27.12.2012 Views

The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM

The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM

The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

a. Use the <strong>VM</strong>LINK command to both link the disk read-only and access it as the highest<br />

available file mode. <strong>The</strong> default read password is read, however, if you changed your<br />

passwords as described in section 4.9.1, “Changing passwords in USER DIRECT” on<br />

page 63, then it will be lnx4vm (or whatever you set it to).<br />

==> vmlink maint 191<br />

ENTER READ PASSWORD:<br />

lnx4vm<br />

DMS<strong>VM</strong>L2060I MAINT 191 linked as 0120 file mode Z<br />

b. Copy the PROFILE XEDIT to the A disk:<br />

==> copy profile xedit z = = a<br />

► Copy the default configuration files, which are on PERFS<strong>VM</strong>'s D disk, to your A disk:<br />

==> copy * * d = = a<br />

► <strong>The</strong> main configuration file is FCONX $PROFILE. Edit that file and search <strong>for</strong> the string<br />

<strong>VM</strong>CF.<br />

==> x fconx $profile<br />

====> /vmcf<br />

This should take you to line 175 where the next 4 lines are comments starting with an *.<br />

Per<strong>for</strong>m the following changes:<br />

– Uncomment the second and fourth line by changing *C to FC<br />

– Change port 81 to 80 on the fourth line - this will enable you to use a browser interface<br />

without having to specify port 81 on the URL (with a :81 suffix).<br />

<strong>The</strong> modified lines should be as follows. Save your changes with the FILE subcommand:<br />

* Following command activates <strong>VM</strong>CF data retrieval interface<br />

FC MONCOLL <strong>VM</strong>CF ON<br />

* Following command activates Internet interface<br />

FC MONCOLL WEBSERV ON TCPIP TCPIP 80<br />

* Following command activates Internet interface with SSL<br />

*C MONCOLL WEBSERV ON SSL TCPIP TCPIP 81 IDTEST RACF<br />

...<br />

====> file<br />

► Create a remote data retrieval authorization file with your z/<strong>VM</strong> system identifier (replace<br />

POKSND61 with your system identifier):<br />

==> x fconrmt authoriz<br />

====> a 2<br />

POKSND61 PERFS<strong>VM</strong> S&FSERV<br />

POKSND61 MAINT DATA CMD EXCPMSG<br />

► Create a system identification file that links your z/<strong>VM</strong> system and PERFS<strong>VM</strong> to a special<br />

resource name called FCXRES00. (replace POKSND61 with your system identifier):<br />

==> x fconrmt systems<br />

====> a<br />

POKSND61 PERFS<strong>VM</strong> ESA N FCXRES00<br />

► Edit the PROFILE EXEC file, search <strong>for</strong> the word “once” and uncomment the five MONITOR<br />

SAMPLE and the two MONITOR EVENT statements:<br />

==> x profile exec a<br />

====> /once<br />

Be<strong>for</strong>e:<br />

...<br />

/*** Once you have PERFKIT enabled and running uncomment the ***/<br />

/*** following comments ***/<br />

/* 'CP MONITOR SAMPLE ENABLE PROCESSOR' */<br />

230 <strong>The</strong> <strong>Virtualization</strong> <strong>Cookbook</strong> <strong>for</strong> RHEL 6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!