[June 23, 2011] UPDATE: Beginning with the VSM 6.3.2 software release, this tool is now built into the software and available as RAID Status in the VSMC for supported servers.
I want to bring to your attention the latest release of the Cisco VSM Raid Viewer. It will assist in viewing the status of your RAID and in gathering a debug package for Cisco TAC if you run into any problems with the RAID. Version 1.1.0 of the tool has the following changes:
Fixed a bug that left the lsi-fwterm.log file empty in the debug package
Formatted the disk usage to match the rest of the formatting throughout
Added RAID controller firmware information
Added a ‘Silence Alarm’ button to silence the audible alarm
Reformatted the top header table (ie. button layout and table of contents)
Changed version to 1.1.0
Fixed formatting so that tables would be centered in Internet Explorer as they were in Firefox.
Note: This tool will only work with servers containing the LSI MegaRAID controller. Those servers include the CIVS-MSP-2RU/4RU and CPS servers.
Prior to the release of the Cisco VSM Raid Viewer, if you wanted to view the status of your RAID in a VSM MSP, you can SSH into the server and enter some rather cryptic commands to get your output, or you have to rely on audible alerts and red LEDs on the front of the server. This leaves the server administrator to deal with RAID issues (ie. failed disk drives) in a reactive manner after a failure. How does this tool help?
With this tool, checking the status of your RAID, including virtual and physical disks, will be as simple as pointing your web browser to a page you'll very likely bookmark. This allows the administrator to monitor the server in a pro-active manner and replace failing disks before they actually fail. Gathering data from the RAID for troubleshooting is also only a click away. How to install and use the tool
Download the script using the link at the bottom of this post.
Copy the script to the /usr/BWhttpd/root/cgi-bin/ directory on each your MSPs containing an LSI MegaRAID controller.
Make the script executable:
If you are in a console prompt, use the command: chmod +x vsmRaidViewer.pl
If you are in WinSCP, right-click the file, go to Properties, and click all the x boxes
That's it. The Cisco VSM RAID Viewer is ready for use. Just open your browser to the following URI:
The tool will also work over HTTP, but since you need to enter your root password, you are better off using HTTPS so that your password will be transmitted securely.
If the tool does not work at all when you open your browser to it, then it is possible that the script got converted to DOS format during the transfer to the server. Open a console prompt on the server, change to the /usr/BWhttpd/root/cgi-bin folder and enter the following command to convert the file back to Unix format:
dos2unix -k vsmRaidViewer.pl
Please try out the tool and let us know what you think. We would like to hear what you like about it, don't like about it, and what suggestions you may have form improving it. Of course, we also want to know if you run into any problems with it. This tool is not supported by the VSM developement team, but I will try to address any reported problems in a timely manner. Hey, I've got cases to work you know ;- )
Thank you, Sean
Sean Merrow CCIE 25197 Physical Security CSE Cisco Systems
Hi everyone 1. When apex/plus anyconnect licenses are added, should I install activation-key again or not?2. After purchasing 50 licenses if i purchases 25 licenses again in 3months, is it correct that 75 licenses are available during 9 m...
Hello everyone,I am facing the issue with being unable to open asdm for one asa appliance (ASA5512). I assume that the issue is caused by the ssl encryption currently set as des-sha1.I would like to get it changed to ssl encryption aes256-sha1.&...
Hi Friends.all traffic routing by FTD all Port are open and access list any any.. everthing look good i use internet so etc. i have one problem .Smart Home panel Applications does not work with wifi i see connection error. how can i solve this problem.but...
I'd like to enter privileged EXEC mode on the ASA console through TACACS+ and ISEThe login works but when I enter 'enable' the authentication on ISE fails.The TACACS log on ISE shows that the TACACS protocol contains "Authentication Service -> Enable" ...