The What's New in the Sun N1 Service Provisioning System 5.2 Update 2 Release document describes how to install and use the new features in the Sun N1TM 5.2 Update 2 release.
This book is for system administrators and IT operators who are responsible for configuring and maintaining the Sun N1 Service Provisioning System.
This book assumes that you have already installed the Sun N1 Service Provisioning System 5.2 release in your data center environment. For information about how to install the Sun N1 Service Provisioning System 5.2 release, see the following books:
This book explains the following topics:
Chapter 1, Installing the N1 Service Provisioning System 5.2 Update 2 describes how to install the software on SPARC and x86 based systems.
Chapter 2, Variable Substitution in Repository Component Targeters describes the new variable substitution feature that enables dynamic targeting, which repository component targeters it affects, and explains how to use it.
Chapter 3, Install Step Component Variables describes a new feature for this release of the N1 Service Provisioning System, which allows you to supply component variable values in the <install> step of a plan.
Chapter 4, Unrestrictive Host Locking describes the new locking feature, and explains how to use it.
Chapter 5, Copying Objects Between Master Servers describes an import-export feature, which is a new, simple way to copy objects such as components or plans between master servers.
Appendix A, Appendix — New Commands provides details of new commands provided to support the import-export feature.
Third-party URLs are referenced in this document and provide additional, related information.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions|
Typeface |
Meaning |
Example |
|---|---|---|
|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
|
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
|
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
|
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts|
Shell |
Prompt |
|---|---|
|
C shell |
machine_name% |
|
C shell for superuser |
machine_name# |
|
Bourne shell and Korn shell |
$ |
|
Bourne shell and Korn shell for superuser |
# |