SCF Reference Manual for G-Series RVUs (G06.24+)
Using SCF to Configure and Manage NonStop
S-Series Servers
SCF Reference Manual for G-Series RVUs—520413-004
1-13
System Management Considerations
2. Once the system is up and stable, copy to a backup tape the corrupt CONFSAVE
file. The following is a sample command:
> BACKUP $TAPE, $SYSTEM.ZSYSCONF.CONFSAVE, LISTALL, &
DENSITY 6250
Do this before loading the system a second time, because another system load
operation will overwrite the CONFSAVE file you want analyzed.
3. Submit the tape to your service provider for analysis, along with a copy of any SCF
command file or SCF log file of the commands that were part of the process of
creating the corrupt configuration.
System Management Considerations
System managers should be aware of the following considerations when configuring
systems running G-series.
Managing Multiple Versions of the Operating System
A side effect of having a ZSYSCONF system configuration subvolume is that the
SYSnn subvolume can be used as a software versioning tool, while the ZSYSCONF
subvolume can serve as a hardware versioning tool. That is, you can add software
product revisions (SPRs) for software changes without having to create a new
CONFIG file.
You can use the CONFxxyy file-naming convention to track major and minor hardware
configuration changes. A major change, like the addition of another enclosure, can
increment the xx value. A minor change, like the addition of a tape drive, can
increment the yy value.
Managing multiple versions of the operating system in this way results in fewer SYSnn
subvolumes. This in turn reduces the disk space requirements on the $SYSTEM disk,
because it is now necessary to create a new SYSnn subvolume only when you load a
new version of the operating system.
Storing multiple hardware configurations on the ZSYSCONF subvolume, independent
of the SYSnn subvolume, also means that you need to configure the system fewer
times. For example:
•
You can switch RVUs by loading the system from a different SYSnn subvolume,
yet continue to use the same hardware CONFIG file.
•
You can switch between hardware configurations by loading the system from
different system configuration files.
File Security
SCF has sensitive commands that are available only to super-group users (255,n),
such as ADD, ALTER, DELETE, START, and STOP. (Any user can use the