Solved

Configuring hpasm(Advanced Server Management) to disable ASR(Automatic Server Recovery) in Linux

Posted on 2008-09-29
4
8,898 Views
Last Modified: 2012-05-05
How can i configure hpasm to disable ASR feature?

Description: Rack Mount Chassis
Product: ProLiant BL465c G1
Vendor: HP
Bios: Version: A13
OS: Redhat EL 4 AS
0
Comment
Question by:Deepak Kosaraju
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 10

Expert Comment

by:Tobias
ID: 22604368
Hi !

You can disable ASR from the RBSU (BIOS).

Best Regards
0
 
LVL 3

Accepted Solution

by:
ckhsu1977 earned 500 total points
ID: 22606517
Use hpasmcli to disable it if you have the package installed
 
   
[root@host~]# hpasmcli
HP management CLI for Linux (v1.0)
Copyright 2004 Hewlett-Packard Development Group, L.P.

--------------------------------------------------------------------------
NOTE: Some hpasmcli commands may not be supported on all Proliant servers.
      Type 'help' to get a list of all top level commands.
--------------------------------------------------------------------------

hpasmcli> help
CLEAR  DISABLE  ENABLE  EXIT  HELP  QUIT  SET  SHOW
hpasmcli> help disable
USAGE: DISABLE [ ASR | HT | PXE | WOL ]
hpasmcli> disable asr
Successfully disabled ASR timer.
hpasmcli>quit
0
 
LVL 14

Author Comment

by:Deepak Kosaraju
ID: 22654598
MadShiva:
Thanks for your reply but I cannot do this for 1200 servers and which is out of scope

ckhsu1977:
I can do the above using cfengine define the rule and push it all servers, have to give a try thanks for your input.
0
 
LVL 14

Author Closing Comment

by:Deepak Kosaraju
ID: 31501337
Very Very Usefull Thank You
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn about cloud computing and its benefits for small business owners.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question