Discussion:
[Beowulf] Any industry-standards that allow automated BIOS modifications and dumping? IPMI cannot do it, can it?
Rahul Nabar
2009-10-22 02:18:59 UTC
Permalink
great: so they boot from a special PXE image I set up as a catchall.
(dhcpd lets you define a catchall for any not nodes which lack a their own
MAC-specific stanza.) when nodes are in that state, I like to
auto-configure
the cluster's knowlege of them: collect MAC, add to dhcpd.conf, etc. at
this stage, you can also use local (open) ipmi on the node itself to
ipmitool lan 2 set password pa55word
ipmitool lan 2 set defgw ipaddr 10.10.10.254
ipmitool lan 2 set ipsrc dhcp
Thanks to all the great responses I got for my last post I now have a
working IPMI solution! Thanks again guys! This Beowulf list really
rocks! :)

In case it helps anyone else I thought it might be good to post some
points that had me stumped:

#####load the required drivers
modprobe ipmi_devintf
modprobe ipmi_si
modprobe ipmi_msghandler

###turn ipmi-over-lan on and set user and passwd. Set it to get its IP over DHCP
ipmitool lan set 1 access on
ipmitool lan set 1 ipsrc dhcp
ipmitool user set password 2 foopasswd

####use this to get the MAC corresponding to the BMC
ipmitool lan print

##put MAC into central dhcpd.conf

[of course, maybe some of my settings are naiive or erronous; feel
free to correct me]

I can pretty much remote monitor logs, stats, remote power reset etc.
The only two things I cannot:

(1) Can't do a Serial-on-LAN (SOL); My Dell server needs a special
card (read more money) for this function. That is unfortunate.

(2)Can't mod the BIOS settings or even dump them. Is there a way to
modify the BIOS settings via. IPMI (in general)

I did find the "bootdev" option. So I can change the boot seq. but not
the other BIOS settings.

Any "industry standard" to change BIOS settings unattended. Preferably over LAN?
--
Rahul
Rahul Nabar
2009-10-22 02:26:48 UTC
Permalink
Post by Rahul Nabar
I did find the "bootdev" option. So I can change the boot seq. but not
the other BIOS settings.
Any "industry standard" to change BIOS settings unattended. Preferably over LAN?
I guess another way to pose the question is:

What's the converse command (if at all exists) for "dmidecode".

dmidecode (or biosdecode) pops the BIOS settings to console. What can
push settings into the BIOS?
--
Rahul
Don Holmgren
2009-10-22 23:02:57 UTC
Permalink
Post by Rahul Nabar
Post by Rahul Nabar
I did find the "bootdev" option. So I can change the boot seq. but not
the other BIOS settings.
Any "industry standard" to change BIOS settings unattended. Preferably over LAN?
What's the converse command (if at all exists) for "dmidecode".
dmidecode (or biosdecode) pops the BIOS settings to console. What can
push settings into the BIOS?
A long answer, sorry - read at your own risk. Maybe there will be some useful
information. Since you have Dell equipment maybe their OpenManage stuff will do
exactly what you want.

The short answer, unfortunately, is no. Check with your system vendor to see
if they can provide a utility.

There is an industry standard - the "ISA System Architecture" - that defined
among many other things the required interfaces to the real time clock chip
(Motorola MC146818) that included a small amount of NVRAM - usually called the
"CMOS memory" - that was kept non-volatile by means of a battery on your
motherboard. The ISA standard includes the specifications for how some of those
memory locations are to be used to store, for example, information about your
hard disk drive and your floppy drives (that is, the BIOS settings of that
time). Pretty much every x86 PC that you buy today, AFAIK (I've never seen an
exception) still includes this RTC and NVRAM area. Motherboards still have a
lithium battery that is used to keep this alive, although for a time in
competing RTC chips these batteries were integrated into the integrated circuit
(a very dumb idea, since systems are often used beyond the lifetime of
the batteries).

In Linux, /dev/nvram lets you access this area, and in 2.6 kernels (maybe in 2.4
also??) you can generally
`cat /proc/driver/nvram`
to see a dump of the ISA-specified data stored there (you may have to `modprobe
nvram` first).

