Experimental environment:
Aix:os version: AIX 5L for power V5.1
IP address:192.168.0.5
Assume Domain name: king.com
Host Name: pp.king.com
As a domain name server, the ability to have positive and reverse solutions is called a complete server. Now there are many, especially win's DNS server many do not have the ability to reverse the solution.
Let's get to the point.
Set up a complete DNS server mainly requires 6 files:
named.conf #主要的设定文件
na
The 6th part is the Java business application building PHP Web interface
Introduction: Build a PHP Web interface for Java™ business applications using the database created in the tutorials earlier in this series of articles (see Resources). The PHP Web interface collects information from users and sends session data to a Java business application for processing and responding accordingly.
Before you start
This tutorial is intended for aix®5.3 devel
Part 3rd: Integrating Java Business applications with db2version 9
Introduction: Applications that use Java™ and PHP technologies can be developed in aix®. While gaining the benefits of using PHP as a web-based interface platform, you can write core logic (or redeploy existing java-based applications) using the Java programming language. In this article (part 3rd of the series), we describe how to connect the core applications created in part 2nd to
Part 2nd: Build a Java based business application
Before you start
This tutorial is intended for aix®5.3 developers who want to quickly integrate PHP and java™ in their own web application development. Readers should have basic Java programming capabilities and an understanding of the basic web development environment.
About this series
PHP is a very good web development language, and Java technology is very popular in business application develop
The example in this chapter uses a 5GB 8-mm tape drive with a device file of/dev/rmt0.
First, backup
Backups can be implemented through the command line or the SMIT menu.
1, command Line Backup
AIX command Backup and restore are dedicated to backup and restore. These two commands complement the standard UNIX utilities tar, Cpio, DD, and Pax. Here are a few ways to back up the entire file system and individual files or directories separately.
(1)
Protecting the root user's security
The following sections describe how to disable the root user when running in Enhanced RBAC mode.
Choose to protect the root user's security
When the AIX system is running in enhanced RBAC mode, the system can be configured so that the root user does not have Superuser privileges and is disabled so that the root account loses logon rights.
Typically, in AIX, the root u
and the above port are put through. Turn off the firewall's masking of these ports.3. Configure ExportVim/etc/exports/home/bapogg 10.249.13.0/24 (Rw,no_root_squash,async)4. Start NFSServicenfs startServicerpcbind startServicenfs statusRPC.SVCGSSD isstoppedRpc.mountd (pid8451) is running ...NFSD (PID 84488447 8446 8445 8444 8443 8442 8441) is running ...Rpc.rquotad (pid8435) is running ...Servicerpcbind statusRpcbind (PID 1541) is running ...V. Viewing transmission performance over NFS 1. Manual
The basics of the Korn shell commonly used on IBM AIX operating systems are described in more detail in the guide.Korn the order in which the shell executes commands1. Keywords, such as if,for,function, etc.2. Aliases (Aliases)3. Internal commands, such as CDs, whence and functions4. Function functions5. Script scripts, executable program in Path※ Locate the root of the command with the following command:Whence-v commandOr:Type commandAlias (aliases)A
As for the Filesystemcacheon Aix , the following books have been discussed:Oracle tuning Diary for eel with: The story of a gold DBA . pdfSee page 165 :This filesystemcache,Nmon after entering, after knocking m can see. The following is an example:Notice the upper right corner of the display:filesystemcache(numperm) 66.8%Process 28.3%System 4.8%Free 0.2% The sum of the three is approximately equal to 100%That is, the footprint of all physical memory i
1.linux view CPU and memory usageView memory consumption percentage:[Email protected] ~]# Free-m | Sed-n ' 2p ' | awk ' {print ' used mem is "$" m,total Mem is "$" m,used percent is "$3/$2*100"% "} 'Used mem is 15765m,total mem are 15949m,used percent is 98.8463%[Email protected] ~]#use the top command to view the percentage of CPU consumption (percent of memory =%comp+%nomcomp)2. Aix system view memory and CPU consumption percentageUse the Nmon comma
Recently looked at this, did a AIO case to try, unfortunately, the compiler has no problem, the runtime needs permissions, open the way of access to the Internet, this permission is root can be, the company is not possible to give me this permission.
1. Determine the state of the Aio0 driver. Run the following AIX command:Lsdev-c-L Aio0
Example Output:
Aio0 Defined asynchronous I/O2. Run the cfgmgr AIX comm
The date command does not have the-D option in the AIX system and does not receive the entered value.In an AIX system, if you want to get a few days or days after the current time, you can use the method that changes the current timezone.Export Tz=beist-8 is the system current time.Adjusting the time zone can change times.For example: Get the time of next week export tz=beist-176, 176 is obtained by (24*7+8
AIX install oracle10g Runinstallert Popup error case
Environment:
System: aix5300-08
Database: Oracle 10g (64bit)
After the AIX client unloads Oracle software, reinstall Oracle software pop-up error:
Check system permissions for Oracle users,/u01 file permissions 770 (rwxrwx---), all normal. Attempt to modify the reset and check correctly, run Runinstallert still eject as error.
#umount/u01-umount o
Stripe technology is a widely used I/O load balancing technology, can greatly improve I/O performance without additional hardware input. However, in an environment where this technology is used, only the I/O processing of the database and operating system is well planned and set up to match the stripe technology to achieve the best I/O performance. For this topic, the DB2 database and AIX operating system are examples of how to plan and set up relevan
1.1 Confirm that the system library files required to install Oracle are installed lslpp-l bos.adt.base bos.adt.lib BOS.ADT.LIBM
Bos.perf.perfstat bos.perf.libperfstat bos.perf.proctools bos.adt.prof Bos.cifs_fs.rte
1.2 Confirm 64-bit operating system:
/usr/bin/getconf Hardware_bitmode
64
Bootinfo-k
64
1.3: What is the command to view the AIX version?
Oslevel-r
Learn how to use the IBM network authentication Service (IBM Kerberos) for AIX to enhance the Kerberos user's password
Introduction
The Kerberos principal password is the key used to unlock the Key Distribution Center (KDC) server answer, so if the password is compromised there is no other way to verify the authenticity of the subject. Therefore, the administrator must choose a password that is very difficult to crack, so as not to be cracked by oth
"TTS" AIX platform database migrated to linux--based on Rman (real environment)Http://www.cnblogs.com/lhrbest/articles/5186933.htmlTechnical enthusiasts, after reading this article, you can master the following skills, you can also learn some other knowledge you do not know, ~o (∩_∩) o~:① implementation of transmission table space under heterogeneous platform② Transfer table space based on read only and rman2 of table spaces③ platform byte-order, self
First, prepare
AIX is a UNIX operating system developed by IBM; The command looks similar to Linux;
1. Installation of Putty;putty is a remote login software;
2.ip:121.8.131.125
3. User name: Tguser
4. Password: 9ol.) P:?
ii. Login and logout
1. Login:
SSH root@192.168.0.72
Password: 1qaz@wsx
2. Log out:
(1) Logout
(2) Exit
third, passwd to change the passwordIv. Date Order
1.date: Returns the current date
2.cal: Calendar command
Example:
(1) Cal 2
Label:There was a colleague, back and forth operation of the development and production of the database, the results mistakenly deleted the production of the database, that mood I think it is not common people can understand, although Oracle can have a method to restore, but not thorough. Therefore, in the work, whether it is development or maintenance, backup database is very necessary. Simple and practical evening automatic backup Database small case Step one, create a backup script, named or
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.