Professional Documents
Culture Documents
cover
Student Notebook
ERC 5.0
Trademarks
The reader should recognize that the following terms, which appear in the content of this
training document, are official trademarks of IBM or other companies:
IBM is a registered trademark of International Business Machines Corporation.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
AIX AIX 5L Blue Gene
Chipkill CICS/6000 DB2
DB2 Universal Database eServer Electronic Service Agent
Informix iSeries LoadLeveler
Lotus Magstar Micro Channel
OS/400 Parallel Sysplex POWER2
POWER3 POWER4 POWER4+
POWER5 POWERparallel PowerPC
PowerPC Architecture PowerPC 601 pSeries
Redbooks RISC System/6000 RS/6000
SP ThinkVantage Tivoli
TotalStorage WebSphere
Adobe and Acrobat are tradmarks of Adobe Systems Inc.
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the
United States, other countries, or both.
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other
countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Linux is a registered trademark of Linus Torvalds in the United States and other countries.
Other company, product and service names may be trademarks or service marks of others.
The information contained in this document has not been submitted to any formal IBM test and is distributed on an as is basis without
any warranty either express or implied. The use of this information or the implementation of any of these techniques is a customer
responsibility and depends on the customers ability to evaluate and integrate them into the customers operational environment. While
each item may have been reviewed by IBM for accuracy in a specific situation, there is no guarantee that the same or similar results will
result elsewhere. Customers attempting to adapt these techniques to their own environments do so at their own risk.
Copyright International Business Machines Corporation 2000, 2005. All rights reserved.
This document may not be reproduced in whole or in part without the prior written permission of IBM.
Note to U.S. Government Users Documentation related to restricted rights Use, duplication or disclosure is subject to restrictions
set forth in GSA ADP Schedule Contract with IBM Corp.
V3.1.0.1
Student Notebook
TOC Contents
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
viii AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
xii AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
xiv AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
TMK Trademarks
The reader should recognize that the following terms, which appear in the content of this
training document, are official trademarks of IBM or other companies:
IBM is a registered trademark of International Business Machines Corporation.
The following are trademarks of International Business Machines Corporation in the United
States, or other countries, or both:
AIX AIX 5L Blue Gene
Chipkill CICS/6000 DB2
DB2 Universal Database eServer Electronic Service Agent
Informix iSeries LoadLeveler
Lotus Magstar Micro Channel
OS/400 Parallel Sysplex POWER2
POWER3 POWER4 POWER4+
POWER5 POWERparallel PowerPC
PowerPC Architecture PowerPC 601 pSeries
Redbooks RISC System/6000 RS/6000
SP ThinkVantage Tivoli
TotalStorage WebSphere
Adobe and Acrobat are trademarks of Adobe Systems Inc.
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the
United States, other countries, or both.
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other
countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Linux is a registered trademark of Linus Torvalds in the United States and other countries.
Other company, product and service names may be trademarks or service marks of others.
xvi AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Duration: 5 days
Purpose
The purpose of this course is to add to the UNIX system
administrators skills the necessary information to install, customize,
and administer the AIX 5L Version 5.3 operating system.
Audience
Anyone responsible for the system administrative duties in
implementing and managing systems capable of running the AIX 5L
Version 5.3 operating system.
This course is targeted for SUN Solaris, HP-UX, or other UNIX system
administrators with at least twelve months experience in UNIX
administration and other relevant education.
Prerequisites
The students attending this course should have at least one year UNIX
system administration experience and be able to:
Write shell scripts
Install a UNIX operating system
Install and configure layered products
Startup and shutdown the system
Monitor system usage and performance
Create user accounts
Solve user and system problems
Create, configure, and backup file systems
Configure and manage networks
Objectives
On completion of this course, students should be able to:
Describe how to install the AIX 5L Version 5.3 operating system
Understand and use the system management tools
Install software bundles and filesets
Perform system startup and shutdown
Manage physical and logical devices
Perform file system management
Perform and restore system backups
Configure TCP/IP
Locate and analyze system error logs
Contents
Unit 1: System Hardware Overview
Unit 2: AIX 5L V5.3 Installation and Initial Configuration
Unit 3: System Management Tools and Documentation
Unit 4: Software Installation and Maintenance
Unit 5: Devices
Unit 6: ODM
Unit 7: System Boot: Hardware
Unit 8: System Boot: Software
Unit 9: The Logical Volume Manager
Unit 10: Storage Management with LVM
Unit 11: Managing File Systems
Unit 12: Paging Space
Unit 13: Backup and Restore
Unit 14: TCP/IP Configuration
Unit 15: Error Logs and syslogd
xviii AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Documentation References
The following will be used to indicate where a particular referenced document can be
located:
Info Center Indicates that a referenced document can be found in the AIX
Information Center. This is located at:
http://publib.boulder.ibm.com/infocenter/pseries
Redbooks Indicates that a referenced document can be found in the IBM
Redbooks Web site. This is located at:
http://www.redbooks.ibm.com
General product information can be found on-line at http://www.ibm.com.
pref Agenda
Day 1
Welcome
Unit 1 - System Hardware Overview
Exercise 1 - System Hardware Overview
Unit 2 - Installation and Initial Configuration
Unit 3 - System Management Tools and Documentation
Exercise 2 - System Management Tools and Documentation
Day 2
Unit 4 - Software Installation and Maintenance
Exercise 3 - Software Installation
Unit 5 - Devices
Unit 6 - The Object Data Manager (ODM)
Exercise 4 - The Object Data Manager (ODM)
Unit 7 - System Boot: Hardware
Exercise 5 - System Boot: Hardware
Day 3
Unit 8 - System Boot: Software
Exercise 6 - System Boot: Software
Unit 9 - The Logical Volume Manager (LVM)
Exercise 7 - LVM
Unit 10 - Storage Management with LVM (Topic 1)
Day 4
Unit 10 - Storage Management with LVM (Topics 2 and 3)
Exercise 8 - Storage Management with LVM
Unit 11 - Working with File Systems
Exercise 9 - Working with File Systems
Unit 12 - Paging Space
Exercise 10 - Paging Space
Unit 13 - Backup and Restore (Start)
Day 5
Unit 13 - Backup and Restore (Conclude)
Exercise 11 - Using backup and restore
Unit 14 - TCP/IP Configuration
xxii AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
All documents can be found in the AIX Information Center:
http://publib.boulder.ibm.com/infocenter/pseries
General product information can be found on-line at:
http://www.ibm.com
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Notes:
1-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
IBM System p5 Family
pSeries and iSeries hardware convergence at POWER5
Both support mix of AIX 5L, Linux, and i5/OS operating
systems
All support Advanced POWER Virtualization features
Entry systems: 1- to 4-way processor systems
p5-505, p5-520, p5-550
Mid-range systems: 2- to 16-way processor systems
p5-570
High end systems: 8- to 64-way processor systems
p5-575, p5-590, p5-595
g
Scalin
-way
1- to 64
s
p5-505 System p5-595
Notes:
Introduction
With the introduction of POWER5, the pSeries and iSeries LPAR-capable hardware
systems now use the same basic hardware platform, with the exception of the I/O
subsystem. The same HMC can be used for both iSeries and pSeries managed
systems.
The machine type and model numbers shown in the visual above are specific to the
Sserver p5 systems. There are differences between the Sserver p5 and Sserver i5
systems in packaging and licensing. Check the http://www.ibm.com Web site for the
most up-to-date information.
Not all system models support all three operating systems.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
IBM System p5 Servers Information
The system configurations and model numbers change
frequently
Complete details on
available systems
can be found on
this IBM Web site
Sample configurations
will be described on
the next few pages
http://www-03.ibm.com/systems/p/
Copyright IBM Corporation 2005
Notes:
Detailed information
The available systems that can be purchased are constantly updating. You can find
complete details on the servers and options at this Web site.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
p5-520 Overview
Rack-mount (19 4U)
Notes:
Introduction
The p5-520 is available in a deskside or rack-mount configuration. The rack-mount
system is 4U in height and may be mounted in the IBM RS/6000 7014 Model T00
Enterprise Rack, the IBM RS/6000 7014 Model T42 Enterprise Rack, or other standard
19 rack unit provided that the rack conforms to the EIA-310-D standard.
Eight hot-swap disk bays and six-hot swap PCI-X slots, and two Slimline media bays for
DVD-ROM and DVD-RAM, and one media bay for a tape drive are supported in the
system.
LPAR support
Up to 20 partitions are supported with the purchase of the Advanced POWER
Virtualization (feature code 7940 for the p5-520). Without this feature, dedicated
processors must be used, so a maximum of two partitions is supported.
1-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Memory DIMMs
Memory DIMMS must be installed in quads. Mixed capacities within a quad will result in
reduced reliability. A maximum of two sets of four is supported. Memory DIMMS must
be installed in certain slots; refer the Technical Overview redpaper for details and sizes.
System components
The symmetric multiprocessor (SMP) uses a 2-way, 64-bit, copper-based POWER5
microprocessor running at 1.65 GHz. The 2-way processor has 1.9 MB L2 cache and
36 MB of Level 3 cache.
The p5-520 contains up to 11 bays. There are four front-accessible, hot-swap-capable
disk bays in a minimum configuration, with an additional four hot-swap-capable disk
bays optional. Two of the remaining three bays can be used for a DVD-ROM and a
DVD-RAM, and the third bay can contain a tape drive.
The following integrated devices are also included:
- Six hot-swap 3.3v PCI-X slots
- Service processor
- Two 10/100/1000 Ethernet ports
- Two USB ports
- Dual ported internal Ultra320 SCSI controller with optional RAID adapter
- Hot-swap power and cooling (Redundant power is optional)
- Redundant cooling
- Two serial ports
- Two HMC ports
- Two remote I/O (RIO) ports
Disk drives
The following disk drives are available for the p5-520 as of August 2005:
- 73.4 GB 10,000 RPM Ultra320 SCSI Disk Drive
- 146.8 GB 10,000 RPM Ultra320 SCSI Disk Drive
- 300 GB 10,000 RPM Ultra320 SCSI Disk Drive
- 36.4 GB 15,000 RPM Ultra320 SCSI Disk Drive
- 73.4 GB 15,000 RPM Ultra320 SCSI Disk Drive
In manufacturing, the boot disk is placed in slot 8. If the system has one 4-pack
installed, disks are then filled in slots 7, 6, 5. If two 4-packs are installed, disks are filled
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Ethernet ports
The internal dual port 10/100/1000 Mbps RJ-45 Ethernet controller is integrated on the
system planar. Both ports must be allocated to the same partition.
Serial ports
The two serial ports are only available if the system is not being managed by an HMC. If
an HMC is connected, a virtual serial console is provided by the HMC (logical device
vsa0).
1-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
p5-570 Overview
Notes:
1-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
LPAR support
Up to 160 partitions, on a 16-way p5-570, is supported with the purchase of the
Advanced POWER Virtualization (feature code 7942 for the p5-570). Without this
feature, dedicated processors must be used, so a maximum of one partition per
physical processor is supported.
Memory
The minimum amount of memory per p5-570 system drawer is 2 GB. The maximum
using DDR1 memory DIMM technology is 512 GB (128 GB per drawer). Memory
DIMMS must be installed in quads where all four DIMMS are identical.
Racks
The system is 4U in height and may be mounted in the IBM RS/6000 7014 Model T00
Enterprise Rack or the IBM RS/6000 7014 Model T42 Enterprise Rack. For p5-570
configurations with 2, 3, or 4 drawers, all drawers must be installed together in the same
rack, in a continuous space of 8U, 12U, or 16U within the rack.
The design of the p5 model 570 is optimized for use in an IBM 7014-T00 or T42 rack.
Both the front cover and the processor flex cables occupy space on the front left side of
an IBM 7014 rack that may not be available in typical non-IBM racks. The SMP cables
were specifically designed to support seamless (4-way node) upgradability and future
concurrent maintenance features of these POWER5 systems.
The use of non-IBM racks may limit a customer's ability to exploit these ease-of-use,
upgradability and serviceability enhancements in the future.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
p5-590, p5-595 Overview
p5-590
8-, 16-, 24- or 32-way 1.65 GHz
processors
8 GB to 1 TB memory
Up to 8 I/O drawers
Up to 254 partitions
160 PCI-X slots
128 disks for (9.3 TB)
p5-595 differences
16 to 64-way 1.65 GHz or 1.9
GHz POWER5 processors
Up to 2 TB memory
Up to 12 I/O drawers
Rack-mount (24 42U)
Notes:
p5-590 Overview
The p5-590 uses an 8-, 16-, 24- or 32-way Multi-chip Module (MCM) symmetric
multiprocessing (SMP) design. It supports up to 254 partitions and up to 8 I/O drawers,
with the first one required. Mainframe-inspired RAS features on this system include
selective dynamic firmware updates, redundant service processor, and redundant
power subsystem with optional redundant battery backup. The p5-590 can be contained
in one or two system frames, depending on how many I/O drawers are installed.
p5-595 Overview
The p5-595 is similar to the p5-590, although it allows for greater scaling. The p5-595
uses an 16-, 24-, 32-, 40-, 48-, 56- or 64-way MCM SMP design. It also supports up to
254 partitions, but it can support up to 12 I/O drawers. The p5-595 also offers the option
of 1.9 GHz POWER5 processors. There are no physical differences between the
p5-590 backplane and the p5-595 backplane.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
MCM overview
POWER5 chips can be packaged in different ways such as multichip module (MCM),
dual chip module (DCM), or mounted on a system planar. MCMs are used as basic
building blocks on high-end SMPs such as the p5-590 and p5-595 systems. Each MCM
is an eight-way building block with four POWER5 chips (8 cores) and four L3 cache
chips each.
The IBM Sserver p5 590 and 595 Technical Overview and Introduction redpaper has
detailed information on the MCM design.
System frame
Both the p5-590 and p5-595 systems are based on the same 24-inch wide, 42 EIA
(42U) height frame. For additional capacity, either a powered or non-powered frame can
be configured for a p5-595. The second frame must be powered for systems with 48- or
64-way and more than 4 I/O drawer configurations.
I/O drawers
The I/O drawers provide internal storage and I/O connectivity to the system. The p5-590
and p5-595 use remote I/O drawers (4U) for directly attached PCI or PCI-X adapters
and SCSI disk capabilities. A minimum of one I/O drawer (FC 5791 or FC 5794) is
required per system.
Each I/O drawer is divided into halves which are powered separately. Each half
contains 10 blind-swap PCI-X slots (3.3 volt) and one or two Ultra3 SCSI 4-pack
backplanes for a total of 20 PCI slots and up to 16 hot-swap disk bays per drawer
(these adapters do not support external SCSI device attachments).
1-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
I/O drawers
These drawers, using the standard and optional RIO-2 ports, are supported by the
systems listed in the visual above.
1-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Example I/O Drawer
RIO-2 I/O Drawer - 7311-D20
Front
Op panel
2 six packs
of disks
Rear
Rack RIO-2
indicator port ports PCI-X slots
Copyright IBM Corporation 2005
Notes:
7311-D20 description
7311-D20 I/O drawers can be attached to the p5-520s using the standard RIO-2 ports.
A maximum of four RIO-2 I/O drawers and one RIO loop are supported on the model
520. The D20 is the only I/O expansion drawer option available for the p5-520.
This drawer is also supported by the p5-570. The 570 (if configured with 4 processor
drawers) supports up to 20 of these.
Disks are in six-packs of hot-swappable disks; 36.4, 73.4 or 146.8 GB in size.
There are seven 64-bit 133 MHz 3.3V hot-plug PCI-X slots.
The standard configuration of the drawer comes with one hot-pluggable power supply.
An optional redundant power supply may be configured.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Service Processor
Functions of the service processor
System initialization
Connection to the HMC
Web-based Advanced System Management Interface (ASMI) for
setting system flags
Hardware error detection
Connects to HMC over network
Notes:
Service processor
The service processor performs many vital Reliability, Availability, and Serviceability
(RAS) functions.
The service processor is an embedded controller that is based on a PowerPC 405GP
processor running the service processor internal operating system which contains
programs and device drivers.
1-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty activities, including console mirroring. The service processor can place calls to report
surveillance failures, critical environmental faults, and critical processing faults.
SPCN ports
There are two SPCN ports to control the power of the attached I/O subsystem. The
SPCN control software is run on the service processor along with the service processor
software.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Desktop Rack-mount
Notes:
HMC description
The HMC is a PC-based console that is available in a desktop or a rack-mount model. It
runs a customized version of Linux with a Java-based management application. The
user can only access the management application and no additional applications may
be installed. A second HMC may be connected to a single managed system for
redundancy. Multiple managed systems may be managed by a single HMC.
The HMC is required for systems running LPARs and is the same HMC that is used for
IBM Sserver i5 systems.
There are desktop and rack-mount models of HMCs, all with the machine type of 7310.
Desktop models have the model numbers C01, C02, C03, and C04 as of August 2005.
Rack-mount models have model numbers CR2 and CR3 as of August 2005. The
rack-mount model is a 1U, 19-inch rack-mountable drawer supported in the 7014 Model
T00 and T42 racks.
1-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
HMC Interface
Notes:
HMC interface
The HMC application is split into two window panes. The navigation pane on the left
side allows you to access the individual applications. The content pane on the right side
gives access to the application options.
In the visual above, the example shows the Server Management application which
allows you to create, configure, and manage partitions. In this example, the HMC is
connected to one managed system named lou. The managed system has three
partitions listed in the content pane, one of which is running. You can see other HMC
applications listed in the navigation pane.
1-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
IBM Sserver Cluster 1600
IBM
IBM
pSeries
server
IBM
HMC HMC
Notes:
Introduction
A cluster is made up of two or more interconnected servers, or logical partitions
(LPARs) of servers, which are aggregated together and managed as a single, unified
computing resource. The combined power of the cluster can be dedicated to a single,
very large corporate data warehouse. Relational database management software, such
as DB2 Universal Database or Oracle, are designed to take advantage of modular
cluster architectures to accommodate growth. Database capacity can easily be scaled
up incrementally and non-disruptively.
Cluster 1600
A Cluster 1600 can be built using the latest, most powerful IBM pSeries servers,
including the pSeries 690, 670, 655, 650 and 630.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CSM Cluster
With the release of AIX 5L Version 5.3 and CSM v1.4, the Sserver p5 servers p5-520,
p5-550, and p5-570 can be included in a CSM cluster. Many of these pSeries servers
can be logically partitioned, providing even more flexibility in the way computing
resources are mapped to applications.
Configuration options
New pSeries servers can e added to existing clusters which include RS/6000 SP
systems or RS/6000 servers for excellent investment protection.
1-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
High Availability Server Solutions
Duplicate Servers
Disk Subsystems
High Availability Software (HACMP)
Service Processor
Redundant Power and Cooling
AIX Operating System
Notes:
Introduction
Availability of hardware and software resources is critical to many enterprises, who
cannot afford for their applications (ERP, e-business, data warehouses, and so forth) to
be unavailable.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
What is a Partition?
Partition
Allocation of one systems resources to create logically
separate systems
Each partition is an independent operating environment
Notes:
Partition
When a computer system is subdivided into multiple, independent operating system
images, those independent operating environments are called partitions. The resources
on the system are divided up among the partitions. Applications running on a partitioned
system do not have to be redesigned for the partitioned environment.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Interconnect
Notes:
Introduction
This page defines physical partitioning which we will contrast with logical partitioning on
the next visual. IBM pSeries systems support logical partitions, not physical partitions.
PPARs
The visual shows an example of a system with three system building blocks, each made
up of a number of processors, an amount of memory, and a number of I/O slots. These
three building blocks can be configured into 1, 2, or 3 partitions each made up of one or
more entire building blocks. The size of the building blocks depends on the vendor and
system model.
1-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
ORDEMEP
Notes:
Implemented in firmware
The system uses firmware to allocate resources to partitions and manage the access to
those resources. While there are configuration rules, the granularity of the units of
resources that can be allocated to partitions is very flexible. You can add just a small
1-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty amount of memory if that is all that is needed without a dependency on the size of the
memory cards or without having to add more processors or I/O slots that are not
needed.
Firmware refers to underlying software running on a system independently from any
operating system. On Sserver p5 systems, this includes the software used by the
Flexible Service Processor (FSP) and the POWER Hypervisor.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Partition Characteristics
Each partition has its own:
Operating system
Licensed Internal Code (LIC) / Open Firmware
Console
Resources
And other things expected in a standalone operating
system environment:
Problem logs
Data (libraries, objects, file systems)
Performance characteristics
Network identity
Date and time
Notes:
Characteristics of a partition
The visual above illustrates how each partition is independent. As stated before, each
partition runs its own operating system. The version of the operating system may be
any valid version which is supported on the system. Other things you would expect on a
physically separate system are also separate for partitions; there are even independent
virtual consoles.
1-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Partition Resources
Resources are allocated to partitions
Memory allocated in units as small as the LMB size
Dedicated whole processors or shared processing units
Individual I/O slots
Including virtual devices
Some resources can be shared
Virtual devices
Some core system components are inherently shared
A = Adapter
M = Memory
P = Processor
Copyright IBM Corporation 2005
Notes:
Resources
Resources are the system components that are configured into partitions. The details of
the configuration rules for each resource will be covered in later units of this course.
The maximum number of partitions is related to the total amount of resources on the
system. For example, a system with 8 processors can be configured with a total of 80
partitions (if there are sufficient resources). If a system has enough resources, the
upper limit of the number of partitions is 254 on Sserver p5 systems.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Memory
Memory is allocated in units known as the Logical Memory Block (LMB). The default
LMB size is variable depending on the total amount of physical memory installed and
may be as small as 16 MB. A partition may be configured with as little as 128 MB of
memory or as much as all of the available memory.
Processors
A partition is configured with either dedicated whole processors or shared processors.
Shared processors are allocated in processing units. 1.0 processing units is equivalent
to the processing power of one processor. Partitions are configured with at least 0.1
processing units or with as much as the equivalent to all of the available physical
processors. After the 0.1 minimum is satisfied, additional processing units can be
allocated in quantities of 0.01 processing units.
I/O slots
I/O resources are allocated to partitions at the slot level. At minimum, you must
configure a partition with enough I/O resources to include the boot disk and a network
connection.
Shared devices
With software called the Virtual I/O Server installed in a special partition, Ethernet and
storage devices can be configured to be shared between partitions.
1-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Processors
Memory
I/O Slots
Notes:
Introduction
This visual above shows how a systems resources might be divided between four
partitions. With logical partitions, resources can be allocated based on computing
needs. You do not need to allocate all resources to partitions, that is, some resources
may remain unallocated until theyre needed.
1-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
IBM System p5 LPAR-capable Systems
IBM System p5 models LPAR-capable systems
p5-505 (9110-505)
p5-520 (9111-520)
p5-550 (9113-550)
p5-570 (9117-570)
p5-575 (9118-575)
p5-590 (9119-590)
p5-595 (9119-595)
Notes:
Introduction
This visual shows the IBM System p5 systems which support logical partitioning. The
p5 systems support AIX 5L and Linux, with certain models also supporting i5/OS.
p5 Express Systems
The IBM System p5 Express Systems are specially priced Value Pak offerings of
various system models which provide pre-configured solutions with financial incentives
for processor, memory and disk storage.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
1-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Managed System
Service
Processors
Processor
Memory Ethernet
LPAR
I/O Slots
Allocation
Tables
Notes:
Introduction
This picture brings together several concepts.
- Partitions are independent operating environments and their resources are
managed by the Hypervisor.
- NVRAM is used on the managed system to hold a copy of the partition configuration
so that if the HMC or the network were to fail, the partitions can continue to run and
even reboot if necessary.
- Partitions are configured and managed on the HMC which is a separate Linux PC
console. A copy of the partition configuration data is also kept on the HMC (in
addition to NVRAM).
- The HMC is connected to the managed system via an Ethernet connection to the
service processor. The service processor is a separate, independent processor that
1-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty provides hardware initialization during system load, monitoring of environmental and
error events, and maintenance support.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
This page lists the advanced partition features covered in the rest of this unit.
1-42 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Dynamic Partitioning (DLPAR)
DLPAR is the ability to add, remove, or move resources
between partitions without restarting the partitions
Resources
Processors, memory, and I/O slots
Add/remove virtual devices
Security and isolation between LPARs is not compromised
A partition sees its own resources plus other available
virtual resources
Resources are reset when moved
Applications may or may not be DLPAR-aware
Notes:
Dynamic partitioning
Dynamic partitioning refers to the ability to move resources between partitions without
shutting down the partitions. The opposite of dynamic partitioning is static partitioning,
where new configurations are only used when a partition is reactivated.
DLPAR operations do not weaken the security or isolation between LPARs. A partition
only sees resources that have been explicitly allocated to the partition, along with any
potential connectors for additional virtual resources that may have been configured.
Resources are reset when moved from one partition to another. Processors are
reinitialized, memory regions are cleared, and adapter slots are reset.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
DLPAR operations
You can add, remove, and move resources between partitions. The resources include
memory regions, processing units, and I/O slots. This can be accomplished from the
HMC application or via HMC command-line commands.
With virtual devices, you may add or remove them, but you cannot move them directly
from one partition to another. You can, however, dynamically change the configuration
that specifies what type of virtual adapter is in a virtual slot. Other partition options
which can be reconfigured dynamically will be covered later in this course.
1-44 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Processor Concepts
Logical
Shared
Dedicated
Inactive
(CoD)
Deconfigured
Physical
(Installed)
Notes:
Introduction
This visual summarizes the various concepts concerning POWER5 processors. Along
the bottom are whole, physical processors installed in the computer system. These are
configured in various ways into the three partitions.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Deconfigured
A physical processor may be automatically deconfigured from the system due to
detected errors or user deconfiguration.
Virtual processors
If you were to allocate 2.0 processing units to a partition, the partition may get bits of
execution time on up to 20 physical processors. This concept is known as virtual
processors.
Logical processors
If Simultaneous Multi-threading is enabled for AIX 5L Version 5.3, then each virtual
processor is utilized as if it were two processors.
1-46 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Micro-Partitioning
Time-sliced sub-processor allocations are dispatched
according to demand and entitled capacity
Physical
Processors
Partition 1
P P P P Partition 2
10ms
Partition 3
Partition 4
Partition 5
Partition 6
Partition 7
Notes:
Micro-Partitioning
Micro-Partitioning is defined as the ability to create a partition and allocate fractional
amounts of processing capacity to it.
Processing power may be allocated to partitions using dedicated processors or shared
processors. For shared processor partitions, processing power may be allocated in the
granularity of 0.01 processing units. A partition must have a minimum of 0.1 processing
units.
The visual above shows seven partitions being run on a processing pool of four physical
processors. The diagram represents a single 10 millisecond (ms) interval. Each
partition gets a percentage of the execution dispatch time on the processors in the pool,
based on its capacity assignment. Dont worry! Well come back to this later. This page
is here to give you some basic terminology until we reach the advanced processor topic
later in this course.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Virtual I/O
Each partition has virtual I/O slots
Configurable for each partition
Virtual slots can have a virtual adapter instance
Ethernet or SCSI
Can be dynamically added or removed just like physical
I/O slots
Cannot be dynamically moved to another partition
Notes:
1-48 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Virtual SCSI
The virtual SCSI option provides access to block storage devices in other partitions
(that is, device sharing). It uses the client/server model where the server exports disks,
logical volumes, or other SCSI-based devices, and the client sees the imported device
as a standard SCSI device.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Client/server relationship
Virtual I/O devices provide for sharing of physical resources, such as adapters and
SCSI devices, among partitions. Multiple partitions can share physical I/O resources
and each partition can simultaneously use virtual and physical (natively attached) I/O
devices. When sharing SCSI devices, the client/server model is used to designate
partitions as users or suppliers of resources. A server makes a virtual SCSI server
adapter available for use by a client partition. A client configures a virtual SCSI client
adapter that uses the resources provided by a virtual SCSI server adapter.
If a server partition providing I/O for a client partition fails, the client partition might
continue to function depending on the significance of the hardware it is using. For
example, if the server is providing the paging volume for another partition, a failure of
the server partition will be significant to the client.
1-50 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Virtual Ethernet
There are two main features to virtual Ethernet. One is the inter-partition virtual switch
to provide support for connecting up to 4,096 LANs. LAN IDs are used to configure
virtual Ethernet LANs and all partitions using a particular LAN ID can communicate with
each other.
The other feature is a function called Shared Ethernet adapter that bridges networks
together without using TCP/IP routing. This function allows the partition to appear to be
connected directly to an external network. The main benefit of using this feature is that
each partition need not have its own physical network adapter.
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction to CoD
CoD is a list of features which may be purchased for some of the Sserver p5 models.
The main bullets in the visual above list purchasing options. These options are
managed from the HMC and require a license key to activate.
Capacity CUoD requires a purchase agreement. Once processors or memory are
added, there is no ability to turn off the capacity. Processors are added in units of one
whole processor, and memory can be added in 1 GB increments.
Trial CoD is available for up to 30 days at no additional cost to allow testing and
emergency relief while the customer processes the purchase of permanent CUoD
resources.
On/Off CoD provides temporary additional processor or memory resources. Activity is
reported to IBM monthly and there must be an On/Off Capacity agreement.
1-52 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty Reserve CoD adds reserve processor capacity to the shared processor pool. There
must be a prepaid debit agreement for a set number of days and the customer is
charged when the workload uses more than 100% of the (non-CoD) base.
Reference
For more information, visit the IBM web site (www.ibm.com) and search for CoD or
use this link: http://www-1.ibm.com/servers/eserver/pseries/ondemand/cod/types.html
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Feature description
The Advanced POWER Virtualization feature provides:
- Shared processor pool and Micro-Partitioning
- Virtual I/O Server software for sharing virtual SCSI and Shared Ethernet adapters
- Partition Load Manager software for automating dynamic logical partitioning
operations based on system workload
At initial order entry, selecting the feature code will result in the enabling of
Micro-Partitioning during the manufacturing process and the additional software media
and publications will be shipped to the customer. When ordering the feature as an MES,
an activation key will be posted on an IBM Web site and the customer must retrieve it
and install it on the system. http://www.912.ibm.com/pod/pod is the IBM Web site.
Once the Virtualization feature is installed in a system, it cannot be removed.
1-54 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. There are a large number of current an past models of IBM POWER
based servers. Where is a good location to find information on the
available models?
Notes:
1-56 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Exercise: System Hardware Overview
Exercise 1
Notes:
Copyright IBM Corp. 2000, 2005 Unit 1. System Hardware Overview 1-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Summary
Notes:
1-58 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center AIX 5L Version 5.3 Installation Guide
Info Center AIX 5L Version 5.3 Release Notes
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
Notes:
2-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Installation Methods
CD-ROM
Preinstallation Option (for a new system order)
Network Installation Manager (NIM)
Ethernet
Token Ring
FDDI
Notes:
Required memory
In AIX 5L V5.2 and AIX 5L V5.3, 128 MB of RAM is required to install the Base
Operating System (BOS).
In AIX 5L V5.1, 64 MB of RAM is required to install the Base Operating System.
Platform type
Beginning with AIX 5L V5.2, the Common Hardware Reference Platform (CHRP) is the
only supported platform. Execute bootinfo -p to get your hardware platform and
bootinfo -y to see if you have a 64-bit or a 32-bit machine. A 64-bit machine can run
the 64-bit kernel as well as the 32-bit kernel.
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Media type
The contents of the CD-ROM is packaged in a file system format, thus the installation
process from a CD is carried out in a different format from the tape.
Preinstallation option
The preinstallation option is only valid if accompanied by a hardware order that includes
the preinstalled AIX.
2-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Installation Process
Insert CD in CD-ROM drive
Power on system
Press <F5>
Copyright IBM Corporation 2005
Notes:
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Console and Language Definition
Select your console
This message will be displayed in
different languages to:
NEXT:
Select the language
for installation
Notes:
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Installation and Maintenance Menu
At the Installation and Maintenance menu check all the
installation settings:
Type the number of your choice and press Enter. Choice indicated by >>>
88 Help ?
99 Previous Menu
>>> Choice [1]: 2
Notes:
Overview
To confirm or change the installation and system settings that have been set for this
system, type a 2 and press <Enter>. Select 88 to display help on this or any
subsequent installation screen.
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
The Installation Settings screen allows you to:
- Set the type of installation:
Migration
Preservation
New and Complete Overwrite
- Determine the installation disk
- Set the primary language environment
- Set more options
2-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Method of Installation
Option 1 of the Installation and Settings menu:
2 Preservation Install
Preserves SOME of the existing data on the disk selected for installation.
Warning: This method overwrites the usr (/usr), variable (/var), temporary
(/tmp), and root (/) file systems. Other product (application) files and
configuration data will be destroyed.
3 Migration Install
Upgrades the Base Operating System to current release. Other product
(application) files and configuration data are saved.
88 Help ?
99 Previous Menu
>>> Choice [2]: 1
Copyright IBM Corporation 2005
Notes:
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Preservation Install
Use the Preservation Install method when a previous version of BOS is installed on
your system and you want to preserve the user data in the root volume group. This
method removes only the contents of /usr, / (root), /var and /tmp. The Preservation
Install option preserves page and dump devices as well as /home and other
user-created file systems. System configuration has to be done after doing a
preservation installation.
Migration Install
Migration prior to AIX V4.2.1 is not supported. Use the Migration Install method to
upgrade an AIX V4.2.1 or later system to an AIX 5L version, while preserving the
existing root volume group. This method preserves all file systems except /tmp, as well
as the logical volumes and system configuration files. Obsolete or selective fix files are
removed. Migration is the default installation method for an AIX system running Version
4.x.
The installation process determines which optional software products will be installed.
2-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Installation Disks
Notes:
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
There are times when you may want to reuse a disk that previously contained some
sensitive material and you want to be sure that information is no longer accessible.
If this is an overwrite installation, you can specify to erase the disks chosen to be
installed before the installation occurs by typing 55 and pressing the <Enter> key for the
More Disk Options option shown on the previous visual.
2-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty This menu also prompts for the patterns to be used for each disk erasure. The patterns
are a choice of the hexadecimal values 00,a5,5a, or ff. For example, a pattern of 00 will
write all zeros to the drive. Erasing a drive is a time-consuming process and only drive
types that are supported by the diag command can take advantage of this option (for
example, erasure of IDE drives are not supported).
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Type the number for the Cultural Convention (such as date, time, and
money), Language and Keyboard for this system and press Enter, or type 106
and press Enter to create your own combination.
88 Help ?
99 Previous menu
Choice [1]:
Notes:
Overview
At this point in the installation process, you can change the language and cultural
convention that will be used on the system after installation. This screen might actually
display a number of language options, such as French, German, Italian, Byelorussian,
Ukrainian, and so forth.
It is recommended that if you are going to change the language, change it at this point
rather than after the installation is complete. Whatever language is specified at this
point is obtained from the installation media.
Cultural convention determines the way numeric, monetary, and date and time
characteristics are displayed.
The Language field determines the language used to display text and system
messages.
2-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Install Options for 32-bit Machines
Option 3 of the Installation and Settings menu:
Install Options
Either type 0 and press Enter to install with current settings, or type the
number of the setting you want to change and press Enter.
1 Desktop .................................................................... CDE
2 Enable Trusted Computing Base........................... No
3 Import User Volume Groups................................... Yes
4 Graphics Software..................................................... Yes
5 Enable System Backups to install any system...... Yes
(Installs all devices and kernels)
Notes:
Desktop
The screen shown is what is presented if running on a 32-bit hardware platform.
The first prompt is either:
- Installation Package Set for ASCII consoles
Options are Minimal or Default
- Desktop for graphical consoles
Options are CDE, Gnome, KDE, or NONE
The example in the visual has a graphical console.
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Graphics Software
The Graphics Software option is available in a New and Complete Overwrite
installation, as well as Preservation installation. It will install graphics software support.
2-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Install Options for 64-bit Machines
Option 3 of the Installation and Settings menu:
Install Options
Either type 0 and press Enter to install with current settings, or type the
number of the setting you want to change and press Enter.
1 Desktop..................................................................... CDE
2 Enable Trusted Computing Base........................... No
3 Enable CAPP and EAL4+ Technology.................... No
(English only, 64-bit kernel enablement, JFS2 file systems)
4 Enable 64-bit Kernel................................................. Yes
5 Create JFS2 File Systems........................................ Yes
6 Graphics Software.................................................... Yes
7 Enable System Backups to install any system...... Yes
(Installs all devices and kernels)
>>> 8 Install More Software
0 Install with the current settings listed above.
88 Help ?
99 Previous Menu
>>> Choice [8]: _
Copyright IBM Corporation 2005
Notes:
Introduction
If you are installing on a 64-bit hardware platform, the installation software detects that
and presents some additional installation options.
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Install More Software
Either type 0 and press Enter to install with current settings, or type the
number of the setting you want to change and press Enter.
88 Help ?
99 Previous Menu
Notes:
Overview
The Install More Software option is available in the New and Complete Overwrite
installation method, as well as the Preservation installation method. Select Install More
Software to choose additional software to install after the BOS installation process
finishes. A software bundle file corresponds to each selection that contains the required
packages and filesets.
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Begin Installation
Please wait . . . . . .
Notes:
Overview
The installation media contains information stored on it to determine the sizes that the
standard AIX file systems have. These are set large enough for the installation to
succeed but do not leave much free space after installation. You can dynamically
increase the size of any of the file systems once AIX has been installed. If you are
installing from a system image backup tape, the file systems created are the same sizes
and names as those on the system when the tape was created.
The files are restored from the media and then verified. This takes some time but can
be left unattended. After the BOS has installed, the appropriate locale optional program
will also be installed.
Once the installation has completed, the system automatically reboots from the newly
installed operating system on disk.
2-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Installation Flowchart - All Systems
Start the system
Change:
Installation Method
Select the console
Destination Disks
Language
Select language
Install Options:
Begin
Desktop
with default TCB
settings? 64-bit/JFS2 (64-bit platform)
no Graphics Software
Import User Volume Groups
Verify default install
Enable System Backups
method and settings
yes
Default yes Install More Software:
settings need to be Mozilla
changed? Kerberos_5
Server
no GNOME Desktop
Install from media KDE Desktop
Perform customization
Copyright IBM Corporation 2005
Notes:
Introduction
The flowchart in this visual summarizes the installation steps we have discussed.
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
After installing AIX, the operating system runs with default settings; one user (root), the
date and time set for where the system was manufactured, and other very general
settings. You probably want to change some or all of these settings. Also, you must
provide system and network information if you want to communicate with other
systems.
The Configuration Assistant and Installation Assistant provide step-by-step instructions
for completing each customization task. Examples of tasks that can be performed are
setting the system date and time, setting root's password and configuring the network.
Complete the tasks in the order that the Configuration Assistant / Installation Assistant
lists them. It is helpful to complete all customization tasks before you use your system.
If using a graphics terminal for the installation, the newly installed BOS reboots and
starts the Configuration Assistant, which guides you through completing customization
2-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty tasks. When you use the Configuration Assistant immediately after BOS installation,
you have at first to accept the license agreement and only the tasks that apply to your
type of installation will be shown.
If an ASCII terminal was used for the installation, an ASCII-based Installation Assistant
is displayed instead. Both the graphics-based Configuration Assistant and the
ASCII-based Installation Assistant provide comparable support.
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. AIX 5L can be installed from which of the following:
(select all that are correct)
a. CD-ROM
b. Diskette
c. 4 mm tape
Notes:
2-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Unit Summary
Notes:
Copyright IBM Corp. 2000, 2005 Unit 2. Installation and Initial Configuration 2-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center AIX 5L Version 5.3 System Management Concepts:
Operating System and Devices (Chapter 13)
Info Center AIX 5L Version 5.3 System Management Guide:
Operating System and Devices
Info Center AIX 5L Version 5.3 Web-based System Manager
Administration Guide
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Describe the benefits of the system management tools
available with AIX 5L V5.3
Discuss the functionality of SMIT
Explain how SMIT activity is logged
Describe the process to install the Information Center
Use the Information Center to browse and search AIX
documentation
Describe the steps to install and configure the Web-based
System Manager
Use the Web-based System Manager to manage AIX
Notes:
3-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 3-2. Topic 1 Objectives: System Management Interface Tool (SMIT) AW185.0
Notes:
3-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
AIX Administration
Web-based
SMIT System
Manager
High-Level Commands
Low-Level Intermediate-Level
Commands Commands
Notes:
Overview of SMIT
The System Management Interface Tool (SMIT) provides a menu-driven interface that
provides access to most of the common system management functions within one
consistent environment.
SMIT does not perform any system management functions directly. It is a user interface
that constructs high-level commands from the user's selections and then executes
these commands on demand. Those commands could be entered directly by the user
to perform the same tasks.
SMIT does not cover every possible system management task, and occasionally there
will be a need to run AIX commands or edit ASCII files directly to complete a particular
system administration task. However, SMIT does make the most frequent or
complex/tedious tasks much easier with a greater degree of reliability.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Types of commands
The following classification of commands may be helpful in understanding the operation
of SMIT:
- High-level commands -These are standard AIX commands (either shell scripts or C
programs) which can also be executed by a user. They execute multiple low-level or
intermediate-level commands to perform the system administrative functions. SMIT
constructs high-level commands from the user's selections and then executes these
commands on demand.
- Intermediate-level commands - These commands interface with special AIX
components such as the System Resource Controller and the Object Data Manager.
(These commands are rarely executed directly by a user.)
- Low-level commands - These are AIX commands which correspond to AIX system
calls or kernel services. (They are not normally executed directly by a user.)
3-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
System Management Interface Tool (SMIT)
ASCII or AIXwindows (Motif) User Interface Components
menu help
submenu help
submenu
help
name selector
list
help
pop-ups dialog panel
list
output panel
Copyright IBM Corporation 2005
Notes:
Available interfaces
SMIT provides a flexible user environment. The user can use an ASCII or an
Xwindows-based interface. These interfaces provide the same facilities, but the
interaction is slightly different.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
3-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
SMIT Main Menu (ASCII)
# smit
System Management
Notes:
Use of keys
In the ASCII mode, in order to select from the menus, you have to use the up and down
arrow keys. This moves a highlighted bar over the menu items. Press <Enter> to select
the highlighted item.
You can also use some of the keyboard function keys to perform other functions, such
as exiting SMIT or starting a shell.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
3-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
SMIT Main Menu (Motif)
Notes:
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
3-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Dialog Screen
Schedule a Job
[Entry Fields]
YEAR [05] #
MONTH [Jun] +
DAY (1-31) [22] #
* HOUR (0-23) [] #
* MINUTES (0-59) [] #
SHELL to use for job execution Korn (ksh) +
* COMMAND or SHELL SCRIPT (full pathname) []
Notes:
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Entering data
To enter data, move the highlighted bar to the value you want to change. Then, either
enter a value or select one from a pop-up list. Fields that you can type in are indicated
by square brackets [ ]. Fields that have data that is larger than the space available to
display it are indicated by angle brackets < >, to indicate that there is data further to the
left or right (or both) of the display area.
Special symbols
Special symbols on the screen are used to indicate how data is to be entered:
* This is a required field
# A numeric value is required for this field
/ A pathname is required for this field
X A hexadecimal value is required for this field
? The value entered will not be displayed
+ A pop-up list or ring is available
An * symbol in the leftmost column of a line indicates that the field is required. A value
must be entered here before you can commit the dialog and execute the command.
In the ASCII version, a + is used to indicate that a pop-up list or ring is available. To
access a pop-up list, use the F4 key. A ring is a special type of list. If a fixed number of
options are available, the Tab key can be used to cycle through the options.
In the Motif version, a List button is displayed. Either click the button or press <Ctrl-l>
to get a pop-up window to select from.
3-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty F8 (or ESC-8) Image - save the current screen to a file (A) and show the
current fastpath
F9 (or ESC-9) Shell - start a sub-shell (A)
F9 Reset all fields (M)
F10 (or ESC-0) Exit - exit SMIT immediately (A)
F10 Go to command bar (M)
F12 Exit - exit SMIT immediately (M)
Ctrl-l List - give a pop-up list of possible values (M)
PgDn (or Ctrl-v) Scroll down one page
PgUp (or ESC-v) Scroll up one page
Home (or ESC-<) Go to the top of the scrolling region
End (or ESC->) Go to the bottom of the scrolling region
Enter Do the current command or select from a single-selection
pop-up list
/text Finds the text in the output
n Finds the next occurrence of the text
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Output Screen
Command: OK stdout: yes stderr: no
[TOP]
UID PID PPID C STIME TTY TIME CMD
root 1 0 4 20:15:04 - 1:49 /etc/init
root 1719 1 0 20:16:14 - 0:10 /etc/syncd 60
root 2003 1 0 20:16:19 - 0:00 /etc/srcmstr
root 2233 1 0 17:16:14 - 0:00 /usr/lib/errdemon
ray 3525 1 0 20:01:28 0 0:00 -ksh
root 3806 2003 0 19:16:23 - 0:00 /etc/syslogd
ray 4162 3525 6 20:53:22 0 0:04 smit
root 5355 1 0 20:16:27 - 0:12 /etc/cron
root 6649 2003 0 20:16:32 - 0:00 qdaemon
ray 7303 4162 8 20:09:45 0 0:00 ps -ef
[MORE...6]
Notes:
3-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
SMIT Log and Script Files
smit.log
Audit log
entries
SMIT
smit.script
List of
commands
$HOME/smit.log
Keeps a log of all menu and dialog screens visited, all
commands executed and their output. Also records any errors
during the SMIT session.
$HOME/smit.script
Shell script containing all AIX commands executed by SMIT.
Notes:
Overview
SMIT creates two files in the $HOME directory of the user running SMIT. If these files
already exist, then SMIT will append to them. These files can grow quite large over
time, especially during software installations, so the user must maintain them and
truncate them when appropriate.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
3-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
smit Command Options
General syntax:
smit [-options] [ FastPath ]
Notes:
Introduction
The command smit is used to invoke SMIT. It is not particularly common to run smit
with any options, although a number of them do exist. Some of the more commonly
used options will be described here.
Using a fastpath
Using a SMIT fastpath can be very helpful. Fastpaths are names that specify individual
screens within SMIT. If you want to by-pass the menu system and go straight to a
particular screen, use the command smit fastpath. When using SMIT, you can view
the fastpath screen name (for the current screen) by pressing F8 (or Esc+8) - Image.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
3-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Lets Review
1. Specify the SMIT function keys that can be used for the
following:
a) List the command that will be run: ____
b) List the screen name which can be used for the
fastpath: ____
c) Take a screen image: ___
d) Break out into a shell: ___
e) Return to the previous menu: ___
2. Specify two ways you can request the ASCII character
version of SMIT from an X-windows environment
command prompt:
________________
________________
Notes:
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
3-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Topic 2 Objectives:
Configuring AIX Documentation
After completing this Topic, you should be able to:
Use the Information Center to browse and search AIX
documentation
Describe the process to install the Information Center
Notes:
Introduction
The AIX documentation library is available from two sources; the installable AIX
Information Center, and the IBM AIX Information Center that is available on the external
web. The web-based IBM AIX Information Center contains the latest AIX information.
This external Information Center is available at the following URL:
http://publib16.boulder.ibm.com/pseries/index.htm. You will be prompted for your
geographical region, language, and AIX release level.
This topic covers the installation and configuration of the information center.
3-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Configuring AIX 5L V5.3 Documentation
Documentation Server
AIX 5L V5.3 softcopy documentation
Information Center runtime environment Documentation Client
Web browser software Web browser software
Documentation Client
Web browser software
Notes:
Overview
In addition to providing SMIT to make system administration tasks easy, softcopy
documentation can be loaded on a documentation server. Any other computer in the
network with appropriate Web browser software (for example, the Netscape Navigator)
can then become a documentation client.
When users on a client computer request an AIX document, the request is sent to the
Web server on a documentation server which then sends back the requested item.
When searches are performed, they are done on the server computer and the results
are then sent back to the user on the client computer.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Configuration steps
The steps outlined above are used to configure an AIX 5L V5.3 documentation server or
online documentation for a standalone pSeries system.
1. Configure TCP/IP on the AIX system. This is discussed later in the course.
2. Install the Web browser software. The Mozilla web browser for AIX is available on a
CD that can be ordered with AIX. It is Mozilla for AIX. It can also be downloaded
from the Web site: http://www.ibm.com/servers/aix/browsers
3. Install the AIX documentation. AIX provides a separate 2 CD set AIX 5L V5.3
Documentation (5765-G03). It contains the full AIX documentation library in many
different languages. The package names are of the format: infocenter.aix.[lang].
For example you may choose to install: infocenter.aix.EN_US. You may choose
between several categories of documentation within the package.
3-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty 4. Install the Information Center run-time environment. On the same AIX 5L V5.3
Documentation CD, there is a fileset: infocenter.aix.rte. This will provide the eclipse
based web server engine and documentation access application.
5. Configure the Documentation Services. This is typically done through SMIT and is
covered next.
6. The AIX 5L V5.3 Documentation includes System Users Guides, Installation
Guides, System Management Guides, Programming Guides, Product and
Application Documentation, and References and Technical References. This
documentation can be installed to disk.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
DEFAULT_BROWSER = [mozilla]
IC_DOCUMENT_SERVER_MACHINE_NAME = [sys103]
IC_DOCUMENT_SERVER_PORT = [64111] #
IC_DOCUMENT_SERVER_TYPE = DOCSERVER +
IC_DOCUMENT_DIRECTORY = /opt
Notes:
Introduction
Use the SMIT fastpath smit change_documentation_services to access this menu.
This menu is also accessed via the System Environments option on the main SMIT
menu. Choose the option Change/Show Documentation Services.
The Web-based System Manager can also be used to configure the AIX 5L V5.3 online
documentation.
Menu fields
The IC_DOCUMENT_SERVER_MACHINE_NAME should be set to the host name of
the documentation server machine. If acting as both the client and the server, this would
be set to your own hostname.
3-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The IBM Eserver pSeries Information Center is a Web application that serves as a
focal point for all information pertaining to pSeries and AIX. It provides access to the
with AIX 5L V5.3 documentation, as well as access to a message database to search
on error numbers, identifiers and LEDs. FAQs, How-Tos, and many more features are
provided.
3-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty On any AIX 5L V5.3 system with the Information Center installed and configured, you
can access it by:
- Running the command infocenter from the command line. This command starts
the default browser with the URL defined by your configuration.
- Starting the Information Center with the Information Center icon located on the
Help panel of the CDE desktop.
Once in the Information Center, you are presented with a main Web page which has a
variety of hyperlinks to get to the many sources of information. Some links are to Web
sites on the Internet (in the main panel). Others are to the documentation installed on
the Information Center server (in the Contents panel on the left).
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
The contents list in the left panel of the Web page has categories of documents that you
can access. You can repeat clicking on these to drill down to the individual document
you are interested in reading. As you narrow it down, the appropriate collection of
documents or manuals appears in the main panel.
The main panel has three documents you may access for each manual. The HTML
Web pages, an abstract, and the PDF file. Use the PDF file if you wish to either print all
or some of the manual or if you wish to download it to your PC for future offline access.
3-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Information Center Search
Notes:
Overview
The Information Center has a search engine which examines the documents to find the
one with information you seek. Entering a search string in the Search field and clicking
Go generates a list of search results ordered by relevance. Clicking the item you think is
the best selection causes the Web page for that section to appear in the main window.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Lets Review
Notes:
3-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Topic 3 Objectives:
Web-based System Manager
After completing this Topic, you should be able to:
Describe the steps to install and configure the Web-based
System Manager
Use the Web-based System Manager to manage AIX
Notes:
3-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Web-based System Manager
PC or Linux
Remote Client
Client-Server
# wsm -host <managed-host>
Copyright IBM Corporation 2005
Notes:
Introduction
The Web-based System Manager (WebSM) was the next step in the evolution of AIX
system administration tools. There have been many enhancements to the Web-based
System Manager since AIX 5L V5.1. It is considered the default system administration
tool for AIX 5L.
The Web-based System Manager can be run in standalone mode, that is, you can use
this tool to perform system administration functions on the AIX system you are currently
running on.
The Web-based System Manager also supports a remote management. In this
environment, it is possible to administer an AIX system from a remote PC or from
another AIX system using a graphics terminal. In this environment, the AIX system
being administered is the server and the system you are performing the administration
functions from is the client.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Client requirements
Supported Microsoft Windows clients for AIX 5L V5.3 are:
- Windows 2000 Professional version
- Windows XP Professional version
- Windows Server 2003
Supported Linux clients are PCs running:
- Red Hat Enterprise Version 3
- SLES 8 or SLES 9
- Suse 8.0, Suse 8.1, Suse 8.2, and Suse 9.0 using desktops KDE or GNOME only
The PC Web-based System Manager Client installation needs a minimum of 300 MB
free disk space, 512 MB memory (1 GB preferred) and a 1 GHz CPU.
To download Web-based System Manager Client code from an AIX host, use the
address: http://<hostname>/remote_client.html
3-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Accessing the Web-based System Manager
Standalone mode:
# wsm
Client-server mode:
From the AIX 5L client:
# wsm -host <managed-host>
Applet mode:
Point your browser to:
http://<managed-host>/wsm.html
Notes:
Introduction
The Web-based System Manager can be configured to run in several different modes.
The operating environments in which Web-based System Manager can be started are
standalone application, client-server, applet, and remote client.
Standalone mode
To access the Web-based System Manager from the command line, use the wsm
command.
To start the Web-based System Manager console from the Common Desktop
Environment (CDE), do the following:
1. Select the Application Manager icon in the CDE front panel
2. Select the System_Admin icon
3. Select the Management Console icon
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Client-server mode
You can manage your local machine or machines that have been configured for remote
management from the Web-based System Manager console. You can select a different
host than your local machine as the managed host. To do this, use the following
command: /usr/websm/bin/wsm -host [managed-host]. The managed host you
specify as [managed-host] displays under the Navigation Area as the first name under
the list of hosts that can be managed. This host is also used to load the Web-based
System Manager user preference file ($HOME/WebSM.pref). Using the -host
argument displays the console to the machine you are using, but uses the preferences
file of the remote host you specify.
Applet mode
In applet mode, point your browser to: http://<managed-host/>wsm.html. The
managed-host is the machine that contains the Web-based System Manager
application.
In applet mode, you can only manage a set of machines that have the same version of
Web-based System Manager installed.
Be aware that AIX 5L V5.1 is using Java 1.3.0, AIX 5L V5.2 is using Java 1.3.1, and
AIX 5L V5.3 is using Java 1.4.2. Your browser plug-in-version must be compatible to the
Java version on the AIX server.
3-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Console window
The visual shows the Web-based System Manager Console window containing two
primary panels. The panel on the left displays the machines that you can manage from
the Console window. This panel is referred to as the Navigation Area. The panel on the
right (the Contents Area) displays results based on the item selected in the Navigation
Area. You select the machine to perform management operations from the Navigation
Area. As you navigate to the desired operation in the Navigation Area, the Contents
Area is updated to show the allowable choices.
Session log
There is a session log that is a facility of the console. It keeps track of changes made on
managed hosts during a Web-based System Manager session. To view the session log,
select Console -> Session Log.
3-42 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Using the Web-based System Manager (2 of 3)
Notes:
Toolbar functions
The visual shows a Web-based System Manager window with the System
Environment: Settings plug-in running in the Contents area. Above the Navigation
Area and Contents Area, there is a toolbar with symbols for managing the window.
From left to right, the symbols support the following functions: Back to previous screen,
Forward to next screen, Up one level, Stop reloading, Reload now, Shutdown,
Broadcast message, Find, Show properties of highlighted object, Icon (to return to icon
mode if currently viewing details), Details (which lists each icon and provides an
explanation of each). Most of these functions can also be accessed via the View option
on the menu bar.
Date/Time icon
If you select the Date/Time icon, this allows you to set the date and time on the system.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
Note that the Web-based System Manager supports an easy-to-use point-and-click
environment where information can be entered. Use this window to set the system date
and time (only the root user can perform this function). When finished, click OK to apply
your change.
Additional information on the Web-based System Manager can be accessed through
the Internet using the URL: http://www-1.ibm.com/servers/aix/wsm/ .
3-44 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Installation for a Remote Client
Install the Web-based System Manager (usually done by
default with the base)
Install an HTTP server:
IBM HTTP Server (IHS2) on AIX 5L V5.3 Expansion Pack
Configure the HTTP server (more detail on the next visual)
configassist
Test the HTTP server with a browser
Enable the Web-based System Manager server:
# /usr/websm/bin/wsmserver -enable
Install the Web-based System Manager client on Windows
or Linux platforms (more detail coming up)
Notes:
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
If Web-based System Manager is installed, you will see output similar to the following:
# lslpp -h sysmgt.websm.framework
Fileset Level Action Status Date Time
------------------------------------------------------------------------
Path: /usr/lib/objrepos
sysmgt.websm.framework
5.3.0.0 COMMIT COMPLETE 05/18/05 13:39:50
5.3.0.10 COMMIT COMPLETE 05/18/05 13:45:00
Path: /etc/objrepos
sysmgt.websm.framework
5.3.0.0 COMMIT COMPLETE 05/18/05 13:44:07
The following optional filesets can be installed to add additional functionality to
Web-based System Manager. They are not installed by default.
- sysmgt.msg.Locale Language.websm.apps
Enables the locale language to be used if the LANG environment variable is set or if
the -lang argument is used with the wsm command.
- sysmgt.websm.security
Adds support for Secure Socket Layer communication between client and server.
This fileset supports 40-bit encryption and is available on the Expansion Pack.
- sysmgt.websm.security-us
Adds support for Secure Socket Layer communication between client and server.
This fileset supports 128-bit encryption and is available on the Expansion Pack.
Export and import laws could make this fileset unavailable in some countries.
3-46 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
3-48 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Remote Client Installation
Notes:
Installation options
To install the Web-based System Manager remote client on a PC running Windows or
Linux, access the AIX Web Server from the client's browser, with the URL of:
http://<managed-host>/remote_client.html
The Web page provides two options for installation of remote client software:
- InstallShield
- Java Web Start (beginning with AIX 5L V5.2.3.0)
The InstallShield is pretty straightforward. It downloads the code and installs using the
InstallShield standard.
The advantage of Java Web Start is that every time the client application runs, it
checks to see if there is a remote server application software update and automatically
downloads the changes.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
3-50 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
HMC Management
Hardware Management Console (HMC)
Partition configuration and control
Dynamic partitioning for LPARs (AIX 5L V5.2 and later)
Capacity Upgrade on Demand (CUoD)
Diagnostics
Operational management
IBM
Remote HMC control
IBM
Notes:
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Diagnostics
A challenge faced with the pSeries system running LPARs is standard AIX error
handling. The HMC interacts with each active partition to handle problem determination
functions.
Operational management
Once your partitions are active, the HMC continues to function as a management
platform, handling operational tasks.
3-52 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Remote Access to the HMC
3
SSH access
to HMC
HMC commands
Network
2
Windows, Linux,
or AIX client via
the Web-based
System Manager Alternate
1 HMC
Notes:
Overview
It is often desirable to be able to access the HMC from a remote workstation. This is
especially true when the managed system is a Power4 platform where the HMC is
required to be physically close to the managed system.
Remote operation is possible using a Web-based System Manager graphic interface or
using line commands via a Secure Shell facility. The Web-based System Manager client
may be another HMC, an AIX system running the Web-based System Manager, or a
Linux/Windows platform with the Remote Client software installed.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
remote client and to access the HMC each time). The Web-based System Manager
client can be loaded from the AIX standard distribution software or directly from the
HMC for Windows PCs and Linux (on Intel) workstations. To install the client on
Windows PCs and Linux workstations from the HMC, open a Web browser to the
following Web address where hmc-hostname is the actual hostname of the HMC:
http://hmc-hostname/remote_client.html
3-54 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
HMC Application Groups
Menus
Application
Groups and
Navigation Window Applications
Contents Window
Status
Notes:
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. The S______ M__________ I_________ T____ provides a
menu-driven interface that can help in the administration of
AIX 5L systems.
2. Which of the statements are true regarding the Web-based
System Manager?
a) An AIX 5L system can be managed from a remote PC
with appropriate JAVA and Web-browser code installed.
b) In standalone mode, use the wsm command to access
the Web-based system manager.
c) It is possible to manage an AIX 5L system from a
remote AIX 5L system using an ASCII terminal.
____________________________________________
____________________________________________
____________________________________________
____________________________________________
Notes:
3-56 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Exercise: System Administration Tools
Exercise 2
Notes:
Introduction
The exercise can be found in your Student Exercise Guide.
Copyright IBM Corp. 2000, 2005 Unit 3. System Management Tools and Documentation 3-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Summary
Most system administration tasks can be completed using either the ASCII
or graphical (Motif) version of SMIT
SMIT provides logging of activities and generated commands
SMIT has useful fastpaths for bypassing the menu structures
Web-based documentation can be installed locally
The Information Center interface provides a way to read, search or print the
installed manuals
The Information Center interface provides links to useful IBM support sites
Remote access to an Information Center server is possible via any Web
browser
The Web-based System Manager supports system administration tasks in
a standalone or client-server environment
The Web-based System Manager can be used either locally or remotely
from either another Web-based System Manager installed AIX platform or a
PC with the Web-based System Manager application
Remote access may be enabled or disabled
Notes:
3-58 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center AIX 5L Version 5.3 Installation Guide
Info Center AIX 5L Version 5.3 Release Notes
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Define the package definitions and naming conventions
Identify how software products and updates are installed
and managed on the system
Notes:
4-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
AIX Product Offerings
AIX
LPPs
AIX documentation
Expansion Pack
Bonus Pack
Web Download Pack
Notes:
Introduction
The AIX 5L operating systems are delivered on multiple CDs. During the ordering
process, it is necessary to indicate the system type.
Licensed Program Products (LPPs) are separately orderable products that will run on
the AIX operating system.
The contents of the Expansion and Bonus Packs vary over time. Their purpose is to
acquaint users with tools and products that may be valuable in their business
environment.
For more details on either the Expansion Pack or the Bonus/Web Download Pack go to:
http://www.ibm.com/servers/aix/expansionpack
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Expansion Pack
An Expansion Pack is included with every new order of AIX at no additional charge
when media is selected, or can be ordered separately for existing AIX licenses. Typical
releases may include: database software, development tools, software supporting
e-business, interoperability support, browsers, Java and Internet application
development tools, network management utilities, and country-specific security
encryption.
AIX documentation
The AIX 5L V5.3 documentation comes in a 2 CD set. It contains the full AIX
documentation library in many different languages, in addition to the infocenter run time
environment.
4-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Packaging Definitions
LPP: Collection of packages
bos Complete product
package: package:
Collection of filesets
bos.INed bos.adt
Notes:
Package
A package contains a group of filesets with a common function. It is a single, installable
image.
Fileset
A fileset is the smallest individually installable unit. It is a collection of files that provides
a specific function. For example, bos.net.tcp.client is a fileset in the bos.net package.
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Bundles
A bundle is a collection of packages and filesets suited for a particular
environment
Predefined system bundles in AIX 5L V5.3 include:
AllDevicesKernels
Alt_Disk_Install
App-Dev
CC_Eval.Graphics
CDE
GNOME
Graphics
KDE
Kerberos_5
Media-Defined
Mozilla
PerfTools
Server
cas_client and cas_server
devices
Infocenter
openssh_client and openssh_server
wsm_remote
Copyright IBM Corporation 2005
Notes:
Overview
Since there are thousands of filesets, having to determine which individual fileset you
want on your machine could be a time-consuming task. AIX has bundles which offer a
collection of filesets that suit a particular purpose. For example, if you are developing
applications, the App-Dev bundle would be the logical choice to install.
Some filesets within a bundle will only be installed if the prerequisite hardware is
available. For example, a graphic adapter is needed to run AIXWindows.
In some cases, bundles are equivalent to product offerings. Often, however, they are a
subset of a product offering or a separate customized bundle. The bundles available
may vary from configuration to configuration and AIX version to AIX version.
4-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Fileset Naming
bos.terminfo.print.data
Message convention:
LPP.msg[.lang].package.fileset
Notes:
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
4-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Software Updates
# oslevel
5 . 3 . 0 . 0
Notes:
Introduction
As new software is created for AIX, you want to upgrade your system to maintain the
latest features and functionality.
The numerical information that shows what level of software you currently have
installed is broken into four parts:
- Version
- Release
- Modification
- Fix
You can see this using the oslevel command.
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Types of upgrades
When you want to upgrade the system, how you do it depends on what type of upgrade
you are performing. Changes to the version or release levels require you to perform a
migration installation as discussion in the AIX 5L V5.3 Installation unit. If you want to
make a change to the modification or fix levels, use the smit update_all command.
These changes provide fixes to defects or additional functions to the BOS or optional
software products.
Version and release upgrades must be purchased. Modification and fix-level upgrades
are available at no charge. They are provided on CD (order via AIX Support Center) or
they can be downloaded from the Web. AIX updates are available at
http://www.ibm.com/servers/eserver/support/pseries/aixfixes.html. This Web site will be
discusses in more detail later in this unit.
4-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Software States
Applied:
FILESET 5.3.0.3
(New Version)
FILESET 5.3.0.1
Commit
Install or
5.3.0.3 (Old Version)
Reject
Applied FILESET 5.3.0.1
FILESET 5.3.0.3 (Old Version)
Committed:
Committed
Install FILESET 5.3.0.3
5.3.0.3
Notes:
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
The applied state gives you the opportunity to test the newer software before
committing to its use. If it works as expected, then you can commit the software which
will remove the old version from the disk.
If the newer version is causing a problem, you can reject it which removes the newer
version and recommits the old version.
4-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Software Installation and Maintenance
Software Installation and Maintenance
Notes:
Overview
Use the SMIT fast path smit install to access the Software Installation and
Maintenance menu.
You can also use the Web-based System Manager to install software.
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Install Software
Update Installed Software to Latest Level (Update All)
Install Software Bundle
Update Software by Fix (APAR)
Install and Update from ALL Available Software
Notes:
Introduction
Use the smit install_update fast path to access this menu.
Install Software
This option allows you to install or update to the latest level of software available on the
installation media. This allows you to install everything on the installation media if so
desired. This is most commonly used to install optional software not currently installed
on you system.
4-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Install Software
Install Software
Notes:
Introduction
The SMIT Install Software dialog screen allows you to install all or selected software
from the installation media. If any updates exist for these products, they are also
installed.
To perform an update_all, the SMIT screen will be identical except in the SOFTWARE
to install line you will see [update_all].
The input device is usually CD-ROM, tape or diskette. However, it is also possible to
install software that has already been loaded to disk. The directory
/usr/sys/inst.images can be used for this purpose.
4-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
PREVIEW only?
The PREVIEW only? option allows you to preview the results of the installation without
actually performing the software install. The system displays information on space
requirements and a list of software products and updates that are installed.
License agreements
Beginning with AIX 5L V5.1, software license agreements are shipped and displayed
electronically, saving paper and allowing for electronic software distribution in the
future. If a product has an electronic license agreement, it must be accepted before
software installation can continue.
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Software Inventory
# smit list_installed
List Installed Software and Related Information
lslpp command:
-L Lists the installed software
-h Shows the history of a software product
Copyright IBM Corporation 2005
Notes:
Introduction
Use the SMIT fast path smit list_installed to access the List Installed Software
and Related Information menu. This menu provides information about the software
and fixes installed on a system.
Most of the SMIT options on this menu actually execute the lslpp command. The
following command options can be used to view specific software information:
-l Displays the name, level, state and description of the fileset
-h Displays the installation and update history for the fileset
-p Displays requisite information for the fileset
-d Displays dependent information for the fileset
-f Displays the names of the files added to the system during installation of the
fileset
-w Lists the fileset that owns a file
-b List software for the specified bundle name
4-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
List Installed Software
# lslpp -l "bos.*"
Notes:
Overview
The lslpp command is used to list the installed software on the system. The various
options of the lslpp command allow you to view selected information on the software
installed.
The output of the lslpp command displays the fileset name, the level of the product, its
state (applied or committed), and a description of the product.
Other options include:
-d Displays filesets that are dependents on the specified software
-f Displays names of files added to the system during the installation of specified
filesets
-p Lists requisite information for a specified fileset
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Fix Repository
Available updates
(from IBM Web site)
Fix repository
(locally stored Installed fixes
filesets)
Notes:
Overview
When working with modifications or fixes, it is common to download the fixes to a
directory on your local hard drive before installation. This location is commonly referred
to as the fix repository.
While /usr/sys/inst.images is a standard location for storing software images and will
appear in the SMIT Input Device/Directory (F4) list, you may choose to use any
directory for this purpose.
Managing the fix repository includes knowing how up to date it is relative to what is
available and what in the repository has been installed.
AIX provides a reporting facility to compare the installed software, repository software
and IBM website available software. Any two of these can be compared to obtain a
report.
4-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Fix Central Website
Notes:
Introduction
IBM Eserver support provides a website interface (Fix Central) to access fix
information. Two ways to navigate to this Web page are:
- Via Fix Central at www.ibm.com/eserver/support/fixes
Identify the Server as pSeries and Product or fix type as AIX operating system.
After clicking Continue, the screen shown in the visual is displayed.
- Go directly to the AIX Fix Central website:
www.ibm.com/servers/eserver/support/pseries/aixfixes.html.
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Maintenance packages
Maintenance packages are released every four to six months. These packages are
cumulative. You should review Critical fixes after applying a maintenance package.
Click on the AIX version you are running. Then, on the next screen, select the current
and desired levels for maintenance packages and click Go. Use the oslevel -r
command to determine your current level. To obtain a package for all systems, select
No level.
Another screen will be displayed giving you:
- A description of the maintenance package
- Download and install instructions
Specific fixes
These are generally available fixes that resolve specific problems.
Click on the AIX version you are running. Then, on the next screen, you can select the
fixes by:
- Fileset or PTF number
- APAR number or abstract
Then, give it a search string.
Another screen will be displayed listing the fixes that have matched your criteria. Select
the fixes from the search results that you want to add and click Add to the download list.
Then, click Continue to go to the packaging options screen.
Emergency fixes
When resolution to a problem cannot wait for a generally available fix, IBM may provide
a way around the problem in the form of an emergency fix.
IBM provides a common method for installing and uninstalling emergency fix packages
for the AIX operating system. This solution uses integrated tools to ensure a seamless
and safe application of fixes and reduces the risk associated with installation of
generally available fixes onto systems that have emergency fixes installed.
The emergency fix management solution allows you to track and manage emergency
fixes on systems running AIX. The solution consists of the efix manager, the efix
packager and associated System Management Interface Tool (SMIT) screens.
4-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Figure 4-15. More Fix Services Screen (from Fix Central) AW185.0
Notes:
Introduction
Selecting More fix services on the previous visuals screen, gives you the screen in
this visual. There are two sections:
- Automating downloads
- Compare report
Automating downloads
AIX 5L V5.3 introduces the Service Update Management Assistant (SUMA). You can
configure your system to periodically check for updates from IBM. This tool can be used
to automatically download the latest fixes for the operating system and cluster products.
While the bos.suma package was released with AIX 5L V5.3, the AIX 5L V5.1 and AIX
5L V5.2 SUMA packages and related updates have been made available for download
from the IBM support web site. SUMA will be discussed later in this unit.
4-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The Compare report screen shown in this visual is displayed after you click on the AIX
version youre interested in from the More fix services screen shown in the previous
visual.
This process to compare software versions consists of three steps:
1. Download the data file from IBMs Fix Central website
2. Run the compare_report command or smit compare_report on your AIX
system
3. Upload the file created by compare_report
4-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
4-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Comparison Reports
# smit compare_report
Comparison Reports
Notes:
Introduction
The SMIT Comparison Reports menu or the compare_report command allows you to
generate several comparison reports to verify that the filesets for a particular fix or
preventive maintenance package are installed by comparing filesets installed on a
system to another source. This source could be a fix repository, such as an lpp_source
or a directory of fixes, or a downloaded list from the IBM Fix Central website.
If you want to verify that your lpp_source is up to date, you can also compare a fix
repository to a downloaded list.
You can perform these actions in the smit compare_report fast path or using the
compare_report command.
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
4-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
The report that is generated contains information on filesets in the fix directory that are
back-level from latest (lowerthanlatest2.rpt).
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The SMIT Software Service Management menu allows access to Service Update
Management Assistant (SUMA) functions, which significantly simplify the system
update process by allowing policy-based automatic downloads of maintenance updates
from the Web. The Software Service Management menu also allows generation of
reports to manage filesets installed on a system, filesets contained in a repository, and
filesets available from the IBM Fix Central website. It also provides a way to clean up
and rename software images in a repository.
4-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty specific new fixes and entire maintenance levels, so that the time spent on such system
administration tasks is reduced. The SUMA implementation allows for multiple
concurrent downloads to optimize performance and has no dependency on any Web
browser.
SUMA policies can be run without extensive configuration. Filtering options allow
comparisons against an installed software inventory, a fix repository, or a maintenance
level to ensure only desired fixes will be downloaded. SUMA provides the option to
send an e-mail notification containing a list of whats available for download, as well as
detailed summary statistics of a download.
SUMA can be accessed through the suma command or through the smit suma fast
path.
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
The fast path smit maintain_software allows you to commit, reject and remove
software. You will also find the other menu items useful.
Copying software
With the Copy Software to Hard Disk for Future Installation and Copy Software
Bundle to Hard Disk for Future Installation options, you can copy filesets from the
installation media to the hard drive without actually performing an installation. This
allows you to install it later without needing the original installation media. To Copy all
Software to Hard Disk for Future Installation use the following command:
# gencopy -d /dev/cd0 -t /usr/sys/inst.images all
4-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Cleanup
The Clean Up After Failed or Interrupted Installation option resets your software
installation back to the beginning after a failed install. A failed install is usually due to a
power failure or a system shutdown occurring before the installation is complete. You
then need to start your installation/update over.
Repository management
The Rename Software Images in Repository, Clean Up Software Images in
Repository, and Service Update Management Assistant (SUMA) options are also on
the SMIT Software Service Management menu. These were already discussed in this
unit.
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
instfix Command
Installs a fix:
# instfix -k IY58143 -d /dev/cd0
Searches for a fix:
# instfix -ik IY58143
All filesets for IY58143 were found.
Searches for a fix by keyword:
# instfix -s SCSI -d /dev/cd0
List which AIX BOS maintenance levels are partly or full
installed:
# instfix -i | grep ML
All filesets for 5.3.0.0_AIX_ML were found.
All filesets for 5300-01_AIX_ML were found.
List which filesets are missing in a partly installed AIX BOS
maintenance level:
# instfix -ciqk 5300-01_AIX_ML | grep :-:
Copyright IBM Corporation 2005
Notes:
Introduction
The instfix command allows you to install a fix or a set of fixes without knowing any
information other than the Authorized Program Analysis Report (APAR) number (which
is given to you by your Support Center) or other unique keywords identifying the fix.
The instfix command can also be used to determine if a fix is installed on your
system.
4-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty -f Install filesets for multiple keywords or fixes using an input file. Note that the
output of the -T option produces a suitable input file format. -f results in
instfix using standard input.
-i Use with -k or -f option to display whether fixes or keywords are installed.
This option is for information only. Installation is not attempted when this
option is used.
-a Use only with -i to optionally display the symptom text associated with a fix.
-d Specify the input device (required for all but -i).
-c Output should be in colon delimited format.
Examples
The examples on the visual do the following:
- Install all filesets associated with fix IY58143 from the CD in the /dev/cd0 drive:
# instfix -k IY58143 -d /dev/cd0
- List which AIX BOS Maintenance Levels are partly or fully installed:
# instfix -i | grep ML
All filesets for 5.3.0.0_AIX_ML were found.
All filesets for 5300-01_AIX_ML were found.
- List which filesets are missing in a partly installed AIX BOS Maintenance level:
# instfix -ciqk 5300-01_AIX_ML | grep :-:
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. Which of the following states can your software be in, in order for
you to be able to use it? (select all that apply)
a. Applied state
b. Removed state
c. Install state
d. Commit state
2. What command is used to list all installed software on your
system? _______________
3. Which of the following can you install as an entity? (select all that
apply)
a. Fileset
b. LPP
c. Package
d. Bundle
4. What is the difference between the SMIT menus: Install Software
and Update Installed Software to Latest Level (Update All)?
_________________________________________________
_________________________________________________
Notes:
4-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Exercise: AIX Software Installation
Exercise 3
Notes:
Introduction
This lab gives you the opportunity to install filesets and show software installation
history.
This exercise can be found in your Student Exercise Guide.
Copyright IBM Corp. 2000, 2005 Unit 4. Software Installation and Maintenance 4-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Summary
Notes:
4-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center AIX 5L Version 5.3 System Management Guide:
Operating System and Devices
Unit Objectives
After completing this unit, you should be able to:
Describe the purpose of the ODM predefined and
customized databases
Describe the different states of a device
Describe the format of device location codes
Use SMIT to add/show/change/delete devices
Notes:
5-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Listing of /dev Directory
# ls -l /dev
brw-rw--rw 1 root system 20,0 Oct 29 02:25 fd0
brw-rw--rw 1 root system 20,64 Oct 29 02:26 fd1
crw-rw--rw 1 root system 20,0 Oct 29 02:25 rfd0
crw-rw--rw 1 root system 20,64 Oct 29 02:26 rfd1
:
:
crw-r--r-- 1 root system 22,0 Oct 29 02:25 rmt0
crw-r--r-- 1 root system 22,1 Oct 29 02:25 rmt0.1
:
:
crw------- 1 root system 14,1 Oct 29 02:44 hdisk0
crw------- 1 root system 14,2 Nov 1 05:31 hdisk1
crw------- 2 root system 14,1 Oct 29 02:44 rhdisk0
crw------- 1 root system 14,2 Nov 1 05:31 rhdisk1
rmt0
fd0 rmt1
Notes:
ls -l /dev output
Recall that the ls -l command allows you to see the type of a file. A special file (in the
/dev directory) will be indicated by a b in the first column for a block device or a c for
a character device.
Normally, the fifth field in the output of ls -l contains a numeric value indicating the
number of bytes in the file. However, remember that, for devices, it shows the major and
minor device numbers. The device rmt0 shown in the listing has a major device number
of 22 and a minor device number of 1. This indicates that the code to handle major
device 22 must already be in the kernel, and it must handle device number 1 correctly.
While not shown here, there would be files for rmt0 with minor numbers of 0 through 7,
each of which must be handled correctly by the device driver. More precisely, the major
number refers to the software section of code in the kernel which handles that type of
device, and the minor number to the particular device of that type or the operation mode
of a device of that type.
5-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Notes:
Introduction
The predefined and customized databases store information about all of the logical
devices in the system and their attributes. This information is managed by the Object
Data Manager (ODM).
Predefined database
The predefined database contains configuration data for all devices supported by the
system, that is, all possible devices that could be attached to the system. The SMIT
menus have options to install additional device drivers. The content of the predefined
database is largely determined at installation time, ensuring that your system will at
least have support for all devices initially connected to your system.
5-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Configuration Manager
The Configuration Manager is a program that automatically configures devices on your
system during system boot and run time. The Configuration Manager uses the
information from the predefined and customized databases during this process, and
updates the customized database afterwards.
# lsdev -P -H
class type subclass description
memory totmem sys Memory
tape 4mm4gb scsi 4.0 GB 4mm Tape Drive
disk osdisk scsi Other SCSI Disk Drive
adapter 22100020 pci IBM PCI Ethernet Adapter (22100020)
adapter 14101800 pci IBM PCI Tokenring Adapter (14101800)
adapter ppa isa_sio Standard I/O Parallel Port Adapter
adapter isa_keyboard isa_sio Keyboard Adapter
..
..
Notes:
Introduction
Information regarding devices supported by the system is stored in the ODM predefined
database.
Devices are classified by:
- Class indicates what the device does
- Type indicates what model it is
- Subclass indicates how it can be attached to the system
There are also definitions for some unknown devices which can be attached to the
system (for example, non-IBM serial or parallel printers or SCSI disk drives). These
devices are either intelligent and need little configuration, or the device attachment
method is standard (for example, parallel or RS232) and no features of the device are
assumed when it is added.
5-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Notes:
Introduction
The devices that have been customized in the system are described in the ODM
customized database. Each device has a logical device name, status, location and
various attributes.
5-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty Devices may appear in a defined state after a restart. If this is the case, it may be
because the device is powered off or no longer exists on the system.
Devices with a location code are physical devices. Devices without a location code are
logical devices. Location codes depend on the type of device and the adapter to which
the device is connected.
Device States
Predefined Database
Undefined Supported
Device
rmdev -dl
Customized Database
rmdev -dl
Defined Not Usable
mkdev -l
or rmdev -l
cfgmgr
Available Ready for
Use
Notes:
Device states
The most common device states are:
- Undefined - The device is a supported device but is not configured. It does not
reside in the customized database.
- Defined - The device has been added to the customized database. It has been
allocated a logical device name, and a location code and attributes have been
assigned to it, but it is still unavailable for use.
- Available - The device resides in the customized database. The device is fully
configured and is ready for use.
A device is configured and put into the Available state when the device is identified by
cfgmgr. However, we can add or identify a device manually using mkdev, and this
command allows us to add a device in the Defined state.
5-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty If a device that has been configured in the past is powered off and the machine is
rebooted, the device will appear in the Defined state. This indicates that the system
knows it is supposed to be there, but, because it was not powered on, it cannot be
used. It also means that when cfgmgr was called during the boot, the device was
unable to respond, and therefore its device state cannot be Available.
cfgmgr
The command that is executed at boot time to discover and configure attached devices
is cfmgr. After booting the system, if a device is either removed/powered-off or
attached/powered-on, the state of the device in the ODM is not automatically changed.
Rather than running mkdev or rmdev on the specific device, you would typically execute
cfgmgr. cfgmgr would discover any new devices or will re-assess the state of any
devices already defined in the ODM customized device database.
Self-Configuring Devices
2. Answer:
- CD-ROM
- 10-80-00-3,0
1. Who are you?
Device
cfgmgr Driver
4a) Load device driver
4b) Make /dev/cd0
ODM: 3. cd0 defined entry
cd0
defined Device
Kernel Driver
10-80-00-3,0
/unix 39
ODM: # ls -l /dev/cd0
cd0 br--r--r-- root system 39, 0 /dev/cd0
available
10-80-00-3,0 5. Device available
Notes:
Configuring devices
cfgmgr is a program that runs during boot that configures devices. It can also be run
safely from the command line on a system that is up and running. cfgmgr identifies all
self-configuring devices as long as they are powered on and matches them to the
information in the predefined database. It then uses the predefined information to
complete a customized database entry for the device.
All devices are self-configuring except for parallel and serial devices. So, except for
things like printers and ASCII terminals, configuring a device requires only attaching it
and powering it on before booting the machine. Since cfgmgr runs during the boot
process, no more intervention is required by the administrator.
Note that, for SCSI devices, you need to set a unique SCSI ID on the device before
attaching it. Once that is done, configuration of the device is handled by AIX.
5-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
SMIT Devices Menu
# smit devices
Devices
Move cursor to desired item and press Enter.
Notes:
Introduction
The SMIT Devices menu (fastpath: # smit devices) is used to manage the
configuration information about the devices in the system. This information controls the
way the kernel and applications behave towards the physical devices attached. The list
of devices varies depending on what you have configured or installed on your system.
Devices can also be managed using the Web-based System Manager.
- Printer/Plotter
This submenu allows you to configure printer devices and also queues for local
printers and remote printers.
- TTY
Used for any non-printer device attached to a serial port. (For example: terminal,
modem, and direct connection.)
- PTY
Used for a pseudo-terminal device. It provides the appearance of a real ASCII
terminal to the application, but does not have any physical port attachment. It is
used for applications such as AIXWindows and TCP/IP communications.
- Communications
Used for adapters for various types of communications. (For example: Token Ring,
Ethernet, MultiProtocol, X.25, 3270, and Fiber Optic.)
5-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Device Addressing
Location codes are used for device addressing
The location code for a device is a path from the adapter in
the CPU drawer or system unit, through the signal cables
and the asynchronous distribution box (if there is one) to the
device
Location codes consist of up to four fields of information
depending on the type of device
Location codes differ based on model type
Notes:
Location code
Every device is assigned a location code when it is attached to the system. Location
codes depend on the type of device and the adapter to which it connects.
The location code is another way of identifying the physical device.
The location codes exist to provide the system with a method of locating the device and
establishing relationships between devices and their adapters. If a hardware failure
occurs, the location code is often displayed or referred to in the LED.
EF The connector ID
Notes:
Introduction
Knowing how to interpret location codes allows you to quickly locate a device based on
the software definition. If you have several of the same type of devices, hard disks for
example, it allows you to easily identify the exact disk that is having the problem.
The actual values used in the location codes vary from model to model. For specific
values, you need to reference the Service Guide for your model. These can be found
online at the IBM Information Center:
http://publib16.boulder.ibm.com/pseries/en_US/infocenter/base/
5-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
For integrated devices, like the built-in keyboard port, the C position will be a letter A-Z
and the D position will be a 0. For example 01-F0 shows the keyboard adapter is on the
ISA bus (01) and is an integrated adapter (F0). The letters are assigned in the order in
which they are discovered during configuration. Each integrated device is assured a
unique value.
5-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Location Code Example: Non-SCSI
28-Port Asynchronous Controller
1P-10-11-01 1P-10-11-07
System Unit
0 1 2 3 4 5 6 7
1
128-Port 8 9 10 11 12 13 14 15 Remote
Adapter Async Node 1P-10-22-04
(RAN)
2 1
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
1P-10 1 2
8 9 10 11 12 13 14 15 8 9 10 11 12 13 14 15
1P-10-21-10
Notes:
Non-SCSI example
The example in the visual illustrates non-SCSI device location codes for a pSeries
system.
A 128-port asynchronous adapter allows 128 serial devices (like ASCII terminals) to be
attached to the adapter. The adapter has two connectors (or ports) on the card. Each
connector can support a serial bus.
On each bus, boxes that contain ports are connected to each other. These boxes are
called Remote Asynchronous Nodes (RANs). Each of the two connectors can support
four RANs. Four RANs on two connectors give a total of eight RANs. Each RAN has 16
ports. That gives a total of 128 ports.
Location code
The location code must account for each piece of the puzzle.
AB-CD is the same as previous examples. It provides the adapter card address. In our
example, the adapter card is plugged into slot 5 on the PCI bus.
E identifies the connector on the adapter card, 1 or 2.
F identifies the RAN. RANs are numbered in ascending order going away from the
adapter, 1-4.
GH is the two-digit port number. For example, port 7 is 07. The range of numbers is
00-15.
5-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Location Code Format for SCSI Devices
AB-CD-EF-G,H
AB-CD Identifies the bus and the adapter location
Same as with non-SCSI devices
Notes:
AB-CD position
The AB-CD positions contain the same information we have already covered. It
indicates where the adapter card (SCSI controller) is attached: the bus and slot number.
EF position
The EF position identifies the SCSI bus. If the controller provides only a single SCSI
bus, the EF position is 00. If the controller provides for dual SCSI buses, each bus must
be identified by a unique address. With dual SCSI, the card's internal bus is identified
with 00 and the card's external bus is identified with 01.
G,H position
The G,H position provides two pieces of information. The G position is the SCSI
address or SCSI ID of the device. The SCSI ID is set on the device itself. It is usually
accomplished by setting jumpers or switches on the device. Some devices have dials or
push buttons that are external that allow an easy method to set the ID. Set the SCSI ID
so that it doesn't conflict with another device on that bus. When cfgmgr runs it will
recognize the ID that is set on the hardware and set the G position accordingly.
The H is usually a 0. If the SCSI device has multiple devices within it, then the logical
unit number (LUN) is used to uniquely identify each device. Non-zero numbers are used
with RAID arrays or some CD jukeboxes.
5-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Location Code Example for SCSI Device
SCSI Devices (Disk, Tape, CD-ROM)
System
Unit
10-80-00-4,0
SCSI 10-80-00-6,0
Adapter 7 4
SCSI Bus 6
10-80
0
SCSI ID
Notes:
The SCSI ID of 7
The default ID for the SCSI adapter is 7. Therefore, this ID is not available to be used on
a connected device.
Bridge
01-D1-00-00 01-K1-01-00
SCSI Disk
Drive
10-80-00-4,0
Notes:
5-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
pSeries 690 Location Codes
U1.35-P1-X1 (unused)
U1.35-P1-F1
U1.35-P1-X2 Example of hardware location code format:
U1.35-P1-X3
U1.35-P1-X4
U1.35-P1-V1 U1.5-P1-I1/Z1
U1.35-P1-V2
U1.35-P1-V3
U1.18-P1-M1 U1.18-P1-M5
U1.18-P1-M2 U1.18-P1-M6
U1.18-P1-M3 U1.18-P1-M7
U1.18-P1-M4 U1.18-P1-M8
U1.18-F4
U1.18-X4
Unit number EIA Major Subassembly/
U1.18-F3
U1.18-X3
U1.18-F1 U1.18-F2
U1.18-X1 U1.18-X2
pSeries 690 Service Guide AIX and Physical Location
U1.17
Code Reference Tables (Example)
U1.15-P1-V1 or U1.13
Notes:
Introduction
Physical addressing has been in place throughout the history of the RS/6000 and
pSeries family of products. An important change with the pSeries 670 and 690 servers
is that the I/O drawers are installed at specific locations within the rack. We include the
visual above primarily as reference. Our focus is on I/O drawer addressing.
The example in the visual above shows location codes for the pSeries 690. The Service
Guide for each type of system contains charts to look up the location codes.
5-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Listing Device Physical Locations
CuDv Customized Devices
Notes:
S1
S2 TTY
Notes:
Introduction
Most devices self-configure using cfgmgr. One type of device that does not is an ASCII
terminal. The next few visuals go through the process of adding an ASCII terminal to
provide an example of what is required to manually configure a device.
First steps
First, physically attach the terminal to the serial port. Be sure to note which serial port it
is attached to. We need that information as we complete this process.
To begin the configuration, use smit tty. This screen is used to manage the
configuration of asynchronous devices.
To add the terminal, select Add a TTY.
5-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Attachment
TTY Type
Parent Adapter
Notes:
Introduction
Once you select Add a TTY, you will then be asked the TTY Type and which Parent
Adapter the terminal is attached to.
TTY type
In this example, the choices for TTY type are rs232 and rs422. rs232 is the most
common TTY type.
Parent adapter
To select the correct parent adapter, you need to know where the device is physically
attached. This is where the serial port is important.
In our example from the previous page, the terminal was attached to serial port 1.
Therefore, we select sa0 - Standard I/O Serial Port 1.
Location code
The location code is also displayed. 01-S1 is, in fact, the location code of serial port 1.
sa2, sa3, and sa4 are remote asynchronous nodes used in conjunction with the
128-port async adapter.
Be careful with the numbering scheme. sa0 is serial port 1. sa1 is serial port 2. The sa
stands for serial adapter. The adapters are devices, and device names are numbered
starting at 0.
5-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Device Nomenclature
For the built-in serial connection, the nomenclature looks like this:
sa0 sa1
Built-in adapters
on system planar
Serial ports s1 s2
For the 128-port adapter, the nomenclature looks like this:
Notes:
Pictorial view
This visual shows a picture and the associated nomenclature for the Add a TTY
scenario that were discussing.
Add a TTY
Add a TTY
Notes:
PORT number
There is only one mandatory field on this screen and that is the PORT number. The F4
key will provide a list of possible port numbers. For the first built-in serial port, it is s1; for
the second, it is s2. On a 16-port RAN, the choices are 0-15. Select the one to which
the terminal is connected. The combination of the appropriate RAN selected on the
Parent Adapter selector screen and the port number shown here provides the system
with the correct location code.
You must supply the port number to uniquely locate the device. The value required
depends upon the adapter specified. For example:
Built-in serial port S1 s1
Built-in serial port S2 s2
8-Port Adapter 0-7
16-Port Adapter 0-15
Each 16-PORT RAN 0-15
5-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
TERMINAL type
The TERMINAL type attribute is used to assign the TERM environment variable when a
user logs in on the device. You must set this to the name of a supported terminal type.
The list of supported terminals can be found in directories located in
/usr/share/lib/terminfo.
lscfg -v
Provides details of all devices including manufacturer, type
and model number and part numbers
getconf -a
Provides the values of all system configuration variables
Notes:
5-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
# getconf MACHINE_ARCHITECTURE
chrp
# getconf KERNEL_BITMODE
32
# getconf HARDWARE_BITMODE
32
# getconf REAL_MEMORY
131072
Checkpoint (1 of 2)
1. Is it possible to use SCSI ID 7 for a new tape drive?
_______________________________________________
_______________________________________________
2. Use the output on the next visual (lsdev -C -H) to answer the
following four questions.
a) What will happen if we attempt to add another device with
the SCSI address set to 4?
_______________________________________________
_______________________________________________
b) Can the 8 mm tape drive be currently used? Why?
_______________________________________________
_______________________________________________
c) Where is the printer connected? __________________
d) The Ethernet adapter is installed in what slot?
_______________________________________________
_______________________________________________
Copyright IBM Corporation 2005
Notes:
5-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Checkpoint (2 of 2)
# lsdev -C H
name status location description
sys0 Available System Object
pci0 Available PCI Bus
isa0 Available 10-58 ISA Bus
ppa0 Available 01-R1 Standard I/O Parallel Port Adapter
lp0 Available 01-R1-00-00 IBM 4039 LaserPrinter
sa0 Available 01-S1 Standard I/O Serial Port 1
tty0 Available 01-S1-00-00 Asynchronous Terminal
mem0 Available Memory
scsi0 Available 10-80 Wide SCSI I/O Controller
rmt0 Defined 10-80-00-3,0 5.0 GB 8 mm Tape Drive
hdisk0 Available 10-80-00-4,0 SCSI Disk Drive
ent0 Available 10-60 IBM PCI 10/100 Ethernet Adapter
Notes:
Unit Summary
A physical device is the actual hardware attached to the
system
A logical device is the software interface used by programs
and users to access a physical device
Device information is stored in the ODM in two databases:
customized and predefined
Devices can exist in a number of different states:
unavailable, defined, available and stopped
Location codes are used to describe exactly where a
device is connected into the system
Device attributes can be modified through SMIT
To create, modify, or remove device definitions, it is
sometimes necessary to use commands such as mkdev,
chdev and rmdev
Copyright IBM Corporation 2005
Notes:
5-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center AIX 5L Version 5.3 Commands Reference
Info Center AIX 5L Version 5.3 General Programming Concepts:
Writing and Debugging Programs
Info Center AIX 5L Version 5.3 Technical Reference: Kernel and
Subsystems
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Describe the structure of the ODM
Use the ODM command line interface
Explain the role of the ODM in device configuration
Describe the function of the most important ODM files
Notes:
6-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
6-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Data Managed by the ODM
Devices Software
System
Resource ODM SMIT Menus
Controller
Notes:
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
6-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
ODM Components
Notes:
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
sm_menu_opt, sm_name_hdr,
SMIT menus sm_cmd_hdr, sm_cmd_opt
Notes:
Current focus
In this unit, we will concentrate on ODM classes that are used to store device
information and software product data. At this point, we will narrow our focus even
further and confine our discussion to ODM classes that store device information.
6-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
PdCn PdAt
Customized Databases
CuDvDr CuVPD
Config_Rules
Configuration Manager
(cfgmgr)
Copyright IBM Corporation 2005
Notes:
6-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Configuration Manager
Predefined
"Plug and Play"
PdDv
PdAt
PdCn
Config_Rules
cfgmgr
Customized Methods
CuDv Define
Device Load
CuAt Configure
Driver
CuDep Change
CuDvDr Unload Unconfigure
CuVPD Undefine
Copyright IBM Corporation 2005
Notes:
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CuDv
CuAt Network
CuDep
CuDvDr
CuVPD
Config_Rules PdDv
PdAt
history PdCn
inventory
lpp history
product inventory
lpp history
nim_* product inventory
SWservAt lpp
SRC* sm_* product
Notes:
Introduction
To support diskless, dataless and other workstations, the ODM object classes are held
in three repositories. Each of these repositories is described in the material that follows.
/etc/objrepos
This repository contains the customized devices object classes and the four object
classes used by the Software Vital Product Database (SWVPD) for the / (root) part of
the installable software product. The root part of the software contains files that must
be installed on the target system. To access information in the other directories, this
directory contains symbolic links to the predefined devices object classes. The links are
needed because the ODMDIR variable points to only /etc/objrepos. It contains the part of
the product that cannot be shared among machines. Each client must have its own
copy. Most of this software requiring a separate copy for each machine is associated
with the configuration of the machine or product.
6-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty /usr/lib/objrepos
This repository contains the predefined devices object classes, SMIT menu object
classes and the four object classes used by the SWVPD for the /usr part of the
installable software product. The object classes in this repository can be shared across
the network by /usr clients, dataless and diskless workstations. Software installed in the
/usr part can be can be shared among several machines with compatible hardware
architectures.
/usr/share/lib/objrepos
Contains the four object classes used by the SWVPD for the /usr/share part of the
installable software product. The /usr/share part of a software product contains files
that are not hardware dependent. They can be shared among several machines, even if
the machines have a different hardware architecture. An example of this are terminfo
files that describe terminal capabilities. As terminfo is used on many UNIX systems,
terminfo files are part of the /usr/share part of a system product.
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
uniquetype = "tty/rs232/tty"
PdAt:
uniquetype = "tty/rs232/tty CuAt:
attribute = "login name = "tty0
deflt = "disable attribute = "login
values = "enable, disable, ..." value = "enable
type = "R"
chdev -l tty0 -a login=enable
PdAt:
uniquetype = "tty/rs232/tty CuAt:
attribute = "term chdev -l tty0 -a term=ibm3151 name = "tty0
deflt = "dumb attribute = "term
values = "" value = "ibm3151
type = "R"
Notes:
6-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Data Not Managed by the ODM
Filesystem
information ?
User/Security
information ?
Queues and
Queue devices ?
Notes:
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Lets Review:
Device Configuration and the ODM
1.
_______
2. 3.
AIX Kernel Applications
Figure 6-11. Lets Review: Device Configuration and the ODM AW185.0
Notes:
Instructions
Please answer the following questions. Please put the answers in the picture above. If
you are unsure about a question, leave it out.
1. Which command configures devices in an AIX system? (Note: This is not an ODM
command.)
2. Which ODM class contains all devices that your system supports?
3. Which ODM class contains all devices that are configured in your system?
4. Which programs are loaded into the AIX kernel to control access to the devices?
5. If you have a configured tape drive rmt1, which special file do applications access to
work with this device?
6-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
ODM Commands
Object class: odmcreate, odmdrop
Descriptors: odmshow
Notes:
Introduction
Different commands are available for working with each of the ODM components:
object classes, descriptors, and objects.
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2. To delete an entire ODM class, use the odmdrop command. The odmdrop command
has the following syntax:
odmdrop -o object_class_name
The name object_class_name is the name of the ODM class you want to remove.
Be very careful with this command. It removes the complete class immediately.
6-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Changing Attribute Values
# odmget -q"uniquetype=tape/scsi/8mm and attribute=block_size" PdAt > file
# vi file
PdAt:
uniquetype = "tape/scsi/8mm"
attribute = "block_size"
deflt = "1024" Modify deflt to 512
values = "0-245760,1"
width = ""
type = "R"
generic = "DU"
rep = "nr"
nls_index = 6
# odmadd file
Notes:
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Possible queries
As with any database, you can perform queries for records matching certain criteria.
The tests are on the values of the descriptors of the objects. A number of tests can be
performed:
= equal
!= not equal
> greater
>= greater than or equal to
< less than
<= less than or equal to
like similar to; finds path names in character string data
For example, to search for records where the value of the lpp_name attribute begins
with bosext1., you would use the syntax lpp_name like bosext1.*
Tests can be linked together using normal boolean operations, as shown in the
following example:
uniquetype=tape/scsi/8mm and attribute=block_size
In addition to the * wildcard, a ? can be used as a wildcard character.
6-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Using odmchange to Change Attribute Values
# vi file
PdAt:
uniquetype = "tape/scsi/8mm"
attribute = "block_size"
deflt = "1024" Modify deflt to 512
values = "0-245760,1"
width = ""
type = "R"
generic = "DU"
rep = "nr"
nls_index = 6
Notes:
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
6-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
inventory: history:
lpp_id = 38 lpp_id = 38
file_type = 0 ver = 5
format = 1 rel = 1
loc0 = "/etc/qconfig mod = 0
loc1 = " fix = 0
loc2 = " ptf = "
size = 0 state = 1
checksum = 0 time = 988820040
comment = ""
Copyright IBM Corporation 2005
Notes:
Contents of SWVPD
The following information is part of the SWVPD:
The name of the software product (for example, bos.rte.printers)
The version, release and modification level of the software product (for example,
5.2.0)
The fix level, which contains a summary of fixes implemented in a product
Any program temporary fix (PTF) that has been installed on the system
The state of the software product:
- Available (state = 1)
6-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
SWVPD classes
The Software Vital Product Data is stored in the following ODM classes:
lpp The lpp object class contains information about the installed
software products, including the current software product state
and description.
inventory The inventory object class contains information about the files
associated with a software product.
product The product object class contains product information about
the installation and updates of software products and their
prerequisites.
history The history object class contains historical information about
the installation and updates of software products.
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The AIX software vital product database uses software states that describe the status of
an install or update package.
6-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty Once a product is committed, if you would like to return to the old version, you must
remove the current version and reinstall the old version.
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
setno = 54
msgno = 2
catalog = "devices.cat"
DvDr = "tape"
Define = "/etc/methods/define"
Configure = "/etc/methods/cfgsctape"
Change = "/etc/methods/chggen"
Unconfigure = "/etc/methods/ucfgdevice"
Undefine = "etc/methods/undefine"
Start = ""
Stop = ""
...
uniquetype = "tape/scsi/8mm"
Notes:
type
Specifies the product name or model number, for example, 8 mm (tape).
class
Specifies the functional class name. A functional class is a group of device instances
sharing the same high-level function. For example, tape is a functional class name
representing all tape devices.
6-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty subclass
Device classes are grouped into subclasses. The subclass scsi specifies all tape
devices that may be attached to a SCSI interface.
prefix
Specifies the Assigned Prefix in the customized database, which is used to derive the
device instance name and /dev name. For example, rmt is the prefix name assigned to
tape devices. Names of tape devices would then look like rmt0, rmt1, or rmt2.
base
This descriptor specifies whether a device is a base device or not. A base device is any
device that forms part of a minimal base system. During system boot, a minimal base
system is configured to permit access to the root volume group (rootvg) and hence to
the root file system. This minimal base system can include, for example, the standard
I/O diskette adapter and a SCSI hard drive. The device shown on the visual is not a
base device.
This flag is also used by the bosboot and savebase commands, which are introduced
later in this course.
detectable
Specifies whether the device instance is detectable or undetectable. A device whose
presence and type can be determined by the cfgmgr, once it is actually powered on and
attached to the system, is said to be detectable. A value of 1 means that the device is
detectable, and a value of 0 that it is not (for example, a printer or tty).
led
Indicates the value displayed on the LEDs when the configure method begins to run.
The value stored is decimal, but the value shown on the LEDs is hexadecimal (2418 is
972 in hex).
setno, msgno
Each device has a specific description (for example, 4.0 GB 8 mm Tape Drive) that is
shown when the device attributes are listed by the lsdev command. These two
descriptors are used to lookup the description in a message catalog.
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
catalog
Identifies the file name of the national language support (NLS) catalog. The LANG
variable on a system controls which catalog file is used to show a message. For
example, if LANG is set to en_US, the catalog file /usr/lib/nls/msg/en_US/devices.cat is
used. If LANG is de_DE, catalog /usr/lib/nls/msg/de_DE/devices.cat is used.
DvDr
Identifies the name of the device driver associated with the device (for example, tape).
Usually, device drivers are stored in directory /usr/lib/drivers. Device drivers are
loaded into the AIX kernel when a device is made available.
Define
Names the define method associated with the device type. This program is called when
a device is brought into the defined state.
Configure
Names the configure method associated with the device type. This program is called
when a device is brought into the available state.
Change
Names the change method associated with the device type. This program is called
when a device attribute is changed via the chdev command.
Unconfigure
Names the unconfigure method associated with the device type. This program is called
when a device is unconfigured by rmdev -l.
Undefine
Names the undefine method associated with the device type. This program is called
when a device is undefined by rmdev -l -d.
Start, Stop
Few devices support a stopped state (only logical devices). A stopped state means that
the device driver is loaded, but no application can access the device. These two
attributes name the methods to start or stop a device.
6-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty uniquetype
This is a key that is referenced by other object classes. Objects use this descriptor as
pointer back to the device description in PdDv. The key is a concatenation of the class,
subclass and type values.
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
PdAt:
uniquetype = "disk/scsi/1000mb"
attribute = "pvid"
deflt = "none"
values = ""
...
PdAt:
uniquetype = "tty/rs232/tty"
attribute = "term"
deflt = "dumb"
values = ""
...
Notes:
uniquetype
This descriptor is used as a pointer back to the device defined in the PdDv object class.
6-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty attribute
Identifies the name of the attribute. This is the name that can be passed to the mkdev or
chdev command. For example, to change the default name of dumb to ibm3151 for tty0,
you can issue the following command:
# chdev -l tty0 -a term=ibm3151
deflt
Identifies the default value for an attribute. Nondefault values are stored in CuAt.
values
Identifies the possible values that can be associated with the attribute name. For
example, allowed values for the block_size attribute range from 0 to 245760, with an
increment of 1.
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CuDv:
name = "tty0"
status = 1
chgstatus = 1
ddins = ""
location = "01-C0-00-00"
parent = "sa0"
connwhere = "S1"
PdDvLn = "tty/rs232/tty"
Notes:
6-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty name
A customized device object for a device instance is assigned a unique logical name to
distinguish the device from other devices. The visual shows two devices, a tape device
rmt0 and a tty, tty0.
status
Identifies the current status of the device instance. Possible values are:
- status = 0 - Defined
- status = 1 - Available
- status = 2 - Stopped
chgstatus
This flag tells whether the device instance has been altered since the last system boot.
The diagnostics facility uses this flag to validate system configuration. The flag can take
these values:
- chgstatus = 0 - New device
- chgstatus = 1 - Don't care
- chgstatus = 2 - Same
- chgstatus = 3 - Device is missing
ddins
This descriptor typically contains the same value as the Device Driver Name descriptor
in the Predefined Devices (PdDv) object class. It specifies the name of the device
driver that is loaded into the AIX kernel.
location
Identifies the physical location of a device. The location code is a path from the system
unit through the adapter to the device. In case of a hardware problem, the location code
is used by technical support to identify a failing device. In many AIX systems, the
location codes are labeled in the hardware, to facilitate the finding of devices.
parent
Identifies the logical name of the parent device. For example, the parent device of rmt0
is scsi0.
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
connwhere
Identifies the specific location on the parent device where the device is connected. For
example, the device rmt0 uses the SCSI address 1,0.
PdDvLn
Provides a link to the device instance's predefined information through the uniquetype
descriptor in the PdDv object class.
6-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Customized Attributes (CuAt)
CuAt:
name = "tty0"
attribute = "login"
value = "enable"
...
CuAt:
name = "hdisk0"
attribute = "pvid"
value = "0016203392072a540000000000000000"
...
Notes:
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CuDep: CuVPD:
name = "rootvg name = "rmt0
dependency = "hd6" vpd = "*MFEXABYTE
PN21F8842"
CuDep:
name = "datavg
dependency = "lv01"
Notes:
PdCn
The Predefined Connection (PdCn) object class contains connection information for
adapters (sometimes called intermediate devices). This object class also includes
predefined dependency information. For each connection location, there are one or
more objects describing the subclasses of devices that can be connected.
The sample PdCn objects on the visual indicate that, at the given locations, all devices
belonging to subclass SCSI could be attached.
CuDep
The Customized Dependency (CuDep) object class describes device instances that
depend on other device instances. This object class describes the dependence links
between logical devices and physical devices as well as dependence links between
6-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty logical devices, exclusively. Physical dependencies of one device on another device are
recorded in the Customized Devices (CuDev) object class.
The sample CuDep objects on the visual show the dependencies between logical
volumes and the volume groups they belong to.
CuDvDr
The Customized Device Driver (CuDvDr) object class is used to create the entries in
the /dev directory. These special files are used from applications to access a device
driver that is part of the AIX kernel. The attribute value1 is called the major number and
is a unique key for a device driver. The attribute value2 specifies a certain operating
mode of a device driver.
The sample CuDvDr objects on the visual reflect the device driver for tape rmt0. The
major number 22 specifies the driver in the kernel, the minor numbers 0 and 1 specify
two different operating modes. The operating mode 0 specifies a rewind on close for the
tape drive, the operating mode 1 specifies no rewind on close for a tape drive.
CuVPD
The Customized Vital Product Data (CuVPD) object class contains vital product data
(manufacturer of device, engineering level, part number, and so forth) that is useful for
technical support. When an error occurs with a specific device, the vital product data is
shown in the error log.
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. In which ODM class do you find the physical volume IDs of your
disks?
__________________________________________________
Notes:
6-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Exercise: The Object Data Manager (ODM)
Exercise 4
Notes:
Copyright IBM Corp. 2000, 2005 Unit 6. The Object Data Manager (ODM) 6-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Summary
Notes:
6-42 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center System Management Concepts: Operating System
and Devices
Info Center System Management Guide: Operating System and
Devices
SA38-0509 RS/6000 Eserver pSeries Diagnostic Information for
Multiple Bus Systems
SG24-5496 Problem Solving and Troubleshooting in AIX 5L
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Describe the process of loading an AIX boot image
Describe the contents of the boot logical volume (BLV)
Fix a corrupted boot logical volume
View and modify boot lists
Use System Management Services (SMS)
Boot into maintenance mode to access a system that will
not boot
Interpret LED codes and console messages displayed
during boot
Notes:
7-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
AIX Startup Process
Power ON
System boot: Hardware
Hardware initialization
AIX 5L Initialization
Normal mode Locate boot device using
Normal service bootlist (NVRAM) or
(Multiuser mode) mode?
No
rc.boot alternate bootlist from firmware
Phase 1
System boot:
rc.boot
Phase 2
Software
Service mode
(Boot from alternate media)
init starts
y Diagnostics CD-ROM
processes
y Installation CD-ROM
from /etc/inittab
y mksysb tape
rc.boot y etc.
Phase 3
Notes:
Introduction
Booting a system running AIX proceeds in three overall stages:
- Hardware initialization
- Location of the boot device and loading of the boot image
- AIX initialization
Our focus here will be on locating and loading the boot image and using the low level
configuration tool (SMS) to set the boot list.
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Hardware
initialization
Boot disk
Load boot image from boot logical volume:
Kernel, RAMFS, & base ODM
AIX initialization
phase 1 AIX initialization
Notes:
Introduction
This visual shows the details of the Load the boot image into memory block from the
AIX Startup Process visual.
7-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Hardware initialization
System firmware (also called Read Only Storage (ROS)) initializes the hardware and
loads the boot image into memory. The RSPC and CHRP platforms use an additional
piece of software called SOFTROS to load the boot image. SOFTROS resides in the
boot logical volume.
AIX initialization
When the boot image is loaded into memory, control is transferred to the kernel. This is
the start of AIX initialization.
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
7-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Boot Disk
Boot disk
hd5
(Boot logical volume)
Notes:
Boot record
The boot record is a 512 byte block containing the size and location of the boot image.
This is read by ROS to locate the boot logical volume.
SOFTROS
The RSPC and CHRP platforms use the SOFTROS program to perform system
initialization not provided by the hardware ROS (firmware). SOFTROS is not included in
the boot logical volume for RS6K platforms.
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
bootexpand
bootexpand uncompresses the kernel and RAM file system.
Compressing the boot image reduces its size to less than half. This saves space on the
boot device and also requires less time to load from the media. When bootexpand is
finished, control is passed to the kernel.
By default, the kernel and the RAM file system are compressed. However, it is possible
to create an uncompressed boot logical volume, in which case, bootexpand is not
included.
Kernel
The kernel initializes itself and then executes /etc/init in the RAM file system.
The kernel that is loaded from the boot logical volume is never replaced during the boot
process. The same kernel is used in multiuser mode. A copy of the kernel also exists on
the hard disk (/unix), but this copy is only used for reference by the ps command. If you
need a new kernel, you must re-create the boot logical volume with the new kernel.
7-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
Initially, the boot logical volume is created as part of software installation. The boot
logical volume may also be re-created when the base operating system (bos) software
is upgraded. However, there may be circumstances where you will be required to
re-create the boot logical volume manually, for example:
- If the boot logical volume has become corrupted, the system will not boot.
- If a new kernel is needed. Since the system kernel is loaded from the boot logical
volume, you must update the boot logical volume if you wish to use a new kernel.
- If you want to enable kernel debug features or change certain performance related
variables.
7-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Kernel
By default, bosboot uses /unix on the root file system for the kernel in the boot image.
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
SOFTROS
If the system architecture is CHRP or RSPC, bosboot copies the appropriate version of
SOFTROS from the root file system:
File Description
/usr/lib/boot/aixmon.chrp SOFTROS for CHRP architecture
/usr/lib/boot/aixmon_rspc SOFTROS for RSPC architecture
Syntax
bosboot has a number of options to provide fine-grained control in creating a boot
image. The two most commonly used options are shown below. See the man page for
further details on this command.
bosboot -a -d device
Argument Description
Create a complete boot image and write it to the boot logical
-a
volume.
Use -d device to specify the physical boot disk (normally
/dev/hdisk0) containing the boot logical volume which you want to
update. The bosboot command will identify the boot logical volume
-d device
on the boot disk. If the -d flag is omitted, bosboot uses the boot
device used for the last system boot (bootinfo -b provides this
information).
7-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
How to Fix a Corrupted BLV
# shutdown -Fr
Notes:
Introduction
If a boot logical volume has been corrupted (for example, bad blocks on a disk might
cause this), the system will not boot. To fix the problem, you must boot your machine
from an alternate media in maintenance mode.
Maintenance mode
You can boot in maintenance mode by setting the boot list to boot from CD-ROM, NIM
Server, or tape. The CD-ROM, or tape has a separate boot image, allowing you to boot
even though the boot logical volume on your system disk is corrupt.
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
7-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
bootinfo command
bootinfo is a low level command used by bosboot to gather information in order to
create a boot image. Although it is not considered a user level command, there are
several options which may be useful:
bootinfo Option Description
-b Displays the last boot device
-p Displays the hardware architecture type
Indicates which kernel is running (AIX 5L V5.1 and later)
-K 32 32 -bit kernel
64 64-bit kernel
Indicates the type of boot
1 Disk boot
-t 3 CD-ROM boot
4 Tape boot
5 Network boot
Indicates if the system is multi-processor (MP) capable
-z 0 Not MP capable
1 MP capable
-y Displays 64 if the machine can run the 64-bit kernel
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Service Mode:
# bootlist -m service -o
fd0
cd0
hdisk0
tok0
# diag
TASK SELECTION LIST
SCSI Bus Analyzer
Download Microcode
Display or Change Bootlist
Periodic Diagnostics
Copyright IBM Corporation 2005
Notes:
Introduction
You can use the command bootlist or diag from the command line to change or
display the boot lists. You can also use the System Management Services (SMS)
programs. SMS is covered on the next visual.
bootlist command
The bootlist command is the easiest way to change the boot list. The first example
shows how to change the boot list for a normal boot. In this example, the system was
booted either from hdisk0 or hdisk1. To query the boot list, the option -o option can be
used.
The second example shows how to display the service mode boot list.
7-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
...
RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000
RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000
RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000
RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000
RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000 RS/6000
Notes:
7-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty keyboard actions you may do during this brief period of time is to press the F1 (or
numeric 1) key to request that the system boot using SMS firmware code.
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1 Display Configuration
2 Multiboot Multiboot
3 Utilities
4 Select Language 1 Select Software
2 Software Default
3 Select Install Device Select Boot Devices
===> 2 4 Select Boot Devices
5 OK Prompt 1 Display Current Settings
6 Multiboot Startup <OFF> 2 Restore Default Settings
3 Configure 1st Boot Device
===> 4 4 Configure 2nd Boot Device
5 Configure 3rd Boot Device
Configure 1st Boot Device 6 Configure 4th Boot Device
7 Configure 5th Boot Device
Device Current Device
Number Position Name ===> 3
1 - Diskette
2 - SCSI Tape id=@2,0 ( Integrated )
3 - SCSI CD-ROM id=@1,0 ( Integrated )
4 1 SCSI 9100 MB Harddisk id=@8,0 ( Integrated )
5 - IBM 100/10 Ethernet Adapter ( Integrated )
6 None
.------.
|X=Exit|
===> `------'
Copyright IBM Corporation 2005
Notes:
7-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
553
Modem
S1 S2
Automatic transmittal of
boot failure information
Service Processor
Modem IBM Support
553, ... Center
Notes:
Introduction
The service processor allows actions to occur even when the regular processors are
down.
7-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty A valid service contract is a prerequisite for this dial-out feature of the service
processor.
Other features
Other features of the service processor are:
- Console mirroring to make actions performed by a remote technician visible and
controllable by the customer.
- Remote as well as local control of the system (power-on/off, diagnostics,
reconfiguration, and maintenance).
- Run-time hardware and operating system surveillance. If, for example, a CPU fails,
the service processor would detect this, reboot itself automatically, and run without
the failed CPU.
- Timed power-on and power-off, reboot on crash, and reboot on power loss.
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Maintenance
Notes:
Introduction
The maintenance mode can be started from an AIX CD, an AIX bootable tape (like a
mksysb) or a network device that has been prepared on a NIM master. The devices that
contain the boot media must be stored in the boot lists.
7-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty - If you want to boot from your internal tape device you need to change the boot list
because the tape device by default is not part of the boot list. For example:
# bootlist -m normal cd0 rmt0 hdisk0
- Insert the boot media (either tape or CD) into the drive.
- Power on the system. The system begins booting from the installation media. After
several minutes, c31 is displayed in the LED/LCD panel which means that the
software is prompting on the console for input (normally to select the console device
and then select the language). After making these selections, you see the
Installation and Maintenance menu.
For POWER4 and POWER5 partitioned systems with an HMC, use the HMC to access
SMS and then select the bootable device.
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Choice [1]: 3
Maintenance
>>> 1 Access a Root Volume Group
Choice [1]: 1
Copyright IBM Corporation 2005
Notes:
First steps
When booting in maintenance mode, you first have to identify the system console that
will be used, for example your lft terminal or a tty that is attached to the S1 port.
After selecting the console, the Installation and Maintenance menu is shown.
To work in maintenance mode, use selection 3 to start up the Maintenance menu.
From this point, access rootvg to execute any system recovery steps that may be
necessary.
7-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Working in Maintenance Mode
Access a Root Volume Group
1. Volume Group 001620336e1bc8a3 contains these disks:
hdisk0 2063 04-C0-00-4,0
Choice: 1
2. Access this Volume Group and start a shell before mounting file systems
Choice [99]:
Copyright IBM Corporation 2005
Notes:
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Access this Volume Group and start a shell before mounting file
systems
When you choose this selection, the rootvg will be activated, but the file system
belonging to the rootvg will not be mounted.
A typical scenario where this selection is chosen is when a corrupted file system needs
to be repaired by the fsck command. Repairing a corrupted file system is only possible
if the file system is not mounted.
Another scenario might be a corrupted hd8 transaction log. Any changes that take place
in the superblock or i-nodes are stored in the log logical volume. When these changes
are written to disk, the corresponding transaction logs are removed from the log logical
volume.
A corrupted transaction log must be reinitialized by the logform command, which is
only possible, when no file system is mounted. After initializing the log device, you need
to do a file system repair for all file systems that use this transaction log. Beginning with
AIX 5L V5.1 you have to explicitly specify the file system type: JFS or JFS2:
# logform -V jfs /dev/hd8
# fsck -y -V jfs /dev/hd1
# fsck -y -V jfs /dev/hd2
# fsck -y -V jfs /dev/hd3
# fsck -y -V jfs /dev/hd4
# fsck -y -V jfs /dev/hd9var
# fsck -y -V jfs /dev/hd10opt
# exit
Keep in mind that US keyboard layout is used but you can use the retrieve function by
using set -o emacs or set -o vi.
7-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Progress and Error Indicators
Progress and error codes
Operator panel
Front panel
HMC (for LPARs)
Online hardware documentation available at:
http://publib16.boulder.ibm.com/pseries/index.htm
Click on your geography
Click the AIX version (AIX53, AIX52, or AIX51)
For IBM Sserver p5 models:
Click Sserver Hardware Information Center
For pSeries and RS/6000 models:
Click Hardware documentation
For AIX message codes, click Message Center
RS/6000 Eserver pSeries Diagnostic Information for Multiple
Bus Systems (SA38-0509)
Copyright IBM Corporation 2005
Notes:
Introduction
AIX provides progress and error indicators (display codes) during the boot process.
These display codes can be very useful in resolving startup problems. Depending on
the hardware platform, the codes are displayed on the console and/or the operator
panel.
Beginning with AIX 5L V5.2, the operator panel will also display some text messages,
such as AIX is starting, during the boot process.
Operator panel
For non-LPAR systems, the operator panel is an LED display on the front panel.
POWER4- and POWER5-based systems can be divided into multiple logical partitions
(LPARs). In this case, a system-wide LED display still exists on the front panel.
However, the operator panel for each LPAR is displayed on the screen of the Hardware
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Management Console (HMC). The HMC is a separate system which is required when
running multiple LPARs.
Early PCI-based RS/6000 systems do not have an LED display. Status and error
messages are sent using the system speaker (beeps), the hard disk status light, or the
console. Refer to the RS/6000 Service Manual for your model for interpretation of these
signals.
The primary progress and error indicator for MicroChannel RS/6000 systems is the LED
display. Both system firmware and AIX send display codes to these LEDs during
system boot.
Display codes
During the boot process, several types of codes may be displayed:
- Hardware initialization:
System firmware sends boot status codes (called firmware checkpoints) to the
operator panel. Once the console is initialized, the firmware will also send 8 digit
error codes to the console.
- AIX initialization:
The rc.boot script and the device configuration methods send progress and error
codes to the operator panel.
Documentation
Online hardware documentation and AIX message codes are available at:
http://publib16.boulder.ibm.com/pseries/index.htm
At the first screen, click on your geography:
- North America
- South America
- Europe
- Africa
- Asia, Middle East
- Australia, Oceania
At the next screen, click on the AIX version for the documentation youre interested in.
Depending on your geography, for each version multiple languages are available.
Available versions are:
- AIX53 (AIX 5L V5.3)
- AIX52 (AIX 5L V5.2)
- AIX51 (AIX 5L V5.1)
7-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty At this point, one of two different information center formats is shown:
- For AIX 5L V5.1 and V5.2, the documentation remains in the older Documentation
Library Services format
- For AIX 5L V5.3, the documentation is in the new information center format
There are two different portals for hardware documentation:
- For POWER4 and earlier RS/6000 and pSeries models, click on:
Hardware documentation. A library of documents will be displayed containing the
installation, user's, and service guides for the selected IBM pSeries and IBM
RS/6000 server hardware systems. You can browse or download the IBM pSeries
and IBM RS/6000 system and related device documentation.
- For IBM Sserver p5 models, click on:
Sserver Hardware Information Center. The information is task-based designed
for interactivity. Task-based information is organized by user tasks rather than by
individual server models. The interactive design allows the information center to
offer interactive information, such as interviews that provide customized checklists,
demos that clarify complex concepts, and video clips that show intricate installation
tasks.
In addition to hardware documentation, there is a link to the AIX Message Center. The
Message Center is a repository of available message information for AIX and pSeries
systems. With the message database, you can search on and obtain information on
error messages and display codes. Cause and recovery information is available for
many of these messages.
There is a hardcopy book (also available online and as a downloadable PDF file) called
RS/6000 Eserver pSeries Diagnostic Information for Multiple Bus Systems
(SA38-0509). Chapter 30. AIX diagnostic numbers and location codes provides
descriptions for the numbers and characters that display on the operator panel and
descriptions of the location codes used to identify a particular item.
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
LED/LCD
Monitor display
20EE000B F22
Notes:
Firmware checkpoints
AIX systems use the LED/LCD display to show the current boot status. These boot
codes are called firmware checkpoints.
Error codes
If errors are detected by the firmware during the boot process, an error code is shown
on the monitor. For example, the error code 20EE000B indicates that a boot record
error has occurred.
7-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Firmware Fixes
The following types of firmware (Licensed Internal Code)
fixes are available:
Server firmware
Power subsystem firmware
I/O adapter and device firmware
Types of firmware maintenance:
Disruptive
Concurrent (Requires an HMC interface)
Firmware Maintenance can be done:
Using the HMC
Through the operating system
Systems with an HMC should normally use the HMC
Firmware maintenance through the operating system is
always disruptive
Copyright IBM Corporation 2005
Notes:
Server firmware
Server firmware is the part of the Licensed Internal Code that enables hardware, such
as the service processor. Check for available server firmware fixes regularly, and
download and install the fixes if necessary. Depending on your service environment,
you can download, install, and manage your server firmware fixes using different
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
interfaces and methods, including the HMC or by using functions specific to your
operating system. However, if you have a 57x or 59x model server, or you have a
pSeries server that is managed by an HMC, you must use the HMC to install server
firmware fixes.
7-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Getting Firmware Updates from the Internet
Get firmware updates from IBM at:
http://techsupport.services.ibm.com/server/mdownload
Notes:
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
7-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Checkpoint (1 of 2)
1. True or False? You must have AIX loaded on your system to
use the System Management Services programs.
2. Your AIX system is currently powered off. AIX is installed on
hdisk1 but the boot list is set to boot from hdisk0. How can you
fix the problem and make the machine boot from hdisk1?
__________________________________________________
__________________________________________________
3. Your machine is booted and at the # prompt.
a) What is the command that will display the boot list?
______________________________
b) How could you change the boot list?
______________________________
4. What command is used to build a new boot image and write it to
the boot logical volume?
_____________________________________
5. What script controls the boot sequence? _________________
Notes:
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint (2 of 2)
6. True or False ? During the AIX boot process, the AIX kernel
is loaded from the root file system.
7. True or False ? A service processor allows actions to occur
even when the regular processors are down.
8. List the five components of the boot logical volume
(assume an CHRP system). ______________________
________________________________________________
9. How do you boot an AIX machine in maintenance mode?
________________________________________________
________________________________________________
10. Your machine keeps rebooting and repeating the POST.
What can be the reason for this?
________________________________________________
________________________________________________
Copyright IBM Corporation 2005
Notes:
7-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Exercise: System Boot: Hardware
Exercise 5
Notes:
Introduction
This exercise can be found in your Student Exercise Guide.
Copyright IBM Corp. 2000, 2005 Unit 7. System Boot: Hardware 7-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Summary
During the boot process, the kernel from the boot image
is loaded into memory
Boot devices and sequences can be updated via the
bootlist command, the diag command and SMS
The boot logical volume contains an AIX kernel, an ODM
and a RAM file system (that contains the boot script
rc.boot that controls the AIX boot process)
The boot logical volume can be re-created using the
bosboot command
LED codes produced during the boot process can be
used to diagnose boot problems
Notes:
7-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center System Management Concepts: Operating System
and Devices
Info Center System Management Guide: Operating System and
Devices
SA38-0509 RS/6000 Eserver pSeries Diagnostic Information for
Multiple Bus Systems
SG24-5496 Problem Solving and Troubleshooting in AIX 5L
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Describe the functions of rc.boot, phases 1, 2 and 3
Describe how devices are configured during AIX
initialization
Interpret LED codes and console messages displayed
during boot
Describe the use of the alog facility
List the basic features of system hang detection
Describe the System Resource Controller (SRC)
Analyze and solve boot problems
Notes:
Introduction
There are many reasons for boot failures. The hardware might be damaged or, due to
user errors, the operating system might not be able to complete the boot process.
A good knowledge of the AIX boot process is a prerequisite for all AIX system
administrators.
This unit describes the functions performed by rc.boot during AIX 5L initialization and
provides practice troubleshooting boot problems. In this unit, we will discuss most, but
not all, of the functions performed by rc.boot. Further details can be obtained through
study of the rc.boot script itself.
8-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
AIX 5L Startup Process
Power ON
System boot: Hardware
Hardware initialization
AIX 5L Initialization
Normal mode Normal Locate boot device using
(Multiuser mode) mode?
No
service bootlist (NVRAM)
rc.boot
Phase 1
System boot:
rc.boot
Phase 2
Software
Service mode
(Boot from alternate media)
init starts
y Diagnostics CD-ROM
processes
y Installation CD-ROM
from /etc/inittab
y mksysb tape
rc.boot y etc.
Phase 3
Other processes started
from /etc/inittab
Notes:
Introduction
In the previous unit, we discussed the process of loading an AIX boot image from the
boot logical volume. In this unit, we will cover AIX initialization. The focus is on rc.boot,
phases 1, 2, and 3.
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Kernel initialization
After being loaded into memory by the boot loader, the kernel initializes itself, mounts
the RAM file system, and starts the /etc/init process.
rc.boot
rc.boot is a script that controls AIX initialization. rc.boot exists on both the RAM file
system and the disk root file system. (It is copied to the RAM file system structure within
the boot image by the bosboot command.)
8-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
rc.boot phase 2
The RAM file system version of init calls rc.boot 2, which activates rootvg and then
mounts the rootvg file systems (/, /usr, and /var).
rc.boot phase 3
init runs the sysinit action first:
brc::sysinit:/sbin/rc.boot 3 >/dev/console 2>&1
rc.boot 3 configures the remaining devices.
Type of boot
AIX 5L supports booting from hard disk, CD-ROM, tape and from a network server. In
this lesson, we focus on booting from a hard disk.
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rc.boot 1
Start rc.boot 1
rootvg is not active !
510
cfgmgr -f
3. Configure base devices using ODM
files in the RAM file system
511
bootinfo -b
4. Determine boot device
Notes:
Introduction
The init process started from the RAM file system executes the boot script rc.boot 1.
The purpose of phase 1 is to configure the base devices so that rootvg can be
activated in phase 2.
Display codes
The principle progress and error codes displayed by rc.boot are shown in the visual in
dotted-line boxes. Error codes are shown to the side with the word failure (example:
548). Progress codes are shown in-line in the process flow (examples: 510 and 511).
8-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rc.boot 2 (Part 1)
Start rc.boot 2
551
552
Failure ipl_varyon -v 1. Activate rootvg
552
556
517
Failure
555 fsck -fp /
Failure 2. Mount root
557 mount -f /
copycore
5. Copy dump (if required) and
umount /var
unmount /var
Notes:
Introduction
The main purposes of phase 2 are to:
- Mount the disk-based file systems
- Update the disk-based file systems with information from the RAM file system
For the purposes of discussion, we have artificially divided rc.boot phase 2 into two
parts.
1. Activate rootvg
The rootvg is varied on with a special version of the varyonvg command (ipl_varyon)
designed to handle rootvg. If ipl_varyon completes successfully, 517 is shown on the
LED, otherwise 552, 554 or 556 are shown and the boot process stops.
8-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
3. Mount /usr
The /usr disk-based file system (normally /dev/hd2) is checked by fsck. It is then
mounted to provide access to the complete command set. If the mount fails, LED 518 is
displayed and the boot stops.
The script uses the RAM file system copy of the fsck and mount commands
(/../usr/sbin/fsck and /../usr/sbin/mount). Since hd2 is not yet mounted, there
is no access to the disk-based usr commands.
4. Mount /var
Next, the /var file system is checked (fsck) and mounted. This is necessary for the next
step, copying the dump.
5. Copy dump
copycore checks for the presence of a system dump in the primary paging space
(hd6)). If a dump exists in the paging space device, it will be copied from the dump
device, /dev/hd6, to the copy directory which is by default the directory /var/adm/ras.
The /var file system is unmounted when copycore finishes.
6. Start paging
Next, swapon is run to start paging on the primary paging space (normally hd6).
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
objrepos
rootvg
hd4 (root)
Notes:
8-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
rc.boot 2 (Part 2)
(continued)
553
End rc.boot 2
Notes:
Introduction
After the paging space /dev/hd6 has been made available, rc.boot 2 continues with
the tasks shown in the visual:
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
8. Copy /dev
mergedev copies all device files from /dev on the RAM file system to /dev in the
disk-based file system.
9. Mount /var
The disk-based /var file system is mounted.
8-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
RAM File System and rootvg (Part 2)
RAM file system
mergedev
objrepos
cp Cu*
rootvg
hd4 (root)
Notes:
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rc.boot 3 (Part 1)
553
fsck fp /tmp
mount /tmp 1. Mount /tmp file system
Notes:
Introduction
At the end of phase 2, the kernel restarts init, now using the disk-based version. init
executes commands from /etc/inittab. The first command executed is the sysinit
entry:
brc::sysinit:/sbin/rc.boot 3 >/dev/console 2>&1
When rc.boot 3 completes, init continues executing commands from /etc/inittab.
For the purposes of discussion, we have artificially divided rc.boot phase 3 into two
parts.
553 code
Before rc.boot phase 2 exits, it displays status code 553 on the LED. If the system
hangs and this code is still displayed, it usually indicates a problem with /etc/inittab.
8-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
2. Synchronize rootvg
The rootvg is synchronized. If there are any stale partitions, syncvg will update them.
Stale partitions could occur if volume(s) in rootvg are mirrored and a disk used as a
copy in the mirrored volume(s) had been inactive. Since synchronization can take some
time, it is started in the background (&) so that rc.boot can proceed while rootvg is
being synchronized.
4. Configure console
The console is configured by cfgcon. cfgcon displays one of the following display
codes:
Display code Description
Console has not been selected. cfgcon prompts user to select
c31
console.
Console is an lft terminal. lft (low function terminal) is the device
c32
name for the standard graphics console.
c33 Console is a tty.
c34 Console is a disk file.
If CDE is specified in /etc/inittab, the CDE will be started and you get a graphical boot
on the console.
5. Update ODM
savebase is run to synchronize the ODM in the boot logical volume with the ODM from
the root file system.
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rc.boot 3 (Part 2)
No
Send System initialization
completed to console and boot log 11. Exit rc.boot 3
rc.boot exits
Notes:
8-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rc.boot Summary
Command Executed Primary actions Config_Rules
from phase
rc.boot 1 RAM file system restbase
cfgmgr -f 1
Notes:
rc.boot 1
Phase 1 of rc.boot is run from the RAM file system. The primary actions are:
- The base ODM is restored from the boot image to the RAM file system (restbase)
- The base devices are configured using the phase 1 methods from Config_Rules
(cfgmgr -f)
8-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty rc.boot 2
Phase 2 is also started from the RAM file system. The primary actions are:
- The rootvg is activated (ipl_varyon)
- The rootvg file systems are mounted
- /dev files (which may have been modified by cfgmgr -f) are copied to /dev in the
rootvg (mergedev)
- ODM files (which may have been modified by cfgmgr -f) are copied to
/etc/objrepos in the rootvg
rc.boot 3
Phase 3 is started by init from /etc/inittab in the rootvg. The primary actions are:
- Configure the remaining devices (cfgmgr -p2 or cfgmgr -p3)
- Save any ODM changes to the boot logical volume (savebase)
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Boot logical volume or 20EE000B Access the rootvg. Re-create the BLV:
boot record corrupt? # bosboot -ad /dev/hdiskx
JFS/JFS2 log corrupt? 551, 552, 554, 555, Access rootvg before mounting the rootvg file
556, 557 systems. Re-create the JFS/JFS2 log:
# logform -V jfs /dev/hd8 or
# logform -V jfs2 /dev/hd8
Run fsck afterwards.
Superblock corrupt? 552, 554, 556 Run fsck against all rootvg file systems. If fsck
indicates errors (not an AIX file system), repair the
superblock as described in the notes.
Notes:
Introduction
The visual shows some common boot errors that might happen during the AIX software
boot process.
8-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Superblock corrupt?
Another thing you can try is to check the superblocks of your rootvg file systems. If you
boot in maintenance mode and you get error messages like Not an AIX file system
or Not a recognized file system type, it is probably due to a corrupt superblock in
the file system.
Each file system has two super blocks, one in logical block 1 and a copy in logical block
31. To copy the superblock from block 31 to block 1 for the root file system, issue the
following command:
# dd count=1 bs=4k skip=31 seek=1 if=/dev/hd4 of=/dev/hd4
rootvg locked?
Many LVM commands place a lock into the ODM to prevent other commands from
working at the same time. If a lock remains in the ODM due to a crash of a command,
this may lead to a hanging system.
To unlock the rootvg, boot in maintenance mode and access the rootvg with file
systems. Issue the following command to unlock the rootvg:
# chvg -u rootvg
8-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Configuration Manager
Predefined
PdDv
PdAt
PdCn
cfgmgr Config_Rules
Customized Methods
CuDv Define
CuAt Device
load
Configure
Driver
CuDep Change
CuDvDr Unconfigure
unload
CuVPD Undefine
Notes:
Automatic configuration
Many devices are automatically detected by the configuration manager. For this to
occur, device entries must exist in the predefined device object classes. The
configuration manager uses the methods from PdDv to manage the device state, for
example, to bring a device into the defined or available state.
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Define method
When a device is defined through its define method, the information from the predefined
database for that type of device is used to create the information describing the device
specific instance. This device specific information is then stored in the customized
database.
Configuration order
The configuration process requires that a device be defined or configured before a
device attached to it can be defined or configured. At system boot time, the
configuration manager configures the system in a hierarchical fashion. First the
motherboard is configured, then the buses, then the adapters that are attached, and
finally the devices that are connected to the adapters. The configuration manager then
configures any pseudodevices (volume groups, logical volumes, and so forth) that need
to be configured.
8-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Config_Rules Object Class
phase seq boot_mask rule
1 10 0 /etc/methods/defsys cfgmgr -f
1 12 0 /usr/lib/methods/deflvm
2 10 0 /etc/methods/defsys
2 12 0 /usr/lib/methods/deflvm
2 19 0 /etc/methods/ptynode cfgmgr -p2
2 20 0 /etc/methods/startlft (Normal boot)
3 10 0 /etc/methods/defsys
3 12 0 /usr/lib/methods/deflvm
3 19 0 /etc/methods/ptynode cfgmgr -p3
3 20 0 /etc/methods/startlft
(Service boot)
3 25 0 /etc/methods/starttty
Notes:
Introduction
The Config_Rules ODM object class is used by cfgmgr during the boot process. The
phase attribute determines when the respective method is called.
Phase 1
All methods with phase=1 are executed when cfgmgr -f is called. The first method that
is started is /etc/methods/defsys, which is responsible for the configuration of all
base devices. The second method /usr/lib/methods/deflvm loads the logical volume
device driver (LVDD) into the AIX kernel.
If you have devices that must be configured in rc.boot 1, that means before the
rootvg is active, you need to place phase 1 configuration methods into Config_Rules.
A bosboot is required afterwards.
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Phase 2
All methods with phase=2 are executed when cfgmgr -p2 is called. This takes place in
the third rc.boot phase, when the key switch is in normal position or for a normal boot
on a PCI machine. The seq attribute controls the sequence of the execution: The lower
the value, the higher the priority.
Phase 3
All methods with phase=3 are executed when cfgmgr -p3 is called. This takes place in
the third rc.boot phase, when the key switch is in service position, or a service boot
has been issued on a PCI system.
Sequence number
Each configuration method has an associated sequence number. When executing the
methods for a particular phase, cfgmgr sorts the methods based on the sequence
number. The methods are then invoked, one by one, starting with the smallest
sequence number. Methods with a sequence number of 0 are invoked last, after those
with non-zero sequence numbers.
Boot mask
Each configuration method has an associated boot mask:
- If the boot_mask is zero, the rule applies to all types of boot.
- If the boot_mask is non-zero, the rule then only applies to the boot type specified.
For example, if boot_mask = DISK_BOOT, the rule would only be used for boots from
disk versus NETWORK_BOOT which only applies when booting via the network.
8-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Device Names and CD-ROM Example
Initial State
HOST1 HOST2
# lsdev -Cc disk # lsdev -Cc disk
hdisk0 Available 10-80-00-1, 0 Disk Drive hdisk0 Available 10-80-00-4, 0 Disk Drive
hdisk1 Available 10-80-00-2, 0 Disk Drive
hdisk2 Available 10-80-00-3, 0 Disk Drive
HOST1 HOST2
# lsdev -Cc disk # lsdev -Cc disk
hdisk0 Available 10-80-00-1, 0 Disk Drive hdisk0 Available 10-80-00-2, 0 Disk Drive
hdisk1 Available 10-80-00-3, 0 Disk Drive hdisk1 Available 10-80-00-4, 0 Disk Drive
Notes:
Introduction
There is one time when device names can change: when you boot from an installation
or diagnostic CD-ROM. Since the CD-ROM does not have a copy of your ODM and is
read-only, it cannot know your device names. This means that when cfgmgr runs from
rc.boot on the CD-ROM, it just names devices in the order it finds them. Any time
device names have a different order than the order that cfgmgr uses, device names will
change when you boot from the CD-ROM.
Example
In the example, there are two systems (HOST1 and HOST2). Both systems are
shutdown and a disk is moved from HOST1 to HOST2. When the systems are rebooted
from the disk, existing names are preserved. However, when either system is booted
from CD-ROM, device names are changed.
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Possible problems
If device names have changed, the potential for serious problems does exist. For
example, if the boot disk for HOST2 was the disk at SCSI address 4 (the original
hdisk0) and the system administrator for HOST2 now did a New and Complete
Overwrite installation on hdisk0 (booting the system from CD-ROM, the disk at SCSI
address 2 is now hdisk0).
After the installation is complete, the system will reboot based on the boot list. The boot
list does not use device names like hdisk0, but instead points to a specific device in the
open firmware device tree. So it will still be pointing to the disk with SCSI address 4 and
would boot from the old operating system. More importantly, if there was user data on
the disk at SCSI address 2, it would be overwritten.
Avoiding problems
Device name changes when booted from CD-ROM need not cause problems, if you are
careful. The CD-ROM menus give you the opportunity to identify disks using their
location codes and by listing the logical volumes on the disk.
Suggestions
Keep an on-paper record of:
- Disk names
- Their location codes
- What each disk is used for
At a minimum, you should do this for the boot disk.
Be very careful when you boot from CD-ROM. You must never assume that device
names will be the same when you boot from the CD-ROM. Always verify device names
using location codes.
Before performing possibly destructive operations, try to verify the data on the target
disk. If you are not sure, power the system down and disconnect the cables from all but
the target disk. Thirty minutes of prevention is worth hours of restoring data from tape.
If possible, try to make the boot disk be hdisk0 and connected in the location that
cfgmgr names first. Of course, this is not always possible.
8-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
The alog Facility
alog program
/var/adm/ras/bootlog
Use the alog /var/adm/ras/BosMenus.log
command to /var/adm/ras/bosinst.data
view logs .
.
/var/adm/ras/errlog
Notes:
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
String Description
This is the first message logged by
rc.boot: starting disk boot process
rc.boot. Start of phase 1.
rc.boot: boot device is hdiskX End of phase 1.
rc.boot: executing "ipl_varyon -v" Start of phase 2.
rc.boot: run time mount of /tmp Start of phase 3.
Start of cfgmgr -p2 -v (or -p3 if in
rc.boot: executing "cfgmgr"
service mode).
cfgmgr is running in phase X First output from cfgmgr.
Configuration time: XX seconds Last output from cfgmgr.
End of phase 3. Last output from
System initialization completed.
rc.boot.
Start of /etc/rc (invoked by init
Starting Multi-user Initialization
from /etc/inittab).
End of /etc/rc. Normally the last
entry. If this is the first boot after a
Multi-user initialization completed
software installation, there may be
some output from fbcheck.
Boot log
During the boot process, rc.boot, cfgmgr (called by rc.boot to configure devices),
and several entries in the inittab file, use the boot log. The boot log is a binary file:
/var/adm/ras/bootlog.
The following command can be used to view the boot log.
alog -o -t boot
Note: For a complete description of this command, see the alog man page.
8-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Actions:
Log error in the Error Log
Display a warning message on the console
Launch recovery login on a console
Launch a command
Automatically REBOOT system
Copyright IBM Corporation 2005
Notes:
8-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Actions
If lower priority processes are not being scheduled, shdaemon will perform the specified
action. Each action can be individually enabled and has its own configurable priority
and time-out values. There are five actions available:
- Log Error in the Error Log
- Display a warning message on a console
- Launch a recovery login on a console
- Launch a command
- Automatically REBOOT system
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Configuring shdaemon
# shconf -E -l prio
sh_pp enable Enable Process Priority Problem
pp_errlog enable Log Error in the Error Logging
pp_eto 2 Detection Time-out
pp_eprio 60 Process Priority
pp_warning enable Display a warning message on a console
pp_wto 2 Detection Time-out
pp_wprio 60 Process Priority
pp_wterm /dev/console Terminal Device
pp_login disable Launch a recovering login on a console
pp_lto 2 Detection Time-out
pp_lprio 100 Process Priority
pp_lterm /dev/console Terminal Device
pp_cmd enable Launch a command
pp_cto 5 Detection Time-out
pp_cprio 60 Process Priority
pp_cpath /home/unhang Script
pp_reboot disable Automatically REBOOT system
pp_rto 5 Detection Time-out
pp_rprio 39 Process Priority
Copyright IBM Corporation 2005
Notes:
Introduction
shdaemon configuration information is stored as attributes in the SWservAt ODM object
class. Configuration changes take effect immediately and survive across reboots.
Use shconf (or smit shd) to configure or display the current configuration of shdaemon.
Enabling shdaemon
At least two parameters must be modified to enable shdaemon:
- Enable priority monitoring (sh_pp)
- Enable one or more actions (pp_errlog, pp_warning, and so forth)
8-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Action attributes
Each action has its own attributes, which set the priority and time-out thresholds and
define the action to be taken. The timeout attribute unit of measure is in minutes.
Example
In the example, shdaemon is enabled to monitor process priority (sh_pp=enable), and
the following actions are enabled:
- Log Error in the Error Logging (pp_log=enable)
Every two minutes (pp_eto=2), shdaemon will check to see if any process has been
run with a process priority number greater than 60 (pp_eprio=60). If not, shdaemon
logs an error to the error log.
- Display a warning message on a console (pp_warning=enable)
Every two minutes (pp_wto=2), shdaemon will check to see if any process has been
run with a process priority number greater than 60 (pp_wprio=60). If not, shdaemon
sends a warning message to the console specified by pp_wterm.
- Launch a command (pp_cmd=enable)
Every five minutes (pp_cto=5), shdaemon will check to see if any process has been
run with a process priority number greater than 60 (pp_cprio=60). If not, shdaemon
runs the command specified by pp_cpath (in this case, /home/unhang).
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
8-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Using the System Resource Controller
List SRC status
# lssrc -g spooler
subsystem Group PID Status
qdaemon spooler 8022 active
writesrv spooler 9558 active
lpd spooler inoperative
Start a subsystem
# startsrc -s lpd
0513-059 The lpd Subsystem has been started. Subsystem PID is 12472.
Refresh a subsystem
# refresh -s lpd
0513-095 The request for subsystem refresh was completed successfully.
Stop a subsystem
# stopsrc -s lpd
0513-044 The lpd Subsystem was requested to stop.
Notes:
SRC Status
The lssrc command is used to show the status of SRC. In the example, we are
checking the status of the spooler group using -g. To list the status of all processes, the
-a should be used (lssrc -a).
The -s and -g options control subsystems or subsystem groups respectively. These
can be used with the SRC commands.
SRC Control
In the remaining examples, we are controlling one subsystem, lpd - the daemon that
controls the print server. Use startsrc to start subsystems or groups. Use stopsrc to
stop subsystems or groups. The refresh command forces the subsystem to reread any
of its configuration files.
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint (1 of 2)
1. What is the primary function of each phase of rc.boot?
Phase 1 ______________________________________
Phase 2 ______________________________________
Phase 3 ______________________________________
Notes:
8-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Checkpoint (2 of 2)
3. Which ODM file is used by the cfgmgr during boot to
configure the devices in the correct sequence?
______________________________
Notes:
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise 6
Notes:
Introduction
This exercise can be found in your Student Exercise Guide.
8-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Unit Summary
Notes:
Copyright IBM Corp. 2000, 2005 Unit 8. System Boot: Software 8-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
8-42 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center AIX 5L Version 5.3 System Management Concepts:
Operating System and Devices
Info Center AIX 5L Version 5.3 System Management Guide:
Operating System and Devices
Info Center AIX 5L Version 5.3 Commands Reference
Redbooks AIX Storage Management Redbook (GG24-4484)
Redbooks Logical Volume Manager from A to Z: Introduction and
Concepts Redbook (SG24-5432)
Redbooks Logical Volume Manager from A to Z: Troubleshooting
and Commands Redbook (SG24-5433)
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Define key LVM-related terms
Explain where LVM information is stored
Manage volume groups, logical volumes, and physical
volumes
Notes:
9-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Logical volume
Notes:
Introduction
The AIX Logical Volume Manager controls disk storage resources by mapping data
between a simple and flexible logical view of storage space and the actual physical
disks.
This visual and these notes provide a brief overview of the basic components of LVM.
Components
A hierarchy of structures is used to manage disk storage:
- Volume groups
- Physical volumes
- Physical partitions
- Logical volumes
- Logical partitions
9-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Normal and Big Volume Group Limits
Normal Volume Groups (mkvg)
Number of disks: Max. number of partitions/disk:
1 32512
2 16256
4 8128
8 4064
16 2032
32 1016
Big Volume Groups (mkvg -B or chvg -B) mkvg -t
Number of disks: Max. number of partitions/disk: chvg -t
1 130048
2 65024
4 32512
8 16256
16 8128
32 4064
64 2032
128 1016
Copyright IBM Corporation 2005
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Scalable Volume Groups - AIX 5L V5.3
Support 1024 disks per volume group.
Support 4096 logical volumes per volume group.
Maximum number of PPs is VG instead of PV dependent.
LV control information is kept in the VGDA.
No need to set the maximum values at creation time; the
initial settings can always be increased at a later date.
New!
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Configuration Limits for Volume Groups
512 130048 1 GB
Big VG 128
(1016*128)
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Mirroring
Physical Logical
Partitions Partitions
write(data);
Mirrored
Logical
Volume Application
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Striping
LP1
1 4 7
1
Stripe hdisk0 2
Units 3
4 LP1
2 5 8 LP2
LP2
5
6 LP3
hdisk1
7 Striped
8 Logical
LP3 9
3 6 9 Volume
Stream of
hdisk2 data
Notes:
9-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
RAID
Adapter
RAID Array
Controller
Group of
disks
Notes:
9-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty By using multiple drives, the array can provide higher data-transfer rates and higher I/O
rates when compared to a single large drive; this is achieved through the ability to
schedule reads and writes to the disks in the array in parallel.
Arrays can also provide data redundancy so that no data is lost if a single physical disk
in the array should fail. Depending on what is referred to as the RAID level, data is
either mirrored or striped.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The most common RAID levels are RAID 0, RAID 1 and RAID 5. These RAID levels are
described in the paragraphs that follow.
RAID 0
RAID 0 is known as disk striping. Conventionally, a file is written out to (or read from) a
disk in blocks of data. With striping, the information is split into chunks (a fixed amount of
data) and the chunks are written to (or read from) a series of disks in parallel.
RAID 0 is well suited for applications requiring fast read or write accesses. On the other
hand, RAID 0 is only designed to increase performance; there is no data redundancy, so
any disk failure will require reloading from backups.
9-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty Select RAID level 0 for applications that would benefit from the increased performance
capabilities of this RAID level. Never use this level for critical applications that require
high availability.
RAID 1
RAID 1 is known as disk mirroring. In this implementation, duplicate copies of each
chunk of data are kept on separate disks, or more usually, each disk has a twin that
contains an exact replica (or mirror image) of the information. If any disk in the array
fails, then the mirrored twin can take over.
Read performance can be enhanced as the disk with its actuator closest to the required
data is always used, thereby minimizing seek times. The response time for writes can be
somewhat slower than for a single disk, depending on the write policy; the writes can
either be executed in parallel for speed, or serially for safety. This technique improves
response time for read-mostly applications, and improves availability. The downside is
you'll need twice as much disk space.
RAID 1 is most suited to applications that require high data availability, good read
response times, and where cost is a secondary issue.
RAID 5
RAID 5 can be considered as disk striping combined with a sort of mirroring. That means
that data is split into blocks that are striped across the disks, but additionally parity
information is written that allows recovery in the event of a disk failure.
Parity data is never stored on the same drive as the blocks that are protected. In the
event of a disk failure, the information can be rebuilt by the using the parity information
from the remaining drives.
Select RAID level 5 for applications that manipulate small amounts of data, such as
transaction processing applications. This level is generally considered the best
all-around RAID solution for commercial applications.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
LVM Identifiers
Goal: Unique worldwide identifiers for
Volume groups
Hard disks
Logical volumes
# lsvg rootvg
... VG IDENTIFIER: 00008371c98a229d4c0000000000000e
Notes:
Use of identifiers
The LVM uses identifiers for disks, volume groups, and logical volumes. As volume
groups could be exported and imported between systems, these identifiers must be
unique worldwide.
All identifiers are based on the CPU ID of the creating host and a timestamp.
9-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty If raw devices are used (for example, many database systems use raw logical
volumes), be careful that these programs do not destroy the LVCB.
LVCB-related considerations
For standard VGs, the LVCB resides in the first block of the user data within the LV. Big
VGs keep additional LVCB information in the VGDA. The LVCB structure on the first LV
user block and the LVCB structure within the VGDA are similar but not identical. (If a big
VG was created with the -T 0 option of the mkvg command, no LVCB will occupy the first
block of the LV.) With scalable VGs, logical volume control information is no longer
stored on the first user block of any LV. All relevant logical volume control information is
kept in the VGDA as part of the LVCB information area and the LV entry area. So, no
precautions have to be taken when using raw logical volumes, because there is no
longer a need to preserve the information held by the first 512 bytes of the logical
device.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
AIX Files
/etc/vg/vgVGID Handle to the VGDA copy in memory
/dev/hdiskX Special file for a disk
/dev/VGname Special file for administrative access to a VG
/dev/LVname Special file for a logical volume
/etc/filesystems Used by the mount command to associate
LV name, file system log, and mount point
Notes:
9-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Contents of the VGDA
Notes:
Introduction
The table on the visual indicates the type of information contained in the VGDA. The
individual items listed are discussed in the paragraphs that follow.
Time stamps
The time stamps are used to check if a VGDA is valid. If the system crashes while
changing the VGDA, the time stamps will differ. The next time the volume group is
varied on, this VGDA is marked as invalid. The latest intact VGDA will then be used to
overwrite the other VGDAs in the volume group.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
VGDA Example
# lqueryvg -p hdisk1 -At
Max LVs: 256
PP Size: 24 1: ____________
Free PPs: 56
LV count: 3 2: ____________
PV count: 2 3: ____________
Total VGDAs: 3 4: ____________
MAX PPs per PV: 1016
MAX PVs: 32
Logical:
5: ____________
00008371387fa8bb0000ce0001390000.1 lv_01 1
00008371387fa8bb0000ce0001390000.2 lv_02 1
00008371387fa8bb0000ce0001390000.3 lv_03 1
Physical: 00008371b5969c35 2 0
00008371b7866c77 1 0
6: ____________ 7: ____________
Copyright IBM Corporation 2005
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
d. PP size = 224 (2 to the 24th power) bytes, or 16 MB (for this volume group)
e. LVIDs (VGID.minor_number)
f. 2 PVs in VG
g. PVIDs
9-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty VG Type: 0
Max PPs: 32512
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Example on visual
In the example on the visual, the getlvcb command is used to obtain information from
the logical volume hd2. The information displayed includes the following:
- Intrapolicy, which specifies what strategy should be used for choosing physical
partitions on a physical volume. The five general strategies are edge (sometimes
called outer-edge), inner-edge, middle (sometimes called outer-middle),
inner-middle, and center (c = Center).
- Number of copies (1 = No mirroring).
9-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty - Interpolicy, which specifies the number of physical volumes to extend across (m =
Minimum).
- LVID
- LV name (hd2)
- Number of logical partitions (103)
- Can the partitions be reorganized? (relocatable = y)
- Each mirror copy on a separate disk (strict = y)
- Number of disks involved in striping (stripe width)
- Stripe size
- Logical volume type (type = jfs)
- JFS file system information
- Creation and last update time
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
mkvg
extendvg
mklv Update
crfs exportvg
chfs
rmlv
reducevg
...
Figure 9-16. How LVM Interacts with ODM and VGDA AW185.0
Notes:
High-level commands
Most of the LVM commands that are used when working with volume groups, physical
or logical volumes are high-level commands. These high-level commands (like mkvg,
extendvg, mklv, and others listed on the visual) are implemented as shell scripts and
use names to reference a certain LVM object. The ODM is consulted to match a name,
for example, rootvg or hdisk0, to an identifier.
9-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty end up in a situation where the VGDA/LVCB and the ODM are not in sync. The same
situation may occur when low-level commands are used incorrectly.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Key attributes
Remember the most important attributes:
- status = 1 means the disk is available
- chgstatus = 2 means the status has not changed since last reboot
- location specifies the location code of the device
- parent specifies the parent device
9-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
ODM Entries for Physical Volumes (2 of 3)
# odmget -q "name=hdisk0 and attribute=pvid" CuAt
CuAt:
name = "hdisk0"
attribute = "pvid"
value = "0009330f2d01c69f0000000000000000"
type = "R"
generic = "D"
rep = "s"
nls_index = 2
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# ls -l /dev/hdisk*
brw------- 1 root system 22,1 08 Jan 06:56 /dev/hdisk0
brw------- 1 root system 22,2 08 Jan 07:12 /dev/hdisk1
Notes:
Special files
Applications or system programs use the special files to access a certain device. For
example, the visual shows special files used to access hdisk0 (/dev/hdisk0) and
hdisk1 (/dev/hdisk1).
9-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
ODM Entries for Volume Groups (1 of 2)
# odmget -q "name=rootvg" CuDv
CuDv:
name = "rootvg"
status = 0
chgstatus = 1
ddins = ""
location = ""
parent = ""
connwhere = ""
PdDvLn = "logical_volume/vgsubclass/vgtype"
# odmget -q "name=rootvg" CuAt
CuAt:
name = "rootvg"
attribute = "vgserial_id"
value = "0009301300004c00000000e63a42b585"
type = "R"
generic = "D"
rep = "n"
nls_index = 637
(output continues on next page)
Notes:
VGID
One of the most important pieces of information about a volume group is the VGID. As
shown on the visual, this information is stored in CuAt.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CuAt:
name = "rootvg"
attribute = "timestamp"
value = "3ec3cb943749cbc3"
type = "R"
generic = "DU"
rep = "s"
nls_index = 0
CuAt:
name = "rootvg"
attribute = "pv"
value = "0009330f2d01c69f0000000000000000"
type = "R"
generic = ""
rep = "sl"
nls_index = 0
Notes:
Length of PVID
Remember that the PVID is a 32-number field, where the last 16 numbers are set to
zeros.
9-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
ODM Entries for Logical Volumes (1 of 2)
# odmget -q "name=hd2" CuDv
CuDv:
name = "hd2"
status = 0
chgstatus = 1
ddins = ""
location = ""
parent = "rootvg"
connwhere = ""
PdDvLn = "logical_volume/lvsubclass/lvtype"
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# ls -l /dev/hd2
brw------- 1 root system 10,5 08 Jan 06:56 /dev/hd2
Notes:
CuDvDr logical volume objects
Each logical volume has an object in CuDvDr that is used to create the special file entry
for that logical volume in /dev. As an example, the sample output on the visual shows
the CuDvDr object for hd2 and the corresponding /dev/hd2 (major number 10, minor
number 5) special file entry in the /dev directory.
9-42 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
ODM-Related LVM Problems
2.
VGDA High-Level Commands ODM
LVCB
- Signal Handler
1. - Lock
Notes:
Causes of problems
The signal handlers used by high-level LVM commands do not work with a kill -9, a
system shutdown, or a system crash. You might end up in a situation where the VGDA
has been updated, but the change has not been stored in the ODM.
Problems might also occur because of the improper use of low-level commands or
hardware changes that are not followed by correct administrator actions.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Another common problem is ODM corruption when performing LVM operations when
the root file system (which contains /etc/objrepos) is full. Always check the root file
system free space before attempting LVM recovery operations.
9-44 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Fixing ODM Problems (1 of 2)
If the ODM problem is not in the rootvg, for example in volume
group homevg, do the following:
# varyoffvg homevg
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
3. In the last step, you import the volume group by using the importvg command.
Specify the volume group name with the -y option. (If you dont use this option, AIX
creates a new volume group name using the naming convention "vgXX" where XX
is the lowest unused number available, as in vg00, vg01, and so on.)
You need to specify only one intact physical volume of the volume group that you
import. The importvg command reads the VGDA and LVCB on that disk and
creates completely new ODM objects.
Note: We will return to the export and import functions later in this course.
9-46 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Fixing ODM Problems (2 of 2)
If the ODM problem is in the rootvg, try using
rvgrecover:
PV=hdisk0
VG=rootvg
cp /etc/objrepos/CuAt /etc/objrepos/CuAt.$$
cp /etc/objrepos/CuDep /etc/objrepos/CuDep.$$
cp /etc/objrepos/CuDv /etc/objrepos/CuDv.$$
cp /etc/objrepos/CuDvDr /etc/objrepos/CuDvDr.$$
lqueryvg -Lp $PV | awk '{print $2}' | while read LVname;
do
odmdelete -q "name=$LVname" -o CuAt
odmdelete -q "name=$LVname" -o CuDv
odmdelete -q "value3=$LVname" -o CuDvDr Uses odmdelete
done to export rootvg
odmdelete -q "name=$VG" -o CuAt
odmdelete -q "parent=$VG" -o CuDv Uses importvg to
odmdelete -q "name=$VG" -o CuDv import rootvg
odmdelete -q "name=$VG" -o CuDep
odmdelete -q "dependency=$VG" -o CuDep
odmdelete -q "value1=10" -o CuDvDr
odmdelete -q "value3=$VG" -o CuDvDr
importvg -y $VG $PV # ignore lvaryoffvg errors
varyonvg $VG
Notes:
Problems in rootvg
For ODM problems in rootvg, finding a solution is more difficult because rootvg cannot
be varied off or exported. However, it may be possible to fix the problem using one of
the techniques described below.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
After deleting all ODM objects from rootvg, it imports the rootvg by reading the VGDA
and LVCB from the boot disk. This results in completely new ODM objects that describe
your rootvg.
9-48 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-50 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Volume Groups
Logical Volumes
Physical Volumes
Paging Space
Notes:
Introduction
The SMIT Logical Volume Manager menu is used to manage many aspects of the
system's storage. The Web-based System Manager can also be used to manage the
Logical Volume Manager.
Volume groups
The SMIT Volume Groups menu provides facilities to manipulate the volume groups in
the system.
9-52 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Physical volumes
The SMIT Physical Volumes menu allows the user to configure the physical volumes
(fixed disks) in the system. This menu duplicates options on the Fixed Disks menu of
Devices.
Paging space
The SMIT Page Space menu allows a user to add, delete, activate and list the paging
spaces available.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-54 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
List All Volume Groups
# lsvg
rootvg
payrollvg
# lsvg -o
rootvg
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# lsvg rootvg
Notes:
9-56 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
List VG Information (Physical Volumes)
# lsvg -p rootvg
rootvg:
PV_NAME PV STATE TOTAL PPs FREE PPs FREE DISTRIBUTION
hdisk0 active 159 52 24..00..00..00..28
hdisk1 active 159 78 32..02..00..12..32
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# lsvg -l rootvg
rootvg:
LVNAME TYPE LPs PPs PVs LV STATE MOUNT POINT
Notes:
9-58 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Add a Volume Group
# smit mkvg
Add a Volume Group
[Entry Fields]
VOLUME GROUP name []
Physical partition SIZE in megabytes +
* PHYSICAL VOLUME names [] +
FORCE the creation of volume group? no +
Activate volume group AUTOMATICALLY yes +
at system restart?
Volume group MAJOR NUMBER [] +#
Create VG Concurrent Capable? no +
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Using SMIT
The volume group MAJOR NUMBER on the SMIT dialog screen is used by the kernel
to access that volume group. This field is most often used for High Availability Network
File Systems (HANFS) and High Availability Cluster Multi-Processing (HACMP)
applications.
The item on the SMIT dialog screen referring to Concurrent mode operation has no
meaning on systems without HACMP installed. This item is valid on AIX V4.2 and later.
There is a separate SMIT panel for adding a big volume group which is identical to this
panel.
9-60 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Add a Scalable Volume Group
# smit mkvg
[Entry Fields]
VOLUME GROUP name []
Physical partition SIZE in megabytes +
* PHYSICAL VOLUME names [] +
FORCE the creation of volume group? no +
Activate volume group AUTOMATICALLY yes +
at system restart?
Volume group MAJOR NUMBER [] +#
Create VG Concurrent Capable? no +
Max PPs per VG in kilobytes 32 +
Max Logical Volumes 256 +
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-62 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Change a Volume Group
# smit chvg
Change a Volume Group
[Entry Fields]
* VOLUME GROUP name rootvg
* Activate volume group AUTOMATICALLY yes +
at system restart?
* A QUORUM of disks required to keep the volume yes +
group on-line ?
Convert this VG to Concurrent Capable? no +
Change to big VG format? no +
Change to scalable VG format? no +
LTG Size in kbytes 128 +
Set hotspare characteristics n +
Set synchronization characteristics of stale n +
partitions
Max PPs per VG in kilobytes 32 +
Max Logical Volumes 256 +
Notes:
Quorum of disks
The SMIT option A QUORUM of disks required to keep the volume group on-line?
determines if the volume group is automatically varied off (deactivated) after losing its
quorum of physical volumes. Selecting no means that the volume group stays active
until it loses all of its physical volumes. However, if this option is set to no then you are
in danger of having backdated VGDAs. To activate a non-quorum user-defined volume
group, all of the physical volumes within the volume group must be accessible or the
activation fails.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-64 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Logical Track Group (LTG) Size
LTG is the maximum transfer size of a logical volume
Prior to AIX 5L V5.3:
Default LTG size: 128 KB
LTG size could be set or changed by the L flag of the chvg
command or the mkvg command
AIX 5L V5.3:
AIX 5L V5.3 dynamically sets the LTG size (calculated at each
volume group activation)
LTG size can be specified at varyonvg time using command:
varyonvg -M <LTGsize>
Enable variable LTG on old volume groups using chvg -L 0
To display the LTG size of a disk, use the command:
# /usr/sbin/lquerypv -M <hdisk#>
Notes:
LTG sizes
Prior to AIX 5L V5.1, the only supported LTG size was 128 KB. In AIX 5L V5.1 and V5.2,
LVM accepted LTG values of 128 KB, 256 KB, 512 KB, and 1024 KB. However, many
disks now support transfer sizes larger than 1 MB. To take advantage of these larger
transfer sizes and get better disk I/O performance, AIX 5L V5.3 accepts values of
128 KB, 256 KB, 512 KB, 1 MB, 2 MB, 4 MB, 8 MB, and 16 MB for the LTG size.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-66 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Hot Spare
Synchronization
Hot spare
Notes:
9-68 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty - Hot spare disks must have at least equal capacity to the smallest disk already in the
volume group. Good practice dictates having enough hot spares to cover your
largest mirrored disk.
Set the hot spare migration policy for the volume group
The chvg -h command sets the migration policy for the volume group. The following
table shows the arguments that can be used with the chvg -h command:
chvg -h
Description
argument
Permits one for one migration of partitions from one failed disk to
y (lower case) one spare disk. From the pool of hot spare disks, the smallest one
which is big enough to substitute for the failing disk will be used.
Migrates partitions from a failing disk to one or more hot spare
Y (upper case)
disks; might use the complete pool of hot spare disks.
n No automatic migration will take place. (Default)
Removes all disks from the pool of hot spare disks for this volume
r
group.
For example, to set an automatic migration policy which uses the one smallest hot
spare disk that is large enough to replace the failing disk in the datavg volume group,
use the command:
# chvg -hy datavg
Set the hot spare synchronization policy for the volume group
The chvg -s command is used to specify the synchronization characteristics. The
following two values are valid for the synchronization argument:
chvg -s
Description
argument
y Automatically attempts to synchronize stale partitions.
n Will not automatically attempt to synchronize stale partitions. (Default)
For example, to automatically synchronize stale partitions for the datavg volume group,
use the command: chvg -sy datavg
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-70 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Extending and Reducing Volume Groups
hdisk4 hdisk5
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-72 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Remove a Volume Group
# smit reducevg2
Remove a Volume Group
[Entry Fields]
* VOLUME GROUP name [] +
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
varyonvg [ -f ] Volumegroup
# varyonvg datavg
varyoffvg Volumegroup
# varyoffvg datavg
Notes:
9-74 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
VOLUME GROUP name []
* PHYSICAL VOLUME name [] +
Volume Group MAJOR NUMBER [] +#
Notes:
9-76 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Advanced RAID Support
Checks all disks in a volume group to see if they have
grown in size:
chvg -g Volumegroup
# chvg -g datavg
# chvg -b y datavg
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Bad block relocation policy should be turned off for RAID devices and storage
subsystems unless the manufacturer tells you otherwise.
9-78 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-79
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
E M C M E
Inner Edge
Inner Middle
Center
Outer Middle (Middle)
Outer Edge (Edge)
Notes:
Introduction
When creating or changing a logical volume you can specify the way the Logical
Volume Manager decides on which physical partitions to allocate to the logical volume.
This affects the performance of the logical volume.
9-80 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-81
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Logical Volumes
Notes:
9-82 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Show Logical Volume Characteristics
Physical volume map:
# lslv -l lv00
lv00:/home/john
PV COPIES IN BAND DISTRIBUTION
hdisk0 010:000:000 70% 000:000:007:003:000
# lslv -m lv00
lv00:/home/john
LP PP1 PV1 PP2 PV2 PP3 PV3
0001 0134 hdisk0
0002 0135 hdisk0
0003 0136 hdisk0
Notes:
lslv -l lvname
The lslv -l lvname command gives information about the distribution of a particular
logical volume's logical partitions for each physical volume. The information includes
the number of logical partitions on the disk and its copies, if any, on that disk; the
percentage of physical partitions which match the intra-physical volume allocation
policy; the distribution of physical partitions on the physical volume (outer edge, outer
middle, center, inner middle, inner edge).
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-83
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
COPIES
The COPIES field of the lslv -l lvname command has the following three fields:
- The number of logical partitions containing at least one physical partition (no copies)
on the physical volume
- The number of logical partitions containing at least two physical partitions (one copy)
on the physical volume
- The number of logical partitions containing three physical partitions (two copies) on
the physical volume
The example in the visual, COPIES (010:000:000), can be interpreted as:
- 010 - Information regarding first copy, that is, 10 physical partitions
- 000:000 - These two fields hold information regarding the second and the third
copies, mirrored copies on the physical volume. By looking at this output, you can
tell if the logical volume is mirrored and if the mirrored copies are on the same
physical volume. If they are all on separate physical volumes, which is the default,
the last two fields will still show 000.
IN BAND
The IN BAND field displays the percentage of physical partitions on the physical volume
that belong to the logical volume and were allocated within the physical volume region
specified by Intra-physical allocation policy.
DISTRIBUTION
The DISTRIBUTION field displays the number of physical partitions allocated within each
section of the physical volume: outer edge, outer middle, center, inner middle, and inner
edge.
The example in the visual, DISTRIBUTION (000:000:007:003:000), shows of the 10
physical partitions, 7 physical partitions are located in the center area and 3 physical
partitions in the inner-middle area of the disk. There is a relationship between the
distribution 000:000:007:003:000 and the copies 010:000:000 whereby the 007:003
numbers indicate the distribution of the 010.
lslv -m lvname
The lslv -m lvname command gives a map of which physical volumes contain which
physical partitions for the logical partitions of the logical volume. Three columns are
given, one for each copy of a logical partition.
9-84 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Add a Logical Volume
# smit mklv
Add a Logical Volume
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-85
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-86 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Set Characteristics of a Logical Volume
# smit lvsc
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-87
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
the allocation policies for the new partitions to different values than used by the original
logical volume.
The size of a logical volume may not be decreased automatically. To make a logical
volume smaller, back it up, delete it, create a new logical volume of the desired size and
restore the data.
9-88 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
List All Logical Volumes By Volume Group
# lsvg -o | lsvg -i -l
rootvg:
LVNAME TYPE LPs PPs PVs LV STATE MOUNT POINT
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-89
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# lslv lv02
Notes:
9-90 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Reorganize a Volume Group
# smit reorgvg
[Entry Fields]
* VOLUME GROUP name vg3
LOGICAL VOLUMES [lv04 lv07] +
Notes:
reorgvg syntax
The syntax is: reorgvg volumegroup [lvname]
For example: reorgvg vg3 lv04 lv07
In AIX V4.2 and later, if you enter the reorgvg command with the volume group name
and no other arguments, the entire volume group is reorganized.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-91
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
9-92 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-93
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Physical Volumes
Notes:
9-94 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
List Physical Volume Information
List all physical volumes in system:
# lspv
# lspv hdisk0
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-95
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# lspv -l hdisk0
hdisk0:
LV NAME LPs PPs DISTRIBUTION MOUNT POINT
hd1 12 12 00..00..00..12..00 /home
hd3 3 3 00..03..00..00..00 /tmp
hd2 29 29 00..00..17..12..00 /usr
hd4 13 13 00..00..13..00..00 /
hd8 1 1 00..00..01..00..00 N/A
hd6 8 8 00..00..00..08..00 N/A
hd5 1 1 01..00..00..00..00 N/A
hd9var 2 2 00..00..02..00..00 /var
hd10opt 2 2 00..00..02..00..00 /opt
Notes:
9-96 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
List a Physical Volume Partition Map
# lspv -p hdisk0
hdisk0:
PP RANGE STATE REGION LV NAME TYPE MOUNT POINT
1-1 used outer edge hd5 boot N/A
2-31 used outer edge hd2 jfs /usr
32-32 free outer edge
33-40 used outer middle hd6 paging N/A
41-64 free outer middle
65-65 used center hd8 jfslog N/A
66-66 used center hd4 jfs /
67-73 used center hd2 jfs /usr
74-74 used center hd9var jfs /var
75-76 used center hd3 jfs /tmp
77-77 used center hd1 jfs2 /home
78-84 used center hd2 jfs /usr
85-92 used center paging00 paging N/A
93-95 used center hd10opt jfs /opt
96-159 used inner middle hd2 jfs /usr
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-97
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
9-98 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty partitions per physical volume for this volume group changes to factor multiplied by
1016.
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-99
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. A scalable volume group can contain up to ____ disks
and ____ logical volumes.
2. (True or False) Each volume group has a unique
identifier.
3. (True or False) Disks can be added to an existing
volume group.
4. The ____ command can be used to create a logical
volume.
5. (True or False) No LVM information is stored outside of
the ODM.
Notes:
9-100 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Exercise: The Logical Volume Manager (LVM)
Exercise 7
Notes:
Copyright IBM Corp. 2000, 2005 Unit 9. The Logical Volume Manager (LVM) 9-101
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Summary
Notes:
9-102 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center AIX 5L Version 5.3 System Management Concepts:
Operating System and Devices
Info Center AIX 5L Version 5.3 System Management Guide:
Operating System and Devices
Info Center AIX 5L Version 5.3 Commands Reference
Redbooks AIX Storage Management Redbook (GG24-4484)
Redbooks Logical Volume Manager from A to Z: Introduction and
Concepts Redbook (SG24-5432)
Redbooks Logical Volume Manager from A to Z: Troubleshooting
and Commands Redbook (SG24-5433)
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Set up mirroring appropriate to your needs
Describe the quorum mechanism
Explain the physical volume states used by LVM
Replace a disk under different circumstances
Export and import volume groups
Notes:
Introduction
This unit presents details regarding LVM concepts and capabilities not discussed in
detail in previous units, and it explains many disk management procedures that are very
important for any AIX 5L system administrator.
10-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
hdisk1
Mirrored
hdisk2 Logical
Volume
Notes:
Role of VGSA
The information about the mirrored partitions is stored in the VGSA, which is contained
on each disk. In the example shown on the visual, we see that logical partition 5 points
to physical partition 5 on hdisk0, physical partition 8 on hdisk1 and physical partition 9
on hdisk2.
10-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Stale Partitions
hdisk0
Mirrored
Logical
hdisk1
Volume
Notes:
10-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
10-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty 5. Do not change the default entry for Allocate each logical partition copy on
a SEPARATE physical volume?, which is yes. Otherwise you would mirror on the
same disk, which makes no sense. If you leave the default entry of yes and no
separate disk is available, mklvcopy will fail.
6. The terms Mirror Write Consistency and Scheduling Policy are explained in the next
few pages.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1. hdisk0 1 ms
scsi0
3 ms write()
2. hdisk1
scsi1
8 ms Mirrored
3. hdisk2
scsi2
Logical
Volume
Notes:
Write operations
The sequential scheduling policy performs writes to multiple copies in order. The
multiple physical partitions representing the mirrored copies of a single logical partition
are designated primary, secondary, and tertiary.
In sequential scheduling, the physical partitions are written to in sequence; the system
waits for the write operation for one physical partition to complete before starting the
write operation for the next one.
The write() operation of the application must wait until all three partitions are written to
the disk. This decreases the performance but increases availability. In case of a total
disk failure (for example, due to a power loss), there will always be a good copy.
10-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Mirrored
hdisk2
8 ms scsi2 Logical
Volume
Notes:
Write operations
The parallel scheduling policy starts the write operation to all copies at the same time.
When the write operation that takes the longest to complete finishes (in the example on
the visual, the one that takes 8 milliseconds), the write() from the application
completes.
Read operations
Specifying mirrored logical volumes with a parallel scheduling policy may increase
overall performance due to a common read/write ratio of 3:1 or 4:1. With sequential
policy, the primary copy is always read; with parallel policy, the copy that's best
reachable is used. On each read, the system checks whether the primary is busy. If it is
not busy, the read is initiated on the primary. If the primary is busy, the system checks
the secondary. If it is not busy, the read is initiated on the secondary. If the secondary is
busy, the read is initiated on the copy with the least number of outstanding I/Os.
10-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Parallel/round-robin policy
The parallel/round-robin policy alternates reads between the copies. This results in
equal utilization for reads even when there is more than one I/O outstanding at a time.
Writes are performed concurrently.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Problem:
Parallel scheduling policy and ...
... system crashes before the writes to all mirrors have
been completed
Mirrors of the logical volume are in an inconsistent state
Notes:
10-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Option Description
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Option Description
syncvg -f -l LVname
10-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Adding Mirrors to Existing LVs (mklvcopy)
Add Copies to a Logical Volume
[Entry Fields]
Logical volume NAME [hd2]
NEW TOTAL number of logical partition 2
copies
PHYSICAL VOLUME names [hdisk1]
POSITION on physical volume edge
RANGE of physical volumes minimum
MAXIMUM NUMBER of PHYSICAL VOLUMES [32]
to use for allocation
Allocate each logical partition copy yes
on a SEPARATE physical volume?
File containing ALLOCATION MAP []
SYNCHRONIZE the data in the new no
logical partition copies?
Notes:
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
10-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Mirroring rootvg
hdisk0 hdisk1
1. extendvg 5. bosboot -a
2. chvg -Qn 6. bootlist
3. mirrorvg -s 7. shutdown -Fr
4. syncvg -v 8. bootinfo -b
Notes:
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- If you use one mirror disk, be sure that a quorum is not required for varyon:
# chvg -Qn rootvg
- Add the mirrors for all rootvg logical volumes:
# mklvcopy hd1 2 hdisk1
# mklvcopy hd2 2 hdisk1
# mklvcopy hd3 2 hdisk1
# mklvcopy hd4 2 hdisk1
# mklvcopy hd5 2 hdisk1
# mklvcopy hd6 2 hdisk1
# mklvcopy hd8 2 hdisk1
# mklvcopy hd9var 2 hdisk1
# mklvcopy hd10opt 2 hdisk1
(If you have other logical volumes in your rootvg, be sure to create copies for them
as well.)
An alternative to running multiple mklvcopy commands is to use mirrorvg. This
command was added in AIX V4.2 to simplify mirroring VGs. The mirrorvg
command by default will disable quorum and mirror the existing LVs in the specified
VG. To mirror rootvg, use the command:
# mirrorvg -s rootvg
- Now synchronize the new copies you created:
# syncvg -v rootvg
- As we want to be able to boot from different disks, we need to use bosboot:
# bosboot -a
As hd5 is mirrored, there is no need to do it for each disk.
- Update the boot list. In case of a disk failure, we must be able to boot from different
disks.
# bootlist -m normal hdisk1 hdisk0
# bootlist -m service hdisk1 hdisk0
- Reboot the system
# shutdown -Fr
- Check that the system boots from the first boot disk.
# bootinfo -b
10-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Mirroring Volume Groups (mirrorvg)
Mirror a Volume Group
[Entry Fields]
VOLUME GROUP name rootvg
Mirror sync mode [Foreground]
PHYSICAL VOLUME names [hdisk1]
Number of COPIES of each logical 2
partition
Keep Quorum Checking On? no
Create Exact LV Mapping? no
Notes:
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
10-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
VGDA Count
Notes:
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
10-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Quorum Not Available
datavg
hdisk1 hdisk2
Notes:
Introduction
What happens if quorum checking is enabled for a volume group and a quorum is not
available?
Consider the following example (illustrated on the visual and discussed in the following
paragraphs): In a two-disk volume group datavg, the disk hdisk1 is not available due to
a hardware defect. hdisk1 is the disk that contains the two VGDAs; that means the
volume group does not have a quorum of VGDAs.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
10-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Nonquorum Volume Groups
With single mirroring, always disable the quorum:
chvg -Qn datavg
varyoffvg datavg
varyonvg datavg
Notes:
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
10-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Forced Varyon (varyonvg -f)
datavg
ved"
"remo hdisk1 hdisk2
# varyonvg -f datavg
Failure accessing hdisk1. Set PV STATE to removed.
Volume group datavg is varied on.
Notes:
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Quorum checking on
With Quorum Checking On, you always need > 50% of the VGDAs available (except to
vary on rootvg).
10-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Physical Volume States
varyonvg VGName
active
Q
losuoru
um t? m
uor k?
Q o
missing missing
varyonvg -f VGName
Hardware
Repair
removed
Hardware Repair
followed by:
varyonvg VGName
chpv -v a hdiskX
removed
Notes:
Introduction
This page introduces physical volume states (not device states!). Physical volume
states can be displayed with lsvg -p VGName.
Active state
If a disk can be accessed during a varyonvg it gets a PV state of active.
Missing state
If a disk can not be accessed during a varyonvg, but quorum is available, the failing
disk gets a PV state missing. If the disk can be repaired, for example, after a power
failure, you just have to issue a varyonvg VGName to bring the disk into the active state
again. Any stale partitions will be synchronized.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Removed state
If a disk cannot be accessed during a varyonvg and the quorum of disks is not
available, you can issue a varyonvg -f VGName, a forced vary on of the volume group.
The failing disk gets a PV state of removed, and it will not be used for quorum checks
any longer.
10-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Yes
Disk mirrored? Procedure 1
No
Yes
Disk still working? Procedure 2
No
Volume group
No
Procedure 3
lost?
rootvg Not rootvg
Yes
Procedure 4 Procedure 5
Notes:
Flowchart
Before starting the disk replacement, always follow the flowchart that is shown in the
visual. This will help you whenever you have to replace a disk.
1. If the disk that must be replaced is completely mirrored onto another disk, follow
procedure 1
2. If a disk is not mirrored, but still works, follow procedure 2
10-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty 3. If you are absolutely sure that a disk failed and you are not able to repair the
disk, do the following:
- If the volume group can be varied on (normal or forced), use procedure 3
- If the volume group is totally lost after the disk failure, that means the volume
group could not be varied on (either normal or forced)
If the volume group is rootvg, follow procedure 4
If the volume group is not rootvg follow procedure 5
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Disk state
This procedure requires that the disk state of the failed disk be either missing or
removed. Use lspv hdiskX to check the state of your physical volume. If the disk is
still in the active state, you cannot remove any copies or logical volumes from the failing
disk. In this case, one way to bring the disk into a removed or missing state is to run the
reducevg -d command or to do a varyoffvg and a varyonvg on the volume group by
rebooting the system.
Disable the quorum check if you have only two disks in your volume group.
10-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
10-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty 3. Before executing the next step, it is necessary to distinguish between the rootvg
and a non-rootvg volume group.
- If the disk that is replaced is in rootvg, execute the steps that are shown on
the visual Procedure 2: Special Steps for rootvg.
- If the disk that is replaced is not in the rootvg, use the migratepv command:
# migratepv hdisk_old hdisk_new
This command moves all logical volumes from one disk to another. You can
do this during normal system activity. The command migratepv requires that
the disks are in the same volume group.
4. If the old disk has been completely migrated, remove it from the volume group.
Use either the SMIT fastpath smit reducevg or the reducevg command.
5. If you need to remove the disk from the system, remove it from the ODM using
the rmdev command as shown. Finally, remove the physical disk from the
system.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rootvg 1
hdiskX 2
hdiskY
Notes:
10-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty If the disk contains the boot logical volume, migrate the logical volume to the
new disk and update the boot logical volume on the new disk. To avoid a
potential boot from the old disk, clear the old boot record by using the
chpv -c command. Then, change your boot list:
# migratepv -l hd5 hdiskX hdiskY
# bosboot -ad /dev/hdiskY
# chpv -c hdiskX
# bootlist -m normal hdiskY
If the disk contains the primary dump device, you must deactivate the dump
before migrating the corresponding logical volume:
# sysdumpdev -p /dev/sysdumpnull
- Migrate the complete old disk to the new one:
# migratepv hdiskX hdiskY
If the primary dump device has been deactivated, you have to activate it
again:
# sysdumpdev -p /dev/hdX
4. After the disk has been migrated, remove it from the root volume group.
# reducevg rootvg hdiskX
5. If the disk must be removed from the system, remove it from the ODM (use the
rmdev command), shut down your AIX, and remove the disk from the system
afterwards.
# rmdev -l hdiskX -d
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
10-42 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
hdiskX
2. Boot in maintenance mode
datavg Contains OS
logical
volumes
hdiskZ
mksysb
Notes:
Procedure steps
Follow these steps:
1. Replace the bad disk and boot your system in maintenance mode
2. Restore your system from a mksysb tape
10-44 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty If any rootvg file systems were not mounted when the mksysb was made, those file
systems are not included on the backup image. You will need to create and restore
those as a separate step.
If your mksysb tape does not contain user volume group definitions (for example, you
created a volume group after saving your rootvg), you have to import the user volume
group after restoring the mksysb tape. For example:
# importvg -y datavg hdisk9
Only one disk from the volume group (in our example hdisk9), needs to be selected.
Export and import of volume groups is discussed in more detail in the next topic.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
2. Check /etc/filesystems
hdiskX
3. Remove bad disk from ODM and the system:
# rmdev -l hdiskX -d
Notes:
Procedure steps
Follow these steps:
1. To fix this problem, export the volume group from the system. Use the command
exportvg as shown. During the export of the volume group, all ODM objects that
are related to the volume group will be deleted.
2. Check your /etc/filesystems. There should be no references to logical volumes
or file systems from the exported volume group.
10-46 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty 3. Remove the bad disk from the ODM (Use rmdev as shown). Shut down your
system and remove the physical disk from the system.
4. Connect the new drive and boot the system. The cfgmgr will configure the new
disk.
5. If you have a volume group backup available (created by the savevg command),
you can restore the complete volume group with the restvg command (or the
SMIT fastpath smit restvg). All logical volumes and file systems are recovered.
If you have more than one disk that should be used during restvg, you must
specify these disks:
# restvg -f /dev/rmt0 hdiskY hdiskZ
Refer to the entries for savevg and restvg in the AIX 5L Version 5.3 Commands
Reference (or the corresponding man pages) for more information about the
restvg and savevg commands.
6. If you have no volume group backup available, you have to re-create everything
that was part of the volume group.
Re-create the volume group (mkvg or smit mkvg), all logical volumes (mklv or
smit mklv) and all file systems (crfs or smit crfs).
Finally, restore the lost data from backups, for example with the restore
command or any other tool you use to restore data in your environment.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
rootvg - Migration
hdiskY hdiskX
Fix:
Check bootlist (SMS menu)
Check bootlist (bootlist)
Re-create boot logical volume (bosboot)
Copyright IBM Corporation 2005
Notes:
10-48 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Frequent Disk Replacement Errors (2 of 4)
VGDA:
PVID: PVID: ...
datavg ...221... ...555...
physical:
...221...
hdisk4 hdisk5 ...555...
ODM:
CuAt:
name = "hdisk4"
hdisk5 is removed from ODM and attribute = "pvid"
from the system, but not from the value = "...221..."
...
volume group: CuAt:
name = "hdisk5"
# rmdev -l hdisk5 -d attribute = "pvid"
value = "...555..."
...
Copyright IBM Corporation 2005
Notes:
The problem
Another frequent error occurs when the administrator removes a disk from the ODM (by
executing rmdev) and physically removes the disk from the system, but does not
remove entries from the volume group descriptor area (VGDA).
The VGDA stores information about all physical volumes of the volume group. Each
disk has at least one VGDA.
Disk information is also stored in the ODM, for example, the physical volume identifiers
are stored in the ODM class CuAt.
Note: Throughout this discussion the physical volume ID (PVID) is abbreviated in the
visuals for simplicity. The physical volume ID is actually 32 characters.
What happens if a disk is removed from the ODM but not from the volume group?
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
VGDA:
...
PVID:
datavg ...221...
physical:
...221...
...555...
hdisk4 !!!
ODM:
# rmdev -l hdisk5 -d
CuAt:
name = "hdisk4"
Fix:
attribute = "pvid"
value = "...221..."
# reducevg datavg ...555... ...
Notes:
The fix
After removing a disk from the ODM, there is still a reference in the VGDA of the other
disks in the volume group of the removed disk. In early AIX versions, the fix for this
problem was difficult. You had to add ODM objects that described the attributes of the
removed disk.
This problem can now be fixed by executing the reducevg command. Instead of
specifying the disk name, the physical volume ID of the removed disk is specified.
Execute the lspv command to identify the missing disk. Write down the physical
volume ID of the missing disk and compare this ID with the contents of the VGDA. Use
the following command to query the VGDA on a disk:
# lqueryvg -p hdisk4 -At (Use any disk from the volume group)
If you are sure that you found the missing PVID, pass this PVID to the reducevg
command.
10-50 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Frequent Disk Replacement Errors (4 of 4)
# lsvg -p datavg
ODM failure ! unable to find device id
...734... in device
configuration database
ODM problem in No
rootvg? Export and import
volume group
Yes
rvgrecover
Notes:
ODM failure
After an incorrect disk replacement, you might detect ODM failures. For example, when
issuing the command lsvg -p datavg, a typical error message could be:
unable to find device id 00837734 in device configuration database
In this case, a device could not be found in the ODM.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
10-52 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The scenario
The exportvg and importvg commands can be used to fix ODM problems. These
commands also provide a way to transfer data between different AIX systems. This
visual provides an example of how to export a volume group.
The disk, hdisk9, is connected to the system moon. This disk belongs to the myvg
volume group. This volume group needs to be transferred to another system.
10-54 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty 2. When all logical volumes are closed, use the varyoffvg command to vary off the
volume group.
3. Finally, export the volume group, using the exportvg command. After this point
the complete volume group (including all file systems and logical volumes) is
removed from the ODM.
4. After exporting the volume group, the disks in the volume group can be
transferred to another system.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
myvg
Notes:
10-56 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty In AIX V4.3 and subsequent releases, the volume group is automatically varied
on.
3. Finally, mount the file systems.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
hdisk3
myvg
lv 1 0
# importvg -y myvg hdisk3
lv11
loglv importvg: changing LV name lv10 to fslv00
01 importvg: changing LV name lv11 to fslv01
hdisk2
datavg
importvg can also accept the PVID in place of the hdisk name
Copyright IBM Corporation 2005
Notes:
10-58 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
importvg and Existing File Systems (1 of 2)
/dev/lv10: /home/sarah /dev/lv23: /home/peter
/dev/lv11: /home/michael /dev/lv24: /home/michael
# umount /home/michael
# mount -o log=/dev/loglv01 /dev/lv24 /home/michael
Notes:
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
If the file system type is jfs2, you have to specify this as well
(-V jfs2). You can get all this informations by running the command
getlvcb lv24 -At
Another method is to add a new stanza to the /etc/filesystems file. This is covered in
the next visual.
10-60 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
importvg and Existing File Systems (2 of 2)
# vi /etc/filesystems
/dev/lv10: /home/sarah
/home/michael: /dev/lv11: /home/michael
dev = /dev/lv11
vfs = jfs /dev/loglv00: log device
log = /dev/loglv00
mount = false datavg
options = rw
account = false
# mount /home/michael
# mount /home/michael_moon Mount point must exist!
Copyright IBM Corporation 2005
Notes:
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- account specifies whether the file system should be processed by the accounting
system. A value of false indicates no accounting.
Before mounting the file system /home/michael_moon, the corresponding mount point
must be created.
10-62 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
importvg -L (1 of 2)
moon
lv1
0
lv11
No exportvg !!!
loglv01
hdisk9
myvg
mars
lv10
# importvg -y myvg hdisk3 lv11
# mklv lv99 myvg logl
v0
lv99 1
hdisk3
myvg
Copyright IBM Corporation 2005
Notes:
The scenario
Lets discuss an example:
- On system moon, a volume group myvg exists which contains three logical
volumes: lv10, lv11, and loglv01.
- The volume group resides on one disk, hdisk9, which is now moved to another
system, mars. Note that we do not export myvg on system moon!
- The myvg volume group is now imported on system mars, by executing the
importvg command. Additionally, a new logical volume, lv99 is created in myvg.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- The disk that contains the volume group myvg, plus the newly created logical
volume lv99 is now moved back to the system moon.
Because we did not export the volume group myvg on moon, we cannot import the
volume group again. Now, how can we fix this problem? This is shown on the next
visual.
10-64 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
importvg -L (2 of 2)
moon
hdisk9
lv10
lv11
loglv
01
myvg
"Learn about possible changes!"
Notes:
The solution
To import an existing volume group, the importvg command has the option -L.
In our example, the following command must be executed to import the volume group
myvg:
# importvg -L myvg hdisk9
After executing this command, the new logical volume lv99 will be recognized by the
system.
The volume group must not be active. Additionally, the volume group is not
automatically varied on, which is a difference from a normal importvg.
The importvg -L command will fail if a logical volume name clash is detected.
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. (True or False) A mirror can be added to an existing logical
volume.
2. If a volume group consists of more than ________ disks, each
disk will contain one VGDA.
3. If a disk can be accessed during a varyonvg, it gets a PV
state of ________ .
4. Although everything seems to be working fine, you detect error
log entries for disk hdisk0 in your rootvg. The disk is not
mirrored to another disk. You decide to replace this disk.
Which procedure would you use to migrate this disk?
_____________________________________________
_____________________________________________
5. (True or False) The exportvg and importvg commands
provide a way to transfer data between different AIX systems.
Notes:
10-66 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Exercise: Storage Management with LVM
Exercise 8
Notes:
Copyright IBM Corp. 2000, 2005 Unit 10. Storage Management with LVM 10-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Summary
Notes:
10-68 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center AIX 5L Version 5.3 System Management Concepts:
Operating System and Devices
Info Center AIX 5L Version 5.3 System Management Guide:
Operating System and Devices
Info Center AIX 5L Version 5.3 Commands Reference
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Describe journaled file system (JFS) and enhanced
journaled file system (JFS2) features
Add a JFS or JFS2 file system
Change characteristics of a file system
Add a RAM file system
Add a UDF file system on a DVD-RAM
Notes:
11-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Logical Volumes and File Systems
A logical volume may contain a journaled file system (JFS) or
enhanced journaled file system (JFS2)
A logical volume may contain (instead) a journal log
A logical volume may also be used for:
Paging space (/dev/hd6)
Boot logical volume (/dev/hd5)
Dump device
Nothing (raw logical volume)
Notes:
Introduction
When you install AIX 5L, you automatically create one volume group (rootvg) which
consists of a base set of logical volumes required to start the system. rootvg contains
such things as paging space, a journal log, and boot data, each usually in its own
separate logical volume.
As previously noted, you can create additional logical volumes with the mklv command
or go through the SMIT menus. This command allows you to specify the name of the
logical volume and to define its characteristics.
Logical volumes are used to contain file systems or other items, as described in the
material that follows.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Journal log
A journal log is a logical volume where (by default) changes made to a JFS or JFS2 file
system structure are written until such time as the structures are updated on disk.
Journaled file systems and enhanced journaled file systems are discussed in greater
detail later in the course.
Paging space
Paging space is fixed disk storage for information that is resident in virtual memory but
is not currently being maintained in real memory.
Dump device
When you install AIX 5L, the dump device is automatically configured for you. By
default, the primary device is /dev/hd6, which is the paging logical volume, and the
secondary device is /dev/sysdumpnull.
11-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Supported File System Types
Journaled File System (JFS)
Enhanced Journaled File System (JFS2)
CD-ROM File System (CDRFS)
DVD-ROM File System (UDFS)
Network File System (NFS)
Common Internet Filesystem (CIFS)
Proc File System (PROCFS)
Notes:
Introduction
As you know, a file system is a directory hierarchy for storing files. It has a root directory
and subdirectories. On an AIX 5L system (as on other UNIX and UNIX-like systems),
the various file systems are joined together so that they appear as a single file tree with
one root. Many file systems of each type can be created.
Because the available storage is divided into multiple file systems, data in one file
system could be on a different area of the disk from data of another file system.
Because file systems are of a fixed size, file system full errors can occur when that file
system has become full. Free space in one file system cannot automatically be used by
an alternate file system that resides on the same physical volume.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
11-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Standard File Systems in AIX
hd4
/ (root)
home sbin opt lpp proc usr dev tftpboot var mnt etc tmp
/ / / / /
Notes:
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- /var = /dev/hd9var
Variable spool and log files. The files in this file system vary considerably depending
on system activity.
- /home = /dev/hd1
Users' home directories (was /u in earlier versions of AIX). This is traditionally where
user data files are stored.
- /tmp = /dev/hd3
Space accessible to all users for temporary files and work space. Should be cleared
out frequently.
- /opt = /hd10opt
Special file system to store freeware files.
- /proc = /proc
Special pseudo file system kept in memory to support threads, or light weight
processes. This file system is not designed to store user files. It is a type of file
system which is different from a journaled file system.
11-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
/etc/filesystems
/:
dev = /dev/hd4
vol = root
mount = automatic
check = false
vfs = jfs
log = /dev/hd8
type = bootfs
/home:
dev = /dev/hd1
vol = /home
mount = true
check = true
vfs = jfs
log = /dev/hd8
/home/team01:
dev = /dev/fslv00
vfs = jfs2
log = /dev/loglv00
mount = true
options = rw
account = false
Copyright IBM Corporation 2005
Notes:
What is /etc/filesystems?
The /etc/filesystems file documents the layout characteristics, or attributes of file
systems. It is in a stanza format which means a resource is named followed by a colon
and a listing of its attributes in the form of attributes = value.
Each stanza in the /etc/filesystems file names the directory where the file system is
normally mounted.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
vol Used by the mkfs command when initiating the label on a new file
system.
mount Used by the mount command to determine whether a file system
should be mounted by default. Possible values are:
automatic File system mounted automatically at system startup.
true File system mounted by the mount all command.
This command is issued during system initialization to
automatically mount such file systems.
false File system will not be automatically mounted.
check Used by the fsck command to determine the default file systems to be
checked. True enables checking.
vfs Specifies the type of mount. For example, vfs=jfs2.
log The device to which log data is written, as the file system is modified.
(This option is only valid for journaled file systems).
type Used to group together related file systems which can all be mounted
with the mount -t command.
account Used to determine the file systems to be processed by the accounting
system.
11-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Structure of a Journaled File System
Superblock
inodes
Indirect
Data Blocks
Blocks
Superblock
File system size and identification
Free list, fragment size, nbpi
inodes
File size, ownership, permissions, times
Pointers to data blocks
Blocks
Data blocks contain data
Indirect blocks contain pointers to data blocks
Notes:
Unit of allocation
An individual file within a file system will, by default, have units allocated to it in blocks
of 4096 bytes. (This may change if you have implemented fragmentation or large files -
both of which will be discussed later.)
Some AIX commands often report file sizes in units of 512 bytes to remain compatible
with other UNIX file systems. This is independent of the actual unit of allocation.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Superblock
The first addressable logical block on the file system is the superblock. The superblock
contains information such as the file system name, size, number of inodes, and
date/time of creation.
The superblock is critical to the file system and, if corrupted, prevents the file system
from mounting. For this reason a backup copy of the superblock is always written in
block 31.
Inodes
Immediately following the superblock are inodes which contain identifying information
for files, such as the file type, size, permissions, user/group/owner, and
create/modification and last access dates. They also contain pointers to the data blocks
for fragment addresses which hold the data.
Indirect blocks
For larger files the system creates sets of indirect blocks filled with data block
addresses to point to the data block or fragments which hold the data.
11-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Structure of an Inode
permissions
Contents of an inode
no. of links
type of file
user ID
group ID
file size
addresses of blocks
time modified
inode for file1 time accessed
time changed
access control information
reserved other
$ ls -li /home/team01
2132 drwxr-xr-x 2 team01 staff 512 May 2 14:33 c
2136 drwxr-xr-x 2 team01 staff 512 May 2 14:33 doc
2141 -rw-r--r-- 1 team01 staff 28 May 16 10:11 Manuals
Notes:
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
4096 bytes
Fragmentation enabled 1024 1024
2000 bytes
File size = 2000 bytes 1024 1024
Fragment size = 1024 bytes
These free fragments can
be used by other files
Notes:
Use of fragmentation
Fragmentation provides a way to allocate pieces (or fragments) of a 4 KB logical block
to files and directories. Fragment support is helpful for small user files and directories.
JFS fragment support provides a view of the file system as a contiguous series of
fragments rather than logical disk blocks.
Fragment support applies to the last direct block of small user files and directories and
long symbolic links.
Fragment size
Fragment size is specified for a file system at creation time. The allowable fragment
size for JFS file systems are 512, 1024, 2048 and 4096 bytes. The default fragment
size is 4096 bytes.
11-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty Different file systems can have different fragment sizes, but only one fragment size can
be used within a single file system. Different fragment sizes can also coexist on a single
system so that administrators can select a fragment size which is most appropriate for
each file system.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
File system
4096 4096 4096
INODES
1
128 bytes
2
Notes:
Use of inodes
In all UNIX implementations, when a file system is created, inodes are written to disk.
For each file or directory, one such data structure is used to describe information
pertaining to the file or directory. JFS also reserves a number of inodes for files and
directories in each file system that is created.
11-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Groupings of related 16 MB
16 MB
inodes and disk blocks
16 MB agsize
16 MB
64 MB
Groupings of related 64 MB
inodes and disk blocks 64 MB agsize
64 MB
Notes:
11-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty Relationship between allowable NBPI values and allocation group size
The allowable NBPI values are dependent on the allocation group size (agsize). For
example, for an agsize value of 8 MB, the only allowable NBPI values are 512, 1024,
2048, 4096, 8192 and 16384 bytes. If you were to double the agsize from 8 MB to 16
MB, the range of NBPI values also doubles to 1024, 2048, 4096, 8192, 16384 and
32768 bytes.
Refer to the table below for more details.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
11-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Additional considerations
In addition to increased disk I/O activity and free space fragmentation problems, file
systems using data compression have the following performance considerations:
- Degradation in file system usability arising as a direct result of the data
compression/decompression activity. If the time to compress and decompress data
is quite lengthy, it may not always be possible to use a compressed file system,
particularly in a busy commercial environment where data needs to be available
immediately.
- All logical blocks in a compressed file system, when modified for the first time, will
be allocated 4096 bytes of disk space, and this space is subsequently reallocated
when the logical block is written to disk. Performance costs are, therefore,
associated with this allocation, which does not occur in non-compressed file
systems.
- In order to perform data compression, approximately 50 CPU cycles per byte are
required and about 10 CPU cycles per byte are required for decompression. Data
compression, therefore, places a load on the processor by increasing the number of
processor cycles.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
1025
1026
1 Block 1027
1 4 KB .. 32 Blocks
2 . 128 KB
3 1055
4 1056
..
.
1023
1024
File
1057
132 MB 128 KB
1058
1059
.. 32 Blocks
. 128 KB
Notes:
11-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Journal Log
1
Write data
sync / fsync
1) Inode changes to log
2) COMMIT to log
3 3) Update inode 2
4) Sync log
Inodes 4
Data
block JFSLOG
Notes:
The jfslog
The jfslog for each volume group (such as the rootvg /dev/hd8) is a circular log. A
jfslog is created the size of one physical partition, one per each volume group. The
jfslog ensures file system integrity by writing all metadata information to the jfslog
immediately. It does this in the form of transactions, as illustrated in the diagram. File
system metadata consists of changes to the file system structure itself, such as
changes to the inodes and the free list.
11-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Inline logs
An inline log is a feature specific to JFS2 file systems that allows you to log directly to
the file system. The default inline log size is 0.4% of the logical volume size
(in AIX 5L V5.1).
The following table lists the default inline log size in AIX 5L V5.2 and later.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Compression Yes No
JFS2 uses extent based allocation for high performance and large file size.
.
Notes:
Introduction to JFS2
Enhanced Journaled File System (JFS2) is a file system type that was introduced in AIX
5L V5.1. It is based on JFS.
Reference information
The following reference information may be useful when you are reviewing the table on
the visual:
1 Petabyte (PB) = 1024 Terabytes (TB) = (250 ) bytes
1 Terabyte (TB) = 1024 Gigabytes (GB) = (240 ) bytes
1 Gigabyte (GB) = 1024 Megabytes (MB) = (230 ) bytes
1 Megabyte (MB) = 1024 Kilobytes (KB) = (220 ) bytes
1 Kilobyte (KB) = 1024 Bytes = (210 ) bytes
11-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Dynamic inodes
The traditional approach of reserving a fixed amount of space for inodes at file system
creation time required accurate estimates of the number of files that would reside in the
file system. If the estimate was high, disk space was wasted. If the estimate was low, no
files could be added until the file system was expanded. JFS2 dynamically allocates
space for inodes as needed, and frees the space when it is no longer required.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
The administration is similar to administration of the BSD Disk Quota System (refer to
http://www.openbsd.org for details) except that AIX added a new method for mapping
the users to the quotas. The quotas are assigned to a Limits class and then the users
are assigned to the class. This greatly simplifies the quota administration. AIX 5L V5.3
has added one new command to administer Limits classes - j2edlimit.
Migration
JFS file systems can co-exist on the same system with JFS2 file systems. However, to
fully utilize the JFS2 features, the following steps will be necessary:
- Backup JFS file system data
- Create new JFS2 file systems
- Restore JFS file system data to new JFS2 file systems
11-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Extended Attributes (EA)
Extensions to regular attributes
Two versions
AIX 5L V5.2 or earlier supported only EAv1
EAv1 used for local file permission ACLs
EAv2 improved (more and larger attributes)
JFS2 under AIX 5L V5.3 supports both versions
NFS V4 ACLs stored in JFS2 with EAv2
User Defined Information may be in EAv2
$ getea HenryVIII
EAName: Author
EAValue: Shakespeare
Notes:
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
EAv1 had restrictions of only eight attributes, 4 KB per attribute, 16-bit encoded names
and no support for user defined attributes. EAv2 effectively eliminates these restrictions.
The primary use for EAv2, currently, is the support for the NFS V4 ACL capability. The
discussion of NFS V4 ACLs is outside the scope of this class.
Managing attributes
AIX 5L V5.3 provides line commands to manage the user defined attributes. To set an
attribute value, you would use the setea command. To view a user attribute, you would
use the getea command.
11-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
File Systems
# smit fs
File Systems
Notes:
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# lsfs
Notes:
11-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty The data may be presented in line and colon (-c) or stanza (-l) format. It is possible to
list only the file systems of a particular virtual file system type (-v), or within a particular
mount group (-u). The -q option queries the superblock for the fragment size
information, compression algorithm, and the number of bytes per inode.
SMIT fastpath
The SMIT fastpath to get to the screen which accomplishes the same task as the lsfs
command is smit fs. This takes you to the File Systems SMIT menu. Select the List
All File Systems menu item. This selection does not have a dialog panel; it just runs
the lsfs command.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# mount
Notes:
11-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
11-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Working with
Journaled File Systems in SMIT
Journaled File Systems
Move cursor to desired item and press Enter.
Notes:
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
* LOGICAL VOLUME name +
* MOUNT POINT [ ]
Mount AUTOMATICALLY at system restart? no +
PERMISSIONS read/write +
Mount OPTIONS [ ] +
Start Disk Accounting ? no +
Fragment Size (bytes) 4096 +
Number of bytes per inode 4096 +
Allocation Group Size (MBytes) 8 +
Logical Volume for Log [ ] +
Figure 11-21. Add a Standard Journaled File System on a Previously Defined Logical Volume AW185.0
Notes:
11-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty Specifying which logical volume to use for the JFS log
AIX 5L V5.3 has added a new line to this panel: Logical Volume for Log. Prior to
AIX 5L V5.3, you needed to edit /etc/filesystems after creating the file if you wanted to
use anything other than the default /dev/hd8 logical volume for the log. With
AIX 5L V5.3, you can identify what log to use in the initial definition. Note that the jfslog
itself has to be previously defined and formatted.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
Volume group name rootvg
SIZE of file system
Unit Size Megabytes +
* Number of units [ ] #
* MOUNT POINT [ ]
Mount AUTOMATICALLY at system restart? no +
PERMISSIONS read/write +
Mount OPTIONS [ ] +
Start Disk Accounting ? no +
Fragment Size (bytes) 4096 +
Number of bytes per inode 4096 +
Allocation Group Size (MBytes) 8 +
Logical Volume for Log [ ] +
Notes:
11-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
algorithm Lempel-Ziv. If you do not want data compression, set this attribute value to
no, which is the default value.
- The allocation group size (-a ag= 8 | 16 | 32 | 64) is a grouping of inodes and
disk blocks within the file system. The default agsize is 8 MB. This attribute only
applies to AIX V4.2 and later.
11-42 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Working with Enhanced
Journaled File Systems (JFS2) in SMIT
Enhanced Journaled File Systems
Figure 11-23. Working with Enhanced Journaled File Systems (JFS2) in SMIT AW185.0
Notes:
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
* LOGICAL VOLUME name +
* MOUNT POINT [ ]
Mount AUTOMATICALLY at system restart? no +
PERMISSIONS read/write +
Mount OPTIONS [ ] +
Block Size (bytes) 4096 +
Logical Volume for Log [ ] +
Inline Log size (MBytes) [ ] #
Extended Attribute Format Version 1 +
Enable Quota Management no +
Figure 11-24. Add an Enhanced Journaled File System (JFS2) on a Previously Defined Logical Volume AW185.0
Notes:
11-44 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Add an Enhanced
Journaled File System (JFS2)
Add an Enhanced Journaled File System
[Entry Fields]
Volume group name rootvg
SIZE of file system
Unit Size Megabytes +
* Number of units [ ] #
* MOUNT POINT [ ]
Mount AUTOMATICALLY at system restart? no +
PERMISSIONS read/write +
Mount OPTIONS [ ] +
Block size (bytes) 4096 +
Logical Volume for Log [ ] +
Inline Log size (MBytes) [ ] #
Extended Attribute Format Version 1 +
Enable Quota Management no +
Notes:
11-46 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Mount a File System
[Entry Fields]
Notes:
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
11-48 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty mounted. (A normal user belonging to the system group can also mount file systems at
any time, provided the user has write permission to the mount point and read
permission on the root directory of the file system to be mounted.)
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Change/Show
Characteristics of a Journaled File System
Change/Show Characteristics of a Journaled File System
Notes:
11-50 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Changing permissions
The permissions associated with the file system may be changed (-p ro|rw), and the
change will be effective the next time the file system is mounted.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Change/Show Characteristics
of an Enhanced Journaled File System
Change / Show Characteristics of an Enhanced Journaled File System
[Entry Fields]
File system name /home
NEW mount point [/home]
SIZE of file system
Unit Size 512bytes +
* Number of units [32768] #
Mount GROUP [ ]
Mount AUTOMATICALLY at system restart ? yes +
PERMISSIONS read/write +
MOUNT OPTIONS [ ] +
Start Disk Accounting? no +
Block size (bytes) 4096
Inline Log? no
Inline Log size (MBytes) [ ]
Extended Attribute Format Version 1 +
Enable Quota Management no +
Notes:
11-52 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Dynamically Shrinking a JFS2 File System
Before: LP1 LP2
After:
LP1
Notes:
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Restrictions
There must be enough free space in the remaining physical partitions of the file system
to stored the file data and metadata structures being moved from the freed physical
partitions.
11-54 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Remove a Journaled File System
[Entry Fields]
FILE SYSTEM name +
Remove Mount Point no +
Notes:
Restrictions
In order to remove a file system, it must be unmounted from the overall file tree, and this
cannot be done if the file system is in use, that is, some user or process is using the file
system or has it as a current directory.
Effects of using rmfs command
The rmfs command removes any information for the file system from the ODM and
/etc/filesystems. When the file system is removed, the logical volume on which it
resides is also removed.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Syntax
The syntax of the rmfs command is:
rmfs [-r] [-i] FileSystem
-r Removes the mountpoint of the file system
-i Displays warning and prompts the user before removing the file system
Example:
# rmfs -r /home/george/myfs
11-56 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Add a RAM File System
Create a RAM disk of 4 MB
# mkramdisk 4M
/dev/rramdisk0
# mkdir /ramdisk
Notes:
Limitations
Use ramdisk only for data that can be lost. After each reboot, the ramdisk file system is
destroyed and must be rebuilt.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Using a UDF
Once you have created a UDF on a DVD-RAM, you can just treat it like a normal hard
disk. It enables you to read, write, delete, copy, move, mount, unmount and edit a file
within the DVD directory.
11-58 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-59
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
hd2
Notes:
11-60 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-61
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# df
Notes:
11-62 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-63
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/var/spool/*/*
$HOME/smit.log
$HOME/smit.script
$HOME/websm.log
$HOME/websm.script
Notes:
11-64 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty - Example 1:
# cat /dev/null > /var/adm/wtmp
- Example 2:
# > /etc/security/failedlogin
The file /var/adm/sulog can be edited directly.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-65
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
11-66 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-67
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# du /home | sort -r -n
624 /home
392 /home/fred
98 /home/tom
54 /home/mary
52 /home/liz
23 /home/suzy
2 /home/guest
1 /home/steve
Notes:
11-68 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
The -x flag
The -x flag/option is also very useful. When you use du -ax, the report only shows
information from the specified file system. This is the best way to determine what file is
filling a particular file system.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-69
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Fragmentation Considerations
4096 bytes
4096 bytes
With fragmentation
2000 bytes
Considerations to be made:
Disk space allocation
Disk space utilization
I/O activity
Free space fragmentation
Fragment allocation map
Notes:
11-70 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-71
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Options:
Notes:
11-72 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty Note: Sometimes the estimates for these items provided when running defragfs with
the -q or -r option indicate results different from what is actually done when defragfs
is run without any options.
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-73
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
The -p option
The -p (preen) option is used to check a file system and make only minor changes,
without bothering the user. When fsck is run under SMIT, this option is used.
11-74 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-75
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. Will the size of the file system change when the size of
the logical volume it is on is increased? _________
Notes:
11-76 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Exercise: Working with File Systems
Exercise 9
Notes:
Copyright IBM Corp. 2000, 2005 Unit 11. Working with File Systems 11-77
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Summary
Notes:
11-78 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center AIX 5L Version 5.3 System Management Concepts:
Operating System and Devices
Info Center AIX 5L Version 5.3 System Management Guide:
Operating System and Devices
Info Center AIX 5L version 5.3 Performance Management Guide
Info Center AIX 5L Differences Guide Version 5.3 Edition
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Define why paging space is required in AIX
List and monitor the paging space utilization of the system
Perform corrective actions to rectify too little or too much
paging space scenarios
Notes:
12-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
What Is Paging Space?
RAM = 256 MB
RAM Usage
Operating System Database TCP/IP 8 MB FREE
Current applications
Total = 248 MB
RAM Usage
New application
Operating System Database TCP/IP Application
needs RAM > 8 MB
4 KB 4 KB
Paging Space
Notes:
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Paging Space
Is a secondary storage area for over-committed memory
Holds inactive 4 KB pages on disk
Is not a substitute for real memory
Paging Space
Physical Memory
Notes:
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Sizing Paging Space
Created at installation up to twice the size of real memory
Amount needed is dependent on applications
Monitor paging space: lsps -a
Running low on paging space is bad
#
ksh: cannot fork no swap space
Notes:
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Paging Space Placement
Only one paging space per disk
Use disks with the least activity
Paging spaces roughly the same size
Do not extend paging space to multiple physical volumes
Use multiple disk controllers
Notes:
Introduction
Placement and size of your paging space will impact its performance. The following
material contains tips regarding placement and size of paging areas.
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Checking Paging Space
Check paging activity:
# lsps -a
Page Space Physical Volume Volume Group Size %Used Active Auto Type
hd6 hdisk0 rootvg 64MB 43 yes yes lv
paging00 hdisk2 rootvg 64MB 20 yes yes lv
Notes:
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Adding Paging Space
# smit mkps
[Entry Fields]
Volume group name rootvg
SIZE of paging space (in logical partitions) [4] #
PHYSICAL VOLUME name hdisk2 +
Start using this paging space NOW? yes +
Use this paging space each time the system is yes +
RESTARTED?
Notes:
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Change Paging Space
# smit chps
[Entry Fields]
Paging space name paging00
Volume group name rootvg
Physical volume name hdisk2
NUMBER of additional logical partitions [] #
Or NUMBER of logical partitions to remove [] #
Use this paging space each time the system is yes +
RESTARTED?
Notes:
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
The process chps goes through to decrease an active paging space is as follows:
Step Action
Create a new, temporary space from the same volume group as the
1
one being reduced
2 Deactivate the original paging space
3 Reduce the original paging space
4 Reactivate the original paging space
5 Deactivate the temporary space
The primary paging space (usually hd6) cannot be decreased below 32 MB.
When you reduce the primary paging space, a temporary boot image and a temporary
/sbin/rc.boot pointing to this temporary primary paging space are created to make sure
the system is always in a state where it can be safely rebooted.
These command enhancements are also available through the Web-based System
Manager, starting in AIX 5L V5.2.
12-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Remove Paging Space
Make inactive
# swapoff /dev/paging00
Notes:
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Problems with Paging Space
Paging space too small:
Dynamically increase the size by allocating more partitions
chps -s LogicalPartitions PagingSpace
Example:
# chps -s 1 paging00
Example:
# chps -d 1 paging00
Notes:
Overview
All ideas on this visual have already been considered. The visual simply pulls together
all the ideas discussed so far.
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Running lsps
Run lsps to monitor paging space activity. Keep good documentation so that you know
what is normal for that system.
A copy of /etc/swapspaces
Keep a copy of /etc/swapspaces so that you know what paging spaces are defined to
started at boot.
12-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Checkpoint
1. What conclusions regarding potential paging space problems can
you reach based on the following listing?
Page Physical Volume Size %Used Active Auto Type
Space Volume Group
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
2. True or False? The size of paging00 (in the above example) can
be dynamically decreased.
Copyright IBM Corporation 2005
Notes:
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise 10
Notes:
Introduction
This lab allows you to add, decrease, monitor, and remove paging space.
The exercise can be found in your Student Exercises Guide.
12-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Unit Summary
Notes:
Copyright IBM Corp. 2000, 2005 Unit 12. Paging Space 12-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
12-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center AIX System Management Concepts: Operating
System and Devices
Info Center AIX System Management Guide: Operating System
and Devices
SG24-5765 AIX 5L Differences Guide Version 5.2 Edition
SG24-5766 AIX 5L Differences Guide Version 5.3 Edition
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
List the different backup methods supported through SMIT
and on the command line
Create a customized installable system image backup
Notes:
13-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Backup Devices - Diskette
Drive
3 1/2-inch (1.44) 3 1/2-inch (2.88)
/dev/fdxl 720 KB 720 KB
/dev/fdxh 1.44 MB 2.88 MB
/dev/fdx.9 720 KB 720 KB
/dev/fdx.18 1.44 MB 1.44 MB
/dev/fdx.36 - 2.88 MB
Notes:
Introduction
Diskettes can be used to backup data. Of course, this media is only practical when
backing up small amounts of data.
The logical device name for a diskette drive is /dev/fdx. Your system most likely has
one diskette drive, fd0. When writing to a diskette, the highest density supported is the
default value. The chart shows there are multiple logical names associated with the
diskette drive that allow writing at different densities. To read the diskettes on a
low-density drive, you must write using the low-density settings.
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Commands
To format a diskette, use the format command. There is a -l options if you want to
format at low density.
The flcopy command is used to copy diskettes (similar to the DOS diskcopy
command).
Diskettes can also be formatted using DOS formatting with the command dosformat.
AIX can read from and write to DOS diskettes using dosread and doswrite. There is
also a dosdir to view the content of the diskette. To use these tools, the fileset
bos.dosutil must be installed.
13-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Backup Devices - Tape
4 mm DAT 1/2 - inch VXA
8 mm DLT QIC
/dev/rmtx no no yes
/dev/rmtx.1 no no no
/dev/rmtx.2 no yes yes
/dev/rmtx.3 no yes no
/dev/rmtx.4 yes no yes
/dev/rmtx.5 yes no no
/dev/rmtx.6 yes yes yes
/dev/rmtx.7 yes yes no
Copyright IBM Corporation 2005
Notes:
Tape technologies
The most common device used for backups are tapes. AIX supports a variety of tape
devices, tape subsystems and tape libraries. Here are some highlights of some of the
tape technologies:
- 4 mm DAT (Digital Audio Tape)
Can hold up to 40 GB of data with a data transfer rate of 6 MB/sec.
- 8 mm Tape
Can hold up to 40 GB of data with a data transfer rate of 6 MB/sec.
- Quarter Inch Cartridge (QIC)
Can hold up to 4 GB with a data transfer rate of 380 KB/sec.
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Device names
The tape devices use the logical device name of rmtx (raw magnetic tape). In the chart,
you see the seven additional logical names assigned to each tape device. These
names control tape device characteristics:
- Write at low capacity
- Retension the tape (fast forward and rewind before starting the operation)
- Rewind the tape at the finish of the operation
The most common devices that are used are rmtx and rmtx.1. For most tape
operations, high capacity and no retension are the norm. Whether or not you want to
rewind the tape, depends on your particular operation.
Tapes are formatted at the factory. Tape movement can be controlled using the tctl or
mt commands. If there two tape devices, tcopy allows tape to tape transfers. Details on
these commands are discussed later.
13-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Backup Device - Read/Write Optical Drive
Use with CD-ROM file system for read only operations
Use with journal file systems for read/write operation
For CD:
OEM CD-RW drive
Third-party CD burn software
(AIX Toolbox for Linux Applications)
For DVD:
Need 7210 DVD-RAM drive
No additional software needed for UDF format
Notes:
Introduction
AIX supports read/write optical drives as well as standard CD-ROM. The R/W Optical
drives support CD-ROM file systems and JFS file systems. If the optical drive is
mounted as a CD-ROM file system, it will be read only.
The optical drive volume group must be wholly contained on the single optical disk. It
cannot span beyond one optical drive.
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CD burner
To burn a backup image onto a CD (IS09660), you must install an OEM drive and
software that is capable of CD writes.
To find out what CD writers are supported examine:
/usr/lpp/bos.sysmgt/README.oem_cdwriters.
Two of the CD burner software packages that have been tested with AIX and are
provided on the AIX Toolbox for Linux Applications CD are mkisofs and cdrecord. You
may alternatively download the software from:
http://www.ibm.com/servers/aix/products/aixos/linux/download.html
Whatever software package is installed you will need to link their executables to the AIX
standard command names of /usr/sbin/mkrr_fs and /usr/sbin/burn_cd. For more
details refer to: /usr/lpp/bos.sysmgt/mkcd.README.
13-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Backup Device
7210 External DVD-RAM Drive
Writes DVD-RAM media
Reads DVD media in 2.6 GB, 4.7 GB, 5.2 GB and 9.4 GB
Supports CD-ROM media in Modes 1 or 2, XA, and CDDA
and audio formats
Reads multi-session disks, CD-R, CD-ROM, and CD-RW
disks
Loading tray accommodates 8 cm and 12 cm media
SCSI attachable
Notes:
Description
The IBM 7210 External DVD-RAM Drive Model 025 is a DVD-RAM drive designed to
provide a high performance storage solution. This self-powered standalone drive is
designed for the open systems environment, which includes the IBM iSeries, pSeries,
AS/400, and RS/6000 servers.
13-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
SMIT Backup Menus
System Storage Management (Physical and Logical)
Logical Volume Manager
File Systems
Files and Directories
System Backup Manager
Notes:
Backup menus
The visual shows the SMIT menus that have backup options. Note that the menus in
the visual do not show all the options for a given menu, only those that pertain to
backups.
Backups can also be performed using the Web-based System Manager.
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
13-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty - Saves striped logical volume attributes in AIX V4.2 and later
- Allows the user to restore single or multiple files from a system image
The volume group image is saved in backup format. The rootvg is created as an
installable image.
Non-interactive installation
If a system backup is being made to install another system or to reinstall the existing
system, a customer can predefine installation information so questions at installation
time are already answered. This keeps user interaction at the target node to a
minimum. The system backup and BOS Install interact through several files. mksysb
saves the data used by the installation through taking a snapshot of the current system
and its customized state.
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
13-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
vg_data stanza
The vg_data stanza contains information about the volume group. The
VG_SOURCE_DISK_LIST= field specifies the disks that BOS installation uses on a best
effort basis to place the volume group. If the EXACT_FIT= field is set to YES, the user is
warned before installation begins.
lv_data stanza
The lv_data stanza contains information about logical volumes. This type of data
stanza is also used to contain paging space information. Information about striped
logical volumes and large file enabled file systems are placed in this stanza in AIX V4.2
and later.
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
/bosinst.data creation
This file allows the administrator to specify the requirements at the target system and
how the user interacts with the target system. It provides flexibility by allowing different
target hardware to use the same backup image. The system backup utilities simply
copy the /bosinst.data into the second file in the rootvg on the mksysb tape. If this file
is not in the root directory, the /usr/lpp/bosinst/bosinst.template is copied to the
/bosinst.data.
