Chapter 17 Novell eDirectory Troubleshooting

This chapter covers the following testing objectives for Novell Course 3005: Advanced Novell Network Management:

Image   Identify eDirectory Databases and Processes

Image   Identify eDirectory Troubleshooting Steps

Image   Identify Partition and Replication Placement Design

Image   Use iMonitor Reports to Obtain Server and eDirectory Information

Image   Perform Health Checks

NetWare 6 introduces eDirectory 8.7, the greatest version to date of Novell’s world-class directory service.

eDirectory is the world’s leading directory service. It provides a unifying, cross-platform infrastructure for managing, securing, accessing, and developing all major components of your network. eDirectory scales to the largest network environments, including the Internet. Because it is based on the X.500 standard, eDirectory supports LDAP, HTTP, and the Java programming environment.

eDirectory can store and manage zillions of objects in a seamless ballet of communications. It also provides the foundation network service for all NetWare servers and network resources. In fact, after network communications, eDirectory is the most fundamental network service offered by NetWare 6.

When you make changes to eDirectory, the changes are replicated throughout the entire eDirectory tree. The size of your eDirectory tree, the number of servers, and the number of replicas you have determine the time it takes to distribute these changes.

With all this in mind, I’m sure you’ll agree that eDirectory health is one of your key responsibilities as a Novell CNE (Certified Novell Engineer). In this final chapter of Part II, we’ll develop an eDirectory maintenance plan to help you ensure the health of your eDirectory. This maintenance plan will accomplish two important goals: eDirectory performance and eDirectory reliability. In fact, we’ll develop our own eDirectory troubleshooting model with eight simple steps to guarantee the peaceful co-existence of eDirectory and users.

Here’s a preview of what’s in store:

Image   “Understanding eDirectory 8.7”—First, we’ll begin with a brief lesson in the architecture of eDirectory 8.7 and compare it to its predecessor, Novell Directory Services (NDS). Novell has added a few improvements to eDirectory 8.7 that you haven’t seen yet in eDirectory 8.6. Then we’ll identify several eDirectory processes that might need attention after network changes or migration. The future is now!

Image   “Novell eDirectory Troubleshooting Model”—Next, we’ll tackle Novell’s other great troubleshooting model: eDirectory. With this eight-step doozy, you’ll be able to identify eDirectory problems, implement solutions, and document everything. In addition, you’ll learn some procedures for avoiding repeat performances.

Image   “Troubleshooting eDirectory with iMonitor”—In the final lesson of this chapter, we’ll explore a comprehensive eDirectory maintenance plan to help ensure the health of your directory. eDirectory troubleshooting is accomplished in two steps: diagnosis and repair. We’ll begin with a thorough diagnosis of eDirectory using iMonitor. Then, after we’ve diagnosed the Directory, we’ll repair it—also using iMonitor.

As you can see, there’s a lot to learn in this chapter. When it’s all done, you’ll be an accomplished eDirectory engineer. So, let’s get started at the beginning: understanding eDirectory 8.7.

Understanding eDirectory 8.7

Test Objective Covered:

Image   Identify eDirectory Databases and Processes

eDirectory 8.7 is a highly scalable, high-performing, secure directory service. Along with replication and partitioning capabilities, eDirectory provides the basic foundation for multiplatform networking. eDirectory also includes cryptography services to protect confidential data; it natively supports LDAP 3 over SSL (Secure Sockets Layer).

Earlier versions of eDirectory were called Novell Directory Services (NDS). At first glance, eDirectory appears to have the same underlying architecture as eDirectory. That is, a distributed, object-oriented database organized as a hierarchical tree. Upon closer inspection, however, you’ll find that eDirectory 8.7 is built on a much more sophisticated database structure than earlier versions of NDS.

Let’s take a closer look at the underlying architectural differences between NDS and eDirectory, starting with NDS.

NDS Architecture

NDS was first introduced in NetWare 4. Prior to NetWare 4, NetWare operating systems relied on a server-centric model in which each NetWare server had its own flat-file database for tracking network resources (called the bindery). The bindery consisted of three files: one that held object information, one that held property information, and one that held value information.

NDS offered a gigantic leap forward by evolving the server-centric model into a network-centric model. In this architecture (shown in Figure 17.1), the NetWare 4 operating system relies on four data files and multiple streams files located in a hidden directory on the server’s SYS: volume. This database is referred to as the RECMAN database.

FIGURE 17.1 NDS architecture.

NDS architecture.

The four files that make up the NDS architecture in Figure 17.1 perform these functions:

Image   PARTITIO.NDS—The partition database contains a list of database partitions including system, schema, external reference, and bindery.

