You are on page 1of 10

Dell UNITY ™ SolVe Generator

Solution for Validating your engagement

SVC commands

Topic
Additional Procedures

Selections
Additional Procedures: Service Commands

Generated: March 15, 2024 1:02 PM GMT

REPORT PROBLEMS

If you find any errors in this procedure or have comments regarding this application, send email to
SolVeFeedback@dell.com

Copyright © 2023 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies, Dell, EMC, Dell
EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be
trademarks of their respective owners.

The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of
any kind with respect to the information in this publication, and specifically disclaims implied warranties of
merchantability or fitness for a particular purpose.

Use, copying, and distribution of any software described in this publication requires an applicable
software license.

This document may contain certain words that are not consistent with Dell's current language guidelines.
Dell plans to update the document over subsequent future releases to revise these words accordingly.

This document may contain language from third party content that is not under Dell's control and is not
consistent with Dell's current guidelines for Dell's own content. When such third party content is updated
by the relevant third parties, this document will be revised accordingly.

Publication Date: March, 2024

Dell Technologies Confidential Information version: 2.0.0.6

Page 1 of 10
Contents
Preliminary Activity Tasks .......................................................................................................3
Read, understand, and perform these tasks.................................................................................................3
Change the Service password.................................................................................................................9

Dell Technologies Confidential Information version: 2.0.0.6

Page 2 of 10
Preliminary Activity Tasks
This section may contain tasks that you must complete before performing this procedure.

Read, understand, and perform these tasks


1. Table 1 lists tasks, cautions, warnings, notes, and/or knowledgebase (KB) solutions that you need to
be aware of before performing this activity. Read, understand, and when necessary perform any
tasks contained in this table and any tasks contained in any associated knowledgebase solution.

Table 1 List of cautions, warnings, notes, and/or KB solutions related to this activity

2. This is a link to the top trending service topics. These topics may or not be related to this activity.
This is merely a proactive attempt to make you aware of any KB articles that may be associated with
this product.

Note: There may not be any top trending service topics for this product at any given time.

Dell Unity Top Service Topics

Dell Technologies Confidential Information version: 2.0.0.6

Page 3 of 10
Unity Quick Field Guide: Rev05
Table Of Contents

1. Service Commands – useful svc commands


2. Initiate temporary root user on the system
3. IPMI Tool: Connecting to the array via Serial over LAN (SOL) & monitoring the boot process.
4. UEMCLI
5. Reset lost or forgotten Admin and Service Password
6. Change the Service Password

Service Commands – useful svc commands

SERVICE SCRIPTS:
Using a SSH/Telnet client such as PuTTY , enter the system IP address and logon with: L: service P:
<Service password>

Using svc_diag:
spb:~> svc_diag (most common syntax for general SP status)
======== Now executing basic state ========
* System Serial Number is: FNM00154600480
* System Friendly Host Name is:
* Current Software version: upc_Unity_0_201601260019_upcBuilder-4.0.0.6915972-GNOSIS_RETAIL
* Unisphere IP address(es): 10.240.160.20 fe80::260:1600:4860:1ea
* SSH Enabled: true
* FIPS mode: Disabled
* Boot Mode: Normal Mode (If this field shows Rescue Mode, SP is in Service Mode)

Quick way to check CRU components on an SP:


spb:~> svc_diag -s cru
======== Now executing cru state ========
Displaying CRU information:
dpe: OK
temp: 20
spa: OK
------edited----------
spb: OK
dimm0: OK
dimm1: OK
dimm2: OK
dimm3: OK
ps0: OK 112
bbu0: OK
fan0: OK
fan1: OK
fan2: OK
fan3: OK
fan4: OK
slic0: REMOVED UNKNOWN
slic1: REMOVED UNKNOWN

How to determine if User or System put SP into Service Mode?


spa:~> svc_rescue_state -l
USER 0x09 1 1 0x05 (RESCUE MODE REQUESTED) User puts SP into Service
Mode

