Forensic - HP X5000 G2 Administrator's Manual

Hp network storage system
Table of Contents

Advertisement

Restrictions
<URL>should be formatted as: protocol://host/path/filename.
Host is a fully qualified domain name or an IPv4 address.
path/filename is the pathname of the file to download.
Use FORCE to allow downgrading firmware even if settings/passwords may be lost.

Forensic

The following set of forensically useful functions is supported by the EM CLI.
CLEAR SYSLOG
Syntax
CLEAR SYSLOG [ EM | ENCLOSURE ]
Description
Completely erases the local syslog of the Enclosure Manager. The EM prompts the user for
confirmation because once deleted, this information cannot be recovered.
Restrictions
Only deletes the syslog stored inside the EM itself; it does not delete the remote syslog, if remote
logging is enabled.
SHOW SYSLOG SERVER
Syntax
SHOW SYSLOG SERVER <bay#>
Description
Displays the syslog for the specified server. If the session is not in script mode, the EM paged the
display of the output to throttle output and give the user time to view the data. iLO syslog data is
formatted in XML.
Restrictions
<bay#> must be 1 or 2.
This command can only function if enclosure power is on. Because the EMU hardware cannot
determine if a blade is physically present unless enclosure power is on, the EM reports the
warning "Could not determine the IP address of the management processor for blade" if this
command is issued when power is off.
SHOW SYSLOG EM
Syntax
SHOW SYSLOG EM
Description
Displays the local syslog for the Enclosure Manager.
Restrictions
None
Forensic 153

Advertisement

Table of Contents
loading

Table of Contents