Submit comments about this document at: http://www.sun.com/hwdocs/feedback
Copyright 2004Sun Microsystems,Inc., 4150 NetworkCircle, SantaClara, California 95054,U.S.A. Allrights reserved.
Sun Microsystems,Inc. hasintellectual property rights relating totechnology that is described inthis document. In particular,and without
limitation, theseintellectual propertyrights may includeone ormore ofthe U.S. patentslisted athttp://www.sun.com/patents and oneor
more additionalpatents orpending patent applicationsin the U.S. and inother countries.
This documentand the product to whichit pertains are distributed underlicenses restrictingtheir use, copying, distribution and
decompilation. Nopart of the product orof this document may bereproduced inany form by any meanswithout prior writtenauthorization of
Sun andits licensors, if any.
Third-party software, includingfont technology, iscopyrighted and licensedfrom Sunsuppliers.
Parts ofthe productmay be derivedfrom BerkeleyBSD systems, licensedfrom theUniversity of California. UNIX isa registeredtrademark in
the U.S.and in other countries, exclusivelylicensed through X/Open Company, Ltd.
Sun, SunMicrosystems, theSun logo, Java,JumpStart, Solaris and Sun Fireare trademarksor registeredtrademarks of Sun Microsystems, Inc.
in theUnited States and in othercountries.
All SPARC trademarks are usedunder licenseand are trademarksor registered trademarks of SPARCInternational, Inc.in the U.S.and inother
countries. Productsbearing SPARC trademarksare basedupon an architecture developedby Sun Microsystems, Inc.
Netscape andMozilla aretrademarks or registered trademarksof Netscape CommunicationsCorporation inthe United Statesand other
countries.
The OPENLOOK and Sun™ Graphical UserInterface was developedby SunMicrosystems, Inc. for its usersand licensees. Sunacknowledges
the pioneeringefforts ofXerox in researching and developing the conceptof visual orgraphical userinterfaces for thecomputer industry. Sun
holds anon-exclusive license from Xerox to the XeroxGraphical UserInterface, which licensealso covers Sun’s licensees whoimplement OPEN
LOOK GUIsand otherwise comply with Sun’swritten license agreements.
U.S. GovernmentRights—Commercial use.Government users are subject to the SunMicrosystems, Inc.standard license agreement and
applicable provisionsof theFAR andits supplements.
DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
INCLUDING ANYIMPLIED WARRANTY OF MERCHANTABILITY, FITNESSFOR A PARTICULARPURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Copyright 2004Sun Microsystems,Inc., 4150 NetworkCircle, SantaClara, California 95054,États-Unis. Tous droits réservés.
Sun Microsystems,Inc. ales droitsde propriétéintellectuelle relatants à la technologiequi estdécrite dans cedocument. Enparticulier,et sans la
limitation, cesdroits depropriété intellectuelle peuvent inclure unou plus des brevets américainsénumérés àhttp://www.sun.com/patentset
un oules brevetsplus supplémentaires ou les applicationsde brevet en attente dansles États-Unis et dans lesautres pays.
Ce produitou documentest protégé par un copyrightet distribué avecdes licencesqui en restreignent l’utilisation,la copie, ladistribution etla
décompilation. Aucunepartie de ce produit oudocument ne peut être reproduite sousaucune forme, parquelque moyenque ce soit,sans
l’autorisation préalableet écrite de Sun etde ses bailleursde licence,s’il y ena.
Le logicieldétenu par des tiers, etqui comprend la technologie relativeaux policesde caractères, est protégé parun copyrightet licencié pardes
fournisseurs deSun.
Des partiesde ce produit pourront être dérivées dessystèmes BerkeleyBSD licenciés parl’Université de Californie. UNIX estune marque
déposée auxÉtats-Unis et dans d’autres payset licenciée exclusivement par X/OpenCompany,Ltd.
Sun, SunMicrosystems, lelogo Sun, Java,JumpStart, Solaris et Sun Fire sontdes marquesde fabrique ou des marquesdéposées deSun
Microsystems, Inc.aux États-Uniset dans d’autres pays.
Toutes les marques SPARC sontutilisées sous licenceet sontdes marques defabrique oudes marques déposées de SPARC International, Inc.
aux États-Uniset dans d’autres pays. Lesproduits portantles marques SPARC sont basés surune architecturedéveloppée par Sun
Microsystems, Inc.
Netscape etMozilla sont des marques deNetscape Communications Corporation aux États-Uniset dans d'autres pays.
L’interfaced’utilisation graphique OPEN LOOK etSun a été développée parSun Microsystems,Inc. pour sesutilisateurs et licenciés. Sun
reconnaît lesefforts depionniers de Xerox pour larecherche etle développementdu concept desinterfaces d’utilisation visuelle ou graphique
pour l’industriede l’informatique. Sun détient unelicense non exclusivede Xeroxsur l’interface d’utilisation graphique Xerox,cette licence
couvrant égalementles licenciées de Sun quimettent en place l’interface d’utilisationgraphique OPENLOOK et quien outrese conforment aux
licences écritesde Sun.
LA DOCUMENTATION EST FOURNIE «EN L’ÉTAT» ET TOUTES AUTRES CONDITIONS, DÉCLARATIONS ET GARANTIES EXPRESSES
OU TACITES SONTFORMELLEMENT EXCLUES,DANS LA MESUREAUTORISÉE PARLA LOI APPLICABLE,Y COMPRISNOTAMMENT
TOUTE GARANTIE IMPLICITE RELATIVE À LA QUALITÉ MARCHANDE, À L’APTITUDE À UNE UTILISATION PARTICULIÈRE OU À
L’ABSENCE DE CONTREFAÇON.
Please
Recycle
Contents
Prefacexix
How This Book Is Organizedxix
Related Documentationxx
Accessing Sun Documentationxxi
Third-Party Web Sitesxxi
Contacting Sun Technical Supportxxi
Sun Welcomes Your Commentsxxi
1.Introduction1
Overview1
Acronyms2
Server Management3
Service Processor3
Server-Management Interfaces3
SNMP Integration4
Operator Panel6
User Groups8
Initial Setup of the Service Processor9
Part I: Assigning Network Settings to the SP9
Assigning SP Network Settings Using DHCP9
iii
Assigning Static SP Network Settings11
Part II: Securing the Service Processor13
Creating the Initial Manager Account13
Enabling IPMI Access on the Server14
Enabling IPMI Access on a Linux-Based Server (In-Band)14
Enabling IPMI Access on a Solaris-Based x86 Server (In-Band)16
Enabling IPMI LAN Access17
Enabling IPMI LAN Access on a Linux-Based Server (In-Band)17
Enabling IPMI LAN Access on a Solaris-Based x86 Server (In-Band)18
Alternate Method for Enabling IPMI LAN Access (Out-of-Band)18
Upgrading the Linux Kernel19
Daisy-Chaining the Servers20
Site Integration21
Updating the SP Software21
Updating the Service Processor Base Component23
Autoconfiguring the SP (Optional Method)24
Determining SP and Platform Network MAC Addresses25
2.IPMI Server Management27
Baseboard Management Controller28
Manageability28
IPMI Compliance and LAN Channel Access29
Usernames and Passwords29
Lights Out Management (LOM)30
Description30
Further Information30
Syntax30
Options31
Expressions32
ivSun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
IPMI Linux Kernel Device Driver36
LAN Interface for the BMC36
Files37
Viewing the IPMI System Event Log38
Clearing the IPMI System Event Log38
IPMI Troubleshooting39
3.SNMP Server Management41
Simple Network Management Protocol41
SNMP Integration42
SNMP Management Information Base (MIB)42
Sun Fire V20z and Sun Fire V40z Servers MIB Tree43
Integrating MIBs with Third-Party Consoles43
Configuring SNMP on Your Server44
SNMP Agent on the Service Processor45
Proxy Agent45
Setting the Community Name46
Agent X46
Using a Third-Party MIB Browser47
Setting Logging Options47
SNMP Traps48
Configuring SNMP Trap Destinations49
Configuring SNMP Destinations49
Server MIB Details50
SNMP Troubleshooting53
4.Further Management Information55
Configuring Scripting Capabilities55
Using Shell Scripts56
Contentsv
Remote Scripting Using SSH56
Configuring Multiple Systems for Scripting57
Generating Host Keys57
Creating Trusted Host Relationships58
Adding Public Keys58
Generating a Host Key Pair59
Enabling SSH Access Using Trusted Hosts59
Enabling SSH Access Using Public Keys60
Guidelines for Writing Server Management Command Scripts61
Command Output61
Other Tips For Best Results62
Console Redirection Over Serial on a
Linux-based Server63
grub64
LILO65
getty66
securetty66
Enabling and Configuring BIOS Console Redirection67
Network Share Volume (NSV) CD-ROM68
Network Share Volume Structure68
Serial Over LAN70
Enabling or Disabling the SOL Feature on the Server70
Launching an SOL Session71
Terminating an SOL Session71
A.Server Management Commands Summary73
Using the ssh Protocol74
Interactive Shell on the SP74
Preface Text74
viSun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Commands75
Return Codes76
B.Access Commands79
Access Groups Subcommands80
Access Get Group Subcommand80
Format80
Return Codes80
Access Get Groups Subcommand81
Format81
Return Codes81
Access Map Subcommands82
Access Get Map Subcommand82
Format82
Return Codes83
Access Map Subcommand83
Format83
Return Codes84
Access Unmap Subcommand84
Format84
Return Codes85
Access Directory Services Subcommands86
Access Disable Service Subcommand86
Format86
Return Codes87
Access Enable Service Subcommand87
Format87
Return Codes88
Access Get Services Subcommand89
Contentsvii
Format89
Return Codes90
Access Trust Subcommands91
Access Add Trust Subcommand91
Format91
Generating Host Keys92
Return Codes93
Access Delete Trust Subcommand93
Format93
Return Codes94
Access Get Trusts Subcommand94
Format94
Return Codes95
Access Public Key Subcommands96
Access Add Public Key Subcommand96
Format96
Return Codes97
Access Get Public Key Users Subcommand97
Format97
Return Codes98
Access Delete Public Key Subcommand98
Format98
Return Codes99
Access User Subcommands100
Access Add User Subcommand100
Format100
Return Codes101
Access Delete User Subcommand101
viiiSun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Format101
Return Codes102
Access Get Users Subcommand103
Format103
Return Codes103
Access Update Password Subcommand104
Format104
Return Codes104
Access Update User Subcommand105
Format105
Return Codes106
C.Diagnostics Commands107
Diags Cancel Tests Subcommand108
Format108
Return Codes109
Diags Get State Subcommand110
Format110
Return Codes110
Diags Get Tests Subcommand111
Format111
Return Codes111
Diags Run Tests Subcommand112
Format112
Return Codes113
Diags Start Subcommand114
Format114
Return Codes114
Diags Terminate Subcommand116
Contentsix
Format116
Return Codes116
D.Inventory Commands117
Inventory Compare Versions Subcommand118
Format118
Return Codes119
Inventory Get Hardware Subcommand119
Format119
Return Codes120
Inventory Get Software Subcommand121
Format121
Return Codes121
Inventory Get All Subcommand122
Format122
Return Codes122
E.IPMI Commands123
IPMI Disable Channel Subcommand124
Format124
Return Codes124
IPMI Enable Channel Subcommand125
Format125
Return Codes125
IPMI Get Channels Subcommand126
Format126
Return Codes126
IPMI Disable PEF Subcommand127
Format127
xSun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Return Codes127
IPMI Enable PEF Subcommand128
Format128
Return Codes128
IPMI Get Global Enables Subcommand129
Format129
Return Codes129
IPMI Set Global Enable Subcommand130
Format130
Return Codes131
IPMI Reset Subcommand132
Format132
Return Codes132
F.Platform Commands133
Platform Console Subcommands134
Platform Console Subcommand134
Format134
Return Codes137
Platform Get Console Subcommand138
Format138
Return Codes139
Platform Set Console140
Format140
Return Codes141
Platform OS State Subcommands142
Platform Get OS State Subcommand142
Format142
Return Codes143
Contentsxi
Platform Set OS State Subcommand144
Format144
Return Codes145
Platform Set OS State Boot Subcommand145
Format145
Return Codes146
Platform Power State Subcommands147
Platform Get Power State Subcommand147
Format147
Return Codes148
Platform Set Power State Subcommand148
Format148
Return Codes149
Platform Get Hostname Subcommand150
Format150
Return Codes150
Platform Get Product ID Subcommand151
Format151
Return Codes151
G.Sensor Commands153
Sensor Get Subcommand154
Format154
Return Codes156
Sensor Set Subcommand158
Format158
Return Codes159
H.Service Processor Commands161
xiiSun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
SP Date Subcommands162
SP Get Date Subcommand162
Format162
Return Codes163
SP Set Date Subcommand163
Format163
Return Codes164
SP DNS Subcommands165
SP Disable DNS Subcommand165
Return Codes165
SP Enable DNS Subcommand166
Format166
Return Codes166
SP Get DNS Subcommand167
Format167
Return Codes167
SP Events Subcommands168
SP Delete Event Subcommand168
Format168
Return Codes169
SP Get Events Subcommand169
Format169
Return Codes170
SP Hostname Subcommands171
SP Get Hostname Subcommand171
Format171
Return Codes172
SP Set Hostname Subcommand172
Contentsxiii
Format172
Return Codes173
SP IP Subcommands174
SP Get IP Subcommand174
Format174
Return Codes175
SP Set IP Subcommand175
Format175
Return Codes176
SP JNET Address Subcommands177
SP Get JNET Subcommand177
Format177
Return Codes178
SP Set JNET Subcommand178
Format178
Return Codes179
SP Locate Light Subcommands180
SP Get Locatelight Subcommand180
Format180
Return Codes180
SP Set Locatelight Subcommand181
Format181
Return Codes181
SP Logfile Subcommands182
SP Get Logfile Subcommand182
Format182
Return Codes183
SP Set Logfile Subcommand183
xivSun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Format183
Return Codes184
SP Miscellaneous Subcommands185
SP Create Test Events Subcommand185
Format185
Return Codes186
SP Get Port 80 Subcommand186
Format186
Return Codes187
BIOS POST Codes187
Boot Block Codes for Flash ROM192
SP Load Settings Subcommand193
Format193
Return Codes194
SP Get Status Subcommand194
Format194
Return Codes195
SP Get TDULog Subcommand195
Format195
Return Codes197
SP Reboot Subcommand197
Format197
Return Codes198
SP Reset Subcommand198
Format198
Return Codes200
SP Mount Subcommands201
SP Add Mount Subcommand201
Contentsxv
Format201
Return Codes202
SP Delete Mount203
Format203
Return Codes203
SP Get Mount Subcommand204
Format204
Return Codes204
SP SMTP Subcommands205
SP Get SMTP Server Subcommand205
Format205
Return Codes206
SP Set SMTP Server Subcommand207
Format207
Return Codes207
SP Get SMTP Subscribers Subcommand208
Format208
Return Codes209
SP Update SMTP Subscriber Subcommand209
Format209
Return Codes211
SP SNMP Subcommands212
SP Add SNMP Destination Subcommand212
Format212
Return Codes213
SP Delete SNMP Destination Subcommand214
Format214
Return Codes214
xviSun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
SP Get SNMP Destinations Subcommand215
Format215
Return Codes215
SP Get SNMP Proxy Community Subcommand216
Format216
Return Codes216
SP Set SNMP Proxy Community Subcommand216
Format216
Return Codes217
SP SSL Subcommands218
SP Disable SSL-Required Subcommand218
Format218
Return Codes218
SP Enable SSL-Required Subcommand219
Format219
Return Codes219
SP Get SSL Subcommand220
Format220
Return Codes220
SP Set SSL Subcommand221
Format221
Return Codes221
SP Update Subcommands222
SP Update Flash All Subcommand222
Format222
Return Codes223
SP Update Flash Applications Subcommand224
Format224
Contentsxvii
Return Codes224
SP Update Flash PIC Subcommand225
Format225
Return Codes225
SP Update Diags Subcommand226
Format226
Return Codes226
xviiiSun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Preface
This guide explains how to manage the Sun Fire™ V20z and Sun Fire V40z servers.
How This Book Is Organized
Chapter 1 provides an overview of the ways in which a user can manage the servers.
See “Introduction” on page 1.
Chapter 2 describes how to manage the servers through the Intelligent Platform
Management Interface (IPMI). See “IPMI Server Management” on page 27.
Chapter 3 describes how to manage the servers through the Simple Network
Management Protocol (SNMP). See “SNMP Server Management” on page 41.
Chapter 4 provides further management information, such as how to enable
scripting capability, Console Redirection over Serial on a Linux-based server, and
Serial-over-LAN. See “Further Management Information” on page 55.
Appendix A contains an overview of the server management commands that you
can use to manage the server. Following appendixes describe each command type in
detail. See “Server Management Commands Summary” on page 73.
Appendix B contains detailed descriptions of Access commands. See “Access
Commands” on page 79.
Appendix C contains detailed descriptions of Diagnostics commands. See
“Diagnostics Commands” on page 107.
Appendix D contains detailed descriptions of Inventory commands. See “Inventory
Commands” on page 117.
xix
Appendix E contains detailed descriptions of IPMI commands. See “IPMI
Commands” on page 123.
Appendix F contains detailed descriptions of Platform commands. See “Platform
Commands” on page 133.
Appendix G contains detailed descriptions of Sensor commands. See “Sensor
Commands” on page 153.
Appendix H contains detailed descriptions of service processor (sp) commands. See
“Service Processor Commands” on page 161.
Related Documentation
ApplicationTitlePart Number
Safety notices and
international
compliance
certification statements
Safety informationImportant Safety Information for Sun Hardware
Hardware installation
and initial
configuration
Operating system
installation
Service and
Diagnostics
Release notes and
updated information
Sun Fire V20z and Sun Fire V40z Servers Safety
and Compliance Guide
Systems
Sun Fire V20z and Sun Fire V40z Servers
Installation Guide
Sun Fire V20z and Sun Fire V40z Servers Linux
Operating-System Installation Guide
Sun Fire V20z and Sun Fire V40z Servers User
Guide
Sun Fire V20z and Sun Fire V40z Servers Release
Notes
817-5251-xx
816-7190-xx
817-5246-xx
817-5250-xx
817-5248-xx
817-5252-xx
xx Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Accessing Sun Documentation
You can view, print, or purchase a broad selection of Sun documentation, including
localized versions, at:
http://www.sun.com/documentation
Third-Party Web Sites
Sun is not responsible for the availability of third-party web sites mentioned in this
document. Sun does not endorse and is not responsible or liable for any content,
advertising, products or other materials that are available on or through such sites or
resources. Sun will not be responsible or liable for any actual or alleged damage or
loss caused by or in connection with the use of or reliance on any such content,
goods or services that are available on or through such sites or resources.
Contacting Sun Technical Support
If you have technical questions about this product that are not answered in this
document, go to:
http://www.sun.com/service/contacting
Sun Welcomes Your Comments
Sun is interested in improving its documentation and welcomes your comments and
suggestions. You can submit your comments by going to:
http://www.sun.com/hwdocs/feedback
Please include the title and part number of your document with your feedback:
Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide, part number 8175249-11
Prefacexxi
xxii Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
CHAPTER
1
Introduction
Overview
Strong server-management capabilities are crucial to maintaining mission-critical
servers. Advance notification of problems and rapid diagnosis and correction are
critical functions to an environment in which a few servers bear the bulk of the
workload. The Sun Fire™ V20z and Sun Fire V40z servers and their extensive
server-management capabilities lower costs by reducing failure and by potentially
eliminating hands-on management.
This document describes how to perform remote management on the Sun Fire V20z
and Sun Fire V40z servers.
The Sun Fire V20z server is an AMD Opteron processor-based, enterprise-class
one-rack-unit (1U), two-processor (2P) server. The Sun Fire V40z server is also an
AMD Opteron processor-based server, but is a three-rack-unit (3U), four-processor
(4P) server.
The AMD Opteron processor implements the x86-64-bit architecture, which delivers
significant memory capacity and bandwidth with twice the memory capacity and up
to three times the memory bandwidth of existing x86-32-bit servers.
These servers include an embedded Service Processor (SP), flash memory, RAM, a
separate Ethernet interface, and server-management software. They come equipped
with superior server-management tools for greater control and minimum total cost
of ownership. You can use the command-line interface (CLI), SNMP integration with
third-party frameworks, or IPMI to configure and manage the platform with the SP.
The dedicated SP provides complete operating-system independence and maximum
availability of server management.
1
Acronyms
TABLE 1-1 defines the acronyms found in this document.
TABLE 1-1Acronyms
AcronymExplanation
ACPIAdvanced Configuration and Power Interface
ARPAddress Resolution Protocol
BMCBaseboard Management Controller
CRUCustomer-Replaceable Unit
DPCDirect Platform Control
FRUField-Replaceable Unit
grubGrand Unified Bootloader
IPMIIntelligent Platform Management Interface
KCSKeyboard Controller Style
KVMKeyboard, video, and mouse
LANLocal Area Network
LILOLinux Loader
LOMLights Out Management
MIBManagement Information Base
RMCPRemote Management Control Protocol
SDRSensor Data Record
SELSystem Event Log
SNMPSimple Network Management Protocol
SOLSerial Over LAN
SPService Processor
SSUSystem Setup Utility
SunMCSun Management Center
UARTUniversal Asynchronous Receiver/Transmitter
UDPUser Datagram Protocol
WANWide Area Network
2Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Server Management
There are several options for remotely managing a Sun Fire V20z or Sun Fire V40z
server:
■ Lights Out Management (LOM) through IPMItool
■ Simple Network Management Protocol (SNMP)
Service Processor
The Sun Fire V20z and Sun Fire V40z servers include a dedicated chipset for
complete operating-system independence and maximum availability of
server-management functions. This chipset, called Service Processor (SP), is an
embedded PowerPC chip providing the following:
■ Environmental monitoring of the platform (such as temperatures, voltages, fan
speeds, and panel switches)
■ Alert messages when problems occur
■ Remote control of server operations (boot, shutdown, and reboot of the server’s
operating system, turning the server’s power on and off, stopping the server’s
boot process in BIOS, and upgrading the BIOS)
Note – In this document, you might see references to a Baseboard Management
Controller (BMC). A BMC is a dedicated IPMI controller. The SP found in these
servers is a general-purpose, embedded CPU that contains software to emulate a
BMC.
Server-Management Interfaces
These servers include local and remote server-management capabilities through the
SP; the SP supports four server-management interfaces:
■ IPMI using a Keyboard Controller Style (KCS) interface and an IPMI kernel driver
(in-band)
■ IPMI over local area network (LAN) (out-of-band)
■ SNMP integration with third-party SNMP management consoles
■ Command-line-interface (CLI) LOM
Chapter 1 Introduction3
Command Line Interface
Server-management capabilities are available from the command line.
See Appendix B for a list of server-management commands that you can use with
these servers, as well as a description, the command format, a list of arguments and
a list of return codes for each command.
SSH and Scripting Capabilities
A system administrator can log in to the Service Processor using SSH and issue
commands, or more commonly, write a shell script that remotely invokes these
operations.
The server-management commands enable you to efficiently manage each area of
the server. From the command line, you can write data-driven scripts that automate
the configuration of multiple machines. For example, a central management system
can cause many servers to power on and boot at a specified time, or when a specific
condition occurs.
For more information about scripting, see “Configuring Scripting Capabilities” on
page 55.
SNMP Integration
SNMP management provides remote access by SNMP-compliant entities to monitor
the health and status of the server. The SP sends SNMP alerts to external
management functions when warranted.
For more information about SNMP, refer to “SNMP Server Management” on
page 41.
The diagram in
server-management options.
4Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
FIGURE 1-1 illustrates the communications paths for the different
Sun Control Station
IPMItool
Third-Party Management
Platform NICs
In-band
Platform
MODULES: Health Monitoring,
Lights Out Management, Software
Management, AllStart and others
(LOM)
Gigabit Ethernet
Server
CLI LOM
KCS
(In-band)
SNMP-based solutions
(HP Open View,
CA UniCenter, etc.)
Service
Processor NIC
10/100 Mb/s
Out-of-band
SNMP
agent
IPMI management through
IPMItool
OpenIPMI (Linux)
LIPMI (Solaris™)
FIGURE 1-1 Diagram of the Server-Management Options
Service
Processor (SP)
Chapter 1 Introduction5
Operator Panel
You can use the operator panel to configure network settings for the SP. See
FIGURE 1-2 or FIGURE 1-3 for the operator panel location on your server.
Note – The SP defaults to Dynamic Host Configuration Protocol (DHCP)
networking if the operator panel is not interactively engaged on the first power-up.
Operator panel displayOperator panel buttons
FIGURE 1-2 Sun Fire V20z Server Operator Panel and Buttons
Operator panel buttons (3)
FIGURE 1-3 Sun Fire V40z Server Operator Panel and Buttons
6Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Operator panel display
The operator panel displays information on the LCD display in two lines, and you
respond to prompts or initiate actions using the following buttons:
TABLE 1-2Operator Panel Buttons
ButtonsFunction
Back/No
Select
Forward/Yes
Enter
Cancel
If a menu or data-entry screen displays for more than 30 seconds with no action
taken, the menu or data entry is cancelled and the display returns to the
idle/background state.
For every action that you confirm, feedback displays on the panel to indicate
success, failure, or that the action has been initiated.
The Back and Forward buttons automatically scroll, repeating the action as long as
the button is held down. After holding the button down a few seconds, auto
scrolling begins and rapidly increments or decrements the value.
Chapter 1 Introduction7
User Groups
Administrators can define several different user groups, or types, on the server.
Capabilities of the different user types are defined in
For example, when you log in to the system the first time using the setup account,
the first thing you must do is set up the initial manager account so that other user
accounts can be managed. (see “Creating the Initial Manager Account” on page 13
for details)
TABLE 1-3User Types
User TypeCapability
monitorRead-only access for sensor data and log displays.
adminAll capabilities except user account management and SP field
upgrades
managerAll capabilities except SP field upgrade
serviceSP field upgrades
TABLE 1-3.
8Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Initial Setup of the Service Processor
This procedure describes the steps for the initial setup of the SP.
Part I: Assigning Network Settings to the SP
This section contains two alternate methods you can use to define SP network
settings:
■ “Assigning SP Network Settings Using DHCP” on page 9
■ “Assigning Static SP Network Settings” on page 11
Note – As an alternative, if no DHCP server or physical access is available, you can
configure the SP using IPMItool in conjunction with an IPMI kernel driver. To
configure your server for IPMI, perform the correct procedures for your operating
system in “Enabling IPMI Access on the Server” on page 14, then “Enabling IPMI
LAN Access” on page 17.
Assigning SP Network Settings Using DHCP
The following procedure describes how to set the SP network settings using DHCP
from the Operator Panel. If your network does not use DHCP, or you want to assign
a static IP address to the SP, follow the instructions in “Assigning Static SP Network
Settings” on page 11.
Note – This procedure assumes that you have cabled the server and powered it on
as described in the Sun Fire V20z and Sun Fire V40z Servers Installation Guide. At
least of the server’s SP ports must be connected to a LAN.
1. Press any operator panel button on the server front panel (see
The LCD panel displays the first menu option:
Menu:
Server Menu
FIGURE 1-4).
Chapter 1 Introduction9
BackSelectForward
Press both for CancelPress both for Enter
FIGURE 1-4 Operator Panel Buttons
2. Press the Forward button until you reach the SP menu:
Menu:
SP menu
3. Press the Select button to display the SP menu options.
SP Menu:
Set SP IP info?
4. Press the Select button.
The following prompt appears with the default response:
SP use DHCP?
No
5. Press the Forward button to change to Yes, then press the Select button.
6. Press the Select button at the confirmation prompt.
SP use DHCP:
Yes?
The server attempts to contact a DHCP server for an IP address. Once a DHCP
server is contacted, the LCD panel displays the default SP settings. The SP address is
configured and the server is ready for use.
7. Continue with “Part II: Securing the Service Processor” on page 13 for instructions
on creating the initial manager account.
Note – A prompt appears that asks if you want to perform autoconfiguration. As an
alternative to configuring an SP manually, you can run autoconfiguration, which
replicates the configuration of one SP to another. Refer to “Autoconfiguring the SP
(Optional Method)” on page 24for instructions on autoconfiguration.
10Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Assigning Static SP Network Settings
Follow these steps to set the SP network settings using a static IP address. You must
specify a subnet mask and default gateway. This example uses the following sample
settings:
IP Address: 192.168.1.2
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.254
1. Press any operator panel button on the server front panel (see
The LCD panel displays the first menu option:
Menu:
Server Menu
2. Press the Forward operator panel button until you reach the SP menu:
Menu:
SP menu
3. Press the Select operator panel button to display the SP menu options.
SP Menu:
Set SP IP info?
4. Press the Select operator panel button. The following prompt displays with the
default response:
SP use DHCP?
No
5. Press the Select operator panel button.
The LCD displays as follows:
SP IP Address:
0.0.0.0
6. With the cursor in the first field, increase or decrease the value using the Back and
Forward operator panel buttons.
This field can hold a value between 0 and 255.
SP IP Address:
10.0.0.0
FIGURE 1-4).
7. After reaching your desired value, press the Select operator panel button to
advance the cursor to the next field.
SP IP Address:
10.
0.0.0
Chapter 1 Introduction11
Note – The Back and Forward operator panel buttons automatically scroll, repeating
the action as long as the button is held down.
8. Repeat Step 6 and Step 7 for each field until the desired IP address is displayed,
then use the Enter button combination to save the IP Address.
The process continues to the next network setting, the Subnet Mask. The LCD
displays as follows:
SP netmask:
255.255.255.0
9. Edit the subnet mask setting in the same manner as you did for the IP address.
When finished, use the Enter button combination to save the subnet mask.
The process continues to the next network setting, the default gateway. The LCD
displays as follows:
SP IP Gateway
10.10.30.1
10. Edit the default gateway setting in the same manner as you did for the IP address
and the subnet mask. When finished, use the Enter button combination to save the
default gateway.
The LCD displays the following confirmation prompt:
Use new IP data:
Yes?
11. Press the Select operator panel button to use the new data, or use the Cancel
button combination to disregard.
The SP address is now configured and the server is ready for use.
Note – A prompt appears that asks if you want to perform autoconfiguration. As an
alternative to configuring an SP manually, you can run autoconfiguration, which
replicates the configuration of one SP to another. Refer to “Autoconfiguring the SP
(Optional Method)” on page 24 for instructions on autoconfiguration.
12. Continue with “Part II: Securing the Service Processor” on page 13.
12Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Part II:Securing the Service Processor
After you install the server and configure the SP, you must create the initial manager
account to secure and access the server. You can then perform initial configuration of
the server and create additional user accounts.
Creating the Initial Manager Account
A setup account is included with each server. This setup account has no password.
When you log in to the SP the first time using the setup account, you are prompted
to define the initial manager account with a password and an optional public key.
Log in to the setup account and create the initial manager account by following this
procedure:
1. Using an SSHv1 or SSHv2 client, connect to the IP address of the SP.
2. Authenticate as the user setup with no password required:
# ssh sp_ip_address -l setup
3. Follow the on-screen prompts to create the initial manager account.
After you create the initial manager account, the setup account is deleted and you
are logged out of the server. You can then log in using the new manager account,
from which you can create other user accounts.
Note – If you are prompted for a password, this indicates that the SP has already
been secured. If you do not know the management user name and password, you
can reset the SP from the operator panel.
Note – The IP address, user name, and password that you configure are referred to
in subsequent examples as the spipaddr, spuser and sppasswd.
Chapter 1 Introduction13
Enabling IPMI Access on the Server
This section contains two alternate procedures; one for a Linux-based server and one
for a Solaris-based x86 server. Use the procedure that corresponds to your OS:
■ “Enabling IPMI Access on a Linux-Based Server (In-Band)” on page 14
■ “Enabling IPMI Access on a Solaris-Based x86 Server (In-Band)” on page 16
Enabling IPMI Access on a Linux-Based Server (In-Band)
1. Log in to the server and authenticate as the user root.
2. Install the custom openIPMI Linux kernel driver from the Sun Fire V20z and Sun
Fire V40z Servers Documentation and Support Files CD. The drivers are located
in the CD directory /support/sysmgmt/.
Browse to the OS variant installed on your server. The options are:
■ redhat/rhel3 for Red Hat Enterprise Linux, version 3 (32-bit mode uses the
architecture type “i386”; 64-bit mode uses architecture type “x86_64”)
■ suse/sles8 for SUSE Enterprise Linux, version 8 (32-bit mode uses the architecture
type “i386”; 64-bit mode uses architecture type “x86_64”)
■ suse/suse9 for SUSE 9 Professional
3. Ensure that the kernel-source RPM is already installed on your distribution by
running the command:
# rpm -qvi kernel-source
If this utility reports that the kernel-source software package is not installed, install
the kernel-source RPM that is current for your installed Linux distribution.
■ On SUSE distributions, install the kernel-source RPM by running the command:
# yast2
■ On RedHat distributions, download the current kernel-source RPM to a
temporary directory (such as /tmp). Install the package by running the command:
# rpm -ivh /tmp/kernel-source*.rpm
4. Install the openIPMI Linux kernel driver RPM.
a. Browse to the OS variant installed on your server. The options are:
■ redhat/rhel3 for Red Hat Enterprise Linux, version 3 (32-bit mode uses the
architecture type “i386”; 64-bit mode uses architecture type “x86_64”)
■ suse/sles8 for Suse Enterprise Linux, version 8 (32-bit mode uses the
architecture type “i386”; 64-bit mode uses architecture type “x86_64”)
■ suse/suse9 for Suse 9 Professional
14Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
b. Install the openIPMI RPM file by running the command:
# rpm -ivh openipmi*.rpm
Note – The kernel driver will be compiled using the kernel-source code during
installation.
5. Install IPMItool.
IPMItool is the command-line-interface (CLI) server-management client.
■ If the installed Linux distribution uses the 32-bit “i386” architecture, run the
following command:
# rpm -ivh ipmitool*.i386.rpm
■ If the installed Linux distribution uses the 64-bit “x86_64” architecture, run the
following command:
# rpm -ivh ipmitool*.x86_64.rpm
6. Test the IPMI kernel device driver and client application by running the
following command:
# ipmitool -I open chassis status
Successful output should look similar to the following:
"
System Power: on
Power Overload: false
Power Interlock: inactive
Main Power Fault: false
Power Control Fault: false
Power Restore Policy: unknown
Last Power Event:
Chassis Intrusion: inactive
Front-Panel Lockout: inactive
Drive Fault: false
Cooling/Fan Fault: false
"
Note – On a subsequent reboot, the IPMI kernel driver may have to be loaded with
the following command:
# modprobe ipmi_kcs_drv
Note – If you upgrade your Linux kernel, refer to “Upgrading the Linux Kernel” on
page 19.
Chapter 1 Introduction15
Enabling IPMI Access on a Solaris-Based x86 Server (In-Band)
1. Log in to the server and authenticate as the user root.
2. Run the following command to install the LIPMI Solaris x86 kernel driver and the
IPMItool management control application.
These files are located on the Documentation and Support Files CD in the
/support/sysmgmt/solaris9 directory.
# pkgadd -d ./
Confirm installation of all packages when prompted.
3. Reboot the server.
16Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Enabling IPMI LAN Access
This section contains three alternate procedures; two in-band procedures, and one
out-of-band procedure. Use the procedure that corresponds to your OS:
■ “Enabling IPMI LAN Access on a Linux-Based Server (In-Band)” on page 17
■ “Enabling IPMI LAN Access on a Solaris-Based x86 Server (In-Band)” on page 18
■ “Alternate Method for Enabling IPMI LAN Access (Out-of-Band)” on page 18
Enabling IPMI LAN Access on a Linux-Based Server
(In-Band)
1. If the server is powered off, boot the local OS.
2. Log in to the server and authenticate as the user root.
3. Load the OpenIPMI kernel device driver (as installed in Part III, Step 3).
# modprobe ipmi_kcs_drv
4. Using IPMItool, configure the network setting for the SP.
Note – For more information on the syntax for IPMItool commands, refer to
“Syntax” on page 30.
# ipmitool -I open lan set 6 ipaddr ipaddr
# ipmitool -I open lan set 6 netmask netmask
# ipmitool -I open lan set 6 defgw ipaddr gwipaddr
# ipmitool -I open lan set 6 password ipmipasswd
Chapter 1 Introduction17
Enabling IPMI LAN Access on a Solaris-Based x86 Server
(In-Band)
1. If the server is powered off, boot the local OS.
2. Log in to the server and authenticate as the user root.
3. Using IPMItool, configure the network setting for the SP by using the following
commands.
Note – For more information on the syntax for IPMItool commands, refer to
“Syntax” on page 30.
# ipmitool -I lipmi lan set 6 ipaddr ipaddr
# ipmitool -I lipmi lan set 6 netmask netmask
# ipmitool -I lipmi lan set 6 defgw ipaddr gwipaddr
# ipmitool -I lipmi lan set 6 password ipmipasswd
Alternate Method for Enabling IPMI LAN Access (Out-ofBand)
1. Using an SSHv1 client or SSHv2 client, log in to the IP address of the SP.
2. Authenticate as the newly created management user (see “Part II: Securing the
Service Processor” on page 13”).
# ssh spipaddr -l spuser
3. Enable IPMI LAN access and assign a password when prompted.
# ipmi enable channel lan
# exit
Note – This password will be referred to as ipmipasswd in subsequent examples.
4. Using IPMItool, test the IPMI LAN access.
# ipmitool -I lan -H spipaddr -P ipmipasswd chassis status
18Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Upgrading the Linux Kernel
Upgrading the installed Linux kernel to a newer version requires you to recompile
the upgraded IPMI kernel device driver.
1. Install the kernel-source RPM that matches the version of the upgraded kernel
binary RPM package.
2. Log in to the server and authenticate as the user root.
3. Change to the following directory:
# cd /usr/src/kernel-modules/openipmi
4. Recompile the module by running the following commands:
# make clean
# make
# make install
5. Re-test the IPMI kernel device driver and client application by running the
following command:
# ipmitool -I open chassis status
Successful output should look similar to the following:
"
System Power: on
Power Overload: false
Power Interlock: inactive
Main Power Fault: false
Power Control Fault: false
Power Restore Policy: unknown
Last Power Event:
Chassis Intrusion: inactive
Front-Panel Lockout: inactive
Drive Fault: false
Cooling/Fan Fault: false
"
Note – On a subsequent reboot, the IPMI kernel driver may have to be loaded with
the following command:
# modprobe ipmi_kcs_drv
Chapter 1 Introduction19
Daisy-Chaining the Servers
You can interconnect multiple servers in a daisy chain configuration by using the SP
connectors to form a management LAN as shown in
shows how the servers are connected to external LANs using the platform gigabit
connectors.
FIGURE 1-5. This figure also
= SP 10/100
connectors for
management LAN
Mngmt
console
Cross-overCross-over
Management LAN
NFS/CIFS
server
FIGURE 1-5 Daisy Chain Architecture
SP
MGMT
SP
MGMT
SP
MGMT
= GB 100/1000
connectors for
external LANs
Server
Server
External LANs
Server
Internet
To interconnect the servers, you must use an RJ-45 cross-over cable. Cables can be
connected to either the top or bottom SP port. To configure servers in a daisy chain,
connect the first and last server in the chain to different switches.
Managed spanning-tree capable switches are required to redundantly connect both
the top and bottom of the chain. If the switch is not capable of spanning-tree
discovery, then only connect either to the top or the bottom of the chain, but not
both.
20Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Site Integration
When deploying your server, ensure that you determine the best integration strategy
for your environment.
These servers include network connections for the service processor (SP) that are
separate from network connections for the platform. This allows you to configure
the server so that the SP is connected to an isolated, management network and is not
accessible from the production network.
Updating the SP Software
Note – For complete information about the menu options available through the
operator panel, refer to the Sun Fire V20z and Sun Fire V40z Servers User Guide.
If you attempt to update the SP software using the operator panel when the
IP address for the SP has not been set, the update fails. Ensure that the IP address
has been set prior to attempting an update. For more information, refer to the SunFire V20z and Sun Fire V40z Servers Installation Guide.
Refer to “Operator Panel” on page 6 for general orientation and usage of the
operator panel.
Note – Prior to executing this procedure, you must start the Java™ Update Server.
Refer to “Updating the Service Processor Base Component” on page 23 for details
about starting the Java Update Server.
To update the SP software:
1. When the LCD displays the Service Processor information (as shown in the
following example), press any button.
123.45.67.89
OS running
The LCD displays the first menu option:
Menu:
Server Menu
Chapter 1 Introduction21
2. Press the Forward button until you reach the SP menu.
Menu:
SP menu
3. Press Select or Enter to display the SP menu’s options.
SP Menu:
Set SP IP info?
4. Press the Forward button until you reach the Update SP Flash menu option.
SP Menu:
Update SP Flash?
5. Press Select or Enter.
6. A string of 0s displays with the cursor at the left digit. Use the Forward and Back
buttons to increment or decrement a digit.
Note – You are prompted for an IP address. If you attempt to update the SP
software using the operator panel when the IP address for the SP has not been set,
the update fails.
Note – If you need to supply a port address, it can be any number between 0 and
65535. The leading 0s are removed.
See Step 3 in “Updating the Service Processor Base Component” on page 23 for more
information.
7. Press Select to move to the next digit.
8. Press Select when finished to return to the left-most column.
9. Press the button combination for Enter.
22Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Updating the Service Processor Base Component
To update the SP base component:
1. Start the spupdate server on a machine with a Java Runtime Environment (JRE) by
running the following command:
# java -jar spupdate.jar -f filename [ -p port ]
The spupdate.jar file is located in the spupdate folder of the Network Share
Volume (NSV).
In this command, filename is an SP .image file located in
sw_images/sp/spbase/version. This sw_images directory contains an SP base
.image file for each version available.
By default, the server uses port number 52708. If this port number is already in use,
specify another port using the optional -p flag.
The update server does not start if the file is not found in the specified path.
Otherwise, the server is ready to receive update requests from any SP. The update
server can simultaneously accept multiple update requests from different SPs.
2. Log in to the SP by running the following command:
# ssh spipaddr -l spuser
3. Run the sp command to start the update process on the SP:
Note – This command includes the optional -p flag to denote that the server is
running on a port other than the default port. This command pings the update
server to see if the update server is up and running. If successful, your connection is
closed when the SP reboots and the update process begins.
Refer to Appendix B for more information about the sp commands.
4. Monitor progress of the update process on the server.
Messages display as the installation process progresses. When complete, the SP
reboots with the new version installed.
Chapter 1 Introduction23
Autoconfiguring the SP (Optional Method)
Autoconfiguration replicates the majority of configuration files from an SP that has
already been configured to another SP, so that the two servers have identical
configurations, except for the host name and IP address.
For example, after you configure a single SP (set up users, hosts, certificates, mounts
and so on), you then run autoconfiguration on each additional SP so that the settings
are identical. In addition, if you modify the configuration of one SP, you can update
all of them by re-running autoconfiguration on each one. (For this reason, set the
IP address of the autoconfigure server to x.x.x.1.)
Note – Autoconfiguration does not merge configurations, it overwrites the existing
configuration.
Note – Autoconfiguration does not work across diffrent server platforms. That is,
you cannot configure a Sun Fire V40z service processor using settings on a Sun Fire
V20z service processor.
To perform autoconfiguration of an SP, follow these steps:
You can start autoconfiguration either when you are prompted at the completion of
setting the IP address of the SP, or by selecting Autoconfigure from the SP menu
option on the operator panel at any time.
1. On the operator panel, press the Forward or Back buttons until the following
prompt shows Yes.
SP Auto Setup?
No
For instructions on setting an IP address, refer to the Sun Fire V20z and Sun Fire V40z
Server Installation Guide.
2. Press the Select button.
The SP attempts to locate an IP address.
■ If the SP successfully locates an IP address, the following prompt appears,
displaying an IP address for this SP:
Setup Server IP:
x.x.x.1
Where x.x.x is the first three octets of the SP IP address. For example, if the
address is 10.10.30.19, the address that displays in the prompt appears as
10.10.30.1.
In this case, press the Select operator panel button to start autoconfiguration.
24Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
■ If the SP does not locate an IP address, the following message appears:
Unable to get
SP IP address
In this case, you must manually enter an IP address before you press the Select
operator panel button to start autoconfiguration.
3. Wait until the autoconfiguration is complete, at which point the SP automatically
reboots.
The following message displays when autoconfiguration is running.
SP AutoConfigure
in progress
Note – If the autoconfiguration is unsuccessful, a failure message displays. Press
any button to clear it.
Determining SP and Platform Network MAC Addresses
Use the following commands if you need to determine the MAC address of your
server’s SP or platform:
# ssh spipaddress -l spusername sp get mac
# ssh spipaddress -l spusername platform get mac
Chapter 1 Introduction25
26Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
CHAPTER
2
IPMI Server Management
Server manufacturers today have to re-invent how each new server manages itself.
The hardware and software design for one server does not necessarily work with
another. Every server supplier provides basic monitoring and data collection
functions but no two do it exactly the same. These proprietary implementations for
manageability only complicate the problem.
The standardization of server-based management, called Intelligent Platform
Management Interface (IPMI), provides a solution. IPMI allows you to interconnect
the CPU and devices being managed. It allows for:
■ Easy replication of the monitoring functions from server to server
■ Support for a reasonably large number of monitoring devices
■ Common driver-level access to management instrumentation
■ More cost-effective implementations
■ Increased scalability of the server management functions
IPMI is an industry-standard, hardware-manageability interface specification that
provides an architecture defining how unique devices can all communicate with the
CPU in a standard way. It facilitates platform-side server management and remote
server-management frameworks, by providing a standard set of interfaces for
monitoring and managing servers.
With IPMI, the software becomes less dependent on hardware because the
management intelligence resides in the IPMI firmware layer, thereby creating a more
intelligently managed server. The IPMI solution increases server scalability by
distributing the management intelligence closer to the devices that are being
managed.
27
Baseboard Management Controller
In order to perform autonomous platform-management functions, the processor
runs embedded software or firmware. Together, the processor and its controlling
firmware are referred to as the Baseboard Management Controller (BMC), which is
the core of the IPMI structure. Tightly integrating an IPMI BMC and management
software with platform firmware facilitates a total management solution.
The BMC is a service processor integrated into the motherboard design, providing a
management solution independent of the main processor. The monitored server can
communicate with the BMC through one of three defined interfaces, which are based
on a set of registers shared between the platform and the BMC.
Note – In these servers, the SP has software that emulates a BMC.
The BMC is responsible for:
■ Managing the interface between server management software and platform
management hardware
■ Interfacing to the system sensors, such as fan speed and voltage monitors
■ Providing access to the system event log
■ Providing autonomous monitoring, event logging, and recovery control
■ Acting as a gateway between the management software and the IPMB/ICMB
■ Monitoring the system watchdog timer
■ Facilitating the remote-management tasks, even when the main server hardware
is in an inoperable state
The BMC provides the intelligence behind IPMI. In these servers, the SP serves as
the BMC, providing access to sensor data and events through the standard IPMI
interfaces.
Manageability
IPMI defines a mechanism for server monitoring and recovery implemented directly
in hardware and firmware. IPMI functions are available independent of the main
processors, BIOS, and operating system.
IPMI monitoring, logging, and access functions add a built-in level of manageability
to the platform hardware. IPMI can be used in conjunction with server-management
software running under the OS, which provides an enhanced level of manageability.
IPMI provides the foundation for smarter management of servers by providing a
methodology for maintaining and improving the reliability, availability and
serviceability of expensive server hardware.
28Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
IPMI Compliance and LAN Channel Access
The server supports IPMI through the SP software version 2.0 and later. These
servers meet compliance standards for IPMI version 1.5.
The IPMI implementation on these servers also support LAN channel access. (Refer
to the IPMI specification version 1.5 for details.) The LAN channel access is disabled
by default. To enable it, use the ipmi enable channel command and specify the
ID of the channel to enable for the LAN Interface, as follows.
Note – This ID is case-sensitive and must be lowercase.
For more information about enabling or disabling the IPMI channel, refer to
Appendix B.
Usernames and Passwords
Operator and administrator-level access over the LAN channel requires a valid
user ID and password. These servers come preconfigured with an administratorlevel user with a null user ID. However, you can re-add the anonymous user at a
later time if you wish. You can configure both the user ID and password to be null.
Note – For security reasons, the LAN channel access is disabled by default.
Note – IPMI user identities are in no way associated with user accounts defined for
server-management capabilities. Refer to “Initial Setup of the Service Processor” on
page 9 for more information about these server-management user accounts.
