Configuring for asymmetric configuration

Configure the primary companion for asymmetric configuration. From the secondary companion, issue:

sp_companion "primary_server_name", configure, with_proxydb, login_name, password

Where:

This example configures an Adaptive Server named PERSONEL1 as a secondary companion:

sp_companion "MONEY1", configure, "Think2Odd", "password"

Server 'PERSONNEL1' is alive and cluster configured.
Step: Access verified from Server:'PERSONEL1' to Server:'MONEY1'.
Server 'MONEY1' is alive and cluster configured.
Step: Access verified from Server:'MONEY1' to Server:'PERSONEL1'.
(1 row affected)
(1 row affected)
(1 row affected)
(1 row affected)
...
(1 row affected)
(1 row affected)
(1 row affected)
Step: Companion server's configuration check succeeded.
Step: Server handshake succeeded.
Step: Master device accessible from companion.
Step: Added the servers 'PERSONEL1' and 'MONEY1' for cluster configuration.
Step: Server configuration initialization succeeded.
Step: Synchronizing Application Specific information from companion server
Step: Synchronizing Roles from companion server
Step: Synchronizing Login Roles from companion server
Step: Synchronizing Remote Logins from companion server
Step: Synchronizing Groups in sysusers from companion server
Step: Synchronizing Sysattributes from companion server
Step: Synchronizing server logins from companion server
Step: Synchronizing server-wide privs from companion server
Step: User information synchronization succeeded.
Step: Server configured in normal companion mode.

If user databases already exist while you are using sp_companion, you see messages similar to these:

Step: Created proxy database ‘pubs2’
 Step: Proxy status for database has been set. Please Checkpoint the database 'pubs2'
 Step: Server configured in normal companion mode”
 Starting companion watch thread

See “Asymmetric Companion Configuration” for more information about asymmetric configuration.

Note The login_name and password in sp_companion configure cannot be null. After you successfully execute sp_companion configure, it creates a new file, /etc/VRTSvcs/conf/config/ha_companion.remote_server_name. Verify this file has read and write access only for the user who runs the server. Otherwise, security is compromised.