Sponsored Content
Full Discussion: ILOM AND ALOM IP adresses
Operating Systems Solaris ILOM AND ALOM IP adresses Post 302518166 by pradeepaasuri on Thursday 28th of April 2011 07:09:01 PM
Old 04-28-2011
ILOM AND ALOM IP adresses

hi guys

How to know ILOM and ALOM ip address.

how to find the ilom alerts and alom alerts can one help out pls


thanks,
deepu.

---------- Post updated at 04:39 AM ---------- Previous update was at 04:38 AM ----------

Quote:
Originally Posted by pradeepaasuri
hi guys

How to know ILOM and ALOM ip address.

how to find the ilom alerts and alom alerts can one help out pls


thanks,
deepu.

Last edited by Scott; 04-28-2011 at 08:11 PM.. Reason: Moved to Solaris forum - please do not Hijack threads
 

10 More Discussions You Might Find Interesting

1. Solaris

Setting up static ip-adresses, Solaris 10

Hello, Iam having problems getting more then one ip to work here is my setup! Hostname: nexus NIC: e000g1 (example ips) My ips 80.80.80.15 to 80.80.80.20 Defaultrouter 80.80.80.1 nameservers 80.80.80.100 and 80.80.80.200 How would i do this? Any help would be mutch appriciated!... (7 Replies)
Discussion started by: empty
7 Replies

2. UNIX for Dummies Questions & Answers

multiple IP adresses on one machine

hello people i hope you can please help me. i have a server and several ip-addresses pointing to it. now i want a) that the server can be reached on all ip adresses from the internet b) that i can access the internet from the server and decide which IP-address is being used ( i can... (4 Replies)
Discussion started by: scarfake
4 Replies

3. Solaris

LOM ALOM ILOM ELOM RSC SP commands equivalent

Has anyone got an equivalent commands sheet for all Sun's serial or network management ports? (1 Reply)
Discussion started by: son_t
1 Replies

4. Shell Programming and Scripting

Uniq adresses with number of occurrence

Alo I have a file with a lot of addresses where I want to list unique addresses and the number of theirs occurrence. I have this input file: 0011bd09 ea 01 0b 04 ea 01 0b 38-bd 11 00 98 15 cb 01 00 .......8........ 0011bd09 ea 11 00 98 15 cb 01 00-00 00 00 d8 3d 8d 01 94 ... (5 Replies)
Discussion started by: chitech
5 Replies

5. UNIX for Advanced & Expert Users

ILOM Alert messages to Solaris OS - X4250 (Intel based NO ALOM)

Hi, I have a problem when running some tests. I unplug one power cable from the server. No message is sent to/var/adm/messages On the ILOM GUI, it shows power state deasserted. Anyone knows how to forward this message to the OS, perhaps using the alert management settings? IPMI,snmp?... (1 Reply)
Discussion started by: ulemsee
1 Replies

6. Solaris

Difference b/n ALOM and ALOM CMT

Hi Everyone. What is the differece b/n ALOM and ALOM CMT Service processor. I am trying reset ALOM login/passwd using scadm utility on T2000, while I am googling I came cross ALOM CMT doesnt support scadm utility, but ALOM supports. Not sure how different are these. Thanks, (0 Replies)
Discussion started by: bobby320
0 Replies

7. Solaris

Resetting ALOM

Hi gurus, I have a sun netra 240 server. I want to get to the ALOM but it always ask for login and password. Can anyone tell me how I can reset the ALOM it to default so I can be able to configure it? Thanks lots. (2 Replies)
Discussion started by: cjashu
2 Replies

8. Shell Programming and Scripting

Convertin IP adresses from a column to a raw + add a comma between addresses

Hi all, I have a list of IP addresses in a column in a text file name ipaddress.txt 192.168.0.1 192.168.0.2 192.168.0.5 192.168.0.4 192.168.0.5 I would like to convert ipaddress.txt to have the following thing : 192.168.0.1, 192.168.0.2, 192.168.0.3,192.168.0.4,192.168.0.5 I know... (4 Replies)
Discussion started by: oliv66
4 Replies

9. Solaris

Alom

Hi, How to set ip address on eth0 for access ssh from ALOM? Is it possible? Now i cannot access it because don't have VGA. I keep try to access using ssh. Please guide me. Thanks. (16 Replies)
Discussion started by: mzainal
16 Replies

10. Hardware

Alom ?

