Sun Microsystems 3.2 manual Contents

Page 3

Contents

Preface v

1.Point-in-Time Copy Software Troubleshooting Tips 1

Troubleshooting Checklist 1

Checking Log Files 2

Improving Performance 2

Safeguarding the VTOC Information 3

2.Remote Mirror Software Troubleshooting Tips 5

Troubleshooting Checklist

6

 

 

Troubleshooting Log Files and Services

6

 

Checking Log Files

7

 

 

 

Checking the /etc/nsswitch.conf File

8

Checking That the rdc Service Is Running

8

If the /dev/rdc Link Is Not Created

9

 

Checking the Integrity of the Link 10

 

 

Testing with

ifconfig

11

 

 

Testing with

ping

11

 

 

 

Testing with

snoop and atmsnoop

11

 

iii

Image 3
Contents Sun Microsystems, Inc Please Recycle Contents Error Messages Before You Read This Book PrefaceHow This Book Is Organized Using Unix CommandsShell superuser Shell PromptsTypographic Conventions ShellRelated Documentation Accessing Sun Documentation Contacting Sun Technical SupportSun Welcomes Your Comments Page Check the log file contents Troubleshooting ChecklistCheck for installation errors RebootImproving Performance Checking Log FilesSafeguarding the Vtoc Information Page Remote Mirror Software Troubleshooting Tips Check the integrity of the link Check for common errors Troubleshooting Log Files and ServicesChecking Log Files Checking That the rdc Service Is Running If the /dev/rdc Link Is Not Created Checking the Integrity of the Link Testing with ifconfig Nws822# snoop -d hme0 port rdc Enabled Software on Only One Host Correcting Common User ErrorsWrong Volume Set Name Specified Using the dsstat Command Incorrectly Accommodating Memory Requirements To Find the Volume Set NameRemote Mirror Software Troubleshooting Tips Page Contains the volumes does not match the cluster tag Iiadm was expecting a number to be on the commandLine. This happens when the copy parameters option Is used but the arguments for units and delay areDsweinuse The overflow volume is already being Overflow volume could not be attached toSpecified set. Possible errors Dsweempty No overflow volume was specifiedVolume is already configured to be a volume used by Volume requested as a bitmap for the remoteMirror set is already configured to be used by Volume requested as a remote mirror bitmapPrimary volume has a file system mounted on it Remote mirror set cannot be found in the configurationDatabase. The set is not configured. Check the entry for ErrorsEnabled as a secondary volume if it is already in use as Kernel Set being enabled or resumed has a secondaryVolume that is already in use as a secondary volume For another remote mirror set. a volume cannot beDsweoffline One or more volumes in the set is Copy or update operation could not be initiatedPossible errors Dsweempty No set was specified on the commandDswersrvfail The kernel was unable to access An overflow volume couldn’t be initialized. PossibleDsweinuse The volume that was specified is already VolumeWhere the iiadm command was issued Kernel Request to disable the disk queue is alreadyUnsuccessfully before attempting to disable the disk Iiadm command must be issued on the otherIiadm -ecommand expected dep or ind Disk queue volume specified forReconfiguration operation is already in use by Remote mirror software as a data volume or bitmapDsweinuse One of the volumes master, shadow Could not enable volume. Possible errorsNew sets can be enabled Dsweempty One of the volumes names masterGoing from logging mode to replicating mode Iiadm had a problem detaching the overflow volumeFrom a set. Possible errors Dsweodependency The overflow volume is stillDsweinuse One of the volumes is already in use by Could not import shadow volume. Possible errorsSets can be enabled Dsweempty One of the volume names is blank. File aDsweinvalbmp The bitmap volume is not big Could not join shadow volume back to the set. PossibleDsweempty a volume was missing on the command Trying to join the volume is not in the exported stateIt matches one of the configured sets. Use sndradm User attempted to enable a set using the shostsvolSet specified for the command cannot be found Current configuration. Check the set to ensure thatMaster, shadow, or bitmap volume Iiadm could not get a list of overflow volumes fromKernel. Possible errors Volume the user specified to attach to a compactAccessed Disk queue replace command can also be used toSize of the secondary volume. Verify that Secondary volume is not in an error state and can beUse as a shadow for a different master volume User attempted to perform a copy or updateVolume specified as the shadow volume is already Use as an attached overflow volumeDswenotfound Could not find specified volume User attempted to enable a set in whichVolume was already enabled, but with a different Volume in the remote mirror setDuring a reset operation, iiadm was unable to find During an enable operation, iiadm tried to validateBitmap device, but could not get access to it Master device, but could not get access to itCould not find remote mirror set in configuration Be determined. Verify the settingsSunCluster could not find the specified disk service Could not find remote mirror group in configurationIiadm attempted to access the configuration file Lookup of the set ID in the configuration database forVolume specified for the bitmap could not be Opened. The volume might not exist or is alreadyDuring a reset, iiadm tried to update One or more volumes in a group copy or updateCommand failed. Possible errors Same as Update failed meaning but for a specificAs required by the point-in-time copy software Volumes are not all in the same cluster device groupVolume vol is not being managed by Iiadm detected that the master, shadow, and bitmapRelated Error Messages

3.2 specifications

Sun Microsystems 3.2, often referred to as SunOS 3.2, was a notable release of the Sun operating system that emerged during the rapidly evolving landscape of computer technology in the early 1980s. This operating platform was designed specifically for Sun Workstations, utilizing the robust hardware architecture developed by Sun Microsystems. The introduction of SunOS 3.2 marked a significant step forward in the development of UNIX-like operating systems optimized for entrepreneurship and scientific applications.

One of the main features of SunOS 3.2 was its adherence to the Berkeley Software Distribution (BSD) model, which allowed for advanced networking capabilities, enhanced performance, and efficient resource management. BSD's influence provided SunOS 3.2 with TCP/IP networking protocols, allowing users to connect to other devices seamlessly and manage network resources easily. This feature was crucial during a time when networking was becoming increasingly vital for organizations.

The system's support for virtual memory was another innovative characteristic. SunOS 3.2 utilized demand paging, which allowed programs to use more memory than was physically installed on their machines, significantly improving multitasking and overall system responsiveness. This capability was particularly advantageous for enterprises that relied on large-scale computations and data analysis.

SunOS 3.2 also introduced support for the Sun Window System, which meant users could utilize graphical user interfaces for interacting with applications, moving away from purely text-based command interfaces. This transition paved the way for more intuitive user experiences in the realm of computing, making powerful UNIX capabilities more accessible.

The inclusion of software utilities such as the C shell (csh) and a variety of development tools further strengthened SunOS 3.2’s position as a suitable platform for developers. The system provided robust development environments for programming in languages like C and assembly, catering to custom application requirements across different industries.

Lastly, security features were integrated into SunOS 3.2 to safeguard sensitive data and enhance system integrity. Permission settings and user authentication mechanisms were refined, allowing organizations to securely manage their computing resources.

In summary, SunOS 3.2 represented a landmark evolution in operating systems, showcasing a blend of advanced networking, memory management, graphical user interface, development tools, and security—elements that defined a generation of computing within the high-performance ecosystem of Sun Microsystems.