03-26-2013
HP DL380 g6 Riser kit
I have 2 DL380g6 servers, one server has a riser kit installed and the other does not. running rhel5.6, how from the OS can I see the riser kit is installed? lspci didn't list the riser kit, but then again I'm not entirely sure its classified as a pci device? Is there a way to see it from the OS
9 More Discussions You Might Find Interesting
1. Debian
ello all..
I really have a big problem installing debian 4.0 on HP dl380 G5 ,2 74 sScsi in raid 1 (mirror), after all selected options, it's freezes on getting files 125 of 125 and stops on 5% of the installation. I've try with different cd's and cd-roms so that's not the problem! Can someone... (4 Replies)
Discussion started by: res5it
4 Replies
2. Solaris
1) Does anyone know IF HP Proliant DL380 G3 is compatible to install Solaris 10 - as whenever I tried to install, it gives an error saying 'No disk found' after keying in date/time etc.
2) I found somewhere that text installation will be able to fix it - What is text installation?
Thank you (7 Replies)
Discussion started by: panchpan
7 Replies
3. UNIX for Dummies Questions & Answers
Trying to install Openserver 6.0 on this server which has an integrated Smart Array P400.
Install halts with the message .......
"Incorrect Disk Partitioning .........................."
I havent yet got to the "divvy" and disk partitioning section of the install section so I am... (2 Replies)
Discussion started by: farmacy
2 Replies
4. AIX
Hello,
When I try to upgrade AIX from 5.1 to 5.3 I get this error message
20EE0008 : No adapters found Adapter, Riser, System Bd.
Anyone know anything about it ? (1 Reply)
Discussion started by: filosophizer
1 Replies
5. Solaris
Dear Guys,
I want to know more about root-kit in Solaris.. If I'm not mistaken, root-kit is a bunch of scripts nor executable program that can manipulate root-privileges.
And sometimes, root-kit is defined as malware.. Is that right?
How to check whether my system got root-kit installed?... (2 Replies)
Discussion started by: frankoko
2 Replies
6. Debian
Hello,
I have a few questions about this server.
It has two CPU's 3.20 ghz / 800 mhz / 1MB L2
5120 MB RAM
6 hard disks on HP Smart Array 6i controller (36.4 GB Ultra320 SCSI HD each)
RAID set to RAID 5 (5 discs) with one spare (6th disk)
USB, 2 Ethernet ports, 1 ILO port, 1 SCSI port
... (2 Replies)
Discussion started by: Marcus Aurelius
2 Replies
7. UNIX for Dummies Questions & Answers
Hi,
I have Redhat Linux 5.9. I need to connect all the ILO to different switch which can support 1 Gig. How can I find if ILO port can support gigabit?
I am on HP website but not able to find anything about this information. Not sure I am looking in the correct place.
Please help. (3 Replies)
Discussion started by: samnyc
3 Replies
8. Linux
I'm running glusterfs on CentOS 6.6 two nodes, (the SSD (samsung 840 1TB x2) is RAID 0 on the HP DL380 G6) x2, and trimming is not enable on it by checking /dev/sdb1/xxxxx/discard_max_bytes=0. Do I still need trimming? Somehow my filesystem is fine with 35-30% free space and running very fast.
... (1 Reply)
Discussion started by: itik
1 Replies
9. SCO
Hi
I hope this is the right forum.
I am attempting to install SCO 5.0.7 on a Proliant DL380 G7 with a Smart Array P410I Controller.
I need a driver for this. Can anybody point me to a download?
Thanks in anticipation. (12 Replies)
Discussion started by: Stuart1946
12 Replies
LEARN ABOUT CENTOS
p11-kit
P11-KIT(8) System Commands P11-KIT(8)
NAME
p11-kit - Tool for operating on configured PKCS#11 modules
SYNOPSIS
p11-kit list-modules
p11-kit extract --filter=<what> --format=<type> /path/to/destination
DESCRIPTION
p11-kit is a command line tool that can be used to perform operations on PKCS#11 modules configured on the system.
See the various sub commands below. The following global options can be used:
-v, --verbose
Run in verbose mode with debug output.
-q, --quiet
Run in quiet mode without warning or failure messages.
LIST MODULES
List system configured PKCS#11 modules.
$ p11-kit list-modules
The modules, information about them and the tokens present in the PKCS#11 modules will be displayed.
EXTRACT
Extract certificates from configured PKCS#11 modules.
$ p11-kit extract --format=x509-directory --filter=ca-anchors /path/to/directory
You can specify the following options to control what to extract. The --filter and --format arguments should be specified. By default this
command will not overwrite the destination file or directory.
--comment
Add identifying comments to PEM bundle output files before each certificate.
--filter=<what>
Specifies what certificates to extract. You can specify the following values:
ca-anchors
Certificate anchors (default)
trust-policy
Anchors and blacklist
blacklist
Blacklisted certificates
certificates
All certificates
pkcs11:object=xx
A PKCS#11 URI
If an output format is chosen that cannot support type what has been specified by the filter, a message will be printed.
None of the available formats support storage of blacklist entries that do not contain a full certificate. Thus any certificates
blacklisted by their issuer and serial number alone, are not included in the extracted blacklist.
--format=<type>
The format of the destination file or directory. You can specify one of the following values:
x509-file
DER X.509 certificate file
x509-directory
directory of X.509 certificates
pem-bundle
File containing one or more certificate PEM blocks
pem-directory
Directory PEM files each containing one certifiacte
openssl-bundle
OpenSSL specific PEM bundle of certificates
openssl-directory
Directory of OpenSSL specific PEM files
java-cacerts
Java keystore 'cacerts' certificate bundle
--overwrite
Overwrite output file or directory.
--purpose=<usage>
Limit to certificates usable for the given purpose You can specify one of the following values:
server-auth
For authenticating servers
client-auth
For authenticating clients
email
For email protection
code-signing
For authenticated signed code
1.2.3.4.5...
An arbitrary purpose OID
EXTRACT TRUST
Extract standard trust information files.
$ p11-kit extract-trust
OpenSSL, GnuTLS and Java cannot currently read trust information directly from the trust policy module. This command extracts trust
information such as certificate anchors for use by these libraries.
What this command does, and where it extracts the files is distribution or site specific. Packagers or administrators are expected
customize this command.
BUGS
Please send bug reports to either the distribution bug tracker or the upstream bug tracker at
https://bugs.freedesktop.org/enter_bug.cgi?product=p11-glue&component=p11-kit.
SEE ALSO
pkcs11.conf(5)
Further details available in the p11-kit online documentation at http://p11-glue.freedesktop.org/doc/p11-kit/.
p11-kit P11-KIT(8)