swconfig man page on HP-UX

Man page or keyword search:  
man Server   10987 pages
apropos Keyword Search (all sections)
Output format
HP-UX logo
[printable version]

swconfig(1M)							  swconfig(1M)

NAME
       swconfig - configure, unconfigure, or reconfigure installed software

SYNOPSIS
       catalog]	 session_file]	software_file] jobid] date] session_file] tar‐
	      get_file] option=value] option_file] [software_selections]  tar‐
	      get_selections]

   Remarks
	      ·	 This  command	supports  operation  on	 remote	 systems.  See
		 below.

	      ·	 can perform limited interactive operations.  See below.

	      ·	 For an overview of all SD commands, see the sd(5) man page by
		 typing on the command line.

DESCRIPTION
       The  command  configures, unconfigures, or reconfigures installed soft‐
       ware products for execution on  the  specified  targets.	  The  command
       transitions software between INSTALLED and CONFIGURED states.  Although
       software is automatically configured as part of the command and	uncon‐
       figured as part of the command, lets you configure or unconfigure soft‐
       ware independently when the need arises.

       Configuration primarily involves the execution of vendor-supplied  con‐
       figure scripts.	These scripts perform configuration tasks which enable
       the use of the software on the target hosts.  A vendor can also	supply
       unconfigure  scripts  to "undo" the configuration performed by the con‐
       figure script.

       NOTES:

	      ·	 You should execute when an initial configuration  by  failed,
		 was deferred, or needs to be changed.

	      ·	 With you can defer configuration by using the default option.

	      ·	 does  not perform configuration on multiple versions of soft‐
		 ware.

	      ·	 The command only operates on software installed to  the  pri‐
		 mary root file system.

	      ·	 and  do  not  run  configure  or unconfigure scripts when you
		 specify an alternate root directory with those commands.

       Other features of include:

	      ·	 By default, the command supports only configuration  of  com‐
		 patible software.

	      ·	 If a fileset specifies a prerequisite on other software, that
		 software must be in a "configured" state before the  software
		 specifying the dependency will be configured.

	      ·	 The  command configures multiple versions of a product if you
		 set The vendor must therefore	detect	and  prevent  multiple
		 configured  versions  in  their configure scripts, if that is
		 necessary.

	      ·	 Configure scripts are useful for software updates  and	 rein‐
		 stallation, as well as first-time installation.

   Remote Operation
       You  can	 enable Software Distributor (SD) to manage software on remote
       systems.	 To let the root user  from  a	central	 SD  controller	 (also
       called  the  central  management server or manager node) perform opera‐
       tions on a remote target (also called the host or agent):

       1)  Set up the root, host, and template Access Control Lists (ACLs)  on
	   the	remote machines to permit root access from the controller sys‐
	   tem.	 To do this, run the following command on each remote system:

	   NOTES:

	   ·  controller is the name of the central management server.

	   ·  If remote system is 11.00, make sure SD patch  PHCO_22526	 or  a
	      superseding patch is installed on remote system before running

	   ·  If  remote  system  is older than 11.00 or for some other reason
	      does not have in place, copy script from an 11.11 or higher sys‐
	      tem to the remote system.

       2)  have	 enhanced  GUI	interfaces  for	 remote operations. Enable the
	   enhanced GUIs by creating the file on the controller. Use this com‐
	   mand:

	   See	sd(5),	swinstall(1M),	swcopy(1M),  swjob(1M),	 swlist(1M) or
	   swremove(1M) for more information on interactive operations.

       NOTE: You can also set up remote access by using directly on the remote
       machines	 to grant root or non-root access to users from the controller
       system.

   Interactive Operation
       can perform limited interactive operations when the option  is  set  to
       This  option  executes  an interactive request script.  Request scripts
       can also be executed by and See the default option  for	more  informa‐
       tion.  See also swinstall(1M) and swask(1M).

