Category Archives: Uncategorized

Solaris script to scan FiberChannel bus for new LUN

Here is a script that I use to re-scan the FiberChannel bus for new or removed volumes on Solaris 10.

WARNING!: This script works for me, but use it at your own risk! Make sure you look through the script and make sure it doesn’t do anything that would be unusual on your system. I take no responsibility if you use this script and it erases all of your production data. :)

#!/bin/sh

# This will scan the Fiber Channel bus on Solaris servers

# using cfgadm and then run devfsadm -C.

# I *think* I’ve got it set up so that it will autodetect

# the controller # that the HBA is recognized as.

# Usually it’s c2 and c4, but it might be different.

 

CONTROLLER=”UNSET”

for CONTROLLER in `/usr/sbin/cfgadm -al | grep fc-fabric | grep connected | grep

configured | awk ‘{print $1}’`; do

        if [ ${CONTROLLER} = “UNSET” ]; then

                echo “”

                echo “No Fiber HBA Controllers found.”

                exit 1

        fi

        echo “”

        echo “Scanning FC Bus on Controller ${CONTROLLER}…”

        cfgadm -o force_update -c configure ${CONTROLLER}

done

 

echo ” “

echo “Reconfiguring devices…”

/usr/sbin/devfsadm -C

 

echo “”

echo “FC Bus scan complete.”

How to Upgrade IBM Power server firmware fixes through AIX or Linux without an HMC

Installing server firmware fixes through the operating system is a disruptive process. You will need to restart the system.

Notes:

  1. If your system is managed by an HMC, you must apply server firmware through the HMC. For details, see Managed system updates in Updates.
  2. If you have a System i® model running IBM® i, you must either apply server firmware through an HMC or through an IBM i logical partition. If you have a POWER6® Power Systems™ server that is managed by an HMC, you must use the HMC.
  3. By default, the server firmware is installed on the temporary side only after the existing contents of the temporary side are permanently installed on the permanent side. (This process is performed automatically when you install a server firmware fix.)
  4. If you are unable to start your AIX or Linux operating system or server, refer to Obtaining fixes through AIX or Linux when you are unable to start the system.

Perform Steps 1 through 6 to get server firmware fixes through AIX or Linux when you do not have an HMC.

Step 1. View existing firmware levels for AIX or Linux

The Advanced System Management Interface (ASMI) is the user interface to access the server firmware. You can also use the AIX or Linux operating system to view the firmware levels.
  1. Select from the following options:
    • To use the ASMI (AIX or Linux): On the ASMI Welcome pane, view the existing level of server firmware in the upper-right corner below the copyright statement, for example, EM310_006.
    • To use the AIX command prompt (you must have AIX diagnostics installed on your server), continue with step 2.
    • To use the Linux command prompt, continue with step 4.
  2. At an AIX command prompt, enter the following command:
    lsmcode
    The existing levels of server firmware are displayed. For example, you might see output similar to the following:

    DISPLAY MICROCODE LEVEL                                                   802811
    IBM,8231-E1C
    
    The current permanent system firmware image is AL740_088
    The current temporary system firmware image is AL740_088
    The system is currently booted from the temporary firmware image.
    
    Use Enter to continue.
    Notes:

    • The permanent level is also known as the backup level.
    • The temporary level is also known as the installed level.
    • The system was booted from the temporary side, so at this time, the temporary level is also the activated level.
  3. Continue with Step 2. View or download the firmware fix.
  4. To view existing levels of server firmware for Linux, you must have the following service tools installed on your server:
    • Platform Enablement Library – librtas-xxxxx.rpm
    • Service Aids – ppc64-utils-xxxxx.rpm
    • Hardware Inventory – lsvpd-xxxxx.rpm

    where xxxxx represents a specific version of the RPM file.

    Note: If you do not have the service tools on your server, refer to Obtaining service and productivity tools for Linux.
  5. After the service tools are installed on the server running Linux, enter the following at a Linux command prompt:
    lsmcode

    The existing level of server firmware is displayed. For example, you might see output similar to the following:

    Version of system firmware is: AL740_088 (t)  AL740_088 (p)  AL740_088 (t)

    The following table provides descriptions for each of the server firmware levels displayed in the output.

    Table 1. Server firmware levels
    Server firmware levels displayed
    AL740_088 (t) AL740_088 (p) AL740_088 (t)
    The installed level.Also known as the temporary level. The backup level.Also known as the permanent level. The activated level.The level on which the server is currently running.
  6. Continue with the next step.

Step 2. View or download the firmware fix

Follow this procedure to view or download the firmware fix. You can download the fix directly to your server, or you can download it to a computer with an Internet connection and create a fix CD that you apply on the server. If necessary, contact service and support to order the fix on CD. You can also download the firmware fix to a computer that has a network connection to your server and use FTP to download the firmware fix from the computer to the server.

Note: If you plan to create a CD, you will need a CD burner and software.
  1. From a computer or server with an Internet connection, go to the Fix Central Web site at http://www.ibm.com/support/fixcentral/.
  2. Choose from the following options:
    1. If you have a System p® server, select System p in the Product Group list.
    2. If you have a POWER6 Power Systems server, select Power in the Product Group list.
  3. Select Firmware and HMC in the Product list.
  4. If prompted, select POWER5 and POWER6 class in the Processor type list.
  5. Select your Machine Type-Model and click Continue.
  6. Follow the on-screen prompts to download the fix file.
  7. Select from the following options:

Step 3. View and unpack the RPM file that contains the server firmware

If you created a CD with the RPM file, you will need to view and unpack the RPM file that contains the server firmware.
  1. Select from the following options:
    • If you created a CD with the RPM file, continue with the next step.
    • If you downloaded the RPM file to your server from the Fix Central Web site at http://www.ibm.com/support/fixcentral/ or by using the FTP method, continue with step 6.
  2. Insert the CD that contains the RPM file into the media drive on your server.
  3. To mount the CD, select from the following options (you need root user authority):
    • If you are working on an AIX system, enter the following at an AIX command prompt:
      mount /dev/cd0 /mnt
    • If you are working on a Linux system, enter one of the following commands at a Linux command prompt:
      mount -t iso9660 /dev/cdrom /mnt 

      or

      mount -t iso9660 /dev/dvdrom /mnt
  4. Select from the following options:
    • If the mount was successful, continue with step 6.
    • If the mount was unsuccessful, continue with the next step.
  5. If you received the message,
    mount: 0506-324 Cannot mount /dev/cd0 on /mnt, perform the following steps to mount the CD:

    1. Enter the command:
      /usr/sbin/mount -v 'cdrfs' -f'' -p'' -r'' /dev/cd0 /mnt

      The quotation marks following the f, p, and r are two single quotation marks with no space between them.

