admin i

908
AIX 5L System Administration I: Implementation (Course Code AU14) Student Notebook ERC 11.0 IBM Certified Course Material V3.1.0.1 cover

Upload: madunix

Post on 07-Sep-2015

9 views

Category:

Documents


4 download

DESCRIPTION

AIX

TRANSCRIPT

  • AIX 5LSystem Administration I: Implementation (Course Code AU14)

    Student NotebookERC 11.0

    e Material

    V3.1.0.1

    cover

    Front coverIBM Certified Cours

  • Student Notebook

    TrademarksThe reader should recognize that the following terms, which appear in the content of this training document, are official trademarks of IBM or other companies: IBM is a registered trademark of International Business Machines Corporation.The following are trademarks of International Business Machines Corporation in the United States, or other countries, or both:AIX AIX 5L AS/400CICS/6000 DB2 DominoJuly 2005 Edition

    The information contained in this document has not been submitted to any formal IBM test and is distributed on an as is basis withoutany warranty either express or implied. The use of this information or the implementation of any of these techniques is a customerresponsibility and depends on the customers ability to evaluate and integrate them into the customers operational environment. Whileeach item may have been reviewed by IBM for accuracy in a specific situation, there is no guarantee that the same or similar results willresult elsewhere. Customers attempting to adapt these techniques to their own environments do so at their own risk.

    Copyright International Business Machines Corporation 1997, 2005. All rights reserved.This document may not be reproduced in whole or in part without the prior written permission of IBM.Note to U.S. Government Users Documentation related to restricted rights Use, duplication or disclosure is subject to restrictionsset forth in GSA ADP Schedule Contract with IBM Corp.

    Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.UNIX is a registered trademark of The Open Group in the United States and other countries.Linux is a trademark of Linus Torvalds in the United States, other countries, or both.Other company, product and service names may be trademarks or service marks of others.

    HACMP Hummingbird InfoprintiSeries Language Environment LotusMagstar Micro Channel MVSNetwork Station OS/2 POWERPOWER2 POWER GTO PowerPCPS/2 pSeries RedbooksRequisite RISC System/6000 RS/6000SecureWay SP System/370Tivoli

  • Student NotebookV3.1.0.1

    TOC Copyright IBM Corp. 1997, 2005 Contents iii

    ContentsTrademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv

    Course Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii

    Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix

    Unit 1. Introduction to IBM Sserver pSeries Systems and AIX System Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1

    Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2What Is RISC Technology? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3pSeries System Bus Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5Workstation Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7Server Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8PC Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9Uniprocessor (Uni) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10SMP and Cluster 1600 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-11Logical Partitioning (LPAR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13Role of the System Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15Who Can Perform Administration Tasks? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18Exercise 1: root Login Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-20

    Unit 2. AIX 5L V5.3 Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2Installation Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3Installation Process (From CD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5Console and Language Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7Installation and Maintenance Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9Installation and Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-10Method of Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11Installation Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13Erasure Options for Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14Primary Language Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16Install Options for 32-bit Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17Install Options for 64-bit Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19Install More Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-21Begin Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22Installation Flowchart - All Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-23Configuration Assistant Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-24Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-26Exercise 2: Configuration Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-27Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-28Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook

    Unit 3. System Management Interface Tool (SMIT) . . . . . . . . . . . . . . . . . . . . . . 3-1iv AIX System Administration I Copyright IBM Corp. 1997, 2005

    Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2Early System Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-3System Management Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-5AIX Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-7System Management Interface Tool (SMIT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-9SMIT Main Menu (ASCII) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-11SMIT Main Menu (Motif) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-13Dialog Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-15Output Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-18SMIT Log and Script Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-19smit Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-21Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-23Exercise: Using SMIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-24Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-25

    Unit 4. AIX Software Installation and Maintenance . . . . . . . . . . . . . . . . . . . . . . 4-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-2AIX Product Offerings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3Packaging Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-5Bundles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-6Fileset Naming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-7Software Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-9Software States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-11Software Installation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-13Install and Update Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-14Install Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-16Software Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-18List Installed Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-19Fix Repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-20Fix Central Web Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-21More Fix Services Screen (from Fix Central) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-24Compare Report Screen (from Fix Central) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-26Software Service Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-29Comparison Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-31Software Maintenance and Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-34instfix Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-36Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-38Exercise 14: AIX Software Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-39Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-40

    Unit 5. Configuring AIX Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-2Configuring AIX 5L V5.3 Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3Configuring AIX 5L V5.3 Online Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-4Change/Show Documentation Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-6IBM pSeries Information Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-8Information Center Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-10Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    TOC Information Center Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11 Copyright IBM Corp. 1997, 2005 Contents v

    Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12Exercise 5: Information Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-13Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-14

    Unit 6. Web-based System Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2Web-based System Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3Accessing the Web-based System Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5Using the Web-based System Manager (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8Using the Web-based System Manager (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9Using the Web-based System Manager (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10Installation for a Remote Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11Configure the HTTP (Web) Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-14Remote Client Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-15HMC: Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-17Remote Access to the HMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-19HMC Application Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22Exercise 6: Web-based System Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-23Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-24

