AIX System Administration - Part II

Level:
Costs:
Total time:
Provider rating: 10Perpetual Solutions has an average rating of 10 (out of 1 reviews)
Logo Perpetual Solutions

Tip: Receive more information about the programme, starting dates & price. Or request a proposal from multiple providers for in-house training.

Overview

Your experience of this course?

Did you attend the course AIX System Administration - Part II at Perpetual Solutions? Help other people by submitting your review at Springest!

Springest will donate £1.- to the Edukans Foundation as a thank you for each review

 
Schedule:
Daytime
Run time:
5 days
Location type:
Open

vat information, completion, maximum participants, and starting dateplaces are unknown for this course.

Prerequisites:

Delegate should have attended AIX Basics (AB), AIX Shell Programming (ASPR) and AIX System Administration - Part I (ASA1), or have similar knowledge.

Course Description:

System Administrators and Support Staff, who wish to perform advanced administration tasks, perform basic troubleshooting and improve security. Course Objectives are to be achieved by a mixture of command line syntax and use of the System Management Interface Tool (SMIT).

Although the course is based on AIX Version 6.1, it is also appropriate for prior releases of AIX.

The delegates will have knowledge and practise in:

  • P-SERIES and AIX Overview
  • The Object Data Manager
  • Resolving Boot Problems
  • System Initialisation

Read the complete description

Description

Prerequisites:

Delegate should have attended AIX Basics (AB), AIX Shell Programming (ASPR) and AIX System Administration - Part I (ASA1), or have similar knowledge.

Course Description:

System Administrators and Support Staff, who wish to perform advanced administration tasks, perform basic troubleshooting and improve security. Course Objectives are to be achieved by a mixture of command line syntax and use of the System Management Interface Tool (SMIT).

Although the course is based on AIX Version 6.1, it is also appropriate for prior releases of AIX.

The delegates will have knowledge and practise in:

  • P-SERIES and AIX Overview
  • The Object Data Manager
  • Resolving Boot Problems
  • System Initialisation
  • Boot Problems
  • Interpreting LED Codes
  • Disk Management Theory
  • Disk Management Procedures
  • Alternative Mirroring and Stripping with RAID
  • Disk Replacement Techniques
  • Backing up the System Using mksysb
  • Backup from a Split Mirror
  • Error Log and Diagnostics
  • Performance and Workload Management
  • Understanding the Workload and Bottlenecks
  • Advanced Security Features
  • Auditing
  • Access Control Lists
  • The Trusted Computer Database

This course includes the following modules:

Introduction to the RS6000 (P-Series)

  • Brief History
  • Family History
  • MCA and PCI Bus system Types
  • Symmetrical Multiprocessors
  • Scalable Power Parallel Systems

Object Data Manager

  • ODM Components and Commands
  • Object Classes
  • Descriptor Information
  • Objects
  • Searching The ODM
  • The ODM Database
  • Data Base File Names
  • ODM File Locations
  • cfgmgr And The ODM
  • The Predefined Database Files
  • Predefined Devices
  • Predefined Attributes
  • Customised Devices
  • Customised Attributes
  • ODM Class Usage
  • Additional Device Object Classes
  • Predefined Connection
  • Customised Dependency
  • Customised Device Driver
  • Customised Vital Product Data

System Initialisation

  • System Startup and The Boot Process
  • The Bootlist and BLV
  • The Boot Logical Volume
  • Repairing the BLV
  • Using Bootlists
  • Boot Problems
  • Service Processors
  • Accessing A System That Will Not Boot Normally
  • Accessing A Volume Group And Starting A Shell
  • Accessing A Volume Group Without Mounting Filesystems
  • The LED Display
  • Interpreting Flashing LED Codes
  • Location Codes
  • Understanding SCSI Addressing
  • Maintaining Firmware Levels
  • AIX Initialisation
  • The Three RC Boot Phases
  • More about the cfgmgr
  • Boot Problem Management

Disk Management

  • Local Volume Manager Review
  • AIX Disk Storage
  • Physical Volume and LVM
  • Volume Group Limits
  • Alternative Mirroring and Stripping with RAID
  • LVN Configuration Log
  • VGDA, VGSA and LVCB Control Blocks
  • LVM and the ODM
  • The rvgrecover Script
  • VGDA and Quorum
  • Forcing a varyon
  • Disk Replacement Techniques
  • Possible Errors After Disk Replacement
  • Exporting and Importing Volume Groups

Backing up Your System

  • Using mksysb
  • Creating a System Backup
  • mksysb Image Structure
  • Verifying a mksysb Tape
  • Preparing bosinst.data for Unattended Install
  • Cloning
  • Reducing a File System
  • Alternate Disk Installation
  • Installing a mksysb Image On Another Disk
  • Cloning the Running rootvg to Another Disk
  • Removing an Alternate Disk Installation
  • Backing up Non-Root Volume Groups
  • Using savevg
  • Backup from a Split Mirror

Problem Solving Tools

  • Error Log Facility
  • Error Log Input Components
  • Error Reporting from SMIT
  • The errpt Command
  • Sample Summary/Intermediate/Detailed Report Output
  • Interpreting LVM Error Log Entries
  • Error Log Maintenance
  • Error Notification Facility
  • Notification Methods
  • The syslogd Daemon
  • Diagnostics
  • The diag Command
  • Working with diag
  • AIX System Dumps

Performance and Workload Management

  • Addressing the Problem
  • Understanding The Workload And Bottlenecks
  • Identifying CPU Intensive Tasks
  • Identifying High Priority Processes
  • Monitoring CPU Usage with sar
  • Monitoring Memory Usage with vmstat
  • Monitoring Disk I/O Using iostat
  • The topas Command
  • The tprof Command
  • The svmon Command
  • The filemon Command
  • Workload Management
  • The Performance Diagnostic Tool (PDT)
  • PDT Configuration Menu
  • PDT File Overview
  • Monitoring Files, Directories and Host Availability

Advanced Security Features

  • The Auditing Subsystem
  • The Configuration Files
  • Using Bin Mode
  • Using Stream Mode
  • The Audit Command
  • Authentication and Access Controls
  • Physical Security
  • Path Problems
  • Encrypted Filesystems in AIX 6.1
  • Enhancing Login Security
  • Customised Authentication Methods
  • Two Key Authentication
  • Access Control Lists
  • ACL Keywords and Format
  • The Trusted Computer Base
  • The sysch.cfg File
  • The tcbck Command - Check Mode
  • Marking Files As Trusted
  • Trusted Communication Path
  • Configuring Trusted Path Communications

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

Reviews

There are no reviews yet. Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

More courses within this subject:

Compare 37,379 training courses in subjects like AIX

Sign up to create your own Learning Lists.

Not for humans