The sample file shown in the visual has been condensed to highlight key areas. The
actual file is well documented with comments contained within the file.
13-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
target_disk_data stanza
The target_disk_data stanza contains variables for disks in the machine where the
program will install BOS. The default bosinst.data file has one target_disk_data
stanza, but you can add new stanzas to install BOS on multiple disks, one stanza for
each disk.
Multiple target_disk_data stanzas can exist. They define the disks that are to contain
the root volume group. Only one field (PVID, PHYSICAL_LOCATION, SAN_DISKID,
CONNECTION, LOCATION, SIZE_MB, HDISKNAME) must be non-null for BOS installation to
choose a disk. The order of precedence is PVID, PHYSICAL_LOCATION, SAN_DISKID,
then CONNECTION, then LOCATION, then SIZE_MB, and then HDISKNAME.
The field definitions are:
- LOCATION specifies a location code for the disk where the program will install BOS.
- SIZE_MB specifies the formatted size of the disk (in megabytes) where the program
will install BOS.
- HDISKNAME specifies the path name of the target disk.
- PVID specifies the physical volume identifier for the disk.
- PHYSICAL_ LOCATION provides a way to identify fibre channel disks during BOS
Install. The information in the PHYSICAL_LOCATION field supersedes the information
in the SAN_DISKID field.
- SAN_DISKID specifies the World Wide Port Name and a Logical Unit ID for fibre
channel-attached disks.
13-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty - CONNECTION specifies the combination of the parent attribute and the connwhere
attribute associated with a disk.
locale stanza
- The locale stanza contains variables for the primary language the installed
machine will use
- BOSINST_LANG specifies the language the installation program uses for prompts,
menus and error messages
- CULTURAL_CONVENTION specifies the primary locale to install
- MESSAGES specifies the locale for the messages catalogs to install
- KEYBOARD specifies the keyboard map to install
Unattended reinstallation
With both the /image.data and the /bosinst.data files created, the reinstallation of
AIX V4 and later can be made unattended.
The procedure to accomplish this is as follows:
1. Edit the bosinst.data file as follows:
a) Set CONSOLE=/dev/lft0 or CONSOLE=/dev/tty0 according to your system
b) Set PROMPT=no
c) Set EXISTING_SYSTEM_OVERWRITE=yes
d) Set RUN_STARTUP=no
2. Create the signature file:
echo "data" > signature
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
13-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
rootvg - Back Up the System
# smit sysbackup
Notes:
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
The SMIT screen shown in the visual, Back Up the System, only backs up mounted
file systems in rootvg. Use one of the other backup commands to backup other volume
groups.
EXCLUDE files?
This option excludes the files and directories listed in the /etc/exclude.rootvg file from
the system image backup.
13-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
mksysb Image
Notes:
Introduction
This visual shows the tape layout of a mksysb image.
mkinsttape image
The mkinsttape image contains two files:
- ./image.data holds the information needed to recreate the root volume group and its
logical volumes and file systems.
13-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty - ./bosinst.data contains the customizable installation procedures and dictates how
the BOS installation program will behave. This file allows for the non-interactive
installations.
- ./tapeblksz contains the block size setting of the tape drive used during the backup.
Dummy TOC
The dummy TOC is used to make mksysb tapes have the same number of files as the
BOS installation tapes.
rootvg data
The rootvg data contains all the data from the backup. This data is saved using the
backup command which is discussed shortly.
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
13-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Back Up a Volume Group to Tape/File
# smit savevg
Back Up a Volume Group to Tape/File
Type or select values in entry fields.
Press Enter AFTER making all desired changes.
[Entry Fields]
WARNING: Execution of the savevg command will
result in the loss of all material
previously stored on the selected
output medium.
* Backup DEVICE or FILE [] +/
* VOLUME GROUP to back up [] +
List files as they are backed up? no +
Generate new vg.data file? yes +
Create MAP files? no +
EXCLUDE files? no +
EXPAND /tmp if needed? no +
Disable software packing of backup? no +
Backup extended attributes? yes +
Number of BLOCKS to write in a single output [] #
(Leave blank to use a system default)
Verify readability if tape device no +
Back up Volume Group information files only? no +
F1=Help F2=Refresh F3=Cancel F4=List
F5=Reset F6=Command F7=Edit F8=Image
F9=Shell F10=Exit Enter=Do
Copyright IBM Corporation 2005
Notes:
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
13-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Restoring a mksysb (1 of 2)
Boot the system in install/maintenance mode:
Welcome to Base Operating System
Installation and Maintenance
1 Start Install Now With Default Settings
2 Change/Show Installation Settings and Install
>> 3 Start Maintenance Mode for System Recovery
Maintenance
1 Access A Root Volume Group
2 Copy a System Dump to Removable Media
3 Access Advanced Maintenance Functions
>> 4 Install from a System Backup
Notes:
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Restoring a mksysb (2 of 2)
Welcome to Base Operating System
Installation and Maintenance
Type the number of your choice and press Enter. Choice is indicated by >>.
1 Start Install Now With Default Settings
>> 2 Change/Show Installation Settings and Install
3 Start Maintenance Mode for System Recovery
Notes:
13-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
* Restore DEVICE or FILE [/dev/rmt0] +/
SHRINK the filesystems? no +
Recreate logical volumes and filesystems only no +
PHYSICAL VOLUME names [] +
(Leave blank to use the PHYSICAL VOLUMES listed
in the vgname.data file in the backup image)
Use existing MAP files? yes +
Physical partition SIZE in megabytes [] +#
(Leave blank to have the SIZE determined
based on disk size)
Number of BLOCKS to read in a single input [] #
(Leave blank to use a system default)
Alternate vg.data file [] /
(Leave blank to use vg.data stored in
backup image)
Notes:
13-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
mksysb image
packages
bundle file
cust script
bosinst.data
image.data
burn image
CD or DVD
Notes:
What is stored?
When creating a system backup on CD or DVD, it is actually creating a file system on
the disk. Within the file system, many things are stored.
The mksysb image file itself is stored (in backup format).
The files that would normally be placed in the second record of a mksysb tape also need
to be stored: bosinst.data and image.data.
If you want to be able to install additional software during the restore (such as device
drivers) you can place them in this file system as packages or additionally defined as
bundles.
Finally, you may want to run a customization script after the image restore to do
additional configuration.
13-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty When burning the file system onto a CD or DVD, using the ISO9660 standard, you need
to first build a burn image on the hard drive. Then, you need to actually burn that to the
disk.
When using ISO9660, you need to identify:
- Where to store the mksysb image
- Where to build the file structure
- Where to build the burn image
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
mksysb image
packages
bundle file
cust script
bosinst.data
image.data
UDF DVD
File system
Notes:
13-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
rootvg - Back Up the System to CD (ISO9660)
# smit mkcd
Back Up This System to CD
Notes:
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
The smit fastpath for the panel shown in the visual is smit mkdvd. When prompted,
choose the ISO9660 option.
The types of information to write to media and the mechanisms are about the same for
CD or DVD when using ISO9660 to first build the image and then burn it to the media.
13-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
rootvg - Back Up the System to UDF DVD
# smit mkdvd -> Select 2 UDF (Universal Disk Format)
Back Up This System to UDF DVD
Notes:
The smit fastpath for the panel shown in the visual is: smit mkdvd. When prompted,
choose the UDF option.
Backup volume groups in UDF (Universal Disk Format) format on DVD-RAM requires
only the space for the backup image:
1. Create backup image
2. Burn to media
This allows modification of files such as bosinst.data, image.data, and vgname.data.
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
You dont have the multiple types of information backed up for a non-rootvg volume
group as you did for the system backups, but the mechanisms are very similar when
using ISO9660.
13-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Back Up a Volume Group to ISO9660 DVD
# smit savevgdvd
Back Up a Volume Group to ISO9660 DVD
Type or select values in entry fields.
Press Enter AFTER making all desired changes.
[Entry Fields]
DVD-R or DVD-RAM Device [] +
* Volume Group to back up [] +
savevg creation options:
Create map files? no +
Exclude files? no +
Disable software packing of backup? no +
Backup extended attributes? yes +
File system to store savevg image [] /
File system to store DVD file structure [] /
File system to store final DVD images [] /
If file systems are being created:
Volume Group for created file systems [rootvg] +
Advanced Customization Options:
Remove final images after creating DVD? yes +
Create the DVD now? yes +
Debug output? no +
Backup Volume Group information files only? no +
Notes:
Overview
Backing up a non-rootvg volume group to ISO9660 DVD is similar to backing up a
rootvg volume group.
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
Backing up a non-rootvg volume group to UDF DVD is similar to backing up a rootvg
volume group.
13-42 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Back Up by Filename
backup -i [-q] [-p] [-v] [-f device]
-q Media is ready
-p Pack files which are less than 2 GB
-v Verbose - display filenames during backup
Notes:
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
13-44 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Back Up by Filename Examples
Example 1: Read input from a file
# cat listfile
/home/roy/file1
/home/roy/file2
/home/roy/file3
# backup -iqvf /dev/rmt0 < listfile
Notes:
Introduction
The list of files backup uses can be supplied by a file or by commands. The visual
provides a sample of each.
Example 1
In the first example, the file listfile contains the files you want to back up. That is fed
into the backup command by using a redirection (<).
Example 2
In the second example, there are two examples that can be used to back up the same
data using the find command to generate the file list. Both commands back up the files
stored in /home/roy. Even though both find examples save the same data, the
filenames will be stored differently.
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Types of pathnames
There are two types of filenames:
- Relative
- Full (or absolute)
The difference is that a full pathname shows the location referenced from the root
directory. Basically, the name starts with a slash (/). The relative pathname shows the
location referenced by the current directory. This distinction is important when you try to
recover the data.
Full pathname backups restore to the same location in the directory structure since their
position is referenced from the root directory. But, a relative pathname file is restored
based upon the current directory when the restore command is issued. Full pathnames
provide certainty of location and relative pathnames provided flexibility.
13-46 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Back Up a File or a Directory
# smit backfile
Notes:
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Syntax:
backup [-u] [-level] [-f device] filesystem
Notes:
13-48 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty -u option
The -u option causes backup to update the /etc/dumpdates file to record the date and
level of the last inode backup for that file system. This file holds file system backup
information for the backup command. The information included in this file is the name of
the file system, the level number of the last backup, and the date of the incremental
backup.
-level option
The -level option allows you to perform incremental backups. The -0 level backs up
all files in the file system. The -1 level backs up all files changed since the last -0
backup, and so on. (If you do not specify a level, -9 is assumed.)
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
This option will perform a backup by inode.
* FILESYSTEM to backup [] +/
* Backup DEVICE [/dev/fd0] +/
Backup LEVEL (0 for a full backup) [0] #
RECORD backup in /etc/dumpdates? no +
Backup extended attributes? yes +
Notes:
13-50 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
restore Command (1 of 2)
List files on media (verify the backup):
restore -T [-q] [-v] [-f device]
Notes:
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
13-52 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
restore Command (2 of 2)
Restores the file attributes without restoring the file contents:
restore -Pstring [-q] [-v] [-f device] [file1 file2 ...]
Notes:
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-53
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
[Entry Fields]
* Restore DEVICE [/dev/fd0] +/
* Target DIRECTORY [.] /
FILE or DIRECTORY to restore []
(Leave blank to restore entire archive.)
VERBOSE output? no +
Number of BLOCKS to read in a single input [] #
operation
Restore Extended Attributes? yes +
Notes:
13-54 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Checkpoint
1. What is the difference between the following two commands?
a) find /home/fred | backup -ivf /dev/rmt0
b) cd /home/fred; find . | backup -ivf /dev/rmt0
___________________________________________________
___________________________________________________
___________________________________________________
Notes:
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-55
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise 11
Notes:
Introduction
This exercise can be found in your Student Exercise Guide.
13-56 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Unit Summary
Notes:
Copyright IBM Corp. 2000, 2005 Unit 13. Backup and Restore 13-57
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
13-58 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
References
Info Center System Management Guide: Communications and
Networks
Info Center Communications Programming Concepts
Info Center AIX 5L Differences Guide Version 5.3 Edition,
Chapter 7. Networking
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Describe how the network is configured during AIX startup
Locate the AIX network configuration files
Describe name resolution concepts
Describe how to configure a DNS client
Describe IP routing concepts and how to configure static
routes
Use network status tools to gather information about the
network
Define static and dynamic routing and determine when its
appropriate to use each of these types of routing
Notes:
14-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty
TCP/IP Pseudo Device
Notes:
Introduction
AIX implements networking as a series of device drivers:
- inet0 device
- Network interface devices
- Network adapter devices
In the next few visuals, we will look at some of the network devices and show their
attributes. Dont worry about what all the attributes mean at this point. We will be
discussing some of these attributes later in the unit and you will get a chance to work
with them in the exercise.
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
TCP/IP
The TCP/IP protocols are implemented in a device driver called inet0. The inet0 device
has a number of attributes associated with it, such as the hostname, bootup_option,
and static routes.
14-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty
Network Adapters and Interfaces
Description Adapter Interface
Ethernet ent en
IEEE 802.3 ent et
Token Ring tok tr
Loopback -- lo
Serial Line Internet Protocol (SLIP) tty sl
Point to Point Protocol (PPP) tty pp
Serial Optical Channel Converter ops so
Block Channel Multiplexor cat ca
Asynchronous Transfer Mode (ATM) atm at
Fiber Distributed Data Interface (FDDI) fddi fd
SP Switch css css
Integrated Services Digital Network (ISDN) diva pp
X.25 sx25a xs
Copyright IBM Corporation 2005
Notes:
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
14-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty
Adapter Device Drivers
# lsdev -Cc adapter
. . .
ent0 Available 10-80 IBM 10/100 Mbps Ethernet PCI Adapter (23100020)
ent1 Available 10-88 IBM 10/100 Mbps Ethernet PCI Adapter (23100020)
. . .
#
# lsattr -El ent0
busio 0xfff000 Bus I/O address False
busintr 2 Bus interrupt level False
intr_priority 3 Interrupt priority False
tx_que_size 8192 TRANSMIT queue size True
rx_que_size 256 RECEIVE queue size True
rxbuf_pool_size 384 RECEIVE buffer pool size True
media_speed 100_Half_Duplex Media Speed True
. . .
Notes:
Adapter devices
Adapter devices allow us to configure the network adapter which is part of the physical
layer. Attributes for network adapters define the media speed, queue sizes, and so
forth.
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
TCP/IP Startup
AIX Initialization Network devices are configured by cfgmgr
rc.boot phase 1 cfgmgr runs configuration methods from Config_Rules
/usr/lib/methods/cfgrcnet configures inet0 and
the
rc.boot phase 2
network interfaces
cfgrcnet checks the bootup_option attribute of inet0
kernel restarts init
bootup_option=no (default)
cfgrcnet runs /etc/rc.net
(network configuration read from ODM)
init runs
rc.boot phase 3
bootup_option=yes
From /etc/inittab
cfgrcnet runs /etc/rc.bsdnet
(network configuration in rc.bsdnet)
init runs
/etc/rc.tcpip rc.tcpip starts selected network daemons:
from /etc/inittab dhcp
syslogd
lpd
init continues
sendmail
processing portmap
/etc/inittab inetd
...
Copyright IBM Corporation 2005
Notes:
Introduction
Now that weve looked at the basic components, lets take a look at how the network is
configured at boot time. When the system boots, the network is configured and started
in two steps:
- cfgmgr configures the devices
- /etc/rc.tcpip starts the network daemons
cfgmgr
During rc.boot phase 3, cfgmgr is run to configure the devices which were not
configured during phase 1.
The network adapters are detectable by cfgmgr and are configured using the
configuration methods in PdDv.
14-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty The inet0 device and the network interfaces are not detectable. Reading from the
Config_Rules ODM database, cfgmgr runs
/usr/lib/methods/cfgrcnet to configure inet0 and the network interfaces.
bootup_option
The value of bootup_option controls how the network devices will be configured.
Administrators who are used to using BSD style configuration commands may be more
comfortable setting bootup_option to yes.
The cfgrcnet command runs either /etc/rc.net or /etc/rc.bsdnet based on the
value of the bootup_option attribute of the inet0 device (read from CuAt).
rc.net
If bootup_option = no, rc.net is run. This is the default. rc.net runs configuration
methods that use values in the ODM database to configure inet0 and the network
interfaces. This would include IP addresses, static routes, netmasks, and so forth.
rc.bsdnet
If bootup_option = yes, rc.bsdnet is run. In this case, inet0 and the network
interfaces are configured using BSD style commands in the rc.bsdnet script itself.
rc.tcpip
After the network devices have been configured, rc.tcpip is run to start the various
networking daemons.
DHCP
Dynamic Host Control Protocol (DHCP) is an application-layer protocol that allows a
client machine on the network to get an IP address and other configuration parameters
from a server. It gets information by exchanging packets between a daemon on the
client and another on the server.
By default, AIX rc.tcpip does not run DHCP. If a machine has been configured to use
DHCP, rc.tcpip will run the DHCP client daemon (/usr/sbin/dhcpcd). dhcpcd will
reconfigure the network devices, overriding any configuration that may have been
performed by rc.net or rc.bsdnet.
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# smit tcpip
TCP/IP
Notes:
Introduction
SMIT is the easiest method of configuring the network. You can also configure the
network using the ifconfig and chdev commands. This visual shows the base SMIT
network menu.
Use the Minimum Configuration & Startup menu to quickly set the basic network
parameters and start the network. This menu uses the default (rc.net/ODM) method
of network configuration.
Note: It is recommended that you only use this menu once.
Use Further Configuration to perform more extensive network configuration,
including selecting BSD style configuration.
Use DHCP for TCPIP Configuration & Startup menu option to configure your
machine to use DHCP.
14-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/etc/rc.tcpip
Daemon Description
dhcpcd DHCP client daemon.
dhcpsd, dhcprd DHCP server, DHCP Relay Agent daemons.
autoconf6, ndpd- IP version 6 (IPv6) daemons.
host,
ndpd-router
syslogd System logging daemon.
lpd Print server daemon.
routed, gated Dynamic routing daemons. Used only if you are using dynamic routing.
Either routed or gated (not both) should be run.
sendmail Routes mail for local or network delivery.
portmap Converts RPC program numbers into internet port numbers.
inetd Network super daemon.
named Provides the server function for the Domain Name System protocol (DNS).
timed, xntpd Time daemons,
rwhod Provides the server function for the rwho and ruptime commands.
snmpd, dpid2, aixmibd Simple Network Management Protocol (SNMP) daemons.
hostmibd
mrouted Multicast routing daemon.
pxed, binld Preboot Execution Environment daemon. PXE is an extension to bootp and
DHCP.
Copyright IBM Corporation 2005
Notes:
Introduction
The /etc/rc.tcpip script is run by init to start various network daemons. The
network daemons provide various network services. For example, the xntpd daemon
communicates with xntpd daemons running on other systems to synchronize
time-of-day clocks.
The table shows a summary of the daemons which can be started from this script.
Typically, only a subset of these daemons are started. You can comment or uncomment
lines in this file to control which daemons will be started.
14-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty SRC
The /etc/rc.tcpip script uses the System Resource Controller (SRC) to control the
network daemons.
SRC provides a set of commands and subroutines to make it easier to create and
control subsystems. A subsystem is a program or set of related programs designed as a
unit to perform related functions. The SRC is useful if you want a common way to start,
stop, and collect status information on sets of processes.
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Introduction
Sometimes called the network super daemon, inetd is one of the daemons started by
/etc/rc.tcpip. The inetd daemon reduces system load by invoking other daemons
only when they are needed and by providing several simple Internet services internally
without invoking other daemons.
14-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty SRC
The inetd daemon is started as an SRC subsystem. Daemons started by inetd are
SRC subservers.
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/etc/inetd.conf
## Internet server configuration database
...
## name type NATO program arguments
##
ftp stream tcp6 nowait root /usr/sbin/ftpd ftpd
telnet stream tcp6 nowait root /usr/sbin/telnetd telnetd -a
shell stream tcp6 nowait root /usr/sbin/rshd rshd
kshell stream tcp nowait root /usr/sbin/krshd krshd
login stream tcp6 nowait root /usr/sbin/rlogind rlogind
klogin stream tcp nowait root /usr/sbin/krlogind krlogind
exec stream tcp6 nowait root /usr/sbin/rexecd rexecd
#comsat dgram udp wait root /usr/sbin/comsat comsat
#uucp stream tcp nowait root /usr/sbin/uucpd uucpd
#bootps dgram udp wait root /usr/sbin/bootpd bootpd /etc/bootptab
##
## Finger, systat and netstat give out user information which may be
## valuable to potential "system crackers." Many sites choose to disable
## some or all of these services to improve security.
##
#finger stream tcp nowait nobody /usr/sbin/fingerd fingerd
#systat stream tcp nowait nobody /usr/bin/ps ps -ef
#netstat stream tcp nowait nobody /usr/bin/netstat netstat -f
inet
. . .
Notes:
Configuration files
The inetd daemon reads /etc/inetd.conf and /etc/services when it starts.
/etc/inetd.conf
The /etc/inetd.conf file is a list of network services which inetd will provide. These are
the daemons that inetd will start, if they are needed.
The visual shows a portion of the inetd.conf file.
Syntax
Each line in the file has the following fields:
- ServiceName
- SocketType
14-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty - ProtocolName
- Wait/NoWait
- UserName
- ServerPath
- ServerArgs
The ServiceName field contains the name of a network service defined in the
/etc/services file.
The ServerPath field identifies the file name for the daemon to be started.
The remaining fields provide information on how to start and manage the service.
Modifying inetd.conf
You can control which services inetd will manage by commenting or uncommenting
lines in the /etc/inetd.conf file.
The /etc/inetd.conf file can be updated by using SMIT or by directly commenting or
uncommenting lines in the file.
If you change /etc/inetd.conf using SMIT, then the inetd daemon will be refreshed
automatically and will read the new /etc/inetd.conf file.
If you change the file manually, you need to inform the inetd daemon of the changes to
its configuration file. To do this run either:
- refresh -s inetd
- kill -1 InetdPID
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/etc/services
. . .
# Network services, Internet style
#
tcpmux 1/tcp # TCP Port Service Multiplexer
tcpmux 1/udp # TCP Port Service Multiplexer
. . .
echo 7/tcp
echo 7/udp
. . .
netstat 15/tcp
qotd 17/tcp quote
msp 18/tcp # Message Send Protocol
msp 18/udp # Message Send Protocol
chargen 19/tcp ttytst source
chargen 19/udp ttytst source
ftp-data 20/tcp
ftp 21/tcp
telnet 23/tcp
. . .
Notes:
/etc/services
The /etc/services file contains a list of all network services and their port numbers. This
is the list of well known port numbers mentioned in the previous section.
The visual shows a portion of this file.
14-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty
Name Resolution
Local
/etc/hosts
NIS/NIS+ (Network Information System)
/etc/rc.nfs
domainname
ypbind
DNS (Domain Name System)
/etc/resolv.conf
nameserver
domain
Lookup order
NSORDER
/etc/netsvc.conf
/etc/irs.conf
Default: DNS, NIS, local
Notes:
Introduction
Problems with name resolution are a fairly common type of network problem. This
section introduces you to some of the client-side name resolution configuration files
and identifies a few common problems to look for. Configuring and troubleshooting
name resolution servers is outside the scope of this unit.
The visual shows the three most common methods for name resolution and some of the
configuration files.
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/etc/hosts
Although /etc/hosts can be used alone in small stable networks, most commonly it is
used together with DNS or NIS. In this case, /etc/hosts will be only used if the system
is unable to locate a name using the other services. The file should always contain at
least two entries: an entry for the system itself and an entry for localhost (the software
loopback address). For example, the system freddy should have the following entries:
127.0.0.1 loopback localhost
9.47.25.237 freddy freddy.beaverton.ibm.com
If only local name resolution is being used, then there must be an entry in
/etc/hosts for every host you wish to communicate with.
DNS
When TCP/IP networks become large, as on the Internet, managing all the hostnames
and addresses using flat text files presents a huge administrative burden. DNS was
created to address these problems.
Instead of each machine on the network keeping a file containing the name-to-address
mapping for all other hosts on the network, one or more hosts are selected to function
as name servers. Name servers resolve symbolic names assigned to networks and
hosts into IP addresses.
To simplify administration, the DNS name space is hierarchically divided into domains
(or zones). Hostnames need only be unique within a domain. A name server has
complete information about all the systems which belong to a particular domain.
14-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
NIS/NIS+
NIS is another method of resolving names which also uses one or more systems as
servers.
In addition to the hosts database, the NIS and NIS+ protocols are used to provide other
information. For example, NIS is commonly used to provide a centralized source of user
administration information (/etc/passwd, /etc/group, etc.) in networks that share files
using the Network File System (NFS) protocol.
/etc/rc.nfs
In AIX, NIS is configured and started by the /etc/rc.nfs script, which is run by init.
NIS servers run the ypserv daemon; clients run ypbind.
At a minimum, to configure a system as an NIS client, you would need to edit this file to
set the NIS domain name and start the ypbind daemon.
NIS references
Configuring a NIS server is outside the scope of this lesson. For more information about
configuring and troubleshooting NIS servers - or using NIS, see:
Network Information Services (NIS and NIS+) Guide
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Lookup order
It is quite common for more than one method of name resolution to be used. If a match
is found in the first source, that address is used. If the resolver routine is unable to find
a hostname in the first source, it tries the next, and so forth.
By default, the system will search in the following order:
- DNS
- NIS (if active)
- Local /etc/hosts
Settings in the /etc/irs.conf file override the defaults.
The /etc/netsvc.conf file overrides irs.conf and the environment variable, NSORDER
overrides all other settings.
14-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
? (9.47.10.253) at (incomplete)
. . .
Copyright IBM Corporation 2005
Notes:
Introduction
Typically IP uses the Address Resolution Protocol (ARP) to resolve physical addresses.
How it works
The ARP table is held in kernel memory and maps IP addresses to physical addresses.
When the IP layer needs to send a packet, it consults the table to get the hardware
address to pass to the data link layer. If there is no entry, an ARP packet is broadcast to
all the systems on the local subnet. If the target system is connected and running, the
ARP protocol responds with a packet that includes its IP address. The ARP table gets
updated on the original host and the original packet gets sent to the data link layer for
transmission.
14-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty ARP is only used for the target if it is on the local subnet. If the target is not on the local
subnet, the packet is sent to the router using the ARP entry for the router, not the target.
When it finally gets to a system which is on the same subnet as the target, it then uses
ARP to get the hardware address of the target.
The ARP table is dynamic. If an ARP entry is unused for a period of time (default 20
minutes), it will be removed from the table.
ARP configuration
ARP does not typically need to be configured. In AIX, ARP functionality is provided as
part of the inet0 device driver. There is no daemon to start. There are several kernel
parameters which can be adjusted to change ARPs behavior.
Use the no command to view the ARP parameters. See the no man page for details
about the purpose of each parameter.
# no -a | grep arp
arpqsize = 12
arpt_killc = 20
arptab_bsiz = 7
arptab_nb = 25
Note: The no command sets or displays current or next boot values for network tuning
parameters. If setting a parameter, the value may not take effect until the adapter has
been disabled and re-enabled or the system rebooted. One example is the
inet_stack_size parameter that specifies the size of inet interrupt stack table in
kilobytes. If this parameter is changed you must reboot the system.
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Routing
hostA 128.95 hostW
9.47.10.237 network 128.95.0.22
hostB hostX hostE
hostM
9.47.10.14 128.95.0.5 128.87.0.14
9.47.10.1
hostC hostMr hostY hostF
9.47.10.80 128.95.0.1 128.95.0.10 128.87.0.15
hostD hostZ hostG
9.47.10.24 128.95.0.2 128.87.0.110
9.47.10 hostZr
Network 128.87.0.1
(netmask = 128.87
255.255.255.0) network
Notes:
Introduction
Routing is the process of forwarding packets from one IP network to another.
Gateways
Gateways are a type of router. Routers connect two or more networks and forward
packets between the networks. Some routers, for example, route at the network
interface level or at the physical level.
14-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty Gateways, however, route at the network level (IP) and can:
- Receive IP packets from other gateways or hosts for delivery to hosts on the local
network
- Route IP packets from one network to another
For example, a gateway connecting two networks has two network interfaces. The
gateway receives packets through one network interface and sends them out through
the other network interface.
While a general purpose AIX system can be used as a gateway, gateways are often
small dedicated systems which do nothing else.
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Static Routing
Useful for small, stable networks
No daemons are involved
Adding routes
Implicit or direct
Explicit or static
smit mkroute
route command
Dynamic
ICMP redirect messages
Configuring a system as a router
Add to /etc/rc.net file:
no -o ipforwarding=1
Possible problems
Notes:
Introduction
Static routing (where routes are maintained manually) is practical for small, stable
network environments. For larger networks, or for networks which change frequently,
static routing is impractical.
Adding routes
In a static routing environment, routes are added in three ways:
- Implicit routes
- Explicit routes
- Dynamic routes
14-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Dynamic routes
Even in a static routing environment, some routes are created dynamically. If configured
for it, a gateway will send an ICMP redirect message if it notices that there is a more
direct route to a destination. Upon receiving an ICMP redirect message, IP on the
sending host can create a new route or modify an existing route.
The D flag in the route table indicates a dynamic route which was created by an ICMP
redirect message. The M flag indicates a route which was modified by an ICMP redirect.
Return routes
In order for two systems on separate networks to communicate, both systems must
have appropriate routes set up. Make sure that the system you are trying to
communicate with has a return route to your machine.
For example, if hostA cannot ping hostW and the route table appears OK on hostA,
the problem may be on hostW. If hostW does not have a route back to hostA, the ping
message will get to hostW, but hostW will be unable to send a reply. Check the route
table on both machines:
- host A:
Destination Gateway
default 9.47.10.1 (Default route)
OR
128.95/16 9.47.10.1 (Network route)
- hostW:
Destination Gateway
default 128.95.10.1 (Default route)
OR
9.47.10/24 128.95.10.1 (Network route)
14-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty
Dynamic Routing
Routing daemons
routed or gated, not both
Started by /etc/rc.tcpip
Protocols
routed
Provides gateway routing functions for the RIP protocol.
gated
Provides gateway routing functions for the RIP, RIPng, EGP,
BGP, BGP4+, HELLO, IS-IS, ICMP, ICMPv6, and SNMP
protocols.
Mixed environments
Configuration files
routed: /etc/gateways
gated: /etc/gated.conf
Active vs. passive mode
Notes:
Introduction
With dynamic routing, routing daemons continuously exchange information with routing
daemons running on other systems, and continuously update the routing table.
Dynamic routing removes the administrative burden of having to manually update the
routing tables on many machines.
Routing daemons
AIX provides two daemons for use in TCP/IP dynamic routing, routed and gated.
Either one or the other of these daemons can be run on a system (started by
/etc/rc.tcpip), not both. If both are running, you may get unpredictable results.
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Protocols
The routed daemon only supports Routing Information Protocol (RIP).
The gated daemon supports many different routing protocols as shown in the visual.
In order for dynamic routing to work, all the routers must be running the same protocol -
or must have static routes set up.
Configuration files
The default configuration file for the gated daemon is the /etc/gated.conf file. This file
defines which protocols gated will use and static routes (if any). In addition, many
aspects of gateds behavior can be configured in this file.
You can specify static routes for routed in the /etc/gateways file.
14-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty
Checkpoint
1. Match the terms to the correct description:
Term Description
A. resolv.conf ___ Defines the route for hosts directly connected to a local
network. Added automatically when you configure a
network interface.
B. netsvc.conf ___ A path segment from one host to a gateway.
C. gateway ___ One of two files that can modify the name resolution
lookup order.
D. route ___ Static routes are defined in this file if bootup_option=yes.
E. default route ___ System which forwards packets from one IP network to
another.
F. implicit route ___ File used to configure a DNS client.
G. rc.bsdnet ___ Defines a gateway to be used when there is no specific
host or network route.
Notes:
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Exercise 12
Notes:
14-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1
Student Notebook
Uempty
Unit Summary
Notes:
Routing references
Routing, especially dynamic routing, can be quite complex. In this unit we learned some
basic routing concepts (which may be useful when troubleshooting), but this is only an
introduction. For more information about administering routing, see:
- System Management Guide: Communications and Networks, Chapter 3
- netstat, routed, and gated man pages.
- IBM ITES class:
AU07G/Q1307 AIX 5L Configuring TCP/IP
Copyright IBM Corp. 2000, 2005 Unit 14. TCP/IP Configuration 14-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
14-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center General Programming Concepts: Writing and
Debugging Programs (Chapter 4. Error-Logging
Overview)
Info Center Commands Reference
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Analyze error log entries
Identify and maintain the error logging components
Describe different error notification methods
Log system messages using the syslogd daemon
Notes:
15-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
CuDv, CuAt
error
CuVPD
daemon
errlog
error record /var/adm/ras/errlog
template
/var/adm/ras/errtmplt
/usr/lib/errdemon
errclear
errstop errlogger
application
errlog()
User
/dev/error Kernel
errsave()
(timestamp)
kernel module
Copyright IBM Corporation 2005
Notes:
Detection of an error
The error logging process begins when an operating system module detects an error.
The error detecting segment of code then sends error information to either the
errsave() kernel service or the errlog() application subroutine, where the information
is in turn written to the /dev/error special file. This process then adds a timestamp to
the collected data. The errdemon daemon constantly checks the /dev/error file for new
entries, and when new data is written, the daemon conducts a series of operations.
15-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty To create an entry in the error log, the errdemon daemon retrieves the appropriate
template from the repository, the resource name of the unit that caused the error, and
the detail data. Also, if the error signifies a hardware-related problem and hardware vital
product data (VPD) exists, the daemon retrieves the VPD from the ODM. When you
access the error log, either through SMIT or with the errpt command, the error log is
formatted according to the error template in the error template repository and presented
in either a summary or detailed report. Most entries in the error log are attributable to
hardware and software problems, but informational messages can also be logged, for
example, by the system administrator.
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
Overview
The SMIT fastpath smit errpt takes you to the screen used to generate an error
report. Any user can use this screen. As shown on the visual, the screen includes a
number of fields that can be used for report specifications. Some of these fields are
described in more detail below.
15-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Error CLASSES
Values are H (hardware), S (software) and O (operator messages created with
errlogger). You can specify more than one error class.
Error TYPES
Valid error types include the following:
- PEND - The loss of availability of a device or component is imminent.
- PERF - The performance of the device or component has degraded to below an
acceptable level.
- TEMP - Recovered from condition after several attempts.
- PERM - Unable to recover from error condition. Error types with this value are usually
the most severe errors and imply that you have a hardware or software defect. Error
types other than PERM usually do not indicate a defect, but they are recorded so that
they can be analyzed by the diagnostic programs
- UNKN - Severity of the error cannot be determined.
- INFO - The error type is used to record informational entries
Error LABELS
An error label is the mnemonic name used for an error ID.
Error IDs
An error ID is a 32-bit hexadecimal code used to identify a particular failure.
Resource CLASSES
Means device class for hardware errors (for example, disk).
Resource TYPES
Indicates device type for hardware (for example, 355 MB).
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Resource NAMES
Provides common device name (for example hdisk0).
15-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
The errpt Command
Summary report:
# errpt
Intermediate report:
# errpt -A
Detailed report:
# errpt -a
Notes:
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
The -d option
The -d option (flag) can be used to limit the report to a particular class of errors. Two
examples illustrating use of this flag are shown on the visual:
- The command errpt -d H specifies a summary report of all hardware (-d H) errors
- The command errpt -a -d S specifies a detailed report (-a) of all software (-d S)
errors
The -c option
If you want to display the error entries concurrently, that is, at the time they are logged,
you must execute errpt -c. In the example on the visual, we direct the output to the
system console.
The -D flag
Duplicate errors can be consolidated using errpt -D. When used with the -a option,
errpt -D reports only the number of duplicate errors and the timestamp for the first and
last occurrence of the identical error.
Additional information
The errpt command has many options. Refer to your AIX 5L Version 5.3 Commands
Reference (or the man page for errpt) for a complete description.
15-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
A Summary Report (errpt)
# errpt
Error Type:
Error Class:
P: Permanent,
H: Hardware
Performance or Pending
S: Software
T: Temporary
O: Operator
I: Informational
U: Undetermined
U: Unknown
Notes:
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
15-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
15-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty 4. Sometimes SCSI errors are logged, mostly with the LABEL SCSI_ERR10. They
indicate that the SCSI controller is not able to communicate with an attached device.
In this case, check the cable (and the cable length), the SCSI addresses and the
terminator.
DISK_ERR5 errors
A very infrequent error is DISK_ERR5. It is the catch-all (that is, the problem does not
match any of the above DISK_ERRx symptoms). You need to investigate further by
running the diagnostic programs which can detect and produce more information about
the problem.
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Class
Error Label and Recommendations
Type
LVM_BBEPOOL, S,P No more bad block relocation.
LVM_BBERELMAX, Action: Replace disk as soon as
LVM_HWFAIL possible.
LVM_SA_STALEPP S,P Stale physical partition.
Action: Check disk, synchronize data
(syncvg).
LVM_SA_QUORCLOSE H,P Quorum lost, volume group closing.
Action: Check disk, consider working
without quorum.
Notes:
15-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Maintaining the Error Log
# smit errdemon
Change / Show Characteristics of the Error Log
Type or select values in entry fields.
Press Enter AFTER making all desired changes.
LOGFILE [/var/adm/ras/errlog]
*Maximum LOGSIZE [1048576] #
Memory Buffer Size [8192] #
...
# smit errclear
Clean the Error Log
Type or select values in entry fields.
Press Enter AFTER making all desired changes.
Remove entries older than this number of days [30] #
Error CLASSES [ ] +
Error TYPES [ ] +
...
Resource CLASSES [ ] +
...