    Unit 7. System Startup and Shutdown. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2Startup Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3Starting System Management Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6PCI RS/6000 Start Up Process Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8bootinfo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10The alog Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-12/etc/inittab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-14System Resource Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-16System Resource Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17Stopping Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-19System Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20Manage the System Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22Manage System Language Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26Exercise 7 - System Startup and Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-27Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-28

    Unit 8. Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2Device Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3Listing of /dev Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-5Device Configuration Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7List All Supported Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9List All Defined Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-11Device States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-13Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook

    Self-Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-15vi AIX System Administration I Copyright IBM Corp. 1997, 2005

    SMIT Devices Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-16Device Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-18Location Code Format for PCI Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-19Location Code Example: Non-SCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-22Location Code Format for SCSI Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-24Location Code Example for SCSI Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-26Location Code Example: PCI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-27pSeries 670 and 690 Location Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-28Listing Device Physical Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-30Adding an ASCII Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-31Attachment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-32Device Nomenclature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-34Add a TTY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-35Documenting Hardware Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-37Checkpoint (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-39Checkpoint (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-40Exercise 8: Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-41Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-42

    Unit 9. System Storage Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-2Components of AIX Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-3Traditional UNIX Disk Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-4Benefits of the LVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-5Logical Volume Manager Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-6Physical Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-8Volume Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-10Volume Group Descriptor Area (VGDA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-12Logical Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-14Uses of Logical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-16What Is a File System? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-18Why Have Multiple File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-20Standard File Systems in AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-22Let's Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-24/etc/filesystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-25Mount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-27Mounting over an Empty Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-28Mounting over Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-29Listing File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-30Listing Logical Volume Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-31Checkpoint (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-32Checkpoint (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-33Checkpoint (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-34Exercise 9: LVM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-35Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-36Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    TOC Unit 10. Working with the Logical Volume Manager . . . . . . . . . . . . . . . . . . . . . 10-1 Copyright IBM Corp. 1997, 2005 Contents vii

    Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2Logical Volume Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-3

    10.1 Volume Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5Volume Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6SMIT Volume Groups Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-7List All Volume Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8List Volume Group Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-9List Volume Group Information (Physical Volumes) . . . . . . . . . . . . . . . . . . . . . . 10-10List Volume Group Information (Logical Volumes) . . . . . . . . . . . . . . . . . . . . . . . 10-11Add a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12Add a Scalable Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-14Set Characteristics of a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-15Change a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-16Logical Track Group (LTG) Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-18Hot Spare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-20Extending and Reducing Volume Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-23Remove a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-25Activate/Deactivate a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-26Import/Export a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-28Advanced RAID Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-29Exercise: Working with LVM (Parts 1 and 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-31

    10.2 Logical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-33Logical Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-34Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-35Mirror Write Consistency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-38Striping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-40Striped Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-42Logical Volume Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-43SMIT Logical Volumes Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-45Show Logical Volume Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-46Add a Logical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-48Remove a Logical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-49Set Characteristics of a Logical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-50List All Logical Volumes By Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-52Show Logical Volume Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-53Add Copies to a Logical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-54Reorganize a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-56

    10.3 Physical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-57Physical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-58SMIT Physical Volumes Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-59List Physical Volume Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-60List Logical Volumes on a Physical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-61List a Physical Volume Partition Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-62Add or Move Contents of Physical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-63Documenting the Disk Storage Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-65Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-66Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook

    Exercise: Working with LVM (Parts 3-5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-67viii AIX System Administration I Copyright IBM Corp. 1997, 2005

    Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-68

    Unit 11. Working with File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-2Structure of a Journaled File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-3Structure of an Inode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-5File System Fragmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-6Variable Number of Inodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-8Allocation Group Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-10Compressed File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-12Large Enabled File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-14Exercise 11: Inodes and NBPI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-16Journal Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-17JFS versus JFS2 File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-19Extended Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-22File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-24Listing File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-25List All Mounted File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-27Add/Change/Show/Delete File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-29Working with Journaled Files Systems in SMIT . . . . . . . . . . . . . . . . . . . . . . . . . .11-30Add a Standard Journaled File System on a Previously Defined Logical Volume 11-31Add a Standard Journaled File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-33Working with Enhanced Journaled File Systems (JFS2) in SMIT . . . . . . . . . . . .11-36Add an Enhanced Journaled File System (JFS2) on a Previously Defined Logical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-37Add an Enhanced Journaled File System (JFS2) . . . . . . . . . . . . . . . . . . . . . . . . .11-39Mount a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-40Change/Show Characteristics of a Journaled File System . . . . . . . . . . . . . . . . . .11-43Change/Show Characteristics of an Enhanced Journaled File System . . . . . . . .11-45Dynamically Shrinking a JFS2 File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-46Remove a Journaled File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-48Add a RAM File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-50Add a UDF File System on a DVD-RAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-51System Storage Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-53Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-55Exercise: Working with File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-56Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-57

