|
HP OpenVMS System Management Utilities Reference
Manual
/LIST
Determines whether the Analyze/Disk_Structure utility produces a
listing of the index file.
Format
/LIST [=filespec]
/NOLIST
Description
If you specify /LIST, the utility produces a file that contains a
listing of all file identifications (FIDs), file names, and file
owners. If you omit the file specification, the default is SYS$OUTPUT.
If you include a file specification without a file type, the default
type is .LIS. You cannot use wildcard characters in the file
specification.
The default is /NOLIST.
Example
|
$ ANALYZE/DISK_STRUCTURE DLA2:/LIST=INDEX
$ TYPE INDEX
Listing of index file on DLA2:
31-OCT-2002 20:54:42.22
(00000001,00001,001) INDEXF.SYS;1
[1,1]
(00000002,00002,001) BITMAP.SYS;1
[1,1]
(00000003,00003,001) BADBLK.SYS;1
[1,1]
(00000004,00004,001) 000000.DIR;1
[1,1]
(00000005,00005,001) CORIMG.SYS;1
[1,1]
.
.
.
$
|
In this example, ANALYZE/DISK_STRUCTURE did not find errors on the
device DLA2. Because the file INDEX was specified without a file type,
the system assumes a default file type of .LIS. The subsequent TYPE
command displays the contents of the file INDEX.LIS.
/LOCK_VOLUME (Alpha and Integrity servers)
Prevents updates to a volume while you are analyzing it.
Format
/LOCK_VOLUME
/NOLOCK_VOLUME
Description
/LOCK_VOLUME provides a way to prevent file system activity on a volume
while you are using the ANALYZE/DISK_STRUCTURE utility on that volume.
This qualifier operates the same way as /REPAIR does: it software
write-locks the file structure while the utility is running. (The
qualifier does not, however, affect any repairs on the volume.) The
default is /NOLOCK_VOLUME.
Using this qualifier reduces the number of false error messages that
might occur when you run the utility on an active volume. /LOCK_VOLUME
stops the activity of applications that open, close, or modify files on
the target volume for the period the utility is running.
Note
Be careful about using this qualifier, especially for volumes that
contain active system files such as SYSUAF, RIGHTSLIST, log files, and
AUDIT_SERVER journal and log files. All of these files are stalled
while ANALYZE/DISK_STRUCTURE is running.
|
Example
|
$ ANALYZE/DISK_STRUCTURE DBA1:/LOCK_VOLUME
|
The command in this example stops file system activity on DBA1: while
ANALYZE/DISK_STRUCTURE is running.
/OUTPUT
Specifies the output file to which the Analyze/Disk_Structure utility
is to write the disk structure errors.
Format
/OUTPUT[=filespec]
/NOOUTPUT[=filespec]
Description
Specifies the output file for the disk structure errors. If you omit
the /OUTPUT file specification, output is directed to SYS$OUTPUT. If
/NOOUTPUT is specified, no disk structure errors are displayed. If the
/CONFIRM qualifier is specified, output is forced to SYS$OUTPUT
regardless of whether this qualifier is used.
/READ_CHECK
Determines whether the Analyze/Disk_Structure utility performs a read
check of all allocated blocks on the specified disk. When the
Analyze/Disk_Structure utility performs a read check, it reads the disk
twice; this ensures that it reads the disk correctly. The default is
/NOREAD_CHECK.
Format
/READ_CHECK
/NOREAD_CHECK
Example
|
$ ANALYZE/DISK_STRUCTURE DMA1:/READ_CHECK
|
The command in this example directs ANALYZE/DISK_STRUCTURE to perform a
read check on all allocated blocks on the device DMA1.
/RECORD_ATTRIBUTES
Determines whether the Analyze/Disk_Structure utility repairs files
containing erroneous settings in the record attributes section of their
associated file attribute block (FAT).
Format
/RECORD_ATTRIBUTES
Description
You can use the /RECORD_ATTRIBUTES qualifier with the /REPAIR
qualifier. If attribute repair is enabled during the repair phase,
erroneous bits are cleared from a file's record attributes. This action
might not correctly set a file's record attributes as it is beyond the
scope of this utility to determine their correct values.
HP recommends that system managers not perform an attribute repair;
instead, they should notify the owners of the files about the
inconsistencies and have the owners reset the files' attributes using
the SET FILE/RECORD_ATTRIBUTES=({record-attributes}) command.
