Thanks Jarrod,
That might be the issue, looks like the BMC user is getting added in
as user slot 3:
[xCAT Genesis running on node /]# ipmitool user list
ID Name Callin Link Auth IPMI Msg Channel Priv
Limit
2 ADMIN true false false Unknown (0x00)
3 IPMIUSER true false true
ADMINISTRATOR
Curious, why the specific lock down to slot 2 or 4 in the if
statement?
On 11/2/2013 6:41 AM, Jarrod B Johnson
wrote:
the bmcsetup contains:
ipmitool -d $idev user enable
$USERSLOT
The one user xCAT is supposed
to be using should already be having that done. USERSLOT:
f [ ! -z "$LOCKEDUSERS" ]; then
USERSLOT=`ipmitool -d $idev
user list $LANCHAN |grep -v ^ID|awk '{print $1 " " $2}'|grep "
$BMCUS"|awk '{print $1}'`
if [ -z "$USERSLOT" ]; then
USERSLOT=4
fi
else
USERSLOT=2
fi
It looks at the user list, sees
if the requested user is one of the first 4, if it is, it uses
that. If it isn't, it takes over slot 4.
There were some IPMI
implementations that mandated we use slot 2. If supermicro
has another limitation, we can probably adapt bmcsetup easily
enough.
Russell Jones
---11/01/2013 04:41:11 PM---Hi all, We have a Supermicro
X9DRT-based node that we are attempting to use
From: Russell Jones
<russell-l...@jonesmail.me>
To: xCAT Users Mailing list
<xcat-user@lists.sourceforge.net>
Date: 11/01/2013 04:41 PM
Subject: [xcat-user] bmcsetup and Supermicro
X9DRT
Hi all,
We have a Supermicro X9DRT-based node that we are attempting
to use
bmcsetup on. We are running into an issue where bmcsetup on
this
Supermicro seems to be adding users with a default to
"disabled" state.
I have to specifically run "ipmitool user enable <id>"
on the node to
enable the user.
Other nodes we run bmcsetup on, such as Dell's, this is not
the case and
the user is added and enabled by default.
Would it be possible to perhaps change the bmcsetup code to
purposefully
enable the user after it has been added? Would this be the
right path to
take for this?
Thanks for your input!
------------------------------------------------------------------------------
Android is increasing in popularity, but the open development
platform that
developers love is also attractive to malware creators.
Download this white
paper to learn more about secure code signing practices that
can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
xCAT-user mailing list
xCAT-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/xcat-user
------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
xCAT-user mailing list
xCAT-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/xcat-user
|
------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
xCAT-user mailing list
xCAT-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/xcat-user