    Unit 12. Managing File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-2Space Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-3Listing Free Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-5Control Growing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-7The skulker Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-9Listing Disk Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-11Fragmentation Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-13Defragmenting a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-15Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    TOC Verify a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-17 Copyright IBM Corp. 1997, 2005 Contents ix

    Documenting File System Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-19Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-20Exercise: Managing File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-21Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-22

    Unit 13. Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2What Is Paging Space? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-3Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-5Sizing Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-7Paging Space Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-9Checking Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-11Adding Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-13Change Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-15Remove Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-17Problems with Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-19Documenting Paging Space Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-20Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-21Exercise 13: Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-22Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-23

    Unit 14. Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-2Why Backup? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-3Types of Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-5Backup Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-7Backup Devices - Diskette . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-8Backup Devices - Tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-10Backup Device - Read/Write Optical Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-12Backup Device - 7210 External DVD-RAM Drive . . . . . . . . . . . . . . . . . . . . . . . . 14-15SMIT Backup Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-16rootvg Backup Process - mksysb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-17/image.data File for rootvg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-19/bosinst.data File for rootvg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-21rootvg - Back up the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-26rootvg - Back up the System to Tape or File . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-27mksysb Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-29Back Up a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-31Back Up a Volume Group to Tape/File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-32Restoring a mksysb (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-34Restoring a mksysb (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-35Remake/Restore a non-rootvg Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . 14-37mksysb - ISO9660 Burn Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-39mksysb - UDF DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-41rootvg - Back Up the System to CD (ISO9660) . . . . . . . . . . . . . . . . . . . . . . . . . . 14-42rootvg - Back Up the System to ISO9660 DVD . . . . . . . . . . . . . . . . . . . . . . . . . . 14-43rootvg - Back Up the System to UDF DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-44Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook

    Back Up a Volume Group to CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-45x AIX System Administration I Copyright IBM Corp. 1997, 2005

    Back Up a Volume Group to ISO9660 DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-46Back Up a Volume Group to UDF DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-47Exercise 14: Using backup and restore (Part 1) . . . . . . . . . . . . . . . . . . . . . . . . .14-48Back Up by Filename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-49Back Up by Filename Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-51Back Up a File or a Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-53Back Up a File System by Inode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-54Incremental Backup Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-56Back Up a File System by Inode Using SMIT . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-58restore Command (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-59restore Command (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-61Restore a File or a Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-62Exercise 14: Using backup and restore (Parts 2, 3, and 4) . . . . . . . . . . . . . . . .14-63Other UNIX Backup Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-64The tar Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-66The cpio Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-68The dd Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-70Controlling the Tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-72Good Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-74Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-76Exercise 15: (Optional) Using tar and cpio . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-77Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-78

    Unit 15. Security and User Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-2

    15.1 Security Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-3User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-4Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-6Group Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-8User Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-10Controlling Access to the root Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-11Security Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-13File/Directory Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-15Reading Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-17Changing Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-19umask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-21Changing Ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-23Exercise 16: Security Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-25

    15.2 User Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-27Login Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-28User Initialization Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-30Security and Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-32SMIT Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-34List All Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-36Add a User to the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-38Change / Show Characteristics of a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-41Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    TOC Remove a User from the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-43 Copyright IBM Corp. 1997, 2005 Contents xi

    Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-45Regaining root's Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-47SMIT Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-49List All Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-50Add Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-51Change / Remove Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-53Message of the Day . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-55Exercise 17: User Administration (Parts 1-5) . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-56

    15.3 Security Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-57Security Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-58/etc/passwd File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-60/etc/security/passwd File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-62/etc/security/user File (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-64/etc/security/user File (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-67Group Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-71/etc/security/login.cfg File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-73Validating the User Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-75System Management Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-77PCI RS/6000 Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-78Documenting Security Policy and Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-80Checkpoint (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-81Checkpoint (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-82Exercise 17: User Administration (Parts 6-7) . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-83Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-84

    Unit 16. Scheduling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-2The cron Daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-3crontab Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-5Format of a crontab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-7Editing a crontab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-9The at and batch Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-11Controlling at Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-13Documenting Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-14Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-15Exercise 18: Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-16Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-17

    Unit 17. Printers and Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-2AIX 5L Printing Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-3AIX Print Subsystem: Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-5System V Print Subsystem: Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-7Concepts of Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-9Printer Data Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-11System Files Associated with Printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-13Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook

    qdaemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-15xii AIX System Administration I Copyright IBM Corp. 1997, 2005

    The /etc/qconfig File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-17Printer Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-20AIX Printer Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-21Configuring a Printer with a Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-23Selecting a Printer Type (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-24Selecting a Printer Type (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-25Printer Attachment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-26Add the Print Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-27Remote Printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-28Client Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-29Start lpd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-30Add a Remote Print Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-31Define the Print Server on the Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-32Let's Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-33Submitting Print Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-34Listing Jobs in a Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-36Change Characteristics of a Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-38Removing a Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-40Managing Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-41Understanding Queue Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-42Bringing Queues Up and Down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-44Managing Print Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-45Cancelling Print Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-46Job Priority Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-48Holding a Job in a Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-50Moving a Job between Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-51Printing-related Directories to Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-52Printing Problem Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-53Checkpoint (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-55Checkpoint (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-56Exercise 19: Printers and Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-57Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-58

    Unit 18. Networking Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-2What Is TCP/IP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-3An Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-5Names and Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-7TCP/IP Network Facilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-9Information Needed to Configure TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-11Configuring TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-13Flat Name Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-15Identifying the Hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-16Basic TCP/IP User Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-17Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-21Exercise 20: Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-22Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-23Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    TOC Appendix A. Checkpoint Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1 Copyright IBM Corp. 1997, 2005 Contents xiii

    Appendix B. Configuring AIX 5L V5.2 Documentation . . . . . . . . . . . . . . . . . . . . . B-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-2Configuring AIX 5L V5.2 Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3

    Appendix C. Command Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1

    Appendix D. Sample Shell Scripts Used in Class . . . . . . . . . . . . . . . . . . . . . . . . . D-1

    Appendix E. AIX Control Book Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-1

    Appendix F. Serial Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-2Non-Self-Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-3Device Nomenclature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-10Exercise Appendix B: Serial Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-25

    Appendix G. The System V Print Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . G-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . G-2AIX 5L Printing: Whats New? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . G-3Exercise Appendix C: The System V Print Subsystem . . . . . . . . . . . . . . . . . . . . . G-66

    Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .X-1Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebookxiv AIX System Administration I Copyright IBM Corp. 1997, 2005

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    TMK Copyright IBM Corp. 1997, 2005 Trademarks xv

    TrademarksThe reader should recognize that the following terms, which appear in the content of this training document, are official trademarks of IBM or other companies: IBM is a registered trademark of International Business Machines Corporation.The following are trademarks of International Business Machines Corporation in the United States, or other countries, or both:

    Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.UNIX is a registered trademark of The Open Group in the United States and other countries.Linux is a trademark of Linus Torvalds in the United States, other countries, or both.Other company, product and service names may be trademarks or service marks of others.

    AIX AIX 5L AS/400CICS/6000 DB2 DominoHACMP Hummingbird InfoprintiSeries Language Environment LotusMagstar Micro Channel MVSNetwork Station OS/2 POWERPOWER2 POWER GTO PowerPCPS/2 pSeries RedbooksRequisite RISC System/6000 RS/6000SecureWay SP System/370TivoliCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebookxvi AIX System Administration I Copyright IBM Corp. 1997, 2005

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

  • Student NotebookV2.0

    pref Copyright IBM Corp. 1997, 2005 Course Description xvii

    Course DescriptionAIX 5L System Administration I: Implementation

    Duration: 5 days

    PurposeThe purpose of this course is to enable students to install, customize, and administer the AIX 5L V5.3 operating system in a multiuser environment using pSeries systems.

    AudienceAnyone responsible for the system administrative duties implementing and managing AIX 5L V5.3 operating system on an IBM pSeries system.

    PrerequisitesThe students attending this course should be able to: Log in to an AIX system and set a user password Execute basic AIX commands Manage files and directories Use the vi editor Use redirection, pipes, and tees Use the utilities find and grep Use the command and variable substitution Set and change Korn shell variables Write simple shell scriptsThese skills can be acquired by taking the AIX 5L Basics course or through equivalent AIX/UNIX knowledge.

    ObjectivesOn completion of this course, students should be able to: Install the AIX 5L V5.3 operating system, software bundles, and

    filesets Perform system startup and shutdownCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook

    Understand and use the system management toolsxviii AIX System Administration I Copyright IBM Corp. 1997, 2005

    Manage physical and logical devices Perform file system management Create and manage user and group accounts Perform and restore system backups Utilize administrative subsystems, including cron to schedule

    system tasks, and security to implement customized access of files and directories

    Describe basic networking concepts

    Contents Introduction (Overview of pSeries) System Management Tools - SMIT and the Web-based System

    Manager Software Installation and Management System Startup and Shutdown Devices Printers and Queues Managing Queues System Storage Overview Working with the Logical Volume Manager Working with File Systems Managing File Systems Paging Space Backup and Restore Security User Administration Scheduling Networking Overview

    Curriculum relationshipThis course should follow the AIX 5L Basics course. A basic understanding of AIX environment and simple commands is recommended before taking this course.Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV2.0

    pref Copyright IBM Corp. 1997, 2005 Agenda xix

    AgendaDay 1

    Welcome Unit 1 - Introduction to pSeries/AIX System AdministrationActivity: su Unit 2 - AIX V5.3 Installation Activity: Configuration Assistant Unit 3 - System Management Interface Tool (SMIT)Exercise: Using SMIT Unit 4 - AIX Software Installation and Maintenance Exercise: AIX Software Installation Unit 5 - Configuring AIX Documentation Exercise - Information CenterUnit 6 - WebSM Exercise: Configuring WebSM server Unit 7 - System Startup and Shutdown Exercise: System Startup and Shutdown

    Day 2 Unit 8 - Devices Exercise: Devices Unit 9 - System Storage Overview Let's Review: LVM Terminology Unit 9 (Cont) Activity: LVM Commands Unit 10 - Working With the Logical Volume Manager Activity: Volume Groups Unit 10 (Cont) Exercise: Logical Volume Manager Unit 11 - Working with File Systems Activity: Inodes and NBPI

    Day 3 Unit 11 (Cont) Exercise: Working with File Systems Unit 12 - Managing File Systems Exercise: Managing File Systems Unit 13 - Paging Space Exercise: Paging Space Unit 14 - Backup and Restore Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook

    Activity: savevg xx AIX System Administration I Copyright IBM Corp. 1997, 2005

    Unit 14 (Cont) Exercise - Using backup and restore

    Day 4 Unit 14 (Cont) Exercise (optional) - Using tar and cpio Unit 15 - Security and User Administration

    15.1 - Security Concepts Exercise: Security Files 15.2 - User Administration Exercise: User Administration 15.3 - Security Files Activity: Examine the Security Files

    Unit 16 - Scheduling Exercise: Scheduling

    Day 5 Unit 17 - Printers and Queues Let's Review Unit 17 (Cont) Exercise: Printers and Queues Unit 18 - Networking Overview Exercise: Networking Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV2.0

    pref Text highlighting Copyright IBM Corp. 1997, 2005 Agenda xxi

    The following text highlighting conventions are used throughout this book: Bold Identifies file names, file paths, directories, user names and

    principals.Italics Identifies links to Web sites, publication titles, and is used

    where the word or phrase is meant to stand out from the surrounding text.

    Monospace Identifies attributes, variables, file listings, SMIT menus, code examples of text similar to what you might see displayed, examples of portions of program code similar to what you might write as a programmer, and messages from the system.

    Monospace bold Identifies commands, daemons, menu paths and what the user would enter in examples of commands and SMIT menus.

    The text between the < and > symbols identifies information the user must supply. The text may be normal highlighting, bold or monospace, or monospace bold depending on the context.Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebookxxii AIX System Administration I Copyright IBM Corp. 1997, 2005

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-1

    Unit 1. Introduction to IBM Sserver pSeries Systems and AIX System Administration

    What This Unit Is AboutThis unit introduces the basic IBM Sserver pSeries system configurations and describes the roles of the system administrator.

    What You Should Be Able to DoAfter completing this unit, you should be able to: Define terminology and concepts of IBM Sserver pSeries

    systems List common configurations available for IBM Sserver pSeries

    systems Describe the roles of the system administrator Obtain root access with the su command

    How You Will Check Your ProgressAccountability: Checkpoint questions Exercises

    ReferencesGA23-2674 Exploring IBM RS/6000 Computers SG24-4690 A Technical Introduction to PCI-Based RS/6000

    Servers

    SG24-2581 Managing AIX on PCI-Based RISC System/6000 Workstations

    SG24-5120 RS/6000 System Handbook www.ibm.com/eserver/pseriesCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook1-2 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-1. Unit Objectives AU1411.0

    Notes:

    Copyright IBM Corporation 2005

    Unit ObjectivesAfter completing this unit, you should be able to: Define terminology and concepts of IBM Sserver pSeries

    systems List common configurations available for IBM Sserver

    pSeries systems Describe the roles of the system administrator Obtain root access with the su commandCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-3

    Figure 1-2. What Is RISC Technology? AU1411.0

    Notes:

    RISC historyThe IBM Sserver pSeries systems use RISC processors and were formally called RS/6000 systems, where the RS stood for RISC System.Reduced Instruction Set Computing (RISC) architecture was originally developed by IBM in the 1970s. Its basic objective was to provide a reduced instruction set that would execute very fast with maximum efficiency in the hardware. More complex instructions would be implemented in the software.

    POWER architectureThe simple RISC-based instruction is typically executed in one system clock cycle (or less using superscalar techniques). IBM has enhanced the standard RISC technology by introducing the newer Performance Optimized With Enhanced Risc (POWER)

    Copyright IBM Corporation 2005

    What Is RISC Technology?Reduced Instruction Set Computing (RISC) processors aim to: Implement the most used instructions in hardware Execute multiple instructions in one cycle Provide synergy between hardware and software

    Time to executea program

    Time taken fora clock cycle

    Number ofInstructions

    Clock cyclesper instruction

    Depends on:Architecture

    Compiler

    Depends on:Architecture

    CompilerImplementation

    Depends on:Technology

    Implementation

    Optimized onpSeries machines

    = x xCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook

    architecture. The original POWER architecture has also evolved into the PowerPC, 1-4 AIX System Administration I Copyright IBM Corp. 1997, 2005

    POWER4, and POWER5 architectures. The POWER architectures are designed with the newest in circuitry engineering and multiprocessor technologies and yield very fast performance. The instructions are handled in a superscalar (parallel) fashion by the processor which further increases the performance offered by a RISC system.

