All calls to tpm will follow a similar structure, made up of the command, which defines the type of operation, and one or more options.
shell> tpm command [sub command] [tpm options] [command options]
The command options will vary for each command. The core tpm options are:
Table 10.2. tpm Core Options
Option | Description |
---|---|
--force , -f | Do not display confirmation prompts or stop the configure process for errors |
--help , -h | Displays help message |
--info , -i | Display info, notice, warning and error messages |
--notice , -n | Display notice, warning and error messages |
--preview , -p | Displays the help message and preview the effect of the command line options |
--profile file | Sets name of config file |
--quiet , -q | Only display warning and error messages |
--verbose , -v | Display debug, info, notice, warning and error messages |
− --force
Forces the deployment process to complete even if there are warning or error messages that would normally cause the process the to fail. Forcing the installation also ignores all confirmation prompts during installation and always attempts to complete the process.
− --help
Displays the help message for tpm showing the current options, commands and version information.
− --info
Changes the reporting level to include information, notice,
warning and error messages. Information level messages include
annotations of the current process and stage in the deployment,
such as configuration or generating files and configurations.
This shows slightly more information than the default, but less
than the full debug level offered by
--verbose
.
− --notice
Sets the output level to include notice, warning, and error messages. Notice level messages include information about further steps or actions that should be taken, or things that should be noted without indicating a failure or error with the configuration options select.
Specify the name of the configuration file to be used. This can be useful if you are performing multiple configurations or deployments from the same staging directory. The entire configuration and deployment information is stored in the file before installation is started. By specifying a different file you can have multiple deployments and configurations without requiring separate staging directories.
− --quiet
Changes the error reporting level so that only warning and error messages are displayed. This mode can be useful in automated deployments as it provides output only when a warning or error exists. All other messages, including informational ones, are suppressed.
Displays a much more detailed output of the status and progress of the deployment. In verbose mode, tpm annotates the entire process describing both what it is doing and all debug, warning and other messages in the output.
The tpm utility handles operations across all hosts in the dataservice. This is true for simple and composite dataservices. The coordination requires SSH connections between the hosts according to the Appendix B, Prerequisites. There are two exceptions for this:
When the --hosts
argument is provided
to a command; that command will only be carried out on the hosts listed.
Multiple hosts may be given as a comma-separated list. The names used in
the --members
,
--slaves
,
--master
,
--connectors
arguments should be used
when calling --hosts
.
When you are using an INI configuration file (see Section 10.4, “tpm INI File Configuration”) all calls to tpm will only affect the current host.
The installation process starts in a staging directory. This is different
from the installation directory where Tungsten Cluster will ultimately be
placed but may be a sub-directory. In most cases we will install to
/opt/continuent
but use
/opt/continuent/software
as a
staging directory. The release package should be unpacked in the staging
directory before proceeding. See the Section B.1, “Staging Host Configuration”
for instructions on selecting a staging directory.
Table 10.3. tpm Commands
Option | Description |
---|---|
ask | Ask tpm to provide values from the common configuration |
cert | Provides a wide variety of security administration tools |
check | Check and validate various installation options. |
configure | Configure a data service within the global configuration |
connector | Open a connection to the configured connector using mysql |
delete-service | Delete a replication service or a composite datasource |
diag | Obtain diagnostic information |
fetch | Fetch configuration information from a running service |
firewall | Display firewall information for the configured services |
help | Show command help information |
install | Install a data service based on the existing and runtime parameters |
mysql | Open a connection to the configured MySQL server |
post-process | Reset the THL for a host |
promote | Make a previously configured and prepared directory and make it the active |
promote-connector | Restart the connectors in the active configuration |
purge-thl | Reset the THL for a host |
query | Query the active configuration for information |
report | Generate a security report for all available communication channels on a per-node basis |
reset | Reset the cluster on each host |
reset-thl | Reset the THL for a host |
uninstall | Uninstall software from host(s) |
update | Update an existing configuration or software version |
validate | Validate the current configuration |
validate-update | Validate the current configuration and update |
Automates the act of copying the shared SSL keys generated during installation to other cluster nodes as part of the post-installation workflow.
This command should only be run on ONE node, and should only be needed once, right after initial installation has completed on all nodes, and before the Tungsten processes have been started.
This tool should only be needed for INI-based installations, and requires SSH access between the nodes to function properly.
See the table below for a list of valid arguments:
Table 10.16. tpm copy Common Options
Option | Description |
---|---|
--debug , -d | Debug Mode. |
--help , -h | |
--hosts | Specify a comma-separated list of node names as seen in tpm reverse (default: all nodes in clusters as shown below) |
--i-am-sure | Confirm you want the files copied and that the installs are done on all nodes |
--info , -i | |
--list | List the default nodes shown below (all valid nodes in all clusters) |
--quiet , -q | |
--test , -t | |
--timeout {seconds} | Specify the ssh/scp Timeout as an integer in seconds (default: 3) |
-v | Verbose output. |
With no options, prompt to continue, then, by default, copy the needed security files from /opt/continuent/share/ to all nodes on all clusters, skipping the localhost. To bypass the interactive pause, you may specify --i-am-sure to confirm that all nodes are done installing, and that none of the Tungsten processes have been started yet.
This tool uses OS commands ssh, scp and uptime to function.
The scp and ssh commands will be called with two options:
-o StrictHostKeyChecking=no
-o ConnectTimeout={timeout in seconds, default 3}
The files specified by:
/opt/continuent/share/[jpt]*
/opt/continuent/share/.[jpt]*
will be copied from the local host to the same directory on all hosts in the target list, excluding the local node.
The default security key location path (/opt/continuent/share/) may be
changed (although NOT recommended) by using the tpm
option --security-directory