Professional Documents
Culture Documents
cover
Front cover
Student Notebook
ERC 6.0
Trademarks
The reader should recognize that the following terms, which appear in the content of this
training document, are official trademarks of IBM or other companies:
IBM is a registered trademark of International Business Machines Corporation.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
AIX AIX 5L Alerts
AS/400 CICS DB2
DS4000 eServer FlashCopy
HACMP i5/OS iSeries
Magstar Micro Channel Micro-Partitioning
Notes OpenPower POWER
POWER2 POWER3 POWER4
POWER5 POWER5+ POWER6
POWER Hypervisor PowerPC PowerPC Reference
Platform
PowerVM pSeries Redbooks
Requisite RS/6000 System i
System p System p5 System Storage
Tivoli TotalStorage xSeries
Adobe is either a registered trademark or a trademark of Adobe Systems Incorporated in
the United States, and/or other countries.
Java and all Java-based trademarks and logos are trademarks of Sun Microsystems, Inc.
in the United States, other countries, or both.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or
both.
Microsoft, Windows and Windows NT are trademarks of Microsoft Corporation in the
United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, or service names may be trademarks or service marks of others.
The information contained in this document has not been submitted to any formal IBM test and is distributed on an as is basis without
any warranty either express or implied. The use of this information or the implementation of any of these techniques is a customer
responsibility and depends on the customers ability to evaluate and integrate them into the customers operational environment. While
each item may have been reviewed by IBM for accuracy in a specific situation, there is no guarantee that the same or similar results will
result elsewhere. Customers attempting to adapt these techniques to their own environments do so at their own risk.
Copyright International Business Machines Corporation 2000, 2008. All rights reserved.
This document may not be reproduced in whole or in part without the prior written permission of IBM.
Note to U.S. Government Users Documentation related to restricted rights Use, duplication or disclosure is subject to restrictions
set forth in GSA ADP Schedule Contract with IBM Corp.
V5.1
Student Notebook
TOC Contents
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
viii AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
xii AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
xiv AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
TMK Trademarks
The reader should recognize that the following terms, which appear in the content of this
training document, are official trademarks of IBM or other companies:
IBM is a registered trademark of International Business Machines Corporation.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
AIX AIX 5L Alerts
AS/400 CICS DB2
DS4000 eServer FlashCopy
HACMP i5/OS iSeries
Magstar Micro Channel Micro-Partitioning
Notes OpenPower POWER
POWER2 POWER3 POWER4
POWER5 POWER5+ POWER6
POWER Hypervisor PowerPC PowerPC Reference
Platform
PowerVM pSeries Redbooks
Requisite RS/6000 System i
System p System p5 System Storage
Tivoli TotalStorage xSeries
Adobe is either a registered trademark or a trademark of Adobe Systems Incorporated in
the United States, and/or other countries.
Java and all Java-based trademarks and logos are trademarks of Sun Microsystems, Inc.
in the United States, other countries, or both.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or
both.
Microsoft, Windows and Windows NT are trademarks of Microsoft Corporation in the
United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, or service names may be trademarks or service marks of others.
xvi AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Duration: 5 days
Purpose
The purpose of this course is to show a UNIX system administrator
how they can install, customize, and administer the AIX 6 operating
system.
Audience
Anyone responsible for the system administrative duties in
implementing and managing systems capable of running the AIX 6
operating system.
This course is targeted for SUN Solaris, HP-UX, or other UNIX system
administrators with at least twelve months of experience in UNIX
administration and other relevant education.
Prerequisites
The students attending this course should have at least one year of
UNIX system administration experience and be able to:
Write shell scripts
Install a UNIX operating system
Install and configure layered products
Start up and shut down the system
Monitor system usage and performance
Create user accounts
Solve user and system problems
Create, configure, and back up file systems
Configure and manage networks
Objectives
On completion of this course, students will be able to:
Describe how to install the AIX 6 operating system
Describe and use the system management tools
Install software bundles and filesets
Perform system startup and shutdown
Manage physical and logical devices
Perform file system management
Perform and restore system backups
Configure TCP/IP
Locate and analyze system error logs
Contents
Unit 1: System hardware overview
Unit 2: System management tools and documentation
Unit 3: Software installation and maintenance
Unit 4: Devices
Unit 5: ODM
Unit 6: System boot: Hardware
Unit 7: System boot: Software
Unit 8: AIX 6 installation and initial configuration
Unit 9: The Logical Volume Manager
Unit 10: Storage management with LVM
Unit 11: Managing file systems
Unit 12: Paging space
Unit 13: Backup and restore
Unit 14: TCP/IP configuration
Unit 15: Error logs and syslogd
xviii AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Documentation References
The following will be used to indicate where a particular referenced document can be
located:
Info Center Indicates that a referenced document can be found in the AIX
Information Center. This is located at:
http://publib.boulder.ibm.com/infocenter/pseries
Redbooks Indicates that a referenced document can be found in the IBM
Redbooks Web site. This is located at:
http://www.redbooks.ibm.com
General product information can be found on-line at http://www.ibm.com.
pref Agenda
Day 1
Welcome
Unit 1 - System hardware overview
Exercise 1 - System hardware overview
Unit 2 - System management tools and documentation
Exercise 2 - System management tools and documentation
Unit 3 - Software installation and maintenance
Exercise 3 - Software installation
Day 2
Unit 4 - Devices
Unit 5 - The Object Data Manager (ODM)
Exercise 4 - The Object Data Manager (ODM)
Unit 6 - System boot: Hardware
Exercise 5 - System boot: Hardware
Unit 7 - System boot: Software
Day 3
Unit 8 - Installation and initial configuration
Exercise 6 - System boot: Software
Unit 9 - The Logical Volume Manager (LVM)
Exercise 7 - LVM
Unit 10 - Storage management with LVM (Topic 1)
Day 4
Unit 10 - Storage management with LVM (Topics 2 and 3)
Exercise 8 - Storage management with LVM
Unit 11 - Working with file systems
Exercise 9 - Working with file systems
Unit 12 - Paging space
Exercise 10 - Paging space
Unit 13 - Backup and restore (start)
Day 5
Unit 13 - Backup and restore (Conclude)
Exercise 11 - Using backup and restore
Unit 14 - TCP/IP configuration
xxii AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
All documents can be found in the AIX Information Center:
http://publib.boulder.ibm.com/infocenter/pseries
General product information can be found on-line at:
http://www.ibm.com
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
Notes:
1-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
What is a partition?
Partition
Allocation of one systems resources to create logically separate systems
Each partition is an independent operating environment
Notes:
Partition
When a computer system is subdivided into multiple, independent operating system
images, those independent operating environments are called partitions. The resources
on the system are divided up among the partitions. Applications running on a partitioned
system do not have to be redesigned for the partitioned environment.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
This page defines physical partitioning which we will contrast with logical partitioning on
the next visual. IBM System p servers support logical partitions, not physical partitions.
PPARs
The visual shows an example of a system with three system building blocks, each made
up of a number of processors, an amount of memory, and a number of I/O slots. These
three building blocks can be configured into one, two, or three partitions with each one
made up of one or more entire building blocks. The size of the building blocks depends
on the vendor and system model.
1-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Implemented in firmware
The system uses firmware to allocate resources to partitions and manage the access to
those resources. While there are configuration rules, the granularity of the units of
resources that can be allocated to partitions is very flexible. You can add just a small
1-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty amount of memory if that is all that is needed without a dependency on the size of the
memory cards or without having to add more processors or I/O slots that are not
needed.
Firmware refers to underlying software running on a system independently from any
operating system. On IBM System p5 or p6 systems, this includes the software used by
the Flexible Service Processor (FSP) and the POWER Hypervisor.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Partition characteristics
Each partition has its own:
Operating system
Licensed Internal Code (LIC) / Open firmware
Console
Resources
Assorted aspects which are expected in a stand-alone operating system
environment:
Problem logs
Data (libraries, objects, file systems)
Performance characteristics
Network identity
Date and time
Notes:
Characteristics of a partition
The visual above illustrates how each partition is independent. As stated before, each
partition runs its own operating system. The version of the operating system may be
any valid version which is supported on the system. Other things you would expect on a
physically separate system are also separate for partitions; there are even independent
virtual consoles.
What attributes are the same between partitions on the same system?
Each partition shares a few physical system attributes, such as the system serial
number, system model, and processor feature code with other partitions. In addition,
you may choose to share other hardware, such as SCSI devices, among partitions.
1-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Partition resources
Resources are allocated to partitions
Memory allocated in units as small as the LMB size
Dedicated whole processors or shared processing units
Individual I/O slots
Including virtual devices
A = Adapter
M = Memory
P = Processor
Copyright IBM Corporation 2008
Notes:
Resources
Resources are the system components that are configured into partitions. The details of
the configuration rules for each resource will be covered in later units of this course.
The maximum number of partitions is related to the total amount of resources on the
system. For example, a system with eight processors can be configured with a total of
80 partitions (if there are sufficient resources). If a system has enough resources, the
upper limit of the number of partitions is 254.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Memory
Memory is allocated in units known as the Logical Memory Block (LMB). The default
LMB size is variable depending on the total amount of physical memory installed and
may be as small as 16 MB. A partition may be configured with as little as 128 MB of
memory or as much as all of the available memory.
Processors
A partition is configured with either dedicated whole processors or shared processors.
Shared processors are allocated in processing units. The processing power of one
processor is equivalent to 1.0 processing units. Partitions are configured with at least
0.1 processing units or with as much as the equivalent to all of the available physical
processors. After the 0.1 minimum is satisfied, additional processing units can be
allocated in quantities of 0.01 processing units.
I/O slots
I/O resources are allocated to partitions at the slot level. At minimum, you must
configure a partition with enough I/O resources to include the boot disk and a network
connection.
Shared devices
With software called the Virtual I/O Server installed in a special partition, Ethernet and
storage devices can be configured to be shared between partitions.
1-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Processors
Memory
I/O Slots
Notes:
Introduction
This visual above shows how a systems resources might be divided between four
partitions. With logical partitions, resources can be allocated based on computing
needs. You do not need to allocate all resources to partitions, that is, some resources
may remain unallocated until they are needed.
1-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
The visual above lists example IBM POWER5, POWER5+ (with Q suffix), or POWER6
processor-based servers which support logical partitioning. The list on the visual is not
comprehensive; check www.ibm.com for the current up-to-date list.
There are OpenPower systems which support only Linux, while the other systems
support AIX 5L, AIX 6, and Linux, with certain models also supporting i5/OS.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
1-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Service
Processors
Processor
Memory Ethernet
LPAR
I/O Slots
Allocation
Tables
Notes:
Introduction
This picture brings together several concepts:
- Partitions are independent operating environments and their resources are
managed by the Hypervisor.
- NVRAM is used on the managed system to hold a copy of the partition configuration
so that if the HMC or the network were to fail, the partitions can continue to run and
even reboot if necessary.
- Partitions are configured and managed on the HMC, which is a separate Linux PC
console. A copy of the partition configuration data is also kept on the HMC (in
addition to NVRAM).
- The HMC is connected to the managed system through an Ethernet connection to
the service processor. The service processor is a separate, independent processor
1-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty that provides hardware initialization during system load, monitoring of environmental
and error events, and maintenance support.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
This page lists the advanced partition features covered in the rest of this unit.
1-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Dynamic partitioning
Dynamic partitioning refers to the ability to move resources between partitions without
shutting down the partitions. The opposite of dynamic partitioning is static partitioning,
where new configurations are only used when a partition is reactivated.
DLPAR operations do not weaken the security or isolation between LPARs. A partition
only sees resources that have been explicitly allocated to the partition, along with any
potential connectors for additional virtual resources that may have been configured.
Resources are reset when moved from one partition to another. Processors are
reinitialized, memory regions are cleared, and adapter slots are reset.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
DLPAR operations
You can add, remove, and move resources between partitions. The resources include
memory regions, processing units, and I/O slots. This can be accomplished from the
HMC application or using HMC command-line commands.
With virtual devices, you may add or remove them, but you cannot move them directly
from one partition to another. You can, however, dynamically change the configuration
that specifies what type of virtual adapter is in a virtual slot. Other partition options that
can be reconfigured dynamically will be covered later in this course.
1-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Processor concepts
Logical
Shared
Dedicated
Inactive
(CoD)
Deconfigured
Physical
(Installed)
Notes:
Introduction
This visual summarizes the various concepts concerning POWER5 processors. Along
the bottom are whole, physical processors installed in the computer system. These are
configured in various ways into the three partitions.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Deconfigured
A physical processor may be automatically deconfigured from the system due to
detected errors or user deconfiguration.
Virtual processors
Since an SPLPAR does not have a specific physical processor allocated to it, it needs
to be presented with a virtual equivalent for use by its CPU scheduling mechanisms.
These are referred to as Virtual Processors. If you were to allocate 2.0 processing units
to a partition, the partition may get bits of execution time on up to 20 physical
processors. This concept is known as virtual processors.
Logical processors
If simultaneous multi-threading is enabled for AIX 5L Version 5.3 or AIX6, then each
virtual processor or physical processor is utilized as if it were two logical CPUs. In other
words, AIX can simultaneously execute two threads on a single processor.
1-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Micro-partitioning
Time-sliced sub-processor allocations are dispatched
according to demand and entitled capacity
Physical
Processors
Partition 1
P P P P Partition 2
Partition 3
10ms
Partition 4
Partition 5
Partition 6
Partition 7
Notes:
Micro-partitioning
Micro-partitioning is defined as the ability to create a partition and allocate fractional
amounts of processing capacity to it.
Processing power may be allocated to partitions using dedicated processors or shared
processors. For shared processor partitions, processing power may be allocated in the
granularity of 0.01 processing units. A partition must have a minimum of 0.1 processing
units.
The visual above shows seven partitions being run on a processing pool of four physical
processors. The diagram represents a single 10 millisecond (ms) interval. Each
partition gets a percentage of the execution dispatch time on the processors in the pool,
based on its capacity assignment. Do not worry as we will come back to this later. This
page is here to give you some basic terminology until we reach the advanced processor
topic later in this course.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Virtual I/O
Each partition has virtual I/O slots
Configurable for each partition
Virtual slots can have a virtual adapter instance
Ethernet or SCSI
Can be dynamically added or removed just like physical I/O
slots
Cannot be dynamically moved to another partition
Notes:
1-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Virtual SCSI
The virtual SCSI option provides access to block storage devices in other partitions
(that is, device sharing). It uses the client/server model where the server exports disks,
logical volumes, or other SCSI-based devices, and the client sees the imported device
as a standard SCSI device.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Client/server relationship
Virtual I/O devices provide for the sharing of physical resources, such as adapters and
SCSI devices, among partitions. Multiple partitions can share physical I/O resources
and each partition can simultaneously use virtual and physical (natively attached) I/O
devices. When sharing SCSI devices, the client/server model is used to designate
partitions as users or suppliers of resources. A server makes a virtual SCSI server
adapter available for use by a client partition. A client configures a virtual SCSI client
adapter that uses the resources provided by a virtual SCSI server adapter.
If a server partition providing I/O for a client partition fails, the client partition might
continue to function depending on the significance of the hardware it is using. For
example, if the server is providing the paging volume for another partition, a failure of
the server partition will be significant to the client.
1-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Virtual Ethernet
There are two main features to virtual Ethernet. One is the inter-partition virtual switch
to provide support for connecting up to 4,096 LANs. LAN IDs are used to configure
virtual Ethernet LANs and all partitions using a particular LAN ID can communicate with
each other.
The other feature is a function called Shared Ethernet adapter that bridges networks
together without using TCP/IP routing. This function allows the partition to appear to be
connected directly to an external network. The main benefit of using this feature is that
each partition need not have its own physical network adapter.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
1-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty On/Off CoD provides temporary additional processor or memory resources. Usage is
measured and charged based on the number of days the resource was activated (even
if activated for only a few minutes on a given day). Activity is reported to IBM monthly
and there must be an On/Off Capacity agreement.
Utility CoD is similar to On/Off CoD, except that usage is measured and charged in
units of minutes rather than days. Utility CoD is supported by POWER6
processor-based systems.
Capacity BackUp adds reserve processor and memory capacity to a backup server in
the event of an unforeseen loss of production server capability due to forces beyond
your control. You can divert entire workloads to backup servers for up to 90 days. There
is an upfront fee and an emergency-use fee, which include testing.
Reference
For more information, visit the IBM Web site (www.ibm.com) and search for CoD or
use this link: http://www.ibm.com/systems/p/cod/types.html
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Feature description
The PowerVM, previously known as Advanced POWER Virtualization (APV) feature,
provides (in the Standard Edition):
- Shared processor pool and Micro-Partitioning. If enabled on POWER6 systems it
also includes:
Shared Dedicated Capacity, so partitions with dedicated processor can donate
unused cycles.
Multiple Shared Processing Pools which enables the configuration of more pools
in addition to the default shared processing pool.
- Virtual I/O Server (VIOS) software for sharing virtual SCSI and Shared Ethernet
adapters
- Integrated Virtualization Manager which provides a significant portion of HMC
functions in a partition rather than requiring a separate management console.
1-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty - The original POWER5 APV features only Partition Load Manager software for
automating dynamic logical partitioning operations based on system workload
At initial order entry, selecting the feature code will result in the enabling of
Micro-Partitioning during the manufacturing process and the additional software media
and publications will be shipped to the customer. When ordering the feature as an MES,
an activation key will be posted on an IBM Web site and the customer must retrieve it
and install it on the system.
Once the Virtualization feature is installed in a system, it cannot be removed.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
POWER6 technology is built with a new set of individual components that benefit from each
other, providing higher performance.
POWER6 is based on the following:
New advanced semiconductor technology
New processor design. POWER6 processor is the 9th generation 64-bit processor and
5th generation POWER processor
New system architecture
New virtualization plateau with enhanced capabilities
New HMC v7 code
New PHYP microcode
Operated by a new AIX 6 version
1-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty The high frequency of the POWER6 clock is based on semiconductor technology
improvement and processor design.
The system architecture has been redesigned including node interconnect.
The I/O drawer uses a new interface called GX+ bus. It is similar to 12 channel InfiniBand
connection.
The I/O subsystems are also new using PCI express and Serial Attachment SCSI (SAS).
Special attention has been given to power consumption of the system at all phases of the
design.
The Hardware Management Console (HMC) version 7 has been redesigned with a new
graphical interface supporting the POWER6 feature set.
POWER6 also has new virtualization tools added such as the Partition Mobility feature.
This provides a way for administrators to perform service on demand (SoD).
The AIX 6 UNIX operating system makes the most of the POWER6 technology, with a
strong focus on security and availability. AIX 6 also provides increased application
scalability and performance.
AIX 6 provides new functionalities, includes improvements over previous versions, and
introduces new software concepts, such as workload partitions.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
g
Scalin
-way
1- to 64
s
System
Notes:
Introduction
Since the introduction of POWER5 (and continuing with POWER6), the System p and
System i LPAR-capable hardware systems now use the same basic hardware platform,
with the exception of the I/O subsystem. The same HMC can be used for both System i
and System p managed systems.
The machine type and model numbers shown in the visual above are examples and are
specific to the IBM System p5 and p6 servers. There are differences between these and
the System i servers in both packaging and licensing. Check the IBM Web site
(www.ibm.com) for the most up-to-date information.
Not all system models support all three operating systems.
1-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Complete details on
available systems
can be found on
this IBM Web site
Sample configurations
will be described on
the next few pages
http://www-03.ibm.com/systems/p/
Notes:
Detailed information
The available systems that can be purchased are constantly updated. You can find
complete details on the servers and options at this Web site.
1-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Deskside
Notes:
Introduction
The p5-520 and p5-520Q are available in a deskside or rack-mount configuration. The
rack-mount system is 4U in height and may be mounted in the IBM RS/6000 7014
Model T00 Enterprise Rack, the IBM RS/6000 7014 Model T42 Enterprise Rack, or
other standard 19 rack units provided that the rack conforms to the EIA-310-D
standard.
Eight hot-swap disk bays, six-hot swap PCI-X slots, two Slimline media bays for
DVD-ROM and DVD-RAM, and one media bay for a tape drive are supported in the
system.
LPAR support
Up to 20 partitions are supported with the purchase of the PowerVM (feature code 7940
for the p5-520) when the system has two processors. If the system has four processors,
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
as with the 520Q model, up to 40 LPARs are supported. Without the PowerVM feature,
dedicated processors must be used, so a maximum of two or four partitions are
supported depending on the number of physical processors.
Memory DIMMs
Memory DIMMS must be installed in quads. Mixed capacities within a quad will result in
reduced reliability. A maximum of two sets of four are supported. Memory DIMMS must
be installed in certain slots; refer the Technical Overview redpaper for details and sizes.
System components
The p5-520 and p5-520Q contain up to 11 bays. There are four front-accessible,
hot-swap-capable disk bays in a minimum configuration, with an additional four
hot-swap-capable disk bays optional. Two of the remaining three bays can be used for a
DVD-ROM and a DVD-RAM, and the third bay can contain a tape drive.
The following integrated devices are also included:
- Six hot-swap 3.3v PCI-X slots
- Service processor
- Two 10/100/1000 Ethernet ports
- Two USB ports
- Dual ported internal Ultra320 SCSI controller with optional RAID adapter
- Hot-swap power and cooling (Redundant power is optional)
- Redundant cooling
- Two serial ports
- Two HMC ports
- Two remote I/O (RIO) ports
Disk drives
The following disk drives are available for the p5-520 as of the writing of this course
(check www.ibm.com for the most up-to-date information):
- 73.4 GB 10,000 RPM Ultra320 SCSI Disk Drive
- 146.8 GB 10,000 RPM Ultra320 SCSI Disk Drive
- 300 GB 10,000 RPM Ultra320 SCSI Disk Drive
- 36.4 GB 15,000 RPM Ultra320 SCSI Disk Drive
- 73.4 GB 15,000 RPM Ultra320 SCSI Disk Drive
In manufacturing, the boot disk is placed in slot 8. If the system has one 4-pack
installed, disks are then filled in slots 7, 6, and 5. If two 4-packs are installed, disks are
filled in slots in this order: 4, 7, 3, 6, 2, 5, and 1. This balancing is for manufacturing test
purposes only and is not due to any limitation.
There is one dual ported Ultra320 SCSI controller integrated into the system planar that
is used to drive the internal disk drives. The eight drives plug into the disk drive
1-38 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty backplane, which has two separate SCSI buses with four disk drives per bus. This
allows each disk pack to be allocated to separate partitions if the second disk pack is
connected to a separate plug-in Ultra320 PCI-X adapter. For this configuration, the
system must be ordered with feature code 6594.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
PowerVM (optional)
Express Edition
Up to three partitions on the server using IVM
Standard Edition
All the virtualization features using an HMC
Enterprise Edition
All the virtualization features using an HMC + Partition Mobility
Notes:
The p520 supports single or dual-core POWER6 modules on a single or dual-chip planer.
Each POWER6 module has 8 MB of L2 cache. In a four-core configuration, the system can
contain up to 64 GB of memory via eight DDR2 memory DIMM slots. The p520 can contain
six 3.5" SAS disk bays, which can accommodate up to six SAS disk drives with 73, 146 or
300 GB capacity supporting a maximum of 1.8 TB of internal disk storage. All disk bays are
direct dock and hot-pluggable. The server offers two Ethernet 10/100/1000 Mbps ports, or
optionally four 10/100/1000 Mbps Ethernet ports, or two 10 Gb Ethernet ports.
The RAM configuration options are dependent on the number of processor cores. For
example, one-core systems may have a maximum memory size of 16 GB and do not
support I/O drawers; two-core systems may have a maximum of 32 GB of memory and
support four I/O drawers.
P6-P520 supports AIX (v5.3 or later) and Linux distributions from Red Hat (RHEL4.5 or
later) and SUSE Linux (SLES10 SP1 or later) operating systems.
1-40 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
The p5-550 and p5-550Q are architecturally similar to the p5-520, except that they have
greater expansion capability. These models support more processing power, memory,
and I/O expansion than the smaller p5-520.
These models have five hot-swap 3.3v PCI-X slots or four hot-swap 3.3-V PCI-X slots
and one slot to support the Dual Port RIO-2 I/O Hub.
I/O drawers
The p5-550 servers can be attached to 7311-D20 I/O drawers using the standard RIO-2
ports or the optional Dual Port RIO-2 I/O Hub. You can attach a maximum of eight
drawers per system and configure a maximum of two RIO loops.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
LPAR support
The maximum number of partitions supported with the purchase of the PowerVM is 10
times the number of physical processors. Without the feature, dedicated processors
must be used, so a maximum of one partition per physical processor is supported.
Rack-mount system
The rack-mount system is 4U in height and may be mounted in the IBM 7014 Model
T00 Enterprise Rack, the IBM 7014 Model T42 Enterprise Rack, or another standard
19 rack unit provided that the rack conforms to the EIA-310-D standard.
1-42 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
PowerVM (optional)
Express Edition
Up to three partitions on the server using IVM
Standard Edition
All the virtualization features using an HMC
Enterprise Edition
All the virtualization features using an HMC + Partition Mobility
Notes:
The p6-p550 supports up to eight processors (at 3.5 or 4.2 GHz) and up to 256 GB of
memory.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
System components
The p5-560Q and p5-570 use a rack-mounted server drawer as their basic building
block and can be configured with up to two system drawers for the p5-560Q or up to
four system drawers for the p5-570 in a single rack that are cabled together to create a
single symmetric multiprocessing (SMP) system.
One of the main p5-560Q and p5-570 differences from the entry level models, is that
the processors are installed in cards rather than on a planar.
Each drawer of a p5-570 system contains six disk drive bays and six 3.3 volt PCI-X
slots. With up to 24 disk bays, the model 570 can accommodate up to 3,523.2 GB of
internal disk storage. Each drawer can also hold two DVD-RAM or DVD-ROM drives.
Other integrated features include:
- Service processor
- Two 10/100/1000 Ethernet ports per drawer
1-44 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
LPAR support
Up to 160 partitions on a 16-core server are supported with the purchase of the
PowerVM. Without this feature, dedicated processors must be used, so a maximum of
one partition per physical processor is supported.
Racks
The system is 4U in height and may be mounted in the IBM RS/6000 7014 Model T00
Enterprise Rack or the IBM RS/6000 7014 Model T42 Enterprise Rack. For p5-570
configurations with two, three, or four drawers, all drawers must be installed together in
the same rack, in a continuous space of 8U, 12U, or 16U within the rack.
The design of the p5 model 570 is optimized for use in an IBM 7014-T00 or T42 rack.
Both the front cover and the processor flex cables occupy space on the front left side of
an IBM 7014 rack that may not be available in typical non-IBM racks. The SMP cables
were specifically designed to support seamless (four-core node) upgradability and
future concurrent maintenance features of these POWER5 systems.
The use of non-IBM racks may limit a customer's ability to exploit these ease-of-use,
upgradeable and serviceable enhancements in the future.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1-46 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
p5-570 p6-570
Separate DASD and media controllers Same controller for DASD and media
Two DASD controllers One SAS and SATA DASD / media controller
One of the following:
Two 1 Gb Ethernet ports
Two 1 Gb Ethernet ports Four 1 Gb Ethernet ports
Two 10 Gb optical SR Ethernet ports
IVE Ethernet controller
Rack indicator port No rack indicator port
Notes:
The point-to-point cabling is done by flex cables.
POWER6 uses an optimized SMP flex cable set for each drawer configuration. There are
various possible configurations requiring SMP cable connections between the drawers.
These cables are ADDITIVE.
The FSP flex cable is located at the rear of the system and is used for FSP communication
between the drawers. There are specific cables depending on the number of drawers.
Although the FSP (service processor) function is implemented in Drawer 1 (also in Drawer
2 with redundant FSP function at GA2), this card is required in every drawer.
The Service Processor cards in the 3rd and 4th drawers are not utilized. However, the
cards are required for signal distribution functions inside the drawer and, therefore, require
the FSP cable to be attached to each drawer in the system configuration.
You must think about a migration scenario when moving from a p5-p570 using SCSI disks
to a p6-p570 with SAS disks.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Also, think about ordering new adapters as PCIe type in order to free up PCIX slots so you
can reuse old configuration adapters.
1-48 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
p5-590
8-, 16-, 24- or 32-core 2.1 GHz
processors
Up to 1 TB memory
Up to eight I/O drawers
Up to 254 partitions
160 PCI-X slots
128 disks for (9.3 TB)
p5-595 differences
16- to 64-core 2.1 or 2.3 GHz
processors
Up to 2 TB memory
Up to 12 I/O drawers
Rack-mount (24 42U)
Notes:
p5-590 overview
The p5-590 uses an 8-, 16-, 24- or 32-core Multi-Chip Module (MCM) symmetric
multiprocessing (SMP) design. It supports up to 254 partitions and up to eight I/O
drawers, with the first one required. Mainframe-inspired RAS features on this system
include selective dynamic firmware updates, a redundant service processor, and a
redundant power subsystem with an optional redundant battery backup. The p5-590
can be contained in one or two system frames, depending on how many I/O drawers
are installed.
p5-595 overview
The p5-595 is similar to the p5-590, although it allows for greater scaling. The p5-595
uses a 16-, 24-, 32-, 40-, 48-, 56- or 64-core MCM SMP design. It also supports up to
254 partitions, but it can support up to 12 I/O drawers. There are no physical differences
between the p5-590 backplane and the p5-595 backplane.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
MCM overview
POWER5 chips can be packaged in different ways such as Multi-Chip Module (MCM),
Dual Chip Module (DCM), or mounted on a system planar. MCMs are used as basic
building blocks on high-end SMPs, such as the p5-590 and p5-595 systems. Each
MCM is an eight-core building block with four POWER5 (or POWER5+) chips (eight
cores) and four L3 cache chips each.
The IBM Sserver p5 590 and 595 Technical Overview and Introduction redpaper has
detailed information on the MCM design.
System frame
Both the p5-590 and p5-595 systems are based on the same 24-inch wide, 42 EIA
(42U) height frame. For additional capacity, either a powered or non-powered frame can
be configured for a p5-595. The second frame must be powered for systems with 48- or
64-core and more than four I/O drawer configurations.
I/O drawers
The I/O drawers provide internal storage and I/O connectivity to the system. Both the
p5-590 and p5-595 use remote I/O drawers (4U) for directly attached PCI or PCI-X
adapters and SCSI disk capabilities. A minimum of one I/O drawer (FC 5791 or FC
5794) is required per system.
Each I/O drawer is divided into halves which are powered separately. Each half
contains 10 blind-swap PCI-X slots (3.3 volt) and one or two Ultra3 SCSI 4-pack
backplanes for a total of 20 PCI slots and up to 16 hot-swap disk bays per drawer
(these adapters do not support external SCSI device attachments).
1-50 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
I/O drawers
The I/O drawers listed in the visual above are connected to the system planar using a
RIO-2 loop configuration. They are connected to the systems using the RIO ports on the
systems. The exception is the new G30 I/O drawer which is connected using 12X
(InfiniBand) ports on special GX adapters which are available for the POWER6
processor-based systems.
The PCI-X slots and disks in these drawers can be accessed directly by the system
processors.
There are other I/O options available which are connected through a fibre channel
controller and these devices are seen as external devices to the system.
For additional information about storage solutions go to the IBM System Storage and
TotalStorage Web site (www.ibm.com/servers/storage).
1-52 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Rear
Rack RIO-2
indicator port ports PCI-X slots
Copyright IBM Corporation 2008
Notes:
7311-D20 description
7311-D20 I/O drawers can be attached to the p5-520s using the standard RIO-2 ports.
A maximum of four RIO-2 I/O drawers and one RIO loop are supported on the model
520. The D20 is the only I/O expansion drawer option available for the p5-520.
Disk are in six-packs of hot-swappable disks; 36.4, 73.4 or 146.8 GB in size.
There are seven 64-bit 133 MHz 3.3V hot-plug PCI-X slots.
The drawer comes standard with one hot-pluggable power supply. An optional
redundant power supply may be configured.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The new G30 drawer offers better performance for I/O subsystem connection than the D20.
The G30 connection to the CEC uses a dual channel InfiniBand interface.
It has higher bandwidth to get the maximum throughput and to scale with the POWER6
CEC performance.
Modular growth is allowed for increasing I/O requirements, and up to four G30 expansion
units can be attached in a loop using the GX dual port 12X channel attach adapter.
Two loops for each CEC are supported.
No DASD slots are available in the G30 I/O drawer.
1-54 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Service processor
Functions of the service processor
System initialization
Connection to the HMC
Web-based Advanced System Management Interface (ASMI) for setting system
flags
Hardware error detection
Notes:
Service processor
The service processor performs many vital Reliability, Availability, and Serviceability
(RAS) functions.
The service processor is an embedded controller that is based on a processor which is
separate for the Central Electronics Complex (processors and memory) and is used to
run both the Power Hypervisor and the partition operating systems, such as AIX.This
separate processor runs a unique service processor internal operating system which
contains specialized programs and device drivers.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
several remote power controls, environmental monitoring (only critical errors are
supported under Linux), reset and boot features, remote maintenance and diagnostic
activities, including console mirroring. The service processor can place calls to report
surveillance failures, critical environmental faults, and critical processing faults.
SPCN ports
There are two SPCN ports to control the power of the attached I/O subsystem. The
SPCN control software is run on the service processor along with the service processor
software.
1-56 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
PC-based console
Running custom Linux and Java application
Remotely accessible
Connects to Service Processor over private or open network
Desktop Rack-mount
Notes:
HMC description
The HMC is a PC-based console that is available in either a desktop or rack-mount
model. It runs a customized version of Linux with a Java-based management
application. The user can only access the management application and no additional
applications may be installed. A second HMC may be connected to a single managed
system for redundancy. Multiple managed systems may be managed by a single HMC.
The HMC is required for systems running LPARs and is the same HMC that is used for
IBM System i servers.
There are desktop and rack-mount models of HMCs, all with the machine type of 7310.
Desktop models have the model numbers C03, C04, C05, and C06 as of March 2008.
Rack-mount models have model numbers CR2, CR3, and CR4 as of August 2005. The
rack-mount model is a 1U, 19-inch rack-mountable drawer supported in the 7014 Model
T00 and T42 racks.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1-58 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
The Banner, across the top of the workplace window, identifies the product and logo. It is
optionally displayed and is set by using the Change User Interface Settings task.
The Task bar, located below the banner, displays the names of any tasks that are running,
the user ID you are logged in as, online help information, and the ability to log off or
disconnect from the console. (In the above example we see that hscroot is logged in and
has the ability to logout).
The Navigation pane, in the left portion of the window, contains the primary navigation links
for managing your system resources and the HMC. These items are referred to as nodes.
The Work pane, in the right portion of the window, displays information based on the
current selection from the Navigation pane. For example, when Welcome is selected in the
Navigation pane, the Welcome window content is displayed in the Work pane.
The Status bar, in the bottom left portion of the window, provides visual indicators of the
current overall system status. It also contains a status overview icon which may be
selected to display more detailed status information in the Work pane.
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
You can resize the panes of the HMC workplace by moving the pointer over the border that
separates the Navigation pane from the Work pane until the pointer changes to a
double-pointed arrow. When the pointer changes shape, press and hold the left mouse
button while dragging the pointer to the left or right. Release the button and your Navigation
pane or Work pane is now larger or smaller in size. You can also do this within the Work
pane border that separates the resources table from the Tasks pad.
1-60 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Checkpoint
1. There are a large number of current and past models of IBM POWER-
based servers. Where is a good location to find information on the
available models?
Notes:
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise 1
Notes:
1-62 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Unit summary
Notes:
Copyright IBM Corp. 2000, 2008 Unit 1. System hardware overview 1-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1-64 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
Online AIX Version 6.1 Operating System and Device
management
Online AIX Version 6.1 Web-based System Manager
Administration Guide
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
Notes:
2-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 2-2. Topic 1 objectives: System Management Interface Tool (SMIT) AW186.0
Notes:
2-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
AIX administration
High-Level Commands
Low-Level Intermediate-Level
Commands Commands
Notes:
Overview of SMIT
The System Management Interface Tool (SMIT) is a menu-driven interface that
provides access to most of the common system management functions within one
consistent environment.
