Web hosting
Ver »
Páginas Web
Ver »
Soporte UNIX
Ver »
Ver »

Solaris Multipathing MPxIO

To explicitly enable multipathing on this HBA port, but disable on the rest of the HBA ports, add the following: 

MODIFICAR	/kernel/drv/scsi_vhci.conf

# For enabling MPxIO support for 3rd party symmetric device need an
# entry similar to following in this file. Just replace the "SUN     SENA"
# part with the Vendor ID/Product ID for the device, exactly as reported by
# Inquiry cmd.
# device-type-scsi-options-list =
# "SUN     SENA", "symmetric-option";
# symmetric-option = 0x1000000;

device-type-scsi-options-list =
"HP      OPEN-V*4", "symmetric-option";   <== iostat -En   Add the vendor ID and product ID entries. 
symmetric-option = 0x1000000;

MODIFICAR	/kernel/drv/fp.conf

# You can also enable or disable MPxIO on a per port basis. 
# Per port settings override the global setting for the specified ports.
# To disable MPxIO on port 0 whose parent is /pci@8,600000/SUNW,qlc@4 set:
# name="fp" parent="/pci@8,600000/SUNW,qlc@4" port=0 mpxio-disable="yes";
name="fp" parent="/pci@300/pci@1/pci@0/pci@4/SUNW,emlxs@0" port=0 mpxio-disable="no"; <== luxadm -e port To enable multipathing on a HBA port, add
name="fp" parent="/pci@300/pci@1/pci@0/pci@5/SUNW,emlxs@0" port=0 mpxio-disable="no"; <== luxadm -e port To enable multipathing on a HBA port, add

# NOTE: If you just want to enable or disable MPxIO on all fp ports, it is
# better to use stmsboot(1M) as it also updates /etc/vfstab.
mpxio-disable="yes";    <== set yes  To disable multipathing globally, change to:

# reboot -- -r

The vendor ID and product ID are the vendor and product indentification strings that the device returns in SCSI INQUIRY data. 
The vendor ID must be eight characters long. You must specify all eight characters (even if the trailing characters are spaces). 
The product ID can be up to 16 characters long. 

Random TIPS


Information provided by the Sans Institute:
The ten most commonly exploited UNIX vulnerabilities?
Poor system administration practices
Reusable/poor passwords
Flawed SUID programs (e.g., rdist, binmail)
HTTP servers and CGI application vulnerabilities
Default "+" entries in the /etc/hosts.equiv file
NFS/NIS vulverabilities sendmail program bugs
Buffer overruns (e.g., gets(), syslog())
SUID shell scripts

free counters