|Considerations in software design for multi-core multiprocessor architectures
Today's chip multithreaded, multi-core, multiprocessor systems provide software designers a great opportunity to achieve faster and higher throughput. However, there are a few key design considerations, if ignored, could result in hard-to-find performance issues and scalability bottlenecks.These key design considerations are discussed in this article.
|20 May 2013|
|PowerVM configuration and scaling with WebSphere Portal
This article describes a series of performance benchmarks that demonstrate the scaling properties of an IBM PowerVM® virtual machine running IBM WebSphere® Portal on the IBM AIX® operating system. Various PowerVM configuration settings are used to demonstrate how performance changes when CPU entitlements and virtual CPUs are changed.
|09 May 2013|
|Setting up the IBM AIX server as a router (static routing)
Routing is the process of moving a packet of data from source to destination. Static routing uses manually added routes whereas dynamic routing uses dynamic routes. This article explains how to set up an IBM® AIX® server as a router to communicate with private and public networks by using static routing.
|25 Apr 2013|
|The troubleshooter's guide for managing storage using IBM Systems Director
The purpose of this article is to document the troubleshooting methodologies and the best practices to be followed while managing the storage component and also provide the information about what needs to be verified in an entity, such as IBM® Systems Director, LSI, NetApp Eagle provider, and so on to overcome certain issues. In short, this article would serve as a one-stop reference for debugging storage management issues more efficiently.
|22 Apr 2013|
|Troubleshooting process hangs caused by JFS2 inode with an empty extended attribute entry
In this article, we reveal a special kind of inode that cannot be detected by the fsck command, and explain why it can cause process hangs and drop system performance. We also introduce some approaches to tackle such an issue.
|18 Apr 2013|
|IBM PowerHA SystemMirror cluster migration to IBM POWER7
This article provides the tips for migrating an IBM® PowerHA® SystemMirror cluster from IBM POWER6® to IBM POWER7® processor-based servers. This step-by-step guide describes how to migrate a high-availability (HA) cluster to POWER7, upgrade the cluster from IBM HACMP™ to PowerHA, and migrate shared cluster volume groups for fast disk takeover.
|04 Apr 2013|
|Using IBM Image Construction and Composition Tool
This article aims to provide common best practices when working with the IBM® Image Construction and Composition Tool® (ICCT) to design and build virtual appliances on IBM PowerVM® cloud providers.
|02 Apr 2013|
|Fine-grain network quality of service on IBM AIX 7.1 and Linux in a multi-tenant cloud environment
In a multi-tenant environment, typically tenants share a single infrastructure on which resources are logically partitioned and where the cloud administrators support the required provisioning to enable sharing of the infrastructure. In purview of the overall administrative tasks, maintenance of network quality of service (QoS) per tenant is a must have but a tedious task. This article demonstrates a powerful QoS mechanism available with the Linux® operating system that can help cloud administrators to effectively divide the total network bandwidth available on a centralized Linux server, hosting cloud applications among tenant client systems such as IBM® AIX®, Microsoft® Windows®, and Linux.
|21 Mar 2013|
|Simulating dropped TCP/IP packets on IBM AIX
Commercial software products are often developed and tested on local high-speed, high-capacity networks, where there is little congestion or packet loss. The network conditions in deployment environments may not be so ideal. Heavy congestion or hardware errors on networking equipment might result in lost packets, which can severely affect product performance. This article shows you how to use and customize a provided facility for simulating dropped Transmission Control Protocol/Internet Protocol (TCP/IP) packets on IBM® AIX® to allow you to anticipate how well a product will behave under less-than-ideal network conditions.
|15 Mar 2013|
|Enterprise maintenance strategy for IBM AIX running on IBM Power Systems servers
Systems maintenance plays an essential role within every enterprise to ensure supportability and system reliability in order to maximize the availability of the services that make up the technical landscape. With multiple components to consider (IBM® AIX®, database, application, and so on), juggling systems maintenance requirements with service level agreements (SLAs) can be challenging, but by aligning a schedule of activities, the frequency of planned outages can be reduced. This article looks at the importance of treating the service as an entity and with it, creating an enterprise maintenance strategy that maximizes system availability.
|11 Mar 2013|
|Automated environment setup tool for IBM Systems Director VMControl
IBM® Systems Director is a platform management solution that is used to manage physical and virtual systems. IBM Systems Director provides systems management personnel with a single pane of glass, helping to reduce IT management complexity and cost. IBM Systems Director VMControl™ is an advanced plug-in installed on top of IBM Systems Director to provide the virtualization capabilities. This article talks about a tool for automatic environment setup for IBM Systems Directors testing and development. The tool is designed to work for almost all the supported resource features, such as kernel-based virtual machine (KVM), IBM z/VM®, VMware, and IBM Power® Systems™ platforms.
|05 Mar 2013|
|Technical library using IBM AIX RAS infrastructure tracing services
This article explains how to use IBM AIX reliability, availability, and serviceability (RAS) infrastructure services to enable trace capability for kernel extension and device drivers. Mainly, the AIX infrastructure manages core error logging, component tracing, and dump facilities for kernel extension and device drivers. It provides the interface to register and control the level of tracing facilities for kernel extension and driver components. It also exemplifies the concepts through an example implementation and best practices to be followed to interface with the RAS infrastructure.
|01 Mar 2013|
|Subsystem Device Driver Path Control Module (SDDPCM) for IBM AIX
Subsystem Device Driver Path Control Module (SDDPCM) is used for implementing multipath configuration environment using IBM System Storage SAN Volume Controller (SVC), IBM Storwize V7000, and other IBM Storage products. It supports a storage-redundant configuration environment for a host system that is attached to storage devices. It provides enhanced data availability, dynamic input/output (I/O) load-balancing across multiple paths, and automatic path failover protection.
|25 Feb 2013|
|SOA integration with IBM CICS from IBM WebSphere Application Server on IBM AIX
IBM WebSphere and IBM CICS Transaction Gateway (CISCS TG) deployed to run on IBM AIX in local mode with the CICS ECI XA resource adapter, using the Internet Protocol Interconnectivity (IPIC) protocol for communication with CICS Transaction Server for IBM z/OS offers many benefits, especially in the operational management of the integrated environment with deployed Java Enterprise Edition (JEE) applications.
|19 Feb 2013|
|Scripting IBM AIX LPAR builds from A to Z in an IBM PowerVM environment
In today's high demand and quickly changing IT environment, many system administrators are looking for areas where they can save time and automate tasks. Creating a logical partition (LPAR) creation is a common task that when manually done takes a significant amount of time. In other words, it is a perfect task to automate! This article covers the steps to create a LPAR from the command line and then show how this can be automated with a script.
|07 Feb 2013|
|IBM AIX RAS – firmware-assisted and live dump facilities explained
The article explains advanced IBM® AIX® dump facilities built up to capture system dump robustly. More specifically, it discusses the various aspects of firmware-assisted and live dump facilities. It provides the details of live dump kernel service to reliability, availability, and serviceability (RAS) infrastructure and various options or turntables to be considered to capture the live dump for a component or driver data. It illustrates the live dump facilities with an example kernel extension.
|01 Feb 2013|
|Configure SMI-S providers for storage
Storage Management Initiative Specification (SMI-S) is an industry standard developed by the Storage Networking Industry Association (SNIA) with which independent management software can manage storage devices (storage and switches) through a standard interface based on the Common Information Model (CIM) protocol.
|28 Jan 2013|
|IBM PowerHA 7.1 heartbeat over SAN
This article describes the prerequisite configuration required, and the actual configuration to use IBM PowerHA 7.1 storage area network (SAN) heartbeat. In PowerHA 7.1, the disk heartbeat has been replaced by a SAN heartbeat, which should be included in a resilient PowerHA architecture.
|21 Jan 2013|
|Versioned Workload Partitions
This article explains the requirements for moving to versioned Workload Partitions (versioned WPAR) as well as limitations and restrictions. It also explains the configurations of a versioned WPAR to allow it to run in an IBM AIX global environment.
|14 Jan 2013|
|The NIM cheat sheet
Have you ever had to install a large number of IBM AIX servers from scratch? Do you need a quick and easy way to create and store operating system backups? Would you like to know how to perform AIX operating system migrations on live servers quickly? Well, here is your complete cheat sheet for setting up and using the Network Installation Manager (NIM) tool in AIX. Learn how to set up the server and client components, perform a basic installation, use NIM to create mksysb backups, and perform alt_disk migrations over the network.
|07 Jan 2013|
|Shuffling disk data around
Data maintenance on disks is a common task for any system administrator. A quite frequent task in my experience is data movement. This may be due to hotspots on your disk, a quick fix is to move some logical volumes off to another disk to ease congestion. The migratelp command is your trusted friend in this situation. When you are experiencing a failing disk or you are migrating data from one disk to another disk, you can use the migratepv command or create a mirror copy, and you are not restricted to just one method. For original volume groups (VGs), when adding a disk to the VG, you may run into a factoring issue. However, by understanding the characteristics of the VG, the factoring can be changed. These common disk maintenance tasks are discussed with examples in this article.
|02 Jan 2013|
|Sharing physical volumes across logical partitions on IBM Power Systems servers
This article explains the process of sharing physical volumes (PVs) across multiple logical partitions (LPARs). This kind of environment is required for a cluster setup.
