Table Of ContentIRIX® Admin
System Configuration and Operation
007-2859-017
COPYRIGHT
© 1992-2001 Silicon Graphics, Inc. All rights reserved; provided portions may be copyright in third parties, as indicated elsewhere herein. No
permissionisgrantedtocopy,distribute,orcreatederivativeworksfromthecontentsofthiselectronicdocumentationinanymanner,inwhole
or in part, without the prior written permission of Silicon Graphics, Inc.
LIMITED RIGHTS LEGEND
Theelectronic(software)versionofthisdocumentwasdevelopedatprivateexpense;ifacquiredunderanagreementwiththeUSAgovernment
or any contractor thereto, it is acquired as "commercial computer software" subject to the provisions of its applicable license agreement, as
specified in (a) 48 CFR 12.212 of the FAR; or, if acquired for Department of Defense units, (b) 48 CFR 227-7202 of the DoD FAR Supplement; or
sections succeeding thereto. Contractor/manufacturer is Silicon Graphics, Inc., 1600 Amphitheatre Pkwy 2E, Mountain View, CA 94043-1351.
TRADEMARKS AND ATTRIBUTIONS
Challenge, Indigo, IRIS, IRIX, Octane, and Onyx are registered trademarks and SGI, Crimson, Indigo2, IRIS FailSafe, IRIS InSight, IRIS
WorkSpace,IRIXNetworker,NUMAlink,Origin,PerformanceCo-Pilot,PowerChallenge,PowerIndigo2,PowerOnyx,theSGIlogo,andXFS
aretrademarksofSiliconGraphics,Inc.Indyisaregisteredtrademark,usedunderlicenseintheUnitedStatesandownedbySiliconGraphics,
Inc., in other countries worldwide.
CentronicsisatrademarkofCentronicsDataComputerCorporation.CrayisaregisteredtrademarkofCray,Inc.Documenter’sWorkbenchis
a trademark of Novell, Inc. FrameMaker, Illustrator, and PostScript are trademarks of Adobe Systems, Incorporated. IBM is a trademark of
International Business Machines Corporation. LFS is a trademark of Platform Computing Corporation. R4000 and R8000 are registered
trademarks of MIPS Technologies, Inc. RPC and Sun are trademarks of Sun Microsystems, Inc. Tektronix is a trademark of Tektronix, Inc.
Versatec is a trademark of Versatec Corporation. UNIX is a registered trademark in the United States and other countries, licensed exclusively
through X/Open Company, Ltd. Xylogics is a trademark of Xylogics, Inc.
Cover Design By Sarah Bolles, Sarah Bolles Design, and Dany Galgani, SGI Technical Publications.
New Features in This Guide
ThisguidecontainsthefollowingneworchangedinformationfortheIRIX6.5.14release:
The following changes were made to this guide for the IRIX 6.5.14 release:
• Updated “ChangingProcessorAssignmentonMultiprocessorSystems”onpage74
in Chapter4, “Configuring the IRIX Operating System”.
• Updated “Defining and Managing Cpusets” on page151 in Chapter7, “Managing
User Processes”.
• Updated themaxup andnprofile tunable parameters in “System Limits
Parameters” on page230 in AppendixA, “IRIX Kernel Tunable Parameters”.
Miscellaneous editing and formatting changes were also made.
007-2859-017 iii
Record of Revision
Version Description
007 February 1999
Incorporates information for the IRIX 6.5.3 release.
008 May 1999
Incorporates information for the IRIX 6.5.4 release.
009 July 1999
Incorporates information for the IRIX 6.5.5 release.
010 January 2000
Incorporates information for the IRIX 6.5.7 release.
011 April 2000
Incorporates information for the IRIX 6.5.8 release.
012 July 2000
Incorporates information for the IRIX 6.5.9 release.
013 October 2000
Incorporates information for the IRIX 6.5.10 release.
014 January 2001
Incorporates information for the IRIX 6.5.11 release.
015 April 2001
Incorporates information for the IRIX 6.5.12 release.
016 August 2001
Incorporates information for the IRIX 6.5.13 release.
