Platform Guide#
Overview#
The Command Line Interface#
System Specific Commands#
System Metrics#
Data Export Commands#
Cluster Deployment Commands and Steps#
Provisioning#
Networking#
Application Control#
System Control#
Diagnostics#
- Login Report
- Cluster Check
- Enable Health Monitoring
- Enable Database Scheduling
- Command History
- Logs
- Viewing Logs
- Sending and Collecting Logs
- Log Types
- Audit Log Rule Sets
- Log Type Commands
- Audit Log Format and Details
- Event Log Format and Details
- Log Streaming
- Remote Log Type Encryption
- The Mail Command
- Diagnostic Tools
- Diagnostic Troubleshooting
Notifications#
SNMP#
Trap Details#
VOSS Automate System Monitoring Traps#
Scheduling#
Backups#
- Backups
- Backup and restore in a modular architecture
- Backup destinations
- Backup passphrase
- Backup size considerations
- Create a backup
- Restore a backup in a clustered environment
- Create space for a backup or restore
- Maintaining Backups
- Backup and import to a new environment
- VMware snapshot maintenance
- Backup on Azure
Restoring a Backup on a New Environment#
System Security#
- Introduction to system security
- Configuration Encrypted
- Backup Encrypted
- Application Install Files Encrypted
- File Integrity
- Protected Application Environments (Jails)
- Restricted user shell
- User Security and Security Policy Management
- Creating Additional Users
- Creating and Managing SFTP Users
- Granting and revoking user rights
- Password Strength Rules
- SSH Login Fail Limit
- SSH Session Limit
- SSH key management
- SSH Algorithm Management
- Adding a Key for Automatic User Login
- Prevention of DOS Attacks
- Memory Dumps and Security
- Manage Read-Only Database Users
- System Intrusion Detection
Network Security#
- Network communications between nodes within the cluster
- Network communications external to the cluster
- Dynamic Firewall
- Web Certificate Setup Options
- Supported SSL Ciphers
- VOSS Automate Setup a Web Certificate
- Own Web Certificate Setup
- Web Certificate Expiration Notice
- Convert Web Certificates from P7B to PEM Format
- Web Certificate Commands
- Web Hosts Commands
- Web TLS Protocol Configuration
- Web TLS Cipher Management
- Network URI specification
- Web External Proxies
High Availability and Disaster Recovery (DR)#
DR Failover and Recovery Overview#
DR Failover and Recovery in a Unified Node Cluster Topology#
- Election of a New Primary and Failover
- DR Failover and Recovery Scenarios
- Scenario: Power Off and On of a Node
- Scenario: Loss of a Non-primary Node in the Primary Site
- Scenario: Loss of a Non-primary Server in the DR Site
- Scenario: Loss of the Primary Database Server
- Scenario: Loss of a Primary Site
- Scenario: Loss of a DR Site
- DR Failover and Recovery in a 2 Node Cluster
- Scenario: Loss of Full Cluster
DR Failover and Recovery in a Modular Cluster Topology#
- Modular Cluster: Election of a New Primary and Failover
- DR Failover and Recovery Scenarios in a Modular Cluster
- Scenario: Power Off and On of a Node in a Modular Cluster
- Scenario: Loss of an app node: Modular Cluster
- Scenario: Loss of the Primary Database Server in a Modular Cluster
- Scenario: Loss of a non-primary database: Modular Cluster
- Scenario: Loss of a Primary Site in a Modular Cluster
- Scenario: Loss of a DR Site in a Modular Cluster
- Scenario: Loss of Full Cluster in a Modular Cluster
Troubleshooting#
Appendices#
MIBs#
Data Export Types#
- Analogue line MGCP Data Export
- Analogue Line SCCP Data Export
- Call Pickup Group Data Export
- Contact Center Enterprise Data Export
- Contact Center Express Data Export
- Customer Data Export
- Extension Mobility Data Export
- FMC Data Export
- Hunt Group Data Export
- Hybrid Data Export
- Line Data Export
- Phones Data Export
- Site Data Export
- Subscriber Data Export
- Webex Teams Data Export
- Webex Devices Data Export
- Webex Workspaces Data Export
- MS Office 365 Data Export
- MS Teams Data Export
- MS Exchange Data Export
- Pexip Data Export
- VOSS phone servers data export