Purpose
auto.master - Specifies the master input file to the AIX automount daemon defining the file systems to be controlled and their associated map files.
Description
The auto.master file is the master map file for the AIX automount daemon. It identifies the file systems that are to be controlled by the automounter and the directory map file associated with each file system. It may also contain default mount information for specific file systems. The auto.master file may reference a Network Information Service (NIS) configuration map that is to be used by the automounter. Entries in the master map file use one of the following formats:
+NIS_map Directory_path Automount_map_name [default_mount_options]
The first form specifies an NIS configuration map that contains mount point and automounter map information. The second form directly identifies the directory path of the file system that is to be controlled by the automounter, along with the map file containing entries for the supported directories within that file system. Default options to be used when the file system is mounted can be optionally specified.
Files
Related Information
AIX daemons: automount
The "Managing the automounter" chapter in PSSP: Administration Guide
The "Network File System (NFS)" and "Network Information Service (NIS)" chapters in AIX System Management Guide: Communications and Networks
Examples
The following example is a copy of the default auto.master file shipped with the SP modified to support an NIS configuration map:
# The following entry will use the NIS configuration map if NIS is # defined for this system and the database exists +auto_master # The following entry provides automount support for users' home # directories /u /etc/auto/maps/auto.u -rw,hard,retry=3,timeo=40,rsize=4096, \ wsize=4096
Purpose
|bootptab.info - Users can create this file to |specify the hardware Ethernet addresses of nodes. | |
Description
|Users can create this file to contain a list of nodes with their |hardware Ethernet addresses. When placed in the proper location, it is |used by the sphrdwrad command in place of node conditioning |(remember, node conditioning shuts down the node) to obtain the hardware |Ethernet addresses, saving a great deal of time. Each line of the |bootptab.info file must contain two tokens. The first |token represents the node, and the second token represents the hardware |Ethernet address. This information may be input in one of two |formats:
node_number hardware_ethernet_address
or
frame,slot hardware_ethernet_address
|Users do not have to specify every node and its hardware Ethernet |address in this file, but only those nodes on which they do not want to |perform node conditioning on. By putting an entry in this file for a |node, the node will not be shut down during the execution of the |sphrdwrad command.
|Location
|/etc/bootptab.info
Related Information
Commands: sphrdwrad
Examples
The following is an example of a bootptab.info file for a single framed system that contains four high nodes:
1 02608CE8764D 5 02608CE87174 1,9 02608CE87180 13 02608CE8618B
Purpose
haemloadlist File - Event Management configuration data that is to be loaded into the System Data Repository (SDR).
Description
RS/6000 Cluster Technology (RSCT), which is included with the IBM Parallel System Support Programs (PSSP) Licensed Program (LP), contains a number of resource monitors that use the Resource Monitor Application Programming Interface (RMAPI) to supply information about system resources to the Event Management subsystem. Information about the monitors and the resources is defined in the haemloadlist file and includes:
Before the Event Management subsystem can use this information, it must first be loaded into the System Data Repository (SDR) and then compiled into a binary Event Management Configuration Database (EMCDB) file. The haemloadcfg command is used to load the data from the haemloadlist file into the SDR. The haemcfg command is then used to compile the data from the SDR into the binary EMCDB file. Both of these commands are issued automatically by the haemctrl command when it is used to start the Event Management subsystem on the control workstation.
For resource monitors other than those supplied by RSCT, you must create one or more separate files in load list format to contain their Event Management configuration data. You can specify the name of any file in load list format on the haemloadcfg command.
You can use SDR commands to work with objects in the Event Management classes directly. However, IBM suggests that you use load list files and the haemloadcfg command to work with objects in these classes. The haemloadcfg command provides validation, unique to the Event Management configuration data, not available in the SDR commands.
You cannot use System Management Interface Tool (SMIT) panels to work with objects in these classes.
The Format of an Event Management Load List File
Source information for the EMCDB is kept in the several partitioned classes in the SDR, each of which has a set of associated attributes. The format of an Event Management load list file, which can be used as input to the haemloadcfg command, follows the structure of the Event Management data in the SDR.
This man page describes the format of the Event Management load list file. For detailed information about its content (the Event Management SDR classes, attributes, and their values), see the description of the EMCDB in PSSP: Event Management Programming Guide and Reference.
The haemloadlist file consists of stanzas, each of which describes an object in one of the Event Management SDR classes. The stanzas may appear in any order in the file.
Each stanza begins with the SDR class name to which the object belongs, followed by one or more lines that define the attributes of the object. The SDR class name must begin in column 1.
An attribute line consists of leading whitespace (blanks or tabs) followed by the attribute name followed by an = (equal sign) followed by a data field. The = (equal sign) may not be surrounded by blank spaces. The data field consists of a single value for the attribute. If the field contains blanks, it must be surrounded by double quotes ("). If the field contains a double quote character, it should be preceded by a backslash ( \"). If the field contains a backslash character, it should be preceded by a second backslash (\\).
The data field must be on the same line as the attribute. The attribute lines for a stanza stop at either the start of a new stanza or at the end of the file.
Comments may be present in the file. Any line in which the first nonwhite space character is a pound sign (#) is a comment. Blank lines are also considered comment lines and are ignored.
The EM_Resource_Variable Stanza
The EM_Resource_Variable SDR class contains one object for each resource variable defined in the database. Accordingly, there is one EM_Resource_Variable stanza for each resource variable that is defined.
Here is an example of a stanza that defines a resource variable of type Quantity:
EM_Resource_Variable rvName="IBM.PSSP.aixos.PagSp.totalsize" rvDescription="99" rvValue_type="Quantity" rvData_type="long" rvInitial_value="0" rvClass="IBM.PSSP.aixos.PagSp" rvPTX_name="PagSp/totalsize" rvLocator="NodeNum" rvDynamic_instance="0"
Here is an example of a stanza that defines a resource variable of type State:
EM_Resource_Variable rvName="IBM.PSSP.Prog.pcount" rvDescription="1009" rvValue_type="State" rvData_type="SBS" rvClass="IBM.PSSP.Prog" rvLocator="NodeNum" rvDynamic_instance="1"
The EM_Structured_Byte_String Stanza
The EM_Structured_Byte_String SDR class contains one object for each structured field that is defined in a structured byte string. Accordingly, there is one EM_Structured_Byte_String stanza for each structured field that is defined.
