icapmanage man page on HP-UX

Man page or keyword search:  
man Server   10987 pages
apropos Keyword Search (all sections)
Output format
HP-UX logo
[printable version]

icapmanage(1M)							icapmanage(1M)

NAME
       icapmanage  -  Global  Instant Capacity (GiCAP) management commands for
       GiCAP groups.

SYNOPSIS
       icapmanage -i -U <rule_file>

       icapmanage -C <codeword>

       icapmanage -a -g <group_name>

       icapmanage -r -g <group_name>

       icapmanage -T <hostlist> [-g <group_name>]

       icapmanage -a -m <member_name>:<hostlist> -g <group_name>

       icapmanage -r -m <member_name>

       icapmanage -s -g <group_name> [-b] [-v]

       icapmanage -Q [-n]

       icapmanage -R [<hostlist>] [-U <rule_file>]

       icapmanage -a -S <host>

       icapmanage -r -S <host>

       icapmanage -t

       icapmanage -u -m <member_name> -h [<hostlist>][!<hostlist>]

       icapmanage -x <host>

       icapmanage -z <host>

DESCRIPTION
       A Global Instant Capacity (GiCAP) group consists	 of  a	Group  Manager
       system  and  one or more partitionable complexes which are the members.
       The primary purpose of a GiCAP group is	to  enable  group  members  to
       share  Instant  Capacity usage rights (for cores, cell boards, and mem‐
       ory) and temporary capacity.  A Group  Manager  has  either  active  or
       standby	status.	  An  active  Group  Manager  coordinates and monitors
       resource sharing, has had hardware grouping rules applied, and has  had
       GiCAP  sharing  rights purchased for and applied to it.	Optionally, an
       active Group Manager can designate as a standby Group Manager any HP-UX
       system that runs Instant Capacity software but has not itself had GiCAP
       sharing rights applied.	The standby Group Manager has the  ability  to
       take  control  as  an active Group Manager if the original active Group
       Manager should become unusable for any reason.

       Because the members of a group are partitionable	 complexes  and	 GiCAP
       must  be	 able  to contact all of the partitions, GiCAP members must be
       defined by specifying a <hostlist> to describe the host OS instances of
       all the partitions.

       The  symbol  <hostlist>	is  a  string  of one or more host names or IP
       addresses with the form <host>[,<host>]...

       A host can be a vPar or nPar OS instance, but it cannot	be  a  virtual
       machine	("guest").   When using HPVM on a prospective GiCAP group mem‐
       ber, you must specify the name of the HPVM host OS  instance,  not  the
       name of an HPVM guest OS instance.

       The command, which is used to create, manage, and remove groups, can be
       invoked only on a Group Manager system.	On a  standby  Group  Manager,
       only  the  -Q  and  -s  options	are  allowed,  all  other  options are
       restricted to use only on the active Group Manager.  The command should
       not be invoked on a group member system.

       The command can be used to install a grouping rules file, apply a GiCAP
       sharing rights codeword, create and remove  GiCAP  groups,  test	 if  a
       server can be added to a GiCAP group, update a GiCAP group by adding or
       removing members, show grouping rules  and  supported  hardware,	 seize
       core usage rights from member partitions of a GiCAP group to be used by
       another member of the group, restore seized core usage  rights  to  the
       original member partition, update an existing GiCAP member by adding or
       removing hosts, set up and activate a standby Group  Manager,  transfer
       the  GiCAP  database to the standby Group Manager, and remove a standby
       Group Manager.

       WBEM version A.02.05 or higher must be installed on the Group  Manager,
       the standby Group Manager (if any), and on all OS instances of all mem‐
       ber systems in order to use Global Instant  Capacity.   Similarly,  the
       CIM Server configuration property sslClientVerificationMode must be set
       to a value of "optional" on all Group Managers and member OS instances.
       (The CIM Server may need to be restarted if the property was not previ‐
       ously set to this value.) For details, see  cimconfig(1M).   Note  that
       communication between the managers and members of groups is established
       using SSL certificates that are supplied by the GiCAP software.

       For a complete overview of Global Instant Capacity,  see	 icap(5),  and
       for  more  detailed  information see the located at /usr/share/doc/ica‐
       pUserGuide.pdf.

   Options
       recognizes these options and arguments:

	      -a	Add a GiCAP group, add a member to a group, or	desig‐
			nate a system as a standby Group Manager.

			To  create  a new group, use the -a option, along with
			the -g option to name the new group.

			To add a member to a GiCAP group, use the  -a  option,
			along  with the -m option to specify a member name and
			list of hostnames, and the -g option  to  specify  the
			group name.  The list of hostnames must contain a rep‐
			resentative host for each nPartition or virtual parti‐
			tion  of the complex, and each host must be up and the
			Group Manager must be able to contact it.   (To	 avoid
			potential  problems,  the  Group Manger should also be
			able to contact any standby manager that is  defined.)
			To add multiple members to a GiCAP group, you must run
			multiple times; you cannot specify multiple members in
			a single command.

			To  add	 a  standby  Group Manager, use the -a option,
			along with the -S option to identify the  host	system
			that is to serve as the standby Group Manager.

	      -b	Provide	 brief	status information only.  Show summary
			group information without information specific to  the
			Group Manager and the members.

	      -g <group_name>
			Specify a GiCAP group name for a GiCAP operation.

	      -h	Used  with the -u option to identify hosts to be added
			to or removed from an existing	GiCAP  group  member's
			list.	A  hostlist  identifies	 hosts to be added.  A
			hostlist preceded by an exclamation point (!)  identi‐
			fies  hosts to be removed.  There must be no interven‐
			ing blanks within a hostlist,  and  if	both  add  and
			remove	lists are specified, the entire string must be
			contiguous.

	      -i	Install a grouping rules file on a Group Manager  sys‐
			tem.

	      -m <member_name>:<host>[,<host>]...
			Add  a	member	(a  partitionable complex) to a group,
			with name member_name.	Specify an OS instance	(host)
			for  each  nPartition or virtual partition of the com‐
			plex (do not  specify  virtual	machine	 or  guest  OS
			instances).

			A  member  of a group must encompass all nPar and vPar
			OS instances of a complex, and each OS instance speci‐
			fied as a host must be accessible (ping-able) in order
			for the command to succeed.  When you first add a mem‐
			ber to a group, you are prompted for the root password
			for each specified host.  The  password	 is  used  for
			initial communication only and is not saved or stored.

			If  you	 are  using  the HP Virtual Server Environment
			(VSE), it may be helpful to define the member_name  to
			be  the	 same  as the VSE complex name (which includes
			the serial number).

			A member complex can be added to a group if it is  not
			in an exception state, if there are enough GiCAP shar‐
			ing rights available to	 match	the  number  of	 cores
			without	 usage rights on that complex, and if the com‐
			plex's hardware is compatible with the grouping	 rules
			and with the other members of the group.

	      -m <member_name>
			Specify	 the member name when removing a member from a
			GiCAP group.

	      -n	Prevents from attempting to  exchange  SSL  keys  with
			member hosts which the new active Group Manager cannot
			contact.  This option  allows  to  be  issued  from  a
			script without the script having to deal with the pos‐
			sibility of root password prompts.  If -n is specified
			and  there are member hosts which the new active group
			manager cannot contact, the active manager will not be
			able  to  use  those hosts for GiCAP operations.  If a
			GiCAP group member has no hosts which the active  man‐
			ager can contact, that member will not be able to par‐
			ticipate in the GiCAP group.

	      -r	Remove a member from a group, remove a GiCAP group, or
			remove a system from use as a standby Group Manager.

			When  used  with  the  -m option to specify the member
			name, removes that member  from	 a  GiCAP  group.   In
			order  to do the remove, at least one host defined for
			the member must be up and the Group  Manager  must  be
			able to contact it.  (To avoid potential problems, the
			Group Manager should  also  be	able  to  contact  any
			standby	 manager  that is defined.) Note that a member
			cannot be removed from	a  group  until	 any  borrowed
			usage  rights are returned to the group and any loaned
			usage rights are returned to the member.  Removal of a
			member	from a group releases sharing rights and makes
			them available for future use.

			When used in combination with the -g  option,  removes
			the  specified	GiCAP  group.	All  members  must  be
			removed before the group can be removed.

			When used in combination with the -S  option,  removes
			the identified host system from use as a standby Group
			Manager.

	      -s	Request status about one or more GiCAP groups.	Speci‐
			fication without any additional options displays group
			and member information for all GiCAP groups managed by
			this Group Manager.  Use the -g <group_name> option to
			limit the information to the named group only.	Use -b
			to  display  group-level  information only.  Use -v to
			include additional  manager-specific  information  and
			more detailed group and member information, especially
			partition-specific information for members.  For  more
			information  about fields that are displayed see "Sta‐
			tus Information" .

	      -t	Transfer a copy of the GiCAP database from the	active
			Group  Manager to a standby Group Manager.  The active
			Group Manager transfers	 the  GiCAP  database  to  the
			standby	 Group	Manager whenever the active Group Man‐
			ager makes changes to the database.  In addition,  the
			Instant Capacity software uses this command as part of
			an  automatically  generated  job  (see	 cron(1M))  to
			ensure	that this copy takes place if something should
			prevent normal replication of the  GiCAP  database  to
			the  standby Group Manager.  While you should not need
			to issue this command, you may wish to do so occasion‐
			ally,  especially  if  there are intermittent problems
			with network communications between the	 active	 Group
			Manager	 and  the standby Group Manager.  You may also
			wish to issue this command before having  the  standby
			Group Manager take over (via the command on the active
			Group Manager) for  planned  downtime  on  the	active
			Group  Manager.	  The transfer operation works only on
			the active Group Manager system.

	      -u	Update the list of  hosts  (OS	instances)  associated
			with  an existing GiCAP group member.  This command is
			typically used when the vPar or nPar configuration  of
			a  member  complex  changes.  The -m option identifies
			the member to be updated.  The	-h  option  identifies
			the hosts to be added or removed.

			Note:  You are prompted for the root password for each
			host to be added.  The password is  used  for  initial
			communication only and is not saved or stored.

			For  a given command execution, host removals are pro‐
			cessed before host additions.  As a result,  the  same
			host can be removed and readded with one update opera‐
			tion.  With removes or	adds  applied,	the  resulting
			list must contain a representative host for each nPar‐
			tition or virtual partition of the associated server.

			When adding hosts, each host must be up and the	 Group
			Manager	 must be able to contact it.  (To avoid poten‐
			tial problems, the Group Manager should also  be  able
			to contact any standby manager that is defined.)

	      -v	Provide	 verbose status information.  Include all lev‐
			els of information (group, manager and	member).   For
			Group  Managers,  include  resources being held by the
			Group Manager including temporary capacity.  For  mem‐
			bers,  include	borrow and loan information as well as
			partition-specific information such as the  allocation
			of resources among the hard partitions, and partition-
			specific information about seized  or  seizable	 usage
			rights	(see  ).   This	 option	 is  ignored if the -b
			option is also specified.

			This verbose option also  attempts  to	contact	 every
			host of each group member to check that two-way commu‐
			nication can be established between the issuing	 group
			manager (either active or standby) and each such host.
			The command without -v attempts	 to  contact  multiple
			hosts  on  a group member only if that is necessary to
			find a host that responds.  In	either	case,  reports
			which  hosts  it  failed  to  contact.	 Use of the -v
			option can be useful as	 a  general  health  check  of
			group communication.

	      -x <host> Acquire core usage rights from the nPartition contain‐
			ing the specified host to make them available to other
			group  members,	 also known as rights seizure.	Rights
			seizure takes almost all the  available	 usage	rights
			from the hard partition containing the specified host.
			The specified host must be known to the GiCAP  manager
			(it  appears in the output of ) and not currently run‐
			ning.  If other hosts are  associated  with  the  same
			hard partition, they cannot be currently running.  The
			operation can be performed once for each  hard	parti‐
			tion  on  the  member.	 For confirmation, the command
			verifies each known host on the hard  partition.   The
			hard  partition	 containing the specified host is left
			with one core usage right per active cell.   Any  core
			usage  rights  in excess of this amount becomes avail‐
			able for use elsewhere in the GiCAP group.  For	 exam‐
			ple,  if a partition of 2 cells is currently consuming
			6 core usage rights, makes 4 core usage rights (6 - 2)
			available for reassignment.

			While  rights  can  be	seized from any hard partition
			that is unavailable,  the  Instant  Capacity  software
			makes some additional restrictions when all partitions
			of a complex are unavailable.  As a result, there  are
			different   behaviors  and  constraints	 depending  on
			whether or not a partition can	be  contacted  on  the
			specified member complex.

			If, at the time of rights seizure, at least one member
			partition can be contacted, then the software is  able
			to  make an immediate adjustment to the available core
			usage rights, just as if an operation  had  been  per‐
			formed	before	the  specified	hard partition stopped
			running.  This makes core usage rights	available  for
			potential loans to other member systems.  In this sit‐
			uation, the seized core usage rights do	 not  have  an
			expiration  date.   However, if the cells are not made
			inactive and the system is not rebooted within	12  to
			24  hours of this rights seizure, the Instant Capacity
			software in still-running partitions takes  note  that
			the  iCAP  daemon  has	not been running in the failed
			partition for a significant period of time, and there‐
			fore  assumes that the partition might be booted to an
			operating system that is unaware of iCAP and is	 using
			all  cores  on	the partition.	This is referred to as
			the "assumed active" state and can result in temporary
			capacity  charges  or  compliance exceptions. To avoid
			this, cells can be made inactive by removing them from
			the partition, shutting down the partition from within
			the OS by using , or with the  MP  command.   However,
			even  if  the  cells  are  made	 inactive, the Instant
			Capacity software reserves usage  rights  to  minimize
			the  possibility that the complex will be taken out of
			compliance if the partition is booted with  all	 cores
			active.	  This	will not affect temporary capacity but
			may affect the ability to do activations on other par‐
			titions	 of  the complex, or may affect the ability to
			do resource migrations	within	the  GiCAP  group  (if
			any).  This "assumed reserved" state can be avoided by
			rebooting or  deleting	the  failed  partition	or  by
			authorizing  temporary	capacity  on activations.  For
			more details, refer to the section on .

			If, at the time of rights seizure, all	member	parti‐
			tions  are unreachable, the rights seizure is deferred
			and must be viewed as a limited and immediate loan  of
			usage  rights  from  the  specified  partition	to the
			group.	This loan of seized usage rights expires in 10
			days.  Upon expiration, usage rights are automatically
			restored to the member partitions from which they were
			seized.	  The  expiration  date	 for  a rights seizure
			operation effectively  terminates  the	period	during
			which  the  core  usage	 rights are available to other
			group members for purposes of disaster	recovery.   If
			none  of  the  member  partitions are reachable by the
			expiration date for a  particular  member,  the	 usage
			rights	are automatically restored (reassigned) to the
			member partition (or complex, in  the  case  of	 unas‐
			signed	seized	rights)	 from  which they were seized.
			However, if the seized usage rights  have  been	 rede‐
			ployed	to other members and are not released at expi‐
			ration time, the group might go out of compliance,  or
			temporary  capacity  might be used to maintain compli‐
			ance.

