Student Guide - AU14-IB - AIX 5L System Administration I - Implementation

1414
AIX 5L System Administration I: Implementation (Course Code AU14) Instructor Guide ERC 11.0 IBM Certified Course Material V3.1.0.1 cover

description

AIX

Transcript of Student Guide - AU14-IB - AIX 5L System Administration I - Implementation

  • AIX 5LSystem Administration I: Implementation (Course Code AU14)

    Instructor GuideERC 11.0

    e Material

    V3.1.0.1

    cover

    Front coverIBM Certified Cours

  • Instructor Guide

    TrademarksThe reader should recognize that the following terms, which appear in the content of this training document, are official trademarks of IBM or other companies: IBM is a registered trademark of International Business Machines Corporation.The following are trademarks of International Business Machines Corporation in the United States, or other countries, or both:AIX AIX 5L AS/400CICS/6000 DB2 DominoJuly 2005 Edition

    The information contained in this document has not been submitted to any formal IBM test and is distributed on an as is basis withoutany warranty either express or implied. The use of this information or the implementation of any of these techniques is a customerresponsibility and depends on the customers ability to evaluate and integrate them into the customers operational environment. Whileeach item may have been reviewed by IBM for accuracy in a specific situation, there is no guarantee that the same or similar results willresult elsewhere. Customers attempting to adapt these techniques to their own environments do so at their own risk.

    Copyright International Business Machines Corporation 1997, 2005. All rights reserved.This document may not be reproduced in whole or in part without the prior written permission of IBM.Note to U.S. Government Users Documentation related to restricted rights Use, duplication or disclosure is subject to restrictionsset forth in GSA ADP Schedule Contract with IBM Corp.

    Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.UNIX is a registered trademark of The Open Group in the United States and other countries.Linux is a trademark of Linus Torvalds in the United States, other countries, or both.Other company, product and service names may be trademarks or service marks of others.

    HACMP Hummingbird InfoprintiSeries Language Environment LotusMagstar Micro Channel MVSNetwork Station OS/2 POWERPOWER2 POWER GTO PowerPCPS/2 pSeries RedbooksRequisite RISC System/6000 RS/6000SecureWay SP System/370Tivoli

  • Instructor GuideV3.1.0.1

    TOC Copyright IBM Corp. 1997, 2005 Contents iii

    ContentsTrademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv

    Instructor Course Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii

    Course Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix

    Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi

    Unit 1. Introduction to IBM Sserver pSeries Systems and AIX System Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1

    Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2What Is RISC Technology? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4pSeries System Bus Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7Workstation Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10Server Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12PC Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14Uniprocessor (Uni) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16SMP and Cluster 1600 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18Logical Partitioning (LPAR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21Role of the System Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24Who Can Perform Administration Tasks? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-26Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-29Exercise 1: root Login Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-31Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-33

    Unit 2. AIX 5L V5.3 Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2Installation Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4Installation Process (From CD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7Console and Language Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-10Installation and Maintenance Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13Installation and Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15Method of Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17Installation Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-20Erasure Options for Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22Primary Language Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-25Install Options for 32-bit Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-27Install Options for 64-bit Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30Install More Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-33Begin Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-35Installation Flowchart - All Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-37Configuration Assistant Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-39Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-42Exercise 2: Configuration Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-44Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide

    Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-46iv AIX System Administration I Copyright IBM Corp. 1997, 2005

    Unit 3. System Management Interface Tool (SMIT) . . . . . . . . . . . . . . . . . . . . . . 3-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2Early System Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-4System Management Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-7AIX Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-10System Management Interface Tool (SMIT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-13SMIT Main Menu (ASCII) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-16SMIT Main Menu (Motif) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-19Dialog Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-22Output Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-26SMIT Log and Script Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-28smit Command Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-31Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-34Exercise: Using SMIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-36Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-38

    Unit 4. AIX Software Installation and Maintenance . . . . . . . . . . . . . . . . . . . . . . 4-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-2AIX Product Offerings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4Packaging Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-7Bundles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-9Fileset Naming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-11Software Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-14Software States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-17Software Installation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-20Install and Update Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-22Install Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25Software Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-28List Installed Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-30Fix Repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-32Fix Central Web Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-34More Fix Services Screen (from Fix Central) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-38Compare Report Screen (from Fix Central) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-41Software Service Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-45Comparison Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-48Software Maintenance and Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-53instfix Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-56Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-59Exercise 14: AIX Software Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-61Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-63

    Unit 5. Configuring AIX Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-2Configuring AIX 5L V5.3 Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-4Configuring AIX 5L V5.3 Online Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-6Change/Show Documentation Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-9Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    TOC IBM pSeries Information Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12 Copyright IBM Corp. 1997, 2005 Contents v

    Information Center Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15Information Center Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-17Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-19Exercise 5: Information Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-21Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-23

    Unit 6. Web-based System Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2Web-based System Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4Accessing the Web-based System Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-7Using the Web-based System Manager (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11Using the Web-based System Manager (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . 6-13Using the Web-based System Manager (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . 6-15Installation for a Remote Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-17Configure the HTTP (Web) Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21Remote Client Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-23HMC: Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-26Remote Access to the HMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-29HMC Application Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-32Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-34Exercise 6: Web-based System Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-36Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-38