On some motherboards I've used over the years, the BIOS settings were all stored
in this nvram area, and so to replicate the BIOS settings from one system to a
second system with the same motherboard, you could readout all of the data and
write it back to the second system. There is a checksum kept in the nvram that
has to be updated appropriately, otherwise at the next power on self test the
system would complain about corrupted CMOS and would restore the default
settings. The Linux nvram driver handles the checksum updating for you. (Not
really - keep reading).

The interface to access the RTC nvram area is very crude if you are writing
your own code (as opposed to using the Linux nvram driver): use the "out"
instruction to write the byte offset (the address) to I/O port 0x70, and then
either read ('in') or write ('out') a byte (or word) from I/O port 0x71. See
http://wiki.osdev.org/CMOS
http://www.bioscentral.com/misc/cmosmap.htm
http://bochs.sourceforge.net/techspec/CMOS-reference.txt
and
http://www.pixelbeat.org/docs/bios/
for discussions. In the ISA standard, the offset is limited to the range
0-0x80 (128 bytes).

The bad news is that motherboards typically have larger nvram areas than this
128-byte ISA region, and so some of the BIOS settings you care about may be
stored elsewhere (maybe even in EEPROM??). Worse, they may protect the settings
(in the sense of detecting corruption) with additional checksums or CRCs, and
unless you know which bytes or even bit ranges are used (and in which order) to
compute the CRC, you won't be able to change individual settings w/out causing
the POST to declare corruption, even if you could figure out which bits and/or
bytes corresponded to a given BIOS setting.

On either the Intel "Torrey Pines" or "Buckner" motherboards (can't remember
now), there was a second 128-byte region that was accessed via I/O ports 0x72
and 0x73 in the same way that 0x70 and 0x71 are used for the ISA nvram region.
All of the BIOS settings were in the two 128-byte regions, and we were able to
replicate BIOS settings in Linux by copying all the bytes from both regions from
one motherboard to another. Sweet - saved tons of "crash cart" work on a very
big cluster.

Unfortunately, I've never gotten this same thing to work on motherboards since
those Intel boards. Often the POST detects corruption (although this can be
useful - more below). So, perhaps larger or other nvram resources are probably
being used, and who knows (without reading the BIOS source code, which AMI,
Pheonix, etc. will probably never give you) what the interface to that memory
might be on a given computer.

On a large cluster of Intel Lancewood motherboards many years ago, we found a
brute force solution for forcing BIOS settings (these motherboards had the
annonying habit of deciding that the 2nd processor was dead, and you could only
resurrect SMP operations by going into the BIOS and telling the system to reset
the processor timer test; our cluster was remote and we needed to do this using
serial redirect, and so we needed to force the BIOS into a state where the
redirect worked). We used a PCI bus analyzer (made by VMetro) to record all I/O
bus activity following executing the "Save Settings and Reboot" menu option in
the BIOS. All activity to ports like 0x70 and 0x71 above was captured. Through
trial and error we parsed out of this huge trace the raw I/O commands that
were sufficient to put the BIOS settings into a known good state. When a
Lancewood wiped the CMOS settings, in Linux we "replayed" this magic set of I/O
instructions.

On request, various manufacturers (Intel, Asus, Supermicro) have provided us
utilities (always for DOS) for reading out and writing BIOS settings - you can
always ask your vendor to see if such a utility is available for your hardware.
It's a bit of a pain to have to go into DOS to do this, but it's better than
nothing (we usually include a DOS partition on our system disks that can be used
for flashing the BIOS, BMC, gigE, and other firmware). For one cluster, the
motherboard manufacturer provided us with a tool from the BIOS vendor (AMI?)
that allowed us, in a Windows application, to alter the default BIOS settings.
These then get loaded when during the power on self test CMOS corruption is
detected; to corrupt our CMOS, in Linux we just scribbled in the RTC nvram
region.

