Acknowledgments | p. xiii |
System Administration Tasks and Tools | |
Introduction | p. 3 |
AIX and UNIX | p. 4 |
New Features of AIX with Version 5L | p. 5 |
System Administration Activities | p. 11 |
Checklist | p. 14 |
DocSearch and the Online Manual Pages: Getting Help from the System | p. 15 |
AIX Help | p. 16 |
DocSearch Overview | p. 16 |
DocSearch Installation | p. 16 |
Using DocSearch | p. 24 |
Man Pages | p. 31 |
Checklist | p. 35 |
Systems and System Architecture | |
POWER Processors and Systems | p. 39 |
The History of the POWER Processor | p. 41 |
Code Name Regatta: the p690 | p. 46 |
pSeries Machines | p. 48 |
Compatibility | p. 49 |
Checklist | p. 50 |
AIX 5L Kernel | p. 51 |
Kernel Architecture | p. 52 |
More About the Kernel | p. 56 |
Checklist | p. 56 |
System Installation and Management | |
System Management Tools | p. 61 |
SMIT | p. 62 |
Using SMIT | p. 63 |
Web-Based System Manager | p. 71 |
Distributed Systems Management | p. 72 |
Checklist | p. 75 |
AIX Installation and Maintenance | p. 77 |
Installation and Maintenance Planning | p. 78 |
Installing AIX | p. 89 |
Installing Licensed Program Products (LPP) | p. 100 |
Installing Non-LPP Products | p. 103 |
Removing Installed Software | p. 103 |
Applying Maintenance Level (ML) Patches | p. 104 |
Post Installation and Maintenance Tasks | p. 107 |
Distributed System Installation | p. 109 |
Checklist | p. 114 |
AIX System Boot and Shutdown | p. 115 |
Booting the System | p. 116 |
Creating Bootable Media | p. 117 |
Boot Sequence of Events | p. 120 |
The AIX Boot Process | p. 121 |
Fast Boot on MP Machines with mpcfg Command Option | p. 125 |
Stopping the System | p. 126 |
Troubleshooting | p. 126 |
Itanium-Based System Boot | p. 127 |
Checklist | p. 128 |
System Configuration and Customization | |
AIX Runtime Configuration | p. 133 |
System Environments | p. 134 |
PTY | p. 145 |
Checklist | p. 147 |
AIX Device Configuration Manager (cfgmgr) and the Object Data Manager (ODM) | p. 149 |
ODM Overview | p. 150 |
ODM Components | p. 150 |
Device Configuration | p. 155 |
Predefined and Customized Devices | p. 155 |
Device States | p. 160 |
Boot Devices | p. 160 |
Small Computer System Interface | p. 161 |
Using smitty cfgmgr to AutoConfigure Your System | p. 164 |
Updating the Product Topology Diskette | p. 164 |
Checklist | p. 165 |
Tape Systems | p. 167 |
Tape Tools | p. 173 |
Linear Open Tape (LTO) Ultrium Tape Drives | p. 174 |
IBM 3494 Enterprise Tape Library | p. 175 |
Linux Tape Support | p. 176 |
Public Domain Tape Tools | p. 176 |
Checklist | p. 177 |
The AIX Logical Volume Manager (LVM) | p. 179 |
Disk Evolution | p. 180 |
Disks Are Doubling Every Six Months | p. 180 |
Disk Hardware | p. 180 |
Disk Installation | p. 184 |
Introducing the LVM | p. 191 |
Configuring Volume Groups | p. 198 |
Configuring Logical Volumes | p. 206 |
Filesystems (JFS and JFS2) | p. 213 |
Paging Space | p. 224 |
Volume Maintenance | p. 228 |
Troubleshooting | p. 230 |
Checklist | p. 231 |
Printers and the Print Subsystem | p. 233 |
Data Flow of a Print Job | p. 234 |
Configuring AIX Printers | p. 238 |
lpd Daemon | p. 243 |
Testing and Modifying Printer Configuration | p. 251 |
Managing AIX Printers | p. 251 |
Highly Available Print Queues | p. 255 |
ASCII Terminal Printers | p. 256 |
X Station Printers | p. 258 |
Configuring and Using the System V Printer Subsystem | p. 259 |
Checklist | p. 270 |
Network Configuration and Customization | |
TCP/IP | p. 275 |
TCP/IP Network Model | p. 276 |
Network Devices and Interfaces | p. 277 |
Addressing | p. 283 |
Network Routing | p. 287 |
Domain Name System | p. 289 |
TCP/IP Subsystems | p. 291 |
DHCP | p. 293 |
SLIP and PPP | p. 293 |
Planning | p. 299 |
TCP/IP Configuration | p. 299 |
Network Security | p. 305 |
TCP/IP Troubleshooting | p. 307 |
Checklist | p. 308 |
Networked Filesystems | |
Networked Filesystems: NFS, NIS, and NIS+ | p. 311 |
Network File System | p. 312 |
NFS Server | p. 314 |
NFS Clients | p. 316 |
Network Information Services: NIS and NIS+ | p. 320 |
Troubleshooting | p. 326 |
Highly Available Servers | p. 327 |
Checklist | p. 329 |
Distributed File System | p. 331 |
DFS Components | p. 336 |
Installation and Configuration | p. 338 |
Operation and Administration | p. 347 |
Starting DFS | p. 348 |
Access Control Lists | p. 349 |
Fileset Replication | p. 350 |
DFS Backup | p. 351 |
Checklist | p. 351 |
Linux Affinity | |
Linux Affinity with AIX | p. 355 |