Dell Technologies Confidential Information version: 2.0.0.6

Page 4 of 10
spa:~> svc_rescue_state -l
BOOTFL 0x0b 3 3 0x00 (RESCUE) Two common counters reached by system which
triggers Service Mode
APPINIT 0x12 3 3 0x00 (RESCUE)
spb:~> svc_diag -l
Valid states are:
basic,bootcontrol,cru,dmilog,extended,network,pmp,resume,sas,software,spinfo,systemstate
Note: Run svc_diag -s with any of the above valid states to return extensive information about the state
in question
spb:~> svc_diag -s network
======== Now executing network state ========
Displaying system network information:
2: mgmt: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen
1000
4: eth3: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc mq state DOWN group default
qlen 1000
5: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen
1000
11: srm@mgmt: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state
UNKNOWN group default
12: mgmt_vdev@mgmt: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state
UNKNOWN group default
inet 10.240.160.20/24 scope global mgmt_vdev
svc_diag -s bootcontrol (Same output as seen from svc_rescue_state -l)
--Use svc_rescue_state to check, set, or clear boot counters
svc_rescue_state -list [Go to Rescue Service Mode; Reimage; Recover Config from backend drives;
Ignore]
svc_rescue_state -clear allows you to clear error condition for reboot attempt
svc_rescue_state -clear_degraded (-d) clears all degraded state indicators
svc_check_hw_config -d checks details of DIMM configuration or errors
svc_help Use this to see all Service Scripts that are available
svc_diag | --state all | --state extended | --state spinfo | --state resume | --state bootcontrol | --state
dmilog | --state cru
svc_diag --state -all Outputs verbose data on all logical and hardware components on the system, log
info, events, counters, and resume
svc_dc
--Performs Data Collection on the array and puts into /EMC/backend/service/data_collection directory
svc_dc -lcd (Shows if there are any core dumps on the system)

SP WILL NOT ENTER SERVICE MODE (Rolling reboots, etc.)


--Some boot issues can be investigated and worked using svc_boot_control flags
svc_boot_control -h
-s | --set [net] : Request stop before the storage system software starts up
-c | --clear [net] : Clear request to stop before the storage system software starts up
-l | --list : Lists boot_control current settings.

Rebooting Single SP:


spb:~> svc_shutdown -r ; uemcli -u service /service/sp -id spa reboot
Can also reboot peer SP via IPMITool
spb:> ipmitool chassis power reset Reboots spb
spb:> ipmitool -I openpeer chassis power reset Reboots peer SP

Note: Must be logged into svc_service_shell as root user before you can use IPMITool commands
directly on the SP
Shutting System Down:

Dell Technologies Confidential Information version: 2.0.0.6

Page 5 of 10
spb:~> svc_shutdown --system-halt
###############################################################################
WARNING: This action will shut down the system and you will have to manually bring it back up
afterwards.
###############################################################################
Enter "yes" if want to proceed with this action: yes
1
1
Set header flag 0x2
Set header flag 0x2

Initiate temporary root user on the system


To gain temporary root user access on a fully powered on Unity system:
Procedure
1. Using a SSH/Telnet client such as PuTTY, enter the system IP address and logon with: L: service P:
<Service password>

2. Initiate a root session:


spb:~> svc_service_shell

• If root access is available, the service prompt returns:


INFO: Successfully enabled svc_service_shell
The svc_service_shell service tool will expire in:
2 day(s), 7 hour(s), 4 minute(s) and 28 second(s).
--- Start of service shell session ---
*** WARNING *** Unity service shell activated! *** WARNING ***
root@spb:/cores/service>
.
• If root access has expired, the service prompt returns:
ERROR: service tool has expired!
Error executing the service-tool. Exiting ...

The root password has expired and must be renewed.

3. Use the svc_inject -k process to renew root access.

a. On the system, generate the current challenge string:


svc_inject -k
Current Challenge: 6C57C-54307-ADE7F-02F4D-4FB76-1234

b. From a web-connected device with access to the EMC internal network, go to


https://hubv1.corp.emc.com/services/service_key_generator and select Service Key Generator to enter
the current challenge string and generate a new service key.

Note : If you do not have access to the EMC network, contact Remote Support for assistance generating
the new service key.

c. Select the Challenge String method.

d. Copy the current challenge string to the Service Key Generator site, complete the remaining
required fields, and then click Generate. The site generates a response key in the Key Details
section.

Dell Technologies Confidential Information version: 2.0.0.6

Page 6 of 10
e. On the system, re-run svc_inject -k and include the generated response key.
svc_inject -k <generated_service_key>
For example:
spb:~> svc_inject -k 1D1DC-9B506-351A7-2F08B-BCB14-75DB7-
AC7E3-1234-01
Note
This injects root access to the system. You must still initiate the root session each time you connect via
SSH for that particular user Shell session using the svc_service_shell command.

IPMI Tool: Connecting to the array via Serial over LAN (SOL) & monitoring the boot process.
Overview: With a Serial over LAN (SOL) console sessions, you can access the SPs directly, run Service
Scripts, run UEMCLI on the primary SP, inject Root User, troubleshoot, reboot the SPs and observe the
reboot on the console, access POST, access BIOS/Setup menu, and perform system re-initialization.
In order to monitor the SP boot or reinit process, you need to establish a Serial over LAN connection to
the SP Service port(s). This is accomplished using the IPMI tool. The IPMI tool can be found on
support.emc.com by searching the Unity Support Tools section. First, install the tool to the C:\ directory of
your service laptop.

Set your local network adapter to the IP address 128.221.1.249 and then connect directly to the Service
LAN Port. Issue the ipmitool command shown below to connect to SPA or SPB. If you need to connect to
both SP A and SPB, you can connect to the Service LAN Ports via a small Ethernet switch. Do not worry
- this will NOT panic the array! Open another command prompt window and issue the command again to
the other SP. Note the 2 different IP address for each service port below. The array Serial Number you
wish to connect to must be used in the command line. Please refer to the EMC IPMI Tool Technical
Notes (300-015-394) document available on support.emc.com for the complete details.

Set the Windows host computer to an IP address on the Internal Network of the SPs:
IP Address: 128.221.1.249
Netmask: 255.255.255.0
Note: No Default Gateway or any other settings required

Launch the IPMITool from two different command prompts, to connect to each SP. Use the serial number
of your array!

C:>ipmitool.exe -I lanplus -C 3 -U console -P FNM00153101234 -H 128.221.1.252 sol


activate SPA
C:>ipmitool.exe -I lanplus -C 3 -U console -P FNM00153101234 -H 128.221.1.253 sol
activate SPB

At the login prompt, user is ‘service’, and password is Password123!


NOTE: if an SP has just been reinited/reimaged, the default service password is ‘service’

UEMCLI

The Unisphere CLI (UEMCLI ) enables you to run commands on a system through a command prompt
from a Microsoft Windows, UNIX/Linux host. You can also directly access UEMCLI through a PuTTy
session or directly on the IPMI tool SOL connection. Use Unisphere for managing a system. The
Unisphere CLI is intended for advanced users who want to use commands in scripts for automating
routine tasks. Additional Info and Examples:

Customers have access only to UEMCLI from a Host system running the UEMCLI client, and should
define user credentials when running commands. Customers do not have access to the root user
account with svc_service_shell Because of this; customers are limited in what they can do directly on
the system.

Dell Technologies Confidential Information version: 2.0.0.6

Page 7 of 10
Saving User Credentials on UEMCLI: (from a Windows command prompt)
C:> uemcli -d <unity_ip> -saveuser -u admin -p <passwd>
--Above command will store the username and password on the Client so that users do not have to enter
it when running UEMCLI

Viewing UEMCLI Command Tree: (from a PuTTy session)


Use an SSH/Telnet client, such as PuTTY, use the system IP address and logon: L: service P:
Customers service password.
spb:~> uemcli / -help

VIEWING USER ROLES CLI:


spb:~> uemcli /user/role show
1: Name = administrator
Description = User will have access to all administrative and management interfaces and data.
2: Name = storageadmin
Description = User will be able to see all storage system data and perform all storage management
operations.
3: Name = operator
Description = User will be able to see all storage system data, but not perform any operations.
4: Name = vmadmin
Description = Can only be used to establish a VASA connection from vCenter to the storage system.
Note: This user cannot login to the system via Unisphere, and can access Alerts/Status, Storage/Status
objects only from vCenter with a VASA provider connection.
CREATING/MODIFYING/DELETING USER ACCOUNTS:
spb:~> uemcli /user/account -h
spb:~> uemcli -u admin -p <passwd> /user/account show
1: ID = user_admin
Name = admin
Role = administrator
Type = local
2: ID = user_Storage
Name = Storage
Role = storageadmin
Type = local

PERFORMING UPGRADE USING UEMCLI:


1) Install uemcli on a Windows Host and run command to show the current SW:
C:\>uemcli -d <ip> -u Local/admin -p <passwd> /sys/soft/ver show
1: ID = INST_1
Type = installed
Version = 4.0.0.6674401
Release date = 2015-12-10 04:17:15
Image type =
2) Download an Upgrade Image file to Uemcli Client System
3) Upload the Candidate software to the system:
C:\_dwnloads>uemcli -d <ip> -u Local/admin -p <passwd> -upload -f VNXe-
upc_Unity_0_201512160053_upcBuilder-upgrade-4.0.0.6707721-4.0.0.6707721-
GNOSIS_DEBUG.tgz.bin.gpg upgrade
Uploaded 1.80 GB of 1.80 GB [ 100.0% ] -PROCESSING-
Operation completed successfully.
C:\_dwnloads>uemcli -d <ip> -u Local/admin -p <passwd> /sys/soft/ver -type candidate show
1: ID = CAND_1
Type = candidate
Version = 4.0.0.6707721

Dell Technologies Confidential Information version: 2.0.0.6

Page 8 of 10
Release date = 2015-12-16 08:31:44
Image type = software
4) Create a Upgrade Session:
C:\_dwnloads>uemcli -d <ip> -u Local/admin -p <paswd> /sys/soft/upgrade create -candId 1
Operation completed successfully.
5) Monitor Upgrade:
C:\_dwnloads>uemcli -d <ip> -u Local/admin -p <passwd> /sys/soft/upgrade show
1: Status = running
Creation time = 2015-12-17 18:53:26
Elapsed time = 2s
Estimated time left =
Progress =
Percent complete = 2%
6) If the Upgrade attempt fails, fix the issue and restart the upgrade:
spb:~> uemcli -d <ip> -u Local/admin -p <passwd> /sys/soft/upgrade resume

Reset the lost or forgotten Admin and Service Password


Follow these steps:
1. On the back of the disk processor enclosure, locate the password reset button (NMI) on either
Storage Processor. It's located in a small hole and label below shows 'two triangles pointing at
each other. (Next to the Fault and Power LEDS)
2. Using a pen or a paper clip or similar blunt object, press and hold the password reset button
(approximately 2 to 3 seconds) until the fault LED flashes blue. You only need to press the
button on one of the storage processors (SPs). Approximately two minutes later, the Fault LED
turns steady blue.
• Be careful!! Pressing the reset button for more than 10 seconds will reset (reboot) the
storage processor.
3. Connect to the Unity array using a browser and logon as admin with the default password of
Password123#. The default password for the service account is service. After logging in you will
be prompted to reset the default passwords for the admin and service accounts.

Note: Now that you have access to the system again, if you need to change the Admin account password
from the GUI:

Click on the Person icon and select Change Password

For other users, click on the Gear Icon for Update System Settings > Users and Groups
>User Management> select the Individual user(s) and click on More Actions and select reset
password.

Change the Service password

Prerequisites:
Both Storage Processors (SPs) must be present in the system and their boot mode must be Normal
Mode. If you have removed an SP or an SP has failed, you must replace the SP before you can change
the Service password.

SSH method:
Change Service Password:

spb:>svc_service_password -s

Dell Technologies Confidential Information version: 2.0.0.6

Page 9 of 10
New Password:
Attempting to change service password ...
INFO: Service account password has been changed successfully
Note: You must use at least one special character for the password, and system
remembers the last 3 passwords used and will not allow reuse until 4th time a password
was originally used.
New Password:
--- WARNING: The password should consist of at least one special character
Error: password is non-compliant, not changing it.

UEMCLI Method:
Changing Service Password using UEMCLI:

spb:/ >uemcli -u admin -p <passwd> /service/user set -passwd <new> -oldpasswd <old>

Changing Admin Password from UEMCLI: 481063

spb:/cores/service>uemcli -u admin -p <passwd> /user/account -id user_admin set -


passwd <new> -oldpasswd <value>

REV.05 removed USB method. New reinit KBs have been added.

Dell Technologies Confidential Information version: 2.0.0.6

Page 10 of 10

You might also like