NAME | DESCRIPTION | EXAMPLES | SEE ALSO
The bart(1MCM) command generates a manifest that describes the contents of a managed host. A manifest consists of a header and entries. Each entry represents a single file. Entries are sorted in ascending order by file name. Any nonstandard file names, such as those that contain embedded newline or tab characters, have the special characters quoted prior to being sorted. See Quoting Syntax.
Lines that begin with ! supply metadata about the manifest. The manifest version line indicates the manifest specification version. The date line shows the date on which the manifest was created, in date(1) form.
Some lines are ignored by the manifest comparison tool. Ignored lines include blank lines, lines that consist only of white space, and comments that begin with #.
In addition to metadata lines, the header contains the format comment block. This comment block lists the attributes reported for each file type.
To see the format of an manifest file, see EXAMPLES.
fname D size mode acl dirmtime uid gid [xattr xcontents]* fname P size mode acl mtime uid gid [xattr xcontents]* fname S size mode acl mtime uid gid [xattr xcontents]* fname F size mode acl mtime uid gid contents [xattr xcontents]* fname L size mode acl lnmtime uid gid dest [xattr xcontents]* fname B size mode acl mtime uid gid devnode [xattr xcontents]* fname C size mode acl mtime uid gid devnode [xattr xcontents]*
Each entry begins with fname, which is the name of the file. To prevent parsing problems that are caused by special characters embedded in file names, file names are encoded as described in Quoting Syntax.
Subsequent fields represent the following file attributes.
Type of file. Possible values are as follows:
B for a block device node
C for a character device node
D for a directory
F for a file
L for a symbolic link
P for a pipe
S for a socket
File size in bytes.
Octal number that represents the permissions of the file.
ACL attributes for the file. For a file with ACL attributes, this field contains the output from acltotext().
Numerical user ID of the owner of this entry.
Numerical group ID of the owner of this entry.
Last modification time, in seconds since 00:00:00 UTC, January 1, 1970, for directories, links, and other files, respectively.
Checksum value of the file. This attribute is only specified for regular files. If you turn off context checking or if checksums cannot be computed, the value of this field is -.
Destination of a symbolic link.
Value of the device node. This attribute is for character device files and block device files only.
Zero or more checksum values for files with extended attributes. The attributes are described in alphabetical order. If you specify the -n option or the IGNORE contents directive, the value of xcontents is -.
The rules file supports a quoting syntax for representing nonstandard file names.
When generating an manifest for file names that embed tab, space, or newline characters, the special characters are encoded in their octal forms.
Input Character | Quoted Character |
---|---|
(space) | \(space) |
(tab) | \(tab) |
(newline) | \(newline) |
? | \? |
[ | \[ |
* | \* |
The following is a sample system manifest file. The file entries are sorted by the encoded versions of the file names to correctly handle special characters.
! Version 1.0 ! Mon Feb 11 10:55:30 2002 # Format: # fname D size mode acl dirmtime uid gid [xattr xcontents]* # fname P size mode acl mtime uid gid [xattr xcontents]* # fname S size mode acl mtime uid gid [xattr xcontents]* # fname F size mode acl mtime uid gid contents [xattr xcontents]* # fname L size mode acl lnmtime uid gid dest [xattr xcontents]* # fname B size mode acl mtime uid gid devnode [xattr xcontents]* # fname C size mode acl mtime uid gid devnode [xattr xcontents]* /etc D 3584 40755 user::rwx,group::r-x,mask::r-x,other::r-x, 3c6803d7 0 3 /etc/.login F 524 100644 user::rw-,group::r--,mask::r--,other::r--, 3c165878 0 3 27b53d5c3e844af3306f1f12b330b318 /etc/.pwd.lock F 0 100600 user::rw-,group::---,mask::---,other::---, 3c166121 0 0 d41d8cd98f00b204e9800998ecf8427e /etc/.syslog_door L 20 120777 user::rw-,group::r--,mask::rwx,other::r--, 3c6803d5 0 0 /var/run/syslog_door /etc/autopush L 16 120777 user::r-x,group::r-x,mask::r-x,other::r-x, 3c165863 0 0 ../sbin/autopush /etc/cron.d/FIFO P 0 10600 user::rw-,group::---,mask::---,other::---, 3c6803d5 0 0 |
NAME | DESCRIPTION | EXAMPLES | SEE ALSO
NAME | DESCRIPTION | EXAMPLES | SEE ALSO
The rules file is a text file that is used by the bart(1MCM) command. The rules file determines which files to validate and which file attributes of those files to ignore.