|24 Dec 2012|
|Interactive tool to run REST APIs of IBM Systems Director
This article covers the interactive tool to run Representational State Transfer (REST) application programming interfaces (APIs) of IBM Systems Director VMControl. This tool provides a command-line interface (CLI) interface to invoke REST APIs for IBM Systems Director VMControl.
|19 Dec 2012|
|POSIX and Olson time zone formats
This article helps you to understand various time zone formats, interpret the Portable Operating System Interface (POSIX) format, and understand the output of the zdump command with examples.
|13 Dec 2012|
|Improve your productivity by using the debugger in Rational Developer for Power Systems Software
IBM Rational Developer for Power Systems Software features an integrated source-level debugger that helps you debug applications written in different languages and running on different platforms. The key feature of the debugger is that its user interface client connects remotely to a debugger engine running on a different machine. This article shows you how to use the debugger's core features, its advanced features, and its integration with the rest of Rational Developer for Power Systems and other IBM technology.
|11 Dec 2012|
|What's new: Rational Developer for Power
Find out what's new in the various versions of Rational Developer for Power Systems Software, which provides integrated analysis, development, and debugging tools for IBM AIX, IBM i, and Linux operating systems.
|10 Dec 2012|
|What is that file?
There are many commands you can use on the IBM AIX operating system to get information about files. The ls -l command gives you some basics, such as the file name, its size, permissions, and the time the file was last modified. But you can find a lot more interesting and helpful information about files. This article shows you some of the commands that can give you the inside scoop about files, including what the files contain, what processes use them, when they were last accessed, and much more.
|06 Dec 2012|
|IBM SmartCloud Entry for IBM Power Systems
IBM SmartCloud Entry for IBM Power Systems is an entry-level private cloud offering from IBM for IBM POWER® processor-based systems. When the required software stack is installed and configured, the ability to deploy and manage virtual machines (VMs) becomes possible through a web front end. I recently attended the IBM SmartCloud Entry for Power Systems workshop in Sydney, and was impressed by what I saw. The following article is my first impression of the product, albeit with limited exposure to its full potential.
|06 Dec 2012|
|Exploring the Boost Graph Library
Get to know the Boost Graph Library, a generic graph library that helps C++ developers convert practical engineering problems into graph-theory problems.
|03 Dec 2012|
ksh_timer helps ksh script developers or administrators to find out quickly and with minimal change in their script, what functions or user-defined sections are time consuming. By default, ksh_timer will time the overall script and each function defined and used in the script. Users can define additional sections of the scripts they need to be timed.
|28 Nov 2012|
|Inline assembly - start from scratch
This article is for C/C++ programmers who use inline assembly and are working on the IBM® POWER® processor architecture. It presents two scenarios to introduce the basic usage and basic syntax of inline assembly for beginners. The article also poses intermediate-level questions and, by answering these, makes it clear how and why common mistakes can happen. Some tips are also included for coding practice.
|20 Nov 2012|
|Introduction to IBM Active Cloud Engine
This article provides an introduction to the new IBM Active Cloud Engine capability of the IBM Scale Out Network Attached Storage (SONAS). Active Cloud Engine provides a competitive edge to IBM network-attached storage (NAS) offerings.
|09 Nov 2012|
|VADeployer - a Java SWT REST client application
A Standard Widget Toolkit (SWT) Java desktop application was developed taking advantage of the flexibility and ease of use of the IBM Systems Director Representational State Transfer (REST) application programming interfaces (APIs). You can use this application to configure, at deployment time, each product section within a virtual appliance Open Virtualization Format (OVF) descriptor as well as memory and processor allocation settings for a new virtual server.
|01 Nov 2012|
|Integrating IBM WebSphere into CICS with CICS Transaction Gateway on IBM AIX
The integration of IBM WebSphere with IBM CICS Transaction Gateway (CICS TG) enables client J2EE applications to access existing programs on the CICS back-end system. This method describes integration in a particular way.
|26 Oct 2012|
|Migrating to AIX 7.1 with nimadm
This article provides tips for migrating to AIX 7.1 using nimadm and general advice and guidance for ensuring a successful migration.
|22 Oct 2012|
|LDAP user management with RSCT
This article describes how to implement high-availability Lightweight Directory Access Protocol (LDAP) user management for IBM® AIX® using Reliable System Cluster Technologies (RSCT). Contrary to the mainstream LDAP recommendations, the goal of this solution is to provide a LDAP registry for all users, including root. The high-availability implementation should guarantee the availability of the root user (and other system users), at all times.
|16 Oct 2012|
|CD/DVD on demand with LPARs
In many organizations, sample requests such as a CD mount or umount on logical partitions (LPARs) must be managed automatically without administrator rights by an events process. This article can help to automate this process.