Hi all, I have some problems with the fan FT0.F0, which looks like has a problem with the PROM/ALOM ( I am nor sure who).....but, in fact, the fan is working properly even in other V440 Sparc Server. We checked HW comunication between Fan and the MotherBoard, and we think is a problem of... (8 Replies)
Discussion started by: proof_enrique
8 Replies
sealert(8)																sealert(8)

NAME
sealert - setroubleshoot client tool SYNOPSIS
sealert [-b] [-f local_id] [-h] [-s] [-S] [-l id] [-a file] [-u] [-p] [-P plugin_name] DESCRIPTION
This manual page describes the sealert program. sealert is the user interface component (either GUI or command line) to the setroubleshoot system. setroubleshoot is used to diagnose SELinux denials and attempts to provide user friendly explanations for a SELinux denial (e.g. AVC) and recommendations for how one might adjust the system to prevent the denial in the future. In a standard configuration setroubleshoot is composed of two components, setroubleshootd and sealert. setroubleshootd is a system daemon which runs with root privileges and listens for audit events emitted from the kernel related to SELinux. The audit daemon must be running. The audit daemon sends a dbus message to the setroubleshootd daemon when the system gets an SELinux AVC denial. The setroubleshootd daemon then runs a series of analysis plugins which examines the audit data related to the AVC. It records the results of the analysis and signals any clients which have attached to the setroubleshootd daemon that a new alert has been seen. sealert can be run in either a GUI mode or a command line mode. In both instances sealert run as a user process with the privileges associ- ated with the user. In GUI mode it attaches to a setroubleshootd server instance and listens for notifications of new alerts. When a new alert arrives it alerts the desktop user via a notification in the status icon area. The user may then click on the alert notification which will open an alert browser. In addition to the current alert sealert communicates with the setroubleshootd daemon to access all prior alerts stored in the setroubleshoot database. The user may elect to tag any given alert as "ignore" in the browser which prevents any future notification for the given alert. This is useful when a user is already aware of a reoccurring problem. sealert may also be run in command line mode. The two most useful command line options are -l to "lookup" an alert ID and -a to "analyze" a log file. When setroubleshootd generates a new alert it assigns it a local ID and writes this as a syslog message. The -l lookup option may then be used to retrieve the alert from the setroubleshootd alert database and write it to stdout. This is most useful when setroubleshootd is being run on a headless system without the GUI desktop alert facility. The -a analyze option is equivalent to the "Scan Logfile" command in the browser. The log file is scanned for audit messages, analysis is performed, alerts generated, and then written to stdout. LOG FILE SCANNING
You may ask sealert to parse a file accumulating all the audit messages it finds in that file. As each audit event is recognized it is pre- sented for analysis which may generate an alert report if the analysis was successful. If the same type of event is seen multiple times resulting in the same report the results are coalesced into a single report. The report count field will indicate the number of times the tool thought it saw the same issue. The report will also include a list of every line number on which it found an audit record which con- tributed to the coalesced report. This will allow you to coordinate the contents of the file with the analysis results if need be. Log file scanning may be initiated from the sealert browser via the File::ScanLogFile menu or from the command line via 'sealert -a file- name'. Please note that sealert runs as a user level process with the permissions of the user running it. Many system log files are read- able by root only. To work around this if you have root access one can copy the file as root to a temporary file and change its permis- sions. This is a good solution when scanning via the GUI as a normal user. Or you might consider su'ing to root and run the analysis via the command line (e.g. sealert -a filename). The audit records in the log file must be valid syntactically correct audit messages or the parser will ignore them. OPTIONS
-b --browser Launch the browser -f --fix Execute the fix command for the avc with the given uuid and plugin, requires --plugin option. -h --help Show this message -s --service Start sealert service, Usually used by dbus. -S --noservice Start sealert without dbus service as stand alone app -l --lookupid id Lookup alert by id, if id is wildcard * then return all alerts -a --analyze file Scan a log file, analyze its AVC's -u --user logon as user -p --password set user password -P --plugin Set plugin name associated with the --fix option AUTHOR
This man page was written by John Dennis <jdennis@redhat.com> and Dan Walsh <dwalsh@redhat.com>. SEE ALSO
selinux(8), 20061121 sealert(8)
All times are GMT -4. The time now is 02:28 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy