Cisco UCS Inventory Script

Cisco UCS Inventory Script.

Posted in Monitoring, UCS | Leave a comment

Hidden VNXe performance statistics


The latest Operating Environment upgrades have already brought some improvements to the statistics that are shown through the Unisphere GUI. The first VNXe OE that I worked with was showing only CPU statistics. Then along with update 2.1.0 Network Activity and Volume Activity statistics came available. I was still hoping to get some more statistics. IOps and latency graphs would have been nice additions. So I did some digging and found out that there is actually lots of statistics parameters that VNXe gathers but those are just stored in the database, maybe for support purposes.

Where is the data stored?

When logging in to the VNXe via SSH using service account and listing the content of the folder /EMC/backend/perf_stats you will see that there are several db-files in that folder.

Now when opening the file with notepad it is quite clear what kind of databases those are:

How to read…

View original post 551 more words

Posted in Uncategorized | Leave a comment

ScienceLogic Enterprise Manager 7 (EM7) Review

Monitoring Solution for UCS.


For more infomation and to obtain your own EM7 eval visit the ScienceLogic Web-Site

OK so after what seems like an age, I have finally managed to get round to blogging down my initial thoughts on the first Monitoring Solution I have evaluated.

Disclosure: This review has not been sponsored in any way, and is just my opinion

Firstly big thanks to Mike Riley  and Ray Wood of ScienceLogic for coming in and running me through the setup and initial config of EM7. While not particular difficult it does make my life a whole lot easier, and gives me an opportunity to ask all the questions I might have. Plus in my view this shows a good indication of customer service, and makes a change from the “Just download an Eval and get back to us with any questions” type attitudes.

Lab Setup:
The Lab setup I will use…

View original post 749 more words

Posted in Uncategorized | Leave a comment

Under the Cisco UCS Kimono

If you have ever wanted a sneaky peak under the UCS Kimono (GUI) then this posts for you.

The goal of this post is to clarify the end-to-end path from a Cisco UCS vNIC through the UCS Infrastructure to the point we egress from the Cisco UCS Fabric Interconnects.

Having this information and being able to check utilization and statistics of all virtual and physical interfaces within the Cisco UCS environment will save you allot of time and give you a much better understanding of how all the elements tie together.

This post builds on from a previous post “Understanding UCS VIF Paths” where we used a combination of the GUI and CLI to establish the end-to-end traffic path used by a vNIC/vHBA. In this post we exclusively use the CLI, so if you haven’t done so already perhaps worth checking the previous post out first.

Anyway I was troubleshooting…

View original post 805 more words

Posted in Uncategorized | Leave a comment

Understanding SIP CANCEL

Great summary of SIP CANCEL messages. Thank you very much Andrew!

SIP Adventures

As I have said on a number of occasions, I occasionally teach a two and half day SIP class. While that’s hardly enough time to become a SIP expert, my students always leave with more than enough knowledge to make educated decisions in regards to SIP endpoints, applications, and trunks. Although some may never again have a compelling reason to use Wireshark to trace SIP call flows, just knowing that they can is often good enough.

Every class is different and no two students are alike, but I find commonality in the things that they absorb quickly and the things that require a little more explanation. One of those from the latter camp is the CANCEL request.

On the surface, CANCEL doesn’t sound too complicated, but there are a few aspects that are a wee bit confusing.

Before I delve into the details, let’s take a look at a basic…

View original post 548 more words

Posted in Uncategorized | 1 Comment

Cisco UCS C Series CIMC – KVM Console Java Error Message:

The joys of working with Cisco UCS technology. Today, I was attempting to do what one would think would be a very, very basic task – gain CIMC access to a UCS C Series server from a new VM. This new VM is running Windows Server 2008 R2 64 Bit.

My first issue was when I attempt to “Launch KVM Console” and received the following error message:
“The KVM Viewer requires Java 1.6.0_14 or higher. Please install or enable Java and try again.”

I realized that this was a freshly baked VM that had no Java installed so I grabbed the following file:
jre-7u55-windows-x64.exe given that my OS was 64bit. Well…..that didn’t help one bit as I got the same error message.

Then I found this great link that was a direct hit with my issue.

He does a fine job of documenting the issues he runs into and I’ve referred to his website on several other occasions. I uninstall my 64 bit JRE and installed this 32 bit version jre-7u51-windows-i586.exe.

The above error was resolved and I was on my way………………………………..until the following error appeared:
“Certificate has been revoked. The application will not be executed.”

Which brought me to the following great link:
Symptom KVM console fails to launch and displays the following Java exception error:
Certificate has been revoked PKIX path validation failed: Certificate has been revoked
Workaround On the client system, disable the Java configuration parameters from Java control panel do the following:
Step 1 Go to Advanced > Security > General
Step 2 Check certificates for revocation using CRL
Step 3 Enable online certificate validation

The above error was resolved and I was on my way………………………………..until the following error appeared:
“CIMC – The maximum number of user sessions has been reached. ”

Which brought me to the following great link:

So much for the easy task of running the CIMC KVM Console!

Good Luck,


Posted in Uncategorized | 1 Comment

Cisco TelePresence VCS is vulnerable to CVE-2014-0160 – aka Heartbleed CSCuo16472

For many environments that have VCS platforms running 7.x where they are not ready to migrate to 8.x – Cisco has confirmed, in the following defect/bug explanation, that VCS 7.2.3 is not vulnerable to the Heartbleed Vulnerability. The release notes of VCS 7.2.3 do not, in fact, state that the vulnerability is addressed in the 7.2.3 release but the language for the specific VCS bug below clarifies the issue.

Cisco TelePresence Video Communication Server (VCS) [CSCuo16472] [*]

See specific language from the defect link above is here:
Customers running versions X7.2, X7.2.1, X7.2.2 or X7.2.3 RC2 are recommended to upgrade to version X7.2.3 or later.

Good luck!


Posted in Uncategorized | Leave a comment