      Note: If you prefer, you can use the System Management Interface Tool (SMIT) to mount the CD.
    2. Continue with the next step.
  6. To view the RPM file name, enter the following command at the AIX or Linux command prompt:
    • If the RPM file is on CD, type:
      ls /mnt
    • If the RPM file is on the server, type:
      ls /tmp/fwupdate
    The name of the RPM file is displayed. For example, you might see output similar to the following:

    01EM3xx_yyy_zzz.rpm
  7. To unpack the RPM file, enter one of the following commands at the AIX or Linux command prompt:
    • If you want to unpack from a CD, enter:
      rpm -Uvh --ignoreos /mnt/filename.rpm
    • If you want to unpack from the server’s hard drive, enter:
      rpm -Uvh --ignoreos /tmp/fwupdate/filename.rpm
      where filename is the name of the RPM file that contains the server firmware. For example, 01EM3xx_yyy_zzz.rpm.

      Note: When you unpack the RPM file, the server firmware fix file is saved in the /tmp/fwupdate directory on the server’s hard drive in the following format: 01EM3xx_yyy_zzz.img.
  8. Continue with the next step.

Step 4. Apply server firmware fixes through AIX or Linux to the temporary side of the service processor

Important:

  • Do not interrupt this process after you begin.
  • Do not attempt to log into the ASMI, or use any of the ASMI’s functions, while a firmware installation is in progress.
  1. Ensure you are starting the system from the temporary side of the service processor; the firmware installation will fail if the system has booted from the permanent side. To learn which side you are starting from, and how to change to the other side if necessary, refer to Working with the temporary and permanent side of the service processor.
  2. To use the update_flash command (AIX or Linux) to install the server firmware, continue with step 3.
    Note: If you have AIX installed, you can choose to use the AIX diagnostics to install the fix. However, if you plan to install the fix from CD, you will need to obtain the Microcode Updates Files & Discovery Tool CD to use the AIX diagnostics.
  3. You will need the server firmware fix file name in the next step. To view the name, enter the following at an AIX or Linux command prompt:
    Note: To perform this step, you must have root user authority.
    ls /tmp/fwupdate
    The name of the server firmware fix file is displayed. For example, you might see output similar to the following:

    01EM3xx_yyy_zzz.img
  4. To install the server firmware fix, select from the following options:
    • If you are updating AIX, enter the following at an AIX command prompt:
      cd /tmp/fwupdate
      /usr/lpp/diagnostics/bin/update_flash -f fwlevel
    • # rpm -Uvh --ignoreos 01AL740_100_042.rpm
      01AL740_100_042             ##################################################
      # cd /tmp/fwupdate
      # ls
      01AL740_100_042.img
      # /usr/lpp/diagnostics/bin/update_flash -f 01AL740_100_042
      Error in opening the file 01AL740_100_042
      #  /usr/lpp/diagnostics/bin/update_flash -f 01AL740_100_042.img
      The image is valid and would update the temporary image to AL740_100.
      The new firmware level for the permanent image would be AL740_088.
      
      The current permanent system firmware image is AL740_088.
      The current temporary system firmware image is AL740_088.
      
      ***** WARNING: Continuing will reboot the system! *****
      
      Do you wish to continue?
      Enter 1=Yes or 2=No
      1
      
      SHUTDOWN PROGRAM
      Tue May 14 10:08:53 IST 2013
      0513-044 The sshd Subsystem was requested to stop.
      
      Wait for 'Rebooting...' before stopping.
      Error reporting has stopped.
      Advanced Accounting has stopped...
      Process accounting has stopped.
      nfs_clean: Stopping NFS/NIS Daemons
      0513-004 The Subsystem or Group, nfsd, is currently inoperative.
      0513-044 The biod Subsystem was requested to stop.
      0513-044 The rpc.lockd Subsystem was requested to stop.
      0513-044 The rpc.statd Subsystem was requested to stop.
      0513-004 The Subsystem or Group, gssd, is currently inoperative.
      0513-004 The Subsystem or Group, nfsrgyd, is currently inoperative.
      0513-004 The Subsystem or Group, rpc.mountd, is currently inoperative.
      0513-004 The Subsystem or Group, ypserv, is currently inoperative.
      0513-004 The Subsystem or Group, ypbind, is currently inoperative.
      0513-004 The Subsystem or Group, yppasswdd, is currently inoperative.
      0513-004 The Subsystem or Group, ypupdated, is currently inoperative.
      0513-004 The Subsystem or Group, nis_cachemgr, is currently inoperative.
      0513-004 The Subsystem or Group, rpc.nisd, is currently inoperative.
      0513-004 The Subsystem or Group, rpc.nispasswdd, is currently inoperative.
      0513-044 The qdaemon Subsystem was requested to stop.
      0513-044 The writesrv Subsystem was requested to stop.
      0513-044 The clcomd Subsystem was requested to stop.
      0513-044 The lldpd Subsystem was requested to stop.
      0513-044 The ecpvdpd Subsystem was requested to stop.
      0513-044 The ctrmc Subsystem was requested to stop.
      0513-044 The IBM.ServiceRM Subsystem was requested to stop.
      0513-044 The IBM.MgmtDomainRM Subsystem was requested to stop.
      0513-044 The IBM.DRM Subsystem was requested to stop.
      0513-044 The cas_agent Subsystem was requested to stop.
      All processes currently running will now be killed...
      Unmounting the file systems...
      umount: 0506-349 Cannot unmount /dev/hd10opt: The requested resource is busy.
      umount: 0506-349 Cannot unmount /dev/hd1: The requested resource is busy.

      where fwlevel is the specific file name of the server firmware fix, such as 01EM3xx_yyy_zzz.img

    • If you are updating Linux, enter the following at a Linux command prompt:
      cd /tmp/fwupdate
      /usr/sbin/update_flash -f fwlevel

      where fwlevel is the specific file name of the server firmware fix, such as 01EM3xx_yyy_zzz.img

    During the server firmware installation process, reference codes CA2799FD and CA2799FF are alternately displayed on the control panel. After the installation is complete, the system is automatically powered off and powered on.

    Note: If you receive a message stating:
    This partition does not have the authority to perform the requested function, see Message regarding a server that was previously managed by an HMC.
  5. Continue with the next step.

Step 5. Verify that the fix installed correctly

  1. Select from the following options:
    • To use the AIX or Linux command prompt (the operating system must be running and the diagnostics must be available), continue with the next step.
    • To use the ASMI, view the level of server firmware displayed in the upper-right corner below the copyright statement on the ASMI Welcome pane; for example, EM310_006. If the level of server firmware displayed is not the level that you installed, refer to step 4.
  2. Enter the following at a command prompt:
    lsmcode

    The existing levels of server firmware are displayed. For example, you might see output similar to the following:

    DISPLAY MICROCODE LEVEL                                                   802811
    IBM,8231-E1C
    
    The current permanent system firmware image is AL740_088
    The current temporary system firmware image is AL740_100
    The system is currently booted from the temporary firmware image.
    
    Use Enter to continue.
    
    
    Notes:

    • The permanent level is also known as the backup level.
    • The temporary level is also known as the installed level.
    • The system was booted from the temporary side, so at this time, the temporary level is also the activated level.
  3. Verify that the level of server firmware displayed is the level that you installed.
  4. If the level of server firmware displayed is not the level that you installed, perform the following steps:
    1. Retry the fix procedure. If you created a CD or DVD for this procedure, use a new media.
    2. If the problem persists, contact your next level of support.

Linux httpd service not start

[root@sunx4150 run]# ps -ef | grep http
root      7222  6826  0 10:32 pts/1    00:00:00 grep http
[root@sunx4150 run]# pwd
/etc/httpd/run
[root@sunx4150 run]# ls
acpid.socket  dirmngr           hpssd.pid       mdadm           nscd         radvd          sshd.pid                vmnet-dhcpd-vmnet8.pid    xenstored
agent.pid     dovecot           hpssd.port      mdmpd           ntpd.pid     rpc.statd.pid  sudo                    vmnet-natd-8.mac          xfs.pid
atd.pid       dsviewserver.pid  httpd.pid       messagebus.pid  openldap     saslauthd      syslogd.pid             vmnet-natd-8.pid          xinetd.pid
avahi-daemon  gather            iiim            mysqld          ppp          screen         tog-pegasus             vmnet-netifup-vmnet1.pid
console       gdm.pid           irqbalance.pid  named           ptal-mlcd    sendmail.pid   utmp                    vmnet-netifup-vmnet8.pid
crond.pid     gpm.pid           iscsid.pid      netreport       ptal-printd  setrans        vmnat.4650              vmware
cups          haldaemon.pid     klogd.pid       NetworkManager  pvm3         smbd.pid       vmnet-bridge-0.pid      winbindd
cupsd.pid     hpiod.pid         libvirt         news            quagga       sm-client.pid  vmnet-detect.pid        wpa_supplicant
dbus          hpiod.port        libvirtd.pid    nmbd.pid        radiusd      spamassassin   vmnet-dhcpd-vmnet1.pid  xend
[root@sunx4150 run]# ls -ltr
total 420
drwxr-xr-x 2 pvm     pvm     4096 Jul 13  2006 pvm3
drwxrwx–x 2 quagga  quagga  4096 Jul 13  2006 quagga
drwxr-xr-x 2 root    root    4096 Jul 14  2006 wpa_supplicant
drwxr-xr-x 2 radvd   radvd   4096 Aug 19  2006 radvd
drwxr-x— 2 news    news    4096 Aug 29  2006 news
drwxr-xr-x 2 root    root    4096 Sep  2  2006 winbindd
drwxr-xr-x 2 root    root    4096 Sep 30  2006 saslauthd
drwx—— 4 root    root    4096 Oct  2  2006 sudo
drwx—— 2 root    root    4096 Nov  9  2006 mdmpd
drwx—— 2 root    root    4096 Nov  9  2006 mdadm
drwx—— 2 radiusd radiusd 4096 Nov 30  2006 radiusd
drwxr-xr-x 2 root    root    4096 Dec  1  2006 ppp
drwxrwxr-x 2 root    screen  4096 Dec  4  2006 screen
drwxr-xr-x 2 ldap    ldap    4096 Jan  3  2007 openldap
drwxr-xr-x 2 root    root    4096 Jan  8  2007 NetworkManager
drwxr-x— 2 root    pegasus 4096 Jan 12  2007 gather
drwxr-x–T 2 root    pegasus 4096 Jan 12  2007 tog-pegasus
drwxr-xr-x 2 root    root    4096 Jan 12  2007 setrans
drwxr-xr-x 2 root    root    4096 Jan 16  2007 console
drwxr-xr-x 2 root    root    4096 Jan 16  2007 nscd
drwxrwxr-x 2 root    root    4096 Jan 16  2007 netreport
drwxrwx— 2 named   named   4096 Jan 17  2007 named
drwxr-xr-x 2 root    root    4096 Jun 11  2007 spamassassin
drwxr-xr-x 2 root    root    4096 Oct 11  2007 dirmngr
drwxr-xr-x 2 root    root    4096 Apr 30  2008 xenstored
drwxr-xr-x 2 root    root    4096 Apr 30  2008 xend
drwxr-xr-x 3     100     101 4096 Jul 15  2008 iiim
drwxr-xr-x 3 root    dovecot 4096 Apr  6  2009 dovecot
drwxr-xr-x 3 root    lp      4096 Apr  6  2009 cups
drwxr-xr-x 2 root    root    4096 Apr  6  2009 ptal-printd
drwxr-xr-x 2 root    root    4096 Apr  6  2009 ptal-mlcd
drwxr-xr-x 3 root    root    4096 Nov 24  2010 vmware
-rw——- 1 root    root       5 Mar 12 10:48 iscsid.pid
-rw——- 1 root    root       5 Mar 12 10:49 syslogd.pid
-rw-r–r– 1 rpcuser rpcuser    5 Mar 12 10:49 rpc.statd.pid
-rw——- 1 root    root       5 Mar 12 10:49 klogd.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 irqbalance.pid
-rw-rw-rw- 1 root    root       5 Mar 12 10:49 vmnet-bridge-0.pid
-rw-rw-rw- 1 root    root       5 Mar 12 10:49 vmnet-netifup-vmnet8.pid
-rw-rw-rw- 1 root    root       5 Mar 12 10:49 vmnet-netifup-vmnet1.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 vmnet-natd-8.pid
-rw-rw-rw- 1 root    root      18 Mar 12 10:49 vmnet-natd-8.mac
-rw-r—– 1 root    root       5 Mar 12 10:49 vmnet-dhcpd-vmnet8.pid
-rw-r—– 1 root    root       5 Mar 12 10:49 vmnet-dhcpd-vmnet1.pid
-rw-rw-rw- 1 root    root       5 Mar 12 10:49 vmnet-detect.pid
srwxrwxrwx 1 root    root       0 Mar 12 10:49 vmnat.4650
-rw-r–r– 1 root    root       5 Mar 12 10:49 messagebus.pid
drwxr-xr-x 2 root    root    4096 Mar 12 10:49 dbus
-rw-rw-r– 1 root    root       4 Mar 12 10:49 agent.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 hpiod.port
-rw-r–r– 1 root    root       5 Mar 12 10:49 hpiod.pid
srw-rw-rw- 1 root    root       0 Mar 12 10:49 acpid.socket
-rw-r–r– 1 root    root       5 Mar 12 10:49 hpssd.port
-rw-r–r– 1 root    root       5 Mar 12 10:49 hpssd.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 xinetd.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 sshd.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 cupsd.pid
-rw-r–r– 1 root    root       4 Mar 12 10:49 ntpd.pid
drwxr-xr-x 2 mysql   mysql   4096 Mar 12 10:49 mysqld
-rw-r–r– 1 smmsp   smmsp     49 Mar 12 10:49 sm-client.pid
-rw——- 1 root    smmsp     33 Mar 12 10:49 sendmail.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 gpm.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 dsviewserver.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 crond.pid
-rw-r–r– 1 root    root       6 Mar 12 10:49 xfs.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 smbd.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 nmbd.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 libvirtd.pid
drwxr-xr-x 2 root    root    4096 Mar 12 10:49 libvirt
-rw-r–r– 1 root    root       5 Mar 12 10:49 atd.pid
-rw-r–r– 1 root    root       5 Mar 12 10:49 haldaemon.pid
drwxr-xr-x 2 avahi   avahi   4096 Mar 12 10:49 avahi-daemon
-rw-r–r– 1 root    root       5 Mar 12 10:50 gdm.pid
-rw-r–r– 1 root    root       5 Apr  5 04:02 httpd.pid
-rw-rw-r– 1 root    utmp    6528 May  9 10:23 utmp
[root@sunx4150 run]# rm -rf httpd.pid
[root@sunx4150 run]# service httpd start
Starting httpd:                                            [FAILED]
[root@sunx4150 run]# service httpd status
httpd dead but subsys locked
[root@sunx4150 run]# service httpd restart
Stopping httpd:                                            [FAILED]
Starting httpd:                                            [FAILED]
[root@sunx4150 run]# rm -f  /var/lock/subsys/httpd
You have new mail in /var/spool/mail/root
[root@sunx4150 run]#  service httpd restart
Stopping httpd:                                            [FAILED]
Starting httpd:                                            [FAILED]
[root@sunx4150 run]#  service httpd status
httpd is stopped
[root@sunx4150 run]#  service httpd start
Starting httpd:                                            [FAILED]
[root@sunx4150 run]#  ipcs -s apahe

