Hi, I'm new to Linux, IPMI monitoring and Linux. I have setup Nagios on a CentOS 5 machine to poll temperature information via a script invoking the ipmimonitoring command. So far I have successfully done so for Dell Poweredge and Sun Sunfire servers (with -W endianseq).
I'm now trying to do it on HP DL380 and DL385 machines with ILO2 firmware version 1.5 but I get a connection time out all the time. Using IPMI 1.1.5 to execute the command. I have no authority to update the firmware so I want to know if upgrading the firmware will resolve this problem so I can escalate to the admin or is my command syntax just incorrect for an HP. Thanks in advance for any help. [root@localhost sbin]# ./ipmimonitoring -u userid -p password -h 10.20.61.210 --debug 10.20.61.210: ===================================================== 10.20.61.210: IPMI 1.5 Get Channel Authentication Capabilities Request 10.20.61.210: ===================================================== 10.20.61.210: RMCP Header: 10.20.61.210: ------------ 10.20.61.210: [ 6h] = version[ 8b] 10.20.61.210: [ 0h] = reserved[ 8b] 10.20.61.210: [ FFh] = sequence_number[ 8b] 10.20.61.210: [ 7h] = message_class.class[ 5b] 10.20.61.210: [ 0h] = message_class.reserved[ 2b] 10.20.61.210: [ 0h] = message_class.ack[ 1b] 10.20.61.210: IPMI Session Header: 10.20.61.210: -------------------- 10.20.61.210: [ 0h] = authentication_type[ 8b] 10.20.61.210: [ 0h] = session_sequence_number[32b] 10.20.61.210: [ 0h] = session_id[32b] 10.20.61.210: [ 9h] = ipmi_msg_len[ 8b] 10.20.61.210: IPMI Message Header: 10.20.61.210: -------------------- 10.20.61.210: [ 20h] = rs_addr[ 8b] 10.20.61.210: [ 0h] = rs_lun[ 2b] 10.20.61.210: [ 6h] = net_fn[ 6b] 10.20.61.210: [ C8h] = checksum1[ 8b] 10.20.61.210: [ 81h] = rq_addr[ 8b] 10.20.61.210: [ 0h] = rq_lun[ 2b] 10.20.61.210: [ Bh] = rq_seq[ 6b] 10.20.61.210: IPMI Command Data: 10.20.61.210: ------------------ 10.20.61.210: [ 38h] = cmd[ 8b] 10.20.61.210: [ Eh] = channel_number[ 4b] 10.20.61.210: [ 0h] = reserved1[ 3b] 10.20.61.210: [ 0h] = get_ipmi_v2.0_extended_data[ 1b] 10.20.61.210: [ 3h] = maximum_privilege_level[ 4b] 10.20.61.210: [ 0h] = reserved2[ 4b] 10.20.61.210: IPMI Trailer: 10.20.61.210: -------------- 10.20.61.210: [ Ah] = checksum2[ 8b] 10.20.61.210: ===================================================== 10.20.61.210: IPMI 1.5 Get Channel Authentication Capabilities Request 10.20.61.210: ===================================================== 10.20.61.210: RMCP Header: 10.20.61.210: ------------ 10.20.61.210: [ 6h] = version[ 8b] 10.20.61.210: [ 0h] = reserved[ 8b] 10.20.61.210: [ FFh] = sequence_number[ 8b] 10.20.61.210: [ 7h] = message_class.class[ 5b] 10.20.61.210: [ 0h] = message_class.reserved[ 2b] 10.20.61.210: [ 0h] = message_class.ack[ 1b] 10.20.61.210: IPMI Session Header: 10.20.61.210: -------------------- 10.20.61.210: [ 0h] = authentication_type[ 8b] 10.20.61.210: [ 0h] = session_sequence_number[32b] 