|  | HP OpenVMS System Management Utilities Reference 
Manual
 
 /LIST
 
Determines whether the Analyze/Disk_Structure utility produces a 
listing of the index file.
 
 Format
/LIST[=filespec]
 
/NOLIST
 
 
 Description
If you specify /LIST, the utility produces a file that contains a 
listing of all file identifications (FIDs), file names, and file 
owners. If you omit the file specification, the default is SYS$OUTPUT. 
If you include a file specification without a file type, the default 
type is .LIS. You cannot use wildcard characters in the file 
specification.
The default is /NOLIST.
 
 Example
 
  
    |  |  
    | 
 
$ ANALYZE/DISK_STRUCTURE DLA2:/LIST=INDEX
$ TYPE INDEX
Listing of index file on DLA2:
31-OCT-2002 20:54:42.22
 
(00000001,00001,001)  INDEXF.SYS;1
                              [1,1]
(00000002,00002,001)  BITMAP.SYS;1 
                              [1,1]
(00000003,00003,001)  BADBLK.SYS;1 
                              [1,1]
(00000004,00004,001)  000000.DIR;1 
                              [1,1]
(00000005,00005,001)  CORIMG.SYS;1 
                              [1,1]
. 
. 
. 
$
       |  
In this example, ANALYZE/DISK_STRUCTURE did not find errors on the 
device DLA2. Because the file INDEX was specified without a file type, 
the system assumes a default file type of .LIS. The subsequent TYPE 
command displays the contents of the file INDEX.LIS.
 /LOCK_VOLUME (Alpha and Integrity servers)
 
Prevents updates to a volume while you are analyzing it.
 
 Format
/LOCK_VOLUME
/NOLOCK_VOLUME
 
 
 Description
/LOCK_VOLUME provides a way to prevent file system activity on a volume 
while you are using the ANALYZE/DISK_STRUCTURE utility on that volume. 
This qualifier operates the same way as /REPAIR does: it software 
write-locks the file structure while the utility is running. (The 
qualifier does not, however, affect any repairs on the volume.) The 
default is /NOLOCK_VOLUME.
Using this qualifier reduces the number of false error messages that 
might occur when you run the utility on an active volume. /LOCK_VOLUME 
stops the activity of applications that open, close, or modify files on 
the target volume for the period the utility is running.
 
 
  | Note Be careful about using this qualifier, especially for volumes that 
contain active system files such as SYSUAF, RIGHTSLIST, log files, and 
AUDIT_SERVER journal and log files. All of these files are stalled 
while ANALYZE/DISK_STRUCTURE is running.
 |  
 Example
 
  
    |  |  
    | 
 
$ ANALYZE/DISK_STRUCTURE DBA1:/LOCK_VOLUME
       |  
The command in this example stops file system activity on DBA1: while 
ANALYZE/DISK_STRUCTURE is running.
 /OUTPUT
 
Specifies the output file to which the Analyze/Disk_Structure utility 
is to write the disk structure errors.
 
 Format
/OUTPUT[=filespec]
/NOOUTPUT[=filespec]
 
 
 Description
Specifies the output file for the disk structure errors. If you omit 
the /OUTPUT file specification, output is directed to SYS$OUTPUT. If 
/NOOUTPUT is specified, no disk structure errors are displayed. If the 
/CONFIRM qualifier is specified, output is forced to SYS$OUTPUT 
regardless of whether this qualifier is used.
 /READ_CHECK
 
Determines whether the Analyze/Disk_Structure utility performs a read 
check of all allocated blocks on the specified disk. When the 
Analyze/Disk_Structure utility performs a read check, it reads the disk 
twice; this ensures that it reads the disk correctly. The default is 
/NOREAD_CHECK.
 
 Format
/READ_CHECK
/NOREAD_CHECK
 
 
 Example
 
  
    |  |  
    | 
 
$ ANALYZE/DISK_STRUCTURE DMA1:/READ_CHECK
       |  
The command in this example directs ANALYZE/DISK_STRUCTURE to perform a 
read check on all allocated blocks on the device DMA1.
 /RECORD_ATTRIBUTES
 
Determines whether the Analyze/Disk_Structure utility repairs files 
containing erroneous settings in the record attributes section of their 
associated file attribute block (FAT).
 
 Format
/RECORD_ATTRIBUTES
 
 Description
You can use the /RECORD_ATTRIBUTES qualifier with the /REPAIR 
qualifier. If attribute repair is enabled during the repair phase, 
erroneous bits are cleared from a file's record attributes. This action 
might not correctly set a file's record attributes as it is beyond the 
scope of this utility to determine their correct values.
HP recommends that system managers not perform an attribute repair; 
instead, they should notify the owners of the files about the 
inconsistencies and have the owners reset the files' attributes using 
the SET FILE/RECORD_ATTRIBUTES=({record-attributes}) command.
 
 Example
 
  
    |  |  
    | 
 
$ ANALYZE/DISK_SYS$SYSDEVICE:
 
%ANALDISK-I-BAD_RECATTR, file (2930,1,1) [USER]ATTRIBUTES.DAT;13 
file record format: Variable 
inconsistent file attributes: Bit 5
%ANALDISK-I-BAD_RECATTR, file (2931,1,1) [USER]ATTRIBUTES.DAT;14 
file record format: Variable 
inconsistent file attributes: FORTRAN carriage control, Bit 5
%ANALDISK-I-BAD_RECATTR, file (2932,1,1) [USER]ATTRIBUTES.DAT;15 
file record format: Variable 
inconsistent file attributes: Implied carriage control, Bit 5
%ANALDISK-I-BAD_RECATTR, file (2933,1,1) [USER]ATTRIBUTES.DAT;16 
file record format: Variable 
inconsistent file attributes: Non-spanned, Bit 5
%ANALDISK-I-BAD_RECATTR, file (2934,1,1) [USER]ATTRIBUTES.DAT;17 
file record format: Variable 
inconsistent file attributes: FORTRAN carriage control, 
Non-spanned, Bit 5 
       |  
 /REPAIR
 
Determines whether the Analyze/Disk_Structure utility repairs errors 
that are detected in the file structure of the specified device.
 
 Format
/REPAIR
/NOREPAIR
 
 
 Description
The Analyze/Disk_Structure utility does not perform any repair 
operation unless you specify the /REPAIR qualifier. The default is 
/NOREPAIR.
If you specify /REPAIR, the utility uses the ACP control lock volume 
function to prevent creation, deletion, extension, and truncation 
activity while the volume is being rebuilt. In this way, the volume is 
prevented from being modified while the operation is in progress.
 
To effectively scan a disk (/NOREPAIR), you must have read access to 
all files on the disk. You must also have write access to INDEXF.SYS to 
force the flushing of the caches for this file. You must also have 
write access to BITMAP.SYS for the same reason: to force the flushing 
of the caches for this file. (You need write access to QUOTA.SYS only 
if the volume is running disk quotas.)
 
 Example
 
  
    |  |  
    | 
 
$ ANALYZE/DISK_STRUCTURE DBA1:/REPAIR
       |  
The command in this example causes ANALYZE/DISK_STRUCTURE to perform a 
repair on all errors found in the file structure of device DBA1.
 /SHADOW
 
Examines the entire contents of a shadow set or a specified range of 
blocks in a shadow set for discrepancies.
 
 Format
/SHADOW
 
 Parameters
None.
 
 Qualifiers
/BLOCKS={(START:n, COUNT:x, END:y,) 
FILE_SYSTEM, ALL}Directs the system to compare only the range specified. The options are 
the following:
  
    | START:
      n | Number of the first block to be analyzed. The default is the first 
      block. |  
    | COUNT:
      x | Number of blocks to be analyzed. You can use this option in combination 
      with or instead of the END option. |  
    | END:
      y | Number of the last block to be analyzed. The default is the last block 
      of the volume. |  
    | FILE_SYSTEM | Blocks currently in use by valid files on the disk. This is the default. |  
    | ALL | All blocks on the disk. |  
You can specify START,END,COUNT and either ALL or FILE_SYSTEM. For 
example, if you specify /BLOCKS=(START,END,COUNT:100,ALL), the software 
checks the first 100 blocks on the disk, whether or not the file system 
is using them.
 
