﻿<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>IT博客-老猪@八戒-文章分类-Certify </title><link>http://www.cnitblog.com/chenchunqiang/category/2051.html</link><description /><language>zh-cn</language><lastBuildDate>Tue, 27 Sep 2011 05:05:21 GMT</lastBuildDate><pubDate>Tue, 27 Sep 2011 05:05:21 GMT</pubDate><ttl>60</ttl><item><title>AIX - Test 222: pSeries Administration and Support for AIX 5L V5.3</title><link>http://www.cnitblog.com/chenchunqiang/articles/7288.html</link><dc:creator>老猪@八戒</dc:creator><author>老猪@八戒</author><pubDate>Mon, 06 Mar 2006 07:52:00 GMT</pubDate><guid>http://www.cnitblog.com/chenchunqiang/articles/7288.html</guid><wfw:comment>http://www.cnitblog.com/chenchunqiang/comments/7288.html</wfw:comment><comments>http://www.cnitblog.com/chenchunqiang/articles/7288.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/chenchunqiang/comments/commentRss/7288.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/chenchunqiang/services/trackbacks/7288.html</trackback:ping><description><![CDATA[<STRONG><FONT size=2><FONT face=Arial><SPAN class=smalltxt><SPAN class=bold>Test 222: pSeries Administration and Support for AIX 5L V5.3</SPAN></SPAN><BR><BR></FONT></FONT></STRONG><SPAN style="FONT-SIZE: 12px">Section 1 - Planning<BR><BR>&nbsp; &nbsp;1. Determine device needs (e.g., communication adapters, disk controllers, HBAs, tape drives, CD-ROM drives, etc.)<BR>&nbsp; &nbsp;2. Determine the AIX OS level compatibility<BR>&nbsp; &nbsp;3. Determine redundancy requirements for levels of availability (e.g., multiple I/O controllers, multiple communication controllers, multiple processors, multiple power supplies, RAID-level protection, dynamic CPU deallocation, dead gateway detection)<BR>&nbsp; &nbsp;4. Select appropriate IBM resources for system planning<BR>&nbsp; &nbsp;5. Describe LPAR and dLPAR features and benefits<BR>&nbsp; &nbsp;6. Determine disk requirements<BR><BR>Section 2 - AIX Installation and Updates<BR><BR>&nbsp; &nbsp;1. Install AIX from Media using CDROM or DVD or tape<BR>&nbsp; &nbsp;2. Describe the NIM installation process and configuration<BR>&nbsp; &nbsp;3. Identify why install hangs or fails<BR>&nbsp; &nbsp;4. Identify installation LED codes<BR>&nbsp; &nbsp;5. Describe the purpose of Trusted Computing Base (TCB)<BR>&nbsp; &nbsp;6. Describe the Alt Disk installation process and its advantages<BR>&nbsp; &nbsp;7. Describe the process to clone a system from a mksysb<BR>&nbsp; &nbsp;8. Describe the differences between migration, preservation, and new and complete overwrite installation<BR>&nbsp; &nbsp;9. Install software updates (e.g., PTFs)<BR>&nbsp;&nbsp;10. Describe the options available for adding and removing filesets (e.g., commit, apply, remove, reject)<BR>&nbsp;&nbsp;11. Describe the AIX installation packaging<BR>&nbsp;&nbsp;12. Given an operating system or application requirement, select the appropriate AIX installation method<BR>&nbsp;&nbsp;13. Manage filesets (eg: bffcreate and inutoc)<BR>&nbsp;&nbsp;14. Identify the operating system maintenance level and installed filesets<BR>&nbsp;&nbsp;15. Verify integrity of OS (e.g., lppchk and its flags)<BR>&nbsp;&nbsp;16. Describe the differences between installp and rpm<BR><BR>Section 3 - Boot Process<BR><BR>&nbsp; &nbsp;1. Describe the boot process (cfgmgr, file system mounts, application startup, rootvg varyon, BIST, POST, boot sector load, login enablement)<BR>&nbsp; &nbsp;2. Describe the use of the /etc/inittab<BR>&nbsp; &nbsp;3. Describe LED codes (121, 223, 229, 551, 552, 553, 581, OC31, OC32)<BR>&nbsp; &nbsp;4. Describe how to recover from a hung boot process<BR>&nbsp; &nbsp;5. Describe run levels 0 through 9<BR>&nbsp; &nbsp;6. Describe the use of the following rc.* files (rc.net, rc.tcpip, rc.boot, rc., rc.local)<BR>&nbsp; &nbsp;7. Show, modify and reset bootlist<BR><BR>Section 4 - Configuration<BR><BR>&nbsp; &nbsp;1. Describe the function of the ODM and the locations of its files<BR>&nbsp; &nbsp;2. Query ODM<BR>&nbsp; &nbsp;3. Describe the function of smit<BR>&nbsp; &nbsp;4. Describe the process to run a Linux application under AIX<BR>&nbsp; &nbsp;5. Configure the network using the following: TCP/IP, /etc/hosts, hostname, ifconfig, chdev, route, /etc/resolv.conf, etc/netsvc.conf, no, /etc/ntpd.conf<BR>&nbsp; &nbsp;6. Configure Ethernet adapter (speed, duplex, virtual ethernet)<BR>&nbsp; &nbsp;7. Use NFS to import/export file systems (e.g., /etc/exports, biod, nfsd)<BR>&nbsp; &nbsp;8. Configure, list and modify paging space<BR>&nbsp; &nbsp;9. Determine/modify existing device configuration<BR>&nbsp;&nbsp;10. Reconfigure system to move from 32-bit to 64-bit and vice versa<BR>&nbsp;&nbsp;11. Check for possible exposure in system access files (e.g., /etc/hosts.equiv, .rhosts, .netrc, .forward)<BR><BR>Section 5 - Storage and LVM&lt;<BR><BR>&nbsp; &nbsp;1. Describe the relationship between physical and logical volumes and volume groups<BR>&nbsp; &nbsp;2. Describe the relationship between logical volumes and filesystems<BR>&nbsp; &nbsp;3. Describe the differences between JFS vs. JFS2<BR>&nbsp; &nbsp;4. Manage volume groups (varyonvg, varoffvg, mkvg, importvg, exportvg, lsvg)<BR>&nbsp; &nbsp;5. Manage logical volumes<BR>&nbsp; &nbsp;6. Manage filesystems (mount, fsck, chfs, mkfs, defragfs)<BR>&nbsp; &nbsp;7. Describe the relationship between physical partition size and physical disk size<BR>&nbsp; &nbsp;8. List the attributes of volume groups, logical volumes, and filesystems that cannot be changed<BR>&nbsp; &nbsp;9. Migrate data from one physical volume to another<BR><BR>Section 6 - Monitoring and Tuning<BR><BR>&nbsp; &nbsp;1. Monitor root mail for error messages<BR>&nbsp; &nbsp;2. Monitor file systems growth to prevent a full file system<BR>&nbsp; &nbsp;3. Monitor the error log for hardware and software errors<BR>&nbsp; &nbsp;4. Use and interpret output from vmstat and sar to determine performance problems<BR>&nbsp; &nbsp;5. Use /etc/tunables for customization of system parameters<BR>&nbsp; &nbsp;6. Given system performance problems, select the appropriate tool(s) (e.g., vmstat, iostat, topas, netstat, sar, /proc)<BR>&nbsp; &nbsp;7. Use and interpret output from netstat and iostat to determine performance problems<BR>&nbsp; &nbsp;8. Use and interpret the output of /proc commands for problem determination<BR>&nbsp; &nbsp;9. Configure and monitor syslog for error conditions<BR>&nbsp;&nbsp;10. Describe the system commands that document current system configuration<BR>&nbsp;&nbsp;11. Use the Resource System Controller (RSCT) to set up resource and system monitoring<BR>&nbsp;&nbsp;12. Describe the advantages of using Workload Manager (WLM) for system resource allocation<BR>&nbsp;&nbsp;13. Describe Partition LoadManager features<BR>&nbsp;&nbsp;14. Describe how to determine and recover from a full file system<BR><BR>Section 7 - Problem Determination and Resolution<BR><BR>&nbsp; &nbsp;1. Given a system problem, determine which tool (e.g., errpt, diag, netstat, ifconfig, ping, filemon, traceroute) is appropriate for problem determination<BR>&nbsp; &nbsp;2. Monitor, interpret and manage the error log using