Some lines are ignored by the manifest comparison tool. Ignored lines include blank lines, lines that consist only of white space, and comments that begin with #.
The rules file supports three directives: CHECK, IGNORE, and a subtree directive, which is an absolute path name and optional pattern matching modifiers. The rules file uses the directives to create logical blocks.
[IGNORE attribute...]* [CHECK] [attribute...]* subtree1 [pattern...]* [IGNORE attribute...]* [CHECK] [attribute...]* subtree2 [pattern...]* subtree3 [pattern...]* subtree4 [pattern...]* [IGNORE attribute...]* [CHECK] [attribute...]* ...
Rule blocks are composed of statements that are created by using directives and arguments. There are three types of blocks.
The first block in the file. The block is considered ``global'' if it specifies CHECK and IGNORE statements, but no previous subtree statement. A global block pertains to all subsequent blocks.
A block that specifies CHECK and IGNORE statements as well as a subtree directive. The rules in this block pertain to files and directories found in the specified subtree.
A block that contains a null CHECK statement, no arguments. This block inherits the global CHECK statements and IGNORE statements.
The order in which CHECK and IGNORE statements appear in blocks is important. The bart command processes CHECK and IGNORE statements in the order in which they are read, with later statements overriding earlier statements.
Subtree specifications must appear one per line. Each specification must begin with an absolute path name. Optionally, each specification can be followed by pattern-matching arguments.
When a file being tracked belongs to more than one subtree directive, bart performs the following resolution steps:
Applies the CHECK and IGNORE statements set in the global block. Note that all CHECK and IGNORE statements are processed in order.
Finds the last subtree directive that matches the file.
Processes the CHECK and IGNORE statements that belong to the last matching subtree directive. These statements are processed in the order in which they are read, overriding global settings.
For a given subtree directive, all pattern matching statements are logically ANDed with the subtree. Patterns have the following syntax:
Wildcards are permitted for both the subtree and pattern matching statements.
The exclamation point (!) character represents logical NOT.
A pattern that terminates with a slash is a subtree. The absence of a slash indicates that the pattern is not a directory. The subtree itself does not require an end slash.
For example, the following subtree example includes the contents of /home/nickiso/src except for object files, core files, and all of the SCCS subtrees. Note that directory names that terminate with .o and directories named core are not excluded because the patterns specified do not terminate with /.
/home/nickiso/src !*.o !core !SCCS/ CHECK all
/home/nickiso/src !*.o !core /home/nickiso/Mail /home/nickiso/docs *.sdw CHECK all IGNORE mtime lnmtime dirmtime
The files included in the previous example are as follows:
Everything under /home/nickiso/src except for *.o and core files
Everything under /home/nickiso/Mail
All files under /home/nickiso/docs that end in *.sdw
For these files, all attributes are checked except for modification times.
The bart command uses CHECK and IGNORE statements to define which attributes to track or ignore. Each attribute has an associated keyword.
The attribute keywords are as follows:
acl
all
contents
dest
devnode
dirmtime
gid
lnmtime
mode
mtime
size
type
uid
xattrs
The all keyword refers to all file attributes. See bart_manifest(4CM).