   Options
       supports the following options:

	      Specifies the pathname of an exported catalog which
			     stores  copies of the response file or files cre‐
			     ated by a request script (if  or  Response	 files
			     are also stored in the

	      Save the current options and operands only to the
			     session_file.   You can enter a relative or abso‐
			     lute path with the file name.  The default direc‐
			     tory for session files is Without this option, by
			     default, the session file is saved	 only  in  the
			     default directory

			     You can recall a session file with the option.

	      Read the list of
			     software_selections from software_file instead of
			     (or in addition to) the command line.

	      Executes the previously scheduled job.  This is the syntax  used
	      by the
			     daemon to start the job.

	      Previews a configuration task by running the session through the
			     analysis phase only.

	      Schedules the job for this date.	You can change the date format
			     by editing the

	      Execute	     based  on	the  options and operands saved from a
			     previous session,	as  defined  in	 session_file.
			     You  can  save session information to a file with
			     the option.

	      Read the list of
			     target_selections from target_file instead of (or
			     in addition to) the command line.

	      Causes	     to	 unconfigure the software instead of configur‐
			     ing it.

	      Turns on verbose output to stdout.
			     (The logfile is not  affected  by	this  option.)
			     Verbose  output  is  enabled  by default; see the
			     option below.

	      Set the session
			     option to value and override  the	default	 value
			     (or a value in an alternate option_file specified
			     with the option).	Multiple options can be speci‐
			     fied.

	      Read the session options and behaviors from
			     option_file.

   Operands
       Most SD commands support two types of operands: followed by These oper‐
       ands are separated by the "at" character.  This syntax implies that the
       command operates on "software selections at targets".

   Software Selections
       The command supports the following syntax for each software_selection:

	      ·	 You  can specify selections with the following shell wildcard
		 and pattern-matching notations:

	      ·	 Bundles and subproducts are recursive.	 Bundles  can  contain
		 other bundles and subproducts can contain other subproducts.

	      ·	 The  software	specification  selects all products.  Use this
		 specification with caution.

       The component has the form:

	      ·	 location applies only to installed  software  and  refers  to
		 software installed to a location other than the default prod‐
		 uct directory.

	      ·	 and apply only to filesets.

	      ·	 and apply only to bundles and products.  They are applied  to
		 the leftmost bundle or product in a software specification.

	      ·	 The <op> (relational operator) component can be of the form:

		     or

		 which	 performs   individual	comparisons  on	 dot-separated
		 fields.

		 For example, chooses all revisions greater than or  equal  to
		 The system compares each dot-separated field to find matches.

	      ·	 The  (equals) relational operator lets you specify selections
		 with the shell wildcard and pattern-matching notations:

		 For example, the expression returns any revision  in  version
		 10 or version 11.

	      ·	 All  version components are repeatable within a single speci‐
		 fication (for example, If multiple components are  used,  the
		 selection must match all components.

	      ·	 Fully qualified software specs include the and version compo‐
		 nents even if they contain empty strings.

	      ·	 No space or tab characters are allowed in a  software	selec‐
		 tion.

	      ·	 The software can take the place of the version component.  It
		 has the form:

		     [instance_id]

		 within the context of an exported catalog, where is an	 inte‐
		 ger  that distinguishes versions of products and bundles with
		 the same tag.

       The software specification selects all products.	  It  is  not  allowed
       when removing software from the root directory

   Target Selections
	supports this syntax for each target_selection.

       A  host	may  be	 specified  by its host name, domain name, or Internet
       address. If host is specified, the directory must be an absolute	 path.
       To specify a relative path when no host is specified, the relative path
       must start with or otherwise, the specified name	 is  considered	 as  a
       host.

   Target Selections with IPv6 Address
       The command also supports specifying the host as an IPv6 address on HP-
       UX Release 11i v3, as shown below:

       If both the hostname and the path are specified, then the first	occur‐
       rence of a slash is treated as the separator.

       The  IPv6 address can optionally be enclosed in a pair of square brack‐
       ets and

EXTERNAL INFLUENCES
   Default Options
       In addition to the standard options, several SD	behaviors  and	policy
       options can be changed by editing the default values found in:

	      the system-wide default values.

	      the user-specific default values.

       Values must be specified in the defaults file using this syntax:

       The  optional  prefix denotes one of the SD commands.  Using the prefix
       limits the change in the default value to that command.	If  you	 leave
       the prefix off, the change applies to all commands.

       You  can also override default values from the command line with the or
       options:

       The following section lists all of the keywords supported by  the  com‐
       mands.  If a default value exists, it is listed after the "=".

       The policy options that apply to are:

	      The  location for SD logfiles and the default par‐
	      ent directory for the
			installed software catalog.  The default
			value is for normal SD operations.  When
			SD operates in nonprivileged mode  (that
			is, when the default option is set to

			·  The default value is forced to

			·  The path element is replaced with the
			   name of the invoking user,  which  SD
			   reads from the system password file.

			·  If  you  set the value of this option
			   to path, SD replaces with the  invok‐
			   ing	user's	home directory (from the
			   system password  file)  and	resolves
			   path relative to that directory.  For
			   example, resolves to the directory in
			   your home directory.

			·  If  you  set the value of the default
			   option to a relative path, that  path
			   is  resolved relative to the value of
			   this option.

			SD's nonprivileged mode is intended only
			for  managing applications that are spe‐
			cially designed and packaged.  This mode
			cannot be used to manage the HP-UX oper‐
			ating system or patches to  it.	  For  a
			full  explanation  of  nonprivileged SD,
			see the available at the web site.

			See also the and options.

	      Causes the  target  agent	 to  automatically  exit
	      after Execute phase, or after
			a failed Analysis phase.  This is forced
			to  when  the  controller  is  using  an
			interactive  UI,  or  when  (preview) is
			used.  This enhances network reliability
			and  performance.   The default is - the
			target	agent  will  automatically  exit
			when  appropriate.  If set to the target
			agent will not exit until the controller
			ends the session.

	      Causes a target agent to exit if it has been inac‐
	      tive for the
			specified time.	 This  can  be	used  to
			make  target  agents more quickly detect
			lost network connections since	RPC  can
			take  as long as 130 minutes to detect a
			lost connection.  The recommended  value
			is  the	 longest  period  of  inactivity
			expected in your environment.  For  com‐
			mand line invocation, a value between 10
			minutes and 60 minutes is  suitable.   A
			value  of  60  minutes or more is recom‐
			mended when the GUI will be  used.   The
			default of 10000 is slightly less than 7
			days.

	      Requires that  the  software  products  which  are
	      being configured be
			"compatible" with the target selections.
			(All of the target selections must match
			the  list  of  supported systems defined
			for each selected product.)  If	 set  to
			target compatibility is not enforced.

	      Prevents the configuration of another, independent
			version	 of  a	product	 when  a version
			already is configured at the target.

			If set to another version of an existing
			product	 can  be  configured  in its new
			location.  Multiple versions can only be
			installed  if  a  product  is locatable.
			Multiple configured  versions  will  not
			work unless the product supports it.

	      When	executes   a   which  asks  for	 a  user
			response.  If the command  first  deter‐
			mines  if a response file already exists
			in the control	directory  and	executes
			the  script only when a response file is
			absent.

			If set to or you can use the  option  to
			specify the pathname of an exported cat‐
			alog to store  copies  of  the	response
			file or files created by the script.

			See  swask(1M)	for  more information on
			scripts.

	      Controls automatic job removal of completed  jobs.
	      If the job is
			automatically  removed,	 job information
			(job  status  or  controller/agent  log‐
			files) cannot be queried with

	      Controls	the automatic selection of prerequisite,
	      corequisite, and
			exrequisite software that is not explic‐
			itly  selected by the user.  This option
			does not apply to The  default	is:  The
			requisite software will be automatically
			selected for configuration.   Specifying
			causes	requisite software, which is not
			explicitly selected, to not be automati‐
			cally selected for configuration.

