This blog is a common Unix Blog

Thursday 28 April 2011

AIX Installation

Snap shots for AIX installation.

Steps to be followed to install AIX on a IBM AIX RS/6000 box.


AIX INSTALLATION PICTURES

AIX installation in pictures
(plus explanatory text)

Boot

Installation starts with booting from media. In this case, from the AIX 7.1 DVD media.
Select Install Screen
First we have to tell AIX which screen we are installing from. AIX sends a message to each screen -
whether it is a tty or lft (low function graphic terminal) with a number. Press that number followed by
the Enter key. The other displays clear and AIX continues with the selected screen.
Install Language

The first choice you need to make is language. English is pre-selected so just press enter.






Welcome to AIX

Although you could go through life accepting defaults, I prefer option 2 when installing AIX.
Installation Settings

Use option 1 to ensure it is a New & Overwrite install - let's be fresh!
Then use option 2 to select your language of choice. I prefer using the USA English.
Set Primary Languge

After you select option 2 note that the default choice is the next screen. Continue scrolling and enter your language number.
The screen after that is the keyboard selection. I always choose the "smaller" keyboard - option 1.


 

 

 

 

 

 

 

 

Security


For an initial install the defaults are probably fine, but let's take a peek. 
Option 3 please.

Security Models


Do not start with Trusted AIX. That is an advanced topic we shall cover on another day. Since we are
looking at options - Option 2 please.

Standard Security Options



Defaults are all No - and we shall leave them at No.
Option 1. "Secure by Default" installs less of AIX than usual - being more secure than installing everything. Also, "Secure by Default" calls AIX Security Expert during the
first boot to do some automatic system hardening.
Option 2. "CAPP and EAL4+ Configuration Install" - Controlled Access Protection Profile and
European Audit Level 4 with some additions. This used to be known as C2 (from Orange Book days) Security.
http://www.commoncriteriaportal.org/files/ppfiles/capp.pdf
http://publib.boulder.ibm.com/infocenter/aix/v6r1/topic/com.ibm.aix.security/doc/security/capp_eal4plus.htm
http://en.wikipedia.org/wiki/Evaluation_Assurance_Level
Option 3. Trusted Computing Base Install. This is the old TCB install. Great in it's day - we do not want it now.
Instead, for AIX 6 and AIX 7 we will use the default TE, Trusted Execution. Note: if you are installing AIX4 or AIX5
the steps are nearly identical - the options for step 3 are different. I used to recommend installing TCB for AIX4
and AIX5 - but that prevents a clean migration from AIX5 to AIX6 and higher (neither TE nor efs (encrypted
file systems) will install. I have also had problems with the new pconsole on migrations from AIX 5.2 and AIX 5.3.
For AIX6 and higher I highly recommend a "New and Overwrite" install - see above please.
Use option 0 now (Continue to more software options)

 

 

 

 

 

 

 

 

 

Install Options



Normally you will leave all these options at yes.
Option 1. Graphics Software. X11 applications can run in client mode. This does not, by default, enable an
X11 server. Unless security policy specifically prohibits it, leave this option at yes.
Option 2. System Management Client Software. Highly recommended to leave this at yes for ease of remote
management of this system.
Option 3. AIX6 and higher is 64-bit kernel. JFS2 is optimized for an 64 bit-kernel. The is really no reason
not to use JFS2. Leave this at yes. You will need to reinstall AIX to get it into JFS2 if you do not.
Option 4. Enable System Backups to install to any system. This is an aid to system cloning. Leaving it to yes means
AIX installs many more filesets (nearly 500) and the install time takes longer. Sooner or later
all the filesets will be installed. Why, how and/or when you ask? When you update AIX to a (new) technology level
one of the side-effects is that all device drivers get installed. This is to prevent a mixture of device
drivers coming from different TL and or service-pack combinations. The recommendation is to leave it at yes.
Press Enter please (option 5 pre-selected)

