations based on Table 1-22. Reconfiguring NTP servers If an alarm of abnormal NTP service is generated for the NetEco and the possible cause indicates that the time synchronization relationship between nodes is abnormal, reconfigure the NTP server. Click Reconfigure and perform operations as prompted. Table 1-22 NTP parameters Parameter Description NTP Server IP Address IP address of the NTP server. Encryption Mode Set this parameter to NTP v4 Authentication or NTP v4. For security purposes, O&M personnel of the NTP server is advised to configure the NTP server with more secure NTP v4 authentication mode. ● NTP v4 Authentication: Authentication is required. ● NTP v4: Authentication is not required. Calculation Digest Digest algorithm type of the time synchronization packet. This parameter is mandatory if Encryption Mode is set to NTP v4 Authentication. The digest algorithm type must be consistent with that on the NTP server. NOTE Setting Calculation Digest to MD5 may pose security risks. Exercise caution when setting this parameter. For security purposes, you are advised to select the more secure SHA256 protocol. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 47 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter Description Key Index Parameter used to quickly search for the key and digest algorithm type for authentication during the communication with the NTP server. This parameter is mandatory if Encryption Mode is set to NTP v4 Authentication. The key index must be consistent with that on the NTP server. NOTE The key index is an integer from 1 to 65534, excluding 10000. By default, the index of the PowerEcho is 10000, so the key index cannot be 10000. Key An important part used to generate a digest for authentication during the communication with the NTP server. This parameter is mandatory if Encryption Mode is set to NTP v4 Authentication. The key must be consistent with that on the NTP server. NOTE ● The key must contain 1 to 30 characters. ● The key cannot contain spaces or number signs (#). Role The active or standby status of the NTP server. Time Sync Status Time synchronization status between the NTP server and the PowerEcho. Step 3 In the NTP server list, check that the NTP server has been successfully added. ● If the time synchronization status of the NTP server is Synchronizing, the time between the PowerEcho and the NTP server is being synchronized. Wait for 5 to 17 minutes. After the synchronization between the PowerEcho and the NTP server is complete, check the synchronization status of the NTP server, and perform the following operations based on the time synchronization status of the NTP server. ● If the time synchronization status of the NTP server is Normal, the time between the PowerEcho and the NTP server is successfully synchronized. Go to Step 4. Step 4 Forcibly synchronize the time and time zone on the PowerEcho to the product nodes. 1. Issue Draft B (2020-11-30) On the PowerEcho, choose Maintenance > Time Management > Configure Time Zone and Time from the main menu. Copyright © Huawei Technologies Co., Ltd. 48 iManager NetEco Administrator Guide 2. 1 NetEco Administrator Guide On the Configure Time Zone and Time page, click Forcibly Synchronize. NOTE – After you click Forcibly Synchronize, the management and product nodes gradually adjust the time until it is consistent with the NTP time. This prevents functions with high requirements on time accuracy, for example, the backup and restore function, from being affected by sudden time change. – If you want to perform other configuration operations that need to restart product services or product databases after forcibly synchronizing the time zone and time, do not select Automatically start the product databases and product services after the forcible synchronization in the Warning dialog box. In this case, after the forcible synchronization, product databases and product services will not be automatically started, preventing the product services or product databases from being restarted for several times. – In a remote cold backup scenario, if you are forcibly synchronizing the time zone and time of the secondary site, do not select Automatically start the product databases and product services after the forcible synchronization in the Warning dialog box, preventing the product services of the secondary site from being restarted and causing the product to become dual-active. Step 5 In a remote cold backup scenario, rebuild a remote cold backup system. For details, see 1.12.2.1 Configuring a Remote Cold Backup System. ----End Follow-up Procedure After configuring the NTP servers, back up the following data: The application and data of the PowerEcho. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho 1.8 Collecting Equipment Serial Numbers Before applying for a product, collect the equipment serial numbers (ESNs) of the product. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Precautions In a remote cold backup scenario, collect the ESN of the product at both the primary and secondary sites. When applying for a license for a product, enter the ESNs of the primary and secondary sites in the format of ESN1,ESN2 in a random sequence. Procedure Step 1 On the PowerEcho, choose Maintenance > Information Collection > Collect ESN Information from the main menu. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 49 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 2 In the Select Product and Collect ESN Information area on the Collect ESN Information page, select a product type and click Collect on the right. Step 3 In the displayed dialog box, click Yes. In the displayed dialog box, click OK. Step 4 After the task of Collecting ESN Information is complete, refresh the page. In the ESN Information list, click the .zip package of the collected ESN to download the file to your PC. ----End 1.9 Alarm Dump Context To prevent alarm data from fatiguing the database, the system processes events, masked alarms, and historical alarms every 2 minutes according to the following rules: ● If the database space usage reaches 80%, the system dumps data to files in order of occurrence time and data table types (event, masked alarm, and historical alarm). ● Dump files will be retained for a maximum of 180 days. ● If dump files exceed 1024 MB or there are more than 1000 dump files, the earliest ones will be deleted. Configuration Guide Currently, dump supports only the default configuration file dumpconfig.json in /opt/oss/envs/Product-FMWebsite/20190924062526941/etc/dump. (The time and directory levels are subject to the actual situation.) "maxDatabaseSize": 71680, "whenDumpPercent": 80, "dumpPeriod": true, "reservedDay": 90, "saveFile": true, "period": 2, "periodUnit": "MIN", "startTime": "01:00", "fileSavePath": "alarmdump", "fileTotalSize": 1024, "fileSaveDay": 180, "isCompress":1, "fileType":"csv", "keepFileNum":1000, "siExportType":1 Parameter Description dumpPeriod: specifies whether to enable the time-based dump function. The default value is true. fileSaveDay: specifies the maximum number of days for saving dump files in the dump directory. The default value is 180, and the value range is 3 to 365. fileSavePath: specifies the default path for saving dump files. The default value is alarmdump (the name can be changed). Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 50 iManager NetEco Administrator Guide 1 NetEco Administrator Guide fileTotalSize: specifies the maximum size of files that can be saved in the dump directory. The default value is 1024 MB, and the value range is 200 to 6144 MB. fileType: specifies the dump file type. Currently, only CSV is supported. isCompress: specifies whether to compress files. 0: no compression; 1: zip; 2: gzip; 3: tar.gz (default value: zip) keepFileNum: specifies the maximum number of dump files that can be saved. The default value is 1000. The value range is 200 to 3000. maxDatabaseSize: specifies the maximum database capacity. The default value is 71680, and the value range is 5120 to 230400. Period: specifies the dump period. The default value is 2. periodUnit: specifies the unit of the dump period. The default value is MIN. The value range of Period is 2 to 527040 for MIN, 1 to 8784 for HOUR, and 1 to 366 for DAY. reservedDay: specifies the maximum number of days for which dump files can be retained. The default value is 90, and the value range is 1 to 180. This parameter does not take effect currently. saveFile: specifies whether to save the file. The default value is true. Retain the default value. siExportType: specifies the file dump type. This parameter is provided to maintain consistency with the iMAP. 1: automatic; 2: manual. This parameter is not used. startTime: specifies the execution time. The default value is 01:00. whenDumpPercent: specifies the dump threshold. The default value is 80. The value range is 50 to 90. If dump is based on the database capacity, data that occupies at least 20% of the current database usage is dumped. A maximum of 5000 records can be saved in each file. Procedure Step 1 Use PuTTY to log in to the node where the FM service is deployed, as user sopuser in SSH mode. For details about how to obtain the IP address of the node where a service resides, see 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides? Step 2 Run the following command to switch to the ossuser user: $ su - ossuser Password: password for the ossuser user Step 3 Set alarm dump parameters. 1. Run the following command to access the directory of the configuration file: $ cd /opt/oss/envs/Product-FMWebsite/20190924062526941/etc/dump NOTE The time and directory levels are subject to the actual situation. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 51 iManager NetEco Administrator Guide 2. 1 NetEco Administrator Guide Run the following command to open the dumpconfig.json configuration file using the vi editor: $ vi dumpconfig.json The information similar to the following is displayed: "maxDatabaseSize": 71680, "whenDumpPercent": 80, "dumpPeriod": true, "reservedDay": 90, "saveFile": true, "period": 2, "periodUnit": "MIN", "startTime": "01:00", "fileSavePath": "alarmdump", "fileTotalSize": 1024, "fileSaveDay": 180, "isCompress":1, "fileType":"csv", "keepFileNum":1000, "siExportType":1 3. Press i to enter the insertion mode. 4. Modify the alarm dump configuration file based on the information provided in Parameter Description. 5. Press Esc to return to the vi command line mode. 6. Enter :wq, save the modification, and exit the vi editor. 7. Restart the FM service. For details, see 1.5.2 Stopping Product Services and 1.4.3 Starting Product Services. ----End 1.10 Software Management This chapter describes the operations related to product software, including software package management, third-party patch management, and product software installation, upgrade, capacity expansion, and uninstallation. 1.10.1 Managing Software Packages You can upload software packages required for installation and upgrade, or management of third-party patches, and delete unnecessary software packages if the disk space is insufficient. Prerequisites ● The communication between your PC and the management node is normal. ● To upload a software package: ● – You have obtained the software package and corresponding signature file to be uploaded. – You have obtained the password for the sopuser and ossadm user on the management node. To delete a software package: The software package to be deleted is not in the running state. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 52 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Precautions ● Issue Draft B (2020-11-30) The software package to be uploaded must meet the following requirements. Otherwise, the upload fails. – The software package name can contain a maximum of 128 characters, including letters, digits, underscores (_), hyphens (-), and dots (.). – If the software package is in .zip, .7z, or .gz format, upload the signature file at the same time. The signature file can be in .asc, .cms, or .crl format. – If the software package is in .tar format, you do not need to upload the signature file at the same time because the software package contains the corresponding signature file. ● If the software package size is less than 6 GB, the signature file size is less than 2 MB, and the network bandwidth between your PC and the management node is greater than 100 Mbit/s, you can upload software packages using the software management function on the PowerEcho. If the preceding conditions are not met, upload the software packages in resumable transfer mode. ● During the scanning for software packages, do not restart any management node. Otherwise, the scanning may fail. ● If the scanning fails, the uploaded software packages will be automatically deleted to free up the disk space. Copyright © Huawei Technologies Co., Ltd. 53 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Task Operation (Recommended) Upload the software package to the management in resumable transfer mode. 1. Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. NOTE If the PowerEcho is deployed in cluster mode, perform operations on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? 2. Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user 3. Run the following command to check the available space in the /opt directory: > df -h /opt Check the value of Avail in the command output. ● If the value is greater than or equal to three times the size of the software packages, go to 4. ● If the value is less than three times the size of the software packages, refer to operations provided in this section to delete unnecessary software packages. If the disk space is still less than three times the size of the software packages, contact Huawei technical support to clear the disk space. 4. Use FileZilla to upload the software package and signature file to the default temporary directory /opt/oss/ manager/var/tmp on the management node as the ossadm user. For details, see 1.24.2 Transferring Files Using FileZilla. 5. Log in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. 6. On the PowerEcho, choose Product > Software Management > Manage Software Packages from the main menu. 7. Click Scan. In the Information dialog box, click OK. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 54 iManager NetEco Administrator Guide Task 1 NetEco Administrator Guide Operation NOTE The system automatically checks the integrity of the software package. The result can be viewed in the detailed information about the scanning task on the Task List page. If the scanning task fails, rectify the fault as prompted, and then execute the scanning task again. 8. After the scanning task is executed successfully, view the uploaded software package on the Manage Software Packages tab page. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 55 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Task Operation Use the software management function of the PowerEcho to upload the software package. 1. Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. NOTE If the PowerEcho is deployed in cluster mode, perform operations on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? 2. Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user 3. Run the following command to check the available space in the /opt directory: > df -h /opt Check the value of Avail in the command output. ● If the value is greater than or equal to three times the size of the software packages, go to 4. ● If the value is less than three times the size of the software packages, refer to operations provided in this section to delete unnecessary software packages. If the disk space is still less than three times the size of the software packages, contact Huawei technical support to clear the disk space. 4. Run the following command to check the available space in the /opt/share directory: > df -h /opt/share Check the value of Avail in the command output. ● If the value is greater than the size of the uploaded software package, go to 5. ● If the value is less than the size, upload the software package in resumable transfer mode. 5. Log in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. 6. On the PowerEcho, choose Product > Software Management > Manage Software Packages from the main menu. 7. On the Manage Software Packages page, click Upload to upload the software package as prompted. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 56 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Task Operation NOTE During the upload, the system automatically checks the integrity of the installation package. If the upload fails, rectify the fault as prompted and then upload the software package again. Delete a software package. 1. Log in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. 2. On the PowerEcho, choose Product > Software Management > Manage Software Packages from the main menu. On the Manage Software Packages page, delete the software package as prompted. 1.10.2 Upgrading Product Software After the product software upgrade package is uploaded to the PowerEcho, you can upgrade the product. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● During the upgrade, the system backs up the product data. Ensure that backup parameters have been configured. For details, see 1.11.4 Configuring Backup Parameters. ● The product software upgrade package has been uploaded. For details, see 1.10.1 Managing Software Packages. ● The services and databases on all nodes of the product to be upgraded are running properly. For details, see 1.3.1 Monitoring Products. ● During the upgrade, services of the product to be upgraded are automatically stopped. Therefore, exercise caution when performing this operation. You are advised to perform this operation in off-peak hours. ● After the residual data is cleared, rollback to the source version is not supported. Exercise caution when performing this operation. Precautions Procedure Step 1 On the PowerEcho, choose Product > Software Management > Deploy Product Software from the main menu. Step 2 On the Deploy Product Software page, click the product to be upgraded. The product details page is displayed. Step 3 In the upper right corner, click Upgrade, and choose Upgrade Wizard from the drop-down menu. Perform operations as prompted. For details, see the upgrade guide of the corresponding version. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 57 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE The management refers to PowerEcho, and the product refers to NetEco. When you upgrade or roll back the PowerEcho (including the upgrade or rollback failure), clicking Upgrade Wizard on the PowerEcho displays a message indicating that the upgrade wizard fails to be started. You can log in to https://client IP address of the PowerEcho: 31050 to access the upgrade wizard page. Step 4 (Optional) If you confirm that the rollback to the source version is not required, clear residual data after the upgrade to free up the disk space. In the upper right corner of the page for the product deployment details, click More and choose Clear Residual Data from the drop-down menu. Clear unnecessary deployment paths and databases as prompted. NOTICE After the data is cleared, the rollback to the source version is not supported. Perform this operation only when you confirm that the rollback is not required. Step 5 After the upgrade, historical backup files have become invalid. Back up the following data: ● The application and data of the PowerEcho. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho ● The product applications. For details, see 1.11.5.3 Backing Up Product Applications. ● The database applications. For details, see 1.11.5.4 Backing Up Database Applications. ● The product data. For details, see 1.11.5.2 Backing Up Product Data. ----End 1.10.3 Expanding Product Software Capacity You can install product software on new product nodes of a product when the product capacity needs to be expanded. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The hostname of the new node cannot be localhost or localhost.localdomain. ● In a remote cold backup scenario, the existing remote cold backup system has been deleted. For details, see 1.12.2.7 Deleting the Remote Cold Backup System. Procedure Step 1 On the PowerEcho, choose Product > Software Management > Deploy Product Software from the main menu. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 58 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 2 On the Deploy Product Software page, click the product with capacity to be expanded. The product details page is displayed. Step 3 In the upper right corner, click More, and choose Scale Out from the drop-down menu. Perform operations as prompted. ● If the task is successfully executed, the capacity expansion is complete. ● If the task fails to be executed, rectify the fault according to the suggestions in task details. – If the fault is rectified, in the Deployment History area, click Retry in the Operation column and perform operations as prompted. – If the fault cannot be rectified, in the Deployment History area, click Roll Back in the Operation column and perform operations as prompted. Step 4 In a remote cold backup scenario, set up a remote cold backup system. For details, see 1.12.2.1 Configuring a Remote Cold Backup System. Step 5 After the capacity expansion, historical backup files have become invalid. Back up the following data: ● The application and data of the PowerEcho. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho. ● The product applications. For details, see 1.11.5.3 Backing Up Product Applications. ● The database applications. For details, see 1.11.5.4 Backing Up Database Applications. ● The product data. For details, see 1.11.5.2 Backing Up Product Data. ----End 1.10.4 Uninstalling NetEco Product Software You can uninstall the product software that has been installed. This operation will uninstall both the NetEco and PowerEcho. Prerequisites You have obtained the password for the sopuser user and root user of the NetEco. Procedure Step 1 Use PuTTY to log in to management node as the sopuser user in SSH mode, for details see 1.1.2 Logging In to the PowerEcho. NOTE If the PowerEcho is deployed in cluster mode, log in to any management node and perform the uninstallation operation. Step 2 It may takes a long time to Uninstall NetEco, so PuTTY may be disconnected due to timeout. Configure PuTTY to prevent it from being disconnected. For details, see 1.23.19 How Do I Prevent PuTTY from Being Disconnected upon Timeout? Step 3 Run the following command to switch to the root user: $ su - root Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 59 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Password: password for the root user Step 4 Run the following commands to uninstall the NetEco: # cd /opt/NetEcoTools/ # bash uninstall.sh When the following information is displayed, enter y or Y and press Enter: Are you sure to continue? [y/n] NOTE To cancel the uninstallation, enter n or N. If the following information is displayed, the NetEco is successfully uninstalled. Otherwise, contact Huawei technical support. Uninstall... done ----End 1.10.5 Modifying Configuration Parameters of Product Software You can use this function to modify the product configurations. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Precautions Parameters on this page are installation and deployment procedure parameters and have been configured during installation. Do not change the parameters unless detailed modification scenarios and procedures are described in the documentation. Procedure Step 1 On the PowerEcho, choose Product > Software Management > Deploy Product Software from the main menu. Step 2 On the Deploy Product Software page, click the product with configurations to be modified. The product details page is displayed. Step 3 In the upper right corner of the page, click More and choose Modify Configurations from the drop-down menu, and perform operations as prompted. Step 4 After the modification, historical backup files of the application and data of the PowerEcho have become invalid. Back up the application and data of the PowerEcho. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 60 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.10.6 Adding Product Features You can incrementally install product features. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The product to which you need to add features has been installed. ● In a remote cold backup scenario, the remote cold backup system has been deleted. For details, see 1.12.2.7 Deleting the Remote Cold Backup System. Procedure Step 1 On the PowerEcho, choose Product > Software Management > Deploy Product Software from the main menu. Step 2 On the Deploy Product Software page, click the product with features to be installed. The product details page is displayed. Step 3 In the upper right corner of the page, click More and choose Add Features from the drop-down menu. Step 4 In the Features area, select features to be installed, and perform operations as prompted. NOTE After a feature is selected, new configuration items may be displayed in the Configurations area. Ensure that the values of the configuration items are correct. Step 5 In a remote cold backup scenario, rebuild a remote cold backup system. For details, see 1.12.2.1 Configuring a Remote Cold Backup System. Step 6 After the add, historical backup files have become invalid. Back up the following data: ● The application and data of the PowerEcho. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho. ● The product applications. For details, see 1.11.5.3 Backing Up Product Applications. ● The database applications. For details, see 1.11.5.4 Backing Up Database Applications. ● The product data. For details, see 1.11.5.2 Backing Up Product Data. ----End 1.10.7 Deleting Product Features You can Delete unnecessary features of a product to save system resources. Prerequisites ● Issue Draft B (2020-11-30) You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Copyright © Huawei Technologies Co., Ltd. 61 iManager NetEco Administrator Guide ● 1 NetEco Administrator Guide In a remote cold backup scenario, the remote cold backup system has been deleted. For details, see 1.12.2.7 Deleting the Remote Cold Backup System. Procedure Step 1 On the PowerEcho, choose Product > Software Management > Deploy Product Software from the main menu. Step 2 On the Deploy Product Software page, click the product with features to be deleted. The product details page is displayed. Step 3 In the upper right corner of the page, click More and choose Delete Features from the drop-down menu. Step 4 On the Delete Features page, click on the left of the product with features to be uninstalled. Select the features to be uninstalled, and perform operations as prompted. Step 5 In a remote cold backup scenario, rebuild a remote cold backup system. For details, see 1.12.2.1 Configuring a Remote Cold Backup System. Step 6 After the delete, historical backup files have become invalid. Back up the following data: ● The application and data of the PowerEcho. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho. ● The product applications. For details, see 1.11.5.3 Backing Up Product Applications. ● The database applications. For details, see 1.11.5.4 Backing Up Database Applications. ● The product data. For details, see 1.11.5.2 Backing Up Product Data. ----End 1.11 Backup and Restore Backup and restore can improve system reliability by reducing the data loss of the PowerEcho or the NetEco caused by misoperations or faults. 1.11.1 Overview To improve the reliability of the PowerEcho and the NetEco, periodically back up the application and product data. If the PowerEcho or the NetEco is faulty, you can restore the PowerEcho or the NetEco to the state before backup by using the backup data. Concepts Table 1-23 lists the concepts in backup and restore. This helps you understand the function. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 62 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-23 Common concepts Concept Description Application Data that does not change in real time during the system running, including product applications (such as files in the /opt/oss/ NetEco directory) and database applications (such as files in the /opt/redis directory and the /opt/zenith directory). Product data Data and configuration files that change in real time during system running, such as files in the /opt/neteco directory. Scheduled backup The system automatically backs up all data to the backup server at the scheduled time. Data can be backed up once or periodically. Manual backup Manually back up data of a time point to the backup server. Principles After the backup server is configured, you can back up the data of products and applications. The backup data is transferred to the backup server through a transfer protocol, for example, Secure File Transfer Protocol (SFTP). You can back up any type of data independently. If the data of the PowerEcho or the NetEco is missing or damaged, you can restore the corresponding data. Before restoring a type of data, ensure that its lower-layer data is normal. For example, before restoring the product data, ensure that the application data and OS data are normal. Advantages ● Issue Draft B (2020-11-30) Flexibility and ease of use Function Description Multi-dimensional backup Data backup of instances, nodes, and products is supported. Multi-dimensional restoration Data restoration of instances, nodes, and products is supported. Scheduled backup Periodic scheduled data backup of products and the PowerEcho is supported. Manual operations are not required. Easy operations On the web client of the PowerEcho, the backup and restore operations are easy with guidance provided. Copyright © Huawei Technologies Co., Ltd. 63 iManager NetEco Administrator Guide ● ● 1 NetEco Administrator Guide Security and reliability Function Description Secure transfer of backup data Data is transferred over SFTP, and security measures are provided to ensure data security. Real-time task status display The details of backup and restore tasks is displayed in real time in the task list. High performance Function Description Concurrent backup Backup tasks of different products can be executed at the same time. Time-specific restoration Data can be restored to a specific time point. Function Description The application and data of a product and the PowerEcho can be backed up and restored. Before restoring upper-layer data, ensure that its lower-layer data is normal. For example, before restoring the product data, ensure that the application and OS are normal. Before restoring the application, ensure that the OS is normal. When you restore the database application or product application, the two types of restoration are independent from each other. Configuration Requirements Table 1-24 Configuration requirements Issue Draft B (2020-11-30) Item Description Database type The GaussDB and Redis databases are supported. OS EulerOS is supported. Copyright © Huawei Technologies Co., Ltd. 64 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Item Description Disk space Calculate the backup space based on site requirements of each product and the PowerEcho in different network scales. Total backup space = Sum of backup space for all products + Backup space for the PowerEcho Backup space for a product = Backup space for the product data + Backup space for the product application + Backup space for the database applications + Backup space for the product OS Backup space for the PowerEcho = Backup space for the application and data of the PowerEcho + Backup space for the OS of the PowerEcho Data transfer protocol The data can be transferred over Secure File Transfer Protocol (SFTP). Backup Contents Table 1-25 Backup Contents Backup Item Backup Contents Product Data Database data, and /opt/neteco Product Applications /opt/oss/NetEco Database Applications /opt/zenith(The service dynamic data file is not included) 1.11.2 Backup and Restoration Scenarios and Policies This section describes typical backup and restoration scenarios and policies, which helps you back up and restore data when using the PowerEcho and the NetEco and ensure stable system running. 1.11.2.1 Backup Scenarios and Policies Before using the backup function, you are advised to learn the backup scenarios and policies to create backup tasks properly. Typical Backup Scenarios and Recommended Policies Table 1-26 lists common backup scenarios and methods. You can adjust the policies based on site requirements. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 65 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-26 Typical backup scenarios and recommended policies Scenario Description Backup Object Method Initial installation and commissionin g The PowerEcho and product have been installed and commissioned. The application, and data of the PowerEcho 1. Create a periodic scheduled task for backing up the PowerEcho. For details, see 1.11.6.2 Backing Up the PowerEcho Applications and Data on a Scheduled Basis. 2. Manually create tasks for backing up the PowerEcho by following instructions provided in: 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho The application, and data of the product 1. Create periodic scheduled tasks for backing up the product. For details, see 1.11.5.1 Backing Up Product on a Scheduled Basis. 2. Manually create tasks for backing up the product by following instructions provided in: ● 1.11.5.2 Backing Up Product Data ● 1.11.5.3 Backing Up Product Applications ● 1.11.5.4 Backing Up Database Applications Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 66 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Scenario Description Backup Object Method Major configuration changes For example, the IP address or route has been changed. ● The application , and data of the product Back up all the required data by following instructions provided in: ● The application , and data of the PowerEcho ● 1.11.5.2 Backing Up Product Data ● 1.11.5.3 Backing Up Product Applications ● 1.11.5.4 Backing Up Database Applications ● 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho Upgrade or patch installation For example, the database user password on the PowerEcho node has been changed. The application, and data of the PowerEcho 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho The OS will be upgraded, or an OS patch will be installed. ● The application , and data of the product Back up all the required data by following instructions provided in: ● The application , and data of the PowerEcho ● 1.11.5.2 Backing Up Product Data ● 1.11.5.3 Backing Up Product Applications ● 1.11.5.4 Backing Up Database Applications ● 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 67 iManager NetEco Administrator Guide Scenario 1 NetEco Administrator Guide Description Backup Object Method The product application will be upgraded. The application and data of the product Back up all the required data by following instructions provided in: The product application has been upgraded. ● 1.11.5.2 Backing Up Product Data ● 1.11.5.3 Backing Up Product Applications The database application will be upgraded, or a database application patch will be installed. ● The application and data of the product The database application has been upgraded, or a database application patch has been installed. ● The application and data of the PowerEcho Back up all the required data by following instructions provided in: ● 1.11.5.2 Backing Up Product Data ● 1.11.5.3 Backing Up Product Applications ● 1.11.5.4 Backing Up Database Applications ● 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho The PowerEcho will be upgraded, or a patch will be installed. The PowerEcho has been upgraded, or a patch has been installed. Issue Draft B (2020-11-30) The application and data of the PowerEcho Copyright © Huawei Technologies Co., Ltd. 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho 68 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Scenario Description Backup Object Method Routine maintenance Routine maintenance is performed. ● The application , and data of the product Back up all the required data by following instructions provided in: ● The application , and data of the PowerEcho ● 1.11.5.2 Backing Up Product Data ● 1.11.5.3 Backing Up Product Applications ● 1.11.5.4 Backing Up Database Applications ● 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho Backup File Storage Threshold Backup file storage threshold indicates the maximum number of latest backup files that can be stored. If the number of backup files exceeds the storage threshold, the earliest backup files are automatically deleted until the number of backup files is equal to the storage threshold. Table 1-27 lists the default number of latest backup files that can be stored. Table 1-27 Backup file storage thresholds Issue Draft B (2020-11-30) Type Number of Backup Files Description Product data 2 The storage threshold is configurable and must be an integer from 1 to 100. For details, see 1.11.4 Configuring Backup Parameters. Product application 2 The storage threshold is not configurable. Database application 2 The storage threshold is not configurable. the PowerEcho 3 The storage threshold is configurable and must be integer from 1 to 10. For details, see 1.11.4 Configuring Backup Parameters. Copyright © Huawei Technologies Co., Ltd. 69 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Execution Sequence of Backup Tasks When multiple backup tasks are to be executed at the same time, the system follows the rules in Table 1-28: Table 1-28 Execution sequence of backup tasks Description Example For a product, tasks for backing up other data are executed in serial mode, that is, the system executes the backup tasks in sequence based on their creation time. The backup tasks 1 and 2 of product A are both scheduled to start at 01:00:00, and task 1 is created earlier than task 2. For different products, tasks for backing up the PowerEcho and other data that are scheduled to start at the same time are executed in serial mode, that is, the system executes the backup tasks in sequence based on their creation time. Other backup tasks scheduled to start at the same time are executed concurrently. The backup task 1 of product A and backup task 2 of product B are scheduled to start at 01:00:00, and task 1 is created earlier than task 2. If the tasks for backing up other data, task 1 starts at 01:00:00, and task 2 starts only after task 1 is complete (for example, at 03:00:00). If task 1 is for backing up the PowerEcho, and task 2 is for product applications or other data, task 1 starts at 01:00:00, and task 2 starts only after task 1 is complete (for example, at 03:00:00). If the tasks are for other data, both task 1 and task 2 start at 01:00:00. 1.11.2.2 Restoration Scenarios and Policies Before using the restoration function, you are advised to learn the restoration scenarios and policies to create restoration tasks properly. Typical Restoration Scenarios and Recommended Policies Table 1-29 lists common restoration scenarios and recommended policies. You can adjust the policies based on site requirements. Table 1-29 Recommended policies Issue Draft B (2020-11-30) Scenario Recommended Policy The physical machine or VM is faulty. For details, see Table 1-30. The database is faulty. For details, see Table 1-31. Other faults. For details, see Table 1-32. Copyright © Huawei Technologies Co., Ltd. 70 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-30 Typical restoration scenarios and recommended policies for physical machine or VM faults Scenario Object Restoration Method The physical machine or VM is faulty. The management node and product node Prepare the backup physical machine, or restore the VM, and then perform the operations provided in: 1. 1.11.7.1 Restoring Database Applications 2. 1.11.7.2 Restoring Product Applications 3. 1.11.7.3 Restoring Product Data Table 1-31 Typical restoration scenarios and recommended policies for database faults Scenario Object Restoration Method The database file of the product node is damaged but the OS of the database node is running properly. The product database application Perform the following operations in sequence: 1. 1.11.7.1 Restoring Database Applications 2. 1.11.7.3 Restoring Product Data Table 1-32 Typical restoration scenarios and recommended policies for other faults Scenario Description Object Restoration Method The product applicatio n is faulty. The product application is abnormal, but the OS of the product node is normal. The product application Perform the following operations in sequence: 1. 1.11.7.2 Restoring Product Applications 2. 1.11.7.3 Restoring Product Data Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 71 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Scenario Description Object Restoration Method The product data is faulty. The database instance is normal, but the product is abnormal due to product data exceptions. The product data 1.11.7.3 Restoring Product Data PowerEch o is faulty. The PowerEcho is unreachable. The PowerEcho and product application and data Perform the following operations in sequence: 1. 1.11.8 Restoring the PowerEcho 2. 1.11.7.1 Restoring Database Applications 3. 1.11.7.2 Restoring Product Applications 4. 1.11.7.3 Restoring Product Data 1.11.3 Backup Server Requirements The backup server stores backup data. You need to prepare a backup server that meets certain requirements. A third-party server or the management node can be used as the backup server. Table 1-33 lists the requirements for the backup server. ● ● Issue Draft B (2020-11-30) If the management node is used as the backup server: – If the disk space usage is greater than the configured upper limit of the backup server usage, the PowerEcho automatically clears the backup files of product data, application data in sequence to ensure that the disk space usage is less than the lower limit of the backup server usage. – If management node is damaged, the backup data stored on the management node may also be damaged, which hinders the data restoration of the PowerEcho. If a third-party server is used as the backup server: – You are advised to periodically clear the product data, application data in sequence. Retain at least one latest backup file for each data type. – NAT cannot be configured between the third-party backup server and the PowerEcho. Copyright © Huawei Technologies Co., Ltd. 72 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-33 Backup server requirements Item Requirement SFTP requirements ● The server supports the SFTP protocol. The username and password of the backup server that uses SFTP to transfer files are available. ● The user who logs in to the backup server using SFTP has read and write permissions to the SFTP shared directory. ● The number of SFTP concurrent connections of the backup server cannot be less than 50. Port The default port number of the backup server is 22, and the port number range is 1 to 65535. Username ● The username cannot be empty. ● The username contains a maximum of 32 characters. ● The username cannot contain spaces, newline characters, carriage return characters, tab characters, form feeds, or special characters <>&"',;$()`|@ Password To ensure the security of backup server users, you are advised to periodically change the password for the backup server users. The password must meet the following requirements: ● Contain 8 to 64 characters. ● Contain at least two of the following: lowercase letters, uppercase letters, digits, and special characters ~@#%=^*-_+[{}]:./?! ● Not be the same as the username or the reverse of the username. ● Ensure that the correct password is obtained. The user may be locked if an incorrect password is entered. Exercise caution. Backup path ● The path must be a relative path under the default SFTP user directory and cannot start with a slash (/). It can contain only letters, digits from 0 to 9, hyphens (-), or underlines (_). ● The path can contain a maximum of 60 characters. Issue Draft B (2020-11-30) Connectivity Data can be transferred between the backup server and all nodes over SFTP. Back up server IP address. If the PowerEcho is deployed in cluster mode, use the fixed IP address instead of the floating IP address of the backup server to configure the backup server. Copyright © Huawei Technologies Co., Ltd. 73 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Item Requirement Disk space 600 GB or above NOTE You are advised to periodically clear the disk space. Otherwise, the backup and restoration may take a long time. Bandwidth Recommended: 1.5 Gbit/s Minimum: 1 Gbit/s 1.11.4 Configuring Backup Parameters Backup files are backed up to the corresponding backup server according to the preconfigured backup policy. Configure backup server parameters and backup file storage policies before backing up data on the PowerEcho. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● For the SFTP transfer mode, you have obtained the IP address and port number of the backup server, the username and password for a user who has permission to transfer files over SFTP. Context A maximum of 10 backup servers can be added on the PowerEcho. If multiple backup servers are configured, the same backup files are saved on all the backup servers. If a backup server is faulty, other backup servers can still provide backup files for data restoration. Precautions If the parameters of the backup server are changed, update the parameters in the Backup Server area and back up the application and data of the PowerEcho again. Otherwise, the PowerEcho cannot be backed up or restored. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho. In a remote cold backup scenario, update the parameters of the SFTP backup server on the HA > Remote High Availability System > Manage Cold Backup System page. Procedure Step 1 On the PowerEcho, choose Backup and Restore > Configuration > Configure Backup Parameters from the main menu. Step 2 Configure the backup parameters. 1. Configure the backup server parameters. a. Issue Draft B (2020-11-30) In the Backup Server area, click Add Backup Server, configure the backup server parameters as prompted. Copyright © Huawei Technologies Co., Ltd. 74 iManager NetEco Administrator Guide 1 NetEco Administrator Guide b. 2. Click . Perform the following operations to modify the storage thresholds for the product data backup files as required. In the Storage Strategy for the Product Data Backup Files area, perform the operations. 3. a. Select the products for which you want to configure the backup file storage threshold. b. Click Modify Product Threshold. c. In the dialog box that is displayed, configure the number of backup files and click Save. Perform the following operations to modify the storage thresholds for the the PowerEcho backup files as required. a. In the Storage Strategy for the the PowerEcho Backup Files area, configure the number of stored backup packages. b. Click Save. ----End 1.11.5 Backing Up Products After backup parameters are configured, periodically back up product data to ensure the reliability. If the product is abnormal due to misoperations or other situations, you can use the backup data to restore it. 1.11.5.1 Backing Up Product on a Scheduled Basis When a product is running properly, you can create scheduled tasks for backing up its application, and data, so that the backup data is periodically saved to the backup server. If a product becomes abnormal due to misoperations or other situations, you can restore the product to the state at a certain time point. Prerequisites Issue Draft B (2020-11-30) ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The backup parameters have been configured. For details on how to configure the parameters, see1.11.4 Configuring Backup Parameters. ● When backing up the product data, ensure that the database instances on all nodes are in the Running state. For details, see 1.3.4 Monitoring Databases. ● When backing up the product data, ensure that the product deployment status of the product is Installed. For details, see 1.23.16 How Do I Check the Deployment Status of a Product? ● The time is consistent among nodes. Otherwise, the scheduled task for backing up the product data fails. For details, see 1.7.1 Changing the Time Zone and Time. Copyright © Huawei Technologies Co., Ltd. 75 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Context ● When the product information is imported on the PowerEcho for the first time, the PowerEcho creates a default scheduled task for backing up the product data. After the product is installed and backup parameters are configured, the task automatically backs up the product data at 01:00:00 every day. When the number of products, nodes or service instances is changed due to upgrade or capacity expansion, the modified product data is automatically backed up by the scheduled backup task after the upgrade or capacity expansion is complete. ● The backup files of the application and product data are stored on the backup server. For details about the backup file path, see Table 1-34. Do not delete the backup files in this directory. Otherwise, the product cannot be restored. Table 1-34 Backup file path Data Path Database application /root directory of the backup server user/ path specified in the backup parameters/ product name/static/timestamp/node name/DB Product application /root directory of the backup server user/ path specified in the backup parameters/ product name/static/timestamp/node name/APP Product data /root directory of the backup server user/ path specified in the backup parameters/ product name/dynamic Precautions ● You are advised to stagger the start time of each scheduled backup task, for example, at an interval of two hours. For details about the execution sequence of backup tasks, see 1.11.2.1 Backup Scenarios and Policies. ● To prevent high resource usage caused by conflicts between scheduled backup tasks and NE data synchronization, stagger the execution period of the scheduled backup tasks and that of NE data synchronization or service provisioning. ● For periodic scheduled backup, you are advised to set the backup interval to 24 hours. A long interval is not recommended, because data backup at long intervals may result in data loss during data restoration. Specify a backup interval as required. ● In a remote cold backup scenario, scheduled tasks for backing up product data are executed only at the primary site. Procedure Step 1 On the PowerEcho, choose Backup and Restore > Configuration > Configure Scheduled Backup Task from the main menu. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 76 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 2 On the Configure Scheduled Backup Task page, Click Create. Step 3 Perform operations as required to manually create a scheduled backup task. ● Select Product Data and create a scheduled task for backing up the product data. ● Select Product Application and create a scheduled task for backing up the product application. ● Select Database Application and create a scheduled task for backing up the database application. Step 4 In the Backup Object area, select the backup object. Refer to Table 1-35 to perform the operations. Table 1-35 Backing up product on a scheduled basis Task Operation Perform one-time backup at a specified time point. Select One-Time and perform operations as prompted. Perform periodic backup within a specified period. Select Periodic and perform operations as prompted. NOTE After a scheduled backup task is created successfully, you can enable or disable the task in the Enabled State column. ----End 1.11.5.2 Backing Up Product Data Before a configuration file that affects product functions is modified and before and after the product is upgraded, you can use the PowerEcho to manually back up the product data. This ensures that the product can be restored by using the backup data if the product is abnormal due to misoperations or other situations. Prerequisites Issue Draft B (2020-11-30) ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The backup parameters have been configured. For details, see 1.11.4 Configuring Backup Parameters. ● The database instances on all nodes are in the Running state. For details, see 1.3.4 Monitoring Databases. ● The deployment status of the product is Installed. For details, see 1.23.16 How Do I Check the Deployment Status of a Product? ● The time among nodes is consistent. Otherwise, the scheduled task for backing up the product data fails. For details, see 1.7.1 Changing the Time Zone and Time. Copyright © Huawei Technologies Co., Ltd. 77 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Context The backup files of the product data are stored in the /root directory of the backup server/path specified in the backup parameters/product name/dynamic/ directory on the backup server. Do not delete the backup files in this directory. Otherwise, no backup file can be used for restoring product data, causing restoration failures. Precautions ● To ensure product data accuracy during backup, do not manually back up data during service provisioning. ● If you need to execute a task with higher priority, you can forcibly stop the tasks for backing up product data. ● In a remote cold backup scenario, tasks for backing up product data can be executed only at the active site. Procedure Step 1 On the PowerEcho, choose Backup and Restore > Data Backup > Back Up Product Data Step 2 On the Back Up Product Data page, select the product and perform operations as prompted. ----End 1.11.5.3 Backing Up Product Applications After the initial installation of the product application or before and after the upgrade of the product application, you can back up the product application in real time on the PowerEcho. If a product application runs abnormally or fails to be upgraded and needs to be rolled back to the previous state, you can use the backup file to restore the product application to the state before the backup. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The backup parameters have been configured. For details on how to configure the parameters, see1.11.4 Configuring Backup Parameters. Context The backup files of the product applications are stored in the /root directory of the backup server user/path specified in the backup parameters/product name/static/ timestamp/node name/APP directory on the backup server. Do not delete the backup files in this directory. Otherwise, no backup file can be used for restoring product applications, causing restoration failures. Precautions In a remote cold backup scenario, tasks for backing up product applications can be executed at both the active and standby sites. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 78 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 On the PowerEcho, choose Backup and Restore > Data Backup > Back Up Product Application from the main menu. Step 2 On the Back Up Product Application page, perform operations as prompted. ----End 1.11.5.4 Backing Up Database Applications After the initial installation of the database application or before and after the upgrade of the database application, you can back up the database application, that is, the database data that does not change in real time when the system runs, on the PowerEcho. If the database is not running properly because a file in the database application is damaged or lost, but the OS of the node is running properly, you can use the backup file to restore the database application to the state before the backup. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The backup parameters have been configured. For details on how to configure the parameters, see1.11.4 Configuring Backup Parameters. Context The backup files of the database applications are stored in the /root directory of the backup server/path specified in the backup parameters/product name/static/ timestamp/node name/DB directory on the backup server. Do not delete the backup files in this directory. Otherwise, no backup file can be used for restoring database applications, causing restoration failures. Precautions If the management node and the product node are the same node and use the same database software, the database applications cannot be backed up using this function. In this case, back up the database applications by backing up the PowerEcho. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho. Refer to 1.23.11 How Do I Check Whether Management Nodes and Product Nodes Use the Same Database Software? to determine whether you can back up database applications by backing up the PowerEcho. Procedure Step 1 On the PowerEcho, choose Backup and Restore > Data Backup > Back Up Database Application from the main menu. Step 2 On the Back Up Database Application page, perform operations as prompted. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 79 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.11.6 Backing Up the PowerEcho Periodically back up the application and data of the PowerEcho on the PowerEcho. If the PowerEcho is abnormal due to exceptions or misoperations, you can use the backup files to restore the OS, application, and data of the PowerEcho. 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho After initial installation of the PowerEcho, before and after an upgrade or patch installation, or before major service adjustment, you are advised to manually back up the PowerEcho. If the service is abnormal or the database is abnormal, you can use the backup package to restore the PowerEcho to the state before the backup. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The backup parameters have been configured. For details on how to configure the parameters, see1.11.4 Configuring Backup Parameters. ● The database and service instances on the management node are in the Running state. For details, see 1.3.4 Monitoring Databases. Context The backup files of the PowerEcho are stored in the /root directory of the backup server/path specified in the backup parameters/management/management/ timestamp/node name directory on the backup server. Do not delete the backup files in this directory. Otherwise, no backup file can be used for restoring the PowerEcho, causing restoration failures. Precautions Ensure that no database-related operations are being performed, such as modifying IP addresses and routes. Otherwise, the backup data will be incomplete. In a remote cold backup scenario, the task for backing up the PowerEcho can be executed at both the active and standby sites. Procedure Step 1 On the PowerEcho, choose Backup and Restore > Data Backup > Back Up PowerEcho from the main menu. Step 2 On this page, perform operations as prompted. ----End 1.11.6.2 Backing Up the PowerEcho Applications and Data on a Scheduled Basis In routine maintenance, you can create scheduled backup tasks for backing up the application and data of the PowerEcho on a scheduled basis. If the PowerEcho is unreachable due to service or database exceptions, you can use the backup Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 80 iManager NetEco Administrator Guide 1 NetEco Administrator Guide package to restore it. In this manner, no manual operation is required, reducing maintenance costs. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The backup parameters have been configured. For details, see 1.11.4 Configuring Backup Parameters. ● The database and service instances on the PowerEcho node are in the Running state. For details, see 1.3.4 Monitoring Databases. Context The backup files of the PowerEcho are stored in the /root directory of the backup server user/path specified in the backup parameters/management/management/ timestamp/node name directory on the backup server. Do not delete the backup files in this directory. Otherwise, the PowerEcho cannot be restored. Precautions ● To prevent high resource usage caused by conflicts between scheduled backup tasks and NE data synchronization, stagger the execution period of the scheduled backup tasks and that of NE data synchronization or service provisioning. ● You are advised to stagger the start time of each scheduled backup task, for example, at an interval of two hours. For details about the execution sequence of backup tasks, see 1.11.2.1 Backup Scenarios and Policies. ● For periodic scheduled backup, you are advised to set the backup interval to 24 hours. A long interval is not recommended, because data backup at long intervals may result in data loss during data restoration. Specify a backup interval as required. Procedure Step 1 On the PowerEcho, choose Backup and Restore > Configuration > Configure Scheduled Backup Task from the main menu. Step 2 On the Configure Scheduled Backup Task page, Click Create. Step 3 Select PowerEcho and refer to Table 1-36 to perform operations. Table 1-36 Scheduled the PowerEcho backup Issue Draft B (2020-11-30) Task Operation Perform one-time backup at a specified time point. Select One-Time and perform operations as prompted. Perform periodic backup within a specified period. Select Periodic and perform operations as prompted. Copyright © Huawei Technologies Co., Ltd. 81 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE After a scheduled backup task is created successfully, you can enable or disable the task in the Enabled State column. ----End 1.11.7 Restoring Products If a product is abnormal due to misoperations or other situations, you can use the backup data to restore the product OS, database application, product application, and product data. 1.11.7.1 Restoring Database Applications If the database is abnormal due to damages but the OS of the product node is still running properly, restore the database application. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● There are backup files of the database application to be restored. ● Before the database application is restored, the PowerEcho will automatically stop all the NetEco services and databases on nodes where the database application to be restored resides. ● If the backup files on the backup server are manually deleted, or the files are not displayed in the Backup File column, click Synchronize to synchronize the information about the backup files to the PowerEcho. ● The system automatically verifies the integrity of backup files. Only successfully verified files can be used for restoration. ● In the single-server mode, this function cannot restore database applications, please restore the database applications by 1.11.8 Restoring the PowerEcho. ● In the cluster mode, perform the following operations to restore the database application. Precautions Procedure Issue Draft B (2020-11-30) a. On the PowerEcho, choose Backup and Restore > Data Restoration > Restore Database Application. b. On the Restore Database Application page, select the backup server where the files to be restored reside. If multiple backup servers are available, select the IP address of the desired backup server from the Backup Server drop-down list. Otherwise, skip this step. c. Select an object to be restored and select the target file in the Backup File column. Restore the data based on Table 1-37. Copyright © Huawei Technologies Co., Ltd. 82 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-37 Restoring database applications d. Task Operation Restore database applications of a product. Select the product and perform operations as prompted. Restore database applications of product nodes. Select the product and click to view nodes under a product. Select nodes to be restored, and perform operations as prompted. On the PowerEcho, choose System > Task List from the main menu and view the execution status of the task for restoring the database applications. ▪ ▪ If Task Status is Execution Succeeded, the database applications are restored successfully. If Task Status is Execution Failed, the database applications fail to be restored. Contact Huawei technical support. e. Restore the product data. For details, see 1.11.7.3 Restoring Product Data. f. Start the restored services. For details, see 1.4.3 Starting Product Services. 1.11.7.2 Restoring Product Applications If the product applications are abnormal due to damaged files of the product applications or configuration files, but the OS of the product node is still running properly, the product applications need to be restored. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● There are backup files of the product application to be restored. ● Before the product application is restored, The PowerEcho automatically stops the NetEco service to be restored. ● If the backup files on the backup server are manually deleted, or the files are not displayed in the Backup File column, click Synchronize to synchronize the information about the backup files to the PowerEcho. Ensure that the parameters, including Backup Server IP Address, Username, Password, and Backup Path, of the backup server on the Configure Backup Parameters page on the PowerEcho are consistent with those of the backup server where the desired backup files reside. ● The system automatically verifies the integrity of backup files. Only successfully verified files can be used for restoration. Precautions Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 83 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 On the PowerEcho, choose Backup and Restore > Data Restoration > Restore Product Application from the main menu. Step 2 On the Restore Product Application page, select the backup server where the backup files used for the restoration reside. If multiple backup servers are available, select the IP address of the backup server from the Backup Server dropdown list. Otherwise, skip this step. Step 3 Select an object to be restored and select the target file in the Backup File column. Restore the data based on Table 1-38. Table 1-38 Restoring product applications Task Operation Restoring the application of a product Select the product and perform operations as prompted. Restoring the product application for product nodes Select the product and click to view nodes under a product. Select nodes to be restored, and perform operations as prompted. Step 4 Restore the product data. For details, see 1.11.7.3 Restoring Product Data. Step 5 Start the restored services. For details, see 1.4.3 Starting Product Services. ----End 1.11.7.3 Restoring Product Data If the product cannot be used when database instances are running properly but product data is abnormal, you can restore the product data based on the restoration scenario. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● There are backup files of the product data to be restored. ● All databases of the product are in the Running state. To confirm the database status, see 1.3.4 Monitoring Databases. Context If multiple backup servers are configured, the same backup data is stored on all the backup servers. The backup servers work in redundancy mode. During data restoration, all the backup servers can provide backup data. By default, the system randomly selects data from one of the backup servers. You can also specify a backup server to provide backup data. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 84 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Precautions ● If the backup files on the backup server are manually deleted, or the files are not displayed in the Backup File column, click Synchronize to synchronize the information about the backup files to the PowerEcho. Ensure that the parameters, including Backup Server IP Address, Username, Password, and Backup Path, of the backup server on the Configure Backup Parameters page on the PowerEcho are consistent with those of the backup server where the desired backup files reside. ● The system automatically verifies the integrity of backup files. Only successfully verified files can be used for restoration. Procedure Step 1 On the PowerEcho, choose Backup and Restore > Data Restoration > Restore Product Data from the main menu. Step 2 On the Restore Product Data page, select the backup server where the files to be restored reside. If multiple backup servers are available, select the IP address of the desired backup server from the Backup Server drop-down list. Otherwise, skip this step. Step 3 Select an object to be restored and select the target file in the Backup File column. Select the product and perform operations as prompted. NOTE In the dialog box displayed when you create a product data restoration task, set the product services to be automatically or manually started after the restoration is complete. For details about how to start product services, see 1.4.3 Starting Product Services. Step 4 On the PowerEcho, choose System > Task List from the main menu and view the task execution status. ● If Task Status is Execution Succeeded, the product data is restored successfully. ● If Task Status is Execution Failed, the product data fails to be restored. Contact Huawei technical support. ----End 1.11.8 Restoring the PowerEcho If the PowerEcho is unreachable due to service or database exceptions, perform the operations provided in this section to restore the PowerEcho application, database application, and product data. Prerequisites ● You have obtained the backup package of the PowerEcho and the signature file from stored on the backup server as user backupuser using FileZilla.. The backup files are stored in /backup/management/management/ timestamp/node name. If the PowerEcho is deployed in cluster mode, you have obtained the backup package in the directory named after the node name. For details about how Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 85 iManager NetEco Administrator Guide 1 NetEco Administrator Guide to query the node name, see 1.23.14 How Do I Query the Node Name Corresponding to the IP Address of the Management Node? The backup package of the PowerEcho is management.tar.gz, and the corresponding signature file is management.tar.gz.sign. ● The OS of the management node is running properly . ● You have obtained the passwords for the sopuser and ossadm users of the management node to be restored. Procedure Step 1 Perform operations based on the deployment mode of and database type of the PowerEcho. For details, see Table 1-39. Table 1-39 Operations in different scenarios Scenario Operation The PowerEcho is deployed in singleserver mode and uses the GaussDB database. Perform Step 2 to Step 7. The PowerEcho is deployed in cluster mode and uses the GaussDB database. One of the management nodes is faulty. Perform Step 2 to Step 7 on the faulty node. The PowerEcho is deployed in cluster mode and uses the GaussDB database. Multiple management nodes are faulty. For details, see 1.24.12 Faults of Multiple Management Nodes. The PowerEcho is deployed in cluster mode and uses the GaussDB database. The management nodes are running properly. The application and data of the PowerEcho need to be restored to a specified time point. The application and data of the PowerEcho cannot be restored to a specified time point. Step 2 Use FileZilla to upload the backup file of the PowerEcho, and the signature file to the /tmp directory on the faulty management node, as the sopuser user in SFTP mode. For details, see 1.24.2 Transferring Files Using FileZilla. Step 3 Use PuTTY to log in to the faulty management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 4 Run the following command to switch to the ossadm user and copy the thirdparty integrity check tool package to the /tmp directory: > su - ossadm Password: password for the ossadm user > cp /opt/oss/manager/tools/BKSigntool-tool version-OS_system type_pkg.tar /tmp Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 86 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE The restoration of the PowerEcho takes a long time, so PuTTY may be disconnected during the restoration due to timeout. Configure PuTTY to prevent it from being disconnected. For details, see 1.23.19 How Do I Prevent PuTTY from Being Disconnected upon Timeout? Step 5 Restore the application and data of the PowerEcho. For details, see Table 1-40. Table 1-40 Restoring the PowerEcho Scenario Operation The management plane is deployed in single-server mode and uses the GaussDB database. > sudo /usr/local/uniepsudobin/execute.sh /tmp/ BKSigntool-tool version-OS_system type_pkg.tar /opt/ backupManagement restoreManagement.sh /tmp/ management.tar.gz NOTE If the management node and product node are the same node and use the same database software, and the database software needs to be restored if the database software is damaged, add yes to the end of the command. If yes is not added, the database software is not restored by default. During database software restoration, the product functions may be unavailable for a short period of time. For example: > sudo /usr/local/uniepsudobin/execute.sh /tmp/BKSigntool-tool version-OS_system type_pkg.tar /opt/backupManagement restoreManagement.sh /tmp/management.tar.gz yes When the following information is displayed, enter y and press Enter: Are you sure you want to restore the database applications? [y/n] The management plane is deployed in cluster mode and uses the GaussDB database. One of the management nodes is faulty. > sudo /usr/local/uniepsudobin/execute.sh /tmp/ BKSigntool-tool version-OS_system type_pkg.tar /opt/ backupManagement recoveryGaussManagement.sh /tmp/management.tar.gz NOTE If the management node and product node are the same node and use the same database software, and the database software needs to be restored if the database software is damaged, add yes to the end of the command. If yes is not added, the database software is not restored by default. During database software restoration, the product functions may be unavailable for a short period of time. For example: > sudo /usr/local/uniepsudobin/execute.sh /tmp/BKSigntool-tool version-OS_system type_pkg.tar /opt/backupManagement recoveryGaussManagement.sh /tmp/management.tar.gz yes When the following information is displayed, enter y and press Enter: Are you sure you want to restore the database applications? [y/n] ● If the following information is displayed, the management plane is successfully restored, and the database instances and the management plane service are started successfully. Management restored successfully. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 87 iManager NetEco Administrator Guide ● 1 NetEco Administrator Guide If the following information is displayed, the management plane service fails to be started during the restoration. Contact Huawei technical support to check the statuses of the database instances of the management plane. ERROR: Start management app service falied. ERROR: Please check if the dbInstance status is ok, if its not ok, please recovery the dbInstance first, and then try to start management. ERROR: Restore management failure. ● – If the statuses of the management plane database instances are normal, the management plane service startup failure is not caused by exceptions in the database instances of the management plane. Contact Huawei technical support. – If the statuses of the management plane database instances are abnormal, restore the databases first. For details, see 1.4.7 Starting the PowerEcho Service. If information similar to the following is displayed, the management plane backup file fails to be verified. Contact Huawei technical support. ERROR: Verify /opt/backupManagement/management.tar.gz failed. ERROR: Restore management failure. ● If the following information is displayed, the task execution fails. Contact Huawei technical support. ERROR: Restore management failure. Step 6 Run the following command to exit the ossadm user: > exit Step 7 Run the following commands to delete the files uploaded to the temporary directory: > cd /tmp/ > rm -rf management.tar.gz > rm -rf management.tar.gz.sign > rm -rf BKSigntool-tool version-OS_system type_pkg.tar ----End 1.12 Remote Cold Backup The remote cold backup system effectively reduces losses caused by disastrous incidents such as earthquakes, fires, and power failures, and improves the disaster recovery capabilities of products against various security risks. 1.12.1 Remote Cold Backup System Overview In a remote cold backup system, a set of the PowerEcho and product is deployed at both the primary and secondary sites. When the remote cold backup system is normal, data of the site that provides services externally is periodically synchronized to the peer site to ensure data consistency between the two sites. If a fault occurs at the site that provides services externally, you can quickly switch services from the faulty site to the peer site. This ensures service continuity and reduces the loss caused by disastrous incidents. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 88 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Concepts Table 1-41 lists the concepts in the remote cold backup system that may be confusing. This helps you understand the remote cold backup system. Table 1-41 Common concepts in the remote cold backup system Concept Description Primary site Physical primary site. The primary site is determined during the installation and will not change with the active/standby switchover. The primary site is active at most time and provides services. Secondary site Physical secondary site. The secondary site is determined during the installation and will not change with the active/standby switchover. The secondary site is standby at most time and provides protection for the primary site. Active status Status of the site that provides services. Standby status Status of the site that provides protection for the primary site. Principles As shown in Figure 1-1, two identical sets of the PowerEcho and product are deployed and are configured as a remote cold backup system. The remote cold backup system synchronizes data from the SFTP server at the primary site to that at the secondary site. The SFTP servers are used to transfer backup data between the primary and secondary sites. If SFTP is used for data transfer during synchronization, the backup server functions as the SFTP server. If NFS is used for data transfer during synchronization, the management node functions as the SFTP server. (You are advised to use SFTP because it is more secure than NFS.) Figure 1-1 Data synchronization principles Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 89 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Data Synchronization Mode Scheduled synchronization and manual synchronization are supported. ● Scheduled synchronization: The product data at the primary site is automatically synchronized to the secondary site at a specified time point or periodically. ● Manual synchronization: The product data at the primary site is manually synchronized to the secondary site. 1.12.2 Managing the Remote Cold Backup System After the remote cold backup system is set up, the product can be protected. This section describes the operations related to the remote cold backup system in different scenarios. 1.12.2.1 Configuring a Remote Cold Backup System This section describes how to create a remote cold backup system using the primary and secondary sites. Prerequisites ● The deployment scheme of the primary site must be the same as that of the secondary site. That is, the PowerEcho version, OS version, database version, services and their versions, products and their versions, node name, node quantity, UTC time, and keys must be consistent between the two sites. ● If you cannot determine whether the keys of the primary and secondary sites are the same, use the keys of the primary site to update those of the secondary sites. For details, see 1.17.2 Updating the Root Key and Working Keys of the Secondary Site. The keys of the two sites are the same in the following scenarios: Issue Draft B (2020-11-30) – The PowerEcho is installed for the first time. – The keys of the secondary site are updated by those of the primary site. ● You have configured the parameters for the backup server and storage policy for the backup files at the primary and secondary sites. Ensure that the backup servers at the primary and secondary sites share the same transfer mode, such as SFTP or NFS. ● The default scheduled backup tasks of the primary and secondary sites have been enabled. For details, see 1.11.5.1 Backing Up Product on a Scheduled Basis. ● You have obtained the backup server IP address, port number of the backup servers of the primary and secondary sites, the username and password for a user who can transfer files using the SFTP protocol, and the path for storing the backup files. ● All services and database instances at the primary and secondary sites are running properly. For details, see 1.3.1 Monitoring Products. ● Ensure that the backup server users of the primary and secondary sites can communicate over SFTP before and after the security hardening is performed. ● You have logged in to the PowerEcho of the primary and secondary sites. For details, see 1.1.2 Logging In to the PowerEcho. Copyright © Huawei Technologies Co., Ltd. 90 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Precautions ● If multiple backup servers are available, set the backup server that is first added on the Backup and Restore > Configuration > Configure Backup Parameters page as the peer SFTP backup server. ● Add a remote cold backup system on the PowerEcho at both the primary and secondary sites. Procedure Step 1 On the PowerEcho of the secondary site, stop the product services at the secondary site. For details, see 1.5.2 Stopping Product Services. Step 2 On the PowerEcho of the primary site, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. Step 3 On the Manage Cold Backup System page, click Add. Step 4 Create a remote cold backup system as prompted. NOTE ● It is recommended that the primary and secondary site names are different. ● Log in to the peer site to query the product name. For details, see 1.24.13 Querying a Product Name. ● You are advised to set interval to 24 hours. Table 1-42 Parameters of the peer SFTP backup server Parameter Name Parameter example Transfer protocol SFTP Server IP address IP address of the peer backup server Port number 22 Username backupuser Password Changeme_123 Save path backup Step 5 Add a remote cold backup system at the secondary site. For details, see Step 2 to Step 4. Step 6 Check whether product data at the primary site can be synchronized to the secondary site. Issue Draft B (2020-11-30) 1. Back up product data on the PowerEcho of the primary site. For details, see 1.11.5.2 Backing Up Product Data. 2. On the PowerEcho of the secondary site, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. 3. in the Operation On the Manage Cold Backup System page, click column of the remote cold backup system whose data is to be synchronized. Copyright © Huawei Technologies Co., Ltd. 91 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 4. Perform operations as prompted. 5. Use PuTTY to log in to the backup server of the secondary site as a backup server user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. NOTE If the management node is used as the backup server, log in to the backup server as the sopuser user in SFTP mode and then switch to the backup server user. 6. Run the following commands to check whether the manually synchronized backup data exists: > cd /root directory of the backup server user/storage directory of the backup server/product name/dynamic > ll – If the backup data exists, the remote cold backup system is created successfully. – If the backup data does not exist, check that all the parameters are correct and create the remote cold backup system again. ----End 1.12.2.2 Switching Services to the Secondary Site When the Primary Site Is Faulty If the primary site is faulty, manually start the secondary site to take over services from the primary site. Prerequisites The product services at the secondary site have been stopped. For details, see 1.5.2 Stopping Product Services. Precautions 53081 Remote cold backup system heartbeat abnormal may be reported during the takeover. This is normal, and no action is required. This alarm is automatically cleared after the service takeover is complete. Procedure Step 1 Log in to the PowerEcho of the original primary site. ● If the login is successful, go to Step 2. ● If the login fails, go to Step 3. Step 2 Switch the original primary site to standby. Issue Draft B (2020-11-30) 1. On the PowerEcho of the primary site, stop the product services at the current site. For details, see 1.5.2 Stopping Product Services. 2. On the PowerEcho, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. Copyright © Huawei Technologies Co., Ltd. 92 iManager NetEco Administrator Guide 3. 1 NetEco Administrator Guide On the Manage Cold Backup System page, click in the Operation column of the remote cold backup system whose services have been taken over. NOTE If the connection status of the product node is abnormal, the primary site cannot be switched to standby. Go to Step 3 and then rectify the faulty node. For details, see 1.24.14 Product Node Faults. After the faulty node is recovered, go to Step 2. 4. Perform operations as prompted. Step 3 Switch the secondary site to active and start the product services at the secondary site. 1. Log in to the PowerEcho of the secondary site. For details, see 1.1.2 Logging In to the PowerEcho. 2. On the PowerEcho, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. 3. in the Operation On the Manage Cold Backup System page, click column of the remote cold backup system that will take over the services. 4. Perform operations as prompted. 5. Start the product services at the current site. For details, see 1.4.3 Starting Product Services. ----End 1.12.2.3 Switching Services to the Secondary Site When the Primary Site Is Normal When the system is running properly, you can perform a drill to verify the active/ standby switchover capability of the remote cold backup system. Prerequisites You have logged in to the PowerEcho of the primary and secondary sites. For details, see 1.1.2 Logging In to the PowerEcho. Precautions 53081 Remote cold backup system heartbeat abnormal may be reported during the takeover. This is normal, and no action is required. This alarm is automatically cleared after the service takeover is complete. Procedure Step 1 On the PowerEcho of the secondary site, check that the services at the secondary site are in the Not Running state and the databases at the secondary site are in the Running state. For details, see 1.3 System Monitoring and Task Management. Step 2 To ensure that the latest backup data is used after the secondary site takes over services, back up the latest product data on the PowerEcho of the primary site. For details, see 1.11.5 Backing Up Products. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 93 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 3 Forcibly synchronize the product data between the primary and secondary sites. 1. On the PowerEcho of the secondary site, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. 2. On the Manage Cold Backup System page, click in the Operation column of the remote cold backup system whose data is to be synchronized. 3. Perform operations as prompted. Step 4 After the data synchronization between the primary and secondary sites is complete, stop the product services at the primary site. For details, see 1.5.2 Stopping Product Services. Step 5 Switch the original primary site to standby. 1. On the PowerEcho of the primary site, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. 2. in the Operation On the Manage Cold Backup System page, click column of the remote cold backup system whose services have been taken over. 3. Perform operations as prompted. Step 6 Switch the secondary site to active and start the product services at the secondary site. 1. On the PowerEcho of the secondary site, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. 2. in the Operation On the Manage Cold Backup System page, click column of the remote cold backup system that will take over the services. 3. Perform operations as prompted. 4. Start the product services of the current site. For details, see 1.4.3 Starting Product Services. ----End 1.12.2.4 Switching Services Back to the Primary Site When the primary site recovers and can provide services, you can switch the services back to the primary site. Prerequisites Issue Draft B (2020-11-30) ● The databases at the primary site are in the Running state. For details, see 1.3.4 Monitoring Databases. ● The product services at the primary site have been stopped. For details, see 1.5.2 Stopping Product Services. ● The services of the PowerEcho and product at the secondary site are in the Running state. For details, see 1.3.3 Monitoring Services. ● You have logged in to the PowerEcho of the primary and secondary sites. For details, see 1.1.2 Logging In to the PowerEcho. Copyright © Huawei Technologies Co., Ltd. 94 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Precautions 53081 Remote cold backup system heartbeat abnormal may be reported during the takeover. This is normal, and no action is required. This alarm is automatically cleared after the service takeover is complete. Procedure Step 1 To ensure that the latest backup data is used after the primary site takes over services, back up the latest product data on the PowerEcho of the secondary site. For details, see 1.11.5 Backing Up Products. Step 2 Forcibly synchronize the product data between the primary and secondary sites. 1. On the PowerEcho of the primary site, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. 2. in the Operation On the Manage Cold Backup System page, click column of the remote cold backup system whose data is to be synchronized. 3. Perform operations as prompted. Step 3 Switch the secondary site to standby. 1. Stop the product services of the secondary site. For details, see 1.5.2 Stopping Product Services. 2. On the PowerEcho of the secondary site, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. 3. On the Manage Cold Backup System page, click column of the remote cold backup system. 4. Perform operations as prompted. in the Operation Step 4 Switch the primary site to active. 1. On the PowerEcho of the primary site, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. 2. On the Manage Cold Backup System page, click column of the remote cold backup system. 3. Perform operations as prompted. 4. Start the product services of the primary site. For details, see 1.4.3 Starting Product Services. in the Operation ----End 1.12.2.5 Forcibly Synchronizing Product Data If the communication between the primary and secondary sites recovers or when you perform routine maintenance, you can forcibly synchronize the product data to ensure data consistency between the primary and secondary sites. Prerequisites You have logged in to the PowerEcho of the secondary site. For details, see 1.1.2 Logging In to the PowerEcho. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 95 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Context ● The product data at the primary site is automatically synchronized to the secondary site. The scheduled synchronization automatically triggers the Copy backup File and Restore product Data tasks. ● Forcible synchronization contains the following tasks: Forced synchronization data, Copy backup file, Synchronize backup data (synchronizing backup information to the PowerEcho of the secondary site), and Restore product data. Forced synchronization data is complete only after the other three tasks are complete. Restore product data will be executed after Synchronize backup data if data is available at the primary site. Otherwise, Restore product data will not be executed. Precautions During product data synchronization, do not perform any other operations, such as configuring the current system information, switching over the primary and secondary sites, and deleting the remote cold backup system. Procedure Step 1 On the PowerEcho, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. Step 2 On the Manage Cold Backup System page, click in the Operation column of the remote cold backup system whose data is to be synchronized. Step 3 Perform operations as prompted. ----End 1.12.2.6 Modifying the Remote Cold Backup System When the configuration of the remote cold backup system changes, modify the configuration as required. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Precautions ● The name, local product type of the remote cold backup system, and the transfer mode of the peer SFTP backup server cannot be modified. ● During the product data synchronization, information about the remote cold backup system cannot be modified. Procedure Step 1 On the PowerEcho, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 96 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 2 On the Manage Cold Backup System page, click the remote cold backup system to be modified. in the Operation column of Step 3 Perform operations as prompted. Step 4 Back up the application and data of the PowerEcho again. This is because after the parameters of the remote cold backup system are changed, the historical backup files of the application and data of the PowerEcho have become invalid. For details about how to back up, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho. ----End 1.12.2.7 Deleting the Remote Cold Backup System If the remote cold backup system is no longer required, you can delete the remote cold backup system. Prerequisites You have logged in to the PowerEcho of the primary and secondary sites. For details, see 1.1.2 Logging In to the PowerEcho. Precautions ● During the product data synchronization, do not delete the remote cold backup system. ● Delete the remote cold backup system at both primary and secondary sites. Procedure Step 1 On the PowerEcho of the primary site, choose HA > Remote High Availability System > Manage Cold Backup System from the main menu. Step 2 On the Manage Cold Backup System page, select the remote cold backup system to be deleted and click Delete. Step 3 Perform operations as prompted. Step 4 Delete the remote cold backup system at the secondary site. For details, see Step 1 to Step 3. Step 5 Back up the application and data of the PowerEcho again. This is because after the remote cold backup system is deleted, the historical backup files of the application and data of the PowerEcho have become invalid. For details about how to back up, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho. ----End 1.13 Task Management By viewing task details, you can learn about task execution status and locate causes of failed tasks. In addition, you can terminate a pending or running task to perform another task with higher priority. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 97 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Context Table 1-43 lists the types and description of tasks that you can view on the PowerEcho. Table 1-43 Task management Task Type Description Condition System task Tasks that are automatically triggered by the system. System operations, for example: ● Default scheduled backup tasks ● Scheduled tasks for backing up the PowerEcho User task Tasks that are manually executed by users. Manual operations, for example: ● Adding products ● Scanning software packages ● Manually backing up the PowerEcho Precautions The time required for backing up the product data increases with the data volume. If you need to execute another task with higher priority, you can terminate the task for backing up product data when the task is in the Initialization, Preliminary checks, Pre operation, or Execution stage. After the task with higher priority is complete, you can create the terminated backup task again. Procedure Step 1 On the PowerEcho, choose System > Task List from the main menu. Step 2 On the Task List page, perform operations as prompted. ----End 1.14 Display Format Settings on the PowerEcho Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 98 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.14.1 Date and Time Zone Display Format The PowerEcho allows you to set the display format of the date and time zone on the web client. After the setting takes effect, the date on the PowerEcho is displayed in the configured format. Prerequisites You have logged in to the PowerEcho. For details, see1.1.2 Logging In to the PowerEcho. Precautions This setting takes effect only for the current user who logs in to the PowerEcho web client. Procedure Step 1 On the PowerEcho, choose System > System Configuration > Set Date and Timezone Display Format from the main menu. Step 2 On the Set Date and Timezone Display Format page, perform operations as prompted. ----End 1.14.2 Time Display Format The PowerEcho allows you to set the time display format on the web client. After the setting takes effect, the time on the PowerEcho is displayed in the configured format. Prerequisites You have logged in to the PowerEcho. For details, see1.1.2 Logging In to the PowerEcho. Precautions This setting takes effect only for the current user who logs in to the PowerEcho web client. Procedure Step 1 On the PowerEcho, choose System > System Configuration > Set Time Display Format from the main menu. Step 2 On the Set Time Display Format page, perform operations as prompted. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 99 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.14.3 Number Display Format The PowerEcho allows you to set the number display format on the web client. After the setting takes effect, the time on the PowerEcho is displayed in the configured format. Prerequisites You have logged in to the PowerEcho. For details, see1.1.2 Logging In to the PowerEcho. Precautions This setting takes effect only for the current user who logs in to the PowerEcho web client. Procedure Step 1 On the PowerEcho, choose System > System Configuration > Set Number Display Format from the main menu. Step 2 On the Set Number Display Format page, perform operations as prompted. ----End 1.15 Password Management 1.15.1 OS Users This section provides information about default OS users and describes how to change the passwords for these default users. 1.15.1.1 Default OS Users The system provides default users and initial passwords, and grants different permissions to these users. Before performing operations, learn the default users and their permissions to improve operation efficiency. You are advised to change the passwords periodically (every three months) and set new passwords according to the password requirements. NOTICE For security purposes, change the password on first login, update it periodically, and keep it secure. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 100 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-44 Default OS users User Initial Password Description How to Change the Password root Changeme_ 123 ● OS administrator For details, see 1.15.1.3 Changing the Password of User root. ossuser dbuser ossadm Issue Draft B (2020-11-30) ● This user is used to log in to the OS of a node. It is authorized to run all commands. Changeme_ 123 ● OS user Changeme_ 123 ● Common user Changeme_ 123 ● OS user ● This user is created when the NetEco is installed. It is used to install, upgrade, and maintain the product software. NOTE Keep the password for the root user secure. The password cannot be reset or retrieved if lost, and you need to reinstall the OS, affecting O&M. For details, see 1.15.1.2 Changing Passwords for OS Users (Nonroot Users). ● This user is created when the operating system is installed. It is authorized to install, start, stop, and manage the Gauss or Redis database of the operating system. The Gauss database is an embedded database used by the management node to store service data. The Redis database caches service operation data. The OS user dbuser and the database user dbuser can access the Gauss or Redis database only in a LAN. The OS user dbuser and the database user dbuser have only the minimum permissions to execute their tasks. ● This user is created when the operating system is installed. It is authorized to install, start, stop, and manage the operating system. Copyright © Huawei Technologies Co., Ltd. 101 iManager NetEco Administrator Guide 1 NetEco Administrator Guide User Initial Password Description sopuser Changeme_ 123 Maintenance account, users can remotely log in to the management node through SSH. backupu ser Changeme_ 123 Backup account. How to Change the Password Table 1-45 Host account list Issue Draft B (2020-11-30) Account Owner Group Account Description User Status root root Super administrator account Enabled bin bin BIN account Locked daemon daemon daemon account Locked adm adm adm account Locked lp lp Printing service account Locked sync root Synchronization service account Locked shutdow n root Shutdown service account Locked halt root Shutdown service account Locked mail mail Mail service account Locked operator root Operator account Locked games users games account Locked ftp ftp FTP account Locked nobody nobody nobody account Locked dbus dbus dbus service account Locked sshd sshd SSH service account Locked ntp ntp NTP service account Locked systemd network systemdnetwork systemd-network service account Locked tss tss tcsd service account Locked rpc rpc rpcbind service account Locked polkitd polkitd polkitd service account Locked Copyright © Huawei Technologies Co., Ltd. 102 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Account Owner Group Account Description User Status chrony chrony chronyd service account Locked dhcpd dhcpd dhcpd service account Locked ldap ldap slapd service account Locked nfsnobo dy nfsnobody NFS service account Locked nscd nscd Account used by the LDAP cache daemon process Locked rpcuser rpcuser RPC service account Locked saslauth saslauth saslauth service account Locked sssd sssd sssd service account Locked systemd coredum p systemdcoredump systemd-coredump account Locked systemd -resolve systemdresolve Account used by the network name resolution service Locked unbound unbound Account used by the Domain name resolution service Locked systemd timesync systemdtimesync systemd-timesync service account Locked mailnull mailnull Sendmail service account Locked smmsp smmsp Sendmail service account Locked 1.15.1.2 Changing Passwords for OS Users (Non-root Users) For security purposes, change the initial passwords for OS users. You are advised to periodically change the password for the OS users (for example, every three months). Set new passwords according to the password rules of the OS. Prerequisites Issue Draft B (2020-11-30) ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● Before changing the operating system user password, ensure that the database is running properly. Otherwise, the operating system password fails to be changed. Copyright © Huawei Technologies Co., Ltd. 103 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Context The user password must meet the password complexity requirements. The password rules are as follows: ● The password must contain 8 to 64 characters. ● The password must be a combination of the following four types of characters: – At least one uppercase letter – At least one lowercase letter – At least one digit – At least one special character from ~@#^*-_+[{}]:./?%=! (Starting with ! is not allowed.) ● The password cannot contain more than two consecutive identical characters. ● The password cannot be the same as the reverse of it, regardless of the case. ● In addition to the preceding requirements, the password must meet the following requirements: – The password cannot be the same as any of the last five passwords. – The password cannot be a password in the weak password dictionary. NOTE ● The weak password dictionary is a collection of weak and common passwords that are vulnerable to cracking. Using a password in the weak password dictionary is not allowed, which is a commonly adopted measure in the industry to ensure security. ● For details about how to check and change passwords in the weak password dictionary, see 1.24.9 Managing Passwords in the Weak Password Dictionary. – The password must contain at least five different characters from the username or reverse of the username, and consecutive identical characters are regarded as one character. – The password cannot contain the username or the reverse of the username, regardless of the case. For example, if the username is ossadm, the password Ossadm or mdAsso is not allowed. Precautions Issue Draft B (2020-11-30) ● To prevent password change failure, do not change the OS user password in command and GUI mode at the same time. ● If the GaussDB T V3 database has multiple nodes, the password for the OS user dbuser on all the nodes must be the same. Otherwise, patches of the GaussDB T V3 database cannot be installed. ● If the PowerEcho is deployed in cluster mode and some management nodes are faulty, restore the faulty nodes first. Otherwise, the OS password fails to be modified. Copyright © Huawei Technologies Co., Ltd. 104 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 On the PowerEcho, choose Maintenance > Password Modification > Change OS User Password from the main menu. Step 2 On the Change OS User Password page, change the OS user password as prompted. ----End Follow-up Procedure If the management node is used as the backup server and the password for the backup server user is changed, update the password in the backup parameters. Otherwise, the backup file cannot be saved to the backup server. For details, see 1.11.4 Configuring Backup Parameters. 1.15.1.3 Changing the Password of User root Periodic password change is required to improve security of the password of the NetEco server user root. Prerequisites ● The old password of user root is available. ● The new password of user root is available. ● You have logged in to the NetEco server as user sopuser in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. ● The password of user root must meet the requirements for the minimum complexity. The password must contain at least seven characters consisting of letters, digits, or their combination. Ensure that the password contains at least one digit or one special character. ● The NetEco does not restrict the validity periods of user passwords. To ensure user password security, you are advised to change the password once every three months. Context Procedure Step 1 Run the following command to switch to the root user. $ su - root Password: root password NOTE After you switch to user root, "root@Host name:~#" is displayed. The default password of user root is Changeme_123. Step 2 Run the following command to change the password of user root: # passwd root Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 105 iManager NetEco Administrator Guide 1 NetEco Administrator Guide New Password:new password Retype New Password:new password If Password changed or Changed successfully is displayed, the password is changed successfully. ----End 1.15.2 Database Users This section provides information about default database users and describes how to change the passwords for these users. 