Dell Unity - Additional Procedures-SVC Commands
Dell Unity - Additional Procedures-SVC Commands
SVC commands
Topic
Additional Procedures
Selections
Additional Procedures: Service Commands
REPORT PROBLEMS
If you find any errors in this procedure or have comments regarding this application, send email to
[email protected]
Copyright © 2023 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies, Dell, EMC, Dell
EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be
trademarks of their respective owners.
The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of
any kind with respect to the information in this publication, and specifically disclaims implied warranties of
merchantability or fitness for a particular purpose.
Use, copying, and distribution of any software described in this publication requires an applicable
software license.
This document may contain certain words that are not consistent with Dell's current language guidelines.
Dell plans to update the document over subsequent future releases to revise these words accordingly.
This document may contain language from third party content that is not under Dell's control and is not
consistent with Dell's current guidelines for Dell's own content. When such third party content is updated
by the relevant third parties, this document will be revised accordingly.
Page 1 of 10
Contents
Preliminary Activity Tasks .......................................................................................................3
Read, understand, and perform these tasks.................................................................................................3
Change the Service password.................................................................................................................9
Page 2 of 10
Preliminary Activity Tasks
This section may contain tasks that you must complete before performing this procedure.
Table 1 List of cautions, warnings, notes, and/or KB solutions related to this activity
2. This is a link to the top trending service topics. These topics may or not be related to this activity.
This is merely a proactive attempt to make you aware of any KB articles that may be associated with
this product.
Note: There may not be any top trending service topics for this product at any given time.
Page 3 of 10
Unity Quick Field Guide: Rev05
Table Of Contents
SERVICE SCRIPTS:
Using a SSH/Telnet client such as PuTTY , enter the system IP address and logon with: L: service P:
<Service password>
Using svc_diag:
spb:~> svc_diag (most common syntax for general SP status)
======== Now executing basic state ========
* System Serial Number is: FNM00154600480
* System Friendly Host Name is:
* Current Software version: upc_Unity_0_201601260019_upcBuilder-4.0.0.6915972-GNOSIS_RETAIL
* Unisphere IP address(es): 10.240.160.20 fe80::260:1600:4860:1ea
* SSH Enabled: true
* FIPS mode: Disabled
* Boot Mode: Normal Mode (If this field shows Rescue Mode, SP is in Service Mode)
Page 4 of 10
spa:~> svc_rescue_state -l
BOOTFL 0x0b 3 3 0x00 (RESCUE) Two common counters reached by system which
triggers Service Mode
APPINIT 0x12 3 3 0x00 (RESCUE)
spb:~> svc_diag -l
Valid states are:
basic,bootcontrol,cru,dmilog,extended,network,pmp,resume,sas,software,spinfo,systemstate
Note: Run svc_diag -s with any of the above valid states to return extensive information about the state
in question
spb:~> svc_diag -s network
======== Now executing network state ========
Displaying system network information:
2: mgmt: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen
1000
4: eth3: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc mq state DOWN group default
qlen 1000
5: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen
1000
11: srm@mgmt: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state
UNKNOWN group default
12: mgmt_vdev@mgmt: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state
UNKNOWN group default
inet 10.240.160.20/24 scope global mgmt_vdev
svc_diag -s bootcontrol (Same output as seen from svc_rescue_state -l)
--Use svc_rescue_state to check, set, or clear boot counters
svc_rescue_state -list [Go to Rescue Service Mode; Reimage; Recover Config from backend drives;
Ignore]
svc_rescue_state -clear allows you to clear error condition for reboot attempt
svc_rescue_state -clear_degraded (-d) clears all degraded state indicators
svc_check_hw_config -d checks details of DIMM configuration or errors
svc_help Use this to see all Service Scripts that are available
svc_diag | --state all | --state extended | --state spinfo | --state resume | --state bootcontrol | --state
dmilog | --state cru
svc_diag --state -all Outputs verbose data on all logical and hardware components on the system, log
info, events, counters, and resume
svc_dc
--Performs Data Collection on the array and puts into /EMC/backend/service/data_collection directory
svc_dc -lcd (Shows if there are any core dumps on the system)
Note: Must be logged into svc_service_shell as root user before you can use IPMITool commands
directly on the SP
Shutting System Down:
Page 5 of 10
spb:~> svc_shutdown --system-halt
###############################################################################
WARNING: This action will shut down the system and you will have to manually bring it back up
afterwards.
###############################################################################
Enter "yes" if want to proceed with this action: yes
1
1
Set header flag 0x2
Set header flag 0x2
Note : If you do not have access to the EMC network, contact Remote Support for assistance generating
the new service key.
d. Copy the current challenge string to the Service Key Generator site, complete the remaining
required fields, and then click Generate. The site generates a response key in the Key Details
section.