Image   ENTRY.NDS—The object database contains records for each object in a given server’s replicas.

Image   VALUE.NDS—The attribute database contains property values for each object in ENTRY.NDS.

Image   BLOCK.NDS—The block database contains overflow data for the attribute database.

NDS streams files are named with hexadecimal characters (0–9, A–F) and hold information such as print job configurations and login scripts. Earlier versions of NDS used Novell’s Transaction Tracking System (TTS) to ensure that database transactions were either completed or backed out in the event of a system failure.

TIP

The NetWare 5 version of NDS uses the same architecture as just described; however, the names of the files are different. In NetWare 5, ENTRY.NDS is called 0.DSD, VALUE.NDS is called 1.DSD, BLOCK.NDS is called 2.DSD, and PARTITIO.NDS is called 3.DSD.

eDirectory 8.7 Architecture

eDirectory 8.7 improves on NDS’ fixed-length record data store model by introducing a highly scalable indexed database called the FLAIM (FLexible and Adaptable Information Manager). The FLAIM database uses three different types of files instead of four, but still relies on streams files for print job configurations and login scripts. Check out the eDirectory 8.7 architecture in Figure 17.2.

FIGURE 17.2 eDirectory 8.7 architecture.

eDirectory 8.7 architecture.

The following is a description of the three different types of files that make up eDirectory’s FLAIM database:

Image   NDS.DB—The control file is the centerpiece of the eDirectory architecture. This file contains the rollback log and is used to abort incomplete transactions.

Image   NDS.01—The primary database file contains all records and indexes found on a given server. When this data file reaches 2GB in size, NDS.02 is created for the remaining data. New files are then created as necessary to keep database files from growing beyond 2GB. This allows the database files to remain scalable while retaining their quick search capabilities.

Image   NDS*.LOG—The transaction log file acts as a roll-forward log to reapply completed transactions that might not have been fully written to disk because of a system interruption.

eDirectory streams files perform the same function as they do in NDS and have an .NDS extension. However, unlike NDS, eDirectory does not use TTS; instead, it uses log files to back out and roll forward transactions in the event of a system failure. See Table 17.1 for a summary of the differences between eDirectory and NDS architecture.

TABLE 17.1 Comparing NDS and eDirectory Architecture

Image

TIP

The primary eDirectory database file, NDS.01, includes a number of indexes to enhance performance. First, it includes attribute substring indexes for the CN and uniqueID fields. Second, it includes attribute indexes for the Object Class and dc fields. Finally, it includes attribute indexes for positioning that include strings beginning with CN, uniqueID, Given Name, and Surname.

The eDirectory architecture described here provides an exceptional foundation for all of eDirectory 8.7’s new features and benefits. The following is a brief list of some of eDirectory’s greatest new advancements:

Image   eDirectory 8.7 can be implemented on any of these operating system platforms: NetWare, Windows NT, Windows 2000, Windows 2003, Linux, Solaris, and Tru64 Unix. Client libraries and LDAP tools are available for Linux, Solaris, and Tru64 Unix. LDAP support provides an open structure for integration with applications that are written to the LDAP standard.

Image   The Index Manager tool enables you to manage database indexes easily. The Filtered Replica Configuration Wizard makes it simple to create filtered replicas.

Image   The eDirectory Import/Export Wizard enables you to import and export LDIF files and to perform a server-to-server data migration.

Image   eDirectory includes a merge utility that enables you to merge one directory tree into another or to graft one tree onto another.

Image   iMonitor provides monitoring and diagnostic capabilities for all servers in your eDirectory tree from a Web browser.

eDirectory Processes

When you make changes to eDirectory, you should make sure that all the critical eDirectory processes are complete, and verify that all is well in the eDirectory kingdom. The following are three important eDirectory processes that are affected by network changes and migration:

Image   Time synchronization—Time synchronization is very important to eDirectory. All servers in a tree must be synchronized to the same time source. If they aren’t, collisions will occur when objects are being synchronized in replicas. Synchronizing time across the network enables you to maintain consistent time stamps. The most common time stamp problem is with synthetic time. Synthetic time occurs when an eDirectory object has a modification time stamp that’s ahead of current network time. If the period between the current time and the synthetic time is small, this problem will correct itself. However, if the period is large, you might have to resolve the problem manually.

Image   Schema synchronization—Schema synchronization ensures that the schema is consistent across all partitions in the eDirectory tree and that all schema changes are updated across the network. By default, the schema is automatically synchronized every four hours. Schema synchronization is required whenever a change is made to the schema. For example, when you add a new class, modify an attribute definition, or delete a schema definition, this information must be distributed. The following DSTRACE command forces schema synchronization to occur manually:

SET DSTRACE=ON
SET DSTRACE=+SCHEMA
SET DSTRACE=*S

Image   Replica synchronizationReplica synchronization refers to the process of copying data among the replicas of a partition. A partition is synchronized if all its replicas contain the same information. If one replica has a more current version of a piece of data than the other replicas, it propagates this data to the other replicas. Receiving 0 errors for replica synchronization indicates that your directory is healthy.

This completes our architectural lesson of eDirectory 8.7. I hope that you’ve gained an appreciation for the sophisticated directory services platform that eDirectory 8.7 provides for your NetWare 6 network. Now that you understand how it’s built, you’re ready for the eight-step eDirectory troubleshooting model.

Novell eDirectory Troubleshooting Model

Test Objective Covered:

Image   Identify eDirectory Troubleshooting Steps

In Chapter 10, “NetWare 6 Troubleshooting Fundamentals,” we discussed the NetWare troubleshooting model. This six-step model provided us with a great game plan for troubleshooting and resolving network problems. Together, we explored quick fixes, data gathering, diagnostic tools, problem isolation, testing, and documentation.

This is your chance to expand this model to troubleshoot eDirectory problems. However, unlike LAN and server problems, the key to troubleshooting eDirectory is to be patient. eDirectory uses its database processes to verify, validate, and distribute data. Most often, if given time, eDirectory will correct itself.

If eDirectory does not correct itself, it’s time for the eight-step eDirectory troubleshooting model:

Image   Step 1: Identify the scope of the problem

Image   Step 2: Determine the cause of the problem

Image   Step 3: List possible solutions to the problem

Image   Step 4: Assess possible solutions

Image   Step 5: Implement a solution

Image   Step 6: Verify that the problem is resolved

Image   Step 7: Document the resolution to the problem

Image   Step 8: Avoid repeating the problem

Let’s take a closer look.

Step 1: Identify the Scope of the Problem

Before you can resolve a problem, you need to know the extent of the problem. This occurs during the data-gathering phase of troubleshooting. During this phase, you should develop a detailed list of problems, including symptoms and affected users. Symptoms of eDirectory problems can show themselves in many ways. They can appear on their own as error or warning messages on the server console or within utilities, or they can appear when a user attempts to log in but cannot authenticate.

Next, try to determine whether the problem is unique to a single user, a particular group of users, or all network users. Also, attempt to ascertain when and under what conditions the symptoms occur. Determine whether the problem is communications related (for example, if the problem only occurs during peak LAN utilization periods). You can use a protocol analyzer (such as LANalyzer for Windows) to track network bandwidth and to uncover communications-related anomalies.

Finally, determine whether it’s an eDirectory-specific problem. eDirectory problems can appear as error codes when you attempt to perform an eDirectory operation or while performing a proactive eDirectory health check. The following are examples of eDirectory problems:

Image   Time synchronization issues

Image   Synchronization issues

Image   eDirectory version problems

Image   Communication problems

Image   Improperly moved/removed servers

Image   Inconsistent object/database

Image   Agent process errors

Image   Performance issues

To help you assess the scope of an eDirectory problem, record the following information: the symptom (what happened that tells you there might be a problem); the eDirectory error number; the partition, replica, server, or object with the error; and the servers holding the partition, replica, server, or object with the error. The following are some log files that will help you define the scope:

Image   Server personal log (SYS:SYSTEM/NRMUSERS.LOG)—Used to enter and track changes made to the server or to track server performance.

Image   System error log (SYS:SYSTEM/SYS$LOG.ERR)—Used to view alert messages and system operation information sent to the system console and logger screens.

Image   Abend log (SYS:SYSTEM/ABEND.LOG)—Used to view information about all server abends. As we learned in the previous chapter, this abend log can be submitted to Novell for additional assistance.

Image   Server health log (SYS:SYSTEM/HEALTH.LOG)—Used to view all changes in the health status of the server. Using this report along with several of the health statistics and trend reports can be useful in diagnosing server problems.

Each of these log files starts automatically when you start your server, and each can help you address problems.

Step 2: Determine the Cause of the Problem

After you’ve gathered all the required diagnostic data, your next task is to use the information you gathered, along with background knowledge you have of eDirectory, to determine whether the problem is a result of operating system, application software, equipment, or user error.

eDirectory usually reports errors or has problems because a condition exists that prevents an eDirectory process from completing properly. Not all eDirectory issues are obvious, and an eDirectory error code might be only a symptom of the real issue.

To determine the cause of the problem, do the following:

Image   Determine whether the problem is an eDirectory problem or something else, such as an unattached cable.

Image   Carefully analyze the information gathered about your eDirectory problem. Determine what eDirectory process is having a problem and why.

Image   Use eDirectory research resources to provide insight into what the real problem might be.

After you’ve determined what process is having the problem and why, you can formulate a solution to the problem. That’s step 3.

Step 3: List Possible Solutions to the Problem

After you’ve determined the source of the problem, your next step is to develop a troubleshooting plan of attack. The best approach typically includes a combination of intuition and methodology. First, you should use your intuition to identify the two or three most likely causes of the problem (that is, hypotheses), as well as to determine how long it will take to fix or eliminate each cause. Potential costs to keep in mind include technician time, parts, and equipment downtime.

There are often several ways to resolve an eDirectory problem. You might even find multiple support documents recommending different solutions to the same eDirectory error. eDirectory utilities also might suggest multiple ways to solve an eDirectory error.

Before taking any action to resolve an eDirectory error, you should

Image   Gather and list possible solutions—Access Knowledgebase at support.novell.com to gather information regarding your problem and possible solutions to the problem.

Image   List the repercussions of each action—Listing the repercussions of each action is critical because the problem can often be made worse if the wrong solution is applied. For example, if the first solution you try is to remove and reinstall eDirectory, you’ll probably lose some data.

Step 4: Assess Possible Solutions

After you’ve listed possible solutions to your eDirectory problem, assess the solutions based on the following:

Image   The likelihood that it will solve your problem

Image   How easy or hard the solution is to implement

Image   What effect the implementation process will have on users

Image   Whether the solution will have a destructive effect on the eDirectory tree

To assess possible solutions, you must have a clear understanding of eDirectory, the problem you are facing, the solution, and the ramifications of applying the solution. Assessing the possible solutions might involve deciding between contradicting solutions from various sources. Ask co-workers and others what actions they would take. If possible, test the solutions in a lab environment before implementing them. Check out Chapter 21, “Novell eDirectory Implementation,” for more information.

Step 5: Implement a Solution

After you’ve developed your troubleshooting plan, the next step is to execute it. Step 5 utilizes the following scientific approach:

Image   Break your plan (or each hypothesis) into small, easily testable components.

Image   Test each component by changing only one thing at a time. Otherwise, you won’t know which change solved the problem.

Image   After you’ve finished testing each component, document your results, return the component to its original state, and then move on to the next test.

Image   Watch for blind spots (which occur when the tester does not realize something that’s obvious). If you suspect a blind spot, try consulting a trusted colleague or take a break and think of something else.

Image   If the plan is unsuccessful, access additional resources, such as the Novell Support Connection Web site at support.novell.com.

The tools used to implement a solution are often the same tools used to diagnose the problem. Allow enough time for your actions to resolve the problem. eDirectory takes time to synchronize changes throughout the network. So, even after you fix a problem, you might still see symptoms of a problem until eDirectory synchronizes.

Step 6: Verify That the Problem Is Resolved

Even when you find and resolve an eDirectory problem, it isn’t actually fixed until the user (and/or the user’s manager) is satisfied. Although some users will be happy just knowing that the problem has been solved, others will want a detailed explanation of the problem and solution and training on how the network should work versus how it currently is working.

Also, verification that a problem has truly been fixed can be dependent on the nature of the problem. Some solutions, for example, might have to be monitored for hours (or days) to ensure success. To verify that an eDirectory problem has been resolved, you should

Image   Use the eDirectory diagnostic tools to check the status of eDirectory.

Image   Attempt to repeat the actions that revealed the eDirectory problem. If the eDirectory problem revealed itself while you were attempting an eDirectory operation, attempt that operation again to see whether it can be successfully accomplished. If the problem was revealed through an eDirectory utility, run the same utility and see whether the problem occurs again.

Image   Continue to monitor eDirectory.

Step 7: Document the Resolution to the Problem

Documentation is a critical but often overlooked step in the eDirectory troubleshooting model. Although solving a problem is important, many network problems reoccur. That means those who do not learn from history are destined to repeat it. Whenever you discover a solution to a problem, record the problem and solution in your problem resolution log. Conversely, whenever a problem arises, one of the first sources you should consult is the problem resolution log. If you don’t use a problem resolution log, now is a good time to start.

