What is ABS?

The Epicor Automated Backup Solution (ABS) uses CrashPlan PRO to product Eclipse customers with data backup both on-site and at a secure off-site location. The ABS Failover offering utilizes this off-site backup to offer hosting for customers a disaster situation.

The product is currently available for Eclipse Customers running Linux and Windows servers. The ABS software is installed and configured by Epicor.

There are three levels of backup for the ABS product:

  • Tier 1 – CrashPlan PRO software alone offers the ability for local backup copies within the customer network
  • Tier 2 – ABS Off-Site Backup: adds the protection of a secure, off-site backup
  • Tier 3 – ABS Failover: adds the ability to failover to Epicor’s hosting environment

The CrashPlan PRO software used by ABS offers:

  • Local or off-site data backup storage in a secure location
  • Byte differential backups, using compression and de-duplication for efficient transportation and archiving
  • Incremental, backup versions
  • Email backup alerts and reports
  • Data is encrypted during transport and backend storage
  • Failover for Epicor Eclipse systems (Eclipse Database, Forms, Imaging and Internet Gateway servers)

Contact your inside sales representative for more information and pricing.

How do I configure sendmail to relay outbound email under Linux?

  • Install prerequisite packages:
yum -y install sendmail-cf
  • Open the configuration file /etc/mail/sendmail.mc for editing
  • Locate the section below and uncomment the SMART_HOST line:
dnl # Uncomment and edit the following line if your outgoing mail needs to
dnl # be sent out through an external mail server:
dnl #
dnl define(`SMART_HOST', `smtp.your.provider')dnl
  • Configure appropriately, like below:
define(`SMART_HOST', `mail.corporatedomain.net')dnl
  • Apply the changes and refresh sendmail:
make -C /etc/mail/
service sendmail reload

How do I configure my Linux server to automatically apply software updates?

You Red Hat Enterprise Linux server may already be configured to automatically apply security and bug fix updates via Red Hat Network. To verify:

grep do_update /etc/yum/yum-updatesd.conf
service yum-updatesd status

If the output doesn’t show that updates are enabled and yum-updatesd is running, enable automatic updates with the following commands:

cp /etc/yum/yum-updatesd.conf /etc/yum/yum-updatesd.conf.`date +%Y%m%d.%H%M%S`
sed -i 's/do_update = no/do_update = yes/g' /etc/yum/yum-updatesd.conf
sed -i 's/do_download = no/do_download = yes/g' /etc/yum/yum-updatesd.conf
sed -i 's/do_download_deps = no/do_download_deps = yes/g' /etc/yum/yum-updatesd.conf
service yum-updatesd restart
You will need to reboot to apply any disruptive software updates, such as kernel updates. Automatically updating the kernel may require drivers not provided by Red Hat to be rebuilt.