			The  option  is ignored when this option
			is set to

	      Controls	the  automatic	selection  of  dependent
	      software that is not
			explicitly  selected  by  the  user.   A
			dependent is the opposite  of  a  requi‐
			site.	A  dependent  fileset has estab‐
			lished either a prerequisite or a coreq‐
			uisite	on the selected fileset.  Speci‐
			fying causes dependent	software  to  be
			automatically  selected for unconfigura‐
			tion.	The  default,  causes  dependent
			software,   which   is	 not  explicitly
			selected,  to	not   be   automatically
			selected for unconfiguration.

	      Controls the automatic selection
			of  the	 first left-most dependency in a
			list of OR dependencies that satisfies a
			requisite when another dependency in the
			list that also satisfies  the  requisite
			is explicitly selected by the user.

			When  set  to the first left-most depen‐
			dency in a list of OR dependencies  that
			satisfies  a  requisite is not automati‐
			cally selected when  another  dependency
			in the list that also satisfies the req‐
			uisite is explicitly selected.	 If  set
			to  the	 first left-most dependency in a
			list of OR dependencies that satisfies a
			requisite is automatically selected even
			when another dependency in the list that
			also  satisfies the requisite is explic‐
			itly selected.

			This option is ignored when  the  option
			is set to

	      Determines  whether  SD commands create compressed
	      INDEX and INFO
			catalog files  when  writing  to  target
			depots	or  roots.   The default of does
			not create compressed files.   When  set
			to  SD	creates	 compressed  and  uncom‐
			pressed INDEX and INFO files.  The  com‐
			pressed	 files	are named and and reside
			in the same directories	 as  the  uncom‐
			pressed files.

			Compressed files can enhance performance
			on slower networks,  although  they  may
			increase  disk	space  usage  due  to  a
			larger Installed Products  Database  and
			depot  catalog.	 SD controllers and tar‐
			get agents for HP-UX  11.01  and  higher
			automatically  load the compressed INDEX
			and INFO files	from  the  source  agent
			when:

			·  The	source	agent supports this fea‐
			   ture.

			·  or exist on the source depot.

			·  or are not older than the correspond‐
			   ing uncompressed INDEX or INFO files.

			The  uncompressed  INDEX or INFO file is
			accessed by  the  source  agent	 if  any
			problem occurs when accessing, transfer‐
			ring, or uncompressing the or file.

	      Location of a depot for the controller  to  access
	      to resolve
			selections.  This has no effect on which
			sources the target uses.   Specify  this
			as  host, or Useful for reducing network
			traffic between controller and target.

	      Requires that all dependencies specified by the
			software_selections be resolved	 at  the
			target_selections.

			The  command will not proceed unless the
			dependencies have also been selected  or
			already	 exist at the target in the cor‐
			rect state  (INSTALLED	or  CONFIGURED).
			This  prevents	unusable  software  from
			being configured on the system.

			If set to  dependencies	 will  still  be
			checked,  but not enforced.  Corequisite
			dependencies, if not enforced, may  keep
			the selected software from working prop‐
			erly.	Prerequisite   and   exrequisite
			dependencies, if not enforced, may cause
			the configuration to fail.

	      Controls	the  handling  of  errors  generated  by
	      scripts.	If
			and  the  vendor-supplied script returns
			an error, the configure	 or  unconfigure
			operation   stops.    An  error	 message
			appears	 reporting  that  the  execution
			phase  failed.	 If attempts to continue
			operation.  A  warning	message	 appears
			reporting that the execution succeeded.

	      Controls the behavior of the
			command by checking the available.

			If set to the command proceeds if one or
			more software selections are available.

			If set to the command proceeds	only  if
			all  the  software selections are avail‐
			able.

