Build glibc225 with the changes

Now that we have edited the file, we need to replace the existing tar file with the new version that includes our tweak. a. Return to the SOURCES directory with cd usr src packages SOURCES. b. Enter rm -f glibc-linuxthreads-2.2.5.tar to delete the file. The -f switch merely suppresses the text prompt to confirm deletion - you can use the command without -f if you prefer to be prompted. c. Enter tar -cvf glibc-linuxthreads-2.2.5.tar linuxthreads linuxthreads_db to pack the files located in the...

Supported Interfaces

All Linux-supported Ethernet interfaces All Linux-supported FDDI interfaces ISDN with Raw IP encapsulation ISDN with Cisco HDLC encapsulation The information generated by IPTraf can be valuable in making network organization decisions, troubleshooting LANs, and tracking activity of various IP hosts. Once installed on the system, the IPTraf utility will look like Figure 3-13 on page 179. r 6 2.231.66.55 ssh L192.168.1.Ill 1416 r24.65.31.164 6699 L192 .168.1.3 1192 r24.65.31.164 6699 L192...

Options for NSD

There are different options that can be used with NSD tool depending on the level of detail required. Below is a summary of the options. The NSDtool is constantly evolving and changing, new options may be added in the future. The -help option will show a complete list for the version of NSD you have installed. run in batch mode -- don't write to tty just report system info don't report system info don't log output to log file don't collect process debug info just show version header show...

Logical Volume Manager

The Logical Volume Manager (LVM) is a new feature in Linux. It is a layer between the physical hard disk, or RAID controller, and application. By using the LVM you gain flexibility - you can modify the partition on the fly without unmounting the partition. speed - by striping the logical volume. redundancy - by mirroring the logical volume. You can see how LVM works in the Figure 4-1 on page 215. Note For more information about LVM and how to install it on Linux, read the LVM HOW-TO. You can...

Virtual Fields Activity

Virtual Fields Activities (previously known as DECS RealTime Activities) enhance Lotus Notes applications by enabling them to retrieve external data, such as data from DB2, and to integrate this external data with native Notes data on a single Notes document form. DECS, running on the Domino Server that is hosting the Domino application, intercepts and handles the Domino database events. For example, when Notes or Web client users open, create, update, or save Notes documents, these events are...

Netstat options

-a - Show both listening and non-listening sockets as shown in Figure 3-10 on page 176. -p - Show the PID and name of the program to which each socket belongs, as shown in Figure 3-11 on page 176. -s - Display summary statistics for each protocol as shown in Figure 3-12 on page 177. ctive Internet connections (servers and established) roto Recv-Q Ecrid Q Local Address Foreign Address op 0 0 andren 8 9 8 9 op 0 20 192.168.1.2 ssh 192.168.1 cp 0 0 andren 3 2 7 71 andren 8 9 cp 0 0 andren 8 9 8 9...

Password settings in SuSE

SuSE 8.0 has a tool for system administration that is like the Control Panel in Windows - Yet another Setup Tool (YaST2). This tool can be used either in text mode or in graphical user mode. Note You have to be logged in as root to have access in all areas of YaST2. To quickly change the password settings, you can use the graphical YaST2. Click Start Application - System - YAST2, click Security and Users then Security Settings as shown in Figure 3-1 on page 153. Figure 3-1 Security settings in...

Change one glibc225 header file

The tar command creates a new directory, linuxthreads in the SOURCES directory. We need to edit one file in this directory, and since we are running X-Windows and using KDE on SuSE 8.0, we are going to use the Kate editor. a. Click Start Application - Office - Editors - Kate. c. Starting with the directory (and not the root home directory, which is root) click usr, src, packages, SOURCES, linuxthreads, sysdeps, unix, sysv, linux, and bits. There are only a few files in this directory. d. Click...

Java Domino Console

To start the server with the new Java console, issue the following command server -jc & This command will launch all three components the Domino Server itself, the Domino Controller, and the Domino Console. For those of you familiar with the Win32 Domino Administration client, you will recognize the interface. Note Java Domino Console is new to Domino 6 and it replaces the cconsole that was the built in console program in Domino R5. The cconsole command is still available if you don't have...

