Solved

how to restore  crashed vio server?

Posted on 2011-09-22
4
597 Views
Last Modified: 2013-11-17
in our aix environment one of the vio server got crashed? How to restore it?
0
Comment
Question by:rammaghenthar
  • 2
4 Comments
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 100 total points
Comment Utility
Hi,

it depends on which kind of backup you have.

- If you have a bootable (mksysb) image (created by "backupios" to tape/CD or by NIM or whatever), restore it, either by booting from CD/tape or via NIM, according to your environment.

- If you run "viosbr -backup" regularly and have the resulting output at hand (e.g. because you transferred it to another machine to store it there), reinstall the VIOS from scratch, set up some basic network access, copy the "viosbr" data back to the new machine and run "viosbr -restore" to get the virtual and logical VIOS configuration back in place.

- If you use to create some other, non installable backup (e.g. via "backup" command or TSM client) proceed like above: reinstall from scratch and restore what's needed from your backup.

- If you use some third party backup software, consult the manuals, because I obviously cannot help with this.

- If you don't have any backup - well, reinstall from scratch and try to set up the previous config by reference to some (printed) documentation, if any, or from memory.

wmp

0
 
LVL 61

Expert Comment

by:gheist
Comment Utility
How did it crash?
Normally jfs recovers just fine and it boots back again.
0
 
LVL 25

Accepted Solution

by:
madunix earned 400 total points
Comment Utility
As there are 4 different ways to backup the Virtual I/O Server, so there are 4 ways to restore it.
http://www.wmduszyk.com/wp-content/uploads/2011/01/backupios_VIOS-backup.pdf
0
 
LVL 61

Expert Comment

by:gheist
Comment Utility
When server CRASHES you call IBM to ask for server where tu upload system core.
When you destroy data that has no backups it is your fault
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
pauing printer deamon in AIX 10 52
auto mounter on solaris 1 39
Write an app 10 60
Sed question 2 44
In tuning file systems on the Solaris Operating System, changing some parameters of a file system usually destroys the data on it. For instance, changing the cache segment block size in the volume of a T3 requires that you delete the existing volu…
I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now