[June 23, 2011] UPDATE: Beginning with the VSM 6.3.2 software release, this tool is now built into the software and available as RAID Status in the VSMC for supported servers.
I want to bring to your attention the latest release of the Cisco VSM Raid Viewer. It will assist in viewing the status of your RAID and in gathering a debug package for Cisco TAC if you run into any problems with the RAID. Version 1.1.0 of the tool has the following changes:
Fixed a bug that left the lsi-fwterm.log file empty in the debug package
Formatted the disk usage to match the rest of the formatting throughout
Added RAID controller firmware information
Added a ‘Silence Alarm’ button to silence the audible alarm
Reformatted the top header table (ie. button layout and table of contents)
Changed version to 1.1.0
Fixed formatting so that tables would be centered in Internet Explorer as they were in Firefox.
Note: This tool will only work with servers containing the LSI MegaRAID controller. Those servers include the CIVS-MSP-2RU/4RU and CPS servers.
Prior to the release of the Cisco VSM Raid Viewer, if you wanted to view the status of your RAID in a VSM MSP, you can SSH into the server and enter some rather cryptic commands to get your output, or you have to rely on audible alerts and red LEDs on the front of the server. This leaves the server administrator to deal with RAID issues (ie. failed disk drives) in a reactive manner after a failure. How does this tool help?
With this tool, checking the status of your RAID, including virtual and physical disks, will be as simple as pointing your web browser to a page you'll very likely bookmark. This allows the administrator to monitor the server in a pro-active manner and replace failing disks before they actually fail. Gathering data from the RAID for troubleshooting is also only a click away. How to install and use the tool
Download the script using the link at the bottom of this post.
Copy the script to the /usr/BWhttpd/root/cgi-bin/ directory on each your MSPs containing an LSI MegaRAID controller.
Make the script executable:
If you are in a console prompt, use the command: chmod +x vsmRaidViewer.pl
If you are in WinSCP, right-click the file, go to Properties, and click all the x boxes
That's it. The Cisco VSM RAID Viewer is ready for use. Just open your browser to the following URI:
The tool will also work over HTTP, but since you need to enter your root password, you are better off using HTTPS so that your password will be transmitted securely.
If the tool does not work at all when you open your browser to it, then it is possible that the script got converted to DOS format during the transfer to the server. Open a console prompt on the server, change to the /usr/BWhttpd/root/cgi-bin folder and enter the following command to convert the file back to Unix format:
dos2unix -k vsmRaidViewer.pl
Please try out the tool and let us know what you think. We would like to hear what you like about it, don't like about it, and what suggestions you may have form improving it. Of course, we also want to know if you run into any problems with it. This tool is not supported by the VSM developement team, but I will try to address any reported problems in a timely manner. Hey, I've got cases to work you know ;- )
Thank you, Sean
Sean Merrow CCIE 25197 Physical Security CSE Cisco Systems
We are running Cisco ISE 184.108.40.2067 patch 6. In my ISE policy set I have the following rule options (all give the same access for now) Machine and User CertMachine only CertUser only CertUser AD onlyMachine in AD only We are using the native Wind...
I have an ASA 5555. The SmartCallHome cert has expired and we are getting alerts on it. We do not use this feature. Can I delete the cert, or will that cause problems with something? It is expired already and I haven't seen anythin...
Scenario: We've got a functioning AnyConnect setup, which also uses DUO for multi-factor authentication. In the near future, I'll need to take down the RADIUS server that's currently being used for AnyConnect AD authentications. My thoug...
We are setting up a MS SQL server to store the MAC addresses for all the PCs in our network to be used for the purpose of remotely re-imaging the PCs when needed.I have imported some test MACs into the SQL database in format username/password where both u...
I have a certificate-based device that is attempting to query an internal web server. The device is on DHCP and using the Umbrella VAs for DNS. When we point the device statically to the internal DNS servers, the request successfully goes thro...