# Global rules, track everything except dirmtime. CHECK all IGNORE dirmtime # The files in /data* are expected to change, so don't bother # tracking the attributes expected to change. # Furthermore, by specifying ``IGNORE contents,'' you save # time and resources. /data* IGNORE contents mtime size /home/nickiso f* bar/ IGNORE acl # For /usr, apply the global rules. /usr CHECK # Note: Since /usr/tmp follows the /usr block, the /usr/tmp # subtree is subjected to the ``IGNORE all.'' /usr/tmp /home/nickiso *.o /home/nickiso core /home/nickiso/proto IGNORE all
The following files are cataloged based on the sample rules file:
All attributes, except for dirmtime, mtime, size, and contents, are tracked for files under the /data* subtrees.
Files under the /usr subtree, except for /usr/tmp, are cataloged by using the global rules.
If the /home/nickiso/foo.c file exists, its attributes, except for acl and dirmtime, are cataloged.
All .o and core files under /home/nickiso, as well as the /home/nickiso/proto and /usr/tmp subtrees, are ignored.
If the /home/nickiso/bar/foo.o file exists, it is ignored because it is subject to the last block.
NAME | DESCRIPTION | EXAMPLES | SEE ALSO
NAME | DESCRIPTION | EXAMPLES | SEE ALSO
Shared profiles describe how one or more managed hosts are configured with a software stack. Much of the information described by these profiles is the same as described in an installation profile.
A shared profile file name must use the .cmsp suffix, for example, web-server.cmsp.
The shared profile is a set of properties and associated property values, one property per line. The property format is as follows:
property-name=property-value
Lines that contain only whitespace are ignored. Lines whose first non-whitespace character is # or ! are comments. The rest of the lines in the shared profile describe properties.
The property name consists of all the characters in the line starting with the first non-whitespace character and up to, but not including, the first equals sign (=) character.
The property value consists of the rest of the line after the equals sign.
If you want a backslash character to appear in the property value, escape the backslash with another backslash.
The following example shows that the value of the base_config_target_arch property is sun4u.
base_config_target_arch=sun4u
The following example shared profile uses the default values to create one boot environment.
# # Example shared profile for a system with one boot environment. # # This example shared profile assumes a disk that is no smaller than # 7 Gbytes in size. # # You must also specify the following properties with appropriate # values: # # o base_config_flar_archive # Name of the Solaris Flash archive associated with this # shared profile # o base_config_boot_image # Location of the Solaris boot image associated with the # specified Solaris Flash archive # o base_config_sysidcfg_rootpw # Encrypted root password entry, which can be taken from the # password entry in the /etc/shadow file # o base_config_sysidcfg_timezone # Appropriate time zone value from /usr/share/lib/zoneinfo # base_config_target_arch=sun4u base_config_sysidcfg_nameservice=none base_config_sysidcfg_networkinterface=primary base_config_sysidcfg_netmask=255.255.255.0 base_config_sysidcfg_ipv6=no base_config_sysidcfg_defaultroute=none base_config_sysidcfg_systemlocale=C base_config_sysidcfg_terminal=vt100 base_config_sysidcfg_timeserver=localhost base_config_sysidcfg_security_policy=none base_config_be_0_root_device=rootdisk.s0 base_config_be_0_root_size=free base_config_be_0_var_device=rootdisk.s3 base_config_be_0_var_size=1024 base_config_local_swap1_device=rootdisk.s1 base_config_local_swap1_size=2048
The following example shared profile uses the default values to create two boot environments.