Example
|
$ ANALYZE/DISK_SYS$SYSDEVICE:
%ANALDISK-I-BAD_RECATTR, file (2930,1,1) [USER]ATTRIBUTES.DAT;13
file record format: Variable
inconsistent file attributes: Bit 5
%ANALDISK-I-BAD_RECATTR, file (2931,1,1) [USER]ATTRIBUTES.DAT;14
file record format: Variable
inconsistent file attributes: FORTRAN carriage control, Bit 5
%ANALDISK-I-BAD_RECATTR, file (2932,1,1) [USER]ATTRIBUTES.DAT;15
file record format: Variable
inconsistent file attributes: Implied carriage control, Bit 5
%ANALDISK-I-BAD_RECATTR, file (2933,1,1) [USER]ATTRIBUTES.DAT;16
file record format: Variable
inconsistent file attributes: Non-spanned, Bit 5
%ANALDISK-I-BAD_RECATTR, file (2934,1,1) [USER]ATTRIBUTES.DAT;17
file record format: Variable
inconsistent file attributes: FORTRAN carriage control,
Non-spanned, Bit 5
|
/REPAIR
Determines whether the Analyze/Disk_Structure utility repairs errors
that are detected in the file structure of the specified device.
Format
/REPAIR
/NOREPAIR
Description
The Analyze/Disk_Structure utility does not perform any repair
operation unless you specify the /REPAIR qualifier. The default is
/NOREPAIR.
If you specify /REPAIR, the utility uses the ACP control lock volume
function to prevent creation, deletion, extension, and truncation
activity while the volume is being rebuilt. In this way, the volume is
prevented from being modified while the operation is in progress.
To effectively scan a disk (/NOREPAIR), you must have read access to
all files on the disk. You must also have write access to INDEXF.SYS to
force the flushing of the caches for this file. You must also have
write access to BITMAP.SYS for the same reason: to force the flushing
of the caches for this file. (You need write access to QUOTA.SYS only
if the volume is running disk quotas.)
Example
|
$ ANALYZE/DISK_STRUCTURE DBA1:/REPAIR
|
The command in this example causes ANALYZE/DISK_STRUCTURE to perform a
repair on all errors found in the file structure of device DBA1.
/SHADOW
Examines the entire contents of a shadow set or a specified range of
blocks in a shadow set for discrepancies.
Format
/SHADOW
Parameters
None.
Qualifiers
/BLOCKS={(START:n, COUNT:x, END:y,)
FILE_SYSTEM, ALL}
Directs the system to compare only the range specified. The options are
the following:
START:
n
|
Number of the first block to be analyzed. The default is the first
block.
|
COUNT:
x
|
Number of blocks to be analyzed. You can use this option in combination
with or instead of the END option.
|
END:
y
|
Number of the last block to be analyzed. The default is the last block
of the volume.
|
FILE_SYSTEM
|
Blocks currently in use by valid files on the disk. This is the default.
|
ALL
|
All blocks on the disk.
|
You can specify START,END,COUNT and either ALL or FILE_SYSTEM. For
example, if you specify /BLOCKS=(START,END,COUNT:100,ALL), the software
checks the first 100 blocks on the disk, whether or not the file system
is using them.
If you specify /BLOCKS=(START,END,COUNT:100,FILE_SYSTEM), the software
checks only those blocks that valid files on the disk are using.
/BRIEF
Displays only the logical block number (LBN) if the data in a block is
found to be different. Without this qualifier, if differences exist for
an LBN, the hexadecimal data of that block will be displayed for each
member.
/IGNORE
[NO]IGNORE
Ignore "special" files that are likely to have some blocks
with different data. These differences, however, are not unusual and
can, therefore, be ignored.
Other special files are the following:
SWAPFILE*.*
PAGEFILE*.*
SYSDUMP.DMP
SYS$ERRLOG.DMP
IGNORE is the default.
/OUTPUT=filename
Output the information to the specified file.
/STATISTICS
Display only the file header and footer. The best use of this qualifier
is with the /OUTPUT qualifier.
Description
When you enter the ANALYZE/DISK_STRUCTURE/SHADOW command, the system
checks for shadow set discrepancies on the entire contents of a shadow
set or a specified range of blocks in a shadow set. If a discrepancy is
found, a clusterwide WRITE lock is taken on the shadow set, and the
questionable blocks are reread. Then one of the following actions
occurs:
- If a member of the shadow set experiences connectivity problems for
any reason, the ANALYZE/DISK_STRUCTURE command displays the error that
it received and then returns the user to the DCL prompt.
To correct
the connectivity problem and run the utility again on the same shadow
set, you might need to create a temporary file on the virtual unit
before reissuing the ANALYZE/DISK/SHADOW command.
- If a discrepancy is still present on the second read, the system
displays the file name on the screen. The system also dumps the data
block containing the discrepancy to the screen or to a file if you
specify the /OUTPUT qualifier.
