Solved

boot disks

Posted on 2004-09-15
4
262 Views
Last Modified: 2010-04-21
I have three ultra 60's all with dual external scsi harddrive bays, I removed all the internal drives.

Two of the come up on the install to
/dev/dsk/c0t1d0
/dev/dsk/c0t2d0

the other one has
/dev/dsk/c1t1d0
/dev/dsk/c1t2d0

Which one is right, and how do I correct it for the others?

0
Comment
Question by:CMILLER
  • 2
  • 2
4 Comments
 
LVL 40

Expert Comment

by:jlevie
ID: 12064644
Technically the odd one is the most correct. An Ultra 60 has two SCSI controllers. One is used for internal drives (c0) and the other (c1) is for externals. What I don't understand is why two show c0 for the external drives, it should show the drives as being on c1. How does the results of a 'probe-scsi-all' at the prom prompt compare?
0
 

Author Comment

by:CMILLER
ID: 12064876
they are the same

/pci@1f,4000/scsi@3,1
target 1
unit 0
unit 1

Something I just noticed is that the two in question do not have a internal cdrom drive,
I have external cdroms on them

the one that has the c1t1d0 has a internal cdrom drive

would that make a difference?
0
 
LVL 40

Accepted Solution

by:
jlevie earned 500 total points
ID: 12066989
> Something I just noticed is that the two in question do not have a internal cdrom drive

That explains it. On those machines there's nothing on the internal SCSI bus, so it probes as inactive and the external bus becomes controller 0 (c0). Having these two different configs aren't necessarily a problem. The only time it would matter is if you swapped a disk from a machine without a CDROM to the one that has one, or added an internal CDROM.

If you really need all three in the same config you could:

1) Move the internal CDROM to external
2) Move the external CDROMS to internal

Personally, I prefer (2) since that allows an internal disk to be plugged in at some point in the future without screwing up the controller assignments.
0
 

Author Comment

by:CMILLER
ID: 12067742
Thanks
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In tuning file systems on the Solaris Operating System, changing some parameters of a file system usually destroys the data on it. For instance, changing the cache segment block size in the volume of a T3 requires that you delete the existing volu…
Using libpcap/Jpcap to capture and send packets on Solaris version (10/11) Library used: 1.      Libpcap (http://www.tcpdump.org) Version 1.2 2.      Jpcap(http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/index.html) Version 0.6 Prerequisite: 1.      GCC …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now