Chapter 2 IPMI Server Management29
Lights Out Management (LOM)
On these servers, Lights Out Management is performed through IPMItool, a utility
for controlling IPMI-enabled devices.
Description
IPMItool is a simple command-line interface (CLI) to servers that support the
Intelligent Platform Management Interface (IPMI) v1.5 specification. It provides the
ability to:
■ Read the Sensor Data Record (SDR) and print sensor values
■ Display the contents of the System Event Log (SEL)
■ Print information about Field Replaceable Units (FRUs)
■ Read and set LAN configuration parameters
■ Perform chassis power control
Originally written to take advantage of IPMI-over-LAN interfaces, IPMItool is also
capable of using a system interface, as provided by a kernel device driver such as
OpenIPMI.
Further Information
■ For up-to-date information about IPMItool, visit:
http://ipmitool.sourceforge.net/
■ For more information about the IPMI specification, visit:
http://www.intel.com/design/servers/ipmi/spec.htm
■ For more information about the OpenIPMI project (MontaVista IPMI kernel
driver), visit:
http://openipmi.sourceforge.net/
Syntax
The syntax used by IPMItool is as follows:
ipmitool [-ghcvV] -I lan -H address [-P password] expression
ipmitool [-ghcvV] -I open expression
30Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Options
TABLE 2-1 lists the options available for IPMItool.
TABLE 2-1Options for IPMItool
OptionDescription
-hProvides help on basic usage from the command line.
-cMakes the output suitable for parsing, where possible, by separating
fields with commas instead of spaces.
-gAttempts to make IPMI-over-LAN communications more robust.
-VDisplays the version information.
-vIncreases the amount of text output. This option may be specified
more than once to increase the level of debug output. If given three
times, you receive hexdumps of all incoming and outgoing packets.
-I interfaceSelects the IPMI interface to use. The possible interfaces are LAN or
open interface.
-H addressDisplays the address of the remote server; it can be an IP address or
host name. This option is required for the LAN interface connection.
-P passwordDisplays the password for the remote server; the password is
limited to a maximum of 16 characters. The password is optional for
the LAN interface; if a password is not provided, the session is not
authenticated.
Chapter 2 IPMI Server Management31
Expressions
TABLE 2-2 lists the expressions and parameters available for IPMItool.
Note – For each of these expressions, the beginning command is always ipmitool,
followed by the expression and parameter(s).
Note – The sol command is not supported in these servers, but you can enable a
Serial-over-LAN feature. See “Serial Over LAN” on page 70.
TABLE 2-2Expressions and Parameters for IPMItool (1 of 4)
ExpressionParameterSub-parameterDescription and examples
helpCan be used to get command-line help on IPMItool
commands. It may also be placed at the end of commands
to get help on the use of options.
EXAMPLES:
ipmitool -I open help
Commands:chassis, fru, lan, sdr, sel
ipmitool -I open chassis help
Chassis Commands:status, power, identify,
policy, restart_cause
ipmitool -I open chassis power help
Chassis Power Commands: status, on, off, cycle,
reset, diag, soft
rawnetfncmd dataAllows you to execute raw IPMI commands (for example,
to query the POH counter with a raw command).
EXAMPLE:
ipmitool -I open raw 0x0 0x1
RAW REQ (netfn=0x0 cmd=0x1 data_len=0)
RAW RSP (3 bytes)
60 00 00
32Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
TABLE 2-2Expressions and Parameters for IPMItool (2 of 4)
ExpressionParameterSub-parameterDescription and examples
chaninfochannelDisplays information about the selected channel. If no
channel is specified, the command displays information
about the channel currently being used.
EXAMPLES:
ipmitool -I open chaninfo
Channel 0xf info:
Channel Medium Type: System Interface
Channel Protocol Type: KCS
Session Support: session-less
Active Session Count: 0
Protocol Vendor ID: 7154
ipmitool -I open chaninfo 7
Channel 0x7 info:
Channel Medium Type: 802.3 LAN
Channel Protocol Type: IPMB-1.0
Session Support: multi-session
Active Session Count: 1
Protocol Vendor ID: 7154
Alerting: enabled
Per-message Auth: enabled
User Level Auth: enabled
Access Mode: always available
userinfochannel
Note:
Displays information about configured user information
on a specific LAN channel.
Channels 6
and 7 are not
supported on
Sun Fire V20z
servers.
EXAMPLE:
ipmitool -I open userinfo 6
Maximum User IDs: 4
Enabled User IDs: 1
Fixed Name User IDs: 1
Access Available: call-in / callback
Link Authentication: disabled
IPMI Messaging: enabled
chassisstatusReturns information about the high-level status of the
server chassis and main power subsystem.
identifyintervalControls the front panel identification light. The default
value is 15 seconds. Enter “0” to turn it off.
restart_causeQueries the chassis for the cause of the last server restart.
Chapter 2 IPMI Server Management33
TABLE 2-2Expressions and Parameters for IPMItool (3 of 4)
ExpressionParameterSub-parameterDescription and examples
powerPerforms a chassis control command to view and change
the power state.
statusShows the current status of the chassis power.
onPowers on the chassis.
offPowers off chassis into the soft off state (S4/S5 state).
NOTE: This command does not initiate a clean shutdown
of the operating system prior to powering off the server.
cycleProvides a power-off interval of at least 1 second.
No action should occur if chassis power is in S4/S5 state,
but it is recommended to check the power state first and
then only issue a power-cycle command if the server
power is on or in a lower sleep state than S4/S5.
resetPerforms a hard reset.
lanprintchannelPrints the current configuration for the given channel.
setchannel
Sets the given parameter on the given channel.
parameter
ipaddr x.x.x.xSets the IP address for this channel.
netmask x.x.x.xSets the netmask for this channel.
macaddr
Sets the MAC adddress for this channel.
xx:xx:xx:xx:xx:xx
defgw ipaddr
Sets the default gateway IP address.
x.x.x.x
defgw macaddr
Sets the default gateway MAC address.
xx:xx:xx:xx:xx:xx
bakgw ipaddr
Sets the backup gateway IP address.
x.x.x.x
bakgw macaddr
Sets the backup gateway MAC address.
xx:xx:xx:xx:xx:xx
password passSets the null user password.
userEnables the user-access mode.
access [on|off]Sets the LAN-channel-access mode.
ipsrc sourceSets the IP address source. As a source, you can indicate:
none = unspecified
static = manually configured static IP address
dhcp = address obtained by BMC running DHCP
bios = address loaded by BIOS or system software
34Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
TABLE 2-2Expressions and Parameters for IPMItool (4 of 4)
ExpressionParameterSub-parameterDescription and examples
arp respond
Sets the BMC-generated ARP responses.
[on|off]
arp generate
Sets the BMC-generated gratuitous ARPs.
[on|off]
arp interval
Sets the interval for the BMC-generated gratuitous ARPs.
[seconds] s
auth level,...
type,...
This command sets the valid authtypes for a given auth
level.
Levels can be: callback, user, operator, admin
Types can be: none, md2, md5
fruprintReads all inventory data for the Customer Replaceable
Units (CRUs) and extracts such information as serial
number, part number, asset tags and short strings
describing the chassis, board or product.
sdrlistReads the Sensor Data Record (SDR) and extracts sensor
information, then queries each sensor and prints its name,
reading and status.
selinfoQueries the BMC for information about the system event
log (SEL) and its contents.
clearClears the contents of the SEL.
The clear command cannot be undone.
listLists the contents of the SEL.
Chapter 2 IPMI Server Management35
IPMI Linux Kernel Device Driver
The IPMItool application utilizes a modified MontaVista OpenIPMI kernel device
driver found on the Sun Fire V20z and Sun Fire V40z Servers Documentation and
Support Files CD. The driver has been modified to use an alternate base hardware
address and modified device IO registration.
This driver must be compiled and installed from the Documentation and Support
Files CD.
The following kernel modules must be loaded in order for IPMItool to work:
1. ipmi_msghandler
The message handler for incoming and outgoing messages for the IPMI interfaces.
2. ipmi_kcs_drv
An IPMI Keyboard Controller Style (KCS) interface driver for the message
handler.
3. ipmi_devintf
Linux-character-device interface for the message handler.
To force IPMItool to use the device interface, you can specify it on the command
line:
# ipmitool -I open [option...]
Installing and Compiling the Driver
To install and compile this kernel device driver, see “Initial Setup of the Service
Processor” on page 9.
LAN Interface for the BMC
Note – In these servers, the SP has software that emulates a BMC.
The IPMItool LAN interface communicates with the BMC over an Ethernet LAN
connection using User Datagram Protocol (UDP) under IPv4. UDP datagrams are
formatted to contain IPMI request/response messages with IPMI session headers
and Remote Management Control Protocol (RMCP) headers.
36Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Remote Management Control Protocol is a request-response protocol delivered using
UDP datagrams to port 623. IPMI-over-LAN uses version 1 of the RMCP to support
management both before installing the OS on the server, or if the server will not
have an OS installed.
The LAN interface is an authenticated, multi-session connection; messages delivered
to the BMC can (and should) be authenticated with a challenge/response protocol
with either a straight password/key or an MD5 message-digest algorithm. IPMItool
attempts to connect with administrator privilege level as this is required to perform
chassis power functions.
With the -I option, you can direct IPMItool to use the LAN interface:
# ipmitool -I lan [option...] address password
To use the LAN interface with IPMItool, you must provide a host name on the
command line.
The password field is optional; if you do not provide a password on the command
line, IPMItool attempts to connect without authentication. If you specify a password,
it uses MD5 authentication, if supported by the BMC; otherwise, it will use straight
password/key.
Files
The file /dev/ipmi0 is a character-device file used by the OpenIPMI kernel driver.
Examples
If you want to remotely control the power of an IPMI-over-LAN-enabled server, you
can use the following commands:
#
ipmitool -I lan -H spipaddr -P sppasswd chassis power on
The result returned is:
Chassis Power Control: Up/On
# ipmitool -I lan -H spipaddr -P sppasswd chassis power status
The result returned is:
Chassis Power is on
Chapter 2 IPMI Server Management37
Viewing the IPMI System Event Log
To view the System Event Log (SEL), use IPMItool.
The out-of-band command is:
# ipmitool -I lan -H spipaddr -P ipmipasswd sel list
The in-band command (using OpenIPMI on a Linux-based server or LIPMI on a
Solaris-based server) is:
# ipmitool -I open sel list
Note – To receive more verbose logging messages, you can run the following
command:
# ssh -l spuser spipaddr sp get events
Clearing the IPMI System Event Log
You can use commands to clear the contents of the IPMI SEL.
Use one of the following commands, depending on your OS:
■ For Linux: ipmitool -I open sel clear
■ For Solaris: ipmitool -I lipmi sel clear
38Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
IPMI Troubleshooting
TABLE 2-3 describes some potential issues with IPMI and provides solutions.
TABLE 2-3IPMI Troubleshooting
IssueSolution
You cannot connect to the
management controller using
IPMItool over LAN.
Verify the network connection to the management
controller and its IP address and verify the channel is
enabled using the ipmi get channels command.
You cannot authenticate to the
management controller using
IPMItool over LAN.
You have forgotten the password
for IPMI access over LAN.
IPMItool fails when using the
“open” interface.
Ensure that you are using the password assigned
when you enabled IPMI LAN access from the
management-controller shell prompt.
1. You can reset the IPMI setting, reset the SDRR and
purge the SEL from the management-controller
shell by running the command:
# ssh spipaddr -l spuser ipmi reset -a
2. Now re-enable IPMI on LAN with the following
commands:
Ensure that the Linux kernel module ipmi_kcs_drv
is loaded by running the lsmod command.
Chapter 2 IPMI Server Management39
40Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
CHAPTER
3
SNMP Server Management
You can manage your server using the Simple Network Management Protocol
(SNMP).
Simple Network Management Protocol
Simple Network Management Protocol (SNMP) is a network-management protocol
used almost exclusively in TCP/IP networks. SNMP provides a means to monitor
and control network devices, and to manage configurations, statistics collection,
performance and security on a network.
SNMP-based management allows for third-party solutions to be used. This includes
products such as HP OpenView and CA Unicenter.
The base component of an SNMP solution is the Management Information Base
(MIB). The MIB is included on the Sun Fire V20z and Sun Fire V40z Servers Network
Share Volume CD.
This configuration is beneficial when, for example, you have a cluster of machines
serving Web content and the platform is connected to the Internet, but the SP is
protected and only accessible on an internal network.
41
SNMP Integration
SNMP is an open network-management technology that enables the management of
networks and entities connected to the network. Within the SNMP architecture is a
collection of network-management stations and managed nodes.
Network-management stations execute management applications, which monitor
and control managed nodes. Managed nodes are devices such as hosts, gateways
and so on, which have management agents responsible for performing the
management functions requested by the management stations.
SNMP is used to communicate management information between the management
stations and the agents. In other words, SNMP is the protocol by which the agent
and the management station communicate.
The monitoring of state through SNMP at any significant level of detail is
accomplished primarily by polling for appropriate information on the part of the
management station. Managed nodes may also provide unsolicited status
information to management stations in the form of traps, which is likely to guide the
polling at the management station.
Communication of information between management entities in a network is
accomplished through the exchange of SNMP-protocol messages, both in the form of
queries (get/set) by the management station and in the form of unsolicited messages
(traps) indicated by the agent.
Your server includes SNMP agents that allow for health and status monitoring. The
SNMP agent runs on the SP and therefore all SNMP-based management of the
server should occur through the SP. The SNMP agent on these servers provides the
following capabilities:
■ Event management
■ Inventory management
■ Sensor and system state monitoring
■ SP configuration monitoring
SNMP Management Information Base (MIB)
The Management Information Base (MIB) is a text file that describes SNMP data as
managed objects. These servers provide SNMP MIBs so that you can manage and
monitor your server using any SNMP-capable network management system, such as
HP OpenView Network Node Manager (NNM), Tivoli, CA Unicenter, IBM Director
and so on. The MIB data describes the information being managed, reflects current
and recent server status, and provides server statistics.
42Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Sun Fire V20z and Sun Fire V40z Servers MIB Tree
FIGURE 3-1 illustrates the MIB tree:
FIGURE 3-1 MIB Tree
Integrating MIBs with Third-Party Consoles
You use the server’s MIBs to integrate the management and monitoring of the server
into SNMP management consoles. The MIB branch is a private enterprise MIB,
located at object identifier (OID) 1.3.6.1.2.1.9237. The standard SNMP port 161 is
used by the SNMP agent on the SP.
Chapter 3 SNMP Server Management43
Configuring SNMP on Your Server
Note – There are several services that are supplied by the SNMP agent on the
server. Depending on your business needs and the configuration of your current
office network and management environment, you might want to take advantage of
these services.
There are certain prerequisites and setup required on both the SP and the platform
in order to enable and utilize each of these services:
The following diagram illustrates the SNMP architecture and communication paths
between the SP and the platform.
FIGURE 3-2 SNMP Architecture and Communications
44Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
SNMP Agent on the Service Processor
The SNMP agent running on the SP facilitates the management and monitoring of
the server. The SNMP agent can be used to query various types of SP information.
Refer to
of the MIBs.
There is no configuration required to use this functionality other than integrating the
server MIBs with your desired management station.
Refer to the procedure for using the SNMP agent on the SP, as explained in
“Integrating MIBs with Third-Party Consoles” on page 43.
FIGURE 3-1 for a list of the MIBs; refer to TABLE 3-3 for a detailed description
Note – The SNMP agent on these servers supports SNMP v1/v2c. For security
reasons, there are no settable attributes in this agent.
Proxy Agent
The SP acts as an SNMP proxy agent intermediary for the platform. Queries made
from a management station to the SNMP agent on the SP are intercepted by the
proxy agent on the SP and forwarded to the platform; the SP proxy agent contacts
the platform to retrieve the requested information. The proxy agent then receives the
data from the platform and sends the request back to the management station. The
management station never knows that the request was proxied. The SP and the
platform communicate over an internal private network.
To enable this facility, you must first run an SNMP agent on your platform operating
system (see your operating system vendor to obtain this agent). This enables
platform-level management transparently through the SP. Querying MIBs other than
the server MIB (for example, the Host Resource MIB) and the MIBII System MIB on
the SP obtains information from the platform by proxying the request to the
platform SNMP agent.
Ensure that the SP can identify the read-only and read-write community names that
are configured for your platform SNMP agent. Refer to “Setting the Community
Name” on page 46.
Chapter 3 SNMP Server Management45
Setting the Community Name
The SNMP agent on the SP acts as a proxy for the SNMP agent running on the
platform. (Refer to “Configuring SNMP on Your Server” on page 44.) To properly
proxy, you must use the community string. The community string needed to do so is
the value defined when you configured the platform for SNMP.
If you find that your SNMP queries are not being proxied to the platform SNMP
agents, validate that the community string on the SP matches that on the platform.
The SP proxy community string can be changed to match the platform community
string using the following command:
# sp set snmp proxy community
There are no restrictions on the length of the community strings; common names are
private and public. The default name is public.
For more information, refer to “SP Set SNMP Proxy Community Subcommand” on
page 109.
Agent X
A sub-agent using SNMP Agent X protocol on the platform can connect to the SNMP
agent on the SP (through a special port) and forward query responses or unsolicited
traps through the SP. This allows server-management traffic to be kept secure from
the production network connected to the platform, if required.
To properly enable this facility, you must identify the IP address and port number
pair associated with the SP (as seen from the platform). The Agent X port is fixed
at 705 (TCP). However, the private-network IP address is configurable and, by
default, this address is 169.254.101.2.
Refer to your application documentation for instructions on configuring the
sub-agents.
Note – You can use the subcommand, sp get jnet on the SP to retrieve the JNET
IP address of the SP.
46Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Using a Third-Party MIB Browser
The following example demonstrates integrating the server MIBs into an SNMP
node manager.
1. From the Manager Preferences menu, choose Load/Unload MIBS: SNMP.
2. Locate and select the SP-MasterAgent-MIB.mib.
3. Click Load.
4. Specify the directory in which the server MIBs are placed and click Open.
5. Repeat steps 2 through 4 to load other MIBS (for example, SP-SST-MIB.mib,
SP-INVENTORY-MIB.mib, SP-EVENT-MIB.mib, SP-PLATFORM-MIB.mib,
SP-GROUP-MIB.mib and so on).
6. Exit the Manager Preferences menu.
7. Open an SNMP MIB browswer.
The SNMP standard tree displays in the MIB Browser.
8. Locate the Newisys branch located under private.enterprises.
Refer to
FIGURE 3-1 for a sample view of the MIB tree.
Setting Logging Options
You can also easily integrate SP-generated traps and set logging options. The
following example demonstrates the necessary steps when using
HP OpenView NNM:
1. Load the SP-EVENT-MIB.mib according to the previous procedure.
2. Choose Options>EventConfiguration
3. Select the spEvent module from the Enterprises list.
4. Double-click an event from the Events for Enterprise spEvent list.
5. Select the Event Message tab.
6. Select the Log and display in category radio dialog and choose a category from the
corresponding dropdown list, or create your own event category.
7. Select the severity of the event from the Severity dropdown list.
8. Enter a message or $* to display all information in the Event Log Message field.
9. Click OK.
Chapter 3 SNMP Server Management47
SNMP Traps
SNMP traps are network-management notifications of an event occurring at a
managed network node. These events can identify problems in the network,
machines up or down, and so on. These servers use traps to signal conditions related
to the server’s health, including critical conditions related to physical components,
the return to a normal state for these components, and other situations related to the
state of the software running on the SP (for example, network settings being
reconfigured).
Traps are defined in the MIB files and are generated, received, and processed by an
SNMP management station. SNMP trap data is uniquely identified by the MIB. Each
SNMP trap contains information identifying the server's name, IP address, and other
relevant data about the event.
Within the server event MIB, each trap has the following variables and event
bindings; see
TABLE 3-1Server Event Traps
EventDescription
EventIDUniquely identifies the event on the SP from
EventSourceDenotes the source module that generated the
EventComponentDenotes the component ID about which the
EventDescriptionThe event message received from its source.
EventTimeStampInitialThe time at which this event ID was initially
EventTimeStampLastThe most recent time at which this event ID was
TABLE 3-1.
where it came.
event.
event refers.
generated.
generated.
48Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Configuring SNMP Trap Destinations
Although SNMP traps are generated for events that occur on the SP, you must
configure where these traps are to be sent. There is no default destination for traps.
You can use the server-management subcommands (see
TABLE 3-2) on the SP to
configure SNMP destinations.
For more information on these subcommands, refer to Appendix B.
TABLE 3-2Subcommands for Configuring SNMP Destinations
SubcommandDescription
sp get snmp-destinationsDisplays all the available SNMP destination
IP addresses and host names to which the SP will send.
sp add snmp-destinationAdds a new SNMP destination one IP address or host
name at a time.
sp delete snmpdestination
Removes an existing SNMP destination one IP address
or host name at a time.
Configuring SNMP Destinations
Administration- and manager-level users can define SNMP destinations to which
SNMP events (alerts) will be sent using this option. All users can view the current
destinations (using read-only access).
The number of destinations you can create is limited due to memory constraints.
Chapter 3 SNMP Server Management49
Server MIB Details
SNMP uses object identifiers (OIDs) to provide name variables by which objects are
grouped together for easier reference. These servers provide agents for the MIBs
shown in
TABLE 3-3SNMP MIBs
MIBOIDDescription
SP-MasterAgent-MIB
.mib
SP-INVENTORY-MIB
.mib
SP-SST-MIB.mib.1.3.6.1.4.1.9237.2.1.
SP-PLATFORM-MIB.mib.1.3.6.1.4.1.9237.2.1.
SP-EVENT-MIB.mib.1.3.6.1.4.1.9237.2.1.
SP-GROUP-MIB.mib.1.3.6.1.4.1.9237.2.1.
TABLE 3-3:
.1.3.6.1.4.1.9237Creates the main trunk of the server MIB
tree. All other MIBs of the SP branch
from this tree. To be loaded first while
integrating with any third-party
framework.
.1.3.6.1.4.1.9237.2.1.
1.1
.1.3.6.1.4.1.9237.2.1.
1.1.2
.1.3.6.1.4.1.9237.2.1.
1.1.3
1.4
1.5
1.6
1.7
Used for querying inventory information
for all Sun Fire V20z and Sun Fire V40z
servers hardware and software
components.
Hardware Inventory Table: Collects all
hardware component inventory.
Software Inventory Table: Collects all
software component inventory.
Defines objects for the System State Table
in the SP. Contains all sensor readings,
including the name of the sensor, its
current value, maximum allowed value,
measurement type, scale and scanning
interval.
Defines objects for the platform SNMP
which includes osstate, platform state,
and platform IP table.
Identifies the OIDs associated with all
SNMP traps originated from the SP.
Defines objects for the SP, including host
name, DNS, a reboot node, a node to
hold the last port 80 postcode, a clone
tree and an IP table.
50Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
The events listed in TABLE 3-4 are sent to the SNMP destination by
SP-EVENT-MIB.mib.
TABLE 3-4SP Events (1 of 2)
Enterprise Trap IDEvent
1spGenericEventInformational
2spGenericEventWarning
3spGenericEventCritical
4spTemperatureEventInformational
5spTemperatureEventWarning
6spTemperatureEventCritical
7spVoltageEventInformational
8spVoltageEventWarning
9spVoltageEventCritical
10spFanEventInformational
11spFanEventWarning
12spFanEventCritical
13spPlatformMachineCheckEventInformational
14spPlatformMachineCheckEventWarning
15spPlatformMachineCheckEventCritical
16spPlatformStateChangeEventInformational
17spPlatformStateChangeEventWarning
18spPlatformStateChangeEventCritical
19spPlatformBIOSEventInformational
20spPlatformBIOSEventWarning
21spPlatformBIOSEventCritical
22spGenericEventInformational
23spGenericEventWarning
24spGenericEventCritical
25spTemperatureEventInformational
26spTemperatureEventWarning
27spTemperatureEventCritical
28spVoltageEventInformational
Chapter 3 SNMP Server Management51
TABLE 3-4SP Events (2 of 2)
Enterprise Trap IDEvent
29spVoltageEventWarning
30spVoltageEventCritical
31spFanEventInformational
32spFanEventWarning
33spFanEventCritical
37spPlatformStateChangeEventInformational
38spPlatformStateChangeEventWarning
39spPlatformStateChangeEventCritical
40spPlatformBIOSEventInformational
41spPlatformBIOSEventWarning
42spPlatformBIOSEventCritical
52Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
SNMP Troubleshooting
TABLE 3-5 describes a potential issue with SNMP and provides a solution.
TABLE 3-5SNMP Troubleshooting
IssueSolution
SNMP queries to the SP time out.The platform OS requires both the NPS driver suite
RPM and an active SNMP daemon sharing the SP’s
community string.
Chapter 3 SNMP Server Management53
54Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
CHAPTER
4
Further Management Information
Configuring Scripting Capabilities
A system administrator can log in to the Service Processor (SP) using secure shell
(SSH) and issue commands, or more commonly, write a shell script that remotely
invokes these operations.
Note – You must create a valid initial manager account before using SSH. The SP
includes a setup account that can be used to set up an initial manager account. This
initial manager user can create additional users.
The SP includes a suite of commands that enables management and monitoring of
the server; this suite of commands is referred to as server management commands.
From the command line, for instance, you can write data driven scripts that
automate configuration of multiple machines.
The Sun Fire V20z and Sun Fire V40z Servers Network Share Volume CD contains
sample scripts for getting started, which you can access after you extract the files on
the CD. See “Network Share Volume (NSV) CD-ROM” on page 68 for more
information about the script locations.
55
Using Shell Scripts
An administrator can make configuration changes for a single SP by using SSH to
log in and run commands. For a multi-system environment in which configurations
for all SPs must be synchronized, you can automate configuration changes.
As a Unix/Linux administrator, you can use SSH, trusted host relationships or
public key authentication, and Unix/Linux shell scripting to automate tasks that
need to be performed on multiple SPs.
1. Set up your system for scripting.
Sun Fire V20z and Sun Fire V40z remote scripting solutions depend on SSH for
authentication and data encryption. If you do not already have SSH, you can
obtain a free implementation, OpenSSH, available at www.openssh.org. The SP
allows the use of SSH v2 only. Refer to “Remote Scripting Using SSH” on page 56.
2. Create a trusted host relationship or add your public key for SSH authentication.
In order to use SSH in a scripted environment such that you are not prompted for
a password upon the execution of each command, you can establish a trusted host
relationship between the machine from which the commands are sent and the SP
on which the commands are executed. (This requires the prior creation of a
manager-level user on the SP.) Refer to “Creating Trusted Host Relationships”
on page 58.
You can also add a public key for SSH authentication, allowing you to log in via
SSH and execute remote commands without being prompted for a password.
Refer to “Adding Public Keys” on page 58.
3. Configure your client for scripting.
You must configure the client machine on which you will be running scripts.
4. Create your scripts.
Remote Scripting Using SSH
Remote scripting to the SP is done by using a program called SSH. For example, as a
user on the UNIX machine client.company.com with the SP name sp.company.com,
you could execute a command on the SP from the UNIX client using the following
format:
# ssh sp.company.com command
Because the SSH server must authenticate the remote user, the user must either enter
a password, or a trusted host relationship must exist, or the remote user’s public key
must be installed on the SP.
56Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
If using trusted host relationships for passwordless access, the SP must have a local
user of the same name as the remote user (or the remote user should be a member of
a directory service group that is mapped to a local SP administrative group).
You can also add your public key file instead of creating a trusted host relationship
to be authenticated via SSH. Refer to “Adding Public Keys” on page 58.
When configured for passwordless access, the ssh daemon on the SP allows the
remote user access to sp.company.com without a password, either for logging in,
or for issuing remote ssh commands from the command line or from a script.
Configuring Multiple Systems for Scripting
There are two ways to configure multiple SPs for scripting:
■ Execute the procedure to configure the client machine on which you will be
running scripts for each SP.
■ Set up the trust relationship or add your public key file on an initial machine and
use the autoconfiguration feature to duplicate the configuration on each of the
additional machines. Refer to “Creating Trusted Host Relationships” on page 58
and “Adding Public Keys” on page 58.
Generating Host Keys
To establish a trusted host relationship, you must set up a host key which is used to
authenticate one host to another. The host’s SSH install should generate the host
keys. If it does not, follow these steps to generate a host key pair:
1. Enter the following command:
# ssh-keygen -q -t rsa -f rsa_key -C '' -N ''
2. Move rsa_key to /etc/ssh/ssh_host_rsa_key.
3. Move rsa_key.pub to /etc/ssh/ssh_host_rsa_key.pub.
4. Ensure that only the root user has read or write permissions to
/etc/ssh/ssh_host_rsa_key.
The ssh_host_rsa_key.pub file is the file you will transfer to the SP.
Note – Only protocol version 2 key types and 1024 bit key sizes (the default
generated by ssh-keygen) are supported.
5. Continue with “Creating Trusted Host Relationships” on page 58 for instructions
on creating public keys that can be used for passwordless access.
Chapter 4 Further Management Information57
Note – Use scp to copy the files to either /tmp or to your home directory. The sp
commands will then install the file specified on the command line.
Creating Trusted Host Relationships
Adding a trusted host relationship is one way to allow for passwordless access and
thus is a means for one-to-many scripting. Once a host equivalence relationship has
been created with a client, users on that client can remotely execute commands on
the Service Processor without being prompted for a password, provided one of the
following conditions is met:
■ The user’s login name on the client is the same as that of a local user on the SP.
■ The user’s login on the client belongs to a directory service group that is mapped
to an SP administrative group. (In this case, the SSH command executes as a well
known auxiliary user on the SP; either rmonitor, radmin, or rmanager.)
Note – Support is available for SSH protocol version 2 key types (RSA or DSA) only.
If DNS is enabled on the SP, the client machine must be specified with its DNS name,
not an IP address.
Manager-level users can create a trusted host relationship for the specified host from
the command line using the access add trust command:
Adding a user’s public key is another way to allow for passwordless access and thus
provide one-to-many scripting. Once a public key for a specific user has been
installed on the SP, that user can remotely execute commands on the SP without
being prompted for a password, if that user has installed the associated private key
on the client.
Note – Support is available for SSH protocol version 2 key types (RSA or DSA) only.
Only local users can add public keys. Users who obtain authorization from directory
services group mappings are not able to add public keys.
Local admin-level or manager-level users can add public keys using the accessadd public key command:
58Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
# access add public key -l PUBLIC_KEY_FILE [-u user]
The public key file is your RSA or DSA key. Up to 10 users can install public keys;
only one key per user is allowed.
Admin-level users can only add their own public key. Manager-level users can add a
public key for any local user. If the user is not specified in the command, the current
user is the default.
Note – The maximum supported key length is 4096 bits.
Generating a Host Key Pair
To establish a trusted host relationship, you must set up a host key, which is used to
authenticate one host to another. Follow these steps to generate a host key pair by
copying the public key to the SP to which you want passwordless access:
1. Execute the following command:
# ssh-keygen -t rsa -N
2. Accept the default values, installing to the following directory:
$HOME/.ssh/id_rsa
The following files are created:
$HOME/.ssh/id_rsa
$HOME/.ssh/id_rsa.pub
Enabling SSH Access Using Trusted Hosts
Follow these steps to add users to the local /etc/password file to attempt trusted host
access to the Service Processor:
1. Set up your host keys by executing the following command:
# ssh-host-config
2. Enable access for clients by launching a Bash shell.
■ If you want all network accounts added, execute mkpasswd >> /etc/passwd.
■ If you want just local accounts added, execute mkpasswd -l >> /etc/passwd.
3. Issue the following commands as a manager-level user on the client to establish a
trusted host relationship (manager1 is used in the example in this step):
From this point, any user with the same login on both sp.test.com and
client.test.com has access without requiring a password to the like-namedaccount on sp.test.com.
4. Create or modify the file /etc/ssh_config to ensure it contains the following
entry:
Host *
HostbasedAuthentication yes
Enabling SSH Access Using Public Keys
Follow these steps to install public keys to enable SSH access.
1. Set up your host keys. Refer to “Generating a Host Key Pair” on page 59.
2. Install your public key using the access add public key command.
3. Run the following command:
# ssh-keygen -t rsa -NThis command generates ~/.ssh/id_dsa and ~/.ssh/id_dsa.pub.
4. Run the following command:
# scp ~/.ssh/id_rsa.pub SP_IP:/tmp
Enter your password when prompted.
5. Run the following command:
# ssh SP_IP access add public key -k /tmp/id_rsa.pub
Enter your password when prompted.
6. Run the following command:
# ssh SP_IP rm -f /tmp/id_rsa.pub
From this point, you have access without requiring a password.
60Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Guidelines for Writing Server Management
Command Scripts
This section describes some basic guidelines for managing your systems by writing
scripts for remote execution on one or more SPs.
■ Shell Scripts: You should be familiar with standard shell scripting. Refer to
“Using Shell Scripts” on page 56.
■ SSH: You must currently use an SSH (Secure Shell) client to execute automated
command scripts. Refer to “Remote Scripting Using SSH” on page 56.
■ Authentication: To avoid being prompted each time you run a script on an SP,
upload a public key or trusted host key to each SP. Refer to “Creating Trusted
Host Relationships” on page 58 and “Adding Public Keys” on page 58.
■ Authorization Levels: Access changes (such as adding users or uploading keys)
typically requires manager-level access while most other management tasks can
be performed by an administrator level user.
■ Return Codes: Every subcommand returns a return code upon completion.
■ Nowait Argument: Most commands complete their execution fairly quickly and
are therefore performed synchronously. For some longer operations (such as
rebooting the platform) a --nowait option is provided so that a script can
initiate the operation without waiting for it to return.
■ Quiet Argument: The delete and update operations (such as access delete
user, sp delete event) accept multiple targets. To ensure a certain set of
targets is deleted on a set of SPs, you can use the --quiet argument to suppress
errors if one of the targets is not found, or to suppress interactive warning
messages from the platform command.
Command Output
The following list defines common general output:
■ Commands that complete successfully return 0 with no success return string.
Some exceptions are commands that also return vital information.
■ Table output, interactive warnings, and any other non-error messages are directed
to standard output.
■ Commands that return errors display the return codes and a descriptive error
string.
Following are common characteristics of table output from a get command:
■ Heading columns are provided by default for output with more than one column.
■ Single column output does not include a heading.
■ To suppress headings, use the -H argument.
Chapter 4 Further Management Information61
■ Data for each column is left-aligned with at least one space between columns.
Numeric data might be right-aligned.
■ The -D argument allows you to specify a delimiter character when scripting. This
is very useful in parsing fields with white space.
■ If all lines have the same number and type of data values, each row is printed to
a separate line so variable data can be parsed easily. For example, executing
access get users -g monitor returns a list of monitor users each on a
separate line.
■ Commands that return multiple columns (such as inventory get hardware) may
have a minimal default set of columns and a --verbose argument to display all
columns. Some commands include arguments that allow you to select specific
columns to output.
Other Tips For Best Results
■ Externalize the set of SP IP addresses into a file to be shared across all of your
scripts.
■ Consider using a script to create the initial manager account and upload its public
key on your SPs.
■ Test the output and return codes of each command manually by using SSH to log
in to the SP and run the commands individually.
■ Test your scripts on a single staging machine before applying them to your
remaining machines.
■ To configure all of your SPs identically, consider configuring a single SP and then
using the sp load settings command to synchronize that configuration on
the remaining machines.
Note – If running the script from the SP, there are a limited number of commands
(not a full bash environment).
62Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Console Redirection Over Serial on a
Linux-based Server
Caution – Redirecting the console over serial is a procedure intended for advanced
users of Linux only.
You can seriously disrupt the proper functioning of the server or render the server
unbootable if you introduce a problem in the configuration files.
Note – Instructions for console redirection on a Solaris-based server are not yet
available.
Redirecting the console interaction over the serial port allows the user another
method to monitor the server. The goal of these configurations is to configure the
bootloader to redirect its output, pass the kernel the proper parameters, and
configure a login session on the serial port.
This section describes how to configure these options.
The BIOS redirects console output to serial by default (9600, 8N1, no handshake)
until a bootloader program is run from the hard disk drive. The bootloader must be
configured to support the serial console in addition to the keyboard, video, and
mouse (KVM) console.
Two common bootloaders are grub and Linux Loader (LILO).
Caution – Do not edit the working-image section of your configuration files
directly.
Copy the working-image section and paste it within the configuration file. Make
your editing changes to this copied section.
Chapter 4 Further Management Information63
grub
If you use grub, there are three steps to enable console redirection over serial; these
steps all involve editing the grub configuration file:
■ If you are using Red Hat Linux, the grub file is /etc/grub.conf.