10.20.61.210: [ 0h] = session_id[32b] 10.20.61.210: [ 9h] = ipmi_msg_len[ 8b] 10.20.61.210: IPMI Message Header: 10.20.61.210: -------------------- 10.20.61.210: [ 20h] = rs_addr[ 8b] 10.20.61.210: [ 0h] = rs_lun[ 2b] 10.20.61.210: [ 6h] = net_fn[ 6b] 10.20.61.210: [ C8h] = checksum1[ 8b] 10.20.61.210: [ 81h] = rq_addr[ 8b] 10.20.61.210: [ 0h] = rq_lun[ 2b] 10.20.61.210: [ Ch] = rq_seq[ 6b] 10.20.61.210: IPMI Command Data: 10.20.61.210: ------------------ 10.20.61.210: [ 38h] = cmd[ 8b] 10.20.61.210: [ Eh] = channel_number[ 4b] 10.20.61.210: [ 0h] = reserved1[ 3b] 10.20.61.210: [ 0h] = get_ipmi_v2.0_extended_data[ 1b] 10.20.61.210: [ 3h] = maximum_privilege_level[ 4b] 10.20.61.210: [ 0h] = reserved2[ 4b] 10.20.61.210: IPMI Trailer: 10.20.61.210: -------------- 10.20.61.210: [ 6h] = checksum2[ 8b] 10.20.61.210: ===================================================== 10.20.61.210: IPMI 1.5 Get Channel Authentication Capabilities Request 10.20.61.210: ===================================================== 10.20.61.210: RMCP Header: 10.20.61.210: ------------ 10.20.61.210: [ 6h] = version[ 8b] 10.20.61.210: [ 0h] = reserved[ 8b] 10.20.61.210: [ FFh] = sequence_number[ 8b] 10.20.61.210: [ 7h] = message_class.class[ 5b] 10.20.61.210: [ 0h] = message_class.reserved[ 2b] 10.20.61.210: [ 0h] = message_class.ack[ 1b] 10.20.61.210: IPMI Session Header: 10.20.61.210: -------------------- 10.20.61.210: [ 0h] = authentication_type[ 8b] 10.20.61.210: [ 0h] = session_sequence_number[32b] 10.20.61.210: [ 0h] = session_id[32b] 10.20.61.210: [ 9h] = ipmi_msg_len[ 8b] 10.20.61.210: IPMI Message Header: 10.20.61.210: -------------------- 10.20.61.210: [ 20h] = rs_addr[ 8b] 10.20.61.210: [ 0h] = rs_lun[ 2b] 10.20.61.210: [ 6h] = net_fn[ 6b] 10.20.61.210: [ C8h] = checksum1[ 8b] 10.20.61.210: [ 81h] = rq_addr[ 8b] 10.20.61.210: [ 0h] = rq_lun[ 2b] 10.20.61.210: [ Dh] = rq_seq[ 6b] 10.20.61.210: IPMI Command Data: 10.20.61.210: ------------------ 10.20.61.210: [ 38h] = cmd[ 8b] 10.20.61.210: [ Eh] = channel_number[ 4b] 10.20.61.210: [ 0h] = reserved1[ 3b] 10.20.61.210: [ 0h] = get_ipmi_v2.0_extended_data[ 1b] 10.20.61.210: [ 3h] = maximum_privilege_level[ 4b] 10.20.61.210: [ 0h] = reserved2[ 4b] 10.20.61.210: IPMI Trailer: 10.20.61.210: -------------- 10.20.61.210: [ 2h] = checksum2[ 8b] 10.20.61.210: ===================================================== 10.20.61.210: IPMI 1.5 Get Channel Authentication Capabilities Request 10.20.61.210: ===================================================== 10.20.61.210: RMCP Header: 10.20.61.210: ------------ 10.20.61.210: [ 6h] = version[ 8b] 10.20.61.210: [ 0h] = reserved[ 8b] 10.20.61.210: [ FFh] = sequence_number[ 8b] 10.20.61.210: [ 7h] = message_class.class[ 5b] 10.20.61.210: [ 0h] = message_class.reserved[ 2b] 10.20.61.210: [ 0h] = message_class.ack[ 1b] 10.20.61.210: IPMI Session Header: 10.20.61.210: -------------------- 10.20.61.210: [ 