# # Example shared profile for a system with two boot environments. # # This example shared profile assumes a disk that is no smaller than # 12 Gbytes in size. # # You must also specify the following properties with appropriate # values: # # o base_config_flar_archive # Name of the Solaris Flash archive associated with this # shared profile # o base_config_boot_image # Location of the Solaris boot image associated with the # specified Solaris Flash archive # o base_config_sysidcfg_rootpw # Encrypted root password entry, which can be taken from the # password entry in the /etc/shadow file # o base_config_sysidcfg_timezone # Appropriate time zone value from /usr/share/lib/zoneinfo # base_config_target_arch=sun4u base_config_sysidcfg_nameservice=none base_config_sysidcfg_networkinterface=primary base_config_sysidcfg_netmask=255.255.255.0 base_config_sysidcfg_ipv6=no base_config_sysidcfg_defaultroute=none base_config_sysidcfg_systemlocale=C base_config_sysidcfg_terminal=vt100 base_config_sysidcfg_timeserver=localhost base_config_sysidcfg_security_policy=none base_config_be_0_root_device=rootdisk.s0 base_config_be_0_root_size=free base_config_be_0_var_device=rootdisk.s3 base_config_be_0_var_size=1024 base_config_be_1_root_device=rootdisk.s4 base_config_be_1_root_size=4096 base_config_be_1_var_device=rootdisk.s5 base_config_be_1_var_size=1024 base_config_local_swap1_device=rootdisk.s1 base_config_local_swap1_size=2048
NAME | DESCRIPTION | EXAMPLES | SEE ALSO
NAME | SYNOPSIS | DESCRIPTION | ATTRIBUTES | SEE ALSO
flash_archive
A flash archive is an easily transportable version of a reference configuration of the Solaris operating environment, plus other optional software. Such an archive is used for the rapid installation of the Solaris software on large numbers of machines. The machine that contains a flash archive is referred to as a master system. A machine that receives a copy of a flash archive is called a clone system.
An archive is used for initial installation or whenever a complete, fresh installation is required. An archive contains all of the files from a master and overwrites the installed software on a clone completely.
You create a flash archive with the flar(1MCM) command or the flarcreate(1MCM) command. You view information about a given flash archive with flar. The flar command also enables you to split or combine the sections of a flash archive.
Flash archives are monolithic files that contain the following:
Archive identification information
Files that have been copied from a master system and that will be extracted onto a clone system
The standard extension for a file that contains a flash archive is .flar.
The flash archive is laid out in the following sections:
Archive cookie
Archive identification
Predeployment
Postdeployment
Reboot
Summary
User-defined (optional)
Archive files
The only assumptions that an application processing the archive can make about section number and placement is that there is an identification section located immediately after the archive cookie and that the last section in the archive is an archive files section.
These sections are described in the following subsections.
The very beginning of the archive contains a cookie, which serves to identify the file as a flash archive. It is also used by the deployment code for identification and validation purposes.
The case-sensitive, newline-terminated cookie that identifies version 1.n flash archives, is FlAsH-aRcHiVe-1.n, where n is an integer in the range 0 through 9.
The archive version is designed to allow for the future evolution of the flash archive specification while allowing applications that process flash archives to determine whether specific archives are of a format that can be handled correctly. The archive version is a number of the form x.y, where x is the major version number, and y is the minor version number.
When an application encounters a flash archive with an unknown major version number, it should issue an error message and exit.
The archive identification section is plain text, delimited with newline characters. It is composed of a series of keyword and value pairs, with one pair allowed per line. Keywords and values are separated by a single equal sign. There are no limits to the length of individual lines. Binary data to be included as the value to a keyword is base64 encoded. The keywords themselves are case-insensitive. The case-sensitivity of the values is determined by the definition of the keyword, though most are case-insensitive.
The global order of the keywords within the identification section is undefined, except for the section boundary keywords. The identification section must begin with section_begin=ident and must end with section_end=ident.
In addition to the keywords defined for the flash archive and enumerated in the following table, users can define their own. These user-defined keywords are ignored by the flash mechanisms, but can be used by user-provided scripts or programs that process the identification section. User-defined keywords must begin with X, and contain characters other than linefeeds, equal signs, and null characters. For example, X-department is a valid user-defined keyword. department, which lacks the X- prefix, is not. Suggested naming conventions for user-defined keywords include the underscore-delimited descriptive method used for the pre-defined keywords, or a federated convention similar to that used to name Java packages.
Applications that process the identification section will process unrecognized non-user-defined keywords differently, depending on whether the archive version is known. If the application recognizes the archive specification version, it will reject any unrecognized non-user-defined keyword. If the application does not recognize the specification version, that is, if the minor version number is higher than the highest minor version it knows how to process, unrecognized non-user-defined keywords will be ignored. These ignored keywords are reported to the user by means of a non-fatal warning message.
Following are the keywords defined for this version of the Flash archive specification.
Keyword |
Type of Value |
Required |
---|---|---|
section_begin |
Text |
Yes |
section_end |
Text |
Yes |
archive_id |
Text |
No |
files_archived_method |
Text |
No |
files_compressed_method |
Text |
No |
files_archived_size |
Numeric |
No |
files_unarchived_size |
Numeric |
No |
creation_date |
Text |
No |
creation_master |
Text |
No |
content_name |
Text |
Yes |
content_type |
Text |
No |
content_description |
Text |
No |
content_author |
Text |
No |
content_architectures |
Text list |
No |
creation_node |
Text |
No |
creation_hardware_class |
Text |
No |
creation_platform |
Text |
No |
creation_processor |
Text |
No |
creation_release |
Text |
No |
creation_os_name |
Text |
No |
creation_os_version |
Text |
No |
Future versions of the identification section might define additional keywords. The only guarantee regarding the new keywords is that they will not intrude upon the user-defined keyword namespace as shown previously.
Following is an example identification section:
section_begin=identification files_archived_method=cpio files_compressed_method=compress files_archived_size=259323342 files_unarchived_size=591238111 creation_date=20000131221409 creation_master=pumbaa content_name=Finance Print Server content_type=server content_description=Solaris 8 Print Server content_author=Mighty Matt content_architectures=sun4u creation_node=pumbaa creation_hardware_class=sun4u creation_platform=SUNW,Sun-Fire creation_processor=sparc creation_release=5.9 creation_os_name=SunOS creation_os_version=s81_49 x-department=Internal Finance section_end=identification
Following are descriptions of the identification section keywords:
section_begin
section_end
These keywords are used to delimit sections in the archive and are not limited exclusively to the identification section. For example, the archive files section includes a section_begin keyword, though with a different value. User-defined archive sections will be delimited by section_begin and section_end keywords, with values appropriate to each section. The currently defined section names are given in the following table. User-defined names should follow the same convention as user-defined identification sections, with the additional restriction that they not contain forward slashes (/).
Section |
Boundary |
---|---|
Identification |
identification |
Archive files |
archive |
Archive cookie |
cookie |
Note that while the archive cookie does not use section boundaries, and thus has no need for a section name within the archive itself, the flar(1MCM) command uses section names when splitting the archive, and thus requires a section name for the archive cookie. The name cookie is reserved for that purpose.
The following keywords, used in the archive identification section, describe the contents of the archive files section.
This optional keyword uniquely describes the contents of the archive. It is computed as a unique hash value of the bytes representing the archive. Currently this value is represented as an ASCII hexadecimal 128-bit MD5 hash of the archive contents. This value is used by the installation software only to validate the contents of the archive during archive installation.
If the keyword is present, the hash value is recomputed during extraction based on the contents of the archive being extracted. If the recomputed value does not match the stored value in the identification section, the archive is deemed corrupt, and appropriate actions can be taken by the application.
If the keyword is not present, no integrity check is performed.
This keyword describes the archive method used in the files section. If this keyword is not present, the files section is assumed to be in CPIO format with ASCII headers (the -c option to cpio). If the keyword is present, it can have the following value:
The archive format in the files section is CPIO with ASCII headers.
The compression method indicated by the files_compressed_method keyword (if present) is applied to the archive file created by the archive method.
The introduction of additional archive methods will require a change in the major archive specification version number, as applications aware only of cpio will be unable to extract archives that use other archive methods.
