March 9, 2012

Winsock

When winsock is corrupted, you can’t make any outbound connections. You can also run netstat -ano to see if any outbound connections are open.

February 28, 2012

Troubleshooting Server Hangs

Troubleshooting Server Hangs

 

http://blogs.technet.com/b/askperf/archive/2008/05/09/troubleshooting-server-hangs-part-three.aspx

 

 

February 21, 2012

Protected: Failover Cluster Validation Report

This content is password protected. To view it please enter your password below:

February 16, 2012

How to Start Perfmon from command line with counters prefilled

set srv=servername

logman.exe create counter -n %srv% -f bincirc -si 00:00:01 -o “c:\perflogs\%srv%-Perf.blg” -v mmddhhmm -max 300 -c “\\%srv%\LogicalDisk(*)\*” “\\%srv%\Memory\*” “\\%srv%\.NET CLR Memory(*)\*” “\\%srv%\Cache\*” “\\%srv%\Network Interface(*)\*” “\\%srv%\Paging File(*)\*” “\\%srv%\PhysicalDisk(*)\*” “\\%srv%\Processor(*)\*” “\\%srv%\Processor Information(*)\*” “\\%srv%\Process(*)\*” “\\%srv%\Redirector\*” “\\%srv%\Server\*” “\\%srv%\System\*” “\\%srv%\Server Work Queues(*)\*” | then press enter

logman servername start

February 15, 2012

Protected: cluster

This content is password protected. To view it please enter your password below:

February 13, 2012

RDP Issues

  1.  http://support.microsoft.com/kb/2477023
  2. Check if service is listening on port 3389
  3. The Terminal Services service is run as a SVCHost.exe process. The first step in stopping it requires identifying the correct process. On your Windows 2003 Server, open up a command prompt. At the prompt, type:

 

tasklist /svc

Scroll through the output until you find

svchost.exe XXXX TermServices

where XXXX is the process id.

At the same prompt, type

taskkill /PID XXXX /F

where XXXX is the process id you got from the previous command.

Type:

services.msc

and hit enter. Then type Exit and hit enter. The command prompt will close and the services window will open. Scroll through the list of services until you find Terminal Services. Right click on the service and select Start from the popup menu.

February 13, 2012

Memory Troubleshooting

  1. Task manager | sort by memory
  2. Use counters | http://teamapproach.ca/trouble/Leak.htm The following graphs are an example of an application with a memory leak. The leaky application is constantly requesting more memory. It is characterized by increasing Process/Page File Bytes at the same rate as the system Committed Bytes; i.e. all memory commitment is due to one process. Available Bytes are decreasing steadily until the system pages something out and then the Virtual Bytes increase to make room for more Available Bytes. The Working Set of the leaky application actually decreases when parts of it get paged out. Note how Page Faults/sec increases as Available Bytes decline.

If you suspect that a particular application or service is causing a memory leak, investigate the memory use of your applications using the following counters:

Memory\Available Bytes reports available bytes; its value tends to fall during a memory leak.
Memory\Committed Bytes reports the private bytes committed to processes; its value tends to rise during a memory leak.
Process\Private Bytes reports bytes allocated exclusively for a specific process; its value tends to rise for a leaking process.
Process\Working Set reports the shared and private bytes allocated to a process; its value tends to rise for a leaking process.
Process\Page Faults/sec reports the total number of faults (hard and soft faults) caused by a process; its value tends to rise for a leaking process.
Process\Page File Bytes reports the size of the paging file; its value tends to rise during a memory leak.
Process\Handle Count reports the number of handles that an application opened for objects it creates. Handles are used by programs to identify resources they must access. The value of this counter tends to rise during a memory leak; however, you cannot rule out a leak simply because this counter’s value is stable.
Memory Leaks and the Nonpaged Pool

Although any leak is serious, memory leaks are of particular concern when they involve the nonpaged pool. Many system services allocate memory from the nonpaged pool because they need to reference it when processing an interrupt and cannot take a page fault at that time. To identify whether or not a leak affects the nonpaged pool, include the following counters in your monitoring:

Memory\Pool Nonpaged Bytes
Memory\Pool Nonpaged Allocs
Process\Pool Nonpaged Bytes
Portrait of a Leaky Application

 

Here is a small guide from Microsoft

Setup a performance monitor log
Please use the following steps to start performance logging on your server.
1. Permanently disable all screen savers.
2. Go to Start, Run and type “perfmon” (without quotation marks) and press OK.
3. Expand Performance Logs and Alerts. Highlight Counter Logs and right click in the right pane to bring up a menu. From this menu, select “New Log Settings”. Give this log a name.
4. Press Add. Verify the correct computer is selected in the “Select counters from computer:” drop-down.
5. Add “All counters” and “All instances” each of the following objects:

Memory
Network Interface
Objects
Paging File
Physical Disk
Process
Processor
Redirector
Server
Server Work Queues
System

6. Set the Interval for every 10 seconds.
7. Click on the Log Files tab and set Log file type to Binary Circular File and a Limit of 256 MB. Please make sure where the Log is currently save have enough disk space to accommodate.
If you are rebooting the server for setting up the Registry Setting please make sure that you start the perfmon again after the server is rebooted. Perfmon will not start automatically

Tags:
February 13, 2012

Maxed Out on Connections

(1) Netstat -ano | lists active connections

(1.a) Make sure to associate PID next to a connection with PID in tasklist

(2) Tasklist | lists current tasks and their PIDs

(3) Taskkill /pid 3235 (example) | to kill a specific PID

February 13, 2012

8 Troubleshooting Steps

Step 1

How often does this happen?:- This question establishes whether this problem is a one-time occurrence(usually indicating a soft memory error or the like) that can be solved with a reboot, or whether a specific sequence of events causes the problem to happen(usually indicating a more serious problem that may require software installation or hardware replacement.H

Has any new software been installed recently?:- New software can mean incompatibility problems with existing programs.This is especially true for Windows programs.A new Windows program can overwrite a required DLL file with a newer version of the same name,which an older program may not find useful.Windows XP now has a feature called RESTORE POINTs. Each time Windows XP boots successfully, it notes its configuration. If you install new software and it overwrites a DLL, causing ,major functionality problems,you can reboot in safe mode back to the last logged restore point and roll back the configuration to when the computer last worked properly.

Have any other changes been made to the computer recently?:- If the changes made then try to remember approximately when the change was made. Then try to remember approximately when the problem started. If the two dates seem related, there’s a good chance the problem is related to the change,If the change involved a new hardware component,check to see that the hardware component was installed correctly.

Step 2

this step is the one that most experienced technicians overlook.Often,computer problems are the result of something simple.Technicians overlook these problems because they’re so simple that the technicians assume they couldn’t be the problem.Some examples of the simple problems are shown here:

Is it plugged in?:- And plugged in on both ends? Cables must be plugged in on both ends in order to funtion correctly.Cables can be easily tripped over and inadvertently plugged from their sockets.

Is the system ready?:- Computers must be ready before they can be used, Ready means the system is ready to accept commands from the user. An indication that a computer is ready is when the operating system screens come up and the computer presents you with a menu or a command prompt.If that computer uses a graphical interface, the computer is ready when the mouse pointer appears.printers are ready when the Online or Ready light on the front panel is lit.

Reseat chips and cables:- You can solve some of the strangest problems (random hang-ups or errors) by opening the case and pressing down on each socketed chip. You should also reseat any cables to make sure that they are making good contact.

Other Notes:- Do you know how to reboot the windwos server with command ?.
Answer :- go to command prompt

Press–>Enter ( system will start rebooting )

type–>shutdown -r -f

-r switch for reboot the machine and -f for forcely.

 

Step 3

It is amazing how often a simple computer reboot can solve a problem.Rebooting the computer clears the memory and starts the computer with a clean state.Whenever I perform phone support, I always advice the people to reboot the computer and try again.If rebooting doesn’twork,try powering down the system completely,and then powering it up again.More often than not,that will solve the problem.

 

Step 4

This step is important because it determines what part of the computer you should focus your troubleshooting skills on.Each part requires different skills and different tools.
To determine if a problem is hardware or software related,you can do a few things to narrow down the issue.For instance,does the problem manifest itself when you use a particular piece of hardware(a modem, for example)? If it does, the problem is more than likely hardware related.
This step relies on personal experience more than any of the other steps do.you will without a doubt run into strange software problems.Each one has a particular solution.Some may even require reinstallation of the software or the entire operating system.

 

Step 5

Hardware problems are pretty easy to figure out.If the modem doesn’t work,and you know it isn’t a software problem,the modem is probably the piece of hardware that needs to be replaced.
With some of the newer computers,several components are integrated onto the motherboard.If you troubleshoot the computer and find a hardware component to be bad,there’s a good chance that the bad component is integrated into motherboard(for example,parallel port circuitry)and the whole motherboard must be replaced-an expansive proposition, to be sure.

 

Step 6

If you are experiencing software problems,a common troubleshooting technique with DOS-based computers is to boot clean.This means starting the computer with a bootable diskette that uses a CONFIG.SYS and AUTOEXEC.BAT with no third-party drivers(for example,no drivers for sound card, CD-ROM,or network). If the software that’s experiencing the problem is incompatible with something is these clean CONFIG.SYS and AUTOEXEC.BAT files,this will indicate the problem.Once you have determined that there’s an incompatibility,you can further determine what your chances are for fixing the problem by using the REM techniques.Restarting the computer in Safe mode is a clean boot for Windows 9X and Windows 2000.Only Windows default drivers will be loaded.

