Search Scope:. Document Information Preface 1. New Load-Balancing Algorithms Adaptive Failover — Requests are distributed to a set of data sources with enough added weight to provide the minimum total weight required. Track clients connected across access log rotation. Display the number of current incoming connections. Enhancements to Bind and Connection Logs The bind and connection logs provide the same information already present in the access log, but in separate files. These are: the queue of pending requests, the queues of waiting requests and the operations being treated.
This set of metrics is related with the elapsed time of the read operations: bind operations and search operations. The total elapsed time squared for bind operations since startup in milliseconds based on sampling. The total elapsed time squared for search operations since startup in milliseconds based on sampling. The total elapsed time squared for unbind operations since startup in milliseconds based on sampling.
A system is composed of various resources, for example CPU, Disk, and memory. The resource usage expresses the level of usage of a resource.
This can be expressed in terms of percentage of some quantity used for example kilobytes. Some examples of these include CPU usage, available disk free space in percentage, and amount of used memory by a process in kilobytes. In directory server, each backend has its own entry cache. This set of metrics includes hit and tries in this cache, as well as the size of the cache and the number of entries in it. A backend is composed of files. These files are segmented in pages.
The file metrics are related with miss and hits and paging activity. The general information of a backend includes the number of entries in this backend as well as the state of the backend. These metrics are related with the transaction log element of Oracle Berkley database. They mainly describe the write activity of the transaction log.
The number of bytes per second written in this transaction log since the last checkpoint based on the sampling. The number of bytes written in this transaction log since the last checkpoint based on the sampling. The number of number of times that the transaction log was flushed to disk based on the sampling. The number of times per second that the transaction log was flushed to disk based on the sampling. The number of times per second that the transaction log was flushed to disk since startup based on the sampling.
The number of times that the transaction log was flushed to disk since startup based on the sampling. The number of times that the transaction log was flushed to disk by in-memory full based on the sampling. The number of times per second that the transaction log was flushed to disk by in-memory full based on the sampling.
The number of times per second since startup that the transaction log was flushed to disk by in-memory full based on the sampling. The number of times since startup that the transaction log was flushed to disk by in-memory full based on the sampling. Plug-in call ordering. SNMP monitoring support. Directory Server supports the use of the Monitoring Console to view monitored data and to produce threshold alarms. LDAP utilities and character sets for passwords.
The server therefore sees a password as a string of bytes, which is often not the way that the user sees a password. By converting passwords that a user enters to UTF8, the utilities make it possible for passwords entered on one system to be entered on another system. More LDAP controls and extended operations. For a complete list of LDAP controls, see the controls 5dsconf man page. For a complete list of extended operations, see the extended-operations 5dsconf man page.
Virtual directory. New, richer architecture. To make new functionality possible, the Directory Proxy Server architecture has changed significantly.
Directory data distribution. You can distribute directory data using the proxy, enabling much higher scalability for write operations. Operation-based routing. Directory Proxy Server can route different LDAP operations on the same client connection to different servers and enable successive requests on the same client connection to be sent to the same LDAP servers.
Full command-line and web-based administrative capabilities. Directory Proxy Server now provides complete administrative capabilities both on the command line and through the Directory Service Control Center. Administrative alerts. You can configure what Directory Proxy Server does when an alert occurs, such as sending emailor running a script. DN and attribute rewriting.
You can configure Directory Proxy Server to automatically modify the DN, attribute types, and attribute values of entries such that a client application view of an entry can be significantly different that what is stored in the directory.
Fewer server restarts. Directory Proxy Server now requires fewer configuration-related restarts than ever before, making it easier to respond automatically to the need for changes in how the server behaves. Logging aligned with Directory Server. Directory Proxy Server log files now fit more effectively with those of Directory Server. Their formats are very similar, and they allow you to trace requests through Directory Proxy Server to Directory Server and back to client applications.
Improved resource management. Directory Proxy Server now pools connections to data sources such as Directory Server and can use proxy authentication to further reduce resources used to establish connections, and to authenticate repeatedly. Schema management. Directory Proxy Server generates a single schema from multiple heterogeneous data sources, performs schema checking, and performs attribute value syntax checking.
Access controls. Directory Proxy Server supports access control instructions ACIs that determine which permissions are granted to users. Group synchronization with Active Directory.
Identity synchronization between Directory Server and Active Directory is simpflied because you can map a group on Directory Server to Microsoft Active Directory domain global distribution groups and domain global security groups.
0コメント