This keyword describes the compression algorithm (if any) used on the files section. If this keyword is not present, the files section is assumed to be uncompressed. If the keyword is present, it can have one of the following values:
The files section is not compressed.
The files section is compressed using compress(1).
The compression method indicated by this keyword is applied to the archive file created by the archive method indicated by the value of the files_archived_method keyword (if any). gzip compression of the flash archive is not currently supported, as the gzip decompression program is not included in the standard miniroot.
Introduction of an additional compression algorithm would require a change in the major archive specification version number, as applications aware only of the above methods will be unable to extract archives that use other compression algorithms.
The value associated with this keyword is the size of the archived files section, in bytes. This value is used by the deployment software only to give extraction progress information to the user. While the deployment software can easily determine the size of the archived files section prior to extraction, it cannot do so in the case of archive retrieval via a stream. To determine the compressed size when extracting from a stream, the extraction software would have to read the stream twice. This double read would result in an unacceptable performance penalty compared to the value of the information gathered.
If the keyword is present, the value is used only for the provision of status information. Because this keyword is only advisory, deployment software must be able to handle extraction of archives for which the actual file section size does not match the size given in files_archive_size.
If files_archive_size is not present and the archive is being read from a stream device that does not allow the prior determination of size information, such as a tape drive, completion status information will not be generated. If the keyword is not present and the archive is being read from a random-access device such as a mounted file system, or from a stream that provides size information, the compressed size will be generated dynamically and used for the provision of status information.
This keyword defines the cumulative size in bytes of the extracted archive. The value is used for file system size verification. The following verification methods are possible using this approach:
If the files_unarchived_size keyword is absent, no checking for space will be performed.
If the files_unarchived_size keyword is present and the associated value is an integer, the integer will be compared against the aggregate free space created by the requested file system configuration.
The following keywords provide descriptive information about the archive as a whole. They are generally used to assist the user in archive selection and to aid in archive management. These keywords are all optional and are used by the deployment programs only to assist the user in distinguishing between individual archives.
The value of the creation_date keyword is a textual timestamp representing the time of creation for the archive. The value of this keyword can be overridden at archive creation time through flarcreate(1MCM). The timestamp must be in ISO-8601 complete basic calendar format without the time designator (ISO-8601, §5.4.1(a)) as follows:
CCYYMMDDhhmmss |
For example:
20000131221409 (January 31st, 2000 10:14:09pm) |
The date and time included in the value should be in GMT.
The value of the creation_master keyword is the name of the master machine used to create the archive. The value can be overridden at archive creation time.
The value of the content_name keyword should describe the archive's function and purpose. It is similar to the NAME parameter found in Solaris packages.
The value of the content_name keyword is used by the deployment utilities to identify the archive and can be presented to the user during the archive selection process, the extraction process, or both. The value must be no longer than 256 characters.
The value of this keyword specifies a category for the archive. This category is defined by the user and is used by deployment software for display purposes. This keyword is the flash analog of the Solaris packaging CATEGORY keyword.
The value of this keyword is used to provide the user with a description of what the archive contains and should build on the description provided in content_name. In this respect, content_description is analogous to the DESC keyword used in Solaris packages.
There is no length limit to the value of content_description. To facilitate display, the value can contain escaped newline characters. As in C, the escaped newline takes the form of \n. Due to the escaped newline, backlashes must be included as \\. The description is displayed in a non-proportional font, with at least 40 characters available per line. Lines too long for display are wrapped.
The value of this keyword is a user-defined string identifying the creator of the archive. Suggested values include the full name of the creator, the creator's email address, or both.
The value of this keyword is a comma-delimited list of the kernel architectures supported by the given archive. The value of this keyword is generated at archive creation time, and can be overridden by the user at that time. If this keyword is present in the archive, the extraction mechanism validates the kernel architecture of the clone system with the list of architectures supported by the archive. The extraction fails if the kernel architecture of the clone is not supported by the archive. If the keyword is not present, no architecture validation is performed.