			If any partition of the inaccessible member from which
			rights	seizures were deferred reconnects to the group
			before the expiration date, then the seized core usage
			rights	(for  all  partitions) are finalized as a loan
			from the member to the group, the expiration  date  is
			no  longer  relevant,  and the usage rights can there‐
			after be manipulated with normal operations.

			While rights seizure operations can be performed in  a
			virtual	 partition  environment,  the  rights  seizure
			always operates on, and affects,  the  entire  nParti‐
			tion.  This means:

			·  Rights  seizure  can	 be  performed only if all the
			   virtual partitions for an nPartition are down.

			·  For a given nPartition, you can specify any of  the
			   virtual  partition  host  names  as the target of a
			   rights seizure operation or	as  the	 target	 of  a
			   usage rights restore operation.

			·  Because  rights  seizure  leaves  only a minimum of
			   core usage rights with the nPartition, is it likely
			   that	 the  remaining number of core usage rights is
			   not sufficient  to  satisfy	the  number  of	 cores
			   assigned  to	 each virtual partition in the nParti‐
			   tion.   This	 means	that  the  virtual  partitions
			   likely cannot be booted (due to noncompliance) once
			   the original failure is corrected.  To  avoid  this
			   problem,  usage  rights must be restored (using the
			   option) before failback.

	      -z <host> Restore previously seized core	usage  rights  to  the
			nPartition  containing the specified host.  Core usage
			rights must be available in the	 GiCAP	group  or  the
			command fails.

			This option can be useful particularly when core usage
			rights have been seized from  systems  running	vPars,
			because	 the  restoration  of core usage rights may be
			necessary in order to be  able	to  reboot  the	 vPar,
			depending  on  the  vPars  database definition and the
			allocation of usage rights among the vPars.   If  this
			is  a  potential problem, the restoration command must
			be performed before rebooting any vPar within an  nPar
			from which rights were seized.

	      -C <codeword>
			GiCAP  codeword	 application.	This option allows the
			user to apply a GiCAP codeword to a Group Manager sys‐
			tem.   (This  option  cannot  be used to apply an iCAP
			codeword such as an RTU or TiCAP codeword.) For	 GiCAP
			sharing	 rights	 codewords,  first  purchase the GiCAP
			codeword from HP.  The number of rights purchased must
			equal  or  exceed  the	number	of cores without usage
			rights for all planned members for all groups  managed
			by  the	 Group	Manager.   Next, retrieve the codeword
			from the HP Utility Pricing Solutions portal and apply
			it  to	the  Group  Manager system.  Unlike iCAP code‐
			words, GiCAP codewords are generated for  a  specified
			partition  on  a Group Manager system, and can only be
			applied to that partition.  Like iCAP codewords, GiCAP
			codewords are also generated in a sequence and must be
			applied in the order they are generated for the	 Group
			Manager	  partition.   However,	 GiCAP	codewords  are
			sequenced independently from any  iCAP	codewords  for
			the  same  complex,  and  can be applied independently
			from any such  iCAP  codewords.	  Application  of  the
			GiCAP  codeword	 allows	 members to be added to one or
			more GiCAP groups.

	      -Q	Make a standby GiCAP Group Manager  the	 active	 Group
			Manager	 for  all group members.  The new active Group
			Manager attempts to contact all group members, inform‐
			ing them that this system is the active Group Manager.
			The new Group Manager also  attempts  to  contact  the
			previous  Group	 Manager  to make it the standby Group
			Manager.  If the new Group Manager  cannot  contact  a
			group  member,	that  group member will continue to be
			managed by its current manager.	 This  may  result  in
			the  member  not  being	 able  to loan or borrow usage
			rights or it  may  result  in  a  split	 group.	  (For
			details, see icap(5) in the section titled "Group Man‐
			ager Failover Considerations".)	  The  current	system
			becomes the active Group Manager regardless of whether
			these attempted contacts succeed or fail.

			When attempting to contact all group members, the  new
			active	Group  Manager may find that it must establish
			SSL communication with a member host.  If so, it  will
			prompt	for  that  host's root password so that it can
			exchange SSL keys with the host (unless the -n	option
			is also specified).  HP recommends that SSL communica‐
			tion between the standby Group Manager and all	member
			hosts  has  been previously established before the use
			of the command.	 Normally  this	 occurs	 automatically
			when adding a new member to a group, updating the host
			list for an existing member, or adding a standby Group
			Manager.

			This command can be issued on an active Group Manager.
			In this case, the active Group	Manager	 continues  as
			the  active Group Manager.  It attempts to contact all
			group members and the previously active Group  Manager
			and  informs them that this system is the active Group
			Manager.  This is useful if a prior command failed  to
			contact	 some  group  members or the previously active
			Group Manager.

