AIX, NIM Server

Posted on 2012-08-16
Last Modified: 2012-08-17
How do you install a VIOS through a NIM Server ?
Question by:Los Angeles1
    LVL 68

    Accepted Solution


    the VIOS (PowerVM) base installation DVD contains an mksysb image (split into several parts) suitable for installing the VIOS LPAR.

    So, on your NIM server:

    - define the VIOS LPAR as a NIM client ("smitty nim_mkmac"). Add its IP/hostname  to the /etc/hosts file beforehand.
    - copy the mksysb image parts from the DVD (/usr/sys/inst.images/mksysb_image*) to the directory on the NIM server which is meant to accommodate such images.
    - concatenate the single parts into a single file with "cat".
    - define the new image file as a NIM resource of type "mksysb" ("smitty nim_mkres" -> mksysb)
    - create a SPOT from the image ("smitty nim_mkres" -> spot)
    - copy the /bosinst_data file from the installation DVD to the appropriate directory on the NIM server.
    - define the file as a NIM resource of type "bosinst_data" ("smitty nim_mkres" -> bosinst_data)
    - set up the NIM master to perform the bos_inst operation on the designated LPAR ("smitty nim_bosinst"). Specify the new image, the new SPOT and the new bosinst_data file as installation resources. Set "Accept new LIcense..." to "yes" and set "Initiate reboot ... now" to "no".

    On the LPAR (virtual console):

    - boot the new LPAR into SMS,
    -- set up remote IPL over the network. You must specify your NIM server's IP, the client's projected IP, mask and gateway. If server and client are on the same subnet, specify the NIM server's address as the gateway address)
    -- As  the install/boot device select the network then the appropriate network adapter.
    -- perform a normal mode boot.
    - After booting over the net from NIM via bootp/tftp the installation process should start and look the same as if it came from DVD.
    LVL 25

    Expert Comment

    As there are 4 different ways to backup the Virtual I/O Server, so there are 4 ways to restore it.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
    Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
    Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
    Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now