	      Defines the directory  path  where  the  Installed
	      Products Database (IPD)
			is  stored.   This information describes
			installed  software.   When  set  to  an
			absolute  path,	 this option defines the
			location of the IPD.  When  this  option
			contains  a  relative  path, the SD con‐
			troller appends the value to  the  value
			specified by the option to determine the
			path to the IPD.  For  alternate  roots,
			this  path  is	resolved relative to the
			location of the	 alternate  root.   This
			option does not affect where software is
			installed, only the IPD location.

			This  option  permits  the  simultaneous
			installation  and  removal  of	multiple
			software applications by multiple  users
			or  multiple processes, with each appli‐
			cation or group of applications using  a
			different IPD.

			Caution: use a specific to manage a spe‐
			cific application.  SD does not	 support
			multiple descriptions of the same appli‐
			cation in multiple IPDs.

			See also the and options, which	 control
			SD's  nonprivileged mode.  (This mode is
			intended only for managing  applications
			that  are  specially  designed and pack‐
			aged.  This mode cannot be used to  man‐
			age   the   HP-UX  operating  system  or
			patches to it.	For a  full  explanation
			of  nonprivileged  SD, see the available
			at the web site.)

	      This is an ASCII string giving a title to	 a  job.
	      It is displayed
			along  with  the job ID to provide addi‐
			tional identifying information	about  a
			job when is invoked.

	      Controls the handling of corequisites in determin‐
	      ing the order in
			which filesets are loaded.

			If promotes the corequisite of a prereq‐
			uisite to prerequisite.	 If corequisites
			are not used in determining load order.

	      Adds numeric identification numbers at the  begin‐
	      ning of SD logfile
			messages:
			(default) No identifiers are attached to
			messages.
			Adds identifiers to ERROR messages only.
			Adds identifiers to  ERROR  and	 WARNING
			messages.
			Adds  identifiers to ERROR, WARNING, and
			NOTE messages.
			Adds  identifiers  to  ERROR,	WARNING,
			NOTE, and certain other
			   informational messages.

	      Controls	the amount of detail written to the log‐
	      file.  When set
			to this option adds detailed task infor‐
			mation	 (such	 as  options  specified,
			progress statements, and additional sum‐
			mary  information) to the logfile.  This
			information is in addition to log infor‐
			mation controlled by the option.

			See  below and the sd(5) manual page, by
			typing for more information.

	      This is the default command log file for the
			command.

	      Controls the log level for the  events  logged  to
	      the command logfile, the
			target	agent  logfile,	 and  the source
			agent logfile.	This information  is  in
			addition to the detail controlled by the
			option.	 (See above and the sd(5) manual
			page, by typing , for more information.)
			A value of:

			provides no information to the logfile.
			enables verbose logging to the logfiles.
			enables very verbose logging to the log‐
			files.

	      Controls	the  time in minutes to cache and re-use
	      the results of hostname
			or IP  address	resolution  lookups.   A
			value  of  0  disables	the  facility to
			cache and re-use  lookup  results.   The
			maximum	 value allowed is 10080 minutes,
			which is one week.

			A value of:
			disables the lookup caching mechanism.
			is the maximum value allowed.

	      By default, the
			command attempts to automatically  mount
			all  filesystems  in  the  file	 at  the
			beginning  of  the  analysis  phase,  to
			ensure	that  all listed filesystems are
			mounted before proceeding.  This  policy
			helps  to  ensure  that	 files	are  not
			loaded into  a	directory  that	 may  be
			below a future mount point.

			If  set	 to  the  mount operation is not
			attempted, and no check of  the	 current
			mounts is performed.

	      Prevents	software which is already in the CONFIG‐
	      URED state from being
			reconfigured.	If  set	 to   CONFIGURED
			software can be reconfigured.

	      This  option  controls  the  exit code returned by
	      SD's controller commands.
			This option is	applicable  only  for  a
			single	target	operation,  and	 ignored
			when multiple targets are used.

			When set to the default value of  swcon‐
			fig returns:

			0  If  there  were  no	errors,	 with or
			   without warnings.

			1  If there were errors.

			When set to swconfig returns :

			0  If there  were  no  warnings	 and  no
			   errors.

			1  If there were errors.

			2  If there were warnings but no errors.

	      Defines  the  protocol sequence(s) and endpoint(s)
	      on which the daemon
			listens and on which the other	commands
			use  to contact the daemon.  If the con‐
			nection fails for one protocol sequence,
			the next is attempted.	SD supports both
			the tcp and  udp  protocol  sequence  on
			most platforms.

	      Relative	length	of  the	 communications timeout.
	      This is a value in the range
			from 0 to 9 and is  interpreted	 by  the
			DCE  RPC.   Higher  values  mean  longer
			times; you may need a higher value for a
			slow or busy network.  Lower values will
			give faster recognition on  attempts  to
			contact	 hosts	that  are not up, or are
			not running the Each value  is	approxi‐
			mately	twice  as  long as the preceding
			value.	A value of 5 is about 30 seconds
			for the protocol sequence.

	      This  option  controls  SD's  nonprivileged  mode.
	      This option is ignored
			(treated as true) when the invoking user
			is super-user.

			When  set  to the default value of true,
			SD operations  are  performed  normally,
			with  permissions  for operations either
			granted to a local super-user or set  by
			SD  ACLs.  (See swacl(1M) for details on
			ACLs.)

			When set to false and the invoking  user
			is local and is not super-user, nonpriv‐
			ileged mode is invoked:

			·  Permissions for operations are  based
			   on  the  user's  file  system permis‐
			   sions.

			·  SD ACLs are ignored.

			·  Files created by SD have the uid  and
			   gid	of  the	 invoking  user, and the
			   mode of created files is set	 accord‐
			   ing to the invoking user's umask.

			SD's nonprivileged mode is intended only
			for managing applications that are  spe‐
			cially designed and packaged.  This mode
			cannot be used to manage the HP-UX oper‐
			ating  system  or  patches to it.  For a
			full explanation  of  nonprivileged  SD,
			see the available at the web site.

			See also the and options.

	      If no	target_selections  are specified, select
			the local host as the target of the com‐
			mand.

	      Defines the default
			software_selections.   There  is no sup‐
			plied default.	If there  is  more  than
			one  software  selection,  they	 must be
			separated by spaces.

	      Defines the default
			target_selections.  There is no supplied
			default	 (see  above).	If there is more
			than one target selection, they must  be
			separated by spaces.

	      Controls	the verbosity of the output (stdout).  A
	      value of
			disables output to stdout.   (Error  and
			warning messages
			    are always written to stderr).
			enables verbose messaging to stdout.

	      Prevents	the  configuring  of  files  on a target
	      which exists
			on a remote (NFS) filesystem.  All files
			on a remote filesystem will be skipped.

			If set to and if the superuser has write
			permission on the remote filesystem, the
			remote	files  will  not be skipped, but
			will be configured.

   Session File
       Each invocation of the command  defines	a  configuration
       session.	  The  invocation  options,  source information,
       software selections, and target hosts  are  saved  before
       the  installation  or copy task actually commences.  This
       lets you re-execute the command even if the session  ends
       before proper completion.

       Each session is automatically saved to the file This file
       is overwritten by each invocation of

       You can also save session information to a specific  file
       by executing with the session_file option.

       A  session  file	 uses  the  same  syntax as the defaults
       files.  If you do not specify a	specific  path	for  the
       session file, the default location is

       To re-execute a session file, specify the session file as
       the argument for the session_file option of

       Note that when you re-execute a session file, the  values
       in  the	session	 file take precedence over values in the
       system defaults file.  Likewise, any command line options
       or  parameters  that  you  specify  when	 you invoke take
       precedence over the values in the session file.

   Environment Variables
       The environment variables that affect the command are:

	      Determines the language in which messages are dis‐
	      played.
			   If  is not specified or is set to the
			   empty string, a default value  of  is
			   used.   See lang(5) for more informa‐
			   tion.

			   NOTE: The language in  which	 the  SD
			   agent  and  daemon  log  messages are
			   displayed is set by the  system  con‐
			   figuration variable script, For exam‐
			   ple, must be set to or  to  make  the
			   agent and daemon log messages display
			   in Japanese.

	      Determines the locale to be used to  override  any
	      values for locale
			   categories  specified by the settings
			   of  or  any	 environment   variables
			   beginning with

	      Determines  the  interpretation  of  sequences  of
	      bytes of text data as
			   characters (for example, single  ver‐
			   sus	multibyte  characters  in values
			   for vendor-defined attributes).

	      Determines the language in which	messages  should
	      be written.

	      Determines the format of dates
			   (create_date	 and mod_date) when dis‐
			   played by Used by all utilities  when
			   displaying dates and times in and

	      Determines  the  time zone for use when displaying
	      dates and times.

       Environment variables that affect scripts are:

	      Holds the path to the Installed Products	Database
	      (IPD), relative to
			   the path in the environment variable.
			   Note that you can specify a path  for
			   the IPD using the default option.

	      This variable should be read only by the
			   script.   If this is set to any value
			   it indicates the script  was	 invoked
			   by the command during system startup.
			   This variable is set	 by  the  system
			   startup script.

	      Defines  the current directory of the script being
	      executed, either
			   a temporary catalog directory,  or  a
			   directory  within  in  the  Installed
			   Products Database (IPD).  This  vari‐
			   able	 tells	scripts where other con‐
			   trol scripts	 for  the  software  are
			   located (for example, subscripts).

	      Holds the tag name of the
			   control_file	 being	executed.   When
			   packaging software, you can define  a
			   physical  name and path for a control
			   file	 in  a	depot.	 This  lets  you
			   define  the	control_file with a name
			   other than its tag and lets	you  use
			   multiple  control file definitions to
			   point  to  the  same	 file.	 A  con‐
			   trol_file  can  query the variable to
			   determine which  tag	 is  being  exe‐
			   cuted.

	      Defines  the  location  of  the product, which may
	      have been changed from
			   the default product directory.   When
			   combined with the this variable tells
			   scripts where the product  files  are
			   located.

	      A		   variable  which defines a minimum set
			   of commands available for  use  in  a
			   control script (for example,

	      Defines the root directory in which the session is
	      operating, either
			   "/" or an alternate	root  directory.
			   This	 variable  tells control scripts
			   the root directory in which the prod‐
			   ucts	 are  installed.   A script must
			   use this directory as a prefix to  to
			   locate the product's installed files.
			   The configure script is only run when
			   is

	      Contains	the  pathname  of  a file containing the
	      value of every option
			   for a particular  command,  including
			   software and target selections.  This
			   lets	 scripts  retrieve  any	 command
			   options  and	 values	 other	than the
			   ones	 provided  explicitly  by  other
			   environment	variables.  For example,
			   when the file pointed to by	is  made
			   available  to  a  script, the targets
			   option  contains  a	list  of   soft‐
			   ware_collection_specs for all targets
			   specified for the command.  When  the
			   file	 pointed to by is made available
			   to other scripts, the targets  option
			   contains  the single software_collec‐
			   tion_spec for the  targets  on  which
			   the script is being executed.

	      This  variable  contains the fully qualified soft‐
	      ware specification of
			   the current product or fileset.   The
			   software   specification  allows  the
			   product or  fileset	to  be	uniquely
			   identified.

   Signals
       The  command  catches the signals SIGQUIT and SIGINT, and
       SIGUSR1.	 If these signals are received,	 prints	 a  mes‐
       sage,  sends  a Remote Procedure Call (RPC) to the agents
       to wrap up, and then exits.

       The agent ignores SIGHUP, SIGINT, and SIGQUIT.  It  imme‐
       diately	 exits	 gracefully   after  receiving	SIGTERM,
       SIGUSR1, or SIGUSR2.  Killing the agent may leave corrupt
       software	 on  the system, and thus should only be done if
       absolutely necessary.  Note that when an	 SD  command  is
       killed, the agent does not terminate until completing the
       task in progress.

       The daemon ignores SIGHUP, SIGINT and SIGQUIT.  It  imme‐
       diately	exits  gracefully  after  receiving  SIGTERM and
       SIGUSR2.	 After receiving SIGUSR1, it waits  for	 comple‐
       tion  of	 a  copy  or  remove from a depot session before
       exiting, so that it can register or unregister depots  if
       necessary.   Requests  to  start new sessions are refused
       during this wait.

       Each agent will complete the configuration task	(if  the
       execution  phase has already started) before it wraps up.
       This avoids leaving software in a corrupt state.

RETURN VALUES
       The command returns:

	      The software_selections were successfully	 config‐
		  ured.
	      The configure operation failed on
		  all target_selections.
	      The configure operation failed on
		  some target_selections.

DIAGNOSTICS
       The  command  writes  to	 stdout, stderr, and to specific
       logfiles.

   Standard Output
       The  command  writes  messages  for  significant	 events.
       These include:

	      ·	 a begin and end session message,
	      ·	 selection,  analysis,	and  execution task mes‐
		 sages for each target_selection.

   Standard Error
       The command also writes	messages  for  all  WARNING  and
       ERROR conditions to stderr.

   Logging
       The  command  logs  summary  events at the host where the
       command was invoked.  It logs detailed events to the log‐
       file associated with each target_selection.

       Command Log
	      The command logs all stdout and stderr messages to
	      the the logfile (The user can specify a  different
	      logfile by modifying the option.)

       Target Log
	      A	 process performs the actual configure operation
	      at each target_selection.	 The logs events to  the
	      file You can view the command and target log files
	      with the or command.

   swagentd Disabled
       If the daemon has been disabled on the host,  it	 can  be
       enabled by the host's system administrator by setting the
       entry in to and executing

EXAMPLES
       Configure the C and Pascal products on the local host:

       Configure use any associated response files generated  by
       a request script, and save response files under

       Reconfigure the HP Omniback product:

       Configure  the  version of HP Omniback that was installed
       at

       Unconfigure the software_selections listed in the file on
       the hosts listed in the file

       Configure the C and Pascal products on remote hosts:

LIMITATIONS
       The  SD-UX version of does not support the configuration,
       unconfiguration, or reconfiguration of installed software
       on remote targets.

FILES
       Contains the user-specific default values for some or all
       SD software
	       management command options.

       Contains session files  automatically  saved  by	 the  SD
       software management
	       commands, or explicitly saved by the user.

       Contains the master list of current SD options with their
       default values.

       The directory which contains all configurable
	       and non-configurable data for SD software manage‐
	       ment   commands.	  This	directory  is  also  the
	       default location of logfiles.

       Contains the active system-wide default values  for  some
       or all SD software
	       management command options.

       Contains	 the set of date/time templates used when sched‐
       uling jobs.

       The Installed Products Database (IPD), a catalog	 of  all
       products
	       installed on a system.

AUTHOR
       was developed by the Hewlett-Packard Company.

SEE ALSO
       install-sd(1M),	 swacl(1M),   swagentd(1M),   swask(1M),
       swcopy(1M), swinstall(1M), swjob(1M), swlist(1M),  swmod‐
       ify(1M),	 swpackage(1M),	 swreg(1M), swremove(1M), swver‐
       ify(1M) sd(4), swpackage(4), sd(5).

       available at

       SD customer web site at

								  swconfig(1M)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net