    64-bit architectureSupport for 64-bit architecture has been provided since AIX V4.3. This support provides improved performance for specialized applications with: - Large address spaces (up to 16,384,000 terabytes) - Access to large datasets for data warehousing, scientific and multimedia

    applications - Long integers in computations A major enhancement to AIX since AIX 5L V5.1 was the introduction of the 64-bit kernel. Server consolidation and workload scalability will continue to require higher capacity hardware systems that support more memory and additional I/O devices. The 64-bit AIX 5L kernel is designed to support these requirements.The 32-bit and the 64-bit kernel are available. Only 64-bit CHRP-compliant PowerPC machines are supported for the 64-bit kernel on the POWER platform. The primary advantage of a 64-bit kernel is the increased kernel address space allowing systems to support increased workloads. This ability is important for a number of reasons: - Data sharing and I/O device sharing are simplified if multiple applications can be run

    on the same system - More powerful systems will reduce the number of systems needed by an

    organization, thereby reducing the cost and complexity of system administrationCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-5

    Figure 1-3. pSeries System Bus Types AU1411.0

    Notes:

    IntroductionThe job of the bus is to provide the highway for information to flow between the IBM Sserver pSeries system elements and the optional I/O feature cards (for example, SCSI adapters, token-ring cards) that are plugged into the adapter slots.

    Peripheral Component Interconnect (PCI) busPeripheral Component Interconnect (PCI) buses are an open industry specification which supports complete processor independence. The PCI bus works across multiple operating system platforms. IBM uses this technology in all of its IBM Sserver pSeries systems.

    Copyright IBM Corporation 2005

    pSeries System Bus Types

    PCI

    Exp BusXface

    ISA

    Processor

    LAN Graphics SCSI

    PCI Bus

    Base I/OFunctionsCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook

    Industry Standard Architecture (ISA) bus1-6 AIX System Administration I Copyright IBM Corp. 1997, 2005

    IBM Sserver pSeries systems also contains an Industry Standard Architecture (ISA) bus for use with some built-in devices like the diskette drive and keyboard. Built-in ISA support remains in AIX 5L V5.3.Some older model PCI systems also contain ISA slots that would accept standard ISA cards. With AIX 5L V5.2 and later, ISA cards are no longer supported.

    Micro Channel Architecture (MCA) busThe first IBM RISC-based machines, at that time called RS/6000s, were based on IBM's Micro Channel Architecture (MCA). The MCA systems are sometimes referred to as classical systems. These were very popular and still make up a large portion of the installed base. MCA machines can be easily recognized by the physical key on the front of the machines. PCI and MCA are basically the same from an administrative viewpoint. There are differences primarily in the startup procedure.Beginning with AIX 5L V5.2, MCA architectures are no longer supported.

    For more informationA good source for hardware information is: http://publib16.boulder.ibm.com/pseries/en_US/infocenter/base/ Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-7

    Figure 1-4. Workstation Configuration AU1411.0

    Notes:

    OverviewOne common configuration for the IBM Sserver pSeries systems is as a single-user graphical workstation suitable for graphics applications, such as CAD/CAM. In this configuration, the IBM Sserver pSeries system has a graphical display (referred to as an LFT - Low Function Terminal) which is attached to a graphics adapter inside the system unit. A keyboard, mouse, and optional graphics tablet are plugged into special ports on the system board. There are a number of graphics cards available for the different IBM Sserver pSeries models which differ in speed, resolution, number of colors supported, 2D or 3D support, and so forth. There are corresponding displays that can be used from personal computer displays through to the 23-inch PowerDisplay.

    Copyright IBM Corporation 2005

    Workstation Configuration

    1280 x 1024 ResolutionUp to 16 M colors

    Single-User Graphical WorkstationPersonal ComputerDisplay or PowerDisplay 15, 17, 20, or 23 inches

    Graphics Adapter

    pSeries

    Two serial portsSCSIKeyboardMouse

    Diskette Ethernet Tablet

    Built-in AdaptersCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook1-8 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-5. Server Configurations AU1411.0

    Notes:

    OverviewSome multiuser systems consist only of ASCII terminals connected locally or over a telephone line by modem. Two ASCII devices can be connected to the serial ports provided on IBM Sserver pSeries systems. All further ASCII devices will require an asynchronous adapter card. More complex systems consist of many IBM Sserver pSeries systems and other devices such as PCs connected over a local area network (LAN) like Ethernet or token ring. In this case, the IBM Sserver pSeries system requires the appropriate communications adapter card.

    Copyright IBM Corporation 2005

    Server Configurations

    Multiuser System

    Networked System

    pSeriesSystem Unit

    ASCII Terminals

    Async Adapter

    Disk storagePrintersProgramsLogin Sessions

    Server Clients

    PCs

    File TransferNetworkManagement

    MailNetwork

    pSeries Other systemspSeriesDocumentationCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-9

    Figure 1-6. PC Connectivity AU1411.0

    Notes:

    OverviewVery commonly, IBM Sserver pSeries systems are accessed via a network using PCs. One way to connect is using telnet. Another method, which is growing in popularity, is to install software on the PC to give the PC the capability to function as an X-Window Server. This allows the PC to function as a graphics display station for the IBM Sserver pSeries system. There are many commercially available software packages for several different operating systems that provide this functionality.

    Copyright IBM Corporation 2005

    PC Connectivity

    Network

    PC

    X Window Server

    Software

    pSeries

    X Window Client

    ProgramsCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook1-10 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-7. Uniprocessor (Uni) AU1411.0

    Notes:

    OverviewThe term uniprocessor refers to a machine with only one processor. The processor is connected to the memory and other adapters via the bus. Today, the I/O buses are based on the Peripheral Component Interconnect (PCI) architecture.

    Copyright IBM Corporation 2005

    Uniprocessor (Uni)

    SSAAdapter

    SCSIAdapter

    GraphicsAdapter

    Cache Processor

    MemoryController

    Processor Bus I/O Bus

    Memory Bus

    Memory CardsCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-11

    Figure 1-8. SMP and Cluster 1600 AU1411.0

    Notes:

    IntroductionThe Symmetric MultiProcessor (SMP) architecture supports a single copy of the operating system which is shared by all processors. Memory and disk are also shared. IBM Sserver pSeries SMP models support both PCI and MCA buses and can support up to 24 processors. Beginning with AIX 5L V5.2, MCA architectures are no longer supported.

    IBM Cluster 1600 systemThe IBM Cluster 1600 systems (originally called IBM Scalable PowerParallel or SP) are a set of up to 16 rack-mounted IBM Sserver pSeries systems or RS/6000 systems, called nodes. The nodes fit in 128 slots on the Cluster 1600. These nodes used to be restricted to special RS/6000 models which fit into specialized frames. A thin node took one slot, a wide node took two slots and a high node took four slots. Today, the Cluster

    Copyright IBM Corporation 2005

    SMP and Cluster 1600

    Loosely-coupled processors linked by high-speed interconnect

    Cluster 1600

    ...

    ...

    ...

    CPUn

    Memn

    CPU2

    Mem2

    CPU1

    Mem1

    Shared NothingInterconnect

    Multiple processors accessing the same memory and all disk

    SMP

    ...CPU

    nCPU2CPU1

    Global Memory

    ...

    Shared Memory

    InterconnectCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook

    1600 can incorporate the regular IBM Sserver pSeries models up to and including 1-12 AIX System Administration I Copyright IBM Corp. 1997, 2005

    p690 machines.Each Cluster 1600 node has its own memory, operating system, expansion slots, and disk. A high-speed network called the SP Switch (up to 480 MB/sec.) is available to connect the nodes together. The Cluster 1600 uses the Parallel System Support Programs (PSSP) to control its environment. The Cluster 1600 system is ideal for any parallel computing, high CPU-usage (such as modeling and numerical analysis) and I/O-intensive applications (such as Data Mining, OLTP, DB2/PE and Oracle Parallel Query/Server). Cluster 1600 is also commonly used in an HACMP (High Availability Cluster Multi-Processing) situation where better physical isolation is desired than can be provided with an LPAR solution.Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-13

    Figure 1-9. Logical Partitioning (LPAR) AU1411.0

    Notes:

    IntroductionThis visual illustrates that LPARs can have resources allocated based on the needs of the workload rather than the amount contained in a physical building block. In the diagram above, there are four partitions, each with various amounts of resources.

    Adding or removing resources dynamicallyOn the IBM Sserver pSeries system implementation of LPARs, you can dynamically add and remove resources (CPUs, memory, and I/O slots) to and from a partition while the operating system is running. For dynamic partitions, the partition must be running AIX 5L V5.2 (or later) and both the managed system and the HMC must be running a version of firmware dated October 2002 or later. All partitions running AIX 5L V5.1 and Linux are static partitions which

    Copyright IBM Corporation 2005

    Logical Partitioning (LPAR)

    Resources allocated in flexible units of granularity

    Interconnect

    LPAR

    Operating System

    P P P P PP P P P P

    M M MAAAAAA

    Operating System

    Operating System

    Operating System

    P P PM M

    AAAA

    P PM M

    AAAA

    P P P P P P PP P P P P P P

    M M M M M M MAAAAAAAAAAAAA

    LPAR LPAR LPAR

    A = AdapterM = MemoryP = Processor

    = DiskCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook

    means the partitions must be reactivated (that is, rebooted) to change the resource 1-14 AIX System Administration I Copyright IBM Corp. 1997, 2005

    configuration.When memory is moved from one partition to another with dynamic LPAR, memory is written to all zeroes by the system firmware. Likewise, I/O adapters are fully reset when moved.