    Unit 7. System Startup and Shutdown. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2Startup Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4Starting System Management Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8PCI RS/6000 Start Up Process Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11bootinfo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-14The alog Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17/etc/inittab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20System Resource Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24System Resource Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-26Stopping Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-29System Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-31Manage the System Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-34Manage System Language Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-37Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-40Exercise 7 - System Startup and Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-42Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-44

    Unit 8. Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2Device Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4Listing of /dev Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-7Device Configuration Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-10List All Supported Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-13Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide

    List All Defined Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-16vi AIX System Administration I Copyright IBM Corp. 1997, 2005

    Device States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-19Self-Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-22SMIT Devices Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-24Device Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-27Location Code Format for PCI Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-29Location Code Example: Non-SCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-33Location Code Format for SCSI Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-36Location Code Example for SCSI Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-39Location Code Example: PCI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-41pSeries 670 and 690 Location Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-43Listing Device Physical Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-46Adding an ASCII Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-48Attachment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-50Device Nomenclature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-53Add a TTY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-55Documenting Hardware Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-58Checkpoint (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-61Checkpoint (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-62Exercise 8: Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-64Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-66

    Unit 9. System Storage Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-2Components of AIX Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-4Traditional UNIX Disk Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-6Benefits of the LVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-8Logical Volume Manager Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-10Physical Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-13Volume Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-16Volume Group Descriptor Area (VGDA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-19Logical Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-22Uses of Logical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-25What Is a File System? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-28Why Have Multiple File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-31Standard File Systems in AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-34Let's Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-37/etc/filesystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-40Mount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-43Mounting over an Empty Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-45Mounting over Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-47Listing File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-49Listing Logical Volume Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-51Checkpoint (1 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-53Checkpoint (2 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-55Checkpoint (3 of 3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-57Exercise 9: LVM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-59Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-61Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    TOC Unit 10. Working with the Logical Volume Manager . . . . . . . . . . . . . . . . . . . . . 10-1 Copyright IBM Corp. 1997, 2005 Contents vii

    Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2Logical Volume Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4

    10.1 Volume Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-7Volume Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8SMIT Volume Groups Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10List All Volume Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-12List Volume Group Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-14List Volume Group Information (Physical Volumes) . . . . . . . . . . . . . . . . . . . . . . 10-16List Volume Group Information (Logical Volumes) . . . . . . . . . . . . . . . . . . . . . . . 10-18Add a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-20Add a Scalable Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-23Set Characteristics of a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-25Change a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-27Logical Track Group (LTG) Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-30Hot Spare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-33Extending and Reducing Volume Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-37Remove a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-40Activate/Deactivate a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-42Import/Export a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-45Advanced RAID Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-47Exercise: Working with LVM (Parts 1 and 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-50

    10.2 Logical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-53Logical Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-54Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-56Mirror Write Consistency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-60Striping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-63Striped Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-66Logical Volume Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-68SMIT Logical Volumes Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-71Show Logical Volume Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-73Add a Logical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-76Remove a Logical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-78Set Characteristics of a Logical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-80List All Logical Volumes By Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-83Show Logical Volume Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-85Add Copies to a Logical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-87Reorganize a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-90

    10.3 Physical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-93Physical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-94SMIT Physical Volumes Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-96List Physical Volume Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-98List Logical Volumes on a Physical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-100List a Physical Volume Partition Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-102Add or Move Contents of Physical Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-104Documenting the Disk Storage Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-107Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-109Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide

    Exercise: Working with LVM (Parts 3-5) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-111viii AIX System Administration I Copyright IBM Corp. 1997, 2005

    Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-113

    Unit 11. Working with File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-2Structure of a Journaled File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-4Structure of an Inode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-7File System Fragmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-9Variable Number of Inodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-13Allocation Group Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-16Compressed File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-19Large Enabled File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-22Exercise 11: Inodes and NBPI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-25Journal Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-27JFS versus JFS2 File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-30Extended Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-34File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-37Listing File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-39List All Mounted File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-42Add/Change/Show/Delete File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-45Working with Journaled Files Systems in SMIT . . . . . . . . . . . . . . . . . . . . . . . . . .11-47Add a Standard Journaled File System on a Previously Defined Logical Volume 11-49Add a Standard Journaled File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-52Working with Enhanced Journaled File Systems (JFS2) in SMIT . . . . . . . . . . . .11-56Add an Enhanced Journaled File System (JFS2) on a Previously Defined Logical Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-58Add an Enhanced Journaled File System (JFS2) . . . . . . . . . . . . . . . . . . . . . . . . .11-61Mount a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-63Change/Show Characteristics of a Journaled File System . . . . . . . . . . . . . . . . . .11-67Change/Show Characteristics of an Enhanced Journaled File System . . . . . . . .11-70Dynamically Shrinking a JFS2 File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-72Remove a Journaled File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-75Add a RAM File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-78Add a UDF File System on a DVD-RAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-80System Storage Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-83Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-86Exercise: Working with File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-88Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-90

