Aus SchnallIchNet
Wechseln zu: Navigation, Suche


Infos for HP (creating Case)

> showsys 

(System Information inclusing serial)

> servicemag status 

(shows if any drive was already evacuated)

> showpd -s 

(show the state of all drives)

> showpd -i 

(show the drive inventory including type and serial)

> showport -sfp [-d]

(show the SFP ports and their status [detailed list])

IOPS Stats

statvlun -ni -iter 1 -hostsum


14:09:22 10/13/2018 r/w I/O per second          KBytes per sec    Svt ms       IOSz KB     
           Hostname      Cur  Avg  Max     Cur     Avg     Max  Cur  Avg    Cur    Avg Qlen
     FF1EPPINFVMH02   t  105  105  105    2278    2278    2278 0.42 0.42   21.7   21.7    0

Virtual Volumes


Show Virtual Volumes

showvv -listcols
showvv -showcols Name,VV_WWN,SnpCPG

Create Virtual Volume

createvv -tpvv -pol zero_detect -snp_cpg FC_Snap FC_r6 FF3_VMW_AO_03  4194304
-Tpvv                Thin provisions Virtual Volume
-pol zero_detect     I believe it is needed to thin luns
-snp_cfg FC_Snap     Where the writes will go for snapshots. HP refers to this as snap or copy space
FF3_VMW_AO_03        Name: this is the lun name
4194304              Size: This is the number to 4tb

Move volume to another CPG using tunevv

Assuming I want to move a virtual volume (VV12_AO) to another new CPG (FC_r6):

tunevv usr_cpg FC_r6 VV12_AO

The logical disks used for user space are moved to CPG FC_r6 for virtual volume VV12_AO If you want to move the VV regions only use:

tunevv usr_cpg FC_r6 -src_cpg FC_r5 VV12_AO

Assuming I want to move a virtual volume (VV12_AO) to another new SnapCPG (FC_Snap):

tunevv snp_cpg FC_Snap VV12_AO

Unfortunatly you will have to run both commands seperatly. As of the documentation they can't be combined.



Set LDAP auth

setauthparam -f -clearall
setauthparam -f ldap-server
setauthparam -f ldap-server-hn STGWPVEURDC02.<DOMAIN>.<DOMAIN>.com
setauthparam -f kerberos-realm <DOMAIN>.<DOMAIN>.com
setauthparam -f binding sasl
setauthparam -f sasl-mechanism GSSAPI
setauthparam -f accounts-dn "OU=PrivilegedAccounts,OU=Accounts,DC=<DOMAIN>,DC=<DOMAIN>,DC=com" 
setauthparam -f account-obj user
setauthparam -f account-name-attr sAMAccountName 
setauthparam -f memberof-attr memberOf
setauthparam -f super-map "CN=SAN_Admins,OU=PrivilegedRoles,OU=Groups,DC=<DOMAIN>,DC=<DOMAIN>,DC=com"
setauthparam -f browse-map "CN=SAN_ReadOnly,OU=PrivilegedRoles,OU=Groups,DC=<DOMAIN>,DC=<DOMAIN>,DC=com"

Check that it works for you:

checkpassword <LDAP-Username>
user <LDAP-Username> is authenticated and authorized

Get LDAP auth config

% showauthparam
Param             --------------------------------------Value---------------------------------------
ldap-server-hn    DC05.<DOMAIN>.<TLD>                                                          
kerberos-realm    <DOMAIN>.<TLD>                                                               
binding           sasl                                                                              
sasl-mechanism    GSSAPI



get network settings

% shownet
IP Address    Netmask/PrefixLen Nodes Active Speed Duplex AutoNeg Status    01      0  1000 Full   Yes     Active

Default route :
NTP server    :
DNS server    :

set DNS server


setnet dns -add


setnet dns -remove

re-new expired certificates

Show the actual cert:

% showcert
Service         Commonname              Type Enddate                  Fingerprint                             
unified-server* HP_3PAR 8200-CZ3740W5MD cert Oct 16 15:36:12 2020 GMT bdae8ff911a32e50a65a81dbae656b46112fa992

Renew the cert:

createcert unified-server -selfsigned -CN 3par.yadda.com -SAN DNS:3par-alias.yadda.com,DNS:
The following services will be restarted if currently running:
  cim: manages communications with SMI-S clients

  wsapi: Web Services API server

Continue creating self-signed certificate (yes/no)? yes
Self-signed certificate created.
cimserver restarted
The Web Services API server stopped successfully.

The Web Services API Server will start shortly.