    Allocating disksDisks are not allocated to partitions individually. Instead, the I/O slot containing the adapter controlling one or more disks is allocated to a partition.Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-15

    Figure 1-10. Role of the System Administrator AU1411.0

    Notes:

    OverviewThere are a number of distinct tasks which the system administrator on a UNIX or AIX system must perform. Often there will be more than one system administrator in a large organization, and the tasks can be divided between the different administrators.

    Copyright IBM Corporation 2005

    Role of the System Administrator Pre-installation planning of:

    User accounts/groups Storage allocation/paging space Subsystem (printing, networks, and so forth) Standard naming conventions Determine system policies

    Install and configure hardware Configure the software Configure the network System backup Create/manage user accounts Define and manage subsystems Manage system resources (for example, disk space) Performance monitoring Capacity planning Managing licenses for products Document system configuration and keep it currentCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook1-16 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-11. Who Can Perform Administration Tasks? AU1411.0

    Notes:

    Limiting access to administrative tasksAIX security permissions restrict the performance of administrative tasks to the root user (and sometimes other users in special groups; for example, system for general tasks, security for user administration, printq for AIX Print Subsystem printer management, and lp for System V Print Subsystem printer management.) This means that the root user's password must be kept secure and only divulged to the few users who are responsible for the system. A certain amount of discipline is also required when using the root ID, because typing errors made as root could do catastrophic system damage. For normal use of the system, a non-administrative user ID should be used, and only when superuser privilege is required should the root user ID be used.

    Copyright IBM Corporation 2005

    Who Can Perform Administration Tasks? Usually exclusive to the root user

    Bypasses any file permissions Very dangerous to login as root Keep the root password secure

    Some tasks can be performed by other users in special groups such as system, security, printq, and lp

    The su command allows you to obtain root's permissions or permissions of any user whose password you know

    $ su root

    $ su - rootorCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    Uempty Obtaining root privileges Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-17

    To obtain superuser (root) privileges while logged in as a normal user, you can use the su command. This prompts you for root's password and then give you a shell with root privileges so that you can perform commands. When you have performed the required tasks, you should exit from the su command in the same way as exiting from a normal shell (for example, or the exit command.) This will prevent accidents which could damage the system. The su command allows you to assume the permissions of any user whose password you know. Every time the su command is used, an entry is placed in the file /var/adm/sulog (this is an ASCII text file). This makes it easy to record access as the superuser. Normal logins are recorded in the file /var/adm/wtmp. To read the contents of this file use the command: who /var/adm/wtmp. The su command can also be specified with the - (dash) option. The - specifies that the process environment is to be set as if the user had logged into the system using the login command. Nothing in the current environment is propagated to the new shell. For example, using the su command without the - option, allows you to have all of the accompanying permission of root while keeping your own working environment. Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook1-18 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-12. Checkpoint AU1411.0

    Notes:

    Copyright IBM Corporation 2005

    Checkpoint

    1. What type of adapter are you likely to require for a single-user graphics workstation?a. Asynchronousb. Communicationsc. Graphics

    2. What is the difference between UP and SMP machines?_____________________________________________

    _____________________________________________

    _____________________________________________

    3. True or False? The su command allows you to get root authority even if you signed on using another user ID.Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-19

    Figure 1-13. Exercise 1: root Login Methods AU1411.0

    Notes:

    IntroductionThis exercise can be found in your Student Exercise Guide.

    Copyright IBM Corporation 2005

    Exercise 1: root Login Methods

    Direct logins to root Using the su commandCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student Notebook1-20 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-14. Unit Summary AU1411.0

    Notes:

    Copyright IBM Corporation 2005

    Unit Summary Common Configurations

    Single-user graphics workstation Multiuser ASCII Networked system X Window-enabled PC SMP SP

    System Administrator's Role: Pre-installation planning Install hardware, software, network Manage user accounts, system resources, licenses Backup/recovery Define subsystems Performance monitoring, capacity planningCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Student NotebookV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 2. AIX 5L V5.3 Installation 2-1

    Unit 2. AIX 5L V5.3 Installation

    What This Unit Is AboutThis unit describes the process of installing the AIX 5L V5.3 operating system.

    What You Should Be Able to DoAfter completing this unit, you should be able to: List the different installation and media options available List the steps necessary t