Configure Additional Cluster Administrators#
The ICE ClusterWare ™ administrator's command-line tools are found in the
clusterware-tools package,
which is installed by default on the head node by cw-install.
It can be additionally installed on any system that has HTTP (or HTTPS,
see Securing the Cluster) access to a
ClusterWare head node in the cluster.
To install these tools on a machine other than the head node,
login to that other system, copy /etc/yum.repos.d/clusterware.repo
from a head node to the same location on this system,
then execute:
sudo yum install clusterware-tools
Once the tools are installed, each administrator must configure a
connection to the ClusterWare service, which is controlled by
variables in the user's ~/.scyldcw/settings.ini file. The
cw-tool-config tool script is provided by the
clusterware-tools package. The contents of the settings.ini
file are discussed in the ICE ClusterWare Command Line Tools. Running that tool and
answering the on-screen questions will generate a settings.ini
file, although administrators of more advanced cluster configurations may
need to manually add or edit additional variables.
Once the settings.ini is created, you can test your connection by
running a simple node query:
cw-nodectl ls
This query may complain at this time that no nodes exist
or no nodes are selected,
although such a complaint does verify that the requesting node can
properly communicate with a head node database.
However, if you see an error resembling the one below,
check your settings.ini contents and your network configuration:
Failed to connect to the ClusterWare service. Please check that the
service is running and your base_url is set correctly in
/home/adminuser/.scyldcw/settings.ini or on the command line.
The connection URL and username can also be overridden for an individual
program execution using the --base-url and --user options available
for all cw-* commands.
The settings.ini file generated by cw-install will
contain a blank client.authpass variable.
This is provided for convenience during installation,
though for production clusters the system administrator will want to
enforce authentication restrictions.
See details in Securing the Cluster.