Product specifications are subject to change without notice and do not represent a commitment on the part of Avid
Technology, Inc.
The software described in this document is furnished under a license agreement. You can obtain a copy of that license by
visiting Avid's Web site at www.avid.com. The terms of that license are also available in the product in the same directory as
the software. The software may not be reverse assembled and may be used or copied only in accordance with the terms of the
license agreement. It is against the law to copy the software on any medium except as specifically allowed in the license
agreement.
Avid products or portions thereof are protected by one or more of the following United States Patents: 4,970,663; 5,267,351;
5,309,528; 5,355,450; 5,396,594; 5,440,348; 5,467,288; 5,513,375; 5,528,310; 5,557,423; 5,577,190; 5,584,006; 5,640,601;
5,644,364; 5,654,737; 5,715,018; 5,719,570; 5,724,605; 5,726,717; 5,729,673; 5,745,637; 5,752,029; 5,754,851; 5,799,150;
5,812,216; 5,828,678; 5,842,014; 5,852,435; 5,999,406; 6,038,573; 6,061,758; 6,141,007; 6,211,869; 6,532,043; 6,546,190;
6,596,031; 6,636,869; 6,747,705; 6,763,523; 6,766,357; 6,813,622; 6,847,373; 7,081,900; RE40,107; 7,403,561; 7,433,519;
D352,278; D372,478; D373,778; D392,267; D392,268; D392,269; D395,291; D396,853; D398,912.
Other patents are pending.
This document is protected under copyright law. An authorized licensee of Avid iNEWS Command may reproduce this
publication for the licensee’s own use in learning how to use the software. This document may not be reproduced or
distributed, in whole or in part, for commercial purposes, such as selling copies of this document or providing support or
educational services to others. This document is supplied as a guide for Avid iNEWS Command. Reasonable care has been
taken in preparing the information it contains. However, this document may contain omissions, technical inaccuracies, or
typographical errors. Avid Technology, Inc. does not accept responsibility of any kind for customers’ losses due to the use of
this document. Product specifications are subject to change without notice.
The following disclaimer is required by Apple Computer, Inc.:
APPLE COMPUTER, INC. MAKES NO WARRANTIES WHATSOEVER, EITHER EXPRESS OR IMPLIED, REGARDING
THIS PRODUCT, INCLUDING WARRANTIES WITH RESPECT TO ITS MERCHANTABILITY OR ITS FITNESS FOR ANY
PARTICULAR PURPOSE. THE EXCLUSION OF IMPLIED WARRANTIES IS NOT PERMITTED BY SOME STATES. THE
ABOVE EXCLUSION MAY NOT APPLY TO YOU. THIS WARRANTY PROVIDES YOU WITH SPECIFIC LEGAL RIGHTS.
THERE MAY BE OTHER RIGHTS THAT YOU MAY HAVE WHICH VARY FROM STATE TO STATE.
The following disclaimer is required by Sam Leffler and Silicon Graphics, Inc. for the use of their TIFF library:
Permission to use, copy, modify, distribute, and sell this software [i.e., the TIFF library] and its documentation for any purpose
is hereby granted without fee, provided that (i) the above copyright notices and this permission notice appear in all copies of
the software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may not be used in any
advertising or publicity relating to the software without the specific, prior written permission of Sam Leffler and Silicon
Graphics.
THE SOFTWARE IS PROVIDED “AS-IS” AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR
OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE.
IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT
OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF
LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
The following disclaimer is required by the Independent JPEG Group:
This software is based in part on the work of the Independent JPEG Group.
This Software may contain components licensed under the following conditions:
Copyright (c) 1989 The Regents of the University of California. All rights reserved.
2
Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph
are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such
distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the
University may not be used to endorse or promote products derived from this software without specific prior written
permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE.
Copyright (C) 1989, 1991 by Jef Poskanzer.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby
granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission
notice appear in supporting documentation. This software is provided "as is" without express or implied warranty.
Copyright 1995, Trinity College Computing Center. Written by David Chappell.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby
granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission
notice appear in supporting documentation. This software is provided "as is" without express or implied warranty.
Copyright 1996 Daniel Dardailler.
Permission to use, copy, modify, distribute, and sell this software for any purpose is hereby granted without fee, provided that
the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in
supporting documentation, and that the name of Daniel Dardailler not be used in advertising or publicity pertaining to
distribution of the software without specific, written prior permission. Daniel Dardailler makes no representations about the
suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
Modifications Copyright 1999 Matt Koss, under the same license as above.
Copyright (c) 1991 by AT&T.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this
entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all
copies of the supporting documentation for such software.
THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR,
NEITHER THE AUTHOR NOR AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE
MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.
This product includes software developed by the University of California, Berkeley and its contributors.
The following disclaimer is required by Nexidia Inc.:
Manufactured under license from the Georgia Tech Research Corporation, U.S.A. Patent Pending.
The following disclaimer is required by Paradigm Matrix:
Portions of this software licensed from Paradigm Matrix.
The following disclaimer is required by Ray Sauers Associates, Inc.:
“Install-It” is licensed from Ray Sauers Associates, Inc. End-User is prohibited from taking any action to derive a source code
equivalent of “Install-It,” including by reverse assembly or reverse compilation, Ray Sauers Associates, Inc. shall in no event be
liable for any damages resulting from reseller’s failure to perform reseller’s obligation; or any damages arising from use or
operation of reseller’s products or the software; or any other damages, including but not limited to, incidental, direct, indirect,
special or consequential Damages including lost profits, or damages resulting from loss of use or inability to use reseller’s
products or the software for any reason including copyright or patent infringement, or lost data, even if Ray Sauers Associates
has been advised, knew or should have known of the possibility of such damages.
The following disclaimer is required by Videomedia, Inc.:
“Videomedia, Inc. makes no warranties whatsoever, either express or implied, regarding this product, including warranties with
respect to its merchantability or its fitness for any particular purpose.”
“This software contains V-LAN ver. 3.0 Command Protocols which communicate with V-LAN ver. 3.0 products developed by
Videomedia, Inc. and V-LAN ver. 3.0 compatible products developed by third parties under license from Videomedia, Inc. Use
of this software will allow “frame accurate” editing control of applicable videotape recorder decks, videodisc recorders/players
and the like.”
3
The following disclaimer is required by Altura Software, Inc. for the use of its Mac2Win software and Sample
Source Code:
The following disclaimer is required by Ultimatte Corporation:
Certain real-time compositing capabilities are provided under a license of such technology from Ultimatte Corporation and are
subject to copyright protection.
The following disclaimer is required by 3Prong.com Inc.:
Certain waveform and vector monitoring capabilities are provided under a license from 3Prong.com Inc.
The following disclaimer is required by Interplay Entertainment Corp.:
The “Interplay” name is used with the permission of Interplay Entertainment Corp., which bears no responsibility for Avid
products.
This product includes portions of the Alloy Look & Feel software from Incors GmbH.
This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
Avid Interplay contains components licensed from LavanTech. These components may only be used as part of and in
connection with Avid Interplay.
Attn. Government User(s). Restricted Rights Legend
U.S. GOVERNMENT RESTRICTED RIGHTS. This Software and its documentation are “commercial computer software” or
“commercial computer software documentation.” In the event that such Software or documentation is acquired by or on behalf
of a unit or agency of the U.S. Government, all rights with respect to this Software and documentation are subject to the terms
of the License Agreement, pursuant to FAR §12.212(a) and/or DFARS §227.7202-1(a), as applicable.
SynchroScope, Syntax, Targa, TDM FlexCable, Thunder, Titan, Titansync, TL Aggro, TL AutoPan, TL Drum Rehab,
TL Everyphase, TL Fauxlder, TL In Tune, TL MasterMeter, TL Metro, TL Space, TL Utilities, Torq, Torq Xponent, Transfuser,
Trigger Finger, Trillium Lane Labs, TruTouch, UnityRAID, Vari-Fi, Velvet, Venom, VideoRAID, Video Slave Driver, VideoSPACE,
VideoSpin, Vortx, Xdeck, X-Form, Xmon, Xponent, X-Session, and X-Session Pro are either registered trademarks or
trademarks of Avid Technology, Inc. in the United States and/or other countries.
Footage
Arri — Courtesy of Arri/Fauer — John Fauer, Inc.
Bell South “Anticipation” — Courtesy of Two Headed Monster — Tucker/Wayne Atlanta/GMS.
Canyonlands — Courtesy of the National Park Service/Department of the Interior.
Eco Challenge British Columbia — Courtesy of Eco Challenge Lifestyles, Inc., All Rights Reserved.
Eco Challenge Morocco — Courtesy of Discovery Communications, Inc.
It’s Shuttletime — Courtesy of BCP & Canadian Airlines.
Nestlé Coffee Crisp — Courtesy of MacLaren McCann Canada.
Saturn “Calvin Egg” — Courtesy of Cossette Communications.
“Tigers: Tracking a Legend” — Courtesy of www.wildlifeworlds.com, Carol Amore, Executive Producer.
"The Big Swell" — Courtesy of Swell Pictures, Inc.
Windhorse — Courtesy of Paul Wagner Productions.
Arizona Images — KNTV Production — Courtesy of Granite Broadcasting, Inc.,
Editor/Producer Bryan Foote.
Canyonlands — Courtesy of the National Park Service/Department of the Interior.
Ice Island — Courtesy of Kurtis Productions, Ltd.
Tornados + Belle Isle footage — Courtesy of KWTV News 9.
WCAU Fire Story — Courtesy of NBC-10, Philadelphia, PA.
Women in Sports – Paragliding — Courtesy of Legendary Entertainment, Inc.
News material provided by WFTV Television Inc.
GOT FOOTAGE?
Editors — Filmmakers — Special Effects Artists — Game Developers — Animators — Educators — Broadcasters — Content
creators of every genre — Just finished an incredible project and want to share it with the world?
Send us your reels and we may use your footage in our show reel or demo!*
For a copy of our release and Avid’s mailing address, go to www.avid.com/footage.
*Note: Avid cannot guarantee the use of materials submitted.
Avid iNEWS v3.3 Administration Guide • 0130-30XXX-01 • Created 6/17/13 • This document is distributed by
Avid in online (electronic) form only, and is not available for purchase in printed form.
Congratulations on your purchase of your Avid iNEWS system. It is a vital part of the Avid
news system solution that integrates with other Avid systems and third-party equipment to
provide an ideal nonlinear workflow and optimize the news production process.
This guide is part of a two-book set designed to keep pace with current advances in the Avid
system’s news production capabilities. The set—made up of this book and the Avid iNEWS Setup and Configuration Guide—is a comprehensive resource of all administrative
information you will need to take advantage of the many options available to you.
This guide will lead you through even the most complex procedures with task-oriented
instructions. The information provided here builds on basic news production procedures
described in the help system and other user-based guides, while adding a complete
explanation of all of the tools and techniques required to manage the newsroom computer
system, including useful tips, shortcuts, and custom options.
The documentation describes the software features and hardware related to the iNEWS
n
newsroom computer system, which is extremely customizable. Your system might not contain
certain features and/or hardware that are covered in the documentation.
Symbols and Conventions
Avid documentation uses the following symbols and conventions:
Symbol or Convention Meaning or Action
n
c
w
A note provides important related information, reminders,
recommendations, and strong suggestions.
A caution means that a specific action you take could cause harm to
your computer or cause you to lose data.
A warning describes an action that could cause you physical harm.
Follow the guidelines in this document or on the unit itself when
handling electrical equipment.
Symbol or Convention Meaning or Action
>This symbol indicates menu commands (and subcommands) in the
order you select them. For example, File > Import means to open the
File menu and then select the Import command.
This symbol indicates a single-step procedure. Multiple arrows in a list
indicate that you perform one of the actions listed.
(Windows), (Windows
only), (Macintosh), or
(Macintosh only)
Bold fontBold font is primarily used in task instructions to identify user interface
Italic fontItalic font is used to emphasize certain words and to indicate variables.
Courier Bold font
Ctrl+key or mouse actionPress and hold the first key while you press the last key or perform the
If You Need Help
If you are having trouble using your Avid product:
1. Retry the action, carefully following the instructions given for that task in this guide. It
is especially important to check each step of your workflow.
2. Check the latest information that might have become available after the documentation
was published:
-If the latest information for your Avid product is provided as printed release notes,
they ship with your application and are also available online.
This text indicates that the information applies only to the specified
operating system, either Windows or Macintosh OS X.
items and keyboard sequences.
Courier Bold font identifies text that you type.
mouse action. For example, Command+Option+C or Ctrl+drag.
20
-If the latest information for your Avid product is provided as a ReadMe file, it is
supplied on your Avid installation CD or DVD as a PDF document
(README_product.pdf) and is also available online.
You should always check online for the most up-to-date release notes or ReadMe
because the online version is updated whenever new information becomes
available. To view these online versions, select ReadMe from the Help menu, or visit
the Knowledge Base at www.avid.com/readme.
3. Check the documentation that came with your Avid application or your hardware for
maintenance or hardware-related issues.
4. Visit the online Knowledge Base at www.avid.com/onlinesupport. Online services are
available 24 hours per day, 7 days per week. Search this online Knowledge Base to find
answers, to view error messages, to access troubleshooting tips, to download updates,
and to read or join online message-board discussions.
...With the Syntax of Commands
If you are at the console and are unsure about the function of a command, use the help
command.
To view instructions about using a command:
If You Need Help
tUse the following command:
For instance, type:
The following data appears:
dbvisit -<d or v or i> [-r or -c name] [-s] [-l] [block# ...]
‘r’ for read only
‘s’ for “slow” to eliminate cache usage
‘c’ use checkpoint partition (forces “-s”)
‘i’ to just validate isam files
‘l’ to list link count distribution
Lengthy console displays might be edited to emphasize only the most important information
n
in this guide. An ellipsis (...) represents portions of the console display not shown in the text.
Also, because of the margin limitations of this guide, command lines might appear wrapped
to multiple lines. This does not necessarily indicate the need to press an Enter key. Unless
otherwise indicated, commands should be typed on a single line, allowing the computer to
wrap the text whenever the command line stretches beyond the screen margin.
help dbvisit
help
<command name>
for an explanation of the dbvisit command.
21
Avid Training Services
Avid makes lifelong learning, career advancement, and personal development easy and
convenient. Avid understands that the knowledge you need to differentiate yourself is always
changing, and Avid continually updates course content and offers new training delivery
methods that accommodate your pressured and competitive work environment.
To learn about Avid's new online learning environment, Avid Learning Excellerator
(ALEX), visit http://learn.avid.com.
For information on courses/schedules, training centers, certifications, courseware, and
books, please visit www.avid.com/training or call Avid Sales at 800-949-AVID
(800-949-2843).
™
22
1Introduction
The iNEWS newsroom computer system is an integrated digital news production system,
which provides journalists, producers, directors, writers, and technical personnel with an
array of tools to make their jobs easier.
This chapter contains the following main sections:
•Overview of iNEWS
•System Administrator Tasks
-Basic Tasks
-User Tasks
-Database Tasks
-Security Tasks
-Customizing the System
-Storage Maintenance Tasks
-Device Tasks
-Reviewing Default Settings
-Troubleshooting
Overview of iNEWS
An iNEWS newsroom computer system provides:
•News gathering from text sources
•News production, including:
-Story creation and script editing
-Association of machine control items to script
-Show planning and creation
-Show archiving
-Contact organization and scheduling
•News to air, including:
-On-air playback control
-File exporting
-Internet publishing
Some primary components of iNEWS include:
•Linux-based computers running the iNEWS Server software. In this guide, these host
computers are referred to as the iNEWS Servers, or individually as server A, server B,
and so forth.
•A Windows-based computer running the PuTTY Command Sender program. This
computer is known as the console.
•Windows- or Vista-based computers running the iNEWS client software. These
computers are known as iNEWS Workstations.
•Windows-based computers running the iNEWS Data Receiver software, which is used
to ingest wires and other text-based research material
•Other peripherals, such as printers and teleprompters.
Additionally, the iNEWS system is capable of interfacing with a wide variety of production
devices. Avid iNEWS Command provides a central point of control for numerous video
servers and graphics devices, or MOS protocol may be used to send playlists to
MOS-compatible playout controllers.
System Administrator Tasks
The following sections describe common system administrator responsibilities and tasks.
Basic Tasks
Before you can customize or maintain the iNEWS newsroom computer system, you must
learn several basic tasks, which include:
•Start up or shut down iNEWS Server software, which includes logging out users and
taking the system offline.
•Back up a site file before making file modifications.
•Send system administrator commands from the console to one or more of your system’s
computers.
•Become a console superuser, capable of performing actions that are only accessible to
users with superuser permissions.
User Tasks
A user is anyone who can log in to the database and use iNEWS NRCS. Your
responsibilities regarding users are:
System Administrator Tasks
•Monitor user information, such as users’ access privileges and which users are currently
logged in.
•Customize the traits of users’ accounts to enable users to more effectively use the
system.
•Provide a new employee access to the information stored in the iNEWS NRCS database
by creating a new user account.
•Remove user accounts of former employees to prevent improper access to the iNEWS
NRCS database.
Database Tasks
The iNEWS system database contains the information your organization needs to function.
A system administrator’s tasks associated with the database include:
•Design forms (that is, story templates) to display important information about stories in
a queue.
•Monitor changes to files and queues in the database.
•Unlock or delete any item in the database, and recover items that were accidentally
deleted or corrupted.
25
1 Introduction
•Create new folders or queues in the iNEWS system database to meet your organization’s
•Remove a directory or queue from the database, if it is no longer used.
•Change the name or traits of an existing directory or queue.
•Assign the mailbox trait to queues for configuring automatic story distribution into and
Security Tasks
There are many ways to ensure the security of your iNEWS system. Your responsibilities
regarding system security include:
•Monitor and change passwords or force users to change them by setting up system
•Monitor user login activity to guard against unauthorized use of the iNEWS system.
•Assign security to a directory or queue, limiting access to a specific group of users.
•Restrict database access by placing users into security groups based on job roles and
Customizing the System
expanding needs—including setting up rundowns.
out of queues.
checks and modifications.
need for information.
26
Your responsibilities regarding customization include:
•Customize command names, message text, and other items by changing their entries in
your system’s dictionary files.
•Create templates for the CG Title Entry tool.
•Design and assign custom keyboards for users with a unique set of keyboard macros.
Storage Maintenance Tasks
You will want to monitor the database regularly to ensure adequate storage. Storage
maintenance tasks include:
•Monitor how much free space is available in the database and, if necessary, increase the
amount to prevent the system from running out of space.
•Perform preventive database maintenance by periodically running certain utility
programs that can find and fix minor problems before they become serious.
•Backup the entire database or portions of it onto tape, so if necessary, the information
can be restored to the database later.
•Make a backup copy of files any time you make important changes.
System Administrator Tasks
Device Tasks
A device is any kind of hardware or software that performs a specific function when it is set
up on the iNEWS system. Your responsibilities regarding devices include:
•List the parameters of any device running on your system or list all devices of one type.
•Add any type of device to your system, if you have the capacity and license permission.
•Edit site-specific files, to change the setup information for a device in your system’s
configuration file.
•Reconfigure the system so it recognizes any changes you make to your system’s
devices.
•Set up printer styles so users can print stories or queues in predetermined formats. For
example, a director rundown only showing specific rundown fields.
•Set up servers, which are utility programs automatically performing various actions on
the database.
•Change wire distribution and sorting of data coming into your database from a wire
service to queues based on their category codes or content.
•(Optional) Write dialogs—lists of instructions—for each connect service to automate
the connection process. A connect service is a device that connects a user to a remote
computer system.
Reviewing Default Settings
Your responsibilities regarding system profiles, default settings, and command syntax
include:
•Changing a system profile setting to change your system’s operation.
•Reviewing default settings of all system profile parameters.
•Reviewing command syntax for edit, console, and job list commands.
Troubleshooting
Your troubleshooting responsibilities include:
•Transfer system activities from a halted computer to other system computers. If a
computer connected to the system has been halted, bring the system back to operation
using the remaining computers
•Reconnect a computer that has been halted. Following routine maintenance, reintegrate
a computer into your system’s operation.
27
1 Introduction
28
2Connect Services
Connect services are utilities you can set up to enable iNEWS users to connect to other
computers or information services over the network, such as a remote console for your
iNEWS newsroom computer system.
This chapter contains the following main sections:
•Network Services
•Adding System Services
•Console Connect Sessions
2 Connect Services
Network Services
It is useful to set up a service to let you connect to your iNEWS Servers. For instance, setting
up network remote connect services lets you perform many administrative tasks from your
iNEWS Workstation rather than from the console.
Dialogs for Connect Services
A dialog is a script that tells the service what prompts to expect from the device it connects
to, and provides the service with appropriate responses for each prompt. Using any service
involves some routine activities, such as logging in, that you do each time you use that
service. You can create a dialog for any service to handle these routine activities.
Building a Dialog
This section explains how to design and create a simple dialog that logs a user in to an
information service. Once logged in, the dialog yields control to the user until he/she is
ready to close the connection. Then the dialog logs the user out of the service and closes the
connection.
When you design a dialog, it is helpful to turn on the
perform the procedure you want to incorporate into the dialog. This way, steps in that
procedure are captured to a story that you can refer to while designing the dialog; each line
in the dialog is built as a line of the story.
This process includes the most commonly used dialog commands.
To build a dialog:
1. Create a dialog queue.
Each dialog must be in a separate queue in the SYSTEM.DIALOGS directory. The first
step in creating a new dialog is to go to SYSTEM.DIALOGS and create a queue to hold
it. The name you give this queue is also the name of the dialog, so choose a queue name
that describes what the dialog does, such as Console, for a dialog used during connect
sessions to the console. See the iNEWS Setup and Configuration Guide for more
information about adding new directories, queues or stories.
2. Open a new story in the queue and build the dialog.
3. Type a message that will be displayed on the user’s workstation, indicating the
connection is being established, using the following format:
message text
The message dialog command displays on the user’s screen whatever text you enter in
place of the text parameter.
capture
connect command and
30
Network Services
4. Type:
wait CONNECT
When you use a modem to make the connection, you want the dialog to wait until the
modem sends the word CONNECT to the workstation, signaling it has made the
connection.
If necessary, use these additional commands to accommodate the login procedure:
CommandDescription
delay
type
5. To send your login data, such as an account number, type
nn
text
Use this command to pause the dialog while the service continues connect
and login processes.
(nn is the number of seconds you want the dialog to pause before continuing
to the next command)
Use the type command to send a text message to the device to which the
workstation is being connected.
type text
with text being the
account number.
pass
6. Type
to yield control to the user after login is complete.
This command instructs the dialog to pass whatever the user enters to the device to
which the service has connected.
pass x
Use
should be a character or symbol, such as the at symbol (@), he or she will not normally
use.
pass
Use
the connection.
7. Type commands to log out of the service.
When the user exits a connection using the quit connect command, the dialog resumes
and performs the logout process and closes the connection.
8. Attach the dialog to the service by placing the dialog’s name in the service’s dialog
parameter in the service table, located in the SYSTEM.SERVICE queue.
9. Type the
Dialog Commands
Available dialog commands are flexible enough to script entire connect sessions. For
instance, a dialog could be constructed to automatically log in to the remote console and
“unbusy” a rundown if desired.
to include a character the user can enter to cue the dialog to resume. The x
alone to instruct the system to accept what the user enters until he/she closes
configure -s
command to incorporate this change into the service.
31
2 Connect Services
The available dialog commands are reviewed in “Command References” on page 117.
Dialog Examples
Here are a few examples of dialogs for remote console connect services:
In the example, <cr> and <lf> are used to indicate a “carriage return” and “line feed.”
Adding System Services
A service consists of two parts:
•A network resource, set up as a device in the configuration file (/site/config).
•The service, set up in the service table in the database file (SYSTEM.SERVICE); it uses
the resource to make a connection.
To add a new service to your system, you must design and build the service and select a
network resource for the service to use. If an appropriate resource does not exist, create
one.
32
Setting up the Service
To set up the service and its resource:
1. Determine whether the service and its resource exists.
Try connecting to a service you want. If it works, then the necessary programs are
installed. If you cannot find the service, or one does not work, call Avid for help.
2. Choose a device number for the resource and a name for the service. In the following
examples, the service name is console.
Check your configuration file (/site/config) to determine the appropriate device number
for your new resource. For a network resource, choose a number in the range you have
reserved for services, servers, and similar devices. Ensure the number you choose is out
of the range used for normal devices.
See the iNEWS Setup and Configuration Guide for more information on the Site
n
Configuration file and selecting servers via the PuTTYCS application.
3. Add the resource to the configuration file on each server in your system.
a.Add the device number of the network resource to the reslist line in the server’s host
definition.
Adding System Services
b.To keep the network resource available if you bring down one of the system servers,
add this line to any appropriate alternate host definitions.
