Configure Additional Cluster Administrators#
The ICE ClusterWare™ administrator's command-line tools are found in the
clusterware-tools package,
which is installed by default on the head node by scyld-install
.
It can be additionally installed on any system that has HTTP (or HTTPS,
see Securing the Cluster) access to a
ClusterWare head node in the cluster.
To install these tools on a machine other than the head node,
login to that other system, copy /etc/yum.repos.d/clusterware.repo
from a head node to the same location on this system,
then execute:
sudo yum install clusterware-tools
Once the tools are installed, each administrator must configure a
connection to the ClusterWare service, which is controlled by
variables in the user's ~/.scyldcw/settings.ini
file. The
scyld-tool-config
tool script is provided by the
clusterware-tools package. The contents of the settings.ini
file are discussed in the ICE ClusterWare Command Line Tools. Running that tool and
answering the on-screen questions will generate a settings.ini
file, although administrators of more advanced cluster configurations may
need to manually add or edit additional variables.
Once the settings.ini
is created, you can test your connection by
running a simple node query:
scyld-nodectl ls
This query may complain at this time that no nodes exist
or no nodes are selected,
although such a complaint does verify that the requesting node can
properly communicate with a head node database.
However, if you see an error resembling the one below,
check your settings.ini
contents and your network configuration:
Failed to connect to the ClusterWare service. Please check that the
service is running and your base_url is set correctly in
/home/adminuser/.scyldcw/settings.ini or on the command line.
The connection URL and username can also be overridden for an individual
program execution using the --base-url
and --user
options available
for all scyld-*
commands.
The settings.ini
file generated by scyld-install
will
contain a blank client.authpass variable.
This is provided for convenience during installation,
though for production clusters the system administrator will want to
enforce authentication restrictions.
See details in Securing the Cluster.