SCF Reference Manual for G-Series RVUs (G06.27+)

Using SCF to Configure and Manage NonStop
S-Series Servers
SCF Reference Manual for G-Series RVUs520413-005
1-13
Getting a Corrupt System Configuration File
Analyzed
specified as 02.05 in the OSM or TSM dialog box. (Entering just 2.05 or 2.5 will
also work.)
2. When the system starts and displays a TACL prompt, you can log on and start the
rest of the system applications.
3. Enter an INFO SUBSYS $ZZKRN command to verify that no pending changes to
system attributes are displayed. If the display erroneously shows any pending
changes, enter an ALTER SUBSYS command to change these values to match
the current settings.
This misleading pending changes display can occur if you load the system from an
earlier configuration (either a CONFxxyy or the CONFBASE file) and that earlier
configuration has different system name, number, or time attributes than the
configuration being replaced. For example, if you load the \EAST system from the
CONFBASE file (which specifies \NONAME as the system name), an INFO
SUBSYS command displays \EAST as the current system and \NONAME as a
pending change. Entering an ALTER SUBSYS command to change the system
name to \EAST causes the pending change to disappear from a subsequent INFO
SUBSYS command.
Getting a Corrupt System Configuration File Analyzed
If the current system configuration file somehow becomes corrupt, you can send it to
your service provider to have the cause determined.
1. Return to a saved, stable configuration by following the procedure How to Return
to a Saved Configuration on page 1-12.
2. Once the system is up and stable, copy to a backup tape the corrupt CONFSAVE
file. The following is a sample command:
> BACKUP $TAPE, $SYSTEM.ZSYSCONF.CONFSAVE, LISTALL, &
DENSITY 6250
Do this before loading the system a second time, because another system load
operation will overwrite the CONFSAVE file you want analyzed.
3. Submit the tape to your service provider for analysis, along with a copy of any SCF
command file or SCF log file of the commands that were part of the process of
creating the corrupt configuration.
System Management Considerations
System managers should be aware of the following considerations when configuring
systems running G-series.
Managing Multiple Versions of the Operating System
A side effect of having a ZSYSCONF system configuration subvolume is that the
SYSnn subvolume can be used as a software versioning tool, while the ZSYSCONF