 

Step 7

As you may have figure out by now. I’m fond of old saying.There’s another one that applies here: ” If all else fails,read the instructions “.The service manuals are your instructions for troubleshooting and service information.Almost every computer and peripheral made today has a set of service documentation in the form of books,service CD-ROMs and websites.The latter of the three is growing in popularity as more service centers get connections to the Internet.

 

Step 8

When doctors take the Hippocratic oath,they promise to not make their patients any sicker than they already were.Technicians should take a similar oath.It all boils down to, ” If it ain’t broke donot fix it “.When you troubleshoot, make one change at a time.If the change doesn’t solve the problem,change the computer back to its original state before making a different change.

February 13, 2012

How to configure iLO from command line

hponcfg /w ilo.xml
dumps iLO configuration into ilo.xml file
hponcfg reset
resets iLO
hponcfg /f ilo.xml
writes new configuration back to the iLO

 

 

Reconfigure iLo network settings using HPONCFG

(1) Run: hponcfg /w ilo.xml (this dumps iLO configuration into ilo.xml file)
BE CAREFUL, will reset to factory defaults * (2) Run: hponcfg reset (resets iLO) *
(3) edit newly created ilo.xml to the values that you want to use
(3) Run: hponcfg /f ilo.xml (this writes new configuration back to the iLO)

I recently found myself in a situation where I had rebuilt and shipped a server to a remote office but forgotten to configure the iLo settings. Normally this wouldn’t be to big an issue – except A) The IP address and default gateway were pointing to a subnet which no longer existed and B) The HP System Management Homepage wasn’t connecting to the agents correctly.

Fortunately the HPONCFG utility came to my rescue. This little tool is installed as part of the ProLiant Support Pack and can be used to make config changes to iLo without the need to reboot. Default install directory = C:\Program Files\HP\hponcfg.

To write the current iLo configuration simply open a cmd prompt and execute the following command:

C:\Program Files\HP\hponcfg>hponcfg /w iLoConfig.xml

To change settings you need to create an xml file containing the parameters you want to change, formatted using the RIBCL language. RIBCL allows you to write XML scripts to configure and manage iLO config settings.

To modify the network settings I created the following script:

<RIBCL VERSION=”2.0″>
<LOGIN USER_LOGIN=”user” PASSWORD=”password”>
<RIB_INFO MODE=”WRITE” >
<MOD_NETWORK_SETTINGS>
<IP_ADDRESS VALUE = “x.x.x.x”/>
<SUBNET_MASK VALUE = “x.x.x.x”/>
<GATEWAY_IP_ADDRESS VALUE = “x.x.x.x”/>
<PRIM_DNS_SERVER value = “x.x.x.x”/>
<DHCP_ENABLE VALUE = “N”/>
</MOD_NETWORK_SETTINGS>
</RIB_INFO>
</LOGIN>
</RIBCL>

NOTE: The USER_LOGIN and PASSWORD tags are required, and must contain data, although any data is accepted.

And then run the script like so:

C:\Program Files\HP\hponcfg>hponcfg /f your_script_name.xml

 

February 13, 2012

How to View / Disconnect RDP Sessions from Commandline

Credit goes to: http://www.techtalkz.com/blog/author/Strider who wrote this tip:

I used to receive the maximum number of connections error message when I try to log on to the Windows 2003 Server in my office via Windows Remote Desktop.

“The terminal server has exceeded the maximum number of allowed connections”

Session Exceeded

This is pretty annoying if you have some urgent work to do in the server. Most of the already logged in users won’t even be using the session at the time, but I can’t login! So how to solve this? After a bit of googling, as usual, I found a simple way to disconnect other remotely logged in sessions. 😀

First of all you must be logged in to your client computer as a domain Admin user. Now open the command prompt and type in the following command.

qwinsta /server:SERVERIP

The Ip address or domain name of the Remote server should be entered in place of SERVERIP

Example:

qwinsta /server:10.10.1.10

You will get a list of the Remote Sessions in the command window.

Remote sessions list

In the above sceenshot we can clearly see an Active RDP session with the ID 2 which belongs to the user Administrator. In order to disconnect that user we are going to use the session ID. Use the following command line to disconnect the remote session.

rwinsta /server:SERVERIP SESSIONID

For example in order to terminate the session of the Administrator user the following command should be given.

rwinsta /server:10.10.1.10 2

Disconnect Remote Session

Now let’s confirm if the user is really disconnected. Just type in the qwinsta command in proper format.

Disconnected Remote Sessions List

As you can see our session with ID 2 is no longer there. Now for the user we just disconnected will see the following message.