0h] = authentication_type[ 8b] 10.20.61.210: [ 0h] = session_sequence_number[32b] 10.20.61.210: [ 0h] = session_id[32b] 10.20.61.210: [ 9h] = ipmi_msg_len[ 8b] 10.20.61.210: IPMI Message Header: 10.20.61.210: -------------------- 10.20.61.210: [ 20h] = rs_addr[ 8b] 10.20.61.210: [ 0h] = rs_lun[ 2b] 10.20.61.210: [ 6h] = net_fn[ 6b] 10.20.61.210: [ C8h] = checksum1[ 8b] 10.20.61.210: [ 81h] = rq_addr[ 8b] 10.20.61.210: [ 0h] = rq_lun[ 2b] 10.20.61.210: [ Eh] = rq_seq[ 6b] 10.20.61.210: IPMI Command Data: 10.20.61.210: ------------------ 10.20.61.210: [ 38h] = cmd[ 8b] 10.20.61.210: [ Eh] = channel_number[ 4b] 10.20.61.210: [ 0h] = reserved1[ 3b] 10.20.61.210: [ 0h] = get_ipmi_v2.0_extended_data[ 1b] 10.20.61.210: [ 3h] = maximum_privilege_level[ 4b] 10.20.61.210: [ 0h] = reserved2[ 4b] 10.20.61.210: IPMI Trailer: 10.20.61.210: -------------- 10.20.61.210: [ FEh] = checksum2[ 8b] 10.20.61.210: ===================================================== 10.20.61.210: IPMI 1.5 Get Channel Authentication Capabilities Request 10.20.61.210: ===================================================== 10.20.61.210: RMCP Header: 10.20.61.210: ------------ 10.20.61.210: [ 6h] = version[ 8b] 10.20.61.210: [ 0h] = reserved[ 8b] 10.20.61.210: [ FFh] = sequence_number[ 8b] 10.20.61.210: [ 7h] = message_class.class[ 5b] 10.20.61.210: [ 0h] = message_class.reserved[ 2b] 10.20.61.210: [ 0h] = message_class.ack[ 1b] 10.20.61.210: IPMI Session Header: 10.20.61.210: -------------------- 10.20.61.210: [ 0h] = authentication_type[ 8b] 10.20.61.210: [ 0h] = session_sequence_number[32b] 10.20.61.210: [ 0h] = session_id[32b] 10.20.61.210: [ 9h] = ipmi_msg_len[ 8b] 10.20.61.210: IPMI Message Header: 10.20.61.210: -------------------- 10.20.61.210: [ 20h] = rs_addr[ 8b] 10.20.61.210: [ 0h] = rs_lun[ 2b] 10.20.61.210: [ 6h] = net_fn[ 6b] 10.20.61.210: [ C8h] = checksum1[ 8b] 10.20.61.210: [ 81h] = rq_addr[ 8b] 10.20.61.210: [ 0h] = rq_lun[ 2b] 10.20.61.210: [ Fh] = rq_seq[ 6b] 10.20.61.210: IPMI Command Data: 10.20.61.210: ------------------ 10.20.61.210: [ 38h] = cmd[ 8b] 10.20.61.210: [ Eh] = channel_number[ 4b] 10.20.61.210: [ 0h] = reserved1[ 3b] 10.20.61.210: [ 0h] = get_ipmi_v2.0_extended_data[ 1b] 10.20.61.210: [ 3h] = maximum_privilege_level[ 4b] 10.20.61.210: [ 0h] = reserved2[ 4b] 10.20.61.210: IPMI Trailer: 10.20.61.210: -------------- 10.20.61.210: [ FAh] = checksum2[ 8b] 10.20.61.210: ===================================================== 10.20.61.210: IPMI 1.5 Get Channel Authentication Capabilities Request 10.20.61.210: ===================================================== 10.20.61.210: RMCP Header: 10.20.61.210: ------------ 10.20.61.210: [ 6h] = version[ 8b] 10.20.61.210: [ 0h] = reserved[ 8b] 10.20.61.210: [ FFh] = sequence_number[ 8b] 10.20.61.210: [ 7h] = message_class.class[ 5b] 10.20.61.210: [ 0h] = message_class.reserved[ 2b] 10.20.61.210: [ 0h] = message_class.ack[ 1b] 10.20.61.210: IPMI Session