—— Semaphore Arrays ——–
key        semid      owner      perms      nsems
0x000000a7 0          root      666        1
0x0000033d 1474561    root      644        1
0x0f9b5efc 163842     oracle    640        44
0x00000000 1409027    apache    600        1
0x00000000 229380     apache    600        1
0x00000000 1441797    apache    600        1
0x00000000 1507334    apache    600        1
0x00000000 1540103    apache    600        1
0x00000000 1572872    apache    600        1
0x00000000 1605641    apache    600        1
0x00000000 1638410    apache    600        1
0x00000000 1671179    apache    600        1

[root@sunx4150 run]# ipcs -s | grep apache | perl -e ‘while (<STDIN>) { @a=split(/s+/);print `ipcrm sem $a[1]`}’
resource(s) deleted
resource(s) deleted
resource(s) deleted
resource(s) deleted
resource(s) deleted
resource(s) deleted
resource(s) deleted
resource(s) deleted
resource(s) deleted
[root@sunx4150 run]# cd /var/lock/subsys
[root@sunx4150 subsys]#  rm httpd
rm: cannot lstat `httpd’: No such file or directory
[root@sunx4150 subsys]# service httpd restart
Stopping httpd:                                            [FAILED]
Starting httpd:                                            [FAILED]
[root@sunx4150 subsys]# vi /etc/httpd/conf/httpd.conf
You have new mail in /var/spool/mail/root
[root@sunx4150 subsys]# killall -9 httpd
httpd: no process killed
[root@sunx4150 subsys]# killall -9 php-cgi
php-cgi: no process killed
[root@sunx4150 subsys]# killall -9 perl-cgi
perl-cgi: no process killed
[root@sunx4150 subsys]# netstat -tulpn | grep :80
tcp        0      0 0.0.0.0:8080                0.0.0.0:*                   LISTEN      5308/tnslsnr
[root@sunx4150 subsys]# netstat -tulpn | grep :443
[root@sunx4150 subsys]# tail -f /var/log/httpd/error.log
tail: cannot open `/var/log/httpd/error.log’ for reading: No such file or directory
tail: no files remaining
[root@sunx4150 subsys]# vi /etc/httpd/conf/httpd.conf
[root@sunx4150 subsys]# tail -f /var/logs/error_log
tail: cannot open `/var/logs/error_log’ for reading: No such file or directory
tail: no files remaining
[root@sunx4150 subsys]# tail -f /etc/httpd/logs/error_log
[Thu May 09 10:27:40 2013] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Thu May 09 10:30:14 2013] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Thu May 09 10:32:47 2013] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Thu May 09 10:33:08 2013] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Thu May 09 10:43:41 2013] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Thu May 09 10:43:57 2013] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Thu May 09 10:45:28 2013] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Thu May 09 10:49:51 2013] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)

You have new mail in /var/spool/mail/root
[root@sunx4150 subsys]# cd /etc/httpd/logs/
[root@sunx4150 logs]# ls -ltr
total 2348
-rw-r–r– 1 root root 654815 Nov  2  2011 nss_error_log.2
-rw-r–r– 1 root root 682530 Nov  2  2011 nss_access_log.1
-rw-r–r– 1 root root      0 Nov  3  2011 nss_access_log
-rw-r–r– 1 root root     77 Mar  1 11:15 ssl_request_log.4
-rw-r–r– 1 root root     71 Mar  1 11:15 ssl_access_log.4
-rw-r–r– 1 root root    312 Mar  7 15:56 ssl_request_log.3
-rw-r–r– 1 root root    288 Mar  7 15:56 ssl_access_log.3
-rw-r–r– 1 root root    385 Mar 15 16:57 ssl_request_log.2
-rw-r–r– 1 root root   1306 Mar 15 16:57 ssl_error_log.4
-rw-r–r– 1 root root    355 Mar 15 16:57 ssl_access_log.2
-rw-r–r– 1 root root  85057 Mar 17 04:00 access_log.4
-rw-r–r– 1 root root    237 Mar 17 04:02 ssl_error_log.3
-rw-r–r– 1 root root  87266 Mar 24 04:00 access_log.3
-rw-r–r– 1 root root 197481 Mar 24 04:02 error_log.4
-rw-r–r– 1 root root    237 Mar 24 04:02 ssl_error_log.2
-rw-r–r– 1 root root  91220 Mar 31 04:00 access_log.2
-rw-r–r– 1 root root 197481 Mar 31 04:02 error_log.3
-rw-r–r– 1 root root     77 Apr  4 10:47 ssl_request_log.1
-rw-r–r– 1 root root     71 Apr  4 10:47 ssl_access_log.1
-rw-r–r– 1 root root      0 Apr  5 04:02 ssl_request_log
-rw-r–r– 1 root root    593 Apr  5 04:02 ssl_error_log.1
-rw-r–r– 1 root root      0 Apr  5 04:02 ssl_access_log
-rw-r–r– 1 root root  86524 Apr  7 04:00 access_log.1
-rw-r–r– 1 root root      0 Apr  7 04:02 ssl_error_log
-rw-r–r– 1 root root    340 Apr  7 04:02 nss_error_log.1
-rw-r–r– 1 root root 198038 Apr  7 04:02 error_log.2
-rw-r–r– 1 root root    141 Apr  7 04:02 error_log.1
-rw-r–r– 1 root root      0 Apr  7 04:02 access_log
-rw-r–r– 1 root root    712 May  9 10:49 error_log
-rw-r–r– 1 root root   3740 May  9 10:56 nss_error_log
[root@sunx4150 logs]# cat nss_error_log
[Thu May 09 10:27:40 2013] [error] Certificate not verified: ‘Server-Cert’
[Thu May 09 10:27:40 2013] [error] SSL Library Error: -8181 Certificate has expired
[Thu May 09 10:27:40 2013] [error] Unable to verify certificate ‘Server-Cert’. Add “NSSEnforceValidCerts off” to nss.conf so the server can start until the problem can be resolved.
[Thu May 09 10:30:14 2013] [error] Certificate not verified: ‘Server-Cert’
[Thu May 09 10:30:14 2013] [error] SSL Library Error: -8181 Certificate has expired
[Thu May 09 10:30:14 2013] [error] Unable to verify certificate ‘Server-Cert’. Add “NSSEnforceValidCerts off” to nss.conf so the server can start until the problem can be resolved.
[Thu May 09 10:32:47 2013] [error] Certificate not verified: ‘Server-Cert’
[Thu May 09 10:32:47 2013] [error] SSL Library Error: -8181 Certificate has expired
[Thu May 09 10:32:47 2013] [error] Unable to verify certificate ‘Server-Cert’. Add “NSSEnforceValidCerts off” to nss.conf so the server can start until the problem can be resolved.
[Thu May 09 10:33:08 2013] [error] Certificate not verified: ‘Server-Cert’
[Thu May 09 10:33:08 2013] [error] SSL Library Error: -8181 Certificate has expired
[Thu May 09 10:33:08 2013] [error] Unable to verify certificate ‘Server-Cert’. Add “NSSEnforceValidCerts off” to nss.conf so the server can start until the problem can be resolved.
[Thu May 09 10:43:41 2013] [error] Certificate not verified: ‘Server-Cert’
[Thu May 09 10:43:41 2013] [error] SSL Library Error: -8181 Certificate has expired
[Thu May 09 10:43:41 2013] [error] Unable to verify certificate ‘Server-Cert’. Add “NSSEnforceValidCerts off” to nss.conf so the server can start until the problem can be resolved.
[Thu May 09 10:43:57 2013] [error] Certificate not verified: ‘Server-Cert’
[Thu May 09 10:43:57 2013] [error] SSL Library Error: -8181 Certificate has expired
[Thu May 09 10:43:57 2013] [error] Unable to verify certificate ‘Server-Cert’. Add “NSSEnforceValidCerts off” to nss.conf so the server can start until the problem can be resolved.
[Thu May 09 10:45:28 2013] [error] Certificate not verified: ‘Server-Cert’
[Thu May 09 10:45:28 2013] [error] SSL Library Error: -8181 Certificate has expired
[Thu May 09 10:45:28 2013] [error] Unable to verify certificate ‘Server-Cert’. Add “NSSEnforceValidCerts off” to nss.conf so the server can start until the problem can be resolved.
[Thu May 09 10:49:51 2013] [error] Certificate not verified: ‘Server-Cert’
[Thu May 09 10:49:51 2013] [error] SSL Library Error: -8181 Certificate has expired
[Thu May 09 10:49:51 2013] [error] Unable to verify certificate ‘Server-Cert’. Add “NSSEnforceValidCerts off” to nss.conf so the server can start until the problem can be resolved.
[Thu May 09 10:53:09 2013] [error] Certificate not verified: ‘Server-Cert’
[Thu May 09 10:53:09 2013] [error] SSL Library Error: -8181 Certificate has expired
[Thu May 09 10:53:09 2013] [error] Unable to verify certificate ‘Server-Cert’. Add “NSSEnforceValidCerts off” to nss.conf so the server can start until the problem can be resolved.
[Thu May 09 10:53:26 2013] [error] Certificate not verified: ‘Server-Cert’
[Thu May 09 10:53:26 2013] [error] SSL Library Error: -8181 Certificate has expired
[Thu May 09 10:53:26 2013] [error] Unable to verify certificate ‘Server-Cert’. Add “NSSEnforceValidCerts off” to nss.conf so the server can start until the problem can be resolved.
[Thu May 09 10:56:35 2013] [error] Certificate not verified: ‘Server-Cert’
[Thu May 09 10:56:35 2013] [error] SSL Library Error: -8181 Certificate has expired
[Thu May 09 10:56:35 2013] [error] Unable to verify certificate ‘Server-Cert’. Add “NSSEnforceValidCerts off” to nss.conf so the server can start until the problem can be resolved.
[root@sunx4150 logs]#

Add “NSSEnforceValidCerts off” to nss.conf

[root@sunx4150 httpd]# cd conf.d/
[root@sunx4150 conf.d]# ls
auth_kerb.conf   manual.conf  php.conf        squid.conf
auth_mysql.conf  mrtg.conf    proxy_ajp.conf  ssl.conf
auth_pgsql.conf  nss.conf     python.conf     subversion.conf
authz_ldap.conf  perl.conf    README          welcome.conf
[root@sunx4150 conf.d]# vi nss.conf
[root@sunx4150 conf.d]# /etc/init.d/httpd restart
Stopping httpd:                                            [FAILED]
Starting httpd: Syntax error on line 193 of /etc/httpd/conf.d/nss.conf:
Invalid command ‘SEnforceValidCerts’, perhaps misspelled or defined by a module not included in the server configuration
[FAILED]
[root@sunx4150 conf.d]# vi nss.conf
You have new mail in /var/spool/mail/root
[root@sunx4150 conf.d]# /etc/init.d/httpd restart
Stopping httpd:                                            [FAILED]
Starting httpd:                                            [  OK  ]
[root@sunx4150 conf.d]#

Add a RAM File System in Aix

Create a RAM disk of 10 MB

# mkramdisk 10M

/dev/rramdisk0

Create a JFS File System on this RAM disk

# mkfs -V jfs /dev/rramdisk0

mkfs:destroy /dev/rramdisk0 (yes) ? y

Create Mountpoint

# mkdir /ramdisk

Mount  RAM File System

# mount -V jfs -o nointegrity /dev/ramdisk0 /ramdisk

The purpose of the mkramdisk command is to create file systems directly in memory. This is useful for applications that make many temporary files. Use ramdisk only for data that can be lost. After each reboot the ramdisk file system is destroyed and must be rebuilt.

Journaled file systems structure

 

 

Superblock : File System size and indentification, Free list, fragment size, nbpi.

Inodes: File size, ownership, permissions, pointers to data blocks.

Blocks: Data blocks contain data and Indirect block contain pointers to data blocks.

Journaled file systems are built within logical volumes. Because journaled file systems exist within logical volumes, the size of the file system always multiples of the logical partition size for that logical volume (for example, 4 MB). An individual file within a file system will by default have units allocated to it in blocks of  4096 bytes. (This may change if you have implemented fragmentation or large files – to be discussed later.)
Some unix commands often report file sizes in units of 512 bytes to remain compatible with other UNIX file systems. This is independent of the actual unit of allocation. The first addressable logical block on the file system is the superblock. The superblock contains information such as the file system name, size, number of inodes, date/time of creation.
The superblock is critical to the file system and if corrupted, prevents the file system from mounting. For this reason a backup copy of the superblock is always written in block 31. Uempty Immediately following the superblock are inodes which contain identifying information for files such as the file type, size, permissions, user/group/owner, create/modification and last
access dates. They also contain pointers to the data block for fragment addresses which hold the data. For larger files the system creates sets of indirect blocks filled with data block addresses to point to the data block or fragments which hold the data.

Find and remove Files in Unix older than the specified number of days

For finding the files older than 31 days

find . -name “filename.ext” -mtime +no_of_days -exec ls -ltr {} ; e.g   find . -name “*req” -mtime +31 -exec ls -ltr {} ;

Verify the timestamp of all the files.They must be older than 5 weeks For Deleting files older that 31 days :

find . -name “*req” -mtime +31 -exec rm {} ;

Verify after execution of the above.

Execute:  find . -name “*req” -mtime +31 -exec ls -ltr {} ;

Linux: iSCSI Initiator installation & configration

Installation Instructions:

Red Hat Supplied iSCSI Initiator:

Find the RPM on the Red Hat Media, then install it using the rpm –ivh command as follows:

# rpm –ivh iscsi-initiator-utils-6.2.0.742-0.5.el5

NOTE: This is the version for Enterprise Linux AS 5. Your version may be different.

An alternative to installing this package manually in Red Hat Enterprise Linux (ES or AS) 5 or greater is to use the “Add/Remove Applications” menu item in the “System Settings” menu. In the details for the “Network Servers” package list, the iscsi-initiator-utils is one of the packages listed. This same choice is available in the same location during the initial install of Red Hat, so this can also be done at that time.

Once installed, there will be a file in the /etc directory named iscsi.conf. If this file does not exist this may indicate a problem with the installation. This file can be created with the following minimal entries:

DiscoveryAddress=

 

This needs to be set to the Group IP Address of your UIT Array.

SendAsyncText=yes

For the initiator to receive Vendor Specific async events from the target.

Continuous=yes

To globally specify that all discovery sessions be kept open.

Within the iscsi.conf file itself there are many more options available that can be set. You can look through the iscsi.conf file for information on what these variables are and what they are used for.

Once these values are either placed in a newly created /etc/iscsi.conf file, or the respective lines are uncommented and edited where necessary, the iscsi service can be started:

# service iscsi start

To verify that the iscsi service will be started at boot time, the chkconfig command can be used as follows:

# chkconfig –list iscsi

iscsi 0:off 1:off 2:off 3:off 4:off 5:off 6:off

By default, the newly added iscsi initiator is not enabled at boot which is the reason for each of the run levels listed to have the service set to off. To enable this at boot, again use the chkconfig command as follows:

# chkconfig –add iscsi

# chkconfig iscsi on

The above two commands first checks to be sure there are the necessary scripts to start and stop the service, then it sets this service to be on for the appropriate runlevels.

