Verified on payload 4.11.0-0.nightly-arm64-2022-08-30-203508 steps: 1. BootMacAddress given Case mixing like: - name: worker-00 role: worker bmc: address: ipmi://openshift-qe-038.mgmt.arm.eng.rdu2.redhat.com/ disableCertificateVerification: True username: *** HIDDEN *** password: *** HIDDEN *** bootMACAddress: A0:36:9F:30:04:AA ..... - name: worker-01 role: worker bmc: address: ipmi://openshift-qe-039.mgmt.arm.eng.rdu2.redhat.com/ disableCertificateVerification: True username: *** HIDDEN *** password: *** HIDDEN *** bootMACAddress: A0:36:9f:30:04:b4 2.launch an IPI on Bare Metal with Managed Provisioning Network 3. Wait and check worker nodes can be created oc get nodes | grep worker worker-00.lwanipibm0831.qeclusters.arm.eng.rdu2.redhat.com Ready worker 26m v1.24.0+b62823b worker-01.lwanipibm0831.qeclusters.arm.eng.rdu2.redhat.com Ready worker 26m v1.24.0+b62823b 4. Check logs of container metal3-dnsmasq, it can recognize upper case BootMacAddress % oc logs metal3-77f4fc5895-8jr6w -c metal3-dnsmasq +++ get_provisioning_interface +++ '[' -n '' ']' +++ local interface=provisioning +++ for mac in ${PROVISIONING_MACS//,/ } +++ ip -br link show up +++ grep -qi 00:1B:21:e4:63:30 +++ for mac in ${PROVISIONING_MACS//,/ } +++ ip -br link show up +++ grep -qi 00:1B:21:E4:37:A7 ++++ ip -br link show up ++++ grep -i 00:1B:21:E4:37:A7 ++++ cut -f 1 -d ' ' +++ interface=enP1p4s0 +++ break +++ echo enP1p4s0 ++ export PROVISIONING_INTERFACE=enP1p4s0 ++ PROVISIONING_INTERFACE=enP1p4s0 ++ export LISTEN_ALL_INTERFACES=true ++ LISTEN_ALL_INTERFACES=true ++ export IRONIC_PRIVATE_PORT=6388 ++ IRONIC_PRIVATE_PORT=6388 ++ export IRONIC_INSPECTOR_PRIVATE_PORT=5049 ++ IRONIC_INSPECTOR_PRIVATE_PORT=5049 + export HTTP_PORT=6180 + HTTP_PORT=6180 + export DNSMASQ_EXCEPT_INTERFACE=lo + DNSMASQ_EXCEPT_INTERFACE=lo + wait_for_interface_or_ip
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.11.3 packages and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:6287