Sun Microsystems, Inc.  Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition
   Home | Current Systems | Former STK Products | EOL Systems | Components | General Info | Search | Feedback

Asset ID: 1-71-2044509.1
Update Date:2017-10-03
Keywords:

Solution Type  Technical Instruction Sure

Solution  2044509.1 :   Collect XSCF diagnostic data on SPARC Enterprise M3000/M4000/M5000/M8000/M9000 (OPL) Servers in Secured or Dark sites  


Related Items
  • Sun SPARC Enterprise M8000 Server
  •  
  • Sun SPARC Enterprise M4000 Server
  •  
  • Sun SPARC Enterprise M3000 Server
  •  
  • Sun SPARC Enterprise M9000-32 Server
  •  
  • Sun SPARC Enterprise M5000 Server
  •  
  • Sun SPARC Enterprise M9000-64 Server
  •  
Related Categories
  • PLA-Support>Sun Systems>SPARC>Enterprise>SN-SPARC: Mx000
  •  
  • _Old GCS Categories>Sun Microsystems>Servers>OPL Servers
  •  




Oracle Confidential PARTNER - Available to partners (SUN).
Reason: not supported functionality

Applies to:

Sun SPARC Enterprise M5000 Server - Version All Versions and later
Sun SPARC Enterprise M8000 Server - Version All Versions and later
Sun SPARC Enterprise M3000 Server - Version All Versions and later
Sun SPARC Enterprise M9000-32 Server - Version All Versions and later
Sun SPARC Enterprise M9000-64 Server - Version All Versions and later
All Platforms

Goal

This document describes how to proceed with XSCF diagnostic data collection at data-centers where XSCF network access or physical XSCF access is not a valid option for data collection, or only provides limited access.
The various ways to gather diagnostic data from either the XSCF or the domain and XSCF combined, using the complete re-written xscfextended module in STB7.3 or newer, is described in detail in "Collect XSCF snapshot(s) by running STB7.3 domain Explorer on SPARC Enterprise M3000/M4000/M5000/M8000/M9000 (OPL) Servers [ID 1533993.1]" .

How to upload the gathered data to Oracle, is described in "How to Upload Files to Oracle Support (Doc ID 1547088.2)" .

 

To discuss this information further with Oracle experts and industry peers, we encourage you to review, join, or start a discussion in the My Oracle Support Community - M Series Servers

Solution

Disclaimer:

  • The use of the DSCP network for XSCF snapshot collection should not be standard practices.
  • Only apply this method if everything else fails and we need the XSCF snapshot data file to troubleshoot the issue.
  • Using the information described under "Domain network access only" and "screen Access Only"  should be seen as  a last resort.

 

Physical access to SPARC Enterprise Mx000 (OPL) eXtended System Control Facility ( XSCF ) available.

Snapshot can store the collected data on a external media device.

Example of collecting a snapshot to an external USB stick: 

XSCF> snapshot -L F -d usb0

 

Bear in mind, that the external media device connected to the XSCF's USB port is expected to have a partition 1, formatted with the FAT32 filesystem. The external USB device can have multiple partitions, as long as partition 1 is FAT32. That partition will then be used by the snapshot command. For more details on the snapshot command please visit the manual page.


 
Domain network access only.

If running the explorer module xscfextended on one of the domains is not an option, the XSCF DSCP network (Domain to Service Processor Communications Protocol) can be used to run the XSCF snapshot command and direct it to store the XSCF snapshot data collection on one of the domains:

  • logon to the XSCF with a user that has appropriate privileges to run the snapshot command (platadm or fieldeng)
  • determine the IP address of the destination domain by checking the output of showdscp
  • run snapshot -L F -t <user>@<domain-ip-address>:<dir> , where user user must have write access to directory dir on the host with IP address domain-ip-address (if dir does not start with a "/"  it is relative to the user's home directory)


In the following example we store the XSCF snapshot data collection on domain 0, as user jack , and store the data in a sub-directory tmp of the user's home directory:

XSCF>
XSCF> showuser
User Name:         platadm
UID:               100
Status:            Enabled
Minimum:           0
Maximum:           99999
Warning:           7
Inactive:          -1
Last Change:       Dec 04, 2008
Password Expires:  Never
Password Inactive: Never
Account Expires:   Never
Privileges:        useradm
                   platadm
                   mode
                   fieldeng
                   auditadm
XSCF> showdscp

DSCP Configuration:

Network: 192.168.132.0
Netmask: 255.255.255.0

 Location     Address
----------   ---------
XSCF         192.168.132.1
Domain #00   192.168.132.2
XSCF> snapshot -l -t jack@192.168.132.2:tmp
Downloading Public Key from '192.168.132.2'...
Public Key Fingerprint: 88.88.88.88.88.88.88.88.88.88.88
Accept this public key (yes/no)? yes
Enter ssh password for user 'jack' on host '192.168.132.2':
Setting up ssh connection to jack@192.168.132.2...
Collecting data into jack@192.168.132.2:tmp/m3000-a-xscf_10.10.10.10_2015-08-15T18-08-44.zip
Data collection complete
XSCF>


On domain 0, directory ${HOME}/jack/tmp should now contain the XSCF snapshot data file m3000-a-xscf_10.10.10.10_2015-08-15T18-08-44.zip . This file can now be attached to the MOS service request.

 

Screen access only.

If only text screen access is available, we do need to collect the output of a number of XSCF commands, that are normally collected by the XSCF command snapshot . Not having the XSCF snapshot data collection file will limit our ability to fully analyze the issue. Please find below the list of commands from which to collect the output:

showdate
version -c cmu -v

version -c xscf -v

version -c xcp
getflashimage -lv

showdscp -v
shownetwork -a
shownetwork -i
showroute -a
showroute -an
showsmtp -v
showssh

showstatus
showhardconf
showdualpowerfeed
showboards -va
showdcl -va
showdomainstatus -a

fmdump -t 2015-05-01 -V
fmdump -t 2015-05-01 -V -e

showlogs -t 2015-05-01,00:00 -v error
showlogs -t 2015-05-01,00:00 -v event
showlogs -t 2015-05-01,00:00 power
showlogs -t 2015-05-01,00:00  env
showlogs monitor

showcod -v
showcodactivation -vr
showcodusage -v -p all

For each affected domain number:
- showlogs -d 0 -t 2015-05-01,00:00 console
- showdevices -v -d 0
- showdomainstatus -d 0

showaudit all
viewaudit -A 20150501
prtfru -x

If your system is a M4000, M5000, M8000 or M9000, please also run:

ioxadm -v list
ioxadm -v lifetime
showdate


Some of the commands listed above, start showing data from 01-MAY-2015 and onwards. You can adjust that setting as fit your needs.  Please collect both the commands and their output, and attach that data as a single text file to the MOS service request.

 

 

References

<NOTE:1533993.1> - Collect XSCF snapshot(s) by running STB7.3 (or newer ) domain Explorer on SPARC Enterprise M3000/M4000/M5000/M8000/M9000 (OPL) Servers
<NOTE:1547088.2> - How to Upload Files to Oracle Support
https://community.oracle.com/community/support/oracle_sun_technologies/sparc_m-series_servers

Attachments
This solution has no attachment
  Copyright © 2018 Oracle, Inc.  All rights reserved.
 Feedback