|08 Oct 2012|
|Automated DB2 10 for Linux, UNIX, and Windows failover solution using
shared disk storage
This paper describes a distinct configuration of an automated IBM DB2 for Linux, UNIX, and Windows software failover solution that uses shared disk storage.
|04 Oct 2012|
|Using Graphviz to generate automated system diagrams
If you have created an architecture diagram of your system environment, you probably realize that these manually created diagrams are usually out-of-date the day after you create them. This article explains the basics of the Graphviz application and how you can write scripts that can automate the creation of diagrams so that you always have up-to-date and correct diagrams of your systems. Example scripts are provided that diagram the N-Port ID Virtualization (NPIV) and virtual Small Computer System Interface (VSCSI) configurations of an IBM POWER processor-based server.
|27 Sep 2012|
|IBM XL C/C++ installation on IBM AIX 7.1
IBM® XL C/C++ is a high-performance optimizing compiler designed to use IBM POWER® processors and enable the development of parallel applications that use the multi-core and vector features of these processors. This tutorial helps readers with a basic technical background information about the XL C/C++ V11 installation on the IBM AIX® 7.1 operating system.
|21 Sep 2012|
|FC adapter-based WPAR creation and Oracle database configuration
Workload Partitions (WPAR) is a licensed program product included with IBM® AIX® 6.1 and later versions. This article explains the concepts and configurations of a WPAR with Fibre Channel (FC) exported. Also, it describes the steps to install and configure both Oracle database and Oracle Automated Stress Test (OAST) workload inside the WPAR.
|12 Sep 2012|
|Learning the OpenMP framework with GCC
The Open Multiprocessing (OpenMP) framework is an extremely powerful specification that helps you harness the benefits of multiple cores from your C, C++, and Fortran applications. This article explains how to use the OpenMP features in your C++ code and provides examples that can help you get started with OpenMP.
|07 Sep 2012|
|AIX security reporting
Generating IBM AIX security reports should reflect the current security model overview of your system, and these reports can then be presented to managers or audit to show how your AIX system is managed with regards to security. In this article, I will demonstrate what type of attributes could be collected and why.
|03 Sep 2012|
|Migrating a physical LPAR to a SAN-attached virtual (VIO client) LPAR
This article outlines how to migrate physical logical partitions (LPARs) with internal disks to storage area network (SAN) attached virtual disks backed virtual LPAR as VIO client. This is an intermediate-level article and is targeted for system administrators who are interested in leveraging IBM Power Systems virtualization using the Virtual I/O Server (VIOS). This overview of the migration process can prepare the user for what needs to be done and what to expect so that the migration can be as quick and easy as possible.
|30 Aug 2012|
|Integrating IBM GPFS on IBM AIX with IBM Storwize V7000 Unified Global
Mirror and IBM FlashCopy
The author presents a guide on how to use the advanced copy features of the new IBM® Storwize V7000® Unified storage system to build a disaster recovery (DR) solution for an IBM General Parallel File System (IBM GPFS™) cluster on the IBM AIX® operating system. The concepts of integrating a storage unit-based replication with the GPFS software are introduced and exemplified.
|17 Aug 2012|
|Tip: Online migration of a file system to a smaller physical volume
Reducing a file system to reclaim unused space is easy enough to do online in IBM AIX. The unused space can then be allocated to other file systems in the volume group. However, if you want to reduce the size of a physical volume, for example, shrink a SAN LUN, you might damage the data on the AIX physical volume. The solution is to create a new, smaller physical volume, add it to the volume group, and then migrate the original file system using the standard Logical Volume Manager (LVM) utilities, such as mklvcopy or migratepv. After the original physical volume has been removed from the volume group, it can be unmapped and recycled for use somewhere else in the SAN.
|14 Aug 2012|
|nweb: a tiny, safe Web server (static pages only)
Have you ever wondered how a Web server actually works? Experiment with nweb -- a simple Web server with only 200 lines of C source code. In this article, Nigel Griffiths provides a copy of this Web server and includes the source code as well. You can see exactly what it can and can't do.
|08 Aug 2012|
|Getting grips with fpm
Using the File Permissions Manager (fpm) allows you to trim down the programs that should not be SUID or SGID enabled in your view. Thus, allowing only privileged users to run these programs. This use of fpm is part of the ever-growing IBM AIX security policy to help system administrators in hardening their system.
|07 Aug 2012|
|Speaking UNIX, Part 14: Manage Ruby and gems with RVM
Need to re-create another Ruby coder's development environment? Long to experiment with the latest version of JRuby? Want to isolate your work to a specific set of gems? You can do all that and more with the handy and clever Ruby Version Manager.