    Unit 12. Managing File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-2Space Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-4Listing Free Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-7Control Growing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-10The skulker Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-13Listing Disk Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-16Fragmentation Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-19Defragmenting a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-22Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    TOC Verify a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-25 Copyright IBM Corp. 1997, 2005 Contents ix

    Documenting File System Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-28Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-30Exercise: Managing File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-32Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-34

    Unit 13. Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-2What Is Paging Space? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-4Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-7Sizing Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-10Paging Space Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-14Checking Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-17Adding Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-20Change Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-23Remove Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-26Problems with Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-29Documenting Paging Space Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-31Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-33Exercise 13: Paging Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-35Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-37

    Unit 14. Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-2Why Backup? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-4Types of Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-7Backup Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-10Backup Devices - Diskette . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-12Backup Devices - Tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-15Backup Device - Read/Write Optical Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-18Backup Device - 7210 External DVD-RAM Drive . . . . . . . . . . . . . . . . . . . . . . . . 14-22SMIT Backup Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-24rootvg Backup Process - mksysb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-26/image.data File for rootvg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-29/bosinst.data File for rootvg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-32rootvg - Back up the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-38rootvg - Back up the System to Tape or File . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-40mksysb Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-43Back Up a Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-46Back Up a Volume Group to Tape/File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-48Restoring a mksysb (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-51Restoring a mksysb (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-53Remake/Restore a non-rootvg Volume Group . . . . . . . . . . . . . . . . . . . . . . . . . . 14-56mksysb - ISO9660 Burn Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-59mksysb - UDF DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-62rootvg - Back Up the System to CD (ISO9660) . . . . . . . . . . . . . . . . . . . . . . . . . . 14-64rootvg - Back Up the System to ISO9660 DVD . . . . . . . . . . . . . . . . . . . . . . . . . . 14-66rootvg - Back Up the System to UDF DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14-68Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide

    Back Up a Volume Group to CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-70x AIX System Administration I Copyright IBM Corp. 1997, 2005

    Back Up a Volume Group to ISO9660 DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-72Back Up a Volume Group to UDF DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-74Exercise 14: Using backup and restore (Part 1) . . . . . . . . . . . . . . . . . . . . . . . . .14-76Back Up by Filename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-78Back Up by Filename Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-81Back Up a File or a Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-84Back Up a File System by Inode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-86Incremental Backup Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-89Back Up a File System by Inode Using SMIT . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-92restore Command (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-94restore Command (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-97Restore a File or a Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-99Exercise 14: Using backup and restore (Parts 2, 3, and 4) . . . . . . . . . . . . . . .14-101Other UNIX Backup Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-103The tar Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-106The cpio Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-109The dd Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-112Controlling the Tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-115Good Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-118Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-121Exercise 15: (Optional) Using tar and cpio . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-123Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-125

    Unit 15. Security and User Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-2

    15.1 Security Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-5User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-6Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-10Group Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-13User Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-16Controlling Access to the root Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-18Security Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-21File/Directory Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-24Reading Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-27Changing Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-30umask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-33Changing Ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-36Exercise 16: Security Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-39

    15.2 User Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-41Login Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-42User Initialization Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-45Security and Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-48SMIT Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-51List All Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-54Add a User to the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-57Change / Show Characteristics of a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-61Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    TOC Remove a User from the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-64 Copyright IBM Corp. 1997, 2005 Contents xi

    Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-67Regaining root's Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-70SMIT Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-73List All Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-75Add Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-77Change / Remove Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-80Message of the Day . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-83Exercise 17: User Administration (Parts 1-5) . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-85

    15.3 Security Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-87Security Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-88/etc/passwd File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-91/etc/security/passwd File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-94/etc/security/user File (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-97/etc/security/user File (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-101Group Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-106/etc/security/login.cfg File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-109Validating the User Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-112System Management Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-115PCI RS/6000 Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-117Documenting Security Policy and Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-120Checkpoint (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-122Checkpoint (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-124Exercise 17: User Administration (Parts 6-7) . . . . . . . . . . . . . . . . . . . . . . . . . . 15-126Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-128

    Unit 16. Scheduling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-2The cron Daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-4crontab Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-7Format of a crontab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-10Editing a crontab File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-13The at and batch Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-16Controlling at Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-19Documenting Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-21Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-23Exercise 18: Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-25Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-27

    Unit 17. Printers and Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-2AIX 5L Printing Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-4AIX Print Subsystem: Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-7System V Print Subsystem: Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-10Concepts of Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-13Printer Data Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-16System Files Associated with Printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-19Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide

    qdaemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-22xii AIX System Administration I Copyright IBM Corp. 1997, 2005

