Compaq ProLiant 800 HP ProLiant BL e-Class Integrated Administrator User Guide - Page 112
Show Bay List, Show Syslog
View all Compaq ProLiant 800 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 112 highlights
Command Line Interface Table 4-8: Functionality Exclusive to the Command Line Interface continued Function Description Capability Exclusive to the Command Line Interface Enclosure Management Commands, continued SHOW BAY LIST [ALL | ] Displays the assigned to group, remote console user, and server blade name for each bay in a particular group if a group name is specified or all bays if ALL is specified. The command line displays the remote console user. SHOW SYSLOG BAY Displays the syslog of a specified All blade with 22 lines per screen Typing "q" quits the command; any other key shows the next screen if more information is available to display. The system log of the server blade is not stored between reboots, so the information only includes what has taken place since the last power on of the Integrated Administrator. Typing "c" displays the System Log continuously without page breaks. ADD IPMANAGER Adds an IP address to the list of clients allowed to connect to Integrated Administrator. Only enclosure administrators may execute this command. DISABLE ALERTMAIL Disables sending e-mail for Integrated Administrator alerts. Only enclosure administrators may execute this command. DISABLE IPSECURITY Allows all clients to connect to Integrated Administrator. Only enclosure administrators may execute this command. DISABLE NTP Disables automatic updates of the date and time to the Integrated Administrator. Only enclosure administrators may execute this command. ENABLE ALERTMAIL Enables sending e-mail for Integrated Administrator alerts. Only enclosure administrators may execute this command. ENABLE IPSECURITY Restricts clients from being able to connect to Integrated Administrator. Only enclosure administrators may execute this command. continued HP ProLiant BL e-Class Integrated Administrator User Guide 4-35