Notes:
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Error Notification
Notes:
15-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty 3. Periodic Diagnostics: The diagnostics package (diag command) contains a periodic
diagnostic procedure (diagela). Whenever a hardware error is posted to the log, all
members of the system group get a mail message. Additionally, a message is sent
to the system console. The diagela program has two disadvantages:
Since it executes many times a day, the program might slow down your system
Only hardware errors are analyzed
4. ODM-based error notification: The errdemon program uses the ODM class errnotify
for error notification. How to work with errnotify is discussed later in this topic.
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
while true
do
sleep 60 # Let's sleep one minute
done
Notes:
15-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty - The two files are compared using the command cmp -s (silent compare, that means
no output will be reported). If the files are not different, we jump back to the
beginning of the loop (continue), and the process will sleep again.
- If there is a difference, a new error entry has been posted to the error log. In this
case, we inform the operator that a new entry is in the error log. Instead of print
you could use the mail command to inform another person.
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
errnotify:
en_pid = 0
en_name = "sample"
en_persistenceflg = 1
en_label = ""
en_crcid = 0
en_class = "H"
en_type = "PERM"
en_alertflg = ""
en_resource = ""
en_rtype = ""
en_rclass = "disk"
en_method = "errpt -a -l $1 | mail -s DiskError root"
Notes:
15-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
List of descriptors
Here is a list of all descriptors for the errnotify object class:
en_alertflg Identifies whether the error is alertable. This descriptor is
provided for use by alert agents with network management
applications. The values are TRUE (alertable) or FALSE (not
alertable).
en_class Identifies the class of error log entries to match. Valid values are
H (hardware errors), S (software errors), O (operator messages)
and U (undetermined).
en_crcid Specifies the error identifier associated with a particular error.
en_label Specifies the label associated with a particular error identifier as
defined in the output of errpt -t (show templates).
en_method Specifies a user-programmable action, such as a shell script or a
command string, to be run when an error matching the selection
criteria of this Error Notification object is logged. The error
notification daemon uses the sh -c command to execute the
notify method.
The following keywords are passed to the method as arguments:
$1 Sequence number from the error log entry
$2 Error ID from the error log entry
$3 Class from the error log entry
$4 Type from the error log entry
$5 Alert flags from the error log entry
$6 Resource name from the error log entry
$7 Resource type from the error log entry
$8 Resource class from the error log entry
$9 Error label from the error log entry
en_name Uniquely identifies the object.
en_persistenceflg Designates whether the Error Notification object should be
removed when the system is restarted. 0 means removed at boot
time; 1 means persists through boot.
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
syslogd Daemon
/etc/syslog.conf:
daemon.debug /tmp/syslog.debug
/tmp/syslog.debug:
syslogd inetd[16634]: A connection requires tn service
inetd[16634]: Child process 17212 has ended
# stopsrc -s inetd
Notes:
Function of syslogd
The syslogd daemon logs system messages from different software components
(kernel, daemon processes, system applications).
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
15-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
syslogd Configuration Examples
/etc/syslog.conf:
Notes:
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- The following line specifies that all messages, except messages from the mail
subsystem, are to be sent to the syslogd daemon on the host server:
*.debug; mail.none @server
Note that, if this example and the preceding example appear in the same
/etc/syslog.conf file, messages sent to /tmp/daemon.debug will also be sent to
the host server.
Facilities
Use the following system facility names in the selector field:
kern Kernel
user User level
mail Mail subsystem
daemon System daemons
auth Security or authorization
syslog syslogd messages
lpr Line-printer subsystem
news News subsystem
uucp uucp subsystem
* All facilities
Priority Levels
Use the following levels in the selector field. Messages of the specified level and all
levels above it are sent as directed.
15-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty emerg Specifies emergency messages. These messages are not distributed to all
users.
alert Specifies important messages such as serious hardware errors. These
messages are distributed to all users.
crit Specifies critical messages, not classified as errors, such as improper login
attempts. These messages are sent to the system console.
err Specifies messages that represent error conditions.
warning Specifies messages for abnormal, but recoverable conditions.
notice Specifies important informational messages.
info Specifies information messages that are useful in analyzing the system.
debug Specifies debugging messages. If you are interested in all messages of a
certain facility, use this level.
none Excludes the selected facility.
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
/etc/syslog.conf:
# errpt
Notes:
15-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Directing Error Log Messages to syslogd
errnotify:
en_name = "syslog1"
en_persistenceflg = l
en_method = "logger Error Log: `errpt -l $1 | grep -v TIMESTAMP`"
errnotify:
en_name = "syslog1"
en_persistenceflg = l
en_method = "logger Error Log: $(errpt -l $1 | grep -v TIMESTAMP)"
errnotify:
en_name = "syslog1"
en_persistenceflg = l
en_method = "errpt -l $1 | tail -1 | logger -t errpt -p
daemon.notice"
Notes:
Command substitution
Youll need to use command substitution (or pipes) before calling the logger command.
The first two examples on the visual illustrate the two ways to do command substitution
in a Korn shell environment:
- Using the UNIX command syntax (with backquotes) - shown in the first example on
the visual
- Using the newer $(UNIX command) syntax - shown in the second example on the
visual
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Checkpoint
1. Which command generates error reports? Which flag of this
command is used to generate a detailed error report?
__________________________________________________
__________________________________________________
2. Which type of disk error indicates bad blocks?
__________________________________________________
3. What do the following commands do?
errclear _________________________________________
errlogger_________________________________________
4. What does the following line in /etc/syslog.conf indicate:
*.debug errlog
__________________________________________________
5. What does the descriptor en_method in errnotify indicate?
___________________________________________________
___________________________________________________
___________________________________________________
Notes:
15-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Exercise: Error Logging and syslogd
Exercise 13
Notes:
Copyright IBM Corp. 2000, 2005 Unit 15. Error Log and syslogd 15-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Summary
Notes:
15-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Checkpoint Solutions
1. There are a large number of current an past models of IBM POWER
based servers. Where is a good location to find information on the
available models?
http://www-03.ibm.com/systems/p/
2. True or False: A partition is an independent operating environment.
True
3. A partition is a logical partition if which one of the following is true?
a. Resource assignments are flexible.
b. Resources can be moved between partitions without a restart.
c. Partitioning is not dependent on physical system building blocks.
Checkpoint Solution
1. AIX 5L can be installed from which of the following:
(select all that are correct)
a. CD-ROM
b. Diskette
c. 4 mm tape
2. True or False? A Preservation Install preserves all data
on the disks.
Preserves SOME of the existing data on the disk selected for
installation. Warning: This method overwrites the usr (/usr),
variable (/var), temporary (/tmp), and root (/) file systems. Other
product (application) files and configuration data are destroyed.
3. What is the console used for during the installation process?
The console is used to display all the system messages and
interact with the installation.
A-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
A-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Checkpoint Solutions
1. The System Management Interface Tool provides a menu-
driven interface that can help in the administration of AIX 5L
systems.
2. Which of the statements are true regarding the Web-based
System Manager?
a) An AIX 5L system can be managed from a remote PC
with appropriate JAVA and Web-browser code installed.
b) In standalone mode, use the wsm command to access
the Web-based system manager.
c) It is possible to manage an AIX 5L system from a
remote AIX 5L system using an ASCII terminal.
C is false. However, with a graphics terminal it is
possible to manage different systems simultaneously by
adding the remote systems in the Navigation window of
Web-based System Manager.
Checkpoint Solution
1. Which of the following states can your software be in, in order for you
to be able to use it? (select all that apply)
a. Applied state
b. Removed state
c. Install state
d. Commit state
2. What command is used to list all installed software on your system?
lslpp -l
3. Which of the following can you install as an entity? (select all that
apply)
a. Fileset
b. LPP
c. Package
d. Bundle
4. What is the difference between the SMIT menus: Install Software and
Update Installed Software to Latest Level (Update All)?
Install Software by default installs everything from the installation
media (except printer and devices) onto the system.
Update Installed Software to Latest Level (Update All) installs only
updates to filesets already installed on your system.
Copyright IBM Corporation 2005
A-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
AP UNIT 5 Devices
Checkpoint Solutions
1. Is it possible to use SCSI ID 7 for a new tape drive?
No. The SCSI adapter itself uses ID 7. So, it cannot be used
for other devices.
2. Use the output on the next visual (lsdev -C -H) to answer the
following four questions.
a) What will happen if we attempt to add another device with
the SCSI address set to 4?
The operation will fail as there is already a device
(SCSI Disk Drive) configured at this location.
b) Can the 8 mm tape drive be currently used? Why?
No, because it is in the defined state. You have to first make
it available by either using SMIT or the mkdev command.
c) Where is the printer connected? The parallel port
d) The Ethernet adapter is installed in what slot?
It is an integrated adapter which does not occupy a slot on
the PCI bus.
Copyright IBM Corporation 2005
2. 3.
AIX Kernel Applications
PdDv CuDv
A-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Checkpoint Solution
1. In which ODM class do you find the physical volume IDs of your
disks?
CuAt
Checkpoint Solution (1 of 2)
1. True or False ? You must have AIX loaded on your system to use
the System Management Services programs. False. SMS is part of
the built-in firmware.
4. What command is used to build a new boot image and write it to the
boot logical volume? bosboot -ad /dev/hdiskx
A-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Checkpoint Solution (2 of 2)
6. True or False ? During the AIX boot process, the AIX kernel
is loaded from the root file system.
False. The AIX kernel is loaded from hd5.
7. True or False ? A service processor allows actions to occur
even when the regular processors are down.
8. List the five components of the boot logical volume
(assume an CHRP system). SOFTROS, bootexpand,
kernel, RAM file system, base ODM
9. How do you boot an AIX machine in maintenance mode?
You need to boot from an AIX CD, mksysb, or NIM server.
10. Your machine keeps rebooting and repeating the POST.
What can be the reason for this?
Invalid boot list, corrupted boot logical volume, or hardware
failures of boot device.
Copyright IBM Corporation 2005
Checkpoint Solution (1 of 2)
1. What is the primary function of each phase of rc.boot?
Phase 1 Configure base devices
Phase 2 Mount rootvg file systems
Phase 3 Configure the remaining devices
A-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Checkpoint Solution (2 of 2)
Checkpoint Solution
1. A scalable volume group can contain up to 1024 disks
and 4096 logical volumes.
2. (True or False) Each volume group has a unique
identifier.
3. (True or False) Disks can be added to an existing
volume group.
4. The mklv command can be used to create a logical
volume.
5. (True or False) No LVM information is stored outside of
the ODM. False. Information is also stored in other
AIX files and in disk control blocks (like the VGDA
and LVCB).
A-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Checkpoint Solution
1. (True or False) A mirror can be added to an existing logical
volume.
2. If a volume group consists of more than two disks, each disk
will contain one VGDA.
3. If a disk can be accessed during a varyonvg, it gets a PV
state of active.
4. Although everything seems to be working fine, you detect error
log entries for disk hdisk0 in your rootvg. The disk is not
mirrored to another disk. You decide to replace this disk.
Which procedure would you use to migrate this disk?
Procedure 2: Disk still working. There are some additional
steps necessary for hd5 and the primary dump device hd6.
5. (True or False) The exportvg and importvg commands
provide a way to transfer data between different AIX systems.
Checkpoint Solution
1. Will the size of the file system change when the size of
the logical volume it is on is increased? No
A-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Checkpoint Solution
1. What conclusions regarding potential paging space problems can
you reach based on the following listing?
Page Physical Volume Size %Used Active Auto Type
Space Volume Group
Checkpoint Solution
1. What is the difference between the following two commands?
a) find /home/fred | backup -ivf /dev/rmt0
b) cd /home/fred; find . | backup -ivf /dev/rmt0
(a) will backup the files using the full path names, whereas
(b) will backup the file names using the relative path names.
So (b)s files can be restored into any directory.
2. On a mksysb tape, if you entered tctl rewind and then
tctl -f/dev/rmt0.1 fsf 3, which element on the tape could
you look at? You would be at the start of the backed up images of
the files, having skipped over the boot portion of the tape.
3. Which command could you use to restore these files?
The files were backed up using the backup command so you would
have to use the restore command.
4. True or False? smit mksysb backs up all file systems, provided
they are mounted. mksysb only backs up rootvg file systems. To
back up other volume groups, you must use the savevg command.
A-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Checkpoint Solutions
1. Match the terms to the correct description:
Term Description
A. resolv.conf _F_ Defines the route for hosts directly connected to a local
network. Added automatically when you configure a
network interface.
B. netsvc.conf _D_ A path segment from one host to a gateway.
C. gateway _B_ One of two files that can modify the name resolution
lookup order.
D. route _G_ Static routes are defined in this file if bootup_option=yes.
E. default route _C_ System which forwards packets from one IP network to
another.
F. implicit route _A_ File used to configure a DNS client.
G. rc.bsdnet _E_ Defines a gateway to be used when there is no specific
host or network route.
Checkpoint Solution
1. Which command generates error reports? Which flag of this
command is used to generate a detailed error report?
errpt
errpt -a
2. Which type of disk error indicates bad blocks?
DISK_ERR4
3. What do the following commands do?
errclear Clears entries from the error log.
errlogger Is used by root to add entries into the error log.
4. What does the following line in /etc/syslog.conf indicate:
*.debug errlog
All syslogd entries are directed to the error log.
5. What does the descriptor en_method in errnotify indicate?
It specifies a program or command to be run when an error
matching the selection criteria is logged.
A-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
References
Info Center AIX 5L Performance Management Guide
Info Center AIX 5L Performance Tools Guide and Reference
Info Center AIX 5L Commands Reference, Volumes 1-6
Info Center AIX 5L Practical Performance Tools and Tuning Guide
Redbooks AIX 5L Performance Tools Handbook Redbook
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Unit Objectives
After completing this unit, you should be able to:
Provide basic performance concepts
Provide basic performance analysis
Manage the workload on a system
Use the Performance Diagnostic Tool (PDT)
Notes:
B-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Basic Performance Analysis
Check CPU sar -u
no
High no
paging Check disk
yes Disk
no
Balance disk balanced
Possible
memory yes
constraint
Possible
disk/SCSI
constraint
Copyright IBM Corporation 2005
Notes:
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
If balanced, then there may be too many physical volumes on a bus. More than
three or four on a single SCSI bus may create problems. You may need to install
another SCSI adapter. Otherwise, more disks may be needed to spread out the
data.
B-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Performance Analysis Tools
CPU Memory I/O Network
locktrace filemon
Notes:
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
B-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Identify CPU-Intensive Programs: ps aux
# ps aux
USER PID %CPU %MEM ... STIME TIME COMMAND
root 516 98.2 0.0 ... 13:00:00 1329:38 wait
johnp 7570 1.2 1.0 ... 17:48:32 0:01 -ksh
root 1032 0.8 0.0 ... 15:13:47 78:37 kproc
root 1 0.1 1.0 ... 15:13:50 13:59 /etc/init
Percentage of time
the process has Percentage of real Total Execution
used the CPU memory Time
Notes:
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
B-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Identify High Priority Processes: ps -elf
# ps -elf
F S UID PID PPID C PRI NI ... TIME CMD
200003 A root 1 0 0 60 20 ... 0:04 /etc/init
240001 A root 69718 1 0 60 20 ... 1:16 /usr/sbin/syncd 60
200001 A root 323586 188424 24 72 20 ... 0:00 ps -elf
Priority of
the process Nice value
The smaller the PRI value, the higher the priority of the process.
The average process runs a priority around 60.
The NI value is used to adjust the process priority. The higher
the nice value is, the lower the priority of the process.
Notes:
Priority introduction
After identifying CPU and memory-intensive processes, check the priorities of the
processes.
The priority of a process controls when a process will be executed.
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-9
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
B-10 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Monitoring CPU Usage: sar -u
Interval Number
# sar -u 60 30
Notes:
sar output
The columns provide the following information:
- %usr
Reports the percentage of time the CPU spent in execution at the user (or
application) level.
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-11
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
- %sys
Reports the percentage of time the CPU spent in execution at the system (or kernel)
level. This is the time the CPU spent in execution of system functions.
- %wio
Reports the percentage of time the CPU was idle waiting for disk I/O to complete.
This does not include waiting for remote disk access.
- %idle
Reports the percentage of time the CPU was idle with no outstanding disk I/O
requests.
B-12 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
AIX Tools: tprof
# tprof -x sleep 60
# more sleep.prof
Notes:
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-13
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Report format
The report will show the most dominant processes listed in order of the highest CPU
percentage (starting with AIX 5L V5.2) or using the most CPU ticks (before AIX 5L
V5.2). By looking at this file, you can see the CPU demand by process in decreasing
order.
The top part of the report contains a summary of all the processes on the system. This
is useful for characterizing CPU usage of a system according to process names when
there are multiple copies of a program running. The second part of the report shows
each thread that executed during the monitoring period. The output prior to AIX 5L V5.2
shows the information on each thread first, then the summary in the second part.
The sample output has been reduced to simplify the areas to focus on.
B-14 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Monitoring Memory Usage: vmstat
Summary report every 5 seconds
# vmstat 5
0 0 8793 81 0 0 0 1 7 0 1 2 95 2
0 0 9192 66 0 0 16 81 167 0 1 6 77 16
0 0 9693 69 0 0 53 95 216 0 1 4 63 33
0 0 10194 64 0 21 0 0 0 0 20 5 42 33
0 0 4794 5821 0 24 0 0 0 0 5 8 41 46
Notes:
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-15
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
pi and po columns
The pi and po columns indicate the number of 4 KB pages that have been paged in
or out.
Simply speaking, paging means that the real memory is not large enough to satisfy
all memory requests and uses a secondary storage area on disks. If the systems
workload always causes paging, you should consider increasing real memory.
Accessing pages on disk is relatively slow.
wa column
The wa column gives the same information as the %wio column of sar -u. It
indicates that the CPU has outstanding disk I/Os to complete. If this value is always
non-zero, it might indicate that your system is I/O bound.
B-16 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
AIX Tools: svmon
Global report
# svmon -G
size inuse free pin virtual
memory 32744 20478 12266 2760 11841
pg space 65536 294
Sizes are in # of
4K frames
Top 3 users of
# svmon -Pt 3 memory
Notes:
Examples
In both examples on the visual, the output has been reduced for simplicity and to show
the information that is of interest to this discussion.
In the first example, svmon -G provides a global report. You can see the size of
memory, how much is in use and the amount that is free. It provides details about how it
is being used and it also provide statistics on paging space.
All numbers are reported as the number of frames. A frame is 4 KB in size.
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-17
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
In the second example, svmon -Pt 3 displays memory usage of the top three
processes using memory, sorted in decreasing order of memory demand. The flags are:
P shows processes
t gives the top # to display
B-18 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Monitoring Disk I/O: iostat
# iostat 10 2
Notes:
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-19
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
iostat output
Following are descriptions of the sections in the iostat output:
- tty displays the number of characters read from (tin) and sent to (tout) terminals
- avg-cpu gives the same information as the sar -u and vmstat outputs (CPU
utilization)
- Disks show the I/O statistics for each disk and CD-ROM on the system
%tm_act is the percent of time the device was active over the period
Kbps is the amount of data, in kilobytes, transferred (read and written) per
second
tps is the number of transfers per second
Kb_read and Kb_wrtn are the numbers of kilobytes read and written in the
interval
B-20 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
AIX Tools: filemon
Notes:
Example
In the example in the visual, filemon -o fmout starts the trace. The -o directs the
output to the file called fmout. There will be several sections included in this report. The
sample output has been reduced to only show two areas: logical volume activity and
physical volume activity.
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-21
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
B-22 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
topas
# topas
Topas Monitor for host: kca81 EVENTS/QUEUES FILE/TTY
Mon Aug 9 11:48:35 2005 Interval: 2 Cswitch 370 Readch 11800
Syscall 461 Writech 95
Kernel 0.1 | | Reads 18 Rawin 0
CPU
User 0.0 | | Writes 0 Ttyout 0
info Wait 0.0 | | Forks 0 Igets 0
Idle 99.8 |############################| Execs 0 Namei 1
Runqueue 0.0 Dirblk 0
Network KBPS I-Pack O-Pack KB-In KB-Out Waitqueue 0.0
en0 0.1 0.4 0.4 0.0 0.1
lo0 0.0 0.0 0.0 0.0 0.0 PAGING MEMORY
Faults 1 Real,MB 4095
Disk Busy% KBPS TPS KB-Read KB-Writ Steals 0 % Comp 15.4
iostat hdisk0 0.0 0.0 0.0 0.0 0.0 PgspIn 0 % Noncomp 9.3
info hdisk1 0.0 0.0 0.0 0.0 0.0 PgspOut 0 % Client 1.8
PageIn 0
PageOut 0 PAGING SPACE
Sios 0 Size,MB 3744
Name PID CPU% PgSp Owner % Used 0.6
topas 18694 0.1 1.4 root NFS (calls/sec) % Free 99.3
rmcd 10594 0.0 2.0 root ServerV2 0
nfsd 15238 0.0 0.0 root ClientV2 0 Press:
syncd 3482 0.0 1.3 root ServerV3 0 "h" for help
gil 2580 0.0 0.0 root ClientV3 0 "q" to quit
vmstat
info
Notes:
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-23
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# iostat 10 60
# vmstat 5
# sar -u 60 60
Notes:
B-24 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Workload Management Techniques (1 of 3)
# crontab -e
0 3 * * 1-5 /usr/local/bin/report
Notes:
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-25
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# vi /etc/qconfig
ksh:
device = kshdev
discipline = fcfs
kshdev:
backend = /usr/bin/ksh
Notes:
B-26 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-27
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
B-28 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-29
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
To enable:
smtctl [ -m off | on [ -w boot | now]]
Notes:
Execution units
Modern processors have multiple specialized execution units, each of which is capable
of handling a small subset of the instruction set architecture; some will handle integer
operations, some floating point, and so on. These execution units are capable of
operating in parallel so several instructions of a program may be executing
simultaneously.
However, conventional processors execute instructions from a single instruction
stream. Despite microarchitectural advances, execution unit utilization remains low in
todays microprocessors. It is not unusual to see average execution unit utilization rates
of approximately 25% across a broad spectrum of environments. To increase execution
unit utilization, designers use thread-level parallelism, in which the physical processor
core executes instructions from more than one instruction stream. To the operating
system, the physical processor core appears as if it is a symmetric multiprocessor
containing two logical processors.
B-30 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-31
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Notes:
topas enhancements
If topas runs on a partition with a shared processor partition, beneath the CPU
utilization, there are two new values displayed:
- Physc displays the number of physical processors granted to the partition (if
Micro-Partitioning)
- %Entc displays the percentage of entitled capacity granted to a partition (if
Micro-Partitioning)
The -L flag will switch the output to a logical partition display. You can either use -L
when invoking the topas command, or as a toggle when running topas. In this mode,
topas displays data similar to the mpstat and lparstat commands.
B-32 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
iostat enhancements
Beginning with AIX 5L V5.3, the iostat command reports the percentage of physical
processors consumed (%physc), the percentage of entitled capacity consumed (%entc),
and the processing capacity entitlement when running in a shared processor partition.
These metrics will only be displayed on shared processor partitions.
In the system configuration information, you can see the currently assigned processing
capacity specified as ent.
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-33
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
In the System configuration: lcpu=2 ent=0.40 line, the lcpu field shows
logical cpus and the ent field gives the LPARs entitled capacity.
Notice the physc and %entc columns. physc reports the number of physical
processors consumed. This will be reported only if the partition is running with
shared processors or simultaneous multi-threading enabled. entc reports the
percentage of entitled capacity consumed.
B-34 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Performance Diagnostic Tool (PDT)
PDT assesses the current state of a system and tracks
changes in workload and performance.
Notes:
Introduction
The Performance Diagnostic Tool (PDT) assesses the current state of a system and
tracks changes in workload and performance. It attempts to identify incipient problems
and suggest solutions before the problems become critical. PDT is available on all
AIX V4 and later systems. It is contained in fileset bos.perf.diag_tool. The PDT data
collection and reporting is very easy to implement.
PDT attempts to apply some general concepts of well-performing systems to its search
for problems.
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-35
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Error-free operation
Hardware or software errors often produce performance problems:
- Check the hardware and software error logs
- Report bad VMM pages (pages that have been allocated by applications but have
not been freed properly)
B-36 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Enabling PDT
# /usr/sbin/perf/diag_tool/pdt_config
Notes:
Enabling PDT
PDT must be enabled in order to begin collecting data and writing reports. Enable PDT
by executing the script /usr/sbin/perf/diag_tool/pdt_config. Only the root user is
permitted to run this script. From the PDT menu, option 4 enables the default data
collection functions. Actual collection occurs via cron jobs run by the cron daemon.
The menu is created using the Korn Shell select command. This means the menu
options are not reprinted after each selection. However, the program will show the
menu again if you press Enter without making a selection.
Other options
To alter the recipient of reports, use option 2. The default recipient is the adm user.
Reports have severity levels. There are three levels; level 1 gives the smallest report,
while level 3 will analyze the data in more depth.
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-37
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Option 6 does not deinstall the program, it simply advises how you might do that.
Types of analysis
Analysis by PDT is both static (configuration focused; that is, I/O and paging) and
dynamic (over time). Dynamic analysis includes such areas as network, CPU, memory,
file size, file system usage, and paging space usage. An additional part of the report
evaluates load average, process states, and CPU idle time.
Diagnostic reports
Once PDT is enabled, it maintains data in a historical record for 35 days (by default). On
a daily basis, by default, PDT generates a diagnostic report that is sent to user adm and
also written to /var/perf/tmp/PDT_REPORT.
B-38 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
cron Control of PDT Components
# cat /var/spool/cron/crontabs/adm
0 21 * * 6 /usr/sbin/perf/diag_tool/Driver_ offweekly
Notes:
PDT components
The three main components of the PDT system are:
- Collection control
- Retention control
- Reporting control
crontab entries
When PDT is enabled, by default, it adds entries to the crontab file for adm to run
these functions at certain default times and frequencies. The entries execute a shell
script called Driver_ in the /usr/sbin/perf/diag_tool directory. This script is passed
three different parameters, each representing a collection profile, at three different
collection times.
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-39
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# cat /var/spool/cron/crontabs/adm
0 9 * * 1-5 /usr/sbin/perf/diag_tool/Driver_ daily
0 10 * * 1-5 /usr/sbin/perf/diag_tool/Driver_ daily2
0 21 * * 6 /usr/sbin/perf/diag_tool/Driver_ offweekly
The crontab entries and the Driver_ script indicate that daily statistics (daily) are
collected at 9:00 A.M. and reports (daily2) are generated at 10:00 A.M. every work
day, and historical data (offweekly) is cleaned up every Saturday night at 9:00 P.M.
B-40 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
PDT Files
Collection
Driver_ daily
/var/perf/cfg/diag_tool/.collection.control
Retention
Driver_ offweekly
/var/perf/cfg/diag_tool/.retention.control
/var/perf/tmp/.SM /var/perf/tmp/.SM.last
Reporting
/var/perf/tmp/PDT_REPORT /var/perf/tmp/.SM.discards
Next Day
adm
/var/perf/tmp/PDT_REPORT.last
Copyright IBM Corporation 2005
Notes:
Collection component
The parameter passed to the Driver_ shell script is compared with the contents of the
.control files found in the /var/perf/cfg/diag_tool directory to find a match. These
control files contain the names of scripts to run to collect data and generate reports.
When a match is found, the corresponding scripts are run. The scripts that are executed
for daily are in .collection.control, those for daily2 are in .reporting.control, and
offweekly are in .retention.control.
The collection component comprises a set of programs in /usr/sbin/perf/diag_tool that
periodically collect and record data on configuration, availability and performance.
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-41
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Retention component
The retention component periodically reviews the collected data and discards data that
is out of date. The size of the historical record is controlled by the file
/var/perf/cfg/diag_tool/.retention.list. This file contains the default number, 35, which
is the number of days to keep. Data that is discarded during the cleanup, is appended to
the file /var/perf/tmp/.SM.discards. The cleansed data is kept in /var/perf/tmp/.SM.
One last backup is held in the file /var/perf/tmp/.SM.last.
Reporting component
The reporting component periodically produces a diagnostic report from the current set
of historical data. On a daily basis, PDT generates a diagnostic report and mails the
report (by default) to adm and writes it to /var/perf/tmp/PDT_REPORT. The previous
days report is saved to /var/perf/tmp/PDT_REPORT.last.
Any PDT execution errors will be appended to the file /var/perf/tmp/.stderr.
B-42 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Customizing PDT: Changing Thresholds
# vi /var/perf/cfg/diag_tool/.thresholds
DISK_STORAGE_BALANCE 800
PAGING_SPACE_BALANCE 4
NUMBER_OF_BALANCE 1
MIN_UTIL 3
FS_UTIL_LIMIT 90
MEMORY_FACTOR .9
TREND_THRESHOLD .01
EVENT_HORIZON 30
Notes:
Thresholds
The /var/perf/cfg/diag_tool/.thresholds file contains the thresholds used in analysis
and reporting. The visual shows the content of the default file. The file may be modified
by root or adm. Following is a list of all the thresholds:
- DISK_STORAGE_BALANCE
- PAGING_SPACE_BALANCE
- NUMBER_OF_BALANCE
- MIN_UTIL
- FS_UTIL_LIMIT
- MEMORY_FACTOR
- TREND_THRESHOLD
- EVENT_HORIZON
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-43
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
DISK_STORAGE_BALANCE (MB)
The SCSI controllers having the largest and smallest disk storage are identified. This is
a static size, not the amount allocated or free.The default value is 800. Any integer
value between zero (0) and 10000 is valid.
PAGING_SPACE_BALANCE
The paging spaces having the largest and the smallest areas are identified. The default
value is 4. Any integer value between zero (0) and 100 is accepted. This threshold is
presently not used in analysis and reporting.
NUMBER_OF_BALANCE
The SCSI controllers having the greatest and fewest number of disks attached are
identified.The default value is one (1). It can be set to any integer value from zero (0) to
10000.
MIN_UTIL (%)
Applies to process utilization. Changes in the top three CPU consumers are only
reported if the new process had a utilization in excess of MIN_UTIL. The default value is
3. Any integer value from zero (0) to 100 is valid.
FS_UTIL_LIMIT (%)
Applies to journaled file system utilization. Any integer value between zero (0) and 100
is accepted.
MEMORY_FACTOR
The objective is to determine whether the total amount of memory is adequately backed
up by paging space. The formula is based on experience and actually compares
MEMORY_FACTOR * memory with the average used paging space. The current
default is .9. By decreasing this number, a warning is produced more frequently.
Increasing this number eliminates the message altogether. It can be set anywhere
between .001 and 100.
TREND_THRESHOLD
Used in all trending assessments. It is applied after a linear regression is performed on
all available historical data. This technique basically draws the best line among the
points. The slope of the fitted line must exceed the last_value * TREND_THRESHOLD.
The objective is to try to ensure that a trend, however strong its statistical significance,
B-44 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty has some practical significance. The threshold can be set anywhere between 0.00001
and 100000.
EVENT_HORIZON (Days)
Also used in trending assessments. For example, in the case of file systems, if there is
a significant (both statistical and practical) trend, the time until the file system is 100
percent full is estimated. The default value is 30, and it can be any integer value
between zero (0) and 100000.
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-45
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
# vi /var/perf/cfg/diag_tool/.files
/var/adm/wtmp
Files and
/var/spool/qdaemon/
/var/adm/ras/
directories
/tmp/ to monitor
# vi /var/perf/cfg/diag_tool/.nodes
pluto
neptun
Systems
mars to monitor
Notes:
B-46 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
PDT Report Example (Part 1)
Performance Diagnostic Facility 1.0
Report printed: Sun Aug 21 20:53:01 2005
Host name: master
Range of analysis included measurements
from: Hour 20 on Sunday, August 21st, 2005
to: Hour 20 on Sunday, August 21st, 2005
Alerts
I/O CONFIGURATION
- Note: volume hdisk2 has 480 MB available for
allocation while volume hdisk1 has 0 MB available
PAGING CONFIGURATION
- Physical Volume hdisk1 (type:SCSI) has no paging space defined
I/O BALANCE
- Physical volume hdisk0 is significantly busier than others
volume hdisk0, mean util. = 11.75
volume hdisk1, mean util. = 0.00
NETWORK
- Host sys1 appears to be unreachable
Notes:
Disclaimer
Note that this is a doctored report example. Some sections have been deliberately
altered for enhanced dramatic effect; some small parts have been left out for simplicity.
Header section
The PDT report consists of several sections. The header section provides information
on the time and date of the report, the host name and the time period for which data
was analyzed. The content of this section does not differ with changes in the severity
level.
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-47
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Alerts section
After a header section, the Alerts section reports on identified violations of concepts and
thresholds. If no alerts are found, the section is not included in the report. The Alerts
section focuses on identified violations of applied concepts and thresholds. The
following subsystems may have problems and appear in the Alerts section:
- File system
- I/O configuration
- Paging configuration
- I/O balance
- Page space
- Virtual memory
- Real memory
- Processes
- Network
For severity 1 levels, the Alerts section focuses on file systems, physical volumes,
paging and memory. If you ask for severity 2 or 3 reporting, it adds information on
configuration and processes, as seen in the example in the visual.
Alerts indicate suspicious configuration and load conditions. In this example, it appears
that one disk is getting all the I/O activity. Clearly, the I/O load is not distributed to make
the best use of the available resources.
B-48 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
PDT Report Example (Part 2)
Upward Trends
FILES
- File (or directory) /var/adm/ras/ SIZE is increasing
now, 364 KB and increasing an avg. of 5282 bytes/day
FILE SYSTEMS
- File system lv01(/fs3) is growing
now, 29.00% full, and growing an avg. of 0.30%/day
At this rate lv01 will be full in about 45 days
ERRORS
- Hardware ERRORS; time to next error is 0.982 days
System Health
SYSTEM HEALTH
- Current process state breakdown:
2.10 [0.5%]: waiting for the CPU
89.30 [22.4%]: sleeping
306.60 [77.0%]: zombie
398.00 = TOTAL
Summary
This is a severity level 1 report
No further details available at severity level >1
Copyright IBM Corporation 2005
Notes:
Trends sections
The report then deals with Upward Trends and Downward Trends. These two sections
focus on problem anticipation rather than on the identification of existing problems. The
same concepts are applied, but used to project when violations might occur. If no trends
are detected, the section does not appear.
PDT employs a statistical technique to determine whether or not there is a trend in a
series of measurements. If a trend is detected, the slope of the trend is evaluated for its
practical significance. For upward trends, the following items are evaluated:
- Files
- File systems
- Hardware and software errors
- Paging space
- Processes
- Network
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-49
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
Summary section
In the Summary section, the severity level of the current report is listed. There is also an
indication given as to whether more details are available at higher severity levels. If so,
an adhoc report may be generated to get more detail, using the
/usr/sbin/perf/diag_tool/pdt_report command.
B-50 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Uempty
Unit Summary
Notes:
Copyright IBM Corp. 2000, 2005 Appendix B. Performance and Workload Management B-51
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
B-52 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Packaging
The following information contrasts AIX and HP-UX packaging details.
Units AIX HP-UX
Smallest installable unit fileset fileset
Single installable image must be distrib- package Product
uted and installed as a unit
Logical grouping of packages bundle bundle
Logical grouping of packages and software Bundle offering, for example:
clusters App-Dev: Application Development
Environment
Client:
Pers-Prod
DCE-Client
Media-Defined
Copyright IBM Corp. 2000, 2005 Appendix C. Quick Reference: HP-UX to AIX C-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
C-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Appendix C. Quick Reference: HP-UX to AIX C-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
C-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Appendix C. Quick Reference: HP-UX to AIX C-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
C-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Packaging
The following information contrasts AIX and Solaris packaging details.
Units AIX Solaris
Smallest installable unit fileset package
Single installable image must be distrib- package package
uted and installed as a unit
Logical grouping of packages bundle software cluster
Logical grouping of packages and software Bundle offering, for example: Software configuration clusters, for exam-
clusters App-Dev: Application Development ple:
Environment Core: Required operating system files
Client: End-User System Support: Core plus
Pers-Prod window environment
DCE-Client Developer System Support: End-User
Media-Defined plus the development environment
Entire Distribution: Developer System
plus enhanced features
Entire Distribution Plus OEM: Entire
Distribution plus third-party hardware
drivers (on SPARC only)
Copyright IBM Corp. 2000, 2005 Appendix D. Quick Reference: Solaris to AIX D-1
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
D-2 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Kernel modules directory Kernel and kernel extension modules are Kernel modules are stored in three directo-
stored in two directories: ries:
/usr/lib/boot /platform/sparc/kernel or
/usr/lib/drivers /platform/i86pc/kernel
/kernel
/usr/kernel
Create and stop processes and Set the default environment variables Set the default environment variables as
services for a current system run as defined in /etc/rc defined in /etc/default/init.
level based on the /etc/inittab file.
System run levels Defined run levels: Eight run levels:
0-1: Reserved for future use 0: Power-down state
2: Multiuser state with NFS resources s or S: Single-user state
shared (default run level) 1: Administrative state
3-9: Defined according to the users pref- 2: Multiuser state
erences 3: Multiuser state with NFS resources
m,M,s,S: Single-user state (maintenance shared (default run level)
level) 4: Alternative multiuser (not in use)
a,b,c: Starts processes assigned to the new 5: Power-down state
run levels while leaving the existing pro- 6: Reboot state
cesses at the current level running
Q,q: init command to reexamine the
/etc/inittab file
Copyright IBM Corp. 2000, 2005 Appendix D. Quick Reference: Solaris to AIX D-3
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
D-4 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Appendix D. Quick Reference: Solaris to AIX D-5
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
D-6 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
Student Notebook
Copyright IBM Corp. 2000, 2005 Appendix D. Quick Reference: Solaris to AIX D-7
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
Student Notebook
D-8 AIX 5L for UNIX Professionals Copyright IBM Corp. 2000, 2005
Course materials may not be reproduced in whole or in part
without the prior written permission of IBM.
V3.1.0.1
backpg
Back page