1.15.2.1 Default Database Users A database provides default usernames and initial passwords. For security, change the initial passwords for related users. You are advised to change the passwords periodically (every three months) and set new passwords according to the password requirements. NOTICE For security purposes, change the password on first login, update it periodically, and keep it secure. To change the database password, ensure that the passwords of the sys user for all instance databases are the same. Precautions Use the ossdbuser user when writing data. If you use another user, the relationship between master and slave databases may be incorrect. Table 1-46 GaussDB users and passwords of the PowerEcho Issue Draft B (2020-11-30) Usernam e Initial Password Description How to Change the Password sys Admin@12 3 ● Administrator user. This user is used to modify database configurations, to add, delete, modify, and query users and databases, and to change user passwords. This user is only allowed to log in locally. For details, see 1.15.2.2 Changing Passwords for Database Users. Copyright © Huawei Technologies Co., Ltd. 106 iManager NetEco Administrator Guide Usernam e 1 NetEco Administrator Guide Initial Password Description How to Change the Password {ossdbus Changeme_ ● Application user. This user er} and 123 is used by services to read, ossdbuse write the database, and to r create and delete database tables. ● {ossdnuser} indicates the name of a product database. Each application database has a corresponding user. Therefore, there are multiple database users and passwords. The ossdbuser is a virtual user and is not allowed to log in the database. When changing the passwords for these application users, enter the username ossdbuser so that you can change the passwords for all the application users at a time. The involved users are as follows: APPCONTROLLERDB AUDITLOGDB BACKUPDB CRONDB DBMGRDB DEPLOYCONTROLLERDB DEPLOYCOREDB ENGRCOMMONSERVICEDB MAINTENANCESERVICEDB OSPATCHDB PKGREPODB PRIVILEGEDB PRODUCTMONITORDB SECURITYCONFIGDB SIADB SYSFENSDB SYSLOGDB Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 107 iManager NetEco Administrator Guide Usernam e 1 NetEco Administrator Guide Initial Password Description How to Change the Password SYSMGRDB TASKMGRDB USERDB switchdb user 321_emegn ahC ● Switchover management user. This user is used to perform database switchover and configure read-only settings. readdbu ser Changeme @123 ● O&M read-only user. This user is used to read the database status and configurations. public N/A Pre-configured database user. This user is a public user and cannot log in to the database. It is a collection of all database users. If a permission is assigned to the public user, this permission is shared by all database users. To ensure the data security of the database, do not assign any object permission to the public user. N/A Table 1-47 Redis database users and passwords of the PowerEcho Issue Draft B (2020-11-30) Username Initial Password Description How to Change the Password dbuser Admin@123 ● Administrator user. This user is used to modify database configurations, to add, delete, modify, and query users, and to change user passwords. ossdbuser Changeme_12 3 ● Application user. This user is used by services to read, write, and delete key values in the database. For details, see 1.15.2.2 Changing Passwords for Database Users. readdbuser Changeme@1 23 ● O&M read-only user. This user is used to read the database status and configurations. Copyright © Huawei Technologies Co., Ltd. 108 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-48 Redis database users and passwords of the NetEco Userna me Initial Password Description How to Change the Password dbuser Admin@123 ● Database administrator For details, see 1.15.2.2 Changing Passwords for Database Users. ● This user is used to log in to the database of a node. It is authorized to run all commands. ossdbus er Changeme_123 readdbu ser Changeme@12 3 ● Common user ● This user is used to read and write data in the database, and to create and delete database tables. ● Read-only user ● This user is used to read the database status, database configurations, and data in the database. Table 1-49 GaussDB users and passwords of the NetEco Issue Draft B (2020-11-30) Usernam e Initial Password Description How to Change the Password sys Admin@12 3 ● Administrator user. This user is used to modify database configurations, to add, delete, modify, and query users and databases, and to change user passwords. This user is only allowed to log in locally. For details, see 1.15.2.2 Changing Passwords for Database Users. Copyright © Huawei Technologies Co., Ltd. 109 iManager NetEco Administrator Guide Usernam e 1 NetEco Administrator Guide Initial Password Description How to Change the Password {ossdnus Changeme_ ● Application user. This user er} and 123 is used by services to read, ossdbuse write the database, and to r create and delete database tables. ● {ossdnuser} indicates the name of a product database. Each application database has a corresponding user. Therefore, there are multiple database users and passwords. The ossdbuser is a virtual user and is not allowed to log in the database. When changing the passwords for these application users, enter the username ossdbuser so that you can change the passwords for all the application users at a time. The involved users are as follows: DASHBOARD MEDDB MONITORDB NELOGDB NETECOFMDB OMCDB PHONEAPPDB PMDB REPORTMGR SECURITYPLATDB SITEDB SWMDB switchdb user Issue Draft B (2020-11-30) 321_emegn ahC ● Switchover management user. This user is used to perform database switchover and configure read-only settings. Copyright © Huawei Technologies Co., Ltd. 110 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Usernam e Initial Password Description readdbu ser Changeme @123 ● O&M read-only user. This user is used to read the database status and configurations. public N/A Pre-configured database user. This user is a public user and cannot log in to the database. It is a collection of all database users. If a permission is assigned to the public user, this permission is shared by all database users. To ensure the data security of the database, do not assign any object permission to the public user. How to Change the Password N/A Table 1-50 GaussDB users and passwords of the NetEco service side Issue Draft B (2020-11-30) Usernam e Initial Password Description How to Change the Password sys Admin@12 3 ● Administrator user. This user is used to modify database configurations, to add, delete, modify, and query users and databases, and to change user passwords. This user is only allowed to log in locally. For details, see 1.15.2.2 Changing Passwords for Database Users. Copyright © Huawei Technologies Co., Ltd. 111 iManager NetEco Administrator Guide Usernam e 1 NetEco Administrator Guide Initial Password Description How to Change the Password {ossdnus Changeme_ ● Application user. This user er} and 123 is used by services to read, ossdbuse write the database, and to r create and delete database tables. ● {ossdnuser} indicates the name of a product database. Each application database has a corresponding user. Therefore, there are multiple database users and passwords. The ossdbuser is a virtual user and is not allowed to log in the database. When changing the passwords for these application users, enter the username ossdbuser so that you can change the passwords for all the application users at a time. The involved users are as follows: NBICOMMONDB EAMDB RMTASKMGMTDB INFOCENTERSERVICEDB SYSLOGDB FMDB CMDBCORESVRDB APIGOVERNANCEDB PRIVILEGEDB SIADB APIGATEWAY_AM_DB LIFECYCLEDB TEMPDB SYSFENSDB INVMETADATADB MOUISERVICEDB SECONDARYAUTHDB NBIFRMNOTIFYDB Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 112 iManager NetEco Administrator Guide Usernam e 1 NetEco Administrator Guide Initial Password Description How to Change the Password AUDITLOGDB RCACCESSCONFIGDB SYSPREFERENCESDB CMDBCOREHISTORYDB RMCOORDINATEDB NBIFRMFTPDB AUTODISCOVERYDB MERESGRPDB SNBCERTMGMTSERVICEDB IDGENDB HOFSDB1 RNDB ADMINHOMEDB USERDB SECURITYCONFIGDB TOPODB DOMAINDB LICENSEDB CRONDB CMCCLOUDSERVICEDB Issue Draft B (2020-11-30) switchdb user 321_emegn ahC ● Switchover management user. This user is used to perform database switchover and configure read-only settings. readdbu ser Changeme @123 ● O&M read-only user. This user is used to read the database status and configurations. Copyright © Huawei Technologies Co., Ltd. 113 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Usernam e Initial Password Description How to Change the Password public N/A Pre-configured database user. This user is a public user and cannot log in to the database. It is a collection of all database users. If a permission is assigned to the public user, this permission is shared by all database users. To ensure the data security of the database, do not assign any object permission to the public user. N/A Table 1-51 GaussDB users and passwords of the inference softcomai Issue Draft B (2020-11-30) Usernam e Initial Password Description How to Change the Password sys Admin@12 3 ● Administrator user. This user is used to modify database configurations, to add, delete, modify, and query users and databases, and to change user passwords. This user is only allowed to log in locally. For details, see 1.15.2.2 Changing Passwords for Database Users. Copyright © Huawei Technologies Co., Ltd. 114 iManager NetEco Administrator Guide Usernam e 1 NetEco Administrator Guide Initial Password Description How to Change the Password {ossdbus Changeme_ ● Application user. This user er} and 123 is used by services to read, ossdbuse write the database, and to r create and delete database tables. ● {ossdnuser} indicates the name of a product database. Each application database has a corresponding user. Therefore, there are multiple database users and passwords. The ossdbuser is a virtual user and is not allowed to log in the database. When changing the passwords for these application users, enter the username ossdbuser so that you can change the passwords for all the application users at a time. The involved users are as follows: APPMGMTDB EVALUATIONDB SAMPLEDB APPENGINEDB DISPATCHERDB RETRAINSERVICEDB MSAGENTDB NAIEDB RETRAINMGMTDB CASEDB Issue Draft B (2020-11-30) switchdb user 321_emegn ahC ● Switchover management user. This user is used to perform database switchover and configure read-only settings. readdbu ser Changeme @123 ● O&M read-only user. This user is used to read the database status and configurations. Copyright © Huawei Technologies Co., Ltd. 115 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Usernam e Initial Password Description How to Change the Password public N/A Pre-configured database user. This user is a public user and cannot log in to the database. It is a collection of all database users. If a permission is assigned to the public user, this permission is shared by all database users. To ensure the data security of the database, do not assign any object permission to the public user. N/A Table 1-52 GaussDB users and passwords of the inference softcomainobackup Issue Draft B (2020-11-30) Usernam e Initial Password Description How to Change the Password sys Admin@12 3 ● Administrator user. This user is used to modify database configurations, to add, delete, modify, and query users and databases, and to change user passwords. This user is only allowed to log in locally. For details, see 1.15.2.2 Changing Passwords for Database Users. Copyright © Huawei Technologies Co., Ltd. 116 iManager NetEco Administrator Guide Usernam e 1 NetEco Administrator Guide Initial Password Description How to Change the Password {ossdbus Changeme_ ● Application user. This user er} and 123 is used by services to read, ossdbuse write the database, and to r create and delete database tables. ● {ossdnuser} indicates the name of a product database. Each application database has a corresponding user. Therefore, there are multiple database users and passwords. The ossdbuser is a virtual user and is not allowed to log in the database. When changing the passwords for these application users, enter the username ossdbuser so that you can change the passwords for all the application users at a time. The involved users are as follows: APPMGMTNOBACKUPDB Issue Draft B (2020-11-30) switchdb user 321_emegn ahC ● Switchover management user. This user is used to perform database switchover and configure read-only settings. readdbu ser Changeme @123 ● O&M read-only user. This user is used to read the database status and configurations. public N/A Pre-configured database user. This user is a public user and cannot log in to the database. It is a collection of all database users. If a permission is assigned to the public user, this permission is shared by all database users. To ensure the data security of the database, do not assign any object permission to the public user. Copyright © Huawei Technologies Co., Ltd. N/A 117 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-53 Database users and passwords of InfluxDB Usernam e Initial Password Description How to Change the Password ossdbus er Changeme_ 123 Influxdb database user, which is used to read, write, and delete the database by using the Influxdb database service. For details, see 1.15.2.2 Changing Passwords for Database Users. 1.15.2.2 Changing Passwords for Database Users For security purposes, change the initial passwords for the database users to reduce security risks of violent password cracking. You are advised to periodically change the passwords for the database users (every three months) and set new passwords based on the password rules. Prerequisites Issue Draft B (2020-11-30) ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The PowerEcho service is running properly. For details about how to check the status of the PowerEcho service, see 1.3.3 Monitoring Services. ● Before the database user password of the PowerEcho is changed, the PowerEcho database with user password to be changed must be in the Running state. For details about how to check the database status, see 1.3.4 Monitoring Databases. ● Before the database user password of a product is changed, the services of the product with database user password to be changed must be in the Not Running state, and the product database with user password to be changed must be in the Running state. For details, see 1.3.3 Monitoring Services and 1.3.4 Monitoring Databases. – If the services of the product with database user password to be changed are in the Running state, the PowerEcho will automatically stop the product services before the password is changed. – If the product database with user password to be changed is in the Not Running state, the PowerEcho will automatically start the product database before the password is changed. ● If the database is deployed in master/slave mode, Status of the database with user password to be changed must be Running, and Replication Status of the database must be Normal. Otherwise, the system may become abnormal. For details about how to check the status and replication status of a database, see 1.3.4 Monitoring Databases. ● If any management node is faulty, restore the node first. Otherwise, user passwords of databases cannot be changed. For details, see Table 1-16. ● In a remote cold backup scenario, the remote cold backup system has been deleted. For details, see 1.12.2.7 Deleting the Remote Cold Backup System. Copyright © Huawei Technologies Co., Ltd. 118 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Context The user password must meet the password complexity requirements. The password rules are as follows: ● The password must contain 8 to 64 characters. ● The password must be a combination of the following four types of characters: – At least one uppercase letter – At least one lowercase letter – At least one digit – At least one special character ~@#^*-_+[{}]:./? ● The password cannot contain more than two consecutive identical characters. ● The same character can be used three times at most. ● The password must contain at least two different characters from the initial password. ● The password cannot contain username or the reverse of it (case insensitive). NOTE ● For the GaussDB database, the new password must meet the complexity requirements and contain at least two different characters from the old password. The new password cannot be the same as any used in the past 60 days, and cannot be the same as any of the last three passwords. Procedure Step 1 On the PowerEcho, choose Maintenance > Password Modification > Change Database User Password from the main menu. Step 2 On the Change Database User Password page, change the password as prompted. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 119 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE ● After the database user passwords are changed, the system automatically restarts services. You are advised to change all the database user passwords you need to change at a time to reduce the number of automatic service restarts. ● For security purposes, you are advised to change the passwords for the GaussDB database user and Redis database user to different passwords before using the PowerEcho. For example, change the password for the GaussDB database user dbuser and that for the Redis database user dbuser to different passwords. ● If you change database user passwords in batches and passwords of some database instances fail to be changed, record the failure details in the task list. Change passwords of the failed database instances one by one by referring to 1.24.5 How Do I Change the Database Instance Password?. ● If you need to restart product services after changing the password for the product database user, do not select Automatically start product services after the change of product database user passwords in the Warning dialog box. In this case, after the password change, all product services will not be automatically started, preventing the product services or product databases from being restarted for several times. ● In a remote cold backup scenario, if you are changing the product database user password of the secondary site, do not select Automatically start product services after the change of product database user passwords in the Warning dialog box, preventing the product services of the secondary site from being restarted and causing the product to become dual-active. Step 3 In a remote cold backup scenario, rebuild a remote cold backup system. For details, see 1.12.2.1 Configuring a Remote Cold Backup System. ----End Follow-up Procedure Manually back up the product applications, product data, and database applications. For details, see 1.11.5.3 Backing Up Product Applications, 1.11.5.2 Backing Up Product Data, and 1.11.5.4 Backing Up Database Applications. 1.15.3 NetEco Web System Users and Passwords This section describes the default NetEco web system users and how to change the users' passwords. 1.15.3.1 Default NetEco Web System User Information The system provides default users and initial passwords. Change the password upon first login and you are advised to change a password periodically (every three months) and set a new password based on the specified password rules. NOTICE For NetEco web system security, change the password upon first login, update it periodically, and keep it secure. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 120 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-54 Default NetEco web system user information Web Syste m User Initial Password Description How to Change the Password NetEco client admi n Changem e_123 The admin user is the default administrator provided by the NetEco client. The admin user is authorized to manage and operate all devices. For details, see 1.15.3.2 Changing the Password for the admin User (NetEco). The admin user is the default administrator provided by the PowerEcho client. For details, see 1.15.3.3 Changing the Password for the admin User (the PowerEcho). PowerE cho client admi n Changem e_123 NOTE Keep the password of the admin user secure. If the password is lost, it cannot be reset or retrieved. You need to reinstall the NetEco system, which has great impact on O&M. NOTE Keep the password of the admin user secure. If the password is lost, it cannot be reset or retrieved. You need to reinstall the NetEco system, which has great impact on O&M. Swift Deploy upgrad e tool admi n Changem e_123 The user name and password are the same as those of the PowerEcho client. - Swift Deploy deploy ment tool admi n Changem e_123 The admin user is the default administrator provided by Swift Deploy deployment tool. For details, see 1.15.3.4 Changing the User Name and Password of the Swift Deploy Deployment Tool. 1.15.3.2 Changing the Password for the admin User (NetEco) To prevent security risks, such as violent password cracking, change the initial password for the admin user. You are also advised to change the password for the admin user periodically (for example, every three months) based on password requirements. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 121 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Prerequisites You have logged in to the NetEco as the admin user. For details, see 1.1.1 Logging In to the NetEco. Procedure Step 1 Choose System > Personal Settings > Change Password. Step 2 Set Old password, New password, and Confirm password. Step 3 Click Apply. ----End 1.15.3.3 Changing the Password for the admin User (the PowerEcho) The admin user is the administrator of the PowerEcho. For security purposes, change the initial password for the admin user to reduce security risks of bruteforce password cracking. You need to periodically change the password for the admin user based on the password policy in the system. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose System > Security Management > Change Password from the main menu. Step 2 On the Change Password page, change the password for the admin user as prompted. NOTICE User information is more secure if a password is changed more frequently. If you forget the password for the admin user due to frequent password changes, you can reset the password only by reinstalling the system. ----End 1.15.3.4 Changing the User Name and Password of the Swift Deploy Deployment Tool To improve system security, you need to change the password of user admin for Swift Deploy. To improve account security, you are advised to change the default user name admin. You are advised to periodically change the password to ensure system security. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 122 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Prerequisites You have obtained the password of user admin for Swift Deploy. The default password is Changeme_123. Context ● To improve password security, set the password based on the following complexity requirements: – The password must contain 8 to 32 characters. – The password must contain at least the following three character types: ▪ ▪ ▪ ▪ – ● Uppercase letter; Lowercase letter; Digit; Special character `~!@#$%^&*()-_=+\|[{}];:'",<.>/? and space. The password cannot be any user name or user name in reverse order. The naming rules of the user are as follows: – 1 to 32 characters. – Contain only letters a-z and A-Z and digits 0-9 and underscores (_). – The user name must begin with a letter or digit. Procedure 1. Use PuTTY to log in to the NetEco server as user sopuser. For details, see 1.24.1 Logging In to a Server Using PuTTY. 2. Run the following command to change the user name and password: $ su - ossadm password: ossadm password $ cd /opt/repo/deploytool/bin $ bash user_mgr.sh 3. Based on the command output, enter the original user name admin and its password, set a new user name, new password, and confirm password for Swift Deploy, and press Enter. If the following information is displayed, the password is changed successfully: Update user password success. 1.15.4 Setting and Changing the Password of the Server BIOS You are advised to set the password of the BIOS for the NetEco server and change the password periodically, thereby improving the server setting security. 1.15.4.1 Entering the Remote Management Window of the Server This section describes how to navigate to the remote management window of the server to manage the server. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 123 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Prerequisites ● The communication between the PC and the management network port on the server is proper. ● The IP address of the remote terminal is on the same network segment as that of the remote management port on the server. Context NOTICE The remote management window provides the remote password change function. However, this function does not limit the number of times of entering incorrect old passwords, and passwords may be violently cracked. Therefore, you need to set the password meeting the complexity requirements and change it periodically to reduce such a risk. For details about the functions in the remote management window, see the online help in this window. Procedure Step 1 Open browser on the PC. Type the IP address https://IP address of the remote management port for logging in to the remote management system in the address bar, and press Enter. The page for logging in to the remote management system is displayed. NOTE During login, if the system displays There is a problem with this website's security certificate, click Continue to this website. Step 2 Type the user name and the password, then click Log In. Step 3 Start the remote console. NOTE Log in to the iBMC and view the iBMC version information on the home page. ● If the iBMC version is 3.XX, after choose Remote Control from the main menu, then choose HTML5 Integrated Remote Console (Private) from the displayed Remote Control page. ● If the iBMC version is 5.XX, on the home page, drag the page downwards. In the Virtual Console area, click Start and select HTML5 Integrated Remote Console (Private). ----End 1.15.4.2 Setting and Changing the Password of the Server BIOS (TaiShan Server) You are advised to set the password of the BIOS for the server and change the password periodically, thereby improving the server setting security. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 124 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Prerequisites You have remotely logged in to the server through the iBMC web interface on a PC. For detailed operations, see 1.15.4.1 Entering the Remote Management Window of the Server. NOTE If the remote management port is used, you are advised to hold down Shift when entering uppercase letters. Caps Lock is not recommended. Procedure Step 1 Start or restart the server. When the window shown in Figure 1-2 is displayed, press Delete. The BIOS (Basic Input Output System) window is displayed. NOTE ● Please wait until the system switchs to BIOS. This process may use one minute. ● If the server is running, please restart the server by click the restart button on the upper part of the page. Restarting the system will cause the NetEco to be unavailable temporarily. Exercise caution when performing this operation. Figure 1-2 The server booting page Step 2 Enter the password on the BIOS screen,and press Enter. Shown as Figure 1-3. NOTE If the default password of the server is set before delivery, you need to enter the default password before entering the BIOS. The default password is Admin@9000. If the default password is not used, skip this step. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 125 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Figure 1-3 BIOS screen Step 3 Prompt the current password is the default password needs to be modified, press Enter. Shown as Figure 1-4. Figure 1-4 Configuration interface Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 126 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 4 Select Security screen as shown in Figure 1-5. Figure 1-5 Security screen Step 5 Select Set Supervisor Password and press Enter. You can set the administrator login password, as shown in Figure 1-6. Press after setting is completed Enter,. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 127 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Figure 1-6 Setting the password of the BIOS NOTE Set administrator password ● The default BIOS password is Admin@9000.. ● The password must be between 8 and 16 digits long. It must contain special characters (including spaces) and at least two of uppercase letters, lowercase letters, and numbers. ● The new password cannot be the same as the previous five passwords. ● After the administrator password is set, the "Clear Supervisor Password" parameter appears, which can be used to clear the administrator password. ● To change the administrator password, you need to enter the current administrator password first. If there are three input errors, the machine will be locked, and the server will be unlocked after restart. Step 6 On the Security interface, press F10 select Yes save and exit.as shown in Figure 1-7. NOTE You are advised to change the password of the BIOS every three months. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 128 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Figure 1-7 Save and exit ----End 1.15.4.3 Setting and Changing the Password of the Server BIOS (X86 Server) You are advised to set the password of the BIOS for the server and change the password periodically, thereby improving the server setting security. Prerequisites You have remotely logged in to the server through the iBMC web interface on a PC. For detailed operations, see 1.15.4.1 Entering the Remote Management Window of the Server. NOTE If the remote management port is used, you are advised to hold down Shift when entering uppercase letters. Caps Lock is not recommended. Procedure Step 1 Start or restart the server. When the window shown in Figure 1-8 is displayed, press Delete. The BIOS (Basic Input Output System) window is displayed. NOTE ● Please wait until the system switchs to BIOS. This process may use one minute. ● If the server is running, please restart the server by click the restart button on the upper part of the page. Restarting the system will cause the NetEco to be unavailable temporarily. Exercise caution when performing this operation. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 129 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Figure 1-8 The server booting page Step 2 Enter the password on the BIOS screen,and press Enter. Shown as Figure 1-9. NOTE If the default password is set before delivery, you need to enter the default password before entering the BIOS. The default password is Admin@9000. If the default password is not used, skip this step. Figure 1-9 Boot screen Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 130 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 3 Prompt the current password is the default password needs to be modified, pressEnter. As shown in Figure 1-10. Figure 1-10 Configuration interface Step 4 Select BIOS Configuration as shown in Figure 1-11. Figure 1-11 Home page Step 5 Select Security screen as shown in Figure 1-12. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 131 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Figure 1-12 Security screen Step 6 Select Manage Supervisor Password and press Enter. You can set the administrator login password. To change the administrator password, you need to enter the current administrator password first. If there are three input errors, the machine will be locked, and the server will be unlocked after restart. As shown in Figure 1-13. Figure 1-13 Setting the password of the BIOS Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 132 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE Set administrator password ● The default BIOS password is Admin@9000. ● The password must be between 8 and 16 digits long. It must contain special characters (including spaces) and at least two of uppercase letters, lowercase letters, and numbers. ● The new password cannot be the same as the previous five passwords. ● After the administrator password is set, the "Clear Supervisor Password" parameter appears, which can be used to clear the administrator password. ● If "Simple Password" is set to "Enabled", the system will not check the complexity of the password, but the password length must still be between 8 and 16 bits. Step 7 After setting is completed, press Enter to select OK, and then press Enter. As shown in Figure 1-14. Figure 1-14 Confirm interface Step 8 Press Enter to return to the Security interface, press F10 and select Yes to save and exit. As shown in Figure 1-15. NOTE You are advised to change the password of the BIOS every three months. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 133 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Figure 1-15 Save and exit ----End 1.15.5 Setting Encrypted Password for GRUB2 Description Grand unified bootloader (GRUB) is a boot manager for operating systems (OSs) such as Windows and Linux. GRUB2 is a later version of GRUB. When starting the system, you can modify the startup parameters of the system on the GRUB2 interface. To prevent unauthorized modification of the startup parameters of the system, you need to encrypt the GRUB2 interface. In this way, the startup parameters can be modified only when you enter the correct GRUB2 password. NOTE The default password of grub2 is Changeme_123. You are advised to change the default password upon the first login and periodically update the password. If the password is leaked, startup item configurations may be modified, causing the system startup failure. Implementation Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 2 Run the following command to generate an encrypted password: $ su - root Password:password for root # grub2-setpassword Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 134 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Enter password: Confirm password: NOTE SHA-512 is used as the GRUB2 encryption algorithm. Step 3 Run the cat command to view the grub.cfg file. # cd /boot/efi/EFI/euleros/ # cat grub.cfg # DO NOT EDIT THIS FILE # # It is automatically generated by grub2-mkconfig using templates # from /etc/grub.d and settings from /etc/default/grub # ### BEGIN /etc/grub.d/00_header ### set pager=1 ... terminal_output console if [ x$feature_timeout_style = xy ] ; then set timeout_style=menu set timeout=5 # Fallback normal timeout code in case the timeout_style feature is # unavailable. else set timeout=5 fi set superusers=root password_pbkdf2 root grub.pbkdf2.sha512.10000.D4D775602C4E9F76EF4A9A6E726486941C8AAFB4762227E6973690ED5A760D59 247E7E6ECA72472FBEEBFD9DB60F8EE56A4078094542C790BF0967879BE2D60C.B2742F38995B4B716EA7B0 E639D02BE6C4E649E30576E5F5505B85844172B831841DA80D264FD14B025F3C8804158E7FC082998664BD 03A92663FB4CE293807B ### END /etc/grub.d/00_header ### ### BEGIN /etc/grub.d/01_menu_auto_hide ### if [ "${boot_success}" = "1" -o "${boot_indeterminate}" = "1" ]; then set last_boot_ok=1 else set last_boot_ok=0 fi # Reset boot_indeterminate after a successful boot if [ "${boot_success}" = "1" ] ; then set boot_indeterminate=0 # Avoid boot_indeterminate causing the menu to be hidden more then once elif [ "${boot_indeterminate}" = "1" ]; then set boot_indeterminate=2 fi set boot_success=0 save_env boot_success boot_indeterminate if [ x$feature_timeout_style = xy ] ; then if [ "${menu_show_once}" ]; then unset menu_show_once save_env menu_show_once set timeout_style=menu set timeout=60 elif [ "${menu_auto_hide}" -a "${last_boot_ok}" = "1" ]; then set orig_timeout_style=${timeout_style} set orig_timeout=${timeout} if [ "${fastboot}" = "1" ]; then # timeout_style=menu + timeout=0 avoids the countdown code keypress check set timeout_style=menu set timeout=0 Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 135 iManager NetEco Administrator Guide 1 NetEco Administrator Guide else set timeout_style=hidden set timeout=1 fi fi fi ### END /etc/grub.d/01_menu_auto_hide ### ### BEGIN /etc/grub.d/01_users ### if [ -f ${prefix}/user.cfg ]; then source ${prefix}/user.cfg if [ -n "${GRUB2_PASSWORD}" ]; then set superusers="root" export superusers password_pbkdf2 root ${GRUB2_PASSWORD} fi fi ### END /etc/grub.d/01_users ### ... NOTE ● The superusers field is used to set the account name of the super GRUB2 administrator. ● Following the password_pbkdf2 field, the first parameter is the GRUB2 account name, and the second parameter is the ciphertext password of the account. ● Currently, GRUB2 menu management commands including grub2-mkconfig cannot be used in the AARCH64 architecture. ----End 1.15.6 Configuring the Hacker Language Dictionary A hacker language dictionary is used to store character conversion rules. Passwords are converted based on these rules. If a converted password exists in the password dictionary, do not use the password as a user password for account security purposes. This section describes how to update the hacker language dictionary if it does not meet user requirements. Prerequisites You have obtained the passwords for the sopuser and ossuser users for logging in to the node where SMLogLic resides. Context Issue Draft B (2020-11-30) ● The hacker language dictionary defines the rules of converting a character or string into an uppercase or lowercase letter. For example, if a rule for converting the string |-|1234 a into x exists in the hacker language dictionary and x exists in the password dictionary file, a password cannot be set to |-| 1234 abcd! when Password cannot contain words in password dictionary and Password complies with requirements in hacker language dictionary are enabled. ● A hacker dictionary file can contain multiple rules. In each rule, the string on the left of the last equal sign (=) is replaced with the first letter on the right of the last equal sign. For example, |-|1234 a = x indicates that |-|1234 a in the password will be replaced with x. ● In a hacker dictionary file, each row contains only one rule. Hacker dictionary configuration constraints are as follows: Copyright © Huawei Technologies Co., Ltd. 136 iManager NetEco Administrator Guide 1 NetEco Administrator Guide – The spaces, \n, \r, and tab characters at the beginning and end of the strings on the left and right sides of the last equal sign are filtered out. For example, x=x = y indicates that x=x will be replaced with y. – After the filtering, the first character of the string retaining on the right of the last equal sign must be a letter and the string retaining on the left of the last equal sign will be replaced with this letter. For example, x=x = ya indicates that x=x will be replaced with y. Procedure Step 1 On the local PC, create a hacker language dictionary file in .txt format. Ensure that the file size does not exceed 200 KB. Configure a conversion rule in the file. The following is an example: 1234 a = x x=%x = 2ya user = y Step 2 Use FileZilla to log in to the node where SMLogLic resides, as the sopuser user in SFTP mode. Upload the hacker language dictionary file to the /home/sopuser directory. For details, see 1.24.2 Transferring Files Using FileZilla. Step 3 Use PuTTY to log in to the node where SMLogLic resides, as the sopuser user in SSH mode. For details about how to obtain the IP address of the node where a service resides, see 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides? Step 4 Run the following command to switch to the ossuser user: $ su - ossuser Password: password for the ossuser user Step 5 Run the following commands to change the owner and permission of the hacker language dictionary file: $ cp /home/sopuser/hacker language dictionary file/home/ossuser/hacker language dictionary file $ chown ossuser:ossgroup hacker language dictionary file $ chmod 600 hacker language dictionary file Step 6 Run the following command to go to the target directory: $ cd /opt/oss/NetEco/apps/SMLogLicService/bin Step 7 Run the following command to update the hacker language dictionary: $ ./updateComplexDic.sh -file /home/ossuser/hacker language dictionary file ● If the following information is displayed, the hacker language dictionary is successfully updated: Successfully updated 1 lines of complex dictionary data. ● Otherwise, the hacker language dictionary fails to be updated. Check whether the hacker language dictionary meets requirements. If it does not, modify the language dictionary and try again. If it does, contact Huawei technical support to troubleshoot the update failure. Step 8 Run the following command to switch to the sopuser user: Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 137 iManager NetEco Administrator Guide 1 NetEco Administrator Guide $ exit Step 9 Run the following command to delete files in the /home/sopuser directory: $ cd /home/sopuser $ rm -rf hacker language dictionary file ----End 1.16 Managing Certificates 1.16.1 Certificate Overview Huawei SSL certificates are preconfigured during the PowerEcho and the NetEco installation. You are advised to replace the preconfigured certificates with new ones after the PowerEcho or the NetEco is installed for the first time and periodically update the certificates, which can prevent system security risks caused by expired certificates and increase communication security of the PowerEcho or the NetEco. Certificate Principles and Functions The SSL certificate is a digital certificate based on the SSL protocol. It is similar to the electronic copy of a driving license or passport and is used for identity authentication between the client and the server. After the SSL encryption mechanism is used, an encrypted communication channel is established between the client and the server, which can ensure security and efficiency. Hyper Text Transfer Protocol over Secure Socket Layer (HTTPS), a secure variant of HTTP, is used for the internal communication of nodes or services of the PowerEcho and the NetEco, communication between the PowerEcho or the NetEco and browsers or other systems. The SSL protocol is the security foundation of HTTPS. An SSL certificate provides the following functions: ● Data confidentiality: Both parties obtain encrypted private keys after negotiating using a handshake protocol and transfer encrypted messages. A single key encryption algorithm is used, such as Advanced Encryption Standard (AES). ● Identity authentication: A public key encryption algorithm, such as Digital Signature Standard (DSS), is used to add signatures to all the involved communication parties. ● Data integrity: All messages transmitted during communication contain digital signatures to ensure the message integrity. Digital signatures include the message digest and message authentication code (MAC) generated by the hash algorithm, such as secure hash algorithm (SHA). Certificate Usage Scenarios SSL certificates of the PowerEcho including ER certificates, CA certificates, and IR certificates are used by the PowerEcho in different scenarios. Table 1-55 shows functions of the certificates. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 138 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-55 Certificate usage scenarios Certificate Type Scenario ER certificate The browser uses the ER certificate to perform authentication on the PowerEcho or the NetEco. IR certificate The IR certificates are used for authentication during internal communication of the system. CA certificate Certificate for issuing IR certificates of the PowerEcho and the NetEco. Certificate Update Methods The methods for updating certificates of the PowerEcho and applicable scenarios are as follows: ● Update online: If the PowerEcho is interconnected with a certificate authority (CA), you are advised to update certificates online on the web client, so that you do not need to manually obtain and upload new certificates and the operations are simple. ● Upload and update: If you have obtained a new certificate, you are advised to manually upload it on the web client to update the certificate. ● Update in CLI mode: If you cannot log in to the PowerEcho web client due to expiration of some certificates, you can only log in to the management node and run commands to update the certificates. IR certificates are used for mutual authentication during internal communication and can be updated only in CLI mode. The IR certificates are authenticated by the CA certificate. The IR certificates are updated when the CA certificate is updated. 1.16.2 Certificate List Certificates are required in some scenarios of the NetEco, so that SSL can be used to improve the security of internal and external communication. When an SSL certificate expires or a specific certificate is required, replace the certificate. Table 1-56 lists the certificates used by the NetEco. Table 1-56 Certificate list Portal Service Certificate Purpose Operation PowerE cho UniEPMgr ER certificate Certificate for one-way authentication during login to the PowerEcho through a browser. 1.16.3 Uploading and Updating ER Certificates Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 139 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Portal Service Certificate Purpose Operation NetEco UniEPMgr ER certificate Certificate for one-way authentication during login to the NetEco through a browser. 1.16.3 Uploading and Updating ER Certificates PowerE cho UniEPMgr CA certificate Certificate for internal communication of the system. 1.16.4 Uploading and Updating CA Certificates PowerE cho UniEPMgr IR certificate Certificate for bidirectional authentication for internal communication of system. 1.16.5 Updating IR Certificates PowerE cho UniEPMgr Syslog server trust certificate Certificate for the PowerEcho to verify the identity of the Syslog server to ensure communication security. 1.16.6 Uploading and Updating the Trust Certificate of the Syslog Server (the PowerEcho) NetEco SMLogLic User management certificate Certificate used to sign a token to ensure token security through internal user authentication. 1.16.7 Updating the Certificate of User Management PowerE cho UniEPMgr CAS SSO client trust certificate Trust certificate on the client, which needs to be updated together with the corresponding CRL after their equivalents on the server are updated. 1.16.10 Updating the CAS SSO Client Trust Certificate NetEco SMLogLic LDAP certificate Certificate used to ensure data security during the communication between the NetEco and the LDAP server. 1.16.9 Updating the Certificate of LDAP NetEco Basic SSO certificate Certificate used to ensure that users can log in to the system in SSO mode. 1.16.12 Managing CAS SSO Certificates NetEco HomePage Notice Mailbox server SSL/TLS certificate Certificate used for two-way authentication between the system and mail server. The system and mail server can communicate with each other only after both of them trust the certificate. 1.16.11 Updating Mail Server Certificate for Notifications 1.16.3 Uploading and Updating ER Certificates When you log in to the PowerEcho or the NetEco using a browser, the browser uses the ER certificate to perform authentication on the PowerEcho or the NetEco. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 140 iManager NetEco Administrator Guide 1 NetEco Administrator Guide A Huawei ER certificate has been preconfigured when the PowerEcho or the NetEco is installed. The certificate is used only for commissioning. You need to replace the preconfigured certificate with a new ER certificate to improve communication security of the PowerEcho or the NetEco. To prevent security risks caused by expired certificates, you are advised to periodically update certificates. Prerequisites ● You have obtained new trust certificate in .cer or .p12 format and corresponding certificate files. The format and name of the certificate and private key files must be consistent with the following, and only lowercase letters are allowed in the file name: – If the identity certificate is in .cer format, obtain the following certificate files and private key password: server.cer: identity certificate file server_key.pem: private key to the identity certificate The private key of the identity certificate must be encrypted. If the certificate is uploaded in plaintext, the certificate replacement fails. trust.cer: trust certificate file If a trust certificate contains CA certificates of multiple levels, the trust certificate must contain the content of each CA certificate in the sequence of sub-CA and root CA certificates. Otherwise, the certificate replacement fails. – If the identity certificate is in .p12 format, obtain the following certificate files, store password for the certificate, private key password: server.p12: identity certificate file trust.cer: trust certificate file If a trust certificate contains CA certificates of multiple levels, the trust certificate must contain the content of each CA certificate in the sequence of sub-CA and root CA certificates. Otherwise, the certificate replacement fails. NOTE The complexity requirements for the store password for the certificate and the private key password are as follows: ● Issue Draft B (2020-11-30) ● Contain 10 to 32 characters. ● Be a combination of the following four types of characters: ● Uppercase letters ● Lowercase letters ● Digits ● Special characters !"#$%&'()*+,-./:;<=>?@[]^`{_|}~ ● Not contain double quotation marks (") and single quotation marks (') at the same time. ● Contain less than three consecutive identical characters. ● Contain less than four identical characters. ● Be different from the old password for the certificate. You have obtained the password for the old ER certificate. The password contains 6 to 64 characters. Copyright © Huawei Technologies Co., Ltd. 141 iManager NetEco Administrator Guide 1 NetEco Administrator Guide If you need to use the default password during certificate replacement, contact Huawei technical support. ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● Table 1-57 lists the certificate application requirements. Context Table 1-57 Certificate requirements Issue Draft B (2020-11-30) Item Requirements Certificate signature algorithm Use industry-leading security algorithms, such as sha256WithRSAEncryption. Length of the public and private keys For the RSA encryption algorithms, the recommended length is 3072 bits or longer. Certificate validity period Set this parameter based on the customer's IT security management requirements. Extended certificate attributes The X509v3 Subject Alternative Name attribute is mandatory. The value is an IP address or a domain name. If an IP address is used to log in the PowerEcho or the NetEco client, set the value to the IP address. If a floating IP address is used, set the value to the floating IP address. If a domain name is used for access, the value is the domain name. Copyright © Huawei Technologies Co., Ltd. 142 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Item Requirements Certificate storage format NOTE ● The certificate in .cer format must be encoded using Base64. The file name extension can be .cer, .pem, or .crt. ● The trust certificate (trust.cer) contains the trusted root certificate and intermediate CA certificate. The root certificate must be placed at the beginning. ● If the identity certificate is in .cer format, obtain the following certificate files and password for the private key of the identity certificate file: The format and name of the certificate and private key files must be consistent with the following, and only lowercase letters are allowed in the file name. server.cer: identity certificate file server_key.pem: private key of the identity certificate trust.cer: trust certificate file ● If the identity certificate is in .p12 format, obtain the following certificate files and password for the private key of the identity certificate file. The format and name of the certificate and private key files must be consistent with the following, and only lowercase letters are allowed in the file name. server.p12: identity certificate file trust.cer: trust certificate file Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 143 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Item Requirements Password complexity of the private key file ● Contain 10 to 32 characters. ● Be a combination of the following four types of characters: – Uppercase letters – Lowercase letters – Digits – Special characters !"#$%&'()* +,-./:;<=>?@[]^`{_|}~ ● Not contain double quotation marks (") and single quotation marks (') at the same time. ● Contain less than three consecutive identical characters. ● Contain less than four identical characters. ● Be different from the password for the old certificate. ● To prevent the initial password for the new ER certificate from being tampered with, you are advised to change the initial password for the new ER certificate. The new ER certificate password must meet the following password complexity requirements: – Contain 10 to 32 characters. – Be a combination of the following four types of characters: ▪ ▪ ▪ ▪ ● ● Lowercase letters Digits Special characters !"#$%&'()*+,-./:;<=>?@[]^`{_|}~ – Not contain double quotation marks (") and single quotation marks (') at the same time. – Contain less than three consecutive identical characters. – Contain less than four identical characters. – Be different from the old password of the new certificate. The path for storing the ER certificate is as follows: – On the management node, the certificate is stored in the /opt/oss/ manager/etc/ssl/er directory. – On the product nodes, the certificate is stored in the /opt/oss/ NetEco/etc/ssl/er directory. The files related to the ER certificate are as follows: – Issue Draft B (2020-11-30) Uppercase letters cert_pwd: file that stores the encrypted password for the identity certificate Copyright © Huawei Technologies Co., Ltd. 144 iManager NetEco Administrator Guide 1 NetEco Administrator Guide – manifest.json: certificate configuration file – server.cer: identity certificate file – server_chain.cer: certificate chain file – server.p12: identity certificate file in .p12 format – server_key.pem: private key to the identity certificate file – trust.cer: trust certificate file – trust.jks: trust certificate file in .jks format If the identity certificate is in .cer format, the PowerEcho automatically generates the manifest.json, server.p12, and trust.jks files when the ER certificate is updated. If the identity certificate is in .p12 format, the PowerEcho automatically generates the manifest.json, server.cer, and trust.jks files. Precautions ● If the private key of a certificate is disclosed, you can update the certificate revocation list (CRL) when updating the certificate to prevent unauthorized operations. This improves system security. ● During the ER certificate update of the PowerEcho, the ER service of the PowerEcho is automatically for the update to take effect and you cannot operate in the PowerEcho during the restart. You are advised to refresh the page after about 3 minutes and log in again. ● During the ER certificate update of the NetEco, the ER service of the NetEco is automatically for the update to take effect. Procedure Step 1 On the PowerEcho, choose System > Certificate and Key > Update ER Certificate from the main menu. Step 2 On the Update ER Certificate page, perform operations as prompted. Step 3 Back up the PowerEcho and product. This is because after the update is successful, all historical backup data has become invalid. For details, see 1.11.6 Backing Up the PowerEcho and 1.11.5 Backing Up Products. ----End 1.16.4 Uploading and Updating CA Certificates After you have applied for and obtained a new CA certificate, you can update the CA certificate generated during the installation by uploading the new CA certificate. To prevent security risks caused by expired certificates, you are advised to periodically update certificates.the PowerEcho and the NetEco Prerequisites Issue Draft B (2020-11-30) ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● You have obtained the password for the ossadm user of the management node. Copyright © Huawei Technologies Co., Ltd. 145 iManager NetEco Administrator Guide ● 1 NetEco Administrator Guide You have obtained the following certificate files and the password for the private key file ca_key.pem: – ca.cer: identity certificate file of the root certificate – ca_key.pem: private key of the identity certificate file of the root certificate The password for the CA certificate private key must meet the following requirements: – Contain 10 to 32 characters. – Be a combination of the following four types of characters: ▪ Uppercase letters ▪ Lowercase letters ▪ Digits ▪ Special characters !"#$%&'()*+,-./:;<=>?@[]^`{_|}~ – Not contain double quotation marks (") and single quotation marks (') at the same time. – Contain less than three consecutive identical characters. – Contain less than four identical characters. Context ● Table 1-58 lists the certificate application requirements. Table 1-58 Certificate requirements Item Requirements Certificate signature algorithm Use industry-leading security algorithms, such as sha256WithRSAEncryption. Length of the public and private keys For the RSA encryption algorithms, the recommended length is 3072 bits or longer. Certificate validity period Set this parameter based on the customer's IT security management requirements. Extended certificate attributes The X509v3 Basic Constraints attribute is mandatory and its value is CA:TRUE. Certificate storage format NOTE The certificate in .cer format must be encoded using Base64. The file name extension can be .cer, .pem, or .crt. ● ca.cer: identity certificate file of the root certificate ● ca_key.pem: private key of the identity certificate file of the root certificate Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 146 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Item Requirements Password complexity of the private key file ● Contain 10 to 32 characters. ● Be a combination of the following four types of characters: – Uppercase letters – Lowercase letters – Digits – Special characters !"#$%&'()* +,-./:;<=>?@[]^`{_|}~ ● Not contain double quotation marks (") and single quotation marks (') at the same time. ● Contain less than three consecutive identical characters. ● Contain less than four identical characters. ● CA certificates are stored in the /opt/oss/manager/var/ca directory on the management node. ● The CA certificate contains the following files: – ca.cer: identity certificate file of the root certificate – ca_key.pem: private key of the identity certificate of the root certificate – manifest.json: certificate configuration file – server.conf: certificate configuration file When the CA certificate is updated, the manifest.json file is automatically generated. Precautions ● IR certificates are authenticated by the CA certificate of the management node. After the CA certificate is updated, the IR certificates are reauthenticated, that is, the IR certificates of all nodes are automatically updated when the CA certificate is updated. ● When the CA certificate is updated, the system automatically backs up the CA certificate and IR certificates to the /tmp/cert/CA and /tmp/cert/internal directories respectively on the management node. After the update is successful, the backup certificates are automatically deleted. ● During the CA certificate update, all services on the nodes of the PowerEcho and the NetEco are automatically restarted for the update to take effect, and you cannot log in to the PowerEcho and the NetEco during the restart. You are advised to perform this operation in off-peak hours. Procedure Step 1 On the PowerEcho, choose System > Certificate and Key > Update CA Certificate from the main menu. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 147 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 2 On the Update CA Certificate page, configure the parameters based on Table 1-59 and click Update. Table 1-59 Parameter description Parameter Description Scenario Select Local. OS username Retain the default value ossadm. OS user password Enter the password for the OS user ossadm. CA certificate Select the certificate file ca.cer you have obtained. CA certificate private key Select the private key file ca_key.pem you have obtained. Private key password Enter the password for the private key file ca_key.pem you have obtained. Step 3 Check the task execution result. 1. Log in to the PowerEcho. If the login fails, the CA certificate fails to be updated. Restore the CA certificate by referring to 1.24.10 Restoring the CA Certificates That Failed to Be Updated, and then contact Huawei technical support engineers. NOTE All services are updated during the CA certificate update. You cannot log in to the PowerEcho during the restart of the PowerEcho service. 2. On the PowerEcho, choose System > Task List from the main menu. 3. On the Task List page, check the execution result of the task for updating the CA certificate. – If the task details indicate that the CA certificate is updated successfully, go to Step 4. – If the task details indicate that the IR certificates fail to be updated, restored the IR certificates of the failed nodes by referring to 1.24.11 Updating IR Certificates on the Product Nodes Failed When CA Certificates Are Being Updated. Then, go to Step 4. Step 4 Back up the application and data of the PowerEcho, database applications, product applications, and product data. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho and 1.11.5 Backing Up Products. ----End 1.16.5 Updating IR Certificates IR certificates are certificates in the trust domain which are used for two-way authentication during internal communication. The IR certificates are dynamically Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 148 iManager NetEco Administrator Guide 1 NetEco Administrator Guide generated by the CA certificate when the PowerEcho and the NetEco are installed, and you can update the IR certificates generated during the installation. To prevent security risks caused by expired certificates, you are advised to periodically update certificates. Prerequisites You have obtained the password for the ossadm user on the management node. Context ● On the management node, the IR certificates are stored in the /opt/oss/ manager/etc/ssl/internal directory. ● On the product nodes, the IR certificates are stored in the /opt/oss/SOP/etc/ssl/internal directory. ● The files related to the IR certificate are as follows: – cert_pwd: file that stores the encrypted password for the identity certificate – manifest.json: certificate configuration file – server.cer: identity certificate – server_key_crypto.pem: private key to the identity certificate – server.p12: identity certificate in .p12 format – server_key.pem: private key to the identity certificate file – trust.cer: trust certificate – trust.jks: trust certificate in .jks format Precautions ● When IR certificates are updated, the IR certificates of all nodes where the PowerEcho and the NetEco reside are also updated. ● During the IR certificate update, the system automatically backs up the old IR certificates to the /opt/oss/manager/var/tmp/internal_random code directory on the management node, for example, /opt/oss/ manager/var/tmp/internal_101011111. After the certificate is updated, the directory is automatically deleted. ● Services on all nodes where the PowerEcho and the NetEco reside are automatically restarted so that the certificates can take effect after the update. You are advised to perform this operation in off-peak hours. Procedure Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. NOTE ● If the PowerEcho is deployed in cluster mode, perform operations on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? ● It takes a long time to update the IR certificate, so PuTTY may be disconnected due to timeout. Configure PuTTY to prevent it from being disconnected. For details, see 1.23.19 How Do I Prevent PuTTY from Being Disconnected upon Timeout? Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 149 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to update the IR certificates: > cd /opt/oss/manager/apps/UniEPService/tools/common > bash updatecertificate.sh -certtype internal The following information is displayed: Replacing the certificate will interrupt services. Are you sure you want to continue? (y/n) Step 4 Enter y and press Enter. The system automatically stops the services, updates the IR certificates of all the nodes, and then starts the services. ● If the following information is displayed, the IR certificates are updated successfully. Go to Step 5. Certificates replaced successfully. ● If other information is displayed, the IR certificates fail to be updated. Restore the IR certificates, and then contact Huawei technical support. Step 5 Back up the PowerEcho and product. This is because after the update is successful, all historical backup data has become invalid. For details, see 1.11.6 Backing Up the PowerEcho and 1.11.5 Backing Up Products. ----End 1.16.6 Uploading and Updating the Trust Certificate of the Syslog Server (the PowerEcho) If logs of the PowerEcho are forward over TLS, certificate authentication is required for the secure communication between the PowerEcho and the Syslog server. If the trust certificate of the PowerEcho is about or expire or the Syslog server trusts a new trust certificate, you can upload and update the trust certificate of the Syslog server to ensure normal communication between the PowerEcho and the Syslog server. To prevent security risks caused by expired certificates, you are advised to periodically update certificates. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● You have obtained the trust certificate in .cer or .p12 format issued by the CA and corresponding certificate files. The format and name of the certificate and private key files must be consistent with the following. Only lowercase letters are allowed in the file name. The CA must be a CA trusted by the Syslog server or a subordinate CA of the trusted CA. – If the identity certificate is in .cer format, obtain the following certificate files and password for the private key to the identity certificate file: server.cer: identity certificate file Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 150 iManager NetEco Administrator Guide 1 NetEco Administrator Guide server_key.pem: private key to the identity certificate file trust.cer: trust certificate file – If the identity certificate is in .p12 format, obtain the following certificate files, password and store password for the private key to the identity certificate file: server.p12: identity certificate file trust.jks: trust certificate file Context Table 1-60 lists the certificate application requirements. Table 1-60 Certificate requirements Issue Draft B (2020-11-30) Item Requirements Certificate signature algorithm Use industry-leading security algorithms, such as sha256WithRSAEncryption. Length of the public and private keys For the RSA encryption algorithms, the recommended length is 3072 bits or longer. Certificate validity period Set this parameter based on the customer's IT security management requirements. Copyright © Huawei Technologies Co., Ltd. 151 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Item Requirements Certificate storage format NOTE ● The certificate in .cer format must be encoded using Base64. The file name extension can be .cer, .pem, or .crt. ● The trust certificate (trust.cer) contains the trusted root certificate and intermediate CA certificate. The root certificate must be placed at the beginning. ● If the identity certificate is in .cer format, obtain the following certificate files and password for the private key of the identity certificate file: The format and name of the certificate and private key files must be consistent with the following, and only lowercase letters are allowed in the file name. server.cer: identity certificate file server_key.pem: private key of the identity certificate. The private key must be encrypted using the AES-128-CBC algorithm. If the private key is not encrypted, encrypt it by referring to 1.24.4 Encrypting the Private Key of the Signature Certificate (the PowerEcho). trust.cer: trust certificate file ● If the identity certificate is in .p12 format, obtain the following certificate files and password for the private key of the identity certificate file. The format and name of the certificate and private key files must be consistent with the following, and only lowercase letters are allowed in the file name. server.p12: identity certificate file trust.jks: trust certificate file Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 152 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Item Requirements Password complexity of the private key file ● Contain 10 to 32 characters. ● Be a combination of the following four types of characters: – Uppercase letters – Lowercase letters – Digits – Special characters !"#$%&'()*+,-./:;<=>? @[]^`{_|}~ ● Not contain double quotation marks (") and single quotation marks (') at the same time. ● Contain less than three consecutive identical characters. ● Contain less than four identical characters. Precautions During the certificate update, services are automatically restarted for the update to take effect and you cannot log in to the PowerEcho during the restart. You are advised to perform this operation in off-peak hours. Procedure Step 1 On the PowerEcho, choose System > Certificate and Key > Update Syslog Certificate from the main menu. Step 2 On the Update Syslog Certificate page, perform operations as prompted. Step 3 If the Syslog server uses an insecure encryption algorithm, perform the following operations: 1. Use PuTTY to log in to the management node as the sopuser user in SSH mode. NOTE If the PowerEcho is deployed in cluster mode, log in to Management0 and then Management1 to perform operations. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? 2. Run the following command to switch to the ossadm user: $ su - ossadm Password: password for the ossadm user 3. Issue Draft B (2020-11-30) Run the following commands to modify the configuration file ssl.client.properties. Skip this step if the Syslog server uses a secure encryption algorithm. Copyright © Huawei Technologies Co., Ltd. 153 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTICE For security purposes, you are advised to use the Syslog server with a secure encryption algorithm and use secure protocols for data transfer. $ cd /opt/share/oss/manager/MCCommonService/etc $ vi ssl.client.properties Change ssl.protocols=TLSv1.2 to ssl.protocols=TLSv1.1, and add the insecure encryption algorithms, for example, TLS_RSA_WITH_AES_256_CBC_SHA256, to ssl.ciphers. The file content is as follows: ssl.protocols=TLSv1.1 ssl.ciphers=TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_ SHA,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TL S_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RS A_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_C BC_SHA256 After the modification, press Esc and run the :wq! command to save the file and exit the vi editor. 4. If the Syslog server uses SSLv3, create the sm.java.property file to enable SSLv3. Skip this step if SSLv3 is not used. NOTE For security purposes, you are advised to use the Syslog server that supports TLSv1.1 or later for data transfer. Create an sm.java.property file on the local PC. jdk.tls.disabledAlgorithms=RC4, DES, MD5withRSA, DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL Refer to Step 3.3 to change ssl.protocols=TLSv1.2 in the ssl.client.properties file to ssl.protocols=SSLv3. Use FileZilla to upload the modified sm.java.property file to the /opt/ share/oss/manager/MCCommonService/etc directory, as the ossadm user. Use PuTTY to set the file permission, as the ossadm user: chmod 600 /opt/share/oss/manager/MCCommonService/etc/ sm.java.property 5. Run the following commands to restart the log forwarding service: $ cd /opt/oss/manager/agent/bin $ . engr_profile.sh $ ipmc_adm -cmd restartapp -tenant manager -app MCCommonService If success is displayed for all command outputs, the log forwarding service has been restarted. Otherwise, contact Huawei technical support. ----End 1.16.7 Updating the Certificate of User Management When you log in to the PowerEcho web client, the PowerEcho use the user management certificates to verify your identity. Huawei certificates have been preconfigured when the PowerEcho is installed. The certificates are used only for commissioning. You need to replace the certificates with new ones to improve the Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 154 iManager NetEco Administrator Guide 1 NetEco Administrator Guide security of the PowerEcho. To prevent security risks caused by expired certificates, you are advised to periodically update certificates. Prerequisites ● You have obtained the passwords of the following certificate files and identity certificate private keys. The format and name of the certificate and private key files must be consistent with the following, and only lowercase letters are allowed in the file name. – signing_cert.pem: identity certificate of user management – ca.pem: trust certificate of user management – signing_key.pem: private key of the identity certificate of user management. The private key must be encrypted using the AES-128-CBC algorithm. If the private key is not encrypted, encrypt it by referring to 1.24.4 Encrypting the Private Key of the Signature Certificate (the PowerEcho). ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● It is recommended that the storage password or password for the private key of the identity certificate meets the following requirements: Context – Contain 10 to 32 characters. – Be a combination of the following four types of characters: ▪ ▪ ▪ ▪ ● Uppercase letters Lowercase letters Digits Special characters !"#$%&'()*+,-./:;<=>?@[]^`{_|}~ – Not contain double quotation marks (") and single quotation marks (') at the same time. – Contain less than three consecutive identical characters. – Contain less than four identical characters. – Be different from the password for the old certificate. The user management certificates are stored in the /opt/share/oss/manager/ MCCommonService/etc/certificate directory on the management node. Precautions Services are automatically restarted so that the certificate can take effect after the update, and you cannot log in to the PowerEcho during the restart. You are advised to perform this operation in off-peak hours. Procedure Step 1 On the PowerEcho, choose System > Certificate and Key > Update User Management Certificate from the main menu. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 155 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 2 On the Update User Management Certificate page, perform operations as prompted. Step 3 Back up the PowerEcho and product. This is because after the update is successful, all historical backup files have become invalid. For details, see 1.11.6 Backing Up the PowerEcho and 1.11.5 Backing Up Products. ----End 1.16.8 Updating Certificate Revocation Lists If the private key of a certificate is disclosed, you need to update the CRL in a timely manner to prevent unauthorized operations. For security purposes, you need to update the CRL periodically. If you have obtained the CRL file, you can upload it to update the CRL. Prerequisites ● You have obtained the latest CRL file crl.pem. ● You have uploaded new certificate files to update the certificate (ER certificate or Syslog certificate), and have uploaded the CRL corresponding to the certificate with disclosed private key. For details about how to update the certificate, see the corresponding certificate update section. ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● Only CRLs of ER certificates and Syslog certificates can be updated. ● During CRL update, all services on the nodes of the PowerEcho and the NetEco are automatically restarted for the update to take effect. You cannot log in to the PowerEcho and the NetEco during the restart. You are advised to perform this operation in off-peak hours. Precautions Procedure Step 1 On the PowerEcho, choose System > Certificate and Key > Update Certificate Revocation List from the main menu. Step 2 On the Update Certificate Revocation List page, perform operations as prompted. ----End 1.16.9 Updating the Certificate of LDAP The LDAP certificate is used to guarantee data security during communication. To improve data security and prevent certificate expiration, you are advised to update this certificate periodically, for example, every three months. Prerequisites You have logged in to NetEco as the system administrator. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 156 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Precautions ● When configuring LDAP authentication, you are advised to use a secure connection such as TLS to ensure security of communication data. If Enable TLS is selected, you need to configure the LDAP certificates. ● For data security during communication, you are advised to use TLS v1.2 or later. Procedure Step 1 Choose Security > System Secutiry > Security Settings. Step 2 In the navigation pane, choose Remote Authentication Configuration. Step 3 On the Remote Authentication Configuration page, click LDAP Authentication. Step 4 Click Enable TLS, and select the required protocol version and certificate type. Step 5 Upload the certificate based on the value of Certificate type you set. ● If Certificate type is set to JKS,P12, upload the corresponding root certificate and identity certificate, and enter their passwords respectively. ● If Certificate type is set to CER,DER,PEM,PVK, upload the corresponding root certificate and identity certificate. NOTE ● If the CA has issued a CRL, you are advised to upload the CRL in a timely manner to ensure secure interconnection with the LDAP server. ● If Enable TLS is selected and Certificate type is set to JKS,P12, obtain the following certificates: – Root certificate (trust certificate with the .jks file name extension) and password of the LDAP server – Identity certificate (with the .p12 file name extension) and password of NetEco, if two-way authentication is enabled on the LDAP server ● If Enable TLS is selected and Certificate type is set to CER,DER,PEM,PVK, obtain the following certificates: – Root certificate (that is, the trust certificate with the name extension .cer, .der, or .pem) of the third-party LDAP server – Identity certificate (with the .cer, .der, or .pem file name extension) and password of NetEco, if two-way authentication is enabled on the LDAP server – Private key file and password of the LDAP server if two-way authentication is enabled on the LDAP server Step 6 Click Test. In the Test Connection dialog box, enter User name and Password of the remote user on the LDAP server. ● If "Test successful." is displayed, interconnection between the system server and LDAP server is successful. ● If the connection test fails, a failure message is displayed. Check whether the LDAP server is correctly configured and try again until the interconnection is successful. Step 7 Click Apply for the LDAP authentication settings to take effect. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 157 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.16.10 Updating the CAS SSO Client Trust Certificate When configuring the CAS SSO client, you need to upload the trust certificate of the SSO server to the SSO client. Otherwise, users cannot log in to the system. For security purposes and to prevent security risks caused by certificate expiration, you need to update the certificate periodically. Prerequisites ● You have obtained the CAS SSO server trust certificate. Table 1-61 lists the certificate requirements. ● You have logged in to the PowerEcho as the admin user. For details, see 1.1.2 Logging In to the PowerEcho. Context Table 1-61 lists the requirements for the obtained certificates. Table 1-61 Certificate requirements Item Requirements Certificate signature algorithm Use industry-leading security algorithms, such as sha256WithRSAEncryption. Length of the public and private keys For the RSA encryption algorithms, the recommended length is 3072 bits or longer. Certificate validity period Set this parameter based on the customer's IT security management requirements. Certificate storage format NOTE The certificate in CER format must be encoded using Base64. trust.cer: trust certificate of the SSO server. Precautions When the CAS SSO client trust certificate is updated, the service of the PowerEcho is automatically restarted for the update to take effect. You cannot log in to the PowerEcho during the restart. You are advised to perform this operation in offpeak hours. Procedure Step 1 On the PowerEcho, choose System > Certificate and Key > Update SSO Client Trust Certificate from the main menu. Step 2 On the Update SSO Client Trust Certificate page, perform operations as prompted. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 158 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.16.11 Updating Mail Server Certificate for Notifications The notifications feature provides the function of sending notifications by emails. When O&M personnel needs to be notified by emails, you need to set email notification parameters and verify the settings to ensure that the emails can be sent properly. Prerequisites ● You have logged in to the NetEco as a user which has the Email Server Settings permission. ● The interconnected mail server supports Simple Mail Transfer Protocol (SMTP). ● You have obtained the server information from the SMTP server administrator, such as the domain name or IP address, port number, whether identity authentication is required, username, and user password. ● The physical IP addresses of all nodes where the notifications service (HomePageNoticeService) is deployed are routable to the mail server. ● The SMTP port is available. – In common connection mode, port 25 is used. – In TLS connection mode, port 587 is used. – In SSL connection mode, port 465 is used. ● The node where notifications service resides can access the mail server. ● For data transmission security purpose, use TLSv1.2 by default when configuring the mail server. ● To send notifications to relevant personnel, you need to enter their personal information, such as mobile numbers and email addresses. You are obligated to take considerable measures, in compliance with the laws of the countries concerned and the user privacy policies of your company, to ensure that users' personal data is fully protected. ● For security purposes, personal data such as mobile numbers and email addresses are anonymized on the GUI and encrypted during transmission. Context Procedure Step 1 Choose System > System Settings > Notifications. Step 2 In the navigation pane, choose Email Server Settings and set the SMTP server domain name or IP address, email address for sending notifications, code, and port number. For details about the parameters, see Table 1-62. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 159 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-62 Email parameters Issue Draft B (2020-11-30) Parameter Description Example SMTP server domain name/IP address Domain name or IP address of the SMTP server. 10.1.1.1 Sender email address Sender email address displayed when email notifications are sent. The email address must be complete and registered on the interconnected SMTPbased mail server. Otherwise, the email fails to be sent. Recipients can view the email address when receiving the email. You are not advised to use a private email address to send notifications. s@example.com Charset Encoding format of the email server. The default value is UTF-8. UTF-8 Copyright © Huawei Technologies Co., Ltd. 160 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter Description Example Enable secure connection over SMTP (Applies when an email server certificate for SMTP server is already installed. TLS is recommended.) ● When secure connections are required, if TLS is selected, the default server port is 587 and the default protocol version is TLSv1.2. If SSL is selected, the default server port is 465 and the default protocol version is SSLv3. SSLv3 is an insecure protocol. You are advised to use the default TLS for secure connection. To ensure that emails are sent successfully, check that the email server port is available and the configuration certificate is valid. TLS ● When secure connections are not required, the default SMTP port is 25. To ensure that emails are sent successfully, check that the email server port is available. Server port Issue Draft B (2020-11-30) Port on the SMTP server. Copyright © Huawei Technologies Co., Ltd. 25 161 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter Description Example Require identity authentication for the SMTP server Whether the SMTP email server authenticates the user identity before sending an email, which needs to be obtained from the mail server administrator. If the SMTP server requires user identity verification, obtain the username and password from the administrator. - NOTE Select the check box only if the SMTP mail server requires identity verification. If the SMTP mail server does not require identity verification, clear the Requires identity authentication for the SMTP server check box. Otherwise, the email fails to be sent. User name Name of the user for logging in to the SMTP server. This username must be the same as that of Sender email address. test123 NOTE This parameter is mandatory if Requires identity authentication for the SMTP server is selected. Private usernames are not recommended. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 162 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter Description Example Password If no authorization code is available for logging in to the SMTP email server, set this parameter to the password of Sender email address. Otherwise, set this parameter to the authorization code for logging in to the SMTP email server. - NOTE This parameter is mandatory if Requires identity authentication for the SMTP server is selected. Customized email subject You can add a prefix or suffix to the email subject as required. By default, this parameter is left blank. - Customized email signature You can add a signature to the email as required. By default, this parameter is left blank. - Enabled By default, Yes is selected. If No is selected, the configuration cannot be used and emails cannot be sent. Yes Step 3 (Optional) If Enable secure connection over SMTP (Applies when an email server certificate for SMTP server is already installed. TLS is recommended.) is selected, select TLS or SSL, and configure a certificate and CRL. For data security purposes, TLS is recommended. ● Configuring certificates a. Issue Draft B (2020-11-30) Obtain a mail server SSL/TLS certificate and save it to your local PC. Copyright © Huawei Technologies Co., Ltd. 163 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE ▪ ▪ ▪ For details about how to obtain a mailbox server certificate, see FAQ. The certificate is used for two-way authentication between the system and the mail server. The system and the mail server communicate with each other only if both trust the certificate. For security purposes, the notifications feature supports the email server certificate generated using the following signature algorithms by default: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 and TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. b. Press win+R to open the Run dialog box. Enter CMD and click OK. c. Run the following command to go to the keytool directory: cd /d Keytool directory NOTE ▪ ▪ d. Keytool is stored in JDK installation directory\bin. Keytool is a Java runtime environment (JRE) command. Make sure that the JRE has been installed on your local PC. In the command window that is displayed, run the following command to convert the certificate format and encrypt the keystore: keytool -import -file path for saving the original certificate\name of the original certificate -keystore path for saving the converted certificate \name of the converted certificate Enter keystore Password: Reenter New Password: After the conversion, the name extension of the certificate must be keystore. Record the password to be used for importing the certificate. NOTE The user-defined keystore password must contain 6 to 32 characters. For security purposes, the password must meet the following requirements: ▪ ▪ ▪ ● Contains at least one uppercase letter, one lowercase letter, and one digit. Contains at least one special character (!"# $%&'()*+,-./:;<=>?@[\]^`{_|}~ and spaces). e. Click Configure Certificate. f. In the Configure Certificate dialog box, click and select a converted certificate. g. Set Certificate password to the keystore password set in 4. h. Click Save. next to Certificate file Configure a CRL. a. Issue Draft B (2020-11-30) Cannot be the username or the username spelled backwards. Obtain the latest CRL from the certificate authority (CA) and save the CRL to your local PC. Copyright © Huawei Technologies Co., Ltd. 164 iManager NetEco Administrator Guide 1 NetEco Administrator Guide b. Click Configure CRL. c. In the Configure CRL dialog box, click CRL. d. Click Save. next to CRL file and select a Step 4 Click Test to check whether the system is properly interconnected with the mail server. ● If "Test succeeded" is displayed, they are properly connected. The received emails are in English. ● If the test fails, rectify the fault based on the error information. Step 5 Click Apply. In the Warning dialog box, click OK. NOTE If you click only Test, the interconnection status between the system and the mail server can be tested and the entered parameter values cannot be stored in the database. Only after you click Apply, all entered parameter values can be stored in the database. ----End Follow-up Procedure After interconnecting with the SMTP server, the system sends notifications in the form of emails to relevant personnel through the SMTP server. 1.16.12 Managing CAS SSO Certificates SSO is an access control mechanism used for multiple associated but independent software systems. By configuring CAS SSO, you can log in once using your username and password and gains access to all NetEco systems, instead of entering the username and password at each login. 1.16.12.1 Obtaining the CAS SSO Trust Certificate Before configuring information on CAS SSO clients, obtain the trust certificate of the CAS SSO server and import it to the CAS SSO client. Otherwise, logins will fail. Prerequisites You have obtained the passwords for the sopuser and ossuser users for logging in to the node where Basic resides. Procedure Step 1 Use PuTTY to log in to the node where Basic resides, as the sopuser user in SSH mode. For details about how to obtain the IP address of the node where a service resides, see 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides? Step 2 Run the following command to switch to the ossuser user: $ su - ossuser Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 165 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Password: password for the ossuser user Step 3 Run the following commands to check whether the origintrust.cer certificate file exists and copy the trust certificate: $ cd /opt/oss/NetEco/etc/ssl/er/ $ ll ● If the origintrust.cer file exists: $ cp /opt/oss/NetEco/etc/ssl/er/origintrust.cer /home/ossuser/trust.cer ● If the origintrust.cer file does not exist: $ cp /opt/oss/NetEco/etc/ssl/er/trust.cer /home/ossuser/trust.cer Step 4 Run the following command to change the permissions of the trust.cer file: $ chmod 640 /home/ossuser/trust.cer Step 5 Run the following command to copy the SSO trust certificate file to the /home/ sopuser directory: $ exit $ cp /home/ossuser/trust.cer /home/sopuser/ Step 6 Use FileZilla to log in to the node where Basic resides, as the sopuser user in SFTP mode. Download the trust.cer file in the /home/sopuser directory. For details, see 1.24.2 Transferring Files Using FileZilla. Step 7 Use PuTTY to delete temporary files as the sopuser user: $ cd /home/sopuser $ rm -rf trust.cer Step 8 Run the following command to switch to the ossuser user and delete the temporary file: $ su - ossuser Password: password for the ossuser user $ cd /home/ossuser $ rm -rf trust.cer ----End 1.16.12.2 Importing the CAS SSO Trust Certificate The single sign-on (SSO) trust certificate is used for proper SSO login. Before configuring CAS SSO, import the SSO trust certificate to the SSO server. Otherwise, logins will fail. NOTICE Importing the SSO trust certificate will cause the SSO function to be temporarily unavailable. After the import is complete, the SSO function is restored. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 166 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Prerequisites ● The CAS SSO client trust certificate cannot be configured on the web client. ● You have obtained the CAS SSO server trust certificate trust.cer. ● You have obtained the passwords for the sopuser, ossadm, and ossuser users for logging in to the node where Basic resides. Precautions In a cluster system, perform operations in this section on all the nodes where Basic resides. Procedure Step 1 Use PuTTY to log in to the node where Basic resides, as the sopuser user in SSH mode. For details about how to obtain the IP address of the node where a service resides, see 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides? Step 2 Run the following command to switch to the ossuser user: $ su - ossuser Password: password for the ossuser user Step 3 Run the following command to go to the target directory: $ cd /opt/share/oss/NetEco/BasicWebsite/ Step 4 Run the following command to check whether the external directory exists in the current directory: $ ls -l ● If it does, go to Step 6. ● If it does not, go to Step 5. Step 5 Run the following commands to create a directory for storing the certificate and set the owner and permissions of the directory: $ mkdir external $ chown -R ossuser:ossgroup external $ chmod -R 700 external Step 6 Use FileZilla to log in to the node where Basic resides, as the sopuser user in SFTP mode. Upload the trust.cer file to the /home/sopuser directory. For details, see 1.24.2 Transferring Files Using FileZilla. Step 7 Use PuTTY and run the following command to copy the certificate file, as the ossuser user: $ cp /home/sopuser/trust.cer /opt/share/oss/NetEco/BasicWebsite/external Step 8 Run the following commands to change the owner and permissions of the certificate file: $ cd /opt/share/oss/NetEco/BasicWebsite/external/ $ chown ossuser:ossgroup * Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 167 iManager NetEco Administrator Guide 1 NetEco Administrator Guide $ chmod 600 * Step 9 Run the following command to switch to the ossadm user: $ su - ossadm Password: password for the ossadm user Step 10 Run the following command to execute environment variables: $ cd /opt/oss/manager/bin $ . engr_profile.sh Step 11 Run the following commands to restart Basic: $ cd /opt/oss/manager/agent/bin $ ipmc_adm -cmd restartapp -app BasicWebsite ● If information similar to the following is displayed, the service is successfully restarted and the certificate is successfully updated: Stopping process basicwebsite -1 -0 ... success Starting process basicwebsite -1 -0 ... success ● Otherwise, the service fails to be restarted and the certificate fails to be updated. Contact Huawei technical support. Step 12 Run the following command to switch to the sopuser user: $ exit $ exit Step 13 Run the following command to delete the file in the /home/sopuser directory: $ cd /home/sopuser $ rm -rf trust.cer ----End 1.16.12.3 Updating the CAS SSO Trust Certificate Single sign-on (SSO) is an access control mechanism used for multiple associated but independent software systems. The CAS SSO trust certificate is used for proper CAS SSO login. To improve system security and prevent certificate expiration, you are advised to update this certificate periodically, for example, every three months. NOTICE Updating the CAS SSO client trust certificate will cause the SSO function to be temporarily unavailable. After the update is complete, the SSO function is restored. Prerequisites ● Issue Draft B (2020-11-30) The CAS SSO client trust certificate cannot be configured on the web client. Copyright © Huawei Technologies Co., Ltd. 168 iManager NetEco Administrator Guide 1 NetEco Administrator Guide ● You have obtained the CAS SSO server trust certificate trust.cer. ● You have obtained the passwords for the sopuser, ossadm, and ossuser users for logging in to the node where Basic resides. Precautions In a cluster system, perform operations in this section on all the nodes where Basic resides. Procedure Step 1 Use PuTTY to log in to the node where Basic resides, as the sopuser user in SSH mode. For details about how to obtain the IP address of the node where a service resides, see 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides? Step 2 Run the following command to switch to the ossuser user: $ su - ossuser Password: password for the ossuser user Step 3 Run the following command to go to the target directory: $ cd /opt/share/oss/NetEco/BasicWebsite/ Step 4 Run the following command to check whether the external directory exists in the current directory: $ ls -l ● If it does, go to Step 6. ● If it does not, go to Step 5. Step 5 Run the following commands to create a directory for storing the certificate and set the owner and permissions of the directory: $ mkdir external $ chown -R ossuser:ossgroup external $ chmod -R 700 external Step 6 Use FileZilla to log in to the node where Basic resides, as the sopuser user in SFTP mode. Upload the trust.cer file to the /home/sopuser directory. For details, see 1.24.2 Transferring Files Using FileZilla. Step 7 Use PuTTY and run the following command to copy the certificate file, as the ossuser user: $ cp /home/sopuser/trust.cer /opt/share/oss/NetEco/BasicWebsite/external Step 8 Run the following commands to change the owner and permissions of the certificate file: $ cd /opt/share/oss/NetEco/BasicWebsite/external/ $ chown ossuser:ossgroup * $ chmod 600 * Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 169 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 9 Run the following command to switch to the ossadm user: $ su - ossadm Password: password for the ossadm user Step 10 Run the following command to execute environment variables: $ cd /opt/oss/manager/bin $ . engr_profile.sh Step 11 Run the following commands to restart Basic: $ cd /opt/oss/manager/agent/bin $ ipmc_adm -cmd restartapp -app BasicWebsite ● If information similar to the following is displayed, the service is successfully restarted and the certificate is successfully updated: Stopping process basicwebsite -1 -0 ... success Starting process basicwebsite -1 -0 ... success ● Otherwise, the service fails to be restarted and the certificate fails to be updated. Contact Huawei technical support. Step 12 Run the following command to switch to the sopuser user: $ exit $ exit Step 13 Run the following command to delete the file in the /home/sopuser directory: $ cd /home/sopuser $ rm -rf trust.cer ----End 1.16.13 Managing the Trust Certificate of the Syslog Server 1.16.13.1 Importing the Trust Certificate of the Syslog Server When TLS is used to forward logs of the NetEco, use certificates for authentication between the NetEco server and the Syslog server to ensure proper communication. When the NetEco server and the Syslog server trust different certificate authorities (CAs), you need to import the trust certificate of the Syslog server to the NetEco server. On the Syslog server, the trust certificate is imported by the Syslog server administrator based on site requirements. NOTE For security purposes, the NetEco server uses TLSv1.2 or later by default. Prerequisites ● Issue Draft B (2020-11-30) The trust certificate of the Syslog server cannot be imported on the web client. Copyright © Huawei Technologies Co., Ltd. 170 iManager NetEco Administrator Guide ● 1 NetEco Administrator Guide If the certificate of the Syslog server to be imported is in JKS format: – You have obtained the trust certificate trust.jks of the Syslog server, the identity certificate server.p12 issued by a CA trusted by the Syslog server or by a subordinate CA of the trusted CA, and the passwords for both certificates. – When importing the trust certificate of the Syslog server, you need to encrypt trust.jks and server.p12. A certificate password must meet the following complexity requirements: ▪ ▪ ▪ ▪ ▪ ● The password must contain 10 to 32 characters. The password must be a combination of the following: digits, lowercase letters, uppercase letters, and special characters !"#$ %&'()*+,-./:;<=>?@[]^`{_|}~ The password cannot contain double quotation marks (") and single quotation marks (') at the same time. The password can contain no more than two consecutive identical characters. The password can contain no more than three identical characters. If the certificate of the Syslog server to be imported is in PEM format: – You have obtained the trust certificate trust.cer of the Syslog server. – You have obtained the identity certificate server.cer and key file server_key.pem issued by a CA trusted by the Syslog server or by a subordinate CA of the trusted CA, and the password for the key file. ● You have obtained the passwords for the sopuser, ossadm, and ossuser users for logging in to the node where SMLogLic resides. ● If the TCP or UDP protocol is used to forward logs, no certificate needs to be imported. ● If the NetEco server and the Syslog server trust the same CA, the certificates that have already been imported to the NetEco server can be used for their mutual authentication. In this case, no certificate needs to be imported again. ● The NetEco server authenticates the Syslog server. For security purposes, you are advised to enable the Syslog server to authenticate the NetEco server as well. For details about how to enable the authentication, contact the Syslog server administrator. ● After the function of authenticating the NetEco server is enabled on the Syslog server, you need to import the trust certificate of the NetEco server on the Syslog server if the CA trusted by the NetEco server is different from that trusted by the Syslog server. For details about how to import the certificate, contact the Syslog server administrator. ● After the trust certificate of the Syslog server is imported, restart SMLogLic. You are advised to restart the service during off-peak hours. ● In a cluster system, perform operations in this section on all the nodes where SMLogLic resides. Precautions Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 171 iManager NetEco Administrator Guide ● 1 NetEco Administrator Guide If the Syslog server uses insecure encryption algorithms (such as TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, and TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256), you need to add the insecure encryption algorithms to the ssl.client.properties file when the trust certificate of the Syslog server is imported. Otherwise, log forwarding will be abnormal. Procedure Step 1 Use PuTTY to log in to the node where SMLogLic resides, as the sopuser user in SSH mode. For details about how to obtain the IP address of the node where a service resides, see 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides? Step 2 Run the following command to switch to the ossuser user: su - ossuser Password: password for the ossuser user Step 3 Run the following commands to check whether the 3rdparty directory exists in the current directory: cd /opt/oss/NetEco/etc/ssl ll ● If it does, run the following command to delete the files from the 3rdparty directory: rm -rf 3rdparty/* ● If it does not, run the following command to create the 3rdparty directory: mkdir 3rdparty Step 4 To ensure minimum file permissions, run the following commands to change the owner and permissions of the 3rdparty directory: chown -R ossuser:ossgroup /opt/oss/NetEco/etc/ssl/3rdparty chmod -R 700 /opt/oss/NetEco/etc/ssl/3rdparty Step 5 Use FileZilla to upload the certificate files to the /home/sopuser directory on the node where SMLogLic resides, as the sopuser user in SFTP mode. For details, see 1.24.2 Transferring Files Using FileZilla. ● If the certificate of the Syslog server is in JKS format, upload the certificate files server.p12 and trust.jks. ● If the certificate of the Syslog server is in PEM format, upload the certificate files trust.cer, server.cer, and server_key.pem. Step 6 Run the following command on PuTTY to copy the certificate files to the /opt/oss/ NetEco/etc/ssl/3rdparty directory as the ossuser user: cp /home/sopuser/certificate file /opt/oss/NetEco/etc/ssl/3rdparty/ Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 172 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 7 To ensure minimum file permissions, run the following commands to change the file owner and permissions: cd /opt/oss/NetEco/etc/ssl/3rdparty chown ossuser:ossgroup * chmod 600 * Step 8 Run the following commands to switch to the ossadm user and load environment variables: su - ossadm Password: password for the ossadm user cd /opt/oss/manager/bin . engr_profile.sh Step 9 Run the following command to encrypt the passwords for the certificate files: osskey -cmd encryptpasswd When the following information is displayed, enter the password for the certificate file, confirm the password, and record the encrypted password: New Password: password for the certificate file Reenter New Password: password for the certificate file Repeat the preceding command if the passwords for other certificate files need to be encrypted. Step 10 Run the following commands to add the passwords for the certificate files in the manifest.json file. 1. Create the manifest.json file on the local PC. – If the passwords for the certificate files trust.jks and server.p12 are encrypted in Step 9, the format of the manifest.json file is as follows: { } "filelist": { "server.p12": { "storeType": "PKCS12", "storePass": "password ciphertext for server.p12", "keyPass": "password ciphertext for server.p12" }, "trust.jks": { "storeType": "JKS", "storePass": "password ciphertext for trust.jks" } } NOTE Password ciphertext for trust.jks and Password ciphertext for server.p12 are recorded in Step 9. – If the password for the certificate file server_key.pem is encrypted in Step 9, the format of the manifest.json file is as follows: { Issue Draft B (2020-11-30) "filelist": { "server_key.pem": { "storeType": "PKCS1", "format": "PEM", Copyright © Huawei Technologies Co., Ltd. 173 iManager NetEco Administrator Guide 1 NetEco Administrator Guide } "keyPass": "password ciphertext for server_key.pem", } } NOTE Password ciphertext for server_key.pem is recorded in Step 9. 2. Use FileZilla to upload the manifest.json file to the /home/sopuser directory as the sopuser user in SFTP mode. 3. Run the following command on PuTTY to copy the manifest.json file to a specified directory as the ossuser user: cp /home/sopuser/manifest.json /opt/oss/NetEco/etc/ssl/3rdparty/ 4. To ensure minimum file permissions, run the following commands to set the file owner and permissions: chown ossuser:ossgroup /opt/oss/NetEco/etc/ssl/3rdparty/manifest.json chmod 600 /opt/oss/NetEco/etc/ssl/3rdparty/manifest.json Step 11 Optional: Enable the insecure encryption algorithm used by the Syslog server. ● If the Syslog server uses a secure encryption algorithm, skip this step. ● If the Syslog server uses an insecure encryption algorithm, perform the following steps to modify the ssl.client.properties file. a. Create the ssl.client.properties file on the local PC. NOTE ▪ ▪ For security purposes, you are advised to use the Syslog server with a secure encryption algorithm and use secure protocols for data transfer. To disable the insecure encryption algorithm in the ssl.client.properties file, change the insecure protocol in ssl.protocols to a secure protocol and delete the insecure algorithm in ssl.ciphers. The contents of the ssl.client.properties file are as follows: ssl.storePath=3rdparty ssl.ciphers=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GC M_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_25 6_GCM_SHA384 ssl.trustStoreValue=trustStoreValue ssl.allowRenegociate=false ssl.checkCN.white.file=white.list ssl.protocols=TLSv1.2 ssl.keyStoreValue=keyStoreValue ssl.keyStore=server.p12 ssl.trustStoreType=JKS ssl.authPeer=true ssl.crl=revoke.crl ssl.keyStoreType=PKCS12 ssl.checkCN.white=false ssl.checkCN.host=true ssl.trustStore=trust.jks Change ssl.protocols=TLSv1.2 to ssl.protocols=TLSv1.1, and add the insecure encryption algorithms, for example, TLS_RSA_WITH_AES_256_CBC_SHA256, to ssl.ciphers. The file content is as follows: ssl.protocols=TLSv1.1 ssl.ciphers=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GC M_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_25 6_GCM_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256 Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 174 iManager NetEco Administrator Guide 1 NetEco Administrator Guide b. Use FileZilla to upload the ssl.client.properties file to the /home/ sopuser as the sopuser user in SFTP mode. c. Run the following command on PuTTY to copy the ssl.client.properties file to a specified directory as the ossuser user: cp /home/sopuser/ssl.client.properties /opt/share/oss/NetEco/ SMLogLicService/etc/ d. To ensure minimum file permissions, run the following commands to set the file owner and permissions: chown ossuser:ossgroup /opt/share/oss/NetEco/SMLogLicService/etc/ ssl.client.properties chmod 600 /opt/share/oss/NetEco/SMLogLicService/etc/ ssl.client.properties Step 12 Optional: Enable the SSLv3 protocol used by the Syslog server. ● If the Syslog server does not use SSLv3, skip this step. ● If the Syslog server uses SSLv3, perform the following steps to create the sm.java.property file: NOTE For security purposes, you are advised to use the Syslog server that supports TLSv1.2 or later for data transfer. a. Create an sm.java.property file on the local PC. b. Use FileZilla to upload the sm.java.property file to the /home/sopuser directory as the sopuser user in SFTP mode. c. Run the following command on PuTTY to copy the sm.java.property file to a specified directory as the ossuser user: jdk.tls.disabledAlgorithms=RC4, DES, MD5withRSA, DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL cp /home/sopuser/sm.java.property /opt/share/oss/NetEco/ SMLogLicService/etc/ d. To ensure minimum file permissions, run the following commands to set the file owner and permissions: chown ossuser:ossgroup /opt/share/oss/NetEco/SMLogLicService/etc/ sm.java.property chmod 600 /opt/share/oss/NetEco/SMLogLicService/etc/ sm.java.property e. Optional: To disable the SSLv3 protocol, run the following commands to delete the sm.java.property file: cd /opt/share/oss/NetEco/SMLogLicService/etc rm sm.java.property Step 13 Run the following command to switch to the ossadm user: su - ossadm Password: password for the ossadm user Step 14 Run the following commands to run the environment variables and restart the service: cd /opt/oss/manager/bin Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 175 iManager NetEco Administrator Guide 1 NetEco Administrator Guide . engr_profile.sh ipmc_adm -cmd restartapp -app SMLogLicService ● If information similar to the following is displayed, the service is restarted and the certificate is imported: Stopping process smloglicservice -0 -0 ... success Starting process smloglicservice -0 -0 ... success ● Otherwise, the service fails to be restarted and the certificate fails to be imported. In this case, contact Huawei technical support. Step 15 Run the following command to switch to the sopuser user: su - sopuser Password: password for the sopuser user Step 16 Run the following commands to delete the files in the /home/sopuser directory: rm -rf /home/sopuser/certificate file rm -rf /home/sopuser/manifest.json rm -rf /home/sopuser/ssl.client.properties rm -rf /home/sopuser/sm.java.property ----End 1.16.13.2 Updating the Trust Certificate of the Syslog Server When TLS is used to forward logs of the NetEco, use certificates for authentication between the NetEco server and the Syslog server to ensure proper communication. If the trust certificate on the NetEco server is about to expire or the Syslog server trusts a new trust certificate, you need to update the trust certificate on the NetEco server to ensure normal communication between the NetEco server and the Syslog server. This section describes how to update the trust certificate of the Syslog server on the NetEco server. NOTE For security purposes, the NetEco server uses TLSv1.2 or later by default. Prerequisites ● The trust certificate of the Syslog server cannot be updated on the web client. ● If the certificate to be updated is in JKS format: – You have obtained the trust certificate trust.jks of the Syslog server, the identity certificate server.p12 issued by a CA trusted by the Syslog server or by a subordinate CA of the trusted CA, and the passwords for both certificates. – When importing the trust certificate of the Syslog server, you need to encrypt trust.jks and server.p12. A certificate password must meet the following complexity requirements: ▪ Issue Draft B (2020-11-30) The password must contain 10 to 32 characters. Copyright © Huawei Technologies Co., Ltd. 176 iManager NetEco Administrator Guide 1 NetEco Administrator Guide ▪ ▪ ▪ ▪ ● The password must be a combination of the following: digits, lowercase letters, uppercase letters, and special characters !"#$ %&'()*+,-./:;<=>?@[]^`{_|}~ The password cannot contain double quotation marks (") and single quotation marks (') at the same time. The password can contain no more than two consecutive identical characters. The password can contain no more than three identical characters. If the certificate to be updated is in PEM format: – You have obtained the trust certificate trust.cer of the Syslog server. – You have obtained the identity certificate server.cer and key file server_key.pem issued by a CA trusted by the Syslog server or by a subordinate CA of the trusted CA, and the password for the key file. ● You have obtained the passwords for the sopuser, ossadm, and ossuser users for logging in to the node where SMLogLic resides. ● The NetEco server authenticates the Syslog server. For security purposes, you are advised to configure the Syslog server with the same data as that on the NetEco server. ● After the certificate is updated on the NetEco server, restart the Log Forwarding service. You are advised to restart the service during off-peak hours. ● In a cluster system, perform operations in this section on all the nodes where SMLogLic resides. ● If the Syslog server uses insecure encryption algorithms (such as TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, and TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256), you need to add the insecure encryption algorithms to the ssl.client.properties file when the trust certificate of the Syslog server is imported. Otherwise, log forwarding will be abnormal. Precautions Procedure Step 1 Use PuTTY to log in to the node where SMLogLic resides, as the sopuser user in SSH mode. For details about how to obtain the IP address of the node where a service resides, see 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides? Step 2 Run the following command to switch to the ossuser user: su - ossuser Password: password for the ossuser user Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 177 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 3 Run the following commands to check whether the 3rdparty directory exists in the current directory: cd /opt/oss/NetEco/etc/ssl ll ● If it does, run the following command to delete the files from the 3rdparty directory: rm -rf 3rdparty/* ● If it does not, run the following command to create the 3rdparty directory: mkdir 3rdparty Step 4 To ensure minimum file permissions, run the following commands to change the owner and permissions of the 3rdparty directory: chown -R ossuser:ossgroup /opt/oss/NetEco/etc/ssl/3rdparty chmod -R 700 /opt/oss/NetEco/etc/ssl/3rdparty Step 5 Use FileZilla to upload the certificate files to the /home/sopuser directory on the node where SMLogLic resides, as the sopuser user in SFTP mode. ● If the certificate to be updated is in JKS format, upload the certificate files server.p12 and trust.jks. ● If the certificate to be updated is in PEM format, upload the certificate files trust.cer, server.cer, and server_key.pem. Step 6 Run the following command on PuTTY to copy the certificate files to the /opt/oss/ NetEco/etc/ssl/3rdparty directory as the ossuser user: cp /home/sopuser/certificate file /opt/oss/NetEco/etc/ssl/3rdparty/ Step 7 To ensure minimum file permissions, run the following commands to change the file owner and permissions: cd /opt/oss/NetEco/etc/ssl/3rdparty chown ossuser:ossgroup * chmod 600 * Step 8 Run the following commands to switch to the ossadm user and load environment variables: su - ossadm Password: password for the ossadm user cd /opt/oss/manager/bin . engr_profile.sh Step 9 Run the following command to encrypt the passwords for the certificate files: osskey -cmd encryptpasswd When the following information is displayed, enter the password for the certificate file, confirm the password, and record the encrypted password: New Password: password for the certificate file Reenter New Password: password for the certificate file Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 178 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Repeat the preceding command if the passwords for other certificate files need to be encrypted. Step 10 Run the following commands to add the passwords for the certificate files in the manifest.json file. 1. Create the manifest.json file on the local PC. – If the passwords for the certificate files trust.jks and server.p12 are encrypted in Step 9, the format of the manifest.json file is as follows: { } "filelist": { "server.p12": { "storeType": "PKCS12", "storePass": "password ciphertext for server.p12", "keyPass": "password ciphertext for server.p12" }, "trust.jks": { "storeType": "JKS", "storePass": "password ciphertext for trust.jks" } } NOTE Password ciphertext for trust.jks and Password ciphertext for server.p12 are recorded in Step 9. – If the password for the certificate file server_key.pem is encrypted in Step 9, the format of the manifest.json file is as follows: { } "filelist": { "server_key.pem": { "storeType": "PKCS1", "format": "PEM", "keyPass": "password ciphertext for server_key.pem", } } NOTE Password ciphertext for server_key.pem is recorded in Step 9. 2. Use FileZilla to upload the manifest.json file to the /home/sopuser directory as the sopuser user in SFTP mode. 3. Run the following command on PuTTY to copy the manifest.json file to a specified directory as the ossuser user: cp /home/sopuser/manifest.json /opt/oss/NetEco/etc/ssl/3rdparty/ 4. To ensure minimum file permissions, run the following commands to set the file owner and permissions: chown ossuser:ossgroup /opt/oss/NetEco/etc/ssl/3rdparty/manifest.json chmod 600 /opt/oss/NetEco/etc/ssl/3rdparty/manifest.json Step 11 Optional: Enable the insecure encryption algorithm used by the Syslog server. ● If the Syslog server uses a secure encryption algorithm, skip this step. ● If the Syslog server uses an insecure encryption algorithm, perform the following steps to modify the ssl.client.properties file. a. Issue Draft B (2020-11-30) Create the ssl.client.properties file on the local PC. Copyright © Huawei Technologies Co., Ltd. 179 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE ▪ ▪ For security purposes, you are advised to use the Syslog server with a secure encryption algorithm and use secure protocols for data transfer. To disable the insecure encryption algorithm in the ssl.client.properties file, change the insecure protocol in ssl.protocols to a secure protocol and delete the insecure algorithm in ssl.ciphers. The contents of the ssl.client.properties file are as follows: ssl.storePath=3rdparty ssl.ciphers=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GC M_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_25 6_GCM_SHA384 ssl.trustStoreValue=trustStoreValue ssl.allowRenegociate=false ssl.checkCN.white.file=white.list ssl.protocols=TLSv1.2 ssl.keyStoreValue=keyStoreValue ssl.keyStore=server.p12 ssl.trustStoreType=JKS ssl.authPeer=true ssl.crl=revoke.crl ssl.keyStoreType=PKCS12 ssl.checkCN.white=false ssl.checkCN.host=true ssl.trustStore=trust.jks Change ssl.protocols=TLSv1.2 to ssl.protocols=TLSv1.1, and add the insecure encryption algorithms, for example, TLS_RSA_WITH_AES_256_CBC_SHA256, to ssl.ciphers. The file content is as follows: ssl.protocols=TLSv1.1 ssl.ciphers=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GC M_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_25 6_GCM_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256 b. Use FileZilla to upload the ssl.client.properties file to the /home/ sopuser as the sopuser user in SFTP mode. c. Run the following command on PuTTY to copy the ssl.client.properties file to a specified directory as the ossuser user: cp /home/sopuser/ssl.client.properties /opt/share/oss/NetEco/ SMLogLicService/etc/ d. To ensure minimum file permissions, run the following commands to set the file owner and permissions: chown ossuser:ossgroup /opt/share/oss/NetEco/SMLogLicService/etc/ ssl.client.properties chmod 600 /opt/share/oss/NetEco/SMLogLicService/etc/ ssl.client.properties Step 12 Optional: Enable the SSLv3 protocol used by the Syslog server. ● If the Syslog server does not use SSLv3, skip this step. ● If the Syslog server uses SSLv3, perform the following steps to create the sm.java.property file: NOTE For security purposes, you are advised to use the Syslog server that supports TLSv1.2 or later for data transfer. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 180 iManager NetEco Administrator Guide 1 NetEco Administrator Guide a. Create an sm.java.property file on the local PC. b. Use FileZilla to upload the sm.java.property file to the /home/sopuser directory as the sopuser user in SFTP mode. c. Run the following command on PuTTY to copy the sm.java.property file to a specified directory as the ossuser user: jdk.tls.disabledAlgorithms=RC4, DES, MD5withRSA, DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL cp /home/sopuser/sm.java.property /opt/share/oss/NetEco/ SMLogLicService/etc/ d. To ensure minimum file permissions, run the following commands to set the file owner and permissions: chown ossuser:ossgroup /opt/share/oss/NetEco/SMLogLicService/etc/ sm.java.property chmod 600 /opt/share/oss/NetEco/SMLogLicService/etc/ sm.java.property e. Optional: To disable the SSLv3 protocol, run the following commands to delete the sm.java.property file: cd /opt/share/oss/NetEco/SMLogLicService/etc rm sm.java.property Step 13 Run the following command to switch to the ossadm user: su - ossadm Password: password for the ossadm user Step 14 Run the following commands to run the environment variables and restart the service: cd /opt/oss/manager/bin . engr_profile.sh ipmc_adm -cmd restartapp -app SMLogLicService ● If information similar to the following is displayed, the service is restarted and the certificate is imported: Stopping process smloglicservice -0 -0 ... success Starting process smloglicservice -0 -0 ... success ● Otherwise, the service fails to be restarted and the certificate fails to be imported. In this case, contact Huawei technical support. Step 15 Run the following command to switch to the sopuser user: su - sopuser Password: password for the sopuser user Step 16 Run the following commands to delete the files in the /home/sopuser directory: rm -rf /home/sopuser/certificate file rm -rf /home/sopuser/manifest.json rm -rf /home/sopuser/ssl.client.properties Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 181 iManager NetEco Administrator Guide 1 NetEco Administrator Guide rm -rf /home/sopuser/sm.java.property ----End 1.17 Managing Keys 1.17.1 Updating the Root Key and Working Keys Root keys and working keys are used to encrypt and decrypt passwords for database users and certificates to prevent the passwords from being tampered with or stolen. Huawei-developed key files have been preconfigured when the PowerEcho and the NetEco are installed. These keys are used only for commissioning. For security purposes, you are advised to periodically update the keys of the PowerEcho and the NetEco. Prerequisites You have obtained the password for the sopuser and ossadm user on the management node. Precautions In a remote cold backup scenario, after the keys are updated at the primary site, you need to update the keys at the secondary site using the keys of the primary site to ensure that the two sites use the same keys. Procedure Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. Run the following command to switch to the ossadm user: $ su - ossadm Step 2 Run the following commands to update the keys: $ cd /opt/oss/manager/agent/bin $ screen -S "osskey" bash osskey -cmd addkeyonallnodes -type all -keylen 128 -force Replace the values of the preceding parameters based on site requirements. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 182 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter Description -type Type of the key. You are advised to set this parameter to all to update the important data corresponding to the root key, working keys, and key files. You can also update the key of a specified type as required. ● root: root key. When the root key is updated, the following three types of working keys are encrypted, but the important data corresponding to the working keys is not updated. ● common_shared: common working key. This key is used to encrypt data to be restored, for example, certificate password and database user password. ● redis_shared: working key of the Redis database. This key is used to encrypt the Redis database. ● service_token_shared: working key of the security module. This key is used to encrypt the token in token authentication mode. If the -type parameter is not set, the system updates the common_shared key file by default. -keylen Length of the key. Unit: bit. Options: 128, 192, and 256. The longer the key is, the higher the system security is. However, the key encryption and decryption performance decreases with the increase of the key length. Set the key length based on site requirements. If the -keylen parameter is not set, the system sets the length of the key to be updated to 128 bits by default. -force By default, the interval for updating the key files of the same type is at least a month. If the interval between the current time and the last key update time is less than a month, the update operation is not allowed. If the -force parameter is configured, the interval is not limited. If the -force parameter is not configured, enter Y and press Enter when the following information is displayed: Are you sure to generate a new key and update the files used the key on all nodes(Y/N): Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 183 iManager NetEco Administrator Guide ● 1 NetEco Administrator Guide If the following information is displayed, the keys are updated successfully. Go to Step 4. ...... Execute osskey cmd:addkeyonallnodes Successful ● If the following information is displayed, the keys fail to be updated. Go to Step 3. ...... Execute osskey cmd:addkeyonallnodes Failed Step 3 If the keys fail to be updated, perform the following operations to update the keys again: 1. Run the following command to update the keys again: $ screen -S "osskey" bash osskey -cmd addkeyonallnodes -retry The following information is displayed: Are you sure to generate a new key and update the files used the key on all nodes(Y/N): 2. Enter y and press Enter. If the following information is displayed, the keys are updated successfully. Otherwise, contact Huawei technical support. ...... Execute osskey cmd:addkeyonallnodes Successful Step 4 Back up the database applications and product applications. For details, see 1.11.6.1 Manually Backing Up the Application and Data of the PowerEcho and 1.11.5 Backing Up Products. This is after the keys are updated, historical backup files have become invalid, and the application and data of the PowerEcho, the product database applications and product applications need to be manually backed up. Step 5 In a remote cold backup scenario, update the root key and working keys at the secondary site. For details, see 1.17.2 Updating the Root Key and Working Keys of the Secondary Site. ----End 1.17.2 Updating the Root Key and Working Keys of the Secondary Site In a remote cold backup scenario, if the keys of the primary site are successfully updated but the keys of the secondary site fail to be updated, or the keys of the primary site and the secondary site are inconsistent, you can copy the keys of the primary site to the secondary site and then update the keys at the secondary site. In this manner, the sites can properly communicate with each other. Prerequisites You have obtained the passwords for the sopuser and ossadm users of the management node at the primary and secondary sites. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 184 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 Use PuTTY to log in to the management node at the primary site as the sopuser user in SSH mode. Step 2 Run the following command to switch to the ossadm user: $ su - ossadm Password: password for the ossadm user Step 3 Run the following commands to create a temporary directory and copy the key files to the temporary directory: $ mkdir -p /tmp/router_keys $ cp /opt/oss/manager/etc/cipher/base.ksf /tmp/router_keys $ cp /opt/oss/manager/etc/cipher/common_shared.ksf /tmp/router_keys $ cp /opt/oss/manager/etc/cipher/redis_shared.ksf /tmp/router_keys $ cp /opt/oss/manager/etc/cipher/service_shared.ksf /tmp/router_keys Step 4 Run the following command to configure permissions for the key files: $ chmod 750 /tmp/router_keys/base.ksf $ chmod 750 /tmp/router_keys/common_shared.ksf $ chmod 750 /tmp/router_keys/redis_shared.ksf $ chmod 750 /tmp/router_keys/service_shared.ksf Step 5 Run the following command to exit from the ossadm user: $ exit Step 6 Run the following commands to copy the key files from the temporary directory to the /home/sopuser directory and configure permissions for the key files: $ cp /tmp/router_keys/* /home/sopuser $ chmod 600 /home/sopuser/base.ksf $ chmod 600 /home/sopuser/common_shared.ksf $ chmod 600 /home/sopuser/redis_shared.ksf $ chmod 600 /home/sopuser/service_shared.ksf Step 7 Use FileZilla to download the key files from the management node at the primary site to your PC as the sopuser user in SFTP mode. For details, see 1.24.2 Transferring Files Using FileZilla. Issue Draft B (2020-11-30) ● Obtain the key files from the /home/sopuser directory. ● Key files: – base.ksf: root key – common_shared.ksf: common working key – redis_shared.ksf: working key of the Redis database – service_shared.ksf: working key of the security module Copyright © Huawei Technologies Co., Ltd. 185 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 8 Use FileZilla to upload the key files obtained in Step 7 to the /home/sopuser directory on the management node at the secondary site, as the sopuser user in SFTP mode. Step 9 Use PuTTY to log in to the management node at the secondary site as the sopuser user in SSH mode. Step 10 Run the following command to switch to the ossadm user: $ su - ossadm Password: password for the ossadm user Step 11 Run the following commands to create a temporary directory and copy the key files to the temporary directory: $ mkdir -p /tmp/router_keys $ cp /home/sopuser/base.ksf /tmp/router_keys $ cp /home/sopuser/common_shared.ksf /tmp/router_keys $ cp /home/sopuser/redis_shared.ksf /tmp/router_keys $ cp /home/sopuser/service_shared.ksf /tmp/router_keys Step 12 Run the following command to configure permissions for the key files: $ chmod 700 /tmp/router_keys $ find /tmp/router_keys -type f| xargs chmod 600 Step 13 Run the following commands to update the keys of the secondary site: $ cd /opt/oss/manager/agent/bin $ bash osskey -cmd replace_key -path /tmp/router_keys/ When the following information is displayed, enter y and press Enter: Are you sure to replace key and update the files used the key on all nodes(Y/N): Step 14 Check the execution result of the key update and perform corresponding operations. Table 1-63 Execution results Command Output Operation If the following information is displayed, the keys of the secondary sites are updated successfully: Go to Step 15. ... Execute osskey cmd:replace_key Successful Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 186 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Command Output Operation If the following information is displayed, the keys of the secondary sites fail to be updated: 1. Run the following commands to update the keys of the secondary site again: $ bash osskey -cmd replace_key path /tmp/router_keys -retry ... Execute osskey cmd:replace_key Failed The following information is displayed: Are you sure to replace key and update the files used the key on all nodes(Y/N): 2. Enter y and press Enter. If the following information is displayed, the keys of the secondary sites are updated successfully. Go to Step 15. Otherwise, contact Huawei technical support. ...... Execute osskey cmd:replace_key Successful Step 15 Delete the temporary files. 1. Delete the temporary files on the management node at the secondary site. a. Run the following command to delete the files in the temporary directory: $ rm -rf /tmp/router_keys b. Run the following command to exit from the ossadm user: $ exit c. Run the following commands to delete the temporary files copied to the /home/sopuser directory: $ rm -rf /home/sopuser/base.ksf $ rm -rf /home/sopuser/common_shared.ksf $ rm -rf /home/sopuser/redis_shared.ksf $ rm -rf /home/sopuser/service_shared.ksf 2. Delete the temporary files on the management node at the primary site. a. Use PuTTY to log in to the management node at the primary site as the sopuser user in SSH mode. b. Run the following commands to delete the temporary files copied to the /home/sopuser directory: $ rm -rf /home/sopuser/base.ksf $ rm -rf /home/sopuser/common_shared.ksf $ rm -rf /home/sopuser/redis_shared.ksf $ rm -rf /home/sopuser/service_shared.ksf c. Run the following command to switch to the ossadm user: $ su - ossadm Password: password for the ossadm user Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 187 iManager NetEco Administrator Guide 1 NetEco Administrator Guide d. Run the following command to delete the files in the temporary directory: $ rm -rf /tmp/router_keys Step 16 In a remote cold backup scenario, perform the following operations to restart the product database: 1. Access the PowerEcho at https://client IP address of the PowerEcho of the secondary site:31945. 2. On the login page, enter the username and password, and click Log In. 3. On the PowerEcho, choose Product > System Monitoring from the main menu. 4. In the upper left corner of the System Monitoring page, move the pointer to and select the product. 5. In the upper left corner of the page, click Stop, choose Stop DB from the drop-down menu and perform operations as prompted. 6. After the databases are stopped, in the upper left corner of the page, click Start, choose Start DB from the drop-down menu, and perform operations as prompted. ----End 1.18 Managing Log 1.18.1 Configuring Log Forwarding (the PowerEcho) During the routine operation and maintenance, a large number of logs are generated. To ensure sufficient space for storing new logs, the historical logs are cleared with the generation of new logs. The log forwarding function allows the system to automatically forward logs to a Syslog server to prevent loss of historical data. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The trust certificate of the Syslog server has been imported. For details, see 1.16.6 Uploading and Updating the Trust Certificate of the Syslog Server (the PowerEcho). ● The Syslog server has been configured. For details about how to configure the Syslog server, see Table 1-64. Table 1-64 Parameter description Issue Draft B (2020-11-30) Parameter Description Active server IP address IP address of the active server that receives logs forwarded by the PowerEcho. Copyright © Huawei Technologies Co., Ltd. 188 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter Description Active server port Port number of the active server that receives forwarded logs. The value range is 1 to 65535. Standby server IP address (Optional) IP address of the standby server. The standby server is a backup of the active Syslog server. Standby server port The value range is 1 to 65535. Protocol The TLS, UDP, and TCP protocols are supported. ● You are advised to select TLS because it is more secure than UDP and TCP. If Protocol is set to TLS, the SSL certificate for the log forwarding service is required. ● If Protocol is set to UDP, Syslog packets are sent only to the active server. If the UDP protocol is used, you do not need to plan the standby Syslog server. NOTE For security purposes, the system uses TLSv1.2 or later by default. Required string Only the logs that contain the string are forwarded. ● Regular expressions are not supported in the string. ● Wildcard characters are not supported in the string. Syslog server time zone You can set this parameter based on the time zone where the Syslog server is located. After the setting, the time in the forwarded Syslog packets is automatically converted to the time of the time zone where the Syslog server is located. Enable DST When DST is used in the region where the Syslog server is located, you can enable the DST. After the DST is enabled, when the time zone where the Syslog server is located is in the DST period, the forwarded Syslog packets contain DST identifiers. Context Figure 1-16 shows the principles of log forwarding settings. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 189 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Figure 1-16 Principles of log forwarding settings The PowerEcho connects to the Syslog server at an interval of 30 seconds. Syslog packets stored in the Syslog database are preferentially forwarded. Successfully forwarded packets will be deleted from the Syslog database. If UDP is used, the PowerEcho forwards Syslog packets only to the active Syslog server. Therefore, no standby Syslog server is required in this case. If TLS or TCP is used, the system attempts to connect to the active Syslog server in each period. If the connection fails, it attempts to connect to the standby Syslog server. The following cases may occur: ● If the PowerEcho is successfully connected to the active Syslog server, logs are forwarded only to the active server. ● If the PowerEcho fails to connect to the active Syslog server, it attempts to connect to the standby Syslog server. If the connection is successful, the PowerEcho forwards logs only to the standby Syslog server. ● If the PowerEcho fails to connect to the active and standby Syslog servers, it will forward logs after it reconnects to the active or standby Syslog server. NOTE ● After security logs, operation logs, and system logs are converted to Syslog packets, the packets are directly forwarded to a Syslog server. Those that fail to be forwarded are stored in the Syslog database. ● Syslog packets converted from other logs are saved in the Syslog database. If the forwarding fails, the Syslog packets are still stored in the Syslog database. ● For security purposes, the system uses TLSv1.2 or later by default. Procedure Step 1 On the PowerEcho, choose System > Log Management > Log Forwarding Settings from the main menu. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 190 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 2 In the navigation pane, choose Forwarding Server, and perform operations as prompted. ----End 1.18.2 Configuring Log Forwarding Rules (the PowerEcho) The log forwarding rule defines the levels of different types of logs to be forwarded. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose System > Log Management > Log Forwarding Settings from the main menu. Step 2 In the navigation pane, choose Forwarding Rule. Step 3 On the Forwarding Rule page, click the desired levels for different types of logs. Step 4 Click Apply. Then the system forwards logs based on the log forwarding rule and Syslog level on the Forwarding Server page. ----End 1.18.3 Setting Log Dump (the NetEco) Security logs, system logs, and operation logs are stored in the database after being generated. To ensure sufficient database space, the system automatically dumps the logs that meet specified conditions to the hard disk as files. To ensure sufficient hard disk space, the system automatically deletes the log files that meet specified conditions from the hard disk. You can specify the conditions for dumping logs and deleting log files based on site requirements. Prerequisites You have obtained the passwords for the sopuser and ossuser users for logging in to the node where SMLogLic resides. Context Issue Draft B (2020-11-30) ● Conditions for dumping logs: The number of logs in the database exceeds 1 million, the size of the logs in the database exceeds 80% of the capacity, or the number of days for storing the logs exceeds 45 days. To ensure sufficient database space, the system checks logs every hour and saves logs that meet the requirements to the hard disk of a server. Then the dumped logs are automatically deleted from the database. ● Conditions for deleting log files: The size of the log files is greater than 1024 MB, the log files are stored for more than 45 days, or the total number of log Copyright © Huawei Technologies Co., Ltd. 191 iManager NetEco Administrator Guide 1 NetEco Administrator Guide files exceeds 1000. To ensure sufficient disk space, the system checks log files every hour and deletes log files meeting the requirements from the hard disk. NOTE The values in the preceding conditions for dumping logs and deleting log files are default values. Procedure Step 1 Use PuTTY to log in to the node where SMLogLic resides, as the sopuser user in SSH mode. For details about how to obtain the IP address of the node where a service resides, see 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides? Step 2 Run the following command to switch to the ossuser user: su - ossuser Password: password for the ossuser user Step 3 Run the following commands to set the log dump parameters: cd /opt/oss/NetEco/apps/SMLogLicService/bin ● To query the settings of the log dump parameters, run the following command: ./auditTool.sh -cmd list If information similar to the following is displayed, the log dump parameter settings are successfully queried: The configuration information is as follows: Dump file compression status: Compressed Dump file generation status: Generated Dump file type: CSV Log retention days: 1000 Dump task status: Activated Log file retention days: 365 Total number of files in the dump directory: 1000 Total file size in the dump directory (MB): 6144.00 Maximum data records stored in the database table: 1000000 Log space usage (%): 80.00 The script is executed successfully. ● To set log dump parameters, run the following command: ./auditTool.sh -s Percentage of the database space occupied by logs -p Number of days during which logs are stored in the database -f Number of days during which log files are stored -a Whether to enable log dump -g Whether to generate dump files -c Whether to compress files -n Total number of files in the dump directory -S Total size of files in the dump directory If information similar to the following is displayed, the log dump parameters are successfully set: The script is executed successfully. For details about the parameters in the command, see Table 1-65. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 192 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-65 Parameter description Parameter Value Percentage of the database space occupied by logs Default value: 80 Value range: an integer from 0 to 100 If this parameter is set to 0, this parameter is not used. Number of days during which logs are stored in the database Default value: 45 Value range: an integer from 0 to 1000 If this parameter is set to 0, this parameter is not used. Number of days during which log files are stored Default value: 45 Whether to enable log dump Default value: 1 Value range: an integer from 1 to 365 Value range: 0 or 1. 0 indicates that log dump will be disabled and 1 indicates that log dump will be enabled. Whether to generate dump files Default value: 1 Value range: 0 or 1. 0 indicates that dump files will not be generated and 1 indicates that dump files will be generated. Whether to compress dump files Default value: 1 Value range: 0 or 1. 0 indicates that dump files will not be compressed and 1 indicates that dump files will be compressed. Total number of files in the dump directory Default value: 1000 Total size of files in the dump directory Default value: 1024 Value range: an integer from 200 to 3000 Value range: an integer from 200 to 6144 ----End Operation Result The system checks logs every hour, saves the logs that meet specified conditions to a .csv or .zip file, and stores the file to the /opt/share/oss/NetEco/XXXService/ dump/timestamp/timestamp directory on the hard disk. The value of XXXService can be SMLogLicService or MCCommonService. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 193 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.18.4 Log Reference (the NetEco) 1.18.4.1 Security-related Log List The security-related log list includes security-related logs of all services stored in the database. Table 1-66 provides the security-related log list. Table 1-66 Security-related log list Log Name Function Where to Store Query Method Operat ion log Records user operations performed in the system that do not affect system security. Operation logs are stored in the T_OPERATIONL OG table of the database. Choose Security > Log Management > Operation Logs. System log Records system operations or tasks. System logs are stored in the T_SYSTEMLOG table of the database. Choose Security > Log Management > System Logs. Securit y log Records user operations performed in the system that affect system security. Security logs are stored in the T_SECURITYLOG table of the database. Choose Security > Log Management > Security Logs. 1.18.4.2 Security-related Log Description During the running process of each service, security logs, system logs, and operation logs are recorded into the database. The administrator can query security-related logs in the portal of the NetEco client. 1.18.4.2.1 Operation Logs Introduction Operation logs record all security-irrelevant operations on the NetEco client, for example, acknowledging alarms and clearing alarms. Field Description Table 1-67 describes the meanings of fields in operation logs. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 194 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-67 Description of operation log fields Field Name Description Example Operation Name of an operation performed on NetEco. Query logs Level Level of the damage caused by an operation performed on NetEco, such as warning, minor, and risk. Warning Operator User who performs an operation. admin Time Time when an operation is performed. It is accurate to seconds. 2016-03-13 19:45:26 Source Function module that a user performs operations on. Log Management Terminal IP Address IP address of the host where an operation is performed. 10.66.54.108 Operation Object Object that a user performs operations on. Log Management Result Operation result, such as successful, failed, and partially successful. Successful Details Other information about an operation. Operation logs queried successfully. 1.18.4.2.2 System Logs Introduction System logs record tasks that affect the running status of NetEco on the NetEco server. These tasks are triggered by the NetEco client (for example, starting or executing a scheduled task) or by the NetEco server (for example, starting or stopping the NetEco service). Field Description Table 1-68 describes the fields in system logs. Table 1-68 Description of system log fields Issue Draft B (2020-11-30) Field Name Description Example Basic Informatio n Name of the system task that generates a log. User logout Copyright © Huawei Technologies Co., Ltd. 195 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Field Name Description Example Level Level of the damage caused by an operation performed on NetEco, such as warning, minor, and critical. Minor Time Time when an operation is performed. It is accurate to seconds. 2016-06-13 10:45:26 Source Function module that a user performs operations on. Login management Result Operation result, such as successful, failed, partially successful, and unknown. Successful Details Other information about an operation. The user has been idle for more than the specified amount of time. User name: admin. IP address: 10.74.166.181. 1.18.4.2.3 Security Logs Introduction Security logs record the operations that affect system security on the NetEco client, for example, logging in to NetEco. Field Description Table 1-69 describes the fields in security logs. Table 1-69 Description of security log fields Issue Draft B (2020-11-30) Field Name Description Example Operation Name of an operation performed on NetEco. Change password Level Level of the damage caused by an operation performed on NetEco, such as warning, minor, and risk. Minor Operator User who performs an operation. admin Time Time when an operation is performed. It is accurate to seconds. 2016-06-14 10:50:01 Copyright © Huawei Technologies Co., Ltd. 196 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Field Name Description Example Terminal IP Address IP address of the host where an operation is performed. 10.66.50.141 Operation Object The object that a user performs operations on. LocalNMS indicates NetEco. LocalNMS Result Operation result, such as successful, failed, and partially successful. Successful Details Other information about an operation. The password is successfully changed. 1.18.4.3 Server Logs During the operation of the service, audit logs that record the execution of commands and audit logs that record the database status are generated. This section describes the log locations, formats, and query methods for both types of logs. Table 1-70 lists server logs. Table 1-70 Server logs Log Type Log File Name Location Query Method Command audit log messages /var/log/ For details, see 1.23.17 How Do I View Command Audit Logs? Database audit log ● Redis: database instance namelogin.log ● Redis: /opt/redis/ data/database ● GaussDB T V3: zengine_timestam p.aud ● GaussDB T V3: /opt/zenith/ data/database For details, see 1.23.18 How Do I View Database Audit Logs? zengine.aud instance name instance name/log/audit 1.18.4.3.1 Command Audit Logs Log Path For EulerOS, command audit logs are stored in the /var/log/messages file. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 197 iManager NetEco Administrator Guide 1 NetEco Administrator Guide For details about how to query command audit logs recorded in the system, see 1.23.17 How Do I View Command Audit Logs? Log Format For EulerOS, a command audit log is in the following format: 2019-01-08T23:16:13.371760+08:00 linux ossadm: install.sh;Successful; 127.0.0.1;Excute execution install.sh. 2019-01-08T23:16:15.101018+08:00 linux ossadm: install.sh;Successful; 172.28.199.1;Excute execution install.sh to install osconfig. Table 1-71 describes the fields in command audit logs. Table 1-71 Description of fields in command audit logs Field Example Description Date Mar 12 Date when a log is recorded. Time 18:48:27 Time when the log is recorded. Node name IAMGloble01 Name of the node where the command is executed. Authorized user ossadm User who runs the command. Script app_profile.sh Command that is executed. Execution result ErrorCode:0 Execution result of a command. IP address 127.0.0.1 IP address of the client where the command is executed. Details Execute app_profile.sh Log details. Archival Period The archival period is determined by the OS because the OS automatically archives logs. Archive files are saved in the same path for saving log files and named messages.x.gz, for example, messages.5.gz. 1.18.4.3.2 Database Audit Logs Log Path For details about the audit log path for each type of database, Table 1-72. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 198 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-72 Paths for database audit logs Database Type Log path Redis /opt/redis/data/Database instance name/ Database instance name-login.log GaussDB T V3 /opt/zenith/data/Database instance name/log/audit Log Format ● A Redis database audit log is in the following format: 26862:M 18 Sep 22:48:31.585 * The readdbuser Logged out Successfully;10.67.178.153:56345; 26862:M 18 Sep 22:48:33.110 * The readdbuser logged in successfully;10.67.178.154:37077; 26862:M 18 Sep 22:48:37.981 * 10.67.178.153:34407 operation:config get master-read-only Table 1-73 describes the fields in Redis database audit logs. Table 1-73 Description of fields in Redis database audit logs ● Field Name Description Example Process number of the Redis database - 26862 Primary/Standby instance M indicates the primary instance and S indicates the standby instance. M Date Date when the log operation is performed. 18 Sep Time Time when the log is recorded. 22:48:31.585 Execution result Execution result. The readdbuser Logged out Successfully IP address IP address of the client where the command is executed. 10.67.178.153 Peer ID - 56345 A GaussDB T V3 database audit log is in the following format: UTC+8 2018-08-06 22:01:10.477 LENGTH: "226" SESSIONID:[2] "48" STMTID:[1] "0" USER:[3] "SYS" HOST:[12] "10.93.58.196" ACTION:[7] "PREPARE" RETURNCODE:[1] "0" SQLTEXT:[97] "create database zenithdb LOGFILE('log1' size 128M, 'log2 ' size 128M, 'log3' size 128M) archivelog" Table 1-74 describes the fields in Zenith database audit logs. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 199 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-74 Description of fields in GaussDB T V3 database audit logs Field Name Description Example TIME Date and Time when the log is recorded. UTC+8 2018-08-06 22:01:10.477 LENGTH Log length. 226 SESSIONID Database session ID. 48 STMTID Database handle ID. 0 USER Name of the user for logging in to the database. SYS HOST IP address of the client connecting to the database. 10.93.58.196 ACTION Operation type. PREPARE RETURNCODE Operation return code. 0 SQLTEXT SQL statement for auditing. create database zenithdb LOGFILE('log1' size 128M, 'log2 ' size 128M, 'log3' size 128M) archivelog Archival Rules Table 1-75 shows the audit log archival period of each database type. Table 1-75 Archival rules of the database audit logs Database Type Archival Rules Redis ● A maximum of 50 archive files can be saved. If the number of archive files reaches 50, the earliest archive file will be deleted upon the next file is archived. ● A Redis database archive file is named Service namelogin.log.Archive time.zip, for example, pmdataservicerdb-2-36login.log.20171119184230174.zip. GaussDB T V3 When the number or occupied disk space of audit files exceeds the threshold, the system deletes the earliest audit files and record information about deleting audit files to audit logs. ● The default disk space of audit files is 100 MB. You can set the disk space as required. ● The maximum number of audit files is 10. You can set a larger value as required, but the performance may be affected. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 200 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.19 Security Management Security management prevents unauthorized users from accessing the system and ensures system data security. 1.19.1 Setting the System Login Mode Multi-user mode and single-user mode are available for system login. In most cases, the system runs in multi-user mode. If you need to perform maintenance operations on the PowerEcho (for example, adjusting the role to which a user is attached, managed objects, or operation rights), switch to the single-user mode to prevent other users' operations from affecting the system maintenance operations. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Choose System > Security Management > Security Settings from the menu. Step 2 On the System Login Mode page, select a login mode. NOTE ● Switching to Single-user mode allows only the admin user to log in and will force a logout of other users online. Therefore, exercise caution when performing this operation. However, third-party users can log in. ● If Single-user mode is selected, you can set Switching duration. Value 0 indicates that the system immediately switches to the single-user mode. Other values indicate that the system switches to the single-user mode after the specified period of time. ● If Multi-user mode is selected, the system immediately switches to the multi-user mode. Step 3 Click Apply. ----End Follow-up Procedure You are advised to switch the system to the multi-user mode immediately after finishing maintenance so that other users can use the system. 1.19.2 Creating Users After a security administrator creates a user and attaches the user to a role, the user has the permissions of this role. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 201 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Precautions For security purposes, the PowerEcho accounts are used only by maintenance personnel of the system. Do not disclose the accounts to external organizations or third-party personnel. Disabling a user will force online sessions of the user on the PowerEcho to be logged out. Exercise caution when performing this operation. Procedure Step 1 Choose System > Security Management > User Management from the menu. Step 2 In the navigation pane, choose Users. Step 3 On the Users page, perform the following operations as prompted based on the number of users to be created: ● To create a single user, click Create. NOTE ● – You can quickly create a user by clicking Copy in the Operation column of a user and adjusting the information as required. The admin user has permission to perform security operations and therefore cannot be copied. – When creating a user as the admin user, you are advised not to attach the user to both the Administrators and SMManagers roles to ensure system security. Users attached to both the Administrators and SMManagers roles have the maximum permission on all resources in the system. Therefore, perform operations using these user accounts with caution. Do not perform any operations affecting system security. For example, do not share or distribute these usernames and passwords. To create users in batches, click and choose Import Users. ----End Related Tasks For details about other operations, see 1.19.5.1 Common Operations for User Information Maintenance. 1.19.3 Adjusting Permission After Changing Role of a User After the position of an employee is changed, security administrators need to adjust the role to which the user account of the employee is attached to change permissions of the employee. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Context A position change occurs in the following situations: ● Issue Draft B (2020-11-30) An employee is recruited. Copyright © Huawei Technologies Co., Ltd. 202 iManager NetEco Administrator Guide 1 NetEco Administrator Guide ● The role of an employee (as a user) is changed. ● An employee resigns. Precautions Disabling or deleting a user will force online sessions of the user on the PowerEcho to be logged out. Exercise caution when performing this operation. Procedure ● ● ● An employee is recruited. a. Choose System > Security Management > User Management from the menu. b. In the navigation pane, choose Users. c. On the Users page, click Create. d. On the displayed page, set basic user information and click Next. e. Select the role to which the user is attached and click Next. f. Set access control information about the user and click OK. The role of an employee (as a user) is changed. a. Choose System > Security Management > User Management from the menu. b. In the navigation pane, choose Users. c. Click the name of the user whose role is changed and go to the Roles tab page. d. Click Edit in the upper right corner of the page. e. Add or delete the role of a user based on the user position changes. An employee resigns. a. Choose System > Security Management > User Management from the menu. b. In the navigation pane, choose Users. Check whether the employee account needs to be reserved. ▪ ▪ If you want to retain the account, click Disable in the Operation column of the row that contains the user to disable the user. If you do not want to retain the account, click Delete in the Operation column of the row that contains the user to delete the user. 1.19.4 Monitoring Users User sessions can be monitored so that security administrators can know the online users in the system, access addresses of these users, access time, and roles of the users. When detecting an unauthorized user operation, the system sends a message to the user or forcibly log out the user. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 203 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Context ● A user session refers to a connection between a user and the system. A session starts when the user logs in to the system and ends when the user logs out of the system. A user can generate multiple sessions. ● The maximum number of online sessions for a user is specified by the Max. online sessions parameter. ● Users' personal information is not monitored during session monitoring. Procedure Step 1 Choose System > Security Management > User Management from the menu. Step 2 In the navigation pane, choose Online Users. The information about all online users is displayed in the list. NOTE Client Name indicates the name of the client where this session is generated. Step 3 Click Monitor in the Operation column of the target user to view the status of the user. ● The User Operations list displays only operations performed after the Online Users page is opened. Operations of the monitored users are updated in the User Operations list in real time. ● Level indicates the risk level of an operation, including Risk, Minor, and Warning. The value of Level is the same as that recorded in operation logs. Step 4 To send a message to a user, click Send Message in the Operation column of the user. Alternatively, select multiple users and click Send Message above the user list to send messages to these users. Step 5 When detecting that a user is performing risky operations, click Log Out in the Operation column of the user to forcibly log out the user. Alternatively, select multiple users and click Log Out above the user list to force a logout of these users in batches. NOTICE This operation involves user login status and may force a logout of logged-in users. Therefore, exercise caution when performing this operation. ----End 1.19.5 User Maintenance Security administrators can maintain user, role, and operation set information, and reset other users' passwords. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 204 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.19.5.1 Common Operations for User Information Maintenance Common operations for user information maintenance include viewing user information, enabling users, disabling users, deleting users, exporting user information, and modifying user information. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Choose System > Security Management > User Management from the menu. Step 2 In the navigation pane, choose Users. Step 3 Perform the following operations as needed. Table 1-76 User maintenance operations Common Operation Procedure Viewing user informatio n Click a username to view the user information. Disabling a user Click Disable in the Operation column of the row that contains the user you want to disable. Enabling a user Click Enable in the Operation column of the row that contains the user you want to enable. Deleting users Click Delete in the Operation column of the row that contains the user to be deleted or select the users to be deleted and click Delete. NOTE ● Default users, current user, and users attached to the SMManagers role cannot be deleted. ● Deleting a logged-in user will force a logout of the user. Therefore, exercise caution when performing this operation. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 205 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Common Operation Procedure Importing user informatio n 1. On the Users page, click and choose Import Users. 2. On the Import Users page, click the template name to download the template and enter user information in the template. NOTE – The system provides two template formats: User Template.xls and User Template.xlsx, and you can edit the template in .csv format. Select a template format as required. – When editing a template in .csv format and creating a time policy, add double quotation marks before and after the time policy to ensure that the import is successful. The following shows an example. "NewTimePolicy;start-time:00:00,end-time:23:59;start-date: 2017-01-01,end-date:2017-12-31;week:135" 3. Fill in user information based on the template. 4. Set Import Mode, and click . In the dialog box that is displayed, select the edited template. 5. Click Create or Modify. After the import is complete: a. On the displayed page, view the number of successfully imported operation sets and the number of operation sets that fail to be imported. b. In the Result list, view the imported users and their details. c. If partial failure occurs, modify the user information that failed to be imported based on the details, and import them again. 6. Click OK. Exporting user informatio n To export information about all users, click and choose Export All Users. To export information about certain users, select these users and click Export Selected Users. NOTE ● The Password, Mobile number, and Email address fields are not exported. Therefore, the values of these fields are empty in the exported user information file. ● The file is exported in .csv or .xlsx format and downloaded to the local PC as a .zip package. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 206 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Common Operation Procedure Modifying user informatio n 1. Click the name of the user whose information needs to be modified. 2. Select the tab to be modified and click Edit to modify the user information. NOTE – Auto-logout if no activity within: If a user does not perform any operation within the period specified by this parameter, the user will be logged out. This parameter can be set for local users and remote users and cannot be set for third-party users. – During user modification, setting Enable account to No for a logged-in user will force a logout of the user. Therefore, exercise caution when performing this operation. 3. Click OK. Unlocking users ● To unlock a user: Click Unlock in the Operation column of the row that contains the user. ● To unlock users in batches: 1. Optional: You can change All statuses to Locked to quickly filter all locked users. 2. Select users to be unlocked. 3. Click and choose Batch Unlock Users. NOTE Default users, unlocked users, current user, and users attached to the SMManagers role cannot be unlocked. ----End 1.19.5.2 Creating a Role and Granting Permissions If the default roles provided by the system cannot meet user authorization requirements in the authorization plan, security administrators need to create roles and grant them permissions based on the plan. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Context ● If only a few roles are required, create them one by one. ● If multiple roles are required or the roles are obtained from the files exported from other systems, create roles in batches. ● Creating a single role Procedure Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 207 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 1 Choose System > Security Management > User Management from the menu. Step 2 In the navigation pane, choose Roles. Step 3 On the Roles page, click Create. NOTE You can quickly create a role by clicking Copy in the Operation column of a role and modifying the information as required. Step 4 On the page that is displayed, set basic role information. Step 5 Select the users to be attached to the role. After role authorization is complete, the users you have selected have the permissions included in this role. Step 6 Click Next. On the Select Operation Rights page, click Application-Level to set application-level permissions of the role based on the authorization plan for application-level permissions of the role. Step 7 Click OK. ----End ● Creating roles in batches Step 1 Choose System > Security Management > User Management from the menu. Step 2 In the navigation pane, choose Roles. Step 3 On the Roles page, click and choose Batch Create Roles. Step 4 On the Batch Create Roles page, click a template name to download the template. NOTE The system provides two template formats: Role Template.xls and Role Template.xlsx. Select a template format as required. Step 5 Fill in role information based on the template. Step 6 Click . In the displayed dialog box, select the edited template. Step 7 Click Upload. After roles are imported, you can perform the following operations: 1. On the displayed page, view the number of successfully imported roles and the number of roles that fail to be imported. 2. In the Result list, view the imported roles and their details. 3. If partial failure occurs, modify the role information that failed to be imported based on the details, and import them again. Step 8 Click OK. Step 9 Grant permissions to the roles created in batches based on the authorization plan. 1. Issue Draft B (2020-11-30) On the Roles page, click a role name. Copyright © Huawei Technologies Co., Ltd. 208 iManager NetEco Administrator Guide 2. 1 NetEco Administrator Guide On the Managed Objects or Operation Rights tab page, click Edit, and grant permissions to the role. ----End Follow-up Procedure If a user logs in to a third-party system in SSO mode, role information (excluding operation rights) about this user can be synchronized to the third-party system. To ensure that this user has the same operation rights on the third-party system as those on the system, create the same role for the user on the third-party system and bind the same operation rights to the role. Related Tasks For details about how to maintain role information, see 1.19.5.3 Common Operations for Role Information Maintenance. 1.19.5.3 Common Operations for Role Information Maintenance Common operations for role information maintenance include viewing role information, deleting roles, exporting role information, and modifying role information. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Choose System > Security Management > User Management from the menu. Step 2 In the navigation pane, choose Roles. Step 3 Perform the following operations as needed. Table 1-77 Role maintenance operations Issue Draft B (2020-11-30) Common Operation Procedure Viewing role informatio n Click a role name to view information about this role. Copyright © Huawei Technologies Co., Ltd. 209 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Common Operation Procedure Deleting roles Click Delete in the Operation column of the row that contains the role to be deleted or select the roles to be deleted and click Delete. NOTE ● You cannot delete default roles and the roles to which the current user is attached. ● Deleting roles will cause the users attached to these roles to lose the permissions of the roles. Therefore, exercise caution when performing this operation. Exporting role informatio n Click and choose Export All Roles to export information about all roles. NOTE ● If the number of roles exceeds 500, role information is exported to multiple files. That is, each file contains information about a maximum of 500 roles. ● The file is exported in .csv or .xlsx format and downloaded to the local PC as a .zip package. Modifying role informatio n 1. Click the name of a role whose information needs to be modified. 2. Select the tab to be modified and click Edit to modify the role information. NOTE – You cannot modify the managed objects and operation rights of the roles to which the current user is attached. – You cannot modify the managed objects and operation rights of default roles. – Modifying the role information will change the permissions of users attached to this role. Therefore, exercise caution when performing this operation. The permission changes will take effect upon page refreshing or after next login of these users. ----End 1.19.5.4 Creating a User-defined Operation Set If operation sets are planned during authorization planning, security administrators need to create user-defined operation sets before authorizing users. Authorizing roles using operation sets improves authorization efficiency. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 210 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 Choose System > Security Management > User Management from the menu. Step 2 In the navigation pane, choose Operation Sets. Step 3 On the Operation Sets page, click Create. NOTE You can quickly create an operation set by clicking Copy in the Operation column of an operation set and adjusting the information as required. Step 4 On the displayed page, set Operation set name, Type, and Description. Step 5 Select the operation rights to be included in the operation set from the list of available operation rights. NOTE You can delete redundant operation rights from the operation list by selecting these operation rights and clicking Delete. Step 6 On the Operation Sets page, click OK. ----End Related Tasks For details about operations related to operation sets, see 1.19.5.5 Common Operations for Operation Set Information Maintenance. 1.19.5.5 Common Operations for Operation Set Information Maintenance Common operations for operation set maintenance include viewing operation set information, deleting an operation set, and modifying operation set information. Importing and exporting operation sets are applicable to system data migration. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Choose System > Security Management > User Management from the menu. Step 2 In the navigation pane, choose Operation Sets. Step 3 Perform the following operations as needed. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 211 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-78 Operation set maintenance operations Common Operation Procedure Viewing operation set information Click an operation set name to view details about the operation set. Deleting an operation set Click Delete in the Operation column of the row that contains the operation set. NOTE ● If the deleted operation set is associated with a user, the user will lose all operation rights included in the deleted operation set. ● You cannot delete default operation sets and the operation sets to which the role of the current user is bound. Modifying operation set information 1. Click the name of an operation set whose information needs to be modified. 2. Click Edit and modify the operation rights in the operation set. NOTE ● If the modified operation set is associated with a user, the change takes effect the next time the user logs in. ● You cannot modify operation rights included in default operation sets or the operation sets to which the role of the current user is bound. Importing operation sets 1. Click and choose Import Operation Sets. 2. On the Import Operation Sets page, click NOTE Only the admin user can perform this operation. . 3. In the displayed dialog box, select the .zip file to be imported. 4. Click Create. When the import is complete, perform the following operations to check the import result: a. On the displayed page, view the number of successfully imported operation sets and the number of operation sets that fail to be imported. b. In the Result list, view the imported operation sets and their details. c. If partial failure occurs, modify the operation set information that failed to be imported based on the details, and import them again. 5. Click OK to close the Import Operation Sets page. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 212 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Common Operation Procedure Exporting all operation sets Click and choose Export All Operation Sets to export all operation sets created by the user. NOTE Only the admin user can perform this operation. In the .zip file to be exported, a .csv file contains a maximum of 100 operation sets of the same type. If the number of operation sets exceeds 100, the operation sets are exported to multiple files. ----End 1.19.5.6 Modifying User Information in Batches Security administrators can modify user information (such as Max. online sessions and Login Time Policy) in batches, improving system security. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Context ● You can use the following methods to modify user information in batches: – Using the Batch Modify Users function Select the users whose information needs to be modified and click Batch Modify Users. – Modifying an exported user information file Export user information as a file, edit the file, and then import it to the system. ● The operations in this section involve user permission adjustment, which may force a logout of logged-in users. Therefore, exercise caution when performing this operation. ● Using the Batch Modify Users function Procedure Step 1 Choose System > Security Management > User Management from the menu. Step 2 In the navigation pane, choose Users. Step 3 In the user list, select one or more users, click Users. , and choose Batch Modify Step 4 On the User List tab page, confirm the users whose information needs to be modified. Then, click Next. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 213 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 5 Select the users information to be modified on the Modification Items page as required. Click OK. On the Modification Result page, view the modification results and details. If the existing time policies do not meet the requirements, click Create to create a policy and then click Refresh. Then, you can select the new time policy from the time policy list. NOTE ● You cannot modify the admin user and your own information. ● A maximum of 100 users can be modified at a time. ● After the login time policy is modified, the users who do not meet the policy requirements will be forcibly logged out if Log out of sessions that do not comply with client IP address or login time policies is selected in the account policy. Step 6 Click OK. ----End ● Modifying an exported user information file Step 1 Choose System > Security Management > User Management from the menu. Step 2 In the navigation pane, choose Users. Step 3 Select the users whose information needs to be exported, click Export Selected Users or Export All Users. , and choose Step 4 In the Select File Format dialog box, select a file format and click OK. Step 5 Modify the exported user information file. ● When modifying the user information file, do not change the sequence of the fields in the file. ● If you change the value of a field to empty or an invalid value, the value of this field will not be changed. ● The following user information cannot be modified: – Type and Region of all users – All information about the current user and the admin user – Mobile Number, Email Address, Password, Login Time Policy, Client IP Address Policy, and Password Validity Period (Days) of remote users – Roles, Login Time Policy, and Allowed Logins of default users – Auto-Logout If No Activity Within set for third-party users Step 6 Click and choose Import Users. Step 7 In the Import Users window, choose Update Users to import users. Step 8 Click , select the modified user information file, and click Upload. Step 9 After the import is complete: Issue Draft B (2020-11-30) ● On the displayed page, view the number of successfully imported users and the number of users who fail to be imported. ● In the Result list, view the imported users and their details. Copyright © Huawei Technologies Co., Ltd. 214 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 10 Click OK. ----End 1.19.5.7 Changing Personal Passwords If passwords are disclosed or remain unchanged for a long time, users can change their personal passwords by setting personal information. For security purposes, you are advised to periodically change passwords, for example, every three months. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Choose System > Security Management > Change Password from the menu. Step 2 Perform operations as prompted. NOTE User information is more secure if a password is changed more frequently. If a user forgets the password due to frequent password changes, contact security administrators to reset the password. ----End 1.19.5.8 Resetting a User Password If a user other than the admin user loses the password or cannot change the password, this user needs to contact security administrators to reset the password. For account security purposes, it is recommended that third-party users contact the security administrator to periodically reset their passwords. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. To reset the password for a security administrator, you have logged in to the PowerEcho as the admin user. Precautions If a user has logged in to the PowerEcho and Force logout after password change in the password policy is selected, resetting the password for the user will force the user to log out. Therefore, exercise caution when performing this operation. Procedure Step 1 Choose System > Security Management > User Management from the menu. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 215 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 2 In the navigation pane, choose Users. Step 3 Click Reset Password in the Operation column of the row that contains the user and reset the password. NOTICE You are not allowed to reset the password for the admin user. If you forget the password for the admin user, it cannot be retrieved and you can only reinstall the system. Therefore, ensure that you memorize the password for the admin user. ----End 1.19.6 Security Policies Security policies allow you to set access control rules for users. This function improves O&M efficiency and prevents unauthorized users from accessing the system to ensure system security. 1.19.6.1 Setting the Account Policy Security administrators set login or lockout policies for user accounts as needed to improve system access security. The account policy takes effect for all users. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Choose System > Security Management > Security Policies from the menu. Step 2 In the navigation pane, choose Account Policy. Step 3 On the Account Policy page, set the account policy. NOTE ● If Enable the user policy if no login within a period is selected, the system will automatically delete the users who meet the policy. Perform this operation with caution. ● Auto-logout if no activity within: If a user does not perform any operation within the period specified by this parameter, the user will be logged out. The setting takes effect only for local and remote users and does not take effect for third-party users. If this parameter is set to Unlimited, user sessions will not be automatically logged out. ● If Show warning upon successful login is selected, a login warning message is displayed to notify users of rules that should be obeyed after users log in to the system. The warning message provides legal declaration. Security administrators can customize this warning message based on user management regulation. ● To improve account security, you are advised to enable all the items in the account policy. Step 4 Click Apply. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 216 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.19.6.2 Setting the Password Policy Security administrators set the password complexity, change interval, and character limitation based on site requirements to prevent users from setting weak passwords or using a password for a long period of time, improving system access security. The password policy takes effect for all users. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Context ● If you disable the password complexity policy items and the item of forcibly changing passwords after they expire, user security reduces. You are advised to enable all items for user authentication in the password security policy provided. ● If the settings of the same policies in the personal policy of a user and the password policy are different, the settings in the personal policy take effect for the user. ● Periodically changing passwords can improve user information security and prevent accounts from being stolen. Exercise caution when disabling the function of periodically changing passwords and modifying a password change period. ● A new password policy does not affect the existing passwords. Procedure Step 1 Choose System > Security Management > Security Policies from the menu. Step 2 In the navigation pane, choose Password Policy. Step 3 On the Password Policy page, set the password policy. Some of the policy parameters are described in Table 1-79. Table 1-79 Parameter description Issue Draft B (2020-11-30) Parameter Description Force logout upon password reset When a user password is reset, all online sessions generated by the user will be logged out. Copyright © Huawei Technologies Co., Ltd. 217 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter Description Password cannot be an increasing, decreasing, or interval sequence of digits or letters When setting a user password, the password must meet the following requirements: ● The password cannot be digits or letters in ascending or descending sequence. For example, the password cannot be abcdef, fedcba, 123456, or 654321. ● The password cannot contain an ascending or descending arithmetic sequence in consecutive odd digits or even digits. For example, the password cannot be 1a2a3a, 5a3a1a, a2b2c2, or 2e2c2a. Password cannot contain words in password dictionary When you create a user and set the password, the password cannot contain words in the password dictionary. ● No default password dictionary is provided. You can customize a password dictionary. For example, abcd1234 is a weak password and if it is added to the password dictionary, abcd1234 cannot be used as a user password. ● In a password dictionary file, passwords are separated by line feeds. In the dictionary, a password that contains more than 64 characters is invalid. NOTE To update the password dictionary, perform the following steps: 1. Click Download Password Dictionary to download the existing password dictionary and modify it as required. 2. Click and select the modified password dictionary. 3. Click Upload to update the password dictionary. Convert strings in password based on conversion rules (refer to help documentation to configure the rules) NOTE This parameter is displayed only when Password cannot contain words in password dictionary is selected. If a password contains a character string defined in the string conversion rules, the character string is converted into other characters based on certain rules. The converted password must meet complexity requirements. The string conversion rules define the rules for converting a character or string into an uppercase or lowercase letter. For example, if a rule for converting the string |-|1234 a into x exists in the string conversion rules, and xbcd!123 is contained in the password dictionary, and when the policy is enabled, |-|1234 abcd! 123 cannot be used as a user password. NOTE ● For details about how to configure the string conversion rules, see "Configuring the String Conversion Rules of User Management". ● Strings refer to strings consisting of dangerous characters, invisible characters, and characters incurring SQL injection. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 218 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 4 Click Apply. ----End 1.19.6.3 Configuring Service Parameters for User Management You can modify parameters in CLI mode for the user management function without redeploying this function. Prerequisites You have obtained the passwords for the sopuser and ossadm users of the management node. Procedure Step 1 Use PuTTY to log in to the management node, as the sopuser user in SSH mode. NOTE If the PowerEcho is deployed in cluster mode, perform operations only on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following command to query the settings of service parameters for user management: > cd /opt/oss/manager/apps/MCCommonService/bin > bash userSettingTool.sh -cmd list If information similar to the following is displayed, the query for service parameters is successful: Setting Data: Whether the user name for login is case-sensitive: 1 Whether to forbid the operation of creating a user with the same name as a deleted user: 0 Whether the local account lockout policy and IP address lockout policy are invalid for remote users in remote authentication: 1 Whether local authentication is performed when remote authentication fails: 1 Number of deleted users to be saved: 800 Whether a remote user can change their passwords in Oracle LDAP remote authentication: 0 The LDAP authentication scenario supports the following TLS protocols of a low version: [tlsv1.0] Whether the userlist is simple for GMY: 1 Execute the user setting tool successfully. Step 4 Run the following command to modify the service parameters for user management based on the query result and site requirements: > bash userSettingTool.sh parameter value Add a space between parameter and value. For details about the parameters and values, see Table 1-80. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 219 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-80 Parameter description Pa ra m et er Value Range Description -u 1: The username is case-sensitive. Whether the username for login is case-sensitive. 0: The username is case-insensitive. -l 1: Local authentication is performed after remote authentication fails. The login welcome information indicates local authentication. After remote authentication is successful, the login welcome information indicates remote authentication. Whether local authentication is performed when remote authentication fails 0: Local authentication is not performed when remote authentication fails. Local authentication or remote authentication is not displayed in the login welcome information. -d 1: In remote authentication, the local account lockout policy and IP address lockout policy are invalid for remote users. Whether the local account lockout policy and IP address lockout policy are invalid for remote users in remote authentication. 0: In remote authentication, the local account lockout policy and IP address lockout policy are valid for remote users. -r 1: A user with the same username as that of a deleted local user or a deleted third-party user cannot be created. Whether a user with the same username as that of a deleted local user or a deleted third-party user can be created. 0: A user with the same username as that of a deleted local user or a deleted third-party user can be created. -n Value range: an integer from 1 to 10000 Number of deleted users to be saved. -c 1: Remote users can change their passwords. Whether remote users can change their passwords in Oracle LDAP server remote authentication. 0: Remote users cannot change their passwords. Issue Draft B (2020-11-30) NOTE The Oracle LDAP server connects to customers' third-party servers for remote authentication. Copyright © Huawei Technologies Co., Ltd. 220 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Pa ra m et er Value Range Description -p enable value: The TLS protocol value can be selected. The value can be TLSv1.0 or TLSv1.1. Whether the TLS protocol of a specified earlier version can be selected in the LDAP authentication scenario. disable value: The TLS protocol value cannot be selected. The value can be TLSv1.0 or TLSv1.1. NOTE ● This command controls whether the TLS protocol of a low version can be selected when you add or modify LDAP authentication configurations. The current low version can still be used, which is not affected by the command execution. ● For data security during communication, you are advised to use TLS v1.2 or later to enable the TLS connection for LDAP authentication. -g 1: The login status and enabling status columns are not displayed, and the All statuses option is not displayed. Whether to display the login status and enabling status columns, and whether to display the All statuses option in the user list. 0: The login status and enabling status columns are displayed, and the All statuses option is displayed. If information similar to the following is displayed, the service parameter configuration is successful: Execute the user setting tool successfully. ----End 1.19.6.4 Setting a Client IP Address Policy A client IP address policy provides a control mechanism for checking the accessibility of the IP address used by an external access request. Security administrators set client IP address policies as needed to specify the IP addresses used for logging in to the PowerEcho, improving system security. The policy created in this section takes effect only for the bound users. Prerequisites Issue Draft B (2020-11-30) ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● The IP address of your local PC is in the IP address range to be configured. Copyright © Huawei Technologies Co., Ltd. 221 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 Choose System > Security Management > Security Policies from the menu. Step 2 In the navigation pane, choose Client IP Address Policies. Step 3 On the Client IP Address Policies page, click Create. Step 4 Set a client IP address policy and click OK. NOTICE Exercise caution when you set the client IP address policies for the admin user. If the client IP address of the admin user is not within the bound IP address range, the user cannot log in again after logout. ----End 1.19.6.5 Setting Login Time Policies A login time policy provides a control mechanism for checking the validity time of an external access request during system operation. Security administrators set login time policies as needed to specify the time period during which users are allowed to log in to the PowerEcho, improving system security. The policy created in this section takes effect only for the bound users. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Choose System > Security Management > Security Policies from the menu. Step 2 In the navigation pane, choose Login Time Policies. Step 3 On the Login Time Policies page, click Create. Step 4 Set the parameters of the login time policy and click OK. NOTE ● User admin is not restricted by the login time policy. ● If the start time is later than the end time for Effective hours, the system will automatically set the end time to the next day. For example, if Effective hours is set to 16:00–15:00, login is allowed within 16:00–24:00 today and 0:00–15:00 the next day. ----End 1.19.7 Remote Authentication Configuration You can interconnect the PowerEcho with a third-party system by configuring an Authentication, Authorization, and Accounting (AAA) protocol. After the interconnection, users are authenticated by an AAA server instead of User Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 222 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Management in the PowerEcho upon user login. This section describes how to configure and enable remote authentication. 1.19.7.1 Understanding Remote Authentication This section describes the definition, principles, and protocol types of remote authentication. User Authentication Mode The user authentication modes include local authentication and remote authentication. In remote authentication mode, users are authenticated by an AAA server through AAA protocols. The PowerEcho supports Lightweight Directory Access Protocol (LDAP) and Remote Authentication Dial In User Service (RADIUS) for AAA authentication. For details, see Table 1-81. Table 1-81 User authentication modes Issue Draft B (2020-11-30) Authenticati on Mode Authentication Protocol Description Local authenticatio n N/A During the PowerEcho login, user authentication is implemented by a local server through user management. After local authentication is enabled, remote authentication is automatically disabled. Re mot e aut hen ticat ion LDAP stands for Lightweight Directory Access Protocol. The system communicates with the LDAP server in common mode (without encryption), or Transport Layer Security (TLS) mode. During the PowerEcho login, user authentication is implemented by the LDAP server. LDAP authen tication Copyright © Huawei Technologies Co., Ltd. 223 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Authenticati on Mode RADIU S authen tication Authentication Protocol Description RADIUS is the most widely used AAA protocol and is defined in the RFC2865 and RFC2866 specifications. RADIUS supports the following authentication modes: Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), Microsoft Challenge Handshake Authentication Protocol version 1 (MS-CHAPv1), Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2), and Twofactor. During the PowerEcho login, user authentication is implemented by the RADIUS server. Principles of LDAP and RADIUS Authentication Figure 1-17 shows the interconnection between the PowerEcho and an LDAP or RADIUS server. Figure 1-17 Remote authentication principles 1. Issue Draft B (2020-11-30) A user enters its username and password on the browser to log in to the PowerEcho. Copyright © Huawei Technologies Co., Ltd. 224 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 2. The PowerEcho sends the username and password to the LDAP or RADIUS server for authentication. 3. After the authentication is successful, the LDAP or RADIUS server returns the user information to the PowerEcho. Then, the user successfully logs in to the PowerEcho. 1.19.7.2 Configuring LDAP Authentication LDAP stands for lightweight directory access protocol. It supports multiple authentication modes. The system authenticates users based on their usernames and passwords or in Transport Layer Security (TLS) mode. Users can set login information on the LDAP server, and user authentication during the login is performed by the LDAP server. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● An LDAP server has been installed and correctly configured. ● You have obtained the LDAP server information from the LDAP server provider to configure LDAP authentication for the system. For details about the parameters, see 1.19.7.4 LDAP Authentication Parameters. ● If the username case sensitivity is enabled on the LDAP server, the username case sensitivity configuration of the PowerEcho must be consistent with the LDAP server. For details, see 1.19.6.3 Configuring Service Parameters for User Management. Precautions The security mechanisms for remote authentication depend on the third-party server. Security mechanisms, such as anti-brute force cracking, password complexity check, and anti-DoS attack, must be enabled on the third-party server. ● If the anti-brute force cracking mechanism is not enabled, the passwords may be cracked by brute force through a large number of guesses, leading to information leakage. ● If the password complexity check is not enabled, there is no restrictions on user passwords. If a password is too simple, the password is easy to be cracked, leading to information leakage. ● If the anti-DoS attack mechanism is not enabled, the system is vulnerable to attacks of highly frequent requests initiated through abnormal means. In such case, the system resources will be exhausted, and the system cannot properly provide services. Procedure Step 1 Choose System > Security Management > Security Settings from the menu. Step 2 In the navigation pane, choose Remote Authentication. Step 3 On the Remote Authentication page, click LDAP Authentication. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 225 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 4 Enter basic information. The basic information includes the address type, address, port number of the LDAP server, and the communication mode between the LDAP server and system server. Set parameters based on the information provided in 1.19.7.4 LDAP Authentication Parameters. 1. Set the address type, address, and port number of the LDAP server. NOTE If the LDAP server is deployed in dual-server mode, enter the addresses type, address, and port numbers of both the servers. 2. Set the communication mode between the LDAP server and system server. Select Enable TLS as required. After Enable TLS is selected, set the related parameters. NOTE – If the CA has issued a CRL, you are advised to upload the CRL in a timely manner to ensure secure interconnection with the LDAP server. – If Enable TLS is selected and Certificate type is set to JKS,P12, obtain the following certificates: ▪ ▪ – Root certificate (trust certificate in .jks format) and password of the LDAP server Identity certificate (in .p12 format) and password of the PowerEcho, if twoway authentication is enabled on the LDAP server If Enable TLS is selected and Certificate type is set to CER,DER,PEM,PVK, obtain the following certificates: ▪ ▪ ▪ Root certificate (that is, the trust certificate in .cer, .der, or .pem format) of the third-party LDAP server Identity certificate (in .cer, .der, or .pem format) and password of the PowerEcho, if two-way authentication is enabled on the LDAP server Private key file of the LDAP server and its password if two-way authentication is enabled on the LDAP server Step 5 Set server information. Set parameters based on the information provided in 1.19.7.4 LDAP Authentication Parameters. 1. Set User authentication mode and enter related information. 2. Set User Attributes and User Group Attributes. Step 6 Click Test. In the Test Connection dialog box, enter the username and password of the remote user on the LDAP server. ● If Test successful. is displayed, interconnection between the system and the LDAP server is successful. ● If the connection test fails, a failure message is displayed. Check whether the LDAP server is correctly configured and try again until the interconnection is successful. Step 7 Click Apply for the LDAP authentication settings to take effect. LDAP authentication will be displayed next time when you log in to Remote Authentication. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 226 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 8 (Optional) If User authentication mode is set to Fixed user, click Synchronize User Group to synchronize user groups from the remote server to the local server. NOTE The synchronization fails if the following cases occur: ● The remote user group name does not meet the naming rule in Role. For example, the name length exceeds 64 characters, or the name contains special characters `~*()|[]{}:, +;="'<>/?\ or escape characters. ● The remote user group exists in the mapping table of Use remotely stored bindings. ● The remote user group already has a role with the same name on the local server. ----End Follow-up Procedure After setting LDAP authentication, log out of the PowerEcho and log in again as a remote user for the LDAP authentication settings to take effect. NOTE A remote user cannot log in to the the PowerEcho in the following situations: ● The remote user and the default user in the system have the same username. ● The remote user name does not meet the setting rule of Username. 1.19.7.3 Configuring RADIUS Authentication Remote Authentication Dial In User Service (RADIUS) is the most widely used AAA protocol and is defined in the RFC2865 and RFC2866 specifications. RADIUS supports multiple authentication modes, such as Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), Microsoft Challenge Handshake Authentication Protocol version 1 (MS-CHAPv1), Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2), and Two-factor. Prerequisites Issue Draft B (2020-11-30) ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● A RADIUS server has been installed and correctly configured. ● You have obtained the RADIUS server information from the RADIUS server provider to configure RADIUS authentication for the system. For details about the parameters, see 1.19.7.5 RADIUS Authentication Parameter Description. ● In Two-factor authentication mode, SecurID token has been set on the RADIUS server. ● If the username case sensitivity is enabled on the RADIUS server, the username case sensitivity configuration of the PowerEcho must be consistent with the RADIUS server. For details, see 1.19.6.3 Configuring Service Parameters for User Management. Copyright © Huawei Technologies Co., Ltd. 227 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Precautions The security mechanisms for remote authentication depend on the third-party server. Security mechanisms, such as anti-brute force cracking, password complexity check, and anti-DoS attack, must be enabled on the third-party server. ● If the anti-brute force cracking mechanism is not enabled, the passwords may be cracked by brute force through a large number of guesses, leading to information leakage. ● If the password complexity check is not enabled, there is no restrictions on user passwords. If a password is too simple, the password is easy to be cracked, leading to information leakage. ● If the anti-DoS attack mechanism is not enabled, the system is vulnerable to attacks of highly frequent requests initiated through abnormal means. In such case, the system resources will be exhausted, and the system cannot properly provide services. Procedure Step 1 Choose System > Security Management > Security Settings from the menu. Step 2 In the navigation pane, choose Remote Authentication. Step 3 On the Remote Authentication page, click RADIUS Authentication. Step 4 Enter RADIUS authentication information. Set parameters based on the information provided in 1.19.7.5 RADIUS Authentication Parameter Description. Step 5 Click Test. In the Test Connection dialog box, enter information about the remote user on the RADIUS server. NOTE ● If Authentication mode is set to CHAP, PAP, MS-CHAPv1, or MS-CHAPv2, enter the username and password for the remote user. Password is the password for the user's personal account. ● If Authentication mode is set to Two-factor, enter the username and password of the remote user. Password is not the password for the user's personal account. It consists of the PIN and token code. – The PIN is a string of 4 to 8 digits or letters. The initial value must be obtained from the RADIUS server provider. Reset the PIN when performing the first test as the user. – The token code is a 6-digit number generated by the RSA SecurID hardware device. The RSA SecurID hardware device needs to be obtained from the RADIUS server provider. ● If Test successful. is displayed, interconnection between the system and the RADIUS server is successful. ● If the connection fails the test, a message describing the failure cause is displayed. Take measures based on the displayed message until the connection is successful. Step 6 Click Apply for the RADIUS authentication settings to take effect. RADIUS authentication will be displayed next time when you log in to Remote Authentication. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 228 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Follow-up Procedure After setting RADIUS authentication, log out of the PowerEcho and log in again as a remote user for the RADIUS authentication settings to take effect. NOTE A remote user cannot log in to the the PowerEcho in the following situations: ● The remote user and the default user in the system have the same username. ● The username of the remote user does not meet the setting rule of Username. 1.19.7.4 LDAP Authentication Parameters This section describes the parameters required for configuring remote LDAP authentication. For actual parameter configurations, contact LDAP server maintenance personnel. Table 1-82 Basic Information parameters Parameter Description Example Master server address type Address type of the active LDAP server. The options are IPv4, IPv6, and Domain name. IPv4 NOTE If the address type of the LDAP active server is domain name, you need to configure the DNS server in advance. Issue Draft B (2020-11-30) Master server address Address of the active LDAP server. 192.168.0.5 Master server port Port number of the active LDAP server. The value range is 1 to 65535. 389 Standby server address type Address type of the standby LDAP server. The options are IPv4, IPv6, and Domain name. IPv4 Standby server address Address of the standby LDAP server. 192.168.0.10 Standby server port Port number of the standby LDAP server. The value range is 1 to 65535. 389 Enable TLS Whether to enable TLS for the system server and LDAP server. By default, it is enabled. - Copyright © Huawei Technologies Co., Ltd. 229 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter Description Example TLS version TLS protocol version for the secure communication mode. The options are TLS v1.0, TLS v1.1, and TLS v1.2. TLS v1.2 NOTE ● For data security during communication, you are advised to use TLS v1.2 or later. ● TLS v1.0 and TLS v1.1 are insecure protocols and are disabled by default. For details about how to enable and disable insecure protocols, see "Setting Service Parameters for User Management". Certificate type This parameter is displayed after TLS is enabled. The options are JKS,P12 and CER,DER,PEM,PVK. JKS, P12 Certific ate type is set to JKS,P12 . Root certifica te Root certificate that needs to be configured for the secure communication mode. - Root certifica te passwor d Password for the root certificate. - Identity certifica te Identity certificate that needs to be configured for the secure communication mode, if two-way authentication is enabled on the LDAP server. - Identity certifica te passwor d Password for the identity certificate. - Certifica te revocati on list List of certificates revoked by the certificate authority (CA). - Root certifica te Root certificate that needs to be configured for the secure communication mode. - Identity certifica te Identity certificate that needs to be configured for the secure communication mode, if two-way authentication is enabled on the LDAP server. - Certific ate type is set to CER,DE R,PEM, PVK. Issue Draft B (2020-11-30) NOTE When the certificate to be imported is in .p12 format, ensure that the values of Identity certificate password and Root certificate password are the same. Copyright © Huawei Technologies Co., Ltd. 230 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter Description Example Private key file Private key file of the LDAP server if twoway authentication is enabled on the LDAP server. - Private key file passwor d Encrypted password for the private key file. - Certifica te revocati on list List of certificates revoked by the certificate authority (CA). - NOTE It is recommended that the passwords for the root certificate, identity certificate, and private key file meet the following requirements: ● Contain a minimum of 16 random characters. ● Contain at least two of the following character types: ● Uppercase letters ● Lowercase letters ● Digits ● Special characters, including !"#$%&'()*+,-./:;\<=>?@[]^`{_|}~ and spaces Table 1-83 User authentication mode parameters Issue Draft B (2020-11-30) Parameter Description Example User authentication mode LDAP server user authentication mode. The options are Fixed user, Login user DN, and Email address. Fixed user Fixed user Adminis trator DN Distinguished name (DN) of an entry that stores administrator information in the LDAP directory. CN=UserNa me, CN=Users, DC=test, DC=com Adminis trator passwor d Password corresponding to the administrator DN. - Copyright © Huawei Technologies Co., Ltd. 231 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter Query syntax Description Example You can set filter criteria to specify the user range. After the filter criteria are set, only remote users who meet the filter criteria can log in to the the PowerEcho. (&(objectCl ass=user) (memberof = CN=exampl e, dc=com)) NOTE ● You are advised to set filter criteria for querying users and the maximum number of remote users meeting the query criteria cannot exceed 1000. ● You are advised not to use sensitive data as query criteria because the LDAP server protects sensitive data and does not allow the data to be queried by external systems. Login user DN User DN prefix Characters in front of the username in the DN of a logged-in user. User DN suffix Characters following the username in the DN of a logged-in user. Query syntax You can set filter criteria to specify the user range. After the filter criteria are set, only remote users who meet the filter criteria can log in to the the PowerEcho. CN= NOTE Take CN=%s, DC=test, DC=com as an example. %s indicates the user. Its DN prefix is CN=. , DC=test, DC=com NOTE Take CN=%s, DC=test, DC=com as an example. %s indicates the user. Its DN suffix is , DC=test, DC=com. NOTE ● You are advised to set filter criteria for querying users and the maximum number of remote users meeting the query criteria cannot exceed 1000. (&(objectCl ass=user) (memberof = CN=exampl e, dc=com)) ● You are advised not to use sensitive data as query criteria because the LDAP server protects sensitive data and does not allow the data to be queried by external systems. Email address Issue Draft B (2020-11-30) Domain name Email domain name of a Windows AD server. The domain user can serve as the username for login. For example, if you have entered %s@example.com in Domain name and s@example.com is the domain account of the server, enter s in Username to log in to the PowerEcho. Copyright © Huawei Technologies Co., Ltd. %s@examp le.com 232 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter Query syntax Description Example You can set filter criteria to specify the user range. After the filter criteria are set, only remote users who meet the filter criteria can log in to the the PowerEcho. (&(objectCl ass=user) (memberof = CN=exampl e, dc=com)) NOTE ● You are advised to set filter criteria for querying users and the maximum number of remote users meeting the query criteria cannot exceed 1000. ● You are advised not to use sensitive data as query criteria because the LDAP server protects sensitive data and does not allow the data to be queried by external systems. NOTE The differences between Fixed User, Login user DN, and Email address are as follows: ● In Fixed User mode, remote user groups can be synchronized. Therefore, you need to obtain the DN and password for the LDAP server administrator. In Login user DN or Email address mode, remote user group information cannot be synchronized. ● In Fixed user mode, you can locally disable the remote users who have been deleted from the remote server. In Login user DN or Email address mode, the system does not support this function. Table 1-84 User Attributes parameters Issue Draft B (2020-11-30) Paramet er Description Example User base DN Base DN used for querying a user. DC=test, DC=com User object class name Class name of a user in the corresponding LDAP server schema. user Unique user ID Keyword of a user in the corresponding LDAP server schema. sAMAccount Name User full name attribute name Full name attribute name of a user in the corresponding LDAP server schema. name User descriptio n attribute name Description attribute name of a user in the corresponding LDAP server schema. description Copyright © Huawei Technologies Co., Ltd. 233 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Paramet er Description Example User's user group attribute name User group attribute name of a user in the corresponding LDAP server schema. memberOf ServerInf o The server information is configured to filter the binding relationship between a user and the user's user group. - User's user group separator Separator of user groups to which remote users belong. The value is obtained from the remote server. If this parameter is not set or there is only one user group on the remote server, you can set this parameter to a special character, such as semi-colon (;), exclamation mark (!), and colon (:), that is not contained in the remote user group name. , NOTE When Windows AD is configured on the LDAP server, the correct user groups can be returned only after User group member attribute name in User Group Attributes is set. Table 1-85 User Group Attributes parameters Issue Draft B (2020-11-30) Paramete r Description Example User group base DN Base DN used for querying a user group. OU=usergro up, DC=test, DC=com User group object class name Class name of a user group in the corresponding LDAP server schema. group Unique user group ID Keyword of a user group in the corresponding LDAP server schema. name User group member attribute name User attribute name of a user group in the corresponding LDAP server schema. member NOTE When Windows AD is configured on the LDAP server, the correct user groups can be returned only after this parameter is set. Copyright © Huawei Technologies Co., Ltd. 234 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Paramete r Description Example User group descriptio n attribute name Description attribute name of a user group in the corresponding LDAP server schema. description Table 1-86 User-to-User Group Bindings parameters Paramete r Description Example Use locally stored bindings When a remote user logs in to the PowerEcho, the remote user belongs to the locally bound role if this parameter is selected. - Use remotely stored bindings When a remote user logs in to the PowerEcho, the remote user belongs to the user group bound to the remote server. - ● If the remote user group has a local role with the same name and the mapping between the remote user group and the local role is not configured, the remote user is automatically bound to the local role with the same name. ● If the remote user group does not have a local role with the same name, you need to configure the mapping between the remote user group and the local role. After the mapping is configured, the remote user is bound to the local role mapping to the remote user group. If this parameter is not set, the remote user will lose the authorization of the user group. NOTE User group names on the LDAP server cannot contain the value of User's user group separator and must meet the naming rule of Role. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 235 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-87 Other parameters Paramete r Description Example Local user authentic ation ● If Local user authentication is selected for LDAP authentication, local users and third-party users are authenticated locally, and remote users are authenticated on the remote server. - NOTE If Local user authentication is selected for LDAP authentication, a remote user with the same name as a local user cannot log in. You are not advised to create a remote user with the same username as a user in the local system. ● If Local user authentication is not selected for LDAP authentication, the admin user is authenticated locally, and the third-party users and remote users are authenticated on the remote server. NOTE If Local user authentication is not selected for LDAP authentication, and the name of the user on the remote server is the same as the name of a created user: ● After the user on the remote server logs in to the system through the login page, the type of the created local user is changed to a remote user. ● After the user on the remote server logs in to the system by calling an interface, the user type of the created local user or remote user is changed to a third-party user. NOTICE If the attributes of a user with the same name change, the user may fail to log in to the system or the user permissions may change. Therefore, you are not advised to create a remote user with the same name as a user in the system. User managem ent ● If User management is selected for LDAP authentication, security administrators can manage local users, third-party users, and remote users. - ● If User management is not selected, the following situations occur: – If Local user authentication is enabled for LDAP authentication, security administrators can manage local users, and perform certain operations on third-party users and remote users, such as creating, querying, exporting, and modifying the users. – If Local user authentication is not enabled for LDAP authentication, security administrators can only query and modify users. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 236 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Paramete r Description Example Allow ungroupe d users to log in ● If you select Allow ungrouped users to log in, remote users who are not bound with user groups can log in to the PowerEcho. - ● If you do not select Allow ungrouped users to log in, remote users who are not bound with user groups cannot log in to the PowerEcho. Disable users who are synchroni zed remotely but do not exist at the remote end ● If you select Disable users who are synchronized remotely but do not exist at the remote end and LDAP authentication is enabled, the system can disable the remote users who have been synchronized to a local server and deleted from the LDAP server. Server check interval After LDAP authentication is enabled, the system checks the connection between the active and standby LDAP servers at an interval specified by this parameter. - ● If you do not select Disable users who are synchronized remotely but do not exist at the remote end, the remote user will not be disabled. 5 1.19.7.5 RADIUS Authentication Parameter Description This section describes the parameters required for configuring remote RADIUS authentication. For actual parameter configurations, contact RADIUS server maintenance personnel. Table 1-88 Basic Information parameters Issue Draft B (2020-11-30) Paramete r Description Example Master server IP address version IP address type of the active RADIUS server. IPv4 Master server IP address IP address of the active RADIUS server. 192.168.0.5 Master server port Port number of the active RADIUS server. 1812 Copyright © Huawei Technologies Co., Ltd. 237 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Paramete r Description Example Standby server IP address version IP address type of the standby RADIUS server. IPv4 Standby server IP address IP address of the standby RADIUS server. 192.168.0.10 Standby server port Port number of the standby RADIUS server. 1812 Authentica tion mode Authentication mode for the RADIUS protocol. The default value is CHAP. CHAP The options are as follows: ● CHAP: Challenge-Handshake Authentication Protocol. ● PAP: Password Authentication Protocol. NOTE You are advised to use CHAP, MS-CHAPv1, MSCHAPv2, and Two-factor because they are more secure than PAP. ● MS-CHAPv1: Microsoft Challenge Handshake Authentication Protocol Version 1. ● MS-CHAPv2: Microsoft Challenge Handshake Authentication Protocol Version 2. ● Two-factor: In this mode, RADIUS authentication supports only the PAP protocol. Shared key Issue Draft B (2020-11-30) Shared key of the RADIUS server. - NOTE For system security purposes, periodically change the shared key. Copyright © Huawei Technologies Co., Ltd. 238 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Paramete r Description Example Local user authentica tion ● If Local user authentication is selected for RADIUS authentication, local users and thirdparty users are authenticated locally, and remote users are authenticated on the remote server. - NOTE If Local user authentication is selected for RADIUS authentication, a remote user with the same name as a local user cannot log in. You are not advised to create a remote user with the same username as a user in the local system. ● If Local user authentication is not selected for RADIUS authentication, the admin user is authenticated locally, and the third-party users and remote users are authenticated on the remote server. NOTE If Local user authentication is not selected for RADIUS authentication, and the name of the user on the remote server is the same as the name of a created user: ● After the user on the remote server logs in to the system through the login page, the type of the created local user is changed to a remote user. ● After the user on the remote server logs in to the system by invoking an interface, the type of the created local user or the remote user is changed to a third-party user. NOTICE If the attributes of a user with the same name change, the user may fail to log in to the system or the user permissions may change. Therefore, you are not advised to create a remote user with the same name as a user in the system. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 239 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Paramete r Description Example User managem ent ● If User management is selected for RADIUS authentication, security administrators can manage local users, third-party users, and remote users. - ● If User management is not selected, the following situations occur: – If Local user authentication is enabled for RADIUS authentication, security administrators can manage local users, and perform certain operations on third-party users and remote users, such as creating, querying, exporting, and modifying the users. – If Local user authentication is not enabled for RADIUS authentication, security administrators can only query and modify users. Table 1-89 Accounting parameters Parameter Enable accounti ng Description Example Master server accounti ng port Active RADIUS server port used for accounting. 1813 Standby server accounti ng port Standby RADIUS server port used for accounting. 1813 Table 1-90 Request Message parameters Issue Draft B (2020-11-30) Parameter Description Example Send client IP address Whether to send the client IP address to the RADIUS server. - Send local identifier Whether to send the local identifier to the RADIUS server. The local identifier is the identifier of the local environment, which is user-defined. GFHJKHL.J K Specify user- ID of the vendor on the RADIUS server. 2011 Vendor ID Copyright © Huawei Technologies Co., Ltd. 240 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter defined attribute s Description Example Subattri bute Type Attribute extended by the vendor. 188 Data Type Data type of Value. String Length Length of Value. 6 Value Value of the extended attribute. 100 Table 1-91 Response Message parameters Parameter Description Exam ple Use locally stored bindings Select this parameter if you do not need to obtain user group bindings from the RADIUS server. - If no corresponding user group exists on the local end, a user synchronized to the local end is not bound to any user group. If a user synchronized to the local end does not have a local user with the same username, the user has no binding relationship. Obtain the user group binding relationship from default attributes NOTE Select this parameter if the user group bindings need to be obtained from the default attribute ReplyMessage(18) in the RADIUS protocol. Obtain the user group binding relationship from user-defined attributes Issue Draft B (2020-11-30) User's user group separat or Separator of user groups to which remote users belong. The value is obtained from the remote server. If this parameter is not set or there is only one user group on the remote server, you can set this parameter to a special character, such as semi-colon (;), exclamation mark (!), and colon (:), that is not contained in the remote user group name. ; Vendor ID ID of the vendor on the RADIUS server. 2011 Subattri bute type Attribute extended by the vendor. 188 Subattri bute name Subtype name of the mapping between user groups and users. - Copyright © Huawei Technologies Co., Ltd. 241 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Parameter NOTE Select this parameter if the user group binding relationship needs to be obtained from the userdefined attribute Vendor-Specific(26) in the RADIUS protocol. User's user group separat or Description Exam ple Separator of user groups to which remote users belong. The value is obtained from the remote server. If this parameter is not set or there is only one user group on the remote server, you can set this parameter to a special character, such as semi-colon (;), exclamation mark (!), and colon (:), that is not contained in the remote user group name. ; 1.19.8 SSO Configuration Single sign-on (SSO) configuration allows users to access multiple mutually trusted application systems after only one login authentication. The PowerEcho supports CAS SSO and SAML SSO. For details, see Table 1-92. Table 1-92 SSO types Issue Draft B (2020-11-30) SSO Type Authentication Protocol Description CAS SSO Allows SSO login complying with the Central Authentication Service (CAS) protocol. In this way, an SSO server is connected to multiple SSO clients to perform unified authentication. When users need to configure the server and clients among multiple systems based on the CAS protocol, they can configure CAS SSO so that the SSO server can authenticate users and access the clients freely. SAM L SSO Allows SSO login complying with the SAML 2.0 (Security Assertion Markup Language 2.0) protocol. In this way, identity providers (IdPs) and service providers (SPs) exchange authentication and authorization data between different security zones. When users have their own IdPs and need to use the PowerEcho to provide services, they can configure SAML SSO so that the IdPs can authenticate users and use the PowerEcho to provide services. Copyright © Huawei Technologies Co., Ltd. 242 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.19.8.1 CAS SSO Configuration Single sign-on (SSO) configuration allows users to access multiple mutually trusted application systems after only one login authentication. 1.19.8.1.1 About CAS SSO This section describes the definition and principles of CAS SSO. CAS SSO allows SSO login complying with the CAS protocol. In this way, an SSO server is connected to multiple SSO clients to perform unified authentication. After successfully logging in to the server, users can access the client without entering the username and password repeatedly. After completing the CAS SSO configuration and successfully logging in to the server, users can access all the clients without entering the username and password repeatedly. Assume that system 1 is the SSO server, and system 2, system 3, ..., and system N are SSO clients. Figure 1-18 shows the SSO configuration. Figure 1-18 Authentication scheme between the SSO server and SSO clients System configurations: 1. Issue Draft B (2020-11-30) Configure system 1 as the SSO server and configure the trust addresses of the SSO clients on the SSO Server tab page of system 1. That is, set the IP addresses of system 2, system 3, ..., and system N to trusted addresses. Copyright © Huawei Technologies Co., Ltd. 243 iManager NetEco Administrator Guide 2. 1 NetEco Administrator Guide Configure system 2, system 3, ..., and system N as SSO clients. Set Authentication URL and Validation URL of the SSO server (IP address of system 1) on the SSO Client tab page of system 2, system 3, ..., and system N. User access: 1. To access client 1 for the first time, a user enters the IP address or domain name of client 1 in the address box of a browser, presses Enter, and enters the username and password. 2. The user information is sent to the SSO server for login authentication. 3. The SSO server authenticates the username and password and sends an authentication success message to client 1. 4. The user logs in to client 1 successfully. 5. To access client 2 for the first time, a user enters the IP address or domain name of client 2 in the address box of a browser and presses Enter. 6. The SSO server determines that the login authentication is successful. 7. The user logs in to client 2 successfully. 1.19.8.1.2 Configuring CAS SSO CAS SSO configuration consists of SSO Servers and SSO Clients. In SSO mode, you can log in to all other mutually trusted clients without entering the user name and password again after logging in to a client. Prerequisites ● The SSO server has been installed and correctly configured. ● You have obtained the address of the SSO server to be interconnected with the SSO client, such as the domain name or IP address. ● If the SSO server requires remote authentication, the remote authentication must be enabled on the SSO server before you configure SSO. ● You have logged in to the PowerEcho as the admin user. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Choose System > Security Management > Security Settings from the main menu. Step 2 In the navigation pane, choose SSO Configuration > CAS SSO Configuration. Step 3 On the SSO Clients tab page, set Authentication URL and Validation URL of the CAS SSO server connected to the current system. Then, set Backup authentication URL and Backup validation URL as required. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 244 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE ● Authentication URL and Validation URL are the IP addresses or domain names of the CAS SSO server. – If the CAS SSO server does not distinguish the authentication server from the verification server, the values of Authentication URL and Validation URL are the same. – If the CAS SSO server distinguishes the authentication server from the verification server, the values of Authentication URL and Validation URL are different. ● If the CAS SSO server has a standby server, configure Backup authentication URL and Backup validation URL to improve system security. Step 4 Click Apply. Step 5 Verify the CAS SSO configuration after the SSO client parameters are configured. 1. In the address box of the browser, enter the IP address or domain name of client 1 and press Enter. The IP address in the address box of the browser is automatically converted to the IP address of the CAS SSO server. 2. Enter the username and password of client 1. After the authentication is successful, you will successfully log in to client 1. 3. When the session of client 1 is valid, open a new tab page on the browser and enter the IP address or domain name of client 2, and press Enter. If you can automatically log in to client 2 without entering the username and password, the CAS SSO configuration is successful. NOTE After SSO is configured, a server user cannot log in to the SSO client in the following situations: – The server username is the same as the name of a third-party user or a default user other than admin. – The server user name does not meet the setting rule of Username. ----End Related Tasks Delete the CAS SSO client configuration. Step 1 Choose System > Security Management > Security Settings from the main menu. Step 2 In the navigation pane, choose CAS SSO Configuration. Step 3 On the SSO Clients tab page, click Close. ----End 1.20 NetEco Maintenance Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 245 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.20.1 Network Diagnostics This section describes how to check the network connection status between the NetEco server and device. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose Maintenance > NetEco Maintenance > Network Diagnostics from the main menu. Step 2 Set Equipment IP Address, Port Number, and Packets. Step 3 Click Check. ----End 1.20.2 Run Logs Collection This section describes how to obtain the running logs of each module of the NetEco. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose Maintenance > NetEco Maintenance > Run Logs Collection from the main menu. Step 2 Set Start Time and End Time, and select the Module Logs. Step 3 Click Collect Logs, after the similar information Logs collected successfully is displayed in the system, click confirm. Step 4 Click Export to download the log file to your local PC. Step 5 Optional: If you need to set the level of logs to be printed in the next period of time, select logs, select Current Log Level, set Validity Period, and click Modify. NOTE Click Restore to reset the log level. ----End 1.20.3 Routine Inspection This section describes how to check the health status of the NetEco server using the PowerEcho client to learn related information about the OS, database and Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 246 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NetEco software. You can export the health check report and download it to the local PC for view. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose Maintenance > NetEco Maintenance > Routine Inspection from the main menu. Step 2 Select NetEco CPU usage and disk I/O status as required. NOTE If you select this option, the check takes at least 10 minutes. If this option is not selected, the check result does not contain the check items NetEco CPU Usage and Disk I/O Usage status. Step 3 Click Inspect Health. When the inspection is complete, you can click Export Report to download the file to your local PC. Then decompress the file to view inspection results. ----End 1.20.4 History Report This section describes how to download the health check reports using the PowerEcho. You can download the health check reports for the latest 10 health inspection report. These logs can be used for identifying the causes of NetEco system faults. Prerequisites ● You have logged in to the PowerEcho For details, see 1.1.2 Logging In to the PowerEcho. ● Routine inspection has been performed. For details, see 1.20.3 Routine Inspection. Procedure Step 1 On the PowerEcho, choose Maintenance > NetEco Maintenance > History Report from the main menu. Step 2 Click Download to download the health check reports to your local PC. ----End 1.20.5 HA Management This section describes how to view the service running status, data synchronization status, and master/slave database instance running status of the active and standby NetEco nodes, and how to perform switchover between the active and Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 247 iManager NetEco Administrator Guide 1 NetEco Administrator Guide standby NetEco nodes or master and slave database instances. This function can be used only in cluster scenarios. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Choose Maintenance > NetEco Maintenance > HA Management from the main menu. If You Need To... Then... View the service running status on the active and standby nodes In the NetEco HA Management area, check the service running status of the active and standby nodes. View the running status of the master and slave database instances In the Database HA Management area, view the running status of the master and slave database instances. Perform switchover between the active and standby nodes When the available memory of the active node is small or the active node is faulty, you can perform switchover between the active and standby nodes. 1. Start NetEco services. For details, see 1.4.3 Starting Product Services. 2. When Synchronization Progress is 100% and Synchronization Status is Normal ,in the NetEco HA Management area, click . 3. In the displayed dialog box, click OK. NOTE During the switchover, the PowerEcho cannot be operated. After about 3 to 5 minutes, refresh the page and log in to the PowerEcho again. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 248 iManager NetEco Administrator Guide 1 NetEco Administrator Guide If You Need To... Then... Perform switchover between the master and slave databases When the master database is faulty, you can perform switchover between the master and slave databases. 1. Stop NetEco services. For details, see 1.5.2 Stopping Product Services. 2. In the Database HA Management area, click . 3. In the displayed dialog box, click OK. NOTE The switchover takes about 3 to 5 minutes. ----End 1.20.6 Viewing Server Information This section describes how to use the PowerEcho to view Software Information, Resource Information, and Hardware Information of a NetEco server. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Choose Maintenance > NetEco Maintenance > Server Information from the main menu. On the page, view the NetEco server information such as theversion information, CPU usage, and iBMC IP address. NOTE ● Inthe cluster scenario, you can view the information about a NetEco server byselecting the corresponding node tab. ● Server information is updated every 30 seconds, and CPU details are updated every 5 seconds. ----End 1.21 File System of The NetEco This section describes the file system of the NetEco. The file system mainly includes the information about the directory structure of the NetEco software. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 249 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-93 NetEco Software installation directories Directory Description /opt/oss Root directory for installing the NetEco program, including subdirectories of the the PowerEcho, the NetEco, and logs /opt/zenith Zenith installation directory (service database) /opt/neteco Directory for storing the NetEco service data /opt/neteco_backup NetEco backup directory /opt/NetEcoTools Directory for storing the NetEco uninstallation script /opt/pub Directory for storing large files generated during the NetEco installation /opt/patch_manager Third-party patch framework running directory for the NetEco /opt/redis Redis installation directory /opt/repo Directory for storing the NetEco product package and deployment tool /opt/share Shared data directory between services 1.22 Routine Maintenance 1.22.1 Daily Maintenance This section describes daily maintenance tasks to ensure the stable system operation. 1.22.1.1 Checking Logs (the PowerEcho) The PowerEcho records three types of O&M logs: security logs, system logs, and operation logs. You can periodically check whether exceptions are recorded in these logs to proactively identify potential security risks and running exceptions on the PowerEcho. You can locate and rectify faults in a timely manner based on the information recorded in the logs, ensuring proper running and security of the PowerEcho. Prerequisites ● Issue Draft B (2020-11-30) You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Copyright © Huawei Technologies Co., Ltd. 250 iManager NetEco Administrator Guide ● 1 NetEco Administrator Guide To query logs in CLI mode, you need to obtain the passwords for the sopuser and ossadm users of the management node. Context The logs are classified into security logs, system logs, and operation logs. ● Security logs record user operations that affect system security, such as logging in to the system, changing passwords, creating users, and logging out of the system. ● System logs record system-triggered events, such as abnormal system running, network failures, and attacks against the system. These logs help you analyze the system status and rectify faults. ● Operation logs record user operations that do not affect system security, such as creating subnets and exporting current alarms. ● Query logs on the web client. Procedure Step 1 Open the desired log page as follows: ● To query security logs, choose System > Log Management > Security Logs from the main menu of the PowerEcho. ● To query system logs, choose System > Log Management > System Logs from the main menu of the PowerEcho. ● To query operation logs, choose System > Log Management > Operation Logs from the main menu of the PowerEcho. on the left of Filter Criteria and set the following filter criteria in the Step 2 Click displayed area: ● Select Risk from the Level drop-down list. ● Select Failed and Partially successful from the Result drop-down list. Step 3 Click Filter and check whether any exception or fault information exists in the list. NOTE Click Export All or Export Selected to export the logs to your local PC for query and analysis. ----End ● Query logs in the dump path. NOTE Security logs, system logs, and operation logs are stored in the database after being generated. To ensure sufficient database space, the system automatically dumps the logs that meet the conditions to the /opt/share/oss/manager/MCCommonService/ dump/timestamp/timestamp directory on the hard disk as files. If the dump directory does not exist, the logs have not been dumped. Step 1 Use PuTTY to log in to the management node, as the sopuser user in SSH mode. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 251 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE If the PowerEcho is deployed in cluster mode, perform operations only on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to create a temporary directory and copy the log files to the directory: > mkdir -p /tmp/log > cp /opt/share/oss/manager/MCCommonService/dump/timestamp/ timestamp/log file /tmp/log Step 4 Run the following command to configure permissions for the log files: > chmod 750 /tmp/log/log file Step 5 Run the following command to switch back to the sopuser user: > exit Step 6 Run the following commands to copy the log files from the temporary directory to the /home/sopuser directory and configure permissions for the log files: > cp /tmp/log/log file /home/sopuser > chmod 600 /home/sopuser/log file Step 7 Use FileZilla to download the log files in .csv or zip format in the /home/sopuser directory on the management node to a directory on your local PC, as the sopuser user in SFTP mode. For details, see 1.24.2 Transferring Files Using FileZilla. Step 8 Delete the temporary files. 1. Use PuTTY to log in to the management node, as the sopuser user in SSH mode. 2. Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user 3. Run the following command to delete the temporary files: > rm -rf /tmp/log 4. Run the following command to switch back to the sopuser user: > exit 5. Run the following command to delete the temporary files in the /home/ sopuser directory: rm -rf /home/sopuser/log file ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 252 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Expected Result ● Security logs, system logs, and operation logs at the Risk level are not displayed in the list. ● Security logs, system logs, and operation logs with the Failed, Unknown, or Partially successful operation result are not displayed in the list. Exception Handling You can click the value in the Details column of the row that contains the security log, system log, or operation log at the Risk level or with the Failed or Partially successful operation result to locate the fault and troubleshoot it. 1.22.1.2 Checking Logs (the NetEco) The system records three types of logs: security logs, system logs, and operation logs. You can periodically check whether exceptions are recorded in these logs to proactively identify potential security risks and running exceptions on the system. You can locate and rectify faults in a timely manner based on the information recorded in the logs, ensuring proper running and security of the system. Prerequisites ● You have logged in to the NetEco as a security administrator. For details, see 1.1.1 Logging In to the NetEco. ● You have the Query Security Log, Query System Log, and Query Operation Log permissions. ● You have obtained the passwords for the sopuser and ossuser users for logging in to the node where SMLogLic resides. Context The logs are classified into security logs, system logs, and operation logs. ● Security logs record user operations that affect system security, such as logging in to the system, changing passwords, creating users, and logging out of the system. ● System logs record system-triggered events, such as abnormal system running, network failures, and attacks against the system. These logs help you analyze the system status and rectify faults. ● Operation logs record user operations that do not affect system security, such as creating subnets and exporting current alarms. ● Query logs on the web page. Procedure Step 1 Choose one of the following menus as needed: Issue Draft B (2020-11-30) ● To query security logs: Choose Security > Log Management > Security Logs. ● To query system logs: Choose Security > Log Management > System Logs. ● To query operation logs: Choose Security > Log Management > Operation Logs. Copyright © Huawei Technologies Co., Ltd. 253 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 2 Click area: next to Filter Criteria, and set the following filter criteria in the displayed ● Select Risk from the Level drop-down list. ● Select Failed and Partially successful from the Result drop-down list. Step 3 Click Filter and check whether any exception or fault information exists in the list. NOTE You can click Export All or Export Selected to export logs to your local PC to facilitate log viewing and analysis. ----End ● Query logs in the dump path. NOTE Security logs, system logs, and operation logs are stored in the database after being generated. To ensure sufficient database space, the system automatically dumps the logs that meet the conditions to the /opt/share/oss/NetEco/XXXService/dump/ timestamp/timestamp directory on the hard disk. XXXService can be SMLogLicService or MCCommonService. The dump directory exists only after log dump occurs. Step 1 Use PuTTY to log in to the node where SMLogLic resides, as the sopuser user in SSH mode. For details about how to obtain the IP address of the node where a service resides, see 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides? Step 2 Run the following command to switch to the ossuser user: su - ossuser Password: password for the ossuser user Step 3 Run the following commands to create a temporary directory and copy the log files to the directory: mkdir -p /tmp/log cp /opt/share/oss/NetEco/XXXService/dump/timestamp/timestamp/log file /tmp/log Step 4 Run the following command to configure permissions for the log files: chmod 750 /tmp/log/log file Step 5 Run the following command to exit from the ossuser user: exit Step 6 Run the following commands to copy the log files from the temporary directory to /home/sopuser directory and configure permissions for the log files: cp /tmp/log/log file/home/sopuser chmod 600 /home/sopuser/log file Step 7 Use FileZilla to log in to the node where SMLogLic resides, as the sopuser user in SFTP mode. Download the .csv or .zip log file from /home/sopuser to any directory on the local PC. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 254 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 8 Use PuTTY to run the following command to delete the log files in the /home/ sopuser directory, as the sopuser user. rm -rf /home/sopuser/log file Step 9 Switch to the ossuser user and run the following command to delete the log files in the /tmp/log directory: rm -rf /tmp/log/log file ----End Expected Result ● Security logs, system logs, and operation logs at the Risk level are not displayed in the list. ● Security logs, system logs, and operation logs with the Failed, Unknown, or Partially successful operation result are not displayed in the list. Exception Handling You can click the value in the Details column of the row that contains the security log, system log, or operation log at the Risk level or with the Failed or Partially successful operation result to locate the fault and troubleshoot it. 1.22.1.3 Checking Whether Online Users Are Authorized (the NetEco) You can check whether the status and operations of online users on the NetEco comply with the plan, ensuring system security. Prerequisites You have logged in to the NetEco as a security administrator. For details, see 1.1.1 Logging In to the NetEco. Procedure Step 1 Choose Security > System Security > User Management. Step 2 In the navigation pane, choose Online Users. Step 3 Refresh the user list. Step 4 Click Monitor in the Operation column of the row that contains the user to be queried, and view operations of this user in the User Operations area. ----End Expected Result Issue Draft B (2020-11-30) ● The login IP address and login time in the user list comply with the plan. ● The role to which the user is attached complies with the plan. Copyright © Huawei Technologies Co., Ltd. 255 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Exception Handling ● ● If an online user meets one of the following conditions, click Log Out in the Operation column of the row that contains this user to forcibly log it out and then modify the policies and information about it as planned: – The login time policy does not comply with the plan. – The client IP address policy does not comply with the plan. – The role to which the user is attached does not comply with the plan. If an online user has performed operations of the Risk level, check whether these operations comply with the plan. If they do not, modify permissions of this user. 1.22.2 Weekly Maintenance This section describes weekly maintenance tasks to ensure the stable system operation. 1.22.2.1 Checking Backup Data O&amp;M personnel must periodically check the backup file status of the PowerEcho, product data, product applications, and database applications to ensure that backup files can be obtained in a timely manner to restore the system when exceptions occur. Prerequisites ● The IP address of the backup server has been obtained. ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Check the backup file status of the PowerEcho, product data, product applications, and database applications. For details, see Table 1-94. Table 1-94 Checking backup files Issue Draft B (2020-11-30) Task Operation Check the backup files of product data. Choose Backup and Restore &gt; Data Restoration &gt; Restore Product Data from the main menu, and check the backup files in the Backup File column. Check the backup file of product applications. Choose Backup and Restore &gt; Data Restoration &gt; Restore Product Application from the main menu, and check the backup files in the Backup File column. Copyright © Huawei Technologies Co., Ltd. 256 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Task Operation Check the backup files of database applications. Choose Backup and Restore &gt; Data Restoration &gt; Restore Database Application from the main menu and check the backup files in the Backup File column. Check the backup files of the PowerEcho. 1. Use PuTTY to log in to the backup server as a user with SSH access permission. 2. Run the following command to query backup files in the backup path: &gt; cd /root directory of the backup server user/path specified in the backup parameters/management/management/ timestamp/node name NOTE For example, if the login user of the backup server is ossadm, the directory is /home/ ossadm/bin/management/management/ 20190829002834588/node. 3. Run the following command to query the size of the backup files in the backup path: &gt; ll -h /root directory of the backup server user/path specified in the backup parameters /management/management/ timestamp/node name Information similar to the following is displayed. Check the size of the management.tar.gz package. In this example, the size is 3.2 GB. <b id="en-us_topic_0179298209_b5128351517" class="+ topic/ph hi-d/b ">total 3.2G</b> -rw-------. 1 root root <b id="enus_topic_0179298209_b1812123555113" class="+ topic/ph hi-d/b ">3.2G</b> Dec 7 20:57 management.tar.gz -rw-------. 1 root root 225 Dec 7 20:57 management.tar.gz.sign ● If backup files exist, no further action is required. ● If the backup files do not exist, go to Step 2. Step 2 Back up data. For details, see Table 1-95. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 257 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-95 Backing up data Task Operation Back up product data. 1. Choose Backup and Restore &gt; Configuration &gt; Configure Scheduled Backup Task from the main menu and check whether the scheduled backup task is enabled. – If it is enabled, go to Step 2.2. – If it is not enabled, enable the scheduled backup task. 2. Choose Backup and Restore &gt; Data Backup &gt; Back Up Product Data from the main menu. On the Back Up Product Data page, manually back up the product data as prompted. Back up product applications. Choose Backup and Restore &gt; Data Backup &gt; Back Up Product Application from the main menu. On the Back Up Product Application page, perform operations as prompted. Back up database applications. Choose Backup and Restore &gt; Data Backup &gt; Back Up Database Application from the main menu. On the Back Up Database Application page, perform operations as prompted. Back up the PowerEcho application and data. Choose Backup and Restore &gt; Data Backup &gt; Back Up PowerEcho from the main menu. On the Back Up PowerEcho page, perform operations as prompted. ● If the backup task is successfully executed, no further operation is required. ● If the backup task fails, choose System &gt; Task List from the main menu. On the page that is displayed, click and view the failure information about the backup task in the Details area. Then rectify the fault based on the information or contact Huawei technical support. ----End 1.22.2.2 Checking User Configuration (the NetEco) You can check user configuration on the NetEco, including basic user information, the role to which a user is attached, and user access control policies, ensuring system security. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 258 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Prerequisites You have logged in to the NetEco as a security administrator. For details, see 1.1.1 Logging In to the NetEco. Procedure Step 1 Choose Security > System Security > User Management. Step 2 In the navigation pane, choose Users. Step 3 On the Users page, click the user to be viewed. The user details page is displayed. NOTE Click and choose Export All Users, or select multiple users and click Export Selected Users to export and view user information in batches. Step 4 Click the Basic Information, Roles, and Access Policies tabs to check whether the user configuration is correct. ----End Expected Result ● Basic user information is correctly configured. ● The user is attached to the planned role. User permissions and managed objects comply with the plan. ● User access control policies are correct. That is, the login time policy and client IP address policy comply with the plan. Exception Handling If the configuration of a user does not comply with the expected result, click the username and configure the user information as planned. 1.22.3 Monthly Maintenance This section describes monthly maintenance tasks to ensure the stable system operation. 1.22.3.1 Checking the Certificate Validity Period (the PowerEcho) This section uses the IR certificate as an example to describe how to check the validity period of the certificate. Check the validity period of other certificates by replacing the path in the command as required. Prerequisites You have obtained the IP address of the management node and the passwords for the sopuser and ossadm users. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 259 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to check the certificate validity period: > cd /opt/oss/manager/etc/ssl/internal > cat server.cer The following information is displayed: Certificate: Data: ... Validity Not Before: Mar 31 05:28:05 2015 GMT Not After : Mar 28 05:28:05 2025 GMT ... Information following Validity indicates the certificate validity period. The time on the right of Not After indicates the time when the certificate expires. If the certificate is about to expire, update it to ensure the proper running of the related functions. ----End 1.22.3.2 Cleaning Up Disk Space Symptom Operations such as logging in to the system or installing software packages occasionally fail due to insufficient disk space. Prerequisites You have obtained the passwords for the sopuser and root users of the node whose disk space is to be cleared. Possible Causes The system has been running for a long time but the disk space has not been cleared. As a result, the disk space is insufficient. Procedure NOTICE Deleted files cannot be restored. Exercise caution when performing the following operations. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 260 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 1 Use PuTTY to log in to the node whose disk space is to be cleared, as the sopuser user in SSH mode. NOTE To clear the disk space of the backup server, log in to the node as the backup server user. Step 2 Run the following command to switch to the root user: > su - root Password: password for the root user Step 3 Run the following command to check the usage of each partition: # df -h In the command output, if the usage of a partition exceeds 80%, clear the space. Filesystem Size Used Avail Use% Mounted on /dev/xvda3 17G 2.5G 14G 16% / devtmpfs 7.8G 152K 7.8G 1% /dev tmpfs 7.8G 0 7.8G 0% /dev/shm /dev/xvda1 1003M 50M 903M 6% /boot /dev/xvda5 1003M 18M 935M 2% /home /dev/xvda10 5.0G 915M 3.9G 19% /usr /dev/xvda6 3.0G 176M 2.7G 7% /var /dev/xvda7 5.0G 3.0G 1.7G 64% /var/log /dev/xvda8 1003M 18M 935M 2% /var/log/audit /dev/xvda9 1003M 18M 935M 2% /var/tmp /dev/mapper/oss_vg-opt_vol 89G 76G 13G 85% /opt /dev/mapper/oss_vg-optlog_vol 30G 178M 28G 1% /opt/log Step 4 For example, to clear the /opt directory, run the following commands to go to the /opt directory and sort the directories in descending order of occupied space size (unit: MB). # cd /opt # du -sm * |sort -rn The following command output shows that the pub directory occupies the largest space, that is, about 12.5 GB. 12492 pub 5887 tools …… 1 aquota.user 1 aquota.group Step 5 Run the following commands to go to the pub directory and sort the directories in descending order of occupied space size (unit: MB). # cd pub # du -sm * |sort -rn The following command output shows that the software directory occupies the largest space. 12492 software 557 upload 1 manager 1 backup_local Step 6 Run the following commands to go to the software directory and find unnecessary files that occupy large space: Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 261 iManager NetEco Administrator Guide 1 NetEco Administrator Guide # cd software # du -sm * |sort -rn Find unnecessary files that occupy large space in the displayed file list and record the file names. Step 7 Run the following command to delete the unnecessary files: # rm -r xxx NOTE ● xxx indicates files to be deleted. ● The deleted files cannot be restored. Exercise caution when performing this operation. Step 8 Run the following command to exit the root user: # exit Step 9 Repeat the preceding operations to clear the space of directories whose usage exceeds 80% if any. Otherwise, skip this step. ----End Suggestions Check and clear the disk space periodically. 1.22.3.3 Checking the Time Zone and Time You need to periodically check that the time zone and time are correct. Otherwise, time-related operations, such as backup, restoration, and operation log recording, may be affected. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. ● You have obtained the local time zone and time of the node. You can visit https://www.timeanddate.com to query the local standard time zone and time of the node. Procedure Step 1 On the PowerEcho, choose Maintenance > Time Management > Configure Time Zone and Time from the main menu. Step 2 Check whether the current time zone and time of the node are consistent with the local time zone and time of the node. ● If the time zones and time are consistent, no further action is required. ● If the time zones and time are not consistent, change the time zone and time of the node. For details, see 1.7.1 Changing the Time Zone and Time. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 262 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.22.4 Quarterly Maintenance This section describes quarterly maintenance tasks to ensure the stable system operation. 1.22.4.1 Changing Passwords For details, see 1.15 Password Management. 1.23 FAQ 1.23.1 Notifications When setting the parameters for connecting the system to an email server, you need to configure the certificate of the email server if the SSL/TLS secure connection is enabled. This section describes how to obtain an email server certificate on Chrome, and Firefox. 1.23.1.1 How Do I Obtain a Mail Server Certificate on Google Chrome? Question How do I obtain a mail server certificate on Google Chrome? Answer NOTE Operations on the browser may vary depending on browser versions but are similar to the examples in the following steps. You are advised to perform the operations based on actual situations. Step 1 In the address box on Google Chrome, enter the IP address for logging in to the mail server and press Enter. Step 2 Press F12. On the displayed console, click the Security tab and click View Certificate. NOTE If the console is not displayed after you press F12, allow the console to be displayed in the pop-up blocker and press F12 again. Step 3 In the Certificate window, click the Certificate Path tab, and then select the certificate root path, for example, Huawei IT Root CA. Step 4 Click the Details tab and click Copy to File. Step 5 In the displayed Certificate Export Wizard window, click Next. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 263 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 6 Select Base64 code X.509 (.CER) for Export Format and click Next. Step 7 Click Browse. In the displayed Save As dialog box, select the certificate storage path, enter a name for the certificate, and click Save. Step 8 Click Next. Step 9 In the displayed dialog box, click Finish."The export was successful." is displayed. ----End 1.23.1.2 How Do I Obtain a Mail Server Certificate on Firefox? Question How do I obtain a mail server certificate on Firefox? Answer NOTE Operations on the browser may vary depending on browser versions but are similar to the examples in the following steps. You are advised to perform the operations based on actual situations. Step 1 In the address box on Firefox, enter the IP address for logging in to the mail server and press Enter. Step 2 Click on the left of the address box. Step 3 Click More Information. Step 4 On the Security tab page, click View Certificate. Step 5 On the Details tab page, click Export. Step 6 Select the certificate storage path, enter a name for the certificate, and click Save. ----End 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides? Symptom To locate faults of a service, you need to obtain the management IP address of the node where the service resides. Context A service may correspond to one or more service instances. A service instance contains one or more processes. Each process may be deployed on the same or different nodes. FEBS is used as an example to describe how to query the management IP address of the node where a service resides. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 264 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 Log in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Step 2 Choose Product > System Monitoring from the main menu. Step 3 In the upper left corner of the System Monitoring page, move the pointer to and select the product or PowerEcho. Step 4 On the System Monitoring page, click the Services tab. Step 5 In the upper left corner, enter FEBS in the search box and press Enter. All FEBS service instances of the current product are displayed. Step 6 Click the service instance name. The page for service details is displayed. NOTE If there are multiple service instances, click them one by one. Step 7 In the Processes area, click the node name corresponding to the process. Step 8 On the top of the page for node details, view the IP address, which is the management IP address of the node. Step 9 Log in to the node. For details, see 1.23.6 How Do I Log In to the OS of a Node? ----End 1.23.3 How Do I Query the IP Address of the Node Where a Database Instance Resides? Symptom To locate faults of a database, you need to obtain the management IP address of the node where the database instance resides. Procedure Step 1 Log in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Step 2 Choose Product > System Monitoring from the main menu. Step 3 In the upper left corner of the System Monitoring page, move the pointer to and select the product or PowerEcho. Step 4 On the System Monitoring page, click the Relational Databases or Redis Databases tab. On the tab page, click the node name corresponding to the database instance in the database instance list. Step 5 On the top of the page for node details, view the IP address, which is the management IP address of the node. Step 6 Log in to the node. For details, see 1.23.6 How Do I Log In to the OS of a Node? ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 265 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.23.4 How Do I Query the IP Address of a Node? Symptom During service fault locating or in other scenarios, you need to obtain the management IP address of a node based on the name of the node where the service resides. Procedure The following describes how to query the management IP address of a node: Step 1 Log in to the PowerEcho. For details, see Logging In to the PowerEcho. Step 2 Choose Product > System Monitoring from the main menu. In the upper left corner of the System Monitoring page, move the pointer to and select the product or PowerEcho. On the System Monitoring page, click the Nodes tab. NOTE You can determine the deployment mode of the PowerEcho by checking the number of management nodes on the Nodes tab page of PowerEcho. ● If there is only one management node, the PowerEcho is deployed in single-server mode. ● If there are multiple management nodes, the PowerEcho is deployed in cluster mode. Step 3 In the Node Name column, click the name of the node whose management IP address is to be queried. Step 4 On the top of the page for node details, view the IP address, which is the management IP address of the node. Step 5 Log in to the node. For details, see 1.23.6 How Do I Log In to the OS of a Node? ----End 1.23.5 How Do I Query the Floating IP Address of a Node? Symptom To locate faults of a service, you need to obtain the floating IP address based on the name of the node where the service resides. Procedure Step 1 Log in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Step 2 Choose Maintenance > Network Configuration > Configure Floating IP Address from the main menu. Step 3 In the floating IP address list on the Configure Floating IP Address page, view the floating IP address in the row that contains the corresponding node. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 266 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.23.6 How Do I Log In to the OS of a Node? Symptom The operations of logging in to the OS of a node vary according to the network connection between the client and the node. Procedure The operations of logging in to the OS of a node can be classified in to two types based on the network connection between the client and the node. ● If the network connection between the client and the target node is normal: Use PuTTY to log in to the target node as the OS user in SSH mode. ● If the network connection between the client and the management node is normal, but the network connection between the client and the target node is isolated: a. Use PuTTY to log in to the management node as the OS user in SSH mode. NOTE If the PowerEcho is deployed in cluster mode, use the floating IP address of the management node to log in. If you are updating the CA certificate, you are not advised to use the floating IP address of the management node to log in. Otherwise, the SSH connection will be disconnected if the floating IP address becomes abnormal. b. Run the following command to switch to the target node: ssh IP address of the target node 1.23.7 How Do I Check the Disk Usage? Periodically check the disk usage to prevent the system from being affected by insufficient space. Precautions For the backup server node, if the available space of the /opt directory is insufficient, the backup tasks may fail. Periodically check the space and rectify the fault. Procedure Step 1 Use PuTTY to log in to the backup server as the backup server user in SSH mode. For details, see 1.1.2 Logging In to the PowerEcho. NOTE If the management node is used as the backup server, log in to the backup server as the sopuser user in SFTP mode and then switch to the backup server user. Step 2 Run the following command to check the usage of each partition: # df -h Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 267 iManager NetEco Administrator Guide 1 NetEco Administrator Guide The backup directory /opt/backup on the backup server is used as an example. The /opt partition where the backup directory resides has only 13 GB free space. Clear the space in a timely manner. For details, see 1.22.3.2 Cleaning Up Disk Space Filesystem Size Used Avail Use% Mounted on /dev/xvda3 17G 2.5G 14G 16% / devtmpfs 7.8G 152K 7.8G 1% /dev tmpfs 7.8G 0 7.8G 0% /dev/shm /dev/xvda1 1003M 50M 903M 6% /boot /dev/xvda5 1003M 18M 935M 2% /home /dev/xvda10 5.0G 915M 3.9G 19% /usr /dev/xvda6 3.0G 176M 2.7G 7% /var /dev/xvda7 5.0G 3.0G 1.7G 64% /var/log /dev/xvda8 1003M 18M 935M 2% /var/log/audit /dev/xvda9 1003M 18M 935M 2% /var/tmp /dev/mapper/oss_vg-opt_vol 89G 76G 13G 85% /opt /dev/mapper/oss_vg-optlog_vol 30G 178M 28G 1% /opt/log ----End 1.23.8 How Do I Determine the Deployment Mode of the PowerEcho? Check the number and names of nodes to determine whether the PowerEcho is deployed in single-server or cluster mode. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select PowerEcho. Step 3 Click the Nodes tab, and view the Node Name column. ● If there is only one node, that is Management, the PowerEcho is deployed in single-server mode. ● If there are multiple nodes, the PowerEcho is deployed in cluster mode. ----End 1.23.9 How Do I Determine the Deployment Mode of Nodes? Check the IP addresses of the management node and product nodes to determine whether the management node and a product node are the same node. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 268 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 Check and record the IP address of the management node. 1. On the PowerEcho, choose Product > System Monitoring from the main menu. 2. In the upper left corner of the System Monitoring page, move the pointer to and select PowerEcho. 3. On the Nodes tab page, click the node name. In the upper left corner of the page for node details, record the management IP address. NOTE If the PowerEcho is deployed in cluster mode, that is, there are multiple management nodes on the Nodes tab page, view and record the management IP address of each management node. Step 2 Check and record the management IP address of each product node, and check whether it is the same as the management IP address of the management node. 1. On the PowerEcho, choose Product > System Monitoring from the main menu. 2. In the upper left corner of the System Monitoring page, move the pointer to and select the product. 3. On the Nodes tab page, click the name of each node. In the upper left corner of the page for node details, check whether the management IP address is the same as that recorded in Step 1. – If yes, the management node and the product node are the same node. – If no, the management node and the product node are different nodes. ----End 1.23.10 How Do I Determine the Deployment Mode of a Database Instance? Check the database information of the PowerEcho or a product to determine whether the database instance of the PowerEcho or the product is a single instance or has master/slave relationship. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose Product > System Monitoring from the main menu. Step 2 In the upper left corner of the System Monitoring page, move the pointer to and select PowerEcho or the product. Step 3 On the Relational Database tab page, check the role of the database instance. ● Issue Draft B (2020-11-30) If Role in the row that contains the database instance is Master, the database instance is a master instance. Copyright © Huawei Technologies Co., Ltd. 269 iManager NetEco Administrator Guide 1 NetEco Administrator Guide ● If Role in the row that contains the database instance is Slave, the database instance is a slave instance. ● If Role in the row that contains the database instance is --, the database instance is a single instance. ----End 1.23.11 How Do I Check Whether Management Nodes and Product Nodes Use the Same Database Software? Check whether the database software used by the management node is the same as that used by the product node. Prerequisites ● You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 Check and record the database software that the management node on the codeployed node use. 1. On the PowerEcho, choose Product > System Monitoring from the main menu. 2. In the upper left corner of the System Monitoring page, move the pointer to and select PowerEcho. 3. On the Relational Databases tab page, view and record the database type of the management node in the Database Type column. Step 2 Check the database software that the product node on the co-deployed node use, and check whether the product node and the management node use the same database software. 1. On the PowerEcho, choose Product > System Monitoring from the main menu. 2. In the upper left corner of the System Monitoring page, move the pointer to and select the product. 3. On the Relational Databases tab page, check whether the value in the Database Type column is the same as that recorded in Step 1. – If yes, the management node and the product node use the same database software. – If no, the management node and the product node use different database software. ----End 1.23.12 Performing Security Hardening or Dehardening for Internal Ports After the server is installed, deploy a hardware firewall to reduce risks of attacks on the server to improve security. If the hardware firewall is unavailable, you are Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 270 iManager NetEco Administrator Guide 1 NetEco Administrator Guide advised to configure the OS firewall to perform security hardening for the internal ports of the server to ensure the security. Prerequisites ● You have obtained the passwords for the sopuser and ossadm users of the management node. ● The firewall functions provided by the OS have been enabled. ● Security hardening files have been imported when you import the planning data package. Context After the security hardening has been performed for the product ports, you can perform security hardening for all nodes of the product. After the security hardening, internal ports can be accessed only from internal nodes. This improves the security. Procedure Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. NOTE If the PowerEcho is deployed in cluster mode, perform operations only on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Perform security hardening or dehardening for internal ports of the server as required. ● To perform security hardening for internal ports, run the following commands: > cd /opt/oss/manager/agent/bin > bash iptables_adm.sh -cmd setIPTables -product productName If information similar to the following is displayed, the security hardening for internal ports of productName is performed successfully: Product productName setIPTables succeed. ● To perform security dehardening for internal ports, run the following commands: > cd /opt/oss/manager/agent/bin > bash iptables_adm.sh -cmd restoreIPTables -product productName NOTE productName indicates the product name. If information similar to the following is displayed, the security dehardening for internal ports of productName is performed successfully: Product productName restoreIPTables succeed. ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 271 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.23.13 How Do I Solve the Problem of Slow Response When Multiple Tab Pages of a Browser Are Opened? Symptom Limited to browser performance, when you open multiple tab pages in the same browser for the PowerEcho, you may have a problem of slow response. Troubleshooting Procedure You are advised to close unnecessary tab pages so that the browser does not have more than 10 tab pages opened at the same time. 1.23.14 How Do I Query the Node Name Corresponding to the IP Address of the Management Node? Symptom If the backup server is normal but the PowerEcho cannot be accessed, you need to check the name of the node corresponding to the management node. Prerequisites You have obtained the IP address, username, and password of the backup server. Procedure Step 1 Use PuTTY to log in to the backup server as the backup server user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. NOTE If the management node is used as the backup server, log in to the backup server as the sopuser user in SSH mode. Step 2 Run the following commands to view the node name corresponding to the IP address of the management node: > cd /root directory of the backup server/path specified in the backup parameters/ management/management/timestamp > cat backupNodeNameToIp.txt If information similar to the following is displayed, you can view the node name using the IP address of the management node: {node0=10.18.16.148, node1=10.18.16.144, node2=10.18.16.146} ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 272 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.23.15 How Do I Create a Backup Path for a Backup Server? Symptom Before setting backup parameters, I need to create a backup path in the default directory of the SFTP user for storing backup data. How can I create the path? Creating a Backup Directory in CLI Mode Step 1 Use PuTTY to log in to the backup server as the backup server user in SSH mode. The username ftpuser is used as an example. Step 2 Run the following commands to create a backup path: NOTE The full path can contain a maximum of 60 characters. Otherwise, the path cannot be used for backup. > mkdir backup > ll If information to the following is displayed, the backup directory is created successfully: drwxr-x---. 2 ftpuser ossgroup 6 Dec 27 16:44 backup ----End Creating a Backup Path on the Web Client Step 1 Log in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Step 2 On the PowerEcho, choose Backup and Restore > Configuration > Configure Backup Parameters from the main menu. Step 3 In the Backup Server area, configure the IP address, port number, username, and password of the backup server. Step 4 Click to verify the connectivity between all nodes and the backup server. Step 5 Click , the editing page is displayed. Click and select a backup path. Step 6 In the Select Backup Path dialog box, perform operations as prompted. NOTE The full path can contain a maximum of 60 characters. Otherwise, the path cannot be used for backup. ----End 1.23.16 How Do I Check the Deployment Status of a Product? This section describes how to check the status of a product after installation or upgrade. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 273 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 Log in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Step 2 On the PowerEcho, choose Product > Software Management > Deploy Product Software from the main menu. Step 3 On the Deploy Product Software page, check the status of the product. ----End 1.23.17 How Do I View Command Audit Logs? This section describes how to query the command audit logs recorded in the system. Procedure (EulerOS) Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. NOTE If the PowerEcho is deployed in cluster mode, perform operations only on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? Step 2 Run the following command to switch to the root user: > su - root Password: password for the root user Step 3 Run the following commands to create a temporary directory for storing logs, and copy the OS logs to the temporary directory: In the following operations, the log_info directory is used as an example. Replace it based on site requirements. # mkdir /tmp/log_info # cp /var/log/messages /tmp/log_info # chown sopuser:ossgroup -R /tmp/log_info # chmod -R 700 /tmp/log_info Step 4 Download the OS logs from the /tmp/log_info directory to your local PC. 1. Run the following command to exit from the root user: # exit 2. Run the following command to copy the OS logs from the /tmp/log_info directory to the home directory /home/sopuser of the sopuser user: > cp /tmp/log_info/messages /home/sopuser Issue Draft B (2020-11-30) 3. Use FileZilla to log in to the node with logs to be queried, as the sopuser user in SFTP mode. For details, see 1.24.2 Transferring Files Using FileZilla. 4. Download the OS log files in .csv or .zip format from /home/sopuser to any directory on your local PC. Copyright © Huawei Technologies Co., Ltd. 274 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 5 After the logs are downloaded successfully, delete the temporary directory. 1. Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. NOTE If the PowerEcho is deployed in cluster mode, perform operations only on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? 2. Run the following command to switch to the root user: > su - root Password: password for the root user 3. Run the following command to delete the /tmp/log_info directory: # cd /tmp # rm -rf log_info 4. Run the following command to exit from the root user: # exit 5. Run the following commands to delete the file uploaded to the temporary directory: > cd /home/sopuser > rm -rf log file ----End 1.23.18 How Do I View Database Audit Logs? This section describes how to query the database audit logs recorded in the system. Prerequisites You have obtained the passwords for the sopuser and dbuser users of the database node. Procedure (Redis and GaussDB T V3 Databases) Step 1 Use PuTTY to log in to the node where the abnormal database instance resides as the sopuser user in SSH mode. For details about how to obtain the IP address of the node, see 1.23.3 How Do I Query the IP Address of the Node Where a Database Instance Resides? Step 2 Run the following command to switch to the dbuser user: su - dbuser Password: password for the dbuser user Step 3 Run the following commands to obtain the database instance name: cd /opt/type/data/ ls -al Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 275 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE Type indicates the database type, such as redis, and zenith. Step 4 Run the following commands to view the log files: ● For the Redis database, run the following commands: cd /opt/redis/data/database instance name more database instance name-login.log ● For the GaussDB T V3 database, run the following commands: cd /opt/zenith/data/database instance name/log/audit more zengine.aud or more zengine_times.aud NOTE The database instance name is obtained through Step 3. ----End 1.23.19 How Do I Prevent PuTTY from Being Disconnected upon Timeout? Question How do I prevent PuTTY from being disconnected upon timeout? Answer When an operation is being performed on PuTTY, PuTTY may be disconnected upon timeout. As a result, the operation result cannot be obtained. Perform the following operations to prevent PuTTY from being disconnected: Step 1 Use PuTTY to log in to the desired node as the sopuser user in SSH mode. Step 2 Run the following command to query the PuTTY timeout period: > export | grep TMOUT If information similar to the following is displayed, PuTTY is automatically disconnected if no operation is performed within 300 seconds: declare -x TMOUT="300" Step 3 Run the following command to set the PuTTY timeout period to 1 hour: > export TMOUT=3600 NOTE After the operation on PuTTY is complete, run the following command to restore the PuTTY timeout period to the value obtained in Step 2. > export TMOUT=300 ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 276 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.23.20 How Do I Check the Active/Standy Status of a Node? Question How do I check the active/standy status of a node? Answer Step 1 If the web client of the PowerEcho can be accessed, perform the following operations to obtain the IP addresses of the nodes where OMMHA resides. In other cases, obtain the IP addresses from the system administrator. 1. Log in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. 2. On the PowerEcho, choose Product > System Monitoring from the main menu. 3. In the upper left corner of the System Monitoring page, move the pointer to and select PowerEcho. 4. Click the Processes tab. In the upper left corner, search for ommha in the search box. All nodes where OMMHA resides are displayed in the list. 5. Click the name of a node. On the top of the node details page, the IP address is the management IP address of the node. Step 2 Use PuTTY to log in to a node where OMMHA resides, as the sopuser user in SSH mode. Step 3 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 4 Run the following commands to check the active/standby status and resource status of the node: > cd /opt/oss/manager/apps/OMMHAService/bin > bash status.sh If information similar to the following is displayed, the value of HAActive indicates the active/standby status of the node. If the value is active, the node is the active node. If the value is standby, the node is the standby node. The value of HostName indicates the node name. You can query the IP address of a node by node name. For details, see 1.23.4 How Do I Query the IP Address of a Node? Ha mode double NodeName HostName HaVersion StartTime HAActive HAAllResOK HARunPhase ha1 node-111 V100R001C01 2018-04-07 14:22:33 active normal Active ha2 node1 V100R001C01 2018-04-07 14:23:12 standby normal Inactive ... ... ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 277 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.24 Common Operations 1.24.1 Logging In to a Server Using PuTTY After the OS is installed, you can use PuTTY to log in to a server in SSH mode. This section uses PuTTY 0.70 as an example. Prerequisites You have obtained PuTTY of the latest version from https:// www.chiark.greenend.org.uk/~sgtatham/putty/ and have installed it on your local PC. NOTE Obtain PuTTY 0.70 or later. Procedure Step 1 Start PuTTY. Step 2 In the Host Name (or IP address) text box, enter the IP address of the server that you want to log in to. NOTE Log in to the server using its fixed IP address to prevent floating IP address abnormalities from interrupting the SSH connection. Step 3 In the Connection type area, select SSH Step 4 In the Close window on exit area, select Only on clean exit. Step 5 Choose Window > Translation from the navigation tree. Step 6 Set Remote character set to UTF-8. NOTE Set Remote character set to UTF-8 every time you open PuTTY. Step 7 Click Open. NOTE If this is the first time you are using PuTTY, the PuTTY Security Alert dialog box may be displayed. Click Yes. Step 8 When the following information is displayed, enter a username and press Enter: login as: NOTE After the OS security is hardened, only users with the SSH permission (for example, sopuser) are allowed to log in to the server. Step 9 When the following information is displayed, enter the user password and press Enter: Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 278 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Username@IP address's password: NOTE For security purposes, change the password periodically and keep the new password secure. ----End 1.24.2 Transferring Files Using FileZilla This section describes how to use FileZilla to transfer files. This section uses FileZilla 3.25.1 as an example. Prerequisites You have obtained FileZilla of the latest version from https://filezilla-project.org and have installed it on your PC. NOTE Obtain FileZilla 3.25.1 or later. Procedure Step 1 Start FileZilla. Step 2 In the FileZilla window, choose File > Site Manager from the main menu. Step 3 In the lower left area of the Site Manager dialog box, click New Site. Step 4 On the General tab page, set site parameters based on Table 1-96. Table 1-96 Parameters in the Site Manager dialog box Parameter Description Host IP address of the server. Port 22 Protocol SFTP Logon Type Set this parameter to Normal. User Enter the username and password of the server. The user has permission to access the destination directory. Password NOTE After the OS security hardening is performed, you cannot log in to the server as the root user in SFTP mode. Instead, you can log in to the server only as a user with SFTP access permission, for example, the sopuser user. Step 5 Click Connect. Step 6 In the Unknown host key dialog box, select Always trust this host, add this key to the cache and click OK. Step 7 In the Remote site area, set the destination directory for uploading or downloading files. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 279 iManager NetEco Administrator Guide 1 NetEco Administrator Guide After you set the directory, the Remote site area displays all files stored in this directory. Step 8 In the Local site area, set the source directory on the PC for uploading or downloading files. After you set the directory, the Local site area displays all files stored in this directory. Step 9 Perform the following operations as required. If You Need to... Then... Upload files In the Local site area, right-click the file to be uploaded on the PC and choose Upload from the shortcut menu. Download files In the Remote site area, right-click the file to be downloaded to the PC and choose Download from the shortcut menu. NOTE You can click the Successful transfers or Failed transfers tab to view the operation process. If the upload or download fails, click the Failed transfers tab in the lower left area of the FileZilla window. Then right-click the file that fails to be transferred and choose Reset and requeue selected files from the shortcut menu to resume the file transfer. ----End 1.24.3 Uninstalling the NetEco This section describes how to uninstall the NetEco using commands. You can perform operations in this section if you need to reinstall the NetEco. Prerequisites You have obtained the password for the sopuser user and root user of the NetEco. Procedure Step 1 Use PuTTY to log in to management node as the sopuser user in SSH mode, for details see 1.24.1 Logging In to a Server Using PuTTY. NOTE If the PowerEcho is deployed in cluster mode, log in to any management node and perform the uninstallation operation. Step 2 Run the following command to switch to the root user: $ su - root Password: password for the root user Step 3 Run the following commands to uninstall the NetEco: Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 280 iManager NetEco Administrator Guide 1 NetEco Administrator Guide # cd /opt/NetEcoTools/ # bash uninstall.sh When the following information is displayed, enter y or Y and press Enter: Are you sure to continue? [y/n] NOTE To cancel the uninstallation, enter n or N. If the following information is displayed, the NetEco is successfully uninstalled. Otherwise, contact Huawei technical support. Uninstall... done ----End 1.24.4 Encrypting the Private Key of the Signature Certificate (the PowerEcho) Before updating the certificate, obtain the private key file of the signature certificate. The private key must be encrypted using the AES-128-CBC algorithm. This section describes how to encrypt the private key and uses the user management certificate as the example. If the obtained private key is not encrypted, encrypt it by following the instructions provided in this section. The certificate name User Management is used as an example. Prerequisites ● You have generated or purchased the following files: signing_cert.pem, ca.pem, and signing_key.pem. – signing_cert.pem: public key of the signature certificate. The following configurations are supported when the signing_cert.pem file is generated: ▪ ▪ ▪ ● Issue Draft B (2020-11-30) You can determine whether to configure keyUsage and extendedKeyUsage in the configuration file. If only keyUsage is configured, its value must contain Digital Signature and Key Encipherment. If both keyUsage and extendedKeyUsage are configured, the value of keyUsage must contain Digital Signature and Key Encipherment, and the value of extendedKeyUsage must contain the Secure Email Object Identifier (OID) 1.3.6.1.5.5.7.3.4. – signing_key.pem: private key of the signature certificate. – ca.pem: trust certificate of the CA. You have obtained the passwords for the sopuser and ossadm users for logging in to the node where the service that requires private key encryption resides. Copyright © Huawei Technologies Co., Ltd. 281 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 Use FileZilla to upload the signing_key.pem file to the /home/sopuser directory on the management node, as the sopuser user in SFTP mode. For details, see 1.24.2 Transferring Files Using FileZilla. NOTE If the PowerEcho is deployed in cluster mode, perform operations only on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? Step 2 Use PuTTY to log in to the management node as the sopuser user in SSH mode. Step 3 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 4 Run the following command to copy the signing_key.pem file to the certificate storage directory: > cp /home/sopuser/signing_key.pem /home/ossadm Step 5 Run the following command to change the file permission: > cd /home/ossadm > chmod 770 signing_key.pem Step 6 Run the following command to encrypt the private key: > openssl rsa -in signing_key.pem -aes128 -out signing_key.pem Enter the password as prompted. Enter PEM pass phrase: password for signing_key.pem Verifying - Enter PEM pass phrase: password for signing_key.pem NOTE The encrypted signing_key.pem file overwrites the unencrypted signing_key.pem file in the current directory. Step 7 Run the following command to switch to the sopuser user: > exit Step 8 Run the following command to copy the newly encrypted signing_key.pem file to the /home/sopuser directory: > cp /home/ossadm/signing_key.pem /home/sopuser Step 9 Use FileZilla to download the signing_key.pem file in the /home/sopuser directory to your local PC, as the sopuser user in SFTP mode. Step 10 Use PuTTY to delete temporary file as the sopuser user: > cd /home/sopuser/ > rm -rf signing_key.pem Step 11 Run the following command to switch to the ossadm user: Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 282 iManager NetEco Administrator Guide 1 NetEco Administrator Guide > su - ossadm Password: password for the ossadm user Step 12 Run the following command to delete the temporary file in the /home/ossadm/ directory: > cd /home/ossadm/ > rm -rf signing_key.pem ----End 1.24.5 How Do I Change the Database Instance Password? If the password of a database instance fails to be changed when you change the database passwords of the PowerEcho in batches, and the password of the instance cannot be changed on the GUI, you can run commands to change the password. Prerequisites ● You have obtained the passwords for the sopuser and ossadm users of the management node. ● You have obtained information about the database whose password is to be changed, such as the database instance name, database type, and database username. To obtain such information, on the PowerEcho, choose System > Log Management > Operation Logs from the main menu and view the operation log details. ● You have obtained the old and new passwords of the database user whose password is to be changed. ● All services of the product have been stopped. For details, see 1.5.2 Stopping Product Services. ● Services of the database with the database user password to be changed are running properly. For details, see 1.3.4 Monitoring Databases. Context The user password must meet the password complexity requirements. The password rules are as follows: Issue Draft B (2020-11-30) ● The password must contain 8 to 64 characters. ● The password must be a combination of the following four types of characters: – Uppercase letters – Lowercase letters – Digits – Special characters ~ @ # ^ * - _ + [ { } ] : . / ? ● The password cannot contain more than two consecutive identical characters. ● The same character can be used three times at most. ● The password must contain at least two characters different from the initial password. Copyright © Huawei Technologies Co., Ltd. 283 iManager NetEco Administrator Guide ● 1 NetEco Administrator Guide The password cannot contain the username or the reverse of it, regardless of the letter case. NOTE ● For the GaussDB T V3 database, the new password must meet the complexity requirements and contain at least two characters different from the old password. The new password cannot be the same as any used in the past 60 days, and cannot be the same as any of the last three passwords. Procedure Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. NOTE If the PowerEcho is deployed in cluster mode, perform operations only on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to change the database user password: > cd /opt/oss/manager/agent/MaintenanceService/tools/sysmt > bash modifydbpad.sh -pn all -dbtype "database type" -inst database instance name -u database username [-startProduct true] NOTE ● database type indicates the type of the database user to be changed. ● database instance name indicates the name of the database instance to be changed. If the database has master and slave database instances, enter the master database instance number. Obtain the master database instance number on the Relational Databases tab page of the System Monitoring page of the corresponding product. ● database username indicates the name of the database user with password to be changed, for example, dbuser. ● If the startProduct parameter is set to true, the product services will be automatically restarted after the database user password is changed. If the parameter is set to false, the product services will not be automatically started. The following information is displayed. Enter the old password, new password, and confirm the new password. Old Password: New Password: Retype New Password: The product information is displayed. Enter the ID of the product whose database password needs to be changed, for example, 1. 1.productDesc:product alias productName:product name productType:product type productNum: 1 If the following information is displayed, the password has been changed successfully: Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 284 iManager NetEco Administrator Guide 1 NetEco Administrator Guide change dbpad by instance successful. ----End 1.24.6 Querying the Version Number of the PowerEcho This section describes how to query the version number of the PowerEcho using a browser. Prerequisites You have logged in to the PowerEcho. For details, see 1.1.2 Logging In to the PowerEcho. Procedure Step 1 On the PowerEcho, choose System > About from the main menu. Step 2 In the About window that is displayed, query the version number of the PowerEcho. ----End 1.24.7 Checking the Status of the PowerEcho Service This section describes how to check the status of the PowerEcho service by running commands. Prerequisites You have obtained the passwords for the sopuser and ossadm users of the management node. Procedure Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. NOTE If the PowerEcho is deployed in cluster mode, perform operations on Management0 and then on Management1. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Check the running status of the PowerEcho. > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd statusapp -tenant manager Information similar to the following is displayed: Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 285 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Process Name Process Type App Name Tenant Name Process Mode IP PID Status backupwebsite-0-0 backupwebsite BackupWebsite manager cluster 10.93.95.239 341187 RUNNING unideploywebsite-0-0 unideploywebsite UniDeployWebsite manager cluster 10.93.95.239 341202 RUNNING ... [All Processes: 16] [Running: 16] [Not Running: 0] ● If the value of Not Running is 0, all processes are running properly. ● If the value of Not Running is not 0, there are processes that are not running or faulty. NOTE You can check status of a process by checking its value of Status. ● If Status is RUNNING, the process is running properly. ● If Status is STOPPED, the process is stopped. ● If Status is ABNORMAL, the process is abnormal. Run the ipmc_adm -cmd restartapp -tenant manager command to restart the process. If the problem persists, contact Huawei technical support. Step 4 If the PowerEcho is deployed in cluster mode, that is, there are multiple management nodes, perform the following operations: 1. Use PuTTY to log in to the node where OMMHA resides, as the sopuser user in SSH mode. For details about how to obtain the IP address of a node, see 1.23.2 How Do I Query the IP Address of the Node Where a Service Resides? 2. Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user 3. Run the following commands to check the OMMHA process status: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd statusapp -app OMMHAService -tenant manager Information similar to the following is displayed: Process Name Process Type ommha-0-0 ommha RUNNING App Name Tenant Name Process Mode IP PID Status OMMHAService manager multi 10.93.95.239 25334 [All Processes: 1] [Running: 1] [Not Running: 0] ----End 1.24.8 Abnormal NTP Server Status Symptom On the PowerEcho, choose Maintenance > Time Management > Configure NTP from the main menu. In the NTP server list, the time synchronization status of the added NTP server is Abnormal. Possible Causes ● Issue Draft B (2020-11-30) The network is faulty. Copyright © Huawei Technologies Co., Ltd. 286 iManager NetEco Administrator Guide ● 1 NetEco Administrator Guide The time synchronization relationship between the NTP server and the management node is abnormal. Prerequisites You have obtained the passwords for the sopuser and root users of the management node. Troubleshooting Procedure Step 1 Check whether the network connection between the management node and its upper-level NTP server is normal. 1. Use PuTTY to log in to the management node as the sopuser user in SSH mode. NOTE If the PowerEcho is deployed in cluster mode, log in to all the management nodes and perform the following operations. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? 2. Run the following command to switch to the root user: > su - root Password: password for the root user 3. Run the following command to check whether the network connection between the management node and its upper-level NTP server is normal. # ntpq -np remote refid st t when poll reach delay offset jitter ============================================================================== * x.x.x.x LOCAL(0) 6 u 90 128 377 0.199 -0.024 0.043 4. – If the values of reach, delay, offset, and jitter are not 0 in the command output, the network connection between the management node and its upper-level NTP server is normal. – If the values of reach, delay, offset, and jitter are 0 in the command output, the network connection between the management node and its upper-level NTP server is abnormal. Run the following command to exit from the root user: # exit Step 2 Check whether the NTP service of the upper-level NTP server is normal. Contact NTP engineers to check the NTP service status. Ensure that the NTP service has started and has been provided for the PowerEcho. Step 3 Check whether the NTP service of the management node is normal. 1. Use PuTTY to log in to the management node as the sopuser user in SSH mode. NOTE If the PowerEcho is deployed in cluster mode, log in to all the management nodes and perform the following operations. 2. Run the following command to switch to the root user: > su - root Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 287 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Password: password for the root user 3. Check whether the NTP service is running: # service ntpd status 4. – If the command output contains active (running), the NTP service on the management node is started. – If the command output contains inactive (dead), the NTP service on the management node is not started. Run the service ntpd start command to start the NTP service on the management node. Run the following command to exit from the root user: > exit Step 4 If the preceding check result is normal but the time synchronization status of the NTP server is still Abnormal, perform the following operations: 1. Log in to the PowerEcho. For details, see 1.10.1 Managing Software Packages. 2. On the PowerEcho, choose Maintenance > Time Management > Configure NTP from the main menu. On the Configure NTP page, click Reconfigure. 3. In the Confirm dialog box, click Yes. 4. On the PowerEcho, choose Maintenance > Time Management > Configure Time Zone and Time from the main menu. On the Configure Time Zone and Time page, click Forcibly Synchronize. NOTE If you want to perform other configuration operations that need to restart product services or product databases after forcibly synchronizing the time zone and time, do not select Automatically start the product databases and product services after the forcible synchronization in the Warning dialog box. In this case, after the forcible synchronization, product databases and product services will not be automatically started, preventing the product services or product databases from being restarted for several times. In a remote cold backup scenario, if you are forcibly synchronizing the time zone and time of the secondary site, do not select Automatically start the product databases and product services after the forcible synchronization in the Warning dialog box, preventing the product services of the secondary site from being restarted and causing the product to become dual-active. 5. Choose System > Task List from the main menu. Wait until the task for forcibly synchronizing time zone and time is complete. ----End 1.24.9 Managing Passwords in the Weak Password Dictionary For security purposes, do not use passwords that are vulnerable to cracking. Passwords in the weak password dictionary are not allowed, and you can add passwords to or change existing passwords in the weak password dictionary as required. Prerequisites You have obtained the passwords for the sopuser and root users of the management node. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 288 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Procedure Step 1 Export the weak password dictionary to a user-defined file. 1. Use PuTTY to log in to the node with OS user password to be changed, as the sopuser user in SSH mode. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? 2. Run the following command to switch to the root user: > su - root Password: password for the root user 3. Run the following command to export the default dictionary password to the /usr/share/cracklib/dictionary.txt file: # cracklib-unpacker /usr/share/cracklib/pw_dict > /usr/share/cracklib/ dictionary.txt NOTE The path and file name /usr/share/cracklib/dictionary.txt can be customized. Change it as require, but ensure that the format is .txt. Step 2 Check or change passwords in the weak password dictionary as required. ● Checking passwords in the weak password dictionary # cat /usr/share/cracklib/dictionary.txt ● Changing passwords in the weak password dictionary a. Run the following command to open the /usr/share/cracklib/ dictionary.txt file using the vi editor: # vi /usr/share/cracklib/dictionary.txt b. In the vi editor, press i to enter the editing mode. After the modification, press Esc to exit the editing mode, and enter :wq! to save the modification and exit the vi editor. c. Run the following command to update the dictionary: # create-cracklib-dict /usr/share/cracklib/dictionary.txt d. Run the following command to delete the /usr/share/cracklib/ dictionary.txt file: # cd /usr/share/cracklib/ # rm -rf dictionary.txt e. Run the following command to exit the root user: # exit ----End 1.24.10 Restoring the CA Certificates That Failed to Be Updated If a message is displayed, indicating that services on the management node fail to be started when you update the CA certificate of the management node, restore the CA certificate from the backups in a timely manner. This prevents the PowerEcho or the NetEco from being unavailable due to a certificate exception. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 289 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Prerequisites You have obtained the passwords for the sopuser and ossadm users of the management node. Precautions ● If the PowerEcho is deployed in cluster mode, do not use the floating IP address of the management node to log in. Otherwise, PuTTY will be disconnected during the certificate update, causing the certificate update to fail. ● If the CA certificate fails to be updated, the system automatically backs up the CA certificate and IR certificates to the /tmp/cert/CA and /tmp/cert/ internal directories on the management node, respectively. ● If the PowerEcho is deployed in cluster mode, the CA certificate and IR certificates are backed up only to Management0 or Management1. ● Services need to be restarted so that the certificates can take effect after the restoration. You are advised to perform this operation in off-peak hours. Procedure Step 1 Use PuTTY to log in to the management node as the sopuser user in SSH mode. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? If the PowerEcho is deployed in cluster mode, perform the following operations: 1. Log in to Management0 and Management1. 2. Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user 3. Run the following commands to check whether the /tmp/cert/CA and /tmp/ cert/internal directories exist: > cd /tmp/cert > ll If information similar to the following is displayed, the /tmp/cert/CA and /tmp/cert/internal directories exist. Perform Step 3 on the management node where the directories exist. total 8 drwx------. 5 ossadm ossgroup 4096 Mar 10 11:59 CA drwx------. 2 ossadm ossgroup 4096 Mar 10 11:59 internal Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to restore the CA certificate by using the backup CA certificate: > cp -a /tmp/cert/CA/* /opt/oss/manager/var/ca/ > cp -a /tmp/cert/internal/* /opt/oss/manager/etc/ssl/internal/ Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 290 iManager NetEco Administrator Guide 1 NetEco Administrator Guide NOTE To roll back after you have retried the update, run the following commands: > cp -a /tmp/cert_old/CA/* /opt/oss/manager/var/ca/ > cp -a /tmp/cert_old/internal/* /opt/oss/manager/etc/ssl/internal/ Step 4 Restore the certificates of the management node 1. Run the following commands to restore the IR certificates: > cd /opt/oss/manager/agent/bin > bash osskey -cmd replace_ircerts The following information is displayed: Are you sure to replace IR certs(Y/N): 2. Enter y and press Enter. If the following information is displayed, the task is successfully executed: Execute osskey cmd:replace_ircerts Successful Step 5 Check whether the dbsvc_tool file exists. If yes, restore the database certificates. 1. Run the following commands to check whether the dbsvc_tool file exists: > ls -al /opt/oss/manager/apps/DBAgent/bin/dbsvc_tool &> /dev/null > echo $? 2. Perform operations based on the command output. Table 1-97 Operations based on command outputs Command Output Operation 0 The dbsvc_tool file exists. Run the following commands to restore the database certificates: > bash /opt/oss/manager/apps/DBAgent/bin/ dbsvc_tool -cmd change-node-cert -type all > echo $? If 0 is displayed, the database certificates are restored. Perform the subsequent operations. Otherwise, contact Huawei technical support. Values other than 0 The dbsvc_tool file does not exist. Perform the subsequent operations. Step 6 Restart the services on the node. 1. Run the following commands to stop services on the node: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd stopnode If success is displayed for all services, the services are stopped successfully. 2. Run the following commands to start services on the node: > ipmc_adm -cmd startnode If success is displayed for all services, the services are started successfully. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 291 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 7 If the PowerEcho is deployed in cluster mode, restore the certificates of other management nodes. 1. Run the following command as the ossadm user on the management node that you have logged in to in Step 1 to copy the backup CA certificate and IR certificates to the temporary directory: > cp -r /tmp/cert /tmp/cert_bak 2. Run the following commands to configure permissions for the certificate files in the temporary directory and then switch to the sopuser user: > chmod -R 750 /tmp/cert_bak > exit 3. Run the following command to copy the certificate files from the temporary directory to the temporary directory under /home/sopuser: > cp -fr /tmp/cert_bak /home/sopuser/cert 4. Use FileZilla to download the /home/sopuser/cert directory on the management node to your local PC, as the sopuser user in SFTP mode. For details, see 1.24.2 Transferring Files Using FileZilla. The /cert directory contains the CA and internal folders. 5. Use FileZilla to upload the downloaded /cert directory to the /home/sopuser directory on the other management node, as the sopuser user in SFTP mode. If the /cert directory is downloaded from Management0, upload the /cert directory to Management1. If the /cert directory is downloaded from Management1, upload the /cert directory to Management0. Upload the /cert directory to the corresponding management node as required. 6. Use PuTTY to delete the temporary directory created on the management node, as the ossadm user. > su - ossadm > cd /home/sopuser > rm -rf cert 7. Run the following commands to switch to the sopuser user and delete the temporary directories: > exit > cd /tmp > rm -rf cert_bak > cd /home/sopuser > rm -rf cert 8. Use PuTTY to log in to the management node to which the /cert directory has been uploaded, as the sopuser user in SSH mode. 9. Run the following command to copy the files from the /home/sopuser directory to the temporary directory: > cp -r /home/sopuser/cert /tmp/cert_new 10. Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user 11. Run the following commands to copy the certificate files from the temporary directories to certificate storage directories: Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 292 iManager NetEco Administrator Guide 1 NetEco Administrator Guide > cp -r /tmp/cert_new/CA/* /opt/oss/manager/var/ca > cp -r /tmp/cert_new/internal/* /opt/oss/manager/etc/ssl/internal 12. Run the following commands to configure permissions for the certificate files and delete temporary files: > find /opt/oss/manager/var/ca -type f | xargs chmod 600 > find /opt/oss/manager/etc/ssl/internal -type f | xargs chmod 600 > exit > cd /tmp > rm -rf cert_new 13. Perform Step 4 to Step 6 to restore the CA certificate and IR certificates of the management node that you have logged in to. 14. Restore the IR certificates on management nodes other than Management0 and Management1, as the ossadm user. ----End 1.24.11 Updating IR Certificates on the Product Nodes Failed When CA Certificates Are Being Updated If the new certificate is used to update the CA certificate of the management node and the IR certificates on the product nodes fail to be updated, manually update the IR certificates on the nodes that fail to be updated. Prerequisites You have obtained the passwords for the sopuser and ossadm users of the node where the certificate update failed. Context When the CA certificate is updated, the system copies the CA certificate of the PowerEcho as the certificate of the NetEco, that is, trust.cer. Precautions ● If the CA certificate fails to be updated, the system automatically backs up the CA certificate and IR certificates to the /tmp/cert/CA and /tmp/cert/ internal directories on the management node, respectively. ● Services need to be restarted so that the certificates can take effect after the restoration. You are advised to perform this operation in off-peak hours. Procedure Step 1 Use PuTTY to log in to the product node where certificate update fails, as the sopuser user in SSH mode. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 293 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Step 3 Run the following commands to stop services on the node: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd stopnode Step 4 Run the following commands to restore the certificates on the node where the update fails: > cd /opt/oss/manager/agent/bin > bash osskey -cmd replace_ircerts The following information is displayed: Are you sure to replace IR certs(Y/N): Step 5 Enter y and press Enter. If the following information is displayed, the task is successfully executed: Execute osskey cmd:replace_ircerts Successful Step 6 Run the following commands to check whether the time of the certificate is consistent with the current system time: > cd /opt/oss/manager/etc/ssl/internal > ll Information similar to the following is displayed: total 40 ...... -rw-------. 1 ossadm ossgroup 8025 Aug 20 11:22 trust.cer ...... ● If the time of trust.cer is consistent with the system time, the certificate is restored successfully. Go to Step 7. ● If the time of trust.cer is inconsistent with the system time, the certificate is unavailable or fails to be restored. Contact Huawei technical support. Step 7 Perform the following operations to restore database certificates on the node: 1. Run the following commands to check whether the dbsvc_tool file exists: > ls -al /opt/oss/manager/apps/DBAgent/bin/dbsvc_tool &> /dev/null > echo $? 2. – If 0 is displayed, the file exists. Go to Step 7.2. – If 0 is not displayed, the file does not exist. Go to Step 8. Run the following commands to restore the database certificates on the node: > bash /opt/oss/manager/apps/DBAgent/bin/dbsvc_tool -cmd changenode-cert -type all > echo $? – If 0 is displayed, the database certificates are restored. Go to Step 8. – If 0 is not displayed, the database certificates fail to be restored. Contact Huawei technical support. Step 8 Run the following commands to start services on the node: > ipmc_adm -cmd startnode Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 294 iManager NetEco Administrator Guide 1 NetEco Administrator Guide If success is displayed for all services, the services are started successfully. Step 9 Run the following command to delete the backup certificates: > cd /tmp/cert/ > rm -rf * > ll If the following information is displayed, the certificates are deleted successfully. Otherwise, contact Huawei technical support. total 0 ----End 1.24.12 Faults of Multiple Management Nodes Symptom The PowerEcho is deployed in cluster mode and uses the GaussDB database. The PowerEcho is unreachable. Possible Causes ● The service or database of the PowerEcho is abnormal. ● Multiple management nodes are faulty. Troubleshooting Procedure Step 1 You have obtained the backup package of the PowerEcho and the signature file from stored on the backup server as user backupuser using FileZilla. The backup files are stored in /backup/management/management/timestamp/node name. Step 2 Use FileZilla to upload the backup file of the PowerEcho, and the signature file to the /tmp directory on the all management node, as the sopuser user in SFTP mode. For details, see 1.24.2 Transferring Files Using FileZilla. Step 3 Disable the switchover between the master and slave database instances. 1. Use PuTTY to log in to Management0 as the sopuser user in SSH mode. For details, see 1.24.1 Logging In to a Server Using PuTTY. NOTE Perform this operation only on Management0. For details about how to obtain the IP address of a node, see 1.23.4 How Do I Query the IP Address of a Node? 2. Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user 3. Run the following commands to disable the switchover between the master and slave database instances within 180 minutes: > cd /opt/oss/manager/agent/bin > bash dbha_switch_tool.sh -cmd set-ignore-nodes -nodes all -expire 180 Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 295 iManager NetEco Administrator Guide 1 NetEco Administrator Guide If the following information is displayed, the command execution is successful. Go to Step 4. If Successful is not displayed, the command execution fails. Go to Step 4. Successful. Step 4 Stop the service and databases of the PowerEcho. 1. Use PuTTY to log in to each management node as the sopuser user in SSH mode and perform the following operations: 2. Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user 3. Run the following commands to stop the service and databases of the PowerEcho: > source /opt/oss/manager/bin/engr_profile.sh > ipmc_adm -cmd stopmgr If information similar to the following is displayed, the service and databases of the PowerEcho are stopped successfully. If the service and databases fail to be stopped, go to Step 5. ... ============================ Stopping management processes is complete. ... ============================ Stopping management dc is complete 4. Run the following commands to copy the third-party integrity check tool package to the /tmp directory: > cp /opt/oss/manager/tools/BKSigntool-tool version-OS_system type_pkg.tar /tmp Step 5 Perform the pre-restoration processing operations based on the node type. 1. Use PuTTY to log in to Management0, Management1, and Management2 as the sopuser user in SSH mode. 2. Run the following command to switch to the root user: > su - root Password: password for the root user 3. Run the following commands to perform the pre-restoration processing operations: – On Management0 and Management1, run the following commands: # [ -d /opt/share/oss/manager-bak ] || cp -a /opt/share/oss/ manager /opt/share/oss/manager-bak # rm -rf /opt/share/oss/manager/{Etcd/,MCZKService/,ServiceCenter/} – On Management2, run the following commands: # [ -d /opt/share/oss/manager-bak ] || cp -a /opt/share/oss/ manager /opt/share/oss/manager-bak # rm -rf /opt/share/oss/manager/{Etcd/,MCZKService/} Step 6 On Management0 or Management1, query the node where the master mgrdbInstanceName database instance resides: If the faulty node you have logged in to is not Management0 or Management1, skip this step. 1. Issue Draft B (2020-11-30) Use PuTTY to log in to Management0 or Management1 as the sopuser user in SSH mode. Copyright © Huawei Technologies Co., Ltd. 296 iManager NetEco Administrator Guide 2. 1 NetEco Administrator Guide Run the following command to query the node where the master mgrdbInstanceName database instance resides: > cd /tmp > zgrep --binary-files=text 'mgrdbInstanceName=managedbsvr' management.tar.gz – If information similar to the following is displayed, the master mgrdbInstanceName database instance resides on the node: mgrdbInstanceName=managedbsvr-0-999 – If no information is displayed, the slave instance of the mgrdbInstanceName database instance resides on the node: Step 7 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 8 Restore the application and data of the PowerEcho. For details, see Table 1-98. NOTE ● Perform Step 8 to Step 10 on nodes in the following sequence to ensure the restoration is successful: node where the master mgrdbInstanceName database instance resides, node where the slave mgrdbInstanceName database instance resides, and other nodes. ● The restoration of the PowerEcho takes a long time, so PuTTY may be disconnected during the restoration due to timeout. Configure PuTTY to prevent it from being disconnected. For details, see 1.23.19 How Do I Prevent PuTTY from Being Disconnected upon Timeout? Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 297 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Table 1-98 Restoring the PowerEcho Node Operation Node where the master mgrdbInstanceName database instance resides > sudo /usr/local/uniepsudobin/ execute.sh /tmp/BKSigntool-tool versionOS_system type_pkg.tar /opt/ backupManagement restoreManagement.sh /tmp/ management.tar.gz NOTE If the management node and product node are the same node and use the same database software, and the database software needs to be restored if the database software is damaged, add yes to the end of the command. If yes is not added, the database software is not restored by default. During database software restoration, the product functions may be unavailable for a short period of time. For example: > sudo /usr/local/uniepsudobin/execute.sh /tmp/ BKSigntool-tool version-OS_system type_pkg.tar /opt/backupManagement restoreManagement.sh /tmp/management.tar.gz yes When the following information is displayed, enter y and press Enter: Are you sure you want to restore the database applications? [y/n] Other nodes > sudo /usr/local/uniepsudobin/ execute.sh /tmp/BKSigntool-tool versionOS_system type_pkg.tar /opt/ backupManagement recoveryGaussManagement.sh /tmp/management.tar.gz NOTE If the management node and product node are the same node and use the same database software, and the database software needs to be restored if the database software is damaged, add yes to the end of the command. If yes is not added, the database software is not restored by default. During database software restoration, the product functions may be unavailable for a short period of time. For example: > sudo /usr/local/uniepsudobin/execute.sh /tmp/ BKSigntool-tool version-OS_system type_pkg.tar /opt/backupManagement recoveryGaussManagement.sh /tmp/ management.tar.gz yes When the following information is displayed, enter y and press Enter: Are you sure you want to restore the database applications? [y/n] Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 298 iManager NetEco Administrator Guide ● 1 NetEco Administrator Guide If the following information is displayed, the PowerEcho is successfully restored, and the database instances and the PowerEcho service are started successfully. Management restored successfully. ● If the following information is displayed, the PowerEcho service fails to be started during the restoration. Contact Huawei technical support to check the statuses of the database instances of the PowerEcho. ERROR: Start management app service falied. ERROR: Please check if the dbInstance status is ok, if its not ok, please recovery the dbInstance first, and then try to start management. ERROR: Restore management failure. ● – If the statuses of the PowerEcho database instances are normal, the PowerEcho service startup failure is not caused by exceptions in the database instances of the PowerEcho. Contact Huawei technical support. – If the statuses of the PowerEcho database instances are abnormal, restore the databases first. Manually start the PowerEcho service. For details, see 1.4.7 Starting the PowerEcho Service. If information similar to the following is displayed, the PowerEcho backup file fails to be verified. Contact Huawei technical support. ERROR: Verify /opt/backupManagement/management.tar.gz failed. ERROR: Restore management failure. ● If the following information is displayed, the task execution fails. Contact Huawei technical support. ERROR: Restore management failure. Step 9 Run the following command to exit the ossadm user: > exit Step 10 Run the following commands to delete the files uploaded to the temporary directory: > rm -rf /tmp/management.tar.gz > rm -rf /tmp/management.tar.gz.sign > rm -rf /tmp/BKSigntool-tool version-OS_system type_pkg.tar Step 11 Enable the switchover between the master and slave database instances. 1. Use PuTTY to log in to Management0 as the sopuser user in SSH mode. NOTE If the PowerEcho is deployed in cluster mode, perform the operations on Management0. 2. Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user 3. Run the following commands to enable the switchover between the master and slave database instances: > cd /opt/oss/manager/agent/bin > bash dbha_switch_tool.sh -cmd del-ignore-nodes Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 299 iManager NetEco Administrator Guide 1 NetEco Administrator Guide If Successful is not displayed, the command execution fails. Contact Huawei technical support. ----End 1.24.13 Querying a Product Name You can query the product name based on the IP address of a product node. Prerequisites You have obtained the passwords for the sopuser and ossadm user of a product node. Procedure Step 1 Use PuTTY to log in to a product node as the sopuser user in SSH mode. Step 2 Run the following command to switch to the ossadm user: > su - ossadm Password: password for the ossadm user Step 3 Run the following commands to query the name of the product on the node: > cd /opt/oss/manager/etc/sysconf > cat nodelists.json Information similar to the following is displayed. Based on the IP address of the node in Step 1 you have logged in to, the value of assignedToTenancy is the name of the product to which the node belongs. ... "1": { ... "role": [ "APP" ], "azName": "service", "regionName": "cn-global-1", "IPAddresses": [ { "iface": "eth0", "IP": "10.10.19.241", "usage": [ "maintenance" ], "alias": "ip769217480", "mask": "255.255.254.0" } ], "type": "APP", "assignedToTenancy": "product name", ----End Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 300 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.24.14 Product Node Faults Symptom On the PowerEcho, choose Product > System Monitoring. On the displayed page, Connection Status of the node under the product is Disconnected. Possible Causes ● The network is faulty. ● The node is powered off. Troubleshooting Procedure Step 1 Execute the check items and check methods in Table 1-99 and rectify the fault according to the corresponding troubleshooting methods. NOTE The product node faults are caused by complicated causes. This section provides basic troubleshooting methods for rectifying the fault. If the faults persist after you perform the following operations, collect the fault information and contact Huawei technical support. Table 1-99 Troubleshooting product node faults Issue Draft B (2020-11-30) No. Check Item Check Method Troubleshooting Method 1 Network connection Contact the administrator to check whether the network connection is normal. Contact the network administrator to restore the network. 2 Running status of VMs or physical machines Contact the administrator to check whether VMs or physical machines are abnormal, for example, powered-off or deleted. Contact the administrator to restore the VMs or physical machines. Copyright © Huawei Technologies Co., Ltd. 301 iManager NetEco Administrator Guide 1 NetEco Administrator Guide No. Check Item Check Method Troubleshooting Method 3 Running status of application software Log in to the PowerEcho, and choose Product > System Monitoring from the main menu. In the upper left corner of the System Monitoring page, move the pointer to and select the product. On the Nodes tab page, Connection Status is Disconnected. ● If Node Type is APP, the abnormal node is a product application. Restore the abnormal application. For details, see 1.11.7.2 Restoring Product Applications. ● If Node Type is DB, the abnormal node is a database application. Restore the abnormal database application. For details, see 1.11.7.1 Restoring Database Applications. ● If Node Type is APP and DB, the abnormal node is both a database application and a product application. Restore the database application first, and then restore the product application. For details, see 1.11.7.2 Restoring Product Applications and 1.11.7.1 Restoring Database Applications. Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 302 iManager NetEco Administrator Guide 1 NetEco Administrator Guide No. Check Item Check Method Troubleshooting Method 4 Database instance status Log in to the PowerEcho, and choose Product > System Monitoring from the main menu. In the upper left corner of the System Monitoring page, move the pointer to and select the product. On the Relational Databases or Redis Databases tab page, the status of the database instance is Not Running. If the status of the database instance is Not Running, restore the database instance. For details, see 1.11.7.1 Restoring Database Applications. 5 Service instance status Log in to the PowerEcho, and choose Product > System Monitoring from the main menu. In the upper left corner of the System Monitoring page, move the pointer to and select the product. On the Services tab page, Status of the service instance is Not Running, Partially Running, Unknown, or Faulty. ● If the status of the service instance is Not Running, Partially Running, or Faulty, restore the product data of the faulty service instance. For details, see 1.11.7.3 Restoring Product Data. ● If the status of the database instance is Unknown, contact Huawei technical support. Step 2 Log in to the PowerEcho, and check the node status. ● If the status of the restored node is Normal, the fault is rectified. ● If the status of the restored node is Disconnected, contact Huawei technical support. ----End 1.25 Appendix Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 303 iManager NetEco Administrator Guide 1 NetEco Administrator Guide 1.25.1 Description of the unopened menus of the PowerEcho The PowerEcho has some functions that are not open to users and are invisible to the administrator on the GUI. The PowerEcho menu is as follows: Table 1-100 Description of the unopened menus of the PowerEcho Issue Draft B (2020-11-30) Navigation Path Function URL Manage Third-Party Software Patches Installs patches of thirdparty software on the node. /eviewwebsite/ index.html#path=/plat/ patchmgmtwebsite/vi/ patchmgmtwebsite.entry. patch Product Tool Manages the PowerEcho. /swinstall/ ommonitortool.html? curMenuId=ProductTool Configure Alarm Reporting Parameters Configures parameters for reporting alarms to the upper-level system. /engrcommonwebsite/ engrnotify/ OSSSnmpUser.html? operstyle=maintance&cu rMenuId=AlarmWebOSS_ Menu Configure Disk Array Alarm Receiving Parameters Configures parameters for reporting disk array alarms to the NetEco. /engrcommonwebsite/ engrnotify/ Diskarray.html? operstyle=maintance&cu rMenuId=AlarmWebDisk _Menu Alarm configuration Configures alarm parameters. /eviewwebsite/ index.html#path=/plat/ engrcommonapp/v1/ engrnotify/ oss&operstyle=maintanc e&curMenuId=AlarmWeb OSS_Menu Back Up Operating System Backs up key configuration files of the operating system. /eviewwebsite/ index.html#path=/plat/ backupwebsite/vi/ backupwebsite.entry.bac kupos Restore Product Operating System Restores key configuration files of the operating system. /eviewwebsite/ index.html#path=/plat/ backupwebsite/vi/ backupwebsite.entry.rest oreos Copyright © Huawei Technologies Co., Ltd. 304 iManager NetEco Administrator Guide 1 NetEco Administrator Guide Navigation Path Function URL Configure NAT Configure NAT. /eviewwebsite/ index.html#path=/plat/ engrcommonapp/v1/ engrcommonapp.entry.n odenatconfigure Update SSH Key Update SSH Key. /eviewwebsite/ index.html#path=/plat/ engrcommonapp/v1/ engrcommonapp.entry.e ngrsshpolicy 1.25.2 Description of the unopened menus of the NetEco The NetEco has some functions that are not open to users and are invisible to the administrator on the GUI. The NetEco menu is as follows: Table 1-101 Description of the unopened menus of the NetEco Navigation Path Function URL Event log Event log /eviewwebsite/ index.html#path=/ fmAlarmApp/event Resource Group Resource Group /invgrpwebsite/ Secondary Authorization Secondary Authorization /eviewwebsite/ index.html#path=/plat/ secondaryauthapp/v1/ secondaryauthapp.entry.second aryauth Issue Draft B (2020-11-30) Copyright © Huawei Technologies Co., Ltd. 305