The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM
The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM
The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
a. Use the <strong>VM</strong>LINK command to both link the disk read-only and access it as the highest<br />
available file mode. <strong>The</strong> default read password is read, however, if you changed your<br />
passwords as described in section 4.9.1, “Changing passwords in USER DIRECT” on<br />
page 63, then it will be lnx4vm (or whatever you set it to).<br />
==> vmlink maint 191<br />
ENTER READ PASSWORD:<br />
lnx4vm<br />
DMS<strong>VM</strong>L2060I MAINT 191 linked as 0120 file mode Z<br />
b. Copy the PROFILE XEDIT to the A disk:<br />
==> copy profile xedit z = = a<br />
► Copy the default configuration files, which are on PERFS<strong>VM</strong>'s D disk, to your A disk:<br />
==> copy * * d = = a<br />
► <strong>The</strong> main configuration file is FCONX $PROFILE. Edit that file and search <strong>for</strong> the string<br />
<strong>VM</strong>CF.<br />
==> x fconx $profile<br />
====> /vmcf<br />
This should take you to line 175 where the next 4 lines are comments starting with an *.<br />
Per<strong>for</strong>m the following changes:<br />
– Uncomment the second and fourth line by changing *C to FC<br />
– Change port 81 to 80 on the fourth line - this will enable you to use a browser interface<br />
without having to specify port 81 on the URL (with a :81 suffix).<br />
<strong>The</strong> modified lines should be as follows. Save your changes with the FILE subcommand:<br />
* Following command activates <strong>VM</strong>CF data retrieval interface<br />
FC MONCOLL <strong>VM</strong>CF ON<br />
* Following command activates Internet interface<br />
FC MONCOLL WEBSERV ON TCPIP TCPIP 80<br />
* Following command activates Internet interface with SSL<br />
*C MONCOLL WEBSERV ON SSL TCPIP TCPIP 81 IDTEST RACF<br />
...<br />
====> file<br />
► Create a remote data retrieval authorization file with your z/<strong>VM</strong> system identifier (replace<br />
POKSND61 with your system identifier):<br />
==> x fconrmt authoriz<br />
====> a 2<br />
POKSND61 PERFS<strong>VM</strong> S&FSERV<br />
POKSND61 MAINT DATA CMD EXCPMSG<br />
► Create a system identification file that links your z/<strong>VM</strong> system and PERFS<strong>VM</strong> to a special<br />
resource name called FCXRES00. (replace POKSND61 with your system identifier):<br />
==> x fconrmt systems<br />
====> a<br />
POKSND61 PERFS<strong>VM</strong> ESA N FCXRES00<br />
► Edit the PROFILE EXEC file, search <strong>for</strong> the word “once” and uncomment the five MONITOR<br />
SAMPLE and the two MONITOR EVENT statements:<br />
==> x profile exec a<br />
====> /once<br />
Be<strong>for</strong>e:<br />
...<br />
/*** Once you have PERFKIT enabled and running uncomment the ***/<br />
/*** following comments ***/<br />
/* 'CP MONITOR SAMPLE ENABLE PROCESSOR' */<br />
230 <strong>The</strong> <strong>Virtualization</strong> <strong>Cookbook</strong> <strong>for</strong> RHEL 6