Title and Copyright Information
 
About This Manual
Audience
New and Changed Features
Organization
Related Documentation
Reader's Comments
Conventions
 
1    Operating System and Installation Technology
1.1    Overview of the Operating System
1.2    What to Do if the Operating System Is Preinstalled
1.3    What Kind of Installation Should You Perform?
1.4    Installing a Cluster
1.5    Installation Media: CD-ROM or Network Server
1.6    User Interfaces: Graphical or Text-Based
1.7    Using This Manual
 
2    Update Installation Overview
2.1    Description of an Update Installation
2.2    Cluster Rolling Upgrades
2.3    What Versions of the Operating System Can Be Updated to Version 5.1B?
2.3.1    How to Determine the Version Number and Revision Level of the Operating System
2.4    Update Installation Features
2.5    Theory of Operation
2.6    Completion Time
 
3    Update Installation Procedure
3.1    Step 1: Prepare for the Update Installation
3.2    Step 2: Shut Down the System to Single-User Mode
3.3    Step 3: Start the Update Installation
3.4    Step 4: Choose Update Installation Options
3.5    Step 5: Monitor the Analysis Phase
3.5.1    Search for Conflicting Software
3.5.1.1    Software Reinstallation Warning
3.5.1.2    Conflicting Software Found: Update Installation Cannot Proceed
3.5.2    Determine Installed Software
3.5.3    Select Kernel Components
3.5.4    Manually Adding Special Configuration Options to the Kernel
3.5.5    Search for File Type Conflicts
3.5.5.1    File Type Conflicts That Halt the Update
3.5.5.2    Less Serious File Type Conflicts
3.5.6    Search for Obsolete Files
3.5.7    Determine File System Space
3.6    Step 6: Confirm the Start of the Update Installation Process
3.7    Step 7: Log in to the System
3.8    Step 8: Review Update Installation Log Files
3.9    Step 9: Merge Customizations if Necessary
3.10    Optional Step 10: Run the Update Installation Cleanup Utility
3.11    Error Recovery
3.11.1    Analysis Phase Failure
3.11.2    Software Subset Load Failure
3.11.3    Kernel Build Failure
 
4    Full Installation Overview
4.1    Full Installation Features
4.1.1    Dynamic Disk Partitioning
4.1.2    Installing Worldwide Language Support (WLS) Software
4.1.3    Configuring the Logical Storage Manager (LSM)
4.1.4    Disk Identification
4.1.5    Automatic Detection and Installation of Software Dependencies
4.1.6    Invoking User-Supplied Files to Perform Customizations
4.1.7    Installation Cloning
4.1.8    Configuration Cloning
4.1.9    Access to a UNIX Shell for Experienced Administrators
4.2    Full Installation: Defaults and User Options
 
5    Full Installation Prerequisite Tasks
5.1    Task 1: Verify Hardware
5.2    Task 2: Make Sure You Have These Items
5.3    Task 3: Read the Release Notes
5.4    Optional Task 4: Migrating Your System from WindowsNT for Alpha to Tru64 UNIX
5.5    Optional Task 5: Prepare CDFs or User-Supplied Files
5.6    Task 6: Back Up the System
5.7    Task 7: Shut Down or Turn On the Processor
5.8    Task 8: Update Firmware
5.9    Optional Task 9: Configure Hardware
5.9.1    Setting the Network Adapter Mode
5.9.2    Configure Integrated System Architecture (ISA) Devices
5.9.3    Install Asynchronous Transfer Mode (ATM) Adapters
5.9.4    Configure RAID Subsystem
5.9.5    Run the EISA Configuration Utility (ECU)
5.10    Optional Task 10: Connect Peripheral Devices
5.11    You Are Ready to Begin
 