If you specify /BLOCKS=(START,END,COUNT:100,FILE_SYSTEM), the software 
checks only those blocks that valid files on the disk are using.
 /BRIEFDisplays only the logical block number (LBN) if the data in a block is 
found to be different. Without this qualifier, if differences exist for 
an LBN, the hexadecimal data of that block will be displayed for each 
member./IGNORE[NO]IGNOREIgnore "special" files that are likely to have some blocks 
with different data. These differences, however, are not unusual and 
can, therefore, be ignored.
Other special files are the following:
 
  SWAPFILE*.*
  PAGEFILE*.*
 SYSDUMP.DMP
 SYS$ERRLOG.DMP
 
IGNORE is the default.
 /OUTPUT=filenameOutput the information to the specified file./STATISTICSDisplay only the file header and footer. The best use of this qualifier 
is with the /OUTPUT qualifier. 
 Description
When you enter the ANALYZE/DISK_STRUCTURE/SHADOW command, the system 
checks for shadow set discrepancies on the entire contents of a shadow 
set or a specified range of blocks in a shadow set. If a discrepancy is 
found, a clusterwide WRITE lock is taken on the shadow set, and the 
questionable blocks are reread. Then one of the following actions 
occurs:
  If a member of the shadow set experiences connectivity problems for 
  any reason, the ANALYZE/DISK_STRUCTURE command displays the error that 
  it received and then returns the user to the DCL prompt. To correct 
  the connectivity problem and run the utility again on the same shadow 
  set, you might need to create a temporary file on the virtual unit 
  before reissuing the ANALYZE/DISK/SHADOW command.
If a discrepancy is still present on the second read, the system 
  displays the file name on the screen. The system also dumps the data 
  block containing the discrepancy to the screen or to a file if you 
  specify the /OUTPUT qualifier.
  If no discrepancy is found on the second read, the system considers 
  the error to be a transient one (for example, a WRITE to that disk 
  block was in progress).
 
See Section 3.1.2 for more details.
 
 Example
 
  
    |  |  
    | 
 
$ ANALYZE/DISK_STRUCTURE/SHADOW/BRIEF/BLOCKS=COUNT:1000 dsa716:
Starting to check _DSA716: at 14-MAY-2002 13:42:52.43 
Members of shadow set _DSA716: are _$252$MDA0: _$252$DUA716: 
and the number of blocks to be compared is 1000. 
Checking LBN #0 (approx 0%) 
Checking LBN #127 (approx 12%) 
Checking LBN #254 (approx 25 %) 
Checking LBN #381 (approx 38%) 
Checking LBN #508 (approx 50%) 
Checking LBN #635 (approx 63%) 
Checking LBN #762 (approx 76%) 
Checking LBN #889 (approx 88%) 
 
Run statistics for _DSA716: are as follows: 
         Finish Time = 14-MAY-2002 13:42:52.73 
         ELAPSED TIME =    0 00:00:00.29 
         CPU TIME = 0:00:00.02 
         BUFFERED I/O COUNT = 10 
         DIRECT I/O COUNT = 16 
         Failed LBNs = 0 
         Transient LBN compare errors = 0 
$
       |  
The command in this example causes ANALYZE/DISK_STRUCTURE/SHADOW to 
examine the first 1000 blocks of the DSA716: virtual unit to ensure 
that the device $252$MDAO: and $252$DUA716: have identical data in 
those blocks.
 /STATISTICS
 
Produces statistical information about the volume under verification 
and creates a file, STATS.DAT, which contains per-volume statistics.
 
