AIX 7.1 differences

Posted on 2011-02-16
Medium Priority
Last Modified: 2012-05-11
Does anyone have, ran, or can come up with simple unit test cases and test plans for AIX 7.1. Differences and scenarios from 6.1 or 5.3 that are different/enhanced in 7.1.

Question by:AIX25
  • 2
  • 2
LVL 68

Accepted Solution

woolmilkporc earned 2000 total points
ID: 34907697
Hi again,

here is the "Differences" Redpiece:


Of course system firmware is always a concern - check the requirements here:

I have three 7.1 images running in production now, and plan to migrate several others from 5.3 or 6.1 one after the other.

Up to now I didn't see any incompatibilities - well, but there is Oracle!
We didn't succeed in installing a new Oracle 10.x database on AIX 7.1 - just because the installer complained about just each and every little bit. Maybe it finally could have been done, but who wants to apply tons of Oracle patches ...

MIGRATING a 10.x database is possible, however, and installing Oracle 11gR2 on AIX 7.1 is no problem at all.


Test cases? Obviously such things heavily depend on what you're going to test - I don't know your installed applications, so I can't give you any clue here.

All your ksh scripts will work as under 6.x, as long as no application-supplied binaries are called which will of course need a bit testing, yet it's very probable that you won't see any problem.


Are you developing own applications? If so, you will see some enhanced debbugging facilities.

If you plan to use Solid State disks - they're supported now. A good thing is the JFS2 Hot Files Detection coming with SSD support.

I don't use Workload Partitions, but if you do - there are some major enhancements too.  There is better support for AIX 5.2 WPARS for example - a neat thing should you actually find incompatibilites between some old applications and AIX 7.1.
Do you use CSM? Well, it's now called DSM and has some enhancements, particularly with NIM - more is in the Differences Guide.

A big deal is "Active Memory Expansion" - but you'll need Power7 processors to exploit this feature. Basically it's kind of memory compression at the expense of consumed CPU cycles - if you have fast CPUs and little memory AME could bring some benefit. Technically there is a new compressed page pool for AME, besides the page pool already known from AMS.

Networking: AIX 7.1 has better LACP support. If your switches support it a link aggregation can now be detected and handled automatically - this is far more effective than the old Etherchannel technique.

NIM can now use loopback-mounted ISO images for creating lpp sources - sensational!

There are many more detail enhancements - good to have, but a normal person will probably never notice them in daily life.



Author Comment

ID: 34908006
Wow! Thank you for the GREAT feedback woolmilkporc!!

Can you add anymore knowledge or input on AIX 7.1 security changes or enhancments? I like the way you word things, and I will definitley look through redbook link you provided. But, can you in your own words provide me updats, enhancements, or changes in AIX 7.1 security?

LVL 68

Assisted Solution

woolmilkporc earned 2000 total points
ID: 34908396

now for security.

Do you know/use Enhanced RBAC? If so you will know that you can restrict access to commands in a very granular way, but you can't really control the objects these commands operate against.
Now here comes Domain RBAC - this enhanced concept introduces objects and domains, so you can e.g. allow a user to e.g enlarge/shrink filesystems, but (as opposed to non-domain RBAC) only those being defined in their domain.
So if you have lots of users, with lots of sub- and sub-sub- and sub-sub-sub-administrators Domain RBAC is the right thing for you!

There are several scenarios in the above Redpiece to illustrate the benefits of DRBAC.
Oh, before I forget - Domain RBAC does of course support LDAP!

As for auditing: You now have full pathnames to objects (even NFS mounted files/folders!) and commands in the audit logs/reports - actually one should have asked why this didn't come earlier!
And yes, the Audit Subsystem is now aware of RBAC roles!

You can now be a member of 2048 groups instead of the 128 before - really useful in times where social networking is more and more en vogue!

One thing I really missed is now possible (no joke): You can now forbid a user to choose their username as their password!
This is done by adding the variable $USER to /usr/share/dict/words.
There are some more new password rules - more is in the Redpiece.

There are some LDAP enhancements, but I admit - I didn't bother myself with it up to now.

Have fun with AIX 7.1!



Author Comment

ID: 34909233
Thank you sooo much for your feedback and input!!

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

When you do backups in the Solaris Operating System, the file system must be inactive. Otherwise, the output may be inconsistent. A file system is inactive when it's unmounted or it's write-locked by the operating system. Although the fssnap utility…
A metadevice consists of one or more devices (slices). It can be expanded by adding slices. Then, it can be grown to fill a larger space while the file system is in use. However, not all UNIX file systems (UFS) can be expanded this way. The conca…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

607 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question