[June 23, 2011] UPDATE: Beginning with the VSM 6.3.2 software release, this tool is now built into the software and available as RAID Status in the VSMC for supported servers.
I want to bring to your attention the latest release of the Cisco VSM Raid Viewer. It will assist in viewing the status of your RAID and in gathering a debug package for Cisco TAC if you run into any problems with the RAID. Version 1.1.0 of the tool has the following changes:
Fixed a bug that left the lsi-fwterm.log file empty in the debug package
Formatted the disk usage to match the rest of the formatting throughout
Added RAID controller firmware information
Added a ‘Silence Alarm’ button to silence the audible alarm
Reformatted the top header table (ie. button layout and table of contents)
Changed version to 1.1.0
Fixed formatting so that tables would be centered in Internet Explorer as they were in Firefox.
Note: This tool will only work with servers containing the LSI MegaRAID controller. Those servers include the CIVS-MSP-2RU/4RU and CPS servers.
Prior to the release of the Cisco VSM Raid Viewer, if you wanted to view the status of your RAID in a VSM MSP, you can SSH into the server and enter some rather cryptic commands to get your output, or you have to rely on audible alerts and red LEDs on the front of the server. This leaves the server administrator to deal with RAID issues (ie. failed disk drives) in a reactive manner after a failure. How does this tool help?
With this tool, checking the status of your RAID, including virtual and physical disks, will be as simple as pointing your web browser to a page you'll very likely bookmark. This allows the administrator to monitor the server in a pro-active manner and replace failing disks before they actually fail. Gathering data from the RAID for troubleshooting is also only a click away. How to install and use the tool
Download the script using the link at the bottom of this post.
Copy the script to the /usr/BWhttpd/root/cgi-bin/ directory on each your MSPs containing an LSI MegaRAID controller.
Make the script executable:
If you are in a console prompt, use the command: chmod +x vsmRaidViewer.pl
If you are in WinSCP, right-click the file, go to Properties, and click all the x boxes
That's it. The Cisco VSM RAID Viewer is ready for use. Just open your browser to the following URI:
The tool will also work over HTTP, but since you need to enter your root password, you are better off using HTTPS so that your password will be transmitted securely.
If the tool does not work at all when you open your browser to it, then it is possible that the script got converted to DOS format during the transfer to the server. Open a console prompt on the server, change to the /usr/BWhttpd/root/cgi-bin folder and enter the following command to convert the file back to Unix format:
dos2unix -k vsmRaidViewer.pl
Please try out the tool and let us know what you think. We would like to hear what you like about it, don't like about it, and what suggestions you may have form improving it. Of course, we also want to know if you run into any problems with it. This tool is not supported by the VSM developement team, but I will try to address any reported problems in a timely manner. Hey, I've got cases to work you know ;- )
Thank you, Sean
Sean Merrow CCIE 25197 Physical Security CSE Cisco Systems
Hi, I'm using ASAv 9.7 and Anyconnect Secure Mobility Client 4.4. I've setup my IKEV2 RA-VPN and it's working very well.But I want to change the cipher from AES_256_SHA1 TO another..But I don't know how...Please any help ?
Hello All,I would like to know the usage of Nonces other than that the fact that they are being exchanged in messages 3 and 4 and used for the SKEYID creation which also used the DH key derived g^xy , I know for a fact that it prevents replay attacks but ...
I am running ver 8.2 on cisco ASA 5505interface VLAN1nameif insideIP address 10.1.1.0 255.255.255.0 interfacve VLAN2nameif outsideip address DHCP setroute outside subnet 192.168.0.0 255.255.255.0I would like to configure so that only one client ...
hello to every one,i want to create acess list that prevent the truffic from the internet to my organization.i do it in the packet tracer . !!ip access-list standard no-entrydeny any!and i doit on port g/0.10.and the access list block the internet fr...