Application maintenance is a meticulous task. In addition to requiring the technical staff to be rigorous and responsible, technical personnel are also required to have high processing capabilities and work experience in various emergencies. With the establishment of ICBC's two big data centers, ICBC's core business data is concentrated in the data center, the primary branches focus on the maintenance of peripheral systems, such as the business system, the Integrated front-end system, and the hi
Recently encountered a project, is to install Oracle 9i RAC on AIX5.3, to tell the truth, Oracle I have no contact, I am also stepped. Feel like the XSM project that implemented AS400. Helpless, download the N-Redbook began to study, and finally got some clues, found an English information "Step-by-Step installation of RAC on IBM AIX (rs/6000) After looking very good, spare time to translate and modify some places, Sent here to share with you.
Three
AIX is a UNIX system developed by IBM and is a dedicated operating system on IBM's RISC system/6000 computer. The industry has been rated as the best commercial UNIX system for many times. AIX is the abbreviation for Advanced Interactive EXecutive.
1. Development history of UNIX and AIX
The first UNIX operating system developed in Bell Labs in the late 60
The
There are four kinds of situations to discuss:1. Allow anyone (including those who do not have a system account at all) to reboot through the consoleKeep Ca::ctrlaltdel:/sbin/shutdown-t3-r now in the/etc/inittab fileThis line. So the whole nation can reboot your machine, as long as you hand over the console.2. Allow all system users to rebootExecute # >/etc/security/console.apps/
:
Redefine the volume group and then varyon.
#Redefinevg-D hdisk0-I 0066657d3164c00001_dc65c5cbc6 rootvg
#Varyonvg-B rootvg
Perform the following three steps to solve the problem.
Finally, you may need to execute the synchronized volume group command. After completing the above operations, there is a problem with adding the additional language environment: 0506-907 cannot get volume group partition size
Synclvodm-v-F rootvg
--------------------------------------
Windchill on AIX heapdump and Javacore issues
Windchill system, the main reason for dump and javacore is memory overflow, in general, Methodserver and Tomcat memory settings on the small, many concurrent users will cause memory overflow, this situation as long as the configuration can be modified , and the server configuration has reached the bottleneck, only upgrade the server's hardware configuration, it is recommended that the configuration is 1 C
In the settings of aix telnet. We usually do not explain and configure it separately. Therefore, the use of the AIX system requires a lot of configuration content. Let's take a look at it. Learn how to use Kerberos Authentication tickets in daily network services on ibm aix V6 and how Kerberos helps avoid the trouble of using passwords when logging on to the netw
Linux shutdown, reboot, halt, init, and haltinit
Command Overview
Shutdown, poweroff, reboot, halt, and init can all be shut down for general usage.
/Sbin/halt [-n] [-w] [-d] [-f] [-I] [-p] [-h]/Sbin/reboot [-n] [-w] [-d] [-f] [-I]/Sbin/poweroff [-n] [-w] [-d] [-f] [-I] [-h]
[Root @ linux ~] $ Reboot -- hUsage:
One time reboot=975 years
Do a little research before you start this article: How many friends like reboot. Answer a: I like, every day to reboot n times. Answer B: I don't like it, it's best not to reboot for one weeks. If there is no accident, I believe most people can be grouped into the B category, after all, very
Overview
The purpose of this article is to provide a step-by-step guide to installing and configuring a simple dual-node GPFS cluster on AIX. The following figure provides a visual representation of the cluster configuration.
Figure 1. Visual representation of cluster configuration
Gpfs
GPFS provides a true "shared file system" feature with exceptional performance and scalability. GPFS allows a group of computers to access a set of common file d
In the AIX environment, due to maintenance misoperation, storage mapping error, and so on accidentally deleted LV mistakenly, this loss is usually huge. Improper protection and recovery operations after deletion may cause data to be unrecoverable or increase processing time and algorithmic complexity. How to effectively protect the site and choose the right data recovery program is very important.
AIX's storage layer has too many articles to describe
Some common shutdown/restart commands under Linux.
1.shutdown
The shutdown command shuts down the system securely.It is very dangerous for some users to turn off Linux by simply breaking the power off. Because Linux differs from windows in that it runs many processes in the background, forcing a shutdown can cause data loss in the process, leaving the system in an unstable state, or even damaging hardware devices in some systems. Using the shutdown command before the system shuts down, the syste
Linux also has its own restart command, which is very simple to use. Generally, you only need to enter reboot in SSH to restart. When you control (VPS) servers, you do not need to enter the backpane of the server. you only need to open SSH and enter the preceding commands. Reboot [Syntax] reboot [option] [detailed description] the
program, requiring it to change the runlevel. Runlevel 0 is used to stop (halt),runlevel 6 is used to reactivate the (reboot) system, and Runlevel 1 is used to get the system into the state of the management work can be done, this is a preset, assuming that there is no-H and no-R parameter to shutdown. To find out what you did during the (halt) or reboot (reboot
One, logout, shutdown, restart
Unregister the system's logout command
1,logout Logout is the relative operation of landing, after the landing system, to leave the system, the user simply issued the Logout command can be:
[Root@localhost Root] #logout
Red Hat linuxrelease 9 (shike)
Kernel 2.4.20.8 on a i686
Login:← back to the landing screen
2, shutdown or reboot of the shutdown command
The shutdown command shuts down all programs and restarts
First, the software aspect
1, virus
The "Shockwave" virus also prompts the system to start automatically after 60 seconds.
Trojan programs remotely control all your computer's activities, including getting your computer restarted.
Remove viruses, trojans, or reload systems.
2, System file damage
System files are corrupted, such as the Win2K under the Kernel32.dll,win98 fonts directory of the system runtime basic files are corrupted, the system will not complete initialization at start
InitFirst look at several operating levels of Linux systems# 0-Stop (do not set the Initdefault to 0, or the system will never start)# 1-Single user mode# 2-Multiuser, no NFS# 3-Full multi-user mode (standard run level)# 4– system Reserved# 5-x11 (x Window)# 6-Reboot (never set Initdefault to 6, otherwise it will be restarted)#init 0 Switch to run level 0The action is to run the following two scripts:[[email protected] RC0.D] # pwd/etc/rc.d/rc0.d[[ema
Which version of AIX is being used? Provide detailed information when you need help!
As a UNIX development, maintainer, of course, know the specific version of the current login system. So when you need to communicate with other technicians, share your fun, and ask for help, you can get them to understand the basics of your system as quickly as possible. Since the 2006, AIX versioning has been more comprehe
The previous Cloudman analyzed the Nova launch, shut off and start operations in detail through the log.I wonder if you have mastered the skills of log analysis now?Let's check it out today.This section discusses the relatively simple operation of Nova: Reboot and Lock/unlock.I will first explain the theoretical knowledge of these operations, and then leave the log analysis for everyone to complete.Everyone in the analysis process, if you have any que
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.