In order to take XSCF snapshot,login to server console.
Note:You should have platadm or fieldeng privileges to run snapshot.
This procedure applplicable to the below mentioned servers.
Sun SPARC Enterprise M9000-32 Server
Sun SPARC Enterprise M3000 Server
Sun SPARC Enterprise M4000 Server
Sun SPARC Enterprise M9000-64 Server
Sun SPARC Enterprise M5000 Server
From the server XSCF prompt, run the below command. And specify the your destination server location to store the snapshot.
XSCF> snapshot -L F -t test@101.25.114.11:/home/test
Downloading Public Key from '101.25.114.11'...
Public Key Fingerprint: 68:5a:d9:02:1b:62:c9:a8:95:1a:52:31:9c:c4:82:b0
Accept this public key (yes/no)? yes
Enter ssh password for user 'test' on host '101.25.114.11':
Setting up ssh connection to test@101.25.114.11...
Collecting data into test@101.25.114.11:/home/test/myglobal-xscf_2012-05-07T19-32-15.zip
Data collection complete
XSCF> exit
Assumption:
Destination host to save snapshot:101.25.114.11
user name:test
Path to save file:/home/test.
Once the snapshot has been done,then you can upload it Oracle using the below method.They will anaysis the snapshot and help you to fix the issue.
ftp supportfiles.sun.com
login: anonymous
password: "email address which used for rasing the oracle SR."
cd cores
put snapshot_file
bye
To run the xscfextended module in non-interactive mode, you need to setup the Explorer host.You setup an Explorer host by creating the input file xscfinput.txt in the ${XPL_ETC} directory, the file should be owned by user root and its permissions should be 0400 or 0600. A line in the xscfinput.txt file can be a type T, type X or type A:
- T: T <KEY> <XSCF password>, used by all sections in .explorer with same KEY, if XSCF password is needed, not in scope for this document
- X: X <HST> <USR> <XSCF password>, used by section in .explorer, if XSCF password is needed, not in scope for this document
- A: A <ARCH_HOST> <ARCH_USER> <section_header> <ARCH_USER password>, used to search section in .explorer, then connect to XSCF
How to run XSCF snapshot from Operating system ?
Like other SUN servers,console snapshot can be produced from OS itself.The necessary files has been included in Oracle Explorer STB bundles.When you are starting the Explorer ,you just need to mention option -w xscfextended, it is capable of collecting a Snapshot on the specified XSCF(s).
1.In a order to get XSCF snapshot from explorer,user “explorer” must be present in XSCF console with privileges of platadm & explorer.If not add it using below method.
XSCF> adduser explorer
XSCF> setprivileges explorer platadm
XSCF> password explorer
New XSCF password:
Retype new XSCF password:
2.Verify explorer user login on XSCF was added and the correct permissions were applied.
XSCF> showuser explorer
User Name: explorer
UID: 100
Status: Enabled
Minimum: 0
Maximum: 99999
Warning: 7
Inactive: -1
Last Change: May 27, 2013
Password Expires: Never
Password Inactive: Never
Account Expires: Never
Privileges: platadm
3.As root on the host, establish the known_hosts entry on the explorer host for the XSCF.
# ssh -l explorer 192.168.2.11
The authenticity of host '192.168.2.11 (192.168.2.11)' can't be established.
RSA key fingerprint is 70:d0:64:fb:4g:89:5b:b0:f0:ef:7b:41:71:3f:44:b9.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.2.11' (RSA) to the list of known hosts.
explorer@192.168.2.11's password:
Last login: Thu May 27 13:47:31 2013 from sfos
XSCF>
4.As root,Generate a new dsa key, with empty pass phrase.
bash-3.00# ssh-keygen -t dsa
Generating public/private dsa key pair.
Enter file in which to save the key (//.ssh/id_dsa):
Created directory '//.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in //.ssh/id_dsa.
Your public key has been saved in //.ssh/id_dsa.pub.
The key fingerprint is:
55:65:70:0c:84:be:00:41:1a:1e:34:7f:aa:8b:04:08 root@sfos
In some cases,your system may already have DSA keys on the host.you can see DSA key using below method.
bash-3.00# cd .ssh/
bash-3.00# ls -lrt
total 6
-rw------- 1 root root 668 May 27 10:33 id_dsa
-rw-r--r-- 1 root root 599 May 27 10:33 id_dsa.pub
bash-3.00# cat id_dsa.pub
ssh-dss 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 root@sfos
bash-3.00# pwd
/.ssh
bash-3.00#
5. Login to XSCF using explorer and Copy the contents of id_dsa.pub .
XSCF> setssh -c addpubkey
Please input a public key:
ssh-dss AAAAB3NzaC1kc3MAAACBAKQ/Ydlwgzs6lNx+JGzRawdmP/pFncZ0P27t3dNH/hkuiSY0JrY5usUY7dUgqu/
/ThgttTXnWAJTeAjGLGMgVo1h/sBdpNtEY5MufVrJ/oICNI33g1J4fBhxQfmd0LH2CjGSdZNvQ/6qMMfHBPAEelYvlo
tpYguDG1KhfDIuZg//AAAAFQCYX7Q30TUYHrdbQGYFcGaHCND2ywAAAIBtU908tZBGoOTmY9juLAFPAQkJ8lFcm4h30
AgMl5Ub7XtgZPvY4M0eLeC1SQGWpGemjRws5dTohApOt3JeikmiyhKoy+yM2VnZ3626k2Qf4Pq3G5DEMzqPH+UQ9bbv
MqtV+MRTutzwGrcS58xHXi3/Ix1YoGYHcf0CURdrNnHVaAAAAIAgT9I0XbiBC0gUa959/FsseZMWqintxJCRA0Ozalfo
0BMFnxnEqHD3hAgY9GBjpF11090P27tsinNB8Qda/83hkCSSi3DhJNJh925kSVtkR7PyrmGo6cpbs79qfMVpJtlbnXho
DRIPGJfyPxisjmZJJaja3/3b4zcUw8Kbb7YeHQ== root@sfos
<Enter>
<Control-d>
6.Now you will able to login from root@sfos to XSCF using explorer account without password.
# id
uid=0(root) gid=0(root)
# ssh -l explorer 192.168.2.11
Last login: Thu May 27 14:17:32 2013 from sfos
XSCF>
7.Setup archiving from the XSCF to the explorer host.
XSCF> setarchiving disable
XSCF> setarchiving -k download -r -t root@192.168.2.120:/usr/rob
Fingerprint: 27:5e:08:5a:34:7c:3e:7b:45:d8:75:7a:43:21:8a:d2
Accept this public key (yes/no) yes
Enter ssh password for root@192.168.2.120:
XSCF> setarchiving enable
Testing the archiving configuration...
Logs will be archived to 192.168.2.120
8. Test the connectivity via snapshot -T -D from XSCF console.
XSCF> snapshot -T -D /opt/SUNWexplo/tmp
Setting up ssh connection to root@192.168.2.120...
Collecting data into root@192.168.2.120:/opt/SUNWexplo/tmp/v4u-m5000a-xscf0_192.168.2.11_2013-05-27T22-21-23.zip
Data collection complete
XSCF>
9.Now you can test our work from OS.
# chmod 1777 /opt/SUNWexplo/tmp
# cd /opt/SUNWexplo/bin
# ./explorer -w xscfextended,default
May 27 07:46:02 v4u-m5000a-dom00[25803] explorer: explorer ID: explorer.809210d0.v4u-m5000a-dom00-2013.05.27.14.46
May 27 07:46:02 v4u-m5000a-dom00[25803] patch: RUNNING
May 27 07:46:02 v4u-m5000a-dom00[25803] pkg: RUNNING
May 27 07:46:22 v4u-m5000a-dom00[25803] sysconfig: RUNNING
.
.
May 27 07:46:52 v4u-m5000a-dom00[25803] xscfextended: RUNNING
Type return to end the list Remote hostname or IP address:
10.When prompted for IP address & host; Supply the IP address of the xscf and user explorer
Remote hostname or IP address: 192.168.2.11
Remote username:explorer
If you do not want to prompt for IP address & explorer,have /etc/opt/SUNWexplo/xscfinput.txt with host/login combinations to automate the snapshot.
New Oracle explorer can be download from oracle website.
Thank you for reading this article.please leave a comment if you have any doubt. I will get back to you.
Leave a Reply