Hope this was useful, or at least maybe a mildly interesting read. It would be
absolutely terrific if BIOS vendors would always provide the software to
manipulate, or at least replicate, BIOS settings. Somehow it seems like well
into the 2nd decade of Linux clusters this particular issue should have been
solved once and for all.


Don Holmgren
Fermilab
Mark Hahn
2009-10-22 03:26:43 UTC
Permalink
Post by Rahul Nabar
#####load the required drivers
modprobe ipmi_devintf
modprobe ipmi_si
modprobe ipmi_msghandler
IMO, you shouldn't: when permanently active, the local ipmi
interface seems to consume noticable cycles (kipmi thread).
just modprobe when you need it and rmmod after...
Post by Rahul Nabar
(2)Can't mod the BIOS settings or even dump them. Is there a way to
modify the BIOS settings via. IPMI (in general)
definitely not in general. a vendor could certainly provide IPMI
extensions that manipulate bios settings. but the market doesn't
seem to find this kind of HPC-mostly concern worthwhile :(

donno, maybe the really big players (google, etc) get satisfaction.
I wonder though, whether it would kill vendors just to publish
the source for their bios.

bios-serial-redirection and serial-over-lan can let you do it manually.
Rahul Nabar
2009-10-22 20:52:01 UTC
Permalink
Post by Rahul Nabar
#####load the required drivers
modprobe ipmi_devintf
modprobe ipmi_si
modprobe ipmi_msghandler
IMO, you shouldn't: when permanently active, the local ipmi interface seems
to consume noticable cycles (kipmi thread). just modprobe when you need it
and rmmod after...
Good point. I will do that. The first time around local impi is useful
to change the password and DHCP etc. THat's why I had to load those
drivers.
definitely not in general.  a vendor could certainly provide IPMI
extensions that manipulate bios settings.  but the market doesn't seem to
find this kind of HPC-mostly concern worthwhile :(
Hmm, the lack of a BIOS-mod standard is unfortunate. Maybe it will be
there sometime!...shouldn't this be an enterprise-level concern not
just HPC? I mean what if you have 200 Windows machines and wanted to
turn hyperthreading off in the BIOS. It still boils down to some sort
of standardized interface to change it remotely and automatically.
Unless the admins change those manually.....
bios-serial-redirection and serial-over-lan can let you do it manually.
I know about SOL but what's the "bios-serial-redirection". Is that the
same or a different system?
--
Rahul
Mark Hahn
2009-10-22 21:08:13 UTC
Permalink
Post by Rahul Nabar
there sometime!...shouldn't this be an enterprise-level concern not
just HPC? I mean what if you have 200 Windows machines and wanted to
turn hyperthreading off in the BIOS.
first, you don't really depend solely on the bios for HT. next,
those 200 boxes are probably spread out, and possibly not remote-managable in
the first case. next, business IT support normally has a drone class,
whose existence is predicated on doing this sort of thing. at least
at my HPC organization, there are no drones (flatter hierarchy - not that
we're just superior ;)

I would love a documented bios setting interface, but I don't think
it's salient on the radar of the mass market.
Post by Rahul Nabar
Post by Mark Hahn
bios-serial-redirection and serial-over-lan can let you do it manually.
I know about SOL but what's the "bios-serial-redirection". Is that the
same or a different system?
bioses can have a setting which enables interaction with the bios (at post
time) through a serial port. that serial port may also be redirected over
the lan. these are semi-independent features (the first mainly concerns
the bios; the latter mainly the bmc that implements ipmi.)
Rahul Nabar
2009-10-22 21:41:50 UTC
Permalink
the first case.  next, business IT support normally has a drone class,
whose existence is predicated on doing this sort of thing.  at least at my
HPC organization, there are no drones (flatter hierarchy - not that we're
just superior ;)
Can I have some drones too, Mark? ;-) I'd love some. I think here I'm
drone+worker+soldier+queen bee combined into one. Cheers!
--
Rahul
Greg Lindahl
2009-10-22 21:15:52 UTC
Permalink
Post by Mark Hahn
definitely not in general. a vendor could certainly provide IPMI
extensions that manipulate bios settings. but the market doesn't seem to
find this kind of HPC-mostly concern worthwhile :(
Well, it's not just for HPC anymore, all the warehouse computing guys
(cloud) want this, too. I believe someone explained to me a long time
ago that there is a standard way to read and write (but not interpret)
the BIOS flash saved state, but the state is now too large to fit into
the standard-sized area.
Post by Mark Hahn
I wonder though, whether it would kill vendors just to publish the source
for their bios.
Yes, it would. Not only is the source owned by AMI & Phoenix, and not
mobo vendors, but it includes licensed stuff, and also secret
workarounds to hardware bugs in lots of devices. Even IBM's BIOS
(still used in a few high-end IBM x86 servers) is probably polluted
that way.

-- greg
Rahul Nabar
2009-10-22 21:43:01 UTC
Permalink
Post by Greg Lindahl
mobo vendors, but it includes licensed stuff, and also secret
workarounds to hardware bugs in lots of devices.
Why does a workaround to a hardware bug have to be secret? Just
curious.....Aren't hardware bugs published in errata regularly?
--
Rahul
Greg Lindahl
2009-10-22 22:00:35 UTC
Permalink
Post by Rahul Nabar
Post by Greg Lindahl
mobo vendors, but it includes licensed stuff, and also secret
workarounds to hardware bugs in lots of devices.
Why does a workaround to a hardware bug have to be secret? Just
curious.....Aren't hardware bugs published in errata regularly?
It's not that it has to be a secret, it's that vendors don't want the
public to know. Ideally they'd all appear in errata. In practice,
vendors tell some of the bugs only to M$ and BIOS vendors under
NDA. And then Linux people wonder why the device doesn't work very
well under Linux. Some devices don't have any public errata, some have
partial lists, for some you think the public list is complete, but...

-- greg
Joe Landman
2009-10-22 22:03:34 UTC
Permalink
Post by Rahul Nabar
Why does a workaround to a hardware bug have to be secret? Just
curious.....Aren't hardware bugs published in errata regularly?
[don't shoot the messenger]

Because some hardware bugs are scary, and could/would have profound
marketing/sales impacts.
--
Joseph Landman, Ph.D
Founder and CEO
Scalable Informatics, Inc.
email: ***@scalableinformatics.com
web : http://scalableinformatics.com
http://scalableinformatics.com/jackrabbit
phone: +1 734 786 8423 x121
fax : +1 866 888 3112
cell : +1 734 612 4615
Mark Hahn
2009-10-22 22:34:24 UTC
Permalink
Post by Greg Lindahl
Post by Mark Hahn
definitely not in general. a vendor could certainly provide IPMI
extensions that manipulate bios settings. but the market doesn't seem to
find this kind of HPC-mostly concern worthwhile :(
Well, it's not just for HPC anymore, all the warehouse computing guys
(cloud) want this, too.
sorry, I thought it was understood that "Cloud" is just a new name
for the degenerate, low-end component of HPC, formerly known as
"serial farming". ;)

yes, I wouldn't be surprised if Google/Amazon/etc have good traction.
Post by Greg Lindahl
I believe someone explained to me a long time
ago that there is a standard way to read and write (but not interpret)
the BIOS flash saved state, but the state is now too large to fit into
the standard-sized area.
indeed, there is a definition for PC-AT-vintage settings. but that
doesn't really include anything interesting (ie, does include floppy
config, but does not include ECC scrub settings...)
Post by Greg Lindahl
Post by Mark Hahn
I wonder though, whether it would kill vendors just to publish the source
for their bios.
Yes, it would. Not only is the source owned by AMI & Phoenix, and not
mobo vendors,
my understanding is that AMI/Phoenix sell essentially a bios SDK,
and that the board vendor assembles their own "app" based on that.
Post by Greg Lindahl
but it includes licensed stuff, and also secret
workarounds to hardware bugs in lots of devices.
well, I'm really talking only about the basic MB bios, and really only
the POST portion. so not PXE-related stuff, or code for add-in devices.
is the memory count-up licensed? the display-splash-image code secret?
for CPU/chipset workarounds, I'm skeptical about the secrecy, since
AMD and Intel both disclose quite a lot in their chip eratta and bios
developer's guides. for instance, I'm pretty sure the AMD doc is
detailed enough to fully configure dram detect/config, HT and IO config,
SMP bringup, etc.
Post by Greg Lindahl
Even IBM's BIOS
(still used in a few high-end IBM x86 servers) is probably polluted
that way.
I wonder how hard it is to actually read the raw bios. for instance,
under linux, could there not be a /dev/flash device driver that handled
the access interface (I2C, I guess)? having at least a read/write
char dev would open up some possibilities, like diffing the flash image
when you change one setting. (hell, just being able to write the
flash image from linux with a single, simple, non-proprietary tool
would be a huge step...)
Rahul Nabar
2009-10-22 14:40:23 UTC
Permalink
Post by Rahul Nabar
(1) Can't do a Serial-on-LAN (SOL); My Dell server needs a special
card (read more money) for this function. That is unfortunate.
are you sure? have you tried using lanplus instead of lan? (e.g. use
ipmitool -I lanplus) Never had this problem with our bog-standard dells.
I get this error:

ipmitool -H 10.0.0.26 -I lanplus -U root sol activate
Password:
Error loading interface lanplus

Any clue what this might be? How can I get the lanplus interface
loaded? Is this a driver issue or does this mean that my BMC does not
have a lanplus interface at all.

The LAN interface does work file but apparantly "sol activate" needs lanplus.

ipmitool -H 10.0.0.26 -I lan -U root sol activate
Error: This command is only available over the lanplus interface
--
Rahul
Gregory Matthews
2009-10-22 15:11:52 UTC
Permalink
Post by Rahul Nabar
Post by Rahul Nabar
(1) Can't do a Serial-on-LAN (SOL); My Dell server needs a special
card (read more money) for this function. That is unfortunate.
are you sure? have you tried using lanplus instead of lan? (e.g. use
ipmitool -I lanplus) Never had this problem with our bog-standard dells.
ipmitool -H 10.0.0.26 -I lanplus -U root sol activate
Error loading interface lanplus
did you compile ipmitool yourself? it might be the libcrypto linking
issue described not very satisfactorily here:

http://www.mail-archive.com/ipmitool-***@lists.sourceforge.net/msg01104.html

perhaps you compiled it without ssl support? It certainly looks like a
client side issue rather than hardware.

GREG
Post by Rahul Nabar
Any clue what this might be? How can I get the lanplus interface
loaded? Is this a driver issue or does this mean that my BMC does not
have a lanplus interface at all.
The LAN interface does work file but apparantly "sol activate" needs lanplus.
ipmitool -H 10.0.0.26 -I lan -U root sol activate
Error: This command is only available over the lanplus interface
--
Greg Matthews 01235 778658
Senior Computer Systems Administrator
Diamond Light Source, Oxfordshire, UK
Rahul Nabar
2009-10-22 23:56:44 UTC
Permalink
On Thu, Oct 22, 2009 at 10:11 AM, Gregory Matthews
did you compile ipmitool yourself? it might be the libcrypto linking issue
perhaps you compiled it without ssl support? It certainly looks like a
client side issue rather than hardware.
Yes. That's right. ./configure lists:

Interfaces
lan : yes
lanplus : no
open : yes
free : no
imb : yes
bmc : no
lipmi : no


The relevant log snippet is:

checking for EVP_aes_128_cbc in -lcrypto... no
checking for MD5_Init in -lcrypto... no
checking for MD2_Init in -lcrypto... no
** The lanplus interface requires an SSL library with EVP_aes_128_cbc defined.

Any clues what I am doing wrong? I used: "./configure --enable-intf-lanplus"

I checked that I have openssl, libgcrypt and libgcrypt-devel installed.

