![]() | Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition | ||
|
|
![]() |
||||||||||||
Solution Type Technical Instruction Sure Solution 2044509.1 : Collect XSCF diagnostic data on SPARC Enterprise M3000/M4000/M5000/M8000/M9000 (OPL) Servers in Secured or Dark sites
Oracle Confidential PARTNER - Available to partners (SUN). Reason: not supported functionality Applies to:Sun SPARC Enterprise M5000 Server - Version All Versions and laterSun SPARC Enterprise M8000 Server - Version All Versions and later Sun SPARC Enterprise M3000 Server - Version All Versions and later Sun SPARC Enterprise M9000-32 Server - Version All Versions and later Sun SPARC Enterprise M9000-64 Server - Version All Versions and later All Platforms GoalThis document describes how to proceed with XSCF diagnostic data collection at data-centers where XSCF network access or physical XSCF access is not a valid option for data collection, or only provides limited access.
To discuss this information further with Oracle experts and industry peers, we encourage you to review, join, or start a discussion in the My Oracle Support Community - M Series Servers
SolutionDisclaimer:
Physical access to SPARC Enterprise Mx000 (OPL) eXtended System Control Facility ( XSCF ) available. XSCF> snapshot -L F -d usb0
Bear in mind, that the external media device connected to the XSCF's USB port is expected to have a partition 1, formatted with the FAT32 filesystem. The external USB device can have multiple partitions, as long as partition 1 is FAT32. That partition will then be used by the snapshot command. For more details on the snapshot command please visit the manual page.
XSCF>
XSCF> showuser User Name: platadm UID: 100 Status: Enabled Minimum: 0 Maximum: 99999 Warning: 7 Inactive: -1 Last Change: Dec 04, 2008 Password Expires: Never Password Inactive: Never Account Expires: Never Privileges: useradm platadm mode fieldeng auditadm XSCF> showdscp DSCP Configuration: Network: 192.168.132.0 Netmask: 255.255.255.0 Location Address ---------- --------- XSCF 192.168.132.1 Domain #00 192.168.132.2 XSCF> snapshot -l -t jack@192.168.132.2:tmp Downloading Public Key from '192.168.132.2'... Public Key Fingerprint: 88.88.88.88.88.88.88.88.88.88.88 Accept this public key (yes/no)? yes Enter ssh password for user 'jack' on host '192.168.132.2': Setting up ssh connection to jack@192.168.132.2... Collecting data into jack@192.168.132.2:tmp/m3000-a-xscf_10.10.10.10_2015-08-15T18-08-44.zip Data collection complete XSCF>
showdate
version -c cmu -v version -c xscf -v version -c xcp getflashimage -lv showdscp -v shownetwork -a shownetwork -i showroute -a showroute -an showsmtp -v showssh showstatus showhardconf showdualpowerfeed showboards -va showdcl -va showdomainstatus -a fmdump -t 2015-05-01 -V fmdump -t 2015-05-01 -V -e showlogs -t 2015-05-01,00:00 -v error showlogs -t 2015-05-01,00:00 -v event showlogs -t 2015-05-01,00:00 power showlogs -t 2015-05-01,00:00 env showlogs monitor showcod -v showcodactivation -vr showcodusage -v -p all For each affected domain number: - showlogs -d 0 -t 2015-05-01,00:00 console - showdevices -v -d 0 - showdomainstatus -d 0 showaudit all viewaudit -A 20150501 prtfru -x If your system is a M4000, M5000, M8000 or M9000, please also run: ioxadm -v list ioxadm -v lifetime showdate
References<NOTE:1533993.1> - Collect XSCF snapshot(s) by running STB7.3 (or newer ) domain Explorer on SPARC Enterprise M3000/M4000/M5000/M8000/M9000 (OPL) Servers<NOTE:1547088.2> - How to Upload Files to Oracle Support https://community.oracle.com/community/support/oracle_sun_technologies/sparc_m-series_servers Attachments This solution has no attachment |
||||||||||||
|