HP Fabric Clustering System HP-UX Administrator's Guide, March 2008
1. Enter enable command to change to the privileged-execute mode.
HP-IB> enable
HP-IB#
2. Enter the dir command with the appropriate keyword to display the existing files of the
desired type.
Keywords are config, image, syslog. In this case, include the syslog keyword.
HP-IB# dir syslog
============================================================================
Existing Syslog-files on System
============================================================================
slot date-created size file-name
----------------------------------------------------------------------------
1 Tue Jan 21 19:20:09 2003 469593 ts_log
1 Tue Jan 21 11:00:03 2003 74119 ts_log.1.gz
HP-IB#
NOTE: The size of the active log file is checked hourly. When it exceeds 1 MByte, the active
log file, ts_log, is closed, compressed, and renamed ts_log.1.gz. Other ts_log.x.gz
files are incremented by 1. If there is already a ts_log.7.gz file, it is discarded and
ts_log.6.gzbecomes ts_log.7.gz. It is recommended that you back up the log files on
a regular basis.
3. Enter the copy command with the name of the file, FTP user-authentication, and the file
destination, in the following format:
HP-IB# copy ftp://syslog:ts_log anonymous:password 10.3.0.83:ts_log
* operation completed successfully
HP-IB#
The example above copies a file of the type syslog. This command copies the local log file,
ts_log, to the FTP server 10.3.0.83. The file is placed in the top of the user anonymous’
home directory. You may include path information within your user home directory if the FTP
server allows it. Typically, this is not permitted so it is recommended that you upload and
download files using your top-level home directory.
The arguments to the copy command are described in “copy” (page 193).
Administering the System
This chapter provides the following required information to perform Administrative duties on
the system.
• “Switching User Identity”
• “Notifying Users”
• “Creating User Accounts”
• “Using DNS Services”
• “Setting Administrative Roles”
• “Setting the System Clock”
• “Setting the NTP Servers to Maintain the System Clock”
• “Rebooting the System”
Switching User Identity
One of the following scenarios may make it necessary to change your user identity during a CLI
session:
• you created a new user account and you want to verify the access privileges
• you have multiple administrative user-accounts and you want to switch to another
administrative area
98 Administration and Management