Sun System Handbook - ISO 3.4 June 2011 Internal/Partner Edition | |||
|
|
Solution Type Technical Instruction Sure Solution 1004194.1 : How to gather Information from Sun Blade[TM] 8000/8000P systems.
PreviouslyPublishedAs 205809
Applies to:Sun Blade X8400 Server Module - Version: Not Applicable to Not Applicable - Release: N/A to N/ASun Blade X8450 Server Module - Version: Not Applicable to Not Applicable [Release: N/A to N/A] Sun Blade 8000 P System - Version: Not Applicable to Not Applicable [Release: N/A to N/A] Sun Blade X8420 Server Module - Version: Not Applicable to Not Applicable [Release: N/A to N/A] Sun Blade 8000 System - Version: Not Applicable to Not Applicable [Release: N/A to N/A] All Platforms GoalDescription This document describes techniques for gathering information on components of the Sun Blade [TM] 8000/8000P System. SolutionSteps to follow for gathering data from a Sun Blade[TM] 8000/8000P Modular System. The Sun Blade 8000/8000P system can be split into four areas from where data can be collected:
Chassis LEDs: To obtain a chassis wide list of configuration and sensors, the output of the following commands can be logged with the Unix command "script" of by some other means. This does not display much individual information about the Blades themselves. Perform the following commands from the CMM ILOM instance: ->
show / -l all Note: The status of the various chassis LEDs. This output is extremely long and can take several minutes to display. See How to check Fault/warning LEDs on Blade 8000/8000P Systems (Doc ID 1019531.1)
Chassis Management Module (CMM): To view CMM event log: -> show /CMM/logs/event/list Make sure a key is depressed when prompted to obtain all the log. To get the ILOM version type: -> version For CMMs with ILOM version 2.0.1.5 or later ipmitool commands can used to interrogate the CMM. From any machine that has ipmitool, the following commands should be run: #
ipmitool -I lan -U root -H sel elist Note the above command will prompt for the root password. The following technique can be used to avoid this: #
ipmitool -I lan -H -U root -f CMM_pw sunoem sbled get all How to run the script collectDebugInfo.sh on a CMM: This is normally
requested if there is a problem suspected with the firmware or
functioning of the CMM. If requested to run collectDebugInfo.sh
by Sun Support, follow these steps: http://download.oracle.com/docs/cd/E19045-01/blade.8000mod/820-4198-12/index.html Blade Server Service Processors (SP):
#
ipmitool -I lan -U root -H < SP address> sel elist The same
technique as outlined above of using the -f option can be used to
avoid being prompted for the root password. #
ssh -l root <SP_IP_ADDRESS>
To display the event log: -> show /SP/logs/event/list If single sign on is enabled, the Blade event log can also be displayed from the CMM CLI by the following command. -> show /CH/BLx/SP/logs/event/list Where x is the Blade number. To get ILOM version: -> version The System
Monitoring tab of the Blade SP GUI can also be used to view sensors,
indicators and the event log.There will be
chassis components and events also displayed here such as fans and
power supplies. How to run the script collectDebugInfo.sh on an SP: This is normally
requested if there is a problem suspected with the firmware or
functioning of the SP If requested to run collectDebugInfo.sh
by Oracle Global Support, follow these steps: Blade Server Modules:Methods for gathering data are dependent on which operating system is running.
Run Explorer to obtain Blade O/S information.
Run the Red Hat sysreport utility: /usr/sbin/sysreportThen provide the file created to Oracle Global Support.NOTE: Sysreport does not collect various files in the /var/log directory which may be useful (such as old messages files).Collect the following file:#
cd /var/log
|
There is also a script called Linux Explorer which collects data in a manner similar to the SPARC Explorer. See Sun[TM] Linux: A Data Collector similar to Sun[TM] Explorer This is unofficial and unsupported - but the version at the following location does collect all the files in /var/log: http://www.unix-consultants.com/examples/scripts/linux/linux-explorer/linux-explorer.txt |
This solution has no attachment
Copyright © 2011 Sun Microsystems, Inc. All rights reserved.
Feedback |
|||