Symptom:
System log shows a bunch of RPC timed out messages such as the following:
Dec 13 09:23:23 gil08 last message repeated 1 time Dec 13 09:29:14 gil08 statd[19858]: [ID 766906 daemon.warning] statd: cannot talk to statd at ssc23, RPC: Timed out(5) Dec 13 09:35:05 gil08 last message repeated 1 time Dec 13 09:40:56 gil08 statd[19858]: [ID 766906 daemon.warning] statd: cannot talk to statd at ssc23, RPC: Timed out(5) ..
Those messages are the result of an apparent communication failure between the status daemons (statd) of both local and remote hosts using RPC calls.
Workaround/Solution:
If the target_host is reachable, execute the following to stop the system from generating those warning messages --- stop the network status monitor, remove the target host entry from /var/statmon/sm.bak file and start the network status monitor process. Removing the target host entry from sm.bak file keeps that machine from being aware that it may have to participate in locking recovery.
eg.,
# ps -eaf | fgrep statd daemon 14304 19622 0 09:47:16 ? 0:00 /usr/lib/nfs/statd root 14314 14297 0 09:48:03 pts/15 0:00 fgrep statd # svcs -a | grep "nfs/status" online 9:52:41 svc:/network/nfs/status:default # svcadm -v disable nfs/status svc:/network/nfs/status:default disabled. # ls /var/statmon/sm.bak ssc23 # rm /var/statmon/sm.bak/ssc23 # svcadm -v enable nfs/status svc:/network/nfs/status:default enabled.
No comments:
Post a Comment