The IBM.PSSP.Prog.pcount resource variable is an SBS that has three structured fields. Here is an example of the stanzas that define the fields:
EM_Structured_Byte_String sbsVariable_name="IBM.PSSP.Prog.pcount" sbsField_name="CurPIDCount" sbsField_type="long" sbsField_SN="0" EM_Structured_Byte_String sbsVariable_name="IBM.PSSP.Prog.pcount" sbsField_name="PrevPIDCount" sbsField_type="long" sbsField_SN="1" EM_Structured_Byte_String sbsVariable_name="IBM.PSSP.Prog.pcount" sbsField_name="CurPIDList" sbsField_type="cstring" sbsField_SN="2"
The EM_Resource_ID Stanza
The EM_Resource_ID SDR class contains one object for each resource ID element that is defined for a resource and all of its resource variables. Accordingly, there is one EM_Resource_ID stanza for each resource ID element that is defined.
Here are some examples of stanzas that define resource IDs. The resource ID for the resource named IBM.PSSP.aixos.PagSp contains only one resource ID element. The resource ID for the resource named IBM.PSSP.Prog contains three elements.
EM_Resource_ID riResource_name="IBM.PSSP.aixos.PagSp" riElement_name="NodeNum" riElement_description="701"
EM_Resource_ID riResource_name="IBM.PSSP.Prog" riElement_name="UserName" riElement_description="701" EM_Resource_ID riResource_name="IBM.PSSP.Prog" riElement_name="ProgName" riElement_description="701" EM_Resource_ID riResource_name="IBM.PSSP.Prog" riElement_name="NodeNum" riElement_description="701"
The EM_Resource_Class Stanza
The EM_Resource_Class SDR class contains one object for each resource variable class that is defined in the database. Accordingly, there is one EM_Resource_Class stanza for each resource variable class that is defined.
Here are two examples of stanzas that define resource classes:
EM_Resource_Class rcClass="IBM.PSSP.aixos.PagSp" rcResource_monitor="aixos" rcObservation_interval="30" rcReporting_interval="0"
EM_Resource_Class rcClass="IBM.PSSP.Prog" rcResource_monitor="IBM.PSSP.harmpd" rcObservation_interval="0" rcReporting_interval="0"
The EM_Resource_Monitor Stanza
The EM_Resource_Monitor SDR class contains one object for each resource monitor that is defined in the database. Accordingly, there is one EM_Resource_Monitor stanza for each resource monitor that is defined.
Here are some examples of stanzas that define resource monitors:
EM_Resource_Monitor rmName="IBM.PSSP.harmpd" rmPath="/usr/lpp/ssp/bin/haemRM/harmpd" rmMessage_file="PEM.cat" rmMessage_set="2" rmConnect_type="server" rmPTX_prefix="0" rmPTX_description="0" rmPTX_asnno="0"
EM_Resource_Monitor rmName="IBM.PSSP.harmld" rmPath="/usr/lpp/ssp/bin/haemRM/harmld" rmMessage_file="harm_des.cat" rmMessage_set="1" rmConnect_type="server" rmPTX_prefix="IBM/PSSP.harmld" rmPTX_description="1,2" rmPTX_asnno="2"
Location
/usr/sbin/rsct/install/config/haemloadlist
Related Information
Commands: haemcfg, haemloadcfg
For a general overview of configuring Event Management, see "The Event Management subsystem" chapter of PSSP: Administration Guide.
For a description of the SDR classes and attributes that are related to the EMCDB, see PSSP: Event Management Programming Guide and Reference.
Purpose
/spdata/sys1/spmon/hmacls - Defines the Access Control Lists (ACLs) used by the Hardware Monitor daemon.
Description
The /spdata/sys1/spmon/hmacls file contains permission specifications for users to execute the various Hardware Monitor operations. Each line in the file consists of three white-space separated tokens in the following format:
obj user_name permissions
The obj token is either a frame ID or the host name of the control workstation (known as the Monitor and Control Node (MACN) by the Hardware Monitor). The user_name token is the user's principal name or principal name and instance.
The permissions token specifies which operations the user specified by the user_name token can execute against the object specified by the obj token.
If the obj token is a frame ID, the permissions token is one or more characters taken from the set v, s, and m. A definition of each follows:
The VFOP permission implies the monitor permission. These permissions are described in the various commands. If the obj token is the MACN host name, the permissions token must be the character a. The character a is the administrative permission required to use the hmadm command.
Users are authorized to use the Hardware Monitor by virtue of having their names in the /spdata/sys1/spmon/hmacls file and have issued the k4init command with that name.
Files
Related Information
Commands: hmadm, hmcmds, hmmon, nodecond, s1term
Examples
The following is an example of a hmacls file:
workstn3.kgn.ibm.com john.admin a 1 john.admin vsm 2 john.admin vsm 3 john.admin vsm 1 mary m 2 mary m 3 mary m
Purpose
hmthresholds - provides a software mechanism for applying threshold values to SP Frame, Node, and Switch environmental conditions such as voltage, amperage, and temperature. The Hardware Monitor (hardmon), with the aid of the Logging Daemon (splogd), provides notification to the ERRPT when an applied threshold value is crossed. This software checking, if enabled, is done in parallel with the internal self-checking done by the hardware itself.
Description
The /spdata/sys1/spmon/hmthresholds file contains threshold values in the form of low/high warning conditions, and low/high shutdown conditions. Each line in the file, excluding comment lines, which begin with a # (pound sign) in column one, consists of at least three white-space separated tokens in the following format:
node_type low_value high_value [ [low_value high_value] [... ...] ]
The node_type token is the value of the Hardware Monitor variable "type" which is the definitive identifier for the SP Supervisor card that is installed in the hardware for any given slot. Use the hmmon command to obtain the value of the variable "type" for a given node.
For example, using an SP2 wide node with 4.0 volt power:
$ hmmon -G -Q -v type 1:1 frame 001, slot 01: supervisor type 0x0051
low_value and high_value are token pairs that are the low/high values for the environmental condition you want to threshold.
For example, examine the following excerpt from the /spdata/sys1/spmon/hmthresholds file.
# # #### SP2 wide node w/4.0 volt power: # VOLTP5M VOLTP12 VOLTN12 VOLTP5I TEMP VOLTP4 # low high low high low high low high low high low high # Warning thresholds # 0x51 4.75 5.4 11.0 13.0 11.0 13.0 4.75 5.4 0x00 45.0 3.46 4.2 # Shutdown thresholds # 0x51 4.50 5.75 10.2 13.8 10.2 13.8 4.50 5.75 0x00 60.0 3.28 4.4 # Software thresholding disabled 0x51 0x00 0xff 0x00 0xff 0x00 0xff 0x00 0xff 0x00 0xff 0x00 0xff
The node_type is 0x51. It is an SP2 wide node w/4.0 volt power. There are three sets of token pairs defined (only one is uncommented). Each of the three sets contain six token pairs. The six token pairs are the low/high threshold values for, in order from left to right, +5 volts memory, +12 volts, -12 volts, +5 volts I/O, temperature, and +4 volts. The first set establishes warning thresholds, the second establishes shutdown thresholds. The last set, which is the one used by the Hardware Monitor since its the one that's uncommented, effectively disables environmental checking since the low/high value pairs are set to maximum low and maximum high.
For hardware that does not report environmental conditions there is a dummy entry in the /spdata/sys1/spmon/hmthresholds file. Recall that at least three white-space separated tokens are required for each SP hardware type supported by the Hardware Monitor.
For example, examine the following excerpt from the /spdata/sys1/spmon/hmthresholds file for an SP Switch and Twin-Tail Frame hardware in basecode, or non-active, mode:
# # #### SP Switch - base code only; no supervisor: # DUMMY (cardtype has no A/D registers) # low high # Software thresholding disabled 0x80 0x00 0xff # # #### twin-tail frame - base code only; no supervisor: # DUMMY (cardtype has no A/D registers) # low high # Software thresholding disabled 0x10 0x00 0xff
Enabling Software Thresholding
Software thresholding can be enabled in one of following ways:
Low/high threshold values (token pairs) are coded as either decimal (base 10), or hex. Temperatures are in Celsius. Volts are volts. Amps are amps. You can enable any number of threshold low/high pairs. In other words, you need not enable all of the value pairs if it is only a subset of them that you are interested in.
For example, assume that you suspect the room temperature is causing SP2 wide nodes w/4.0 volt power to overheat and you want to be notified in advance of the released warning threshold.
# # #### SP2 wide node w/4.0 volt power: # VOLTP5M VOLTP12 VOLTN12 VOLTP5I TEMP VOLTP4 # low high low high low high low high low high low high # Warning thresholds # 0x51 4.75 5.4 11.0 13.0 11.0 13.0 4.75 5.4 0x00 45.0 3.46 4.2 # Shutdown thresholds # 0x51 4.50 5.75 10.2 13.8 10.2 13.8 4.50 5.75 0x00 60.0 3.28 4.4 # Software thresholding disabled # 0x51 0x00 0xff 0x00 0xff 0x00 0xff 0x00 0xff 0x00 0xff 0x00 0xff # Software thresholding enabled 0x51 0x00 0xff 0x00 0xff 0x00 0xff 0x00 0xff 0x00 35.0 0x00 0xff
In the example, note that a temperature limit of 35 degrees Celsius has been coded (it's the uncommented line and again the only one that the Hardware Monitor will read). All other threshold values on that same line remain disabled. This does not mean that the node will never get hotter than 35 degrees. It means that you will be notified when this temperature is reached.
Deciding What Threshold Value To Use
Using the hmmon command you can query the Hardware Monitor for the nodes' environmental values. If you query more than once, with a 5 second lapse between queries (the Hardware Monitor refreshes itself with hardware state data every 5 seconds), you should begin to see a pattern develop. The information returned will provide insight into what values to use when coding your own low/high threshold pairs.
For example, using an SP2 wide node with 4.0 volt power:
$ hmmon -Q -s -v temp 1:1 1 1 temp 36.480 0x9034 temperature $ hmmon -Q -s -v temp 1:1 1 1 temp 38.916 0x9034 temperature $ hmmon -Q -s -v temp 1:1 1 1 temp 39.212 0x9034 temperature $ hmmon -Q -s -v temp 1:1 1 1 temp 38.882 0x9034 temperature
In the example, you can see that the nodes' temperature seems to be hovering around 38-39 degrees. This is only 6 or 7 degrees below the established nominal warning condition. You may choose to establish a high warning threshold value of approximately 40 degrees.
hmmon "-r (raw)" and "default" formats do not cause hmmon to apply the scalar value. These two formats display information exactly as it's obtained from the Hardware Monitor - to be more specific, from the hardware itself which holds the values in a "normalized" format.
Environmental Condition Notification
Environmental condition checking and notification comes in two flavors, Hardware Out-Of-Spec Notification and Software Out-Of-Range Notification.
If a hardware out-of-spec environmental condition occurs the Frame, Node, or Switch Supervisor will alert the Hardware Monitor. hardmon will in turn report the out-of-spec state to interested parties, such as the Logging Daemon. splogd will cut an ERRPT entry. This all happens regardless of whether software thresholding is enabled or disabled. That is, it is a function of the hardware itself.
The following is an example of the hardware out-of-spec environmental states for an SP2 wide node w/4.0 volt power:
$ hmmon -G -Q -s 1:1 1 1 warningN12Low FALSE 0x9073 -12 volt low warning 1 1 shutdownN12Low FALSE 0x9074 -12 volt low shutdown 1 1 warningN12High FALSE 0x9075 -12 volt high warning 1 1 shutdownN12High FALSE 0x9076 -12 volt high shutdown 1 1 warningP12Low FALSE 0x9064 +12 volt low warning 1 1 shutdownP12Low FALSE 0x9065 +12 volt low shutdown 1 1 warningP12High FALSE 0x9062 +12 volt high warning 1 1 shutdownP12High FALSE 0x9063 +12 volt high shutdown 1 1 warningP5mLow FALSE 0x907b +5m volt low warning 1 1 shutdownP5mLow FALSE 0x907c +5m volt low shutdown 1 1 warningP5mHigh FALSE 0x907d +5m volt high warning 1 1 shutdownP5mHigh FALSE 0x907e +5m volt high shutdown 1 1 warningP5iLow FALSE 0x907f +5i volt low warning 1 1 shutdownP5iLow FALSE 0x9080 +5i volt low shutdown 1 1 warningP5iHigh FALSE 0x9081 +5i volt high warning 1 1 shutdownP5iHigh FALSE 0x9082 +5i volt high shutdown 1 1 fanwarning5 FALSE 0x9055 fan 5 warning 1 1 fanfail5d FALSE 0x9070 fan 5 delayed shutdown 1 1 warningTemp FALSE 0x9058 temperature warning 1 1 shutdownTemp FALSE 0x9059 temperature shutdown 1 1 warningP4Low FALSE 0x9087 +4 volt low warning 1 1 shutdownP4Low FALSE 0x9088 +4 volt low shutdown 1 1 warningP4High FALSE 0x9089 +4 volt high warning 1 1 shutdownP4High FALSE 0x908a +4 volt high shutdown 1 1 fanwarning1 FALSE 0x904d fan 1 warning 1 1 fanfail1d FALSE 0x906b fan 1 delayed shutdown
1 1 fanwarning2 FALSE 0x904f fan 2 warning 1 1 fanfail2d FALSE 0x906c fan 2 delayed shutdown 1 1 fanwarning3 FALSE 0x9051 fan 3 warning 1 1 fanfail3d FALSE 0x906e fan 3 delayed shutdown 1 1 fanwarning4 FALSE 0x9053 fan 4 warning 1 1 fanfail4d FALSE 0x906f fan 4 delayed shutdown
In the example, there are no hardware out-of-spec conditions since the environmental states are not asserted. That is, they are all FALSE.
The software out-of-range environmental state will transition to FALSE when the Hardware Monitor detects that the nodes' environmental condition has settled between the low/high threshold value coded in /spdata/sys1/spmon/hmthresholds. That is, has either crossed the low or high value toward the norm, or average value.
The following is an example of the software out-of-range environmental states for an SP2 wide node w/4.0 volt power.
$ hmmon -G -Q -s 1:1 1 1 voltP5mRange FALSE 0x9092 +5 mem volts out of range 1 1 voltP12Range FALSE 0x908e +12 voltage out of range 1 1 voltN12Range FALSE 0x9091 -12 voltage out of range 1 1 voltP5iRange FALSE 0x9090 +5 I/O volts out of range 1 1 tempRange FALSE 0x9084 temperature out of range 1 1 voltP4Range FALSE 0x9093 +4 voltage out of range
In the example, there are no software out-of-range conditions since the environmental states are not asserted. That is, they are all FALSE. Note that the environmental states end with the suffix "Range". This is true of all software out-of-range environmental state variables.
If a software out-of-range environmental condition were to occur the Hardware Monitor would report the out-of-range state to interested parties, such as the Logging Daemon, by transitioning the state to TRUE. splogd will cut an ERRPT entry.
The following is an example of an ERRPT entry for a temperature out-of-range condition:
LABEL: SPMON_INFO103_TR IDENTIFIER: 0D1620A8 Date/Time: Thu Jul 9 12:15:04 Sequence Number: 47977 Machine Id: 000044587000 Node Id: k4s Class: H Type: UNKN Resource Name: sphwlog Resource Class: NONE Resource Type: NONE Location: NONE Description THRESHOLD HAS BEEN EXCEEDED Probable Causes POWER SUBSYSTEM COOLING FAN
THERMAL DETECTOR Failure Causes POWER SUBSYSTEM COOLING FAN THERMAL DETECTOR Recommended Actions NONE Detail Data DETECTING MODULE LPP=PSSP,Fn=splogd.c,SID=1.16.1.16,L#=925, DIAGNOSTIC EXPLANATION Information; Node 1:1; tempRange; Value out of range.
If the software out-of-range environmental condition was to transition toward the norm, or average value, the Hardware Monitor would transition the state to FALSE and notify interested parties such as the Logging Daemon. splogd will cut an ERRPT entry.
The following is an example of an ERRPT entry for a temperature out-of-range condition that transitioned to FALSE:
LABEL: SPMON_INFO104_TR IDENTIFIER: E91A5929 Date/Time: Thu Jul 9 12:15:09 Sequence Number: 47978 Machine Id: 000044587000 Node Id: k4s Class: H Type: TEMP Resource Name: sphwlog Resource Class: NONE Resource Type: NONE Location: NONE Description PROBLEM RESOLVED Probable Causes POWER SUBSYSTEM COOLING FAN
THERMAL DETECTOR UNDETERMINED Failure Causes POWER SUBSYSTEM COOLING FAN THERMAL DETECTOR Recommended Actions NONE Detail Data DETECTING MODULE LPP=PSSP,Fn=splogd.c,SID=1.16.1.16,L#=925, DIAGNOSTIC EXPLANATION Information; Node 1:1; tempRange; Condition cleared.
Implementation Specifics
This file is part of the PSSP ssp.basic fileset.
Location
/spdata/sys1/spmon/hmthresholds
Related Information
Commands: hmmon
Subsystems: Hardware Monitor (hardmon), Logging Daemon (splogd)
Examples
The following is an example of the software out-of-range environmental states for an SP2 wide node w/4.0 volt power.
$ hmmon -G -Q -s 1:1 1 1 voltP5mRange FALSE 0x9092 +5 mem volts out of range 1 1 voltP12Range FALSE 0x908e +12 voltage out of range 1 1 voltN12Range FALSE 0x9091 -12 voltage out of range 1 1 voltP5iRange FALSE 0x9090 +5 I/O volts out of range 1 1 tempRange FALSE 0x9084 temperature out of range 1 1 voltP4Range FALSE 0x9093 +4 voltage out of range
Purpose
host - Contains all hostnames of the nodes within the SP.
Description
This file is used by file collection servers to restrict only the clients whose hostnames are listed in this host file. This file is used by non-DCE file collection servers. It is also used by DCE enabled control workstation file collection servers when the client is a non-DCE SP node. The lines starting from # characters are ignored and used to enter comments. The special comments
delimiter #END_SP_NODES
is used by some scripts to update this file. This delimeter separates the non-SP node entries from SP node entries. The format of the file is:
spnode_hostname1 spnode_hostname2 # This is a comment line... #END_SP_NODES non_spnode_host1 non_spnode_host2
Files
All /var/sysman/sup/*/host files:
Location
/var/sysman/sup/*/host
Related Information
Commands: supfilesrv, supper
Examples
An example host file:
# This file is generated by filec_host script on Jan 7, 1998. # This contains the hostnames of all the nodes in the SP. spnode1 spnode2 #END_SP_NODES workstation1 workstation2
Purpose
hwevents - Contains state change actions that are to be performed by the logging daemon (splogd). The Hardware Monitor (hardmon) detects these state changes, and notifies the logging daemon. The Logging Daemon (splogd) can perform three different operations, based on information in hwevents. It can 1) write state changes to the ERRPT, 2) write state changes to a log file, 3) run user exits when specified state changes occur.
