Vous êtes sur la page 1sur 194
| | ‘ | i] 4 i | | | | q i | i! q 4 i NOT | i AI RAMXEROX | | it i AMEERPET ;H¥)D | ! ' You'dlloey AIX SL SYSTEM ADMINISTRATION Chapter-1: ODM Gbw.-Object Data Manager is databace fur stwsing sistent information. Phy seat and JOdical device information is stored and maintaine.! as objects. For safety reasoy, ODM sata is stored in binary format. ) Most System object classes and objects are stored in the /usr/libobjrepos directory, ODM. information is stored in three directories as follows Jetelobjrepos --- Software can’t be shared (sell) fusrfib/objrepos --- Software can be share among several systems (Standalone) Jusrishareliblobjrepos --- éan be shared for different hardware architecture (other architecture} ae: ‘The basic components of the ODM are‘object cloeses and objects, To manage object classes and objects, you use the ODM commands and subroutines. System dat managed by the ODM includes: Device configuration information System vita! product data for installation and update procedure System resource controller information ‘TCPIP configuration data Error log and Dump information SMIT menus and commands ‘Network installation Manager inférmation vvvywyy In the area of devité Configuration, the ODM contains information about all configured physical volumes, volume groups and logical volumes. This information mirrors the information found in the VGDA. The process of importing a VGDA, for Example, involves copying the VGDA data for the imported volume group into the ODM. When @ volume group is exported, the data held in the ODM ebout the volume group is removed from the ODM database. ‘There are 2 types of ODM device database files }) Predefined device information, which contains all supported devices 2) Customized device information, which contains all devices that are actually attached to the system, set 4 tonto bn ben 0 ePeeeeeeeoaoeaoce ODM Commands: ‘odmadd---Adds objects to sm object class. odmchange---Changes specific objects in a specified object class. odmereate--.Cieates empty object classes . odmdelete~-Removes objects from an object class. odmdrop---Removes an entire object class. vagetReveves objects om object siggy ‘odmshow---Displays the description of an objett class. Examples: a Hodmshow Cui)v ---- The object class definition for the Customized Device Database (CuDy) #odmshow PdDv (PdDv) ‘The object class definition for the Predefined Device Database Software vital product database information contains 1) LPP contains intormation about installed software product 2) Thventury contains files associated software product 3) Product information about installation/updates of software produet 4) History historical information about software Whenever installing a product or update in AIX, installp command uses the ODM to ‘maintain the software vital product database, > : a 2 Chapter-2 AIX V5.3 Installation Installation Methods are listed below 1) CD-ROM 2 Tepe 3) Preinstallation (For new system order) 4) Network install Manager (NIM) The conients of the CD-ROM are packaged in a file system format, thus the installation process from a CD is carried.cut in a different format than the tape. The preinstall option is valid only if accompanied by a hardware order that includes the preinstalled AIX Version 5.3, Nevwork installations are,carried out using the AIX Network install Man (NIM). Method of Installations as al 2 Grp ee 1) New and Complete everwrity Ona new machine, New apé€omplete Overwrite is'the only possible method of installation, On an existifg machine, if you want to completely overwrite the existing version of BOS, then you should use this method. 2) Preservation Install Use this instailation method when a previous version of BOS is installed on your system and you want to preserve the user dain in the root volume group, This method will remove only the contents of /usr, / (root), /var and /tmp, The preservation install option will preserve page and dump devices as well as home fnd other user created file systems. System configuration will have so be done after doing a preservation installation. 3), Migration Install Use this installation method to upgrade an AIX version 5.1 or later system to AIX version 5.3, while preserving the existing root volume group. This method preserves al ile systems except /tmp, es well asthe logical volumes and system configuration files. Obsolete or selective fix files are removed, Migration is the default method for an AIX system running version 3.2 or 4.x. The installation process determines which optional software products will Install 64-bit and JES2 Support Ifyou choose yes and are installing with the New and Complete Overwrite method, the file systems are created with JES, instead of JES. If you want the 64-bit kemel, but do not ‘want JFS2 file systems, then select No. after the install completes, use the following commands to switch to he 64-bit kernel: #in -fs /usr/lib/boot/unix_64 /anix #in -f /usrib/boovunix_64 /ust/lib/booVunix #hasboot -ad /dev/ipldevice Finally reboot your system o Seeeeooeoeooses ve Chapter-3 Booting Process Daring the boot process, the system tests the hardware, loads and runs the operating, system and configures devices Tu Wwot the CS, the following resources are required: ¥ A boot image that can be loaded after the machine is tumed on or reset, Y. Access to the root and /usr file systems. ‘There are 3 types of system boots: 1) Hard Disk Boot A machine is started for noninai operations with the key in the normal position. On PCI based systems with no key locking, this is the default startup mode, During a hard disk boot, the boot image is found on @ local disk created when the Q/S was ‘installed. During the boot process, the system configures all devices found in the machine and initializes other basic software required for the system to operate, At the end of this process, the file systems are mounted and ready for use. 2) Diskless Network Boot Catiog A dlskless or data Jess workstation is started remotely o general requirements apply to diskless network clients. and access to the OS file tree: Diskless network clients have 10 i all their information by way of remote access. 3) Service Boot ‘A machine is started from a hard disk, network, tape, or CD-ROM with the key set in the service position. This condition is also called maintenance mode. In maintenance mode, a system administrator can perform tasks such as instaliing new or updated software and running diagnostic checks. s Booting process is divided into 3 phases 1) Read Only Storage (ROS) Kemel Init Phase 2) Base Deviee Configuration Phase 3). System Boot Phase During the first phase, problems with the motherboard are checked, and the ROS initial program load searches for the bootlist. Once the bootlist is found, the boot image is read into memory and system initialization starts. During the second phase, all devices are configured in this phase, with the help of the efgmgr command, During the third phase, all the logical volumes are varied on, paging is started, and the /ete/inittab file is processed. < t ‘ Se G cecuew y 3 a) e iat Both hardware and sofiware problems can cause the system to halt during the boot process. The boot-process is also dependent on which hardware platform is used Booting Process steps: Step I: Cheek of and initializstion of Hardware The initial hardware check is to verify that the primary hardware is OR7On PCL systems, itis handied by a single POST. fer this, the system loads the Boot Logical ‘Volume (BLV) into a RAM file systems (RAMFS) and passes control to the BL: Step 2: Load BLY : Once the BLY is loaded by bootstrap code program, AIX Kemel gets control over the boot process and rematin booting procedure is carried by AIX Kernel. So far, the _system has tested the hardware, found a BLY, ereated the RAMFS and started the init process from the BLV * BLY Contains AIX Kemel, Reduced ODM, Boot Commands and r.boot. Boot ‘commands are programs that are called during the boot process (Ex: efgmer, bootinfo anid s0 on). Reduced ODM is required here as many devices are configured before h4 is, available, for these devices comesponding ODM files must be stored in BLV. re,boot is the configuration script that will be called three times by the init process during boot Step 3:Start init process from BLY to configure base devices The init process started from RAMFS executes the boot sctipt re.bootl. At this sage, the resthase command is called to copy the reduced ODM from the BLY into the RAMFS. If this operation fails, a LED code of 548 is presented. After that efgmgr—£ ‘command reads the Config_Rules class from the reduced ODM. The process invoked with reboot attempts to configure devices so that rootvg can be activated in the next re.boot phase. At the end of boot phase, the bootinfo ~b command is called to determine the lastboot device. At this stage, the LED shows 511 Step 4: Activate Rooryg The rootvg will be varied on with the special iplvaryon command. If this fails LED codes 352,554, or $56 will appear. Then the root file system (/dev/hd4) is mounted om a temporary mount point (/mmnt) in RAMES. If this fails, 555 or 557 will appear in the LED display. Next, the /usr and /var file systems are mounted. If this fails, the LED 518 ‘will appear. ‘The mounting of /var, at this point, enables the system to copy an éventual damp froin the default dump devices, idev/hd6, to the default copy directory, Natladeras. : Then the copy of rootvg's RAMFS ODM and /dev directories will occur (copy to disk) and then /usr and /var file systems from the rootvg can be mounted again on their ordinary mount points. ‘There is no console available at this stage, so all boot ‘messages will be copied to alog, The alog command can maintain and manage logs. ecoeoeeCeeoevseoeaos ea Ges Step 5: Configure remaining Devices and then start init process with rootvg In this phase init process reads /etc/inittab and /tmp file system is mounted here ‘The root is synchronized: This can take some time. This is why the syneve reovg coramand is executed as a background process. At his stage, the LED code 553 is shown At this stage, the efgmgr -2 process for normal boot and the efgmgr ~p3 process for service mode are also run, Cfgmgr reads the Config_rules file from ODM and checks for devices with phase=2 or phase=3. Next the console will be configured by calling efgeon ‘command, Finally the synchronization of the ODM in the BLV with the ODM from the / (roo) file system is done by the savebase command ‘Then writes ercor by kemeV/application to error log-by starting errerdemon. Then call rm /ete/nologin, this file do not allow any login during boot. Finally flashes system initialization completed message Important Commands: ‘The following commands that are used to manage system startup and shutdown, Using the alog command The alog command can manage and maintain logs, The re.hoot script explicitly redirects boot information through the alog cornmand to the file /var/adm/rasfhootlog. If something goes wrong with the system. you can boot the system in single user moe (maintenance mode) and access these logs through the alog comand to see at what stage the system is failing, You can view the boot log by either using the SMIT fast path smirty alog_show ‘and giving the name of the log you want to view, or you can use the alog command ‘Use the alog -L command to view the logs defined in the alog database. Halog -L Boot Bosinst Nim Dumpsymp 4 To view the boot log #alog-o-t boat ~ Using the efgmgr command The cfamgr commend configures devices and optionally installs device software into the system.-The cfgmgr command configures only those devices at the system startup that are powered on and arc self configurable, such as SCSI devices TTYs that have been defined in the inittab file Using the last command The last command is generally used to display all previous logins and logofis recbtded in the /var/adm/wtmp file. o Ye -t oo oy Ifyou want to find out when the user root logged on and off from console #last root console ‘The last command can be used to determine when the system was last shut down, #last shutdown, last uptime Using the bootlist command The bootlist command allows you to displey and alter the list of boot devices from which the systemn may be booted. This command supports 3 types of mode variables, those are normal, service, both or prevboot “ ‘To display a boot list #bootlist-m normal -o Fao edd - disk Tf you want to make changes to your normal boot list #bootlist—m normal hdiskO edO 7 When the system is booted, it will first attempt to boot from hdisk0. If't can’t find © a boat in hdisk0 it will search the CD-ROM. £3 Using che uptime command ‘The uptime command shows how long the system has been up. uptime o The uptime command prints the current time, the length of time the system has been up, the number of users online and the load average (the number of runnable i} Process). Using the bosboot command Itis used to create boot image as well as updat #bosboot -ad /dew/hdisk! It creates boot image on hdiskI 7 #bosboot -a To update a boot boot image. Using the shutdown command e system shutdown is controtled by a shell script that properly prepares a system ‘with multiple users to be turned off or rebooted. i i e S@eGeeteCES Chapter-4 System Dumps ‘A systérn dump is created when the system has an unexpected system halt or a system failure. The dump will be a snapshot of the system at the time of the dump. It does riot collect data about what happened befove the system dump. This dump is written to the primary dump device first. In AIX versions after 4.1, the default dump device is /dev/hd6 (before /dev/hd7) ‘The secondary dump device is /dev/sysdumpnull. Once the system is booted, the image is copied from /dev/hd6 to the directory /var/admiras, The default name of the dump file is Snap.paxz. —— Note: The'primary dump devices must always be in the rootvg for permanent dump devices. The secondary device may be outside the rootvg. ‘The current dump configuration can be determined by using the sysdumpdé#tommand #sysdumpdev Primary /dev/hd6 Secondary Alev/sysdumpnull Copy dir wat/adivras To change a primary dump device permanently sysdumpdev -P ~pidev/nd3 To change a secondary dump device permanently sysdumpdev -P -s /dev/emnt0 To temporarily change the primary device until the next reboot sysdumpdev -P /devirmt0 You can start'a system dump by using the following methods If you have the software service aids package installed 1) Use the command line ° 2) Use SMIT Ifnot 3) Use the Reset button 4). Use Special key sequences Using the Command line: Asysdumpdev I It lists the current dump devices. Asysdumpstart -p It start the system dump to primary device -s (secondary device) Using the SMFT. f#smitty.dump'-- start a dump tothe primary dump device 4 2 a ag G Cc @ i s Dd i eg iy oP CP i 7 SO PCCOLO PII”? ee o Using the Reset Button: To start a dump with the reset button, the key sivitch must be in the service position, Hsysdumpdey -k -- It will set the force copy flag 16 true. asysduanpuev Using special key sequences To start a dump with 2 key sequences, you must have the key switch in the service positin or have set the always allow dump value true. #sysdumpdey -k “et Press the ctr} alut] key sequence to write the dump information to the primary dump device, Press the ctritalt 2 key sequences io write the dump information to the secondary dump device. Copying'a system dump: Ifthe dump is not copied to an extemal device during boot, it can be copied to the external device using the snap command. It gathers system configuration information and ‘compresses the information into a pax file. The information gathered with the snap command might be required to identify and resolve system problems. Root user authority is required to execute the snap command, Snap command gathers system information like Error report, copy of the customized ODM database, Trace file, user environment, amount of physical and paging space, device and attribute intotmation and security user information. ¥snap—a To gather all system configuration information. The ouput is written to the Amplibmsupt directory ‘The snap command will check for an existing dump on the system and copy it to tape. snap -GgfkDId -0 /devirm0 G general o/s F File system information k Kernel information D_ Kernel dump The last system dump can be checked using sysdumpdev command Hsysdumpdev -L. ‘The minimum size or estimated size of the dump space can be determined using asysdumpdev ~e Rules in mind when selecting dump device: Po 1) A mirrored paging space may be used as a dump device. 2) Do not use a diskette drive as your dump device 3) ‘The primary paging device hds is the only paging device that shouid be used as, the primary dump device. ATX Version 4.2.1 or later supports using any paging i F device in the rootvg as the secondary dump device. “i 4) The primary dump devices must always be in the rootvg. The secondary device % may be outside the rootvg unless itis a paging sace. = + Check. she System dump: ‘The dumpcheck command is used to check the disk resources used by the system dump. #Hiuselib/ras/dw"apeheck —p #smnitty dump_checkr ~Probiem determination -System dum ~Che: a oe. ump resources utility Dump status codes: sysdumpdev_L, Dump status 0 Sysdumpdev status Deseription 0 Dump successful | 4 VO error during dump = i 2 Dump device js too smal! ? 