FDT Users Guide
FDT Users Guide
2 Installing FDT
Install the FDT Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Core FDT and Service Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Hot Fixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Update NPS (if applicable) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Time Estimation Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
Power Cycle the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8
3 Firmware Updates
Check the System Firmware Revisions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Resolve sys_rev_check Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Host - All systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
RPC - N3001-002 and larger, N200x, and N1001. . . . . . . . . . . . . . . . . . . . . . . 3-5
MM - All systems (except N3001-001) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Gig Switch - All systems (except N3001-001) . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
i
SAS Switch - N1001 and 100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Rack Switch Management - N3001-002 and larger, N200x, and N1001 . . . . . . . 3-6
Rack Switch Fabric - N3001-002 and larger, N200x, and N1001 . . . . . . . . . . . . 3-6
Chassis Power Supply - All systems (except N3001-001) . . . . . . . . . . . . . . . . . . 3-7
S-Blade - All systems (except N3001-001) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Storage Enclosure - N3001-002 and larger, N200x, and N1001 . . . . . . . . . . . . . 3-8
Storage Media - All systems (except N3001-001). . . . . . . . . . . . . . . . . . . . . . . . 3-8
Prepare the System for Firmware Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Transition an N3001/N200x/N1001 System to Maintenance Mode . . . . . . . . . . . 3-8
Prepare a Netezza 100 System for Firmware Updates . . . . . . . . . . . . . . . . . . . . 3-10
Install the Firmware Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Group 1 - AMM Firmware - All systems (except N3001-001). . . . . . . . . . . . . . . 3-11
Group 1 - S-Blade and HBA Firmware - All systems (except N3001-001) . . . . . . 3-13
Group 2 - GigSwitch Firmware - N3001-002 and larger, N200x, and N1001 . . . 3-17
Group 2 - Rack Management Switch Firmware - N3001-002+/N200x/N1001. . . 3-18
Group 2 - Rack Fabric Switch Firmware - N3001-002 +, N200x, and N1001. . . 3-19
Group 2 - PDU Firmware - N3001-002 and larger, N200x, and N1001 . . . . . . . 3-20
Group 3 - Disk Firmware - All systems (except N3001-001) . . . . . . . . . . . . . . . 3-21
Group 3 - ESM Firmware - N3001-002 and larger, N200x, and N1001 . . . . . . . 3-21
Group 4 - Host Firmware - All systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22
Power Cycle the SPAs and Enclosures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28
Verify the System Revision Checks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-29
Restore the System to Normal Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31
Restore an N3001/N200x/N1001 System to Clustering Operations . . . . . . . . . . 3-31
Restore an IBM Netezza 100 System to Normal Operations . . . . . . . . . . . . . . . . 3-33
ii
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
firmware_updater Host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Applicable Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
Usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
firmware_updater RackFabSwitch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Applicable Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9
firmware_updater RackMgtSwitch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Applicable Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11
firmware_updater StorageEnclosure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Applicable Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13
Usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13
firmware_updater StorageMedia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Applicable Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15
iii
Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15
storage_diags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
Applicable Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
system_diags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Applicable Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-20
Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-20
concheck Sample Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21
DataPathCheck Sample Output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-23
sys_rev_check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-30
Applicable Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-30
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-30
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-30
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-30
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
getservicedata.pl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Applicable Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-35
iv
v
vi
Preface
This guide includes a series of procedures you must follow to install, upgrade, and use FDT
on an IBM® PureData or Netezza appliance. Where possible, the procedures are listed in
the order in which you would perform them. Additionally, a chapter on command options is
included.
Topics See …
Requirements you must meet and procedures to per- “Before Installing FDT” on
form before installing FDT on an appliance. page 1-1
vii
If You Need Help
If you are having trouble using the IBM appliance, you should:
1. Retry the action, carefully following the instructions given for that task in the
documentation.
2. Go to the IBM Support Portal at: http://www.ibm.com/support. Log in using your IBM
ID and password. You can search the Support Portal for solutions. To submit a support
request, click the Service Requests & PMRs tab.
3. If you have an active service contract maintenance agreement with IBM, you can con-
tact customer support teams via telephone. For individual countries, visit the Technical
Support section of the IBM Directory of worldwide contacts
(http://www14.software.ibm.com/webapp/set2/sas/f/handbook/contacts.html#phone).
Related Documentation
In addition to this FDT User’s Guide, every release of FDT includes Release Notes that are
available in the FDT package as well as on IBM Support Fix Central. The Release Notes
describe new features, fixed customer-reported issues, known issues, and sys_rev_check
versions.
viii
CHAPTER 1
Before Installing FDT
What’s in this chapter
What’s New
What’s Needed
Identify Current Versions
Determine the Active Host
Check System Health
Update the HPF Release Prior to FDT Installation
This chapter describes how to prepare the following appliances for an FDT upgrade:
IBM PureData System for Analytics N3001
IBM PureData System for Analytics N2001/N2002
IBM PureData System for Analytics N1001 or IBM Netezza 1000
IBM Netezza 100
Note: Throughout this guide, the IBM PureData System for Analytics N2001/N2002 is ref-
erenced as the N200x; the IBM PureData System for Analytics N1001 and IBM Netezza
1000 are referenced as the N1001.
Always refer to the Release Notes included with the FDT media to learn about what has
changed in this release as well as known issues that may affect firmware upgrades, and any
work-arounds for those issues. The Release Notes occasionally refer to RTC work items for
work-arounds, so a login to RTC is needed access the work items.
What’s New
FDT 4.3.1 introduces support for the N3001-001 appliance.
FDT 4.3 introduced updated firmware for the following components:
S-Blades (HS22, HX5, and HS23)
Hosts (HS22, x3650-M2, x3650-M3, x3650-M4, x3650-M4-HD, x3750-M4, x3750-
M4v2, x3850-X5)
AMM
BNT G8264 switch
N3001-002 and larger chassis 10Gb Switch
Hard disk drives
1-1
IBM Netezza FDT User’s Guide
What’s Needed
To complete all the tasks in this guide, the following items are required (available from IBM
Support Fix Central).
The FDT 4.3.1 downloaded package or media
If HPF or NPS needs to be updated, the downloaded package(s) or media for the
upgrade(s)
Prerequisites
The following table lists, by priority, the prerequisites of the FDT upgrade.
Table 1-1: Prerequisites to FDT Upgrade
Minimum N3001-002
Netezza 100 N1001 N2001 N2002 N3001-001
Requirement and larger
* For IBM Netezza 100 systems, the process to update the GigSwitch firmware requires
media and physical access. You must provide physical access to the system and a KVM or
other connection to the system.
** Maintenance mode not required when firmware update performed through replacespu
(during S-Blade servicing).
Full System Backup - As a best practice, you should perform a full system backup prior to
performing any upgrade procedures. This includes the database disk drives as well as the
host disk drives.
If upgrades to minimum levels are required, always upgrade in this order:
HPF
Host Management (minimum rev. 5.4)
Service_tools
FDT
Netezza software
If you do not need to upgrade all of the components, keep the same order but omit the
component(s) not required.
You must be familiar with Linux commands such as tar and running scripts from a com-
mand prompt. To idle the system for maintenance, you must be familiar with commands
such as nzstop and nzstart, and also the heartbeat and DRBD management commands,
which are documented in the System Administrator’s Guide.
If your system requires firmware updates, schedule a maintenance window where you can
take the system offline to perform the firmware updates. Users will be unable to access the
system for queries during the downtime.
+ Kernel : 2.6.32-431.17.1.el6.x86_64
+ HealthCheck : 2.3.1.2 [20150311221708]
+ Hostname : NZ35112-H1
+ NPS Up Time: 3 days, 4 hrs, 4 mins, 43 secs
+ Host Up Time: rack1.host1 : 112 days 3 hours 48 minutes 10 seconds
+ Host Up Time: rack1.host2 : 103 days 1 hours 27 minutes 13 seconds
+ CallHome : No address information
Failures (2):
- Rule --+------ Issue ------+------ Component -----+- Severty --
SHC027 | Failed hardware | ...output omitted | Medium
SHC910 | Host disk's issue | rack1.host1.hos (...) |High|detected
- Rule --+------ Issue ------+------ Component -----+- Severty --
Rules - Policy rules - in the Rule column of the output - are troubleshooting rules that
are used for automatic analysis of system health and for proposing a relevant solution.
These rules cover the most frequent issues that are experienced in the field. You can
view a complete list of rules in a PDF document that is located on your system in /nz/
kit/share/nzhealthcheck/rules-doc.pdf. Note: Rule evaluation depends on the platform,
so not all rules may be evaluated on your system. The rules-doc.pdf document provides
detailed information about which platforms are supported by particular rules.
All System Health Check rules provide problem description and advice. Some of them
involve complex logic, for example, identifying the correct disk/SPU/enclosure balance.
The rules may depend on one another.
All rules have severity assigned:
High - Actionable issues that might be critical
Medium - Actionable issues
Low - The rules may help in problem investigation but they do not require immedi-
ate action
Run sys_rev_check
As user root, run sysrevcheck to verify that the system is configured correctly:
Change directory.
[root@host ~]# cd /opt/nz/fdt
Run the command:
[root@host ~]# ./sys_rev_check
This run of sys_rev_check is only to identify possible hardware issues. Results showing
firmware revisions, [PASS], [ABOVE], [PEND], or [BELOW], are to be ignored at this point.
The [FAIL] status indicates that the system has a hardware issue that you need to investi-
gate and resolve before you update the firmware. If the sys_rev_check command displays a
[FAIL] message, review the /opt/nz/fdt/log/sysrev_check_yyyymmdd_hhmmss.txt log file to
identify the cause of the [FAIL] status.
Continue to the next section to check system date slice issues. See the Netezza System
Administrator’s Guide for information on the nzhw command.
2. Type:
[root@host1 ~]# cat /nzlocal/scripts/version.txt
Example output:
Host Platform Configuration Version 4.11
2011-03-14.16224.dev-hpfConfig-xs2.cm.16224
3. If the version of HPF installed on the system does not meet the minimum version,
upgrade HPF. Instructions for upgrading HPF can be found in the Release Notes docu-
ment contained within the new HPF bundle.
2-1
IBM Netezza FDT User’s Guide
Example output:
Filesystem Size Used Avail Use% Mounted on
/dev/sda8 7.8G 2.5G 5.0G 33% /opt
If backups of FDT are present on the system, they are deleted during the installation,
creating additional free space: 600 MB for FDT 2.x, 1 GB for FDT 3.x, and 2 GB for
FDT 4.x. With the backups deleted, the system must have at least 2.3 GB available.
3. Perform one of the following steps depending upon whether you are installing from a
downloaded software image or from media:
If you are installing the FDT software from a downloaded software kit:
a. Save the compressed FDT tar file (named fdt-4.3.tar.gz) and the install file
(named install) on host 1 in a /tmp directory such as /tmp/fdt.
b. Change to the directory where you saved the files, and then to the fdt directory.
If you are installing the FDT software from media, place the media into the media
tray or USB port of the active host and type (commands vary according to system or
type of media):
[root@host1 ~]# mount /media/cdrecorder
or
[root@host1 ~]# mount /media/cdrom
or
[root@host1 ~]# mount /dev/sdb1 /mnt
5. Change directory:
[root@host1 ~]# cd /media/cdrom/service_tools
or
[root@host1 ~]# cd /media/cdrecorder/service_tools
or
[root@host1 ~]# cd /mnt/service_tools
or
If installing from a downloaded software kit, change to the directory where you saved
the files and then to the service_tools directory.
6. Enter the following command to install the service tools onto the Netezza active host:
[root@host1 ~]# ./install
7. If installing from disk media, type the commands:
[root@host1 ~]# cd
[root@host1 ~]# eject
8. Service Tools must be manually installed on the non-active host.
Log into the non-active host as the root user.
9. Do one of the following steps depending upon whether you are installing from the DVD
or from a downloaded software image:
If you are installing the software from a downloaded software kit:
a. Save the compressed tar file and the install file (named install) on the host in a
/tmp directory such as /tmp/service_tools.
b. Change to the directory where you saved the files, and then to the service_tools
directory.
If you are installing the software from the FDT DVD, place the media into the
media tray of the non-active host and type the following commands:
[root@host2 ~]# mount /media/cdrecorder
or
[root@host2 ~]# mount /media/cdrom
or
[root@host2 ~]# mount /dev/sdb1 /mnt
Then type:
[root@host2 ~]# cd /media/cdrecorder/service_tools
or
[root@host2 ~]# cd /media/cdrom/service_tools
or
[root@host2 ~]# cd /mnt/service_tools
10. Enter the following command to install the service tools onto the Netezza non-active
host:
[root@host2 ~]# ./install
11. If installing from disk media, type the commands:
[root@host2 ~]# cd
[root@host2 ~]# eject
12. Remove the media from the drive.
Hot Fixes
Downloads of independent component firmware packages are available from IBM Support
Fix Central. These packages allow for updating the firmware of individual components with-
out the need to download and install a complete core FDT package. Once the Hot Fix
package is downloaded and copied to a host server, it is installed using this process. After
installation, the firmware can be updated using the same firmware_updater process as if
the firmware was part of the core FDT package.
To install Hot Fix packages:
1. Download the interim fix package from IBM Support Fix Central.
2. Copy the package to portable media and then to the /tmp directory of the active host
server (or copy to the active host server over the network).
3. Unzip the package in the /tmp directory.
[root@host1 ~]# unzip package_name
For example:
[root@host1 ~]# unzip 1.0.0.1-IM-Netezza-FDT-IF71335
The output of the command lists the firmware packages in Hot Fix package.
4. To install the firmware package(s) (this does not mean that firmware is updated, only
loaded into the FDT directories), type the following commands and include the path-
names to all packages to be installed:
[root@host1 ~]# cd /opt/nz/fdt
[root@host1 ~]# ./firmware_updater --install-firmware <full
pathname to bundle(s)>
For example:
[root@host1 ~]# ./firmware_updater --install-firmware
/tmp/storagemedia_st1000nm001_firmware_20130101_111413.tar.gz
/tmp/storagemedia_st3100424SS_firmware_20130101_104833.tar.gz
Example output:
[root@host1 fdt]# ./firmware_updater --install-firmware /tmp/
storagemedia_st1000nm0001_firmware_20130101_111413.tar.gz /tmp/
storagemedia_st31000424ss_firmware_20130101_104833.tar.gz
--------------F I R M W A R E B U N D L E I N S T A L L---------------
INSTALL DATE COMPONENT BUNDLE NAME
2013/01/10 12:55:15 StorageMedia storagemedia_st1000nm0001_
firmware_20130101_111413.tar.gz
2013/01/10 12:55:15 StorageMedia storagemedia_st31000424ss_
firmware_20130101_104833.tar.gz
----------------------------------------------------------------------
Successfully added firmware to FDT.
To update firmware, run firmware_updater with the desired component to
update.
------------------------------------------------------------------
----
Note: If you later want to uninstall packages after they are installed, use the command
./firmware_updater --remove-firmware <bundle_name>
Firmware Time
Host About 60 minutes per system; however, the update could take
as long as 90 minutes, depending on host NIC configuration.
NOTE: Host firmware updates are required for this release.
(One reboot required)
To know the approximate time for the full FDT upgrade, you need the results of running
sys_rev_check. Once results from running sys_rev_check are obtained and components
requiring updated are identified, use the following table to estimate the total update time.
This version of FDT supports modular upgrades, allowing separate service windows for
updates, if necessary. Each group must be completed, at a minimum, within a service
window.
Table 2-2: Time Estimate Worksheet
Group UpdateTime =
Group UpdateTime =
3 ESM All
N200x/N1001 40 minutes
Group UpdateTime =
Group UpdateTime =
Total UpdateTime =
During the scheduled service window, follow the steps in the “Prepare the System for Firm-
ware Updates” on page 3-8 section to transition the system into maintenance mode, then
proceed to the “Install the Firmware Updates” on page 3-11 section to perform the
upgrades that your system requires. Finally, the “Restore the System to Normal Operations”
on page 3-31 section describes how to return the system to normal operation and restore
user access.
If system power is interrupted during the FDT update process, the hardware may be left in
a state that prevents further FDT updates or normal operation. Do not power off or remove
any component of the appliance during the FDT update process unless instructed to do so.
This chapter provides procedures needed to make firmware updates on an existing system.
2. Change to the directory that contains the system revision check software:
[root@host1 ~]# cd /opt/nz/fdt
3-1
IBM Netezza FDT User’s Guide
The [PASS] status indicates that the firmware is current and does not require an
update.
The [BELOW] status indicates that the component is running an older version of firm-
ware than what is provided by this FDT bundle, and you should update the firmware for
that component.
The [ABOVE] status indicates that the component is running a newer version of firm-
ware than what is provided by this FDT bundle. This is normally not an issue, but if an
unforeseen incompatibility is detected, it may necessitate downgrading the firmware to
the version provided in this FDT bundle. Only attempt a downgrade when directed to
do so by IBM Customer Support.
The [PEND] status indicates that a version of firmware has been loaded onto the sys-
tem, but it is not active yet, pending a reboot of the system. The number of
components with firmware pending a reboot is noted in the next line of the sys_rev_
check output.
The [FAIL] status indicates the system has a hardware issue that you need to investi-
gate and resolve before you update the firmware. If the sys_rev_check command
displays a FAIL message, review the /opt/nz/fdt/log/sys_rev_check.log file to identify the
cause of the FAIL status. For more information about sys_rev_check issues and their
meaning, see the section “Resolve sys_rev_check Issues” on page 3-4.
A [WARN] here indicates a version of firmware that is below the required level, and
must be updated using FDT Support Tools, not the firmware_updater utility. Examine
the log file for details on the firmware component that requires updating.
A sample of sys_rev_check output follows. Output varies depending on system type and
components.
Note: On N3001-002 and larger systems, if FDT Support Tools has been used to update
the Blade Ethernet firmware on the HS23 blades, the BLADE ETHERNET CHECK status is
[FAIL] if the firmware is loaded but the blades have not been rebooted, or [ABOVE] if the
blades have been rebooted and the firmware enabled. The [ABOVE] status is expected and
acceptable.
Note: The IMM check on some hosts may indicate IMM_REV as missing / [FAIL] status.
This indicates that the IMM needs to be updated using firmware_updater host or firmware_
updater host --update-bmc.
mm002 [PASS]
mm002alt [PASS]
----------------------------SPA GIG CHECK-----------------------------
gigsw01a [PASS]
gigsw01b [PASS]
gigsw02a [PASS]
gigsw02b [PASS]
----------------------------SPA SAS CHECK-----------------------------
sassw01a [PASS]
sassw01b [PASS]
sassw02a [PASS]
sassw02b [PASS]
------------------------RACK SWITCH MGT CHECK-------------------------
netswmgt01 [PASS]
------------------------RACK SWITCH FAB CHECK-------------------------
There are no FABRIC Switches installed
------------------------SPA POWER SUPPLY CHECK------------------------
SPA 01 [PASS]
SPA 02 [PASS]
-------------------------BLADE FIRMWARE CHECK-------------------------
spu0101 [PASS]
spu0103 [PASS]
spu0105 [PASS]
spu0107 [PASS]
spu0109 [PASS]
spu0111 [PASS]
spu0201 [PASS]
spu0203 [PASS]
spu0205 [PASS]
spu0207 [PASS]
spu0209 [PASS]
spu0211 [PASS]
-------------------------BLADE HARDWARE CHECK-------------------------
spu0101 [PASS]
spu0103 [PASS]
spu0105 [PASS]
spu0107 [PASS]
spu0109 [PASS]
spu0111 [PASS]
spu0201 [PASS]
spu0203 [PASS]
spu0205 [PASS]
spu0207 [PASS]
spu0209 [PASS]
spu0211 [PASS]
-------------------------BLADE ETHERNET CHECK-------------------------
spu0101 [PASS]
spu0103 [PASS]
spu0105 [PASS]
spu0107 [PASS]
spu0109 [PASS]
spu0111 [PASS]
spu0201 [PASS]
spu0203 [PASS]
spu0205 [PASS]
spu0207 [PASS]
spu0209 [PASS]
spu0211 [PASS]
------------------------------HBA CHECK-------------------------------
spu0101 [PASS]
spu0103 [PASS]
spu0105 [PASS]
spu0107 [PASS]
spu0109 [PASS]
spu0111 [PASS]
spu0201 [PASS]
spu0203 [PASS]
spu0205 [PASS]
spu0207 [PASS]
spu0209 [PASS]
spu0211 [PASS]
-----------------------STORAGE ENCLOSURE CHECK------------------------
SPA 01 Enclosure 1 [PASS]
SPA 01 Enclosure 2 [PASS]
SPA 01 Enclosure 3 [PASS]
SPA 01 Enclosure 4 [PASS]
SPA 02 Enclosure 1 [PASS]
SPA 02 Enclosure 2 [PASS]
SPA 02 Enclosure 3 [PASS]
SPA 02 Enclosure 4 [PASS]
--------------------------STORAGE MEDIA CHECK-------------------------
SPA 01 Enclosure 1 [PASS]
SPA 01 Enclosure 2 [PASS]
SPA 01 Enclosure 3 [PASS]
SPA 01 Enclosure 4 [PASS]
SPA 02 Enclosure 1 [PASS]
SPA 02 Enclosure 2 [PASS]
-------------------------------SUMMARY-------------------------------
Final status [PASS]
Total Failures 0
Total Revs Below 0
Total Rev Above 2
Main log file - /opt/nz/fdt/log/sys_rev_check_yyyymmdd-hhmmss.log
----------------------------------------------------------------------
If the final status of the sys_rev_check test is [PASS], all the firmware revisions have
“passed” and meet the latest criteria. Your system does not require any firmware updates
and you can skip the rest of this document.
Some of these issues are corrected using the procedures described in this guide; however,
some cases require Support assistance and/or physical access to the IBM Netezza system.
Contact IBM Netezza Support for issues relating to hardware problems and replacement, or
to upgrade procedures which are not documented in this guide.
You can review the final results log file to identify the cause of the non-PASS status for
components; the most common issues are a result of firmware that is below the minimum
required level.
Review the “Firmware Upgrade Time Expectations” on page 1-3 required for each type of
firmware update. Plan to schedule a service window when you can idle the system to
update the firmware. During the service window, use the next section, “Prepare the System
for Firmware Updates”, to begin the process to update the firmware.
Note: If the log file shows any hardware-related problems (indicated by [FAIL]), investigate
and fix those issues before you attempt to update the firmware, then re-run the sys_rev_
check command to obtain the latest status.
The following sections describe how to resolve conditions in the sys_rev_check output.
Note: The IMM check on some hosts may indicate IMM_REV as missing / [FAIL] status.
This indicates that the IMM needs to be updated using firmware_updater host of firmware_
updater host --update-bmc.
Note: On x3650-M1 (7979) and x3850-M2 (7233) hosts with NPS versions prior to 7.x,
sys_rev_check may indicate that RAID_FW component arcconf is not installed, with a
[WARN] status. This indicates that arcconf needs to be manually installed. A version of arc-
conf (and installation instructions) can be downloaded from the IBM Support Portal.
Note: The sys_rev_check output does not report on customer use PCI slots that may contain
networking cards added during or after system installation. For example, in hosts x3750-
M4 slots 1,2,3 are not reported, and in x3650-M4 slots 1,2,4 are not reported.
Use “Group 2 - PDU Firmware - N3001-002 and larger, N200x, and N1001” on
page 3-20.
Not applicable for Netezza 100 systems.
Note: For Netezza 100, see Replacement Procedures: IBM Netezza 100 Systems.
Note: On the N1001 and 100, there are two versions of BNT firmware supported for chas-
sis switches.
It is not possible to upgrade from the early version (5100) of BNT firmware to the lat-
est versions.
Field upgrades to the latest BNT firmware are supported only on the latest hardware. The
sys_rev_check utility identifies and passes both early and later versions of BNT firmware.
It is not possible to upgrade from the early version (1.1.1.5) of BNT firmware to the
latest versions.
Field upgrades to the latest BNT firmware is supported only on the latest hardware. The
sys_rev_check utility identifies and passes both early and later versions of BNT firmware.
SPU State
An issue here indicates that the remaining sections of sys_rev_check cannot be completed
without the system being online. Resolve any issues, bring the system online, and rerun
sys_rev_check to continue.
Firmware Check
A [BELOW] here indicates an older version of S-Blade firmware.
Use the procedure described in the “Group 1 - S-Blade and HBA Firmware - All systems
(except N3001-001)” on page 3-13 section of this document.
Hardware Check
A [FAIL] here indicates a hardware problem for an S-Blade; the S-Blade typically needs to
be replaced. Contact IBM Netezza Support for assistance with S-Blade hardware failures
and replacement.
Ethernet Check
A [BELOW] here indicates an older version of S-Blade Ethernet chip firmware.
Note: On N3001-002 and larger systems, if FDT Support Tools has been used to update
the Blade Ethernet firmware on the HS23 blades, the BLADE ETHERNET CHECK status is
[FAIL] if the firmware is loaded but the blades have not been rebooted, or [ABOVE] if the
blades have been rebooted and the firmware enabled. The [ABOVE] status is expected and
acceptable.
Use the procedure described in the “Group 1 - S-Blade and HBA Firmware - All systems
(except N3001-001)” section of this document.
HBA Check
A [BELOW] here indicates an older version of HBA firmware.
A [FAIL] here indicates that the HBA BIOS must be erased.
When you perform the steps in this section, the system will be unavailable to users until
after you upgrade the firmware and restore the system to normal operations.
Make sure that there are no hardware issues such as failed disks or S-Blades before you
begin. Use the nzhw -issues command to list any problems, and fix them before you
upgrade the firmware.
1. Establish a new login session to the active host using its Host 1 IP address (not the
cluster IP address).
2. As user nz on the active host, stop the system:
[nz@host1 ~]S nzstop
Stopping High-Availability services:
[ OK ]
3. As root on Host 1, confirm that there are no /nz or /export/home connections using the
lsof command:
[root@host1 ~]# lsof /nz /export/home
If the command displays any open connections, the nz.heartbeat.sh command will not
be able to unmount the DRBD partitions. You must close the open connections using
the kill command.