Page 6 of 10
e. On the system, re-run svc_inject -k and include the generated response key.
svc_inject -k <generated_service_key>
For example:
spb:~> svc_inject -k 1D1DC-9B506-351A7-2F08B-BCB14-75DB7-
AC7E3-1234-01
Note
This injects root access to the system. You must still initiate the root session each time you connect via
SSH for that particular user Shell session using the svc_service_shell command.
IPMI Tool: Connecting to the array via Serial over LAN (SOL) & monitoring the boot process.
Overview: With a Serial over LAN (SOL) console sessions, you can access the SPs directly, run Service
Scripts, run UEMCLI on the primary SP, inject Root User, troubleshoot, reboot the SPs and observe the
reboot on the console, access POST, access BIOS/Setup menu, and perform system re-initialization.
In order to monitor the SP boot or reinit process, you need to establish a Serial over LAN connection to
the SP Service port(s). This is accomplished using the IPMI tool. The IPMI tool can be found on
support.emc.com by searching the Unity Support Tools section. First, install the tool to the C:\ directory of
your service laptop.
Set your local network adapter to the IP address 128.221.1.249 and then connect directly to the Service
LAN Port. Issue the ipmitool command shown below to connect to SPA or SPB. If you need to connect to
both SP A and SPB, you can connect to the Service LAN Ports via a small Ethernet switch. Do not worry
- this will NOT panic the array! Open another command prompt window and issue the command again to
the other SP. Note the 2 different IP address for each service port below. The array Serial Number you
wish to connect to must be used in the command line. Please refer to the EMC IPMI Tool Technical
Notes (300-015-394) document available on support.emc.com for the complete details.
Set the Windows host computer to an IP address on the Internal Network of the SPs:
IP Address: 128.221.1.249
Netmask: 255.255.255.0
Note: No Default Gateway or any other settings required
Launch the IPMITool from two different command prompts, to connect to each SP. Use the serial number
of your array!
UEMCLI
The Unisphere CLI (UEMCLI ) enables you to run commands on a system through a command prompt
from a Microsoft Windows, UNIX/Linux host. You can also directly access UEMCLI through a PuTTy
session or directly on the IPMI tool SOL connection. Use Unisphere for managing a system. The
Unisphere CLI is intended for advanced users who want to use commands in scripts for automating
routine tasks. Additional Info and Examples:
Customers have access only to UEMCLI from a Host system running the UEMCLI client, and should
define user credentials when running commands. Customers do not have access to the root user
account with svc_service_shell Because of this; customers are limited in what they can do directly on
the system.
Page 7 of 10
Saving User Credentials on UEMCLI: (from a Windows command prompt)
C:> uemcli -d <unity_ip> -saveuser -u admin -p <passwd>
--Above command will store the username and password on the Client so that users do not have to enter
it when running UEMCLI
Page 8 of 10
Release date = 2015-12-16 08:31:44
Image type = software
4) Create a Upgrade Session:
C:\_dwnloads>uemcli -d <ip> -u Local/admin -p <paswd> /sys/soft/upgrade create -candId 1
Operation completed successfully.
5) Monitor Upgrade:
C:\_dwnloads>uemcli -d <ip> -u Local/admin -p <passwd> /sys/soft/upgrade show
1: Status = running
Creation time = 2015-12-17 18:53:26
Elapsed time = 2s
Estimated time left =
Progress =
Percent complete = 2%
6) If the Upgrade attempt fails, fix the issue and restart the upgrade:
spb:~> uemcli -d <ip> -u Local/admin -p <passwd> /sys/soft/upgrade resume
Note: Now that you have access to the system again, if you need to change the Admin account password
from the GUI:
For other users, click on the Gear Icon for Update System Settings > Users and Groups
>User Management> select the Individual user(s) and click on More Actions and select reset
password.
Prerequisites:
Both Storage Processors (SPs) must be present in the system and their boot mode must be Normal
Mode. If you have removed an SP or an SP has failed, you must replace the SP before you can change
the Service password.
SSH method:
Change Service Password:
spb:>svc_service_password -s
Page 9 of 10
New Password:
Attempting to change service password ...
INFO: Service account password has been changed successfully
Note: You must use at least one special character for the password, and system
remembers the last 3 passwords used and will not allow reuse until 4th time a password
was originally used.
New Password:
--- WARNING: The password should consist of at least one special character
Error: password is non-compliant, not changing it.
UEMCLI Method:
Changing Service Password using UEMCLI:
spb:/ >uemcli -u admin -p <passwd> /service/user set -passwd <new> -oldpasswd <old>
REV.05 removed USB method. New reinit KBs have been added.
Page 10 of 10