Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

87 lines
3.7 KiB

  1. Steps you need to execute to capture the health index data:
  2. � You must have admin rights to execute the tools.
  3. � HEALTH_CHK can run remotely, so you can use any working server.
  4. � FRS must be running on the target server to gather the data.
  5. � The tools do not write or modify the Directory � they simply read the configuration.
  6. � Logs are written to a specified directory using the name of the target machine.
  7. Detailed steps:
  8. 1. Copy entire Health directory to your working server
  9. - \\bedlove\davidor\ScriptsToolsHotfixes\health
  10. 2. On each server run health_chk
  11. Usage: health_chk result_dir [target_computername]
  12. Retrieve state info from the specified server/DC.
  13. result_dir is created if it does not exist. No trailing backslash.
  14. Target_ComputerName is optional. Default is current computer.
  15. It can be a netbios name with no leading slashes or a full dns name, xxx.yyy.zzz.com
  16. This script uses NTFRSUTL.EXE to gather data from FRS on the
  17. Target computer. This tool must be in your path and can be found
  18. in the resource kit. The NTFRS service must be running on the
  19. target computer. health_chk uses the following tools to gather information.
  20. regdmp repadmin ntfrsutl eventdmp
  21. The idea of the two dirs above is that the result_dir holds
  22. all the results and the target machine subdir holds the results of a given machine.
  23. So if you were doing 3 machines M1, M2, M3 you might run it as follows:
  24. health_chk HC-032801 M1
  25. health_chk HC-032801 M2
  26. health_chk HC-032801 M3
  27. Then when done zip up the result dir (HC-032801 in this case) and mail or copy as appropriate.
  28. Health_chk produces the following output files in a directory for each machine:
  29. ds_showconn.txt repadmin /showconn -- only relevant for DCs
  30. ds_showreps.txt repadmin /showreps -- only relevant for DCs
  31. evl_application.txt A summary dump of APPLICATION event log.
  32. evl_dns.txt " " DNS event log (if present)
  33. evl_ds.txt " " DS event log (if a DC)
  34. evl_ntfrs.txt " " FRS event log.
  35. evl_system.txt " " SYSTEM event log.
  36. ntfrs_config.txt output file from ntfrsutl config
  37. ntfrs_ds.txt output file from ntfrsutl ds
  38. ntfrs_inlog.txt output file from ntfrsutl inlog
  39. ntfrs_outlog.txt output file from ntfrsutl outlog
  40. ntfrs_sets.txt output file from ntfrsutl sets
  41. ntfrs_version.txt output file from ntfrsutl version
  42. ntfrs_machine.txt some OS and machine identity info
  43. ntfrs_reg.txt output of regdmp of FRS registry params
  44. ntfrs_errscan.txt output file from running ERRSCAN on ntfrs debug logs.
  45. ntfrs_sysvol.txt Dir listing of the sysvol share (if a DC)
  46. *****OPTIONAL*****
  47. � The following steps can be run to produce some summary reports once you have the data above.
  48. 1. On your working client/server machine, verify Perl is installed
  49. - if not install it from W2K Resource Kit or run getperl from \\bedlove\davidor\ScriptsToolsHotfixes
  50. 2. Copy TOPCHK to your working machine - \\bedlove\davidor\ScriptsToolsHotfixes\topchk
  51. 3. On the data file from each DC/server, Run "TOPCHK ntfrs_ds.txt > top-rpt.txt�
  52. 4. Copy CONNSTAT to your working machine - \\bedlove\davidor\ScriptsToolsHotfixes\connstat
  53. 5. On the data file from each DC/server, Run "CONNSTAT ntfrs_sets.txt > connstat-rpt.txt�
  54. 6. Copy IOLOGSUM to your working machine - \\bedlove\davidor\ScriptsToolsHotfixes\iologsum
  55. 7. On the data file from each DC/server, Run "IOLOGSUM ntfrs_inlog.txt> connstat-rpt.txt�
  56. -- IOLOGSUM can process the data files from the inlog, outlog or idtable dumps produced by ntfrsutl.
  57. Running each of the above tools without parameters produces a short usage description.