Solved

reinstall

Posted on 2016-07-21
1
55 Views
Last Modified: 2016-07-28
Hi,

For an unknown reason, lpd and printq users, printq group were deleted on AIX. Now, we want to reinstall bos.rte.printers fileset but need to restore, users, group and all file permissions of commands of this fileset.

Question, how can we reinstall and reconfigure bos.rte.printers from scratch? Is it possible?
0
Comment
Question by:CSIA AN
1 Comment
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
Comment Utility
Hi,

You can reinstall bos.rte.printers by performing an "overwrite same or newer ..." installation of the base level (!) fileset and applying all subsequent TL updates and the latest SP up to the desired level. Please note that an automatic installation of requisite software is not supported along with "overwrite" - and again - it must be the base level fileset!

Users/groups and permissions should come back with the installation, as well as the relevant ODM subsystems and security attributes (for /etc/security/privcmds).
Even if users and groups wouldn't come back along with the installation - it should be quite easy re-adding the lpd and lp users or the lp and printq groups, respectively using the numeric ids found on an intact AIX system:
lpd user/printq group: 9, lp user/group : 11
Afaik there is no "printq" user!
When users/groups are removed then owner or group of concerned files will show up as numeric ids, but ownership will not change.
Re-adding the users/groups using their previous ids will make the files show up again with "real" owner/group names.

bos.rte.printers does not contain the full directory structure found under /usr/lib/lpd and /var/spool/lpd, so if you need to restore things like predefined printer attributes, smit menus etc. consider reinstalling this fileset as well.

To help decide what's required/missing check with "lslpp -f bos.rte.printers" and "lslpp -f printers.rte" what these filesets have to offer.

Cheers

wmp
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

A metadevice consists of one or more devices (slices). It can be expanded by adding slices. Then, it can be grown to fill a larger space while the file system is in use. However, not all UNIX file systems (UFS) can be expanded this way. The conca…
I have been running these systems for a few years now and I am just very happy with them.   I just wanted to share the manual that I have created for upgrades and other things.  Oooh yes! FreeBSD makes me happy (as a server), no maintenance and I al…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now