HP XC System Software Administration Guide Version 3.1
8.2.4 Using the Nagios Service Problems View....................................................................................107
8.3 Adjusting the Nagios Configuration...................................................................................................109
8.3.1 Stopping and Restarting Nagios.................................................................................................110
8.3.2 Updating the Nagios Configuration............................................................................................110
8.3.3 Forwarding Nagios e-mail Alerts................................................................................................111
8.3.4 Changing Sensor Thresholds......................................................................................................112
8.3.5 Adjusting the Time Allotted for Metrics Collection......................................................................112
8.3.5.1 Global Service Check Timeout Limit...................................................................................113
8.3.6 Changing the Default Nagios User Name....................................................................................113
8.3.7 Disabling Individual Nagios Plug-Ins.........................................................................................115
8.4 Configuring Nagios on HP XC Systems..............................................................................................115
8.4.1 Monitored Nagios Services.........................................................................................................116
8.4.2 Nagios Default Settings..............................................................................................................117
8.4.3 Understanding Nagios Alert Messages........................................................................................118
8.4.4 System Event Log Monitoring....................................................................................................119
8.4.4.1 Understanding the System Event Log..................................................................................119
8.4.4.2 System Event Log Configuration.........................................................................................120
8.4.4.3 Additional Optional Configuration.....................................................................................120
8.5 Nan Notification Aggregator and Delimiter........................................................................................120
8.6 Nagios Report Generator Utility.........................................................................................................121
9 Network Administration............................................................................................125
9.1 Network Address Translation Administration.....................................................................................125
9.2 Network Time Protocol Service..........................................................................................................126
9.3 Changing the External IP Address of a Head Node..............................................................................127
9.4 Modifying Sendmail..........................................................................................................................127
10 Distributing Software Throughout the System........................................................129
10.1 Overview of the Image Replication and Distribution Environment......................................................129
10.2 Installing and Distributing Software Patches......................................................................................130
10.3 Adding Software or Modifying Files on the Golden Client..................................................................131
10.3.1 Installing Additional RPMs from the HP XC System Software Installation DVD...........................131
10.3.2 Using File Overrides to the Golden Image.................................................................................131
10.3.3 Using Per-Node Service Configuration......................................................................................134
10.4 Determining Which Nodes Will Be Imaged.......................................................................................135
10.5 Golden Image Checksum.................................................................................................................135
10.6 Updating the Golden Image.............................................................................................................136
10.6.1 The cluster_config Utility.........................................................................................................137
10.6.2 The updateimage Command.....................................................................................................138
10.6.3 Exclusion Files.........................................................................................................................138
10.6.4 Ensuring That the Golden Image Is Current...............................................................................139
10.7 Propagating the Golden Image to All Nodes......................................................................................139
10.7.1 Using the Full Imaging Installation...........................................................................................139
10.7.2 Using the cexec Command.......................................................................................................140
10.8 Maintaining a Global Service Configuration......................................................................................140
11 Opening an IP Port in the Firewall.........................................................................143
11.1 Open Ports......................................................................................................................................143
11.2 Opening Ports in the Firewall...........................................................................................................144
11.2.1 Opening a Temporary Port in the Firewall.................................................................................144
11.2.2 Opening an IP Port in the Firewall Persistently...........................................................................145
12 Connecting to a Remote Console..........................................................................147
12.1 Console Management Facility...........................................................................................................147
12.2 Accessing a Remote Console.............................................................................................................147
6 Table of Contents