Header: 10.20.61.210: -------------------- 10.20.61.210: [ 0h] = authentication_type[ 8b] 10.20.61.210: [ 0h] = session_sequence_number[32b] 10.20.61.210: [ 0h] = session_id[32b] 10.20.61.210: [ 9h] = ipmi_msg_len[ 8b] 10.20.61.210: IPMI Message Header: 10.20.61.210: -------------------- 10.20.61.210: [ 20h] = rs_addr[ 8b] 10.20.61.210: [ 0h] = rs_lun[ 2b] 10.20.61.210: [ 6h] = net_fn[ 6b] 10.20.61.210: [ C8h] = checksum1[ 8b] 10.20.61.210: [ 81h] = rq_addr[ 8b] 10.20.61.210: [ 0h] = rq_lun[ 2b] 10.20.61.210: [ 10h] = rq_seq[ 6b] 10.20.61.210: IPMI Command Data: 10.20.61.210: ------------------ 10.20.61.210: [ 38h] = cmd[ 8b] 10.20.61.210: [ Eh] = channel_number[ 4b] 10.20.61.210: [ 0h] = reserved1[ 3b] 10.20.61.210: [ 0h] = get_ipmi_v2.0_extended_data[ 1b] 10.20.61.210: [ 3h] = maximum_privilege_level[ 4b] 10.20.61.210: [ 0h] = reserved2[ 4b] 10.20.61.210: IPMI Trailer: 10.20.61.210: -------------- 10.20.61.210: [ F6h] = checksum2[ 8b] 10.20.61.210: ===================================================== 10.20.61.210: IPMI 1.5 Get Channel Authentication Capabilities Request 10.20.61.210: ===================================================== 10.20.61.210: RMCP Header: 10.20.61.210: ------------ 10.20.61.210: [ 6h] = version[ 8b] 10.20.61.210: [ 0h] = reserved[ 8b] 10.20.61.210: [ FFh] = sequence_number[ 8b] 10.20.61.210: [ 7h] = message_class.class[ 5b] 10.20.61.210: [ 0h] = message_class.reserved[ 2b] 10.20.61.210: [ 0h] = message_class.ack[ 1b] 10.20.61.210: IPMI Session Header: 10.20.61.210: -------------------- 10.20.61.210: [ 0h] = authentication_type[ 8b] 10.20.61.210: [ 0h] = session_sequence_number[32b] 10.20.61.210: [ 0h] = session_id[32b] 10.20.61.210: [ 9h] = ipmi_msg_len[ 8b] 10.20.61.210: IPMI Message Header: 10.20.61.210: -------------------- 10.20.61.210: [ 20h] = rs_addr[ 8b] 10.20.61.210: [ 0h] = rs_lun[ 2b] 10.20.61.210: [ 6h] = net_fn[ 6b] 10.20.61.210: [ C8h] = checksum1[ 8b] 10.20.61.210: [ 81h] = rq_addr[ 8b] 10.20.61.210: [ 0h] = rq_lun[ 2b] 10.20.61.210: [ 11h] = rq_seq[ 6b] 10.20.61.210: IPMI Command Data: 10.20.61.210: ------------------ 10.20.61.210: [ 38h] = cmd[ 8b] 10.20.61.210: [ Eh] = channel_number[ 4b] 10.20.61.210: [ 0h] = reserved1[ 3b] 10.20.61.210: [ 0h] = get_ipmi_v2.0_extended_data[ 1b] 10.20.61.210: [ 3h] = maximum_privilege_level[ 4b] 10.20.61.210: [ 0h] = reserved2[ 4b] 10.20.61.210: IPMI Trailer: 10.20.61.210: -------------- 10.20.61.210: [ F2h] = checksum2[ 8b] 10.20.61.210: ===================================================== 10.20.61.210: IPMI 1.5 Get Channel Authentication Capabilities Request 10.20.61.210: ===================================================== 10.20.61.210: RMCP Header: 10.20.61.210: ------------ 10.20.61.210: [ 6h] = version[ 8b] 10.20.61.210: [ 0h] = reserved[ 8b] 10.20.61.210: [ FFh] = sequence_number[ 8b] 10.20.61.210: [ 7h] = message_class.class[ 5b] 10.20.61.210: [ 0h] = message_class.reserved[ 2b] 