SMIT does not perform any system management functions directly. It is a user interface
that constructs high-level commands from the user's selections and then executes
these commands on demand. Those commands could be entered directly by the user
to perform the same tasks.
SMIT does not cover every possible system management task, and occasionally there
will be a need to run AIX commands or edit ASCII files directly to complete a particular
system administration task. However, SMIT does make the most frequent or
complex/tedious tasks much easier with a greater degree of reliability.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Types of commands
The following classification of commands may be helpful in understanding the operation
of SMIT:
- High-level commands -These are standard AIX commands (either shell scripts or C
programs) which can also be executed by a user. They execute multiple low-level or
intermediate-level commands to perform the system administrative functions. SMIT
constructs high-level commands from the user's selections and then executes these
commands on demand.
- Intermediate-level commands - These commands interface with special AIX
components such as the System Resource Controller and the Object Data Manager.
These commands are rarely executed directly by a user.
- Low-level commands - These are AIX commands which correspond to AIX system
calls or kernel services and are not normally executed directly by a user.
2-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
submenu help
submenu
help
name selector
list
help
pop-ups dialog panel
list
output panel
Copyright IBM Corporation 2008
Notes:
Available interfaces
SMIT provides a flexible user environment. The user can use an ASCII or an
AIXWindows-based interface. These interfaces provide the same facilities, but the
interaction is slightly different.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Use of keys
In the ASCII mode, in order to select from the menus, you have to use the up and down
arrow keys. This moves a highlighted bar over the menu items. Press Enter to select
the highlighted item.
You can also use some of the keyboard function keys to perform other functions, such
as exiting SMIT or starting a shell.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Dialog screen
Schedule a Job
[Entry Fields]
YEAR [07] #
MONTH [Jun] +
DAY (1-31) [22] #
* HOUR (0-23) [] #
* MINUTES (0-59) [] #
SHELL to use for job execution Korn (ksh) +
* COMMAND or SHELL SCRIPT (full pathname) []
Notes:
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Entering data
To enter data, move the highlighted bar to the value you want to change. Then, either
enter a value or select one from a pop-up list. Fields that you can type in are indicated
by square brackets [ ]. Fields that have data that are larger than the space available to
display them are indicated by angle brackets < >. The left angle bracket (<) and the
right angle bracket (>) indicate that their is data further to the left or right (or both).
Special symbols
Special symbols on the screen are used to indicate how data is to be entered:
* This is a required field
# A numeric value is required for this field
/ A pathname is required for this field
X A hexadecimal value is required for this field
? The value entered is not displayed
+ A pop-up list or ring is available
A * symbol in the leftmost column of a line indicates that the field is required. A value
must be entered here before you can commit the dialog and execute the command.
In the ASCII version, a + is used to indicate that a pop-up list or ring is available. To
access a pop-up list, use the F4 key. A ring is a special type of list. If a fixed number of
options are available, the Tab key can be used to cycle through the options.
In the Motif version, a List button is displayed. Either click the button or press Ctrl+L to
get a pop-up window to select from.
2-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty F8 (or ESC-8) Image - save the current screen to a file (A) and show the
current fastpath
F9 (or ESC-9) Shell - start a sub-shell (A)
F9 Reset all fields (M)
F10 (or ESC-0) Exit - exit SMIT immediately (A)
F10 Go to command bar (M)
F12 Exit - exit SMIT immediately (M)
Ctrl-l List - give a pop-up list of possible values (M)
PgDn (or Ctrl-v) Scroll down one page
PgUp (or ESC-v) Scroll up one page
Home (or ESC-<) Go to the top of the scrolling region
End (or ESC->) Go to the bottom of the scrolling region
Enter Do the current command or select from a single-selection
pop-up menu
/text Finds the text in the output
n Finds the next occurrence of the text
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Output screen
Command: OK stdout: yes stderr: no
[TOP]
UID PID PPID C STIME TTY TIME CMD
root 1 0 4 20:15:04 - 1:49 /etc/init
root 1719 1 0 20:16:14 - 0:10 /etc/syncd 60
root 2003 1 0 20:16:19 - 0:00 /etc/srcmstr
root 2233 1 0 17:16:14 - 0:00 /usr/lib/errdemon
ray 3525 1 0 20:01:28 0 0:00 -ksh
root 3806 2003 0 19:16:23 - 0:00 /etc/syslogd
ray 4162 3525 6 20:53:22 0 0:04 smit
root 5355 1 0 20:16:27 - 0:12 /etc/cron
root 6649 2003 0 20:16:32 - 0:00 qdaemon
ray 7303 4162 8 20:09:45 0 0:00 ps -ef
[MORE...6]
Notes:
2-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
SMIT
smit.script
List of
commands
$HOME/smit.log
Keeps a log of all menu and dialog screens visited, all commands executed and
their output. Also records any errors during the SMIT session.
$HOME/smit.script
Shell script containing all AIX commands executed by SMIT.
Notes:
Overview
SMIT creates two files in the $HOME directory of the user running SMIT. If these files
already exist, then SMIT appends to them. These files can grow quite large over time,
especially during installations, so the user must maintain them and truncate them when
appropriate.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
General syntax:
smit [-options] [ FastPath ]
Invoke ASCII version:
# smitty
or
# smit C
Log (but do not actually run) commands:
# smit -x
Redirect the log file and script file:
# smit -s /u/team1/smit.script l /u/team1/smit.log
# smit -s /dev/pts/1 -l /dev/pts/2
Copyright IBM Corporation 2008
Notes:
Introduction
The command smit is used to invoke SMIT. It is not particularly common to run smit
with any options, although a number of them do exist. Some of the more commonly
used options are described here.
Using a fastpath
Using a SMIT fastpath can be very helpful. Fastpaths are names that specify individual
screens within SMIT. If you want to by-pass the menu system and go straight to a
particular screen, use the command smit fastpath. When using SMIT, you can view
the fastpath screen name (for the current screen) by pressing F8 (or Esc+8) - Image.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Navigation area:
- Tasks categories
- Welcome - My Startup Pages - OS Management - Health - Settings
Work area:
- Page bar - Multiple pages/tabs - Action Selection List
- Portlets - Administrators can operate any tasks on the portlets
2-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Lets review
1. Specify the SMIT function keys that can be used for the
following:
a) List the command that will be run: ____
b) List the screen name which can be used for the
fastpath: ____
c) Take a screen image: ___
d) Break out into a shell: ___
e) Return to the previous menu: ___
2. Specify two ways you can request the ASCII character
version of SMIT from an X-windows environment
command prompt:
________________
________________
Notes:
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The AIX documentation library is available from two sources; the installable AIX
Information Center, and the IBM AIX Information Center that is available on the external
Web. The Web-based IBM AIX Information Center contains the latest AIX information.
This external Information Center is available at the following URL:
http://publib16.boulder.ibm.com/pseries/index.htm. You will be prompted for your
geographical region, language, and AIX release level.
This topic covers the use of the information center.
2-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Documentation Client
yWeb browser
software
Notes:
Documentation server
In addition to providing man commands to make finding information easy, AIX also
provides system manuals. The documents are available on the Internet at the IBM Web
site http://publib.boulder.ibm.com/infocenter/pseries/v6r1/index.jsp. For sites without
access to the Internet, softcopy documentation can be loaded on a documentation
server within a private network. Any other computer in the network with Web browser
software can then become a documentation client and access these documents from
the server.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Mozilla
Standard browser beginning with AIX 5L 5.3
Supports all versions of AIX 5L
32-bit
Available as a Web download
http://www.ibm.com/servers/aix/browsers
Notes:
Web browser
Mozilla Firefox for AIX is an open source Web browser. It delivers helpful new features
and continues to lead the way in online security. It implements technologies like the
Gecko layout engine, and supports Web standards or draft standards like HTML,
XHTML, XML, CSS, DOM, and many more. Mozilla Firefox for AIX implements OJI, the
Open Java Interface to AIX Java through the AIX Java Plug-in.
Mozilla Firefox for AIX (64-bit) is available as a Web download and on the Mozilla
Firefox for AIX CD that can be ordered with AIX 6.1.
The Mozilla Web browser was introduced with AIX 5L V5.2, and became the standard
Web browser in AIX 5L V5.3.
2-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Accessing documentation
Once the documentation is set up, it can be accessed from the AIXWindows or CDE
environment with the infocenter command.
Web access
If the documentation was not installed on your system, it can also be accessed at:
http://publib.boulder.ibm.com/infocenter/pseries/v6r1/index.jsp
Viewing documents
The documents can be viewed in two ways. Either by selecting the entire document with
the PDF tag at the end of each document name, or by selecting the HTML tag and
viewing the document section by section.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Searching
In the top left corner of the Information Center screen, there is a field for entering search
strings. Entering information and clicking GO will search all documents for the string.
Click Search Scope to limit the search to a set of particular documents.
Printing documents
The Information Center allows you to print documents in two ways.
You can download the PDF document and print the entire document from Adobe
Acrobat, or you can access a section of a document in HTML and print that section as
you would normally print the contents of a Web page. Find the section you wish to print
and use the browsers Print function usually found in the File menu.
2-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Searching documents
Probably the easiest way to find an answer is to search the documentation using the
Search field on the Information Center screen.
Above are the results of a search. In the right frame are the matches from the search in
order of quality with the best match at the top of the list.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Search Scope
Notes:
Search Scope
By clicking the Search Scope link, you can narrow the search to a subset of
documents.
2-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Lets review
1.Which command displays manual entries online?
Notes:
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Topic 3 objectives:
Web-based System Manager
After completing this Topic, you should be able to:
Describe the steps to install and configure the Web-based
System Manager
Use the Web-based System Manager to manage AIX
Notes:
2-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
PC or Linux
Remote Client
Client-Server
Copyright IBM Corporation 2008
Notes:
Introduction
AIX V4.3 introduced the Web-based System Manager, which is the next step in the
evolution of AIX system administration tools. There have been many enhancements to
the Web-based System Manager since AIX 5L V5.1. It is considered the default system
administration tool for AIX 5L and later.
The Web-based System Manager can be run in stand-alone mode, that is, you can use
this tool to perform system administration functions on the AIX system you are currently
running on.
The Web-based System Manager also supports remote management. In this
environment, it is possible to administer an AIX system from a remote PC or from
another AIX system using a graphics terminal. In this environment, the AIX system
being administered is the server and the system on which you are performing the
administration functions is the client.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Client requirements
Supported Microsoft Windows clients for AIX:
- Windows 2000 Professional version
- Windows XP Professional version
- Windows Server 2003
Supported Linux clients are PCs running:
- Red Hat Enterprise Version 3
- SLES 8 or SLES 9
- Suse 8.0, Suse 8.1, Suse 8.2, and Suse 9.0 using desktops KDE or GNOME only
The PC Web-based System Manager client installation needs a minimum of 300 MB of
free disk space, 512 MB memory (1 GB preferred), and a 1 GHz CPU.
To download Web-based System Manager Client code from an AIX host, use the
address: http://<hostname>/remote_client.html
2-38 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Client-server mode:
From the AIX 5L or AIX 6 client:
# wsm -host <managed-host>
Notes:
Introduction
The Web-based System Manager can be configured to run in several different modes.
The operating environments in which Web-based System Manager can be started are
stand-alone application, client-server, applet, and remote client.
Stand-alone mode
To access the Web-based System Manager from the command line, use the wsm
command.
To start the Web-based System Manager console from the Common Desktop
Environment (CDE), do the following:
1. Click the Application Manager icon from the CDE front panel
2. Click the System_Admin icon
3. Click the Management Console icon
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Client-server mode
You can manage your local machine or machines that have been configured for remote
management from the Web-based System Manager console. You can select a different
host than your local machine as the managed host. To do this, use the following
command: /usr/websm/bin/wsm -host [managed-host]. The managed host you
specify as [managed-host] displays under the Navigation Area as the first name under
the list of hosts that can be managed. This host is also used to load the Web-based
System Manager user preference file ($HOME/WebSM.pref). Using the -host
argument displays the console to the machine you are using, and uses the preferences
file of the remote host you specify.
2-40 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Console window
The visual shows the Web-based System Manager Console window containing two
primary panes. The pane on the left displays the machines that you can manage from
the Console window. This pane is referred to as the Navigation Area. The pane on the
right (the Contents Area) displays results based on the item selected in the Navigation
Area. You select the machine to perform management operations from the Navigation
Area. As you navigate to the desired operation in the Navigation Area, the Contents
Area is updated to show the allowable choices.
Session log
There is a session log that is a facility of the console. It keeps track of changes made on
managed hosts during a Web-based System Manager session. To view the session log,
click Console > Session Log.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Toolbar functions
The visual shows a Web-based System Manager window with the System
Environment: Settings plug-in running in the Contents Area pane. Above the
Navigation Area and Contents Area panes, there is a toolbar with symbols for managing
the window. From left to right, the symbols support the following functions: Back to
previous screen, Forward to next screen, Up one level, Stop reloading, Reload now,
Shutdown, Broadcast message, Find, Show properties of highlighted object, Icon (to
return to icon mode if currently viewing details), and Details (which lists each icon and
provides an explanation of each). Most of these functions can also be accessed via the
View option on the menu bar.
Date/Time icon
If you double-click the Date/Time icon, you can set the date and time on the system.
2-42 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Overview
Note that the Web-based System Manager supports an easy-to-use point-and-click
environment where information can be entered. Use this window to set the system date
and time (only the root user can perform this function). When finished, click OK to apply
your change.
Additional information on the Web-based System Manager can be accessed through
the Internet using the following URL:
http://www-1.ibm.com/servers/aix/wsm/
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
2-44 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty If Web-based System Manager is installed, you see output similar to the following:
# lslpp -h sysmgt.websm.framework
Fileset Level Action Status Date Time
------------------------------------------------------------------------
Path: /usr/lib/objrepos
sysmgt.websm.framework
6.1.0.0 COMMIT COMPLETE 10/18/07 13:39:50
Path: /etc/objrepos
sysmgt.websm.framework
6.1.0.0 COMMIT COMPLETE 10/18/07 13:44:07
The following optional filesets can be installed to add additional functionality to
Web-based System Manager. They are not installed by default.
- sysmgt.msg.Locale Language.websm.apps
Enables the locale language to be used if the LANG environment variable is set or if
the -lang argument is used with the wsm command.
- sysmgt.websm.security
Adds support for SSL communication between client and server. This fileset
supports 40-bit encryption and is available in the Expansion Pack.
- sysmgt.websm.security-us
Adds support for SSL communication between client and server. This fileset
supports 128-bit encryption and is available in the Expansion Pack. Export and
import laws could make this fileset unavailable in some countries.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-46 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Installation options
To install the Web-based System Manager remote client on a PC running Windows or
Linux, access the AIX Web Server from the client's browser using the following Url:
http://<managed-host>/remote_client.html
The Web page provides two options for installing the remote client software:
- InstallShield
- Java Web Start (beginning with AIX 5L V5.2.3.0)
The InstallShield option is pretty straightforward. It downloads the code and installs
using the InstallShield standard.
The advantage of the Java Web Start option is that every time the client application
runs, it checks to see if there is a remote server application software update and
automatically downloads the changes.
2-48 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. True or False? The Web-based System Manager is available
for client access automatically after the BOS is installed.
_____________________________________________
_____________________________________________
2. Which of the following statements are true regarding the Web-
based System Manager?
a) An AIX V6.1 system can be managed from a remote PC with
appropriate WebSM client installed.
b) In stand-alone mode, use the wsm command to access the Web-
based System Manager.
c) It is possible to manage an AIX V6.1 system from a remote AIX V6.1
system using an ASCII terminal.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Notes:
2-50 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Using SMIT
Using Information Center
Using Web-based system
Notes:
Introduction
This lab allows you to set up the Web-based System Manager and learn how to use the
interface. If you have other machines in your classroom that are networked together,
you can also try to perform remote administration using the Web-based System
Manager.
The exercise can be found in your Student Exercise Guide.
Copyright IBM Corp. 2000, 2008 Unit 2. System management tools and documentation 2-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Most system administration tasks can be completed using either the ASCII or
graphical (Motif) version of SMIT
SMIT provides logging of activities and generated commands
SMIT has useful fastpaths for bypassing the menu structures
Web-based documentation can be installed locally
The Information Center interface provides a way to read, search, or print the
installed manuals
The Information Center interface provides links to useful IBM support sites
Remote access to an Information Center server is possible via any Web
browser
The Web-based System Manager supports system administration tasks in a
stand-alone or client-server environment
The Web-based System Manager can be used either locally or remotely from
either another Web-based System Manager-installed AIX platform or a PC
with the Web-based System Manager application
Remote access may be enabled or disabled
Copyright IBM Corporation 2008
Notes:
2-52 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
SG24-7559 AIX Version 6.1 Differences Guide
Online AIX 6.1 Installation and Migration
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
Define the package definitions and naming conventions
Identify how software products and updates are installed
and managed on the system
Notes:
3-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
LPPs
AIX documentation
Expansion Pack
Notes:
Introduction
The AIX 6.1 operating systems are delivered on multiple CDs. During the ordering
process, it is necessary to indicate the system type.
Licensed Program Products (LPPs) are ordered separately and run on the AIX
operating system.
The contents of the Expansion Pack and Linux toolbox vary over time. Their purpose is
to acquaint users with tools and products that may be valuable in their business
environment.
Expansion Pack
An Expansion Pack is included with every new order of AIX at no additional charge
when media is selected, or it can be ordered separately for existing AIX licenses.
Typical releases may include the following: database software, development tools,
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
AIX documentation
The AIX 6.1 documentation comes on either two CDs or one DVD. It contains the full
AIX documentation library in many different languages, in addition to the infocenter run
time environment. These CDs/DVD are not part of the base system installation.
3-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Packaging definitions
LPP: Collection of packages
bos Complete product
package: package:
Collection of filesets
bos.INed bos.adt
Notes:
Package
A package contains a group of filesets with a common function. It is a single, installable
image.
Fileset
A fileset is the smallest individually installable unit. It is a collection of files that provides
a specific function. For example, bos.net.tcp.client is a fileset in the bos.net package.
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Bundles
A bundle is a collection of packages and filesets suited for a particular
environment
Predefined system bundles in AIX include:
AllDevicesKernels
Alt_Disk_Install
App-Dev
CC_Eval.Graphics
CDE
GNOME
Graphics
KDE
Kerberos_5
Media-Defined
Mozilla
PerfTools
Server
cas_client and cas_server
Devices
Infocenter
openssh_client and openssh_server
wsm_remote
Copyright IBM Corporation 2008
Notes:
Overview
Since there are thousands of filesets, having to determine which individual fileset you
want on your machine can be a time-consuming task. AIX has bundles which offer a
collection of filesets that suit a particular purpose. For example, if you are developing
applications, the App-Dev bundle would be the logical choice to install.
Some filesets within a bundle are only installed if the prerequisite hardware is available.
For example, a graphic adapter is needed to run AIXWindows.
In some cases, bundles are equivalent to product offerings. Often, however, they are a
subset of a product offering or a separate customized bundle. The bundles available
may vary from configuration to configuration and AIX version to AIX version.
3-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Fileset naming
bos.terminfo.print.data
Message convention:
LPP.msg[.lang].package.fileset
Copyright IBM Corporation 2008
Notes:
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
3-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Software updates
# oslevel
6 . 1 . 0 . 0
Notes:
Introduction
As new software is created for AIX, you will want to upgrade your system to maintain
the latest features and functionality.
The numerical information that shows what level of software you currently have
installed is broken into four parts:
- Version
- Release
- Modification
- Fix
You can see this using the oslevel command.
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Types of upgrades
When you want to upgrade the system, the method you follow depends on what type of
upgrade you are performing. Changes to the version or release levels require you to
perform a migration installation as discussion in the AIX 6.1 Installation unit. If you want
to make a change to the modification or fix levels, use the smit update_all command.
These changes provide fixes to defects or additional functions to the BOS or optional
software products.
Version and release upgrades must be purchased. Modification and fix-level upgrades
are available at no charge. They are provided on CD (order via the AIX Support Center)
or they can be downloaded from the Web. AIX updates are available at
http://www.ibm.com/servers/eserver/support/pseries/aixfixes.html. This Web site is
discussed in more detail later in this unit.
3-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Software states
Applied:
FILESET 6.1.0.2
(New Version)
FILESET 6.1.0.1
Commit
Install or
6.1.0.0 (Old Version)
Reject
Applied FILESET 6.1.0.1
FILESET 6.1.0.2 (Old Version)
Committed:
Committed
Install FILESET 6.1.0.2
6.1.0.2
Notes:
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
The applied state gives you the opportunity to test the newer software before
committing to its use. If it works as expected, then you can commit the software which
removes the old version from the disk.
If the newer version is causing a problem, you can reject it which removes the newer
version and recommits the old version.
3-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Overview
Use the SMIT fastpath smit install to access the Software Installation and
Maintenance menu.
You can also use the Web-based System Manager to install software.
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Install Software
Update Installed Software to Latest Level (Update All)
Install Software Bundle
Update Software by Fix (APAR)
Install and Update from ALL Available Software
Notes:
Introduction
Use the smit install_update fastpath to access this menu.
Install Software
This option allows you to install or update to the latest level of software available on the
installation media. This allows you to install everything on the installation media if so
desired. This is most commonly used to install optional software not currently installed
on your system.
3-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Install Software
Install Software
Notes:
Introduction
The SMIT Install Software menu allows you to install all or selected software from the
installation media. If any updates exist for these products, they are also installed.
To perform an update_all, the SMIT screen is identical except in the SOFTWARE to
install line where you would see [update_all].
The input device is usually CD-ROM, tape, or diskette. However, it is also possible to
install software that has already been loaded to disk. The directory /usr/sys/inst.images
can be used for this purpose.
3-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty new software you want to install. Use the List function key (F4) to display all filesets on
the media. From there, you can select the fileset, package, or LPP that you want to
install.
Use the SMIT fast path smit install_latest to access this menu.
PREVIEW only?
The PREVIEW only? option allows you to preview the results of the installation without
actually performing the software install. The system displays information on space
requirements and a list of software products and updates that are installed.
License agreements
Beginning with AIX 5L V5.1, software license agreements are shipped and displayed
electronically, saving paper and allowing for electronic software distribution in the
future. If a product has an electronic license agreement, it must be accepted before
software installation can continue.
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Software inventory
# smit list_installed
List Installed Software and Related Information
lslpp command:
-L Lists the installed software
-h Shows the history of a software product
Copyright IBM Corporation 2008
Notes:
Introduction
Use the SMIT fast path smit list_installed to access the List Installed Software
and Related Information menu. This menu provides information about the software
and fixes installed on a system.
Most of the SMIT options on this menu actually execute the lslpp command. The
following command options can be used to view specific software information:
-l Displays the name, level, state, and description of the fileset
-h Displays the installation and update history for the fileset
-p Displays requisite information for the fileset
-d Displays dependent information for the fileset
-f Displays the names of the files added to the system during installation of the
fileset
-w Lists the fileset that owns a file
-b List software for the specified bundle name
3-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Overview
The lslpp command is used to list the installed software on the system. The various
options of the lslpp command allow you to view selected information on the software
installed.
The output of the lslpp command displays the fileset name, the level of the product, its
state (applied or committed), and a description of the product.
Other options include:
-d Displays filesets that are dependent on the specified software
-f Displays names of files added to the system during the installation of specified
filesets
-p Lists requisite information for a specified fileset
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Fix repository
Available updates
(from IBM Web site)
Fix repository
(locally stored Installed fixes
filesets)
Notes:
Overview
When working with modifications or fixes, it is common to download the fixes to a
directory on your local hard drive before installation. This location is commonly referred
to as the fix repository.
While /usr/sys/inst.images is a standard location for storing software images and
appears in the SMIT Input Device/Directory (F4) list, you may choose to use any
directory for this purpose.
Managing the fix repository includes knowing how up to date it is relative to what is
available and what in the repository has been installed.
AIX provides a reporting facility to compare the installed software, repository software,
and software available from the IBM Web site. Any two of these can be compared to
obtain a report.
3-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
IBM System p support provides a Web site interface (Fix Central) to access fix
information. One way to navigate to this Web page is:
- Via Fix Central at:
http://www-912.ibm.com/eserver/support/fixes/fixcentral/main/pseries/aix
Identify the Product family as System p, Product as AIX, Version as 6.1 and Fix
type as Fix packs. Clicking Continue, to reach the next visual.
Fix pack
Fix packs for the AIX 6.1 operating system are provided as Technology Level packages
or Service Packs. These generally available updates have been tested to operate best
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
when all updates in a fix pack are installed. IBM recommends installing the complete fix
pack.
Fix recommendations
Recommendation tools and services for AIX administrators allow the system
administrator to be able to determine recommended levels of hardware and software.
Fix Level Recommendation Tool (FLRT) is a planning tool to help administrators
determine what key components of the System p server are at the minimum
recommended fix level.
Server Optimization and Integration Services - Healthcheck is designed to help you
proactively detect configuration abnormalities that may be keeping your System p
server environment from performing optimally.
Fix search
Find downloads for single software products.
Managing updates
IBM provides several tools which allow the system administrator of AIX machines to be
able to manage downloading and installing fixes to the AIUX operation system filesets.
Security advisories
This service provides technical information for IT professionals who maintain System p
servers. As support bulletins are released, you receive e-mail containing links to the
bulletin.
3-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Figure 3-15. More fix services screen (from Fix Central) AW186.0
Notes:
Introduction
Service Packs are cumulative. Newer Service packs in a Technology Level contain all
the updates from previous Service Packs. A fix pack is a combination of many single
fixes for product components that are dependent on or related on each other. It can
include new features, functions, or enhancements.
Available information
After selecting the Fix pack by double-clicking the Name link, you are presented with
three tabs. The Package tab displays the release date and package name. The
Package details tab lists the available new APARs, their description, and known
problems with the package. The Installation tips tab identifies all the required steps
before, during, and after installation.
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The SMIT Software Service Management menu allows access to Service Update
Management Assistant (SUMA) functions, which significantly simplify the system
update process by allowing policy-based automatic downloads of maintenance updates
from the Web. The Software Service Management menu can generate reports to
manage filesets installed on a system, filesets contained in a repository, and filesets
available from the IBM Fix Central Web site. It also provides a way to clean up and
rename software images in a repository.
3-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty specific new fixes and entire maintenance levels, so that the time spent on such system
administration tasks is reduced. The SUMA implementation allows for multiple
concurrent downloads to optimize performance and has no dependency on any Web
browser.
SUMA policies can be run without extensive configuration. Filtering options allow
comparisons against an installed software inventory, a fix repository, or a maintenance
level to ensure only desired fixes are downloaded. SUMA provides the option to send
an e-mail notification containing a list of whats available for download, as well as
detailed summary statistics of a download.
SUMA can be accessed through the suma command or through the smit suma fast
path.
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
The fast path smit maintain_software allows you to commit, reject, and remove
software. You might also find the other menu items useful.
Copying software
With the Copy Software to Hard Disk for Future Installation and Copy Software
Bundle to Hard Disk for Future Installation options, you can copy filesets from the
installation media to the hard drive without actually performing an installation. This
allows you to install it later without needing the original installation media. To copy all
software to hard disk for future installation, use the following command:
# gencopy -d /dev/cd0 -t /usr/sys/inst.images all
3-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Cleanup
The Clean Up After Failed or Interrupted Installation option resets your software
installation back to the beginning after a failed install. A failed install is usually due to a
power failure or a system shutdown occurring before the installation is complete. You
then need to start your installation/update over.
Repository management
The Rename Software Images in Repository, Clean Up Software Images in
Repository, and Service Update Management Assistant (SUMA) options are also on
the SMIT Software Service Management menu. These were already discussed in this
unit.
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
instfix command
Installs a fix:
# instfix -k IY58143 -d /dev/cd0
Searches for a fix:
# instfix -ik IY58143
All filesets for IY58143 were found.
Searches for a fix by keyword:
# instfix -s SCSI -d /dev/cd0
Lists which AIX BOS maintenance levels are partly or fully
installed:
# instfix -i | grep ML
All filesets for 6.1.0.0_AIX_ML were found.
All filesets for 6100-01_AIX_ML were found.
Lists which filesets are missing in a partly installed AIX BOS
maintenance level:
# instfix -ciqk 6100-01_AIX_ML | grep :-:
Copyright IBM Corporation 2008
Notes:
Introduction
The instfix command allows you to install a fix or a set of fixes without knowing any
information other than the Authorized Program Analysis Report (APAR) number (which
is given to you by your Support Center) or other unique keywords identifying the fix.
The instfix command can also be used to determine if a fix is installed on your
system.
3-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty -f Install filesets for multiple keywords or fixes using an input file. Note that the
output of the -T option produces a suitable input file format. -f results in
instfix using standard input.
-i Use with -k or -f option to display whether fixes or keywords are installed.
This option is for information purposes only. Installation is not attempted
when this option is used.
-a Use only with -i to optionally display the symptom text associated with a fix.
-d Specify the input device (required for all but -i).
-c Output should be in colon delimited format.
Examples
The examples on the visual do the following:
- Install all filesets associated with fix IY58143 from the CD in the /dev/cd0 drive:
# instfix -k IY58143 -d /dev/cd0
- List which AIX BOS Maintenance Levels are partly or fully installed:
# instfix -i | grep ML
All filesets for 6.1.0.0_AIX_ML were found.
- List which filesets are missing in a partly installed AIX BOS Maintenance level:
# instfix -ciqk 6100-01_AIX_ML | grep :-:
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. Which of the following states can your software be in, in order for
you to be able to use it? (select all that apply)
a. Applied state
b. Removed state
c. Install state
d. Commit state
2. What command is used to list all installed software on your
system? _______________
3. Which of the following can you install as an entity? (select all that
apply)
a. Fileset
b. LPP
c. Package
d. Bundle
4. What is the difference between the SMIT menus: Install Software
and Update Installed Software to Latest Level (Update All)?
_________________________________________________
_________________________________________________
Copyright IBM Corporation 2008
Notes:
3-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Exercise 3
Notes:
Introduction
This lab gives you the opportunity to install filesets and show software installation
history.
This exercise can be found in your Student Exercise Guide.
Copyright IBM Corp. 2000, 2008 Unit 3. Software installation and maintenance 3-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Notes:
3-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
SG24-7559 AIX Version 6.1 Differences Guide
Online AIX 6.1 Installation and migration
Online AIX 6.1 Operating System and device management
Unit objectives
Notes:
4-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
rmt0
fd0
rmt1
Notes:
Types of devices
There are a large number of devices that can be configured in the system. Devices can
be one of two types:
- Block device is a structured random access device. Buffering is used to provide a
block-at-a-time method of access. This is usually only used for disk file systems.
- Character (raw) device is a sequential, stream-oriented device which provides no
buffering.
Most block devices also have an equivalent character device. For example, /dev/hd1
provides buffered access to a logical volume whereas /dev/rhd1 provides raw access
to the same logical volume.
ls -l /dev output
The ls -l command allows you to see the type of a file. A special file (in the /dev
directory) is indicated by a b in the first column for a block device or a c for a character
device.
Normally, the fifth field contains a numeric value indicating the number of bytes in the
file. For devices, it shows the major and minor device numbers. The device rmt0 shown
in the listing has a major device number of 22 and a minor device number of 1. This
indicates that the code to handle major device 22 must already be in the kernel, and it
must handle device number 1 correctly. While not shown here, there would be files for
rmt0 with minor numbers of 0 through 7, each of which must be handled correctly by
the device driver. More precisely, the major number refers to the software section of
code in the kernel which handles that type of device, and the minor number refers to the
particular device of that type or the operation mode of a device of that type.
4-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
The predefined and customized databases store information about all of the logical
devices in the system and their attributes. It is managed by the Object Data Manager
(ODM).
Predefined database
The predefined database contains configuration data for all possible devices supported
by the system. The SMIT menus have options to install non-supported drivers. The
contents of the predefined database is largely defined at installation time, ensuring that
you always have support for devices in your system.
Customized database
The customized database contains configuration data for all currently defined and
configured (available) devices.
Configuration Manager
The Configuration Manager is a program that automatically configures devices on your
system during system boot and run time. The Configuration Manager uses the
information from the predefined and customized databases during this process, and
updates the customized database afterwards.
4-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# lsdev -P -H
class type subclass description
memory totmem sys Memory
tape 4mm4gb scsi 4.0 GB 4mm Tape Drive
disk osdisk scsi Other SCSI Disk Drive
adapter 22100020 pci IBM PCI Ethernet Adapter (22100020)
adapter 14101800 pci IBM PCI Tokenring Adapter (14101800)
adapter ppa isa_sio Standard I/O Parallel Port Adapter
adapter isa_keyboard isa_sio Keyboard Adapter
..
..
Notes:
Introduction
Default characteristics for known device types are stored in the ODM predefined
database.
Devices are classified as follows:
- Class indicates what the device does
- Type indicates what model it is
- Subclass indicates how it can be attached to the system
There are also definitions for some unknown devices which can be attached to the
system (for example, non-IBM serial or parallel printers or SCSI disk drives). These
devices are either intelligent and need little configuration, or the device attachment
method is standard (for example, parallel or RS232) and no features of the device are
assumed when it is added.
4-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
The devices that have been customized in the system are described in the ODM
customized database. Each device has a logical device name, status, location, and
various attributes.
Devices may appear in a defined state after a restart. If this is the case, it may be
because the device is powered off or no longer exists on the system.
Devices with a location code are physical devices. Devices without a location code are
logical devices. Location codes depend on the type of device and the adapter to which
the device is connected.
The lsattr -E -l [resource name] command provides detailed information on the
effective attributes currently configured for specified devices. In the example, it provides
configuration information on the system itself.
- The -C option for lsdev pulls the customized information from the ODM
- The -E option for lsattr shows the effective attributes
- The -l option for both commands is the logical device name
- The -c option for both commands is the class of device
- The -a attribute option for the lsattr command displays information for a
specific attribute
The lscfg-v command can also be used to list information about devices found in the
ODM customized database. The listing is sorted by parent, child, and device location.
Specific hardware information about devices is listed, such as EC level, FRU number,
part number, and so forth. The output also displays the model architecture and bus
type.
4-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Device states
Predefined Database
Undefined Supported
Device
rmdev -dl
Customized Database
rmdev -dl
Defined Not Usable
mkdev -l
or rmdev -l
cfgmgr
Available Ready for
Use
Notes:
Device states
The most common device states are:
- Undefined - The device is a supported device but is not configured. It does not
reside in the customized database.
- Defined - The device has been added to the customized database. It has been
allocated a logical device name, a location code, and attributes have been assigned
to it. But, it is still unavailable for use.
- Available - The device resides in the customized database. The device is fully
configured and is ready for use.
When a device is first identified, it is configured and put into the Available state.
If a device that has been configured in the past is powered off and the machine is
rebooted, the device appears in the Defined state. This indicates that the system
knows it is supposed to be there, but because it was not powered on, it cannot be used.
This command is executed at boot time to discover and configure attached devices.
After booting the system, if a device is either removed/powered-off or
attached/powered-on, the state of the device in the ODM is not automatically changed.
Rather than running mkdev or rmdev on the specific device, you would typically execute
the cfgmgr command. This discovers any new devices or re-assesses the state of any
devices already defined in the ODM customized device database.
4-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Self-configuring devices
2. Answer:
- CD-ROM
- 10-80-00-3,0
1. Who are you?
Device
cfgmgr Driver
4a) Load device driver
4b) Make /dev/cd0
ODM: 3. cd0 defined entry
cd0
defined Device
Kernel Driver
10-80-00-3,0
/unix 39
ODM: # ls -l /dev/cd0
cd0 br--r--r-- root system 39, 0 /dev/cd0
available
10-80-00-3,0 5. Device available
Notes:
Configuring devices
The cfgmgr program runs during boot and configures devices. It can also be run safely
from the command line on a system that is up and running. It identifies all
self-configuring devices as long as they are powered on and matches them to the
information in the predefined database. It then uses the predefined information to
complete a customized database entry for the device.