Install More Software



These options are all no by default.
Option 1: Firefox. If you want to work with Firefox on AIX change this to yes. The install process will prompt
you for the correct DVDs at the appropriate time to install Firefox. You can also do this later
using the smitty easy_install option to install the Firefox bundle.
Option 2: Not many people need Kerberos. If you do - switch to yes and the installation procedure prompts you
at the correct moment for the expansion DVD. What expansion DVD you ask? Then leave this at no. Again,
smitty easy_install will install the kerberos bundle later.
Option 3: Server. Back in the CDROM days you would install extra software from the second CDROM. It all fits
on one DVD now so you want get prompted for Volume 2 anymore. Why this option then? Think of it as the
opposite of "Secure by Default". This options installs the optional server filesets.

Take note: the next default action is to start installation. Press Enter!

 

Installation Summary



IBM would not be IBM (I guess) if it did not provide a summary screen (rather than a simple "Are you sure Y/N".
This screen summarizes what you have chosen. Default (option 1) is to really start installation, but you can
go back to the main installation menu (option 99) and make any changes you desire.

Installing Base Operating System



Once you see a screen like this, AIX installation has really started. A lot of information will scroll over the screen, but basically, you are done. Installing AIX from a DVD takes from 30 to 60 minutes - depending largely on the speed of the disks being written to. But then I test on systems that are 5+ years old. When I am on new hardware (at customers) installs take about 20 minutes.
When the installation is finished AIX reboots and configuration begins - but that is another story!

Tuesday 26 April 2011

AIX Basics- Prerequesite





AIX short for Advanced Interactive eXecutive was first entered into the market by IBM in February 1990. AIX is an implementation of Unix derived from both AT&T Unix System V and 4.3 BSD. AIX offers the Korn (ksh) shell, Bourne (sh) and C (csh) shells however defaults to the Korn shell. AIX primarily designed for medium to large scale servers and mainframes. However, it can also be used in workstations. It supports standard peripherals like Supports standard peripherals: PCI Slots, SCSI, PS/2 keyboard and mouse, Ethernet.

The AIX system is functionally organized at three levels:
- The kernel, which schedules tasks and manages storage;
- The shell, which connects and interprets users' commands, calls programs from memory, and executes them; and
- The tools and applications that offer additional functionality to the operating system.

The heart of the operating system, the kernel controls the hardware and turns part of the system on and off at the programmer’s command. If you ask the computer to list (ls) all the files in a directory, the kernel tells the computer to read all the files in that directory from the disk and display them on your screen. The kernel itself does not interact directly with the user, but rather interacts with the shell and other programs as well as with the hardware devices on the system, including the processor (also called the central processing unit or CPU), memory and disk drives. The kernel is the first part of the operating system to load into memory during booting (i.e., system startup), and it remains there for the entire duration of the computer session because its services are required continuously. Thus it is important for it to be as small as possible while still providing all the essential services needed by the other parts of the operating system and by the various application programs.
When a computer crashes, it actually means the kernel has crashed. If only a single program has crashed but the rest of the system remains in operation, then the kernel itself has not crashed. The kernel provides basic services for all other parts of the operating system, typically including memory management, process management, file management and I/O (input/output) management (i.e., accessing the peripheral devices). These services are requested by other parts of the operating system or by application programs through a specified set of program interfaces referred to as system calls.

LVM is a disk management mechanism that is significantly different from traditional UNIX partitioning schemes. The LVM maps data between logical and physical storage, allowing data to be discontiguous, span multiple disks, flexible and dynamically expanded. One advantage is the ability to allocate additional space to a file system without the need to rebuild the disk. The LVM controls physical disk resources by providing a simplified logical view of the available storage space.

The logical storage structure that is the most common is called the volume group (VG). In AIX, storage allocation is performed at the volume group level. Data cannot span volume groups. When the AIX operating system is first installed, a volume group called rootvg is created. The rootvg contains the base operating system files for AIX.
Each individual disk drive is logically represented by a physical volume (PV). Each physical volume consists of a number of partitions called physical partitions (PP). The physical partitions are grouped into something called a logical volume that contains logical partitions. The logical volume, in turn, belongs to a volume group. Logical volumes contain the file systems (like the Journaling File System or JFS).
All of the logical volumes use JFS to store data. This file system uses database journaling techniques to maintain its structural consistency. This prevents damage to the file system when the system is halted abnormally. Other file systems that you might encounter on AIX may include JFS2, NFS (Network File System), and AFS (Andrew File System). The term file system is also used to describe the hierarchical structure (file tree) of files and directories.

The shell is a command interpreter that allows an end user to type in commands to communicate to the AIX system. By default, when a user logins, a shell process is started. The default AIX shell is /usr/bin/ksh, which is the Korn Shell, unless and until specified while creating a user. Other available shells are:
- /bin/bsh the Bourne shell
- /bin/csh the C-shell
- /bin/sh the Standard shell

Using the System
After bootup, the RS/6000 displays a login prompt on what looks like a character-based terminal, where you can enter your username and password to get into the system. Logging in to the RS/6000 follows the typical UNIX login process: The getty process provides the login screen. If a user enters an id at this getty login prompt, getty starts the login process to validate the user. AIX's login program checks not only /etc/passwd, which contains user names, but also a shadow password file, /etc/security/passwd, which contains the encrypted passwords of each of the users. login then starts a login shell as defined in /etc/passwd for the user, which by default is the KornShell (ksh). [4] ksh then reads the user's .profile.
If you are in an X Window session, stopping it by choosing End Session on the Root Menu will usually log you out. However, if your system displays an ASCII screen with a command line prompt (usually a "$" prompt) after you stop X, then you have to take the additional step of closing the shell by typing either the exit command or the logout commands.

The ‘date’ command displays or set the date or time for a particular system. If the command is run without any flag, it displays the current date and time to standard output.
The ‘cal’ command displays a calendar of the specified year or month.
The ‘who’ command displays information about all users currently on the local system. The information displayed when running the command is login name, tty, date and time of login. Typing who am i or who am I displays your login name, tty, date and time you logged in. If the user is logged in from a remote machine, then the host name of that machine is displayed as well.
The ‘finger’ command displays information about the users currently logged in to a host.

You can use the ‘mail’ program to create, send, reply, and forward messages to other users or to send ASCII files to other users. An ASCII file may, for example, be a document you have written using a preferred editor or a source file for a program. The mail program provides a line-oriented editor for creating messages. This editor enables you to enter each line of the message, press the Enter key to get a new line, and enter more text. When you create mail with the mail editor, the date: and from: fields are automatically completed by the system. You have the option to complete the subject: and cc: fields. These fields are similar to the body of a standard business letter. Other editors can only be used by using the editor subcommands. You can send messages and files to a user on your local system, on your network, or to a user on another connected network. The recipient does not need to be logged onto the system when you send the information. Mail is sent to a user's address. The address, containing the login name and system name, directs the delivery of the mail message.

The ‘write’ command opens a line of communication to send messages to other users on the system in real time.
The ‘wall’ command writes a message to all users that are logged in.

The ‘talk’ command is used to converse with another user. It allows two users on the same host or on different hosts to have an interactive conversation.

The ‘clear’ command clears the terminal screen.
The ‘echo’ command writes character strings to standard output.
The ‘banner’ command writes ASCII character strings in large letters to standard output.

The ‘wc’ command counts the number of lines, words, bytes, or characters in a file.