The following steps use ed to modify system files. If you are unfamiliar with this line editor,
n
see “The Line Editor, ed” on page 299.
ed
c.Use
The general format for a network resource configuration line is:
resource <device #> <resource name> <device name>
ParameterDescription
device #Identifies resource’s device number.
resource nameName you want to give to the resource. Network resources can share the
device nameResource’s device name. If you do not want to give it a name, put a hyphen
(line editor) to open the configuration file. The display will look similar to:
NRCS-A
$ ed /site/config
1356
same name; services choose the first available resource of the correct kind.
In the following example, we call the resource net.
in this position.
33
2 Connect Services
For instance, our new network resource configuration line would look like this:
resource 220 net - ; net connect
4. Add the service to the service table in the database.
Each service installed in your system is defined on a separate line in your system’s
service table, which is the first story in SYSTEM.SERVICE. Each service defined in the
service table consists of a few parameters that determine how the service behaves. It
does not matter where in the service table you add the new line.
A service line has six parameters in this general format:
The following table contains information on service line formats:
ParameterDefinition
serviceName you want the service to have.
hostName of the server where you want the service to look for its resource. List
the target server’s name in your system’s /etc/hosts file.
A hyphen in this position will force the service to search each server until it
finds one that has a resource it can use.
34
dialogIf you want the service to use a dialog, put the dialog name in this position of
the service line. Otherwise, fill this position with a hyphen.
resourceName of the resource you want the service to use.
groupYou can restrict who can use the service by specifying a user group. If you do
not want to restrict access, place a hyphen in this position.
commandSpecifies the command you want the service to use to handle communication.
To create a service using telnet, type the
specify the program’s full pathname and include the system name to which
you are connecting.
telnet
command here. Ensure you
You will need one such service line for each server on your system. Use the ssh
command in the following way:
/usr/bin/ssh <servername> -1 <username>
The following sample entries in SYSTEM.SERVICE let you establish a network
connection to your console from an iNEWS Workstation session.
a - console console sysops /usr/bin/ssh NRCS-A -l so
b - console console sysops /usr/bin/ssh NRCS-B -l so
Adding System Services
The resource assigned to the service must be configured on the computer you want to
log in to.
5. (Optional) Create a dialog for the service.
If you want your service to follow certain instructions every time it is invoked, create a
dialog for the service containing those instructions. See “Building a Dialog” on page 30
for more information.
6. (Optional) Test your configuration changes on iNEWS. See the iNEWS Setup and Configuration Guide for more information on testing the site configuration file.
7. Reconfigure the system.
This causes your system to note changes and incorporate them into appropriate
programs. Do the following:
See the iNEWS Setup and Configuration Guide for more information on selecting servers
n
and the superuser mode.
a.Select the console window for the master computer (typically server A).
b.Enter superuser mode.
c.Type what appears in bold text:
NRCS-A# offline
d.If you added a new resource or modified an existing one in the process of creating a
new service, reconfigure your system by typing the following:
NRCS-A# configure
If you modified an existing service or added a service that uses an existing network
resource, you did not make any changes to your system’s configuration file. So, you
need to have the system note only changes made to the service table by typing the
following:
NRCS-A# configure -s
8. When the prompt returns, type what appears in bold text:
NRCS-A# online
9. Exit superuser mode by holding the Control key (Ctrl) down and typing the letter D. A
message similar to the following will appear:
A Tue Oct 5 00:18:58 2000 msg System being configured
When you see the system prompt, the network service you created and its resource you
added (if any) is ready for use.
10. (Optional) Back up site files.
35
2 Connect Services
If you have made significant changes, back up your site files with the
command.
Console Connect Sessions
To connect to the console from an iNEWS Workstation—that is, after the network
remote connect service and its resources are set up—do the following:
1. Log in to any iNEWS Workstation, with a user account allowed to use the Connect to
Service feature.
2. Select Communicate > Connect to Service. The Connect to Service dialog box will
appear, offering you a list of services.
As shown in this example, two options are provided to connect to the console—each
option corresponding to a different iNEWS Server.
sitedump
console
36
3. Double-click on the service you want.
A dialog box will appear with a dialog (as defined in the SYSTEM.DIALOGS) that
requests a password.
4. Type in the password and press Enter.
5. Once connected, the dialog box will display the console prompt, similar to what appears
on the console when you are logged in as a system operator.
Here is an example of a remote console connection:
Console Connect Sessions
6. You can now perform various administrative tasks through the console connect session,
as opposed to doing them while physically located at the console.
c
To stop a console connect session, press Ctrl+D. Do not close the dialog box by selecting
File > Close or by clicking on the X button in the upper-right corner.
37
2 Connect Services
38
3Database Security
This chapter describes how to use various features in the iNEWS newsroom computer
system to establish and maintain database security.
This chapter contains the following main sections:
•Establishing Security Procedures
•User Passwords
•Checking Password Status
•Tracking User Activity
•Using Group Security to Control System Access
3 Database Security
Establishing Security Procedures
Use the following guidelines to improve the security of your system:
•Set up official security procedures and have everyone follow them.
•Keep track of your backup tapes. You can get user passwords from a backup tape.
•Assign users superuser status only when they need it.
•If any user does not need superuser status, remove it. Create two user accounts for staff
members who need superuser privileges—one to be a superuser and another to be a
regular user. That way, you can track activity of superuser accounts.
•Change the superuser password regularly.
•Ensure that users do not use their names, station call letters, or other easily guessed
words as passwords. Require everyone to include at least one non-alphabetic character
such as a punctuation mark or a number.
•Use the system profile to set a required minimum length for all passwords so no one
uses a short password.
•For devices for which you have dedicated resources—that is, devices that have a
one-to-one correspondence between the physical device and device number used to
identify it—use device name security on workstations in specific locations and put the
device ID in a group.
•If you have dedicated resources, you can put a MODIFY-DEV field in the queue’s story
form if you suspect that someone has broken into a user’s account. When changes are
made to stories created after the MODIFY-DEV field has been added, the system puts
the device name of the workstation where changes were made in that field. This
information is kept internally, but having the MODIFY-DEV field makes it visible to
users.
•Be familiar with valid user accounts on your system. Restrict access to these account
names to protect against unauthorized outside access.
User Passwords
Your iNEWS newsroom computer system protects against unauthorized access by giving
each authorized user a password to log into the system. Group security, described under
“Using Group Security to Control System Access” on page 47, lets you control specific
areas of your database that each user can access.
For added security, iNEWS uses encryption to pass user credentials to the server.
40
Checking Password Status
A user account without a password is an open door to your system. You should always give a
user a password when you add the user to your system. See the iNEWS Setup and Configuration Manual for more information on setting up new user accounts.
However, if you suspect that a user does not have a password or has not changed it in awhile,
you can find out for certain from any iNEWS Workstation.
For information on how to check password status from the console, see “Listing Users Who
n
Do Not Have Passwords” on page 272.
To check user password status from an iNEWS Workstation:
1. Log in as a system administrator—that is, use a superuser account.
2. Select Tools > Options > Users.
The Manage User Accounts dialog box appears.
Checking Password Status
3. Type an asterisk (*) in the User ID field if it does not already appear.
The iNEWS system recognizes this as a wildcard and therefore will search the entire
database of users.
The other criteria options available in this dialog box are explained in the iNEWS Setup and
n
Configuration Manual.
4. Click the Advanced button.
41
3 Database Security
The Advanced Search Settings dialog box appears with All Users selected by default.
5. Do one of the following:
tTo search for all users without passwords, select Users Without Passwords.
tTo search for all users who have not changed their password within a specific time,
select Date Range. Then click Password Changed, and specify the time frame to
search.
6. Click OK to confirm your advanced search setting or click Cancel to cancel it.
7. Click Search to initiate the search.
A progress bar appears if a lengthy search is underway. Results of the search appear in
the User List field in the center of the Manage User Accounts dialog box.
As a system administrator, you can change a user’s password. Change a user’s password
to provide a new user with a temporary password or to supply an established user with a
new password if the user forgets it and cannot log in. See the iNEWS Setup and Configuration Manual for more information on how to do this from any iNEWS
Workstation. For steps on how to change a user’s password from the console using the
utraits console command, see “Changing a User’s Password” on page 270.
42
Forcing Individual Users to Change Their Passwords
Occasionally, you might have individual users who do not change their passwords as
required. When that happens, you can force them to change their password at their next
login. You can do this for a single user at an iNEWS Workstation.
To force multiple users to change their passwords—such as all users who haven’t changed
their passwords in the past six months—you must go to the console. For steps on how to
force password changes from the console, see “Changing a User’s Password” on page 270.
. . . At an iNEWS Workstation
To force an individual user to change his or her password:
1. Select Tools > Options > Users.
The Manage User Accounts dialog box appears.
2. Type the user name in the User ID field.
3. Click Search.
4. Select the user name when it appears in the dialog box.
5. Click Modify.
Checking Password Status
The Modify User Account dialog box appears.
6. Check the Force Change box.
7. Click OK.
43
3 Database Security
The next time the user logs in, he or she will be required to choose a new password.
Tracking User Activity
Keep a record of who uses iNEWS and when they use it by following the procedures
described in this section. These security measures can ensure there is no unauthorized use of
your system.
At an iNEWS Workstation, you can determine:
•Last login date of one or more user accounts
•Date user accounts were created
•Users currently logged in
At the console, you can determine attempted and successful logins.
Tracking User Login Activity and Date Created
You can search for a user account’s last login and the date the user account was created from
an iNEWS Workstation.
. . . At an iNEWS Workstation
To search for a user’s last login:
1. Select Tools > Options > Users.
The Manage User Accounts dialog box appears.
2. Click Advanced. The Advanced Search Settings dialog box appears.
3. Click Date Range.
4. Do one of the following:
tTo search for user accounts with a last login date that matches a specified date
range, click Last Login.
tTo search for user accounts created within a specified date range, click Account
Created.
5. Specify a date range in the From and To fields.
6. Click OK.
7. Click Search.
The requested user name information appears.
44
. . . At the Console
Another command you can type at the console will give you valuable information about
users:
list u-t [<username>]
This command shows the date and time a user account was created, date and time of last
login, and date and time of last password change.
If you do not specify a particular user name to check, you will get a listing for all users.
Listing Users Currently Logged in
From the iNEWS Workstation, you can see a list of all users logged in, and you can find out
whether a specific user is currently logged in.
To see a list of all logged-in users:
1. Press Ctrl+L or select Communicate > Messages > Logged In Users.
A dialog box appears with a list of users currently logged in.
2. Click OK when you are done looking at the list.
Tracking User Activity
To determine whether a specific user is logged in:
1. Select the Message bar.
2. Type the user name in the To field.
3. Move cursor to the message field, using the mouse or Tab key.
4. One of three symbols appears to the left of the To field, depending on what you type in
the To text box:
Icon Description
If the user is currently logged in, an icon of connected cables appears to the left of the
user name.
If the user is not currently logged in, an icon of disconnected cables appears to the left of
the user name.
If there is no such user name in the system, a question mark appears to the left of the user
name.
45
3 Database Security
Recording Logins
Keep track of successful and attempted logins to preserve system security. You can spot
unauthorized users, people logging in at odd hours, or repeated attempts to guess passwords.
To monitor logins from different types of devices:
1. Change the value for the W_LOGTYPES token in the dictionary /site/dict/words. A
typical definition for this token might look like this:
W_LOGTYPES/G
Each letter in the W_LOGTYPES value represents a different type of device that can log
in on an iNEWS newsroom computer system.
The letters are the same ones that appear in the first column of a list s or list c display for
these device types.
2. To track logins by device type, add the appropriate letter to the W_LOGTYPES value.
Use the following letters:
LetterDescription
GiNEWS Workstation
46
gWeb Client
BWeb sessions
CCommunity sessions
cCOM
AInterplay (Instinct or NewsCutter)
aWeb Services API
IInstinct
For instance, to track logins from all devices on your system, change the
W_LOGTYPES line to look like this:
W_LOGTYPES/GBc
The letters can appear in any order.
On a busy system, this can create a large amount of console activity.
n
Using Group Security to Control System Access
3. When a user logs in at a device of a type listed in W_LOGTYPES, a message similar to
the following is sent to the console:
Regardless of the W_LOGTYPES value, a message is always sent to the console when a
superuser logs in or out. This message includes (n) if the user is a superuser. An
unsuccessful login by a superuser generates a message only if the device type used is
included in W_LOGTYPES.
Using login tracking in conjunction with console history and disk logging, you can keep
accurate records of who is using your system and when and where they are connecting
to it.
A listing of currently logged in users may be obtained from the console using the list s
command. See “list s” on page 149 for more information.
Using Group Security to Control System Access
Your system is designed to be used by a wide range of people. For the system to
accommodate so many diverse job roles, restrict sensitive areas of your database to
authorized users. The system’s powerful security features let you restrict access to important
directories and queues.
c
Security ensures that only authorized people can view or make changes to important
queues. It does not provide absolute privacy, because superusers can open any story
while performing normal system maintenance. Warn your staff not to store personal or
confidential material in the database.
Many security features in iNEWS involve establishing groups and assigning privileges and
restrictions to them. The iNEWS Setup and Configuration Manual gives you complete
information about using the group features in iNEWS to help you maintain system security.
47
3 Database Security
48
4Database Management
This chapter provides you with information required to manage the iNEWS database, where
all business data, such as stories, is stored. Much of the iNEWS system data is stored in
configuration files, which is covered in the Avid iNEWS Setup and Configuration Guide.
This chapter contains the following main sections:
•Monitoring Free Space
•Tracking Database Space over Time
•Increasing Database Space for Immediate Use
•Maintaining the Database
4 Database Management
Monitoring Free Space
The iNEWS newsroom computer system is constantly collecting wire stories and adding
them to the database while the news staff adds scripts, rundowns, memos, assignment sheets,
and other stories. To avoid running out of disk space, iNEWS tracks old stories. As stories
get old, the system purges them.
Distribution and purging of disk space is called the database cycle. In this cycle, wire stories
are collected and stored in the database for a specific interval of time. Other news items,
such as scripts and assignment sheets, are created by the news staff and also kept for a preset
period of time, called the purge interval, which is set individually for each queue. Any story
older than its queue’s purge interval is purged, and its space is reclaimed for new stories.
The purge interval is a database trait, so you can set different purge intervals for queues and
directories, depending on the information they hold. Setting purge intervals appropriate for
stories in various queues helps keep the database from growing too large.
Once an hour, at 15 minutes after the hour, an automatic dbpurge program scans each queue
for stories older than the queue’s purge interval and moves these stories into the Dead queue.
Stories sent to the Dead queue are not erased until the system needs the space. Until the
system reclaims this space, stories in the Dead queue can be read, searched, edited, copied,
or printed. To retrieve a story from the Dead queue, select the story and copy it to a different
queue in the database, where you have write permission.
Although you can open stories in the Dead queue, they are marked for removal and will be
permanently removed when the system detects the computer is running out of storage space.
Your system keeps track of the space available by examining and maintaining a list of free
space on the disk. The free list is explained in “Monitoring the Free List” on page 51.
Understanding Database Storage Units
Your computer’s disk is divided into blocks. The database portion of the disk is divided into
1024-byte blocks. When a story is saved, the system allocates as many blocks as necessary
to hold the story and then divides the story among those blocks.
Blocks used to hold a story need not be sequential; a story can be saved in blocks that are
apart. To tie together all blocks, each block contains a reference to the block containing the
next part of the story.
A block is either “in use” or “free”.
Previous versions of iNEWS worked on 32-bit operating systems with 1k blocks; iNEWS v4.0
n
and later runs on RHEL 6, a 64-bit OS with 4k blocks.
50
Monitoring the Free List
The free list is the list of free space on the disk. By keeping track of space in the free list, the
system can detect when it is running low on space. It runs an automatic
which removes the oldest stories from the Dead queue and adds the space to the free list,
where it is made available to the system. This way, dbserver maintains the volume of free
space available in the database.
The free list measures space in blocks (a block=1024 bytes), and has a lower limit called the
lowwater mark, which represents the least amount of free space available. When the space
available drops below the lowwater mark, the system runs dbserver to reclaim enough space
from the Dead queue to rebuild the free list to the highwater mark.
Together, the highwater and lowwater marks determine the free list’s normal operational
range. If the system cannot get back up to the highwater mark after reclaiming free space,
the user will get a low on space message. Create free space immediately, as explained in the
following section.
Understanding How the System Copies Stories
You can configure iNEWS to distribute a wire story to several queues when it is received.
Likewise, two or more users can put copies of the same story into their personal queues. If
you copy and distribute enough stories, a large portion of the database can become cluttered
with the copies.
Monitoring Free Space
dbserver
program,
To avoid filling up the disk with copies of stories, your system keeps only the original story
on the disk. When a story is copied to another queue, your system puts a reference to the
original story in the queue that will hold the copy.
When someone opens a copy of a story, the system uses the reference to find the original
story. It makes a working copy of that story, which it sends to the user. If the user examines
the working copy and makes no changes, the working copy is deleted when the user closes
the story.
However, if the user makes changes to the working copy and saves it, the system saves that
copy as a story, replacing the reference.
In most cases, you can treat a reference to an actual story as if it were the story. The only
time you need to take references into consideration is when setting purge intervals. When the
system references a story to several different queues, each reference takes on the purge
interval of the queue. When a reference becomes older than its queue’s purge interval, the
computer puts the reference, not the actual story, in the Dead queue.
51
4 Database Management
The space used for a story becomes free only when the last reference to the story has been
removed from the system.
Tracking Database Space over Time
Do not wait until you encounter an “out-of-space” condition before you start to think about
database storage. There are two ways you can get a good picture of space usage over time:
•The “hogs” report
•The information generated by the dbfree command
Using the hogs Command to Obtain Information
The hogs command displays how much space particular queues are using in the database. It
uses this format:
hogs [<directory or queue name>]
To get a hogs report on the People directory, type:
hogs people
52
A screen similar to the following appears:
% USED SHARED HELD LOCKED PURGE QUEUE NAME
0 36 20 0 0 0 PEOPLE.LEVY.BYLINE
0 128 20 0 0 0 PEOPLE.LEVY.FINAL
0 32 40 0 0 0 PEOPLE.LEVY.FORM
...
0 425 40 0 0 0 PEOPLE.WALTERS.NOVEL
The USED column contains the number of blocks used in that queue. The SHARED column
indicates the number of blocks used in that queue that are also used in other queues. To get
the number of blocks used only by that queue, subtract the SHARED count from the USED
count. If any queue has a substantially greater number of used blocks than the others,
examine that queue more closely.
Increasing Database Space for Immediate Use
To obtain a hogs report on the entire database, type:
hogs .
To send a hogs report to yourself, type:
NRCS-A# sh
# hogs . | mail <your username> &
For more examples on how to use the hogs command, see “hogs” on page 138.
n
Using dbserver and dbfree to Obtain Information
To obtain an accurate idea of how much space is being used by stories in the system:
1. Empty out the Dead queue and reclaim all space used in it. Type:
dbserver 16000000
You must run dbserver when other programs like dbpurge are not running.
n
2. The next day, or after completion, run the dbfree program to see how much space is
being devoted to functions in your newsroom you consider critical.
3. Repeat this process from time to time, so you are aware of trends in space usage.
Use the information to make decisions on projected storage needs, and how space is
used.
Increasing Database Space for Immediate Use
If your database has not reached the “Low on Space” point, but you want to increase free
space for immediate use, do the following:
The dbfree command—used by a system operator or a superuser—displays database
size, free list size, and percentage of remaining database available. The freelist number
indicates how many database blocks are used to hold the free list. The free list is
compressed. This results in anywhere from 250 to 5,000 free-block numbers contained
in each free list block. In this example, 1,493 blocks are used to hold the 1,746,564 free
block numbers. That is an average of 1,169 free block numbers per free list block.
53
4 Database Management
2. Back up old material to tape and remove it from the database.
3. Check and reset purge intervals of Wires directories and queues.
One of the biggest consumers of database space in a newsroom is the Wires directory.
Because wire stories lose much of their value after a few days, most newsrooms set a
purge interval of 2 or 3 days. In this example, all Wires directories and queues have a
purge interval of four days. The purge interval is a database trait you can customize for
each database directory or queue. For more information on modifying database traits,
including purge intervals, see the Avid iNEWS Setup and Configuration Guide.
Maintaining the Database
The following sections describe the two most important maintenance procedures you should
perform regularly on your database:
•Check the database for errors
•Clean up the database on a monthly basis
Checking the Database for Errors
In the large databases typically maintained by newsrooms, minor errors can develop in some
stories as a result of vast amounts of information the system processes every day. These
errors can grow and eventually begin to damage the database if they are not removed.
To check stories in your database for errors, use the dblines console command, which
examines every story in the database. You can run dblines on any server while the system is
online. It can point out problems or errors in the structure of the database, find queue
corruption that must be fixed before a dbvisit is run, and make some repairs. It cannot
reclaim unreferenced blocks, adjust link counts, or rebuild the free list; dbvisit is required for
that.
54
Maintaining the Database
Since dblines examines every story in your database, it requires several hours to complete its
task, so run dblines before you go home at night. By the time you return in the morning, it
should be done.
When dblines discovers an error, it ordinarily sends an error message to the console.
However, if you run it at night, you can have the system send its messages to a log file for
you to review the next day.
For more information on the various commands used in this section, see “Command
n
References” on page 117.
To execute the command and have it send output to a log file:
1. Enter superuser mode on the master computer.
2. Type:
To execute the dblines command so it logs at a specified time:
1. Enter superuser mode on the master computer
2. Get the current time, using the date command:
You must use 24-hour military time.
n
3. Set the schedule, such as 5 minutes later, using the at command:
4. Type the dblines command line:
dblines . > /tmp/dblines.log
You can also use the at command to schedule the dblines command to run at a specified
time. For instance:
NRCS-A# date
Sat Jul 10 11:05:07 EDT 2010
NRCS-A# at 11:10
/exc/dblines . > /tmp/dblines.log
<Ctrl+D>
Pressing Ctrl+D after entering the command line marks the end of commands to be
executed according to the at schedule. Afterwards, the server prompt returns to the
original prompt, showing the server name, such as NRCS-A#.
After the dblines is complete, you can check the log file for error messages, by using the
grep command:
NRCS-A# grep failed /tmp/dblines.log
55
4 Database Management
This searches the log file for the word failed. If there are no errors involving queue
corruption, such as <queue> scan failed , <queue> read error, or unable to open
<queue>, the prompt will simply be returned. If there are any error messages related to
queue corruption, call Avid for assistance.
If you want to review the entire log, you can use the doc command to place a copy in a
queue you specify. For instance, replacing the previous example, the sequence of
commands (shown in bold) may appear similar to the following:
In the example, the system would execute the dblines command at 11:10, and then place
the output in PEOPLE.SYSADMIN.NOTES. As indicated by the pound sign (#) in the
prompt, you must be in superuser mode to execute the commands.
Cleaning the Database
Over the course of a month, the iNEWS database may develop minor errors in its
structure—the overall organization in which individual stories are arranged. These errors are
the result of normal database cycles in which old material is removed and new information is
added.
These errors grow and begin to damage the database if you do not remove them. The
database cleanup procedure identifies errors so you can repair them before they become
harmful.
Unless you are instructed to perform this procedure more often, do a database cleanup once
n
a month.
You can conduct database cleanup, using the dbvisit command, while your system offline or
online. The procedures for each are provided in the following sections:
•Cleaning Your Database Offline
•Cleaning Your Database with Online Dbvisit
56
Cleaning Your Database Offline
The database cleanup procedure using the dbvisit command requires you to briefly take your
system offline, preventing users from logging in.
The day before performing the monthly database cleanup offline, do the following:
1. Select the console window for the master computer (typically server A).
Maintaining the Database
2. Type
To check the database structure for errors, dbvisit must perform a cursory check of stories in
n
the database, including those in the Dead queue. You can shorten the time it takes dbvisit to
examine the database by using dbserver to empty the Dead queue first.
The dbserver command initiates a day-long operation and should be done one day ahead of
the next steps in this procedure. Your system remains online during the operation.
After the dbserver operation is completed, you are ready to clean up the database
offline, by doing the following:
1. Shutdown the system, by completing the following steps:
For more details on the procedure for shutting down the system, see the Avid iNEWS Setup
n
and Configuration Guide.
dbserver 16000000
Starting the day before, allows time for the system to complete this process, which may
take several hours, before you run dbvisit.
a.From the PuTTYCS application, select the PuTTY Filter created for sending server
commands to all servers, such as iNEWS Consoles.
b.Take the system offline.
c.Log out all users.
The dbvisit command cannot examine stories being edited. You must log out
everyone on the system and stop all news programs on the servers before running
dbvisit.
to empty the Dead queue.
c
d.Run the stop all console command on all servers to stop all workstations, wires, and
other devices from making further changes to the database.
After using the stop all command, wait a few seconds for the prompt to reappear. When
it does, proceed to the next step.