Disconnected-Server-Session

The remote session was disconnected because you session was logged off at the remote computer. Your administrator or another user might have ended your connection.

So we are done with the remote session management over command lines.

February 13, 2012

Deactivating and Deleting Server Objects in Server Automation (Opsware)

Opsware – Server Decommission SOP Word Document

Deactivating and Deleting Server Objects in Server Automation (Opsware)

  • Log into Server Automation (Opsware)

  • Expand “Servers”
  • Browse to “All Managed Servers”
  • Search for the host that’s being decommissioned
  • Right click on the host and “Deactivate Server” (NOTE: Some devices may already be in a deactivated state. If this is the case, proceed to “Delete” the object)

  • Are you sure you want to deactivate the selected servers? DEACTIVATE

  • Server Deactivation was Successful. OK

  • Server will now be in a deactivated state. From there right click on the host again and “Delete”. This will remove the object completely from the Server Automation inventory.

  • Are you sure you want to delete the selected servers? DELETE

  • Server Deletion was Successful. OK

  • Search for the host again to ensure that it’s been successfully removed.

 

February 13, 2012

Installation procedure for EMC Powerpath and Naviclient on Windows servers (32 bit)

Installation procedure for EMC Powerpath and Naviclient on Windows servers (32 bit)

 

 

Naviclient Agent

  1. There are two components to the Naviclient install, one is the agent and the other is the Command Line Interface (CLI).
  2. The current 32 bit version we are using is 6.22.20.0.94. The 64 bit version is 5.0.0.GA.
  3. run the executable for the agent: NaviAgent_6.22.20.0.94.exe
  4. At ‘Open File Security Warning’ click ‘Run’.
  5. At ‘Navisphere Agent – Welcome’ window click ‘Next’.
  6. At the ‘Installation folder’ window, accept the default location and click ‘Continue’.
  7. If it says ‘The specified folder does not exist. Create it?’ click ‘yes’.
  8. At the ‘Navisphere Agent Setup’ window click ‘Next’.
  9. At the ‘License Agreement’ window, click ‘Yes’.
  10. At the ‘Customer information’ window, accept the default and click ‘Next’.
  11. At the ‘Choose Destination Location’ window, accept the default and click ‘Next’.
  12. It will ask ‘Are you installing this utility on a server that is using the Microsoft ISCSI initiator to connect to the Clarion storage system?’ click ‘No’.
  13. At the ‘Navisphere Agent Service installed successfully.’ Window, click ‘OK’.
  14. At the ‘Initialize Privileged User List’ window ensure ‘Create/Overwrite File’ is selected and click ‘OK’.
  15. At ‘Agentconfiginit’ window, click ‘OK’.
  16. At ‘Installshield Wizard Complete’ window, click ‘Finish’.

 

NaviCLI

  1. Run the Executable: NavCLI_6.22.20.0.94.exe
  2. At ‘Open File Security Warning’ click ‘Run’
  3. At ‘Navisphere CLI – Welcome’ window click ‘Next’
  4. At the ‘Installation folder’ window, accept the default location and click ‘Continue’.
  5. If it says ‘The specified folder does not exist. Create it?’ click ‘yes’.
  6. At the ‘Navisphere CLI Setup’ window, click ‘Next’.
  7. At the ‘License Agreement’ window, click ‘Yes’.
  8. At the ‘Customer information’ window, accept the default and click ‘Next’
  9. At the ‘Choose Destination Location’ window, accept the default and click ‘Next’.
  10. At ‘Installshield Wizard Complete’ window, click ‘Finish’.

 

PowerPath

  1. Run executable: EMCPowerPath.W2003_32.4.5.1.GA.exe
  2. At ‘Open File Security Warning’ click ‘Run’
  3. At the ‘Choose Setup Language’ window, select ‘English (United States)’ and click ‘OK’.
  4. At the ‘EMC PowerPath 4.5.1 (32 bit) – Installshield Wizard’ window, click ‘Next’.
  5. At the ‘AX series Clarion’ window, select ‘NO’ and click ‘Next’.
  6. At the ‘Customer information’ window, accept the default and click ‘Next’
  7. At the ‘Custom Setup’ window, accept the default and click ‘Next’.
  8. At the ‘Ready to Install the Program’ window, click ‘Install’.
  9. At the ‘EMC PowerPath Licensing Tool’ window, enter the appropriate license key and click ‘Add’. Then click ‘OK’.
  10. If you do not currently have the license key then select ‘OK’. Answer ‘Yes” to the resulting window that opens to acknowledge being unlicensed. You must acquire the license key and enter it at a later time prior to going into operations with this server.
  11. At the ‘Installshield Wizard Completed’ window, click ‘Finish’.
  12. When prompted, reboot the system.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

February 13, 2012

Protected: OpNet

This content is password protected. To view it please enter your password below: