05-01-2008
Quote:
Originally Posted by
itik
Why is that? Is my ODM corrupted?
At least it sounds like that. Did you delete the old VG prior to creating it anew? Try the following: "varyoffvg" the VG in question, then "exportvg" it to completely get it out of the system. Delete the respective hdisk devices. Edit /etc/filesystems to get rid of the old filesystem entries.
(Ah, before i forget: before you do any of this make sure you have a working backup - this is all *very* destructive and *very* finally so.)
Then create the SAN shares anew, run "cfgmgr" and only then create a new VG and the filesystems.
I hope this helps.
bakunin
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello all,
I have looked at the entire posting that have SAN in it and I'm still fuzzy on how SAN works. I understand that every disk array can be access from any server that needs it, but is there software that is install or NFS mount type situation. One post stated that if your format command... (7 Replies)
Discussion started by: larry
7 Replies
2. AIX
hi
We have 2 AIX nodes running with HACMP and all of them connected to SAN,
Our shared storage is shark; I need to create shared volume group and I need the HACMP take a ware of it.
Regards (1 Reply)
Discussion started by: h2aix
1 Replies
3. HP-UX
Hi, I'm going to be involved in a migration of SAN islands to one big SAN. I've not worked with SANs before and I'm not sure how to approach this. I suspect the disk devices on the HP servers are going to change, when the EVA's and servers are plugged into this new Cisco 9509 switch.
Any... (0 Replies)
Discussion started by: Hils
0 Replies
4. IP Networking
Hi
I like to learn and practice SAN, iSCSI. Could you sugges the appropriate tutorial and small tasks to practice SAN.
Thankyou (1 Reply)
Discussion started by: kingskar
1 Replies
5. Solaris
I am about to attempt to connect my sun 280R boxes to a EMC SAN.
I have Qlogic cards that came from Sun.
I am going to load traffic manager, navisphere client.
what else do i need, sun foundation suite ro somehting?
This is the first time ive ever connected to a SAN.
any help would be... (3 Replies)
Discussion started by: BG_JrAdmin
3 Replies
6. Solaris
Hi everyone,
I wonder if I can canvas any opinions or thoughts (good or bad) on SAN attaching a SUN V880/490 to an EMC Clarion SAN?
At the moment the 880 is using 12 internal FC-AL disks as a db server and seems to be doing a pretty good job. It is not I/O, CPU or Memory constrained and the... (2 Replies)
Discussion started by: si_linux
2 Replies
7. AIX
Dera all
I have error repeating for two day, when I checked the error log by errpt command:
------------------------------------------------------------------------
LABEL: SC_DISK_ERR2
IDENTIFIER: 79B0DF89
Date/Time: Wed Oct 31 02:41:36 SAUS
Sequence Number: 9000... (1 Reply)
Discussion started by: magasem
1 Replies
8. Linux
Hello everyone.
I was wondering if there is a way to increase the size on the LUN on a SAN and make the Linux kernel understand the changes without restarting?
In the past it has always been rebooted to see the new values but im sure that there is a way now for the lvm to see the Free PE in... (8 Replies)
Discussion started by: d_ark
8 Replies
9. AIX
Has anyone tried SAN to SAN mirroring on IBM DS SAN Storage.
DS5020 mentions Enhanced Remote Mirror to multi-LUN applications
I wonder if Oracle High availibility can be setup using Remote Mirror option of SAN ? (1 Reply)
Discussion started by: filosophizer
1 Replies
10. Filesystems, Disks and Memory
hi! i got a rhel 6.3 host that already have an xfs filesystem mounted from a SAN (let's call it SAN-1) whose size is 9TB.
i will be receiving another SAN (let's call it SAN-2) storage of 15TB size. this new addition is physically on another SAN storage. SAN-1 is on a Pillar storage while the new... (6 Replies)
Discussion started by: rino19ny
6 Replies
LEARN ABOUT CENTOS
strongimcv_pki
PKI(1) strongSwan PKI(1)
NAME
pki - Simple public key infrastructure (PKI) management tool
SYNOPSIS
pki command [option ...]
pki -h | --help
DESCRIPTION
pki is a suite of commands that allow you to manage a simple public key infrastructure (PKI).
Generate RSA and ECDSA key pairs, create PKCS#10 certificate requests containing subjectAltNames, create X.509 self-signed end-entity and
root CA certificates, issue end-entity and intermediate CA certificates signed by the private key of a CA and containing subjectAltNames,
CRL distribution points and URIs of OCSP servers. You can also extract raw public keys from private keys, certificate requests and certifi-
cates and compute two kinds of SHA-1-based key IDs.
COMMANDS
-h, --help
Prints usage information and a short summary of the available commands.
-g, --gen
Generate a new private key.
-s, --self
Create a self-signed certificate.
-i, --issue
Issue a certificate using a CA certificate and key.
-c, --signcrl
Issue a CRL using a CA certificate and key.
-r, --req
Create a PKCS#10 certificate request.
-7, --pkcs7
Provides PKCS#7 wrap/unwrap functions.
-k, --keyid
Calculate key identifiers of a key or certificate.
-a, --print
Print a credential (key, certificate etc.) in human readable form.
-p, --pub
Extract a public key from a private key or certificate.
-v, --verify
Verify a certificate using a CA certificate.
EXAMPLES
Generating a CA Certificate
The first step is to generate a private key using the --gen command. By default this generates a 2048-bit RSA key.
pki --gen > ca_key.der
This key is used to create the self-signed CA certificate, using the --self command. The distinguished name should be adjusted to your
needs.
pki --self --ca --in ca_key.der
--dn "C=CH, O=strongSwan, CN=strongSwan CA" > ca_cert.der
Generating End-Entity Certificates
With the root CA certificate and key at hand end-entity certificates for clients and servers can be issued. Similarly intermediate CA cer-
tificates can be issued, which in turn can issue other certificates. To generate a certificate for a server, we start by generating a pri-
vate key.
pki --gen > server_key.der
The public key will be included in the certificate so lets extract that from the private key.
pki --pub --in server_key.der > server_pub.der
The following command will use the CA certificate and private key to issue the certificate for this server. Adjust the distinguished name,
subjectAltName(s) and flags as needed (check pki --issue(8) for more options).
pki --issue --in server_pub.der --cacert ca_cert.der
--cakey ca_key.der --dn "C=CH, O=strongSwan, CN=VPN Server"
--san vpn.strongswan.org --flag serverAuth > server_cert.der
Instead of storing the public key in a separate file, the output of --pub may also be piped directly into the above command.
Generating Certificate Revocation Lists (CRL)
If end-entity certificates have to be revoked, CRLs may be generated using the --signcrl command.
pki --signcrl --cacert ca_cert.der --cakey ca_key.der
--reason superseded --cert server_cert.der > crl.der
The certificate given with --cacert must be either a CA certificate or a certificate with the crlSign extended key usage (--flag crlSign).
URIs to CRLs may be included in issued certificates with the --crl option.
SEE ALSO
pki --gen(1), pki --self(1), pki --issue(1), pki --signcrl(1), pki --req(1), pki --pkcs7(1), pki --keyid(1), pki --print(1), pki --pub(1),
pki --verify(1)
5.1.1 2013-07-31 PKI(1)