    The /etc/qconfig File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-25Printer Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-29AIX Printer Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-31Configuring a Printer with a Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-34Selecting a Printer Type (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-36Selecting a Printer Type (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-38Printer Attachment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-40Add the Print Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-42Remote Printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-44Client Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-46Start lpd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-48Add a Remote Print Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-50Define the Print Server on the Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-52Let's Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-54Submitting Print Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-56Listing Jobs in a Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-59Change Characteristics of a Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-62Removing a Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-65Managing Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-67Understanding Queue Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-69Bringing Queues Up and Down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-72Managing Print Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-74Cancelling Print Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-76Job Priority Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-79Holding a Job in a Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-82Moving a Job between Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-84Printing-related Directories to Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-86Printing Problem Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-88Checkpoint (1 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-91Checkpoint (2 of 2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-93Exercise 19: Printers and Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-95Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-97

    Unit 18. Networking Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-2What Is TCP/IP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-4An Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-7Names and Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-10TCP/IP Network Facilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-13Information Needed to Configure TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-16Configuring TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-19Flat Name Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-22Identifying the Hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-24Basic TCP/IP User Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-26Checkpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-31Exercise 20: Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-33Unit Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-35Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    TOC Appendix A. Checkpoint Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1 Copyright IBM Corp. 1997, 2005 Contents xiii

    Appendix B. Configuring AIX 5L V5.2 Documentation . . . . . . . . . . . . . . . . . . . . . B-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-2Configuring AIX 5L V5.2 Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-4

    Appendix C. Command Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1

    Appendix D. Sample Shell Scripts Used in Class . . . . . . . . . . . . . . . . . . . . . . . . . D-1

    Appendix E. AIX Control Book Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-1

    Appendix F. Serial Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-2Non-Self-Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-4Device Nomenclature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-17Exercise Appendix B: Serial Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F-43

    Appendix G. The System V Print Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . G-1Unit Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . G-2AIX 5L Printing: Whats New? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . G-4Exercise Appendix C: The System V Print Subsystem . . . . . . . . . . . . . . . . . . . . . G-95

    Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .X-1Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guidexiv AIX System Administration I Copyright IBM Corp. 1997, 2005

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    TMK Copyright IBM Corp. 1997, 2005 Trademarks xv

    TrademarksThe reader should recognize that the following terms, which appear in the content of this training document, are official trademarks of IBM or other companies: IBM is a registered trademark of International Business Machines Corporation.The following are trademarks of International Business Machines Corporation in the United States, or other countries, or both:

    Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.UNIX is a registered trademark of The Open Group in the United States and other countries.Linux is a trademark of Linus Torvalds in the United States, other countries, or both.Other company, product and service names may be trademarks or service marks of others.

    AIX AIX 5L AS/400CICS/6000 DB2 DominoHACMP Hummingbird InfoprintiSeries Language Environment LotusMagstar Micro Channel MVSNetwork Station OS/2 POWERPOWER2 POWER GTO PowerPCPS/2 pSeries RedbooksRequisite RISC System/6000 RS/6000SecureWay SP System/370TivoliCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guidexvi AIX System Administration I Copyright IBM Corp. 1997, 2005

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

  • Instructor GuideV2.0

    pref Copyright IBM Corp. 1997, 2005 Instructor Course Overview xvii

    Instructor Course OverviewThis is a five-day course for system administrators with little or no knowledge of administration concepts or skills. The course requires the students to be familiar with AIX from an end-users point of view (for example, to be able to use the vi editor). The course has been structured to allow a system administrator to set up and manage their pSeries including installation of the software, adding all the devices and users, managing and monitoring the disk space, and implementing correct backup policies. The Networking Overview topic is intended as an overview, simply to show the students what more can be achieved on the system and as a lead-in to the Configuring TCP/IP in the AIX Environment course, AU05/Q1307. Each session is broken into three main subtopics. At the beginning of each unit the theory and concepts required for that topic are covered. Then, using the knowledge that they have just gained, students are shown how the concepts can be implemented, set up, and managed. The final subtopic deals with very basic problem determination issues and solutions are given to the more common problems. Students should be encouraged to document their system setup as a good system administrative practice, and to encourage and help them do this, commands are given in the units which can be run to obtain this information. Students who are interested in taking problem determination further and tackling more complex system administrative tasks, should attend the AIX 5L System Administration II course. This course still contains information on the classical RS/6000 hardware platform but it is mentioned several times that this platform is no longer supported under AIX 5L V5.2 and later. Where appropriate, a unit or exercise may contain a separate topic for each platform to address the differences; otherwise, information for both hardware platforms are woven into the discussion. With this release of the course, the materials have been updated to support AIX 5L V5.3.Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guidexviii AIX System Administration I Copyright IBM Corp. 1997, 2005

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

  • Instructor GuideV2.0

    pref Copyright IBM Corp. 1997, 2005 Course Description xix

    Course DescriptionAIX 5L System Administration I: Implementation

    Duration: 5 days

    PurposeThe purpose of this course is to enable students to install, customize, and administer the AIX 5L V5.3 operating system in a multiuser environment using pSeries systems.

    AudienceAnyone responsible for the system administrative duties implementing and managing AIX 5L V5.3 operating system on an IBM pSeries system.

    PrerequisitesThe students attending this course should be able to: Log in to an AIX system and set a user password Execute basic AIX commands Manage files and directories Use the vi editor Use redirection, pipes, and tees Use the utilities find and grep Use the command and variable substitution Set and change Korn shell variables Write simple shell scriptsThese skills can be acquired by taking the AIX 5L Basics course or through equivalent AIX/UNIX knowledge.

    ObjectivesOn completion of this course, students should be able to: Install the AIX 5L V5.3 operating system, software bundles, and

    filesets Perform system startup and shutdownCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide

    Understand and use the system management toolsxx AIX System Administration I Copyright IBM Corp. 1997, 2005

    Manage physical and logical devices Perform file system management Create and manage user and group accounts Perform and restore system backups Utilize administrative subsystems, including cron to schedule

    system tasks, and security to implement customized access of files and directories

    Describe basic networking concepts

    Contents Introduction (Overview of pSeries) System Management Tools - SMIT and the Web-based System

    Manager Software Installation and Management System Startup and Shutdown Devices Printers and Queues Managing Queues System Storage Overview Working with the Logical Volume Manager Working with File Systems Managing File Systems Paging Space Backup and Restore Security User Administration Scheduling Networking Overview

    Curriculum relationshipThis course should follow the AIX 5L Basics course. A basic understanding of AIX environment and simple commands is recommended before taking this course.Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV2.0

    pref Copyright IBM Corp. 1997, 2005 Agenda xxi

    AgendaDay 1

    (00:30) Welcome (00:25) Unit 1 - Introduction to pSeries/AIX System Administration(00:10) Activity: su (00:40) Unit 2 - AIX V5.3 Installation (00:15) Activity: Configuration Assistant (00:20) Unit 3 - System Management Interface Tool (SMIT)(00:20) Exercise: Using SMIT (00:30) Unit 4 - AIX Software Installation and Maintenance (00:25) Exercise: AIX Software Installation (00:10) Unit 5 - Configuring AIX Documentation (00:10) Exercise - Information Center(00:10) Unit 6 - WebSM (00:20) Exercise: Configuring WebSM server (00:30) Unit 7 - System Startup and Shutdown (00:30) Exercise: System Startup and Shutdown

    Day 2 (00:40) Unit 8 - Devices (00:30) Exercise: Devices (00:50) Unit 9 - System Storage Overview (00:10) Let's Review: LVM Terminology (00:30) Unit 9 (Cont) (00:15) Activity: LVM Commands (00:25) Unit 10 - Working With the Logical Volume Manager (00:20) Activity: Volume Groups (00:45) Unit 10 (Cont) (00:40) Exercise: Logical Volume Manager (00:35) Unit 11 - Working with File Systems (00:20) Activity: Inodes and NBPI

    Day 3 (00:35) Unit 11 (Cont) (00:40) Exercise: Working with File Systems (00:25) Unit 12 - Managing File Systems (00:25) Exercise: Managing File Systems (00:25) Unit 13 - Paging Space (00:20) Exercise: Paging Space (00:40) Unit 14 - Backup and Restore Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide

    (00:20) Activity: savevg xxii AIX System Administration I Copyright IBM Corp. 1997, 2005

    (00:25) Unit 14 (Cont) (00:40) Exercise - Using backup and restore

    Day 4 (00:20) Unit 14 (Cont) (00:30) Exercise (optional) - Using tar and cpio (02:45) Unit 15 - Security and User Administration

    (00:35) 15.1 - Security Concepts (00:25) Exercise: Security Files (00:30) 15.2 - User Administration (00:40) Exercise: User Administration (00:25) 15.3 - Security Files (00:10) Activity: Examine the Security Files

    (00:25) Unit 16 - Scheduling (00:30) Exercise: Scheduling

    Day 5 (00:40) Unit 17 - Printers and Queues (00:10) Let's Review (00:25) Unit 17 (Cont) (00:40) Exercise: Printers and Queues (00:30) Unit 18 - Networking Overview (00:40) Exercise: Networking Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV2.0

    pref Text highlighting Copyright IBM Corp. 1997, 2005 Agenda xxiii

    The following text highlighting conventions are used throughout this book: Bold Identifies file names, file paths, directories, user names and

    principals.Italics Identifies links to Web sites, publication titles, and is used

    where the word or phrase is meant to stand out from the surrounding text.

    Monospace Identifies attributes, variables, file listings, SMIT menus, code examples of text similar to what you might see displayed, examples of portions of program code similar to what you might write as a programmer, and messages from the system.

    Monospace bold Identifies commands, daemons, menu paths and what the user would enter in examples of commands and SMIT menus.

    The text between the < and > symbols identifies information the user must supply. The text may be normal highlighting, bold or monospace, or monospace bold depending on the context.Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guidexxiv AIX System Administration I Copyright IBM Corp. 1997, 2005

    Course materials may not be reproduced in whole or in part

    without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-1

    Unit 1. Introduction to IBM Sserver pSeries Systems and AIX System Administration

    What This Unit Is AboutThis unit introduces the basic IBM Sserver pSeries system configurations and describes the roles of the system administrator.