10.20.61.210: [ 0h] = message_class.ack[ 1b] 10.20.61.210: IPMI Session Header: 10.20.61.210: -------------------- 10.20.61.210: [ 0h] = authentication_type[ 8b] 10.20.61.210: [ 0h] = session_sequence_number[32b] 10.20.61.210: [ 0h] = session_id[32b] 10.20.61.210: [ 9h] = ipmi_msg_len[ 8b] 10.20.61.210: IPMI Message Header: 10.20.61.210: -------------------- 10.20.61.210: [ 20h] = rs_addr[ 8b] 10.20.61.210: [ 0h] = rs_lun[ 2b] 10.20.61.210: [ 6h] = net_fn[ 6b] 10.20.61.210: [ C8h] = checksum1[ 8b] 10.20.61.210: [ 81h] = rq_addr[ 8b] 10.20.61.210: [ 0h] = rq_lun[ 2b] 10.20.61.210: [ 12h] = rq_seq[ 6b] 10.20.61.210: IPMI Command Data: 10.20.61.210: ------------------ 10.20.61.210: [ 38h] = cmd[ 8b] 10.20.61.210: [ Eh] = channel_number[ 4b] 10.20.61.210: [ 0h] = reserved1[ 3b] 10.20.61.210: [ 0h] = get_ipmi_v2.0_extended_data[ 1b] 10.20.61.210: [ 3h] = maximum_privilege_level[ 4b] 10.20.61.210: [ 0h] = reserved2[ 4b] 10.20.61.210: IPMI Trailer: 10.20.61.210: -------------- 10.20.61.210: [ EEh] = checksum2[ 8b] 10.20.61.210: ===================================================== 10.20.61.210: IPMI 1.5 Get Channel Authentication Capabilities Request 10.20.61.210: ===================================================== 10.20.61.210: RMCP Header: 10.20.61.210: ------------ 10.20.61.210: [ 6h] = version[ 8b] 10.20.61.210: [ 0h] = reserved[ 8b] 10.20.61.210: [ FFh] = sequence_number[ 8b] 10.20.61.210: [ 7h] = message_class.class[ 5b] 10.20.61.210: [ 0h] = message_class.reserved[ 2b] 10.20.61.210: [ 0h] = message_class.ack[ 1b] 10.20.61.210: IPMI Session Header: 10.20.61.210: -------------------- 10.20.61.210: [ 0h] = authentication_type[ 8b] 10.20.61.210: [ 0h] = session_sequence_number[32b] 10.20.61.210: [ 0h] = session_id[32b] 10.20.61.210: [ 9h] = ipmi_msg_len[ 8b] 10.20.61.210: IPMI Message Header: 10.20.61.210: -------------------- 10.20.61.210: [ 20h] = rs_addr[ 8b] 10.20.61.210: [ 0h] = rs_lun[ 2b] 10.20.61.210: [ 6h] = net_fn[ 6b] 10.20.61.210: [ C8h] = checksum1[ 8b] 10.20.61.210: [ 81h] = rq_addr[ 8b] 10.20.61.210: [ 0h] = rq_lun[ 2b] 10.20.61.210: [ 13h] = rq_seq[ 6b] 10.20.61.210: IPMI Command Data: 10.20.61.210: ------------------ 10.20.61.210: [ 38h] = cmd[ 8b] 10.20.61.210: [ Eh] = channel_number[ 4b] 10.20.61.210: [ 0h] = reserved1[ 3b] 10.20.61.210: [ 0h] = get_ipmi_v2.0_extended_data[ 1b] 10.20.61.210: [ 3h] = maximum_privilege_level[ 4b] 10.20.61.210: [ 0h] = reserved2[ 4b] 10.20.61.210: IPMI Trailer: 10.20.61.210: -------------- 10.20.61.210: [ EAh] = checksum2[ 8b] /usr/local/sbin/ipmi-sensors: connection timeout -- View this message in context: http://old.nabble.com/FreeIPMI-compatibility-with-HP-Proliant-DL380---DL385-Servers-tp33958110p33958110.html Sent from the FreeIPMI - Users mailing list archive at Nabble.com. _______________________________________________ Freeipmi-users mailing list [email protected] https://lists.gnu.org/mailman/listinfo/freeipmi-users
