Troubleshooting the System
You can use log commands to discover and isolate problems with the system. For information about using the log commands, see the JUNOSe System Event Logging Reference Guide. Juniper Networks Customer Service can use core dump files to troubleshoot line module and SRP module failures.
Creating Core Dump Files
You can enable the system to create a core dump file if a module fails. You can choose to send the core dump file to an FTP server or save the file to NVS. Juniper Networks Customer Service can then access the core dump file and analyze it to determine what went wrong. Local core dumpsstored in NVSare enabled by default. You can enable the core dump from Boot mode or Global Configuration mode.
On the E120 router and the E320 router, the failure of some components on a line module generates multiple core dumps to provide more complete information about system state at the time of the failure. Other E-series routers generate only a single core dump for line module failures. When you contact Juniper Networks Customer Service for assistance, send all of the generated core dump files.
Boot Mode
To enable the core dump from Boot mode:
- Access Boot mode by reloading the SRP module; then press the mb key sequence (case insensitive) during the countdown.
- Specify where the system should transfer the core dump file.
- Set the IP address and mask of the system interface over which you want to send the core dump file.
- Specify the gateway through which the system sends the core dump file to the FTP server.
- (Optional) Set a username and password for FTP access to the server where you transferred the core dump file.
- Reload the operating system.
Example
:boot##exception dump 192.168.56.7 CORE_DUMPS:boot##exception protocol ftp user_name user_password:boot##exception gateway 192.168.12.3:boot##exception source 10.10.33.8 255.255.255.0:boot##reloadGlobal Configuration Mode
To enable the core dump from Global Configuration mode:
- Access Global Configuration mode.
- Specify where the system should transfer the core dump file.
- Set the IP address and mask of the system interface over which you want to send the core dump file.
- Specify the gateway through which the system sends the core dump file to the FTP server.
- (Optional) Set a username and password for FTP access to the server where you want to transfer the core dump file.
- (Optional) View parameters associated with creating a core dump file.
Example
host1(config)#exception dump 192.168.56.7 CORE_DUMPShost1(config)#exception protocol ftp username userpasswordhost1(config)#exception gateway 192.168.12.3host1(config)#exception source 10.10.33.8 255.255.255.0host1(config)#reloadexception dump
- To send the file to an FTP server, enter the IP address of the FTP server and the name of the directory on the server to which the system will transfer the file.
- To send the core dump file to NVS memory, use the local keyword.
host1(config)#exception dump 192.168.56.7 CORE_DUMPSUse the no version to disable the core dump. exception gateway
- Use to specify the gateway through which the system sends the core dump file to the FTP server.
- Example
host1(config)#exception gateway 10.10.1.15Use the no version to return the value to its default (null). exception protocol ftp
- Use to set a username and password for FTP access to the server where you transferred a core dump file. The default settings are the username anonymous and no password.
- Specify the number 8 before the username and before the password to encrypt these values. By default, the username and password are not encrypted.
- Example
host1(config)#exception protocol ftp 8 user_core 8 user_passwordUse the no version to restore the default settings. exception source
- Use to set the IP address and mask of the system interface over which you want to send the core dump file to the FTP server.
- You can optionally include an IP address mask.
- Example
host1(config)#exception source 192.168.1.33 255.255.255.0Use the no version to return the value to its default, null. reload
- Use to reload the software on the router immediately.
- Reloads the system software (.rel) file and the configuration (.cnf) file.
- Reloading the standby SRP causes high availability to be temporarily disabled until the standby SRP reloads and resynchronizes with the active SRP.
- Example
host1#reloadThere is no no version. show exception dump
- Dump host IP addressAddress of the host where the system is configured to transfer the dump file
- Dump directoryName of directory on the host where the system is configured to transfer the dump file
- Dump protocolProtocol used to send the core dump file; currently only FTP is supported
- User nameName configured for access to the core dump file on the FTP server
- PasswordPassword configured for access to the core dump file on the FTP server
- Interface IP addressAddress of the system interface configured to send the core dump file
- Interface netmaskMask of the system interface configured to send the core dump file
- Gateway IP addressAddress of gateway configured between the system and the FTP server
host1#show exception dumpDump host IP address: 192.168.56.7Dump directory:CORE_DUMPS/Dump protocol: FTPUser name: user_namePassword: user_passwordInterface IP address:Interface netmask:Gateway IP address:Managing Core Dump Files
When a core dump occurs on a redundant SRP and you have the router configured to store network core dumps, the SRP that experiences the trouble retains the management Ethernet port to perform the core dump. This prevents the standby SRP from taking over operations until the core dump is complete.
When a router uses local NVS to store a core dump, the SRP does not need the management Ethernet port. However, because of the immense size of local core dump files, using NVS to store core dumps is not practical.
The SRP-120 available on the E120 router and the SRP-320 available on the E120 and E320 routers has a second NVS card which is dedicated to storing core dump files.
The core dump monitor eliminates the impact that core dumps may have on redundant routers by allowing you to manage core dump files in NVS. The core dump monitor allows you to automatically transfer core dump files from NVS to an FTP server location for storage. The core dump monitor can also automatically delete transferred core dump files.
The core dump monitor attempts to delete transferred files when all of the following conditions have been met:
- The router attempts to write a core dump file to NVS.
- NVS contains insufficient space to hold the new core dump file.
- The core dump files have already been transferred from NVS to an FTP server location using the automatic core dump monitor transfer process.
Only those core dump files that have already been transferred from NVS are considered for deletion. Of those, the oldest files are deleted first, and the router generates a log message for each core dump file it deletes.
Enabling and Disabling the Core Dump Monitor
The core dump monitor is disabled by default. To enable the core dump monitor, use the exception monitor command. Use the no version of this command to disable the core dump monitor.
exception monitor
- Use to enable the router core dump monitor and specify the location to which you want the router to transfer core dump files.
- To send the file to an FTP server, enter the IP address of the FTP server and the name of the directory on the server to which the system will transfer the file.
- Enabling the core dump monitor specifies that future core dump files be saved to NVS. See the exception dump command for details.
- Example
host1(config)#exception monitor 192.168.56.7 CORE_DUMPSUse the no version to disable the core dump monitor.
NOTE: You can use the exception protocol ftp command to assign a username and password to the targeted FTP server. If you choose not to define a username or password, the router uses the values of "anonymous" and "null," respectively.
Specifying the Core Dump Monitor Interval
To specify the length of time that the router waits between checking for core dump files, use the exception monitor interval command. Use the no version of this command to revert the core dump monitor interval to its default value of 60 minutes (1 hour).
exception monitor interval
- Use to specify the interval (in minutes) at which you want the router to check NVS for core dump files.
- Example
host1(config)#exception monitor interval 1000Use the no version to revert the core dump monitor interval to its default value, 60 minutes. Viewing Core Dump Monitor Status
To view information about core dump monitor status and configuration, use the show exception monitor command.
show exception monitor
- Core dump monitorStatus (enabled or disabled) of the core dump monitor
- Next dump monitor check timeTime at which the core dump monitor will next check for any new core dump files
- HostIP address of the FTP host on which the core dump monitor saves core dump files
- DirectoryDirectory or directory path on the host to where the core dump files are located
- Core dump monitor intervalTime interval (in minutes) at which the core dump monitor checks for any new core dump files
- Files on flash which have been transferredA list of core dump files in the router NVS that have already been transferred to the FTP host
- Files on flash which have not been transferredA list of core dump files in the router NVS that have not yet been transferred to the FTP host
host1#show exception monitorCore dump monitor is enabledNext dump monitor check time: WED AUG 16 2003 15:50:38 UTCHost: 10.10.120.99Directory: monitorCore dump monitor interval(minutes): 10Files on flash which have been transferred------------------------------------------standby:OC12Atm(P2)_5_IC_ERX-10-16-5b_09_15_2002_11_59.dmpSRP-5GPlus_1_SC_tImBo-lAb-3_09_18_2002_19_39.dmpFiles on flash which have not been transferred----------------------------------------------standby:SRP-10Ge_1_SC_ERX-10-24-36_09_24_2002_11_04.dmpOC12-SERVER_5_FC1_E_ERX-10-24-36_03_28_2003_12_44.dmpE3_1_IC_ERX-10-0f-ab_10_08_2002_16_10.dmpAccessing the Core Dump File
If a module fails and saves a core dump file to NVS memory (which can take several minutes), and you have not configured the Core Dump Monitor for automatic transfer, you must transfer the file to a network host before it can be examined. You can transfer the core dump file when the module is back online or has assumed a redundant status. For information about the status of modules, see ERX Hardware Guide, Chapter 9, Troubleshooting. To transfer the core dump file to a network host, use the copy command.
In a system with two SRP modules, the following behavior applies if you have configured the SRP modules to save core dump files to an FTP server:
- If the primary SRP module fails, it saves the core dump file to the FTP server before the standby SRP module assumes control.
- If the standby SRP module fails, it must save the core dump file to NVS because it has no access to any configured network host.
The show version command output indicates the failed SRP module state as not responding during the save process. Consequently, when the failed SRP module recovers and assumes the role of redundant module, the show version command output indicates the SRP module state as standby and displays output for the standby SRP. The standby SRP can notify the primary SRP during a core dump. Output from the show version command displays core dumping for the Standby SRP.
If the standby SRP boot image encounters a problem loading the diagnostics or operational image, the state of the standby SRP appears as disabled (image error). When standby SRP diagnostics encounter a test failure, the primary SRP is notified and the state is set to hardware error.
You can now transfer the core dump file to a network host for examination. For example, to transfer the file SRP_1_SC_05_24_2000_02_20.dmp from NVS of the failed SRP module to the host server1, enter the following command:
host1#copy SRP_1_SC_05_24_2000_02_20.dmp host:/public/server1/SRP-5G_1_SC_05_24_2000_02_20.dmpcopy
- Use to copy a core dump file.
