[June 23, 2011] UPDATE: Beginning with the VSM 6.3.2 software release, this tool is now built into the software and available as RAID Status in the VSMC for supported servers.
I want to bring to your attention the latest release of the Cisco VSM Raid Viewer. It will assist in viewing the status of your RAID and in gathering a debug package for Cisco TAC if you run into any problems with the RAID. Version 1.1.0 of the tool has the following changes:
Fixed a bug that left the lsi-fwterm.log file empty in the debug package
Formatted the disk usage to match the rest of the formatting throughout
Added RAID controller firmware information
Added a ‘Silence Alarm’ button to silence the audible alarm
Reformatted the top header table (ie. button layout and table of contents)
Changed version to 1.1.0
Fixed formatting so that tables would be centered in Internet Explorer as they were in Firefox.
Note: This tool will only work with servers containing the LSI MegaRAID controller. Those servers include the CIVS-MSP-2RU/4RU and CPS servers.
Prior to the release of the Cisco VSM Raid Viewer, if you wanted to view the status of your RAID in a VSM MSP, you can SSH into the server and enter some rather cryptic commands to get your output, or you have to rely on audible alerts and red LEDs on the front of the server. This leaves the server administrator to deal with RAID issues (ie. failed disk drives) in a reactive manner after a failure. How does this tool help?
With this tool, checking the status of your RAID, including virtual and physical disks, will be as simple as pointing your web browser to a page you'll very likely bookmark. This allows the administrator to monitor the server in a pro-active manner and replace failing disks before they actually fail. Gathering data from the RAID for troubleshooting is also only a click away. How to install and use the tool
Download the script using the link at the bottom of this post.
Copy the script to the /usr/BWhttpd/root/cgi-bin/ directory on each your MSPs containing an LSI MegaRAID controller.
Make the script executable:
If you are in a console prompt, use the command: chmod +x vsmRaidViewer.pl
If you are in WinSCP, right-click the file, go to Properties, and click all the x boxes
That's it. The Cisco VSM RAID Viewer is ready for use. Just open your browser to the following URI:
The tool will also work over HTTP, but since you need to enter your root password, you are better off using HTTPS so that your password will be transmitted securely.
If the tool does not work at all when you open your browser to it, then it is possible that the script got converted to DOS format during the transfer to the server. Open a console prompt on the server, change to the /usr/BWhttpd/root/cgi-bin folder and enter the following command to convert the file back to Unix format:
dos2unix -k vsmRaidViewer.pl
Please try out the tool and let us know what you think. We would like to hear what you like about it, don't like about it, and what suggestions you may have form improving it. Of course, we also want to know if you run into any problems with it. This tool is not supported by the VSM developement team, but I will try to address any reported problems in a timely manner. Hey, I've got cases to work you know ;- )
Thank you, Sean
Sean Merrow CCIE 25197 Physical Security CSE Cisco Systems
I am trying to setup for the first time a CISCO ASDM 5510 that I recently bought from 2nd hand. My plan is simple:e/0 (outside) no income traffic allowed at alle/1 (office) my home-officee/2 (servers) it is my home lab I have some servers there and I...
Hi all, We're having this issue that users cannot complete guest portal registration on some access points. Doesn't happen on all access points. When attempting to connect to the Guest network , the sign-in page is presented after connecting &g...
Hello, I am trying to understand how inspection works on the ASA and although Cisco documentation on the subject is very analytical, after some testing on a 5520, a few questions have come up. The Lab setup is the following:PC -> (inside)ASA(...
I configured ISE to authenticate users in an AD group for vty access. It is working but in live logs i don't see endpoint info like for the users connecting through wireless devices on a separate policy below. It doesn't even show mac address/IP info. Wha...