Running Linux Applications on AIX 5L | p. 356 |
Strong Linux Affinity with AIX | p. 363 |
Checklist | p. 364 |
Distributed Services | |
Mail and Sendmail | p. 367 |
Sendmail Components | p. 369 |
Starting and Stopping Sendmail | p. 375 |
Mail Logs | p. 376 |
Configuration Examples | p. 376 |
Delivery Agents and Protocols | p. 380 |
Mail Clients | p. 382 |
Debugging | p. 383 |
Managing Mail Queues | p. 387 |
Checklist | p. 388 |
Apache Web Service | p. 389 |
Creating Web Content | p. 399 |
Web Browsers and Helper Applications | p. 405 |
Checklist | p. 405 |
X11 Administration | p. 407 |
Overview | p. 408 |
Components | p. 409 |
Management | p. 410 |
Start and Stop Display Managers | p. 419 |
The Desktop Environment | p. 421 |
Desktop Components | p. 421 |
Desktop Summary | p. 425 |
IBM X Station Administration | p. 425 |
Checklist | p. 429 |
Managing Users and Resources | |
Managing the User Environment | p. 433 |
Physical Resources | p. 434 |
UID Space and Groups | p. 435 |
Resource Limits | p. 437 |
User Account Access Rights | p. 442 |
User Account Environment | p. 442 |
Managing User Accounts | p. 448 |
Password Files | p. 454 |
Checklist | p. 457 |
Process Management | p. 459 |
Process Attributes | p. 460 |
Parent Child Inheritance | p. 465 |
Controlling Processes | p. 466 |
The /proc Filesystem | p. 468 |
Scheduled Processes (cron) | p. 472 |
System Resource Controller | p. 475 |
Checklist | p. 478 |
System Accounting | p. 479 |
Data Collection | p. 480 |
Accounting Configuration | p. 482 |
Accounting Commands | p. 486 |
Periodic Housecleaning | p. 490 |
Checklist | p. 491 |
Security | |
Auditing and Security | p. 495 |
Passwords | p. 497 |
Alternative Authentication Methods | p. 499 |
Controlling Superuser Access | p. 503 |
Securing Network Access | p. 504 |
Securing File Access | p. 504 |
Trusted Computing Base | p. 508 |
The Auditing Subsystem | p. 512 |
Additional Security Tools | p. 516 |
Sources of Information | p. 517 |
Checklist | p. 517 |
Distributed Computing Environment (DCE) | p. 519 |
DCE RPC | p. 520 |
AIX and DCE | p. 524 |
DCE Planning | p. 527 |
DCE Installation and Configuration | p. 529 |
DCE Implementation Considerations | p. 536 |
Driving DCE | p. 537 |
Checklist | p. 537 |
System Recovery and Tuning | |
Backup and Copy Utilities | p. 541 |
Backup Strategies | p. 544 |
Backing Up a Filesystem | p. 549 |
Creating a Bootable Operating System Image: mksysb | p. 549 |
Use savevg for Non-Root Volume Groups | p. 551 |
Tivoli Storage Manager (TSM) | p. 552 |
IBM's SysBack Utility | p. 553 |
Restoring Files and Filesystems | p. 553 |
Other Backup Utilities | p. 554 |
Network Backups | p. 555 |
Verifying the Backup Is Successful | p. 556 |
Making a Copy of a Tape | p. 556 |
What's on That Tape? | p. 556 |
Checklist | p. 557 |
System Monitoring and Tuning | p. 561 |
Know Your Workload | p. 562 |
AIX Operating System Characteristics | p. 562 |
AIX Tuning Tools | p. 568 |
AIX Monitoring Tools | p. 576 |
Checklist | p. 581 |
Problem Analysis and Recovery | p. 583 |
Backups and Bootable Media | p. 584 |
LED Status Information | p. 586 |
Checking the Service Processor Error Log | p. 588 |
What's in the System Error Report? | p. 589 |
System Memory Dumps | p. 591 |
System Logs | p. 592 |
AIX Kernel Structure | p. 593 |
crash Command Is Replaced by kdb in AIX 5L | p. 594 |
Hardware Diagnostics Using diag | p. 594 |
Calling for Help | p. 595 |
Operating System Fixes | p. 595 |
Checklist | p. 596 |
High Availability | |
HACMP and Clustering | p. 599 |
Overview | p. 600 |
Planning a Cluster | p. 601 |
How HACMP Works | p. 602 |
Creating a Cluster: Hardware Setup | p. 609 |
Tuning AIX for HACMP | p. 612 |
Creating a Cluster: Defining and Configuring Resources | p. 614 |
Synchronizing the Cluster | p. 614 |
Traditional IP Address Takeover and IPAT via IP Aliasing | p. 614 |
Choosing a Resource Group Policy | p. 616 |
HACMP Cluster Administration | p. 618 |
Troubleshooting | p. 622 |
Additional Features in HACMP | p. 624 |
Checklist | p. 628 |
Storage Area Networks and Network Attached Storage | |
SAN, NAS, and iSCSI Consolidated Storage | p. 631 |
Storage Consolidation | p. 632 |
Network Attached Storage (NAS) | p. 634 |
Storage Area Network (SAN) | p. 635 |
Zoning | p. 638 |
Enterprise Storage Server (ESS) a.k.a. the Shark | p. 640 |
Checklist | p. 667 |
Appendix | p. 669 |
Index | p. 671 |
Table of Contents provided by Syndetics. All Rights Reserved. |