Novell Remote Manager has a user-friendly interface to the NRMUSERS.LOG file—the server maintenance log. NRMUSERS.LOG enables you to

Image   Prevent the same problem in the future

Image   Find a resolution to the same problem quickly in the future

Image   Provide insight into other problems your network might have

Step 8: Avoid Repeating the Problem

The final step in the process is to avoid repeating it! You should

Image   Document the problem and the solution

Image   Establish procedures and policies to ensure that people who administer or use the eDirectory tree will do so in a consistent, approved, and established manner

Image   Take precautions, such as restricting access to servers

That completes Novell’s eDirectory troubleshooting model. I hope that you are now a well-trained doctor of eDirectory medicine. To summarize the model, step 1 involves gathering data and identifying the scope of the problem. Next, step 2 provides some possible causes and step 3 provides a plan to isolate problems and lists solutions. In step 4, you assess the solutions and in step 5 you execute your plan. Then, in steps 6 and 7, you ensure user satisfaction and document your resolution, respectively. Finally, in step 8, you take the greatest proactive troubleshooting leap forward by NOT repeating the problem again.

Now, it’s time for action. Let’s troubleshoot eDirectory with iMonitor. Go team!

Troubleshooting eDirectory with iMonitor

Test Objectives Covered:

Image   Identify Partition and Replication Placement Design

Image   Use iMonitor Reports to Obtain Server and eDirectory Information

Image   Perform Health Checks

Welcome to eDirectory troubleshooting action!

iMonitor is Novell’s latest anytime, anywhere server monitoring and diagnostic tool. iMonitor enables you to monitor and repair all servers in your eDirectory tree—regardless of platform. All you have to do is point your Web browser at the server’s 8008 port and NetWare 6 takes over from there.

In Chapter 5, “NetWare 6 eDirectory Management,” we explored iMonitor from an eDirectory maintenance point of view. Now it’s time to explore this great Web-based tool from an eDirectory troubleshooting perspective.

To use iMonitor, you must first ensure that the appropriate application is running on your eDirectory server. When using NetWare 6, NDSIMON.NLM is automatically placed in AUTOEXEC.NCF; therefore, it is launched on server startup. If you’re using Windows NT/2000, the iMonitor service automatically loads on eDirectory startup. And last but not least, Unix servers require the following manual command at the server console to activate iMonitor:

NDSIMONITOR -1

When the iMonitor application is running on your eDirectory server, it’s time to access all of its great features by using a compatible Web browser. Simply enter the following URL in your browser’s address field to access the iMonitor main page:

https://{server IP address}:8008/nds-summary

Figure 17.3 shows the iMonitor main page. It consists of three main frames: the navigation frame (sits at the top of Figure 17.3 and provides access to all of iMonitor’s feature- and nonfeature-related icons), the assistant frame (on the left side; the assistant frame lists additional navigation aids that help you drill down on data in the main content frame), and the main content frame (on the right side; lists all of your server’s monitoring and diagnostic statistics as well as additional navigation links).

FIGURE 17.3 NetWare 6 iMonitor main page.

NetWare 6 iMonitor main page.

In this final troubleshooting lesson, we’ll explore the following four eDirectory troubleshooting components within iMonitor:

Image   eDirectory reporting—This is the data-gathering phase of eDirectory troubleshooting. With iMonitor, you can view several server and eDirectory status reports, including Object Statistics, Service Advertising, and Agent Health.

Image   eDirectory health checks—Next, you should conduct regular, proactive eDirectory health checks for time synchronization, partition continuity, background processes, schema synchronization, and distributed reference links.

Image   eDirectory tracing—In addition, you can use the Trace Configuration link in iMonitor to access the local server’s DS Trace debug utility. This feature provides three critical categories of information: DS Trace Options, Trace Line Prefixes, and Trace History.

Image   eDirectory repair—After you’ve diagnosed an eDirectory problem, it’s time to repair it. Not surprisingly, this is accomplished using the Repair wrench icon at the top of iMonitor. This page enables you to view problems with your eDirectory database and backup or clean them as needed.

That’s eDirectory troubleshooting in a nutshell. Let’s get started with eDirectory reporting.

eDirectory Reporting with iMonitor

eDirectory troubleshooting begins with data gathering.

With iMonitor, you can view several server and eDirectory status reports, including: Object Statistics, Service Advertising, and Agent Health. In the Agent Summary screen, the icon at the left of the server address shows the status of your server. The color of the signal light represents the server status: green means the server is functioning properly, yellow indicates a problem, and red signifies that communication is not happening.