Files and directories
A file is a collection of letters, numbers and special characters: it may be a program, a database, a dissertation, a reading list, a simple letter etc. Sometimes you may import a file from elsewhere, for example from another computer. If you want to enter your own text or data, you will start by creating a file.
In AIX, each file system contains a superblock, inodes, and data blocks. Each file has an inode containing information such as file size and time of last modification. The inodes of small files also contain the addresses of all disk blocks that comprise the file data. A large file can use too many data blocks for an inode to directly address. In such a case, the inode points instead to one or more levels of indirect blocks that are deep enough to hold all of the data block addresses.
A file system is a hierarchical structure (file tree) of files and directories. This type of structure resembles an inverted tree with the roots at the top and the branches at the bottom. This file tree uses directories to organize data and programs into groups, allowing the management of many directories and files at one time. The basic type of file system is called the Journaled File System (JFS). This file system uses database journaling techniques to maintain its structural consistency. This prevents damage to the file system when the system is halted abnormally.
In order to know which directory you are currently located in, you can run the command ‘pwd’ and it will display the full path where you are residing. The ‘pwd’ is the acronym for Present Working Directory.
The command used to change a directory from the existing one is ‘cd’. It sets the current working directory of a process.
The directories can be created using the command ‘mkdir’ and can be removed using the command ‘rmdir’.
The command ‘ls -ld’ is used for listing the directories.
The ‘ls -l’ command will give the long listing of the files.
The ‘touch’ command updates the access and modification times of each file specified by the file parameter of each directory. If you specify a file that does not exist, the touch command creates the file.
The file permissions determine who can read and modify the information stored in your files. They are your primary method for protecting the data that you store on your system.
To specify a mode in symbolic form, you must specify three sets of flags. The first set of flags specifies who is granted or denied the specified permissions, as: ‘u’ for File Owner, ‘g’ for Group pertaining to the file’s group and ‘o’ for All Others.
The second set of flags specifies whether the permissions are to be removed, applied, or set: ‘-‘ Removes specified permissions, ‘+’ Applies specified permissions, ‘=’ Clears the selected permission field and sets it to the permission specified.
The third set of flags specifies the permissions that are to be removed, applied, or set: ‘r’ for Read Permission, ‘w’ for Write Permission, ‘x’ for Execute Permission.
The chmod command also permits you to use octal notation for the mode. The numeric mode is the sum of one or more of the following values:
4000: Sets user ID on execution, 2000: Sets group ID on execution, 1000: Sets the link permission to directories or sets the save-text attribute for files, 0400: Permits read by owner, 0200: Permits write by owner, 0100: Permits execute or search by owner, 0040: Permits read by group, 0020: Permits write by group, 0010: Permits execute or search by group, 0004: Permits read by others, 0002: Permits write by others and finally 0001: Permits execute or search by others.

The vi Editior
The Visual Editor (vi) is a screen editor that comes with the AIX operating system. The vi program is used to create and edit text files. When you edit a file, vi makes a copy of the file to a memory buffer. This way, if any unwanted changes are made, the original file is not destroyed. When your work is completeed, you must remeber to save the buffer which contains your changes. The visual editor has two modes of operation: text input mode and command mode. The vi editor can be executed by issuing the command vi <filename>. When editing a file, vi places a tilde (~) as the first character of lines past the end of your file. These lines are not part of your file, and are for display purposes only.
The text can be added into a file by opening the file and pressing the ‘i’ key on the keyboard for inserting the text. You can use the ‘x’ key to delete an alphabet and ‘dd’ to remove a line. After adding the text, press the ‘Esc’ key and save the file.
You can exit the editor either by saving the text or without saving the text. After pressing the ‘Esc’ key, you need to press ‘:’ followed by ‘wq!’ to save and exit or just ‘q!’ to exit without save.
There are over forty commands that can be used to move the cursor throughout the file. The basic keys used are ‘up’, ‘down’, ‘right’ and ‘left’ arrow keys on the keyboard to move the cursor to the required place.
In order to delete text, you need to take the cursor to the alphabet or word you want to delete and hit the ‘x’ key till the text is deleted. If you would like to delete the whole line, you can move to cursor to that line and press the key ‘d’ twice as ‘dd’. This will delete the whole line.
To search a pattern in the vi screen, you open the file and click on the ‘/’ key. The ‘/’ is entered at the bottom of your screen, where you can add the word to search and hit enter. You can hit the ‘n’ key to search for the same word elsewhere is the file.
The shell is a command interpreter that allows an end user to type in commands to communicate to the AIX system. By default, when a user logins, a shell process is started. The default AIX shell is /usr/bin/ksh.
Wildcard characters provide a convenient way to specify multiple file names or directory names. The wildcard characters are asterisk (*) and question mark (?).Use the * to match any sequence or string of characters. The ‘*’ means any characters, including no characters. For example, if you have the following files in your directory:
1test 2test afile1 afile2 bfile1 file file1 file10 file2 file3
and you want to refer to only to the files that begin with file, you would use:
file*
The files selected would be: file file1 file10 file2 file3
Use the ? to match any one character. The ? means any single character.
To refer to only the files that starts with file and end with a single character, use:
file?
The files selected would be: file1 file2 file3
The metacharacters are open and close square brackets ([ ]), hyphen (-), and exclamation mark (!). To refer to only the files that end in 1 or 2, use:
*file[12]
The files selected would be: afile1 afile2 file1 file2
To refer only to the files that start with any number, use:
[0123456789]* or [0-9]*
The files selected would be: 1test 2test
To refer only to the files that don't begin with an a, use:
[!a]*
The files selected would be: 1test 2test bfile1 file file1 file10 file2 file3
The shell performs file name substitution by scanning each command word specified by the Word variable for certain characters. If a command word includes the *), ? or [ characters, and the -f flag has not been set, the shell regards the word as a pattern. The shell replaces the word with file names, sorted according to the collating sequence in effect in the current locale, that match that pattern. If the shell does not find a file name to match the pattern, it does not change the word.
The AIX operating system allows you to manipulate the input and output (I/O) of data to and from your system by using specific I/O commands and symbols. You can control input by specifying the location from which to gather data. For example, you can specify to read input while data is entered on the keyboard (standard input) or to read input from a file. You can control output by specifying where to display or store data. You can specify to write output data to the screen (standard output) or to write it to a file. Because AIX is a multitasking operating system, it is designed to handle processes in combination with each other. There are different ways this can be performed. Few of them are listed below.
a. Standard input, standard output, and standard error files
b. Standard output redirection
c. Redirecting output to a file
d. Redirecting output to append to a file
e. Standard input redirection
f. Discarding output with the /dev/null file
g. Standard error and other output redirection
Type the command
# cat > name_of_file
Then, type in the required text and press enter to start a new line. When finished typing, enter Ctrl-d. This stops the cat command and returns you to the system prompt.
You can connect two or more commands so that the standard output of one command is used as the standard input of another command. A set of commands connected this way is known as a pipeline. The connection that joins the commands is known as a pipe. Pipes are useful because they let you tie many single-purpose commands into one powerful command. You can direct the output from one command to become the input for another command using a pipeline. The commands are connected by a pipe (|) symbol.
When a command takes its input from another command, modifies it, and sends its results to standard output, it is known as a filter. Filters can be used alone, but they are especially useful in pipelines. The most common filters are sort, more and pg.

Processes
The process is the entity that the operating system uses to control the use of system resources. AIX introduces the use of threads to control processor-time consumption, but most of the system management tools still require the administrator to refer to the process in which a thread is running, rather than to the thread itself.
Some processes run from system boot to shutdown, but most processes come and go rapidly, as tasks start and complete. At times, a process can die a premature, say, due to a crash of a system or application or a particular task.
Each new process is the spawn of an existing process. Further, each new process, called a “child" process, is a clone of its "parent" process, at least for an instant, until the child continues execution independently.
A process can be monitored using the command ‘ps’. It gives the output with the ID associated to the process along with the time stamp and date when the process was started.
When a process terminates, by calling the exit subroutine either explicitly or implicitly, all threads within the process are terminated. Neither the cleanup handlers nor the thread-specific data destructors are called. The reason for this behavior is that there is no state to leave clean and no thread-specific storage to reclaim, because the whole process terminates, including all the threads, and all the process storage is reclaimed, including all thread-specific storage.
A daemon  is  defined  to  be  a  process  that  is intended  to  run  “in  the  background” without  a  controlling  terminal. That  is,  the life  span  of  the  daemon  process  does not  depend  on  the  life  span  of  a  terminal session,  the  daemon  life  span  does  not depend  on  any  control  key  sequences generated  from  a  terminal  session,  and  a daemon  does  not  interact  with  users through  a  terminal. A  daemon  can  be  started by  the  init  process,  the System  Resource  Controller,  the  inetd  process,  or  a  shell.

AIX Utilities
The AIX System Management Interface Tool (SMIT) provides an alternative to the typical method of using complex command syntax, valid parameter values, and custom shell path names for managing and maintaining your operating system configuration. SMIT offers the following features:
a. Two modes of operation
b. An interactive, menu-driven user interface
c. User assistance
d. System management activity logging
e. Fast paths to system management tasks
f. User-added SMIT screens

The find command recursively searches the directory tree for each specified Path parameter, seeking files that match a Boolean expression written using the terms given in the following text. When the find command is recursively descending directory structures, it will not descend into directories that are symbolically linked into the current hierarchy. The output from the find command depends on the terms specified by the Expression parameter.
The grep command search for the pattern specified by the Pattern parameter and then writes each matching line to standard output. The grep command uses a compact non-deterministic algorithm. The grep command displays the name of the file containing the matched line if you specify more than one name in the File parameter. Characters with special meaning to the shell ($, *, [, |, ^, (, ), \ ) must be in quotation marks when they appear in the Pattern parameter. When the Pattern parameter is not a simple string, you usually must enclose the entire pattern in single quotation marks. In an expression such as [a-z], the - (minus sign) cml specifies a range, according to the current collating sequence. A collating sequence may define equivalence classes for use in character ranges.
The sort command sorts lines in the files specified by the File parameter and writes the result to standard output. If the File parameter specifies more than one file, the sort

command concatenates the files and sorts them as one file. A - (minus sign) in place of a file name specifies standard input. If you do not specify any file names, the command sorts standard input. An output file can be specified with the -o flag. If no flags are specified, the sort command sorts entire lines of the input file based upon the collation order of the current locale.
The xargs command constructs parameter lists and runs commands. The xargs command limits the command line length.
The which command takes a list of program names and looks for the files that run when these names are given as commands. The which command expands each argument, if it is aliased, and searches for it along the user's path.
The whereis command locates the source, binary, and manuals sections for specified files.
The file command reads the files specified by the File parameter or the FileList variable, performs a series of tests on each file, and attempts to classify them by type. The command then writes the file types to standard output. The file can be regular file, directory, FIFO(named pipe), block special, character special, symbolic link or sockets type.
The diff command compares text files. It can compare single files or the contents of directories. The diff command only works with input files that are text files. If the Directory1 and Directory2 parameters are specified, the diff command compares the text files that have the same name in both directories. Binary files that differ, common subdirectories, and files that appear in only one directory are listed. When the diff command is run on regular files, and when comparing text files that differ during directory comparison, the diff command tells what lines must be changed in the files to make them agree. If neither the File1 nor File2 parameter is a directory, then either may be given as - (minus sign), in which case the standard input is used. If the File1 parameter is a directory, then a file in that directory whose file name is the same as the File2 parameter is used.
The cmp command compares files designated by the File1 and File2 parameters and writes the results to standard output. If you specify a - (minus sign) for either the File1
or File2 parameter, the cmp command reads standard input for that file. Only one file can be read from standard input. Under default conditions, the cmp command displays nothing if the files are the same. If they differ, the cmp command displays the byte and line number at which the first difference occurs.



AIX Documentation
The man command provides reference information on topics, such as commands, subroutines, and files. The man command provides one-line descriptions of commands specified by name. The man command also provides information on all commands whose descriptions contain a set of user-specified keywords. The man command formats a specified set of manual pages. If you specify a section for the Section parameter, the man command searches in that section of the manual pages for the title specified by the Title parameter. The value of the Section parameter can be either an Arabic number from 1 through 8 or a letter.
You can go to www.ibm.com site and browse for different options there. Below are few important sites where we can get help.
http://www.redbooks.ibm.com/ à for various Red Books



Appendix A: General Commands used on daily basis.
This section gives an over of some general AIX commands that are used on a daily basis by an AIX System Administrator.
AIX
Unique host ID
hostid                                hostname                           uname -a
Administrator
Performance monitor
top
monitor
System activity reporter
sar
Virtual Memory statistics
vmstat
I/O statistics
iostat
Error logs
alog -o -t boot
errpt
Display swap size
lsps -a
Activate Swap
swapon -a

Appendix B: Printer Commands
Printers
AIX
Printer Queues
/etc/qconfig
Stop LP
stopsrc -s lpd
Start LP
startsrc -s lpd
Submit print jobs
enq
lp
lpr
qprt
LP statistics
enq -A
lpq
lpstat
qchk
Remove print jobs
cancel
lprm
qcan
enq -x
Add printer queue
smit mkpq
Remove Printer queue
smit rmpq
Make default printer
export LPDEST="pq"

Appendix C: Network Commands
Network
AIX
Network IP configuration
lsattr -E -l inet0
Hosts IP addresses
/etc/hosts
Name service switch
/etc/netsvc.conf
Network parameters
no -a
Appendix D: LVM Commands
LVM
AIX
Filesystem table
/etc/filesystems
Free disk blocks
df -k
Device listing
lsdev -C
Disk information
bootinfo -s hdisk#
Disk Label
lspv -l hdisk#
Display volume group
lsvg -l rootvg
Modify physical volume
chpv
Prepare physical disk
mkdev -c disk -l hdisk#
List physical volume
lspv
Remove disk from volume group
reducevg
Move logical volumes to another physical volumes
migratepv
Create volume group
mkvg
Remove volume group
Volume group availability
chvg
varyonvg
varyoffvg
Restore volume group
Exports volume group
exportvg
Imports volume group
importvg
Volume group listing
lsvg
Change logical volume characteristics
chlv
List logical volume
lslv
Make logical volume
mklv
Extend logical volume
extendlv
Remove logical volume
rmlv
Prepare boot volumes
bootlist -m normal
Operating System Backup
mksysb -i /dev/rmt0
Backup
savevg -i rootvg
Restore
restvg
Kernel Parameters
lsattr -E -l sys0
Physical RAM
bootinfo -r
Kernel Bits
bootinfo -K
Crash utility
crash
Machine model
uname -m
bootinfo -m
OS Level
oslevel
Run Level
who -r
Core dump files
/var/adm/ras
NTP Daemon
/etc/ntp.conf
startsrc -s xntpd


Appendix E: Software related commands
AIX
Install Software
installp -a
Uninstall software
installp -u
List installed software
lslpp -L all
Verify installed software
lppchk -v
List all files
lslpp -f fileset
List installed patches
instfix -i
Package owner
lslpp -w path
SW Directory
/usr/lpp


Appendix F: Devices Commands
AIX
Install devices for attached peripherals
cfgmgr -v
Remove device
rmdev -l
Device drivers
lscfg
CPU
lsdev -Cc processor
List Terminal
lsdev -Cc tty
Diagnostics
diag