If conducting a dbvisit offline, ensure system is offline and that you have stopped all
network devices. If you do not do this before cleaning your database, you may corrupt
the data when you perform the cleanup. For procedures to conduct an online dbvisit,
see “Cleaning Your Database with Online Dbvisit” on page 59.
57
4 Database Management
2. Start the database cleanup by doing the following:
a.Select the console window for the master computer (typically server A).
b.Enter superuser mode.
c.Type:
Running dbvisit on all servers instead of just the master computer is an option, performed by
n
dbvisit -dr
typing
dbvisit is running on the master server. The read-only dbvisit cannot be started until the
read-write dbvisit reaches the 'traversing directory' phase. After dbvisit runs on all
computers, the output can be compared to verify the integrity of the mirror.
dbvisit -d
A message similar to the following appears:
09:31:45 opening database
09:31:45 traversing roots
The -d instructs dbvisit to print a period each time it visits a new queue and a colon
for every 1,000 stories in a queue. After you have done a few cleanups, you can
judge how far dbvisit has progressed by the number of periods it has printed. When
you run dbvisit, it begins with the root file structure and then examines the entire
directory. As it inspects the root files and then the directory, dbvisit prints messages
indicating its progress.
-l
Add the
the output. If there are link count discrepancies, the system will list them. Such
advisory messages about high and low link counts are not errors, however, you will
be prompted to correct them.
The dbvisit process has four main phases:
flag (the letter L) to include the link count distribution information in
. The 'r' indicates read-only mode, and it can run while the read-write
58
-Visiting the “root” blocks
-Traversing the project, directory and queue structures
-Visiting the stories
-Updating the free list and fixing link counts
3. Beginning with iNEWS version 4.x, dbvisit was modified so that it would no longer
allow you to update the free list if critical errors are found in the database. Instead, if
critical errors are found, dbvisit will attempt to traverse the directories, reporting all
errors it finds, and then completes without offering an opportunity to update the free list.
Errors reported during the traversal of stories are not considered critical. Therefore, if
the system presents you with the question: Update the free list (y/n)?, do one of the
following:
y
tType
tType
to update the free list.
n
to skip the update.
Maintaining the Database
If there are many story errors, you may want to skip the update and contact Avid to assess
n
the problems.
In addition to spotting errors in the database structure, dbvisit collects any
unreferenced blocks and puts them on the free list. Unreferenced blocks are not
used by any story and are not a part of the free list. They are stray blocks that cannot
be used until they are put on the free list. Skipping this update of the free list retains
the old free list. While this means that unreferenced blocks are not collected back to
the free list, you can add them to the free list later by performing another dbvisit.
4. Restart your system, by doing the following:
a.From the PuTTYCS application, select the PuTTY Filter created for sending server
commands to all servers, such as iNEWS Consoles.
b.Exit superuser mode by pressing Ctrl+D.
c.Type
d.Type
The system displays Hot-to-go messages as the devices start. If a device cannot be
started, a failed message is displayed for that device. Wait for the other devices to start,
then use standard procedures to restart failed devices, as covered in the Avid iNEWS Setup and Configuration Guide.
Cleaning Your Database with Online Dbvisit
If performing a dbvisit offline prevents usage of your system for too long a period of time,
there is a way to run dbvisit while your system is online, letting system administrators do
crucial database maintenance without stopping iNEWS users from doing their work.
The strategy used to allow an online dbvisit is to checkpoint the system in a quiet/inactive
state, and to maintain the checkpoint state by copying any block that is to be change in the
database onto the checkpoint partition, namely /dev/rp5backup prior to writing the block
onto the database partition - /dev/rp5.
Your system must be shutdown briefly before initiating checkpoint mode. But after
checkpoint is turned on, you can bring your system online for iNEWS users while
performing database cleanup with the dbvisit command.
Do not conduct an online dbvisit without checkpoint mode initiated.If you do, not do this
n
before cleaning your database, you may corrupt the data when you perform the cleanup.
online
restart all
to bring the system back online.
to restart all devices.
59
4 Database Management
To perform an online dbvisit:
1. Bring the iNEWS system down and close the database on all servers. This is only for the
very brief period of time it takes to ensure checkpoint mode is active.
a.From the PuTTYCS application, select the PuTTY Filter created for sending server
commands to all servers, such as iNEWS Consoles.
b.Type
c.Type
offline
logout all
to take the system offline.
to logout all users. You might want to broadcast a message to
users prior to this so they can save their work and prepare for the brief downtime.
d.Type
shutdown
to stop all devices and close the database.
e.The system will present a warning and question: Do you really want to do this?
y
(y/n)? Type
to shut down the system.
2. Initiate checkpoint mode.
a.(Optional) Type the
status
command to determine which server is the master
computer and view the current status of the database.
For instance:
WAVD-A# status
A is OFFLINE and has been CONFIGURED. ID is WAVD.
System is AB. Master is A.
Disk status is OK. The database is CLOSED.
b.Select the console window for the master computer (typically server A).
c.Type
Attempting to turn checkpoint on while the database is open will result in the following
n
warning: Database must be CLOSED when activating checkpoint --
checkpoint on
to reopen the database in checkpoint mode.
60
3. Bring the iNEWS system online.
a.From the PuTTYCS application, select the PuTTY Filter created for sending server
commands to all servers, such as iNEWS Consoles.
b.Type
online
c.(Optional) Type the
to bring the system online.
status
command to view the current status of the database.
For instance:
WAVD-A# status
A is ONLINE and has been CONFIGURED. ID is WAVD.
System is AB. Master is A.
Disk status is OK. The database is OPEN with checkpoint.
Maintaining the Database
Users can now log in to iNEWS.
4. Start the database cleanup by doing the following:
a.Select the console window for the master computer (typically server A).
b.Enter superuser mode.
c.Type:
More details on the dbvisit command syntax and all of its flags are provided in Command
n
References appendix of this guide. See“dbvisit” on page 132 for more information.
5. Beginning with iNEWS version 4.x, dbvisit was modified so that it would no longer
allow you to update the free list if critical errors are found in the database. Instead, if
critical errors are found, dbvisit will attempt to traverse the directories, reporting all
errors it finds, and then completes without offering an opportunity to update the free list.
Errors reported during the traversal of stories are not considered critical. Therefore, if
the system presents you with the question: Update the free list (y/n)?, do one of the
following:
dbvisit -cd
A message similar to the following appears:
09:31:45 2013-06-30 Using checkpoint partition
09:31:45 traversing roots
-----message truncated for documentation brevity-----
The dbvisit process has four main phases:
-Visiting the “root” blocks
-Traversing the directory, queue, and project structures
-Visiting the stories
-Updating the free list and fixing link counts
y
tType
tType
If there are many story errors, you may want to skip the update and contact Avid to assess
n
the problems.
6. At the end of the dbvisit process, you might be presented with the question: Do you
want to turn off the checkpoint (y/n)?
tType
to update the free list.
n
to skip the update.
y
to turn checkpoint mode off.
A message similar to the following appears:
09:51:17 Checkpoint partition closed
09:51:17 complete - Elapsed time: 20:32
61
4 Database Management
7. (Optional) Type the
status
command to view the current status of the database.
For instance:
WAVD-A# status
A is ONLINE and has been CONFIGURED. ID is WAVD.
System is AB. Master is A.
Disk status is OK. The database is OPEN.
62
5Avid System Monitoring
This chapter provides you with information about monitoring iNEWS Server statistics via an
SNMP monitoring application such as Avid System Monitor (ASM).
This chapter contains the following main sections:
•Using SNMP Monitoring on the iNEWS Server
•Installing and Enabling the SNMP Agent
5 Avid System Monitoring
Using SNMP Monitoring on the iNEWS Server
Avid iNEWS version 4.5 supports SNMP monitoring. SNMP monitoring applications, such
as Avid System Monitor, lets you monitor system level environmental information
dynamically through an SNMP agent. Avid System Monitor also lets you graph this
information over time. For example, the following data can be graphed over time in the Avid
System Monitor web page interface:
•Average CPU load
•Number of CPU interrupts per second
•System uptime
•Swap space (disk space reserved for memory when RAM is fully loaded)
•System memory usage
•CPU usage
By default, the SNMP Agent is not enabled.
Installing and Enabling the SNMP Agent
64
This section describes how to install and enable the SNMP agent on the iNEWS Server. See
your Avid representative for information about setting up an Avid System Monitor server
and configuring it to monitor the iNEWS Server.
These steps should be performed only by qualified Avid personnel.
n
To install the SNMP agent on the iNEWS server:
1. Install the net-snmp Red Hat 6 packages. This will create a /etc/snmp directory.
2. Set up the snmpd.conf configuration file. In the /etc/snmp directory, locate the
snmpd.conf file. Using a Linux editor, open the configuration file and add the following
information near the top of the file.
a.Replace the public value in
b.Locate the line with
city.
c.Locate the line with
3. Save the changes and exit.
rocommunity public
syslocation
syscontact
and add your location, such as the name of your
and add your iNEWS administrator email.
with your community name.
Installing and Enabling the SNMP Agent
To enable the SNMP agent process:
tIn a console to the server, type:
# service snmpd start
t(Optional) Set snmpd to automatically start at boot by typing:
# chkconfigsnmpd on
To disable the SNMP agent process:
tIn a console to the server, type:
# service snmpd stop
65
5 Avid System Monitoring
66
6Backing Up the iNEWS System
Proper maintenance of the iNEWS system requires three kinds of backups:
•Database backups—of the iNEWS database
•Software backups—of iNEWS software and the operating system
•System file backups—of files like /site/config and /etc/hosts
This chapter explains the procedures for the various types of backups necessary to maintain
the iNEWS system. It also provides general information about using tapes and tape drives or
conducting a tapeless backup for iNEWS on RedHat Enterprise Linux.
This chapter contains the following main sections:
•Tape Operations
•Backing up the iNEWS Database
-Backing up the Entire Database to Tape
-Tapeless Database Backup
-Backing up Individual Queues
•Restoring Data to the iNEWS Database
•Disaster Recovery Planning
•Backing up Software
•Backing up System Site Files
6 Backing Up the iNEWS System
Tape Operations
When making backup tapes, pay particular attention to the write-protect tab on the tape. If
you have trouble writing to the tape, check the tab and try moving it in the opposite
direction.
When loading a tape, ensure the tape has finished loading before issuing tape commands.
Trying to access the tape before it is ready may result in a “hung” process that waits forever
for the tape to be ready. The only solution is a reboot. For DAT tapes, wait at least a minute
after all tape activity lights cease blinking to be sure the tape is properly loaded.
Always clearly label tapes with the type of backup tape it is, date it was produced, and
n
command used to produce it. Ensure that your tapes can be found quickly, in case of
emergency.
Since the database is mirrored on all servers in your system, it does not matter on which
server you produce the database backup tape. You might want to rotate which server does the
database tape dump so the tape drives wear evenly and you extend the life of the drives.
Alternatively, you might want to always run the backup on one server’s drive so you have
another, relatively unused drive standing by in case the heavily-used drive develops
problems. However, for software and site file backups, Avid recommends separate backups
be made on each iNEWS Server.
Later in this chapter, various procedures are provided for checking data on tapes, searching
for specific data on tapes, and restoring data from tapes. For more information, see “Listing
Tape Contents and Backup Dates” on page 81 and “Searching a Tape” on page 84.
Establishing Policies for Backup Procedures
Since your software and system files change infrequently, you do not need to back them up
very often. Your database, however, changes hundreds or even thousands of times every day,
so they need more frequent backups
Avid recommends your station establish and follow a local backup policy for each type of
data in your iNEWS system.
The following list has some general backup guidelines:
•Since the database is mirrored across multiple servers you have built-in hardware
redundancy. Backups also provide some protection against the rare cases of database
corruption.
•One approach is weekly backups rotating through 5 tapes, one for each week of the
month. If you need to keep old data for a period of time you may supplement the five
tape rotation with 12 more tapes labeled with the months in the year.
68
•Do not store archived material beneath daily show production queues. Segregate archive
material under it’s own directory.
•If you archive old shows on your system, you might want to produce dbdump tapes that
cover old years For instance, ARCHIVE.2008 through ARCHIVE.2009, and store them
separately.
•It is a good idea to make extra copies of the tapes and store them off site. If your
computer room is destroyed, you can buy new servers. But if the computer room is
destroyed with all backup tapes stored in the room, your data is lost. Many corporations
use off-site storage services for backup tapes.
Backing up the iNEWS Database
Database backups provide insurance against system calamities. Also, to free up space in the
database, you can back up stories to a tape—or to a file, which can be transferred to another
computer for storage—and then remove those stories from the database.
Avid recommends making frequent backups of important material and the entire database.
To back up database items, you will need to use the dbdump console command.
Backing up the iNEWS Database
The dbdump Command
The dbdump command backs up the news database, including the People files, show
rundowns, wire stories, and root database information such as user accounts, passwords, and
directory traits. All user, database, and group traits are stored within the database.
The simplest form of the dbdump command is:
NRCS-A# dbdump c
The c stands for create. When you use this command, it overwrites any information currently
on the tape and does a full database backup of everything—except the contents of any queue
or directory with its skip flag enabled.
The skip flag is a database trait that prevents the dbdump c command from backing up
n
contents of queues and directories. Generally, Wires queues and the Dead queue are usually
skip-flagged so they are not backed up. This results in less time for the backup and less tape
used. If a dbdump reaches the end of the tape and still has more data to back up, you will be
prompted for another tape. For more information on skip flags—also known as the Skip
Backup database trait—see the iNEWS Newsroom Computer System Setup and
Configuration Manual.
69
6 Backing Up the iNEWS System
For instance, to dump all database items contained in the SCRIPTS.2010 directory to tape,
you could type:
dbdump c -n script.2010
If you already have dbdump material on tape and you want to append another dbdump to the
end of it, use the following command:
NRCS-A# dbdump ad
An append does not overwrite dbdump information currently on the tape. See “Backing up
Individual Queues” on page 77 for more information.
To minimize the impact of any potential problems, perform dbdump at less critical usage
n
periods.
Backing up the Entire Database to Tape
This section provides the procedure for backing up the iNEWS database to a tape. For
information on tapeless database backups, see “Tapeless Database Backup” on page 72.
To back up the entire database to tape:
c
1. Insert a tape into a server’s tape drive.
2. Select the server that has the backup tape. For information on selecting a server, see the
iNEWS Newsroom Computer System Setup and Configuration Manual.
3. Type
When backing up the database onto a tape, anything on that tape is overwritten by the
new copy of the database.
4. Type
dbdump c
A verification request similar to the following appears:
Do you really want to create a new archive? (n/y)
y
to begin copying the database to tape.
Information similar to the following appears:
Starting Dump(1), block(0)
dumping isam user
...
3121 stories dumped
Ending Dump(1), block(223)
.
70
Backing up the iNEWS Database
As dbdump copies, the console displays messages like those above. The number of
stories dumped and the ending block mentioned in these messages depends on your
system.
When the console prompt returns, the backup is done. You can then verify the backup.
Otherwise, remove the tape from the drive. Set the tape’s write protect switch to the on
position, return it to its case, and write the date on the case label.
5. (Optional) Type
dbrestore tdv
at the console to verify the backup was
complete—that everything you wanted backed up was copied to tape.
The dbrestore tdv console command lists every directory and queue on the tape. Since
the tape contains most of the database, this list is very long.
To list contents of a tape, the server must read the entire tape; therefore, listing contents
n
takes approximately as long as it does to back up the database to tape.
A truncated example of the output of the dbrestore tdv command looks like this:
Listing tape contents only!
Type Stories Name
Dir
Que DEAD
Dir SYSTEM
Dir SYSTEM.KEYBOARDS
Que 1 SYSTEM.KEYBOARDS.000-INSTALLATION
...
Que 3 TEST.SMITH
3630 stories listed
The first column of the listing identifies whether the item is a queue or a directory. If it is
a queue, the second column indicates how many stories are in that queue. The third
column displays the name of the directory or queue.
If any queues in the list do not have stories listed, then either the queue has no stories, or
the queue has its skip flag enabled. If the skip flag is enabled, the queue name is copied
to tape, but none of its stories are copied. In the previous example, the Dead queue does
not have any stories on the tape.
6. When the list is complete, remove the tape.
7. Set the tape’s write protect switch to the on position, and write the date on the case label.
71
6 Backing Up the iNEWS System
Tapeless Database Backup
Instead of backing up the iNEWS database to tapes for potential restoration, you can dump
the information to a file and then transfer (FTP) the backed up data to another computer for
storage. The more compact way to do this is to use the dbdump C command piped through
gzip and directed to create a file in the /tmp/directory. For instance, type:
NRCS-A$: dbdump C -f+ |gzip > /tmp/061709.gz
To dump information to a file without the gzip option:
1. On an iNEWS Server, use the dbdump command in the following format:
dbdump Cv -f <path/file name>
For instance, type:
NRCS-A$ dbdump Cv -f /tmp/dbdump.061709
The C option creates a new dump file, and the v option switches on the verbose mode,
which gives you an idea of progress. After you enter the command, a message similar to
the following is displayed:
Starting Dump(1) Block(0), dumped on 2009-06-17 16:33:37
Dumping ISAM files
Dumping user
Dumping message
Dumping group
Dumping system-blobs
Dumping community
Type Stories Name
Dir
Dir SHOW
Dir SHOW.TRAINING
Que SHOW.TRAINING.RUNDOWN
Que SHOW.TRAINING.CG
Que SHOW.TRAINING.VIDEO
Que 44 SHOW.TRAINING.MASTER
72
Backing up the iNEWS Database
…
Que 1 SHOW.MOSGWE
Que 31840 SHOW.VID-ID
Dir SHOW.SCRIPTWRITING
Que SHOW.SCRIPTWRITING.ONE
Que SHOW.SCRIPTWRITING.TWO
Que SHOW.SCRIPTWRITING.THREE
Que 5 SHOW.NEWSTARTEST
Que ARCHIVE.SCRIPTS.2009
310 directories scanned
1684 queues dumped
3109046 stories dumped
Ending Dump(1) Block(136), dumped on 2009-06-17 16:33:37
2. On a Windows-based PC with at least 16 GB free for storage, start a command prompt
CMD
session, by selecting Start > Run and then entering
3. Navigate to the directory on the PC where you want to store the backup file by typing
and the directory path. In this example, the directory is
.
C:\dbdumps
cd
.
4. At the cmd prompt, type
ftp -i
and press Enter to start the FTP session.
73
6 Backing Up the iNEWS System
5. Then type the open command using the following format:
open <resolvable name or IP of iNEWS Server> 49152
The numerical value at the end of the command line is the number for the port, which
should be 49152.
74
so
6. Type
and press Enter. Then enter the system operator password when prompted. A
message will appear to indicate whether the login was successful.
Backing up the iNEWS Database
7. Type
8. Type
cd /tmp
binary
to change to the /tmp directory.
to change to binary mode.
9. (Optional) You can list the directory contents to get the name of the file you want to
transfer, by entering the command:
ls -l
10. To transfer the dump file, enter the get command using the following format:
get /tmp/<filename>
75
6 Backing Up the iNEWS System
76
The FTP command prompt will reappear in the window as a definitive indication that
the transfer has finished. However, you can check the directory on the Windows PC for
the presence of the file; it is created as soon as the transfer begins, and the size will
continue to grow during the transfer process.
The file will be much larger than the one shown in the example here, so the transfer can take
n
a while to complete. Avid suggests conducting file transfers (FTP) from computers that do
not have aggressive power saving settings in place.
Backing up the iNEWS Database
11. Type
12. Type
bye
to end the FTP session.
exit
to exit the command prompt window.
You are now ready to remove the temporary dump file.
While you can leave one or two in the /tmp folder temporarily, Avid recommends that no
n
more than a couple of database dump files be kept at any given time. Removal of older dump
files will help avoid running out of hard drive space on the server.
13. Use the rm command at the console to remove old database dump files from the /tmp
folder on iNEWS.
a.Enter superuser mode, first.
NRCS-A$ su
Password:
b.Type the rm command, using the following format:
NRCS-A# rm /tmp/dbdump061709-div
rm: remove regular file ‘/tmp/dbdump061709-div’?
rm /tmp/<file name>
c.Type y to answer verification question.
rm: remove regular file ‘/tmp/dbdump061709-div’? y
d.(Optional) When the prompt reappears, such as NRCS-A#, you can verify the file’s
removal by viewing the contents of the /tmp folder again.
NRCS-A$ cd /tmp
NRCS-A$ ls -l
Backing up Individual Queues
Individual queues can be backed up by specifying the -n flag and listing up to 10 queue or
directory names:
NRCS-A# dbdump c –n <queue or directory name>
To back up individual queues or directories to tape:
1. Insert tape into a server’s drive and select that server.
2. Use the dbdump command in one of the following formats:
tIf you do not have a tape that already contains a backup, insert a new tape and back
up the queue. For instance, to back up SCRIPTS.2010.FEB on a new tape, type:
dbdump c -n scripts.2010.feb
77
6 Backing Up the iNEWS System
A verification request appears:
Do you really want to create a new archive? (n/y)
If there is nothing on the tape that you want to save, type y to continue. A message
similar to the following will appear:
Starting track(1), block(0)
47 stories dumped
Ending track(1), block(34)
When you back up a queue, dbdump ignores the queue’s skip flag, so you can use it to back
n
up a queue or directory that has its skip flag enabled. You can also use this process to save a
queue or directory to tape before removing it from the database. For instance, if you want to
restore database space by removing a queue with material no longer used, use dbdump to
backup the queue first. Then, if you need it later, you can retrieve it from the tape.
tIf you have previous backups on the tape, append the next backup to the tape with:
dbdump a -n <queue or directory name>
You can append additional backups to that tape until you use up all space on the
tape. Continuing with the previous example, the next day you would insert the same
tape, make sure its write protect is off, and then type
scripts to the tape:
dbdump a
to append that day’s
78
For instance, after making the first backup of SCRIPTS.2010.FEB shown in the
previous example, back up SCRIPTS.2010.MAR the following month by inserting
the same tape and entering the following:
dbdump a -n scripts.2010.mar
If you try to use dbdump a with a tape that does not already contain at least one backup, you
n
get an Empty tape message. If this happens, use dbdump c instead.
3. When the console prompt returns, the backup is done. Remove the tape and set the
write-protect switch on. Date the tape case label.
4. To verify the backup, type:
dbrestore tdv
This list should be short, but it could take time to complete if the tape contains several
weeks’ worth of backups.
Notes on Backing up the Database
If you try to back up data to a write-protected tape on the Linux platform, you get a message
similar to the following:
NRCS-A# dbdump c
Do you really want to create a new archive? (y/n) y
Starting Dump(1) Block (0), dumped on Thur Jul15 ‘0:36:14: 2010
dumping isam user
Please remove tape.
Insert continuation tape (make sure safety is off)
When continuation tape is ready type: y (RETURN)
If the tape is write-protected, remove it from the drive. On some tape drives you can change
the write-protect without removing the tape. Set the write protect switch to off, insert the
tape, and repeat dbdump.
Restoring Data to the iNEWS Database
Daily backups usually take very little time and generally do not affect system performance.
However, backing up a large amount of material to tape may hinder system performance, so
you should only do it during times of lighter system use.
If you have a very large database, the full database backup may require two or more tapes.
The system prompts you to insert the next tape. Remove the current tape, number it as tape
number one, and insert another tape. The server automatically continues copying the
database when you insert the second tape.
Restoring Data to the iNEWS Database
The following sections describe how to restore data from tape.
The dbrestore Command
Tapes produced with the dbdump command can be read back in and restored using the
dbrestore command. The most common use of the dbrestore command is to restore a specific
queue or directory. This is done by specifying the name on the command line:
NRCS-A# dbrestore d –n <queuename> <queuename> ...
79
6 Backing Up the iNEWS System
You can use the dbrestore tdv command to verify that you can properly read a dbdump tape.
n
Check free space before you restore large amounts of data to the database. Before you
dbrestore stories or queues to your database from tape, ensure you have enough free space
available to hold the restored stories. You can create free space using the dbserver command
to empty out some of the Dead queue and add that space to the free list. A conservative
estimate would be to have 10 free blocks for every story you plan to restore.
When the -i option is used with the dbrestore command, dbrestore does not create any index
n
requests in SYSTEM.INDEX when stories are restored to indexed queues.The dbrestore
process is slowed when attempting to create index requests. Avid recommends the database
be restored using the -i option and the stories be re-indexed at a later time.
Restoring a First-Level Directory
Restoring a first-level directory, such as Scripts, as opposed to SCRIPTS.FEB, is the same as
restoring queues and other directories. However, when restoring such a directory, you also
have the option of restoring it under a new name. Use:
dbrestore d -n <old dir. name>[=<new dir. name>]
If the new directory does not already exist, dbrestore creates it.
80
For instance, suppose you have a directory called Scripts and you want to restore a previous
backup of this directory to another directory called Scripts-temp, which does not exist. Type:
dbrestore d -n scripts=scripts-temp
A message similar to the following appears:
744 stories restored
Since Scripts-temp does not exist, dbrestore creates it before restoring Scripts-temp. When
dbrestore has restored all stories in Scripts-temp, it displays a message indicating how many
stories were restored.
