Tru64 UNIX System Administration 1st Edition Steven Hancock 2024 Scribd Download
Tru64 UNIX System Administration 1st Edition Steven Hancock 2024 Scribd Download
com
https://ebookname.com/product/tru64-unix-system-
administration-1st-edition-steven-hancock/
OR CLICK BUTTON
DOWLOAD NOW
https://ebookname.com/product/unix-system-administration-a-
beginner-s-guide-1st-edition-maxwell/
https://ebookname.com/product/unix-system-administration-a-
beginner-s-guide-1st-edition-steve-maxwell/
https://ebookname.com/product/python-for-unix-and-linux-system-
administration-1st-edition-noah-gift/
https://ebookname.com/product/unix-and-linux-system-
administration-handbook-4th-edition-2010-evi-nemeth/
System Programming with C and Unix 1st Edition Adam
Hoover
https://ebookname.com/product/system-programming-with-c-and-
unix-1st-edition-adam-hoover/
https://ebookname.com/product/essential-system-
administration-3rd-edition-aeleen-frisch/
https://ebookname.com/product/mark-hancock-s-50-tips-for-
teaching-pronunciation-1st-edition-hancock/
https://ebookname.com/product/mastering-unix-shell-scripting-
bash-bourne-and-korn-shell-scripting-for-programmers-system-
administrators-and-unix-gurus-second-edition-randal-k-michael/
https://ebookname.com/product/linux-system-administration-
recipes-a-problem-solution-approach-1st-edition-juliet-kemp/
Tru64 UNIX
System Administration
September 2002
This manual describes the tasks you must perform to maintain the Tru64
UNIX operating system running on a workstation or server. You use
UNIX commands, shell scripts, and the SysMan Menu or SysMan Station
user interfaces to perform the administration tasks described in this
manual.
Hewlett-Packard Company
Palo Alto, California
© 2002 Hewlett-Packard Company
Microsoft®, Windows®, Windows NT® are trademarks of Microsoft Corporation in the U.S. and/or other
countries. UNIX®, Motif®, X/Open®, and The Open Group™ are trademarks of the Open Group in the
U.S. and/or other countries. All other product names mentioned herein may be the trademarks of their
respective companies.
Confidential computer software. Valid license from Compaq Computer Corporation, a wholly owned
subsidiary of Hewlett-Packard Company, required for possession, use, or copying. Consistent with FAR
12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical
Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial
license.
None of Compaq, HP, or any of their subsidiaries shall be liable for technical or editorial errors or omissions
contained herein. The information is provided “as is” without warranty of any kind and is subject to
change without notice. The warranties for HP or Compaq products are set forth in the express limited
warranty statements accompanying such products. Nothing herein should be construed as constituting
an additional warranty.
Contents
Contents iii
2 Starting Up and Shutting Down the System
2.1 Overview of the Shutdown and Boot Operations .. . . .. . .. . .. . .. . 2–1
2.1.1 Shutdown Methods . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–2
2.1.2 Boot Methods . . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–3
2.1.3 Related Documentation .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–4
2.1.3.1 Manuals . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–4
2.1.3.2 Reference Pages .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–5
2.1.3.3 Online Help . . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–5
2.1.4 System Files .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–6
2.1.5 Related Utilities . . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–6
2.2 Understanding the Boot Operation .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–7
2.2.1 Booting Automatically or Manually . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–7
2.2.2 Booting to Single-User or Multiuser Mode .. . .. . . .. . .. . .. . .. . 2–8
2.3 Preparing to Boot the Installed System . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–8
2.3.1 Preparing to Boot a Powered-Down System . .. . . .. . .. . .. . .. . 2–9
2.3.2 Preparing to Boot a Powered-Up, Halted System . . .. . .. . .. . 2–10
2.3.3 Preparing to Transition from Single-User Mode .. . .. . .. . .. . 2–10
2.3.4 Preparing to Boot a Crashed System .. . .. . .. . .. . . .. . .. . .. . .. . 2–11
2.3.5 Preparing to Boot a System Taken Off the Network . .. . .. . 2–12
2.4 Booting the System .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–13
2.4.1 Defining the Console Environment Variables and Using
the Boot Commands .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–14
2.4.2 Overriding the Boot Commands . . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–17
2.4.3 Using Interactive Boot to Verify the Root File System . . .. . 2–17
2.5 Identifying System Run Levels . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–19
2.6 Changing System Run Levels . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–19
2.6.1 Changing Run Levels in Single-User Mode . . .. . . .. . .. . .. . .. . 2–20
2.6.2 Changing Run Levels from Multiuser Mode . .. . . .. . .. . .. . .. . 2–20
2.6.2.1 Changing to a Different Multiuser Run Level . .. . .. . .. . 2–21
2.6.2.2 Changing to Single-User Mode . . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–21
2.6.2.3 Reexamining the inittab File . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–21
2.7 Symmetric Multiprocessing .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–22
2.7.1 Adding CPUs to an Existing System . .. . .. . .. . .. . . .. . .. . .. . .. . 2–22
2.7.2 Unattended Reboots on Multiprocessor Systems . . .. . .. . .. . 2–22
2.8 Setting and Resetting the System Clock . .. . .. . .. . .. . . .. . .. . .. . .. . 2–22
2.9 Troubleshooting Boot Problems . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–23
2.9.1 Hardware Failure .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–23
2.9.2 Software Failure . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–23
2.10 Shutting Down the System . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–24
2.11 Stopping Systems While in Multiuser Mode .. . .. . .. . . .. . .. . .. . .. . 2–25
2.11.1 Using SysMan shutdown . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–25
iv Contents
2.11.2 Shutting Down the System and Warning Other Users . . .. . 2–27
2.11.3 Shutting Down and Halting the System .. . .. . .. . . .. . .. . .. . .. . 2–29
2.11.4 Shutting Down and Automatically Rebooting the System . 2–30
2.11.5 Shutting Down and Halting Systems Immediately .. . .. . .. . 2–31
2.12 Stopping Systems While in Single-User Mode .. . .. . . .. . .. . .. . .. . 2–31
2.12.1 Stopping and Rebooting Systems with the reboot
Command . . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–32
2.12.2 Stopping Systems with the fasthalt Command . .. . .. . .. . .. . 2–32
2.12.3 Stopping Systems with the fastboot Command . .. . .. . .. . .. . 2–33
Contents v
3.6.1.1 Related Documentation . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 3–31
3.6.1.2 Related Utilities .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 3–31
3.6.2 Allocating Swap Space . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 3–32
3.6.3 Estimating Swap Space Requirements . .. . .. . .. . . .. . .. . .. . .. . 3–33
3.6.4 Selecting the Swap Space Allocation Method .. . . .. . .. . .. . .. . 3–34
3.6.5 Correcting an Apparent Lack of Swap Space .. . . .. . .. . .. . .. . 3–35
vi Contents
4.7.1 Configuration Files in /usr/sys/conf . . .. . .. . .. . .. . . .. . .. . .. . .. . 4–31
4.7.1.1 The Target Configuration File .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 4–31
4.7.1.2 The GENERIC Configuration File . . .. . .. . .. . . .. . .. . .. . .. . 4–32
4.7.2 Extensions to the Target Configuration File . .. . . .. . .. . .. . .. . 4–32
4.7.3 The param.c File . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 4–34
4.7.4 System Configuration File Entries . . . .. . .. . .. . .. . . .. . .. . .. . .. . 4–35
5 Administering Disks
5.1 Partitioning Disks Using the Disk Configuration Utility .. . .. . 5–1
5.1.1 Configure Partitions Window . . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 5–3
5.1.2 Partition Table Window .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 5–4
5.2 Manually Partitioning Disks . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 5–4
5.2.1 Utilities . . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 5–4
5.2.2 Using the disklabel Utility . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 5–4
5.2.3 Examining for Overlapping Partitions with the newfs
Command .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 5–7
5.3 Copying Disks . . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 5–8
Contents vii
6.3.3 Using the /etc/fstab File .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–20
6.3.4 Mounting the UFS File System Manually .. . .. . . .. . .. . .. . .. . 6–23
6.3.5 Unmounting the UFS File System Manually .. . . .. . .. . .. . .. . 6–24
6.3.6 Extending the UFS File System . . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–24
6.3.6.1 Extending a Dismounted File System . .. . .. . . .. . .. . .. . .. . 6–26
6.3.6.2 Extending a Mounted File System . . .. . .. . .. . . .. . .. . .. . .. . 6–27
6.4 Administering UFS File Systems Using SysMan Menu . . .. . .. . 6–28
6.4.1 File System Tasks in the SysMan Menu . . .. . .. . . .. . .. . .. . .. . 6–29
6.4.2 Using SysMan to Dismount a File System .. . .. . . .. . .. . .. . .. . 6–31
6.4.3 Using SysMan to Display Mounted File Systems . . .. . .. . .. . 6–31
6.4.4 Using SysMan to Mount File Systems . . .. . .. . .. . . .. . .. . .. . .. . 6–33
6.4.5 Using SysMan to Share a Local Directory .. . .. . . .. . .. . .. . .. . 6–37
6.4.5.1 Sharing a File System .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–38
6.4.5.2 Removing a Shared File System . .. . .. . .. . .. . . .. . .. . .. . .. . 6–39
6.4.6 Using SysMan to Mount a Network File System . . .. . .. . .. . 6–39
6.4.6.1 Mounting a Shared Network File System . . . .. . .. . .. . .. . 6–40
6.4.6.2 Adding a Network Directory . . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–41
6.4.7 Using SysMan to Create a UFS File System .. . . .. . .. . .. . .. . 6–41
6.5 Managing Quotas . . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–42
6.5.1 Hard and Soft Quota Limits . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–43
6.5.2 Activating File System Quotas . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–44
6.5.3 Setting File System Quotas for User Accounts . . .. . .. . .. . .. . 6–45
6.5.4 Verifying File System Quotas . . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–46
6.6 Backing Up and Restoring File Systems . .. . .. . .. . .. . . .. . .. . .. . .. . 6–46
6.7 Monitoring and Tuning File Systems . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–47
6.7.1 Verifying UFS Consistency . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–47
6.7.2 Monitoring File System Use of Disks .. . .. . .. . .. . . .. . .. . .. . .. . 6–48
6.7.2.1 Examinng for Available Free Space .. . .. . .. . . .. . .. . .. . .. . 6–48
6.7.2.2 Verifying Disk Use . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–49
6.7.3 Improving UFS read Efficiency .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–51
6.8 Troubleshooting File Systems . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–51
viii Contents
7.2 Account Administration - Quick Start .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–7
7.2.1 Creating Primary Accounts During System Setup .. . .. . .. . 7–7
7.2.2 Using the Account Manager (dxaccounts) GUI . . .. . .. . .. . .. . 7–8
7.2.3 Using the SysMan Menu Accounts Option .. . .. . . .. . .. . .. . .. . 7–8
7.2.4 Using the Command Line Utilities . . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–9
7.2.5 Advanced Server for UNIX . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–10
7.3 Understanding User Accounts and Groups . .. . .. . .. . . .. . .. . .. . .. . 7–10
7.3.1 System Files .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–11
7.3.2 Understanding Identifiers (UIDs and GIDs) .. . . .. . .. . .. . .. . 7–12
7.3.3 Understanding the Password File .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–13
7.3.4 Understanding the Group File . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–16
7.4 Administering User Accounts . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–17
7.4.1 Using the SysMan Menu Accounts Options . . .. . . .. . .. . .. . .. . 7–17
7.4.1.1 Gathering Account Information . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–18
7.4.1.2 Setting Filter and Display Options . .. . .. . .. . . .. . .. . .. . .. . 7–20
7.4.1.3 Using Filter Options . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–21
7.4.1.4 Creating or Modifying Local Accounts .. . .. . . .. . .. . .. . .. . 7–22
7.4.1.5 Deleting Local Accounts . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–23
7.4.1.6 Creating or Modifying LDAP and NIS Accounts . .. . .. . 7–24
7.4.1.7 Deleting LDAP and NIS Accounts . . .. . .. . .. . . .. . .. . .. . .. . 7–25
7.4.2 Using Account Manager (dxaccounts) . . .. . .. . .. . . .. . .. . .. . .. . 7–25
7.4.2.1 Adding and Modifying Accounts . .. . .. . .. . .. . . .. . .. . .. . .. . 7–26
7.4.2.2 Deleting Accounts . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–27
7.4.2.3 Finding and Selecting Accounts . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–28
7.4.2.4 Copying Accounts . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–28
7.4.2.5 Using the Password Option .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–29
7.4.2.6 Account Manager (dxaccounts) General Options . .. . .. . 7–29
7.5 Administering Groups . . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–30
7.5.1 Using the SysMan Menu Accounts Group Options .. . .. . .. . 7–31
7.5.1.1 Gathering Group Information .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–31
7.5.1.2 Creating or Modifying Groups .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–32
7.5.2 Using Account Manager (dxaccounts) . . .. . .. . .. . . .. . .. . .. . .. . 7–33
7.5.2.1 Adding Groups . . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–33
7.5.2.2 Modifying Groups . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–34
7.5.2.3 Deleting Groups .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–35
7.5.2.4 Finding Groups . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–35
7.6 Administering Windows Domain Accounts and Groups . . .. . .. . 7–35
7.6.1 Administering Synchronized Accounts . .. . .. . .. . . .. . .. . .. . .. . 7–38
7.6.1.1 Using SysMan Menu Accounts and Groups Options .. . 7–38
7.6.1.2 Using Account Manager (dxaccounts) . .. . .. . . .. . .. . .. . .. . 7–39
7.6.1.3 Using Command Line Utilities . . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–40
7.6.1.4 Using the ASU User Manager for Domains . .. . .. . .. . .. . 7–43
Contents ix
7.6.1.5 Using ASU net Commands .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–43
7.6.2 Windows 2000 Single Sign-On . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–44
7.6.2.1 Single Sign-On Installation Requirements . . .. . .. . .. . .. . 7–44
7.6.2.2 Installing the Single Sign-On Software . . .. . . .. . .. . .. . .. . 7–45
7.6.2.3 UNIX Requirements for Creating Single Sign-On
Accounts .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–45
7.6.2.4 Creating Single Sign-On Accounts and Groups . . .. . .. . 7–47
7.6.2.5 Single Sign-On System Files . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–47
x Contents
8.5 Reference Information . . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–31
8.5.1 The /etc/printcap File . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–31
8.5.2 Data in /etc/printcap .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–34
8.5.2.1 Printer Name .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–34
8.5.2.2 Printer Type . . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–35
8.5.2.3 Printer Synonyms . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–35
8.5.2.4 Device Special File . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–36
8.5.2.5 Connection Type .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–37
8.5.2.6 Spooling Directories .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–37
8.5.2.6.1 Spooling Directory Files . . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–38
8.5.2.6.2 Creating a Spooling Directory . . .. . .. . .. . . .. . .. . .. . .. . 8–40
8.5.2.7 Baud Rate . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–40
8.5.3 Line Printer Daemon . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–40
8.5.4 Error Logging . . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–41
8.5.5 Print Filters and Filter Directories . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–42
8.5.6 Flag Bits . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–43
8.5.7 Mode Bits .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–45
8.5.8 Remote Printer Characteristics .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–45
8.6 Print Filters . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–46
8.6.1 The pcfof Print Filter . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–46
8.6.2 The wwpsof Print Filter .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–47
8.6.3 Known Restrictions of Filter Use . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–47
8.7 Testing and Troubleshooting Printers .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–48
Contents xi
9.6.4 Using Backup Scripts . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–15
9.7 Restoring Data . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–16
9.7.1 Restoring a File System .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–16
9.7.2 Restoring Files Manually . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–17
9.7.3 Restoring Files Interactively .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–18
9.7.4 Restoring Files Remotely . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–21
9.7.5 Restoring or Duplicating a System (Root) Disk . .. . .. . .. . .. . 9–21
9.7.5.1 Preparing for Recovery or Duplication .. . .. . . .. . .. . .. . .. . 9–22
9.7.5.2 Determining the Restoration Requirements .. . .. . .. . .. . 9–24
9.7.5.3 Applying the Procedure . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–26
9.7.5.4 Using Alternative root Disk Duplication Methods . . .. . 9–30
9.7.6 Restoring the /usr and /var File System .. . .. . .. . . .. . .. . .. . .. . 9–30
9.8 Using the Command Line Utilities: tar, pax, and cpio . .. . .. . .. . 9–31
9.9 Using dxarchiver .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–33
9.10 Creating a Standalone System Kernel on Tape . . .. . . .. . .. . .. . .. . 9–35
9.10.1 Tape Device Requirements . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–36
9.10.2 Using the btcreate Utility . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–36
9.10.2.1 Gathering Information . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–37
9.10.2.2 Creating the SAS Kernel .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–38
9.10.3 Using the btextract Utility . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–38
9.10.4 Using the SysMan Menu boot_tape Option . . .. . . .. . .. . .. . .. . 9–39
xii Contents
10.4.9 The last Command . . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–20
10.5 Process Accounting .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–21
10.5.1 The accton Command . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–23
10.5.2 The turnacct Shell Script . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–24
10.5.3 The ckpacct Shell Script . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–24
10.5.4 The acctcom Command . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–25
10.5.5 The sa Command . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–26
10.5.6 The acctcms Command . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–28
10.5.7 The acctprc1 Command .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–29
10.5.8 The acctprc2 Command .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–30
10.5.9 The lastcomm Command . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–30
10.6 Disk Usage Accounting . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–31
10.6.1 The dodisk Shell Script . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–31
10.6.2 The diskusg Command . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–32
10.6.3 The acctdusg Command .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–33
10.6.4 The acctdisk Command .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–33
10.7 System Administration Service Accounting .. . .. . .. . . .. . .. . .. . .. . 10–34
10.8 Printer Accounting .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–34
10.9 Creating Daily, Summary, and Monthly Report Files . . .. . .. . .. . 10–35
10.9.1 The runacct Shell Script . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–36
10.9.1.1 Correcting runacct Shell Script Errors . . .. . . .. . .. . .. . .. . 10–37
10.9.1.2 Examples of Errors and Corrective Actions . .. . .. . .. . .. . 10–38
10.9.2 The acctmerg Command . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–39
10.9.3 The prtacct Shell Script .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–40
10.9.4 The prdaily Shell Script .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–41
10.9.5 The monacct Shell Script . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–41
Contents xiii
11.3 Environmental Monitoring and envmond/envconfig .. . .. . .. . .. . 11–14
11.3.1 Loadable Kernel Module . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 11–16
11.3.1.1 Specifying Loadable Kernel Attributes . . .. . . .. . .. . .. . .. . 11–16
11.3.1.2 Obtaining Platform-Specific Functions . . .. . . .. . .. . .. . .. . 11–17
11.3.2 Server System MIB Subagent . . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 11–17
11.3.3 Environmental Monitoring Daemon . .. . .. . .. . .. . . .. . .. . .. . .. . 11–18
11.3.4 Using envconfig to Configure the envmond Daemon . .. . .. . 11–19
11.3.5 User-Definable Messages . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 11–19
11.4 Using System Exercisers . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 11–20
11.4.1 Running System Exercisers . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 11–20
11.4.2 Using Exerciser Diagnostics . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 11–21
11.4.3 Exercising a File System . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 11–22
11.4.4 Exercising System Memory . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 11–22
11.4.5 Exercising Shared Memory . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 11–23
11.4.6 Exercising the Terminal Communication System . . .. . .. . .. . 11–23
xiv Contents
13.1.3.2 Event Manager Application Programming Interface . . 13–8
13.1.3.3 Event Manager System Files . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–8
13.1.4 Related Utilities . . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–11
13.2 Administering Event Manager . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–12
13.2.1 Starting and Stopping Event Manager . .. . .. . .. . . .. . .. . .. . .. . 13–12
13.2.2 Configuring Event Manager . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–13
13.2.2.1 Event Manager Daemon Configuration . . .. . . .. . .. . .. . .. . 13–14
13.2.2.2 Event Manager Channel Configuration . .. . . .. . .. . .. . .. . 13–15
13.2.2.3 Event Manager Logger Configuration .. . .. . . .. . .. . .. . .. . 13–17
13.2.2.4 Secondary Logger Configuration Files .. . .. . . .. . .. . .. . .. . 13–19
13.2.2.5 Changing the Buffer Size to Prevent Missed Events . . 13–20
13.2.3 Security Considerations .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–21
13.2.3.1 User Authentication . . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–21
13.2.3.2 User Authorization . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–21
13.2.3.3 Remote Access with Authentication .. . .. . .. . . .. . .. . .. . .. . 13–23
13.2.4 Managing Log Files . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–26
13.2.5 Event Templates . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–27
13.2.6 Installing New Event Manager Clients . .. . .. . .. . . .. . .. . .. . .. . 13–28
13.2.7 Configuring binlog Event Translation Utilities . .. . .. . .. . .. . 13–29
13.3 Using Event Manager in System Administration . . . .. . .. . .. . .. . 13–32
13.3.1 Displaying Events Using evmshow . . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–32
13.3.2 Introducing Event Filters . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–35
13.3.3 Retrieving Stored Events Using evmget .. . .. . .. . . .. . .. . .. . .. . 13–36
13.3.4 Sorting Events Using evmsort .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–39
13.3.5 Using the -A Option to Simplify the Command String . . .. . 13–40
13.3.6 Monitoring Events Using evmwatch . .. . .. . .. . .. . . .. . .. . .. . .. . 13–40
13.3.7 Posting Quick Message Events Using evmpost . .. . .. . .. . .. . 13–42
13.3.8 Listing Registered Events .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–43
13.3.9 Posting Events from a Shell Script . . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–43
13.3.10 Understanding the Event Manager Mark Event . . .. . .. . .. . 13–47
13.3.11 Viewing Events Using the SysMan Event Viewer . .. . .. . .. . 13–48
13.3.12 Advanced Selection and Filtering Techniques . . . .. . .. . .. . .. . 13–49
13.3.12.1 Filtering By Time . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–49
13.3.12.2 Using the Event-Id to Select Events for Detailed
Display . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–50
13.3.12.3 Searching for Reserved Component Names . .. . .. . .. . .. . 13–51
13.3.12.4 Using Filter Files . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–52
13.3.13 Logging and Forwarding Events . . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–53
13.3.13.1 Logging Events . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–54
13.3.13.2 Using Forwarding to Handle Events Automatically .. . 13–54
13.3.13.3 Logging Events from Remote Systems .. . .. . . .. . .. . .. . .. . 13–55
13.4 Troubleshooting Event Manager .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–57
Contents xv
14 Administering Crash Dumps
14.1 Overview of Crash Dumps . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–1
14.1.1 Related Documentation and Utilities .. . .. . .. . .. . . .. . .. . .. . .. . 14–2
14.1.1.1 Manuals . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–2
14.1.1.2 Reference Pages .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–2
14.1.1.3 SysMan Menu Applications .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–3
14.1.2 Files Used During Crash Dumps . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–3
14.2 Crash Dump Applications . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–4
14.2.1 Using the Configure System Dump Application .. . .. . .. . .. . 14–4
14.2.2 Using the Create Dump Snapshot Application . . .. . .. . .. . .. . 14–7
14.3 Crash Dump Creation .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–8
14.3.1 Setting Dump Kernel Attributes in the Generic
Subsystem . . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–8
14.3.2 Crash Dump File Creation . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–10
14.3.3 Crash Dump Logging . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–12
14.3.4 Swap Space . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–13
14.3.5 Planning Crash Dump Space .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–17
14.3.6 Planning and Allocating File System Space for Crash
Dump Files . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–17
14.4 Choosing the Content and Method of Crash Dumps .. . .. . .. . .. . 14–19
14.4.1 Adjusting the Primary Swap Partition’s Crash Dump
Threshold .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–19
14.4.2 Including User Page Tables in Partial Crash Dumps .. . .. . 14–20
14.4.3 Selecting Partial or Full Crash Dumps . .. . .. . .. . . .. . .. . .. . .. . 14–21
14.4.4 Expected Dump Compression . . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–21
14.4.5 Selecting and Using Noncompressed Crash Dumps . . .. . .. . 14–22
14.4.6 Dumping to Exempt Memory . . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–23
14.4.7 Dumping to a Remote Host . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–24
14.5 Generating a Crash Dump Manually . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–24
14.5.1 Continuable Dumps on a Running System .. . .. . . .. . .. . .. . .. . 14–25
14.5.2 Forcing Crash Dumps on a Hung System . .. . .. . . .. . .. . .. . .. . 14–26
14.6 Storing and Archiving Crash Dump Files .. . .. . .. . .. . . .. . .. . .. . .. . 14–27
14.6.1 Compressing a Crash Dump File . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–27
14.6.2 Uncompressing a Partial Crash Dump File . . .. . . .. . .. . .. . .. . 14–28
A Administration Utilities
A.1 X11 Graphical User Interfaces (CDE Application Manager) .. . A–1
A.2 SysMan Menu Tasks and Associated Utilities .. . .. . . .. . .. . .. . .. . A–6
A.2.1 Accounts . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–7
A.2.2 Hardware .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–7
xvi Contents
A.2.3 Mail .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–8
A.2.4 Monitoring and Tuning . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–8
A.2.5 Networking . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–9
A.2.6 Printing . . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–13
A.2.7 Security . . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–13
A.2.8 Software . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–14
A.2.9 Storage .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–14
A.2.10 Support and Services . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–16
A.2.11 General Tasks . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–16
Index
Examples
2–1 A Typical Shutdown Sequence .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–28
6–1 Default Partitions . . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–5
7–1 Changing the Default Environment Variables Using usermod 7–36
12–1 Sample Translated Event . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 12–3
12–2 Sample syslog_evm.conf File Entries . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 12–9
13–1 Sample Event Manager Daemon Configuration File Entries . . 13–14
13–2 Sample Event Manager Channel Configuration File .. . .. . .. . .. . 13–16
13–3 Sample Event Manager Logger Configuration File Entries . .. . 13–17
13–4 Sample Event Manager Authorization File Entries . .. . .. . .. . .. . 13–22
13–5 A binlogd Event Showing the DECevent Translation . .. . .. . .. . 13–30
13–6 Sample Logger Configuration File Entries for Remote
Logging . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–56
Figures
1–1 System Setup Graphical User Interface . . .. . .. . .. . .. . . .. . .. . .. . .. . 1–7
1–2 Quick Setup . . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 1–8
1–3 Custom Setup . . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 1–9
1–4 CDE Tool Drawer and SysMan Station Icons . .. . .. . . .. . .. . .. . .. . 1–13
1–5 SysMan Applications Panel .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 1–14
1–6 The SysMan Menu . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 1–21
1–7 SysMan Station Main Window . . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 1–27
1–8 AdvFS_Filesystems View . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 1–29
1–9 Hardware View . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 1–30
4–1 Configuration Files Directory Hierarchy . .. . .. . .. . .. . . .. . .. . .. . .. . 4–31
8–1 Printconfig Main Window . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–14
13–1 Event Model . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–4
13–2 Event Manager Component Model . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 13–5
Contents xvii
14–1 Configure System Dump application . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–5
14–2 Create Dump Snapshot application .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 14–7
14–3 Default dump_sp_threshold Attribute Setting .. . .. . . .. . .. . .. . .. . 14–15
14–4 Crash Dump Written to Multiple Devices .. . .. . .. . .. . . .. . .. . .. . .. . 14–16
Tables
2–1 Console Environment Variables . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–14
2–2 Options to the boot_osflags Variable . . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–15
2–3 Parameters of the date command . . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 2–23
3–1 Locale Support Files . . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 3–17
3–2 Locale Environment Variables .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 3–19
6–1 Disk Partition Tables . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 6–19
7–1 Utilities for Administering Accounts and Groups . . . .. . .. . .. . .. . 7–2
7–2 Account Administration Worksheet .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–19
7–3 Account Administration Worksheet with Example Data . .. . .. . 7–20
7–4 Group Administration Worksheet . . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 7–32
8–1 TCP/IP Socket Numbers .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–16
8–2 lprsetup Options .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–22
8–3 lpc Command Arguments . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–28
8–4 Communication Ports and Printer Device Special Files . . .. . .. . 8–36
8–5 Flag Bits .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–44
8–6 Mode Bits . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–45
8–7 Non-PostScript and PostScript Filters . . . .. . .. . .. . .. . . .. . .. . .. . .. . 8–47
9–1 Recovery Preparation .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 9–23
10–1 Accounting Commands and Shell Scripts .. . .. . .. . .. . . .. . .. . .. . .. . 10–3
10–2 Database Files in the /var/adm Directory .. . .. . .. . .. . . .. . .. . .. . .. . 10–5
10–3 Daily Files in the /var/adm/acct/nite Directory .. . .. . . .. . .. . .. . .. . 10–6
10–4 Summary Files in the /var/adm/acct/sum Directory . .. . .. . .. . .. . 10–9
10–5 Monthly Files in the /var/adm/acct/fiscal Directory . .. . .. . .. . .. . 10–9
10–6 The utmp ASCII Conversion Structure Members . . . .. . .. . .. . .. . 10–15
10–7 The tacct File Format .. . .. . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 10–22
11–1 Parameters Defined in the Kernel Module . .. . .. . .. . . .. . .. . .. . .. . 11–16
11–2 get_info() Function Types . . . .. . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . 11–17
11–3 Mapping of Server Subsystem Variables . .. . .. . .. . .. . . .. . .. . .. . .. . 11–18
13–1 Event Manager Command Line Utilities .. . .. . .. . .. . . .. . .. . .. . .. . 13–7
13–2 Event Manager Administrative Utilities . .. . .. . .. . .. . . .. . .. . .. . .. . 13–7
A–1 System Administration Configuration Applications . .. . .. . .. . .. . A–3
A–2 System Administration Daily Admin Applications . . .. . .. . .. . .. . A–4
A–3 System Administration Monitoring and Tuning Applications . A–5
A–4 System Administration Software Management Applications . . A–5
A–5 System Administration Storage Management Applications .. . A–6
A–6 System Administration Tools . .. . .. . .. . .. . . .. . .. . .. . .. . . .. . .. . .. . .. . A–6
xviii Contents
About This Manual
This manual describes the tasks you perform to administer the Tru64 UNIX
operating system running on an AlphaServer.
Audience
This manual is intended only for system administrators. As a system
administrator, you should have knowledge of the UNIX operating system
concepts and commands and the supported hardware and software
configurations. You must be trained in the operational aspects of UNIX
system administration and be familiar with all the procedures necessary to
maintain a UNIX system for high availability. This manual is not intended
to train system administrators or to plan the installation of a UNIX system.
Organization
This manual is organized as follows:
Chapter 1 Describes the methods and tools that you use to perform
system administration tasks.
Chapter 2 Explains how to start up and shut down the operating
system. It also explains how to recover from an unexpected
shutdown.
Chapter 3 Describes how to customize operating system files and
operating system components to tailor the operating
system environment.
Chapter 4 Describes how to configure an operating system kernel
dynamically and statically.
Chapter 5 Discusses system administration tasks related to the
administration of disks, including disk partitioning, disk
copying, and disk monitoring.
Chapter 6 Explains how to administer the UFS file system.
Chapter 7 Explains how to administer accounts for operating system
users and groups of users.
Chapter 8 Explains how to administer the print services system and
configure printers.
Chapter 9 Explains how to administer the archiving services of the
operating system in order to back up and restore mass
storage devices.
Related Documentation
The following documents provide important information that supplements
the information in certain chapters:
• The Installation Guide and Installation Guide — Advanced Topics
describe how to install your operating system. Several important
administrative tasks, such as installing software and installation
cloning, are described in detail in these manuals.
• The Hardware Management manual is the companion manual to this
manual. The Hardware Management manual describes the tasks you
must perform to maintain system hardware that is controlled by the
Tru64 UNIX operating system.
• For important information on storage configurations, including the
configuration and maintenance of storage arrays, see your StorageWorks
documentation. You use StorageWorks software applications, such as
the StorageWorks Command Console (SWCC) in addition to the utilities
provided by the operating system. See Related Documentation for
resources on the Web.
• The Network Administration: Services and Network Administration:
Connections manuals describe how to set up, configure, and troubleshoot
your network.
• The Advanced Server for UNIX (ASU) Concepts and Planning Guide
and Installation and Administration Guide provide information on
administering Windows domain accounts and sharing printers with PC
users. These documents are supplied with the ASU software on the
Associated Products CD-ROM, Volume 2.
• The Security Administration manual provides information on security
that affects account management and file system sharing.
• The AdvFS Administration and Logical Storage Manager manuals
provide information on advanced file systems and storage management.
Conventions
This manual uses the following conventions:
MB1, MB2, MB3 MBN refers to the mouse button that you must press
to select an item or initiate an action.
%
$ A percent sign represents the C shell system prompt.
A dollar sign represents the system prompt for the
Bourne, Korn, and POSIX shells.
...
In syntax definitions, a horizontal ellipsis indicates
that the preceding item can be repeated one or
more times.
The operating system provides a number of methods and utilities you can
use to perform administration tasks from initial configuration (setup) to
ongoing maintenance and customizing your system environment. This
chapter provides:
• An overview of administrative methods and utilities (Section 1.1)
• Pointers to other documentation available for the administrative
utilities, such as online and Web-based help (Section 1.2)
• An explanation of the system setup utilities that are displayed
automatically during the first root login to a system, that is, after a full
installation (Section 1.3)
• An introduction to the different administrative methods and utilities
(Section 1.4)
• A description of the administrative utilities that you launch from the
Common Desktop Environment (CDE) (Section 1.5)
• An introduction to the SysMan Menu (Section 1.6)
• A description of the SysMan Menu command line interface (Section 1.7)
• An introduction to the SysMan Station (Section 1.8)
• A discussion of HP Insight Manager, which you can use to view system
status, and launch the SysMan Menu and the SysMan Station from a
Web browser (Section 1.9)
• Configuration information for the SysMan Menu and SysMan Station
clients so that you can launch them directly from Windows on a PC
(Section 1.10)
• A discussion on setting up a serial line console to access a remote system
using a modem line (Section 1.11)
System Management
A link to file:/user/doc/netscape/SYS-
MAN/index.html, the HP Insight Manager
Web-based Management page. The following
information on administering the operating system
is available from this page:
• Using SysMan Menu and the SysMan Station.
• Using an X-capable user environment such as
CDE.
• Using a personal computer (PC) running
Microsoft Windows. This section provides links
World Wide Web Links to product information on the World Wide Web.
When HP Insight Manager is configured, you also can connect to the Web
agents of any system in the local network domain that is running the HP
Insight Manager agents. For example, to connect to the local host on a UNIX
system, invoke Netscape and specify the following URL in the Location field:
http://<host>:2301
Where <host> is either the fully qualified network name of the system, such
as bender.fut.ram.ma, or the TCP/IP address, such as 111.22.333.11.
The port is always :2301. See Section 1.9 for more information on
configuring HP Insight Manager.
Choose HP Insight Manager Agents and then select Summary? to access the
HP Insight Manager Web-based user guide.
There are restrictions on using HP Insight Manager, depending on your user
environment. See Section 1.9 for information.
You can invoke System Setup at any time to modify the existing system
configuration, simply by typing setup at the command line, or by invoking
the System Setup icon in the CDE Application Manager – System Admin
folder. The following options are provided:
Quick Setup Enables you to complete basic configuration of
system services such as networking, mail, and
printers. This option is useful if you want to get a
system up and running quickly, leaving advanced
configuration options for later. Figure 1–2 shows the
initial quick setup window.
# /usr/sbin/X11/dxarchiver
1. From the CDE Front Panel, select the arrow for the SysMan
Applications panel. You can see this arrow above the icon for the
SysMan Station, shown in Figure 1–4. When you select this arrow, the
panel appears as shown in Figure 1–5.
From this panel you can select one of the following icons, to launch a
utility or open a folder containing more administration utilities:
• Launch the SysMan Station, which is described in Section 1.8. This
icon appears on the front panel of a root login to CDE, as shown
in Figure 1–4.
• Select a folder icon, such as Configuration to open the applications
folders, which contain utilities described in Appendix A.
• Launch the SysMan Menu.
2. From the CDE Front Panel by selecting its tool-drawer icon, shown
in Figure 1–4. When the top-level folder is opened, double click on
the System_Admin group to access System Setup, the Welcome
to SysMan online help volume, and the five utility groups. See
Section 1.5.2 for more information.
This option provides a step-by-step guide (or wizard) that navigates you
through a typical system configuration. Use Quick Setup to perform a basic
configuration, which may be all that is required for some systems. You can
perform any advanced or site-specific configuration tasks at a later time
using the Custom Setup.
The Quick Setup wizard guides you through the following tasks:
• Entering your software licenses (PAKs)
• Configuring the network interface card (NIC)
This option invokes a version of System Setup that contains an icon for
each configuration application. You can select only the options you require
for your site-specific configuration or custom configuration, for example
configuring a system as a server. Not all configuration applications are
available on all systems. The file /etc/checklist.desc contains a list of
configuration applications.
When you select an icon, the appropriate SysMan Menu utility, X11–based
GUI, or character-cell script is invoked. The following list describes the
available utilities:
License Manager
Invokes the License Manager (dxlicenses) , which enables you
to register the Product Authorization Keys (PAKs or licenses) for
the operating system and any layered software applications. Paper
copies of software licenses are provided with the product media. See
dxlicenses(8) and lmf(8), and the Software License Management
manual for more information.
Disk Configuration
Invokes Disk Configuration (diskconfig), which enables you
to configure and administer disk devices on the system. See
diskconfig(8) and disklabel(8), and the Hardware Management
manual for more information.
NIS Configuration
Invokes the nissetup script, which enables you to configure NIS,
the network information service. This is also known as ypsetup.
See nissetup(8) and network_manual_setup(7), and the Network
Administration: Connections manual and the Network Administration:
Services manual for more information.
NFS Configuration
Invokes the SysMan Menu and presents the Network File Systems
(NFS) utilities, which enables you to configure and administer NFS
components on the system. See sysman(8) and nfs_intro(4), and
the Network Administration: Connections manual and the Network
Administration: Services manual for more information.
File Sharing
Invokes the dxfileshare option, which enables you to access
and share file systems. See dxfileshare(8) and the Network
NTP Configuration
Invokes the SysMan Menu Network Time Protocol
Configuration option, which enables you to configure network
time. See sysman(8), ntp(1), and ntp_intro(7), and the Network
Administration: Connections manual and the Network Administration:
Services manual for more information.
PPP Configuration
Invokes the SysMan Menu and presents the Serial Line
Networking options, which enables you to configure options and
secrets files for the point-to-point protocol (PPP). See sysman(8),
ppp_manual_setup(7), and pppd(8), and the Network Administration:
Connections manual and the Network Administration: Services manual
for more information.
SLIP Configuration
See the entry for PPP and startslip(8) for more information.
Account Manager
Invokes the Account Manager (dxaccounts) GUI, which enables
you to create user accounts and manage groups for both UNIX and
Windows NT domain users on client PCs. See dxaccounts(8) and
adduser(8), and Chapter 7 for more information.
Mail Configuration
Invokes the Mail Configuration utility, which enables you to configure
the system to send and receive electronic mail. See sysman(8),
mail_intro(7), and mailconfig(8), and the Network Administration:
Connections manual and the Network Administration: Services manual
for more information.
LAT Configuration
Invokes the latsetup script, which enables you to configure the Local
Area Transport service. See latsetup(8) and lat_intro(7), and
the Network Administration: Connections manual and the Network
Administration: Services manual for more information.
Printer Configuration
Invokes the SysMan Menu Configure line printers option, which
enables you to configure local and remote printers. See sysman(8),
printconfig(8), and lprsetup(8), and Chapter 8 for more
information.
Security Configuration
Invokes the SysMan Menu Security utilities, which enable you
to configure base or enhanced security. See secconfig(8) and the
Security Administration manual for more information.
Audit Configuration
Invokes the SysMan Menu Security utilities, which enable you to
configure the audit subsystem. See auditconfig(8) and the Security
Administration manual for more information.
GUI Selection
Enables you to configure the display manager to CDE or xdm.
ATM
Invokes a script that enables you to configure Asynchronous Transfer
Mode (ATM).
You do not need to use all the options presented on System Setup, and
you can opt to defer any option to a later time. If you choose to defer any
configuration options and exit from System Setup, you need to invoke
System Setup manually from the Application Manager – System Admin
folder, from the SysMan Menu, or from the command line as follows:
# /usr/sbin/sysman
# /usr/sbin/checklist
# /usr/sbin/setup
The SysMan Menu contains a text list of options organized in a hierarchy (or
tree). Each option appears as a branch on the tree, leading to suboptions,
which may be further branches or end in a task. You can collapse or expand
each option if suboptions are available, as indicated by a character preceding
each menu item. The plus sign (+) indicates that further menu items are
available; the minus sign (-) indicates that the branch is fully expanded.