From the iMonitor home page, select the Reports option (as shown in Figure 17.4). When you select the Report icon, you’ll notice that there are two report options: Reports and Report Config. Reports is the default setting and it shows the reports you’ve generated. The first time you use the Report feature, you’ll get a message that no reports have been run for this server. After you’ve generated your first report, each time you select the Reports option, the reports you’ve run will appear.

FIGURE 17.4 Reports page in iMonitor.

Reports page in iMonitor.

In eDirectory 8.7, Report Config lists all your server reports, including the following preconfigured reports:

Image   Server Information—This report searches the entire tree, communicates with every NetWare core protocol server it can find, and reports errors. You can use this report to diagnose time synchronization and limber problems. (I’ll explain limber in the next section.) You can also use this report to verify communication with all other servers from this server’s perspective or to determine whether a server has been improperly removed. If you select this report in the Configuration page, the server can also generate DS Agent Health information for every server in the tree.

Image   Obituary Listing—This report lists all obituaries on this server. Obituaries are attributes applied to an eDirectory object. There are 11 obituary types, such as move, rename, and so on.

Image   Object Statistics—This report evaluates the objects in a given scope and generates lists of objects matching the requested criteria. The criteria can include such things as future time, unknown objects, renamed objects, counts of base classes, containers, aliases, and external references.

Image   Service Advertising—This report lists all directories and servers known to this server through SLP (Service Location Protocol) or SAP (Service Advertising Protocol).

Image   Agent Health—This report gathers health information for this server. We will discuss this report in greater depth in the next section.

Image   Custom Report—You can also create a customized report and/or scheduled events. Scheduled events are reports that run automatically at a pre-defined time.

When you run a report, you can configure iMonitor to save a specified number of the same report. For example, the default setting for the Obituary Listing report is to keep the last five occurrences of the report.

That completes eDirectory troubleshooting, Phase 1—data gathering. Now, let’s continue with proactive health checks—also known as eDirectory diagnosis.

eDirectory Health Checks with iMonitor

eDirectory troubleshooting is accomplished in two steps: diagnosis and repair. There are a number of server-based tools that you can run independently to gather information on the health of eDirectory. But iMonitor enables you to gather all of this information from a single location.

You can use iMonitor to perform the same tasks you might have performed previously using the tools DS Trace, DS Repair, DS Browse, and NDS Manager. As a general guideline, if your system is constantly changing, use iMonitor to verify eDirectory’s health status weekly. If your system hasn’t had changes, you should verify health status monthly.

The Agent Health link (shown in Figure 17.5) displays the general summary of your server’s eDirectory health. From this initial dialog box, you can obtain information regarding the health of the server’s agent, partitions, and replica rings. First and foremost, you should start with the agent’s health. When you click on the link shown in Figure 17.5, iMonitor will return an update on the following four items:

Image   One Successful Time Sync—If the agent has never successfully synchronized, no data appears. On the other hand, if synchronization has been successful, the result is always displayed as green. When problems are suspected, the Results button displays yellow. A red button means that a severe problem might exist.

Image   Time Delta Tolerance—You can view the difference in time between iMonitor and a remote server (in seconds). A negative integer in the Current column indicates that iMonitor’s time is ahead of the server’s time. If the time difference is less than five seconds, no warning is displayed. If the time difference is 5–10 seconds off, a caution is displayed. If the time is off by more than 10 seconds, a warning is displayed.

Image   DS Loaded—Reports whether the eDirectory is loaded on this server.

Image   DS Open—Reports the state of the directory. An Open directory indicates that the database is open and accepting requests. A Closed directory indicates that the database is closed and no requests can be accepted.

FIGURE 17.5 Agent Health page in iMonitor.

Agent Health page in iMonitor.

In addition, you can check the status of your server’s partitions by choosing the Partition/Replication link in Figure 17.5. This diagnosis screen provides detailed object information for each partition stored on the server. In addition, you can select Replica Synchronization to display the replica status for each replica in the ring. When you have fewer than three replicas (for fault tolerance), the Results button displays red, indicating that there might be a potential problem with synchronization.

A complete health check includes the following five eDirectory processes:

Image   eDirectory Revision—If your version or revision level of eDirectory is outdated, download the latest software patch from support.novell.com. This health check can be accessed using the Agent Configuration link in iMonitor.

Image   Time Synchronization—Time stamps are assigned to each eDirectory object and property. They ensure the correct order for object and property updates. Refer to Chapter 5 for more information. Using time stamps, eDirectory determines which replicas need to be synchronized. For synchronization to happen properly, all eDirectory servers must maintain accurate time. This health check can be accessed using the Agent Configuration link in iMonitor.

Image   Partition Continuity—Partition continuity ensures that all replicas for a partition can be updated properly with eDirectory changes. This health check can be accessed using the Agent Synchronization link in iMonitor.

Image   Background Processes—eDirectory changes are replicated in background processes. The following background process should be checked: schema synchronization status, obituaries, and distributed reference links (DRLs). In eDirectory, DRLs are placeholders that contain information about entries that the server doesn’t hold. These are also referred to as external references. This health check can be accessed using the Agent Process Status link in iMonitor.

Image   Limber Status—This process ensures that all server information, such as server IP address and server name, is correct. You can use the Agent Configuration link or DSTRACE to trigger a limber status check.

Let’s explore these five critical health checks by using the following three iMonitor links: Agent Configuration, Agent Synchronization, and Agent Process Status.

Health Checks with Agent Configuration

The Agent Configuration link provides access to the primary eDirectory monitoring and diagnostic tools. The Agent Configuration page varies depending on the version of eDirectory that you are using. The Agent Configuration page (shown in Figure 17.6) provides these eDirectory tools:

Image   Agent Information—Displays DS Agent–specific information (including server name, IP address, time synchronization, and so on).

Image   Partitions—Displays a list of existing partitions.

Image   Replica Filters—Displays all filtered replicas configured for this specific DS Agent.

Image   Agent Triggers—Initiates the background processes listed in the main content frame. This option also enables you to initiate a limber status check.

Image   Background Process Settings—Enables you to temporarily change the intervals for running background processes.

Image   Agent Synchronization—Displays all inbound and outbound synchronization traffic for the specified DS agent.

Image   Schema Synchronization—Displays all inbound and outbound schema synchronization traffic.

Image   Database Cache—Enables you to configure and monitor the eDirectory database cache settings.

Image   Login Settings—Enables you to customize the time between login updates or disable the queuing of login updates.

FIGURE 17.6 Agent Configuration page in iMonitor.

Agent Configuration page in iMonitor.

Health Checks with Agent Synchronization

The Agent Synchronization link in iMonitor displays the number and type of replicas present on this server and the length of time that has passed since they were synchronized. In addition, you can view the number of errors for each replica type.

One of the key statistics shown in Figure 17.7 is the Maximum Ring Delta. This statistic lists the amount of data that might not be successfully synchronized to all replicas in the ring. For example, if a user has changed his login script within the past 30 minutes and the Maximum Ring Delta has a 45-minute allocation, that user’s login might not be successfully synchronized. If the Maximum Ring Delta is listed as Unknown, it means that the transitive synchronized vector is inconsistent. Ouch. Basically, the Maximum Ring Delta cannot be calculated because a replica/partition operation is in progress.

FIGURE 17.7 Agent Synchronization page in iMonitor.

Agent Synchronization page in iMonitor.

Another interesting report on this page (refer to Figure 17.7) is the Replica’s Perishable Data Delta. This is the amount of time since this server last synchronized the selected partition.

Health Checks with Agent Process Status

The Agent Process Status link in iMonitor (shown in Figure 17.8) displays the health of several background processes, including

Image   Schema synchronization

Image   Obituary processing

Image   External references / distributed reference links

Image   Limber

FIGURE 17.8 Agent Process Status page in iMonitor.

Agent Process Status page in iMonitor.

Problems with these processes appear as error codes. Use the health report discussed earlier to get further detail regarding solutions for these eDirectory problems.

That completes the first phase of eDirectory diagnosis. Now, let’s explore another diagnostic tool within iMonitor: DS Tracing.

eDirectory Tracing with iMonitor

The Trace Configuration link in iMonitor (shown in Figure 17.9) provides access to the local server’s DS Trace debug utility. This feature is available for only the local iMonitor server. If you need to access trace options on another server, you must switch to the iMonitor running on that device. In addition, you must be the Administrator or a Console Operator of the server to access these DS Trace options. For this reason, you’ll be asked to enter your username and password to authenticate before Figure 17.9 will appear.

FIGURE 17.9 Trace Configuration page in iMonitor.

Trace Configuration page in iMonitor.

The Trace Configuration page in Figure 17.9 includes three main categories of information:

Image   DS Trace OptionsDS Trace Options apply to the events on the local DS agent where the trace is initiated. These options show errors, potential problems, and other information about how eDirectory is performing on the local server. Turning on DS Options can increase CPU usage and might reduce your system’s performance. Therefore, you should use Trace Configuration only periodically for diagnostic purposes.

