1. process description
In AIX, a process is a task, and a running program is a process.
2. child and parent Processes
A process can be dependent on a process. A process can generate a new process. The generated process is called a child process, and the original process is called a parent process.
3. View Processes
Ps: process view command
In the ps command, you can view the UID user ID of the process, PID process ID), PPID parent process ID), Ccpu
In this article, learn how to solve ibm aix in a similar way®. You will be familiar with related tools and knowledge, so as to improve the skills to solve some difficult problems that may occur. This article provides two interesting scenarios that I have encountered and steps for detecting exceptions. Then stop, let you guess what went wrong, and finally give the answer.
Example
First, describe the two problems I encountered as a system administrator.
The startup process includes the following steps:
The initial step for starting a system is power on self test (post ). The purpose is to verify whether the basic hardware is working properly. Initialize the memory, keyboard, communication, and audio devices at the same time. All these devices are displayed on the screen. In this step, you can press the function key to select a different startup list. The LED values displayed in this phase are model-specific. Both hardware and software problem
--------------------------------------------------------------------------------------------------------------- --------64-bit AIX compiled under 32-bit program command: gcc-maix32 test.c-o test3264-bit AIX compiled under 64-bit program command: gcc-maix64 test.c-o Test6464-bit Linux compiles 32-bit. O Command: gcc-m32-c test.c64-bit Linux compiles 64-bit. O Command: gcc-m64-c test.c64-bit
Introduction
User management is an important part of the distributed computing environment. It provides common access to the required consistent authentication and authorization services. Many customers use IBM Directory server to achieve centralized security management, and IBM directory server is a centralized security mechanism supported by aix®. To make an effective configuration of IBM directory Server and prepare for use, you need to gain insig
1, the meaning of the process
The so-called process is a task in AIX, and a running program is a process.
2, child processes and parent processes
Processes and processes can have dependencies, a process can produce new processes, and the resulting processes are called child processes, and the original process is called the parent process.
3, view the process
PS: Process View command
You can view the UID (user ID) of the process in the PS command
Release date:Updated on:
Affected Systems:Ibm aix 7.1Ibm aix 6.1Ibm aix 5.3Description:--------------------------------------------------------------------------------Bugtraq id: 53393Cve id: CVE-2012-0745
AIX is an open standard UNIX operating system that provides you with an enterprise information technology infras
Special volume group rootvg
AIX also uses the logical volume management technology to manage its own code and configuration files. This special volume group is rootvg, which means that all AIX operating systems have a rootvg (except for diskless workstation, but there is also a virtual rootvg), that is to say, all AIX operating systems have a rootvg (except for d
Author: Piner (Reprinted with the source: ixdba.com)
Permanent Link:Http://www.ixdba.com/html/y2007/m06/118-aix-5l-etherchannel.html
In the AIX operating system, you can configure multiple etherchannels (NIC binding ). Before AIX 5.2, we can only select the active/active etherchannel mode or the active/standby etherchannel mode to bind the NIC. Therefore, the new
References:
Http://www.ibm.com/developerworks/cn/aix/library/au-aixuseradmin/
Http://blog.csdn.net/victor1220/article/details/5338331
The user (Group) management method in AIX is the same as that in rhel. It maintains several text files. Compared with commands and parameters, I prefer to modify files.Several files used
/Etc/passwd stores user information.
/Etc/security/passwd stores user password informatio
Article title: dual-boot for Linux and AIX. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Introduction
On the IBM eServer server that supports logical partitions, Linux and AIX should be run in different separate partitions. However, not all configurations support l
The default terminal in AIX is KSH, which is extremely difficult to use. To speed up the work efficiency, you can install the ZSH terminal. Lab environment: AIX 6.1/AIX 5.11. view the remaining directory size of the file to be uploaded
This step must be performed before all operations; otherwise, file uploading may fail! Run the df-tk (df-g) command to view the u
AIX under RAC Construction seriesAIX under RAC build oracle10g (vi) DBCA build LibraryEnvironment
Node
Node 1
Node 2
Small machine Model
IBM p-series 630
IBM p-series 630
Host Name
AIX203
AIX204
Switch
SAN Fibre switch
Store
SAN T3 Storage
The outline flow is as follows:First part: Host configurationFirst, the detection system
Release date:Updated on:
Affected Systems:Ibm aix 7.xIbm aix 6.xIbm aix 5.xIBM Virtual I/O Server (VIOS) 2.xDescription:--------------------------------------------------------------------------------Bugtraq id: 54706Cve id: CVE-2012-0723
AIX is an open standard UNIX operating system that provides you with an enterpris
After the AIX system is launched, errors will inevitably occur. to cope with the errors, aix provides many methods and logging mechanisms for troubleshooting and system convenience. Errdemon is a daemon of aix. this process checks the/dev/drror device file in real time to check whether there is a new internal file... after the
Environment first: AIX7.1OracleASM11.2.0.3 the size of flashdg in ASM needs to be increased to 35 GB in the current test environment ), diskgroup is created based on the lv divided in raw mode in vg. Since the test environment only notifies the AIX administrator, the AIX administrator increases the number of pp of fsflashdglv through smitlv.
First, let's explain the environment:
In the learning of AIX telnet, we have learned the basic information about this application. Here we will explain some of its specific functions and commands. First, let's take a look at the terminal negotiation from the console and use the EMULATE environment variable or the-e flag. If you need a 3270 simulation, call the tn3270 command. to determine whether terminal type negotiation is performed, the following list describes the order in which the
In some content of AIX telnet, we cannot ignore its command usage. This part is also very important. It directly affects its settings and applications. First, let's take a look at the terminal negotiation from the console and use the EMULATE environment variable or the-e flag. If you need a 3270 simulation, call the tn3270 command. to determine whether terminal type negotiation is performed, the following list describes the order in which the
Configure NFS on AIX. The steps and command code we need here have been summarized for you and hope to help you. Now let's take a look at the specific process of configuring aix nfs.
1. Prepare the AIX Server
After AIX5.3 is installed by default, stop nfs and portmap processes and delete NFS-related files.
#stopsrc-gnfs
0513-044ThebiodSubsystemwasrequeste
The following article describes the actual installation process of IBM DB2 for AIX. I saw the actual installation process of IBM DB2 for AIX on the relevant website two days ago, the following is a detailed description of the main content of the article.
AIX is installed on the IBM RS6000 operating system, and the HP9000 is the same
1. Register as a user with Sup
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.