Bug 1200998 - fence agents not working on HP iLO3, iLO4
Summary: fence agents not working on HP iLO3, iLO4
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: fence-agents
Version: 21
Hardware: x86_64
OS: Linux
unspecified
urgent
Target Milestone: ---
Assignee: Marek Grac
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2015-03-11 19:15 UTC by Murali
Modified: 2015-03-19 22:39 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2015-03-19 22:39:57 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Murali 2015-03-11 19:15:25 UTC
Description of problem:
fence_ilo2 seems working for HP iLO2 blades
However fence_ilo3 or fence_ilo4 does not work respectively for HP iLO3 or iLO4 blades.


Version-Release number of selected component (if applicable):3.1.5


How reproducible: consistent, issue is hard-on


Steps to Reproduce:
1./usr/sbin/fence_ilo3 -a <ilo3 ip addr> -l Administrator -p <password> -P lanplus -C 0 status
2.
3.

Actual results:
###################
ipmilan: Failed to connect after 20 seconds
ipmilan: Failed to connect after 20 seconds
Failed
##################

Expected results:
Success

I also ran with the verbose option and below is the output of it:
/usr/sbin/fence_ilo3 -a 10.41.127.77 -P lanplus -l Administrator -p r3motehelp -C 0 -vvv status

Various options like -C 1, -C 2, -C 3 were tried too. 

On the iLO i see in the encryption section in the security option,the below:

Current cipher RSA_With3DES_EDE_CBC_SHA 

output of fence_ilo3 command with very verbose output
#################
Rebooting machine @ IPMI:10.41.127.77...Spawning: '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P '[set]' -v -v -v chassis power status'...
Spawned: '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P '[set]' -v -v -v chassis power status' - PID 32008
Looking for:
    'Password:', val = 1
    'Unable to establish LAN', val = 11
    'IPMI mutex', val = 14
    'Unsupported cipher suite ID', val = 2048
    'read_rakp2_message: no support for', val = 2048
    'Chassis Power is off', val = 4096
    'Chassis Power is on', val = 8192
ExpectToken returned -1
ExpectToken failed.  Info returned:
>>>>>

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
Get Auth Capabilities error
Error issuing Get Channel Authentication Capabilies request
Error: Unable to establish IPMI v2 / RMCP+ session

<<<<<
Error = 2 (No such file or directory)
Reaping pid 32008
Spawning: '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P '[set]' -v -v -v chassis power cycle'...
Spawned: '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P '[set]' -v -v -v chassis power cycle' - PID 32022
Looking for:
    'Password:', val = 1
    'Unable to establish LAN', val = 11
    'IPMI mutex', val = 14
    'Unsupported cipher suite ID', val = 2048
    'read_rakp2_message: no support for', val = 2048
    'Command not supported in present state', val = 16384
    ': Cycle', val = 0
ExpectToken returned -1
ExpectToken failed.  Info returned:
>>>>>

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
Get Auth Capabilities error
Error issuing Get Channel Authentication Capabilies request
Error: Unable to establish IPMI v2 / RMCP+ session

<<<<<
Error = 2 (No such file or directory)
Reaping pid 32022
Failed
#######################


Additional info:
similar command executed for HP iLO2 blade works well.
# /usr/sbin/fence_ilo2 -a <ilo2 ip addr> -l Administrator -p <password> status
Success: Rebooted

Comment 1 Marek Grac 2015-03-12 09:55:25 UTC
@Murali:

It looks like a problem on IPMI level. So, let's start with 'status' operation. First issue (not too relevant) in all of your examples you are trying to reboot a machine. If you want that then 'status' at the end is irrelevant. In other case, add -o/--action before status. 

Which firmware do you have?

Can you open connection to iLO (port 623) or it is blocked by firewall?


my output with firmware 1.1.15

* /usr/bin/ipmitool -v -I lanplus -H hp-dl580g7-01-ilo.rhts.eng.nay.redhat.com -U Administrator -P XXX -L ADMINISTRATOR chassis power status

Running Get PICMG Properties my_addr 0x20, transit 0, target 0x20
Error Response 0xc1 from Get PICMG Properities
No PICMG Extenstion discovered
Chassis Power is on

---
There is no connection between fence_ilo2 and fence_ilo3/4 as communication with them is based on different protocols.

Comment 2 Murali 2015-03-12 13:24:02 UTC
Thanks Marek for your response. Here are the responses for the commands that I ran same as yours. The "-l" option in my case, does not work, since it relates to "lun". If you need the output of my "ipmitool --help", Please let me know.

#########################
#/usr/bin/ipmitool -v -I lanplus -H <ip addr> -U Administrator -P <password> -L ADMINISTRATOR chassis power status
Get Auth Capabilities error
Error issuing Get Channel Authentication Capabilies request
Error: Unable to establish IPMI v2 / RMCP+ session

# /usr/bin/ipmitool -V
ipmitool version 1.8.14

My iLO ver is 1.80 and there is no firewall blocking the port 623. The nmap runs are captured below for reference. Also it was verified that "Enable IPMI/DCMI over LAN on Port 623" is checked in the iLO that I am trying to send the command against:

#################
# nmap -sU <iLO3 ip addr> -p 623

Starting Nmap 5.51 ( http://nmap.org ) at 2015-03-12 09:10 EDT
Nmap scan report for sinkerr.kdc.capitalone.com (<ip addr>)
Host is up (0.0035s latency).
PORT    STATE         SERVICE
623/udp open|filtered asf-rmcp

Nmap done: 1 IP address (1 host up) scanned in 0.35 seconds
# nmap -sT <iLO3 ip addr> -p 623

Starting Nmap 5.51 ( http://nmap.org ) at 2015-03-12 09:11 EDT
Nmap scan report for sinkerr.kdc.capitalone.com (<ip adddr>)
Host is up (0.0018s latency).
PORT    STATE    SERVICE
623/tcp filtered oob-ws-http

Nmap done: 1 IP address (1 host up) scanned in 0.29 seconds
###################

(In reply to Murali from comment #0)
> Description of problem:
fence_ilo2 seems working for HP iLO2 blades
However
> fence_ilo3 or fence_ilo4 does not work respectively for HP iLO3 or iLO4
> blades.


Version-Release number of selected component (if applicable):3.1.5
> How reproducible: consistent, issue is hard-on


Steps to Reproduce:
> 1./usr/sbin/fence_ilo3 -a <ilo3 ip addr> -l Administrator -p <password> -P
> lanplus -C 0 status
2.
3.

Actual results:
###################
ipmilan:
> Failed to connect after 20 seconds
ipmilan: Failed to connect after 20
> seconds
Failed
##################

Expected results:
Success

I also ran
> with the verbose option and below is the output of it:
/usr/sbin/fence_ilo3
> -a 10.41.127.77 -P lanplus -l Administrator -p r3motehelp -C 0 -vvv status
> Various options like -C 1, -C 2, -C 3 were tried too. 

On the iLO i see in
> the encryption section in the security option,the below:

Current cipher
> RSA_With3DES_EDE_CBC_SHA 

output of fence_ilo3 command with very verbose
> output
#################
Rebooting machine @ IPMI:10.41.127.77...Spawning:
> '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P
> '[set]' -v -v -v chassis power status'...
Spawned: '/usr/bin/ipmitool -I
> lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P '[set]' -v -v -v
> chassis power status' - PID 32008
Looking for:
    'Password:', val = 1
   
> 'Unable to establish LAN', val = 11
    'IPMI mutex', val = 14
   
> 'Unsupported cipher suite ID', val = 2048
    'read_rakp2_message: no
> support for', val = 2048
    'Chassis Power is off', val = 4096
    'Chassis
> Power is on', val = 8192
ExpectToken returned -1
ExpectToken failed.  Info
> returned:
>>>>>

>> Sending IPMI command payload
>>    netfn   : 0x06
>>   
> command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI
> Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
> >>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr   
> : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq
> Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI
> command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    :
> 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>  
> Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
> >> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>> 
> Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
> >>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
> >>    command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>>
> IPMI Request Session Header
>>   Authtype   : NONE
>>   Authtype   : NONE
>>
> Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message
> Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq
> Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
> >> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>
> data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
> >>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID :
> 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn   
> : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq
> Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>   
> netfn   : 0x06
>>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A
> v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>  
> Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message
> Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq
> Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
> >> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>
> data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
> >>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID :
> 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn   
> : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq
> Lun     : 0
>>   Command    : 38

>> Sending IPMI command payload
>>   
> netfn   : 0x06
>>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A
> v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>  
> Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message
> Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq
> Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
> >> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>
> data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
> >>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID :
> 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn   
> : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq
> Lun     : 0
>>   Command    : 38
Get Auth Capabilities error
Error issuing
> Get Channel Authentication Capabilies request
Error: Unable to establish
> IPMI v2 / RMCP+ session