Installing the Lotus ADSync tool

In order to use the ADSync tool, you must turn on Domino Directory W2000 Sync Services during the installation of the Domino Administration client. This option is only available with the customize button during the Domino Administration client installation. The synchronization option is not selected by default therefore, check the appropriate box. Figure 5-24 Domino Administration Client Installation Customize Figure 5-24 Domino Administration Client Installation Customize After installing the...

HTTP does not respond

To check if the HTTP process has hung or simply is overloaded requests, a good basic test you can do is telnet to the process in default port 80. For example, if your Domino server is running on a host named listening on the default port 80, you have to run the command telnet itsoredhat 80 Trying 9.95.35.56 Connected to itsoredhat. Escape character is Now you can issue an HTTP command, for example get Trying 9.95.35.56 Connected to iena. Escape character is get Note The 'Get' command should...

Basic Network Troubleshooting

Linux network troubleshooting is very similar to Windows troubleshooting. The main differences are the name of the trace route tool, in Linux is tracertroute and the Windows version is tracert and the syntax of the route command. Things to check if you are unable to access the server Can you ping the server client by name Can you ping the server client by IP address Can you ping the default gateway from both a client and the server If you can ping the server client by IP address but not by name...

Domino server installation steps

The Domino server installation program will launch, and you will first see the Welcome screen. Welcome to the Domino Server Install Program Type h for help on how to use this program Press TAB to begin the installation Press TAB to continue to the next screen Figure 2-11 Domino Install Welcome and New Feature Alert Figure 2-11 Domino Install Welcome and New Feature Alert Throughout the installation, you will press the TAB key to move on (same as clicking Next in a standard GUI). Press TAB and...

Backup management

In this section we discuss the management issues related to backing up files, such as why you still need backups even if you are replicating your databases, how to establish backup cycles, and how to implement incremental backups with the transaction logging enabled in Domino 6. Your Domino implementation may include clustering of your Domino servers so that you can replicate your databases to another system or disk. What we want to point out in this section is that replication does not replace...

Creating the Domino application

For the purposes of this redbook, we chose a simple Domino 6 application and DB2 for Linux. The Domino application pulls data from the SAMPLE database created by DB2. The EMPNO, FIRSTNAME and LASTNAME fields were populated with an agent at the creation of the Domino application, but all remaining fields pull data dynamically from DB2. We begin by starting the Domino 6 Designer from a Windows 2000 workstation. Although we installed the Domino 6 Administrator client with Crossover Office earlier,...

System Logs

The Linux log system is both flexible and powerful, and in many situations, the log information will be very useful. Logs can be generated by the system or by applications. Linux keeps logs in var log unless the administrator changes the path. syslogd is the program (daemon) that is responsible for generating the logs (log entries are caused by events). Almost every application can send information (events) to the syslogd. The syslogd daemon can be set to start at system boot or not, but we...

Basic network security

In the Unix system world, software that is able to connect to (exchange information with) other software on the same system or another system is called a daemon. Usually, the daemon listens on a specified IP and port the Domino server listens on port 1352. A server normally has many daemons running at the same time, such as the ftp daemon, telnet daemon, etc). Through these daemons, another system can connect to the server and exchange information. Daemons are divided into two categories those...

The team that wrote this redbook

This redbook was produced by a team of specialists from around the world working at the International Technical Support Organization, Cambridge Center. Tommi Tulisalo is a project leader for the International Technical Support Organization at Cambridge, Massachusetts. He manages projects whose objective is to produce redbooks on all areas of Lotus Software products. Before joining the ITSO in 2001, he was an IT Architect for IBM Global Services in Finland, designing solutions for customers,...

Clustering

As the Beowulf Project amply demonstrates (http www.beowulf.org), Linux is well-suited to clustering, and this is true of Linux Domino 6 clustering as well. The benefits of Domino clusters are primarily due to two factors In essence, Domino clusters appear to Notes clients as a single server. When a server fails, the other server or servers in the cluster handle client requests seamlessly. When a server in the cluster is overburdened, workload balancing shunts the request to another cluster...

Multiple Network Cards Private LAN

This section covers how to configure Domino to use multiple network card and how to create a private LAN. The reason for creating a private LAN could be for Cluster traffic, inter-server or for administartion, also each partion server requires a separate network card. Use the ifconfig command to check the configuration of the network cards (see Figure 3-14 on page 180) ethO Link encap Ethernet HHaddr 00 50 56 D5 AB 9C inet addr 192.168.0.10 Beast 192.168.0.255 Mask 255.255.255.0 inetG addr fe80...

HTTP thread debugging

Additional diagnostics for the Domino HTTP process are available, and can be enabled when troubleshooting HTTP problems. A request log file can be created for each worker thread by placing the parameter debugthreadlogging on in the httpd.cnf configuration file. When this is enabled, a file is created for each active thread, with information about each request processed appended to the file as requests are made to the server (roughly 10-15 lines per request). These files can be extremely useful...

Verify the DB2 service name

Log in as root and view the etc services file. This can be accomplished by either navigating to the etc directory and issuing more services or from the root login prompt issue the following Locate the service name in the first column that corresponds to the port numbers used by DB2. Specifically, the lower port(50000) represents the service name. These recent additions to the services file should be located near the bottom and look like this. db2cdb2inst1 50000 tcp Connection port for DB2...

Registering users to Active Directory from Domino

In addition to registering users and groups from the Active Directory Users and Groups console for both the Windows 2000 and the Domino environments, you can register them from the Domino Administrator client. Figure 5-39 Domino Administration client Choose certifier Figure 5-39 Domino Administration client Choose certifier Using the Domino Administration client, select the server to be used for registration and select the Configuration tab. On the right side of the screen, select Tools ->...

Java servlets

A servlet is a Java program that runs on a Web server in response to a browser request. Servlets for Domino must conform to the Java Servlet API Specification, an open standard published by Sun Microsystems, Inc. On a Domino 6 server, Java servlet support is disabled by default. In order to enable Java servlets, edit the server document and go to the Domino Web Engine tab, and find the section labeled Java Servlets. Set the appropriate value for the field Java servlet support. There are 3...

Netstat command

Log in as root and type netstat and you will see a screen similar to the one shown in Figure 3-9 on page 175. The columns are described from left to right - the protocol used by sockets (TCP, UDP, raw) - The count of bytes not copied by the user program connected to this socket - The count of bytes not acknowledged by the remote host - Address and port number of the local end of the socket - Address and port number of the remote and of the socket State. The state of the socket. Since there are...

Installing the Lotus Notes client on Linux

Once CrossOver Office is configured, you can then install the Domino Administration Client. By default, the CrossOver Office setup has line items for Microsoft Office, Lotus Notes and Other. Select Lotus Notes, then click the ADD button. The application installation dialog is presented (Figure 5-6 on page 261). Figure 5-6 CrossOver Office - Add Application Figure 5-6 CrossOver Office - Add Application Choose your method of installation either CDROM, or an executable file. Since we downloaded...

Verify the DB2 instance symbolic links

The DB2 Server installation automatically creates a DB2 instance(db2inst1) under the home db2inst1 directory. Included in the instance creation process, the DB2 installation program create symbolic links in the home db2inst1 sqllib directory to files under usr IBMdb2 V7.1. Note Although the DB2 installation CDROM, documentation and installation screens refer to the version as 7.2, we found the actual directory created by the setup script was named V7.1 To confirm their existence, log in as root...

Domino Java Console

Scanmail For Lotus Notes Web Console

The Domino Java Console provides real-time interaction with the Domino Server and is often the fastest way to see what is happening with a server. In Domino 6, the Domino Console is available through a new, powerful Java application. We covered the basics of enabling this tool in Java Domino Console on page 141. The advantage of the new Java Domino Console feature is that, unlike the Win32 Administration client, you can connect to the server Domino is installed on, even when the Domino server...

Showing running daemons

To see what daemons are listening (accepting connections) on your server, log in as root and issue the command netstat -a grep LISTEN as shown in Figure 3-7 on page 163. In this way, you can always check to see if your daemons are listening. Note Linux is case sensitve so the LISTEN should be upper case in the above example. Figure 3-7 netstat -a l grep LISTEN command output Securing daemons If you need a daemon to run and want to control who can connect to your machine and who can not, use the...

Remote Setup

The new Java setup also allow for remote configuration, the setup if virtually the same as the local setup. 1. To run the remote setup you must have installed the Lotus Administrator with the remote server setup option (see Figure 2-28 on page 121) on your workstation. Figure 2-28 Lotus Administrator Remote Server Setup option Figure 2-28 Lotus Administrator Remote Server Setup option 2. Logon to your server with the Domino user account (i.e. Notes), change to the Domino data directoy (i.e....

Setting the Linux PATH environment variable

Before we begin, we are going to make a quick change to our shell environment to make it more user-friendly. If you installed Domino 6 to a different directory than the default, you will need to replace opt lotus bin with the path you chose. Normally, commands are given with the full path - opt lotus bin server for the server executable. Linux searches your PATH environment variable for executables, so we are going to add opt lotus bin, as well as the current directory, to our PATH. Make...

Prerequisite Linux packages for DB2

The DB2 product documentation should be consulted for the official list of prerequisite software. After installing Red Hat Linux V7.2 we found that the only missing package needed was ncurses4. This latest version of this package can be installed when initially installing Linux or later using one of the RPM package tools. Our search for this package resulted in a later version of ncurses, v5, which we installed. Version 4 is a minimum requirement for DB2. To see if you have this package on your...

Treq Scam

C Attached Oes with selected extensions Proceed to the selection of actions to take upon detecting a virus and select what matches your security policy. r* Pass Do nothing to infected files r* Quarantine Move infected files into quarantine database r* Block El lock delivery of mail with infected files ( .uto Clean Automatically clean virus infected files Virus Logging Options i* Email Stamps After this, you should review what level of notifications that are desirable and change the texts for...

Domino log and analysis tools

Domino 6 makes logging even easier for Internet service providers (ISPs), as well as the rest of us. Domino 6 can now create text files that include the IP address or host name of the server that the user requests. This way, you can more easily use the logs to create statistics for virtual servers. To use this feature, you must enable the Extended log format for the access log file in the server document. To create separate statistics for virtual servers, analysis tools still need to sort the...

Operating system backup tools

There are a number of utilities provided by Linux operating system that can be used to used to backup the Linux server machine. This section gives you an overview of these utilities. Many of these utilities are common among the different versions of Unix operating systems. CPIO - This utility is a Unix system backup procedure that has been in existence since the early implementation of the Unix operating system. Files can be backed up and restored from disk or tape. TAR - This utility is a Unix...

HTTP protocol security

Domino 6 is better equipped to fend off cyber attacks than Domino R5. Several new protocol related security settings have been added to the Server document under the Internet Protocols -> HTTP tab. These new settings are designed to discourage attacks that probe for buffer overflows or request parsing errors. The new settings for HTTP protocol security are - Maximum Number of URL Path Segments - Maximum Number of Request Headers - Maximum Size of Request Headers - Mazimum Size of Request...

Backup software from third party vendors

This section lists and introduces some of the numerous backup software provided by third party vendors. Many vendors offer backup software for the Linux operating system and relatively many for the Domino Server. However, at the time of writing, there was only one product available for Domino Server for Linux. Although performing a backup with a backup software on a Domino Server is possible, the major drawback is that you have to shut down the Domino server for the duration of the backup. If...

Registering users in Domino from Active Directory

Now that your certifiers have been associated to your Active Directory containers, you can register users and groups. You have the ability to register existing Active Directory users and groups in Domino. Active Directory Users and Computers Action Vie < 1 X 1 1 01 . if Active Directory Users and Computers odinitsc jl itsolinux.lotus.com H Q Builtin 0 - Computers ffl (i3 Domain Controllers 1+1 LJ ForeignSecurityPrincipals f Users y Group - Global Designated administrators of the domain...

