!!! This is a SiteProxy proxied website, do not enter your personal information. Refer to: https://github.com/netptop/siteproxy for details !!!×
0% found this document useful (0 votes)
95 views

All Commands

The document contains various commands to query and modify Rubrik cluster configuration and objects using cqlsh and the Rubrik API. Some key commands include: - Checking notification settings, volume group snapshots, job logs, running jobs, sent emails, and disconnected hosts using cqlsh queries. - Modifying volume groups to take full snapshots, updating mount owners, and triggering full backups using the Rubrik API. - Checking agent timeouts, adding Nutanix version support, and changing timeout values using Rubrik CLI tools. - Getting SSL certificates, testing support tunnels, and forwarding ports for troubleshooting.

Uploaded by

NAGARJUNA
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views

All Commands

The document contains various commands to query and modify Rubrik cluster configuration and objects using cqlsh and the Rubrik API. Some key commands include: - Checking notification settings, volume group snapshots, job logs, running jobs, sent emails, and disconnected hosts using cqlsh queries. - Modifying volume groups to take full snapshots, updating mount owners, and triggering full backups using the Rubrik API. - Checking agent timeouts, adding Nutanix version support, and changing timeout values using Rubrik CLI tools. - Getting SSL certificates, testing support tunnels, and forwarding ports for troubleshooting.

Uploaded by

NAGARJUNA
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

>>NOTIFICATION TABLE

cqlsh -k sd -e "select creation_time, email_addresses, event_types, snmp_addresses


from notification_setting"

>>CHANGING VOLUME GROUP TO TAKE FULL SNAPSHOT


cqlsh -ksd -e "expand on;select * from volume_group where id='4643b6bf-6a35-4d03-
a712-eb86a0b645ae'"
cqlsh -ksd -e "consistency all;update volume_group set force_full='true' where
id='4643b6bf-6a35-4d03-a712-eb86a0b645ae'"

>>CHECK JFL LOGS IF EMAILS ARE SENT


rkcl exec all 'zgrep -A 1 "EMAIL_SEND_GLOBAL" /var/log/job-fetcher/*'

>>FIND ALL RUNNING JOBS


cqlsh -k sd -e "select job_id, instance_id, status, started_running_time from
job_instance" | grep RUNNING

>>FIND THE CONFIRMATION IF A MAIL IS SENT TO ONE PARTICULAR MAIL ID


cqlsh -ksd select * from sd.email_send_status where
email_address='michael.mitrou@sciex.com';

>>CHECK ALL THE EMAILS THAT ARE SENT TO THE NOTIFICATION EMAILS
cqlsh -k sd -e "select notification_id, email_address, email_send_success, time
from email_send_status"

>>CHECK HOSTS THAT ARE IN DISCONNECTED STATE


cqlsh -ksd -e "select name, last_status from host" |grep -i disconnected

>>FIND HOST AGENT ID


cqlsh -ksd -e "expand on; select agent_id from host where name='DC8' allow
filtering"

>>USE OPENSSL TO GET SSL CERTIFICATE FROM HOSTS OR VCENTER


openssl s_client -connect "10.131.4.34:443" -showcerts

>>GET SSL CERTIFICATE THAT IS SAVED ON RUBRIK


cqlsh -ksd -e "select name,agent_id,public_certificate from host"|grep tay-smb-
shares1.sjwater.com

>>REMOVE STALE VMWARE LIVE MOUNT


cqlsh -k sd -e "select id from vmware_mount"
rubrik_tool.py --api internal -X POST "/vmware/vm/snapshot/mount/b5a71c20-aab8-
444c-9ded-01a08580c102/rollback"

>>REMOVE STALE VMWARE LIVE MOUNT IF THE USER WHO CREATED IT CHANGED
{
"authDomainId": "0b82a4f4-4c56-4523-82bd-c6b8628f2075",
"emailAddress": "_XPOESC-INFRASTRUCTURE-DIVISION@xpo.com",
"firstName": "Admin",
"id": "User:::b617d926-2644-4e1c-b382-5b0b89a397a5",
"lastName": "User",
"username": "admin"
},

rubrik_tool.py get_user User:::b617d926-2644-4e1c-b382-5b0b89a397a5 | grep id

rksupport@RVM182S005487:~$ rubrik_tool.py get_user User:::b617d926-2644-4e1c-b382-


5b0b89a397a5 | grep id
"id": "User:::b617d926-2644-4e1c-b382-5b0b89a397a5",

cqlsh -k sd -e "CONSISTENCY ALL; update vmware_mount set owner_id='297c4619-16af-


404d-ab0c-66d101949e06_468dbb4c-d4f4-4e78-8ab9-4b89915a47b9' where id='e3d810b7-
ed40-4229-bb5e-328f78e5644d'"

>>FULL BACKUP FOR VOLUME GROUP


rubrik_tool.py --api internal -X PATCH -d "{\"forceFull\": true}"
"/volume_group/VolumeGroup:::2f83983c-f2fe-463c-8387-6f21788cb184"
cqlsh -ksd -e "expand on;select id from volume_group where force_full='true'"

>>CHANGE THE STATE OF ETHERNET PORT ON NODE TO UP OR DOWN


sudo ip link set dev eth2 down

>>CHANGE THE SPEED ON ETHERNET PORT TO 10GBPS AND TURN OFF AUTO NEGOTIATION
sudo ethtool -s eth3 speed 10000 duplex full autoneg off
sudo ethtool -s eth2

>>ADD NUTANIX VERSION SUPPORT TO REGEX


rubrik_tool.py get_config nutanix nutanixOsVersionRegexCheck
rubrik_tool.py update_config nutanix nutanixOsVersionRegexCheck "^(5\.(18|17|16|15|
11|10|9|8|6|5|1\.[1-5])(\\..*)?|2017\..*|2018\.0[1-5]\.[0-9]{2})$" | grep
nutanixOsVersionRegexCheck
"nutanixOsVersionRegexCheck": "^(5\\.(18|17|16|15|11|10|9|8|6|5|1\\.[1-5])
(\\..*)?|2017\\..*|2018\\.0[1-5]\\.[0-9]{2})$",

>>CHECK RBS AGENT TIMEOUT VALUE


rkcl exec all
"/opt/rubrik/src/cpp/build/current/rba/agentserver/agent_server_client_main --
logtostderr --operation get_flag --flag_name rba_socket_recv_timeout"
rkcl exec all
"/opt/rubrik/src/cpp/build/current/rba/agentserver/agent_server_client_main --
logtostderr --operation get_flag --flag_name rba_socket_send_timeout"

sudo /opt/rubrik/src/cpp/build/current/rba/client/agent_client_main --
ssl_priv_key /var/lib/rubrik/certs/cluster.pem --ssl_pub_key
/var/lib/rubrik/certs/cluster.crt --operation discover --logtostderr --host
PRYFSC01.pryorcashman.com

>>CHANGE TIMEOUT VALUES FOR RBA, VDI.

rubrik_tool.py update_config mssql enableVdi true | grep enableVdi


rubrik_tool.py update_config mssql vdiRestoreTimeoutInSeconds 4800 | grep
vdiRestoreTimeoutInSeconds
rubrik_tool.py update_config mssql vdiDataTransferTimeoutInSeconds 4800 | grep
vdiDataTransferTimeoutInSeconds
rubrik_tool.py update_config mssql vdiSessionExpirationInSeconds 4800 | grep
vdiSessionExpirationInSeconds
rubrik_tool.py update_config mssql vdiTimeoutInSeconds 720 | grep
vdiTimeoutInSeconds
rkcl exec all
"/opt/rubrik/src/cpp/build/current/rba/agentserver/agent_server_client_main --
logtostderr --operation set_flag --flag_name rba_socket_recv_timeout --flag_value
1800"
rkcl exec all
"/opt/rubrik/src/cpp/build/current/rba/agentserver/agent_server_client_main --
logtostderr --operation set_flag --flag_name rba_socket_send_timeout --flag_value
1800"

sudo /opt/rubrik/src/cpp/build/current/rba/client/agent_client_main --
ssl_priv_key /var/lib/rubrik/certs/cluster.pem --ssl_pub_key
/var/lib/rubrik/certs/cluster.crt --operation discover --logtostderr --host ATL-HV-
01.tsged.com

>>GET ALL RUNNING JOBS TO A CSV FILE


sudo cqlsh -k sd -e "copy job_instance (job_id, instance_id, start_time,
status,node_id) to 'job_instance.csv'"
grep -i failed job_instance.csv
>>>FIND SNAPPABLE ID OF THE UPLOAD JOB
sudo -i QuicksilverTool.sh -cmd getConfig -jobInstanceId UPLOAD_7a67ebd0-4465-461a-
aa41-adc6d8a21017:::219 | grep 'snapshotSpecToUploadOpt' | jq '.'

>>TEST SUPPORT TUNNEL CONNECTION


curl -vvk https://proxy.rubrik.com:443
sudo ssh -S /var/lib/rubrik/tunnel.control -p 10011 -O check rubrik_node@localhost

TUNNEL FORWARDING
Run this command from Command Prompt (NOT MOBAXTERM)

sft ssh -L 8082:localhost:8082 supporttunnel04-colo --command


"/opt/rubrik/src/scripts/infra/tunnel/tunnel.py forward --tunnel_port 16434 --
local_port 8082 --node_port 443"

/opt/rubrik/src/scripts/dev/get_local_spray_token.py --username support$

Use the below link from Chrome

https://localhost:8082/web/bin/index.html#/welcome_support

Generate a key using the command below from the same command prompt

sft ssh -L 8083:localhost:8083 supporttunnel04-colo --command


"/opt/rubrik/src/scripts/infra/tunnel/tunnel.py forward --tunnel_port 24618 --
local_port 8083 --node_port 443"

sft ssh -L 8084:localhost:8084 supporttunnel04-colo --command


"/opt/rubrik/src/scripts/infra/tunnel/tunnel.py forward --tunnel_port 43194 --
local_port 8084 --node_port 443"

/opt/rubrik/src/scripts/dev/get_local_spray_token.py --username support$

You might also like