The following keywords have default values that are filled in by uname(2) at the time the flash archive is created. If you create a flash archive in which the root directory is not /, the flash archive software inserts the string UNKNOWN for all of the creation_* keywords except creation_node, creation_release, and creation_os_name. For creation_node, the flash software uses the contents of the nodename(4) file. For creation_release and creation_os_name, the flash software attempts to use the contents of <root_directory>/var/sadm/system/admin/INST_RELEASE. If it is unsuccessful in reading this file, it assigns the value UNKNOWN.
Regardless of its source, you cannot override the value of a keyword that is filled in by uname.
The return from uname -n.
The return from uname -m.
The return from uname -i.
The return from uname -p.
The return from uname -r.
The return from uname -s.
The return from uname -v.
Contain internal information that the flash software uses before and after deploying an operating environment image. These sections are for the exclusive use of the flash software.
Contains a summary of archive creation. This section records the activities of predeployment and postdeployment scripts.
Following the identification section can be zero or more user-defined sections. These sections are not processed by the archive extraction code and can be used for any purpose.
User-defined sections must be line-oriented, terminated with newline (ASCII 0x0a) characters. There is no limit on the length of individual lines. If binary data is to be included in a user-defined section, it should be encoded using base64 or a similar algorithm.
The archive files section contains the files gathered from the master system. While the length of this section should be the same as the value of the files_archived_size keyword in the identification section, you should not assume that these two values are equal. This section begins with section_begin=archive, but it does not have an ending section boundary.
See attributes(5) for descriptions of the following attributes:
ATTRIBUTE TYPE |
ATTRIBUTE VALUE |
---|---|
Availability |
SUNWinst |
NAME | SYNOPSIS | DESCRIPTION | ATTRIBUTES | SEE ALSO
NAME | DESCRIPTION | SEE ALSO
You can change the behavior of the Change Manager application by modifying certain runtime parameters. These parameters are stored in the application configuration file, ichange.cfg. The configuration file is located in the /var/opt/SUNWsymon/cfg directory.
When you make changes to the ichange.cfg file, you must restart the Sun Management Center services before the changes can take effect.
Restart the Sun Management Center services by running the following command as superuser:
# /opt/SUNWsymon/sbin/es-stop -S # /opt/SUNWsymon/sbin/es-start -S |
The cmdataroot parameter specifies the location of the Change Manager file hierarchy. cmdataroot points to the root of the Change Manager file hierarchy.
You might want to change the value of this parameter if you are moving the Change Manager repository to a different location.
The default value is the /var/opt/ichange directory.
This is the Sun Management Center agent parameter:
Sun Management Center agent port to be used. Any update or reinstallation operations in which host parameters do not explicitly specify a value for the agent port will use this one.
The default value is 161.
The following parameters describe job execution characteristics:
Interval to wait for a reboot, update, or reinstallation to complete. This is equivalent to the time it takes for the following events to occur:
Complete the entire software installation, including any finish scripts
The subsequent reboot to return
Any boot-time startup procedures to run
The Sun Management Center agent to reestablish communications with the management server
If the host does not reboot and reestablish agent communications with the Sun Management Center server within the specified time period, the associated management operation will fail with a timeout error.
You might need to change this value if any of the following are true:
A managed host takes an unusually long time to boot.
Your Sun Management Center topology requires a long time to establish server context for a newly configured agent.
A particular software stack takes a long time to install.
Finish and startup scripts take a long time to complete.
The default value is 1800000 milliseconds (30 minutes).
Amount of time to wait for a managed host to shut down after a management operation has requested a reboot. This is effectively the time it takes for a system to complete an init 6 sequence.
If the host does not shut itself down within the specified time, the associated management operation will fail with a timeout error. Thus, you might need to adjust this value if a host or software stack takes an unusually long time to complete its shutdown sequence.
The default value is 300000 milliseconds (5 minutes).
NAME | DESCRIPTION | SEE ALSO