All devices are self-configuring except for parallel and serial devices. So, except for
things like printers and ASCII terminals, configuring a device requires only attaching it
and powering it on before booting the machine. Since cfgmgr runs during the boot
process, no more intervention is required by the administrator.
You see that, for SCSI devices, you need to set a unique SCSI ID on the device before
attaching it. Once that is done, configuration of the device is handled by AIX.
Notes:
Introduction
The SMIT Devices menu (fastpath: # smit devices) is used to manage the
configuration information about the devices in the system. This information controls the
way the kernel and applications behave towards the attached physical devices. The list
of devices varies depending on what you have configured or installed on your system.
Devices can also be managed using the Web-based System Manager.
4-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty - Printer/Plotter
This submenu allows you to configure printer devices and also queues for local
printers and remote printers.
- TTY
Used for any non-printer device attached to a serial port. For example: terminal,
modem, and direct connection.
- PTY
Used for a pseudo-terminal device. It provides the appearance of a real ASCII
terminal to the application, but does not have any physical port attachment. It is
used for applications such as AIXWindows and TCP/IP communications.
- Communications
Used for adapters for various types of communications. For example: Token Ring,
Ethernet, MultiProtocol, X.25, 3270, and Fiber Optic.
Device addressing
Location codes are used for device addressing
The location code for a device is a path from the adapter in
the CPU drawer or system unit, through the signal cables and
the asynchronous distribution box (if there is one) to the
device
Location codes consist of up to four fields of information
depending on the type of device
Location codes differ based on model type
Notes:
Location code
Every logical device is assigned a location code when it is attached to the system.
Location codes depend on the type of device and the adapter to which it connects.
The location code is another way of identifying the physical device.
The location codes exist to provide the system with a method of locating the device and
establishing relationships between devices and their adapters. If a hardware failure
occurs, the location code is often displayed or referred to in the LED.
4-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
EF The connector ID
Notes:
Introduction
Knowing how to interpret location codes allows you to quickly locate a device based on
the software definition. If you have several of the same type of devices (hard disks, for
example) it allows you to easily identify the exact disk that is having the problem.
The actual values used in the location codes vary from model to model. For specific
values, you need to reference the Service Guide for your model. These can be found
online at the IBM Information Center:
http://publib.boulder.ibm.com/infocenter/pseries/v6r1/index.jsp
4-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
1P-10-21-10
Notes:
Non-SCSI example
The example in the visual illustrates non-SCSI device location codes for a System p
server.
A 128-port asynchronous adapter allows 128 serial devices (like ASCII terminals) to be
attached to the adapter. The adapter has two connectors (or ports) on the card. Each
connector can support a serial bus.
On each bus, boxes that contain ports are connected to each other. These boxes are
called Remote Asynchronous Nodes (RANs). Each of the two connectors can support
four RANs. Four RANs on two connectors gives a total of eight RANs. Each RAN has
16 ports. That gives a total of 128 ports.
4-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
AB-CD-EF-G,H
AB-CD Identifies the bus and the adapter location
Same as with non-SCSI devices
Notes:
AB-CD position
The AB-CD positions contain the same information you have already covered. It
indicates where the adapter card (SCSI controller) is attached: the bus and slot number.
EF position
The EF position identifies the SCSI bus. If the controller provides only a single SCSI
bus, the EF position is 00. If the controller provides for dual SCSI buses, each bus must
4-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty be identified by a unique address. With dual SCSI, the card's internal bus is identified
with 00 and the card's external bus is identified with 01.
G,H position
The G,H position provides two pieces of information. The G position is the SCSI
address, or SCSI ID, of the device. The SCSI ID is set on the device itself. It is usually
accomplished by setting jumpers or switches on the device. Some devices have
external dials or push buttons that allow for an easy method to set the ID. Set the SCSI
ID so that it doesn't conflict with another device on that bus. When cfgmgr runs, it
recognizes the ID that is set on the hardware and sets the G position accordingly.
The H is usually a 0. If the SCSI devices has multiple device within it, then the logical
unit number (LUN) is used to uniquely identify each device. Non-zero numbers are used
with RAID arrays or some CD jukeboxes.
System
Unit
10-80-00-4,0
SCSI 10-80-00-6,0
Adapter 7 4
SCSI Bus 6
10-80
0
SCSI ID
Notes:
4-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
Physical addressing has been in place throughout the history of the RS/6000, pSeries,
and System p family of products. An important change with the partitionable System p
servers is that these codes are now not only of concern to manufacturing engineers and
IBM equipment service personnel, but also to the administrator of these systems.
This physical location code is generated by the system firmware, and the scheme used
to assign the location code can vary from one machine to the next.
Addressing scheme
The first part of the physical location code is the enclosure identification. On the older
POWER4 platforms (e.g., p690) this would be the rack# and the position of a drawer in
the enclosure. In most System p servers, the enclosure is identified by noting the
machine-type, model, and serial number of that enclosure.
The next part of the location code is the physical location of a component in that
enclosure. This would typically be the planar (or internal bus) and the connection to that
bus (expressed as a slot position). The location code, up to this point, could be
identifying an adapter. Optionally, the physical location may include a port# if that
adapter has multiple ports.
Following this physical portion of the location code, we can have a logical portion. This
is used when a component is located by addressing on the adapters bus rather than a
fixed physical path. For example, the SCSI address of a device on a SCSI bus.
4-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
S1
S2 TTY
Notes:
Introduction
Most devices self-configure using cfgmgr. One type of device that does not, is an ASCII
terminal. The next few visuals go through the process of adding an ASCII terminal in
order to provide an example of what is required to manually configure a device.
First steps
First, physically attach the terminal to the serial port. Be sure to note which serial port it
is attached to. We need that information as we complete this process.
To begin the configuration, use the smit tty command. The TTY screen is used to
manage the configuration of asynchronous devices.
To add the terminal, select Add a TTY.
4-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Attachment
TTY Type
Parent Adapter
Notes:
Introduction
Once you select Add a TTY, you are then asked the TTY Type and which Parent
Adapter the terminal is attached to.
TTY type
In this example, the choices for TTY type are rs232 and rs422. The most common TTY
type is rs232.
To select the correct parent adapter, you need to know where the device is physically
attached. This is where the serial port is important.
In our example from the previous page, the terminal was attached to serial port 1.
Therefore, we select sa0 - Standard I/O Serial Port 1.
Location code
The location code is also displayed. 01-S1 is, in fact, the location code of serial port 1.
Remote asynchronous nodes used in conjunction with the 128-port async adapter are
sa2, sa3, and sa4.
Be careful with the numbering scheme:
sa0 is serial port 1.
sa1 is serial port 2. The sa stands for serial adapter. The adapters are devices and
device names are numbered starting at 0.
4-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Device nomenclature
For the built-in serial connection, the nomenclature looks like this:
sa0 sa1
Built-in adapters
on system planar
Serial ports s1 s2
For the 128-port adapter, the nomenclature looks like this:
Notes:
Pictorial view
This visual shows a picture, and the associated nomenclature, for the scenario we are
discussing on adding a TTY.
Add a TTY
Add a TTY
Notes:
PORT number
There is only one mandatory field on this screen and that is the PORT number. The F4
key provides a list of possible port numbers. For the first built-in serial port m it is s1. For
the second, it is s2. On a 16-port RAN, the choices are 0-15. Select the one to which
the terminal is connected. The combination of the appropriate RAN selected on the
Parent Adapter selector screen and the port number shown here provides the system
with the correct location code.
You must supply the port number to uniquely locate the device. The value required
depends upon the adapter specified. For example:
Built-in serial port S1 s1
Built-in serial port S2 s2
8-Port Adapter 0-7
16-Port Adapter 0-15
Each 16-PORT RAN 0-15
4-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
TERMINAL type
The TERMINAL type attribute is used to assign the TERM environment variable when a
user logs in on the device. You must set this to the name of a supported terminal type.
The list of supported terminals can be found in directories located in
/usr/share/lib/terminfo.
lscfg -v
Provides details of all devices including manufacturer, type and model
number, and part numbers
getconf -a
Provides the values of all system configuration variables
Notes:
4-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
# getconf MACHINE_ARCHITECTURE
chrp
# getconf KERNEL_BITMODE
64
# getconf HARDWARE_BITMODE
64
# getconf REAL_MEMORY
131072
Checkpoint (1 of 2)
1. Is it possible to use SCSI ID 7 for a new tape drive?
_______________________________________________
_______________________________________________
2. Use the output on the next visual (lsdev -C -H) to answer the
following four questions:
a) What will happen if we attempt to add another device with the SCSI address set to
4?
_______________________________________________
_______________________________________________
b) Can the 8 mm tape drive be currently used? Why?
_______________________________________________
_______________________________________________
c) Where is the printer connected? __________________
d) The Ethernet adapter is installed in what slot?
_______________________________________________
_______________________________________________
Notes:
4-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Checkpoint (2 of 2)
# lsdev -C H
name status location description
sys0 Available System Object
pci0 Available PCI Bus
isa0 Available 10-58 ISA Bus
ppa0 Available 01-R1 Standard I/O Parallel Port Adapter
lp0 Available 01-R1-00-00 IBM 4039 LaserPrinter
sa0 Available 01-S1 Standard I/O Serial Port 1
tty0 Available 01-S1-00-00 Asynchronous Terminal
mem0 Available Memory
scsi0 Available 10-80 Wide SCSI I/O Controller
rmt0 Defined 10-80-00-3,0 5.0 GB 8 mm Tape Drive
hdisk0 Available 10-80-00-4,0 SCSI Disk Drive
ent0 Available 10-60 IBM PCI 10/100 Ethernet Adapter
Notes:
Unit summary
Notes:
4-38 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
Online AIX Version 6.1 Command Reference volumes 1-6
Online AIX Version 6.1 General Programming Concepts:
Writing and Debugging Programs
Online AIX Version 6.1 Technical Reference: Kernel and
Subsystems
Note: References listed as online above are available via the IBM
Systems Information Center at the following address:
http://publib.boulder.ibm.com/infocenter/pseries/v6r1/index.jsp
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
Notes:
5-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
5-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Devices Software
System
Resource ODM SMIT Menus
Controller
Notes:
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
5-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
ODM components
Notes:
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
sm_menu_opt, sm_name_hdr,
SMIT menus sm_cmd_hdr, sm_cmd_opt
Notes:
Current focus
In this unit, we will concentrate on ODM classes that are used to store device
information and software product data. At this point, we will narrow our focus even
further and confine our discussion to ODM classes that store device information.
5-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
PdCn PdAt
Customized Databases
CuDvDr CuVPD
Config_Rules
Configuration Manager
(cfgmgr)
Copyright IBM Corporation 2008
Notes:
5-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Configuration Manager
Predefined
"Plug and Play"
PdDv
PdAt
PdCn
Config_Rules
cfgmgr
Customized Methods
CuDv Define
Device Load
CuAt Configure
Driver
CuDep Change
CuDvDr Unload Unconfigure
CuVPD Undefine
Copyright IBM Corporation 2008
Notes:
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CuDv
CuAt Network
CuDep
CuDvDr
CuVPD
Config_Rules PdDv
PdAt
history PdCn
inventory
lpp history
product inventory
lpp history
nim_* product inventory
SWservAt lpp
SRC* sm_* product
Notes:
Introduction
To support diskless, dataless, and other workstations, the ODM object classes are held
in three repositories. Each of these repositories is described in the material that follows.
/etc/objrepos
This repository contains the customized devices object classes and the four object
classes used by the Software Vital Product Database (SWVPD) for the / (root) part of
the installable software product. The root part of the software contains files that must
be installed on the target system. To access information in the other directories, this
directory contains symbolic links to the predefined devices object classes. The links are
needed because the ODMDIR variable points to only /etc/objrepos. It contains the part of
the product that cannot be shared among machines. Each client must have its own
copy. Most of this software requiring a separate copy for each machine is associated
with the configuration of the machine or product.
5-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty /usr/lib/objrepos
This repository contains the predefined devices object classes, SMIT menu object
classes, and the four object classes used by the SWVPD for the /usr part of the
installable software product. The object classes in this repository can be shared across
the network by /usr clients, dataless, and diskless workstations. Software installed in
the /usr part can be shared among several machines with compatible hardware
architectures.
/usr/share/lib/objrepos
Contains the four object classes used by the SWVPD for the /usr/share part of the
installable software product. The /usr/share part of a software product contains files
that are not hardware-dependent. They can be shared among several machines, even if
the machines have a different hardware architecture. An example of this are terminfo
files that describe terminal capabilities. As terminfo is used on many UNIX systems,
terminfo files are part of the /usr/share part of a system product.
lslpp options
The lslpp command can list the software recorded in the ODM. When run with the -l
(lower case L) flag, it lists each of the locations (/, /usr/lib, /usr/share/lib) where it finds
the fileset recorded. This can be distracting if you are not concerned with these
distinctions. Alternately, you can run lslpp -L which only reports each fileset once,
without making distinctions between the root, usr, and share portions.
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
PdDv: CuDv:
type = "14106902" name = "ent1"
class = "adapter" status = 1
subclass = "pci" chgstatus = 2
prefix = "ent" ddins = "pci/goentdd"
cfgmgr location = "02-08"
DvDr = "pci/goentdd" parent = "pci2"
Define = /usr/lib/methods/define_rspc" connwhere = "8
Configure = "/usr/lib/methods/cfggoent"
PdDvLn = "adapter/pci/14106902"
uniquetype = "adapter/pci/14106902"
PdAt: CuAt:
uniquetype = name = "ent1"
chdev -l ent1 \
"adapter/pci/14106902" attribute = "jumbo_frames"
-a jumbo_frames=yes
attribute = "jumbo_frames" value = "yes"
deflt = "no" type = "R"
values = "yes,no"
Notes:
5-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Filesystem
information ?
User/Security
information ?
Queues and
Queue devices ?
Notes:
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Lets review:
Device configuration and the ODM
1.
_______
2. 3.
AIX Kernel Applications
Figure 5-11. Lets review: Device configuration and the ODM AW186.0
Notes:
Instructions
Please answer the following questions. Please put the answers in the picture above. If
you are unsure about a question, leave it out.
1. Which command configures devices in an AIX system? (Note: This is not an ODM
command.)
2. Which ODM class contains all devices that your system supports?
3. Which ODM class contains all devices that are configured in your system?
4. Which programs are loaded into the AIX kernel to control access to the devices?
5. If you have a configured tape drive rmt1, which special file do applications access to
work with this device?
5-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
ODM commands
Object class: odmcreate, odmdrop
Descriptors: odmshow
Notes:
Introduction
Different commands are available for working with each of the ODM components:
object classes, descriptors, and objects.
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2. To delete an entire ODM class, use the odmdrop command. The odmdrop command
has the following syntax:
odmdrop -o object_class_name
The name object_class_name is the name of the ODM class you want to remove.
Be very careful with this command. It removes the complete class immediately.
5-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# vi file
PdAt:
uniquetype = "tape/scsi/scsd"
attribute = "block_size"
deflt = 512" Modify deflt to 512
values = "0-2147483648,1"
width = ""
type = "R"
generic = "DU"
rep = "nr"
nls_index = 6
# odmadd file
Notes:
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Possible queries
As with any database, you can perform queries for records matching certain criteria.
The tests are on the values of the descriptors of the objects. A number of tests can be
performed:
= equal
!= not equal
> greater
>= greater than or equal to
< less than
<= less than or equal to
like similar to; finds path names in character string data
For example, to search for records where the value of the lpp_name attribute begins
with bosext1., you would use the syntax:
lpp_name like bosext1.*
Tests can be linked together using normal boolean operations, as shown in the
following example:
uniquetype=tape/scsi/scsd and attribute=block_size
In addition to the * wildcard, a ? can be used as a wildcard character.
5-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# vi file
PdAt:
uniquetype = "tape/scsi/scsd"
attribute = "block_size"
deflt = 512" Modify deflt to 512
values = "0-2147483648,1"
width = ""
type = "R"
generic = "DU"
rep = "nr"
nls_index = 6
Notes:
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
5-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
inventory: history:
lpp_id = 38 lpp_id = 38
private = 0 ver = 6
file_type = 0 rel = 1
format = 1 mod = 0
loc0 = "/etc/qconfig fix = 0
loc1 = " ptf = "
loc2 = " state = 1
size = 0 time = 1187714064
checksum = 0 comment = ""
Copyright IBM Corporation 2008
Notes:
Contents of SWVPD
The following information is part of the SWVPD:
The name of the software product (for example, bos.rte.printers)
The version, release, modification, and fix level of the software product (for example,
5.3.0.10 or 6.1.0.0)
The fix level, which contains a summary of fixes implemented in a product
Any program temporary fix (PTF) that has been installed on the system
The state of the software product:
- Available (state = 1)
5-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
SWVPD classes
The Software Vital Product Data is stored in the following ODM classes:
lpp The lpp object class contains information about the installed
software products, including the current software product state
and description.
inventory The inventory object class contains information about the files
associated with a software product.
product The product object class contains product information about
the installation and updates of software products and their
prerequisites.
history The history object class contains historical information about
the installation and updates of software products.
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The AIX SWVPD uses software states that describe the status of an install or update
package.
5-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty Once a product is committed, if you would like to return to the old version, you must
remove the current version and reinstall the old version.
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
type
Specifies the product name or model number, for example, 8 mm (tape).
class
Specifies the functional class name. A functional class is a group of device instances
sharing the same high-level function. For example, tape is a functional class name
representing all tape devices.
5-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty subclass
Device classes are grouped into subclasses. The subclass scsi specifies all tape
devices that may be attached to a SCSI interface.
prefix
Specifies the Assigned Prefix in the customized database, which is used to derive the
device instance name and /dev name. For example, rmt is the prefix name assigned to
tape devices. Names of tape devices would then look like rmt0, rmt1, or rmt2.
base
This descriptor specifies whether a device is a base device or not. A base device is any
device that forms part of a minimal base system. During system boot, a minimal base
system is configured to permit access to the root volume group (rootvg) and hence to
the root file system. This minimal base system can include, for example, the standard
I/O diskette adapter and a SCSI hard drive. The device shown on the visual is not a
base device.
This flag is also used by the bosboot and savebase commands, which are introduced
later in this course.
detectable
Specifies whether the device instance is detectable or undetectable. A device whose
presence and type can be determined by the cfgmgr, once it is actually powered on and
attached to the system, is said to be detectable. A value of 1 means that the device is
detectable, and a value of 0 means that it is not (for example, a printer or tty).
led
Indicates the value displayed on the LEDs when the configure method begins to run.
The value stored is a decimal, but the value shown on the LEDs is hexadecimal (2418 is
972 in hex).
setno, msgno
Each device has a specific description (for example, SCSI Tape Drive) that is shown
when the device attributes are listed by the lsdev command. These two descriptors are
used to look up the description in a message catalog.
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
catalog
Identifies the file name of the national language support (NLS) catalog. The LANG
variable on a system controls which catalog file is used to show a message. For
example, if LANG is set to en_US, the catalog file /usr/lib/nls/msg/en_US/devices.cat is
used. If LANG is de_DE, catalog /usr/lib/nls/msg/de_DE/devices.cat is used.
DvDr
Identifies the name of the device driver associated with the device (for example, tape).
Usually, device drivers are stored in directory /usr/lib/drivers. Device drivers are loaded
into the AIX kernel when a device is made available.
Define
Names the define method associated with the device type. This program is called when
a device is brought into the defined state.
Configure
Names the configure method associated with the device type. This program is called
when a device is brought into the available state.
Change
Names the change method associated with the device type. This program is called
when a device attribute is changed via the chdev command.
Unconfigure
Names the unconfigure method associated with the device type. This program is called
when a device is unconfigured using:
rmdev -l.
Undefine
Names the undefine method associated with the device type. This program is called
when a device is undefined using:
rmdev -l -d.
Start, Stop
Few devices support a stopped state (only logical devices). A stopped state means that
the device driver is loaded, but no application can access the device. These two
attributes name the methods to start or stop a device.
5-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty uniquetype
This is a key that is referenced by other object classes. Objects use this descriptor a
pointer back to the device description in PdDv. The key is a concatenation of the class,
subclass, and type values.
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
PdAt:
uniquetype = "disk/scsi/osdisk"
attribute = "pvid"
deflt = "none"
values = ""
...
PdAt:
uniquetype = "tty/rs232/tty"
attribute = "term"
deflt = "dumb"
values = ""
...
Notes:
uniquetype
This descriptor is used as a pointer back to the device defined in the PdDv object class.
5-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty attribute
Identifies the name of the attribute. This is the name that can be passed to the mkdev or
chdev command. For example, to change the default name of dumb to ibm3151 for tty0,
you can issue the following command:
# chdev -l tty0 -a term=ibm3151
deflt
Identifies the default value for an attribute. Non-default values are stored in CuAt.
values
Identifies the possible values that can be associated with the attribute name. For
example, allowed values for the block_size attribute range from 0 to 2147483648, with
an increment of 1.
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CuDv:
name = "hdisk2"
status = 1
chgstatus = 2
ddins = "scdisk"
location = "01-08-01-8,0"
parent = "scsi1"
connwhere = "8,0"
PdDvLn = "disk/scsi/scsd"
Notes:
5-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty name
A customized device object for a device instance is assigned a unique logical name to
distinguish the device from other devices. The visual shows two devices, an Ethernet
adapter ent1 and a disk drive hdisk2.
status
Identifies the current status of the device instance. Possible values are:
- status = 0 - Defined
- status = 1 - Available
- status = 2 - Stopped
chgstatus
This flag tells whether the device instance has been altered since the last system boot.
The diagnostics facility uses this flag to validate system configuration. The flag can take
these values:
- chgstatus = 0 - New device
- chgstatus = 1 - Don't care
- chgstatus = 2 - Same
- chgstatus = 3 - Device is missing
ddins
This descriptor typically contains the same value as the Device Driver Name descriptor
in the PdDv object class. It specifies the name of the device driver that is loaded into
the AIX kernel.
location
Identifies the physical location of a device. The location code is a path from the system
unit through the adapter to the device. In case of a hardware problem, the location code
is used by technical support to identify a failing device. In many AIX systems, the
location codes are labeled in the hardware to facilitate the finding of devices.
parent
Identifies the logical name of the parent device. For example, the parent device of
hdisk2 is scsi1.
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
connwhere
Identifies the specific location on the parent device where the device is connected. For
example, the device hdisk2 uses the SCSI address 8,0.
PdDvLn
Provides a link to the device instance's predefined information through the uniquetype
descriptor in the PdDv object class.
5-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
CuAt:
name = "ent1"
attribute = "jumbo_frames"
value = "yes"
...
CuAt:
name = "hdisk2"
attribute = "pvid"
value = "00c35ba0816eafe50000000000000000"
...
Notes:
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CuDep: CuVPD:
name = "rootvg name = "hdisk2"
dependency = "hd6" vpd_type = 0
vpd = "*MFIBM *TM\n\
HUS151473VL3800 *F03N5280
CuDep:
*RL53343341*SN009DAFDF*ECH179
name = "datavg 23D *P26K5531 *Z0\n\
dependency = "lv01" 000004029F00013A*ZVMPSS43A
*Z20068*Z307220"
Notes:
PdCn
The Predefined Connection (PdCn) object class contains connection information for
adapters (sometimes called intermediate devices). This object class also includes
predefined dependency information. For each connection location, there are one or
more objects describing the subclasses of devices that can be connected.
The sample PdCn objects on the visual indicate that, at the given locations, all devices
belonging to subclass SCSI could be attached.
CuDep
The Customized Dependency (CuDep) object class describes device instances that
depend on other device instances. This object class describes the dependence links
between logical devices and physical devices, as well as dependence links between
5-38 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty logical devices, exclusively. Physical dependencies of one device on another device are
recorded in the CuDv object class.
The sample CuDep objects on the visual show the dependencies between logical
volumes and the volume groups they belong to.
CuDvDr
The Customized Device Driver (CuDvDr) object class is used to create the entries in
the /dev directory. These special files are used from applications to access a device
driver that is part of the AIX kernel. The attribute value1 is called the major number and
is a unique key for a device driver. The attribute value2 specifies a certain operating
mode of a device driver.
The sample CuDvDr objects on the visual reflect the device driver for disk drives
hdisk2 and hdisk3. The major number 36 specifies the driver in the kernel. In our
example, the minor numbers 0 and 1 specify two different instances of disk dives, both
using the same device driver. For other devices, the minor number may represent
different modes in which the device can be used. For example, if we were looking at a
tape drive, the operating mode 0 would specify a rewind on close for the tape drive, the
operating mode 1 would specify no rewind on close for a tape drive.
CuVPD
The Customized Vital Product Data (CuVPD) object class contains vital product data
(manufacturer of device, engineering level, part number, and so forth) that is useful for
technical support. When an error occurs with a specific device, the vital product data is
shown in the error log.
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
Notes:
5-40 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 5. The Object Data Manager (ODM) 5-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Notes:
5-42 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
Online AIX Version 6.1 Operating system and device
management
Note: References listed as online above are available at the following
address:
http://publib.boulder.ibm.com/infocenter/pseries/v6r1/index.jsp
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
Describe the process of loading an AIX boot image
Describe the contents of the boot logical volume (BLV)
Fix a corrupted boot logical volume
View and modify boot lists
Use System Management Services (SMS)
Boot into maintenance mode to access a system that will
not boot
Interpret LED codes and console messages displayed
during boot
Notes:
6-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Power ON
System boot: Hardware
Hardware initialization
AIX Initialization
Normal mode Locate boot device using
Normal service bootlist (NVRAM) or
(Multiuser mode) mode?
No
rc.boot alternate bootlist from firmware
Phase 1
System boot:
rc.boot
Phase 2
Software
Service mode
(Boot from alternate media)
init starts
y Diagnostics CD-ROM
processes
y Installation CD-ROM
from /etc/inittab
y mksysb tape
rc.boot y etc.
Phase 3
Notes:
Introduction
Booting a system running AIX proceeds in three overall stages:
- Hardware initialization
- Location of the boot device and loading of the boot image
- AIX initialization
Our focus here will be on locating and loading the boot image and using the low level
configuration tool (SMS) to set the boot list.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Hardware
initialization
Boot disk
Load boot image from boot logical volume:
Kernel, RAMFS, & base ODM
AIX initialization
phase 1 AIX initialization
Notes:
Introduction
This visual shows the details of the Load the boot image into memory block from the
AIX Startup Process visual.
6-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Hardware initialization
System firmware (also called Read Only Storage (ROS)) initializes the hardware and
loads the boot image into memory. The RSPC and CHRP platforms use an additional
piece of software called SOFTROS to load the boot image. SOFTROS resides in the
boot logical volume (BLV).
BLV
The BLV is a logical volume on the boot disk which contains the boot image. The BLV is
part of rootvg and has a logical volume type attribute of boot.
AIX initialization
When the boot image is loaded into memory, control is transferred to the kernel. This is
the start of AIX initialization.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
6-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Boot disk
Boot disk
hd5
(Boot logical volume)
Notes:
Boot record
The boot record is a 512-byte block containing the size and location of the boot image.
This is read by ROS to locate the BLV.
SOFTROS
The RSPC and CHRP platforms use the SOFTROS program to perform system
initialization not provided by the hardware ROS (firmware). SOFTROS is not included in
the boot logical volume for RS6K platforms.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
bootexpand
bootexpand uncompresses the kernel and RAM file system.
Compressing the boot image reduces its size to less than half. This saves space on the
boot device and also requires less time to load from the media. When bootexpand is
finished, control is passed to the kernel.
By default, the kernel and the RAM file system are compressed. However, it is possible
to create an uncompressed BLV, in which case, bootexpand is not included.
Kernel
The kernel initializes itself and then executes /etc/init in the RAM file system.
The kernel that is loaded from the boot logical volume is never replaced during the boot
process. The same kernel is used in multiuser mode. A copy of the kernel also exists on
the hard disk (/unix), but this copy is only used for reference by the ps command. If you
need a new kernel, you must re-create the BLV with the new kernel.
6-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
Initially, the BLV is created as part of the software installation. The BLV may also be
re-created when the base operating system (bos) software is upgraded. However, there
may be circumstances where you will be required to re-create the BLV manually, for
example:
- If the BLV has become corrupted, the system will not boot.
- If a new kernel is needed. Since the system kernel is loaded from the BLV, you must
update the BLV if you wish to use a new kernel.
- If you want to enable kernel debug features or change certain performance-related
variables.
6-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Kernel
By default, bosboot uses /unix on the root file system for the kernel in the boot image.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
SOFTROS
If the system architecture is CHRP or RSPC, bosboot copies the appropriate version of
SOFTROS from the root file system:
File Description
/usr/lib/boot/aixmon.chrp SOFTROS for CHRP architecture
/usr/lib/boot/aixmon_rspc SOFTROS for RSPC architecture
Syntax
bosboot has a number of options to provide fine-grained control in creating a boot
image. The two most commonly used options are shown below. See the man page for
further details on this command.
bosboot -a -d device
Argument Description
-a Create a complete boot image and write it to the BLV.
Use -d device to specify the physical boot disk (normally
/dev/hdisk0) containing the BLV which you want to update. The
-d device bosboot command will identify the BLV on the boot disk. If the -d
flag is omitted, bosboot uses the boot device used for the last
system boot (bootinfo -b provides this information).
6-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Boot alternatives
The device the system will boot off of is the first one it finds in the designated bootlist.
Whenever the effective boot device is bootable media, such as a mksysb tape/CD/DVD
or installation media, the system will boot to the Install and Maintenance menu.
If the booting device is a network adapter, the mode of boot depends on the
configuration of the NIM server which services the network boot request. If the NIM
server is configured to support an AIX installation or a mksysb recover, then the system
will boot to the Install and Maintenance menu. If the NIM server is configured to serve
out a maintenance image, then the system boots to a Maintenance menu (a sub-menu
of the Install and Maintenance menu). If the NIM server is configured to serve out a
diagnostic image, then we boot to a diagnostic mode.
There are other ways to boot to a diagnostic utility. If the booting device is a CD with a
diagnostic CD in the drive, we boot into that diagnostic utility. If a service mode boot is
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
requested and the booting device is a hard drive with a BLV, then the system boots into
the diagnostic utilities.
The system can be signaled which bootlist to use during the boot process. The default
is to use the normal bootlist and boot in a normal mode. This can be changed during a
window of opportunity between when the system discovers the keyboard and before it
commits to the default boot mode. The signal may be generated from the system
console (this may be an HMC-provided virtual terminal) or from a service processor
attached workstation (such as an HMC) which can simulate a keyboard signal at the
right moment.
The keyboard signal that is used can vary from firmware to firmware, but the most
common is a numeric 5 to indicate the firmware provide service bootlist and a numeric 6
to indicate the customizable service bootlist. Either of these special keyboard signals
will result in a service mode boot, which, as we stated earlier, can cause a boot to
diagnostic mode when booting off a BLV on your hard drive.
6-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
lpar2
lpar3
user: hscroot
Service
LAN Processor
pw: abc123
Hardware Management
Console (HMC)
Remote Workstation
Notes:
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
With HMCv7 (which supports both POWER5- and POWER6-managed systems), the
remote graphic interface is provided by Web services which can be accessed from a
standard Web browser, such as Internet Explorer or Mozilla.
6-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
After accessing the HMC, you can reach the HMC Server Management application by
left-clicking to select it from the Server and Partition item in the left navigation panel of
the HMC. You can click the + and - signs to expand or collapse the output.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
6-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
To activate a partition manually, select either the partition name or one of the profiles
that have been created for that partition, right-click and then select Activate.
To activate partitions, the managed system must be powered on and in either the
Standby or the Operating state.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- Not Available: This partition is not available for use. Logical partitions will be listed
as Not Available if the system is powered off.
- Shutting Down: The partition has been issued the Partition Shut Down command
and is in the process of shutting down.
- Open Firmware: The partition has been activated and started with the open firmware
boot option.
Activating a partition
To activate a partition, select a partition profile name, right-click, and select Activate.
Another window will open which is shown on the next visual.
Alternatively, you can select the partition name, right-click, and select Activate. The
difference with this procedure is that the default partition profile will be selected
automatically in the window that opens.
6-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
The window shown in the visual above opens after you select a partition profile and
choose Activate. It verifies the correct partition name and has the profile selected by
default. You may choose whether or not to open the virtual terminal window as part of
the activation process.
Once you activate a partition and it is running, it is referred to as an active partition.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
6-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The HMCv7 graphical interface has a layout which is similar to the WebSM interface, in
that it has a navigation area on the left and a content area on the right. But the details
and the path it takes to do a task is significantly different.
Navigating
The main panel you need to get to, for the types of tasks which we will be performing in
the course, is the one with the partitions for your managed system. To get there, you
need to expand the hierarchy of items under Systems Management in the navigation
area. Once you have expanded Managed Systems, you next need to expand Servers.
This gives you a list of the various managed systems which are managed by this HMC.
You then locate the managed system of interest and click it to bring up the panel with
the LPARs for that system.
6-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
An important column next to the partitions is Status. It will tell us whether the partition is
either Running or Not Activated. Another important column is Reference Code which
displays information about the progress of our system boot operation.
In order to work with a logical partition, you need to select it by clicking the box to the
left of the partition name. After a brief delay, a small menu icon will appear to the right of
the partition name. At this point, you can either use the Tasks area on the lower part of
the window or the menu icon to navigate to the task you want to invoke.
Two of the major menu items are Operations and Console Window, both of which we
can use in this course. If we expand Operations we will see several operation
categories, the most important of which is Activate (or shutdown if the LPAR is
currently in a state of not-active. The Console item is one way to start and stop a virtual
console session with your partition.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The Activate Logical Partition window allows you to control how the partition is
activated.
The profiles allow you to specify the resource allocations for the partition.
Another option is to ask for a virtual terminal to be started to allow you to interact with
the system console.
The Advanced... button opens a window which allows you to override the boot mode
which is defined in the profile (usually Normal). Once you have selected the boot mode,
you would click OK, and then click OK in the original Activate Logical Partition window.
6-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
5
or Maintenance
Notes:
Maintenance mode
If the BLV is corrupted (for example, bad blocks on a disk might cause a corrupted
BLV), the machine will not boot.
To fix this situation, you must boot your machine in maintenance mode, from a CD or
tape. If NIM has been set up for a machine, you can also boot the machine from a NIM
master in maintenance mode. NIM is actually a common way to do special boots in
either a Cluster 1600 or a logical partition environment.
Bootlists
The bootlists are set using the bootlist command or the System Management
Services (SMS) program. Most machines support both a normal and service bootlist. If
your model supports this, you will use a function key during bootup to select the
appropriate list. Normally, pressing F5 when you hear the tone that indicates keyboard
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
discovery during bootup forces the machine to use the firmware default bootlist which
lists media devices first. So, it will check for a bootable CD or tape before looking for a
disk to boot.
6-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty The bosboot command requires that the boot logical volume (hd5) exists. If you ever
need to re-create the BLV from scratch (maybe it had been deleted by mistake or the
LVCB of hd5 has been damaged) the following steps should be followed:
1. Boot your machine in maintenance mode:
- From CD or tape press either F5 of 5 or press either F1 or 1 to access the
Systems Management Services (SMS) to select boot device.
2. Remove the old hd5 logical volume:
# rmlv hd5
3. Clear the boot record at the beginning of the disk:
# chpv -c hdisk0
4. Create a new hd5 logical volume: one physical partition in size, must be in
rootvg and outer edge as intrapolicy. Specify boot as logical volume type:
# mklv -y hd5 -t boot -a e rootvg 1
5. Run the bosboot command as described on the visual:
# bosboot -ad /dev/hdisk0
6. Check the actual bootlist:
# bootlist -m normal -o
7. Write data immediately to disk:
# sync
# sync
8. Shutdown and reboot the system:
# shutdown -Fr
By using the internal command ipl_varyon -i you can check the state of the boot
record.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Service Mode:
# bootlist -m service -o
cd0
hdisk0 blv=hd5
ent0
# diag
TASK SELECTION LIST
Display Service Hints
Display Software Product Data
Display or Change Bootlist
Gather System Information
Copyright IBM Corporation 2008
Notes:
Introduction
You can use the command bootlist or diag from the command line to change or
display the bootlists. You can also use the SMS programs. SMS is covered on the next
visual.
bootlist command
The bootlist command is the easiest way to change the bootlist. The first example
shows how to change the bootlist for a normal boot. In this example, we boot either from
hdisk0 or hdisk1. To query the bootlist, you can use the -o option.
The second example shows how to display the service mode bootlist.
The bootlist command also allows you to specify IP parameters to use when
specifying a network adapter:
6-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
diag command
The diag command is part of the package bos.rte.diag which allows diagnostic tasks.
One part of these diagnostic tasks allows for displaying and changing bootlists. Working
with the diag command is covered later in the course.
Types of bootlists
The custom bootlist is the normal bootlist set using the bootlist command, the diag
command, or the SMS programs. The normal bootlist is used during a normal boot. The
default bootlist is called when F5 or F6 is pressed during the boot sequence. Most
machines, in addition to the default bootlist and the customized normal bootlist, allow for
a customized service bootlist. This is set using mode service with the bootlist
command. The default bootlist is called when F5 is pressed during boot. The service
bootlist is called when F6 is pressed during boot. (For POWER5 and POWER6 systems,
the numeric 5 or 6 key is pressed.) For machines which are partitioned into logical
partitions, the HMC is used to boot the partitions and it provides for specifying boot
modes, thus eliminating the need to time the pressing of special keys. Since pressing
either F5 (or 5) or F6 (or 6) causes a service boot and a service boot using a BLV will
result in booting to diagnostics, these options are referred to as booting to diagnostic
either with the default bootlist or the stored (customizable) bootlist.
Here is a list summarizing the boot modes and the manual keys associated with them
(this may vary depending on the model of your machine):
- F1 (graphic console) or 1 (ASCII console and newer models): Start System
Management Services
- F5 (graphic console) or 5 (ASCII console and newer models): Start a service boot
using the default service bootlist (which searches the removable media first). If
booting off disk, it will boot to diagnostics.
- F6 (graphic console) or 6 (ASCII console and newer models): Start a service boot
using the customized service bootlist. If booting off of disk, it will boot to diagnostics.
You may find variations on the different models of AIX systems. Refer to the User Guide
for your specific model at:
http://publib.boulder.ibm.com/infocenter/pseries/index.jsp?topic=/com.ibm.pseries.doc/
hardware.htm.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM IBM
Notes:
6-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty you may do during this brief period of time is to press F1 (or 1) key to request that the
system boot using SMS firmware code.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
===> 8
Notes:
6-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty Select the device type. If you do not have many bootable devices, it is sometimes
easier to use the List All Devices menu option.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1. Information
2. Set Boot Sequence: Configure as 1st Boot Device
===> 2
Current Boot Sequence
1. SAS 73407 MB Harddisk, part=2 (AIX 6.1.0)
( loc=U789D.001.DQDWAYT-P3-D1 )
2. None
3. None
4. None
Copyright IBM Corporation 2008
Notes:
6-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
553
Internet
Modem
S2
Service Processor
Modem IBM Support
553, ... Center
Automatic transmittal of
boot failure information
Notes:
Introduction
The service processor allows actions to occur even when the regular processors are
down.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
In partitioned systems, the HMC receives the information from the service processors
on the systems it manages and the HMC Service Aid component is the utility which
places the call-home to the IBM Service Center.
A valid service contract is a prerequisite for this call-home feature of the service
processor or the HMC service aid.
Other features
Other features of the service processor are:
- Console mirroring to make actions performed by a remote technician visible and
controllable by the customer.
- Remote as well as local control of the system (power on/off, diagnostics,
reconfiguration, and maintenance).
- Run-time hardware and operating system surveillance. If, for example, a CPU fails,
the service processor would detect this, reboot itself automatically, and run without
the failed CPU.
- Timed power on and power off, reboot on crash, and reboot on power loss.
6-38 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Maintenance
1. Access a Root Volume Group
2. Copy a System Dump to Media Perform corrective actions
3. Access Advanced Maintenance
4. Install from a System Backup
Recover data
Notes:
Introduction
Before discussing LED/LCD codes that are shown during the boot process, we want to
identify how to access a system that will not boot. The maintenance mode can be
started from an AIX CD, an AIX bootable tape (like a mksysb), or a network device that
has been prepared to access a NIM master. The devices that contain the boot media
must be stored in the bootlists.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
LPAR operation on the HMC to allocate that slot. Remember to rerun cfgmgr to
discover the device after it has been allocated.
- Verify your bootlist, but do not forget that some machines do not have a service
bootlist. Check that your boot device is part of the bootlist:
# bootlist -m normal -o
- If you want to boot from your internal tape device, you will need to change the
bootlist because the tape device, by default, is not part of the bootlist. For example:
# bootlist -m normal cd0 rmt0 hdisk0
- Insert the boot media (either tape or CD) into the drive.
- Power on the system. The system begins booting from the installation media. After
several minutes, c31 is displayed in the LED/LCD panel which means that the
software is prompting on the console for input (normally to select the console device
and then select the language). After making these selections, you see the
Installation and Maintenance menu.
For partitioned systems with an HMC, you can also use the HMC to access SMS and
then select the bootable device, which would bypass the use of a bootlist.
You can also use a NIM server to boot to maintenance. For this, you would need to
place your systems network adapter in your customized service bootlist before any
other bootable devices, or use SMS to specifically request a boot over that adapter (the
latter option is the most common).
# bootlist -m service ent0 gateway=192.168.1.1 \
bserver=192.168.10.3 client=192.168.1.57
You would also need to set up the NIM server to provide a boot image for doing a
maintenance boot. For example, at the NIM server:
# nim -o maint_boot -spot <spotname> <client machine object
name>
6-40 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
First steps
When booting in maintenance mode, you first have to identify the system console that
will be used, for example your virtual console (vty), graphic console (lft), or serial
attached console (tty that is attached to the S1 port).
After selecting the console, the Installation and Maintenance menu is shown.
As we want to work in maintenance mode, we enter 3 to start up the Maintenance
menu.
From this point, we access our rootvg to execute any system recovery steps that may
be necessary.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Choice: 1
Choice [99]: 1
Notes:
6-42 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Access this Volume Group and start a shell before mounting file
systems
When you choose this selection, the rootvg will be activated, but the file system
belonging to the rootvg will not be mounted.
A typical scenario where this selection is chosen is when a corrupted file system needs
to be repaired by the fsck command. Repairing a corrupted file system is only possible
if the file system is not mounted.
Another scenario might be a corrupted hd8 transaction log. Any changes that take place
in the superblock or i-nodes are stored in the log logical volume. When these changes
are written to disk, the corresponding transaction logs are removed from the log logical
volume.
A corrupted transaction log must be reinitialized using the logform command, which is
only possible when no file system is mounted. After initializing the log device, you need
to do a file system repair for all file systems that use this transaction log. Beginning with
AIX 5L V5.1 you have to explicitly specify the file system type (JFS or JFS2):
# logform -V jfs /dev/hd8
# fsck -y -V jfs /dev/hd1
# fsck -y -V jfs /dev/hd2
# fsck -y -V jfs /dev/hd3
# fsck -y -V jfs /dev/hd4
# fsck -y -V jfs /dev/hd9var
# fsck -y -V jfs /dev/hd10opt
# exit
Keep in mind that US keyboard layout is used, but you can use the retrieve function by
using:
set -o emacs or set -o vi
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
AIX provides progress and error indicators (display codes) during the boot process.
These display codes can be very useful in resolving startup problems. Depending on
the hardware platform, the codes are displayed on the console and the operator panel.
With AIX 5L V5.2 and later, the operator panel also displays some text messages (such
as AIX is starting), during the boot process. For the purpose of this discussion,
we will focus on the numeric codes and their meanings.
Operator panel
For non-LPAR systems, the operator panel is an LED display on the front panel.
POWER4-, POWER5-, and POWER6-based systems can be divided into multiple
LPARs. In this case, a system-wide LED display still exists on the front panel. However,
6-44 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty the operator panel for each LPAR is displayed on the screen of the HMC. The HMC is a
separate system which is required when running multiple LPARs.
Documentation
Note: all information on Web sites and their design is based upon what is available at
the time of this course revision. Web site URLs and the design of the related Web
pages often change.
Online hardware documentation and AIX message codes are available at:
http://publib.boulder.ibm.com/infocenter/systems
- The content area has popular links, such as the Systems hardware service,
support, and troubleshooting link which take you to a page where you can
download the PDF for the Customer Service, Support, and Troubleshooting manual.
- The content area also has links to finder tools, such as the Systems Hardware code
finder.
- If there is no link for what you need, the search for field can be vary useful. For
example, if you want to see the latest documentation on the AIX progress codes,
simply type in your request and you will find a link to a list of codes in the search
result list.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- A search for the AIX message center provides access to not only codes, but the
messages that commands display when there is a problem.
In addition to the support site we discuss here, there is another infocenter that provides
hardware documentation:
http://publib.boulder.ibm.com/infocenter/pseries
This takes you to the IBM System p and AIX Information Center.
In the left hand navigation area, there are two links.
- The first link represents the default page which, in the content area, has useful links
for System p hardware information. For example, by clicking Support for System p
products, you will be taken to the IBM System p and AIX Information Center Web
page. From there, you would identify your hardware and software combination
(System p and AIX), and then click go.
- The second link in the navigation area is titled, at the time of this writing, System p
Hardware. In reality, clicking this link expands the navigation list to provide access
to a list of links for older pSeries and RS/6000 systems.
- Other useful links in the navigation area are:
AIX Documentation
AIX Resources
AIX Message Center
There is a hardcopy book (also available online and as a downloadable PDF file) called
RS/6000 Eserver pSeries Diagnostic Information for Multiple Bus Systems
(SA38-0509). Chapter 30, AIX diagnostic numbers and location codes provides
descriptions for the numbers and characters that display on the operator panel and
descriptions of the location codes used to identify a particular item.
6-46 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
LED/LCD
Monitor display
20EE000B F22
Notes:
Firmware checkpoints
AIX systems use the LED/LCD display to show the current boot status. These boot
codes are called firmware checkpoints.
Error codes
If errors are detected by the firmware during the boot process, an error code is shown
on the monitor. For example, the error code 20EE000B indicates that a boot record
error has occurred.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Firmware fixes
The following types of firmware (Licensed Internal Code) fixes
are available:
Server firmware
Power subsystem firmware
I/O adapter and device firmware
Types of firmware maintenance:
Disruptive (always for upgrades to new version/release)
Concurrent (only if using HMC interface for service pack)
Firmware maintenance can be done:
Using the HMC
Through the operating system (service partition)
Systems with an HMC should normally use the HMC
Firmware maintenance through the operating system is
always disruptive
Copyright IBM Corporation 2008
Notes:
Server firmware
Server firmware is the part of the LIC that enables hardware, such as the service
processor. Check for available server firmware fixes regularly, and download and install
the fixes, if necessary. Depending on your service environment, you can download,
install, and manage your server firmware fixes using different interfaces and methods,
6-48 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty including the HMC or by using functions specific to your operating system. However, if
you have a 57x or 59x model server, or you have a pSeries server that is managed by
an HMC, you must use the HMC to install server firmware fixes.
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
6-50 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint (1 of 2)
1. True or False? You must have AIX loaded on your system to use
the System Management Services programs.
2. Your AIX system is currently powered off. AIX is installed on
hdisk1 but the boot list is set to boot from hdisk0. How can you
fix the problem and make the machine boot from hdisk1?
__________________________________________________
__________________________________________________
3. Your machine is booted and at the # prompt.
a) What is the command that will display the boot list?
______________________________
b) How could you change the boot list?
______________________________
4. What command is used to build a new boot image and write it to
the boot logical volume?
_____________________________________
5. What script controls the boot sequence? _________________
Copyright IBM Corporation 2008
Notes:
6-52 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Checkpoint (2 of 2)
6. True or False? During the AIX boot process, the AIX kernel is
loaded from the root file system.
7. True or False? A service processor allows actions to occur even
when the regular processors are down.
8. List the five components of the boot logical volume (assume a
CHRP system). ______________________
________________________________________________
9. How do you boot an AIX machine in maintenance mode?
________________________________________________
________________________________________________
10. Your machine keeps rebooting and repeating the POST.
What could be the reason for this?
___________________________________________________
_____________________________________________
Notes:
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise 5
Notes:
Introduction
This exercise can be found in your Student Exercise Guide.
6-54 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Unit summary
During the boot process, the kernel from the boot image is
loaded into memory
Boot devices and sequences can be updated via the
bootlist command, the diag command, and SMS
The boot logical volume contains an AIX kernel, an ODM
and a RAM file system (that contains the boot script
rc.boot that controls the AIX boot process)
The boot logical volume can be re-created using the
bosboot command
LED codes produced during the boot process can be used
to diagnose boot problems
Notes:
Copyright IBM Corp. 2000, 2008 Unit 6. System boot: Hardware 6-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
6-56 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
Online AIX Version 6.1 Operating system and device
management
Note: References listed as Online above are available at the
following address:
http://publib.boulder.ibm.com/infocenter/pseries/v6r1/index.jsp
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
Describe the functions of rc.boot, phases 1, 2, and 3
Describe how devices are configured during AIX
initialization
Interpret LED codes and console messages displayed
during boot
Describe the use of the alog facility
List the basic features of system hang detection
Describe the System Resource Controller (SRC)
Analyze and solve boot problems
Notes:
Introduction
There are many reasons for boot failures. The hardware might be damaged or, due to
user errors, the operating system might not be able to complete the boot process.
A good knowledge of the AIX boot process is a prerequisite for all AIX system
administrators.
This unit describes the functions performed by rc.boot during AIX initialization and
provides practice with troubleshooting boot problems. In this unit, we will discuss most,
but not all, of the functions performed by rc.boot. Further details can be obtained
through study of the rc.boot script itself.
7-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
AIX Initialization
Normal mode Locate boot device using
Normal
(Multiuser mode) mode?
No
service bootlist (NVRAM)
rc.boot
Phase 1
System boot:
rc.boot
Phase 2
Software Service mode
(Boot from alternate media)
init starts
y Diagnostics CD-ROM
processes
y Installation CD-ROM
from /etc/inittab
y mksysb tape
rc.boot y etc.
Phase 3
Notes:
Introduction
In the previous unit, we discussed the process of loading an AIX boot image from the
boot logical volume. In this unit, we will cover AIX initialization. The focus is on rc.boot,
phases 1, 2, and 3.
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Kernel initialization
After being loaded into memory by the boot loader, the kernel initializes itself, mounts
the RAM file system, and starts the /etc/init process.
rc.boot
rc.boot is a script that controls AIX initialization. The rc.boot script exists on both the
RAM file system and the disk root file system (it is copied to the RAM file system
structure within the boot image by the bosboot command).
7-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
rc.boot phase 2
The RAM file system version of init calls rc.boot 2, which activates rootvg and then
mounts the rootvg file systems (/, /usr, and /var).
rc.boot phase 3
init runs the sysinit action first:
brc::sysinit:/sbin/rc.boot 3 >/dev/console 2>&1
rc.boot 3 configures the remaining devices.
Type of boot
AIX supports booting from hard disk, CD-ROM, tape, and from a network server. In this
lesson, we focus on booting from a hard disk.
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rc.boot 1
Start rc.boot 1
rootvg is not active !
510
511
Devices to activate
Display End rc.boot 1
rootvg are configured !
code
Copyright IBM Corporation 2008
Notes:
Introduction
The init process started from the RAM file system executes the boot script rc.boot 1.
The purpose of phase 1 is to configure the base devices so that rootvg can be
activated in phase 2.
Display codes
The principle progress and error codes displayed by rc.boot are shown in the visual in
dotted-line boxes. Error codes are shown to the side with the word failure (example:
548). Progress codes are shown in-line in the process flow (examples: 510 and 511).
7-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rc.boot 2 (part 1)
Start rc.boot 2
551
552
Failure ipl_varyon -v 1. Activate rootvg
552
556
517
Failure
555 fsck -fp /
Failure 2. Mount root
557 mount -f /
copycore
5. Copy dump (if required) and
umount /var
unmount /var
Notes:
Introduction
The main purposes of phase 2 are to:
- Mount the disk-based file systems
- Update the disk-based file systems with information from the RAM file system
For the purposes of discussion, we have artificially divided rc.boot phase 2 into two
parts.
1. Activate rootvg
The rootvg is varied on with a special version of the varyonvg command (ipl_varyon)
designed to handle rootvg. If ipl_varyon completes successfully, 517 is shown on the
LED, otherwise 552, 554, or 556 are shown and the boot process stops.
7-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
3. Mount /usr
The /usr disk-based file system (normally /dev/hd2) is checked by fsck. It is then
mounted to provide access to the complete command set. If the mount fails, LED 518 is
displayed and the boot stops.
The script uses the RAM file system copy of the fsck and mount commands
(/../usr/sbin/fsck and /../usr/sbin/mount). Since hd2 is not yet mounted, there is no
access to the disk-based usr commands.
4. Mount /var
Next, the /var file system is checked (fsck) and mounted. This is necessary for the next
step: copying the dump.
5. Copy dump
The copycore command checks for the presence of a system dump in the primary
paging space (hd6)). If a dump exists in the paging space device, it will be copied from
the dump device, /dev/hd6, to the copy directory which is, by default, the directory
/var/adm/ras. The /var file system is unmounted when copycore finishes.
6. Start paging
Next, swapon is run to start paging on the primary paging space (normally hd6).
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
objrepos
rootvg
hd4 (root)
Notes:
7-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
rc.boot 2 (part 2)
(continued)
553
End rc.boot 2
Notes:
Introduction
After the paging space /dev/hd6 has been made available, rc.boot 2 continues with
the tasks shown in the visual:
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
8. Copy /dev
The mergedev command copies all device files from /dev on the RAM file system to
/dev in the disk-based file system.
9. Mount /var
The disk-based /var file system is mounted.
7-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
mergedev
objrepos
cp Cu*
rootvg
hd4 (root)
Notes:
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rc.boot 3 (part 1)
553
fsck fp /tmp
mount /tmp 1. Mount /tmp file system
Notes:
Introduction
At the end of phase 2, the kernel restarts init, now using the disk-based version. init
executes commands from /etc/inittab. The first command executed is the sysinit
entry:
brc::sysinit:/sbin/rc.boot 3 >/dev/console 2>&1
When rc.boot 3 completes, init continues executing commands from /etc/inittab.
For the purposes of this discussion, we have artificially divided rc.boot phase 3 into
two parts.
553 code
Before rc.boot phase 2 exits, it displays status code 553 on the LED. If the system
hangs and this code is still displayed, it usually indicates a problem with /etc/inittab.
7-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
2. Synchronize rootvg
The rootvg is synchronized. If there are any stale partitions, syncvg will update them.
Stale partitions could occur if volume(s) in rootvg are mirrored and a disk used as a
copy in the mirrored volume(s) had been inactive. Since synchronization can take some
time, it is started in the background (&) so that rc.boot can proceed while rootvg is
being synchronized.
4. Configure console
The console is configured by cfgcon. It displays one of the following display codes:
Display code Description
Console has not been selected. cfgcon prompts user to select
c31
console.
Console is an lft terminal. lft (low function terminal) is the device
c32
name for the standard graphics console.
c33 Console is a tty.
c34 Console is a disk file.
If CDE is specified in /etc/inittab, the CDE will be started and you get a graphical boot
on the console.
5. Update ODM
The savebase command is run to synchronize the ODM in the boot logical volume with
the ODM from the root file system.
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rc.boot 3 (part 2)
No
Send System initialization
completed to console and boot log 11. Exit rc.boot 3
rc.boot exits
Notes:
7-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rc.boot summary
Command Executed Primary actions Config_Rules
from phase
rc.boot 1 RAM file system restbase
cfgmgr -f 1
Notes:
rc.boot 1
Phase 1 of rc.boot is run from the RAM file system. The primary actions are:
- The base ODM is restored from the boot image to the RAM file system (restbase)
- The base devices are configured using the phase 1 methods from Config_Rules
(cfgmgr -f)
7-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty rc.boot 2
Phase 2 is also started from the RAM file system. The primary actions are:
- The rootvg is activated (ipl_varyon)
- The rootvg file systems are mounted
- /dev files (which may have been modified by cfgmgr -f) are copied to /dev in the
rootvg (mergedev)
- ODM files (which may have been modified by cfgmgr -f) are copied to
/etc/objrepos in the rootvg
rc.boot 3
Phase 3 is started by init from /etc/inittab in the rootvg. The primary actions are:
- Configure the remaining devices: cfgmgr -p2 or cfgmgr -p3
- Save any ODM changes to the boot logical volume (savebase)
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The visual shows some common boot errors that might happen during the AIX software
boot process.
7-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Superblock corrupt?
Another thing you can try is to check the superblocks of your rootvg file systems. If you
boot in maintenance mode and you get error messages like Not an AIX file system
or Not a recognized file system type, it is probably due to a corrupt superblock in
the file system.
Each file system has two super blocks: one in logical block 1, and a copy in logical block
31. To copy the superblock from block 31 to block 1 for the root file system, issue the
following command:
# dd count=1 bs=4k skip=31 seek=1 if=/dev/hd4 of=/dev/hd4
rootvg locked?
Many LVM commands place a lock into the ODM to prevent other commands from
working at the same time. If a lock remains in the ODM due to a crash of a command,
this may lead to a hanging system.
To unlock the rootvg, boot in maintenance mode and access the rootvg with file
systems. Issue the following command to unlock the rootvg:
# chvg -u rootvg
7-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Configuration Manager
Predefined
PdDv
PdAt
PdCn
cfgmgr Config_Rules
Customized Methods
CuDv Define
CuAt Device
load
Configure
Driver
CuDep Change
CuDvDr Unconfigure
unload
CuVPD Undefine
Copyright IBM Corporation 2008
Notes:
Automatic configuration
Many devices are automatically detected by the configuration manager. For this to
occur, device entries must exist in the predefined device object classes. The
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
configuration manager uses the methods from PdDv to manage the device state, for
example, to bring a device into the defined or available state.
Define method
When a device is defined through its define method, the information from the predefined
database for that type of device is used to create the information describing the
device-specific instance. This device-specific information is then stored in the
customized database.
Configuration order
The configuration process requires that a device be defined or configured before a
device attached to it can be defined or configured. At system boot time, the
configuration manager configures the system in a hierarchical fashion. First, the
motherboard is configured, then the buses, then the adapters that are attached, and
finally the devices that are connected to the adapters. The configuration manager then
configures any pseudodevices (volume groups, logical volumes, and so forth) that need
to be configured.
7-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
1 10 0 /etc/methods/defsys cfgmgr -f
1 12 0 /usr/lib/methods/deflvm
2 10 0 /etc/methods/defsys
2 12 0 /usr/lib/methods/deflvm
2 19 0 /etc/methods/ptynode cfgmgr -p2
2 20 0 /etc/methods/startlft (Normal boot)
3 10 0 /etc/methods/defsys
3 12 0 /usr/lib/methods/deflvm
3 19 0 /etc/methods/ptynode cfgmgr -p3
3 20 0 /etc/methods/startlft
(Service boot)
3 25 0 /etc/methods/starttty
Notes:
Introduction
The Config_Rules ODM object class is used by cfgmgr during the boot process. The
phase attribute determines when the respective method is called.
Phase 1
All methods with phase=1 are executed when cfgmgr -f is called. The first method that
is started is /etc/methods/defsys, which is responsible for the configuration of all
base devices. The second method /usr/lib/methods/deflvm loads the logical volume
device driver (LVDD) into the AIX kernel.
If you have devices that must be configured in rc.boot 1, that means before the
rootvg is active, you need to place phase 1 configuration methods into Config_Rules.
A bosboot is required afterwards.
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Phase 2
All methods with phase=2 are executed when cfgmgr -p2 is called. This takes place in
the third rc.boot phase, when the key switch is in normal position, or for a normal boot
on a PCI machine. The seq attribute controls the sequence of the execution: the lower
the value, the higher the priority.
Phase 3
All methods with phase=3 are executed when cfgmgr -p3 is called. This takes place in
the third rc.boot phase, when the key switch is in service position, or a service boot
has been issued on a PCI system.
Sequence number
Each configuration method has an associated sequence number. When executing the
methods for a particular phase, cfgmgr sorts the methods based on the sequence
number. The methods are then invoked, one by one, starting with the smallest
sequence number. Methods with a sequence number of 0 are invoked last, after those
with non-zero sequence numbers.
Boot mask
Each configuration method has an associated boot mask:
- If the boot_mask is zero, the rule applies to all types of boot.
- If the boot_mask is non-zero, the rule then only applies to the boot type specified.
For example, if boot_mask = DISK_BOOT, the rule would only be used for boots from
disk versus NETWORK_BOOT which only applies when booting via the network.
7-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
There is one time when device names can change: when you boot from an installation
or diagnostic CD-ROM. Since the CD-ROM does not have a copy of your ODM and is
read-only, it does not know your device names. This means that when cfgmgr runs from
rc.boot on the CD-ROM, it just names devices in the order it finds them. Any time
device names have a different order than the order that cfgmgr uses, device names will
change when you boot from the CD-ROM.
Example
In the example shown, there are two systems (HOST1 and HOST2). Both systems are
shut down and a disk is moved from HOST1 to HOST2. When the systems are
rebooted from the disk, existing names are preserved. However, when either system is
booted from CD-ROM, device names are changed.
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Possible problems
If device names have changed, the potential for serious problems does exist. For
example, if the boot disk for HOST2 was the disk at SCSI address 4 (the original
hdisk0) and the system administrator for HOST2 performed a New and Complete
Overwrite installation on hdisk0 (booting the system from CD-ROM), the disk at SCSI
address 2 is now hdisk0.
After the installation is complete, the system will reboot based on the boot list. The boot
list does not use device names like hdisk0, but instead points to a specific device in the
open firmware device tree. So, it will still be pointing to the disk with SCSI address 4
and would boot from the old operating system. More importantly, if there was user data
on the disk at SCSI address 2, it would be overwritten.
Avoiding problems
Device name changes when booted from CD-ROM need not cause problems if you are
careful. The CD-ROM menus give you the opportunity to identify disks using their
location codes and by listing the logical volumes on the disk.
Suggestions
Keep an on-paper record of:
- Disk names
- Their location codes
- What each disk is used for
At a minimum, you should do this for the boot disk.
Be very careful when you boot from CD-ROM. You must never assume that device
names will be the same when you boot from the CD-ROM. Always verify device names
using location codes.
Before performing possibly destructive operations, try to verify the data on the target
disk. If you are not sure, power the system down and disconnect the cables from all but
the target disk. Thirty minutes of prevention is worth hours of restoring data from tape.
If possible, try to make the boot disk be hdisk0 and connected in the location that
cfgmgr names first. Of course, this is not always possible.
7-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
alog program
/var/adm/ras/bootlog
Use the alog /var/adm/ras/BosMenus.log
command to /var/adm/ras/bosinst.data
view logs .
.
/var/adm/ras/errlog
Notes:
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
String Description
This is the first message logged by
rc.boot: starting disk boot process
rc.boot. Start of phase 1.
rc.boot: boot device is hdiskX End of phase 1.
rc.boot: executing "ipl_varyon -v" Start of phase 2.
rc.boot: run time mount of /tmp Start of phase 3.
Start of cfgmgr -p2 -v (or -p3 if in
rc.boot: executing "cfgmgr"
service mode).
cfgmgr is running in phase X First output from cfgmgr.
Configuration time: XX seconds Last output from cfgmgr.
End of phase 3. Last output from
System initialization completed.
rc.boot.
Start of /etc/rc (invoked by init
Starting Multi-user Initialization
from /etc/inittab).
End of /etc/rc. Normally the last
entry. If this is the first boot after a
Multi-user initialization completed
software installation, there may be
some output from fbcheck.
Boot log
During the boot process, rc.boot, cfgmgr (called by rc.boot to configure devices),
and several entries in the inittab file, use the boot log. The boot log is a binary file:
/var/adm/ras/bootlog.
The following command can be used to view the boot log:
alog -o -t boot
Note: For a complete description of this command, see the alog man page.
7-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Actions:
Log error in the Error Log
Display a warning message on the console
Launch recovery login on a console
Launch a command
Automatically REBOOT system
Notes:
7-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Actions
If lower priority processes are not being scheduled, shdaemon will perform the specified
action. Each action can be individually enabled and has its own configurable priority
and time-out values. There are five actions available:
- Log error in the Error Log
- Display a warning message on a console
- Launch a recovery login on a console
- Launch a command
- Automatically REBOOT the system
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Configuring shdaemon
# shconf -E -l prio
sh_pp enable Enable Process Priority Problem
pp_errlog enable Log Error in the Error Logging
pp_eto 2 Detection Time-out
pp_eprio 60 Process Priority
pp_warning enable Display a warning message on a console
pp_wto 2 Detection Time-out
pp_wprio 60 Process Priority
pp_wterm /dev/console Terminal Device
pp_login disable Launch a recovering login on a console
pp_lto 2 Detection Time-out
pp_lprio 100 Process Priority
pp_lterm /dev/console Terminal Device
pp_cmd enable Launch a command
pp_cto 5 Detection Time-out
pp_cprio 60 Process Priority
pp_cpath /home/unhang Script
pp_reboot disable Automatically REBOOT system
pp_rto 5 Detection Time-out
pp_rprio 39 Process Priority
Notes:
Introduction
The shdaemon configuration information is stored as attributes in the SWservAt ODM
object class. Configuration changes take effect immediately and survive across reboots.
Use shconf (or smit shd) to configure or display the current configuration of shdaemon.
Enabling shdaemon
At least two parameters must be modified to enable shdaemon:
- Enable priority monitoring (sh_pp)
- Enable one or more actions (pp_errlog, pp_warning, and so forth)
7-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Action attributes
Each action has its own attributes, which set the priority and time-out thresholds, and
define the action to be taken. The timeout attribute unit of measure is in minutes.
Example
In the example shown, shdaemon is enabled to monitor process priority (sh_pp=enable),
and the following actions are enabled:
- Log error in the Error Log (pp_log=enable)
Every two minutes (pp_eto=2), shdaemon will check to see if any process has been
run with a process priority number greater than 60 (pp_eprio=60). If not, shdaemon
logs an error to the error log.
- Display a warning message on a console (pp_warning=enable)
Every two minutes (pp_wto=2), shdaemon will check to see if any process has been
run with a process priority number greater than 60 (pp_wprio=60). If not, shdaemon
sends a warning message to the console specified by pp_wterm.
- Launch a command (pp_cmd=enable)
Every five minutes (pp_cto=5), shdaemon will check to see if any process has been
run with a process priority number greater than 60 (pp_cprio=60). If not, shdaemon
runs the command specified by pp_cpath (in this case, /home/unhang).
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
7-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Start a subsystem
# startsrc -s lpd
0513-059 The lpd Subsystem has been started. Subsystem PID is 12472.
Refresh a subsystem
# refresh -s lpd
0513-095 The request for subsystem refresh was completed successfully.
Stop a subsystem
# stopsrc -s lpd
0513-044 The lpd Subsystem was requested to stop.
Notes:
SRC status
The lssrc command is used to show the status of the SRC. In the example shown, we
are checking the status of the spooler group using the -g option. To list the status of all
processes, the -a should be used:
lssrc -a
The -s and -g options control subsystems or subsystem groups respectively. These
can be used with the SRC commands.
SRC control
In the remaining examples, we are controlling one subsystem, lpd - the daemon that
controls the print server. Use startsrc to start subsystems or groups. Use stopsrc to
stop subsystems or groups. The refresh command forces the subsystem to reread any
of its configuration files.
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint (1 of 2)
Notes:
7-38 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Checkpoint (2 of 2)
3. Which ODM file is used by cfgmgr during boot to configure
the devices in the correct sequence?
______________________________
Notes:
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise 6
Notes:
Introduction
This exercise can be found in your Student Exercise Guide.
7-40 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Unit summary
Notes:
Copyright IBM Corp. 2000, 2008 Unit 7. System boot: Software 7-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
7-42 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
SG25-7559 IBM AIX Version 6.1 Differences Guide
SC23-6629 AIX Version 6.1 Release Notes
SC23-6630 AIX Version 6.1 Expansion Pack Release Notes
Online AIX Version 6.1 Installation and migration
Copyright IBM Corp. 2000, 2008 Unit 8. Installation and initial configuration 8-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
List the different installation and media options available
List the steps necessary to install the AIX base operating
system
Identify the tasks that can be carried out using the
Configuration Assistant
Notes:
8-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Installation methods
CD-ROM
Tape (not available for AIX 5L or AIX 6 installation)
4 mm
8 mm
Notes:
Required memory
In AIX 6.1, 256 MB of RAM is the minimum required to install the base operating
system.
In AIX 5L V5.2 and AIX 5L V5.3, 128 MB of RAM is required to install the base
operating system (BOS).
Platform type
Beginning with AIX 5L V5.2, the Common Hardware Reference Platform (CHRP) is the
only supported platform. Execute bootinfo -p to get your hardware platform and
bootinfo -y to check. As of AIX 6.1, the 32-bit kernel has been deprecated. Therefore,
64-bit hardware is required run AIX 6.1 (POWER4, POWER5, or POWER6 systems
only).
Copyright IBM Corp. 2000, 2008 Unit 8. Installation and initial configuration 8-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Media type
The contents of the CD-ROM is packaged in a file system format, thus the installation
process from a CD is carried out in a different format from the tape.
Preinstallation option
The preinstallation option is only valid if accompanied by a hardware order that includes
the preinstalled AIX.
8-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Power on system
Press 5
Copyright IBM Corporation 2008
Notes:
Copyright IBM Corp. 2000, 2008 Unit 8. Installation and initial configuration 8-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
you see icons of the hardware devices appear on the screen. The machine is
completing a power on self-test (POST). If you insert the media before the POST is
done (about 30 seconds), the machine can still boot from that media.
For partitioned machines, the logical partition will be started from the HMC. There is no
POST phase for a partition activation; that occurs when powering on the entire
managed system.
Once the POST is complete, the system searches the boot list for a bootable image.
When it finds the bootable image, you can see menus appear on the screen.
When to press 5
If the machine doesn't reach the installation menu, but instead keeps cycling through
the POST, it is because the CD (or whatever installation device you are trying to use) is
not in the boot list. If this happens and you are installing by CD, just after the keyboard
is discovered, press 5. This invokes the default service boot list. The CD is on that list. If
you are attempting to install by tape, you need to add a tape device to a bootlist. This is
done via the SMS program. This is discussed later. Older AIX servers and AIX releases
may require using the F5 key instance of the 5 key.
For a partition activation, you would use the advanced activation options to specify that
you want a Diagnostic w/ default bootlist. This is the equivalent of pressing 5.
8-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
NEXT:
Select the language
for installation
Notes:
Copyright IBM Corp. 2000, 2008 Unit 8. Installation and initial configuration 8-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- Terminal type=dumb
- Speed=9600
- Parity=none
- Bits per character=8
- Stop bits=1
- Line Control=IPRTS
- Operating mode=echo
- Turnaround character=CR
The boot program does not redisplay the message if you missed it the first time. If your
terminal was not correctly configured, you can still press 2 and press Enter to continue,
once you have corrected the problem.
8-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Type the number of your choice and press Enter. Choice indicated by >>>
88 Help ?
99 Previous Menu
>>> Choice [1]: 2
Notes:
Overview
To confirm or change the installation and system settings that have been set for this
system, type 2, and then press Enter. Type 88 to display help on this or any subsequent
installation screen.
Copyright IBM Corp. 2000, 2008 Unit 8. Installation and initial configuration 8-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Either type 0 or press Enter to install with current settings, or type the
number of the setting you want to change and press Enter.