			Note that if the active Group Manager manages multiple
			groups,	 all  members  of all such groups must be con‐
			tacted during this operation.

	      -R [<host>[,<host>]...]
			Report hardware grouping information.  When used  with
			a  list	 of host names, report all hardware types with
			which the hosts might be grouped.  The	hosts  can  be
			specified  using  either the IP address or the name of
			the host.  If the hosts are not compatible  with  each
			other,	no  hardware  is  reported.  Without a list of
			host names, report all supported hardware and grouping
			rules.	 Specification	of the -U option reports hard‐
			ware associated with the specified rule	 file  instead
			of  the installed rule file, and can be used to evalu‐
			ate a new grouping rules  file	before	installing  it
			with the -i option.

	      -S	When  used  in combination with the -a option, identi‐
			fies a host system to be set up	 as  a	standby	 Group
			Manager.   This command will prompt for the root pass‐
			word of the host so that the active Group Manager  can
			exchange  SSL  keys  with the designated standby host,
			establishing the ability to communicate with it.   The
			active	Group  Manager	proceeds  to update all member
			hosts of all managed groups with information about the
			standby Group Manager, establish secure communications
			between the member hosts and the  standby  Group  Man‐
			ager,  and  set	 up a job responsible for the periodic
			transfer of the GiCAP database to  the	standby	 Group
			Manager.   Note	 that  a transfer also occurs whenever
			the database is updated on the	active	Group  Manager
			until  such  time  as  the standby Group Manager takes
			control or is removed from use as a standby Group Man‐
			ager.

			When  used  in combination with the -r option, identi‐
			fies a host system which is to be removed from use  as
			a  standby  Group  Manager.   The active Group Manager
			updates all member hosts of all managed	 groups	 about
			the  removal, discontinues the GiCAP database transfer
			operations (removes the job created when  the  standby
			Group  Manager was set up), and directs the identified
			host system to remove its copy of the GiCAP database.

			A standby Group Manager can be added anytime after the
			active	Group  Manager has grouping rules installed on
			it (before or after the application of sharing	rights
			to  the	 active	 Group Manager, before or after groups
			are created).  A Group Manager in standby  status  can
			be removed at any time.

	      -T <host>[,<host>]...
			Test  hardware compatibility for one or more host sys‐
			tems in order to determine which  groups  the  systems
			can  join.   When used with the -g option to specify a
			group name, tests whether the specified	 host  systems
			have  hardware compatible with the group.  Without the
			-g option, report which of all the groups  managed  by
			this  Group  Manager have hardware compatible with the
			host systems.  A host can be  specified	 using	either
			the  IP	 address  or  the  name of the host.  The host
			names do not have to be from the same complex, but  to
			best  predict  the possibility of joining a group, the
			list of hosts should include all the nPartitions for a
			particular  complex.  If the hosts are not compatible,
			no groups are reported as having compatible hardware.

	      -U <rule_file>
			Specify the filename of a rule file.

   Status Information
       This section describes the fields that might be displayed when is  used
       to  show	 status.  The exact choice of options used in combination with
       the -s option determines how much of the information is displayed.

       First, the display shows the software  version  number  of  the	Global
       Instant	Capacity software and the current date and time.  This is fol‐
       lowed by the identification information for the Group  Manager:	serial
       number,	nPar ID (if any), and vPar code (if any).  This identification
       information is necessary when requesting a sharing rights codeword from
       the portal.  Next, the Group Manager status (active or standby) is dis‐
       played.	On an active Group Manager, this is followed by	 the  name  of
       the  dedicated standby Group Manager (if any).  On a standby Group Man‐
       ager, this is followed by the name of the associated active Group  Man‐
       ager.   Next,  the display shows the number of sharing rights that have
       been purchased and applied to this Group Manager, and how many  sharing
       rights are currently in use versus the number still available to accom‐
       modate addition of new members or new groups  with  new	members.   The
       output  of the command uses symbols next to the value of some fields in
       certain circumstances.  These symbols are as follows:

	      *		Indicates an estimated number of active cores,	memory
			or  cells,  because  full information is not available
			(for example, when a host is not reachable, or on some
			platforms when cells are powered off).

	      #		Indicates that all cores in the partition, rather than
			any specific number, have been requested to be active.
			The  number  indicates	the current number of cores in
			the partition.
       These values can be displayed for each group managed by the Group  Man‐
       ager.

	      Group <group_name>:
			This field displays the name of the GiCAP group.

	      Group Members:
			This  summarizes the name of each member in the group,
			and also shows the host names comprising  each	member
			complex.

	      Instant Capacity Resource Summary for the group
			This  section shows values which are summed across all
			group members.

			Number of cells without usage rights:
				  This field  displays	the  total  number  of
				  cells	 across	 all  group members which must
				  remain inactive because  usage  rights  have
				  not been purchased.

