Generating audit security snapshots for your system will enable the system administrator to implement effective security control, so as to ensure proper management of the security of your AIX server. It also shows the standard security policies currently used. Before learning about what should be included in monthly security reports and audit reports, let's take a look at how to present them. Although only one security report is discussed here, rememb
This article describes how to adjust the performance of Oracle 9i on AIX, we all know that memory access conflicts occur when the actual applied memory of a process exceeds the total physical memory of the system, the system exchanges programs and data between memory and hard disk.
Control Memory switching (Paging)
A large number of memory swap operations will greatly affect the performance of the system's Oracle 9i on
AIX Boot Process
Different AIX boot Modes
Disable Aix
Scheduled tasks of Aix
AIX Service Management
Common AIX logs
Post = power on Self Test
Three RC. Boot calls
/Etc/inittab script call
RespawnIndicates that if the process
1. process description
In AIX, a process is a task, and a running program is a process.
2. child and parent Processes
A process can be dependent on a process. A process can generate a new process. The generated process is called a child process, and the original process is called a parent process.
3. View Processes
Ps: process view command
In the ps command, you can view the UID user ID of the process, PID process ID), PPID parent process ID), Ccpu
In this article, learn how to solve ibm aix in a similar way®. You will be familiar with related tools and knowledge, so as to improve the skills to solve some difficult problems that may occur. This article provides two interesting scenarios that I have encountered and steps for detecting exceptions. Then stop, let you guess what went wrong, and finally give the answer.
Example
First, describe the two problems I encountered as a system administrator.
The startup process includes the following steps:
The initial step for starting a system is power on self test (post ). The purpose is to verify whether the basic hardware is working properly. Initialize the memory, keyboard, communication, and audio devices at the same time. All these devices are displayed on the screen. In this step, you can press the function key to select a different startup list. The LED values displayed in this phase are model-specific. Both hardware and software problem
--------------------------------------------------------------------------------------------------------------- --------64-bit AIX compiled under 32-bit program command: gcc-maix32 test.c-o test3264-bit AIX compiled under 64-bit program command: gcc-maix64 test.c-o Test6464-bit Linux compiles 32-bit. O Command: gcc-m32-c test.c64-bit Linux compiles 64-bit. O Command: gcc-m64-c test.c64-bit
Introduction
User management is an important part of the distributed computing environment. It provides common access to the required consistent authentication and authorization services. Many customers use IBM Directory server to achieve centralized security management, and IBM directory server is a centralized security mechanism supported by aix®. To make an effective configuration of IBM directory Server and prepare for use, you need to gain insig
1, the meaning of the process
The so-called process is a task in AIX, and a running program is a process.
2, child processes and parent processes
Processes and processes can have dependencies, a process can produce new processes, and the resulting processes are called child processes, and the original process is called the parent process.
3, view the process
PS: Process View command
You can view the UID (user ID) of the process in the PS command
Release date:Updated on:
Affected Systems:Ibm aix 7.xIbm aix 6.xIbm aix 5.xIBM Virtual I/O Server (VIOS) 2.xDescription:--------------------------------------------------------------------------------Bugtraq id: 54706Cve id: CVE-2012-0723
AIX is an open standard UNIX operating system that provides you with an enterpris
After the AIX system is launched, errors will inevitably occur. to cope with the errors, aix provides many methods and logging mechanisms for troubleshooting and system convenience. Errdemon is a daemon of aix. this process checks the/dev/drror device file in real time to check whether there is a new internal file... after the
Environment first: AIX7.1OracleASM11.2.0.3 the size of flashdg in ASM needs to be increased to 35 GB in the current test environment ), diskgroup is created based on the lv divided in raw mode in vg. Since the test environment only notifies the AIX administrator, the AIX administrator increases the number of pp of fsflashdglv through smitlv.
First, let's explain the environment:
In the learning of AIX telnet, we have learned the basic information about this application. Here we will explain some of its specific functions and commands. First, let's take a look at the terminal negotiation from the console and use the EMULATE environment variable or the-e flag. If you need a 3270 simulation, call the tn3270 command. to determine whether terminal type negotiation is performed, the following list describes the order in which the
In some content of AIX telnet, we cannot ignore its command usage. This part is also very important. It directly affects its settings and applications. First, let's take a look at the terminal negotiation from the console and use the EMULATE environment variable or the-e flag. If you need a 3270 simulation, call the tn3270 command. to determine whether terminal type negotiation is performed, the following list describes the order in which the
Configure NFS on AIX. The steps and command code we need here have been summarized for you and hope to help you. Now let's take a look at the specific process of configuring aix nfs.
1. Prepare the AIX Server
After AIX5.3 is installed by default, stop nfs and portmap processes and delete NFS-related files.
#stopsrc-gnfs
0513-044ThebiodSubsystemwasrequeste
The following article describes the actual installation process of IBM DB2 for AIX. I saw the actual installation process of IBM DB2 for AIX on the relevant website two days ago, the following is a detailed description of the main content of the article.
AIX is installed on the IBM RS6000 operating system, and the HP9000 is the same
1. Register as a user with Sup
Http://blog.chinaunix.net/u/21218/showart_1165341.html
1. Check the AIX system status1. File System: df-k2. device: lsdev-C3. Disk (physical volume): lspv4. paging space: lsps-5. Configuration: lscfg-vp6. Software: lslpp-l7. User: who8. Number of processors: lsdev-C | grep proc9. Memory size: lsattr-El mem0Ii. Shutdown1. shutdownUse the wall command to remind users to shut down after several times;2. shutdown + 2Shut down in 2 minutes3. shutdown-Fr-R
Establish RAC in AIX (1) detection system environment, aixrac
Establish a series of RAC instances under AIX
Environment
Node
Node 1
Node 2
Small Machine Model
IBM p-series 630
IBM p-series 630
Host Name
AIX203
AIX204
Vswitch
SAN optical fiber switch
Storage
SAN T3 Storage
Topology
Construction method:
Method 1
Meth
Introduction
This article provides you with a complete description of how to download, install, and configure Java for AIX. Read through this article and follow the instructions provided in the article, which will save you a lot of time and can save you a lot of trouble when you contact the Support Center for help. When contacting the Support Center, the support staff will ask you to verify the execution of each step of the following steps, so comple
The following describes how to import and export DB2 data to and from the LINUX system. If you are interested in importing DB2 data, take a look.
1) operations on the AIX system:
1) First, run the db2look command to obtain the DDL script of the database object:Db2look-d SAMPLE-z DB2INST1-e-o sample. ddl-I db2inst1-w db2inst1
2) use the text editor to edit the generated sample. ddl: Creates table and index script statements, foreign key constraint stat
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.