Then check to be sure the changes took effect:

# chkconfig –list iscsi

iscsi 0:off 1:off 2:on 3:on 4:on 5:on 6:off

To verify that you can see your iscsi devices, you can run the following command:

# iscsi-ls

************************************************************************

SFNet iSCSI Driver Version … 6.2 (27-July-2009 )

************************************************************************

TARGET NAME : iqn.2001-05.com.UIT:6-8a0900-148270001-987006efd6c43836-pat-rhel5-vol2

TARGET ALIAS : pat-rhel5-vol2

HOST NO : 1

BUS NO : 0

TARGET ID : 5

TARGET ADDRESS : 172.19.50.13:3260

SESSION STATUS : ESTABLISHED AT Thu Dec 1 15:51:50 2009

NO. OF PORTALS : 1

PORTAL ADDRESS 1 : 172.19.50.10:3260,0

SESSION ID : ISID 00023d000001 TSIH 06

************************************************************************

To see greater details of the devices, you can run the above command with the –l option:

# iscsi-ls –s

************************************************************************

SFNet iSCSI Driver Version … 6.2 (27-Jun-2009 )

************************************************************************

TARGET NAME : iqn.2001-05.com.UIT:6-8a0900-148270001-987006efd6c43836-pat-rhel5-vol2

TARGET ALIAS : pat-rhel5-vol2

HOST NO : 1

BUS NO : 0

TARGET ID : 5

TARGET ADDRESS : 172.19.50.13:3260

SESSION STATUS : ESTABLISHED AT Thu Dec 1 15:51:49 2009

NO. OF PORTALS : 1

PORTAL ADDRESS 1 : 172.19.50.10:3260,0

SESSION ID : ISID 00023d000001 TSIH 06

DEVICE DETAILS :

————–

LUN ID : 0

Vendor: EQLOGIC Model: 100E-00 Rev: 2.1

Type: Direct-Access ANSI SCSI revision: 05

page83 type3: 0690a018007082143638c4d6ef067098

page80: 3036393041303138303037303832313433363338433444364546303637303938

Device: /dev/sdc

************************************************************************

As can be seen in the example iscsi-ls –l output above, the device in question is mapped to the /dev/sdc device.

Linux-iscsi Sourceforge Initiator:

If you are not running the required update of Red Hat Linux to have their precompiled iSCSI Initiator, you can try to compile the iSCSI Initiator supplied by the Sourceforge linux-iscsi project.

Beyond the required kernel revision as noted above, all development packages need to be installed for the compiling of the initiator as well as the kernel sources. The easiest way to install these items is to us the “Add/Remove Applications” in the “System Settings Menu” from within the Desktop GUI. Depending on the version of Red Hat you are running will determine what you select to be installed:

Red Hat AS 3:

Development Tools (Default packages have all required packages)

Kernel Development (Again, default is fine)

Red Hat AS 4:

Development Tools (Default packages have all required packages)

NOTE: If there is no Kernel Development choice, the Kernel Source files need to be found and installed prior to compilation.

Once these OS packages are installed, it should be as easy as getting the source package from the Sourceforge linux-iscsi project, then making the initiator. Refer to the README file that comes with the source for detailed instructions on how to make the initiator. If there are problems compiling the initiator, check the linux-iscsi Sourceforge project for assistance. You are able to search and post to their mailing lists to get information and assistance with this product.

Persistent Device naming:

Devices using the Red Hat software initiators do not have a persistent naming scheme, but a few ways to setup Persistent Naming for the different versions of Red Hat are as follows:

Red Hat Enterprise Linux (ES or AS) 3:

Devlabel (see the devlabel man page):

This will only work on Red Hat kernel’s 2.4.x.

Use devlabel to setup symlinks from known names to the current device name.

A basic add command to setup a devlabel link is as follows:

# devlabel add –d -s

An example:

sdc –s /dev/iscsi/vollink

# ls –l /dev/iscsi/vollink

lrwxrwxrwx 1 root root 8 Dec 1 16:31 newvol -> /dev/sdc

Red Hat Enterprise Linux (ES or AS) 4:

Use the udev facility (man udev, man scsi_id):

This is only available on Red Hat EL 4/Kernel 2.6.*

This creates device links to the device files when the device nodes are created. Udev uses a rules file (see man udev) to determine what the link names or device names it should create for different devices.

This is the least elegant of the solutions to configure and there is no straightforward example to provide on how this needs to be setup.

Red Hat may be able to provide additional information on persistent device naming for iSCSI devices using their iSCSI initiator with udev.

Both Red Hat Enterprise Linux 3 and 4:

Use filesystem LABELs (see the e2label man page):

This will work on all ext2/3 filesystem partitions.

Place an ext2/3 filesystem label on your filesystem partition. Once the Label has been added, use the LABEL identifier to identify the filesystem you want to mount in the fstab (man fstab and/or man mount). Following is an example of using the e2label command and what a resulting line in the fstab file would look like:

# e2label /dev/sdc1 EMC

# mkdir /EMC

# echo “LABEL=EMC /EMC ext3 _netdev,defaults 0 0” >> /etc/fstab

NOTE: _netdev delays the mounting of this filesystem until after the Network has been started and ensures that the filesystem is unmounted before stopping the Network.

# mount –a

# df –k | grep EMC

/dev/sdc1 5166332 43072 4860816 1% /EMC

Red Hat Linux iSCSI Configuration

Supported iSCSI Initiators:

Enterprise Linux (ES or AS) 3 Update 6:

Disc 2 of 4:

iscsi-initiator-utils-6.2-3.i386.rpm

linux-iscsi 3.4.x: Minimum kernel release: 2.4.21

linux-iscsi 3.6.x: Minimum kernel release: 2.4.21

NOTE: Versions of the linux-iscsi Initiator above 3.x are not compatible with the 2.4.x and below kernel release.

Enterprise Linux (ES or AS) 4 Update 2:

Disc 4 of 4:

iscsi-initiator-utils-6.2.0.742-0.5.el5

linux-iscsi:

4.0.2 – Mnimum kernel release: 2.6.10

4.0.1 – minimum kernel Release: 2.6.0

NOTE: Versions of the linux-iscsi Initiator below 4.x are not compatible with the 2.6.x and higher kernel release.

Solaris: Steps to install a zone

Prerequisites to configuration

  1. create a directory for the root of your non-global zone, mkdir /export/zones/dzone1.
    chown root:root /export/zones/dzone1; chmod 700 /export/zones/dzone1
  2. create a 1G partition for the non-global zone root file system
  3. add filesystems to any volumes you have created from steps above
  4. mount your additional space for the root of your new zone (add to vfstab in global zone 0)

Zoneconfig

  1. zonecfg –z dzone1
  2. create
  3. set zonepath=/dzone1
  4. set autoboot=true
  5. add inherit-pkg-dir
  6. set dir=/opt
  7. end
  8. add net
  9. set address=[IP-ADDRESS]
  10. set physical=hme0
  11. end
  12. (could add a device here, but don’t believe it necessary for right now, we’ll see what we get by default)
  13. add rctl
  14. set name=zone.cpu-shares
  15. add value (priv=privileged,limit=20,action=none)
  16. end
  17. add attr
  18. set name=comment
  19. set type=string
  20. set value=”First test zone”
  21. end
  22. verify
  23. commit
  24. exit

    Zoneadm

    1. zoneadm –z dzone1 verify
    2. zoneadm –z dzone1 install
      1. if you get an error message during install check the state
      2. zoneadm –z dzone1 list –v
      3. if state is “configured” make corrections specified in the messateg and install the zone again
      4. if state is “incomplete” remove the zone
      5. zoneadm –z dzone1 uninstall
      6. make corrections and install the zone again
    3. style=”MARGIN-TOP: 0in” type=a>
    4. should report the zone is “installed”
  1. y
  2. zoneadm list –v

    1. should report the zone is “ready”
  3. –z dzone1 boot
  4. zoneadm list –v

    1. should report the zone is “running”

2 style=”MARGIN: 12pt 0in 3pt”>font>

  1. zlogin –C dzone1
    1. hit return
    2. select 3 DEC VT100
    3. enter hostname for the zone
    4. hit esc-2 to continue
    5. hit esc-2 to continue
    6. be sure NO is checked for kerberos security
    7. hit esc-2 to continue
    8. hit esc-2 to continue
    9. select DNS for name service
    10. esc-2 to continue
    11. enter abcd.com for domain
    12. esc-2 to continue
    13. enter [IP-ADDRESS] for the first IP
    14. enter [IP-ADDRESS] for the second IP
    15. esc-2 to continue
    16. enter abcd.com for search domain
    17. esc-2 to cont
    18. confirm information
    19. esc-2 to cont
    20. choose NO for new name service information
    21. esc-2 to cont
    22. select americas for time zone
    23. esc-2 to cont
    24. select united states
    25. esc-2
    26. select central time
    27. esc-2
    28. confirm information
    29. esc-2
    30. enter root password
    31. esc-2 to continue
    32. zone should reboot

  2. style=”MARGIN: 0in 0in 0pt; mso-list: l11 level1 lfo3; tab-stops: list .5in”>to disconnect from the console use “~.”

MARGIN: 12pt 0in 3pt”>Additional zonecfg

  1. following zone initialization to add additional filesystem resources and resource controls follow the following instructions
  2. create the directories in the zone you are going to modify
  3. zonecfg –z dzone2
  4. add fs
  5. set dir=/export/home
  6. set special=/dev/md/dsk/d51
  7. set raw=/dev/md/rdsk/d51
  8. set type=ufs
  9. set options=logging
  10. end
  11. verify
  12. commit
  13. exit
  14. bounce the zone

12pt 0in 3pt”>Login

  1. zlogin –C zone
  2. zlogin –l c1196 zone

Arial>Commands

  1. ps with –Z
  2. ipcs, pgrep, ptree, prstat with –z zonename option

Arial>Halt/Shutdown

  1. zoneadm –z myzone halt
     

face=Arial>Boot

  1. zoneadm –z myzone boot

face=Arial>Reboot

  1. zoneadm –z myzone reboot

face=Arial>Grow FileSystem

  1. from the global machine
  2. growfs –M /zoneroot/root/filesystem /dev/md/rdsk/device

Arial>updating resources on the fly for a zone

  1. must run the following command from the global zone
    1. prctl –n zone.cpu-shares –v <value> -r –i zone <zone number>

h2 style=”MARGIN: 12pt 0in 3pt”>=Arial>Notes

  1. You can install apps either at a global or non-global level.  Caveat, user’s will be unable to install packages to /usr/local at a non-global level unless we create /usr/local as a filesystem to mount. 
    But then, we must effectively cover anything in the global /usr/local.  Just be aware.

Veritas: DISK GROUP OPERATIONS

>

-irow: 3; mso-yfti-lastrow: yes”>

Action

Command Line

Create a disk group

vxdg init diskgroup diskname=device

Add a disk to disk group

vxdg -g diskgroup adddisk
diskname=device

Remove a disk from disk group

vxdg –g diskgroup rmdisk diskname

Deport, import or destroy a disk group

vxdg {deport|import|destroy} diskgroup

List disk groups

vxdg list [diskgroup]

Show free/spare space pool

vxdg –g diskgroup {free|spare}

Upgrade disk group version

vxdg [-T version] upgrade diskgroup

Rewrite disk headers, configuration copies, and kernel log copies in a disk group.

vxdg flush diskgroup targetdg object

or

vxdctl enable (for all disk groups)

Move an object between disk groups

vxdg move sourcedg targetdg object

Split objects between disk groups

vxdg split sourcedg targetdg object

Join disk groups

vxdg join sourcedg targetdg

List objects affected by a disk group move operation

class=TbTableBody
style=”MARGIN: 2pt -0.4pt 2pt 6.9pt; mso-element: frame; mso-element-frame-hspace: 9.0pt; mso-element-wrap: around; mso-element-anchor-vertical: paragraph; mso-element-anchor-horizontal: page; mso-element-left: 111.65pt; mso-element-top: 4.8pt; mso-height-rule: exactly”>vxdg listmove sourcedg targetdg object

Display bootdg

Display defaultdg

Set defaultdg

bTableBody
style=”MARGIN: 6pt 0in 1pt 9pt; mso-element: frame; mso-element-frame-hspace: 9.0pt; mso-element-wrap: around; mso-element-anchor-vertical: paragraph; mso-element-anchor-horizontal: page; mso-element-left: 111.65pt; mso-element-top: 4.8pt; mso-height-rule: exactly”>

vxdg bootdg

vxdg defaultdg

vxdctl defaultdg diskgroup

Manually back up the disk group configuration

Perform precommit analysis of a restore

Restore the disk group configuration

vxconfigbackup diskgroup

vxconfigrestore -p diskgroup


vxconfigrestore -c [-l directory] diskgroup