NCM 92 Troubleshooting Guide
NCM 92 Troubleshooting Guide
NCM 92 Troubleshooting Guide
Troubleshooting Guide
P/N 300-999-889
REV 01
Copyright 2009 - 2013 EMC Corporation. All rights reserved. Published in the USA.
Published March, 2013
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without
notice.
The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect
to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular
purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries.
All other trademarks used herein are the property of their respective owners.
For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com).
CONTENTS
Preface
Chapter 1
Introduction
What is Network Configuration Manager? .................................................... 10
About this Manual ...................................................................................... 10
Using the saveLogs.pl diagnostic script....................................................... 10
Chapter 2
Chapter 3
14
17
20
22
23
23
24
24
25
Chapter 4
Chapter 5
Glossary
Index
Contents
PREFACE
As part of an effort to improve its product lines, EMC periodically releases revisions of its
software and hardware. Therefore, some functions described in this document might not
be supported by all versions of the software or hardware currently in use. The product
release notes provide the most up-to-date information on product features.
Contact your EMC technical support professional if a product does not function properly or
does not function as described in this document.
This document was accurate at publication time. Go to EMC Online Support
(https://support.emc.com) to ensure that you are using the latest version of this
document.
Revision history
Date
Revision
Description
March, 2013
01
GA release
Purpose
This document describes the troubleshooting information for EMC Smarts Network
Configuration Manager Version 9.2.
Audience
This document is part of the EMC Smarts Network Configuration Manager documentation
set, and is intended for use by those individuals who have the responsibility of installing
and deploying Network Configuration Manager, Report Advisor, Compliance Advisor, or
Network Advisor.
Related documentation
The following EMC publications provide additional information:
Smarts Network Configuration Manager EMC Data Access API (EDAA) Programmer
Guide
EMC Smarts Network Configuration Manager Device Access Scripting Language (DASL)
Specifications Guide
Preface
EMC Smarts Network Configuration Manager Device Driver Toolkit Technical Notes
NOTICE is used to address practices not related to personal injury.
Note: A note presents information that is important, but not hazard-related.
IMPORTANT
An important notice contains information essential to software or hardware operation.
Typographical conventions
EMC uses the following type style conventions in this document:
Bold
Italic
Monospace
Use for:
System output, such as an error message or script
System code
Pathnames, filenames, prompts, and syntax
Commands and options
Monospace bold
[]
{}
...
Preface
Technical support Go to EMC Online Support and click Service Center. You will see
several options for contacting EMC Technical Support. Note that to open a service request,
you must have a valid support agreement. Contact your EMC sales representative for
details about obtaining a valid support agreement or with questions about your account.
Your comments
Your suggestions will help us continue to improve the accuracy, organization, and overall
quality of the user publications. Send your opinions of this document to:
[email protected]
Preface
CHAPTER 1
Introduction
This chapter presents these topics:
Introduction
Introduction
Via real-time auto discovery of network devices and logical and physical topology
information, Network Configuration Manager provides a proactive configuration
management approach.
10
Description
./saveLogs.pl CS
./saveLogs.pl DS
./saveLogs.pl AP
Introduction
Table 1
Description
./saveLogs.pl RA
./saveLogs.pl all
./saveLogs.pl logs
./saveLogs.pl tomcat
./saveLogs.pl jboss
./saveLogs.pl database
./saveLogs.pl jstack
./saveLogs.pl install
./saveLogs.pl ds_cache
./saveLogs.pl snapshot
11
Introduction
12
CHAPTER 2
Installation error messages and solutions
This chapter presents these topics:
14
17
20
23
23
24
24
25
13
14
Error Message
Solution
/usr/sbin/selinuxenabled is required to
determine if SELinux is enabled.
15
16
Solution
17
18
C:\Windows\system32\prodspec.ini is
required to validate the OS version.
19
20
Error Message
Solution
21
Solution
Kill -9 <jboss_pid>
Restart jboss
/etc/init.d/jboss start
22
Migration Errors
The following problems can occur when migrating to the latest version of Network
Configuration Manager.
Problem/Error Message
Solution
Solution
Migration Errors
23
Solution
Report Advisor must be installed on this server. The Report Advisor product must be installed
locally on the server before proceeding with the
installation of another product.
Could not determine Perl version from perl -v
command.
Solution
Report Advisor must be installed on this server. The Report Advisor product must be installed
locally on the server before proceeding with the
installation of another product.
24
Custom actions:
com.zerog.ia.customcode.util.miscutils.ThrowInstallError
Status: FATAL ERROR
Additional Notes: FATAL ERROR class
com.zerog.ia.customcode.util.miscutils.ThrowInstallError
FatalInstallException: An error occurred while running the
post-install script for the Core component. The stderr output is:
MAC verified OK
MAC verified OK
1 out of 1 certificate requests certified, commit? [y/n]Write out
database with 1 new entries
Data Base Updated
ERROR: Timeout exceeded waiting for server configuration to sync.
ERROR: The server registration process failed. Verify that the Apache
HTTP Server is running and listening on both TCP 80 and TCP 443.
Solution
Check if Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy is
enabled.
Error (for Windows)
Custom Action:
com.zerog.ia.customcode.util.miscutils.ThrowInstallError
Status: FATAL ERROR
Additional Notes: FATAL ERROR class
com.zerog.ia.customcode.util.miscutils.ThrowInstallError
FatalInstallException: An error occurred while running the
post-install script for the AppServer component. The stderr output
is: ERROR: The system was unable to find the specified registry key
or value.
Loading 'screen' into random state - done
ERROR: The system was unable to find the specified registry key or
value.
ERROR: The system was unable to find the specified registry key or
value.
wrapper | Service command: C:\Voyence\tools\sshdaemon\bin\Wrapper.exe
-s C:/Voyence\tools\sshdaemon\conf\sshd-service.conf
wrapper | NCM_SSHDaemon installed.
Enter key password for <tomcat>
(RETURN if same as keystore password): WARNING: Failed to start
service: ncm-msa
'chown' is not recognized as an internal or external command,
operable program or batch file.
25
Solution
Uninstall the existing installtion. In the Windows registry, delete NCM-msa entry.
26
CHAPTER 3
General error messages and solutions
This chapter presents the topic:
27
Solution
28
2. source /etc/voyence.conf
3. cmd ./cstdriver -lockbox ../data/lockb.clb
-passphrase <passphrase for lockbox>
4. Restart vcmaster.
29
30
CHAPTER 4
Common Installation Questions and Answers
The following are common questions when installing or upgrading Network Configuration
Manager.
Question
Answer
31
32
CHAPTER 5
Common RSA Token Service Questions and
Answers
The following are common questions when using RSA credentials and RSA tokens within
Network Configuration Manager
The Network Configuration Manager RSA Token Server is the physical windows box on
which the Network Configuration Manager RSA Token Service is installed
Question
Answer
33
34
GLOSSARY
This glossary details the terms and acronyms related to Report Advisor that you may
encounter while using this document.
A
Administrator (admin)
The person responsible for administrative tasks such as access authorization and content
management. Administrators can also grant levels of authority to users.
Application
Programming Interface
(API)
Application server
Software that handles communication with the client requesting an asset and queries of
the Content Manager.
AS
Authentication
Application Server
For validation and access into Network Configuration Manager, prior to being setup
inNetwork Configuration Manager each user must be created on the authentication server.
When a user is created, the method of authentication is selected. Based on this selection,
when the user attempts to log into Network Configuration Manager, the user's User ID, and
if needed, Password are validated via the selected server.
B
Backup
Browser
Cluster
CS
To create a copy of computer data that can be used to restore data that has been lost,
mislaid, corrupted or erased.
A program allowing users to view (but not alter) data. C
A group of application servers that collaborates for workload balancing.
Combination Server
D
Device Server
DNS
DS
The appliance that is responsible for all communications with the network devices. As part
of a scalable architecture, a network can employ multiple device servers to isolate
overlapping address spaces, limit WAN traffic over slow connections, and balance the
device load of a large environment.
Domain Name System.
Device Server
35
Glossary
F
FQDN
Fully qualified device name. A qualified name that includes all names in the hierarchical
sequence above the structure member to which the name refers, as well as the name of
the member itself.
A type of computer interface that presents a visual metaphor of a real-world scene, often
of a desktop, by combining high-resolution graphics, pointing devices, menu bars and
other menus, overlapping windows, icons and the object-action relationship
I
IP address (Internet
Protocol address)
A unique address for a device or logical unit on a network that uses the IP standard.
J
Java
Java file
L
Local Database
Log file
M
Migrate
MMDDYYYY
N
Network Administrator
Any user that has Network Management permissions in Network Configuration Manager.
Network Administrator can create, manage, and delete networks and network properties
within the application.
A person who defines the network configuration and other network-related information.
This person controls how an enterprise or system uses its network resources.
NTP
Network Time Protocol. A protocol built on top of TCP/IP that assures accurate local
timekeeping with reference to radio, atomic or other clocks located on the Internet.
O
OS
36
Operating System
Glossary
P
Permissions
Permissions allow Users and Groups access to information and tasks within Network
Configuration Manager.
This includes the authority granted to users to give them access to an application's
features and functions.
Privileged Password
Mode (during
Installation)
There are two supported privileged password modes: Single-Level and Multi-Level. Use
Single-Level if you are unsure which mode to use.
Single-Level mode is the most widely used method and provides the highest privilege
level credential used within the Network Configuration Manager application. Most users
select Single-Level mode to manage authentication and maintain privileged credentials.
Multi-Level mode allows multiple levels of privileged passwords to be created and
associated with each device within the Network Configuration Manager application.
Multi-Level mode requires devices capable of specifying multiple privilege level modes
using the privileged password. Do not use this mode if you are using TACACS+, LDAP or
similar external systems for authentication management.
Product Home
R
Remote Database
RHEL
Root user
RS
S
SSL
Secure Sockets Layer. A security protocol that provides communication privacy. With SSL,
client/server applications can communicate in a way that is designed to prevent
eavesdropping, tampering, and message forgery.
Server-side
Single Server
Deployment
Which includes the Combination Server One physical box serves as both the application
and device server.
System Admin
Any user that has global System Management permissions within Network Configuration
Manager. System Admin's can complete any function within the application, including
network management and user management.
37
Glossary
System Management
Console
System Users
The System Management Console has control features allowing you to complete basic
monitoring tasks, and to make adjustments to the services running on Network
Configuration Manager.
System users are users that are authorized to have access to the application for the
purpose of network configuration and maintenance. Before any user can be included in a
System Group, they must first be added to Network Configuration Manager. Once entered
into the system and assigned privileges, the user is given access to specific networks and
their devices.
U
up2date utility
URL
User Admin
38
Red Hat Enterprise Linux 4 up2date utility packaged. This utility requires that you have an
account set up through the Red Hat Network at http://rhn.redhat.com/.
Uniform Resource Locator
Any user that has User Management permissions in Network Configuration Manager. User
Admin's can create, manage, and delete users within the application.
INDEX
A
About this Manual 10
C
Common problems when using VoyenceControl on Solaris 10
22
Compliance Advisor Installation Errors 24
N
Network Advisor Installation Errors 24
R
Report Advisor Installation Errors 23
requirements 14, 28
T
tasks 10
V
VoyenceControl Installation Errors on Red Hat Enterprise Linux
4 14
VoyenceControl Installation Errors on Solaris 10 20
VoyenceControl Migration Errors 23
39
Index
40