Information Technology Reference
In-Depth Information
automatically rebalances the VEs on a regular basis. You choose the interval be-
tween the rebalancing actions.
Whenever a Logical Domain in the virtual pool boots, it will boot on the most
lightly loaded system in the pool. You can also configure a Logical Domain to re-
start automatically on a running system in the pool if the system it was running
on suddenly halts. Because all of the domains in one VP use shared storage, they
can be moved from one CMT system to another in an effort to balance the load on
the computers.
9.3.3 Secure or Isolated Data Centers
Ops Center can operate in one of two modes: connected and disconnected.
Connected mode is appropriate for most data centers. In connected mode, the EC
downloads new information from the KB so that it can understand the patch (or
package update) deficiencies in the data center. As part of its analysis, it creates
reports for its own use and for your records. The EC then downloads updates
(patches or new package versions) from the Internet as needed. The EC uses the
reports, patches, and packages to bring the managed systems into compliance
with your policies. The KB is maintained by Oracle.
The security policies of some data centers forbid these centers from having a
direct connection to the Internet. For these operations, Ops Center offers a stand-
alone tool called the “harvester,” which downloads information from the KB. You
can run this tool on a computer that is attached to the Internet, and then manually
move the information to the EC. The EC can then generate the deficiency reports.
Armed with the information in the deficiency reports, you can gather the
patches and packages needed to fill the gaps. For example, Oracle provides Solaris
patches on the Enterprise Installation Standards (EIS) DVD. You must manually
copy the patches and packages to the EC system, where the EC can use them and
the deficiency reports to bring the managed systems into compliance.
9.3.4 Discovering Assets
Ops Center automatically discovers systems and chassis via Sun Service Tags and
Open Service Tags. You can also use a wizard to discover the various assets by
IP address, subnet address, host names, or other criteria. Under control of the
EC, Proxies use the following network protocols to discover systems, their service
processors (SPs), and operating systems 1 : IPMI, WMI, JMX, SNMP, SSH, Telnet,
Sun Service Tags, and Open Service Tags.
1.
For an updated list of support operating systems, see http://wikis.sun.com/display/OC2dot5/
Supported+Operating+Systems .
 
 
 
 
Search WWH ::




Custom Search