sun M-series XSCF snapshot generating

Oracle SUN M-series has an new extended System Control Facility (XSCF) firmware with powerful console prompt. XSCF has its own processor to monitor the server hardware.Even though the server is down,XSCF will be always available until power supply coming to the server. When you are running XSCF snapshot,it will collect complete physical server information not with specific domains which you have configured on the server and there will no impact by running snapshot on live machine.In this post we are going to see more about XSCF snapshot.The XSCF snapshot command which collects the configuration setup, environmental,logs, errors, and FRU-ID information which are required to perform the diagnosis.

In order to take XSCF snapshot,login to server console.
Note:You should have platadm or fieldeng privileges to run snapshot.

This procedure applplicable to the below mentioned servers.
Sun SPARC Enterprise M9000-32 Server
Sun SPARC Enterprise M3000 Server
Sun SPARC Enterprise M4000 Server
Sun SPARC Enterprise M9000-64 Server
Sun SPARC Enterprise M5000 Server

From the server XSCF prompt, run the below command. And specify the your destination server location to store the snapshot.

XSCF> snapshot -L F -t test@
Downloading Public Key from ''...
Public Key Fingerprint: 68:5a:d9:02:1b:62:c9:a8:95:1a:52:31:9c:c4:82:b0
Accept this public key (yes/no)? yes
Enter ssh password for user 'test' on host '':
Setting up ssh connection to test@
Collecting data into test@
Data collection complete
XSCF> exit

Destination host to save snapshot:
user name:test
Path to save file:/home/test.

Once the snapshot has been done,then you can upload it Oracle using the below method.They will anaysis the snapshot and help you to fix the issue.

login: anonymous
password: "email address which used for rasing the oracle SR."
cd cores
put snapshot_file
Non-interactive Method of running snapshot:

To run the xscfextended module in non-interactive mode, you need to setup the Explorer host.You setup an Explorer host by creating the input file xscfinput.txt in the ${XPL_ETC} directory, the file should be owned by user root and its permissions should be 0400 or 0600. A line in the xscfinput.txt file can be a type T, type X or type A:

  • T: T <KEY> <XSCF password>, used by all sections in .explorer with same KEY, if XSCF password is needed, not in scope for this document
  • X: X <HST> <USR> <XSCF password>, used by section in .explorer, if XSCF password is needed, not in scope for this document
  • A: A <ARCH_HOST> <ARCH_USER> <section_header> <ARCH_USER password>, used to search section in .explorer, then connect to XSCF

How to run XSCF snapshot from Operating system ?

Like other SUN servers,console snapshot can be produced from OS itself.The necessary files has been included in Oracle Explorer STB bundles.When you are starting the Explorer ,you just need to mention option -w xscfextended, it is capable of collecting a Snapshot on the specified XSCF(s).1.In a order to get XSCF snapshot from explorer,user “explorer” must be present in XSCF console with privileges of platadm & explorer.If not add it using below method.

   XSCF> adduser explorer
   XSCF> setprivileges explorer platadm
   XSCF> password explorer
   New XSCF password:
   Retype new XSCF password:

2.Verify explorer user login on XSCF was added and the correct permissions were applied.

XSCF> showuser explorer
User Name: explorer
UID: 100
Status: Enabled
Minimum: 0
Maximum: 99999
Warning: 7
Inactive: -1
Last Change: May 27, 2013
Password Expires: Never
Password Inactive: Never
Account Expires: Never
Privileges: platadm

3.As root on the  host, establish the known_hosts entry on the explorer host for the XSCF.

# ssh -l explorer
The authenticity of host ' (' can't be established.
RSA key fingerprint is 70:d0:64:fb:4g:89:5b:b0:f0:ef:7b:41:71:3f:44:b9.
Are you sure you want to continue connecting (yes/no)? yes

Warning: Permanently added '' (RSA) to the list of known hosts.
explorer@'s password:
Last login: Thu May  27 13:47:31 2013 from sfos

4.As root,Generate a new dsa key, with empty pass phrase.

bash-3.00# ssh-keygen -t dsa
Generating public/private dsa key pair.
Enter file in which to save the key (//.ssh/id_dsa):
Created directory '//.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in //.ssh/id_dsa.
Your public key has been saved in //.ssh/
The key fingerprint is:
55:65:70:0c:84:be:00:41:1a:1e:34:7f:aa:8b:04:08 root@sfos

