Sponsored Content
Operating Systems AIX Exportvg/importvg causes corrupt LV Control Block Post 302849105 by bakunin on Saturday 31st of August 2013 12:10:56 AM
Old 08-31-2013
A wild guess is that some locks remained when you exported the VG. Is the VG in ECM (enhanced concurrent mode)?

If so, try a "varyonvg -b -u", then "exportvg", then reimport again. This might help.

I hope this helps.

bakunin
 

10 More Discussions You Might Find Interesting

1. Programming

Reading a process control block

Hello, I want to know what call to use to read the details of a process control block in solaris ?:) (2 Replies)
Discussion started by: hmurali
2 Replies

2. UNIX for Dummies Questions & Answers

Causing a disk to be corrupt

Hmm, how to ask this without sounding too malicious... How might one go about causing a disk corruption in OS X specifically or via the command line in UNIX in general? Doesnt matter the severity of the problem, I just want to scare the person a little, then fix the problem for them. Any... (1 Reply)
Discussion started by: Yummator
1 Replies

3. AIX

nooB questions on importvg and exportvg

I don't understand the concept behind importvg and exportvg. What are some examples of when one would use this? (1 Reply)
Discussion started by: outtacontrol
1 Replies

4. Solaris

How to corrupt a superblock?

I need to corrupt a superblock of a mounted device in a soalris m/c and check recovery from an alternate superblock. How can this be done? (2 Replies)
Discussion started by: sujathan
2 Replies

5. AIX

Unable to execute varyonvg during importvg

Hello, On Aix 5.3, during importvg, the varyonvg fails: importvg -y vgtest hdisk20 0516-013 varyonvg: The volume group cannot be varied on because there are no good copies of the descriptor area. When i use manually the command varyonvg -u -b -t vgtest to force, the vg can... (3 Replies)
Discussion started by: dantares
3 Replies

6. AIX

exportvg

Hi How to check if a vg is exported from an LPAR using exportvg? Is there a command or place where we can see the list of the vg's exported from the LPAR ? Because if i run the command to varyonvg i get the below error : root@cbspsrc02 #varyonvg old_rootvg 0516-082 varyonvg: Unable to... (7 Replies)
Discussion started by: newtoaixos
7 Replies

7. HP-UX

corrupt disk

Hallo Friends, I have application X running on hpux 11.11 and oracle 9i release 2. I recently had a hardware failure on disk /dev/dsk/c2t0d0 Below is the systemlog file : root@a7dmc:/var/adm/syslog > /opt/resmon/bin/resdata -R 155713541 -r /storage/events/enclosures/gazemon/0_1_1_0.0.0... (11 Replies)
Discussion started by: kekanap
11 Replies

8. Shell Programming and Scripting

cp to copy only non-corrupt files

I don't know if I am asking this correctly, but I have a hard drive with some bad sectors and it appears that some of the data is corrupt. I am having allot of trouble copying the data to a new drive. The issue is not in copying files, but that the new drive to which files are copied is not acting... (17 Replies)
Discussion started by: LMHmedchem
17 Replies

9. AIX

importvg question

Is there a way to find the volume group name after assigning hdisk to the machine for importing it ? importvg -y <find_the_name_from_the_unknown_disk_> hdiskX Code tags and no hijacking. You should be aware of that ;) (3 Replies)
Discussion started by: filosophizer
3 Replies

10. High Performance Computing

Postgresql Database Corrupt

I am managing a linux cluster which has been build on Platform Cluster Manager PCM 1.2.1) from IBM Platform Computing. Unfortunately somebody deteled data files of postgresql from /var/lib directory. I somehow managed to start the postmaster service again, but all the administrative commands of... (2 Replies)
Discussion started by: ahsanpmd
2 Replies
secsetup(8)						      System Manager's Manual						       secsetup(8)

Name
       secsetup - enable the enhanced security features

Syntax
       /usr/etc/sec/secsetup

Description
       The command is an interactive facility that allows you to enable the enhanced security features on your system.	You must first have loaded
       the enhanced security subset onto your system before running the command.

       The command allows you to configure your system either for security auditing, trusted path, enhanced login, or  any  combination  of  those
       features.  In addition, the command may add lines to the file.  To remove entries from the you must edit it by hand.  The command only adds
       lines to this file if they aren't already present.  You can run while the system is in multiuser mode (however,	some  inconsistencies  may
       result  from  this.   See the Security Guide for Administrators for more information).  To run type the following and then answer the ques-
       tions that follow:
       # /usr/etc/sec/secsetup
       Depending on the security features chosen, when completes you may need to replace your system's kernel and reboot the system.  For example,
       chosing either the security auditing or trusted path feature may require you to re-build your kernel.

Files
See Also
       set_audit_mask(8), auth(5), svc.conf(5)
       Security Guide for Administrators

																       secsetup(8)
All times are GMT -4. The time now is 07:52 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy