08-31-2013
A wild guess is that some locks remained when you exported the VG. Is the VG in ECM (enhanced concurrent mode)?
If so, try a "varyonvg -b -u", then "exportvg", then reimport again. This might help.
I hope this helps.
bakunin
10 More Discussions You Might Find Interesting
1. Programming
Hello,
I want to know what call to use to read the details of a process control block in solaris ?:) (2 Replies)
Discussion started by: hmurali
2 Replies
2. UNIX for Dummies Questions & Answers
Hmm, how to ask this without sounding too malicious...
How might one go about causing a disk corruption in OS X specifically or via the command line in UNIX in general?
Doesnt matter the severity of the problem, I just want to scare the person a little, then fix the problem for them.
Any... (1 Reply)
Discussion started by: Yummator
1 Replies
3. AIX
I don't understand the concept behind importvg and exportvg. What are some examples of when one would use this? (1 Reply)
Discussion started by: outtacontrol
1 Replies
4. Solaris
I need to corrupt a superblock of a mounted device in a soalris m/c and check recovery from an alternate superblock. How can this be done? (2 Replies)
Discussion started by: sujathan
2 Replies
5. AIX
Hello,
On Aix 5.3, during importvg, the varyonvg fails:
importvg -y vgtest hdisk20
0516-013 varyonvg: The volume group cannot be varied on because
there are no good copies of the descriptor area.
When i use manually the command varyonvg -u -b -t vgtest to force, the vg can... (3 Replies)
Discussion started by: dantares
3 Replies
6. AIX
Hi
How to check if a vg is exported from an LPAR using exportvg?
Is there a command or place where we can see the list of the vg's exported from the LPAR ?
Because if i run the command to varyonvg i get the below error :
root@cbspsrc02 #varyonvg old_rootvg
0516-082 varyonvg: Unable to... (7 Replies)
Discussion started by: newtoaixos
7 Replies
7. HP-UX
Hallo Friends,
I have application X running on hpux 11.11 and oracle 9i release 2. I recently had a hardware failure on disk /dev/dsk/c2t0d0
Below is the systemlog file :
root@a7dmc:/var/adm/syslog > /opt/resmon/bin/resdata -R 155713541 -r /storage/events/enclosures/gazemon/0_1_1_0.0.0... (11 Replies)
Discussion started by: kekanap
11 Replies
8. Shell Programming and Scripting
I don't know if I am asking this correctly, but I have a hard drive with some bad sectors and it appears that some of the data is corrupt. I am having allot of trouble copying the data to a new drive. The issue is not in copying files, but that the new drive to which files are copied is not acting... (17 Replies)
Discussion started by: LMHmedchem
17 Replies
9. AIX
Is there a way to find the volume group name after assigning hdisk to the machine for importing it ?
importvg -y <find_the_name_from_the_unknown_disk_> hdiskX
Code tags and no hijacking. You should be aware of that ;) (3 Replies)
Discussion started by: filosophizer
3 Replies
10. High Performance Computing
I am managing a linux cluster which has been build on Platform Cluster Manager PCM 1.2.1) from IBM Platform Computing. Unfortunately somebody deteled data files of postgresql from /var/lib directory. I somehow managed to start the postmaster service again, but all the administrative commands of... (2 Replies)
Discussion started by: ahsanpmd
2 Replies
LEARN ABOUT ULTRIX
secsetup
secsetup(8) System Manager's Manual secsetup(8)
Name
secsetup - enable the enhanced security features
Syntax
/usr/etc/sec/secsetup
Description
The command is an interactive facility that allows you to enable the enhanced security features on your system. You must first have loaded
the enhanced security subset onto your system before running the command.
The command allows you to configure your system either for security auditing, trusted path, enhanced login, or any combination of those
features. In addition, the command may add lines to the file. To remove entries from the you must edit it by hand. The command only adds
lines to this file if they aren't already present. You can run while the system is in multiuser mode (however, some inconsistencies may
result from this. See the Security Guide for Administrators for more information). To run type the following and then answer the ques-
tions that follow:
# /usr/etc/sec/secsetup
Depending on the security features chosen, when completes you may need to replace your system's kernel and reboot the system. For example,
chosing either the security auditing or trusted path feature may require you to re-build your kernel.
Files
See Also
set_audit_mask(8), auth(5), svc.conf(5)
Security Guide for Administrators
secsetup(8)