			Number of inactive cells:
				  This	field  displays	 the  actual number of
				  inactive cells across the  group.   It  does
				  not  include counts for inactive cells asso‐
				  ciated with inaccessible members (no	parti‐
				  tions could be contacted).

			Amount of memory without usage rights:
				  This field displays the total amount of mem‐
				  ory which must remain	 inactive  across  all
				  group	 members because usage rights have not
				  been purchased.

			Amount of inactive memory:
				  This field displays  the  actual  amount  of
				  inactive  memory  across the group.  It does
				  not include counts for inactive memory asso‐
				  ciated  with inaccessible members (no parti‐
				  tions could be contacted).

			Number of cores without usage rights:
				  This field  displays	the  total  number  of
				  cores	 which must remain inactive across all
				  group members because usage rights have  not
				  been purchased.

			Number of inactive cores:
				  This	field  displays	 the  actual number of
				  inactive cores across the  group.   It  does
				  not  include counts for inactive cores asso‐
				  ciated with inaccessible members (no	parti‐
				  tions could be contacted).

			Number of cores using temporary capacity:
				  This	field  displays	 the  number  of cores
				  using temporary capacity within  the	group.
				  It  does  not include values for unreachable
				  members (no partitions could be contacted).

			Temporary capacity available:
				  This field displays  the  amount  of	pooled
				  group	 temporary  capacity that is available
				  to any member of the group.

			Projected temporary capacity expiration:
				  This field displays the date and  time  that
				  temporary  capacity  is  projected to expire
				  for the group	 at  the  present  consumption
				  rate.

			Temporary capacity balance:
				  This field displays the total amount of tem‐
				  porary capacity assigned to the group.  This
				  value	 is different from "Temporary capacity
				  available" , and is displayed only when mem‐
				  bers	with temporary capacity cannot be con‐
				  tacted by the group manager (their temporary
				  capacity  is	not available to the group but
				  is part of the group total).

			Unassigned cell usage rights:
				  This field displays the number of cells that
				  can  be  activated  immediately in the group
				  because of usage rights that are not in use.
				  This	field  is  displayed  only when the -v
				  option is specified.

			Unassigned memory usage rights:
				  This field displays  the  amount  of	memory
				  that	can  be	 activated  immediately in the
				  group because of usage rights that  are  not
				  in  use.   This field is displayed only when
				  the -v option is specified.

			Unassigned core usage rights:
				  This field displays the number of cores that
				  can  be  activated  immediately in the group
				  because of usage rights that are not in use.
				  This	field  is  displayed  only when the -v
				  option is specified.

			Seized core usage rights:
				  This summary field displays  the  number  of
				  expiring  core usage rights that were seized
				  from	inaccessible  members  (see  ).	  This
				  field	 is  displayed	for all status options
				  (-s, -b, -v), but  only  when	 usage	rights
				  were	seized	from member systems where none
				  of the partitions could be contacted.

			Expiration of seized core usage rights:
				  This summary	field  displays	 the  earliest
				  expiration  date  for core usage rights that
				  were seized from members where none  of  the
				  partitions  could  be contacted (see ).  The
				  expiration date for a rights seizure	opera‐
				  tion	effectively terminates the period dur‐
				  ing which the core usage rights  are	avail‐
				  able	to  other  group  members for disaster
				  recovery.

				  This	field  is  displayed  for  all	status
				  options  (-s,	 -b,  -v), but only when usage
				  rights were seized from member systems where
				  none of the partitions could be contacted.

	      Information Displayed for the Group Manager
			This  section describes resources that are temporarily
			held by the Group Manager.  The resources  are	avail‐
			able  to  all  members	of the group and include cell,
			memory, and core usage rights, and temporary capacity.
			Manager-held  resources	 usually represent a transient
			state,	for  example  when  usage  rights  have	  been
			released (or seized using ) from one member of a group
			but have not yet been activated on another target mem‐
			ber  system.  These values are displayed only when the
			-v option (verbose) is specified.

	      Information displayed for each member of the group
			This section is repeated for each member of the	 group
			if  the -b option is not specified.  With a few excep‐
			tions, the information in this section consists	 of  a
			subset	of  the information provided by the command on
			the member systems.  In all cases, a Resource  Summary
			minimally  includes  the values for cells, memory, and
			cores without usage rights for the member system,  and
			the balance of temporary capacity assigned to the mem‐
			ber complex.  If any partition of the complex  can  be
			contacted,  the	 resource summary also contains counts
			of inactive cells, memory  and	cores,	the  count  of
			cores using temporary capacity, and the projected date
			of temporary capacity expiration.  If the -v option is
			specified  and any partition of the member can be con‐
			tacted, the member resource summary includes counts of
			borrowed cell, memory, and core usage rights, and par‐
			tition-specific information is included in the	"Allo‐
			cation	of Instant Capacity Resources among the parti‐
			tions" section.

			If core usage rights have been seized from the member,
			the count of cores without usage rights is adjusted by
			the number of seized  usage  rights,  to  reflect  the
			overall	 balance  of  cores  without usage rights that
			must be maintained in the group.

			If none of the partitions of the member	 can  be  con‐
			tacted,	 then  the  Resource  Summary contains limited
			information, using the last-known values for the  mem‐
			ber.   Only  the fields listed for unreachable members
			have values that are included  in  the	group  totals.
			For  example,  the group total for inactive cores does
			not include counts for unreachable  members,  but  the
			group  total  for number of cores without usage rights
			includes last-known values for unreachable members.

			Additionally, information about rights seizure can  be
			displayed for members where none of the partitions can
			be contacted:

			Seized core usage rights:
				  This summary field displays the total number
				  of  expiring	core  usage  rights  that were
				  seized from all partitions  of  this	member
				  (using  operations  when  none of the parti‐
				  tions could be contacted).  This member sum‐
				  mary	field  is  not	displayed  when the -v
				  option is specified (because the  -v	option
				  includes a detailed list instead).

			Expiration of seized core usage rights:
				  This	summary	 field	displays  the earliest
				  expiration date for core usage  rights  that
				  were seized from all partitions of this mem‐
				  ber (using operations).  The expiration date
				  for  a  rights seizure operation effectively
				  terminates the period during which the  core
				  usage	 rights	 are  available to other group
				  members for disaster recovery.

				  This member summary field is	not  displayed
				  when	the  -v option is specified.  However,
				  if  multiple	 rights	  seizure   operations
				  occurred  for	 this  member,	there might be
				  multiple expiration dates.  To  see  a  more
				  detailed  list  of partition-specific rights
				  seizure counts and expiration dates, use the
				  -v option.

			Unassigned core usage rights seized:
				  This	field  displays	 the  number of unused
				  core usage rights (not  previously  assigned
				  to any partition) that were seized from this
				  member.  This field is displayed  only  when
				  the -v option is specified.

				  You  can  use	 to  restore core usage rights
				  that were previously seized from partitions.
				  It  does  not restore previously seized core
				  usage	 rights	 if  those  rights  were   not
				  assigned  to	a  partition  at  the  time of
				  seizure.  In other respects  however,	 these
				  unassigned  seized  usage rights are similar
				  to usage rights seized from  partitions:  if
				  the  member  reconnects to the group manager
				  before the expiration date, the seized usage
				  rights are completed as a loan to the group.
				  If the expiration date occurs before	recon‐
				  nection,  the	 seized usage rights revert to
				  the  member  system  from  which  they  were
				  seized.

			Core usage rights seized from npar <n>:
				  This	field  displays the number of expiring
				  core usage rights that were  seized  from  a
				  specific  partition  of  the	member.	  This
				  field is displayed only when the  -v	option
				  is  specified,  and  it is repeated for each
				  partition where usage rights were seized for
				  disaster  recovery,  if  none	 of the member
				  partitions could be contacted.

			Expiration:
				  This field displays the expiration date  for
				  core	usage  rights  that  were  seized with
				  operations from the preceding	 named	parti‐
				  tion,	 or  from  the	complex in the case of
				  unassigned  usage  rights.   The  expiration
				  date	for  a rights seizure operation effec‐
				  tively terminates the	 period	 during	 which
				  the core usage rights are available to other
				  group	 members  for  purposes	 of   disaster
				  recovery.

				  This	field  is  displayed  only when the -v
				  option is specified  and  only  for  systems
				  where	 usage rights were seized for disaster
				  recovery, if none of the  member  partitions
				  could be contacted.
       In  general,  the  Instant Capacity software is designed to enforce the
       concept that a certain number of	 resources  must  remain  inactive  in
       order  to  stay in compliance with the iCAP contract.  For that reason,
       many of the display fields for and also	for  are  negative  counts  of
       usage  rights,  such  as	 Cores	without usage rights and Cells without
       usage rights.

       At the same time, the GiCAP software is intended to allow the  transfer
       of  usage  rights  among	 members  of  the group.  So, seizure of usage
       rights, borrows and loans of usage rights  are  described  as  positive
       counts  of usage rights, such as Number of core usage rights seized and
       Borrowed core rights.  The Group Manager	 also  sometimes  holds	 usage
       rights  during transient states, so all the Group Manager resources are
       described as positive counts of core usage rights.

       To properly interpret the display of usage rights, it is sometimes nec‐
       essary to total the usage rights using both positive and negative (sub‐
       tractive) values.  For example, if the group contains two members, each
       having  3 cores without usage rights, then the total for the group is 6
       cores without usage rights.  If a rights are seized  from  one  member,
       for  example  taking  2 core usage rights away, then those 2 core usage
       rights are held by the Group Manager before the 4 are used  by  another
       member  of  the	group.	During that transitional period, the total for
       the group remains 6 cores without usage rights, but  the	 member	 total
       for  the	 unreachable  member  is  adjusted to be 5 cores without usage
       rights (2 were taken away from the  unreachable	member)	 and  3	 cores
       without	usage  rights  (for  the other member).	 At the same time, the
       Group Manager holds 2 usage rights.  The total for cores without	 usage
       rights is calculated as 6=5+3-2.