|23 Jul 2012|
|IBM POWER7 processor-based IBM BladeCenter server configuration using command line interface (CLI)
This article describes the IBM POWER7 processor-based IBM BladeCenter blade server installation starting from BladeCenter Ethernet Switch setup through logical partitioning (LPAR) configuration and to IBM AIX setup. Everything written in this article could be made from the command line, so these recommendations can be helpful for system administrators and system engineers working with hosts through a tiny channel or firewall that is blocking all ports except the Telnet or Secure Shell (SSH) port.
|10 Jul 2012|
|Learning next-generation build tools for software management
If you are part of a software development team, you have probably had instances where your code ran well in isolation only to fail during integration testing. Discover two tools CruiseControl and SCons allowing continuous integration and builds respectively, thus making integration testing easier.
|29 Jun 2012|
|Performance tuning C/C++ applications with Performance Advisor in Rational Developer for Power Systems Software
Performance Advisor, introduced in IBM Rational Developer for Power Systems Software 8.5, provides a rich set of tools that enable you to get better performance from your C/C++ applications that run on IBM Power Systems. In this tutorial, Mike Kucera walks you through the main functionality of the Performance Advisor and shows you how to improve the performance of an example application.
|26 Jun 2012|
|Got performance impacts of interfacing COBOL with other languages? Reduce them!
Often businesses and government agencies need to interface COBOL with other languages as a more efficient way of updating their enterprise systems than replacing COBOL programs with those in other languages. In reality, COBOL interfaces come with some limitations. In this article, the author explains the performance impacts of interfacing COBOL with other languages and gives some tips to avoid becoming reactive to adverse impacts.
|25 Jun 2012|
|Understanding dump devices
If the unexpected happens and the IBM AIX operating system crashes, you want the information to be gathered automatically. Using dump devices, the core dump is placed on these devices in readiness for transfer to IBM support.
|18 Jun 2012|
|The performance detective: part2, Prevention is better than cure
This second article in a two-part series on managing system performance looks at preventing performance problems. By keeping your system well tuned, you can avoid a lot of stress. There are also steps you can take so that when the system does start to choke, you're ready to identify the bottlenecks quickly and know where to go for help.
|31 May 2012|
|AIX system migration installation
Migration installation is the way to migrate systems from one version of an operating system (OS) level to another OS version. This method of installation preserves all user data configurations and file systems. Migration installation can be done in various ways and this article provides steps for migrating system from one version to another version.
|18 May 2012|
|Immutability and appendOnly features in GPFS 3.4v on AIX
Protect your business data on AIX systems using immutability and appendOnly features supported by IBM General Parallel File System V3.4 ensuring compliance to various government regulations. Having rich set of command line interfaces, GPFS allows you to set appropriate restrictions to your business audit files, health center records and log files in order to effectively secure them from being tampered or accidentally deleted. This article illustrates how to make use of immutability and appendOnly restrictions offered by IBM GPFS V3.4 to protect your AIX data.
|30 Apr 2012|
|SWIG for developers in a hurry
SWIG is a nifty open source tool that lets you integrate C/C++ code with just about any mainstream scripting language. Among other things, it exposes the code base to a wider audience, improves testability, and lets a portion of your Ruby code base run off high-performance C/C++ modules.
|23 Apr 2012|
|Troubleshooting and performance analysis of different applications in Versioned WPARs
Versioned Workload Partitions (WPARs) is a new revolution in the area of WPARs in the IBM AIX® operating system. Applications that are supported in existing operating systems can also be configured to run in Versioned WPARs. However, there can be issues while configuring and running the same applications in Versioned WPARs. This article addresses trouble shooting of problems that might occur when common applications such as IBM WebSphere® Application Server, IBM DB2® and others are started in Versioned WPARs. This article also discusses the performance comparison of applications and benefits of moving an existing setup(on older hardware) to new IBM POWER7® hardware in the form of Versioned WPARs.
|19 Apr 2012|
|Introduction to text manipulation on UNIX-based systems
This introduction to text manipulation on UNIX platforms provides an overview of some common commands widely available and installed standard on most UNIX-based releases. Many times these standard utilities are ignored in favor of more modern text-processors such as Perl, Python, or Ruby, which are not always installed on a system. An introductory review of these tools helps practitioners who are learning UNIX or Linux or those who may be looking to renew forgotten knowledge.
|14 Mar 2012|
|The performance detective: Where does it hurt?
If you're up against a performance problem on the IBM AIX operating system, your most important task is to diagnose it correctly. When a user tells you "the system is running slowly," it's time for some detective work. You need to know what questions to ask to help you pinpoint the real issue. The first article of this two-part series demonstrates how describing a performance problem can help you identify the bottlenecks. Part 2 will look at some good practices that help prevent those bottlenecks in the first place.
|31 Jan 2012|
|VIOS disk mapping in a nutshell
Have you found yourself doing some kind of troubleshooting on servers which you have never touched before? Nowadays, working in huge companies or even as a consultant, you might not be able to avoid such situations. To avoid mistakes in VIOS and LPAR environments, this article will simply show you how to map disk devices within VIOS server without caring about name patterns. In the end, you will see how name patterns are important and how to bypass them if required.
|24 Jan 2012|
|Hardware migration using alt_disk_copy
The alt_disk_copy utility can be used to migrate your rootvg disks to new hardware. This method is practicable when you do not have the facility or resource of using remote network installs.
|17 Jan 2012|
Recovering or building new machines running AIX is a straightforward process when you use Storix.
|10 Jan 2012|
|Optimizing internal AIX storage
Although SAN technology has taken the limelight when it comes to storage solutions, AIX systems still need to use internal storage. Whether you have small stand-alone servers or use a full system partition with all the resources available pooled together, internal storage is the typical medium for root volume groups and other smaller file system utilization. But when these disks are not planned out well, I/O bottlenecks, inefficient space utilization, and slower performance can occur. Learn how to optimize internal storage and lay things out properly.
|10 Jan 2012|
|Elevate cloud security with privilege delegation
In this article, the author discusses the needs that drive migration of data centers into the cloud, details the role of virtualization in both public and private cloud infrastructures, and outlines the security and compliance implications of cloud computing in order to provide insight into the protection of sensitive data in the cloud through "administrative access" and "privileged delegation."
|14 Dec 2011|
|Running with Tripwire
Tripwire is an intrusion detection system that monitors for file or directory changes based on the policy provided by the system administrator.
|13 Dec 2011|
|Managing VLANs on mission-critical shared Ethernet adapters
Shared Ethernet adapters (SEAs) can be used for IEEE 802.1Q VLAN tagging. However, once the SEA is in use, you cannot make changes to the VLANs on the trunk virtual Ethernet adapter without stopping the SEA. By using separate virtual adapters for each tagged VLAN, you can attach a new virtual adapter with its new VLAN to the SEA without any downtime. Retiring a VLAN from the SEA can be just as easy with a modular approach: one tagged VLAN per virtual adapter.
|06 Dec 2011|
|Manage LPAR startup order and validate resource allocation with system profiles
IBM Power Systems are built to stay powered up. On those rare occasions that a Power System does get powered down, it pays to be prepared when it comes time to start it up again. The logical partitions (LPARs) need to be activated, and it can be challenging to start them in the correct order. There is a simple way to establish your LPAR startup order: create a system profile via the Hardware Management Console (HMC). System profiles also alert you to resource conflicts between LPAR profiles. In addition, you can use system profiles to reconfigure server hardware quickly and easily.
|29 Nov 2011|
|LDAP client enhancements in AIX 7
Lightweight directory access protocol (LDAP) is a subset of the x.500 directory access protocol. LDAP maintains information of different objects and can be represented as user names, group names, file names, and more. The LDAP protocol allows the exchange of information between the LDAP client and LDAP server. Applications make use of the LDAP client to interact with LDAP servers to get the information for application request. This article can be used as a quick reference for understanding LDAP client features in AIX 6.1 and 7.1 releases.
|29 Nov 2011|
|Learning the Intel Threading Building Blocks Open Source 2.1 Library
Discover a powerful alternative to POSIX and Windows-based threads - Intel Threading Building Blocks, a C++ based framework design specifically for parallel programming.
|23 Nov 2011|
|CICS Transaction Gateway and AIX workload partitions
This article shows you how to use CICS Transaction Gateway in an AIX environment that supports workload partitions (WPARs). It includes scenarios that show you how to use WPARs to consolidate existing hardware or to extend a CICS Transaction Gateway instance.
|16 Nov 2011|
|Security authentication mechanism in AIX
Authentication mechanism verifies which users are allowed to access a system. Administrator can define authentication protocol; based on that protocol, users' credentials are verified, and users are given access to the system. AIX provides several authentication and identification modules. A user's authentication and identification are done based on the user's attributes on AIX. This article covers the user's authentication and identification attributes, load modules available in AIX, and a new authentication attribute introduced AIX 6.1 Tl07 and AIX 7.1 Tl1 releases.
|15 Nov 2011|
|Workload Partitioning (WPAR) in AIX 7.1
The most popular innovation of AIX 6.1 was clearly workload partitioning (WPARs). Once you get past the marketing hype, you'll need to determine the value that WPARs can provide in your environment. What can WPARs do that logical partitions (LPARs) could not? How and when should you use WPARs? Equally as important, when should you not use workload partitioning? Finally, how do you create, configure and administer workload partitions? These are some of the topics that we'll discuss in this article, and we'll look at some of the WPAR enhancements in AIX 7.1.
|15 Nov 2011|
|Accessing Twitter from the command line
As a social networking medium, Twitter is a lot of fun. But with a bit of command-line savvy, the right API, and your programming language of choice, it can also be powerful. Learn how to access the Twitter platform to build useful and fun command-line applications.
|08 Nov 2011|
|Get to know the VIOS CLI
Discover the syntax used by the Virtual I/O Server (VIOS) command-line interface (CLI). Get a feel for VIOS commands, their intuitive flags, and how close the VIOS commands are to IBM AIX operating system commands. If you know AIX, VIOS commands are easy to learn. If you're not familiar with AIX, learning to navigate the VIOS is a great stepping stone to understanding AIX better.
|08 Nov 2011|
|AIX and USB memory sticks
USB memory sticks are cheap, cheap, cheap. As long as your hardware has USB slots, using these memory sticks is an option to consider for files that require fast reads, large data copies, or temporary file storage. This article demonstrates how to mount a USB stick on your AIX box and use it for storage.
|01 Nov 2011|
|Safer than editing
Editing a critical system file such as /etc/passwd can be tempting, but if something goes wrong, your system can become unusable. The IBM AIX operating system provides several commands and System Management Interface Tool (SMIT) menus to help you manage system files without having to edit them directly. Built-in AIX commands can also check syntax before updating critical files, offering you extra protection for files you can't afford to lose.
|01 Nov 2011|
|AIX security commands: Part 2
Management of system administration is always a tedious task. Various tools and methods are available to handle administrative activities on a system. AIX 6.1 provides different security features that help to manage user and group administration and maintain integrity on a system. This articles provides a list commands which are enabled using these features.
|25 Oct 2011|
|Securing your DB2 file systems with EFS
From AIX 6.1 onwards, user created filesystems can now be encrypted, which is implemented at the file system level. This approach allows for some applications to be encrypted, with not much overhead maintenance. One such product that can be used for data encryption is DB2. The need to encrypt application data is becoming more common, especially if backups are taken and are moved off site, or the application resides on external sites. SOX even recommends that to maintain the confidentially of the data, encryption should be strongly considered. This article demonstrates how to create a DB2 database and encrypt it under AIX and looks at common EFS commands.
|25 Oct 2011|
|The Boost Serialization library
The Boost C++ libraries make it easier to write good code, but what happens when something goes wrong? Discover the Boost Serialization library and learn how to employ serialization in your code to make debugging easier in the future.
|19 Oct 2011|
|Assign path priorities to virtualized disks
This article discusses the method for assigning physical path priorities to virtual scsi paths on VIO servers based on even/odd numbers associated with each disk and each path to disk. The script is useful in a virtualized environment utilizing VIO servers with MPIO on the client LPARs. This script also provides a system administrator with the ability to load balance manually SAN traffic from a client LPARs between dual VIO servers and across all physical adapters on the VIO server.
|18 Oct 2011|
|Tips for implementing NPIV on IBM Power Systems
Chris Gibson shares some tips for implementing NPIV in an AIX and Virtual I/O Server environment on IBM POWER7 systems.
|11 Oct 2011|
|Setting up a firewall with AIX TCP/IP filtering
The purpose of this article is to show how an AIX server can be configured to filter TCP/IP traffic using the operating systems built-in filtering capabilities. Audience for this article includes server and network administrators in the need of restricting the network traffic allowed to flow in and out of a server. This article applies to a broad set of scenarios, from hardening critical midrange database servers running in internal networks, to securing border servers handling Internet traffic, like web, DNS or email servers.
|04 Oct 2011|
|Standardizing users UID and GID numbers on AIX
If you have more than one AIX server that uses local user accounts, you probably have some inconsistent user ID (UID) and group ID (GID) numbers across the different systems. This article explains how to standardize your UID and GID numbers across all of your AIX systems so that they are consistent.
|04 Oct 2011|
|More locks for your SSH door
Security isn't an exact science, so the more difficulties you can put in a hacker's way, the better. This article considers how to enhance Secure Shell (SSH) access by eliminating passwords and using public/private key pairs instead. The article also explores how to recognize and block possible attacks, including brute-force and dictionary attacks, by denying server access to origins that are identified as unsafe.
Also available in: Spanish
|27 Sep 2011|
|When good disks go bad
It's never a matter of if a disk will fail, but when. So, what do you do when you're awakened at 2 o'clock in the morning because of file system, LVM, or SAN errors on an IBM AIX server? Or, better yet, how do you prevent them from waking you up in the first place? This article looks at strategies for managing disk resources to maximize availability, performance, and redundancy and provides techniques on how to recover from failures when good disks go bad.
|20 Sep 2011|
|Introduction to Domain RBAC
This article provides data in simplified terms for using Domain RBAC to gain granular access on resources and objects. It also gives examples on implementing domain RBAC on resources.
|20 Sep 2011|
|More Boost utilities
The Boost C++ libraries make it easier to write good code. Learn the features of Boost header files and discover helpful utilities like compressed pairs and non-copyable classes, as well as how to handle failed assertions.
|13 Sep 2011|
|Give rootvg the space it needs
The root volume group (rootvg) is the lifeblood of your IBM AIX system. It contains the AIX operating system, but you can use it for a lot more than that. A rootvg may include paging space, system dump devices, data file systems, a copy of mksysb backups, a second instance of AIX (when you use multibos), and more. With all of those possible demands on the rootvg disk, it is a good idea to keep data file systems in their own volume group and give rootvg the space it needs.
|06 Sep 2011|
|Basics of Perl web portals
Perl is a powerful scripting language that can be used to perform small operations from the command line or power a complete web portal. Understanding techniques for making safe and secure Perl CGI scripts is vital to developing a web portal that does not compromise the integrity of a server or the web site's data. This article explains several techniques that will help developers create secure Perl CGI scripts and handle errors, before looking at a simpler method for building web applications like portals using the Plack system.
|30 Aug 2011|
|Solaris to AIX
Are you moving away from Oracle or Sun Microsystems equipment to IBM System p servers? Are you more familiar with zones and LDOMs than HMCs and VIO servers? This article provides practical tips for migrating from Solaris to IBM AIX servers.
|24 Aug 2011|
|Information Lifecycle Management for AIX data using IBM SONAS
Leverage information management facilities of IBM Scaled Out Network Attached Storage(IBM SONAS) to keep AIX data managed. IBM SONAS provides you with data placement, migration and deletion policies to ease your burden of Information Lifecycle Management for AIX data and helps ensure compliance to government regulations. This article takes a deep dive to illustrate how responsibilities of AIX data management are efficiently delegated to IBM SONAS.
|16 Aug 2011|
|Monitoring events in an AIX Cluster
AIX has an event notification mechanism using file system interfaces, which is called the AIX Event Infrastructure. Cluster Aware AIX uses this to monitor cluster events, so that the failure detection time is reduced. The events happening on one node of the cluster are notified to all nodes in the cluster, and corrective action can be easily taken.
|10 Aug 2011|
|Using traps in your scripts
For scripts to be reasonably robust, one of the conditions that should ideally be met is the ability to clean up any temporary logs or processes left lying around from a forceful termination. Another element to consider is when an interrupt from a user is received, what appropriate action should be taken? With the shell built-in trap command and the logger utility, these can help to provide your scripts with more robustness when a script is forcefully terminated. In this article, I will demonstrate ways trap and logger can be used.
|26 Jul 2011|
|Get proactive with limitations in COBOL multithreading
Often businesses and government agencies need to run COBOL programs faster by running them as multithreaded applications. In reality, COBOL multithreading comes with some limitations. In this article, the author explains the pitfalls of limitations and how to handle them.
|26 Jul 2011|
|Move data quickly between AIX LPARs using Logical Volume Manager
Migrating data from one LPAR to another can be challenging. You need to set aside some disk space on the new LPAR and create file systems. And whether you choose to copy the data across the network or do a backup and restore, a large amount of data can take many hours to move. Wouldn't it be good if you could gift wrap your data, send it to a new LPAR, and then unwrap it ready to use? The IBM AIX operating system Logical Volume Manager (LVM) lets you do just that by exporting a volume group from one LPAR and importing it to another one.
|19 Jul 2011|
|AIX pluggable authentication modules
Pluggable authentication module (PAM) supports authentication mechanism. Applications can make use of this module for implementing authentication mechanism in AIX. PAM provides different service modules, and each module supports different functionality. Make use of these PAM service modules to enable PAM with authentication, account, password, and session management mechanisms in AIX.
|19 Jul 2011|
|Build a scalable open source web application using Moonlight on BSD UNIX
Have you ever built a web application that performed sluggishly, because you tried to display too many columns or rows? Moonlight is an open source implementation of Microsoft's Silverlight technology that allows large, complex web applications to perform robustly, even though they have large amounts of data to process or display. In this article, we will show you how to install Moonlight on BSD UNIX and then build an application with hundreds of columns and thousands of rows using Moonlight. No prior Moonlight experience is required.
|12 Jul 2011|
|Using TCP Wrappers to control access
TCP Wrappers allows system administrators to control and log incoming TCP-based connections to the local host run from inetd.conf. TCP wrappers, often called wrappers, can lock down popular TCP inbound clients on your AIX box quickly. Find out how wrappers can easily protect and secure your machines.
|12 Jul 2011|