1 System Settings:
Method of installation ...................... New and Complete Overwrite
Disk where you want to Install ........ Hdisk0
Notes:
Overview
The Installation and Settings menu allows you to:
- Set the type of installation:
Migration
Preservation
New and Complete Overwrite
- Determine the installation disk
- Set the primary language environment
- Set more options
8-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Method of installation
Option 1 of the Installation and Settings menu:
Change Method of Installation
88 Help ?
99 Previous Menu
>>> Choice [2]: 1
Notes:
Preservation Install
Use the Preservation Install option when a previous version of BOS is installed on
your system and you want to preserve the user data in the root volume group. This
Copyright IBM Corp. 2000, 2008 Unit 8. Installation and initial configuration 8-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
method removes only the contents of /usr, / (root), /var and /tmp. The Preservation
Install option preserves page and dump devices as well as /home and other
user-created file systems. System configuration has to be done after doing a
preservation installation.
Migration Install
Migration prior to AIX V4.2.1 is not supported. Use the Migration Install option to
upgrade an AIX V4.2.1 or later system to an AIX 5L or later version, while preserving
the existing root volume group. This method preserves all file systems except /tmp, as
well as the logical volumes and system configuration files. Obsolete or selective fix files
are removed. The Migration Install option is the default installation method for an AIX
system running Version 4.x.
The installation process determines which optional software products are installed.
8-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Installation disks
Size VG
Name Location Code (MB) Status Bootable
>>>1 hdisk0 10-80-00-4,0 2063 rootvg yes
2 hdisk1 10-80-00-5,0 2063 rootvg no
Notes:
Copyright IBM Corp. 2000, 2008 Unit 8. Installation and initial configuration 8-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Choice [1]:
Notes:
Overview
At this point in the installation process, you can change the language and cultural
convention that is used on the system after installation. This screen might actually
display a number of language options, such as French, German, Italian, Byelorussian,
Ukrainian, and so forth.
It is recommended that if you are going to change the language, then you should
change it at this point rather than after the installation is complete. Whatever language
is specified at this point is obtained from the installation media.
Cultural convention determines the way numeric, monetary, and date and time
characteristics are displayed.
The Language field determines the language used to display text and system
messages.
8-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Install Options
Option 4 of the Installation and Settings menu:
Install Options
Either type 0 and press Enter to install with current settings, or type the
number of the setting you want to change and press Enter.
1. Graphics Software.................................................... Yes
2. System Management Client Software ..... Yes
3. Create JFS2 File Systems Yes
4. Enable System Backups to install any system .. Yes
( Install all devices)
88 Help ?
99 Previous Menu
>>> Choice [5]: _
Notes:
Introduction
When installing, the installation software detects it and presents some additional
installation options.
Install Options
When Graphics Software is set to yes, X11, WebSM, Java, and other software
dependent on these packages are installed. The System Management Client
Software option includes WebSM, Java, service agent, lwi, and pconsole. You may
optionally select to have JFS file systems, instead of JFS2 file systems. The Enabling
System Backups to install any system option installs all devices. Otherwise, only
device drivers necessary to your system hardware configuration are installed. To install
more software (which may require CD swapping) press Enter.
Copyright IBM Corp. 2000, 2008 Unit 8. Installation and initial configuration 8-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Either type 0 and press Enter to install with current settings, or type the
number of the setting you want to change and press Enter.
88 Help ?
99 Previous Menu
Notes:
Overview
The Install More Software menu is available in the New and Complete Overwrite
installation method, as well as the Preservation Installation method. Select Install
More Software to choose additional software to install after the BOS installation
process finishes. A software bundle file corresponds to each selection that contains the
required packages and filesets.
8-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Begin installation
Please wait . . . . . .
Notes:
Overview
The installation media contains information stored on it to determine the sizes that the
standard AIX file systems have. These are set large enough for the installation to
succeed but do not leave much free space after installation. You can dynamically
increase the size of any of the file systems once AIX has been installed. If you are
installing from a system image backup tape, the file systems created are the same sizes
and names as those on the system when the tape was created.
The files are restored from the media and then verified. This takes some time but can
be left unattended. After the BOS has installed, the appropriate locale optional program
is also installed.
Once the installation has completed, the system automatically reboots from the newly
installed operating system on disk.
Copyright IBM Corp. 2000, 2008 Unit 8. Installation and initial configuration 8-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Install Options:
Begin
Desktop
with default TCB
settings? 64-bit/JFS2 (64-bit platform)
no Graphics Software
Import User Volume Groups
Verify default install
Enable System Backups
method and settings
yes
Default yes Install More Software:
settings need to be Mozilla
changed? Kerberos_5
Server
no GNOME Desktop
Install from media KDE Desktop
Perform customization
Copyright IBM Corporation 2008
Notes:
Introduction
The flowchart in this visual summarizes the installation steps we have discussed.
8-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
After installing AIX, the operating system runs with the following default settings: one
user (root), the date and time for where the system was manufactured, and other very
general settings. You probably want to change some or all of these settings. Also, you
must provide system and network information if you want to communicate with other
systems.
The Configuration Assistant and Installation Assistant provide step-by-step instructions
for completing each customization task. Examples of tasks that can be performed are
setting the system date and time, setting the root's password, and configuring the
network.
Complete the tasks in the order that the Configuration Assistant / Installation Assistant
lists them. It is helpful to complete all customization tasks before you use your system.
Copyright IBM Corp. 2000, 2008 Unit 8. Installation and initial configuration 8-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
If using a graphics terminal for the installation, the newly installed BOS reboots and
starts the Configuration Assistant, which guides you through completing customization
tasks. When you use the Configuration Assistant immediately after BOS installation,
you have to first accept the license agreement. After doing this, only the tasks that apply
to your type of installation are shown.
If an ASCII terminal was used for the installation, an ASCII-based Installation Assistant
is displayed instead. Both the graphics-based Configuration Assistant and the
ASCII-based Installation Assistant provide comparable support.
8-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Checkpoint
Notes:
Copyright IBM Corp. 2000, 2008 Unit 8. Installation and initial configuration 8-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Notes:
8-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
Online AIX Version 6.1 Commands reference
Online AIX Version 6.1 Operating System and Device
management
Note: References listed as Online above are available at the
following address:
http://publib.boulder.ibm.com/infocenter/pseries/v6r1/index.jsp
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
Notes:
9-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The AIX LVM controls disk storage resources by mapping data between a simple and
flexible logical view of storage space and the actual physical disks.
This visual and these notes provide a brief overview of the basic components of LVM.
Components
A hierarchy of structures is used to manage disk storage:
- Volume groups
- Physical volumes
- Physical partitions
- Logical volumes
- Logical partitions
9-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty above the 1024 (1 GB) maximum for AIX 5L V5.2. (The new maximum PP size provides
an architectural support for 256 PB disks.)
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
512 130048 1 GB
Big VG 128
(1016*128)
Notes:
9-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Mirroring
Physical Logical
Partitions Partitions
write(data);
Mirrored
Logical
Volume Application
Notes:
9-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Striping
LP1
1 4 7
1
Stripe hdisk0 2
Units 3
4 LP1
2 5 8 LP2
LP2
5
6 LP3
hdisk1
7 Striped
8 Logical
LP3 9
3 6 9 Volume
Stream of
hdisk2 data
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Striped column support for logical volumes (AIX 5L V5.3 and later)
AIX 5L V5.3 further enhanced the LVM striping implementation and introduced striped
columns support for LVs. This feature allows you to extend a striped LV even if one of
the PVs in the group of disks used for the LV has become full.
In previous AIX releases, you could enlarge the size of a striped LV with the extendlv
command, but only as long as enough PPs were available within the group of disks
used for the striped LV. Rebuilding the entire LV was the only way to expand a striped
LV beyond the hard limits imposed by the disk capacities. This workaround required you
to back up and delete the striped LV and then to recreate the LV with a larger stripe
width followed by a restore operation of the LV data.
To overcome the disadvantages of this rather time-consuming procedure, AIX 5L V5.3
introduces the concept of striped columns for LVs.
In AIX 5L V5.3 and AIX 6.1, the upper bound (the maximum number of disks that can be
allocated to the LV) can be a multiple of the stripe width. One set of disks, as
determined by the stripe width, can be considered as one striped column.
If you use the extendlv command to extend a striped LV beyond the physical limits of
the first striped column, an entire new set of disks will be used to fulfill the allocation
request for additional LPs. If you further expand the LV, more striped columns may get
added as required as long as you stay within the upper bound limit. The -u flag of the
chlv, extendlv, and mklvcopy commands allows you to change the upper bound to be
a multiple of the stripe width. The extendlv -u command can be used to change the
upper bound and to extend the LV in a single operation.
9-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
RAID
Adapter
RAID Array
Controller
Group of
disks
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Arrays can also provide data redundancy so that no data is lost if a single physical disk
in the array should fail. Depending on what is referred to as the RAID level, data is
either mirrored or striped.
9-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
The most common RAID levels are RAID 0, RAID 1, and RAID 5. These RAID levels
are described in the paragraphs that follow.
RAID 0
RAID 0 is known as disk striping. Conventionally, a file is written out to (or read from) a
disk in blocks of data. With striping, the information is split into chunks (a fixed amount of
data) and the chunks are written to (or read from) a series of disks in parallel.
RAID 0 is well suited for applications requiring fast read or write accesses. On the other
hand, RAID 0 is only designed to increase performance; there is no data redundancy, so
any disk failure will require reloading from backups.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Select RAID level 0 for applications that would benefit from the increased performance
capabilities of this RAID level. Never use this level for critical applications that require
high availability.
RAID 1
RAID 1 is known as disk mirroring. In this implementation, duplicate copies of each
chunk of data are kept on separate disks or as is more common, each disk has a twin
that contains an exact replica (or mirror image) of the information. If any disk in the array
fails, then the mirrored twin can take over.
Read performance can be enhanced as the disk with its actuator closest to the required
data is always used, thereby minimizing seek times. The response time for writes can be
somewhat slower than for a single disk, depending on the write policy; the writes can
either be executed in parallel for speed, or serially for safety. This technique improves
response time for read-mostly applications, and improves availability. The downside is
you will need twice as much disk space.
RAID 1 is most suited to applications that require high data availability, good read
response times, and where cost is a secondary issue.
RAID 5
RAID 5 can be considered as disk striping combined with a type of mirroring. That
means that data is split into blocks that are striped across the disks, and parity
information is written that allows recovery in the event of a disk failure.
Parity data is never stored on the same drive as the blocks that are protected. In the
event of a disk failure, the information can be rebuilt by the using the parity information
from the remaining drives.
Select RAID level 5 for applications that manipulate small amounts of data, such as
transaction processing applications. This level is generally considered the best
all-around RAID solution for commercial applications.
9-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
LVM identifiers
Goal: Unique worldwide identifiers for
Volume groups
Hard disks
Logical volumes
# lsvg rootvg
... VG IDENTIFIER: 00c35ba000004c00000001157f54bf78
Notes:
Use of identifiers
The LVM uses identifiers for disks, VGs, and LVs. As VGs could be exported and
imported between systems, these identifiers must be unique worldwide.
All identifiers are based on the CPU ID of the creating host and a timestamp.
9-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty used (for example, many database systems use raw LVs), be careful that these
programs do not destroy the LVCB.
LVCB-related considerations
For standard VGs, the LVCB resides in the first block of the user data within the LV. Big
VGs keep additional LVCB information in the VGDA. The LVCB structure on the first LV
user block and the LVCB structure within the VGDA are similar but not identical. (If a big
VG was created with the -T 0 option of the mkvg command, no LVCB will occupy the first
block of the LV.) With scalable VGs, LV control information is no longer stored on the
first user block of any LV. All relevant LV control information is kept in the VGDA as part
of the LVCB information area and the LV entry area. So, no precautions have to be
taken when using raw LVs, because there is no longer a need to preserve the
information held by the first 512 bytes of the logical device.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
AIX Files
/etc/vg/vgVGID Handle to the VGDA copy in memory
/dev/hdiskX Special file for a disk
/dev/VGname Special file for administrative access to a VG
/dev/LVname Special file for a logical volume
/etc/filesystems Used by the mount command to associate
LV name, file system log, and mount point
Notes:
9-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
The table on the visual shows the contents of the VGDA. The individual items listed are
discussed in the paragraphs that follow.
Time stamps
Time stamps are used to check if a VGDA is valid. If the system crashes while changing
the VGDA, the time stamps will differ. The next time the VG is varied on, this VGDA is
marked as invalid. The latest intact VGDA will then be used to overwrite the other
VGDAs in the VG.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
VGDA example
# lqueryvg -p hdisk1 -At
Max LVs: 256
PP Size: 20 1: ____________
Free PPs: 12216
LV count: 3 2: ____________
PV count: 1 3: ____________
Total VGDAs: 2 4: ____________
MAX PPs per PV: 32768
MAX PVs: 1024
Logical:
5: ____________
00c35ba000004c00000001157fcf6bdf.1 lv00 1
00c35ba000004c00000001157fcf6bdf.2 lv01 1
00c35ba000004c00000001157fcf6bdf.3 lv02 1
Physical: 00c35ba07fcf6b93 2 0
6: ____________ 7: ____________
Copyright IBM Corporation 2008
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
b. 2 VGDAs in VG
c. 3 LVs in VG
d. PP size = 220 (2 to the 20th power) bytes, or 1 MB (for this VG)
e. LVIDs (VGID.minor_number)
f. 1 PVs in VG
g. PVIDs
9-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Example on visual
In the example on the visual, the getlvcb command is used to obtain information from
the LV hd2. The information displayed includes the following:
- Intrapolicy, which specifies what strategy should be used for choosing PPs on a PV.
The five general strategies are edge (sometimes called outer-edge), inner-edge,
middle (sometimes called outer-middle), inner-middle, and center (c = Center).
- Number of copies (1 = No mirroring).
- Interpolicy, which specifies the number of PVs to extend across (m = Minimum).
- LVID
9-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
mkvg
extendvg
mklv Update
crfs exportvg
chfs
rmlv
reducevg
...
Copyright IBM Corporation 2008
Figure 9-16. How LVM interacts with ODM and VGDA AW186.0
Notes:
High-level commands
Most of the LVM commands that are used when working with VGs, PVs, or LVs are
high-level commands. These high-level commands (like mkvg, extendvg, mklv, and
others listed on the visual) are implemented as shell scripts and use names to reference
a certain LVM object. The ODM is consulted to match a name, for example, rootvg or
hdisk0, to an identifier.
9-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty situation where the VGDA/LVCB and the ODM are not in sync. The same situation may
occur when low-level commands are used incorrectly.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CuDv:
name = "hdisk2"
status = 1
chgstatus = 0
ddins = "scdisk"
location = "01-08-01-8,0"
parent = "scsi1"
connwhere = "8,0"
PdDvLn = "disk/scsi/scsd"
Copyright IBM Corporation 2008
Notes:
Key attributes
Remember the most important attributes:
- status = 1 means the disk is available
- chgstatus = 2 means the status has not changed since last reboot
- location specifies the location code of the device
- parent specifies the parent device
9-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
CuDvDr:
resource = "devno"
value1 = "36"
value2 = "0"
value3 = "hdisk3"
# ls -l /dev/hdisk[03]
brw------- 1 root system 17, 0 Oct 08 06:17 /dev/hdisk0
brw------- 1 root system 36, 0 Oct 08 09:19 /dev/hdisk3
Notes:
Special files
Applications or system programs use the special files to access a certain device. For
example, the visual shows special files used to access hdisk0 (/dev/hdisk0) and
hdisk1 (/dev/hdisk1).
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
VGID
One of the most important pieces of information about a VG is the VGID. As shown on
the visual, this information is stored in CuAt.
9-38 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
CuAt:
name = "rootvg"
attribute = "timestamp"
value = "470a1bc9243ed693"
type = "R"
generic = "DU"
rep = "s"
nls_index = 0
CuAt:
name = "rootvg"
attribute = "pv"
value = "00c35ba07b2e24f00000000000000000"
type = "R"
generic = ""
rep = "sl"
nls_index = 0
Notes:
Length of PVID
Remember that the PVID is a 32-number field, where the last 16 numbers are set to
zeros.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-40 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# ls -l /dev/hd2
brw------- 1 root system 10,5 08 Jan 06:56 /dev/hd2
Notes:
CuDvDr logical volume objects
Each LV has an object in CuDvDr that is used to create the special file entry for that LV
in /dev. As an example, the sample output on the visual shows the CuDvDr object for
hd2 and the corresponding /dev/hd2 (major number 10, minor number 5) special file
entry in the /dev directory.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Causes of problems
The signal handlers used by high-level LVM commands do not work with a kill -9, a
system shutdown, or a system crash. You might end up in a situation where the VGDA
has been updated, but the change has not been stored in the ODM.
Problems might also occur because of the improper use of low-level commands or
hardware changes that are not followed by correct administrator actions.
9-42 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty Another common problem is ODM corruption when performing LVM operations when
the root file system (which contains /etc/objrepos) is full. Always check the root file
systems free space before attempting LVM recovery operations.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# varyoffvg homevg
Notes:
9-44 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty You need to specify only one intact PV of the VG that you import. The importvg
command reads the VGDA and LVCB on that disk and creates completely new
ODM objects.
Note: We will return to the export and import functions later in this course.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Problems in rootvg
For ODM problems in rootvg, finding a solution is more difficult because rootvg cannot
be varied off or exported. However, it may be possible to fix the problem using one of
the techniques described below.
9-46 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty After deleting all ODM objects from rootvg, it imports the rootvg by reading the VGDA
and LVCB from the boot disk. This results in completely new ODM objects that describe
your rootvg.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Step Action
Delete the VG information from ODM.
# odmdelete -q name=rootvg -o CuAt
# odmdelete -q parent=rootvg -o CuDv
# odmdelete -q name=rootvg -o CuDv
2
# odmdelete -q name=rootvg -o CuDep
# odmdelete -q dependency=rootvg -o CuDep
# odmdelete -q value1=10 -o CuDvDr
# odmdelete -q value3=rootvg -o CuDvDr
Add the VG associated with the PV back to the ODM.
3
# importvg -y rootvg hdisk0
Recreate the device configuration database in the ODM from the
4 information on the PV.
# varyonvg -f rootvg
This assumes that hdisk0 is part of rootvg.
In CuDvDr:
value1 = major number
value2 = minor number
value3 = object name for major/minor number
rootvg always has value1 = 10.
These steps can also be used to recover other VGs by substituting the appropriate PV
and VG information. It is suggested that this example be made into a script.
9-48 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Volume Groups
Logical Volumes
Physical Volumes
Paging Space
Notes:
Introduction
The SMIT Logical Volume Manager menu is used to manage many aspects of the
system's storage. The Web-based System Manager can also be used to manage the
Logical Volume Manager.
Volume groups
The SMIT Volume Groups menu provides facilities to manipulate the VGs in the system.
Logical volumes
The SMIT Logical Volumes menu provides facilities to manipulate the LVs in the
system. LVs which contain journaled file systems, paging space or dump volumes can
9-50 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty also be manipulated from their respective menus. However, the facilities on this menu
give a much lower level of control over the characteristics of the LV. For example,
features such as partition allocation policy and mirroring for an LV, can only be set using
this menu. This menu is also used when an LV, which does not contain an AIX file
system, is being manipulated.
Physical volumes
The SMIT Physical Volumes menu allows the user to configure the PVs (fixed disks) in
the system. This menu duplicates options on the Fixed Disks menu of Devices.
Paging space
The SMIT Paging Space menu allows a user to add, delete, activate, and list the paging
spaces available.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-52 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# lsvg
rootvg
payrollvg
# lsvg -o
rootvg
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# lsvg rootvg
Notes:
9-54 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# lsvg -p rootvg
rootvg:
PV_NAME PV STATE TOTAL PPs FREE PPs FREE DISTRIBUTION
hdisk0 active 159 52 24..00..00..00..28
hdisk1 active 159 78 32..02..00..12..32
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# lsvg -l rootvg
rootvg:
LVNAME TYPE LPs PPs PVs LV STATE MOUNT POINT
Notes:
9-56 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
VOLUME GROUP name []
Physical partition SIZE in megabytes +
* PHYSICAL VOLUME names [] +
FORCE the creation of volume group? no +
Activate volume group AUTOMATICALLY yes +
at system restart?
Volume group MAJOR NUMBER [] +#
Create VG Concurrent Capable? no +
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Using SMIT
The VG MAJOR NUMBER on the SMIT window is used by the kernel to access that
VG. This field is most often used for High Availability Network File Systems (HANFS)
and High Availability Cluster Multi-Processing (HACMP) applications.
The item on the SMIT window referring to concurrent mode operation have no meaning
on systems without HACMP installed. This item is valid on AIX V4.2 and later.
There is a separate SMIT window for adding a big VG which is identical to this window.
9-58 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
VOLUME GROUP name []
Physical partition SIZE in megabytes +
* PHYSICAL VOLUME names [] +
FORCE the creation of volume group? no +
Activate volume group AUTOMATICALLY yes +
at system restart?
Volume group MAJOR NUMBER [] +#
Create VG Concurrent Capable? no +
Max PPs per VG in units of 1024 32 +
Max Logical Volumes 256 +
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# smit vgsc
Notes:
9-60 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
* VOLUME GROUP name rootvg
* Activate volume group AUTOMATICALLY yes +
at system restart?
* A QUORUM of disks required to keep the volume yes +
group on-line ?
Convert this VG to Concurrent Capable? no +
Change to big VG format? no +
Change to scalable VG format? no +
LTG Size in kbytes 128 +
Set hotspare characteristics n +
Set synchronization characteristics of stale n +
partitions
Max PPs per VG in units of 1024 32 +
Max Logical Volumes 256 +
Notes:
Quorum of disks
The SMIT menu option A QUORUM of disks required to keep the volume group
on-line? determines if the VG is automatically varied off (deactivated) after losing its
quorum of PVs. Selecting no means that the VG stays active until it loses all of its PVs.
However, if this option is set to no then you are in danger of having backdated VGDAs.
To activate a non-quorum user-defined VG, all of the PVs within the VG must be
accessible or the activation fails.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-62 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-64 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Hot spare
Synchronization
Hot spare
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- Hot spare disks must have at least equal capacity to the smallest disk already in the
VG. Good practice dictates having enough hot spares to cover your largest mirrored
disk.
Set the hot spare migration policy for the volume group
The chvg -h command sets the migration policy for the VG. The following table shows
the arguments that can be used with the chvg -h command:
chvg -h
Description
argument
Permits one-for-one migration of partitions from one failed disk to
y (lower case) one spare disk. From the pool of hot spare disks, the smallest one
which is big enough to substitute for the failing disk is used.
Migrates partitions from a failing disk to one or more hot spare
Y (upper case)
disks; might use the complete pool of hot spare disks.
n No automatic migration takes place (the default).
r Removes all disks from the pool of hot spare disks for this VG.
For example, to set an automatic migration policy which uses the one smallest hot
spare disk that is large enough to replace the failing disk in the datavg VG, use the
command:
# chvg -hy datavg
Set the hot spare synchronization policy for the volume group
The chvg -s command is used to specify the synchronization characteristics. The
following two values are valid for the synchronization argument:
chvg -s
Description
argument
y Automatically attempts to synchronize stale partitions.
Does not automatically attempt to synchronize stale partitions (the
n
default).
9-66 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty For example, to automatically synchronize stale partitions for the datavg VG, use the
command:
chvg -sy datavg
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
hdisk4 hdisk5
Notes:
9-68 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
* VOLUME GROUP name [] +
Notes:
9-70 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# varyonvg datavg
# varyoffvg datavg
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
In AIX 6.1, the option -M allows the specification of a logical track group size for the
volume group, instead of allowing LVM to determine it dynamically.
9-72 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
VOLUME GROUP name []
* PHYSICAL VOLUME name [] +
Volume Group MAJOR NUMBER [] +#
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# chvg -g datavg
# chvg -b y datavg
Notes:
9-74 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty Bad block relocation policy should be turned off for RAID devices and storage
subsystems unless the manufacturer tells you otherwise.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-76 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
E M C M E
Inner Edge
Inner Middle
Center
Outer Middle (Middle)
Center Edge (Edge)
Inter-physical volume allocation policy:
Maximum number of physical volumes to use
Range of physical volumes to use
Copyright IBM Corporation 2008
Notes:
Introduction
When creating or changing a logical volume you can define the way the LVM decides
on which physical partitions to allocate to the logical volume. This affects the
performance of the logical volume.
9-78 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Logical Volumes
Notes:
9-80 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
lv00:/home/john
PV COPIES IN BAND DISTRIBUTION
hdisk0 010:000:000 70% 000:000:007:003:000
lv00:/home/john
LP PP1 PV1 PP2 PV2 PP3 PV3
00010134 hdisk0
0002 0135 hdisk0
00030136 hdisk0
Notes:
lslv -l lvname
The lslv -l lvname command gives information about the distribution of a particular
logical volume's logical partitions for each physical volume. The information includes
the number of logical partitions on the disk and its copies, if any, on that disk; the
percentage of physical partitions which match the intra-physical volume allocation
policy; the distribution of physical partitions on the physical volume (outer edge, outer
middle, center, inner middle, inner edge).
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
COPIES
The COPIES field of the lslv -l lvname command has the following three fields:
- The number of logical partitions containing at least one physical partition (no copies)
on the physical volume
- The number of logical partitions containing at least two physical partitions (one copy)
on the physical volume
- The number of logical partitions containing three physical partitions (two copies) on
the physical volume
The example in the visual, COPIES (010:000:000), can be interpreted as:
- 010 - Information regarding first copy, that is, 10 physical partitions
- 000:000 - These two fields hold information regarding the second and the third
copies, mirrored copies on the physical volume. By looking at this output, you can
tell if the logical volume is mirrored and if the mirrored copies are on the same
physical volume. If they are all on separate physical volumes, which is the default,
the last two fields still show 000.
IN BAND
The IN BAND field displays the percentage of physical partitions on the physical volume
that belong to the logical volume and were allocated within the physical volume region
specified by intra-physical allocation policy.
DISTRIBUTION
The DISTRIBUTION field displays the number of physical partitions allocated within each
section of the physical volume: outer edge, outer middle, center, inner middle, and inner
edge.
The example in the visual, DISTRIBUTION (000:000:007:003:000), shows that of the
10 physical partitions, seven physical partitions are located in the center area and three
physical partitions in the inner-middle area of the disk. There is a relationship between
the distribution 000:000:007:003:000 and the copies 010:000:000 whereby the
007:003 numbers indicate the distribution of the 010.
lslv -m lvname
The lslv -m lvname command gives a map of which physical volumes contain which
physical partitions for the logical partitions of the logical volume. Three columns are
given, one for each copy of a logical partition.
9-82 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-84 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
set the allocation policies for the new partitions to different values than used by the
original logical volume.
The size of a logical volume may not be decreased automatically. To make a logical
volume smaller, back it up, delete it, create a new logical volume of the desired size,
and restore the data.
9-86 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# lsvg -o | lsvg -i -l
rootvg:
LVNAME TYPE LPs PPs PVs LV STATE MOUNT POINT
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# lslv lv02
Notes:
9-88 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
* VOLUME GROUP name vg3
LOGICAL VOLUMES [lv04 lv07] +
Notes:
reorgvg syntax
The syntax is: reorgvg volumegroup [lvname]
For example: reorgvg vg3 lv04 lv07
In AIX V4.2 and later, if you enter the reorgvg command with the volume group name
and no other arguments, the entire volume group is reorganized.
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-90 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Physical Volumes
Notes:
9-92 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# lspv hdisk0
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-93
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# lspv -l hdisk0
hdisk0:
LV NAME LPs PPs DISTRIBUTION MOUNT POINT
hd1 1 1 00..00..00..12..00 /home
hd3 4 4 00..03..00..00..00 /tmp
hd2 101 101 00..00..17..12..00 /usr
hd4 9 9 00..00..13..00..00 /
hd8 1 1 00..00..01..00..00 N/A
hd6 8 8 00..00..00..08..00 N/A
hd5 2 2 01..00..00..00..00 N/A
hd9var 2 2 00..00..02..00..00 /var
hd10opt 5 5 00..00..02..00..00 /opt
hd11admin 8 8 00..00..02..00..00 /admin
Notes:
9-94 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# lspv -p hdisk0
hdisk0:
PP RANGE STATE REGION LV NAME TYPE MOUNT POINT
1-2 used outer edge hd5 boot N/A
3-154 free outer edge
155-186 used outer middle hd6 paging N/A
187-307 free outer middle
308-308 used center hd8 jfslog N/A
309-309 used center hd4 jfs2 /
310-313 used center hd2 jfs2 /usr
314-314 used center hd9var jfs2 /var
315-317 used center hd3 jfs2 /tmp
318-318 used center hd1 jfs2 /home
319-319 used center hd10opt jf22 /opt
320-360 used center hd2 jfs2 /usr
361-363 used center hd10opt jfs2 /opt
364-364 used center hd3 jfs2 /tmp
365-372 used center hd4 jfs2 /
373-380 used center hd11admin jfs2 /admin
381-423 used center hd2 jfs2 /usr
424-424 used center hd9var jfs2 /var
425-425 used center hd10opt jfs2 /opt
426-438 used center hd2 jfs2 /usr
439-460 free center
461-613 free inner middle
614-767 free inner edge
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-95
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-96 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-97
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
Notes:
9-98 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Exercise 7
Notes:
Copyright IBM Corp. 2000, 2008 Unit 9. The Logical Volume Manager (LVM) 9-99
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Notes:
9-100 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
Online AIX Version 6.1 Commands reference
Online AIX Version 6.1 Operating System and Device
management
Note: References listed as Online above are available at the
following address:
http://publib.boulder.ibm.com/infocenter/pseries/v6r1/index.jsp
Redbooks AIX Storage Management Redbook (GG24-4484)
Redbooks Logical Volume Manager from A to Z: Introduction and
Concepts Redbook (SG24-5432)
Redbooks Logical Volume Manager from A to Z: Troubleshooting
and Commands Redbook (SG24-5433)
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
Notes:
Introduction
This unit presents details regarding LVM concepts and capabilities not discussed in
detail in previous units, and it explains many disk management procedures that are very
important for any AIX 5L system administrator.
10-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Mirroring
Logical
hdisk0 Partitions
hdisk1
Mirrored
hdisk2 Logical
Volume
Notes:
Role of VGSA
The information about the mirrored partitions is stored in the VGSA, which is contained
on each disk. In the example shown on the visual, we see that logical partition 5 points
to physical partition 5 on hdisk0, physical partition 8 on hdisk1, and physical partition 9
on hdisk2.
10-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Stale partitions
hdisk0
Mirrored
Logical
hdisk1
Volume
Notes:
10-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
10-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty 5. Do not change the default entry, which is yes, for Allocate each logical
partition copy on a SEPARATE physical volume?. Otherwise you would mirror
on the same disk, which makes no sense. If you leave the default entry of yes and
no separate disk is available, mklvcopy will fail.
6. The terms Mirror Write Consistency and Scheduling Policy are explained in the next
few pages.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1. hdisk0 1 ms
scsi0
3 ms write()
2. hdisk1
scsi1
8 ms Mirrored
3. hdisk2
scsi2
Logical
Volume
Notes:
Write operations
The sequential scheduling policy performs writes to multiple copies, in order. The
multiple physical partitions representing the mirrored copies of a single logical partition
are designated primary, secondary, and tertiary.
In sequential scheduling, the physical partitions are written to in sequence; the system
waits for the write operation for one physical partition to complete before starting the
write operation for the next one.
The write() operation of the application must wait until all three partitions are written to
the disk. This decreases the performance, but increases availability. In case of a total
disk failure (for example, due to a power loss), there will always be a good copy.
10-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Mirrored
hdisk2
8 ms scsi2 Logical
Volume
Notes:
Write operations
The parallel scheduling policy starts the write operation to all copies at the same time.
When the write operation that takes the longest to complete finishes (in the example on
the visual, the one that takes eight milliseconds), the write() from the application
completes.
Read operations
Specifying mirrored logical volumes with a parallel scheduling policy may increase
overall performance due to a common read/write ratio of 3:1 or 4:1. With sequential
policy, the primary copy is always read; with parallel policy, the copy that is best
reachable is used. On each read, the system checks whether the primary is busy. If it is
not busy, the read is initiated on the primary. If the primary is busy, the system checks
the secondary. If it is not busy, the read is initiated on the secondary. If the secondary is
busy, the read is initiated on the copy with the least number of outstanding I/Os.
10-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Parallel/round-robin policy
The parallel/round-robin policy alternates reads between the copies. This results in
equal utilization for reads even when there is more than one I/O outstanding at a time.
Writes are performed concurrently.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Problem:
Parallel scheduling policy and ...
... system crashes before the writes to all mirrors have
been completed
Mirrors of the logical volume are in an inconsistent state
Notes:
10-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Option Description
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Option Description
syncvg -f -l LVname
10-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
Logical volume NAME [hd2]
NEW TOTAL number of logical partition 2
copies
PHYSICAL VOLUME names [hdisk1]
POSITION on physical volume outer edge
RANGE of physical volumes minimum
MAXIMUM NUMBER of PHYSICAL VOLUMES [32]
to use for allocation
Allocate each logical partition copy yes
on a SEPARATE physical volume?
File containing ALLOCATION MAP []
SYNCHRONIZE the data in the new no
logical partition copies?
Notes:
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
10-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Mirroring rootvg
hdisk0 hdisk1
1. extendvg 5. bosboot -a
2. chvg -Qn 6. bootlist
3. mirrorvg -s 7. shutdown -Fr
4. syncvg -v 8. bootinfo -b
Notes:
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- If you use one mirror disk, be sure that a quorum is not required for varyon:
# chvg -Qn rootvg
- Add the mirrors for all rootvg logical volumes:
# mklvcopy hd1 2 hdisk1
# mklvcopy hd2 2 hdisk1
# mklvcopy hd3 2 hdisk1
# mklvcopy hd4 2 hdisk1
# mklvcopy hd5 2 hdisk1
# mklvcopy hd6 2 hdisk1
# mklvcopy hd8 2 hdisk1
# mklvcopy hd9var 2 hdisk1
# mklvcopy hd10opt 2 hdisk1
# mklvcopy hd11admin 2 hdisk1
(If you have other logical volumes in your rootvg, be sure to create copies for them
as well.)
An alternative to running multiple mklvcopy commands is to use mirrorvg. This
command was added in AIX V4.2 to simplify mirroring VGs. The mirrorvg
command, by default, will disable quorum and mirror the existing LVs in the
specified VG. To mirror rootvg, use the command:
# mirrorvg -s rootvg
- Now synchronize the new copies you created:
# syncvg -v rootvg
- As we want to be able to boot from different disks, we need to use bosboot:
# bosboot -a
As hd5 is mirrored, there is no need to do it for each disk.
- Update the bootlist. In case of a disk failure, we must be able to boot from different
disks:
# bootlist -m normal hdisk1 hdisk0
# bootlist -m service hdisk1 hdisk0
- Reboot the system:
# shutdown -Fr
- Check that the system boots from the first boot disk:
# bootinfo -b
10-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
VOLUME GROUP name rootvg
Mirror sync mode [Foreground]
PHYSICAL VOLUME names [hdisk1]
Number of COPIES of each logical 2
partition
Keep Quorum Checking On? no
Create Exact LV Mapping? no
Notes:
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
10-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
VGDA count
Two-disk Volume Group
Loss of PV1: Only 33% VGDAs available
(No quorum)
Notes:
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
hdisk1 hdisk2
Notes:
Introduction
What happens if quorum checking is enabled for a volume group and a quorum is not
available?
Consider the following example (illustrated on the visual and discussed in the following
paragraphs): In a two-disk volume group datavg, the disk hdisk1 is not available due to
a hardware defect. The hdisk1 disk is the disk that contains the two VGDAs; that
means the volume group does not have a quorum of VGDAs.
