SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Downloaden Sie, um offline zu lesen
Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 1
CUCM Database Replication
Kristof Van Coillie
May 29, 2013
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
• Database Replication Architecture
• Database Replication Setup
• Monitoring Replication (setup)
• Troubleshooting steps
• Cli commands
• Q&A
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3Cisco Confidential 3
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
• Most data is written in database of
publisher and then replicated to
subscribers
• User facing features can also be
written in subscriber and are
replicated to publisher
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
• CCM Admin page on Subscriber
queries database on Publisher
• Query local database via cli:
run sql select * from region
• A change is being replicated to the
database of the Subscriber and
the ccm service is updated via a
change notify
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6Cisco Confidential 6
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
1. Define
Identifies which servers will participate and defines those nodes locally and on other
nodes
(cdr define server)
2. Define Replicates
Define what tables will be replicated and what to do in case of collisions, stored in the
syscdr database
(cdr realize templates)
3. Replicate
Actual sync of data
(cdr check)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Publisher
installed
Installing
subscriber 1
Is pub
already
replicating?
Sub tries again later
Pub starts process
• Pub defines itself
• Pub defines templates
• Pub realizes templates
on itself
No
Start Repl
timer
Yes
Define Sub 1
Status on
Sub 1 = 0
Repl timer
expired
• Realizes templates on
defined subs
• CDR check on subs
Status on
Sub 1 = 2
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Repl timer
expired
• Realizes templates on
defined subs
• CDR check on subs
Status on
Sub 1 = 2
 Once the Repl timer expired other Subscribers will only be able to start the replication setup process
once the first batch is completed
 During an upgrade don’t switch version on nodes one by one with time interval larger than the Repl timer, switch
version together or in 2 batches
 Increase repl timer for large clusters to allow all subscribers setup the replication in one batch (see next slide)
 When clustering over wan, consider to sync local servers first
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
• Default set to 300 seconds:
• Configurable on publisher via cli:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11Cisco Confidential 11
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Summary Text
Summary Table of Servers
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Shows if A Cisco DB
Replicator is working
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Unique ID in cluster and
shows if replication has
been set-up
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Replication data and
control queues in bytes
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Shows if Pub and Sub
versions of CUCM match
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Indicator if replication-
dynamic real-time
replication is working
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
RTMT Replication
counter
0= Replication set-up in progress
1= Not Used
2= Replication set-up successful
3= Real-Time replication out of sync or
not available
4= Replication set-up failure
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
• Publisher is waiting for Subscribers to define “Batching Sync Requests”:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
• For every subscriber there will be a define log file on the publisher:
• This file will end with a checksum of [64] if the define was successful:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
• Broadcast Sync is proceeding, progress can be followed in “Sync Progress”:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
• Broadcast started after the Repl Timer expired, timer started when first Subscriber was
defined:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
• Status is 2 on every server in the cluster:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
• Replication setup is finished when Output Broadcast file has size:
• This file will end with a checksum of [64] if the replication setup was successful:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25Cisco Confidential 25
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
• Typical scenarios causing database replications to break:
1. Network connectivity issues between nodes
general connectivity issues
MTU
Firewall blocking ports
2. Changing ip/hostname
It is important to follow the documented procedure
3. Mismatch in security password
CSCth87452: A Cisco DB service will not start after changing security password
CSCtn79868: pwrecovery tool resetting only sftpuser password
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
• Available in the Unified CM Database Status report:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
• Subscriber authenticates to Publisher using the security password
• When successful Cluster Manager inject entry in hosts file and add policy in firewall
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
• Used by the Informix database authentication mechanism
• Build based on HOSTS file
• Created by A Cisco DB
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
• Contains the connectivity information for each database server
• Created by A Cisco DB
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
• Publisher syncs to external ntp server
• Cisco recommends synchronizing Unified CM with a Cisco IOS or Linux-based NTP
server, Windows Time Services as an NTP server is not recommended or supported
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
• Subscribers sync with publisher
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
• CLI command ‘utils network connectivity:
1. Subscriber nodes communicate to Publisher node via TCP and UDP (port 8500)
2. Test validates that the Sub is properly authenticated against the Pub
3. Echo request/reply packets via UDP and TCP validates proper handling of IP fragment
4. Same test validates proper MTU settings
5. Additionally, sends request to installed private ports used by other CCM application
components
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
• CLI command ‘utils network connectivity:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
• Each server should have entry for all nodes in cluster:
• Entries are added by Cluster Manager when authentication between nodes is
successful
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37Cisco Confidential 37
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
• Make sure all tests covered in troubleshooting section has been completed
successfully, failing to do so will bring your cluster in worse scenario when
executing the cli commands
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
1. Define
Identifies which servers will participate and defines those nodes locally and on other
nodes
(cdr define server)
2. Define Replicates
Define what tables will be replicated and what to do in case of collisions, stored in the
syscdr database
(cdr realize templates)
3. Replicate
Actual sync of data
(cdr check)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
• This command will verify if all tables are in sync and generates a report, the
report contains what tables are not in sync (if any)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
• This command takes a while to complete, progress can be monitored via
‘utils dbreplication runtimestate’
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
• This executes step 3 (actual sync of data)
• This fixes out of sync data
• Runs on all tables in replication on all servers that are included in the
command
• Outcome to be confirmed by running ‘utils dbreplication status’
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
• Same as repair command but runs on only one table or replicate
(much faster)
• Useful on large clusters where only one/few tables are out of sync
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
• This command stops the replication set-up
• The only way to recover from a stop is with a reset
• This command pauses for the duration of repltimeout timer and then kills
currently running replication commands again
• This command also kills auto recovery
• Use with caution!
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
• This command drops the syscdr database (created in step 2)
• Need to run ‘utils dbreplication stop’ prior this command
• Can be used when there is a looping attempt to define a server in replication
(step 1), usually the issue is on the pub and not on the failing sub
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
• This command causes replication to be torn down and set-up again
• Executes all three steps
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
• This command does stop, drop and reset all in one command
(available as of CUCM 9.x)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48Cisco Confidential 48
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
• Please post open questions to our support forums:
https://supportforums.cisco.com
© 202 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Thank you.

Weitere ähnliche Inhalte

Was ist angesagt?

SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications nishchal29
 
Avaya Aura Session Manager
Avaya Aura Session ManagerAvaya Aura Session Manager
Avaya Aura Session ManagerMotty Ben Atia
 
Avaya ip office beginners training
Avaya ip office beginners trainingAvaya ip office beginners training
Avaya ip office beginners trainingShashank Kapil
 
Avaya aura 6.x technical overview
Avaya aura 6.x technical overviewAvaya aura 6.x technical overview
Avaya aura 6.x technical overviewMotty Ben Atia
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Denim Group
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wirelessAble George
 
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...NRB
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)Florence Dubois
 

Was ist angesagt? (20)

Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications
 
Outdoor network engineering_chuck lukaszewski
Outdoor network engineering_chuck lukaszewskiOutdoor network engineering_chuck lukaszewski
Outdoor network engineering_chuck lukaszewski
 
EMEA Airheads- ClearPass - Dot1x_ Purpose of domain joining
EMEA Airheads- ClearPass - Dot1x_ Purpose of domain joiningEMEA Airheads- ClearPass - Dot1x_ Purpose of domain joining
EMEA Airheads- ClearPass - Dot1x_ Purpose of domain joining
 
IBM MQ Basics
IBM MQ BasicsIBM MQ Basics
IBM MQ Basics
 
Packets never lie: An in-depth overview of 802.11 frames
Packets never lie: An in-depth overview of 802.11 framesPackets never lie: An in-depth overview of 802.11 frames
Packets never lie: An in-depth overview of 802.11 frames
 
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference GuideAruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
 
Avaya Aura Session Manager
Avaya Aura Session ManagerAvaya Aura Session Manager
Avaya Aura Session Manager
 
Horizon 8 + Instant Clones
Horizon 8 + Instant ClonesHorizon 8 + Instant Clones
Horizon 8 + Instant Clones
 
Avaya ip office beginners training
Avaya ip office beginners trainingAvaya ip office beginners training
Avaya ip office beginners training
 
Fortinet
FortinetFortinet
Fortinet
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Avaya aura 6.x technical overview
Avaya aura 6.x technical overviewAvaya aura 6.x technical overview
Avaya aura 6.x technical overview
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wireless
 
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
The NRB Group mainframe day 2021 - IBM Z-Strategy & Roadmap - Adam John Sturg...
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear pass
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)
 

Andere mochten auch

2014 Security Onion Conference
2014 Security Onion Conference2014 Security Onion Conference
2014 Security Onion ConferenceDefensiveDepth
 
Ccna & ccnp voice
Ccna & ccnp voiceCcna & ccnp voice
Ccna & ccnp voiceacute23
 
Ccvp plus module 2
Ccvp plus module 2Ccvp plus module 2
Ccvp plus module 2Le Ngoc Viet
 
10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-express10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-expressNguyen Thanh
 
Security Onion - Brief
Security Onion - BriefSecurity Onion - Brief
Security Onion - BriefAshley Deuble
 
Ccvp plus module 3
Ccvp plus module 3Ccvp plus module 3
Ccvp plus module 3Le Ngoc Viet
 
Ccvp plus module 1
Ccvp plus module 1Ccvp plus module 1
Ccvp plus module 1Le Ngoc Viet
 
Cisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOSCisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOSHermann GBILIMAKO
 
Security Onion Conference - 2016
Security Onion Conference - 2016Security Onion Conference - 2016
Security Onion Conference - 2016DefensiveDepth
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinthchrissanders88
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorialkriz5
 
Introduction to Cisco IPCC Enterprise
Introduction to Cisco IPCC EnterpriseIntroduction to Cisco IPCC Enterprise
Introduction to Cisco IPCC Enterprisemann_chaddha
 
Introducing in Cisco Unified Contact Center Express
Introducing in Cisco Unified Contact Center ExpressIntroducing in Cisco Unified Contact Center Express
Introducing in Cisco Unified Contact Center ExpressEmin Aliev
 

Andere mochten auch (18)

2014 Security Onion Conference
2014 Security Onion Conference2014 Security Onion Conference
2014 Security Onion Conference
 
Ccna & ccnp voice
Ccna & ccnp voiceCcna & ccnp voice
Ccna & ccnp voice
 
Ccvp plus module 2
Ccvp plus module 2Ccvp plus module 2
Ccvp plus module 2
 
10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-express10 step-to-configure-cisco-call-manager-express
10 step-to-configure-cisco-call-manager-express
 
Security Onion - Brief
Security Onion - BriefSecurity Onion - Brief
Security Onion - Brief
 
Security Onion - Introduction
Security Onion - IntroductionSecurity Onion - Introduction
Security Onion - Introduction
 
Ccvp plus module 3
Ccvp plus module 3Ccvp plus module 3
Ccvp plus module 3
 
VoIP basics
VoIP basicsVoIP basics
VoIP basics
 
Ccvp plus module 1
Ccvp plus module 1Ccvp plus module 1
Ccvp plus module 1
 
Voip basics
Voip   basicsVoip   basics
Voip basics
 
Cisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOSCisco Call Manager on CISCO IOS
Cisco Call Manager on CISCO IOS
 
Security Onion Conference - 2016
Security Onion Conference - 2016Security Onion Conference - 2016
Security Onion Conference - 2016
 
Cucm 9.x licensing
Cucm 9.x licensingCucm 9.x licensing
Cucm 9.x licensing
 
Implementing ossec
Implementing ossecImplementing ossec
Implementing ossec
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinth
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
 
Introduction to Cisco IPCC Enterprise
Introduction to Cisco IPCC EnterpriseIntroduction to Cisco IPCC Enterprise
Introduction to Cisco IPCC Enterprise
 
Introducing in Cisco Unified Contact Center Express
Introducing in Cisco Unified Contact Center ExpressIntroducing in Cisco Unified Contact Center Express
Introducing in Cisco Unified Contact Center Express
 

Ähnlich wie 3 cucm database

Migrating to cisco unified communications manager 9.1
Migrating to cisco unified communications manager 9.1Migrating to cisco unified communications manager 9.1
Migrating to cisco unified communications manager 9.1Michael Ganschuk
 
Chapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating SystemChapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating Systemnewbie2019
 
Cisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW ClusteringCisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW Clusteringib_cims
 
Kafka Reliability Guarantees ATL Kafka User Group
Kafka Reliability Guarantees ATL Kafka User GroupKafka Reliability Guarantees ATL Kafka User Group
Kafka Reliability Guarantees ATL Kafka User GroupJeff Holoman
 
DEVNET-1148 Leveraging Cisco OpenStack Private Cloud for Developers
DEVNET-1148	Leveraging Cisco OpenStack Private Cloud for DevelopersDEVNET-1148	Leveraging Cisco OpenStack Private Cloud for Developers
DEVNET-1148 Leveraging Cisco OpenStack Private Cloud for DevelopersCisco DevNet
 
Dan Norris: Exadata security
Dan Norris: Exadata securityDan Norris: Exadata security
Dan Norris: Exadata securityKyle Hailey
 
Java Middleware Surgery
Java Middleware Surgery Java Middleware Surgery
Java Middleware Surgery C2B2 Consulting
 
Apache Kudu: Technical Deep Dive


Apache Kudu: Technical Deep Dive

Apache Kudu: Technical Deep Dive


Apache Kudu: Technical Deep Dive

Cloudera, Inc.
 
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Babaa Naya
 
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
DEFCON 23 - Etienne Martineau - inter vm data exfiltrationDEFCON 23 - Etienne Martineau - inter vm data exfiltration
DEFCON 23 - Etienne Martineau - inter vm data exfiltrationFelipe Prado
 
Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2SalmenHAJJI1
 
BRKSEC-3771 - WSA with wccp.pdf
BRKSEC-3771 - WSA with wccp.pdfBRKSEC-3771 - WSA with wccp.pdf
BRKSEC-3771 - WSA with wccp.pdfMenakaDevi14
 
Presentation cloud orchestration solution overview
Presentation   cloud orchestration solution overviewPresentation   cloud orchestration solution overview
Presentation cloud orchestration solution overviewxKinAnx
 
Cisco ONE Enterprise Cloud (UCSD) Hands-on Lab
Cisco ONE Enterprise Cloud (UCSD) Hands-on LabCisco ONE Enterprise Cloud (UCSD) Hands-on Lab
Cisco ONE Enterprise Cloud (UCSD) Hands-on LabCisco Canada
 
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPROIDEA
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtubeDhruv Sharma
 
What's New in Grizzly & Deploying OpenStack with Puppet
What's New in Grizzly & Deploying OpenStack with PuppetWhat's New in Grizzly & Deploying OpenStack with Puppet
What's New in Grizzly & Deploying OpenStack with PuppetMark Voelker
 

Ähnlich wie 3 cucm database (20)

CCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptxCCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptx
 
Migrating to cisco unified communications manager 9.1
Migrating to cisco unified communications manager 9.1Migrating to cisco unified communications manager 9.1
Migrating to cisco unified communications manager 9.1
 
Chapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating SystemChapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating System
 
Cisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW ClusteringCisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW Clustering
 
Cuc pcd tac_toi
Cuc pcd tac_toiCuc pcd tac_toi
Cuc pcd tac_toi
 
Kafka Reliability Guarantees ATL Kafka User Group
Kafka Reliability Guarantees ATL Kafka User GroupKafka Reliability Guarantees ATL Kafka User Group
Kafka Reliability Guarantees ATL Kafka User Group
 
DEVNET-1148 Leveraging Cisco OpenStack Private Cloud for Developers
DEVNET-1148	Leveraging Cisco OpenStack Private Cloud for DevelopersDEVNET-1148	Leveraging Cisco OpenStack Private Cloud for Developers
DEVNET-1148 Leveraging Cisco OpenStack Private Cloud for Developers
 
intro-kafka
intro-kafkaintro-kafka
intro-kafka
 
Dan Norris: Exadata security
Dan Norris: Exadata securityDan Norris: Exadata security
Dan Norris: Exadata security
 
Java Middleware Surgery
Java Middleware Surgery Java Middleware Surgery
Java Middleware Surgery
 
Apache Kudu: Technical Deep Dive


Apache Kudu: Technical Deep Dive

Apache Kudu: Technical Deep Dive


Apache Kudu: Technical Deep Dive


 
Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
 
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
DEFCON 23 - Etienne Martineau - inter vm data exfiltrationDEFCON 23 - Etienne Martineau - inter vm data exfiltration
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
 
Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2
 
BRKSEC-3771 - WSA with wccp.pdf
BRKSEC-3771 - WSA with wccp.pdfBRKSEC-3771 - WSA with wccp.pdf
BRKSEC-3771 - WSA with wccp.pdf
 
Presentation cloud orchestration solution overview
Presentation   cloud orchestration solution overviewPresentation   cloud orchestration solution overview
Presentation cloud orchestration solution overview
 
Cisco ONE Enterprise Cloud (UCSD) Hands-on Lab
Cisco ONE Enterprise Cloud (UCSD) Hands-on LabCisco ONE Enterprise Cloud (UCSD) Hands-on Lab
Cisco ONE Enterprise Cloud (UCSD) Hands-on Lab
 
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
What's New in Grizzly & Deploying OpenStack with Puppet
What's New in Grizzly & Deploying OpenStack with PuppetWhat's New in Grizzly & Deploying OpenStack with Puppet
What's New in Grizzly & Deploying OpenStack with Puppet
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

3 cucm database

  • 1. Cisco Confidential© 2013 Cisco and/or its affiliates. All rights reserved. 1 CUCM Database Replication Kristof Van Coillie May 29, 2013
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 • Database Replication Architecture • Database Replication Setup • Monitoring Replication (setup) • Troubleshooting steps • Cli commands • Q&A
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3Cisco Confidential 3
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 • Most data is written in database of publisher and then replicated to subscribers • User facing features can also be written in subscriber and are replicated to publisher
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 • CCM Admin page on Subscriber queries database on Publisher • Query local database via cli: run sql select * from region • A change is being replicated to the database of the Subscriber and the ccm service is updated via a change notify
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6Cisco Confidential 6
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 1. Define Identifies which servers will participate and defines those nodes locally and on other nodes (cdr define server) 2. Define Replicates Define what tables will be replicated and what to do in case of collisions, stored in the syscdr database (cdr realize templates) 3. Replicate Actual sync of data (cdr check)
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Publisher installed Installing subscriber 1 Is pub already replicating? Sub tries again later Pub starts process • Pub defines itself • Pub defines templates • Pub realizes templates on itself No Start Repl timer Yes Define Sub 1 Status on Sub 1 = 0 Repl timer expired • Realizes templates on defined subs • CDR check on subs Status on Sub 1 = 2
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Repl timer expired • Realizes templates on defined subs • CDR check on subs Status on Sub 1 = 2  Once the Repl timer expired other Subscribers will only be able to start the replication setup process once the first batch is completed  During an upgrade don’t switch version on nodes one by one with time interval larger than the Repl timer, switch version together or in 2 batches  Increase repl timer for large clusters to allow all subscribers setup the replication in one batch (see next slide)  When clustering over wan, consider to sync local servers first
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 • Default set to 300 seconds: • Configurable on publisher via cli:
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11Cisco Confidential 11
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Summary Text Summary Table of Servers
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Shows if A Cisco DB Replicator is working
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Unique ID in cluster and shows if replication has been set-up
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Replication data and control queues in bytes
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Shows if Pub and Sub versions of CUCM match
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Indicator if replication- dynamic real-time replication is working
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 RTMT Replication counter 0= Replication set-up in progress 1= Not Used 2= Replication set-up successful 3= Real-Time replication out of sync or not available 4= Replication set-up failure
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 • Publisher is waiting for Subscribers to define “Batching Sync Requests”:
  • 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 • For every subscriber there will be a define log file on the publisher: • This file will end with a checksum of [64] if the define was successful:
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 • Broadcast Sync is proceeding, progress can be followed in “Sync Progress”:
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 • Broadcast started after the Repl Timer expired, timer started when first Subscriber was defined:
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 • Status is 2 on every server in the cluster:
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 • Replication setup is finished when Output Broadcast file has size: • This file will end with a checksum of [64] if the replication setup was successful:
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25Cisco Confidential 25
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 • Typical scenarios causing database replications to break: 1. Network connectivity issues between nodes general connectivity issues MTU Firewall blocking ports 2. Changing ip/hostname It is important to follow the documented procedure 3. Mismatch in security password CSCth87452: A Cisco DB service will not start after changing security password CSCtn79868: pwrecovery tool resetting only sftpuser password
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 • Available in the Unified CM Database Status report:
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 • Subscriber authenticates to Publisher using the security password • When successful Cluster Manager inject entry in hosts file and add policy in firewall
  • 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 • Used by the Informix database authentication mechanism • Build based on HOSTS file • Created by A Cisco DB
  • 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 • Contains the connectivity information for each database server • Created by A Cisco DB
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 • Publisher syncs to external ntp server • Cisco recommends synchronizing Unified CM with a Cisco IOS or Linux-based NTP server, Windows Time Services as an NTP server is not recommended or supported
  • 33. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 • Subscribers sync with publisher
  • 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 • CLI command ‘utils network connectivity: 1. Subscriber nodes communicate to Publisher node via TCP and UDP (port 8500) 2. Test validates that the Sub is properly authenticated against the Pub 3. Echo request/reply packets via UDP and TCP validates proper handling of IP fragment 4. Same test validates proper MTU settings 5. Additionally, sends request to installed private ports used by other CCM application components
  • 35. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 • CLI command ‘utils network connectivity:
  • 36. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 • Each server should have entry for all nodes in cluster: • Entries are added by Cluster Manager when authentication between nodes is successful
  • 37. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37Cisco Confidential 37
  • 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 • Make sure all tests covered in troubleshooting section has been completed successfully, failing to do so will bring your cluster in worse scenario when executing the cli commands
  • 39. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 1. Define Identifies which servers will participate and defines those nodes locally and on other nodes (cdr define server) 2. Define Replicates Define what tables will be replicated and what to do in case of collisions, stored in the syscdr database (cdr realize templates) 3. Replicate Actual sync of data (cdr check)
  • 40. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 • This command will verify if all tables are in sync and generates a report, the report contains what tables are not in sync (if any)
  • 41. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 • This command takes a while to complete, progress can be monitored via ‘utils dbreplication runtimestate’
  • 42. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 • This executes step 3 (actual sync of data) • This fixes out of sync data • Runs on all tables in replication on all servers that are included in the command • Outcome to be confirmed by running ‘utils dbreplication status’
  • 43. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 • Same as repair command but runs on only one table or replicate (much faster) • Useful on large clusters where only one/few tables are out of sync
  • 44. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 • This command stops the replication set-up • The only way to recover from a stop is with a reset • This command pauses for the duration of repltimeout timer and then kills currently running replication commands again • This command also kills auto recovery • Use with caution!
  • 45. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45 • This command drops the syscdr database (created in step 2) • Need to run ‘utils dbreplication stop’ prior this command • Can be used when there is a looping attempt to define a server in replication (step 1), usually the issue is on the pub and not on the failing sub
  • 46. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46 • This command causes replication to be torn down and set-up again • Executes all three steps
  • 47. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47 • This command does stop, drop and reset all in one command (available as of CUCM 9.x)
  • 48. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48Cisco Confidential 48
  • 49. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49 • Please post open questions to our support forums: https://supportforums.cisco.com
  • 50. © 202 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50 Thank you.