4. As root on the standby host, stop Heartbeat:
[root@host2 ~]# service heartbeat stop
Stopping High-Availability services:
[ OK ]
6. Run the following script in /nzlocal/scripts to make Host 1 ready for non-clustered
operations. The command prompts you for a confirmation to continue, shown as Enter
in the output.
[root@host1 ~]# /nzlocal/scripts/nz.non-heartbeat.sh
Example output:
---------------------------------------------------------------
Thu Jan 7 15:13:27 EST 2010
File systems and eth2 on this host are okay. Going on.
File systems and eth2 on other host are okay. Going on.
This script will configure Host 1 or 2 to own the shared disks and
own the fabric.
Press Enter.
Okay, we are proceeding.
Thu Jan 7 15:13:29 EST 2010
Filesystem 1K-blocks Used Available Use% Mounted on
/dev/sda6 16253924 935980 14478952 7% /
/dev/sda10 8123168 435272 7268604 6% /tmp
/dev/sda9 8123168 998808 6705068 13% /usr
/dev/sda8 8123168 211916 7491960 3% /var
/dev/sda7 8123168 500392 7203484 7% /opt
/dev/sda3 312925264 535788 296237324 1% /nzscratch
/dev/sda1 1019208 40192 926408 5% /boot
none 8704000 2228 8701772 1% /dev/shm
/dev/sda12 4061540 73940 3777956 2% /usr/local
/dev/drbd0 16387068 175972 15378660 2% /export/home
/dev/drbd1 309510044 5447740 288340020 2% /nz
Done mounting file systems
eth2:0 Link encap:Ethernet HWaddr 00:07:43:05:8E:26
inet addr:10.0.0.1 Bcast:10.0.15.255 Mask:255.255.240.0
UP BROADCAST RUNNING MULTICAST MTU:9000 Metric:1
Interrupt:122 Memory:c1fff000-c1ffffff
8. As the nz user on Host 1, confirm that the system is in the Stopped state as follows:
[nz@host1 ~]$ nzstate
System state is 'Stopped'.
Proceed to the steps in “Install the Firmware Updates” to perform any updates that are
required on your system.
Note: When updating firmware remotely it is recommended to use a screen session. In the
event that a connection is lost, reconnecting is possible by re-initiation of the session.
To open a screen session:
[root@nzhost1 ~]# screen
To re-initiate a screen session:
[root@nzhost1 ~]# screen -r
Firmware updates are now arranged by groups, with the highest priority groups to be
updated first, followed by the lower priority groups, in order of their priority.
If necessary, firmware updates may be performed at separate times, as long as each group
is completed within the same service period, and the firmware updates are performed in
order of the group priority.
Table 3-1: Firmware Groups
Group Components
4 Hosts
Update the AMM Firmware (N3001-002 and larger, N200x, and N1001)
Follow these steps to update the AMM firmware.
Note: The complete process takes about 60 minutes. This process updates the firmware
only on the primary AMM. The secondary AMM is updated by a background process. To
check on the progress of the second AMM, see “Check AMM Synchronization Status” on
page 3-14. The AMMs must be synchronized before updating the firmware on S-Blades.
4. On N3001/N200x systems, check that the chassis secondary gigswitches are reach-
able by the AMM:
[root@host1 ~]# /nzlocal/scripts/spa/spa_ping.sh
If a switch does not respond to the ping, reset the switch and the wait 5 minutes before
proceeding:
[root@host1 ~]# ssh mm00x 'reset -T switch[9]'
Where x is the SPA number.
If you have more firmware to update/upgrade, proceed to the next firmware update section.
Otherwise, proceed to the steps in “Verify the System Revision Checks.”
1. Log into the host blade of the Netezza system as the root user.
2. Check the IP address configuration:
[root@host ~]# host -i ha1fabricright
Example output:
ha1fabricright has address 10.0.128.1
3. Change to the following directory:
[root@host ~]# cd /opt/nz/fdt/common/external/firmware/spa/mm
4. Log into the AMM using the following command:
[root@host ~]# ssh USERID@mm001
If you are prompted for a module user ID, specify USERID. The password is PASS-
W0RD (with a zero, not the letter O).
5. Run the following command to update the AMM firmware:
system> update -u tftp://xx.yy.128.1/opt/nz/fdt/common/external/
firmware/spa/mm/CNETCMUS.pkt -T system:mm[1]
Where xx.yy represent the first two octets obtained in step 2 (such as, 10.0).
Example output:
Starting flash packet preparation.
Update of Advanced Management Module firmware was successful.
The new firmware will become active after the next reset of the MM.
6. Run the following command:
system> reset -T mm[1]
7. Run the following command to close the session:
system> exit
8. Wait a few minutes and confirm that you can ping mm001:
[root@host ~]# ping mm001
PING mm001 (10.0.129.0) 56(84) bytes of data.
64 bytes from mm001 (10.0.129.0): icmp_seq=1 ttl=64 time=0.221 ms
64 bytes from mm001 (10.0.129.0): icmp_seq=2 ttl=64 time=0.219 ms
Press Cltr-C to exit the ping session.
If you have more firmware to update, proceed to the section pertaining to that firmware
update. Otherwise, proceed to the steps in “Verify the System Revision Checks.”
S-Blade update
Note: This process takes about 60 minutes to complete; however, it could take up to 2.5
hours if there are communication delays with the hardware.
------------------------------------------------------------------
*** F I R M W A R E U P D A T E R -- B l a d e ***
FDT 4.3 - /opt/nz/fdt/log/firmware_updater_20140128-154106.log
------------------------------SETUP-------------------------------
User will be prompted after prerequisites are checked.
Now checking that NPS is stopped [DONE]
Now checking for bootpsrv [DONE]
Now ensuring blades are booted [DONE]
Now preparing NFS for use [DONE]
Now testing NFS file transfer [DONE]
Now checking BMC health [DONE]
Now checking for stale revisions [DONE]
Now querying spus for info [DONE]
Now checking validity of spu detail [DONE]
Now gathering firmware details [DONE]
Now preparing for blade update [DONE]
------------------------TARGET COMPONENTS-------------------------
Blade BIOS will be updated on:
- SPA 3 : SLOTS 1, 3, 5, 7, 9, 11
- SPAS 1, 2, 4 : ALL SLOTS
Blade BMC will be updated on:
- SPA 3 : SLOTS 1, 3, 5, 7, 9, 11
- SPAS 1, 2, 4 : ALL SLOTS
Blade DIAG will be updated on:
- SPA 3 : SLOTS 1, 3, 5, 7, 9, 11
- SPAS 1, 2, 4 : ALL SLOTS
Blade HBA will be updated on:
- SPA 3 : SLOTS 1, 3, 5, 7, 9, 11
- SPAS 1, 2, 4 : ALL SLOTS
Press any key to continue or CTRL-C to cancel - 00:00 until auto-
resume.
-------------------------------UPDATE-----------------------------
Now copying firmware to NFS share [DONE]
Now evaluating completed BMC updates [PASS]
Now evaluating completed BIOS updates [PASS]
Now evaluating completed diag updates [PASS]
Now evaluating completed HBA updates [PASS]
Now completing firmware update [DONE]
Now checking BMC health [DONE]
Now rebooting blades [DONE]
Now waiting for blades to boot [DONE]
Now reloading AMM firmware info [DONE]
Now cleaning up [DONE]
Now removing the lock file [DONE]
------------------------------SUMMARY-----------------------------
Final Status [PASS]
Total Warnings 1
Main log file - /opt/nz/fdt/log/firmware_updater_20140128-
154106.log
------------------------------------------------------------------
The previous example shows a successful update. During operation, all blades are
updating asynchronously. Once every blade finishes any given subcomponent (for
example, BMC), it reports on that subcomponent for all targets, then moves on to wait-
ing for the next component. For example:
-------------------------------UPDATE-----------------------------
Now copying firmware to NFS share [DONE]
Now evaluating completed BIOS updates [PASS]
Now updating firmware -- waiting on diag -- 00:37:07
The time-out is a worst-case value, and it counts down as the updates are running.
Any of the evaluating completed ______ lines can show [FAIL] if there are any
issues updating that subcomponent on any S-Blade.
After updates, S-Blades are automatically rebooted for changes to take effect. The
script waits for them long enough to query (about 6 minutes). At this point it instructs
the AMM to reload revision information. In the rare event that this step fails, an exam-
ple of the output:
Now reloading AMM firmware info [WARN]
These blades could not reload AMM firmware detail:
- SPA 3 : SLOTS 1, 3
Please manually reset AMMs to refresh stale firmware revs.
Now cleaning up [DONE]
If the reload fails, manually reset the AMM using system_diags Reset.