- You cannot use wildcards.
- You can copy core dump files only to network locations.
- You cannot create or copy over files generated by the system; however, you can copy such files to an unreserved filename.
- Example
host1#copy fault.dmp host:/public/server1/fault.dmpThere is no no version. Capturing and Writing Core Dumps
You can capture and write a core dump to a file for an active or a standby SRP module or the line modules. You can store the file on the file system or on a network host. The SRP core dump files are stored on the respective SRP flash memory. The line module core dump files are stored on the active SRP flash memory at the instance of the core dump event. The core dump files are not synchronized between the active and the standby SRP module. You can use the resulting information to help diagnose a problem or to verify whether the core settings are correct (primarily for the network settings).
write core
- Use to reboot the active SRP module, the standby SRP module, or the module in a specified slot, and write the core dump to a file.
- If you specify the force keyword, you are prompted for confirmation to reboot when the router is in a state that can lead to loss of configuration data or NVS corruption.
NOTE: The force keyword enables you to specify a slot only if that slot is an SRP module slot.
- If you do not specify a reason, Write Core is the default reason recorded in the reboot history.
- Example 1Prompts for confirmation to reboot
host1#write core forceExample 2Reboots the module in slot 7 and writes a core memory file host1#write core slot 7There is no no version. Understanding the Core Dump File
The dump file indicates which module has failed by referencing that module's hardware slot number. The hardware slot number is the slot number designation on the systems's backplane. This slot number is different from the chassis slot number that appears on the front of the chassis and in screen displays (for example, in the display resulting if you issue the show version command).
Table 36 shows how the chassis slot numbers relate to the hardware slot numbers.
Tracking IP Prefix Reachability
You can use the track command to define an IPv4 prefix object and track its reachability. The show track command displays the tracked information for any specified objects.
show track
- TrackName of the object being tracked
- IP RouteIP prefix being tracked
- Virtual routerVirtual router on which the object resides
- First-hop interfaceOutgoing interface to reach the prefix
- changesNumber of times the object has changed state
- Tracked byApplication that is doing the tracking
host1(config)#show track ERX_BangaloreTrack ERX_BangaloreIP Route 1.1.1.0 255.255.255.0 reachabilityin virtual router 1Reachability is UpFirst-hop interface is FastEthernet3/02 change(s)Tracked by:Vrrp in virtual router 1show track brief
- ObjectName of the object being tracked
- TypeType of object being tracked
- ParameterParameter type being tracked
- ValueState of the object being tracked
host1(config)#show track briefObject Type Parameter ValueERX-WF IP-route reachability UpERX-BNG IP-route reachability Uptrack
- Use to create an IPv4 object and to track its reachability.
- The name of the object must be unique for the chassis.
- Use the vrf keyword to specify the VRF on which the IP prefix resides.
- Example
host1(config)#track ERX_Bangalore vrf VR1 ip-route 10.10.24.6 255.255.0.0 reachabilityUse the no version to delete the object and stop tracking for that object. Gathering Information for Customer Support
When you report a problem with your router, customer support personnel from the Juniper Networks Technical Assistance Center (JTAC) may request that you issue the show tech-support command. This command was created to help streamline the information-gathering process by providing a large amount of router information from one command and avoiding the need to access certain diagnostic commands.
The show tech-support command functions like any other show command, and you can issue this command the same way you issue any other show commands on the router. This means that you can redirect the output from the command to a file. For information about redirecting show command output, see Redirection of show Command Output.
Another command that customer support personnel might ask you to use is the tech-support encoded-string command. Customer support will provide you with an encoded string of commands that this command then executes.
tech-support encoded-string
- Use to execute an encoded command string provided by Juniper Networks customer support personnel.
- This command requires privilege level 15 access.
- Optionally, specify a slot number on the router.
- Optionally, specify a reliable or fast connection type; fast does not work under some conditions. The default connection type is reliable.
- Example 1
host1(config)#tech-support encoded-string debug 1Example 2 host1(config)#tech-support slot 0 connection fast encoded-string debug1There is no no version. show tech-support
- Use to display technical support information used by Juniper Networks customer support personnel to assist in troubleshooting the router.
- Example
host1#show tech-supportShow Technical Support---------------------------------------------------------------------------System Name : host1Time : THU JUL 15 2004 17:12:48 UTCSystem up since : WED JUN 30 2004 16:07:51 UTCSoftware release: 1088523900Boot Flags : 0x100663296Slot Number : 0Serial Number : 7100170293Assembly Number : 3400003701Assembly Rev : A07Description :Command List:CLI:show versionCLI:show bootCLI:show hardwareCLI:show redundancyCLI:show environmentCLI:show users detailCLI:show utilizationCLI:show process cpuCLI:show process memory....