10-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
10-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
ved"
"remo hdisk1 hdisk2
# varyonvg -f datavg
Failure accessing hdisk1. Set PV STATE to removed.
Volume group datavg is varied on.
Notes:
10-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Quorum checking on
With Quorum Checking On, you always need more than 50% of the VGDAs available
(except to vary on rootvg).
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
missing missing
varyonvg -f VGName
Hardware
Repair
removed
Hardware Repair
followed by:
varyonvg VGName
chpv -v a hdiskX
removed
Copyright IBM Corporation 2008
Notes:
Introduction
This page introduces physical volume states (not device states). Physical volume states
can be displayed with:
lsvg -p VGName
Active state
If a disk can be accessed during a varyonvg it gets a PV state of active.
Missing state
If a disk can not be accessed during a varyonvg, but quorum is available, the failing
disk gets a PV state of missing. If the disk can be repaired, for example, after a power
10-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty failure, you just have to issue a varyonvg VGName to bring the disk into the active state
again. Any stale partitions will be synchronized.
Removed state
If a disk cannot be accessed during a varyonvg and the quorum of disks is not
available, you can issue a varyonvg -f VGName which is a forced vary on of the volume
group.
The failing disk gets a PV state of removed, and it will not be used for quorum checks
any longer.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
10-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Yes
Disk mirrored? Procedure 1
No
Yes
Disk still working? Procedure 2
No
Volume group
No
Procedure 3
lost?
rootvg Not rootvg
Yes
Procedure 4 Procedure 5
Copyright IBM Corporation 2008
Notes:
Flowchart
Before starting the disk replacement, always follow the flowchart that is shown in the
visual. This will help you whenever you have to replace a disk.
1. If the disk that must be replaced is completely mirrored onto another disk, follow
procedure 1.
2. If a disk is not mirrored, but still works, follow procedure 2.
10-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty 3. If you are absolutely sure that a disk failed and you are not able to repair the
disk, do the following:
- If the volume group can be varied on (normal or forced), use procedure 3.
- If the volume group is totally lost after the disk failure, that means the volume
group could not be varied on (either normal or forced).
If the volume group is rootvg, follow procedure 4.
If the volume group is not rootvg follow procedure 5.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Disk state
This procedure requires that the disk state of the failed disk be either missing or
removed. Refer to Physical Volume States in Unit 5: Disk Management Theory for more
information on disk states. Use lspv hdiskX to check the state of your physical
volume. If the disk is still in the active state, you cannot remove any copies or logical
volumes from the failing disk. In this case, one way to bring the disk into a removed or
missing state is to run the reducevg -d command or to do a varyoffvg and a
varyonvg on the volume group by rebooting the system.
Disable the quorum check if you have only two disks in your volume group.
10-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
10-38 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty 3. Before executing the next step, it is necessary to distinguish between the rootvg
and a non-rootvg volume group.
- If the disk that is replaced is in rootvg, execute the steps that are shown on
the visual Procedure 2: Special Steps for rootvg.
- If the disk that is replaced is not in the rootvg, use the migratepv command:
# migratepv hdisk_old hdisk_new
This command moves all logical volumes from one disk to another. You can
do this during normal system activity. The command migratepv requires that
the disks are in the same volume group.
4. If the old disk has been completely migrated, remove it from the volume group.
Use either the SMIT fastpath smit reducevg or the reducevg command.
5. If you need to remove the disk from the system, remove it from the ODM using
the rmdev command as shown. Finally, remove the physical disk from the
system.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
hdiskX 2
hdiskY
Notes:
10-40 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty If the disk contains the boot logical volume, migrate the logical volume to the
new disk and update the boot logical volume on the new disk. To avoid a
potential boot from the old disk, clear the old boot record by using the
chpv -c command. Then, change your bootlist:
# migratepv -l hd5 hdiskX hdiskY
# bosboot -ad /dev/hdiskY
# chpv -c hdiskX
# bootlist -m normal hdiskY
If the disk contains the primary dump device, you must deactivate the dump
before migrating the corresponding logical volume:
# sysdumpdev -p /dev/sysdumpnull
- Migrate the complete old disk to the new one:
# migratepv hdiskX hdiskY
If the primary dump device has been deactivated, you have to activate it
again:
# sysdumpdev -p /dev/hdX
4. After the disk has been migrated, remove it from the root volume group:
# reducevg rootvg hdiskX
5. If the disk must be removed from the system, remove it from the ODM (use the
rmdev command), shut down your AIX, and remove the disk from the system
afterwards:
# rmdev -l hdiskX -d
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
10-42 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
hdiskX hdiskY
4. Import each volume group into
the new ODM (importvg), if needed
Contains OS
datavg logical
volumes
hdiskZ
mksysb
Notes:
Procedure steps
Follow these steps:
1. Replace the bad disk and boot your system in maintenance mode
2. Restore your system from a mksysb tape
10-44 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty If any rootvg file systems were not mounted when the mksysb was made, those file
systems are not included on the backup image. You will need to create and restore
those as a separate step.
If your mksysb tape does not contain user volume group definitions (for example, you
created a volume group after saving your rootvg), you have to import the user volume
group after restoring the mksysb tape. For example:
# importvg -y datavg hdisk9
Only one disk from the volume group (in our example hdisk9), needs to be selected.
Export and import of volume groups is discussed in more detail in the next topic.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2. Check /etc/filesystems
hdiskX
3. Remove bad disk from ODM and the system:
# rmdev -l hdiskX -d
Notes:
Procedure steps
Follow these steps:
1. To fix this problem, export the volume group from the system. Use the command
exportvg as shown. During the export of the volume group, all ODM objects that
are related to the volume group will be deleted.
2. Check your /etc/filesystems. There should be no references to logical volumes or
file systems from the exported volume group.
10-46 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty 3. Remove the bad disk from the ODM (use rmdev as shown). Shut down your
system and remove the physical disk from the system.
4. Connect the new drive and boot the system. The cfgmgr will configure the new
disk.
5. If you have a volume group backup available (created by the savevg command),
you can restore the complete volume group with the restvg command (or the
SMIT fastpath smit restvg). All logical volumes and file systems are recovered.
If you have more than one disk that should be used during restvg, you must
specify these disks:
# restvg -f /dev/rmt0 hdiskY hdiskZ
The savevg and restvg commands will be discussed in a future chapter.
6. If you have no volume group backup available, you have to re-create everything
that was part of the volume group.
Re-create the volume group (mkvg or smit mkvg), all logical volumes (mklv or
smit mklv) and all file systems (crfs or smit crfs).
Finally, restore the lost data from backups, using the restore command or any
other tool you use to restore data in your environment.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rootvg - Migration
hdiskY hdiskX
Fix:
Check bootlist (SMS menu)
Check bootlist (bootlist)
Re-create boot logical volume (bosboot)
Copyright IBM Corporation 2008
Notes:
10-48 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
VGDA:
PVID: PVID: ...
datavg ...221... ...555...
physical:
...221...
hdisk4 hdisk5 ...555...
ODM:
CuAt:
name = "hdisk4"
hdisk5 is removed from ODM and attribute = "pvid"
from the system, but not from the value = "...221..."
...
volume group: CuAt:
name = "hdisk5"
# rmdev -l hdisk5 -d attribute = "pvid"
value = "...555..."
Copyright IBM Corporation 2008
...
Figure 10-24. Frequent disk replacement errors (2 of 4) AW186.0
Notes:
The problem
Another frequent error occurs when the administrator removes a disk from the ODM (by
executing rmdev) and physically removes the disk from the system, but does not
remove entries from the volume group descriptor area (VGDA).
The VGDA stores information about all physical volumes of the volume group. Each
disk has at least one VGDA.
Disk information is also stored in the ODM, for example, the physical volume identifiers
are stored in the ODM class CuAt.
Note: Throughout this discussion the physical volume ID (PVID) is abbreviated in the
visuals for simplicity. The physical volume ID is actually 32 characters.
What happens if a disk is removed from the ODM but not from the volume group?
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
VGDA:
...
PVID:
datavg ...221...
physical:
...221...
...555...
hdisk4 !!!
ODM:
# rmdev -l hdisk5 -d
CuAt:
name = "hdisk4"
Fix: attribute = "pvid"
value = "...221..."
# reducevg datavg ...555... ...
Notes:
The fix
After removing a disk from the ODM, there is still a reference in the VGDA of the other
disks in the volume group of the removed disk. In early AIX versions, the fix for this
problem was difficult. You had to add ODM objects that described the attributes of the
removed disk.
This problem can now be fixed by executing the reducevg command. Instead of
specifying the disk name, the physical volume ID of the removed disk is specified.
Execute the lspv command to identify the missing disk. Write down the physical
volume ID of the missing disk and compare this ID with the contents of the VGDA. Use
the following command to query the VGDA on a disk:
# lqueryvg -p hdisk4 -At
Note: Use any disk from the volume group.
10-50 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty If you are sure that you found the missing PVID, pass this PVID to the reducevg
command.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
ODM problem in No
rootvg? Export and import
volume group
Yes
rvgrecover
Copyright IBM Corporation 2008
Notes:
ODM failure
After an incorrect disk replacement, you might detect ODM failures. For example, when
issuing the lsvg -p datavg command, a typical error message could be:
unable to find device id 00837734 in device configuration database
In this case, a device could not be found in the ODM.
10-52 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
10-54 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The scenario
The exportvg and importvg commands can be used to fix ODM problems. These
commands also provide a way to transfer data between different AIX systems. This
visual provides an example of how to export a volume group.
The disk, hdisk9, is connected to the system moon. This disk belongs to the myvg
volume group. This volume group needs to be transferred to another system.
10-56 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty 2. When all logical volumes are closed, use the varyoffvg command to vary off the
volume group.
3. Finally, export the volume group, using the exportvg command. After this point,
the complete volume group (including all file systems and logical volumes) is
removed from the ODM.
4. After exporting the volume group, the disks in the volume group can be
transferred to another system.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
myvg
Notes:
10-58 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty In AIX V4.3 and subsequent releases, the volume group is automatically varied
on.
3. Finally, mount the file systems.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
hdisk3
myvg
lv 1 0
# importvg -y myvg hdisk3
lv11
loglv importvg: changing LV name lv10 to fslv00
01 importvg: changing LV name lv11 to fslv01
hdisk2
datavg
importvg can also accept the PVID in place of the hdisk name
Copyright IBM Corporation 2008
Notes:
10-60 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# umount /home/michael
# mount -o log=/dev/loglv01 /dev/lv24 /home/michael
Notes:
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
10-62 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# mount /home/michael
# mount /home/michael_moon Mount point must exist!
Copyright IBM Corporation 2008
Notes:
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- account specifies whether the file system should be processed by the accounting
system. A value of false indicates no accounting.
Before mounting the file system /home/michael_moon, the corresponding mount point
must be created.
10-64 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
importvg -L (1 of 2)
moon
lv1
0
lv11
No exportvg !!!
loglv01
hdisk9
myvg
mars
lv10
# importvg -y myvg hdisk3 lv11
# mklv lv99 myvg logl
v
lv9901
hdisk3
myvg
Copyright IBM Corporation 2008
Notes:
The scenario
Lets discuss an example:
- On system moon, a volume group myvg exists which contains three logical
volumes: lv10, lv11, and loglv01.
- The volume group resides on one disk, hdisk9, which is now moved to another
system, mars. Note that we do not export myvg on system moon.
- The myvg volume group is now imported on system mars, by executing the
importvg command. Additionally, a new logical volume, lv99 is created in myvg.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- The disk that contains the volume group myvg, plus the newly created logical
volume lv99, is now moved back to the system moon.
Because we did not export the volume group myvg on moon, we cannot import the
volume group again. Now, how can we fix this problem? This is shown on the next
visual.
10-66 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
importvg -L (2 of 2)
moon
hdisk9
lv10
lv11
loglv
01
myvg
"Learn about possible changes!"
Notes:
The solution
To import an existing volume group, the importvg command has the option -L.
In our example, the following command must be executed to import the volume group
myvg:
# importvg -L myvg hdisk9
After executing this command, the new logical volume lv99 will be recognized by the
system.
The volume group must not be active. Additionally, the volume group is not
automatically varied on, which is a difference to a normal importvg.
The importvg -L command will fail if a logical volume name clash is detected.
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
Notes:
10-68 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Exercise 8
Notes:
Copyright IBM Corp. 2000, 2008 Unit 10. Storage management with LVM 10-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Notes:
10-70 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
Online AIX Version 6.1 Commands reference
Online AIX Version 6.1 Operating System and Device
management
Note: References listed as Online above are available at the
following address:
http://publib.boulder.ibm.com/infocenter/pseries/v6r1/index.jsp
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
Notes:
11-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
When you install the system, you automatically create one volume group (rootvg)
which consists of a base set of logical volumes required to start the system. The volume
group rootvg contains such things as paging space, the journal log, and boot data, with
each one usually in its own separate logical volume.
You can create additional logical volumes with the mklv command or go through the
SMIT menus. This command allows you to specify the name of the logical volume and
to define its characteristics.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Journal log
The journal log is the logical volume where changes made to the file system structure
are written until such time as the structures are updated on disk. Journaled file systems
and enhanced journaled file systems are discussed in greater detail later in the course.
Paging space
Paging space is fixed disk storage for information that is resident in virtual memory but
is not currently being maintained in real memory.
Dump device
When you install the operating system, the dump device is automatically configured for
you. By default, the primary device is /dev/hd6, which is the paging logical volume, and
the secondary device is /dev/sysdumpnull. For systems migrated from versions of AIX
earlier than V4.1, the primary dump device is what it formerly was: /dev/hd7.
11-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
A file system is a directory hierarchy for storing files. It has a root directory and
subdirectories. In an AIX system, the various file systems are joined together so that
they appear as a single file tree with one root. Many file systems of each type can be
created.
Because the available storage is divided into multiple file systems, data in one file
system could be on a different area of the disk than data of another file system.
Because file systems are of a fixed size, file system full errors can occur when that file
system has become full. Free space in one file system cannot automatically be used by
an alternate file system that resides on the same physical volume.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
11-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Benefits
A file system is a structure that allows you to organize your data. It is one level in the
hierarchy of your data. By placing data in separate file systems, it allows for easier
control and management of the data.
File systems can be placed on the disk in areas that provide the best performance.
Often, backups and recoveries are done at a file system level.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
11-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
/ (root)
home sbin opt lpp proc usr dev tftpboot var mnt etc tmp
/ / / / /
Notes:
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- /var = /dev/hd9var
Variable spool and log files. The files in this file system vary considerably depending
on system activity.
- /home = /dev/hd1
Users' home directories (was /u in earlier versions of AIX). This is traditionally where
user data files are stored.
- /tmp = /dev/hd3
Space accessible to all users for temporary files and work space. Should be cleared
out frequently.
- /opt = /hd10opt
Special file system to store freeware files.
- /proc = /proc
Special pseudo file system kept in memory to support threads or light weight
processes. This file system is not designed to store user files. It is a type of file
system which is different from a journal file system.
- /admin = /hd11admin
There are two empty directories: lost_found and tmp. The permissions on this
/admin/tmp directory is 755 and is owned by root. This tmp directory has more
security for applications to use.
11-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
/etc/filesystems
/:
dev = /dev/hd4
vol = root
mount = automatic
check = false
vfs = jfs2
log = /dev/hd8
type = bootfs
/home:
dev = /dev/hd1
vol = /home
mount = true
check = true
vfs = jfs2
log = /dev/hd8
/home/team01:
dev = /dev/fslv00
vfs = jfs2
log = /dev/loglv00
mount = true
options = rw
account = false
Copyright IBM Corporation 2008
Notes:
What is /etc/filesystems?
The /etc/filesystems file documents the layout characteristics (or attributes) of file
systems. It is in a stanza format which means a resource is named followed by a colon
and a listing of its attributes in the form of:
attributes = value
Each stanza in the /etc/filesystems file names the directory where the file system is
normally mounted.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
vol Used by the mkfs command when initiating the label on a new file
system.
mount Used by the mount command to determine whether a file system
should be mounted by default. Possible values are:
automatic File system mounted automatically at system startup.
true File system mounted by the mount all command.
This command is issued during system initialization to
automatically mount such file systems.
false File system is not automatically mounted.
check Used by the fsck command to determine the default file systems to be
checked. Setting it to True enables checking.
vfs Specifies the type of mount. For example, vfs=jfs2.
log The device to which log data is written, as the file system is modified.
(This option is only valid for journaled file systems).
type Used to group together related file systems which can all be mounted
with the mount -t command.
account Used to determine the file systems to be processed by the accounting
system.
free A component of traditional UNIX systems. It is ignored by all AIX
commands.
quote Allows the system administrator to control the number of files and data
blocks that can be allocated to a user or group.
11-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Indirect
Data Blocks
Blocks
Superblock
File system size and identification
Free list, fragment size, nbpi
inodes
File size, ownership, permissions, times
Pointers to data blocks
Blocks
Data blocks contain data
Indirect blocks contain pointers to data blocks
Notes:
Unit of allocation
An individual file within a file system, by default, has units allocated to it in blocks of
4096 bytes. (This may change if you have implemented fragmentation or large files -
both of which are discussed later.)
Some AIX commands often report file sizes in units of 512 bytes to remain compatible
with other UNIX file systems. This is independent of the actual unit of allocation.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Superblock
The first addressable logical block on the file system is the superblock. The superblock
contains information such as the file system name, size, number of inodes, and
date/time of creation.
The superblock is critical to the file system and, if corrupted, prevents the file system
from mounting. For this reason a backup copy of the superblock is always written in
block 31.
Inodes
Immediately following the superblock are inodes which contain identifying information
for files, such as the file type, size, permissions, user/group/owner, and
create/modification and last access dates. They also contain pointers to the data blocks
for fragment addresses which hold the data.
Indirect blocks
For larger files, the system creates sets of indirect blocks filled with data block
addresses to point to the data block or fragments which hold the data.
11-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Structure of an inode
$ ls -li /home/team01
2132 drwxr-xr-x 2 team01 staff 512 May 2 14:33 c
2136 drwxr-xr-x 2 team01 staff 512 May 2 14:33 doc
2141 -rw-r--r-- 1 team01 staff 28 May 16 10:11 Manuals
Copyright IBM Corporation 2008
Notes:
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
4096 bytes
Notes:
Use of fragmentation
Fragmentation provides a way to allocate pieces (or fragments) of a 4 KB logical block
to files and directories. Fragment support is helpful for small user files and directories.
JFS fragment support provides a view of the file system as a contiguous series of
fragments rather than logical disk blocks.
Fragment support applies to the last direct block of small user files and directories and
long symbolic links.
Fragment size
Fragment size is specified for a file system at creation time. The allowable fragment
size for JFS file systems are 512, 1024, 2048, and 4096 bytes. The default fragment
size is 4096 bytes.
11-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty Different file systems can have different fragment sizes, but only one fragment size can
be used within a single file system. Different fragment sizes can also coexist on a single
system so that administrators can select a fragment size which is most appropriate for
each file system.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
File system
4096 4096 4096
INODES
1
128 bytes
2
Using the value nbpi = 1024 an inode is created for every 1024 bytes of file system.
File system
INODES
4096 4096 4096
128 bytes 1
2
3
4
5 4 X 1024
6
7
8
Notes:
Use of inodes
In all UNIX implementations, when a file system is created, inodes are written to disk.
For each file or directory, one such data structure is used to describe information
pertaining to the file or directory. JFS also reserves a number of inodes for files and
directories in each file system that is created.
11-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Groupings of related 16 MB
16 MB
inodes and disk blocks 16 MB agsize
16 MB
64 MB
Groupings of related 64 MB
inodes and disk blocks 64 MB agsize
64 MB
Notes:
11-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty Relationship between allowable NBPI values and allocation group size
The allowable NBPI values are dependent on the agsize. For example, for an agsize
value of 8 MB, the only allowable NBPI values are 512, 1024, 2048, 4096, 8192, and
16384 bytes. If you were to double the agsize from 8 MB to 16 MB, the range of NBPI
values also doubles to 1024, 2048, 4096, 8192, 16384, and 32768 bytes.
Refer to the table below for more details.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
11-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Additional considerations
In addition to increased disk I/O activity and free space fragmentation problems, file
systems using data compression have the following performance considerations:
- Degradation in file system usability arising as a direct result of the data
compression/decompression activity. If the time to compress and decompress data
is quite lengthy, it may not always be possible to use a compressed file system,
particularly in a busy commercial environment where data needs to be available
immediately.
- All logical blocks in a compressed file system, when modified for the first time, are
allocated 4096 bytes of disk space, and this space is subsequently reallocated when
the logical block is written to disk. Performance costs are, therefore, associated with
this allocation, which does not occur in non-compressed file systems.
- In order to perform data compression, approximately 50 CPU cycles per byte are
required and about 10 CPU cycles per byte are required for decompression. Data
compression, therefore, places a load on the processor by increasing the number of
processor cycles.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1025
1026
1 Block 1027
1 4 KB .. 32 Blocks
2 . 128 KB
3 1055
4. 1056
..
1023
1024
File
1057
132 MB 128 KB
1058
1059
.. 32 Blocks
. 128 KB
Notes:
11-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Journal log
1
Write data
sync / fsync
1) Inode changes to log
2) COMMIT to log
3 3) Update inode 2
4) Sync log
Inodes 4
Data
block JFSLOG
Notes:
The jfslog
The jfslog for each volume group (such as the rootvg /dev/hd8) is a circular log. A jfslog
is created with the size of one physical partition, one per each volume group. The jfslog
ensures file system integrity by writing all metadata information to the jfslog
immediately. It does this in the form of transactions, as illustrated in the diagram. File
system metadata consists of changes to the file system structure itself, such as
changes to the inodes and the free list.
11-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Inline logs
An inline log is a new feature specific to JFS2 file systems that allows you to log directly
to the file system. The default inline log size is 0.4% of the logical volume size
(in AIX 5L V5.1).
The following table lists the default inline log size in AIX 5L V5.2 and later.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Compression Yes No
JFS2 uses extent based allocation for high performance and large file size.
.
Copyright IBM Corporation 2008
Notes:
Introduction to JFS2
JFS2 is a new file system type that was introduced in AIX 5L V5.1. It is based on JFS.
Reference information
The following reference information may be useful when you are reviewing the table on
the visual:
1 Petabyte (PB) = 1024 Terabytes (TB) = (250 ) bytes
1 Terabyte (TB) = 1024 Gigabytes (GB) = (240 ) bytes
1 Gigabyte (GB) = 1024 Megabytes (MB) = (230 ) bytes
1 Megabyte (MB) = 1024 Kilobytes (KB) = (220 ) bytes
1 Kilobyte (KB) = 1024 Bytes = (210 ) bytes
11-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Dynamic inodes
The traditional approach of reserving a fixed amount of space for inodes at file system
creation time required accurate estimates of the number of files that would reside in the
file system. If the estimate was high, disk space was wasted. If the estimate was low, no
files could be added until the file system was expanded. JFS2 dynamically allocates
space for inodes as needed, and frees the space when it is no longer required.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
The administration is similar to administration of the BSD Disk Quota System (refer to
http://www.openbsd.org for details) except that AIX added a new method for mapping
the users to the quotas. The quotas are assigned to a Limits class and then the users
are assigned to the class. This greatly simplifies the quota administration. AIX 6.1 has a
command to administer Limits classes:
j2edlimit
Migration
JFS file systems can co-exist on the same system with JFS2 file systems. However, to
fully utilize the JFS2 features, the following steps are necessary:
- Backup JFS file system data
- Create new JFS2 file systems
- Restore JFS file system data to new JFS2 file systems
11-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
$ getea HenryVIII
EAName: Author
EAValue: Shakespeare
Notes:
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
EAv1 had restrictions of only eight attributes, 4 KB per attribute, 16-bit encoded names
and no support for user-defined attributes. EAv2 effectively eliminates these
restrictions.
The primary use for EAv2, currently, is support for the NFS V4 ACL capability. The
discussion of NFS V4 ACLs is outside the scope of this class.
Managing attributes
AIX 6.1 provides line commands to manage the user-defined attributes. To set an
attribute value, you would use the setea command. To view a user attribute, you would
use the getea command.
11-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
File Systems
# smit fs
File Systems
Notes:
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# lsfs
Name Nodename Mount Pt VFS Size Options Auto
/dev/hd4 __ / jfs2 294912 __ yes
/dev/hd1 __ /home jfs2 32768 __ yes
/dev/hd2 __ /usr jfs2 3309568 __ yes
/dev/hd9var __ /var jfs2 65536 __ yes
/dev/hd3 __ /tmp jfs2 131072 __ yes
/proc __ /proc procfs __ ro yes
/dev/hd10opt __ /opt jfs2 163840 __ yes
/dev/hd11admin __ /admin jfs2 262144 __ yes
/budget sys4 /reports nfs2 __ bg,hard,intr
/dev/cd0 __ /cdrom cdrfs __ ro no
Notes:
11-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty The data may be presented in line and colon (-c) or stanza (-l) format. It is possible to
list only the file systems of a particular virtual file system type (-v), or within a particular
mount group (-u). The -q option queries the superblock for the fragment size
information, compression algorithm, and the number of bytes per inode.
SMIT fastpath
The SMIT fastpath to get to the screen which accomplishes the same task as the lsfs
command is smit fs. This takes you to the File Systems SMIT menu. Select the List
All File Systems menu item. This selection does not have its own window; rather, it just
runs the lsfs command.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# mount
Notes:
11-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
11-38 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
* LOGICAL VOLUME name +
* MOUNT POINT [ ]
Mount AUTOMATICALLY at system restart? no +
PERMISSIONS read/write +
Mount OPTIONS [ ] +
Start Disk Accounting ? no +
Fragment Size (bytes) 4096 +
Number of bytes per inode 4096 +
Allocation Group Size (MBytes) 8 +
Logical Volume for Log [ ] +
Figure 11-22. Add a standard journaled file system on a previously defined logical volume AW186.0
Notes:
11-40 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty Specifying which logical volume to use for the JFS log
AIX 6.1 has a line on this panel: Logical Volume for Log. Prior to
AIX 5L V5.3, you needed to edit /etc/filesystems after creating the file if you wanted to
use anything other than the default /dev/hd8 logical volume for the log. With
AIX 5L V5.3 and later, you can identify what log to use in the initial definition. Note that
the jfslog itself has to be previously defined and formatted.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
Volume group name rootvg
SIZE of file system
Unit Size Megabytes +
* Number of units [ ] #
* MOUNT POINT [ ]
Mount AUTOMATICALLY at system restart? no +
PERMISSIONS read/write +
Mount OPTIONS [ ] +
Start Disk Accounting ? no +
Fragment Size (bytes) 4096 +
Number of bytes per inode 4096 +
Allocation Group Size (MBytes) 8 +
Logical Volume for Log [ ] +
Notes:
11-42 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
algorithm Lempel-Ziv. If you do not want data compression, set this attribute value to
no (the default value).
- The allocation group size (-a ag= 8 | 16 | 32 | 64) is a grouping of inodes and
disk blocks within the file system. The default agsize is 8 MB. This attribute only
applies to AIX V4.2 and later.
11-44 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Working with enhanced journaled file systems
(JFS2) in SMIT
Figure 11-24. Working with enhanced journaled file systems (JFS2) in SMIT AW186.0
Notes:
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 11-25. Add an enhanced journaled file system (JFS2) on a previously defined logical volume AW186.0
Notes:
11-46 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty an inline log. If you use the inline log, then you have the option to override the default
log size.
AIX Enhancements
With AIX 5L V5.3 and later, there are two attributes on this panel:
- Extended Attribute Format allows you to choose between the default EAv1 or
EAv2.
- Enable Quota Management does what it says for this particular file system. You
should be sure to plan and build the user quota definitions before enabling disk
quotas for a file system.
With AIX 6.1, there are two attributes on this panel:
- Encrypted File System (EFS) specifies whether the file system is an Encrypted File
System. This is only available for JFS2.
- Isnapshot specifies whether the file system supports internal snapshots.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
Volume group name rootvg
SIZE of file system
Unit Size Megabytes +
* Number of units [ ] #
* MOUNT POINT [ ]
Mount AUTOMATICALLY at system restart? no +
PERMISSIONS read/write +
Mount OPTIONS [ ] +
Block size (bytes) 4096 +
Logical Volume for Log [ ] +
Inline Log size (MBytes) [ ] #
Extended Attribute Format Version 1 +
Enable Quota Management no +
[MORE2]
Notes:
11-48 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
Notes:
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
11-50 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty mounted. (A normal user belonging to the system group can also mount file systems at
any time, provided the user has write permission to the mount point and read
permission on the root directory of the file system to be mounted.)
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
11-52 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Changing permissions
The permissions associated with the file system may be changed (-p ro|rw), and the
change is effective the next time the file system is mounted.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Change/Show Characteristics
of an Enhanced Journaled File System
Notes:
11-54 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
After: LP1
Notes:
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Restrictions
There must be enough free space in the remaining physical partitions of the file system
to stored the file data and metadata structures being moved from the freed physical
partitions.
11-56 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
FILE SYSTEM name +
Remove Mount Point no +
Notes:
Restrictions
In order to remove a file system, it must be unmounted from the overall file tree, and this
cannot be done if the file system is in use, that is, some user or process is using the file
system or has it as a current directory.
Effects of using rmfs command
The rmfs command removes any information for the file system from the ODM and
/etc/filesystems. When the file system is removed, the logical volume on which it
resides is also removed.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Syntax
The syntax of the rmfs command is:
rmfs [-r] [-i] FileSystem
-r Removes the mountpoint of the file system
-i Displays warning and prompts the user before removing the file system
Example:
# rmfs -r /home/george/myfs
11-58 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Limitations
Use ramdisk only for data that can be lost. After each reboot, the ramdisk file system is
destroyed and must be rebuilt.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Using a UDF
Once you have created a UDF on a DVD-RAM, you can treat it just like a normal hard
disk. It enables you to read, write, delete, copy, move, mount, unmount, and edit a file
within the DVD directory.
11-60 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
hd2
Notes:
11-62 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# df
Notes:
11-64 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/var/adm/wtmp
/etc/security/failedlogin
/var/adm/sulog
/var/spool/*/*
$HOME/smit.log
$HOME/smit.script
$HOME/websm.log
$HOME/websm.script
Notes:
11-66 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty - Example 1:
# cat /dev/null > /var/adm/wtmp
- Example 2:
# > /etc/security/failedlogin
The file /var/adm/sulog can be edited directly.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
11-68 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# du /home | sort -r -n
624 /home
392 /home/fred
98 /home/tom
54 /home/mary
52 /home/liz
23 /home/suzy
2 /home/guest
1 /home/steve
Notes:
11-70 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
The -x flag
The -x flag/option is also very useful. When you use the du -ax command, the report
only shows information from the specified file system. This is the best way to determine
what file is filling a particular file system.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Fragmentation considerations
Without fragmentation 4096 bytes
2000 bytes
File size = 2000 bytes
With fragmentation
4096 bytes
Notes:
11-72 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Options:
Notes:
11-74 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty Note: Sometimes the estimates for these items provided when running defragfs with
the -q or -r option indicate results different from what is actually done when defragfs
is run without any options.
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Command syntax:
Notes:
The -p option
The -p (preen) option is used to check a file system and make only minor changes,
without bothering the user. When fsck is run under SMIT, this option is used.
11-76 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. Will the size of the file system change when the size of
the logical volume on which it resides is increased?
_________
Notes:
11-78 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Exercise 9
Notes:
Copyright IBM Corp. 2000, 2008 Unit 11. Working with file systems 11-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Notes:
11-80 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
SG24-7559 AIX Version 6.1 Differences Guide
Online AIX 6.1 Operating system and device management
Online AIX 6.1 Installation and migration
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
Notes:
12-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
RAM Usage
Operating System Database TCP/IP 8 MB FREE
Current applications
Total = 248 MB
RAM Usage
New application
Operating System Database TCP/IP Application
needs RAM > 8 MB
4 KB 4 KB
Paging Space
Notes:
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Paging space
Is a secondary storage area for over-committed memory
Holds inactive 4 KB pages on disk
Is not a substitute for real memory
Paging Space
Physical Memory
Notes:
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
#
ksh: cannot fork no swap space
Notes:
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
Placement and size of your paging space does impact its performance. The following
material contains tips regarding the placement and size of paging areas.
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
Volume group name rootvg
SIZE of paging space (in logical partitions) [4] #
PHYSICAL VOLUME name hdisk2 +
Start using this paging space NOW? no +
Use this paging space each time the system is no +
RESTARTED?
Notes:
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
Paging space name paging00
Volume group name rootvg
Physical volume name hdisk2
NUMBER of additional logical partitions [] #
Or NUMBER of logical partitions to remove [] #
Use this paging space each time the system is yes +
RESTARTED?
Notes:
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Step Action
Create a new, temporary space from the same volume group as the
1
one being reduced
2 Deactivate the original paging space
3 Reduce the original paging space
4 Reactivate the original paging space
5 Deactivate the temporary space
The primary paging space (usually hd6) cannot be decreased below 32 MB.
When you reduce the primary paging space, a temporary boot image and a temporary
/sbin/rc.boot pointing to this temporary primary paging space are created to make sure
the system is always in a state where it can be safely rebooted.
These command enhancements are also available through the Web-based System
Manager, starting in AIX 5L V5.2.
12-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Make inactive
# swapoff /dev/paging00
Notes:
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Example:
# chps -s 1 paging00
Example:
# chps -d 1 paging00
Notes:
Overview
All ideas on this visual have already been considered. The visual simply pulls together
all the ideas discussed so far.
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Running lsps
Run lsps to monitor paging space activity. Keep good documentation so that you know
what is normal for that system.
A copy of /etc/swapspaces
Keep a copy of /etc/swapspaces so that you know what paging spaces are defined to
be started at boot.
12-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Checkpoint
1. What conclusions regarding potential paging space problems can
you reach based on the following listing?
Page Physical Volume Size %Used Active Auto Type chksum
Space Volume Group
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
2. True or False? The size of paging00 (in the above example) can
be dynamically decreased.
Copyright IBM Corporation 2008
Notes:
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
This lab allows you to add, decrease, monitor, and remove paging space.
The exercise can be found in your Student Exercises Guide.
12-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Unit summary
Notes:
Copyright IBM Corp. 2000, 2008 Unit 12. Paging space 12-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
Online AIX Version 6.1 Operating System and Device
management
Note: References listed as Online above are available at the
following address:
http://publib.boulder.ibm.com/infocenter/pseries/v6r1/index.jsp
SG24-5765 AIX 5L Differences Guide Version 5.2 Edition
SG24-5766 AIX 5L Differences Guide Version 5.3 Edition
SG24-7414 AIX 5L Differences Guide Version 5.3 Addendum
SG24-7559 IBM AIX Version 6.1 Differences Guide
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
After completing this unit, you should be able to:
List the different backup methods supported through SMIT
and on the command line
Create a customized installable system image backup
Notes:
13-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Drive
3 1/2-inch (1.44) 3 1/2-inch (2.88)
/dev/fdxl 720 KB 720 KB
/dev/fdxh 1.44 MB 2.88 MB
/dev/fdx.9 720 KB 720 KB
/dev/fdx.18 1.44 MB 1.44 MB
/dev/fdx.36 - 2.88 MB
Notes:
Introduction
Diskettes can be used to backup data. Of course, this media is only practical when
backing up small amounts of data.
The logical device name for a diskette drive is /dev/fdx. Your system most likely has one
diskette drive, fd0. When writing to a diskette, the highest density supported is the
default value. The chart shows that there are multiple logical names associated with the
diskette drive that allow writing at different densities. To read the diskettes on a
low-density drive, you must write using the low-density settings.
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Commands
To format a diskette, use the format command. There is a -l option if you want to
format at low density.
The flcopy command is used to copy diskettes (similar to the DOS diskcopy
command).
Diskettes can also be formatted using DOS formatting with the command dosformat.
AIX can read from and write to DOS diskettes using dosread and doswrite. There is
also a dosdir to view the content of the diskette. To use these tools, the fileset
bos.dosutil must be installed.