    What You Should Be Able to DoAfter completing this unit, you should be able to: Define terminology and concepts of IBM Sserver pSeries

    systems List common configurations available for IBM Sserver pSeries

    systems Describe the roles of the system administrator Obtain root access with the su command

    How You Will Check Your ProgressAccountability: Checkpoint questions Exercises

    ReferencesGA23-2674 Exploring IBM RS/6000 Computers SG24-4690 A Technical Introduction to PCI-Based RS/6000

    Servers

    SG24-2581 Managing AIX on PCI-Based RISC System/6000 Workstations

    SG24-5120 RS/6000 System Handbook www.ibm.com/eserver/pseriesCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide1-2 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-1. Unit Objectives AU1411.0

    Notes:

    Copyright IBM Corporation 2005

    Unit ObjectivesAfter completing this unit, you should be able to: Define terminology and concepts of IBM Sserver pSeries

    systems List common configurations available for IBM Sserver

    pSeries systems Describe the roles of the system administrator Obtain root access with the su commandCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    Uempty Instructor Notes: Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-3

    Purpose Set the students expectations for this unit.Details Additional Information Transition Statement Lets look at the relationship between the internal hardware architecture and RISC concepts. Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide1-4 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-2. What Is RISC Technology? AU1411.0

    Notes:

    RISC historyThe IBM Sserver pSeries systems use RISC processors and were formally called RS/6000 systems, where the RS stood for RISC System.Reduced Instruction Set Computing (RISC) architecture was originally developed by IBM in the 1970s. Its basic objective was to provide a reduced instruction set that would execute very fast with maximum efficiency in the hardware. More complex instructions would be implemented in the software.

    POWER architectureThe simple RISC-based instruction is typically executed in one system clock cycle (or less using superscalar techniques). IBM has enhanced the standard RISC technology by introducing the newer Performance Optimized With Enhanced Risc (POWER)

    Copyright IBM Corporation 2005

    What Is RISC Technology?Reduced Instruction Set Computing (RISC) processors aim to: Implement the most used instructions in hardware Execute multiple instructions in one cycle Provide synergy between hardware and software

    Time to executea program

    Time taken fora clock cycle

    Number ofInstructions

    Clock cyclesper instruction

    Depends on:Architecture

    Compiler

    Depends on:Architecture

    CompilerImplementation

    Depends on:Technology

    Implementation

    Optimized onpSeries machines

    = x xCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    Uempty architecture. The original POWER architecture has also evolved into the PowerPC, Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-5

    POWER4, and POWER5 architectures. The POWER architectures are designed with the newest in circuitry engineering and multiprocessor technologies and yield very fast performance. The instructions are handled in a superscalar (parallel) fashion by the processor which further increases the performance offered by a RISC system.

    64-bit architectureSupport for 64-bit architecture has been provided since AIX V4.3. This support provides improved performance for specialized applications with: - Large address spaces (up to 16,384,000 terabytes) - Access to large datasets for data warehousing, scientific and multimedia

    applications - Long integers in computations A major enhancement to AIX since AIX 5L V5.1 was the introduction of the 64-bit kernel. Server consolidation and workload scalability will continue to require higher capacity hardware systems that support more memory and additional I/O devices. The 64-bit AIX 5L kernel is designed to support these requirements.The 32-bit and the 64-bit kernel are available. Only 64-bit CHRP-compliant PowerPC machines are supported for the 64-bit kernel on the POWER platform. The primary advantage of a 64-bit kernel is the increased kernel address space allowing systems to support increased workloads. This ability is important for a number of reasons: - Data sharing and I/O device sharing are simplified if multiple applications can be run

    on the same system - More powerful systems will reduce the number of systems needed by an

    organization, thereby reducing the cost and complexity of system administrationCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide

    Instructor Notes:1-6 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Purpose Explain the relationship between the internal hardware architecture and RISC concepts. Details This page is meant as an introduction. Do not go into too much detail on hardware. Other courses, such as Q1316/AU16 discuss hardware in more detail. The first RISC system was developed in 1975 at the IBM T.J. Watson Research Center as a spin-off of telephone switching research. In 1986, IBM introduced the first system to use RISC technology - the PC RT. AIX was announced at this time as well as the operating system for the PC RT. The PC RT is often thought of as the first generation of RISC systems. The RS/6000 systems, introduced in 1990, are often thought of as the second generation of RISC systems. AIX V3 was introduced as this time. The latest update of this course reflects AIX 5L V5.3. Since October 2000, new servers with UNIX operating systems have been introduced by the name of IBM Sserver pSeries systems.Of course, IBM offers many systems, from smaller personal systems and workstations up to the Scalable PowerParallel (SP) systems. The added information on superscalar is for interest purposes only. Systems that are designed to handle multiple instructions simultaneously are called superscalar. The student notes also mention AIX V4.3 64-bit support. The greatest potential performance benefit of 64-bit addressing is the ability to handle very large address spaces. In order to use the 64-bit capability, the RS/6000 processor must be capable of supporting this enhancement. The IBM S70 was announced in October of 1997 to provide 64-bit support. Since AIX V4.3 the operating system allows users to write their own 64-bit enabled applications. Note also, that since AIX 5L V5.1, the full 64-bit kernel was made available for POWER systems.Additional Information It should be noted that the advantages of 64-bit addressing capability come with a cost. Extra addressability must be accompanied by very large amounts of system memory to work effectively and memory is not inexpensive. Applications compiled in 64-bit mode also consume more disk space than their 32-bit equivalents. Also, AIX 5L V5.3 supports two hardware architectures: 32-bit POWER architecture 64-bit POWER architectureThe 64-bit kernel is available for 64-bit POWER. Older 32-bit architecture is supported by the 32-bit kernel. The 64-bit POWER hardware gives you the choice of running a 32-bit or 64-bit kernels.Transition Statement The next page talks about the IBM Sserver pSeries system bus types. Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    Uempty Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-7

    Figure 1-3. pSeries System Bus Types AU1411.0

    Notes:

    IntroductionThe job of the bus is to provide the highway for information to flow between the IBM Sserver pSeries system elements and the optional I/O feature cards (for example, SCSI adapters, token-ring cards) that are plugged into the adapter slots.

    Peripheral Component Interconnect (PCI) busPeripheral Component Interconnect (PCI) buses are an open industry specification which supports complete processor independence. The PCI bus works across multiple operating system platforms. IBM uses this technology in all of its IBM Sserver pSeries systems.

    Copyright IBM Corporation 2005

    pSeries System Bus Types

    PCI

    Exp BusXface

    ISA

    Processor

    LAN Graphics SCSI

    PCI Bus

    Base I/OFunctionsCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide

    Industry Standard Architecture (ISA) bus1-8 AIX System Administration I Copyright IBM Corp. 1997, 2005

    IBM Sserver pSeries systems also contains an Industry Standard Architecture (ISA) bus for use with some built-in devices like the diskette drive and keyboard. Built-in ISA support remains in AIX 5L V5.3.Some older model PCI systems also contain ISA slots that would accept standard ISA cards. With AIX 5L V5.2 and later, ISA cards are no longer supported.

    Micro Channel Architecture (MCA) busThe first IBM RISC-based machines, at that time called RS/6000s, were based on IBM's Micro Channel Architecture (MCA). The MCA systems are sometimes referred to as classical systems. These were very popular and still make up a large portion of the installed base. MCA machines can be easily recognized by the physical key on the front of the machines. PCI and MCA are basically the same from an administrative viewpoint. There are differences primarily in the startup procedure.Beginning with AIX 5L V5.2, MCA architectures are no longer supported.

    For more informationA good source for hardware information is: http://publib16.boulder.ibm.com/pseries/en_US/infocenter/base/ Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    Uempty Instructor Notes: Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-9

    Purpose Explain what a bus is and what type is currently used. Details Explain that all models sold today are based on the PCI bus. Because there are a large number of MCA machines installed, students may have MCA machines in their workplace. Point out to the students that the administration is almost the same.Additional Information Transition Statement We'll next take a look at components of a typical workstation configuration. Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide1-10 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-4. Workstation Configuration AU1411.0

    Notes:

    OverviewOne common configuration for the IBM Sserver pSeries systems is as a single-user graphical workstation suitable for graphics applications, such as CAD/CAM. In this configuration, the IBM Sserver pSeries system has a graphical display (referred to as an LFT - Low Function Terminal) which is attached to a graphics adapter inside the system unit. A keyboard, mouse, and optional graphics tablet are plugged into special ports on the system board. There are a number of graphics cards available for the different IBM Sserver pSeries models which differ in speed, resolution, number of colors supported, 2D or 3D support, and so forth. There are corresponding displays that can be used from personal computer displays through to the 23-inch PowerDisplay.

    Copyright IBM Corporation 2005

    Workstation Configuration

    1280 x 1024 ResolutionUp to 16 M colors

    Single-User Graphical WorkstationPersonal ComputerDisplay or PowerDisplay 15, 17, 20, or 23 inches

    Graphics Adapter

    pSeries

    Two serial portsSCSIKeyboardMouse

    Diskette Ethernet Tablet

    Built-in AdaptersCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    Uempty Instructor Notes: Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-11