In some cases,your system may already have DSA keys on the can see DSA key using below method.

bash-3.00# cd .ssh/
bash-3.00# ls -lrt
total 6
-rw-------   1 root     root         668 May 27 10:33 id_dsa
-rw-r--r--   1 root     root         599 May 27 10:33
bash-3.00# cat
ssh-dss AAAAB3NzaC1kc3MAAACBAKQ/Ydlwgzs6lNx+JGzRawdmP/pFncZ0P27t3dNH/hkuiSY0JrY5usUY7dUgqu//ThgttTXnWAJTeAjGLGMgVo1h/sBdpNtEY5MufVrJ/oICNI33g1J4fBhxQfmd0LH2CjGSdZNvQ/6qMMfHBPAEelYvlotpYguDG1KhfDIuZg//AAAAFQCYX7Q30TUYHrdbQGYFcGaHCND2ywAAAIBtU908tZBGoOTmY9juLAFPAQkJ8lFcm4h30AgMl5Ub7XtgZPvY4M0eLeC1SQGWpGemjRws5dTohApOt3JeikmiyhKoy+yM2VnZ3626k2Qf4Pq3G5DEMzqPH+UQ9bbvMqtV+MRTutzwGrcS58xHXi3/Ix1YoGYHcf0CURdrNnHVaAAAAIAgT9I0XbiBC0gUa959/FsseZMWqintxJCRA0Ozalfo0BMFnxnEqHD3hAgY9GBjpF11090P27tsinNB8Qda/83hkCSSi3DhJNJh925kSVtkR7PyrmGo6cpbs79qfMVpJtlbnXhoDRIPGJfyPxisjmZJJaja3/3b4zcUw8Kbb7YeHQ== root@sfos
bash-3.00# pwd

5. Login to XSCF using explorer and Copy the contents of .

XSCF> setssh -c addpubkey
Please input a public key:
ssh-dss AAAAB3NzaC1kc3MAAACBAKQ/Ydlwgzs6lNx+JGzRawdmP/pFncZ0P27t3dNH/hkuiSY0JrY5usUY7dUgqu/
DRIPGJfyPxisjmZJJaja3/3b4zcUw8Kbb7YeHQ== root@sfos


6.Now you will able to login from root@sfos to XSCF using explorer account without password.

# id
uid=0(root) gid=0(root)
# ssh -l explorer
Last login: Thu May  27 14:17:32 2013 from sfos

7.Setup archiving from the XSCF to the explorer host.

XSCF> setarchiving disable
XSCF> setarchiving -k download -r -t root@
Fingerprint: 27:5e:08:5a:34:7c:3e:7b:45:d8:75:7a:43:21:8a:d2
Accept this public key (yes/no)  yes
Enter ssh password for root@

XSCF> setarchiving enable
Testing the archiving configuration...
Logs will be archived to

8. Test the connectivity via snapshot -T -D from XSCF console.

XSCF> snapshot -T -D /opt/SUNWexplo/tmp
Setting up ssh connection to root@
Collecting data into root@
Data collection complete

9.Now you can test our work from OS.

# chmod 1777 /opt/SUNWexplo/tmp
# cd /opt/SUNWexplo/bin
# ./explorer -w xscfextended,default
May 27 07:46:02 v4u-m5000a-dom00[25803] explorer: explorer ID: explorer.809210d0.v4u-m5000a-dom00-2013.
May 27 07:46:02 v4u-m5000a-dom00[25803] patch: RUNNING
May 27 07:46:02 v4u-m5000a-dom00[25803] pkg: RUNNING
May 27 07:46:22 v4u-m5000a-dom00[25803] sysconfig: RUNNING
May 27 07:46:52 v4u-m5000a-dom00[25803] xscfextended: RUNNING
Type return to end the list Remote hostname or IP address:

10.When prompted for IP address & host; Supply the IP address of the xscf and user explorer
Remote hostname or IP address:
Remote username:explorer

If you do not want to prompt for IP address & explorer,have /etc/opt/SUNWexplo/xscfinput.txt with host/login combinations to automate the snapshot.