Description
The /spdata/sys1/spmon/hwevents file contains lines that specify one of the three operations described in the Purpose section. Each line in the file, excluding comment lines, which begin with a # (pound sign) in column one, consists of at least seven white-space separated tokens in the following format:
Following is a description of these tokens:
There are two special keywords for function. If function is SP_ERROR_LOG, error logging is performed provided that syslog is set up and AIX error logging is set up to perform SP logging. Refer to the setup_logd command for details.
If function is SP_STATE_LOG, these state changes that meet the statement's criteria are logged to /var/adm/SPlogs/spmon/splogd.state_changes.timestamp.
Files
/spdata/sys1/spmon/hwevents
/var/adm/SPlogs/spmon/splogd.state_changes.timestamp
Related Information
PSSP commands: hmmon
Subsystems: Logging Daemon (splogd), Hardware Monitor (hardmon)
Examples
The following is an example of an hwevents file:
# frame slot variable operator value time function * * * = * b SP_ERROR_LOG * * type = * b /usr/lpp/ssp/install/bin/SDR_config -l * * hostHWFrameID != 0 c /usr/lpp/ssp/install/bin/SDR_config -l * * hostHWSlotID != 0 c /usr/lpp/ssp/install/bin/SDR_config -l * * mux = * c /usr/lpp/ssp/bin/Eclock.state_change -s * * portClkMissing = 1 c /usr/lpp/ssp/bin/Eclock.state_change -s * * chipClkMissing = 1 c /usr/lpp/ssp/bin/Eclock.state_change -s * 17 nodePower = * c /usr/lpp/ssp/bin/Eclock.state_change -p * NODES_ONLY PowerOnRequest = 1 b /usr/lpp/ssp/install/bin/spexpon # # # Uncomment the SP_STATE_LOG line to turn state change logging on. # If you run with state change logging on, be sure you have a large enough /var. # The state change logs will be closed each night on the control workstation # if they exist and any that are older than a week will be removed by # cleanup.logs.ws. # # * * * = * c SP_STATE_LOG
Purpose
.klogin - Specifies remote principals that can use a local user account.
Description
The $HOME/.klogin file defines which users and services on any remote hosts (computers in a network) within an authentication realm are allowed to invoke commands on the local user account.
The format of the $HOME/.klogin file is:
principal.instance@realm
A typical .klogin file, if present, looks similar to the following:
harry@KGN.IBM.COM beverly.root@KGN.IBM.COM root.admin@KGN.IBM.COM user.wkst3@KGN.IBM.COM user1@KGN.IBM.COM rcmd.wkst3@KGN.IBM.COM
The principal name is the name of the remote user using SP authentication to execute remote commands on a local user account.
The instance is used to distinguish among variations on the principal name and may be used to indicate special privileges such as root authorization. In many environments, the instance is used with a service to indicate the workstation the service is running on. The service entries are usually found only in the root directory .klogin file.
The realm is the authentication realm. This may be different if there are several authentication realms, each with a different realm name, in your environment.
If the originating remote user is authenticated to one of the principals named in the .klogin file, access is granted to the account. The owner of the account is granted access if there is no .klogin file. If a .klogin file is present, the owner must also be listed to gain access to his or her account from a remote host.
For security reasons, any $HOME/.klogin file must be owned by either the local user or root, and only the owner should have read and write access.
Files
Prerequisite Information
Related Information
Commands: k4init
Examples
The following examples assume both Jeff and Anna have principal names in the authentication database (anna@KGN.IBM.COM, jeff@KGN.IBM.COM) and have issued a k4init to be authenticated on their local host. In addition, there is one authentication realm signified by KGN.IBM.COM.
anna@KGN.IBM.COM jeff@KGN.IBM.COM
Anna's entry must be present in the .klogin file since the .klogin file exists. Jeff can now use the -l flag on the rsh or rcp to access Anna's account.
Purpose
Kerberos - Contains an introduction to SP authentication services.
Description
Kerberos authenticates individual users in a network environment. After authenticating your identity, you can use facilities such as Sysctl, the SP System Monitor, and the authenticated versions of network utilities rsh and rcp, without having to present passwords to remote hosts and without having to use .rhosts files.
Before you can use the SP authenticated commands, you must make sure that you are added to the authentication database. You can use the k4init command to find out. This command tries to authenticate your identity in the system. The k4init command prompts you for a principal name and password. Enter your principal name and password. If the command accepts your authentication information without sending you a message, you are already registered. If you enter your user name and k4init responds with the following message:
Kerberos principal unknown
contact your system administrator.
A principal identifier contains three parts. The first is the user or service name. The second is the instance, which in the case of a user is usually null. Some users can have privileged instances, however, such as root or admin. In the case of a service, the instance is the name of the machine on which it runs (for example, there can be a rcmd ( sysctld daemon) service running on the machine abc, which is different from the kshd service running on the machine xyz). The third part of the name is the realm. The realm corresponds to the service providing authentication for the principal. For example, computing resources within an enterprise can be partitioned into multiple administrative units for convenience or other business reasons.
When writing a principal identifier, the user or service name is separated from the instance (if not null) by a period, and the realm (if not the local realm) follows, preceded by an at sign (@).
When you authenticate your identity using the k4init command, you are given an initial ticket (which is an encrypted protocol message that provides authentication). This ticket is used to request other tickets from the authentication service for SP authenticated services such as SP sysctl. The ticket transactions are done transparently, so you do not have to worry about their management.
Be aware that tickets expire. Some tickets, such as admin instance tickets, may expire in a few minutes, while other tickets may be good for hours, days, or weeks depending on the installation's policy. If your login session extends beyond the time limit, you have to reauthenticate your identity using the k4init command to get new tickets.
For more information about the k4init and k4destroy commands, see the k4init and k4destroy command.
Related Information
Commands: kadmin, k4destroy, k4init, k4list, kpasswd
Purpose
krb.conf - Contains the SP authentication configuration file.
Description
The krb.conf file contains configuration information describing the local authentication realm and the location of authentication servers for known realms.
The first line of the krb.conf file contains the name of the local authentication realm. Each additional line specifies the location (hostname) of a Kerberos V4 authentication server for a realm. The krb.conf file must contain at least one entry for each realm used by the local system. The krb.conf file must contain at least one entry for each realm that is accessible from the local system. Each line specifying the location of an authentication server must be of the form:
REALM_NAME host_name
or
REALM_NAME host_name admin server
An entry containing "admin server" identifies the primary Kerberos V4 authentication server for a realm. Only one system can be the primary server for a realm. Any number of systems can be secondary servers. For example, the following is a krb.conf file describing a realm named XYZ.ORG, with a primary server named host2, and a secondary server on host1:
XYZ.ORG XYZ.ORG host1.xyz.org XYZ.ORG host2.xyz.org admin server
The file may contain multiple entries for a system, each containing a different network interface name for the server system. This is useful in improving availability in case a particular interface is down or in case not all systems in the realm can access the server on the same network. The example shown above might have the additional entries:
XYZ.ORG host1a.xyz.org XYZ.ORG host2a.abc.xyz.org admin server XYZ.ORG host2b.xyz.org admin server
Note that all entries for any given system must include "admin server" or not, since a system cannot be the primary Kerberos V4 server and a secondary server at the same time.
All lines after the first can be in any order. When there are multiple server entries for a realm, Kerberos V4 authentication requests are directed to each listed interface in the order listed. When a connection request times out, the next entry for the realm is used.
The setup_authent command uses the krb.conf file to decide how to configure an RS/6000 workstation for Kerberos V4 authentication. You may or may not have to create this file, depending on the Kerberos V4 configuration choices you have made about the types and location of servers:
Location
/etc/krb.conf
Related Information
Files: krb.realms
Refer to the chapter on security in PSSP: Administration Guide for additional Kerberos information.
Examples
The following example of an /etc/krb.conf shows a simple configuration consisting a single realm with two servers, the primary and one secondary:
EAST.COAST EAST.COAST master.authent.abc.com admin server EAST.COAST backup.authent.abc.com
Here, "admin server" identifies the system whose full host name is "master.authent.abc.com" as the primary server, responsible for administration of the master database. Note that, in this case, there would have to be information in the /etc/krb.realms file to map the two host names or the domain name authent.abc.com to the local realm name, "EAST.COAST". See the Example section of the krb.realms file.
Purpose
krb.realms - Specifies the translations from host names to authentication realms.
Description
The krb.realms file provides a translation from a host name or a network domain name to the authentication realm name for the services provided by that host. Each line of the translation file is in one of the following forms (domain names should begin with a period (.)):
host_name realm_name domain_name realm_name
If a host name exactly matches the host_name field in a line of the first form, the corresponding realm is the realm of the host. If a host name does not match any host_name in the file but its domain exactly matches a domain name, the corresponding realm is the realm of the host.
If no translation entry applies, the host's realm is considered to be the host name's domain portion converted to uppercase. If the host name does not contain a domain name, the host's realm is considered to be the host name converted to uppercase.
Location
/etc/krb.realms
Related Information
Files: krb.conf
Refer to the chapter on security in PSSP: Administration Guide for additional Kerberos information.
Examples
The following example of an /etc/krb.realms shows the entries that could be used to map a host name or a domain name to a realm. These names correspond to those used in the krb.conf file example.
master.authent.abc.com EAST.COAST
.authent.abc.com EAST.COAST
The first line maps a specific host name to the realm "EAST.COAST". If the host name were "master.east.coast", no entry would have been required. The second entry maps all host names whose domain portion is "authent.abc.com" to the same domain. The default mapping for this realm is:
.east.coast EAST.COAST
This type of mapping is always assumed, even if the /etc/krb.realms file is empty.
|Purpose
|plane.info - Overrides SDR_config's |default switch plane assignments for the switches. | |
|Description
Attention |
---|
The switch plane numbering scheme you provide in this file must match the physical switch-to-switch wiring of the switches in the system. |
|The plane.info input file overrides |SDR_config's default switch plane assignments for the |switches. |This file can be used only on SP Switch2 systems. This file consists of one line for each node with the following |format:
|frame_number:slot_number plane_number sequence_number
|The sequence number is the switch number within the plane. For |example, the first switch in each plane has a sequence number of 1, the second |switch in each plane has a sequence number of 2, and so on.
|When SDR_config is run, it creates a version of the |plane.info file in /var/adm/SPlogs/sdr that contains |the configuration SDR_config used for the system. To override |this configuration, copy the /var/adm/SPlogs/sdr/plane.info |file to /etc/plane.info, edit it to reflect the configuration |you want, and rerun SDR_config.
|Location
|/etc/plane.info
|Examples
|A plane.info file on a two plane system with four switch |frames may look similar to the following:
|1:17 0 1 |2:17 1 1 |3:17 0 2 |4:17 1 2
Purpose
P3_PCI.addrs - Contains the mapping of the Power3 SMP High Node ports to PCI adapter addresses. It is used to determine the physical SP Expansion I/O unit that an adapter resides in.
Description
To determine the physical SP Expansion I/O unit an adapter resides in, perform the following steps:
splstdata -x -l <node_number>
node_port PCI_1 PCI_2 PCI_3 PCI_4 PCI_5 PCI_6 PCI_7 PCI_8 --------- ----- ----- ----- ----- ----- ----- ----- ----- Q1 E0-58 E0-60 D0-58 D0-60 G0-58 G0-60 F0-58 F0-60 Q2 A0-58 A0-60 90-58 90-60 C0-58 C0-60 B0-58 B0-60 Q3 W0-58 W0-60 V0-58 V0-60 Y0-58 Y0-60 X0-58 X0-60 Q4 S0-58 S0-60 R0-58 R0-60 U0-58 U0-60 T0-58 T0-60 Q5 N0-58 N0-60 M0-58 M0-60 Q0-58 Q0-60 P0-58 P0-60 Q6 J0-58 J0-60 H0-58 H0-60 L0-58 L0-60 K0-58 K0-60 Q7 60-58 60-60 50-58 50-60 80-58 80-60 70-58 70-60
Location
/usr/lpp/ssp/config/hardware/P3_PCI.addrs
Examples
See the Description section.
Purpose
SDR_dest_info - Provides connection addresses for System Data Repository (SDR) clients.
Description
The SDR_dest_info file provides connection addresses for System Data Repository (SDR) clients. It contains the following fields:
Related Information
Refer to the PSSP: Administration Guide for additional information on the SDR_dest_info file.
Examples
This example shows the contents of an SDR_dest_info file for a node. The node is a member of system partition 129.40.127.46. The default system partition on this system is 129.40.127.47. The host name of the node's system partition is k99sp1. The host name of the default system partition is k99s.
default:129.40.127.47 primary:129.40.127.46 nameofprimary:k99sp1 nameofdefault:k99s
Purpose
spsec_overrides - Specifies the format for the SP Security Services customization file.
Description
The spsec_overrides file is used by a system administrator to override the default names and attributes of DCE entities created when SP trusted services are configured to use DCE authentication. The default names and attributes are defined in the /usr/lpp/ssp/config/spsec_defaults file. Refer to this defaults file when customizing your spsec_overrides file.
The overrides must be defined and applied to the file on the control workstation prior to the configuration of DCE for SP trusted services using the config_spsec command or its SMIT interface. The same file is automatically propagated to each node when DCE is configured on it. For independent workstations, you must insure that the same overrides file is copied to each |node prior to running config_spsec there.
Possible reasons for changing one or more names could be:
Each entry consists of one line of ASCII text. Fields are separated by colons. An entry containing a pound sign (#) as the first character is considered a comment with all characters between the pound sign and the new-line character part of the comment. All comment entries and empty lines are ignored.
Entries have the general format: entry-type:default-name:override-information.
SVC-GRP entry: to override the name of the DCE group to which the principals used by SP trusted services belong, add a line with the following format: SVC-GRP:spsec-services:override-name where override-name a DCE group name to be used in place of "spsec-services."
SVC-ORG entry: to override the name of the DCE organization to which the principals used by SP trusted services belong, add a line with the following format: SVC-ORG:spsec-services:override-name where: override-name a DCE organization name to be used in place of "spsec-services."
ADM-GRP entry: to override the name of the DCE group which will have "control" access to all ACLs created by SP trusted services, add a line with the following format: ADM-GRP:spsec-admin: override-name where: override-name a DCE group name to be used in place of "spsec-admin."
SERVICE entry: to override the default name of a trusted service (used as the constant part of its service principal name) and/or the user and group that owns the keytab file, add a line with the following format: SERVICE:default-name:[override-name][:new-owner:new-group] where:
ACC-GRP entry: to override the name of the DCE group which will have access to some resources managed by an SP trusted service, add a line with the following format: ACC-GRP:default-name:[override-name][ :p] where:
Location
/spdata/sys1/spsec/spsec_overrides
Related Information
Commands: sptgtprin, spgrpname
Examples
# Local overrides for security services information # Rename a service from ppe/pmdv2 to ppe/psched SERVICE:ppe/pmdv2:psched # Rename group 'haem-users' to 'operators' and partition it ACC-GRP:haem-users:operators:p # Rename the control group for ACLs ADM-GRP:spsec-admin:system-admin
|Purpose
|switch.info - Overrides SDR_config's |default switch node number assignments for the nodes. | |
|Description
Attention |
---|
If your system contains an SP Switch, the switch node numbering scheme you provide in this file must match the physical wiring of the nodes to the switch ports. |
|The switch.info file is an input file that overrides |SDR_config's default switch node number assignments for the |nodes. It cannot be used in SP Switch2 systems.
|For SP-attached servers and for clustered enterprise servers with the SP |Switch, entries are automatically placed in this file by the spframe |command when the command is run with the -n flag.
|For IBM pSeries 690 servers that are running in SMP mode or |which only have one logical partition (LPAR) defined, the spframe |command with the -n flag can be used to specify the node's |switch node number. For p690 servers that have more than one LPAR |defined, you must manually edit the switch.info file to |include switch node numbers for all LPARs in that server before running the |spframe command. In this case, do not specify the |-n flag when running the spframe command. Each |LPAR corresponds to one node in the frame and the node slot number is |equivalent to the "Partition ID" that has been assigned to the LPAR by the |Hardware Management Console (HMC). The "Partition ID" can be viewed |from the "Properties" menu for that LPAR from the HMC GUI.
|This file consists of one line for each node with the following |format:
|node_number|frame_number,slot_number |switch_node_number
|Location
|/etc/switch.info
|Examples
|To define switch node numbers for nodes 16, 20, 24, and 28 in one of two |ways:
|16 0 |20 1 |24 2 |28 3
|or
|2,1 0 |2,5 1 |2,9 2 |2,13 3
Purpose
sysctl_acl - Contains the format for the ACL files used by Sysctl.
Description
The sysctl_acl file is used to specify the authority that various individual clients or types of clients are to be granted with respect to accessing objects associated with it. These objects represent resources controlled by Sysctl when DCE is not being used.
The ACLs used by Sysctl have a format that is upwardly compatible with those used by the Sysctl service in prior PSSP releases. They are ASCII text files and may be edited directly by the root user or managed using the Sysctl built-in commands provided for that purpose.
An ACL consists of a set of one or more ACL entries. ACL entries are separated by the new-line character. Each ACL file is identified by a first line containing #acl#.
ACL Entries
Each entry is a single line of ASCII text composed of three fields in the following format: entry_type [name] [-] where:
ACL entry fields are separated by white space characters. White space characters are allowed within an ACL entry:
White space characters are not allowed within a subject's name.
An ACL entry containing a pound sign (#) as the first character of the entry is considered a comment, with all characters between the pound sign and the new-line character part of the comment. All comment entries will be ignored during the access check algorithm and will not affect the access granted (or denied) by the ACL. (This includes the #acl# line that was required to be the first line in the file in prior releases; it is no longer required.)
ACL Entry Types
The ACL entry_type specifies the type of client to which the entry applies or indicates another ACL file. The following ACL entry types are supported:
ACL entry_type keywords are not case sensitive, and can be lowercase characters, uppercase characters, or mixed upper and lowercase characters. Unique abbreviations containing a minimum of two characters may be used.
ACL Entry Name
The ACL entry name field is required for entries of type _principal and _acl_file. A name may not be specified for entries of type _any_other and _other_unauth.
For ACL entries of type _principal, the name field should contain a Kerberos V4 principal name, when the Sysctl server host uses Kerberos V4 authentication. The name may be specified in any of the following forms:
If you want to authorize unauthenticated users, the name field should contain an AIX user name, which may be specified in either of the following forms:
Note that unauthenticated AIX names are checked for authorization only if the client has no authenticated identity. If an authenticated client is denied access, the ACL is not checked for an entry containing the client's AIX user name.
The access rights granted to a client by the ACL file are determined by the following algorithm:
For ACL entries of type _acl_file, the name field should contain a fully qualified pathname.
Denial of permission
The character '-' may be specified as a third field of _principal entry to indicate that access is to be denied to a user.
Access Checking
The ordering of types of entries within an ACL is not relevant in the granting or denying of access based on an ACL.
Only one entry for any subject is recognized by the access checking algorithm; the first one encountered when reading the file. Others will be ignored without notification. If you create or update your ACL files using an editor, you should avoid entering multiple entries for the same subject. When you use the Sysctl ACL management procedures, you will be prevented from doing so.
Prior to processing other entry types, all _acl_file entries are resolved. All ACL entries contained in files referenced by _acl_file entries are merged with the initial set of entries to produce a single set of ACL entries. If any ACL file cannot be read or if an _acl_file entry names an already processed ACL file (a circular chain is detected), access is denied because access control policy may be compromised by using an incomplete set of ACL entries. When such an error occurs, the fact is logged in the sysctld daemon log file. You should inspect the log file if users experience unexplained denial of access.
The access rights granted to a client by the ACL file are determined by the following algorithm: if the Kerberos V4 principal name from the user's authenticated credentials matches the principal name contained in a _principal entry, then:
Related Information
Daemons: sysctld
Examples
#acl# #Sample SP ACL file _principal herbie _principal suzanne - _any_other _other_unauth _acl_file /u/jan/my_acl
#acl# # ACL for xyz Sysctl procedure _p frank _p lucinda _p paula _p gerry.admin
#acl# _principal operator@sp3cws.abc.org _principal operator@node5.sp3.abc.org
Purpose
sysctl.conf - Configures the Sysctl server (sysctld) running on the local SP node.
Description
The sysctl.conf file configures the local Sysctl server daemon by optionally creating variables, procedures and classes, setting variables, loading shared libraries, and executing Sysctl commands. These items are used by the server in the processing of requests from local and remote Sysctl clients.
The default location of this file is /etc/sysctl.conf. An alternate configuration file location can be specified by using the -f flag when starting the server (see the sysctld command).
The /etc/sysctl.conf file contains Sysctl commands which are read and executed by the Sysctl server during its initialization. The following commands are supported:
create var buildTop /usr/lpp/ssp AUTH
creates the variable buildTop, assigns it a value of /usr/lpp/ssp, and assigns it an authorization callback of AUTH. The variable buildTop can be referenced within Sysctl commands and procedures.
Another example:
create var STARTTIME [exec /bin/date] NONE
creates the variable STARTTIME, assigns it the value returned from the execution of the /bin/date command at server initialization, and assigns it an authorization callback of NONE. This variable contains the date and time at which the server was started on the node.
create proc mydate {} AUTH {exec /bin/date}
creates the procedure mydate which has no parameters. This procedure has an authorization callback of AUTH. The procedure is comprised of a single statement (exec /bin/date).
create class sys $buildTop/samples/sysctl/sys.cmds
creates the class sys. If $buildTop is defined as /usr/lpp/ssp, the file /usr/lpp/ssp/samples/sysctl/sys.cmds contains the definition of the sys class.
include $buildTop/samples/sysctl/pdfpfck.cmds
causes the Sysctl server to read the contents of the specified file at initialization time.
set LOG /var/sysctld.log_file
The values assigned to the ACL, LOG, and KEY variables are overridden by the optional command line arguments -a, -l, and -k.
Environment variables (such as the default PATH) can also be set within the configuration file by assigning values to the env() array. For example:
set env(PATH) /usr/bin:/bin:/usr/etc:/etc
sets the PATH for the Sysctl server. The env() array is assigned an authorization callback of SYSTEM which prevents its modification from outside the Sysctl server by a request sent by a Sysctl client.
library name init function ------------ ------------- libxxx.sl xxx_Init() libxxx.a xxx_Init()
The Sysctl server exports an API which the library uses to define commands, variables, authorization callbacks, and interpreter deletion callbacks. See the load() help page for details.
setauth -cmd svcconnect NONE
Prerequisite Information
See the description of Sysctl in PSSP: Administration Guide.
Related Information
Commands: sysctl
Daemons: sysctld
Purpose
tuning.commercial - Contains initial performance tuning parameters for a typical commercial SP environment.
Description
This file is a Korn shell script file containing commands to set network performance tuning parameters. It can be copied to the /tftpboot/tuning.cust file on the control workstation for propagation to the nodes.
Related Information
PSSP commands: cptuning
AIX commands: This file contains invocations of the no command.
PSSP Files: tuning.default, tuning.development, tuning.scientific
PSSP: Installation and Migration Guide
Purpose
tuning.default - Contains initial (default) performance tuning parameters for an SP environment.
Description
This file is a Korn shell script file containing commands to set network performance tuning parameters. In the absence of explicit administrator action, this file is copied to the /tftpboot/tuning.cust file on the control workstation for propagation to the nodes.
Related Information
PSSP commands: cptuning
AIX commands: This file contains invocations of the no command.
PSSP files: tuning.commercial, tuning.development, tuning.scientific
PSSP: Installation and Migration Guide
Purpose
tuning.development - Contains initial performance tuning parameters for a typical software development/interactive SP environment.
Description
This file is a Korn shell script file containing commands to set network performance tuning parameters. It can be copied to the /tftpboot/tuning.cust file on the control workstation for propagation to the nodes.
Related Information
PSSP commands: cptuning
AIX commands: This file contains invocations of the no command.
PSSP files: tuning.commercial, tuning.default, tuning.scientific
PSSP: Installation and Migration Guide
Purpose
tuning.scientific - Contains initial performance tuning parameters for a typical engineering or scientific SP environment.
Description
This file is a Korn shell script file containing commands to set network performance tuning parameters. It can be copied to the /tftpboot/tuning.cust file on the control workstation for propagation to the nodes.
Related Information
PSSP commands: cptuning
AIX commands: This file contains invocations of the no command.
PSSP files: tuning.commercial, tuning.default, tuning.development
PSSP: Installation and Migration Guide