    Purpose Explain the use and components of a typical graphics workstation configuration. Details This is representative of a simple workstation configuration. This is most likely what the students will see in the classroom. Point out that every system comes with built-in ports - serial ports, SCSI, keyboard, mouse, Ethernet and tablet (for graphical drawing). There are a variety of graphics adapters available that provide a range of graphics capability. The capabilities are the number of colors that can be display, speed of the card and 2D or 3D. The added capabilities come with added cost. Additional Information Typical high-end graphics configurations support up to 16 million colors and a resolution of 1280 by 1024. Is this type of configuration likely to be easier or more difficult than a multiuser fully networked system to administer? Often this type of configuration will be relatively simple to administer as there is likely to be only one user at a time, limited I/O attached, and the user may tolerate limited unavailability for maintenance, and so forth. However, in some installations many of these systems are connected, and this can be a large administrative problem. Transition Statement Another common configuration is a workstation with many users. Let's briefly discuss this configuration next. Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide1-12 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-5. Server Configurations AU1411.0

    Notes:

    OverviewSome multiuser systems consist only of ASCII terminals connected locally or over a telephone line by modem. Two ASCII devices can be connected to the serial ports provided on IBM Sserver pSeries systems. All further ASCII devices will require an asynchronous adapter card. More complex systems consist of many IBM Sserver pSeries systems and other devices such as PCs connected over a local area network (LAN) like Ethernet or token ring. In this case, the IBM Sserver pSeries system requires the appropriate communications adapter card.

    Copyright IBM Corporation 2005

    Server Configurations

    Multiuser System

    Networked System

    pSeriesSystem Unit

    ASCII Terminals

    Async Adapter

    Disk storagePrintersProgramsLogin Sessions

    Server Clients

    PCs

    File TransferNetworkManagement

    MailNetwork

    pSeries Other systemspSeriesDocumentationCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    Uempty Instructor Notes: Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-13

    Purpose Explain the components required for a typical multiuser ASCII system and a more complex networked system. Also, give a few examples of how these systems are used. Details Good examples might include:Multiuser ASCII - word processing such as using Word Perfect for AIX. Networked - database such as Oracle or DB2 for AIX. These systems are usually more difficult to administer than a configuration with ASCII terminals only due to the following: Many simultaneous users Many I/O devices Mission critical applications Transition Statement A recent trend is towards giving commercial multiuser applications a graphical user interface (GUI). In this context, X terminals are often used as terminals. Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide1-14 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-6. PC Connectivity AU1411.0

    Notes:

    OverviewVery commonly, IBM Sserver pSeries systems are accessed via a network using PCs. One way to connect is using telnet. Another method, which is growing in popularity, is to install software on the PC to give the PC the capability to function as an X-Window Server. This allows the PC to function as a graphics display station for the IBM Sserver pSeries system. There are many commercially available software packages for several different operating systems that provide this functionality.

    Copyright IBM Corporation 2005

    PC Connectivity

    Network

    PC

    X Window Server

    Software

    pSeries

    X Window Client

    ProgramsCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    Uempty Instructor Notes: Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-15

    Purpose Explain common methods for accessing an IBM Sserver pSeries system. Details Since most users have PCs on their desk, connecting a PC to an IBM Sserver pSeries system is very common. telnet provides a simple text-based login to the IBM system. If software is installed on the PC, then the PC can function as an X-Window display for the IBM Sserver pSeries system giving the user access to graphical applications running from the server. Additional Information Be careful not to endorse any particular X product, but Hummingbird's Exceed product is commonly used in the IBM Sserver pSeries environment. IBM is marketing the IBM Network Station as another mean to connect to the BM Sserver pSeries system. These are about the size of a Thinkpad. They must be booted from a host machines but have Windows and Java support. Transition Statement Let's looks at a couple of terms that are used in the computing world. Course materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor Guide1-16 AIX System Administration I Copyright IBM Corp. 1997, 2005

    Figure 1-7. Uniprocessor (Uni) AU1411.0

    Notes:

    OverviewThe term uniprocessor refers to a machine with only one processor. The processor is connected to the memory and other adapters via the bus. Today, the I/O buses are based on the Peripheral Component Interconnect (PCI) architecture.

    Copyright IBM Corporation 2005

    Uniprocessor (Uni)

    SSAAdapter

    SCSIAdapter

    GraphicsAdapter

    Cache Processor

    MemoryController

    Processor Bus I/O Bus

    Memory Bus

    Memory CardsCourse materials may not be reproduced in whole or in part without the prior written permission of IBM.

  • Instructor GuideV3.1.0.1

    Uempty Instructor Notes: Copyright IBM Corp. 1997, 2005 Unit 1. Introduction to IBM Sserver pSeries Systems and AIX 1-17

    Purpose Explain the basic uniprocessor architecture. Details The various parts of a computer are connected to each other by buses. A bus is a transmission path along which signals are transferred to and from attached devices. Only devices addressed by the signals pay attention to them; the others discard the signals. The I/O bus is the data path on the planar (motherboard) that interconnects the microprocessor with attachments to the planar in expansion slots (such as SSA, SCSI and graphics adapters). In the past, I/O buses were based on the Micro Channel Architecture (MCA). Today, I/O buses are based on the industry-standard Peripheral Component Interface (PCI) Architecture. Additional Information Transition Statement Utilizing multiple processors is a good w