6    Full Installation Procedures
6.1    Are You Ready to Begin?
6.2    Step 1: Set Processor-Specific Console Environment Variables
6.3    Step 2: Set Standard Console Environment Variables for All Processors
6.4    Step 3: Boot the System
6.5    Successful System Boot — Select a Language for the User Interface
6.6    The Welcome Screen
6.7    Step 4: Supplying the Setup Information Required for a Full Installation
6.8    Setting the Host Name
6.8.1    Guidelines for Choosing a Host Name
6.8.2    Host Name Samples
6.9    Setting the Date and Time
6.10    Setting the Location and Area (Formerly Time Zones)
6.11    Setting the Root Password
6.11.1    Guidelines for Choosing Effective Passwords
6.11.2    Root Password Samples
6.12    Choosing the Type of Software to Be Installed
6.12.1    Hints for Selecting Optional Software
6.13    Choosing the Type of Kernel Components to Build into the Kernel
6.14    Selecting the Type of File System Layout
6.14.1    When Should You Use the Default File System Layout?
6.14.2    When Should You Customize the File System Layout?
6.14.3    Partitioning Disks for a Custom File System Layout
6.14.4    Should You Install into LSM Volumes?
6.14.4.1    Selecting a Partition for the LSM Private Region
6.14.4.2    Special Processing for Systems Previously Configured with LSM
6.14.5    Preserving Data on Previously Used Disks
6.15    Step 5: Verify Your Selections
6.16    Step 6: Final Confirmation
6.16.1    Canceling and Restarting the Full Installation
6.17    What Happens Next?
6.17.1    File System Creation and Software Subset Load Phase
6.17.2    System Reboot Phase
6.17.3    Software Configuration Phase
6.18    Optional Step 7: Select Kernel Components
6.18.1    Optional Step: Edit the Kernel File if Necessary
6.18.2    The Kernel Build Phase
6.18.3    What to Do If Your System Boots to Single-User Mode
6.19    Step 8: Log in to the System as the User root
6.20    Step 9: Review Installation Log Files
6.21    Full Installation Is Done
 
7    Configuring the System for General Use
7.1    Graphical User Interface: The System Setup Application
7.1.1    The Quick Setup Application
7.1.2    The Custom Setup Application
7.2    Invoking the System Setup Application After the Initial Configuration
7.3    Text-Based Interface: The System Setup Application
7.4    System Management and Monitoring
7.5    System Administration and Configuration Documents
7.6    Reconstructing the /etc/fdmns Directory
7.7    Enabling Realtime Preemption
7.8    Enabling Unattended Reboots on Multiprocessor Systems
7.9    Enabling Automatic Reboot on Single Systems
 
8    Using Online Documentation
8.1    Documentation Formats and Online Viewers
8.2    Mounting the Documentation CD-ROM
8.3    Viewing Online Documents with Netscape
8.4    Netscape Application Integration
8.4.1    Mosaic-to-Netscape Bookmark Conversion
8.5    Installing Acrobat Reader
8.6    Viewing Online Documents with Acrobat Reader
8.7    Copying Online Documentation to Disk
 
9    Software Management
9.1    Software Management Overview
9.2    Software Management from the SysMan Menu
9.3    Determining Software Subset Status
9.4    Listing Files Contained in a Subset
9.5    Deleting Software Subsets from a Single System
9.6    Deleting Software Subsets from a Cluster
9.7    Installing Software Subsets on a Single System
9.8    Installing Optional Software Subsets on a Cluster
9.9    Rebuilding the Kernel After Installing Kernel Build Environment Subsets
 
A    Device Naming Conventions
A.1    History of Device Naming
A.2    Creating Device Special Files
A.3    How Device Names Are Assigned
A.4    Preserving Device Names During a Full Installation
A.5    Update Installation Device Names
A.6    Obtaining More Device Information
 
B    Compact Disc Overview
B.1    Operating System CD-ROMs
B.2    CD-ROM Device Names
B.2.1    Determining the CD-ROM Device Name
B.2.2    Determining the CD-ROM Console Device Name
B.3    Mounting a CD-ROM
B.4    Unmounting a CD-ROM
 
C    Software Subset Descriptions
C.1    Base Operating System Software Subset Descriptions
C.2    Mandatory Software Subsets
C.3    Optional Software Subsets
C.3.1    General Applications Software Subsets
C.3.2    Kernel Build Environment Software Subsets
C.3.3    Mail Applications
C.3.4    Network-Server/Communications Software Subsets
C.3.5    Printing Environment Software Subsets
C.3.6    Obsolete Components Software Subsets
C.3.7    Reference Pages Software Subsets
C.3.8    Software Development Software Subsets
C.3.9    Supplemental Documentation Software Subset
C.3.10    System Administration Software Subsets
C.3.11    Text-Processing Software Subsets
C.3.12    Windowing Environment Software Subsets
C.3.13    Windows Applications Software Subsets
C.4    Worldwide Language Support (WLS) Subsets
C.4.1    Worldwide Language Support Base Subsets
C.4.1.1    WLS Base Subsets with No United States English Equivalent
C.4.2    Language-Specific Subsets
C.4.2.1    Additional Subsets Provided for Asian Languages Other Than Chinese
C.4.2.2    Additional Subsets Provided for Japanese
C.4.2.3    Subsets Provided for Chinese
 
D    Installing Associated Products
D.1    General Installation Information
D.1.1    Installing Associated Products from the CD-ROM
D.1.2    Installing Associated Products from a Remote Server
D.1.3    Updating the whatis Database After Installing Reference Pages for Associated Products
 
E    Update Installation Processing on Existing Files
E.1    Overview of File Preservation During an Update Installation
E.2    Description of Protected System Files
E.2.1    What is a .new.. File?
E.2.2    What is a .proto.. File?
E.2.3    What is a .PreMRG File?
E.2.4    What is a .mrg.. File?
E.2.5    What is a Configured File?
E.3    Merging Protected System Files
E.3.1    Successful Merges
E.3.2    Unsuccessful Merges
 
F    Installation Log Files
F.1    The Message of the Day File
F.2    Reviewing Installation Log Files
F.3    Full Installation Files
F.3.1    The install.FS.log File
F.3.2    The install.log File
F.3.3    The it.log File
F.3.4    The setld.log File
F.3.5    The fverify.log File
F.3.6    The install.cdf File
F.4    Update Installation Log Files
F.4.1    The update.log File
F.4.2    The upd_custom_files File
F.4.3    The upd_PreMRG_files File
F.4.4    The upd_mergefail_files File
F.4.5    The upd_obsolete_files File
 
G    Troubleshooting
G.1    Full Installation Error Messages
G.1.1    Disk Label, File System and LSM Configuration Error Messages
G.1.1.1    Fixing LSM Configuration Errors
G.1.1.2    Fixing Multiple hostids Error on Existing LSM Configurations
G.1.1.3    Restarting LSM
G.1.2    Configuration Description File (CDF) Validation Errors
G.1.3    Software Subset Load Errors
G.2    Update Installation Error Messages
G.2.1    Update Installation Startup
G.2.1.1    Update Installations from a CD-ROM
G.2.1.2    Update Installations from Remote Installation Services (RIS)
G.2.2    Analysis Phase Error Messages
G.3    Software Configuration Error Messages
G.4    Post Installation Error Messages
G.4.1    Recovering from setld Software Load and Delete Failures
G.4.2    Recovering from Subset Load or Delete Failures on a Cluster Member
 
Glossary
 
Examples
6-1    Textual Interface: Default File System Layout
6-2    Text-Based Interface: Default File System Layout with One Disk
6-3    Identifying Disks in the Text-Based Interface
6-4    Customized Disk Selection Using the Text-Based Interface
6-5    Sample Boot Command Sequence
7-1    The Text-Based System Setup Application
F-1    Sample /etc/motd File Showing Location of Log Files
 
Figures
2-1    Update Installation Theory of Operation
3-1    Update Installation Main Window
3-2    Update Installation Preload Analysis Dialog Box
3-3    Software Reinstallation Warning Dialog Box
3-4    Conflicting Software Found Dialog Box
3-5    Kernel Configuration Dialog Box
3-6    File Type Conflict Dialog Box
3-7    File Type Conflict Warning Dialog Box
3-8    Archive Obsolete Files Dialog Box
3-9    Recover Disk Space Dialog Box
3-10    Remove Subsets Dialog Box
3-11    Ready to Begin Update Dialog Box
6-1    Installation Welcome Dialog Box
6-2    Host Information Dialog Box
6-3    Set Root Password Dialog Box
6-4    Software Selection Dialog Box
6-5    Software Subsets: Edit List Dialog Box
6-6    Kernel Options Dialog Box
6-7    Select File System Layout Dialog Box
6-8    Default File System Layout Dialog Box
6-9    Default File System Layout: Details Dialog Box
6-10    Identify Disk Dialog Box
6-11    Custom File System Layout Dialog Box
6-12    Installation Summary Dialog Box
6-13    Ready to Begin Installation Dialog Box
6-14    Software Installation Dialog Box
7-1    The Tru64 UNIX System Setup Window
7-2    The Quick Setup Application
7-3    The Custom Setup Application
9-1    SysMan Menu: Expanded Software and Installation Branches
 
Tables
1-1    Situation Analysis - Which Installation Type Is Best For You?
1-2    Finding the Information You Need
2-1    Supported Update Installation Paths
2-2    User-Controlled Features and Options of the Update Installation Process
2-3    Built-In Features of the Update Installation Process
3-1    Update Installation Options on Initial Screen
3-2    Update Installation Log Files
4-1    Custom Option Selections
5-1    Hardware and Memory Required for a Full Installation
5-2    CD-ROMs Shipped in the Software Distribution Kit
5-3    Documents Shipped in the Software Distribution Kit
5-4    Optional ISA Device Handles
6-1    Processor-Specific Console Variables
6-2    Information You Supply for a Full Installation
6-3    Samples of Correct and Incorrect Host Names
6-4    Sample Root Passwords
6-5    Description of Software Selection Options
6-6    Description of Kernel Selection Options
6-7    Recommended Partition Table by Disk Capacity
6-8    LSM Standard Names
A-1    Old Device Naming Conventions
A-2    Version 5.1B Device Naming Conventions
A-3    Mapping of Old Style and New Style Device Names
A-4    Sample Device Naming Scenario
A-5    Device Name Assignments After Moving and Adding a Device
C-1    Conditionally Mandatory Software Subsets
C-2    Description of the Mandatory Software Subsets
C-3    Description of the General Applications Software Subsets
C-4    Description of the Kernel Build Environment Software Subsets
C-5    Description of the Mail Applications Software Subsets
C-6    Description of the Network-Server/Communications Software Subsets
C-7    Description of the Printing Environment Software Subsets
C-8    Description of the Obsolete Components Software Subsets
C-9    Description of the Reference Pages Software Subsets
C-10    Description of the Software Development Software Subsets
C-11    Description of the Supplemental Documentation Software Subsets
C-12    Description of the System Administration Software Subsets
C-13    Description of the Text Processing Software Subsets
C-14    Description of the Windowing Environment Software Subsets
C-15    Description of the Windows Applications Software Subsets
C-16    Supported Countries and Languages
C-17    Worldwide Language Support (WLS) Base Subsets
C-18    Font Subsets and the Language Association
C-19    Mail Application Subsets
C-20    Software Development Subsets
C-21    System Administration Subset
C-22    Windowing Environment Subsets
C-23    Windowing Applications Subsets
C-24    Miscellaneous Subsets
C-25    Additional Asian-Language Subsets
C-26    Chinese Language Subsets with US English Equivalents
E-1    Protected System File: /etc/hosts
E-2    Files Left on the System After Successful Merge: /etc/hosts File
E-3    Files Left on the System After a Failed Merge: /etc/hosts File
G-1    LSM Display Commands
G-2    LSM Remove Commands
G-3    Software Load Recovery Procedures
G-4    Software Delete Recovery Procedures
G-5    Cluster Load and Delete Recovery Options of the setld Utility
 
Index