3 Internal dump error ioe a No dump device defined 9 . le , 2 i 9 t 9 - ' 8 i) | o \ 10 eeeogoesg Chapter-5 Error Logging CA ___. The error process begins. when an O/S module detects an error. That itiformation s is Written to the /devlerror special file for new entries and when new data is written, the ¥ entry is written to the error log ‘ile s ‘To determine the path to your systems error log file ~ 7 #usr/lib/errdemon —1 . Logfile /varfadm/rasferrlog % Log size 1048576 om To change the size of the error iog file 1G #uselibverrdemon ~s 2000000." PO ‘Using the errpt command: ne To retrieve the entries in the error log, you can use the errpt command, The errpt » ‘command generates an error report from entries in an error tog Oo Herept ~Note: The errpt command does not perform error log analysis. Fa¥ analysis, use the di command. To display a detaited report of I the errors encountered on the system. OC ; Herspt—a 3 one :o To display a detailed report ofall error logged in the post 24 hots 3 Hate ” Wed Aug 29 09:30:42 CDT 2004 e feria 0828095001 Fnpddhon tl ently chy, hoe, ettnnhe por To display a shortened version of the detailed report, = Herpt -A -| DBCFDEE >) To clear all entries fiom the extpr log Herrclear 0 To stop error logging #lustlibierestop © To start extor logging #usritib/errdemon “alog -L > creak ark rainloing fred Size Jog Me « “S dlcptay te camnent othe d Mle Meo spespe ly ye ergt—C > eyleuce. of Fenrobect carers, (Pro) eOPE -9-F Wend Bidunddl PEP => onl vedundord cad &SF STF e@eeege Sc Diagnosing hardware problems: ‘The diag command is the starting point to run a wide choice of tasks and services, aids that are used to perform hardware problem determination. The diag command to test the system and analyze the error log, smiay diag ‘The link between error log and diagnostics is the new function. When the diagnostic too! runs, it automatically tries to diagnose hardware errors it finds i the error log. The System Log ‘The syslogd daemon receives inférmation from other daemons and sends it to files, terminals. users, or other machines. Depending on its configuration, it only logs critical errors or debugging output. By defguls the file has no active entries. The syslogd daemon is started by /ete/re.tepip, The daemon iS configured by /ete/systog.conf, in which the pslocity.cf the information, its source, and where it should be sent to are specified. The syslogd daemon is a subsystem of the System Resource Controller (SRC) and can be manipulated by the SRC commands like startsre, stopsre and Issrc. ‘The sylogd daémon creates the /ete/syslog pid file, which contains a single line with the command process ID used to end or reconfigure the syslogd dacmon, ‘The sysiog subroutine writes messages onto the system log maintained by the syslogd command. Messages are read by the syslogd command and written to the system console or log file, or forwarded to the syslogd command om the appropriate host. ‘ aly « coce é wv t Chapter-6 Devices Device Terminology: Physiedl Devices: A.ctual hardware conuected to the system, Ports: Physical-connectors / adapter where physical devices are attached Device Drivers: Sofware in the kernel that controls the activity on a port and of the data that is sent to the device ie. software which manage device. ‘Every device driver has major number, which isthe device driver number, and minor number, which is the device number where this device will ‘Togleal Device: Special fil files through which we access a physical device to the users & application program. ‘ddev: directory, which contains all the logical devices that can be directly accessed by the user. pe format a Coole Two types of Devi Block Device: [tis 2 structured random access device and read chunk (Blocks) of data Baffering mechanism can be handled by memory. Examples are disk file systems aracter (raw) device_ILis a sequential, streasn-oriented device and writes one character at time, which provides no buffering; buffering can be handled by device driver. The is -j command allows you to see the type of a file. A special file (in the /dev directory) will be indicated by a b in the first column for a block device or a ¢ for 2 character device. Device Configuration Database 1) Predefined Configuration Database contains configuration data for all possible devices supported by the system. 2) Customized configuration Database contains configuration data for all currently defined and configured (available) devices. ‘The configuration Manager (efgmgr) is a program that automatically configures devices ‘on your system during system boot and run time. The configuration Manager uses the information from the predefined and customized databases during this process, and updates the customized database afterwards Using lsdey command: You can use the Isdev command to display information about devices in the device configuration database (either Predefined and Customized Devices object class in ODM) To list all supported devices Aisdev -P -H or smitty devices To listall customized devices pee@eeeaeoecoeceaoeaod Hisdev -C -H | more ‘To list the adapters that are in the Available state in the Customized Devices object class HIsdev ~Ce adapter ~S a flsdev ~Ce disk lsdev -Ce processor Usiag Isattr command: ‘You can use the Isattr command to display information about the attributes of a given device or kind of device. To display the current attribute values for the herd disk device hdiskO Mlsattr -El hdisk0 f#lsottr EH +1 sys0-887" flsottr ~El sys0 ~a realmem (To see memory) To list the defauit attributes values for the disk device hdisk0 Hlsatir DI hdliskO Us Isofg conimand : It displays configuration, diagnostic and vital product data (VPD) information about the system. : To display the system configuration Hiscfg’ It will gives the all logical device names with description, x To display the vital product data information for'a specific device specified by the logical ame ndiskO Alscfg -vl hdiskO Using the prtconf command: It display system configuratioi inforniation like machine information, Network information. paging space information, volume groups information and Installed resource list information. . To display the system configuration Hpricont formation 4 C eo ® Device States: ‘The most common device states are: Undefined: The device is a supported device but not configured. It does net reside in the Customize! Ustabese, Defined: The device hes been ad‘led to the customized database. It has beanallocated logical device name, a location code and aattributes have been assigned to it. But itis still vnavailable for use, 5 Available: The device resides in the customized database. The device is fully conifigured and is ready for use. When a'device is first identified, itis configured and put into the Available state We can control the device state by using SMIT or mkdev and rmdev commands, The predefined and customized database store information about all of the logical devices in the system and their attributes managed by the ODN. 2, To put define tape into an available state #mkdey — rmt0- To move an available tape device to defn Armdev =! mt To permanently remove an available or define tape device 7 dirmdey —dl rmt0. Self Configuring Devices “cfgmgr” is & program that runs during boot that configures devices. You can run from command line on system that is up and running, efgmgr identify all powered on device & matches them to information in predefined database. It then uses the predefined information to complete a customized database entry for the device. All devices are self configuring except for parallel and serial devices. 15 ea Chapter-7- Working with the Logical Volume Manager e : ‘The besic components of AIX storage are Files, Directories, File Systems, Logical « Sterage, Physical Sicruge ané Logical Volume Manage Fe . Problems with traditional UNIX Disk Storage are fixed partitions, Expanding size e of the partition, limitation on size of a file system and file. No file system can be delined larger than the luvgest physical drive. This means that no single file can exit larger than i = the largest physical drive. It can’t span multiple hard disks A” . 7 ‘Benefits of the |. YM oe + Logicat volumes solve non-contiguous space problems Ge -sasbogica) volumes can span disks ne) * . Dyhamicilly increase logical vSlume size ° * Logical volumes can be mirrored QO Hard disks easily added to x system 2 © Logical volurnes can be relocated + Volume zroup and logical volume statisties can be collected , ‘ The Logical Vol..ne Manager (ILVM) consists of the logical volume device driver i (LVED) and the LVM subroutine interface library. : Ts } fanaging Physical Volumes § 3 ‘A physicul volume is the name for an actual disk or hard drive. A physical volume a can be internally ached or externally attached. A physical volume can only belong to rs g ‘one VG. : A physical partition (PP) is the basic or smallest unit of allocation of disk. The : oO default Size of the PP?s is 4 MB, The PP size can-be changed in increments of the power of 2 up to 1024N:i5. The default maximum number of PP’s per Physical Volume is 1016. All PP’s within «i volume group are the same size and can't be changed dynamically. The number of physical partitions per plyysical volume can be changed dynamically in multiples of 101 (1016. 2032...) oe The top level mein for Physical Volume ‘ smitty py Oo ; List all Physical Volumes in system . ‘ : —fspv -. oO i List coments of's Physical Volume Hispy hdisk0 re) ' To lists all the lovical volumes on a Physical Volume #ispy -1hdisk i Listing Physical jartition allocation by Physical Volume region ) spy gp hdisko 0 Listing Pyscl potion allocation tble lspy -M hdiskt 16 ee ee ee ee Ee ase Yead vdeo morug Migrating the evntents of a Physical Volume ‘The PP’s belonging to one or more specified logical volumes can be moved from one physical voltime to one or more other physical volumes within a volume group using migratepe command. 1¢ migrafepy command can't move data between different volumesgcaups. Not How to mos ¢ He data from a fai 2 visk before it is removed for repair or replacement. Stepl: Make sure that the source ss! destination PV's are in the same VG. : _ Hlsvg -ptoowe Step2: I you are planning to a new disk such as when you have a failing disk Make sure the disk is available Misdev —Ce disk IFUK, flake sure it does not Lela another VG - Aspy Add ew disk to the VC Hextensinyg rootvg hdiskl Step3: Make sie that you have want to move : Deteysive the number of PP"s on the Source Alsps fic 'sk1 | grep SUSE Ps” Deviinise the number of five ?P's on the Destination disk Mls c'sK2 | grep SFRis. 57 Step Py us. cs migrating dats tom a disk in the rootvg, Alspy -L is: 1{ grep be'5 If you wot the hd information fimig... ov Lhd hisk hei ch room on the target disk for the source that you Note: The 21. tepy command is not allowed if the VG is varied on in a concurrent mode. Next, you i, vet a message waming you to perform the bosboot command on the _ destination ds. , #bosboot -ad (dev/hdlisk2 #bootlist —m ss» mal haisk2 - #mkboo! ~c.. o-v/hdisk | StepS: If you «i migrating data from a disk in other than rootvg ffrnitty mist. Step6: To sc... ve.the source disk from the volume group such as when it is failing freducevy 1. disk] firmdey -Nix sl hhdisk2—Destination Disk hdisk1--- Source Disk Spey “A wey et Solu GIRHwapy -y copy Sug V7 8 a ee oe eococg Examples related to migration: ‘To move PP’s fiom hdisk] tg hdisk6 and hdisk? (all PV's are in one VG) #migratepy lidisk hdisk6 hdisk7 Femove PP’s in LV lv? from hdisk! to f: #migratepy —| 1v02 hdisk1 haisk6 Managing Volume Groups “A volsne group (VG) is the largest unit of storage allocation. A VG consists of a ‘group Sf one ws snore Physical Volumes all of which are accessed under one WG name. ‘This space ini he used by other storage entities like file systems and logical volumes. ‘Volume yiou; +,ré portable and can be disconnected from one system and connected to another sys system is installed, the root volume group (rootvg) is created, This is Flexible LTG size for better disk /O performance. The logical tracK group size corresponds to the maximum allowed transfer size for disk VO. To take advantage of these larger transfer sizes end achieves better disk U/ performance: aaa ‘The supported LTG size was 128 KB, the accepted values are 128, 256, 512, 1024 KB. t o find the L1G size rust sbin/iquerypy -M hdiskt> sy Ee To set the LTG size imkvg or chyg To change the LTG size, the volume group must be varied on, the logical volumes ‘ must be closed, and file systems must be unmounted 4 ‘ “Hor Spare : 4A hot spare is a disk or group of disks used to replace failing disk. LVM marks a 7 GG physical Volume missing due to Tt then starts the migration of data to the 4 . hot spare disk. farce SO San crovuzen Minimum hot Spare tequirements are : Spares are allocated and used by valume group 7 Logical volumes must be mirrored ; All logical partitions on hot spare disks must be unallocated 4 Hot spare disks must have at least equal capacity to the smallest disk already-in the volume group. o Hot spare policy and synchronization policy are applied using chpy and’ehvg commands. Examples 9 Itmarks hdisk! as a hot spare disk chpy ~hy hdisk] . The following command sets an automatic migeation which uses the smallest hot spare that is large enough to replace the failing disk, and automatically tries to synchronize stale partitions che -hy -sy testvg »>eeeoecoceeos dd | 20 je How to set up hot sparing Stepl: Decide which volume groups with mirrored logical volumes require high availability. CV cohich aluvoys be UPCsohit) Step2: Decide how many hot spare disks are requiréd and how large the hot spare disks must be, based on the evisting disks in the volume group. Step3: Add ths hot spares to the volume groups, which they are to proteckby,using extendyg command, Step4: Decide which hot spare policy will be most effective for your volume groups. Step3: Designate the selected disks as hot spares by using chpy command, Step6: Decide which synchronization policy meets the business needs and set the policy by using ehvg command. Importing and exporting a volume group If you have a volume group on one or more removable disks that you want to, access on another system, you must first export the volume group from the current sft using the exportyg command. This removes any information about the volume group from the system. To export a Volume group if must he inactive, To access an exported volume group on a system, it must be imported to the system using the importyg command. Do not attempt to import a rootvg QNote{To ‘emove the system definition ofa volume group from the ODM database, the volum® group needs fo be exporter using the exportvg command. This command will hot remove any user data in the volume group, but will only remove its definition from the ODM database. Similarly, when a volume group is moved, the target system needs to add the definition of the new volume group. Thiis can be achieved by importing the volume group by using the importvg command, which will add an entry to the ODM Database. To export a volume group Fexporive datavg or smi) exportvg - ‘To import a volume group Fimportvg datavg or smilty importvg, a AF Note: tis also possible that some logical volume names may also conic with hose already on the system. The importvg command will automatically reassign these with system defalt names.) Steps: : CAispy Hvaryofive datavg Hexportve datave fimportvg datavg . #varyonvg datavg fspy Note: If you imported a volume group that contains file systems or if you activated the volume group through smitty importvg, it is highly recommended that you run the fsck command before you mount the file systems 2 i | \ Dpeeeoeeeosd So G$ @ Note: The smitty exportvg command deletes references to file systeins in /ete/tilesystems, but it leaves the mount points on the system, Reorganiving » volume group The reorgyg command is used to reorganize physical partitions within a volume group. The physical partitions will be rearranged on the disks according to the intra. physical and inter-physical policy allocation for each logical volume. The volume group must be varied on and must have free partitions before you can use the reorgvg, command Examples: To reorganizes the logical volumes 1v03, 1v04 and Iv07 on VG datavg #reorgvg datavg 1vO3 104 ix07. To reorganize the partitions located on physical volumes hdiskO4 an idiskO6 that belong, to the logical volumes Iv04 arid 1v06 Hecho “hdisk04 hdisk06” | reorgyg ~i'datavg 1v04 1v06 Synchronizing a Volume group, € The synevg command is used to synchronize stale physical partitions. It accepts names Of TogicaT volutes, physical volumes, or volume groups as parameters. The synchronization process can be time conisuming, depending on the hardware ShayaceNIstics and the total amount of data. Unless disabled the copies within’a volume ‘group are synchronized automatically when the volume group is activated by the varyonvg command. Examples: To synchronize the copies on physical volumes hdisk04 and hdisk0S So hdiskOS 'o synchronize the copies on volume groups datavg and sapvg Hsynevg ~v datavg sapyg Managing Logical Volumes A logical volume consists of one or more logical partitions within a voltime group. Logical volumes may span physical volumes if the volume group consists of more than offe physical volume. Logical volumes may. be thereased in size anytime, “assuming that there are sufficient free-physical partitions withirrthe volume group. Maximum number of user defined logical volumes per volume group is 255 (for Normal VG), 512 (for Big VG). ae Logical Partitions Logical partitions are mapped one-to-one to physical partitions unless there is mirroring os 2 Se GQ o cc c y A logical volume may contain one of the following and only one at a time + Journaled or Enhanced journaled file system (for Ex: /dev/hd4) + Paging space (/dev/hd6) 5 + Journal Log (/dev/hd8) Boot Logical Volume (/dex + Nothing (raw device) m- Mirroring ¢ Mirroring is away to have 2 or 3 copies of a logical volume for high availability requirements i.e. Mirroring is when a logical partition mas to more than one: phys partition of the samme volume group. o ‘Note: Physical partitions do not need to be contiguous. Implementing mirroring will inhibit the performance of the logical volume. This can be partiy overcome by setting the scheduling policy for logical partition copies. The Scheduling policies are parallel, sequential and round robin, Note: Mirroting information is stored in VGSA. Mirror Write Consisteney Mirror write consistency (MWC) ensures data consistency on logical volumes in case asystem crash occurs during mirrored writes, ‘There are now 2 ways of handing MWC Active: Inaetveifone disk fails to copy the data it will creates a log file. After i sting ) the new disk, first kemel will check the logfile and then start copying the data to new re disk. 5 Passive: In passive, if one disk fails to copy the data, it will force the synchronization to 3 next disk. 9 To set MWC 2 # mklv -w y |a (yes or active) or chlv —w p (passive) » Logical Volume Policies When creating/changing a LV you can set the way the LVM decides oin which P's wallocate to the LV. This will affect the performance of the LV. 1) Intra-physieal vohime allocation policy indicates where on the physical volume partitions will be allocated to the LV. The choices are: center, middle, edge, inner edge and inner middle-The location of the data ean impact performance. ~~2y Inter-physical vohinie aTfocation policy indicates how many physical volumes can be used t0 contain the physical partitions of the LV. The range of volumes used can be: } minimum (only allocate partitions on one PV or as many as there are copies) or maximum (allocate partitions across all PV’s up to the maximum number of PV's) Examples: ‘smitty 1v To show characteristics of a LV Alsty -11v00 ew ty t Gow aw: 23 ~“ a ee oe eves eo eeooe Map of which PV's contain which PP's for the LP's of the LV #lslv -m 100 Tocreate a LV fésmitty mklv To remo smitty rmalv Note: Do not use mmly to remove JES or Paging space volumes. To list all the LV"s defined on the system #iswg | Isvg “il To increasing the size ofa LV smitty extendiv —.# Ly se, Chapter-8 File Systems A file system is & directory hierarchy for storing files. t has a root directory and subdirectories. Y Note: Data in. one file system could be on a different arca of the disk than dgta of another S file system. Free space in one file system can"t automatically be used by an a system that resides on the same PV fiEmate file a AIX supports 4 types of file systems > -lournaled File System (jf8) . a > Enhanced Journaled File System (82). +" <>” CD-ROM File System (cdrfs) a S- Network File System (nfs} A file system is a structure that allows-you to organize your data. By placing data in “Separate file systems, it allows for ease of control and management of the data. Many sy times backups and recoveries are di system lev — “Note: ifa file system ever becomes corrupted, the other file systems will not be effected, Standard File Systems in AIX ne ‘When ATX is first installed on a Sand-alone system there will be 6 filesystems in existence: I oot) = /dev/hdd ‘sr = Idev/nd2 War IdevhdOvar home = /dev/hd imp = /devid3 Iproc = /proc Jete/filesystems File names the directory where the file system is normally mounted. Isfs command will display the information from this file and from the logical volum oO Using the mount command ° are) A file system has to be mounted in order for it to be availablé for tise. Use the ‘mount command to do this. The file system can also be umounted using the umount or ao unmount command. When a file is. mounted, the lo ,—*/- —~are connected 16 a’ directory in the hierarchical he 3yStems automatically mounted at boot time. His can be specified in the /ete/filesystems a! file using the mount=automatic parameter. a : oO G #mount /dev/lv00 Jhome/kishore Mey #umount /home/kishore Wee, they . . 25 ve S 5 Woy ‘Strncture of a Journaled File System y fn The components of an AIX file system are the super block, inodes, data blocks anid indirect blocks. ec journaled Me s) sms exit within logical volumes, th e of the file systern will alveays be multiples of the logical partition size for that logical volume. = block of superblocks inode block, which cor permissions, user/groupTowner, Tat access date and so of (Sl iafOrmaROnT: The first addressable logical block on the file system is the superblock. 1 , Si2e, nu peed nodes, date n. A backup copy of the suerblock is alway: Databloek: contains aciual data s Netial € “plidirect blocks: data addresses 10 point to the data block which holds data € File System Fragmentation (Block size) BBS Fragmentation provides a wy 0 allocate fragments of a 4KB logical block 10 . files and directories. Fragment support is helpful for small user files and directories. rage system size is specified for a file system at creation time. fault fragment size is 4096 bytes. The allowable fragment size for JFS file 7 ie 512, 1024, 2048 and 4096 byles. Different fie systems can have different fy Saguent sizes, But only one fragment size can be used with ina single file system. a For example SAP applications, we use > File System Fragmentation for better utilizetion of disk space Variable Number of Inodes gment size 2043 bytes $ > With the default nbpi = 4096 an inode will be created for every 4096 bytes of file a system, —— © > Using the value nbpi = 1024 an inode will be ereated for every 1024 bytes of file . system, oO > Increases the numberof smal files and directories that canbe stored within a = file system. a > JFS2 dynamically allocates space for inodes as needed and frees the space when it ’ no Tonger required. ee 3 H Allocation Group Size A Itis used to increase the efficiency of the file system. Y Groupings of related inodes-and disk blocks, oe - “Irediices the phiysicat action required by the drive heads when 1/6 operations are performed. > ‘The inodes with the corresponding data blocks are further grouped in logical units AS of 8, 16, 32, 64MB. go Default value is 16MB- ‘The allowable sets of NBPI values are also dependent on the Allocation Group iS Se. =) ( . ; So 26 4 ne) bey § . she (ound “Ha Clenye The -MeUHE pT ifs -v upB-t NBPI Pe NBPI -v ib 512,1024,2048,4096,8192,16384 tals cv in : 1024.2048,4096,8192, 16384,32768 Clase SIRE = EA SH 2048,4096,8192,16384,32768,65536 fae sat IST £4096,8192,16384,:2768,65536,13:072 _\ Cm Cifs- ov SiR> SOOM ys JES Vs JFS2 File Systems eowkebenp) chs =o Ig [et a ra) > Maximum File Size GB Chis =A [gh (Rates > Maximum FS size 1TB IPB Fi Pe Inode size 128 bytes y SI2bytes CHES =a aco is ob Ai i : ~ eemeeut aveowh CG Number of inodes Fixed atbréation Dynamic eee = Compression Yes Now wae 1 Us 4 File and File System Sizes ew germ seer . cots vba guy oe TET 4 Maximum individual Fite Size limits : eo ~ AIX version 4.1 (IFS) 2GB crfs -v Jf -d faow/Wod — ot 18 ‘3 AIX version 4.2 and later (JFS) + 64GB _ 7 AIX version 5 (JFS2) 1TB cents Fs = : vets or SES. FS File System Limit Calculation Ve dD JES File System Limit Caleulatio ke ~ | sits : Maximum file system size limit in bytes = fragment size * 2 power 28 ee 16 Maximum file system size limit in bytes = nbpi * 2 power 24 fou -¥ W/V 2 power 28 = Max itumber of inodes that a file system can have = 16MB ae dev |UD 2 power 24 = Max number of fragments that a file system can have =256MB **¢ Compressed File Systems a JPS supports fragmented and compressed filesystems. Both types of file systems save disk Space by allowing a Togical block to be stored on the disk in units or fragments, smaller than the full block size of 4096 bytes. Data compression allows all logical blocks of any sized file to be stored as one or more contiguous fragments, Note: JFS2 does not support file system compression. Note: The /(root) file system must not be compressed. Compression of the /usr file system is not recommended. In order to perform data compression, 50 CPU cycles per byte are required and about 10 CPU cycles per Uj for decompression. It places a load on the processor by increasing the number of processor cycles. “~~~ a) : \Large File Enabled File Systems 1%) ( » AIX V42 FS support large file enabled file systems Only file systems enabled i for large files can support files with a size greater than 2 GB. Ane Ble ch 4g 8- Ina file system enabled for large files, the data stored before the 4MB file offset is allocated in 4096 bye blocks. File data stored beyond the 4MB file offset is allocated with large disk blocks of 128 KB in size. The large disk blocks are actually 32 contiguous 4096 byte blocks. In the example above, a 132 MB file in a file system enabled for large files hes 1024 4 KB disk blocks and 1024 128KB disk blocks for a total of 2048 blocks, Itis not necessary to use large enabled file systems in JFS2, since large file and file system support is built in by default Journal Log AIX memory maps files in curent use. Any writes to files are done first in memory and at a later stage are written out to disk when the syne system call runs every minute The jfSlog (/dev/hd8) is a circular low. It is ereated the size of one PP. one per ach volume group. The jfslog ensures file system,intverity by writing all metadata information to the jfsfog immediately. File svstem metadata consists of changes to the “HRUCIUFE SEIT Such as changes To the inodes and the free list. When tha data is written out todisk a'syne point is indicated-in the log and new transactions are written from that point forward Note: No journaling of data blocks, only journals inode information (and indirect block information) LoghV Every VG will have a logly. This loglv is used whenever we are reading or writing in any one of the file systems in VG. It is first going to write the metadata information in the logly and then it applies to file system. This helps in recovering the file system when it is created. Bxamples: You can list the file systems that are defined using the Isfs command Asfs Listall logical volumes by volume group flsvg -I rootvg, smitty f Listing File systems ish Listing all mounted-file systems mount Toremove a JES smitty rmfs——— Using the df command The af displays information abont total space and available space on a file system. ‘ant command to be aware of and use frequently. If you run out of space ia ile system (especially / or /tmp), system corruption could occur. df 28 the skulker. command ‘The skulker command cleans up file systems by removing unwanted or obsolete files. It removes old qdir files, files in /var/tmp, files in /imp older than 24 hours, * bak, ‘aout, core, proof, galley, ed hup files that are more than one day, files tha! are leit in the ‘mail queucs. Skulker is normally invoked daily by the cron command as pertt#xhe root's erontab file Using du command ‘The du command éan be used to list the number of blocks used by a directory. There may bé a number of filed OF users that are causing the incr ‘particular file system2The du command will help to determine the cause. #da /home | sort —t— The~x option is very useful. When using du ~ax, the report will only show inlormatioit™ fiom the specified file system Defragmenting 9 File System ‘The defragfs commarid increases a file systems contiguous free space if you “want perform this action the file systenr'must be mounted, Some of the information that is returned with the defragfs command is. + Number of Fragments Moved + Number of Logical Blocks Moved ‘= ‘Number of Allccation Attempts, + Number of Exact Matches #/usr/sbin/defragfs { -q | -r ] filesystem Verify a File System A file system can be verified using the fsek {file system check) commiaril This check consists of a number of stages, including: + Check the journal log for errors # Check the blocks'to ensure that each block is either allocated to a single ‘ile or is inthe free list Check file sizes Check directory entries Checks inodes, indirect blocks, data blcks, free lis ‘The -p option is used to check a file system making only minor changes withow bothering the user. The fsck command also executes each time the system boots up (From the letc/te file). Examples: 4 feck -y Mdevihd File ss #fsck -y Idevind npranedealiy I ws es facade 49.8) . eae >. Bockts 0 Sites ay (fs : Be wy 1 Pp Googe Cees Chapter 9 Paging Space 1cess to be actively running, it must be loaded into memery. When it is loaded into mémory, 115 assigned a Runiber OTAKB aveas caliéd page Trames. As more processes ere loaded into memory, ‘memory may may become full, When memory is full, memory is scanned to locate those page frames that are Least Recently Used. (LR). When one is located, a 4 KB block or “page” of disk space is allocated and the data from The Page Trae 18 moved to disk. This area on disk is called paghig space- TE pouingspese, 1 called a swap space, fs Togical volume with the rtibute type eqial fo paging. This type of logical voliime is referred to as a paging space logical a ‘space. When the amount of free real memory in the system is Tow, programs OF data Tat fave not been used recently are moved from real memory to paging space to release real memory for other activities. The paging space is a.ggaenved area on disk that can contain data that resided in memory but was inactive and was moved to make room for processes that are active. Ifa ipaged-out” process is needed in memory again, the page is retrieved and brought back into memory or “paged-in’ CC — Memory Manager (VMM). Note: lis very important to remember that paging is a temporary holdi inactive pages. Its n6t a ing area for stitute for real memory. If'your machine has many active I require all the active processes. If you run out of memory, your machine will reach « constant state of paging called “thrashing”. Increasing the amount of paging space when your machine is thrashing will not solve the problem. Thrashing is result of not enough real memory. ‘The installation crestes a default paging logical volume (hd6) on drive hdisk0, also referred as primary paging space. Paging space standards are + Paging space can use no less than 16 MB, except for ha6. In AIX Version 4.2.1 hhd6 can use no less than 32 MB, and in AIX Version 4.3 and later, no less than 64 MB Paging space can use no more than 20% of the total disk space. + Ifrea! memory is less than 256 MB, paging space is two times real memor ny, 4g? real memory is grester than or equal 256 MB, paging space is $12 MB. ‘Total paging space = 512 MB + (memory size -256 MB) * 1.25 Placement and size of your paging space will impact its performance. The following are tips for paging space. * Do not have more that one paging space per disk Paging spaces should be roughly ha same size. de? Do not extend a paging space to span multiple physical volumes. 30 ww 3 J euee wt o Examples: To display pagin Hisps-a-e Colom, tw Aspe —a ~ Hisps -s_ summet 7 Alsattr -E] sys0) a realmem Note: The file etc/swapspaces contains a list of the paging space areas that will be _Aclivated at system startup. =a ei Ba 149 reve * Yo add extra paging space volumes tothe system Powe —> Bes pes smitty mkps eK Ss 5 Subevy cela KAY oo Pogergsmucn sane — Note: When a paging space is edate, the lie Vovgeces he es ne ‘also > updated if ne if needed, To change characteristics of a paging space ‘smitty chps Note: The primary paging space (hd) can’t be decreased below 32 MB. To dynamically deactivating a paging space in AIX 3.1 féswapoff /dev/paging00 ‘To activate all paging spaces defined in /ete/swapspaces #swapon a Note: This command is run in etc/re at system startup. To decrease the size of paging00 by 2 PP’s Hchps —d 2 paging00 Jo increare the S40 of fogingoo by 2Pr's aE hPS -3 9 Paxinos . i eM pesphy Sea es os i Mw anu x me Py Ipale hag Chps- ov Y¥ pasphy oo Jo “Wan ow me Pen spate PRYRZOD. chps- a4 PAyyD Jo ru thh Tee pry fparle Pron a Drties te rr Hoe Ok PL Mt LP aire Te size Ob pd iM uuP blows p and achste > clays - Su paymy oD” Te -chps— du PMP TP mec toe 2 oto ee ol Eee Sivg 0} Yu ae spate 31 To aumove THE paying SP 3 ow ad weeps pay o Female ot SSI Me Jere soersee ad, fle, Suapom -~ Oe rps avetiehle soup sree FOR OD, Garnoma Liter [BORATACT 0 ) w~weuuwubvuvus Chapter 10 AIX Software Installation and Maintenance Packaging Definitions: Filesets: A fileset is the t installable base unit for AIX us O/S. Fileset includes all files that make a complete product. Iris available in Example: bos.netnfsclient Fackages: Its group of separately installable filesets that provide set of related functions, Example: bes.net Licensed Program Product (LPP): including all packages associated wi tis a complete software product collection license program. Example: bog Bundles: A bund] jon of packages and filesets suited for a particular ‘environment. For Example, if you are developing applications, the App-Dev bundle would be the logical choice to install = Note; The bundles available may vary ftom.configuration to configuration. Predefined system bundles in AIX include: App-Dev, CDE; GNOME, KDE, Netscape, devices ete + Default bundles used for the system are in /ust/sys/inst daté/sys-bundles User created bundles are stored in /usr/sys/inst dataluser-bundles Filesets follo-v a standard naming convention. The LPP name will be the first part of every fileset name. LPP . Package . Fileset . Suffix for ex: bos.net.nfs.client PTF and APAR: ‘Program Temporary Fix (PTF): It is an updated fileset / new fileset that fixes previous “system problem. PTFs are installed in the same way as regular filesets by the use of the installp command. ‘Autiiorize Program Analysis Report (APAR): It i8 an emergency fix or entry fix to a unig prolen o h ystem, APARS wil sent eee PTFS ale sand ~ verification. APARs are applied to the system through the use of the instfix command Note: Fileset update / update packagé contains a médification toan existing fileset. ‘Software Updates =< ‘As new software is created for AIX, you will want to upgrade your system to ‘maintain the lates features and functionality. The numerical information that shows what fevel of software you currently have installed is broken into 4 parts: Version, Release, Modifiextion, and Fix. You can see this using the command oslevel. 7 #Hoslevel Versign . Release . Modification . Fix 3 3 0 3 Re SOHLMN AREAAMAE GL RANA coe To see current Maintenance level #oslevel —r Note: Version and Release upgrades must he purchased. Modification and fix-level upgrade ave available at no charge y, Note: ina month, we have a Maintenance fovel (ML), where we apply, Technology Level (TL), Service Pack, Emergency Fixes APAR, For any emergency problem, we raise change order, we apply an APARVTL. Service pack. These change otders has to be approved by customers on every month of 3" Saturday or Sunday (depending on the situation). IBM provides a number,of mirrored anonymous fip servers for FixDist support: Fixdist.aix.can.jbm.com 204.138.188.126 Mx00d4e0.nyc.ibm.com 304.146.172.212 ~ Fixdist_yamato.ibm.co,jp 203.141.89.41 . 194.196.0.2 Service boulder ibm.com 207.25.253.26 ‘The procedure to download FixDist to a usc:'s system is listed below: Step: ed /tmp Step2: Get the fixdist tool and postseript use: guide ip 202.25.253.26 login: anonymous yrssword: your email address tin cd hixtoolsiggig., ore @ petidiar ZT ERD tool in compressed sar format) agekfindist ps2 (user guide in compressed PstSerit) uit Step3: Install the FixDist tool: car ‘Zeat Itmp/fi.tar-Z | tar—Rpvt Step4: To-start FixDist: fixdist Fixdistalso includes @ companion tool calle’ T'apeGen, which allows you to create a stacked tape containing SMIT installable files. », Installing Software: Software are applied in 2 states 1. Applied -- can be roll backed 2. Committed - can’t be rolled back B Previews - Just aeiplos . 3 > oe @ Go »@@OGOGe When software on applied state, previous version is stored in /uisr/Ipp/package_name, It is alviays advisable to upply software in applied state until it is thoroughly tested. If it works as expected, then you can commit the software which will remove the old version from. the disk. If the new version is causing a problem, you can reject it which will newer version and recomimit the old version, If we use instalip command, the tog of installation can be in !var/adm/swlinstallp.sunmery. ove the Note: Always make surefhat there is enough’space in /usr file system, because /usrisa repository for software. 5 Using the installp commana ‘The installp command is used to install and update software. record of the installp output can be found in / yt sw nstallp, mary. * To install all filesets within the bos.net software package in /ust/sys/inst.images directory in the applied state #instalip -avX -d /usr/sys/inst images bos.net To preview an install of alt ilesets with in the bos.net software package in Jusrisys/inst images directory in the committed state # installp ~aepX ~d /ust/s9s/inst.images bos.net Note: Here we have to check the needed space and free space. ‘To commit ail updates #installp -oBX all or smitty install_commit To reject a service update that you have installed smitty install_reject You'can remove installed and committed software smitty install_temove Cleaning up after faited installations fan installation fails, installp will not be able to install the same software until you have removed hose files that succeeded in installing prior to the failure. To remove all the files installed in the failed installation Ainstallp -C Listing Maintenance level of software We use IsIpp command to display information about installed filesets. ‘slp -1 —- displays name, recent level, state and description of specified fileset. -f ---name of files associated with fileset -h--- displays installation history information Displaying and updating installed software to the latest level: Displaying an individual fix (instfix command) In order to determine if'a fix is installed on your system or to install a fix. Use the instfix €mmand. The instfix command allows you to install a fix or set of fixes without 34 5 sean - a «Dpada< por au CO oout* Cwe knowing any information other than the Authorized Program Analysis (APAR) number or other unique keywords that identify the fix. A fix can have a single fileset or multiple A filesets, Fix information is organized in the Table of Contents (TOC) on the istaliation ~ installed, fix information is kept on the system in a fix database. a To list fixes those are on a CD-ROM in /devied id ‘#instfix -T —d /dev/ed 1X75893 S 2 To determine if APAR 1X75893 is installed on the system, instfix ~ik IX75893 Not all filesets for 1X75893 ' a To examine information about APAR X75893 and what it does : stfix ~aik IX75893 To list what maintenance level have been installed on your system with the instfix As command oe iinstfix -1 | grep ML. All filesets for AIX43ML were found. ~ Ainstfix ~k 1X75893 ~d /dev/ed0 To determine what fixes are installed on your system Installing an individual fix by APAR To instal the fixes using SMIT smitty instfix or smitty update_by_fix The system will update the maintenance level of the fileset you selected and upon completion you will have successfully updated the maintenance level of your séfiware. Updating all filesets to the latest level a To install all new fixes those are available through [BM . ‘smitty update_al To view the new maintenance level of your software Alsipp—1 Creating installation images on a hard disk Installable image files can be copied to a hard disk for use in future installations. ‘These image files will be copied from your installation media (tape or diskette) to a directory on the disk, so that they may be installed later using the disk directory as the input device. These files will be copied to the directory named /usr/sys/inst.images and she /use/sys/inst images/.toc file is updated Fo: ute inline ie orf megs rectory inthe INBLIT device / directory for software field. If for some reason your toc file becomes corrupted, You wil receive an error either in SMIT or the command line, Error message Tike 0503-005 The format of .toc file is invalid 35 tbh hls ec @ SG wow oe ee oeée la this case, simply use the inutoc /usr/sys/ins toe file, — images/.toc commani to recreate your ‘fo create installation image on your hard disk smitty bffereate Downloading fixes using FixDist Too! TBM provides a site on the internet where you may freely download AIX-related fixes. The current anonymous FTP server is service.software.ibm.com. To help customers. browse, and download fixes stored at the fix sites, IBM has released a freely available service tool called FixDist Stepl: fixdist Step2: Select Generally Available Fixes to list what updates are availabie from IBM Step3: Select the updates you want to apply to your system by clicking on the name of the updatelfix. Step4: After you have selected the updates you want, you have the option to preview ‘what will be download, the estimated size of the images that will be downloaded and other features. It is a good practice to download all your fixes into one file system. Verify integrity of OS #ippchk command is used to verify insttaled software on your system. 36 hapter 11 Security and User Administration User Accounts + Each user has a unique name, user ID and password. ae © The security of the system is based on a user being assigned a unique name, User ID (UID) and password. + File ownership is determined by'a numeric user ID. + The owner is usually the user who created the file, but ownership can be transferred by root, There are several user accounts automatically created, For exampie, root. Some user accounts are not made for login but only to own certain files. For example, adm, sys and bin. . ae 7 Groups + A.gronp isa set of users, all of whom need access 10 a given set of files + Every user is a member of a: least one group and can be a member of several Broups + The user has access to files in their groupset. + To list the groupset use groups. + The user's primary group is used for file ownership on creation, To change the primary group use the newgrp. + Defaule groups __-. “System administrators -Staff ordinary users The system group is root’s group and the staff group is forall ordinary users. There are 3 types of groups on the system User groups Users groups should be made for people who need to share files on the system, such as people who work in the same department, or people who are working on the same project. System Administrator Groups System administrators are automatically members of the system group. Membership of this group allows the administrators to perform some of the system tasks without having to be the root user. System Defined Groups Several system defined groups exist. Staff is the default group for all non-administrative users created in the system. Security is another system defined group having limited privileges for performing security administration. The system defined groups are used to control certain subsystems, 37 1 ay Common groups on the system are & ( System’ For most configuration and standard hardware and software maintenance, 6 Printg;-- For managing queuing. e Security ~ To handle most passwords and limiis control. Adi ~ Most monitoring functions such as performance, eron, accountin - : Staff — Default group assigned to all new users. ; Audit — For auditors. fa Shutdown'— Allows use of the shutdown command e io User Hierarchy a a 4 : + To protect important users/groups from members of the security group AIX has c admin users and admin groups. 6: +. Only root can add/reinovelchange an admin user or admin group. . + Ally user on the system can be defined as an admin user. Q o Note: System administrators should always login as themselves first and then sw to root instead of logging as root. This helps provide ad audit trail for root usage. - Note: Do not include unsecured directories in root's PATH. : . Security Logs & u iwarladm/sulog Andit rail of su activity & Nasladmivstmap log of successful logins € Jetehutmp list of users currently logged in i Oo fetc/security/failedlogin Information on fail Iegin attempts ‘ i Last root displays all the recorded logins and logoff by the user root. y | 9 Last reboot displays the time between reboots of the system, 1.0 File(Directory Permissions : ' @ There are a number of permission bits associated with files and directories. The standard ‘ read, write and execute permissions define three levels of access for the user, group and ‘ Q cthers. In addition there are 3 permission bits known as SUID (Set UID), SGID (Set 4 . GID) and SVTX (sticy bit). ¢ . “SUID? SUID ‘it ain’ exEERADIE Te ngs that whe the file runs; the process runs with ~ e ' @. an effective SUID of theowner of the file. SUID has no meaning ona directory. i> : we an) Note: SUID is not supported on shell seripts. e I | @ SGID: SGID on an executable file means that when the file runs, the process runs with « i an effeetiye GUID of the group owner of the file, SGID on a directory means that any = | .@.— ‘ (6 s i 3 i e . 38 4 | GO | ¢ | 3 ’ Qs D oe oy TY oa ’ + op » a ag fileidirectory created within the directory will have the same group ownership as the directory rather than the primary group of the user. SVIX: SVTX ona file has no meaning in AIX, SVTX on a dizectory means that ever if the directory has global write permission (for Ex: /tinp), users can't delete @ file within it unless they cither own the file or the directory. . Examp) ls -IdTusr/bin/passwd /ust/bin/crontab /tmp | Sra Toot security... Ats/bin/passwd T-SI-S-X root cron. Just/bin/ctontab et drwxrwxrwt bin bin - /tmp To set the additional permission bits ichmod 4777 file] SUID ‘chmod 2777 filel SGID: chmod 1777 isl SVTX Umask + The umask governs permissions on’new files and directories. ‘© System default umask is 022. A umask of 027 is recommended. + The umask is specified in /ete/security/user file. Changing Ownership The chown command can be used by the root to change the ownership on a file. The chgrp command is used to change the group ownership of a file chown kishore file! chgxp staff file! chown kishore:staff file] Examples: To view the Security and Users menu smitty secur To view the Users menu smitty users ~ To list the attiibiités of all users 2 #isuser ~a or ALL: To display all the attributes of user kishore isuser kishore ‘To-create the smith account with smith as an administrator ‘imkuser-a smith To create the smith user account and set the su attribute to a value of false, Amkuser su=false smith 39 To create a user account with the default values in the /usr/lib/security/mkuser default ‘#mkuser smith smitty mkuser Note: If the user 1D iy not specified, then a default ID number is chosen from the Jetc/security/ ids file. A administrative users are given IDs starting from 6 and users star 0 normal To change the user password #passwd : smitty passwd “et To change attributes for the user smitty chuser Note: Do not use the chuser command if you have a Network Information Service (NIS) database installed on your system. ‘To remove a user account ‘#rmuser ~p smith Note: The user's home directory is not deleted, therefore you must manually clean up the user directories. The -p option will remove authentication informnation from the Jetclsecurity!* files. To view the groups menu ‘smitty groups To list all groups on the system #isgroup ALL To create a new group smitty mkgroup To change the characteristics of a group smitty chgroup To remove a group Hsmitty rmgroup Regaining root's Password - Steps ~~ se BoorfromCD-ROM or a bootable tape” ~ * Select option 3 from the installation and maintenance menu * Activate the rootvg and obtain a shell + Execute the passwd command to change root’s passwd © Run the command #syne; syne + Reboor the system se Note: syne command ensures the memory buffer is written to disk 40 Message of the Day 4 The file ete/motd contains text thet sill be displayed every time a user loge in. This file -- should only contain information tiecessary for the users to see. Ban Security Files ‘etedpasswa Contains the basic attributes of users. - Jetclsecurity/passwd --- Contains the password information. ,+ = Jetclseeurity/user Contains extended attributes for users. Like admin, rlogin, login, su, maxage ete. fetelgroup Contains the basic attributes of groups. fetclsecurity/group --- Contains the extended attributes of groups. Ielclseewit¥/environ ~~! Contains the environment attributes for users, os Vetc/scewrty/lastlog --~ Contains the last login attributes for users, Like time _last_login, unsuccessful_login_count ete Fetclseeurity/imits te/seeurity/login.cfig ~ Contains processlimits for users. - Contains configuration information for login and user authentication (login settings). JusrMiblsecurity'mkuser.default --- Contains the default attributes for new users. usr/iblsecurity/mkuser sys —- Customizes new user accounts, Jetclenvironment ~ Specifies the basic environment for all processes. fetciprofile - Specifies additional environment settings for all users. SHOMEL profile - Specifies environment settings for specific user needs. playing currently logged users ? To display information about all the users who logged on to the system. who nm To display your user name who am 1 RR eT display the run-level of the system ~ #who + Preventing user logins u If the/etc/noiogin file exit, the system accepts the user’s name and password, 2 . prevents the user from logging in and display the contents of the /ete/nologin file. You can alse allow users to log in again by deleting the file. a Changing a user’s login shell and shell prompt ‘The chsh command changes a users login shell attribute. This attribute is, specified in the /ete/password file. 41 SSP vow i b i pGoeooas You can change any of your prompt characters by changing the value of its shell variable PSI. PSI Prompt used as the normal system variables. PS2’, Prompt used when the shel! expects more input. PS3_ Promptused when you have root authority. Enabling and disabling desktop autostart smitty dtconfig or dtcontig ~e smitty dtconfig or dtconfig -d 2 9 co co « 2 a Pe 9 we ‘© Chapter 12 Scheduling ‘Cron Daemon {Is s sespnsthle for running scheduled jobs. The system process thal allows baich jobs to be executed on a timed basis is the cron daemon, cron is usually started at system, ‘startup by ete/inittab. It runs constanily as a daemon. If killed, eis autom: re (because oF Fespawn parameter in inittab fle) Jobs are submitted to the cron daemon a number of different ways. ¥ crontab command events (regularly scheduled jobs) Yat command events (one time only execution at specified time) Y batch command events (run when CPU load is low) The at and batch facilities are used to submit a job for one-time execution, crontab files ae used to execute jobs periodically ~ hou “weekly. Crontab files (fhe cron daemon starts processes a specified times, that is used to star revlarly occurring jobs. Schedule is defined in /var/spooVcron/crontabs/SUSER file. Files to controi users crontab privileges, Wwarladmjeron‘eron.deny — list user who can’t use erontab Wvarladm/eron/eron.allow ~~ jist user who can use erontab All users by default have the privilege to set up scheduled jobs to be monitored by cron If your name exits in eron.deny, you will not be able to use cron. If your name exists in cron.deny and cron.allow, you will be allowed to use eron, because cron.allow has precedence (preference) than cron.deny. Crontab Fi ‘The crontab file can be view by using crontab -1 command, Each user will have their own crontab file located in /var/spooV/cron/crontab/SUSER. ‘The syntax for the lines in crontab file Minute (0-59) - Hour (0-23) Date of the month (1-31) Moiithi of ihe year (I-12) = | Day of the week (0-6, where O=Sunday, 1=Monday, etc.) Examples: ‘To start the backup command at midnight, Monday, through Friday: 00 * * 1-5 backup -0—u-f /devirmtO Toexecute'a script] every 15 minutes between 8 AM and 5 PM, Monday through Friday 0,15,30,45 8-17 * * 1-5 Jhome/teamO1/script! ww o oS i { i »e@eeesee Editing crontab To schedule a job, you must create a crontab file. The ¢ron daemon keeps the crontab files in memery so you cannot update the cron entries by just modifying the file on disk To edit crontab file Herontab -e Safer Method ¥crontab—t > /Amp/erontmp 2vi /tmpferontmp #erontab /tmp/crontmp To remove your current crontab file cromab -r ‘Theat and batch commands: The at cormand runs a unique occusting job for eron to process. The command at can only be used by root unless one of the following file exitsr + varladm/cron/at.deny: if this file exits, anybody can use at except those listed in it. An empty atdeny file exists by default ivarladm/crowat.allow: if this file exits, only users listed can use at (soot included) Examples: Hat now +2 mins banner hello > /devitty3 setrl-d> Hatch banner hello > /devitty3 7 To list at jobs Hat—| (user) or atq (user) To cancel a job at -1 job or atrm [fob | user] De) 2 Go t > oO & ay o geeoour ih ea apter 13 Network Administration TCPAP stands for ‘Frafismission Control Protocol/Internet Protocol. These are the names of the two most important protocols. ‘TCP/IP is a networking architecture, which defines a mechanism for cooperatinis® computers connected by some sort of network to exchange dats, TCP/IP is aset of © protocols, which define various aspects of how two computers on a network may communicate with each other. ‘There are many applications that'Fetuire or can take advantage of TCPAP. The ones. fisted are available from TBM either as standard or as licensed program products. There are mony third-party applications (for example databases) that can also use TCP/IP for distributed work E Network File System (NFS) allows access of remote files as if they were local. © Network Information Services (NIS) provides a distributed database of system information. Domain Name Service (DNS) provides server support to keep track of host names and addresses in the network. * Dynamic Host Configuration Protocel (DHCP) allows a host to dynamically in a TCP/IP address from a server in the network, Network Computing System (NCS) allows applications to be written to run procedures on other systems ina network. Distributed Computing Environment (DCE) provides a rich set of facilities for developing and running distributed applications. 1c is based on NCS with many other services inchiding Security Service, Directory Service, Time Service and management tgals, X Windows /AIX Windows provide a distributed graphical user interface, Tivoli Netview for AIX provides a sophisticated set of management tools for ICPAP networks. It uses the AIXWindows environment to provide a graphical user interface for the network manager and uses Simple Network Management ~ Protocol (SNMP) to pass managemient information around the network. ‘+ Network support is also available on WebSM. formation Needed to configure TCP/P: Addresses . a Each adapter is given a unique TCP/IP address and often a subnet mask. These are usually assigned by network administrator. Names Each Machine has a unique hostname. Each machine must have access to a table of name to address translations. This can be either /ete/hosts file or Domain Name Server. Rovtes In order to communicate with systems in other networks, you may need to find the address of the default gateway. 45 | ©¢eeo6eéo Geeosese ‘There are two separate mechanisms defined for name resolution; Flat Network » Each host in the network has a record of the rame ané address of every other host it will communicate with. This is in a text file called /ete/hosts. This is quick but becomes difficult to administer if there are a large number of hosts. Domain Network (Doniain Name System) + Hosts are grouped together into domains, which form a hierarchy (similar to the file directory structure). One (or more) hosts in a domain (called nameservers) have a record of the name and address of all hosts. Client hosts request name to address translations from @ nameserver, Use the /ete/resolv.conf file. IETWORK DEVICES AND INTERFACES TCP/IP opgrates over different network adapters. AIX 5L supports IP over Token Ring, Ethemet, EtherChannel, FDDI, ATM, and serial link. For each of the network adapters, there is a corresponding network interface automatically created tor it, except in the case of ATM To display existing network interfaces in an AIX system, use the following command: #isdev -Ce if ‘TCPAP SUBSYSTEMS TCP/IP daemons run as subsystems under AIX. This means that they are under the control of the system resource controller (SRC). Daemons controlled by the master ‘TCPAP daemon inetd, like ftpd, are known as subservers. Subservers are enabled in the Jete/inetd.conf file and started as needed by inetd. All the subsystems associated with the ‘TCPAP group should be started from the ete/re.tepip script. Most of the daemons that can be initialized by the re.tcpip script file are specific to TCPAP. These daemons are inetd, gated, routed, named, timed and rwhod. Note: Running the gated and routed daemons at the same time on a host may cause unpredictable results. ~ Note: The script /ete/tep.clean can be used to stop TCP/IP daemons. The script /ete/tep.clean does not stop the portmap and nfsd daemons « The following are some helpful SRC commands: # Issre ~T List all the inetd subservers #ssre~t fip List the status of the ftp subserver # Issre ~g tepip List all the TCP/IP subsystems # stopsre -g tepip Stop all the TCP/IP subsystems # starisigs inetd Start the subsystems one by one # refresh inetd Makes the daemon read configuration files 46 Foor - ribey oxstsuted batho, talent ing re.tepip Connections using TCP/IP are often peer-to-peer. There are no master/slave relations. The applications, however, use a client/server model for commnications, Resnoving the re.tepip entry in /etefinittab means that you are ngt starting any server applications during IPL. Without the server applications started, yorFVill not be able to telnet or ftp to this machine from another host Note: If you have @ graphic consolé, make sure you also remove the re.dt and re.tepip entries in the /etefinittab file ‘The intd daemon ‘The /usr/sbin/inetd daemon provides internet service management for a network. ‘The inetd daemon reads its configuration information from the /ete/inetd.céfff file, The etefinetd.cont file can be updated by using SMIT, the System Resource Controller (SRC), or by editing the /etesinetd.conf. The TCP/IP subsystem is normally started at system boot via an entry in fete inittab. The Jetc/re.net and /ete/re.tepip configuration files contain entries to enable the network interface, set the host name, set the default route, start inetd, and so on. If you do ‘not want to start certain TCP/IP subsystems, comment out the entries for the subsystem in fetclre.tepip. Note: If you change the /etclinetd.conf using SMIT, then the inetd daemon will be refreshed dutomatically and will read the new /etc/inetd.conf file. If you change the file -using an editor, run the refresh ~s inetd or kill -1 InetaID commands to inform the inetd daemon of the changes to its configuration file. Subservers controlled by inetd: ‘The inetd daemon is a subsystem is a subsystem that controls the other daemons (subservers). The fipd, logind, rexeed, rshd,talkd, telnetd, and wuepd daemos are started by default. The ttpd, fingerd, and comsat daemons are not started by default ‘You can check the details of subservers started in inetd Alssre —Is inetd — ‘The /ete/services file: ‘The /ete/services file contains information about the known services used in the DARPA intemet network by inetd, Each service listed in /ete/services runs on a specific port number for communications, in a specific format, such as TCP or UDP. Note: If you edit the /ete/services file, run the refresh -s inetd command, in order for ‘your changes to be used. 7 o pOSeGOGOGCEEGSD _ The ifconfig command Stopping inetd: Use the command stopsrc ~s inetd to stop the inetd daemon, stopsre —s inetd ‘When the inetd daemon is stopped, the previously started subseiver affected. However, new service requests for the subservers can no longer be satisfied. If ‘you try to telnet or fip to the server with inetd dow, you will get some error messages, ‘The portmap daemon The porimap daemon converts remote procedure eall (RPC) progsam nambers into internet port numbers. ‘When an RPC server starts up, it registers with the portmap daemon. The server tells the daemon which port number itis listening to and which RPC program numbers it serves. ‘Thus, the portmap daggaon-knows the location of every registered port on the host and. which programs are available on each of these ports. ~ ‘Aclient consults the portmap daemon only once for each program the client tries to call. ‘The portmap daemon tells the client which port to send the call to, The client stores this information for future reference, Since standard RPC servers are normally started by the inetd daemon, the portmap daemon must be started before the inetd daemon is invoked. Note: Ifthe ortmap daemon is stoped of comes to an abnormal end, all RPC servers on the host mut be restarted. ‘The nfsd is a common RPC server. Examples: ‘Toconfigure a network adapter using SMIT smitty tepip smitty mktepip Changing IP Address Using SMIT smitty configtcp The ifconfig command can allow you to configure and modify properties of network interfaces directly, without the use of SMIT. Examples: : To ist ofall network interfaces on the system that have IP addresses assigned and are actively being used by the system: ifconfig -a To get information about one specific network interface, including state, Ip address and netmask ifconfig end To activate a network interface ifconfig end up 48 o PANY € eat « o ie ad err wo > a we To activate a network interface, such as en0 and assign it an IP address #ifconfig en0 192.168.1.2 up To activate a network interface, such as en0, assign it an IP address and netmask Hifeconfig en0 192.168.1.2 netmask 295,255.255.0 up To deactivate the network interface ifconfig end down Note: This command does not remove any IP address assigned to the interface from the system, To remove a network address from an interface Hifeonfig enO'delete To remove an interface from the network inte from the system, ifconfig en0 detach = To ereate an IP alias for a network interface ifconfig en0 10.1.1.10 netmask 255.255.255.0 alias ‘When this alias is no longer required, you can remove it Hifconfig en0 10.1.1.10 netmask 255.255.255.0 delete face list, the interface must be detached, Using the entstat command It shows Ethernet device driver and device statistics. It tells the information like device type, hardware address, number of packets send, number of packets receive, transmit and receive errors, number of bytes send and receive ete. To display the device generic statistics for entO Hentstat entO To display the Ethernet device generic statistics and the Ethemet device specific statisties for entO Hentstat ~d entO ‘Using the netstat command it shows network status To display routing table inforination for an internet interface netstat -r -f inet To display interface information for an Internet interface netstat =i =f inet aaa Note: A splat (*) after the interface name in the output from the netstat command indicates that the interface is down To display statistics for each protocol netstat ~s —f inet ‘To show the content of your local routing table using IP addresses #netstat nr 49 Using the traceroute command ‘ : If you cannot reach a host that is in a different network, you can check the ‘ connection using the traceroute command. Tac traceronte commer output shows each ~ 7 gateway that the packet traverses on its way to finding the target host. If possible, t examine the routing tables of the last machine shown in the traceroute output to check if a route exists to the destination from that host. The last machine shown is where the . routing is incorrectly set. 5 7 traceroute 192.168.2.2 ‘ oy ans ae 5 : ‘ : Q CG A 5 9 ( oO S ‘ 9 9 “ om oO 2 ‘ 9 e 3 . 9 8 < ° ® 3 : . . 50 o ad : oO ie 7 & \o vue & & wvwu” owe ow gerd oo we Chapter 14 Network File system (NFS) [NFS is basically used for sharing resources across network i.e, a distributed file system that allows users to access files and directories of remote servers. Note: NFS is independent of machine types, O/S’s and Network architegtares, Y¥ Itisa product of Sun Microsystem. ~ Y_ NFS versions are 2.00, 3.0 and latest 4.0 Y Version 2.0 used to be based on UDP where as 3.0 onwards it uses UDP/TCP both. An NFS server is stateless ie. an NFS server does not have to remember any transaction information about its client. In real time, the main purpose of NFS is to share resources. For example you dump your upgrade for software in one server and,export the resource to all other server, which is client to NFS. aoa . v Advantages of 1. Software sharing 2. Centralized Administration 3. Easy to use 4. Use by all venders of UNIX Installation and Configuration of NFS Server Stepl: Start the NF: emai for ‘each system (either server or client) fdas M onan aS Note: The NFS, daemons, by default are not started on a newly installed system. Step2: Start the NFS daemons using SRC Astartsre ~s nfsd_ (Individually) or fistaisre ~g nfs_(all at once) ‘Step3: Verify that NFS is already running on servers. ‘issre ~g nfs Subsystem — Group PID Status biod nfs 15740 active nfsd nis 11379 active rpe.mountd nf 15614 active rpestatd fs > ler active rpelockd nfs 15496 active Note: If the /ete/exports file does not exit, the mfsd and rpe.mountd daemons will not be started. Using touch command, you can create an empty /etc/exports. Step4: Exporting an NFS directory using SMIT #smitty mknfsexp Note: SMIT updates the /etc/exports file. If/ete/exports file does not exit, it will be created, ist/sbinlexportis ~a (exporting mechanism done here) Step5: Verify that all file systems have been exported properly #showmouni—e AIX (AIX! -~ Server hostname) st i iF >Goeeoocecoeoooeoosd Installation and Configuration of NFS Client Steps: 1. Check nfs client daemon and portmap running 2, Amount AIX /sapeata /sapt 3, iP ‘The major services provided by NFS are rpe-mountd daemon: From the /Jusr/sbin/rpe.mountd daemon on the server and the /usr/sbin/mount command on the efent side. The mountd daemon is Remote Procedure Cal! (RPC) that answers a client request to mount a file system. The mountd daemon finds out which file systems are available by reading the /ete/xtab file. In addition, the mountd daemon ‘provides a Tist T currently mounted file systems and the clients on which they are mounted. nfsd daemon: ~ From the /usr/sbin/mfsd daemon on the server and the /usr/sbin/bied command on the client side. Handles client requests for files. The boid daemon runs on all NFS client systems, When a user on the clients wants to read or write to a file on a server, the biod daemon sends this request to server. Boot Parameters (/ust/sbin/rpe.bootparamd) Provides boot parameters to diskless clients from the /usr/sbin/rpe.bootparamd daemon on the server. PC Authentication (/usr/sbin/vpe.penfsd) Provides @ user authentication server for PC-NFS from the /usr/sbin/rpe.penfsd daemon on the server. Unexporting an NFS Directory ‘Tounexport an NFS directory using SMIT smitty mnfsexp To unexport an NFS directory using a text editor Hi letclexports Delete shomel line, save and close the ete/exports file IENES is currently running #exportfs -u /homel (To unexport a directory) Mounting ain NFS Directory ‘There are 3 types of NFS mounts 1, Predefined 2. Explicit . 3. Automatic. 52 5 © e e Q o g IM ¢ 00. Beuorrcteas a G "eo € Establishing predefined NES mounts: ‘Predefined NFS mounts are specified in the /etefilesystems file. Predefined! ‘mounts should be used when certain mounts are always required for proper operation of a ‘client. To establish predefined mounts through SMIT #smity mknfsmnt Stepl: Open the lete/filesystems file, add entries for each of the remote file systems that you want mounted when the system is started. . Step2: Remove any directory entries that you do not want to mouint automatically at system startup. Then save and close the file. Step3: mount -a To mount all the directories specified in the /ete/filesystems fie. Mounting an NFS Dixgefory explicitly: Explicit mounts serve the needs of the root user. Explicit mounts are usually done for short periods 6f time when there is @ requirement for occasional unplanned mounts. Explicit mounts can also be used if'a mount is required for special tasks and that mount should not be generally available on the NFS client ‘Note: Explicit mounts do not require updating the /ect/filesystems file, Step1: Verify that the NFS server has exported the directory > #showmount -e ADC displays the names of the directories currently exported from the NFS server. "eate a local mount point using mkdir command itty mknfsmnt & Mounting an NFS directory automatically: Automatically mounts are controlled by the automount command. If'a program or useiaitempis fo access a directory that is not currently mounted, then AutoF's intercepts the request, arranges for the mount of the file system and then services the request. The automountd daemon performs the requested service. Stept: Verify that the NFS server has exported the directory #showmount ~e AIX! It displays the names of the directories currently exported from the NFS server. Step2: Create an AutoFs map file. AutoFs will mount and unmount the directories ~specified in this tnap file. The map file name is /tmp/mount.map. An example of a map file ean be found in /ust/samples/af. == Step3: Start automountd daemon startsre -s automountd #issre -s autortiountd (For verification) ~ 9 Step: Define the map file = dfusr/sbin/automount -v /home] /tmp/mount.map StepS: To stop the automountd Hstopsre ~s automountd 53 peeeegeeeoescecedces Changing an exported file system Step1: Unexport the file system on AIX 1 server #exportfs -u /homel Step2: Hsmitty chisexp Pathname of Directory to export Mode to export directory Step3: Re-export the file system #exportfs /home3 Using text editors #exportfs -u home] yi lete/exports fe Make whatever changes you want #exportfs thome3 Note: Verify that the mowatd. portmap and nfsd daemons are running on the server by entering the command at the client. ‘Wusr/bin/rpeinfo ~u servername mount #ust/bin/rpeinfo-—u servername portmap #rusr/bin/rpeinfo -u servername nfs thome3 read-write necking network connection: ifthe boid dacmons ure working, check the network connections. The nfsstat command determines whether you are dropping packets, Use the nfsstat ~c and nfsstat -s ids to determine if the client or server is setransinitting large blocks. ~~ issions are always a possibility due to lost packets or busy servers. A —- retransmission rate of 5 percent is considered high. 54 aa t by yy Chapter 15 Printers and Queues xy AIX printing environment supports 2 types of printér subsystems 1. AIX Print Subsystem 2. System Print Sub System ryt > ‘To support System V, IBM added a new user (Ip) and a new (Ip) group to y the AIX operating system. ae) > The Sysiesn V version that IBM uses ini AIX SL is release 4(SRV4) of the m System V Print sub system. x QO. > You can run either the AIX or the System V print sub system on POWER *-" systems, You must select one, because they will not run concurrently. Jn Itanium based systems, the ALX print sub system isnot availabe, . In POWER based systetis, both are available, default pririt sub system is AX paint sub system. ng : Advantages of AIX Print Subsystem Ve } 1. Powerful and flexible printer drivers. > Aix printer drivers provide many printing options that can be easily controlled ey using qprt command, Printer defaults can be easily managed using SMIT or a 2. Kasy printer configuration ~ Printers can be customized using imenu selections or command line options. In require knowledge of shell programming [ 4. Customizable spooling subsystem BS ty Advantages of System v print subsystem 5 1. Compatibility (Many UNIX Flavors) ts 2. Availability of interface programs 2 3. More security (Controlling user access) L > X 4. Standard Postscript filters 7 The System V Print subsystem includes a number of filters for converting a number of ww different file formats to postscript. 82 Concepts of Queues: YD —---. © The purpose of the queuing system is to maintain a queue of jobshat are - waiting for their tum to run, 2 + Queues also gives control to admins over queuing mechanism, so system a admin can perform sks ike caneeting obs on cuves, changing priorities of jobs. 3 = One print queue can print to a number of printers. 7 + Users can submit their jobs to.a number of different queues, @ + 35 Q@ 6606006 Note under the contzol of the system resource controller (S sPrinte: Da: eae The qdae 1m is started at boot time from the /etc/inittab file. The qdaemon is low The user can issue one of the printer commands qprt, Ip, Ipr or eng to submit a print job ‘The entry point to the spooler is the eng command, whieli is responsible for processing the job request, creating a job description file and notifying the daemon of the new job. ; ¢ adaemon maintains a ist ofall of the defined queues and monitors the queues for newly submitedjobs. ‘daemon tries to process the job if the destination device is available, other the job remains in te queue aid qdaemon tries again late ‘The printing command calls enq. eng checks to see if the queue naine isa valid queue and all of the parameterS are correct An entry is made in the /var/spool/Ipd/qdir directory identifying the job to be run, The copy is placed in the spool directory /var/spooWiqdaemon When the job reaches the top of the queue or the front of the line, the qdaemon reads information from /ete/qconfig. When the queue starts working on the job, the qdaemon sends an upadet to the job is active. ‘The backend program for-the queue is started by the qdaemon and receives the filename and the print options for the job, which is returned into a command line statement. ‘The backend puts all of the pieces together: The files with the attributes are assembled together into a data stream, which is stored in virtual printer definitions in the /var/spool/Ipd/pio/@loeal directory. ‘The backend program sends its data stream to the device driver for the appropriate printer. Note: Ifa file is spooled, a copy of the file remains in the /var/spooVqdaemon directory until the job has completed printing. system files associated with printing ‘etciqconfig -- Queue configuration file that describes the queues and devices available for each queue... -—- an /var/spool/* --- Directory that contains spooling directories and files used by daemons and progranis. Svar!spool/qdaemon --- Directory that contains copies of files that have been spooled. Ivar!spool/ipdistat/* ~ Directory that contains status information of print jobs. /var/spool/Ipdiqdis/* --- Directory that contains queue requests and information about queued files. ‘Nax/spoB¥¥pd/pio/ @local Directory that contains virtual printer definitions. 56 n ane oO Or ace Co Coogee e . Qaaemon 1. qdaemon schedules jobs and manages queues. 2. qdacmon started by startsrc through /etelinittab. 3. qdaemon is con:rolizd by the /ess/qconfig file. It contains stanza for each queue. Stanza contains the address of desination printer, backend rogram. ~ 2-5 4, Backend program is called by qdaemon, * 2 Ay Examples: 3 GY Toshow eurent print subsystem cP féswiteh prt ag ie To change current print subsystem arn iéswiteh prt -s AIX of switch.prt ~d SystemV Bo To check ifbineries are correct linked 25 isl Ause/bin/pstat fusr/bin/ipstat -> /usriain/bin/Ipstat or /ust/bin/Ipstat > /ust/sysv/bin/Ipsat Asinitty spooler Xp f 3 System. BsD Aix {3 FZosubmitajodtoaquene ip ipr apn a To ist jobs in a quene Ipstat Ipq chk 3? To bring queues up and down ig enable queue_name s ‘disable queue_name 7 _ff Smilty spooler smitty chpq — fe change a@uese 9+) temity py = Fe cemeves que > smitty pamanage --- To manage queues <3 | dsmitty jobs —- To manage print jobs : [smitty qcan or cancel -~ To cancel print jobs €D | Acancel queue_name or qean-X -P queue_name -- To cancel all jobs of a queue 3 #ésmitty. ghd or qhld -r #1493 --- To hold a job in a queue. > i F ae oO 37 Chapter 16 Backup and Restore ‘The dara on a computer is more important and expensive te replace anachine itseif. Many disaster recovery. -miganies have gone out of business because they did not plan for Uses of Backup, Backups should be taken before installing/maintaining hardware/sofiware. In case a disk 6r files accidentally get damaged. In case any Hartiware failures ‘Transfer of data between systems, When reorganizing the file systems, you need to take backup file vevvvy ‘stems installation, Why Restore > To recover files. > To compare versions of files. > To recover system after disaster. > To restore archived data, > To shrinka file system. Colvam tack £8 ovoid Gmetling ) Types of Backup Three types of backup 1. System: Records image of the operating system. 2. Full: Preserves all user data and configuration files. 3. Incremental: Records changes since previous backups. ‘There are 2 types of incremental backups First Metho |: The first method is to do a full backup, For Example, on Sunday, and then for the rest of the week, only backup the changes from the previous day. This method has the advantage of being quick, but lot of tapes involved. * Second Method: It involves taking a full backup on Sunday. The other days of the week backup only the changes made sinee the full backup i. since Sunday. The backups will take slightly longer than the pervious method, Backup Devices Diskette: Tt can be used to backup data, when backing up small amounts of data. The logical device name for a diskette drive is /dev/fdx. To format a diskette, use the format ~1 command. seme If you are going to install a number of similar machines ie. system image for oy ‘The flcopy command is used to copy diskette, dosread, doswrite, dosdir and dosformat commands are used to work with Diskette. Tape: The most common device used for backups are tapes. The tape devices usé'The logical device name of rmtx, some of the tape technologies supported by the AIX. 4mm DAT (Digital Audio Tape) -- can hold up to 40 GB of data with a data transfer rate Of 6 MB/sec. 8 mm Tape — can hold up to 40 GB of data with a dgtatransfer rate of 6 MB/sec. ’4inch Cartridge — can hold up to 4 GB of data with a transfer rate of 380 KB/sec Digital Linear Tape (DLT) ~- can hold up to 70.GB at a transfer rate of 10 MB/sec Magstar --- another tape technology usually used in tape subsystems. It offers up to 420 GB per cartridge. with a transfer rate of 15 MB/sec, The tape movement can be controlled u: 2 tetl or mt commands, CD-ROM: AIX supports réad/write optical drives as well as standard CD-ROM. The R/W optical drives support CD-ROM file sysiems and IFS file systems. ‘+ Use with CD-ROM file system for read only operatons. ‘+ Use with journal file systems for read/write operation, To cteate a CD-ROM file system use the eredrfs command, Rootvg Backup Process: ‘The mksysb command creates a bootable image of all mounted file system an the rootvg volume group. You can use this backup command to reinstall a system to its original state. Note: User defined paging spaces and raw devices are not backed up. The mksysb provides the following functions: > Backs up rootvg only >--Unmonntedt file systenis are nor backed up > > Bootable tape is created in backup format > Saves system created paging space definitions > Saves logical volume policies > Saves the file system block size and number of bytes in inodes ‘The tape format includes a BOS boot image, a BOS install image and a dummy table of contents (TOC) and the System backup (rootvg) image. | oo) OO Ce Oe eo OF o e©o@eeoeecoceoeoce Noves: ‘There will be four images on the inksysb tape, and the fourth image will contain nly rrontvg jf and ji82 mounted fite systems. The following is a description of mixsysb's tour images. 1. Image #3: The bosboot image contains a copy of the system's kernel and specific device drivers, allowing the wser to boot from this ‘ape. 2. Image #2: The mkinsttape image contains files to be loaded into the RAM file system. ‘wher! booting in maintenance. Example files in this image are bosinst.data, iniage.data or tapeblksz, which contains the blocksize for the fourth image. Selmage #3: The dummriy image contains a single file containing the words "dummy toc" This image is used to make the mksysb tape contain the same number of images as & BOS install tape, 4. Inige The rootrg image contains data fom the rootvg ‘okie Bipup (mounted jfs and jfs2 file systems only). Excluding file systems from a backup When you need to make a mksysb backup of a system and you want to exclude some data file systems from the system, you need to edit the /etc/exclude.rootvg file. For example, you want to exclude the file systems /usr and /tmp from your ‘backup, add the following Fast! ‘imp! Then run the mksysb command using the -¢ flag to exclude the contents of the exclude-rootve file as follows: mksysb —e /devirmt0 How to create a bootable system backup The mksysb command creates a bootabie image of the rootvg file system either in afile system directory onto a bootable tape and is used to restore a system after a system failure or for system cloning, ‘smitty Select System Storage Management (Physical & Logical Storage) Select System Backup Manager Select Back up the System ~o Backup DEVICE or FILE /dev/rmt0 Backing up a Single Volume group The savevg command finds and backs up all files belonging to a specified volume group. A volume group must be varied on, and the file systems must BénTounted— ~~ Note: You can run mksysb on rootvg, you can’t run mksysb against a user volume groupelfyou want to back up a user volume group, you must use savevg, tar, epio of backup: 60 nD can OOO +. oO ’ v9 9 9 FF | To backup the sapvg volume gioup and create a new tiservg.data file Steph: Check which volume group you want to backup. . #isva, JSiep2: The votume eswup chat must be hacked up is sapvg, savevg -if Mdevirmt0 sapve Pe Note: SMIT provides « tront-end tor file system backups as well smitty backfilesy’s How to backup the current director To back up your current, directory to the tape devi in the correct directory ice devirmtO. First, check that you are Hod fuserdire AA pwd Juserdirectory fis Now that you know whist is in the directory, you can now back it up using the following, command: Hear -evF/deW/t0 * Note: The tar commit is one of very few commands that do not require a ~ (minus) sign before a flay ‘There are two other commands that you can use to create backups. > Using the backup command ed fuserdirectory #find . depth | backup -1--F fdewirmtO This will do a backup using relative path names Note: The ~print flug tur the find command can be interchanged with the ~depth flag. equally for backup commands. > Using the cpio command Hed/ #find /userdirectory -print } cpio -0 ~c -v -B > /devirmt0 ‘This will back up the inforation using absolute path naines, Incremental Backups: ‘The backup command can allow an administrator to make sets of incremental ‘backups over periods of time. This is usefu) for storing data that changes often on the system. backup -0 —ut /dee rmit) home 61 1 i I >See ee oo ooe oss 1 When the -v f a SOG Gu used with the backup command, the system will do an incremental backup of uver data according to the -level number specified On Sunday, the system sould run Saas « Hoacep -0 ~ut cdew/emto data » On Monday, the system -vo #backup -1 ~uf dew/rmte /data On Saturday. the system would nun: #backup -6 ~ut devirmto /data ran Oy, Restoving a mksysb: To restore a mksysb image, boot the machine just as if you were performing an installation, Be sure your boot fist contains the tape device before the harddrive, Then insert the misysb tag and power the machine, The rffefine will boot from the tape and prompl yaw fo define the console and select a language for installation. Steps: ‘+ Select Start Maintenance Mode for System Recovery * Select Install from a system Backup * Select the tape drive that contains the mksysb tape + Then you will re ‘o the installation and Maintenance menu and select option 2 (Ghange’show installation setings and install) and then select option 1 and provide the disks where you want to install Note: If your rootvg was mirrored, you need to select both disks. ga > Finally restart the system. Restoring a non-rootve Volume Group, Hsmitty restve Restore a File System smitty resfilesys Restore a File or a Directory ~ dsmitty resifiie ~ a Using the tar command a To generate a ar backup far ~evf idevirmt0.3 home To restore a file from a tar image ‘tar -xvBAdevirmtOhome/mydir List content of a tar file far -1vE dev/rmtO Here isa list of the commonly use options: create a tar backup “x extract (restore) a file(s) from a ar file -treads the content of the ter file ~¥ verbose output ~ displays files as they are backed up and restored -Fidemtify the file or device holding the tur image 9 9 9 Ppeeeoeeca Chapter 17 Network Installation Management(NIM Network Installation Management (NIM) allows you to manage an automated installation of the Base Operating Systensi (30S) and optional softwere on One or more machines You can instal a group of machines with a common configuration or customize an installation for your specific needs. The number of machines you can install simultaneously depends on the throughput of your network, the disk access throughput of the installation servers, and the platform type of your servers. ‘The NIM environment includes client and server machines. A server provides resources (for.example, files and programs required for installation) to another machine. ‘A machine that is dependent on a server to provide resourcés is known as a client. Any machine that receives NIM resources is a client, although the same machine can also be a server in the overall network environment ‘Most installation tasks in the NIM environment are performed from one server named the master. A set of installation tasks can also be performed fron NIM clients, Once the network installation setup is complete, users of stand-alone clients can, from th client, install software thet is available on NIM servers. NIM Machines: ‘The types of machines that can be managed in the NIM environment are stand- alone, diskless, and dataless clients. Stand-alone NIM clients can be booted and operated from local resources. They mount all file systems from locai disks and have a local boot image. Stand-alone clients are not dependent upon network servers for operation, Diskless and dataless clients are machines that are not capable of booting and running without the assistance of servers on a network. As their names imply, diskless clients have no hard disk, and dataless clients have disks that aré unable to hold all the data that ila be: required for operation. Diskless machines must mount paging space and all file systems'from remote servers, Dataless machines can only use a local disk for paging space and the /tmp- and /home file systems. Neither diskless nor dataless clients have a local boot image, and they must boot from servers in the network. NIM Roles: The NIM environment is composed of two basic machine roles: master and client. The NIM master manages the installation of the test of the machines in the NIM environment The master is the only machine that can remotely ran NIM environment are clients to the ‘master, including machines that may also serve resources... NIM Resources: All operations on clients in the NIM environment require one or more resources. NIM. resource objects represent files and directories that are used to support some type of NIM operation. Because NIM resources are ordinary file system objects in the operating system, sagt of them are provided to clients with standard Network File System (NFS) software. 1. Oe Some of the important NIM resources are listed betow tr Resource Description a Ipp_source Represents a directory in which sofvare installation innages are 9 stored oo spot The shared product object tree (SPOT) is a fundamental resource ° in the NIM environment, It is required to install or initialize all iypes of machine configurations. : 3 bosinst_data Represents a file that contains information fir the BOS installation program. Normally, the BOS installation program looks for this * » information in the /bosinst.data file in the installation image. x image_data “Represents a file that contains information describes how paysical disks and file systems should be configured in the root volume x eee group during installation. mksysb Represents a file that is system backup image created using the &, mksysb command. This type of resource can be used as'the source ea for the installation of a client 4 installp_bundle Represents a file that contains the names of filesets that ae should be managed by NIM. paging Represents a directory where client paging files are maintained fix_bundle Represents a file containing fix keywords to be used by the instfix command Configuration of NIM Master Stepl: Update the file /ete/hosts with client name (in NIM Master) vi fete/hosts 10.1.1.10 nimserver 19.11.20 nimelient ‘Step2: create nimyg on NIM Master server where we will build NIM Master configuration isminy ve oe) Hisvg -0 5 root i nimvg, ne) Step3: Insert CDi on NIM Master CD-ROM drive and create a mount point for CD. a, ROM lea) smitty cdrom 2 mount mnt I #ed /mnvinstallp/ppe iw fs ifs a) : re 65 { 1 | | 1 | i i | i i S See@eeoGoeecoos Step4: Confignre nimserver server as a NIM Master To install a NIM Master, we should have some filesets like bos.sysmgt.nim server bos sysmetnim.client ‘To check whether these filesystems are installed or not sip -L | grep -i sysmet ‘To install these filesystems Asinitty installp > bos.sysmgt smitty eznim Configure as a NIM Master Setup the NIM Master environment Select or specify software source to initialize environment (cd0] Select volume group for resources (nimvg] Select filesystem for resources (Vexportieznim} Options CREATE System backup image {yes} CREATE new file system {yes} Display verbose ontpat bes} Note: It will create the following file systems during this process. Jexport/pp_source Jexportspot itipboot To check these file systems use the following commands df -—k #isvg 1 nimvg Hed Jexporveznim als : 5300-04bid_ow ipp_source nim spot #ed lexportleznim/spot/530spot_res #ls - bosinst.data image.data Ipp_name usr #ed JexporvezninvIpp_source S30Ipp_res ted * ls RPMS installp usr ed /exporteznim/mksysb fist #ed /expagyfeznim/spo/S30spot-res # vi bosinst_data ) n cee [E90 Sad ax ted spotlspotl —-- It contains directory structure Hed MIpp_source’Ipp_scurcel/installp/ppe ~- It contains software durnp vi bosinst_data ~~ It lefines the flow of BOS installation during NIM installation #pg image dann -~ It contains rcoivg info.rnation and properties . Ste wure NIM Master environment and client configuration #smitty nim Perform NIM Administration tasks Manage machines Define a Machine wt Host name of machine {nimctient} Machine Type : {Standalone} ‘Step6: To check whether client is configured or not Hsnim —|,nimelient Step?: smitty nim Perform NIM Administration tasks Configure NIM environment options Export NIM Resources Globally Enable / Disable global exporting of NIM Resources? _[enable] Steps: -ésmitty nim Perform NIM Administration tasks Manage Network Install Resource Allocation Allocate Network Install Resources Note: Allocate all resources like Ipp, spot, mksysb, bosinst file to client Select > nimelient Select options like mksysb, Ipp_source, spot & alt_disk_install Steps: fismitty nim Perform NIM Administration tasks a Manage Machines Perform operations on machines Select >-nimelient - Select > bos_inst a ~ = Target Name [nimetient] Source for BOS runtime files [ne] Remain NIM client after install? yes) Initiate Boot operation on client? [yes] Accept new licence agreements? {yes} 07 j i i ewwewvvvvvud UVuue we Stepl0: Hod fexportieznim Hui $300_Oabid_ow Target disk data HDISK > hdisk0 Note: Client Side: Do RIPL setting from SMS menu and th on server under /tfipboot nimelient is created star client yeu will see #isvg 1 nimvg Hed hfipboot 7 His oe '30spot_res.chrp.mp.cnt nimetientinfo nimelient iost+found Installation of BOS using NIM Master at client server Stepl: Restart the client server (nimelient) During the boot process. press FI > Goto Syste Management Services (SMS) Goto uilities > multiboot > boot sequence IBM 100/10 ethernet Adapter Cérom > Goto utilities > RIPL (Remote Initial Program Loader) > Sat address (ping, config, exit) Client IP Address 10.11.20 Server IP Address 10.1.1.10 Gateway 0.0.0.0 Subnet Mask 255.0.0.0 > Goto Config Data Rete Auto Full Duplex Auto Click OK > Goto ping Press ping, Exit ~> Now it is going to install the BOS O/S from NIM Master Server ‘Step2=Go fo niigerver NIM Master Server Hat Hed Aftpboot ails Note: To check whether the BOS installation is going on or not #isnim —1 nivaglient info = BOS install 18% complete 68 AEEEMMA GO OMpNCH A an orale a O« UU a) eaee ra Note: To view log information fed ivarladmiras Hail -F nimclient_al_mig.log Note: The /variadin/ras directory contains the NIM master lag files. To examine these files, You can use the alog command. The /var/adm/ras/nimlog file contaifistafismation about failed NIM operatins, ‘To install BOS Using NIM Concept for Migration Stepl: At NIM Master (nimserver) “ #nimadm -c nimclient -s spot! -] Ipp_sourcel -d hdiskl ~Y & Step2: Go to Client Server (nimelient) ~¥-Set the bootlist as hidisk] and reboot the server > Clean up old rootvg and mirror up rootvg, Halt_disk_install -X oldrootvg Hextendvg rootvg hdisk0 Amine roots #bosboot -ad /dev/hdiskO bootlist -m normal -o hdisk0 hdiskt 69 Te achnaddel omepls oe pt voles v7 _ Ss Volume 970ePS Le é : 2 peat ete e . ae 5 2) é —fewiecal volts Z Wooa ME oy al — Lagitel pel lous \ vp 5 = fle gsm ss ve a ee ern te an aw iar eel eel ere has a vame suck as heliskeO (1) =F cpy) awel wads paae Gin One tar more PUS cam make up & Fett le ease ty -4 plyoiee! volume 92% belong ab on oes a cite aed aagge «fection oP py de ext 8 ACY i is weasged ot -lo a voluwne 9 OF _ © py can be’ assiparel sla same volume qreup Or, 1. cout ~ Sag ey _aliel sly pes ae “ wis wy Pe SSx owes 8 i vom physical vilumes 18 bw log” (eee lovoy space ioe Sal Pash ‘Op Physel P jens Tassel all cisks belogyef f i J tqlescticnll on jhe Physien! Rellions ig pl sper Thee St bye Widh in coho celine gre» one tev) more Lepaie eae ; u con be ceed ; 1 i Spada skoed $a Logica! volumes ctppeams toe frre wf! of view, bat caw be spy ci tL Peed ply Tal volumes Prom Ta See a Fe bp ea bagi Vola corsists of pape ee pparddiow s the i sitions pavdidions a7e calle al Aye pe s ad each Ip Yoo alleas! one covvespensicg ys ido he i , ve lhe wie sige A bp awl PP aboays — ee jivse copies oP dale bocietes le -lo Sus a bev sical pertitions Usually, prs slowg wd ot ou _ciffoed plysice ch, ad wechou alow pup ical Yolame cos be shel in an @ eal — == —=—ruG_n_ dusecl ol Iieravchicol foe woe do LileSyoton Ble Sylow pula som. Ogee manner i etivecle ries: “Ths wsfruc: i | f (6) S Ogananton Pau Alene Dale Prom a Dogiecl volume cor be do & Pale abe — Papel obteg of Byles sr op Los a opel eecle tpi dats Volumes ave maar SO. to. ox cliserip ler GO a Loblaw gee up i I isk thal 5 ht J wie Ww AE aed of the aes te olel bedeg Y OD 5 A quem Sticke Pathere 4 Sa y ecw the upranr 5 of oil ¥ dost the vanes Hoel ofP- so Abed weer aceessi ble by ‘Bue: Tas paced ae into bed volume areup- Aisi ates ad yh The Vary PP He Das occerredd ond servic fall iawedly sas a vesul i lke ervor boy -thed a blo exter { wast be pewmedl : ' I Volame a with 2 pues i —- pv ' . : : | pois of pvt: Sat. of WG pas is axoilable i - has oP puns 66k oP VEDAS available Volume, sre wrk —-3PV'S BEB of vapA's available oss of a4 pur 66% fee. pera e ie s ck peuels upou “The Quer I | nad > Tran —Il Quovuse #s in active Types of Voleme Groups: - peso ps o ® = These are lypes of VG ey 0: Normal. v6 _ @) Big VG wonio3” “= ar ll G) salable vé jolGe sy. BU . = . WG, Tyee — : i = Mam mune 7 oy _ sa ace an BE 256) ee ~ a) — See | (tt = S (iol ps2), ( a Bava 1 3004% —— cise 128] 148 20D EIS 2 bo e me tide le atiskelviver ish aceleed -lo + : : fh seen “lo be a sine ckuice a Vetisk is wt et acccasib le BB be wale accessible if bx bo asgique fov kul Ope xartions slo a volume gr Le By each alish bso device chiens will be created uncles bj 2 te bey ativecloey re i= 4H CD bloke clevice shiver aa OG davacky oleoke shiver gevront PO. bg > TT atisk chive is assi wad aw B2-bit wtque idedifley ' Jrobune ictectiPrey. 7 te called Peet steal voluuis -fheiy PYEB'S , the veluwes Gooup lis at ee ST tawtches oP velar gripe wil be used ht beioo ate mipvsaD: . , + illan -lle perp» is wievodedd , te syslim uses ts 0.84 serial cule 4d flasloup lo enstne thos] “Ihe “lod lish i cle. sot PED PeED - woule! wever Sp prrpweedan esloied in obm- “Thay ave used by Lum 5 , le oubevvalt applica ht om comvancls oral referenced by such as HACM PE: - é a ble aise tubo +G comma) ceyges 0% eoailable a purd ,tP it cloesit t : i J Tae Ni lewiv physical ABk velume by osslgeied al veal bane : chaley —b liskuene “Te, above. commancl fas no cffeed iP tsk ts cdbsyecilag { a physical vole ja Th Mlonieg commancl chars’ the puro Phen lhe ply pe volume cae 4 chdev =D heliske -& py= chdew 1 helisks - py =¢]es C mmancl is _useal ath sem ting abl a partieilar phy la p fs Squr= spy. cliskname / a Ispv heiesk 2 5) “Te alisplay le vomes of oll ta F fus tied Dawe od beast 5 esfition at ow lle plejctegh auslete tbe abel we of is, oO a stot cn py) ctin olal: 0-0 Bes ~iked covespensleg Jo bla chisli bution of Pps correspousliug lo ea potud of Fle BU TP teat sigh tieete he cowl F fs uses 3 € bynlam e ips pps “piste bacon Mount Poi , hd . a o0-90-01-00:.00 /tMP tu : Z u “te ¥ pistribuliows 09-00. 04 00+» 00 + YoY eek a je —> inneve us ld le im—> iumey oa eender dev wid be TTS atispley “Hoe number oolkon of porihous gee) stl com monad —caill pv's Hay corres PO t er Lp op blokes ey Ispy _p disk? 1) To leplsy the oe ee relationship leo The ppls ce d will be used welsh oo le ~ com pars eqn lee ov pv charging Fata alle Tao ie ; 6) The TPaline permission TOY Pp feieal Volume te levmuiuss iP pps ale locolecl qu atkal .pyi, chidh Love beew wt — locoled to 2 Dogeel voles gee con be Bieie ac bog Siow oP b's [heel vesicles 0» dua “pv Nolumes: “The ope7e ts wl aPfeclee! ; Te cheable -te abilily slo allocate uno Pree phesical perllin g “Prow elisha fe we jgieol voleane. Ne bebw commercl will be used 3 oO Te lem on the allocation permission, use “th Lolleee 4 Command | 7 a dips ay awe tla availobilily oh ia plepcel olen of the plyseal wee elaine eter per Brae do 4 la Secs egies a Te availability Ipc, ‘jo operations can be a oe “ted phy [PGA &vask copics OM ae pv ‘willnik ahken dato exccoun! subsequent pum Cini Also lhe ey maction mg PY mill be ere Peo lhe _viibs's oP the ; Ss otkin AM valine geet. ah pe will be marleed gs vemoued = pe oa 4) bebo commanc 's uscel 10 chiele The ounilsbilihay tale of ap gical valet 9] a make a clisk cmanailab le oe cops chpv -u7 helishucwt ; gp chev vr * i Veteve coe se. die above comavoucl Abe py stATE eee ilable py elisla aus To make l Comm Onc wWheawey we ase thes PV STATE 7 Active - we fhe 10) To cleay —Ibe ed yecoved Docatecl on Abe pbysical vol: “helus command is asec ae “holSpare: sical volume Deckoig « bys u) “Tp dele a py o8 % a holspave lhe’ Lollooieg corner will be suseel Sy isk J eel a f \ plspare pool of is vol gq” P 3 a Nolepare. “Tas we cos’ elo ony SH Awepy is eleclevest Ly operations on —that Pye aby ical valurne si 2 6 6 vating olla Low 5 be moved, deel on & phys! volume. cor plesical port lions Yoces ag STAGE peak tee tees SE ar i “Tp igual cede fie ce eee cuotle® py the teboeo comuan? 2 re) with be use sadePy disknows® chislaame 2 we belisks col? ‘par yiies oe ote dee “9 = mignon’ i 7 holiska Yokota OR ee adjes “Me ote Drom beiske to balete, aller wee have to “ae ajiz belo sommes al to cleay Hy3 .) chor —"n boot record hom deli oo gp eka om TS Pe wiped ctda Bom phy steatah : 27 7 Q Stele Bom physteob vate that chesney _ po oakel abo epee eae a —> 11 is possible 0 grate. o dada ho tit i i : Proms parti ~ clo a Specific lapel volume “a vole, éuly p's ed bebo jo speeditc che conmonel tous thet bebe g rd te bo est 4 chem helislen. Hot diclisk5, ¥s© tl Flesthy — feliwle A tbh | “ wa keliske Cer) J = Lv operations oll perPeves LDL pecelige A vaiee aie holspave ~~ 2 hw we » gy Whenever Abel py is defined 45 rble (PV.giAtE: iective ) By thedl peer wane She py is a ake abbocaclion permission a a whwever a ifaw eoey BY pts clisable d “ike pels. ore Dalle 7 Dy dhe bust operatious 4 +4) wbaareue¥ all _ be cal Per P15 semove Ae elise dl cor) closecl a) s) hecke adele tt close ‘Plesqalem 35 opens J files ba opexe P ) eee) ay dP tt ie opeacd cto pu from le YH ow ve roca LAL Ais komme padey =p dev/etishnaut 5) temeve bop 4) use g the commancl 5) ediPy te tisk cacl vemove > hotplug laste b. esi devices dels : names of tle isles will be lisplayed sae cs ail bale a SE i pert ~ — vee Sigid will come on (4 nd Baise rovove it) uy @ Meador downbeat | aon CE paceeee eeeeneeee a ee fon desi Adiccre, pesos | wwe A Bix tae Sch Aoi. > Wher on Gevalng Sele IS vaelelie one voluwe spoup of cvea teal by aie tealt be created gu ~te Sopsdemm- asin G TSF Aiea” coluiie™ a cas outorrmore physical vohines, thal dave wt beew allaraded to oller velame’ goes g gel and ace avalible stele ly Tee se of Jl phpical rors a be heaged - ts cveale asolee ron fa POY Gealing avolame group! - ” zl fe Le J “we car cver a Vol we voOup> Exel cles Wi, sed a= _Brt__ush wiley comma o ae Ce “ga varp te ithe wala me qrouy> ts 055 ' by bv coum / a "far each vlawe guup yhoo cbaee obiter Bs coe cvendea! aaclex ctieplegs pvs_theil ont parl of desltyg —__ chpy hy hedisks > tees -lo clestquaje hetishe a. Ded : e 2 Motspere, hat Pals because bebshks covlaias ppt: thal ave albcaled : cher = hy elishy >. agentes heliley as‘e holspave Lipo helisk 4 + eons thal bby olacsntl cowlain oy alban, sted ppis tit abletable pewutssions for Vh03 py is se{ do no deg -ty ade cs cle bokipare policy of the VG ~l0 welche a tiling gtd oe az corlomed by Levy chy “hy -kehvg> 2 he hokspare’ “policy of va to ‘4 d adda “hoe a Bid disk Ho dhe wig “4 ‘ geodisks, a8 ceu By weed bey hie pool P sper bovg lesbos “bse okBwe a py as kolspave, oPley hed) na Sr Ten we Pave to teP ut aug 2 hot spare to ot Jo > aisables tha holspave pilioy oP dle chug hn deskevg S longing the Sybvon's len poliey 2 ~ Syocksoutsation palsy onsbvols aulowmbic aye oP FF suule portions withis tla gage Cveesys cite tabs peo bie) : De partitions thal corr spout Datnas tag has stant Prrance ody Ao matrwresl Lvs 9 Te em wich vours ecioy ri te fe beloiis command isuscat? 5 Tes coated by bry are arn ag ay “Te te cenctemes nrtaPe rg Wee aioe (coil ele Voluic® je used , cotaréel by heyy waver) onsKil& ponexiol& oy ger pate below commanel eye =] 5 dhe ta wena nook tv's tle I ~ --coramarel fs usest “te -belas commaud is asedl G o To ubck a volume perp» co ee a a ge Ecler ie vole poe > ble con increase ts space amilable wa a vg by addin sO pus. Beye adding a uaa lish we dacete Que ensure Theat 3 wtla lish ts tu ax ~aoai ble alale g Gg —+ Te system quives fla ctisle -b be added to cliscory G Pid abveady coats ay vaPAy AP Slee Ss o HE disk bos one vars covespoucling Fo odes already 0 13 wed os welame group) enmterel cl TO Exteud a 4 > Now caw remave van Pi Ss common ds The volume .9/P Bow 4 vate % vectra lo ava epee ote aera CAT provapl teaser Be cov dwnadion iw coudiuniag i Fs close > we Jee [alislenawe vere “jo Shis command Poy all alisks eq) —> vemclev - db coe have ecomorls EY i apencley math jatev elisa qyacey ell Jedev Jetisk 2 i ypmeley ~alh Jeley fatishem “Jo icheuch Py -the olisks - datieg = Alen, cucl -yenove - J 3 G 8 a Ge uu oO eapert a volume peep - hoe awe Gluglions hon all” kde “Pom cryq weecls “Te ber * a Lupeoling ax valu POup wens reeves “4 Sco ee vg T - cleat od waking ata ohfa aoahble be Pve faxporkig yee weed to use lle betes Coutueau! u Oy 2 glo cee! ade alls below commarcl ts ase al Co a see ree ee ea! Lape erent we base to ee sis oue bey aivieg 2 ae fg es fue atest Ov Te soap La -commanel ~veacls thr vod of one ts, i puis ah! Sa. perl of Hla vg . 4h wes vedeiey to fiad al) "ep olla disks thal belovg do Hayy - dey AP le quite vokus geup vows | advent iw use the a iwpov tag emmand will Bit, berate staple ne ae 3 allowed : Vein ka ota gap 2 carbe activated by An abseacy atePiur ed volu «pep aad available P use Sag vexyoug common arel eg my ay var? eal lamin pont | he ee ww Mngiag_ off «vole gm Te verrqotteg conmoud oll eaclvate aay a tutta frlecgysbeuts Fhe ail Ive mush be closest, oslick vapeves rma “alt aswucled wilh tvs be wonouded Lelie” venryoP hog - BePove sig hoe conan we need do uomoud lee a, Te e944 “Tonmaan dts seh toe oF Jecrotead positing Be eee ol eae according’ vty swtiee Spystend cond dey physical paleyobboca lien or cael dy - ace vate be venga, commands ain pores eh bps ' “ apie! ais ne a al allocation. voles ‘A pyis hea 5 ; tecreased Le 1007 : | = Sychroviated a vokome er 7 5 ee Ao) gguclerouize ae stale ppts (y ay sed command is Ay accepts Rowes ob-bys, eu's oP vgs O° paroust lows oe 2 — Te axcbeot salto fe tee oc) a ol clepuscling oy 8 ! hia tt eat choncitenaHies aid he Jolal dada omoul . ‘ re t ac gbronite An copies Pocaled on pvs use the below ' ey 3 S Ree lac @ clisknawn 2s vo ' £4 as

Ay consist pie ene con meni vumboered Fo : rad parti! ow Jos cdbost oad one ada anime OF S a 3 a Abed con be Yoewdled. 04 i Phe) P'S i corvespon cling. P's ; m5 te beallion oe Tee SIS i pe is delruiud by viata phy = j cotcab axel PRET plyplend «lection pales. I “eorsaponcing lovee. Piles dle > Dov each by, there ov ® “foo tbe Joey ehiveclo 7 “Tia “uslow > chawachey desce block Ths ly pe dechuignts “lo waturlaia the inbogrity gyplem "uses journal oP coudvoh shucluves a cststinel js Logteal volume. Teve-Pve + each fan roost vesicle ov ‘ ge will bes wealliple oP -fa | tye oP Segond pay7 ie Ale Sytem si . ; postion ot : whe abe. legen RY eo oo FB & edna version of tle chailae 2 = : eu | based allocation io allow “ghey pedro, gr Bee aye db wes a beger Pile syslewes sonst oe a adh ise ewido eticde om ot ae vslallea usiug ly efulk ophiows, il eveates J3 apse Sle syslenns 4 i i 7) yp detuovk Pile spsbow— Tyo Te nts feo cbshibaded ile system tad Mews wet te acess uses 1 naceés fries ancl lvveclories located on 7 pater. mat use chncs TY ee es a era ee ae , nod ) <-com file aphen— crue ep-pom Plesytor toa RS lars 1 e cb-ROM aja cadets of pe cece ats a 3 oo TR ihe ase obleshucle ; jhe ace ablashuclines, Such aa suptr Bele, allocalion 9 al Wwodes, bloc ks, —Praqw works, Blocks, Paqueds 5 ancl aes bogs t Superbloct: am superblock -couleias coudvol iverwation aakoud o Pilesysten, fe ie eile ht ee ae tyde blocks y jiu Bleeydeiy vows, the Po begrlesice » “Me ey eee > Rectwodess” ta bist oP “Pee ladablocles » aie ot lio Cr tha fist 04 oP cretion and Rk syste wolede ad Ws fuel ed) Hocle of Vet Ps. Covsuplion oP -juts clela of eae Pa Pile gysheat cumusable: “aes ts dy AM syste leeps EL blocs ow Laxieat blecle ne Allecalion gop’ a ___ Allocation GroP cousists “oP el faodes oucl vhs correspon cing Luakiocks pel a eat yeas fileagsles eatlecation grers en tee tar alee le! ye can foe specified! elbow = ae fs is oem e Food os: — . i coubral \Pennection abou Pes Like Rie is created, 5 WT uote coulaius th ale od time claw We Jaina porwlers Jo cbtablect Js » se 4ypes aowey ond qwodiredl anc Teal accessed: Hallso cond uot stove A adduced tela oP file wmoele - Bile bes a conveaponcieg * Lo every Fy for aps Ble syste tit woe sept taotessid Lemce wire! vor? Piles, is clelewined by le ow byes perv mode IG Red an ut Piles tert is even a res Cubpl) vabs, acs ts spect plod yoo? modes is raed. oO call ikesplens Jo. t6HB 024 wodes) 445 Je system, tveve will be ox , o> tw ges 7A wesicls > for eve] wp PTS of your i Twole create ee TPs2 Ps mavages he weeeassany 5 ace ~h pe ate te a aq bpp oa Data klreks: — CrTT————C—“ =$EE poi ees slo olley ella block rhc rrrt—s—S—sC “CRS block size is Gea, oy Prague — PE paqueds of logical Hocks am be 1 OY pte? ouallor’ thee Tat slosclarel Size seal fo Suppor} He rae! of ah logical bole y ERD pep : » ey ss ly, you ane eda se Ane compression plo ablow Ga SHER ef ait dogieal Llocles oP a Pile Jo be loved @ coubiquows Peg Ss) -cowpressiow tov a Pile, syske will) Inevease tae “amoud oP _epy._ord fo activity _ how shag “Hat Pilesysdour, ed all dtabigedtom Hive ced De cox fave pith hagueal sheer. yy q Aestee, hogs: — “1 Plog sores -hoxsantion iuPractiow about Pile Syston wea chrbe ey. “Wits bela a be used Jo allbac Alle iucouple 4 5 fee waorchive crashes 2p fy. > operactions ! an aes Piles aysten ave used ov bogging b's of ype Peleg 7° Bo» ee wl} dade tudege ily rm tal clotees eusne file ayskon sadeg eh vbud Oy fs 5 oe Alex i os fs installed! ay file systems with tw Ala vooleg yp whe group se Dog veal wud bale as a common tog, Aleaysten cad cor use iui logs: Thes “. cleo APS ees lle ogee pe weiHen tele The Se dene (eel ga Rey ond wh ate Th ee : . spifference He SES AH Rancliow a Ps aes. Be ea APs ; APS a a uate ie Seis PT 2 Bye : sib i wt 4 Bleck size = 4096 orb i © i ee a i ay i pedal come chip ob sys gypvooteegston - =) & crealion 0p 3 | aro of owed > SEPT aaro-0 a | a 3 > we vagrete ade Prom 3S Pile gysies do aPS2 (5 fle syle Tee a r—sESE Giasgotenn ont reskor Ayia, om se, PS2 Diegysto™ = ! 3 ewaliag = Plesysteon= ° i vieen create a file sper ie too tied eps i —F Diedlly crectling a Dlesys ty 3 tee eee ax Gilesys tem ag wo O a file syste <> Diveetly cvealing Bie eo aaa he she=ae, cig Rieopsteewvon paiva series ome Ha ae See erate 7 “The. above a jhe file systems oP. MB ots ee ids lagieel wed th A owt Moo: Sa and assigee a >) ) peg ders wd 4 y freb creole ab om awd eveale a Pile System d qn (lo creode w) o waihy =p bysaets “4 Diesystetpe ve aookesls a fo exeate Silesys er aturs abs -¥ _otiestetee ay fbev/syeots = sie “aie cm presi ee® be. Som on Nox croaked Wy wowed s ust eve oO ey ralebe ~y bv - 45s a] to hobisk 4 oS — ~~ 4eehs—.- Ps =the “a Size lor mj Pe, ; Te lea! Den ts ae pede /Pilesystoms Tae a fek Plesystenas TR ctisplay 2 Slewza” Prom jele filesystem thed corvespouds: ~ ‘ clo parttidler Mle AKL beled commons is ure ol qe cal Jetelt Leeson [ger ip Pleoy net gas age ak pale Iieapsamc tape PP fae 3 i Philesy steer vows : ; i poke = News (Blew Aveo) 5 | Ps = Bilegyshine type” J Jey (Ate Ide bee) lope 3 i powud — = Padse Hye 3 Cr 3 3 pula ot _eawouding o Pilesgstem cel vies , chia ool 14 fag 2 ts a equrpl jel wotkes Plesyslons, Bs Be ase ado partiuidey Ioeedion —F. ond nu files anaileble way oP a file ysis us wacle accessible: + B woud a Llesysteor : Sy ood Hlesy-esoue : 3 parnoud getvan Soudh 125 . aye a. oye PUD emoud a Pilesysten: Cp + aye cumoud Hi bspsbuvone cinORk Moveunt sete sevotees ve ) * Dg x woudec! fi System: > Be Asplay wwoulecl Piles he — belno eee 3d wed. ; Syn- woudl ) <> Iss comer is used to ltsphy —tw dheracler ist tes of Hee yeep jp aT bebo command tsb ued 4o display tia lak oot © all Aypes 0 Pilegystewns 7 aye Is a Leno sieg a ile Spplew — Theale el ts sect fo vemove a Dylesyslen. “Toe 3 commana wit clelede Tu correspouslivg Glawze Bow Te 7eFe Prey ad lial eho ee eae Oboe coer need clo camel tbe Psy se Before © emovlug a file eqstem sy tannr BUM _ “ends — Dele system nagabe FRE Pa phos ules of Silesys! i - Sha lasing coumaud’ usec le cheege filesystewr : o eee ayer eMs -o sige = mE” Mes ys a 2 ey dP -a sige = 250m psa S g - , ! coe is ed te 2e0n8 7 i 5 | AB a sie: vase sha ; i fa Gye! is iaeresse ta 2"5, 7 i i : cds -a sige = -12% esa 3 : a 3 Ce Ce i p> all. moudee! Bilesysteur sill be olaphyed, i aps : 0 » * nike loby ag i cay hepato cooqe eile be atisplged fy . o © cbacking tle Ble syste consis tency — t used to chock he Piksgsle constTency ancl peg rbot da etrackvess : wma Peck cmumanel bs a cies Jo ~wpaty Me ako) te swncoussdencies four, avd promphs syaten melo a cyou Ba permtas roy fo vepaly Hoos a wouded Fess, te calle to veuhy He” yes preyerls > yorusbouddl et were wats he Pek commancl on ) : ruth Ae syslene bools jtta Peele commen cl bene Sad Hsp fle systews” Ae uaswecessti | Peceiose onc ) To duck 4 coast dewey . 22 =e at alc aaa - is ied sta Silesqstes . Coe ayn Peck a Pilesysigen —— ge en € 3 } ta levies; — 3 Dy ctSicaded bog cbote te created on hele. toy roolyg _ ae eee is iustalled ) i eating a beg device: — d a ts (uereastug, we sbould cous ye vibes Toa size oP jou! Dlesysben ‘ 2 dev thes waevensivg He Se oP die teRuult fo4 con cranbeg {Due “Day cere - a — eee } } ‘ Dwi use witb command cod ices, You of Wv 1 jfsllog word flog wecordS- “Ths Sow Q i@ a Adidiotey beg leat ces — fo , fm dpgeleicrs oe ratielezed stag dog Pew command i a oe oe ao by cleaving af leq ste ekoices, jofalloge kutces Doalom Bev ruaabion abeud tuode aia Bllosiiig, conimaat~ Op hsphey isased Cisiad > ksh 7 3 one creed ee tors oly foe re iste jete | pas res atl rear 4 a pe aPler The le oe isdad Phesystexe . of fhe -*5) Trnobleshoolinag te sys” probes: — Trouble shook 4 sys ie Ses section ates” som of te problems neladed +o Bs Pe eee ee i i | a Brow ta tecle oy » Decooering, ~Pyow supet ee folowing exvot a Yrout Cow wdc problees way bea cor) superblock ucla mod, ax ates Lesystene ae fc: 904 on arKv3 > Pelee Ara cc Peceecn 9 AMY” = feces 07% ecoqnres ow Adee wmousk > javebicl aque Fitts -probless cox be ~veselved by esborivg backup of tee ty cauper blocle per le pimonyy cuperblek Wag, pelow Commarel 5 id counden bs=H!8 skipzar seek 2 ik - je yheoo S 3 4 cheese arbi fe tdev! yoo tpfile a 271 ewetl emo Pilesyskos tee Pile, > cbse all We files oP Pilesysi $50 Pose cone ea fit Hy uamourt a cued partido Pile using ted sey aileved ad flay weve Um) - 4 Aa tuo cues xe can Gee (Wi ullaw 2 ant esi Gre) wien, aver | othe Pile er a oo As vests tivst posblesn: se oma fae Hew Sig 75 vecome te ot cae! ae nent res ete qo wthed perliaday Ak esteg ad , ten aes 8 ape Me commowel -fbser —<—<————= cPesey —p -ohis ploy all We abl sens wih PIp ; ki oy gig MPD co ei okt tte process of otly ases 1h come of “xl prrtteddor Pile ond uawouk te ile: 6 gptee oP Bil caumanal —iill -4 PID Jal ove ae ell Arlegysens — aPder Jnshelleey be 0s Lavoe wow faevihdd 7% phowe ley clea = ee jusy jaev has rhea p Joev tnd rook Fev thade bby tbo t logical volo > A coudiains —epotable Piles feiev hd 6 > paqiacpere Jelev} hdy 9 = Ay sere : Jetev b hela ves — > [vast : - Jelev [helio PH ——> ppt ae deg ce, Blespplew vt? a —hULUrT——— eee ype -a shear A abo of crfs av Ailesystemnont 29 cia fibsysleunnoue » i 2) i i 3 i . ; S i vw i y | ? t at i Ss 3 | Sy | 5 ) oe i opi 1 yO 2B: 5 bp’ Th arp cmon — Nsploy. by elves (msc adavess ) —hrons lad oO £ Qproloce|. Et? i one Z 5 iy Core lees ee 19 od or) OLE utd pfge> aastiacibueanm CTS ! yh geyerg: tse austias ibmrcon CF o 5 LAO) > Fnckheg oa go J Poblem ccleterwssailion ancl yesolilicn one ete This piygeomond — fs is pwper covruit Dig ewimonel is uselal be d a > Delenuing te -slahs of cuby worclalory — pavamedte inden tactelyess Pag ‘poclchoss 8 pang 43-593 C4 SS> ne packeds “haan deal used lo see alwiliy Ibe couwcetion Sun weber & various tovaria dhools sobalvg havclunre. aot woftlsare probes 1989: Sbelecla bytes ~ ~5 43-5193 prN@ statistics 0 packets veatved, jon packed tase tig craberund Ho ~ physical is a modifies ia Adelvess resoulle on fables used bY 5-113) oh Chcompkte) ep retq6) ad oF, ssid ds ttre (eharat J stored fa btutect 4 6 Te teow ty uteten o— dis um ifort dwlertacenant r d % ifeoukg ene “Te show ouby those idence s ~Ihat ane town - vie --a -dl oa ee ee ae feel ey ee eptectives lus se (oc) comes |e) ae Peon fta —iwler-facenam od ta name op “Bi eoepl comman cls — mpl coumacel gueredes an error pert =frow - i ; 4 | 0— operatoy~ TO deupoveny errers “ Oo : po Hierro 7 _— _ ee . ee ° i p> ti alelenmiae 99727 7 la enph -a > olisplay, all ata Hu e707 4 exvpt -S > sno elated problew will be Sls eene Jy J erp} -# > py related problems will be alisplazed . 7G ' eript He ts & elea'ce Bo eid es ee i i jue fates ras lorry & “Cane u Tle below commancl is aseel lo “ciisplay vile errors bio the levtig eal enting slate, S dtastclate we enddale enpt TT below commancl is cae do alloplay a ersors ill Hoe dee cara tate 7 , expt re _. erréleay _@ -> Gai To. ee frown, exror log closiftedl 5 | softeae eriors a) . 2d _ as Pot yet 9 Te deige dle buh Rr sine on . s i; fase] bb] evr lemon -B Site : Loe vd Te dlege tue she of evleg in tcf 8 Fev bag ) psi hie fericemon -8 Site 3 Das [hb ferradewon = t dacation. > Sxpleaccanp!— 16 is} tbe caveat lamp cetinadion Tl bei commnanieed a use ol Sy Syschuupdevy -L vile we dala te 95, the olamp, elevice ts audmnarlicably cow be By TR “Te prinay leap like 3 LESTE, Sa Rg joy acd) te secouedery Slutcp ote 1S Bertaysshesvall ¢ tsa clecterled lunp clevree > primary temp eleoice > seemcbery clap levee ts, shaved. Hila priwary’, cbuparkore s Tie. bbws command is use to . Pom tole dele fo ~The logeabvolume Telev [ohumpole v o wee es despre -P -p dampen? webs pis wed b shoo tle jabemalon obo tin Thee commen prevous chap, — a LB spechonpeey ~b De : “TS cshovd —Ike prhaory 1 secouctany a cdeotens the below comme cuds ave usec! selunpslard =p —> Adializes Abe primary sq steely 6 gpcepshet = 8 aeconlery sqphende a clap baice | ta secondary HP ™ a : vlupeley cpg pevt hats oo “4 apse 3 34 The wae atye coy Mt clump wpace can best be ctekratandy oa ue below common 3 gelenp -* 1G yo Py 5: Monitoring ond Merldy wamce laut 5 Mowiloving ask Selb seayee me faa haclabine, 7 4 ‘ahatCtoan ened —loeeg S78 “The ervelemon pr] 1 ts tage a eee tory giles oherlap’ + however i be bee -krwivadeel “By 3 a on ch yale Ht, yon ee cael eid) Icblery lemon } seers ce 3 Te exislep commas! steps 4 Pp Whe stops dle ervey 3 leseaands lialged bey the cxrcbuon aan fag tee? : 3 a tus | Liblerrstop “Exe Jey tile: — Te cblensine cla path de aed 0c Spates error ty — ke Polos coumauel i= esced e ee ites if fase samamar vepord of Abe ex ovs chad ts seal Go ckaplay — & omplek. ' vecovele d=) ve Ie olbaieg commarcel C5 haven been ec) The evvelar commanel: — _ > Te Sele alt “Gi ealves lem te shapers aa - ihe ae tee ret oe” : pevecleay. 0 - ax i Ale ever boy chaasified os Ge ee ee ee eno errors (de evrow clas.” ec lenwat eden) 0-> operatow Por ayo errors Oo eae joxiory SSL eros fovceay —at H ay Ymucdeterninn errors wie Hlageloare errors Do enpt -d H > Ta display coblmre error > errpt -d 6 aliap lay athe ae sbrteble ne en J hele io ae ovverbeys beliocer — afeeles ) To temporary errors To teed poo peel eee ee ore can ceca usage) tent Tha Tastes pe —aperts lee ole olla Lema heads, vinhadl newer 1 9KS taps onl stale achoily oy Po oboplay tive suhmnentes ho econ ideals ype hllo commouel 7 #vastat 4s Aelisko acd bela ab summaries lor athe llosiog pace, Hep tad belle Ndislear 2 a> arte eltsphy ee vor of Bela cltce system atevtep, _commeau al: oe ent Ailosigg — a ee Bay i Aap cevmstad - of. dia ¢ 7 se ilk ai ee udiliget tm of cpa! dL collects, vepovts, (2%) sades fhe system ay TR Say comman: ju Qemation- —p‘oThe sav t t a activity % wepert Be ee eek eee for tha i | ent five | socouele sends iy i sey ' i “te —bpas cormavel : a, — > Tm —bpas commont je used “le See Abe cpa oli Vizedion 9 oy choses, 1” a rt wore bead sone neloorwle tvley proce S505” a) Tre dale! commoncl — chalaring ih telkvpees) Tye command ts weal te Vinal Bodh Thea datress ae B ap dokvess -bv inhy-faves nelelat cliskes and ep-rorts : p - oe Ly? To els play ctedailec! stobisties abou) a spectre alist, ny ome dia tostat -D (Db insld

apt a 7 7 eng TPF bbe sone err “res apple by ie ap hy aioe oe whan “yma ele labegreon ti ‘elaemou ——rt—— coef guratow — eee oa colts etn error bogging mtseege ‘sets, coool _Jewplate “repository lox weesongien catalog te uradicon fe _ 34 eedives a beep sg edivds “he: bebostoue of the sake E jp Bile qo clefermeut uleve, _ ‘ : et > Teasley eo tebe ages S ; yo guid the ervey mess-qes py) oe pL 5 ce 7 Tile Odpelse— a S 1) Vow seed: oS pSprVinstet a 6 Ss / Oe) op: Syston Gcfhuratine cepa sy mene = SATIMB tppeslamns 7 Feller wnemne*] Pat butts ope O Spb vane a rC——e . .. Saag ce node) i oO de - 7m thy kevaod ctivead Sheba 3 qumable swmadls over Te So 7 w vHy Pood! Le" age voroh yew place st Sa he Menor 1— Aba mati i : jo abou the usage of al onal w'rtaal, waews04 7 ama Achve vivluad. pages te np size of ttn “Pree beat R aye alton abou “ia page Putts & page sebvilies ve pager te dest : PE pages pagesl Prom pagiag, space ee ee oe (ee Bees eet ee i Sry pages aemec! i page Soi ‘ace - ny Pe eae = oO Fatt <7 “Frap arel atevsapt wale oe aaupleg teal ee eG - Star Deve wherupls ap Sy steimce lS a jaled scttels. cs ker) Thveael « cpu a brealeloum oP peraalage usage of cpu per acc over The GCeewe a) a us > wertioat, sy A syste I Jel Sr cpa tattle tow eo wooo? physical processor cousums PO ee > pevenshagé oh cabilesl capacd | consutcl » slid ~Ibe, apsles the ol joa > cpa lle to Seal cut ska ng elise [nrslFO VOUS Is we eeeeeve 0 p 5 Orion ° oheor guage 000} 9-001 ea Cony vert mere = Oa sign power ea gc epyen -Batped bee jy cieby wospoanbigne myths i m ep top reROE EPMO j ie | G er. | Oo. “pp rmeney i Se Li pwedeo puree 3° abaeored “ ee al i Cyperea srosroverd porridge" > j : sno see’ ports gem poh, <— oehyd ' poy aos ME uw “ 3 {9 : : spores OE RTH yooipa on TE - i Tae Sade FI ad wae ster 2 werk = : ! ane 00! o 2 a tao _ gion sho EM paséin i - by ergy cooypeonbe meee - a _softoitl go? wad ae 208 ae Tt NONMe aay cd ; 2 t hog. ce - je danse) > “The pevenilege OP the otha 7 physical lists os was aetive L KBP Ses Tota eenoet disk, dps > Tea woroh 0 -henely vegutsl the phayst cod) lsh -. Vbvea d o> Ta odes anos al a rrr poly Secor Poy oP ate venel Howe lish povide clo the Wate } keb-emtd pen ran 2 ” sone Je RAR me em nnin — ane rane ) —rrr———————FEL"_—SC SF comuucenlon probkwt = sstStstSCSCS welded oi uetslad ~6 >. cbtephy uatsted S$ > vatdek PP” 5 ww Be we ~ we ew whslad -aw — yon uaisted —™ —y lo clisplay 1m voakis crble shakes oP att tbe Peces _ utstat > -hies lo vente ti tp anldvess toa dostuowe walled ba ty ltyphy fda iprandlvess € prAe audahess 5 maT sige Hla. rude casks qatstal aeeory “gel oubvaes wield -¥ —% cloter aleiver tnDamadton : etepley Tee ctedistes Be all profecels ” wv peeie y utstat a 8g By adtion abeadd Shr secheds Bn oO goed OO 2D QO 5 é am SelO-P-+D-O 9 i ealey common chi — a = larcsercl isp, ovcl_t Bie stunud-lesaons by lp axel ley 7 all beohuessgyes | ave edlectel in a boot bag Ale, sre Loation of, boalsg le ts: psa ves bootleg. laser we at tavectigalig tle beotproblews sie wed to Ve ectata lle uae [ack fas [bootleg. aa > Te = ee bey oe te eae, DoT ‘beber commanel fo used bb atisplay all + leg files ok pore. ele Puwcl toy veer sys lean « 4g abog » “4 JT 2 Me Se > ased i : gy echo "bool wesigiag” | alog —+° hoof -5 8192 e bog eee] Ci CP Te erly tM bootleg th eee el \ i Hye cttel ate ie) @ _Usyel — of -lle boollg Ala hebw command «is hocss oP a ev clefivection ‘ oe pe renee i vee . To lags ie cn > Pepovts te EFF07» bel clorswt fx tls ‘ “lawn wp me Maes errors bah clectalt report o at <5 Peps errors and asks ip - ey should b be -thyect >] tes aece}—sepords lhe ele usey database, that alt Ila users enol ia ye veel aud Yove any er7ors creporleat Ubod ot Peed) , Ata below men, is seal usrek a ALL ee ee ee eel Aualions , those veers colo ave ult ies ase aed bee Plead boot au, elev SP asck gy AU eros vipetted ee J . - _. Beolivg voted Ble eros will seucl lo comole - mg ttplay lle couse Bib la belo commorel fo aseal ° _console ba { Your foe of y adiray = sted Sessa, Stet eo RE Koen aoe g@ococ. entadh * ~seawily Z vser Sian = Printer? Se qdeSeott loasdteg Pe Imancs turer) 7 arene alee ake Ae 17 oursp, Sudo a p GC - MKS YS, z Phen qfehenm oO" ye bath | 3 ~ Bedi Proceabs 16 fravt 2 27 = Col ved back ye bah 3° S SS AY hole oO Freeh nslaliab reese os soe > tnble oF Fe edacl ike alevices the bilo ieg comnarct gil! be usec — Seley Ce ape + reply We -bpe clevicas al Usdey -Ce lest: Ly seuplays ln ohsies o4 Oe | dole the bec lusp Bom ln xoolvg be bélow® cowmoand J usec! . ome Sye- vakeysb wie ~ Jolev /tapeuame Hie do create bo shoo! image a we —> excluck file eouck Excloding file systems Prom a hackey “= h Cag bap) wap bebe lain a ec legysb backup of a clo encluele seme ctada Mewsystues “CoP eCen eh ( woud systeees yaad you __ chrom ue 2 aston, fou need do edit Ale lelelenclcle veotug tre Fo: cxclucle tte. fe: so) sated co Plgs Ite below, proceclerss : Heat fete leveluck noah se tists tle coudedls of lle Pile. BP goo oad) erelaale ua Plecgstens, rom our wiksyss backup, ard de te ewe to 7 fiw fete foreacdenecoy a wen Ailes Go Ab] yp lets Gilets syelcled you veokyg : we a ale beclup Pros of olvg — alla lhe ape spreas, Th do I slo sms) = ae sms wan CT lo Ly selec} tape a eh tpess *) a TF starts — booting pemaat ly . Ig Soptiow selec} yrauitleinde mode Ig waesysb recovery Ag 3 vb 2oplion shin exact PL 1 i sllabb au es - ceed

Vous aimerez peut-être aussi