       In  this	 example,  "counts  of	cores  without	usage rights" are also
       adjusted as a result of rights seizure operations in order to  maintain
       the contractually required balance of cores without usage rights.  Sim‐
       ilar adjustments are made every time a resource (cores, cells,  memory)
       is  borrowed  from  or  loaned  to  other  members of the group.	 These
       adjustments are automatically reflected in the  output  on  the	member
       systems;	 in  the  case	of unreachable members and rights seizure, you
       might see the adjustment first in the display from the output.

EXTERNAL INFLUENCES
   Environment Variables
	      ·	 LANG determines the locale to use for the  locale  categories
		 when  both  LC_ALL and the corresponding environment variable
		 (beginning with LC_) do not specify a locale.	If LANG is not
		 set  or  is set to the empty string, a default of "C" is used
		 (see lang(5)).

	      ·	 LC_CTYPE determines the interpretation of single- and	multi‐
		 ple-byte characters.

	      ·	 LC_MESSAGES  determines  the  language	 in which messages are
		 displayed.

		 If any internationalization variable contains an invalid set‐
		 ting, icapmanage behaves as if all internationalization vari‐
		 ables are set to C (see environ(5)).

   International Code Set Support
       Single- and multiple-byte character code sets are supported.

RETURN VALUE
       exits with one of these values:

	      0		Command succeeded.

	      >0	Command failed; error message sent to STDERR.

FILES
	      /var/adm/GiCAP.log
			Log file for GiCAP operations and messages.

	      /etc/opt/iCAP/GiCAP.rules
			Encrypted file containing grouping rules used  by  the
			Group Manager.

	      /etc/opt/iCAP/GiCAP_db
			Encrypted  file	 containing  information about sharing
			rights and information about each group managed by the
			Group Manager.

	      /etc/opt/iCAP/GiCAP.configFile
			Present	 on  every  host  of a GiCAP group member.  It
			contains information needed by the  iCAP  software  to
			contact the Group Manager for the host.

	      /etc/opt/iCAP/GiCAP_keygen
			Script used to establish (or reestablish) SSL certifi‐
			cates.

	      /etc/opt/iCAP/GiCAPcert.pem

	      /etc/opt/iCAP/*.pem

	      /etc/opt/iCAP/GiCAPpkey.pem
			SSL certificate files.

	      /etc/opt/iCAP/GiCAP.checkScavengedMember.xml
			Script used by the Group Manager to periodically check
			for  members reconnecting to the group after a seizure
			operation.

EXAMPLES
       Install a new grouping rules file:

	      icapmanage -i -U /tmp/GiCAP.rules

       Purchase a sharing rights codeword from HP  with	 rights	 equal	to  or
       greater	than  the number of cores without usage rights for all planned
       members of the group.  Retrieve the codeword from the portal, and apply
       the sharing rights codeword to the Group Manager system.

	      icapmanage -C R8J2DBW.5UTxyWQ.2MekJ43.G5cdTVP.1-m9kvweQ.AYqEXym.wj3dyLj.Fbtg7s1

       Create a GiCAP group named ADMIN1:

	      icapmanage -a -g ADMIN1

       Test  whether a server complex has hardware that is compatible with the
       group:

	      icapmanage -T mypar1.node.hp.com,mypar2.node.hp.com -g ADMIN1

       Add a member called IT to the ADMIN1 group.  Supply the	root  password
       for each of these partitions in response to the prompts:

	      icapmanage -a -m IT:mypar1.node.hp.com,mypar2.node.hp.com -g ADMIN1
	      root@mypar1.node.hp.com's password:
	      root@mypar2.node.hp.com's password:

       Designate host mystandby for use as a standby Group Manager:

	      icapmanage -a -S mystandby.node.hp.com

       Remove host mystandby from use as a standby Group Manager:

	      icapmanage -r -S mystandby.node.hp.com

       Take control as an active Group Manager:

	      icapmanage -Q

       Show the full status of the ADMIN1 group:

	      icapmanage -s -g ADMIN1 -v

       Seize  core  usage  rights from a partition that is unavailable to make
       them available to other group member activations:

	      icapmanage -x mypar1.node.hp.com

       Restore previously seized usage rights to the partition from the previ‐
       ous example:

	      icapmanage -z mypar1.node.hp.com

       Report  supported  hardware  and grouping rules for a specific grouping
       rules file:

	      icapmanage -R -U /tmp/GiCAP.rules

       Add host mypar3 to existing member IT:

	      icapmanage -u -m IT -h mypar3.node.hp.com

       Add host mypar4 to existing member IT, and remove host mypar3:

	      icapmanage -u -m IT -h mypar4.node.hp.com!mypar3.node.hp.com

       Remove group member IT from its group:

	      icapmanage -r -m IT

       Remove the ADMIN1 group:

	      icapmanage -r -g ADMIN1

AUTHOR
       was developed by HP.

SEE ALSO
       icapmodify(1M),	icapnotify(1M),	 icapstatus(1M),  icapd(1M),  icap(5),
       cimconfig(1M), cron(1M).

								icapmanage(1M)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net