Installing SuSE Linux

In this section, we show you how to install SuSE Linux 8.0 on your server. Note We recommend using SuSE Linux Groupware Server 7 with Lotus Domino or newer instead of the SuSE Linux 8.0 Personal or SuSE Linux 8.0 Professional version. SuSE Linux Groupware Server contains SuSE Entreprise Server 7 and Lotus Domino Server. The SuSE Enterprise Server version has an extended release cycle . The SuSE Enterprise Server has also been certified by the top ISVs, such as IBM. The installation of the SuSE...

Enhancing the Domino server perfomance

Here are some changes you can make to enhance the performance of Domino 6 on Linux. First, the sysctl.conf file is used with the 2.4 kernel to set tunable parameters. This file can be edited with any text editor we are going to use the versatile Kate. You will need to be logged in to KDE as root in order to save the file into etc. 1. Start the text editor program in Red Hat 7.2 by Start Application - Editors -Kate and in SuSE 8.0 by Start Application - Office - Editors - Kate. We need to see if...

Domino file protection

In Domino 6, File Protection documents stored in the Domino Directory database are the basis for configuring browser access control to files. You can enforce file system security for files that browser users can access. For example, for HTML, JPEG, and GIF, you can specify the level of access for these types of files and the names of the users who can access them. You can apply file system protection on CGI scripts, servlets, and agents. However, the file protection does not extend to other...

Before you begin pre installation tasks

First off, you need to make certain you have a Linux user account, as well as a group, under which to run Domino. After booting the system, enter root for the username then the root password you entered during installation. Depending on whether you elected to have X-Windows launch automatically, you will be at the command line prompt or an X-Windows prompt. From the command line, log in as root then type startx to begin an X-Windows session. Otherwise, log in as root and the graphical desktop...

Using the tell command

Domino 6 utilizes a console command that helps in troubleshooting if HTTP hangs. This command is tell http Show Thread State. When entered at the Domino console, this command displays the current status of each active thread, and which URL, if any, the thread is processing. Following is a sample output for three threads. The first two threads are idle the third thread 0xf9 is processing the URL GET reference.nsf Refresh OpenAgent HTTP 1.0 Other Info GET reference.nsf Refresh OpenAgent HTTP 1.0...

Creating users and groups in Active Directory

To access Active Directory Users and Computers from your Windows workstation click Start - gt Programs - gt Administrative Tools - gt Active Directory Users and Computers. You may initiate Active Directory actions in the right-hand results pane, or in the left-hand navigation pane. Domino users and groups are created by either of two methods In the left pane, right-click an entry and choose your action from the pop-up menu. In the results pane, select one or more users and groups, then select...

Installing Trend Micro Scan Mail for Lotus Notes Domino

In this section we provide the information about what you need to do to install MicroTrend ScanMail for Lotus Domino. - RedHat versions 6.2 or higher - Domino Server versions 5.0.3 or higher 40MB available free disk space for program files, and 100MB free disk space for swap files Note It is recommend tp read the readme file for the latest information before you install. This is included in the package with the program. No special set up is required for the Domino installation or OS before you...

Antivirus solutions for Domino Server

The antivirus software for Domino server, works at application level, in this case at Domino level. It can scans for viruses inside Domino databases and attached files inside E-mail messages. At the time of writing there we were few companies that had a antivirus product for Domino for Linux. The first company to release such a product was Kaspersky. The name of the product is Kaspersky Anti-Virus Business Optimal for Lotus Notes Domino Symantec also has an antivirus product for Domino on...

Create virtual server or host

If you want to create a virtual server or host, in the Domino Directory select the Domino server and choose Actions - gt Create Web R5- gt Virtual servers from the menu bar. Now you will be asked whether you want to create a virtual host or a virtual server. Choose Virtual Host. Creating a virtual server is pretty much the same, except you will be asked for the IP address instead of the hostname. On the Basics tab, enter the hostname of your added virtual host. On the Mapping tab, specify the...