AIX Training-D1P1
AIX Training-D1P1
Objectives
Overview on Power System Hardware
About LPAR & its administration
OS Installation
Disk Administration & AIX Storage
OS Mirroring & Cloning
User Administration
Networking (Bonding/Routes)
Booting Procedure
OS Health Checking
Performance troubleshooting
Patching Procedure
Mksysb backup
HACMP Cluster Basics
Overview on NIMS Servers
VIO Concepts
2
Power Hardware Variant
3
IBM Power LINUX SERVERS includes 7R1,
7R2.Servers are designed to go head-to-head
with x86 server on cost delivering greater
performance, higher utilization and superior
availability.
4
IBM Power Based on RISC Technology
5
Power System Hardware Architecture
6
About LPAR & Its Administration
LPAR 1 LPAR 2
7
The number of logical partitions that can be created depends on the system's processor
model and resources available.
LPARs can have resources allocated based on the needs of the workload rather than the
amount contained in a physical building block.
On the IBM System p server implementation of LPARs, you can dynamically add and
remove resources (CPUs, memory, and I/O slots) to and from a partition while the
operating system is running.
8
Partition configuration and control Dynamic partitioning for LPARs
Capacity Upgrade on Demand Diagnostics
Operational management Remote HMC control
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Login Prompt
30
Important Commands
31
#smitty
32
#smit
33
User Administration
Each user has a unique name, numeric ID, and password
• File ownership is determined by a numeric user ID
• The owner is usually the user who created the file, but
ownership can be transferred by root
• Default users:
– root Superuser
– adm, sys, bin, ... IDs that own system files but cannot be used for login
File ownership
When a file is created, the UID associated with the process that created the file is assigned
ownership of the file. Only the owner or root can change the access permissions.
34
Group
A group is a set of users, all of whom need access to a given set of files.
Every user is a member of at least one group and can be a member of several groups.
Default groups:
– System administrators: system
– Ordinary users: staff
Group hierarchy
35
User hierarchy
To protect important users and groups from members of the security group, AIX has
admin users and admin groups
Only root can add, remove, or change an admin user or admin group
Any user on the system can be defined as an admin user regardless of the group they
are in
36
File/Directory Permission
Modify
#usermod [option..] username
Delete
#userdel username (don’t use –r option without home directory back to checks)
User login
#users (current user login info)
#id (current user login info with details)
#finger (login users information with more information)
37
Group
Create
#mkgroup <groupname>
Delete Group
#rmgroup <groupname>
Important Commands
#lsuser –f <username>
#lsuser –f ALL
#lsgroup –f <username>
#lsgroup –f ALL
#chown <owner:groupower> filename/Directory
#chown -R <owner:groupower> filename/Directory
#chmod <perm> filename/Directory
#chmod –R <perm> filename/Directory
#last
#passwd
38
File updated
The useradd command has read and write permissions to the following files.
/etc/passwd
Contains the basic attributes of users.
/etc/security/user
Contains the extended attributes of users.
/etc/security/user.roles
Contains the administrative role attributes of users.
/etc/security/limits
Defines resource quotas and limits for each user.
/etc/security/environ
Contains the environment attributes of users.
/etc/security/audit/config
Contains audit configuration information.
/etc/security/lastlog
Contains the last login attributes of users.
/etc/group
Contains the basic attributes of groups.
/etc/security/group
Contains the extended attributes of groups.
39