■ If you are using SUSE Linux, the grub file is /boot/grub/menu.1st.
Note – On Red Hat Linux systems, the file /etc/grub.conf might be a symbolic
link to the file /boot/grub/grub.conf.
1. Pass the proper console parameters to the kernel.
2. Configure the grub menu system to redirect to the proper console.
3. Remove any splash images that would prevent the proper serial-console display.
For more information on the parameters, refer to the file kernel-parameters.txt
in your kernel documentation.
For more information on grub, run the command info grub.
Note – If the arrow keys do not work through your remote serial concentrator, you
can use the keystroke combinations of <CTRL+P> and <CTRL+N> to highlight the
Previous and Next entry, respectively. Pressing Enter then boots that entry.
The parameter console=ttyS0 tells the system to send the data to the serial port
first. The parameter console=tty0 tells the system to send the data to the KVM
second.
64Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
A working-image section in your grub configuration file should have an entry for
the kernel image to boot. The stock kernel entry looks like:
kernel /vmlinuz-kernel_revision ro root=/dev/sda5
where kernel_revision is simply the kernel version that you are using.
1. Change the stock kernel entry of your image to include the console-kernel
parameters, as follows:
Note – These options should all be on one line with no wrap to a second line.
2. Add the following two lines to the top of your grub configuration file:
serial --unit=0 --speed=9600
terminal serial console
Adding these two lines at the beginning of the file sets up your serial port or your
KVM as your grub console so that you can remotely or locally select a boot image
from the grub menu.
3. Comment out or remove the following line from your grub configuration file:
splashimage=(hd0,1)/boot/grub/splash.xpm.gz
Removing the splashimage line allows for greater compatibility during your serial
connection; with this line removed, the splash image does not prevent the proper
grub menu from displaying.
LILO
LILO uses the append feature in an image section in order to pass to the kernel the
proper parameters for using the serial console.
1. Enter the consoles in the append statement of the file /etc/lilo.conf:
append="console=ttyS0,9600 console=tty0"
2. After modifying the file /etc/lilo.conf, run lilo from the command line to
activate the change.
For more information on LILO, run the commands man lilo or man lilo.conf.
Chapter 4 Further Management Information65
getty
You can run a service called getty to enable login on the serial interface.
To enable getty, append the following line to the list of gettys in the
/etc/inittab file:
7:12345:respawn:/sbin/agetty 9600 ttyS0
Note – It does not matter where you append this line in the list.
Note – Make certain that the first number is unique within the inittab file.
The list of gettys currently looks like the following:
# Run gettys in standard runlevels
1:2345:respawn:/sbin/mingetty tty1
2:2345:respawn:/sbin/mingetty tty2
3:2345:respawn:/sbin/mingetty tty3
4:2345:respawn:/sbin/mingetty tty4
5:2345:respawn:/sbin/mingetty tty5
6:2345:respawn:/sbin/mingetty tty6
securetty
To add the serial-console device /dev/ttyS0 to the file /etc/securetty,
run the following command:
# echo ttyS0 >> /etc/securetty
66Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Enabling and Configuring BIOS Console
Redirection
Note – Console redirection is enabled by default in the BIOS.
If the default settings have been changed in the BIOS, the following procedure
explains how to change the console-redirection settings.
1. Boot or reboot the server.
2. When prompted, press <F2> to enter BIOS setup.
3. Select the Advanced menu from the category selections along the top.
4. Select Console Redirection.
Note – Make note of all settings in this menu, as they are required for configuring
the remote-console access and the Serial Over LAN (SOL) feature.
5. Select I/O Device Configuration.
6. Select On-board COM A from the Port option to enable console redirection to
serial.
Ensure that COM A is enabled on I/O port 3F8, FRQ4.
■ To change the baud rate, you can select the desired bit rate from the Baud Rate
option.
■ To disable console redirection to serial, you can select Disabled from the Port
option.
7. Save the changes to the BIOS settings.
8. Press <F10> to exit the BIOS setup.
For the new settings to take effect, you must reboot the server.
Chapter 4 Further Management Information67
Network Share Volume (NSV) CD-ROM
A network share volume (NSV) structure is included with the server on the Sun Fire
V20z and Sun Fire V40z Servers Network Share Volume CD.
Although the SP functions normally without access to an external file system, a file
system is required to enable several features, including event log files, software
updates, diagnostics, and the troubleshooting dump utility. You can configure the
NSV to be shared among multiple SPs. Admin- and manager-level users can
configure the external file system; regular users can only view the current
configuration.
The following software components are included with the server:
■ Platform BIOS
■ SP base software
■ SP value-add software
■ Update file for downloading Java Runtime Environment (JRE) packages
■ Network share volume software, which includes diagnostics
■ Platform software
■ Motherboard platform drivers
All of these software packages are packaged with the NSV and are installed on the
file server when the external file system is installed and configured.
For instructions on extracting and installing the NSV software, refer to the Sun FireV20z and Sun Fire V40z Servers Installation Guide.
Network Share Volume Structure
The following compressed packages are included with your server on the Sun Fire
V20z and Sun Fire V40z Servers Network Share Volume CD:
TABLE 4-1Network Share Volume Compressed Packages
File NameFile Contents
nsv_V2.1.0.x.zipService processor software
nsv-redhat_V2.1.0.x.zipDrivers for Red Hat Linux OS
nsv-solaris9_V2.1.0.x.zipDrivers for Solaris 9 OS
nsv-suse_V2.1.0.x.zipDrivers for SUSE Linux OS
68Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
When extracted, the compressed packages in TABLE 4-1 populate the following files
on the NSV:
/mnt/nsv/
diags
logs
scripts
snmp
spupdate
sw_images (this folder appears after you extract one of the OS-specific Zip files)
TABLE 4-2Extracted Files on the Network Share Volume
File NameDescription
diagsOffline location of the server diagnostics.
logsOffline location of the log files for the SP.
scriptsSample scripts that can be used for scripting commands.
snmpSNMP MIBS. Refer to the Sun Fire V20z and Sun Fire V40z
Servers, Server Management Guide for details.
spupdateThe server for updating the SP. Refer to the Sun Fire V20z
and Sun Fire V40z Servers, Server Management Guide for
details.
sw_imagesContains a directory hierarchy of OS-specific drivers and
files.
Chapter 4 Further Management Information69
Serial Over LAN
The Serial Over LAN (SOL) feature lets servers transparently redirect the serial
character stream from the baseboard Universal Asynchronous Receiver/Transmitter
(UART) to and from the remote-client system over LAN. Serial over LAN has the
following benefits compared to a serial interface:
■ Eliminates the need for a serial concentrator.
■ Reduces the amount of cabling.
■ Allows remote management of servers without video, mouse, or keyboard
(headless servers).
Serial over LAN requires a properly configured LAN connection and a console from
which an ssh session can be established.
In a Linux environment, you can use a shell such as csh or ksh as your console.
This console works well in a scripting environment in which you might want to
monitor many servers.
Enabling or Disabling the SOL Feature on the Server
Note – When the SOL feature is enabled, you cannot access the server through the
external DB9 serial port (COM A).
Note – The variable spuser is the user account created when securing the SP. The
variable spipaddr is the IP address assigned to the SP.
For more information, see “Initial Setup of the Service Processor” on page 9.
You can enable or disable the SOL feature through the SP.
70Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Note – Ensure that the baud rate value passed to the -S argument matches the
speed that was specified for the serial redirection feature of the BIOS and the speed
used for your boot loader and OS configuration.
Disabling the SOL feature
To disable the feature, run the following command:
# ssh -l spuser spipaddr platform set console -s platform
Launching an SOL Session
To launch an SOL session, run the following command:
# ssh spipaddr -l spuser platform console
Terminating an SOL Session
To terminate an SOL session:
1. Press Control-E.
2. Press the C key.
3. Press the period key (.).
You can also terminate an SOL session by terminating the ssh session:
1. Press Enter.
1. Press the tilde key (~).
2. Press the period key (.).
Chapter 4 Further Management Information71
72Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
APPENDIX
A
Server Management Commands
Summary
The service processor (SP) includes a suite of commands that enables management
and monitoring of the server; this suite of commands is referred to as the server
management commands.
Note – This appendix provides an overview of the server management command
types that are available on the SP. For a detailed description of the subcommands,
arguments and return codes for each command type, refer to the appendixes in this
guide, as described in TABLE A-1.
73
Using the ssh Protocol
You must use ssh to execute these commands on the service processor (SP). There
are two ways to do this:
■ Use the interactive shell on the SP.
■ Preface each command with a set piece of text.
Interactive Shell on the SP
To use the interactive shell:
● Log into and authenticate on the interactive shell by running the command:
# ssh -l spipaddr spuser
Preface Text
● Preface each command with the following text:
# ssh -l spipaddr spuser
74 Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Commands
The server management commands take arguments, perform one or more actions,
and display the result or text to the standard output device. Commands are grouped
by similar function; each command has numerous subcommands supporting
functions within that grouping
Note – Every command (except help) returns a return code upon completion. See
“Return Codes” on page 76 for a summary.
TABLE A-1Server Management Commands
CommandDescription
accessAllows the authorized user to manage and monitor access
control and security features of the SP, such as users,
groups, SSL, and so on.
See Appendix B, “Access Commands.”
diagsManages diagnostics tests that are included with your
server.
See Appendix C, “Diagnostics Commands.”
inventoryAllows the authorized user to monitor hardware and
software inventory information.
See Appendix D, “Inventory Commands.”
ipmiManages IPMI functions.
See Appendix E, “IPMI Commands.”
platformAllows the authorized user to manage and monitor
platform activities, such as rebooting the platform
operating system, gathering system status, and so on.
See Appendix F, “Platform Commands.”
.
Appendix AServer Management Commands Summary75
TABLE A-1Server Management Commands
CommandDescription
sensorReports or sets the value of an environmental sensor or
control.
See Appendix G, “Sensor Commands.”
spAllows the authorized user to manage and monitor the SP
configurations, such as networking, external file system,
SNMP, SMTP, SSL, event logs and so on.
See Appendix H, “Service Processor Commands.”
helpReturns the following text:
Available Commands: platform, access, sp,
sensor, inventory, ipmi. Each of these
commands includes a help option (--help).
Return Codes
Every subcommand returns one or more of the following return codes upon
completion. Refer to the following appendices in this user guide for each
subcommand and the corresponding return codes for that subcommand.
TABLE A-2Return Codes (1 of 2)
Return CodeIDDescription
NWSE_Success0Command successfully
completed.
NWSE_InvalidUsage1Invalid usage: bad parameter
usage, conflicting options
specified.
NWSE_RPCTimeout2Request was issued, but was not
serviced by the server. RPC
procedure timed out and the
request may or may not have
been serviced by the server.
NWSE_RPCNotConnected3Unable to connect to the RPC
server.
NWSE_InvalidArgument4One or more arguments were
incorrect or invalid.
NWSE_NotFound5Entity (user, service, file, path,
etc.) was not found.
76 Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
TABLE A-2Return Codes (2 of 2)
Return CodeIDDescription
NWSE_NoPermission6Not authorized to perform this
operation.
NWSE_MissingArgument7Missing argument(s).
NWSE_NoMemory8Insufficient memory.
NWSE_Busy9Device or resource is busy.
NWSE_NotImplemented10Function not implemented.
NWSE_RPCConnected11RPC client already connected.
NWSE_RPCConnRefused12RPC connection refused.
NWSE_NoRouteToHost13No route to host (network down).
NWSE_HostDown14Host is down.
NWSE_UnknownError15Miscellaneous error not captured
by other errors.
NWSE_GatewayOffNet16Gateway address is not on
network.
NWSE_NetMaskIncorrect17An inappropriate netmask was
specified.
NWSE_FileError18File open, file missing, or a read
or write error occurred.
NWSE_Exist19Entity (user, service or other)
already exists.
NWSE_NotRecognized20Request not understood.
NWSE_NotMounted21File system is not mounted.
NWSE_InvalidOpForState22Invalid operation for current
state.
NWSE_TimedOut23Operation timed out.
NWSE_ServiceNotAvailable24Requested service is not available.
NWSE_DeviceError25Unable to read or write to the
device.
NWSE_LimitExceeded26Limit has been exceeded.
Appendix AServer Management Commands Summary77
78 Sun Fire V20z and Sun Fire V40z Servers, Server Management Guide • May, 2004
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.