007-2859-017 v
Record of Revision
017 November 2001
Incorporates information for the IRIX 6.5.14 release.
vi 007-2859-017
Contents
New Features in This Guide. . . . . . . . . . . . . . . . . . . . iii
Record of Revision . . . . . . . . . . . . . . . . . . . . . . v
Figures . . . . . . . . . . . . . . . . . . . . . . . . . xxv
Tables . . . . . . . . . . . . . . . . . . . . . . . . . xxvii
Examples . . . . . . . . . . . . . . . . . . . . . . . . xxix
Procedures . . . . . . . . . . . . . . . . . . . . . . . . xxxi
About This Guide. . . . . . . . . . . . . . . . . . . . . . xxxiii
What This Guide Contains . . . . . . . . . . . . . . . . . . . xxxiii
Audience for This Guide . . . . . . . . . . . . . . . . . . . . xxxv
Related Publications . . . . . . . . . . . . . . . . . . . . . xxxvi
Obtaining Publications . . . . . . . . . . . . . . . . . . . . xxxvii
Additional Resources . . . . . . . . . . . . . . . . . . . . . xxxvii
IRIX Man Pages . . . . . . . . . . . . . . . . . . . . .xxxviii
Release Notes . . . . . . . . . . . . . . . . . . . . . . xxxix
IRIX Help System. . . . . . . . . . . . . . . . . . . . . xxxix
SGI World Wide Web Sites . . . . . . . . . . . . . . . . . . xxxix
Conventions . . . . . . . . . . . . . . . . . . . . . . . . xl
Reader Comments. . . . . . . . . . . . . . . . . . . . . . . xl
1. Introduction to System Configuration and Operation . . . . . . . . . . . . 1
Principles of Good System Administration. . . . . . . . . . . . . . . . 2
Account Passwords . . . . . . . . . . . . . . . . . . . . . 2
Superuser (root) Account Access Restriction. . . . . . . . . . . . . . 2
User Privacy . . . . . . . . . . . . . . . . . . . . . . . 3
Password File Check . . . . . . . . . . . . . . . . . . . . . 3
Hardware Change Check . . . . . . . . . . . . . . . . . . . 3
007-2859-017 vii
Contents
Software Upgrade Check . . . . . . . . . . . . . . . . . . . . 4
System Unavailability Notification . . . . . . . . . . . . . . . . . 4
Malicious Activity Policy . . . . . . . . . . . . . . . . . . . . 5
System Log Book Maintenance . . . . . . . . . . . . . . . . . . 6
User Request Service . . . . . . . . . . . . . . . . . . . . . 7
System Administrator Task List . . . . . . . . . . . . . . . . . . . 7
Administration Tools Overview . . . . . . . . . . . . . . . . . . . 9
2. Making the Most of the IRIX System . . . . . . . . . . . . . . . . .11
IRIX Shells . . . . . . . . . . . . . . . . . . . . . . . . .11
Using Regular Expressions and Metacharacters . . . . . . . . . . . . .12
C Shell Shortcuts . . . . . . . . . . . . . . . . . . . . . .14
tcsh Shell . . . . . . . . . . . . . . . . . . . . . . . .17
Bourne Shell . . . . . . . . . . . . . . . . . . . . . . .17
Korn Shell Shortcuts . . . . . . . . . . . . . . . . . . . . .17
Displaying Windows on Remote Workstations. . . . . . . . . . . . . . .18
Creating a Custom Shell Window . . . . . . . . . . . . . . . . . .19
Finding and Manipulating Files . . . . . . . . . . . . . . . . . . .21
Locating Files with thefind Command . . . . . . . . . . . . . . .21
Usingfind andcpio to Locate and Copy Files . . . . . . . . . . . . .23
sed Editor . . . . . . . . . . . . . . . . . . . . . . . .24
Recursive Commands . . . . . . . . . . . . . . . . . . . . . .24
Task Scheduling with theat,batch, andcron Commands . . . . . . . . . . .25
Scheduling Tasks with theat Command . . . . . . . . . . . . . . .25
Scheduling Tasks with thebatch Command . . . . . . . . . . . . . .26
Scheduling Tasks with thecron Command . . . . . . . . . . . . . .26
Disabling Login with the/etc/nologin File . . . . . . . . . . . . . . .27
Using Mouse Shortcuts . . . . . . . . . . . . . . . . . . . . .28
Copying and Pasting Text with the Mouse. . . . . . . . . . . . . . .28
Creating a Shell Window with the Mouse . . . . . . . . . . . . . . .29
Creating Man Pages . . . . . . . . . . . . . . . . . . . . . .30
System Monitoring Tools . . . . . . . . . . . . . . . . . . . . .32
Saving a Crash Dump withsavecore . . . . . . . . . . . . . . . .32
icrash System Crash Analysis Utility . . . . . . . . . . . . . . . .33
viii 007-2859-017
Contents
fru Hardware Error Analysis Tool. . . . . . . . . . . . . . . . . 34
sysmon, the System Log Viewer . . . . . . . . . . . . . . . . . 36
availmon, the System Availability Monitoring Tool. . . . . . . . . . . . . 37
Registeringavailmon . . . . . . . . . . . . . . . . . . . . 38
Configuring anavailmon Site Log File . . . . . . . . . . . . . . . 39
Administeringavailmon . . . . . . . . . . . . . . . . . . . 40
Usingavailmon with Automatic Reporting. . . . . . . . . . . . . 40
Usingavailmon at Secure Sites with Internal Report Mailing. . . . . . . . 41
Usingavailmon at Secure Sites without Report Mailing . . . . . . . . . 41
availmon Reports . . . . . . . . . . . . . . . . . . . . . 42
Mailingavailmon Reports withamsend . . . . . . . . . . . . . 43
Viewingavailmon Reports withamreport . . . . . . . . . . . . 43
3. System Startup, Shutdown, and Run Levels . . . . . . . . . . . . . . . 45
Starting the System . . . . . . . . . . . . . . . . . . . . . . 45
Shutting Down the System from Multiuser Mode. . . . . . . . . . . . . . 46
Shutting Down the System from Single-User Mode . . . . . . . . . . . . . 48
IRIX Operating System Run Levels (System State) . . . . . . . . . . . . . 48
Howinit Controls the System State . . . . . . . . . . . . . . . . 50
Multiuser State from System Shutdown . . . . . . . . . . . . . . . 52
init Process: Early Initialization . . . . . . . . . . . . . . . . 52
init Process: Run-Level Preparation . . . . . . . . . . . . . . . 53
init Process:getty . . . . . . . . . . . . . . . . . . . 54
Changing System Run Levels . . . . . . . . . . . . . . . . . . 54
Run-level Directories. . . . . . . . . . . . . . . . . . . . . 54
Modifying Run-level Files . . . . . . . . . . . . . . . . . . . 55
Changing Multiuser Mode to Single-User Mode with theshutdown Command. . . . 56
Powering Off the System Using/etc/inittab . . . . . . . . . . . . . . 57
4. Configuring the IRIX Operating System . . . . . . . . . . . . . . . . 59
System Configuration Check. . . . . . . . . . . . . . . . . . . . 59
Checking Installed Hardware withhinv . . . . . . . . . . . . . . . 59
Checking Installed Hardware in /hw . . . . . . . . . . . . . . . . 65
How IP Network Interfaces Are Assigned to Hardware Devices . . . . . . . . 65
007-2859-017 ix
Contents
Checking Installed Software withversions . . . . . . . . . . . . . .66
Checking Installed Graphics Hardware withgfxinfo . . . . . . . . . . .67
Checking Basic System Identification withuname. . . . . . . . . . . . .68
Getting Printer Status withlpstat. . . . . . . . . . . . . . . . .68
Checking Software Configuration Options with chkconfig . . . . . . . . . .68
Configuring Software . . . . . . . . . . . . . . . . . . . . . .71
Setting Software Configuration Options withchkconfig . . . . . . . . . .71
Setting and Changing System Defaults . . . . . . . . . . . . . . . .73
Changing the System Display . . . . . . . . . . . . . . . . . .73
Changing Processor Assignment on Multiprocessor Systems . . . . . . . . .74
Changing the System Name . . . . . . . . . . . . . . . . . . .75
Setting the Network Address . . . . . . . . . . . . . . . . . .76
Setting the Default Printer . . . . . . . . . . . . . . . . . . .77
Setting the Time Zone. . . . . . . . . . . . . . . . . . . . .77
Changing the System Date and Time . . . . . . . . . . . . . . . .80
Changing File and Directory Access Permission . . . . . . . . . . . . .82
Directory Permissions . . . . . . . . . . . . . . . . . . .84
File Permissions . . . . . . . . . . . . . . . . . . . . .84
Changing Permissions . . . . . . . . . . . . . . . . . . .85
Setting Permissions withumask . . . . . . . . . . . . . . . .86
Access Control Lists (ACLs) and Capabilities . . . . . . . . . . . . . .87
Partitioning Your System . . . . . . . . . . . . . . . . . . . . .87
Advantages of Partitioning . . . . . . . . . . . . . . . . . . .89
Disadvantages of Partitioning . . . . . . . . . . . . . . . . . .89
Installing Partitioning Software . . . . . . . . . . . . . . . . . .89
Networking Setup between Partitions . . . . . . . . . . . . . . . .89
Connecting the System Console to the Controller . . . . . . . . . . . . .91
Partition Setup . . . . . . . . . . . . . . . . . . . . . . .91
mkpart Partition Configuration Command . . . . . . . . . . . . .91
Partitioning from the PROM. . . . . . . . . . . . . . . . . .93
Supported Configurations . . . . . . . . . . . . . . . . . . .94
Partitioning Guidelines . . . . . . . . . . . . . . . . . . . .94
x 007-2859-017
Description:The electronic (software) version of this document was developed at private expense; if acquired under an agreement with the USA government or any contractor .. Defining New Environment Variables . NQE Administration describes how to configure, monitor, and control the Network. Queuing