<<<<<
Error = 2 (No such file or directory)
Reaping
> pid 32008
Spawning: '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U
> 'Administrator' -C 0 -P '[set]' -v -v -v chassis power cycle'...
Spawned:
> '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P
> '[set]' -v -v -v chassis power cycle' - PID 32022
Looking for:
   
> 'Password:', val = 1
    'Unable to establish LAN', val = 11
    'IPMI
> mutex', val = 14
    'Unsupported cipher suite ID', val = 2048
   
> 'read_rakp2_message: no support for', val = 2048
    'Command not supported
> in present state', val = 16384
    ': Cycle', val = 0
ExpectToken returned
> -1
ExpectToken failed.  Info returned:
>>>>>

>> Sending IPMI command
> payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04
> BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   :
> NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI
> Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN
> : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>  
> Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
>>   
> command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI
> Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
> >>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr   
> : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq
> Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI
> command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    :
> 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>  
> Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
> >> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>> 
> Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
> >>   Command    : 38
>> Sending IPMI command payload
>>    netfn   : 0x06
>>
> command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI
> Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
> >>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr   
> : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq
> Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending IPMI
> command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    :
> 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>  
> Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
> >> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>> 
> Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
> >>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
> >>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>>
> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   :
> 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>  
> Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    :
> 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38

>> Sending
> IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data   
> : 0x0e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>  
> Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
> >> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>> 
> Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
> >>   Command    : 38

>> Sending IPMI command payload
>>    netfn   : 0x06
> >>    command : 0x38
>>    data    : 0x0e 0x04

BUILDING A v1.5 COMMAND
>>
> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   :
> 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>  
> Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    :
> 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
Get Auth
> Capabilities error
Error issuing Get Channel Authentication Capabilies
> request
Error: Unable to establish IPMI v2 / RMCP+ session

<<<<<
Error = 2
> (No such file or directory)
Reaping pid 32022
Failed
#######################
> Additional info:
similar command executed for HP iLO2 blade works well.
#
> /usr/sbin/fence_ilo2 -a <ilo2 ip addr> -l Administrator -p <password> status
> Success: Rebooted

Comment 3 Murali 2015-03-12 13:26:28 UTC
Thanks Marek for your response. Here are the responses for the commands that I ran same as yours. The "-l" option in my case, does not work, since it relates to "lun". If you need the output of my "ipmitool --help", Please let me know.

#########################
#/usr/bin/ipmitool -v -I lanplus -H <ip addr> -U Administrator -P <password> -L ADMINISTRATOR chassis power status
Get Auth Capabilities error
Error issuing Get Channel Authentication Capabilies request
Error: Unable to establish IPMI v2 / RMCP+ session

# /usr/bin/ipmitool -V
ipmitool version 1.8.14

My iLO ver is 1.80 and there is no firewall blocking the port 623. The nmap runs are captured below for reference. Also it was verified that "Enable IPMI/DCMI over LAN on Port 623" is checked in the iLO that I am trying to send the command against:

#################
# nmap -sU <iLO3 ip addr> -p 623

Starting Nmap 5.51 ( http://nmap.org ) at 2015-03-12 09:10 EDT
Nmap scan report for sinkerr.kdc.capitalone.com (<ip addr>)
Host is up (0.0035s latency).
PORT    STATE         SERVICE
623/udp open|filtered asf-rmcp

Nmap done: 1 IP address (1 host up) scanned in 0.35 seconds
# nmap -sT <iLO3 ip addr> -p 623

Starting Nmap 5.51 ( http://nmap.org ) at 2015-03-12 09:11 EDT
Nmap scan report for sinkerr.kdc.capitalone.com (<ip adddr>)
Host is up (0.0018s latency).
PORT    STATE    SERVICE
623/tcp filtered oob-ws-http

Nmap done: 1 IP address (1 host up) scanned in 0.29 seconds
###################

Comment 5 Marek Grac 2015-03-19 21:49:41 UTC
@Murali:

I don't have a firmware 1.80 installed yet but as you have mentioned blades. Can you take a look it there is not other fence agent that could work. There is fence_hpblade (connect to chassis) and fence_ilo_ssh/ilo_mp/ilo_moonshot that might work too.

Comment 6 Murali 2015-03-19 22:39:57 UTC
This can be closed. The issue has been traced to a firewall block in our environment. Both iLO3 and iLO4 worked using the ipmiutil.


Note You need to log in before you can comment on or make changes to this bug.