AIX System Administration - Part II

Level
Total time

AIX System Administration - Part II

Perpetual Solutions
Logo Perpetual Solutions
Provider rating: starstarstarstarstar 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.
  • View related products with starting dates: AIX.

Description

Prerequisites:

Delegate should have attended AIX Basics (AB), AIX Shell Programming (ASPR) and AIX System Administration - Part I (ASA1), or have similar knowledge.

Course Description:

System Administrators and Support Staff, who wish to perform advanced administration tasks, perform basic troubleshooting and improve security. Course Objectives are to be achieved by a mixture of command line syntax and use of the System Management Interface Tool (SMIT).

Although the course is based on AIX Version 6.1, it is also appropriate for prior releases of AIX.

The delegates will have knowledge and practise in:

  • P-SERIES and AIX Overview
  • The Object Data Manager
  • Resolving Boot Problems
  • System Initialisation

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: AIX, Power Systems, Electricity, Electronic Engineering, and Renewable Energy.

Prerequisites:

Delegate should have attended AIX Basics (AB), AIX Shell Programming (ASPR) and AIX System Administration - Part I (ASA1), or have similar knowledge.

Course Description:

System Administrators and Support Staff, who wish to perform advanced administration tasks, perform basic troubleshooting and improve security. Course Objectives are to be achieved by a mixture of command line syntax and use of the System Management Interface Tool (SMIT).

Although the course is based on AIX Version 6.1, it is also appropriate for prior releases of AIX.

The delegates will have knowledge and practise in:

  • P-SERIES and AIX Overview
  • The Object Data Manager
  • Resolving Boot Problems
  • System Initialisation
  • Boot Problems
  • Interpreting LED Codes
  • Disk Management Theory
  • Disk Management Procedures
  • Alternative Mirroring and Stripping with RAID
  • Disk Replacement Techniques
  • Backing up the System Using mksysb
  • Backup from a Split Mirror
  • Error Log and Diagnostics
  • Performance and Workload Management
  • Understanding the Workload and Bottlenecks
  • Advanced Security Features
  • Auditing
  • Access Control Lists
  • The Trusted Computer Database

This course includes the following modules:

Introduction to the RS6000 (P-Series)

  • Brief History
  • Family History
  • MCA and PCI Bus system Types
  • Symmetrical Multiprocessors
  • Scalable Power Parallel Systems

Object Data Manager

  • ODM Components and Commands
  • Object Classes
  • Descriptor Information
  • Objects
  • Searching The ODM
  • The ODM Database
  • Data Base File Names
  • ODM File Locations
  • cfgmgr And The ODM
  • The Predefined Database Files
  • Predefined Devices
  • Predefined Attributes
  • Customised Devices
  • Customised Attributes
  • ODM Class Usage
  • Additional Device Object Classes
  • Predefined Connection
  • Customised Dependency
  • Customised Device Driver
  • Customised Vital Product Data

System Initialisation

  • System Startup and The Boot Process
  • The Bootlist and BLV
  • The Boot Logical Volume
  • Repairing the BLV
  • Using Bootlists
  • Boot Problems
  • Service Processors
  • Accessing A System That Will Not Boot Normally
  • Accessing A Volume Group And Starting A Shell
  • Accessing A Volume Group Without Mounting Filesystems
  • The LED Display
  • Interpreting Flashing LED Codes
  • Location Codes
  • Understanding SCSI Addressing
  • Maintaining Firmware Levels
  • AIX Initialisation
  • The Three RC Boot Phases
  • More about the cfgmgr
  • Boot Problem Management

Disk Management

  • Local Volume Manager Review
  • AIX Disk Storage
  • Physical Volume and LVM
  • Volume Group Limits
  • Alternative Mirroring and Stripping with RAID
  • LVN Configuration Log
  • VGDA, VGSA and LVCB Control Blocks
  • LVM and the ODM
  • The rvgrecover Script
  • VGDA and Quorum
  • Forcing a varyon
  • Disk Replacement Techniques
  • Possible Errors After Disk Replacement
  • Exporting and Importing Volume Groups

Backing up Your System

  • Using mksysb
  • Creating a System Backup
  • mksysb Image Structure
  • Verifying a mksysb Tape
  • Preparing bosinst.data for Unattended Install
  • Cloning
  • Reducing a File System
  • Alternate Disk Installation
  • Installing a mksysb Image On Another Disk
  • Cloning the Running rootvg to Another Disk
  • Removing an Alternate Disk Installation
  • Backing up Non-Root Volume Groups
  • Using savevg
  • Backup from a Split Mirror

Problem Solving Tools

  • Error Log Facility
  • Error Log Input Components
  • Error Reporting from SMIT
  • The errpt Command
  • Sample Summary/Intermediate/Detailed Report Output
  • Interpreting LVM Error Log Entries
  • Error Log Maintenance
  • Error Notification Facility
  • Notification Methods
  • The syslogd Daemon
  • Diagnostics
  • The diag Command
  • Working with diag
  • AIX System Dumps

Performance and Workload Management

  • Addressing the Problem
  • Understanding The Workload And Bottlenecks
  • Identifying CPU Intensive Tasks
  • Identifying High Priority Processes
  • Monitoring CPU Usage with sar
  • Monitoring Memory Usage with vmstat
  • Monitoring Disk I/O Using iostat
  • The topas Command
  • The tprof Command
  • The svmon Command
  • The filemon Command
  • Workload Management
  • The Performance Diagnostic Tool (PDT)
  • PDT Configuration Menu
  • PDT File Overview
  • Monitoring Files, Directories and Host Availability

Advanced Security Features

  • The Auditing Subsystem
  • The Configuration Files
  • Using Bin Mode
  • Using Stream Mode
  • The Audit Command
  • Authentication and Access Controls
  • Physical Security
  • Path Problems
  • Encrypted Filesystems in AIX 6.1
  • Enhancing Login Security
  • Customised Authentication Methods
  • Two Key Authentication
  • Access Control Lists
  • ACL Keywords and Format
  • The Trusted Computer Base
  • The sysch.cfg File
  • The tcbck Command - Check Mode
  • Marking Files As Trusted
  • Trusted Communication Path
  • Configuring Trusted Path Communications

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

There are no reviews yet.
  • View related products with reviews: AIX.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.