If failures are noted in updating Ethernet on some blades, rerun firmware_updater for those
blades.
Note: On N3001-002 and larger systems, if FDT Support Tools has been used to
update the Blade Ethernet firmware on the HS23 blades, the BLADE ETHERNET
CHECK status is [FAIL] if the firmware is loaded but the blades have not been
rebooted, or [ABOVE] if the blades have been rebooted and the firmware enabled. The
[ABOVE] status is expected and acceptable.
If the script is interrupted prior to completion, the lock file is not automatically removed.
Before running the script again, delete tool_running.lock in /opt/nz/fdt/var.
If during a blade firmware update you receive a message stating that the AMM firmware
revisions do not match and the update quits, use the procedure to “Check AMM Synchroni-
zation Status” on page 3-14.
If you have more firmware to update, proceed to the section pertaining to that firmware
update. Otherwise, proceed to the steps in “Verify the System Revision Checks.”
Note: The firmware update takes about 5 minutes per switch to complete.
If the script is interrupted prior to completion, the lock file is not automatically removed.
Before running the script again, delete tool_running.lock in /opt/nz/fdt/var.
If the script is interrupted prior to completion, the lock file is not automatically removed.
Before running the script again, delete tool_running.lock in /opt/nz/fdt/var.
If you have more firmware to update, proceed to the section pertaining to that firmware
update. Otherwise, proceed to the steps in “Verify the System Revision Checks.”
An [INFO] status in the host log file from sys_rev_check indicates that is not able to assess
the current firmware revision of the indicated component and/or that the firmware of that
component cannot be updated by FDT.
In the cases of PSoC and TMM firmware, updates are made using FDT Support Tools.
In most other cases, utilities available though Fix Central or external or third party
update utilities are required to update these components, which include host disk
drives, Intel 1Gb NICs (reported by sys_rev_check as ETH_1GB_FW_2), Chelsio 10Gb
NICs, some Broadcom 1Gb NICs (reported by sys_rev_check as ETH_1GB_FW_1) for
some hosts (x3650-M1/M2/M3 and x3850-M2).
Note: The Host firmware update takes approximately 60 minutes to complete, depending
on how many firmware components require updates. The host servers are by default
updated in parallel.
When connecting remotely to hosts being updated, if updating or using IMM2 on the host,
the remote client must have IBM Java version 7 or later installed.
Customers participating in the Red Hat Enterprise Linux (RHEL) Yum Security Patching
Program for IBM PureData System for Analytics S100/N1000/N1001/N2001/N2001 need
to be aware that if the system being upgraded to FDT 4.3 has RHEL 5.11 or later, or RHEL
6.6 or later installed, unless supported kernels are installed, the command firmware_
updater Host --skip-driver-update must be used when updating host firmware. If a host
firmware update is attempted on a system with RHEL 5.11 or later, or 6.6 or later, that do
not have the specified kernels, if the '--skip-driver-update' option is not used, the update
fails. (This command option is not listed in the online help for FDT.)
Supported kernels:
- RHEL5.11: drbd-km-2.6.18_398.el5-8.4.4nz3a-4.x86_64.rpm
- RHEL6.6: drbd-km-2.6.32_504.el6.x86_64-8.4.4nz3a-4.el6.x86_64.rpm
- RHEL6.7: drbd-km-2.6.32_573.1.1.el6.x86_64-8.4.4nz3a-4.el6.x86_64.rpm
4. For Host firmware updates on systems in the Yum Security Patching Program with
RHEL 5.11 or later, or RHEL 6.7 or later installed, run the following command:
[root@host1 ~]# ./firmware_updater Host --skip-driver-update
For all other systems, run the following command:
[root@host1 ~]# ./firmware_updater Host
You are prompted to specify the BMC/IMM user ID and password:
Now creating the lock file [DONE]
------------------------------------------------------------------
*** F I R M W A R E U P D A T E R -- H o s t ***
FDT 4.3 - /opt/nz/fdt/log/firmware_updater_20131204-091546.log
------------------------------------------------------------------
Specify BMC / IMM user id [enter for default] :
Specify BMC / IMM password [enter for default] :
Note: If the BMC/IMM user ID and password has been changed from the default,
type the user ID (and press Enter) and then type the password (and press Enter).
The script examines the first configurable user ID, and if it is not at the default value,
the script requires the correct user ID and password to continue. If the correct user
ID and password is not specified, the program exits and must be run again.
Otherwise, if the values are default, press Enter at each prompt to continue the
update.
After target components are identified, you are prompted to continue.
5. At this point, if the Emulex driver requires updating, firmware_updater updates only
the Emulex driver. If the driver update is not indicated or required, skip to step 6 on
page 3-27.
Sample output for systems requiring Emulex driver updates follows:
------------------------------SETUP-------------------------------
User will be prompted after prerequisites are checked.
Now checking that cluster manager is stopped [DONE]
Now checking that NPS is stopped [DONE]
Now preparing and testing file transfer [DONE]
Now testing BMC user [DONE]
Now testing BMC password [DONE]
Now querying nodes for info [DONE]
Now checking validity of host detail [DONE]
Now gathering firmware details [DONE]
Now preparing for host update [DONE]
------------------------TARGET COMPONENTS-------------------------
Host ETHERNET will be updated on:
- ALL hosts in the system
Emulex ethernet drivers need to be updated before firmware can be
updated.
This script will update Emulex ethernet drvers now.
After update, hosts MUST be rebooted. Then, please run this script
again.
Press any key to continue or CTRL-C to cancel - 00:00 until auto-
resume.
-----------------------------UPDATE-------------------------------
Now copying content to target hosts [DONE]
Now evaluating completed ETHERNET updates [PASS]
Now completing updates [DONE]
These hosts received updates that will not take effect until after
a reboot:
- ALL hosts in the system
They may show some revisions as below until this reboot is done.
Please manually reboot these hosts.
Note that the output states that the hosts must be manually rebooted after the update.
Multiple preliminary update messages may display at the same time. For example, if an
Emulex driver update and RAID double-update are both needed, they are updated in
the first run.
Example output if a RAID double-update is needed (requiring a second manual reboot):
------------------------TARGET COMPONENTS-------------------------
Host RAID will be updated on:
- ALL hosts in the system
After update, hosts MUST be rebooted. Then, please run this script
again.
Note that the output states that the hosts must be manually rebooted after the update and
then the update must be run again.
Note: If sys_rev_check is run prior to rebooting the host, a [PEND] status indicates a
new firmware version for the component has been loaded onto the system, but is not
active yet, pending a system reboot.
a. If the output from firmware_updater shows that a manual reboot is required, reboot
both hosts using the command:
[root@host ~]# ssh ha2 "shutdown -r now"; shutdown -r now
b. After the reboot, run the command:
[root@host1 ~]# /nzlocal/scripts/nz.non-heartbeat.sh
c. If instructed to run the script again, wait 15 minutes and then type:
[root@host1 ~]# ./firmware_updater Host
If you do not wait 15 minutes, the following output displays:
Now creating the lock file [DONE]
------------------------------------------------------------------
*** F I R M W A R E U P D A T E R -- H o s t ***
FDT 4.3 - /opt/nz/fdt/log/firmware_updater_20140210-143704.log
------------------------------------------------------------------
Specify BMC / IMM user id [enter for default] :
Specify BMC / IMM password [enter for default] :
------------------------------SETUP-------------------------------
User will be prompted after prerequisites are checked.
Now checking that cluster manager is stopped [DONE]
Now checking that NPS is stopped [DONE]
Now preparing and testing file transfer [DONE]
Now testing BMC user [DONE]
Now testing BMC password [DONE]
Now querying nodes for info [DONE]
Now checking validity of host detail [FAIL]
6. If no Emulex driver updates are required (or have been updated in a previous run),
firmware_updater updates host firmware.
Example output of an update not requiring Emulex driver update:
Now creating the lock file [DONE]
------------------------------------------------------------------
*** F I R M W A R E U P D A T E R -- H o s t ***
FDT 4.3 - /opt/nz/fdt/fdt/log/firmware_updater_20140131-172019.log
------------------------------------------------------------------
Specify BMC / IMM user id [enter for default] :
Specify BMC / IMM password [enter for default] :
------------------------------SETUP-------------------------------
User will be prompted after prerequisites are checked.
Now checking that cluster manager is stopped [DONE]
Now checking that NPS is stopped [DONE]
Now preparing and testing file transfer [DONE]
Now testing BMC user [DONE]
Now testing BMC password [DONE]
Now querying nodes for info [DONE]
Now checking validity of host detail [DONE]
Now gathering firmware details [DONE]
Now preparing for host update [DONE]
------------------------TARGET COMPONENTS-------------------------
Host BIOS will be updated on:
- ALL hosts in the system
Host BMC will be updated on:
- ALL hosts in the system
Host DIAG will be updated on:
- ALL hosts in the system
Host DISKS will be updated on:
- ALL hosts in the system
Host ETHERNET will be updated on:
- ALL hosts in the system
Host RAID will be updated on:
- ALL hosts in the system
------------------------------UPDATE------------------------------
Now copying content to target hosts [DONE]
Now evaluating completed BMC updates [PASS]
Now evaluating completed BIOS updates [PASS]
Now evaluating completed DIAG updates [PASS]
Now evaluating completed ETHERNET updates [PASS]
Now evaluating completed RAID updates [PASS]
Now evaluating completed DISKS updates [PASS]
Now completing updates [DONE]
These hosts received updates that will not take effect until after
a reboot:
- ALL hosts in the system
They may show some revisions as below until this reboot is done.
Please manually reboot these hosts.
172019.log
------------------------------------------------------------------
If the output indicates that an RSA daemon is not installed, the daemon must be manually
installed. The package containing the daemon is ibm_svc_rsa2_hlp253a_linux_32-64.tgz
available from Fix Central (search on RSA II Linux Daemon). Copy the package into a tem-
porary directory, run tar -xzvf ibm_svc_rsa2_hlp253a_linux_32-64.tgz, and then run
./install.sh. Then run chkconfig ibmasm on and service ibmasm start. This needs to be per-
formed on both hosts. Run firmware_updater again to complete the firmware update.
Note that the output states that the hosts must be manually rebooted after the update.
7. If the output from firmware_updater indicates that a manual reboot is required, reboot
both hosts using the command:
[root@host ~]# ssh ha2 "shutdown -r now"; shutdown -r now
------------------------------RPC CHECK-------------------------------
rpc1ur [PASS]
rpc1lr [PASS]
rpc1ul [PASS]
rpc1ll [PASS]
------------------------------MM CHECK--------------------------------
mm001 [PASS]
mm001alt [PASS]
mm002 [PASS]
mm002alt [PASS]
-------------------------SPA GIG SWITCH CHECK-------------------------
gigsw01a [PASS]
gigsw01b [PASS]
gigsw02a [PASS]
gigsw02b [PASS]
-------------------------SPA SAS SWITCH CHECK-------------------------
sassw01a [PASS]
sassw01b [PASS]
sassw02a [PASS]
sassw02b [PASS]
------------------------RACK SWITCH MGT CHECK-------------------------
netswmgt01 [PASS]
------------------------RACK SWITCH FAB CHECK-------------------------
------------------------SPA POWER SUPPLY CHECK------------------------
SPA 01 [PASS]
SPA 02 [PASS]
-------------------------BLADE FIRMWARE CHECK-------------------------
spu0101 [PASS]
spu0103 [PASS]
spu0105 [PASS]
spu0107 [PASS]
spu0109 [PASS]
spu0111 [PASS]
spu0201 [PASS]
spu0203 [PASS]
spu0205 [PASS]
spu0207 [PASS]
spu0209 [PASS]
spu0211 [PASS]
-------------------------BLADE HARDWARE CHECK-------------------------
spu0101 [PASS]
spu0103 [PASS]
spu0105 [PASS]
spu0107 [PASS]
spu0109 [PASS]
spu0111 [PASS]
spu0201 [PASS]
spu0203 [PASS]
spu0205 [PASS]
spu0207 [PASS]
spu0209 [PASS]
spu0211 [PASS]
-------------------------BLADE ETHERNET CHECK-------------------------
spu0101 [PASS]
spu0103 [PASS]
spu0105 [PASS]
spu0107 [PASS]
spu0109 [PASS]
spu0111 [PASS]
spu0201 [PASS]
spu0203 [PASS]
spu0205 [PASS]
spu0207 [PASS]
spu0209 [PASS]
spu0211 [PASS]
------------------------------HBA CHECK-------------------------------
spu0101 [PASS]
spu0103 [PASS]
spu0105 [PASS]
spu0107 [PASS]
spu0109 [PASS]
spu0111 [PASS]
spu0201 [PASS]
spu0203 [PASS]
spu0205 [PASS]
spu0207 [PASS]
spu0209 [PASS]
spu0211 [PASS]
-----------------------STORAGE ENCLOSURE CHECK------------------------
SPA 01 Enclosure 1 [PASS]
SPA 01 Enclosure 2 [PASS]
SPA 01 Enclosure 3 [PASS]
SPA 01 Enclosure 4 [PASS]
SPA 02 Enclosure 1 [PASS]
SPA 02 Enclosure 2 [PASS]
SPA 02 Enclosure 3 [PASS]
SPA 02 Enclosure 4 [PASS]
--------------------------STORAGE MEDIA CHECK-------------------------
SPA 01 Enclosure 1 [PASS]
SPA 01 Enclosure 2 [PASS]
SPA 01 Enclosure 3 [PASS]
SPA 01 Enclosure 4 [PASS]
SPA 02 Enclosure 1 [PASS]
SPA 02 Enclosure 2 [PASS]
SPA 02 Enclosure 3 [PASS]
SPA 02 Enclosure 4 [PASS]
-------------------------------SUMMARY-------------------------------
Final status [PASS]
Total Failures 0
Total Revs Below 0
Note: On N3001-002 and larger systems, if FDT Support Tools has been used to update
the Blade Ethernet firmware on the HS23 blades, the BLADE ETHERNET CHECK status is
[FAIL] if the firmware is loaded but the blades have not been rebooted, or [ABOVE] if the
blades have been rebooted and the firmware enabled. The [ABOVE] status is expected and
acceptable.
If the sys_rev_check script passes, proceed to the next section, “Restore the System to
Normal Operations.”
Sample output follows. This command refreshes its display every five seconds. (Press
Control-C to exit the command after you confirm that the resource group elements have
started.)
[root@host1 ~]# crm_mon -i5
============
Last updated: Wed Sep 30 13:42:39 2009
2 Nodes configured.
3 Resources configured.
============
Node: host1 (key): online
Node: host2 (key): online
Resource Group: nps
When all of the services have started, the system has returned to normal Heartbeat and
DRBD status. The system automatically transitions to a start-up process, and enters
the Discovering state. Typically the system remains in the Discovering state for several
minutes as it examines and updates its topology, then it transitions to the Online state.
9. Confirm that the system is in the Online state as follows. As user nz, type the
command:
[nz@host1 ~]$ nzstate
System state is 'Online'.
This chapter lists the options and capabilities of the firmware_updater component
commands.
4-1
IBM Netezza FDT User’s Guide
firmware_updater
Use this command to update firmware on a system component.
Run from the Netezza active host as the root user.
Syntax
The command has the following syntax:
firmware_updater [options]
Location
/opt/nz/fdt
Log file location: /opt/nz/fdt/log/firmware_updater_yyyymmdd-xxxxxx.log
Options
The firmware_updater command requires one of the following options.
Table 4-1: firmware_updater Options
Input Description
Description
firmware_updater is the base command used to update firmware on system components.
Usage
The following provides some sample usage:
./firmware_updater Blade
Updates the firmware on all S-Blades in the system.
./firmware_updater -h
Shows help for the firmware_updater command.
firmware_updater Blade
Use this command to update firmware on an S-Blade.
Run from the active host as the root user.
Applicable Systems
N3001-002 and larger, N2001/N2002, N1001, 1000, 100
Syntax
The command has the following syntax:
firmware_updater Blade [subcomponents] [targets] [options]
Location
/opt/nz/fdt
Log file location: /opt/nz/fdt/log/firmware_updater_yyyymmdd-xxxxxx.log
Options
The firmware_updater Blade command has the following options.
Table 4-2: firmware_updater Blade Options
Input Description
Subcomponents (can be negated, such as --no-update-fpga)
--update-bmc Update BMC or IMM *
--update-bios Update BIOS or uEFI *
--update-diag Update diag or DSA *
--update-ethernet Update Ethernet adapters
--update-fpga Update on-board (non Netezza) FPGA (if
applicable)
--update-hba Update HBAs and erase their BIOS
Targets
--spa [‘n, n, n, n’][‘*’] Execute a firmware update on a specific SPA, or
NOTE: Asterisk (*) must be in quotes. SPAs
--slot n Execute a firmware update on specified slot in
SPA(s)
--alias ‘name’ [‘name, name, name’] Execute a firmware update on a specific SPU or
SPUs
* When using the --update-bmc, --update-bios, and/or --update-diag options, they must
be executed in sequence with bmc first, then bios, and diag last.
Input Description
Options
--firmware BUNDLE Specify an alternative blade firmware bundle to
use
--skip-bad-components If some components cannot be processed, skip
them and continue
--skip-prompt Skips “press any key to continue” prompt
--skip-umask-check Skips umask settings check
--force Forces the firmware to be applied
(applies to all components except HBA)
--help | -h Show help
Advanced Options (not recommended)
--ignore-nps-state Ignores NPS state requirement
--hba-bios-only Erase HBA BIOS but do not change firmware
--hba-firmware-only Target HBA firmware but do not erase BIOS
--skip-mm-reload Skip AMM reload. User must manually reset
AMMs, or sys_rev_check does not show updates
Description
firmware_updater Blade is the command used to update firmware on an S-Blade.