I even found the file "ibcrypt.so.1" and created the link:
"ln -s /lib/libcrypt.so.1 /usr/lib/libcrypto.so" (as per the link Greg had sent)

Which one is the "SSL library with EVP"? Ideas?
--
Rahul
Prentice Bisbal
2009-10-23 14:42:56 UTC
Permalink
Post by Rahul Nabar
checking for EVP_aes_128_cbc in -lcrypto... no
checking for MD5_Init in -lcrypto... no
checking for MD2_Init in -lcrypto... no
** The lanplus interface requires an SSL library with EVP_aes_128_cbc defined.
Any clues what I am doing wrong? I used: "./configure --enable-intf-lanplus"
I checked that I have openssl, libgcrypt and libgcrypt-devel installed.
"ln -s /lib/libcrypt.so.1 /usr/lib/libcrypto.so" (as per the link Greg had sent)
Which one is the "SSL library with EVP"? Ideas?
The proper way to deal with this is to set LDFLAGS to include the
correct lib directories in the correct order before running configure.
While symlinks work, it can lead to a mess if done too often.

On 64-bit RHEL-based systems, I've found that /usr/lib64 and lib64 are
often overlooked and must be explicitly specified in LDFLAGS. I don't
know why could be poorly written configure scripts.

The proper search path for include directories should be defined in
CPPFLAGS, too.

--
Prentice
Don Holmgren
2009-10-22 15:22:22 UTC
Permalink
Post by Rahul Nabar
Post by Rahul Nabar
(1) Can't do a Serial-on-LAN (SOL); My Dell server needs a special
card (read more money) for this function. That is unfortunate.
are you sure? have you tried using lanplus instead of lan? (e.g. use
ipmitool -I lanplus) Never had this problem with our bog-standard dells.
ipmitool -H 10.0.0.26 -I lanplus -U root sol activate
Error loading interface lanplus
Any clue what this might be? How can I get the lanplus interface
loaded? Is this a driver issue or does this mean that my BMC does not
have a lanplus interface at all.
The LAN interface does work file but apparantly "sol activate" needs lanplus.
ipmitool -H 10.0.0.26 -I lan -U root sol activate
Error: This command is only available over the lanplus interface
It sounds like your ipmitool was built without lanplus support. Try
ipmitool -h
and it will list under "Interfaces:" all of the protocols that it will
support. You may need to explicitly enable lanplus when you configure
the build.

Don Holmgren
Fermilab
Rahul Nabar
2009-10-22 20:53:37 UTC
Permalink
It sounds like your ipmitool was built without lanplus support.  Try
  ipmitool -h
and it will list under "Interfaces:" all of the protocols that it will
support.  You may need to explicitly enable lanplus when you configure
the build.
Thanks Don! You are correct.

ipmitool -h
Interfaces:
open Linux OpenIPMI Interface [default]
imb Intel IMB Interface
lan IPMI v1.5 LAN Interface

Let me try to recompile my IPMI.
--
Rahul
Mark Hahn
2009-10-22 16:11:45 UTC
Permalink
Post by Rahul Nabar
ipmitool -H 10.0.0.26 -I lanplus -U root sol activate
Error loading interface lanplus
Any clue what this might be? How can I get the lanplus interface
loaded?
sounds like your version of ipmitool is compiled without lanplus
(or misconfigured in some way)
Post by Rahul Nabar
Is this a driver issue or does this mean that my BMC does not
have a lanplus interface at all.
there's no driver here: ipmitool is a user-level network client
that sends packets to the bmc. if the bmc isn't running a protocol
like lanplus, ipmitool will just fail to connect (timeout):

[***@req773 ~]$ ipmitool -U admin -P whatever -I lan -H cp-req1 chassis status
Get Session Challenge command failed
Error: Unable to establish LAN session
ipmi_lan_send_cmd failed to open intf
Error sending Chassis Status command
Post by Rahul Nabar
The LAN interface does work file but apparantly "sol activate" needs lanplus.
ipmitool -H 10.0.0.26 -I lan -U root sol activate
Error: This command is only available over the lanplus interface
IMO, they misuse the term 'interface' there - they mean protocol.
Rahul Nabar
2009-10-23 01:20:00 UTC
Permalink
Post by Mark Hahn
sounds like your version of ipmitool is compiled without lanplus
(or misconfigured in some way)
It works now (in a rudimentary way!). Thanks guys, for the tips. I
found the ipmitool in a CentOS repo. I gave up on comping my own.

/usr/bin/ipmitool -I lanplus -U root -H 10.0.0.26 sol activate
Password:
[SOL Session operational. Use ~? for help]

Now, if I can only get it to display the remote screen! :)
--
Rahul
Greg Lindahl
2009-10-23 04:37:05 UTC
Permalink
Post by Rahul Nabar
Now, if I can only get it to display the remote screen! :)
SOL = serial over lan. No concept of a screen.

If you want to look at what's on the text console,

cat /dev/vcs

Or use conman (which is available as a package) to record and log
everything that comes through.

-- greg
Rahul Nabar
2009-10-24 01:26:46 UTC
Permalink
You need to modify /etc/inittab to add a getty for your serial
line (to give you a login prompt).
If in the BIOS you redirected COMn, the corresponding Linux serial
port is ttyS(n-1).  Add this line to inittab to to run agetty on COM1, baud
S0:12345:respawn:/sbin/agetty ttyS0 115200
S1:12345:respawn:/sbin/agetty ttyS1 19200
Thanks to Don's config instructions I finally got SOL working! It took
a while before I stumbled upon the help menu which said that SOL won't
work over COM1. I had to use COM2.

It'll even allow me to reach the BIOS *iff* I get the timing
correctly. Of course on a reboot it goes down the instant eth0 gets
pulled down.
--
Rahul
Greg Keller
2009-10-22 20:31:49 UTC
Permalink
Hi Rahul,
Post by Rahul Nabar
[of course, maybe some of my settings are naiive or erronous; feel
free to correct me]
OK
Post by Rahul Nabar
I can pretty much remote monitor logs, stats, remote power reset etc.
(1) Can't do a Serial-on-LAN (SOL); My Dell server needs a special
card (read more money) for this function. That is unfortunate.
What server? If you have Power Control via IPMI SoL is there (at
least anything less than 3 years old. Hopefully it's just ipmitool
recompile as others suggested... all the prebuilt packages I've ever
used had it.
Post by Rahul Nabar
(2)Can't mod the BIOS settings or even dump them. Is there a way to
modify the BIOS settings via. IPMI (in general)
Dell provides for cmd line changing of almost all BIOS/RAID/Remote
Access Card settings via their own tool, omconfig. Proprietary, yes.
Works, yes. Avoid all the gui stuff during the installation with a
couple install flags and the command line "omconfig", "omreport" are
very scriptable. Industry standard, if you're Dell :) Googling for
either will get you straight to the command line reference:
http://support.dell.com/support/edocs/software/svradmin/1.9/en/cli/cli_cc7c.htm#1093458


Cheers!
Greg
Rahul Nabar
2009-10-22 20:56:11 UTC
Permalink
What server?  If you have Power Control via IPMI SoL is there (at least
anything less than 3 years old.  Hopefully it's just ipmitool recompile as
others suggested... all the prebuilt packages I've ever used had it.
I'm trying two servers here in my cluster:

SC1435
R410

On digging deeper with the helpdesk one of the things is that my R410
comes with a "DRAC Express". The "DRAC Enterprise" seems to have some
more features and some say that SOL is one of those. But I still am
not sure and will give it a shot.
Dell provides for cmd line changing of almost all BIOS/RAID/Remote Access
Card settings via their own tool, omconfig.  Proprietary, yes. Works, yes.
 Avoid all the gui stuff during the installation with a couple install flags
and the command line "omconfig", "omreport" are very scriptable.  Industry
standard, if you're Dell :)  Googling for either will get you straight to
http://support.dell.com/support/edocs/software/svradmin/1.9/en/cli/cli_cc7c.htm#1093458
Thanks Greg! I'm gonna give that a shot.
--
Rahul
Loading...