Tasks at the end of a branch are preceded by a vertical bar (|) indicating
that no further expansion of the branch is possible and you only can select a
task to invoke an administrative utility.
Figure 1–6 shows the SysMan Menu invoked in the CDE user environment.
The contents of this menu may be different on your system:
Context-sensitive help also is displayed in the pane located between the two
rows of buttons. This online help describes the content of the window as you
move the mouse pointer or use the Tab key to move to an item. Selecting
a task invokes its associated utility in a format that is most appropriate
for your current user environment, such as the X11–compliant windowing
environment or curses format in a character-cell terminal.
More information is available in sysman(8) and in the online help. See the
tables in Appendix A for information on related utilities.
You must have root privileges to use the sysman -cli options, although
unprivileged users can use it to view system setup data. See dop(8) for
information on using the division of privileges (DoP) utilities to enable
nonroot users to become privileged users of SysMan tasks.
A brief introduction to the many features of the sysman -cli
utility is presented here. See sysman_cli(8) for a complete list
of options and flags. A set of shell script examples is provided in
/usr/examples/systems_management/sysman_cli. Some command
line examples follow.
You can use the sysman -cli command to display all the manageable
components in the Menu. For example, the following command is used to list
the main components in the SysMan Menu hierarchy:
# sysman -cli -list components
Component(s):
account_management
atm
auditconfig
bindconfig
bttape
ciconfig
clsschl
doprc
.
.
.
networkedSystems
.
.
.
The following command displays the groups included in the
networkedSystems component:
# sysman -cli -list group -comp networkedSystems
Component: networkedSystems
Group(s):
hostEquivalencies
hostEquivFileText
hostFileText
hostMappings
joinMappingService
componentid
digitalmanagementmodes
You are prompted to enter key data that enables the utility to identify the
correct entry in the /etc/hosts file. Because the SysMan Menu options
sometimes work on data that is stored in tables, you need to identify the
correct row in the table to delete or modify. Every row has some unique
identifiers, called keys, which you must specify with the sysman -cli
command option. If you do not supply the keys, you are prompted to enter
them. The following command shows how you determine the keys for a
particular table:
# sysman -cli -list keys -group hostMappings -comp /
networkedSystems
Component: networkedSystems
Group: hostMappings Keys: systemName,networkAddress
You also can use sysman -cli commands to add or remove user data
entries from the system data files that are updated by the SysMan Menu.
For example, the following command adds a mail user interactively:
# sysman -cli -add row -comp mailusradm -group mailusers
#:
You also can enter the command as a single line, specifying all attribute
values as follows:
# sysman -cli -add row -comp mailusradm -group mailusers /
-data "{davisB} {1} {2} {0} {0} {pls_chg} {1}"
This section provides a brief introduction to the main features of the SysMan
Station, including customized views. See the online help for SysMan Station
for more information.
To start the SysMan Station fom CDE:
1. Log in as root and select the SysMan Station icon from the CDE Front
Panel or from the SysMan Applications subpanel. (This assumes the
default CDE configuration, where the SysMan Station icon appears on
the Front Panel under the SysMan Applications subpanel.)
2. Choose the SysMan Station icon from the System Management group in
the Application Manager.
After invoking SysMan Station, you are connected to the local host. The
main SysMan Station window appears similar to the example shown
in Figure 1–7, except that the default display shows the Filesystems...,
Network..., Storage, and System... options that can be monitored. These
options are known as attention groups.
We also see the numerous holes left by the iron clamps with which
the edges of the stones were bound together, according to a Roman
fashion which has been in use from the time of Servius Tullius to the
present time. On the north-eastern side the front is perfect, and we
see the ornamental columns and cornices in the two lower storeys,
and in the upper one the corbels for the masts to carry the awning,
with holes in the cornice to let them pass through. One of the arches
of the lower storey has been restored in the time of the Gordians,
a.d. 220-238, and is a good example of the still good construction of
that period, though not so good as that of the time of Titus and
Vespasian[151].
In 1810, when Rome was incorporated in the French Empire, the
Governor, Baron Daru, placed the Colosseum under the direction of
the Roman architect Valadier, to carry on regular excavations, which
were continued for four years, from 1810 to 1814; of these works
the Comte de Tournon[152], then prefect, has written an account.
In 1812, under the French, the ruins of the walls and the surface
of the vaults were weeded of the vegetation which threatened their
ultimate destruction, and the uprooting of the shrubs had become
necessary to save the walls. In sixty years they had again grown up
so vigorously that another weeding was absolutely required, and in
November, 1870, the whole of the ruins of the Colosseum were
cleared of weeds and shrubs, under the direction of Signor Rosa,
who was appointed by the Italian Government to superintend the
works, and to carry on excavations on a large scale, from that
building to the Forum Romanum. There is no doubt that it was quite
time this clearing should take place, as the roots of the plants were
in many parts displacing the stones, and would soon have done
serious mischief. There was a great outcry against this necessary
work by the botanists and the lovers of the picturesque, but
archæologists must approve of it. Many things are now brought into
view more clearly than they were before.
A view of these excavations was taken and engraved in 1813. It
represents clearly the passages round it, and two straight parallel
channels down the middle of it for the naval fights, which were in
reality not a representation of sea-fights but of river-fights. In 1814,
and again in 1867, the subterranean passage leading from the
Amphitheatre on the side next the Cœlian was excavated as a
private speculation in search of treasure, which was not found; but
the passage was left open as we now see it[153].
In 1864-5, considerable excavations were made between the
Colosseum and the Cœlian, in search of treasure supposed to have
been buried there, but only a subterranean passage was found. The
work was interrupted by water gushing out in great abundance,—to
such an extent that the area of the Colosseum was completely
inundated, and the water was obliged to be drawn off by a steam
engine[154]. The passage then discovered is still left open; the upper
part of the vault only is removed, which formed the floor, or rather
supported the floor, of another passage on the present level of the
ground, leading from the podium, or lowest storey, towards the
Cœlian. The point where the water gushed out and stopped the
work was just outside of the site of the outer wall, long since
destroyed on that part of the building. The great excavations of
1874 shewed that this passage turned to the left or south when it
reached the outer wall, and followed the line of it until it joined the
outer end of the long straight passage down the centre of the
building.
The upper wall on the north side, where it remains perfect,
formed the back of the wooden gallery over the corridors for the
common people, and was faced with brick, but the greater part of
the ancient brickwork had fallen down, and has been copied in
modern times; a great deal of the back of the stone wall, left
exposed, shews the hasty construction[155], in the time of
Gordianus.
The remains of Aqueducts and Piscinæ have already been
mentioned[156], but some further account of them seems to be
requisite. A piscina always consists of four vaulted chambers, two
above and two below, and the middle wall of the two lower
chambers has small holes in it, for straining the water as it passes
through. The lower chamber of a piscina is also known by having no
windows in it, and the lining being of the water-cement (opus
signinum). The lower chambers of two piscinæ only remain; of the
northern one the middle wall between the two lower chambers is the
only part now visible, this is faced with opus reticulatum of the time
of Nero, and has the usual small holes for water-pipes through the
wall. The southern one is of brickwork of the third century, of the
time of Alexander Severus; of this there is much more remaining,
one end with the usual boldly projecting buttresses to support the
weight of water, and part of two other chambers of the reservoir.
The excavations which had been made in the time of the first
Napoleon and of Pope Pius VII., 1810-1814, were filled up again
after drawings and plans had been made of them. They were not
considered satisfactory by scholars because the excavations had not
gone deep enough, having been stopped by water, as very often
happens in Rome at certain periods of the year, when the springs are
high. They were again suspended by the same cause in the spring
and summer of 1874, but Signor Rosa, with his usual energy,
obtained machinery and a steam-engine to pump the water out[157].
The whole area was found to be undermined by chambers and
passages, with walls chiefly of brick, but some of tufa, with
indications of several different periods[158].
When the Pontifical Government returned to power in 1815, Pope
Pius VII. ordered the enormous buttress to be built, for supporting
one end of the wall then left broken, and preventing the ruin from
extending further. We have already lost forty-seven out of the eighty
arches, which have been destroyed for using the materials by
previous Popes to build their family palaces, or monasteries and
churches, so that there remain only thirty-three of the external
arches of travertine. The other end of the wall, near the Meta
Sudans, was left in a dangerous state until that was also supported
by the great buttress of Leo XII. In 1828, Gregory XVI. followed the
example of his immediate predecessors, and rebuilt in brick some
arches of what had been the internal corridors, but had become
external, owing to the demolition of the great outer arcades in
earlier ages. In 1852, Pius IX. repaired the principal entrance from
the Esquiline side, and some more of the arches of the inner arcade.
Under the arena was all the machinery usual under the stage of a
large theatre; and much space was required for it. When the boards
had to be cleared off the central part, to leave open the four long
channels of water, which are seen in the view of the Colosseum
taken in 1812[159], and the space between them which was probably
flooded to the depth of a few feet for effect, the boards removed
from the centre must have been piled up at the sides, and on the
large corbels before mentioned[160]. Apollodorus, the architect, in
his celebrated reply to the Emperor Hadrian, told him that he ought
to have prepared a place for the machinery of the great
amphitheatre under the platform, and in such a manner that the
great building should have been visible from the Forum Romanum.
The site intended by him for the temple evidently was the large level
platform on the Summa Sacra Via, on which S. Francesca Romana
now stands; and the place for the machinery intended by him was
obviously that excavated in the spring of 1874, under the south-east
end of the platform immediately opposite to the Colosseum, a very
convenient place for the purpose. There still remains a rude rubble
vault, of the time of the Republic, with a small aqueduct introduced
in the time of the early Empire to carry water to the fountains at
each corner of the Porticus Liviæ, which must have been on this site,
but which did not extend to the end. There is an excellent place for
a temple at the end of the porticus or colonnade; and the platform
could easily have been extended several yards nearer to the
Colosseum: it is evident that this is what Apollodorus said that
Hadrian ought to have done, but that he had not done so.
At the south-east end, under the old entrance, at the present level
of the ground, a long passage has been found, with a series of
square-topped arches, at about fifteen feet below that level. This
has been traced further to the south, beyond the limits of the
building; it must have led from the great foss-way in that direction.
There is a large and deep drain extending from the south end of the
Colosseum, turning at an angle and passing at the foot of the
Claudium to the Meta Sudans, near the arch of Constantine. It was
continued under the present Via di S. Gregorio, and the south-east
end of the Palatine[161].
In one part, near the south end, on the western side of the central
passage at the lowest level, which is twenty-one feet below the
present level of the ground and the top of the walls of the
substructure, the two ancient tufa walls (before mentioned) remain
nearly perfect, with the vertical grooves opposite to each other,
evidently for lifts to slip up and down, and in each instance in the
wall on one side a hollow is cut, for the counter-weight to work up
and down[162]. These lifts are very near together in the outer
passage, in front of the podium, but far below the bottom of it.
Behind each of them is a small square chamber under the passage
in front of it, with a narrow entrance to it, and a small stream of
water running in front for the use of the animals, as these are plainly
the dens for the wild beasts to be placed in temporarily, and there is
just space enough for the animal to pass through into the wooden
cage (pegma[163]), which had two doors, one at the side, the other
at the top. When the cage on the lift was pulled up to the level of
the floor of the stage or arena, under one of the trap-doors, the
upper part was pulled up by a cord from below along with the trap-
door, and the animal thus placed at liberty sprang out on to the
stage. In the original pavement, which remains round a great part in
the passages, behind the place for each of the lifts, is a round hole
for the socket of a pivot to work in, evidently for the windlass for
winding up the cord[164]. It is calculated that there was one of these
lifts in front of each arch, and a den behind each, all round the
enceinte of the building, so that all the wild beasts could spring on
to the stage at once with tremendous effect. The persons in the
lower gallery were protected by strong nets, and by bars that turned
round on pivots, so that the claws of wild beasts had no hold upon
them.
Under the long passage which comes in at the south end is a large
drain at a considerably lower depth; there are gratings in the paved
floor of the passage above opening into it, which had unfortunately
been stopped up in some of the great floods, but was partially
cleared out as far as the Meta Sudans in 1875. The paved floor of
the passage over the drain under the arena is three feet above the
level of the pavement, which is of herring-bone brickwork (opus
spicatum), and the passage before mentioned goes all round the
building nearly under the edge of the podium. Modern iron steps
have been placed for people to descend to the bottom of the
building, and under these is seen the ancient iron grating to prevent
anything being carried off by the rush of water[165]. From this it is
evident that the great drain was to carry off the water used in the
canals for the naumachia, when the Emperor “ordered the water to
be let off and the boards to be replaced.” There are evident marks of
a great flood-gate or sluice drawn up, as a portcullis, at the entrance
to this drain. It also appears that the vessels were floated down on
the wooden framework on which they were dragged along, now
made visible, but it does not appear that they could have been
floated up also to the level of the canals. The space between the
wooden floor of the stage, called the arena, and the original
pavement being twenty-one feet, the canals were ten feet deep, and
yet room is left for the passages and machinery under them.
Possibly, but not probably, the whole central space could be floated,
excepting just at the south end, where room was left for the
machinery. The vessels were probably never removed from the
building, but left under the vaults, and dragged out when required.
The tufa walls with the grooves for lifts belong to the earliest part
of the building, and must be earlier than the time of Nero[166], as
has been shewn; and his stagnum navale, or naumachia, his
venationes, or wild-beast hunts, and gymnasium, which are recorded
as belonging to his great palace, could have been nowhere else but
on this spot.
We now see distinctly the large corbels[167] all round the building
at a certain height, about six feet below the present level of the soil,
for carrying the boards of the great floor covered with sand called
the arena, upon which the athletes wrestled, the wild beasts were
killed, and the persons condemned to death were torn to pieces by
wild beasts; so that the martyrdom of the early Christians who were
condemned to death in this manner took place on the sand of the
arena, and not on the soil of the area. These corbels, in some
instances, at the south end of the building, have the ends of them
built into the old tufa wall, which is cut away to receive them. This
old wall is not so regular in plan as the great work of the Flavian
Emperors, the architect of which probably intended to destroy these
old walls ultimately. Dio Cassius (himself a Roman senator) gives a
vivid description of scenes which took place in this Amphitheatre[168]
in his presence, in the time of Commodus (as has been said), which
leaves no doubt about the matter. Similar scenes are described in
the time of Nero. The whole of the arena was, in fact, supported in
all directions by the walls of the chambers or passages not more
than ten feet apart; one object of which, no doubt, was to carry the
great boarded floor, that could be removed at pleasure by the order
of the emperor, and replaced as readily[169].
The excavations of 1874 and 1875[170] very much astonished the
people in Rome, and more especially the English visitors, who had
been long accustomed to consider the area and the arena to be the
same thing; they were amazed to see the whole of the area
undermined with walls[171]. The walls that were first seen are for
the most part brick walls of the fifth century, and the inscription[172]
found there in 1814 records that they had been repaired by
Lampadius, prefect, a.d. 442. This was after they had been much
damaged by an earthquake. Another inscription records repairs of
the arena and the podium by Basilius, prefect and consul, a.d. 508,
after another earthquake. A long subterranean passage[173] at a
considerable depth, leads out at the south-east end in the direction
of the church of S. Clement; this passage passes under a number of
square-topped arches or doorways, and has rather the appearance
of having been a state entrance at the time that the level of the
street was as low as that passage, that is, before the filling-up of the
foss-ways, which began in the second century. On each side of this
passage is a long narrow vaulted chamber parallel to it, under the
corridor, and in the pavement of each of these chambers is a series
of six round holes lined with hard copper or bronze, for a pivot to
work in; they are somewhat worn, and in a straight line one behind
the other. The most probable use for these was for a windlass or
capstan to be worked in each, and by these means to drag along the
vessels in the canals before mentioned, as extending down the
centre of this colossal building.
It has also been mentioned that a very ancient wooden frame,
calculated for the keel of a vessel to slide upon, remained on the
ground in 1875, just within the passage at the south-east end of the
building, as if the vessels used in the sham fights could be placed
out of sight in the lofty central passage. This is said by those
accustomed to dockyards to have all the appearance of a dry dock,
or a cradle for vessels to stand upon[174]. We read of the vessels
being divided into two nations or sides, there were probably six on
each side, and each nation occupied one of the canals. It is probable
that the surface between the two canals on either side of this central
passage, just under the level of the arena (which was twenty-one
feet above the brick floor), was flooded with two or three feet in
water, but the keels of the vessels were in the canals. On either side
of the passages before mentioned[175] are remains of other walls of
tufa, with vertical grooves in them, as if for lifts; the brick walls,
between those of tufa, have been introduced at a later period, and
in these instances the grooves are not opposite each other. This
shews that great alterations have been going on at different periods
in these subterranean works, some of which are earlier than the
existing building, and others considerably later[176]. In one place,
near the south-east entrance, the two old stone walls, with the
vertical grooves, remain in their original places facing each other, so
that lifts might work up and down in them.
Architects had long wondered where the builders could possibly
have obtained such an immense mass of materials in so short a
time, it was therefore evidently natural that they should make use of
anything that served their purpose. It appears that in some parts the
galleries for the spectators of the old Naumachia were thus made
use of as they stood, without actually rebuilding them. The great
tufa blocks of the second wall of Rome were also used as old
materials for the substructure of the great stone arcades; but the
builders, who had to add the upper gallery, were afraid to trust the
soft tufa to carry so great a weight[177], and therefore built piers of
travertine about four feet wide[178]. These piers to support the
upper gallery go right through the walls of all the lower galleries,
from the top to the bottom of the building (as has been said on p.
12).
The architectural details of the Colosseum are much admired by
architects; the cornice-mouldings of the lower storey are good
examples of the style of the latter part of the first century[179]. The
supply of water for the naval fights must have been from the
Aqueducts; the water was brought from the Cœlian in a shallow
channel, carried upon a lofty double colonnade, or arcade[180]. It
has been mentioned[181] that there are slight remains of three
reservoirs to receive it, which can be traced by remains of the
particular cement used only for the aqueducts[182]. The
continuations of the shallow channel along the corridors can be seen
in many places, and are shewn in the photographs[183].
In the upper storey of the third century, on the exterior, the
corbels for the masts to rest upon, and the holes in the cornice for
them to pass through, have been mentioned[184]. On the interior of
this wall, now that it has been stripped of plaster, and the wooden
gallery that had been built up against it has been destroyed, we see
clearly how hastily it has been built of old materials[185]. In other
parts it has been cased with modern brickwork, but the corbels for
fastening the masts on the inside are preserved[186].
Capua.
The great amphitheatre at Capua is almost of the same size as the
Colosseum in Rome, and a remarkably exact copy of it; some say
that it was called by the same name, but this is rather doubtful, as
persons who have resided at Capua for years say they have never
heard it so called; the name is not of much importance: the plan and
arrangements are identical, and although the superstructure has
been almost entirely destroyed, the substructures at Capua are far
more perfect than in Rome; and here we have the mouth of an
aqueduct perfect in these substructures, and remains of canals for
water, with the very massive walls to support them, exactly as in
Rome. The great drain to carry off the water also remains, but on
rather a different plan; instead of being carried under a low arch at
the end of the great central passage, as in Rome, the water is
conveyed into a large and deep well in the centre of the building,
with four small channels running into it, beside the great central
opening. From this well there is a large and deep drain leading to
the river. There are the same dens for wild beasts under the podium,
and in the pavement the same sockets for pivots to work in, to pull
up the cages, or pegmata, or lifts. The arena, instead of being a
boarded floor, is of brick, carried on vaults, with numerous square
apertures for the trap-doors. The central passage is vaulted at the
two ends, but open in the greater part. Round each of the openings
there is a deep groove, as if a wooden cover had been fitted tightly
over each and made water-tight, so that the surface of the arena
might be flooded for naval fights; but there is reason to believe that
only rowing-boats, drawing little water, were used in this instance,
and not galleys.
The earliest part of the building at Capua is of the time of the
Emperor Hadrian, but only a small part of that period remains, as
shewn by the construction (reticulated work with a framework of
brick). Most of the walls in the substructure are faced with brick of
the second or third century, with later repairs[193].
Puteoli or Pozzuoli.
This amphitheatre is very much smaller than either the Colosseum
in Rome, or the amphitheatre at Capua; the superstructure is in a
very ruinous state, but the substructure is almost perfect, and the
work is much more highly finished than in either of the others. There
are considerable remains of rich stucco ornament on the vault over
the passage to one of the side doors. The arena is nearly intact, and
is of brick, carried on vaults, what the Italians call pensile; this word
does not mean literally hanging, but hollow underneath; and this
brick floor is full of square holes for trap-doors; round the edge of
each is a deep groove, as if for a cover to fit into, which may very
well have been made water-tight. Signor Scherillo, a native of
Pozzuoli, and now a canon of the cathedral at Naples, has published
several papers on this amphitheatre in the Atti dell’ Accademia di
Archeologia, Letteratura e belle Arti di Napoli. He is of opinion that
the arena was flooded to the depth of about three feet, or about half
way up the podium; the water would only cover the two or three
lower steps, and there were probably also water-tight doors at the
foot of them. At a short distance in front of the podium is a channel
about a foot deep, in which probably a beam of wood has lain, and
at intervals of ten or twelve feet is a square hole, evidently for a
beam of wood to have stood in, no doubt the lower part of the
frame for the netting to keep off the wild beasts from the people in
the lower gallery, as in the Colosseum, and probably carried up as
poles or masts to receive the lower ends of the cords to carry the
awning; there are also remains at the top of the outer wall of the
same arrangement of fixing the masts there as in the Colosseum,
and the same thing can be seen in many other amphitheatres where
the outer wall remains perfect. This amphitheatre is entirely of the
time of Hadrian, a beautiful piece of construction. It seems to have
been a favourite show-place of the Emperors on state occasions, for
the upper classes and foreigners, when the fleet was assembled in
the Bay of Naples, in which the Cape of Misenum is one of the
promontories near this spot. The enormous reservoir of water for the
supply of the fleet, called the Piscina Mirabilis, is also not far off; and
the amphitheatre belonged to the great imperial villa, originally of
Nero, in the bay adjoining.
This amphitheatre has been shamefully used in the Middle Ages,
the arena having been made into a cabbage garden, with a deep
bed of earth upon it. The upper parts of the walls had probably been
damaged by the great earthquake, and in order to get rid of the
numerous broken columns and capitals lying about, the gardeners
threw them down the openings into the vaults below, where they
are stacked up under the arches like so many mere blocks of stone,
to put them out of the way. Fortunately it is owing probably to the
vaults having thus been made use of, that they have been so well
preserved, and also because there was not much call for building-
stone in the neighbourhood, as the ruins of the villa and the temples
had supplied as much as was wanted.
Verona.
In many of the Italian cities, as well as in Gaul and Britain, the
amphitheatre was made of earth and wood only, the seats cut out in
banks on the slope of a hill or of an agger, in districts where stone
was scarce. In the Circus Maximus also the seats for the plebs on
the Aventine seem to have been made in that manner, the stone
galleries were on the Palatine only.
At Verona, as in many other instances, the outer wall has been
almost entirely destroyed; two bays, or four arches of it only remain,
but these are sufficient to shew the plan, and that it was three
storeys high, the Tuscan order of columns being used throughout.
The upper storey seems to have been for the passage round the
seats over the corridors; the two lower ones with the seats remain
nearly perfect, forming a fine double arcade on the outer side
without columns, now made visible by the demolition of the outer
corridor and wall. In its present state it is one of the finest buildings
of its class. There seems to be no historical evidence of its date; in
Murray’s Handbook it is said to be of the time of the Flavian
Emperors, but no authority for this is given, and it is not probable.
The measurements given by Maffei do not quite agree with those
taken by Alvino[194], but the variations are not great; and as one is
taken in Neapolitan palms of ten inches, the other in Veronese feet,
the apparent variation probably arose only from the different mode
of calculating. None of them agree with those in Murray’s
Handbooks, which are taken from the Lectures of Mr. Woods. The
general proportions may be judged of by the number of persons that
each would contain; Publius Victor states that the Colosseum had
87,000 places, and Maffei states that this at Verona had 77,000, this
would make it one-eighth less. The variations are not of much
importance. The outer wall was partly destroyed by an earthquake in
1184, and the stones were then used as building material, as in
other places, but this was soon stopped. The unusually perfect state
of the seats arises from the care taken of them in the Middle Ages,
very much to the credit of the inhabitants at that period. As early as
1228, it was agreed that each podesta (or mayor) should expend
500 lire (about £20[195]) on the repairs of this building; and in 1435
penalties were inflicted on any one who removed any of the stone.
This shews that the people of Verona were more civilized than the
Romans at that period. In 1545 a special officer was appointed to
take charge of it. The restoration of the seats has been carefully
done, and is not perceived without some examination. This
restoration was begun by voluntary subscription as early as 1568,
and continued as late as 1805. The arches were numbered on the
exterior, as in the Colosseum; the four that remain have the
numbers LXIIII to LXVII over them. The arrangement of the masts
and poles for the awning are the same as in Rome, and were
managed in the same manner. The plan of the vomitoria is also
nearly the same. No excavations appear to have been made under
the arena; a plan and section of the substructures under the
galleries is given by Maffei, they are similar to those in Rome. He
does not appear to have been aware that there was likely to have
been anything under the arena; he mentions the conduits of
aqueducts, and drains for carrying off the water, which seem to
shew that naumachia were held here, but we have no information as
to how they were managed.
The proportions of the three principal amphitheatres, as given in
the work of Alvino[196], in Neapolitan palms[197] of ten inches are:—
Substructures compared.
In treating of the amphitheatres in general, and corroborating the
account given in this work of the Colosseum, it must be borne in
mind that in every theatre a considerable space is required behind
the scenes for the use of the actors. The performances in an
amphitheatre would equally require such space for the performers
when off the stage, and the only space to which they could possibly
retire is under that stage which is called the arena, because it was
covered with sand; and it has been shewn that in these
substructures there are numerous passages and contrivances for the
machines to send up the wild beasts to be hunted, the men and the
dogs to hunt them, and the athletes for the wrestling matches; we
have also canals for water for the keels of the vessels, in some
instances, but not in all; in some cases, the vessels employed could
only have been rowing-boats, rates. We have also mention of battles
with swords in the naumachia, and of many men being killed. This
seems to make it clear that the principal amusement consisted in the
crew of one vessel trying to board the other, and the defendants
preventing their doing so in every way that they could, either by
throwing them off into the water, or with swords and spears.
At Pozzuoli, where the substructures are nearly perfect, there are
remains of an intermediate passage, as if for men to run along; and
this has been traced to communicate with the Emperor’s seat, and is
thought to have been for messengers to go with orders, and to give
the necessary directions. All that remains of this intermediate
passage are the corbels for carrying a wooden gallery upon. There
are similar corbels for an intermediate passage between two floors in
the Colosseum, but here in the upper part, apparently for the sailors
to run along to furl or unfurl the awning, not in the substructures;
there also appear to have been separate stairs and vomitoria for that
passage, and as we know that several hundred sailors were
employed in the Colosseum, such an arrangement would be quite
necessary.
Mention has frequently been made of the great central passage,
which exists not only in the Colosseum, but in all other
amphitheatres where substructures were made. This passage
appears to have served for several useful purposes; there are traces
of machines in it for lifting up some large object, not only in the
Colosseum but also at Capua; and the things to be lifted up in all
probability must have been the vessels for the naval fights. This
central passage is mentioned or implied in several instances in the
classical authors; it had the appearance of a gulf dividing the earth
or arena into two parts. Apuleius calls it vorago terræ (a gulf of the
earth); Martial, the via media, or middle way; and Petronius, ruina
terræ, from the appearance of a swallowing-up the machines and
the gladiators.
The machines used for these public amusements were evidently
numerous and important, and required a good deal of space to stow
them away, more even than was afforded by the vaults and
passages under the arena in the Colosseum. This is implied by the
celebrated letter of Apollodorus, the architect, to the Emperor
Hadrian, in which the architect told the Emperor that he ought to
have built the Temple of Roma at the south end of the Summa Sacra
Via, and to have made room for this machinery of the amphitheatre
in vaulted chambers under it (as before mentioned); that he did not
do so is evident, for the excavations of 1874 brought to light rude
concrete walls of the time of the Republic, with a small aqueduct of
the time of the Early Empire, made to carry water to the fountains at
the corners of the porticus above. The accounts which we have in
classical authors, of the machinery employed in the amphitheatre,
remind us very much of that used for a Christmas pantomime in one
of the London theatres, and all these great shows were very much of
the character of a pantomime. To begin at the top, the cords which
carried the velarium, or awning, were strong enough for a rope-
dancer, and were called by the name of catadromus; and we have
an account in Suetonius, in the time of Nero, of an elephant being
taught to walk upon these cords with a Roman cavalier on his
back[200]. We also have an account of an actor trying to play the
part of Icarus, and fly down from the top, falling dead at the feet of
Nero, and sprinkling him with his blood[201].
The pegmata have been mentioned as cages for wild beasts, and
this was evidently one meaning of the word, as used by Seneca in
his Epistles, quoted in a previous page, but this was one meaning
only; the same name was applied to a wooden framework of any
kind, sometimes evidently what we now call scenery, either fixed or
moveable. Josephus mentions pegmata used in the triumphal
procession of Titus, one of which was three storeys high, and
another four, on which were representations of the capture of
Jerusalem. Another is mentioned by Calpurnius as representing the
Tarpeian rock[202], and the victims were thrown from the top of it on
to the arena, or into the gulf, and killed on the spot. Apuleius also
describes one as representing Mount Ida, with trees, and shrubs,
and fountains, on which appeared from time to time Paris and
Mercury, and the three goddesses, Juno, Pallas, and Venus, with a
number of animals to complete the scene[203]. Another is described
by Claudian as representing Mount Etna[204], with the flames
burning at the top. Others representing Vulcan and Cyclops; these
were in the shows of Carinus and Numerianus, and are mentioned
by Vopiscus[205]. It is evident that this scenery must have been
prepared below and sent up from the central passage, as there was
no room anywhere else for sending it up. Martial[206] also mentions
pegmata as rising, from this middle way, and that a person could see
from thence the Colossus among the stars. As the Colossus stood on
an elevated platform on the Summa Sacra Via, just in a line with this
middle way, and was itself 120 ft. high, it is quite probable that the
head of it could be seen from below, over the upper gallery.
The dens for the wild beasts in the substructures under the
podium are found both at Capua and at Pozzuoli, just as in the
Colosseum, and the technical name for such a den was
catabolus[207]. Besides the mention by Herodian of a hundred lions
leaping on to the arena at once, as “if out of the earth,” (mentioned
in page 26), the same thing is mentioned by several other authors at
different periods, both of lions and of other wild beasts. Vopiscus
mentions this in the life of Probus[208], and that all the doorways
were stopped for a time; and he distinctly mentions the animals
coming out of the caves below. Ammianus Marcellinus[209] also
mentions the doorways being often stopped for the wild beasts.
Statius mentions the same[210], and Julius Capitolinus, both in the
time of Antoninus Pius and Marcus Aurelius. In each case a hundred
lions are mentioned, and in the latter that they were killed with
arrows; and in the time of Probus, not only a hundred lions, but also
a hundred Lybian leopards, a hundred Syrian ones, a hundred
lionesses, and three hundred bears. Lampridius[211] also mentions in
the time of Gordianus the almost incredible number of a thousand
bears, in addition to a hundred Lybian leopards.
To protect the people in the lower gallery from these wild beasts,
a strong netting was provided (as has been mentioned); this was of
gold wire, fixed in a wooden frame, and at the top was an ivory rod
which turned round, so that if an animal should attempt to cling to
it, he would necessarily fall back. This net was called retia, and at
Puteoli or Pozzuoli it was either of gold, or gilt; and this was the case
in the Colosseum also, and in other instances. Our authority for this
is Calpurnius in his Eclogues[212].
The naval fights with the larger vessels were sometimes held in
the Circus Maximus, which could be flooded to the depth required by
stopping up at the lower end the stream that runs through it, which
is in fact a branch of the small river Almo, but was in this part called
the Euripus. This name was also given to the canals for the
naumachia, as in the Colosseum. This must have been the case,
because the Emperor Heliogabalus upon one occasion filled these
canals with wine, which could not have been done in the Circus
Maximus, where the Euripus was a natural running stream of water;
but in the Colosseum a canal supplied with water from an aqueduct,
which could be let in or drawn off at pleasure, might very well have
been filled with wine during an abundant season, when in Rome the
wine is sometimes worth less than the vessel that holds it, so that
large quantities are frequently wasted for want of casks to put it in.
In all wine-growing countries, the same thing occurs from time to
time in superabundant seasons. It is true that these naval fights
were called Circensian games, because they were sometimes held in
a circus (as has been said), but the same name was given to them
when they were held in the amphitheatre, as in this instance, by
Lampridius[213]. Martial[214] distinguishes very clearly both the one
and the other, and makes it evident that the stagna of Nero were
used for the naumachia of the Cæsars.
That the vaults under the arena were called caveæ, caves (or
cavities), has been already mentioned, and is evident from many
passages in classical and mediæval authors; as in Tertullian and in
Prudentius[215], when describing the scenes that had taken place in
the amphitheatre as the wicked rites in which the gladiators were
killed on the arena, and the impious games in which the sad
spectacles of funereal character were brought up from the caves,
worthy only of the infernal Jupiter (whom the Christians call Satan).
The Arena.
That one of the modes of putting criminals to death in Rome was
to throw them to the wild beasts to be torn to pieces on the arena,
to glut the savage taste of the Roman people, is notorious; but that
many of the gladiators and other actors were also frequently killed
on the arena is not so generally known, and yet the evidence for it is
too distinct to be doubted. Seneca mentions distinctly, in one of his
Epistles[216], that a number of the bodies were exposed to view, of
men who were unable to defend themselves by their swords or their
shields. He justly says that the men were as savage as the lions or
the bears, and the usual end of these fighting men was death on the
arena. There is a representation of them in a fine mosaic picture in
the Villa Borghese, with the letter θ, and others on two of the graffiti
found in the Colosseum in 1875[217].
It is well known that the Roman people sometimes called upon the
emperor to produce the most celebrated gladiators, who had been
named in the programme for the show. Horace[218] alludes to this in
his Epistles; and Martial[219] speaks of two of these gladiators, one
called Myrinus, and the other Triumphus (a name which has misled
some of the commentators). Another gladiator of that period was
named Columbus, and was called for by the people under Claudius,
who promised that he should be exhibited if he could be found, as is
related by Suetonius[220]. Under Gordianus we are told that thirty-
two elephants, and about a thousand gladiators were exhibited; it is
probable that many of these were killed in the fight. It has already
been stated that Commodus fought himself with the gladiators on
the arena.
There was a particular costume for the athletes, and also for the
emperor when he went on to the arena, and Commodus gave
offence by not complying with the custom which had been
established by Titus at the opening, as is mentioned by
Suetonius[221]. The carrying out of the dead bodies from the arena
is also mentioned by Quintilian[222] as done with pomp.
Lampridius[223] expressly says that Commodus acted contrary to the
established custom, and was not dressed in the proper manner; and
that his helmet was carried out of the theatre by the gate by which
the dead bodies were usually carried out, which was considered a
bad omen, and he was murdered soon afterwards. This is also
mentioned by Dio Cassius (as quoted on page 23).
The Gates.
There were naturally four gates to this enormous structure, one at
each end, and one in the middle of each side; and the same
arrangement was followed in all the other amphitheatres. By what
names these gates were called, and whether these names were
special for each particular building, or general for all, is a question
still undecided, and also which was the state entrance. It is
commonly said that in the Colosseum the state entrance was on the
northern side, next the Esquiline Hill, because there is no number
over that arch as there is over the other arches, but this was
probably the case with all the four entrances; the other three gates
are destroyed. The excavations in 1875 have been supposed to shew
that the passage on the southern side towards the Cœlian did not
lead direct to the palace of Commodus, but was carried round the
outer line of the building to the south-east end, near S. Clemente;
the natural entrance from the palace of Nero would be from the gate
at the east end, and not on the north side. The names of the gates
are not easily fixed; one was called Porta Libitinensis, and from this
door the bodies of those who were killed were carried out, as we
learn from Lampridius in the life of Commodus[224]. They were
carried out of this gate on a special bier provided for the purpose,
called sandapila, as is mentioned by Juvenal[225], and explained by
the old Scoliast. This name is sometimes written sanavivaria, as in
the Acta Martyrum Felicita et Perpetua[226]. The word libitina
signifies death, or a funeral, or a bier; it is used also by Horace in his
Odes[227], and explained by the Scoliast in the same manner, and by
Martial in his Epigrams[228]. It appears that the name of sandapilaria
and libitinensis were synonymous. Another gate was called Porta
Prætoria, probably that at the south-east end, opening from the
road to the Vivarium at the Prætorian Camp. Another, Porta Sacra,
probably that at the north-west end, opening to the Via Sacra. The
Meta Sudans was close to this gate, and was supplied with water by
tubes, as Seneca mentions in his Epistles[229]. His fifty-seventh letter
is full of lamentation for the fate of the athletes.
The name of cochlea is given to one of the doors of the
amphitheatre, which led from the cavea to the arena. This name is
used by Varro[230], and has puzzled all the commentators; it need
hardly be said that cochlea is literally “a snail,” and the name has
been supposed to apply to some narrow doorway; but the name is
well known in mediæval Latin as applied to a winding or newel
staircase, popularly called a corkscrew-staircase, and there are two
such staircases leading from the substructures or cavea to the level
of the arena, one on either side, at the south-east end of the great
central passage in the Flavian amphitheatre, to which there can be
no doubt that this name was applied. Trajan’s column is frequently
called columna cochlea, because there is such a staircase inside of it.
The Games in the Arena.
The importance attached to the public amusements, both by the
people and by the emperors, appears extraordinary to modern ideas.
Caligula[231] was present from morning to evening, and had a series
of the various kinds of hunting in different countries exhibited, such
as the hunts of the Africans and of the Trojans; on these occasions,
the arena was strewed with red and green foliage. At this period
Suetonius also mentions that the people assembled at midnight for
the shows of the following day, when they were gratuitous[232]. The
Emperor Claudius himself would go at daybreak to the amphitheatre,
and see the wild beasts fed, and again at mid-day[233]. The same
practice is mentioned by Pliny as used in the time of Nero[234].
Petronius also mentions the custom for two old negroes to sprinkle
the arena with scents from small bottles, which they brought for the
purpose[235]. Tacitus gives an account of the games performed
under his own direction in the time of Claudius[236].
“During the same consulship, in the year of Rome eight
hundred, the secular games were celebrated, after an interval
of sixty-four years since they were last solemnized in the
reign of Augustus.
“Being at that time one of the college of fifteen, and
invested with the office of prætor, it fell to my province to
regulate the ceremonies. Let it not be imagined that this is
said from motives of vanity. The fact is, that in ancient times
the business was conducted under the special directions of
the quindecemviral order, while the chief magistrates
officiated in the several ceremonies. Claudius thought proper
to revive this public spectacle. He attended in the circus, and,
in his presence, the Trojan game was performed by the youth
of noble birth. Britannicus, the emperor’s son, and Lucius
Domitius, who by adoption took the name of Nero, and
afterwards succeeded to the empire, appeared, with the rest
of the band, mounted on superb horses. Nero was received
with acclamations, and that mark of popular favour was
considered as an omen of his future grandeur.”
APPENDIX.
Scaurus.
The meaning of the word Scaurus is “club-footed,” and no doubt
the first member of the family had that peculiar formation of the
foot; but this family was a branch of the great Gens Æmilia, one
member of that family built the Basilica Æmilia in the Forum
Romanum, and another was one of the second Triumvirate. The
Scaurus who built this great amphitheatre was a man of enormous
wealth, and a great builder; he is mentioned by several of his
contemporaries, of whom one was Cicero; he was an ædile, and was
noted for his great liberality in his ædileship. His father was an
orator, and was consul in the year of Rome 688 (b.c. 35); his mother,
when a widow, married Sylla the dictator. Pliny mentions him several
times in his Natural History[237]; he calls his buildings insane works,
on account of the enormous sum expended upon them, which must
have exceeded the equivalent of two millions sterling of our money.
The temporary amphitheatre which he built would hold 80,000
persons, it was three storeys high, and had 360 marble columns in
it; these were on the ground-floor, and it is mentioned that those on
the first floor were of glass[238], a luxury before unheard of (and
apparently not repeated), on the upper storey they were of gilt
wood. Pliny thus describes this building of Scaurus:—