- If no discrepancy is found on the second read, the system considers
the error to be a transient one (for example, a WRITE to that disk
block was in progress).
See Section 3.1.2 for more details.
Example
|
$ ANALYZE/DISK_STRUCTURE/SHADOW/BRIEF/BLOCKS=COUNT:1000 dsa716:
Starting to check _DSA716: at 14-MAY-2002 13:42:52.43
Members of shadow set _DSA716: are _$252$MDA0: _$252$DUA716:
and the number of blocks to be compared is 1000.
Checking LBN #0 (approx 0%)
Checking LBN #127 (approx 12%)
Checking LBN #254 (approx 25 %)
Checking LBN #381 (approx 38%)
Checking LBN #508 (approx 50%)
Checking LBN #635 (approx 63%)
Checking LBN #762 (approx 76%)
Checking LBN #889 (approx 88%)
Run statistics for _DSA716: are as follows:
Finish Time = 14-MAY-2002 13:42:52.73
ELAPSED TIME = 0 00:00:00.29
CPU TIME = 0:00:00.02
BUFFERED I/O COUNT = 10
DIRECT I/O COUNT = 16
Failed LBNs = 0
Transient LBN compare errors = 0
$
|
The command in this example causes ANALYZE/DISK_STRUCTURE/SHADOW to
examine the first 1000 blocks of the DSA716: virtual unit to ensure
that the device $252$MDAO: and $252$DUA716: have identical data in
those blocks.
/STATISTICS
Produces statistical information about the volume under verification
and creates a file, STATS.DAT, which contains per-volume statistics.
Format
/STATISTICS
Description
The following information is placed in the STATS.DAT file:
- The number of ODS-2 and ODS-5 headers on the volume
- The number of special headers on ODS-5 volumes
- The distribution of file name lengths
- The distribution of extension header chain lengths
- The distribution of header identification area free space
- The distribution of header map area and ACL area free space
- The totals of header space that is in use and header space that is
not in use
Example
|
$ ANALYZE/DISK_STRUCTURE MDA2000: /STATISTICS
|
The OpenVMS Alpha volume in this example, which is on device MDA2000:,
has been converted from ODS-2 to ODS-5 using the SET VOLUME command.
The STATS.DAT file created contains the following information:
********** Statistics for volume 001 of 001 **********
Volume is ODS level 5.
Volume has 00000004 ODS-2 primary headers.
Volume has 00000003 ODS-5 primary headers.
Volume has 00000000 ODS-5 -1 segnum headers.
00000001 filenames of length 009 bytes.
00000002 filenames of length 011 bytes.
00000001 filenames of length 013 bytes.
00000002 filenames of length 015 bytes.
00000001 filenames of length 073 bytes.
00000007 extension header chains of length 00000.
00000001 ODS-2 headers have 071 ident area free bytes.
00000001 ODS-2 headers have 073 ident area free bytes.
00000001 ODS-2 headers have 075 ident area free bytes.
00000001 ODS-2 headers have 077 ident area free bytes.
Total ODS-2 ident area free bytes is 00000296.
00000001 ODS-5 headers have 001 ident area free bytes.
00000001 ODS-5 headers have 029 ident area free bytes.
00000001 ODS-5 headers have 033 ident area free bytes.
Total ODS-5 ident area free bytes is 00000063.
00000001 headers have 277 free bytes in total.
00000001 headers have 335 free bytes in total.
00000001 headers have 339 free bytes in total.
00000001 headers have 377 free bytes in total.
00000001 headers have 379 free bytes in total.
00000001 headers have 381 free bytes in total.
00000001 headers have 383 free bytes in total.
Total header area in bytes is 00003584.
Total header area free bytes is 00002791.
Total header area used bytes is 00000793.
|
/USAGE[=filespec]
Specifies that a disk usage accounting file should be produced, in
addition to the other specified functions of the Analyze/Disk_Structure
utility.
Format
/USAGE [=filespec]
Description
If all or part of the file specification is omitted,
ANALYZE/DISK_STRUCTURE assumes a default file specification of
USAGE.DAT. The file is placed in the current default directory.
Example
|
$ ANALYZE/DISK_STRUCTURE DBA1:/USAGE
$ DIRECTORY USAGE
Directory DISK$DEFAULT:[ACCOUNT]
USAGE.DAT;1
Total of 1 file.
|
The first command in this example causes ANALYZE/DISK_STRUCTURE to
produce a disk usage accounting file. Because a file specification was
not provided in the command line, ANALYZE/DISK_STRUCTURE uses both the
default file name and directory [ACCOUNT]USAGE.DAT. The DIRECTORY
command instructs the system to display all files with a file name of
usage in the current directory. The OpenVMS Alpha device in this
example, MDA2000:, has been converted from ODS-2 to ODS-5 using the SET
VOLUME command.
Chapter 4 Audit Analysis Utility
4.1 ANALYZE/AUDIT Description
The Audit Analysis utility (ANALYZE/AUDIT) is a system management tool
that enables system managers or site security administrators to produce
reports from security audit log files.
The OpenVMS operating system automatically audits a limited number of
events, such as changes to the authorization database and use of the
SET AUDIT command. Depending on your site's requirements, you may want
to enable other forms of reporting. However, collecting security audit
messages is useful only if you develop and implement a procedure to
periodically review the audit log file for suspicious activity. Use
ANALYZE/AUDIT to examine the data in security audit log files or
security archive files.
The ANALYZE/AUDIT command's different qualifiers allow you to specify
the type of information the utility extracts from the security audit
log file. The utility can produce an audit report in a variety of
formats and direct a report to a file or a terminal.
A description of the format of the auditing messages written to the
security auditing file appears in Appendix F.
In a mixed-version cluster, an audit log file contains entries from
systems running different versions of the operating system. To analyze
the log file, you must invoke the Audit Analysis utility
(ANALYZE/AUDIT) from a node running Version 6.1 or later.
For information about how to generate audit messages records and how to
use ANALYZE/AUDIT, see the HP OpenVMS Guide to System Security.
4.2 ANALYZE/AUDIT Usage Summary
The Audit Analysis utility (ANALYZE/AUDIT) processes event messages in
security audit log files to produce reports of security-related events
on the system.
Format
ANALYZE/AUDIT [file-spec[,...]]
Parameter
file-spec[,...]
Specifies one or more security audit log files as input to
ANALYZE/AUDIT. If you specify more than one file name, separate the
names with commas.
If you omit the file-spec parameter, the utility
searches for the default audit log file SECURITY.AUDIT$JOURNAL.
The default audit log file is created in the SYS$COMMON:[SYSMGR]
directory. To use the file, specify SYS$MANAGER on the ANALYZE/AUDIT
command line. If you do not specify a directory, the utility searches
for the file in the current directory.
You can include wildcard characters, such as the asterisk (*) or
percent sign (%), in the file specification.
The audit log file can be located in any directory. To display the
current location, use the DCL command SHOW AUDIT/ALL.
Description
Use the DCL command ANALYZE/AUDIT to analyze security audit log files
or security archive files. An ANALYZE/AUDIT command line can specify
the name of one or more log files, as follows:
ANALYZE/AUDIT [file-spec,...]
|
You can also use the ANALYZE/AUDIT command to extract security event
messages from security archive files or from binary files (created with
previous ANALYZE/AUDIT commands).
Each ANALYZE/AUDIT request runs until the log file is completely
processed. You can interrupt the processing to modify the display or to
change position in the report if you activate command mode by pressing
Ctrl/C. To terminate an ANALYZE/AUDIT request before completion, press
Ctrl/Z.
You can direct ANALYZE/AUDIT output to any supported terminal device or
to a disk or tape file by specifying the file specification as an
argument to the /OUTPUT qualifier. By default, the output is directed
to SYS$OUTPUT.
Use of ANALYZE/AUDIT requires no special privileges other than access
to the files specified in the command line.
4.3 ANALYZE/AUDIT Qualifiers
This section describes ANALYZE/AUDIT and provides examples of each
qualifier. The following table summarizes the ANALYZE/AUDIT qualifiers:
Qualifier |
Description |
/BEFORE
|
Controls whether records dated earlier than the specified time are
selected
|
/BINARY
|
Controls whether output is a binary file
|
/BRIEF
|
Controls whether a brief, single-line record format is used in ASCII
displays
|
/EVENT_TYPE
|
Selects the classes of events to be extracted from the security log file
|
/FULL
|
Controls whether a full format is used in ASCII displays
|
/IGNORE
|
Excludes records from the report that match the specified criteria
|
/INTERACTIVE
|
Controls whether interactive command mode is enabled when ANALYZE/AUDIT
is invoked
|
/OUTPUT
|
Specifies where to direct output from ANALYZE/AUDIT
|
/PAUSE
|
Specifies the length of time each record is displayed in a full format
display
|
/SELECT
|
Specifies the criteria for selecting records
|
/SINCE
|
Indicates that the utility must operate on records dated with the
specified time or after the specified time
|
/SUMMARY
|
Specifies that a summary of the selected records be produced after all
records are processed
|
|