Test 222: pSeries Administration and Support for AIX 5L V5.3
Section 1 - Planning
1. Determine device needs (e.g., communication adapters, disk controllers, HBAs, tape drives, CD-ROM drives, etc.)
2. Determine the AIX OS level compatibility
3. Determine redundancy requirements for levels of availability (e.g., multiple I/O controllers, multiple communication controllers, multiple processors, multiple power supplies, RAID-level protection, dynamic CPU deallocation, dead gateway detection)
4. Select appropriate IBM resources for system planning
5. Describe LPAR and dLPAR features and benefits
6. Determine disk requirements
Section 2 - AIX Installation and Updates
1. Install AIX from Media using CDROM or DVD or tape
2. Describe the NIM installation process and configuration
3. Identify why install hangs or fails
4. Identify installation LED codes
5. Describe the purpose of Trusted Computing Base (TCB)
6. Describe the Alt Disk installation process and its advantages
7. Describe the process to clone a system from a mksysb
8. Describe the differences between migration, preservation, and new and complete overwrite installation
9. Install software updates (e.g., PTFs)
10. Describe the options available for adding and removing filesets (e.g., commit, apply, remove, reject)
11. Describe the AIX installation packaging
12. Given an operating system or application requirement, select the appropriate AIX installation method
13. Manage filesets (eg: bffcreate and inutoc)
14. Identify the operating system maintenance level and installed filesets
15. Verify integrity of OS (e.g., lppchk and its flags)
16. Describe the differences between installp and rpm
Section 3 - Boot Process
1. Describe the boot process (cfgmgr, file system mounts, application startup, rootvg varyon, BIST, POST, boot sector load, login enablement)
2. Describe the use of the /etc/inittab
3. Describe LED codes (121, 223, 229, 551, 552, 553, 581, OC31, OC32)
4. Describe how to recover from a hung boot process
5. Describe run levels 0 through 9
6. Describe the use of the following rc.* files (rc.net, rc.tcpip, rc.boot, rc., rc.local)
7. Show, modify and reset bootlist
Section 4 - Configuration
1. Describe the function of the ODM and the locations of its files
2. Query ODM
3. Describe the function of smit
4. Describe the process to run a Linux application under AIX
5. Configure the network using the following: TCP/IP, /etc/hosts, hostname, ifconfig, chdev, route, /etc/resolv.conf, etc/netsvc.conf, no, /etc/ntpd.conf
6. Configure Ethernet adapter (speed, duplex, virtual ethernet)
7. Use NFS to import/export file systems (e.g., /etc/exports, biod, nfsd)
8. Configure, list and modify paging space
9. Determine/modify existing device configuration
10. Reconfigure system to move from 32-bit to 64-bit and vice versa
11. Check for possible exposure in system access files (e.g., /etc/hosts.equiv, .rhosts, .netrc, .forward)
Section 5 - Storage and LVM<
1. Describe the relationship between physical and logical volumes and volume groups
2. Describe the relationship between logical volumes and filesystems
3. Describe the differences between JFS vs. JFS2
4. Manage volume groups (varyonvg, varoffvg, mkvg, importvg, exportvg, lsvg)
5. Manage logical volumes
6. Manage filesystems (mount, fsck, chfs, mkfs, defragfs)
7. Describe the relationship between physical partition size and physical disk size
8. List the attributes of volume groups, logical volumes, and filesystems that cannot be changed
9. Migrate data from one physical volume to another
Section 6 - Monitoring and Tuning
1. Monitor root mail for error messages
2. Monitor file systems growth to prevent a full file system
3. Monitor the error log for hardware and software errors
4. Use and interpret output from vmstat and sar to determine performance problems
5. Use /etc/tunables for customization of system parameters
6. Given system performance problems, select the appropriate tool(s) (e.g., vmstat, iostat, topas, netstat, sar, /proc)
7. Use and interpret output from netstat and iostat to determine performance problems
8. Use and interpret the output of /proc commands for problem determination
9. Configure and monitor syslog for error conditions
10. Describe the system commands that document current system configuration
11. Use the Resource System Controller (RSCT) to set up resource and system monitoring
12. Describe the advantages of using Workload Manager (WLM) for system resource allocation
13. Describe Partition LoadManager features
14. Describe how to determine and recover from a full file system
Section 7 - Problem Determination and Resolution
1. Given a system problem, determine which tool (e.g., errpt, diag, netstat, ifconfig, ping, filemon, traceroute) is appropriate for problem determination
2. Monitor, interpret and manage the error log using errpt and/or errclear
3. Identify reasons to monitor the root user's mail
4. Identify when to use PerfPMRs
5. Manage a support call with IBM (e.g., open, severity levels, escalation, closing)
6. Determine how to size and configure dump devices
7. Describe hot plug processes for replacing devices
8. Given user problems, determine appropriate actions (e.g., usrck, grpck, file permissions, resetting failed login attempts, user limits)
9. Given a hardware related problem, identify the probable cause
10. Given failed disk situations, describe the procedures for replacing the bad disk
11. Access rootvg in maintenance mode
12. Use alog to examine boot messages to locate startup problems
13. Troubleshoot system hangs when trying to start desktop
14. Troubleshoot error unable to open display
Section 8 - Backup and Recovery / Disaster Recovery
1. Describe methods of backing up and restoring the operating system (e.g., mksysb)
2. Describe methods of managing / positioning tape backup media for backup and restore purposes
3. Describe methods of backing up and restoring data and data structures (savevg and restvg, backup and restore, tar, cpio, pax, mkcd, gzip and gunzip)
4. Describe methods to list / verify contents of backup media
5. Describe methods of selectively altering / excluding data during backup and restore process
6. Identify the elements of disaster recovery plans based on business needs
7. Describe the differences between full, differential, and incremental backups and their effect on backup and restore windows
Section 9 - Daily Management
1. Add / delete / alter userids and passwords
2. Alter default user profiles and limits (i.e., command shell profiles and /etc/security)
3. Describe methods to monitor and manage processes (e.g., ps, kill, nice, fuser, topas, svmon)
4. Identify and correct errors in shell script examples
5. Define AIX file and directory permissions (e.g., user, group, other) and ownership
6. Define and/or modify file permissions and ownership (e.g., chmod, chown, chgrp)
7. Describe differences between foreground and background processes
8. Describe how to check and alter priority of a process
9. Describe the differences between local and global variables and how to set, unset and show them
10. Describe how to enable System V printing
11. Manage the print queuing subsystem
12. Edit a file using vi
13. Describe methods to read / create / delete / configure email
14. Describe use of metacharacters and wildcards within the shell
15. Describe how to redirect stdin, stdout, and stderr
16. Use cron to schedule tasks
17. Control system processes using System Resource Controller (SRC)