xcat-core/xCAT-client-2.0/pods/man1/lsslp.1.pod
sakolish 303af8d683 Reformatted example output
git-svn-id: https://svn.code.sf.net/p/xcat/code/xcat-core/trunk@412 8638fb3e-16cb-4fca-ae20-7b5d299a9bcd
2008-02-06 20:28:02 +00:00

121 lines
3.1 KiB
Plaintext

=head1 NAME
B<lsslp> - Queries selected networked services information within the same subnet.
=head1 SYNOPSIS
I<lsslp [-h| --help]>
I<lsslp [-v| --version]>
I<lsslp [-V| --verbose] [-b ip[,ip..]][-w][-r|-x|-z][-s BPA|MM|IVM|RSA|FSP|HMC]>
=head1 DESCRIPTION
The lsslp command queries selected service types using the -s flag. All service types are returned if the -s flag is not specified. If a specific broadcast address is not specified using the -b flag, the broadcast is performed out all broadcast enabled network adapters. The optional -r, -x, and -z flags format the output.
NOTE: SLP broadcast requests will propagate only within the subnet of the network adapter broadcast IPs specified by the -b flag. If the -b flag is not specified, the SLP broadcast is sent to all network adapter IPs enabled for broadcast.
=head1 OPTIONS
B<-b> IP(s) the command will broadcast out.
B<-h> Display usage message.
B<-r> Raw slp response.
B<-s> Service type interested in discovering.
B<-v> Command Version.
B<-V> Verbose output.
B<-w> Writes output to xCAT database.
B<-x> XML format.
B<-z> Stanza formated output.
=head1 RETURN VALUE
0 The command completed successfully.
1 An error has occurred.
=head1 EXAMPLES
1. To list all discovered HMC service types in tabular format, enter:
I<lsslp -s HMC>
Output is similar to:
device type-model serial-number ip-addresses hostname
HMC 7310CR2 103F55A 1.1.1.115 2.2.2.164 3.3.3.102 hmc01
HMC 7310CR2 105369A 3.3.3.103 2.2.2.103 1.1.1.163 hmc02
HMC 7310CR3 KPHHK24 3.3.3.154 2.2.2.110 1.1.1.154 hmc03
2. list all discovered FSP service types in raw response format on subnet 30.0.0.255, enter:
I<lsslp -b 3.0.0.255 -s FSP -r>
Output is similar to:
(type=cec-service-processor),(serial-number=10A3AEB),(machinetype-model=9117-570),(fru-serial-number=YL11C5338102),(hostname=),(frame-number=0),(cage-number=0),(ip-address=3.0.0.94,1.1.1.147),(web-url=https://3.0.0.94:473 ), (slot=1),(bpc-machinetype-model=0),(bpc-serial-number=0),(Image=fips240/b0630a_0623.240)
(type=cec-service-processor),(serial-number=10A3E2B),(machinetype-model=9117-570),(fru-serial- number=YL11C5338250),(hostname=),(frame-number=0),(cage-number=0),(ip-address=3.0.0.95,1.1.1.147), (web-url=https://3.0.0.95:473 ),(slot=1),(bpc-machinetype-model=0),(bpc-serial-number=0),(Image=fips240/b0630a_0623.240)
3. To list all discovered MM service types in XML format and write the output to the xCAT database, enter:
I<lsslp -s MM -x -w>
Output is similar to:
<Node>
<device>MM</device>
<hostname>mm01</hostname>
<ip-addresses>1.1.1.19</ip-addresses>
<serial-number>78AG034</serial-number>
<type-model>86772XX</type-model>
</Node>
4. To list all discovered MM service types in stanza format and write the output to the xCAT database, enter:
I<lsslp -s MM -z -w>
Output is similar to:
mm01:
objtype=node
device=MM
type-model=86772XX
serial-number=78AG034
ip-addresses=1.1.1.19
=head1 FILES
/opt/xcat/bin/lsslp
=head1 NOTES
This command is part of the xCAT software product.