 Format
/STATISTICS
 
 Description
The following information is placed in the STATS.DAT file:
   The number of ODS-2 and ODS-5 headers on the volume
   The number of special headers on ODS-5 volumes
  The distribution of file name lengths
  The distribution of extension header chain lengths
  The distribution of header identification area free space
  The distribution of header map area and ACL area free space
  The totals of header space that is in use and header space that is 
  not in use
 
 Example
 
  
    |  |  
    | 
 
$ ANALYZE/DISK_STRUCTURE MDA2000: /STATISTICS
       |  
The OpenVMS Alpha volume in this example, which is on device MDA2000:, 
has been converted from ODS-2 to ODS-5 using the SET VOLUME command. 
The STATS.DAT file created contains the following information:
 
 
  
    | 
 
********** Statistics for volume 001 of 001 ********** 
 
Volume is ODS level 5. 
 
Volume has 00000004 ODS-2 primary headers. 
Volume has 00000003 ODS-5 primary headers. 
Volume has 00000000 ODS-5 -1 segnum headers. 
 
00000001 filenames of length 009 bytes. 
00000002 filenames of length 011 bytes. 
00000001 filenames of length 013 bytes. 
00000002 filenames of length 015 bytes. 
00000001 filenames of length 073 bytes. 
 
00000007 extension header chains of length 00000. 
 
00000001 ODS-2 headers have  071 ident area free bytes. 
00000001 ODS-2 headers have  073 ident area free bytes. 
00000001 ODS-2 headers have  075 ident area free bytes. 
00000001 ODS-2 headers have  077 ident area free bytes. 
 
Total ODS-2 ident area free bytes is 00000296. 
 
00000001 ODS-5 headers have  001 ident area free bytes. 
00000001 ODS-5 headers have  029 ident area free bytes. 
00000001 ODS-5 headers have  033 ident area free bytes. 
 
Total ODS-5 ident area free bytes is 00000063. 
 
00000001 headers have 277 free bytes in total. 
00000001 headers have 335 free bytes in total. 
00000001 headers have 339 free bytes in total. 
00000001 headers have 377 free bytes in total. 
00000001 headers have 379 free bytes in total. 
00000001 headers have 381 free bytes in total. 
00000001 headers have 383 free bytes in total. 
 
Total header area in bytes is   00003584. 
Total header area free bytes is 00002791. 
Total header area used bytes is 00000793. 
 |  /USAGE[=filespec]
 
Specifies that a disk usage accounting file should be produced, in 
addition to the other specified functions of the Analyze/Disk_Structure 
utility.
 
 Format
/USAGE[=filespec]
 
 
 Description
If all or part of the file specification is omitted, 
ANALYZE/DISK_STRUCTURE assumes a default file specification of 
USAGE.DAT. The file is placed in the current default directory.
 
 Example
 
  
    |  |  
    | 
 
$ ANALYZE/DISK_STRUCTURE DBA1:/USAGE
$ DIRECTORY USAGE
 
Directory DISK$DEFAULT:[ACCOUNT]
 
USAGE.DAT;1
 
Total of 1 file.
 
       |  
The first command in this example causes ANALYZE/DISK_STRUCTURE to 
produce a disk usage accounting file. Because a file specification was 
not provided in the command line, ANALYZE/DISK_STRUCTURE uses both the 
default file name and directory [ACCOUNT]USAGE.DAT. The DIRECTORY 
command instructs the system to display all files with a file name of 
usage in the current directory. The OpenVMS Alpha device in this 
example, MDA2000:, has been converted from ODS-2 to ODS-5 using the SET 
VOLUME command.
 
 
 Chapter 4Audit Analysis Utility
4.1 ANALYZE/AUDIT Description
The Audit Analysis utility (ANALYZE/AUDIT) is a system management tool 
that enables system managers or site security administrators to produce 
reports from security audit log files.
 
 The OpenVMS operating system automatically audits a limited number of 
 events, such as changes to the authorization database and use of the 
 SET AUDIT command. Depending on your site's requirements, you may want 
 to enable other forms of reporting. However, collecting security audit 
 messages is useful only if you develop and implement a procedure to 
 periodically review the audit log file for suspicious activity. Use 
 ANALYZE/AUDIT to examine the data in security audit log files or 
 security archive files.
 
The ANALYZE/AUDIT command's different qualifiers allow you to specify 
the type of information the utility extracts from the security audit 
log file. The utility can produce an audit report in a variety of 
formats and direct a report to a file or a terminal.
 
A description of the format of the auditing messages written to the 
security auditing file appears in Appendix F.
 
In a mixed-version cluster, an audit log file contains entries from 
systems running different versions of the operating system. To analyze 
the log file, you must invoke the Audit Analysis utility 
(ANALYZE/AUDIT) from a node running Version 6.1 or later.
 
For information about how to generate audit messages records and how to 
use ANALYZE/AUDIT, see the HP OpenVMS Guide to System Security.
4.2 ANALYZE/AUDIT Usage Summary 
 
The Audit Analysis utility (ANALYZE/AUDIT) processes event messages in 
security audit log files to produce reports of security-related events 
on the system.
 
 Format
ANALYZE/AUDIT [file-spec[,...]]
 
 Parameter
file-spec[,...]Specifies one or more security audit log files as input to 
ANALYZE/AUDIT. If you specify more than one file name, separate the 
names with commas.
If you omit the file-spec parameter, the utility 
searches for the default audit log file SECURITY.AUDIT$JOURNAL.
 
The default audit log file is created in the SYS$COMMON:[SYSMGR] 
directory. To use the file, specify SYS$MANAGER on the ANALYZE/AUDIT 
command line. If you do not specify a directory, the utility searches 
for the file in the current directory.
 
You can include wildcard characters, such as the asterisk (*) or 
percent sign (%), in the file specification.
 
The audit log file can be located in any directory. To display the 
current location, use the DCL command SHOW AUDIT/ALL.
 
 Description
Use the DCL command ANALYZE/AUDIT to analyze security audit log files 
or security archive files. An ANALYZE/AUDIT command line can specify 
the name of one or more log files, as follows:
  
    | ANALYZE/AUDIT [file-spec,...]
 |  
 
You can also use the ANALYZE/AUDIT command to extract security event 
messages from security archive files or from binary files (created with 
previous ANALYZE/AUDIT commands).
 
Each ANALYZE/AUDIT request runs until the log file is completely 
processed. You can interrupt the processing to modify the display or to 
change position in the report if you activate command mode by pressing 
Ctrl/C. To terminate an ANALYZE/AUDIT request before completion, press 
Ctrl/Z.
 
You can direct ANALYZE/AUDIT output to any supported terminal device or 
to a disk or tape file by specifying the file specification as an 
argument to the /OUTPUT qualifier. By default, the output is directed 
to SYS$OUTPUT.
 
Use of ANALYZE/AUDIT requires no special privileges other than access 
to the files specified in the command line.
 4.3 ANALYZE/AUDIT Qualifiers
This section describes ANALYZE/AUDIT and provides examples of each 
qualifier. The following table summarizes the ANALYZE/AUDIT qualifiers:
 
  
    | Qualifier | Description |  
    | /BEFORE | Controls whether records dated earlier than the specified time are 
      selected |  
    | /BINARY | Controls whether output is a binary file |  
    | /BRIEF | Controls whether a brief, single-line record format is used in ASCII 
      displays |  
    | /EVENT_TYPE | Selects the classes of events to be extracted from the security log file |  
    | /FULL | Controls whether a full format is used in ASCII displays |  
    | /IGNORE | Excludes records from the report that match the specified criteria |  
    | /INTERACTIVE | Controls whether interactive command mode is enabled when ANALYZE/AUDIT 
      is invoked |  
    | /OUTPUT | Specifies where to direct output from ANALYZE/AUDIT |  
    | /PAUSE | Specifies the length of time each record is displayed in a full format 
      display |  
    | /SELECT | Specifies the criteria for selecting records |  
    | /SINCE | Indicates that the utility must operate on records dated with the 
      specified time or after the specified time |  
    | /SUMMARY | Specifies that a summary of the selected records be produced after all 
      records are processed |  
 
 |