SysAdmin Blog, TechTips and Reviews

An (ex) System Administrator's Blog



Archives Posts

XSCF Console Command Cheat sheet

October 31st, 2009 by elizar

Here are a couple of commands for the XSCF console specifics for the M-series servers of Sun. There are ‘stolen’ from Review Ninja plus more! Thanks Jon!

To Connect to a domain
XSCF> console -d

To Show status of a domain
XSCF> showdomainstatus -d


XSCF> showdomainstatus
Invalid parameter.
usage : showdomainstatus -a
showdomainstatus -d domain_id
showdomainstatus -h
XSCF> showdomainstatus -a
DID Domain Status
00 Running
01 Running
02 Running
03 Running
04 -

To displays the domain information specified for a system board.
XSCF> showdevices

To displays the temperature, humidity, voltage, and fan rotation speed.
XSCF> showenvironment

To lists degraded components.
XSCF> showstatus

To displays users who login to the XSCF.
XSCF> who

To reset domain there are 3 modes for reset command

* por: Domain system reset
* request: Domain panic instruction
* xir: Domain CPU reset

XSCF> reset -d domainhere por

To power on/off all domain or sepcified domain
XSCF> poweron
XSCF> poweroff

Remember you can always use –help on every command to see what are teh available switched and options for it.

To logout of XSCF> type exit
To return to XSCF from a domain terminal type #.

Hope this help.

More command from Sun:
http://docs.sun.com/source/819-6202-15/21ch5p.html#50643019_96753

Filed under Console Access, XSCF having 1 Comment »

Archives Posts

ZFS Quotas and Reservations

October 29th, 2009 by elizar

Notes on ZFS quotas, reservations and others.. like adding up disk for the pool and creating pool altogether.

First, create a pool using ‘zpool‘. Then use ‘zfs‘ to make the filesystems.

Creating Pool with zpool

Create a pool called pool1. The -m is optional. If given, it specifies a mount point for zfs filesystems created from the specified pool. The mount point should be empty or nonexistant. If the -m argument is omitted, mount point is “/”.

Read the rest of this entry »

Filed under Uncategorized having No Comments »

Archives Posts

Unlock locked user account in HP-UX

October 15th, 2009 by elizar

I know nothing about HP UX (yeah, except SAM). That’s why, just now, when there’s a request to just make a trace route from an HPUX server to another server, I have to login and do execute the command. I couldn’t log in as my user id so i logged in as root instead from the console.

I check grep’d my account the walah! It was there! I reset the password, open an ssh terminal and tried to login. unsuccessful, that’s why i knew then that it is locked.

Here’s how to unlock a locked user account in HP UX in command line.

In HP-UX 11.xx if user account is locked, you can unlock the account by running SAM. But running SAM takes some time usually 2-3 minutes on heavily loaded HP-UX servers. You can unlock the locked user account from command line by running following command:

1. Login as root or use sudo from your account, if there is no sudo installed just use su – root :

$sudo su –

*******

2. Run this command to unlock the locked HP-UX user account:

#/usr/lbin/modprpw –l –k johnm

Running modprpw will unlock the locked user account in HP-UX from command line.without running SAM

NOTE: modprpw is HP-UX command only and wouldn’t work in Solaris,AIX and any Linux servers

That info was ‘borrowed’ from here…. thanks!

Archives Posts

Send Break on SPARC Enterprise T5120 – Send Break on ILOM

October 15th, 2009 by elizar

Send Break on SPARC Enterprise T5120 – well it for the T5000 series I guess, the newer ones. Or “Sending Break onan ILOM..

“->” = ILOM
“sc>” = ALOM

.. and since this particular server has the “->” prompt we’re using the ILOM.

From ILOM to Solaris:
-> start /SP/console

From ALOM to Solaris:
sc> console

And of course.. Enter “#.” to return to ALOM / ILOM !!

Send Break on ILOM

set /HOST send_break_action=break
and then
start /SP/console

c)ontinue, s)ync, r)eset? s

bada bing! bada boom!

Archives Posts

PWS-Gamania Trojan

October 9th, 2009 by elizar

PWS-Gamania or PWS-Gamania.gen.a is a computer trojan discovered July 22, 2008. PWS-Gamania is a password stealing trojan which attempts to steal user information for certain online games.

The characteristics of this password stealer with regards to passwords stolen, sites accessed, files downloaded etc will differ, depending on the way in which the attacker had configured it. Hence, this is a general description.

PWS-Gamania is also knows as

  • Trj/Lineage.BZE [Panda]
  • Trojan.Win32.Vaklik.bkh [Kaspersky]
  • Trojan:Win32/Meredrop [Microsoft]
  • W32.Gammima.AG [Symantec]
  • W32/Autorun-CL [Sophos]

My Dell D630 laptop is probably infected by this one. Good thing I am no gamer nor is there any important password this trojan can steal.

More information about PWS-Gamania can be found here: http://vil.nai.com/vil/content/v_147533.htm

I was here...