Usage
The following provides some sample usage:
./firmware_updater Blade
Updates the firmware on all S-Blades in the system.
firmware_updater Host
Use this command to update the firmware on a host server.
Run from the active host as the root user.
Applicable Systems
All
Syntax
The command has the following syntax:
firmware_updater Host [subcomponents] [targets] [options]
Location
/opt/nz/fdt
Log file location: /opt/nz/fdt/log/firmware_updater_yyyymmdd-xxxxxx.log
Options
The firmware_updater Host command has the following command options.
Note: The recommended mode for this command is with no options.
Table 4-3: firmware_updater Host Command Options
Input Description
Optional Subcomponents
* When using the --update-bmc, --update-bios, and/or --update-diag options, they must
be executed in sequence with bmc first, then bios, and diag last.
Input Description
Targets
Options
Description
firmware_updater Host is the command used to update the firmware on host servers.
Note: The recommended mode for this command is with no options.
Usage
The following provides some sample usage:
./firmware_updater Host
Updates the firmware on both hosts in the system.
firmware_updater RackFabSwitch
Use this command to update the firmware on a rack fabric switch.
Run from the active host as the root user.
Applicable Systems
N3001-002 and larger, N2001/N2002, N1001, 1000
Syntax
The command has the following syntax:
firmware_updater RackFabSwitch [options]
Location
/opt/nz/fdt
Log file location: /opt/nz/fdt/log/firmware_updater_yyyymmdd-xxxxxx.log
Options
The firmware_updater RackFabSwitch command has the following options.
Table 4-4: firmware_updater RackFabSwitch Options
Option Description
--alias name [, name, name, name] Execute a firmware update on a specific switch or
switches
Description
firmware_updater RackFabSwtch is the command used to update the firmware on a rack
fabric switch.
Usage
The following provides some sample usage:
./firmware_updater RackFabSwitch
Updates the firmware on all rack fabric switches in the system.
firmware_updater RackMgtSwitch
Use this command to update the firmware on a rack management switch.
Run from the active host as the root user.
Applicable Systems
N3001-002 and larger, N2001/N2002, N1001, 1000
Syntax
The command has the following syntax:
firmware_updater RackMgtSwitch [options]
Location
/opt/nz/fdt
Log file location: /opt/nz/fdt/log/firmware_updater_yyyymmdd-xxxxxx.log
Options
The firmware_updater RackMgtSwitch command has the following options.
Table 4-5: firmware_updater RackMgtSwitch Options
Option Description
--alias name [, name, name, name] Execute a firmware update on a specific switch or
switches
Description
firmware_updater RackMgtSwitch is the command used to update the firmware on a rack
management switch.
Usage
The following provides some sample usage:
./firmware_updater RackMgtSwitch
Updates the firmware on all rack management switches in the system.
firmware_updater StorageEnclosure
Use this command to update firmware on a disk storage enclosure.
Run from the active host as the root user.
Applicable Systems
N3001-002 and larger, N2001/N2002, N1001, 1000
Syntax
The command has the following syntax:
firmware_updater StorageEnclosure [options]
Location
/opt/nz/fdt
Log file location: /opt/nz/fdt/log/firmware_updater_yyyymmdd-xxxxxx.log
Options
The firmware_updater StorageEnclosure command has the following options.
Table 4-6: firmware_updater StorageEnclosure Options
Option Description
Description
firmware_updater StorageEnclosure is the command used to update firmware on a disk
storage enclosure.
Usage
The following provides some sample usage:
./firmware_updater StorageEnclosure
Update firmware on all disk storage enclosures in the system.
firmware_updater StorageMedia
Use this command to update firmware on a disk drive.
Run from the active host as the root user.
Applicable Systems
N3001-002 and larger, N2001/N2002, N1001, 1000, 100
Syntax
The command has the following syntax:
firmware_updater StorageMedia [options]
Location
/opt/nz/fdt
Log file location: /opt/nz/fdt/log/firmware_updater_yyyymmdd-xxxxxx.log
Options
The firmware_updater StorageMedia command has the following options.
Table 4-7: firmware_updater StorageMedia Options
Option Description
--spa n [--encl n [--disk n]] Execute a firmware update on a specific SPA, spe-
cific enclosure, specific disk
Description
The firmware_updater StorageMedia command is used to update firmware on a disk drive.
Usage
The following provides some sample usage:
./firmware_updater StorageMedia
Update firmware on all disk drives in the system.
storage_diags
Use this command to check the condition of the storage subsystem.
Run from the Netezza active host as the root user.
Note: You must run storage_diags Aburn while logged in as user nz.
Note: You can run storage_diags Smart while logged in as user nz.
Applicable Systems
N3001-002 and larger, N2001/N2002
Syntax
The command has the following syntax:
storage_diags input_option [component_options]
Location
/opt/nz/fdt
Log file location: /opt/nz/fdt/log/storage_diags_yyyymmdd-xxxxxx.log
Options
The storage_diags command requires one of the following options.
Table 4-8: storage_diags Options
Input Description
Smart [--spa n | --encl n Gets the Smart status.
| --disk n | --suppress] --spa [1-x] number of SPAs or a single SPA
--encl [1-12] number of the enclosures
--disk [1-24] - select a single disk, range, subset, or all in
target enclosure
--suppress - suppress screen output and create log file in
/opt/nz/fdt/log/SmartResults
Aburn [--time] [--email] Run a data test using NPS
--time; a value range for how long aburn runs
(Default = 2 hours) [optional]
--email; an email address to load into nzevent [optional]
--list-components A list of components that this script supports
-v -v adds simple debug messages
-vv adds detailed debug information (for support purposes)
--help | -h Show help
Description
The storage_diags checks the condition of the storage subsystem.
Usage
The following provides sample usage:
./storage_diags Smart
Gets Smart status of the entire storage subsystem.
system_diags
Use this command to reset specified components, or to power cycle S-Blades and Disk
Enclosures.
Run from the Netezza active host as the root user.
Applicable Systems
All
Syntax
The command has the following syntax:
system_diags input_option [component_options]
Location
/opt/nz/fdt
Log file location: /opt/nz/fdt/log/firmware_updater_yyyymmdd-xxxxxx.log
Options
The system_diags command requires one of the following options.
Table 4-9: system_diags Options
Option Description
Option Description
DataPathCheck Options:
Checks the SAS cabling connections between the disk enclosures
and the H-Chassis SAS switches or DACs, and the backplane con-
nections between the SPUs and the SAS switches
--help : datapathcheck help
--rack=<num> : specify rack to test
--encl=<num> : specify disk enclosure to test
--skip-cabling-check : bypass the cabling connection test
--extended-cabling-check : verify connection by cycling cable PHYs
--skip-health-check : bypass the PHY health test
--skip-bad-components : ignore failed SPUs
--skip-power-cycle : DO NOT power cycle SPUs before running test
--enclosure-id-check : check the enclosure IDs only and DO NOT
power cycle SPUs
--disk-disparity-check : check for disparity errors on disks
Option Description
Description
The system_diags checks the condition of system connections, or resets components.
Usage
The following provides sample usage:
./system_diags RPCCheck
Tests the power connections of the system.
Troubleshooting N1001
To assist in determining failure indications of DataPathCheck, the SAS cabling of each rack
within the N1001 runs from:
SPA1 Chassis SAS Switch (upper, slot 3) ports 1 through 4 to Left ESMs, JBOD 1-4
SPA1 Chassis SAS Switch (lower, slot 4) ports 1 through 4 to Right ESMs, JBOD 1-4
SPA2 Chassis SAS Switch (upper, slot 3) ports 1 through 4 to Left ESMs, JBOD 5-8
SPA2 Chassis SAS Switch (lower, slot 4) ports 1 through 4 to Right ESMs, JBOD 5-8
Example 1:
Symptom: Failures are indicated on the diagnostic output:
SPA 1 Enclosure E1 [FAIL]
Enclosure E1 Left Side SAS Address Mismatch
Action to take:
Note that the location of the failure is identified by:
SPA (SPA 1 in the example)
Disk Enclosure (E1 - in the example)
ESM (Left in the example)
Action to take:
Note that the location of the failure is identified by:
SAS Switch (sassw01a in the example)
Disk Enclosure (E1 - in the example)
Reseat the cables at the indicated SAS switch and ESMs.
In the following illustration, the associated port on the Chassis SAS switches are shown,
where applicable.
Example 1:
Symptom: Failures are indicated on the diagnostic output:
Rack 1 EXP2524 1 spade0101 Disk Enclosure 1 [FAIL]
Failed: Link not present spade0101[ESM-R Right Conn (in-2)]
PHY-24 esm_side-right
Action to take:
Note that the location of the failure is identified by:
Rack (rack 1 in the example)
Disk Enclosure (enclosure 1 in the example)
ESM (Right in the example)
Connector (IN-2 in the example)
If both SAS controllers are listed in the output from the lspci command (in this exam-
ple, both controllers are listed: 23:00.0 and 29:0.0), then you have a cable connection
issue.
If only one SAS controller is listed, than the DAC that is not listed has failed.
In the following illustrations, the associated port on the S-Blade/DAC is shown, where
applicable.
sys_rev_check
Use this utility to check the firmware versions of the system components. To avoid compo-
nents receiving a [SKIPPED] status, use this utility while the system is online, or offline
with bootpsrv running (use the command /nz/kit/sbin/bootpsrv to start bootpsrv).
Run from the active host (as the root or nz user).
Note: When running sys_rev_check while logged in as user nz, results for Host are not
available.
Applicable Systems
All
Syntax
The command has the following syntax:
sys_rev_check input_option [component_options]
Location
/opt/nz/fdt
Log file location: /opt/nz/fdt/log/sys_rev_check_yyyymmdd-xxxxxx.log
Options
The sys_rev_check command accepts the following options.
Table 4-10: sys_rev_check Options
Option Description
Checks ASU settings [default off]
--list-components A list of components that this script supports
--list-revisions A list of all revisions carried by FDT
Host Identifies firmware and hardware of hosts
Options:
--ha1 : checks only HA1 [default both]
--ha2 : checks only HA2 [default both]
--cfg : checks ASU and RAID settings [default off]
Option Description
SpaGigSwitch Identifies firmware versions of SPA gigabit switches
Options:
--spa : checks only a specific spa [default all]
--alias : checks only a specific GigSwitch
Note: The following options (valid in previous FDT releases) are no longer supported from
the CLI:
Description
The sys_rev_check command checks the firmware or hardware versions of system
components.
The log output of sys_rev_check includes details of supported versions of hardware, drivers,
and firmware and provides details of discovered versions of hardware, drivers, and firmware
in the system. The following table lists the components checked.
Table 4-11: sys_rev_check Components
IMM (ID and Rev) IMM (ID and Rev) SPA Gig Sw
pDSA (ID and Rev) Processor (Model, Speed, Rev) Rack Mgt Sw
uEFI (ID and Rev) Memory (Qty and Type) SPA Power Supply
Memory (Qty and Type) RAID (cfg) Storage Encl (ESM FW)
SAS BP
PSoC (INFO)
Usage
The following provides sample usage:
./sys_rev_check
Checks the firmware versions of all the components of the system.
./sys_rev_check mm
Checks the firmware versions and slot locations of all AMMs in the system.
getservicedata.pl
This script collects Management Module service data from one AMM and S-Blades (does
not apply to HS21) within a specified chassis.
Applicable Systems
N3001-002 and larger, N2001/N2002, N1001, 1000
Syntax
The command has the following syntax:
getservicedata.pl AMM_id [blade_list] [--dir=<target_dir>]
Location
/opt/nz/service_tools/getservicedata
Log file location (default, if other target directory not specified): /tmp/getservicedata
Options
The getservicedata.pl tool requires one of the following options.
Table 4-12: getservicedata.pl Options
Option Description
Description
This script may be executed multiple times at once, to collect logs across multiple SPAs
(chassis).
The recommended practice is to run each execution of the script in a separate window,
however the script can also be executed several times in the background.
Each executing copy creates a unique temp directory to hold all log files, and each creates
a uniquely named tarball upon completion.
All screen output is logged to a unique time stamped file in the target directory using the
naming format, getservicedata_DDMMMYYYY_hhmmss.log.
The specified target directory will be created if it does not exist. If no target is specified,
the default path of '/tmp/getservicedata' is used.
Usage
The following provides some sample usage:
./getservicedata.pl mm001 1,3,5
Collects logs from the active AMM on SPA1 along with IMM logs from the three
S-Blades in slots numbered 1,3,5 and place service data output in target directory
/var/log.
./getservicedata.pl mm001 all
Collects IMM logs from all the SPUs in a fully populated SPA.
./getservicedata.pl mm001
Collects only AMM logs.
This section describes some important notices, trademarks, and compliance information.
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other
countries. Consult your local IBM representative for information on the products and ser-
vices currently available in your area. Any reference to an IBM product, program, or service
is not intended to state or imply that only that IBM product, program, or service may be
used. Any functionally equivalent product, program, or service that does not infringe any
IBM intellectual property right may be used instead. However, it is the user's responsibility
to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in
this document. The furnishing of this document does not grant you any license to these
patents. You can send license inquiries, in writing, to: This information was developed for
products and services offered in the U.S.A.
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785 U.S.A.
For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellec-
tual Property Department in your country or send inquiries, in writing, to:
IBM World Trade Asia Corporation
Licensing 2-31 Roppongi 3-chome, Minato-ku
Tokyo 106-0032, Japan
The following paragraph does not apply to the United Kingdom or any other country where
such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES
CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY
KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
A-1
IBM Netezza FDT User’s Guide
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate
programming techniques on various operating platforms. You may copy, modify, and distrib-
ute these sample programs in any form without payment to IBM, for the purposes of
developing, using, marketing or distributing application programs conforming to the appli-
cation programming interface for the operating platform for which the sample programs are
written. These examples have not been thoroughly tested under all conditions. IBM, there-
fore, cannot guarantee or imply reliability, serviceability, or function of these programs.
Each copy or any portion of these sample programs or any derivative work, must include a
copyright notice as follows:
© your company name) (year). Portions of this code are derived from IBM Corp. Sample
Programs.
© Copyright IBM Corp. _enter the year or years_.
If you are viewing this information softcopy, the photographs and color illustrations may not
appear.
Trademarks
IBM, the IBM logo, ibm.com and Netezza are trademarks or registered trademarks of Inter-
national Business Machines Corporation in the United States, other countries, or both. If
these and other IBM trademarked terms are marked on their first occurrence in this infor-
mation with a trademark symbol (® or ™), these symbols indicate U.S. registered or
common law trademarks owned by IBM at the time this information was published. Such
trademarks may also be registered or common law trademarks in other countries. A current
list of IBM trademarks is available on the Web at “Copyright and trademark information” at
ibm.com/legal/copytrade.shtml.
Adobe is a registered trademark of Adobe Systems Incorporated in the United States, and/
or other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or
both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corpo-
ration in the United States, other countries, or both.
NEC is a registered trademark of NEC Corporation.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United
States, other countries, or both.
Red Hat is a trademark or registered trademark of Red Hat, Inc. in the United States and/or
other countries.
D-CC, D-C++, Diab+, FastJ, pSOS+, SingleStep, Tornado, VxWorks, Wind River, and the
Wind River logo are trademarks, registered trademarks, or service marks of Wind River Sys-
tems, Inc. Tornado patent pending.
APC and the APC logo are trademarks or registered trademarks of American Power Conver-
sion Corporation.
Other company, product or service names may be trademarks or service marks of others.
Deutschland: Einhaltung des Gesetzes über die elektromagnetische Verträglichkeit von Geräten
Dieses Produkt entspricht dem “Gesetz über die elektromagnetische Verträglichkeit von
Geräten (EMVG)”. Dies ist die Umsetzung der EU-Richtlinie 2004/108/EG in der Bundes-
republik Deutschland.
Zulassungsbescheinigung laut dem Deutschen Gesetz über die elektromagnetische Verträglichkeit von Geräten
(EMVG) (bzw. der EMC EG Richtlinie 2004/108/EG) für Geräte der Klasse A
Dieses Gerät ist berechtigt, in Übereinstimmung mit dem Deutschen EMVG das EG-Konfor-
mitätszeichen - CE - zu führen.
Verantwortlich für die Einhaltung der EMV Vorschriften ist der Hersteller:
International Business Machines Corp.
New Orchard Road
Armonk, New York 10504
914-499-1900
Der verantwortliche Ansprechpartner des Herstellers in der EU ist:
IBM Deutschland
Technical Regulations, Department M456
IBM-Allee 1, 71137 Ehningen, Germany
Telephone: +49 7032 15-2937
Email: [email protected]
Generelle Informationen:
Das Gerät erfüllt die Schutzanforderungen nach EN 55024 und EN 55022 Klasse A.
This is a Class A product based on the standard of the Voluntary Control Council for Inter-
ference (VCCI). If this equipment is used in a domestic environment, radio interference
may occur, in which case the user may be required to take corrective actions.
This is electromagnetic wave compatibility equipment for business (Type A). Sellers and
users need to pay attention to it. This is for any areas other than home.