![]() | Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition | ||
|
|
![]() |
||||||||||||||||||||||||||||
Solution Type Technical Instruction Sure Solution 1964478.1 : FS System: How to Reset the Primary Administrator, Support or Replication User Password
In this Document
Oracle Confidential PARTNER - Available to partners (SUN). Applies to:Oracle FS1-2 Flash Storage System - Version All Versions to All Versions [Release All Releases]Information in this document applies to any platform. GoalThe goal of this document is to describe the tools and procedures to reset the primary "administrator", primary support "pillar" or replication account on an FS1 system. The document also describes a method to inhibit password expiration. These three utilities may be used if one or more of the account passwords are lost and, in the case of the administrator and pillar accounts, no valid email address is configured for recovery. The utilities may also be used at system installation if the system was not installed within 30 days of being shipped causing the default password duration time (30 days) to expire. SolutionPrerequisites
See Internal NOTES section below for issues and resolution of releases on or below 06.01.10-0354.00. Inhibit Password ExpirationPassword expiration should only be disabled in environments where there is adequate physical protection to restrict access to the management network and customer security policies allow disabling expiration. To inhibit password expiration, set the expiration time to "0" with FSCLI or the GUI. Expired or Forgotten Password
For step-by-step instructions, please review the Reset the Primary System Administrator Password documentation.
Password Reset UtilitiesNOTE: These utilities require a Pilot failover. To avoid a system outage/restart, do not use these utilities unless both Controllers are normal. If a Controller becomes isolated with no connection to a Pilot in a normal status, the system will restart.
Access to the Pilot OS shell on the active Pilot is required. To access the shell, please review Documents 2046703.1 FS System: Passwords Associated with the Oracle FS1-2 Flash Storage System and 2029847.1 FS System: How to Enable SSH Access to the Pilot. All password reset utilities provide instructions and information on the screen. They require acknowledgement of the disclaimer before they will run and ignore password history. Running the appropriate utility will reset the password to the factory default with a 24-hour password expiration. After the utility runs, reboot the active Pilot to make the reset effective and store the new account information credentials in the System Configuration Database known as Persistence. After the reboot completes the password and/or password expiration can then be set to the desired values. The three password reset utilities are located in /usr/share/pillar/bin and can be used instead to reset the password directly from inside the Pilot shell:
NOTES for Releases Below 6.1.10Ref: Bugs 20562026, 20695269, 20786414, 20957451, and 20737952. On releases below 6.1.10, using this script can result in Pilot CUs hanging in Boot State Pilot, or the primary administrator account disappearing from the GUI. This happens because duplicate and/or conflicting records for the "pillar" and/or "administrator" account xml files are created in /var/PillarPilotPersistence/com.pillardata.pmi.message.AccountInfo or in the Persistence VLUN. As the Pilot boots on a system or Pilot restart, it reconciles the Pilot Persistence accounts with those from the Persistence VLUN, and the conflict on the "Account" portion of the reconcile prevents the Pilot from completing its reconciliation necessary to exit Boot State Pilot. The following snippet from the server.log shows the offending item: The true,false status in the checkDomainLoadMatrix for the item indicates it is an item that will prevent exit of Boot State Pilot. INFO 2015-03-13 01:43:12,601 com.pillardata.server.systemstate.SystemStateDomainLoadCompletionObserver.checkDomainLoadMatrix(SystemStateDomainLoadCompletionObserve
[ true,false = Overall status] [ true, true = OracleFsSystem] [ true, true = Pilot] [ true, true = SoftwareConfiguration] [ true,false = Account] If the Password has just expired, and the old password is known, select the reset password on the login screen and use the expired password to log in and change the password. The server.log will show PacMan attempting to read the accounts from the Persistence VLUN (server.log entries of command="NP_MSG_DB_READ(0x170007)")and updating them in Pilot Persistence (server.log entries of command="PM_MSG_ADD_COMMAND(0x1f0005)"). The NP_MSG_DB_READ response from NP will show what is being read from the Persistence VLUN. As PacMan attempts to sync that to Pilot Persistence, the "PM_MSG_ADD_COMMAND(0x1f0005)" will get a result code of result="PMI_EALREADY(0x10013)" indicating that PacMan has already reconciled one account in Pilot Persistence. The names and contact information of the account(s) will be in the extended details of the "PM_MSG_ADD_COMMAND(0x1f0005)" entries. RESOLUTION On Releases Below 6.1.10NOTE: Persistence must be online and writeable as you reboot the active Pilot after running the script. That reboot is what writes the new account information to Persistence and this write is necessary for the utility to work, so be sure to reboot the active pilot. The hanging in Boot State Pilot is caused by defects in the utilities that leave behind records in the Pilot Persistence Cache /var/PillarPilotPersistence/com.pillardata.pmi.message.AccountInfo on the reboot. As the Pilot opens Persistence to pull the records from the Accounts table in the Persistence VLUN, the conflicting records prevent Pilot Persistence and Persistence VLUN reconcile, causing the Boot State Pilot hang. The Persistence VLUN information is always considered the most authoritive information, and must be able to override Pilot Persistence, which it can't. That is why removing the conflicting files from [both] Pilots will recover the issue. Grep the xml files in /var/PillarPilotPersistence/com.pillardata.pmi.message.AccountInfo/ for PRIMARY_ADMINISTRATOR and PILLAR_SUPPORT. There should be ONE file on each pilot for each of those two account roles. If either is missing or there are two files for either role, delete all xml files that contain those values in the role entries. Check both Pilots. Then reboot the Pilot with "reboot". As the Pilot fails over, the new active Pilot will read the Persistence VLUN Accounts table and recreate the accounts in Pilot Persistence. If duplicate or missing files were found on both Pilots due to having tried a Pilot Failover to cure the issue, as soon as one Pilot recovers, issue reboot to force the other Pilot to read the tables and update the account records. If engineering assistance is required, provide logs that include a pilot boot attempt. Also create a tar file containing all of the xml files in /var/PillarPilotPersistence/com.pillardata.pmi.message.AccountInfo/ and a Persistence Accounts Table dump with /usr/share/pillar/bin/NPperf table=32771 which creates the plain text file table8003.dat
Attachments This solution has no attachment |
||||||||||||||||||||||||||||
|