Sponsored Content
Full Discussion: Vg not able access.
Operating Systems AIX Vg not able access. Post 302997792 by rbatte1 on Friday 19th of May 2017 01:00:57 PM
Old 05-19-2017
Could you post the output from lspv? I think you have posted output from lsvg only. Do the lsvg commands with flags cause a hang?

..... and please wrap the output in CODE tags. You can easily do this by highlighting your code and then clicking on the # in the editing menu. (You can also type code tags [code] and [/code] by hand.)





Robin

Last edited by rbatte1; 05-19-2017 at 02:03 PM.. Reason: Added CODE tags tutorial
This User Gave Thanks to rbatte1 For This Post:
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Need help to access/mount so to access folder/files on a Remote System using Linux OS

Hi I need to access files from a specific folder of a Linux system from an another Linux System Remotely. I know how to, Export a folder on One SCO System & can access the same by using Import via., NFS in the Sco Unix SVR4 System using the scoadmin utility. Also, I know to use mount -t ... (2 Replies)
Discussion started by: S.Vishwanath
2 Replies

2. UNIX for Dummies Questions & Answers

How to access CD

Hi, I have to apply service pack from cd. so i have to copy some file from cd to linux directory. Can any body help me what command to use access from cd and copy file. Thanks sam71 (2 Replies)
Discussion started by: sam71
2 Replies

3. SuSE

"scp" access denied:/etc/security/access.conf

Guys i have 2 SUSE Linux Enterprise Server 10 SP1 (i586) boxes.if i take a look into /etc/security/access.conf ,i see following lines at the eof # All other users should be denied to get access from all sources. #- : ALL : ALL - : myID : ALL now earlier i had written scripts where files... (1 Reply)
Discussion started by: ak835
1 Replies

4. UNIX for Dummies Questions & Answers

kernel giving access for multiple users to access files

hi all, i want to know y kernel is giving access for multiple users to access a file when one user may be the owner is executing that file. Because other user can manipulate that file when the other user is executing that file, it will give the unexpected result to owner . plz help me... (1 Reply)
Discussion started by: jimmyuk
1 Replies

5. IP Networking

Does my provider limit my internet access or somesites access?

Hi Good Day, i would like to ask for further info about my problems experiencing this evening. Im a PPP0 connection in the internet using 3G located in asia pacific region.i had this problem this evening in my INTERNET connections that there are some sites i can't open example ( Gizmodo.com,... (2 Replies)
Discussion started by: jao_madn
2 Replies

6. AIX

ftp access without shell access

Hi all, I'm using AIX v 5.3 I want to create system users to access through ftp or sftp and restrict those users into specific directory and don't traverse the whole file system just to be restricted within a directory and don't get shell access . i don't want to use any other third party... (7 Replies)
Discussion started by: h@foorsa.biz
7 Replies

7. Solaris

cp: cannot access

Hi all, I have this statement: cp `ls -lrt |awk '{if($6=="Feb") print $9}'|wc -l` /smartapp/reports/archive_jan_feb_march/ However it fails with: cp: cannot access 948 The owner for this script is not a concern, May I know which part went wrong? (8 Replies)
Discussion started by: nikhil kasar
8 Replies

8. Solaris

samba read write access to owner and no access to other users

Hi All, I want to configure samba share permission so that only directory creator/owner has a read and write permission and other users should not have any read/write access to that folder.Will that be possible and how can this be achieved within samba configuration. Regards, Sahil (1 Reply)
Discussion started by: sahil_shine
1 Replies

9. Homework & Coursework Questions

Remote Access vs Local Access

Dear Friends, This is not a problem , it's a course work (UNIX scenario).... As part of it I am searching Remote Attacks and find points as 1. Exploiting a listening service 2. Routing through Unix system that is providing security between 2 or more networks 3. User initiated Remote execution... (1 Reply)
Discussion started by: anespa
1 Replies

10. Proxy Server

How to use Squid on Linux to control certain IP to access Web Server and certain IP cannot access?

Dear all experts here, :) I would like to install a proxy server on Linux server to perform solely to control the access of Web server. In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server. I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
LINTIAN-INFO(1) 					User Contributed Perl Documentation					   LINTIAN-INFO(1)

NAME
lintian-info - give detailed information about Lintian's error tags SYNOPSIS
lintian-info [log-file...] lintian-info --tags tag ... DESCRIPTION
The lintian-info command parses the output of the lintian command and gives verbose information about the listed Lintian error tags, parses a Lintian override file and gives verbose information about the tags included, or (if given the -t or --tags option) explains a given tag or tags. If no log-file is specified on the command line, this command expects its input on stdin. Thus, the output of lintian can either be piped through lintian-info or a log file produced by lintian can be processed with this command. (Note, though, that the lintian command has a command line option -i to display the same results as lintian-info, so you will not normally need to pipe the output of lintian into this command.) OPTIONS
-a, --annotate Read from standard input or any files specified on the command line and search the input for lines formatted like Lintian override entries. For each one that was found, display verbose information about that tag. -h, --help Display usage information and exit. --profile prof Use the severities from the vendor profile prof when displaying tags. If the profile name does not contain a slash, the default profile for than vendor is chosen. If not specified, lintian-info loads the best profile for the current vendor. Please Refer to the Lintian User Manual for the full documentation of profiles. -t, --tags Rather than treating them as log file names, treat any command-line options as tag names and display the descriptions of each tag. EXIT STATUS
If -t or --tags was given and one or more of the tags specified were unknown, this command returns the exit code 1. Otherwise, it always returns with exit code 0. SEE ALSO
lintian(1) AUTHORS
Niels Thykier <niels@thykier.net> Richard Braakman <dark@xs4all.nl> Christian Schwarz <schwarz@monet.m.isar.de> perl v5.14.2 2013-02-16 LINTIAN-INFO(1)
All times are GMT -4. The time now is 12:33 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy