HP-UX Containers (SRP) A.03.01 Administrator's Guide

15.2.1 Displaying system container user, group, and process names from the global view ................. 76
15.3 Security features .................................................................................................................... 77
15.3.1 Extended security attributes ............................................................................................... 77
15.3.2 Audit ............................................................................................................................. 77
15.4 Managing devices ................................................................................................................. 79
15.5 Software management ............................................................................................................ 79
15.5.1 Managing software ......................................................................................................... 80
15.5.2 Remote network registered depots ..................................................................................... 81
15.5.3 Allowed products ............................................................................................................ 82
15.5.4 Updating the global view and individual system containers .................................................. 82
15.5.5 Recovering unsynchronized containers ............................................................................... 83
15.5.6 Advanced installation: varying software versions ................................................................. 84
15.5.7 Installation methods other than SD ..................................................................................... 84
15.6 Deploying applications ........................................................................................................... 85
15.7 Limitations and disallowed operations ...................................................................................... 86
15.7.1 Disallowed commands ..................................................................................................... 88
15.8 System templates .................................................................................................................... 88
16 Workload Container ..................................................................................................................... 92
16.1 File system............................................................................................................................. 92
16.2 Users, groups and authorization .............................................................................................. 92
16.3 Security features .................................................................................................................... 93
16.4 Devices ................................................................................................................................. 93
16.5 Installing software .................................................................................................................. 93
16.6 Deploying applications ........................................................................................................... 94
16.6.1 Single instance applications.............................................................................................. 94
16.6.2 Multi-instance applications ................................................................................................ 94
16.6.3 Deploying applications with the application templates ......................................................... 94
16.6.4 Ensuring access to application files located outside the container home directory .................... 94
16.6.5 Best bractices for application deployment with workload containers ...................................... 94
16.7 Limitation and disallowed operations ........................................................................................ 95
16.8 Workload templates ............................................................................................................... 95
16.8.1 Workload template .......................................................................................................... 96
16.8.2 SSHD template ................................................................................................................ 98
16.8.3 Apache template ........................................................................................................... 100
16.8.4 Tomcat template ............................................................................................................ 102
16.8.5 Oracle template ............................................................................................................ 105
16.8.6 Custom template............................................................................................................ 106
17 Compatibility with other HP-UX products ........................................................................................ 108
17.1 Bastille revert feature ............................................................................................................ 108
17.2 PRM HP-UX Containers commands ......................................................................................... 108
17.3 Configuration Synchronization Manager (CMGR) utility and libraries ......................................... 108
18 Verifying and troubleshooting containers ....................................................................................... 109
18.1 Quick verification procedure ................................................................................................. 109
18.2 Troubleshooting scenarios ..................................................................................................... 109
18.3 Advanced verification procedures .......................................................................................... 111
18.3.1 Verifying Security Containment compartment data ............................................................. 111
18.3.2 Verifying RBAC data ...................................................................................................... 112
18.3.3 Verifying PRM data ....................................................................................................... 112
18.3.4 Verifying network data ................................................................................................... 113
18.3.5 Verifying IPFilter data ..................................................................................................... 113
18.3.6 Verifying IPSec data ...................................................................................................... 114
18.4 Advanced Troubleshooting Procedures ................................................................................... 115
18.4.1 Using the Security Containment compartment discover feature (workload containers only)...... 115
18.4.2 Removing or disabling IPFilter ......................................................................................... 116
18.4.3 Removing or disabling IPSec ........................................................................................... 116
18.5 Reporting Problems .............................................................................................................. 116
Glossary ......................................................................................................................................... 118