Image   Trace Line Prefixes—Trace Line Prefixes enable you to choose which pieces of data are added to the beginning of any trace line. These prefixes include Time Stamp, Thread ID, and Option Tag strings.

Image   Trace History—Trace History displays a list of trace runs. A trace run is any sequence in which you start and stop a trace. Each trace run log is identified by the period of time during which the trace data was gathered. As I’m sure you’ve guessed, the information you see on this screen depends on the trace options you select.

To initiate a DS trace, first specify the trace options in the Trace Configuration link and then select Trace On. Next, select Agent Triggers in the Agent Configuration link. A new Trace icon appears in the navigation bar of iMonitor. Finally, select Submit and the DS trace begins for the chosen processes.

When you click on the new Trace icon in the navigation bar, the current agent process appears (as shown in Figure 17.10). This DS Trace screen presents you with a plethora of valuable eDirectory health data, including process starting point and destination, time stamps, synchronization details, and error statistics.

FIGURE 17.10 DS trace results.

DS trace results.

That completes our comprehensive review of iMonitor’s eDirectory diagnosis capabilities. Of course, any good eDirectory maintenance engineer can tell you that diagnosis is only the first half of the story. Now, let’s explore step 2: eDirectory Repair.

eDirectory Repair with iMonitor

After you’ve diagnosed an eDirectory problem, it’s time to repair it. Not surprisingly, this is accomplished using the Repair wrench icon at the top of iMonitor. When you click on the wrench, you’re presented with the repair screen shown in Figure 17.11.

FIGURE 17.11 Repair page in iMonitor.

Repair page in iMonitor.

As with the Trace Configuration page, you must be an Administrator or Console Operator to access the eDirectory Repair page. This page enables you to view problems with your eDirectory database and backup or clean them as needed. Some of the repair parameters shown in Figure 17.11 are

Image   Repair Replica—Enables you to repair the selected replica

Image   Repair Single Object—Enables you to resolve all inconsistencies with a selected object

Image   Repair Local DIB—Enables you to correct or repair inconsistencies in the eDirectory database, check partition and replication information, and/or make changes to the DIB when necessary

Image   Run In Unattended Mode—Enables you to perform repair operations on the eDirectory database automatically, while you lounge on the beach in some exotic locale

Image   Create DIB Archive—Enables you to create a copy of the eDirectory database for troubleshooting purposes

Image   Disable Reference Checking—Enables you to turn off the check for external reference objects so that you can locate specific replicas containing specific objects.

Image   Report Move Obits (Advanced)—Enables you to remove the Obituary attribute from objects in the database

Image   Repair Network Address (Advanced)—Enables you to repair the server’s network address in replica rings and Server objects in the database

Image   Repair Volume Object (Advanced)—Enables you to check all mounted volumes on the server for valid Volume object trustee assignments

Image   Repair Volume Object and Do Trustee Check (Advanced)—Performs a more advanced volume check with a more comprehensive security analysis

Image   Support Options (Advanced)—Provides additional functionality when troubleshooting with Novell Technical Support

You can use an iMonitor Schedule Report to initiate repairs at specified intervals. Novell does not recommend scheduling regular eDirectory repairs unless your organization has a policy requiring them. Also, remember that when you run eDirectory repair from a server, it affects only parts of the database stored on that server. To fix the entire database, you must run the utility on each server that contains replicas of the partitions that are affected.

Congratulations! You made it ... you survived NetWare 6 Medical School!

In this final chapter of Part II, we discussed the eDirectory troubleshooting model to help ensure the health of eDirectory. This model focused on two important goals: eDirectory performance and eDirectory reliability. In fact, we experienced iMonitor, one last time, from a troubleshooting point of view. Wow, what a ride.

And that completes Part II of the CNE Study Guide for NetWare 6.

In the previous seven chapters, we shifted our focus from advanced management to advanced troubleshooting. Together, we tackled NetWare 6 migration, advanced storage management, iFolder troubleshooting, high availability with NCS, server troubleshooting, and advanced eDirectory management. In addition, we built a medical bag full of troubleshooting tools and gained some preventative medicine skills for network optimization.

That’s all there is to it! Remember that in this study guide we’re expanding well beyond mere administration tasks into the realm of engineering. Now it’s time to blast off, warp speed ahead, to Part III: “Novell eDirectory Design and Implementation” (Novell Course 575). In Part III, we’ll expand our NetWare 6 LAN into the realm of global eDirectory connectivity. We’ll master the first three steps in saving the Net—namely, eDirectory preparation, eDirectory design, and eDirectory implementation.

See you there!!

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset