OpenVMS Academy Advanced System Administration


Course Code: VM220
Length: 5 days

Schedule and Registration

Course Description

This 5-day course covers tasks to create new OpenVMS environment, which include the installation of the OpenVMS software and performing the post installation tasks such as registering licenses, configuring the network and cluster environment. It also covers installing layered products, configuring the network and customizing the system. Labs are provided to reinforce the topics covered in the lecture.

Who Should Attend

This course is designed for system managers who need the skills to install and configure a new system or upgrade an existing system.

This course was excellent. The instructor (Lorin Ricker) was extremely knowledgeable and very accommodating and informative when asked to explain anything.

Prerequisites

Students taking this course have the following credentials. (The instructor will deliver this course under the assumption that students have attained this level of experience.)

Benefits of Attending this Class

This course covers tasks to create new OpenVMS Systems. These tasks include installing the OpenVMS and layered products software, setting up the network, and customizing the system. The course also covers post installation tasks, such as registering licenses and configuring the cluster environment. This course involves the students in relevant exercises that reinforce the lectures and gives students the application of the lectures so that they can install and configure a new OpenVMS installation.

This goal of this course is to teach how to configure and manage an OpenVMS environment on Alpha and Integrity servers, configure it into a network and cluster environment and perform other post installation tasks to help student became proficient system managers. However, it is not a goal in this course to make students network managers.

Instructor was very helpful in making the information useful to my specific VMS configuration.

Course Contents

Console
  • Integrity Console
    • Baseboard Management Controller
    • Management Processor
    • Extensible FIrmware Interface
    • Boot Options
    • Backing Up and Restoring the EFI
    • Updating the Firmware
  • Alpha Console
    • Commands
    • Console Variables
    • Updating the Firmware
    • wwidmgr
System Startup
  • Overview
    • Boot Block
  • Managing Boot Options from OpenVMS
  • Customizing Startup
    • Site-Specific Startup Procedures
    • SYSMAN Startup Database
    • Cluster Environment
    • Group and Account Specific Startup
  • Startup Logging
Shutdown Procedures
  • Overview
    • Application Cleanup
    • System Cleanup
  • Orderly System Shutdown
    • Shutdown Steps
    • Shutdown Options
    • Customization
    • SHUTDOWN.COM
    • SYSMAN
  • Emergency Shutdown
    • Emergency Shutdown from DCL
    • Emergency Shutdown from Console
    • Power off the System
Licensing
  • Overview
  • Terminology
    • License Database
    • License Management Utility
    • License Unit Requirement Table
    • Operating Environment
    • Product Authorization Key
    • Unit
  • Product Authorization Key
    • License Size
    • Checksum
    • Sample PAKs
  • Activating a License
    • License Command
    • VMSLICENSE Command Procedure
  • License Availability and Usage
    • Show License Command
    • License List Command
    • Operating Environment
    • License Usage
  • Cluster Considerations
  • Cleaning up the Database
Software Installation and Patches
  • Overview
    • Patches
    • Installation
  • Software Kit Validation
  • PolyCenter Software Installation
    • Installing a Product
    • Listing Installed Products
    • Viewing Installation History of a Product
  • VMSINSTAL
    • Software Installation
    • Example Installation
    • Viewing Installation History
INSTALL Utility
  • Overview
    • Reasons to Install a Known Image
  • Installing an Image
    • Using an Installed Image
    • Replacing an Installed Image
  • Viewing Installed Images
  • Removing an Installed Image
Device Management
  • Configuring Devices
  • Network Device Management
    • Console Settings on Alpha
    • LANCP
    • LAN Failover
    • Virtual LANs
  • USB
    • USB Configuration Manager
    • Viewing USB Configuration
    • Viewing USB Events
    • Managing USB Event Log
  • Multi-Processing
    • Terminology
    • Managing Multi-Processing Support
    • Managing CPUs
    • SHOW CPU Command
    • Starting and Stopping Processors
  • RAID
    • RAID 0
    • RAID 1
    • RAID 5
    • RAID 6
    • RAID 10 or 0+1
    • Virtual RAID
    • Host-Based Shadowing
    • Controller vs. Host-Based RAID
  • Storage Controllers
    • MSA$UTIL
    • SAS$UTIL
Network Configuration
  • TCP/IP Services
  • TCP/IP Management Utility
    • HELP Command
  • TCP/IP Addresses
    • Configuration Options
  • Name Translation
    • Local Host Database
    • Domain Name Server
  • Starting with Default Configuration
  • Configuration
    • General Configuration
    • Using sysconfig
  • Routing
    • Routing Tables
    • Managing Static Routes
    • Example with Multiple Routes
  • Services
    • Client Configuration
  • Startup and Shutdown
Volume Management
  • Overview
    • ODS-2 File System
    • ODS-5 File System
  • Manaing Volumes
  • Initializing a Volume
  • Mounting Volumes
  • Volume Characteristics
  • Process Characteristics Related to Volumes
    • Extended Command Parsing
    • Case Sensitive File Names
  • Bound Volume Sets
  • ODS-2 vs. ODS-5
    • Convert from ODS-2 to ODS-5
    • Revert from ODS-5 to ODS-2
  • UNIX Compatibility
  • Dynamic Volume Expansion
  • Host-Based Shadow Sets
    • Shadow Set Operations
    • Mounting a Shadow Set
    • Overriding Previous Shadow Set Membership
    • Managing Shadow Sets
    • Multi-Site Clusters
    • Initializing a Host-Based Shadow Set
    • Host Based Minimerge
    • DVE and Shadow Sets
Security
  • Login Security
    • System Password
    • Inaccessible User Authorization File
  • Object Security
    • Types of Access
    • Terminology
    • Classes of Protected Objects
    • UIC Based Security
    • Access Control List Protection
OpenVMS Clusters
  • Overview
    • Homogeneous vs. Heterogeneous
    • System Processes
    • Software Components
  • Cluster Interconnects
    • IP Cluster Interconnect
  • Cluster Authorization
  • Voting
    • Adjusting Expected Votes
    • Three Node Example
    • Four Node Example
    • Quorum Disk
    • Two Node Example with Quorum Disk
    • Other Configurations with Quorum Disk
  • Cluster State Transitions
  • Device Sharing
    • SHOW DEVICE Command
    • SET DEVICE Command
    • Mounting and Dismounting Cluster Accessible Disks
  • Device Naming
    • Using Only Local Disks
    • Using Only Shared Disks
    • Using Shared and Local Disks
  • VMScluster Configuration
    • System Parameters
    • Convert a Stand-Alone System to a Cluster Member
  • Satellite Nodes
  • Removing a Node from the Cluster
  • Modifying VMScluster Characteristics
  • Shared System Disk
    • Rolling Upgrade Considerations
  • System Shutdown
  • Viewing Cluster Information
  • SCACP
System Parameters
  • Overview
    • Dynamic vs. Static Parameters
  • Parameter Files
    • Utilities to Manage Parameters
  • Manual Changes to System Parameters
    • System Generation Utility
    • System Management Utility
    • SYSBOOT
  • Autogen
    • Feedback Information
    • When to Run AUTOGEN
    • Using AUTOGEN
    • MODPARAMS.DAT
    • AUTOGEN Files
System Files
  • Overview
    • Creating or Extending a System File
  • Page and Swap Files
    • Page and Swap File Usage
    • Secondary Files
    • Autogen
  • System Dump File
    • Dump Off System Disk
    • Sizing Dump File
    • Preserving the System Dump File
    • Viewing Dump File
Appendix A - Installing OpenVMS
  • Overview
    • OpenVMS Distribution
  • Installation
    • Boot Installatino Media
    • Configuration
    • Initial Reboot
    • Initial Autogen
    • Final Reboot
Appendix B - VAX Installation
  • Overview
  • VAX Installation
Appendix C - Post Installation Tasks
  • Expanding Page File
  • Decompressing Libraries
  • Secure Sockets Layer
    • Upgrade
    • System Startup
    • System Shutdown
    • Symbols
    • Installation Verification Procedure
  • Add Standard System Accounts
  • Other Tasks
    • User Environment Test Package
Appendix D - DECnet
  • Overview
  • DECnet Phase IV
    • Types of Objects
    • Routing
    • Managing DECnet
    • NETCONFIG.COM
    • Managing Node Database
    • Connectivity
    • Cluster Alias
    • Services
  • DECnet Plus
    • Manaing DECnet Plus
    • Managing Node Database
    • Services
Appendix E - Local Area Transport
  • Terminal Servers
  • Enable the LAT Protocol
  • Load Software on a Terminal Server
    • DSVCONFIG.COM
Appendix F - Accessing Storage Controllers
  • Diagnostic Utility Protocol
    • Configure FY Driver
    • Connecting to a Storage Controller
    • HSC50 Example
    • DSSI Example
  • SCSI Controller
    • Example
  • Smart Array Controllers
    • Example
  • Serial Attached SCSI RAID Controller

The instructor gave good examples of real world instances. Was willing to try & associate topics to our own experiences. Excellent instructor.

Cookie Manager

We use cookies to enhance the features of our web site. We don't set optional cookies unless you enable them. Using this tool sets a cookie on your device to remember your preferences. For more detailed information about the cookies we use, see our Cookies page.


Necessary Cookies

Necessary cookies enable core functionality such as security, network management, and accessibility. You may disable these by changing your browser settings, but this may affect how the website functions.


Preference Cookies

Preference cookies enable this site to remember information that changes the way the website behaves or looks.


Statistics Cookies

Statistic cookies help us to understand how visitors interact with the site by collecting and reporting information anonymously.


Marketing Cookies

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.


Cookies