If you want to restore a specific directory, be sure to always include the
n
name. If you do not, dbrestore tries to restore everything on the tape to your database, which
could cause your system to run out of space.
You may not restore a first-level directory to a lower level. In the example above, for
instance, we could not have restored the Scripts directory to SCRIPTS.MAY.
-n
and the directory
Restoring Data to the iNEWS Database
When you restore a first-level directory to an existing directory, it acquires the traits of that
directory. If dbrestore must create the directory, it uses database traits of the directory it is
restoring.
c
If the new directory name is longer than the old one, there is a possibility that
sub-directory names may become too long and cannot be restored. When the new name
is longer than the old name, the dbrestore program will prompt with the following
warning message: WARNING: Alias too long! It should be shorter or the same length
as current directory name to avoid exceeding directory name length restrictions.
Do you really want to continue? (n/y)
Listing Tape Contents and Backup Dates
When restoring a directory, you might need to examine the tape’s contents to ensure the
directory you want to restore is actually on that tape. Otherwise, if you attempt to restore a
directory or queue that is not on the tape, the system may take several minutes to search the
entire tape before reporting no stories restored.
The pages that follow show you how to use the dbrestore command to list the directories and
queues that have been backed up on a tape, to find out if the tape contains any stories saved
after a certain date, and to find out the date of each backup on the tape.
Listing Contents of a Tape
If you want to list every directory and queue on the tape, as well as the number of stories in
each queue, to the server with the tape drive, type:
dbrestore tdv
81
6 Backing Up the iNEWS System
Information similar to the following appears:
Listing tape contents only!
Type Stories Name
Dir
Que DEAD
Dir SYSTEM
Dir SYSTEM.KEYBOARDS
...
Que 3 TEST.SMITH
3630 stories listed
Each line in the list consists of three columns and identifies a directory or a queue that has
been saved to the tape:
•The Type column indicates whether the line lists information about a directory or a
queue. Directories are identified by Dir and queues by Que.
•The Stories column is used only in lines beginning with Que and identifies how many
stories are in that queue. Use this number as a guide to how much space you need to
restore the queue. If there is no number, the queue is empty. (The queue is empty
because either no stories existed in the queue or the queue’s skip flag was enabled.)
The Name column identifies the directory or queue by name.
If you attempt to restore a queue with no stories, you see the following message:
no stories restored
Listing Items Dumped on a Particular Date
To list items dumped on a particular date:
1. Use the following format of dbrestore:
dbrestore td -d <date>
2. Enter the date in YYMMDD (year, month, day) or YYYYMMDD format.
Begin single-digit months and days with a zero, such as 04 for April. Also check for
items dumped to tape during a month by using the year and the month (YYMM).
82
Restoring Data to the iNEWS Database
You can check to see what was dumped to a tape during a year by specifying just the
year (YY).
For instance, to list everything dumped in October 2009, type:
dbrestore td -d 0910
A message similar to the following appears:
Listing tape contents only!
Type Stories Name
Dir
Dir SHOW.TODAY
Que 34 SHOW.TODAY.SCRIPTS
Que 3 SHOW.TODAY.RUNDOWNS
Continuing with Dump(2) Block(0)
Dumped Thu Jul15 10:30:19 2009
Dir SHOW.TODAY
Que 27 SHOW.TODAY.SCRIPTS
Que 3 SHOW.TODAY.RUNDOWNS
67 stories listed
In the previous example, the tape contains only backups from two dates: the first backup
and one made on July 15, 2009. Notice the date of the first backup is not included in the
listing. To find the date of the first backup, type the
below.
The dbrestore displays a Continuing with Dump
second dump.
Listing the Date of Each Backup
To list the dates of each backup on a tape:
tType:
dbrestore tf
A message similar to the following appears:
Listing tape contents only!
Starting: Dump(1) Block(0)
Dumped Tue Jul10 15:33:01 2009
Continuing with Dump(2) Block(0)
Dumped Thu Jul15 10:30:19 2009
Elapsed time: 00:13
dbrestore tf
message just before processing the
command described
83
6 Backing Up the iNEWS System
In the example, the tape contains two backups, one done on July 10, 2009, and another
done on July 15, 2009.
Searching a Tape
You can retrieve individual stories from a tape by searching for a word contained in the
story.
The searchtape Command
The searchtape command allows you to search through a tape looking for a specific word.
Stories that contain that word are restored to the SYSTEM.SEARCHTAPE queue. There is a
maximum number of stories or hits that will be restored with the searchtape command. This
default is specified in the /site/system file. See “Searching a Tape by Word(s)” on page 85
for more information.
When you list a tape’s contents, your system must read all information on the tape to
n
generate a list of the contents. If the tape contains much information, listing the tape’s
contents takes a significant amount of time.
Because searching tapes for stories takes a long time and can reduce system performance,
restrict tape searches to periods of lighter system use. Avid recommends running all tape
operations during non-critical periods, not during shows.
Searching a Tape for Stories
To search a tape for stories:
1. Combine one or more keywords with a date or range of dates, as described in the
following sections.
2. When the system finds a story matching the search criteria, it restores the story to the
database. Because stories on tape may be old versions of stories still in the database, the
system restores them to the SYSTEM.SEARCHTAPE queue. This prevents the system
from putting an old version of a story in a queue that contains the current version of the
same story.
After restoring a story to SYSTEM.SEARCHTAPE, you can move it to any queue.
Before restoring stories from tape, check how much free space remains in your database at
n
the console. See “Checking for Free Space on a Database” on page 87 for more
information.
84
Searching a Tape by Word(s)
Restoring Data to the iNEWS Database
To search a tape by word(s), follow the searchtape command with the word
word(s) for which you want to search.
Use this form of the command:
searchtape for <words>
If you include more than one search word, the system searches for stories that contain any
words for which you are searching. You can search for up to 20 words at a time with this
command.
For instance, to search for stories that contain either helicopter or president, type:
searchtape for helicopter president
A message similar to the following appears:
8 stories restored to SYSTEM.SEARCHTAPE
This command finds stories with the word president and it also finds stories with the word
helicopter. It would not limit the results to stories that contained both president and
helicopter.
It is not possible to construct Boolean (and) searches using the searchtape command.
n
Always include the word “for” and one or more words for which you want to search when
you use the searchtape command. Even if you use a date or a date range as part of the search
criteria, as explained in the next section, you must include a word or words for which you
want the system to search.
for
and the
Use search criteria that is as specific as possible:
•Always use a narrow range of dates
•Use a small number of search words
•Use words likely to appear only in stories for which you are searching
Searching a Tape by Word and Date Range
To restrict a search to stories backed up between certain dates:
1. Include the range of dates to which you want to restrict the search in the
command.
The command format for this kind of search is:
searchtape from <date> to <date> for <words>
searchtape
85
6 Backing Up the iNEWS System
Dates must be in YYMMDD (year, month, day) or YYYYMMDD format, and single
digit months and days must begin with a zero (for instance, April is 04). If you want to
specify only a month or year, shorten the date format to YYMM or just YY.
2. Follow the second date with the word
To restore stories archived between May 1, 2000, and May 21, 2000, that contain the
word helicopter, type:
searchtape from 000501 to 000521 for helicopter
A message similar to the following appears:
6 stories restored to SYSTEM.SEARCHTAPE
The searchtape command looks for stories saved to tape within the dates you specify. It does
n
not look for stories created within those dates.
Searching a Tape by Word and Day
To search for stories saved to tape on a particular day, use the search format:
searchtape just <date> for <words>
To search for stories backed up on May 15, 2010 that contains the words helicopter or
president, type:
for
and the word(s) for which you want to search.
searchtape just 100515 for helicopter president
Searching a Tape by Word and Month
To search for stories saved to tape during a particular month, follow
and shorten the date to the year and month (YYMM).
For instance, to search a tape for any story saved to tape in February, 2009 that contains the
word helicopter, type:
searchtape just 0902 for helicopter
Specifying a Maximum Number of Stories to Search
To specify a maximum number of stories for searchtape to restore, include the word max and
the number of stories you want to restore.
To search a tape for all stories that contain the word president, type:
searchtape for president
If you do not specify a maximum, the system restores up to 50 stories.
86
searchtape
with
just
If you specify a maximum number, searchtape stops when that number of stories has been
restored, or when all stories containing the text have been found—whichever comes first.
To search a tape for the first 10 stories containing president, type:
searchtape max 10 for president
Anytime you specify more than 50 stories to restore, you are reminded that this could cause
the system to run out of disk space.
When the search is complete, searchtape stops and displays a message indicating the number
of stories it has restored.
To cancel the restore operation at any time while in progress, press Delete.
Checking for Free Space on a Database
To check free space on a database:
1. Select a server.
For information on selecting a server, see the iNEWS Newsroom Computer System Setup and
n
Configuration Manual.
Restoring Data to the iNEWS Database
2. Type:
Adding Blocks to the Free List
To add 100 blocks to the free list:
1. Select the master computer (typically server A).
In the previous message example the freelist item indicates how many database blocks
are used to hold the free list. The freelist is compressed. You should have 10 free blocks
for each story you want to restore. For instance, if you expect to find 10 stories to
restore, you should have 100 free blocks. Add extra space to the free list before
conducting a search because the search may find and restore more stories than you
expect.
dbserver 3288508
The number after dbserver must be the sum of the additional blocks and the free blocks
from dbfree.
A message similar to the following appears:
NRCS-A Sat Jul24 10:29:26 2010 dbserver complete-exiting
.
87
6 Backing Up the iNEWS System
At this message, dbserver is finished and you may proceed. You can run dbfree again to
verify that you have enough space.
Restoring the Database
When a story being restored has more than 1,000 lines, the following message is displayed:
Warning: Large story being restored.
Queue: FUTURES.FEBRUARY
Title: "Senate Hearing"
Size: 1004 lines (approximate)
Press <del> to skip this story.
If the story size continues to grow, the following message prints every 1500 lines:
Large story continuing: 1500 lines
Press <del> to skip this story.
To skip the large story, press Delete while it is being restored.
Disaster Recovery Planning
Having a complete dbdump of the database ensures that you can restore your data in case of
calamity; however, restoring a complete dbdump to a freshly initialized database can be very
time-consuming and leave the newsroom without access to the system until the full database
dbrestore finishes. On very large databases, the full database dbrestore can take from 12 to
36 hours.
Planning a separate, efficient disaster recovery dbdump/dbrestore procedure can
significantly speed up the time before the system becomes functional to users.
Disaster Recovery Dbdump
The first step is to create a stripped down dbdump that contains the directory structure and
minimal amount of queues and directories needed to bring the system online. After the
minimal dbdump was restored, users can start working while the remainder of the database
is restored from the last full database dbdump tape.
88
Create Minimal dbdump
The entire structure of the database, along with your designated minimal set of queues, can
be backed up, specifying the list of essential queues (or directories) to be backed up:
NRCS-A# dbdump ci -d -n <directory or queuename> ...”
The -d option dumps the news directory skeleton but will not dump any stories. The -n option
n
will dump the stories in any directories and/or queues specified. The i option will dump the
isam files.
The essential directories would be System and possibly Show and a few daily Assignments
queues. The System directory must be part of the minimal dbdump.
If master rundown skeletons are stored elsewhere, add them to your list of essential queues.
This may be the bare minimum of directories needed to get a show on the air.
Do not store archives of shows beneath the Shows directory. Having years of archive
n
material mixed in along with your rundowns and master rundowns will slow the dbrestore
significantly. If restoring Assignments queues, ensure you restore only daily queues needed
to operate; do not include all future files in the minimal dbdump.
Backing up Software
You may list up to 10 directories and queues with the -n option of the dbdump program.
NRCS-A# dbdump ci -d -n system shows assignments
In case of disaster, this minimal dbdump would be the first tape restored to the system. Since
it will not contain many stories, to dbdump to or dbrestore from this tape is relatively quick
and users can resume work while the remainder of the material trickles in from the full
dbdump tape.
This minimal dbdump tape should be updated periodically.
Backing up Software
Your system uses programs and site-dependent configuration files, called site files, to adapt
it to your newsroom operations and run the workstations, printers, wires, and other devices.
These programs and site files make your system software unique from that found in any
other newsroom.
It is important you keep a current copy of your software on tape in case you need to restore
the software area of the disk. Anytime you make major changes to the system
software—such as extracting new programs from an update tape—make a new software
backup.
89
6 Backing Up the iNEWS System
Likewise, when you make major changes to a site file, update the software backup to include
these changes. For instance, if you add a new wireserver to your system, you define that
workstation in the configuration file. This represents an important change to this site file so,
after modifying this file, update your software backup tape.
Backing up System Site Files
Your system uses site files in combination with software taken from your release CD and
update tapes. Back up your site files on a separate tape. If anything happens to your system,
you can use your release CD and site file backup to rebuild your system software.
Make a new site file backup after making significant changes to any site file. For instance,
adding a wireserver to your system requires that you modify your configuration file
(/site/config). After making this change, make a new site file backup.
To make a separate sitedump tape for each server, repeat this procedure on each server. After
backing up a server’s site files, ensure you label the tape to clearly indicate which server’s
site files are on it.
The sitedump Command
90
The sitedump command backs up files in the /site directory and certain key files in the /etc
directory. This is where all of your site-specific configuration files are kept. The tape should
be updated whenever you make changes to your configuration.
To back up your system’s site files to tape:
1. Insert the tape into the master computer (typically server A).
2. Select the master computer.
3. Enter superuser mode.
4. Type:
5. When the sitedump is done and the prompt returns, exit from superuser mode by
6. Remove the tape and label it. Include the date and type of backup.
sitedump
Linux systems can make sitedumps to their hard drives.
sitedump -f /backups/<date>.sitedump
pressing Ctrl+D.
7Disconnects
This chapter provides vital information to help you recover from a system disconnect.
This chapter contains the following main sections:
•Normal System Status
•Disconnects
•Disconnect Recovery
7 Disconnects
Normal System Status
The displays will vary when the system is a triple system configuration.
On a dual server system, the status command will show the system is AB, with both servers
connected to each other. A display similar to the following will appear on server A:
NRCS-A# status
A is ONLINE and has been CONFIGURED. ID is NRCS.
System is AB. Master is A.
Disk status is OK. The database is OPEN.
The system status is reported identically on both servers in the system. For instance, a
display similar to the following will appear on server B:
NRCS-B# status
B is ONLINE and has been CONFIGURED. ID is NRCS.
System is AB. Master is A.
Disk status is OK. The database is OPEN.
When the system is dual and databases are mirroring between the two servers, a story
written on one server is automatically mirrored to the database of the other server. When the
system is connected and has the normal prompt, the servers are in communication with each
other and the disk mirroring process is active.
Disconnects
If the servers disconnect from each other, the databases are no longer mirrored between the
two servers and immediate attention is required. Since mirroring has stopped, stories written
by users on server A will not be seen by users logged in to server B. There will be two
entirely separate databases.
There is no way to reintegrate two disparate databases. You must decide which database will
be retained as the master database, and the other database must be erased. The steps for
recovering from a disconnect are outlined later in “Procedures” on page 97.
92
Disconnects
If a disconnect occurs, users may want to export the stories they are working on to local hard
drives, in addition to normally saving them to the server. They can export stories by selecting
File > Export Story. This will make a backup copy of the story on the local hard drive of
their PC. Since they may be logged in to the server containing the non-master database that
will be erased, this will give them a backup copy, which could be re-imported if necessary.
c
When the servers disconnect, stories written on server A are not mirrored to server B
and stories saved on B are not mirrored to A. The system issues a popup to alert users
who must contact their system administrator immediately.
Detecting a Disconnect
You can check to see if the servers are connected to each other and mirroring at any time
using the status command at the console. If they are connected and properly mirroring, they
will both agree on the system status and it will report that the system is dual (AB):
System is AB.
See “Types of Disconnect” on page 95 for more information.
If the servers disconnect, a disconnect warning message appears on the console.
93
7 Disconnects
On the Linux platform, the messages include detailed information from the driver (mp) that
controls the mirroring:
Jul 13 07:45:44 nrcs-a IO handler: B silent for 30 seconds
Jul 13 07:45:44 nrcs-a IO handler: LINK TO B FAILED, DISCONNECTING B
Jul 13 07:46:05 nrcs-a msg: 66 to server on computer A
Jul 13 07:46:25 nrcs-a disconnect: B COMPUTER DISCONNECTED
In addition to console warning messages, a warning message is broadcast to all users
currently logged in to the system via a popup window at the workstations.
Types of Disconnect
When the servers disconnect, one may disconnect from the other, or they may both
disconnect from each other.
If they have disconnected from each other, each will report that it is a single system, with
itself as the master:
NRCS-A# status
A is ONLINE and has been CONFIGURED. ID is NRCS.
System is A. Master is A.
Disk status is OK. The database is OPEN.
The single system status is reported identically on both servers:
Disconnects
c
NRCS-B# status
B is ONLINE and has been CONFIGURED. ID is NRCS.
System is B. Master is B.
Disk status is OK. The database is OPEN.
The other possibility is that servers will disconnect, but one of the servers will not note the
disconnect. In this case, one will report that the system is single while the other states the
system is still AB.
Regardless of the report, once one of the servers has disconnected, the system must be
recovered following the procedures in this chapter. The steps outlined are the only way to
recover and get the servers back in mirror.
If the system has disconnected, you cannot simply reboot the servers and bring it back
up normally. Rebooting and connecting two servers together after a disconnect can
lead to database corruption!
95
7 Disconnects
Causes of Disconnects
Servers are normally in constant communication with each other. When a story is saved, the
server tries to mirror that change across to the other server’s database. If the server cannot
contact the other server for a period of 30 seconds, it assumes the worst—that the other
server has died and is not available and that as the surviving server it must be responsible for
the entire system.
Knowing this design, it is obvious that network outages will cause a disconnect, as will the
loss of power by one server.
A “dirty” network leading to numerous network output errors (called RX-ERRs, as revealed
by the netstat -i command) can cause a disconnect, particularly if the output errors are
rapidly climbing.
A software error that leads to a looping condition that causes a server to become so busy it
cannot respond to a mirroring request could also theoretically lead to a disconnect.
Hardware failures such as the failure of a network card or hard drive may also lead to
disconnects.
Disconnect Recovery
This section provides an overview of recovering your system from a disconnect, recovery
procedures, and a quick reference worksheet you can use should a disconnect occur.
Overview
After a system has disconnected, one server must be selected to continue on as the master
computer. This server will be referred to as the survivor. The other server will be referred to
as the failed server.
Before the failed server can be reconnected to the survivor, it must be rebooted and its
database wiped clean. After the database on the failed server has been cleared, the server can
be reconnected to the survivor and the master database copied back across from the survivor.
Because one server’s database will be selected as the master database and the other’s
database erased, discovering a disconnect as soon as possible minimizes the possibility of
data loss.
96
In normal dual-server operation, half the devices and sessions are configured on one server
and the other half are configured on the other server. The most important thing to do after a
disconnect is to reconfigure the survivor so that it knows it must be responsible for all
devices and sessions. You can then restart any network devices that were running on the
failed server.
The steps are covered in more detail in the next section, “Procedures” on page 97.
n
The disconnect recovery steps are as follows:
1. Reboot the failed server.
2. Clear the database on the failed server.
3. Reconnect the failed server.
4. Copy the database to the failed server.
5. Log out and stop all servers and resources.
6. Reconfigure the system.
7. Start up all servers and resources.
Procedures
Disconnect Recovery
This section contains an example of recovery from a disconnect of a dual AB system. The
steps might vary when the system is a triple system configuration. Triple system
configuration customers might need to contact Avid for more specific instructions.
In the example, it is assumed that server A was chosen as the survivor and server B was
designated the failed server:
•NRCS-A–survivor
•NRCS-B–failed server
The failed server is also referred to as the revived server after it is reconnected to the system.
If you reverse the roles of the servers during your disconnect and make B the survivor and
n
server A the failed server, remember to adjust which server you issue the commands on
appropriately. The steps shown in the following example assume server A is the survivor;
reverse A and B throughout the process if server B is chosen as your survivor.
It is assumed (for this example) that when the servers disconnected, server A became a
single system (system is A, master is A) and server B also became a single system (system is
B, master is B). In this situation, users logged in on A can continue working and saving
stories. Users logged in on B can also continue working and saving stories, but since the
servers are not mirroring, anything saved to server A’s database is not copied over to server
B’s database, and vice versa.
97
7 Disconnects
The databases on the machines are no longer mirrored. The only recourse is to choose one of
the servers’ databases to become the master database. The database on the other server is
wiped clean and then recopied from the master server.
To export a story to a local hard drive:
tSelect File > Export Story.
To recover the system:
1. Choose one master machine to continue working with (survivor)
2. Halt and reboot the disconnected (failed) server using the following command:
Users logged on to the failed server (B) are creating stories on a database that is going to
be wiped clean. That information will be lost unless stories created after the disconnect
are first exported to the local hard drive so they can be imported to the survivor once the
user logs in to the other server.
It does not matter whether you choose server A or B as your master computer. What is
important is to choose one quickly. You may choose one server over the other if it has
more users logged in on it. Or you may choose the server that has the show producer
logged in on it. If you are about to enter a show, you may pick the one that runs the
teleprompter. Or you may choose A as the survivor so the steps exactly shadow
instructions in this section.
NRCS-B# shutdown
NRCS-B# reboot
98
3. Log in to the rebooted failed server as system operator, then become superuser.
a.At the login prompt, log in as the system operator user (so):
iNEWS Newsroom Computer System
login: so
Password:
Last login: Mon Jul 19 07:17:23 on ttyS0
?:
b.When you log back in you will be at the question mark prompt because the server is
not yet named (connected). You must be in superuser mode for the next step:
?:su
Password:
?#
For more information on superuser mode, selecting servers, and configuring the system, see
n
the iNEWS Newsroom Computer System Setup and Configuration Manual.
Disconnect Recovery
4. Select the failed (disconnected) server on the console and use the diskclear command to
wipe the database off the failed server.
The display will look similar to the following (with what you type appearing in bold):
?# diskclear -
DANGER -- This program DESTROYS all information on this computer's
data base.
Do you wish to save the current data base? (y/n): n
Are you sure you wish to CLEAR the disk? (n/y): y
? Mon Jan 3 16:18:23 2000 diskclear CLEARING DATA BASE
? Mon Jan 3 16:18:23 2000 Each dot represents 10,000 blocks. The
entire database = 1677 dots.
The diskclear will print a sequence of dots and numbers as it clears the disk. For
instance, on a full 16 gigabyte database, the dots and numbers count to 16,000. The
diskclear may take some time to complete.
5. Reconnect the failed server to the survivor.
a.After the diskclear has completed you can reconnect the servers. Select both (all)
servers on the console and type:
reconnect <failed> master=<survivor> net=ab
b.Depending on which one failed and which one is master, you would enter one of the
following commands:
reconnect a master=b net=ab
reconnect b master=a net=ab
A few moments after entering the command, the failed server will regain its normal,
named prompt. Communication and mirroring between the servers is reestablished.
6. Begin copying the database back over to the failed server.
a.Select the revived (failed) server only on the console and begin a diskcopy:
NRCS-B# diskcopy -9
Users can continue working while the diskcopy continues in the background.
7. When the diskcopy has completed, stop all servers and devices.
99
7 Disconnects
8. Reconfigure the system (survivor).
At this point, all devices and sessions are running on the survivor—that is, master
computer—even the ones that normally run on the other, revived server. These devices,
utility programs, and sessions eventually need to run in their normal place on the revived
server.
Schedule a time to log the users off and stop the servers and devices. At that time, run
the following commands on the survivor:
NRCS-A# offline
NRCS-A# logout all
NRCS-A# stop all
The system is now running in a dual AB configuration. When you run the configure
command, the system will reconsult the /site/config file and divide responsibility for
which server will run the devices, half for server A and half for B:
NRCS-A# offline
NRCS-A# configure
NRCS-A# online
Wait for the system being configured messages to appear on both servers before moving
on to the next step.
100
c
9. Start up the revived server.
When you run startup on the revived server, the devices and utility programs (such as
action servers or txnet links) on that server are started and it is placed online:
NRCS-B# startup
10. Restart all of the survivor’s devices by typing
The system is now running normally (dual) with all sessions and devices in their normal
places.
If server B was selected as the master database, it is now the master computer. Since
either server can run as master, nothing further needs to be done. If you want to make
server A the master computer again, perform a normal system shutdown, reboot and
startup, as described in iNEWS Newsroom Computer System Setup and Configuration Manual.
Wait for the diskcopy to complete before rebooting the system to make server A the
master computer again. Database corruption may result if the system is taken down
before the diskcopy completes. If the system loses power or must be rebooted; the
master computer that contains the full database must be brought up in a single server
configuration, and the disconnect recovery procedure restarted again.
restart all
on the master computer.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.