13-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
/dev/rmtx no no yes
/dev/rmtx.1 no no no
/dev/rmtx.2 no yes yes
/dev/rmtx.3 no yes no
/dev/rmtx.4 yes no yes
/dev/rmtx.5 yes no no
/dev/rmtx.6 yes yes yes
/dev/rmtx.7 yes yes no
Copyright IBM Corporation 2008
Notes:
Tape technologies
The most common device used for backups are tapes. AIX supports a variety of tape
devices, tape subsystems, and tape libraries. Here are some highlights of some of the
tape technologies:
- 4 mm Digital Audio Tape (DAT)
Can hold up to 40 GB of data with a data transfer rate of 6 MB/sec.
- 8 mm Tape
Can hold up to 40 GB of data with a data transfer rate of 6 MB/sec.
- Quarter Inch Cartridge (QIC)
Can hold up to 4 GB with a data transfer rate of 380 KB/sec.
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Device names
The tape devices use the logical device name of rmtx (raw magnetic tape). In the chart,
you see the seven additional logical names assigned to each tape device. These
names control the following tape device characteristics:
- Write at low capacity
- Retension the tape (fast forward and rewind before starting the operation)
- Rewind the tape at the finish of the operation
The most common devices that are used are rmtx and rmtx.1. For most tape
operations, high capacity and no retension are the norm. Whether or not you want to
rewind the tape depends on your particular operation.
Tapes are formatted at the factory. Tape movement can be controlled using the tctl or
mt commands. If there two tape devices, tcopy allows tape-to-tape transfers. Details on
these commands are discussed later.
13-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
For DVD:
Need 7210 DVD-RAM drive
No additional software needed for UDF format
Notes:
Introduction
AIX supports read/write optical drives as well as standard CD-ROM. The R/W Optical
drives support CD-ROM file systems and JFS file systems. If the optical drive is
mounted as a CD-ROM file system, it will be read only.
The optical drive volume group must be wholly contained on the single optical disk. It
cannot span beyond one optical drive.
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CD burner
To burn a backup image onto a CD (IS09660), you must install an OEM drive and
software that is capable of CD writes.
To find out what CD writers are supported examine:
/usr/lpp/bos.sysmgt/README.oem_cdwriters.
Two of the CD burner software packages that have been tested with AIX and are
provided on the AIX Toolbox for Linux Applications CD are mkisofs and cdrecord. You
may alternatively download the software from:
http://www.ibm.com/servers/aix/products/aixos/linux/download.html
Whatever software package is installed, you will need to link their executables to the
AIX standard command names of /usr/sbin/mkrr_fs and /usr/sbin/burn_cd. For
more details refer to: /usr/lpp/bos.sysmgt/mkcd.README.
13-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Description
The IBM 7210 External DVD-RAM Drive Model 025 is a DVD-RAM drive designed to
provide a high performance storage solution. This self-powered standalone drive is
designed for the open systems environment, which includes the IBM iSeries, pSeries,
AS/400, and RS/6000 servers.
13-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Backup menus
The visual shows the SMIT menus that have backup options. Note that the menus in
the visual do not show all the options for a given menu, only those that pertain to
backups.
Backups can also be performed using the Web-based System Manager.
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
13-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty - Saves striped logical volume attributes in AIX V4.2 and later
- Allows the user to restore single or multiple files from a system image
The volume group image is saved in backup format. The rootvg is created as an
installable image.
Non-interactive installation
If a system backup is being made to install another system or to reinstall the existing
system, a customer can predefine installation information so questions at installation
time are already answered. This keeps user interaction at the target node to a
minimum. The system backup and BOS install interact through several files. The
mksysb command saves the data used by the installation by taking a snapshot of the
current system and its customized state.
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
13-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
vg_data stanza
The vg_data stanza contains information about the volume group. The
VG_SOURCE_DISK_LIST= field specifies the disks that BOS installation uses on a
best effort basis to place the volume group. If the EXACT_FIT= field is set to YES, the
user is warned before installation begins.
lv_data stanza
The lv_data stanza contains information about logical volumes. This type of data
stanza is also used to contain paging space information. Information about striped
logical volumes and large file enabled file systems are placed in this stanza in AIX V4.2
and later.
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
/bosinst.data creation
This file allows the administrator to specify the requirements at the target system and
how the user interacts with the target system. It provides flexibility by allowing different
target hardware to use the same backup image. The system backup utilities simply
copy the /bosinst.data into the second file in the rootvg on the mksysb tape. If this file is
not in the root directory, the /usr/lpp/bosinst/bosinst.template is copied to the
/bosinst.data.
The sample file shown in the visual has been condensed to highlight key areas. The
actual file is well documented with comments contained within the file.
13-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
target_disk_data stanza
The target_disk_data stanza contains variables for disks in the machine where the
program will install BOS. The default bosinst.data file has one target_disk_data stanza,
but you can add new stanzas to install BOS on multiple disks, one stanza for each disk.
Multiple target_disk_data stanzas can exist. They define the disks that are to contain
the root volume group. Only one field (PVID, PHYSICAL_LOCATION, SAN_DISKID,
CONNECTION, LOCATION, SIZE_MB, HDISKNAME) must be non-null for BOS installation to
choose a disk. The order of precedence is PVID, followed by PHYSICAL_LOCATION,
SAN_DISKID, CONNECTION, LOCATION, SIZE_MB, and finally HDISKNAME.
The field definitions are:
- LOCATION specifies a location code for the disk where the program will install BOS.
- SIZE_MB specifies the formatted size of the disk (in megabytes) where the program
will install BOS.
- HDISKNAME specifies the path name of the target disk.
- PVID specifies the physical volume identifier for the disk.
- PHYSICAL_LOCATION provides a way to identify fibre channel disks during BOS
Install. The information in the PHYSICAL_LOCATION field supersedes the information
in the SAN_DISKID field.
- SAN_DISKID specifies the World Wide Port Name and a Logical Unit ID for fibre
channel-attached disks.
13-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty - CONNECTION specifies the combination of the parent attribute and the
connwhere attribute associated with a disk.
locale stanza
- The locale stanza contains variables for the primary language the installed
machine will use
- BOSINST_LANG specifies the language the installation program uses for prompts,
menus and error messages
- CULTURAL_CONVENTION specifies the primary locale to install
- MESSAGES specifies the locale for the messages catalogs to install
- KEYBOARD specifies the keyboard map to install
Unattended reinstallation
With both the /image.data and the /bosinst.data files created, the reinstallation of
AIX V4 and later can be made unattended.
The procedure to accomplish this is as follows:
1. Edit the bosinst.data file as follows:
a) Set CONSOLE=/dev/lft0 or CONSOLE=/dev/tty0 according to your system
b) Set PROMPT=no
c) Set EXISTING_SYSTEM_OVERWRITE=yes
d) Set RUN_STARTUP=no
2. Create the signature file:
echo "data" > signature
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
13-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The SMIT screen shown in the visual, Back Up the System, only backs up mounted
file systems in rootvg. Use one of the other backup commands to backup other volume
groups.
EXCLUDE files?
This option excludes the files and directories listed in the /etc/exclude.rootvg file from
the system image backup.
13-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
mksysb image
Notes:
Introduction
This visual shows the tape layout of a mksysb image.
mkinsttape image
The mkinsttape image contains two files:
- ./image.data holds the information needed to recreate the root volume group and its
logical volumes and file systems.
13-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty - ./bosinst.data contains the customizable installation procedures and dictates how
the BOS installation program will behave. This file allows for the non-interactive
installations.
- ./tapeblksz contains the block size setting of the tape drive used during the backup.
Dummy TOC
The dummy TOC used to make mksysb tapes which have the same number of files as
the BOS installation tapes.
rootvg data
The rootvg data contains all the data from the backup. This data is saved using the
backup command which is discussed shortly.
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
13-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
13-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Restoring a mksysb (1 of 2)
Boot the system in install/maintenance mode:
Welcome to Base Operating System
Installation and Maintenance
Maintenance
1 Access A Root Volume Group
2 Copy a System Dump to Removable Media
3 Access Advanced Maintenance Functions
4 Erase Disks .
>> 6 Install from a System Backup
Notes:
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Restoring a mksysb (2 of 2)
Welcome to Base Operating System
Installation and Maintenance
Type the number of your choice and press Enter. Choice is indicated by >>.
1 Start Install Now With Default Settings
>> 2 Change/Show Installation Settings and Install
3 Start Maintenance Mode for System Recovery
4 Configure Network Disks (iSCSI)
Notes:
13-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
* Restore DEVICE or FILE [/dev/rmt0] +/
SHRINK the filesystems? no +
Recreate logical volumes and filesystems only no +
PHYSICAL VOLUME names [] +
(Leave blank to use the PHYSICAL VOLUMES listed
in the vgname.data file in the backup image)
Use existing MAP files? yes +
Physical partition SIZE in megabytes [] +#
(Leave blank to have the SIZE determined
based on disk size)
Number of BLOCKS to read in a single input [] #
(Leave blank to use a system default)
Alternate vg.data file [] /
(Leave blank to use vg.data stored in
backup image)
Notes:
13-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
mksysb image
packages
bundle file
cust script
bosinst.data
image.data
burn image
CD or DVD
Notes:
What is stored?
When creating a system backup on CD or DVD, it is actually creating a file system on
the disk. Within the file system, many things are stored.
The mksysb image file itself is stored (in backup format).
The files that would normally be placed in the second record of a mksysb tape also need
to be stored: bosinst.data and image.data.
If you want to be able to install additional software during the restore (such as device
drivers) you can place them in this file system as packages, or additionally defined as
bundles.
Finally, you may want to run a customization script after the image restore to do
additional configuration.
13-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty When burning the file system onto a CD or DVD using the ISO9660 standard, you need
to first build a burn image on the hard drive. Then, you need to actually burn it to the
disk.
When using ISO9660, you need to identify:
- Where to store the mksysb image
- Where to build the file structure
- Where to build the burn image
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
UDF DVD
File system
Notes:
13-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
The smit fastpath for the panel shown in the visual is smit mkdvd. When prompted,
choose the ISO9660 option.
The types of information to write to both media and mechanisms are about the same for
CD or DVD when using ISO9660 to first build the image and then burn it to the media.
13-38 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
DVD-RAM Device [] +
mkysyb creation options:
Create map files? no +
Exclude files? no +
Disable software packing of backup? no +
Backup extended attributes? yes +
File system to store mksysb image [] /
(If blank, the file system
will be created for you.)
Notes:
The smit fastpath for the panel shown in the visual is: smit mkdvd. When prompted,
choose the UDF option.
Backup volume groups in UDF format on DVD-RAM requires only the space for the
backup image:
1. Create the backup image
2. Burn to media
This allows modification of files such as bosinst.data, image.data, and vgname.data.
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
You do not have the multiple types of information backed up for a non-rootvg volume
group as you did for the system backups, but the mechanisms are very similar when
using ISO9660.
13-40 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Overview
Backing up a non-rootvg volume group to ISO9660 DVD is similar to backing up a
rootvg volume group.
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
Backing up a non-rootvg volume group to UDF DVD is similar to backing up a rootvg
volume group.
13-42 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Back up by filename
backup -i [-q] [-v] [-p] [-U] [-Z][-f device]
-q Media is ready
-v Verbose - display filenames during backup
-p Pack files which are less than 2 GB
-U Specifies to backup any ACLs
-Z Backs up the Encrypted File System (EFS)
Notes:
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
13-44 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
The list of files backup uses can be supplied by a file or by commands. The visual
provides a sample of each.
Example 1
In the first example, the file listfile contains the files you want to back up. That is fed into
the backup command by using a redirection (<).
Example 2
In the second example, there are two examples that can be used to back up the same
data using the find command to generate the file list. Both commands back up the files
stored in /home/roy. Even though both find examples save the same data, the
filenames will be stored differently.
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Types of pathnames
There are two types of filenames:
- Relative
- Full (or absolute)
The difference is that a full pathname shows the location referenced from the root
directory. Basically, the name starts with a slash (/). The relative pathname shows the
location referenced by the current directory. This distinction is important when you try to
recover the data.
Full pathname backups restore to the same location in the directory structure since their
position is referenced from the root directory. But, a relative pathname file is restored
based upon the current directory when the restore command is issued. Full pathnames
provide certainty of location and relative pathnames provide flexibility.
13-46 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
13-48 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Syntax:
backup [-u] [-level] [-f device] filesystem
Notes:
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
-u option
The -u option causes backup to update the /etc/dumpdates file to record the date and
level of the last inode backup for that file system. This file holds file system backup
information for the backup command. The information included in this file is the name of
the file system, the level number of the last backup, and the date of the incremental
backup.
-level option
The -level option allows you to perform incremental backups. The -0 level backs up
all files in the file system. The -1 level backs up all files changed since the last -0
backup, and so on. (If you do not specify a level, -9 is assumed.)
13-50 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
This option will perform a backup by inode.
* FILESYSTEM to backup [] +/
* Backup DEVICE [/dev/fd0] +/
Backup LEVEL (0 for a full backup) [0] #
RECORD backup in /etc/dumpdates? no +
* Backup extended attributes? yes +
* Backup EFS attributes? yes +
Notes:
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
restore command (1 of 2)
Notes:
13-52 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
restore command (2 of 2)
Restores the file attributes without restoring the file contents:
restore -Pstring [-q] [-v] [-f device] [file1 file2 ...]
Notes:
13-54 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
[Entry Fields]
* Restore DEVICE [/dev/fd0] +/
* Target DIRECTORY [.] /
FILE or DIRECTORY to restore []
(Leave blank to restore entire archive.)
VERBOSE output? no +
Number of BLOCKS to read in a single input [] #
operation
Restore Extended Attributes? yes +
Notes:
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. What is the difference between the following two commands?
a) find /home/fred | backup -ivf /dev/rmt0
b) cd /home/fred; find . | backup -ivf /dev/rmt0
___________________________________________________
___________________________________________________
___________________________________________________
Notes:
13-56 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Exercise 11
Notes:
Introduction
This exercise can be found in your Student Exercise Guide.
Copyright IBM Corp. 2000, 2008 Unit 13. Backup and restore 13-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Notes:
13-58 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
Info Center System Management Guide: Communications and
Networks
Info Center Communications Programming Concepts
Info Center AIX 5L Differences Guide Version 5.3 Edition,
Chapter 7. Networking
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
Notes:
14-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
AIX implements networking as a series of device drivers:
- inet0 device
- Network interface devices
- Network adapter devices
In the next few visuals, we will look at some of the network devices and show their
attributes. Dont worry about what all the attributes mean at this point. We will be
discussing some of these attributes later in the unit and you will get a chance to work
with them in the exercise.
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
TCP/IP
The TCP/IP protocols are implemented in a device driver called inet0. The inet0 device
has a number of attributes associated with it, such as the hostname, bootup_option,
and static routes.
14-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# lsdev -Cc if
en0 Available 10-80 Standard Ethernet Network Interface
en1 Defined 10-88 Standard Ethernet Network Interface
et0 Defined 10-80 IEEE 802.3 Ethernet Network Interface
et1 Defined 10-88 IEEE 802.3 Ethernet Network Interface
lo0 Available Loopback Network Interface
#
# lsattr -El en0
mtu 1500 Maximum IP Packet Size for This Device True
remmtu 576 Maximum IP Packet Size for REMOTE Networks True
netaddr 9.47.87.64 Internet Address True
state up Current Interface Status True
arp on Address Resolution Protocol (ARP) True
netmask 255.255.255.0 Subnet Mask True
. . .
Notes:
14-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Adapter devices
Adapter devices allow us to configure the network adapter, which is part of the physical
layer. Attributes for network adapters define the media speed, queue sizes, and so
forth.
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
TCP/IP startup
AIX Initialization Network devices are configured by cfgmgr
rc.boot phase 1 cfgmgr runs configuration methods from Config_Rules
/usr/lib/methods/cfgrcnet configures inet0 and
the network interfaces
rc.boot phase 2
cfgrcnet checks the bootup_option attribute of inet0
bootup_option=no (default)
kernel restarts init cfgrcnet runs /etc/rc.net
(network configuration read from ODM)
init runs bootup_option=yes
rc.boot phase 3
cfgrcnet runs /etc/rc.bsdnet
From /etc/inittab
(network configuration in rc.bsdnet)
Notes:
Introduction
Now that weve looked at the basic components, lets take a look at how the network is
configured at boot time. When the system boots, the network is configured and started
in two steps:
- cfgmgr configures the devices
- /etc/rc.tcpip starts the network daemons
cfgmgr
During rc.boot phase 3, cfgmgr is run to configure the devices which were not
configured during phase 1.
The network adapters are detectable by cfgmgr and are configured using the
configuration methods in PdDv.
14-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty The inet0 device and the network interfaces are not detectable. Reading from the
Config_Rules ODM database, cfgmgr runs
/usr/lib/methods/cfgrcnet to configure inet0 and the network interfaces.
bootup_option
The value of bootup_option controls how the network devices will be configured.
Administrators who are used to using BSD-style configuration commands may be more
comfortable setting bootup_option to yes.
The cfgrcnet command runs either /etc/rc.net or /etc/rc.bsdnet based on the
value of the bootup_option attribute of the inet0 device (read from CuAt).
rc.net
If bootup_option = no, rc.net is run. This is the default.The rc.net command runs
configuration methods that use values in the ODM database to configure inet0 and the
network interfaces. This would include IP addresses, static routes, netmasks, and so
forth.
rc.bsdnet
If bootup_option = yes, rc.bsdnet is run. In this case, inet0 and the network
interfaces are configured using BSD-style commands in the rc.bsdnet script itself.
rc.tcpip
After the network devices have been configured, rc.tcpip is run to start the various
networking daemons.
DHCP
Dynamic Host Control Protocol (DHCP) is an application-layer protocol that allows a
client machine on the network to get an IP address and other configuration parameters
from a server. It gets information by exchanging packets between a daemon on the
client and another on the server.
By default, AIX rc.tcpip does not run DHCP. If a machine has been configured to use
DHCP, rc.tcpip will run the DHCP client daemon (/usr/sbin/dhcpcd). The dhcpcd
command will reconfigure the network devices, overriding any configuration that may
have been performed by rc.net or rc.bsdnet.
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# smit tcpip
TCP/IP
Notes:
Introduction
SMIT is the easiest method of configuring the network. You can also configure the
network using the ifconfig and chdev commands. This visual shows the base SMIT
network menu.
Use the Minimum Configuration & Startup menu to quickly set the basic network
parameters and start the network. This menu uses the default (rc.net/ODM) method
of network configuration.
Note: It is recommended that you only use this menu once.
Use Further Configuration to perform more extensive network configuration,
including selecting BSD-style configuration.
Use DHCP for TCPIP Configuration & Startup menu option to configure your
machine to use DHCP.
14-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/etc/rc.tcpip
Daemon Description
dhcpcd DHCP client daemon.
dhcpsd, dhcprd DHCP server, DHCP Relay Agent daemons.
autoconf6, ndpd-host, IP version 6 (IPv6) daemons.
ndpd-router
syslogd System logging daemon.
lpd Print server daemon.
routed, gated Dynamic routing daemons. Used only if you are using dynamic routing. Either
routed or gated (not both) should be run.
sendmail Routes mail for local or network delivery.
portmap Converts RPC program numbers into internet port numbers.
inetd Network super daemon.
named Provides the server function for the Domain Name System protocol (DNS).
timed, xntpd Time daemons,
rwhod Provides the server function for the rwho and ruptime commands.
snmpd, dpid2, aixmibd Simple Network Management Protocol (SNMP) daemons.
hostmibd
mrouted Multicast routing daemon.
pxed, binld Preboot Execution Environment daemon. PXE is an extension to bootp and
DHCP.
Copyright IBM Corporation 2008
Notes:
Introduction
The /etc/rc.tcpip script is run by init to start various network daemons. The
network daemons provide various network services. For example, the xntpd daemon
communicates with xntpd daemons running on other systems to synchronize
time-of-day clocks.
The table shows a summary of the daemons which can be started from this script.
Typically, only a subset of these daemons are started. You can comment or uncomment
lines in this file to control which daemons will be started.
14-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty SRC
The /etc/rc.tcpip script uses the System Resource Controller (SRC) to control the
network daemons.
SRC provides a set of commands and subroutines to make it easier to create and
control subsystems. A subsystem is a program or set of related programs designed as a
unit to perform related functions. The SRC is useful if you want a common way to start,
stop, and collect status information on sets of processes.
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Configuration files
/etc/inetd.conf
/etc/services
Notes:
Introduction
Sometimes called the network super daemon, inetd is one of the daemons started by
/etc/rc.tcpip. The inetd daemon reduces system load by invoking other daemons
only when they are needed and by providing several simple Internet services internally
without invoking other daemons.
14-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty SRC
The inetd daemon is started as an SRC subsystem. Daemons started by inetd are
SRC subservers.
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/etc/inetd.conf
## Internet server configuration database
...
## name type NATO program arguments
##
ftp stream tcp6 nowait root /usr/sbin/ftpd ftpd
telnet stream tcp6 nowait root /usr/sbin/telnetd telnetd -a
shell stream tcp6 nowait root /usr/sbin/rshd rshd
kshell stream tcp nowait root /usr/sbin/krshd krshd
login stream tcp6 nowait root /usr/sbin/rlogind rlogind
klogin stream tcp nowait root /usr/sbin/krlogind krlogind
exec stream tcp6 nowait root /usr/sbin/rexecd rexecd
#comsat dgram udp wait root /usr/sbin/comsat comsat
#uucp stream tcp nowait root /usr/sbin/uucpd uucpd
#bootps dgram udp wait root /usr/sbin/bootpd bootpd /etc/bootptab
##
## Finger, systat and netstat give out user information which may be
## valuable to potential "system crackers." Many sites choose to disable
## some or all of these services to improve security.
##
#finger stream tcp nowait nobody /usr/sbin/fingerd fingerd
#systat stream tcp nowait nobody /usr/bin/ps ps -ef
#netstat stream tcp nowait nobody /usr/bin/netstat netstat -f
inet
. . .
Notes:
Configuration files
The inetd daemon reads /etc/inetd.conf and /etc/services when it starts.
/etc/inetd.conf
The /etc/inetd.conf file is a list of network services which inetd will provide. These are
the daemons that inetd will start, if they are needed.
The visual shows a portion of the inetd.conf file.
Syntax
Each line in the file has the following fields:
-ServiceName
-SocketType
14-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty -ProtocolName
-Wait/NoWait
-UserName
-ServerPath
-ServerArgs
The ServiceName field contains the name of a network service defined in the
/etc/services file.
The ServerPath field identifies the file name for the daemon to be started.
The remaining fields provide information on how to start and manage the service.
Modifying inetd.conf
You can control which services inetd will manage by commenting or uncommenting
lines in the /etc/inetd.conf file.
The /etc/inetd.conf file can be updated by using SMIT or by directly commenting or
uncommenting lines in the file.
If you change /etc/inetd.conf using SMIT, then the inetd daemon will be refreshed
automatically and will read the new /etc/inetd.conf file.
If you change the file manually, you need to inform the inetd daemon of the changes to
its configuration file. To do this run either:
- refresh -s inetd
- kill -1 InetdPID
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/etc/services
. . .
# Network services, Internet style
#
tcpmux 1/tcp # TCP Port Service Multiplexer
tcpmux 1/udp # TCP Port Service Multiplexer
. . .
echo 7/tcp
echo 7/udp
. . .
netstat 15/tcp
qotd 17/tcp quote
msp 18/tcp # Message Send Protocol
msp 18/udp # Message Send Protocol
chargen 19/tcp ttytst source
chargen 19/udp ttytst source
ftp-data 20/tcp
ftp 21/tcp
telnet 23/tcp
. . .
Notes:
/etc/services
The /etc/services file contains a list of all network services and their port numbers. This
is the list of well known port numbers mentioned in the previous section.
The visual shows a portion of this file.
14-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Name resolution
Local
/etc/hosts
NIS/NIS+ (Network Information System)
/etc/rc.nfs
domainname
ypbind
DNS (Domain Name System)
/etc/resolv.conf
nameserver
domain
Lookup order
NSORDER
/etc/netsvc.conf
/etc/irs.conf
Default: DNS, NIS, local
Notes:
Introduction
Problems with name resolution are a fairly common type of network problem. This
section introduces you to some of the client-side name resolution configuration files and
identifies a few common problems to look for. Configuring and troubleshooting name
resolution servers is outside the scope of this unit.
The visual shows the three most common methods for name resolution and some of the
configuration files.
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/etc/hosts
Although /etc/hosts can be used alone in small stable networks, most commonly it is
used together with DNS or NIS. In this case, /etc/hosts will only be used if the system is
unable to locate a name using the other services. The file should always contain at least
two entries: an entry for the system itself and an entry for the localhost (the software
loopback address). For example, the system freddy should have the following entries:
127.0.0.1 loopback localhost
9.47.25.237 freddy freddy.beaverton.ibm.com
If only local name resolution is being used, then there must be an entry in
/etc/hosts for every host you wish to communicate with.
DNS
When TCP/IP networks become large, as on the Internet, managing all the hostnames
and addresses using flat text files presents a huge administrative burden. DNS was
created to address these problems.
Instead of each machine on the network keeping a file containing the name-to-address
mapping for all other hosts on the network, one or more hosts are selected to function
as name servers. Name servers resolve symbolic names assigned to networks and
hosts into IP addresses.
To simplify administration, the DNS name space is hierarchically divided into domains
(or zones). Hostnames need only be unique within a domain. A name server has
complete information about all the systems which belong to a particular domain.
14-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
NIS/NIS+
NIS is another method of resolving names which also uses one or more systems as
servers.
In addition to the hosts database, the NIS and NIS+ protocols are used to provide other
information. For example, NIS is commonly used to provide a centralized source of user
administration information (/etc/passwd, /etc/group, etc.) in networks that share files
using the Network File System (NFS) protocol.
/etc/rc.nfs
In AIX, NIS is configured and started by the /etc/rc.nfs script, which is run by init.
NIS servers run the ypserv daemon; clients run ypbind.
At a minimum, to configure a system as an NIS client, you would need to edit this file to
set the NIS domain name and start the ypbind daemon.
NIS references
Configuring an NIS server is outside the scope of this lesson. For more information
about configuring and troubleshooting NIS servers - or using NIS, see:
Network Information Services (NIS and NIS+) Guide
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Lookup order
It is quite common for more than one method of name resolution to be used. If a match
is found in the first source, that address is used. If the resolver routine is unable to find
a hostname in the first source, it tries the next, and so forth.
By default, the system will search in the following order:
- DNS
- NIS (if active)
- Local /etc/hosts
Settings in the /etc/irs.conf file override the defaults.
The /etc/netsvc.conf file overrides irs.conf and the environment variable, NSORDER
overrides all other settings.
14-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
? (9.47.10.253) at (incomplete)
. . .
Notes:
Introduction
Typically IP uses the Address Resolution Protocol (ARP) to resolve physical addresses.
How it works
The ARP table is held in kernel memory and maps IP addresses to physical addresses.
When the IP layer needs to send a packet, it consults the table to get the hardware
address to pass to the data link layer. If there is no entry, an ARP packet is broadcast to
all the systems on the local subnet. If the target system is connected and running, the
ARP protocol responds with a packet that includes its IP address. The ARP table gets
updated on the original host and the original packet gets sent to the data link layer for
transmission.
14-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty ARP is only used for the target if it is on the local subnet. If the target is not on the local
subnet, the packet is sent to the router using the ARP entry for the router, not the target.
When it finally gets to a system which is on the same subnet as the target, it then uses
ARP to get the hardware address of the target.
The ARP table is dynamic. If an ARP entry is unused for a period of time (default 20
minutes), it will be removed from the table.
ARP configuration
ARP does not typically need to be configured. In AIX, ARP functionality is provided as
part of the inet0 device driver. There is no daemon to start. There are several kernel
parameters which can be adjusted to change ARPs behavior.
Use the no command to view the ARP parameters. See the no man page for details
about the purpose of each parameter.
# no -a | grep arp
arpqsize = 12
arpt_killc = 20
arptab_bsiz = 7
arptab_nb = 25
Note: The no command sets or displays current or next boot values for network tuning
parameters. If setting a parameter, the value may not take effect until the adapter has
been disabled and re-enabled, or the system is rebooted. One example is the
inet_stack_size parameter that specifies the size of inet interrupt stack table in
kilobytes. If this parameter is changed, you must reboot the system.
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Routing
Notes:
Introduction
Routing is the process of forwarding packets from one IP network to another.
Gateways
Gateways are a type of router. Routers connect two or more networks and forward
packets between the networks. Some routers, for example, route at the network
interface level or at the physical level.
14-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty Gateways, however, route at the network level (IP) and can:
- Receive IP packets from other gateways or hosts for delivery to hosts on the local
network
- Route IP packets from one network to another
For example, a gateway connecting two networks has two network interfaces. The
gateway receives packets through one network interface and sends them out through
the other network interface.
While a general purpose AIX system can be used as a gateway, gateways are often
small dedicated systems which do nothing else.
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Static routing
Useful for small, stable networks
No daemons are involved
Adding routes
Implicit or direct
Explicit or static
smit mkroute
route command
Dynamic
ICMP redirect messages
Configuring a system as a router
Add to /etc/rc.net file:
no -o ipforwarding=1
Possible problems
Notes:
Introduction
Static routing (where routes are maintained manually) is practical for small, stable
network environments. For larger networks, or for networks which change frequently,
static routing is impractical.
Adding routes
In a static routing environment, routes are added in three ways:
- Implicit routes
- Explicit routes
- Dynamic routes
14-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Dynamic routes
Even in a static routing environment, some routes are created dynamically. If configured
for it, a gateway will send an ICMP redirect message if it notices that there is a more
direct route to a destination. Upon receiving an ICMP redirect message, IP on the
sending host can create a new route or modify an existing one.
The D flag in the route table indicates a dynamic route which was created by an ICMP
redirect message. The M flag indicates a route which was modified by an ICMP redirect.
Return routes
In order for two systems on separate networks to communicate, both systems must
have appropriate routes set up. Make sure that the system you are trying to
communicate with has a return route to your machine.
For example, if hostA cannot ping hostW and the route table appears OK on hostA,
the problem may be on hostW. If hostW does not have a route back to hostA, the ping
message will get to hostW, but hostW will be unable to send a reply. Check the route
table on both machines:
- host A:
Destination Gateway
default 9.47.10.1 (Default route)
OR
128.95/16 9.47.10.1 (Network route)
- hostW:
Destination Gateway
default 128.95.10.1 (Default route)
OR
9.47.10/24 128.95.10.1 (Network route)
14-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Dynamic routing
Routing daemons
routed or gated, not both
Started by /etc/rc.tcpip
Protocols
routed
Provides gateway routing functions for the RIP protocol.
gated
Provides gateway routing functions for the RIP, RIPng, EGP, BGP, BGP4+,
HELLO, IS-IS, ICMP, ICMPv6, and SNMP protocols.
Mixed environments
Configuration files
routed: /etc/gateways
gated: /etc/gated.conf
Active vs. passive mode
Notes:
Introduction
With dynamic routing, routing daemons continuously exchange information with routing
daemons running on other systems, and continuously update the routing table.
Dynamic routing removes the administrative burden of having to manually update the
routing tables on many machines.
Routing daemons
AIX provides two daemons for use in TCP/IP dynamic routing, routed and gated.
Either one or the other of these daemons can be run on a system (started by
/etc/rc.tcpip), not both. If both are running, you may get unpredictable results.
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Protocols
The routed daemon only supports Routing Information Protocol (RIP).
The gated daemon supports many different routing protocols as shown in the visual.
In order for dynamic routing to work, all the routers must be running the same protocol -
or must have static routes set up.
Configuration files
The default configuration file for the gated daemon is the /etc/gated.conf file. This file
defines which protocols gated will use and the static routes (if any). In addition, many
aspects of gateds behavior can be configured in this file.
You can specify static routes for routed in the /etc/gateways file.
14-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Checkpoint
1. Match the terms to the correct description:
Term Description
A. resolv.conf ___ Defines the route for hosts directly connected to a local
network. Added automatically when you configure a
network interface.
B. netsvc.conf ___ A path segment from one host to a gateway.
C. gateway ___ One of two files that can modify the name resolution
lookup order.
D. route ___ Static routes are defined in this file if bootup_option=yes.
E. default route ___ System which forwards packets from one IP network to
another.
F. implicit route ___ File used to configure a DNS client.
G. rc.bsdnet ___ Defines a gateway to be used when there is no specific
host or network route.
Notes:
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise 12
Notes:
14-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Unit summary
Notes:
Routing references
Routing, especially dynamic routing, can be quite complex. In this unit we learned some
basic routing concepts (which may be useful when troubleshooting), but this is only an
introduction. For more information about administering routing, see:
- System Management Guide: Communications and Networks, Chapter 3
- netstat, routed, and gated man pages.
- IBM ITES class:
AU07G/Q1307 AIX 5L Configuring TCP/IP
Copyright IBM Corp. 2000, 2008 Unit 14. TCP/IP configuration 14-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
14-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
Info Center General Programming Concepts: Writing and
Debugging Programs (Chapter 4. Error-Logging
Overview)
Online AIX Version 6.1 Commands reference
Online General Programming Concepts: Writing and
Debugging Programs (Chapter 4. Error-Logging
Overview)
Note: References listed as Online above are available at the
following address:
http://publib.boulder.ibm.com/infocenter/pseries/v6r1/index.jsp
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
Notes:
15-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CuDv, CuAt
error
CuVPD
daemon
errlog
error record /var/adm/ras/errlog
template
/var/adm/ras/errtmplt
/usr/lib/errdemon
errclear
errstop errlogger
application
errlog()
User
/dev/error Kernel
errsave()
(timestamp)
kernel module Copyright IBM Corporation 2008
Notes:
Detection of an error
The error logging process begins when an operating system module detects an error.
The error detecting segment of code then sends error information to either the
errsave() kernel service or the errlog() application subroutine, where the information
is in turn written to the /dev/error special file. This process then adds a timestamp to the
collected data. The errdemon daemon constantly checks the /dev/error file for new
entries, and when new data is written, the daemon conducts a series of operations.
15-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty To create an entry in the error log, the errdemon daemon retrieves the appropriate
template from the repository, the resource name of the unit that caused the error, and
the detail data. Also, if the error signifies a hardware-related problem and hardware vital
product data (VPD) exists, the daemon retrieves the VPD from the ODM. When you
access the error log, either through SMIT or with the errpt command, the error log is
formatted according to the error template in the error template repository and presented
in either a summary or detailed report. Most entries in the error log are attributable to
hardware and software problems, but informational messages can also be logged, for
example, by the system administrator.
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
The SMIT fastpath smit errpt takes you to the screen used to generate an error
report. Any user can use this screen. As shown on the visual, the screen includes a
number of fields that can be used for report specifications. Some of these fields are
described in more detail below.
15-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Error CLASSES
Values are H (hardware), S (software), and O (operator messages created with
errlogger). You can specify more than one error class.
Error TYPES
Valid error types include the following:
- PEND - The loss of availability of a device or component is imminent.
- PERF - The performance of the device or component has degraded to below an
acceptable level.
- TEMP - Recovered from condition after several attempts.
- PERM - Unable to recover from error condition. Error types with this value are usually
the most severe errors and imply that you have a hardware or software defect. Error
types other than PERM usually do not indicate a defect, but they are recorded so that
they can be analyzed by the diagnostic programs.
- UNKN - Severity of the error cannot be determined.
- INFO - The error type is used to record informational entries
Error LABELS
An error label is the mnemonic name used for an error ID.
Error IDs
An error ID is a 32-bit hexadecimal code used to identify a particular failure.
Resource CLASSES
Means device class for hardware errors (for example, disk).
Resource TYPES
Indicates device type for hardware (for example, 355 MB).
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Resource NAMES
Provides common device name (for example hdisk0).
15-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Summary report:
# errpt
Intermediate report:
# errpt -A
Detailed report:
# errpt -a
Notes:
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
The -d option
The -d option (flag) can be used to limit the report to a particular class of errors. Two
examples illustrating the use of this flag are shown on the visual:
- The command errpt -d H specifies a summary report of all hardware (-d H) errors
- The command errpt -a -d S specifies a detailed report (-a) of all software (-d S)
errors
The -c option
If you want to display the error entries concurrently, that is, at the time they are logged,
you must execute:
errpt -c
In the example on the visual, we direct the output to the system console.
The -D flag
Duplicate errors can be consolidated using:
errpt -D
When used with the -a option, errpt -D reports only the number of duplicate errors
and the timestamp for the first and last occurrence of the identical error.
Additional information
The errpt command has many options. Refer to your AIX 5L Version 5.3 Commands
Reference (or the man page for errpt) for a complete description.
15-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Error Type:
Error Class:
P: Permanent,
H: Hardware
Performance or Pending
S: Software
T: Temporary
O: Operator
I: Informational
U: Undetermined
U: Unknown
Copyright IBM Corporation 2008
Notes:
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Description
PHYSICAL VOLUME DECLARED MISSING
Probable Causes
POWER, DRIVE, ADAPTER, OR CABLE FAILURE
Detail Data
MAJOR/MINOR DEVICE NUMBER
8000 0011 0000 0001
SENSE DATA
00C3 5BA0 0000 4C00 0000 0115 7F54 BF78 00C3 5BA0 7FCF 6B93 0000 0000 0000 0000
Notes:
15-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
15-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty 4. Sometimes SCSI errors are logged, mostly with the LABEL SCSI_ERR10. They
indicate that the SCSI controller is not able to communicate with an attached device.
In this case, check the cable (and the cable length), the SCSI addresses, and the
terminator.
DISK_ERR5 errors
A very infrequent error is DISK_ERR5. It is the catch-all (that is, the problem does not
match any of the above DISK_ERRx symptoms). You need to investigate further by
running the diagnostic programs which can detect and produce more information about
the problem.
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
15-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# smit errclear
Clean the Error Log
Type or select values in entry fields.
Press Enter AFTER making all desired changes.
Remove entries older than this number of days [30] #
Error CLASSES [ ] +
Error TYPES [ ] +
...
Resource CLASSES [ ] +
...
Notes:
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
ODM-Based:
/etc/objrepos/errnotify
Error Notification
Notes:
15-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty 3. ODM-based error notification: The errdemon program uses the ODM class errnotify
for error notification. How to work with errnotify is discussed later in this topic.
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
while true
do
sleep 60 # Let's sleep one minute
done
Notes:
15-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty - The two files are compared using the command cmp -s (silent compare, which
means no output will be reported). If the files are not different, we jump back to the
beginning of the loop (continue), and the process will sleep again.
- If there is a difference, a new error entry will be posted to the error log. In this case,
we inform the operator that a new entry is in the error log. Instead of print, you
could use the mail command to inform another person.
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
errnotify:
en_pid = 0
en_name = "sample"
en_persistenceflg = 1
en_label = ""
en_crcid = 0
en_class = "H"
en_type = "PERM"
en_alertflg = ""
en_resource = ""
en_rtype = ""
en_rclass = "disk"
en_method = "errpt -a -l $1 | mail -s DiskError root"
Notes:
15-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
List of descriptors
Here is a list of all descriptors for the errnotify object class:
en_alertflg Identifies whether the error is alertable. This descriptor is
provided for use by alert agents with network management
applications. The values are TRUE (alertable) or FALSE (not
alertable).
en_class Identifies the class of error log entries to match. Valid values are
H (hardware errors), S (software errors), O (operator messages),
and U (undetermined).
en_crcid Specifies the error identifier associated with a particular error.
en_label Specifies the label associated with a particular error identifier as
defined in the output of errpt -t (show templates).
en_method Specifies a user-programmable action, such as a shell script or a
command string, to be run when an error matching the selection
criteria of this Error Notification object is logged. The error
notification daemon uses the sh -c command to execute the
notify method.
The following keywords are passed to the method as arguments:
$1 Sequence number from the error log entry
$2 Error ID from the error log entry
$3 Class from the error log entry
$4 Type from the error log entry
$5 Alert flags from the error log entry
$6 Resource name from the error log entry
$7 Resource type from the error log entry
$8 Resource class from the error log entry
$9 Error label from the error log entry
en_name Uniquely identifies the object.
en_persistenceflg Designates whether or not the Error Notification object should be
removed when the system is restarted. 0 means removed at boot
time; 1 means persists through boot.
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
syslogd daemon
/etc/syslog.conf:
daemon.debug /tmp/syslog.debug
/tmp/syslog.debug:
syslogd inetd[16634]: A connection requires tn service
inetd[16634]: Child process 17212 has ended
# stopsrc -s inetd
Notes:
Function of syslogd
The syslogd daemon logs system messages from different software components
(kernel, daemon processes, system applications).
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- The following line specifies that all messages, except messages from the mail
subsystem, are to be sent to the syslogd daemon on the host server:
*.debug; mail.none @server
Note that, if this example and the preceding example appear in the same
/etc/syslog.conf file, messages sent to /tmp/daemon.debug will also be sent to the
host server.
Facilities
Use the following system facility names in the selector field:
kern Kernel
user User level
mail Mail subsystem
daemon System daemons
auth Security or authorization
syslog syslogd messages
lpr Line-printer subsystem
news News subsystem
uucp uucp subsystem
* All facilities
Priority Levels
Use the following levels in the selector field. Messages of the specified level (and all
levels above it) and all levels above it are sent as directed.
15-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty emerg Specifies emergency messages. These messages are not distributed to all
users.
alert Specifies important messages such as serious hardware errors. These
messages are distributed to all users.
crit Specifies critical messages, not classified as errors, such as improper login
attempts. These messages are sent to the system console.
err Specifies messages that represent error conditions.
warning Specifies messages for abnormal, but recoverable conditions.
notice Specifies important informational messages.
info Specifies information messages that are useful in analyzing the system.
debug Specifies debugging messages. If you are interested in all messages of a
certain facility, use this level.
none Excludes the selected facility.
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/etc/syslog.conf:
# errpt
Notes:
15-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
errnotify:
en_name = "syslog1"
en_persistenceflg = l
en_method = "logger Error Log: $(errpt -l $1 | grep -v TIMESTAMP)"
errnotify:
en_name = "syslog1"
en_persistenceflg = l
en_method = "errpt -l $1 | tail -1 | logger -t errpt -p
daemon.notice"
Copyright IBM Corporation 2008
Notes:
Command substitution
You will need to use command substitution (or pipes) before calling the logger
command. The first two examples on the visual illustrate the two ways to do command
substitution in a Korn shell environment:
- Using the UNIX command syntax (with backquotes) - shown in the first example on
the visual
- Using the newer $(UNIX command) syntax - shown in the second example on the
visual
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
Notes:
15-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Exercise 13
Notes:
Copyright IBM Corp. 2000, 2008 Unit 15. Error log and syslogd 15-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit summary
Notes:
15-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Checkpoint solutions
A-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Checkpoint solutions
1. True or False? The Web-based System Manager is available
for client access automatically after the BOS is installed.
False. The Web-based System Manager server must be configured
and enabled for client access.
2. Which of the statements are true regarding the Web-based
System Manager?
a) An AIX V6.1 system can be managed from a remote PC with
appropriate WebSM client installed.
b) In stand-alone mode, use the wsm command to access the Web-
based system manager.
c) It is possible to manage an AIX V6.1 system from a remote AIX V6.1
system using an ASCII terminal.
C is false. WebSM is a graphic interface and thus requires a graphic
display.
A-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Checkpoint solutions
1. Which of the following states can your software be in, in order for you to
be able to use it? (select all that apply)
a. Applied state
b. Removed state
c. Install state
d. Commit state
2. What command is used to list all installed software on your system?
lslpp -l
3. Which of the following can you install as an entity? (select all that apply)
a. Fileset
b. LPP
c. Package
d. Bundle
4. What is the difference between the SMIT menus: Install Software and
Update Installed Software to Latest Level (Update All)?
Install Software by default installs everything from the installation media
(except printer and devices) onto the system.
Update Installed Software to Latest Level (Update All) installs only updates
to filesets already installed on your system.
UNIT 4 Devices
Checkpoint solutions
1. Is it possible to use SCSI ID 7 for a new tape drive?
No. The SCSI adapter itself uses ID 7. So, it cannot be used
for other devices.
2. Use the output on the next visual (lsdev -C -H) to answer the
following four questions:
a) What will happen if we attempt to add another device with the SCSI address set to
4?
The operation will fail as there is already a device (SCSI Disk Drive)
configured at this location.
b) Can the 8 mm tape drive be currently used? Why?
No, because it is in the defined state. You have to first make it available by either
using SMIT or the mkdev command.
c) Where is the printer connected? The parallel port
d) The Ethernet adapter is installed in what slot?
It is an integrated adapter which does not occupy a slot on the PCI bus.
A-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Checkpoint solutions
1. In which ODM class do you find the physical volume IDs of
your disks?
CuAt
Checkpoint solutions (1 of 2)
1. True or False? You must have AIX loaded on your system to use the
System Management Services programs. False. SMS is part of the
built-in firmware.
4. What command is used to build a new boot image and write it to the
boot logical volume? bosboot -ad /dev/hdiskx
A-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Checkpoint solutions (2 of 2)
6. True or False? During the AIX boot process, the AIX kernel is
loaded from the root file system.
False. The AIX kernel is loaded from hd5.
7. True or False? A service processor allows actions to occur even
when the regular processors are down.
8. List the five components of the boot logical volume (assume a
CHRP system). SOFTROS, bootexpand, kernel, RAM file
system, base ODM
9. How do you boot an AIX machine in maintenance mode?
You need to boot from an AIX CD, mksysb, or NIM server.
10. Your machine keeps rebooting and repeating the POST.
What could be the reason for this?
Invalid boot list, corrupted boot logical volume, or hardware
failures of boot device.
Copyright IBM Corporation 2008
Checkpoint solutions (1 of 2)
A-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Checkpoint solutions (2 of 2)
3. Which ODM file is used by cfgmgr during boot to configure
the devices in the correct sequence?
Config_Rules
Checkpoint solutions
1. AIX 5L or AIX 6 can be installed from which of the following:
(select all that are correct)
a. CD-ROM
b. Diskette
c. 4 mm tape
2. True or False? A Preservation Install preserves all data
on the disks.
Preserves SOME of the existing data on the disk selected for
installation. Warning: This method overwrites the usr (/usr),
variable (/var), temporary (/tmp), and root (/) file systems. Other
product (application) files and configuration data are destroyed.
3. What is the console used for during the installation process?
The console is used to display all the system messages and
interact with the installation.
Copyright IBM Corporation 2008
A-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Checkpoint solutions
1. A scalable volume group can contain up to 1024 disks
and 4096 logical volumes.
2. (True or False) Each volume group has a unique
identifier.
3. (True or False) Disks can be added to an existing
volume group.
4. The mklv command can be used to create a logical
volume.
5. (True or False) No LVM information is stored outside of
the ODM. False. Information is also stored in other
AIX files and in disk control blocks (like the VGDA
and LVCB).
Checkpoint solutions
A-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Checkpoint solutions
1. Will the size of the file system change when the size of
the logical volume on which it resides is increased? No
Checkpoint solutions
1. What conclusions regarding potential paging space problems can
you reach based on the following listing?
Page Physical Volume Size %Used Active Auto Type chksum
Space Volume Group
Obviously, it is difficult to come to any conclusions regarding the state of this system
just by looking at a snapshot picture like the one above. However, at first glance, the
following potential problems can be noticed:
paging00 is underutilized, and it is too large. It needs to be reduced in size.
paging01 is over utilized, and the size seems to be too small. It needs to be
increased in size.
Both user-defined paging spaces are on the same disk. It would be better if one of
them were moved onto a disk which is less utilized.
2. True or False? The size of paging00 (in the above example) can be
dynamically decreased.
A-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Checkpoint solutions
1. What is the difference between the following two commands?
a) find /home/fred | backup -ivf /dev/rmt0
b) cd /home/fred; find . | backup -ivf /dev/rmt0
(a) will backup the files using the full path names, whereas
(b) will backup the file names using the relative path names.
So (b)s files can be restored into any directory.
3. Which command could you use to restore these files? The files were
backed up using the backup command so you would have to use the
restore command.
4. True or False? The smit mksysb command backs up all file systems,
provided they are mounted. mksysb only backs up rootvg file systems. To
back up other volume groups, you must use the savevg command.
Copyright IBM Corporation 2008
Checkpoint solutions
1. Match the terms to the correct description:
Term Description
A. resolv.conf _F_ Defines the route for hosts directly connected to a local
network. Added automatically when you configure a
network interface.
B. netsvc.conf _D_ A path segment from one host to a gateway.
C. gateway _B_ One of two files that can modify the name resolution
lookup order.
D. route _G_ Static routes are defined in this file if bootup_option=yes.
E. default route _C_ System which forwards packets from one IP network to
another.
F. implicit route _A_ File used to configure a DNS client.
G. rc.bsdnet _E_ Defines a gateway to be used when there is no specific
host or network route.
A-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Checkpoint solutions
A-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
References
Info Center AIX 5L Performance Management Guide
Info Center AIX 5L Performance Tools Guide and Reference
Info Center AIX 5L Commands Reference, Volumes 1-6
Info Center AIX 5L Practical Performance Tools and Tuning Guide
Redbooks AIX 5L Performance Tools Handbook Redbook
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit objectives
Notes:
B-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
no
High no
paging Check disk
yes Disk
no
Balance disk balanced
Possible
memory yes
constraint
Possible
disk/SCSI
constraint
Copyright IBM Corporation 2008
Notes:
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
If balanced, then there may be too many physical volumes on a bus. More than
three or four on a single SCSI bus may create problems. You may need to install
another SCSI adapter. Otherwise, more disks may be needed to spread out the
data.
B-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- smtctl is in bos.rte.methods
- Performance toolbox tools such as xmperf, 3dmon which are part of perfmgr
B-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# ps aux
USER PID %CPU %MEM ... STIME TIME COMMAND
root 516 98.2 0.0 ... 13:00:00 1329:38 wait
johnp 7570 1.2 1.0 ... 17:48:32 0:01 -ksh
root 1032 0.8 0.0 ... 15:13:47 78:37 kproc
root 1 0.1 1.0 ... 15:13:50 13:59 /etc/init
Percentage of time
the process has Percentage of real Total Execution
used the CPU memory Time
Notes:
B-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# ps -elf
F S UID PID PPID C PRI NI ... TIME CMD
200003 A root 1 0 0 60 20 ... 0:04 /etc/init
240001 A root 69718 1 0 60 20 ... 1:16 /usr/sbin/syncd 60
200001 A root 323586 188424 24 72 20 ... 0:00 ps -elf
Priority of
the process Nice value
The smaller the PRI value, the higher the priority of the process.
The average process runs a priority around 60.
The NI value is used to adjust the process priority. The higher
the nice value is, the lower the priority of the process.
Notes:
Priority introduction
After identifying CPU and memory-intensive processes, check the priorities of the
processes.
The priority of a process controls when a process will be executed.
B-10 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Interval Number
# sar -u 60 30
Notes:
sar output
The columns provide the following information:
- %usr
Reports the percentage of time the CPU spent in execution at the user (or
application) level.
B-12 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty - %sys
Reports the percentage of time the CPU spent in execution at the system (or kernel)
level. This is the time the CPU spent in execution of system functions.
- %wio
Reports the percentage of time the CPU was idle waiting for disk I/O to complete.
This does not include waiting for remote disk access.
- %idle
Reports the percentage of time the CPU was idle with no outstanding disk I/O
requests.
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
B-14 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# vmstat 5
0 0 8793 81 0 0 0 1 7 0 1 2 95 2
0 0 9192 66 0 0 16 81 167 0 1 6 77 16
0 0 9693 69 0 0 53 95 216 0 1 4 63 33
0 0 10194 64 0 21 0 0 0 0 20 5 42 33
0 0 4794 5821 0 24 0 0 0 0 5 8 41 46
Notes:
B-16 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty Because the target of this course is to provide a basic performance understanding, we
concentrate on the pi, po and wa columns.
pi and po columns
The pi and po columns indicate the number of 4 KB pages that have been paged in
or out.
Simply speaking, paging means that the real memory is not large enough to satisfy
all memory requests and uses a secondary storage area on disks. If the systems
workload always causes paging, you should consider increasing real memory.
Accessing pages on disk is relatively slow.
wa column
The wa column gives the same information as the %wio column of sar -u. It
indicates that the CPU has outstanding disk I/Os to complete. If this value is always
non-zero, it might indicate that your system is I/O bound.
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Sizes are in # of
Top 3 users of 4K frames
# svmon -Pt 3 memory
Notes:
Examples
In both examples on the visual, the output has been reduced for simplicity and to show
the information that is of interest to this discussion.
In the first example, svmon -G provides a global report. You can see the size of
memory, how much is in use and the amount that is free. It provides details about how it
is being used and it also provide statistics on paging space.
All numbers are reported as the number of frames. A frame is 4 KB in size.
B-18 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty In the second example, svmon -Pt 3 displays memory usage of the top three
processes using memory, sorted in decreasing order of memory demand. The flags are:
P shows processes
t gives the top # to display
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
tty: tin tout avg-cpu: %user %sys %idle %iowait physc %entc
0.1 110.7 7.0 59.4 0.0 33.7 0.0 1.4
tty: tin tout avg-cpu: %user %sys %idle %iowait physc %entc
0.1 96.3 6.5 58.0 0.0 35.5 0.0 1.3
Notes:
B-20 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
If your system is having performance problems and has indication that there might be
an I/O problem, additional investigation is needed in this particular area. Other tools
such as filemon and kernel trace analysis can provide additional details which will
clarify what the situation is.
B-22 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Example
In the example in the visual, filemon -o fmout starts the trace. The -o directs the
output to the file called fmout. There will be several sections included in this report. The
sample output has been reduced to only show two areas: logical volume activity and
physical volume activity.
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
B-24 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
topas
# topas
Topas Monitor for host: kca81 EVENTS/QUEUES FILE/TTY
Mon Aug 9 11:48:35 2005 Interval: 2 Cswitch 370 Readch 11800
Syscall 461 Writech 95
Kernel 0.1 | | Reads 18 Rawin 0
CPU
User 0.0 | | Writes 0 Ttyout 0
info Wait 0.0 | | Forks 0 Igets 0
Idle 99.8 |############################| Execs 0 Namei 1
Physc = 0.00 %Entc= 1.5 Runqueue 0.0 Dirblk 0
Waitqueue 0.0
Network KBPS I-Pack O-Pack KB-In KB-Out
en0 0.1 0.4 0.4 0.0 0.1
lo0 0.0 0.0 0.0 0.0 0.0 PAGING MEMORY
Faults 1 Real,MB 4095
iostat Disk Busy% KBPS TPS KB-Read KB-Writ Steals 0 % Comp 15.4
info hdisk0 0.0 0.0 0.0 0.0 0.0 PgspIn 0 % Noncomp 9.3
hdisk1 0.0 0.0 0.0 0.0 0.0 PgspOut 0 % Client 1.8
PageIn 0
PageOut 0 PAGING SPACE
Sios 0 Size,MB 3744
Name PID CPU% PgSp Owner % Used 0.6
topas 18694 0.1 1.4 root % Free 99.3
rmcd 10594 0.0 2.0 root NFS (calls/sec)
nfsd 15238 0.0 0.0 root ClientV2 0 WPAR Activ 0
syncd 3482 0.0 1.3 root ServerV2 0 WPAR Total 0
gil 2580 0.0 0.0 root ClientV2 0 Press:
vmstat ServerV3 0 "h" for help
info ClientV3 0 q" for quit
Notes:
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# iostat 10 60
# vmstat 5
# sar -u 60 60
Notes:
B-26 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# crontab -e
0 3 * * 1-5 /usr/local/bin/report
Notes:
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
kshdev:
backend = /usr/bin/ksh
# qadm -D ksh
Queue is down
# qprt -P ksh report1
# qprt -P ksh report2 Jobs will be queued
# qprt -P ksh report3
# qadm -U ksh
Queue is up:
Jobs will be executed
sequentially
Copyright IBM Corporation 2008
Notes:
B-28 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
B-30 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
To enable:
smtctl [ -m off | on [ -w boot | now]]
Notes:
Execution units
Modern processors have multiple specialized execution units, each of which is capable
of handling a small subset of the instruction set architecture; some will handle integer
operations, some floating point, and so on. These execution units are capable of
operating in parallel so several instructions of a program may be executing
simultaneously.
However, conventional processors execute instructions from a single instruction
stream. Despite microarchitectural advances, execution unit utilization remains low in
todays microprocessors. It is not unusual to see average execution unit utilization rates
of approximately 25% across a broad spectrum of environments. To increase execution
unit utilization, designers use thread-level parallelism, in which the physical processor
core executes instructions from more than one instruction stream. To the operating
system, the physical processor core appears as if it is a symmetric multiprocessor
containing two logical processors.
B-32 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
topas enhancements
If topas runs on a partition with a shared processor partition, beneath the CPU
utilization, there are two new values displayed:
- Physc displays the number of physical processors granted to the partition (if
Micro-Partitioning)
- %Entc displays the percentage of entitled capacity granted to a partition (if
Micro-Partitioning)
The -L flag will switch the output to a logical partition display. You can either use -L
when invoking the topas command, or as a toggle when running topas. In this mode,
topas displays data similar to the mpstat and lparstat commands.
B-34 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
iostat enhancements
In AIX 5L V5.3 and AIX 6.1, the iostat command reports the percentage of physical
processors consumed (%physc), the percentage of entitled capacity consumed (%entc),
and the processing capacity entitlement when running in a shared processor partition.
These metrics will only be displayed on shared processor partitions.
In the system configuration information, you can see the currently assigned processing
capacity specified as ent.
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
In the System configuration: lcpu=2 ent=0.40 line, the lcpu field shows
logical CPUs and the ent field gives the LPARs entitled capacity.
Notice the physc and %entc columns. physc reports the number of physical
processors consumed. This will be reported only if the partition is running with
shared processors or simultaneous multi-threading enabled. entc reports the
percentage of entitled capacity consumed.
B-36 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Notes:
Introduction
The Performance Diagnostic Tool (PDT) assesses the current state of a system and
tracks changes in workload and performance. It attempts to identify incipient problems
and suggest solutions before the problems become critical. PDT is available on all
AIX V4 and later systems. It is contained in fileset bos.perf.diag_tool. The PDT data
collection and reporting is very easy to implement.
PDT attempts to apply some general concepts of well-performing systems to its search
for problems.
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Error-free operation
Hardware or software errors often produce performance problems:
- Check the hardware and software error logs
- Report bad VMM pages (pages that have been allocated by applications but have
not been freed properly)
B-38 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Enabling PDT
# /usr/sbin/perf/diag_tool/pdt_config
Notes:
Enabling PDT
PDT must be enabled in order to begin collecting data and writing reports. Enable PDT
by executing the script /usr/sbin/perf/diag_tool/pdt_config. Only the root user is
permitted to run this script. From the PDT menu, option 4 enables the default data
collection functions. Actual collection occurs via cron jobs run by the cron daemon.
The menu is created using the Korn Shell select command. This means the menu
options are not reprinted after each selection. However, the program will show the
menu again if you press Enter without making a selection.
Other options
To alter the recipient of reports, use option 2. The default recipient is the adm user.
Reports have severity levels. There are three levels; level 1 gives the smallest report,
while level 3 will analyze the data in more depth.
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Option 6 does not deinstall the program, it simply advises how you might do that.
Types of analysis
Analysis by PDT is both static (configuration focused; that is, I/O and paging) and
dynamic (over time). Dynamic analysis includes such areas as network, CPU, memory,
file size, file system usage, and paging space usage. An additional part of the report
evaluates load average, process states, and CPU idle time.
Diagnostic reports
Once PDT is enabled, it maintains data in a historical record for 35 days (by default). On
a daily basis, by default, PDT generates a diagnostic report that is sent to user adm and
also written to /var/perf/tmp/PDT_REPORT.
B-40 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
0 21 * * 6 /usr/sbin/perf/diag_tool/Driver_ offweekly
Notes:
PDT components
The three main components of the PDT system are:
- Collection control
- Retention control
- Reporting control
crontab entries
When PDT is enabled, by default, it adds entries to the crontab file for adm to run
these functions at certain default times and frequencies. The entries execute a shell
script called Driver_ in the /usr/sbin/perf/diag_tool directory. This script is passed
through three different parameters, each representing a collection profile, at three
different collection times.
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# cat /var/spool/cron/crontabs/adm
0 9 * * 1-5 /usr/sbin/perf/diag_tool/Driver_ daily
0 10 * * 1-5 /usr/sbin/perf/diag_tool/Driver_ daily2
0 21 * * 6 /usr/sbin/perf/diag_tool/Driver_ offweekly
The crontab entries and the Driver_ script indicate that daily statistics (daily) are
collected at 9:00 A.M. and reports (daily2) are generated at 10:00 A.M. every work
day, and historical data (offweekly) is cleaned up every Saturday night at 9:00 P.M.
B-42 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
PDT files
Collection
Driver_ daily
/var/perf/cfg/diag_tool/.collection.control
Retention
Driver_ offweekly
/var/perf/cfg/diag_tool/.retention.control
/var/perf/tmp/.SM /var/perf/tmp/.SM.last
Reporting
/var/perf/tmp/PDT_REPORT /var/perf/tmp/.SM.discards
Next Day
adm
/var/perf/tmp/PDT_REPORT.last
Copyright IBM Corporation 2008
Notes:
Collection component
The parameter passed to the Driver_ shell script is compared with the contents of the
.control files found in the /var/perf/cfg/diag_tool directory to find a match. These
control files contain the names of scripts to run to collect data and generate reports.
When a match is found, the corresponding scripts are run. The scripts that are executed
for daily are in .collection.control, those for daily2 are in .reporting.control, and
offweekly are in .retention.control.
The collection component comprises a set of programs in /usr/sbin/perf/diag_tool that
periodically collect and record data on configuration, availability, and performance.
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Retention component
The retention component periodically reviews the collected data and discards data that
is out of date. The size of the historical record is controlled by the file
/var/perf/cfg/diag_tool/.retention.list. This file contains the default number, 35, which
is the number of days to keep. Data that is discarded during the cleanup, is appended to
the file /var/perf/tmp/.SM.discards. The cleansed data is kept in /var/perf/tmp/.SM.
One last backup is held in the file /var/perf/tmp/.SM.last.
Reporting component
The reporting component periodically produces a diagnostic report from the current set
of historical data. On a daily basis, PDT generates a diagnostic report and mails the
report (by default) to adm and writes it to /var/perf/tmp/PDT_REPORT. The previous
days report is saved to /var/perf/tmp/PDT_REPORT.last.
Any PDT execution errors will be appended to the file /var/perf/tmp/.stderr.
B-44 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
# vi /var/perf/cfg/diag_tool/.thresholds
DISK_STORAGE_BALANCE 800
PAGING_SPACE_BALANCE 4
NUMBER_OF_BALANCE 1
MIN_UTIL 3
FS_UTIL_LIMIT 90
MEMORY_FACTOR .9
TREND_THRESHOLD .01
EVENT_HORIZON 30
Notes:
Thresholds
The /var/perf/cfg/diag_tool/.thresholds file contains the thresholds used in analysis
and reporting. The visual shows the content of the default file. The file may be modified
by root or adm. Following is a list of all the thresholds:
- DISK_STORAGE_BALANCE
- PAGING_SPACE_BALANCE
- NUMBER_OF_BALANCE
- MIN_UTIL
- FS_UTIL_LIMIT
- MEMORY_FACTOR
- TREND_THRESHOLD
- EVENT_HORIZON
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
DISK_STORAGE_BALANCE (MB)
The SCSI controllers having the largest and smallest disk storage are identified. This is
a static size, not the amount allocated or free.The default value is 800. Any integer
value between zero (0) and 10000 is valid.
PAGING_SPACE_BALANCE
The paging spaces having the largest and the smallest areas are identified. The default
value is 4. Any integer value between zero (0) and 100 is accepted. This threshold is
presently not used in analysis and reporting.
NUMBER_OF_BALANCE
The SCSI controllers having the greatest and fewest number of disks attached are
identified.The default value is one (1). It can be set to any integer value from zero (0) to
10000.
MIN_UTIL (%)
Applies to process utilization. Changes in the top three CPU consumers are only
reported if the new process had a utilization in excess of MIN_UTIL. The default value is
3. Any integer value from zero (0) to 100 is valid.
FS_UTIL_LIMIT (%)
Applies to journaled file system utilization. Any integer value between zero (0) and 100
is accepted.
MEMORY_FACTOR
The objective is to determine whether the total amount of memory is adequately backed
up by paging space. The formula is based on experience and actually compares
MEMORY_FACTOR * memory with the average used paging space. The current
default is .9. By decreasing this number, a warning is produced more frequently.
Increasing this number eliminates the message altogether. It can be set anywhere
between .001 and 100.
TREND_THRESHOLD
Used in all trending assessments. It is applied after a linear regression is performed on
all available historical data. This technique basically draws the best line among the
points. The slope of the fitted line must exceed the last_value * TREND_THRESHOLD.
The objective is to try to ensure that a trend, however strong its statistical significance,
B-46 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty has some practical significance. The threshold can be set anywhere between 0.00001
and 100000.
EVENT_HORIZON (Days)
Also used in trending assessments. For example, in the case of file systems, if there is
a significant (both statistical and practical) trend, the time until the file system is 100%
full is estimated. The default value is 30, and it can be any integer value between zero
(0) and 100000.
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# vi /var/perf/cfg/diag_tool/.files
/var/adm/wtmp
Files and
/var/spool/qdaemon/
/var/adm/ras/
directories
/tmp/ to monitor
# vi /var/perf/cfg/diag_tool/.nodes
pluto
neptun
Systems
mars to monitor
Notes:
B-48 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Alerts
I/O CONFIGURATION
- Note: volume hdisk2 has 480 MB available for
allocation while volume hdisk1 has 0 MB available
PAGING CONFIGURATION
- Physical Volume hdisk1 (type:SCSI) has no paging space defined
I/O BALANCE
- Physical volume hdisk0 is significantly busier than others
volume hdisk0, mean util. = 11.75
volume hdisk1, mean util. = 0.00
NETWORK
- Host sys1 appears to be unreachable
Notes:
Disclaimer
Note that this is a doctored report example. Some sections have been deliberately
altered for enhanced dramatic effect; some small parts have been left out for simplicity.
Header section
The PDT report consists of several sections. The header section provides information
on the time and date of the report, the host name and the time period for which data
was analyzed. The content of this section does not differ with changes in the severity
level.
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Alerts section
After a header section, the Alerts section reports on identified violations of concepts and
thresholds. If no alerts are found, the section is not included in the report. The Alerts
section focuses on identified violations of applied concepts and thresholds. The
following subsystems may have problems and appear in the Alerts section:
- File system
- I/O configuration
- Paging configuration
- I/O balance
- Page space
- Virtual memory
- Real memory
- Processes
- Network
For severity 1 levels, the Alerts section focuses on file systems, physical volumes,
paging and memory. If you ask for severity 2 or 3 reporting, it adds information on
configuration and processes, as seen in the example in the visual.
Alerts indicate suspicious configuration and load conditions. In this example, it appears
that one disk is getting all the I/O activity. Clearly, the I/O load is not distributed to make
the best use of the available resources.
B-50 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
FILES
- File (or directory) /var/adm/ras/ SIZE is increasing
now, 364 KB and increasing an avg. of 5282 bytes/day
FILE SYSTEMS
- File system lv01(/fs3) is growing
now, 29.00% full, and growing an avg. of 0.30%/day
At this rate lv01 will be full in about 45 days
ERRORS
- Hardware ERRORS; time to next error is 0.982 days
System Health
SYSTEM HEALTH
- Current process state breakdown:
2.10 [0.5%]: waiting for the CPU
89.30 [22.4%]: sleeping
306.60 [77.0%]: zombie
398.00 = TOTAL
Summary
This is a severity level 1 report
No further details available at severity level >1
Copyright IBM Corporation 2008
Notes:
Trends sections
The report then deals with Upward Trends and Downward Trends. These two sections
focus on problem anticipation rather than on the identification of existing problems. The
same concepts are applied, but used to project when violations might occur. If no trends
are detected, the section does not appear.
PDT employs a statistical technique to determine whether or not there is a trend in a
series of measurements. If a trend is detected, the slope of the trend is evaluated for its
practical significance. For upward trends, the following items are evaluated:
- Files
- File systems
- Hardware and software errors
- Paging space
- Processes
- Network
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Summary section
In the Summary section, the severity level of the current report is listed. There is also an
indication given as to whether more details are available at higher severity levels. If so,
an adhoc report may be generated to get more detail, using the
/usr/sbin/perf/diag_tool/pdt_report command.
B-52 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Uempty
Unit summary
Notes:
Copyright IBM Corp. 2000, 2008 Appendix B. Performance and workload management B-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
B-54 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Packaging
The following information contrasts AIX and HP-UX packaging details.
Units AIX HP-UX
Smallest installable unit fileset fileset
Single installable image must be distrib- package Product
uted and installed as a unit
Logical grouping of packages bundle bundle
Logical grouping of packages and software Bundle offering, for example:
clusters App-Dev: Application Development
Environment
Client:
Pers-Prod
DCE-Client
Media-Defined
Copyright IBM Corp. 2000, 2008 Appendix C. Quick reference: HP-UX to AIX C-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
C-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix C. Quick reference: HP-UX to AIX C-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
C-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix C. Quick reference: HP-UX to AIX C-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
C-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Packaging
The following information contrasts AIX and Solaris packaging details.
Units AIX Solaris
Smallest installable unit fileset package
Single installable image must be distrib- package package
uted and installed as a unit
Logical grouping of packages bundle software cluster
Logical grouping of packages and software Bundle offering, for example: Software configuration clusters, for exam-
clusters App-Dev: Application Development ple:
Environment Core: Required operating system files
Client: End-User System Support: Core plus
Pers-Prod window environment
DCE-Client Developer System Support: End-User
Media-Defined plus the development environment
Entire Distribution: Developer System
plus enhanced features
Entire Distribution Plus OEM: Entire
Distribution plus third-party hardware
drivers (on SPARC only)
Copyright IBM Corp. 2000, 2008 Appendix D. Quick Reference: Solaris to AIX D-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
D-2 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Kernel modules directory Kernel and kernel extension modules are Kernel modules are stored in three directo-
stored in two directories: ries:
/usr/lib/boot /platform/sparc/kernel or
/usr/lib/drivers /platform/i86pc/kernel
/kernel
/usr/kernel
Create and stop processes and Set the default environment variables Set the default environment variables as
services for a current system run as defined in /etc/rc defined in /etc/default/init.
level based on the /etc/inittab file.
System run levels Defined run levels: Eight run levels:
0-1: Reserved for future use 0: Power-down state
2: Multiuser state with NFS resources s or S: Single-user state
shared (default run level) 1: Administrative state
3-9: Defined according to the users pref- 2: Multiuser state
erences 3: Multiuser state with NFS resources
m,M,s,S: Single-user state (maintenance shared (default run level)
level) 4: Alternative multiuser (not in use)
a,b,c: Starts processes assigned to the new 5: Power-down state
run levels while leaving the existing pro- 6: Reboot state
cesses at the current level running
Q,q: init command to reexamine the
/etc/inittab file
Copyright IBM Corp. 2000, 2008 Appendix D. Quick Reference: Solaris to AIX D-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
D-4 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix D. Quick Reference: Solaris to AIX D-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
D-6 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
Student Notebook
Copyright IBM Corp. 2000, 2008 Appendix D. Quick Reference: Solaris to AIX D-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
D-8 AIX 6 for UNIX Professionals Copyright IBM Corp. 2000, 2008
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V5.1
backpg
Back page