errpt and/or errclear<BR>&nbsp; &nbsp;3. Identify reasons to monitor the root user's mail<BR>&nbsp; &nbsp;4. Identify when to use PerfPMRs<BR>&nbsp; &nbsp;5. Manage a support call with IBM (e.g., open, severity levels, escalation, closing)<BR>&nbsp; &nbsp;6. Determine how to size and configure dump devices<BR>&nbsp; &nbsp;7. Describe hot plug processes for replacing devices<BR>&nbsp; &nbsp;8. Given user problems, determine appropriate actions (e.g., usrck, grpck, file permissions, resetting failed login attempts, user limits)<BR>&nbsp; &nbsp;9. Given a hardware related problem, identify the probable cause<BR>&nbsp;&nbsp;10. Given failed disk situations, describe the procedures for replacing the bad disk<BR>&nbsp;&nbsp;11. Access rootvg in maintenance mode<BR>&nbsp;&nbsp;12. Use alog to examine boot messages to locate startup problems<BR>&nbsp;&nbsp;13. Troubleshoot system hangs when trying to start desktop<BR>&nbsp;&nbsp;14. Troubleshoot error unable to open display<BR><BR>Section 8 - Backup and Recovery / Disaster Recovery<BR><BR>&nbsp; &nbsp;1. Describe methods of backing up and restoring the operating system (e.g., mksysb)<BR>&nbsp; &nbsp;2. Describe methods of managing / positioning tape backup media for backup and restore purposes<BR>&nbsp; &nbsp;3. Describe methods of backing up and restoring data and data structures (savevg and restvg, backup and restore, tar, cpio, pax, mkcd, gzip and gunzip)<BR>&nbsp; &nbsp;4. Describe methods to list / verify contents of backup media<BR>&nbsp; &nbsp;5. Describe methods of selectively altering / excluding data during backup and restore process<BR>&nbsp; &nbsp;6. Identify the elements of disaster recovery plans based on business needs<BR>&nbsp; &nbsp;7. Describe the differences between full, differential, and incremental backups and their effect on backup and restore windows<BR><BR>Section 9 - Daily Management<BR><BR>&nbsp; &nbsp;1. Add / delete / alter userids and passwords<BR>&nbsp; &nbsp;2. Alter default user profiles and limits (i.e., command shell profiles and /etc/security)<BR>&nbsp; &nbsp;3. Describe methods to monitor and manage processes (e.g., ps, kill, nice, fuser, topas, svmon)<BR>&nbsp; &nbsp;4. Identify and correct errors in shell script examples<BR>&nbsp; &nbsp;5. Define AIX file and directory permissions (e.g., user, group, other) and ownership<BR>&nbsp; &nbsp;6. Define and/or modify file permissions and ownership (e.g., chmod, chown, chgrp)<BR>&nbsp; &nbsp;7. Describe differences between foreground and background processes<BR>&nbsp; &nbsp;8. Describe how to check and alter priority of a process<BR>&nbsp; &nbsp;9. Describe the differences between local and global variables and how to set, unset and show them<BR>&nbsp;&nbsp;10. Describe how to enable System V printing<BR>&nbsp;&nbsp;11. Manage the print queuing subsystem<BR>&nbsp;&nbsp;12. Edit a file using vi<BR>&nbsp;&nbsp;13. Describe methods to read / create / delete / configure email<BR>&nbsp;&nbsp;14. Describe use of metacharacters and wildcards within the shell<BR>&nbsp;&nbsp;15. Describe how to redirect stdin, stdout, and stderr<BR>&nbsp;&nbsp;16. Use cron to schedule tasks<BR>&nbsp;&nbsp;17. Control system processes using System Resource Controller (SRC)</SPAN> <BR><img src ="http://www.cnitblog.com/chenchunqiang/aggbug/7288.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/chenchunqiang/" target="_blank">老猪@八戒</a> 2006-03-06 15:52 <a href="http://www.cnitblog.com/chenchunqiang/articles/7288.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item></channel></rss>