Part 2nd: Build a Java based business application
Before you start
This tutorial is intended for aix®5.3 developers who want to quickly integrate PHP and java™ in their own web application development. Readers should have basic Java programming capabilities and an understanding of the basic web development environment.
About this series
PHP is a very good web development language, and Java technology is very popular in business application develop
The example in this chapter uses a 5GB 8-mm tape drive with a device file of/dev/rmt0.
First, backup
Backups can be implemented through the command line or the SMIT menu.
1, command Line Backup
AIX command Backup and restore are dedicated to backup and restore. These two commands complement the standard UNIX utilities tar, Cpio, DD, and Pax. Here are a few ways to back up the entire file system and individual files or directories separately.
(1)
Protecting the root user's security
The following sections describe how to disable the root user when running in Enhanced RBAC mode.
Choose to protect the root user's security
When the AIX system is running in enhanced RBAC mode, the system can be configured so that the root user does not have Superuser privileges and is disabled so that the root account loses logon rights.
Typically, in AIX, the root u
and the above port are put through. Turn off the firewall's masking of these ports.3. Configure ExportVim/etc/exports/home/bapogg 10.249.13.0/24 (Rw,no_root_squash,async)4. Start NFSServicenfs startServicerpcbind startServicenfs statusRPC.SVCGSSD isstoppedRpc.mountd (pid8451) is running ...NFSD (PID 84488447 8446 8445 8444 8443 8442 8441) is running ...Rpc.rquotad (pid8435) is running ...Servicerpcbind statusRpcbind (PID 1541) is running ...V. Viewing transmission performance over NFS 1. Manual
Smitty is a good tool for configuring various parameter commands in AIX. Smitty is an auxiliary operating tool running on AIX.
Smitty is a good tool for configuring various parameter commands in AIX. Smitty is an auxiliary operating tool running on AIX.
Linux and AIX ar
The following articles mainly describe how to correctly crack the DB2 license problem in the AIX environment and the actual operation steps. During the installation and use of the DB2 UD product, sometimes users may encounter problems related to the DB2 license. For example, SQL8008N.
Errors related to the absence of a valid license file or expiration date of the DB2 product are reported, resulting in the failure of the specified function .) To solve
Unix study--aix 6.1 Configuring the Network installation Service The network installation reduces the maintenance burden on administrators and allows the installation of AIX systems to be deployed in batches.First, configure the network installation server1) server-side configuration# Prtconf|moresystemmodel:ibm,9131-52amachineserialnumber:10367fgprocessortype: Powerpc_power5processorimplementationmode:powe
Article Title: Implement iSCSI on AIX. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Learn how to implement the Internet small computer system interface (iSCSI) on AIX ). This step-by-step process describes how to achieve iSCSI on an
The following is the configuration and monitoring of the SGA big page on the AIX platform. 1. The page size supported by aix. AIX supports four types of page sizes, however, not every hardware platform supports four types at the same time. You can use the following command to view
The following is the configuration and monitoring of the SGA big page on the
Preparations before installing the aix operating system in three ways of AIX the installation of the AIX5L operating system has certain requirements on the hardware environment. First, the server requires at least MB of memory and 2 GB of disk space. In addition, before installing the AIX5L operating system, make sure that the external device connection is correct...
Preparations before installing the
BUG3028673--ORACLEONAIXDOESNOTSHAREMANYCONSTSTRUCTS
BUG 3028673--oracle on aix does not share tables const structs-per process memory overhead: Oracle on ibm aix platfor
BUG 3028673 -- Oracle on aix does not share your const structs-PER PROCESS MEMORY OVERHEAD
Oracle on ibm aix platforms (
Adjust netstat in UNIX using common AIX commands and parameters to determine the network cache zone's urgent use, for example, the overflow information about queue in netstat. This information indicates the status of TCP and UDP queues. AIX provides the no command to set kernel configurations for the network. When www.2cto.com starts a process, VMM needs to allocate virtual memory space for the process to s
expanded; the logical volume can be mirrored; hard disks can be easily added to the system storage system; logical volumes can be relocated.
Physical storage:
Physical volume (physical volume PV): physical hard disk; physical partition (physical partition): minimum allocation unit of physical volume; volume group VG: a collection of related physical volumes.
A physical volume can be a built-in or external physical hard disk. Before using a physical volume, you must create a volume group on it o
. # SWAPON/DEV/SDB1 #启动新的swap分区
4. Allow the system to start automatically enable this swap partition, you can edit/etc/fstab, add the following line/DEV/SDB1 Swap Defaults 0 0
Second, use the file as swap partition
1. Create a file to be a swap partition: increase the 1GB size of the swap partition, the command is written as follows, where count equals the number of blocks (bs*count= file size) you want.# dd If=/dev/zero of=/root/swapfile bs=1m count=1024
2. Format to swap the partition file:#
Introduction: In this series of articles, we will introduce you and discuss with you the relevant content of role-based access control (role Based access controls). As a new security feature of AIX 6, RBAC provides users with fine-grained, more flexible security management methods. This article is excerpted from the IBM Red Book "AIX V6 Advanced security Features Introduction and Configuration."
There are different ways to create a tablespace in DB2 in different environments. The following describes how to create a tablespace in DB2 in an aix environment, we hope that you will have more knowledge about creating tablespaces in DB2.
db2setdb2codepage=819
db2createdatabaseeasyteston/home/db2inst1
db2connecttotest04userdb2inst1usingdb2
db2CREATEBufferpoolUSER8SIZE100000PAGESIZE8K
db2CREATEBufferpoolUSER16SIZE1000PAGESIZE16K
db2
This article describes several common commands for DB2 databases under AIX. DB2 is installed in the default/opt/IBM/db2/V9.5 directory and the instance is db2inst1. For your reference, I hope to enlighten you.
1. set-o viSimilar to the doskey command on AIX, the input command history is stored, and then you can press the Esc key and then press the k key.Forward. If you want to edit the command content, use
Install Oracle10G software on AIX
Installation preparation(1) confirm the system version and kernel version
#Oslevel-r// View the operating system version
//-08 can be installed on 10 Gb, and-09 can be installed on 11 GB
#Prtconf | more// Print hardware configuration information
System Model: IBM, 7028-6C4
Machine Serial Number: 10681AA
Processor Type: PowerPC_POWER4
Processor Implementation Mode: POWER 4 // P4 Machine
Processor Version: PV_4
Number O
Part 2: File System2006-4-281. Log File System StructureSuperblock: stores the file system size and ID, idle block linked list, And nbpi;Inode: file size, owner, permission, creation/access/modification timeData Block: stores data.Pointer of indirect block to data blockThe Aix log file system is stored on a logical volume. The logical volume is divided into 4 kb clusters, which is the smallest unit for space allocation in the file system. The first cl
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.