Sponsored Content
Operating Systems Solaris How to backup (create image) SunOS 5.10 sparc? Post 303013109 by hicksd8 on Thursday 15th of February 2018 06:08:52 AM
Old 02-15-2018
Another, perhaps silly, question is could the two nodes be running different versions of NFS? What is the remote node OS holding the flash archive?

You could try this just to test.

Boot from CD into single user.

Code:
ok> boot cdrom -s

Plumb, configure, and up, the network interface manually. See this thread post#12 where I explain how to do that:

Ufsrestore

You should then be able to ping the remote host, and then mount the remote NFS handle, and read the archive. That will prove workability.
This User Gave Thanks to hicksd8 For This Post:
 

7 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Create an Ignite image on tape from Online IgniteUX image

Hi, (HP-UX 11.11) I need to create a tape image of an igniteUX image created on our igniteUX server. That is to say. I have a "Online" image of the igniteUX of the targeted system but I now need to copy it to a useable TAPE (igniteUX) image so i can build an other server from it that is not... (3 Replies)
Discussion started by: Andrek
3 Replies

2. UNIX for Advanced & Expert Users

DES3 encryption in SunOS sparc

Hi, I want to encrypt a unix file using the des3 algorithm. Seems that there are no standard unix utilities readily available. Can you please suggest how I can encrypt a unix file using des3 ? (2 Replies)
Discussion started by: samuel.vincent
2 Replies

3. Solaris

Solaris 10 Sparc - backup drive how to read it?

Disk is: c0t1d0 partition> print Current partition table (original): Total disk cylinders available: 38307 + 2 (reserved cylinders) Part Tag Flag Cylinders Size Blocks 0 unassigned wm 0 - 38306 74.53GB (38307/0/0) 156292560 1 unassigned... (3 Replies)
Discussion started by: xnox
3 Replies

4. Shell Programming and Scripting

matching image files to create one image

Hi, I have two sets of image files. Both sets have names A to Z but set 1 ends with .cdt.png and set 2 ends with .matrix.png. I want set 1 to match with set 2 if the names match (i.e. A.cdt.png will match with A.matrix.png) and with the convert image tool (program for images), it will merge the... (6 Replies)
Discussion started by: kylle345
6 Replies

5. Solaris

How to scan for LUNs in SunOS sun4v sparc?

Hi everyone, We have the below sun Operating system, Now our storage team have Create a 500GB LUN for this server, How can i scan and mount the shared LUN ? Could anyone help me to resolve this issue. SunOS my_hostname.com 5.10 Generic_150400-09 sun4v sparc sun4v Update: -------- I... (9 Replies)
Discussion started by: babinlonston
9 Replies

6. Solaris

SunOS sun4v sparc ntp service in maintenance mode.

Hi experts, This is a production server. Host information's are below SunOS hostname_srv 5.10 Generic_150400-09 sun4v sparc sun4v Now issue with ntp service, This host have zone in it with 9 hosts, Every hosts have ntp service issue. While i check for the service status it's in... (3 Replies)
Discussion started by: babinlonston
3 Replies

7. Shell Programming and Scripting

Grep command Fails on SunOS Sparc

Hi, This command works ggrep -v -F -x -f app1.txt app2.txt But, I don't have ggrep on SunOS Sparc so I tried using grep instead but it errors out grep: illegal option -- F bash-2.03$ uname -a SunOS mymac 5.8 Generic_Virtual sun4v sparc sun4v Can you help me with a grep command that... (6 Replies)
Discussion started by: mohtashims
6 Replies
RECON(1)							     LAM TOOLS								  RECON(1)

NAME
recon - Check if LAM can be started. SYNTAX
recon [-abdhv] [<bhost>] OPTIONS
-a Report all host errors. -b Assume local and remote shell are the same. This means that only one remote shell invocation is used to each node. If -b is not used, two remote shell invocations are used to each node. -d Turn on debugging. -h Print the command help menu. -v Be verbose. DESCRIPTION
In order for LAM to be started on a remote UNIX machine, several requirements have to be fulfilled: 1) The machine must be reachable via the network. 2) The user must be able to remotely execute on the machine with the default remote shell program that was chosen when LAM was config- ured. This is usually rsh(1), but any remote shell program is acceptable (such as ssh(1), etc.). Note that remote host permission must be configured such that the remote shell program will not ask for a password when a command is invoked on remote host. 3) The remote user's shell must have a search path that will locate LAM executables. 4) The remote shell's startup file must not print anything to standard error when invoked non-interactively. If any of these requirements is not met for any machine declared in <bhost>, LAM will not be able to start. By running recon first, the user will be able to quickly identify and correct problems in the setup that would inhibit LAM from starting. The local machine where recon is invoked must be one of the machines specified in <bhost>. The <bhost> file is a LAM boot schema written in the host file syntax. See bhost(5). Instead of the command line, a boot schema can be specified in the LAMBHOST environment variable. Otherwise a default file, bhost.def, is used. LAM seaches for <bhost> first in the local directory and then in the installation directory under etc/. recon tests each machine defined in <bhost> by attempting to execute on it the tkill(1) command using its "pretend" option (no action is taken). This test, if successful, indicates that all the requirements listed above are met, and thus LAM can be started on the machine. If the attempt is successful, the next machine is checked. In case the attempt fails, a descriptive error message is displayed and recon stops unless the -a option is used, in which case recon continues checking the remaining machines. If recon takes a long time to finish successfully, this will be a good indication to the user that the LAM system to be started has slow communication links or heavily loaded machines, and it might be preferable to exclude or replace some of the machines in the system. Remote shell invocation Note that the default remote shell command can be overriden at invocation time with the LAMRSH environment variable. The LAMRSH environ- ment variable can be set with a new command and optional command line arguments. For example, the 1.x series of ssh clients require the -x flag to be specified to suppress standard ssh information from being sent to the standard error (which would cause recon to fail). For example (for the C shell and its derrivates): setenv LAMRSH "ssh -x" Normally, recon uses two remote shell invocations to each node. The first remote shell invocation is used to determine the user's shell on the remote node. The second remote shell invocation is used to launch the desired LAM binary on the remote node. If the -b switch is used, recon will assume that the user's shell on all remote nodes is the same as it is on the local node, and therefore only one remote shell invocation is used, which is noticably faster. In either case, on remote nodes, if the user's shell is not csh, tcsh, or bash, .profile is invoked by LAM before invoking any LAM binary. This allows the user to setup paths and any necessary environment before LAM binaries are invoked (csh and tcsh users can put such setup in their $HOME/.cshrc or $HOME/.tcshrc files; bash users can put this setup in their $HOME/.bashrc file). FILES
$LAMHOME/etc/lam-bhost.def default boot schema file EXAMPLES
recon -v mynodes Check if LAM can be started on all the UNIX machines described in the boot schema mynodes. Report about important steps as they are done. recon -v -a Check if LAM can be started on all the UNIX machines described in the default boot schema. Report about important steps as they are done. Check all the machines; do not stop after the first error message. SEE ALSO
rsh(1), tkill(1), bhost(5), lamboot(1), wipe(1), lam-helpfile(5) LAM 6.5.8 November, 2002 RECON(1)
All times are GMT -4. The time now is 11:05 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy