In this area, i will publish the results of some experiences about a few features of Solaris 10. The definitions of each topic are of sun's documents or publications. But the screencasts is of my authorship, and they DO NOT possess relation with Sun Microsystems. They are NOT official screencasts, and could include technical inaccuracies, typographical errors, and even spelling errors.


-[Leal, july 2006]-


Solaris containers include two important technologies: Solaris Zones partitioning technology and resource management tools. Solaris Zones enable an administrator to create separate environments for aplications on a single system, while the resource management framework allows for the allocation, management, and accounting of system resources such as CPU and memory“.
-[Sun BluePrints OnLine – August 2005]-

Solaris Containers – Resource Management and Solaris Zones (Part I). 4.7MB
Solaris Containers – Resource Management and Solaris Zones (Part II). 12.4MB
Solaris Containers – Resource Management and Solaris Zones (Part III). 4.4MB
Solaris Containers – Resource Management and Solaris Zones (Part IV). 7.9MB

Service Management Facility

SMF is a new feature of the Solaris Operating System that creates a supported, unified model for services and service management on each Solaris system. It is a core part of the Predictive Self-Healing technology available in Solaris 10, which provides automatic recovery from software and hardware failures as well as administrative errors“.
-[BigAdmin – System Administration Portal]-


The Zettabyte File System (ZFS) is a revolutionary new filesystem that fundamentally changes the way filesystems are administered, with features and benefits not found in any other filesystem available today. ZFS has been designed from the ground up to be robust, scalable, and simple to administer“.

-[ZFS Administration Guide – 2005]-

Role Based Access Control

In conventional UNIX systems, the root user (also referred to as superuser) is all-powerful, with the ability to read and write to any file, run all programs, and send kill signals to any process. Effectively, anyone who can become superuser can modify a site’s firewall, alter the audit trail, read payroll and other confidential records, and shut down the entire network.
Role-based access control (RBAC) is an alternative to the all-or-nothing superuser model. RBAC uses the security principle of least privilege, which is that no user should be given more privilege than necessary for performing his or her job. RBAC allows an organization to separate superuser’s capabilities and assign them to special user accounts that are called roles. Roles can be assigned to specific individuals, according to their job needs

-[Solaris Administration Guide: Security Services]-


DTrace is a comprehensive dynamic tracing facility that is built into Solaris and can be used by administrators and developers to examine the behavior of both user programs and of the operating system itself. With DTrace you can explore your system to understand how it works, track down performance problems across many layers of software, or locate the cause of aberrant behavior. It is safe to use on production systems and does not require restarting either the system or applications.“.

ERRATA: The timestamps values have been converted to microseconds and not milliseconds

Solaris DTrace – Dynamic tracing (Part I). 5,0MB
Solaris DTrace – Dynamic tracing (Part II). 7,0MB
Solaris DTrace – Dynamic tracing (Part III). 6,5MB
Solaris DTrace – Dynamic tracing (Part IV). 3,5MB