cloning multiples VG (including rootvg) using NIM

Posted on 2011-05-03
Last Modified: 2013-11-17
OK, here's NIM again :-)

I have an AIX6.1 with:

I know using mksysb, I create the mksysb resource on the NIM and install it on the new particion. BUT, what about the other resources? Once I have the new partition cloned with the rootvg, how can I setup the other VGs resources on the NIM and how to install it on the new particion?


Question by:sminfo
    LVL 68

    Accepted Solution

    Hi again,

    take a backup of the volumegroups using "smitty nim_mkres" -> savevg
    fill in the gaps and go.
    Alternatively use:

    nim -o define -t savevg -a server=master -a location=/path/to/location \
    -a source=nim_client -a mk_image=yes -a volume_group=vg1 savevg1

    To restore it on the client use "smitty nim_mac_op" -> (select machine) -> restvg
    fill in the gaps and go.
    Alternatively use:

    nim -o restvg -a savevg=savevg1 -a disk=hdiskx -a shrink=no -a map=no nim_client

    Good luck!



    Author Comment

    Nice wmp.. one question?

    Do you prefer to use sysback (tsm) or savevg to move VGs  when moving VGs between AIX's partitions?

    Author Comment

    ah.. I forgot to ask..

    savevg can save a VG to a single file like mksysb does?
    If yes, restvg can restore a VG from the above savevg's file?

    LVL 68

    Assisted Solution

    Second questions: a) Yes. b) Yes.

    First question:

    For moving I prefer detaching the disks from the old (inactive) machine to then attach them to the new machine, because all my datavgs are SAN-based and accessible from anywhere, if so configured and if the target machine has SAN adapters.

    If this wasn't the case  (or for cloning) I'd always prefer TSM, because we would need lots and lots of intermediate disk space (or DVDs, of course) to do savevg/restvg, be it via NIM or whatever.
    We don't have standalone tape drives outside TSM here, so using non-TSM tapes is not an option anymore.


    Author Closing Comment



    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    My previous tech tip, Installing the Solaris OS From the Flash Archive On a Tape (, discussed installing the Solaris Operating S…
    Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
    Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
    This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now